Create a deposit class for a checkbook

Assignment Help Computer Engineering
Reference no: EM132100041

Please read all of it: GUI use required

Create a Deposit class for a checkbook.

The Deposit class will be able to get a Transaction number, date, description of the transaction, the deposit amount and calculate a new balance.

The user should be asked if they want to deposit, withdraw, or set a goal, again.

The user must have the option to Finish and display the final balance or exit the program.

Methods that must be used for the Deposit class: Math operators, Array List, loop, GUI

The user will be asked to use a + or - in front of the number entered to add or decrease from balance.

An Array List will keep all current transactions, then it will remove previous transactions.

Methods that must be used for Transaction: JComboBox, Scanner, Loops

The user should select from a list (gas, food or bills) or be able to manually enter a type of transaction.

The user receives an error if they enter anything that is not a character string.

The user will also be asked to accept after entering it to confirm their entry.

If entry is not suitable they should be allowed to reselect or enter a new entry.

Method that must be used for the Date: set Local Date

Transactions that the user makes are dated.

The user must be prompted of the last time they logged in.

Reference no: EM132100041

Questions Cloud

Dna fragments on a gel in the process of electrophoresis : What is the force that is used to seperate DNA fragments on a gel in the process of electrophoresis?
List ways in which the mainframe of today challenges : List ways in which the mainframe of today challenges the traditional thinking about centralized computing versus distributed computing.
Difference between dependent and independent variables : What is the difference between dependent and independent variables? I am truly having a problem finding the difference between the two.
Seconds to abdominal and carotid artery sounds : Why is it necessary to listen at least 3 seconds to abdominal and carotid artery sounds in a child with sickle cell anemia
Create a deposit class for a checkbook : The Deposit class will be able to get a Transaction number, date, description of the transaction, the deposit amount and calculate a new balance.
Evaluate abdominal pain and distension : What specific physical exam can a provider perform at the point-of-care to further evaluate abdominal pain and distension in a child with sickle cell anemia.
Why do providers asked patients with sickle cell anemia : Why do providers asked patients with sickle cell anemia with swollen hands and feet these questions, have you had swellings
Simulate arcade car racing game using a graphical program : The AI car should start over but should move faster this time. Each time you make it to the end of the screen before the AI, you gain a point.
What can he do to help his kidneys return his potassium : What can he do to help his kidneys return his potassium levels to normal?

Reviews

Write a Review

Computer Engineering Questions & Answers

  The default text-based command-driven communication

If you need to create clean Web pages, which of the following is the best choice. If you need to create a text document with some graphics and format it for printing, which of the following is the best choice. Computer directories or folders are use..

  Write a function do graphics that will take a list as input

Write a function do Graphics that will take a list as input. The function do Graphics will start by creating a canvas from the 640x480.jpg file in media.

  Design a cryptographic protocol which is secure

In this section, you are to design a cryptographic protocol which is secure to help Alice, Bob and Charlie.  Alice, Bob and Charlie have the following problem

  Create a table that shows the various required application

Create a table that shows the various required Application Software. The table should have all the necessary columns, rows, and column headings to show

  Identify specific cyber laws and ethics regulations

Identify specific cyber laws and ethics regulations that pertain to the organization and its computing operations in the scenario

  Why is information security a management problem

Why is information security a management problem? What can management do that technology cannot? Why is data the most important asset an organization possesses? What other assets in the organization require protection?

  Write a maple procedure

Write a Maple procedure that solves for y(1) in the initial value problem

  Determine the number of awesome passwords

A password is a string of ten characters, where each character is a lowercase letter, a digit, or one of the eight special characters.

  What is the importance of having ram

What is the importance of having enough RAM? How does it relate to how quick a computer can process data from a large database residing on ones hard drive? What is the importance of virtual memory if you don't have too much RAM & how does it relate..

  Explain fundamental information security concepts

Task IoT security is concerned with safeguarding connected devices and networks in the Internet of things (IoT) environment. Research the issue of IoT security.

  How to calculate federal and fica taxes withheld

how to calculate federal and fica taxes withheld.

  Create an attack tree with a goal of accessing a building

Create an attack tree with a goal of accessing a Building. The start of the tree is given in the attached file. The response must be typed.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd