Question: CASE STUDY: OurSecurity Sdn. Bhd. has appointed you as their new system security developer. Your first task is to code a new Java program that

 CASE STUDY: OurSecurity Sdn. Bhd. has appointed you as their newsystem security developer. Your first task is to code a new Javaprogram that implements your teammates new encryption procedures/steps. The encryption steps areas follows: Step 1 : The program will ask the user to

CASE STUDY: OurSecurity Sdn. Bhd. has appointed you as their new system security developer. Your first task is to code a new Java program that implements your teammates new encryption procedures/steps. The encryption steps are as follows: Step 1 : The program will ask the user to enter a text via console. Convert all the characters to lower case. Meet me at 10AM meet me at 10am Step 2: 2 Swap all the vowels in the text using the following rules: a. Swap 'd' with ' b. Swap 'e' with a C. Swap 'with 'e d. Swap 'o' with 7 c. Swap 'u' with a meet me at 10am maat maut 10um Step 3: Inverse the swapped text without inverting the words. maar ma ut 10um 1 Oum ma maar Step 4 : Replace all alphabets and numbers in the inversed text with Morse Code alphabet using the following setting: A.- B - D. E. F... 1.. H.... R. P. S.. T- K- U.. M- W. N. X. V. 0 Y 5. Z-.. 2.. 8. 9- 0 Note : in Morse Code, each alphabet is separated by one (1) white space and each word is separated by two (2) white spaces. Step 4: The program will display the final encrypted message. (Note: * represent empty space) QUESTION 2: In one (1) Java file, write a program implementing all the five (5) classes and their methods mentioned in Question 1. The body of each method is based on the encryption steps given in the case study. The implementation must include suitable control and data structure. But you are not restricted to the one discussed in class. The program must also have proper documentation/comments explaining key point of your program. This will assist with the code readability and tracing. The program will be graded based on correctness, program logic, implementation of control and data structure and documentations. (80 marks) Example of expected output: : Meet me at 10AM Please enter a text Encrypted text Do you want to try again? Press y or n : y Please enter a text : 123456 Encrypted text Do you want to try again? Press y or n:n Thank you

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!