Assume you are working for a company and given the task to build an Email Registration Program. The email registration program functions as follows. ● ● Prompt the user four things: first name, last name, security question answer, and birthyear. O Example: Enter first name: LeBron Enter last name: James (Security Question) Favorite car maker: Bentley Enter birth year: 1984 Generate a default Kean email address based on the first name and last name. O The default Kean email address consists of the first letter of the first name, a period, the entire last name all in lower case appended with @kean.edu. O Example: LeBron James →1.james@kean.edu Generate a default password based on the first name, security question answer, and birthyear. O The default password is a sequence of 3 letters from last name, birthyear, and 3 letters from the security question answer all in upper case. O Example: LeBron, 1984, Bentley → LEB1984BEN Display the email information with first name, last name, email address, and password. O Example: LeBron James Kean email: l.james@kean.edu Kean password: LEB1984BEN 1. [Communications and Facilitating Teamwork] Assume you are the team leader with 4 team members to build this program where you use the divide-and-conquer strategy, (also known as stepwise refinement) to decompose this into subproblems where subproblems can be implemented using a method. Based on the structure chart in Figure 1, the code with method headers in Figure 2, and the sample runs in Figure 3, how would you explain to your team members on how to build this program. (See Rubric) For each below, specify in no more than three sentences, A. what each method should do including the main method, B. what arguments (or value) are passed from the main method to all the other methods, C. what should the return values be coming back to the main method. Note: You are using overloading methods (i.e., same method name with different parameter lists)
Assume you are working for a company and given the task to build an Email Registration Program. The email registration program functions as follows. ● ● Prompt the user four things: first name, last name, security question answer, and birthyear. O Example: Enter first name: LeBron Enter last name: James (Security Question) Favorite car maker: Bentley Enter birth year: 1984 Generate a default Kean email address based on the first name and last name. O The default Kean email address consists of the first letter of the first name, a period, the entire last name all in lower case appended with @kean.edu. O Example: LeBron James →1.james@kean.edu Generate a default password based on the first name, security question answer, and birthyear. O The default password is a sequence of 3 letters from last name, birthyear, and 3 letters from the security question answer all in upper case. O Example: LeBron, 1984, Bentley → LEB1984BEN Display the email information with first name, last name, email address, and password. O Example: LeBron James Kean email: l.james@kean.edu Kean password: LEB1984BEN 1. [Communications and Facilitating Teamwork] Assume you are the team leader with 4 team members to build this program where you use the divide-and-conquer strategy, (also known as stepwise refinement) to decompose this into subproblems where subproblems can be implemented using a method. Based on the structure chart in Figure 1, the code with method headers in Figure 2, and the sample runs in Figure 3, how would you explain to your team members on how to build this program. (See Rubric) For each below, specify in no more than three sentences, A. what each method should do including the main method, B. what arguments (or value) are passed from the main method to all the other methods, C. what should the return values be coming back to the main method. Note: You are using overloading methods (i.e., same method name with different parameter lists)
C++ Programming: From Problem Analysis to Program Design
8th Edition
ISBN:9781337102087
Author:D. S. Malik
Publisher:D. S. Malik
Chapter16: Searching, Sorting And Vector Type
Section: Chapter Questions
Problem 23PE
Related questions
Question
![Assume you are working for a company and given the task to build an Email Registration Program. The email
registration program functions as follows.
1.
Prompt the user four things: first name, last name, security question answer, and birthyear.
O
Example:
Enter first name: LeBron
Enter last name: James
(Security Question) Favorite car maker: Bentley
Enter birth year: 1984
● Generate a default Kean email address based on the first name and last name.
O
●
The default Kean email address consists of the first letter of the first name, a period, the entire
last name all in lower case appended with @kean.edu.
Example: LeBron James →l.james@kean.edu
O
Generate a default password based on the first name, security question answer, and birthyear.
O
The default password is a sequence of 3 letters from last name, birthyear, and 3 letters from the
security question answer all in upper case.
O
Example: LeBron, 1984, Bentley → LEB1984BEN
Display the email information with first name, last name, email address, and password.
Example:
LeBron James
Kean email: l.james@kean.edu
Kean password: LEB1984BEN
[Communications and Facilitating Teamwork] Assume you are the team leader with 4 team members to build
this program where you use the divide-and-conquer strategy, (also known as stepwise refinement) to
decompose this into subproblems where subproblems can be implemented using a method. Based on the
structure chart in Figure 1, the code with method headers in Figure 2, and the sample runs in Figure 3, how
would you explain to your team members on how to build this program. (See Rubric)
For each below, specify in no more than three sentences,
A. what each method should do including the main method,
B. what arguments (or value) are passed from the main method to all the other methods,
C. what should the return values be coming back to the main method.
Note: You are using overloading methods (i.e., same method name with different parameter lists)](/v2/_next/image?url=https%3A%2F%2Fcontent.bartleby.com%2Fqna-images%2Fquestion%2Fbfd0f760-2f1d-42e3-988d-506bce544ea6%2F614a3bf2-fb35-46b9-8474-6aea009dfdb3%2Flqqtgx8_processed.png&w=3840&q=75)
Transcribed Image Text:Assume you are working for a company and given the task to build an Email Registration Program. The email
registration program functions as follows.
1.
Prompt the user four things: first name, last name, security question answer, and birthyear.
O
Example:
Enter first name: LeBron
Enter last name: James
(Security Question) Favorite car maker: Bentley
Enter birth year: 1984
● Generate a default Kean email address based on the first name and last name.
O
●
The default Kean email address consists of the first letter of the first name, a period, the entire
last name all in lower case appended with @kean.edu.
Example: LeBron James →l.james@kean.edu
O
Generate a default password based on the first name, security question answer, and birthyear.
O
The default password is a sequence of 3 letters from last name, birthyear, and 3 letters from the
security question answer all in upper case.
O
Example: LeBron, 1984, Bentley → LEB1984BEN
Display the email information with first name, last name, email address, and password.
Example:
LeBron James
Kean email: l.james@kean.edu
Kean password: LEB1984BEN
[Communications and Facilitating Teamwork] Assume you are the team leader with 4 team members to build
this program where you use the divide-and-conquer strategy, (also known as stepwise refinement) to
decompose this into subproblems where subproblems can be implemented using a method. Based on the
structure chart in Figure 1, the code with method headers in Figure 2, and the sample runs in Figure 3, how
would you explain to your team members on how to build this program. (See Rubric)
For each below, specify in no more than three sentences,
A. what each method should do including the main method,
B. what arguments (or value) are passed from the main method to all the other methods,
C. what should the return values be coming back to the main method.
Note: You are using overloading methods (i.e., same method name with different parameter lists)
Expert Solution
![](/static/compass_v2/shared-icons/check-mark.png)
This question has been solved!
Explore an expertly crafted, step-by-step solution for a thorough understanding of key concepts.
This is a popular solution!
Trending now
This is a popular solution!
Step by step
Solved in 4 steps with 4 images
![Blurred answer](/static/compass_v2/solution-images/blurred-answer.jpg)
Knowledge Booster
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, computer-science and related others by exploring similar questions and additional content below.Recommended textbooks for you
![C++ Programming: From Problem Analysis to Program…](https://www.bartleby.com/isbn_cover_images/9781337102087/9781337102087_smallCoverImage.gif)
C++ Programming: From Problem Analysis to Program…
Computer Science
ISBN:
9781337102087
Author:
D. S. Malik
Publisher:
Cengage Learning
![EBK JAVA PROGRAMMING](https://www.bartleby.com/isbn_cover_images/9781337671385/9781337671385_smallCoverImage.jpg)
EBK JAVA PROGRAMMING
Computer Science
ISBN:
9781337671385
Author:
FARRELL
Publisher:
CENGAGE LEARNING - CONSIGNMENT
![C++ Programming: From Problem Analysis to Program…](https://www.bartleby.com/isbn_cover_images/9781337102087/9781337102087_smallCoverImage.gif)
C++ Programming: From Problem Analysis to Program…
Computer Science
ISBN:
9781337102087
Author:
D. S. Malik
Publisher:
Cengage Learning
![EBK JAVA PROGRAMMING](https://www.bartleby.com/isbn_cover_images/9781337671385/9781337671385_smallCoverImage.jpg)
EBK JAVA PROGRAMMING
Computer Science
ISBN:
9781337671385
Author:
FARRELL
Publisher:
CENGAGE LEARNING - CONSIGNMENT