Tag Archive for: Assignment Help Online Services Collections

Computer Science 2023 Intro To Java Programming

2023 1 Create class Account with id balance Person and dateCreated Use a static class variable to store | Assignment Collections

1.     Create class Account with id, balance, Person, and dateCreated.  Use a static class variable to store the annualInterestRate for all account holders. Provide constructors, setter and getter for the Account class.

Provide method calculateMonthlyInterest to calculate the monthly interest by multiplying the balance by annualInterestRate divided by 12; this interest should be added to balance.  Provide a static method modifyInterestRate that sets the anualInterestRate to a new value.  Also provide method deposit and withdraw. Provide method toString to print all the information about the account.

 

Write a driver program to test class Account.  Instantiate two Account objects, saver1 and saver2, with balances of $2000.00 and $3000.00, respectively.  Set annualInterestRate to 4%.

 

Display a menu with the following:
System.out.println(1…Check balance);
System.out.println(2…Withdraw);
System.out.println(3…Deposit);

System.out.println(4…Change Annual Interest Rate);

System.out.println(5…Calculate Monthly Interest);

System.out.println(6…Display Account Info);

System.out.println(7…Exit);

 

Ask the user to select an option and perform that task. Continue display this menu until user type 7 to exit.

 

2)   (Pig Latin) Write an application that encodes English-language phrases into pig Latin. Pig Latin is a form of coded language. There are many different ways to form pig Latin phrases. For simplicity, use the following algorithm:

 

To form a pig Latin phrase from an English-language phrase, tokenize the phrase into words with String method split. To translate each English word into a pig Latin word, place the first letter of the English word at the end of the word and add the letters “ay.”. Thus, the word “jump” becomes “umpjay.” The word “the” becomes “hetay.” And the word “computer” becomes “omputercay.”  Blanks between works remain as blanks.

Assume the following:

The English phrase consists of words separated by blanks, there are no punctuation marks and all words have two or more letters. Method printLatinWord should display each word. Each token is passed to method printLatinWord to print the pig Latin word. Enable the user to input the sentence.

 

 

3)   (Display a Sentence with its Words revered) Write an application that inputs a line of text, tokenizes the line with string method split and outputs the tokens in reverse order. Use space characters as delimiters.

Input:This is a test

Output: sihT si a tset

 

 

We give our students 100% satisfaction with their assignments, which is one of the most important reasons students prefer us to other helpers. Our professional group and planners have more than ten years of rich experience. The only reason is that we have successfully helped more than 100000 students with their assignments on our inception days. Our expert group has more than 2200 professionals in different topics, and that is not all; we get more than 300 jobs every day more than 90% of the assignment get the conversion for payment.

Place Order Now

Computer Science 2023 Networking Help Due ASAP

2023 Assume you are a consultant to a local business that has asked you to propose | Assignment Collections

 

 

Assume you are a consultant to a local business that has asked you to propose an enterprise-wide solution that includes topology, network devices, IP infrastructure, and network security. The scenario is as follows:

A small accounting firm, ABC Accounting, Inc., landed a large account a year and a half ago that has already led the company to grow from five employees to 200 employees and expectations to employ 350 within a year’s time.  In the face of continuing expansion, ABC plans to add offices in their current building that will span a total of three floors. At least one third of ABC employees have laptops and travel often.

All ABC employees have Windows 7 computers, which currently are not connected to each other.

You have been hired as a consultant to provide a detailed technical proposal that recommends a solution that addresses each of the detailed specifications that follow. Your solution regarding each specification should comprise a separate section of the body of your proposal.

  1. Topology (type of network) and network devices
    1. ABC needs to set up a network and requires clarification regarding the type of network (or topology) in order to properly configure the connections among all PCs within the organization.
    2. The company is looking for guidance regarding the type of network devices that will connect the machines together. Brand is not mandated. The company asks that you explain what internal and external networking components are required (explaining each and justifying WHY you chose the network devices you did).
    3. The network must have the capacity to:
      1. Connect all users to company resources (e.g, printers, scanners, and other items).
      2. Provide file sharing options.
      3. Manage these resources in a central location.
    4. All proposals should include cost elements. 
  2. IP Infrastructure
    1. ABC has asked that you provide details regarding an IP structure (which includes static, DHCP, or the possibility of both, and proper IP Class assignment) that is mindful of the company’s expectation of continued growth.
  3. Security
    1. Basic security has always been in place and now the company would like you to make this a secure facility to protect against internal and external security threats.
    2. Be sure to include details with respect to:
      1. Social engineering/internal threats.
      2. Firewalls/switches.
      3. VPN’s.
      4. Authentication.
      5. Security protocols.
      6. Vulnerability assessment.

Your draft proposal should include each of the following sections, with each preceded by an appropriate heading:

  1. Introduction/overview
  2. Table of Contents
  3. Body, including a separate section for each numbered item in the specifications above
  4. Conclusion
  5. APA References
  6. Any appendices you feel appropriate

All Academic papers should include a cover page with your name, date, school name, section, course name, and instructor name.

Support each of your four proposed elements by citing at least one credible source, which may be ITS310 module content, material from the Network Pro LabSim, and/or any credible outside source.  Your paper should be 8-10 pages in length with document and citation formatting per APA formatting

 

We give our students 100% satisfaction with their assignments, which is one of the most important reasons students prefer us to other helpers. Our professional group and planners have more than ten years of rich experience. The only reason is that we have successfully helped more than 100000 students with their assignments on our inception days. Our expert group has more than 2200 professionals in different topics, and that is not all; we get more than 300 jobs every day more than 90% of the assignment get the conversion for payment.

Place Order Now

Computer Science 2023 CS316 – LAB 2-VM 1898

2023 Wireshark HTTP Overview In this Wireshark lab you ll get acquainted with Wireshark and make some simple | Assignment Collections

Wireshark - HTTP
Overview:
In this Wireshark lab, you’ll get acquainted with Wireshark, and make some simple packet captures and observations.
The basic tool for observing the messages exchanged between executing protocol entities is called a packet sniffer.  As the name suggests, a packet sniffer captures (“sniffs”) messages being sent/received from/by your computer; it will also typically store and/or display the contents of the various protocol fields in these captured messages. A packet sniffer itself is passive. It observes messages being sent and received by applications and protocols running on your computer, but never sends packets itself. Similarly, received packets are never explicitly addressed to the packet sniffer.  Instead, a packet sniffer receives a copy of packets that are sent/received from/by application and protocols executing on your machine.
Summary of tasks:
1.	Run Wireshark
2.	Capture some HTTP data
3.	Submit your results and reflection.
What You Will Need
The physical machine you used for Lab 1.
Running Wireshark
When you run the Wireshark program, you’ll get a startup screen, as shown below:
 
Looking at the upper left hand side of the screen – you’ll see an “Interface list”.  This is the list of network interfaces on your computer.  Once you choose an interface, Wireshark will capture all packets on that interface.  In the example above, there is an Ethernet interface (Gigabit network Connection) and a wireless interface (“Microsoft”).
If you click on one of these interfaces to start packet capture (i.e., for Wireshark to begin capturing all packets being sent to/from that interface), a screen like the one below will be displayed, showing information about the packets being captured.  Once you start packet capture, you can stop it by using the Capture pull down menu and selecting Stop.
 
The Wireshark interface has five major components:
•	The command menus are standard pulldown menus located at the top of the window.   The File menu allows you to save captured packet data or open a file containing previously captured packet data, and exit the Wireshark application.  The Capture menu allows you to begin packet capture.
Taking Wireshark for a Test Run
1.	Start up your favorite web browser on your local machine, which will display your selected homepage.
2.	Start up the Wireshark software.  Wireshark has not yet begun capturing packets.
3.	To begin packet capture, select the Capture pull down menu and select Interfaces. This will cause the “Wireshark: Capture Interfaces” window to be displayed. 
 
4.	You’ll see a list of the interfaces on your computer as well as a count of the packets that have been observed on that interface so far.  Click on Start for the interface on which you want to begin packet capture (in the case, the Gigabit network Connection).  Packet capture will now begin - Wireshark is now capturing all packets being sent/received from/by your computer! 
5.	Once you begin packet capture, a window will show the packets being captured.  By selecting Capture pulldown menu and selecting Stop, you can stop packet capture.   But don’t stop packet capture yet.  Let’s capture some interesting packets first.  To do so, we’ll need to generate some network traffic.  Let’s do so using a web browser, which will use the HTTP protocol that we will study in detail in class to download content from a website.
6.	While Wireshark is running, enter the URL: 
http://www.grantham.edu
Have that page displayed in your browser. In order to display this page, your browser will contact the HTTP server at www.grantham.edu and exchange HTTP messages with the server in order to download this page.  The Ethernet frames containing these HTTP messages (as well as all other frames passing through your Ethernet adapter) will be captured by Wireshark.
7.	After your browser has displayed the main html page, stop Wireshark packet capture by selecting stop in the Wireshark capture window.   You now have live packet data that contains all protocol messages exchanged between your computer and other network entities!  The HTTP message exchanges with the web server should appear somewhere in the listing of packets captured.  But there will be many other types of packets displayed as well.  Even though the only action you took was to download a web page, there were evidently many other protocols running on your computer that are unseen by the user. 
8.	Type in “http” (without the quotes, and in lower case – all protocol names are in lower case in Wireshark) into the display filter specification window at the top of the main Wireshark window.  Then select Apply (to the right of where you entered “http”).  This will cause only HTTP message to be displayed in the packet-listing window. 
9.	Find the HTTP GET message that was sent from your computer to the eee.grantham.edu HTTP server. (Look for an HTTP GET message in the “listing of captured packets” portion of the Wireshark window  that shows “GET” followed by the URL that you entered.  When you select the HTTP GET message, the Ethernet frame, IP datagram, TCP segment, and HTTP message header information will be displayed in the packet-header window. By clicking on ‘+’ and ‘-‘ right-pointing and down-pointing arrowheads to the left side of the packet details window, minimize the amount of Frame, Ethernet, Internet Protocol, and Transmission Control Protocol information displayed.  Maximize the amount information displayed about the HTTP protocol. 
10.	Exit Wireshark
Congratulations!  You’ve now completed the second lab.
Capturing the Screen Image
1.	Press the PrntScn key to copy whole screen (Showing the Wireshark capture) to the clipboard.  Open Paint and paste in the image.  Save it as a JPEG, with the filename Your Name CS316 – LAB 2-VM.
Reflection
1.	What are some of the benefits to using a protocol analyzer?  What are some of the risks?  Include this in your lab write up.
2.	How was your experience with thisl? Did you have any issues?
Turning in your Project
1.	Include these things with your file: 
o	A lab write up answering the questions in the reflection section.
o	The image you captured above, as an attachment
2.	Submit to the dropbox, save a save for yourself.

 

We give our students 100% satisfaction with their assignments, which is one of the most important reasons students prefer us to other helpers. Our professional group and planners have more than ten years of rich experience. The only reason is that we have successfully helped more than 100000 students with their assignments on our inception days. Our expert group has more than 2200 professionals in different topics, and that is not all; we get more than 300 jobs every day more than 90% of the assignment get the conversion for payment.

Place Order Now

Computer Science 2023 Assignment 2: Network Design

2023 Assignment 2 Network Design Imagine that you have been hired as a contractor by a local business that has | Assignment Collections

Assignment 2: Network Design

 

Imagine that you have been hired as a contractor by a local business that has recently purchased new office space for its growing business. Design a network for the local business based on the following information: The business has approximately fifty (50) employees, and the new office space will stretch across the third and fifth floors of a building. The fourth floor is currently occupied by another tenant.

Write a two to four (2-4) page paper in which you:

  1. Suggest the equipment that you would utilize to design and implement a network, based on the scenario. Justify the need for your suggestions.
  2. Recommend the strategy that you would use to combat the design challenge of occupying non-adjacent floors. Suggest a solution that includes the cabling / connecting of the two (2) differing office space floors.
  3. Determine the primary security concerns regarding the scenario in question. Explain the controls you would implement in order to lessen those concerns.
  4. Detail the specifics of your network design through the use of graphical tools in Visio, or an open source alternative such as Dia. Note: The graphically depicted solution is not included in the required page length
  5. Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources. 

Your assignment must follow these formatting requirements:

  • Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.
  • Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

The specific course learning outcomes associated with this assignment are:

  • Explain the complexities in an information technology environment by applying best practices and using appropriate technologies and methodologies.
  • Describe protocols for inter process communication for communication across networks.
  • Outline why the Information Assurance and Security perspective needs to pervade all aspects of information technology.
  • Use technology and information resources to research issues in information technology.
  • Write clearly and concisely about introductory information technology topics using proper writing mechanics and technical style conventions.

 

Grading for this assignment will be based on answer quality, logic / organization of the paper, and language and writing skills, using the following rubric.

 

 

Assignment 2: Network Design

Criteria

 

Unacceptable

Below 60% F

Meets Minimum Expectations

60-69% D

 

Fair

70-79% C

 

Proficient

80-89% B

 

Exemplary

90-100% A

1. Suggest the equipment that you would utilize to design and implement a network, based on the scenario. Justify the need for your suggestions.

Weight: 20%

Did not submit or incompletelysuggested the equipment that you would utilize to design and implement a network, based on the scenario. Did not submit or incompletelyjustified the need for your suggestions.

Insufficiently suggested the equipment that you would utilize to design and implement a network, based on the scenario. Insufficiently justified the need for your suggestions.

Partially suggested the equipment that you would utilize to design and implement a network, based on the scenario. Partially justified the need for your suggestions.

Satisfactorily suggested the equipment that you would utilize to design and implement a network, based on the scenario. Satisfactorily justified the need for your suggestions.

Thoroughly suggested the equipment that you would utilize to design and implement a network, based on the scenario. Thoroughly justified the need for your suggestions.

2. Recommend the strategy that you would use to combat the design challenge of occupying non-adjacent floors. Suggest a solution that includes the cabling / connecting of the two (2) differing office space floors.
Weight: 20%

Did not submit or incompletelyrecommended the strategy that you would use to combat the design challenge of occupying non-adjacent floors. Did not submit or incompletelysuggested a solution that includes the cabling / connecting of the two (2) differing office space floors.

Insufficiently recommended the strategy that you would use to combat the design challenge of occupying non-adjacent floors. Insufficiently suggested a solution that includes the cabling / connecting of the two (2) differing office space floors.

Partially recommended the strategy that you would use to combat the design challenge of occupying non-adjacent floors. Partially suggested a solution that includes the cabling / connecting of the two (2) differing office space floors.

Satisfactorily recommended the strategy that you would use to combat the design challenge of occupying non-adjacent floors. Satisfactorily suggested a solution that includes the cabling / connecting of the two (2) differing office space floors.

Thoroughly recommended the strategy that you would use to combat the design challenge of occupying non-adjacent floors. Thoroughly suggested a solution that includes the cabling / connecting of the two (2) differing office space floors.

3. Determine the primary security concerns regarding the scenario in question. Explain the controls you would implement in order to lessen those concerns.

Weight: 20%

Did not submit or incompletelydetermined the primary security concerns regarding the scenario in question. Did not submit or incompletelyexplained the controls you would implement in order to lessen those concerns.

Insufficiently determined the primary security concerns regarding the scenario in question. Insufficiently explained the controls you would implement in order to lessen those concerns.

Partially determined the primary security concerns regarding the scenario in question. Partially explained the controls you would implement in order to lessen those concerns.

Satisfactorily determined the primary security concerns regarding the scenario in question. Satisfactorily explained the controls you would implement in order to lessen those concerns.

Thoroughly determined the primary security concerns regarding the scenario in question. Thoroughly explained the controls you would implement in order to lessen those concerns.

4. Detail the specifics of your network design through the use of graphical tools in Visio, or an open source alternative such as Dia.

Weight: 25%

Did not submit or incompletely detailed the specifics of your network design through the use of graphical tools in Visio, or an open source alternative such as Dia.

Insufficiently detailed the specifics of your network design through the use of graphical tools in Visio, or an open source alternative such as Dia.

Partially detailed the specifics of your network design through the use of graphical tools in Visio, or an open source alternative such as Dia.

Satisfactorily detailed the specifics of your network design through the use of graphical tools in Visio, or an open source alternative such as Dia.

Thoroughly detailed the specifics of your network design through the use of graphical tools in Visio, or an open source alternative such as Dia.

5. 3 references

Weight: 5%

No references provided

Does not meet the required number of references; all references poor quality choices.

Does not meet the required number of references; some references poor quality choices.

Meets number of required references; all references high quality choices.

Exceeds number of required references; all references high quality choices.

6. Clarity, writing mechanics, and formatting requirements

Weight: 10%

More than 8 errors present

7-8 errors present

5-6 errors present

3-4 errors present

0-2 errors present

 

We give our students 100% satisfaction with their assignments, which is one of the most important reasons students prefer us to other helpers. Our professional group and planners have more than ten years of rich experience. The only reason is that we have successfully helped more than 100000 students with their assignments on our inception days. Our expert group has more than 2200 professionals in different topics, and that is not all; we get more than 300 jobs every day more than 90% of the assignment get the conversion for payment.

Place Order Now

Computer Science 2023 Database Systems And Database Models

2023 Assignment 2 Database Systems and Database Models Due Week 2 and worth 90 points The Strayer | Assignment Collections

Assignment 2: Database Systems and Database Models
Due Week 2 and worth 90 points

The Strayer Oracle Server may be used to test and compile the SQL Queries developed for this assignment. Your instructor will provide you with login credentials to a Strayer University maintained Oracle server.

Imagine that you have been hired as a consultant to assist in streamlining the data processing of an international based organization that sells high-end electronics. The organization has various departments such as payroll, human resources, finance, marketing, sales, and operations. The sales department is the only department where employees are paid a commission in addition to their yearly salary and benefits. All other departments compensate their employees with a yearly salary and benefits only. Commission is paid by multiplying the employee’s commission rate by the total amount of product units sold. You have access to the following data sets:

  • Employee (EmpNumber, EmpFirstName, EmpLastName, CommissionRate, YrlySalary, DepartmentID, JobID)
  • Invoice (InvNumber, InvDate, EmpNumber,  InvAmount)
  • InvoiceLine (InvLineNumber, InvNumber,  ProductNumber, Quantity)
  • Product (ProductNumber, ProductDescription, ProductCost)
  • Department (DepartmentID, DepartmentDescription)
  • Job (JobID, JobDescription)

Write a two to three (2-3) page paper in which you:

  1. Design a query that will allow the finance department to determine the commissions paid to specific employees of the sales department for the month of December. Note: You will need to generate the tables described above (Employee, Invoice, InvoiceLine, Product, Department, and Job) in order to compare and validate your code. Validated query code must be part of your paper.
  2. Compare the code of the query you designed in Question one (1) to one that would show how much total compensation is paid to each employee for the same month.
  3. Determine and explain the factors necessary to ensure referential integrity.
  4. Create an object-oriented model to show how the tables are interrelated through the use of graphical tools. Make sure that you are able to show the relationship types such as 1:M, 1:1, or M:1. Additionally, remember to include the determined factors from the previous assignment requirement. Note: The graphically depicted solution is not included in the required page length.
  5. Identify which data components are the entities and attributes, and the relationship between each using an object representation diagram through the use of graphical tools. Note: The graphically depicted solution is not included in the required page length.
  6. Describe how Big Data could be used to assist in the productivity and forecasting of the organization’s products and resources. 

 

We give our students 100% satisfaction with their assignments, which is one of the most important reasons students prefer us to other helpers. Our professional group and planners have more than ten years of rich experience. The only reason is that we have successfully helped more than 100000 students with their assignments on our inception days. Our expert group has more than 2200 professionals in different topics, and that is not all; we get more than 300 jobs every day more than 90% of the assignment get the conversion for payment.

Place Order Now

Computer Science 2023 Dissertation Topic Discussion

2023 In 250 300 words discuss your dissertation topic and goals for this semester as they relate to your dissertation course If | Assignment Collections

 In 250-300 words discuss your dissertation topic and goals for this semester as they relate to your dissertation course. If you do not have a dissertation topic please discuss those you are considering. Also, include ways that you could improve your dissertation, as well as areas you may be struggling with .

Course Topic is: Information Statistics in decision

 

We give our students 100% satisfaction with their assignments, which is one of the most important reasons students prefer us to other helpers. Our professional group and planners have more than ten years of rich experience. The only reason is that we have successfully helped more than 100000 students with their assignments on our inception days. Our expert group has more than 2200 professionals in different topics, and that is not all; we get more than 300 jobs every day more than 90% of the assignment get the conversion for payment.

Place Order Now

Computer Science 2023 Create The Following Program Which Converts Fahrenheit To Celsius. Your Program Must Have The Following Functions: Read Integer Fahrenheit Temperatures From The User. You Need To Check Whether The Input Is The Correct One Or Not. If The User Enter

2023 Create the following program which converts Fahrenheit to Celsius Your program must have the following | Assignment Collections

Create the following program which converts Fahrenheit to Celsius. Your program must have the following functions:

 

  • Read integer Fahrenheit temperatures from the user. You need to check whether the input is the correct one or not. If the user enters the incorrect number, ask it again.

  • Use the formula:  Celsius = (Fahrenheit – 32) * 5.0 / 9.0

  • The output Celsius should be a floating point with two digits of precision.

  • The Celsius temperatures should be displayed with a sign of positive or negative.

  • The program should ask the user to continue or not. If the user wants to do the conversion again, use repetitive statements such as DO WHILE, FOR, or IF THEN ELSE to do the conversion again.

  • Add comments to explain the functions of the program.

 

Write a user manual of more than two pages to explain how to use your program. Format your manual according to APA style as outlined in the Ashford Writing Center. Your program should run without any errors. Submit your source file and compiled executable file (.exe) by day 7

 

We give our students 100% satisfaction with their assignments, which is one of the most important reasons students prefer us to other helpers. Our professional group and planners have more than ten years of rich experience. The only reason is that we have successfully helped more than 100000 students with their assignments on our inception days. Our expert group has more than 2200 professionals in different topics, and that is not all; we get more than 300 jobs every day more than 90% of the assignment get the conversion for payment.

Place Order Now

Computer Science 2023 Java Code

2023 I need the Java Code for the problem bellow Objectives Developing a graphical user interface in programming is | Assignment Collections

I need the Java Code for the problem bellow.

 

Objectives

Developing a graphical user interface in programming is paramount to being successful in the business industry. This project incorporates GUI techniques with other tools that you have learned about in this class.

Here is your assignment: You work for a flooring company. They have asked you to be a part of their team because they need a computer programmer, analyst, and designer to aid them in tracking customer orders.  Your skills will be needed in creating a GUI program that calculates the flooring cost and stores the order in the database.

The project has three components: an analysis and design document, the project code, and a user manual. The analysis and design document is due Week 4. The code and user manual are due in Week 7. It is suggested that you begin working on the code in Week 5, which should give you ample time to complete the project. You will find that the lectures and lab assignments will prepare you for the Course Project.

Guidelines

Your application must include at least three tabs. The user will choose wood flooring or carpet, enter the length and width of the floor, as well as the customer name and address. The application will compute the area of the floor and the cost of the flooring considering that wood floor is $20 per square foot and carpet is $10 per square foot. A summary should be displayed, either in a tab or another window, listing the customer name and address, floor selection, area, and cost. This information should also be stored in the MySQL database table. The program should validate that all information is entered and that the length and width are numeric values. Any numeric or currency values must be formatted appropriately when output. Recommendations for the components used for input are

  • radio buttons—flooring type (wood or carpet);
  • text fields—customer name, customer address, floor length, and floor width; and
  • buttons—calculate area, calculate cost, submit order, display order summary, display order list.

The MySQL database table is called flooring and has the following description.

 Field Type
CustomerName varchar(30)
CustomerAddress varchar(50)
FlooringType varchar(10)
FloorArea double
FloorCost double

In addition to entering new customer orders, your application should list all customer orders stored in the database. These will be viewed as a list, in a text area, and will not be updated by the user. 

 

We give our students 100% satisfaction with their assignments, which is one of the most important reasons students prefer us to other helpers. Our professional group and planners have more than ten years of rich experience. The only reason is that we have successfully helped more than 100000 students with their assignments on our inception days. Our expert group has more than 2200 professionals in different topics, and that is not all; we get more than 300 jobs every day more than 90% of the assignment get the conversion for payment.

Place Order Now

Computer Science 2023 Rush Assignment Python Within 2 Hours Please

2023 Specification for Assignment 2 for COMP1405 Fall 2016 Instructions There are two questions in this assignment For | Assignment Collections

Specification for Assignment 2 for COMP1405 (Fall 2016)

Instructions

There are two questions in this assignment. For each question you will be submitting your

solution as multiple files, each containing source code written in Python 3. These files must be

compressed into a single “zip” file, and you will submit this file using cuLearn.

 The source files for question 1 must be named “a2q1a.py”, “a2q1b.py”, and “a2q1c.py”

 The source files for question 2 must be named “a2q2a.py” and “a2q2b.py”

 The compressed archive (i.e., the .zip file) must be named “a2.zip”.

 

You are expected to demonstrate good programming practices at all times (e.g., choosing

descriptive variable names, provide comments in your code, etc.) and your code will be

penalized if it is poorly written.

You are expected to do the necessary preparatory work (e.g., devising an algorithm) before

you begin coding. Whenever appropriate, you will be asked to present either pseudocode or a

flowchart before you will receive any assistance from the instructor or a teaching assistant.

This assignment is uniquely generated; every student in the class is required to complete a

slightly different version of this assignment. To ensure that each unique assignment shares the

same level of difficulty, a unique assignment generator (and supporting files) has been made

available on cuLearn.

To receive the assignment instructions that are specific to you, download the

“unique-assignment-generator-for-A2.zip” file from cuLearn. Once you have extracted the

contents to your working folder, use the command prompt to run the “generator-for-A2.py”

program and then enter and confirm your student number.

Specification for Assignment 1 for COMP1405 (Fall 2016)

Question 1 (of 2)

When you ran the unique assignment generator for this assignment, the program showed you a

collection of 18 cartoon faces as the top three rows of the SimpleGraphics window. For the first

question of this assignment you will create three short programs that will ask the user

questions as though the user is playing a game of “Guess Who?” using this collection of faces. If

you are completely unfamiliar with this game you should consider visiting the Wikipedia page

(https://en.wikipedia.org/wiki/Guess_Who%3F) and playing an online implementation (such as

the one at http://www.miniplay.gr/?view=game&gid=76).

Each of the programs you write will require you to use the input function to ask the user one or

more yes or no questions. You MUST restrict your questions to asking about whether or not the

player’s choice of face has a wig, glasses, hat, pipe, moustache, beard, or scar, and each

question can only ask about one of those features. To clarify, you are NOT permitted to ask

questions pertaining to the row, column, eyes, mouth, or any feature other than the seven

listed above.

Your first program (i.e., “a2q1a.py”) must contain a single if statement that does not use any of

the Boolean operators (i.e., and, or, not), has no elif or else branches, and would only work to

identify one specific face (i.e., ending the game with a single question). To clarify, you can

assume that your program will win if the opponent (i.e., the user) has chosen the only face out

of group of eighteen that can be identified by a single question. For further clarification,

consider the collection of three faces below and note that the only single question that could

conceivably identify one of these three is the question “Are you wearing a hat?”

Your second program (i.e., “a2q1b.py”) must contain a single if-else statement that does not

use any of the Boolean operators (i.e., and, or, not), has only a single else branch, and is

guaranteed NOT to identify your opponent. To clarify, regardless of which face your opponent

has chosen, they should end up following the else branch of your statement.

Your third program (i.e., “a2q1c.py”) must contain a single nested if statement with a depth of

two (i.e., one “inner” if statement nested inside one “outer” if statement) that does not use any

of the Boolean operators (i.e., and, or, not). Write this program such that exactly five possible

choices of face should pass the condition of the outer if statement, and only one of those faces

should pass through the condition of the inner if statement.

Specification for Assignment 1 for COMP1405 (Fall 2016)

Question 2 (of 2)

When you ran the unique assignment generator for this assignment, the program also showed

you a collection of 10 arrows as the bottom two rows of the SimpleGraphics window. For the

second question of this assignment you will create two expert systems that will allow the user

to uniquely identify each of these arrows by answering a series of questions.

An expert system represents to a solution to a categorization problem. An expert system is

expected to maintain a database that contains the identity of each element of a large

collection, and then when a user has an unknown element they would like to identify they can

answer questions from the expert system and the expert system can identify the unknown

element. As a clarifying example, suppose the database maintained by an expert system

contained the following four arrows (denoted arrows 1, 2, 3, and 4, respectively)…

…and the user encountered the following unknown symbol, to be identified:

The expert system might ask the user “Does the symbol use any curved lines?” and if the user’s

answer is “yes” then the expert system knows the unknown symbol must be either 1 or 2. The

expert system might then ask “Does the symbol point straight upwards?”, etc.

Your first expert system (i.e., “a2q2a.py”) must use a single if-elif-else statement to correctly

identify each of your ten symbols, and this statement must be flat (i.e., not nested). For this

question you are only permitted to ask the user yes or no questions. To accomplish this you will

need to use Boolean operators (i.e., and, or, not) and create conditions such that each

condition only evaluates to True for a single arrow. As a clarifying example you might create the

following flat if statement (for the example included above):

if isCurved == “yes” and isUpwards == “yes”:

print(2)

elif isCurved == “yes” and not(isUpwards == “yes”):

print(1)

Your second expert system (i.e., “a2q2b.py”) must use a single nested if statement to correctly

identify each of the ten symbols that you have been assigned. This system is expected to ask as

many non-yes or no questions as possible (e.g., “How many solid parts make up the symbol?”)

but it must not ask any unnecessary questions. This entails that, unlike your first expert system,

 

your second system cannot ask all the questions

 

We give our students 100% satisfaction with their assignments, which is one of the most important reasons students prefer us to other helpers. Our professional group and planners have more than ten years of rich experience. The only reason is that we have successfully helped more than 100000 students with their assignments on our inception days. Our expert group has more than 2200 professionals in different topics, and that is not all; we get more than 300 jobs every day more than 90% of the assignment get the conversion for payment.

Place Order Now

Computer Science 2023 Assignment 6

2023 Chapter 9 1 How companies take advantage of value chain activities in building strategic alliances What this | Assignment Collections

Chapter 9

1. How companies take advantage of value chain activities in building strategic alliances? What this process adds to developing competitive advantage? What partners in the best strategic alliances have to offer?  

2. Why the choice of partner is important in forming strategic alliances? How this choice affects the stability of alliance building, lead to common goals and benefits partners? 

3. How joint venture cooperative agreements are different from other alliance buildings?  What are  the benefits and pitfalls in these kinds of alliances?  

Chapter 10

4. How an e-commerce business can succeed and why many fail in the marketplace? Does leadership matter? What resources they have to have for its success? 

5. What kind of resources and structures a business must put behind e-commerce to be successful? What should be the link between the “Brick” and “Click” in any business?    

6. What are the benefits and pitfalls in establishing a global e-commerce business? Does that business model complement the traditional brick-and-mortar model or it has to be different?  Are there any model to follow for the best relations between “Brick,” and “Click?”    

 

We give our students 100% satisfaction with their assignments, which is one of the most important reasons students prefer us to other helpers. Our professional group and planners have more than ten years of rich experience. The only reason is that we have successfully helped more than 100000 students with their assignments on our inception days. Our expert group has more than 2200 professionals in different topics, and that is not all; we get more than 300 jobs every day more than 90% of the assignment get the conversion for payment.

Place Order Now