Customer-entered information

Assignment Help Basic Computer Science
Reference no: EM132528828

Part 1

Modify your Java application so that it is an easy-to-use GUI application where all of the interaction is performed on one screen. You will now take the individual components and translate them to a single interactive GUI interface using the following GUI components, container, the event listeners, and event subclasses to enhance your application as a more GUI-appropriate interface:

GUI components

Container

Event listeners

Event subclasses (at least 3-4 utilized)

ActionEvent

ItemEvent

FocusEvent

KeyEvent

MouseEvent

WindowEvent

ActionPerformed Method

Part 2

For this assignment, you are being asked to make sure you are exception handling by verifying that all of the customer-entered information is valid before the order is submitted to ensure order accuracy.

The customer information that the customer must now enter that should be validated includes the following:

Entered user name (must fill in a name)

Entered at least one sub to order

Selected all three attributes for sub (such as bread type, sub type, and sub size)

Entered delivery address that includes street, city, state, and zip code

Entered telephone number xxx-xxx-xxxx

In this assignment, you are adding in error handling to make sure the customer is filling in all of the required information.

To accomplish this task, you will be utilizing the following Java classes:

Methods in the character class and StringBuilder class to validate and manipulate characters in a string

Try... Catch for the exception handling of all input fields

Reference no: EM132528828

Questions Cloud

Prepare the necessary adjusting entry at Dec : Prepare the necessary adjusting entry at Dec 31, 2020 regarding bad debts expense under each of the following independent scenarios
Several online videos on unified communications : Find and view several online videos on unified communications.
How much dividend per share will you receive each year : Currently, they sell on the stock exchange for $3 a share. If you own some of these preference shares, how much dividend per share will you receive each year
What are the ethical issues in this situation : Who are the stakeholders in this situation? What are the ethical issues in this situation? What must be the right action plan of a controller
Customer-entered information : You are being asked to make sure you are exception handling by verifying that all of the customer-entered information is valid before the order is submitted
Effective process for handling change requests : Discuss the most effective process for handling change requests, including how different technologies can be utilized.
Preparation for marketing the new scanner to customers : Describe the specific information you think will be helpful to the sales team in preparation for marketing the new scanner to customers.
Analysis on data breach : Research the internet for an example of a violation of sensitive information (data breach).
Estimate the Contribution Margin and Net Income : Assume that the sales amount were to grow to $120,000. Estimate the Contribution Margin and Net Income

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Calculate the value of a bond that matures

Calculate the value of a bond that matures in 17 years and has a $1,000 par value.

  How would you ensure that the diagnosis is correct

How would you ensure that the diagnosis is correct? If it is correct, explain the steps you would take to ensure a new video card is properly installed.

  Standard of electronic industries association of america

For connecting modem a computer, a computer must be equipped with a port that conforms to the RR-32 standard of the electronic industries association of America. What do the letters RS stand for?

  Where is quality assessed within the task set

How is this accomplished? How are the quality attributes discussed in Section 8.2.1 achieved?

  Section-governance and ethics

Discuss the role and effect of corporate governance on publicly listed companies. Illustrate your answer with examples of aspects of corporate governance practices that have been mentioned in the annual report, analyst reports and or recently repor..

  Check which files employees and contractors are accessing

To make managing data easier, each client has been assigned his or her own disk volume. What types of auditing can you set up to reassure clients their data is protected and to check which files employees and contractors are accessing?

  Responsible for the security of information in organization

Who is ultimately responsible for the security of information in an organization? What are the disadvantages of using a VPN instead of a leased line?

  Demonstrates the use of the command line compiler

Write some usable code that demonstrates the use of the command line compiler to compile the code into a java.class file. Place at least one debug line in the code using a Java library utility such as print. Be sure to upload both the notepad file wi..

  What is the total slack time in the network

If activity G had an estimated time of fifteen days, what impact would this have on your answer to part b?

  Five core workflows of the unified process

What are activities in the five core workflows of the unified process?

  How would you show an input mask for a serial number

In MS Access, how would you show an input mask for a serial number that had 5 letters followed by 7 numbers? No dashes or any other characters.

  Calculate the equilibrium price and quantity

Calculate the equilibrium price and quantity that will prevail under a completely free market.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd