(Check Protection) Computers are frequently used in check-writing systems, such as payroll and accounts payable applications. Many stories circulate regarding weekly paychecks being printed (by mistake) for amounts in excess of $1 million. Weird amounts are printed by computerized check-writing systems because of human error and/or machine failure.
Another serious problem is the intentional alteration of a check amount by someone who intends to cash it fraudulently. To prevent a dollar amount from being altered, most computerized check-writing systems employ a technique called check protection.
Checks designed for imprinting by computer contain a fixed number of spaces in which the computer may print an amount. Suppose a paycheck contains nine blank spaces in which the computer is supposed to print the amount of a weekly paycheck. If the amount is large, then all nine of those spaces will be filled—for example:
11,230.60 (check amount)
------------------------
123456789 (position numbers)
On the other hand, if the amount is less than $1,000, then several of the spaces will ordinarily be left blank—for example,
99.87
--------------
123456789
contains four blank spaces. If a check is printed with blank spaces, it’s easier for someone to alter the amount of the check. To prevent such alteration, many check-writing systems insert leading asterisks to protect the amount as follows:
****9987
------------
123456789
Write a program that inputs a dollar amount to be printed on a check and then prints the amount in check-protected format with leading asterisks if necessary. Assume that nine spaces are available for printing an amount.
Trending nowThis is a popular solution!
Chapter 8 Solutions
C How to Program (8th Edition)
- In the computer programming world, the terms "cohesion" and "coupling" are used interchangeably.arrow_forwardSubject: Software Engineering The objective of a warning system is that it must sound a warning signal if it is approaching an object. The warning system interfaces with a computer vision system which is designed to detect all objects in its field of view, even in extremely low-light conditions. It can identify millions of types of objects, detect the exact location of each object, and interpret each object’s movement (speed and direction). Which of the following is the most logical statement regarding the minimum number of bits required for a C-C-I protocol which supports communication between these systems? a)It maybe an infinity problem requiring an infinite number of test cases. b)Theobjective can be satisfied using 2 or fewer bits, even in extremely low-light conditions. c)Thenumber of bits required can be reduced significantly by doing object categorization. d)It dependson the type of warning signal needed to achieve acceptable Level 2 SA. e)Noneof the above.arrow_forwardment basic file input/output methods To verify, test, and debug any errors in the code Module learning outcomes assessed by this coursework: On successful completion of this assignment, students will be expected, at threshold level, to be able LO # 5: Software development environments (editor, interpreter, debugger), and programmi using Python programming language. Task: Students are required to create a Python program that performs customized Caesa encryption/decryption, as follows: A- The program should have a main menu, through which the user can choose whether he wants to encrypt a text or decrypt it. B- If the user chose to encrypt plaintext, he will be asked to enter his ID, which is also the name of the input file (i.e. if student ID is 199999, then the input file name should be 199999.txt). The user should not enter the file extension (i.e. .txt), instead, the program should append the extension to the ID automatically. C- The input file must contain the following information:…arrow_forward
- SEE ATTACHED PHOTO FOR THE INSTRUCTIONS AND QUESTIONS NEED TO BE ANSWEREDarrow_forwardCase study: Road Repair and Tracking Software (RRTS) to be developed for automatic various book keeping activities associated with the road repairing task of the Public Works Department of the Corporation of large city. Road Repair and Tracking System (RRTS): A city corporation has branch offices at different suburbs of the city. Residents raise repair requests for different roads of the city. These would be entered into his computer system by a clerk. Soon after a repair request is raised, a supervisor visits the road and studies the severity of road condition. Depending on the severity of the road condition and the type of the locality (e.g., commercial area, busy area, relatively deserted area, etc.), he determines the priority for carrying out work, the types and number of machine required, and the number and types of personnel required. Based on this data, the computer system should schedule the repair of the road depending up on the priority of the repair work and subject to the…arrow_forwardDescribe what loops are in programming. Explain their advantages and challenges in implementing them. What issues/errors are likely to occur in programming with loops? Give examples.arrow_forward
- Describe the role of garbage collection in managing memory associated with unused constants and variables.arrow_forwardTrue/False Garbage collection is a type of manual process.arrow_forwardComputer Science A patient record and scheduling system in a doctor’s office is used by the receptionists, nurses, and doctors. The receptionists use the system to enter new patient information when first-time patients visit the doctor. They also schedule all appointments. The nurses use the system to record the results of each visit. This process includes entering some patient treatment information and prescriptions. The doctors may do that process, but most frequently they let the nurses do them. For each visit, free form text fields are used captures information on diagnosis and treatment. The nurses can also access the information to print out a history of patient visits. The doctors primarily use the system to view patient history. The system shall serve 1K users at a time and also it could be access through mobile phones, so it should support all different screen sizes. Identify two functional requirements and two non-functional requirements.arrow_forward
- Principles of Information Systems (MindTap Course...Computer ScienceISBN:9781285867168Author:Ralph Stair, George ReynoldsPublisher:Cengage Learning