User Input Program and Analysis Demonstrate an understanding of C++ programming concepts by completing the following: Program: Create a C++ program that will obtain input from a user and store it into the provided CSC450_CT5_mod5.txt Download CSC450_CT5_mod5.txtfile. Your program should append it to the provided text file, without deleting the existing data: Store the provided data in the CSC450_CT5_mod5.txt file. Create a reversal method that will reverse all of the characters in the CSC450_CT5_mod5.txt file and store the result in a CSC450-mod5-reverse.txt file. Program Analysis: Given your program implementation, discuss and identify the possible security vulnerabilities that may exist. If present, discuss solutions to minimize the vulnerabilities. Discuss and identify possible problems that can result in errors for string manipulation of data. Your analysis should be 1-2 pages in length. Screenshot shows txt file. CSC450_CT5_mod5.txt reads: Please be sure to append your data to this text file. If these first three lines are deleted, then your program is not functioning as expected.

COMPREHENSIVE MICROSOFT OFFICE 365 EXCE
1st Edition
ISBN:9780357392676
Author:FREUND, Steven
Publisher:FREUND, Steven
Chapter6: Creating, Sorting, And Querying A Table
Section: Chapter Questions
Problem 12AYK
icon
Related questions
Question

User Input Program and Analysis

Demonstrate an understanding of C++ programming concepts by completing the following:

  1. Program: Create a C++ program that will obtain input from a user and store it into the provided CSC450_CT5_mod5.txt Download CSC450_CT5_mod5.txtfile. Your program should append it to the provided text file, without deleting the existing data:
    1. Store the provided data in the CSC450_CT5_mod5.txt file.
    2. Create a reversal method that will reverse all of the characters in the CSC450_CT5_mod5.txt file and store the result in a CSC450-mod5-reverse.txt file.
  2. Program Analysis: Given your program implementation, discuss and identify the possible security vulnerabilities that may exist. If present, discuss solutions to minimize the vulnerabilities. Discuss and identify possible problems that can result in errors for string manipulation of data. Your analysis should be 1-2 pages in length.

Screenshot shows txt file.

CSC450_CT5_mod5.txt reads:

Please be sure to append your data to this text file.

If these first three lines are deleted, then your program is not functioning as expected.

 

(
File
CSC450_CT5_mod5
Edit View
Ln 6, Col 1
X
Please be sure to append your data to this text file.
If these first three lines are deleted, then your
program is not functioning as expected.
100%
+
Windows (CRLF)
UTF-8
x
JE
Transcribed Image Text:( File CSC450_CT5_mod5 Edit View Ln 6, Col 1 X Please be sure to append your data to this text file. If these first three lines are deleted, then your program is not functioning as expected. 100% + Windows (CRLF) UTF-8 x JE
Expert Solution
steps

Step by step

Solved in 6 steps with 4 images

Blurred answer
Knowledge Booster
User Defined DataType
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, computer-science and related others by exploring similar questions and additional content below.
Similar questions
  • SEE MORE QUESTIONS
Recommended textbooks for you
COMPREHENSIVE MICROSOFT OFFICE 365 EXCE
COMPREHENSIVE MICROSOFT OFFICE 365 EXCE
Computer Science
ISBN:
9780357392676
Author:
FREUND, Steven
Publisher:
CENGAGE L