Sei sulla pagina 1di 100

IST 140 Write a complete Java program called Even

FOR MORE CLASSES VISIT


www.tutorialoutlet.com

Write a complete Java program called EvenThough that uses a while


loop to check the numbers 1 through 20 and prints only those numbers
that are even.

Use division to determine an even number (i.e., when divided by 2 the


result yields no remainder).

All output should appear on a single line.

package eventhough;
public class EvenThough {
public static void main(String args) {
//initialize i
int i = 1;
System.out.println("Even numbers between 1 and 20: ");
while (i <= 20) {...
***************************************************

IT 153 Based on your work in this unit and the Atomic Learning
Tutorials
FOR MORE CLASSES VISIT
www.tutorialoutlet.com
Based on your work in this unit and the Atomic Learning Tutorials and
readings, discuss the challenges of working with multiple worksheets,
the importance of pulling data from various worksheets into a single
worksheet, and the ways in which an Excel 3-D worksheet could be a
solution to a complex challenge.
***************************************************

IT 270 Assignment 1Course Registration Project


FOR MORE CLASSES VISIT
www.tutorialoutlet.com

Course Registration Project


"SimpleScenario" Case study
At the beginning of each semester, students get a course catalogue
containing a
list of course offerings for the semester. Information about each course,
such as
professor, department, and prerequisites will be included to help students
make
informed decisions. The system will allow students to select four
course offerings for the coming
semester. In addition, each student will indicate two alternative choices
in case
the student cannot be assigned to a primary selection. Course offerings
will have a maximum of ten students and a minimum of three
students. A course offering with fewer than three students will be
cancelled.
Once the registration process is completed for a student, the registration
system
sends information to the billing system so the student can be billed.
Professors must be able to access the online system to indicate which
courses
they will be teaching. They will also need to see which students signed
up for
their course offerings. For each semester, there is a period of time that
students can change their
schedule. Students must be able to access the system during this time to
add or
drop courses. In addition to the routine treatments, the hospital also
provides emergency care.
For an emergency care, patients do not need to make appointments.
Emergency
patients are seen by emergency specialized doctors, and later patients
may be
handed over to an appropriate doctor for further treatments.
Learning
Outcome(s): Review an
organizational
case study
which
incorporates
elements for
managing a
project from
start to finish. Question
Please read the simple scenario carefully for the project, and answer the
following questions:
Question No. 1
Briefly describe the objective of the project? Define what a Learning
Outcome Describe the
roles of
project
managers. Review an
organizational
case study
which
incorporates
elements for Question Two
Question No. 2
Identify all the stakeholders? Question
Learning
Outcome(s): Review an
organizational
case study
which
incorporates
elements for
managing a
project from
start to finish. Describe the Question
Question No. 3
List the main functions that the project provides?
Learning
Outcome(s): Identify
different
methodologie
s used to
manageinformation
technology
projects. Review an
organizational Question OneQuestion One Question FouR
Identify the conditions/constrains that the project scenario may has?
***************************************************

IT 405 What kind of DNS namespace design


FOR MORE CLASSES VISIT
www.tutorialoutlet.com
What kind of DNS namespace design would be sensible for a advertising
company with 300 employees in two different locations (NY and LA)
divided into 5 departments: Executives, Accounts and Sales Dept. ,
Creative Media, Human Resources, and IT dept. ??
***************************************************

IT 407 ASSIGNMENT 1 Evaluate the following scenario from


the perspective of social contract theory?
FOR MORE CLASSES VISIT
www.tutorialoutlet.com

Question One

Evaluate the following scenario from the perspective of social contract


theory?

Alexis, a gifted high school student, wants to become a doctor. Because


she

comes from a poor family, she will need a scholarship in order to attend
college.

Some of her classes require students to do extra research projects in


order to

get an A. Her high school has a few older PCs, but there are always long
lines
of students waiting to use them during the school day. After school, she
usually

works at a part-time job to help support her family.

One evening Alexis visits the library of a private college a few miles
from

her familys apartment, and she finds plenty of unused PCs connected to
the

Internet. She surreptitiously looks over the shoulder of another student to


learn

a valid login/password combination. Alexis returns to the library several


times

a week, and by using its PCs and printers she efficiently completes the
extra

research projects, graduates from high school with straight As, and gets
a fullride

scholarship to attend a prestigious university.

Question Two

Consider the following scenario:

Hasan was in third grade when he was caught cheating on his math quiz.
He had been doing poorly in math and his parents had threatened that if
he didnt raise his grades they wouldnt let him play on the baseball
team. So he cheated. When the teacher asked him about it, he denied it at
first, but finally admitted to writing down the answers ahead of time. A
parent conference was called and Hasan had to sit with his parents, the
teacher, and the principal to discuss the school policy on cheating and
lying. On the way home, his father told Hasan he was deeply
disappointed in him and expected more from him in the future. That
night, Hasan felt like the whole world was against him, but he also felt
guilty for letting his parents down. That weekend, Hasan and his family
went to a movie. When they got to the ticket window Hasans dad asked
for childrens tickets for both Hasan and his 16 year old brother. Hasan
looked over at his brother, who stared down at the sidewalk and hunched
his shoulders hoping the ticket seller wouldnt notice that he was well
above the age for a childs ticket. The ticket seller glanced suspiciously
back and forth between the father and the brother, and then, with a
doubtful look on her face, she handed them the two childs tickets. This
happened every time they went to the movies, and it always made Hasan
feel weird. On the way home from the movie, Hasan asked his father
why it was okay to lie and cheat the theater out of money but not to
cheat on his math quiz. His dad responded that sometimes it's okay to lie
as long as nobody gets hurt. The rest of the way home Hasan just got
more and more confused. Cheating on his test hurt nobody. He didnt
steal the answers from any of the other students. If he hadnt gotten
caught, he would have been praised. How was what he did different
from what his dad did over and over again? And should he continue to
stay silent the next time his dad lied?

Based on your point of view, answer the following questions:

What is Hasans dilemma?

Have you ever seen an adult or friend do something you felt wasnt
right? What did you do? How did it make you feel?

Do you think Hasan should try to talk to his Dad again about his lying
at the movies?

Who might Hasan have hurt by cheating on his quiz?


Hasans Dad said it was okay to be dishonest if no one was hurt. Who
do you think might have been hurt by his lying at the movie ticket
office?

***************************************************

ITEC 3280
FOR MORE CLASSES VISIT
www.tutorialoutlet.com

School of Information Technology


ITEC 3280 Assignment
Background
This Assignment is based on MGAs directory at
http://www.mga.edu/directory. The goal is to create a
form for data input, validate the data entered, and display it back to the
user. Assignment Create an HTML/JS form to capture, validate, and
display data similar to the 2 screenshots.
Add an email field
First Name, Last Name, Email, Department and Title should be required
Drop-Down list used for selecting a department
Only good URLs, email addresses and phone numbers can be entered
If Dr. is checked it should precede the name (last screenshot)
Email Address and Website should have <a> tag on display-side
that can be clicked to go there
Should be HTML w3c valid and fully functional
Individual work only! Outcomes should be unique and fulfill above
requirements. Assignment Grading Policy Outcomes should be unique
and reflect your design choices
I encourage you to use the validators to find errors in your code
https://validator.w3.org/ - I will take off for HTML errors
http://jigsaw.w3.org/css-validator/ - I will not take off for CSS errors as
long as youre using CSS
correctly. Jigsaw is pretty strict IMHO but it can help you find some
errors.
Assignment should fulfill all required elements and be submitted as a
.zip or .rar file to D2L
Dropbox
***************************************************
// lab1: simplegame_OOP
FOR MORE CLASSES VISIT
www.tutorialoutlet.com

/ lab1: simplegame_OOP
// <insert your name here>
// read main.cpp, and follow the instructions at the bottom of main.cpp
#include <iostream>
#include "Entity.h" // std::cout using namespace std;
#include <windows.h>
#include <conio.h> //
SetConsoleCursorPosition(HANDLE,COORD)
// _getch() enumGameState{
RUNNING,WIN,LOST,USER_QUIT
}; /**
* moves the console cursor to the given x/y coordinate
* @param x
* @param y
*/
void moveCursor(int x, int y)
{
COORD c = {x,y};
SetConsoleCursorPosition(GetStdHandle(STD_OUTPUT_HANDLE),
c);
}
int main()
{
// player data
Entity e(3,4,1); // game data
GameState state = RUNNING;
int input;
Vector2 size(20,15);
Vector2 winPosition(size.x/2, size.y/2);
do
{ // draw the game world
moveCursor(0,0);
for(int row = 0; row < size.x; row++)
{
for(int col = 0; col < size.y; col++)
{
cout<< '.';
}
cout<< '\n';
}
// draw the player
moveCursor(e.getX(), e.getY());
cout<< e.getIcon();
// get input from the user (wait for one key press)
input = _getch(); // process input from the user
switch(input)
{
case 'w':
e.setY(e.getY() - 1);
break;
// move up
case 'a':
e.setX(e.getX()-1);
break;
// move left
case 's':
e.setY(e.getY()+1);
break;
// move down
case 'd':
e.setX(e.getX()+1);
break;
// move right
case 27:
state = USER_QUIT;
break;
// quit
}
// show the game state message
moveCursor(0, size.y+1);
switch(state)
{
case WIN:
cout<< "You WON! Congratulations!\n";
break;
case LOST: cout<< "You lost...\n";
break;
}
if(winPosition.is(e.getX(),e.getY()))
{
state = WIN;
}else
{
state = LOST;
}
}
while(state == RUNNING); } // user must press ESCAPE before closing
the cout<< "press ESCAPE to quit\n";
while(_getch() != 27);
return 0;
***************************************************

NETW 203 How does the IP addressing scheme impact the


selection of routing protocols?
FOR MORE CLASSES VISIT
www.tutorialoutlet.com

1. How does the IP addressing scheme impact the selection of routing


protocols? (Please remember to cite all material that you find and use in
your posts. Include at least a URL or Book where you retrieved
information.)

2.In what way is IPv4 the same as IPv6 as far as routing is concerned in
an IP-based network? (Please remember to cite all material that you find
and use in your posts. Include at least a URL or Book where you
retrieved information.)

***************************************************

PIC 10A Introduction to Programming Homework 7


FOR MORE CLASSES VISIT
www.tutorialoutlet.com

Problem 1: (Tic-tac-toe) Write the function implementations for a


program that plays the Tictac-toe game on a 44 board. Player X goes
first, and player O goes second.
The struct
structticTacToeBoard {
intcurr_player ;
int points [4*4];
};
encodes the state of the game. curr_player==1 means its Xs turn to
play. curr_player==-1
means its Os turn to play. points[4*4] contains the moves made so far.
An empty point has
value 0, a point marked X has value 1, and a point marked O has value
-1.
The procedure
void printBoard( ticTacToeBoard board );
prints the board. The definition of printBoard is provided, and it will
clarify the meaning of
ticTacToeBoard.
The procedure
void initBoard( ticTacToeBoard& board );
initializes the board. Since X goes first, initBoard must set
board.curr_player to 1. Since
the board is empty at the beginning of the game, initBoard must set all
values of the array
board.points to 0.
The predicate
boolisEmpty( ticTacToeBoard board , int x , int y );
checks if the point (x,y) is empty and therefore available to play.
The procedure
void mark ( ticTacToeBoard& board , int x , int y ); 1 marks the
point (x,y). For example, if board.curr_player is -1 (so its Os turn to
play) and we
wish to mark (1,1) then board.points[0+4*0] must be assigned to -1.
The predicate
boolboardFull( ticTacToeBoard board );
returns true if the board is full and false otherwise.
The function
int winner ( ticTacToeBoard board );
returns 0 if there is no winner, 1 if X is the winner, and -1 if O is the
winner.
The function
int main ();
shows how we intend to use these functions. In particular it shows that
the points are refered to
with 1-based indexing. So if X marked (2,1) and O marked (3,4), the
board will print to
|
|
|
| |X| |
|||
|||
| |O| |
|
|
| You may not use any library aside from iostream, string, and cassert.
Hint. In writing winner you may find a helper function useful. Helper
functions are functions
intended to aid other functions but not intended to be used by itself. For
example, you could write
a function
boolwinnerHelper( ticTacToeBoard board , int player ) {
...
}
that returns true if player is a winner and false otherwise. Then winner
will merely call
winnerHelper twice. 2
***************************************************

Project 4
1. Specification
FOR MORE CLASSES VISIT
www.tutorialoutlet.com

Project 4
1. Specification
This programming project involves writing a program to manage a
student database. The interface to the program
should be a Swing based GUI that looks similar to the following: A
combo box should allow the user to select one of the four database
actions shown. The database should be
implemented as a HashMap, with the Id field as the key and a Student
record as the value. The selected operation
should be performed when the user clicks the Process Request button. If
the user attempts to insert a key that is
already in the database an error message should be displayed using a
JOptionPane message dialog box. If the user
attempts to delete, find or update a record that is not in the database, a
message should also be displayed in a
JOptionPane. After each successful operation is completed a
JOptionPane window should be displayed confirming
the success. In the case of a successful Find request, a window should
pop up containing the student's Id, name,
major and current GPA. When the user selects the Update request, the
following JOptionPane windows should be
displayed to gather information about a course that has just been
completed. As a result, the Student record in
the database will be updated accordingly. User input values should be
checked and a warning message should be
displayed in a JOptionPane for inappropriate values (such as empty
textfields for Id, name or major). When the main application window is
closed, the student records from the database will be written into the text
file outData.txt, each student data (including his/her GPA) on a separate
line. The last line of the file will contain
the total number of student records in the database and their average
GPA value.
The program should consist of two classes.
1. The first class P4GUI should define the GUI and handle the database
interactions. It should be hand-coded and
not generated by a GUI generator. 1 2. The second class named Student,
should define the student record. The class defines the instance variables
id,
name, major, totalCredits (as total number of credits completed) and
totalQP (as total quality points). The quality
points for a course is calculated as the numeric value of the grade
received in the course (A = 4; B = 3; C = 2; D = 1;
F = 0) times the number of credit hours for that course. The values of
totalCredits and totalQP will be used to
calculate the GPA by dividing totalQP by totalCredits. The class Student
should have the following three methods:
a. A constructor with arguments that is used when new student records
are created It takes Id, name and
major as parameters and will initialize totalCredits and totalQP to zero;
b. A method courseCompleted that should accept the course grade and
credit numbers and will update
the variables used to compute the GPA. It will be called when an Update
request is made.
c. A method overriding toString that returns a labeled string containing
the student id, name, major and
GPA.
Finally, when a student has not yet completed any course, the GPA
should be displayed as 4.0.
Your program should compile without errors.
The Google recommended Java style guide
(https://google.github.io/styleguide/javaguide.html) should be used to
format and document your code. Specifically, the following style guide
attributes should be addressed: Header comments include filename,
author, date and brief purpose of the program. In-line comments used to
describe major functionality of the code. Meaningful variable names and
prompts applied. Class names are written in UpperCamelCase. Variable
names are written in lowerCamelCase. Constant names are in written in
All Capitals. Braces use K&R style. In addition the following
design constraints should be followed: Declare all instance variables
private
Avoid the duplication of code Test cases should be supplied in the form
of a table with columns indicating what aspect is tested, the input
values, expected output, actual output and if the test case passed or
failed. This table should contain 5 columns
with appropriate labels and a row for each test case. Note that the actual
output should be the actual results you
receive when running your program and applying the input for the test
record. Be sure to select enough different
kinds of employees and situations to completely test the program.
2. Submission Requirements
Submit the following to the Project 2 assignment area no later than the
due date listed in your LEO classroom.
1. The source files P4GUI.java and Student.java and the program
generated output file outData.txt. The source
code should use Java code conventions and appropriate code layout
(white space management and indents) and
comments. All submitted files may be included in a .zip file.
2. The solution description document P4SolutionDescription (.pdf or
.doc / .docx) containing the following: 2 (1) Assumptions, main design
decisions, error handling;
(2) Test cases table3) Screen captures showing successful program
compilation and test cases execution. Each screen capture should
be properly labeled, clearly indicated what the screen capture represents.
(4) Lessons learned from the project;
3. Grading Rubric
The following grading rubric will be used to determine your grade:
Attribute
P4GUI class Meets
35 points Does not meet
0 points a) Defines the GUI. a) Does not defines the GUI. b) Provides a
combo box to allow the
user to select one of the four database
actions including insert, update, delete
and find. b) Does not provide a combo box to allow
the user to select one of the four database
actions including insert, update, delete
and find. c) The database is implemented as a
HashMap, with the ID field as the key
and a student record as the value. c) The database is not implemented as
a
HashMap, with the ID field as the key and
a student record as the value. d) The operation is performed when
the user clicks the Process Request
button. d) The operation is not performed when
the user clicks the Process Request
button. e) User input values are checked and
warning message is displayed for
inappropriate values entered in the Id,
name or major textfields. e) User input values are not checked and
warning message is not displayed for
inappropriate values entered in the Id,
name or major textfields. f) If the user attempts to insert a key
that is already in the database an error
message is displayed using a
JOptionPane message dialog box. f) If the user attempts to insert a key
that
is already in the database an error
message is not displayed using a
JOptionPane message dialog box. g) If the user attempts to delete, find
or g) If the user attempts to delete, find or
update a record that is not in the
update a record that is not in the
database, a message is displayed.
database, a message is not displayed.
h) After each successful operation is
completed a JOptionPane is displayed
confirming the success. h) After each successful operation is
completed a JOptionPane is not displayed
confirming the success. i) In the case of a successful Find
request, a window pops-up containing
the student's ID, name, major and
current GPA. i) In the case of a successful Find request,
a window does not pop-up containing the
student's ID, name, major and current
GPA. 3 Student Class j) When the user selects the Update
request, a JOptionPane is displayed to
gather information about a course that
has just been completed including the
grade and number of credits. j) When the user selects the Update
request, a JOptionPane is not be displayed
to gather information about a course that
has just been completed including the
grade and number of credits. k) When the window is closed, the
student records from the database are
written in a file, each student data
(including their GPA) on a separate line. k) When the window is closed,
the student
records from the database are not written
in a file, each student data (including their
GPA) on a separate line. l) The last line of the file contain the
total number of student records in the
database and their average GPA value.
40 points l) The last line of the file does not contain
the total number of student records in the
database and their average GPA value
0 points a) Defines the student record. a) Does not define the student
record. b) Contains instance variables for the
student id, name, major and two
variables that are used to compute the
GPA. b) Does not contains instance variables for
the student id, name, major and two
variables that are used to compute the
GPA. c) Contains a variable representing the
total number of credits completed c) Does not contain a variable
representing the total number of credits
completed d) Contains a variable representing the
total quality points, which are the
numeric value of the grade received in
a course times the number of credit
hours.
e) Contains a constructor that is used
when new student records are created.
It should accept Id, name and major as
parameters and initialize the fields that
are used to compute the GPA to zero.
f) Contains a method courseCompleted
that accepts the course grade and
credit numbers and update the
variables used to compute the GPA.
g) courseComplete is called when an
Update request is made.
h) Contains an overridden toString
method that returns a labeled string
containing the student name, major
and GPA. 4 d) Does not contain a variable
representing the total quality points,
which are the numeric value of the grade
received in a course times the number of
credit hours.
e) Does not contains a constructor that is
used when new student records are
created. It should accept Id, name and
major as parameters and initialize the
fields that are used to compute the GPA to
zero.
f) Does not contains a method
courseCompleted that accepts the course
grade and credit hours and update the
variables used to compute the GPA.
g) courseComplete is not called when an
Update request is made.
h) Does not contains an overridden
toString method that returns a labeled
string containing the student name, major i) Calculates and displays a
GPA of 4.0
for students who have not yet
completed any course. Test Cases 10 points
a) Test cases are supplied in the form
of table with columns indicating test
case objective, the input values,
expected output, actual output and if
the test case passed or failed. and GPA.
i) Does not calculate or display a GPA of
4.0 for students who have not yet
completed any course.
0 points
a) No test cases were provided. b) Enough scenarios selected to
completely test the program. Documentation and Style
guide c) Test cases were included in the
supporting word or PDF
documentation.
10 points
a) Solution description document
P4SolutionDescription includes all the
required sections appropriate titled. 0 points
a) No solution description document is
included.
Source code criteria Source code criteria
b) Header comments include filename,
author, date and brief purpose of the
program.
c) In-line comments used to describe
major functionality of the code.
d) Meaningful variable names and
prompts applied.
e) Class names are written in
UpperCamelCase.
f) Variable names are written in
lowerCamelCase.
g) Constant names are in written in All
Capitals.
h) Braces use K&R style.
i) Declare all instance variables private.
j) Avoids the duplication of code. 5 b) Java style guide was not used to
prepare the Java code.
c) All instance variables not declared
private.
d) Duplication of code was not avoided. 6
***************************************************

SDEV 140 Introduction to Software Development


S06 Flowgorithm Assignment / Chapter 6: Functions
FOR MORE CLASSES VISIT
www.tutorialoutlet.com

INTRODUCTION: Download this document (S06 Flowgorithm


Assignment.docx) from Blackboard, save it on your
computer (in a folder that you can easily locate), and then open it in
Word.
PREREQUISITE: You need to have the Flowgorithm program installed.
Refer to S02 Flowgorithm Assignment if you
have not done this already.
TASKS: This assignment is taken from Programming Exercise 4 on page
265 in Chapter 6 of the textbook. In this
program, you will: Create a Flowgorithm program from a problem
description Ask the user for two numbers Pass the two numbers as
arguments to a function The function takes the arguments, determines
the maximum value, and returns the result The main module displays the
maximum value in a sentance
ASSIGNMENT: Start Flowgorithm, and then do the assignment outlined
in step 1. Save the Flowgorithm file on your
flash drive or PC as S06.fprg. Submit the Flowgorithm file in
Blackboard.
1) Create a Flowgorithm program as follows:
a. Insert a Comment box, and type comment lines for the Author, Date,
and Description.
b. In the Main function, declare two Integer variables (such as firstNum
and secondNum), and prompt the
user to enter values for them. These will be used as arguments to a
function that determines the maximum
value of the two.
c. Add a function (under Programs) named max. Add two Integer
parameters to the function (such as n1
and n2). There should also be an Integer return variable (suggestion:
name it larger).
d. Inside the function, declare the variable larger, use an If statement to
compare the two parameter values,
and assign the greater value to larger.
e. Back in the Main module, use an Output statement to call the function
(with the two arguments
firstNum and secondNum) and display the output in a sentence, for
example:
The greater value is: & max(firstNum, secondNum)
f. Save your file as S06.fprg. g. Run the program. The program should
ask you to enter two numbers. It calls the max function, then
displays a sentence telling you which is the greater value. If there are
any errors, recheck the instructions
and correct them, then resave the file. A sample screen shot of the max
function is shown below.
2) Submit the Flowgorithm file S06.fprg by clicking on the
View/Complete Assignment link in Blackboard, and
attaching the file.
DEBUGGING THE PROGRAM: One of the greatest skills a
programmer can develop is debugging, which means
locating and fixing errors in a program. Email your instructor and ASK
QUESTIONS if you are having trouble. Please
attach your Flowgorithm file (S06.fprg) to your email. CHECKLIST
FOR SUBMITTING THE ASSIGNMENT: You have tested the
Flowgorithm program (S06.fprg) and it works correctly Then, Attach the
Flowgorithm file (S06.fprg) and Submit it through Blackboard
SAMPLE SCREEN SHOT:
***************************************************

Write a program that reads the subtotal


FOR MORE CLASSES VISIT
www.tutorialoutlet.com

Write a program that reads the subtotal and the gratuity rate and
computes the gratuity and total. For example, if the user enters 10 for the
subtotal and 15% for the gratuity rate, the program displays 1.5 as the
gratuity and 11.5 as the total. subtotal,
rate = eval(input("Enter subtotal and gratuity rate: "))
gratuity = subtotal * rate / 100
total = subtotal + gratuity
print("The gratuity is", int(gratuity * 100) / 100,
"and total is", int(total * 100) / 100)
***************************************************

You are a law enforcement agent


FOR MORE CLASSES VISIT
www.tutorialoutlet.com

You are a law enforcement agent and you are told to investigate a group
that is believed to be connected with other organized crime groups,
including Colombian organized crime groups, Mexican organized crime
groups, and the Russian mafia.

This group that you are investigating is led by a man whose real name is
unknown but goes by the alias Beast. Beast is believed to be importing
drugs into the United States with the help of the Colombian, Mexican,
and Russian organized crime groups. Beast is also believed to be the
owner of a chain of restaurants and stores. These businesses are believed
to help Beast in laundering money. The structure of the group is still
uncertain, and it is your job to investigate the group before any arrests
can be made. Beast is very private, but he is highly connected with some
government officials. The identity of those in the government and law
enforcement that are helping Beast and his group is also unknown. Beast
is believed to be highly dangerous, as he has a small army constantly
protecting him that will kill in an instant. It is important to take Beast off
the street as soon as possible. You must write an investigative report
addressing the following:

1. Define what constitutes organized crime and provide the elements


that are usually associated with the same.
2. Explain the investigative strategies that should be used in order to
investigate this particular group and why.

3. Explain how what we know about the Colombian, Mexican, and


Russian organized crime groups can help in this investigation.

4. Describe the historical connection between organized crime groups


and legitimate businesses.

5. Explain how money laundering usually takes place and how an


organized crime leader like Beast generally goes about it. Include
in your explanation the connection between money laundering and
foreign banks, and money laundering and the legitimate businesses
that these crime leaders own.

6. Describe the particular laws that will likely apply to this


investigation including statutes on money laundering, drug
trafficking, and corruption.

7. Provide some case law that help the agency identify how these
laws will be applied to these particular set of circumstances.

8. Summarize what you think the outcome of this investigation will


be and whether you think you will be able to capture Beast and his
organized crime group based on history. Explain why or why not.

CCIT 4212 Assignment 8


FOR MORE CLASSES VISIT
www.tutorialoutlet.com

Assignment
1. For items in InvoiceLineItems table whose AccountNo is an even
number like
150 or 574, use a CASE function to display their AccountNo,
InvoiceLineItemDescription, and DescriptionLength. Depending on the
total
number of characters of the InvoiceLineItemDescription, each
DescriptionLength
shows one of the following three strings:
'Shorter than 10 characters', or
'Between 10 and 19 characters', or
'20 or more characters'
Also sort your output by AccountNo.
Hint: Use one of the operators listed on p.97 to determine if a number is
an
even
or odd number.
Here is a sample output of first few lines:
AccountNo
--------150
characters
160
characters
160
characters
160
170
characters
400
......
...
*/ InvoiceLineItemDescription
-------------------------Supplies DescriptionLength
----------------------------Shorter than 10 MVS Online Library Between 10
and 19 MSDN Shorter than 10 Quarterly Maintenance
Network wiring
Between
CICS Desk Reference Between 20 or more characters
10 and 19
10 and 19 characters
2. Display InvoiceLineItemDescription such that the one with the
longest first word is printed at top and no duplicate rows.
To verify your output, display the length of the first word of
InvoiceLineItemDescription in the second column as FirstWordLength.
Hint: use string functions discussed in lecture.
Here is a sample output of first few lines:
InvoiceLineItemDescriptionFirstWordLength
-------------------------- -----------------Propane-forklift
16
International pkg.
13
International shipment
13
Publishers Marketing
10
DiCicco's
9
Quarterly Maintenance
9
Telephone (Line 1)
3. The manager wants to have a report of detail information of all
invoice line
items
with the desired column title shown below. She wants the items to be
listed
based on
the AccountNo (a->z) and item with the highest amount within each
account is
printed
first (see sample output below). In case of same amount value, items
should
be printed
by their InvoiceID in ascending order.
Finally, all items should be continuously and uniquely ranked from 1
within
each account. No
Item Amount
Invoice ID
Item Description
Invoice
Sequence 570 2
Max 3
1
Card deck
2
Catalog ad
3 570
3 2 570
572
572
572 1
1
1 75.60 12 Kinko's 58.40 12 Office 41.80 74 Coffee 2433.00 56 1575.00
47 600.00 95 Books for research
4
572
Catalog ad
5
572
access fee 1
6
572
access fee 1
1
574
Property Taxes
1
580
1
1
582
lease
1
1
589
site design
1
.....
...
*/ 1
1 579.42 98 9.95 16 Monthly 9.95 23 Monthly 856.92
1 ---------------END--------------- 50.00 15
12 DiCicco's 503.20 105 7125.34 31 Bronco
Web

***************************************************

CCIT 4212 Query 1


FOR MORE CLASSES VISIT
www.tutorialoutlet.com

Query 1
Write a SELECT-INTO statement to create Products_ch07 table as a
duplicate of
Products table of ClearWater database.
Then, write a DELETE statement to delete products from Products_ch07
if their
unit price is above the average of those in category 1 ~ 5 in Products
table.
Your output must also display all columns of products that are deleted.
Query 2
After Query 1 is completed, write an INSERT statement to insert
products
into Products_ch07 if they exist in the ClearWater.dbo.Products but not
Products_ch07. Your output should display all columns of products that
are inserted.
Query 3
After Query 1 is completed, write an UPDATE statement with a
subquery
to increase product unit price by 10% in Products_ch07 if their supplier
is in Japan or Germany. Be sure your output display the following four
columns of products that are updated: ProductID,
UnitPriceBeforeUpdate,
UnitPriceAfterUpdate, UpdatedAmount.
Query 4
After Query 3 is done, write a statement to drop Products_ch07 from
your database and write a SELECT-INTO statement to re-create it as a
duplicate of Products table of ClearWater database.
Then, re-write the UPDATE statement you did in Query 3 to perform
exactly the same update and same output as in Query 3 but without
using any subquery.
***************************************************

CIS 126 Final Project Countrywide Tours conducts


FOR MORE CLASSES VISIT
www.tutorialoutlet.com

CIS126 Final Project Countrywide Tours conducts sightseeing trips for


groups. Create an application that
continuously accepts tour data that includes, a three-digit tour number,
numeric month, day
and year values representing the tour start date, number of travelers
taking the tour; and a
numeric code that represents the destination.
As data is entered for each tour, verify that the month, day, year and
destination code are valid;
if any of these is not valid, continue to prompt the user until valid data is
entered. The valid
destination codes are shown in the table below.
The application must output each tour number, validated start date,
destination code and
name, number of travelers, gross total price for the tour, and price of the
tour after the
discount. The discount is applied to each persons price based on the
group size. Code Destination Price per Person
($) 1
2
3
4 Chicago
Boston
Miami
San Francisco 300.0
480.0
1050.0
1300.0 Number of
Tourists Discount per
Tourist (S) 1-5
6-12
13-20
21-50
51 and over 0
75
125
200
300
***************************************************

CIS 230 Which of the following should you use to program web
server controls?
FOR MORE CLASSES VISIT
www.tutorialoutlet.com

QUESTION 1
Which of the following should you use to program web server controls?

3 What property of the calendar control is used to capture the data that
the user clicked?

4Which ASP.NET object is used to store data that last as long as the
ASP.NET application is alive?

5 ASP.NET includes the C# code?

6How do you manage states in ASP.NET application?

7What is the correct extension for a web form page?

8Which is the best way to verify that your application is performing


properly or to track downlogic errors?

9Which of the following Web server controls allow the user to choose
from mutually exclusive options?
10 You want to make a configuration setting change that will affect only
the current Web
application; Which file will you change?

11 What is the name of the event handler that activates when the page is
visited?

12 Which of the following Web server controls is probably used most


often than other controls for
both input and output?

13Which of the following controls display an image that responds to


mouse clicks?

14Which property is used to uniquely identify the web controls?

15You configure the session state using?

16Application events are defined in?

17Which object allows you to send HTTP response data to a client and
contains information aboutthat response?

18Which Validation control is the best choice to ensure that zip code
values entered in a form are
all numeric?

19Which of the following controls let the user pick a combination of


options?

20What is the name of the Web page property that you can query to
determine that a Web page is
being requested without data being submitted?

21In which exception handling block do you write the code that may
generate exceptions?
22What method is used to remove all the items in a Drop-down List
control?

23Assume that you want to redirect the user to page3.aspx page and also
hide the page name and
other information; Which will be the correct syntax to use?

24You noticed that clicking a CheckBox does not cause a PostBack; you
need the CheckBox to
PostBack so you can update the Web page based on server-side code;
How do you make the
CheckBox cause a PostBack?

25Which of the following Page methods is used to handle errors


programmatically?

26Which of the following Web controls is most appropriate to create a


link to another Web page?

27What attribute must be set on a validator control for the validation to


work?

28Where is the banner ad information stored?

29The default event for the ListBox web control is?

30Every new web form in ASP.NET derives from?

31Which of the following controls allow you to create dynamic pages


that provide more than one
possible view
***************************************************

CIS 235 HTML document webpage for CIS 235 with my name,
id, course number and a paragraph of what I want to get out of
the class
FOR MORE CLASSES VISIT
www.tutorialoutlet.com

HTML document webpage for CIS 235 with my name, id, course
number and a paragraph of what I want to get out of the class
***************************************************

CIS 255 Assignment 2: Composing and Using Regular


Expressions
FOR MORE CLASSES VISIT
www.tutorialoutlet.com

Regular expressions became popular with the introduction of the UNIX


operating system in 1960s and its text processing tools such
as grep and ed.

Write a two to three (2-3) page paper in which you:

1. Define regular expressions and explain their purpose.


2. Provide at least three (3) examples which demonstrate the way
regular expressions work.

3. Examine the shortcomings of regular expressions and describe at


least two (2) situations where using them might be inappropriate.

4. Use at least three (3) quality resources in this assignment. Note:


Wikipedia and similar Websites do not qualify as quality resources.
5. Format your assignment according to the following formatting
requirements:

1. Typed, double spaced, using Times New Roman font (size


12), with one-inch margins on all sides.

2. Include a cover page containing the title of the assignment,


the students name, the professors name, the course title, and
the date. The cover page is not included in the required page
length.

3. Include a reference page. Citations and references must


follow APA format. The reference page is not included in the
required page length.

The specific course learning outcomes associated with this assignment


are:

Identify and create simple regular expressions.


Use technology and information resources to research issues in
operating systems.

Write clearly and concisely about UNIX / Linux topics using


proper writing mechanics and technical style conventions.

***************************************************

CIS 355 AWeek 1 LabDeveloping an OOP Console


Application
FOR MORE CLASSES VISIT
www.tutorialoutlet.com
OBJECTIVES

Create a class in java with appropriate methods.

Process user input with the class using the scanner for keyboard input
and console output.

PROBLEM: Health Profile Console Program

GymsRUs has a need to provide fitness/health information to their


clients, including BMI and maximum heart rate. Your task is to write a
console program to do this.

Body mass index (BMI) is a measure of body fat based on a persons


height and weight. BMI can be used to indicate if you are overweight,
obese, underweight, or normal. The formula to calculate BMI is

The following BMI categories are based on this calculation.

Category BMI Range

Underweight less than 18.5

Normal between 18.5 and 24.9

Overweight between 25 and 29.9

Obese 30 or more

Max heart rate is calculated as 200 minus a persons age.

FUNCTIONAL REQUIREMENTS

Design and code a class called HealthProfile to store information about


clients and their fitness data. The attributes (name, age, weight, and
height) are private instance variables. The class must include the
following methods.
method description

setNam
Receives a value to assign to private instance variable
e

setAge Receives a value to assign to private instance variable

setWeig
Receives a value to assign to private instance variable
ht

setHeig Receives TWO inputs (height in feet, inches). Converts and stores the total
ht INCHES in private instance variable

getNam
Returns private instance variable
e

getAge Returns private instance variable

getWei
Returns private instance variable
ght

getHeig
Returns private instance variable (inches)
ht

getBMI Calculates and returns BMI


getCate
Returns category based on BMI
gory

getMax
Calculates and returns maximum heart rate
HR

Create a SEPARATE TEST CLASS, Lab1Main, to prompt for user input


and display output using the HealthProfile class. Process multiple inputs
using a loop. You can assume all user input is valid.

SAMPLE OUTPUT

Enter name or X to quit: John Smith

Your age: 35

Your weight: 200

Your height - feet: 6

Your height - inches: 0

Health Profile for John Smith

BMI: 27.1

BMI Category: overweight

Max heart rate: 185

Enter name or X to quit: Ann Jones

Your age: 50

Your weight: 120


Your height - feet: 5

Your height - inches: 2

Health Profile for Ann Jones

BMI: 21.9

BMI Category: normal

Max heart rate: 170

Enter name or X to quit: X

GRADING RUBRIC

HealthProfile class
30
All methods created with proper functionality

Lab1Main class

Receives user input using Scanner


Process input using a HealthProfile object

Correct output displayed in console 10

BMI displayed with 1 decimal place

Loop to process multiple clients

Code style 5
Lab Report 10

TOTAL 55

CODE STYLE REQUIREMENTS

Include meaningful comments throughout your code.

Use meaningful names for variables.

Code must be properly indented.

Include a comment header at beginning of each file, example below.

/****************************************************
Program Name: ProgramName.java
Programmer's Name: Student Name
Program Description: Describe here what this program will do
**********************************************************
*/

DELIVERABLES

Submit as a SINGLE zip folder

All java files


Lab report

Follow assignment specification regarding class/method names.

Note that your java filename must match class name (DO NOT rename).

***************************************************
CIS 2010 The Digital Advantage
What does digital mean
FOR MORE CLASSES VISIT
www.tutorialoutlet.com

CIS 2010
The Digital Advantage
What does digital mean (including
numbers, text, music, images, etc.)
Bits vs bytesuse in representing,
storing and transmitting data
What are advantages of digital.
Impact of Moores Law on technol.
General systems model
What is productivity and why is it
important in any organization?
Data vs. information vs. knowledge Key Topics
Exam 1
Note: This guide identifies important
concepts discussed in the course. It is
not intended as a list of terms but
rather as a guide to major areas of CIS
2010 discussion. Generations in the workplace
Job security; critical/nonroutine thinking
Role of IS and IT in a flat world.
Role of information Systems In Organizations
Operational role & impact measures
Importance of transaction processing systems
Every business transaction does what?
Productivity; Cost of transactions
Strategic role of information systems
What is strategy? What is corporate strategy
and how does it relate to business strategy?
When is something strategic?
Strategic Thinking and Strategic Analysis
Business modelspurpose & components
What characteristics of a firm, its products, and its
future have greatest impact on its valuation by
potential investors?
Commodity products & services
Value chain role/usage in strategic analysis
Industry structure and the five forces model for
analysis of an industry and its attractiveness
Competitive strategy generic strategies for
competitive advantage; competitive scope
Switching costs. Entry barriers Exit barriers
How do business strategy and business models
relate to and differ from one another?
The Data World: Data-Driven Business
Relational database principles
Database vs. file vs. record
Single source of truth / facts
Information Siloesproblems caused
Objectives of managing data / of database
management;
Importance to business and management of
having each objective met?
Meaning and importance of data independence.
How is data independence achieved?
Relation between database management system
(DBMS) and an info system. If a firm has a welldesigned IS application,
does it need a DBMS? Why should managers/users
be concerned about data
describing persons, places,
things, or events: entities
and entity relationships
when using (or are involved
in development of) company
databases? If a firm uses databases, why are data warehouses
and data mining sometimes needed and beneficial?
Big data; (predictive) analytics
Knowledge management: explicit vs. tacit knowledge
(read in text)
Information Systems Applications (Apps)
Fundamental business barriers information
systems & technology helps the firm overcome
Enterprise wide vs. functional info systems
Principal types of enterprise level information
systems/apps (as discussed in reading):
ERP, CRM, Supply chain management sys
Data Communication, Networking, & Mobility
Net neutrality: the principal and its purpose
Network types: LAN, WAN, backbone
Internet vs. intranet vs. extranet vs. portals
Physical vs. wireless communication channels
Internet protocol (IP) and why it is important
Packet switched networks What is a packet? Whyshould consumers
care?
Benefits provided by 3G & 4G technologies in
cellular communications/cellular networks
Connecting networks for business & commerce
Internet service providers; cable vs. DSL
How is Wi-Fi enabled/possible in a home/apartment?
Near-field communication; bluetooth; infrared
Client / server computing
Distinction between business & consumer network
types (e.g.,broadband, mobile, etc.). Benefits of each.
Convergence in business & consumer networks
What does network convergence mean? What is
converging? Why is this occurring? What is its
significance to business and individual users?
Growth of devices connected to Internet
The chapter on ethics, assigned for background reading,
is not included in this exam. Similarly, the tech. guides on
hardware, software, and intelligent systems were
assigned for background purposes and are not the focus
of direct exam questions. Note: The topics included here should serve as
a guide to exam preparation. The list may not be exhaustive. Other
topics may be included in the exam.
***************************************************

CMIS 141 Year Population Violent crime Violent crime rate


Murder and nonnegligent manslaughter
FOR MORE CLASSES VISIT
www.tutorialoutlet.com

qattachments_f79633f78a7aa4972583320c6ba436f4b11451bc
Year Population Violent crime Violent crime rate Murder and
nonnegligent manslaughter
1994 260327021
1857670
713.6
23326
1995 262803276
1798792
684.5
21606
1996 265228572
1688540
636.6
19645
1997 267783607
1636096
611
18208
1998 270248003
1533887
567.6
16974
1999 272690813
1426044
523
15522
2000 281421906
1425486
506.5
15586
2001 285317559
1439480
504.5
16037
2002 287973924
1423677
494.4
16229
2003 290788976
1383676
475.8
16528
2004 293656842
1360088
463.2
16148
2005 296507061
1390745
469
16740
2006 299398484
1435123
479.3
17309
2007 301621157
1422970
471.8
17128
2008 304059724
1394461
458.6
16465
2009 307006550
1325896
431.9
15399
2010 309330219
1251248
404.5
14722
2011 311587816
1206005
387.1
14661
2012 313873685
1217057
387.8
14856
2013 316128839
1163146
367.9
14196 Page 1
qattachments_f79633f78a7aa4972583320c6ba436f4b11451bc
Murder and nonnegligent manslaughter rate Rape
Rape rate Robbery Robbery rate
9 102216
39.3 618949
237.8
8.2 97470
37.1 580509
220.9
7.4 96252
36.3 535594
201.9
6.8 96153
35.9 498534
186.2
6.3 93144
34.5 447186
165.5
5.7 89411
32.8 409371
150.1
5.5 90178
32 408016
145
5.6 90863
31.8 423557
148.5
5.6 95235
33.1 420806
146.1
5.7 93883
32.3 414235
142.5
5.5 95089
32.4 401470
136.7
5.6 94347
31.8 417438
140.8
5.8 94472
31.6 449246
150
5.7 92160
30.6 447324
148.3
5.4 90750
29.8 443563
145.9
5 89241
29.1 408742
133.1
4.8 85593
27.7 369089
119.3
4.7 84175
27 354746
113.9
4.7 85141
27.1 355051
113.1
4.5 79770
25.2 345031
109.1 Page 2
qattachments_f79633f78a7aa4972583320c6ba436f4b11451bc
Aggravated assault Aggravated assault rate Property crime Property
crime rate Burglary
1113179
427.6
12131873
4660.2 2712774
1099207
418.3
12063935
4590.5 2593784
1037049
391
11805323
4451 2506400
1023201
382.1
11558475
4316.3 2460526
976583
361.4
10951827
4052.5 2332735
911740
334.3
10208334
3743.6 2100739
911706
324
10182584
3618.3 2050992
909023
318.6
10437189
3658.1 2116531
891407
309.5
10455277
3630.6 2151252
859030
295.4
10442862
3591.2 2154834
847381
288.6
10319386
3514.1 2144446
862220
290.8
10174754
3431.5 2155448
874096
292
10019601
3346.6 2194993
866358
287.2
9882212
3276.4 2190198
843683
277.5
9774152
3214.6 2228887
812514
264.7
9337060
3041.3 2203313
781844
252.8
9112625
2945.9 2168459
752423
241.5
9052743
2905.4 2185140
762009
242.8
9001992
2868 2109932
724149
229.1
8632512
2730.7 1928465 Page 3
qattachments_f79633f78a7aa4972583320c6ba436f4b11451bc
Burglary rate Larceny-theft Larceny-theft rate Motor vehicle theft Motor
vehicle theft rate
1042.1
7879812
3026.9
1539287
591.3
987
7997710
3043.2
1472441
560.3
945
7904685
2980.3
1394238
525.7
918.8
7743760
2891.8
1354189
505.7
863.2
7376311
2729.5
1242781
459.9
770.4
6955520
2550.7
1152075
422.5
728.8
6971590
2477.3
1160002
412.2
741.8
7092267
2485.7
1228391
430.5
747
7057379
2450.7
1246646
432.9
741
7026802
2416.5
1261226
433.7
730.3
6937089
2362.3
1237851
421.5
726.9
6783447
2287.8
1235859
416.8
733.1
6626363
2213.2
1198245
400.2
726.1
6591542
2185.4
1100472
364.9
733
6586206
2166.1
959059
315.4
717.7
6338095
2064.5
795652
259.2
701
6204601
2005.8
739565
239.1
701.3
6151095
1974.1
716508
230
672.2
6168874
1965.4
723186
230.4
610
6004453
1899.4
699594
221.3
***************************************************

CMST 3CI153-5-1 Digital - Submission Folder Project 3:


Research Paper
FOR MORE CLASSES VISIT
www.tutorialoutlet.com

nstructions Today, digital media is found throughout all business and


personal activities making it necessaryto have a high Levelof
understanding of both the sol
well as the methods in which the information is consumed. The
responsible utilization of digital media requires individuals. to have an
awareness oft
ethical, and Legal contexts in which the digital media is consumed.
Students are required to select a topic related to global, social, ethical, or
Legal issues with digital media. You will perform in-depth research and
provi
of how an issue associated with your selected topic relates to the
consumption of digital media. 1. Formatting Requirements
0 Project must follow APA style
Double-spaced 1 inch margins
12 point professional font
Headers including project name, class, and page numbers
File name rst initial, last name and project {ex.JDoe_paperj
Use of tables, graphs, images, etc. of appropriate size that are relevant to
the information being conveyed is highly encouraged.
2. Content Requirements
a Minimum of 2500 words, maximum 5000 words [excluding cover and
bibliographical pages]
o Title Page including your name,instructor name, course name and
number, and pa per title
a Research Paper Requirements
1. Outline
2. Introduction
3. Body
- Research
- Findings
- Context
4. Conclusion
a Bibliography with minimum of 5 professional {scholarly sources.WiI-
tipedia is not acceptable. DODDD
***************************************************

COMP 230 What are the terms of the general public license
FOR MORE CLASSES VISIT
www.tutorialoutlet.com

What are the terms of the general public license? How does this license
affect the use of Linux and other open source software in a business
organization?
***************************************************

COSC 1337
FOR MORE CLASSES VISIT
www.tutorialoutlet.com
Programming Fundamentals III Java Data Structures
Glen Grimes
Lab3 A Bag Implementation That Links Data COSC 2436 NAME
Problem:
Complete Programming Exercise 5, page 126. Requirements: You will
develop the following:
a. Develop the class LinkedSet which implements the SetInterface of
Chapter 1. Use the LinkedBag.java
file in your implementation b. Develop a test class which will exercise
and test the LinkedSet class. In the test application, create a list
of 10 or 12 elements. Remove several elements. Print the list before and
after the removal to
demonstrate the proper functioning of your methods. Submission:
a. A copy of the source code and related project files will be placed in a
directory on the I: drive as per the
following directions: A directory structure has been provided for
depositing completed lab work to which the students will
have access.
I:\ggrimes\COSC2436-Fall2016\S70-Dropbox\ Lab3\ The naming
conventions within the directory will be:
<Lab-number><YourLastName>, i.e.
1Smith,
so that the resultant structure will be:
I:\ggrimes\COSC2436-Fall2016\S70-Dropbox\Lab3\1Smith, or
I:\ggrimes\COSC2436-Fall2016\S70-Dropbox\ Lab3\9Smith,
as appropriate. Your directory must have a workspace/project folder
containing all the workspace files, any header,
and cpp files you've written, along with the executable file you
generated.
***************************************************
CPT 101 Chapter 8 Write a SELECT statement that returns these
columns from the Products table
FOR MORE CLASSES VISIT
www.tutorialoutlet.com

Chapter 8 Write a SELECT statement that returns these columns from


the Products table: The list_price column
a) A column that uses the FORMAT function to return the list_price
column with 1 digit to the right of the
decimal point
b) A column that uses the CONVERT function to return the list_price
column as an integer
c) A column that uses the CAST function to return the list_price column
as an integer 2. Write a SELECT statement that returns these columns
from the Products table: The date_added
column
a) A column that uses the CAST function to return the date_added
column with its date only (year,
month, and day)
b) A column that uses the CAST function to return the date_added
column with just the year and the
month
c) A column that uses the CAST function to return the date_added
column with its full time only (hour,
minutes, and seconds) Chapter 9
1. Write a SELECT statement that returns these columns from the
Products table: the list_price column
and the discount_percent column
a. A column named discount_amount that uses the previous two columns
to calculate the discount
amount and uses the ROUND function to round the result so it has 2
decimal digits 2. Write a SELECT statement that returns these columns
from the Orders table: The order_date column
a. A column that uses the DATE_FORMAT function to return the four-
digit year thats stored in the
order_date column
b. A column that uses the DATE_FORMAT function to return the
order_date column in this format: MonDD-YYYY. In other words, use
abbreviated months and separate each date component with dashes.
c. A column that uses the DATE_FORMAT function to return the
order_date column with only the hours
and minutes on a 12-hour clock with an am/pm indicator
d. A column that uses the DATE_FORMAT function to return the
order_date column in this format:
MM/DD/YY HH:MM. In other words, use two-digit months, days, and
years and separate them by slashes. Use 2-digit hours and minutes on a
24-hour clock. And use leading zeros for all date/time
components. 3. Write a SELECT statement that returns these columns
from the Orders table
a. The card_number column
b. The length of the card_number column
c. The last four digits of the card_number column d. Extra Credit - When
you get that working right, add the columns that follow to the result set.
This is
more difficult because these columns require the use of functions within
functions. A column that displays the last four digits of the card_number
column in this format: XXXX-XXXX-XXXX1234. In other words, use
Xs for the first 12 digits of the card number and actual numbers for the
last
four digits of the number.
***************************************************

CS 161 Assignment 5 D Arrays and C-Strings


FOR MORE CLASSES VISIT
www.tutorialoutlet.com
Problem Statement: Go Bowling
You have just been tasked with writing the software for your local
bowling alley. You must
simulate bowling with random numbers and make sure your software
can keep score for
different players in a game.
If you are not familiar with bowling, then you can read these instructions
on how to play the
game and keep score:
http://bowling.about.com/od/rulesofthegame/a/bowlingscoring.htm
Our game can have 1-5 players, and it allows users to play again with a
different number of
players at the end of a game. The game begins by asking for the number
of players and
prompting each player for their name (storing it in a C-style
string/character array, not a C++
string/object!). Then, the players can begin to bowl.
There are 10 total frames in a game, and for each frame, a player is
given up to 2 bowls
(chances) to knock down 10 total pins, except in the last frame when a
player might get a 3rd
chance/bowl. With the first bowl of any frame, a player can knock down
0-10 pins, and with the
second bowl, a player can knock down 0 to those left remaining from the
first bowl. If the player
knocks down all 10 pins in their first bowl of a frame, then that is called
a strike (denoted with
an X), and the player doesnt get a second bowl/chance to knock down
any remaining pins. If a
player knocks down 0 pins, this is called a gutter ball and denoted with a
dash, -, and if a player
knocks down all 10 pins in a frame using two bowls, then it is called a
spare (denoted with a
forward slash, /). For each player, you must keep an array of pins
knocked down with each
bowl for each frame, and display this information after each bowl.
The score for a frame is determined by the total number of pins knocked
down, but if the player
makes a strike or spare, then the scoring is based on subsequent bowls.
For a strike, the player
receives a 10 plus the number of pins knocked down with the next two
bowls. This can give a
player 10-30 points for a frame with a strike! For a spare, the player
receives a 10 plus the number
of pins knocked down with the next bowl. This can give a player 10-20
points for a frame with a
spare! Since a player might strike or spare in the 10th frame, then there
is a 3rd bowl provided for
a strike thrown with the first bowl or a spare thrown with both bowls of
the 10th frame. For each
player, you must keep an array with a sum of current and prior frame
scores that is displayed with
each frame.
A players total score is the sum of all 10 frame scores. You must keep
an array of total scores
for all players that is updated and displayed after each bowl or frame.
The player who has the
most points at the end of 10 frames is the winner!
A few game specifics: The game scoresheet consists of player names
with frame and total information. The frame
information consists of the number of pins knocked down with each
bowl in each
frame and the sum of current and prior frame scores for each frame.
After each bowl, you must print the scoresheet for the users displaying
information about the
number of pins knocked down and possibly updated total score. After
each frame that isnt a strike or spare, you must print the scoresheet for
the users
displaying information with total frame scores and a total score, if they
can be calculated at
that time. There are 10 total frame scores and possibly 21 bowls for each
player. Bowling:
o A player gets two bowls/chances to knock down 10 pins in each of the
10 frames. o If all 0 pins are knocked down with a bowl, then you denote
the gutter ball with a
dash, -.
o If all 10 pins are knocked down with the first bowl in a frame, then
you denote the
strike with an X.
o If all remaining pins are knocked down with the second bowl, then you
denote the
spare with a forward slash, /.
o If a strike or spare is received in the 10th frame, then the player is
given a 3rd
bowl/chance.
Scoring:
o A frame score without a strike or spare is the total pins knocked down
with two bowls
in the current frame.
o A frame score with a strike is 10 plus the number of pins knocked
down with the next
two bowls.
o A frame score with a spare is 10 plus the number of pins knocked
down with the next
bowl. Program Requirements: Only use C-style strings, character arrays!
Your program must handle all errors, such as not entering the correct
input for number of
players or option for bowling. Each function, including main, may not
have more than 15 lines of code (this doesnt include
curly braces, variable declarations, comments, and blank spaces!). You
are not allowed to use global variables.
Example Frame: How many players (1-5)? 2
Enter Player 1s name: Jennifer
Enter Player 2s name: Austin
Player 1, press enter to bowl.
Awe, you got a gutter ball, 0 pins.
Name
| 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 |Total
----------------------------------------------------------------------------Jennifer
||
|
|
|
|
|
|
|
|
|0
|
|
|
|
|
|
|
|
|
|
|
----------------------------------------------------------------------------Austin
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| Player 1, press enter to bowl.
You knocked down 7 pins.
Name
| 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 |Total
----------------------------------------------------------------------------Jennifer
|-7|
|
|
|
|
|
|
|
|
|7
|
7|
|
|
|
|
|
|
|
|
|
----------------------------------------------------------------------------Austin
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| Player 2, press enter to bowl.
You knocked down 5 pins.
Name
| 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 |Total
----------------------------------------------------------------------------Jennifer
|-7|
|
|
|
|
|
|
|
|
|7
|
7|
|
|
|
|
|
|
|
|
|
----------------------------------------------------------------------------- Austin |
5
||
||
||
||
||
||
||
||
||
||5
| Player 2, press enter to bowl.
You knocked down 4 pins.
Name
| 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 |Total
----------------------------------------------------------------------------Jennifer
|-7|
|
|
|
|
|
|
|
|
|7
|
7|
|
|
|
|
|
|
|
|
|
----------------------------------------------------------------------------Austin
|54|
|
|
|
|
|
|
|
|
|9
|
9|
|
|
|
|
|
|
|
|
| (10 pts) Extra Credit Dynamic Arrays
You can support N players, not just 1-5, using dynamic arrays allocated
on the heap!!! Variable
length arrays are not dynamically allocated on the heap, and therefore,
you will not be given
credit for these, i.e. intarray[num_players]; In addition, you must not
have an memory leaks to
get the full 10 points. Make sure you use valgrind! (-10 pts) Automatic
Deduction: You are not allowed to use global variables in any
assignment
in CS 161. There isnt any practical purpose for them in this course.
Keep this in mind as you
design your program with functions. Also, you must use C-style strings,
not C++ strings!!!
(10 pts) Program Style/Comments
In your implementation, make sure that you include a program header in
your program, in
addition to proper indentation/spacing and other comments! Below is an
example header to
include. Make sure you review the style guidelines for this class, and
begin trying to follow
them, i.e. dont align everything on the left or put everything on one
line!
http://classes.engr.oregonstate.edu/eecs/winter2017/cs161-
001/161_style_guideline.pdf
You are graded on having a header, function headers with pre/post
conditions, proper
comments, and readable code with indentation and vertical spacing that
is CONSISTENT
throughout your program. DO NOT align your entire program on the left
side. This will cause
you to automatically lose the full 10 points. In addition, do not forget
your program header!!!
Electronically submit your C++ program (.cpp file, not your
executable!!!) by the assignment due
date, using TEACH.
***************************************************

CS 321 Create a folder named CS 321_LastName, to put all of


your folders and files
FOR MORE CLASSES VISIT
www.tutorialoutlet.com

Step 1. Create your web site structure


Being organized will be important for your web site to be successful. For
each week you
will need multiple web pages. Create the folders and files. Create the
folders
1.
2. 3.
4. 5. No other folder structure is allowed.
Create a folder named CS321_LastName, to put all of your folders and
files.
Inside create the subfolders. All folders and file names should be in
lower case and
never any spaces!
Create a pages folder to store all your html pages.
Create the other folders. Images belong in an images folder, javascripts
in a js
folder, style sheets in a css folder, fonts in a fonts folder.
Create an additional folder called homework to store your solution files.
Create your placeholder web pages.
1. 2.
3. 4. Create a web page called home.html. You may use Notepad, Visual
Studio or
any other basic text editor or web editor
For each week, create 2 web pages.
Each web page will be numbers using the following pattern: week1-
1.html,
week1-2.html, week2-1.html, and so on. If a third page is used it will be
announced in the homework for that week.
Save your web pages in the pages folder. Step 2. Create your content
1. Modify the week1-1.html web page. This page displays information
about your
product and company. This year, one of the items you are selling at your
web site:
pens. 2. Write up a short description about your product. 3. Create a
hyperlink to the week1-2.html page (refer to listing 3-6) 4. Insert a
hyperlink to an external web site about your product. Step 3. Create your
form
1.
2. 3. Modify the week1-2.html web page.
This page allows the user to order the item. For now you will be creating
just a
basic form.
Create a link back to the week1-1.html page. 4. Create the form using
the html input elements. Refer to listing 3-25 for example
of inserting a form and input element. Create 3 textboxes using the input
tag to collect the users name, location and
number of items that they want to order. (customerName, deliveryDate,
numberItems) If you deviate from the naming conventions they need to
be
descriptive. Make sure to create a submit button using the input tag input
tag (with type
set to submit as shown in listing 3-25) or button (refer to listing 3-20)
Make sure to include the form tags (as refer to listing 3-25) Problem 2
You are asked to show how you could process the form using basic
JavaScript, and to
improve the appearance of the form with CSS. For now, you have just
the introductory
content to get you started with CSS and JavaScript. We dont expect
advanced
programming at this stage. However, you will become familiar with the
basic process of
how to insert css rules and scripts in the page. Learning Outcomes:
Demonstrate creativity and problem-solving skills. Create web pages
and web programs that use: HTML5, cascading style sheets,
dynamic HTML, JavaScript, forms with controls, and Canvas. Evaluate
web pages and web programs to ensure that they use proper coding
conventions and documentation. Being organized will be important for
your web site to be successful. This activity wil be
basic, in that you will just retrieve values and send the values back to the
web page. Step 4. Create a program to process your form with
JavaScript
Create an embedded JavaScript program.
Retrieve the form values, performs a calculation and displays the results
to the user
1.
2. 3. Modify the week1-2.html web page to process the form.
Modify the submit button so that when you click on the button it calls
the
JavaScript program.
Modify the button tag to call the function and not submit the form.
onclick="calculateTotal(); return false;" 4. In the book they
inserted the onclick attribute inside the input/button tag.
((Review listing 3-20) However in this case we want to write some
content back to
the page. So for now we have to stop the form from submitting the
values to the
web server (return=false;). Create the JavaScript program to process the
form.
1. Insert the script tags in the head section. 2. Inside the script tags,
create the function called calculateTotal. 3. Inside the function, retrieve
the user name, location, and number of items that
the user typed in the textbox. (Refer to listing 3-20 on how to use the
getElementById method.) 4. Create an object called myData. (Refer to
listing 5-13) 5. Set the customer name (cusName) the value the user
entered. 6. Set the delivery date (delDate) the value the user entered. 7.
Set the number of items (numItems) to the value the user entered 8. The
price is $4.25 per item. The tax rate is 7%. Shipping rate is 2%. 9.
Calculate the total for the product, tax, shipping and order. Format the
data
The values returned are real values. Ending 0s may be cut off. So
$10.40 would look
like $10.4 to the user. This is just like in other languages. JavaScript has
functions to
help you format the numbers and string variables.
1. Go to http://www.w3schools.com/jsref/jsref_obj_number.asp (Links
to an external site.). 2. Review the number methods (Read about
toFixed). 3. Then, for each of the values returned from the calculations,
form them with the
toFixed method. Display the results
Monetary values should show the two decimals. Use line breaks inside
your message to
make the message look better. 1.
2. 3. When the user clicks on the submit button, write a message to the
user.
Display the same message on the web page using document.write Make
sure
to put in the correct values. M
Make sure to convert the data types to strings before you display them.
Here is a sample of what the output should look like:
Thank you John Smith for your order.
You will receive 10 items delivered to you on December 1.
You price of your items is $42.50.
The tax charge is $2.98.
The shipping charge is $0.85.
Your total is $46.33. Step 5. Format your content with HTML
Use HTML tags to format the content and enhance the appearance of
your page. * Note
that a variery means that you are showing us you are able to use the tags
and
attributes. The more you use, the more you learn. (For full points, use all
of the tags and
attributes to enhance your page appearance.)
Modify the week1-1.html and week1-2.html pages using HTML
1. Use a variety of html tags in your web page to enhance your content.
2. DocType, html, head, title, body (Use HTML 5) 3. Comment (<!--
comment -->) 4. Headings (h1, h2, h3) 5. Hyperlink (a) 6. Line break,
paragraph, code, span 7. Non-breaking space and the copyright symbol
8. Horizontal rule (line) 9. Input, textarea, form, label, button 10. Any
other html elements you would like to add. 11. Use a variety of html
attributes in your web page to enhance your content. 12. Height, width,
href, lang attributes 13. Class, style, id, title, hidden 14. Tabindex,
accesskey 15. Type (for the input tag) and onclick for the button. 16.
Any other html attributes you would like to add. Step 6. Format your
content with CSS
Format the content using CSS style rules. The more you use, the more
you learn.
1. Modify the week1-1.html and week1-2.html pages using CSS. 2.
Create inline style rules with the style attribute for at least 3 HTML
elements 3. Create embedded style rules for at least 3 HTML elements.
4. Create style rules for at least 2 classes. Format the content using CSS
style rules
Use a variety of styles in your web page with either your embedded or
inline styles. (For
full-points, use all of the elements to enhance your page appearance.)
1. Font-color, font-size, font-family, font-decoration, font-style, font-
weight, textalign, text-decoration 2. Border-collapse, border-width,
border-style, border-color 3. Padding and margin 4. Color, background-
color (use hexadecimal values) Any other style rules you would like to
add. Step 7 Documentation
Document your program. *
* This means all HTML, CSS and JavaScript programs!
1. Use proper nesting and indentation for all code 2. User proper naming
conventions for the IDs and names of elements, names of
classes used in all code 3. Include comments in the all code files (name,
date, purpose of code, functions,
variables) 4. Save this file as Homework1_LastName.docx. Add this to
your web site in the
homework folder after you have completed both problems Provide a
screen shot showing your folders and files. (Place the screen shots in
these
placeholders)
Include a screen shot of all of our code, showing your indentation and
nesting of the
elements.
Include a screen shot of both web pages in the browser showing that
your programs
worked. (ie. showing the message after you filled out the form)
***************************************************

CS 360 Given a C program, which is run as a.out


FOR MORE CLASSES VISIT
www.tutorialoutlet.com

Given a C program, which is run as a.out this is a test

int g;
int h = 1;

main(intargc, char *argv[])


{
inta,b,c;
a = 2;
b = 3;
c = A(a,b,"hello");
}

int A( int x, ......)

intu,v;

HERE:

(0). Complete the function heading of A(....)

(1). Which variables are global? local?

(2). Which variables are in a.out?

(3). In the run-time memory of a.out, where are the variables?

(4). Execution is at HERE: DRAW A DIAGRAM TO Show the stack


contents from HERE to main()'s argc and argv.

***************************************************
CS 375 COMPUTATION THEORY ASSIGNMENT 6.1Write a
proof by contradiction to show that the language
FOR MORE CLASSES VISIT
www.tutorialoutlet.com

1.Write a proof by contradiction to show that the language,

L= {an b2n | n 1} = {abb, aabbbb, aaabbbbbb, . . . }

isnonregular.

(Follow the example given in WBW section 6.1.2)

2.Describe in words why the following languages over the alphabet,

= {a, b}

are nonregular:

a) PAL = {palindromes}

b) EQAB = {strings that contain the same number of a's and b's}

3.Consider the CFG

bS | aaS
Prove that this generates the language defined by the regular expression:
b*aa

4.Consider the CFG

aXS

aX | cX | X

What is the language this CFG generates?

5.Consider the CFG

XpXpXS

pX | qX | X

What is the language this CFG generates?

= {p q}6.Find CFGs for the following languages over the alphabet

(i)All words in which the letter q is never tripled.

(ii)All words that do not have the substring pq.


7.Below is a set of words and a set of CFGs. For each word, determine
whether the word is in the language of each CFG and, if it is, draw a
syntax tree to prove it?

(i)aaaa

(ii)abaa

(iii)bbaa

CFG 1.

aSb | abS

CFG 2

aS | bS | aS

CFG 3

aS | aSb | XS

aXa | aX
CFG4

aAS | aS

SbA | SS | baA

CFG5

aB | bAS

a | aS | bAAA

b | bS | aBBB

8.Show that the following CFGs are ambiguous by finding a word with
two different distinct syntax trees.

SaSaS | b(i) S

aaS | aaaS | a(ii) S

AA(iii) S

AAA | a | bA | Ab A
are ambiguous. Also find unambiguous CFGs that generate these
languages.9.Show that the following CFGs that use

XaX(a)S

aX | bX | X

aSX | (b)S

aX | aX

aS | bS | aaS | (c)S

10.Begin to draw the total language trees for the following CFGs until
we can be sure we have found all the words in these languages with one,
two, three, or four letters. Which of these CFGs, if any, are ambiguous?

aS | bS | a(a)S

aSb | bX(b)S

bX | bX

= {a b}.11.Find CFGs that generate these regular languages over the


alphabet

(i)The language defined by (aaa + b)*


= {x y}.(ii)The language defined by (x + y)*(yyy + xxx)(x + y)*.

(iii)The s = {a b}et of all strings of odd length.

= {a b}(iv)All strings with exactly one a or exactly one b

= {p q}.(v)All strings that end in p and have an even number of ps in


total.

= {a b}.(vi)All strings with [an odd number of as and any number of


b's] OR [an even number of bs and any number of a's].

***************************************************

CS 696 Suppose you had to set up a two-way secure data link


with a satellite orbiting Jupiter
FOR MORE CLASSES VISIT
www.tutorialoutlet.com

Suppose you had to set up a two-way secure data link with a satellite
orbiting Jupiter. Why would you not want to use standard TCP for flow
control?
***************************************************
CSCI 1101 Computer Science II Assignment 2
FOR MORE CLASSES VISIT
www.tutorialoutlet.com

You must implement the classes as specified in the UML diagram. You
may add other methods if needed, however, all the methods and the
variables indicated in the UML diagram must be implemented. You must
submit one zip file containing the source codes (.java files) and a text
document with sample outputs. All your programs must be nicely
formatted and commented. Develop the code in a step-by-step manner.
Each correctly developed code piece will get you points. The objective
of this assignment is to simulate a game of tic tac toe. For those of you
who are not familiar with the game, you can check out the following
website: (http://www.exploratorium.edu/brain_explorer/tictactoe.html).
Figure 1 below shows some sample tic toe toe boards with some input.
Win (O's Row) Win (X's Column) Win (X's Diagonal) Fig. 1 Tic Tac Toe
Boards and ways to win or tie (i.e., no winner) No winner (Tie) You will
be using the concepts of inheritance and aggregation in object-oriented
programming. You will also need to use 2-d arrays to represent the grid
of the tic tac toe board. 2-d arrays are similar to 1-d arrays except that
they use two indices. There is a small tutorial on 2-d arrays at the end of
this assignment. Check it out. There are three main classes (Board,
TicTacToeBoard, XO) and one additional class called Play that will use
and run the classes (that is, play the game). See the UML diagram below
to see how the classes fit together. Board Class - rows : int - cols : int +
Board (int , int) : + get/set methods XO Class - name: String - static turn:
int + XO ( ) : + get/set methods + equals (XO) : boolean + toString ( ) :
String TicTacToeBoard Class - board [ [ : XO - turnCnt : int +
TicTacToeBoard (int, int) : + get/set methods + add (int, int) : boolean +
winner ( ) : boolean + toString ( ) : String + other methods if needed XO
Class - this class will hold information about an "X" or an
"O" object. This class should have two attributes: a name
(which is a String X or O) and a static int variable that is either set
to 0 or 1 (it should be initialized to 1). You will use this variable to
determine which name to give the object when it is created (e.g., if it is
1, set the name to "X"). You need to implement a no args
constructor that sets the name of the object to either X or O based on the
static variable (and update the variable). You also need to implement:
the respective get and set methods
an equals method to see if this XO object is the same as another XO
object
a toString method that returns the name of the XO object Board class
this is a class used to implement a variety of different boards for
different games (e.g., a chess board, checkers board, and in our case a tic
tac toe board). This class has two private attributes: the number of rows
and number of columns of the board. It also has the following methods:
It has a constructor that takes in and initializes the rows and columns
The appropriate get/set methods You may add other methods if required.
TicTacToeBoard This class extends the Board class. It has two private
variables:
A 2D array made up of XO objects with the size of Boards' rows and
columns
An int that keeps track of how many turns (e.g., how many X's and O's
have currently been placed on the board.) Methods
The constructor takes in two ints representing the rows and columns. It
initializes the 2D array to the size of rows and columns, and sets count
of turns to 0.
There are appropriate get and set methods
It also implements. the following methods:
The add method will add a new XO object onto the board (add to the 2D
array). The method takes in two numbers representing which row and
column you want to add the object. It returns a boolean if the object was
successfully added. It will need to make sure that the passed in rows and
columns are within the size restrictions of the board. It will also need to
make sure that the place on the board doesn't already have an XO object.

The winner method checks to see if there is a winner (returns true or


false). The method will need to check for wins by rows, columns and
across the diagonals. See Fig. 1 for the winning combinations.
A toString method that prints out what the current board looks like. The
toString method should print out the board similar to the sample output
(at the end of the assignment). And as XOs are added to the board, these
should also be printed. You may add other methods in this class (e.g., to
check for the different winning combinations). Play class This class will
allow users to play the game (e.g., the demo class). You will create a
new TicTacToeBoard. You should use a Scanner object to get the names
of your two players and to get the locations of their respective X and O's
on the board. The game should continue until there is a winner or there
is a tie (ie., no more places to put an XO). Make sure you do proper error
checking. See below for a sample output of a game. Your output should
show the different conditions. ----jGRASP exec: java Play Player 1
name: Bob Player 2 name: Sara Bob - you are X's and you go first. Col 1
2 3 Row 1 2 3 Please input a row# between 1-3 and column# between 1-
3: 2 2 Col 1 2 3 Row 1 2 X 3 Sara please input a row# between 1-3 and
column# between 1-3: 1 1 Col 1 2 3 Row 1 O 2 X Bob please input a
row# between 1-3 and column# between 1-3: 1 2 Col 1 2 3 Row 1 O X 2
X 3 Sara please input a row# between 1-3 and column# between 1-3: 1 3
Col 1 2 3 Row 1 O X O 2 X 3 Bob please input a row# between 1-3 and
column# between 1-3: 3 2 Col 1 2 3 Row 1 O X O 2 X 3 X Bob you
win!! 3 Short Tutorial on 2-d arrays 2-d arrays are very similar to 1-d
arrays except that they have two subscripts or indices, one representing
the row number and the other representing the column number. For
example, int a = new int[5][5];
creates a 2-d array with 5 rows and 5 columns. You can process the 2-d
array in the same manner. Instead of one for loop, we use a nested for
loop. For example, for(i=0;i<5;i++)
{
for(j=0;j<5;j++)
System.out.print(a[i][j] + \t);
System.out.println();
}
will print the contents of the array as a 5X5 matrix. The boxes will be
numbered as follows: Column 0 Column 1 Column 2 Column 3 Row 0
a[0][0] a[0][1] a[0][2] a[0][3] Row 1 a[1][0] a[1][1] a[1][2] a[1][3] Row
2 a[2][0] a[2][1] a[2][2] a[2][3] Row 3 a[3][0] a[3][1] a[3][2] a[3][3]
Row 4 a[4][0] a[4][1] a[4][2] a[4][3] If you want to print all the
elements in Column 2, for example: for(i=0;i<5;i++)
System.out.println(a[i][2]); Column 4 a[0][4] a[1][4] a[2][4] a[3][4] a[4]
[4] Similarly, the following will print the elements in Row no.3
for(j=0;j<5;j++)
System.out.print(a[3][j] + \t); The following program creates a 2-d
array, reads 25 integers from the keyboard, prints it as a 5X5 matrix and
finds the sum of all elements. Note that the 25 integers can be entered all
on a single line when they are read from the keyboard. Try it out. import
java.util.Scanner;
public class TwoDArray
{
public static void main(String args)
{
int a = new int[5][5];
inti,j, sum=0;
Scanner keyboard = new Scanner(System.in); for(i=0; i<5;i++)
for (j=0;j<5; j++)
a[i][j]= keyboard.nextInt();
for(i=0;i<5;i++)
{
for(j=0;j<5;j++)
System.out.print(a[i][j] + "\t");
System.out.println();
}
for(i=0;i<5;i++)
for(j=0;j<5;j++)
sum+=a[i][j];
System.out.println("The sum of all elements is: " + sum);
}
}
Array initializer expression for 2-d arrays A 2-d array can be created
using an array initializer expression. For example: int numbers =
{{1,2,3,4},{5,6,7,8},{9,10,11,12}};
creates the following array 1
2
3
4
5
6
7
8
9
10
11
12
Length field in a 2-d array A 2-d array has a length field that holds the
number of rows, and each row has a length field that holds the number
of columns. The following program uses the length fields of a 2d array
to display the number of rows, and the number of columns in each row.
Try it out. public class Lengths
{
public static void main(String args)
{
int numbers = {{1,2,3,4},{5,6,7,8},{9,10,11,12}};
System.out.println(The number of rows is + numbers.length);
for(int index=0; index<numbers.length; index++)
System.out.println(The number of columns in row +
index + is + numbers[index].length);
}
}
***************************************************

CSE 205 assignment 7


FOR MORE CLASSES VISIT
www.tutorialoutlet.com

public void init() {


WholePanelwholePanel = new WholePanel();
getContentPane().add(wholePanel);
setSize(500, 400);
}
}import java.awt.Color;
import java.awt.Graphics;
public class Rectangle {
private int x;
private int y;
private int width;
private int height;
private Color color;
public Rectangle(int x, int y,... import
import
import
import
import
import
import
import
import
import
import
import
importjava.awt.BorderLayout;
java.awt.Color;
java.awt.Graphics;
java.awt.GridLayout;...
***************************************************

CSIA 485
Implementation of New Technology
FOR MORE CLASSES VISIT
www.tutorialoutlet.com
1 Find a recent article related to issues surrounding IT mergers or
implementation of a new technology in an organization and describe
how they were resolved or handled.

2. Use an example of issues in your own organization (work) and how


they were solved or dealt with.

The goal is to develop a portfolio of templates and Best practices (or a


wiki) that you can refer back to over the years.

***************************************************

CSS 422 ASSIGNMENT 3 Individual: System Reference Guide


- Software Architecture Comparison
FOR MORE CLASSES VISIT
www.tutorialoutlet.com

css 422 Individual: System Reference Guide - Software Architecture


Comparison

You have been called upon to put together some reference materials for
other groups to follow, since up until now they have not created any
formal architectural documents. Create a System Reference Guide for
your employer in three parts over Weeks Two, Three, and Four.

In this week, write the first section of the Guide: a 1,000- to 1,050-word
paper, using Microsoft Word, addressing the listed software
architectures.
Find an example of a well-known commercial software system for each.
Give the name and purpose/function of the system, and write no less
than 250 words for each system explaining why this is an example of
that architecture.

The architectures are:

Client/Server
Peer-to-peer (P2P)
Distributed computing (cloud, grid, etc.)
Monolithic (standalone)

"PART 2 OF 3"
INDIVIDUAL SYSTEM REFERENCE GUIDE: DIAGRAMMING
You have been called upon to put together some reference materials for
other groups to follow, since up until now they have not created any
formal architectural documents. As a continuation from Week Two,
continue to create a System Reference Guide for your employer.

For this week's assignment, create several software architecture


diagrams for your company's online sales website. The website is to
present a shopping cart system with which users can browse an online
catalog and place orders for merchandise. The system also allows users
to view previous orders, which is useful for tracking shipping for recent
orders and for re-ordering items in the future.

Produce the following three diagrams:

To present a static model of the system, create a diagram for a layered


architecture view of the system.
Using the components you identified in your layered view of the
system, create an activity diagram that shows how a customer would
place an order.
Create a client/server diagram to model the physical view of the system
"PART 3 OF 3"
Individual: System Reference Guide - Quality Attributes

Complete the System Reference Guide for your employer, and include
an architecture for a new employee website. First, identify the quality
attributes that lead to the architecture, then create a high-level
architectural diagram related to the qualities you identified for this
assignment. When finished, combine these with the documents created
in Weeks Two and Three.

Your company is planning to build a new website that integrates


employee tracking, attendance, scheduling, and time off requests. This
system will also interface with an Interactive Voice Response (IVR) and
a mobile application to allow employees to make attendance requests
and view their data.

Part 1:

Identify the quality attributes this system will need for its architecture.
Construct a matrix of quality attributes (nonfunctional requirements) that
you've identified. For each attribute, identify how you would satisfy the
requirement through an architectural pattern. In another column, write
the tradeoffs that you might encounter when satisfying this requirement
by the means you listed.

Part 2:

Choose one of the patterns you identified in Part 1. Create a high-level


diagram that shows your architectural pattern as it is to be implemented
in the system. Note: an architectural pattern is high-level, such as SOA,
Layered, Client/Server, pipes-and-filters.

Incorporate your diagram and matrix into a 1- to 2-page document in


Microsoft Word. As this document is intended for a technical team,
APA formatting is not required.
Combine this assignment with the assignments from Weeks Two and
Three to create your final System Reference Guide in a single
Microsoft Word document

***************************************************

Describe two emerging technologies in healthcare. Explain how


they have influenced or impacted patient care
FOR MORE CLASSES VISIT
www.tutorialoutlet.com

Describe two emerging technologies in healthcare. Explain how they


have influenced or impacted patient care
***************************************************

Discuss how server virtualization has saved many organizations


money by reducing the physical hardware needed
FOR MORE CLASSES VISIT
www.tutorialoutlet.com

Discuss how server virtualization has saved many organizations money


by reducing the physical hardware needed.

Using Microsoft Excel to do your calculations, create a Return on


Investment (ROI) analysis comparing the cost of 10 physical servers to
the cost of 10 virtual servers running on Hyper-V. Use any applicable
brand and model of server hardware.

Deliverables will be:

A 1-page analysis based on your calculations explaining the results.

A spreadsheet showing your cost analysis.

***************************************************

ECON 101 Assignment 1 Computer Configuration


FOR MORE CLASSES VISIT
www.tutorialoutlet.com

You accepted a position at the company to lead a team of 3 multi-media


developers (excluding yourself). This team will be responsible for
graphic design, animations, and promotional material. Your role is to
manage the team members, their hardware and software needs, and
projects. When you arrive at a new position on Monday morning at 9am,
your employer asks you to assess the hardware needs for the team
and propose a computer configuration that would meet the functions of
the team yet the least expensive. Based on the information that you were
given above (and not more), do your research (internet, friends,
companies, etc.) and answer the
following questions 1. What are the most important parts to be
considered for the team computers and why? 2. For these computer parts
that you identified in the previous question, what general specifications
would you recommend and why? 3. Go to http:
([wwwsigmawavecom[index.aspx?lang=en and use their configurator to
generate a quotation [use the expert PC customizer]
(http:([wwwsigmawavecostdxl.aspx?lang=en) to create a quotation.
***************************************************

IAS 5015 Introduction to Cyber Defense


FOR MORE CLASSES VISIT
www.tutorialoutlet.com

There is a specialization area within information security referred to as


cyber defense. This specialization has focus in particular on the outer
edge, or border, of trusted network and on security across the Internet.
The ability for most security professionals to have significant impact on
the security of the Internet itself is impractical creating the need to
instead focus on how to protect the trusted network and the traffic being
transmitted over the Internet. As you go through this course you will find
that encryption plays an important role in a variety of ways towards
accomplishing thosegoals.Use the study materials and engage in any
additional research needed to fill in knowledge gaps. Write a 23 page
paper that covers the following:

What are the types of risks to trusted networks that must be


mitigated by security professionals with the goal of securing
internal information assets?
What role does monitoring the external borders or edges of the
trusted network play in supporting the security of internal
information assets?

What are some of the tools that are available to security


professionals interested in evaluating the contents of packets trying
to gain entry into their trusted networks?
What role does security policy play in securing the external
borders or edge of the trusted network?

Assignment Requirements

Written communication: Written communication is free of errors


that detract from the overall message.
APA formatting: Resources and citations are formatted according
to APA (sixth edition) style and formatting.

Length of paper: 23 pages, excluding the references page.

Font and font size: Times New Roman, 12 point.

***************************************************

In this project, create a Boat application


FOR MORE CLASSES VISIT
www.tutorialoutlet.com

In this project, you will create a Boat application. Each Boat has the
following
attributes: name, speed, angle, and power. The Boat names should be
read from a text
file boats.txt. You can assume there will be a maximum of 100 boats
in the file. For
testing, use the following boat names in the boats.txt file:
Sea Monkey
Backdraft
Cast Away
Nautifish
Destiny
The application should be able to accept commands from the user. The
user must
provide the commands in the following format:
<Boatname>, <command>
Example:
Sea Monkey, power on
Sea Monkey, turn left
Sea Monkey, speed up The acceptable commands are the following (Any
other command should be considered
invalid):
Command Description power on power up the boat power of power off
the boat speed up increases the boat speed by the minimum spee
increment 2 mph slow down decreases the boat speed by the minimum
spe
decrement 2 mph turn left turns the boat to the left by the minimum left t
degree 5 deg turn right turns the boat to the right by the minimum righ
degree 5 deg After each command is entered and executed, the state of
the boat should be displayed.
For Example:
User Enters>> Sea Monkey, power on
Program output>> Sea Monkey is pointing in the direction of 0
deg.
User Enters>> Sea Monkey, turn right
Program output>> Sea Monkey is in 5 deg angle.
User Enters>> Sea Monkey, speed up
Program output >> Sea Monkey is moving in 5 deg angle at the
speed of 2 mph.
User Enters>> Sea Monkey, power of
Program output >> Sea Monkey is powered of. Error checking:
If the user enters an invalid command, a message should be displayed
that the
command was invalid.
If the user enters a boat name that does not exist, a message should be
displayed that
the boat not does not exist.
If the user enters a command that is not in the correct format (boatname,
command), a
message should be displayed that the command format is invalid.
***************************************************

In this project, define a customer class similar to what you


defined for project 5 and 6
FOR MORE CLASSES VISIT
www.tutorialoutlet.com

In this project, define a customer class similar to what you defined for
project 5 and 6.
A Customer has a first name, last name, and social security number.
Define the
Customer constructor so it will initialized those attributes. Define an
exception class
called "InvalidCustomerException". Update the Customer
constructor to throw an
exception when an invalid Social Security Number is passed to the
constructor. Update
the main method with a try/catch block to catch the exception and call
the
getMessage() method in the catch block.
InvalidCustomerException class should override the getMessage()
method to return a
string such as Invalid SSN 5438-98-9876.
***************************************************

INFO 620 Consider the following relations for a database that


keeps track of automobile sales in a car dealership
FOR MORE CLASSES VISIT
www.tutorialoutlet.com

Consider the following relations for a database that keeps track of


automobile sales in a car dealership (OPTION refers to some optional
equipment installed on an automobile):

CAR(Serial_no, Model, Manufacturer, Price)

OPTION(Serial_no, Option_name, Price)

SALE(Salesperson_id, Serial_no, Date, Sale_price)

SALESPERSON(Salesperson_id, Name, Phone)

First, specify the foreign keys for this schema, stating any assumptions
you make. Next, populate the relations with a few sample tuples, and
then give an example of an insertion in the SALE and SALESPERSON
relations that violates the referential integrity constraints and of another
insertion that does not.

I have identified the foreign keys, but am having problems with the rest
of question.

Elmasri, Ramez, ShamkantNavathe. Fundamentals of Database Systems,


7th Edition. Pearson Learning Solutions, 2015-06-01. VitalBook file.

The citation provided is a guideline. Please check each citation for


accuracy before use.

***************************************************
Information Type
Social Security Number of an Individual
FOR MORE CLASSES VISIT
www.tutorialoutlet.com

Information Type
Social Security Number of an Individual
First Name and Last Name
Credit Card Number
Qualification
Medical Information
Publications
Salary
Place of Employment
Country of Origin
Parent Names
Children Names
Marital Status
Passport Number
Languages Spoken
Drivers License Number
Level of Education
Major in College
Date of Birth
Citizenship
Ethnic Background
Criminal Records Spouse Name
Grade Point Average in College
Research Interest
Investment Accounts Priority One Priority Two Priority Three Same
level of importance
Confidentiality
Integrity
Availability Comments for Your Selections
***************************************************

Potrebbero piacerti anche