Select a programming language and technology

Assignment Help Computer Engineering
Reference no: EM13766142

In the final project of the course, you will select a programming language and technology (PHP, ASP.NET (using VB.NET or C#), or Java), and based on a set of business requirements, design, build, and test a Web database application. The design must include consideration of security best practices, including validating all input and reducing the possibility of SQL injection. A well-organized Word document should accompany the source code that justifies the technology decisions and which discusses adherence to security best practices, weaknesses, and future enhancements.

Your grade will be determined based on the Rubric

Specific Project Requirements:

1.Develop an application that allows the input, updating, and deletion of customers, homes, salespersons, and sales from your Reston Real Estate (RRE) Oracle database FA14-CMIS440-485 that you have been using since Project #2.

Develop a scenario that adds 3 (three) homes, 3 (three) customers, 1 (one) salesperson (i.e. agent), and 3 (three) sales. Each new customer must be involved in a separate sale for one of the new homes. The new salesperson is involved in all three sales. In other words, create a way to enter all this data and then actually do it, taking screen snapshots of each step.

After the initial data above are input, change one customer's last name, another customer's address, the salesperson's phone number, and the sale amount of one of the homes. Take screen snapshots to prove that this worked.

Provide an option to allow the user to display the total number of homes sold in your database (the new ones and any previous ones), the total sales amount (new and existing), and the average sales amount per home (new and existing). Take screen snapshots to prove that this worked.

Finally, delete all 3 (three) of the new customers, homes, sales, and the new salesperson. Take screen snapshots to prove that this worked.

Reference no: EM13766142

Questions Cloud

What legal theories are at issue : Ron Dexter is engaged in the business of towing and storing vehicles. On February 14, 2008, the police recovered a stolen automobile and had it stored at Dexter's lot. What legal theories are at issue
Identify a nursing theory issues : Describe the theory and your rationale for selecting the theory.
Basic concepts of circuit switching : What are the basic concepts of circuit switching? What are the advantages and disadvantages of circuit switching
Benefits and drawbacks to advertising products : Is there an appropriate age that advertising should consider - Who are the stakeholders that will be impacted by your decision, and how will each be affected?
Select a programming language and technology : In the final project of the course, you will select a programming language and technology (PHP, ASP.NET (using VB.NET or C#), or Java), and based on a set of business requirements, design, build, and test a Web database application.
Explain how they have impacted capital punishment : Discuss at least two of the U.S. Supreme Court rulings or current trends in regards death penalty and explain how they have impacted capital punishment in the United States.
Current event article related to activity-based costing : In the discussion forum, post a 150-word summary of a current event article related to activity-based costing and aviation. Please proofread your posting to eliminate misspelled words and insure proper sentence structure.
How would you describe the complexity : How would you describe the complexity of the health industry in terms of workforce, environment, and social expectations? How would a health leader successfully navigate this complexity?
Advantages and disadvantages of network processors : What are the advantages and disadvantages of network processors, such as hubs, switches, routers, and gateways?

Reviews

Write a Review

Computer Engineering Questions & Answers

  Discuss two major issues involved with acquiring systems

discuss two major issues involved with acquiring systems and two major issues commonly faced when maintaining them.

  What are the strengths and weaknesses

Explain the difference between managing users in the workgroup environment versus in a domain environment.

  Lan based attacks

Discuss or describe one or more LAN based attacks (also known as layer 2 attacks or lower layer attacks) or share any additional thoughts you may have on the LAN based attacks.

  Assume f is a function

assume f is a function that returns the result of reversing the string of symbols given as its input, and g is a function that returns the concatenation of the two strings given as its input. If x is the string abcd, what is returned by g(f(x),x).

  Demonstrate that this mac scheme is not secure

Demonstrate that this MAC scheme is not secure for variable length messages - Write pseudocode for an algorithm, F, that, given a tagging oracle

  Fom an accountants viewpoint separation of duties is

from an accountants perspective separation of duties is self-explanatory. how do small companies that have minimal

  Question 1 alice and bob are sending a message m to each

question 1. alice and bob are sending a message m to each othera give one method to achieve confidentiality for m.b

  Make ajax programming based solutions to write a code

In the AJAX scripts you create, refer to the DSN datasource as flamingo. although its not in your own folder or directory, it has been set up as a SYSTEM DSN, so your AJAX script will have access to it.

  Related to super and sub class

Write down a class definition for subclass LawSchool which consists of: A (default) constructor which invokes the superclass constructor along with the value 3 (law school is typically a three year program).

  Design and develop a list of factors

choose an organization for analysis and develop a list of factors (minimum 5) associated with high Performance. For each factor you identify, develop a rating scale from 1 to 5 (at least one of the factors must have a rating of 1 or 2). A 1 means ..

  What constitutes a well-maintained system

What constitutes a well-maintained system, in terms of function utility, and reliability and how does the truly effective SysAdmin ensure success?

  Developing an algorithm to read an arbitrary number

Develop an algorithm to read an arbitrary number of the data records, each consisting of an age, name, and code.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd