Develop a Java application that plays

  

Develop a Java application that plays a “guess the number” game as described below.
a) Your application first gets a random number in the range 1-1000 inclusive (you might want to use Math.random() or the Random class).
b) The application then displays the following prompt (probably via a JLabel):
I have a number between 1 and 1000. Can you guess my number?
Please enter your first guess.
Post a textbox for the user to enter a number and post a message telling the user to hit ‘Enter’ after entering a guess in a textbox (probably using a JTextField).
c) Input the user’s guess in the code for a previously-registered event-handler method (consider using the event-handling approach discussed in the text, or the actionPerformed() method of class based on the ActionListener interface, which will require some additional research outside the text).
d) For the first guess, color the entire background red, meaning that they are getting warmer (you might want to use the setBackground() method for a container). If this is the second or later guess, and they are further from the correct number than the last guess, then color the entire background blue. If they get the correct number then color the background some other color than red or blue.
e) If the user guessed the number correctly, respond with their number, post a congratulatory message, get a new random number, and display a JButton to start a new game. Otherwise, to help the user close in on the correct number, post a message, with their guessed number, whether they are “TOO HIGH” or “TOO LOW” from the correct number, and whether they are “WARMER” or “COLDER” (this should match the background color). Also report the guess number of the next guess (e.g. “Enter guess number nnn”). You might want to use a concatenated string in JLabel for these incorrect guess messages.
f) The process is repeated each game until the user guesses the correct number. Be sure that you erase obsolete status messages. 

Organ Leader and decision making PHDIT 11

 

  1. Discuss the key components of human resource management.  Pick at least four concepts from chapter nine and describe how these concepts interrelate to individual performance on a team.
  2. Review table 9.2 and select one of the dimensions listed, note why it was chosen and how you relate to this behavior.  If you have a personal experience, please share.
  3. How do leaders select the best talent? What are some tools they can use to select the best-talent

 

Computer Security

 

Using the Web or other resources, do a bit of research on the methodologies that Microsoft Windows firewall uses. Define a firewall. Define firewall security techniques. Consider the strengths and weaknesses of the Microsoft approach.

Write between 250 and 300 words.

Use your own words

discussion

 

Below are the steps used in data mining. Please provide why each of the steps listed below are important in data mining:

1. Business understanding

2. Data understanding

3. Data preparation

4. Modeling

5. Evaluation

6. Deployment

CS1026: Assignment 3 – Sentiment Analysis

    

CS1026: Assignment 3 – Sentiment Analysis
Weight: 11%
Learning Outcome:
By completing this assignment, you will gain skills relating to
• using functions,
• complex data structures,
• nested loops,
• text processing,
• file input and output,
• exceptions in Python,
• writing code that is used by other programs.
Background:
With the emergence of Internet companies such as Google, Facebook, and Twitter, more and more data accessible online is comprised of text.  Text ual  data and the computational means of processing it and extracting information is also increasingly more important in areas such as business, humanities, social sciences, etc.  In this assignment, you will deal with textual analysis.
Twitter has become very popular, with many people “tweeting” aspects of their daily lives.  This “flow of tweets” has recently become a way to study or guess how people feel about various aspects of the world or their own life.  For example, analysis of tweets has been used to try  to determine how certain geographical regions may be voting – this is done by analyzing the content, the words, and phrases, in tweets.  Similarly, analysis of keywords or phrases in tweets can be used to determine how popular or unpopular a movie might be.  This is often referred to as sentiment analysis.
Task:
In this assignment, you will write a Python module, called sentiment_analysis.py (this is the name of the file that you should use) and a main program, main.py, that uses the module to analyze Twitter information.  In this module, you will create a function that will perform simple  sentiment analysis on Twitter data.  The Twitter data contains comments from individuals about how they feel about their lives and comes from individuals across the continental United States.  The objective is to determine which timezone (Eastern, Central, Mountain, Pacific; see below for more information on how to do this) is
the “happiest”.  To do this, your program will need to:
• Analyze each individual tweet to determine a score – a “happiness score”.
• The “happiness score” for a single tweet is found by looking for certain keywords (which are given) in a tweet and for each keyword found in that tweet totaling their “sentiment values”.  In this assignment, each value is an integer from 1 to 10.
The happiness score for the tweet is simply the sum of the “sentiment values” for
keywords found in the tweet divided by the number of keywords found in the tweet.
If there are none of the given keywords in a tweet, it is just ignored, i.e., you do NOT
count it.
To determine the words in a tweet, you should do the following:
o Separate a tweet into words based on white space. A “word” is any sequence of
characters surrounded by white space (blank, tab, end of line, etc.).
o You should remove any punctuation from the beginning or end of the word.  So,
“#lonely” would become “lonely” and “happy!!” would become “happy”.
o You should convert the “word” into just lower case letters.  This gives you a “word”
from the tweet.
o If you match the “word” to any of the sentiment keywords (see below), you add the
score of that sentiment keyword to a total for the tweet; you can just do exact
matches.
• A “counted tweet” is a tweet in which there was at least one matched keyword.
• The “happiness score” for a timezone is just the total of the scores for all the counted
tweets in that region divided by the number of counted tweets in that region; again, if a
tweet has NO keywords, then it is NOT counted as a tweet in that timezone.
A file called tweets.txt contains the tweets and a file called keywords.txt contains keywords and scores for determining the “sentiment” of an individual tweet.  These files are described in more detail below.
File tweets.txt
The file tweets.txt contains the tweets; one per line (some lines are quite long).  The format of a tweet is:
  [lat, long] value date time text
where:
• [lat, long] – the latitude and longitude of where the tweet originated.  You will need
these values to determine the time zone in which the tweet originated.
• value – not used; this can be skipped.
• date – the date of the tweet; not used, this can be skipped.
• time – the time of day that the tweet was sent; not used this can be skipped.
• text – the text in the  tweet.
File keywords.txt
The file keywords.txt contains sentiment keywords and their “happiness scores”; one per line.
The format of a line is:
  keyword, value where:
• keyword – the keyword to look for.
• value – the value of the keyword; values are limited to 1, 5, 7 and 10, where 1
represents very “unhappy” and 10 represents “very happy”.
(you are free to explore different sets of keywords and values at your leisure for the sheer fun of it!).
Determining timezones across the continental United States
Given a latitude and longitude, the task of determining exactly the location that it corresponds to can be very challenging given the geographical boundaries of the United   States.  For this assignment, we simply approximate the regions corresponding to the timezones by rectangular areas defined by latitude and longitude points.  Our approximation  looks like:
             p9                         p7                           p5                          p3                       p1
 

                           p10                       p8                           p6                            p4                       p2
So the Eastern timezone, for example, is defined by latitude-longitude points p1, p2, p3, and p4.  To determine the origin of a tweet, then, one simply has to determine in which region the latitude and longitude of the tweet belongs.  The values of the points are:
 

Pacific Mountain Central Eastern
p1   =  (49.189787, -67.444574)
p2   =  (24.660845, -67.444574)
p3   =  (49.189787, -87.518395)
p4   =  (24.660845, -87.518395)
p5   =  (49.189787, -101.998892)
p6   =  (24.660845, -101.998892)
p7   =  (49.189787, -115.236428)
p8   =  (24.660845, -115.236428)
p9   =  (49.189787, -125.242264)
p10 =  (24.660845, -125.242264)
Functional Specifications:
Developing code for the processing of the tweets and sentiment analysis.
1. Your module sentiment_analysis.py must include a function compute_tweets that has two parameters.  The first parameter will be the name of the file with the tweets and the second parameter will be the name of the file with the keywords.  This function will use these two files to process the tweets and output the results.  This function should also check to make sure  that both files exist and if either does not exist, then your program should generate an exception and the function compute_tweets should return an empty list (see part 1.d below).
a. The function should input the keywords and their “happiness values” and store them in a data structure in your program (the data structure is of your choice, but you might consider a list).
b. Your function should then process the file of tweets, computing the “happiness score” for each tweet and computing the “happiness score” for each timezone.  You will need to read the file of tweets line by line as text and break it apart.  The string processing functions in Python (see Chapter 7) are very useful for doing this. Your program should not duplicate code. It is important to determine places that code can be reused and create functions. Your program should ignore tweets with no keywords and also ignore tweets from outside the time zones.
c. Once you have completed processing the entire file, your function should print out:
i. The “happiness score” for each timezone.
ii. The number of tweets found in that timezone.
d. Your function, compute_tweets, should return a list of tuples.
  The tuples contain the results
of each of the regions, in order:  Eastern, Central, Mountain, Pacific.  Each tuple contains two values: (average, count), where average is the average “happiness value” of that region and count is the number of tweets found in that region.
Note: if there is an exception from a file name that does not exist, then an empty list should be returned.
2. Your main program, main.py, will prompt the user for the name of the two files – the file containing the keywords and the file containing the tweets.  It will then call the function compute_tweets with the two files to process the tweets using the given keywords.  Your main program will get the results from compute_tweets and print the results; it should print the results in a readable fashion (i.e.,  not just numbers).
3. You are also given a program, driver.py, and some test files.  The test files are small files of tweets and keywords that driver.py uses to test your program – that is, it will import your program and will make use of the function compute_tweets.  The
 files tweets1.txt and tweets2.txt are small
files with tweets and the files key1.txt and key2.txt contain keywords and “happiness values”.  The program driver.py will use these to test your function.  You should use the program and these files to test your code.
Note: while driver.py does some testing, it is by no means guaranteed to test
for all possibilities; you should do some of your own testing.
Additional Information
For both files, it is advised that when you read in the files you the line below to avoid encoding errors.
 open(“fileName.txt”,”r”,encoding=”utf-8″)  or  open(‘fileName.txt’, encoding=’utf-8′, errors=’ignore’)
 

Non-functional Specifications:
1. Include brief comments in your code identifying yourself, describing the program, and describing key portions of the code.
2. Assignments are to be done individually and must be your own work.  Software may be used to detect cheating.
3. Use Python coding conventions and good programming techniques, for example:
• Meaningful variable names
• Conventions for naming variables and constants
• Use of constants where appropriate
• Readability: indentation, white space, consistency
You should submit the files main.py and sentiment_analysis.py (others are not required).  Make sure you attach your python file to your assignment; DO NOT put the code inline in the textbox.
What You Will Be Marked On:
• Functional specifications:
• Is the program named correctly for testing, i.e., is the module correctly named
sentiment_analysis.py ? Is there a function compute_tweets ?
• Is there a program main.py which imports and makes use of the module
sentiment_analysis.py?
• Does the program behave according to specifications?  Does it
 work on with the test program, driver.py ?
• Does the program handle incorrect function names?
• Is there an effective use of functions beyond compute_tweets ?
• Is the output according to specifications?
• Note: A program like driver.py and test files will be used to test your program
as well.
• Non-functional specifications: as described above.
• Assignment submission: via the OWL, though the assignment submission in OWL.
 

Discussion – Information Governance

According to your readings, cloud computing represents one of the most significant paradigms shifts in information technology (IT) history, due to an extension of sharing an application-hosting provider that has been around for many years, and was common in highly regulated vertical industries like banks and health care institutions.  The author’s knowledge from their research continue to assert that, the impetus behind cloud computing lies on the idea that it provides economies of scale by spreading costs across many client organizations and pooling computing resources while matching client computing needs to consumption in a flexible, real-time version. 

Identify the issues and risks that pose concern to organizations storing data in the cloud –  briefly support your discussion.

Please make your initial post substantive. A substantive post will do at least two of the following:

  • Ask an interesting, thoughtful question pertaining to the topic
  • Answer a question (in detail) posted by another student or the instructor
  • Provide extensive additional information on the topic
  • Explain, define, or analyze the topic in detail
  • Share an applicable personal experience
  • Provide an outside source (for example, an article from the UC Library) that applies to the topic, along with additional information about the topic or the source (please cite properly in APA)
  • Make an argument concerning the topic.

At least two scholarly source should be used in the initial discussion thread. Be sure to use information from your readings and other sources from the UC Library. Use proper citations and references in your post.

References:

 

Textbook: Chapter 15 – Information Governance for Cloud Computing

A Comparative Study of Data Deduplication Strategies. (2018). 2018 First International Conference on Secure Cyber Computing and Communication (ICSCCC), Secure Cyber Computing and Communication (ICSCCC), 2018 First International Conference On, 68. Retrieved from https://ieeexplore.ieee.org/document/8703363?arnumber=8703363

 Patricia C. Franks. (2015). New Technologies, New Challenges: Records Retention and Disposition in a Cloud Environment, 39(2), 191–209.

Schmidt, P. J., Wood, J. T., & Grabski, S. V. (2016). Business in the Cloud: Research Questions on Governance, Audit, and Assurance. Journal of Information Systems, 30(3), 173–189. https://doi.org/10.2308/isys-51494

Introduction to health care

Read/review professionalism in chapter 13. In your own words, what does “professionalism” mean to you? 

In addition, list at least three example of the following:
  • Professional behaviors
  • Professional Health Care Skills
  • Professional Appearance



Reference
Haroun, L., & Mitchell, D. (2021). In Introduction to Health Care. Cengage.

Effects of Surveillance on Consumers

Submit your final project topic here. 

Topic: Effects of Surveillance on Consumers

Your Research Project on the surveillance state consists of two parts:

1 a Powerpoint presentation consisting of at least 12 slides not including title and references.

2. 750 word research  paper with at least 3 sources. There should be no lists. Write in essay format not outline format. Include a meaningful title.

you can include below in the paper:

 – Introduction of Effects of surveillance on consumer

– Benefits of Surveillance

– Disadvantages

– The Faced challenges 

– Conclusion

Do not double space.

You must include at least 3 quotes from your sources enclosing the copied words in quotation marks and cited in-line. 

 

Assignment

1 page
– Explain network security plan and network security policy and their differences.

– What are some methods for keeping hackers from viewing and changing router and switch configuration information?