Design a suitable Activity diagram with appropriate explanation based on the given case study: As a consultant, you are asked to design a class that handles login and security for an application. The basic functions of the class are: The user must first enter a valid login name. The system checks to see that the name is valid before asking for a password. If it is not valid, the user can either exit (cancel) or re- enter the name. The user then must enter the password associated with the name. The system validates that the password is the appropriate one for the login name. If the password is invalid, the user can either cancel and exit, re-enter the password, or go back to the first step and re-enter the login name. The user selects a function. The system validates that the function is one that the user is allowed to do. If not, the user can either exit, or enter a new function.
Design a suitable Activity diagram with appropriate explanation based on the given case study: As a consultant, you are asked to design a class that handles login and security for an application. The basic functions of the class are: The user must first enter a valid login name. The system checks to see that the name is valid before asking for a password. If it is not valid, the user can either exit (cancel) or re- enter the name. The user then must enter the password associated with the name. The system validates that the password is the appropriate one for the login name. If the password is invalid, the user can either cancel and exit, re-enter the password, or go back to the first step and re-enter the login name. The user selects a function. The system validates that the function is one that the user is allowed to do. If not, the user can either exit, or enter a new function.
Chapter4: More Object Concepts
Section: Chapter Questions
Problem 5RQ
Related questions
Topic Video
Question
USING JAVA
![QUESTION 2:
Design a suitable Activity diagram with appropriate explanation based on the given case
study:
As a consultant, you are asked to design a class that handles login and security for an application.
The basic functions of the class are:
The user must first enter a valid login name. The system checks to see that the name is
valid before asking for a password. If it is not valid, the user can either exit (cancel) or re-
enter the name.
The user then must enter the password associated with the name. The system validates that
the password is the appropriate one for the login name. If the password is invalid, the user
can either cancel and exit, re-enter the password, or go back to the first step and re-enter
the login name.
The user selects a function. The system validates that the function is one that the user is
allowed to do. If not, the user can either exit, or enter a new function.](/v2/_next/image?url=https%3A%2F%2Fcontent.bartleby.com%2Fqna-images%2Fquestion%2F3e38df2a-bce2-4c75-919d-760a91b895d8%2Fb804cf5f-0628-426e-8237-ee5441d6be73%2Fjjy3iv_processed.png&w=3840&q=75)
Transcribed Image Text:QUESTION 2:
Design a suitable Activity diagram with appropriate explanation based on the given case
study:
As a consultant, you are asked to design a class that handles login and security for an application.
The basic functions of the class are:
The user must first enter a valid login name. The system checks to see that the name is
valid before asking for a password. If it is not valid, the user can either exit (cancel) or re-
enter the name.
The user then must enter the password associated with the name. The system validates that
the password is the appropriate one for the login name. If the password is invalid, the user
can either cancel and exit, re-enter the password, or go back to the first step and re-enter
the login name.
The user selects a function. The system validates that the function is one that the user is
allowed to do. If not, the user can either exit, or enter a new function.
Expert Solution
![](/static/compass_v2/shared-icons/check-mark.png)
This question has been solved!
Explore an expertly crafted, step-by-step solution for a thorough understanding of key concepts.
This is a popular solution!
Trending now
This is a popular solution!
Step by step
Solved in 2 steps with 1 images
![Blurred answer](/static/compass_v2/solution-images/blurred-answer.jpg)
Knowledge Booster
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, computer-science and related others by exploring similar questions and additional content below.Recommended textbooks for you
![EBK JAVA PROGRAMMING](https://www.bartleby.com/isbn_cover_images/9781337671385/9781337671385_smallCoverImage.jpg)
EBK JAVA PROGRAMMING
Computer Science
ISBN:
9781337671385
Author:
FARRELL
Publisher:
CENGAGE LEARNING - CONSIGNMENT
![Programming with Microsoft Visual Basic 2017](https://www.bartleby.com/isbn_cover_images/9781337102124/9781337102124_smallCoverImage.gif)
Programming with Microsoft Visual Basic 2017
Computer Science
ISBN:
9781337102124
Author:
Diane Zak
Publisher:
Cengage Learning
![EBK JAVA PROGRAMMING](https://www.bartleby.com/isbn_cover_images/9781337671385/9781337671385_smallCoverImage.jpg)
EBK JAVA PROGRAMMING
Computer Science
ISBN:
9781337671385
Author:
FARRELL
Publisher:
CENGAGE LEARNING - CONSIGNMENT
![Programming with Microsoft Visual Basic 2017](https://www.bartleby.com/isbn_cover_images/9781337102124/9781337102124_smallCoverImage.gif)
Programming with Microsoft Visual Basic 2017
Computer Science
ISBN:
9781337102124
Author:
Diane Zak
Publisher:
Cengage Learning