Operations of an atm machine

Assignment Help Computer Network Security
Reference no: EM13728024

Simulate the operations of an ATM machine. First, the customer is prompted to enter his personal identification number pin (for this case study, we test only if this pin is formed by 4 digits, otherwise a message like "Invalid PIN, try again..." will be displayed) and the user is re-prompted to enter the pin. The customer is given three chances to enter his pin. If he/she fails during the three trials you display a message like "Sorry you can't continue, contact your bank for assistance."

If the pin is correct (formed by 4 digits), then the system will ask the customer for the receipt (1 for YES and 2 for NO) and a menu will be displayed containing five possible options to choose from: Fast Cash, Deposit, Withdraw, Balance, and Get Card Back. 

Here is an explanation of each of the 5 options:

Get card back: Display the message "Goodbye!" and exit program.

Fast Cash: Let the customer choose the amount of cash from a menu similar to the following:

Press 1--> $20.00      $40.00 <--2

          3--> $80.00      $100.00 <--4

Withdraw: Prompt the user for the amount of money he/she would like to withdraw and make sure that he/she has enough money for that.

Deposit: Promt the customer for the amount of deposit.

Balance: Just display the amount of money the customer has.

Don't forget to print the receipt if the customer wants one.

Sample execution: (text in brackets represents the user entry)

Virtual Bank at West

WELCOME

Enter PIN: [245]

Invalid PIN, Re-enter PIN: [5487]

 -clear screen-

Receipt Y -> Yes     No <- N

Enter choice: [N]

-clear screen-

CHOOSE FROM THE FOLLOWING

1-> Fast Cash    Withdraw <-2

3-> Deposit    Check balance <-4

5-> Get card back

Enter your choice: [4]

-clear screen-

Your balance is: $125.32

1-> Another Transaction     Get Card Back <-2

Enter your choice: [1]

-clear screen-

CHOOSE FROM THE FOLLOWING

1-> Fast Cash     Withdraw <-2

3-> Deposit          Check Balance <-4

5-> Get card back

Enter your choice: [2]

-clear screen-

Enter amount (enter 0 to cancel): [300.00]

Sorry, not enough balance

Enter amount (enter 0 to cancel): [30.00]

Take your cash...

-clear screen-

Your balance is: $124.32

1-> Another transaction     Get card back <-2

Enter your choice: [1]

-clear screen-

CHOOSE FROM THE FOLLOWING

1-> Fast Cash     Withdraw <-2

3-> Deposit          Check Balance <-4

5-> Get card back

Enter your choice: [8]

Invalid entry

-clear screen-

CHOOSE FROM THE FOLLOWING

1-> Fast Cash     Withdraw <-2

3-> Deposit          Check Balance <-4

5-> Get card back

Enter your choice: [5]

-clear screen-

Reference no: EM13728024

Write about computer security affects you at school

Write about computer security affects YOU at school and in your personal life. You may be surprised at how many things you do that depend on some aspects of secure computer

Describe your thesis regarding the future of cybersecurity

Describe your thesis regarding the future of cybersecurity. Analyze the future of cybersecurity, including any opportunities for cooperation between the government and the p

Prepare a diagram using rationale

Analyse the article/case study from the perspective of at least two different classical ethical theories and present well reasoned arguments for your assessments and recomme

Illustrate that signature verification will succeed

If Bob receives M and S, describe process Bob will use to verify signature. Illustrate that in this case signature verification will succeed.

Explain how you would handle the given situation

You, the security officer, noticed that employees resisted the policy and chose to continue downloading peer-to-peer software. In an initial post, explain how you would hand

Create a report on the threat scope

What are the counter measures to those threats, and how do they fit within the Situational Crime Prevention framework and how does the current law help or hinder your counterm

Determine primary security risk that users must acknowledge

Based on the article by Lenning (2005), determine a primary security risk that users must acknowledge when using macros? Why is it significant to educate users of these risk

How many other messages expected to generate same hash value

A 1,048,576-bit message is used to generate 10-bit hash. One average, how many other messages could be expected to generate same hash value?

Reviews

Write a Review

 
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd