1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Artemon [7]
3 years ago
12

RAPTOR! You are writing a program that will act like an ATM machine by the end of this course. In order to access the ATM, the c

ustomer must enter their user name and their passcode. After 3 incorrect attempts at entering the user name and password, the program will end. The list of legitimate users along with their user ID, passcode and account balance will be provided to you.
There are only 5 functions that can be carried out by the ATM:


1 – Deposit (adding money to the account)


2 – Withdrawal (removing money from the account)


3 – Balance Inquiry (check current balance)


4 – Transfer Balance (transfer balance from one account to another)


5 - Log Out (exits/ends the program)


Allow the user to make up to a maximum of 3 transactions at a time. After 3 transactions, the program will terminate. After a transaction is completed, the program will update the running balance and give the customer a detailed description of the transaction. A customer cannot overdraft on their account; if they try to withdraw more money than there is, a warning will be given to the customer. Also note that the ATM doesn’t distribute or collect coins – all monetary values are in whole dollars (e.g. an integer is an acceptable variable type). Any incorrect transaction types will display an appropriate message and count as a transaction.
Computers and Technology
1 answer:
Juli2301 [7.4K]3 years ago
4 0

Answer:

 Please find the program in attachment.

The sample program is self explanatory, and with all the functions being listed as shown above.

And the sample program can be extended to allow three chances for authentication, and for all with addition of a simple for loop.

Explanation:

The code is self explanatory.

Download txt
You might be interested in
Unlike images, tex and hyperlinks, vidoes _____ A) are playable in source view B are not used to affect user's emotions C) can b
KATRIN_1 [288]

Answer:

this is a tough question but I suggest that you choose c)

7 0
4 years ago
What organization is responsible for the registration of Internet domain names?
harkovskaia [24]

Answer:

C. Internet Corporation for Assigned Names and Numbers.

Explanation:

The Internet Corporation for Assigned Names and Numbers is an institution founded in September, 1998. The ICANN has the role of maintaining internet databases and promoting safe internet operations. The headquarters of this organization is located in Los Angeles, California.

The ICANN is also involved in the registration of  internet domain names, formulating new top-level domains, as well as the maintenance of root name servers.

The ICANN is also actively involved in forming new policies that would see to safe internet activities. The internet protocol address spaces for IPv4 and 6 are numbered by the ICANN.

5 0
4 years ago
Cryptography has requirements include:
ki77a [65]

Answer:

A

Explanation:

Cryptography is the study of secure communications techniques that allow only the sender and intended recipient of a message to view its contents. ... When transmitting electronic data, the most common use of cryptography is to encrypt and decrypt email and other plain-text messages.

4 0
3 years ago
Once you complete your profile on LinkedIn, the next step is to
Cerrena [4.2K]
Make it stand out. Add a pic and stuff 
7 0
4 years ago
Read 2 more answers
Classify the functions of dhcp and dns protocols​
Yuki888 [10]

Answer:

Dynamic Host Configuration Protocol (DHCP) enables users to dynamically and transparently assign reusable IP addresses to clients. ... Domain Name System (DNS) is the system in the Internet that maps names of objects (usually host names) into IP numbers or other resource record values.

8 0
3 years ago
Other questions:
  • Match the spreadsheet features with their respective descriptions.
    9·2 answers
  • What are two methods for playing a slide show from the first slide?
    9·2 answers
  • With a two-dimensional array, the ____ field holds the number of rows in the array.
    6·1 answer
  • If a person was on board a hypersonic airplane what do you think they would be able to see as they look out a window looking in
    13·2 answers
  • Which folders are commonly used in the navigation pane of outlook
    5·1 answer
  • You also learn in class that one kilobyte of computer memory will hold about 2/3 of a page of typical text (without formatting).
    6·1 answer
  • Which kind of system software tells the computer how to communicate with peripherals, such as a prero
    6·2 answers
  • Which is the most likely reason film companies expanded so quickly?
    8·1 answer
  • Now suppose that the file is broken into 5 packets, each of 10 Mbits. Ignore headers that may be added to these packets. Also ig
    14·1 answer
  • Give the uses of Word’s mail merge.
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!