Use javascript to ensure that an entry has been made

Assignment Help Database Management System
Reference no: EM13317251

Introduction

This is an individual assignment in which you are required to develop a dynamic web application as described below using PHP, MySQL, JavaScript and CSS. Details of the weight of the assignment and due date are given in the course description.

Task Description

Database structure

The web application uses a 3-table relational database stored on a server that records the details of books borrowed from a library. The structure of the database is:

BORROWER(BORROWER_NUMBER, BORROWER_NAME, EMAIL)
BOOK(ISBN, TITLE, AUTHOR, PUBLISHER, YEAR_OF_PUBLICATION, NUMBER_OF_COPIES)
BOOK_BORROWED(BORROWER_NUMBER, ISBN, COPY_NUMBER, DATE_BORROWED)

Each record in the BOOK_BORROWED table refers to one book borrowed by one borrower on the date specified. Borrowers may borrow up to 6 books at a time. The field NUMBER_OF_COPIES in table BOOK stores the number of copies of a specific book owned by the library and available for borrowing. If the library owns a single copy only of any book, then 1 should be entered for the COPY_NUMBER whenever it is
borrowed. No nulls are permitted. The BOOK_BORROWED table has a primary key that combines the primary keys of the other 2 tables. Primary keys have been underlined.

The borrower number is a 5-digit number with no leading zeroes. The ISBN (International Standard Book Number) is a 13-digit number that uniquely identifies a published book. All copies of a given book have the same ISBN. The year of publication is a 4-digit number. The date borrowed has the format ‘ddmmyyyy'.

Initial data
When the database is set up it should be populated with the data that you have chosen. Display this data as part of your documentation. Each table should have from 3 to 6 records initially.

Borrowing forms
Before implementing the database, use PHP and CSS to create a form that enables a librarian to enter the details for the BOOK_BORROWED table when a borrower borrows one or more books by a student for one or more courses as part of a single program. Wherever appropriate you should use drop down boxes for user-friendly entry of data and to reduce entry errors.

Use JavaScript to ensure that an entry has been made in each element of the form and that the entries are valid. Check that numbers have been entered in fields that are numerical and that the numbers entered are within the specified range. Test the form by posting the values of the entries in the borrowing form to a separate php file that will display the borrowing details in full, including information obtained from the other two tables (once the database has been implemented).

Creating the database
Use MySQL commands from the command line to create a database on the server with the structure specified and populated with the initial data. Test the database by writing a query on the command line that displays all initial data as described on page 1. Write PHP code that will enable users to create an account giving them access to the database with permission to query the database and add new bookings. Account usernames will generally be email addresses. However include username ‘tutor' with password ‘guest' as one of the accounts. User passwords should be encrypted with an MD5() hash function.

Reference no: EM13317251

Questions Cloud

What will be the value of the vertical stress at the point : What will be the value of the vertical stress at this point immediately after the fill is placed, before any consolidation has occurred. What will it be after consolidation is completed.
What is the phase difference in the sound waves : Two compact sources of sound oscillate in phase with a frequency of 110 Hz where the speed of sound is 340 m/s. What is the phase difference in the sound waves from the two sources at that point
What is the magnetic field inside the cylinder : A thin wire of length 3.14 meters has a current of 6.00 Amperes running through it. what is the magnetic field (in Tesla) inside the cylinder
Analyze issues related to punishment-prevention : Analyze issues related to punishment and prevention. Then, comment on the following statement: If it can be shown that punishment fails to prevent crime, then, by utilitarian standards, we have no grounds on which to punish.
Use javascript to ensure that an entry has been made : When the database is set up it should be populated with the data that you have chosen. Display this data as part of your documentation. Each table should have from 3 to 6 records initially.
Important molecules and enzymes : You have discovered a new organism that has a mutant phosphofructosekinase-2/fructose 2,6-bisphosphatase-2. The mutant enzyme has a Km of 1 ?M for fructose 6-phosphate while the wild type enzyme has a Km of 10 ?M, the Km for F2,6P is unchanged.
At the time is the object at rest : x = 2 + 3t - t^2, Where x is in meters and t is in seconds, Determine At the time is the object at rest
What is the moment of inertia if the pulley is uniform : You have a pulley 13.8 cm in diameter and with a mass of 2.1 kg. You get to wondering whether the pulley is uniform. What is the moment of inertia if the pulley is uniform
Determine the hydraulic conductivity of the aquifer : Drawdown at an observation well 15 m from the pumped well is 3.0 m, and drawdown at a second observation well 150 m away is 0.30 m. find the hydraulic conductivity of the aquifer.

Reviews

Write a Review

Database Management System Questions & Answers

  Create a dtd file and an xsd file that specify the schemas

Create an XML file that describes 3 product elements; each product has three sub-elements: id, name, and description.

  Explain the average length of stay per room type

What is the average length of stay per room type. What is the average number of visitor per room type. What is the base income per room (i.e., length of visit multiplied by the daily rate) during a specified period of time

  Suggestions as to how to track down offenders

What are some suggestions as to how to track down offenders of these crimes you've identified - Computer crime has become a serious matter

  Integrity constraint prevent-data inserted in table

Integrity constraint prevent from happening when data is inserted in table which contains this constraint? Let INSERT, UPDATE, and DELETE actions on both child and the parent.

  Dba denormalized products database to enhance performance

The DBA denormalized some of the data in Premiere Products database to enhance performance, and one of the resulting tables is following.

  Write an application that creates a database named phonebook

Write an application that creates a database named PhoneBook. The database should have a table named Entries, with columns for a person's name and phone number. Next, write an application that lets the user add rows to the Entries table,

  Produce an entity-relationship diagram

Produce an Entity-Relationship diagram which represents the above activities of the insurance company. Indicate the names and degrees of all the relationships. Give appropriate attributes for each entity shown, and identify the primary key for eac..

  Describes a suitable methodology from the literature

Describes a suitable methodology from the literature for the purpose of designing, constructing and testing of a commercial BIDW for a multinational company.

  Indicate change to make original premiere products database

Indicate the changes (using the shorthand representation) that you would need to make to the original premiere products database desing to support the following requirements.

  Determine the commissions paid to specific employees

Design a query that will allow the finance department to determine the commissions paid to specific employees of the sales department for the month of December.

  Create the primary and foreign key using a uml class diagram

Create the primary key and foreign keys using a UML Class diagram for each table and compare and contrast the key aspects that each system offers

  Compare two non-sequential file structure models

Compare the two non-sequential file structure models. What advantages does the first one have over the second and what advantages does the second have over the first?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd