Properties and methods required for the programs

Assignment Help Basic Computer Science
Reference no: EM133117739

CMP1041 Foundation Programming - Academy of Information Technology

Pseudo Coding and Flowcharting

Assessment Purpose

Software development companies have engineering employees with different levels of expertise, i.e. from junior engineers to senior engineers. Junior engineers may be given projects that are outside their ability to achieve, and thus receive help from more experienced engineers.

In this assessment you work as a senior engineer for a security software company that has a new client. A junior engineer was assigned to this client however has been struggling with the more complex parts of the software. Part of your role as a senior engineer at the security software company is to help the junior engineer in providing non-buggy software for the client.

Assessment Task

Assessment Instructions

Read each of the following four (4) tasks and write your responses in the form of a report. The report will be submitted as one (1) pdf file.

Hi senior engineer! As a junior engineer I am struggling to finish the following four tasks. I've attempted each of them at least a little bit before getting stuck! I would greatly appreciate your help with these tasks!

Task 1

The client wants to add security tag readers to doors that allow employees to scan their security tag and if they have the security level appropriate to access the door, they can progress through the door. If they do not have the appropriate security level, security will be alerted with the employee's name and the door will be locked down - not allowing anyone to enter until the door has been reset by security.

Doors are given a security level from 1 to 3, where 3 is the highest security level, and 1 is the lowest. Employees are also given a security level from 1 to 3. An employee with a security level of 1 can access all doors that also have a security level of 1. An employee with a security level of 2 can access all doors that have a security level of 1 or 2. An employee with a security level of 3 can access all doors that have a security level of 1 or 2 or 3.

I've finished a flowchart, but as a junior I am unsure if it has bugs! Can you please identify any syntax, logic, and runtime errors in the flowchart and do the following:

i) Identify the flowchart node that has the error.
ii) Provide a flowchart node that fixes the error.
iii) Provide information about what the error was.

Task 2

The client wants to be able to upgrade an employee's security level, so as the employee receives a promotion they can access new areas.

An employee may upgrade another employee's security level only if the upgrader (the employee upgrading another employee) has a security level at least one security level above the upgradee (the employee being upgraded). That way an employee with a security level of 2 can upgrade an employee with a security level of 1 to a security level of 2, but is not able to upgrade an employee of security level 2 to a security level of 3. In the case where the employee does not have the correct security level to upgrade another employee, security should be alerted with the names of both of the employees.

As a junior engineer I was unsure how to achieve this, but I have started a flowchart. Could you please finish the flowchart, using appropriate tools that will create presentable flowcharts, so that I can implement this within a programming language.

Task 3

The client wants to be able to downgrade all employee's security levels, if the employee has a specific role. Only an employee with a role of Security should be able to downgrade all employee's security levels based on their role.

For example the client decides that all employees with a role of Scientist should no longer have access to security level 2 rooms and wants to be able to downgrade their security level from 2 to 1. An employee with the role of Security will then execute this program to downgrade all employees security level's with the role of Scientist. An employee's security level should never be below 1. If an employee tries to execute this program with a role that is not Security then security should be alerted with the employee's name.

Again, I was unsure how to achieve this, but I have started a flowchart. Could you please finish the flowchart so that I can implement this within a programming language.

Task 4

As a junior engineer, I intend on implementing the above programs in an Object Oriented Language, such as C++. Can you please help me get started by providing the properties and methods for the Employee class, to be used in my class diagram, that has all the properties and methods required for the programs above, specifically methods that allow upgrading or downgrading an employee's security level easily would be great!

Attachment:- Pseudo Coding and Flowcharting.rar

Reference no: EM133117739

Questions Cloud

Calculate the acquisition cost of the Machine : Sam Ltd also agrees to assume the Pak Ltd bank loan liability of $75 000 as part of the Machine acquisition. Calculate the acquisition cost of the Machine
Economic forces of product markets and labor markets : Decisions about how to respond to the economic forces of product markets and labor markets limit an organization's choices about pay structure.
Calculate debt to total assets and interest coverage ratios : Calculate the debt to total assets and interest coverage ratios for 2017 and 2016. Did Dollarama's solvency improve, worsen, or remain unchanged in 2017
Explain how the aging process impacts learning : Explain how the aging process impacts learning. How can a leader use andragogy to advance institutional effectiveness?
Properties and methods required for the programs : Role as a senior engineer at the security software company is to help the junior engineer in providing non-buggy software for the client
How the aging process impacts learning : Explain how the aging process impacts learning. How can a leader use andragogy to advance institutional effectiveness?
What irc code section addresses the question : This year she received 200 additional shares of this stock from stock dividend. Her 1,200 shares are now worth $12,500. What IRC Code section addresses question
How much would the monthly payment be : Suppose you have been offered a loan at 3.5% annual interest for a 20-year mortgage on a house that's worth $450,000. How much would the monthly payment be
How much will his monthly pension benefit be : Richie turns 61 this year and will be entitled to a CP retirement pension of $1,100 per month. How much will his monthly pension benefit be

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Identifies the cost of computer

identifies the cost of computer components to configure a computer system (including all peripheral devices where needed) for use in one of the following four situations:

  Input devices

Compare how the gestures data is generated and represented for interpretation in each of the following input devices. In your comparison, consider the data formats (radio waves, electrical signal, sound, etc.), device drivers, operating systems suppo..

  Cores on computer systems

Assignment : Cores on Computer Systems:  Differentiate between multiprocessor systems and many-core systems in terms of power efficiency, cost benefit analysis, instructions processing efficiency, and packaging form factors.

  Prepare an annual budget in an excel spreadsheet

Prepare working solutions in Excel that will manage the annual budget

  Write a research paper in relation to a software design

Research paper in relation to a Software Design related topic

  Describe the forest, domain, ou, and trust configuration

Describe the forest, domain, OU, and trust configuration for Bluesky. Include a chart or diagram of the current configuration. Currently Bluesky has a single domain and default OU structure.

  Construct a truth table for the boolean expression

Construct a truth table for the Boolean expressions ABC + A'B'C' ABC + AB'C' + A'B'C' A(BC' + B'C)

  Evaluate the cost of materials

Evaluate the cost of materials

  The marie simulator

Depending on how comfortable you are with using the MARIE simulator after reading

  What is the main advantage of using master pages

What is the main advantage of using master pages. Explain the purpose and advantage of using styles.

  Describe the three fundamental models of distributed systems

Explain the two approaches to packet delivery by the network layer in Distributed Systems. Describe the three fundamental models of Distributed Systems

  Distinguish between caching and buffering

Distinguish between caching and buffering The failure model defines the ways in which failure may occur in order to provide an understanding of the effects of failure. Give one type of failure with a brief description of the failure

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd