CMP1041 Foundation Programming Assignment

Assignment Help Basic Computer Science
Reference no: EM133114379

CMP1041 Foundation Programming - Academy of Information Technology

Pseudo Coding and Flowcharting

Assessment Purpose

Software development companies have engineering employees with different levels of expertise, i.e. from junior engineers to senior engineers. Junior engineers may be given projects that are outside their ability to achieve, and thus receive help from more experienced engineers.

In this assessment you work as a senior engineer for a security software company that has a new client. A junior engineer was assigned to this client however has been struggling with the more complex parts of the software. Part of your role as a senior engineer at the security software company is to help the junior engineer in providing non-buggy software for the client.

Assessment Task

Assessment Instructions

Read each of the following four (4) tasks and write your responses in the form of a report. The report will be submitted as one (1) pdf file.

Hi senior engineer! As a junior engineer I am struggling to finish the following four tasks. I've attempted each of them at least a little bit before getting stuck! I would greatly appreciate your help with these tasks!

Task 1

The client wants to add security tag readers to doors that allow employees to scan their security tag and if they have the security level appropriate to access the door, they can progress through the door. If they do not have the appropriate security level, security will be alerted with the employee's name and the door will be locked down - not allowing anyone to enter until the door has been reset by security.

Doors are given a security level from 1 to 3, where 3 is the highest security level, and 1 is the lowest. Employees are also given a security level from 1 to 3. An employee with a security level of 1 can access all doors that also have a security level of 1. An employee with a security level of 2 can access all doors that have a security level of 1 or 2. An employee with a security level of 3 can access all doors that have a security level of 1 or 2 or 3.

I've finished a flowchart, but as a junior I am unsure if it has bugs! Can you please identify any syntax, logic, and runtime errors in the flowchart and do the following:

i) Identify the flowchart node that has the error.
ii) Provide a flowchart node that fixes the error.
iii) Provide information about what the error was.

Task 2

The client wants to be able to upgrade an employee's security level, so as the employee receives a promotion they can access new areas.

An employee may upgrade another employee's security level only if the upgrader (the employee upgrading another employee) has a security level at least one security level above the upgradee (the employee being upgraded). That way an employee with a security level of 2 can upgrade an employee with a security level of 1 to a security level of 2, but is not able to upgrade an employee of security level 2 to a security level of 3. In the case where the employee does not have the correct security level to upgrade another employee, security should be alerted with the names of both of the employees.

As a junior engineer I was unsure how to achieve this, but I have started a flowchart. Could you please finish the flowchart, using appropriate tools that will create presentable flowcharts, so that I can implement this within a programming language.

Task 3

The client wants to be able to downgrade all employee's security levels, if the employee has a specific role. Only an employee with a role of Security should be able to downgrade all employee's security levels based on their role.

For example the client decides that all employees with a role of Scientist should no longer have access to security level 2 rooms and wants to be able to downgrade their security level from 2 to 1. An employee with the role of Security will then execute this program to downgrade all employees security level's with the role of Scientist. An employee's security level should never be below 1. If an employee tries to execute this program with a role that is not Security then security should be alerted with the employee's name.

Again, I was unsure how to achieve this, but I have started a flowchart. Could you please finish the flowchart so that I can implement this within a programming language.

Task 4

As a junior engineer, I intend on implementing the above programs in an Object Oriented Language, such as C++. Can you please help me get started by providing the properties and methods for the Employee class, to be used in my class diagram, that has all the properties and methods required for the programs above, specifically methods that allow upgrading or downgrading an employee's security level easily would be great!

Attachment:- Pseudo Coding and Flowcharting.rar

Reference no: EM133114379

Questions Cloud

Determining the amount of policy pay : Assume that in 2017, Nigel is driving his car on a foggy night and the car collides with a deer in the road. As a result, Nigel incurs medical expenses of $1,00
Descriptive and inferential statistical methods : Explain the difference between descriptive and inferential statistical methods and give an example of how each could help you draw a conclusion in real world.
Calculate the value of plant : You own a small manufacturing plant that currently generates revenues of RM 2 million per year. Next year, based upon a decision on a long-term government contr
Subordinate organizational member progress professionally : When encouraging and helping a subordinate organizational member progress professionally, how much effort should you invest in any one person?
CMP1041 Foundation Programming Assignment : CMP1041 Foundation Programming Assignment Help and Solution, Academy of Information Technology - Assessment Writing Service
What is the value of a share of bmi at the start : Benchmark Metrics Inc. (BMI), an all-equity financed firm, reported EPS of $5.14 in 2008. What is the value of a share of BMI at the start of 2009
Shareholders of the target firm : Empirical evidence indicates that the returns to shareholders of the target firm vary significantly from the returns to the shareholders of the acquiring firm.
Bsbfim501-manage budgets and financial plan : For this assessment, you are to refer to the Bayside Call Centre Case Study provided to you by your trainer. You will be playing the role of the Finance Manager
What is the dollar change in portfolio : Assume that interest rates are equal to 4% and the yield curve is flat. You hold a portfolio of bonds with total value of $45M and duration equal to 2.4 years.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Identifies the cost of computer

identifies the cost of computer components to configure a computer system (including all peripheral devices where needed) for use in one of the following four situations:

  Input devices

Compare how the gestures data is generated and represented for interpretation in each of the following input devices. In your comparison, consider the data formats (radio waves, electrical signal, sound, etc.), device drivers, operating systems suppo..

  Cores on computer systems

Assignment : Cores on Computer Systems:  Differentiate between multiprocessor systems and many-core systems in terms of power efficiency, cost benefit analysis, instructions processing efficiency, and packaging form factors.

  Prepare an annual budget in an excel spreadsheet

Prepare working solutions in Excel that will manage the annual budget

  Write a research paper in relation to a software design

Research paper in relation to a Software Design related topic

  Describe the forest, domain, ou, and trust configuration

Describe the forest, domain, OU, and trust configuration for Bluesky. Include a chart or diagram of the current configuration. Currently Bluesky has a single domain and default OU structure.

  Construct a truth table for the boolean expression

Construct a truth table for the Boolean expressions ABC + A'B'C' ABC + AB'C' + A'B'C' A(BC' + B'C)

  Evaluate the cost of materials

Evaluate the cost of materials

  The marie simulator

Depending on how comfortable you are with using the MARIE simulator after reading

  What is the main advantage of using master pages

What is the main advantage of using master pages. Explain the purpose and advantage of using styles.

  Describe the three fundamental models of distributed systems

Explain the two approaches to packet delivery by the network layer in Distributed Systems. Describe the three fundamental models of Distributed Systems

  Distinguish between caching and buffering

Distinguish between caching and buffering The failure model defines the ways in which failure may occur in order to provide an understanding of the effects of failure. Give one type of failure with a brief description of the failure

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd