Create two pages a login page and an account balances page

Assignment Help Computer Engineering
Reference no: EM131965381

Assignment

They want to give you access to their user database, so that users can log in, check their balances, and transfer money from checking to savings and back. For this assignment, you will need to create at least two pages: a login page, and an account balances page.

For this assignment, you will build upon your prior assignment 2. Using the style and pages of your assignment 2, you need to create a login and accounts page. The login page must be able to validate the valid logins, provided in this assignment. A valid login consists of only lowercase alpha characters. You are welcome to use a hard-coded array, CSV, or MySQL database to create your login page.

The account balance page must display both the savings and checking account balances. A transfer button should be readily accessible that lets a user transfer balances between the two. A fee of 1% is applied when transferring from savings, but there are no fees to transfer to savings. For example, if I have $100 in my checking account and $20 in my savings, and wanted to move all $100 to savings, I should be able to do so, resulting in $120 in savings. If I wanted to move all of the money back to checking, then the total amount should be $118.8.

You are welcome to use an external CSV or MySQL database for this assignment, but the following accounts must be present in the PHP files:

· User: tstark, pass: FEman, checkingBalance: $1,000,000,000, savingsBalance: $0

· User: bwidow, pass: gunsgunsgunsguns, checkingBalance: $420.00, savingsBalance: $1337.37

· User: spiderman, pass: doeswhateveraspidercan, checkingBalance: $5.92, savingsBalance: $12.00

· User: rastley, pass: NEVERGONNAtellaLIE, no account info

The functional requirements for this assignment include:

· At least two new pages are required: login, and accounts

· Only valid users should be able to login

· Input must be validated at login.

· Transfers must work between both accounts.

· Transfer amounts must be validated. Consider what happens if we try to transfer -$100.

· Transfer fees from savings must be applied.

· All inputs must be validated. A reminder: if your Javascript or PHP is broken, the resulting grade will be a zero. If your input results in an error that is not of your own creation, your resulting grade will be a zero. If you submit incomplete or empty PHP or Javascript, your resulting grade will be a zero.

Reference no: EM131965381

Questions Cloud

Complete financial statements of detecting potential fraud : "In general, financial management is perceived as having the primary responsibility in deterring and detecting financial reporting fraud.
List and returns the perfect shuffle of the list : Using the function perfect_shuffle(a_list) which takes as argument a list and returns the perfect shuffle of the list. The function should not modify
Describe how a security test differs from a security audit : 1. Describe how a security test differs from a security audit?
Calculate the percentage changes in eps : Calculate earnings per share, EPS, under each of the three economic scenarios before any debt is issued.
Create two pages a login page and an account balances page : For this assignment, you will need to create at least two pages: a login page, and an account balances page.
Encryption at the disk-block level : What are the advantages of performing encryption at the disk-block level, below the file system? (Mark all that apply.)
Advantage of the shared physical resources : He then takes advantage of the shared physical resources to steal data. Which of the following describes this attack?
How much net working capital does the firm need to fund : Dandee Lions, Inc., has a cash balance of $108,000, accounts payable of $223,000, inventory of $206,000, accounts receivable of $322,000, notes payable.
Basis for similar workbooks : 1- A(n) ________ is a workbook that you create to use as a basis for other similar workbooks.

Reviews

Write a Review

Computer Engineering Questions & Answers

  What other conclusions can you draw from your graph

In which entity is the number of data breaches increasing fastest? What other conclusions can you draw from your graph?

  Analyze the operation of the given circuit

The diagram below is an arbitration circuit taken from Motorola application note DC003, Using the MC68020 as a dedicated DMA controller.

  Produce a requirements document for a program

Produce a requirements document for a program that allows a company to send out personalized mailings, either by e-mail or through the postal service.

  Review the sdlc and explain the key deliverables

Review the SDLC and explain the key deliverables from each phase that you will require from your project teams. The deliverables include the documentation.

  Use the R Studio interface to run the Neural Network method

In this exercise, you will use the R Studio interface to run the Neural Network method. You will run the method with different parameters

  What is the multicast

examine and discuss what the UDP does and its relationship to TCP - - - in what ways is it similar and different, and why (what applications) would we use UDP, and why can't a user program access IP directly.

  Calculate the slope and length of sides

Write a program that calculates the slope and length of sides and the perimeter of a rectangle given four of its vertices as ordered pairs (x,y).

  What do you mean by addressable memory capacity

What do you mean by addressable memory capacity.

  Write a java program that will read an unknown number

Write a Java program that will read an unknown number of lines of data from a text file named 'Scores.text'. Each line of data contains exactly 10 floating point values. You are to calculate and print the average of each line.

  Detail the target market profiles key buying behaviors and

complete a market segmentation of no more than 1400 words for your buyers. be sure to include the followingq1. detail

  Lan based attacks

Discuss or describe one or more LAN based attacks (also known as layer 2 attacks or lower layer attacks) or share any additional thoughts you may have on the LAN based attacks.

  Give overview on emerging trends in wearable computing

Give a detailed explanation of Wireless Access Protocol (WAP). Explain with the help of some examples.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd