Programming with Microsoft Visual Basic 2015 (MindTap Course List)
Programming with Microsoft Visual Basic 2015 (MindTap Course List)
7th Edition
ISBN: 9781285860268
Author: Diane Zak
Publisher: Cengage Learning
Question
Book Icon
Chapter 4.LA, Problem 19E

a.

Program Plan Intro

Character Casting

Program plan:

  • Create new Windows Forms Application.
  • Design the form by placing the labels, textbox, and button and then change their name and properties.
  • Inside the “Display” button,
    • Declare required variables.
    • Get the “ID” from the user.
    • Check the “ID”.
      • Print the message.
      • Otherwise, print the corresponding message.
  • Inside the “Clear” button,
    • Clear the form.
  • Inside the “Exit” button,
    • Close the form.

b.

Explanation of Solution

Program:

'Definition of frmMain

Public Class frmMain

  'Definition of button display

Private Sub btnDisplay_Click(sender As Object, e As EventArgs) Handles btnDisplay.Click

  'Declare the ID as string

  Dim ID As String

  'Get the ID

  ID = txtId.Text

  'Check the ID

If ID = "AB12" OrElse ID = "XY59" OrElse ID = "TV45" Then

  'Print the message

  lblMsg.Text = "Valid ID"

  Else

  'Otherwise, print the message

  lblMsg...

Blurred answer
Students have asked these similar questions
1.[30 pts] Answer the following questions: a. [10 pts] Write a Boolean equation in sum-of-products canonical form for the truth table shown below: A B C Y 0 0 0 1 0 0 1 0 0 1 0 0 0 1 1 0 1 0 0 1 1 0 1 0 1 1 0 1 1 1 1 0 a. [10 pts] Minimize the Boolean equation you obtained in (a). b. [10 pts] Implement, using Logisim, the simplified logic circuit. Include an image of the circuit
In the past, encryption and decryption were mostly done by substitution and permutation of letters in a text message. study those classic cryptographic schemes Then, develop an automatic cipher using Javascript  The cipher should be able to perform the following tasks: generate keys encrypt a given plaintext message with a key selected from the list of keys generated decrypt a given ciphertext message with a known cipher key
List reasons why teachers should and shouldn’t be replaced by computers? State your response in a descriptive context. Provide five references from the with internet with your answers.
Knowledge Booster
Background pattern image
Similar questions
SEE MORE QUESTIONS
Recommended textbooks for you
Text book image
Programming with Microsoft Visual Basic 2017
Computer Science
ISBN:9781337102124
Author:Diane Zak
Publisher:Cengage Learning
Text book image
COMPREHENSIVE MICROSOFT OFFICE 365 EXCE
Computer Science
ISBN:9780357392676
Author:FREUND, Steven
Publisher:CENGAGE L
Text book image
New Perspectives on HTML5, CSS3, and JavaScript
Computer Science
ISBN:9781305503922
Author:Patrick M. Carey
Publisher:Cengage Learning
Text book image
Programming Logic & Design Comprehensive
Computer Science
ISBN:9781337669405
Author:FARRELL
Publisher:Cengage
Text book image
Np Ms Office 365/Excel 2016 I Ntermed
Computer Science
ISBN:9781337508841
Author:Carey
Publisher:Cengage
Text book image
EBK JAVA PROGRAMMING
Computer Science
ISBN:9781337671385
Author:FARRELL
Publisher:CENGAGE LEARNING - CONSIGNMENT