Question 1: Write the pseudocode for each of the modules identified in the following data flow diagram:
=============================================
----------------------------------
PSEUDOCODE for Staff module
----------------------------------
BEGIN
DISPLAY "STAFF Login"
DISPLAY "Enter User Name"
READ userName
DISPLAY "Enter Password"
READ password
result = CALL REQUEST_AUTHENTICITY
IF result EUQAL TO Approval
DISPLAY "Logged IN"
ELSE IF result EQUAL To Login_Dennied
DISPLAY "Login Denied"
END
---------------------------------
REQUEST_AUTHENTICITY Module
---------------------------------
BIGIN REQUEST_AUTHENTICITY(userName,password)
CHECK in RAPID_Help_Desk_database
IF IS_Valid_Login
RETURN Approved
ELSE
RETURN Login_Denied
END IF
END REQUEST_AUTHENTICITY
----------------------------------
PSEUDOCODE for Help Desk STAFF module
----------------------------------
BEGIN
DISPLAY "Help Desk Login"
DISPLAY "Enter User Name"
READ userName
DISPLAY "Enter Password"
READ password
result = CALL REQUEST_AUTHENTICITY
IF result EUQAL TO Approval
DISPLAY "Logged IN"
ELSE IF result EQUAL To Login_Dennied
DISPLAY "Login Denied"
DISPLAY "Failed Authetication"
END
----------------------------------
PSEUDOCODE for Administrator Login
----------------------------------
BEGIN
DISPLAY "Administrator Login"
DISPLAY "Enter User Name"
READ userName
DISPLAY "Enter Password"
READ password
result = CALL REQUEST_AUTHENTICITY
IF result EUQAL TO Approval
DISPLAY "Logged IN"
ELSE IF result EQUAL To Login_Dennied
DISPLAY "Login Denied"
END
=============================================
Question 1: Write the pseudocode for each of the modules identified in the following data flow...
I need help ASAP on this, this is due at midnight PST. This is the current code I have. How can I allow the user to quit. My counting while loop works fine, but I would like it to not keep outputting username if a file was successfully opened. This is what is required. Prompt You have assumed the role of managing the technology infrastructure at a zoo. You will develop a working program (either an authentication system or a...
write a code on .C file Problem Write a C program to implement a banking application system. The program design must use a main and the below functions only. The program should use the below three text files that contain a set of lines. Sample data of these files are provided with the assessment. Note that you cannot use the library string.h to manipulate string variables. For the file operations and manipulations, you can use only the following functions: fopen(),...
1) analyze the following case 2) give a summary and suggest ways for the company —————— Salesforce.com, one of the most disruptive technology companies of the past few years, has single-handedly shaken up the software industry with its innovative business model and resounding success. Salesforce provides customer relationship management (CRM) and other application software solutions in the form of software as a service leased over the Internet, as opposed to software bought and installed on machines locally. The company was...
How can we assess whether a project is a success or a failure? This case presents two phases of a large business transformation project involving the implementation of an ERP system with the aim of creating an integrated company. The case illustrates some of the challenges associated with integration. It also presents the obstacles facing companies that undertake projects involving large information technology projects. Bombardier and Its Environment Joseph-Armand Bombardier was 15 years old when he built his first snowmobile...