Develop an online shopping website with html or css or php

Assignment Help Basic Computer Science
Reference no: EM13829823

Problem:

Design a free online website using the following languages tools HTML, XHTML, CSS, Javascript, PHP and MySQL, etc. The website also must include login screen: the input boxes should display "Enter Your Username" in Username and "Enter Your Password" in Password.

Inside mysql database, it must display all the data of the tables using PHP onto the webpage. The data inside the table must be colored code one by one to distinguish the difference, using arrays (do while loop operation is used), also the data can be edited and deleted from the webpage. It must be a professional website. The coding should use notepad without adding software such as Dreamweaver.

The website must be IT related topics

The website documentation must include the following information such as

Table of contents

• Introduction
• System profile
• Gantt chart start date 26.5.2012 end date 30.10.2012
• User case diagram
• ERD diagram
• Flow chart diagram
• GUI of the system including diagram to display how the system works
• Conclusion
• References

Additional Information:

This problem is it from Computer Science, particularly to Web Programming. The question here is about development of website using tools using HTML, XHTML, CSS, Javascript, PHP and MySQL. An online shopping website has been developed and coding has been attached in the solution.

Total Word Limit: 404 Words

Reference no: EM13829823

Questions Cloud

Explains about privacy and issue of nsa tapping phone calls : The problem is an article and it is explains about privacy and the issue of NSA tapping phone calls of American citizens and says that reason for this is to stop terrorist activities by listening to what people are saying.
Are genetically modified food products save for humans : Topic: Are Genetically Modified Food products save for humans consumption? List the possible ethical issues, such as consideration of characteristics of your sample, type of data collection, potential for bias, and so forth
Differencebetween grassroot lobbying and grassroot mellowing : difference between grassroots lobbying and grassroots mellowing
Creating relational databases : Consider the following set of database tables. The diagram shows a database made up of 6 tables with all primary keys underlined. Please take note of foreign keys (most of them carry the same names as the corresponding primary keys they reference)..
Develop an online shopping website with html or css or php : Design a free online website using the following languages tools HTML, XHTML, CSS, Javascript, PHP and MySQL, etc. The website also must include login screen: the input boxes should display "Enter Your Username" in Username and "Enter Your Passwor..
Cognitive capacity to possess a conscious life : Reminiscent of the __________ tradition, it is suggested that some animals have the cognitive capacity to possess a conscious life of their own, and people have a duty not to treat these animals as mere objects and means to their own ends.
Problem regarding tcp connections and udp connections : What are the differences between TCP connections and UDP connections? Why is DNS run over UDP?
Review of article related to global health and illness issue : The problem is a presentation and it is a review of an article related to global health and illness issue. The article chosen for this purpose is "Diabetes and Depression: Global perspectives" by Leonard E Egede and Charles Ellis, 2010.
Implemented on an individual and a business scale : Explain, with an example, how eco-efficiency can be implemented on an individual and a business scale.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Penetration testing & vulnerability assessments

Penetration Testing & Vulnerability Assessments

  Current standards sufficient to protect privacy

What is the right of privacy, and what is the basis for protecting personal privacy under the law and are current standards sufficient to protect privacy?

  What are some uses for wrapper classes

Wrapper classes are classes that surround primitive types with additional functionality. What are some uses for wrapper classes? Show some examples of how they could be used.

  Write a method that accepts a reference to a string object

Write a method that accepts a reference to a String object as an argument and returns true if the argument ends with the substring ".com". Otherwise, the method should return false.

  Function that uses a switch statement

To locate nearest numbered cross street for a given avenue address, the following algorithm can be used: cancel last diget of the address, divide by two,

  What are some differences from the new version that make

You have now become familiar with using the VMware ESXI and vCenter applications. You have also just completed an upgrade to vSphere 5, so while much of the tools and interfaces look similar, nuances and procedures have changed somewhat. When deployi..

  Structured and unstructured data

Structured and Unstructured Data

  Develop an understanding of domain knowledge about a range

In completing this assignment, you are expected to use available resources such as the practical activities in the study modules, the Communication skills handbook, the Course Study Desk – especially the Discussion List

  Most important components of a fully specified enterprise

What are the two most important components of a fully specified enterprise model? Describe the two basic approaches to designing an enterprise model.

  Define constructor

Create a base class and at least two derived classes. Define a constructor (__init__ method) which initializes at least 2-3 attributes for each class.

  Explain what office automation software works

Create a 2 or more page memorandum explaining what office automation software and group collaboration software are used by people in the organization to accomplish work.

  Relationship between squared biases and variances

Assume we have sample of N pairs xi, yi drawn i.i.d. from distribution characterized as given: xi ∼ h(x), design density. Illustrate relationship between squared biases and variances.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd