Create the core features of a shopping cart

Assignment Help Computer Engineering
Reference no: EM131324362

Shopping Cart

For this solution, you create the core features of a shopping cart. The solution should work as follows:

The user needs to buy some teabags for his mobile café. He goes to a popular online shop. He clicks the Beverages category and sees the list of teabags. He clicks the Buy link and is taken to another page, where he can choose the quantity. He selects 10 boxes of teabags and adds them to his shopping cart. The page now refreshes, and he sees the contents of his shopping cart.

The user then buys coffee, and his cart is updated again. The user realizes he does not need the coffee after all, so he clicks the X link to delete the coffee from his cart.

The user finishes choosing items, clicks Go, and is taken to the Checkout link. He is prompted for his forename, surname, address, postcode, phone, and email address, which he fills in, and is taken to the payment screen. The user can choose to pay with Credit Cards-Visa or Master Card.

Create a small web site to implement the functionalities of the above use case. You can add your own ideas.

Database Specification
customer_addresses table
id
forename
surname
address
postcode
phone
email

orders table
id
customer_id
payment_type
date
status
total

order_items table
id
order_id
product_id
quantity

products table
id
cat_id
name
description
price

categories table
id
name
description

Notes:

1. Database used should be SQL Server 2012
2. Develop solution using Visual Studio 2012
3. Languages used should be C# Web Forms, HTML and CSS
4. Validation should be created for all input fields, for example quantity purchased must be numeric.
5. Code should be clear and well commented

Reference no: EM131324362

Questions Cloud

Why is the value irrelevant for an american put : Call prices are directly related to the stock's volatility, yet higher volatility means that the stock price can go lower.- How would you resolve this apparent paradox?
Discuss the article-the murders before the marathon : Write an essay in which you consider whether Susan Zalkind's work in "The Murders Before the Marathon" succeeds in moving beyond the personal tragedies of three murdered men and the people in their lives to connect to something bigger. To do this ..
Environmental science final project : Create hour to hour and half long POWER POINT lecture (20-25 slides) using the following topics: Human Population Dynamics, Recent Climate Change, Ozone in the Atmosphere and they Hyrdologic Cycle, Streams and Groundwater, Soil and Land Degradatio..
Before-tax component cost of debt : KatyDid Clothes has a $110 million (face value) 30-year bond issue selling for 104 percent of par that carries a coupon rate of 8 percent, paid semiannually. What would be KatyDid's before-tax component cost of debt?
Create the core features of a shopping cart : For this solution, you create the core features of a shopping cart. The solution should work as follows: The user needs to buy some teabags for his mobile café. He goes to a popular online shop.
Analysts estimate universal forest : Suppose Universal Forest’s current stock price is $69.00 and it is likely to pay a $0.68 dividend next year. Since analysts estimate Universal Forest will have a 10.6 percent growth rate, what is its required return?
Why higher interest rates lead to higher call option prices : Suppose a European put price exceeds the value predicted by put-call parity. How could an investor profit? Demonstrate that your strategy is correct by constructing a payoff table showing the outcomes at expiration.
If someone has calf pain : If someone has calf pain. Which muscle would be in pain and would the pain be a cause of a tear to the origin or insertion?
How to apply kantian and utilitarian theories : How to apply Kantian and Utilitarian theories to the situation that existed at Memorial Medical Center in the days immediately after Hurricane Katrina, was Dr. Anna Pou's treatment of the LifeCare patients on the seventh floorof the medical center..

Reviews

Write a Review

Computer Engineering Questions & Answers

  Questionwrite down a c program myls that functions like

questionwrite down a c program myls that functions like unix command ls.purposely myls is a program that displays file

  Define difference between a shallow copy and a deep copy

Overload the operator += for the class newString to perform the following string concatenation; suppose that s1 is "Hello" and s2 it "there". Then the statement s1 += s2; should assign "Hello there" to s1, where s1 and s2 are newString objects.

  Use the techniques to do some black-box testing

how to Download a shareware version of some commercial software.

  Implement a simple automated bank registry system

Implement a simple automated bank registry system. The implementation will include several attributes related to a transaction, and the data will be managed in a global linked list within memory.

  Why the whodunit system design had a great start

The Whodunit system design had a great start, and providing more detail is the next appropriate step in the design process. Collaboration diagrams help give this additional detail, and they will be the focus of this assignment.

  What would given draws become after anti-thetic sampling

A normal random generator produces the following draws: 0.68, -0.31, -0.49, -0.19, -0.72, -0.16, -1.01, -1.60, 0.88, -0.97. What would these draws become after anti-thetic sampling and second moment matching?

  Implementations of a priority queue

Your assignment is to write and compare two implementations of a priority queue whose highest priority element is the one with the smallest keyvalue.

  Computer architectureinput devicesnbspwrite a two to three

computer architectureinput devicesnbspwrite a two to three 2 page paper in which youcompare how the gestures data is

  This assignment consists of two sections a work breakdown

this assignment consists of two sections a work breakdown structure and a summary document.nbspyou must submit the

  The origin and history of the sip protocol

Explain, in a couple of paragraphs, the origin and history of the SIP protocol and the H.323 protocol suite. What are the most noticeable characteristics of each. What are some of their cons

  You have just been hired as an information security

you have just been hired as an information security engineer for a large multi-international corporation.

  What may be the penalty for which crimes

What may be the penalty for which crimes. Who should enforce these laws?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd