Please help me ASAP INSTRUCTIONS In this assignment, students are required to create PHP programs that will
Fantastic news! We've Found the answer you've been seeking!
Question:
Please help me ASAP
Transcribed Image Text:
INSTRUCTIONS In this assignment, students are required to create PHP programs that will allow an authorized user enter mentor information into a form. The collected data is then submitted to a database. Step 1 (15pts) 1) Create php program, named login.php, using skeleton code provided. This code is expect to function as follows: a) to provide a user a form that has the contents of Table 1. b) to use POST method for submitting the form. c) to use header() function to redirect authenticated users to a page, mentors.php, d) It is possible that a user is already logged in. Write code to check this, using a boolean variable $logged_in. If the user is already logged in, your code should redirect the user to a page, mentors.php. (See page 346). Skeleton code has been provided, login.php, which you are to modify. e) Create a simple php code, logout.php. When executed code should simply say "You are logged out." Table 1 Label for mentor Username Password CSIS 311 Server Site Scripting Assignment 4 Step 2 (10pts) 2) Your code will use sessions to remember if your site user is already logged in. The skeleton code msessions.php has been provided. Modify this code so that either of the following two users can log in and use the mentor system and update the Mentors table in the database using the specified credentials. a) User 1 (Username: amaka; Password: amakapassword b) User 2 (Username: peter; Password: peterpassword Component to accept Input Step 3 (25pts) 3) From the previous steps, if a user is successfully authenticated, the user will be redirected to mentors.php. Here, you will create code, mentors.php and it is expected to function as follows: a) When a user is redirected to mentors.php, include html code to say "Welcome Amaka" or "Welcome Peter" (see page 33). Use input type, text Use input type, password b) It will contain a form for data input as indicated in table 2. c) Form will use POST method. email telephone Address Highest Degree Graduation Year Mentoring Interests d) Use htmlspecialchars() function in appropriate parts of your code to reduce the risk of cross site scripting attacks. The skeleton code, mentors-skeleton-code.php, has been provided for use, here. Table 2 Label for mentor first name last name Dr. Adaeze Nwaigwe Component to accept Input Appropriate form component Appropriate form component Appropriate form component Appropriate form component Text Area Radio buttons (Bachelors, MSc., PhD.) Dropdown list (2012-2022) Computer Science Cybersecurity Computer Information Technology Computer Information Systems Save button - Will cause entries to be stored in database table Reset button - Will cause entries to be cleared INSTRUCTIONS In this assignment, students are required to create PHP programs that will allow an authorized user enter mentor information into a form. The collected data is then submitted to a database. Step 1 (15pts) 1) Create php program, named login.php, using skeleton code provided. This code is expect to function as follows: a) to provide a user a form that has the contents of Table 1. b) to use POST method for submitting the form. c) to use header() function to redirect authenticated users to a page, mentors.php, d) It is possible that a user is already logged in. Write code to check this, using a boolean variable $logged_in. If the user is already logged in, your code should redirect the user to a page, mentors.php. (See page 346). Skeleton code has been provided, login.php, which you are to modify. e) Create a simple php code, logout.php. When executed code should simply say "You are logged out." Table 1 Label for mentor Username Password CSIS 311 Server Site Scripting Assignment 4 Step 2 (10pts) 2) Your code will use sessions to remember if your site user is already logged in. The skeleton code msessions.php has been provided. Modify this code so that either of the following two users can log in and use the mentor system and update the Mentors table in the database using the specified credentials. a) User 1 (Username: amaka; Password: amakapassword b) User 2 (Username: peter; Password: peterpassword Component to accept Input Step 3 (25pts) 3) From the previous steps, if a user is successfully authenticated, the user will be redirected to mentors.php. Here, you will create code, mentors.php and it is expected to function as follows: a) When a user is redirected to mentors.php, include html code to say "Welcome Amaka" or "Welcome Peter" (see page 33). Use input type, text Use input type, password b) It will contain a form for data input as indicated in table 2. c) Form will use POST method. email telephone Address Highest Degree Graduation Year Mentoring Interests d) Use htmlspecialchars() function in appropriate parts of your code to reduce the risk of cross site scripting attacks. The skeleton code, mentors-skeleton-code.php, has been provided for use, here. Table 2 Label for mentor first name last name Dr. Adaeze Nwaigwe Component to accept Input Appropriate form component Appropriate form component Appropriate form component Appropriate form component Text Area Radio buttons (Bachelors, MSc., PhD.) Dropdown list (2012-2022) Computer Science Cybersecurity Computer Information Technology Computer Information Systems Save button - Will cause entries to be stored in database table Reset button - Will cause entries to be cleared
Expert Answer:
Related Book For
Principles Of Information Security
ISBN: 9780357506431
7th Edition
Authors: Michael E. Whitman, Herbert J. Mattord
Posted Date:
Students also viewed these databases questions
-
Design a Java class that represents a cache with a fixed size. It should support operations like add, retrieve, and remove, and it should evict the least recently used item when it reaches capacity.
-
Planning is one of the most important management functions in any business. A front office managers first step in planning should involve determine the departments goals. Planning also includes...
-
Argue whether or not you believe using a sample of students from your schools cafeteria (you recruit the next 100 people to visit the cafeteria to participate) may or may not yield biased estimates...
-
The figure shows the oxygen level P (for purity) in a lake t months after an oil spill. (a) Which of A, B, and C is the point of inflection for the graph? (b) On which side of C is d2 P/ dt2 Ë...
-
Bravo Corporation, a manufacturer of industrial pumps, reports the following results for the year ending July 31, 2006: Retained earnings, August 1, 2005 ........$2,213,400 Net income...
-
a. Describe how an express warranty is created. b. Describe how an implied warranty of merchantability is created. c. Describe how an implied warrant of fitness for a particular purpose is created.
-
In conducting interviews and observing factory operations to implement an activity-based costing system, you determine that several activities are unnecessary or redundant. For example, warehouse...
-
6. If the tangent to the curve y = x at the point P(t, t) meets the curve again at Q, then the ordinate of the point which divides PQ internally in the ratio 1:2 is: (a) 0 7. (b)-t The system of...
-
Design the 4-to-1 MUX two ways Write a Verilog module called mux4to1 to implement 4-to-1 multiplexer using functional descriptions and if-else blocks. Write another Verilog module called...
-
Why the differing treatment of (1) funding with property transferred in exchange for stock with and without "control", (b) the distribution of property and cash to shareholders, (3) why it matters to...
-
How did Martin Luther and John Calvin differ in their theological views towards the church and Baptism and Eucharist?
-
Provide an objective setting paragraph on HP Inc.'s decision to increase the R&D investment to use towards their partnership with Poly Solutions to enhance Microsoft Teams flexibility
-
Developing new and innovative products requires an understanding of organizational production systems, you have therefore been requested by a team of operations managers of a leading consumer goods...
-
choose the closest answer find the annual total cost of inventory. if the company using their present lot size do not use the EOQ be sure to use the present lot size . unit cost$5, ordering cost...
-
Review the U.S. Airways Flight 1549 case. Reflect on the events and how the actions of Captain Sullenberger relate to our course discussions on crisis leadership. Consider the following: What lessons...
-
A feed rate of 200 gpm of a hydrocarbon mixture at 70C is being pumped from a tank at 1 atm abs pressure to a distillation tower. The density of the feed is 46.8 lb./ft' and its vapor pressure is...
-
What are the 5 Cs of marketing channel structure?
-
Define the reality that certifications cost money and the better certifications can be quite expensive to attain. Depending on the certification, one can cost more than$750.00 alone, and...
-
Explain how mitigation is the control approach that attempts to reduce the impact caused by the exploitation of vulnerability through planning and preparation. Explain how mitigation begins with...
-
Which of the following positions is typically the top information security employee in the organization? a. CISO b. CEH c. Security Manager d. CSO
-
What percentage of women have red blood cell counts in the normal range from 4.2 to 5.4? Assume that red blood cell counts of women are normally distributed with a mean of 4.577 and a standard...
-
If 25 women are randomly selected, find the probability that the mean of their red blood cell counts is less than 4.444. Assume that red blood cell counts of women are normally distributed with a...
-
Find P 80 , the 80th percentile for the red blood cell counts of women.
Study smarter with the SolutionInn App