Program functionality
|
Actual mark
|
Max
|
|
- Getting the text that is to be encrypted (You only get marks for
one of Method I or Method II)
|
|
8 |
|
|
Method I: User is prompted for
the text (2 marks for this approach) |
|
|
|
|
OR |
|
|
|
|
Method II: The text comes from
an input file (8 marks for this approach) |
|
|
|
|
|
Prompts for the name of the input file: 2
marks |
|
|
|
|
|
Opens and reads information from the file: 4
marks |
|
|
|
|
|
Handles problems with the input file: 2
marks |
|
|
|
- Debug mode
|
|
6 |
|
- First encryption algorithm: Caesar cipher
|
|
6 |
|
|
Shifts the ASCII value forward by one: 2 marks |
|
|
|
|
Alphabetic values are rotated and not shifted (Z -> A, z
-> a): 2 marks |
|
|
|
|
Highest ASCII value rotated to the lowest value (127 ->
0): 2 marks |
|
|
|
- Second encryption algorithm: Bitwise
negation (1 mark if works for single character)
|
|
4 |
|
- Checks that the choice of encryption
algorithm was one of the two allowable choices
|
|
2 |
|
- Displaying the encrypted result (You only get marks for one of
Method I or Method II)
|
|
4 |
|
|
Method I: Result is displayed
onscreen (1 mark for this approach) |
|
|
|
|
OR |
|
|
|
|
Method II: The result is written
to a file (4 marks for this approach) |
|
|
|
TOTAL |
|
|
|
|
30 |
Documentation
|
Actual mark
|
Max
|
|
Program version number |
|
1 |
|
Description of the algorithm |
|
4 |
|
List of features |
|
4 |
|
TOTAL |
|
9 |
|
|
|
|
Style
|
|
|
|
Naming conventions (e.g., variable names) |
|
2 |
|
Appearance and whitespace |
|
2 |
|
Consistency of formatting |
|
2 |
|
Variables are initialized before being
used |
|
1 |
|
Functions are used to decompose the program
(parameters and return values used) |
|
2 |
|
Decomposition by function is logical and
balanced |
|
1 |
|
TOTAL |
|
10 |