Program functionality
|
Actual mark
|
Max
|
| |
- Getting the text that is to be encrypted (You only get marks for
one of Method I or Method II)
|
|
8 |
| |
|
Method I: User is prompted for
the text (2 marks for this approach) |
|
|
| |
|
OR |
|
|
| |
|
Method II: The text comes from
an input file (8 marks for this approach) |
|
|
| |
|
|
Prompts for the name of the input file: 2
marks |
|
|
| |
|
|
Opens and reads information from the file: 4
marks |
|
|
| |
|
|
Handles problems with the input file: 2
marks |
|
|
| |
- Debug mode
|
|
6 |
| |
- First encryption algorithm: Caesar cipher
|
|
6 |
| |
|
Shifts the ASCII value forward by one: 2 marks |
|
|
| |
|
Alphabetic values are rotated and not shifted (Z -> A, z
-> a): 2 marks |
|
|
| |
|
Highest ASCII value rotated to the lowest value (127 ->
0): 2 marks |
|
|
| |
- Second encryption algorithm: Bitwise
negation (1 mark if works for single character)
|
|
4 |
| |
- Checks that the choice of encryption
algorithm was one of the two allowable choices
|
|
2 |
| |
- Displaying the encrypted result (You only get marks for one of
Method I or Method II)
|
|
4 |
| |
|
Method I: Result is displayed
onscreen (1 mark for this approach) |
|
|
| |
|
OR |
|
|
| |
|
Method II: The result is written
to a file (4 marks for this approach) |
|
|
| |
TOTAL |
|
|
| |
|
30 |
Documentation
|
Actual mark
|
Max
|
| |
Program version number |
|
1 |
| |
Description of the algorithm |
|
4 |
| |
List of features |
|
4 |
| |
TOTAL |
|
9 |
| |
|
|
|
Style
|
|
|
| |
Naming conventions (e.g., variable names) |
|
2 |
| |
Appearance and whitespace |
|
2 |
| |
Consistency of formatting |
|
2 |
| |
Variables are initialized before being
used |
|
1 |
| |
Functions are used to decompose the program
(parameters and return values used) |
|
2 |
| |
Decomposition by function is logical and
balanced |
|
1 |
| |
TOTAL |
|
10 |