Acompany has hired you to develop an application to generate passwords for their employees’ accounts. The application prompts the user to provide one single line of text with an employee’s full name in the following format “forename surname” at a time. (Please note that you are not required to validate the input, we assume that the input is well-formed.) Next, the application uses the given full name to create the corresponding item. Note that the application should work irrespective of how the user provides the full name i.e. using upper-case letters, lower-case letters, or a combination of both upper-case and lower-case letters. You should use the full name as provided i.e. you should not modify the given full name to a different letter case. Assigned Item Rules to Create the Item Examples (given full name and corresponding item that should be created) password The password is created using the following rules: • The letters ‘a’, ’e’, and ‘t’ from the given full name will not be used in the password • Each vowel (except ‘a’ and ‘e’ which are eliminated) is going to be added twice • Each space is replaced by the letter ‘S’ followed by a ‘&’ and a ‘?’ • All the other characters will remain the same as in the given full name • The password ends with the total number of letters eliminated (i.e. the total number of letters ‘a’, ’e’, and ‘t’ from the given full name that were not used in the password) For example, if the instantiable class receives: • The full name “JANE dOe" then the compute method should create the password “JNS&?dOO3” (note that 3 is the total number of letters eliminated i.e. as the letters ‘a’ and ‘e’ from the given full name were not used in the password) • The full name “Conor MUrphy" then the compute method should create the password “coonOOrS&?MUUrphy0” (note that 0 is the total number of letters eliminated i.e. as the given full name did not contain any of the letters ‘a’, ‘e’, or ‘t’) Ask the user at the beginning of the application how many items they would like to create, and ensure that the application enables the user to provide that number of full names and for each full name create the corresponding password. The source code should be commented throughout highlighting and explaining where the key functionality is being a

Database System Concepts
7th Edition
ISBN:9780078022159
Author:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Chapter1: Introduction
Section: Chapter Questions
Problem 1PE
icon
Related questions
Question

Please do not give solution in image format thanku

Acompany has hired you to develop an application to generate passwords for their employees’ accounts. The application prompts the user to provide one single line of text with an employee’s full name in the following format “forename surname” at a time. (Please note that you are not required to validate the input, we assume that the input is well-formed.) Next, the application uses the given full name to create the corresponding item. Note that the application should work irrespective of how the user provides the full name i.e. using upper-case letters, lower-case letters, or a combination of both upper-case and lower-case letters. You should use the full name as provided i.e. you should not modify the given full name to a different letter case. Assigned Item Rules to Create the Item Examples (given full name and corresponding item that should be created) password The password is created using the following rules: • The letters ‘a’, ’e’, and ‘t’ from the given full name will not be used in the password • Each vowel (except ‘a’ and ‘e’ which are eliminated) is going to be added twice • Each space is replaced by the letter ‘S’ followed by a ‘&’ and a ‘?’ • All the other characters will remain the same as in the given full name • The password ends with the total number of letters eliminated (i.e. the total number of letters ‘a’, ’e’, and ‘t’ from the given full name that were not used in the password) For example, if the instantiable class receives: • The full name “JANE dOe" then the compute method should create the password “JNS&?dOO3” (note that 3 is the total number of letters eliminated i.e. as the letters ‘a’ and ‘e’ from the given full name were not used in the password) • The full name “Conor MUrphy" then the compute method should create the password “coonOOrS&?MUUrphy0” (note that 0 is the total number of letters eliminated i.e. as the given full name did not contain any of the letters ‘a’, ‘e’, or ‘t’) Ask the user at the beginning of the application how many items they would like to create, and ensure that the application enables the user to provide that number of full names and for each full name create the corresponding password. The source code should be commented throughout highlighting and explaining where the key functionality is being addressed in c# only

 
 
Expert Solution
steps

Step by step

Solved in 4 steps with 4 images

Blurred answer
Knowledge Booster
Data Binding
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, computer-science and related others by exploring similar questions and additional content below.
Similar questions
  • SEE MORE QUESTIONS
Recommended textbooks for you
Database System Concepts
Database System Concepts
Computer Science
ISBN:
9780078022159
Author:
Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:
McGraw-Hill Education
Starting Out with Python (4th Edition)
Starting Out with Python (4th Edition)
Computer Science
ISBN:
9780134444321
Author:
Tony Gaddis
Publisher:
PEARSON
Digital Fundamentals (11th Edition)
Digital Fundamentals (11th Edition)
Computer Science
ISBN:
9780132737968
Author:
Thomas L. Floyd
Publisher:
PEARSON
C How to Program (8th Edition)
C How to Program (8th Edition)
Computer Science
ISBN:
9780133976892
Author:
Paul J. Deitel, Harvey Deitel
Publisher:
PEARSON
Database Systems: Design, Implementation, & Manag…
Database Systems: Design, Implementation, & Manag…
Computer Science
ISBN:
9781337627900
Author:
Carlos Coronel, Steven Morris
Publisher:
Cengage Learning
Programmable Logic Controllers
Programmable Logic Controllers
Computer Science
ISBN:
9780073373843
Author:
Frank D. Petruzella
Publisher:
McGraw-Hill Education