Object oriented programming and cryptography, C/C++ Programming

Assignment Help:

This assignment document will be distributed from Blackboard assignment folder. Some parts of the assignments will require you to research answers from your text book (you must read the text book to get some answers), from the Internet, or any other reasonable source.

After reviewing Internet sources that may be used help you prepare answers, I have found that any single Internet source is very incomplete and the format is not conducive for most answers required.  You may cut-and-paste answers whenever appropriate, you should take care to synthesize your answers to include multiple sources. I would be impressed that you consult a Google image search and paste and appropriate image to supplement your answer.

Since the quiz and test questions are based on your researched answers, I would recommend that you refer to any quiz questions on the assignment topics to ensure that your assignment answer is complete. Quiz answers will NOT be provided to you unless 75% of your answers from practice attempts are correct.

Please place your name in the beginning of this document and "Save As" this document using a new name that includes your name and the assignment number.

When completed, submit the FINAL version of this document to Blackboard under the Assignment folder for this individual assignment. This document will only be accepted by Blackboard, not by email or other form of submission.

1.1 Gary Booch defined an object is an entity that has identity, state(s) and behavior(s). Please describe these concepts as they relate to object-oriented  programming languages, such as C#, VB.NET and Java.

Objects Characteristics

Description and Application to OOPs

Identity

 

State

State describes the physical characteristic an object from the size, color, ect.

Behavior

The behavior describes the character traits of an object from what it does, to how and when it will do something,

1.2 In OOPs the programmer codes classes, not objects. An object is created when the program code is translated and executed. What is the difference between a class and an object?

1.3 How are objects created during program execution? (Be Specific!) .

1.4 What is a method? .

1.5 What is meant by the concept of invoking a method? .

1.6 What is a message? .

1.7 Describe the type of actions provided by the following methods.

Method Type

Action Performed

Accesor

 

Mutator

 

Constructor

 

Destructor

 

1.8 Why use a constructor method instead of the default constructor?

1.9 Provide an application code syntax example for each of the four OO programming languages listed below that will create a class.

OOP Syntax Used to Create a Class

C++

VB.NET

C#

Java

 

 

 

 

1.10 Provide an application code syntax example for each of the four OO programming languages listed below that will define a class variable.

OOP Syntax Used to Create a Class Variable or Property

C++

VB.NET

C#

Java

 

 

 

 

1.11 Provide an application code syntax example for each of the four OO programming languages listed below that will define a class method.

OOP Syntax Used to Create a Class Method

C++

VB.NET

C#

Java

 

 

 

 

1.12 What is a software component?

1.13 A class is a type of software component?

1.14 Provide other examples of components other than class

1.15 What is meant by a class member?

1.16 Give some examples of class members.

1.17 What is the difference between an instance member and a class member?

1.18 Variables and Fields store data concerning an object. Properties also store data concerning an Object. Java does not use the term properties in the same way VB.NET. They use the term accessor and mutator methods. What are the differences between and a class or method variable/field versus a class/method property. Though the terminologies may different, both concepts have the same effect.

1.19  What are the security and integrity implications of using Accesor/Get functions and Mutator/Set functions?


Related Discussions:- Object oriented programming and cryptography

What are the debugging methods you employ while came across , What are the ...

What are the debugging methods you employ while came across a problem? A: Debugging with tools such as: 1.      DBG, GDB ,Forte, Visual Studio. 2.      Using tusc to trace

Smuggler, Smugglers are becoming very smart day by day. Now they have devel...

Smugglers are becoming very smart day by day. Now they have developed a new technique of sending their messages from one smuggler to another. In their new technology, they are send

What is mime, What is MIME? MIME - Multi-purpose Internet Mail Extens...

What is MIME? MIME - Multi-purpose Internet Mail Extensions. MIME types signifies a standard way of classifying file types over Internet. Browsers and Web servers have

Playback pattern sequences, This task involves creating a new class(es) tha...

This task involves creating a new class(es) that will allow the system to playback pattern sequences using the Neo  Freerunner  hardware. The first thing to note is that the vibrat

Program to display the greatest common divisor , Many modern cryptography a...

Many modern cryptography algorithms require two numbers that are coprime, or sometimes referred to as relatively prime. Two numbers are coprime if their greatest common divisor is

Can one create operator** for "to-the-power-of" operations?, A: no, can't. ...

A: no, can't. The names of, precedence of, associativity of, and arity of operators is fixed through the language. In C++, there is no operator** so you cannot create one for a

Program for single int parameter, Write a function that has a single int pa...

Write a function that has a single int parameter n and returns an int: 0 if n is negative, otherwise 1. You are not allowed to simply check the integer value, and should use the fu

Explain the returning references from functions, Returning References from ...

Returning References from Functions Just as in passing the parameters by reference, returning a reference also doesn't return back a copy of the variable , instead an alias is

Is probable to encompass virtual constructor? if yes, Is it probable to enc...

Is it probable to encompass Virtual Constructor? If yes, how? If not, Why?

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd