#COMP 122 Lab 7 Lab Report and Source Code
Explore tagged Tumblr posts
Text
COMP 122 Complete Class/COMP122
COMP 122 Complete Class/COMP122
COMP 122 Complete Class COMP 122 Lab 1 Lab Report and Source Code COMP 122 Lab 2 Lab Report and Source Code COMP 122 Lab 3 Lab Report and Source Code COMP 122 Lab 4 Lab Report and Source Code COMP 122 Lab 5 Lab Report and Source Code COMP 122 Lab 6 Lab Report and Source Code COMP 122 Lab 7 Lab Report and Source Code COMP 122 Lab 1 Lab Report and Source Code COMP 122 Lab 2 Lab Report and Source…
View On WordPress
0 notes
Link
COMP 220 Entire Course
COMP 220 iLab 1 Two-Dimensional Arrays Lab Report and Source Code
COMP 220 iLab 2 Resistor Lab Report and Source Code
COMP 220 iLab 3 Bank Account Lab Report and Source Code
COMP 220 iLab 4 Composition Lab Report and Source Code
COMP 220 iLab 5 Lab Report and Source Code
COMP 220 iLab 6 Overloaded Operators Lab Report and Source Code
COMP 220 iLab 7 Polymorphism Lab Report and Source Code
0 notes
Link
0 notes
Link
DEVRY COMP 122 Lab 7 Lab Report and Source Code
 Check this A+ tutorial guideline at
 http://www.comp122entirecourse.com/comp-122/comp-122-lab-7-lab-report-and-source-code
 For more classes visit
http://www.comp122entirecourse.com
COMP 122Â Week 7 iLab
The focus of this lab is on using strings. You will have an opportunity to work with both C style strings and the string data type. This lab also gives you an opportunity to use what you have learned previously, including using functions, array processing, repetition, and selection. You will also have an opportunity to work with file input and output.
0 notes
Link
DEVRY COMP 122 Lab 7 Lab Report and Source Code
 Check this A+ tutorial guideline at
 http://www.assignmentclick.com/comp-122/comp-122-lab-7-lab-report-and-source-code
 For more classes visit
http://www.assignmentclick.com
COMP 122Â Week 7 iLab
The focus of this lab is on using strings. You will have an opportunity to work with both C style strings and the string data type. This lab also gives you an opportunity to use what you have learned previously, including using functions, array processing, repetition, and selection. You will also have an opportunity to work with file input and output.
You are to design and implement a program which does encryption and decryption of data from files. Encryption is the process of taking plain lines of text and performing some algorithmic transformation on the data to create an encrypted line of text which looks nothing like the original. Decryption is the process of taking an encrypted line of text and performing some algorithmic transformation on the data to recover the original line of plain text.
Encryption and Decryption Approach
Our approach to encryption and decryption involves two strings. The first is an encryption / decryption string which we will allow to be up to 128 lower case alphabetical characters in length. The second string is a line of text from a file that is to be encrypted or decrypted.
Our basic strategy for encrypting data is based on mapping alphabetical characters to specific values, then doing some simple mathematical operations to create a new value. First of all, every character in either the encryption string or the input string is mapped to a number between 0 and 25 based on its position in the alphabet. = 0 = 1 = 25 The mapped value of a character is easily obtained by doing the following: For lower case characters, subtract 'a' from the character. For upper case characters, subtract 'A' from the character. To calculate the modified value of the first character of input we add its mapped value to the mapped value from the first character of the encryption string. This modified value is then adjusted using % 26 to make sure that the final modified value is within the 0 - 25 range. To create the final encrypted character value for the first character, simply do the following: For lower case characters, add 'a' to the modified value. For upper case characters, add 'A' to the modified value.
This is done for each alphabetic character in the input string. Non-alphabetic characters simply maintain their present value. If the input string is longer than the encryption string, simply reuse mapped values from the encryption string. For instance, if the encryption string has 10 characters (index values 0 - 9), when processing the 11th input character (index 10), simply use the input character index % length of encryption string (in this case 10 % 10 is 0) to select the value from the encryption string to use for mapping.
The decryption process is basically the same as the encryption process. The only difference is the value of the mapped character from the encryption string. For lower case encryption, the mapped from encryption string - 'a' For upper case encryption, the mapped from encryption string - 'A' For lower case decryption, the mapped - (character from encryption string - 'a') For upper case decryption, the mapped - (character from encryption string - 'A')
Program Requirements
Your program must meet the following requirements:
1. You must ask the user if they want to perform an encryption or decryption operation.
2. You must ask the user to enter the name of the file they want to encrypt or decrypt.
3. You must get an encryption key from the user which can be up to 128 characters. The key must be all lower case alphabetic characters.
4. You must have a function which takes the encryption key and creates an encryption map from it. For each character in the encryption key string, subtract the lower case letter 'a' and store the result in the corresponding encryption map array.
5. You must have a function which takes the encryption key and creates a decryption map from it. For each character in the encryption key string, subtract the lower case letter 'a' from it. Then subtract that result from 26 and store the value in the corresponding decryption map array.
6. You must have a function which will do the encryption or decryption transformation. This function takes the following parameters:
A constant C string containing the line of text to be transformed.
A constant C character array which contains the encryption or decryption map.
An integer which contains the length of the encryption map.
A string reference (output) which will contain the encrypted or decrypted string upon completion.
The core of the encryption / decryption algorithm is
0 notes
Link
DEVRY COMP 122 Lab 7 Lab Report and Source Code
 Check this A+ tutorial guideline at
 http://www.assignmentcloud.com/comp-122/comp-122-lab-7-lab-report-and-source-code
 For more classes visit
http://www.assignmentcloud.com
COMP 122Â Week 7 iLab
The focus of this lab is on using strings. You will have an opportunity to work with both C style strings and the string data type. This lab also gives you an opportunity to use what you have learned previously, including using functions, array processing, repetition, and selection. You will also have an opportunity to work with file input and output.
You are to design and implement a program which does encryption and decryption of data from files. Encryption is the process of taking plain lines of text and performing some algorithmic transformation on the data to create an encrypted line of text which looks nothing like the original. Decryption is the process of taking an encrypted line of text and performing some algorithmic transformation on the data to recover the original line of plain text.
Encryption and Decryption Approach
Our approach to encryption and decryption involves two strings. The first is an encryption / decryption string which we will allow to be up to 128 lower case alphabetical characters in length. The second string is a line of text from a file that is to be encrypted or decrypted.
Our basic strategy for encrypting data is based on mapping alphabetical characters to specific values, then doing some simple mathematical operations to create a new value. First of all, every character in either the encryption string or the input string is mapped to a number between 0 and 25 based on its position in the alphabet. = 0 = 1 = 25 The mapped value of a character is easily obtained by doing the following: For lower case characters, subtract 'a' from the character. For upper case characters, subtract 'A' from the character. To calculate the modified value of the first character of input we add its mapped value to the mapped value from the first character of the encryption string. This modified value is then adjusted using % 26 to make sure that the final modified value is within the 0 - 25 range. To create the final encrypted character value for the first character, simply do the following: For lower case characters, add 'a' to the modified value. For upper case characters, add 'A' to the modified value.
This is done for each alphabetic character in the input string. Non-alphabetic characters simply maintain their present value. If the input string is longer than the encryption string, simply reuse mapped values from the encryption string. For instance, if the encryption string has 10 characters (index values 0 - 9), when processing the 11th input character (index 10), simply use the input character index % length of encryption string (in this case 10 % 10 is 0) to select the value from the encryption string to use for mapping.
The decryption process is basically the same as the encryption process. The only difference is the value of the mapped character from the encryption string. For lower case encryption, the mapped from encryption string - 'a' For upper case encryption, the mapped from encryption string - 'A' For lower case decryption, the mapped - (character from encryption string - 'a') For upper case decryption, the mapped - (character from encryption string - 'A')
Program Requirements
Your program must meet the following requirements:
1. You must ask the user if they want to perform an encryption or decryption operation.
2. You must ask the user to enter the name of the file they want to encrypt or decrypt.
3. You must get an encryption key from the user which can be up to 128 characters. The key must be all lower case alphabetic characters.
4. You must have a function which takes the encryption key and creates an encryption map from it. For each character in the encryption key string, subtract the lower case letter 'a' and store the result in the corresponding encryption map array.
5. You must have a function which takes the encryption key and creates a decryption map from it. For each character in the encryption key string, subtract the lower case letter 'a' from it. Then subtract that result from 26 and store the value in the corresponding decryption map array.
6. You must have a function which will do the encryption or decryption transformation. This function takes the following parameters:
A constant C string containing the line of text to be transformed.
A constant C character array which contains the encryption or decryption map.
An integer which contains the length of the encryption map.
A string reference (output) which will contain the encrypted or decrypted string upon completion.
The core of the encryption / decryption algorithm is
0 notes
Link
DEVRY COMP 122 Lab 7 Lab Report and Source Code
 Check this A+ tutorial guideline at
 http://www.assignmentclick.com/comp-122/comp-122-lab-7-lab-report-and-source-code
 For more classes visit
http://www.assignmentclick.com
COMP 122Â Week 7 iLab
The focus of this lab is on using strings. You will have an opportunity to work with both C style strings and the string data type. This lab also gives you an opportunity to use what you have learned previously, including using functions, array processing, repetition, and selection. You will also have an opportunity to work with file input and output.
You are to design and implement a program which does encryption and decryption of data from files. Encryption is the process of taking plain lines of text and performing some algorithmic transformation on the data to create an encrypted line of text which looks nothing like the original. Decryption is the process of taking an encrypted line of text and performing some algorithmic transformation on the data to recover the original line of plain text.
Encryption and Decryption Approach
0 notes
Link
http://comp220entirecourse.com/comp-122/comp-220-ilab-1-two-dimensional-arrays-lab-report-and-source-code
COMP 220 iLab 1 Two Dimensional Arrays Lab Report and Source Code
BlackJack Table Specification: Include a brief description of what the program accomplishes, including its input, key processes, and output. There is always a dealer in the game. At the start of the game, the dealer’s first card will not be shown or displayed. The second card will be displayed. The dealer may draw additional cards. The dealer must use a random-number generator to determine the maximum number of cards the dealer will draw--a value between 0 and 3. In other words, the dealer is a computer player. The dealer does not show all the cards or the total until all the players have either gone bust (over 21) or hold (no more cards drawn). There must be at least one other player (you) and up to a maximum of four other players (all played by you). . On a player’s turn, that player may either draw a card or hold. Once a player holds, he or she should not be asked to draw another card during this game. All the cards for each player, including the first card dealt, are displayed, along with the suit symbol: spades ♠, clubs ♣, hearts ♥, or diamonds ♦. Each game will start with a new, 52-card deck, which is modeled on a real deck of cards. . The card deck has 52 cards with no jokers. The card deck is represented by a two-dimensional array of data-type character, where the first dimension represents the suit and the second dimension represents the card in the suit, such as the following. i. char CardDeck[4][13]; At the start of each game, each element of the two-dimensional array is initialized to a value of " ", or the "space" character. The deck has four suits, represented by the following dimension indices. . i. ii. iii. Each suit has 13 cards: 2, 3, 4, 5, 6, 7, 8,9 ,10, jack, queen, king, and ace. Each card in a suit is represented by the following dimension indices. . 2 card i. 3 card ii. 4 card iii. 5 card iv. 6 card v. 7 card vi. 8 card vii. 9 card viii. 10 card ix. jack x. queen xi. king xii. ace All the number cards are worth their face value (i.e., a 3 of diamonds is worth 3). All face cards are worth 10. An ace is worth either 1 or 11. Your final-score calculation must be able to handle this correctly for both the dealer and each player. A random-number generator must be used to select the suit and the card in the suit. . Once a card and suit are selected, the program should check if the value of that array element is a "space." If the array set the element equal to an integer, identifying the dealer or the player. 1 2 3 4 If the array element ! = "space," then the random-number and card-checking process should repeat until a "card" or an array element is selected that Once a card is drawn during a game, it cannot be drawn again. When the program first starts, it should prompt the user, asking if he or she wants to play a game of Blackjack or exit the program. If the user inputs to play the game, the next decision should be 1, 2, 3, or 4 players. At the start of the game, the dealer and each player should be dealt two cards. One of the dealer’s card's value and suit should not be displayed. The number of cards that the dealer will draw during a game should be determined by a random-number generator that will return a value of 0, 1, 2, or 3 cards to be drawn. Each player may then draw a card or hold. If, after drawing a card, any player or the dealer goes over a score of 21, he or she is not allowed to draw any more cards during the game. Once a player holds, he or she should not be asked to draw a card again during the game. The game continues until one of the following conditions occur: . all players have declared hold; all players and the dealer have gone over 21; a maximum of five cards total are held by any player at the end of a round of card draws; or any combination of the above. The display should show each player’s (and the dealer’s) hand and update the display after each round of card draws. spades ♠, clubs ♣, hearts ♥, and diamonds ♦ Example Card 1 Card 2 Card 3 Card 4 Card 5 Dealer: ? 10♦ Player 1: A♣ 2♠Player 2: J♣ Q♥ Player 3: 3♦ 8♣ At the end of a game, the display should be repeated, with the addition of win or lose and an updated balance. Example Card 1 Card 2 Card 3 Card 4 Card 5 Total Stats Dealer: J♦ 10♦ 20 Lose Player 1: K♣ 2♠5♥ 1♦ 5♦ 23 Lose Player 2: J♣ Q♥ 20 Lose Player 3: 3♦ 8♣ K♦ 21 Win! The program should then ask each player if he or she wants to play again or leave the game. The game continues with a new round, as long as there is one player remaining. If there are no remaining players, the program should exit.
0 notes
Link
http://comp220entirecourse.com/comp-122/comp-220-ilab-3-bank-account-lab-report-and-source-code
COMP 220 iLab 3 Bank Account Lab Report and Source Code
This lab introduces you to writing a C++ program to implement the concept of class inheritance using different types of bank accounts as a model. In this lab, you will create a base class, called CBankAccount, and two additional classes (each derived from CBankAccount), called CSavingsAccount and CCheckingAccount. You will then test the operations of each class in function main() to simulate the transactions of both a checking account and a savings account.
Deliverables.
Submit a single Notepad file containing the source code for all the files of the lab to the Dropbox for Week 3. Your source code should use proper indentation and be error free.
Be sure that your last name and the lab number are part of the file name: for example, YourLastName_Lab3.txt.
Each program should include a comment section that includes (minimally) your name, the lab and exercise number, and a description of what the program accomplishes.
Submit a lab report (a Word document) containing the following information to the Dropbox for Week 3. Include your name and the lab or lab-exercise number. Specification:
Include a brief description of what the program accomplishes, including its input, key processes, and output. Test Plan: Include a brief description of the method you used to confirm that your program worked properly. If necessary, include a clearly labeled table with test cases, predicted results, and actual results. Summary and Conclusions:
Includea summary of what the lab demonstrated and any conclusions drawn from the testing of the lab program. Provide a UML diagram showing the base and the derived class relationships, access specifiers, data types, and function arguments. Answers to Lab Questions: Answer any and all of the lab questions included in the lab steps. Summary: Write a statement summarizing your predicted and actual output. Identify and explain any differences. Conclusions: Write at least one nontrivial paragraph that explains, in detail, either a significant problem you had and how you solved it or, if you had no significant problems, something you learned by doing the exercise.
Each lab exercise should have a separate section in the lab-report document.
Your lab grade is based upon the formatting of your source code; the use of meaningful identifiers; the extent of internal documentation; the degree to which an exercises’ specifications are met; and the completeness of your lab report.
i L A B S T E P S
STEP 1: Create the Multifile Project and the Main (Base) Class
Create a new project that consists of the base class BankAccount. The BankAccount class should contain, at minimum, the following members.
It should contain data members to store a bank customer's balance and account number. These should be of different and appropriate data types. It should have function members that do the following: set the account number; return the account number; return the account balance; deposit money into the account; and withdraw money from the account.
STEP 2: Create the CheckingAccount Class Derived From the BankAccount Class
The class CheckingAccount should contain, at a minimum, the following members.
It should contain a data member to keep track of the number of withdrawal transactions made on the account. Whenever a withdrawal is made, this number should be incremented. Override the base class, withdraw-money function, and add the capability to deduct transaction fees from an account using the following guidelines. The checking account is allowed three free transactions. For each successful withdrawal transaction past the three free transactions, there will be a service fee of 50 cents per transaction. The service fee should be deducted from the account balance at the time the transaction is made. If there are insufficient funds in the account balance to cover the withdrawal plus the service fee, the withdrawal should be denied. The function should return a value to indicate whether the transaction succeeded or failed. Transaction fees should be deducted only from successful transactions, but the transaction count should be incremented in either case.
STEP 3: Create the SavingsingAccount Class Derived From the BankAccount Class
The class CheckingAccount should contain, at a minimum, the following members. It should contain a data member to hold the daily interest rate. The daily interest rate can be calculated from a yearly interest rate by dividing the annual rate by 365. It should contain a data member to keep track of the number of days since the last transaction or balance inquiry. This should be updated using a random-number generator (reference Lab 1) that will return a value representing the number of days between 0 and 7, inclusive. We will assume that this bank is open every day of the year. It should contain a data member to hold the interest earned since the last transaction or balance inquiry. It should contain a function member to set the annual interest rate.
Utilize the base-class functions for both withdrawal and deposit operations for the savings account. Override the base-class-balance inquiry function to add calculating and adding interest to the account based on the daily interest rate, the current balance of the account, and the number of days since the last balance inquiry. This should be called only when a balance inquiry is made, not when a deposit or withdrawal transaction or an account number inquiry is made. If there are insufficient funds in the account balance to cover a withdrawal, the withdrawal should be denied. The number of days since the last transaction or balance inquiry and the interest calculations should still be made. A value should be returned to indicate whether a withdrawal transaction succeeded or failed. It should contain a function member to return the interest earned since the last transaction or balance inquiry. It should contain a function member to return the number of days since the last transaction or balance inquiry.
STEP 4: Test Program Operation
All data-input and data-display operations (cin and cout) should be done in the function main() test program. The test program should create one checking account and one savings account with initial balances of $100 each using the functions defined in the class definitions. The test program should also assign a unique, five-digit account number to each account and assign an annual interest rate of 3% for the savings account. The test program should then display a menu that allows the user to select which option is to be performed on which account, including the following. Make a deposit and specify the amount to a selected or an entered account. Make a with drawal and specify the amount to a selected or an entered account. Return the balance of a selected or an entered account. For deposit transactions, withdrawal transactions, and balance inquiries, the updated balance and any fees charged or interest earned should also be displayed. For the savings account, the number of days since last transaction should be displayed. Exit the program. Each account operation should display the account number and the account type.
Lab Questions
Please answer all the lab questions in the text file that is to be turned into the Dropbox. You are not required to copy the question text into your document, but all answers should be listed with the question number they answer.
Were any base-class functions called or overloaded in either of the derived classes? If so, list which class and which function, and explain why they were either called or overloaded. Were any derived-class functions not explicitly called by the test program? If so, list which class and function, and explain why this was done. Which access attribute was used for each of the classes derived from the base class? Why was this access attribute chosen?
0 notes
Link
http://comp220entirecourse.com/comp-122/comp-220-ilab-7-polymorphism-lab-report-and-source-code
COMP 220 iLab 7 Polymorphism Lab Report and Source Code
Assignment: Lab 7 Polymorphism
Description: This lab introduces students to the concepts of polymorphism, early binding, late binding, abstract classes, and virtual class functions. This will be done in the context of performing calculations on basic geometrical shapes. Polymorphism is a very powerful extension of inheritance, and by using pointers to the base class, it allows access to derived class objects and their functions based on the context that they are called in.
The lab will require the creation of a base geometric class, called Shape, and two sub classes, Circle and Rectangle, that are derived public from the class Shape. From there, objects of both the Circle and the Rectangle classes will be created, as will an array of pointers to the base class Shape. By using the instantiated objects and the object pointers, both static and dynamic binding will be demonstrated.
0 notes