Answered step by step
Verified Expert Solution
Question
1 Approved Answer
CREATE C CODES ONLY AND CAN USE TO RUN BY USING FLOWCHART AND ALGORITHM GIVEN BELOW. IF CANNOT RUN, I GIVE THUMB DOWN. Example: alar
CREATE C CODES ONLY AND CAN USE TO RUN BY USING FLOWCHART AND ALGORITHM GIVEN BELOW. IF CANNOT RUN, I GIVE THUMB DOWN.
Example: alar Example (explain the problem): one of the major problems faced by safety box user is forget their preset password. As a result, sometimes, user unable to unlock their safety box and need to damage it to get belongings kept inside the safety box. Example solution propose: to replace the conventional safety box with a programmable safety box system. The system enable user to recall back their password (e.g asking several safety questions to before display the user preset password). Your task is to design the complete solution (flowchart, algorithm, c-codes). Your tasks: 1. FIND any engineering problem (e.g. a clear figure to show the problem) 2. EXPLAIN the problem based on the selected figure. 3. PROPOSE a solution to solve the problem (flowchart, algorithm, c-codes). Flowchart: What is your favourite color? Who is your childhood favorite hero? What is the name of the town where you were born? Security Questions Set Safety Box Preset Password Answer Security questions Enter the password Yes Nol If preset password and entered password match Valid Password Invalid Password Logged on Successfully Algorithm: 1. Some common security questions along with answers. 2. Set the Safety box preset password 3. Password characters must be between 10 to 20 characters. 4. password must include lower case and upper case letters. 5. Password must include symbols, special characters. 6. Set the password 7. If the user wants to open the safety box, he/she must enter the password. 8. If preset password and the entered password match each other, then the password is valid. 9. The user can logged on successfully. 10. If preset password and the entered password did not match each other, then the password is invalid. 11. Then loop back to answer the security questions. 12. If the answered security questions matches, then the user can login. No need to damage the safety box to get the belongingsStep by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started