Projectyou will create a secure parts inventory catalog

Assignment Help JAVA Programming
Reference no: EM13371135

Project:

You will create a secure Parts Inventory Catalog system using Model 2 architecture. The application will require a user to have the proper access right to enter the system, and when satisfied, presents the catalog of items currently available in the inventory.

Accessing the system, an authorized user will be able to see the list of items (in the ItemsCatalog page) and get the detailed information about each of them when selecting a specific item in that list ( the detail data will be presented in the ItemDetails page, where a user will be redirected when making a specific item selection from the list ).

If possessing administrative access , a user will be also able to access the NewItem page, which allows to collect a new item data as entered by the admin user and processes that data to be stored in the ItemsCatalog.txt flat file. The same file should be used to fill-in the items list in the ItemsCatalog page , and to display all selected item details in the ItemsDetails page.

You will create an initial ItemsCatalog,txt flat file storing data for a few items. Each item data should include ID, Name, Description, Price, QuantityInStock. When a user sees the ItemsCatalog page, the list of item Names (only) should be retrieved from the file and displayed in a combobox or a listbox. When a user makes a selection of a particular item, processing should be forwarded to the ItemsDetails page, where all data for the item selected should be retrieved from the file and shown in a proper set of textboxes. If a user has the administrative rights, the link "Go to New Item Page" should be displayed, and an admin user should be allowed to go to the NewItem pageto insert new item data to the ItemsCatalog file.

Implementations of the project may vary - but you need to use servlets , JSPs, JavaBeans, session management, and combination-programmic Web security management to make you application functional and secure. You might consider creating a custom Item business class/bean, each object of which will be able to store data for a particular item as retrieved from the flat file. A use of an ArrayList for all such Item objects could serve as a reasonable temporary container for all Items data stored in a flat text file.

You are not using a database /database access in this project, no DBMS of any kind should be involved.

you will use JSP pages for the view, a servlet(s) as a controller, JavaBeans and ordinary Java classes as the model.

When completed , please .zip the whole NetBeans project folder containing your Web application. Make sure it includes all the files (e.g., configuration ones), and all resources which your application uses ( e.g., a flat file with the list of items has to be located inside the project folder, and the relative paths are to be used in the codes accessing that file - no absolute paths of the type C:\MyLocalFolder\MySubfolder; it prevent your .war file to be functional on the UMUC server).

Reference no: EM13371135

Questions Cloud

1 an art professor was interested in seeing what size group : 1. an art professor was interested in seeing what size group is best to prime the pump so to speak to encourage
Purposethis document is to suggest new safety features for : purposethis document is to suggest new safety features for the cruise line industry that would be beneficial to major
1write a short term paper on a business economics topic of : 1.write a short term paper on a business economics topic of your choice. think of this paper as a short literature
Suppose that it people use m3 to commute to london by car : suppose that it people use m3 to commute to london by car. each drivers chooses how many times to travel a year s. the
Projectyou will create a secure parts inventory catalog : projectyou will create a secure parts inventory catalog system using model 2 architecture. the application will require
1 identify and discuss strategic capabilities resources and : 1. identify and discuss strategic capabilities resources and competences of the chosen company using appropriate
These messages come from a range of peoplecompanies and may : these messages come from a range of peoplecompanies and may be through any number of formats including radio television
Requirementthe annotated outline should address each of the : requirementthe annotated outline should address each of the tasks listed above. you need to briefly describe what
1use the second-order accurate central difference : 1.use the second-order accurate central difference approximation and the first-order forward difference approximation

Reviews

Write a Review

JAVA Programming Questions & Answers

  Strong authentication can also risk availability

Strong authentication can also risk availability. A simple example is that forgetting your password denies you access to that which required a password. Sometimes the stakes are high, for example, if a network administrator is the only one who knows ..

  Create bean jsp program which will compute simple interest

Create the bean which will compute Simple Interest. Use bean in JSP program. Accept details of saving like principal amount, rate of interest, period-in years from user and show amount

  Use random function to create account number

Add a static method numAccounts that returns the total number of accounts. (Think about why this method should be static -- its information is not related to any particular account.)

  Achieve these two important features

Java TM is a portable language, and being an object-oriented programming language, it also encourages component reusability. How does Java TM achieve these two important features

  Write a program to find solution tocryparithmetic puzzle

Write a program (Crypta.java) that finds a solution to the cryparithmetic puzzle: TOO + TOO + TOO+ TOO = GOOD

  Variable of type string that has been assigned

Assume that word is a variable of type string that has been assigned a value. Write an expression whose value is a string consisting of the last three characters of the value word. So if if the value if word were "biggest" the expression's value w..

  Cse-241 advance programming conceptspoint of sale

cse-241 advance programming conceptspoint of sale terminalin this assignment you will be tested on the concepts related

  Write a java program that finds the temperature

Write a JAVA program that finds the temperature that is the same in both Celsius and Fahrenheit

  Display the values that were typed in to the form

This assignment will focus on creating Java Server Pages (JSP) and deploying them onto a Java Servlet Container.

  An elementary calculation yields the result

An elementary calculation yields the result that theoretically, the probability of turning up 7 when two dice are thrown is 1/6, or .166666. But what if more dice are thrown? If 3 dice are thrown, what is the probability that some 2 of three sum to 7..

  Assume an ideal gas mixture is in contact with water

Assume an ideal gas mixture is in contact with water. Determine the equilibrium concentration of the contaminant in the liquid is the gas stream is composed of 200 ppm of benzene in air

  What are some debugging techniques for javascript

What are some common programming errors? How can they be prevented? What is the try catch structure, how is it useful? What are some debugging techniques for JavaScript?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd