Provide non-buggy software for the client

Assignment Help Basic Computer Science
Reference no: EM133115312

CMP1041 Foundation Programming - Academy of Information Technology

Pseudo Coding and Flowcharting

Assessment Purpose

Software development companies have engineering employees with different levels of expertise, i.e. from junior engineers to senior engineers. Junior engineers may be given projects that are outside their ability to achieve, and thus receive help from more experienced engineers.

In this assessment you work as a senior engineer for a security software company that has a new client. A junior engineer was assigned to this client however has been struggling with the more complex parts of the software. Part of your role as a senior engineer at the security software company is to help the junior engineer in providing non-buggy software for the client.

Assessment Task

Assessment Instructions

Read each of the following four (4) tasks and write your responses in the form of a report. The report will be submitted as one (1) pdf file.

Hi senior engineer! As a junior engineer I am struggling to finish the following four tasks. I've attempted each of them at least a little bit before getting stuck! I would greatly appreciate your help with these tasks!

Task 1

The client wants to add security tag readers to doors that allow employees to scan their security tag and if they have the security level appropriate to access the door, they can progress through the door. If they do not have the appropriate security level, security will be alerted with the employee's name and the door will be locked down - not allowing anyone to enter until the door has been reset by security.

Doors are given a security level from 1 to 3, where 3 is the highest security level, and 1 is the lowest. Employees are also given a security level from 1 to 3. An employee with a security level of 1 can access all doors that also have a security level of 1. An employee with a security level of 2 can access all doors that have a security level of 1 or 2. An employee with a security level of 3 can access all doors that have a security level of 1 or 2 or 3.

I've finished a flowchart, but as a junior I am unsure if it has bugs! Can you please identify any syntax, logic, and runtime errors in the flowchart and do the following:

i) Identify the flowchart node that has the error.
ii) Provide a flowchart node that fixes the error.
iii) Provide information about what the error was.

Task 2

The client wants to be able to upgrade an employee's security level, so as the employee receives a promotion they can access new areas.

An employee may upgrade another employee's security level only if the upgrader (the employee upgrading another employee) has a security level at least one security level above the upgradee (the employee being upgraded). That way an employee with a security level of 2 can upgrade an employee with a security level of 1 to a security level of 2, but is not able to upgrade an employee of security level 2 to a security level of 3. In the case where the employee does not have the correct security level to upgrade another employee, security should be alerted with the names of both of the employees.

As a junior engineer I was unsure how to achieve this, but I have started a flowchart. Could you please finish the flowchart, using appropriate tools that will create presentable flowcharts, so that I can implement this within a programming language.

Task 3

The client wants to be able to downgrade all employee's security levels, if the employee has a specific role. Only an employee with a role of Security should be able to downgrade all employee's security levels based on their role.

For example the client decides that all employees with a role of Scientist should no longer have access to security level 2 rooms and wants to be able to downgrade their security level from 2 to 1. An employee with the role of Security will then execute this program to downgrade all employees security level's with the role of Scientist. An employee's security level should never be below 1. If an employee tries to execute this program with a role that is not Security then security should be alerted with the employee's name.

Again, I was unsure how to achieve this, but I have started a flowchart. Could you please finish the flowchart so that I can implement this within a programming language.

Task 4

As a junior engineer, I intend on implementing the above programs in an Object Oriented Language, such as C++. Can you please help me get started by providing the properties and methods for the Employee class, to be used in my class diagram, that has all the properties and methods required for the programs above, specifically methods that allow upgrading or downgrading an employee's security level easily would be great!

Attachment:- Pseudo Coding and Flowcharting.rar

Reference no: EM133115312

Questions Cloud

Achieve a homemade dividend policy : Discuss the imperfections that may make it impossible to achieve a homemade dividend policy.
What is the price of stock today : Winchitter Corp. just paid a dividend of $2.50 per share. The company will increase its dividend by 8 percent in one year and by 5 percent in two years. After t
MGM366-international business expansion plan : MGM366-Anything else that you deem important to support your international business expansion plan.
What is the party that sells the dollar interest rate : The 3-month December 2022 dollar interest rate futures contract on the dollar is currently priced at 96.00 and the contract has a nominal value of 1 million dol
Provide non-buggy software for the client : Program with a role that is not Security then security should be alerted with the employee's name - implementing the above programs in an Object Oriented
What coupon rate should be applied to the new bonds : The company evaluates the potential of issuing a third bond that pays an annual coupon of $35, What coupon rate should be applied to the new bonds
Calculate the npv of venture : Windstar Enterprises is considering a new business venture. You are the newly hired financial analyst who must examine the viability of this venture.
Financing and investing decisions : You believe that both financing and investing decisions contain new information of firm value perceived by the investors. Thus, stock price reacts positively or
Describe a potential ethical issue : Briefly identify and describe a potential ethical issue that may arise from Joan's apparent minimal knowledge or experience with investing and overall disintere

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Computerized operating systems

Computerized Operating Systems (OS) are almost everywhere. We encounter them when we use our laptop or desktop computer.

  Positioning in the market is morally wrong

For example, you may hold the moral position that Uber is morally justifiable because it provides a good for consumers that fills in a gap that had not been met by the taxi industry. Or you may take the position that Uber's positioning in the mark..

  Find the marginal cost

Business The controller for an electronics company has used the production figures for the last few months to determine that the function c(x) = -9x5 + 135x3 + 10,000 approximates the cost of producing x thousands of one of their products.

  Complexity impacts human experiences

Complexity is increasing as new technologies are emerging every day. This complexity impacts human experiences.

  What is universal design and multi-modal system

What is Universal design and Multi-modal system? and how does the self driving cars relate or meet the Universal design and Multi-modal design requirement

  Communication and team decision making

What are some of the possible biases and points of error that may arise in team communication systems? What are the key symptoms of groupthink?

  How would you define collaboration

Identify three recommendations that should be followed when using a corporate blog to improve an organization's image.

  Draw a map showing the interactions

The landlord has a number of alternatives for increasing his profits (attracting more customers, increasing prices, getting customers to spend more etc.) but each of these leads to a string of other effects. Draw a map showing the interactions for..

  Open web application security project

The Open Web Application Security Project (OWASP) provides a distillation of several of the most well known sets of computer security principles;

  Networks and personal computers

Networks and personal computers are under continuous assault from hackers. The types of attacks vary widely in complexity and severity.

  Explain a pro or a con in a computer

Since the beginning, computers have trended to larger word sizes, 8 to 16 to 32 and now some 64 bit computers. Explain a pro or a con in a computer with a larger word size, or comment on someone else's pro or con.

  Implement a producer-consumer framework in open mp

Implement a producer-consumer framework in Open MP using sections to create a single producer task and a single consumer task. Ensure appropriate synchronization using locks.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd