CMP1041 Foundation Programming Assignment

Assignment Help Basic Computer Science
Reference no: EM133114379

CMP1041 Foundation Programming - Academy of Information Technology

Pseudo Coding and Flowcharting

Assessment Purpose

Software development companies have engineering employees with different levels of expertise, i.e. from junior engineers to senior engineers. Junior engineers may be given projects that are outside their ability to achieve, and thus receive help from more experienced engineers.

In this assessment you work as a senior engineer for a security software company that has a new client. A junior engineer was assigned to this client however has been struggling with the more complex parts of the software. Part of your role as a senior engineer at the security software company is to help the junior engineer in providing non-buggy software for the client.

Assessment Task

Assessment Instructions

Read each of the following four (4) tasks and write your responses in the form of a report. The report will be submitted as one (1) pdf file.

Hi senior engineer! As a junior engineer I am struggling to finish the following four tasks. I've attempted each of them at least a little bit before getting stuck! I would greatly appreciate your help with these tasks!

Task 1

The client wants to add security tag readers to doors that allow employees to scan their security tag and if they have the security level appropriate to access the door, they can progress through the door. If they do not have the appropriate security level, security will be alerted with the employee's name and the door will be locked down - not allowing anyone to enter until the door has been reset by security.

Doors are given a security level from 1 to 3, where 3 is the highest security level, and 1 is the lowest. Employees are also given a security level from 1 to 3. An employee with a security level of 1 can access all doors that also have a security level of 1. An employee with a security level of 2 can access all doors that have a security level of 1 or 2. An employee with a security level of 3 can access all doors that have a security level of 1 or 2 or 3.

I've finished a flowchart, but as a junior I am unsure if it has bugs! Can you please identify any syntax, logic, and runtime errors in the flowchart and do the following:

i) Identify the flowchart node that has the error.
ii) Provide a flowchart node that fixes the error.
iii) Provide information about what the error was.

Task 2

The client wants to be able to upgrade an employee's security level, so as the employee receives a promotion they can access new areas.

An employee may upgrade another employee's security level only if the upgrader (the employee upgrading another employee) has a security level at least one security level above the upgradee (the employee being upgraded). That way an employee with a security level of 2 can upgrade an employee with a security level of 1 to a security level of 2, but is not able to upgrade an employee of security level 2 to a security level of 3. In the case where the employee does not have the correct security level to upgrade another employee, security should be alerted with the names of both of the employees.

As a junior engineer I was unsure how to achieve this, but I have started a flowchart. Could you please finish the flowchart, using appropriate tools that will create presentable flowcharts, so that I can implement this within a programming language.

Task 3

The client wants to be able to downgrade all employee's security levels, if the employee has a specific role. Only an employee with a role of Security should be able to downgrade all employee's security levels based on their role.

For example the client decides that all employees with a role of Scientist should no longer have access to security level 2 rooms and wants to be able to downgrade their security level from 2 to 1. An employee with the role of Security will then execute this program to downgrade all employees security level's with the role of Scientist. An employee's security level should never be below 1. If an employee tries to execute this program with a role that is not Security then security should be alerted with the employee's name.

Again, I was unsure how to achieve this, but I have started a flowchart. Could you please finish the flowchart so that I can implement this within a programming language.

Task 4

As a junior engineer, I intend on implementing the above programs in an Object Oriented Language, such as C++. Can you please help me get started by providing the properties and methods for the Employee class, to be used in my class diagram, that has all the properties and methods required for the programs above, specifically methods that allow upgrading or downgrading an employee's security level easily would be great!

Attachment:- Pseudo Coding and Flowcharting.rar

Reference no: EM133114379

Questions Cloud

Determining the amount of policy pay : Assume that in 2017, Nigel is driving his car on a foggy night and the car collides with a deer in the road. As a result, Nigel incurs medical expenses of $1,00
Descriptive and inferential statistical methods : Explain the difference between descriptive and inferential statistical methods and give an example of how each could help you draw a conclusion in real world.
Calculate the value of plant : You own a small manufacturing plant that currently generates revenues of RM 2 million per year. Next year, based upon a decision on a long-term government contr
Subordinate organizational member progress professionally : When encouraging and helping a subordinate organizational member progress professionally, how much effort should you invest in any one person?
CMP1041 Foundation Programming Assignment : CMP1041 Foundation Programming Assignment Help and Solution, Academy of Information Technology - Assessment Writing Service
What is the value of a share of bmi at the start : Benchmark Metrics Inc. (BMI), an all-equity financed firm, reported EPS of $5.14 in 2008. What is the value of a share of BMI at the start of 2009
Shareholders of the target firm : Empirical evidence indicates that the returns to shareholders of the target firm vary significantly from the returns to the shareholders of the acquiring firm.
Bsbfim501-manage budgets and financial plan : For this assessment, you are to refer to the Bayside Call Centre Case Study provided to you by your trainer. You will be playing the role of the Finance Manager
What is the dollar change in portfolio : Assume that interest rates are equal to 4% and the yield curve is flat. You hold a portfolio of bonds with total value of $45M and duration equal to 2.4 years.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Reflect to course technology that transforms

Describe the most important aspects of this course for you with respect to the content that was covered or activities in which you participated.

  Design a database application to keep track of movies

Design a database application to keep track of movies, actors, and the roles played by actors in movies. You may make up all the data.

  Write an essay on turing machine explain with examples

Write an essay on turing machine explain with examples

  Object oriented programming paradigm

Discuss and explain why the object oriented programming paradigm is considered a better choice than the structured programming paradigm.

  Minimum number of coins required to pay an amount

Find the formula of c[i, j], which is the minimum number of coins required to pay an amount of j units. 1≤i≤n is the denomination and i have value di units, 0≤j≤N is the amount of units. Then set up a table for c[1..n, 0..N]

  Describe the role of analytics in healthcare

Describe the role of analytics in healthcare. How does HIT support or hinder this?

  What are the transport protocols

What mechanism is used to detect/avoid/correct data transmission collision in Layer 2, such as Ethernet and WiFi? Describe the mechanism in sufficient details.

  Game has a new complication

The game has a new complication - instead of rolling a single die at a time, players are required to roll multiple dice at a time. Players start off

  Suppose that bc financial aid alots a textbook

Suppose that BC financial aid alots a textbook stipend by claiming that the average textbook at BC bookstore costs $69.5. You want to test this claim.

  Risk assessment to organization security framework

Identify and discuss the importance of risk assessment to the organization's security framework? Discuss the five layers of risk.

  Conducted to deal with the issue of noise

What kind of user training should be conducted to deal with the issue of noise. How do you strike a balance between being overwhelmed with false positives

  Explain the principle of locality

Explain the Principle of Locality (both spacial and temporal) and explain how it affects cacheing.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd