Computer Science 2023 CIS 335 Week 2 ilab CIS335 Week 2 ilab

2023 Program files for the following program StudentGPAInfo CurrencyConversion At the beginning of | Assignment Collections

Program files for the following program

  1. StudentGPAInfo
  2. CurrencyConversion

At the beginning of all your programs, put a comment box that includes the program name, your name, and a brief description of the program.

Example:

/***********************************************************************
Program Name: ProgramName.java
Programmer’s Name: Student Name
Program Description: Describe here what this program will do
***********************************************************************/

How to submit your assignment:

  1. The programsmusthave the same names as the assignment title.
  2. Each Java source file (*.java) must include a corresponding class file (*.class) program as evidence of success.
  3. In addition to the program source code files and byte code files, put all your program source code files and screen shots of your program output files into a Word document.
  4. You must use a zipped folder to send your weekly assignment to the Dropbox. Do not send subfolders within your zipped folder. Place all of the .java and .class files for the week into the one zipped folder. The zip folder should be named CIS355A_YourLastName_iLab_Week2, and this zip folder will contain all the weekly programming assignments.

 

Required SoftwareEclipse

Access the software at https://lab.devry.edu. 
Steps: 1 and 2

 

Lab Steps

 

Step 1: StudentGPAInfo (20 points)

You will create a class to store information about a student’s courses and calculate their GPA.  Your GPA is based on the class credits and your grade.  Each letter grade is assigned a point value as follows:

A = 4 points 
B = 3 points 
C = 2 points 
D = 1 point

Therefore, an A in a 3 unit class is equivalent to 12 grade points (4 for the A times 3 unit class) 
A C in a 4 unit class is equivalent to 8 grade points (2 for the C times 4 unit class) 
This is a total of 20 grade points.  Your GPA is calculated by dividing the total grade points by the total class credits, so in this case:

20 grade points / 7 credits = 2.85 GPA

Create a class called StudentInfo that represents the following information (private data) about a student:

  •  Student name
  • Total grade points
  • Total credits

Create the following public member functions. (Note that the program may not require all functions to be used, but they should all exist for a complete class.)

Default constructor to initialize grade points and credits

setName                 Set value for name 

getName                 Returns the name

addClass                 receives as input the class units and grade, updates grade points and credits appropriately

getGPA                   Calculates and returns the GPA

displayStudent          Displays all info about student.  GPA should be displayed with 2 decimal places of precision  (i.e., 3.25).

Note that ONLY student name will be “set” from the outside.  The grade points and credits will be modified with the method addClass which takes as parameters the number of units for the class and the grade awarded.  This method then adds the appropriate grade points to the total, and also adds the credits to the total.

Write a program to test the class as shown below.  You should ask for the student’s name, then allow them to add multiple classes.  When done, display the GPA.  ALL INPUT SHOULD BE RECEIVED IN MAIN AND PASSED TO THE OBJECT. Use console input/output for this program (NOT JOptionPane).

Note that it will be easier to use String for the grade rather than char since Scanner does not have a method to easily return a char.  

Sample Output:

Enter Student name: Joe Smith 
Enter class credits: 3 
Enter letter grade: A 
Another class? y 
Enter class credits: 4 
Enter letter grade: C 
Another class? n 
Joe Smith, your GPA is 2.86 
Press any key to continue

Grading Rubric

Standard header included

1

Must contain program’s name, student name, and description of the program
Lab Report

4

Documents your design process and testing
StudentInfo class with required methods

10

Methods correctly implemented
GPATest class, which drives the application, is created

5

A driver class with the main method.  Input collected and passed to the object.  Output displayed correctly

 20

 

 

STEP 2: CurrencyConversion (20 points)

You must create a program named CurrencyConversion.java that converts money between the following currencies.

Given one of the three currencies (US Dollar, Yen, Euro), the program should convert the input amount into one of the other currencies. For example, if you input one (1) U.S. dollar, and you decide to convert that one dollar to a Euro, then the output should be .90.

This chart provides the codes to be used as input (JPY, EURO, USD) and the conversion factors.  

CURRENCY CURRENCY CODE YEN EURO USD

US Dollar

USD $1 = 123.14 $1 = .90 Euro ————

Yen

YEN ————- 1 Yen = .0073 Euro 1 Yen = $.0081

Euro

EURO 1 Euro = 136.08 Yen ————

1 Euro = $1.11

Note that Step 2 DOES NOT HAVE TO USE OOP.  Keep it simple. 

Note that you CANNOT test for equality between strings using ==.   
String color = “red”; 

THIS WILL NOT WORK:   
if (color == “red”) 

YOU MUST USE 
if (color.equals(“red”) 
Using the JOptionPane GUI, do the following.

Prompt the user for the currency code type.

Prompt the user for the amount of that currency.

Prompt the user for the currency code that the entered amount must be converted to.

Using the table above, the following formula was used to convert USD to EURO.

100.00 USD * .9 = 90.00 EURO

Display the results in a JOptionPane message box.

 

 1

Must contain program’s name, student name, and description of the program

 4

Documents design process and testing

 5

Use JOptionPane for input and output

 7

Uses logic and correct formula to compute results

 3

Gives error message, allows correction of invalid data

 20

 

We give our students 100% satisfaction with their assignments, which is one of the most important reasons students prefer us to other helpers. Our professional group and planners have more than ten years of rich experience. The only reason is that we have successfully helped more than 100000 students with their assignments on our inception days. Our expert group has more than 2200 professionals in different topics, and that is not all; we get more than 300 jobs every day more than 90% of the assignment get the conversion for payment.

Place Order Now

Computer Science 2023 The iPic

2023 The iPic Theater shows most popular new movies It keeps a database of movies | Assignment Collections

The iPic Theater shows most popular new movies. It keeps a database of movies that contains informationabout movies and their current week sale. iPic Theater also keeps a record of previous week’s sale for the SAME movies in a different database to compare sales for two weeks.

Write a Data Element class named Movie that holds the data for a movie.  There will be a movie title,rate (PG, PG13, R),10viewersreview (numbered 1-5) and the number of sold tickets for the current week.

 

Write a Data Manager Class named Movie Theater that holds a list of movies in an Array List. It also holds the average of reviews for each movie in a separate Array List. Note that average list is created at the same time when movies list is created.  This class will have methods to load movies information from a file and store it in an Array list as well as their average, find the list of movies with highest and lowest reviews and the total sale. It will also have a method to compare current sale for each movie with a previous sale and report the list of movies that their sale has been increased.

 

Write a GUI class that allows the user to load movies information from a file, show highest and lowest average review, compare sale and find total sale.

 

 

 

We give our students 100% satisfaction with their assignments, which is one of the most important reasons students prefer us to other helpers. Our professional group and planners have more than ten years of rich experience. The only reason is that we have successfully helped more than 100000 students with their assignments on our inception days. Our expert group has more than 2200 professionals in different topics, and that is not all; we get more than 300 jobs every day more than 90% of the assignment get the conversion for payment.

Place Order Now

Computer Science 2023 Email Foreincis

2023 Week 6 Discussion Email Forensics In Discussion Forum 5 post your response to the following discussion topic Reply | Assignment Collections

 

Week 6 Discussion: Email Forensics

In Discussion Forum 5, post your response to the following discussion topic. Reply to at least two classmates’ responses and shares informative URLs by the date indicated in the Course Calendar. Each student posts their discussion assignments in Word Format into the Week 6 Discussion #5.

Questions:

(1) Email has become a primary communication medium for many official activities. You learned about the process of email forensics. Discuss the email architecture, email identities, and data, and also describe email forensics investigation procedures and techniques.

Grading Rubric for Discussion Forum 5

  • Providing a comprehensive discussion of the topic: 25 percent
  • Justifying ideas and responses by using appropriate examples and references from texts, Web sites, other references, or personal experience and cited the sources in the correct: 25 percent
  • Commented on at least two of your classmates’ postings in a meaningful way (at least 100 words): 25 percent
  • Filling the number of required at least 200 words or more for the discussion: 25 percent

You should be actively engaging with weekly discussions by providing peer-to-peer feedback. You need to make at least two comments on the responses posted by your classmates. You should be writing your response/feedback/comments/question at least two students in your class. This is to see your performance in online discussion.

 

We give our students 100% satisfaction with their assignments, which is one of the most important reasons students prefer us to other helpers. Our professional group and planners have more than ten years of rich experience. The only reason is that we have successfully helped more than 100000 students with their assignments on our inception days. Our expert group has more than 2200 professionals in different topics, and that is not all; we get more than 300 jobs every day more than 90% of the assignment get the conversion for payment.

Place Order Now

Computer Science 2023 Program In Raptor Code And Pseudocode

2023 Need a Raptor Program and Pseudocode Price is Negotiable but I need ASAP Create a text based | Assignment Collections

 

Need a Raptor Program and Pseudocode. 

 

 

 

 Price is Negotiable but I need ASAP

 

 

 

Create a text based or GUI menu to perform the following functions

 

1.       Stopwatch which shows a start and stop time

 

2.       Fat calorie counter

 

3.       Food log

 

a.       Type

 

b.       Amount

 

c.       calories

 

4.       Exercise log per week

 

a.       Type

 

b.       Amount

 

c.       total

 

5.       Exercise Log per week/month

 

6.       Exit

 

The associated code with each menu item should be in modules/procedures to perform the task selected.  The fat calorie counter was the extra credit assigned during class.

 

 

 

Directions:

 

create your design in pseudocode and then code a RAPTOR program which generates output to the screenand a text file.  Submit a minimum of three files pseudocode, RAPTOR and Outputm using the following convention filling in the blank of the type filewith the title of the option you choose.

 

1.     “lastName firstName FINAL Option ___ pseudocode.txt”  (one file)

 

2.     “lastName firstName FINAL Option ___ RAPTOR.RAP”  (one file)

 

3.     “lastName firstName FINAL Option ___ output file.txt”  (May be one or multiple files)

 

4.     Optional Input file(s) -“lastName firstName FINAL Option ___ input file.txt” (May be one or multiple files)

 

You may program the FINAL RAPTOR program in either procedural or object-oriented style. 

 

Work on your own.  NO collaboration on the final.  Open book and notes are allowed. 

 

You may use the bubble sort, swap and search algorithms posted on the discussion board.

 

Mandatory inclusion:

 

a.     Block Header comment for each Module which includes main()

 

a.     Program Name;

 

b.     Program Description:

 

c.     Programmer Name:

 

d.     Revision History:

 

b.     Use camelCase naming convention when naming variables and Modules

 

c.     Prompts to user as appropriate with clear instructions, from menu or read from an input file as needed  (Nohardcoding with the exception of an Array size constant or known constants such as PI)

 

d.     Program should continue (loop) until the user chooses to end the program

 

e.     Output File

 

f.      Display to Screen

 

Bonus worth 5 points if you get it correct.  It does not count against your grade if you do not get it correct.

 

Develop a test case for the option you chose and deliver it in a spreadsheet format such as Excel or a table with rows and columns (for word) to include all inputs and outputs variable names in the header along with values.

 

 

We give our students 100% satisfaction with their assignments, which is one of the most important reasons students prefer us to other helpers. Our professional group and planners have more than ten years of rich experience. The only reason is that we have successfully helped more than 100000 students with their assignments on our inception days. Our expert group has more than 2200 professionals in different topics, and that is not all; we get more than 300 jobs every day more than 90% of the assignment get the conversion for payment.

Place Order Now

Computer Science 2023 wk2 IT forensic discussion 2

2023 Forensic Challenges and Unconstitutional Decryption Please respond to the following Describe what you perceive to be | Assignment Collections

“Forensic Challenges and Unconstitutional Decryption” Please respond to the following:

 

  • Describe what you perceive to be the greatest challenge for system forensics investigators. Provide specific details of this challenge and whether or not the challenge differs from a private company investigation compared to a law enforcement investigation. Provide a rationale with your response.
  • Go to the IEEE’s Website to read the article titled “U.S. Courts Rule For—and Against—Protecting a Suspect’s Hard Drives,” located at http://spectrum.ieee.org/riskfactor/computing/it/us-courts-rule-for-and-against-protecting-a-suspects-hard-drives.From the e-Activity, take Take a position on the 11th Circuit ruling that forced decryption of an encrypted volume as unconstitutional. Decide whether or not the subject matter of the potential evidence contained therein should have an effect on the court’s decision (e.g., child pornography versus terrorist activities vs. financial crime data). Justify your decision.

 

We give our students 100% satisfaction with their assignments, which is one of the most important reasons students prefer us to other helpers. Our professional group and planners have more than ten years of rich experience. The only reason is that we have successfully helped more than 100000 students with their assignments on our inception days. Our expert group has more than 2200 professionals in different topics, and that is not all; we get more than 300 jobs every day more than 90% of the assignment get the conversion for payment.

Place Order Now

Computer Science 2023 Exp19_Excel_Ch04_HOEAssessment_Investments

2023 Exp19 Excel Ch04 HOEAssessment Investments Project Description You have been hired as a junior financial analyst at | Assignment Collections

 Exp19_Excel_Ch04_HOEAssessment_Investments

Project Description:

You have been hired as a junior financial analyst at Bristol Investments. As part of your tasks, you will help track transactions, commodity prices, and broker efficiency. To complete the task, you will create an Excel table, use data filters, conditional formatting, and lastly you will prepare the document to print.

 

We give our students 100% satisfaction with their assignments, which is one of the most important reasons students prefer us to other helpers. Our professional group and planners have more than ten years of rich experience. The only reason is that we have successfully helped more than 100000 students with their assignments on our inception days. Our expert group has more than 2200 professionals in different topics, and that is not all; we get more than 300 jobs every day more than 90% of the assignment get the conversion for payment.

Place Order Now

Computer Science 2023 Project Management – Do You Think Six Sigma Is Another Quality Management Fad?

2023 Project management Do you think Six Sigma is another quality management fad 1 Plagiarism | Assignment Collections

 

Project management – Do you think Six Sigma is another quality management fad? 

1.   Plagiarism is not permitted and will receive 0 points. 

2. Write a 1200-1500 word academic paper

3.  The paper should be follow APA formatting, including a cover page and references. 

4. Minimum of 5 References should be cited. 

 

We give our students 100% satisfaction with their assignments, which is one of the most important reasons students prefer us to other helpers. Our professional group and planners have more than ten years of rich experience. The only reason is that we have successfully helped more than 100000 students with their assignments on our inception days. Our expert group has more than 2200 professionals in different topics, and that is not all; we get more than 300 jobs every day more than 90% of the assignment get the conversion for payment.

Place Order Now

Computer Science 2023 Project On Labcorp Organization

2023 Introduction The growth and explosion of the data has led to land scale | Assignment Collections

  

Introduction

The growth and explosion of the data has led to land scale differences across several industries. Over the past two decades there has been a huge increase in the amount of data being stored in databases as well as the number of database applications in business and the scientific domain. This explosion in the amount of electronically stored data was accelerated by the success of the relational model for storing data and the development and maturing of data retrieval and manipulation technologies. While technology for storing the data developed fast to keep up with the demand, little stress was paid to developing software for analyzing the data until recently when companies realized that hidden within these masses of data was a resource that was being ignored. The huge amounts of stored data contain knowledge about a number of aspects of their business waiting to be harnessed and used for more effective business decision support.

Objective

For this project, you will write a 10-page APA formatted paper followed by a PowerPoint Presentation on a how a particular organization that has experienced some type of Security or Privacy Challenges around Data. You will explain the following: 1) Why the challenges exist, 2) What is the general approach to solve the challenges, 3) What kind of data tools or databases do you plan to use, and 4) Finally what risk concerns were addressed by solving the Challenges. You should describe your problem, approach, dataset, data analysis, evaluation, discussion, references, and so on, in sufficient details, and you need to show supporting evidence in tables and/or figures. You need to provide captions for all tables and figures. 

Deliverables

The paper should include the following sections each called out with a Headers. 

· Introduction: Overview of the Paper.

· Background: The section should be a Company Overview that includes the company name, the industry they are in and a general overview of the organization.

· Challenges: Discuss the challenges that the organization have with a particular security issue around data. 

· Solution: Describe the organization’s Data Security implementation and the benefits they realized from the implementation. What was the result of implementing Data Security? Did they meet their objectives or fall short?

· Conclusion: Summarize the most important ideas from the paper and also make recommendations or how they might have achieved even greater success. 

· References: Please include a separate reference page with at least 5 references.

 

We give our students 100% satisfaction with their assignments, which is one of the most important reasons students prefer us to other helpers. Our professional group and planners have more than ten years of rich experience. The only reason is that we have successfully helped more than 100000 students with their assignments on our inception days. Our expert group has more than 2200 professionals in different topics, and that is not all; we get more than 300 jobs every day more than 90% of the assignment get the conversion for payment.

Place Order Now

Computer Science 2023 Discussion Unit 3 #1

2023 Topic 1 Due Care and Diligence Discuss the role of due care and due diligence in regulatory compliance What are | Assignment Collections

 

Topic 1: Due Care and Diligence

Discuss the role of due care and due diligence in regulatory compliance. What are some examples of companies you have heard about that might not have been exercising these in the news? Please use outside research to back up what you say. Be sure to cite your sources.

See attached for examples and also respond to two examples in the provided document.

 

We give our students 100% satisfaction with their assignments, which is one of the most important reasons students prefer us to other helpers. Our professional group and planners have more than ten years of rich experience. The only reason is that we have successfully helped more than 100000 students with their assignments on our inception days. Our expert group has more than 2200 professionals in different topics, and that is not all; we get more than 300 jobs every day more than 90% of the assignment get the conversion for payment.

Place Order Now

Computer Science 2023 Emerging Threats & Countermeas

2023 From chapter Chapter 4 Diversity and Chapter 5 Commonality Let us consider a company EnergyA that | Assignment Collections

From chapter Chapter 4 Diversity and Chapter 5 Commonality

Let us consider a company EnergyA that is a global leader in producing energy from diversified fuel sources for the U.S and U.K consumer markets with approximately 8.9 million electricity and gas consumers worldwide. Recently, the company’s website was under attack from a botnet titled fringe47. The company is under major scrutiny and is under pressure from several sources.

Discuss how the security principles that we learned this week Diversity and Commonality can help to prevent Botnet attacks against EnergyA.  Ensure to discuss why the concept of diversity and commonality is paradoxical. Discuss the challenges that are involved in implementing diversity and commonality at the national infrastructure level. Please provide examples to support your discussion.

 TEXT BOOK

Amoroso, E. G. (2012). Cyber attacks: protecting national infrastructure. Elsevier.

 

We give our students 100% satisfaction with their assignments, which is one of the most important reasons students prefer us to other helpers. Our professional group and planners have more than ten years of rich experience. The only reason is that we have successfully helped more than 100000 students with their assignments on our inception days. Our expert group has more than 2200 professionals in different topics, and that is not all; we get more than 300 jobs every day more than 90% of the assignment get the conversion for payment.

Place Order Now