Assume you are working for a company and given the task to build an Email Registration Program. The email registration program functions as follows. ● ● Prompt the user four things: first name, last name, security question answer, and birthyear. O Example: Enter first name: LeBron Enter last name: James (Security Question) Favorite car maker: Bentley Enter birth year: 1984 Generate a default Kean email address based on the first name and last name. O The default Kean email address consists of the first letter of the first name, a period, the entire last name all in lower case appended with @kean.edu. O Example: LeBron James →1.james@kean.edu Generate a default password based on the first name, security question answer, and birthyear. O The default password is a sequence of 3 letters from last name, birthyear, and 3 letters from the security question answer all in upper case. O Example: LeBron, 1984, Bentley → LEB1984BEN Display the email information with first name, last name, email address, and password. O Example: LeBron James Kean email: l.james@kean.edu Kean password: LEB1984BEN 1. [Communications and Facilitating Teamwork] Assume you are the team leader with 4 team members to build this program where you use the divide-and-conquer strategy, (also known as stepwise refinement) to decompose this into subproblems where subproblems can be implemented using a method. Based on the structure chart in Figure 1, the code with method headers in Figure 2, and the sample runs in Figure 3, how would you explain to your team members on how to build this program. (See Rubric) For each below, specify in no more than three sentences, A. what each method should do including the main method, B. what arguments (or value) are passed from the main method to all the other methods, C. what should the return values be coming back to the main method. Note: You are using overloading methods (i.e., same method name with different parameter lists)
Assume you are working for a company and given the task to build an Email Registration Program. The email registration program functions as follows. ● ● Prompt the user four things: first name, last name, security question answer, and birthyear. O Example: Enter first name: LeBron Enter last name: James (Security Question) Favorite car maker: Bentley Enter birth year: 1984 Generate a default Kean email address based on the first name and last name. O The default Kean email address consists of the first letter of the first name, a period, the entire last name all in lower case appended with @kean.edu. O Example: LeBron James →1.james@kean.edu Generate a default password based on the first name, security question answer, and birthyear. O The default password is a sequence of 3 letters from last name, birthyear, and 3 letters from the security question answer all in upper case. O Example: LeBron, 1984, Bentley → LEB1984BEN Display the email information with first name, last name, email address, and password. O Example: LeBron James Kean email: l.james@kean.edu Kean password: LEB1984BEN 1. [Communications and Facilitating Teamwork] Assume you are the team leader with 4 team members to build this program where you use the divide-and-conquer strategy, (also known as stepwise refinement) to decompose this into subproblems where subproblems can be implemented using a method. Based on the structure chart in Figure 1, the code with method headers in Figure 2, and the sample runs in Figure 3, how would you explain to your team members on how to build this program. (See Rubric) For each below, specify in no more than three sentences, A. what each method should do including the main method, B. what arguments (or value) are passed from the main method to all the other methods, C. what should the return values be coming back to the main method. Note: You are using overloading methods (i.e., same method name with different parameter lists)
Database System Concepts
7th Edition
ISBN:9780078022159
Author:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Chapter1: Introduction
Section: Chapter Questions
Problem 1PE
Related questions
Question
Expert Solution
This question has been solved!
Explore an expertly crafted, step-by-step solution for a thorough understanding of key concepts.
This is a popular solution!
Trending now
This is a popular solution!
Step by step
Solved in 4 steps with 4 images
Knowledge Booster
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, computer-science and related others by exploring similar questions and additional content below.Recommended textbooks for you
Database System Concepts
Computer Science
ISBN:
9780078022159
Author:
Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:
McGraw-Hill Education
Starting Out with Python (4th Edition)
Computer Science
ISBN:
9780134444321
Author:
Tony Gaddis
Publisher:
PEARSON
Digital Fundamentals (11th Edition)
Computer Science
ISBN:
9780132737968
Author:
Thomas L. Floyd
Publisher:
PEARSON
Database System Concepts
Computer Science
ISBN:
9780078022159
Author:
Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:
McGraw-Hill Education
Starting Out with Python (4th Edition)
Computer Science
ISBN:
9780134444321
Author:
Tony Gaddis
Publisher:
PEARSON
Digital Fundamentals (11th Edition)
Computer Science
ISBN:
9780132737968
Author:
Thomas L. Floyd
Publisher:
PEARSON
C How to Program (8th Edition)
Computer Science
ISBN:
9780133976892
Author:
Paul J. Deitel, Harvey Deitel
Publisher:
PEARSON
Database Systems: Design, Implementation, & Manag…
Computer Science
ISBN:
9781337627900
Author:
Carlos Coronel, Steven Morris
Publisher:
Cengage Learning
Programmable Logic Controllers
Computer Science
ISBN:
9780073373843
Author:
Frank D. Petruzella
Publisher:
McGraw-Hill Education