Develop an inventory management system for an electronics store. The inventory system should
have the following functionalities .BuildInventory: reada text file containing electronics products
information and store them in an array of pointers .Shownventory display all inventory items
.ShowDefectInventory: display inventory items that are defective Terminate: to save cument
inventory to a text file This lab assignment illustrates the following concepts: -Text file readings
and writings .Arrays of pointers and dynamic memory allocations with new and delete
Inheritance .C++ type casting: static cast Class Design You need at least three classes class
Inventory System: (minimum implementation specified below). This class stores Inyentoryltem
objects (which are in fact Inventory item base class pointers to derived Product objects and
member functions to manipulate those Product objects as shown below. .Private data members
Store Name Store ID ltem List (array of pointers to Inventory Item objects, max of 512) ltem
Count (tracking how many items are currently stored in the array) .Constructors (initialize all
pointers in the array to NULL in addition to what\'s described below .Default constructor: set
data members to 0 (for integers), 0.0 (for float/double), or NULL (for pointers) as appropriate.
Also invoke this function to initialize a seed for the random generator srand (time (NULL), (to
be used later by Product class to genearte random values for Product ID. See Code Helper
section at the end of the lab specs.) .Non-default constructor: taking a string for store name, an
integer for store ID. Call srand as shown above Destructor: de-allocate dynamic memory in the
amay off pointers (up to Item Count elements) .Public member functions: BuildInventory: read a
text file containing Product records (one Product per line), dynamically allocate Product objects
and store the objects in the array ItemList (an array of Inventoryltem pointers). It should also
update Item Count as needed Shownventory: display all Products in the inventory. Output must
be properly formatted and aligned (usingfield with and floating data with 2 digits after decimal
point). Note that if you invoke the Display function using the pointers from the array only Invent
tem (base objec) information will be displayed. Extra work is needed to properly display
Products (derived objects) information ntory: display only defective Products Terminate: iterate
thru the array of pointers to write Product objects in the array to a text file in the same format as
they were read in. You may use a different file name for wniting .mutator cessors for store name,
store id, and item count
Solution
/*
import com.incors.plaf.*;
import com.incors.plaf.kunststoff.*;
import com.incors.plaf.kunststoff.themes.*;
*/
public class MainForm extends JFrame implements WindowListener{
/************************ Variable declaration start **********************/
//The form container variable
JPanel Panel1;
JDeskto.
Program Specifications in c++ Develop an inventory management system f.docxsharold2
Program Specifications in c++
Develop an inventory management system for an electronics store. The inventory system should have the following functionalities:
BuildInventory: read a text file containing electronics products information and dynamically store them in an array of pointers.
ShowInventory: display all inventory items.
UpdateInventory: ask for item id and quantity. If found display cost and update Product object info (reduce Product's quantity and potentially update restocking flag).
Terminate: save current inventory to a text file.
This programming assignment illustrates the following concepts:
Text file reading and writing.
Arrays of pointers and dynamic memory allocations with new and delete.
Inheritance.
C++ type casting: static_cast.
NOTE: This assignment is not about polymorphism or dynamic_cast! Your program should not contain any virtual function and/or use of dynamic_cast mechanism or point deductions will apply. You will have opportunity to use polymorphism in the next assignment.
Class Design
You need at least three classes.
class InventoryItem (minimum implementation specified below) - This is the base class.
Protected member data: item id (integer) and restocking (bool).
Public static data:
const integer (item id): initialize to 9999.
const bool (restocking): initialize to false.
Constructors
Default constructor: initialize item id and restocking using the default static data with member initializer syntax.
Non-default constructor: take 2 parameters.
Destructor: output "InventoryItem <item id> with <true/false> restocking destroyed ..."
Public member functions:
mutator/accessor for restocking, item id.
Display : to show InventoryItem item id and restocking (true/false). item id must be displayed as a 4-digit integer with leading 0s if < 1000.
class Product : derived from InventoryItem class (minimum implementation specified below).
Private member data: name (string), quantity (integer) and price (double).
Public static data:
const string (name): "No Product".
const int (quantity): 0
const double (price): 0.99
Constructors (use member initializer syntax)
Default constructor: set member data to static data's default values above. Must explicitly invoke the base class' default constructor.
Non-default constructor: take five parameters (id, restocking, name, quantity and price). Must explicitly invoke the base class' non-default constructor.
Destructor: output "Product: <item id>, Name<name>, quantity<quantity>, price <price>, restocking<true/false> destroyed ...".
Public member functions:
accessors/mutators for name, quantity, price.
Display: invoke Display from base class, then display its own data. NOTE: If the product restocking is true somehow indicate it using "special effects" such as ***** or whatever effect you'd like.
Cost : take an integer as its only parameter representing the quantity (how many product to be sold) and return the total cost (price * quantity parameter).
class InventorySystem: (minimum implement.
Program Specifications in c++ Develop an inventory management syste.docxsharold2
Program Specifications in c++
Develop an inventory management system for an electronics store. The inventory system should have the following functionalities:
BuildInventory: read a text file containing electronics products information and dynamically store them in an array of pointers.
ShowInventory: display all inventory items.
UpdateInventory: ask for item id and quantity. If found display cost and update Product object info (reduce Product's quantity and potentially update restocking flag).
Terminate: save current inventory to a text file.
This programming assignment illustrates the following concepts:
Text file reading and writing.
Arrays of pointers and dynamic memory allocations with new and delete.
Inheritance.
C++ type casting: static_cast.
NOTE: This assignment is not about polymorphism or dynamic_cast! Your program should not contain any virtual function and/or use of dynamic_cast mechanism or point deductions will apply. You will have opportunity to use polymorphism in the next assignment.
Class Design
You need at least three classes.
class InventoryItem (minimum implementation specified below) - This is the base class.
Protected member data: item id (integer) and restocking (bool).
Public static data:
const integer (item id): initialize to 9999.
const bool (restocking): initialize to false.
Constructors
Default constructor: initialize item id and restocking using the default static data with member initializer syntax.
Non-default constructor: take 2 parameters.
Destructor: output "InventoryItem <item id> with <true/false> restocking destroyed ..."
Public member functions:
mutator/accessor for restocking, item id.
Display : to show InventoryItem item id and restocking (true/false). item id must be displayed as a 4-digit integer with leading 0s if < 1000.
class Product : derived from InventoryItem class (minimum implementation specified below).
Private member data: name (string), quantity (integer) and price (double).
Public static data:
const string (name): "No Product".
const int (quantity): 0
const double (price): 0.99
Constructors (use member initializer syntax)
Default constructor: set member data to static data's default values above. Must explicitly invoke the base class' default constructor.
Non-default constructor: take five parameters (id, restocking, name, quantity and price). Must explicitly invoke the base class' non-default constructor.
Destructor: output "Product: <item id>, Name<name>, quantity<quantity>, price <price>, restocking<true/false> destroyed ...".
Public member functions:
accessors/mutators for name, quantity, price.
Display: invoke Display from base class, then display its own data. NOTE: If the product restocking is true somehow indicate it using "special effects" such as ***** or whatever effect you'd like.
Cost : take an integer as its only parameter representing the quantity (how many product to be sold) and return the total cost (price * quantity parameter).
class InventorySystem: (minimum implement.
show code and all classes with full implementation for these Program S.pdfAlanSmDDyerl
show code and all classes with full implementation for these Program Specifications.
Example products ( camcorder, dvd player, blueray player, tv, camera, xbox 360, ps4, Wii,
laptops, iphone, battery, smart phones, computer desktop, printer, usb, mouse)
Develop an inventory management system for an electronics store. The inventory system should
have the following functionalities:
BuildInventory: read a text file containing electronics products information and dynamically
store them in an array of pointers.
ShowInventory: display all inventory items.
UpdateInventory: ask for item id and quantity. If found display cost and update Product object
info (reduce Product's quantity and potentially update restocking flag).
Terminate: save current inventory to a text file.
This programming assignment illustrates the following concepts:
Text file reading and writing.
Arrays of pointers and dynamic memory allocations with new and delete.
Inheritance.
C++ type casting: static_cast.
NOTE: This assignment is not about polymorphism or dynamic_cast! Your program should not
contain any virtual function and/or use of dynamic_cast mechanism or point deductions will
apply. You will have opportunity to use polymorphism in the next assignment.
Class Design
You need at least three classes.
class InventoryItem (minimum implementation specified below) - This is the base class.
Protected member data: item id (integer) and restocking (bool).
Public static data:
const integer (item id): initialize to 9999.
const bool (restocking): initialize to false.
Constructors
Default constructor: initialize item id and restocking using the default static data with member
initializer syntax.
Non-default constructor: take 2 parameters.
Destructor: output "InventoryItem <item id> with <true/false> restocking destroyed ..."
Public member functions:
mutator/accessor for restocking, item id.
Display : to show InventoryItem item id and restocking (true/false). item id must be displayed as
a 4-digit integer with leading 0s if < 1000.
class Product : derived from InventoryItem class (minimum implementation specified below).
Private member data: name (string), quantity (integer) and price (double).
Public static data:
const string (name): "No Product".
const int (quantity): 0
const double (price): 0.99
Constructors (use member initializer syntax)
Default constructor: set member data to static data's default values above. Must explicitly invoke
the base class' default constructor.
Non-default constructor: take five parameters (id, restocking, name, quantity and price). Must
explicitly invoke the base class' non-default constructor.
Destructor: output "Product: <item id>, Name<name>, quantity<quantity>, price <price>,
restocking<true/false> destroyed ...".
Public member functions:
accessors/mutators for name, quantity, price.
Display: invoke Display from base class, then display its own data. NOTE: If the product
restocking is true somehow indicate it using "special effects" such as ***** or wh.
Program Specifications Develop an inventory management system for an e.docxVictormxrPiperc
Program Specifications
Develop an inventory management system for an electronics store. The inventory system should have the following functionalities:
BuildInventory: read a text file containing electronics products information and dynamically store them in an array of pointers.
ShowInventory: display all inventory items.
UpdateInventory: ask for item id and quantity. If found display cost and update Product object info (reduce Product's quantity and potentially update restocking flag).
Terminate: save current inventory to a text file.
This programming assignment illustrates the following concepts:
Text file reading and writing.
Arrays of pointers and dynamic memory allocations with new and delete.
Inheritance.
C++ type casting: static_cast.
NOTE: This assignment is not about polymorphism or dynamic_cast! Your program should not contain any virtual function and/or use of dynamic_cast mechanism or point deductions will apply. You will have opportunity to use polymorphism in the next assignment.
Class Design
You need at least three classes.
class InventoryItem (minimum implementation specified below) - This is the base class.
Protected member data: item id (integer) and restocking (bool).
Public static data:
const integer (item id): initialize to 9999.
const bool (restocking): initialize to false.
Constructors
Default constructor: initialize item id and restocking using the default static data with member initializer syntax.
Non-default constructor: take 2 parameters.
Destructor: output "InventoryItem <item id> with <true/false> restocking destroyed ..."
Public member functions:
mutator/accessor for restocking, item id.
Display : to show InventoryItem item id and restocking (true/false). item id must be displayed as a 4-digit integer with leading 0s if < 1000.
class Product : derived from InventoryItem class (minimum implementation specified below).
Private member data: name (string), quantity (integer) and price (double).
Public static data:
const string (name): "No Product".
const int (quantity): 0
const double (price): 0.99
Constructors (use member initializer syntax)
Default constructor: set member data to static data's default values above. Must explicitly invoke the base class' default constructor.
Non-default constructor: take five parameters (id, restocking, name, quantity and price). Must explicitly invoke the base class' non-default constructor.
Destructor: output "Product: <item id>, Name<name>, quantity<quantity>, price <price>, restocking<true/false> destroyed ...".
Public member functions:
accessors/mutators for name, quantity, price.
Display: invoke Display from base class, then display its own data. NOTE: If the product restocking is true somehow indicate it using "special effects" such as ***** or whatever effect you'd like.
Cost : take an integer as its only parameter representing the quantity (how many product to be sold) and return the total cost (price * quantity parameter).
class InventorySystem: (minimum implementation s.
please code in c#- please note that im a complete beginner- northwind.docxAustinaGRPaigey
please code in c#.
please note that im a complete beginner.
northwind.mdf.
northwind_log.ldf
OrderDetailsMaintenance.zip
1. Include the two above files in the root of your OrderDetailsMaintenance project.
2. Make sure to mark them as "Content" and "Copy Always" or "Copy if newer" in the properties window of those two files.
3. Run the Scaffold-DbContext command to create a context class as well as a class to encapsulate the Orders objects from the associated table in the mdf file. Make sure to include the parameters for -Tables Customers (only worry about the attributes associated with the text boxes, you don't need to worry about any other rows from the table)
4. Once you have ran the command, include an app.config file and add a connection string element. Make sure to copy the connection string from your Context class to your app.config. Then edit your context to grab the connection string from the app.config (ConfigurationManager.ConnectionString["Northwind"].ConnectionString)
5. Code the Find button to Find the customer id and populate the details in the below text boxes.
1. If no order is found, display a message box.
6. Code the exit button
7. Code the Save button to update its attributes and call Update and SaveChanges() on that particular entity.
1. Note: If you close the program, reopen it, and search for the entity you recently updated. You may not see the changes depending on how you setup the mdf file in your project (because it copies a new version to the bin directory each time you run the program). So, if you don't see your changes, don't be alarmed.
============
HERE IS WHAT I HAVE SO FAR
frmCustomerMaintenance.cs
namespace OrderDetailsMaintenance
{
public partial class frmCustomerMaintenance : Form
{
public frmCustomerMaintenance()
{
InitializeComponent();
}
}
}
frmCustomerMaintenance.resx
<root>
<xsd:schema id="root" xmlns="" xmlns:xsd="http://www.w3.org/2001/XMLSchema" xmlns:msdata="urn:schemas-microsoft-com:xml-msdata">
<xsd:import namespace="http://www.w3.org/XML/1998/namespace" />
<xsd:element name="root" msdata:IsDataSet="true">
<xsd:complexType>
<xsd:choice maxOccurs="unbounded">
<xsd:element name="metadata">
<xsd:complexType>
<xsd:sequence>
<xsd:element name="value" type="xsd:string" minOccurs="0" />
</xsd:sequence>
<xsd:attribute name="name" use="required" type="xsd:string" />
<xsd:attribute name="type" type="xsd:string" />
<xsd:attribute name="mimetype" type="xsd:string" />
<xsd:attribute ref="xml:space" />
</xsd:complexType>
</xsd:element>
<xsd:element name="assembly">
<xsd:complexType>
<xsd:attribute name="alias" type="xsd:string" />
<xsd:attribute name="name" type="xsd:string" />
</xsd:complexType>
</xsd:element>
<xsd:element name="data">
<xsd:complexType>
<xsd:sequence>
<xsd:element name="value" type="xsd:string" minOccurs="0" msdata:Ordinal="1" />
<xsd:element name="comment" type="xsd:string" minOccurs="0" msdata:Ordinal="2" />
</xsd:sequence>
<xsd:attribute name="name".
The program reads data from two files, itemsList-0x.txt and .docxoscars29
The program reads data from two files,
itemsList-0x.txt
and
inventoryList-0x.txt
. File extensions on Linux may be arbitrary–i.e., these files could have been named with
.dat
as the extensions.
The first file,
itemsList-0x.txt
, lists all possible items. Each line represents one item in the form
id name
.
Example 1: Sample itemsList-0x.txt
0 Air 1 HP Potion 2 MP Potion 5 Iron Ore 3 Bow Tie 4 Dirt 6 Diamond Ore 7 Iron Ingot 8 Diamond 9 Diamond Block
The second file,
inventoryList-0x.txt
, lists each individual inventory–or storage chest–followed by a list of items.
Example 2: Sample inventoryList-0x.txt
# 5
- 1 10 - 2 5 - 3 2 # 6
- 4 3 - 5 27 - 6 44 - 7 55 - 8 1 - 9 4 - 4 3 # 2
- 2 5 - 9 4 - 8 1 - 5 2 - 10 5
Each line preceded by
#
denotes the start of a new inventory. Each line preceded by
-
denotes an item. The program creates a new inventory each time a
#
is encountered.
When a
-
is encountered, a stack of items, ItemStack, is created. The
ItemStack
is placed in the
Inventory
based on the following rules:
If the Inventory is empty, store the ItemStack, and
return true
.
If the Inventory is not empty, examine the Inventory.
If a matching ItemStack is found, merge the two ItemStacks and
return true
.
If no matching ItemStack is found, store the new ItemStack and
return true
.
If the Inventory is full,
return false
.
Through the magic of abstraction, this is not one function, but four (4) functions in total. Yes, it does seem unnecessary at first. However, each function does one thing and only one thing. This is an exercise in understanding the thought process behind abstraction, interfaces, and the
S
/
O
in
S.O.L.I.D
(with some C++ code) in a multi-ADT program.
Most of your time will be spent on understanding the abstractions (and interfaces) as opposed to spamming cobblestone blocks… I mean C++ code.
3.2 Output
The output consists of three reports written to standard output, one after the other.
A report listing items that were stored or discarded.
A report listing all valid items.
Finally, a detailed report is printed. listing data for each inventory:
Maximum Capacity–i.e., total slots.
Utilized Capacity–i.e., occupied slots
Listing of all items.
If the program is run with the provided input files, the following output should be generated…
Example 3: Sample Output
Processing Log: Stored (10) HP Potion Stored ( 5) MP Potion Stored ( 2) Bow Tie Stored ( 3) Dirt Stored (27) Iron Ore Stored (44) Diamond Ore Stored (55) Iron Ingot Stored ( 1) Diamond Stored ( 4) Diamond Block Stored ( 3) Dirt Stored ( 5) MP Potion Stored ( 4) Diamond Block Discarded ( 1) Diamond Discarded ( 2) Iron Ore Item List: 0 Air 1 HP Potion 2 MP Potion 3 Bow Tie 4 Dirt 5 Iron Ore 6 Diamond Ore 7 Iron Ingot 8 Diamond 9 Diamond Block Storage Summary: -Used 3 of 5 slots (10) HP Potion ( 5) MP Potion ( 2) Bow Tie -Used 6 of 6 slots ( 6) Dirt.
Lab #9 and 10 Web Server ProgrammingCreate a New Folder I s.docxDIPESH30
Lab #9 and 10: Web Server Programming
Create a New Folder: I suggest that youcreate a new folder named Lab 9 and 10 to store your 13 or more files for this lab.
PHP Functions dedicated to working with MySQL databases:
PHP Function
Description
mysql_connect()
Used to connect to a database including user ID and password for database user.
mysql_select_db()
Set the default database that is to be used.
mysql_query()
Used for general query (or database actions) such as performing CREATE TABLE, SELECT, INSERT, UPDATE, or DELETE actions.
mysql_fetch_assoc()
Allows an entire row (record) of data to be retrieved and converted to an associative array. This allows each field of a record to be retrieved using the field name itself as the array index.
mysql_close()
Closing access to an opened MySQL database.
Your Topic for this Lab: Decide on a topic for this lab based on your entrepreneurship (if feasible). In my example, I created an inventory program for a company called Kettel’s Auto Parts. (The idea was inspired by a business once owned by my great Uncle Joe back in the 1940’s – he may have kept records differently back then) You might consider an inventory for your company. The goal is to keep track of items in a database.
Dealing with Large Programs: This is the most ambitions PHP program we have tackled so far. If you attempt to consider this endeavor as a whole, it may be overwhelming to you. So, here is the trick for handling large programs. Break them into small pieces, and just consider one little piece at a time. This program is divided into 13 modules. If you can write a small program, then you can write a large program broken into many small pieces. I suggest you skim over this assignment so you get an idea of where you are headed. As in the past, this example is just a paradigm – your program may look completely different.
Lab #9 – Parts I to V: The first week, plan to submit a Word document with a link to your “Viewing Site” (Part V). Be sure to include a graphic banner and a least one “time” field using the PHP now() function.
Lab #10 – Finish the Program: The second week plan to submit a Word document with a link to the menu. Your Add records, Edit Records, Delete Records and View by Sorted and Filtered order should be functioning.
Program Files for this Lab: In my example I wrote the following 13 modules to make up the Kettel’s Auto Parts Inventory Program:
parts_form.html – Part I
parts_banner.php – Part I
parts_include.php – Part II
parts_reset.php – Part III
parts_save_rec.php – Part IV
parts_view_all.php – Part V
Parts_menu.html – Part VI
parts_view.php
parts_delete.php
parts_delete_entry.php
parts_edit.php
parts_edit_entry.php
parts_edit_save.php
Hierarchy Chart: Do you remember the hierarchy charts from Chapter 2 of CST 170? When a program has many modules calling other modules, programmers often use hierarchy carts to show a picture of how the modules relate to each other. Don’t confuse the hierarchy ...
CSC240: Programming Assignment #9: Stacks & Queues Assigned: Week 12 Due: Week 13
Points: 50 In this program, you will utilize objects of your class used in previous programs, and
create a program to store 10 objects each into a Stack and into a Queue. You can load the 10
data objects through any combination of user input, hard code the data records/initialization, or
read from a file. The preferred method is by reading from a file since it doesnt require any data
entry or data in code. Coding Requirements: 1. Create your application class, and your container
classes which will encapsulate the both a StackOfObjects and an QueueOfObjects. 2. Read the
file (or create data objects using another method) into a 10-element array of objects, which you
can encapsulate into a separate class. 3. Load the same data set into both the stack and the
queue from the array of objects. 4. In main(), create and invoke a short menu with items to perform
data entry/read from file, and to enable the user to test both the stack and queue functionality by
printing a report of the data. Since a stack is LIFO (Last In First Out) and a queue is FIFO (First In
First Out), the stack data should print in reverse order to which it was inserted, and the queue data
should print in the order to which it was inserted. Menu Items 1. List Original Data (in Array of
Objects) 2. Report of Stack of Data 3. Report of Queue of Data 4. End Program Output
Requirements: (Exercise all methods, including constructors to show their results/output) In your
main() method, exercise all menu items using the methods invoked by each menu item, running all
menu items, showing the initial list, then displaying it by popping objects off of the top of stack, or
de- queueing objects out of the queue. The report of the objects in your array will be columnar,
showing each of the values, formatting the columns and adding headers and footers as needed.
Assigned: Week 12 Due: Week 13 Points: 50 In this program, you will utilize objects of your class
used in previous programs, and create a program to store 10 objects each into a Stack and into a
Queue. You can load the 10 data objects through any combination of user input, hard code the
data records/initialization, or read from a file. The preferred method is by reading from a file since
it doesn't require any data entry or data in code. Coding Requirements: 1. Create your application
class, and your "container" classes which will encapsulate the both a StackOfObjects and an
QueueOfObjects. 2. Read the file (or create data objects using another method) into a 10-element
array of objects, which you can encapsulate into a separate class. 3. Load the same data set into
both the stack and the queue from the array of objects. 4. In main(), create and invoke a short
menu with items to perform data entry/read from file, and to enable the user to test both the stack
and queue functionality by printing a report of the data. Since a stack is LIFO (Last In First Out).
Program Specifications in c++ Develop an inventory management system f.docxsharold2
Program Specifications in c++
Develop an inventory management system for an electronics store. The inventory system should have the following functionalities:
BuildInventory: read a text file containing electronics products information and dynamically store them in an array of pointers.
ShowInventory: display all inventory items.
UpdateInventory: ask for item id and quantity. If found display cost and update Product object info (reduce Product's quantity and potentially update restocking flag).
Terminate: save current inventory to a text file.
This programming assignment illustrates the following concepts:
Text file reading and writing.
Arrays of pointers and dynamic memory allocations with new and delete.
Inheritance.
C++ type casting: static_cast.
NOTE: This assignment is not about polymorphism or dynamic_cast! Your program should not contain any virtual function and/or use of dynamic_cast mechanism or point deductions will apply. You will have opportunity to use polymorphism in the next assignment.
Class Design
You need at least three classes.
class InventoryItem (minimum implementation specified below) - This is the base class.
Protected member data: item id (integer) and restocking (bool).
Public static data:
const integer (item id): initialize to 9999.
const bool (restocking): initialize to false.
Constructors
Default constructor: initialize item id and restocking using the default static data with member initializer syntax.
Non-default constructor: take 2 parameters.
Destructor: output "InventoryItem <item id> with <true/false> restocking destroyed ..."
Public member functions:
mutator/accessor for restocking, item id.
Display : to show InventoryItem item id and restocking (true/false). item id must be displayed as a 4-digit integer with leading 0s if < 1000.
class Product : derived from InventoryItem class (minimum implementation specified below).
Private member data: name (string), quantity (integer) and price (double).
Public static data:
const string (name): "No Product".
const int (quantity): 0
const double (price): 0.99
Constructors (use member initializer syntax)
Default constructor: set member data to static data's default values above. Must explicitly invoke the base class' default constructor.
Non-default constructor: take five parameters (id, restocking, name, quantity and price). Must explicitly invoke the base class' non-default constructor.
Destructor: output "Product: <item id>, Name<name>, quantity<quantity>, price <price>, restocking<true/false> destroyed ...".
Public member functions:
accessors/mutators for name, quantity, price.
Display: invoke Display from base class, then display its own data. NOTE: If the product restocking is true somehow indicate it using "special effects" such as ***** or whatever effect you'd like.
Cost : take an integer as its only parameter representing the quantity (how many product to be sold) and return the total cost (price * quantity parameter).
class InventorySystem: (minimum implement.
Program Specifications in c++ Develop an inventory management syste.docxsharold2
Program Specifications in c++
Develop an inventory management system for an electronics store. The inventory system should have the following functionalities:
BuildInventory: read a text file containing electronics products information and dynamically store them in an array of pointers.
ShowInventory: display all inventory items.
UpdateInventory: ask for item id and quantity. If found display cost and update Product object info (reduce Product's quantity and potentially update restocking flag).
Terminate: save current inventory to a text file.
This programming assignment illustrates the following concepts:
Text file reading and writing.
Arrays of pointers and dynamic memory allocations with new and delete.
Inheritance.
C++ type casting: static_cast.
NOTE: This assignment is not about polymorphism or dynamic_cast! Your program should not contain any virtual function and/or use of dynamic_cast mechanism or point deductions will apply. You will have opportunity to use polymorphism in the next assignment.
Class Design
You need at least three classes.
class InventoryItem (minimum implementation specified below) - This is the base class.
Protected member data: item id (integer) and restocking (bool).
Public static data:
const integer (item id): initialize to 9999.
const bool (restocking): initialize to false.
Constructors
Default constructor: initialize item id and restocking using the default static data with member initializer syntax.
Non-default constructor: take 2 parameters.
Destructor: output "InventoryItem <item id> with <true/false> restocking destroyed ..."
Public member functions:
mutator/accessor for restocking, item id.
Display : to show InventoryItem item id and restocking (true/false). item id must be displayed as a 4-digit integer with leading 0s if < 1000.
class Product : derived from InventoryItem class (minimum implementation specified below).
Private member data: name (string), quantity (integer) and price (double).
Public static data:
const string (name): "No Product".
const int (quantity): 0
const double (price): 0.99
Constructors (use member initializer syntax)
Default constructor: set member data to static data's default values above. Must explicitly invoke the base class' default constructor.
Non-default constructor: take five parameters (id, restocking, name, quantity and price). Must explicitly invoke the base class' non-default constructor.
Destructor: output "Product: <item id>, Name<name>, quantity<quantity>, price <price>, restocking<true/false> destroyed ...".
Public member functions:
accessors/mutators for name, quantity, price.
Display: invoke Display from base class, then display its own data. NOTE: If the product restocking is true somehow indicate it using "special effects" such as ***** or whatever effect you'd like.
Cost : take an integer as its only parameter representing the quantity (how many product to be sold) and return the total cost (price * quantity parameter).
class InventorySystem: (minimum implement.
show code and all classes with full implementation for these Program S.pdfAlanSmDDyerl
show code and all classes with full implementation for these Program Specifications.
Example products ( camcorder, dvd player, blueray player, tv, camera, xbox 360, ps4, Wii,
laptops, iphone, battery, smart phones, computer desktop, printer, usb, mouse)
Develop an inventory management system for an electronics store. The inventory system should
have the following functionalities:
BuildInventory: read a text file containing electronics products information and dynamically
store them in an array of pointers.
ShowInventory: display all inventory items.
UpdateInventory: ask for item id and quantity. If found display cost and update Product object
info (reduce Product's quantity and potentially update restocking flag).
Terminate: save current inventory to a text file.
This programming assignment illustrates the following concepts:
Text file reading and writing.
Arrays of pointers and dynamic memory allocations with new and delete.
Inheritance.
C++ type casting: static_cast.
NOTE: This assignment is not about polymorphism or dynamic_cast! Your program should not
contain any virtual function and/or use of dynamic_cast mechanism or point deductions will
apply. You will have opportunity to use polymorphism in the next assignment.
Class Design
You need at least three classes.
class InventoryItem (minimum implementation specified below) - This is the base class.
Protected member data: item id (integer) and restocking (bool).
Public static data:
const integer (item id): initialize to 9999.
const bool (restocking): initialize to false.
Constructors
Default constructor: initialize item id and restocking using the default static data with member
initializer syntax.
Non-default constructor: take 2 parameters.
Destructor: output "InventoryItem <item id> with <true/false> restocking destroyed ..."
Public member functions:
mutator/accessor for restocking, item id.
Display : to show InventoryItem item id and restocking (true/false). item id must be displayed as
a 4-digit integer with leading 0s if < 1000.
class Product : derived from InventoryItem class (minimum implementation specified below).
Private member data: name (string), quantity (integer) and price (double).
Public static data:
const string (name): "No Product".
const int (quantity): 0
const double (price): 0.99
Constructors (use member initializer syntax)
Default constructor: set member data to static data's default values above. Must explicitly invoke
the base class' default constructor.
Non-default constructor: take five parameters (id, restocking, name, quantity and price). Must
explicitly invoke the base class' non-default constructor.
Destructor: output "Product: <item id>, Name<name>, quantity<quantity>, price <price>,
restocking<true/false> destroyed ...".
Public member functions:
accessors/mutators for name, quantity, price.
Display: invoke Display from base class, then display its own data. NOTE: If the product
restocking is true somehow indicate it using "special effects" such as ***** or wh.
Program Specifications Develop an inventory management system for an e.docxVictormxrPiperc
Program Specifications
Develop an inventory management system for an electronics store. The inventory system should have the following functionalities:
BuildInventory: read a text file containing electronics products information and dynamically store them in an array of pointers.
ShowInventory: display all inventory items.
UpdateInventory: ask for item id and quantity. If found display cost and update Product object info (reduce Product's quantity and potentially update restocking flag).
Terminate: save current inventory to a text file.
This programming assignment illustrates the following concepts:
Text file reading and writing.
Arrays of pointers and dynamic memory allocations with new and delete.
Inheritance.
C++ type casting: static_cast.
NOTE: This assignment is not about polymorphism or dynamic_cast! Your program should not contain any virtual function and/or use of dynamic_cast mechanism or point deductions will apply. You will have opportunity to use polymorphism in the next assignment.
Class Design
You need at least three classes.
class InventoryItem (minimum implementation specified below) - This is the base class.
Protected member data: item id (integer) and restocking (bool).
Public static data:
const integer (item id): initialize to 9999.
const bool (restocking): initialize to false.
Constructors
Default constructor: initialize item id and restocking using the default static data with member initializer syntax.
Non-default constructor: take 2 parameters.
Destructor: output "InventoryItem <item id> with <true/false> restocking destroyed ..."
Public member functions:
mutator/accessor for restocking, item id.
Display : to show InventoryItem item id and restocking (true/false). item id must be displayed as a 4-digit integer with leading 0s if < 1000.
class Product : derived from InventoryItem class (minimum implementation specified below).
Private member data: name (string), quantity (integer) and price (double).
Public static data:
const string (name): "No Product".
const int (quantity): 0
const double (price): 0.99
Constructors (use member initializer syntax)
Default constructor: set member data to static data's default values above. Must explicitly invoke the base class' default constructor.
Non-default constructor: take five parameters (id, restocking, name, quantity and price). Must explicitly invoke the base class' non-default constructor.
Destructor: output "Product: <item id>, Name<name>, quantity<quantity>, price <price>, restocking<true/false> destroyed ...".
Public member functions:
accessors/mutators for name, quantity, price.
Display: invoke Display from base class, then display its own data. NOTE: If the product restocking is true somehow indicate it using "special effects" such as ***** or whatever effect you'd like.
Cost : take an integer as its only parameter representing the quantity (how many product to be sold) and return the total cost (price * quantity parameter).
class InventorySystem: (minimum implementation s.
please code in c#- please note that im a complete beginner- northwind.docxAustinaGRPaigey
please code in c#.
please note that im a complete beginner.
northwind.mdf.
northwind_log.ldf
OrderDetailsMaintenance.zip
1. Include the two above files in the root of your OrderDetailsMaintenance project.
2. Make sure to mark them as "Content" and "Copy Always" or "Copy if newer" in the properties window of those two files.
3. Run the Scaffold-DbContext command to create a context class as well as a class to encapsulate the Orders objects from the associated table in the mdf file. Make sure to include the parameters for -Tables Customers (only worry about the attributes associated with the text boxes, you don't need to worry about any other rows from the table)
4. Once you have ran the command, include an app.config file and add a connection string element. Make sure to copy the connection string from your Context class to your app.config. Then edit your context to grab the connection string from the app.config (ConfigurationManager.ConnectionString["Northwind"].ConnectionString)
5. Code the Find button to Find the customer id and populate the details in the below text boxes.
1. If no order is found, display a message box.
6. Code the exit button
7. Code the Save button to update its attributes and call Update and SaveChanges() on that particular entity.
1. Note: If you close the program, reopen it, and search for the entity you recently updated. You may not see the changes depending on how you setup the mdf file in your project (because it copies a new version to the bin directory each time you run the program). So, if you don't see your changes, don't be alarmed.
============
HERE IS WHAT I HAVE SO FAR
frmCustomerMaintenance.cs
namespace OrderDetailsMaintenance
{
public partial class frmCustomerMaintenance : Form
{
public frmCustomerMaintenance()
{
InitializeComponent();
}
}
}
frmCustomerMaintenance.resx
<root>
<xsd:schema id="root" xmlns="" xmlns:xsd="http://www.w3.org/2001/XMLSchema" xmlns:msdata="urn:schemas-microsoft-com:xml-msdata">
<xsd:import namespace="http://www.w3.org/XML/1998/namespace" />
<xsd:element name="root" msdata:IsDataSet="true">
<xsd:complexType>
<xsd:choice maxOccurs="unbounded">
<xsd:element name="metadata">
<xsd:complexType>
<xsd:sequence>
<xsd:element name="value" type="xsd:string" minOccurs="0" />
</xsd:sequence>
<xsd:attribute name="name" use="required" type="xsd:string" />
<xsd:attribute name="type" type="xsd:string" />
<xsd:attribute name="mimetype" type="xsd:string" />
<xsd:attribute ref="xml:space" />
</xsd:complexType>
</xsd:element>
<xsd:element name="assembly">
<xsd:complexType>
<xsd:attribute name="alias" type="xsd:string" />
<xsd:attribute name="name" type="xsd:string" />
</xsd:complexType>
</xsd:element>
<xsd:element name="data">
<xsd:complexType>
<xsd:sequence>
<xsd:element name="value" type="xsd:string" minOccurs="0" msdata:Ordinal="1" />
<xsd:element name="comment" type="xsd:string" minOccurs="0" msdata:Ordinal="2" />
</xsd:sequence>
<xsd:attribute name="name".
The program reads data from two files, itemsList-0x.txt and .docxoscars29
The program reads data from two files,
itemsList-0x.txt
and
inventoryList-0x.txt
. File extensions on Linux may be arbitrary–i.e., these files could have been named with
.dat
as the extensions.
The first file,
itemsList-0x.txt
, lists all possible items. Each line represents one item in the form
id name
.
Example 1: Sample itemsList-0x.txt
0 Air 1 HP Potion 2 MP Potion 5 Iron Ore 3 Bow Tie 4 Dirt 6 Diamond Ore 7 Iron Ingot 8 Diamond 9 Diamond Block
The second file,
inventoryList-0x.txt
, lists each individual inventory–or storage chest–followed by a list of items.
Example 2: Sample inventoryList-0x.txt
# 5
- 1 10 - 2 5 - 3 2 # 6
- 4 3 - 5 27 - 6 44 - 7 55 - 8 1 - 9 4 - 4 3 # 2
- 2 5 - 9 4 - 8 1 - 5 2 - 10 5
Each line preceded by
#
denotes the start of a new inventory. Each line preceded by
-
denotes an item. The program creates a new inventory each time a
#
is encountered.
When a
-
is encountered, a stack of items, ItemStack, is created. The
ItemStack
is placed in the
Inventory
based on the following rules:
If the Inventory is empty, store the ItemStack, and
return true
.
If the Inventory is not empty, examine the Inventory.
If a matching ItemStack is found, merge the two ItemStacks and
return true
.
If no matching ItemStack is found, store the new ItemStack and
return true
.
If the Inventory is full,
return false
.
Through the magic of abstraction, this is not one function, but four (4) functions in total. Yes, it does seem unnecessary at first. However, each function does one thing and only one thing. This is an exercise in understanding the thought process behind abstraction, interfaces, and the
S
/
O
in
S.O.L.I.D
(with some C++ code) in a multi-ADT program.
Most of your time will be spent on understanding the abstractions (and interfaces) as opposed to spamming cobblestone blocks… I mean C++ code.
3.2 Output
The output consists of three reports written to standard output, one after the other.
A report listing items that were stored or discarded.
A report listing all valid items.
Finally, a detailed report is printed. listing data for each inventory:
Maximum Capacity–i.e., total slots.
Utilized Capacity–i.e., occupied slots
Listing of all items.
If the program is run with the provided input files, the following output should be generated…
Example 3: Sample Output
Processing Log: Stored (10) HP Potion Stored ( 5) MP Potion Stored ( 2) Bow Tie Stored ( 3) Dirt Stored (27) Iron Ore Stored (44) Diamond Ore Stored (55) Iron Ingot Stored ( 1) Diamond Stored ( 4) Diamond Block Stored ( 3) Dirt Stored ( 5) MP Potion Stored ( 4) Diamond Block Discarded ( 1) Diamond Discarded ( 2) Iron Ore Item List: 0 Air 1 HP Potion 2 MP Potion 3 Bow Tie 4 Dirt 5 Iron Ore 6 Diamond Ore 7 Iron Ingot 8 Diamond 9 Diamond Block Storage Summary: -Used 3 of 5 slots (10) HP Potion ( 5) MP Potion ( 2) Bow Tie -Used 6 of 6 slots ( 6) Dirt.
Lab #9 and 10 Web Server ProgrammingCreate a New Folder I s.docxDIPESH30
Lab #9 and 10: Web Server Programming
Create a New Folder: I suggest that youcreate a new folder named Lab 9 and 10 to store your 13 or more files for this lab.
PHP Functions dedicated to working with MySQL databases:
PHP Function
Description
mysql_connect()
Used to connect to a database including user ID and password for database user.
mysql_select_db()
Set the default database that is to be used.
mysql_query()
Used for general query (or database actions) such as performing CREATE TABLE, SELECT, INSERT, UPDATE, or DELETE actions.
mysql_fetch_assoc()
Allows an entire row (record) of data to be retrieved and converted to an associative array. This allows each field of a record to be retrieved using the field name itself as the array index.
mysql_close()
Closing access to an opened MySQL database.
Your Topic for this Lab: Decide on a topic for this lab based on your entrepreneurship (if feasible). In my example, I created an inventory program for a company called Kettel’s Auto Parts. (The idea was inspired by a business once owned by my great Uncle Joe back in the 1940’s – he may have kept records differently back then) You might consider an inventory for your company. The goal is to keep track of items in a database.
Dealing with Large Programs: This is the most ambitions PHP program we have tackled so far. If you attempt to consider this endeavor as a whole, it may be overwhelming to you. So, here is the trick for handling large programs. Break them into small pieces, and just consider one little piece at a time. This program is divided into 13 modules. If you can write a small program, then you can write a large program broken into many small pieces. I suggest you skim over this assignment so you get an idea of where you are headed. As in the past, this example is just a paradigm – your program may look completely different.
Lab #9 – Parts I to V: The first week, plan to submit a Word document with a link to your “Viewing Site” (Part V). Be sure to include a graphic banner and a least one “time” field using the PHP now() function.
Lab #10 – Finish the Program: The second week plan to submit a Word document with a link to the menu. Your Add records, Edit Records, Delete Records and View by Sorted and Filtered order should be functioning.
Program Files for this Lab: In my example I wrote the following 13 modules to make up the Kettel’s Auto Parts Inventory Program:
parts_form.html – Part I
parts_banner.php – Part I
parts_include.php – Part II
parts_reset.php – Part III
parts_save_rec.php – Part IV
parts_view_all.php – Part V
Parts_menu.html – Part VI
parts_view.php
parts_delete.php
parts_delete_entry.php
parts_edit.php
parts_edit_entry.php
parts_edit_save.php
Hierarchy Chart: Do you remember the hierarchy charts from Chapter 2 of CST 170? When a program has many modules calling other modules, programmers often use hierarchy carts to show a picture of how the modules relate to each other. Don’t confuse the hierarchy ...
CSC240: Programming Assignment #9: Stacks & Queues Assigned: Week 12 Due: Week 13
Points: 50 In this program, you will utilize objects of your class used in previous programs, and
create a program to store 10 objects each into a Stack and into a Queue. You can load the 10
data objects through any combination of user input, hard code the data records/initialization, or
read from a file. The preferred method is by reading from a file since it doesnt require any data
entry or data in code. Coding Requirements: 1. Create your application class, and your container
classes which will encapsulate the both a StackOfObjects and an QueueOfObjects. 2. Read the
file (or create data objects using another method) into a 10-element array of objects, which you
can encapsulate into a separate class. 3. Load the same data set into both the stack and the
queue from the array of objects. 4. In main(), create and invoke a short menu with items to perform
data entry/read from file, and to enable the user to test both the stack and queue functionality by
printing a report of the data. Since a stack is LIFO (Last In First Out) and a queue is FIFO (First In
First Out), the stack data should print in reverse order to which it was inserted, and the queue data
should print in the order to which it was inserted. Menu Items 1. List Original Data (in Array of
Objects) 2. Report of Stack of Data 3. Report of Queue of Data 4. End Program Output
Requirements: (Exercise all methods, including constructors to show their results/output) In your
main() method, exercise all menu items using the methods invoked by each menu item, running all
menu items, showing the initial list, then displaying it by popping objects off of the top of stack, or
de- queueing objects out of the queue. The report of the objects in your array will be columnar,
showing each of the values, formatting the columns and adding headers and footers as needed.
Assigned: Week 12 Due: Week 13 Points: 50 In this program, you will utilize objects of your class
used in previous programs, and create a program to store 10 objects each into a Stack and into a
Queue. You can load the 10 data objects through any combination of user input, hard code the
data records/initialization, or read from a file. The preferred method is by reading from a file since
it doesn't require any data entry or data in code. Coding Requirements: 1. Create your application
class, and your "container" classes which will encapsulate the both a StackOfObjects and an
QueueOfObjects. 2. Read the file (or create data objects using another method) into a 10-element
array of objects, which you can encapsulate into a separate class. 3. Load the same data set into
both the stack and the queue from the array of objects. 4. In main(), create and invoke a short
menu with items to perform data entry/read from file, and to enable the user to test both the stack
and queue functionality by printing a report of the data. Since a stack is LIFO (Last In First Out).
Introduction
Web Storage
WebSQL
IndexedDB
File System Access
Final Considerations
This presentation has been developed in the context of the Mobile Applications Development course, DISIM, University of L'Aquila (Italy), Spring 2015.
http://www.ivanomalavolta.com
Using the Tooling API to Generate Apex SOAP Web Service ClientsSalesforce Developers
Join us as we review the capabilities of the existing WSDL-to-Apex code generation feature, and explain how we built a tool to provide expanded features using the Tooling API. The resulting tool has greater support for more WSDL features, generates test cases and the associated mocks to maximize code coverage, and optionally includes HttpRequest versions of the callouts.
C++ Programming Class Creation Program Assignment InstructionsTawnaDelatorrejs
C++ Programming: Class Creation Program Assignment Instructions
Overview
The purpose of this assignment is to give you some practice with creating your own classes. This program serves as the basis for all of the other programming assignments in this class and your future Computer Science classes.
Instructions
Construct a class named Square that has a floating-point data member named side. The class should have a zero-argument constructor that initializes this data member to 0. It should have member functions named calcPerimeter() and calcArea() that calculate the perimeter and area of a square respectively, a member function setSide() to set the side of the square, a member function getSide() to return the side, and a member function showData() that displays the square’s side, perimeter, and area. The formula for the area of a square is Area = side * side. The formula for the perimeter of a square is Perimeter = 4 * side.
The class should use appropriate protection levels for the member data and functions. It should also follow “principles of minimalization”: that is, no member data should be part of a class unless it is needed by most member functions of the object. A general rule of thumb is that “if you can easily calculate it, don’t store it.”
Use your class in a program that creates an instance of a Square (utilizing the zero-argument constructor), prompts a user for a side, calls the setSide() function to set the square’s side, and then calls showData() to display the square’s side, perimeter, and area. Your program should allow the user to enter new square dimensions until the user enters -1. Be sure to include appropriate error checking. Does it make sense to enter “abc” as the side of a square? No. Therefore, you should ensure that the user enters numeric data for the side. Negative numbers (other than the -1 to exit) should also be prevented.
Style:
· Your lab should be constructed such that separate files are used: Square.h (your class declaration file), Square.cpp (your class implementation file), and SquareDriver.cpp (the file that contains main() and any other functions that are not part of the class).
The purpose of having separate files is for code resusability. If other developers want to use your class in their programs, they don't need main() as well. They should only have to "#include" your class header file. As such, two separate files for the class are needed to be able to hide the implementation details from other developers. You want other developers to know how to use your class (i.e. what functions are available and how they are called -- this is called the "interface" of the class), but not how they are implemented. If both the interface and the implementation code are in the same file, this cannot be accomplished. When you distribute your class to other developers, the implementation (.cpp) file gets compiled, but the interface (.h) doesn't. That way, the developer can use your class, but he o ...
Introduction
Web Storage
WebSQL
IndexedDB
File System Access
Final Considerations
This presentation has been developed in the context of the Mobile Applications Development course, DISIM, University of L'Aquila (Italy), Spring 2014.
http://www.ivanomalavolta.com
ScenarioXYZ Corp. is a parent corporation with 2 handbag stores l.pdfalokindustries1
Scenario:
XYZ Corp. is a parent corporation with 2 handbag stores located in New Jersey and New York.
XYZ needs to setup a system that will gather customer data from all of the different stores and
put it into one place.
Blindly copying data files from each store is not going to be good enough most of the time.
The corporation needs to have a standardized set of data in order to analyze it.
Task:
You will need to do the following:
1. Create a DataMart Create a table called: DimXYZCustomers
Create using: DimSQLCustomers.sql
2. Build an SSIS - ETL solution to get the data from the 2 stores and load to a single data table
Review/analyze the data from all sources. Source files attached
Determine what needs to be standardized based on the requirements below.
The data collected should be changed to a standard format. For instance, the state value should
all be 2-character value such as NY, NJ etc.
Extract data from all sources
Source file 1:NJCustomers.txt
Source file 2:NYCustomers.csv
State 2 character abbreviation
First and Last names Upper case
Load to the a single data location
Note: custAcct will hold the PK of the source tables, however, CustomerKey is the PK of this
dimension (it will auto increment)
Only good data should go to the database; bad data (assume: no account number) should go to an
error log file
Add annotation to your design space
Be sure to add meaningful names to each object
ETL Project name: LastnameFirstname_Week7Assignment
What to Submit:
1. A zipped folder of the entire solution
2. Screenshot of the ETL solution and Data Warehouse created
Naming convention: firstnameLastname_Week7Assignment.zip
HINT: In addition to the objects we are familiar with, use the transformation component (can be
found in the Common toolbox) Union All
/****** Object: Table [dbo].[DimXYZCustomers] ******/
SET ANSI_NULLS ON
GO
SET QUOTED_IDENTIFIER ON
GO
CREATE TABLE [dbo].[DimXYZCustomers](
[custAcct] [numeric](18, 0) NOT NULL,
[custFirst] [nvarchar](50) NULL,
[custLast] [nvarchar](50) NULL,
[strNum] [nvarchar](50) NULL,
[strName] [nvarchar](50) NULL,
[city] [nvarchar](50) NULL,
[state] [nvarchar](50) NULL,
[zip] [int] NULL,
[creditLimit] [money] NULL,
[CustomerKey] [numeric](18, 0) IDENTITY(1,1) NOT NULL,
CONSTRAINT [PK_DimXYZCustomers] PRIMARY KEY CLUSTERED
(
[CustomerKey] ASC
)WITH (PAD_INDEX = OFF, STATISTICS_NORECOMPUTE = OFF, IGNORE_DUP_KEY
= OFF, ALLOW_ROW_LOCKS = ON, ALLOW_PAGE_LOCKS = ON) ON [PRIMARY]
) ON [PRIMARY]
GO
Ny customers.csv
acctNum,firstName,lastName,strNum,strName, city, state, zip,creditLimit
1,Lindon,Jacobs,5, Main St,Miller Place,New York,33176,330.5
2,Charissa,Gaul,34, Azalea Ct,Mt. Sinai,NY,33266,1059
3,Alyssa,wint,22, Sweetgum Lane,Farmingdale,NY,33176,150
4,Brenda,reynolds,45 B, Rocky Rd,Uniondale,New York,33266,5459.35
5,Vishnu,Ruben,123, Candid St,Port Jefferson,NY,33176,235.33
6,Renna,Kelly,4333, Louise Lane, Brookville,New York,33266,459.5
7,Chris,Rusch,12, Main St,Hempstead,NY,33176,2150
8,Lisa,Biolsi,166, Louise L.
How does the mutation rate of speciation in the Dobzhansky- Muller m.pdfflashfashioncasualwe
How does the mutation rate of speciation in the Dobzhansky- Muller model? How does the
mutation rate affect the rate of speciation in the Dobzhansky Muller model? An increased
mutation rate results in a more rapid reproductive isolation between the two diverging
populations. O An increased mutation rate results in slower reproductive isolation between the
two diverging populations. The mutation rate is unrelated to the rate of evolution of reproductive
isolation.
Solution
ans- a increased mutation rate results in a more reproduction isolation between the two diverging
population.
an ancestral population splits into two parts the two lineage begins to diverge genetically which
are temporally isolated from each other.new alleles evolved at one locus of lineage and different
alleles evolved in another locus of the lineage..
Hello. I need help fixing this Java Code on Eclipse. Please fix part.pdfflashfashioncasualwe
Hello. I need help fixing this Java Code on Eclipse. Please fix parts indicated as \"//Fix\" or
\"//Fill-in\". The code given is the first image. Thank you! Sample outputs are given below along
with what the code is required to do. import java til. Random import java til. Scanner public class
GenCheeseShopv2 public static void intro (Stringt] names, double []prices int amounts Fill-in
public static void getAmount (Scanner input, String[] names, int[] amounts) public static void
itemizedList (String[] names, double Prices int[] amounts) Fill-i public static double
calcSubTotal (double prices, int amounts return 0; pub. lic static int discount (double subTotal
return 0; pub. lic static oid print Total (double subTotal int discount) Fill-in public static void mi
args final int MAXCH EESEE DO NOT CHANGE ANYTHING BELOW String[] names new
String CMAXCH EESE double[] prices new double EESE] int[] amounts new int
[MAXCHEESEJ Scanner input new Scanner (Syste intro names, prices, amounts get Amo unt
input, names, amounts double total calcSubTotal (prices, amounts if EESEE 0) System. out print
Display the itemized list? (1 for yes) int itemized input-nex if item 1) itemized List (names,
prices, amounts); System. out. println(); print Total(total, discount total));
Solution
import java.util.Random;
import java.util.Scanner;
public class GenCheeseShopv2 {
public static void intro(String[] names, double[] prices,int[] amounts){
System.out.println(\"We sell \"+names.length+\" kinds of cheese\");
for(int i=0;i0)
System.out.println(amounts[i]+\" lbs of \"+names[i]+\" @ \"+prices[i]+\" =
$\"+(amounts[i]*prices[i]));
}
}
public static double calcSubTotal( double[] prices,int[] amounts){
double subTotal=0;
for(int i=0;i100)
return 10;
else if(subTotal > 50)
return 25;
else
return 0;
}
public static void printTotal(double subTotal,int discount){
System.out.println(\"Sub Total : $\"+subTotal);
System.out.println(\"-Discount : $\"+discount);
System.out.println(\"Total : $\"+(subTotal-discount));
}
public static void main(String[] args){
final int MAXCHEESES=4;
String[] names = new String[MAXCHEESES];
double[] prices = new double[MAXCHEESES];
int[] amounts = new int[MAXCHEESES];
Scanner input = new Scanner(System.in);
intro(names, prices, amounts);
getAmount(input, names, amounts);
double total = calcSubTotal(prices, amounts);
if(MAXCHEESES>0){
System.out.println(\"Display the itemized list? (1 for yes)\");
int itemized = input.nextInt();
if(itemized==1){
itemizedList(names, prices, amounts);
}
}
System.out.println();
printTotal(total, discount(total));
}
}.
More Related Content
Similar to Develop an inventory management system for an electronics store. The .pdf
Introduction
Web Storage
WebSQL
IndexedDB
File System Access
Final Considerations
This presentation has been developed in the context of the Mobile Applications Development course, DISIM, University of L'Aquila (Italy), Spring 2015.
http://www.ivanomalavolta.com
Using the Tooling API to Generate Apex SOAP Web Service ClientsSalesforce Developers
Join us as we review the capabilities of the existing WSDL-to-Apex code generation feature, and explain how we built a tool to provide expanded features using the Tooling API. The resulting tool has greater support for more WSDL features, generates test cases and the associated mocks to maximize code coverage, and optionally includes HttpRequest versions of the callouts.
C++ Programming Class Creation Program Assignment InstructionsTawnaDelatorrejs
C++ Programming: Class Creation Program Assignment Instructions
Overview
The purpose of this assignment is to give you some practice with creating your own classes. This program serves as the basis for all of the other programming assignments in this class and your future Computer Science classes.
Instructions
Construct a class named Square that has a floating-point data member named side. The class should have a zero-argument constructor that initializes this data member to 0. It should have member functions named calcPerimeter() and calcArea() that calculate the perimeter and area of a square respectively, a member function setSide() to set the side of the square, a member function getSide() to return the side, and a member function showData() that displays the square’s side, perimeter, and area. The formula for the area of a square is Area = side * side. The formula for the perimeter of a square is Perimeter = 4 * side.
The class should use appropriate protection levels for the member data and functions. It should also follow “principles of minimalization”: that is, no member data should be part of a class unless it is needed by most member functions of the object. A general rule of thumb is that “if you can easily calculate it, don’t store it.”
Use your class in a program that creates an instance of a Square (utilizing the zero-argument constructor), prompts a user for a side, calls the setSide() function to set the square’s side, and then calls showData() to display the square’s side, perimeter, and area. Your program should allow the user to enter new square dimensions until the user enters -1. Be sure to include appropriate error checking. Does it make sense to enter “abc” as the side of a square? No. Therefore, you should ensure that the user enters numeric data for the side. Negative numbers (other than the -1 to exit) should also be prevented.
Style:
· Your lab should be constructed such that separate files are used: Square.h (your class declaration file), Square.cpp (your class implementation file), and SquareDriver.cpp (the file that contains main() and any other functions that are not part of the class).
The purpose of having separate files is for code resusability. If other developers want to use your class in their programs, they don't need main() as well. They should only have to "#include" your class header file. As such, two separate files for the class are needed to be able to hide the implementation details from other developers. You want other developers to know how to use your class (i.e. what functions are available and how they are called -- this is called the "interface" of the class), but not how they are implemented. If both the interface and the implementation code are in the same file, this cannot be accomplished. When you distribute your class to other developers, the implementation (.cpp) file gets compiled, but the interface (.h) doesn't. That way, the developer can use your class, but he o ...
Introduction
Web Storage
WebSQL
IndexedDB
File System Access
Final Considerations
This presentation has been developed in the context of the Mobile Applications Development course, DISIM, University of L'Aquila (Italy), Spring 2014.
http://www.ivanomalavolta.com
ScenarioXYZ Corp. is a parent corporation with 2 handbag stores l.pdfalokindustries1
Scenario:
XYZ Corp. is a parent corporation with 2 handbag stores located in New Jersey and New York.
XYZ needs to setup a system that will gather customer data from all of the different stores and
put it into one place.
Blindly copying data files from each store is not going to be good enough most of the time.
The corporation needs to have a standardized set of data in order to analyze it.
Task:
You will need to do the following:
1. Create a DataMart Create a table called: DimXYZCustomers
Create using: DimSQLCustomers.sql
2. Build an SSIS - ETL solution to get the data from the 2 stores and load to a single data table
Review/analyze the data from all sources. Source files attached
Determine what needs to be standardized based on the requirements below.
The data collected should be changed to a standard format. For instance, the state value should
all be 2-character value such as NY, NJ etc.
Extract data from all sources
Source file 1:NJCustomers.txt
Source file 2:NYCustomers.csv
State 2 character abbreviation
First and Last names Upper case
Load to the a single data location
Note: custAcct will hold the PK of the source tables, however, CustomerKey is the PK of this
dimension (it will auto increment)
Only good data should go to the database; bad data (assume: no account number) should go to an
error log file
Add annotation to your design space
Be sure to add meaningful names to each object
ETL Project name: LastnameFirstname_Week7Assignment
What to Submit:
1. A zipped folder of the entire solution
2. Screenshot of the ETL solution and Data Warehouse created
Naming convention: firstnameLastname_Week7Assignment.zip
HINT: In addition to the objects we are familiar with, use the transformation component (can be
found in the Common toolbox) Union All
/****** Object: Table [dbo].[DimXYZCustomers] ******/
SET ANSI_NULLS ON
GO
SET QUOTED_IDENTIFIER ON
GO
CREATE TABLE [dbo].[DimXYZCustomers](
[custAcct] [numeric](18, 0) NOT NULL,
[custFirst] [nvarchar](50) NULL,
[custLast] [nvarchar](50) NULL,
[strNum] [nvarchar](50) NULL,
[strName] [nvarchar](50) NULL,
[city] [nvarchar](50) NULL,
[state] [nvarchar](50) NULL,
[zip] [int] NULL,
[creditLimit] [money] NULL,
[CustomerKey] [numeric](18, 0) IDENTITY(1,1) NOT NULL,
CONSTRAINT [PK_DimXYZCustomers] PRIMARY KEY CLUSTERED
(
[CustomerKey] ASC
)WITH (PAD_INDEX = OFF, STATISTICS_NORECOMPUTE = OFF, IGNORE_DUP_KEY
= OFF, ALLOW_ROW_LOCKS = ON, ALLOW_PAGE_LOCKS = ON) ON [PRIMARY]
) ON [PRIMARY]
GO
Ny customers.csv
acctNum,firstName,lastName,strNum,strName, city, state, zip,creditLimit
1,Lindon,Jacobs,5, Main St,Miller Place,New York,33176,330.5
2,Charissa,Gaul,34, Azalea Ct,Mt. Sinai,NY,33266,1059
3,Alyssa,wint,22, Sweetgum Lane,Farmingdale,NY,33176,150
4,Brenda,reynolds,45 B, Rocky Rd,Uniondale,New York,33266,5459.35
5,Vishnu,Ruben,123, Candid St,Port Jefferson,NY,33176,235.33
6,Renna,Kelly,4333, Louise Lane, Brookville,New York,33266,459.5
7,Chris,Rusch,12, Main St,Hempstead,NY,33176,2150
8,Lisa,Biolsi,166, Louise L.
How does the mutation rate of speciation in the Dobzhansky- Muller m.pdfflashfashioncasualwe
How does the mutation rate of speciation in the Dobzhansky- Muller model? How does the
mutation rate affect the rate of speciation in the Dobzhansky Muller model? An increased
mutation rate results in a more rapid reproductive isolation between the two diverging
populations. O An increased mutation rate results in slower reproductive isolation between the
two diverging populations. The mutation rate is unrelated to the rate of evolution of reproductive
isolation.
Solution
ans- a increased mutation rate results in a more reproduction isolation between the two diverging
population.
an ancestral population splits into two parts the two lineage begins to diverge genetically which
are temporally isolated from each other.new alleles evolved at one locus of lineage and different
alleles evolved in another locus of the lineage..
Hello. I need help fixing this Java Code on Eclipse. Please fix part.pdfflashfashioncasualwe
Hello. I need help fixing this Java Code on Eclipse. Please fix parts indicated as \"//Fix\" or
\"//Fill-in\". The code given is the first image. Thank you! Sample outputs are given below along
with what the code is required to do. import java til. Random import java til. Scanner public class
GenCheeseShopv2 public static void intro (Stringt] names, double []prices int amounts Fill-in
public static void getAmount (Scanner input, String[] names, int[] amounts) public static void
itemizedList (String[] names, double Prices int[] amounts) Fill-i public static double
calcSubTotal (double prices, int amounts return 0; pub. lic static int discount (double subTotal
return 0; pub. lic static oid print Total (double subTotal int discount) Fill-in public static void mi
args final int MAXCH EESEE DO NOT CHANGE ANYTHING BELOW String[] names new
String CMAXCH EESE double[] prices new double EESE] int[] amounts new int
[MAXCHEESEJ Scanner input new Scanner (Syste intro names, prices, amounts get Amo unt
input, names, amounts double total calcSubTotal (prices, amounts if EESEE 0) System. out print
Display the itemized list? (1 for yes) int itemized input-nex if item 1) itemized List (names,
prices, amounts); System. out. println(); print Total(total, discount total));
Solution
import java.util.Random;
import java.util.Scanner;
public class GenCheeseShopv2 {
public static void intro(String[] names, double[] prices,int[] amounts){
System.out.println(\"We sell \"+names.length+\" kinds of cheese\");
for(int i=0;i0)
System.out.println(amounts[i]+\" lbs of \"+names[i]+\" @ \"+prices[i]+\" =
$\"+(amounts[i]*prices[i]));
}
}
public static double calcSubTotal( double[] prices,int[] amounts){
double subTotal=0;
for(int i=0;i100)
return 10;
else if(subTotal > 50)
return 25;
else
return 0;
}
public static void printTotal(double subTotal,int discount){
System.out.println(\"Sub Total : $\"+subTotal);
System.out.println(\"-Discount : $\"+discount);
System.out.println(\"Total : $\"+(subTotal-discount));
}
public static void main(String[] args){
final int MAXCHEESES=4;
String[] names = new String[MAXCHEESES];
double[] prices = new double[MAXCHEESES];
int[] amounts = new int[MAXCHEESES];
Scanner input = new Scanner(System.in);
intro(names, prices, amounts);
getAmount(input, names, amounts);
double total = calcSubTotal(prices, amounts);
if(MAXCHEESES>0){
System.out.println(\"Display the itemized list? (1 for yes)\");
int itemized = input.nextInt();
if(itemized==1){
itemizedList(names, prices, amounts);
}
}
System.out.println();
printTotal(total, discount(total));
}
}.
Focus on Writing 4. Supporting a Point of View Do you think Social Se.pdfflashfashioncasualwe
Focus on Writing 4. Supporting a Point of View Do you think Social Security has encouraged
Americans to become too dependent on the state and federal governments for support in times of
need? Write a paragraph explaining your answer.
Solution
ANSWER:
In America, Social Security is the often used term for the federal Survivors, Old-Age, and
Disability Insurance (OASDI) program. Yes, I think social security has encouraged Americans to
become too dependent for their security solely on earnings from employment. The reasons are:
--Social Security, providing education or other assistance support, once considered to be the
responsibility of individuals, families, churches, neighbourhoods, and other civil society
institutions is rising thus reflecting that America is building a dependency culture , with ever-
more people relying on an ever-growing federal government to provide them benefits or cash.
--Industrialization caused the migration of people toward centres of work, therefore separating
children from the support provided by the wider family. Moreover, the development of
compulsory education prolonged the period during which kids were dependent on the parents.
--U.S. system developed enforced retirement and created too much dependency. Most retirees
rely on long-term care in assisted home health care providers or living facilities under Medicaid.
--Social Security has greatly encroached on the responsibility of people for giving their own
retirement funds, thus leaving millions of retirees dependent on working younger generations to
fund their retirement..
Decision-Making Across the Organization The board of trustees of a lo.pdfflashfashioncasualwe
Decision-Making Across the Organization The board of trustees of a local church is concerned
about the internal accounting controls for the offering collections made at weekly services. The
trustees ask you to serve on a three-person audit team with the internal auditor of a local college
and a CPA who has just joined the church. At a meeting of the audit team and the board of
trustees, you learn the following 1. The church\'s board of trustees has delegated responsibility
for the financial management and audit of the financial records to the finance committee. This
group prepares the annual budget and approves major disbursements. It is not involved in
collections or recordkeeping. No audit has been made in recent years because the same trusted
employee has kept church records and served as financial secretary for 15 years. The church does
not carry any fidelity insurance 2. The collection at the weekly service is taken by a team of
ushers who volunteer to serve one month. The ushers take the collection plates to a basement
office at the rear of the church. They hand their plates to the head usher and return to the church
service. After all plates have been turned in, the head usher counts the cash received. The head
usher then places the cash in the church safe along with a notation of the amount counted. The
head usher volunteers to serve for 3 months 3. The next morning, the financial secretary opens
the safe and recounts the collection. The secretary withholds $150-$200 in cash, depending on
the cash expenditures expected for the week, and deposits the remainder of the collections in the
bank. To facilitate the deposit, church members who contribute by check are asked to make their
checks payable to \"Cash.\" Each month, the financial secretary reconciles the bank statement
and submits a copy of the reconciliation to the board of trustees. The reconciliations have rarely
contained any bank errors and have never shown any errors per books. 4. Instructions With the
class divided into groups, answer the following. Indicate the weaknesses in internal accounting
control over the handling of collections. List the improvements in internal control procedures
that you plan to make at the next meeting of the audit team for (1) the ushers, (2) the head usher,
(3) the financial secretary, and (4) the finance committee What church policies should be
changed to improve internal control?
Solution
(a) The primary weakness in internal accounting control with regards to handling of collections
starts with the weakness that the church has not undertaken an audit in recent years. An audit
should have been done regardless of the trustworthiness of its employees and regardless of their
tenure at the church. Secondly the church does not have fidelity insurance and this can possibly
lead to a situation in which the church will not be able to negate its loss in case of any occurrence
of fraud.
Another weakness in internal control is with regards to passing of th.
Explain the experience of African-Americans in the South over the co.pdfflashfashioncasualwe
Explain the experience of African-Americans in the South over the course of the half-century
following the Civil War.
How did an interracial democracy in the South come to be a plausible goal for a time? Why was
this goal not realized?
Why did sharecropping become the dominant form of black labor by the end of Reconstruction
and why was the white South able to impose a “Jim Crow” style of segregation, even as it was
disfranchising the overwhelming majority of black men?
Solution
1.
Post civil war the African Americans faced a lot of troubles like : Destruction, hunger,
lawlessness and violence amongst others.
after the civil war many of the african americans came out out slavery and were refugees and
they did not kenw what to do next.But when they arrived home, they found a strange new world
waiting for them..
During a diversity management session, a manager suggests that stereo.pdfflashfashioncasualwe
During a diversity management session, a manager suggests that stereotypes are a necessary part
of working with others. \"I have to make assumptions about what\'s in the other person\'s head,
and stereotypes help me do that,\" she explains. \"It\'s better to rely on stereotypes than to enter a
working relationship with someone from another culture without any idea of what they believe
in!\" Discuss the merits of and problems with the manager\'s statement.
Solution
The manager statement highlights her viewpoint on the benefits of stereotypes in a diverse
working environment. Below are merits and problems of her statement -
Merits
1. Individuals from different cultures hold a viewpoint regarding one another through stereotypes
2. It becomes easy to initiate the communication among individuals by having a viewpoint rather
than having nothing
3. As individuals start interaction and communication with stereotypes in minds, they will be
careful in how to communicate with others without hurting their sentiments.
Problems
1. Stereotype is the most common opinion about a culture or group based on historical references
that are in the news. Hence, they will not provide a clear viewpoint on the individuals.
2. Stereotypes usually carry viewpoints that oversimplify an individual\'s personality and
character based on his/her culture or origin thus resulting in hurting the individual who might be
quite different from the stereotype.
3. It becomes difficult to change the opinion about an individual if viewed through stereotype..
Explain why a mycoplasma PCR kit might give a negative result when u.pdfflashfashioncasualwe
Explain why a mycoplasma PCR kit might give a negative result when used to test for
mycoplasma in a cell line containing mycoplasma
Solution
Mycoplasma is a prokaryotic organism that is a frequent and occult contaminant of cell cultures.
This organism can modify many aspects of cell physiology, rendering experiments that are
conducted with contaminated cells worthless. Because of their small size, Mycoplasma can pass
through filters used to prevent bacterial and fungal contamination and potentially spread to all
the cultures in a laboratory. It is essential that all new cell cultures entering a laboratory and all
cell banks are tested for presence of Mycoplasma. It is recommended that two techniques be
used, selected from a PCR-based methos, indirect staining and an agar and broth culture. These
three tests for detecting Mycoplasma take one day to 3-4 weeks and such tests should be an
obligatory component of quality control in every tissue culture laboratory.
Mycoplasma refers to any of over 200 species of tiny bacteria that invade cell cultures and may
even persist unrecognized for some time. They can come from sources as mundane as other cells
introduced to lab via media, sera or lab personnel. So, it is important to test your cell lines for
mycoplasma regularly. Consequences to your cells of mycoplasma infestation include changes in
growth rates, gene expression, morphology, metabolism and viability.
Even though most lab contamination can be blamed on as few as eight main culprit species, these
differ enough that no one test can find them all. And the little blighters are hardy – most
antibiotics used in cell culture are ineffective against mycoplasmas. For example, mycoplasmas
lack a cell wall, which is the key to penicillin’s success. Flawless cell culture technique is one of
the best preventive tools and testing to ascertain which cultures are clean and which cultures are
infected – so you can take quick and aggressive action before infestation spreads.
The M.hyorhinis strain is picked up by the PCR method of detection. This is the quickest but
also the least sensitive, mycoplasma assay. In this method, you perform PCR on samples of your
suspected cell cultures, using primers specific for mycoplasma DNA, usually mycoplasma’s 16S
rRNA genes. Running the PCR product on a gel shows presence of mycoplasma DNA by bands
of distinct sizes.
One major limitation of PCR is that prior information about target sequence is necessary in order
to generate the primers that will allow its selective amplification. This means that, typically, PCR
users must know precise sequences upstream of target region on each of the two single-stranded
templates in order to ensure that DNA polymerase properly binds to primer-template hybrids and
subsequently generates entire target region during DNA synthesis. Like all enzymes, DNA
polymerases are also prone to error, which in turn causes mutations in PCR fragments that are
generated. Specificity of PCR fragments can .
Describe the difference between the MOV instruction and the LEA instr.pdfflashfashioncasualwe
Describe the difference between the MOV instruction and the LEA instruction as used in these
two sample instructions. MOV D, V1 LEA DX, V1
Solution
Answer:
MOV D , V1 it moves the D to V1 and the instruction LEA DX V1 moves the address of the data
to V1 . There is no difference between MOV and LEA but LEA can be more powerful than
MOV if we need to calculate the address..
Explain how enzymes work, explaining the four major types of metabol.pdfflashfashioncasualwe
Explain how enzymes work, explaining the four major types of metabolic reactions enzymes
perform. Include: (Metabolism, catabolism, anabolism, substrate product, active site, induced fit,
competative and non competative inhibitors, allosteric regulation, cofactors and coenzymes,
hydrolysis and dehydration reactions, Redox Reactions, NADH, FADH2, phosphorylation,
exergonic/ endergonic reactions, ATP, isomerization reactions, feedback inhibition)
Solution
Enzymes are biological molecules (typically proteins) that significantly speed up the rate of
virtually all of the chemical reactions that take place within cells.
They are vital for life and serve a wide range of important functions in the body, such as aiding
in digestion and metabolism. Substrate binding[edit]
Enzymes must bind their substrates before they can catalyse any chemical reaction. Enzymes are
usually very specific as to what substrates they bind and then the chemical reaction catalysed.
Specificity is achieved by binding pockets with complementary shape, charge and
hydrophilic/hydrophobic characteristics to the substrates. Enzymes can therefore distinguish
between very similar substrate molecules to be chemoselective, regioselective and stereospecific.
Some of the enzymes showing the highest specificity and accuracy are involved in the copying
and expression of the genome. Some of these enzymes have \"proof-reading\" mechanisms.
Here, an enzyme such as DNA polymerase catalyzes a reaction in a first step and then checks
that the product is correct in a second step. This two-step process results in average error rates of
less than 1 error in 100 million reactions in high-fidelity mammalian polymerases.:5.3.1 Similar
proofreading mechanisms are also found in RNA polymerase, aminoacyl tRNA synthetases and
ribosomes.
Conversely, some enzymes display enzyme promiscuity, having broad specificity and acting on a
range of different physiologically relevant substrates. Many enzymes possess small side
activities which arose fortuitously (i.e. neutrally), which may be the starting point for the
evolutionary selection of a new function.
Enzyme changes shape by induced fit upon substrate binding to form enzyme-substrate complex.
Hexokinase has a large induced fit motion that closes over the substrates adenosine triphosphate
and xylose. Binding sites in blue, substrates in black and Mg2+ cofactor in yellow. (PDB: 2E2N,
2E2Q)
\"Lock and key\" model
To explain the observed specificity of enzymes, in 1894 Emil Fischer proposed that both the
enzyme and the substrate possess specific complementary geometric shapes that fit exactly into
one another.This is often referred to as \"the lock and key\" model:8.3.2 This early model
explains enzyme specificity, but fails to explain the stabilization of the transition state that
enzymes achieve.
Induced fit model
In 1958, Daniel Koshland suggested a modification to the lock and key model: since enzymes are
rather flexible structures, the active site is conti.
Describe one event from your daily life when you have changed your o.pdfflashfashioncasualwe
Describe one event from your daily life when you have changed your original attitude, and one
event when you could not change your original attitude. For the event when you changed your
original attitude, explain how you changed your attitude and what led to the change. For the
event when you could not change your original attitude, explain what did not work. Submission
Requirements: Submit your responses in a Microsoft Word document of the following
specifications:•Font: Arial; 12-Point •Line Spacing: Double •Length: 300–500 words Evaluation
Criteria:•Did you describe one event from your daily life when you have changed your original
attitude? •Did you describe one event from your daily life when you have not changed your
original attitude? •Did you explain how you changed your attitude and what led to the change?
•Did you explain what did not work when you could not change your original attitude? •Did you
provide your answers in complete sentences with few grammatical errors?
Solution
Instance where I changed my Attitude -
I don\'t believe in charity and philanthropy. I had this firm belief that money given to NGOs and
trusts in grants is mis-used. I always believed in commercial models and never realized that
texcept for a few most of development agencies are working for the welfare of people.
When I came acrossNanhi Kali NGO which works for girl child education I was sure that this is
another fraud NGOs which improperly utilizes the money earned in grant. But when I visited the
centre and saw the real impact on ground then my eyes remained wide open. They were doing
awesome work and even there financial statements were also showing this. This instance
changed my attitude towards NGOs.
What made me Change -
The critical factor which made me change my attitude is my interaction with foundation and
meeting with a few girls who really got benefits from the activities of NGO. The interaction
helped me understand their model in a better way. When I analyzed their financials I realized
that manpower is working at half the salaries and highly motivated and focused towards the
cause. This all made me change my attitude.
Instance Where my attitude remained same -
Based on the learnings from my experiences in past I believed that people in politics are not
good at heart. Politicians should ideally be social worker and should have a motive of public
welfare but noboday remember their promises once elected. I always had this image of politicans
in mind. A lot of people tried to convince me that new breed of politicans are good and not
greedy but I remained and still firm on my attitude that all politicans are not good people.
Reasons behind my attitude -
This attitude had been built over a period of time. There is no substantial argument against my
attitude which can make me think. This is why I still beleive that none of the politician is good
person..
All answers must be in your own wordsProvide a good, understandabl.pdfflashfashioncasualwe
All answers must be in your own words
Provide a good, understandable definition of the following 40, using your own words (do not
simply copy words from the book).
Retaliation Blood feud
Vendetta Civil death
Inquisition Corporal punishment
Brank Criminology
Mamertine Prison Sanctuary
Bridewell Jail fever
Age of Enlightenment Classical School of Criminology
Workhouse Gaols
Banishment Transportation
Hulks Penitentiary
Pennsylvania System Outside cell
Inside cell Eastern Penitentiary
Auburn System Cell block
Congregate system System of silence
Lockstep formation Prison stripes
Treadmill Solitary confinement
Indeterminate sentence Irish system
Reformatory Industrial prison
Alcatraz Lock psychosis
Convict bogey Ombudsman
Ticket of Leave
Solution
Retaliation – In the event of attack by the enemy, do the fierce counter attack from our side.
Blood feud – It is lengthy fighting in the families going on for the generations. It involves killing
of various members of the families. Vendetta – Person whose relative has been killed seeks
revenge from the murderer. Civil death – It is the loss of the civil rights which is the result of act
of government in the some of conviction of civil people. Inquisition – Out of curiosity asking
many question on the related topic. Corporal punishment – It is the type of punishment which
involves physical pain. It involves mutilation, flogging branding etc. Brank – It is the birdcage-
like instrument put on prisonr’s head with sharp plates that would cut tongues and mouths once
involved in the gossips Criminology – This is the branch of science which involves study of
crime and criminals. Mamertine Prison – In the early age in the Rome confinement are under the
main sewers where survival is very difficult even for few days.. Sanctuary – It means taking
shelter or refuge from the danger or pursuit. Bridewell – It is called for city jail or reform center
or jail for pity offender. Jail fever – It is the former name to the typhus. It is commonly occurred
in the jail so got he name from its origin. Age of Enlightenment – European politics, philosophy,
science and communications were radically reoriented during beginning of the 18th century and
then throughout of the 18th century. This period is known as Age of Enlightenment. Classical
School of Criminology – It is the body of thought which understands the nature of crime and
suggests the best form of punishment to the crime. Looking at the severity of the punishment in
the early 18th century philosopher come up with this type of thoughts. Workhouse – It is the
place where unemployed people who can not support themselves were given shelter and
employment. Gaols – It the synonym to the jail. It is the place of confinement to the criminals.
Banishment – As an act of punishment offender are sent away from the designated place or
country known as banishment. Transportation – It is the act of movement of goods or people
from one place to another place. Hulks – It is an old ship whi.
C programming tweak needed for a specific program.This is the comp.pdfflashfashioncasualwe
C programming tweak needed for a specific program.
This is the complete program up and running. except for one modification that my teacher is
requiring but it is confusing me.
The program needs to allocate disjoint memory and use that.
right now im allocating a continous block of memory on the heap but I need it to do disjoing
memory instead.
// Purpose: Program will allow a reseller to save their sales and calculate their profits.
// Also able to view highest profitable items and remove any sales they no longer want in their
sales inventory.
#define _CRT_SECURE_NO_WARNINGS
#include
#include
#include
#define PAUSE system(\"pause\")
#define CLS system(\"cls\");
//#define FLUSH fflush(stdin);
//////////////// SRUCTS BELOW //////////////////////////
typedef struct
{
char itemName[40];
float purchasePrice;
float soldPrice;
float shippingPrice;
float ebayFee;
float payPalFee;
float profit;
}SALES;
////////// FUNCTION PROTOTYPE BELOW /////////////
void addSale(SALES *Inventory, int *InventoryCounter);
void displayMenu(int *InventoryCounter);
void displayProfit(int *InventoryCounter, SALES *Inventory);
void displaySales(int *InventoryCounter, SALES *Inventory);
int getChoice(int *InventoryCounter);
void searchSale(SALES* Inventory, int InventoryCounter);
void sortProfits(SALES* Inventory, int InventoryCounter);
void removeSale(SALES* Inventory, int *InventoryCounter);
main() {
int SIZE;
int userChoice;
int InventoryCounter = 0;
//printf(\"*********************\ \");
//printf(\"* Welcome Reseller! *\ \");
//printf(\"*********************\ \");
printf(\"Enter the size of todays inventory:\");
scanf(\"%i\", &SIZE);
SALES *Inventory;
Inventory = calloc(SIZE, sizeof(SALES));//Using dynamic memory to allocate space on the
heap
do {
userChoice = getChoice(&InventoryCounter);
switch (userChoice) {
case 1:// Add a Sale
if (InventoryCounter == SIZE) // statement checks so we dont exceed the size of the
inventory user wants to enter.
{
printf(\"You Have Reached Max Inventory \ \");
PAUSE;
}
else {
addSale(&(Inventory[InventoryCounter]), &InventoryCounter);
}
break;
case 2: // Display all sales records
displaySales(&InventoryCounter, Inventory);
PAUSE;
break;
case 3: // Display all profits
sortProfits(Inventory, InventoryCounter);
displayProfit(&InventoryCounter, Inventory);
PAUSE;
break;
case 4: // Display Inventory
searchSale(Inventory, InventoryCounter);
break;
case 5:// remove a sale
removeSale(Inventory, &InventoryCounter);
break;
case 6: // Quit
break;
default:
printf(\"Please choose a valid option\ \");
PAUSE;
break;
}// end of switch
} while (userChoice != 6);
free(Inventory);
} // End of main
//////////////////////////////////////////// FUNCTIONS BELOW //////////////////////////////////////////////////
void addSale(SALES *Inventory, int *InventoryCounter)// Function that adds sale and
calculates the fees in the background.
{
float payPalFee = 0; // variable to store the paypal fee from 1 sale
float ebayFee = 0; // variable to store ebay fee for 1 sale.
Add to BST.java a method height() that computes the height of the tr.pdfflashfashioncasualwe
Add to BST.java a method height() that computes the height of the tree. Develop two
implementations: a recursive method (which takes linear time and space proportional to the
height), and method like size() that adds a field to each node in the tree (and takes linear space
and constant time per query)
Solution
Answer:
/*BST.java a method height() that computes the height of the tree. Developing two
implementations: a recursive method, and method like size() that adds a field to each node in the
tree **/
public class SplayBST, Value> {
private Node root; // root of the BST
// BST helper node data type
private class Node {
private Key key; // key
private Value value; // associated data
private Node left, right; // left and right subtrees
public Node(Key key, Value value) {
this.key = key;
this.value = value;
}
}
public boolean contains(Key key) {
return get(key) != null;
}
// return value associated with the given key
// if no such value, return null
public Value get(Key key) {
root = splay(root, key);
int cmp = key.compareTo(root.key);
if (cmp == 0) return root.value;
else return null;
}
/*
* Splay tree insertion.
**/
public void put(Key key, Value value) {
// splay key to root
if (root == null) {
root = new Node(key, value);
return;
}
root = splay(root, key);
int cmp = key.compareTo(root.key);
// Insert new node at root
if (cmp < 0) {
Node n = new Node(key, value);
n.left = root.left;
n.right = root;
root.left = null;
root = n;
}
// Insert new node at root
else if (cmp > 0) {
Node n = new Node(key, value);
n.right = root.right;
n.left = root;
root.right = null;
root = n;
}
// It was a duplicate key. Simply replace the value
else {
root.value = value;
}
}
/*
* Splay tree deletion.
**/
/*
*This splays the key, then does a slightly modified Hibbard deletion on the root (if it is the node
to be deleted, if it is not, the key was not in the tree).
*The modification is that rather than swapping the root (call it node A) with its successor, it\'s
successor (call it Node B) is moved to the root position
*by splaying for the deletion key in A\'s right subtree. Finally, A\'s right child is made the new
root\'s right child.
*/
public void remove(Key key) {
if (root == null) return; // empty tree
root = splay(root, key);
int cmp = key.compareTo(root.key);
if (cmp == 0) {
if (root.left == null) {
root = root.right;
}
else {
Node x = root.right;
root = root.left;
splay(root, key);
root.right = x;
}
}
// else: it wasn\'t in the tree to remove
}
/*
* Splay tree function.
**/
// splay key in the tree rooted at Node h. If a node with that key exists,
// it is splayed to the root of the tree. If it does not, the last node
// along the search path for the key is splayed to the root.
private Node splay(Node h, Key key) {
if (h == null) return null;
int cmp1 = key.compareTo(h.key);
if (cmp1 < 0) {
// key not in tree, so we\'re done
if (h.left == null) {
return h;
}
int cmp2 = key.compareTo(h.left.key);
if (cmp2 < 0) {
h.left.left = splay(h.left.left, key);
h = rot.
Write an awareness objective for a newly formed adolescent chemical .pdfflashfashioncasualwe
Write an awareness objective for a newly formed adolescent chemical dependency program
whose target market consists of judeges and social workers who refer to the facility. How would
this objective change for the trial level of the hierarchy of effects?
Solution
Answer:
The objectives are:
1. To create primary level awareness to the people who uses this service frequently and also
those who refer our facility,
2. To find out the ways to help people in different situations and making an sustainable
ecosystem.
This objective (twin objectives) would become altered in case of implementation of them in real
situation..
which of these prokaryotes are most likely to be found in the immedi.pdfflashfashioncasualwe
which of these prokaryotes are most likely to be found in the immediate vicinity of active deep-
sea vents?
a) cynobacteria
b)archaea
c)aerobically respiring bacteria
d)bacteria adapted to being embedded in ice
Solution
The answer is Archaea
as they are the thermophilic anaerobes which do not depend on oxygen for survival..
2. Why is only one end point observed for citric acid even though it .pdfflashfashioncasualwe
2. Why is only one end point observed for citric acid even though it is a triprotic acid?
Solution
Citric acid has three relatively similar dissociation constants, but instead of giving three (or at
least two) separate end points, it has , only one end point at which buffering effect of the first and
second dissociation steps doesn\'t allow for fast rise of pH. Hence it has only one end point..
10. Benefits and costs of International Trade Search for a newspap.pdfflashfashioncasualwe
10. Benefits and costs of International Trade : Search for a newspaper article from any English
newspaper that discusses the advantages or disadvantages of international trade. Copy and paste
the weblink into this Forum and discuss one or two main points of the article. Please give
detailed answer with examples and elaborations.
Solution
The web is a awesome invention. Since of its introduction into schooling and its availability to
just about any individual, the world will mainly never be the identical.
Persons of all a while can go surfing 24/7 looking for something they want. The elderly woman
who\'s unable to drive can log onto the web and shop for groceries, fill a prescription or even
chat together with her grandchildren via web cam.
Collectors now not have got to scour flea markets and yard revenue on weekends to find coveted
gadgets so as to add to their collections all they need to do is go browsing to Ebay and publish a
bid. Something can be purchased on line now. Garb, jewellery, furniture...Even take-out.
As a instructor i\'ve discovered the web to be extremely valuable in planning classes. The web
has a plethora of websites created in particular for lecturers to share suggestions, change
information, and share records (thanks enotes!). Probably young people stand to gain the most
from making use of the web. Additionally to being in a position to express themselves and show
creativity on websites like MySpace and Twitter, they can also use the web for school tasks and
homework.
Still, for every pro, there is a con. I feel that scholars regularly count too much in the internet.
They do not look to have an understanding of that simply considering the fact that some thing is
on Google, that does not make it a riskless supply. I are not able to depend the number of
occasions a scholar has became in an essay that includes unsuitable data from web sites which
were created with the aid of any person who is not an authority on the topic.
Chat rooms have emerge as the brand new playground for sexual predators. The web gives them
the anonymity they have got to entice unsuspecting youngsters into inappropriate conversations
and in some circumstances meeting up with them. There are laws that preserve predators far
from parks and schools, however none retaining them off the web.
With out suitable supervision, kids can accidentally go online to pornographic web pages. Even
adults can fall prey to identity theft and stolen passwords if they don\'t seem to be careful about
the matters they are downloading onto their laptop.
Advantages and drawbacks of web use amongst kids and adults can be considered from quite a
lot of angles - objectively, or subjectively. If a individual is in favor of science, then he/she
would find extra advantages than negative aspects for its use. However, if a man or woman
believes in guide work and that technology could one day be used to replace human work, then
the he/she may just view web use to be more damaging than .
Why does the pattern in a shift register shift only one bit position.pdfflashfashioncasualwe
Why does the pattern in a shift register shift only one bit position each time it is clocked?
please no hand written answers
Solution
Beacuse if we move all bits at a time there will be no buffers to store the bits temporarily and
then shift the data to next position for each bit.
Hence , first Least significant bit(LSB) is moved out the the others follow for each step upto the
MSB most significant bit is moved by one bit position..
Use the Internet to identify three network firewalls, and create a t.pdfflashfashioncasualwe
Use the Internet to identify three network firewalls, and create a table that compares their
features. Note if they are rule-based or settings-based, perform stateless or stateful packet
filtering, what additional features they include (IDS, content filtering, and so on), their costs, and
so on.
Solution
Below is the table :
Firewall Capability
Packet Filters
Application-layer Gateways
Stateful Inspection
Communication Information
Partial
Partial
Yes
Communication-derived State
No
Partial
Yes
Application-derived State
No
Yes
Yes
Information Manipulation
Partial
Yes
Yes
If you take packet filters, for example, historically they are implemented on routers, are filters on
user defined content, such as IP addresses. packet filters examine a packet at the network layer
and are application independent, which allows them to deliver good performance and
scaleability. However, they are the least secure type of firewall, especially when filtering
services such as FTP.
As with application gateways, he security is improved by examining all application layers,
bringing context information into the decision process. However, they do this by breaking the
client/server model. Every client/server communication requires two connections: one from the
client to the firewall and one from the firewall to the server. In addition, each proxy requires a
different application process, or daemon, making scaleability and support for new applications a
problem.
The Stateful Inspection introduced by Check Point overcomes the limitations of the previous two
approaches by providing full application-layer awareness without breaking the client/server
model. With Stateful Inspection, the packet is intercepted at the network layer. It extracts state-
related information required for the security decision from all application layers and maintains
this information in dynamic state tables for evaluating subsequent connection attempts. This
provides a solution which is highly secure and offers maximum performance, scaleability, and
extensibility.
Firewall Capability
Packet Filters
Application-layer Gateways
Stateful Inspection
Communication Information
Partial
Partial
Yes
Communication-derived State
No
Partial
Yes
Application-derived State
No
Yes
Yes
Information Manipulation
Partial
Yes
Yes.
To vaccinate or not to vaccinate Is the influenza Virus vaccine Saf.pdfflashfashioncasualwe
To vaccinate or not to vaccinate: Is the influenza Virus vaccine Safe? Who should be
vaccinated? Are you planning to get a flu-shot? Are you going to encourage your family
members to get a flu-shot?
Solution
Influenza is the respiratory illness caused by influenza virus.This virus can cause mild to severe
illness and finally leads to death. So inorder to avoid such a bad condition,vaccination should be
done for our body for every 6 months or atleast once in a year. Influenza is also known as \"flu\"
which infects the respiratory tract ie., nose,throat and lungs.The name of influenza vaccine is
also called as FLUZONE which saves us from influenza virus. Yes am planning to get a flu shot
because i dont want to risk my life by getting viral diseases and i also encourage my family
members to have a flu-shot because not only myself, i also want my family members to say away
from viral diseases. So i suggest my family members to have a flu-shot for every 6 months or
once in a year..
Synthetic Fiber Construction in lab .pptxPavel ( NSTU)
Synthetic fiber production is a fascinating and complex field that blends chemistry, engineering, and environmental science. By understanding these aspects, students can gain a comprehensive view of synthetic fiber production, its impact on society and the environment, and the potential for future innovations. Synthetic fibers play a crucial role in modern society, impacting various aspects of daily life, industry, and the environment. ynthetic fibers are integral to modern life, offering a range of benefits from cost-effectiveness and versatility to innovative applications and performance characteristics. While they pose environmental challenges, ongoing research and development aim to create more sustainable and eco-friendly alternatives. Understanding the importance of synthetic fibers helps in appreciating their role in the economy, industry, and daily life, while also emphasizing the need for sustainable practices and innovation.
How to Make a Field invisible in Odoo 17Celine George
It is possible to hide or invisible some fields in odoo. Commonly using “invisible” attribute in the field definition to invisible the fields. This slide will show how to make a field invisible in odoo 17.
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdfTechSoup
In this webinar you will learn how your organization can access TechSoup's wide variety of product discount and donation programs. From hardware to software, we'll give you a tour of the tools available to help your nonprofit with productivity, collaboration, financial management, donor tracking, security, and more.
Francesca Gottschalk - How can education support child empowerment.pptxEduSkills OECD
Francesca Gottschalk from the OECD’s Centre for Educational Research and Innovation presents at the Ask an Expert Webinar: How can education support child empowerment?
Macroeconomics- Movie Location
This will be used as part of your Personal Professional Portfolio once graded.
Objective:
Prepare a presentation or a paper using research, basic comparative analysis, data organization and application of economic information. You will make an informed assessment of an economic climate outside of the United States to accomplish an entertainment industry objective.
The Roman Empire A Historical Colossus.pdfkaushalkr1407
The Roman Empire, a vast and enduring power, stands as one of history's most remarkable civilizations, leaving an indelible imprint on the world. It emerged from the Roman Republic, transitioning into an imperial powerhouse under the leadership of Augustus Caesar in 27 BCE. This transformation marked the beginning of an era defined by unprecedented territorial expansion, architectural marvels, and profound cultural influence.
The empire's roots lie in the city of Rome, founded, according to legend, by Romulus in 753 BCE. Over centuries, Rome evolved from a small settlement to a formidable republic, characterized by a complex political system with elected officials and checks on power. However, internal strife, class conflicts, and military ambitions paved the way for the end of the Republic. Julius Caesar’s dictatorship and subsequent assassination in 44 BCE created a power vacuum, leading to a civil war. Octavian, later Augustus, emerged victorious, heralding the Roman Empire’s birth.
Under Augustus, the empire experienced the Pax Romana, a 200-year period of relative peace and stability. Augustus reformed the military, established efficient administrative systems, and initiated grand construction projects. The empire's borders expanded, encompassing territories from Britain to Egypt and from Spain to the Euphrates. Roman legions, renowned for their discipline and engineering prowess, secured and maintained these vast territories, building roads, fortifications, and cities that facilitated control and integration.
The Roman Empire’s society was hierarchical, with a rigid class system. At the top were the patricians, wealthy elites who held significant political power. Below them were the plebeians, free citizens with limited political influence, and the vast numbers of slaves who formed the backbone of the economy. The family unit was central, governed by the paterfamilias, the male head who held absolute authority.
Culturally, the Romans were eclectic, absorbing and adapting elements from the civilizations they encountered, particularly the Greeks. Roman art, literature, and philosophy reflected this synthesis, creating a rich cultural tapestry. Latin, the Roman language, became the lingua franca of the Western world, influencing numerous modern languages.
Roman architecture and engineering achievements were monumental. They perfected the arch, vault, and dome, constructing enduring structures like the Colosseum, Pantheon, and aqueducts. These engineering marvels not only showcased Roman ingenuity but also served practical purposes, from public entertainment to water supply.
Biological screening of herbal drugs: Introduction and Need for
Phyto-Pharmacological Screening, New Strategies for evaluating
Natural Products, In vitro evaluation techniques for Antioxidants, Antimicrobial and Anticancer drugs. In vivo evaluation techniques
for Anti-inflammatory, Antiulcer, Anticancer, Wound healing, Antidiabetic, Hepatoprotective, Cardio protective, Diuretics and
Antifertility, Toxicity studies as per OECD guidelines
Model Attribute Check Company Auto PropertyCeline George
In Odoo, the multi-company feature allows you to manage multiple companies within a single Odoo database instance. Each company can have its own configurations while still sharing common resources such as products, customers, and suppliers.
Develop an inventory management system for an electronics store. The .pdf
1. Develop an inventory management system for an electronics store. The inventory system should
have the following functionalities .BuildInventory: reada text file containing electronics products
information and store them in an array of pointers .Shownventory display all inventory items
.ShowDefectInventory: display inventory items that are defective Terminate: to save cument
inventory to a text file This lab assignment illustrates the following concepts: -Text file readings
and writings .Arrays of pointers and dynamic memory allocations with new and delete
Inheritance .C++ type casting: static cast Class Design You need at least three classes class
Inventory System: (minimum implementation specified below). This class stores Inyentoryltem
objects (which are in fact Inventory item base class pointers to derived Product objects and
member functions to manipulate those Product objects as shown below. .Private data members
Store Name Store ID ltem List (array of pointers to Inventory Item objects, max of 512) ltem
Count (tracking how many items are currently stored in the array) .Constructors (initialize all
pointers in the array to NULL in addition to what's described below .Default constructor: set
data members to 0 (for integers), 0.0 (for float/double), or NULL (for pointers) as appropriate.
Also invoke this function to initialize a seed for the random generator srand (time (NULL), (to
be used later by Product class to genearte random values for Product ID. See Code Helper
section at the end of the lab specs.) .Non-default constructor: taking a string for store name, an
integer for store ID. Call srand as shown above Destructor: de-allocate dynamic memory in the
amay off pointers (up to Item Count elements) .Public member functions: BuildInventory: read a
text file containing Product records (one Product per line), dynamically allocate Product objects
and store the objects in the array ItemList (an array of Inventoryltem pointers). It should also
update Item Count as needed Shownventory: display all Products in the inventory. Output must
be properly formatted and aligned (usingfield with and floating data with 2 digits after decimal
point). Note that if you invoke the Display function using the pointers from the array only Invent
tem (base objec) information will be displayed. Extra work is needed to properly display
Products (derived objects) information ntory: display only defective Products Terminate: iterate
thru the array of pointers to write Product objects in the array to a text file in the same format as
they were read in. You may use a different file name for wniting .mutator cessors for store name,
store id, and item count
Solution
/*
import com.incors.plaf.*;
import com.incors.plaf.kunststoff.*;