Our Services

Get 15% Discount on your First Order

[rank_math_breadcrumb]

c++ social media platform

attached

CE221 – C++ Programming Assignment 2 – 24/25
Dr Michael Barros ([email protected])

Deadline: 13:59:59, Monday 13th January 2025

Notice

You should refer to sections 5 and 7 of the Undergraduate Students’ Handbook for details of the University policy
regarding late submission and plagiarism; the work handed in must be entirely your own. Your programs will be
checked by an intelligent plagiarism detection system that looks for similarities between the submitted programs.
(Since some of the code has been supplied on Moodle, there will inevitably be similarities, so I will examine any
submissions flagged by the checker to determine whether the similarities that have been detected are reasonable.)

This assignment comprises a single exercise. The files for use in this assignment are available in Moodle as a zip file.
Submission of this assignment will be via FASER.

Introduction

In this assignment, you will develop a basic social media content management platform (e.g. think of it as X (twitter) or
Reddit). The platform simulates a discussion of people and their posts with two types of distinct users:

1. Users: Individuals who read and write posts.

2. Managers: Individuals responsible for moderating the platform by setting and updating the content restrictions
(i.e., blocked words or phrases). They also moderate who can become a manager.

Your program will needs to display statistics about users reputation and help identify the top 10 most problematic
users based on their reputation scores.

Key Objectives

1. Provide a system where Users can read and write posts.

2. Provide a system where Managers can set and manage blocked content.

3. Display the top 10 most problematic users who have accumulated the lowest reputation scores (or are tied at zero
and have multiple moderated posts).

4. Allow Users to view their statistics (accumulated or average scores).

5. Implement a moderation engine that censors blocked content within posts.

User and Manager Options

User Options

1. Read/Write Post:

• Read a post : Randomly select a post from the platform’s database and present it to the user. After reading,
the user can choose to read another post, report the post (which lowers the post’s author’s reputation), or exit.

• Write a post : Prompt the user to write a post (up to 140 characters) and append it to the platform’s post file.

2. View Your Statistics: Show the user’s accumulated reputation score and average reputation per post. These
scores should be updated frequently and should use STL algorithms (of your choice).

3. Display Top 10 Most Problematic Users: Sort the users by their reputation score (lowest first using a class
operator overload). If there’s a tie at zero, break it by the number of moderated posts they have triggered. Display
the bottom 10. Use STL sorting and iterators.

4. Exit the Program

1

Manager Options

1. Reset Moderation Content: Clear all previously added banned words or phrases.

2. Add Blocked Content: Add new words or phrases that should be censored.

3. Add Another Manager: Only an existing manager can add a new manager by specifying their name and regis-
tration number.

4. Set the Sample File: Set or change the name of the text file that contains the platform posts.

5. Exit the Program

Content Moderation Engine

The engine must censor posts that contain blocked words or phrases. Every censored word or phrase should be replaced
by a series of ‘X’s of the same length, and every post that has been censored should include the #moderatedpost tag at
the end.

• Consider a “word” as a sequence of non-whitespace characters containing more than one letter.

• Remove punctuation at the start or end of words, but leave punctuation and digits that appear in the middle of
words.

• Convert all input to lowercase before checking for blocked content.

Examples:

• If “hate” is blocked: Original: “They truly hate her ideas.” Moderated: “They truly XXXX her ideas. #moderat-
edpost”

• If “cried all night” is blocked (a phrase): Original: “He cried all night after the announcement.” Moderated: “He
XXXXX XXX XXXXX after the announcement. #moderatedpost”

Classes and Files

You will be provided with files in the Assignment2files folder, including:

• Person.h and Person.cpp: A complete Person class (you may add extra members but do not alter existing ones
except where noted).

• User.h and Manager.h: Declarations for derived classes of Person. You must implement these in User.cpp and
Manager.cpp, respectively, following the specifications in the comments.

You may add extra member functions to these classes, but only define them in the .cpp files.

Additional Class: ReadPosts

You will have a ReadPosts class that:

• Reads a large text file of platform posts.

• Each record in the file may look like: userID postID post content date/time

• You will be given a partial implementation and a header file. Use these as provided.

• Implement a findPost function to select a random post from a multimap or similar container.

• If any file cannot be opened, terminate gracefully with an error message.

2

Main Program Requirements

1. Prompt for a username (or manager name) and determine their role.

2. If a User does not exist yet, create a new one and inform them using a try-catch statement.

3. If a Manager line is found, load their details. Only an existing Manager can add another.

4. Use a template function login to read from a user/manager file. For Users: Read registration, name, and scores,
and create User objects. For Managers: Read registration number and name, then create a Manager object.

5. After login, provide the respective menu options as described earlier.

6. You MUST use STL algorithms (for each, sort, etc.) and iterators, where pointed, but do not stop there.

7. Handle file I/O errors gracefully.

Challenge

Make the ReadPosts class behave like a custom iterable container (similar to a linked list). Use this custom iterator in
the top 10 calculation and in displaying the top 10 most problematic users.

Deliverables

Submit a single zip file containing a single folder. Acceptable formats: .zip, .7z, or a gzipped tar file. Other formats
lose 10%.

Include:

• All source files (.cpp, .h)

• A MAKE file for compilation

• Any required files for the program to run

Marking Scheme

Marking Criteria Marks
Style/Efficiency/Commenting 25
Implementation of all classes (User and Manager) 5
Main: User and manager options 20
Top 10 most problematic users 5
ReadPosts Class 15
Find post with find function 5
Requested usage of STL functions 10
MAKE file for compilation 5
Challenge 10
Total 100

Notes

Avoid unnecessary copying or repetitive code. Comments should clearly describe what each function does and what each
non-local variable represents. Within function bodies, use brief comments for groups of lines rather than every single
statement. Use the STL wisely.

Compile using the MAKE file and execute the application for testing.

Good luck!

3

Detailed Marking Scheme (Deductions)

Criteria for Mark Deductions Deduction (Marks)
S
ty
le
/

E
ffi
ci
en
cy
/

C
o
m
m
en
ti
n
g

M
ax

2
5
d
ed
u
c.

Poor code readability (inconsistent indentation, messy formatting). Up to -5
Unclear or non-descriptive variable/function names Up to -3
Redundant or duplicate variables/objects in memory Up to -5
Lack of or insufficient commenting Up to -5
Code not compiling fully Up to -10
Abrupt runtime interruption (crashes) Up to -10
Extra code unrelated to requirements Up to -10
Wrong submission format (not following instructions) Up to -10
Missing or incorrect implementation of required members in
User/Manager classes

Up to -5

Not using Template Function for login Up to -5
User/Manager registration not storing data correctly Up to -3
Authentication system failing to validate users properly Up to -2

P
la
tf
o
rm

D
ed
u
ct
io
n
s Required user/manager menu options not implemented (e.g., read/write

tweet, add blocked content)
Up to -10

User statistics (accumulative/average score) and top 10 wrong results Up to -5
Tie-breaking rules (e.g., #moderatedtweet count) not implemented Up to -5
ReadPosts class incomplete or non-functional Up to -10
Incorrect parsing or processing of platform posts Up to -5
Not using required STL functions (e.g., for each, sort) Up to -5
Not using iterators where specified Up to -5
No MAKE file or MAKE file not building correctly Up to -3
MAKE file does not compile all required sources Up to -2
Not implementing the custom iterable container as required Up to -5
Not integrating the custom iterator with sorting/iteration tasks Up to -5

Total Possible Deductions -100

4

Share This Post

Email
WhatsApp
Facebook
Twitter
LinkedIn
Pinterest
Reddit

Order a Similar Paper and get 15% Discount on your First Order

Related Questions

a1

Create an E-R model based on the following scenarios: Note: is a free web application for creating diagrams. I have provided a video showing how to use this application. You are welcome to use the modeling software of your choice (Visio, Lucid Charts, etc.). Your models must use crows’ foot

Project 1: Develop Cloud Migration Plan

Project 1: Develop Cloud Migration Plan  Step 1: Research Cloud Premigration Considerations  In this step, you will research premigration considerations, such as the analysis of the current workloads that are being served out of BallotOnline’s existing IT infrastructure, and how the  cloud migration plan will align with business objectives and BallotOnline’s updated

Discussion: Data Migration vs. Application Migration Strategies

Discussion: Data Migration vs. Application Migration Strategies Now that you have a comprehensive IT Policy that incorporates the Cloud Adoption Policy, you will discuss the dynamics between data migration vs. application migration. You should cover the following areas: · What is data migration? · What types of data can and

c++ social media platform

attached CE221 – C++ Programming Assignment 2 – 24/25 Dr Michael Barros ([email protected]) Deadline: 13:59:59, Monday 13th January 2025 Notice You should refer to sections 5 and 7 of the Undergraduate Students’ Handbook for details of the University policy regarding late submission and plagiarism; the work handed in must be

Computer Science WK1 Assignment

Please see attachment for instructions     W1 Assignment Instructions: Chapter 7 exercise 7.3   In 2 pages, answer the questions below with 5 evidence base scholarly articles in APA format.  In the 1970s, one of the main arguments in favor of using closed technologies focused on economics: companies asked

WK1 Discussion and Replies

Please see attachment for instructions.     W1 Discussion Instructions: Where it all Started   In 250 word, answer the questions below with 4 evidence base scholarly articles in APA format.  1. Discuss what you find interesting about the origin of the internet covered in Chapters 7 and 8 of

Discussion 8…

Follow the attach instructions to complete this work. Ethical Practices for Cybersecurity Investments & Purchases   Must post first. Subscribe Moral and ethical requirements should serve as drivers which encourage a business to  invest in or  spend money on cybersecurity products, services, and programs. You have been invited to participate in a

Discussion 7…

Follow the attach instructions to complete this work. Risky Business: How Can U.S. Companies Protect their Digital Assets Overseas?   Must post first. Subscribe Risky Business: How Can U.S. Companies Protect their Digital Assets Overseas? Prepare a 3 to 5 paragraph briefing statement that can be used to answer the

Discussion 6..

Follow the attach instructions to complete this work. Briefing Paper: Exploring Factors which Drive Market Demand for Cybersecurity Products and Services   Must post first. Subscribe Failure to understand what drives customer demand in the cybersecurity market can result in a quick trip to bankruptcy court or a forced sale

wk 1 discuss 2

BELOW I INPUT A CLASSMATE DISCUSSION TO SEE WHERE YOU SHOULD GO WITH THIS ASSIGNMENT MY MAJOR IS INFORMATION TECHNOLOGY For your final project, you will be developing a two-unit course. Choose a topic for that course and develop an overview for it. The overview should be about one paragraph

Worksheet

To complete this assignment, review the prompt and grading rubric in the Module One Worksheet Activity Guidelines and Rubric. You will also need to access the Module One Worksheet. When you have finished your work, submit the assignment here for grading and instructor feedback.

wk 1 yellowdigg

I am a Information Technology major so find something in the field of focus to this it something along the lines of cybersecurity is fine with me As you begin developing your Project Plan in this course, choose one of the following for your discussion post this week: Post a

wk 1 defining the discipline

THERE ARE ATTACHED FILES TO HELP WITH THE ASSIGNMENT PLEASE LET ME KNOW IF THE PDFs WILL LOAD FOR YOU!!! For this discussion, imagine that you are an instructor teaching an introductory course to a group of incoming first-year students. It is your first day, and you want to provide

CSIA Discussion 5

Follow the attach instructions to complete the work Career Planning & Growth for Interns   Must post first. Subscribe The interns have been asked to discuss their career plans and aspirations with one or more of the principals of Nofsinger Consulting Services. The guiding question for this discussion is: How

CSIA ..discussion 4

Follow the attach instructions to complete the work Which is a greater source of supply chain risk: Hardware or Software?   Must post first. Subscribe You have been asked to participate as a panelist at a business round table. The topic for the panel discussion is: Which is a greater

IT

i need someone to do this homework for me  Technische Informatik 1 Wintersemester 2024/2025 Übungsblatt 9 Bitte Beachten! Diese Hausübung ist eine Zulassungsvorraussetzung für die Klausur. Bitte laden sie ihre Lösung entsprechend der Aufgabenbeschreibung in Moodle über den dazu vorgesehenen Punkt bis zum 08.01.25 23:59Uhr auf Moodle hoch. Übung 9

CSIA…meet and greet 3

Follow the attach instructions to complete this work.  Client Meet & Greet   Must post first. Subscribe Nofsinger Consulting Services is hosting a business round table for prospective clients for its Cybersecurity & IT practice. The principals have asked the interns to prepare a set of background papers which can

CSIA Discussion ….2

Follow the attach instructions to complete this work. Analyzing a Business Function – Project Management   Must post first. Subscribe Nofsinger Consulting Services uses Project Management techniques to manage client engagements. One of the primary responsibilities of the engagement project managers is ensuring that the advisory services and associated written