SlideShare a Scribd company logo
1 of 125
APMA 0160 Homework 5
FOR MORE CLASSES VISIT
www.tutorialoutlet.com
Homework 5
due Wednesday, March 8, 5pm
Submit zipped .m files on Canvas and printed published file in 182
George St box #15 or #16
You are encouraged to work with other students on this assignment but
you are expected to write
and work on your own answers. You don’t need to provide the name of
students you worked with.
You can find information about usage and syntax of any built-in Matlab
function by typing
help xfunctionnamey
in the Command window, where is the space character. You are
expected to submit
(I) a zipped file containing all your .m and any .out files online on
Canvas
(II) a printout of the files produced by the publish command of the filled
in template and all
other .m files your template uses in the dropbox in 182 George St lobby
(#15 for S01 and
#16 for S02)
Late homework will not be accepted without proper justification.
Problem 1 : Lagrangian interpolation
For this problem, you will find the unique polynomial of degree n, Πn ,
that goes through a set of datapoints
tpxk , yk qunk0 using Lagrangian interpolation. You will also measure
the maximum error in a given interval,
assuming that yk ’s are values of the Runge’s function. Write a Matlab
function with the definition
function [LPvalues] = LagrangePoly(xdata, ydata, xgrid)
where
xdata, ydata
LPvalues :
: vectors of the tpxk , yk quk0 datapoints
the vector of values of Πn on the respective locations in xgrid
n LPvalues must be computed using the Lagrange formulation
Πnpxq ¸ y φ pxq,
n k φkpxq k ¹ xx
n j
j 0
j k k 0 xkxj You may find the prod function useful here.
(a) Consider the set of points tp1, 4q, p2, 3q, p3, 5q, p4, 7q, p5, 2qu. Use
your LagrangePoly function to find
the values of the interpolating polynomial on the grid 1:0.01:5. Plot on
the same figure the datapoints
with orange circles and the interpolating polynomial on the grid 1:0.01:5
with a solid line.
(b) Repeat part (a) for the set of 11, 21, 31 uniformly distributed nodes
xk in
fRpxq 1 r1, 1s and ykfRpxk q, where 1
25x2 is Runge’s function on the grid -1:0.01:1. Use different colors
when plotting the interpolating polynomials
for each of the three cases and add a legend. Use ylim to show the plots
for 1 ¤ y ¤ 1. Print on the
screen a message for each case, stating the maximum absolute error
between the function values and the
interpolating polynomial values on the grid.
1 APMA0160, Spring 2017 Homework 5 (c) Repeat part (b) for the set
of 11, 21, 31 uniformly distributed nodes xk in rπ, πs and yk
grid -pi:0.01:pi.
(d) Repeat part (b) for the set of 11, 21, 31 Chebyshev-Gauss-Lobatto
nodes xk in
on the grid -1:0.01:1. sinpxk q on the r1, 1s and ykfRpxk q (e) Write in a
block of comments at the end of your prob1() function a few comments
about the behavior
of the maximum absolute error from parts (b)-(d). In particular, for parts
(b) and (c), explain how your
results are supported by what we saw in class regarding the bound of the
maximum absolute error. Problem 2 : Taylor’s polynomials for the sine
function
For this problem, you will approximate the sine function by its Taylor
polynomials of increasing degree. The
Taylor expansion for the sine function around x0 0 is
sin x ¸8 p1qk x2k 1 x x3
p2k 1q!
3!
k0 x5
5!
and it holds for all x P R. Your program will support this claim by
plotting the Taylor polynomials ¸ p1qk x2k
p2k 1q!
k0
N 1 which approach the sine function as N increases. Write a Matlab
function with the definition
function [c] = sinPoly(n)
where c is the vector of n
Taylor polynomial is n). 1 coefficients of the Taylor polynomial of order
n (i.e. the highest order of the Your function should check that the input
variable n is odd. If it is even, it should print an error message
and return c=0. You may find the mod function useful here. Using your
sinPoly function, plot on the same axes the function sinpxq and the
Taylor polynomials of degree
5, 9, 13, 17, 21 in r2π, 2πs on a grid of 1000 equally spaced points. You
may use polyval to evaluate the
polynomials on the grid. Use a legend to label the plotted curves and
place it outside of the figure. For eachdegree, print on the screen the
maximum absolute error between the sine function and the Taylor
polynomial
on the same grid. 2
---------------------------------------------------------------------------------------
CA 103Q1 File Size, Transmission Speed, and Transmission Time
FOR MORE CLASSES VISIT
www.tutorialoutlet.com
Cloud 9, a cloud storage service provider based in San Diego, has just
announced that it is running out of money and will be shutting down
operations soon. It has given all its clients fifteen (15) days to move their
data out, either back to their own facility or to an alternative service
provider.
Founded six years ago, Cloud 9 has since acquired 500 business clients,
who use Cloud 9's infrastructure to store archived data. Among these
clients, a few are large companies with several terabytes (TB) of data
archived at Cloud 9, but on average each client company stores about
400 Gigabytes (GB) of data on Cloud 9's disk drives. Cloud 9's
connection to the Internet is a Gigabit Ethernet line that has an effective
aggregate transmission rate of 1 Gbps (1,000,000,000 bits per second).
To make your calculations easier, a few assumptions have been made as
follows:
1. Cloud 9's Internet connection will be available 24 x 7 before the 15-
day shutdown deadline.
2. Even if new funding could be arranged, there would be no time to add
additional transmission lines to Cloud 9's facility before the deadline.
3. For regulatory compliance reasons, Cloud 9's clients cannot afford to
lose their archived data, but none of them has a secondary backup copy
of the data.
4. Each of Cloud 9's client has found adequate transmission and storage
capacity to receive the data to be moved back.
5. 1 GB = 1,0243 Bytes = 1,073,741,824 Bytes
Questions:
a.If all of Cloud 9's clients start moving their data out at the beginning of
the 15-day period by sharing Cloud 9's Internet connection, will there be
enough time to move all the data out? Show your calculations.
b. What alternatives do Cloud 9's clients have, other than moving their
data out over telecommunications lines?
---------------------------------------------------------------------------------------

CIS 115So when do you think you would use a WHILE loop for
an array
FOR MORE CLASSES VISIT
www.tutorialoutlet.com
So when do you think you would use a WHILE loop for an array, and
when would you use a FOR loop? Why?
Why wouldn't you always use a FOR LOOP?
---------------------------------------------------------------------------------------
CIS 489 Final Project: Project Plan
FOR MORE CLASSES VISIT
www.tutorialoutlet.com
Final Project: Project Plan
Due Week 10 and worth 300 points
This assignment consists of three (3) sections: a written project plan, a
revised Gantt chart or project plan, and a project plan PowerPoint
presentation. You must submit the three (3) sections as separate files for
the completion of this assignment. Label each file name according to the
section of the assignment for which it is written. Additionally, you may
create and / or assume all necessary assumptions needed for the
completion of this assignment.
While taking all business and project parameters into consideration,
make quality assumptions to support the following requirements.
Section 1: Written Project Plan
You are now in the final stage of the project plan development. All
previous documentation will be combined into one (1) document that
will serve as the statement of work for the project. Your goal is to have
the project approved by the executive team and the venture capital
group. The project plan is very detailed which is appropriate to
accomplish the monumental task of implementation. However, the
executive team is only interested in a ten (10) minute summation.
Therefore, you also must create a compelling executive summary that is
supported by your detail that convinces the executive group that your
solution is optimal.
1. Write an eight to ten (8-10) page executive summary in which you
provide a high-level technical overview of your project where you
address the following:
1.
1. Describe the scope of the project and control measures.
2. Describe the goals and objectives of the project.
3. Give a detailed, realistically estimated cost analysis of the entire
project.
4. Relate the value of the project plan solution to the competitive
advantage that information technology will afford your
organization.
5. Provide all aspects of the information technology implementation
into the project plan.
6. Use at least five (5) quality resources in this assignment. Note:
Wikipedia and similar Websites do not qualify as quality
resources.
Your assignment must follow these formatting requirements:
 Be typed, double spaced, using Times New Roman font (size 12),
with one-inch margins on all sides; citations and references must
follow APA or school-specific format. Check with your professor for
any additional instructions.
 Include a cover page containing the title of the assignment, the
student’s name, the professor’s name, the course title, and the date.
The cover page and the reference page are not included in the
required assignment page length.
 Include charts or diagrams created in MS Visio and MS Project as
appendix of the Word document. Make reference of these files in the
body of the Word document.
Section 2: Revised Gantt Chart / Project Plan
Use Microsoft Project or an open source alternative, such as Open
Project, to:
2. Update the Gantt chart or project plan (summary and detail) template,
from Project Deliverable 4: Infrastructure and Security, with all the
project tasks.
Section 3: Project Plan PowerPoint Presentation
Additional to your detailed executive summary you must present your
findings to the executive team and the venture capital group that, along
with the executive summary, will convince the group that your solution
is optimal.
3. Create a ten to fifteen (10-15) slide PowerPoint presentation in which
you:
a. Illustrate the concepts from your written report in Section 1 of this
assignment.
b. Create bulleted speaking notes for your presentation to the executive
board in the Notes section of the PowerPoint. Note: You may create or
assume any fictitious names, data, or scenarios that have not been
established in this assignment for a realistic flow of communication.
c. Use a professional technically written style to graphically convey the
information.
The specific course learning outcomes associated with this assignment
are:
 Demonstrate an understanding of existing and emerging information
technologies and strategic impact on organizational operations.
 Evaluate the issues and challenges associated with information
technology integration.
 Summarize the competitive advantage that information technology
affords to organizations.
 Use technology and information resources to research issues in
information technology.
 Write clearly and concisely about strategic issues and practices in the
information technology domain using proper writing mechanics and
technical style conventions.
---------------------------------------------------------------------------------------
CMGT 410 Cloud computing
FOR MORE CLASSES VISIT
www.tutorialoutlet.com
Cloud computing is a collection of individual technologies that become
one integrated technology for deployment.
Create a 3-page process map using Visio® showing the various
components of cloud computing and who has responsibility for the
implementation and support of the cloud. Additionally, include basic
cloud essentials, security, virtualization and databases.
Note: Responsible parties can include vendors, in-house IT, outsourced
IT, security team, or hybrid group
---------------------------------------------------------------------------------------
CMIS 102Homework 2Test Case Creation
FOR MORE CLASSES VISIT
www.tutorialoutlet.com
Homework 2 – Test Case Creation Using the following pseudocode,
provide 3 unique test cases that would help validate your
algorithm. Be sure to place the test cases in a table showing the input
values, and expected output
for each test case.
Write "Enter the price in dollars:"
Input Price
Write "Enter state sales tax(e.g. .06) :"
Input SalesTax
Set Price = Price + (Price * SalesTax)
Write "Price with Tax is" + Price Submit your word or PDF
file to your assignments folder no later than the due date. Grading
guidelines
Submission
A minimum of 3 test cases were provided.
Input provided and explained for each test case.
Expected output provided and explained for each test case.
Test cases represent a wide variety of possible input values (e.g. large
numbers,
small numbers (0), negative, or unexpected non-number entries).
Total Points
2
1
1
1
5
---------------------------------------------------------------------------------------
CMIS 111 Final Project
FOR MORE CLASSES VISIT
www.tutorialoutlet.com
Final Project
The final project for this course consists of two case studies related to
cybersecurity and the use of
social networking and home computer use. Please review the case
studies and respond using the
guidelines provided below.
Case Study 1: Securing your home computer
You just purchased a brand new computer for your home environment.
It comes with the latest
operating system, Internet connectivity and all accessories to complete
your home office and school
activities. You also have an Internet Service Provider where you can
easily use the existing network to
connect to the Internet and to perform some online banking.
Describe the steps you plan to go through to ensure this new computer
system remains as secure as
possible. Be sure to discuss the details of firewall settings you plan to
implement, browser privacy and
security settings, and recommended software (e.g., Anti-virus and
others) you will install. Also, describe
your password strength policy you plan to adopt, and what you envision
to do to ensure your online
banking site is encrypted and uses the proper certificates.
Discussion of operating system patches and application updates should
also be included. As you discuss
these steps, be sure to justify your decisions bringing in possible issues if
these steps are not followed.
You can discuss this for a specific type of computer (e.g. MAC or PC) to
make the scenario more
appropriate for your environment.
Case Study 2: Guidance for a family member using social networking
sites.
A family member, who just turned 13, wants to join Facebook, create a
Twitter account and start texting
his friends on a regular basis. For the purpose of this paper, let us
assume you are willing to allow your
family to participate in these social networking activities and the family
member has agreed to use your
advice to protect his or her privacy and security while participating in
these social networking activities.
Describe the specific guidance and rules that your family member must
adhere to for this activity to
move forward. Be sure to provide specific settings for Facebook and
Twitter as well as any guidance for
texting with friends. Be sure to discuss how to detect, prevent and report
issues such as cyber bullying,
identity theft, and child predatory behavior. Be sure to justify your
decisions bringing in possible issues if
the guidance you provided is not followed
Prepare a well-written paper no more than 10 pages in length.
In this paper you will address each of the above case studies. Be sure to
clearly separate the case
studies into separate sections of the paper. Only one paper is needed to
address both case studies
Submission requirements:
Your completed assignment should be saved as a Word (or PDF)
document and submitted to your LEO
assignments area no later than the due date listed in the syllabus. Your
document should be neat, wellwritten with minimal grammar and
spelling errors. You should name the file yournamefinalproject.docx (or
yournamefinalproject.pdf). So if my name was
Julie Smith, I would name my document juliesmithfinalproject.docx.
Your name should be clearly listed on the first page along with the
class/section, professor and due date.
Your document should contain page numbers at the bottom of each
page. Single or double space line
formatting is acceptable. All references used for your report should be
included in APA style format. See
the following APA reference guide for details on how to cite your
references:
http://www.umuc.edu/library/libhow/apa_examples.cfm
Grading guidelines
Submission
Case Study 1: Describes the steps you plan to go through to
ensure this new computer system remains as secure as
possible.
Case Study 1: Discusses the details of firewall settings you
plan to implement.
Case Study 1: Discusses browser privacy and security settings.
Case Study 1: Discusses the recommended software (e.g.,
Anti-virus and others) you will install.
Case Study 1: Describes the password strength policy you
plan to adopt.
Case Study 1: Describes what you envision to do to ensure
your online banking site is encrypted and uses the proper
certificates. Case Study 1: Discusses operating system patches and
application updates.
Case Study 1: Justifies your decisions bringing in possible
issues if your recommended steps are not followed.
Case Study 2: Describes the specific guidance and rules that
your family member must adhere to for this activity to move
forward.
Cast Study 2: Provides specific settings for Facebook and
Twitter as well as any guidance for texting with friends.
Case Study 2: discuss how to detect, prevent and report
issues such as cyber bullying, identity theft, and child
predatory behavior.
Case Study 2: Justifies your decisions bringing in possible
issues if the guidance you provided is not followed.
Document is well-organized, and contains minimal spelling
and grammar errors. The student’s name is clearly listed on
the first page along with the class/section, professor and due
date. The document contains page numbers at the bottom of
each page. Single or double space line formatting is used. APA
style format is used for references.
Total Points
5 5
5
5
5
5 5
10
5 10
10 10
20 100
---------------------------------------------------------------------------------------
CMIT 495 Active Directory Policy Statement General Active
Directory Forest
FOR MORE CLASSES VISIT
www.tutorialoutlet.com
1. Active Directory Policy Statement
General
Active Directory Forest :
Deployment of one Active Directory Forest will suffice for WWTC’s
requirments.
There are not requirements for data isolation within WWTC’s Active
Directory configuration
and any data separation can be performed using data isolation. A
single-forest was chosen
because it is very cost-effective and requires the least amount of
administrative support. For
example, with only one forest, the global catalog does not require
synchronization across
forests and management of a duplicate infrastructure is not required.
An organizational forest
model will be used with user accounts and resources contained in the
forest and managed
independently. The forest will be used to provide service and data
isolation. This has been
chosen insteady of other models where resources and users are
isolated in separate forests.
Active Directory Domain :
WTC will use an Organizational Domain Forest to provide
autonomous groups within
the forest as required. The New York office will have a separate
domain from the Hong Kong
office since it will be largely autonomous. In addition, a separate
domain can be created to
restrict access to confidential data. Since WWTC will have few IT
personnel to care for dayto-day IT support activities in New York,
the following functions will be maintained by forestlevel
administration: Creating and removing domain controllers
Monitoring the functioning of domain controllers
Managing services that are running on domain controllers
Backing up and restoring the directory Two domains will require that
Group Policy settings as well as access control
/auditing settings( required forest-wide) are implemented separately
to each domain in the
forest. This setup is considered a regional domain configuration and
will reduce traffic over
wide area network (WAN) links. While service administration will
be carefully controlled at
the Hong Kong office, the following functions will be maintained
within the New York office: Creating organizational units (OUs) and
delegating administration
Repairing problems in the OU structure that OU owners do not have
sufficient
access rights to fix Instead of creating a separate forest root domain,
the New York office function as the
forest root domain. It will be a parent domain to the other offices.
Service administrator
accounts will reside on the New York root domain while user
accounts for each region will
reside on the appropriate domain. For administration purposes, the
branch offices will
functions as child domains under the New York root domain. This
configuration was chosen
because it is much easier to manage than a configuration with a
separate domain for
administrative accounts.
Active Directory Naming Convention: WWTC.org is the Active
Directory namespace used by WWTC. It is a registered fully
qualified domain name for WWTC. WWTC will use the same
internal and external
namespace. WWTC.org will be used from inside and outside the
organization without a
separate namespace for internal access to resources. This means that
the tree name
(WWTC.org) is consistent for the private and public (Internet)
allowing users to logon with
the same credentials internally and externally. This requires a
separate zone outside the
firewall to provide name resolution for public resources and does
create security concerns to
ensure that clients accessing resources from outside the organization
do not have access to
internal company resources. This also creates the requirement for
maintaining the records on
both the internal and external DNS servers simultaneously. The
attached illustration shows
this configuration. Application Services:
Windows Server 2012 is installed on the network and the following
Active Directory features
will be implemented. Windows Deployment Services (WDS) will be
implemented to allows
network-based installation of Windows Operating Systems (OS) to
reduce the
complexity and cost of manual installation. This will require a WDS
Server as
a member of the Active Directory Domain Services (AD DS)
domain. This also
requires a Dynamic Host Configuration Protocol (DHCP) server with
an
active scope sine PXE relies on DHCP for IP addressing.
Smart Card Authentication will require valid user principal names
(UPNs)
since they are required fo smart card login. Since a certificate
authority (CA)
will issue the domain controller certificates, the root certificate will
be added
to the Trusted Root Certification Authorities group policy in Active
Directory.
IP Address Management (IPAM) will be implemented to provide
highly
customizable administrative and monitoring capabilities for the IP
address
infrastructure. IPAM will be used to discover, utilize, monitor, audit,
and
manage IP address space in the network. This requires an IPAM
server that
has connectivity to existing DHCP, DNS, DC, and NPS servers in
the Active
Directory forest. WDS services will be hosted on the same computer
as DHCP.
This requires that WDS is configured so that it doesn’t listen on Port
67 and
DHCP option 60 will be used to notify a booting PXE client that
there is a
listening PXE server on the network. The server will also be
configured to
respond only to known client computers. This ensures that client
computers
are added to Active Directory before the image is deployed.
File Classification Infrastructure (FCI) will be implemented to ensure
that
automatic classification is performed. The different classifications
will be identified. Currently they are listed as Public and
Confidential. The properlassification will be applied to every file
using FCI. This process will be used
to ensure that Confidential data is properly stored on encrypted
drives and
that all confidential files are transmitted using encrypted methods.
Reporting
based on these classification tabs will allow administrators to detect
and
respond to violations of the WWTC’s data classification policy.
Failover cluster services will be implemented so that the entire
network has
hardware, software, and storage redundancy. This independent group
of
servers and storage devices will work together to increase the
availability of
applications and services. If one clustered device fails, another will
provide
the lost services (called failover). The cluster validation wizard will
be used to
ensure that all network components are compatible prior to
implementation. It
will also be used after implementation and as new devices are added
to the
network to maintain this capability. By implementing backup for all
servers
and storage, WWTC ensures that users experience a minimum of
disruptions
in service.
Cache encryption will be implemented to store encrypted data by
default. This
means that data in cache is stored encrypted by default providing
data
security without requiring entire drive encryption.
BranchCache will be implemented to increase performance,
manageability,
scalability, and availability. Duplicate files are eliminated while
hashes and
local storage at branch offices drastically reduce the amount of
required WAN
traffic.
Bitlocker encryption will be used to protect all user and server data.
The
benefit is that the entire drive is encrypted and only requires the
user’s normal
authentication to access the data. The bitlocker system on the wired
network
will be set up to automatically unlock the system volume during boot
to reduce
the internal help desk calls because of lost PINs. Group policy
settings will be
enforced that require either Used Disk Space Only or Full Encryption
is used
when BitLocker is enabled on a drive. Groups:
Users and computer accounts will be grouped to simplify
administration by controlling
permissions and rights rather than assigning them individually.
Groups in Active Directory
are objects that reside in the domain. Groups have a scope that
identifies the extent that they
are applied in the domain or forest. The three group scopes for
WWTC are outlined below: Domain local scope is used to manage
accounts within the domain. For
example, a user group that requires access to a printer can be setup so
that
access to a new printer can be done for the entire group at once
instead of
doing a permission list for all five users. The five users will have
global scope
and will be added to a domain local scope group that can be assigned
printer
access. Global scope is used for directory objects that require daily
maintenance,
such as user accounts, computer accounts, or groups that require
management across domains (such as a department in multiple
locations). Universal scope is used to consolidate groups that span
domains. Changes to
global scope groups doesn’t affect the universal scope group, but
changes to the universal scope group causes the entire membership
of the group to be
replicated to every global catalog in the forest.
The scope and Organizational Unit setup has been outlined in the
below diagram. The above structure was chosen so that Group Policy
could be applied to a select group of
users or resources without having to set policies for each individual
user.
--------------------------------------------------------------------------------------
CMIT 495Active Directory Policy Statement
FOR MORE CLASSES VISIT
www.tutorialoutlet.com
Active Directory Policy Statement
General
Active Directory Forest :
Deployment of one Active Directory Forest will suffice for WWTC’s
requirments.
There are not requirements for data isolation within WWTC’s Active
Directory configuration
and any data separation can be performed using data isolation. A single-
forest was chosen
because it is very cost-effective and requires the least amount of
administrative support. For
example, with only one forest, the global catalog does not require
synchronization across
forests and management of a duplicate infrastructure is not required. An
organizational forest
model will be used with user accounts and resources contained in the
forest and managed
independently. The forest will be used to provide service and data
isolation. This has been
chosen insteady of other models where resources and users are isolated
in separate forests.
Active Directory Domain :
WTC will use an Organizational Domain Forest to provide autonomous
groups within
the forest as required. The New York office will have a separate domain
from the Hong Kong
office since it will be largely autonomous. In addition, a separate domain
can be created to
restrict access to confidential data. Since WWTC will have few IT
personnel to care for dayto-day IT support activities in New York, the
following functions will be maintained by forestlevel administration:
Creating and removing domain controllers
Monitoring the functioning of domain controllers
Managing services that are running on domain controllers
Backing up and restoring the directory Two domains will require that
Group Policy settings as well as access control
/auditing settings( required forest-wide) are implemented separately to
each domain in the
forest. This setup is considered a regional domain configuration and will
reduce traffic over
wide area network (WAN) links. While service administration will be
carefully controlled at
the Hong Kong office, the following functions will be maintained within
the New York office: Creating organizational units (OUs) and delegating
administration
Repairing problems in the OU structure that OU owners do not have
sufficient
access rights to fix Instead of creating a separate forest root domain, the
New York office function as the
forest root domain. It will be a parent domain to the other offices.
Service administrator
accounts will reside on the New York root domain while user accounts
for each region will
reside on the appropriate domain. For administration purposes, the
branch offices will
functions as child domains under the New York root domain. This
configuration was chosen
because it is much easier to manage than a configuration with a separate
domain for
administrative accounts.
Active Directory Naming Convention: WWTC.org is the Active
Directory namespace used by WWTC. It is a registered fully
qualified domain name for WWTC. WWTC will use the same internal
and external
namespace. WWTC.org will be used from inside and outside the
organization without a
separate namespace for internal access to resources. This means that the
tree name
(WWTC.org) is consistent for the private and public (Internet) allowing
users to logon with
the same credentials internally and externally. This requires a separate
zone outside the
firewall to provide name resolution for public resources and does create
security concerns to
ensure that clients accessing resources from outside the organization do
not have access to
internal company resources. This also creates the requirement for
maintaining the records on
both the internal and external DNS servers simultaneously. The attached
illustration shows
this configuration. Application Services:
Windows Server 2012 is installed on the network and the following
Active Directory features
will be implemented. Windows Deployment Services (WDS) will be
implemented to allows
network-based installation of Windows Operating Systems (OS) to
reduce the
complexity and cost of manual installation. This will require a WDS
Server as
a member of the Active Directory Domain Services (AD DS) domain.
This also
requires a Dynamic Host Configuration Protocol (DHCP) server with an
active scope sine PXE relies on DHCP for IP addressing.
Smart Card Authentication will require valid user principal names
(UPNs)
since they are required fo smart card login. Since a certificate authority
(CA)
will issue the domain controller certificates, the root certificate will be
added
to the Trusted Root Certification Authorities group policy in Active
Directory.
IP Address Management (IPAM) will be implemented to provide highly
customizable administrative and monitoring capabilities for the IP
address
infrastructure. IPAM will be used to discover, utilize, monitor, audit, and
manage IP address space in the network. This requires an IPAM server
that
has connectivity to existing DHCP, DNS, DC, and NPS servers in the
Active
Directory forest. WDS services will be hosted on the same computer as
DHCP.
This requires that WDS is configured so that it doesn’t listen on Port 67
and
DHCP option 60 will be used to notify a booting PXE client that there is
a
listening PXE server on the network. The server will also be configured
to
respond only to known client computers. This ensures that client
computers
are added to Active Directory before the image is deployed.
File Classification Infrastructure (FCI) will be implemented to ensure
that
automatic classification is performed. The different classifications will
be identified. Currently they are listed as Public and Confidential. The
properclassification will be applied to every file using FCI. This process
will be used
to ensure that Confidential data is properly stored on encrypted drives
and
that all confidential files are transmitted using encrypted methods.
Reporting
based on these classification tabs will allow administrators to detect and
respond to violations of the WWTC’s data classification policy.
Failover cluster services will be implemented so that the entire network
has
hardware, software, and storage redundancy. This independent group of
servers and storage devices will work together to increase the
availability of
applications and services. If one clustered device fails, another will
provide
the lost services (called failover). The cluster validation wizard will be
used to
ensure that all network components are compatible prior to
implementation. It
will also be used after implementation and as new devices are added to
the
network to maintain this capability. By implementing backup for all
servers
and storage, WWTC ensures that users experience a minimum of
disruptions
in service.
Cache encryption will be implemented to store encrypted data by
default. This
means that data in cache is stored encrypted by default providing data
security without requiring entire drive encryption.
BranchCache will be implemented to increase performance,
manageability,
scalability, and availability. Duplicate files are eliminated while hashes
and
local storage at branch offices drastically reduce the amount of required
WAN
traffic.
Bitlocker encryption will be used to protect all user and server data. The
benefit is that the entire drive is encrypted and only requires the user’s
normal
authentication to access the data. The bitlocker system on the wired
network
will be set up to automatically unlock the system volume during boot to
reduce
the internal help desk calls because of lost PINs. Group policy settings
will be
enforced that require either Used Disk Space Only or Full Encryption is
used
when BitLocker is enabled on a drive. Groups:
Users and computer accounts will be grouped to simplify administration
by controlling
permissions and rights rather than assigning them individually. Groups
in Active Directory
are objects that reside in the domain. Groups have a scope that identifies
the extent that they
are applied in the domain or forest. The three group scopes for WWTC
are outlined below: Domain local scope is used to manage accounts
within the domain. For
example, a user group that requires access to a printer can be setup so
that
access to a new printer can be done for the entire group at once instead
of
doing a permission list for all five users. The five users will have global
scope
and will be added to a domain local scope group that can be assigned
printer
access. Global scope is used for directory objects that require daily
maintenance,
such as user accounts, computer accounts, or groups that require
management across domains (such as a department in multiple
locations). Universal scope is used to consolidate groups that span
domains. Changes to
global scope groups doesn’t affect the universal scope group, but
changes to the universal scope group causes the entire membership of
the group to be
replicated to every global catalog in the forest.
The scope and Organizational Unit setup has been outlined in the below
diagram. The above structure was chosen so that Group Policy could be
applied to a select group of
users or resources without having to set policies for each individual user.
---------------------------------------------------------------------------------------
CMPS 11 Quiz5
FOR MORE CLASSES VISIT
www.tutorialoutlet.com
CMPS 11 Quiz5
This is a closed notes, closed book exam. June 3, 2013 Ok to leave out 1.
(2 points) Given the following variation on the IntListElement class
from class, what would be printed by the
program Main1? Put the output on the lines shown in the comments.
class IntListElement {
IntListElement(int value, IntListElement e) {
data = value;
next = e;
}
IntListElement next;
int data;
}
class Main1 {
public static void main(String args) {
IntListElement e1 = new IntListElement(1776,null);
e1 = new IntListElement(1984, e1);
e1 = new IntListElement(2001, e1);
e1 = new IntListElement(2013, e1);
System.out.println(e1.data);
// prints _______
System.out.println(e1.next.next.data); // prints _______
}
}
2. (2 points) Suppose the two println() calls in Main1 above were
replaced by the line
mystery(e1);
and the following method was added to the class Main1, what would be
printed?
static void mystery(IntListElement list) {
if (list != null) {
System.out.println(list.data);
mystery(list.next);
}
} 3. (0.5 pts) To have some code execute each time a button is pressed
you would put the code in the actionPerformed()
method of a class that implements ActionListener, let’s call it listener,
and then
A. Pass listener to a method of the button.
B. Pass the button to a method of listener.
C. Do both A and B.
D. None of the above, you would add the code to a method of a class
that extends JButton. 4. (0.5 pts) True or False? (circle one) A listener
object can be “listening” to multiple components and do different
things depending upon which component generates an event.
(0.5 pts) True or False? (circle one) A listener object can be “listening”
for one and only one type of event (e.g.
ActionEvents for clicks on buttons or MouseEvents to respond to mouse
motion like drawing but not both).
(0.5 pts) True or False? (circle one) Multiple listener objects can be
listening and execute code for a single event on
one component. For example, two different listeners could respond, each
in their own way, to a single button click.
(1 point) Write a complete program that prints the first 50 multiples of 3
(i.e. 3, 6, 9, … 150). 5.
6.
7. THERE ARE MORE QUESTIONS ON THE BACK 8. (1 point)
Write the method needed by this program. It prints true if the 3 numbers
read from the console are in
increasing order, and false otherwise. That is, each number must be
strictly larger than the previous. Entering 3 4 5
would result in true, but entering 3 3 5 would result in false as would 3 5
4.
import java.util.*;
class Ordered {
static final Scanner in = new Scanner(System.in);
public static void main(String args) {
boolean x = increasing(in.nextInt(), in.nextInt(), in.nextInt());
System.out.println(x);
}
} 9. (2 points) Write a method findLargest that takes a reference to an
IntListElement, list, and returns the value of the
largest integer stored in the list. E.g. If the list myList contained 3, 4, 5,
1 then x = findLargest(myList) would assign
x to be 5. You should assume that the list is not empty. (BONUS up to 3
points for overall quiz total for the quarter) Write a method get(), to be
added to the
IntListElement class from problem 1, that takes one integer parameters,
n, and returns the value stored in the data
field of the nth element of the list (starting with 0 being the first
element). For example if myList pointed to the list
containing the 5 elements 100, 200, 300, 400, 500 then executing x =
myList.get(3); would store 400 in x.
---------------------------------------------------------------------------------------
COM 140Project 3
FOR MORE CLASSES VISIT
www.tutorialoutlet.com
Project 3
1. Specification
The third programming project involves writing a program to calculate
the terms of the following sequence of
numbers: 0 1 1 3 5 11 21 43 … where each term is twice the second
previous term plus the previous term. The
0th term of the sequence is 0 and the 1st term of the sequence is 1.
The example below shows how to calculate the next sequence term:
Current sequence: 0 1
Current sequence: 0 1 1
Current sequence: 0 1 1 3
Current sequence: 0 1 1 3 5
… etc. Calculate next term: 2 * 0 + 1 = 1
Calculate next term: 2 * 1 + 1 = 3
Calculate next term: 2 * 1 + 3 = 5
Calculate next term: 2 * 3 + 5 = 11 The interface to the program should
be a Swing based GUI that looks similar to the following: The pair of
radio buttons allows the user to choose whether an iterative or recursive
method is used to compute
the term of the sequence. When the user enters a value for n and then
clicks the Compute button, the nth term of
the sequence should be displayed in the Result field. The Efficiency
field should contain the number of calls to the
recursive method when the recursive option is chosen and the number of
iterations of the loop when the iterative
option is selected. The program will check the validity of the user input
value which should be a positive integer. A
message will be shown in a JOptionPane for illegal entered values.
The Iterative radio button should be initially selected.
When the window is closed, the efficiency values should be computed
with values of n from 0 to 19 and written to
a text file outData.txt. Each line of the file should contain the value of n,
the efficiency of the iterative method for
that value of n and the efficiency of the recursive method. The values
should be separated by commas so the file
can be opened with Excel and used to graph the value of the efficiencies
for both the iterative and recursive
options along the y axis with the value of n along the x-axis. The graph
should be included in the solution
description document that accompanies this project and should also
contain a brief explanation of the observed
results.
The program should consist of two classes. 1 1. The first class P3GUI
should define the Swing based GUI and should be hand-coded and not
generated by a GUI
generator. In addition to the main method and a constructor to build the
GUI, an event handler will be needed to
handle the Compute button click and another handler will be needed to
produce the file described above when
the window is closed. The latter handler should be an object of an inner
class that extends the WindowAdapter
class.
2. The other class should be named Sequence. It should be a utility class
meaning that all its methods must be
class (static) methods and no objects should be able to be generated for
that class. It should contain three public
methods:
a. The first method computeIterative should accept a value of n and
return the corresponding element in
the sequence using iteration.
b. The second method computeRecursive should accept a value of n and
return the corresponding element
in the sequence using recursion. This method will initialize the
efficiency counter before calling the private
recursive method that will actually perform the recursive computation.
c. The third method getEfficiency will return the efficiency counter left
behind by the previous call to either
of the above two methods.
Your program should compile without errors.
The Google recommended Java style guide
(https://google.github.io/styleguide/javaguide.html) should be used to
format and document your code. Specifically, the following style guide
attributes should be addressed: Header comments include filename,
author, date and brief purpose of the program. In-line comments used to
describe major functionality of the code. Meaningful variable names and
prompts applied. Class names are written in UpperCamelCase. Variable
names are written in lowerCamelCase. Constant names are in written in
All Capitals. Braces use K&R style. In addition the following
design constraints should be followed: Declare all instance variables
private
Avoid the duplication of code Test cases should be supplied in the form
of a table with columns indicating what aspect is tested, the input
values, expected output, actual output and if the test case passed or
failed. This table should contain 5 columns
with appropriate labels and a row for each test case. Note that the actual
output should be the actual results you
receive when running your program and applying the input for the test
record. Be sure to select enough differentkinds of employees and
situations to completely test the program.
2. Submission Requirements
Submit the following to the Project 3 assignment area no later than the
due date listed in your LEO classroom.
1. Source files P3GUI.java, Sequence.java and the program generated
output file outData.txt. The source code
should use Java code conventions and appropriate code layout (white
space management and indents) and
comments. All submitted files may be included in a .zip file. 2 2. The
solution description document P3SolutionDescription (.pdf or .doc /
.docx) containing the following:
(1) Assumptions, main design decisions, error handling;
(2) Test cases table
(3) The graph of the value of the efficiencies for both the iterative and
recursive options along with a brief
explanation of the observed results.
(4) Screen captures showing successful program compilation and test
cases execution. Each screen capture should
be properly labeled, clearly indicated what the screen capture represents.
(5) Lessons learned from the project;
3. Grading Rubric
The following grading rubric will be used to determine your grade:
Attribute
P3GUI class Meets
40 points Does not meet
0 points a) Defines the GUI. a) Does not define the GUI. b) Contains a
pair of radio buttons
allowing the user to choose whether an
iterative or recursive method is used to
compute the term of the sequence. b) Does not contain a pair of radio
buttons
allowing the user to choose whether an
iterative or recursive method is used to
compute the term of the sequence. c) Allows the user to enter a value for
n
and click the Compute button, to
display the nth term of the sequence in
the Result field. c) Does not allows the user to enter a
value for n and click the Compute button,
to display the nth term of the sequence in
the Result field. d) User input value is checked and
warning message is displayed if the
entered value is not a positive integer. d) User input value is checked
and warning
message is displayed if the entered value
is not a positive integer. e) Allows the Efficiency field to contain
the number of calls to the recursive
method when the recursive option is
chosen and the number of iterations of
the loop when the iterative option is
selected. e) Does not allow the Efficiency field to
contain the number of calls to the
recursive method when the recursive
option is chosen and the number of
iterations of the loop when the iterative
option is selected. f) The Iterative radio button is initially
set to selected. f) The Iterative radio button is not initially
set to selected. g) When the window is closed, the
efficiency values computes with values
of n from 0 to 19 and writes them to a
file.
h) Each line of the output file contains
the value of n, the efficiency of the
iterative method for that value of n and 3 g) When the window is closed,
the
efficiency values does not compute with
values of n from 0 to 19 and the output
file is not generated.
h) Each line of the output file does not
contain the value of n, the efficiency of the efficiency of the recursive
method.
i) The values of the output file are
separated by commas so the file can be
opened with Excel.
j) Provides an event handler to handle
the Compute button click and another
handler will be needed to produce the
file described above when the window
is closed. The latter handler is an object
of an inner class that extends the
WindowAdapter class. Sequence Class Test Cases the iterative method
for that value of n
and the efficiency of the recursive
method.
i) The values of the output file are not
separated by commas so that the file can
be opened by Excel. 30 points j) Does not provides an event handler to
handle the Compute button click and
another handler will be needed to
produce the file described above when
the window is closed. The latter handler is
an object of an inner class that extends
the WindowAdapter class.
0 points a) All methods are class (static)
methods. a) All methods are not class (static)
methods. b) Contains three public methods. b) Does not contain three
public methods. c) Contains computeIterative method
that accepts a value of n and returns
the corresponding element in the
sequence using iteration. c) Does not contain the computeIterative
method that accepts a value of n and
returns the corresponding element in the
sequence using iteration. d) Contains method computeRecursive
that accepts a value of n and returns
the corresponding element in the
sequence using recursion. d) Does not contain the computeRecursive
method that accepts a value of n and
returns the corresponding element in the
sequence using recursion. e) The computeRecurvise method will
initialize the efficiency counter before
calling the private recursive method
that will actually perform the recursive
computation. e) The computeRecurvise method does
not initialize the efficiency counter before
calling the private recursive method that
will actually perform the recursive
computation. f) The getEfficiency method returns the
efficiency counter left behind by the
previous call to either of the above two
methods.
10 points f) The getEfficiency method does not
return the efficiency counter left behind
by the previous call to either of the above
two methods.
0 points a) Test cases are supplied in the form
of table with columns indicating test
case objective, the input values,
expected output, actual output and if
the test case passed or failed. a) No test cases were provided. b) Enough
scenarios selected to 4 completely test the program. Documentation and
Style
guide c) Test cases were included in the
supporting word or PDF
documentation.
20 points
a) Solution description document
P3SolutionDescription includes all the
required sections appropriate titled. 0 points
a) No solution description document is
included.
Source code criteria Source code criteria
b) Header comments include filename,
author, date and brief purpose of the
program.
c) In-line comments used to describe
major functionality of the code.
d) Meaningful variable names and
prompts applied.
e) Class names are written in
UpperCamelCase.
f) Variable names are written in
lowerCamelCase.
g) Constant names are in written in All
Capitals.
h) Braces use K&R style.
i) Declare all instance variables private.
j) Avoids the duplication of code. 5 b) Java style guide was not used to
prepare the Java code.
c) All instance variables not declared
private.
d) Duplication of code was not avoided.
---------------------------------------------------------------------------------------
COP 3330 Upon completion of this program
FOR MORE CLASSES VISIT
www.tutorialoutlet.com
Objective
Upon completion of this program,you should gain experience with the
use of managing arrays inside of a class. ABETISMALCS Assessment
This assignment is designated as one of the course assignments being
used to assess basic programming skills for ABETISL‘LALCs
requirements. Please see the syllabus for details. Note that
in addition to the normal grading scales, each student‘s submission Will
be judged in several aspects on a scale of "HighlyEffwtive",
”Effective", or "Ineffective" , as specified by
ABETISNIAIES outcome assessment procedures. A student's
submission that earns 70% of the available points will count as an
overall score of ”Effective". Task You will write a class called
Grid, and test it with a couple of programs. A Grid object will be made
up or" a grid of positions, numbered with rows and columns. Row
and column numbering
start at 0. at the top left corner of the grid. A grid object also has a
"mover". which can move around to different locations on
the grid. Obstacles (which block the mover) and other objects
(that can he placed or picked up) are also available. Here is a sample
picture of a Grid object: O . . This is 3 Grid object with 4 rows and 4
columns (numbered 0 - 3).
. b . The mover ‘>' is at. row 1' column 2, facing eeet.
. . The obstacle ‘4“ is at row 3, column 1 . # . . The other item '0' ie at.
row 0, column 0 The E character indicates that the mover and an item
(0] currently occupy the same position on the grid. Program Details and
Requirements 1) Grid class Download this starter file: grid starter . h and
rename it as grid . 1:. Your member function prototypes are already
given in this file. You will need to add appropriate member data. You
will
also need to define each of the member functions in the file grid.cpp.
You may add Whatever member data you need, but you must store the
grid itself as a two-dimensional array. Maximum
grid size will be 40 rows and 40 columns.
---------------------------------------------------------------------------------------
COSC 2315 Implement aprogram that will use a stack
FOR MORE CLASSES VISIT
www.tutorialoutlet.com
Implement as program that will use a stack structure to check for correct
placement of parentheses in an algebraic expression. Allow the use of (
) [ ] { } characters as grouping symbols. Make sure that an error is
reported for an expression of a form (...]. In addition report other
possible parentheses related errors (too many levels, too many right
paren., too many left paren.). Make sure to use 'silent error reporting'
(and report any possible errors outside the main scanner loop).
Hint - start with the program that checks '(...)' and when all the common
errors are correctly reported, expand the parentheses syntax to ([{...}])
---------------------------------------------------------------------------------------
CS 161Assignment 4 Strings and Function
FOR MORE CLASSES VISIT
www.tutorialoutlet.com
Assignment 4
Strings and Functions
Due: Sunday, February 19, 2017 11:59pm
(90 pts) Problem Statement: Wheel of Fortune
You will implement the program for playing a modified Wheel of
Fortune. The game must allow
a user to enter the number of rounds to play and a new secret message
(possibly containing
blanks) with each round, and print the number of dashes/slots for the
message (spaces do not
get dashes, just the space).
If you are not familiar with the game of Wheel of Fortune, then you can
watch an episode on
YouTube: https://www.youtube.com/watch?v=A8bZUXi7zDE
NOTE: I realize there are solutions to assignments online, but resist the
temptation of using
these because the assignments are checked against online resources,
code submitted by
classmates, and code submitted by prior students for
cheating/plagiarism. It is much more
gratifying to complete this on your own. Make sure you take time to
design well!!!
The game can play with 1-3 players, and it continues a round, until
someone solves the puzzle
correctly. A new puzzle is given with each round. In this Wheel of
Fortune, you won’t win as
much or any prizes, but you might go bankrupt or lose a turn!!! Your
random numbers are only
from 0-21, with 0 being bankrupt, 1-20 being the dollar amount earned
per letter found in the
puzzle, and 21 is lose a turn.
The game begins by asking the first player if he/she wants to spin the
wheel, buy a vowel, or
solve the puzzle. On a player’s first turn, it might not make sense to
choose anything other than
spinning the wheel, but a player is given these three choices at all times
during their turn, until
they guess an incorrect non-vowel letter, incorrectly solve the puzzle, or
spin a 0 or 21.
If the player chooses to spin and the spin is >0 and <21, then the
player is asked to guess a
non-vowel letter. If the non-vowel letter was not found in the puzzle,
then the player loses their
turn to the next player. If the non-vowel letter is found in the puzzle,
then the player wins the
number of letters found times (*) the dollar amount spun.
If a player spins a 0, then the player’s earnings go to a zero in that round,
and the next player
gets the three choices to spin the wheel, solve the puzzle, or buy a
vowel. If a player spins a
21, then the player’s keeps the round earnings, but the next player gets
the three choices to
spin the wheel, solve the puzzle, or buy a vowel.
If a player chooses to solve the puzzle and does so correctly, then the
player gets to keep all
the money earned in that round, while all other players lose their money
in that round. If a
player chooses to solve the puzzle and does so incorrectly, then the turn
goes to the next
player.
A player can only buy a vowel when his/her earnings are >= $10,
which is the one-time amount
paid for each vowel guess, regardless of whether the vowel is found.
The player who has the most money after N rounds is the winner!
A few rule specifics: You have a total round earnings and a total game
earnings. You always get a choice of spinning the wheel, solving the
puzzle, or buying a vowel
during your turn, buy you cannot buy a vowel if you have less than $10.
You lose your turn by incorrectly guessing a non-vowel letter on a spin,
spinning a 0 or
21, or incorrectly solving the puzzle. If you spin > 0 or <21, then
you get the number spun times (*) the number of non-vowel
letters found added to your round total.
If you spin a 0, then you go bankrupt in the round (lose your round
total), and it ends
your turn.
If you spin a 21, then you keep your round total, but it ends your turn.
You can buy a vowel for $10, and you only pay the $10 vowel purchase
once on a
guess, independent of how many are found.
If you solve the puzzle correctly, then you keep the money earned for
that round and add
it to your total game earnings.
You win the game by having the most game earnings, not round
earnings!!! Your program must print out 1) the number spun on the
wheel,2) the number of letters found for
a guess, 3) the total round earnings, 4) the message with the correctly
guessed slots and blank
slots, 5) if the user guesses the message, then a winner message and the
total game earnings
for all players, and 6) after all rounds are played, a message with the
winning player.
Program Requirements: Only use C++ strings, no need for an array!
Hint: use two strings! Your program must ignore cases in the message.
Each function, including main, may not have more than 15 lines of code
(this doesn’t include
curly braces, variable declarations, comments, and blank spaces!). You
are not allowed to use global variables.
Read the C++ string documentation to help with this assignment:
http://www.cplusplus.com/reference/string/string/?kw=string
**You can decide how many incorrect guesses a user gets before they
lose. In addition, you can
use the system(“clear”); command from the <cstdlib> to clear the
screen, after the user enters
their message. Yes they can scroll above to see the message, but we
aren’t cheaters!!!
Example Run:
Enter a message: National Park Service
How many players do you have? 2
How many rounds for winning? 1
The message is _ _ _ _ _ _ _ _ ____ _______ Player 1:
Do you want to spin (1), solve the puzzle (2), or buy a vowel (3): 1
Your wheel landed on 20
Guess a letter: n
2 found. Total: $40
The message is N _ _ _ _ n _ _ ____ _______ Do you want to spin (1),
solve the puzzle (2), or buy a vowel (3): 1
Your wheel landed on 10
Guess a letter: l
1 found. Total: $50
The message is N _ _ _ _ n _ l ____ _______ Do you want to spin (1),
solve the puzzle (2), or buy a vowel (3): 3
Guess a vowel: a
3 found. Total: $40
The message is N a _ _ _ n a l _ a _ _ _ _ _ _ _ _ _ Do you want to spin
(1), solve the puzzle (2), or buy a vowel (3): 1
Your wheel landed on 0
Total: $0
The message is N a _ _ _ n a l _a__ _______ Player 2:
Do you want to spin (1), solve the puzzle (2), or buy a vowel (3): 1
Your wheel landed on 5
Guess a letter: r
2 found. Total: $10
The message is N a _ _ _ n a l _ar_ __r____ Do you want to spin (1),
solve the puzzle (2), or buy a vowel (3): 1
Your wheel landed on 10
Guess a letter: t
1 found. Total: $20
The message is N a t _ _ n a l _ar_ __r____ Do you want to spin (1),
solve the puzzle (2), or buy a vowel (3): 2
Guess message: National Park Service
You are correct! Player 2 wins round 1.
Player 1 total: $0
Player 2 total: $20
Player 2 wins game!
(10 pts) Extra Credit Error Handling
Make it so that your program never errors on users input! Handle the
following errors: The user enters a message or letter outside of A-Z and
a-z. The user enters an invalid menu choice. The user enters a vowel for
a non-vowel guess. The user enters a non-vowel for a vowel guess.
(-10 pts) Automatic Deduction: You are not allowed to use global
variables in any assignment
in CS 161. There isn’t any practical purpose for them in this course.
Keep this in mind as you
design your program with functions.
(10 pts) Program Style/Comments
In your implementation, make sure that you include a program header in
your program, in
addition to proper indentation/spacing and other comments! Below is an
example header to
include. Make sure you review the style guidelines for this class, and
begin trying to follow
them, i.e. don’t align everything on the left or put everything on one
line!
http://classes.engr.oregonstate.edu/eecs/winter2017/cs161-
001/161_style_guideline.pdf
You are graded on having a header, function headers with pre/post
conditions, proper
comments, and readable code with indentation and vertical spacing that
is CONSISTENT
throughout your program. DO NOT align your entire program on the left
side. This will cause
you to automatically lose the full 10 points. In addition, do not forget
your program header!!!
Electronically submit your C++ program (.cpp file, not your
executable!!!) by the assignment due
date, using TEACH.
---------------------------------------------------------------------------------------
CS 192 Let’s think about the use of Lists in everyday life
FOR MORE CLASSES VISIT
www.tutorialoutlet.com
Let’s think about the use of Lists in everyday life. Provide an example
and discuss the advantages and disadvantages of using these types of
Lists.
---------------------------------------------------------------------------------------
CS 210 Introduction to Programming Java Programming
Assignment
FOR MORE CLASSES VISIT
www.tutorialoutlet.com
CC& The output file will contain a list of vehicle license plate numbers
(accessed via agetter) and the fine associated with that license, with the
fines right-aligned on thedecimal poi§ If the file opened successfully,
generate a report and write it to the output file.§ Define an instance
method to produce a fines report.The method will create an output file
with the fines report. The method should:o Have one parameter, the
fines arrayo Read the filename for the report output file from the user.o
Try to open the report output file· Store the calculated fine in the fines
array.§ Calculate the ticket fine.§ Access the clockedSpeed and
speedLimit data stored in the object using getters.§ Define a method to
calculate and store values in the fines array. The method will:o Have one
parameter, the empty fines arrayo Define constants for all fixed values in
the calculations (from page 1 of this assignment).o For each ticket stored
in the ticket array:· Display a message that explains which file could not
be opened.o Return the count of tickets stored in the array.©Regis
University, All Rights ReservedUnauthorized distribution (including
uploading to any non-Regis Internet website) violates copyright
lawv Display the number of SpeedingTicket objects stored in the ticket
data array.o Catch any FileNotFoundException exceptions. When
caught:§ Close file.§ Set a value to exit the loop (so no more data will be
read).Loop until there is no more file data or an exception is
thrown.Ø Also display a message that no more data will be read from
the file.Ø Display the message passed back via the throw.Ø Catch any
thrown ArrayIndexOutOfBoundsException exceptions.v Try to call the
instance method to add the ticket object to the ticket dataarray(this is an
instance method of the TicketArrayImpl class)v Call the constructor to
create a new SpeedingTicket object.v Read the three data items from one
line of data in the input data filev In a loop:§ Display a message that the
program is reading the file data§ Otherwise, it will return 0, to indicate
the file could not be opened/read.o Implement code to try to open the
input data file. If the file opened:§ If the file was opened successfully,
the method will return the number of ticketsstored in the array.§ Define
a method to read all the data from the input file and store the ticket data
by addingSpeedingTicket objects into the array. The method will:o Have
one parameter: the name of the data input file (String)o Return an int
value· Otherwise, store the ticket object into the array and increase the
ticket count§ Include a message to pass to the exception handler that
states thearray is full and stating which license cannot be added.· If the
array is full, will throw an ArrayIndexOutOfBoundsException§ Define
an instance method to add one SpeedingTicket object to the ticket data
array.The method will:o Have one parameter, the ticket object to addo
Test to see if the array is full· Define a constructor that will:o Instantiate
a ticket array object (using new to initialize the array reference variable
andthe constant array size)o Initialize the count of tickets stored to 0· A
count of actual ticket objects storedNote: The data property definitions
will only define the array reference variable. It will not create the array
object.©Regis University, All Rights ReservedUnauthorized distribution
(including uploading to any non-Regis Internet website) violates
copyright lawWithin the TicketArraysImpl class:v A ticket data array (to
hold SpeedingTicket objects)v A static constant array size (maximum
items that can be held in the array) set to 200The class will have the
following private data properties:v Define getters for each data
property.3. Define a second class that will implement the ticket array for
this program, named:TicketArrayImplThe class will have the following
public data properties:· Define a constructor, with parameters for each
data property.o Use the parameters to initialize the values.· the clocked
speedWithin the SpeedingTicket class:v the speed limitv vehicle license
plate number (a 6-character String)v A main class to run the program1.
Create a new Java NetBeans project, named as
follows:LastnameJavaAssn8For example: SmithJavaAssn82. Define a
Java class with properties and methods for a speeding ticket object,
named:SpeedingTicketThe class will have the following private data
properties:· A class to implement the object array (to hold
SpeedingTicket objects)· A class to define a SpeedingTicket
object· Analyze the fines to determine the high, low, and average fines,
and display the results.Here are the formulas the city uses for calculating
a speeding ticket fine:Ticket Fine = Court costs ($45.00) + a fee for each
mile per hour (MPH) by which the speed limit was exceeded The fee
will be levied as follows:MPH Over Speed Limit Fee per MPH Over
Speed Limit (for all MPH over limit)up to 10 $ 4.25over 10 and up to 20
$ 6.00over 20 $ 8.10You must define constants to hold all fixed values
(court costs, MPH over speed limits, and fees perMPH) in the above
chart within your method that calculates the fines.©Regis University,
All Rights ReservedUnauthorized distribution (including uploading to
any non-Regis Internet website) violates copyright
lawProgramRequirementsThis program will implement two different
types of arrays. One array will hold ticket objects, and willrequire an
implementation class. The other array will contain primitive data type
double values, and willnot require an implementation class.NOTE: The
ticket array and the fines array will be parallel arrays. This means that
thefine will be stored into the fines array using the same index as the
ticket object in theticketarray.NOTE: For an example of a Java program
implementing arrays, see Online Content section 15.10.Required Classes
and MethodsThree separate classes will be required for this
program.· Produce an output file, containing the vehicle license plate
numbers and speeding fines.· Calculate the speeding ticket fines to
assess, based on the ticket data, and store the fines into asecond array
that holds double values. This array will be sized to the number of
tickets issued.· Read the data from the file, line by line, and store the
data into an array that holds ticket dataobjects. This array will hold a
maximum of 200 ticket data objects.·ISCS210 Introduction to
ProgrammingJava Programming Assignment 8: Array
ImplementationNOTE: This assignment will be more challenging than
the previous assignments, so make sure tostart early and allocate enough
time to complete it, including time you might need to seek
anynecessaryhelp.Since this is the last program, the program may not be
submitted more than 1 day late!ProblemSummaryA local city would like
you to write a program to help them analyze data on speeding tickets.
City policehave collected information about the speeding violations.
They store data about each ticket issued duringa one week period in a
text data file. Data collected for each ticket includes the vehicle license
platenumber, the speed limit, and the clocked speed. From past data, the
police department knows that it willnot issue more than 200 tickets per
week.You may assume all data in input data file is valid data (i.e.
formatted correctly), but you must verify thatthe file exists (i.e. can be
opened). If the file does not exist, the program will loop until you enter
thefilename for a file that can be opened.Sample input data file
lines:BBB222 50 60XYZ123 40 45A1B2C3 30 51The police
department would like you to write a program to read the file, calculate
the fines to assess, andgenerate several reports. The program will: Then
submit your .zip file to the Java ProgAssn 8 assignment submission
folder (located underthe Assignments/Dropbox tab in the online
course).o Warning: Only NetBeans export files will be accepted. Do not
use any other kind of archive or zip utility.GradingPrograms will be
graded using the rubric that is linked on the same assignment page as
this file.WARNING:Programs submitted more than 1 day past the due
date will not be accepted,and will receive a grade of 0.©Regis
University, All Rights ReservedUnauthorized distribution (including
uploading to any non-Regis Internet website) violates copyright law/***
Description of class and author and version tags*/public class
SpeedingTicket {// ticket data fields go here// constructor with
parameters (and comments) goes here// getters (with comments and
return tags) go here}/*** Description of class and author and version
tags*/public class TicketArrayImpl { // static constant array size goes
here // data fields go here (ticket array and ticket count) // constructor
without parameters (nd comments) goes here // (instantiates ticket array
object and initializes ticket count) // method to add ticket object to ticket
array goes here (with comments and parameter tag) // method to read
ticket data from file goes here (-includes comments with parameter and
return tags -creates a ticket object for each ticket and -calls previous
method to add the object to the ticket array) // method to calculate
fines/store into array goes here (with comments and parameter tag) //
method to create the fines report goes here (with comments and
parameter tag)}/*** Description of program, and author and version
tags*/public class TicketAnalysis { public static void main(String[] args)
{ // code to define variables· First export your project from NetBeans, as
detailed in previous assignmentso Name your export file in the
following format:Assn.zipFor example: SmithAssn8.zipNOTE: Save
this zip file to some other directory, not your project directory.· Include
tags with the author’s name (i.e. your full name) and the version of
thecode (e.g. Java Assn 4, version 1.0)o Comments at the top of each
method, describing what the method doesInclude tags with names and
descriptions of each parameter and return value.TestingYou will need to
create test data files to test your program. In combination, all your test
data files shouldtest every possible execution path within your code,
including erroneous data which cause exceptions.Before you submit
your project, add your all files you used to test your program in the top
level of yourproject directory (and add a number to the end of each file,
if there are multiple test data files).File examples:
datafile1.txtdatafile2.txt (numbered, if multiple data files
tested)SubmissionThis programming assignment is due by midnight of
the date listed in the Course Assignments by Week.REMINDER:
Programs submitted that do not compile without errors will not be
accepted.Again, you will submit a single zip file containing all of the
files in your project.§ Ask the user whether to run the program again,
using a different input file.Loop until the user says s/he does not want to
run the program again.SampleRunWARNING: The objects, classes, and
methods must be implemented exactly as specified above.If your
program produces correct output, but you did not create and use the
objects as specified,and implement the required classes and methods,
you will lose a significant number of points.See last page of the file for
outline of code for the three required classes.This program will run
analyses on weekly speeding ticket data filesEnter input filename:
tickets Cannot open input file: ticketsEnter input filename:
tickets.txtReading ticket data...Data stored for 3 ticketsCalculating
fines...Done!Enter name of report output file: report.txtWeek's Ticket
Analysis for 3 tickets issued: Lowest ticket fine 66.25 Average ticket
fine 122.95 Highest ticket fine 215.10Run program again with another
file (y/n)? n©Regis University, All Rights ReservedUnauthorized
distribution (including uploading to any non-Regis Internet website)
violates copyright law5. The program must follow the CS210 Coding
Standards from Content section 6.10.Be sure to include the following
comments:o Comments at the top of each code file describing what the
class does§ Execute the static method to display a ticket summary.§ The
instance method to produce a fines reportv The instance method to
calculate the fines and store them in the arrayv Uses the
TicketArraysImpl object to call:§ Define an array (to hold double fines),
the same size as the array for ticket objects.§ Display a message to the
user, that the program is calculating the fines.§ Using the object, call the
instance method to read and store the data from theinput file (sends a
message to the TicketArraysImpl object).Loop until the method returns a
number other than 0, indicating the file was read (andthat the ticket data
array now has ticket data stored in it).v Read the filename for the input
data file from the user.v In a loop (inner loop):§ Create a new object of
the TickeArraysImpl class.§ Define a main method to:o Display a
description of what the program will do to the user.o In a loop (outer
loop):· Define a static method to display a ticket summary, using the
previously defined static methods tocalculate the low, high, and average
fines.o Parameters: the fines array and count of fines in the arrayo Ticket
summary will be displayed as shown in the sample output on the next
page, with allfigures will be right-aligned on the decimal point.BBB222
87.50XYZ123 66.25A1B2C3 215.10Total 368.85©Regis University,
All Rights ReservedUnauthorized distribution (including uploading to
any non-Regis Internet website) violates copyright law· Define three
static methods to:o Determine and return the lowest fine amounto
Calculate and return the average fine amounto Determine and return the
highest fine amountEach will have the fines array and count of fines in
the array as parameters.· Display a message that explains which file
could not be openedand that a fines report will not be generated.4.
Define a third (main) class named:TicketAnalysisWithin the
TicketAnalysis class:§ The last line of the output file will contain the
total of all fines collected, rightalignedon the decimal point, with the
fines listed above it.Sample output fileo Catch any FileIOException
exceptions. When caught:§nt. & display program description // Loop://
code to instantiate TicketArrayImpl object // Loop:// code to read
filename and try to read data from the file// code to create fines array//
code to call other methods } // three methods to calculate the fines
average, low, and high go here(includes comments with parameter and
return tags) // method to display a ticket summary (with comments and
parameter tags)
---------------------------------------------------------------------------------------
CS 331, Spring 2017 Assignment #2
FOR MORE CLASSES VISIT
www.tutorialoutlet.com
CS 331, Spring 2017 Assignment #2
Greg Plaxton
January 31, 2017
For this assignment, you are required to turn in solutions to any two of
Problems 1
through 4, which appear in Section 2 below. Your solutions are due at
the beginning of class
on Thursday, February 9. Please refer to the course syllabus for the
ground rules concerning
collaboration, and for the slack day policy governing lateness.
Any corrections or clarifications related to this assignment will be
announced in the
lectures and on Piazza. You are responsible for being aware of any such
announcements. 1 Exercises The following textbook exercises are
recommended to help you to prepare for the tests. We
will not be grading your solutions to these exercises, so you do not need
to turn anything in.
1. Exercise 3.10, page 110.
2. Exercise 3.12, page 112.
3. Exercise 4.15, page 196.
4. Exercise 4.28, page 203. 2 Programming & Problem Solving In
this part of the assignment, we continue our investigation of the SMI
problem introduced
in Assignment 1.
In the first lecture (see also Section 1.1 of the textbook), we described
the deferred
acceptance algorithm for the SM problem. We showed that given any
instance I of the SM
problem, the deferred acceptance algorithm produces a stable matching.
In Problem 3 of
Assignment 1, we showed that there is a natural way to modify the
deferred acceptance
algorithm so that it produces a stable matching on any given SMI
instance.
When we discussed the deferred acceptance algorithm for the SM
problem, we showed
that the stable matching µ it produces is “man-optimal” in the sense that
each man likes
1 University of Texas at Austin
Department of Computer Science Algorithms and Complexity
CS 331, Spring 2017 his partner in µ at least as well as his partner in any
other stable matching. The concept of
man-optimality is easily adapted to the context of the SMI problem; in
this context, we just
need to bear in mind that an agent’s partner in a given matching might
be “no partner”, i.e.,
being single is a possible outcome. Using arguments similar to the
corresponding arguments
for SM, it can be shown that for the SMI problem, the stable matching
produced by the
deferred acceptance algorithm (i.e., the version that we developed in
Problem 3 of Assignment 1) is man-optimal. It follows that even though
the deferred acceptance algorithm is
nondeterministic — and hence can execute in many different ways on a
given SMI instance
— the final output is uniquely determined; in the problem hints below,
we refer to this as
the “confluence property” of the deferred acceptance algorithm.
For any instance I of the SMI problem, we define da(I) as the stable
matching produced
by the deferred acceptance algorithm, and we define matched (I) as the
set of men who are
matched (i.e., not single) in da(I).
For any SMI instance I, any woman q in I, and any man p who is not in
I, we define
add (I, p, q) as the set of all SMI instances that are the same as I except
that (1) p is added
to the set of men, (2) the preferences of p are such that q is acceptable to
p and all other
women are unacceptable to p, and (3) the preferences of each woman in
I are augmented to
incorporate p. To clarify (3), consider a woman q 0 in I who finds ` of
the men in I to be
acceptable. There are ` + 2 ways for q 0 to augment her preferences to
incorporate p: she can
classify p as acceptable, in which case there are ` + 1 different ways she
can insert p into her
strict ranking of acceptable men, or she she can classify p as
unacceptable.
In the statement of Problem 1 below, we use the symbol ∅ as follows: If
we say that a
woman q prefers a man p to ∅, we mean that q considers p to be
acceptable; conversely, if
we say that q prefers ∅to p, it means that q considers p to be
unacceptable.
Problem 1. Let I be an SMI instance and let q be a woman in I. Prove
that there is a
unique element x of matched (I)+∅ such that the following conditions
hold for any man p who
is not in I and any SMI instance I 0 in add (I, p, q): if q prefers p to x in I
0 , then p is matched
to q in da(I 0 ); otherwise, p is single in da(I 0 ). Hints: (1) Use the
confluence property of the
deferred acceptance algorithm; (2) Observe that once execution of the
deferred acceptance
algorithm reaches a state where there is exactly one single man who has
not proposed to all
of his acceptable women, the rest of the execution is deterministic.
Definition: For any SMI instance I and any woman q in I, we define the
unique element
x identified in Problem 1 as threshold (I, q).
Problem 2. Let I be an SMI instance, let q be a woman in I, let p be a
man who is
not in I, and let I 0 be an SMI instance in add (I, p, q). Prove that no
woman q 0 in I prefers
threshold (I, q 0 ) to threshold (I 0 , q 0 ). Hints: (1) Use proof by
contradiction, i.e., assume that
there is a woman q 0 who prefers threshold (I, q 0 ) to threshold (I 0 , q 0
), and derive a contradiction;
(2) Use the confluence property of the deferred acceptance algorithm.
Problem 3. Let I be an SMI instance, let q be a woman in I, let p be a
man who
is not in I, and let I 0 be an SMI instance in add (I, p, q). Prove that if p
is single in
2 University of Texas at Austin
Department of Computer Science Algorithms and Complexity
CS 331, Spring 2017 da(I 0 ), then threshold (I 0 , q 0 ) = threshold (I, q
0 ) for every woman q 0 in I. Hints: (1) Use
proof by contradiction, i.e., assume p is single in da(I 0 ) and there is a
woman q 0 such that
threshold (I 0 , q 0 ) 6= threshold (I, q 0 ), and derive a contradiction; (2)
Use the result of Problem 2;
(3) Use the confluence property of the deferred acceptance algorithm.
Problems 1 through 3 above are concerned with modifying an SMI
instance I by adding
a new man. We now consider a way to modify an SMI instance without
adding a new agent.
For any SMI instance I, any woman q in I, and any man p in I who is
single in da(I)
and considers q to be unacceptable, we define extend (I, p, q) as the SMI
instance I 0 that is
identical to I except the preferences of man p are modified as follows:
man p moves woman q
from his unacceptable set to the the least-preferred position in his
ordered list of acceptable
women.
The arguments used for solving Problems 1, 2, and 3 are easily adapted
to establish
Lemma Extend below; the proof is omitted.
Lemma Extend. Let I be an SMI instance, let q be a woman in I, let p be
a man in I
who is single in da(I) and considers q to be unacceptable, and let I 0
denote the SMI instance
extend (I, p, q). If q prefers p to threshold (I, q), then p is matched to q in
da(I 0 ); otherwise,
p is single in da(I 0 ) and threshold (I 0 , q 0 ) = threshold (I, q 0 ) for
every woman q 0 i
---------------------------------------------------------------------------------------
CS210 Introduction to Java Programming Assignment
FOR MORE CLASSES VISIT
www.tutorialoutlet.com
CS210 Introduction to Programming
Java Programming Assignment 8: Array Implementation
NOTE: This assignment will be more challenging than the previous
assignments, so make sure to
start early and allocate enough time to complete it, including time you
might need to seek any
necessary help.
Since this is the last program, the program may not be submitted more
than 1 day late!
Problem Summary
A local city would like you to write a program to help them analyze data
on speeding tickets. City police
have collected information about the speeding violations. They store
data about each ticket issued during
a one week period in a text data file. Data collected for each ticket
includes the vehicle license plate
number, the speed limit, and the clocked speed. From past data, the
police department knows that it will
not issue more than 200 tickets per week.
You may assume all data in input data file is valid data (i.e. formatted
correctly), but you must verify that
the file exists (i.e. can be opened). If the file does not exist, the program
will loop until you enter the
filename for a file that can be opened.
Sample input data file lines:
BBB222 50 60
XYZ123 40 45
A1B2C3 30 51
The police department would like you to write a program to read the file,
calculate the fines to assess, and
generate several reports. The program will: Read the data from the file,
line by line, and store the data into an array that holds ticket data
objects. This array will hold a maximum of 200 ticket data objects.
Calculate the speeding ticket fines to assess, based on the ticket data,
and store the fines into a
second array that holds double values. This array will be sized to the
number of tickets issued. Produce an output file, containing the vehicle
license plate numbers and speeding fines. Analyze the fines to determine
the high, low, and average fines, and display the results. Here are the
formulas the city uses for calculating a speeding ticket fine:
Ticket Fine = Court costs ($45.00)
+ a fee for each mile per hour (MPH) by which the speed limit was
exceeded
The fee will be levied as follows:
MPH Over Speed Limit
up to 10
over 10 and up to 20
over 20 Fee per MPH Over Speed Limit (for all MPH over limit)
$ 4.25
$ 6.00
$ 8.10 You must define constants to hold all fixed values (court costs,
MPH over speed limits, and fees per
MPH) in the above chart within your method that calculates the fines.
Requirements
This program will implement two different types of arrays. One array
will hold ticket objects, and will
require an implementation class. The other array will contain primitive
data type double values, and will
not require an implementation class.
NOTE: The ticket array and the fines array will be parallel arrays. This
means that the
fine will be stored into the fines array using the same index as the ticket
object in the
ticket array.
NOTE: For an example of a Java program implementing arrays, see
Online Content section 15.10.
Required Classes and Methods
Three separate classes will be required for this program. A class to
define a SpeedingTicket object
A class to implement the object array (to hold SpeedingTicket objects)
A main class to run the program 1. Create a new Java NetBeans project,
named as follows:
LastnameJavaAssn8
For example: SmithJavaAssn8
2. Define a Java class with properties and methods for a speeding ticket
object, named:
SpeedingTicket The class will have the following private data
properties: vehicle license plate number (a 6-character String) the speed
limit the clocked speed
Within the SpeedingTicket class: Define a constructor, with parameters
for each data property.
o Use the parameters to initialize the values. Define getters for each data
property. 3. Define a second class that will implement the ticket array
for this program, named:
TicketArrayImpl The class will have the following public data
properties: A static constant array size (maximum items that can be held
in the array) set to 200
The class will have the following private data properties: A ticket data
array (to hold SpeedingTicket objects) A count of actual ticket objects
stored
Note: The data property definitions will only define the array reference
variable.
It will not create the array object. Unauthorized distribution (including
uploading to any non-Regis Internet website) violates copyright law
Within the TicketArraysImpl class: Define a constructor that will:
o Instantiate a ticket array object (using new to initialize the array
reference variable and
the constant array size) o Initialize the count of tickets stored to 0 Define
an instance method to add one SpeedingTicket object to the ticket data
array.
The method will:
o Have one parameter, the ticket object to add
o Test to see if the array is full If the array is full, will throw an
ArrayIndexOutOfBoundsException Include a message to pass to the
exception handler that states the
array is full and stating which license cannot be added.
Otherwise, store the ticket object into the array and increase the ticket
count Define a method to read all the data from the input file and store
the ticket data by adding
SpeedingTicket objects into the array. The method will:
o Have one parameter: the name of the data input file (String) o Return
an int value If the file was opened successfully, the method will return
the number of tickets
stored in the array. Otherwise, it will return 0, to indicate the file could
not be opened/read. o Implement code to try to open the input data file.
If the file opened: Display a message that the program is reading the file
data In a loop: Read the three data items from one line of data in the
input data file Call the constructor to create a new SpeedingTicket
object. Try to call the instance method to add the ticket object to the
ticket data
array
(this is an instance method of the TicketArrayImpl class) Catch any
thrown ArrayIndexOutOfBoundsException exceptions. Display the
message passed back via the throw. Also display a message that no more
data will be read from the file. Set a value to exit the loop (so no more
data will be read).
Loop until there is no more file data or an exception is thrown. o Close
file.
Display the number of SpeedingTicket objects stored in the ticket data
array. Catch any FileNotFoundException exceptions. When caught:
Display a message that explains which file could not be opened. o
Return the count of tickets stored in the array Define a method to
calculate and store values in the fines array. The method will:
o Have one parameter, the empty fines array o Define constants for all
fixed values in the calculations (from page 1 of this assignment). o For
each ticket stored in the ticket array: Access the clockedSpeed and
speedLimit data stored in the object using getters. Calculate the ticket
fine. Store the calculated fine in the fines array. Define an instance
method to produce a fines report.
The method will create an output file with the fines report. The method
should:
o Have one parameter, the fines array o Read the filename for the report
output file from the user. o Try to open the report output file If the file
opened successfully, generate a report and write it to the output file. The
output file will contain a list of vehicle license plate numbers (accessed
via a
getter) and the fine associated with that license, with the fines right-
aligned on the
decimal point. The last line of the output file will contain the total of all
fines collected, rightaligned on the decimal point, with the fines listed
above it.
Sample output file
BBB222
XYZ123
A1B2C3
Total o 87.50
66.25
215.10
368.85 Catch any FileIOException exceptions. When caught: Display a
message that explains which file could not be opened
and that a fines report will not be generated. 4. Define a third (main)
class named:
TicketAnalysis Within the TicketAnalysis class: Define three static
methods to:
o Determine and return the lowest fine amount
o Calculate and return the average fine amount
o Determine and return the highest fine amount
Each will have the fines array and count of fines in the array as
parameters. Define a static method to display a ticket summary, using
the previously defined static methods to
calculate the low, high, and average fines.
o Parameters: the fines array and count of fines in the array
o Ticket summary will be displayed as shown in the sample output on
the next page, with all
figures will be right-aligned on the decimal point.
©Regis University, All Rights Reserved
Unauthorized distribution (including uploading to any non-Regis
Internet website) violates copyright law Define a main method to:
o
o Display a description of what the program will do to the user.
In a loop (outer loop): Create a new object of the TickeArraysImpl class.
In a loop (inner loop): Read the filename for the input data file from the
user. Using the object, call the instance method to read and store the data
from the
input file (sends a message to the TicketArraysImpl object).
Loop until the method returns a number other than 0, indicating the file
was read (and
that the ticket data array now has ticket data stored in it). Display a
message to the user, that the program is calculating the fines. Define an
array (to hold double fines), the same size as the array for ticket objects.
Uses the TicketArraysImpl object to call: The instance method to
calculate the fines and store them in the array The instance method to
produce a fines report Execute the static method to display a ticket
summary. Ask the user whether to run the program again, using a
different input file. Loop until the user says s/he does not want to run the
program again.
Sample Run
This program will run analyses on weekly speeding ticket data files
Enter input filename: tickets
Cannot open input file: tickets
Enter input filename: tickets.txt
Reading ticket data...
Data stored for 3 tickets
Calculating fines...
Done!
Enter name of report output file: report.txt
Week's Ticket Analysis for 3 tickets issued:
Lowest ticket fine
66.25
Average ticket fine
122.95
Highest ticket fine
215.10
Run program again with another file (y/n)? n WARNING: The objects,
classes, and methods must be implemented exactly as specified above.
If your program produces correct output, but you did not create and use
the objects as specified,
and implement the required classes and methods, you will lose a
significant number of points.
See last page of the file for outline of code for the three required
classes.. The program must follow the CS210 Coding Standards from
Content section 6.10.
Be sure to include the following comments:
o Comments at the top of each code file describing what the class does
Include tags with the author’s name (i.e. your full name) and the version
of the
code (e.g. Java Assn 4, version 1.0)
o Comments at the top of each method, describing what the method does
Include tags with names and descriptions of each parameter and return
value.
Testing
You will need to create test data files to test your program. In
combination, all your test data files should
test every possible execution path within your code, including erroneous
data which cause exceptions.
Before you submit your project, add your all files you used to test your
program in the top level of your
project directory (and add a number to the end of each file, if there are
multiple test data files).
File examples: datafile1.txt
datafile2.txt (numbered, if multiple data files tested) Submission
This programming assignment is due by midnight of the date listed in
the Course Assignments by Week.
REMINDER: Programs submitted that do not compile without errors
will not be accepted.
Again, you will submit a single zip file containing all of the files in your
project. First export your project from NetBeans, as detailed in previous
assignments
o Name your export file in the following format:
<lastname>Assn<x>.zip For example: SmithAssn8.zip
NOTE: Save this zip file to some other directory, not your project
directory. Then submit your .zip file to the Java ProgAssn 8 assignment
submission folder (located under
the Assignments/Dropbox tab in the online course).
o Warning: Only NetBeans export files will be accepted.
Do not use any other kind of archive or zip utility. Grading
Programs will be graded using the rubric that is linked on the same
assignment page as this file.
WARNING:
Programs submitted more than 1 day past the due date will not be
accepted,
and will receive a grade of 0* Description of class and author and
version tags
*/
public class SpeedingTicket {
// ticket data fields go here
// constructor with parameters (and comments) goes here
// getters (with comments and return tags) go here
}
/**
* Description of class and author and version tags
*/
public class TicketArrayImpl {
// static constant array size goes here
// data fields go here (ticket array and ticket count)
// constructor without parameters (nd comments) goes here
//
(instantiates ticket array object and initializes ticket count)
// method to add ticket object to ticket array goes here
(with comments and parameter tag)
// method to read ticket data from file goes here
(-includes comments with parameter and return tags
-creates a ticket object for each ticket and
-calls previous method to add the object to the ticket array)
// method to calculate fines/store into array goes here
(with comments and parameter tag)
// method to create the fines report goes here
(with comments and parameter tag)
}
/**
* Description of program, and author and version tags
*/
public class TicketAnalysis {
public static void main(String args) {
// code to define variables & display program description
// Loop:
// code to instantiate TicketArrayImpl object
// Loop:
// code to read filename and try to read data from the file
// code to create fines array
// code to call other methods
}
// three methods to calculate the fines average, low, and high go here
(includes comments with parameter and return tags)
// method to display a ticket summary (with comments and parameter
tags)
}
---------------------------------------------------------------------------------------
educational course/tutorialoutlet.com
educational course/tutorialoutlet.com
educational course/tutorialoutlet.com
educational course/tutorialoutlet.com
educational course/tutorialoutlet.com
educational course/tutorialoutlet.com
educational course/tutorialoutlet.com
educational course/tutorialoutlet.com
educational course/tutorialoutlet.com
educational course/tutorialoutlet.com
educational course/tutorialoutlet.com
educational course/tutorialoutlet.com
educational course/tutorialoutlet.com
educational course/tutorialoutlet.com
educational course/tutorialoutlet.com
educational course/tutorialoutlet.com
educational course/tutorialoutlet.com
educational course/tutorialoutlet.com
educational course/tutorialoutlet.com
educational course/tutorialoutlet.com
educational course/tutorialoutlet.com
educational course/tutorialoutlet.com
educational course/tutorialoutlet.com
educational course/tutorialoutlet.com
educational course/tutorialoutlet.com
educational course/tutorialoutlet.com
educational course/tutorialoutlet.com
educational course/tutorialoutlet.com
educational course/tutorialoutlet.com
educational course/tutorialoutlet.com
educational course/tutorialoutlet.com
educational course/tutorialoutlet.com
educational course/tutorialoutlet.com
educational course/tutorialoutlet.com
educational course/tutorialoutlet.com
educational course/tutorialoutlet.com
educational course/tutorialoutlet.com
educational course/tutorialoutlet.com
educational course/tutorialoutlet.com
educational course/tutorialoutlet.com
educational course/tutorialoutlet.com
educational course/tutorialoutlet.com
educational course/tutorialoutlet.com
educational course/tutorialoutlet.com
educational course/tutorialoutlet.com
educational course/tutorialoutlet.com
educational course/tutorialoutlet.com
educational course/tutorialoutlet.com
educational course/tutorialoutlet.com
educational course/tutorialoutlet.com
educational course/tutorialoutlet.com
educational course/tutorialoutlet.com
educational course/tutorialoutlet.com
educational course/tutorialoutlet.com
educational course/tutorialoutlet.com
educational course/tutorialoutlet.com
educational course/tutorialoutlet.com
educational course/tutorialoutlet.com
educational course/tutorialoutlet.com
educational course/tutorialoutlet.com

More Related Content

What's hot

How To Download and Process SEC XBRL Data Directly from EDGAR
How To Download and Process SEC XBRL Data Directly from EDGARHow To Download and Process SEC XBRL Data Directly from EDGAR
How To Download and Process SEC XBRL Data Directly from EDGARAlexander Falk
 
How to work on Matlab.......
How to work on Matlab.......How to work on Matlab.......
How to work on Matlab.......biinoida
 
Graph Matching
Graph MatchingGraph Matching
Graph Matchinggraphitech
 
BSSML16 L7. Feature Engineering
BSSML16 L7. Feature EngineeringBSSML16 L7. Feature Engineering
BSSML16 L7. Feature EngineeringBigML, Inc
 
Matlab for Electrical Engineers
Matlab for Electrical EngineersMatlab for Electrical Engineers
Matlab for Electrical EngineersManish Joshi
 
Introduction to matlab lecture 1 of 4
Introduction to matlab lecture 1 of 4Introduction to matlab lecture 1 of 4
Introduction to matlab lecture 1 of 4Randa Elanwar
 
BSSML16 L10. Summary Day 2 Sessions
BSSML16 L10. Summary Day 2 SessionsBSSML16 L10. Summary Day 2 Sessions
BSSML16 L10. Summary Day 2 SessionsBigML, Inc
 
R programming for data science
R programming for data scienceR programming for data science
R programming for data scienceSovello Hildebrand
 
Multi layered perceptron (mlp)
Multi layered perceptron (mlp)Multi layered perceptron (mlp)
Multi layered perceptron (mlp)Handson System
 
Applications of data structures
Applications of data structuresApplications of data structures
Applications of data structuresWipro
 
Introduction to data structures and Algorithm
Introduction to data structures and AlgorithmIntroduction to data structures and Algorithm
Introduction to data structures and AlgorithmDhaval Kaneria
 
ScaleGraph - A High-Performance Library for Billion-Scale Graph Analytics
ScaleGraph - A High-Performance Library for Billion-Scale Graph AnalyticsScaleGraph - A High-Performance Library for Billion-Scale Graph Analytics
ScaleGraph - A High-Performance Library for Billion-Scale Graph AnalyticsToyotaro Suzumura
 
Design and Verification of 4 X 4 Wallace Tree Multiplier
Design and Verification of 4 X 4 Wallace Tree MultiplierDesign and Verification of 4 X 4 Wallace Tree Multiplier
Design and Verification of 4 X 4 Wallace Tree MultiplierMohd Esa
 
Relational Algebra and MapReduce
Relational Algebra and MapReduceRelational Algebra and MapReduce
Relational Algebra and MapReducePietro Michiardi
 

What's hot (20)

How To Download and Process SEC XBRL Data Directly from EDGAR
How To Download and Process SEC XBRL Data Directly from EDGARHow To Download and Process SEC XBRL Data Directly from EDGAR
How To Download and Process SEC XBRL Data Directly from EDGAR
 
Hadoop map reduce concepts
Hadoop map reduce conceptsHadoop map reduce concepts
Hadoop map reduce concepts
 
Altova NIEM keynote
Altova NIEM keynoteAltova NIEM keynote
Altova NIEM keynote
 
How to work on Matlab.......
How to work on Matlab.......How to work on Matlab.......
How to work on Matlab.......
 
Matlab 1 level_1
Matlab 1 level_1Matlab 1 level_1
Matlab 1 level_1
 
Graph Matching
Graph MatchingGraph Matching
Graph Matching
 
BSSML16 L7. Feature Engineering
BSSML16 L7. Feature EngineeringBSSML16 L7. Feature Engineering
BSSML16 L7. Feature Engineering
 
Lgm saarbrucken
Lgm saarbruckenLgm saarbrucken
Lgm saarbrucken
 
Matlab for Electrical Engineers
Matlab for Electrical EngineersMatlab for Electrical Engineers
Matlab for Electrical Engineers
 
Introduction to matlab lecture 1 of 4
Introduction to matlab lecture 1 of 4Introduction to matlab lecture 1 of 4
Introduction to matlab lecture 1 of 4
 
gSpan algorithm
gSpan algorithmgSpan algorithm
gSpan algorithm
 
BSSML16 L10. Summary Day 2 Sessions
BSSML16 L10. Summary Day 2 SessionsBSSML16 L10. Summary Day 2 Sessions
BSSML16 L10. Summary Day 2 Sessions
 
Lec5
Lec5Lec5
Lec5
 
R programming for data science
R programming for data scienceR programming for data science
R programming for data science
 
Multi layered perceptron (mlp)
Multi layered perceptron (mlp)Multi layered perceptron (mlp)
Multi layered perceptron (mlp)
 
Applications of data structures
Applications of data structuresApplications of data structures
Applications of data structures
 
Introduction to data structures and Algorithm
Introduction to data structures and AlgorithmIntroduction to data structures and Algorithm
Introduction to data structures and Algorithm
 
ScaleGraph - A High-Performance Library for Billion-Scale Graph Analytics
ScaleGraph - A High-Performance Library for Billion-Scale Graph AnalyticsScaleGraph - A High-Performance Library for Billion-Scale Graph Analytics
ScaleGraph - A High-Performance Library for Billion-Scale Graph Analytics
 
Design and Verification of 4 X 4 Wallace Tree Multiplier
Design and Verification of 4 X 4 Wallace Tree MultiplierDesign and Verification of 4 X 4 Wallace Tree Multiplier
Design and Verification of 4 X 4 Wallace Tree Multiplier
 
Relational Algebra and MapReduce
Relational Algebra and MapReduceRelational Algebra and MapReduce
Relational Algebra and MapReduce
 

Viewers also liked

EDUCATIONAL COURSE / TUTORIALOUTLET DOT COM
EDUCATIONAL COURSE / TUTORIALOUTLET DOT COMEDUCATIONAL COURSE / TUTORIALOUTLET DOT COM
EDUCATIONAL COURSE / TUTORIALOUTLET DOT COMjorge0044
 
anguilla catamaran charters /anguilla boat charters
anguilla catamaran charters /anguilla boat charters anguilla catamaran charters /anguilla boat charters
anguilla catamaran charters /anguilla boat charters sxmboatcharters
 
Jess presentation1
Jess presentation1Jess presentation1
Jess presentation1John Hall
 
Junta del 4 bimestre
Junta del 4 bimestreJunta del 4 bimestre
Junta del 4 bimestreJenny Angel
 
Political alert house of representatives daily program, tuesday 21 march 2017
Political alert   house of representatives daily program, tuesday 21 march 2017Political alert   house of representatives daily program, tuesday 21 march 2017
Political alert house of representatives daily program, tuesday 21 march 2017Lisa Munoz
 
3Com 69-000205-06
3Com 69-000205-063Com 69-000205-06
3Com 69-000205-06savomir
 
Desenhos para pano de prato para imprimir
Desenhos para pano de prato para imprimirDesenhos para pano de prato para imprimir
Desenhos para pano de prato para imprimircamp desenhos
 
Political alert house of representatives daily program, monday 20 march 2017
Political alert   house of representatives daily program, monday 20 march 2017Political alert   house of representatives daily program, monday 20 march 2017
Political alert house of representatives daily program, monday 20 march 2017Lisa Munoz
 
Modello unità di apprendimento ub d fase 3
Modello unità di apprendimento ub d fase 3Modello unità di apprendimento ub d fase 3
Modello unità di apprendimento ub d fase 3limparando
 
L'archivio Paolo Monti su OpenStreetMap
L'archivio Paolo Monti su OpenStreetMapL'archivio Paolo Monti su OpenStreetMap
L'archivio Paolo Monti su OpenStreetMapMarco Chemello
 

Viewers also liked (10)

EDUCATIONAL COURSE / TUTORIALOUTLET DOT COM
EDUCATIONAL COURSE / TUTORIALOUTLET DOT COMEDUCATIONAL COURSE / TUTORIALOUTLET DOT COM
EDUCATIONAL COURSE / TUTORIALOUTLET DOT COM
 
anguilla catamaran charters /anguilla boat charters
anguilla catamaran charters /anguilla boat charters anguilla catamaran charters /anguilla boat charters
anguilla catamaran charters /anguilla boat charters
 
Jess presentation1
Jess presentation1Jess presentation1
Jess presentation1
 
Junta del 4 bimestre
Junta del 4 bimestreJunta del 4 bimestre
Junta del 4 bimestre
 
Political alert house of representatives daily program, tuesday 21 march 2017
Political alert   house of representatives daily program, tuesday 21 march 2017Political alert   house of representatives daily program, tuesday 21 march 2017
Political alert house of representatives daily program, tuesday 21 march 2017
 
3Com 69-000205-06
3Com 69-000205-063Com 69-000205-06
3Com 69-000205-06
 
Desenhos para pano de prato para imprimir
Desenhos para pano de prato para imprimirDesenhos para pano de prato para imprimir
Desenhos para pano de prato para imprimir
 
Political alert house of representatives daily program, monday 20 march 2017
Political alert   house of representatives daily program, monday 20 march 2017Political alert   house of representatives daily program, monday 20 march 2017
Political alert house of representatives daily program, monday 20 march 2017
 
Modello unità di apprendimento ub d fase 3
Modello unità di apprendimento ub d fase 3Modello unità di apprendimento ub d fase 3
Modello unità di apprendimento ub d fase 3
 
L'archivio Paolo Monti su OpenStreetMap
L'archivio Paolo Monti su OpenStreetMapL'archivio Paolo Monti su OpenStreetMap
L'archivio Paolo Monti su OpenStreetMap
 

Similar to educational course/tutorialoutlet.com

BTE 320-498 Summer 2017 Take Home Exam (200 poi.docx
BTE 320-498 Summer 2017 Take Home Exam (200 poi.docxBTE 320-498 Summer 2017 Take Home Exam (200 poi.docx
BTE 320-498 Summer 2017 Take Home Exam (200 poi.docxAASTHA76
 
Cmps 260, fall 2021 programming assignment #3 (125 points)
Cmps 260, fall 2021 programming assignment #3 (125 points)Cmps 260, fall 2021 programming assignment #3 (125 points)
Cmps 260, fall 2021 programming assignment #3 (125 points)mehek4
 
CMSC 335 FINAL PROJECT
CMSC 335 FINAL PROJECTCMSC 335 FINAL PROJECT
CMSC 335 FINAL PROJECTHamesKellor
 
Rapport_Cemracs2012
Rapport_Cemracs2012Rapport_Cemracs2012
Rapport_Cemracs2012Jussara F.M.
 
1 Project 2 Introduction - the SeaPort Project seri.docx
1  Project 2 Introduction - the SeaPort Project seri.docx1  Project 2 Introduction - the SeaPort Project seri.docx
1 Project 2 Introduction - the SeaPort Project seri.docxhoney725342
 
PRETZEL: Opening the Black Box of Machine Learning Prediction Serving Systems
PRETZEL: Opening the Black Box of Machine Learning Prediction Serving SystemsPRETZEL: Opening the Black Box of Machine Learning Prediction Serving Systems
PRETZEL: Opening the Black Box of Machine Learning Prediction Serving SystemsNECST Lab @ Politecnico di Milano
 
CS 177 – Project #1 Summer 2015 Due Date =========.docx
CS 177 – Project #1 Summer 2015  Due Date =========.docxCS 177 – Project #1 Summer 2015  Due Date =========.docx
CS 177 – Project #1 Summer 2015 Due Date =========.docxfaithxdunce63732
 
HSc Computer Science Practical Slip for Class 12
HSc Computer Science Practical Slip for Class 12HSc Computer Science Practical Slip for Class 12
HSc Computer Science Practical Slip for Class 12Aditi Bhushan
 
Mis 589 Success Begins / snaptutorial.com
Mis 589  Success Begins / snaptutorial.comMis 589  Success Begins / snaptutorial.com
Mis 589 Success Begins / snaptutorial.comWilliamsTaylor44
 
Mis 589 Massive Success / snaptutorial.com
Mis 589 Massive Success / snaptutorial.comMis 589 Massive Success / snaptutorial.com
Mis 589 Massive Success / snaptutorial.comStephenson185
 
Scaling Application on High Performance Computing Clusters and Analysis of th...
Scaling Application on High Performance Computing Clusters and Analysis of th...Scaling Application on High Performance Computing Clusters and Analysis of th...
Scaling Application on High Performance Computing Clusters and Analysis of th...Rusif Eyvazli
 
School of Computing, Science & EngineeringAssessment Briefin.docx
School of Computing, Science & EngineeringAssessment Briefin.docxSchool of Computing, Science & EngineeringAssessment Briefin.docx
School of Computing, Science & EngineeringAssessment Briefin.docxanhlodge
 
Pretzel: optimized Machine Learning framework for low-latency and high throug...
Pretzel: optimized Machine Learning framework for low-latency and high throug...Pretzel: optimized Machine Learning framework for low-latency and high throug...
Pretzel: optimized Machine Learning framework for low-latency and high throug...NECST Lab @ Politecnico di Milano
 
Question 1 briefly respond to all the following questions. make
Question 1 briefly respond to all the following questions. make Question 1 briefly respond to all the following questions. make
Question 1 briefly respond to all the following questions. make YASHU40
 

Similar to educational course/tutorialoutlet.com (20)

BTE 320-498 Summer 2017 Take Home Exam (200 poi.docx
BTE 320-498 Summer 2017 Take Home Exam (200 poi.docxBTE 320-498 Summer 2017 Take Home Exam (200 poi.docx
BTE 320-498 Summer 2017 Take Home Exam (200 poi.docx
 
Cmps 260, fall 2021 programming assignment #3 (125 points)
Cmps 260, fall 2021 programming assignment #3 (125 points)Cmps 260, fall 2021 programming assignment #3 (125 points)
Cmps 260, fall 2021 programming assignment #3 (125 points)
 
CMSC 335 FINAL PROJECT
CMSC 335 FINAL PROJECTCMSC 335 FINAL PROJECT
CMSC 335 FINAL PROJECT
 
Project
ProjectProject
Project
 
Rapport_Cemracs2012
Rapport_Cemracs2012Rapport_Cemracs2012
Rapport_Cemracs2012
 
Matopt
MatoptMatopt
Matopt
 
1 Project 2 Introduction - the SeaPort Project seri.docx
1  Project 2 Introduction - the SeaPort Project seri.docx1  Project 2 Introduction - the SeaPort Project seri.docx
1 Project 2 Introduction - the SeaPort Project seri.docx
 
Cmgt 445 learning team b paper
Cmgt 445 learning team b paperCmgt 445 learning team b paper
Cmgt 445 learning team b paper
 
Oct.22nd.Presentation.Final
Oct.22nd.Presentation.FinalOct.22nd.Presentation.Final
Oct.22nd.Presentation.Final
 
PRETZEL: Opening the Black Box of Machine Learning Prediction Serving Systems
PRETZEL: Opening the Black Box of Machine Learning Prediction Serving SystemsPRETZEL: Opening the Black Box of Machine Learning Prediction Serving Systems
PRETZEL: Opening the Black Box of Machine Learning Prediction Serving Systems
 
CPP homework help
CPP homework helpCPP homework help
CPP homework help
 
BDS_QA.pdf
BDS_QA.pdfBDS_QA.pdf
BDS_QA.pdf
 
CS 177 – Project #1 Summer 2015 Due Date =========.docx
CS 177 – Project #1 Summer 2015  Due Date =========.docxCS 177 – Project #1 Summer 2015  Due Date =========.docx
CS 177 – Project #1 Summer 2015 Due Date =========.docx
 
HSc Computer Science Practical Slip for Class 12
HSc Computer Science Practical Slip for Class 12HSc Computer Science Practical Slip for Class 12
HSc Computer Science Practical Slip for Class 12
 
Mis 589 Success Begins / snaptutorial.com
Mis 589  Success Begins / snaptutorial.comMis 589  Success Begins / snaptutorial.com
Mis 589 Success Begins / snaptutorial.com
 
Mis 589 Massive Success / snaptutorial.com
Mis 589 Massive Success / snaptutorial.comMis 589 Massive Success / snaptutorial.com
Mis 589 Massive Success / snaptutorial.com
 
Scaling Application on High Performance Computing Clusters and Analysis of th...
Scaling Application on High Performance Computing Clusters and Analysis of th...Scaling Application on High Performance Computing Clusters and Analysis of th...
Scaling Application on High Performance Computing Clusters and Analysis of th...
 
School of Computing, Science & EngineeringAssessment Briefin.docx
School of Computing, Science & EngineeringAssessment Briefin.docxSchool of Computing, Science & EngineeringAssessment Briefin.docx
School of Computing, Science & EngineeringAssessment Briefin.docx
 
Pretzel: optimized Machine Learning framework for low-latency and high throug...
Pretzel: optimized Machine Learning framework for low-latency and high throug...Pretzel: optimized Machine Learning framework for low-latency and high throug...
Pretzel: optimized Machine Learning framework for low-latency and high throug...
 
Question 1 briefly respond to all the following questions. make
Question 1 briefly respond to all the following questions. make Question 1 briefly respond to all the following questions. make
Question 1 briefly respond to all the following questions. make
 

Recently uploaded

History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxsocialsciencegdgrohi
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxRaymartEstabillo3
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...M56BOOKSTORE PRODUCT/SERVICE
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerunnathinaik
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaVirag Sontakke
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfMahmoud M. Sallam
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfSumit Tiwari
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceSamikshaHamane
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 

Recently uploaded (20)

History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developer
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of India
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdf
 
ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in Pharmacovigilance
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 

educational course/tutorialoutlet.com

  • 1. APMA 0160 Homework 5 FOR MORE CLASSES VISIT www.tutorialoutlet.com Homework 5 due Wednesday, March 8, 5pm Submit zipped .m files on Canvas and printed published file in 182 George St box #15 or #16 You are encouraged to work with other students on this assignment but you are expected to write and work on your own answers. You don’t need to provide the name of students you worked with. You can find information about usage and syntax of any built-in Matlab function by typing help xfunctionnamey in the Command window, where is the space character. You are expected to submit (I) a zipped file containing all your .m and any .out files online on Canvas (II) a printout of the files produced by the publish command of the filled in template and all other .m files your template uses in the dropbox in 182 George St lobby (#15 for S01 and #16 for S02) Late homework will not be accepted without proper justification. Problem 1 : Lagrangian interpolation For this problem, you will find the unique polynomial of degree n, Πn , that goes through a set of datapoints tpxk , yk qunk0 using Lagrangian interpolation. You will also measure the maximum error in a given interval, assuming that yk ’s are values of the Runge’s function. Write a Matlab function with the definition function [LPvalues] = LagrangePoly(xdata, ydata, xgrid)
  • 2. where xdata, ydata LPvalues : : vectors of the tpxk , yk quk0 datapoints the vector of values of Πn on the respective locations in xgrid n LPvalues must be computed using the Lagrange formulation Πnpxq ¸ y φ pxq, n k φkpxq k ¹ xx n j j 0 j k k 0 xkxj You may find the prod function useful here. (a) Consider the set of points tp1, 4q, p2, 3q, p3, 5q, p4, 7q, p5, 2qu. Use your LagrangePoly function to find the values of the interpolating polynomial on the grid 1:0.01:5. Plot on the same figure the datapoints with orange circles and the interpolating polynomial on the grid 1:0.01:5 with a solid line. (b) Repeat part (a) for the set of 11, 21, 31 uniformly distributed nodes xk in fRpxq 1 r1, 1s and ykfRpxk q, where 1 25x2 is Runge’s function on the grid -1:0.01:1. Use different colors when plotting the interpolating polynomials for each of the three cases and add a legend. Use ylim to show the plots for 1 ¤ y ¤ 1. Print on the screen a message for each case, stating the maximum absolute error between the function values and the interpolating polynomial values on the grid. 1 APMA0160, Spring 2017 Homework 5 (c) Repeat part (b) for the set of 11, 21, 31 uniformly distributed nodes xk in rπ, πs and yk grid -pi:0.01:pi. (d) Repeat part (b) for the set of 11, 21, 31 Chebyshev-Gauss-Lobatto nodes xk in on the grid -1:0.01:1. sinpxk q on the r1, 1s and ykfRpxk q (e) Write in a block of comments at the end of your prob1() function a few comments about the behavior
  • 3. of the maximum absolute error from parts (b)-(d). In particular, for parts (b) and (c), explain how your results are supported by what we saw in class regarding the bound of the maximum absolute error. Problem 2 : Taylor’s polynomials for the sine function For this problem, you will approximate the sine function by its Taylor polynomials of increasing degree. The Taylor expansion for the sine function around x0 0 is sin x ¸8 p1qk x2k 1 x x3 p2k 1q! 3! k0 x5 5! and it holds for all x P R. Your program will support this claim by plotting the Taylor polynomials ¸ p1qk x2k p2k 1q! k0 N 1 which approach the sine function as N increases. Write a Matlab function with the definition function [c] = sinPoly(n) where c is the vector of n Taylor polynomial is n). 1 coefficients of the Taylor polynomial of order n (i.e. the highest order of the Your function should check that the input variable n is odd. If it is even, it should print an error message and return c=0. You may find the mod function useful here. Using your sinPoly function, plot on the same axes the function sinpxq and the Taylor polynomials of degree 5, 9, 13, 17, 21 in r2π, 2πs on a grid of 1000 equally spaced points. You may use polyval to evaluate the polynomials on the grid. Use a legend to label the plotted curves and
  • 4. place it outside of the figure. For eachdegree, print on the screen the maximum absolute error between the sine function and the Taylor polynomial on the same grid. 2 --------------------------------------------------------------------------------------- CA 103Q1 File Size, Transmission Speed, and Transmission Time FOR MORE CLASSES VISIT www.tutorialoutlet.com Cloud 9, a cloud storage service provider based in San Diego, has just announced that it is running out of money and will be shutting down operations soon. It has given all its clients fifteen (15) days to move their data out, either back to their own facility or to an alternative service provider. Founded six years ago, Cloud 9 has since acquired 500 business clients, who use Cloud 9's infrastructure to store archived data. Among these clients, a few are large companies with several terabytes (TB) of data archived at Cloud 9, but on average each client company stores about 400 Gigabytes (GB) of data on Cloud 9's disk drives. Cloud 9's connection to the Internet is a Gigabit Ethernet line that has an effective aggregate transmission rate of 1 Gbps (1,000,000,000 bits per second). To make your calculations easier, a few assumptions have been made as follows: 1. Cloud 9's Internet connection will be available 24 x 7 before the 15- day shutdown deadline. 2. Even if new funding could be arranged, there would be no time to add additional transmission lines to Cloud 9's facility before the deadline. 3. For regulatory compliance reasons, Cloud 9's clients cannot afford to lose their archived data, but none of them has a secondary backup copy of the data. 4. Each of Cloud 9's client has found adequate transmission and storage capacity to receive the data to be moved back.
  • 5. 5. 1 GB = 1,0243 Bytes = 1,073,741,824 Bytes Questions: a.If all of Cloud 9's clients start moving their data out at the beginning of the 15-day period by sharing Cloud 9's Internet connection, will there be enough time to move all the data out? Show your calculations. b. What alternatives do Cloud 9's clients have, other than moving their data out over telecommunications lines? ---------------------------------------------------------------------------------------  CIS 115So when do you think you would use a WHILE loop for an array FOR MORE CLASSES VISIT www.tutorialoutlet.com So when do you think you would use a WHILE loop for an array, and when would you use a FOR loop? Why? Why wouldn't you always use a FOR LOOP? --------------------------------------------------------------------------------------- CIS 489 Final Project: Project Plan FOR MORE CLASSES VISIT www.tutorialoutlet.com Final Project: Project Plan Due Week 10 and worth 300 points This assignment consists of three (3) sections: a written project plan, a revised Gantt chart or project plan, and a project plan PowerPoint presentation. You must submit the three (3) sections as separate files for the completion of this assignment. Label each file name according to the section of the assignment for which it is written. Additionally, you may
  • 6. create and / or assume all necessary assumptions needed for the completion of this assignment. While taking all business and project parameters into consideration, make quality assumptions to support the following requirements. Section 1: Written Project Plan You are now in the final stage of the project plan development. All previous documentation will be combined into one (1) document that will serve as the statement of work for the project. Your goal is to have the project approved by the executive team and the venture capital group. The project plan is very detailed which is appropriate to accomplish the monumental task of implementation. However, the executive team is only interested in a ten (10) minute summation. Therefore, you also must create a compelling executive summary that is supported by your detail that convinces the executive group that your solution is optimal. 1. Write an eight to ten (8-10) page executive summary in which you provide a high-level technical overview of your project where you address the following: 1. 1. Describe the scope of the project and control measures. 2. Describe the goals and objectives of the project. 3. Give a detailed, realistically estimated cost analysis of the entire project. 4. Relate the value of the project plan solution to the competitive advantage that information technology will afford your organization. 5. Provide all aspects of the information technology implementation into the project plan. 6. Use at least five (5) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources. Your assignment must follow these formatting requirements:
  • 7.  Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.  Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.  Include charts or diagrams created in MS Visio and MS Project as appendix of the Word document. Make reference of these files in the body of the Word document. Section 2: Revised Gantt Chart / Project Plan Use Microsoft Project or an open source alternative, such as Open Project, to: 2. Update the Gantt chart or project plan (summary and detail) template, from Project Deliverable 4: Infrastructure and Security, with all the project tasks. Section 3: Project Plan PowerPoint Presentation Additional to your detailed executive summary you must present your findings to the executive team and the venture capital group that, along with the executive summary, will convince the group that your solution is optimal. 3. Create a ten to fifteen (10-15) slide PowerPoint presentation in which you: a. Illustrate the concepts from your written report in Section 1 of this assignment. b. Create bulleted speaking notes for your presentation to the executive board in the Notes section of the PowerPoint. Note: You may create or assume any fictitious names, data, or scenarios that have not been established in this assignment for a realistic flow of communication. c. Use a professional technically written style to graphically convey the information.
  • 8. The specific course learning outcomes associated with this assignment are:  Demonstrate an understanding of existing and emerging information technologies and strategic impact on organizational operations.  Evaluate the issues and challenges associated with information technology integration.  Summarize the competitive advantage that information technology affords to organizations.  Use technology and information resources to research issues in information technology.  Write clearly and concisely about strategic issues and practices in the information technology domain using proper writing mechanics and technical style conventions. --------------------------------------------------------------------------------------- CMGT 410 Cloud computing FOR MORE CLASSES VISIT www.tutorialoutlet.com Cloud computing is a collection of individual technologies that become one integrated technology for deployment. Create a 3-page process map using Visio® showing the various components of cloud computing and who has responsibility for the implementation and support of the cloud. Additionally, include basic cloud essentials, security, virtualization and databases. Note: Responsible parties can include vendors, in-house IT, outsourced IT, security team, or hybrid group --------------------------------------------------------------------------------------- CMIS 102Homework 2Test Case Creation FOR MORE CLASSES VISIT www.tutorialoutlet.com
  • 9. Homework 2 – Test Case Creation Using the following pseudocode, provide 3 unique test cases that would help validate your algorithm. Be sure to place the test cases in a table showing the input values, and expected output for each test case. Write "Enter the price in dollars:" Input Price Write "Enter state sales tax(e.g. .06) :" Input SalesTax Set Price = Price + (Price * SalesTax) Write "Price with Tax is" + Price Submit your word or PDF file to your assignments folder no later than the due date. Grading guidelines Submission A minimum of 3 test cases were provided. Input provided and explained for each test case. Expected output provided and explained for each test case. Test cases represent a wide variety of possible input values (e.g. large numbers, small numbers (0), negative, or unexpected non-number entries). Total Points 2 1 1 1 5 --------------------------------------------------------------------------------------- CMIS 111 Final Project FOR MORE CLASSES VISIT
  • 10. www.tutorialoutlet.com Final Project The final project for this course consists of two case studies related to cybersecurity and the use of social networking and home computer use. Please review the case studies and respond using the guidelines provided below. Case Study 1: Securing your home computer You just purchased a brand new computer for your home environment. It comes with the latest operating system, Internet connectivity and all accessories to complete your home office and school activities. You also have an Internet Service Provider where you can easily use the existing network to connect to the Internet and to perform some online banking. Describe the steps you plan to go through to ensure this new computer system remains as secure as possible. Be sure to discuss the details of firewall settings you plan to implement, browser privacy and security settings, and recommended software (e.g., Anti-virus and others) you will install. Also, describe your password strength policy you plan to adopt, and what you envision to do to ensure your online banking site is encrypted and uses the proper certificates. Discussion of operating system patches and application updates should also be included. As you discuss these steps, be sure to justify your decisions bringing in possible issues if these steps are not followed. You can discuss this for a specific type of computer (e.g. MAC or PC) to make the scenario more appropriate for your environment. Case Study 2: Guidance for a family member using social networking sites. A family member, who just turned 13, wants to join Facebook, create a
  • 11. Twitter account and start texting his friends on a regular basis. For the purpose of this paper, let us assume you are willing to allow your family to participate in these social networking activities and the family member has agreed to use your advice to protect his or her privacy and security while participating in these social networking activities. Describe the specific guidance and rules that your family member must adhere to for this activity to move forward. Be sure to provide specific settings for Facebook and Twitter as well as any guidance for texting with friends. Be sure to discuss how to detect, prevent and report issues such as cyber bullying, identity theft, and child predatory behavior. Be sure to justify your decisions bringing in possible issues if the guidance you provided is not followed Prepare a well-written paper no more than 10 pages in length. In this paper you will address each of the above case studies. Be sure to clearly separate the case studies into separate sections of the paper. Only one paper is needed to address both case studies Submission requirements: Your completed assignment should be saved as a Word (or PDF) document and submitted to your LEO assignments area no later than the due date listed in the syllabus. Your document should be neat, wellwritten with minimal grammar and spelling errors. You should name the file yournamefinalproject.docx (or yournamefinalproject.pdf). So if my name was Julie Smith, I would name my document juliesmithfinalproject.docx. Your name should be clearly listed on the first page along with the class/section, professor and due date. Your document should contain page numbers at the bottom of each page. Single or double space line formatting is acceptable. All references used for your report should be included in APA style format. See
  • 12. the following APA reference guide for details on how to cite your references: http://www.umuc.edu/library/libhow/apa_examples.cfm Grading guidelines Submission Case Study 1: Describes the steps you plan to go through to ensure this new computer system remains as secure as possible. Case Study 1: Discusses the details of firewall settings you plan to implement. Case Study 1: Discusses browser privacy and security settings. Case Study 1: Discusses the recommended software (e.g., Anti-virus and others) you will install. Case Study 1: Describes the password strength policy you plan to adopt. Case Study 1: Describes what you envision to do to ensure your online banking site is encrypted and uses the proper certificates. Case Study 1: Discusses operating system patches and application updates. Case Study 1: Justifies your decisions bringing in possible issues if your recommended steps are not followed. Case Study 2: Describes the specific guidance and rules that your family member must adhere to for this activity to move forward. Cast Study 2: Provides specific settings for Facebook and Twitter as well as any guidance for texting with friends. Case Study 2: discuss how to detect, prevent and report issues such as cyber bullying, identity theft, and child predatory behavior. Case Study 2: Justifies your decisions bringing in possible issues if the guidance you provided is not followed. Document is well-organized, and contains minimal spelling and grammar errors. The student’s name is clearly listed on the first page along with the class/section, professor and due date. The document contains page numbers at the bottom of
  • 13. each page. Single or double space line formatting is used. APA style format is used for references. Total Points 5 5 5 5 5 5 5 10 5 10 10 10 20 100 --------------------------------------------------------------------------------------- CMIT 495 Active Directory Policy Statement General Active Directory Forest FOR MORE CLASSES VISIT www.tutorialoutlet.com 1. Active Directory Policy Statement General Active Directory Forest : Deployment of one Active Directory Forest will suffice for WWTC’s requirments. There are not requirements for data isolation within WWTC’s Active Directory configuration and any data separation can be performed using data isolation. A single-forest was chosen because it is very cost-effective and requires the least amount of administrative support. For example, with only one forest, the global catalog does not require synchronization across forests and management of a duplicate infrastructure is not required. An organizational forest
  • 14. model will be used with user accounts and resources contained in the forest and managed independently. The forest will be used to provide service and data isolation. This has been chosen insteady of other models where resources and users are isolated in separate forests. Active Directory Domain : WTC will use an Organizational Domain Forest to provide autonomous groups within the forest as required. The New York office will have a separate domain from the Hong Kong office since it will be largely autonomous. In addition, a separate domain can be created to restrict access to confidential data. Since WWTC will have few IT personnel to care for dayto-day IT support activities in New York, the following functions will be maintained by forestlevel administration: Creating and removing domain controllers Monitoring the functioning of domain controllers Managing services that are running on domain controllers Backing up and restoring the directory Two domains will require that Group Policy settings as well as access control /auditing settings( required forest-wide) are implemented separately to each domain in the forest. This setup is considered a regional domain configuration and will reduce traffic over wide area network (WAN) links. While service administration will be carefully controlled at the Hong Kong office, the following functions will be maintained within the New York office: Creating organizational units (OUs) and delegating administration Repairing problems in the OU structure that OU owners do not have sufficient access rights to fix Instead of creating a separate forest root domain, the New York office function as the forest root domain. It will be a parent domain to the other offices.
  • 15. Service administrator accounts will reside on the New York root domain while user accounts for each region will reside on the appropriate domain. For administration purposes, the branch offices will functions as child domains under the New York root domain. This configuration was chosen because it is much easier to manage than a configuration with a separate domain for administrative accounts. Active Directory Naming Convention: WWTC.org is the Active Directory namespace used by WWTC. It is a registered fully qualified domain name for WWTC. WWTC will use the same internal and external namespace. WWTC.org will be used from inside and outside the organization without a separate namespace for internal access to resources. This means that the tree name (WWTC.org) is consistent for the private and public (Internet) allowing users to logon with the same credentials internally and externally. This requires a separate zone outside the firewall to provide name resolution for public resources and does create security concerns to ensure that clients accessing resources from outside the organization do not have access to internal company resources. This also creates the requirement for maintaining the records on both the internal and external DNS servers simultaneously. The attached illustration shows this configuration. Application Services: Windows Server 2012 is installed on the network and the following Active Directory features will be implemented. Windows Deployment Services (WDS) will be implemented to allows
  • 16. network-based installation of Windows Operating Systems (OS) to reduce the complexity and cost of manual installation. This will require a WDS Server as a member of the Active Directory Domain Services (AD DS) domain. This also requires a Dynamic Host Configuration Protocol (DHCP) server with an active scope sine PXE relies on DHCP for IP addressing. Smart Card Authentication will require valid user principal names (UPNs) since they are required fo smart card login. Since a certificate authority (CA) will issue the domain controller certificates, the root certificate will be added to the Trusted Root Certification Authorities group policy in Active Directory. IP Address Management (IPAM) will be implemented to provide highly customizable administrative and monitoring capabilities for the IP address infrastructure. IPAM will be used to discover, utilize, monitor, audit, and manage IP address space in the network. This requires an IPAM server that has connectivity to existing DHCP, DNS, DC, and NPS servers in the Active Directory forest. WDS services will be hosted on the same computer as DHCP. This requires that WDS is configured so that it doesn’t listen on Port 67 and DHCP option 60 will be used to notify a booting PXE client that there is a listening PXE server on the network. The server will also be configured to
  • 17. respond only to known client computers. This ensures that client computers are added to Active Directory before the image is deployed. File Classification Infrastructure (FCI) will be implemented to ensure that automatic classification is performed. The different classifications will be identified. Currently they are listed as Public and Confidential. The properlassification will be applied to every file using FCI. This process will be used to ensure that Confidential data is properly stored on encrypted drives and that all confidential files are transmitted using encrypted methods. Reporting based on these classification tabs will allow administrators to detect and respond to violations of the WWTC’s data classification policy. Failover cluster services will be implemented so that the entire network has hardware, software, and storage redundancy. This independent group of servers and storage devices will work together to increase the availability of applications and services. If one clustered device fails, another will provide the lost services (called failover). The cluster validation wizard will be used to ensure that all network components are compatible prior to implementation. It will also be used after implementation and as new devices are added to the network to maintain this capability. By implementing backup for all servers and storage, WWTC ensures that users experience a minimum of disruptions in service.
  • 18. Cache encryption will be implemented to store encrypted data by default. This means that data in cache is stored encrypted by default providing data security without requiring entire drive encryption. BranchCache will be implemented to increase performance, manageability, scalability, and availability. Duplicate files are eliminated while hashes and local storage at branch offices drastically reduce the amount of required WAN traffic. Bitlocker encryption will be used to protect all user and server data. The benefit is that the entire drive is encrypted and only requires the user’s normal authentication to access the data. The bitlocker system on the wired network will be set up to automatically unlock the system volume during boot to reduce the internal help desk calls because of lost PINs. Group policy settings will be enforced that require either Used Disk Space Only or Full Encryption is used when BitLocker is enabled on a drive. Groups: Users and computer accounts will be grouped to simplify administration by controlling permissions and rights rather than assigning them individually. Groups in Active Directory are objects that reside in the domain. Groups have a scope that identifies the extent that they are applied in the domain or forest. The three group scopes for WWTC are outlined below: Domain local scope is used to manage accounts within the domain. For example, a user group that requires access to a printer can be setup so
  • 19. that access to a new printer can be done for the entire group at once instead of doing a permission list for all five users. The five users will have global scope and will be added to a domain local scope group that can be assigned printer access. Global scope is used for directory objects that require daily maintenance, such as user accounts, computer accounts, or groups that require management across domains (such as a department in multiple locations). Universal scope is used to consolidate groups that span domains. Changes to global scope groups doesn’t affect the universal scope group, but changes to the universal scope group causes the entire membership of the group to be replicated to every global catalog in the forest. The scope and Organizational Unit setup has been outlined in the below diagram. The above structure was chosen so that Group Policy could be applied to a select group of users or resources without having to set policies for each individual user. -------------------------------------------------------------------------------------- CMIT 495Active Directory Policy Statement FOR MORE CLASSES VISIT www.tutorialoutlet.com Active Directory Policy Statement General Active Directory Forest : Deployment of one Active Directory Forest will suffice for WWTC’s requirments. There are not requirements for data isolation within WWTC’s Active
  • 20. Directory configuration and any data separation can be performed using data isolation. A single- forest was chosen because it is very cost-effective and requires the least amount of administrative support. For example, with only one forest, the global catalog does not require synchronization across forests and management of a duplicate infrastructure is not required. An organizational forest model will be used with user accounts and resources contained in the forest and managed independently. The forest will be used to provide service and data isolation. This has been chosen insteady of other models where resources and users are isolated in separate forests. Active Directory Domain : WTC will use an Organizational Domain Forest to provide autonomous groups within the forest as required. The New York office will have a separate domain from the Hong Kong office since it will be largely autonomous. In addition, a separate domain can be created to restrict access to confidential data. Since WWTC will have few IT personnel to care for dayto-day IT support activities in New York, the following functions will be maintained by forestlevel administration: Creating and removing domain controllers Monitoring the functioning of domain controllers Managing services that are running on domain controllers Backing up and restoring the directory Two domains will require that Group Policy settings as well as access control
  • 21. /auditing settings( required forest-wide) are implemented separately to each domain in the forest. This setup is considered a regional domain configuration and will reduce traffic over wide area network (WAN) links. While service administration will be carefully controlled at the Hong Kong office, the following functions will be maintained within the New York office: Creating organizational units (OUs) and delegating administration Repairing problems in the OU structure that OU owners do not have sufficient access rights to fix Instead of creating a separate forest root domain, the New York office function as the forest root domain. It will be a parent domain to the other offices. Service administrator accounts will reside on the New York root domain while user accounts for each region will reside on the appropriate domain. For administration purposes, the branch offices will functions as child domains under the New York root domain. This configuration was chosen because it is much easier to manage than a configuration with a separate domain for administrative accounts. Active Directory Naming Convention: WWTC.org is the Active Directory namespace used by WWTC. It is a registered fully qualified domain name for WWTC. WWTC will use the same internal and external namespace. WWTC.org will be used from inside and outside the organization without a
  • 22. separate namespace for internal access to resources. This means that the tree name (WWTC.org) is consistent for the private and public (Internet) allowing users to logon with the same credentials internally and externally. This requires a separate zone outside the firewall to provide name resolution for public resources and does create security concerns to ensure that clients accessing resources from outside the organization do not have access to internal company resources. This also creates the requirement for maintaining the records on both the internal and external DNS servers simultaneously. The attached illustration shows this configuration. Application Services: Windows Server 2012 is installed on the network and the following Active Directory features will be implemented. Windows Deployment Services (WDS) will be implemented to allows network-based installation of Windows Operating Systems (OS) to reduce the complexity and cost of manual installation. This will require a WDS Server as a member of the Active Directory Domain Services (AD DS) domain. This also requires a Dynamic Host Configuration Protocol (DHCP) server with an active scope sine PXE relies on DHCP for IP addressing. Smart Card Authentication will require valid user principal names (UPNs) since they are required fo smart card login. Since a certificate authority
  • 23. (CA) will issue the domain controller certificates, the root certificate will be added to the Trusted Root Certification Authorities group policy in Active Directory. IP Address Management (IPAM) will be implemented to provide highly customizable administrative and monitoring capabilities for the IP address infrastructure. IPAM will be used to discover, utilize, monitor, audit, and manage IP address space in the network. This requires an IPAM server that has connectivity to existing DHCP, DNS, DC, and NPS servers in the Active Directory forest. WDS services will be hosted on the same computer as DHCP. This requires that WDS is configured so that it doesn’t listen on Port 67 and DHCP option 60 will be used to notify a booting PXE client that there is a listening PXE server on the network. The server will also be configured to respond only to known client computers. This ensures that client computers are added to Active Directory before the image is deployed. File Classification Infrastructure (FCI) will be implemented to ensure that automatic classification is performed. The different classifications will be identified. Currently they are listed as Public and Confidential. The properclassification will be applied to every file using FCI. This process will be used
  • 24. to ensure that Confidential data is properly stored on encrypted drives and that all confidential files are transmitted using encrypted methods. Reporting based on these classification tabs will allow administrators to detect and respond to violations of the WWTC’s data classification policy. Failover cluster services will be implemented so that the entire network has hardware, software, and storage redundancy. This independent group of servers and storage devices will work together to increase the availability of applications and services. If one clustered device fails, another will provide the lost services (called failover). The cluster validation wizard will be used to ensure that all network components are compatible prior to implementation. It will also be used after implementation and as new devices are added to the network to maintain this capability. By implementing backup for all servers and storage, WWTC ensures that users experience a minimum of disruptions in service. Cache encryption will be implemented to store encrypted data by default. This means that data in cache is stored encrypted by default providing data security without requiring entire drive encryption. BranchCache will be implemented to increase performance, manageability,
  • 25. scalability, and availability. Duplicate files are eliminated while hashes and local storage at branch offices drastically reduce the amount of required WAN traffic. Bitlocker encryption will be used to protect all user and server data. The benefit is that the entire drive is encrypted and only requires the user’s normal authentication to access the data. The bitlocker system on the wired network will be set up to automatically unlock the system volume during boot to reduce the internal help desk calls because of lost PINs. Group policy settings will be enforced that require either Used Disk Space Only or Full Encryption is used when BitLocker is enabled on a drive. Groups: Users and computer accounts will be grouped to simplify administration by controlling permissions and rights rather than assigning them individually. Groups in Active Directory are objects that reside in the domain. Groups have a scope that identifies the extent that they are applied in the domain or forest. The three group scopes for WWTC are outlined below: Domain local scope is used to manage accounts within the domain. For example, a user group that requires access to a printer can be setup so that access to a new printer can be done for the entire group at once instead of
  • 26. doing a permission list for all five users. The five users will have global scope and will be added to a domain local scope group that can be assigned printer access. Global scope is used for directory objects that require daily maintenance, such as user accounts, computer accounts, or groups that require management across domains (such as a department in multiple locations). Universal scope is used to consolidate groups that span domains. Changes to global scope groups doesn’t affect the universal scope group, but changes to the universal scope group causes the entire membership of the group to be replicated to every global catalog in the forest. The scope and Organizational Unit setup has been outlined in the below diagram. The above structure was chosen so that Group Policy could be applied to a select group of users or resources without having to set policies for each individual user. --------------------------------------------------------------------------------------- CMPS 11 Quiz5 FOR MORE CLASSES VISIT www.tutorialoutlet.com CMPS 11 Quiz5 This is a closed notes, closed book exam. June 3, 2013 Ok to leave out 1. (2 points) Given the following variation on the IntListElement class from class, what would be printed by the program Main1? Put the output on the lines shown in the comments. class IntListElement {
  • 27. IntListElement(int value, IntListElement e) { data = value; next = e; } IntListElement next; int data; } class Main1 { public static void main(String args) { IntListElement e1 = new IntListElement(1776,null); e1 = new IntListElement(1984, e1); e1 = new IntListElement(2001, e1); e1 = new IntListElement(2013, e1); System.out.println(e1.data); // prints _______ System.out.println(e1.next.next.data); // prints _______ } } 2. (2 points) Suppose the two println() calls in Main1 above were replaced by the line mystery(e1); and the following method was added to the class Main1, what would be printed? static void mystery(IntListElement list) { if (list != null) { System.out.println(list.data); mystery(list.next); } } 3. (0.5 pts) To have some code execute each time a button is pressed you would put the code in the actionPerformed() method of a class that implements ActionListener, let’s call it listener, and then A. Pass listener to a method of the button. B. Pass the button to a method of listener. C. Do both A and B.
  • 28. D. None of the above, you would add the code to a method of a class that extends JButton. 4. (0.5 pts) True or False? (circle one) A listener object can be “listening” to multiple components and do different things depending upon which component generates an event. (0.5 pts) True or False? (circle one) A listener object can be “listening” for one and only one type of event (e.g. ActionEvents for clicks on buttons or MouseEvents to respond to mouse motion like drawing but not both). (0.5 pts) True or False? (circle one) Multiple listener objects can be listening and execute code for a single event on one component. For example, two different listeners could respond, each in their own way, to a single button click. (1 point) Write a complete program that prints the first 50 multiples of 3 (i.e. 3, 6, 9, … 150). 5. 6. 7. THERE ARE MORE QUESTIONS ON THE BACK 8. (1 point) Write the method needed by this program. It prints true if the 3 numbers read from the console are in increasing order, and false otherwise. That is, each number must be strictly larger than the previous. Entering 3 4 5 would result in true, but entering 3 3 5 would result in false as would 3 5 4. import java.util.*; class Ordered { static final Scanner in = new Scanner(System.in); public static void main(String args) { boolean x = increasing(in.nextInt(), in.nextInt(), in.nextInt()); System.out.println(x); } } 9. (2 points) Write a method findLargest that takes a reference to an IntListElement, list, and returns the value of the largest integer stored in the list. E.g. If the list myList contained 3, 4, 5, 1 then x = findLargest(myList) would assign x to be 5. You should assume that the list is not empty. (BONUS up to 3 points for overall quiz total for the quarter) Write a method get(), to be
  • 29. added to the IntListElement class from problem 1, that takes one integer parameters, n, and returns the value stored in the data field of the nth element of the list (starting with 0 being the first element). For example if myList pointed to the list containing the 5 elements 100, 200, 300, 400, 500 then executing x = myList.get(3); would store 400 in x. --------------------------------------------------------------------------------------- COM 140Project 3 FOR MORE CLASSES VISIT www.tutorialoutlet.com Project 3 1. Specification The third programming project involves writing a program to calculate the terms of the following sequence of numbers: 0 1 1 3 5 11 21 43 … where each term is twice the second previous term plus the previous term. The 0th term of the sequence is 0 and the 1st term of the sequence is 1. The example below shows how to calculate the next sequence term: Current sequence: 0 1 Current sequence: 0 1 1 Current sequence: 0 1 1 3 Current sequence: 0 1 1 3 5 … etc. Calculate next term: 2 * 0 + 1 = 1 Calculate next term: 2 * 1 + 1 = 3 Calculate next term: 2 * 1 + 3 = 5 Calculate next term: 2 * 3 + 5 = 11 The interface to the program should be a Swing based GUI that looks similar to the following: The pair of radio buttons allows the user to choose whether an iterative or recursive method is used to compute
  • 30. the term of the sequence. When the user enters a value for n and then clicks the Compute button, the nth term of the sequence should be displayed in the Result field. The Efficiency field should contain the number of calls to the recursive method when the recursive option is chosen and the number of iterations of the loop when the iterative option is selected. The program will check the validity of the user input value which should be a positive integer. A message will be shown in a JOptionPane for illegal entered values. The Iterative radio button should be initially selected. When the window is closed, the efficiency values should be computed with values of n from 0 to 19 and written to a text file outData.txt. Each line of the file should contain the value of n, the efficiency of the iterative method for that value of n and the efficiency of the recursive method. The values should be separated by commas so the file can be opened with Excel and used to graph the value of the efficiencies for both the iterative and recursive options along the y axis with the value of n along the x-axis. The graph should be included in the solution description document that accompanies this project and should also contain a brief explanation of the observed results. The program should consist of two classes. 1 1. The first class P3GUI should define the Swing based GUI and should be hand-coded and not generated by a GUI generator. In addition to the main method and a constructor to build the GUI, an event handler will be needed to handle the Compute button click and another handler will be needed to produce the file described above when the window is closed. The latter handler should be an object of an inner
  • 31. class that extends the WindowAdapter class. 2. The other class should be named Sequence. It should be a utility class meaning that all its methods must be class (static) methods and no objects should be able to be generated for that class. It should contain three public methods: a. The first method computeIterative should accept a value of n and return the corresponding element in the sequence using iteration. b. The second method computeRecursive should accept a value of n and return the corresponding element in the sequence using recursion. This method will initialize the efficiency counter before calling the private recursive method that will actually perform the recursive computation. c. The third method getEfficiency will return the efficiency counter left behind by the previous call to either of the above two methods. Your program should compile without errors. The Google recommended Java style guide (https://google.github.io/styleguide/javaguide.html) should be used to format and document your code. Specifically, the following style guide attributes should be addressed: Header comments include filename, author, date and brief purpose of the program. In-line comments used to describe major functionality of the code. Meaningful variable names and prompts applied. Class names are written in UpperCamelCase. Variable names are written in lowerCamelCase. Constant names are in written in All Capitals. Braces use K&R style. In addition the following design constraints should be followed: Declare all instance variables private Avoid the duplication of code Test cases should be supplied in the form
  • 32. of a table with columns indicating what aspect is tested, the input values, expected output, actual output and if the test case passed or failed. This table should contain 5 columns with appropriate labels and a row for each test case. Note that the actual output should be the actual results you receive when running your program and applying the input for the test record. Be sure to select enough differentkinds of employees and situations to completely test the program. 2. Submission Requirements Submit the following to the Project 3 assignment area no later than the due date listed in your LEO classroom. 1. Source files P3GUI.java, Sequence.java and the program generated output file outData.txt. The source code should use Java code conventions and appropriate code layout (white space management and indents) and comments. All submitted files may be included in a .zip file. 2 2. The solution description document P3SolutionDescription (.pdf or .doc / .docx) containing the following: (1) Assumptions, main design decisions, error handling; (2) Test cases table (3) The graph of the value of the efficiencies for both the iterative and recursive options along with a brief explanation of the observed results. (4) Screen captures showing successful program compilation and test cases execution. Each screen capture should be properly labeled, clearly indicated what the screen capture represents. (5) Lessons learned from the project; 3. Grading Rubric The following grading rubric will be used to determine your grade: Attribute P3GUI class Meets
  • 33. 40 points Does not meet 0 points a) Defines the GUI. a) Does not define the GUI. b) Contains a pair of radio buttons allowing the user to choose whether an iterative or recursive method is used to compute the term of the sequence. b) Does not contain a pair of radio buttons allowing the user to choose whether an iterative or recursive method is used to compute the term of the sequence. c) Allows the user to enter a value for n and click the Compute button, to display the nth term of the sequence in the Result field. c) Does not allows the user to enter a value for n and click the Compute button, to display the nth term of the sequence in the Result field. d) User input value is checked and warning message is displayed if the entered value is not a positive integer. d) User input value is checked and warning message is displayed if the entered value is not a positive integer. e) Allows the Efficiency field to contain the number of calls to the recursive method when the recursive option is chosen and the number of iterations of the loop when the iterative option is selected. e) Does not allow the Efficiency field to contain the number of calls to the recursive method when the recursive option is chosen and the number of iterations of the loop when the iterative
  • 34. option is selected. f) The Iterative radio button is initially set to selected. f) The Iterative radio button is not initially set to selected. g) When the window is closed, the efficiency values computes with values of n from 0 to 19 and writes them to a file. h) Each line of the output file contains the value of n, the efficiency of the iterative method for that value of n and 3 g) When the window is closed, the efficiency values does not compute with values of n from 0 to 19 and the output file is not generated. h) Each line of the output file does not contain the value of n, the efficiency of the efficiency of the recursive method. i) The values of the output file are separated by commas so the file can be opened with Excel. j) Provides an event handler to handle the Compute button click and another handler will be needed to produce the file described above when the window is closed. The latter handler is an object of an inner class that extends the WindowAdapter class. Sequence Class Test Cases the iterative method for that value of n and the efficiency of the recursive method. i) The values of the output file are not separated by commas so that the file can
  • 35. be opened by Excel. 30 points j) Does not provides an event handler to handle the Compute button click and another handler will be needed to produce the file described above when the window is closed. The latter handler is an object of an inner class that extends the WindowAdapter class. 0 points a) All methods are class (static) methods. a) All methods are not class (static) methods. b) Contains three public methods. b) Does not contain three public methods. c) Contains computeIterative method that accepts a value of n and returns the corresponding element in the sequence using iteration. c) Does not contain the computeIterative method that accepts a value of n and returns the corresponding element in the sequence using iteration. d) Contains method computeRecursive that accepts a value of n and returns the corresponding element in the sequence using recursion. d) Does not contain the computeRecursive method that accepts a value of n and returns the corresponding element in the sequence using recursion. e) The computeRecurvise method will initialize the efficiency counter before calling the private recursive method that will actually perform the recursive computation. e) The computeRecurvise method does not initialize the efficiency counter before calling the private recursive method that will actually perform the recursive computation. f) The getEfficiency method returns the
  • 36. efficiency counter left behind by the previous call to either of the above two methods. 10 points f) The getEfficiency method does not return the efficiency counter left behind by the previous call to either of the above two methods. 0 points a) Test cases are supplied in the form of table with columns indicating test case objective, the input values, expected output, actual output and if the test case passed or failed. a) No test cases were provided. b) Enough scenarios selected to 4 completely test the program. Documentation and Style guide c) Test cases were included in the supporting word or PDF documentation. 20 points a) Solution description document P3SolutionDescription includes all the required sections appropriate titled. 0 points a) No solution description document is included. Source code criteria Source code criteria b) Header comments include filename, author, date and brief purpose of the program. c) In-line comments used to describe major functionality of the code. d) Meaningful variable names and prompts applied.
  • 37. e) Class names are written in UpperCamelCase. f) Variable names are written in lowerCamelCase. g) Constant names are in written in All Capitals. h) Braces use K&R style. i) Declare all instance variables private. j) Avoids the duplication of code. 5 b) Java style guide was not used to prepare the Java code. c) All instance variables not declared private. d) Duplication of code was not avoided. --------------------------------------------------------------------------------------- COP 3330 Upon completion of this program FOR MORE CLASSES VISIT www.tutorialoutlet.com Objective Upon completion of this program,you should gain experience with the use of managing arrays inside of a class. ABETISMALCS Assessment This assignment is designated as one of the course assignments being used to assess basic programming skills for ABETISL‘LALCs requirements. Please see the syllabus for details. Note that in addition to the normal grading scales, each student‘s submission Will be judged in several aspects on a scale of "HighlyEffwtive", ”Effective", or "Ineffective" , as specified by ABETISNIAIES outcome assessment procedures. A student's submission that earns 70% of the available points will count as an overall score of ”Effective". Task You will write a class called
  • 38. Grid, and test it with a couple of programs. A Grid object will be made up or" a grid of positions, numbered with rows and columns. Row and column numbering start at 0. at the top left corner of the grid. A grid object also has a "mover". which can move around to different locations on the grid. Obstacles (which block the mover) and other objects (that can he placed or picked up) are also available. Here is a sample picture of a Grid object: O . . This is 3 Grid object with 4 rows and 4 columns (numbered 0 - 3). . b . The mover ‘>' is at. row 1' column 2, facing eeet. . . The obstacle ‘4“ is at row 3, column 1 . # . . The other item '0' ie at. row 0, column 0 The E character indicates that the mover and an item (0] currently occupy the same position on the grid. Program Details and Requirements 1) Grid class Download this starter file: grid starter . h and rename it as grid . 1:. Your member function prototypes are already given in this file. You will need to add appropriate member data. You will also need to define each of the member functions in the file grid.cpp. You may add Whatever member data you need, but you must store the grid itself as a two-dimensional array. Maximum grid size will be 40 rows and 40 columns. --------------------------------------------------------------------------------------- COSC 2315 Implement aprogram that will use a stack FOR MORE CLASSES VISIT www.tutorialoutlet.com Implement as program that will use a stack structure to check for correct placement of parentheses in an algebraic expression. Allow the use of ( ) [ ] { } characters as grouping symbols. Make sure that an error is reported for an expression of a form (...]. In addition report other possible parentheses related errors (too many levels, too many right paren., too many left paren.). Make sure to use 'silent error reporting' (and report any possible errors outside the main scanner loop).
  • 39. Hint - start with the program that checks '(...)' and when all the common errors are correctly reported, expand the parentheses syntax to ([{...}]) --------------------------------------------------------------------------------------- CS 161Assignment 4 Strings and Function FOR MORE CLASSES VISIT www.tutorialoutlet.com Assignment 4 Strings and Functions Due: Sunday, February 19, 2017 11:59pm (90 pts) Problem Statement: Wheel of Fortune You will implement the program for playing a modified Wheel of Fortune. The game must allow a user to enter the number of rounds to play and a new secret message (possibly containing blanks) with each round, and print the number of dashes/slots for the message (spaces do not get dashes, just the space). If you are not familiar with the game of Wheel of Fortune, then you can watch an episode on YouTube: https://www.youtube.com/watch?v=A8bZUXi7zDE NOTE: I realize there are solutions to assignments online, but resist the temptation of using these because the assignments are checked against online resources, code submitted by classmates, and code submitted by prior students for cheating/plagiarism. It is much more gratifying to complete this on your own. Make sure you take time to design well!!! The game can play with 1-3 players, and it continues a round, until someone solves the puzzle correctly. A new puzzle is given with each round. In this Wheel of
  • 40. Fortune, you won’t win as much or any prizes, but you might go bankrupt or lose a turn!!! Your random numbers are only from 0-21, with 0 being bankrupt, 1-20 being the dollar amount earned per letter found in the puzzle, and 21 is lose a turn. The game begins by asking the first player if he/she wants to spin the wheel, buy a vowel, or solve the puzzle. On a player’s first turn, it might not make sense to choose anything other than spinning the wheel, but a player is given these three choices at all times during their turn, until they guess an incorrect non-vowel letter, incorrectly solve the puzzle, or spin a 0 or 21. If the player chooses to spin and the spin is >0 and <21, then the player is asked to guess a non-vowel letter. If the non-vowel letter was not found in the puzzle, then the player loses their turn to the next player. If the non-vowel letter is found in the puzzle, then the player wins the number of letters found times (*) the dollar amount spun. If a player spins a 0, then the player’s earnings go to a zero in that round, and the next player gets the three choices to spin the wheel, solve the puzzle, or buy a vowel. If a player spins a 21, then the player’s keeps the round earnings, but the next player gets the three choices to spin the wheel, solve the puzzle, or buy a vowel. If a player chooses to solve the puzzle and does so correctly, then the player gets to keep all the money earned in that round, while all other players lose their money in that round. If a player chooses to solve the puzzle and does so incorrectly, then the turn goes to the next player.
  • 41. A player can only buy a vowel when his/her earnings are >= $10, which is the one-time amount paid for each vowel guess, regardless of whether the vowel is found. The player who has the most money after N rounds is the winner! A few rule specifics: You have a total round earnings and a total game earnings. You always get a choice of spinning the wheel, solving the puzzle, or buying a vowel during your turn, buy you cannot buy a vowel if you have less than $10. You lose your turn by incorrectly guessing a non-vowel letter on a spin, spinning a 0 or 21, or incorrectly solving the puzzle. If you spin > 0 or <21, then you get the number spun times (*) the number of non-vowel letters found added to your round total. If you spin a 0, then you go bankrupt in the round (lose your round total), and it ends your turn. If you spin a 21, then you keep your round total, but it ends your turn. You can buy a vowel for $10, and you only pay the $10 vowel purchase once on a guess, independent of how many are found. If you solve the puzzle correctly, then you keep the money earned for that round and add it to your total game earnings. You win the game by having the most game earnings, not round earnings!!! Your program must print out 1) the number spun on the wheel,2) the number of letters found for a guess, 3) the total round earnings, 4) the message with the correctly guessed slots and blank slots, 5) if the user guesses the message, then a winner message and the total game earnings for all players, and 6) after all rounds are played, a message with the winning player. Program Requirements: Only use C++ strings, no need for an array! Hint: use two strings! Your program must ignore cases in the message. Each function, including main, may not have more than 15 lines of code
  • 42. (this doesn’t include curly braces, variable declarations, comments, and blank spaces!). You are not allowed to use global variables. Read the C++ string documentation to help with this assignment: http://www.cplusplus.com/reference/string/string/?kw=string **You can decide how many incorrect guesses a user gets before they lose. In addition, you can use the system(“clear”); command from the <cstdlib> to clear the screen, after the user enters their message. Yes they can scroll above to see the message, but we aren’t cheaters!!! Example Run: Enter a message: National Park Service How many players do you have? 2 How many rounds for winning? 1 The message is _ _ _ _ _ _ _ _ ____ _______ Player 1: Do you want to spin (1), solve the puzzle (2), or buy a vowel (3): 1 Your wheel landed on 20 Guess a letter: n 2 found. Total: $40 The message is N _ _ _ _ n _ _ ____ _______ Do you want to spin (1), solve the puzzle (2), or buy a vowel (3): 1 Your wheel landed on 10 Guess a letter: l 1 found. Total: $50 The message is N _ _ _ _ n _ l ____ _______ Do you want to spin (1), solve the puzzle (2), or buy a vowel (3): 3 Guess a vowel: a 3 found. Total: $40 The message is N a _ _ _ n a l _ a _ _ _ _ _ _ _ _ _ Do you want to spin (1), solve the puzzle (2), or buy a vowel (3): 1 Your wheel landed on 0 Total: $0 The message is N a _ _ _ n a l _a__ _______ Player 2: Do you want to spin (1), solve the puzzle (2), or buy a vowel (3): 1
  • 43. Your wheel landed on 5 Guess a letter: r 2 found. Total: $10 The message is N a _ _ _ n a l _ar_ __r____ Do you want to spin (1), solve the puzzle (2), or buy a vowel (3): 1 Your wheel landed on 10 Guess a letter: t 1 found. Total: $20 The message is N a t _ _ n a l _ar_ __r____ Do you want to spin (1), solve the puzzle (2), or buy a vowel (3): 2 Guess message: National Park Service You are correct! Player 2 wins round 1. Player 1 total: $0 Player 2 total: $20 Player 2 wins game! (10 pts) Extra Credit Error Handling Make it so that your program never errors on users input! Handle the following errors: The user enters a message or letter outside of A-Z and a-z. The user enters an invalid menu choice. The user enters a vowel for a non-vowel guess. The user enters a non-vowel for a vowel guess. (-10 pts) Automatic Deduction: You are not allowed to use global variables in any assignment in CS 161. There isn’t any practical purpose for them in this course. Keep this in mind as you design your program with functions. (10 pts) Program Style/Comments In your implementation, make sure that you include a program header in your program, in addition to proper indentation/spacing and other comments! Below is an example header to include. Make sure you review the style guidelines for this class, and begin trying to follow them, i.e. don’t align everything on the left or put everything on one line! http://classes.engr.oregonstate.edu/eecs/winter2017/cs161-
  • 44. 001/161_style_guideline.pdf You are graded on having a header, function headers with pre/post conditions, proper comments, and readable code with indentation and vertical spacing that is CONSISTENT throughout your program. DO NOT align your entire program on the left side. This will cause you to automatically lose the full 10 points. In addition, do not forget your program header!!! Electronically submit your C++ program (.cpp file, not your executable!!!) by the assignment due date, using TEACH. --------------------------------------------------------------------------------------- CS 192 Let’s think about the use of Lists in everyday life FOR MORE CLASSES VISIT www.tutorialoutlet.com Let’s think about the use of Lists in everyday life. Provide an example and discuss the advantages and disadvantages of using these types of Lists. --------------------------------------------------------------------------------------- CS 210 Introduction to Programming Java Programming Assignment FOR MORE CLASSES VISIT www.tutorialoutlet.com CC& The output file will contain a list of vehicle license plate numbers (accessed via agetter) and the fine associated with that license, with the fines right-aligned on thedecimal poi§ If the file opened successfully, generate a report and write it to the output file.§ Define an instance method to produce a fines report.The method will create an output file
  • 45. with the fines report. The method should:o Have one parameter, the fines arrayo Read the filename for the report output file from the user.o Try to open the report output file· Store the calculated fine in the fines array.§ Calculate the ticket fine.§ Access the clockedSpeed and speedLimit data stored in the object using getters.§ Define a method to calculate and store values in the fines array. The method will:o Have one parameter, the empty fines arrayo Define constants for all fixed values in the calculations (from page 1 of this assignment).o For each ticket stored in the ticket array:· Display a message that explains which file could not be opened.o Return the count of tickets stored in the array.©Regis University, All Rights ReservedUnauthorized distribution (including uploading to any non-Regis Internet website) violates copyright lawv Display the number of SpeedingTicket objects stored in the ticket data array.o Catch any FileNotFoundException exceptions. When caught:§ Close file.§ Set a value to exit the loop (so no more data will be read).Loop until there is no more file data or an exception is thrown.Ø Also display a message that no more data will be read from the file.Ø Display the message passed back via the throw.Ø Catch any thrown ArrayIndexOutOfBoundsException exceptions.v Try to call the instance method to add the ticket object to the ticket dataarray(this is an instance method of the TicketArrayImpl class)v Call the constructor to create a new SpeedingTicket object.v Read the three data items from one line of data in the input data filev In a loop:§ Display a message that the program is reading the file data§ Otherwise, it will return 0, to indicate the file could not be opened/read.o Implement code to try to open the input data file. If the file opened:§ If the file was opened successfully, the method will return the number of ticketsstored in the array.§ Define a method to read all the data from the input file and store the ticket data by addingSpeedingTicket objects into the array. The method will:o Have one parameter: the name of the data input file (String)o Return an int value· Otherwise, store the ticket object into the array and increase the ticket count§ Include a message to pass to the exception handler that states thearray is full and stating which license cannot be added.· If the array is full, will throw an ArrayIndexOutOfBoundsException§ Define an instance method to add one SpeedingTicket object to the ticket data
  • 46. array.The method will:o Have one parameter, the ticket object to addo Test to see if the array is full· Define a constructor that will:o Instantiate a ticket array object (using new to initialize the array reference variable andthe constant array size)o Initialize the count of tickets stored to 0· A count of actual ticket objects storedNote: The data property definitions will only define the array reference variable. It will not create the array object.©Regis University, All Rights ReservedUnauthorized distribution (including uploading to any non-Regis Internet website) violates copyright lawWithin the TicketArraysImpl class:v A ticket data array (to hold SpeedingTicket objects)v A static constant array size (maximum items that can be held in the array) set to 200The class will have the following private data properties:v Define getters for each data property.3. Define a second class that will implement the ticket array for this program, named:TicketArrayImplThe class will have the following public data properties:· Define a constructor, with parameters for each data property.o Use the parameters to initialize the values.· the clocked speedWithin the SpeedingTicket class:v the speed limitv vehicle license plate number (a 6-character String)v A main class to run the program1. Create a new Java NetBeans project, named as follows:LastnameJavaAssn8For example: SmithJavaAssn82. Define a Java class with properties and methods for a speeding ticket object, named:SpeedingTicketThe class will have the following private data properties:· A class to implement the object array (to hold SpeedingTicket objects)· A class to define a SpeedingTicket object· Analyze the fines to determine the high, low, and average fines, and display the results.Here are the formulas the city uses for calculating a speeding ticket fine:Ticket Fine = Court costs ($45.00) + a fee for each mile per hour (MPH) by which the speed limit was exceeded The fee will be levied as follows:MPH Over Speed Limit Fee per MPH Over Speed Limit (for all MPH over limit)up to 10 $ 4.25over 10 and up to 20 $ 6.00over 20 $ 8.10You must define constants to hold all fixed values (court costs, MPH over speed limits, and fees perMPH) in the above chart within your method that calculates the fines.©Regis University, All Rights ReservedUnauthorized distribution (including uploading to any non-Regis Internet website) violates copyright
  • 47. lawProgramRequirementsThis program will implement two different types of arrays. One array will hold ticket objects, and willrequire an implementation class. The other array will contain primitive data type double values, and willnot require an implementation class.NOTE: The ticket array and the fines array will be parallel arrays. This means that thefine will be stored into the fines array using the same index as the ticket object in theticketarray.NOTE: For an example of a Java program implementing arrays, see Online Content section 15.10.Required Classes and MethodsThree separate classes will be required for this program.· Produce an output file, containing the vehicle license plate numbers and speeding fines.· Calculate the speeding ticket fines to assess, based on the ticket data, and store the fines into asecond array that holds double values. This array will be sized to the number of tickets issued.· Read the data from the file, line by line, and store the data into an array that holds ticket dataobjects. This array will hold a maximum of 200 ticket data objects.·ISCS210 Introduction to ProgrammingJava Programming Assignment 8: Array ImplementationNOTE: This assignment will be more challenging than the previous assignments, so make sure tostart early and allocate enough time to complete it, including time you might need to seek anynecessaryhelp.Since this is the last program, the program may not be submitted more than 1 day late!ProblemSummaryA local city would like you to write a program to help them analyze data on speeding tickets. City policehave collected information about the speeding violations. They store data about each ticket issued duringa one week period in a text data file. Data collected for each ticket includes the vehicle license platenumber, the speed limit, and the clocked speed. From past data, the police department knows that it willnot issue more than 200 tickets per week.You may assume all data in input data file is valid data (i.e. formatted correctly), but you must verify thatthe file exists (i.e. can be opened). If the file does not exist, the program will loop until you enter thefilename for a file that can be opened.Sample input data file lines:BBB222 50 60XYZ123 40 45A1B2C3 30 51The police department would like you to write a program to read the file, calculate the fines to assess, andgenerate several reports. The program will: Then
  • 48. submit your .zip file to the Java ProgAssn 8 assignment submission folder (located underthe Assignments/Dropbox tab in the online course).o Warning: Only NetBeans export files will be accepted. Do not use any other kind of archive or zip utility.GradingPrograms will be graded using the rubric that is linked on the same assignment page as this file.WARNING:Programs submitted more than 1 day past the due date will not be accepted,and will receive a grade of 0.©Regis University, All Rights ReservedUnauthorized distribution (including uploading to any non-Regis Internet website) violates copyright law/*** Description of class and author and version tags*/public class SpeedingTicket {// ticket data fields go here// constructor with parameters (and comments) goes here// getters (with comments and return tags) go here}/*** Description of class and author and version tags*/public class TicketArrayImpl { // static constant array size goes here // data fields go here (ticket array and ticket count) // constructor without parameters (nd comments) goes here // (instantiates ticket array object and initializes ticket count) // method to add ticket object to ticket array goes here (with comments and parameter tag) // method to read ticket data from file goes here (-includes comments with parameter and return tags -creates a ticket object for each ticket and -calls previous method to add the object to the ticket array) // method to calculate fines/store into array goes here (with comments and parameter tag) // method to create the fines report goes here (with comments and parameter tag)}/*** Description of program, and author and version tags*/public class TicketAnalysis { public static void main(String[] args) { // code to define variables· First export your project from NetBeans, as detailed in previous assignmentso Name your export file in the following format:Assn.zipFor example: SmithAssn8.zipNOTE: Save this zip file to some other directory, not your project directory.· Include tags with the author’s name (i.e. your full name) and the version of thecode (e.g. Java Assn 4, version 1.0)o Comments at the top of each method, describing what the method doesInclude tags with names and descriptions of each parameter and return value.TestingYou will need to create test data files to test your program. In combination, all your test data files shouldtest every possible execution path within your code,
  • 49. including erroneous data which cause exceptions.Before you submit your project, add your all files you used to test your program in the top level of yourproject directory (and add a number to the end of each file, if there are multiple test data files).File examples: datafile1.txtdatafile2.txt (numbered, if multiple data files tested)SubmissionThis programming assignment is due by midnight of the date listed in the Course Assignments by Week.REMINDER: Programs submitted that do not compile without errors will not be accepted.Again, you will submit a single zip file containing all of the files in your project.§ Ask the user whether to run the program again, using a different input file.Loop until the user says s/he does not want to run the program again.SampleRunWARNING: The objects, classes, and methods must be implemented exactly as specified above.If your program produces correct output, but you did not create and use the objects as specified,and implement the required classes and methods, you will lose a significant number of points.See last page of the file for outline of code for the three required classes.This program will run analyses on weekly speeding ticket data filesEnter input filename: tickets Cannot open input file: ticketsEnter input filename: tickets.txtReading ticket data...Data stored for 3 ticketsCalculating fines...Done!Enter name of report output file: report.txtWeek's Ticket Analysis for 3 tickets issued: Lowest ticket fine 66.25 Average ticket fine 122.95 Highest ticket fine 215.10Run program again with another file (y/n)? n©Regis University, All Rights ReservedUnauthorized distribution (including uploading to any non-Regis Internet website) violates copyright law5. The program must follow the CS210 Coding Standards from Content section 6.10.Be sure to include the following comments:o Comments at the top of each code file describing what the class does§ Execute the static method to display a ticket summary.§ The instance method to produce a fines reportv The instance method to calculate the fines and store them in the arrayv Uses the TicketArraysImpl object to call:§ Define an array (to hold double fines), the same size as the array for ticket objects.§ Display a message to the user, that the program is calculating the fines.§ Using the object, call the instance method to read and store the data from theinput file (sends a
  • 50. message to the TicketArraysImpl object).Loop until the method returns a number other than 0, indicating the file was read (andthat the ticket data array now has ticket data stored in it).v Read the filename for the input data file from the user.v In a loop (inner loop):§ Create a new object of the TickeArraysImpl class.§ Define a main method to:o Display a description of what the program will do to the user.o In a loop (outer loop):· Define a static method to display a ticket summary, using the previously defined static methods tocalculate the low, high, and average fines.o Parameters: the fines array and count of fines in the arrayo Ticket summary will be displayed as shown in the sample output on the next page, with allfigures will be right-aligned on the decimal point.BBB222 87.50XYZ123 66.25A1B2C3 215.10Total 368.85©Regis University, All Rights ReservedUnauthorized distribution (including uploading to any non-Regis Internet website) violates copyright law· Define three static methods to:o Determine and return the lowest fine amounto Calculate and return the average fine amounto Determine and return the highest fine amountEach will have the fines array and count of fines in the array as parameters.· Display a message that explains which file could not be openedand that a fines report will not be generated.4. Define a third (main) class named:TicketAnalysisWithin the TicketAnalysis class:§ The last line of the output file will contain the total of all fines collected, rightalignedon the decimal point, with the fines listed above it.Sample output fileo Catch any FileIOException exceptions. When caught:§nt. & display program description // Loop:// code to instantiate TicketArrayImpl object // Loop:// code to read filename and try to read data from the file// code to create fines array// code to call other methods } // three methods to calculate the fines average, low, and high go here(includes comments with parameter and return tags) // method to display a ticket summary (with comments and parameter tags) --------------------------------------------------------------------------------------- CS 331, Spring 2017 Assignment #2 FOR MORE CLASSES VISIT
  • 51. www.tutorialoutlet.com CS 331, Spring 2017 Assignment #2 Greg Plaxton January 31, 2017 For this assignment, you are required to turn in solutions to any two of Problems 1 through 4, which appear in Section 2 below. Your solutions are due at the beginning of class on Thursday, February 9. Please refer to the course syllabus for the ground rules concerning collaboration, and for the slack day policy governing lateness. Any corrections or clarifications related to this assignment will be announced in the lectures and on Piazza. You are responsible for being aware of any such announcements. 1 Exercises The following textbook exercises are recommended to help you to prepare for the tests. We will not be grading your solutions to these exercises, so you do not need to turn anything in. 1. Exercise 3.10, page 110. 2. Exercise 3.12, page 112. 3. Exercise 4.15, page 196. 4. Exercise 4.28, page 203. 2 Programming & Problem Solving In this part of the assignment, we continue our investigation of the SMI problem introduced in Assignment 1. In the first lecture (see also Section 1.1 of the textbook), we described the deferred acceptance algorithm for the SM problem. We showed that given any instance I of the SM problem, the deferred acceptance algorithm produces a stable matching.
  • 52. In Problem 3 of Assignment 1, we showed that there is a natural way to modify the deferred acceptance algorithm so that it produces a stable matching on any given SMI instance. When we discussed the deferred acceptance algorithm for the SM problem, we showed that the stable matching µ it produces is “man-optimal” in the sense that each man likes 1 University of Texas at Austin Department of Computer Science Algorithms and Complexity CS 331, Spring 2017 his partner in µ at least as well as his partner in any other stable matching. The concept of man-optimality is easily adapted to the context of the SMI problem; in this context, we just need to bear in mind that an agent’s partner in a given matching might be “no partner”, i.e., being single is a possible outcome. Using arguments similar to the corresponding arguments for SM, it can be shown that for the SMI problem, the stable matching produced by the deferred acceptance algorithm (i.e., the version that we developed in Problem 3 of Assignment 1) is man-optimal. It follows that even though the deferred acceptance algorithm is nondeterministic — and hence can execute in many different ways on a given SMI instance — the final output is uniquely determined; in the problem hints below, we refer to this as the “confluence property” of the deferred acceptance algorithm. For any instance I of the SMI problem, we define da(I) as the stable matching produced
  • 53. by the deferred acceptance algorithm, and we define matched (I) as the set of men who are matched (i.e., not single) in da(I). For any SMI instance I, any woman q in I, and any man p who is not in I, we define add (I, p, q) as the set of all SMI instances that are the same as I except that (1) p is added to the set of men, (2) the preferences of p are such that q is acceptable to p and all other women are unacceptable to p, and (3) the preferences of each woman in I are augmented to incorporate p. To clarify (3), consider a woman q 0 in I who finds ` of the men in I to be acceptable. There are ` + 2 ways for q 0 to augment her preferences to incorporate p: she can classify p as acceptable, in which case there are ` + 1 different ways she can insert p into her strict ranking of acceptable men, or she she can classify p as unacceptable. In the statement of Problem 1 below, we use the symbol ∅ as follows: If we say that a woman q prefers a man p to ∅, we mean that q considers p to be acceptable; conversely, if we say that q prefers ∅to p, it means that q considers p to be unacceptable. Problem 1. Let I be an SMI instance and let q be a woman in I. Prove that there is a unique element x of matched (I)+∅ such that the following conditions hold for any man p who is not in I and any SMI instance I 0 in add (I, p, q): if q prefers p to x in I 0 , then p is matched
  • 54. to q in da(I 0 ); otherwise, p is single in da(I 0 ). Hints: (1) Use the confluence property of the deferred acceptance algorithm; (2) Observe that once execution of the deferred acceptance algorithm reaches a state where there is exactly one single man who has not proposed to all of his acceptable women, the rest of the execution is deterministic. Definition: For any SMI instance I and any woman q in I, we define the unique element x identified in Problem 1 as threshold (I, q). Problem 2. Let I be an SMI instance, let q be a woman in I, let p be a man who is not in I, and let I 0 be an SMI instance in add (I, p, q). Prove that no woman q 0 in I prefers threshold (I, q 0 ) to threshold (I 0 , q 0 ). Hints: (1) Use proof by contradiction, i.e., assume that there is a woman q 0 who prefers threshold (I, q 0 ) to threshold (I 0 , q 0 ), and derive a contradiction; (2) Use the confluence property of the deferred acceptance algorithm. Problem 3. Let I be an SMI instance, let q be a woman in I, let p be a man who is not in I, and let I 0 be an SMI instance in add (I, p, q). Prove that if p is single in 2 University of Texas at Austin Department of Computer Science Algorithms and Complexity CS 331, Spring 2017 da(I 0 ), then threshold (I 0 , q 0 ) = threshold (I, q 0 ) for every woman q 0 in I. Hints: (1) Use proof by contradiction, i.e., assume p is single in da(I 0 ) and there is a woman q 0 such that threshold (I 0 , q 0 ) 6= threshold (I, q 0 ), and derive a contradiction; (2) Use the result of Problem 2;
  • 55. (3) Use the confluence property of the deferred acceptance algorithm. Problems 1 through 3 above are concerned with modifying an SMI instance I by adding a new man. We now consider a way to modify an SMI instance without adding a new agent. For any SMI instance I, any woman q in I, and any man p in I who is single in da(I) and considers q to be unacceptable, we define extend (I, p, q) as the SMI instance I 0 that is identical to I except the preferences of man p are modified as follows: man p moves woman q from his unacceptable set to the the least-preferred position in his ordered list of acceptable women. The arguments used for solving Problems 1, 2, and 3 are easily adapted to establish Lemma Extend below; the proof is omitted. Lemma Extend. Let I be an SMI instance, let q be a woman in I, let p be a man in I who is single in da(I) and considers q to be unacceptable, and let I 0 denote the SMI instance extend (I, p, q). If q prefers p to threshold (I, q), then p is matched to q in da(I 0 ); otherwise, p is single in da(I 0 ) and threshold (I 0 , q 0 ) = threshold (I, q 0 ) for every woman q 0 i --------------------------------------------------------------------------------------- CS210 Introduction to Java Programming Assignment FOR MORE CLASSES VISIT
  • 56. www.tutorialoutlet.com CS210 Introduction to Programming Java Programming Assignment 8: Array Implementation NOTE: This assignment will be more challenging than the previous assignments, so make sure to start early and allocate enough time to complete it, including time you might need to seek any necessary help. Since this is the last program, the program may not be submitted more than 1 day late! Problem Summary A local city would like you to write a program to help them analyze data on speeding tickets. City police have collected information about the speeding violations. They store data about each ticket issued during a one week period in a text data file. Data collected for each ticket includes the vehicle license plate number, the speed limit, and the clocked speed. From past data, the police department knows that it will not issue more than 200 tickets per week. You may assume all data in input data file is valid data (i.e. formatted correctly), but you must verify that the file exists (i.e. can be opened). If the file does not exist, the program will loop until you enter the filename for a file that can be opened. Sample input data file lines: BBB222 50 60 XYZ123 40 45 A1B2C3 30 51 The police department would like you to write a program to read the file,
  • 57. calculate the fines to assess, and generate several reports. The program will: Read the data from the file, line by line, and store the data into an array that holds ticket data objects. This array will hold a maximum of 200 ticket data objects. Calculate the speeding ticket fines to assess, based on the ticket data, and store the fines into a second array that holds double values. This array will be sized to the number of tickets issued. Produce an output file, containing the vehicle license plate numbers and speeding fines. Analyze the fines to determine the high, low, and average fines, and display the results. Here are the formulas the city uses for calculating a speeding ticket fine: Ticket Fine = Court costs ($45.00) + a fee for each mile per hour (MPH) by which the speed limit was exceeded The fee will be levied as follows: MPH Over Speed Limit up to 10 over 10 and up to 20 over 20 Fee per MPH Over Speed Limit (for all MPH over limit) $ 4.25 $ 6.00 $ 8.10 You must define constants to hold all fixed values (court costs, MPH over speed limits, and fees per MPH) in the above chart within your method that calculates the fines. Requirements This program will implement two different types of arrays. One array will hold ticket objects, and will require an implementation class. The other array will contain primitive data type double values, and will not require an implementation class. NOTE: The ticket array and the fines array will be parallel arrays. This
  • 58. means that the fine will be stored into the fines array using the same index as the ticket object in the ticket array. NOTE: For an example of a Java program implementing arrays, see Online Content section 15.10. Required Classes and Methods Three separate classes will be required for this program. A class to define a SpeedingTicket object A class to implement the object array (to hold SpeedingTicket objects) A main class to run the program 1. Create a new Java NetBeans project, named as follows: LastnameJavaAssn8 For example: SmithJavaAssn8 2. Define a Java class with properties and methods for a speeding ticket object, named: SpeedingTicket The class will have the following private data properties: vehicle license plate number (a 6-character String) the speed limit the clocked speed Within the SpeedingTicket class: Define a constructor, with parameters for each data property. o Use the parameters to initialize the values. Define getters for each data property. 3. Define a second class that will implement the ticket array for this program, named: TicketArrayImpl The class will have the following public data properties: A static constant array size (maximum items that can be held in the array) set to 200 The class will have the following private data properties: A ticket data array (to hold SpeedingTicket objects) A count of actual ticket objects stored Note: The data property definitions will only define the array reference
  • 59. variable. It will not create the array object. Unauthorized distribution (including uploading to any non-Regis Internet website) violates copyright law Within the TicketArraysImpl class: Define a constructor that will: o Instantiate a ticket array object (using new to initialize the array reference variable and the constant array size) o Initialize the count of tickets stored to 0 Define an instance method to add one SpeedingTicket object to the ticket data array. The method will: o Have one parameter, the ticket object to add o Test to see if the array is full If the array is full, will throw an ArrayIndexOutOfBoundsException Include a message to pass to the exception handler that states the array is full and stating which license cannot be added. Otherwise, store the ticket object into the array and increase the ticket count Define a method to read all the data from the input file and store the ticket data by adding SpeedingTicket objects into the array. The method will: o Have one parameter: the name of the data input file (String) o Return an int value If the file was opened successfully, the method will return the number of tickets stored in the array. Otherwise, it will return 0, to indicate the file could not be opened/read. o Implement code to try to open the input data file. If the file opened: Display a message that the program is reading the file data In a loop: Read the three data items from one line of data in the input data file Call the constructor to create a new SpeedingTicket object. Try to call the instance method to add the ticket object to the ticket data array (this is an instance method of the TicketArrayImpl class) Catch any
  • 60. thrown ArrayIndexOutOfBoundsException exceptions. Display the message passed back via the throw. Also display a message that no more data will be read from the file. Set a value to exit the loop (so no more data will be read). Loop until there is no more file data or an exception is thrown. o Close file. Display the number of SpeedingTicket objects stored in the ticket data array. Catch any FileNotFoundException exceptions. When caught: Display a message that explains which file could not be opened. o Return the count of tickets stored in the array Define a method to calculate and store values in the fines array. The method will: o Have one parameter, the empty fines array o Define constants for all fixed values in the calculations (from page 1 of this assignment). o For each ticket stored in the ticket array: Access the clockedSpeed and speedLimit data stored in the object using getters. Calculate the ticket fine. Store the calculated fine in the fines array. Define an instance method to produce a fines report. The method will create an output file with the fines report. The method should: o Have one parameter, the fines array o Read the filename for the report output file from the user. o Try to open the report output file If the file opened successfully, generate a report and write it to the output file. The output file will contain a list of vehicle license plate numbers (accessed via a getter) and the fine associated with that license, with the fines right- aligned on the decimal point. The last line of the output file will contain the total of all fines collected, rightaligned on the decimal point, with the fines listed above it. Sample output file BBB222
  • 61. XYZ123 A1B2C3 Total o 87.50 66.25 215.10 368.85 Catch any FileIOException exceptions. When caught: Display a message that explains which file could not be opened and that a fines report will not be generated. 4. Define a third (main) class named: TicketAnalysis Within the TicketAnalysis class: Define three static methods to: o Determine and return the lowest fine amount o Calculate and return the average fine amount o Determine and return the highest fine amount Each will have the fines array and count of fines in the array as parameters. Define a static method to display a ticket summary, using the previously defined static methods to calculate the low, high, and average fines. o Parameters: the fines array and count of fines in the array o Ticket summary will be displayed as shown in the sample output on the next page, with all figures will be right-aligned on the decimal point. ©Regis University, All Rights Reserved Unauthorized distribution (including uploading to any non-Regis Internet website) violates copyright law Define a main method to: o o Display a description of what the program will do to the user. In a loop (outer loop): Create a new object of the TickeArraysImpl class. In a loop (inner loop): Read the filename for the input data file from the user. Using the object, call the instance method to read and store the data from the
  • 62. input file (sends a message to the TicketArraysImpl object). Loop until the method returns a number other than 0, indicating the file was read (and that the ticket data array now has ticket data stored in it). Display a message to the user, that the program is calculating the fines. Define an array (to hold double fines), the same size as the array for ticket objects. Uses the TicketArraysImpl object to call: The instance method to calculate the fines and store them in the array The instance method to produce a fines report Execute the static method to display a ticket summary. Ask the user whether to run the program again, using a different input file. Loop until the user says s/he does not want to run the program again. Sample Run This program will run analyses on weekly speeding ticket data files Enter input filename: tickets Cannot open input file: tickets Enter input filename: tickets.txt Reading ticket data... Data stored for 3 tickets Calculating fines... Done! Enter name of report output file: report.txt Week's Ticket Analysis for 3 tickets issued: Lowest ticket fine 66.25 Average ticket fine 122.95 Highest ticket fine 215.10 Run program again with another file (y/n)? n WARNING: The objects, classes, and methods must be implemented exactly as specified above.
  • 63. If your program produces correct output, but you did not create and use the objects as specified, and implement the required classes and methods, you will lose a significant number of points. See last page of the file for outline of code for the three required classes.. The program must follow the CS210 Coding Standards from Content section 6.10. Be sure to include the following comments: o Comments at the top of each code file describing what the class does Include tags with the author’s name (i.e. your full name) and the version of the code (e.g. Java Assn 4, version 1.0) o Comments at the top of each method, describing what the method does Include tags with names and descriptions of each parameter and return value. Testing You will need to create test data files to test your program. In combination, all your test data files should test every possible execution path within your code, including erroneous data which cause exceptions. Before you submit your project, add your all files you used to test your program in the top level of your project directory (and add a number to the end of each file, if there are multiple test data files). File examples: datafile1.txt datafile2.txt (numbered, if multiple data files tested) Submission This programming assignment is due by midnight of the date listed in the Course Assignments by Week. REMINDER: Programs submitted that do not compile without errors will not be accepted. Again, you will submit a single zip file containing all of the files in your
  • 64. project. First export your project from NetBeans, as detailed in previous assignments o Name your export file in the following format: <lastname>Assn<x>.zip For example: SmithAssn8.zip NOTE: Save this zip file to some other directory, not your project directory. Then submit your .zip file to the Java ProgAssn 8 assignment submission folder (located under the Assignments/Dropbox tab in the online course). o Warning: Only NetBeans export files will be accepted. Do not use any other kind of archive or zip utility. Grading Programs will be graded using the rubric that is linked on the same assignment page as this file. WARNING: Programs submitted more than 1 day past the due date will not be accepted, and will receive a grade of 0* Description of class and author and version tags */ public class SpeedingTicket { // ticket data fields go here // constructor with parameters (and comments) goes here // getters (with comments and return tags) go here } /** * Description of class and author and version tags */ public class TicketArrayImpl { // static constant array size goes here // data fields go here (ticket array and ticket count) // constructor without parameters (nd comments) goes here //
  • 65. (instantiates ticket array object and initializes ticket count) // method to add ticket object to ticket array goes here (with comments and parameter tag) // method to read ticket data from file goes here (-includes comments with parameter and return tags -creates a ticket object for each ticket and -calls previous method to add the object to the ticket array) // method to calculate fines/store into array goes here (with comments and parameter tag) // method to create the fines report goes here (with comments and parameter tag) } /** * Description of program, and author and version tags */ public class TicketAnalysis { public static void main(String args) { // code to define variables & display program description // Loop: // code to instantiate TicketArrayImpl object // Loop: // code to read filename and try to read data from the file // code to create fines array // code to call other methods } // three methods to calculate the fines average, low, and high go here (includes comments with parameter and return tags) // method to display a ticket summary (with comments and parameter tags) } ---------------------------------------------------------------------------------------