You are on page 1of 5

Year Level: 9

Subject: Digital Technologies

Term 2 2021 Unit: Application Programming

Technique: Project – Written & Product Assessment Item Number: A2

Student Form Class:


Name:

Teacher Mr Andress Result:


Name:

First Copy Week 6 Final Copy Date: Week 8


Date:

Genre: Comparative

Purpose: Design, implement and evaluate an encryption application

Audience: Client

Conditions: In class/at-home 4 weeks

Length: Product plus 500 words

Task:
You work as a programmer for Centenary Software. You have been assigned to a project and have to manage
all stages of the software development cycle.

Your client is an undisclosed military branch. They require a new way to transmit secret messages between
bases. You need to design an encryption algorithm. You then need to implement a simple program which can
encode plaintext to ciphertext and can decode ciphertext back to plaintext.

Your client has further requested that the application be made using JavaScript. Your boss has specified that
you must properly comment your code in case someone else needs to modify it.

Your final submission will include word processed documentation, addressing all aspects of the software
development cycle as outlined below. It will also include your application in .html format.

STAGE ONE – DEFINE THE PROBLEM

 Problem Description – 1 or 2 sentences outlining the task at hand.

 Rationale – 1 paragraph describing why this problem needs to be solved in the first place.
 Target Audience – Who will be using the finished application?

STAGE TWO – PLAN THE SOLUTION

 List the Functional Requirements of your program – that is, the things the program must be able to
do to be considered a success.

 List the Functional Constraints of your program (including types) – that is, the things that impact on
the designer and impact the way in which they achieve the functional requirements.

 Describe, in a paragraph, how your encryption algorithm works. Be sure to refer to any existing
encryption algorithms you may have modelled your algorithm on (eq Caesar, Transposition etc.)

 Create a flowchart which steps through your encryption algorithm. Be sure it has a start and end and
does not contain any infinite loops.

STAGE THREE – IMPLEMENT THE SOLUTION

 Create your solution in JavaScript. You may use HTML tags to improve how your application looks, but
it is important to remember you are being marked on functionality, not visuals.

 Ensure your code is adequately commented. As a minimum, comments should accompany variable
declarations, functions and complex if statements.

STAGE FOUR – LOOK BACK

 Answer each of the below questions in 1 – 3 sentences each:

o Does your solution work?

o Does it solve the original problem?

o How could it be improved?

o What could you do differently next time?

 Evaluate your algorithm (essay format, approximately 350 words)

o Briefly describe how an existing encryption algorithm works (such as Caesar, Vigenere,
Enigma or Public Key etc.). Compare and contrast your algorithm to the chosen existing
algorithm. Some points to consider: how easy is it to break? Does a frequency analysis reveal
any of the characters? What would happen if a particular phrase or word is used in every
transmission?

 Include a list of resources accessed in answering the above question


Standards matrix
A B C D E

The folio of student work has the following characteristics:

discerning selection and informed selection and selection and validation partial selection and fragmented selection and
validation of data, taking validation of data, taking of data, taking account of validation of data, taking validation of data, taking
Knowledge and
Understanding

understanding

managing and
account of privacy and account of privacy and account of aspects of
Collecting,

privacy and security account of aspects of


dimension

security requirements security requirements requirements privacy and security privacy and security
requirements requirements

discerning definition and informed definition and definition and partial definition and fragmented definition and
decomposition of decomposition of decomposition of decomposition of decomposition of
Defining

complex problems in complex problems in complex problems in complex problems in problems


terms of functional and terms of functional and terms of functional and terms of functional and
non-functional non-functional non-functional non-functional
requirements requirements requirements requirements
discerning design and informed design and design and evaluation of partial design and fragmented design and
evaluation of user evaluation of user user experiences and explanation of user statements about user
Processes and production skills

experiences and experiences and algorithms experiences and experiences and


algorithms algorithms algorithms algorithms
discerning design and informed design and design and partial design and fragmented design and
Skills dimension

Designing and implementing

proficient implementation effective implementation implementation of implementation of implementation of


of modular programs, of modular programs, modular programs, modular programs using modular programs
including an object- including an object- including an object- algorithms and data
oriented program, using oriented program, using oriented program, using structures
algorithms and data algorithms and data algorithms and data
structures involving structures involving structures involving
modular functions that modular functions that modular functions that
reflect the relationships reflect the relationships reflect the relationships
of real-world data and of real-world data and of real-world data and
data entities data entities data entities
comprehensive testing reliable testing and testing and prediction of partial testing and fragmented testing and
and prediction of results prediction of results and results and prediction of results and prediction of results
and proficient effective implementation implementation of digital partial implementation of or fragmented
implementation of digital of digital solutions solutions digital solutions implementation of digital
solutions solutions
A B C D E

The folio of student work has the following characteristics:

discerning planning and informed planning and planning and partial planning and fragmented planning and

and managing
Collaborating
Evidence of
management of digital management of digital management of digital management of digital management of digital
projects using an projects using an projects using an projects using an projects
iterative approach iterative approach iterative approach iterative approach

Feedback:

You might also like