Computers and Technology

2) Module selection and verification: The program must authenticate the student access using student ID and password.

Students should be able to choose two different modules out of the following modules (more than two modules is not possible):
Programming 1
Programming 2
Networking 1
Mathematics

Students should be able to view their current selected modules.

The program should allow the user to return to the main page.

3) Student account top-up:
The program must authenticate the student access using student ID and password.

Students should be able to deposit points in his/her point account. The program should confirm the requested points with the user before adding them into his/her account.

The program must return to the main page.

answer
Answers: 1

Other questions on the subject: Computers and Technology

image
Computers and Technology, 22.06.2019 06:30, miguel3maroghi
This technology is used to produce high-quality documents that look good on the computer screen and in print. wiki presentation paint desktop publishing
Answers: 3
image
Computers and Technology, 23.06.2019 06:00, sebcbal
When is a chart legend used a. all the time b. whenever you are comparing data that is the same c. whenever you are comparing multiple sets of data d. only for hand-drawn charts
Answers: 2
image
Computers and Technology, 23.06.2019 14:00, ava5015
What is html ? give a small description about html
Answers: 2
image
Computers and Technology, 25.06.2019 08:50, JadeCaldwell
A-12.3 an american spy is deep undercover in the hostile country of phonemia. in order not to waste scarce resources, any time he wants to send a message back home, he removes all the punctuation from his message and converts all the letters to uppercase. so, for example, to send the message, “abort the plan! meet at the dark cabin.” he would transmit given such a string, s, of n uppercase letters, describe an efficient way of breaking it into a sequence of valid english words. you may assume that you have a function, valid(s), which can take a character string, s, and return true if and only if s is a valid english word. what is the running time of your algorithm, assuming each call to the function, valid, runs in o(1) time?
Answers: 3
Do you know the correct answer?
2) Module selection and verification: The program must authenticate the student access using studen...

Questions in other subjects:

Konu
Mathematics, 03.05.2020 13:11