Our Services

Get 15% Discount on your First Order

[rank_math_breadcrumb]

c++ social media platform

attached

CE221 – C++ Programming Assignment 2 – 24/25
Dr Michael Barros ([email protected])

Deadline: 13:59:59, Monday 13th January 2025

Notice

You should refer to sections 5 and 7 of the Undergraduate Students’ Handbook for details of the University policy
regarding late submission and plagiarism; the work handed in must be entirely your own. Your programs will be
checked by an intelligent plagiarism detection system that looks for similarities between the submitted programs.
(Since some of the code has been supplied on Moodle, there will inevitably be similarities, so I will examine any
submissions flagged by the checker to determine whether the similarities that have been detected are reasonable.)

This assignment comprises a single exercise. The files for use in this assignment are available in Moodle as a zip file.
Submission of this assignment will be via FASER.

Introduction

In this assignment, you will develop a basic social media content management platform (e.g. think of it as X (twitter) or
Reddit). The platform simulates a discussion of people and their posts with two types of distinct users:

1. Users: Individuals who read and write posts.

2. Managers: Individuals responsible for moderating the platform by setting and updating the content restrictions
(i.e., blocked words or phrases). They also moderate who can become a manager.

Your program will needs to display statistics about users reputation and help identify the top 10 most problematic
users based on their reputation scores.

Key Objectives

1. Provide a system where Users can read and write posts.

2. Provide a system where Managers can set and manage blocked content.

3. Display the top 10 most problematic users who have accumulated the lowest reputation scores (or are tied at zero
and have multiple moderated posts).

4. Allow Users to view their statistics (accumulated or average scores).

5. Implement a moderation engine that censors blocked content within posts.

User and Manager Options

User Options

1. Read/Write Post:

• Read a post : Randomly select a post from the platform’s database and present it to the user. After reading,
the user can choose to read another post, report the post (which lowers the post’s author’s reputation), or exit.

• Write a post : Prompt the user to write a post (up to 140 characters) and append it to the platform’s post file.

2. View Your Statistics: Show the user’s accumulated reputation score and average reputation per post. These
scores should be updated frequently and should use STL algorithms (of your choice).

3. Display Top 10 Most Problematic Users: Sort the users by their reputation score (lowest first using a class
operator overload). If there’s a tie at zero, break it by the number of moderated posts they have triggered. Display
the bottom 10. Use STL sorting and iterators.

4. Exit the Program

1

Manager Options

1. Reset Moderation Content: Clear all previously added banned words or phrases.

2. Add Blocked Content: Add new words or phrases that should be censored.

3. Add Another Manager: Only an existing manager can add a new manager by specifying their name and regis-
tration number.

4. Set the Sample File: Set or change the name of the text file that contains the platform posts.

5. Exit the Program

Content Moderation Engine

The engine must censor posts that contain blocked words or phrases. Every censored word or phrase should be replaced
by a series of ‘X’s of the same length, and every post that has been censored should include the #moderatedpost tag at
the end.

• Consider a “word” as a sequence of non-whitespace characters containing more than one letter.

• Remove punctuation at the start or end of words, but leave punctuation and digits that appear in the middle of
words.

• Convert all input to lowercase before checking for blocked content.

Examples:

• If “hate” is blocked: Original: “They truly hate her ideas.” Moderated: “They truly XXXX her ideas. #moderat-
edpost”

• If “cried all night” is blocked (a phrase): Original: “He cried all night after the announcement.” Moderated: “He
XXXXX XXX XXXXX after the announcement. #moderatedpost”

Classes and Files

You will be provided with files in the Assignment2files folder, including:

• Person.h and Person.cpp: A complete Person class (you may add extra members but do not alter existing ones
except where noted).

• User.h and Manager.h: Declarations for derived classes of Person. You must implement these in User.cpp and
Manager.cpp, respectively, following the specifications in the comments.

You may add extra member functions to these classes, but only define them in the .cpp files.

Additional Class: ReadPosts

You will have a ReadPosts class that:

• Reads a large text file of platform posts.

• Each record in the file may look like: userID postID post content date/time

• You will be given a partial implementation and a header file. Use these as provided.

• Implement a findPost function to select a random post from a multimap or similar container.

• If any file cannot be opened, terminate gracefully with an error message.

2

Main Program Requirements

1. Prompt for a username (or manager name) and determine their role.

2. If a User does not exist yet, create a new one and inform them using a try-catch statement.

3. If a Manager line is found, load their details. Only an existing Manager can add another.

4. Use a template function login to read from a user/manager file. For Users: Read registration, name, and scores,
and create User objects. For Managers: Read registration number and name, then create a Manager object.

5. After login, provide the respective menu options as described earlier.

6. You MUST use STL algorithms (for each, sort, etc.) and iterators, where pointed, but do not stop there.

7. Handle file I/O errors gracefully.

Challenge

Make the ReadPosts class behave like a custom iterable container (similar to a linked list). Use this custom iterator in
the top 10 calculation and in displaying the top 10 most problematic users.

Deliverables

Submit a single zip file containing a single folder. Acceptable formats: .zip, .7z, or a gzipped tar file. Other formats
lose 10%.

Include:

• All source files (.cpp, .h)

• A MAKE file for compilation

• Any required files for the program to run

Marking Scheme

Marking Criteria Marks
Style/Efficiency/Commenting 25
Implementation of all classes (User and Manager) 5
Main: User and manager options 20
Top 10 most problematic users 5
ReadPosts Class 15
Find post with find function 5
Requested usage of STL functions 10
MAKE file for compilation 5
Challenge 10
Total 100

Notes

Avoid unnecessary copying or repetitive code. Comments should clearly describe what each function does and what each
non-local variable represents. Within function bodies, use brief comments for groups of lines rather than every single
statement. Use the STL wisely.

Compile using the MAKE file and execute the application for testing.

Good luck!

3

Detailed Marking Scheme (Deductions)

Criteria for Mark Deductions Deduction (Marks)
S
ty
le
/

E
ffi
ci
en
cy
/

C
o
m
m
en
ti
n
g

M
ax

2
5
d
ed
u
c.

Poor code readability (inconsistent indentation, messy formatting). Up to -5
Unclear or non-descriptive variable/function names Up to -3
Redundant or duplicate variables/objects in memory Up to -5
Lack of or insufficient commenting Up to -5
Code not compiling fully Up to -10
Abrupt runtime interruption (crashes) Up to -10
Extra code unrelated to requirements Up to -10
Wrong submission format (not following instructions) Up to -10
Missing or incorrect implementation of required members in
User/Manager classes

Up to -5

Not using Template Function for login Up to -5
User/Manager registration not storing data correctly Up to -3
Authentication system failing to validate users properly Up to -2

P
la
tf
o
rm

D
ed
u
ct
io
n
s Required user/manager menu options not implemented (e.g., read/write

tweet, add blocked content)
Up to -10

User statistics (accumulative/average score) and top 10 wrong results Up to -5
Tie-breaking rules (e.g., #moderatedtweet count) not implemented Up to -5
ReadPosts class incomplete or non-functional Up to -10
Incorrect parsing or processing of platform posts Up to -5
Not using required STL functions (e.g., for each, sort) Up to -5
Not using iterators where specified Up to -5
No MAKE file or MAKE file not building correctly Up to -3
MAKE file does not compile all required sources Up to -2
Not implementing the custom iterable container as required Up to -5
Not integrating the custom iterator with sorting/iteration tasks Up to -5

Total Possible Deductions -100

4

Share This Post

Email
WhatsApp
Facebook
Twitter
LinkedIn
Pinterest
Reddit

Order a Similar Paper and get 15% Discount on your First Order

Related Questions

Asign 2 of CG

Follow the attached instructions to complete this work. Guidance to follow I encourage you to build your project format following the requirements established in each project’s final step. I am going to give you the key to success. I am a fan of headings/subheadings in the final project that directly

Assign 2 of CG

Follow the attach information to complete this work. Make sure it aligns with the Rubric. Unit 2 Assignment Directions: Risk-Assessment Strategy Purpose In this assignment, you will detail the risk-assessment plan and strategy for your organization that you described in your discussion post. You have demonstrated that you understand their

How to Bulk Open MBOX File Windows and Mac?

The best way to bulk open MBOX file Windows and Mac without using any email client is through an expert solution such as BitRecover MBOX Viewer. It runs on both OS and is completely free of cost. The best thing is it is easy to use, has multiple selection modes,

Data unit 2 assign

Follow the attach instructions to complete this work State State Bird State Motto Year of Admission Alaska Willow ptarmigan North to the Future 1959 Texas Northern mockingbird Friendship 1845 California California quail Eureka 1850 Montana Western meadowlark Oro y Plata 1889 New Mexico Greater roadrunner Crescit Eundo 1912 Arizona Cactus

Finding …. Theme

Follow the attached instructions to complete this work. Unit 2 Assignment: Finding themes using a Page 1 dashboard Milligan Chapters 7, 8, and 11 Unit 2 Assignment: Finding themes using a dashboard Milligan Chapters 7, 8, and 11 In this assignment, you will learn how to combine individual visualizations to

Data V of D3

Follow the attach instructions to complete this work Deconstruction of an Advanced Dashboard: Trends and Improvements   Discussion Prompts · Does the dashboard designer use any of the trends that are described in Milligan’s Chapter 9? · If they did use those trends, state which one(s), and describe what they

DV D2

Follow the attached instructions to complete this work also find the previous work attach to it.  Deconstructions of an Advanced Dashboard: Dashboard Approach and Storytelling   Task There is a discussion you will need to participate in this unit. Select the button that follows to access the discussion thread.  You

CG 5

Follow the attached instructions to complete this work. In Unit 1, you analyzed the NIST 2.0 Framework and then compared it to the administration’s approach to cybersecurity. In Unit 2, you will look more specifically at what it means to establish a risk-assessment approach for an organization and how that

Computer Science Digital Image Analysis Assignment

Can anyone create me any one from the assignment doc 1. Real-Time Image Super-Resolution for Video Streams · Description: Develop a system to enhance the resolution of low-quality video streams in real-time using Super-Resolution GANs (SRGAN) or ESRGAN. · Challenge: Ensure temporal consistency across frames, avoid artifacts, and maintain real-time

D1 of data

Follow the attached instructions to complete this work in an hour. Unit 1 Discussion: Deconstruction of an Advanced Dashboard: Identification of Purpose and Visualizations   Task 1. Go to  Viz of the Day 2. This website is hosted by Tableau Public, and new visualizations are posted daily. 3. Select one

D1 of Cg

Follow the attached instruction to complete this discussion Directions 1. Initial post: Respecting user privacy and ensuring data integrity are important ethical requirements of a CISO. They are requirements reflected in the internal governance approach to writing policies on how to manage access and control over data. You may add

Cyber 1

Follow the attach instructions to complete this work. Make sure it Aligns with Rubric. Unit 1 Assignment Directions: Administration Approach to Cybersecurity Purpose Write a 5-page paper analyzing 2023’s  National Cybersecurity Strategy Implementation Plan (NCSIP), which supports the NCS 2023, the Biden Administration’s approach to cybersecurity. Keep in mind that NIST

How to Convert OST files to PST?

Convert OST to PST using Shoviv OST to PST Converter (in steps): · Install and open OST to PST Converter tool · Add OST files you want to convert · Choose PST as the saving format · Select destination folder · Click Export to start conversion The tool converts OST

GainTools MBOX to PST Converter

GainTools MBOX to PST Converter is a powerful and easy-to-use program that can change MBOX files into PST files with 100% accuracy. It can convert several MBOX files at once, keeps the layout and attachments of the emails, and works with all major MBOX email clients. This makes it quick,

windowslivemailconverter

 <!–td {border: 1px solid #cccccc;}br {mso-data-placement:same-cell;}–> The best choice for the users is eSoftTools Windows Live Mail Converter software. It allows the users to convert their Live Mail profile emails into multiple formats as well as export Windows Live Mail emails to 8+ conversion and different cloud mail apps. It

Final CIS Project

 Scenario: A robot is sitting in a chair with its arms facing down. Write an algorithm, using pseudocode, to make the robot: 

What features define a successful AI Chatbot Development Company?

A successful AI Chatbot Development Company is defined by its ability to deliver intelligent, scalable, and user-friendly chatbot solutions powered by advanced AI and NLP. Key features include seamless integration, contextual conversation handling, real-time analytics, and enterprise-grade security—essential for enhancing customer support, boosting engagement, and automating workflows across diverse business

Instructions listed below

It’s an online assignment, I’ll give you the login and the names of the assignments, and you complete them.