C++ I programming

 

Overview

For this assignment you will be building two main components. A menu system and several drawing routines.

The menu system will operate on a whitelist principle and prompt the user for the type of drawing they want and its size. A whitelist is a list of accepted inputs with anything not on the list rejected.

The drawings will all be ASCII shapes of user specified size.

Menu System

The menu should prompt the user for a command and if it is not a valid command, respond it is invalid and prompt again. The commands it needs to respond include:

  • help – This will print a list of all accepted inputs and re-prompt the user.
  • quit – This will terminate the program.
  • square – This will initiate the square drawing.
  • box – This will initiate a box drawing.
  • diagonaldown – This will initiate a diagonal down line.
  • diagonalup – This will initiate a diagonal up line.
  • checkerboard – This will initiate a checkerboard pattern.

The matching for the commands should be case insensitive. That is “Help”, “help”, and “hElP” will all trigger the help command.

Drawings

There are several drawings that your program needs to support

Square

When a square is drawn it will first prompt the user for a size. Valid sizes are 1 through 15 inclusive. An example square of size 5 is

*****
*****
*****
*****
*****

Box

When a box is drawn it will first prompt the user for a size. Valid sizes are 3 through 15 inclusive. An example box of size 5 is

*****
*   *
*   *
*   *
*****

Diagonal Down

When a diagonal down line is drawn, it will first prompt the user for a size. Valid sizes are 3 through 15 inclusive. An example line of size 5 is

*    
*   
 *  
  *
   *

Diagonal Up

When a diagonal up line is drawn, it will first prompt the user for a size. Valid sizes are 3 through 15 inclusive. An example line of size 5 is

    *
  *
 *  
*   
*    

Checkerboard

When a checkerboard drawn, it will first prompt the user for a size. Valid sizes are 5 through 15 inclusive. An example line of size 10 is

* * * * * 
* * * * *
* * * * *
* * * * *
* * * * *
* * * * *
* * * * *
* * * * *
* * * * *
* * * * *

Tips

  • Write your program iteratively. You shouldn’t ever write more than a few lines of code without compiling and testing it.
  • Start with small pieces. It isn’t reasonable to sit down and write the whole program from beginning to end. The pieces you build should ultimately fit together to build the whole program.
  • It is easiest to draw the various shapes using nested for loops.
  • One way to build the program is as follows:
    1. Write a function that accepts user input and validates it against the list of command. Start with it being case sensitive and then add case insensitivity.
    2. Write the functionality to print out a help message, quit, and re-prompting the user on invalid input.
    3. Start with one of the drawings, say a square. Create a function to draw a square. Initially make it draw a fixed size, then allow for it to draw an arbitrary size.
    4. Write a function to prompt the user for a size within a specified range. This function should validate the input is in the specified range and re-prompt if it is outside. Make sure to write this function so that it can be used for multiple drawings which may have different size constraints.
    5. Integrate your size prompt function to fully draw your first chosen shape.
    6. At this point your program should have close to full functionality, with the only thing missing being other shapes.
    7. Add the remaining shapes to the program using the infrastructure you have already built.

Example Output

User input is in bold

Please enter a command: bad
Invalid command
Please enter a command: hElP
Acceptable commands: help, quit, square, box, diagonaldown, diaonalup, checkerboard
Please enter a command: square
Please enter a size between 1 and 15: -1
The value -1 is not in a valid range.
Please enter a size between 1 and 15: 16
The value 16 is not in a valid range.
Please enter a size between 1 and 15: 5

*****
*****
*****
*****
*****

Please enter a command: box
Please enter a size between 3 and 15: 2
The value 2 is not in a valid range.
Please enter a size between 3 and 15: 5

*****
*   *
*   *
*   *
*****

Please enter a command: diagonaldown
Please enter a size between 3 and 15: 7

*      
*     
 *    
  *   
   *  
    *
     *

Please enter a command: diagonalup
Please enter a size between 3 and 15: 7

     *
    *
   *  
  *   
 *    
*     
*      

Please enter a command: checkerboard
Please enter a size between 5 and 15: 13

* * * * * * *
* * * * * *
* * * * * * *
* * * * * *
* * * * * * *
* * * * * *
* * * * * * *
* * * * * *
* * * * * * *
* * * * * *
* * * * * * *
* * * * * *
* * * * * * *

Please enter a command: quit

PreviousNext
 

wk3_531_B

12. Go to data.gov—a U.S. government–sponsored data portal that has a very large number of data sets on a wide variety of topics ranging from healthcare to education, climate to public safety. Pick a topic that you are most passionate about. Go through the topic-specific information and explanation provided on the site. Explore the possibilities of downloading the data, and use your favorite data visualization tool to create your own meaningful information and visualizations.

Organ Leader and Decision Making

 

This week’s journal article was focused on the Complexity of Information Systems Research in the Digital World.  Complexity is increasing as new technologies are emerging every day.  This complexity impacts human experiences.  Organizations are turning to digitally enabled solutions to assist with the emergence of digitalization. 

Please review the article and define the various technologies that are emerging as noted in the article.  Note how these emerging technologies are impacting organizations and what organizations can to do to reduce the burden of digitalization.

Be sure to use the UC Library for scholarly research. Google Scholar is also a great source for research.  Please be sure that journal articles are peer-reviewed and are published within the last five years.

The paper should meet the following requirements:

  • 3-5 pages in length (not including title page or references)
  • APA guidelines must be followed.  The paper must include a cover page, an introduction, a body with fully developed content, and a conclusion.
  • A minimum of five peer-reviewed journal articles.

The writing should be clear and concise.  Headings should be used to transition thoughts.  Don’t forget that the grade also includes the quality of writing.

Reflection of Information Governance Course in a practical manner to current work environment(theories and knowledge could be applied to an employment opportunity)

Requirements:

Provide a 500 word (or 2 pages double spaced) minimum reflection.

Use of proper APA formatting and citations. If supporting evidence from outside resources is used those must be properly cited. 

Share a personal connection that identifies specific knowledge and theories from the Information Governance course. 

Demonstrate a connection to the current work environment. If not employed, demonstrate a connection to your desired work environment. 

should NOT, provide an overview of the course. The assignment asks that you reflect how the knowledge and skills obtained through meeting course objectives were applied or could be applied in the workplace. 

Prepare a one page APA style paper about Plagarism

In the Paper be sure

1. Define plagiarism

2. Address why it is unethical 

3. Discuss the four different types of plagiarism 

4. Discuss how proper research and documentation styles prevent a student from plagiarizing.

Use at least 1 source in this paper ( And please be sure to cite it in the paper)

Application Security

 

Discuss the following, supplying citations to support any information that you provide.  Do not include your opinion, only what you can support with a citation.  Address the following topics.

  1. How does Application Security relate to software development?
    1. Define application and software development
    2. Briefly describe the role of application security in software development
  2. Discuss two software development approaches
    1. For each briefly discuss the high-level principles/approach
    2. Discuss how Application Security should be included in each phase/step of the approaches
    3. Discuss what elements of the application should be addressed and how.  Examples: data at rest, data in motion, identity management, etc.
  3. Discuss the potential downfalls that can occur if Application Security is not integrated with application development

For all writing assignments ensure that you do the following:

  • Write 1000 to 1500 words in APA format.
  • Utilize at least five scholarly references. 
  • Note that scholarly references do not include Wikipedia, .COM websites, blogs, or other non-peer reviewed sources. 
  • Utilize Google Scholar and/or the university library. 
  • Do not copy and paste bulleted lists.  Instead, read the material and in your words, describe the recommendation citing the source. 
  • Review the rubric to see how you will be graded.
  • Plagiarism will result in a zero for the assignment. 
  • The second instance of plagiarism will result in your failure of this class.
  • If you use a source, cite it.  If you do not, it is plagiarism.

main practical connection

 Provide a reflection of at least 500 words (or 2 pages double spaced) of how the knowledge, skills, or theories of this course( Intro to Data Mining (ITS-632-M26) )  have been applied, or could be applied, in a practical manner to your current work environment. If you are not currently working, share times when you have or could observe these theories and knowledge could be applied to an employment opportunity in your field of study( Intro to Data Mining (ITS-632-M26)  ). Requirements:

  • Provide a 500 word (or 2 pages double spaced) minimum reflection.
  • Use of proper APA formatting and citations. If supporting evidence from outside resources is used those must be properly cited.
  • Share a personal connection that identifies specific knowledge and theories from this course.
  • Demonstrate a connection to your current work environment. If you are not employed, demonstrate a connection to your desired work environment. 
  • You should NOT, provide an overview of the assignments assigned in the course. The assignment asks that you reflect how the knowledge and skills obtained through meeting course objectives were applied or could be applied in the workplace. 
  • Any use of outside sources, including your own prior work, will result in a zero on the activity and a report being filed with Academic Affairs regarding plagiarism (even if self-plagiarism).

Research Paper

 The author of our text has compiled the end-of-year reflection of the data visualization field which includes various developments.  Please use the link provided to review the results.  After reviewing the 10 major items and the “special mentions”, select one major item and one special mention and provide a summary of the item and how you could apply the approach and/or visualization in a future project at work or in a class or any future objective. This will be your own perspective and your own approach for the future. This is not a paper that is a research type where all content would be the same. These will be different for each person due to future objectives. 

 

Include why you selected this particular item.  The work submitted must be a Word document, 3 pages of content not including the cover page, abstract, introduction, conclusion nor reference.  All sources must be included on the reference page. 

https://www.visualisingdata.com/2020/03/10-significant-visualisation-developments-july-to-december-2019/

The submission will be a Word Document, double-spaced, margins are normal, easy-to-read consistent font family (size no larger than 12)