programming, Computer Network Security

Assignment Help:
For this assignment you will create a program called MMWordFix (Multi-Mode WordFix). This program prompts the user to select one of three word filters (uppercase, lowercase, encrypt). Then it allows the user to repeatedly apply this filter either interactively or to convert a file. Here is a sample run:


If the user tries to convert a file and the file is not found in the local directory, they should see an error message, e.g.:


If the user does not correctly enter the name of one of the filters, WordFix should continue to prompt the user until a valid selection is entered. For example,



This program builds on Hwk4.
IFilter, FUpperCase, FLowerCase, FEncrypt:
• No changes.
FilterMgr:
• Change method selectFilter to return a pointer to IFactory. Thus it creates and returns an instance of the appropriate factory (instead of filter).
IFactory:
• An interface that has method NewFilter, which takes no arguments and returns a pointer to an IFilter.
UCaseFactory, LCaseFactory, EncryptFactory:
• Each implements interface IFactory.
• Each creates a different type of filter object: FUpperCase, FLowerCase, or FEncrypt respectively.
InteractiveFix:
• Has private attribute myFilter, which is a pointer to an IFilter.
• The constructor takes a pointer to an IFactory as an argument. It uses the factory object to create a filter object, which it saves in myFilter.
• Has method DoInteractiveSession, which takes no arguments and returns nothing. This method:
o Prompts the user for a word, then accepts a word from the user.
o If the word is “q”, the method returns.
o Otherwise it executes myFilter on the word, and displays the result.
• Note that InteractiveFix should not know anything about specific factory or filter classes; it only knows about IFactory and IFilter.
FileFix:
• Has private attribute myFactory, which is a pointer to an IFactory.
• The constructor takes a pointer to an IFactory as an argument. It saves the factory object in myFactory.
• Has method ConvertFile, which takes string argument and returns nothing. The argument is the name of the input file. This method:
o Uses myFactory to create the appropriate filter object.
o Opens the input file and output file (same name but .fix suffix).
o Reads each line in the input file, converts it, and writes it to the output file.
o Closes both files.
• Note that FileFix should not know anything about specific factory or filter classes; it only knows about IFactory and IFilter.
main():
• Prompts the user for a filter name, using the FilterMgr to get the choices.
• Accepts a filter name from the user.
• If the filter name is “q”, the program quits.
• Uses the FilterMgr to get the appropriate factory object that can create the named filter. If the filter name is not one of the available filters, the user is prompted again.
• Now the user may repeatedly apply the filter in one of two modes.
o Prompt the user for the mode (“i” or “f”)
o If the mode is “q”, the program quits.
o If the mode is “i”, an InteractiveFix object is created and used to apply the filter interactively.
o If the mode is “f”, the user is prompted for a file name then a FileFix object is created and used to apply the filter to a file.
• Note that main() should not know about any of the specific factory classes; it only knows about IFactory.
• Note that main() should not know anything about filters.

Related Discussions:- programming

Packet sniffers, PACKET SNIFFERS A packet network protocol analyzer is a...

PACKET SNIFFERS A packet network protocol analyzer is a network tool which collects copies of packets from network and analyzes them. It can give network administrator with valu

Man-in-the-middle attacker, - Alice, Bob and Charlie have a secret key a=3,...

- Alice, Bob and Charlie have a secret key a=3, b=4, c=5, in that order. - They would like to find a common secret key using Diffie-Hellan key exchange protocol (with g=2, p=5).

Keystroke-based access control model, Suppose you are working for one of th...

Suppose you are working for one of the leading credit reporting agencies that manages users' credit rating info with different financial institutions.  The company wishes to implem

Systems development life cycle (sdlc)-information security, SDLC Systems ...

SDLC Systems development life cycle (SDLC) is process of developing information systems through analysis, design, investigation, implementation and maintenance. SDLC is called as

List vulnerabilities of using wep, Question: The Wired Equivalent Priv...

Question: The Wired Equivalent Privacy (WEP) standard was created in order to give wireless networks safety and security features similar to that of wired networks. (a) L

Udp- datagram transport service, UDP- DATAGRAM TRANSPORT SERVICE INT...

UDP- DATAGRAM TRANSPORT SERVICE INTRODUCTION:  UDP is the one of the transport protocols in TCP/IP protocol suite. UDP protocol accepts applications on the computers to

Complexity of network systems, Computer networks is a complex subject due t...

Computer networks is a complex subject due to the given reasons: MANY DIFFERENT TECHNOLOGIES EXIST: The first reason for the complexity of networks is that there are s

Find the services implemented on your computer, Question: (a) Which typ...

Question: (a) Which type of attacker represents the most likely and most damaging risk to your network? (b) What is the basic reason that social engineering attacks succeed?

What is b-router, B-Router Hybrid devices that has the features of bot...

B-Router Hybrid devices that has the features of both routers and bridges . A bridge router or brouter is a network machine that acts as a router and as a bridge. The brout

Elliptic curve encryption - decryption scheme, (a) (i) If m = p·q·r where...

(a) (i) If m = p·q·r where p, q, and r are prime numbers, what is Φ(m)? (ii) Therefore, Determine Φ(440). (b) Describe the following terms as used in cryptography: (i)

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd