Create an array that store peoples first names

Assignment Help Computer Engineering
Reference no: EM131168695

The following assignment incorporates the concepts from prior weeks (variables, if-else logic, loops, and arrays), along with this week's topic of file input/output process.

Create a Visual Logic program that will:

• Create an array of people's first names. Using a loop, read the names from a text (txt) file, and store each one into the array. The array should allow for a maximum of 100 entries. Continue to read in first names and store them into the array. The last entry in the text file, containing "LastOne," will indicate the end of the list of names.

• Prompt the user for a first name.

• Loop through the array to determine if the first name entered exists in the array. If a match is found, display a message that includes the name and a message indicating that there was a match found. If no match is found, display a message so indicating.

• Using a loop, continue to prompt the user for first names and determine if a match in the array is found. The loop should continue until the user indicates "stop" as the first name.

Resources/Tips:

• This program requires the use of nested loops. The outer loop will repeat, prompting the user for a first name until the user indicates to stop. The inner loop will search through the array for a match.

• Review the Sample Program #3 on pages 83-87 in A Guide to Working with Visual Logicsfor an example of using files.

• Have the txt files, your Visual Logic® program, the Visual Logic® exe file, and the VLSig file in the same folder

• Put quotes around each name in the text (txt) file.

Submit the following in a zip file, using the Assignment Files tab:

• Text (txt) file with names
• Visual Logic (As) file

SAMPLE PROGRAM #3: PARALLEL

ARRAYS (US ERNAM E AND PASSWORD)

In this section we examine a problem that involves maintaining two parallel arrays. The first array holds usemames and the second array holds passwords. The two arrays are separate but related, each having the same number of elements, and the values in one correspond to the values in the other. For example, the seventh element in the username array and the seventh element in the password array together form a valid username/password combination that would grant authentication to the system.

Write a program that reads 10 usemame and password pairs and stores those username and password values into parallel arrays. After the arrays have been loaded, the program should behave as a login screen, prompting for a usemame and a password. Based on the data entered for usemame and password, the program should respond appropriately with one of three output messages. If the username does not match one of the values in the usemame array, then the message should be "Usemame not found." If the username is found in the usemame array, but the password does not match the parallel value in the password array, then the message should be "Username and password do not match." If the username is found and the password matches the parallel value in the password array, the message should be "Access granted."

Reference no: EM131168695

Questions Cloud

How choices for care might affect the other family members : Discuss the micro, meso, and macro influences affecting both the patient and the diverse family members in this scenario as impacted by Ella's medical condition and prognosis.
Explore the social psychology network : Explore the Social Psychology Network. Find the online psychology studies link. From that link choose one study that best fits the theorist you have chosen and complete the study
Describe a benders based solution method : Describe a Benders-based solution method in which the master problem assigns customers to vehicles and the sub problem routes each vehicle.
What do you need to prove in the inductive step : Explain why these steps show that this formula is true whenever n is a positive integer
Create an array that store peoples first names : Create an array of people's first names. Using a loop, read the names from a text (txt) file, and store each one into the array. The array should allow for a maximum of 100 entries.
Generate part of a local search and relax tree : Generate part of a local-search-and-relax-tree similar to that of Figure 2.20. - After evaluating a leaf node, backtrack to a random node in the current tree.
Prove that this golfer plays every hole on the course : Suppose that you know that a golfer plays the first hole of a golf course with an infinite number of holes and that if this golfer plays one hole, then the golfer goes on to play the next hole. Prove that this golfer plays every hole on the course..
Identify the predictor variable and the outcome variable : With these thoughts in mind: Briefly explain the example and the claim that has been made. Identify the predictor variable and the outcome variable. Identify the correlation. Is it a positive or negative correlation? How did you determine this to be ..
Show that the train stops at all stations : There are infinitely many stations on a train route. Suppose that the train stops at the first station and suppose that if the train stops at a station, then it stops at the next station. Show that the train stops at all stations.

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd