Write program that implements a login window with text field

Assignment Help Computer Engineering
Reference no: EM131839238

Problem

Write a program with a graphical interface that implements a login window with text fields for the user name and password. When the login is successful, hide the login window and open a new window with a welcome message. Follow these rules for validating the password:

1. The user name is not case sensitive.

2. The password is case sensitive.

3. The user has three opportunities to enter valid credentials. Otherwise, display an error message and terminate the program. When the program starts, read the file users.txt. Each line in that file contains a username and password, separated by a space. You should make a users.txt file for testing your program.

Reference no: EM131839238

Questions Cloud

Risk and control self-assessment : Identify approaches on how to plan for threats and events that could potentially cause disruptions.
Information on windows network security : Research the Internet to obtain information on Windows network security.
How differences affect the contracts and breaches : Based on this week and last week's learning segments, create a writing assignment answering the following questions.
What do you think the largest negative effect will be : What impact will the Patient Protection and Affordable Care Act of 2010 have on healthcare access, quality, competition, and financing?
Write program that implements a login window with text field : Write a program with a graphical interface that implements a login window with text fields for the user name and password.
Summarize the roles and responsibilities : Summarize the roles and responsibilities that the U.S. government, court system, and law enforcement agencies in combating computer crime.
Define and explain the purpose and use of the following : Define and explain the purpose and use of the following:
What implications do post-case actions regarding patents : What implications do post-case actions regarding patents taken subsequent to the case by Elon Musk mean for Tesla's organizational sustainability?
Write a program with a graphical interface : Write a program with a graphical interface that allows the user to convert an amount of money between U.S. dollars (USD), euros (EUR), and British pounds (GBP).

Reviews

Write a Review

Computer Engineering Questions & Answers

  Describe the types of role hierarchy constraints

List and define the four types of entities in a base model RBAC system. Describe three types of role hierarchy constraints.

  Assume that we are looking in a programming language

suppose that we are looking in a programming language that allows underscore (_) in variable names. When a scanner sees a character string such as AB_CD, is it more likely to identify this string as the single five-character token AB_CD or as thre..

  You have been hired by tmi to design an application using

you have been hired by tmi to design an application using shell script programs. tmi case projects needs you to design

  Show the current selections made by the user

construct a program that demonstrates the enhanced options for the MessageBox class. Use three GroupBox controls with RadioButton controls contained within each.

  Implement your algorithm in python

Draw NassiShneiderman (NS) diagrams that present the steps of the algorithm required to perform the task specified

  Write down the syntax using a loop to print out

Write down the syntax (one line) to declare an int array with 7 values which are all 10.

  Derive the local cubic shape functions

As previously explained. We can increase the accuracy of our finite element findings either by increasing the number of elements used in the analysis.

  What fields you believe would be primary keys

Be sure to include the field type and size. Please do not jump ahead and try to create tables. now I'm just looking for a list of fields. This is somewhat vague on purpose. I want you to decide what is required in the database.

  What are the ways a device can become infected

The spread of the mobile viruses has been slow since the mobile devices lack a prevalent OS like PCs and Windows. As mobile communications become more prevalent, so does the onslaught of viruses.

  Explain how can information be an asset in a company

how can information be an asset in a company? discuss three different examples of information that should be protected

  Write down an essay of 500-750 words in which you describe

using a graphic organizer of your choice identify and explain six technology- induced methods that can be used in your

  Appropriate text or on-line resource

Just this Qs By consulting an appropriate text or on-line resource, obtain relevant data and hence estimate the vascular resistance of the following organs: 1) the heart (i.e. the coronary circulation) 2) the brain 3) one kidney 4) both kidneys 5)..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd