Você está na página 1de 130

APMA 0160 Homework 5

FOR MORE CLASSES VISIT


www.tutorialoutlet.com
Homework 5
due Wednesday, March 8, 5pm
Submit zipped .m files on Canvas and printed published file in 182
George St box #15 or #16
You are encouraged to work with other students on this assignment but
you are expected to write
and work on your own answers. You dont need to provide the name of
students you worked with.
You can find information about usage and syntax of any built-in Matlab
function by typing
help xfunctionnamey
in the Command window, where is the space character. You are expected
to submit
(I) a zipped file containing all your .m and any .out files online on
Canvas
(II) a printout of the files produced by the publish command of the filled
in template and all
other .m files your template uses in the dropbox in 182 George St lobby
(#15 for S01 and
#16 for S02)
Late homework will not be accepted without proper justification.
Problem 1 : Lagrangian interpolation
For this problem, you will find the unique polynomial of degree n, n ,
that goes through a set of datapoints
tpxk , yk qunk0 using Lagrangian interpolation. You will also measure
the maximum error in a given interval,
assuming that yk s are values of the Runges function. Write a Matlab
function with the definition
function [LPvalues] = LagrangePoly(xdata, ydata, xgrid)
where
xdata, ydata
LPvalues :
: vectors of the tpxk , yk quk0 datapoints
the vector of values of n on the respective locations in xgrid
n LPvalues must be computed using the Lagrange formulation
npxq y pxq,
n k kpxq k xx
nj
j0
j k k 0 xkxj You may find the prod function useful here.
(a) Consider the set of points tp1, 4q, p2, 3q, p3, 5q, p4, 7q, p5, 2qu. Use
your LagrangePoly function to find
the values of the interpolating polynomial on the grid 1:0.01:5. Plot on
the same figure the datapoints
with orange circles and the interpolating polynomial on the grid 1:0.01:5
with a solid line.
(b) Repeat part (a) for the set of 11, 21, 31 uniformly distributed nodes
xk in
fRpxq 1 r1, 1s and ykfRpxk q, where 1
25x2 is Runges function on the grid -1:0.01:1. Use different colors
when plotting the interpolating polynomials
for each of the three cases and add a legend. Use ylim to show the plots
for 1 y 1. Print on the
screen a message for each case, stating the maximum absolute error
between the function values and the
interpolating polynomial values on the grid.
1 APMA0160, Spring 2017 Homework 5 (c) Repeat part (b) for the set
of 11, 21, 31 uniformly distributed nodes xk in r, s and yk
grid -pi:0.01:pi.
(d) Repeat part (b) for the set of 11, 21, 31 Chebyshev-Gauss-Lobatto
nodes xk in
on the grid -1:0.01:1. sinpxk q on the r1, 1s and ykfRpxk q (e) Write in a
block of comments at the end of your prob1() function a few comments
about the behavior
of the maximum absolute error from parts (b)-(d). In particular, for parts
(b) and (c), explain how your
results are supported by what we saw in class regarding the bound of the
maximum absolute error. Problem 2 : Taylors polynomials for the sine
function
For this problem, you will approximate the sine function by its Taylor
polynomials of increasing degree. The
Taylor expansion for the sine function around x0 0 is
sin x 8 p1qk x2k 1 x x3
p2k 1q!
3!
k0 x5
5!

and it holds for all x P R. Your program will support this claim by
plotting the Taylor polynomials p1qk x2k
p2k 1q!
k0
N 1 which approach the sine function as N increases. Write a Matlab
function with the definition
function [c] = sinPoly(n)
where c is the vector of n
Taylor polynomial is n). 1 coefficients of the Taylor polynomial of order
n (i.e. the highest order of the Your function should check that the input
variable n is odd. If it is even, it should print an error message
and return c=0. You may find the mod function useful here. Using your
sinPoly function, plot on the same axes the function sinpxq and the
Taylor polynomials of degree
5, 9, 13, 17, 21 in r2, 2s on a grid of 1000 equally spaced points. You
may use polyval to evaluate the
polynomials on the grid. Use a legend to label the plotted curves and
place it outside of the figure. For eachdegree, print on the screen the
maximum absolute error between the sine function and the Taylor
polynomial
on the same grid. 2
---------------------------------------------------------------------------------------

CA 103Q1 File Size, Transmission Speed, and


Transmission Time
FOR MORE CLASSES VISIT
www.tutorialoutlet.com
Cloud 9, a cloud storage service provider based in San Diego, has just
announced that it is running out of money and will be shutting down
operations soon. It has given all its clients fifteen (15) days to move their
data out, either back to their own facility or to an alternative service
provider.

Founded six years ago, Cloud 9 has since acquired 500 business clients,
who use Cloud 9's infrastructure to store archived data. Among these
clients, a few are large companies with several terabytes (TB) of data
archived at Cloud 9, but on average each client company stores about
400 Gigabytes (GB) of data on Cloud 9's disk drives. Cloud 9's
connection to the Internet is a Gigabit Ethernet line that has an effective
aggregate transmission rate of 1 Gbps (1,000,000,000 bits per second).

To make your calculations easier, a few assumptions have been made as


follows:

1. Cloud 9's Internet connection will be available 24 x 7 before the 15-


day shutdown deadline.
2. Even if new funding could be arranged, there would be no time to add
additional transmission lines to Cloud 9's facility before the deadline.

3. For regulatory compliance reasons, Cloud 9's clients cannot afford to


lose their archived data, but none of them has a secondary backup copy
of the data.

4. Each of Cloud 9's client has found adequate transmission and storage
capacity to receive the data to be moved back.

5. 1 GB = 1,0243 Bytes = 1,073,741,824 Bytes

Questions:

a.If all of Cloud 9's clients start moving their data out at the beginning of
the 15-day period by sharing Cloud 9's Internet connection, will there be
enough time to move all the data out? Show your calculations.

b. What alternatives do Cloud 9's clients have, other than moving their
data out over telecommunications lines?

---------------------------------------------------------------------------------------

CIS 115So when do you think you would use a


WHILE loop for an array
FOR MORE CLASSES VISIT
www.tutorialoutlet.com
So when do you think you would use a WHILE loop for an array, and
when would you use a FOR loop? Why?

Why wouldn't you always use a FOR LOOP?

---------------------------------------------------------------------------------------
CIS 489 Final Project: Project Plan

FOR MORE CLASSES VISIT


www.tutorialoutlet.com
Final Project: Project Plan
Due Week 10 and worth 300 points
This assignment consists of three (3) sections: a written project plan, a
revised Gantt chart or project plan, and a project plan PowerPoint
presentation. You must submit the three (3) sections as separate files for
the completion of this assignment. Label each file name according to the
section of the assignment for which it is written. Additionally, you may
create and / or assume all necessary assumptions needed for the
completion of this assignment.
While taking all business and project parameters into consideration,
make quality assumptions to support the following requirements.

Section 1: Written Project Plan


You are now in the final stage of the project plan development. All
previous documentation will be combined into one (1) document that
will serve as the statement of work for the project. Your goal is to have
the project approved by the executive team and the venture capital
group. The project plan is very detailed which is appropriate to
accomplish the monumental task of implementation. However, the
executive team is only interested in a ten (10) minute summation.
Therefore, you also must create a compelling executive summary that is
supported by your detail that convinces the executive group that your
solution is optimal.
1. Write an eight to ten (8-10) page executive summary in which you
provide a high-level technical overview of your project where you
address the following:
1.
1. Describe the scope of the project and control measures.
2. Describe the goals and objectives of the project.
3. Give a detailed, realistically estimated cost analysis of the
entire project.
4. Relate the value of the project plan solution to the
competitive advantage that information technology will afford
your organization.
5. Provide all aspects of the information technology
implementation into the project plan.
6. Use at least five (5) quality resources in this assignment.
Note: Wikipedia and similar Websites do not qualify as quality
resources.
Your assignment must follow these formatting requirements:
Be typed, double spaced, using Times New Roman font (size 12),
with one-inch margins on all sides; citations and references must
follow APA or school-specific format. Check with your professor for
any additional instructions.
Include a cover page containing the title of the assignment, the
students name, the professors name, the course title, and the date.
The cover page and the reference page are not included in the
required assignment page length.
Include charts or diagrams created in MS Visio and MS Project as
appendix of the Word document. Make reference of these files in the
body of the Word document.

Section 2: Revised Gantt Chart / Project Plan


Use Microsoft Project or an open source alternative, such as Open
Project, to:
2. Update the Gantt chart or project plan (summary and detail) template,
from Project Deliverable 4: Infrastructure and Security, with all the
project tasks.

Section 3: Project Plan PowerPoint Presentation


Additional to your detailed executive summary you must present your
findings to the executive team and the venture capital group that, along
with the executive summary, will convince the group that your solution
is optimal.
3. Create a ten to fifteen (10-15) slide PowerPoint presentation in which
you:
a. Illustrate the concepts from your written report in Section 1 of this
assignment.
b. Create bulleted speaking notes for your presentation to the executive
board in the Notes section of the PowerPoint. Note: You may create or
assume any fictitious names, data, or scenarios that have not been
established in this assignment for a realistic flow of communication.
c. Use a professional technically written style to graphically convey the
information.
The specific course learning outcomes associated with this assignment
are:
Demonstrate an understanding of existing and emerging
information technologies and strategic impact on organizational
operations.
Evaluate the issues and challenges associated with information
technology integration.
Summarize the competitive advantage that information technology
affords to organizations.
Use technology and information resources to research issues in
information technology.
Write clearly and concisely about strategic issues and practices in
the information technology domain using proper writing mechanics
and technical style conventions.
---------------------------------------------------------------------------------------
CMGT 410 Cloud computing

FOR MORE CLASSES VISIT


www.tutorialoutlet.com
Cloud computing is a collection of individual technologies that become
one integrated technology for deployment.

Create a 3-page process map using Visio showing the various


components of cloud computing and who has responsibility for the
implementation and support of the cloud. Additionally, include basic
cloud essentials, security, virtualization and databases.

Note: Responsible parties can include vendors, in-house IT, outsourced


IT, security team, or hybrid group

---------------------------------------------------------------------------------------
CMIS 102Homework 2Test Case Creation
FOR MORE CLASSES VISIT
www.tutorialoutlet.com
Homework 2 Test Case Creation Using the following pseudocode,
provide 3 unique test cases that would help validate your
algorithm. Be sure to place the test cases in a table showing the input
values, and expected output
for each test case.
Write "Enter the price in dollars:"
Input Price
Write "Enter state sales tax(e.g. .06) :"
Input SalesTax
Set Price = Price + (Price * SalesTax)
Write "Price with Tax is" + Price Submit your word or PDF
file to your assignments folder no later than the due date. Grading
guidelines
Submission
A minimum of 3 test cases were provided.
Input provided and explained for each test case.
Expected output provided and explained for each test case.
Test cases represent a wide variety of possible input values (e.g. large
numbers,
small numbers (0), negative, or unexpected non-number entries).
Total Points
2
1
1
1
5
---------------------------------------------------------------------------------------
CMIS 111 Final Project

FOR MORE CLASSES VISIT


www.tutorialoutlet.com
Final Project
The final project for this course consists of two case studies related to
cybersecurity and the use of
social networking and home computer use. Please review the case
studies and respond using the
guidelines provided below.
Case Study 1: Securing your home computer
You just purchased a brand new computer for your home environment. It
comes with the latest
operating system, Internet connectivity and all accessories to complete
your home office and school
activities. You also have an Internet Service Provider where you can
easily use the existing network to
connect to the Internet and to perform some online banking.
Describe the steps you plan to go through to ensure this new computer
system remains as secure as
possible. Be sure to discuss the details of firewall settings you plan to
implement, browser privacy and
security settings, and recommended software (e.g., Anti-virus and
others) you will install. Also, describe
your password strength policy you plan to adopt, and what you envision
to do to ensure your online
banking site is encrypted and uses the proper certificates.
Discussion of operating system patches and application updates should
also be included. As you discuss
these steps, be sure to justify your decisions bringing in possible issues if
these steps are not followed.
You can discuss this for a specific type of computer (e.g. MAC or PC) to
make the scenario more
appropriate for your environment.
Case Study 2: Guidance for a family member using social networking
sites.
A family member, who just turned 13, wants to join Facebook, create a
Twitter account and start texting
his friends on a regular basis. For the purpose of this paper, let us
assume you are willing to allow your
family to participate in these social networking activities and the family
member has agreed to use your
advice to protect his or her privacy and security while participating in
these social networking activities.
Describe the specific guidance and rules that your family member must
adhere to for this activity to
move forward. Be sure to provide specific settings for Facebook and
Twitter as well as any guidance for
texting with friends. Be sure to discuss how to detect, prevent and report
issues such as cyber bullying,
identity theft, and child predatory behavior. Be sure to justify your
decisions bringing in possible issues if
the guidance you provided is not followed
Prepare a well-written paper no more than 10 pages in length.
In this paper you will address each of the above case studies. Be sure to
clearly separate the case
studies into separate sections of the paper. Only one paper is needed to
address both case studies
Submission requirements:
Your completed assignment should be saved as a Word (or PDF)
document and submitted to your LEO
assignments area no later than the due date listed in the syllabus. Your
document should be neat, wellwritten with minimal grammar and
spelling errors. You should name the file yournamefinalproject.docx (or
yournamefinalproject.pdf). So if my name was
Julie Smith, I would name my document juliesmithfinalproject.docx.
Your name should be clearly listed on the first page along with the
class/section, professor and due date.
Your document should contain page numbers at the bottom of each page.
Single or double space line
formatting is acceptable. All references used for your report should be
included in APA style format. See
the following APA reference guide for details on how to cite your
references:
http://www.umuc.edu/library/libhow/apa_examples.cfm
Grading guidelines
Submission
Case Study 1: Describes the steps you plan to go through to
ensure this new computer system remains as secure as
possible.
Case Study 1: Discusses the details of firewall settings you
plan to implement.
Case Study 1: Discusses browser privacy and security settings.
Case Study 1: Discusses the recommended software (e.g.,
Anti-virus and others) you will install.
Case Study 1: Describes the password strength policy you
plan to adopt.
Case Study 1: Describes what you envision to do to ensure
your online banking site is encrypted and uses the proper
certificates. Case Study 1: Discusses operating system patches and
application updates.
Case Study 1: Justifies your decisions bringing in possible
issues if your recommended steps are not followed.
Case Study 2: Describes the specific guidance and rules that
your family member must adhere to for this activity to move
forward.
Cast Study 2: Provides specific settings for Facebook and
Twitter as well as any guidance for texting with friends.
Case Study 2: discuss how to detect, prevent and report
issues such as cyber bullying, identity theft, and child
predatory behavior.
Case Study 2: Justifies your decisions bringing in possible
issues if the guidance you provided is not followed.
Document is well-organized, and contains minimal spelling
and grammar errors. The students name is clearly listed on
the first page along with the class/section, professor and due
date. The document contains page numbers at the bottom of
each page. Single or double space line formatting is used. APA
style format is used for references.
Total Points
55
5
5
5
55
10
5 10
10 10
20 100

---------------------------------------------------------------------------------------
CMIT 495 Active Directory Policy Statement General Active Directory Forest

FOR MORE CLASSES VISIT


www.tutorialoutlet.com
1. Active Directory Policy Statement
General
Active Directory Forest :
Deployment of one Active Directory Forest will suffice for WWTCs
requirments.
There are not requirements for data isolation within WWTCs Active
Directory configuration
and any data separation can be performed using data isolation. A
single-forest was chosen
because it is very cost-effective and requires the least amount of
administrative support. For
example, with only one forest, the global catalog does not require
synchronization across
forests and management of a duplicate infrastructure is not required.
An organizational forest
model will be used with user accounts and resources contained in the
forest and managed
independently. The forest will be used to provide service and data
isolation. This has been
chosen insteady of other models where resources and users are
isolated in separate forests.
Active Directory Domain :
WTC will use an Organizational Domain Forest to provide
autonomous groups within
the forest as required. The New York office will have a separate
domain from the Hong Kong
office since it will be largely autonomous. In addition, a separate
domain can be created to
restrict access to confidential data. Since WWTC will have few IT
personnel to care for dayto-day IT support activities in New York, the
following functions will be maintained by forestlevel administration:
Creating and removing domain controllers
Monitoring the functioning of domain controllers
Managing services that are running on domain controllers
Backing up and restoring the directory Two domains will require that
Group Policy settings as well as access control
/auditing settings( required forest-wide) are implemented separately
to each domain in the
forest. This setup is considered a regional domain configuration and
will reduce traffic over
wide area network (WAN) links. While service administration will be
carefully controlled at
the Hong Kong office, the following functions will be maintained
within the New York office: Creating organizational units (OUs) and
delegating administration
Repairing problems in the OU structure that OU owners do not have
sufficient
access rights to fix Instead of creating a separate forest root domain,
the New York office function as the
forest root domain. It will be a parent domain to the other offices.
Service administrator
accounts will reside on the New York root domain while user
accounts for each region will
reside on the appropriate domain. For administration purposes, the
branch offices will
functions as child domains under the New York root domain. This
configuration was chosen
because it is much easier to manage than a configuration with a
separate domain for
administrative accounts.
Active Directory Naming Convention: WWTC.org is the Active
Directory namespace used by WWTC. It is a registered fully
qualified domain name for WWTC. WWTC will use the same
internal and external
namespace. WWTC.org will be used from inside and outside the
organization without a
separate namespace for internal access to resources. This means that
the tree name
(WWTC.org) is consistent for the private and public (Internet)
allowing users to logon with
the same credentials internally and externally. This requires a
separate zone outside the
firewall to provide name resolution for public resources and does
create security concerns to
ensure that clients accessing resources from outside the organization
do not have access to
internal company resources. This also creates the requirement for
maintaining the records on
both the internal and external DNS servers simultaneously. The
attached illustration shows
this configuration. Application Services:
Windows Server 2012 is installed on the network and the following
Active Directory features
will be implemented. Windows Deployment Services (WDS) will be
implemented to allows
network-based installation of Windows Operating Systems (OS) to
reduce the
complexity and cost of manual installation. This will require a WDS
Server as
a member of the Active Directory Domain Services (AD DS)
domain. This also
requires a Dynamic Host Configuration Protocol (DHCP) server with
an
active scope sine PXE relies on DHCP for IP addressing.
Smart Card Authentication will require valid user principal names
(UPNs)
since they are required fo smart card login. Since a certificate
authority (CA)
will issue the domain controller certificates, the root certificate will
be added
to the Trusted Root Certification Authorities group policy in Active
Directory.
IP Address Management (IPAM) will be implemented to provide
highly
customizable administrative and monitoring capabilities for the IP
address
infrastructure. IPAM will be used to discover, utilize, monitor, audit,
and
manage IP address space in the network. This requires an IPAM
server that
has connectivity to existing DHCP, DNS, DC, and NPS servers in the
Active
Directory forest. WDS services will be hosted on the same computer
as DHCP.
This requires that WDS is configured so that it doesnt listen on Port
67 and
DHCP option 60 will be used to notify a booting PXE client that
there is a
listening PXE server on the network. The server will also be
configured to
respond only to known client computers. This ensures that client
computers
are added to Active Directory before the image is deployed.
File Classification Infrastructure (FCI) will be implemented to ensure
that
automatic classification is performed. The different classifications
will be identified. Currently they are listed as Public and
Confidential. The properlassification will be applied to every file
using FCI. This process will be used
to ensure that Confidential data is properly stored on encrypted
drives and
that all confidential files are transmitted using encrypted methods.
Reporting
based on these classification tabs will allow administrators to detect
and
respond to violations of the WWTCs data classification policy.
Failover cluster services will be implemented so that the entire
network has
hardware, software, and storage redundancy. This independent group
of
servers and storage devices will work together to increase the
availability of
applications and services. If one clustered device fails, another will
provide
the lost services (called failover). The cluster validation wizard will
be used to
ensure that all network components are compatible prior to
implementation. It
will also be used after implementation and as new devices are added
to the
network to maintain this capability. By implementing backup for all
servers
and storage, WWTC ensures that users experience a minimum of
disruptions
in service.
Cache encryption will be implemented to store encrypted data by
default. This
means that data in cache is stored encrypted by default providing
data
security without requiring entire drive encryption.
BranchCache will be implemented to increase performance,
manageability,
scalability, and availability. Duplicate files are eliminated while
hashes and
local storage at branch offices drastically reduce the amount of
required WAN
traffic.
Bitlocker encryption will be used to protect all user and server data.
The
benefit is that the entire drive is encrypted and only requires the
users normal
authentication to access the data. The bitlocker system on the wired
network
will be set up to automatically unlock the system volume during boot
to reduce
the internal help desk calls because of lost PINs. Group policy
settings will be
enforced that require either Used Disk Space Only or Full Encryption
is used
when BitLocker is enabled on a drive. Groups:
Users and computer accounts will be grouped to simplify
administration by controlling
permissions and rights rather than assigning them individually.
Groups in Active Directory
are objects that reside in the domain. Groups have a scope that
identifies the extent that they
are applied in the domain or forest. The three group scopes for
WWTC are outlined below: Domain local scope is used to manage
accounts within the domain. For
example, a user group that requires access to a printer can be setup so
that
access to a new printer can be done for the entire group at once
instead of
doing a permission list for all five users. The five users will have
global scope
and will be added to a domain local scope group that can be assigned
printer
access. Global scope is used for directory objects that require daily
maintenance,
such as user accounts, computer accounts, or groups that require
management across domains (such as a department in multiple
locations). Universal scope is used to consolidate groups that span
domains. Changes to
global scope groups doesnt affect the universal scope group, but
changes to the universal scope group causes the entire membership
of the group to be
replicated to every global catalog in the forest.
The scope and Organizational Unit setup has been outlined in the
below diagram. The above structure was chosen so that Group Policy
could be applied to a select group of
users or resources without having to set policies for each individual
user.
--------------------------------------------------------------------------------------
CMIT 495Active Directory Policy Statement
FOR MORE CLASSES VISIT
www.tutorialoutlet.com
Active Directory Policy Statement
General
Active Directory Forest :
Deployment of one Active Directory Forest will suffice for WWTCs
requirments.
There are not requirements for data isolation within WWTCs Active
Directory configuration
and any data separation can be performed using data isolation. A single-
forest was chosen
because it is very cost-effective and requires the least amount of
administrative support. For
example, with only one forest, the global catalog does not require
synchronization across
forests and management of a duplicate infrastructure is not required. An
organizational forest
model will be used with user accounts and resources contained in the
forest and managed
independently. The forest will be used to provide service and data
isolation. This has been
chosen insteady of other models where resources and users are isolated
in separate forests.
Active Directory Domain :
WTC will use an Organizational Domain Forest to provide autonomous
groups within
the forest as required. The New York office will have a separate domain
from the Hong Kong
office since it will be largely autonomous. In addition, a separate domain
can be created to
restrict access to confidential data. Since WWTC will have few IT
personnel to care for dayto-day IT support activities in New York, the
following functions will be maintained by forestlevel administration:
Creating and removing domain controllers
Monitoring the functioning of domain controllers
Managing services that are running on domain controllers
Backing up and restoring the directory Two domains will require that
Group Policy settings as well as access control
/auditing settings( required forest-wide) are implemented separately to
each domain in the
forest. This setup is considered a regional domain configuration and will
reduce traffic over
wide area network (WAN) links. While service administration will be
carefully controlled at
the Hong Kong office, the following functions will be maintained within
the New York office: Creating organizational units (OUs) and delegating
administration
Repairing problems in the OU structure that OU owners do not have
sufficient
access rights to fix Instead of creating a separate forest root domain, the
New York office function as the
forest root domain. It will be a parent domain to the other offices.
Service administrator
accounts will reside on the New York root domain while user accounts
for each region will
reside on the appropriate domain. For administration purposes, the
branch offices will
functions as child domains under the New York root domain. This
configuration was chosen
because it is much easier to manage than a configuration with a separate
domain for
administrative accounts.
Active Directory Naming Convention: WWTC.org is the Active
Directory namespace used by WWTC. It is a registered fully
qualified domain name for WWTC. WWTC will use the same internal
and external
namespace. WWTC.org will be used from inside and outside the
organization without a
separate namespace for internal access to resources. This means that the
tree name
(WWTC.org) is consistent for the private and public (Internet) allowing
users to logon with
the same credentials internally and externally. This requires a separate
zone outside the
firewall to provide name resolution for public resources and does create
security concerns to
ensure that clients accessing resources from outside the organization do
not have access to
internal company resources. This also creates the requirement for
maintaining the records on
both the internal and external DNS servers simultaneously. The attached
illustration shows
this configuration. Application Services:
Windows Server 2012 is installed on the network and the following
Active Directory features
will be implemented. Windows Deployment Services (WDS) will be
implemented to allows
network-based installation of Windows Operating Systems (OS) to
reduce the
complexity and cost of manual installation. This will require a WDS
Server as
a member of the Active Directory Domain Services (AD DS) domain.
This also
requires a Dynamic Host Configuration Protocol (DHCP) server with an
active scope sine PXE relies on DHCP for IP addressing.
Smart Card Authentication will require valid user principal names
(UPNs)
since they are required fo smart card login. Since a certificate authority
(CA)
will issue the domain controller certificates, the root certificate will be
added
to the Trusted Root Certification Authorities group policy in Active
Directory.
IP Address Management (IPAM) will be implemented to provide highly
customizable administrative and monitoring capabilities for the IP
address
infrastructure. IPAM will be used to discover, utilize, monitor, audit, and
manage IP address space in the network. This requires an IPAM server
that
has connectivity to existing DHCP, DNS, DC, and NPS servers in the
Active
Directory forest. WDS services will be hosted on the same computer as
DHCP.
This requires that WDS is configured so that it doesnt listen on Port 67
and
DHCP option 60 will be used to notify a booting PXE client that there is
a
listening PXE server on the network. The server will also be configured
to
respond only to known client computers. This ensures that client
computers
are added to Active Directory before the image is deployed.
File Classification Infrastructure (FCI) will be implemented to ensure
that
automatic classification is performed. The different classifications will
be identified. Currently they are listed as Public and Confidential. The
properclassification will be applied to every file using FCI. This process
will be used
to ensure that Confidential data is properly stored on encrypted drives
and
that all confidential files are transmitted using encrypted methods.
Reporting
based on these classification tabs will allow administrators to detect and
respond to violations of the WWTCs data classification policy.
Failover cluster services will be implemented so that the entire network
has
hardware, software, and storage redundancy. This independent group of
servers and storage devices will work together to increase the
availability of
applications and services. If one clustered device fails, another will
provide
the lost services (called failover). The cluster validation wizard will be
used to
ensure that all network components are compatible prior to
implementation. It
will also be used after implementation and as new devices are added to
the
network to maintain this capability. By implementing backup for all
servers
and storage, WWTC ensures that users experience a minimum of
disruptions
in service.
Cache encryption will be implemented to store encrypted data by
default. This
means that data in cache is stored encrypted by default providing data
security without requiring entire drive encryption.
BranchCache will be implemented to increase performance,
manageability,
scalability, and availability. Duplicate files are eliminated while hashes
and
local storage at branch offices drastically reduce the amount of required
WAN
traffic.
Bitlocker encryption will be used to protect all user and server data. The
benefit is that the entire drive is encrypted and only requires the users
normal
authentication to access the data. The bitlocker system on the wired
network
will be set up to automatically unlock the system volume during boot to
reduce
the internal help desk calls because of lost PINs. Group policy settings
will be
enforced that require either Used Disk Space Only or Full Encryption is
used
when BitLocker is enabled on a drive. Groups:
Users and computer accounts will be grouped to simplify administration
by controlling
permissions and rights rather than assigning them individually. Groups
in Active Directory
are objects that reside in the domain. Groups have a scope that identifies
the extent that they
are applied in the domain or forest. The three group scopes for WWTC
are outlined below: Domain local scope is used to manage accounts
within the domain. For
example, a user group that requires access to a printer can be setup so
that
access to a new printer can be done for the entire group at once instead
of
doing a permission list for all five users. The five users will have global
scope
and will be added to a domain local scope group that can be assigned
printer
access. Global scope is used for directory objects that require daily
maintenance,
such as user accounts, computer accounts, or groups that require
management across domains (such as a department in multiple
locations). Universal scope is used to consolidate groups that span
domains. Changes to
global scope groups doesnt affect the universal scope group, but
changes to the universal scope group causes the entire membership of
the group to be
replicated to every global catalog in the forest.
The scope and Organizational Unit setup has been outlined in the below
diagram. The above structure was chosen so that Group Policy could be
applied to a select group of
users or resources without having to set policies for each individual user.
---------------------------------------------------------------------------------------
CMPS 11 Quiz5
FOR MORE CLASSES VISIT
www.tutorialoutlet.com
CMPS 11 Quiz5
This is a closed notes, closed book exam. June 3, 2013 Ok to leave out 1.
(2 points) Given the following variation on the IntListElement class
from class, what would be printed by the
program Main1? Put the output on the lines shown in the comments.
class IntListElement {
IntListElement(int value, IntListElement e) {
data = value;
next = e;
}
IntListElement next;
int data;
}
class Main1 {
public static void main(String args) {
IntListElement e1 = new IntListElement(1776,null);
e1 = new IntListElement(1984, e1);
e1 = new IntListElement(2001, e1);
e1 = new IntListElement(2013, e1);
System.out.println(e1.data);
// prints _______
System.out.println(e1.next.next.data); // prints _______
}
}
2. (2 points) Suppose the two println() calls in Main1 above were
replaced by the line
mystery(e1);
and the following method was added to the class Main1, what would be
printed?
static void mystery(IntListElement list) {
if (list != null) {
System.out.println(list.data);
mystery(list.next);
}
} 3. (0.5 pts) To have some code execute each time a button is pressed
you would put the code in the actionPerformed()
method of a class that implements ActionListener, lets call it listener,
and then
A. Pass listener to a method of the button.
B. Pass the button to a method of listener.
C. Do both A and B.
D. None of the above, you would add the code to a method of a class
that extends JButton. 4. (0.5 pts) True or False? (circle one) A listener
object can be listening to multiple components and do different
things depending upon which component generates an event.
(0.5 pts) True or False? (circle one) A listener object can be listening
for one and only one type of event (e.g.
ActionEvents for clicks on buttons or MouseEvents to respond to mouse
motion like drawing but not both).
(0.5 pts) True or False? (circle one) Multiple listener objects can be
listening and execute code for a single event on
one component. For example, two different listeners could respond, each
in their own way, to a single button click.
(1 point) Write a complete program that prints the first 50 multiples of 3
(i.e. 3, 6, 9, 150). 5.
6.
7. THERE ARE MORE QUESTIONS ON THE BACK 8. (1 point)
Write the method needed by this program. It prints true if the 3 numbers
read from the console are in
increasing order, and false otherwise. That is, each number must be
strictly larger than the previous. Entering 3 4 5
would result in true, but entering 3 3 5 would result in false as would 3 5
4.
import java.util.*;
class Ordered {
static final Scanner in = new Scanner(System.in);
public static void main(String args) {
boolean x = increasing(in.nextInt(), in.nextInt(), in.nextInt());
System.out.println(x);
}
} 9. (2 points) Write a method findLargest that takes a reference to an
IntListElement, list, and returns the value of the
largest integer stored in the list. E.g. If the list myList contained 3, 4, 5,
1 then x = findLargest(myList) would assign
x to be 5. You should assume that the list is not empty. (BONUS up to 3
points for overall quiz total for the quarter) Write a method get(), to be
added to the
IntListElement class from problem 1, that takes one integer parameters,
n, and returns the value stored in the data
field of the nth element of the list (starting with 0 being the first
element). For example if myList pointed to the list
containing the 5 elements 100, 200, 300, 400, 500 then executing x =
myList.get(3); would store 400 in x.

---------------------------------------------------------------------------------------
COM 140Project 3
FOR MORE CLASSES VISIT
www.tutorialoutlet.com
Project 3
1. Specification
The third programming project involves writing a program to calculate
the terms of the following sequence of
numbers: 0 1 1 3 5 11 21 43 where each term is twice the second
previous term plus the previous term. The
0th term of the sequence is 0 and the 1st term of the sequence is 1.
The example below shows how to calculate the next sequence term:
Current sequence: 0 1
Current sequence: 0 1 1
Current sequence: 0 1 1 3
Current sequence: 0 1 1 3 5
etc. Calculate next term: 2 * 0 + 1 = 1
Calculate next term: 2 * 1 + 1 = 3
Calculate next term: 2 * 1 + 3 = 5
Calculate next term: 2 * 3 + 5 = 11 The interface to the program should
be a Swing based GUI that looks similar to the following: The pair of
radio buttons allows the user to choose whether an iterative or recursive
method is used to compute
the term of the sequence. When the user enters a value for n and then
clicks the Compute button, the nth term of
the sequence should be displayed in the Result field. The Efficiency field
should contain the number of calls to the
recursive method when the recursive option is chosen and the number of
iterations of the loop when the iterative
option is selected. The program will check the validity of the user input
value which should be a positive integer. A
message will be shown in a JOptionPane for illegal entered values.
The Iterative radio button should be initially selected.
When the window is closed, the efficiency values should be computed
with values of n from 0 to 19 and written to
a text file outData.txt. Each line of the file should contain the value of n,
the efficiency of the iterative method for
that value of n and the efficiency of the recursive method. The values
should be separated by commas so the file
can be opened with Excel and used to graph the value of the efficiencies
for both the iterative and recursive
options along the y axis with the value of n along the x-axis. The graph
should be included in the solution
description document that accompanies this project and should also
contain a brief explanation of the observed
results.
The program should consist of two classes. 1 1. The first class P3GUI
should define the Swing based GUI and should be hand-coded and not
generated by a GUI
generator. In addition to the main method and a constructor to build the
GUI, an event handler will be needed to
handle the Compute button click and another handler will be needed to
produce the file described above when
the window is closed. The latter handler should be an object of an inner
class that extends the WindowAdapter
class.
2. The other class should be named Sequence. It should be a utility class
meaning that all its methods must be
class (static) methods and no objects should be able to be generated for
that class. It should contain three public
methods:
a. The first method computeIterative should accept a value of n and
return the corresponding element in
the sequence using iteration.
b. The second method computeRecursive should accept a value of n and
return the corresponding element
in the sequence using recursion. This method will initialize the
efficiency counter before calling the private
recursive method that will actually perform the recursive computation.
c. The third method getEfficiency will return the efficiency counter left
behind by the previous call to either
of the above two methods.
Your program should compile without errors.
The Google recommended Java style guide
(https://google.github.io/styleguide/javaguide.html) should be used to
format and document your code. Specifically, the following style guide
attributes should be addressed: Header comments include filename,
author, date and brief purpose of the program. In-line comments used to
describe major functionality of the code. Meaningful variable names and
prompts applied. Class names are written in UpperCamelCase. Variable
names are written in lowerCamelCase. Constant names are in written in
All Capitals. Braces use K&R style. In addition the following
design constraints should be followed: Declare all instance variables
private
Avoid the duplication of code Test cases should be supplied in the form
of a table with columns indicating what aspect is tested, the input
values, expected output, actual output and if the test case passed or
failed. This table should contain 5 columns
with appropriate labels and a row for each test case. Note that the actual
output should be the actual results you
receive when running your program and applying the input for the test
record. Be sure to select enough differentkinds of employees and
situations to completely test the program.
2. Submission Requirements
Submit the following to the Project 3 assignment area no later than the
due date listed in your LEO classroom.
1. Source files P3GUI.java, Sequence.java and the program generated
output file outData.txt. The source code
should use Java code conventions and appropriate code layout (white
space management and indents) and
comments. All submitted files may be included in a .zip file. 2 2. The
solution description document P3SolutionDescription (.pdf or .doc /
.docx) containing the following:
(1) Assumptions, main design decisions, error handling;
(2) Test cases table
(3) The graph of the value of the efficiencies for both the iterative and
recursive options along with a brief
explanation of the observed results.
(4) Screen captures showing successful program compilation and test
cases execution. Each screen capture should
be properly labeled, clearly indicated what the screen capture represents.
(5) Lessons learned from the project;
3. Grading Rubric
The following grading rubric will be used to determine your grade:
Attribute
P3GUI class Meets
40 points Does not meet
0 points a) Defines the GUI. a) Does not define the GUI. b) Contains a
pair of radio buttons
allowing the user to choose whether an
iterative or recursive method is used to
compute the term of the sequence. b) Does not contain a pair of radio
buttons
allowing the user to choose whether an
iterative or recursive method is used to
compute the term of the sequence. c) Allows the user to enter a value for
n
and click the Compute button, to
display the nth term of the sequence in
the Result field. c) Does not allows the user to enter a
value for n and click the Compute button,
to display the nth term of the sequence in
the Result field. d) User input value is checked and
warning message is displayed if the
entered value is not a positive integer. d) User input value is checked and
warning
message is displayed if the entered value
is not a positive integer. e) Allows the Efficiency field to contain
the number of calls to the recursive
method when the recursive option is
chosen and the number of iterations of
the loop when the iterative option is
selected. e) Does not allow the Efficiency field to
contain the number of calls to the
recursive method when the recursive
option is chosen and the number of
iterations of the loop when the iterative
option is selected. f) The Iterative radio button is initially
set to selected. f) The Iterative radio button is not initially
set to selected. g) When the window is closed, the
efficiency values computes with values
of n from 0 to 19 and writes them to a
file.
h) Each line of the output file contains
the value of n, the efficiency of the
iterative method for that value of n and 3 g) When the window is closed,
the
efficiency values does not compute with
values of n from 0 to 19 and the output
file is not generated.
h) Each line of the output file does not
contain the value of n, the efficiency of the efficiency of the recursive
method.
i) The values of the output file are
separated by commas so the file can be
opened with Excel.
j) Provides an event handler to handle
the Compute button click and another
handler will be needed to produce the
file described above when the window
is closed. The latter handler is an object
of an inner class that extends the
WindowAdapter class. Sequence Class Test Cases the iterative method
for that value of n
and the efficiency of the recursive
method.
i) The values of the output file are not
separated by commas so that the file can
be opened by Excel. 30 points j) Does not provides an event handler to
handle the Compute button click and
another handler will be needed to
produce the file described above when
the window is closed. The latter handler is
an object of an inner class that extends
the WindowAdapter class.
0 points a) All methods are class (static)
methods. a) All methods are not class (static)
methods. b) Contains three public methods. b) Does not contain three
public methods. c) Contains computeIterative method
that accepts a value of n and returns
the corresponding element in the
sequence using iteration. c) Does not contain the computeIterative
method that accepts a value of n and
returns the corresponding element in the
sequence using iteration. d) Contains method computeRecursive
that accepts a value of n and returns
the corresponding element in the
sequence using recursion. d) Does not contain the computeRecursive
method that accepts a value of n and
returns the corresponding element in the
sequence using recursion. e) The computeRecurvise method will
initialize the efficiency counter before
calling the private recursive method
that will actually perform the recursive
computation. e) The computeRecurvise method does
not initialize the efficiency counter before
calling the private recursive method that
will actually perform the recursive
computation. f) The getEfficiency method returns the
efficiency counter left behind by the
previous call to either of the above two
methods.
10 points f) The getEfficiency method does not
return the efficiency counter left behind
by the previous call to either of the above
two methods.
0 points a) Test cases are supplied in the form
of table with columns indicating test
case objective, the input values,
expected output, actual output and if
the test case passed or failed. a) No test cases were provided. b) Enough
scenarios selected to 4 completely test the program. Documentation and
Style
guide c) Test cases were included in the
supporting word or PDF
documentation.
20 points
a) Solution description document
P3SolutionDescription includes all the
required sections appropriate titled. 0 points
a) No solution description document is
included.
Source code criteria Source code criteria
b) Header comments include filename,
author, date and brief purpose of the
program.
c) In-line comments used to describe
major functionality of the code.
d) Meaningful variable names and
prompts applied.
e) Class names are written in
UpperCamelCase.
f) Variable names are written in
lowerCamelCase.
g) Constant names are in written in All
Capitals.
h) Braces use K&R style.
i) Declare all instance variables private.
j) Avoids the duplication of code. 5 b) Java style guide was not used to
prepare the Java code.
c) All instance variables not declared
private.
d) Duplication of code was not avoided.
---------------------------------------------------------------------------------------
COP 3330 Upon completion of this program

FOR MORE CLASSES VISIT


www.tutorialoutlet.com
Objective
Upon completion of this program,you should gain experience with the
use of managing arrays inside of a class. ABETISMALCS Assessment
This assignment is designated as one of the course assignments being
used to assess basic programming skills for ABETISLLALCs
requirements. Please see the syllabus for details. Note that
in addition to the normal grading scales, each students submission Will
be judged in several aspects on a scale of "HighlyEffwtive",
Effective", or "Ineffective" , as specied by
ABETISNIAIES outcome assessment procedures. A student's
submission that earns 70% of the available points will count as an
overall score of Effective". Task You will write a class called
Grid, and test it with a couple of programs. A Grid object will be made
up or" a grid of positions, numbered with rows and columns. Row
and column numbering
start at 0. at the top left corner of the grid. A grid object also has a
"mover". which can move around to different locations on
the grid. Obstacles (which block the mover) and other objects
(that can he placed or picked up) are also available. Here is a sample
picture of a Grid object: O . . This is 3 Grid object with 4 rows and 4
columns (numbered 0 - 3).
. b . The mover >' is at. row 1' column 2, facing eeet.
. . The obstacle 4 is at row 3, column 1 . # . . The other item '0' ie at.
row 0, column 0 The E character indicates that the mover and an item
(0] currently occupy the same position on the grid. Program Details and
Requirements 1) Grid class Download this starter le: grid starter . h and
rename it as grid . 1:. Your member function prototypes are already
given in this le. You will need to add appropriate member data. You
will
also need to dene each of the member functions in the le grid.cpp.
You may add Whatever member data you need, but you must store the
grid itself as a two-dimensional array. Maximum
grid size will be 40 rows and 40 columns.
---------------------------------------------------------------------------------------
COSC 2315 Implement aprogram that will use a
stack
FOR MORE CLASSES VISIT
www.tutorialoutlet.com
Implement as program that will use a stack structure to check for correct
placement of parentheses in an algebraic expression. Allow the use of
( ) [ ] { } characters as grouping symbols. Make sure that an error is
reported for an expression of a form (...]. In addition report other
possible parentheses related errors (too many levels, too many right
paren., too many left paren.). Make sure to use 'silent error reporting'
(and report any possible errors outside the main scanner loop).

Hint - start with the program that checks '(...)' and when all the common
errors are correctly reported, expand the parentheses syntax to ([{...}])

---------------------------------------------------------------------------------------
CS 161Assignment 4 Strings and Function
FOR MORE CLASSES VISIT
www.tutorialoutlet.com
Assignment 4
Strings and Functions
Due: Sunday, February 19, 2017 11:59pm
(90 pts) Problem Statement: Wheel of Fortune
You will implement the program for playing a modified Wheel of
Fortune. The game must allow
a user to enter the number of rounds to play and a new secret message
(possibly containing
blanks) with each round, and print the number of dashes/slots for the
message (spaces do not
get dashes, just the space).
If you are not familiar with the game of Wheel of Fortune, then you can
watch an episode on
YouTube: https://www.youtube.com/watch?v=A8bZUXi7zDE
NOTE: I realize there are solutions to assignments online, but resist the
temptation of using
these because the assignments are checked against online resources,
code submitted by
classmates, and code submitted by prior students for
cheating/plagiarism. It is much more
gratifying to complete this on your own. Make sure you take time to
design well!!!
The game can play with 1-3 players, and it continues a round, until
someone solves the puzzle
correctly. A new puzzle is given with each round. In this Wheel of
Fortune, you wont win as
much or any prizes, but you might go bankrupt or lose a turn!!! Your
random numbers are only
from 0-21, with 0 being bankrupt, 1-20 being the dollar amount earned
per letter found in the
puzzle, and 21 is lose a turn.
The game begins by asking the first player if he/she wants to spin the
wheel, buy a vowel, or
solve the puzzle. On a players first turn, it might not make sense to
choose anything other than
spinning the wheel, but a player is given these three choices at all times
during their turn, until
they guess an incorrect non-vowel letter, incorrectly solve the puzzle, or
spin a 0 or 21.
If the player chooses to spin and the spin is >0 and <21, then the
player is asked to guess a
non-vowel letter. If the non-vowel letter was not found in the puzzle,
then the player loses their
turn to the next player. If the non-vowel letter is found in the puzzle,
then the player wins the
number of letters found times (*) the dollar amount spun.
If a player spins a 0, then the players earnings go to a zero in that round,
and the next player
gets the three choices to spin the wheel, solve the puzzle, or buy a
vowel. If a player spins a
21, then the players keeps the round earnings, but the next player gets
the three choices to
spin the wheel, solve the puzzle, or buy a vowel.
If a player chooses to solve the puzzle and does so correctly, then the
player gets to keep all
the money earned in that round, while all other players lose their money
in that round. If a
player chooses to solve the puzzle and does so incorrectly, then the turn
goes to the next
player.
A player can only buy a vowel when his/her earnings are >= $10,
which is the one-time amount
paid for each vowel guess, regardless of whether the vowel is found.
The player who has the most money after N rounds is the winner!
A few rule specifics: You have a total round earnings and a total game
earnings. You always get a choice of spinning the wheel, solving the
puzzle, or buying a vowel
during your turn, buy you cannot buy a vowel if you have less than $10.
You lose your turn by incorrectly guessing a non-vowel letter on a spin,
spinning a 0 or
21, or incorrectly solving the puzzle. If you spin > 0 or <21, then
you get the number spun times (*) the number of non-vowel
letters found added to your round total.
If you spin a 0, then you go bankrupt in the round (lose your round
total), and it ends
your turn.
If you spin a 21, then you keep your round total, but it ends your turn.
You can buy a vowel for $10, and you only pay the $10 vowel purchase
once on a
guess, independent of how many are found.
If you solve the puzzle correctly, then you keep the money earned for
that round and add
it to your total game earnings.
You win the game by having the most game earnings, not round
earnings!!! Your program must print out 1) the number spun on the
wheel,2) the number of letters found for
a guess, 3) the total round earnings, 4) the message with the correctly
guessed slots and blank
slots, 5) if the user guesses the message, then a winner message and the
total game earnings
for all players, and 6) after all rounds are played, a message with the
winning player.
Program Requirements: Only use C++ strings, no need for an array!
Hint: use two strings! Your program must ignore cases in the message.
Each function, including main, may not have more than 15 lines of code
(this doesnt include
curly braces, variable declarations, comments, and blank spaces!). You
are not allowed to use global variables.
Read the C++ string documentation to help with this assignment:
http://www.cplusplus.com/reference/string/string/?kw=string
**You can decide how many incorrect guesses a user gets before they
lose. In addition, you can
use the system(clear); command from the <cstdlib> to clear the
screen, after the user enters
their message. Yes they can scroll above to see the message, but we
arent cheaters!!!
Example Run:
Enter a message: National Park Service
How many players do you have? 2
How many rounds for winning? 1
The message is _ _ _ _ _ _ _ _ ____ _______ Player 1:
Do you want to spin (1), solve the puzzle (2), or buy a vowel (3): 1
Your wheel landed on 20
Guess a letter: n
2 found. Total: $40
The message is N _ _ _ _ n _ _ ____ _______ Do you want to spin (1),
solve the puzzle (2), or buy a vowel (3): 1
Your wheel landed on 10
Guess a letter: l
1 found. Total: $50
The message is N _ _ _ _ n _ l ____ _______ Do you want to spin (1),
solve the puzzle (2), or buy a vowel (3): 3
Guess a vowel: a
3 found. Total: $40
The message is N a _ _ _ n a l _ a _ _ _ _ _ _ _ _ _ Do you want to spin
(1), solve the puzzle (2), or buy a vowel (3): 1
Your wheel landed on 0
Total: $0
The message is N a _ _ _ n a l _a__ _______ Player 2:
Do you want to spin (1), solve the puzzle (2), or buy a vowel (3): 1
Your wheel landed on 5
Guess a letter: r
2 found. Total: $10
The message is N a _ _ _ n a l _ar_ __r____ Do you want to spin (1),
solve the puzzle (2), or buy a vowel (3): 1
Your wheel landed on 10
Guess a letter: t
1 found. Total: $20
The message is N a t _ _ n a l _ar_ __r____ Do you want to spin (1),
solve the puzzle (2), or buy a vowel (3): 2
Guess message: National Park Service
You are correct! Player 2 wins round 1.
Player 1 total: $0
Player 2 total: $20
Player 2 wins game!
(10 pts) Extra Credit Error Handling
Make it so that your program never errors on users input! Handle the
following errors: The user enters a message or letter outside of A-Z and
a-z. The user enters an invalid menu choice. The user enters a vowel for
a non-vowel guess. The user enters a non-vowel for a vowel guess.
(-10 pts) Automatic Deduction: You are not allowed to use global
variables in any assignment
in CS 161. There isnt any practical purpose for them in this course.
Keep this in mind as you
design your program with functions.
(10 pts) Program Style/Comments
In your implementation, make sure that you include a program header in
your program, in
addition to proper indentation/spacing and other comments! Below is an
example header to
include. Make sure you review the style guidelines for this class, and
begin trying to follow
them, i.e. dont align everything on the left or put everything on one
line!
http://classes.engr.oregonstate.edu/eecs/winter2017/cs161-
001/161_style_guideline.pdf
You are graded on having a header, function headers with pre/post
conditions, proper
comments, and readable code with indentation and vertical spacing that
is CONSISTENT
throughout your program. DO NOT align your entire program on the left
side. This will cause
you to automatically lose the full 10 points. In addition, do not forget
your program header!!!
Electronically submit your C++ program (.cpp file, not your
executable!!!) by the assignment due
date, using TEACH.

---------------------------------------------------------------------------------------
CS 192 Lets think about the use of Lists in everyday life

FOR MORE CLASSES VISIT


www.tutorialoutlet.com
Lets think about the use of Lists in everyday life. Provide an example
and discuss the advantages and disadvantages of using these types of
Lists.

---------------------------------------------------------------------------------------
CS 210 Introduction to Programming Java Programming Assignment

FOR MORE CLASSES VISIT


www.tutorialoutlet.com
CC& The output file will contain a list of vehicle license plate numbers
(accessed via agetter) and the fine associated with that license, with the
fines right-aligned on thedecimal poi If the file opened successfully,
generate a report and write it to the output file. Define an instance
method to produce a fines report.The method will create an output file
with the fines report. The method should:o Have one parameter, the fines
arrayo Read the filename for the report output file from the user.o Try to
open the report output file Store the calculated fine in the fines
array. Calculate the ticket fine. Access the clockedSpeed and
speedLimit data stored in the object using getters. Define a method to
calculate and store values in the fines array. The method will:o Have one
parameter, the empty fines arrayo Define constants for all fixed values in
the calculations (from page 1 of this assignment).o For each ticket stored
in the ticket array: Display a message that explains which file could not
be opened.o Return the count of tickets stored in the array.Regis
University, All Rights ReservedUnauthorized distribution (including
uploading to any non-Regis Internet website) violates copyright
lawv Display the number of SpeedingTicket objects stored in the ticket
data array.o Catch any FileNotFoundException exceptions. When
caught: Close file. Set a value to exit the loop (so no more data will be
read).Loop until there is no more file data or an exception is
thrown. Also display a message that no more data will be read from
the file. Display the message passed back via the throw. Catch any
thrown ArrayIndexOutOfBoundsException exceptions.v Try to call the
instance method to add the ticket object to the ticket dataarray(this is an
instance method of the TicketArrayImpl class)v Call the constructor to
create a new SpeedingTicket object.v Read the three data items from one
line of data in the input data filev In a loop: Display a message that the
program is reading the file data Otherwise, it will return 0, to indicate
the file could not be opened/read.o Implement code to try to open the
input data file. If the file opened: If the file was opened successfully,
the method will return the number of ticketsstored in the array. Define a
method to read all the data from the input file and store the ticket data by
addingSpeedingTicket objects into the array. The method will:o Have
one parameter: the name of the data input file (String)o Return an int
value Otherwise, store the ticket object into the array and increase the
ticket count Include a message to pass to the exception handler that
states thearray is full and stating which license cannot be added. If the
array is full, will throw an ArrayIndexOutOfBoundsException Define
an instance method to add one SpeedingTicket object to the ticket data
array.The method will:o Have one parameter, the ticket object to addo
Test to see if the array is full Define a constructor that will:o Instantiate
a ticket array object (using new to initialize the array reference variable
andthe constant array size)o Initialize the count of tickets stored to 0 A
count of actual ticket objects storedNote: The data property definitions
will only define the array reference variable. It will not create the array
object.Regis University, All Rights ReservedUnauthorized distribution
(including uploading to any non-Regis Internet website) violates
copyright lawWithin the TicketArraysImpl class:v A ticket data array (to
hold SpeedingTicket objects)v A static constant array size (maximum
items that can be held in the array) set to 200The class will have the
following private data properties:v Define getters for each data
property.3. Define a second class that will implement the ticket array for
this program, named:TicketArrayImplThe class will have the following
public data properties: Define a constructor, with parameters for each
data property.o Use the parameters to initialize the values. the clocked
speedWithin the SpeedingTicket class:v the speed limitv vehicle license
plate number (a 6-character String)v A main class to run the program1.
Create a new Java NetBeans project, named as
follows:LastnameJavaAssn8For example: SmithJavaAssn82. Define a
Java class with properties and methods for a speeding ticket object,
named:SpeedingTicketThe class will have the following private data
properties: A class to implement the object array (to hold
SpeedingTicket objects) A class to define a SpeedingTicket
object Analyze the fines to determine the high, low, and average fines,
and display the results.Here are the formulas the city uses for calculating
a speeding ticket fine:Ticket Fine = Court costs ($45.00) + a fee for each
mile per hour (MPH) by which the speed limit was exceeded The fee
will be levied as follows:MPH Over Speed Limit Fee per MPH Over
Speed Limit (for all MPH over limit)up to 10 $ 4.25over 10 and up to 20
$ 6.00over 20 $ 8.10You must define constants to hold all fixed values
(court costs, MPH over speed limits, and fees perMPH) in the above
chart within your method that calculates the fines.Regis University, All
Rights ReservedUnauthorized distribution (including uploading to any
non-Regis Internet website) violates copyright
lawProgramRequirementsThis program will implement two different
types of arrays. One array will hold ticket objects, and willrequire an
implementation class. The other array will contain primitive data type
double values, and willnot require an implementation class.NOTE: The
ticket array and the fines array will be parallel arrays. This means that
thefine will be stored into the fines array using the same index as the
ticket object in theticketarray.NOTE: For an example of a Java program
implementing arrays, see Online Content section 15.10.Required Classes
and MethodsThree separate classes will be required for this
program. Produce an output file, containing the vehicle license plate
numbers and speeding fines. Calculate the speeding ticket fines to
assess, based on the ticket data, and store the fines into asecond array
that holds double values. This array will be sized to the number of
tickets issued. Read the data from the file, line by line, and store the
data into an array that holds ticket dataobjects. This array will hold a
maximum of 200 ticket data objects.ISCS210 Introduction to
ProgrammingJava Programming Assignment 8: Array
ImplementationNOTE: This assignment will be more challenging than
the previous assignments, so make sure tostart early and allocate enough
time to complete it, including time you might need to seek
anynecessaryhelp.Since this is the last program, the program may not be
submitted more than 1 day late!ProblemSummaryA local city would like
you to write a program to help them analyze data on speeding tickets.
City policehave collected information about the speeding violations.
They store data about each ticket issued duringa one week period in a
text data file. Data collected for each ticket includes the vehicle license
platenumber, the speed limit, and the clocked speed. From past data, the
police department knows that it willnot issue more than 200 tickets per
week.You may assume all data in input data file is valid data (i.e.
formatted correctly), but you must verify thatthe file exists (i.e. can be
opened). If the file does not exist, the program will loop until you enter
thefilename for a file that can be opened.Sample input data file
lines:BBB222 50 60XYZ123 40 45A1B2C3 30 51The police
department would like you to write a program to read the file, calculate
the fines to assess, andgenerate several reports. The program will: Then
submit your .zip file to the Java ProgAssn 8 assignment submission
folder (located underthe Assignments/Dropbox tab in the online
course).o Warning: Only NetBeans export files will be accepted. Do not
use any other kind of archive or zip utility.GradingPrograms will be
graded using the rubric that is linked on the same assignment page as
this file.WARNING:Programs submitted more than 1 day past the due
date will not be accepted,and will receive a grade of 0.Regis
University, All Rights ReservedUnauthorized distribution (including
uploading to any non-Regis Internet website) violates copyright law/***
Description of class and author and version tags*/public class
SpeedingTicket {// ticket data fields go here// constructor with
parameters (and comments) goes here// getters (with comments and
return tags) go here}/*** Description of class and author and version
tags*/public class TicketArrayImpl { // static constant array size goes
here // data fields go here (ticket array and ticket count) // constructor
without parameters (nd comments) goes here // (instantiates ticket array
object and initializes ticket count) // method to add ticket object to ticket
array goes here (with comments and parameter tag) // method to read
ticket data from file goes here (-includes comments with parameter and
return tags -creates a ticket object for each ticket and -calls previous
method to add the object to the ticket array) // method to calculate
fines/store into array goes here (with comments and parameter tag) //
method to create the fines report goes here (with comments and
parameter tag)}/*** Description of program, and author and version
tags*/public class TicketAnalysis { public static void main(String[] args)
{ // code to define variables First export your project from NetBeans, as
detailed in previous assignmentso Name your export file in the
following format:Assn.zipFor example: SmithAssn8.zipNOTE: Save
this zip file to some other directory, not your project directory. Include
tags with the authors name (i.e. your full name) and the version of
thecode (e.g. Java Assn 4, version 1.0)o Comments at the top of each
method, describing what the method doesInclude tags with names and
descriptions of each parameter and return value.TestingYou will need to
create test data files to test your program. In combination, all your test
data files shouldtest every possible execution path within your code,
including erroneous data which cause exceptions.Before you submit
your project, add your all files you used to test your program in the top
level of yourproject directory (and add a number to the end of each file,
if there are multiple test data files).File examples:
datafile1.txtdatafile2.txt (numbered, if multiple data files
tested)SubmissionThis programming assignment is due by midnight of
the date listed in the Course Assignments by Week.REMINDER:
Programs submitted that do not compile without errors will not be
accepted.Again, you will submit a single zip file containing all of the
files in your project. Ask the user whether to run the program again,
using a different input file.Loop until the user says s/he does not want to
run the program again.SampleRunWARNING: The objects, classes, and
methods must be implemented exactly as specified above.If your
program produces correct output, but you did not create and use the
objects as specified,and implement the required classes and methods,
you will lose a significant number of points.See last page of the file for
outline of code for the three required classes.This program will run
analyses on weekly speeding ticket data filesEnter input filename:
tickets Cannot open input file: ticketsEnter input filename:
tickets.txtReading ticket data...Data stored for 3 ticketsCalculating
fines...Done!Enter name of report output file: report.txtWeek's Ticket
Analysis for 3 tickets issued: Lowest ticket fine 66.25 Average ticket
fine 122.95 Highest ticket fine 215.10Run program again with another
file (y/n)? nRegis University, All Rights ReservedUnauthorized
distribution (including uploading to any non-Regis Internet website)
violates copyright law5. The program must follow the CS210 Coding
Standards from Content section 6.10.Be sure to include the following
comments:o Comments at the top of each code file describing what the
class does Execute the static method to display a ticket summary. The
instance method to produce a fines reportv The instance method to
calculate the fines and store them in the arrayv Uses the
TicketArraysImpl object to call: Define an array (to hold double fines),
the same size as the array for ticket objects. Display a message to the
user, that the program is calculating the fines. Using the object, call the
instance method to read and store the data from theinput file (sends a
message to the TicketArraysImpl object).Loop until the method returns a
number other than 0, indicating the file was read (andthat the ticket data
array now has ticket data stored in it).v Read the filename for the input
data file from the user.v In a loop (inner loop): Create a new object of
the TickeArraysImpl class. Define a main method to:o Display a
description of what the program will do to the user.o In a loop (outer
loop): Define a static method to display a ticket summary, using the
previously defined static methods tocalculate the low, high, and average
fines.o Parameters: the fines array and count of fines in the arrayo Ticket
summary will be displayed as shown in the sample output on the next
page, with allfigures will be right-aligned on the decimal point.BBB222
87.50XYZ123 66.25A1B2C3 215.10Total 368.85Regis University, All
Rights ReservedUnauthorized distribution (including uploading to any
non-Regis Internet website) violates copyright law Define three static
methods to:o Determine and return the lowest fine amounto Calculate
and return the average fine amounto Determine and return the highest
fine amountEach will have the fines array and count of fines in the array
as parameters. Display a message that explains which file could not be
openedand that a fines report will not be generated.4. Define a third
(main) class named:TicketAnalysisWithin the TicketAnalysis
class: The last line of the output file will contain the total of all fines
collected, rightalignedon the decimal point, with the fines listed above
it.Sample output fileo Catch any FileIOException exceptions. When
caught:nt. & display program description // Loop:// code to instantiate
TicketArrayImpl object // Loop:// code to read filename and try to read
data from the file// code to create fines array// code to call other methods
} // three methods to calculate the fines average, low, and high go
here(includes comments with parameter and return tags) // method to
display a ticket summary (with comments and parameter tags)
---------------------------------------------------------------------------------------
CS 331, Spring 2017 Assignment #2
FOR MORE CLASSES VISIT
www.tutorialoutlet.com
CS 331, Spring 2017 Assignment #2
Greg Plaxton
January 31, 2017
For this assignment, you are required to turn in solutions to any two of
Problems 1
through 4, which appear in Section 2 below. Your solutions are due at
the beginning of class
on Thursday, February 9. Please refer to the course syllabus for the
ground rules concerning
collaboration, and for the slack day policy governing lateness.
Any corrections or clarifications related to this assignment will be
announced in the
lectures and on Piazza. You are responsible for being aware of any such
announcements. 1 Exercises The following textbook exercises are
recommended to help you to prepare for the tests. We
will not be grading your solutions to these exercises, so you do not need
to turn anything in.
1. Exercise 3.10, page 110.
2. Exercise 3.12, page 112.
3. Exercise 4.15, page 196.
4. Exercise 4.28, page 203. 2 Programming & Problem Solving In
this part of the assignment, we continue our investigation of the SMI
problem introduced
in Assignment 1.
In the first lecture (see also Section 1.1 of the textbook), we described
the deferred
acceptance algorithm for the SM problem. We showed that given any
instance I of the SM
problem, the deferred acceptance algorithm produces a stable matching.
In Problem 3 of
Assignment 1, we showed that there is a natural way to modify the
deferred acceptance
algorithm so that it produces a stable matching on any given SMI
instance.
When we discussed the deferred acceptance algorithm for the SM
problem, we showed
that the stable matching it produces is man-optimal in the sense that
each man likes
1 University of Texas at Austin
Department of Computer Science Algorithms and Complexity
CS 331, Spring 2017 his partner in at least as well as his partner in any
other stable matching. The concept of
man-optimality is easily adapted to the context of the SMI problem; in
this context, we just
need to bear in mind that an agents partner in a given matching might
be no partner, i.e.,
being single is a possible outcome. Using arguments similar to the
corresponding arguments
for SM, it can be shown that for the SMI problem, the stable matching
produced by the
deferred acceptance algorithm (i.e., the version that we developed in
Problem 3 of Assignment 1) is man-optimal. It follows that even though
the deferred acceptance algorithm is
nondeterministic and hence can execute in many different ways on a
given SMI instance
the final output is uniquely determined; in the problem hints below,
we refer to this as
the confluence property of the deferred acceptance algorithm.
For any instance I of the SMI problem, we define da(I) as the stable
matching produced
by the deferred acceptance algorithm, and we define matched (I) as the
set of men who are
matched (i.e., not single) in da(I).
For any SMI instance I, any woman q in I, and any man p who is not in
I, we define
add (I, p, q) as the set of all SMI instances that are the same as I except
that (1) p is added
to the set of men, (2) the preferences of p are such that q is acceptable to
p and all other
women are unacceptable to p, and (3) the preferences of each woman in
I are augmented to
incorporate p. To clarify (3), consider a woman q 0 in I who finds ` of
the men in I to be
acceptable. There are ` + 2 ways for q 0 to augment her preferences to
incorporate p: she can
classify p as acceptable, in which case there are ` + 1 different ways she
can insert p into her
strict ranking of acceptable men, or she she can classify p as
unacceptable.
In the statement of Problem 1 below, we use the symbol as follows: If
we say that a
woman q prefers a man p to , we mean that q considers p to be
acceptable; conversely, if
we say that q prefers to p, it means that q considers p to be
unacceptable.
Problem 1. Let I be an SMI instance and let q be a woman in I. Prove
that there is a
unique element x of matched (I)+ such that the following conditions
hold for any man p who
is not in I and any SMI instance I 0 in add (I, p, q): if q prefers p to x in I
0 , then p is matched
to q in da(I 0 ); otherwise, p is single in da(I 0 ). Hints: (1) Use the
confluence property of the
deferred acceptance algorithm; (2) Observe that once execution of the
deferred acceptance
algorithm reaches a state where there is exactly one single man who has
not proposed to all
of his acceptable women, the rest of the execution is deterministic.
Definition: For any SMI instance I and any woman q in I, we define the
unique element
x identified in Problem 1 as threshold (I, q).
Problem 2. Let I be an SMI instance, let q be a woman in I, let p be a
man who is
not in I, and let I 0 be an SMI instance in add (I, p, q). Prove that no
woman q 0 in I prefers
threshold (I, q 0 ) to threshold (I 0 , q 0 ). Hints: (1) Use proof by
contradiction, i.e., assume that
there is a woman q 0 who prefers threshold (I, q 0 ) to threshold (I 0 , q 0
), and derive a contradiction;
(2) Use the confluence property of the deferred acceptance algorithm.
Problem 3. Let I be an SMI instance, let q be a woman in I, let p be a
man who
is not in I, and let I 0 be an SMI instance in add (I, p, q). Prove that if p
is single in
2 University of Texas at Austin
Department of Computer Science Algorithms and Complexity
CS 331, Spring 2017 da(I 0 ), then threshold (I 0 , q 0 ) = threshold (I, q
0 ) for every woman q 0 in I. Hints: (1) Use
proof by contradiction, i.e., assume p is single in da(I 0 ) and there is a
woman q 0 such that
threshold (I 0 , q 0 ) 6= threshold (I, q 0 ), and derive a contradiction; (2)
Use the result of Problem 2;
(3) Use the confluence property of the deferred acceptance algorithm.
Problems 1 through 3 above are concerned with modifying an SMI
instance I by adding
a new man. We now consider a way to modify an SMI instance without
adding a new agent.
For any SMI instance I, any woman q in I, and any man p in I who is
single in da(I)
and considers q to be unacceptable, we define extend (I, p, q) as the SMI
instance I 0 that is
identical to I except the preferences of man p are modified as follows:
man p moves woman q
from his unacceptable set to the the least-preferred position in his
ordered list of acceptable
women.
The arguments used for solving Problems 1, 2, and 3 are easily adapted
to establish
Lemma Extend below; the proof is omitted.
Lemma Extend. Let I be an SMI instance, let q be a woman in I, let p be
a man in I
who is single in da(I) and considers q to be unacceptable, and let I 0
denote the SMI instance
extend (I, p, q). If q prefers p to threshold (I, q), then p is matched to q in
da(I 0 ); otherwise,
p is single in da(I 0 ) and threshold (I 0 , q 0 ) = threshold (I, q 0 ) for
every woman q 0 i
---------------------------------------------------------------------------------------

CS210 Introduction to Java Programming


Assignment
FOR MORE CLASSES VISIT
www.tutorialoutlet.com
CS210 Introduction to Programming
Java Programming Assignment 8: Array Implementation
NOTE: This assignment will be more challenging than the previous
assignments, so make sure to
start early and allocate enough time to complete it, including time you
might need to seek any
necessary help.
Since this is the last program, the program may not be submitted more
than 1 day late!
Problem Summary
A local city would like you to write a program to help them analyze data
on speeding tickets. City police
have collected information about the speeding violations. They store
data about each ticket issued during
a one week period in a text data file. Data collected for each ticket
includes the vehicle license plate
number, the speed limit, and the clocked speed. From past data, the
police department knows that it will
not issue more than 200 tickets per week.
You may assume all data in input data file is valid data (i.e. formatted
correctly), but you must verify that
the file exists (i.e. can be opened). If the file does not exist, the program
will loop until you enter the
filename for a file that can be opened.
Sample input data file lines:
BBB222 50 60
XYZ123 40 45
A1B2C3 30 51
The police department would like you to write a program to read the file,
calculate the fines to assess, and
generate several reports. The program will: Read the data from the file,
line by line, and store the data into an array that holds ticket data
objects. This array will hold a maximum of 200 ticket data objects.
Calculate the speeding ticket fines to assess, based on the ticket data,
and store the fines into a
second array that holds double values. This array will be sized to the
number of tickets issued. Produce an output file, containing the vehicle
license plate numbers and speeding fines. Analyze the fines to determine
the high, low, and average fines, and display the results. Here are the
formulas the city uses for calculating a speeding ticket fine:
Ticket Fine = Court costs ($45.00)
+ a fee for each mile per hour (MPH) by which the speed limit was
exceeded
The fee will be levied as follows:
MPH Over Speed Limit
up to 10
over 10 and up to 20
over 20 Fee per MPH Over Speed Limit (for all MPH over limit)
$ 4.25
$ 6.00
$ 8.10 You must define constants to hold all fixed values (court costs,
MPH over speed limits, and fees per
MPH) in the above chart within your method that calculates the fines.
Requirements
This program will implement two different types of arrays. One array
will hold ticket objects, and will
require an implementation class. The other array will contain primitive
data type double values, and will
not require an implementation class.
NOTE: The ticket array and the fines array will be parallel arrays. This
means that the
fine will be stored into the fines array using the same index as the ticket
object in the
ticket array.
NOTE: For an example of a Java program implementing arrays, see
Online Content section 15.10.
Required Classes and Methods
Three separate classes will be required for this program. A class to
define a SpeedingTicket object
A class to implement the object array (to hold SpeedingTicket objects)
A main class to run the program 1. Create a new Java NetBeans project,
named as follows:
LastnameJavaAssn8
For example: SmithJavaAssn8
2. Define a Java class with properties and methods for a speeding ticket
object, named:
SpeedingTicket The class will have the following private data properties:
vehicle license plate number (a 6-character String) the speed limit the
clocked speed
Within the SpeedingTicket class: Define a constructor, with parameters
for each data property.
o Use the parameters to initialize the values. Define getters for each data
property. 3. Define a second class that will implement the ticket array for
this program, named:
TicketArrayImpl The class will have the following public data
properties: A static constant array size (maximum items that can be held
in the array) set to 200
The class will have the following private data properties: A ticket data
array (to hold SpeedingTicket objects) A count of actual ticket objects
stored
Note: The data property definitions will only define the array reference
variable.
It will not create the array object. Unauthorized distribution (including
uploading to any non-Regis Internet website) violates copyright law
Within the TicketArraysImpl class: Define a constructor that will:
o Instantiate a ticket array object (using new to initialize the array
reference variable and
the constant array size) o Initialize the count of tickets stored to 0 Define
an instance method to add one SpeedingTicket object to the ticket data
array.
The method will:
o Have one parameter, the ticket object to add
o Test to see if the array is full If the array is full, will throw an
ArrayIndexOutOfBoundsException Include a message to pass to the
exception handler that states the
array is full and stating which license cannot be added.
Otherwise, store the ticket object into the array and increase the ticket
count Define a method to read all the data from the input file and store
the ticket data by adding
SpeedingTicket objects into the array. The method will:
o Have one parameter: the name of the data input file (String) o Return
an int value If the file was opened successfully, the method will return
the number of tickets
stored in the array. Otherwise, it will return 0, to indicate the file could
not be opened/read. o Implement code to try to open the input data file.
If the file opened: Display a message that the program is reading the file
data In a loop: Read the three data items from one line of data in the
input data file Call the constructor to create a new SpeedingTicket
object. Try to call the instance method to add the ticket object to the
ticket data
array
(this is an instance method of the TicketArrayImpl class) Catch any
thrown ArrayIndexOutOfBoundsException exceptions. Display the
message passed back via the throw. Also display a message that no more
data will be read from the file. Set a value to exit the loop (so no more
data will be read).
Loop until there is no more file data or an exception is thrown. o Close
file.
Display the number of SpeedingTicket objects stored in the ticket data
array. Catch any FileNotFoundException exceptions. When caught:
Display a message that explains which file could not be opened. o
Return the count of tickets stored in the array Define a method to
calculate and store values in the fines array. The method will:
o Have one parameter, the empty fines array o Define constants for all
fixed values in the calculations (from page 1 of this assignment). o For
each ticket stored in the ticket array: Access the clockedSpeed and
speedLimit data stored in the object using getters. Calculate the ticket
fine. Store the calculated fine in the fines array. Define an instance
method to produce a fines report.
The method will create an output file with the fines report. The method
should:
o Have one parameter, the fines array o Read the filename for the report
output file from the user. o Try to open the report output file If the file
opened successfully, generate a report and write it to the output file. The
output file will contain a list of vehicle license plate numbers (accessed
via a
getter) and the fine associated with that license, with the fines right-
aligned on the
decimal point. The last line of the output file will contain the total of all
fines collected, rightaligned on the decimal point, with the fines listed
above it.
Sample output file
BBB222
XYZ123
A1B2C3
Total o 87.50
66.25
215.10
368.85 Catch any FileIOException exceptions. When caught: Display a
message that explains which file could not be opened
and that a fines report will not be generated. 4. Define a third (main)
class named:
TicketAnalysis Within the TicketAnalysis class: Define three static
methods to:
o Determine and return the lowest fine amount
o Calculate and return the average fine amount
o Determine and return the highest fine amount
Each will have the fines array and count of fines in the array as
parameters. Define a static method to display a ticket summary, using
the previously defined static methods to
calculate the low, high, and average fines.
o Parameters: the fines array and count of fines in the array
o Ticket summary will be displayed as shown in the sample output on
the next page, with all
figures will be right-aligned on the decimal point.
Regis University, All Rights Reserved
Unauthorized distribution (including uploading to any non-Regis
Internet website) violates copyright law Define a main method to:
o
o Display a description of what the program will do to the user.
In a loop (outer loop): Create a new object of the TickeArraysImpl class.
In a loop (inner loop): Read the filename for the input data file from the
user. Using the object, call the instance method to read and store the data
from the
input file (sends a message to the TicketArraysImpl object).
Loop until the method returns a number other than 0, indicating the file
was read (and
that the ticket data array now has ticket data stored in it). Display a
message to the user, that the program is calculating the fines. Define an
array (to hold double fines), the same size as the array for ticket objects.
Uses the TicketArraysImpl object to call: The instance method to
calculate the fines and store them in the array The instance method to
produce a fines report Execute the static method to display a ticket
summary. Ask the user whether to run the program again, using a
different input file. Loop until the user says s/he does not want to run the
program again.
Sample Run
This program will run analyses on weekly speeding ticket data files
Enter input filename: tickets
Cannot open input file: tickets
Enter input filename: tickets.txt
Reading ticket data...
Data stored for 3 tickets
Calculating fines...
Done!
Enter name of report output file: report.txt
Week's Ticket Analysis for 3 tickets issued:
Lowest ticket fine
66.25
Average ticket fine
122.95
Highest ticket fine
215.10
Run program again with another file (y/n)? n WARNING: The objects,
classes, and methods must be implemented exactly as specified above.
If your program produces correct output, but you did not create and use
the objects as specified,
and implement the required classes and methods, you will lose a
significant number of points.
See last page of the file for outline of code for the three required
classes.. The program must follow the CS210 Coding Standards from
Content section 6.10.
Be sure to include the following comments:
o Comments at the top of each code file describing what the class does
Include tags with the authors name (i.e. your full name) and the version
of the
code (e.g. Java Assn 4, version 1.0)
o Comments at the top of each method, describing what the method does
Include tags with names and descriptions of each parameter and return
value.
Testing
You will need to create test data files to test your program. In
combination, all your test data files should
test every possible execution path within your code, including erroneous
data which cause exceptions.
Before you submit your project, add your all files you used to test your
program in the top level of your
project directory (and add a number to the end of each file, if there are
multiple test data files).
File examples: datafile1.txt
datafile2.txt (numbered, if multiple data files tested) Submission
This programming assignment is due by midnight of the date listed in
the Course Assignments by Week.
REMINDER: Programs submitted that do not compile without errors
will not be accepted.
Again, you will submit a single zip file containing all of the files in your
project. First export your project from NetBeans, as detailed in previous
assignments
o Name your export file in the following format:
<lastname>Assn<x>.zip For example: SmithAssn8.zip
NOTE: Save this zip file to some other directory, not your project
directory. Then submit your .zip file to the Java ProgAssn 8 assignment
submission folder (located under
the Assignments/Dropbox tab in the online course).
o Warning: Only NetBeans export files will be accepted.
Do not use any other kind of archive or zip utility. Grading
Programs will be graded using the rubric that is linked on the same
assignment page as this file.
WARNING:
Programs submitted more than 1 day past the due date will not be
accepted,
and will receive a grade of 0* Description of class and author and
version tags
*/
public class SpeedingTicket {
// ticket data fields go here
// constructor with parameters (and comments) goes here
// getters (with comments and return tags) go here
}
/**
* Description of class and author and version tags
*/
public class TicketArrayImpl {
// static constant array size goes here
// data fields go here (ticket array and ticket count)
// constructor without parameters (nd comments) goes here
//
(instantiates ticket array object and initializes ticket count)
// method to add ticket object to ticket array goes here
(with comments and parameter tag)
// method to read ticket data from file goes here
(-includes comments with parameter and return tags
-creates a ticket object for each ticket and
-calls previous method to add the object to the ticket array)
// method to calculate fines/store into array goes here
(with comments and parameter tag)
// method to create the fines report goes here
(with comments and parameter tag)
}
/**
* Description of program, and author and version tags
*/
public class TicketAnalysis {
public static void main(String args) {
// code to define variables & display program description
// Loop:
// code to instantiate TicketArrayImpl object
// Loop:
// code to read filename and try to read data from the file
// code to create fines array
// code to call other methods
}
// three methods to calculate the fines average, low, and high go here
(includes comments with parameter and return tags)
// method to display a ticket summary (with comments and parameter
tags)
}
---------------------------------------------------------------------------------------

CSIS 325CMS PROJECT PHASE I INSTRUCTIONS


FOR MORE CLASSES VISIT
www.tutorialoutlet.com
CMS PROJECT PHASE I INSTRUCTIONS
Part A:
Background Information:
CMS Systems, Inc. is a company that provides information systems
consulting services to companies in the telecom industry in the United
States and the United Kingdom. Due to its success, CMS is hoping to
expand its operations into other parts of Europe. Despite its large size,
CMS currently uses a manual/spreadsheet-based process for maintaining
employee and client data. Management has now decided to implement a
company-wide database that will serve all of its operations.
CMS currently employs 1,500 individuals (900 in the US and 600 in the
UK) who serve as systems analysts, developers, managers, testers,
maintenance engineers, accountants, lawyers, and sales representatives.
Each employee has a first name, last name, unique CMS ID, office
location, email address, salary, title, level, and supervisor.
CMS has more than 200 clients in the US and UK. Clients are identified
by various names by CMS associates. As such, they represent a source
of confusion for the company. The legal department refers to clients by
their legal names, while the sales and consulting departments refer to
them by a more common name. One example is British Telecom. CMSs
legal team uses its full legal name British Telecom, Ltd., while the
sales force and consultants refer to it as BT. The accounting
department uses a mixture of legal and common names to identify
clients. Thus, to avoid confusion, both legal and common names must be
available to all users. Data that must be kept about clients include client
names, an address (city, state, zip, country), and contact information
(discussed below).
Clients have contacts within their companies that CMS employees must
utilize. For example, the accounting department must know a clients
billing contact in order to know where to send the bill. Maintenance
engineers must know a clients systems engineering contact to know
with whom to speak when a problem arises. CMSs sales representatives
must know a clients sales contact to determine who is responsible for
the buying decisions at a client site. Although only these three contact
types are currently used by CMS, it is foreseeable that additional
contact types might be useful as the company expands into other parts of
the world. Currently, a client has only one billing contact, one systems
engineering contact, and one sales contact at any given time. This
structure is not expected to change (that is, more than one billing contact
per client as of a particular point in time is not anticipated); however, it
is important to retain all contact information over time. That is, when
one contact is replaced by another contact, it is essential to retain
information about the original contact. For example, assume an invoice
is sent to Contact A, who is later replaced by Contact B. If the invoice is
lost, CMS must have an audit trail to show that it was sent to Contact A
(who was the known contact for the client at that time).
Clients can have one or more contracts with CMS to provide a variety of
consulting services. For example, a single client might have one contract
for maintenance of an existing system and also have another contract
(sometimes called a work order by the sales force) for the development
of a new system.
Some clients are billed based upon negotiated contracts, which stipulate
a pre-determined amount for charges regardless of the number of hours
that employees actually work on the contracts. Such contracts are called
fixed price contracts. Other clients are billed based on the total
number of hours provided by CMS employees multiplied by a rate per
employee type per employee hour. These arrangements are called T&M
Time and Materials contracts. T&M contracts often specify a
maximum number of hours for which the client is willing to pay. CMS
managers must ensure that when these maximum (cap) amounts are
exceeded, the clients are not billed for such additional hours.
For T&M contracts, the rate per hour for each consultant is determined
by the employees level of expertise. For example, a client might pay
$100/hour for an employee who is at the level of Systems Analyst I.
That same client would pay $250/hour for an employee designated as a
Manager Level II.
Although T&M and Fixed Price contracts are the only two types of
contracts currently used by CMS, it is likely that other types of contracts
will be used in the near future.
All CMS employees must keep a record of the time they spend working
for each client. Because employees can work for more than one client
and perform different functions for each client, CMS utilizes project
management to keep track of employee assignments to client contracts.
Employees can be assigned to many different projects throughout their
tenure. They also can be assigned to more than one project at a given
time. In fact, it is not unusual for an employee to spend time on two or
more different projects within the same day. Likewise, projects can
consist of many different employees. Project assignments change over
time. For example, Employee A may work on Project X during
January, and, in February, that same employee may be reassigned to
Project Y. It is important to maintain records of the dates for which
each employee is assigned to each project. Additionally, each project has
a manager who oversees its progress and ensures that contracts are
fulfilled and profitable (e.g., U.S. project managers try to prevent hours
worked in excess of the maximum allowed by a fixed price contract).
Just as a client can have more than one contract with CMS, a contract
can consist of more than one project. For example, a contract for the
development of a new system could be fulfilled in multiple phases.
Phase I could include implementation at one client site using a group of
consultants in close proximity to that site. Phase II could include
implementation at a different site with a potentially different set of
consultants. Both of these phases are considered separate projects, even
though they are governed by the same contract. To further complicate
matters, if such a contract specifies a maximum number of hours for
overall implementation, the project managers of each project will have
to agree how to split up the cap amounts between the two projects and
maintain appropriate data about the split.
The number of hours worked for each employee on each project must be
recorded on a daily basis. Employees currently log their time using an
Excel worksheet. An example of this worksheet is presented below.
Notice that the employees supervisor is listed on the worksheet. This
supervisor may or may not be the same person as the project manager.
Each employee is assigned to one supervisor, and each supervisor
manages one or more employees. The concepts of supervisor and project
manager have completely different meanings at CMS. A supervisor
manages an employee with respect to evaluations, vacation requests,
raises, etc. A project manager manages a project, allocating the time of
employees assigned to the project. A project manager is not required to
sign off on an employees timesheet. A supervisor, however, is required
to approve his/her employees timesheets by placing his/her initials
beside his/her name.

Part A: Deliverable
For this phase, you are required to create an ER Diagram that will
facilitate the development of CMSs company-wide database. It must be
created using ER Assistant and include entities and attributes,
relationships, and accompanying notes. You must take a screenshot of
your ERD while it is displayed in ER Assistant and paste the screenshot
into a Word document. Make sure that the ERD fits on a single sheet and
is legible. Accompanying notes must be included on a separate sheet of
the document. Name this Word document CMS Project Part A your
last name followed by your first initial.
Example: CMS Project Part A SmithJ.doc
The scope of the database includes all entities referenced above. The
first goal of this phase of development is to support a timekeeping
system that will replace the spreadsheet process illustrated above. Note
that you will not actually create the timekeeping system. You are
responsible only for designing the database that will be used by the
system.
Part B: Background
After much deliberation, CMS has decided to broaden its operations by
expanding into various parts of Europe and also Canada. It plans to
recruit employees from Canada, Italy, France, and Ireland. Each of these
countries offers different benefit packages. Presently, under the manual
spreadsheet system, human resource personnel have to maintain only
two types of benefit allotments. In the newly expanded company, this
manual process will be unmanageable.
The following table lists the different benefit packages in each country.
Some characteristics are unique to each country while others are unique
to a region.
Region Country Holidays WeeklyHours VacationDaysAllowed
North America US 11 40 10
North America Canada 12 40 15
Europe UK 10 38 10
Europe France 14 38 10
Europe Ireland 10 38 15
Europe Italy 9 38 20
In the same manner that employees must track the time they spend
working on projects, they must also log the days they use as holidays
and vacation. Below is a sample timesheet for recording benefit time
taken. Note that this benefit section exists on the same timesheet that is
used to log hours to projects, but benefits are not related to projects.

In addition to the need to accommodate benefit tracking in the new


database, a change has occurred since the last iteration. In Part A, CMS
stated, a client has only one billing contact, one systems engineering
contact, and one sales contact at any given time. This structure is not
expected to change (that is, more than one billing contact per client as of
a particular point in time is not anticipated). Recent developments from
a newly acquired client have caused this assertion to no longer be true.
France Telemobile, Inc. is a new client in France and has three different
systems engineering contacts to support its one contract with CMS.
Thus, a change in initial design is required.
Finally, CMS is implementing two new types of contracts, maintenance
and license, to be added to its list of possible contracts.
Currently, maintenance is included as part of an initial work order. In
keeping with the rules of accounting and revenue recognition for
software providers, maintenance is an important feature of a contract and
has special rules that affect how much revenue can be recognized for
licenses. To simplify its procedures, the company will be issuing
separate contracts for maintenance to clearly distinguish between license
revenue, which can be recognized at the time of system delivery, and
maintenance revenue, which in most cases must be recognized over the
duration of the maintenance agreement.
Many of the features of CMSs custom work orders have evolved into a
standard set of templates that will be sold as a package to other
companies to expand CMSs client base. Therefore, the company has
created various products that incorporate the most widely used features
of its custom development initiatives. The products are called TeleTrak-
BP, TeleTrak-FM, and TeleSource. Each product will be sold as an out-
of-the-box solution to tracking usage and subscriptions in the Telecom
industry. Each product will be sold under a license contract. Presently, a
license contract will be issued for exactly one product, but it is possible
that a license agreement will be written in the future that will cover
multiple products as new products are developed.
Part B: Deliverable:
Using ER Assistant, modify your original ERD to accommodate the
requirement to allow more than one instance of a given contact type per
contract. Also, include new entities and relationships to support benefit
tracking in all countries. Depending on your initial design, you may or
may not have to modify your ERD to accommodate the new contract
types (License and Maintenance). You will also have to account for the
introduction of products in the business model.
In a separate Word document, take a screenshot of your revised ERD and
paste it in. Include accompanying notes.
After completing your new ER Diagram, convert the diagram into tables
with primary keys and foreign keys as appropriate. Use SQL Server to
create your tables. Be sure to enforce referential integrity in your
CREATE TABLE statements using on delete, on update, etc., where
appropriate.
As in Part A, your ERD screenshot must be able to legibly fit on a single
sheet in the Word document. To receive credit for your table
conversions, include the SQL queries used to generate the tables and
paste them into your Word document. Also execute the following
command for each table and include results in your document: exec
sp_help [table name]
Name this document CMS Project Part B your last name followed by
your first initial. Screenshots are required each SQL, DML, DDL, and
DCL statement for a grade to be given. Note: 1 screenshot is not the
idea; however, multiple screenshots along the way is the goal.
Using the link provided in Blackboard, upload your 2 documents for
phase I of this project by 11:59 p.m. (ET) on Monday of Module/Week
5.
---------------------------------------------------------------------------------------
Data Structure and complexity analysis Question

FOR MORE CLASSES VISIT


www.tutorialoutlet.com
Question 1 (15 marks) Short Answer (maximum 20 words):
Answer all five parts below.
Part A (3 marks): What is the worst case time complexity for binary
search on a BST with n
elements? Explain. Part B (3 marks): The first time you run algorithm A
on a dataset of n elements; it is faster than
algorithm B. The second time you run algorithm A on a dataset of n
elements; it is slower than
algorithm B. Explain how this is possible. Give an example for
algorithm A and algorithm B. Part C (3 marks): If both have n nodes and
are sorted smallest to largest, will it be faster to find
the largest value in a sorted linked list or a minimum-level BST?
Explain. Part D (3 marks): What is the time complexity to delete the root
of a minimum-level BST with
n nodes? Explain. Part E (3 marks): An implementation of quicksort has
its worst case of O(n2) for an array in
sorted order. Explain how this is possible/how this version of quicksort
was implemented. Page 2 of 5 Question 2 (10 marks) Complexity
Analysis/Estimation:
Assume that an array has n random values. What is the time complexity
of the following method
that makes every element in the array equal to the largest element in the
original array. Note:
you must show all of your work to receive full credit. public void
makeLargest (intintArray)
{
int largest = intArray[0];
for (int i = 1; i < intArray.length; i++)
{
if (intArray[i] > largest)
{
largest = intArray[i];
for (int j = 0; j < i; j++)
intArray[j] = largest;
}
else
intArray[i] = largest;
}
} Page 3 of 5 Question 3 (10 marks) Recursion:
Write a recursive function that will calculate the height of a binary tree.
root1
D
B
A root2
E C Note: root1 and root2 are instances of the class BinNode:
public class BinNode
{
public char value;
public BinNode left;
public BinNode right;
}
Thus, the following statements would lead to the underlined output:
Example 1:
System.out.println( treeHeight (root1) );
3
Example 2:
System.out.println( treeHeight (root2) );
1 Please write your method on the following page. Page 4 of 5 public
static inttreeHeight (BinNode current)

---------------------------------------------------------------------------------------
Difference between two sets. Given two arrays ????
and ????
FOR MORE CLASSES VISIT
www.tutorialoutlet.com
Difference between two sets. Given two arrays ????[] and ????[], each
containing distinct values, design a subquadratic algorithm to count the
number of values that are contained either in array ????[] and array ????
[] but not both. Create test program DiffSets.java that takes
three command line arguments <size_of_a><size_of_b><number of
iterations>

For ex: java DiffSets 10 20 100

The program must do the following

1. Create arrays a and b of the mentioned size and fill it with uniformly
random numbers between (0-max(size_a, size_b)) <- in this case this
would be 0-20

2. Find the numbers that are only present in a or b but not both.

3. Repeat 1 and 2 for n iterations

---------------------------------------------------------------------------------------

Film Showings The Cinema Guild


FOR MORE CLASSES VISIT
www.tutorialoutlet.com
Film Showings
The Cinema Guild Theatre Group wants the following collection of 21
data items to be implemented in a database
to manage its member theatres in several towns. Provide the 3NF LDM
that satisfies these requirements.
Your answer must be the minimum required for a valid logical model
solution. No extraneous entities or
relationships. Do not add *any* data items to the 21 items shown. You
must label with a name each entity and
each relationship (between entities). Check carefully that you have
satisfied all constraints A through K. Actor
Address_of_Theatre
Adult_Count
Adult_Price
Child_Count
Child_Price
Date
Director Movie_Name
Movie_Rating
Movie_Review
Number_of_Screens
Screen_Number
Senior_Count
Senior_Price
Student_CountStudent_Price
Theatre_Name
Theatre_Phone_Number
Time_of_Showing
Town The following describe key business rules, definitions,
requirements and relationships between data items:
A: Theatres can show a &quot;doublebill&quot; (2 films for 1 admission
price) or a &quot;triplebill&quot; (3 films) or a &quot;festival&quot; (a
larger number of films for one price).
B: The film distributor requires each theatre to report the count of each
type of ticket sold by showing. A
showing is one start of a movie on a particular day at a specific time.
Movies shown together (double bill, etc.)
have one start time.
C: A given movie may be showing at more than one theatre at the same
time.
D: The movie review is a short paragraph quoted from a national
magazine. The movie's rating is also based on
non-local information.
E: The database needs to track all principal actors in a movie, e.g. co-
stars Bette Middler and Carrie Fisher.
F: Theatres sometimes run film festivals, where they show several films
starring the same actor. (Don't handle the
festival separately, just be sure that your design for individual movies
handles it.)
G: Theatres have four classes of admission with separate prices: adults,
students, children, and senior citizens.
H: All prices are determined by the time of day and the day of the week
(i.e. the date). Therefore, weekend and
holiday prices can be different than weekday prices. Prices can be
different in each theatres showing the same
film at the same time.
I: A theatre is in only one town, but a town can have more than one
theatre.
J: Most of the theatres in the theatre group have become multi-screen
centers, as specified by the &quot;Number of
Screens&quot; data item for each theatre. For each showing, the screen
number must be recorded to identify the actual
room in which the screening will occur. Date and time alone do not
uniquely identify a showing.
K: Assume that a movie has only one director, but that director film
festivals can be held (e.g. showing five
Alfred Hitchcock or Woody Allen movies).
---------------------------------------------------------------------------------------
Given a string variable string s; , initialize s such
that it contains a paragraph
FOR MORE CLASSES VISIT
www.tutorialoutlet.com
Problem description: Given a string variablestring s;,
initializessuch that it contains a paragraph in English text. You can do
so within your program by either (1) hardcoding the initial value,
e.g.,string s("hello world"); or (2) read in the initial value from the
keyboard by calling thegetline( )function. Furthermore, this paragraph
consists of no more than 100 tokens. Tokens are sequences of
contiguous characters separated by any of the specified delimiters (e.g.,
white spaces). Please implement a C++ program to perform the
following two tasks ons:
1. Implement the functionvoidgetLetterFreq(string s);to identify
the frequency of each unique letter ('a'-'z', case insensitive) ins. This
function will call the "cout<<" statement(s) to print out the
frequencies on the screen.
2. Implement the function void StrToTokens(string s);to identify
and print all the tokens contained inson the standard output (i.e.,
cout). For simplicity, only white spaces will be considered as
delimiters. For instance, the string "what's that thing?" contains
three tokens: "what's", "that" and "thing?". Youare not allowed to
call existing functions such as strtok() for this task. Specifically,
you are required to loop through the input string one character at a
time to separate the input string to different tokens. Please store the
tokens in an array (such as vector<string>) before printing out all
the tokens.
3. Implement the main() function that (1) declares and
initializes the string s, and (2) calls the above two functions.

Example input and output:

Suppose s="Always remember that you are unique. Just like


everyone else."

The function getLetterFreq(s) will print out the following


information (yours might be in a different format):
{'a': 4, 'b': 1, 'e': 11, 'i': 2, 'h': 1, 'k': 1, 'j': 1, 'm': 2, 'l': 3, 'o': 2, 'n': 2,
'q': 1, 's': 3, 'r': 4, 'u': 4, 't': 3, 'w': 1, 'v': 1, 'y': 3}
The output of StrToTokens(s); will be 'Always', 'remember', 'that',
'you', 'are', 'unique.', 'Just', 'like', 'everyone', 'else.'
---------------------------------------------------------------------------------------
IFSM 201 What risks and safeguards are associated with wireless communication?

FOR MORE CLASSES VISIT


www.tutorialoutlet.com
What risks and safeguards are associated with wireless communication?

What is war driving or war flying?

Are you comfortable (or would you use) a wireless hot spot to do
computer work?

What safeguards might you use in accessing an unprotected (public)


wireless communications?

Are you more at risk using a wireless connection via laptop or a


connection via a smart phone?

---------------------------------------------------------------------------------------
IST 220 Java classes to model a small plane flying passengers from State College,
PA to Orlando, FL

FOR MORE CLASSES VISIT


www.tutorialoutlet.com
In this assignment, you will be creating several Java classes to model a
small plane flying passengers from State College, PA to Orlando, FL.
You must include:
An Aircraft class
A Pilot class
A Passenger class
A Stewardess class
A Suitcase class
An Address class
A Map class
You must model the following relationships:
Each Aircraft contains one Pilot, one Stewardess, and four
Passengers
Each person (Pilot, Stewardess, or Passenger) has a Suitcase
Each person (Pilot, Stewardess, or Passenger) has an Address
Each Pilot has a Map
Other requirements:
Your main() method must instantiate and populate each of these
classes
Your Aircraft class must have a getInfo() method that returns all of
the information about the aircraft, each person on board, and all of
their items/attributes. You should call this method from your main()
method.
Your program must use an ArrayList of passengers
Your program must save your passenger list to an XML file using
the techniques discussed in class.
Each class must have at least 2 (properly encapsulated) attributes
(in addition to the required class relationships above). See
suggestions below if you have difficulty choosing attributes.
-----
Class attribute suggestions:
Aircraft: maxSpeed, maxPassengers, numEngines
Pilot: yearsExperience, age, vision
Passenger: frequentFlyerPoints, finalDestination, seatingSection
Stewardess: yearsExperience, isFullTime, hoursWorked
Suitcase: numPockets, maxWeight, hasCarryStrap
Map: size, country, region
Address: city, state, zip

---------------------------------------------------------------------------------------
IT 407 assignment 1

FOR MORE CLASSES VISIT


www.tutorialoutlet.com
1.5 Marks
Learning Outcome(s):
Evaluate the pros and cons of ethical theories.
Apply ethical theories to solve moral problems.
Question One

Evaluate the following scenario from the perspective of social contract


theory?
Alexis, a gifted high school student, wants to become a doctor. Because
she
comes from a poor family, she will need a scholarship in order to attend
college.
Some of her classes require students to do extra research projects in
order to
get an A. Her high school has a few older PCs, but there are always long
lines
of students waiting to use them during the school day. After school, she
usually
works at a part-time job to help support her family.
One evening Alexis visits the library of a private college a few miles
from
her familys apartment, and she finds plenty of unused PCs connected to
the
Internet. She surreptitiously looks over the shoulder of another student to
learn
a valid login/password combination. Alexis returns to the library several
times
a week, and by using its PCs and printers she efficiently completes the
extra
research projects, graduates from high school with straight As, and gets
a fullride
scholarship to attend a prestigious university.
2.5 Marks
Learning Outcome(s):
Evaluate the pros and cons of ethical theories.
Apply ethical theories to solve moral problems.
Question Two

Consider the following scenario:


Hasan was in third grade when he was caught cheating on his math quiz.
He had been doing poorly in math and his parents had threatened that if
he didnt raise his grades they wouldnt let him play on the baseball
team. So he cheated. When the teacher asked him about it, he denied it at
first, but finally admitted to writing down the answers ahead of time. A
parent conference was called and Hasan had to sit with his parents, the
teacher, and the principal to discuss the school policy on cheating and
lying. On the way home, his father told Hasan he was deeply
disappointed in him and expected more from him in the future. That
night, Hasan felt like the whole world was against him, but he also felt
guilty for letting his parents down. That weekend, Hasan and his family
went to a movie. When they got to the ticket window Hasans dad asked
for childrens tickets for both Hasan and his 16 year old brother. Hasan
looked over at his brother, who stared down at the sidewalk and hunched
his shoulders hoping the ticket seller wouldnt notice that he was well
above the age for a childs ticket. The ticket seller glanced suspiciously
back and forth between the father and the brother, and then, with a
doubtful look on her face, she handed them the two childs tickets. This
happened every time they went to the movies, and it always made Hasan
feel weird. On the way home from the movie, Hasan asked his father
why it was okay to lie and cheat the theater out of money but not to
cheat on his math quiz. His dad responded that sometimes it's okay to lie
as long as nobody gets hurt. The rest of the way home Hasan just got
more and more confused. Cheating on his test hurt nobody. He didnt
steal the answers from any of the other students. If he hadnt gotten
caught, he would have been praised. How was what he did different
from what his dad did over and over again? And should he continue to
stay silent the next time his dad lied?
Based on your point of view, answer the following questions:
What is Hasans dilemma?
Have you ever seen an adult or friend do something you felt wasnt
right? What did you do? How did it make you feel?
Do you think Hasan should try to talk to his Dad again about his lying
at the movies?
Who might Hasan have hurt by cheating on his quiz?
Hasans Dad said it was okay to be dishonest if no one was hurt. Who
do you think might have been hurt by his lying at the movie ticket
office?

---------------------------------------------------------------------------------------
IT 409 Assignment 1

FOR MORE CLASSES VISIT


www.tutorialoutlet.com
1 College of Computing and Informatics IT Security and Policies
IT409 Assignment 1
[Total Mark for this Assignment is 25] Student Details:
Name:### ID:### CRN:###
Instructions:
This Assignment must be submitted on Blackboard via the allocated
folder.
Email submission will not be accepted.
You are advised to make your work clear and well-presented, marks may
be reduced for poor presentation.
You MUST show all your work.
Late submission will result in ZERO marks being awarded.
Identical copy from students or other resources will result in ZERO
marks for all involved students.
Convert this Assignment to PDF just before submission. Pg. 1
Assignment 1 Learning
Outcome(s): Policy characteristics Identity and Q1- There are seven
successful policy characteristics, list them all and give understand the
one example from your experience for only one of these characteristics
(NOT characteristics of from the book). a successful
policy
Chapter 1 7 Marks Pg. 2 Assignment 1 Learning
Outcome(s): Singular and consolidate policy Distinguish Q2- between a
policy,
a standard, a 6 Marks a) What are the pros and cons of Singular and
Consolidated policy format? baseline, a b) Is it necessary to include
standards, baselines, guidelines or procedures in procedure, a this policy
document? Explain your answer. guideline, and a
plan.
Chapter 2 Assignment 1 Pg. 3
Learning
Outcome(s):
Writing style and
technique - using
PLAIN language 6 Marks PLAIN language Q3- The following table
summarize changing password policy rules and related
setting used in Windows Server Active Directory. Write the
corresponding
policy statement using PLAIN language. PLAIN language
techniques for
Policy writing Enforce password history 24 password remembered
Chapter 2 Maximum password age 42 days Minimum password age 1
day Rule Minimum password length Setting 7 Password complexity
requirement Yes Store password using reversible encryption No Pg. 4
Learning
Outcome(s):
Information
security
framework
Chapter 3 Understanding CIA Assignment 1
6 Marks Q4a) Define the security term confidentiality. Provide an
example of a health
situation where confidentiality is required.
b) Define the security term integrity. Provide an example of a financial
situation
in which a loss of integrity could result in significant harm.
c) Define the security term availability. Provide an example of a
business
situation in which availability is more important than confidentiality.
---------------------------------------------------------------------------------------
IT 511Final Project Guidelines
FOR MORE CLASSES VISIT
www.tutorialoutlet.com
IT 511: Final Project Guidelines and Grading Guide
Overview
Your final project for this course is the creation of a Virtual World Java
application that results in a virtual world, complete with an object that
will act as a human
clone. A virtual world with a human clone would not be complete
without additional objects for interaction, so you will be responsible for
creating a ShoutBox
and another object that will keep your human clone from getting lonely,
and a virtual world application that will test your objects. Your final
deliverables will
include your working code (which your instructor will run in order to
review your virtual world) as well as an annotated version of your
written code that explains
your reasoning for choices, how the code meets the given specifications
for your project, how you ensured the accuracy and workability of your
code, and
methods used for testing and debugging.
The project is divided into four milestones, which will be submitted at
various points throughout the course to scaffold learning and ensure
quality final
submissions. These milestones will be submitted in Modules Two, Five,
Seven, and Eight. The final submission will be submitted in Module
Nine.
In this assignment you will demonstrate your mastery of the following
course outcomes: Write simple, accurate object-oriented programs using
primitive data types, variables, data structures, and object-oriented
principles
Implement classes that meet the given specifications of object instance
variables and behaviors
Create operative algorithms using sequential logic structures, decision
control structures, and loops
Create and use methods that accept parameters and return results
Test and debug object-oriented programs for accuracy in program
functionality
Document object-oriented code with comments that articulate the
purpose and behavior of code for various audiences Prompt
In creating your virtual world, you will need to create a MyClone class
that will represent a virtual clone, another class that will represent a
ShoutBox, and
another class of your choice. The class of your choice can be anything
you want to exist in your virtual world (a cat, a bird, a computer, etc.).
This project is a
prototype and there will not be any graphics, so you will create an
application that unit tests the functionality of your three classes (your
MyClone class, your
ShoutBox class, and the class of your choice).
Specifications for MyClone
Feel free to add additional instance variables and behaviors, but your
clone object must have instance variables firstName, lastName, and an
introduction()
method. The firstName and lastName instance variables will hold your
first and last names. You will demonstrate your understanding of
encapsulation by
protecting your instance variables by making them private and by
creating getters and setter methods for all instance variables. You should
have at least one constructor created that initializes all instance
variables. The introduction() method will introduce you to the virtual
world by displaying a greeting, your full
name, and anything else you would want to say.
Partial class diagram for the MyClone object:
MyClone
-firstName
-lastName introduction()
Specifications for ShoutBox
The ShoutBox object will allow you to shout messages into your virtual
world. Your ShoutBox will have two ways of generating messages:
1. You can select from a list of canned messages to shout, or
2. You can have the ShoutBox generate a random message for you.
You must use data structures Array, ArrayList, or a HashMap to store the
message data.
Canned messages: One data structure will store the canned messages.
You can load this data structure with canned messages of your choosing.
The
shoutOutCannedMessage() method will loop through the data structure
to first display all canned messages and allow the user to select one. The
shoutOutCannedMessage() will return the selected message String. This
String will be displayed in the virtual world. For now, your virtual world
will be the
output window.
Random messages: To generate random messages, you need to have a
data structure that holds a list of subjects, another data structure that
holds a list of
objects, another that holds a list of verbs, another that holds a list of
adverbs, and another that holds a list of adjectives. The lists you create
can hold as many
words as you would like. The shoutOutRandomMessage() method will
use a random number generator that selects one word from each data
structure to form a
random message. Random messages will be in the following form:
Subject - Verb - Adjective - Object Adverb.
The generated message String will be returned. The String will be
displayed by the ShoutBox in the virtual world. For now, your virtual
world will be the output
window. Partial class diagram for the ShoutBox object:
ShoutBox
String shoutOutRandomMessage()
String shoutOutCannedMessage() Examples of canned messages stored
in the canned messages data structure (you can store as many canned
messages as you would like):
Hello World
I am studying
I am at work Example of subjects stored in the subjects data structure:
I
You
Example of objects stored in the objects data structure: homework
Example of verbs stored in the verbs data structure:
studying
eating
sneezing
Example of adjectives stored in the adjectives data structure:
funny
prickly
hard
awesome
Example of adverbs stored in the adverbs data structure: quickly
everywhere
Specifications for Your Additional Object
You will create another object of your choosing to add to your virtual
world. Your object should have at a minimum two (2) instance variables
and one (1)
method. You will demonstrate your understanding of encapsulation by
protecting your instance variables by making them private and by
creating getters and
setter methods for all instance variables. You should have at least one
constructor created that initializes all instance variables.
Specifications for Virtual World Application
You will create a virtual world application that will test your MyClone,
ShoutBox, and the object you decided to add to your virtual world.
Because this is a simple
prototype, you will not actually create any graphics to represent the
objects in the virtual world. Any displayed information will simply be
displayed in the
output window. He reads red book
quickly! Submit your Java application by submitting all .java files and at
least four screenshots that demonstrate you tested the application.
While the listed number of instance variables and methods are the
minimum number required for each class, you are free to create
additional.
Specifically, the following critical elements must be addressed:
I. Program Functionality and Alignment
a. Make sure your entire program functions correctly and that there are
no exceptions or compile errors
b. In writing your code, make sure that you are meeting or exceeding all
of the given specifications for each class. Although you will be graded
on
coverage of stated requirements, you are free to use your creative touch
in developing additional classes and objects with additional instance
variables should you wish. II. III. IV. V. c. Create the unit test application
and use it to test the functionality of each class. Submit the screenshots
showing that the code was tested.
Data Structure for Message Storage: Use data structures (either Arrays,
ArrayLists, or a HashMaps) to store the message data in accordance with
the
given specifications. You can use one type, or a mix of the listed types of
data structures for message storage. Specifically, it should be one data
structure
per word type (verb, subject, etc.), but you can choose to use a HashMap
for canned messages and maybe ArrayLists for the other data
structuresor
use Arrays for all of them.
Methods and Instance variables
a. Method shoutOutCannedMessage() loops through the data structure
that stores the canned messages first to display all canned messages and
allows the user to select one canned message.
b. The method shoutOutCannedMessage() will return the selected
message string.
c. Your shoutOutRandomMessage() method should use a random
number generator that selects one word from each data structure to form
a
random message. The random number generated should not exceed the
bounds of your data. In other words, if you only have 5 words in a data
structure, the random number generated should not be an index that has
no word stored.
d. The method shoutOutRandomMessage() should return a randomly
generated message string in accordance with specifications, in the form:
Subject - Verb - Adjective - Object - Adverb (for example, You read
hard books quickly).
e. Use the MyClone introduction() method to introduce your clone to the
virtual world by displaying a greeting, your full name, and anything else
you would want to say.
f. MyClone class should include instance variables (at least firstName
and lastName) that are made private and have associated getters
(accessors)
and setters (mutators) for all instance variables.
g. You should build an additional class of your choice, which should
have at least 2 private instance variables with associated getters
(accessors) and
setters (mutators) and 1 method your choice.
Test Application: You will create one application that will test all three
classes.
a. Perform a unit test of the MyClone to test all getters (accessors) and
setters (mutators)and method(s) of the class.
b. Perform a unit test of the ShoutBox to test all methods of the class.
c. Perform a unit test of the additional class object to test all getters
(accessors) and setters (mutators) and method(s) of the class.
In-Code Comments
a. Make sure your object-oriented code is accurately documented to
explain the purpose and behavior of the code.
b. Articulation of comments is clear and concise for the audiences that
may review it, including your instructor and individuals that may need to
maintain or implement the code. Milestones
Milestone One: MyClone Class
In Module Two, you will submit your Java class, MyClone. You will
create your initial version of the MyClone class. MyClone class should
have instance variables
firstName and lastName. The firstName and lastName instance variables
hold a value for first and last names respectively. You will demonstrate
your
understanding of encapsulation using the private specifier to restrict
access to your instance variables. This milestone is graded with the
Milestone One Rubric.
Feedback should be incorporated into the final project as warranted.
Milestone Two: Message Array
In Module Five, you will submit your Java code that creates an Array of
String messages. Write an application that uses an Array to store 10
messages of type
String. You will store this Array with 10 messages of your choosing. For
example, a message could be I love Java the programming language!
or another
message could be I love Java the drink! You may initialize your Array
with the messages or have the user enter the messages. The choice is
yours. Your Java
code will loop through the Array to iterate through your entire list and
display each message and allow the user to select one. The
shoutOutCannedMessage() will
return the selected message String. This milestone is graded with the
Milestone Two Rubric. Feedback should be incorporated into the final
project as
warranted.
Milestone Three: Programmer-Defined Class
In Module Seven, You will create a Virtual World application as your
final project. This Virtual World will have several objects including a
MyClone object and
another object of your choice. It would be an excellent idea to review the
Final Project Guidelines at this time. For this Third Final Project
Milestone, you will
finish development of your MyClone class and create another class of
your choice.
In Module Two, you started development of the MyClone class. You will
continue to develop the MyClone class by adding accessor methods,
mutator methods,
and an introduction() method. You will create an accessor and mutator
method for each instance variable declared in the MyClone class. The
introduction()
method will introduce yourself to the virtual world by displaying a
greeting, your first and last name, and anything else you would want to
say.
You will also create another class of your choice. Your programmer-
defined class should have at a minimum two instance variables and one
method. The instance
variables and method should be representative of the data and behavior
that objects of this class will have. You will demonstrate your
understanding of
encapsulation by declaring the instance variables as private and by
creating accessors and mutators for each instance variable. You should
have at least one
constructor created that initializes all instance variables. Document your
code. This milestone is graded with the Milestone Three Rubric.
Feedback should be
incorporated into the final project as warranted.
Milestone Four: ShoutBox Class With Methods
In Module Eight, you will create the ShoutBox class for your Virtual
World. Your ShoutBox class will have two methods:
Method shoutOutCannedMessage()will return type String.
The shoutOutCannedMessage will use an Array or an ArrayList to store
10 messages of type String. For those of you who are more advanced
with your Java skills,
you could use a HashMap for the data structure. You can load this data
structure with 10 messages of your choosing. You can initialize your
Array or ArrayList
with the messages or have the user enter the messages. The choice is
yours. The shoutOutCannedMessage() will loop through the data
structure to first display
all canned messages and allow the user to select one. The
shoutOutCannedMessage() will return the selected message String.
Document your
shoutOutCannedMessage() method to explain the code.
Method shoutOutRandomMessage() method will return type String.
The shoutOutRandomMessage() will use several Arrays or an ArrayList
to store words. You will have one data structure that holds a list of words
that are subjects,
another data structure that holds a list of words that are objects, another
that holds a list of verbs, another that holds a list of adverbs, and another
that holds a
list of adjectives. You can initialize your data structures with words or
have the user enter the words. The choice is yours. The
shoutOutRandomMessage() method will use a random number generator
that selects one word from each data structure to form a random
message. The
shoutOutRandomMessage() method will return the random message as a
String data type. Random messages will be of the following form:
Subject - Verb Adjective - Object - Adverb.
Document your shoutOutRandomMessage() method to explain the code.
This milestone is graded with the Milestone Four Rubric. Feedback
should be incorporated into the final project as warranted.
Final Submission: Virtual World Java Application
In Module Nine, you will submit all classes for the Virtual World Java
application. It should be a complete artifact, free of compiler and run-
time errors, and
contain all of the critical elements of the final product. You will submit
the following completed classes in addition to a class that tests them:
MyClone, ShoutBox,
the class you designed, and a test class. In your test class you will have a
main() method. This test class will represent your virtual world
application that will test
the MyClone, the ShoutBox, and the class you decided to create in
Module Seven. Document your code with comments. It should reflect
the incorporation of
feedback gained throughout the course. This submission will be graded
using the Final Project Rubric. Deliverable Milestones
Milestone Deliverables Module Due Grading 1 MyClone Class Two
Graded separately; Milestone One Rubric 2 Message Array Five Graded
separately; Milestone Two Rubric 3 Programmer-defined Class Seven
Graded separately; Milestone Three Rubric 4 ShoutBox Class With
Methods Eight Graded separately; Milestone Four Rubric Final Project:
Virtual World Java
Application Nine Graded separately; Final Project Rubric Final Project
Rubric
Requirements of Submission: Written components of projects must
follow these formatting guidelines when applicable: double spacing, 12-
point Times New
Roman font, one-inch margins, and discipline-appropriate citations.
This activity uses an integrated rubric in Blackboard. Students can view
instructor feedback in the Grade Center. For more information, review
these instructions.
Instructor Feedback: Students can find their feedback in the Grade
Center.
Critical Elements
Program
Functionality Program Alignment Unit Test Application Data Structure
for
Message Storage Exemplary (100%)
All functional and design
requirements are met and the
user interface is friendly,
handles invalid user
interactions, displays output in
a clear format, and is intuitive
Meets Proficient criteria and
code includes additional
instance variables or objects
that behave according to given
specifications
Meets Proficient criteria and
unit test application behaves
like a true virtual world
Meets Proficient criteria and
generics are used to define the
type of any ArrayList or
HashMap; initialization of data
structures are flexible (user
enters the data instead of hard
coded initialized data) Proficient (90%)
Complete program functions
correctly, with no compile
errors and no exceptions Needs Improvement (70%)
Complete program does not
function correctly Not Evident (0%)
Program is not complete Value
10 Complete code meets the
specifications and minimum
requirements for each class Code is complete, but does not
meet all of the given
specifications and minimum
requirements for each class Code is not complete 7 Unit test application
accurately
tests the functionality of each
class
Uses an Array, ArrayList, or a
HashMap to effectively store
massage data in accordance
with the given specifications Unit test application tests the
functionality of each class, but
not accurately
Uses an Array, ArrayList, or a
HashMap to effectively store
massage data, but not in
accordance with the given
specifications Unit test application does not
test the functionality of each
class
Does not use an Array,
ArrayList, or a HashMap to
effectively store massage data 7 6 shoutOutCannedMes
sage() Method shoutOutRandomMe
ssage() Method shoutOutRandomMe
ssage() Return MyClone Method
introduction() MyClone Class
Instance variables Meets Proficient criteria
substantiated with formatted
printing used to display all
canned messages from the
shoutOutCannedMessage()
method; the user interface
provided that allows user to
select a message is robust,
handles invalid entries, and
prevents the user from entering
an index that is beyond the
range of the indices for the
Array; loop uses length of Array
to control loop
Meets Proficient criteria and
uses a different random
number for the index for each
data structure
Meets Proficient criteria
substantiated with the correct
format used to return the
message string
Meets Proficient criteria
substantiated with formatted
printing used to display the
introduction; message displayed
is aesthetically pleasing;
introduction() method uses
getters or accessor methods to
get the current value of the first
name and last name instance
variables
Meets Proficient criteria and
the class includes additional,
creative or real-world private
instance variables that follow
specifications Method loops through the data
structure that stores the canned
messages, displays all canned
messages, and allows user to
select one; method returns the
correct selected message string Method insufficiently loops
through the data structure that
stores the canned messages,
does not display all canned
messages, or method
insufficiently allows user to
select one message Method does not loop through
the data structure that stores
the canned messages 6 Method correctly uses a
random number generator that
selects one word from each
data structure to form a
random message
Method returns a randomly
generated message in
accordance with the given
specifications and in the proper
string format
Method correctly displays a
greeting, the full name of the
clone, and an introduction
statement for the virtual world Method incorrectly uses a
random number generator so
that it does not select one word
from each data structure to
form a random message
Method returns a randomly
generated message, but not in
accordance with specifications
or not in the proper string
format
Method displays a greeting, the
full name of the clone, and an
introduction statement for the
virtual world, but not correctly Method does not use a random
number generator 6 Method does not return a
randomly generated message 6 Method does not display a
greeting, the full name of the
clone, and an introduction
statement for the virtual world 6 MyClone class includes required
instance variables that are
made private and have
associated getters and setters MyClone class includes required
instance variables that are
made private but do not have
associated getters and setters MyClone class does not include
the required instance variables
and the instance variables are
not made private 7 Additional Class Meets Proficient criteria and
the class objects are creative or
unique with private instance
variables that fit the object The choice class has 2 private
instance variables with
associated getters and setters
and 1 successful method Unit Test: MyClone Meets Proficient criteria
substantiated with a user
interface that lets the user
interact with the application;
unit test application creates
more than one MyClone object
and tests all possible code paths
Meets Proficient criteria
substantiated with a user
interface that allows the user to
interact with the application;
unit test application tests all
possible code paths
Meets Proficient criteria
substantiated with user
interface that allows the user to
interact with the application;
unit test application creates
more than one of these objects
and tests all methods more
than once; unit test application
tests all possible code paths
Meets Proficient criteria and
all methods have a header that
explains the purpose of the
method, the pre-conditions,
and the post-conditions Unit Test: ShoutBox Unit Test: Additional
Class Code Documentation The choice class does not have
2 private instance variables and
1 method 7 Unit test successfully tests all
getters and setters and
method(s) of the class The choice class has 2 private
instance variables with
associated getters and setters
and 1 method, but the method
is not successful or the instance
variables do not follow
specifications
Unit test tests all getters and
setters and method(s) of the
class, but not successfully Unit test does not test all
getters and setters and
method(s) of the class 6 Unit test successfully tests all
methods of the class Unit test tests all methods of
the class, but not successfully Unit test does not test all
methods of the class 6 Unit test successfully tests all
getters and setters and
method(s) of the class Unit test tests all getters and
setters and method(s) of the
class, but not successfully Unit test does not test all
getters and setters and
method(s) of the class 6 Code is accurately documented
to explain the purpose and
behavior of the code Code is documented to explain
the purpose and behavior of
the code, but not always
accurately Code is not documented to
explain the purpose and
behavior of the code 6 Articulation of
Comments Meets Proficient criteria and
submission is properly cited,.

---------------------------------------------------------------------------------------

IT CKIT-501-2Week 11 Individual Assignment


FOR MORE CLASSES VISIT
www.tutorialoutlet.com

Name Email_address Location

John <..n@abxz.com 5

Mary <..h@abxz.com 3

Philip <..x@abxz.com 5
While there are many varieties of databases, the relational database
model is the model utilised in common systems such as Oracle, MySQL,
MS SQL Server and MS Access. As such, it is imperative to understand,
recognise, and interpret relations within these databases. That said,
consider the following relational database instructions:
Employees

Manager_Name Floor_#

Karen 4

David 5
Department
a. RESULT = PROJECT Location from Employees
b. RESULT = SELECT from Employees where Location = 5
c. RESULT = PROJECT Floor_# from Department
d. RESULT = JOIN Employees and Department where
Employees.Location = Department.Floor_#
In this Hand-In Assignment, you will decipher the presented database
instructions, and determine relation RESULT.
To prepare for this Assignment:

Review your Weekly Learning Resources with a focus on


relational databases.

Analyse the given database instructions.

Analyse each of the relations within the given database


instructions.
Reflect on the relation RESULT after executing all database
instructions.
To complete this Assignment:
Submit a document with your interpretation of the posed problem and
address the following:

In terms of the relations shown in the given database instructions,


identify the appearance of the relation RESULT after executing each of
the instructions.

Show and explain how you reached your conclusion.

---------------------------------------------------------------------------------------

ITC 117Shelly Cashman Excel 2016


FOR MORE CLASSES VISIT
www.tutorialoutlet.com
Shelly Cashman Excel 2016 | Module 1: SAM Project 1a Blooming
Everywhere Delivery
CREATING A WORKSHEET AND A CHART GETTING STARTED
Open the file SC_EX16_1a_FirstLastName_1.xlsx, available for
download
from the SAM website. Save the file as
SC_EX16_1a_FirstLastName_2.xlsx by changing the 1 to a
2.
o If you do not see the .xlsx file extension in the Save As dialog box, do
not
type it. The program will add the file extension for you automatically.
With the file SC_EX16_1a_FirstLastName_2.xlsx still open, ensure that
your
first and last name is displayed in cell B6 of the Documentation sheet.
o If cell B6 does not display your name, delete the file and download a
new
copy from the SAM website. PROJECT STEPS
1. Bob is the co-owner of Blooming Everywhere Delivery, a floral
delivery service
accessed exclusively through mobile apps, and is preparing a report for
his
business partner on the companys financials for the years 2018-2020.
Open the Company Analysis worksheet and use AutoFit to adjust the
width of
column A. 2. Select cell A1, enter the text Blooming Everywhere
Delivery, and then
center the merged range A1:D1. 3. Apply the Heading 1 cell style to the
merged range A1:D1. 4. Enter the text Revenue in cell A2, and then
merge and center the range
A2:D2. 5. Clear the contents of cell E3. 6. Enter the data shown in Table
1 below into the range B7:D7. Table 1: Data for the Range B7:D7 Cell
Valu
e B7 C7 D7 1800 1950 2020 Shelly Cashman Excel 2016 | Module 1:
SAM Project 1a 7. Using the Fill Handle, copy the formula in cell B8
into the range C8:D8. 8. Merge and center the range A10:D10. 9. Select
the range B12:D16, and then apply the Accounting number format with
two decimal places and $ as the symbol. 10. The Expenses table shows
all of the companys expenses from 2018 to 2020.
Bob wants to calculate the total expenses by adding up the total
expenses from
each year.
In cell E16, create a formula using the SUM function to calculate the
total
expenses from 2018 to 2020 (B16:D16). 11. 12. Update the formatting
of the merged range A18:D18 as described below:
a. Bold the contents of the merged range. b. Change the font to Calibri.
c. Change the font size to 13 pt. d. Change the font color to Green,
Accent 6, Darker 25% (10th column, 5th
row of the Theme Colors palette). The companys competition and taxes
have increased through the years, and
Bob will only recommend continuing to grow the business if the profit
increases
every year.
In cell B20 create a formula without using a function that calculates the
profit
earned in 2018 by subtracting the total expenses in 2018 (cell B16) from
the
total revenue in 2018 (cell B8).
Using the Fill Handle, fill the range C20:D20 with the formula from cell
B20. 13. Change the tab color of the Company Analysis worksheet to
Orange (3rd
column, 1st row of the Standard Colors palette). 14. Select the clustered
column chart with the title Blooming Everywhere Delivery
2018 2020 Revenue. Update the chart as described below: 15. a.
Change the chart style of the clustered column chart to Style 5. b. Move
the chart to its own chart sheet. Use 2018-2020 Revenue as the
name for the new chart sheet. Switch back to the Company Analysis
worksheet. Select the non-adjacent
ranges A12:A15 and D12:D15, and then create a 3-D Pie chart. Update
the
chart as described below:
a. In the title placeholder, enter Expenses in 2020 as the chart title. b.
Change the chart style of the 3-D pie chart to Style 3. c. Move the chart
to its own chart sheet, using 2020 Expenses as the name
for the new chart sheet. Your workbook should look like the Final
Figures on the following pages. Save your
changes, close the workbook, and then exit Excel. Follow the directions
on the SAM
website to submit your completed project. Shelly Cashman Excel 2016 |
Module 1: SAM Project 1a
Final Figure 1: Company Analysis Worksheet Final Figure 2: 2018-2020
Revenue Worksheet Final Figure 3: 2020 Expenses Worksheet Shelly
Cashman Excel 2016 | Module 1: SAM Project 1a
---------------------------------------------------------------------------------------
ME 6460 ME 2016 Computing Techniques

FOR MORE CLASSES VISIT


www.tutorialoutlet.com
ME 2016 Computing Techniques
Section C - Spring 2017
Computing Project One
Due Thursday, February 16th at 3:00pm
Numerical Errors and Root-Finding Algorithms
Please read all instructions (on 2 pages) before starting to write any
code.
Submission of your answers
At the end of the class on 02/07, upload any Matlab code that you have
written on T-Square By 3:00 pm on Thursday 02/16, upload your final
Matlab codes on T-Square. At the start of the class on 02/16, turn in the
print-out of the codes, the print-out of the outputs of your
code and the graph. Problem statement
A shock wave, which is an extremely thin non-equilibrium region, is
caused by the collision of fast moving gas
with slower moving gas (e.g., the leading edge of a supersonic wing).
The following equation relates the
dimensionless velocity inside the shock wave to the various
parameters of the system:
1 = [(1 )1 ( 0 )]
( ) where is the dimensionless position inside the shock wave, 1 is
the Mach number for the high velocity gas and and are constants.
For = 0.32 and 1 = 2, determine at the leading edge of the shock
wave (i.e. = 0).
Tasks
1. Write the equation to be solved in the form f() = 0 (for the case =
0). Plot the function f() as a
function of to get an idea of the value of the root (you can only plot f
for &gt; 0.32).
2. Write a function for the secant algorithm. The inputs should be the
function f (as an anonymous function
handle), the 1st initial guess x0, the 2nd initial guess x1, and the
maximum allowable approximate percent
relative error, . The outputs of the functions should be the value of the
root, xr, the value of the approximate percent relative error, , and the
number of iterations, Niter. Name your function secant.
Verify that you code works by solving Example 6.6 from the textbook. 3.
Based on your figure in Question 1, and appropriate values for the initial
guesses so that the secant
algorithm converges to the true root 4. Using = 1 108 % find the
value of using your secant algorithm 5. Verify your answer using the
MATLAB fzero function (use the MATLAB help to figure out the
options and
syntax for fzero)
6. Report the value of xr, Niter and . Submit your codes using a single m
_le called LastnameFirstnameCP1.m where Lastname is your last name
and
Firstname is your first name. This _le should include two functions:
LastnameFirstnameCP1 and secant. The
function LastnameFirstnameCP1 should have no input variables and no
output variables. Running the function
LastnameFirstnameCP1 should:
solve Example 6.6 using the secant algorithm print out xr, and after 3
iterations for example 6.6 plot the function f
Solve the equation using = 1 108 % print out xr obtained with the
fzero function print out xr, Niter and . Make sure to include comments in
your codes as described in class.
MIS 535 CUSTOMER SELF-SERVICE AND FEEDBACK

FOR MORE CLASSES VISIT


www.tutorialoutlet.com
Running head: CUSTOMER SELF-SERVICE AND FEEDBACK FOR
EFFECTIVE
BUSINESS
1 Customer Self-service and Feedback for Effective Business
Student`s Name
Institution CUSTOMER SELF-SERVICE AND FEEDBACK FOR
EFFECTIVE BUSINESS
2
Customer Self-service and Feedback for Effective Business
TABLE OF CONTENTS
1.0 Subject of Course Project
.3
1.1 Business Problem
Statement.3
1.2 Name of the company or
organization4
1.3 Brief Description of the Proposed
Solution.4
1.4 General Benefits it will provide the
Organization4
1.5 Audience to whom the proposal is being presented
5 CUSTOMER SELF-SERVICE
AND FEEDBACK FOR EFFECTIVE BUSINESS
3
Part I: Project Proposal
1.0 Subject of Course Project
The internet has been used by people in the past to do business, but there
is a chance that the
businesses owners do not utilize. There is a contribution that the
businessmen do not see where
they can use the internet to interact with consumers and know what
exactly to produce. This
project therefore, brings out the opportunity that has not been utilized on
the internet to do
business and which will help the services provided to consumers better.
The project will involve
customer having a chance for self-service and getting a chance to
provide feedback on how they
feel about the services offered. It will be an online system whereby
consumers are able to shop
without physical interaction with the sellers and provide feedback on the
services they get. This
will therefore, eradicate the problem that many companies have of not
knowing what exactly to
provide for the consumers and the quality needed.
1.1 Business Problem Statement
In the past, business has been conducted in a way that consumers will
physically visit the stores,
pick their desired product and leave the business premises. The
consumers are not able to air
their views on whether they are happy about the services offered or not.
This has been a
challenge to the business owners in that they are not able to determine
how best to improve the
services offered. The quality of the products and services has, therefore,
gone down despite the
dissatisfaction by the clients (Jansen, et al. 2013). The quality of the
services offered by the
company has never changed as they think that the clients are satisfied
which is not the case. CUSTOMER SELF-SERVICE AND FEEDBACK
FOR EFFECTIVE BUSINESS
4
1.2 Name of the company or organization
The name of the company is Digital Electronics and Accessories
Limited. Its a company that
deals with electrical appliances and computer accessories based in
Amsterdam.
1.3 Brief Description of the Proposed Solution
The proposed system aims at using the internet to capture the different
clients of the company to
enable them to order their goods and the services they need online. After
a client order the
products, must not visit the business premises but will just indicate the
location at and the
delivery will be done. The system however also allows for consumers to
opt whether to visit the
premises or not. After the delivery has been done, the consumer will
have the chance to go back
to the system and use the module of feedback to comment on how the
services were. He or she
will also be in a position to range the quality of the products that have
been delivered to him or
her and, therefore, the management will be in a position to know where
to improve and where it
has done its best (Jansen, et al. 2013). Client`s is always the tool to
determine how the business
will operate after services are offered to ensure no mistake is repeated
when serving another
client.
1.4 General Benefits it will provide the Organization
The main aim of the proposed system is that it will help the business to
capture the customer`s
feedback as they offer the products and services. There will be no
chances of losing the feedback
as compared to when the consumers just bought the items physically and
left. It provides the
benefits of improving the quality of services offered to the clients
(Kelley, et al. 2012). With thefeedback they give, customers will be in a
position to enjoy better services and products CUSTOMER SELF-
SERVICE AND FEEDBACK FOR EFFECTIVE BUSINESS
5
delivered to them. The clients will be in a position also to air their views
on what they would like
provided to them and the issues they dislike. The business owners will
also be in a position to
engage the clients in a discussion on the suggestions they may have to
the company. What they
may want to be done and in what way regarding their satisfaction.
1.5 Audience to whom the proposal is being presented
The audience of the recommendations is the Digital Electronics and
Accessories Limited
management who have been facing the challenge of getting feedback
from the clients. CUSTOMER SELF-SERVICE AND FEEDBACK
FOR EFFECTIVE BUSINESS
6
TABLE OF CONTENTS
1.0 ABSTRACT

..7
1.1 Brief Company
Background
.7
1.2 Discussion of the Business
Problems...8
1.3 High-Level
Solution
..........9
1.4 Benefits of Solving the
Problem......10
1.5 Business or Technical
Approach.10
1.6 Business Process
Changes
11
1.7 Technology or Business Practices used to augment the
solution...11
1.8 Conclusions and overall
Recommendations12
1.9 High-level Implementation Plan
..12
2.0 Summary of
Project
..13 References

14 CUSTOMER SELF-SERVICE AND FEEDBACK FOR


EFFECTIVE BUSINESS
7
Part II: Project
2.0 ABSTRACT
Business activities have been done, but in some situations, there are no
improvements
whatsoever. Doing a business which can fetch the feedback from the
clients is the best situation
any business can be in. The Digital company has been in operation for
seven years but has never
improved some services they offer to the clients. Some clients are heard
complaining, but the
management does not get the information. This, therefore, calls for the
need to have a system that
will ensure an interaction between the clients and the management to
help solve the existing
business problem. The interaction will bring up views by the clients on
how they want the
business to serve them. Customers need a system that will help them do
shopping wherever they
are. There is no need of visiting the premises if they can be able to order
their products and have
them delivered at their convenience. The system is therefore designed to
favor both the
management and the clients.
1.1 Brief Company Background
Digital Electronics and Accessories Limited is a company that was
started seven years ago with
only one branch. When it started the business had very few employees
but has now been able to
employ more than one hundred workers. Its a company that deals with
electronics and computer
accessories whereby customers come to buy them from the different
premises. Digital
Electronics and Accessories Limited has been facing a lot of challenges
but has not had the
solution. The major cause of the challenges is due to the lack of
information, and therefore they
are not able to make informed decisions. Competition from other
businesses has been a major
challenge whereby the company despite its loyal customers, there are
issues they are not able to CUSTOMER SELF-SERVICE AND
FEEDBACK FOR EFFECTIVE BUSINESS
8
address. The company, therefore, has the need for using a system that
will help them capture
customer feedback after they are offered the service for improvement.
With this, the company
will be able to compete favorably with the competitors and even do
more since it will be in a
better position to serve its customers (Kumar, et al. 2013). The company
has also used the analog
system of serving the clients thereby no chance to interact with them and
know how they feel
about the services.
1.2 Discussion of the Business Problems
Digital Electronics and Accessories Limited has had various problems
that have been affecting it.
One of the primary issues that have affected the company is the issue of
the lack of information.
Information is the most crucial thing that a business can use to do the
best and offer the best to
the clients. Without information, the business is not able to know what
they should provide and
how they should deliver it to the clients. A company may be producing
goods in bulk, but the
benefits from the production are negligible since the clients may not be
satisfied with the
products. There is the need for the business to be able to know what
exactly they should produce
regarding the needs of the consumers (Kumar, et al. 2013). Digital
Electronics and Accessories
Limited has been providing products to clients but in the recent past
have faced the challenge of
losing consumers.
A lot of consumers have left the company claiming that the products that
are being produced are
of low quality and do not meet the standards the customers want. This is
due to the lack of
information that the management needs to know what exactly to produce
and where to improve.
If the business was in a position to know what the customers wanted
most and what they
disliked, they would have acted upon it to avoid losing the clients. Being
a company that is CUSTOMER SELF-SERVICE AND FEEDBACK
FOR EFFECTIVE BUSINESS
9
known by many consumers of its high-quality products, it would be a
shame if these customers
hear of the low-quality products offered. There is, therefore, an urgent
need to curb this problem
of lack of customer information which may mess the operations of the
company. There was a
time that the company had tried to do an analysis and a research about
the client`s feedback, but
the process was in vain. The people that the staff interacted with were
not willing to respond to
the questions asked since most of them were not electronics customers
(Sabatier, et al. 2012).
The manual procedures that were followed were also not effective hence
making the process
even more complicated. The team came back with unclear feedback
from the customers.
1.3 High-Level Solution
The high-level design of the system will help curb the information
gathering issue from the client
for service and products providence. The Internet has been used by many
people to do business,
but very few tend to take the time to get the feedback from the clients.
Many businesses have had
the chance to use an online system but have failed. The online business
system has helped many
businesses attract clients but later loose them. The main reason that the
businesses lose the
customers is that they do not take into consideration the feedback of the
customers. The business
may be receiving new clients every day due to the online services they
offer, but after a period
the loyalty of the customers will fade. The system, therefore, aims to
provide an avenue whereby
the management will be interacting on an online platform with the
customers. There will be
modules that will ensure customers can be able to log into the system
and order the products they
want. The system will give the customers priority to choose whether to
collect the products from
the shop or get a delivery at a cost. The choice of the client is very
essential as it ensures the
business does not violate the needs of the client (Sabatier, et al. 2012).
The customers are the
final say in a business and the staffs should do as the client want.
CUSTOMER SELF-SERVICE AND FEEDBACK FOR EFFECTIVE
BUSINESS
10
The system, therefore, has the advantage of bringing together the
business and the customer. The
customer has a platform where he or she can raise a burning issue to the
business. The
management will be able to get a notification that there is an issue raised
by the client and
therefore will take the step to look at it. After the management goes
through the issue that has
been raised, they will be able to consult among themselves and come up
with the best actions to
take. The customers will also be given a chance to suggest what may be
done, so they are happy
with the services. Through this, the system is creating a platform that the
managers will be able
to know how best to improve their services to satisfy the wants of the
customers.
1.4 Benefits of Solving the Problem
The main benefit of solving the problem is that the company is in a
position to satisfy the human
wants based on their views. The benefit touches both sides in that the
customers benefit by
receiving quality products and the management has the advantage of
generating more gains in
terms of profits. The other benefit is that the company has the chance to
get the information they
will require in their production. Customer information is a shield that a
business cannot operate
without. This is a system providing an avenue for the business to interact
directly with the
customers. The system also provides the customers a chance to shop
online whereby they are not
required to physically visit the premises. They will just order their
product with just a few clicks.
The system provides a convenient platform where one can buy products
at their convenience
without having to hustle to go to the shop. Its a shop at your doorstep.
1.5 Business or Technical Approach
The business approach that the system aims to fulfill is the keeping of
the already existing
customers and attracting more. Satisfying the wants of the clients is an
assurance that the CUSTOMER SELF-SERVICE AND FEEDBACK
FOR EFFECTIVE BUSINESS
11
business will have more and more customers. The benefit that the
business will get is that it will
offer online services based on the views and wants of the customers. The
system allows for an
interactive session between the clients and the management, and
therefore, there is a better
approach to the business (Wild, et al. 2014). Quality services lead to
better business performance
and therefore better benefits to the company. If a company generates
more revenue, then quality
is assured to the customers.
1.6 Business Process Changes
The system comes in a situation whereby it will alter some processes in
the business. The system
may not wholly eradicate the coming of customers to the business, but
the frequency in which
they appear in the business will reduce. Most transactions will be done
online, and therefore, the
customer interaction will only be when delivering the products. The
management process and the
decision-making process will be affected by the views of the customers.
In the past years, the
business has been making the decision out of what the management feels
is right for the business
but not according to the views of the customers. The process, however,
will be to benefit both the
customers and the business at large. This is a process that many other
businesses will emulate
based on the facts that its full of benefits as compared to the
disadvantages.
1.7 Technology or Business Practices used to augment the solution
The technological practices that have been used by people to interact
through the social media
are the same practice that will be used by the business to interact with its
customers. Its a chance
that the business has to ensure that the gap between the business and the
customers is linked.
There is no need to enjoy the entertainment advantages of the social
media without taking
advantage of the benefits it offers to businesses. The internet is a tool
that has brought CUSTOMER SELF-SERVICE AND FEEDBACK FOR
EFFECTIVE BUSINESS
12
opportunities that need to be utilized by the businesses to maximizing
the market they have.
Interacting with the customers online is a key issue that needs to be
taken advantage of every
business.
1.8 Conclusions and overall Recommendations
Have you ever imagined a situation that a business operates without
customer`s information?
This is a scenario that the business is merely doing something. There is
no progress that can be
achieved since the customers will always be complaining without the
management knowing.
Putting into consideration this challenges, the system will bring into
existence an interface that
will ensure an interaction between the business and the customers. There
will be no chances of
making mistakes by the business as they will consider every aspect that
the clients point out.
Having known what pleased the client and what did not please them will
be an opportunity that
will help produce more which is of the required quality. Businesses have
used the online system
to deliver products and services to their clients but have failed. It would
be thought that its an
automatic thing a business using the online system to prosper (Wu, et al.
2015). Its not always
that way without considering the feedback of the clients.
The recommendation is that the business to use the system to the later so
as to ensure they
consider each and every view of the client. They should not just take
some suggestions and
assume others. Every view from the client is crucial and should not be
assumed. Its a system
that will take the business to greater heights giving them a better
competitive advantage.
1.9 High-level Implementation Plan CUSTOMER SELF-SERVICE
AND FEEDBACK FOR EFFECTIVE BUSINESS
13
Serving the consumers gives the business a chance to interact with them
one on one. The online
system will, however, reduce the chances of the physical interaction
between the staff and the
customers. This however does not mean that the feedback from the
clients is not important.
There is the need to analyze every aspect that the customers raise to fill
the gaps that may be
created as business is carried on. Every aspect is important in the
business and must be taken into
consideration. Giving the customers a chance to express themselves is
the most crucial aspect of
a business operation.
2.0 Summary of Project The project is destined to automate the shopping
process whereby the customers will be able to
order products online. The customers will have a chance to express their
views as feedback to the
management. This will provide a discussion platform between the two
parties (the customers and
the management) which will ensure proper decision making by the
business. This will make sure
that the business provides the quality of products as expressed by the
views of the clients. There
will be an analysis that the managers will do out of every view from the
online system from the
feedback module. CUSTOMER SELF-SERVICE AND FEEDBACK
FOR EFFECTIVE BUSINESS
14
References
Jansen, S., Brinkkemper, S., &amp; Finkelstein, A. (2013). Business
network management as a
survival. Software Ecosystems: Analyzing and Managing Business
Networks in the
Software Industry, 29.
Kelley, E. E., &amp; Wilbrink, T. I. (2012). U.S. Patent No. 8,095,505.
Washington, DC: U.S. Patent
and Trademark Office.
Kumar, M., Kumar, S., &amp; Tyagi, S. K. (2013). Design, development
and technological
advancement in the biomass cookstoves: A review. Renewable and
Sustainable Energy
Reviews, 26, 265-285.
Sabatier, V., Craig-Kennard, A., &amp; Mangematin, V. (2012). When
technological discontinuities
and disruptive business models challenge dominant industry logics:
Insights from the
drugs industry. Technological Forecasting and Social Change, 79(5),
949-962.
Wild, J., Wild, K. L., &amp; Han, J. C. (2014). International business.
Pearson Education Limited.
Wu, D., Zhang, G., &amp; Lu, J. (2015). A fuzzy preference tree-based
recommender system for
personalized business-to-business e-services. IEEE Transactions on
Fuzzy Systems,
23(1), 29-43.
---------------------------------------------------------------------------------------
new network design for CNT Books

FOR MORE CLASSES VISIT


www.tutorialoutlet.com
you have been called in to consult on a new network design for CNT
Books. The requirements of this design are summarized as follows: The
building has three floors. there are 300 computer and 10 servers. Users
must be grouped according to the projects. what features would you look
for on the switches you purchase for this design, Explain why you would
want each feature. Do you need to include any other devices in this
design?
---------------------------------------------------------------------------------------
To calculate the value of Pi

FOR MORE CLASSES VISIT


www.tutorialoutlet.com
2. 1.To calculate the value of Pi, we can use the graph of a circle
and find the area under the graph.
3. 2.Riemann sum(https://en.wikipedia.org/wiki/Riemann_sum )is an
effective method for finding the area under the graph
4. 3. Write a PThreads Program that will calculate Pi
1. -It should run 8 threads
2. -Create a global variable for the total sum
3. -Use a Mutex variable to lock the critical section where
you sum the results
5. 4.The program should output the sum at each thread and the parent
will output the total sum
6. 5.Copy this version and remove the Mutex variable
1. -run both versions and compare the output
7. Need
1. 1.Source Code
2. 2.Screenshots of output of both programs
Some sample code for PThreads can be
found here. https://grid.cs.gsu.edu/~cfrederick/csc4320/examples.php
---------------------------------------------------------------------------------------

Write a program that demonstrates causing and


throwing the following exceptions

FOR MORE CLASSES VISIT


www.tutorialoutlet.com
Java: Write a program that demonstrates causing and throwing the
following exceptions.
ArithmeticException
InputMismatchException (User input permitted)
ArrayIndexOutOfBoundsException
StringIndexOutOfBoundsException (Optional. See chapter 14 if you
want to try)
NullPointerException
NegativeArraySizeException
The program should present the user with a numbered menu that extends
the capability to the user to select one of the above exceptions. Menu
selection is run through a switch/case structure with each case associated
with one of the exceptions being demonstrated/thrown. The entire
switch/case structure should be contained within a single try block. Each
case should contain code that creates the condition that causes the
exception for that particular case to be thrown. After the single try block
should be the multiple catch blocks for each type of exception with each
catch block outputting a message that indicates the type of exception
thrown and the values and/or condition(s) causing the exception. The
last catch block should be followed by a finally block that outputs a
message that indicates that the finally block was reached.

Do not prompt the user for any input, except for the
InputMismatchException, other than menu item number. Use hard coded
literal values for data required for variables and member variables, class
constructor calls, and other program variables.
Your program(s) must include a description of what user is being
prompted for each input.
---------------------------------------------------------------------------------------

Você também pode gostar