1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Strike441 [17]
3 years ago
12

Create a test that prompts a user to enter a 5-digit PIN in the main procedure and then calls Validate PIN procedure to validate

the user pin. Declare two arrays to hold the minimum and maximum range values, and use these arrays to validate each digit of the PIN. If any digit is found to be outside its valid range, your program displays "Invalid Pin" to the user. If the entire PIN is valid, shows "Valid Pin".
Computers and Technology
1 answer:
Pie3 years ago
4 0

Answer:

See explaination

Explanation:

#include <iomanip>

#include <string>

#include <fstream>

using namespace std;

void getName(string);

void getPin(int,int);

void displayMenu(int);

string name;

int pin1, pin2, ch ;

int main()

{

cout << fixed << showpoint << setprecision(2);

getName(name);

getPin(pin1,pin2);

displayMenu(ch );

system("pause");

}

void getName(string name)

{

cout << "Enter your name: ";

cin >> name;

if (name = "AXBY") || (name != "ABGSHY"))

{

getName(name);

}

}

void getPin(int pin1, int pin2)

{

string name;

if (name == "AXBY")

{

cout << "Please Enter Pin: ";

cin >> pin1;

if (pin1 != 4433)

{

cout << "Pin incorrect please try again!";

cin >> pin1;

}

}

if (name == "ABGSHY")

{

cout << "Please Enter Pin: ";

cin >> pin2;

if (pin2 != 2849)

{

cout << "Pin incorrect please try again!";

cin >> pin2;

}

}

}

void displayMenu(int ch )

{

cout << "[1] Check your account Balance\n"

"[2] Withdraw funds\n"

"[3] Deposit funds\n"

"Please Enter Choice: ";

cin >> ch ;

if (ch != 1 || ch != 2 || ch != 3)

{

cout << "Choice is incorrect, enter choice now: ";

cin >> ch ;

}

}

You might be interested in
A user reports that nothing happens when he or she attempts to print from the computer at his desk. This points to a possible pr
irakobra [83]
I'll say something is wrong with the ink or the papers jammed
6 0
3 years ago
Read 2 more answers
What can be designed to create annoying glitches or destroy data
Katen [24]

I guess the best answer is Virus.

Virus is a malicious computer program that is designed to create annoying glitches or destroy data.

3 0
3 years ago
Read 2 more answers
When the tcp\ip translates a network layer address into a data link layer address (after not finding an entry for the network la
Pavel [41]
When the network stack translates an IP address (network address) to a MAC address (data link address) it sends a broadcast using ARP to all devices on the subnet asking who has the specified IP address.  The device with that IP address will then respond with it's MAC address to the ARP message's source.

With this in mind the answer to your question would either be broadcast or ARP request depending on what you have been learning in class.
6 0
3 years ago
If a full disk encryption (FDE) password is forgotten, what can be incorporated to securely store the encryption key to unlock t
Reptile [31]

Answer:

Key escrow.

Explanation:

If a full disk encryption (FDE) password is forgotten, a key escrow can be incorporated to securely store the encryption key to unlock the disk.

A key escrow can be defined as a data security method of storing very essential cryptographic keys.

Simply stated, key escrow involves a user entrusting his or her cryptographic key to a third party for storage.

As a standard, each cryptographic key stored or kept in an escrow system are directly linked to the respective users and are encrypted in order to prevent breach, theft or unauthorized access.

Hence, the cryptographic keys kept in an escrow system are protected and would not be released to anyone other than the original user (owner).

<em>Therefore, when a full disk encryption (FDE) password is forgotten, a key escrow if incorporated can be used to retrieve the password. Subsequently, the password would then be used to unlock or decrypt the disk.</em>

3 0
3 years ago
When replacing a system board in a laptop, which feature is a must?
Sphinxa [80]
I would use a dual core Becuase a quad can be too space consuming and it can overheat the computers software
6 0
3 years ago
Other questions:
  • What is computer ????
    11·1 answer
  • 10.
    13·1 answer
  • Select the correct answer.
    13·1 answer
  • What specific type of tools can assist teams by identifying attacks and indicators of compromise by collecting, aggregating, and
    8·1 answer
  • How do you ask brainy a question without it not liking the question and saying it hurts their feelings?
    14·1 answer
  • Please conduct some research and find an article on Security Threats and please provide link of the article.
    5·1 answer
  • Which of the following actions might contribute to recommendations you see online?
    6·1 answer
  • Without entering into the internet cloud or intranet cloud, how many icons in the topology represent endpoint devices (only one
    6·1 answer
  • Lazarus Consulting is a large computer consulting company in New York. Pete Lazarus, theà CEOà and founder, is well known for hi
    8·1 answer
  • Can someone please help me with this ,it is my assignment of technology and agriculture year 8
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!