Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
package eventhough;
public class EvenThough {
public static void main(String args) {
//initialize i
int i = 1;
System.out.println("Even numbers between 1 and 20: ");
while (i <= 20) {...
***************************************************
IT 153 Based on your work in this unit and the Atomic Learning
Tutorials
FOR MORE CLASSES VISIT
www.tutorialoutlet.com
Based on your work in this unit and the Atomic Learning Tutorials and
readings, discuss the challenges of working with multiple worksheets,
the importance of pulling data from various worksheets into a single
worksheet, and the ways in which an Excel 3-D worksheet could be a
solution to a complex challenge.
***************************************************
Question One
comes from a poor family, she will need a scholarship in order to attend
college.
get an A. Her high school has a few older PCs, but there are always long
lines
of students waiting to use them during the school day. After school, she
usually
One evening Alexis visits the library of a private college a few miles
from
her familys apartment, and she finds plenty of unused PCs connected to
the
a week, and by using its PCs and printers she efficiently completes the
extra
research projects, graduates from high school with straight As, and gets
a fullride
Question Two
Hasan was in third grade when he was caught cheating on his math quiz.
He had been doing poorly in math and his parents had threatened that if
he didnt raise his grades they wouldnt let him play on the baseball
team. So he cheated. When the teacher asked him about it, he denied it at
first, but finally admitted to writing down the answers ahead of time. A
parent conference was called and Hasan had to sit with his parents, the
teacher, and the principal to discuss the school policy on cheating and
lying. On the way home, his father told Hasan he was deeply
disappointed in him and expected more from him in the future. That
night, Hasan felt like the whole world was against him, but he also felt
guilty for letting his parents down. That weekend, Hasan and his family
went to a movie. When they got to the ticket window Hasans dad asked
for childrens tickets for both Hasan and his 16 year old brother. Hasan
looked over at his brother, who stared down at the sidewalk and hunched
his shoulders hoping the ticket seller wouldnt notice that he was well
above the age for a childs ticket. The ticket seller glanced suspiciously
back and forth between the father and the brother, and then, with a
doubtful look on her face, she handed them the two childs tickets. This
happened every time they went to the movies, and it always made Hasan
feel weird. On the way home from the movie, Hasan asked his father
why it was okay to lie and cheat the theater out of money but not to
cheat on his math quiz. His dad responded that sometimes it's okay to lie
as long as nobody gets hurt. The rest of the way home Hasan just got
more and more confused. Cheating on his test hurt nobody. He didnt
steal the answers from any of the other students. If he hadnt gotten
caught, he would have been praised. How was what he did different
from what his dad did over and over again? And should he continue to
stay silent the next time his dad lied?
Have you ever seen an adult or friend do something you felt wasnt
right? What did you do? How did it make you feel?
Do you think Hasan should try to talk to his Dad again about his lying
at the movies?
***************************************************
ITEC 3280
FOR MORE CLASSES VISIT
www.tutorialoutlet.com
/ lab1: simplegame_OOP
// <insert your name here>
// read main.cpp, and follow the instructions at the bottom of main.cpp
#include <iostream>
#include "Entity.h" // std::cout using namespace std;
#include <windows.h>
#include <conio.h> //
SetConsoleCursorPosition(HANDLE,COORD)
// _getch() enumGameState{
RUNNING,WIN,LOST,USER_QUIT
}; /**
* moves the console cursor to the given x/y coordinate
* @param x
* @param y
*/
void moveCursor(int x, int y)
{
COORD c = {x,y};
SetConsoleCursorPosition(GetStdHandle(STD_OUTPUT_HANDLE),
c);
}
int main()
{
// player data
Entity e(3,4,1); // game data
GameState state = RUNNING;
int input;
Vector2 size(20,15);
Vector2 winPosition(size.x/2, size.y/2);
do
{ // draw the game world
moveCursor(0,0);
for(int row = 0; row < size.x; row++)
{
for(int col = 0; col < size.y; col++)
{
cout<< '.';
}
cout<< '\n';
}
// draw the player
moveCursor(e.getX(), e.getY());
cout<< e.getIcon();
// get input from the user (wait for one key press)
input = _getch(); // process input from the user
switch(input)
{
case 'w':
e.setY(e.getY() - 1);
break;
// move up
case 'a':
e.setX(e.getX()-1);
break;
// move left
case 's':
e.setY(e.getY()+1);
break;
// move down
case 'd':
e.setX(e.getX()+1);
break;
// move right
case 27:
state = USER_QUIT;
break;
// quit
}
// show the game state message
moveCursor(0, size.y+1);
switch(state)
{
case WIN:
cout<< "You WON! Congratulations!\n";
break;
case LOST: cout<< "You lost...\n";
break;
}
if(winPosition.is(e.getX(),e.getY()))
{
state = WIN;
}else
{
state = LOST;
}
}
while(state == RUNNING); } // user must press ESCAPE before closing
the cout<< "press ESCAPE to quit\n";
while(_getch() != 27);
return 0;
***************************************************
2.In what way is IPv4 the same as IPv6 as far as routing is concerned in
an IP-based network? (Please remember to cite all material that you find
and use in your posts. Include at least a URL or Book where you
retrieved information.)
***************************************************
Project 4
1. Specification
FOR MORE CLASSES VISIT
www.tutorialoutlet.com
Project 4
1. Specification
This programming project involves writing a program to manage a
student database. The interface to the program
should be a Swing based GUI that looks similar to the following: A
combo box should allow the user to select one of the four database
actions shown. The database should be
implemented as a HashMap, with the Id field as the key and a Student
record as the value. The selected operation
should be performed when the user clicks the Process Request button. If
the user attempts to insert a key that is
already in the database an error message should be displayed using a
JOptionPane message dialog box. If the user
attempts to delete, find or update a record that is not in the database, a
message should also be displayed in a
JOptionPane. After each successful operation is completed a
JOptionPane window should be displayed confirming
the success. In the case of a successful Find request, a window should
pop up containing the student's Id, name,
major and current GPA. When the user selects the Update request, the
following JOptionPane windows should be
displayed to gather information about a course that has just been
completed. As a result, the Student record in
the database will be updated accordingly. User input values should be
checked and a warning message should be
displayed in a JOptionPane for inappropriate values (such as empty
textfields for Id, name or major). When the main application window is
closed, the student records from the database will be written into the text
file outData.txt, each student data (including his/her GPA) on a separate
line. The last line of the file will contain
the total number of student records in the database and their average
GPA value.
The program should consist of two classes.
1. The first class P4GUI should define the GUI and handle the database
interactions. It should be hand-coded and
not generated by a GUI generator. 1 2. The second class named Student,
should define the student record. The class defines the instance variables
id,
name, major, totalCredits (as total number of credits completed) and
totalQP (as total quality points). The quality
points for a course is calculated as the numeric value of the grade
received in the course (A = 4; B = 3; C = 2; D = 1;
F = 0) times the number of credit hours for that course. The values of
totalCredits and totalQP will be used to
calculate the GPA by dividing totalQP by totalCredits. The class Student
should have the following three methods:
a. A constructor with arguments that is used when new student records
are created It takes Id, name and
major as parameters and will initialize totalCredits and totalQP to zero;
b. A method courseCompleted that should accept the course grade and
credit numbers and will update
the variables used to compute the GPA. It will be called when an Update
request is made.
c. A method overriding toString that returns a labeled string containing
the student id, name, major and
GPA.
Finally, when a student has not yet completed any course, the GPA
should be displayed as 4.0.
Your program should compile without errors.
The Google recommended Java style guide
(https://google.github.io/styleguide/javaguide.html) should be used to
format and document your code. Specifically, the following style guide
attributes should be addressed: Header comments include filename,
author, date and brief purpose of the program. In-line comments used to
describe major functionality of the code. Meaningful variable names and
prompts applied. Class names are written in UpperCamelCase. Variable
names are written in lowerCamelCase. Constant names are in written in
All Capitals. Braces use K&R style. In addition the following
design constraints should be followed: Declare all instance variables
private
Avoid the duplication of code Test cases should be supplied in the form
of a table with columns indicating what aspect is tested, the input
values, expected output, actual output and if the test case passed or
failed. This table should contain 5 columns
with appropriate labels and a row for each test case. Note that the actual
output should be the actual results you
receive when running your program and applying the input for the test
record. Be sure to select enough different
kinds of employees and situations to completely test the program.
2. Submission Requirements
Submit the following to the Project 2 assignment area no later than the
due date listed in your LEO classroom.
1. The source files P4GUI.java and Student.java and the program
generated output file outData.txt. The source
code should use Java code conventions and appropriate code layout
(white space management and indents) and
comments. All submitted files may be included in a .zip file.
2. The solution description document P4SolutionDescription (.pdf or
.doc / .docx) containing the following: 2 (1) Assumptions, main design
decisions, error handling;
(2) Test cases table3) Screen captures showing successful program
compilation and test cases execution. Each screen capture should
be properly labeled, clearly indicated what the screen capture represents.
(4) Lessons learned from the project;
3. Grading Rubric
The following grading rubric will be used to determine your grade:
Attribute
P4GUI class Meets
35 points Does not meet
0 points a) Defines the GUI. a) Does not defines the GUI. b) Provides a
combo box to allow the
user to select one of the four database
actions including insert, update, delete
and find. b) Does not provide a combo box to allow
the user to select one of the four database
actions including insert, update, delete
and find. c) The database is implemented as a
HashMap, with the ID field as the key
and a student record as the value. c) The database is not implemented as
a
HashMap, with the ID field as the key and
a student record as the value. d) The operation is performed when
the user clicks the Process Request
button. d) The operation is not performed when
the user clicks the Process Request
button. e) User input values are checked and
warning message is displayed for
inappropriate values entered in the Id,
name or major textfields. e) User input values are not checked and
warning message is not displayed for
inappropriate values entered in the Id,
name or major textfields. f) If the user attempts to insert a key
that is already in the database an error
message is displayed using a
JOptionPane message dialog box. f) If the user attempts to insert a key
that
is already in the database an error
message is not displayed using a
JOptionPane message dialog box. g) If the user attempts to delete, find
or g) If the user attempts to delete, find or
update a record that is not in the
update a record that is not in the
database, a message is displayed.
database, a message is not displayed.
h) After each successful operation is
completed a JOptionPane is displayed
confirming the success. h) After each successful operation is
completed a JOptionPane is not displayed
confirming the success. i) In the case of a successful Find
request, a window pops-up containing
the student's ID, name, major and
current GPA. i) In the case of a successful Find request,
a window does not pop-up containing the
student's ID, name, major and current
GPA. 3 Student Class j) When the user selects the Update
request, a JOptionPane is displayed to
gather information about a course that
has just been completed including the
grade and number of credits. j) When the user selects the Update
request, a JOptionPane is not be displayed
to gather information about a course that
has just been completed including the
grade and number of credits. k) When the window is closed, the
student records from the database are
written in a file, each student data
(including their GPA) on a separate line. k) When the window is closed,
the student
records from the database are not written
in a file, each student data (including their
GPA) on a separate line. l) The last line of the file contain the
total number of student records in the
database and their average GPA value.
40 points l) The last line of the file does not contain
the total number of student records in the
database and their average GPA value
0 points a) Defines the student record. a) Does not define the student
record. b) Contains instance variables for the
student id, name, major and two
variables that are used to compute the
GPA. b) Does not contains instance variables for
the student id, name, major and two
variables that are used to compute the
GPA. c) Contains a variable representing the
total number of credits completed c) Does not contain a variable
representing the total number of credits
completed d) Contains a variable representing the
total quality points, which are the
numeric value of the grade received in
a course times the number of credit
hours.
e) Contains a constructor that is used
when new student records are created.
It should accept Id, name and major as
parameters and initialize the fields that
are used to compute the GPA to zero.
f) Contains a method courseCompleted
that accepts the course grade and
credit numbers and update the
variables used to compute the GPA.
g) courseComplete is called when an
Update request is made.
h) Contains an overridden toString
method that returns a labeled string
containing the student name, major
and GPA. 4 d) Does not contain a variable
representing the total quality points,
which are the numeric value of the grade
received in a course times the number of
credit hours.
e) Does not contains a constructor that is
used when new student records are
created. It should accept Id, name and
major as parameters and initialize the
fields that are used to compute the GPA to
zero.
f) Does not contains a method
courseCompleted that accepts the course
grade and credit hours and update the
variables used to compute the GPA.
g) courseComplete is not called when an
Update request is made.
h) Does not contains an overridden
toString method that returns a labeled
string containing the student name, major i) Calculates and displays a
GPA of 4.0
for students who have not yet
completed any course. Test Cases 10 points
a) Test cases are supplied in the form
of table with columns indicating test
case objective, the input values,
expected output, actual output and if
the test case passed or failed. and GPA.
i) Does not calculate or display a GPA of
4.0 for students who have not yet
completed any course.
0 points
a) No test cases were provided. b) Enough scenarios selected to
completely test the program. Documentation and Style
guide c) Test cases were included in the
supporting word or PDF
documentation.
10 points
a) Solution description document
P4SolutionDescription includes all the
required sections appropriate titled. 0 points
a) No solution description document is
included.
Source code criteria Source code criteria
b) Header comments include filename,
author, date and brief purpose of the
program.
c) In-line comments used to describe
major functionality of the code.
d) Meaningful variable names and
prompts applied.
e) Class names are written in
UpperCamelCase.
f) Variable names are written in
lowerCamelCase.
g) Constant names are in written in All
Capitals.
h) Braces use K&R style.
i) Declare all instance variables private.
j) Avoids the duplication of code. 5 b) Java style guide was not used to
prepare the Java code.
c) All instance variables not declared
private.
d) Duplication of code was not avoided. 6
***************************************************
Write a program that reads the subtotal and the gratuity rate and
computes the gratuity and total. For example, if the user enters 10 for the
subtotal and 15% for the gratuity rate, the program displays 1.5 as the
gratuity and 11.5 as the total. subtotal,
rate = eval(input("Enter subtotal and gratuity rate: "))
gratuity = subtotal * rate / 100
total = subtotal + gratuity
print("The gratuity is", int(gratuity * 100) / 100,
"and total is", int(total * 100) / 100)
***************************************************
You are a law enforcement agent and you are told to investigate a group
that is believed to be connected with other organized crime groups,
including Colombian organized crime groups, Mexican organized crime
groups, and the Russian mafia.
This group that you are investigating is led by a man whose real name is
unknown but goes by the alias Beast. Beast is believed to be importing
drugs into the United States with the help of the Colombian, Mexican,
and Russian organized crime groups. Beast is also believed to be the
owner of a chain of restaurants and stores. These businesses are believed
to help Beast in laundering money. The structure of the group is still
uncertain, and it is your job to investigate the group before any arrests
can be made. Beast is very private, but he is highly connected with some
government officials. The identity of those in the government and law
enforcement that are helping Beast and his group is also unknown. Beast
is believed to be highly dangerous, as he has a small army constantly
protecting him that will kill in an instant. It is important to take Beast off
the street as soon as possible. You must write an investigative report
addressing the following:
7. Provide some case law that help the agency identify how these
laws will be applied to these particular set of circumstances.
Assignment
1. For items in InvoiceLineItems table whose AccountNo is an even
number like
150 or 574, use a CASE function to display their AccountNo,
InvoiceLineItemDescription, and DescriptionLength. Depending on the
total
number of characters of the InvoiceLineItemDescription, each
DescriptionLength
shows one of the following three strings:
'Shorter than 10 characters', or
'Between 10 and 19 characters', or
'20 or more characters'
Also sort your output by AccountNo.
Hint: Use one of the operators listed on p.97 to determine if a number is
an
even
or odd number.
Here is a sample output of first few lines:
AccountNo
--------150
characters
160
characters
160
characters
160
170
characters
400
......
...
*/ InvoiceLineItemDescription
-------------------------Supplies DescriptionLength
----------------------------Shorter than 10 MVS Online Library Between 10
and 19 MSDN Shorter than 10 Quarterly Maintenance
Network wiring
Between
CICS Desk Reference Between 20 or more characters
10 and 19
10 and 19 characters
2. Display InvoiceLineItemDescription such that the one with the
longest first word is printed at top and no duplicate rows.
To verify your output, display the length of the first word of
InvoiceLineItemDescription in the second column as FirstWordLength.
Hint: use string functions discussed in lecture.
Here is a sample output of first few lines:
InvoiceLineItemDescriptionFirstWordLength
-------------------------- -----------------Propane-forklift
16
International pkg.
13
International shipment
13
Publishers Marketing
10
DiCicco's
9
Quarterly Maintenance
9
Telephone (Line 1)
3. The manager wants to have a report of detail information of all
invoice line
items
with the desired column title shown below. She wants the items to be
listed
based on
the AccountNo (a->z) and item with the highest amount within each
account is
printed
first (see sample output below). In case of same amount value, items
should
be printed
by their InvoiceID in ascending order.
Finally, all items should be continuously and uniquely ranked from 1
within
each account. No
Item Amount
Invoice ID
Item Description
Invoice
Sequence 570 2
Max 3
1
Card deck
2
Catalog ad
3 570
3 2 570
572
572
572 1
1
1 75.60 12 Kinko's 58.40 12 Office 41.80 74 Coffee 2433.00 56 1575.00
47 600.00 95 Books for research
4
572
Catalog ad
5
572
access fee 1
6
572
access fee 1
1
574
Property Taxes
1
580
1
1
582
lease
1
1
589
site design
1
.....
...
*/ 1
1 579.42 98 9.95 16 Monthly 9.95 23 Monthly 856.92
1 ---------------END--------------- 50.00 15
12 DiCicco's 503.20 105 7125.34 31 Bronco
Web
***************************************************
Query 1
Write a SELECT-INTO statement to create Products_ch07 table as a
duplicate of
Products table of ClearWater database.
Then, write a DELETE statement to delete products from Products_ch07
if their
unit price is above the average of those in category 1 ~ 5 in Products
table.
Your output must also display all columns of products that are deleted.
Query 2
After Query 1 is completed, write an INSERT statement to insert
products
into Products_ch07 if they exist in the ClearWater.dbo.Products but not
Products_ch07. Your output should display all columns of products that
are inserted.
Query 3
After Query 1 is completed, write an UPDATE statement with a
subquery
to increase product unit price by 10% in Products_ch07 if their supplier
is in Japan or Germany. Be sure your output display the following four
columns of products that are updated: ProductID,
UnitPriceBeforeUpdate,
UnitPriceAfterUpdate, UpdatedAmount.
Query 4
After Query 3 is done, write a statement to drop Products_ch07 from
your database and write a SELECT-INTO statement to re-create it as a
duplicate of Products table of ClearWater database.
Then, re-write the UPDATE statement you did in Query 3 to perform
exactly the same update and same output as in Query 3 but without
using any subquery.
***************************************************
CIS 230 Which of the following should you use to program web
server controls?
FOR MORE CLASSES VISIT
www.tutorialoutlet.com
QUESTION 1
Which of the following should you use to program web server controls?
3 What property of the calendar control is used to capture the data that
the user clicked?
4Which ASP.NET object is used to store data that last as long as the
ASP.NET application is alive?
9Which of the following Web server controls allow the user to choose
from mutually exclusive options?
10 You want to make a configuration setting change that will affect only
the current Web
application; Which file will you change?
11 What is the name of the event handler that activates when the page is
visited?
17Which object allows you to send HTTP response data to a client and
contains information aboutthat response?
18Which Validation control is the best choice to ensure that zip code
values entered in a form are
all numeric?
20What is the name of the Web page property that you can query to
determine that a Web page is
being requested without data being submitted?
21In which exception handling block do you write the code that may
generate exceptions?
22What method is used to remove all the items in a Drop-down List
control?
23Assume that you want to redirect the user to page3.aspx page and also
hide the page name and
other information; Which will be the correct syntax to use?
24You noticed that clicking a CheckBox does not cause a PostBack; you
need the CheckBox to
PostBack so you can update the Web page based on server-side code;
How do you make the
CheckBox cause a PostBack?
CIS 235 HTML document webpage for CIS 235 with my name,
id, course number and a paragraph of what I want to get out of
the class
FOR MORE CLASSES VISIT
www.tutorialoutlet.com
HTML document webpage for CIS 235 with my name, id, course
number and a paragraph of what I want to get out of the class
***************************************************
***************************************************
Process user input with the class using the scanner for keyboard input
and console output.
Obese 30 or more
FUNCTIONAL REQUIREMENTS
setNam
Receives a value to assign to private instance variable
e
setWeig
Receives a value to assign to private instance variable
ht
setHeig Receives TWO inputs (height in feet, inches). Converts and stores the total
ht INCHES in private instance variable
getNam
Returns private instance variable
e
getWei
Returns private instance variable
ght
getHeig
Returns private instance variable (inches)
ht
getMax
Calculates and returns maximum heart rate
HR
SAMPLE OUTPUT
Your age: 35
BMI: 27.1
Your age: 50
BMI: 21.9
GRADING RUBRIC
HealthProfile class
30
All methods created with proper functionality
Lab1Main class
Code style 5
Lab Report 10
TOTAL 55
/****************************************************
Program Name: ProgramName.java
Programmer's Name: Student Name
Program Description: Describe here what this program will do
**********************************************************
*/
DELIVERABLES
Note that your java filename must match class name (DO NOT rename).
***************************************************
CIS 2010 The Digital Advantage
What does digital mean
FOR MORE CLASSES VISIT
www.tutorialoutlet.com
CIS 2010
The Digital Advantage
What does digital mean (including
numbers, text, music, images, etc.)
Bits vs bytesuse in representing,
storing and transmitting data
What are advantages of digital.
Impact of Moores Law on technol.
General systems model
What is productivity and why is it
important in any organization?
Data vs. information vs. knowledge Key Topics
Exam 1
Note: This guide identifies important
concepts discussed in the course. It is
not intended as a list of terms but
rather as a guide to major areas of CIS
2010 discussion. Generations in the workplace
Job security; critical/nonroutine thinking
Role of IS and IT in a flat world.
Role of information Systems In Organizations
Operational role & impact measures
Importance of transaction processing systems
Every business transaction does what?
Productivity; Cost of transactions
Strategic role of information systems
What is strategy? What is corporate strategy
and how does it relate to business strategy?
When is something strategic?
Strategic Thinking and Strategic Analysis
Business modelspurpose & components
What characteristics of a firm, its products, and its
future have greatest impact on its valuation by
potential investors?
Commodity products & services
Value chain role/usage in strategic analysis
Industry structure and the five forces model for
analysis of an industry and its attractiveness
Competitive strategy generic strategies for
competitive advantage; competitive scope
Switching costs. Entry barriers Exit barriers
How do business strategy and business models
relate to and differ from one another?
The Data World: Data-Driven Business
Relational database principles
Database vs. file vs. record
Single source of truth / facts
Information Siloesproblems caused
Objectives of managing data / of database
management;
Importance to business and management of
having each objective met?
Meaning and importance of data independence.
How is data independence achieved?
Relation between database management system
(DBMS) and an info system. If a firm has a welldesigned IS application,
does it need a DBMS? Why should managers/users
be concerned about data
describing persons, places,
things, or events: entities
and entity relationships
when using (or are involved
in development of) company
databases? If a firm uses databases, why are data warehouses
and data mining sometimes needed and beneficial?
Big data; (predictive) analytics
Knowledge management: explicit vs. tacit knowledge
(read in text)
Information Systems Applications (Apps)
Fundamental business barriers information
systems & technology helps the firm overcome
Enterprise wide vs. functional info systems
Principal types of enterprise level information
systems/apps (as discussed in reading):
ERP, CRM, Supply chain management sys
Data Communication, Networking, & Mobility
Net neutrality: the principal and its purpose
Network types: LAN, WAN, backbone
Internet vs. intranet vs. extranet vs. portals
Physical vs. wireless communication channels
Internet protocol (IP) and why it is important
Packet switched networks What is a packet? Whyshould consumers
care?
Benefits provided by 3G & 4G technologies in
cellular communications/cellular networks
Connecting networks for business & commerce
Internet service providers; cable vs. DSL
How is Wi-Fi enabled/possible in a home/apartment?
Near-field communication; bluetooth; infrared
Client / server computing
Distinction between business & consumer network
types (e.g.,broadband, mobile, etc.). Benefits of each.
Convergence in business & consumer networks
What does network convergence mean? What is
converging? Why is this occurring? What is its
significance to business and individual users?
Growth of devices connected to Internet
The chapter on ethics, assigned for background reading,
is not included in this exam. Similarly, the tech. guides on
hardware, software, and intelligent systems were
assigned for background purposes and are not the focus
of direct exam questions. Note: The topics included here should serve as
a guide to exam preparation. The list may not be exhaustive. Other
topics may be included in the exam.
***************************************************
qattachments_f79633f78a7aa4972583320c6ba436f4b11451bc
Year Population Violent crime Violent crime rate Murder and
nonnegligent manslaughter
1994 260327021
1857670
713.6
23326
1995 262803276
1798792
684.5
21606
1996 265228572
1688540
636.6
19645
1997 267783607
1636096
611
18208
1998 270248003
1533887
567.6
16974
1999 272690813
1426044
523
15522
2000 281421906
1425486
506.5
15586
2001 285317559
1439480
504.5
16037
2002 287973924
1423677
494.4
16229
2003 290788976
1383676
475.8
16528
2004 293656842
1360088
463.2
16148
2005 296507061
1390745
469
16740
2006 299398484
1435123
479.3
17309
2007 301621157
1422970
471.8
17128
2008 304059724
1394461
458.6
16465
2009 307006550
1325896
431.9
15399
2010 309330219
1251248
404.5
14722
2011 311587816
1206005
387.1
14661
2012 313873685
1217057
387.8
14856
2013 316128839
1163146
367.9
14196 Page 1
qattachments_f79633f78a7aa4972583320c6ba436f4b11451bc
Murder and nonnegligent manslaughter rate Rape
Rape rate Robbery Robbery rate
9 102216
39.3 618949
237.8
8.2 97470
37.1 580509
220.9
7.4 96252
36.3 535594
201.9
6.8 96153
35.9 498534
186.2
6.3 93144
34.5 447186
165.5
5.7 89411
32.8 409371
150.1
5.5 90178
32 408016
145
5.6 90863
31.8 423557
148.5
5.6 95235
33.1 420806
146.1
5.7 93883
32.3 414235
142.5
5.5 95089
32.4 401470
136.7
5.6 94347
31.8 417438
140.8
5.8 94472
31.6 449246
150
5.7 92160
30.6 447324
148.3
5.4 90750
29.8 443563
145.9
5 89241
29.1 408742
133.1
4.8 85593
27.7 369089
119.3
4.7 84175
27 354746
113.9
4.7 85141
27.1 355051
113.1
4.5 79770
25.2 345031
109.1 Page 2
qattachments_f79633f78a7aa4972583320c6ba436f4b11451bc
Aggravated assault Aggravated assault rate Property crime Property
crime rate Burglary
1113179
427.6
12131873
4660.2 2712774
1099207
418.3
12063935
4590.5 2593784
1037049
391
11805323
4451 2506400
1023201
382.1
11558475
4316.3 2460526
976583
361.4
10951827
4052.5 2332735
911740
334.3
10208334
3743.6 2100739
911706
324
10182584
3618.3 2050992
909023
318.6
10437189
3658.1 2116531
891407
309.5
10455277
3630.6 2151252
859030
295.4
10442862
3591.2 2154834
847381
288.6
10319386
3514.1 2144446
862220
290.8
10174754
3431.5 2155448
874096
292
10019601
3346.6 2194993
866358
287.2
9882212
3276.4 2190198
843683
277.5
9774152
3214.6 2228887
812514
264.7
9337060
3041.3 2203313
781844
252.8
9112625
2945.9 2168459
752423
241.5
9052743
2905.4 2185140
762009
242.8
9001992
2868 2109932
724149
229.1
8632512
2730.7 1928465 Page 3
qattachments_f79633f78a7aa4972583320c6ba436f4b11451bc
Burglary rate Larceny-theft Larceny-theft rate Motor vehicle theft Motor
vehicle theft rate
1042.1
7879812
3026.9
1539287
591.3
987
7997710
3043.2
1472441
560.3
945
7904685
2980.3
1394238
525.7
918.8
7743760
2891.8
1354189
505.7
863.2
7376311
2729.5
1242781
459.9
770.4
6955520
2550.7
1152075
422.5
728.8
6971590
2477.3
1160002
412.2
741.8
7092267
2485.7
1228391
430.5
747
7057379
2450.7
1246646
432.9
741
7026802
2416.5
1261226
433.7
730.3
6937089
2362.3
1237851
421.5
726.9
6783447
2287.8
1235859
416.8
733.1
6626363
2213.2
1198245
400.2
726.1
6591542
2185.4
1100472
364.9
733
6586206
2166.1
959059
315.4
717.7
6338095
2064.5
795652
259.2
701
6204601
2005.8
739565
239.1
701.3
6151095
1974.1
716508
230
672.2
6168874
1965.4
723186
230.4
610
6004453
1899.4
699594
221.3
***************************************************
COMP 230 What are the terms of the general public license
FOR MORE CLASSES VISIT
www.tutorialoutlet.com
What are the terms of the general public license? How does this license
affect the use of Linux and other open source software in a business
organization?
***************************************************
COSC 1337
FOR MORE CLASSES VISIT
www.tutorialoutlet.com
Programming Fundamentals III Java Data Structures
Glen Grimes
Lab3 A Bag Implementation That Links Data COSC 2436 NAME
Problem:
Complete Programming Exercise 5, page 126. Requirements: You will
develop the following:
a. Develop the class LinkedSet which implements the SetInterface of
Chapter 1. Use the LinkedBag.java
file in your implementation b. Develop a test class which will exercise
and test the LinkedSet class. In the test application, create a list
of 10 or 12 elements. Remove several elements. Print the list before and
after the removal to
demonstrate the proper functioning of your methods. Submission:
a. A copy of the source code and related project files will be placed in a
directory on the I: drive as per the
following directions: A directory structure has been provided for
depositing completed lab work to which the students will
have access.
I:\ggrimes\COSC2436-Fall2016\S70-Dropbox\ Lab3\ The naming
conventions within the directory will be:
<Lab-number><YourLastName>, i.e.
1Smith,
so that the resultant structure will be:
I:\ggrimes\COSC2436-Fall2016\S70-Dropbox\Lab3\1Smith, or
I:\ggrimes\COSC2436-Fall2016\S70-Dropbox\ Lab3\9Smith,
as appropriate. Your directory must have a workspace/project folder
containing all the workspace files, any header,
and cpp files you've written, along with the executable file you
generated.
***************************************************
CPT 101 Chapter 8 Write a SELECT statement that returns these
columns from the Products table
FOR MORE CLASSES VISIT
www.tutorialoutlet.com
int g;
int h = 1;
intu,v;
HERE:
***************************************************
CS 375 COMPUTATION THEORY ASSIGNMENT 6.1Write a
proof by contradiction to show that the language
FOR MORE CLASSES VISIT
www.tutorialoutlet.com
isnonregular.
= {a, b}
are nonregular:
a) PAL = {palindromes}
b) EQAB = {strings that contain the same number of a's and b's}
bS | aaS
Prove that this generates the language defined by the regular expression:
b*aa
aXS
aX | cX | X
XpXpXS
pX | qX | X
(i)aaaa
(ii)abaa
(iii)bbaa
CFG 1.
aSb | abS
CFG 2
aS | bS | aS
CFG 3
aS | aSb | XS
aXa | aX
CFG4
aAS | aS
SbA | SS | baA
CFG5
aB | bAS
a | aS | bAAA
b | bS | aBBB
8.Show that the following CFGs are ambiguous by finding a word with
two different distinct syntax trees.
SaSaS | b(i) S
AA(iii) S
AAA | a | bA | Ab A
are ambiguous. Also find unambiguous CFGs that generate these
languages.9.Show that the following CFGs that use
XaX(a)S
aX | bX | X
aSX | (b)S
aX | aX
aS | bS | aaS | (c)S
10.Begin to draw the total language trees for the following CFGs until
we can be sure we have found all the words in these languages with one,
two, three, or four letters. Which of these CFGs, if any, are ambiguous?
aS | bS | a(a)S
aSb | bX(b)S
bX | bX
***************************************************
Suppose you had to set up a two-way secure data link with a satellite
orbiting Jupiter. Why would you not want to use standard TCP for flow
control?
***************************************************
CSCI 1101 Computer Science II Assignment 2
FOR MORE CLASSES VISIT
www.tutorialoutlet.com
You must implement the classes as specified in the UML diagram. You
may add other methods if needed, however, all the methods and the
variables indicated in the UML diagram must be implemented. You must
submit one zip file containing the source codes (.java files) and a text
document with sample outputs. All your programs must be nicely
formatted and commented. Develop the code in a step-by-step manner.
Each correctly developed code piece will get you points. The objective
of this assignment is to simulate a game of tic tac toe. For those of you
who are not familiar with the game, you can check out the following
website: (http://www.exploratorium.edu/brain_explorer/tictactoe.html).
Figure 1 below shows some sample tic toe toe boards with some input.
Win (O's Row) Win (X's Column) Win (X's Diagonal) Fig. 1 Tic Tac Toe
Boards and ways to win or tie (i.e., no winner) No winner (Tie) You will
be using the concepts of inheritance and aggregation in object-oriented
programming. You will also need to use 2-d arrays to represent the grid
of the tic tac toe board. 2-d arrays are similar to 1-d arrays except that
they use two indices. There is a small tutorial on 2-d arrays at the end of
this assignment. Check it out. There are three main classes (Board,
TicTacToeBoard, XO) and one additional class called Play that will use
and run the classes (that is, play the game). See the UML diagram below
to see how the classes fit together. Board Class - rows : int - cols : int +
Board (int , int) : + get/set methods XO Class - name: String - static turn:
int + XO ( ) : + get/set methods + equals (XO) : boolean + toString ( ) :
String TicTacToeBoard Class - board [ [ : XO - turnCnt : int +
TicTacToeBoard (int, int) : + get/set methods + add (int, int) : boolean +
winner ( ) : boolean + toString ( ) : String + other methods if needed XO
Class - this class will hold information about an "X" or an
"O" object. This class should have two attributes: a name
(which is a String X or O) and a static int variable that is either set
to 0 or 1 (it should be initialized to 1). You will use this variable to
determine which name to give the object when it is created (e.g., if it is
1, set the name to "X"). You need to implement a no args
constructor that sets the name of the object to either X or O based on the
static variable (and update the variable). You also need to implement:
the respective get and set methods
an equals method to see if this XO object is the same as another XO
object
a toString method that returns the name of the XO object Board class
this is a class used to implement a variety of different boards for
different games (e.g., a chess board, checkers board, and in our case a tic
tac toe board). This class has two private attributes: the number of rows
and number of columns of the board. It also has the following methods:
It has a constructor that takes in and initializes the rows and columns
The appropriate get/set methods You may add other methods if required.
TicTacToeBoard This class extends the Board class. It has two private
variables:
A 2D array made up of XO objects with the size of Boards' rows and
columns
An int that keeps track of how many turns (e.g., how many X's and O's
have currently been placed on the board.) Methods
The constructor takes in two ints representing the rows and columns. It
initializes the 2D array to the size of rows and columns, and sets count
of turns to 0.
There are appropriate get and set methods
It also implements. the following methods:
The add method will add a new XO object onto the board (add to the 2D
array). The method takes in two numbers representing which row and
column you want to add the object. It returns a boolean if the object was
successfully added. It will need to make sure that the passed in rows and
columns are within the size restrictions of the board. It will also need to
make sure that the place on the board doesn't already have an XO object.
CSIA 485
Implementation of New Technology
FOR MORE CLASSES VISIT
www.tutorialoutlet.com
1 Find a recent article related to issues surrounding IT mergers or
implementation of a new technology in an organization and describe
how they were resolved or handled.
***************************************************
You have been called upon to put together some reference materials for
other groups to follow, since up until now they have not created any
formal architectural documents. Create a System Reference Guide for
your employer in three parts over Weeks Two, Three, and Four.
In this week, write the first section of the Guide: a 1,000- to 1,050-word
paper, using Microsoft Word, addressing the listed software
architectures.
Find an example of a well-known commercial software system for each.
Give the name and purpose/function of the system, and write no less
than 250 words for each system explaining why this is an example of
that architecture.
Client/Server
Peer-to-peer (P2P)
Distributed computing (cloud, grid, etc.)
Monolithic (standalone)
"PART 2 OF 3"
INDIVIDUAL SYSTEM REFERENCE GUIDE: DIAGRAMMING
You have been called upon to put together some reference materials for
other groups to follow, since up until now they have not created any
formal architectural documents. As a continuation from Week Two,
continue to create a System Reference Guide for your employer.
Complete the System Reference Guide for your employer, and include
an architecture for a new employee website. First, identify the quality
attributes that lead to the architecture, then create a high-level
architectural diagram related to the qualities you identified for this
assignment. When finished, combine these with the documents created
in Weeks Two and Three.
Part 1:
Identify the quality attributes this system will need for its architecture.
Construct a matrix of quality attributes (nonfunctional requirements) that
you've identified. For each attribute, identify how you would satisfy the
requirement through an architectural pattern. In another column, write
the tradeoffs that you might encounter when satisfying this requirement
by the means you listed.
Part 2:
***************************************************
***************************************************
Assignment Requirements
***************************************************
In this project, you will create a Boat application. Each Boat has the
following
attributes: name, speed, angle, and power. The Boat names should be
read from a text
file boats.txt. You can assume there will be a maximum of 100 boats
in the file. For
testing, use the following boat names in the boats.txt file:
Sea Monkey
Backdraft
Cast Away
Nautifish
Destiny
The application should be able to accept commands from the user. The
user must
provide the commands in the following format:
<Boatname>, <command>
Example:
Sea Monkey, power on
Sea Monkey, turn left
Sea Monkey, speed up The acceptable commands are the following (Any
other command should be considered
invalid):
Command Description power on power up the boat power of power off
the boat speed up increases the boat speed by the minimum spee
increment 2 mph slow down decreases the boat speed by the minimum
spe
decrement 2 mph turn left turns the boat to the left by the minimum left t
degree 5 deg turn right turns the boat to the right by the minimum righ
degree 5 deg After each command is entered and executed, the state of
the boat should be displayed.
For Example:
User Enters>> Sea Monkey, power on
Program output>> Sea Monkey is pointing in the direction of 0
deg.
User Enters>> Sea Monkey, turn right
Program output>> Sea Monkey is in 5 deg angle.
User Enters>> Sea Monkey, speed up
Program output >> Sea Monkey is moving in 5 deg angle at the
speed of 2 mph.
User Enters>> Sea Monkey, power of
Program output >> Sea Monkey is powered of. Error checking:
If the user enters an invalid command, a message should be displayed
that the
command was invalid.
If the user enters a boat name that does not exist, a message should be
displayed that
the boat not does not exist.
If the user enters a command that is not in the correct format (boatname,
command), a
message should be displayed that the command format is invalid.
***************************************************
In this project, define a customer class similar to what you defined for
project 5 and 6.
A Customer has a first name, last name, and social security number.
Define the
Customer constructor so it will initialized those attributes. Define an
exception class
called "InvalidCustomerException". Update the Customer
constructor to throw an
exception when an invalid Social Security Number is passed to the
constructor. Update
the main method with a try/catch block to catch the exception and call
the
getMessage() method in the catch block.
InvalidCustomerException class should override the getMessage()
method to return a
string such as Invalid SSN 5438-98-9876.
***************************************************
First, specify the foreign keys for this schema, stating any assumptions
you make. Next, populate the relations with a few sample tuples, and
then give an example of an insertion in the SALE and SALESPERSON
relations that violates the referential integrity constraints and of another
insertion that does not.
I have identified the foreign keys, but am having problems with the rest
of question.
***************************************************
Information Type
Social Security Number of an Individual
FOR MORE CLASSES VISIT
www.tutorialoutlet.com
Information Type
Social Security Number of an Individual
First Name and Last Name
Credit Card Number
Qualification
Medical Information
Publications
Salary
Place of Employment
Country of Origin
Parent Names
Children Names
Marital Status
Passport Number
Languages Spoken
Drivers License Number
Level of Education
Major in College
Date of Birth
Citizenship
Ethnic Background
Criminal Records Spouse Name
Grade Point Average in College
Research Interest
Investment Accounts Priority One Priority Two Priority Three Same
level of importance
Confidentiality
Integrity
Availability Comments for Your Selections
***************************************************