Computer Science 2023 Your Program Must Consist Of At Least Four (4) Source Files

2023 Your program must consist of at least four 4 source files two | Assignment Collections

Your program must consist of at least four (4) source files – two .h files and two .cpp files. Each major class must be described in a separate .h file. There must be no implementation code in the .h files – they should consist solely of declarations. There must be (at least) one .cpp file corresponding to each .h file – they should contain the definition

Write a program to help a local stock trading company automate its systems. The company invests only in the stock market. At the end of each trading day, the company would like to generate and post the listing of its stocks so that investors can see how their holdings performed that day. We assume that the company invests in, say, 10 different stocks. The desired output is to produce two listings, one sorted by stock symbol and another sorted by percent gain from highest to lowest.

The input data is provided in a file in the following format:

symbol openingPrice closingPrice todayHigh todayLow prevClose volume

For example, the sample data is:
MSMT 112.50 115.75 116.50 111.75 113.50 6723823
CBA 67.50 75.50 78.75 67.50 65.75 378233

The first line indicates that the stock symbol is MSMT, today’s opening price was 112.50, the closing price was 115.75, today’s high price was 116.50, today’s low price was 111.75, yesterday’s closing price was 113.50, and the number of shares currently being held is 6723823.

The listing sorted by stock symbols must be of the following form:

Develop this programming exercise in two steps. In the first step (part a), design and implement a stock object. In the second step (part b), design and implement an object to maintain a list of stocks.

Part a:
(Stock Object) Design and implement the stock object. Call the class that captures the various characteristics of a stock object stockType.
The main components of a stock are the stock symbol, stock price, and number of shares. Moreover, we need to output the opening price, closing price, high price, low price, previous price, and the percent gain/loss for the day. These are also all the characteristics of a stock. Therefore, the stock object should store all this information.
Perform the following operations on each stock object:
1. Set the stock information.
2. Print the stock information.
3. Show the different prices.
4. Calculate and print the percent gain/loss.
5. Show the number of shares.
~the natural ordering of the stock list is by stock symbol. Overload the relational operators to compare two stock objects by their symbols.
~ Overload the insertion operator, < ~Because the data is stored in a file, overload the stream extraction operator, >>, for easy input.

For example, suppose infile is ifstream object and the input file was opened using the object infile. Further supppose that myStock is a stock object. Then the statement:
infile >>myStock;

read the data from the input file and stores it in the object myStock. (Note that this statement reads and stores the data in the relevant components of myStock.)

Part B:
Now that you have designed and implemented the class stockType to implement a stock object in a program, it is time to create a list of stock objects.

Let us call the class to implement a list of stock objects stockListType.

The class stockListType must be derived from the class listType, which you designed and implemented in the previous exercise. However, the class stockListType is a very specific class, designed to create a list of stock objects. Therefore, the class stockListType is no longer a template.

Add and/or overwrite the operations of the class listType to implement the necessary operations on a stock list.

The following statement derives the class stockListType from the class listType.

class stockListType:public listType
{
member list
};

The member variables to hold the list elements, the length of the list and the max listSize were declared as protected in the class listType. Therefore, these members can be directly accessed in the class stockListType.

Because the company also requires you to produce the list ordered by the percent gain/loss, you need to sort the stock list by this component. However, you are not to physically sort the list by the component percent gain/loss. Instead, you will provide a logical ordering with respect to this component.

To do so, add a member variable, an array, to hold the indices of the stock list ordered by the component percent gain/loss. Call this array sortIndicesGainLoss. When printing the list ordered by the component percent gain/loss, use the array sortIndicesGainLoss to print the list. The elements of the array sortIndicesGainLoss will tell which component of the stock list to print next.

Part C:
Write a program that uses these two classes to automate the company’s analysis of stock data!

 

 

 

We give our students 100% satisfaction with their assignments, which is one of the most important reasons students prefer us to other helpers. Our professional group and planners have more than ten years of rich experience. The only reason is that we have successfully helped more than 100000 students with their assignments on our inception days. Our expert group has more than 2200 professionals in different topics, and that is not all; we get more than 300 jobs every day more than 90% of the assignment get the conversion for payment.

Place Order Now

Computer Science 2023 A+ Work

2023 In this project you will create a Web page with an animation of a man using a jackhammer | Assignment Collections

In this project, you will create a Web page with an animation of a man

using a jackhammer. Your Exercises folder for Chapter 10 contains 11 images that are required for this program: jackhammer0.gif through jackhammer10.gif.

1. Create a new document in your text editor.

2. Type the <!DOCTYPE> declaration, <html> element, header information, and the <body> element. Use the strict DTD and Jackhammer as the content of the <title> element.

3. Add the following script section to the document head:

<script type=”text/javascript”>

/* <![CDATA[ */

/* ]]> */

</script>

4. Add the following text and elements to the document body. The text and elements include an <img> element to display the image, and a form with buttons that controls the animation.

<h1>Jackhammer Man</h1>

<p><img src=”jackhammer1.gif” height=”113″ width=”100″

alt=”Image of a man with a jackhammer.” /></p>

<form action=”” enctype=”text/plain”><p>

<input type=”button”

value=”Start Bouncing”

onclick=”startBouncing();” />

<input type=”button” value=”Stop Bouncing”

onclick=”clearInterval(begin);” /></p>

</form>

5. Add the following variable declarations to the script section:

 

var jackhammers = new Array(11);

var curJackhammer = 0;

var direction;

var begin;

jackhammers[0] = “jackhammer0.gif”;

jackhammers[1] = “jackhammer1.gif”;

jackhammers[2] = “jackhammer2.gif”;

jackhammers[3] = “jackhammer3.gif”;

jackhammers[4] = “jackhammer4.gif”;

jackhammers[5] = “jackhammer5.gif”;

jackhammers[6] = “jackhammer6.gif”;

jackhammers[7] = “jackhammer7.gif”;

jackhammers[8] = “jackhammer8.gif”;

jackhammers[9] = “jackhammer9.gif”;

jackhammers[10] = “jackhammer10.gif”;

6. Now add the following functions to the script section, which

control the animation:

function bounce() {

    if (curJackhammer == 10)

        curJackhammer = 0;

    else

        ++curJackhammer;

document.getElementsByTagName(

“img”)[0].src

        = jackhammers[curJackhammer].src;

    if (curJackhammer == 0)

        direction = “up”;

    else if (curJackhammer == 10)

        direction = “down”;

    document.getElementsByTagName(

        “img”)[0].src 

        = jackhammers[curJackhammer];

}

function startBounce

function startBouncing() {

    if (begin)

        clearInterval(begin);

    begin = setInterval(“bounce()”,90);

}

 

7. Save the document as Jackhammer.html in your Exercises folder for Chapter 10, and validate it with the W3C Markup Validation Service. Once the document is valid, open it in your Web browser and test the animation buttons.

 

We give our students 100% satisfaction with their assignments, which is one of the most important reasons students prefer us to other helpers. Our professional group and planners have more than ten years of rich experience. The only reason is that we have successfully helped more than 100000 students with their assignments on our inception days. Our expert group has more than 2200 professionals in different topics, and that is not all; we get more than 300 jobs every day more than 90% of the assignment get the conversion for payment.

Place Order Now

Computer Science 2023 1 Case Study And 2 Discussions

2023 Discussion 5 1 How does a Clip function differ from Select By Location Discussion 5 2 List three different | Assignment Collections

Discussion 5.1

How does a Clip function differ from Select By Location?

Discussion 5.2

List three different methods for creating new GIS data

Case Study 5.1

Read “How Supply Chain Management Problems Killed Target Canada” (see attached file)

Answer the questions

Please use this strategy when you analyze a case:

  1. Identify and write the main issues found discussed in the case (who, what, how, where and when (the critical facts in a case).
  2. List all indicators (including stated “problems”) that something is not as expected or as desired.
  3. Briefly analyze the issue with theories found in your textbook or other academic materials. Decide which ideas, models, and theories seem useful. Apply these conceptual tools to the situation. As new information is revealed, cycle back to sub steps a and b.
  4. Identify the areas that need improvement (use theories from your textbook)
    • Specify and prioritize the criteria used to choose action alternatives.
    • Discover or invent feasible action alternatives.
    • Examine the probable consequences of action alternatives.
    • Select a course of action.
    • Design and implementation plan/schedule.
    • Create a plan for assessing the action to be implemented.
  5. Conclusion (every paper should end with a strong conclusion or summary)

Writing Requirements

  • 3–5 pages in length  (excluding cover page, abstract, and reference list)
  • APA format, Use the APA template located in the Student Resource Center to complete the assignment.
  • Please use the Case Study Guide as a reference point for writing your case study.

 

We give our students 100% satisfaction with their assignments, which is one of the most important reasons students prefer us to other helpers. Our professional group and planners have more than ten years of rich experience. The only reason is that we have successfully helped more than 100000 students with their assignments on our inception days. Our expert group has more than 2200 professionals in different topics, and that is not all; we get more than 300 jobs every day more than 90% of the assignment get the conversion for payment.

Place Order Now

Computer Science 2023 Ethical Hacking

2023 1 Describe some ways that an administrator can harden a system on a network An initial post | Assignment Collections

 1.) Describe some ways that an administrator can harden a system on a network.

An initial post must be between 250-300 words

2.) Research the variety of enumeration tools available. Select one tool and explain what it does, how it works and what type of information it extracts (example: Softerra LDAP Browser is the industry-leading software for browsing and analyzing LDAP directories. It provides a wide variety of features for handy viewing of directory contents, getting information about directory infrastructure and objects.)

 

We give our students 100% satisfaction with their assignments, which is one of the most important reasons students prefer us to other helpers. Our professional group and planners have more than ten years of rich experience. The only reason is that we have successfully helped more than 100000 students with their assignments on our inception days. Our expert group has more than 2200 professionals in different topics, and that is not all; we get more than 300 jobs every day more than 90% of the assignment get the conversion for payment.

Place Order Now

Computer Science 2023 Discussion

2023 One of the three main tenants of information security is availability It is | Assignment Collections

 

One of the three main tenants of information security is availability. It is also one of the least thought about. Explain the importance of availability? Do you believe it should be more important than the other two tenants (confidentiality/integrity)? Why is it important to know the value of your data when it comes to availability?  

Requirements:

Initial posting by Wednesday

Reply to at least 2 other classmates by Sunday (Post a response on different days throughout the week)

Provide a minimum of 3 references on the initial post and on any response posts.

Proper APA Format (References & Citations)/No plagiarism

 

We give our students 100% satisfaction with their assignments, which is one of the most important reasons students prefer us to other helpers. Our professional group and planners have more than ten years of rich experience. The only reason is that we have successfully helped more than 100000 students with their assignments on our inception days. Our expert group has more than 2200 professionals in different topics, and that is not all; we get more than 300 jobs every day more than 90% of the assignment get the conversion for payment.

Place Order Now

Computer Science 2023 AVD Raj A

2023 Please go through instructions carefully In the 1st document I need the outline covering all the Professor s requirements In | Assignment Collections

Please go through instructions carefully

In the 1st document, I need the outline covering all the Professor’s requirements.

In the 2nd document, I need the research paper covering all the Professor’s requirements.

Outline for Assignment 1

Using the research guide and the assignment 1 instructions, develop your outline. Submit the outline in an MS Word document file type. Utilize the standards in APA 7 for all citations or references in the outline. Ensure that the document includes your name. Do not include your student identification number. You may use the cover page from the student paper template, but it is not required. The assignment 1 instructions are at the bottom of this content folder.

Submit your outline on or before the due date.

By submitting this paper, you agree:

(1) that you are submitting your paper to be used and stored as part of the SafeAssign™ services in accordance with the Blackboard Privacy Policy;
(2) that your institution may use your paper in accordance with UC's policies; and
(3) that the use of SafeAssign will be without recourse against Blackboard Inc. and its affiliates.

 

We give our students 100% satisfaction with their assignments, which is one of the most important reasons students prefer us to other helpers. Our professional group and planners have more than ten years of rich experience. The only reason is that we have successfully helped more than 100000 students with their assignments on our inception days. Our expert group has more than 2200 professionals in different topics, and that is not all; we get more than 300 jobs every day more than 90% of the assignment get the conversion for payment.

Place Order Now

Computer Science 2023 E-activity

2023 From the e Activity choose the two 2 performance counters you consider most important to monitor regularly and predict two | Assignment Collections

From the e-Activity, choose the two (2) performance counters you consider most important to monitor regularly, and predict two (2) critical issues that can occur for each if they aren’t. Provide support for each of your predictions.

 
•Differentiate between the conditions that would be appropriate for implementing agent monitoring and the conditions under which agentless monitoring would be a better choice. Provide at least two (2) specific examples that illustrate the major differences between the two (2).

 

We give our students 100% satisfaction with their assignments, which is one of the most important reasons students prefer us to other helpers. Our professional group and planners have more than ten years of rich experience. The only reason is that we have successfully helped more than 100000 students with their assignments on our inception days. Our expert group has more than 2200 professionals in different topics, and that is not all; we get more than 300 jobs every day more than 90% of the assignment get the conversion for payment.

Place Order Now

Computer Science 2023 Security 8

2023 Task 1 Some organizations prohibit workers from bringing certain kinds of devices into the workplace | Assignment Collections

Task 1:

 

Some organizations prohibit workers from bringing certain kinds of devices into the workplace, such as cameras, cell phones, and USB drives. Some businesses require employees to use clear or see-through backpacks when carrying personal items. What other devices might not be allowed in certain facilities, and why would they be restricted? The video on Google’s Data Center may give you some ideas to write about for this assignment.

Your written assignment should consist of 2-3 paragraphs.

Attach a word document.

Task 2:

 

Do the following review questions:

  • 8.1 What is the difference between RFC 5321 and RFC 5322?
  • 8.2 What are the SMTP and MIME standards?
  • 8.3 What is the difference between a MIME content type and a MIME transfer encoding?
  • 8.4 Briefly explain base64 encoding.
  • 8.5 Why is base64 conversion useful for an e-mail application?
  • 8.6 What is S/MIME?
  • 8.7 What are the four principal services provided by S/MIME?
  • 8.8 What is the utility of a detached signature?
  • 8.9 What is DKIM?

Submit a Microsoft Word document under the Homework 8 Submission link.

 

We give our students 100% satisfaction with their assignments, which is one of the most important reasons students prefer us to other helpers. Our professional group and planners have more than ten years of rich experience. The only reason is that we have successfully helped more than 100000 students with their assignments on our inception days. Our expert group has more than 2200 professionals in different topics, and that is not all; we get more than 300 jobs every day more than 90% of the assignment get the conversion for payment.

Place Order Now

Computer Science 2023 Discussion – 3

2023 What are the benefits of deploying a VPN and what are their | Assignment Collections

 What are the benefits of deploying a VPN and what are their limitations? Please provide an example. (see page.85)

 2 Pages 

No Plagrism

Minimum 5 citations

  • Use  only academic sources– these are sources that are published  in academic journals (e.g. journal of business management, journal of  international business, journal of technology etc.) 
  • When citing a source in your paragraphs it should be done in this manner:  Stewart (2017) noted, stated, explained…. and use sources that are published after 2013.
  •  Use the attached DQ template for all your post 

 

We give our students 100% satisfaction with their assignments, which is one of the most important reasons students prefer us to other helpers. Our professional group and planners have more than ten years of rich experience. The only reason is that we have successfully helped more than 100000 students with their assignments on our inception days. Our expert group has more than 2200 professionals in different topics, and that is not all; we get more than 300 jobs every day more than 90% of the assignment get the conversion for payment.

Place Order Now

Computer Science 2023 Permutation

2023 Suppose we count a word as having 3 letters How many words can be made from the 26 letters in | Assignment Collections

 

Suppose we count a word as having 3 letters. How many “words” can be made from the 26 letters in the English alphabet? 

We know that this is permutation (order matters)  since “its” and “tis” are different words. Note the formula for permutations is n!(n−r)!n!(n−r)! using ‘n’ different things taken ‘r’ at a time

 

We give our students 100% satisfaction with their assignments, which is one of the most important reasons students prefer us to other helpers. Our professional group and planners have more than ten years of rich experience. The only reason is that we have successfully helped more than 100000 students with their assignments on our inception days. Our expert group has more than 2200 professionals in different topics, and that is not all; we get more than 300 jobs every day more than 90% of the assignment get the conversion for payment.

Place Order Now