Homework 5
due Wednesday, March 8, 5pm
Submit zipped .m files on Canvas and printed published file in 182 George St box #15 or #16
You are encouraged to work with other students on this assignment but you are expected to write
and work on your own answers. You don’t need to provide the name of students you worked with.
You can find information about usage and syntax of any built-in Matlab function by typing
help xfunctionnamey
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
educational course/tutorialoutlet.com
1. APMA 0160 Homework 5
FOR MORE CLASSES VISIT
www.tutorialoutlet.com
Homework 5
due Wednesday, March 8, 5pm
Submit zipped .m files on Canvas and printed published file in 182
George St box #15 or #16
You are encouraged to work with other students on this assignment but
you are expected to write
and work on your own answers. You don’t need to provide the name of
students you worked with.
You can find information about usage and syntax of any built-in Matlab
function by typing
help xfunctionnamey
in the Command window, where is the space character. You are
expected to submit
(I) a zipped file containing all your .m and any .out files online on
Canvas
(II) a printout of the files produced by the publish command of the filled
in template and all
other .m files your template uses in the dropbox in 182 George St lobby
(#15 for S01 and
#16 for S02)
Late homework will not be accepted without proper justification.
Problem 1 : Lagrangian interpolation
For this problem, you will find the unique polynomial of degree n, Πn ,
that goes through a set of datapoints
tpxk , yk qunk0 using Lagrangian interpolation. You will also measure
the maximum error in a given interval,
assuming that yk ’s are values of the Runge’s function. Write a Matlab
function with the definition
function [LPvalues] = LagrangePoly(xdata, ydata, xgrid)
2. where
xdata, ydata
LPvalues :
: vectors of the tpxk , yk quk0 datapoints
the vector of values of Πn on the respective locations in xgrid
n LPvalues must be computed using the Lagrange formulation
Πnpxq ¸ y φ pxq,
n k φkpxq k ¹ xx
n j
j 0
j k k 0 xkxj You may find the prod function useful here.
(a) Consider the set of points tp1, 4q, p2, 3q, p3, 5q, p4, 7q, p5, 2qu. Use
your LagrangePoly function to find
the values of the interpolating polynomial on the grid 1:0.01:5. Plot on
the same figure the datapoints
with orange circles and the interpolating polynomial on the grid 1:0.01:5
with a solid line.
(b) Repeat part (a) for the set of 11, 21, 31 uniformly distributed nodes
xk in
fRpxq 1 r1, 1s and ykfRpxk q, where 1
25x2 is Runge’s function on the grid -1:0.01:1. Use different colors
when plotting the interpolating polynomials
for each of the three cases and add a legend. Use ylim to show the plots
for 1 ¤ y ¤ 1. Print on the
screen a message for each case, stating the maximum absolute error
between the function values and the
interpolating polynomial values on the grid.
1 APMA0160, Spring 2017 Homework 5 (c) Repeat part (b) for the set
of 11, 21, 31 uniformly distributed nodes xk in rπ, πs and yk
grid -pi:0.01:pi.
(d) Repeat part (b) for the set of 11, 21, 31 Chebyshev-Gauss-Lobatto
nodes xk in
on the grid -1:0.01:1. sinpxk q on the r1, 1s and ykfRpxk q (e) Write in a
block of comments at the end of your prob1() function a few comments
about the behavior
3. of the maximum absolute error from parts (b)-(d). In particular, for parts
(b) and (c), explain how your
results are supported by what we saw in class regarding the bound of the
maximum absolute error. Problem 2 : Taylor’s polynomials for the sine
function
For this problem, you will approximate the sine function by its Taylor
polynomials of increasing degree. The
Taylor expansion for the sine function around x0 0 is
sin x ¸8 p1qk x2k 1 x x3
p2k 1q!
3!
k0 x5
5!
and it holds for all x P R. Your program will support this claim by
plotting the Taylor polynomials ¸ p1qk x2k
p2k 1q!
k0
N 1 which approach the sine function as N increases. Write a Matlab
function with the definition
function [c] = sinPoly(n)
where c is the vector of n
Taylor polynomial is n). 1 coefficients of the Taylor polynomial of order
n (i.e. the highest order of the Your function should check that the input
variable n is odd. If it is even, it should print an error message
and return c=0. You may find the mod function useful here. Using your
sinPoly function, plot on the same axes the function sinpxq and the
Taylor polynomials of degree
5, 9, 13, 17, 21 in r2π, 2πs on a grid of 1000 equally spaced points. You
may use polyval to evaluate the
polynomials on the grid. Use a legend to label the plotted curves and
4. place it outside of the figure. For eachdegree, print on the screen the
maximum absolute error between the sine function and the Taylor
polynomial
on the same grid. 2
---------------------------------------------------------------------------------------
CA 103Q1 File Size, Transmission Speed, and Transmission Time
FOR MORE CLASSES VISIT
www.tutorialoutlet.com
Cloud 9, a cloud storage service provider based in San Diego, has just
announced that it is running out of money and will be shutting down
operations soon. It has given all its clients fifteen (15) days to move their
data out, either back to their own facility or to an alternative service
provider.
Founded six years ago, Cloud 9 has since acquired 500 business clients,
who use Cloud 9's infrastructure to store archived data. Among these
clients, a few are large companies with several terabytes (TB) of data
archived at Cloud 9, but on average each client company stores about
400 Gigabytes (GB) of data on Cloud 9's disk drives. Cloud 9's
connection to the Internet is a Gigabit Ethernet line that has an effective
aggregate transmission rate of 1 Gbps (1,000,000,000 bits per second).
To make your calculations easier, a few assumptions have been made as
follows:
1. Cloud 9's Internet connection will be available 24 x 7 before the 15-
day shutdown deadline.
2. Even if new funding could be arranged, there would be no time to add
additional transmission lines to Cloud 9's facility before the deadline.
3. For regulatory compliance reasons, Cloud 9's clients cannot afford to
lose their archived data, but none of them has a secondary backup copy
of the data.
4. Each of Cloud 9's client has found adequate transmission and storage
capacity to receive the data to be moved back.
5. 5. 1 GB = 1,0243 Bytes = 1,073,741,824 Bytes
Questions:
a.If all of Cloud 9's clients start moving their data out at the beginning of
the 15-day period by sharing Cloud 9's Internet connection, will there be
enough time to move all the data out? Show your calculations.
b. What alternatives do Cloud 9's clients have, other than moving their
data out over telecommunications lines?
---------------------------------------------------------------------------------------
CIS 115So when do you think you would use a WHILE loop for
an array
FOR MORE CLASSES VISIT
www.tutorialoutlet.com
So when do you think you would use a WHILE loop for an array, and
when would you use a FOR loop? Why?
Why wouldn't you always use a FOR LOOP?
---------------------------------------------------------------------------------------
CIS 489 Final Project: Project Plan
FOR MORE CLASSES VISIT
www.tutorialoutlet.com
Final Project: Project Plan
Due Week 10 and worth 300 points
This assignment consists of three (3) sections: a written project plan, a
revised Gantt chart or project plan, and a project plan PowerPoint
presentation. You must submit the three (3) sections as separate files for
the completion of this assignment. Label each file name according to the
section of the assignment for which it is written. Additionally, you may
6. create and / or assume all necessary assumptions needed for the
completion of this assignment.
While taking all business and project parameters into consideration,
make quality assumptions to support the following requirements.
Section 1: Written Project Plan
You are now in the final stage of the project plan development. All
previous documentation will be combined into one (1) document that
will serve as the statement of work for the project. Your goal is to have
the project approved by the executive team and the venture capital
group. The project plan is very detailed which is appropriate to
accomplish the monumental task of implementation. However, the
executive team is only interested in a ten (10) minute summation.
Therefore, you also must create a compelling executive summary that is
supported by your detail that convinces the executive group that your
solution is optimal.
1. Write an eight to ten (8-10) page executive summary in which you
provide a high-level technical overview of your project where you
address the following:
1.
1. Describe the scope of the project and control measures.
2. Describe the goals and objectives of the project.
3. Give a detailed, realistically estimated cost analysis of the entire
project.
4. Relate the value of the project plan solution to the competitive
advantage that information technology will afford your
organization.
5. Provide all aspects of the information technology implementation
into the project plan.
6. Use at least five (5) quality resources in this assignment. Note:
Wikipedia and similar Websites do not qualify as quality
resources.
Your assignment must follow these formatting requirements:
7. Be typed, double spaced, using Times New Roman font (size 12),
with one-inch margins on all sides; citations and references must
follow APA or school-specific format. Check with your professor for
any additional instructions.
Include a cover page containing the title of the assignment, the
student’s name, the professor’s name, the course title, and the date.
The cover page and the reference page are not included in the
required assignment page length.
Include charts or diagrams created in MS Visio and MS Project as
appendix of the Word document. Make reference of these files in the
body of the Word document.
Section 2: Revised Gantt Chart / Project Plan
Use Microsoft Project or an open source alternative, such as Open
Project, to:
2. Update the Gantt chart or project plan (summary and detail) template,
from Project Deliverable 4: Infrastructure and Security, with all the
project tasks.
Section 3: Project Plan PowerPoint Presentation
Additional to your detailed executive summary you must present your
findings to the executive team and the venture capital group that, along
with the executive summary, will convince the group that your solution
is optimal.
3. Create a ten to fifteen (10-15) slide PowerPoint presentation in which
you:
a. Illustrate the concepts from your written report in Section 1 of this
assignment.
b. Create bulleted speaking notes for your presentation to the executive
board in the Notes section of the PowerPoint. Note: You may create or
assume any fictitious names, data, or scenarios that have not been
established in this assignment for a realistic flow of communication.
c. Use a professional technically written style to graphically convey the
information.
8. The specific course learning outcomes associated with this assignment
are:
Demonstrate an understanding of existing and emerging information
technologies and strategic impact on organizational operations.
Evaluate the issues and challenges associated with information
technology integration.
Summarize the competitive advantage that information technology
affords to organizations.
Use technology and information resources to research issues in
information technology.
Write clearly and concisely about strategic issues and practices in the
information technology domain using proper writing mechanics and
technical style conventions.
---------------------------------------------------------------------------------------
CMGT 410 Cloud computing
FOR MORE CLASSES VISIT
www.tutorialoutlet.com
Cloud computing is a collection of individual technologies that become
one integrated technology for deployment.
Create a 3-page process map using Visio® showing the various
components of cloud computing and who has responsibility for the
implementation and support of the cloud. Additionally, include basic
cloud essentials, security, virtualization and databases.
Note: Responsible parties can include vendors, in-house IT, outsourced
IT, security team, or hybrid group
---------------------------------------------------------------------------------------
CMIS 102Homework 2Test Case Creation
FOR MORE CLASSES VISIT
www.tutorialoutlet.com
9. Homework 2 – Test Case Creation Using the following pseudocode,
provide 3 unique test cases that would help validate your
algorithm. Be sure to place the test cases in a table showing the input
values, and expected output
for each test case.
Write "Enter the price in dollars:"
Input Price
Write "Enter state sales tax(e.g. .06) :"
Input SalesTax
Set Price = Price + (Price * SalesTax)
Write "Price with Tax is" + Price Submit your word or PDF
file to your assignments folder no later than the due date. Grading
guidelines
Submission
A minimum of 3 test cases were provided.
Input provided and explained for each test case.
Expected output provided and explained for each test case.
Test cases represent a wide variety of possible input values (e.g. large
numbers,
small numbers (0), negative, or unexpected non-number entries).
Total Points
2
1
1
1
5
---------------------------------------------------------------------------------------
CMIS 111 Final Project
FOR MORE CLASSES VISIT
10. www.tutorialoutlet.com
Final Project
The final project for this course consists of two case studies related to
cybersecurity and the use of
social networking and home computer use. Please review the case
studies and respond using the
guidelines provided below.
Case Study 1: Securing your home computer
You just purchased a brand new computer for your home environment.
It comes with the latest
operating system, Internet connectivity and all accessories to complete
your home office and school
activities. You also have an Internet Service Provider where you can
easily use the existing network to
connect to the Internet and to perform some online banking.
Describe the steps you plan to go through to ensure this new computer
system remains as secure as
possible. Be sure to discuss the details of firewall settings you plan to
implement, browser privacy and
security settings, and recommended software (e.g., Anti-virus and
others) you will install. Also, describe
your password strength policy you plan to adopt, and what you envision
to do to ensure your online
banking site is encrypted and uses the proper certificates.
Discussion of operating system patches and application updates should
also be included. As you discuss
these steps, be sure to justify your decisions bringing in possible issues if
these steps are not followed.
You can discuss this for a specific type of computer (e.g. MAC or PC) to
make the scenario more
appropriate for your environment.
Case Study 2: Guidance for a family member using social networking
sites.
A family member, who just turned 13, wants to join Facebook, create a
11. Twitter account and start texting
his friends on a regular basis. For the purpose of this paper, let us
assume you are willing to allow your
family to participate in these social networking activities and the family
member has agreed to use your
advice to protect his or her privacy and security while participating in
these social networking activities.
Describe the specific guidance and rules that your family member must
adhere to for this activity to
move forward. Be sure to provide specific settings for Facebook and
Twitter as well as any guidance for
texting with friends. Be sure to discuss how to detect, prevent and report
issues such as cyber bullying,
identity theft, and child predatory behavior. Be sure to justify your
decisions bringing in possible issues if
the guidance you provided is not followed
Prepare a well-written paper no more than 10 pages in length.
In this paper you will address each of the above case studies. Be sure to
clearly separate the case
studies into separate sections of the paper. Only one paper is needed to
address both case studies
Submission requirements:
Your completed assignment should be saved as a Word (or PDF)
document and submitted to your LEO
assignments area no later than the due date listed in the syllabus. Your
document should be neat, wellwritten with minimal grammar and
spelling errors. You should name the file yournamefinalproject.docx (or
yournamefinalproject.pdf). So if my name was
Julie Smith, I would name my document juliesmithfinalproject.docx.
Your name should be clearly listed on the first page along with the
class/section, professor and due date.
Your document should contain page numbers at the bottom of each
page. Single or double space line
formatting is acceptable. All references used for your report should be
included in APA style format. See
12. the following APA reference guide for details on how to cite your
references:
http://www.umuc.edu/library/libhow/apa_examples.cfm
Grading guidelines
Submission
Case Study 1: Describes the steps you plan to go through to
ensure this new computer system remains as secure as
possible.
Case Study 1: Discusses the details of firewall settings you
plan to implement.
Case Study 1: Discusses browser privacy and security settings.
Case Study 1: Discusses the recommended software (e.g.,
Anti-virus and others) you will install.
Case Study 1: Describes the password strength policy you
plan to adopt.
Case Study 1: Describes what you envision to do to ensure
your online banking site is encrypted and uses the proper
certificates. Case Study 1: Discusses operating system patches and
application updates.
Case Study 1: Justifies your decisions bringing in possible
issues if your recommended steps are not followed.
Case Study 2: Describes the specific guidance and rules that
your family member must adhere to for this activity to move
forward.
Cast Study 2: Provides specific settings for Facebook and
Twitter as well as any guidance for texting with friends.
Case Study 2: discuss how to detect, prevent and report
issues such as cyber bullying, identity theft, and child
predatory behavior.
Case Study 2: Justifies your decisions bringing in possible
issues if the guidance you provided is not followed.
Document is well-organized, and contains minimal spelling
and grammar errors. The student’s name is clearly listed on
the first page along with the class/section, professor and due
date. The document contains page numbers at the bottom of
13. each page. Single or double space line formatting is used. APA
style format is used for references.
Total Points
5 5
5
5
5
5 5
10
5 10
10 10
20 100
---------------------------------------------------------------------------------------
CMIT 495 Active Directory Policy Statement General Active
Directory Forest
FOR MORE CLASSES VISIT
www.tutorialoutlet.com
1. Active Directory Policy Statement
General
Active Directory Forest :
Deployment of one Active Directory Forest will suffice for WWTC’s
requirments.
There are not requirements for data isolation within WWTC’s Active
Directory configuration
and any data separation can be performed using data isolation. A
single-forest was chosen
because it is very cost-effective and requires the least amount of
administrative support. For
example, with only one forest, the global catalog does not require
synchronization across
forests and management of a duplicate infrastructure is not required.
An organizational forest
14. model will be used with user accounts and resources contained in the
forest and managed
independently. The forest will be used to provide service and data
isolation. This has been
chosen insteady of other models where resources and users are
isolated in separate forests.
Active Directory Domain :
WTC will use an Organizational Domain Forest to provide
autonomous groups within
the forest as required. The New York office will have a separate
domain from the Hong Kong
office since it will be largely autonomous. In addition, a separate
domain can be created to
restrict access to confidential data. Since WWTC will have few IT
personnel to care for dayto-day IT support activities in New York,
the following functions will be maintained by forestlevel
administration: Creating and removing domain controllers
Monitoring the functioning of domain controllers
Managing services that are running on domain controllers
Backing up and restoring the directory Two domains will require that
Group Policy settings as well as access control
/auditing settings( required forest-wide) are implemented separately
to each domain in the
forest. This setup is considered a regional domain configuration and
will reduce traffic over
wide area network (WAN) links. While service administration will
be carefully controlled at
the Hong Kong office, the following functions will be maintained
within the New York office: Creating organizational units (OUs) and
delegating administration
Repairing problems in the OU structure that OU owners do not have
sufficient
access rights to fix Instead of creating a separate forest root domain,
the New York office function as the
forest root domain. It will be a parent domain to the other offices.
15. Service administrator
accounts will reside on the New York root domain while user
accounts for each region will
reside on the appropriate domain. For administration purposes, the
branch offices will
functions as child domains under the New York root domain. This
configuration was chosen
because it is much easier to manage than a configuration with a
separate domain for
administrative accounts.
Active Directory Naming Convention: WWTC.org is the Active
Directory namespace used by WWTC. It is a registered fully
qualified domain name for WWTC. WWTC will use the same
internal and external
namespace. WWTC.org will be used from inside and outside the
organization without a
separate namespace for internal access to resources. This means that
the tree name
(WWTC.org) is consistent for the private and public (Internet)
allowing users to logon with
the same credentials internally and externally. This requires a
separate zone outside the
firewall to provide name resolution for public resources and does
create security concerns to
ensure that clients accessing resources from outside the organization
do not have access to
internal company resources. This also creates the requirement for
maintaining the records on
both the internal and external DNS servers simultaneously. The
attached illustration shows
this configuration. Application Services:
Windows Server 2012 is installed on the network and the following
Active Directory features
will be implemented. Windows Deployment Services (WDS) will be
implemented to allows
16. network-based installation of Windows Operating Systems (OS) to
reduce the
complexity and cost of manual installation. This will require a WDS
Server as
a member of the Active Directory Domain Services (AD DS)
domain. This also
requires a Dynamic Host Configuration Protocol (DHCP) server with
an
active scope sine PXE relies on DHCP for IP addressing.
Smart Card Authentication will require valid user principal names
(UPNs)
since they are required fo smart card login. Since a certificate
authority (CA)
will issue the domain controller certificates, the root certificate will
be added
to the Trusted Root Certification Authorities group policy in Active
Directory.
IP Address Management (IPAM) will be implemented to provide
highly
customizable administrative and monitoring capabilities for the IP
address
infrastructure. IPAM will be used to discover, utilize, monitor, audit,
and
manage IP address space in the network. This requires an IPAM
server that
has connectivity to existing DHCP, DNS, DC, and NPS servers in
the Active
Directory forest. WDS services will be hosted on the same computer
as DHCP.
This requires that WDS is configured so that it doesn’t listen on Port
67 and
DHCP option 60 will be used to notify a booting PXE client that
there is a
listening PXE server on the network. The server will also be
configured to
17. respond only to known client computers. This ensures that client
computers
are added to Active Directory before the image is deployed.
File Classification Infrastructure (FCI) will be implemented to ensure
that
automatic classification is performed. The different classifications
will be identified. Currently they are listed as Public and
Confidential. The properlassification will be applied to every file
using FCI. This process will be used
to ensure that Confidential data is properly stored on encrypted
drives and
that all confidential files are transmitted using encrypted methods.
Reporting
based on these classification tabs will allow administrators to detect
and
respond to violations of the WWTC’s data classification policy.
Failover cluster services will be implemented so that the entire
network has
hardware, software, and storage redundancy. This independent group
of
servers and storage devices will work together to increase the
availability of
applications and services. If one clustered device fails, another will
provide
the lost services (called failover). The cluster validation wizard will
be used to
ensure that all network components are compatible prior to
implementation. It
will also be used after implementation and as new devices are added
to the
network to maintain this capability. By implementing backup for all
servers
and storage, WWTC ensures that users experience a minimum of
disruptions
in service.
18. Cache encryption will be implemented to store encrypted data by
default. This
means that data in cache is stored encrypted by default providing
data
security without requiring entire drive encryption.
BranchCache will be implemented to increase performance,
manageability,
scalability, and availability. Duplicate files are eliminated while
hashes and
local storage at branch offices drastically reduce the amount of
required WAN
traffic.
Bitlocker encryption will be used to protect all user and server data.
The
benefit is that the entire drive is encrypted and only requires the
user’s normal
authentication to access the data. The bitlocker system on the wired
network
will be set up to automatically unlock the system volume during boot
to reduce
the internal help desk calls because of lost PINs. Group policy
settings will be
enforced that require either Used Disk Space Only or Full Encryption
is used
when BitLocker is enabled on a drive. Groups:
Users and computer accounts will be grouped to simplify
administration by controlling
permissions and rights rather than assigning them individually.
Groups in Active Directory
are objects that reside in the domain. Groups have a scope that
identifies the extent that they
are applied in the domain or forest. The three group scopes for
WWTC are outlined below: Domain local scope is used to manage
accounts within the domain. For
example, a user group that requires access to a printer can be setup so
19. that
access to a new printer can be done for the entire group at once
instead of
doing a permission list for all five users. The five users will have
global scope
and will be added to a domain local scope group that can be assigned
printer
access. Global scope is used for directory objects that require daily
maintenance,
such as user accounts, computer accounts, or groups that require
management across domains (such as a department in multiple
locations). Universal scope is used to consolidate groups that span
domains. Changes to
global scope groups doesn’t affect the universal scope group, but
changes to the universal scope group causes the entire membership
of the group to be
replicated to every global catalog in the forest.
The scope and Organizational Unit setup has been outlined in the
below diagram. The above structure was chosen so that Group Policy
could be applied to a select group of
users or resources without having to set policies for each individual
user.
--------------------------------------------------------------------------------------
CMIT 495Active Directory Policy Statement
FOR MORE CLASSES VISIT
www.tutorialoutlet.com
Active Directory Policy Statement
General
Active Directory Forest :
Deployment of one Active Directory Forest will suffice for WWTC’s
requirments.
There are not requirements for data isolation within WWTC’s Active
20. Directory configuration
and any data separation can be performed using data isolation. A single-
forest was chosen
because it is very cost-effective and requires the least amount of
administrative support. For
example, with only one forest, the global catalog does not require
synchronization across
forests and management of a duplicate infrastructure is not required. An
organizational forest
model will be used with user accounts and resources contained in the
forest and managed
independently. The forest will be used to provide service and data
isolation. This has been
chosen insteady of other models where resources and users are isolated
in separate forests.
Active Directory Domain :
WTC will use an Organizational Domain Forest to provide autonomous
groups within
the forest as required. The New York office will have a separate domain
from the Hong Kong
office since it will be largely autonomous. In addition, a separate domain
can be created to
restrict access to confidential data. Since WWTC will have few IT
personnel to care for dayto-day IT support activities in New York, the
following functions will be maintained by forestlevel administration:
Creating and removing domain controllers
Monitoring the functioning of domain controllers
Managing services that are running on domain controllers
Backing up and restoring the directory Two domains will require that
Group Policy settings as well as access control
21. /auditing settings( required forest-wide) are implemented separately to
each domain in the
forest. This setup is considered a regional domain configuration and will
reduce traffic over
wide area network (WAN) links. While service administration will be
carefully controlled at
the Hong Kong office, the following functions will be maintained within
the New York office: Creating organizational units (OUs) and delegating
administration
Repairing problems in the OU structure that OU owners do not have
sufficient
access rights to fix Instead of creating a separate forest root domain, the
New York office function as the
forest root domain. It will be a parent domain to the other offices.
Service administrator
accounts will reside on the New York root domain while user accounts
for each region will
reside on the appropriate domain. For administration purposes, the
branch offices will
functions as child domains under the New York root domain. This
configuration was chosen
because it is much easier to manage than a configuration with a separate
domain for
administrative accounts.
Active Directory Naming Convention: WWTC.org is the Active
Directory namespace used by WWTC. It is a registered fully
qualified domain name for WWTC. WWTC will use the same internal
and external
namespace. WWTC.org will be used from inside and outside the
organization without a
22. separate namespace for internal access to resources. This means that the
tree name
(WWTC.org) is consistent for the private and public (Internet) allowing
users to logon with
the same credentials internally and externally. This requires a separate
zone outside the
firewall to provide name resolution for public resources and does create
security concerns to
ensure that clients accessing resources from outside the organization do
not have access to
internal company resources. This also creates the requirement for
maintaining the records on
both the internal and external DNS servers simultaneously. The attached
illustration shows
this configuration. Application Services:
Windows Server 2012 is installed on the network and the following
Active Directory features
will be implemented. Windows Deployment Services (WDS) will be
implemented to allows
network-based installation of Windows Operating Systems (OS) to
reduce the
complexity and cost of manual installation. This will require a WDS
Server as
a member of the Active Directory Domain Services (AD DS) domain.
This also
requires a Dynamic Host Configuration Protocol (DHCP) server with an
active scope sine PXE relies on DHCP for IP addressing.
Smart Card Authentication will require valid user principal names
(UPNs)
since they are required fo smart card login. Since a certificate authority
23. (CA)
will issue the domain controller certificates, the root certificate will be
added
to the Trusted Root Certification Authorities group policy in Active
Directory.
IP Address Management (IPAM) will be implemented to provide highly
customizable administrative and monitoring capabilities for the IP
address
infrastructure. IPAM will be used to discover, utilize, monitor, audit, and
manage IP address space in the network. This requires an IPAM server
that
has connectivity to existing DHCP, DNS, DC, and NPS servers in the
Active
Directory forest. WDS services will be hosted on the same computer as
DHCP.
This requires that WDS is configured so that it doesn’t listen on Port 67
and
DHCP option 60 will be used to notify a booting PXE client that there is
a
listening PXE server on the network. The server will also be configured
to
respond only to known client computers. This ensures that client
computers
are added to Active Directory before the image is deployed.
File Classification Infrastructure (FCI) will be implemented to ensure
that
automatic classification is performed. The different classifications will
be identified. Currently they are listed as Public and Confidential. The
properclassification will be applied to every file using FCI. This process
will be used
24. to ensure that Confidential data is properly stored on encrypted drives
and
that all confidential files are transmitted using encrypted methods.
Reporting
based on these classification tabs will allow administrators to detect and
respond to violations of the WWTC’s data classification policy.
Failover cluster services will be implemented so that the entire network
has
hardware, software, and storage redundancy. This independent group of
servers and storage devices will work together to increase the
availability of
applications and services. If one clustered device fails, another will
provide
the lost services (called failover). The cluster validation wizard will be
used to
ensure that all network components are compatible prior to
implementation. It
will also be used after implementation and as new devices are added to
the
network to maintain this capability. By implementing backup for all
servers
and storage, WWTC ensures that users experience a minimum of
disruptions
in service.
Cache encryption will be implemented to store encrypted data by
default. This
means that data in cache is stored encrypted by default providing data
security without requiring entire drive encryption.
BranchCache will be implemented to increase performance,
manageability,
25. scalability, and availability. Duplicate files are eliminated while hashes
and
local storage at branch offices drastically reduce the amount of required
WAN
traffic.
Bitlocker encryption will be used to protect all user and server data. The
benefit is that the entire drive is encrypted and only requires the user’s
normal
authentication to access the data. The bitlocker system on the wired
network
will be set up to automatically unlock the system volume during boot to
reduce
the internal help desk calls because of lost PINs. Group policy settings
will be
enforced that require either Used Disk Space Only or Full Encryption is
used
when BitLocker is enabled on a drive. Groups:
Users and computer accounts will be grouped to simplify administration
by controlling
permissions and rights rather than assigning them individually. Groups
in Active Directory
are objects that reside in the domain. Groups have a scope that identifies
the extent that they
are applied in the domain or forest. The three group scopes for WWTC
are outlined below: Domain local scope is used to manage accounts
within the domain. For
example, a user group that requires access to a printer can be setup so
that
access to a new printer can be done for the entire group at once instead
of
26. doing a permission list for all five users. The five users will have global
scope
and will be added to a domain local scope group that can be assigned
printer
access. Global scope is used for directory objects that require daily
maintenance,
such as user accounts, computer accounts, or groups that require
management across domains (such as a department in multiple
locations). Universal scope is used to consolidate groups that span
domains. Changes to
global scope groups doesn’t affect the universal scope group, but
changes to the universal scope group causes the entire membership of
the group to be
replicated to every global catalog in the forest.
The scope and Organizational Unit setup has been outlined in the below
diagram. The above structure was chosen so that Group Policy could be
applied to a select group of
users or resources without having to set policies for each individual user.
---------------------------------------------------------------------------------------
CMPS 11 Quiz5
FOR MORE CLASSES VISIT
www.tutorialoutlet.com
CMPS 11 Quiz5
This is a closed notes, closed book exam. June 3, 2013 Ok to leave out 1.
(2 points) Given the following variation on the IntListElement class
from class, what would be printed by the
program Main1? Put the output on the lines shown in the comments.
class IntListElement {
27. IntListElement(int value, IntListElement e) {
data = value;
next = e;
}
IntListElement next;
int data;
}
class Main1 {
public static void main(String args) {
IntListElement e1 = new IntListElement(1776,null);
e1 = new IntListElement(1984, e1);
e1 = new IntListElement(2001, e1);
e1 = new IntListElement(2013, e1);
System.out.println(e1.data);
// prints _______
System.out.println(e1.next.next.data); // prints _______
}
}
2. (2 points) Suppose the two println() calls in Main1 above were
replaced by the line
mystery(e1);
and the following method was added to the class Main1, what would be
printed?
static void mystery(IntListElement list) {
if (list != null) {
System.out.println(list.data);
mystery(list.next);
}
} 3. (0.5 pts) To have some code execute each time a button is pressed
you would put the code in the actionPerformed()
method of a class that implements ActionListener, let’s call it listener,
and then
A. Pass listener to a method of the button.
B. Pass the button to a method of listener.
C. Do both A and B.
28. D. None of the above, you would add the code to a method of a class
that extends JButton. 4. (0.5 pts) True or False? (circle one) A listener
object can be “listening” to multiple components and do different
things depending upon which component generates an event.
(0.5 pts) True or False? (circle one) A listener object can be “listening”
for one and only one type of event (e.g.
ActionEvents for clicks on buttons or MouseEvents to respond to mouse
motion like drawing but not both).
(0.5 pts) True or False? (circle one) Multiple listener objects can be
listening and execute code for a single event on
one component. For example, two different listeners could respond, each
in their own way, to a single button click.
(1 point) Write a complete program that prints the first 50 multiples of 3
(i.e. 3, 6, 9, … 150). 5.
6.
7. THERE ARE MORE QUESTIONS ON THE BACK 8. (1 point)
Write the method needed by this program. It prints true if the 3 numbers
read from the console are in
increasing order, and false otherwise. That is, each number must be
strictly larger than the previous. Entering 3 4 5
would result in true, but entering 3 3 5 would result in false as would 3 5
4.
import java.util.*;
class Ordered {
static final Scanner in = new Scanner(System.in);
public static void main(String args) {
boolean x = increasing(in.nextInt(), in.nextInt(), in.nextInt());
System.out.println(x);
}
} 9. (2 points) Write a method findLargest that takes a reference to an
IntListElement, list, and returns the value of the
largest integer stored in the list. E.g. If the list myList contained 3, 4, 5,
1 then x = findLargest(myList) would assign
x to be 5. You should assume that the list is not empty. (BONUS up to 3
points for overall quiz total for the quarter) Write a method get(), to be
29. added to the
IntListElement class from problem 1, that takes one integer parameters,
n, and returns the value stored in the data
field of the nth element of the list (starting with 0 being the first
element). For example if myList pointed to the list
containing the 5 elements 100, 200, 300, 400, 500 then executing x =
myList.get(3); would store 400 in x.
---------------------------------------------------------------------------------------
COM 140Project 3
FOR MORE CLASSES VISIT
www.tutorialoutlet.com
Project 3
1. Specification
The third programming project involves writing a program to calculate
the terms of the following sequence of
numbers: 0 1 1 3 5 11 21 43 … where each term is twice the second
previous term plus the previous term. The
0th term of the sequence is 0 and the 1st term of the sequence is 1.
The example below shows how to calculate the next sequence term:
Current sequence: 0 1
Current sequence: 0 1 1
Current sequence: 0 1 1 3
Current sequence: 0 1 1 3 5
… etc. Calculate next term: 2 * 0 + 1 = 1
Calculate next term: 2 * 1 + 1 = 3
Calculate next term: 2 * 1 + 3 = 5
Calculate next term: 2 * 3 + 5 = 11 The interface to the program should
be a Swing based GUI that looks similar to the following: The pair of
radio buttons allows the user to choose whether an iterative or recursive
method is used to compute
30. the term of the sequence. When the user enters a value for n and then
clicks the Compute button, the nth term of
the sequence should be displayed in the Result field. The Efficiency
field should contain the number of calls to the
recursive method when the recursive option is chosen and the number of
iterations of the loop when the iterative
option is selected. The program will check the validity of the user input
value which should be a positive integer. A
message will be shown in a JOptionPane for illegal entered values.
The Iterative radio button should be initially selected.
When the window is closed, the efficiency values should be computed
with values of n from 0 to 19 and written to
a text file outData.txt. Each line of the file should contain the value of n,
the efficiency of the iterative method for
that value of n and the efficiency of the recursive method. The values
should be separated by commas so the file
can be opened with Excel and used to graph the value of the efficiencies
for both the iterative and recursive
options along the y axis with the value of n along the x-axis. The graph
should be included in the solution
description document that accompanies this project and should also
contain a brief explanation of the observed
results.
The program should consist of two classes. 1 1. The first class P3GUI
should define the Swing based GUI and should be hand-coded and not
generated by a GUI
generator. In addition to the main method and a constructor to build the
GUI, an event handler will be needed to
handle the Compute button click and another handler will be needed to
produce the file described above when
the window is closed. The latter handler should be an object of an inner
31. class that extends the WindowAdapter
class.
2. The other class should be named Sequence. It should be a utility class
meaning that all its methods must be
class (static) methods and no objects should be able to be generated for
that class. It should contain three public
methods:
a. The first method computeIterative should accept a value of n and
return the corresponding element in
the sequence using iteration.
b. The second method computeRecursive should accept a value of n and
return the corresponding element
in the sequence using recursion. This method will initialize the
efficiency counter before calling the private
recursive method that will actually perform the recursive computation.
c. The third method getEfficiency will return the efficiency counter left
behind by the previous call to either
of the above two methods.
Your program should compile without errors.
The Google recommended Java style guide
(https://google.github.io/styleguide/javaguide.html) should be used to
format and document your code. Specifically, the following style guide
attributes should be addressed: Header comments include filename,
author, date and brief purpose of the program. In-line comments used to
describe major functionality of the code. Meaningful variable names and
prompts applied. Class names are written in UpperCamelCase. Variable
names are written in lowerCamelCase. Constant names are in written in
All Capitals. Braces use K&R style. In addition the following
design constraints should be followed: Declare all instance variables
private
Avoid the duplication of code Test cases should be supplied in the form
32. of a table with columns indicating what aspect is tested, the input
values, expected output, actual output and if the test case passed or
failed. This table should contain 5 columns
with appropriate labels and a row for each test case. Note that the actual
output should be the actual results you
receive when running your program and applying the input for the test
record. Be sure to select enough differentkinds of employees and
situations to completely test the program.
2. Submission Requirements
Submit the following to the Project 3 assignment area no later than the
due date listed in your LEO classroom.
1. Source files P3GUI.java, Sequence.java and the program generated
output file outData.txt. The source code
should use Java code conventions and appropriate code layout (white
space management and indents) and
comments. All submitted files may be included in a .zip file. 2 2. The
solution description document P3SolutionDescription (.pdf or .doc /
.docx) containing the following:
(1) Assumptions, main design decisions, error handling;
(2) Test cases table
(3) The graph of the value of the efficiencies for both the iterative and
recursive options along with a brief
explanation of the observed results.
(4) Screen captures showing successful program compilation and test
cases execution. Each screen capture should
be properly labeled, clearly indicated what the screen capture represents.
(5) Lessons learned from the project;
3. Grading Rubric
The following grading rubric will be used to determine your grade:
Attribute
P3GUI class Meets
33. 40 points Does not meet
0 points a) Defines the GUI. a) Does not define the GUI. b) Contains a
pair of radio buttons
allowing the user to choose whether an
iterative or recursive method is used to
compute the term of the sequence. b) Does not contain a pair of radio
buttons
allowing the user to choose whether an
iterative or recursive method is used to
compute the term of the sequence. c) Allows the user to enter a value for
n
and click the Compute button, to
display the nth term of the sequence in
the Result field. c) Does not allows the user to enter a
value for n and click the Compute button,
to display the nth term of the sequence in
the Result field. d) User input value is checked and
warning message is displayed if the
entered value is not a positive integer. d) User input value is checked
and warning
message is displayed if the entered value
is not a positive integer. e) Allows the Efficiency field to contain
the number of calls to the recursive
method when the recursive option is
chosen and the number of iterations of
the loop when the iterative option is
selected. e) Does not allow the Efficiency field to
contain the number of calls to the
recursive method when the recursive
option is chosen and the number of
iterations of the loop when the iterative
34. option is selected. f) The Iterative radio button is initially
set to selected. f) The Iterative radio button is not initially
set to selected. g) When the window is closed, the
efficiency values computes with values
of n from 0 to 19 and writes them to a
file.
h) Each line of the output file contains
the value of n, the efficiency of the
iterative method for that value of n and 3 g) When the window is closed,
the
efficiency values does not compute with
values of n from 0 to 19 and the output
file is not generated.
h) Each line of the output file does not
contain the value of n, the efficiency of the efficiency of the recursive
method.
i) The values of the output file are
separated by commas so the file can be
opened with Excel.
j) Provides an event handler to handle
the Compute button click and another
handler will be needed to produce the
file described above when the window
is closed. The latter handler is an object
of an inner class that extends the
WindowAdapter class. Sequence Class Test Cases the iterative method
for that value of n
and the efficiency of the recursive
method.
i) The values of the output file are not
separated by commas so that the file can
35. be opened by Excel. 30 points j) Does not provides an event handler to
handle the Compute button click and
another handler will be needed to
produce the file described above when
the window is closed. The latter handler is
an object of an inner class that extends
the WindowAdapter class.
0 points a) All methods are class (static)
methods. a) All methods are not class (static)
methods. b) Contains three public methods. b) Does not contain three
public methods. c) Contains computeIterative method
that accepts a value of n and returns
the corresponding element in the
sequence using iteration. c) Does not contain the computeIterative
method that accepts a value of n and
returns the corresponding element in the
sequence using iteration. d) Contains method computeRecursive
that accepts a value of n and returns
the corresponding element in the
sequence using recursion. d) Does not contain the computeRecursive
method that accepts a value of n and
returns the corresponding element in the
sequence using recursion. e) The computeRecurvise method will
initialize the efficiency counter before
calling the private recursive method
that will actually perform the recursive
computation. e) The computeRecurvise method does
not initialize the efficiency counter before
calling the private recursive method that
will actually perform the recursive
computation. f) The getEfficiency method returns the
36. efficiency counter left behind by the
previous call to either of the above two
methods.
10 points f) The getEfficiency method does not
return the efficiency counter left behind
by the previous call to either of the above
two methods.
0 points a) Test cases are supplied in the form
of table with columns indicating test
case objective, the input values,
expected output, actual output and if
the test case passed or failed. a) No test cases were provided. b) Enough
scenarios selected to 4 completely test the program. Documentation and
Style
guide c) Test cases were included in the
supporting word or PDF
documentation.
20 points
a) Solution description document
P3SolutionDescription includes all the
required sections appropriate titled. 0 points
a) No solution description document is
included.
Source code criteria Source code criteria
b) Header comments include filename,
author, date and brief purpose of the
program.
c) In-line comments used to describe
major functionality of the code.
d) Meaningful variable names and
prompts applied.
37. e) Class names are written in
UpperCamelCase.
f) Variable names are written in
lowerCamelCase.
g) Constant names are in written in All
Capitals.
h) Braces use K&R style.
i) Declare all instance variables private.
j) Avoids the duplication of code. 5 b) Java style guide was not used to
prepare the Java code.
c) All instance variables not declared
private.
d) Duplication of code was not avoided.
---------------------------------------------------------------------------------------
COP 3330 Upon completion of this program
FOR MORE CLASSES VISIT
www.tutorialoutlet.com
Objective
Upon completion of this program,you should gain experience with the
use of managing arrays inside of a class. ABETISMALCS Assessment
This assignment is designated as one of the course assignments being
used to assess basic programming skills for ABETISL‘LALCs
requirements. Please see the syllabus for details. Note that
in addition to the normal grading scales, each student‘s submission Will
be judged in several aspects on a scale of "HighlyEffwtive",
”Effective", or "Ineffective" , as specified by
ABETISNIAIES outcome assessment procedures. A student's
submission that earns 70% of the available points will count as an
overall score of ”Effective". Task You will write a class called
38. Grid, and test it with a couple of programs. A Grid object will be made
up or" a grid of positions, numbered with rows and columns. Row
and column numbering
start at 0. at the top left corner of the grid. A grid object also has a
"mover". which can move around to different locations on
the grid. Obstacles (which block the mover) and other objects
(that can he placed or picked up) are also available. Here is a sample
picture of a Grid object: O . . This is 3 Grid object with 4 rows and 4
columns (numbered 0 - 3).
. b . The mover ‘>' is at. row 1' column 2, facing eeet.
. . The obstacle ‘4“ is at row 3, column 1 . # . . The other item '0' ie at.
row 0, column 0 The E character indicates that the mover and an item
(0] currently occupy the same position on the grid. Program Details and
Requirements 1) Grid class Download this starter file: grid starter . h and
rename it as grid . 1:. Your member function prototypes are already
given in this file. You will need to add appropriate member data. You
will
also need to define each of the member functions in the file grid.cpp.
You may add Whatever member data you need, but you must store the
grid itself as a two-dimensional array. Maximum
grid size will be 40 rows and 40 columns.
---------------------------------------------------------------------------------------
COSC 2315 Implement aprogram that will use a stack
FOR MORE CLASSES VISIT
www.tutorialoutlet.com
Implement as program that will use a stack structure to check for correct
placement of parentheses in an algebraic expression. Allow the use of (
) [ ] { } characters as grouping symbols. Make sure that an error is
reported for an expression of a form (...]. In addition report other
possible parentheses related errors (too many levels, too many right
paren., too many left paren.). Make sure to use 'silent error reporting'
(and report any possible errors outside the main scanner loop).
39. Hint - start with the program that checks '(...)' and when all the common
errors are correctly reported, expand the parentheses syntax to ([{...}])
---------------------------------------------------------------------------------------
CS 161Assignment 4 Strings and Function
FOR MORE CLASSES VISIT
www.tutorialoutlet.com
Assignment 4
Strings and Functions
Due: Sunday, February 19, 2017 11:59pm
(90 pts) Problem Statement: Wheel of Fortune
You will implement the program for playing a modified Wheel of
Fortune. The game must allow
a user to enter the number of rounds to play and a new secret message
(possibly containing
blanks) with each round, and print the number of dashes/slots for the
message (spaces do not
get dashes, just the space).
If you are not familiar with the game of Wheel of Fortune, then you can
watch an episode on
YouTube: https://www.youtube.com/watch?v=A8bZUXi7zDE
NOTE: I realize there are solutions to assignments online, but resist the
temptation of using
these because the assignments are checked against online resources,
code submitted by
classmates, and code submitted by prior students for
cheating/plagiarism. It is much more
gratifying to complete this on your own. Make sure you take time to
design well!!!
The game can play with 1-3 players, and it continues a round, until
someone solves the puzzle
correctly. A new puzzle is given with each round. In this Wheel of
40. Fortune, you won’t win as
much or any prizes, but you might go bankrupt or lose a turn!!! Your
random numbers are only
from 0-21, with 0 being bankrupt, 1-20 being the dollar amount earned
per letter found in the
puzzle, and 21 is lose a turn.
The game begins by asking the first player if he/she wants to spin the
wheel, buy a vowel, or
solve the puzzle. On a player’s first turn, it might not make sense to
choose anything other than
spinning the wheel, but a player is given these three choices at all times
during their turn, until
they guess an incorrect non-vowel letter, incorrectly solve the puzzle, or
spin a 0 or 21.
If the player chooses to spin and the spin is >0 and <21, then the
player is asked to guess a
non-vowel letter. If the non-vowel letter was not found in the puzzle,
then the player loses their
turn to the next player. If the non-vowel letter is found in the puzzle,
then the player wins the
number of letters found times (*) the dollar amount spun.
If a player spins a 0, then the player’s earnings go to a zero in that round,
and the next player
gets the three choices to spin the wheel, solve the puzzle, or buy a
vowel. If a player spins a
21, then the player’s keeps the round earnings, but the next player gets
the three choices to
spin the wheel, solve the puzzle, or buy a vowel.
If a player chooses to solve the puzzle and does so correctly, then the
player gets to keep all
the money earned in that round, while all other players lose their money
in that round. If a
player chooses to solve the puzzle and does so incorrectly, then the turn
goes to the next
player.
41. A player can only buy a vowel when his/her earnings are >= $10,
which is the one-time amount
paid for each vowel guess, regardless of whether the vowel is found.
The player who has the most money after N rounds is the winner!
A few rule specifics: You have a total round earnings and a total game
earnings. You always get a choice of spinning the wheel, solving the
puzzle, or buying a vowel
during your turn, buy you cannot buy a vowel if you have less than $10.
You lose your turn by incorrectly guessing a non-vowel letter on a spin,
spinning a 0 or
21, or incorrectly solving the puzzle. If you spin > 0 or <21, then
you get the number spun times (*) the number of non-vowel
letters found added to your round total.
If you spin a 0, then you go bankrupt in the round (lose your round
total), and it ends
your turn.
If you spin a 21, then you keep your round total, but it ends your turn.
You can buy a vowel for $10, and you only pay the $10 vowel purchase
once on a
guess, independent of how many are found.
If you solve the puzzle correctly, then you keep the money earned for
that round and add
it to your total game earnings.
You win the game by having the most game earnings, not round
earnings!!! Your program must print out 1) the number spun on the
wheel,2) the number of letters found for
a guess, 3) the total round earnings, 4) the message with the correctly
guessed slots and blank
slots, 5) if the user guesses the message, then a winner message and the
total game earnings
for all players, and 6) after all rounds are played, a message with the
winning player.
Program Requirements: Only use C++ strings, no need for an array!
Hint: use two strings! Your program must ignore cases in the message.
Each function, including main, may not have more than 15 lines of code
42. (this doesn’t include
curly braces, variable declarations, comments, and blank spaces!). You
are not allowed to use global variables.
Read the C++ string documentation to help with this assignment:
http://www.cplusplus.com/reference/string/string/?kw=string
**You can decide how many incorrect guesses a user gets before they
lose. In addition, you can
use the system(“clear”); command from the <cstdlib> to clear the
screen, after the user enters
their message. Yes they can scroll above to see the message, but we
aren’t cheaters!!!
Example Run:
Enter a message: National Park Service
How many players do you have? 2
How many rounds for winning? 1
The message is _ _ _ _ _ _ _ _ ____ _______ Player 1:
Do you want to spin (1), solve the puzzle (2), or buy a vowel (3): 1
Your wheel landed on 20
Guess a letter: n
2 found. Total: $40
The message is N _ _ _ _ n _ _ ____ _______ Do you want to spin (1),
solve the puzzle (2), or buy a vowel (3): 1
Your wheel landed on 10
Guess a letter: l
1 found. Total: $50
The message is N _ _ _ _ n _ l ____ _______ Do you want to spin (1),
solve the puzzle (2), or buy a vowel (3): 3
Guess a vowel: a
3 found. Total: $40
The message is N a _ _ _ n a l _ a _ _ _ _ _ _ _ _ _ Do you want to spin
(1), solve the puzzle (2), or buy a vowel (3): 1
Your wheel landed on 0
Total: $0
The message is N a _ _ _ n a l _a__ _______ Player 2:
Do you want to spin (1), solve the puzzle (2), or buy a vowel (3): 1
43. Your wheel landed on 5
Guess a letter: r
2 found. Total: $10
The message is N a _ _ _ n a l _ar_ __r____ Do you want to spin (1),
solve the puzzle (2), or buy a vowel (3): 1
Your wheel landed on 10
Guess a letter: t
1 found. Total: $20
The message is N a t _ _ n a l _ar_ __r____ Do you want to spin (1),
solve the puzzle (2), or buy a vowel (3): 2
Guess message: National Park Service
You are correct! Player 2 wins round 1.
Player 1 total: $0
Player 2 total: $20
Player 2 wins game!
(10 pts) Extra Credit Error Handling
Make it so that your program never errors on users input! Handle the
following errors: The user enters a message or letter outside of A-Z and
a-z. The user enters an invalid menu choice. The user enters a vowel for
a non-vowel guess. The user enters a non-vowel for a vowel guess.
(-10 pts) Automatic Deduction: You are not allowed to use global
variables in any assignment
in CS 161. There isn’t any practical purpose for them in this course.
Keep this in mind as you
design your program with functions.
(10 pts) Program Style/Comments
In your implementation, make sure that you include a program header in
your program, in
addition to proper indentation/spacing and other comments! Below is an
example header to
include. Make sure you review the style guidelines for this class, and
begin trying to follow
them, i.e. don’t align everything on the left or put everything on one
line!
http://classes.engr.oregonstate.edu/eecs/winter2017/cs161-
44. 001/161_style_guideline.pdf
You are graded on having a header, function headers with pre/post
conditions, proper
comments, and readable code with indentation and vertical spacing that
is CONSISTENT
throughout your program. DO NOT align your entire program on the left
side. This will cause
you to automatically lose the full 10 points. In addition, do not forget
your program header!!!
Electronically submit your C++ program (.cpp file, not your
executable!!!) by the assignment due
date, using TEACH.
---------------------------------------------------------------------------------------
CS 192 Let’s think about the use of Lists in everyday life
FOR MORE CLASSES VISIT
www.tutorialoutlet.com
Let’s think about the use of Lists in everyday life. Provide an example
and discuss the advantages and disadvantages of using these types of
Lists.
---------------------------------------------------------------------------------------
CS 210 Introduction to Programming Java Programming
Assignment
FOR MORE CLASSES VISIT
www.tutorialoutlet.com
CC& The output file will contain a list of vehicle license plate numbers
(accessed via agetter) and the fine associated with that license, with the
fines right-aligned on thedecimal poi§ If the file opened successfully,
generate a report and write it to the output file.§ Define an instance
method to produce a fines report.The method will create an output file
47. lawProgramRequirementsThis program will implement two different
types of arrays. One array will hold ticket objects, and willrequire an
implementation class. The other array will contain primitive data type
double values, and willnot require an implementation class.NOTE: The
ticket array and the fines array will be parallel arrays. This means that
thefine will be stored into the fines array using the same index as the
ticket object in theticketarray.NOTE: For an example of a Java program
implementing arrays, see Online Content section 15.10.Required Classes
and MethodsThree separate classes will be required for this
program.· Produce an output file, containing the vehicle license plate
numbers and speeding fines.· Calculate the speeding ticket fines to
assess, based on the ticket data, and store the fines into asecond array
that holds double values. This array will be sized to the number of
tickets issued.· Read the data from the file, line by line, and store the
data into an array that holds ticket dataobjects. This array will hold a
maximum of 200 ticket data objects.·ISCS210 Introduction to
ProgrammingJava Programming Assignment 8: Array
ImplementationNOTE: This assignment will be more challenging than
the previous assignments, so make sure tostart early and allocate enough
time to complete it, including time you might need to seek
anynecessaryhelp.Since this is the last program, the program may not be
submitted more than 1 day late!ProblemSummaryA local city would like
you to write a program to help them analyze data on speeding tickets.
City policehave collected information about the speeding violations.
They store data about each ticket issued duringa one week period in a
text data file. Data collected for each ticket includes the vehicle license
platenumber, the speed limit, and the clocked speed. From past data, the
police department knows that it willnot issue more than 200 tickets per
week.You may assume all data in input data file is valid data (i.e.
formatted correctly), but you must verify thatthe file exists (i.e. can be
opened). If the file does not exist, the program will loop until you enter
thefilename for a file that can be opened.Sample input data file
lines:BBB222 50 60XYZ123 40 45A1B2C3 30 51The police
department would like you to write a program to read the file, calculate
the fines to assess, andgenerate several reports. The program will: Then
51. www.tutorialoutlet.com
CS 331, Spring 2017 Assignment #2
Greg Plaxton
January 31, 2017
For this assignment, you are required to turn in solutions to any two of
Problems 1
through 4, which appear in Section 2 below. Your solutions are due at
the beginning of class
on Thursday, February 9. Please refer to the course syllabus for the
ground rules concerning
collaboration, and for the slack day policy governing lateness.
Any corrections or clarifications related to this assignment will be
announced in the
lectures and on Piazza. You are responsible for being aware of any such
announcements. 1 Exercises The following textbook exercises are
recommended to help you to prepare for the tests. We
will not be grading your solutions to these exercises, so you do not need
to turn anything in.
1. Exercise 3.10, page 110.
2. Exercise 3.12, page 112.
3. Exercise 4.15, page 196.
4. Exercise 4.28, page 203. 2 Programming & Problem Solving In
this part of the assignment, we continue our investigation of the SMI
problem introduced
in Assignment 1.
In the first lecture (see also Section 1.1 of the textbook), we described
the deferred
acceptance algorithm for the SM problem. We showed that given any
instance I of the SM
problem, the deferred acceptance algorithm produces a stable matching.
52. In Problem 3 of
Assignment 1, we showed that there is a natural way to modify the
deferred acceptance
algorithm so that it produces a stable matching on any given SMI
instance.
When we discussed the deferred acceptance algorithm for the SM
problem, we showed
that the stable matching µ it produces is “man-optimal” in the sense that
each man likes
1 University of Texas at Austin
Department of Computer Science Algorithms and Complexity
CS 331, Spring 2017 his partner in µ at least as well as his partner in any
other stable matching. The concept of
man-optimality is easily adapted to the context of the SMI problem; in
this context, we just
need to bear in mind that an agent’s partner in a given matching might
be “no partner”, i.e.,
being single is a possible outcome. Using arguments similar to the
corresponding arguments
for SM, it can be shown that for the SMI problem, the stable matching
produced by the
deferred acceptance algorithm (i.e., the version that we developed in
Problem 3 of Assignment 1) is man-optimal. It follows that even though
the deferred acceptance algorithm is
nondeterministic — and hence can execute in many different ways on a
given SMI instance
— the final output is uniquely determined; in the problem hints below,
we refer to this as
the “confluence property” of the deferred acceptance algorithm.
For any instance I of the SMI problem, we define da(I) as the stable
matching produced
53. by the deferred acceptance algorithm, and we define matched (I) as the
set of men who are
matched (i.e., not single) in da(I).
For any SMI instance I, any woman q in I, and any man p who is not in
I, we define
add (I, p, q) as the set of all SMI instances that are the same as I except
that (1) p is added
to the set of men, (2) the preferences of p are such that q is acceptable to
p and all other
women are unacceptable to p, and (3) the preferences of each woman in
I are augmented to
incorporate p. To clarify (3), consider a woman q 0 in I who finds ` of
the men in I to be
acceptable. There are ` + 2 ways for q 0 to augment her preferences to
incorporate p: she can
classify p as acceptable, in which case there are ` + 1 different ways she
can insert p into her
strict ranking of acceptable men, or she she can classify p as
unacceptable.
In the statement of Problem 1 below, we use the symbol ∅ as follows: If
we say that a
woman q prefers a man p to ∅, we mean that q considers p to be
acceptable; conversely, if
we say that q prefers ∅to p, it means that q considers p to be
unacceptable.
Problem 1. Let I be an SMI instance and let q be a woman in I. Prove
that there is a
unique element x of matched (I)+∅ such that the following conditions
hold for any man p who
is not in I and any SMI instance I 0 in add (I, p, q): if q prefers p to x in I
0 , then p is matched
54. to q in da(I 0 ); otherwise, p is single in da(I 0 ). Hints: (1) Use the
confluence property of the
deferred acceptance algorithm; (2) Observe that once execution of the
deferred acceptance
algorithm reaches a state where there is exactly one single man who has
not proposed to all
of his acceptable women, the rest of the execution is deterministic.
Definition: For any SMI instance I and any woman q in I, we define the
unique element
x identified in Problem 1 as threshold (I, q).
Problem 2. Let I be an SMI instance, let q be a woman in I, let p be a
man who is
not in I, and let I 0 be an SMI instance in add (I, p, q). Prove that no
woman q 0 in I prefers
threshold (I, q 0 ) to threshold (I 0 , q 0 ). Hints: (1) Use proof by
contradiction, i.e., assume that
there is a woman q 0 who prefers threshold (I, q 0 ) to threshold (I 0 , q 0
), and derive a contradiction;
(2) Use the confluence property of the deferred acceptance algorithm.
Problem 3. Let I be an SMI instance, let q be a woman in I, let p be a
man who
is not in I, and let I 0 be an SMI instance in add (I, p, q). Prove that if p
is single in
2 University of Texas at Austin
Department of Computer Science Algorithms and Complexity
CS 331, Spring 2017 da(I 0 ), then threshold (I 0 , q 0 ) = threshold (I, q
0 ) for every woman q 0 in I. Hints: (1) Use
proof by contradiction, i.e., assume p is single in da(I 0 ) and there is a
woman q 0 such that
threshold (I 0 , q 0 ) 6= threshold (I, q 0 ), and derive a contradiction; (2)
Use the result of Problem 2;
55. (3) Use the confluence property of the deferred acceptance algorithm.
Problems 1 through 3 above are concerned with modifying an SMI
instance I by adding
a new man. We now consider a way to modify an SMI instance without
adding a new agent.
For any SMI instance I, any woman q in I, and any man p in I who is
single in da(I)
and considers q to be unacceptable, we define extend (I, p, q) as the SMI
instance I 0 that is
identical to I except the preferences of man p are modified as follows:
man p moves woman q
from his unacceptable set to the the least-preferred position in his
ordered list of acceptable
women.
The arguments used for solving Problems 1, 2, and 3 are easily adapted
to establish
Lemma Extend below; the proof is omitted.
Lemma Extend. Let I be an SMI instance, let q be a woman in I, let p be
a man in I
who is single in da(I) and considers q to be unacceptable, and let I 0
denote the SMI instance
extend (I, p, q). If q prefers p to threshold (I, q), then p is matched to q in
da(I 0 ); otherwise,
p is single in da(I 0 ) and threshold (I 0 , q 0 ) = threshold (I, q 0 ) for
every woman q 0 i
---------------------------------------------------------------------------------------
CS210 Introduction to Java Programming Assignment
FOR MORE CLASSES VISIT
56. www.tutorialoutlet.com
CS210 Introduction to Programming
Java Programming Assignment 8: Array Implementation
NOTE: This assignment will be more challenging than the previous
assignments, so make sure to
start early and allocate enough time to complete it, including time you
might need to seek any
necessary help.
Since this is the last program, the program may not be submitted more
than 1 day late!
Problem Summary
A local city would like you to write a program to help them analyze data
on speeding tickets. City police
have collected information about the speeding violations. They store
data about each ticket issued during
a one week period in a text data file. Data collected for each ticket
includes the vehicle license plate
number, the speed limit, and the clocked speed. From past data, the
police department knows that it will
not issue more than 200 tickets per week.
You may assume all data in input data file is valid data (i.e. formatted
correctly), but you must verify that
the file exists (i.e. can be opened). If the file does not exist, the program
will loop until you enter the
filename for a file that can be opened.
Sample input data file lines:
BBB222 50 60
XYZ123 40 45
A1B2C3 30 51
The police department would like you to write a program to read the file,
57. calculate the fines to assess, and
generate several reports. The program will: Read the data from the file,
line by line, and store the data into an array that holds ticket data
objects. This array will hold a maximum of 200 ticket data objects.
Calculate the speeding ticket fines to assess, based on the ticket data,
and store the fines into a
second array that holds double values. This array will be sized to the
number of tickets issued. Produce an output file, containing the vehicle
license plate numbers and speeding fines. Analyze the fines to determine
the high, low, and average fines, and display the results. Here are the
formulas the city uses for calculating a speeding ticket fine:
Ticket Fine = Court costs ($45.00)
+ a fee for each mile per hour (MPH) by which the speed limit was
exceeded
The fee will be levied as follows:
MPH Over Speed Limit
up to 10
over 10 and up to 20
over 20 Fee per MPH Over Speed Limit (for all MPH over limit)
$ 4.25
$ 6.00
$ 8.10 You must define constants to hold all fixed values (court costs,
MPH over speed limits, and fees per
MPH) in the above chart within your method that calculates the fines.
Requirements
This program will implement two different types of arrays. One array
will hold ticket objects, and will
require an implementation class. The other array will contain primitive
data type double values, and will
not require an implementation class.
NOTE: The ticket array and the fines array will be parallel arrays. This
58. means that the
fine will be stored into the fines array using the same index as the ticket
object in the
ticket array.
NOTE: For an example of a Java program implementing arrays, see
Online Content section 15.10.
Required Classes and Methods
Three separate classes will be required for this program. A class to
define a SpeedingTicket object
A class to implement the object array (to hold SpeedingTicket objects)
A main class to run the program 1. Create a new Java NetBeans project,
named as follows:
LastnameJavaAssn8
For example: SmithJavaAssn8
2. Define a Java class with properties and methods for a speeding ticket
object, named:
SpeedingTicket The class will have the following private data
properties: vehicle license plate number (a 6-character String) the speed
limit the clocked speed
Within the SpeedingTicket class: Define a constructor, with parameters
for each data property.
o Use the parameters to initialize the values. Define getters for each data
property. 3. Define a second class that will implement the ticket array
for this program, named:
TicketArrayImpl The class will have the following public data
properties: A static constant array size (maximum items that can be held
in the array) set to 200
The class will have the following private data properties: A ticket data
array (to hold SpeedingTicket objects) A count of actual ticket objects
stored
Note: The data property definitions will only define the array reference
59. variable.
It will not create the array object. Unauthorized distribution (including
uploading to any non-Regis Internet website) violates copyright law
Within the TicketArraysImpl class: Define a constructor that will:
o Instantiate a ticket array object (using new to initialize the array
reference variable and
the constant array size) o Initialize the count of tickets stored to 0 Define
an instance method to add one SpeedingTicket object to the ticket data
array.
The method will:
o Have one parameter, the ticket object to add
o Test to see if the array is full If the array is full, will throw an
ArrayIndexOutOfBoundsException Include a message to pass to the
exception handler that states the
array is full and stating which license cannot be added.
Otherwise, store the ticket object into the array and increase the ticket
count Define a method to read all the data from the input file and store
the ticket data by adding
SpeedingTicket objects into the array. The method will:
o Have one parameter: the name of the data input file (String) o Return
an int value If the file was opened successfully, the method will return
the number of tickets
stored in the array. Otherwise, it will return 0, to indicate the file could
not be opened/read. o Implement code to try to open the input data file.
If the file opened: Display a message that the program is reading the file
data In a loop: Read the three data items from one line of data in the
input data file Call the constructor to create a new SpeedingTicket
object. Try to call the instance method to add the ticket object to the
ticket data
array
(this is an instance method of the TicketArrayImpl class) Catch any
60. thrown ArrayIndexOutOfBoundsException exceptions. Display the
message passed back via the throw. Also display a message that no more
data will be read from the file. Set a value to exit the loop (so no more
data will be read).
Loop until there is no more file data or an exception is thrown. o Close
file.
Display the number of SpeedingTicket objects stored in the ticket data
array. Catch any FileNotFoundException exceptions. When caught:
Display a message that explains which file could not be opened. o
Return the count of tickets stored in the array Define a method to
calculate and store values in the fines array. The method will:
o Have one parameter, the empty fines array o Define constants for all
fixed values in the calculations (from page 1 of this assignment). o For
each ticket stored in the ticket array: Access the clockedSpeed and
speedLimit data stored in the object using getters. Calculate the ticket
fine. Store the calculated fine in the fines array. Define an instance
method to produce a fines report.
The method will create an output file with the fines report. The method
should:
o Have one parameter, the fines array o Read the filename for the report
output file from the user. o Try to open the report output file If the file
opened successfully, generate a report and write it to the output file. The
output file will contain a list of vehicle license plate numbers (accessed
via a
getter) and the fine associated with that license, with the fines right-
aligned on the
decimal point. The last line of the output file will contain the total of all
fines collected, rightaligned on the decimal point, with the fines listed
above it.
Sample output file
BBB222
62. input file (sends a message to the TicketArraysImpl object).
Loop until the method returns a number other than 0, indicating the file
was read (and
that the ticket data array now has ticket data stored in it). Display a
message to the user, that the program is calculating the fines. Define an
array (to hold double fines), the same size as the array for ticket objects.
Uses the TicketArraysImpl object to call: The instance method to
calculate the fines and store them in the array The instance method to
produce a fines report Execute the static method to display a ticket
summary. Ask the user whether to run the program again, using a
different input file. Loop until the user says s/he does not want to run the
program again.
Sample Run
This program will run analyses on weekly speeding ticket data files
Enter input filename: tickets
Cannot open input file: tickets
Enter input filename: tickets.txt
Reading ticket data...
Data stored for 3 tickets
Calculating fines...
Done!
Enter name of report output file: report.txt
Week's Ticket Analysis for 3 tickets issued:
Lowest ticket fine
66.25
Average ticket fine
122.95
Highest ticket fine
215.10
Run program again with another file (y/n)? n WARNING: The objects,
classes, and methods must be implemented exactly as specified above.
63. If your program produces correct output, but you did not create and use
the objects as specified,
and implement the required classes and methods, you will lose a
significant number of points.
See last page of the file for outline of code for the three required
classes.. The program must follow the CS210 Coding Standards from
Content section 6.10.
Be sure to include the following comments:
o Comments at the top of each code file describing what the class does
Include tags with the author’s name (i.e. your full name) and the version
of the
code (e.g. Java Assn 4, version 1.0)
o Comments at the top of each method, describing what the method does
Include tags with names and descriptions of each parameter and return
value.
Testing
You will need to create test data files to test your program. In
combination, all your test data files should
test every possible execution path within your code, including erroneous
data which cause exceptions.
Before you submit your project, add your all files you used to test your
program in the top level of your
project directory (and add a number to the end of each file, if there are
multiple test data files).
File examples: datafile1.txt
datafile2.txt (numbered, if multiple data files tested) Submission
This programming assignment is due by midnight of the date listed in
the Course Assignments by Week.
REMINDER: Programs submitted that do not compile without errors
will not be accepted.
Again, you will submit a single zip file containing all of the files in your
64. project. First export your project from NetBeans, as detailed in previous
assignments
o Name your export file in the following format:
<lastname>Assn<x>.zip For example: SmithAssn8.zip
NOTE: Save this zip file to some other directory, not your project
directory. Then submit your .zip file to the Java ProgAssn 8 assignment
submission folder (located under
the Assignments/Dropbox tab in the online course).
o Warning: Only NetBeans export files will be accepted.
Do not use any other kind of archive or zip utility. Grading
Programs will be graded using the rubric that is linked on the same
assignment page as this file.
WARNING:
Programs submitted more than 1 day past the due date will not be
accepted,
and will receive a grade of 0* Description of class and author and
version tags
*/
public class SpeedingTicket {
// ticket data fields go here
// constructor with parameters (and comments) goes here
// getters (with comments and return tags) go here
}
/**
* Description of class and author and version tags
*/
public class TicketArrayImpl {
// static constant array size goes here
// data fields go here (ticket array and ticket count)
// constructor without parameters (nd comments) goes here
//
65. (instantiates ticket array object and initializes ticket count)
// method to add ticket object to ticket array goes here
(with comments and parameter tag)
// method to read ticket data from file goes here
(-includes comments with parameter and return tags
-creates a ticket object for each ticket and
-calls previous method to add the object to the ticket array)
// method to calculate fines/store into array goes here
(with comments and parameter tag)
// method to create the fines report goes here
(with comments and parameter tag)
}
/**
* Description of program, and author and version tags
*/
public class TicketAnalysis {
public static void main(String args) {
// code to define variables & display program description
// Loop:
// code to instantiate TicketArrayImpl object
// Loop:
// code to read filename and try to read data from the file
// code to create fines array
// code to call other methods
}
// three methods to calculate the fines average, low, and high go here
(includes comments with parameter and return tags)
// method to display a ticket summary (with comments and parameter
tags)
}
---------------------------------------------------------------------------------------