Tag Archive for: Assignment Help Online Services Collections

Computer Science 2023 Chapter -12 IG

2023 Chapter 12 From the chapter reading we learned that e mail is a major area of | Assignment Collections

 

Chapter 12 – From the chapter reading, we learned that e-mail is a major area of focus for information governance (IG) efforts, and has become the most common business software application and the backbone of business communications today.  In addition, the authors provided details to support their position by providing 2013 survey results from 2,400 corporate e-mail users from a global perspective.  The results indicated that two-thirds of the respondents stated that e-mail was their favorite form of business communication which surpassed not only social media but also telephone and in-person contact. 

Q1: With this detail in mind, briefly state why the e-Mail has become a critical component for IG implementation?

 

We give our students 100% satisfaction with their assignments, which is one of the most important reasons students prefer us to other helpers. Our professional group and planners have more than ten years of rich experience. The only reason is that we have successfully helped more than 100000 students with their assignments on our inception days. Our expert group has more than 2200 professionals in different topics, and that is not all; we get more than 300 jobs every day more than 90% of the assignment get the conversion for payment.

Place Order Now

Computer Science 2023 Reflective Journal

2023 Reflective Journal Overview Write a 1 page journal entry approximately 250 words in which you Explain if polls | Assignment Collections

  

Reflective Journal 

Overview

Write a 1-page journal entry (approximately 250 words) in which you:

  1. Explain if polls are an       accurate assessment of public opinion. Cite a recent poll to support your       claim. How can polls sway public opinion? Does the overabundance of       accessible information lead to inaccurate polls? Why or why not?
  2. Complete the page/word       amount requirement. 
  3. Write with clarity,       following mechanics and formatting requirements.

Requirements

Your assignment must follow these formatting requirements:

  • This course requires the use of Strayer       Writing Standards. 
  • Include a source page.       A Journal Sample [PDF] has been uploaded for       your reference. 

 

We give our students 100% satisfaction with their assignments, which is one of the most important reasons students prefer us to other helpers. Our professional group and planners have more than ten years of rich experience. The only reason is that we have successfully helped more than 100000 students with their assignments on our inception days. Our expert group has more than 2200 professionals in different topics, and that is not all; we get more than 300 jobs every day more than 90% of the assignment get the conversion for payment.

Place Order Now

Computer Science 2023 disscussion reply to students, minimum 50 words in own words

2023 1 Write a 150 word synopsis on how JavaScript is used to add functionality to | Assignment Collections

1:    Write a 150-word synopsis on how JavaScript® is used to add functionality to a website for many different types of applications, including forms. Based on the readings and Internet research, provide an example of an application for JavaScript®. What is its purpose? What are the benefits of using JavaScript® for this application? Cite your sources in your response

 

 

2:    The website I chose to write about is called Pixlr. I noticed a lot of the people that I teach photoshop tutorials to cannot afford to pay for photoshop. I found out a quick way to access an app, which is available via internet on the computer, or you can download it to your phone, and it’s called Pixlr. It offers two different apps. The editing site like photoshop, which has different use of the tools like photoshop, or you can access the quick photo editor which offers different filters and what not.

 

https://www.pixlr.com

 

You can go there and see where you can choose either place to edit photos. It also requires flash plug in and javascript to run the site. If you don’t have both downloaded to your computer it can be hard to run the apps. If you are looking for a quick way to edit some of your photos on the phone this is a very cool app. If you are looking for something like photoshop and cannot afford photoshop, then pixlr also offers that.

 

3:Discuss an experience when you needed to fill out a form on a web page. What was the purpose of the form? What would you recommend to improve the form?

 

4:Discuss a web page that uses one or more lists. List the web page’s link. Identify which type of list is currently being used. Imagine that this is your company’s web page and your manager wants you to select a different type of list for this content. To what type of list would you change it? What would you need to change about the content for the new type to be effective for the list’s purpose?

 

5:

JavaScript is used in a majority of web pages. The reason JavaScript is used is to animate different parts of the page. It will also give you search boxes, sign up form and also fix some of the layouts (https://www.w3.org).

     The example for a JavaScript application is from a local pizza parlor my wife loves to frequent. It is called Hideaway Pizza (http://www.hideawaypizza.com/). I was able to look at the code with the help of the computer and you can see were JavaScript was implemented at the first part of the code.


<html xmlns=”http://www.w3.org/1999/xhtmlxml:lang=”enlang=”en“>
  <script src=”http://static.dudamobile.com/DM_redirect.jstype=text/javascript></script>
  <script type=text/javascript>DM_redirect(“http://mobile.dudamobile.com/site/hideawaypizza”);</script>

     <script type=text/javascript src=”js/swfobject.js“></script>. I also found it later on down in the code.

      The benefits of JavaScript for the site is they are able to animate different parts of the home page. It shows a guy throwing pizza crust in the air. A kite flying in the sky. The on line ordering symbol changes colors and lights up. There is also a little pizza cutting wheel that imitates cutting pizza.

 

 

We give our students 100% satisfaction with their assignments, which is one of the most important reasons students prefer us to other helpers. Our professional group and planners have more than ten years of rich experience. The only reason is that we have successfully helped more than 100000 students with their assignments on our inception days. Our expert group has more than 2200 professionals in different topics, and that is not all; we get more than 300 jobs every day more than 90% of the assignment get the conversion for payment.

Place Order Now

Computer Science 2023 Assignment2

2023 This week s journal article was focused on the Complexity of Information Systems Research in the Digital World Complexity is | Assignment Collections

 

This week’s journal article was focused on the Complexity of  Information Systems Research in the Digital World. Complexity is  increasing as new technologies are emerging every day. This complexity  impacts human experiences. Organizations are turning to digitally  enabled solutions to assist with the emergence of digitalization. 

Please review the article and define the various technologies that  are emerging as noted in the article. Note how these emerging  technologies are impacting organizations and what organizations can to  do to reduce the burden of digitalization.

Be sure to use the UC Library for scholarly research. Google Scholar  is also a great source for research. Please be sure that journal  articles are peer-reviewed and are published within the last five years.

The paper should meet the following requirements:

3-5 pages in length (not including title page or references)

APA guidelines must be followed. The paper must include a cover  page, an introduction, a body with fully developed content, and a  conclusion.

A minimum of five peer-reviewed journal articles.

The writing should be clear and concise. Headings should be used to  transition thoughts. Don’t forget that the grade also includes the  quality of writing.

This assignment is due by 11:59pm EST on Sunday, September 6, 2020.

 

We give our students 100% satisfaction with their assignments, which is one of the most important reasons students prefer us to other helpers. Our professional group and planners have more than ten years of rich experience. The only reason is that we have successfully helped more than 100000 students with their assignments on our inception days. Our expert group has more than 2200 professionals in different topics, and that is not all; we get more than 300 jobs every day more than 90% of the assignment get the conversion for payment.

Place Order Now

Computer Science 2023 Week 15 CSPM Final Project

2023 Hello i need this paper by 05 05 afternoon Strictly No plagiarism please | Assignment Collections

Hello,

i need this paper by 05/05 afternoon.

Strictly No plagiarism please use your own words.

You have just been hired as the Security Manager of a medium-sized Financial Services company employing 250 people in New Hampshire, and have been asked to write two new security policies for this company. The first one is an e-mail policy for employees concentrating on personal use of company resources. The second policy is that of WIFI and Internet use within the company.

There are many resources available on the web so researching these topics and policies should be easy. The most difficult part of this exercise will be determining how strict or how lenient you want to make these policies for this particular company.

Project Plan

You are asked to create two separate policies on use of EMAIL and a WIFI/INTERNET USE within the company and please prepare a 12 slide PPT according to the explanation.

Be specific in your terms and conditions of use. Consider these items to be included in your policies (as applicable).

1. Overview 

2. Purpose 

3. Scope

4. Policy 

5. Policy Compliance

6. Related Standards, Policies and Processes

7. Definitions and Terms

Some useful links and resources for your research:

https://resources.workable.com/email-usage-policy-template

https://www.sans.org/security-resources/policies/general/pdf/email-policy

https://resources.infosecinstitute.com/acceptable-use-policy-template-public-wifi-networks/#gref

https://www.techrepublic.com/article/download-our-wireless-policy-template/

https://owl.purdue.edu/owl/research_and_citation/apa_style/apa_formatting_and_style_guide/general_format.html

https://www.skillsyouneed.com/present/presentation-tips.html

https://www.youtube.com/watch?v=MnIPpUiTcRc

https://www.youtube.com/watch?v=8u47x2dvQHs

Strictly No plagiarism

 

We give our students 100% satisfaction with their assignments, which is one of the most important reasons students prefer us to other helpers. Our professional group and planners have more than ten years of rich experience. The only reason is that we have successfully helped more than 100000 students with their assignments on our inception days. Our expert group has more than 2200 professionals in different topics, and that is not all; we get more than 300 jobs every day more than 90% of the assignment get the conversion for payment.

Place Order Now

Computer Science 2023 Deliverable Length: 3–4-page Word document with Visio-type drawing

2023 i need today if you can do than send me hand shake i need on time i | Assignment Collections

i need today if you can do . than send me hand shake. i need on time . i  can give $3 only .

 

For this assignment take a look at this old IP addressing scheme used in a network and develop a plan for IP addressing that will make more sense for a company’s growth.

XYZ Company has experienced solid growth over the last 4 years and currently has 14 employees. They expect to add an additional 25 employees and will need a different IP network to accommodate the expected growth. The expected growth total of IP devices is 62 that includes printers per department. It also includes IP addresses for wireless access points used by outside sales during in house meetings and also for vendors. Security is an issue so there should only be enough IP addresses to cover up to 62 devices but absolutely no more. For this assignment develop a plan with a new IP addressing scheme that makes more sense for the company’s growth.

The IP scheme is currently employing a static IP arrangement and management would prefer all personal computers, printers and peripheral devices to be assigned dynamically. The current IP addressing subnet is 172.16.1.1/28. The assignment is as follows:
  • Design a new Class C non-routable network and subnet that will allow for future expansion dynamically while addressing security without manual intervention.
  • Specify the strengths and weaknesses of the current IP subnet.
  • Specify the strengths and weaknesses of the replacement IP subnet.
  • Use any IPv4 subnet calculator found on the Internet to calculate the IP addresses for the new devices.

See enclosed diagram:

The company’s current addressing scheme is not hierarchical and does not allow for future expansion.

For this project, you will prepare a network IP-addressing Word document and a Visio drawing, which includes the following:

Click here to download RFC1918.

Review the Request For Comment 1918 concerning private Class A, B & C networks

  • A title page
  • An introduction to the contents of the report
  • A discussion of the current IP addressing scheme and its weaknesses
  • Considerations involved when designing an IP addressing scheme for a subnetted network
  • Documentation of your proposed addressing scheme and how it relates to the overall infrastructure of the network
  • A References page

Adhere to APA reference guidelines when writing your response. Additionally, your response should be free of grammatical errors, use complete sentences, and give specific details to support statements.

Please submit your assignment

 

 

 

We give our students 100% satisfaction with their assignments, which is one of the most important reasons students prefer us to other helpers. Our professional group and planners have more than ten years of rich experience. The only reason is that we have successfully helped more than 100000 students with their assignments on our inception days. Our expert group has more than 2200 professionals in different topics, and that is not all; we get more than 300 jobs every day more than 90% of the assignment get the conversion for payment.

Place Order Now

Computer Science 2023 IT

2023 In Ch 1 Introduction to Information Security of Elementary Information Security you read about National Institute of Standards | Assignment Collections

 

In Ch. 1, “Introduction to Information Security,” of Elementary Information Security, you read about National Institute of Standards and Technology (NIST) Risk Management Framework (RMF) and how it expands on the CIA concepts.

Assume that a security model is needed for the protection of information in your class. 

In a 1/2- to 1-page paper, describe the RMF and how it relates to the CIA concepts and expands on them. Explain how this framework is used to address the need to protect information in your class.

 

We give our students 100% satisfaction with their assignments, which is one of the most important reasons students prefer us to other helpers. Our professional group and planners have more than ten years of rich experience. The only reason is that we have successfully helped more than 100000 students with their assignments on our inception days. Our expert group has more than 2200 professionals in different topics, and that is not all; we get more than 300 jobs every day more than 90% of the assignment get the conversion for payment.

Place Order Now

Computer Science 2023 Discussion 1 Response – Cyber Law

2023 Question Read Chapter 1 of the Goldman Textbook and describe in a minimum of 500 words what the | Assignment Collections

 Question : Read Chapter 1 of the Goldman Textbook and describe in a minimum of 500 words what the Internet is and how it has changed the world. 

I am adding my classmate’s response for the above question. You will have to write response for each post in 250 words. No references needed.  

Discussion 1: (RajeshKumar Kodali) 

The internet definitely changed somewhere between 1989 and 1995.

 The main source was privatization. After a progression of meetings, adjustments and startups, in 1993 the National Science Foundation declared plans to privatize all administrative resources associated with Internet work, helping those who were successful in mid-1995. Why? In short, NSF wanted to attract private customers and, in that sense, share the expensive picture of the Internet with them. NSF was simply pursuing its main goal of supporting US research: it was confident that a huge usage size would cut costs. (Indeed, it certainly had an unexpected result.) (Bruce, 1999).

Privatization had another unexpected result. It allowed application designers to think about building commercial applications for a previously unknown set of customers (e.g., any business or family outside scouting universities) and uses (e.g., e-commerce). This has opened up a completely different range of possible applications for the Internet and expanded its capabilities.

 The next reason was the innovation of the World Wide Web. Tim Berners-Lee decided to offer his product in shareware destinations in 1991. He founded the World Wide Web Consortium in 1994. The program had just begun to spread widely in university and soon spread everywhere. This made web applications the essential use of the internet framework and eradicated email as the primary function of the internet (Bruce, 1999).

Surprisingly, the size of the Internet began to change dramatically after 1995. From then on, it developed rapidly, surprising three billion customers the last time anyone checked. The number of pages of commercial websites has reached huge and incomprehensible figures (Bruce, 1999)

Now consider 2005-2015,Many additional applications were developed in the Internet / Web header. Perhaps the most unusual changes have occurred in the last decade with the increase in real time to watch videos and games. This detects stresses on the Internet that were not initially intended for, for example, the continuous (and without interference!) Movement of a lot of information to end customers. It also inspires massive internet usage and makes many customers willing to spend more money on faster collaborations (Glaser et al., 2002).

This also convinces numerous providers to provide customers with what they need and has prompted numerous organizations to find better approaches to utilize the additional throughput. Additionally, it inspired the fabric of the cloud, fundamentally to bring storage closer to customers, which also reconfigured the Internet in ways not initially proposed by planners. (Hi anyway, it improves the experience, so no one is complaining.)

There is another wonderful change in the Internet: the expansion of numerous devices. There was no single Internet solution for remote neighbourhoods, such as Wi-Fi. There were no plans for advanced tablets or mobile phones. There were no plans for NEST indoor dimmers, cameras from your garden, or Netflix on the porch by the pool. However, we can do each of these things on the basis that the conventions of the Internet have been expanded, reformed, modified, shaped, changed, modernized, undone, and imaginatively reconfigured for a wide variety of purposes (Glaser et al., 2002).

Someone else can focus on the many advancements to the Web over the past twenty years. This has also changed the number of customers using the internet.

————————————————————————————–

Discussion 2:(Dheeraj Kumar)

Internet is globally connecting networking systems that facilitate worldwide communications and will accessing to the data resource through huge collection of government, academic, business, public and private network. It is been governed by the agencies like as Internet Assigned Numbers Authority that will establish the universal protocols. Term World Wide Web and internet will be often be used in interchangeably but they will not be same thing internet will refer to global communication systems, includes infrastructure and hardware while web is services that is communicated over internet (Zaryn.D, 2020).

Internet is originated with US government that began in building computer networks in 1960 referred as ARPANET. In the year 1985, US nation’s science foundation commissioned development of university networks backbone referred as NSFNET. System is been replaced by the new network operated commercial internet service provider in the year 1995 Internet is brought to public on the large scale around this time  As the global network responsible for large amounts of the data transfer and the process facilitation . Intent is been evolving constantly. Rapid developments of internet have created an unstable, significant change to everyday lives of ours. Impact intent have on the society is that felt almost on everything we do from that of ordering a pizza to latest news. To have affected the way we are communicating, the way we are learning in regards to the events and our brain functions. At this point racing in catching up with the developing the web technologies, create social evolutions that have impacted the way we will celebrates significant life events. Internet have affected ways we form and maintain the relationship with the family, acquaintance and friends. Now that we could interact with other and keep other update on lives of our be much easily that that of the past, notion of the intimate relationship have changed. For example the social media allow the people in constantly updating the networks in regards to the lives. Using the text posts, videos, photos we will present ourselves to people around us allow us in staying in touch every moment with the people who will care in regards to the people we do not. Cause acquaintance from past few years political learning where we will go to and graduate from the school .This could create new sense of an intimacy that will not exist sin past as people feels that they know all there is in knowing in regards to people in the lives This will in turn have been decrease actually significance of personal life events like as high school reunion and family. Beginning of 21st century have seem more is in the social media and some interactive, crow base communication platform. Revolution have upended ways we will think in regards to the personal life events because of fact that with internet we will have the access in more variety of the options and ideas and now that everyone have say. Where as it is hard to say that internet is sole reason  of this developments there is no denying that this have made significant impact on the way it is used in our day to day lives (Drew.H, 2020).

 

We give our students 100% satisfaction with their assignments, which is one of the most important reasons students prefer us to other helpers. Our professional group and planners have more than ten years of rich experience. The only reason is that we have successfully helped more than 100000 students with their assignments on our inception days. Our expert group has more than 2200 professionals in different topics, and that is not all; we get more than 300 jobs every day more than 90% of the assignment get the conversion for payment.

Place Order Now

Computer Science 2023 Week 8

2023 Question 1 1 TCO 1 Which of the following statements is are true Points 5 A The implementation of a class | Assignment Collections

 

 

 

Question 1.1. (TCO 1) Which of the following statements is/are true? (Points : 5)

 

       A. The implementation of a class should be hidden, as best practice.

 

       B. The state of an object is defined as the attributes and behaviors of that object.

 

       C. Striving for the fullest possible interface of a class, incorporating possible future class needs, is the goal when designing a class.

 

       D. An interface of a class defines what messages an object can respond to.

 

       All are true

 

       None are true

 

       Only A and D are true

 

 

 

 

 

Question 2.2. (TCO 2) Which of the following components of a class definition can be overloaded? (Points : 5)

 

       Any object

 

       Constructor

 

       Static data members

 

       All of the above

 

       None of the above

 

 

 

 

 

 

 

Question 3.3. (TCO 5) Which of the following method pairs are not examples of method overloading? (Points : 5)

 

       public void dance()

 

public int dance(int x)

 

       public int walk(int x, int y)

 

public void walk(int x, int y, int z)

 

       public int jump(int x, int y)

 

public void jump(int y, int x)

 

       All of the above

 

       None of the above

 

 

 

 

 

Question 4.4. (TCO 1) Which of the following statements is/are true? (Points : 5)

 

       You can create sub-classes and sub-objects.

 

       By using the keyword class in your program, memory is allocated for the object being defined.

 

       In object-oriented programming we design the program as a set of cooperating methods.

 

       None of the above

 

 

 

 

 

Question 5.5. (TCO 1) Which of the following would be the most appropriate choice for a method in a Computer class? (Points : 5)

 

       monitorSize

 

       reboot

 

       processorType

 

       keyboard

 

 

 

 

 

Question 6.6. (TCO 2) Which of the following statements is/are true? (Points : 5)

 

       A. The compiler generated default constructor does the exact same job as any user defined default constructor

 

       B. A common use of information hiding is to hide the physical storage layout of data.

 

       C. A private (helper) method is part of a class’s implementation.

 

       All of the above

 

       Only B and C

 

 

 

 

 

Question 7.7. (TCO 2) You are given a Shape class that was designed with the concept of a black box in mind. You need to integrate the Shape class into your own code. Which of the following statements are true? (Points : 5)

 

       You need to analyze each method’s implementation that you plan to use in order to understand it thoroughly.

 

       You need to figure out the inputs and outputs that are associated with the class.

 

       You may have to modify the internal processing to meet the needs of your specific class.

 

       Without a properly constructed UML diagram you cannot be sure how the new class will integrate with your code.

 

 

 

 

 

Question 8.8. (TCO 2) Given a private string attribute called homeState, which of the following are proper pseudocode implementations for a getter and a setter? (Points : 5)

 

       string getHomeState(){return homeState }

 

int setHomeState(string newHomeState){return homeState }

 

       void getHomeState(){return homeState }

 

void setHomeState (int newHomeState){homeState = newHomeState}

 

       string getHomeState(){return homeState }

 

void setHomeState (string newHomeState){ homeState = newHomeState}

 

       string getHomeState (){homeState = newHomeState}

 

void setHomeState (string newHomeState){ homeState = newHomeState}

 

 

 

 

 

Question 9.9. (TCO 2) You are tasked to create an EntertainmentSystem class and you want to minimize data dependencies. You also need to protect specific attributes from outside entities. What object-oriented concept(s) would you use to accomplish these goals? (Points : 5)

 

       Composition of classes

 

       Universal access to methods

 

       Inheritance

 

       Encapsulation

 

       All of the above

 

 

 

 

 

 

 

Question 10.10. (TCO 4) Select the false statement regarding inheritance.

 

(Points : 5)

 

       A child class can have more functionality than parent class.

 

       A child class can itself be parent class.

 

       Common functionality needs to be designed in the parent class.

 

       Parent classes are usually more specific than child classes.

 

 

 

 

 

 

 

Question 11.11. (TCO 4) A Lamp class, LightBulb and OilLamp class have what type of relationships?

 

(Points : 5)

 

       The Lamp is a LightBulb, and the Lamp is an OilLamp.

 

       The LightBulb has an OilLamp, and the OilLamp is a Lamp.

 

       The Lamp has a LightBulb, and the OilLamp is a Lamp

 

       The LightBulb has an OilLamp, and the Lamp is an OilLamp.

 

 

 

 

 

 

 

Question 12.12. (TCO 3) Which of the following is true about identifying a class based on a set of requirements?

 

(Points : 5)

 

       After the requirements are documented, the process of identifying classes can begin.

 

       One way to identify classes is to identify nouns in the problem analysis.

 

       Responsibilities of each class need to be identified after classes are identified.

 

       All of the above

 

 

 

 

 

Question 1.1. (TCO 3) What does SOW stand for in the object-oriented design process?

 

(Points : 5)

 

       Sequence of work

 

       Structure of work

 

       Statement of work

 

       None of the above

 

 

 

 

 

 

 

Question 2.2. (TCO 4) What are the benefits to create another derived class instead of adding new functionalities to the program?

 

(Points : 5)

 

       Saves time on debugging the program

 

       Simplifies testing

 

       No need to re-test the previously written class

 

       All of the above

 

       None of the above

 

 

 

 

 

 

 

Question 3.3. (TCO 6) What is polymorphism?

 

(Points : 5)

 

       An advanced form of inheritance

 

       A single usefulness for program specificity

 

       One interface, many implementations

 

       Data hiding

 

 

 

 

 

Question 4.4. (TCO 7) Which of the following statements are false? (Points : 5)

 

       Interfaces specify a contract that must be respected by programmers implementing the interface.

 

       Interfaces specify one or more method signatures and at least one implementation.

 

       Interfaces can be used in some object-oriented languages to implement a form of multiple inheritance.

 

       Interfaces are often implemented by regular classes.

 

 

 

 

 

Question 5.5. (TCO 7) In an object-oriented program, an abstract method might be found in an _____ and/or a(n) _____. (Points : 5)

 

       abstract class; base class

 

       abstract class; interface

 

       interface; base class

 

       None of the above

 

 

 

 

 

Question 6.6. (TCO 7) In terms of object-oriented programming, rules for the use of an application programming interface or framework can be enforced through the use of a(n) _____. (Points : 5)

 

       encapsulation

 

       inheritance hierarchy

 

       contract

 

       object constructed with a multi-arg constructor

 

       None of the above

 

 

 

 

 

Question 7.7. (TCO 8) Data/information hiding and encapsulation improves construction and maintenance because:

 

(Points : 5)

 

       A. Program bugs are isolated to a single class.

 

       B. Programming to an interface makes the code more logical.

 

       Both A and B

 

       None of the above

 

 

 

 

 

 

 

Question 8.8. (TCO 8) What are some of the characteristics of “self-documenting” code?

 

(Points : 5)

 

       Detailed comments, addressing all aspects of the code

 

       Deep levels of nesting to ensure all situations are addressed

 

       Straightforward algorithms

 

       All of the above

 

       None of the above

 

 

 

 

 

 

 

Question 9.9. (TCO 9) Which of the following allow a programmer to reduce the complexity of an object-oriented program?

 

(Points : 5)

 

       Create each class in a separate file

 

       Using packages as a container for logically related items

 

       Using packages to create global types

 

       All of the above

 

       None of the above

 

 

 

 

 

 

 

Question 10.10. (TCO 7) Which of the following declares an abstract method in an abstract Java class? (Points : 5)

 

       public abstract calculateTip();

 

       public abstract double calculateTip();

 

       public double abstract calculateTip();

 

       public double calculateTip() {}

 

 

 

 

 

Question 11.11. (TCO 4) Given the following class definition, which of the methods defined in ClassB would not be inherited by a derived class?

 

 

 

public class ClassB {

 

 

 

            void greatMethod(){      

 

                        System.out.println(“ClassB greatMethod”);

 

            }

 

           

 

            private void greatPrivateMethod(){

 

                        System.out.println(“ClassB greatPrivateMethod”);

 

            }

 

            

 

            public void greatPublicMethod(){

 

                        System.out.println(“ClassB greatPublicMethod”);

 

            }

 

} (Points : 5)

 

       greatMethod

 

       greatPrivateMethod

 

       greatPublicMethod

 

       All three methods are inherited

 

       None of the methods will be inherited

 

 

 

 

 

Question 12.12. (TCO 7) Which of the following is a proper instantiation of the abstract class show below?

 

 

 

public abstract class Mountain{} (Points : 5)

 

       Mountain newMountain = Mountain();

 

       Mountain newMountain = Mountain.mountain();

 

       Mountain newMountain = super.mountain();

 

       None of the above

 

       All of the above

 

 

 

Question 1.

1.   RspGF=”font-family:’Arial’;font-size:10pt;”(TCO 2) Provide an example, which shows the

 distinction between Encapsulation and Data/Information Hiding in object-oriented programming. (Points : 18)

      

      

 

 

 

Question 2.

2.   RspGF=”font-family:’Arial’;font-size:10pt;”(TCO 2) Keeping in mind all object-oriented

 programming best practices, create a class for a Computer, with the following specifications:

1. Specify two data members

2. Default Constructor

3. Overloaded Constructor which takes both data member values as input.

4. Generate a unique identification number for each object instantiated from this class. Use a static data member to keep track of the identification number last assigned to an object so that duplications will not occur. 

5. Show a statement which instantiates an object of this class using the overloaded constructor.

You do not need to provide any accessor/mutator methods or other methods.

(Points : 18)

      

      

 

 

 

Question 3.

3.   RspGF=”font-family:’Arial’;font-size:10pt;”(TCO 2) Given the following list of classes,

 attributes and methods,

 

– identify which items are classes, which items are attributes and which items are methods;

 

– identify which class each attribute and method belongs to; and

 

– suggest a class hierarchy given your list of classes.

 

*Note – no particular capitalization scheme is used in the list below to differentiate between classes,

methods, and attributes.

 

LandOnStatue, NumberOfLegs, Height, ShoeSize, Eat, Animal, Speak, WingSpan, Age,

Peck, Sleep, Horse, LengthOfMane, Move, BeakLength, LengthOfTail, Bird, SaddleUp (Points : 18)

      

      

 

 

 

Question 4.

4.   RspGF=”font-family:’Arial’;font-size:10pt;”(TCO 2) Briefly describe what an interface is

and how it can be used in an object-oriented program. Provide example pseudocode

showing how an s Interface might be constructed.  (Points : 18)

      

      

 

 

 

Question 5.

5.   RspGF=”font-family:’Arial’;font-size:10pt;”(TCO 7) How do you distinguish between

abstract and normal methods?  How do you use an abstract class and the methods

defined inside it? Provide pseudocode that represents an abstract class with at least one

abstract method.

(Points : 18)

      

      

 

 

 

Question 6.

6.   RspGF=”font-family:’Arial’;font-size:10pt;”(TCO 2) Define and implement the overloaded

constructors that support the following test function for a Cube class. The data member for

 the Cube class is side which holds an integer.

 

public static void main(String args[])

{

//c1 will take all default values

Cube c1();        

 

//c2 will take supplied side value

            Cube c2(6);

 

            //c3 will take the same value of c2         

            Cube c3=c2;   

 

//the rest of the code

}

(Points : 18)

      

      

 

 

 

Question 7.

7.   RspGF=”font-family:’Arial’;font-size:10pt;”(TCO 7) Create a Java Interface called Fruit that

contains two method declarations: ripen and emitAroma. Create a Java class called Nectarine

 that implements the Fruit interface and includes two attributes: gramsOfSugar and

weightInOunces. Finally, show an instantiation of the Nectarine class that sets the

Nectarine’s gramsOfSugar to 30 and weightInOunces to 4. (Points : 22)

      

      

 

 

 

 

We give our students 100% satisfaction with their assignments, which is one of the most important reasons students prefer us to other helpers. Our professional group and planners have more than ten years of rich experience. The only reason is that we have successfully helped more than 100000 students with their assignments on our inception days. Our expert group has more than 2200 professionals in different topics, and that is not all; we get more than 300 jobs every day more than 90% of the assignment get the conversion for payment.

Place Order Now

Computer Science 2023 Conduct Your Own Research On The DEEP WEB And The DARK WEB. Explain The Differences And Why They Exist. Include The Types Of Information That May Be Found On Each.

2023 The terms deep web and dark web are often used interchangeably but they are not the same Deep | Assignment Collections

 

The terms deep web and dark web are often used interchangeably, but they are not the same. Deep web simply refers to anything on the web that can’t be found using a search engine like Google or Bing, or even DuckduckGo.

This means anything behind a paywall, anything that is password protected, or anything that is dynamically generated and doesn’t have a permanent URL — all of these things are said to comprise the deep web because they don’t exist at the surface of the web.

Conduct your own research on the DEEP WEB and the DARK WEB. Explain the differences and why they exist. Include the types of information that may be found on each.

 

We give our students 100% satisfaction with their assignments, which is one of the most important reasons students prefer us to other helpers. Our professional group and planners have more than ten years of rich experience. The only reason is that we have successfully helped more than 100000 students with their assignments on our inception days. Our expert group has more than 2200 professionals in different topics, and that is not all; we get more than 300 jobs every day more than 90% of the assignment get the conversion for payment.

Place Order Now