The Introduction to multidisciplinary Computer Science II by James Tam Return to the course web page

CPSC 219: Assignment 1 (Marking)

Score Letter
A 48 - 49
A- 45 - 47
B+ 42 - 44
B 39 - 41
B- 36 - 38
C+ 33 - 35
C 30 - 32
C- 25 - 29
D+ 20 - 24
D 15 - 19
D- 10 - 14
F 0 - 9

 

Submission requirement

Effect on grade

Insufficient or missing contact information in the submitted program Maximum of 2 marks lost1
1 (Getting any marks for the assignment assumes of course that we can still figure out who you are)  

 

Program functionality

Actual mark

Max

 
  1. Getting the text that is to be encrypted (You only get marks for one of Method I or Method II)
  8
    Method I: User is prompted for the text (2 marks for this approach)    
    OR    
    Method II: The text comes from an input file (8 marks for this approach)    
      Prompts for the name of the input file: 2 marks    
      Opens and reads information from the file: 4 marks    
      Handles problems with the input file: 2 marks    
 
  1. Debug mode
  6
 
  1. First encryption algorithm: Caesar cipher
  6
    Shifts the ASCII value forward by one: 2 marks    
    Alphabetic values are rotated and not shifted (Z -> A, z -> a): 2 marks    
    Highest ASCII value rotated to the lowest value (127 -> 0): 2 marks    
 
  1. Second encryption algorithm: Bitwise negation (1 mark if works for single character)
  4
 
  1. Checks that the choice of encryption algorithm was one of the two allowable choices
  2
 
  1. Displaying the encrypted result (You only get marks for one of Method I or Method II)
  4
    Method I: Result is displayed onscreen (1 mark for this approach)    
    OR    
    Method II: The result is written to a file (4 marks for this approach)    
  TOTAL    
    30

Documentation

Actual mark

Max

  Program version number   1
  Description of the algorithm   4
  List of features   4
  TOTAL   9
       

Style

 

 

  Naming conventions (e.g., variable names)   2
  Appearance and whitespace   2
  Consistency of formatting   2
  Variables are initialized before being used   1
  Functions are used to decompose the program (parameters and return values used)   2
  Decomposition by function is logical and balanced   1
  TOTAL   10