Java Micro Project
Java Micro Project
Submitted by
Om Yogesh Suhagir
Bhavesh Vijay Shinde
Shlok Yogesh Bakshi
Srushti Vinod Metkar
Affiliated to
Maharashtra State
Board of Technical Education
Certificate
This is to certify that Mr. Om Yogesh Suhagir with Roll No- 3 has successfully completed Micro-project in course
Java Programming.(22412)for the academic year 2022-23 as prescribed in the 'Assessment Manual'during his/her
tenure of completing Fourth Semester of Diploma Programme in Information Technology Engineering from
institute, Sandip Polytechnic with institute code 1167.
Certificate
This is to certify that Mr. Bhavesh Vijay Shinde with Roll No- 17 has successfully completed Micro-project in
course Java Programming.(22412)for the academic year 2022-23 as prescribed in the 'Assessment Manual'during
his/her tenure of completing Fourth Semester of Diploma Programme in Information Technology Engineering from
institute, Sandip Polytechnic with institute code 1167.
Certificate
This is to certify that Mr. Shlok Yogesh Bakshi with Roll No- 57 has successfully completed Micro-project in
course Java Programming.(22412)for the academic year 2022-23 as prescribed in the 'Assessment Manual'during
his/her tenure of completing Fourth Semester of Diploma Programme in Information Technology Engineering from
institute, Sandip Polytechnic with institute code 1167.
Certificate
This is to certify that Ms. Srushti Vinod Metkar with Roll No- 64 has successfully completed Micro-project in
course Java Programming.(22412)for the academic year 2022-23 as prescribed in the 'Assessment Manual'during
his/her tenure of completing Fourth Semester of Diploma Programme in Information Technology Engineering from
institute, Sandip Polytechnic with institute code 1167.
2 Review of Literature
3 Aim/Benefits& Importance
4 Resources Required
6 Design of System
11 Testing of System
12 Compilation of Report
13 Compilation of Presentation
14 Presentation of Seminar
15 Final Submission
Prof.R.C.Mahajan
Name & Signature of Course Teacher
Annexure – II
The main method in the program calls the generatePassword method and passes in the desired
length of the password as a parameter. The generatePassword method creates an array of
characters with the given length and initializes the first four characters with one character from
each character set. It then uses a loop to fill the rest of the password with random characters from
the combined Chars string. Finally, it returns the password as a string.
This program can be useful for generating strong and secure passwords that are difficult to guess
or crack. However, it's important to remember that a strong password alone is not enough to
protect your online accounts. You should also enable two-factor authentication, use a password
manager, and follow other best practices for online security.
2.0 Aims/Benefits of the Micro-Project:
1. Collecting more information about java programming language.
2. Gathering more information about Classes and Objects in java language.
3. Learning about the execution of string methods used in java.
4. Making Random Password generator in java.
3.0 Course Outcomes Achieved:
1. Develop a programs using Object Oriented Methodology in java.
2. Apply Concept of inheritance for code reusability .
3. Develop programs using multithreading.
4. Implement Exception handling .
5. Develop Programs using graphics and applets.
Fernando J. Corbató was an American pioneer in the field of computer science who is best known
as being the father of the password.
Corbató was a physicist whose interests evolved into what would become a burgeoning field in
its own right, computer science. As computers grew in their development and dependability, a
use case for one of Corbató’s own creations, the Compatible Time-Sharing System (CTSS),
emerged. How to securely and practically expand the user population became immediately
important. Toward this end Corbató conceived and applied the concept of a password — familiar
in the physical world — to computers. Upon his death in 2019 the Massachusetts Institute of
Technology, where his work was done at the time, credited Corbató with “drastically expanding
the usefulness” of computers.
In addition to the CTSS, while at MIT’s Computation Center from 1963-66, Corbató developed a
Multiplexed Information and Computing Service (Multics) that built upon the CTSS’s success
and could be deployed and useful to a larger population. Also while there, he did foundational
work on the operating system UNIX.
If two instances of Random are created with the same seed, and the same sequence of method calls
is made for each, they will generate and return identical sequences of numbers. In order to guarantee
this property, particular algorithms are specified for the class Random. Java implementations must
use all the algorithms shown here for the class Random, for the sake of absolute portability of Java
code. However, subclasses of class Random are permitted to use other algorithms, so long as they
adhere to the general contracts for all the methods.
The algorithms implemented by class Random use a protected utility method that on each
invocation can supply up to 32 pseudorandomly generated bits.
// Fill the rest of the password with random characters from combinedChars for(int
i = 4; i< length ; i++) {
password[i] = combinedChars.charAt(random.nextInt(combinedChars.length()));
}
}
8.0 Skilled Developed/Learning Outcome of this Micro-Project:
1. Teamwork
2. Communication skills
3. Successfully created a application using Java programming .
Password security is important because passwords are the first line of defense against
cybercriminals and their unauthorized access to your personal data.
Most people around the world struggle with managing their passwords. A recent Verizon Data
Breach Investigation reported over 70% of employees repeat passwords while at work. According
to the study, 81% of hacking-related breaches used either stolen or weak
passwords. To make matters worse, password reuse by individuals at home is transferred to their
workplace. Despite the fact that 91% of people are aware that it is bad practice to reuse passwords,
59% do so at both their place of employment and home. Using a strong password is fundamental
to ensure your information won’t be at risk.
Conclusion :
Usually, we need to generate a secure password for security purposes. There are several ways to
generate a strong password in Java. In this project, we have understood how we can generate a
strong password having at least two lowercase characters, two uppercase characters, two digits, and
two special characters.
The random password generator in Java is a program that will generate strong random passwords
of the specified length using alphabets, numbers, and symbols. We first create a string or list
consisting of all the alphabets, numbers, and symbols.
Prof.R.C.Mahajan
Name & Signature of CourseTeacher
Annexure – IV
Micro Project Evaluation Sheet
Name of Student: Om Yogesh Suhagir Enrollment No: 2111670196
Name of Programme: Information Technology Engineering Semester: IV
Course Title: Java Programming Course Code: 22412
Title of Micro Project: Auto Password Generator
5 Quality of Prototype/Model
6 Report Preparation
8 Viva
(A) (B)
Total Marks (10
Process and Product Assessment Individual Presentation/Viva
Marks)
(6 Marks) (4 Marks)
5 Quality of Prototype/Model
6 Report Preparation
8 Viva
(A) (B)
Total Marks (10
Process and Product Assessment Individual Presentation/Viva
Marks)
(6 Marks) (4 Marks)
5 Quality of Prototype/Model
6 Report Preparation
8 Viva
(A) (B)
Total Marks (10
Process and Product Assessment Individual Presentation/Viva
Marks)
(6 Marks) (4 Marks)
5 Quality of Prototype/Model
6 Report Preparation
8 Viva
(A) (B)
Total Marks (10
Process and Product Assessment Individual Presentation/Viva
Marks)
(6 Marks) (4 Marks)