Complete the hostel location selection program

Assignment Help Computer Engineering
Reference no: EM131266188

EUROPEAN HOSTEL SELECTION

Based on the Windows form mock-up you created in Chapter 2, complete the Hostel Location Selection program by changing the window background color, downloading and adding the images, and writing the code that will execute according to the program requirements. Before writing the code, create an event planning document for each event in the program.The completed Windows Form object and the other objects in the user interface are shown in Figure 3-87a, Figure 3-87b, and Figure 3-87c.

Application title: Vacation Hostel Location Selection

Purpose: The hostel selection application will allow a user to select the location in London or Dublin.

Program From a window on the screen, the user should identify a hostel location (London or

Procedures: Dublin) and then indicate the location of the hostel.

Algorithms, 1. The user must be able to identify the London or Dublin hostel, back and forth until the Processing and selection is made.

Conditions: 2. When the user identifies the hostel location, a picture of that hostel should appear in the window.

3. Only one picture should be displayed at a time. If a user identifies the London hostel, only the London hostel picture should be displayed; if a user identifies the Dublin hostel, only the Dublin hostel picture should be displayed.

4. When the user makes a hostel selection, a message stating that the selection of a hostel location has been made should be displayed. In addition, the user should be stopped from identifying a hostel location after the hostel selection has been made.

5. After the user makes a hostel selection, the only allowable action is to exit the window.

Notes and 1. A user cannot make a hostel selection until he or she has identified a hostel location.

Restrictions:

Comments: 1. The pictures shown in the window can be found on scsite.com/vb2010/ch3/images. The names of the pictures are LondonHostel and DublinHostel.

1. User clicks London hostel button or Dublin hostel button.

2. Program displays a picture of the hostel identified by the user and enables the hostel selection button.

3. User clicks hostel buttons to view hostel locations if desired.Program displays the picture of the identified hostel.

4. User clicks the Select Location button.

5. Program displays a hostel selection confirmation message, and disables both hostel buttons and the Select

Location button.The Exit Window button becomes active.

6. User terminates the program by clicking the Exit Window button

Reference no: EM131266188

Questions Cloud

Type of soft drink in a competitive market : You are a manager of a firm that produces and markets a generic type of soft drink in a competitive market. In addition to the large number of generic products in your market, you also compete against the major brands such as Coca-Cola and Pepsi.
Write a method insertat that takes four parameters : Write a method, insertAt, that takes four parameters: an array of integers; the length of the array; an integer, say, insertItem; and an integer, say, index.
Discuss with particular reference to miners article : The key task of the anthropologist is "to make the strange familiar and the familiar strange". - Discuss with particular reference to Miner's article, ‘Body Ritual Among the Nacirema'.
Discuss wal-mart from a strategic perspective : In a narrative format, discuss Wal-Mart from a strategic perspective. Discuss Wal-Mart's strengths and weaknesses? Information concerning recent changes in the firms is readily available online and should be accessed. Strategic issues should be d..
Complete the hostel location selection program : Based on the Windows form mock-up you created in Chapter 2, complete the Hostel Location Selection program by changing the window background color, downloading and adding the images
How would go about introducing new procedure with physicians : You have been asked to investigate a new procedure that physicians would like nurses to adopt in the hospital. Discuss the process you would apply to determine whether the procedure falls within the RN scope of practice and how you would go about ..
Is there a better way to compromise on a minimum wage : 1) How does the minimum wage increase in California to $15.00 by 2022 affect laborers and businesses? 2) Is there a better way to compromise on a minimum wage? What should the wage be today? 3) What do you consider livable wage? 4) How did you calcul..
Calculate the price elasticity coefficient of demand : 1. Calculate the price elasticity coefficient of demand when the initial point on the demand curve is Q=10 units and P = 200 cents and the final point is Q=30 units and P=100 cents.
How has greek tragedy influenced modern stories : What are the strengths and weaknesses of an improvisational approach to theatre? Give specific examples to support your argument.

Reviews

Write a Review

Computer Engineering Questions & Answers

  Complexity of the human brain

Discuss the major strengths, weaknesses, and ethical issues on developing computing chips based off the human brain.

  Did you describe how they would deploy different software

scenario your boss has come to you and expressed that there are several software packages that he would like you to

  Describe four advanced boot options

When a driver is verified, a unique digital signature is incorporated into it in a process called and File System can be used to encrypt individual files on a file system.

  Know the memory hierarchy and why it so useful

Know the memory hierarchy and why it so useful. Explain how data is stored on a magnetic disk (track, cylinder, platter, sector). Explain how data is retrieved from a magnetic disk.

  Is snort an hids or an nids

What kind of file is Snort output (logging info) stored in? 7. Can you use Snort with network switches? With hubs? 8. What operating system(s) does Snort run on?

  How to suggest a solution for the scenario of warehouse

How to Suggest a solution for the scenario of warehouse? Assume that the company has accumulated 20TB of data and that 20 percent per year growth is expected in size of Data Warehouse. Suggest a solution for this scenario with respect to software,..

  An approximation to a zero of a continuous function

provide a pseudocode for the bisection method algorithm Bise(f(x),a,b,error) for finding an approximation to a zero of a continuous function f(x) in the interval [a, b] accurate to within error.

  Name at least five different scans that might be performed

question 1 name at least five different scans that may be performed from the zenmap gui. document under what

  List the primary key and functional dependencies

List the primary key and functional dependencies in the following table, subject to the specified conditions. Convert this table to an equivalent collection of tables that are in third normal form (3NF).

  How does rsa algorithm differ from data encryption standard

How does the RSA algorithm differ from the Data Encryption Standard (DES)? A security engineer uses a digital certificate and Pretty Good Privacy (PGP) when sending an e-mail. What is the digital certificate used for?

  Questionassume you were recently hired for a new position

questionassume you were recently hired for a new position as computer forensics specialist at a medium-sized

  Questionassume that you set up a data base for a credit

questionassume that you set up a data base for a credit card company and after initial analysis you have come up with

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd