Java or computer science( mostly programming) experts only not for essay writer.

 For this assignment, you will design a set of classes that work together to simulate a car’s fuel gauge and odometer. The classes you will design are the following:

The FuelGauge Class: This class will simulate a fuel gauge. Its responsibilities are as follows:

• To know the car’s current amount of fuel, in gallons.
• To report the car’s current amount of fuel, in gallons.
• To be able to increment the amount of fuel by 1 gallon. This simulates putting fuel in the car. ( The car can hold a maximum of 15 gallons.)
• To be able to decrement the amount of fuel by 1 gallon, if the amount of fuel is greater than 0 gallons. This simulates burning fuel as the car runs.

The Odometer Class: This class will simulate the car’s odometer. Its responsibilities are as follows:

• To know the car’s current mileage.
• To report the car’s current mileage.
• To be able to increment the current mileage by 1 mile. The maximum mileage the odometer can store is 999,999 miles. When this amount is exceeded, the odometer resets the current mileage to 0.
• To be able to work with a FuelGauge object. It should decrease the FuelGauge object’s current amount of fuel by 1 gallon for every 24 miles traveled. ( The car’s fuel economy is 24 miles per gallon.)

Demonstrate the classes by creating instances of each. Simulate filling the car up with fuel, and then run a loop that increments the odometer until the car runs out of fuel. During each loop iteration, print the car’s current mileage and amount of fuel. 

Most important things to be done for the assignment.

* Proper Validation should be done for the code. For example: asking the user for entering the number between (0-12) and user typed mistakely 13 or -1 then code should not be collapsed or error.

1. Need to have proper design ( UML with Flowchart) via Dia app. Flowchart should be drawn  for each method in UML.

2. Proper comments.

3.Proper doc-string describing  each method in code.

4.Proper Documentation should be for the code.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

discussion 7 Cyber

Please do an internet search and find out the results of the Erin Andrews invasion of privacy case that the Craig discusses in the assigned text.  Write a commentary on your thoughts on the case. 

Need 300-350 words 

APA standards with appropriate references

No plagiarism and on time delivery 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

A PowerPoint Presentation based on four different conflicts you have encountered in doing a project

 

A PowerPoint Presentation based on four different conflicts you have encountered in doing a project.  These conflicts can be work related or personal conflicts.  The presentation will consist of 5 slides from each group member and must have at least 1 academic reference for each slide.  Neither textbooks nor Wikipedia can be used as references. The cover slide and reference slide do not constitute part of the five slides per group member.  The presentation will follow APA format in a number 12 font.

For each slide, you are to only use bullet points and or pictures, diagrams, charts etc.  In the notes section of each slide, you are to write 85-100 words explaining the slide.  Each group member is required to do this for each of their slides.  You should use in-text citations and references.  These must be in APA style. 

Class is “Negotiation and Conflict Resolution”.

there should be a total of 25 slides of content

this is not a paper. I WANT A PPT

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Data Mart Infrastructure

Help me develop a data mart infrastructure as details are in the attachment

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

create a step-by-step IT security policy for handling user accounts/rights for a student who is leaving prematurely (drops, is expelled, and so on).

 

create a step-by-step IT security policy for handling user accounts/rights for a student who is leaving prematurely (drops, is expelled, and so on).

You will need to consider specialized student scenarios, such as a student who works as an assistant to a faculty member or as a lab assistant in a computer lab and may have access to resources most students do not.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Incident Response

 

  1. Write a 3 to 5 page paper in APA format that outlines the components of an incident response team and their duties.
    You may pick any type of company such as a bank, insurance company, manufacturer, etc.
    Research types of incidents that have occurred for that type of company. How would you address the issues?

    • Address who the members of the team are
    • who are the stake holders?
    • what are the procedures?
    • what should the outcome be?
    • Be sure to cite your sources
  2. By submitting this paper, you agree: (1) that you are submitting your paper to be used and stored as part of the SafeAssign™ services in accordance with the Blackboard Privacy Policy; (2) that your institution may use your paper in accordance with your institution’s policies; and (3) that your use of SafeAssign will be without recourse against Blackboard Inc. and its affiliates.
  3. Institution Release Statement

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Using a Web browser, search for “incident response template.”Look through the first five results and choose one for further investigation. Take a look at it and determine if you think it would be useful to an organization creating a CSIRT. Why or why not?

 

Using a Web browser, search for “incident response template.” Look through the first five results and choose one for further investigation. Take a look at it and determine if you think it would be useful to an organization creating a CSIRT. Why or why not?

Note: Minimum 2 references and two plagarisim freein APA format

Subject:  Disaster Recovery

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

RSA

 

1) Using the Web or other resources, write a brief paper about RSA, its history, its methodology, and where it is used. (300 words minimum)

2)  Send a brief message (ten words minimum) using the Caesar Cypher.

Note: Safe Assign score less than 20%

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Assignment 8

  

Instructions

Directions:  Unless otherwise stated, answer in complete sentences, and be sure to use correct English spelling and grammar. Sources must be cited in APA format. Your response should be four (4) pages in length; refer to the “Assignment Format” page for specific format requirements.

Business Consulting

Remember Bill? He was the gentleman that you helped to start up his business in Lesson 4. Well his business is doing well, but he has come to you with some questions and concerns. You discuss each of these with Bill and promise to send him a written report with your suggestions and recommendations. Bill’s questions and concerns are as follows:

Bill has set up a spreadsheet in Excel that will help him keep track of expenses. So far, he has this:

Bill has set up a spreadsheet in Excel that will help him keep track of expenses. So far, he has this:

  1. Tell Bill how to do the following tasks: 
    • What formula or function does       he put in Column F that will show the total expenses for each day?
    • What formula or function does       he put in columns B through F in Row 13 that will give him the total       expenses for the week in each category?
    • Bill wants the entry in Column       G to remind him of expenses that require receipts for the accountant.       Tell Bill what to put in Column G to do this: 
      1. Print the word “Yes” in any        row where the total daily expenses are greater than or equal to $100.00.
      2. If the daily expenses total        is less than $100.00, leave the Column G entry for that row blank.
  2. Bill’s business is already expanding. He thinks that in      a few weeks he will need to hire one or two employees to help him. He      knows that each new employee will need their own computer. He is also      making the necessary changes so that the new employees will be working in      a spare room in Bill’s house. Explain to Bill what networking options he      has. Go through each type or configuration of network possible for him,      making sure that you explain the pros and cons of each configuration.      Finish with your suggestion for the network that he should set up and      explain what new hardware will be required to do this.
  3. With the possibility of three business computers in his      home, and all of his business records possibly vulnerable, this would be a      good time to advise Bill on how to set up a routine plan to protect and      defend his new network. Provide a list of the five most important concerns      for safety and security of the network and the computers in the network.      For each concern, specify the action to be taken, and if applicable, what      software you recommend be added to the system. Justify each of your      recommendations.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Develop in c++

Hello im looking for someone that can develop this game on c++ thank you

Steal the Cheese

You are to write a basic console game with the following game premises:

Cheese Blocks (CBs) have proliferated during the past year. Unknown activists up to no gouda have placed large CBs throughout the town. Unfortunately, they chose huge blocks of limburger cheese. The cheese blocks don’t move however when you get close the cheese it “attacks” you with it’s smell: The Smell of Doom (SoD).

Additionally the stinky cheese is attracting Overly Large Rats (OLR) to eat the cheese and the rats are rather vicious at protecting the cheese since it has become their primary food source! These OLR attack with Bites of Owieness (BoO). (details below)

 The number of rats and the horrid smell is seriously upsetting people. It’s up to you to eliminate both the CBs and OLRs!!!

The Town

The town is a minimum of a 15×15 playable grid. The grid at it’s most basic has no obstacles just like a flat playing field. However adding in houses or obstacles is a good extra credit thing.You need to find characters from the ASCII character set to represent the CBs, the OLR and You to place on the grid

 

The Cheese Blocks

Appear around the town at random places and random times. They don’t move; however they are really smelly. If you get within two squares of a CB you have a 65% chance of being stunned (losing your turn) if you have not used a Noseplugs of Lavender (NoL). If you have used an NoL then there is a 30% chance of being stunned (the cheese is really smelly! Seriously…)

 

The Overly Large Rats – The OLR are of two varieties

Smart rats

These rats see you and actively move to attack you anywhere in the town.

The BoO is a close range attack, in other words the rat must be next to you to bite you. These smart OLRs have a 85% chance of biting you if you have not deployed your Trashcan Lid Shields (TLS) and only a 15% chance of biting you if you are using the TLS.

Not so smart rats

These rats will attack you if you get within 3 squares of them. However these rats attack so weirdly that they have a constant 30% chance of biting you regardless of if you have used your shield. These rats also like to hang out right next to the cheese.

Gaming Note: you may find the smart rats acting like dumb rats to lure you into range and bite you.

 

You, the wiley cheese remover and rat killer

You have 5 hit points, against rat bites, once they are all gone you are rat kibble.

You do have both defense and offensive abilities for taking care of the cheese and the rats.

Vs the Cheese

Defense: One turn use Noseplugs of Lavender (NoL) – you only get five of these to start the game. As an option you can plant them around the board to find, but you can only carry 5 at a time.

Attack: Huge ZipLocks (HZ) – these seal the cheese up in smell proof baggies. Any rat nearby will walk away to the next nearest cheese. However when you seal the last one up the rats will leave the town to find smellier places to live. Just like the NoL, you can only have 5 of these at a time. You have only a 70% of wrapping the cheese successfully. The baggies are cheap and will often tear when used.

Vs the Rats

Trashcan Lid Shields (TLS) – these are plastic lids from trashcans from around the town. Of course the town people are cheap so these lids can only take three bites and then they fall apart. You can carry only one of these.

Exploding Kitties (EK) for use against the rats. These are specially bred cats you can lob at a rat. If they hit a rat they will shred the rat to pieces. You have a 50% of hitting the smart rat and a 80% chance of hitting a not so smart rat. You can throw the kitties up to three spaces away. You can carry no more than six kitties at one time.

 

Movement and turns

This is a turn-based game. The order of events is:

You move up to three squares – if you move within two squares of the cheese it “automatically” attacks.

The Rats move up to two squares as per the type of rat they are

You deploy either a defense OR an attack

The rats attack if they are in range

Back to step 1

You and the PYS can move in any of the surrounding directions and squares Up, down, left, right, diagonally too.

You and the cheese/rats may not occupy the same square.

That’s the game basics.

 

Extra credit

Any additional attacks

Any additional defenses

Any additional game mechanics that make it more fun to play

The use of direct keyboard input vs a menu

Sound

Anything else cool

Extra credit must be DOCUMENTED at the top of your code in a comment box.

Please note this is your program, using code you find online without attribution is plagiarism and is not tolerated. This program will use most of what we learned throughout the semester. You must have properly formatted code, proper functions and data types.

This is your proof you learned the material! Have fun!!

Important: This project is due by 8:00 AM April 30th. Late submissions as always are not accepted. The code must be loaded to Blackboard here, there is no Mimir drop for this. Please ensure you compress and zip the WHOLE CLION PROJECT FOLDER!!!! Any other ide’s project is not acceptable. Do not use special libraries that are not included in the default CLION build. This project allows multiple submissions so if you are worried about not getting something in, you have ample opportunities to submit it. Any grade is better than an automatic 0.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now