Professional Documents
Culture Documents
TCS3064 OOP - Main Exam January 2022
TCS3064 OOP - Main Exam January 2022
INSTRUCTIONS TO CANDIDATES:
1. This is a timed online examination via Blackboard. Please adhere to all standard
examination rules and regulations.
3. This is an Open Book Examination. You are allowed to refer to any forms of references,
including online or offline materials. However, any form of discussion with peers,
classmates or external parties is prohibited until after the Blackboard submission time.
4. You have THREE (3) hours to answer the questions AND THIRTY (30) MINUTES to
upload your answers to the Blackboard.
5. LATE submission will be awarded FAIL for the module, and NO appeal will be
granted for the following reasons:
a. Lack of knowledge on using Blackboard in submission.
b. Poor internet connection / no internet connection.
c. No computer for submission.
Read carefully the case study and the instructions that follows.
CASE STUDY :
OurSecurity Sdn. Bhd. has appointed you as their new system security developer. Your first
task is to code a new Java program that implements your teammates' new encryption
procedures/steps.
Step 1 : The program will ask the user to enter a text via console. Convert all the
characters to lower case.
Step 2 : Swap all the vowels in the text using the following rules:
Step 4 : Replace all alphabets and numbers in the inversed text with Morse Code
alphabet using the following setting:
Note : in Morse Code, each alphabet is separated by one (1) white space and
each word is separated by two (2) white spaces.
.----*-----*..-*--**..-*-**--*.-**--*.-*.-*-
(Note : * represent empty space)
2
QUESTION 1 :
Using the information given in Table 1, draw a complete class diagram to represent the
communication between the classes. Each method must include the possible parameter and
return data type. (20 marks)
QUESTION 2 :
In one (1) Java file, write a program implementing all the five (5) classes and their methods
mentioned in Question 1. The body of each method is based on the encryption steps given in
the case study.
The implementation must include suitable control and data structure. But you are not restricted
to the one discussed in class. The program must also have proper documentation/comments
explaining key point of your program. This will assist with the code readability and tracing.
The program will be graded based on correctness, program logic, implementation of control
and data structure and documentations. (80 marks)
3
Example of expected output :
Thank you.
-END OF QUESTION –