Question: CASE STUDY: : OurSecurity Sdn. Bhd. has appointed you as their new system security developer. Your first task is to code a new Java program

 CASE STUDY: : OurSecurity Sdn. Bhd. has appointed you as their

CASE STUDY: : OurSecurity Sdn. Bhd. has appointed you as their new system security developer. Your first task is to code a new Java program that implements your teammates' new encryption procedures/steps. The encryption steps are as follows: Step 1 The program will ask the user to enter a text via console. Convert all the characters to lower case. Meet me at 10AM meet me at 10am Step 2: Swap all the vowels in the text using the following rules: a. Swap 'd' with ' b. Swape with a c. Swap 't with d. Swap 'o' with c. Swap '/' with o meet me at 10am maat maut 10um Step 3 Inverse the swapped text without inverting the words. maat maut 10um 10um ma maat Step 4 : Replace all alphabets and numbers in the inversed text with Morse Code alphabet using the following setting: 1.. F... P. Z-.. H.... QR R.. J. T- A.- B... C. D-.. E. K-.- L... M- N- O-- U.. V... W. X-.. Y-.- 1 1. 2. 3...- 4 ....- 6-.... 7-... 8 - 9,0 ---- .. S... 2.. 5. Note: in Morse Code, each alphabet is separated by one (1) white space and each word is separated by two (2) white spaces. Step 4 The program will display the final encrypted message. (Note: represent empty space) 2 QUESTION 1: 1 Table 1 : Class and methods Class Name Purpose of the Method Method In Class getInput) Input Swap getSwapo Inverse getInverse MorseCode convert Morse Code) 1. Ask the user to enter a text a Return the original text 1. Receive the original text from the caller. 2. Swap all the vowels based on the setting given in the case study Return the processed text 1. Receive the swapped text from the caller 2. Inverse the swapped text using the rule given in the case study 3. Return the inversed text 1. Receive the inversed text from the caller 2. Convert all alphabet and numeric to Morse Code alphabets 3. Return the final Morse Code text 1. The main class and method in the program 2. Call methods of other classes following the steps given in the case study 3. Display the final Morse Code text to console 4. Ask the user if they wish to try again or not. 5. If the user chooses to try again, restart from the first step. If not, the program will display "Thank you" and ends. Encrypt main() Using the information given in Table 1, draw a complete class diagram to represent the communication between the classes. Each method must include the possible parameter and return data type. (20 marks)

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!