Project #2: Linear Feedback Shift Register
|
|
- Eustacia Wood
- 5 years ago
- Views:
Transcription
1 BHSEC Queens Object-Oriented Programming Spring 2015 Project #2: Linear Feedback Shift Register Introduction1 A register is a small amount of storage on a digital processor. In this project, we will think of a register as a string of N ones and zeros stored in order. A linear feedback shift register (LFSR) is a special type of register used primarily for generating pseudo-random numbers. In this project, we will use the sequence of pseudorandom numbers generated from an LFSR to encrypt and decrypt an image. encrypt decrypt Linear Feedback Shift Register Technical Details Below is an example of an 11-bit LFSR. To go from one pseudo-random number to the next, the LFSR performs a step, which consists of the following two operations: 1. Shift all bits one position to the left. 2. The new rightmost bit is the exclusive or of the old leftmost bit and a bit at a given position, called the tap. Submission 1 Project adapted from 1
2 On Dropbox, create a folder called LFSR. You will submit a total of three java files that should be named XOR.java, LFSR.java, PhotoMagic.java. Grading To get a 60: Successfully implement and test XOR.java. To get a 70: Define the LFSR class. Write the constructor and tostring methods, and test each one. To get an 80: Correctly implement and test the step() method in the LFSR class. To get a 90: Correctly implement and test the generate() method in the LFSR class. To get a 100: Encrypt and decrypt images by correctly implementing the PhotoMagic class. Possible 10 point deduction: You must include a block comment at the start of each Java file containing your name, date of last modification, and a sentence affirming that you did not receive or share your code from anyone else, including via . Amongst your three Java files, you also must include a total of at least 25 inline comments, each of which gives a brief, English description of one or more lines of code that is not obvious. Academic Honesty Policy It is academically dishonest to look at code written by anyone else. You are allowed to talk to other students in class and share ideas. You may ask them if they have experienced particular compiler errors or how they approached a portion of the project. However, you are not allowed to look at code, accept it, or send it to anyone else. The most common incidents of academic dishonesty in computer science involve the electronic sending/sharing of code with other students. Incidents of academic dishonest will be reported to the principal of the school. 2
3 APIs XOR: This class is composed of static methods (i.e. methods that do calculation); therefore, it should not contain any instance variables. A starter XOR.java class has been provided for you. Method Name xor Input Type boolean, boolean Return Type boolean xor String, String String xor int, int int dectobinary int String binarytodec String int main none String[] Comments Implements the exclusive OR function on two bits of data. Assumes that the two input strings are composed only of 0s and 1s. Outputs the bitwise exclusive OR of the two inputs. Your function should work even when the input strings are of different lengths. Outputs the bitwise exclusive OR of two base 10 integers. The integers should be converted to binary and the final result should be converted back to base 10. Make use of the decimaltobinary and binarytodecimal methods that have already been written. Already coded for you. This takes an integer in base 10 and converts it to binary. The input is an integer, and the output is a String of 1s and 0s. Already coded for you. This takes a binary number and converts it to an integer in base 10. The input is a string of 1s and 0s, and the output is an integer. This code has been started for you, and you must finish it. It should test each static method defined in the class. You are expected to comment the main method with expected outputs as is demonstrated in the starter code. 3
4 LFSR: This class is a template for an LFSR object. Your instance variables should all be private, and your methods should all be public. Re-read the LFSR technical details to help you decide what instance variables to use. Method Name Input Type Return Type Constructor String, int none tostring none String step none int generate int int main none String[] Here are some additional hints: Comments The constructor takes the initial seed as a String of 0s and 1s. The length of the register should be the same as the length of the initial seed. The constructor also takes the the position of the tap bit. Returns a string representation of the LFSR, which is simply the sequence of bits stored in the register. Simulates one step (i.e. one shift) of the LFSR. The method should modify the contents of the register and return the new bit that was shifted in. Simulates k steps of the LFSR where k is the input parameter. Returns the nonnegative integer (in base 10) that is represented by the 0s and 1s that have been shifted into the register in those k steps. Instantiates at least one LFSR object and tests all methods of the class. Instantiating and printing an LFSR object This should display: LFSR lfsr = new LFSR(" ", 2); System.out.println(lfsr); The following code will help you determine if your step method is working. This should display LFSR lfsr = new LFSR(" ", 2); for (int i = 0; i < 10; i++) { int bit = lfsr.step(); System.out.println(lfsr + " " + bit); } 4
5 The generate method should use a String to keep track of what bits have been shifted into the LFSR. It should take advantage of the binarytodec static method in the XOR class. To call a static method located in a different class, you write <class name>.<method name>(<parameters>). The following code will help you determine if your generate method is working. It should output LFSR lfsr = new LFSR(" ", 2); for (int i = 0; i < 10; i++) { int r = lfsr.generate(5); System.out.println(lfsr + " " + r); }
6 PhotoMagic: This class only contains static methods. It will use your LFSR and XOR classes to encrypt or decrypt a Picture. Method Name transform main Input Type Picture, LFSR none Return Type Comments Picture Returns a new picture that is the result of transforming the input picture using the input LFSR. How to use the LFSR to transform the picture is described below. String[] Reads in three command line arguments (input image name, initial seed, and the tap number for the LFSR). Displays the resulting encrypted image. You should also consider saving this encrypted image to make sure that your code can successfully decrypt it. Here are a few additional details: Transforming the image. First of all, make sure to create a new Picture object. Do not modify (i.e. overweight) the original image. Second, iterate through each pixel in the original image. For each pixel, do the following: 1. Extract the red component of the original image. Generate an 8-bit number from your LFSR. XOR the red component with the number from the LFSR. This is the new red value in the encrypted image. 2. Extract the green component of the original image. Generate an 8-bit number from your LFSR. XOR the green component with the number from the LFSR. This is the new green value in the encrypted image. 3. Extract the blue component of the original image. Generate an 8-bit number from your LFSR. XOR the blue component with the number from the LFSR. This is the new blue value in the encrypted image. The final product. Note that the second and third arguments can effectively thought of as a way to password protect your image. java PhotoMagic pipe.png Input Should Display Save the output image as Xpipe.png. 6
7 java PhotoMagic Xpipe.png Input Should Display 7
ASSIGNMENT 5 TIPS AND TRICKS
ASSIGNMENT 5 TIPS AND TRICKS linear-feedback shift registers Java implementation a simple encryption scheme http://princeton.edu/~cos26 Last updated on /26/7 : PM Goals OOP: implement a data type; write
More informationCMPSCI 187 / Spring 2015 Hangman
CMPSCI 187 / Spring 2015 Hangman Due on February 12, 2015, 8:30 a.m. Marc Liberatore and John Ridgway Morrill I N375 Section 01 @ 10:00 Section 02 @ 08:30 1 CMPSCI 187 / Spring 2015 Hangman Contents Overview
More informationCOS 126 Midterm 2 Programming Exam Fall 2012
NAME:!! login id:!!! Precept: COS 126 Midterm 2 Programming Exam Fall 2012 is part of your exam is like a mini-programming assignment. You will create two programs, compile them, and run them on your laptop,
More informationCS 112 Introduction to Programming
CS 112 Introduction to Programming (Spring 2012) Lecture #20: LFSR Data Type Zhong Shao Department of Computer Science Yale University Office: 314 Watson http://flint.cs.yale.edu/cs112 Acknowledgements:
More informationEECE.2160: ECE Application Programming
Spring 2018 Programming Assignment #10: Instruction Decoding and File I/O Due Wednesday, 5/9/18, 11:59:59 PM (Extra credit ( 4 pts on final average), no late submissions or resubmissions) 1. Introduction
More informationLab 1: Silver Dollar Game 1 CSCI 2101B Fall 2018
Lab 1: Silver Dollar Game 1 CSCI 2101B Fall 2018 Due: Tuesday, September 18, 11:59 pm Collaboration Policy: Level 1 (review full policy for details) Group Policy: Individual This lab will give you experience
More informationPrograms as Models. Procedural Paradigm. Class Methods. CS256 Computer Science I Kevin Sahr, PhD. Lecture 11: Objects
CS256 Computer Science I Kevin Sahr, PhD Lecture 11: Objects 1 Programs as Models remember: we write programs to solve realworld problems programs act as models of the real-world problem to be solved one
More informationCMPSCI 187 / Spring 2015 Implementing Sets Using Linked Lists
CMPSCI 187 / Spring 2015 Implementing Sets Using Linked Lists Due on Tuesday February 24, 2015, 8:30 a.m. Marc Liberatore and John Ridgway Morrill I N375 Section 01 @ 10:00 Section 02 @ 08:30 1 CMPSCI
More informationIntroduction to Computing II (ITI 1121) Midterm Examination
Introduction to Computing II (ITI 1121) Midterm Examination Instructors: Sherif G. Aly, Nathalie Japkowicz, and Marcel Turcotte February 2015, duration: 2 hours Identification Last name: First name: Student
More informationMTAT Applied Cryptography
MTAT.07.017 Applied Cryptography Introduction, Randomness, One-Time Pad, Stream Ciphers University of Tartu Spring 2015 1 / 33 Who am I? Arnis Paršovs MSc in Cyber Security Tallinn University of Technology,
More informationLab5. Wooseok Kim
Lab5 Wooseok Kim wkim3@albany.edu www.cs.albany.edu/~wooseok/201 Question Answer Points 1 A or B 8 2 A 8 3 D 8 4 20 5 for class 10 for main 5 points for output 5 D or E 8 6 B 8 7 1 15 8 D 8 9 C 8 10 B
More informationCMPSCI 187 / Spring 2015 Hanoi
Due on Thursday, March 12, 2015, 8:30 a.m. Marc Liberatore and John Ridgway Morrill I N375 Section 01 @ 10:00 Section 02 @ 08:30 1 Contents Overview 3 Learning Goals.................................................
More informationBasic operators, Arithmetic, Relational, Bitwise, Logical, Assignment, Conditional operators. JAVA Standard Edition
Basic operators, Arithmetic, Relational, Bitwise, Logical, Assignment, Conditional operators JAVA Standard Edition Java - Basic Operators Java provides a rich set of operators to manipulate variables.
More informationRecommended Group Brainstorm (NO computers during this time)
Recommended Group Brainstorm (NO computers during this time) Good programmers think before they begin coding. Part I of this assignment involves brainstorming with a group of peers with no computers to
More informationMTAT Applied Cryptography
MTAT.07.017 Applied Cryptography Introduction, Randomness, One-Time Pad, Stream Ciphers University of Tartu Spring 2017 1 / 34 Who am I? Arnis Paršovs MSc in Cyber Security Tallinn University of Technology,
More informationZhifu Pei CSCI5448 Spring 2011 Prof. Kenneth M. Anderson
Zhifu Pei CSCI5448 Spring 2011 Prof. Kenneth M. Anderson Introduction History, Characteristics of Java language Java Language Basics Data types, Variables, Operators and Expressions Anatomy of a Java Program
More informationMTAT Applied Cryptography
MTAT.07.017 Applied Cryptography Introduction, Randomness, One-Time Pad, Stream Ciphers University of Tartu Spring 2014 1 / 31 Who am I Arnis Paršovs MSc in Cyber Security Tallinn University of Technology,
More informationConnecting Your Turnitin Enabled Dropbox Folder with the Turnitin App
Connecting Your Learn@UWSuperior Turnitin Enabled Dropbox Folder with the Turnitin App You will need to access the Turnitin website through the Dropbox Folder integration first and then share an access
More informationCSCI 355 Lab #2 Spring 2007
CSCI 355 Lab #2 Spring 2007 More Java Objectives: 1. To explore several Unix commands for displaying information about processes. 2. To explore some differences between Java and C++. 3. To write Java applications
More informationCS 2110 Fall Instructions. 1 Installing the code. Homework 4 Paint Program. 0.1 Grading, Partners, Academic Integrity, Help
CS 2110 Fall 2012 Homework 4 Paint Program Due: Wednesday, 12 November, 11:59PM In this assignment, you will write parts of a simple paint program. Some of the functionality you will implement is: 1. Freehand
More informationAssignment 1: Random Number Generator
COS 432 Tuesday, February 6 Information Security Assignment 1: Random Number Generator Assignment 1: Random Number Generator This project is due on Thursday, February 15 at 11:59 p.m.. Late submissions
More informationCSCI 355 LAB #2 Spring 2004
CSCI 355 LAB #2 Spring 2004 More Java Objectives: 1. To explore several Unix commands for displaying information about processes. 2. To explore some differences between Java and C++. 3. To write Java applications
More information1. Go to https://online.national.edu/ 2. Click the link at the bottom that says Please click here for a System Check before you log in.
Desire 2 Learn User Guide Desire 2 Learn User Guide Using the System Check Quick Link You can use the quick link on the entry page of the online classroom for a general test of your computer s preparedness
More informationCSCI 1301: Introduction to Computing and Programming Summer 2018 Lab 07 Classes and Methods
Introduction This lab introduces you to additional concepts of Object Oriented Programming (OOP), arguably the dominant programming paradigm in use today. In the paradigm, a program consists of component
More informationACADEMIC TECHNOLOGY SUPPORT
ACADEMIC TECHNOLOGY SUPPORT Dropbox Student Quick Start Guide ats@etsu.edu 439-8611 www.etsu.edu/ats Table of Contents: Accessing Dropbox... 1 Navigating the Dropbox... 1 Adding Files to the Dropbox...
More informationCS211 Prelim Oct 2001 NAME NETID
This prelim has 4 questions. Be sure to answer them all. Please write clearly, and show all your work. It is difficult to give partial credit if all we see is a wrong answer. Also, be sure to place suitable
More informationSecure Chat. Key point Without the pad, Eve cannot understand the message. Encrypt SENDMONEY with yt25a5y/s. Decrypt gx76w3v7k with yt25a5y/s
Secure Chat Alice wants to send a secret message to Bob? Sometime in the past, they exchange a one-time pad Alice uses the pad to encrypt the message Bob uses the same pad to decrypt the message Encrypt
More informationIntroduction to Computer Science I
Introduction to Computer Science I Classes Janyl Jumadinova 5-7 March, 2018 Classes Most of our previous programs all just had a main() method in one file. 2/13 Classes Most of our previous programs all
More informationCOMP combinational logic 1 Jan. 18, 2016
In lectures 1 and 2, we looked at representations of numbers. For the case of integers, we saw that we could perform addition of two numbers using a binary representation and using the same algorithm that
More informationLab Exercise 6: Abstract Classes and Interfaces CS 2334
Lab Exercise 6: Abstract Classes and Interfaces CS 2334 September 29, 2016 Introduction In this lab, you will experiment with using inheritance in Java through the use of abstract classes and interfaces.
More informationCMPSCI 187 / Spring 2015 Postfix Expression Evaluator
CMPSCI 187 / Spring 2015 Postfix Expression Evaluator Due on Thursday, 05 March, 8:30 a.m. Marc Liberatore and John Ridgway Morrill I N375 Section 01 @ 10:00 Section 02 @ 08:30 1 CMPSCI 187 / Spring 2015
More informationCS52 - Assignment 7. Due Friday 11/13 at 5:00pm. https://xkcd.com/538/
CS52 - Assignment 7 Due Friday 11/13 at 5:00pm https://xkcd.com/538/ For this assignment we will be writing code that allows us to encrypt and decrypt strings using RSA encryption. Put your solution in
More informationPilot Quick Start Guide for Students
Pilot Quick Start Guide for Students Table of Contents Opening a Course from the My Pilot Page... 1 Accessing Course Content Inline Viewer... 2 Downloading from Content... 3 Send Content to Binder... 4
More informationPart 1: Group Brainstorm (NO computers during this time) Part 2: Submit Individual Brainstorm (You can now use a computer)
Part 1: Group Brainstorm (NO computers during this time) Good programmers think before they begin coding. Part I of this assignment involves brainstorming with a group of peers with absolutely no computers
More informationCSCI 136 Programming Exam #2 Fundamentals of Computer Science II Spring 2012
CSCI 136 Programming Exam #2 Fundamentals of Computer Science II Spring 2012 This part of the exam is like a mini- programming assignment. You will create a program, compile it, and debug it as necessary.
More informationLecture 13 Bit Operations
Lecture 13 Bit Operations C is a powerful language as it provides the programmer with many operations for bit manipulation. Data can be accessed at the bit level to make operations more efficient. As you
More informationIntroduction to Programming Using Java (98-388)
Introduction to Programming Using Java (98-388) Understand Java fundamentals Describe the use of main in a Java application Signature of main, why it is static; how to consume an instance of your own class;
More informationSECTION II: LANGUAGE BASICS
Chapter 5 SECTION II: LANGUAGE BASICS Operators Chapter 04: Basic Fundamentals demonstrated declaring and initializing variables. This chapter depicts how to do something with them, using operators. Operators
More informationCSCI 1301: Introduction to Computing and Programming Spring 2019 Lab 10 Classes and Methods
Note: No Brainstorm this week. This lab gives fairly detailed instructions on how to complete the assignment. The purpose is to get more practice with OOP. Introduction This lab introduces you to additional
More information1. Introduction. COS 126* Princeton University Fall Overview. Kevin Wayne. Grades. The Usual Suspects
Overview 1. Introduction What is COS 126? Broad, but technical, intro to CS in the context of scientific, engineering, and commercial applications. No prerequisites, intended for novices. COS 126* Princeton
More informationIntroduction to Computing Systems Fall Lab # 3
EE 1301 UMN Introduction to Computing Systems Fall 2013 Lab # 3 Collaboration is encouraged. You may discuss the problems with other students, but you must write up your own solutions, including all your
More informationCOS 126 Written Exam 2 (Spring 2015)
COS 126 Written Exam 2 (Spring 2015) There are 8 questions on this exam, weighted as indicated below. This exam is closed book. You may use a single-page two-sided hand-written cheatsheet. There is a blank
More informationChapter 4 Defining Classes I
Chapter 4 Defining Classes I This chapter introduces the idea that students can create their own classes and therefore their own objects. Introduced is the idea of methods and instance variables as the
More informationAP Computer Science Homework Set 3 Class Methods
AP Computer Science Homework Set 3 Class Methods P3A. Let s upgrade the Song class. Let s make the following upgrades: a. Add a private instance variable yearreleased that stores the year the Song was
More information15-110: Principles of Computing, Spring 2018
5-: Principles of Computing, Spring 28 Problem Set 8 (PS8) Due: Friday, March 3 by 2:3PM via Gradescope Hand-in HANDIN INSTRUCTIONS Download a copy of this PDF file. You have two ways to fill in your answers:.
More informationStudent Website / Portal Guidelines
Student Website / Portal Guidelines Contents INTRODUCTION...3 CONNECTING TO THE BRADFIELD GROUP WEBSITE...3 STUDENTS HOMEPAGE...4 STUDENT ASSIGNMENTS...4 DOWNLOAD ASSIGNMENT BRIEF...5 REQUEST AN EXTENSION
More informationComputer Science II CSCI-142 Heading Home! Project 2
Computer Science II CSCI-142 Heading Home! Project 2 08/21/2018 The end of the semester is here... you are preparing to go home. You are going to turn in this project, the last homework, take the final,
More informationIntroduction to Computer Science Unit 2. Notes
Introduction to Computer Science Unit 2. Notes Name: Objectives: By the completion of this packet, students should be able to describe the difference between.java and.class files and the JVM. create and
More informationThe Java language has a wide variety of modifiers, including the following:
PART 5 5. Modifier Types The Java language has a wide variety of modifiers, including the following: Java Access Modifiers Non Access Modifiers 5.1 Access Control Modifiers Java provides a number of access
More informationAssignment 7. Computer Science 52. Due November 30, 2018, at 5:00 pm
Computer Science 52 Assignment 7 Due November 30, 2018, at 5:00 pm Reading This assignment is about RSA encryption. Refer to the course document RSA Encryption and the original RSA paper for details on
More informationLab5. Wooseok Kim
Lab5 Wooseok Kim wkim3@albany.edu www.cs.albany.edu/~wooseok/201 Question Answer Points 1 A 8 2 A 8 3 E 8 4 D 8 5 20 5 for class 10 for main 5 points for output 6 A 8 7 B 8 8 0 15 9 D 8 10 B 8 Question
More informationThis exam is open book. Each question is worth 3 points.
This exam is open book. Each question is worth 3 points. Page 1 / 15 Page 2 / 15 Page 3 / 12 Page 4 / 18 Page 5 / 15 Page 6 / 9 Page 7 / 12 Page 8 / 6 Total / 100 (maximum is 102) 1. Are you in CS101 or
More informationC++ (Non for C Programmer) (BT307) 40 Hours
C++ (Non for C Programmer) (BT307) 40 Hours Overview C++ is undoubtedly one of the most widely used programming language for implementing object-oriented systems. The C++ language is based on the popular
More informationHomework Set 2- Class Design
1 Homework Set 2- Class Design By the end of the lesson students should be able to: a. Write the Java code define a class, its data members, and its constructors. b. Write a tostring() method for a class.
More informationRead this before starting!
Points missed: Student's Name: Total score: /100 points East Tennessee State University Department of Computer and Information Sciences CSCI 2150 (Tarnoff) Computer Organization TEST 1 for Spring Semester,
More informationHow to Access If Rubrics does not appear on your course navbar, click Edit Course, Tools, Rubrics to activate..
KODIAK QUICK GUIDE Rubrics Overview Rubrics allow you to establish set criteria for grading assignments; you can attach Rubrics to Dropbox folders or Discussion topics so that the criteria are available
More informationCSC 1052 Algorithms & Data Structures II: Introduction
CSC 1052 Algorithms & Data Structures II: Introduction Professor Henry Carter Spring 2018 Programming This course... We will investigate a series of data structures and algorithms designed to solve common
More informationCMPSCI 187 / Spring 2015 Sorting Kata
Due on Thursday, April 30, 8:30 a.m Marc Liberatore and John Ridgway Morrill I N375 Section 01 @ 10:00 Section 02 @ 08:30 1 Contents Overview 3 Learning Goals.................................................
More informationUniversity of Cape Town ~ Department of Computer Science Computer Science 1015F ~ June Exam
Name: Please fill in your Student Number and Name. Student Number : Student Number: University of Cape Town ~ Department of Computer Science Computer Science 1015F ~ 2009 June Exam Question Max Internal
More informationCompSci 105 S2 C - ASSIGNMENT TWO -
CompSci 105 S2 C - ASSIGNMENT TWO - The work done on this assignment must be your own work. Think carefully about any problems you come across, and try to solve them yourself before you ask anyone else
More informationLAB A Translating Data to Binary
LAB A Translating Data to Binary Create a directory for this lab and perform in it the following groups of tasks: LabA1.java 1. Write the Java app LabA1 that takes an int via a command-line argument args[0]
More informationCT 229. Java Syntax 26/09/2006 CT229
CT 229 Java Syntax 26/09/2006 CT229 Lab Assignments Assignment Due Date: Oct 1 st Before submission make sure that the name of each.java file matches the name given in the assignment sheet!!!! Remember:
More informationASSIGNMENT 5 Objects, Files, and More Garage Management
ASSIGNMENT 5 Objects, Files, and More Garage Management COMP-202B, Winter 2010, All Sections Due: Wednesday, April 14, 2009 (23:55) You MUST do this assignment individually and, unless otherwise specified,
More informationCarleton University COMP1406/1006, Summer 2013 Tutorial 2
Carleton University COMP1406/1006, Summer 2013 Tutorial 2 Tuesday July 16 and Thursday July 18 When you have completed this tutorial, you should 1. Be comfortable with basic inheritance and overriding
More informationLecture 02, Fall 2018 Friday September 7
Anatomy of a class Oliver W. Layton CS231: Data Structures and Algorithms Lecture 02, Fall 2018 Friday September 7 Follow-up Python is also cross-platform. What s the advantage of Java? It s true: Python
More informationASSIGNMENT 5 Objects, Files, and a Music Player
ASSIGNMENT 5 Objects, Files, and a Music Player COMP-202A, Fall 2009, All Sections Due: Thursday, December 3, 2009 (23:55) You MUST do this assignment individually and, unless otherwise specified, you
More informationMore About Heaps. 14 June 2017 OSU CSE 1
More About Heaps 14 June 2017 OSU CSE 1 Complete Binary Tree As Array To use an Array to represent a complete binary tree, you need more information: An int index of the root of the tree of interest There
More informationPractical C++ Programming
SECOND EDITION Practical C++ Programming Steve Oualline O'REILLY' Beijing Cambridge Farnham Koln Paris Sebastopol Taipei Tokyo Preface xv Part I. The Basics 1. What Is C++? 3 A Brief History of C++ 3 C++
More informationif (x == 0); System.out.println( x=0 ); if (x = 0) System.out.println( x=0 );
Sample Final Exam 1. Evaluate each of the following expressions and show the result and data type of each: Expression Value Data Type 14 % 5 1 / 2 + 1 / 3 + 1 / 4 4.0 / 2.0 Math.pow(2.0, 3.0) (double)(2
More informationACORN.COM CS 1110 SPRING 2012: ASSIGNMENT A1
ACORN.COM CS 1110 SPRING 2012: ASSIGNMENT A1 Due to CMS by Tuesday, February 14. Social networking has caused a return of the dot-com madness. You want in on the easy money, so you have decided to make
More informationMidterm 1 Study Guide
Midterm 1 Study Guide Else-if, loops (while, for, and for-each), arrays, interfaces, and ADTs (List, Set, and Map). While loops and else-if Use the LateNightAtRams class below and the Student class at
More informationClass API. Class API. Constructors. CS200: Computer Science I. Module 19 More Objects
CS200: Computer Science I Module 19 More Objects Kevin Sahr, PhD Department of Computer Science Southern Oregon University 1 Class API a class API can contain three different types of methods: 1. constructors
More informationBlum-Blum-Shub cryptosystem and generator. Blum-Blum-Shub cryptosystem and generator
BBS encryption scheme A prime p is called a Blum prime if p mod 4 = 3. ALGORITHM Alice, the recipient, makes her BBS key as follows: BBS encryption scheme A prime p is called a Blum prime if p mod 4 =
More informationC++ Tips Article 4. Aether Lee Hachioji, Japan
C++ Tips Article 4 Aether Lee Hachioji, Japan Abstract In the previous article, we used vector and its iterators along with algorithms to introduce powerful features of C++. This time we will use another
More information9/17/2018 Programming Data Structures. Encapsulation and Inheritance
9/17/2018 Programming Data Structures Encapsulation and Inheritance 1 Encapsulation private instance variables Exercise: 1. Create a new project in your IDE 2. Download: Employee.java, HourlyEmployee.java
More informationCS 231 Data Structures and Algorithms Fall 2018
CS 231 Data Structures and Algorithms Fall 2018 Interface, Node Based Stack, Exception Handling, Class BufferedReader Lecture 12 October 1, 2018 Prof. Zadia Codabux 1 Agenda Node based implementation of
More informationJava Style Guide. 1.0 General. 2.0 Visual Layout. Dr Caffeine
September 25, 2002 Java Style Guide Dr Caffeine This document defines the style convention the students must follow in submitting their programs. This document is a modified version of the document originally
More informationCPSC 217 Assignment 3
CPSC 217 Assignment 3 Due: Monday November 26, 2018 at 12:00 noon Weight: 7% Sample Solution Length: Approximately 120 lines, including blank lines, lots of comments and the provided code Individual Work:
More informationWA1278 Introduction to Java Using Eclipse
Lincoln Land Community College Capital City Training Center 130 West Mason Springfield, IL 62702 217-782-7436 www.llcc.edu/cctc WA1278 Introduction to Java Using Eclipse This course introduces the Java
More informationWYSE Academic Challenge Computer Science Test (State) 2012 Solution Set
WYSE Academic Challenge Computer Science Test (State) 2012 Solution Set 1. Correct Answer: B. The aspect ratio is the fractional relation of the width of the display area compared to its height. 2. Correct
More informationLinked Lists. College of Computing & Information Technology King Abdulaziz University. CPCS-204 Data Structures I
College of Computing & Information Technology King Abdulaziz University CPCS-204 Data Structures I What are they? Abstraction of a list: i.e. a sequence of nodes in which each node is linked to the node
More informationOperators. Java operators are classified into three categories:
Operators Operators are symbols that perform arithmetic and logical operations on operands and provide a meaningful result. Operands are data values (variables or constants) which are involved in operations.
More informationUser Interface Programming OOP/Java Primer. Step 3 - documentation
User Interface Programming OOP/Java Primer Step 3 - documentation Department of Information Technology Uppsala University What is the documentation? Documentation about program in the program Clearly written
More informationProblem 1.R1: How Many Bits?
CSC 495 Problem Set 1 Due Tuesday, January 17 Problem 1.R1: How Many Bits? Required Problem Points: 50 points Background When a number is stored in a primitive type, like an int or long variable, it always
More informationCMSC131. Library Classes
CMSC131 Designing Classes Library Classes Due to Java being 100% object-oriented, all code must live inside a class but there is some functionality/information that might be best kept in a more central
More informationProgramming Assignments
ELEC 486/586, Summer 2017 1 Programming Assignments 1 General Information 1.1 Software Requirements Detailed specifications are typically provided for the software to be developed for each assignment problem.
More informationIntroduction to Computer Science Unit 2. Notes
Introduction to Computer Science Unit 2. Notes Name: Objectives: By the completion of this packet, students should be able to describe the difference between.java and.class files and the JVM. create and
More informationCS503 Advanced Programming I CS305 Computer Algorithms I
Syllabus: CS503 Advanced Programming I CS305 Computer Algorithms I Course Number: CS503-50/CS305-50 Course Title: Advanced Programming I/Computer Algorithms I Instructor: Richard Scherl Office: Howard
More informationAPCS Semester #1 Final Exam Practice Problems
Name: Date: Per: AP Computer Science, Mr. Ferraro APCS Semester #1 Final Exam Practice Problems The problems here are to get you thinking about topics we ve visited thus far in preparation for the semester
More information6.1 Skip List, Binary Search Tree
Homework #6 RELEASE DATE: 05/26/2015 DUE DATE: 06/09/2015, 16:20 in CSIE R102/R104 and on github As directed below, you need to submit your code to the designated place on the course website. Any form
More informationProject 1 Computer Science 2334 Spring 2016 This project is individual work. Each student must complete this assignment independently.
Project 1 Computer Science 2334 Spring 2016 This project is individual work. Each student must complete this assignment independently. User Request: Create a simple movie data system. Milestones: 1. Use
More informationC a; C b; C e; int c;
CS1130 section 3, Spring 2012: About the Test 1 Purpose of test The purpose of this test is to check your knowledge of OO as implemented in Java. There is nothing innovative, no deep problem solving, no
More informationCOMPUTER SCIENCE DEPARTMENT PICNIC. Operations. Push the power button and hold. Once the light begins blinking, enter the room code
COMPUTER SCIENCE DEPARTMENT PICNIC Welcome to the 2016-2017 Academic year! Meet your faculty, department staff, and fellow students in a social setting. Food and drink will be provided. When: Saturday,
More informationCS 134 Programming Exercise 9:
CS 134 Programming Exercise 9: Nibbles Objective: To gain experience working with 2 dimensional arrays. The Problem Nibbles is a snake. Nibbles moves around a field, looking for food. Unfortunately, Nibbles
More information102. Introduction to Java Programming
102. Introduction to Java Programming Version 5.0 Java is a popular and powerful language. Although comparatively simple in its language structure, there are a number of subtleties that can trip up less
More informationWinter 2011 Josh Benaloh Brian LaMacchia
Winter 2011 Josh Benaloh Brian LaMacchia Symmetric Cryptography January 20, 2011 Practical Aspects of Modern Cryptography 2 Agenda Symmetric key ciphers Stream ciphers Block ciphers Cryptographic hash
More informationCS 142 Style Guide Grading and Details
CS 142 Style Guide Grading and Details In the English language, there are many different ways to convey a message or idea: some ways are acceptable, whereas others are not. Similarly, there are acceptable
More information15-110: Principles of Computing, Spring 2018
15-110: Principles of Computing, Spring 2018 Problem Set 5 (PS5) Due: Friday, February 23 by 2:30PM via Gradescope Hand-in HANDIN INSTRUCTIONS Download a copy of this PDF file. You have two ways to fill
More informationCS 314 Exam 2 Spring 2018
Points off 1 2 3 4 5 Total off CS 314 Exam 2 Spring 2018 Your Name Your UTEID Circle your TA's Name: Aish Anthony Chris Dayanny Hailey Ivan Jacob Joseph Lucas Shelby Instructions: 1. There are 5 questions
More informationLe L c e t c ur u e e 2 To T p o i p c i s c t o o b e b e co c v o e v r e ed e Variables Operators
Course Name: Advanced Java Lecture 2 Topics to be covered Variables Operators Variables -Introduction A variables can be considered as a name given to the location in memory where values are stored. One
More information