Plan to access the data stored in productlistarr

Assignment Help Computer Engineering
Reference no: EM131036177

Goals and Topics

The assignment problem is straightforward. All necessary details have been supplied. The solution of the problem will use the programming concepts and strategies covered in Workshops 1-6. The subgoals are:

- Obtaining advanced understanding of values, variables and arrays;

- Understanding program input and output, functions and expressions;

- Understanding simple strategies like iteration, validation, sum, count, minimum, and maxi-mum plans;

- Translating simple design into JavaScript code

- The mechanics of editing, interpreting, building and running a program

- Testing a program

- Commenting source code

- Becoming con dent and comfortable with programming in small problems

Background

In online marketing, a shopping cart is a piece of e-commerce software on a web server that allows visitors to an Internet site to select items for eventual purchase, analogous to the American English term \shopping cart." In British English, it is generally known as a shopping basket, almost exclusively shortened on websites to \basket".

The software allows online shopping customers to accumulate a list of items for purchase, described metaphorically as \placing items in the shopping cart" or \add to cart". Upon checkout, the software typically calculates a total for the order, including shipping and handling (i.e. postage and packing) charges and the associated taxes, as applicable.

The development of web shop systems took place directly after the Internet became a mass medium. This was a result of the launch of the browser Mosaic in 1993 and Netscape in 1994. It created an environment in which web shops were possible. The Internet therefore acted as the key infras-tructure developments that contributed to the rapid di usion of the e-commerce. E-commerce (as a subset of e-business) describes all computer-aided business transactions. In 1998 a total of 11 e-business models were observed, one of which was the e-shop business model for a B2C (Business-to-consumer) business - also called the \online shop". The two terms \online shop" and \electronic" or \e-shop" are used inter-changeably. The term \online shopping" was invented much earlier in 1984; for example TV shopping often used the term before the popularity of the online method. Today the term primarily refers to the B2C transactional business model. In order to enable \online shopping" a software system is needed. Since \online shopping", in the context of the B2C business model, became broadly available to the end consumer, internet-based \online shops" evolved.

Implementation

Task 1 - Presenting the Catalogue

In the beginning of the program, print to a table the catalogue for all products including name, code, and price, to assist users shopping. You should use a loop plan to access the data stored in productListArr and priceListArr and present it in a four-column table, like Figure 4, where each column is a set of products with code, name, and price.

Task 2 - A Validation Plan for Valid Product Codes

You need to implement a validation plan to get a valid input from the user for product code. An input value is considered invalid if:

- it is not a number at all;

- it is not an integer number;

- it is a negative number;

- it is a number out of range (greater than or equal to the size of productListArr).

Task 3 - A Validation Plan for Valid Quantity Values

You need to implement another validation plan to get a valid input from the user for quantity. An input value is considered invalid if:

- it is not a number at all;

- it is not an integer number;

- it is zero or a negative number;

- it is greater than 100.

Attachment:- Shopping Cart Assignment.rar

Reference no: EM131036177

Questions Cloud

How is the modern workforce different from that of the past : How is the modern workforce different from that of the past? What should employers consider about compensation and benefits for successful recruitment of talented Gen Xers and millennials?
Discuss whether or not the three payments are income : Discuss whether or not the three payments are income from personal exertion. Would your answer differ if she wrote the story for her own satisfaction and only decided to sell it later?
Problem regarding the asset allocation model : The asset allocation model you developed may be useful in modifying the portfolios for all of the firm's clients whenever the anticipated yields for the three funds are periodically revised. What is your recommendation as to whether use of this mo..
Determine the flow area at the location : Assuming the flow to be isentropic, determine the flow area at the location where the Mach number is 1.2.
Plan to access the data stored in productlistarr : Assignment CSC 1401. In the beginning of the program, print to a table the catalogue for all products including name, code, and price, to assist users shopping.
What is the machining cycle time : What is the machining cycle time (in seconds) for each of the four machines? For each machine, please provide at least one step of calculation and the correct answer for full credit.
Build a plan for evaluating the job description you created : Build a plan for evaluating the job description you created in Week Two. Share the plan in the exercise area. Evaluate the plans of at least two peers, citing at least two scholarly sources including the course text.
Design a filter that meets the required specifications : Design a filter that meets the above required specifications. Then try to design a better filter, according to the bonus specifications. Additional points will be added to that filter score, as indicated in the bonus specifications section.
What is a requirement for the use of chi-square : In a study that examines whether client self-reports of satisfaction with counseling differ between male and female therapists, when should a researcher use a two-tailed test of significance?

Reviews

Write a Review

Computer Engineering Questions & Answers

  How to use a nested select case statement

plan and build an application that works as a paper, scissors, and rock game. Draw a flowchart and write pseudocode before coding the application. Use two ComboBox controls to input the selections of the two players and label the ComboBox controls..

  Mapping the cache organization

A computer has a memory of 16 blocks, 32 bytes each, and a cache of 8 blocks, which blocks may be read from the block No. 5 in the cache, if the system utilizes: Fully associative the mapping cache organization.

  Give a pseudocode and flowchart

A local department store hires you to write down an automated checkout program to expedite customers in a hurry. The checkout line can only accept 5 items for any one purchase.

  Define a brief discussion of the technical aspects

Plagiarism is "cheating." It will not be tolerated and will be dealt with in accordance with University policy. Automated tools will be used to detect plagiarism and I will make deductions for minor cases, and grade the paper as a zero for major..

  Program to find smaller between num1 and num2 to output

Program to find smaller between num1 and num2 to output

  Write a class called "deck" with the traits

Write a class called "Card" with the following traits: it holds 2 private variables, a suit and a value (ace is high). It has public functions that randomly generate and build the suit, value and print out the suit/value to the screen. Write a suit..

  Define flow boundaries

Using a data flow diagram and a processing narrative, describe a computer-based system that has distinct transform flow characteristics. Define flow boundaries, and map the DFD into a software architecture using the technique described in Section ..

  Define why a company or organization would migrate

define why a company or organization would migrate to a relational database architecture from a network or hierarchical architecture.

  Maintenance tracking application for an apartment complex

I dentify 3 variables, along with their types, that I would use in my program. Give a brief description of the variables and see if it contains any reusable components, if so, I am to mention that it does.

  Define network activities and maintaining security

This solution provides the learner with an understanding of network activity monitoring. In particular, solution provides a discussion on potential management plans fo monitoring network activities and maintaining security of the network.

  Deducing security policy to mitigate the threat.

Information like sales data, client data, and the network configuration. Recognize the threats these significant items are subject to and deduce the security policy in order to mitigate that threat.

  Distributed scheduling algorithms

The receiver initiated the distributed scheduling algorithms assumed task pre-emption at sender site. Devise an approach, that is receiver-initiated however non pre-emptive.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd