Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

CREATE C CODES ONLY AND CAN USE TO RUN BY USING FLOWCHART AND ALGORITHM GIVEN BELOW. IF CANNOT RUN, I GIVE THUMB DOWN. Example: alar

CREATE C CODES ONLY AND CAN USE TO RUN BY USING FLOWCHART AND ALGORITHM GIVEN BELOW. IF CANNOT RUN, I GIVE THUMB DOWN. image text in transcribedimage text in transcribedimage text in transcribed

Example: alar Example (explain the problem): one of the major problems faced by safety box user is forget their preset password. As a result, sometimes, user unable to unlock their safety box and need to damage it to get belongings kept inside the safety box. Example solution propose: to replace the conventional safety box with a programmable safety box system. The system enable user to recall back their password (e.g asking several safety questions to before display the user preset password). Your task is to design the complete solution (flowchart, algorithm, c-codes). Your tasks: 1. FIND any engineering problem (e.g. a clear figure to show the problem) 2. EXPLAIN the problem based on the selected figure. 3. PROPOSE a solution to solve the problem (flowchart, algorithm, c-codes). Flowchart: What is your favourite color? Who is your childhood favorite hero? What is the name of the town where you were born? Security Questions Set Safety Box Preset Password Answer Security questions Enter the password Yes Nol If preset password and entered password match Valid Password Invalid Password Logged on Successfully Algorithm: 1. Some common security questions along with answers. 2. Set the Safety box preset password 3. Password characters must be between 10 to 20 characters. 4. password must include lower case and upper case letters. 5. Password must include symbols, special characters. 6. Set the password 7. If the user wants to open the safety box, he/she must enter the password. 8. If preset password and the entered password match each other, then the password is valid. 9. The user can logged on successfully. 10. If preset password and the entered password did not match each other, then the password is invalid. 11. Then loop back to answer the security questions. 12. If the answered security questions matches, then the user can login. No need to damage the safety box to get the belongings

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Graph Databases In Action

Authors: Dave Bechberger, Josh Perryman

1st Edition

1617296376, 978-1617296376

More Books

Students also viewed these Databases questions