The table number and waiter''s name must be entered

Assignment Help Basic Computer Science
Reference no: EM13721699

A restaurant wants an application that calculates a table's bill.

The design should include:

 

  • Group Boxes,
  • ComboBoxes,
  • ListBoxes,
  • Labels,
  • TextBoxes
  • PictureBox
  • etc.

 

Validate the following using try and catch blocks:

o Input format exceptions

o The table number and Waiter's name must be entered. The restaurant has only 10 tables, therefore, the only valid table numbers are 1-10. After the user enters the table number and waiters name, then the table number and the waiters name should appear below the billing information.

  • Give your Restaurant a unique name that starts with your name and include a logo or picture image control.
  • The application should display all the menu items listed below in four ComboBoxes.
  • Each ComboBox should contain a category of food offered by the restaurant (Beverage, Appetizer, Main Course and Dessert).
  • Keep track of the items ordered by placing each item selected from the ComboBox into the associated ListBox.
  • As each item is selected, add the price of that item to the bill.
  • Allow an item to be deselected, i.e. if an item is clicked in the ListBox it should be removed from the ListBox and the price of that item should be subtracted from the bill.

 

  • The user should be able to click the Clear Bill Button to restore the Subtotal:, Tax:, and Total: fields to $0.00.

 

 

Soda Beverage $1.95

Tea Beverage $1.50

Coffee Beverage $1.25

Mineral Water Beverage $2.95

Juice Beverage $2.50

Milk Beverage 1.50

Buffalo Wings Appetizer $5.95

Buffalo Fingers Appetizer $6.95

Potato Skins Appetizer $8.95

Nacjos Appetizer $8.95

Mushroom Caps Appetizer $10.95

Shrimp Cocktail Appetizer $12.95

Chips and Salsa Appetizer $6.95

Seafood Alfredo Main Course $15.95

Chicken Alfredo Main Course $13.95

Chicken Picatta Main Course $13.95

Turkey Club Main Course $11.95

Lobster Pie Main Course $19.95

Prime Rib Main Course $20.95

Shrimp Scampi Main Course $18.95

Turkey Dinner Main Course $13.95

Stuffed Chicken Main Course $14.95

Apple Pie Desert $5.95

Sundae Desert $3.95

Carrot Cake Dessert $5.95

Mud Pie Dessert $4.95

Apple Crisp Dessert $5.95

 

Include Javadoc

 

Reference no: EM13721699

Questions Cloud

Explain what information was accessed : Find a major data breach that has occurred recently. Explain what information was accessed and how this information could be misused, such as identity theft, spear phishing, and so on. Remember to include references to chapter 11 or 12 and an ..
A product requires an extensive initial investment : Communications infrastructure as a product requires an extensive initial investment. In the case of the Iridium mobile telephone system, this led to failure for the company. In the case of AT&T long distance, this led to a powerful monopoly. Di..
Design a good device interface standard : Discuss why it is so difficult to design a good device interface standard. Provide a detailed example to support your findings. Include a question that responding students can reply to within your initial post
Makeany dfa in jflap software and run for several inputs : Makeany DFA in JFLAP software and run for several inputs. Take a screen shot andinclude in your assignment. Keep in mind that this assignment is meant to makeyou all get familiar with this software.
The table number and waiter''s name must be entered : o The table number and Waiter's name must be entered. The restaurant has only 10 tables, therefore, the only valid table numbers are 1-10. After the user enters the table number and waiters name, then the table number and the waiters name shou..
Compare and contrast an it audit project with other projects : Compare and contrast an IT Audit project with other projects which might be found in an IT department. Describe two (2) challenges that are unique to IT Audit projects. Suggest an approach to mitigate each challenge you selected.
What is the effective annual yield : PK Software has 8.3 percent coupon bonds on the market with 22 years to maturity. The bonds make semi annual payments and currently sell for 110.00 percent of par. Requirement 1: What is the current yield on PK's bonds? 7.55% Requirement 2: What is t..
Determine the new number of shares outstanding in parts : Roll Corporation (RC) currently has 270,000 shares of stock outstanding that sell for $73 per share. Assuming no market imperfections or tax effects exist, what will the share price be after:
What do you think the ex-dividend price will be : Midnight Hour Inc., has declared a $6.30 per-share dividend. Suppose capital gains are not taxed, but dividends are taxed at 25 percent. New IRS regulations require that taxes be withheld at the time the dividend is paid. Midnight Hour sells for $83 ..

Reviews

Write a Review

 

Basic Computer Science Questions & Answers

  Which of two alternatives you should pursue

The WBS identifies all of the work that must be done to complete the project

  Consider a variant of cbc-mode encryption

Consider a variant of CBC-mode encryption where the sender simply increments the IV by 1 each time a message is encrypted (rather than choosing IV at random each time). Show that the resulting scheme is not CPA-secure.

  Give the contents of register a after the execution

Give the contents of Register A after the execution of the following instructions: Data_1 EQU $FE Data_2 EQU 1 LDAA #Data_1 LDAB #Data_2 ABA

  Use of visitor pattern to supply additional functionality

Rather than use the Visitor pattern to supply additional functionality. Give the details and compare the advantages and disadvantages of this approach when compared to the Visitor pattern.

  Find the percentage of swap operations in instruction mix

If implementation of instruction in hardware will increase th clock period of single-instruction implementation by 10%, what percentage of swap operations in instruction mix would suggest implementing it in hardware?

  The three common security goals

1. Confidentiality, integrity, and availability are the three common security goals. Select at least three security vulnerabilities that could jeopardize and compromise a database. Classify each vulnerability with being technical, managerial,..

  Provide explanation for why tablespace might have problem

Provide explanation for why your tablespace might have problem, and write at least two actions you can take to lessen the problem

  Write a program that reads from the external file

write a program that reads from the external file input.txt, counts the letters in every word , replaces the word by that number and then writes the numbers to an external file output.txt (note: do not forget to copy the blanks

  How can you quickly investigate and collect digital evidence

Prepaid cell phones make forensic investigation much hard. Discuss how can you quickly investigate and collect digital evidence for a crime what involves a phone call.

  Classify computer systems according to capacity

Classify computer systems according to capacity. How they are different from computers according to the classification of technology. Provide comparative study also.

  Describing the hardware and software used to support

Write a 1100-1350 word paper describing the hardware and software used to support personal, workgroup, and enterprise computing within your current organization, an organization with which you are familiar, or an organization that you can inte..

  Create a script that presents a movie guessing game

Use a single script file named Week5.php to display and process the form Can this be done with the movies 8 mile and black swan.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd