Database System Concepts
Database System Concepts
7th Edition
ISBN: 9780078022159
Author: Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher: McGraw-Hill Education
expand_more
expand_more
format_list_bulleted
Bartleby Related Questions Icon
Related questions
bartleby
Concept explainers
Question
Transcribed Image Text:You will develop a client side and a Servlet program that will work with a database.
1. The client (front end) should have a title "NJIT Credit Union", centered.
2. The client should have a background color.
3. The client should have a text field with label 'UserID' where user will enter userID
(integer) and a Submit button with text "Submit".
4. An unsuccessful authentication should have a message printed on the screen, in red,
stating that "Your authentication has failed, please try again." (no pop up message).
At this point the text field should get cleared and ready to accept a new input. Your
program should not exit.
5. A successful authentication should be followed by a message on the screen, in green,
stating that "Your authentication is successful" (no pop up message).
6. There should be two other text boxes with label "Deposit" and "Withdraw" where
user will enter an amount (you should accommodate for decimals). These two text
boxes should only be enabled after successful authentication and the initial values
will be blank. You have the choice to use either text boxes or radio buttons or check
boxes - whatever is suitable for you.
7. If a deposit is made, there should be a message on the screen, in green, with the
current balance which should include the deposited amount.
8. For withdrawal, you must check if the amount is available, if not available, print a
message on the screen, in red, stating that "There is insufficient funds, please try a
smaller amount". The text field should clear and be ready to accept a new amount. If
fund is available, go ahead with the transaction and print current balance on the
screen, in green.
9. Database info:
A. Create a database "ATM"
B. Create a table accountInfo" in that database with the following:
Name
Balance
Jane
2270.25
John
903.65
userID
101
102
Transcribed Image Text:Submission: This is what you have to submit (zip up all the files mentioned below
and submit the zip file):
A. Client program
I.
II.
III.
IV.
V.
Screen shot of the client after you run the client program
Screen shot of a failed authentication
Screen shot of a successful authentication
Screen shot after making a deposit (an amount with decimals)
Screen shot after an unsuccessful attempt to withdraw (an amount with
decimals and of course larger than current balance)
B. Servlet program
C. Screen shot of the table with two rows of data in it.
Expert Solution
Check MarkThis question has been solved!
Explore an expertly crafted, step-by-step solution for a thorough understanding of key concepts.
bartleby
This is a popular solution
bartleby
Trending nowThis is a popular solution!
bartleby
Step by stepSolved in 4 steps
Knowledge Booster
Background pattern image
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, computer-science and related others by exploring similar questions and additional content below.Similar questions
- Write a JavaScript program for initialising and maintaining a counter variable in the localStorage. If the "Counter Update" button is clicked, the counter should be incremented by 1 and set in the localStorage. An alert box should display the counter value when the counter is updated. If the "Clear counter" button is clicked, the counter should be cleared (i.e. the counter variable should be removed from the localStorage). An alert box with the message "Local Storage is cleared!" should be displayed. Add JavaScript event in the HTML file where necessary.arrow_forwardObjective: . Create a game that uses Swing opponents that can generate and handle evenarrow_forwardInsecure Cryptographic Storage Challenge 3 The result key to this level is the same as the encryption key used in the following sub application. Break the cipher and recover the encryption key! The result key is in all capital letters and is in English. Cipher text to decrypt: Decrypt Cipher text Example Try to decrypt this: IAAAAEkQBhEVBwpDHAFJGhYHSBYEGgocAw==arrow_forward
- Create a fictitious scenario to show how the login procedure works. You may have come across a number of different authentication techniques. Possibly soon? No, I don't think so. Passwords are here to stay.arrow_forwardWrite your own description of how challenge-response authentication works. If passwords are so unsafe, why should I use this authentication method instead?arrow_forwardHow would you create a new alias that will permit you to use the command "dog" every time you want to execute the command "cat"?arrow_forward
- Give an example of how one of the four ways to control entry could be used. Why should you choose this over the other options in the same field?arrow_forwardWhen you say, "the goals of authentication," what do you mean exactly? Examine the benefits and drawbacks of each option before settling on a choice.arrow_forwardWhat are advantages of implementing "Principle of Authentication".? What are disadvantages? if we do not implement "Principle of Authentication".arrow_forward
- q3B- Bob has set up a website to collect donations for his new sponge. Alice has decided to donate money to Bob’s sponge and submitted a transaction with her financial details and a donation sum of 10ドル. The financial transaction has been altered before reaching it to the server, and the donation sum was changed to 100ドル. Q- Which CIA element(s) was/were targeted by the threat and why do you think so?arrow_forwardIn javaScript, how to verify that text and password boxes are not empty?arrow_forwardThink of a situation that calls for the administration of logins, and then provide some informed assumptions about what may happen. Create a list of all the many methods you've been able to demonstrate your identification up to this point. Do you believe that passwords will become unnecessary in the not too distant future?arrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Text book imageDatabase System ConceptsComputer ScienceISBN:9780078022159Author:Abraham Silberschatz Professor, Henry F. Korth, S. SudarshanPublisher:McGraw-Hill EducationText book imageStarting Out with Python (4th Edition)Computer ScienceISBN:9780134444321Author:Tony GaddisPublisher:PEARSONText book imageDigital Fundamentals (11th Edition)Computer ScienceISBN:9780132737968Author:Thomas L. FloydPublisher:PEARSON
- Text book imageC How to Program (8th Edition)Computer ScienceISBN:9780133976892Author:Paul J. Deitel, Harvey DeitelPublisher:PEARSONText book imageDatabase Systems: Design, Implementation, & Manag...Computer ScienceISBN:9781337627900Author:Carlos Coronel, Steven MorrisPublisher:Cengage LearningText book imageProgrammable Logic ControllersComputer ScienceISBN:9780073373843Author:Frank D. PetruzellaPublisher:McGraw-Hill Education
Text book image
Database System Concepts
Computer Science
ISBN:9780078022159
Author:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:McGraw-Hill Education
Text book image
Starting Out with Python (4th Edition)
Computer Science
ISBN:9780134444321
Author:Tony Gaddis
Publisher:PEARSON
Text book image
Digital Fundamentals (11th Edition)
Computer Science
ISBN:9780132737968
Author:Thomas L. Floyd
Publisher:PEARSON
Text book image
C How to Program (8th Edition)
Computer Science
ISBN:9780133976892
Author:Paul J. Deitel, Harvey Deitel
Publisher:PEARSON
Text book image
Database Systems: Design, Implementation, & Manag...
Computer Science
ISBN:9781337627900
Author:Carlos Coronel, Steven Morris
Publisher:Cengage Learning
Text book image
Programmable Logic Controllers
Computer Science
ISBN:9780073373843
Author:Frank D. Petruzella
Publisher:McGraw-Hill Education