Scenario and Summary

  

Scenario and Summary 

 In this lab you will create a single program that creates and reads a sequential file.

  

Deliverables

Program files for each of the following two programs

  1. GuessGame 
  2. Text File I/O 

At the beginning of ALL your programs, put a comment box that includes the program name, your name, and a brief description of the program. 

Example: 

/***********************************************************************
Program Name: ProgramName.java
Programmer’s Name: Student Name
Program Description: Describe here what this program will do
***********************************************************************/ 

How to submit your assignment: 

  1. The programs MUST have the same names as the assignment      title. 
  2. Each Java source file (*.java) must include a      corresponding class file (*.class) program as evidence of success. 
  3. In addition to the program source code files and byte      code files, put all your program source code files and screen shots of      your program output files into a Word document. 
  4. You must use a zipped folder to send your weekly      assignment to the Dropbox. Do not send subfolders within your zipped      folder. Place ALL of the .java and .class files for the week into the one      zipped folder. The zip folder should be named:      CIS355A_YourLastName_iLab_Week5, and this zip folder will contain all the      weekly programming assignments.

  

i L A B S T E P S 

  

STEP 1: GuessGame (20   points)

Back to Top

Write a program named GuessGame.java that plays the game “guess the number” as follows: Your program chooses the number to be guessed by selecting an integer at random in the range 1–100 The program then displays the following in a label.

I have a number between 1 and 100 — can you guess my number?

Please enter your guess: ____________________

A JTextField should be used to input the guess. A JButton must be provided to allow the user to press each time a guess is entered. As each guess is input, the background color should change to either red or blue. Red indicates that the user is getting warmer, and blue indicates that the user is getting colder. A JLabel should display either Too High or Too Low to help the user zero in on the correct answer. When the user gets the correct answer, Correct! should be displayed, and the JTextField used for input should be cleared and changed to be uneditable. Also, a JButton should be provided to allow the user to play the game again. When the New Game JButton is clicked, a new random number should be generated and the input JTextField changed to be editable. A JButton must be provided to allow the user to exit the application. Also provide a count of the number of guesses the user entered when the correct number is guessed. 

Grading Rubric 

   

GuessGame

Points

Description

 

Standard header included

1

Must contain program’s name, student name, and description of   the program

 

Program compiles

1

Program does not have any error

 

Program executes

1

Program runs without any error

 

GUI contains the required   labels

2

GUI contains the label with the initial question, the label for   the input field, and the label for the Too high or Too low message

 

GUI contains input text   field for the guess

2

GUI contains the input field for entering the guess

 

GUI contains the Guess, New   Game, and Exit buttons

3

GUI contains the Guess button, New Game button, and Exit button

 

Each button handles the   corresponding events properly

6

Each button handles and processes its corresponding behavior

 

Program displays the   correct output

4

Program displays the correct messages, changes the colors   appropriately, and displays the count of guesses

 

Subtotal

20

  

STEP 2: Text File I/O (20   points)

Back to Top

Write a program called TextFileIO.java to create a file named numbers.dat. Then create an algorithm that writes all even numbered integers from 1 to 100, separated by a comma. After the file has been created, close and reopen the file and display the results to the screen. After the results have been displayed append the odd number integers from 1 to 100, separated by a comma to the end of the file. Reopen the file and display the results. The contents of the file should be the even numbers from 1 to 100 separated by a comma followed by the odd number from 1 to 100 separated by a comma. The output of this program would be something like the following 

2,4,6,8,10,12,14,……,98,100
2,4,6,8,10,12,14,……,98,100,1,3,5,7,9,……..97,99 

INT 2681…..3

Do the following labs in testout

lab 3.3.3

lab 3.1.10

lab 4.1.7

lab 4.2.3

lab 4.2.5

lab 4.2.6

lab 4.2.9

lab 5.1.5

lab 5.1.6

lab 6.1.9

lab 6.1.11

lab 6.1.12

lab 6.2.4

lab 7.4.5

lab 7.4.6

lab 7.4.7

lab 7.4.8

lab 7.4.9

All labs in chapter 8

All labs in chapter 9

All labs in chaper 10

All labs in chapter 11

All labs in chapter 12

All labs in chapter 13

All labs in chapter 14

All labs in chapter 15

SE493 week 8

Each questions 350 words and provide references 

Question 1

What is Risk Management? And provide at least one example of project, product, and business risks.

Note: You do not need to write complex statements taken from web resources. This is a discussion and you will earn better grade if you compose the discussion in your own words and correct grammar based on reading chapter 22 and reputable articles. 

Question 2

Description

Explain why the process of project planning is iterative and why a plan must be continually reviewed during a software project.

Note: Please list your reference/s.

sdlc

 

Part 1: SDLC Cycle  

Write a 300–400 word response reviewing the Systems Development Life  Cycle (SDLC) and Database Life Cycle (DBLC) and how the DBLC fits within  the SDLC. Please provide references to support your response. The items  below should be addressed. 

  • Define the term SDLC.
  • Define the term DBLC.
  • Define how the DBLC fits within the SDLC.

Part 2: Career Roles 

Select a database career role (i.e., database developer, database  designer, database administrator, database analyst, database architect,  database consultant, database security officer, or data manager). Write a  300–400 word summary defining this role. Please provide references to  support your response. The items below should be addressed. 

  • Define the role within an organization (i.e., Who does this role report to? Who does this role oversee?).
  • Define the tasks that this role performs.
  • Provide a job advertisement for this role..

Assignment Requirements 

Your paper should be 2–3 pages in length. Be sure to use appropriate  APA format and cite your textbook or other sources that you used in your  paper. 

The paper should contain sufficient information to adequately answer  the questions and contain no spelling, grammar, or APA errors. 

Written work should be free of spelling, grammar, or APA errors. 

Assignment 350 words 3 references

1. Using a Microsoft Word document, please post one federal and one state statute utilizing standard legal notation and a hyperlink to each statute.

2. In the same document, please post one federal and one state case using standard legal notation and a hyperlink to each case.

ITSD322U2IP

 

Assignment Details

In this assignment you will use a loop and a custom method (or “function”), as well as built-in Java classes. Create a Java program that meets the following requirements:

  1. Ask the user to input a number between 5 and 45. Tell the user to enter 1 if they wish to exit the program.
  2. Store the user’s input in a variable with the integer data type.
  3. Use a while loop to repeat the program, checking the user’s entry in case they entered a 1 to exit the program.
  4. Create a separate method (in the same Java file) called “checkEntry”. This method must use a single parameter of the integer data type. When the user enters a number, pass that number to checkEntry for evaluation (described below).
  5. (In the checkEntry method.) If the user enters a value of less than 35, the checkEntry method must multiply that value by 5 and return the result to main(). If the user enters a value greater than or equal to 35, the program must add 10 to that value and return the result to main().
  6. Display the result of checkEntry’s evaluation on the screen.
  7. Document your code using appropriate in-line comments. This includes variable declarations, input and output methods, and logic. Your comments must explain how the program works to a programmer who is familiar with Java and NetBeans but has not seen this program before.

Your deliverable for this assignment is the NetBeans project you created using the steps above (ZIP the whole folder that contains the project). (No screenshot.)

Note: It is fine if the program evaluates 1 (multiplying it by 5) and displays the success message before terminating. This is the expected behavior for the simplest solution to the program.

Note: This program does not check to see if the user failed to enter a number in the required range. That topic will be examined later in this course.

Tip: As with Unit 1, remember to import the Scanner class by adding the line “import java.util.Scanner” below the “package” declaration.

Please submit your assignment.

Business iNtelligence

 

1. Compare the IoT with regular Internet.

2. Discuss the potential impact of autonomous vehicles on our lives.

3. Why must a truly smart home have a bot?

4. Why is the IoT considered a disruptive technology?

5. AT&T is active in smart city projects. Investigate their activities (solutions). Write a summary.

6. It is said that the IoT will enable new customer service and B2B interactions. Explain how.

7. The IoT has a growing impact on business and e-commerce. Find evidence. Also read Jamthe (2016).

8. Find information about Sophia, a robot from Hanson Robotics. Summarize her capabilities.

Week 2 Assignment

 Length: Minimum of 350 words
Total points: 10 points
Question:In 1994, the U.S. Department of Justice created a set of categories and an associated set of search and seizure guidelines. These categories made the necessary distinction between hardware and information. In this context, hardware refers to all of the physical components of a computer, and information refers to the data and programs that are stored on and transmitted using a computer. The three categories that refer to information all fall under the guise of digital evidence:1. Hardware as Contraband or Fruits of Crime.
2. Hardware as an Instrumentality.
3. Hardware as Evidence.
4. Information as Contraband or Fruits of Crime.
5. Information as an Instrumentality.
6. Information as Evidence.Using the Internet, locate a court case (eg. national, regional, or local) where one or more of these categories were mentioned in the indictment. If the court document does not list the exact category by name, provide as much infomation about the case and why you feel the case should fall under the specific category. Make sure you define and provide background information on the category(s) you have selected. Comments:

  • Provide a URL link to the court case you are referencing in your assignment.  Link must be valid.
  • Answer the questions with an APA-formatted paper (Title page, body and references only).  Your response should have a minimum of 350 words.  Count the words only in the body of your response, not the references.  A table of contents and abstract are not required..
  • Your paper must be submitted to SafeAssign.  Resulting score should not exceed 35%.