Question Details

[solution]: Please see attached


Answer download
More Details:

Hello,

See attached questionnaire for your attention.

Cheers


ITK 275 ? Java as a 2nd Language

 

Chapter 6 Programming Assignment

 

All of the java classes should be placed in a package named edu.assignment6

 

The classes should be submitted as an attachment to this assignment. They may be

 

submitted individually or placed into a single archive (.zip) file.

 


 

Part I:

 

Traditional password entry schemes are susceptible to ?shoulder surfing? in which an

 

attacker watches an unsuspecting user enter their password or PIN number and uses it

 

later to gain access to the account. One way to combat this problem is with a randomized

 

challenge-response system. In these systems, the user enters different information every

 

time based on a secret in response to a randomly generated challenge. Consider the

 

following scheme in which the password consists of a five-digit PIN number (00000 to

 

99999). Each digit is assigned a random number that is 1, 2, or 3. The user enters the

 

random numbers that correspond to their PIN instead of their actual PIN numbers.

 

For example, consider an actual PIN number of 12345. To authenticate it, the user would

 

be presented with a screen such as the following:

 

PIN: 0 1 2 3 4 5 6 7 8 9

 

NUM: 3 2 3 1 1 3 2 2 1 3

 

The user would enter 23113 instead of 12345. This does not divulge the password even if

 

an attacker intercepts the entry because 23113 could correspond to other PIN numbers,

 

such as 69440 or 70439. The next time the user logs in; a different sequence of random

 

numbers would be generated, such as the following:

 

PIN: 0 1 2 3 4 5 6 7 8 9

 

NUM: 1 1 2 3 1 2 2 3 3 3

 

Your application should simulate the authentication process. Store an actual PIN number

 

in your application. The application should use an array to assign random numbers to the

 

digits from 0 to 9. Output the random digits to the screen, input the response from the

 

user, and output whether or not the user?s response correctly matches the PIN number.

 


 

Part II:

 

Write a Temperature class that represents temperatures in degrees in both Celsius and

 

Fahrenheit. Use a floating-point number for the temperature and a character for the scale:

 

use ?C? for Celsius and ?F? for Fahrenheit. The class should have:

 

Four constructors: one for the number of degrees, one for the scale, one for both

 

the degrees and the scale and a default constructor. For each of these

 

constructors, assume zero degrees if no value is specified and Celsius if no scale

 

is given.

 


 

ITK 275 ? Java as a 2nd Language

 

Chapter 6 Programming Assignment

 


 


 


 


 

Two accessor methods: one to return the temperature in degrees Celsius, the other

 

to return it in degrees Fahrenheit. Use the formulas found at the bottom to

 

convert between Celius and Fahrenheit and round to the nearest tenth of a degree.

 

Three set methods: one to set the number of degrees, one to set the scale, and one

 

to set both.

 

Three comparison methods: one to test whether two temperatures are equal, one

 

to test whether one temperature is greater than another, and one to test whether

 

one temperature is less than another.

 


 

Write a driver program that tests all the methods. Be sure to invoke each of the

 

constructors, to include at least one ture and one false case for each comparison method,

 

and to test at lest the following three temperature pairs for equality: 0.0 degrees C and

 

32.0 degrees F, -40.0 degrees C and -40.0 degrees F, and 100.0 degrees C and 212.0

 

degrees F.

 

Degrees Celsius = 5 (degrees in Fahrenheit ? 32) / 9

 

Degrees Fahrenheit = (9 ( degrees in Celsius / 5) + 32)

 


 

 


Solution details:
STATUS
Answered
QUALITY
Approved
ANSWER RATING

This question was answered on: Dec 18, 2020

PRICE: $18.50

Solution~00031148033716.zip (25.37 KB)

Buy this answer for only: $18.50

This attachment is locked

We have a ready expert answer for this paper which you can use for in-depth understanding, research editing or paraphrasing. You can buy it or order for a fresh, original and plagiarism-free copy (Deadline assured. Flexible pricing. TurnItIn Report provided)

Pay using PayPal (No PayPal account Required) or your credit card . All your purchases are securely protected by .
SiteLock

About this Question

STATUS

Answered

QUALITY

Approved

DATE ANSWERED

Dec 18, 2020

EXPERT

Tutor

ANSWER RATING

GET INSTANT HELP/h4>

We have top-notch tutors who can do your essay/homework for you at a reasonable cost and then you can simply use that essay as a template to build your own arguments.

You can also use these solutions:

  • As a reference for in-depth understanding of the subject.
  • As a source of ideas / reasoning for your own research (if properly referenced)
  • For editing and paraphrasing (check your institution's definition of plagiarism and recommended paraphrase).
This we believe is a better way of understanding a problem and makes use of the efficiency of time of the student.

NEW ASSIGNMENT HELP?

Order New Solution. Quick Turnaround

Click on the button below in order to Order for a New, Original and High-Quality Essay Solutions. New orders are original solutions and precise to your writing instruction requirements. Place a New Order using the button below.

WE GUARANTEE, THAT YOUR PAPER WILL BE WRITTEN FROM SCRATCH AND WITHIN YOUR SET DEADLINE.

Order Now