Suppose password, email, name and address, max score

Assignment Help Computer Engineering
Reference no: EM1333107

I need help on how to validate these data in visual basic.net:

1. the password must not be same as employee ID and must contain 4-6 characters

2. email must ba a valid one

3. name and address fields cannot be left blank

4. maxium score must be postive number between 1 and 100

5. number of students must be postive integer

Assuming password, email, name and address, max score, and number of students are textboxes. If the each rule are broken then a messagebox will appear. Thank you.

Reference no: EM1333107

Questions Cloud

Way in capitalistic society to address pollution : Other countries have cut pollution emission by taxing companies that do emit. Is this the best way in a capitalistic society to address pollution?
Comprise the reason for the lawsuit the outcome of the trial : In your discussion, comprise the reason for the lawsuit, the outcome of the trial and how this lawsuit affected Microsoft and consumers.
Use of measurements in the hrm planning process : why is it important to use measurements in the HRM planning process and What aspects of the plan's success rely heavily on measurements?
Evaluate the purchase of an asset : A firm is considering the purchase of an asset whose risk is greater than the current risk of the firm, based on any method for assessing risk. In evaluating this asset, the decision maker should
Suppose password, email, name and address, max score : the password should not be same as employee ID and must contain 4-6 characters
Activity immediate predecessor time : Activity immediate predecessor time
Challenges subway face in international expansion : What challenges does Subway face in international expansion?
What are its advantages and main components : What is ADO.NET? What are its advantages and main components? How can ADO.NET be useful.
Multinational firms and capm : What is the capital asset pricing model? What is the basic message of the CAPM?

Reviews

Write a Review

Computer Engineering Questions & Answers

  Estimating the average memory access time

Every data reference which misses in L1 has the 60% chance of hitting in L2. A miss in L1 followed by the hit in L2 has a latency of 10 cycles. Explain the average memory access time for the load data reference within this new con?guration?

  Find out the minimum value stored in field named fldtotal

Using an array of DataRow objects named drArray, assume that the first field has the name fldTotal. Write down a loop to examine each row in the array, and find the minimum value stored in the field named fldTotal. Store the result in the variable..

  How to set up or recover cybersecurity

How to set up or recover cybersecurity.

  Make a modularized body mass index

build a modularized Body Mass Index (BMI) Program which will calculate the BMI of a team player.

  What required to happen in order for the database

If the computers of organization are to old, the database management system might not be installed in the organization and will not run properly or sometimes not at all. This information is good to remember as planning a particular database implem..

  Make a swing applet with a jbutton labeled

build a Swing applet with a JButton labeled "Who's number one?." When user clicks the button, display your favorite sport team in a large font (Use Houston Rockets for the sports team). Please save the file to JNumberOne.java

  Make a gui that will create the objects

sketch a GUI that will create the objects and provide access to each object's processing methods.

  Security policy document project

Analyze security requirements and develop a security policy

  Enterprising the data mining and data warehousing

Discuss the most proficient ways in which an organization may invest in enterprising the data mining, data warehousing, and the data analytics capabilities.

  Routing process

Access control is handled at the ____ layer at the time of routing process; the router consults the list of rules before forwarding the incoming packet.

  Produce a state transition diagram

Produce a state transition diagram

  Security devices for protection against different attack

Describe two or more attacks for which the routers (layer 3 devices) are vulnerable. Explain how these attacks are detected and prevented by the security devices.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd