0
0
Intro to Computingfundamentals~10 mins

Two-factor authentication in Intro to Computing - Draw & Build Visually

Choose your learning style9 modes available
Draw This - beginner

Draw a flowchart that shows the process of two-factor authentication (2FA) for a user logging into a website. Include steps for entering username and password, verifying credentials, sending a code to the user's phone, entering the code, and granting or denying access.

10 minutes
Hint 1
Hint 2
Hint 3
Hint 4
Hint 5
Hint 6
Grading Criteria
Start and End symbols present
User input steps included (username/password and code)
Decision diamonds used for credential and code checks
Separate paths for correct and incorrect checks
Final access granted or denied outcomes shown
Solution
  +---------------------+
  | Start               |
  +----------+----------+
             |
             v
  +---------------------+
  | Enter username &    |
  | password            |
  +----------+----------+
             |
             v
  +---------------------+
  | Check credentials   |
  +----------+----------+
             |
      +------+------+
      |             |
      v             v
+------------+  +----------------+
| Credentials|  | Deny access &   |
| correct?   |  | End             |
+-----+------+  +----------------+
      |
      v
+---------------------+
| Send code to phone  |
+----------+----------+
             |
             v
+---------------------+
| Enter code received |
+----------+----------+
             |
             v
+---------------------+
| Check code correct? |
+-----+------+--------+
      |      |
      v      v
+------------+  +----------------+
| Grant access|  | Deny access &   |
| & End      |  | End             |
+------------+  +----------------+

This flowchart starts with the user entering their username and password.

Next, the system checks if the credentials are correct. If not, access is denied and the process ends.

If credentials are correct, the system sends a code to the user's phone.

The user then enters the received code.

The system checks if the entered code matches the sent code.

If the code is correct, access is granted and the process ends.

If the code is incorrect, access is denied and the process ends.

Variations - 2 Challenges
[intermediate] Draw a flowchart for two-factor authentication that includes a step for the user to choose between receiving the code via SMS or email before entering the code.
[advanced] Draw a detailed flowchart for two-factor authentication that includes retry limits for entering the code and locks the account after 3 failed attempts.