Assume you are working for a company and given the task to build an Email Registration Program. The email registration program functions as follows. • Prompt the user four things: first name, last name, security question answer, and birthyear. o Example: Enter first name: LeBron Enter last name: James (Security Question) Favorite car maker: Bentley Enter birth year: 1984 • Generate a default Kean email address based on the first name and last name. o The default Kean email address consists of the first letter of the first name, a period, the entire last name all in lower case appended with @kean.edu. o Example: LeBron James → l.james@kean.edu • Generate a default password based on the first name, security question answer, and birthyear. o The default password is a sequence of 3 letters from last name, birthyear, and 3 letters from the security question answer all in upper case. o Example: LeBron, 1984, Bentley → LEB1984BEN • Display the email information with first name, last name, email address, and password. o Example: LeBron James Kean email: l.james@kean.edu Kean password: LEB1984BEN 1. (Communications and Facilitating Teamwork) Assume you are the team leader with 4 team members to build this program where you use the divide-and-conquer strategy, (also known as stepwise refinement) to decompose this into subproblems where subproblems can be implemented using a method. Based on the structure chart in Figure 1, the code with method headers in Figure 2, and the sample runs in Figure 3, how would you explain to your team members on how to build this program. (See Rubric) For each below, specify in no more than three sentences, A) what each method should do including the main method, B) what arguments (or value) are passed from the main method to all the other methods, C) what should the return values be coming back to the main method. Note: You are using overloading methods (i.e., same method name with different parameter lists)   2. (Implementation) Code the main method and the overloaded method, defaultInfo, as shown in Figure 2. Run it two times to check if the program works. (Useful Hints on the next page)

Database System Concepts
7th Edition
ISBN:9780078022159
Author:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Chapter1: Introduction
Section: Chapter Questions
Problem 1PE
icon
Related questions
Question

Assume you are working for a company and given the task to build an Email Registration Program. The
email registration program functions as follows.
• Prompt the user four things: first name, last name, security question answer, and birthyear.
o Example:
Enter first name: LeBron
Enter last name: James
(Security Question) Favorite car maker: Bentley
Enter birth year: 1984
• Generate a default Kean email address based on the first name and last name.
o The default Kean email address consists of the first letter of the first name, a period, the
entire last name all in lower case appended with @kean.edu.
o Example: LeBron James → l.james@kean.edu
• Generate a default password based on the first name, security question answer, and birthyear.
o The default password is a sequence of 3 letters from last name, birthyear, and 3 letters
from the security question answer all in upper case.
o Example: LeBron, 1984, Bentley → LEB1984BEN
• Display the email information with first name, last name, email address, and password.
o Example:
LeBron James
Kean email: l.james@kean.edu
Kean password: LEB1984BEN


1. (Communications and Facilitating Teamwork) Assume you are the team leader with 4 team
members to build this program where you use the divide-and-conquer strategy, (also known as
stepwise refinement) to decompose this into subproblems where subproblems can be implemented
using a method. Based on the structure chart in Figure 1, the code with method headers in Figure 2,
and the sample runs in Figure 3, how would you explain to your team members on how to build this
program. (See Rubric)
For each below, specify in no more than three sentences,
A) what each method should do including the main method,
B) what arguments (or value) are passed from the main method to all the other methods,
C) what should the return values be coming back to the main method.
Note: You are using overloading methods (i.e., same method name with different parameter lists)

 

2. (Implementation) Code the main method and the overloaded method, defaultInfo, as shown in
Figure 2. Run it two times to check if the program works. (Useful Hints on the next page)

Assume you are working for a company and given the task to build an Email Registration Program. The
email registration program functions as follows.
Prompt the user four things: first name, last name, security question answer, and birthyear.
o Example:
●
Enter first name: LeBron
Enter last name: James
(Security Question) Favorite car maker: Bentley
Enter birth year: 1984
Generate a default Kean email address based on the first name and last name.
o The default Kean email address consists of the first letter of the first name, a period, the
entire last name all in lower case appended with @kean.edu.
Example: LeBron James →l.james@kean.edu
Generate a default password based on the first name, security question answer, and birthyear.
o The default password is a sequence of 3 letters from last name, birthyear, and 3 letters
from the security question answer all in upper case.
Example: LeBron, 1984, Bentley → LEB1984BEN
Display the email information with first name, last name, email address, and password.
o Example:
LeBron James
Kean email: l.james@kean.edu
Kean password: LEB1984BEN
1. (Communications and Facilitating Teamwork) Assume you are the team leader with 4 team
members to build this program where you use the divide-and-conquer strategy, (also known as
stepwise refinement) to decompose this into subproblems where subproblems can be implemented
using a method. Based on the structure chart in Figure 1, the code with method headers in Figure 2,
and the sample runs in Figure 3, how would you explain to your team members on how to build this
program. (See Rubric)
For each below, specify in no more than three sentences,
A) what each method should do including the main method,
B) what arguments (or value) are passed from the main method to all the other methods,
C) what should the return values be coming back to the main method.
Note: You are using overloading methods (i.e., same method name with different parameter lists)
Transcribed Image Text:Assume you are working for a company and given the task to build an Email Registration Program. The email registration program functions as follows. Prompt the user four things: first name, last name, security question answer, and birthyear. o Example: ● Enter first name: LeBron Enter last name: James (Security Question) Favorite car maker: Bentley Enter birth year: 1984 Generate a default Kean email address based on the first name and last name. o The default Kean email address consists of the first letter of the first name, a period, the entire last name all in lower case appended with @kean.edu. Example: LeBron James →l.james@kean.edu Generate a default password based on the first name, security question answer, and birthyear. o The default password is a sequence of 3 letters from last name, birthyear, and 3 letters from the security question answer all in upper case. Example: LeBron, 1984, Bentley → LEB1984BEN Display the email information with first name, last name, email address, and password. o Example: LeBron James Kean email: l.james@kean.edu Kean password: LEB1984BEN 1. (Communications and Facilitating Teamwork) Assume you are the team leader with 4 team members to build this program where you use the divide-and-conquer strategy, (also known as stepwise refinement) to decompose this into subproblems where subproblems can be implemented using a method. Based on the structure chart in Figure 1, the code with method headers in Figure 2, and the sample runs in Figure 3, how would you explain to your team members on how to build this program. (See Rubric) For each below, specify in no more than three sentences, A) what each method should do including the main method, B) what arguments (or value) are passed from the main method to all the other methods, C) what should the return values be coming back to the main method. Note: You are using overloading methods (i.e., same method name with different parameter lists)
String, String
defaultInfo (emai)
Method Body
}
String
String, String, int
Enter first name: LeBron
Enter last name: James
=========
main
Method Body
}
// email registration method (Overloading methods)
public static String defaultInfo(String first, String last) {
}
LeBron James
Kean email: 1.james@kean.edu
Kean password: LEB1984BEN
String
defaultInfo (password)
Method Body
public static void main(String[] args) {
// Declare variables
// Prompt user: firstname, lastname, birthyear, security question
// call email registration method
// call password method
// call result screen method
Figure 1. Structure chart
// password method (Overloading methods)
public static String defaultInfo(String last, String question, int year) {
}
// result screen method
public static void resultScreen(String first, String last, String email, String pw) {
========");
System.out.println("==========
System.out.println(first + " " + last);
System.out.println("Kean email: " + email);
System.out.println("Kean password: " + password);
System.out.println(":
======
(Security Question) Favorite car maker: Bentley
Enter birth year: 1984.
String, String, String, String
Figure 2. Method headers
resultScreen
Method Body
Figure 3. Sample Runs
");
Enter first name: Elon
Enter last name: Musk
(Security Question) Favorite car maker: Tesla
Enter birth year: 1971
=======
Elon Musk
Kean email: e.musk@kean.edu
Kean password: ELO1971TES
=========
2. (Implementation) Code the main method and the overloaded method, defaultInfo, as shown in
Figure 2. Run it two times to check if the program works. (Useful Hints on the next page)
Transcribed Image Text:String, String defaultInfo (emai) Method Body } String String, String, int Enter first name: LeBron Enter last name: James ========= main Method Body } // email registration method (Overloading methods) public static String defaultInfo(String first, String last) { } LeBron James Kean email: 1.james@kean.edu Kean password: LEB1984BEN String defaultInfo (password) Method Body public static void main(String[] args) { // Declare variables // Prompt user: firstname, lastname, birthyear, security question // call email registration method // call password method // call result screen method Figure 1. Structure chart // password method (Overloading methods) public static String defaultInfo(String last, String question, int year) { } // result screen method public static void resultScreen(String first, String last, String email, String pw) { ========"); System.out.println("========== System.out.println(first + " " + last); System.out.println("Kean email: " + email); System.out.println("Kean password: " + password); System.out.println(": ====== (Security Question) Favorite car maker: Bentley Enter birth year: 1984. String, String, String, String Figure 2. Method headers resultScreen Method Body Figure 3. Sample Runs "); Enter first name: Elon Enter last name: Musk (Security Question) Favorite car maker: Tesla Enter birth year: 1971 ======= Elon Musk Kean email: e.musk@kean.edu Kean password: ELO1971TES ========= 2. (Implementation) Code the main method and the overloaded method, defaultInfo, as shown in Figure 2. Run it two times to check if the program works. (Useful Hints on the next page)
Expert Solution
trending now

Trending now

This is a popular solution!

steps

Step by step

Solved in 3 steps with 1 images

Blurred answer
Knowledge Booster
Reference Types in Function
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, computer-science and related others by exploring similar questions and additional content below.
Similar questions
Recommended textbooks for you
Database System Concepts
Database System Concepts
Computer Science
ISBN:
9780078022159
Author:
Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:
McGraw-Hill Education
Starting Out with Python (4th Edition)
Starting Out with Python (4th Edition)
Computer Science
ISBN:
9780134444321
Author:
Tony Gaddis
Publisher:
PEARSON
Digital Fundamentals (11th Edition)
Digital Fundamentals (11th Edition)
Computer Science
ISBN:
9780132737968
Author:
Thomas L. Floyd
Publisher:
PEARSON
C How to Program (8th Edition)
C How to Program (8th Edition)
Computer Science
ISBN:
9780133976892
Author:
Paul J. Deitel, Harvey Deitel
Publisher:
PEARSON
Database Systems: Design, Implementation, & Manag…
Database Systems: Design, Implementation, & Manag…
Computer Science
ISBN:
9781337627900
Author:
Carlos Coronel, Steven Morris
Publisher:
Cengage Learning
Programmable Logic Controllers
Programmable Logic Controllers
Computer Science
ISBN:
9780073373843
Author:
Frank D. Petruzella
Publisher:
McGraw-Hill Education