Implementation of a data entry application, Computer Engineering

Develop and submit an original implementation of a data entry application. Identify and declare variables which will hold all data that needs to be entered to fill in the attached form (Appendix). Use data validation techniques to ensure that valid values are entered into the form fields.

The form will contain both numeric (integer and double) and character (char and string) data. Use C string functions (string.h) to verify text data.  Once the form is filled in on the screen, a printer-ready version of the completed form will be displayed on the screen ready for printing.

  • This assignment must be written in C and must compile and run on BA computer lab PCs using Quincy 2005 v1.3. Build options must include Strict ANSI/ISO compliance, C99 support and must compile with no warnings when the All Warnings option is selected.  
  • Your code must have appropriate comments including your name and student number, the name of the .c file, the purpose of the program, brief explanations of variables and explanations of any code which is not obvious to another programmer.  
  • All code can be placed in the main function.

Hints:

  • Use the modulus function to check that the term of the loan is a multiple of 5 years
  • Use if statements or while loops with the && operator to check limits of numeric values
  • Use the || operator where one of two possible conditions are acceptable, e.g. "VIC" or "NSW" or...). 
  • Use do..while or while loops to continuously prompt for compulsory data until valid values are entered. 
  • Use appropriate ctype functions to verify that names are only composed of letters, and that initials are capitalised.
Posted Date: 2/23/2013 12:55:21 AM | Location : United States







Related Discussions:- Implementation of a data entry application, Assignment Help, Ask Question on Implementation of a data entry application, Get Answer, Expert's Help, Implementation of a data entry application Discussions

Write discussion on Implementation of a data entry application
Your posts are moderated
Related Questions
Authorization Bypass is a frighteningly easy process which can be employed with poorly designed applications or content management frameworks. You know how it is... you run a small

Write a 'C' functions to arrange the elements of an integer array in such a way that all the negative elements are before the positive elements. The array is passed to it as an arg

All AWT event listeners expand the java.util.EventListener interface.

Unencoded micro-instructions One bit is required for each control signal; so number of bits needed in a micro-instruction is high. It represents a detailed hardware vi

Q. Describe about Pascaline? Blaise Pascal made very first attempt in the direction of automatic computing. He invented a device that comprised lots of gears and chains that us

Floating point Arithmetic pipelines Floating point computations are the finest candidates for pipelining. Take the instance of addition of two floating point numbers. Following

Structure of Internet Servers Address Structure of an Internet server's address keyed into a client's software is as below: http://www.expertsmind.com Where: htt

Q. Explain about Layout Cells? In Layout view you can draw layout cells and layout tables to define design areas of a document. This task is easier to accomplish if you prepare

state and explain the advantages of having densely packed integrated Circuits in the computer

Update the permutation algorithm from the text to obtainthe correct list of permutations even if the string haves repeated letters. For example, if you call ListPermutations on the