Write a test client to test all your methods in your class

Assignment Help Computer Engineering
Reference no: EM132164233

Assignment

When a user signs in for the first time to a website, the user has to submit personal information, such as user_id, name, email address, telephone number and so on.

Typically, there are two fields for passwords, requiring the user to enter the password twice, to ensure that the user did not make a typo in the first password field.

Write a class encapsulating the concept of processing a form with the following elements:

User_id

Password

Reenter password

Email address

Name

Street Address

City

State

Zip

Telephone

You will store these values as strings in an array.

Write the following methods in your class:

1. A constructor with one parameter, an array of 10 strings (representing one element for each of the fields above), the only instance variable.

2. Accessor, mutator, toString methods

3. A method checking that no Strings are empty. If at least one is empty, return false; otherwise return true.

4. A method returning the number of characters in the user_id

5. A method checking if the two Strings representing the password fields are the same, if they are return true, otherwise false.

6. A method checking if the email address contains one and only one @ character and contains at least one "." after the @ character. If these conditions are met, return true; otherwise return false.

Write a test client to test all your methods in your class.

Reference no: EM132164233

Questions Cloud

Self the same or different than your everyday self : Is your leader "self" the same or different than your everyday "self"? Is this even a valid question?
Court should order the specific performance : The company sued and asked a court to order to fix it. Do you think the court should order the specific performance?
Discuss about the network security policies : Users are complaining that recently implemented changes to network security policies have resulted in password requirements that are too complex.
Describe what should be included in the front matter : Describe what should be included in the front matter? Provide Example.
Write a test client to test all your methods in your class : A constructor with one parameter, an array of 10 strings (representing one element for each of the fields above), the only instance variable.
Examples of successful application of knowledge : Examples of Successful Application of Knowledge of Specific Key Influences on Consumer Behaviour in the food and drink sector
Computes the total cost of the purchase : Develop a program that asks for the number of units sold and computes the total cost of the purchase. Input Validation: Make sure the number of units is greater
Comparing Frederick Douglas and Nat Turner slave narratives : Write a brief essay (4-5 pages, double-spaced, 12-pt. font, Times New Roman) comparing and contrasting the Frederick Douglas and Nat Turner slave narratives
How do squirrels adapt to rattlesnake venom : How do squirrels adapt to rattlesnake venom? How do rattlesnakes adapt to squirrel's defenses against rattlesnake venom?

Reviews

Write a Review

Computer Engineering Questions & Answers

  What are the advantages of the bus sizing mechanism

What is the difference between the way in which the 68000 and the 68020 use the function code outputs?

  Question1 demonstrate your understanding of it

question1 demonstrate your understanding of it infrastructure by answering following questions -a what characteristic

  Implement your class use suitable object-oriented language

Design a Counter class, such that each Counter object is to be a counter. Implement your class. Use any suitable object-oriented language.

  Determine the expected number of die rolls until a coin flip

Explain how to use die rolls to generate unbiased coin flips, and determine the expected number of die rolls until a coin flip is generated.

  A program on a registration application for a school

a program on A registration application for a school

  How often are gpo changes applied

Is using the option to Store passwords using reversible encryption a good security practice? Why or why not? How often are GPO changes applied?

  Identify problem you would like to address for assignment

Identify the problem you would like to address for this assignment. Pretend you spoke to three people assume what would be things / input.

  How you used the knowledge gained in the cryptography

How you used the knowledge gained in the Cryptography and physical security courses and also how you applied the principles in your intern(or at work).

  What is a network of many hacked smartphones called

What is the block size used by SHA-512 algorithm? What is a network of many hacked smartphones called? Which of the following can be utilized as traceroute tool? Which of the following are Mobile Network Based Attacks?

  Write down all the security and business objectives required

Including diagrams (should be drawn using network drawing software), a clear and detailed description of the current architectural design of the network for chosen case study. Write down all the security and business objectives required based on give..

  Discuss possible ways the breach could have been avoided

Write a paper summarizing your findings that addresses the following: Discuss possible ways the breach could have been avoided.

  The human-computer interface needs and design group for

the human-computer interface requirements and design group for this federal agency would like to understand the

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd