Visual Studio Project

 

In this module, you learned about multiple forms in C#. You will be completing one program for this module.

Create an application named as M11 Assignment_YourLastname which has multiple form order program for customers of Fresh Produce Store.

You pick the controls that would work best and what your forms look like, but your program should meet the following objectives:

NOTE: All controls and variables should be correctly named using the naming standards indicated in the text.

  • Have a graphic that you think represents Frech Produce Store.
  • Allow customers the option of choosing tomatoes ($1.91 per pound), peppers ($2.32 per pound), onions ($1.05per pound) and potatoes($1.50 per pound). 
  • The customer enters a weight for each one selected in pounds in a box. Use either a numeric Up-down or Textbox. If using a Textbox, you will need to validate the value entered to make sure its numeric.
  • Exit Button – On main Form 
  • Order Now Button – On main form
  • Close Button – On second form
  • After the customer clicks an Order Now button, display the price of the order on the second form.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Developing a Conceptual Database Model

Need help  Developing a Conceptual Database Model 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Cloud Migration Security

 

Assignment Content

  1. In Week 1, you discussed GIG, Inc.’s benefits and concerns with moving to the cloud. In Week 2, you created a high-level diagram of a system using built-in AWS that provided reliability, availability, and continuity across the migrated environment. Last week, you chose a database and created a diagram that visualized the chosen system and implementation steps.
    This week, you will create a Microsoft® Excel® spreadsheet and provide a summary for the critical IAM structure provided below. This will be used for all systems and ensure all users have only the privileges needed for their job.
    The company has three levels of access:

    • Customer (Minimal-web only)
    • Administrative (Implementation-access to Cloud environment at a programmatic level and operational level)
    • System (The requirement(s) for system to system access)
    • The company security compliance controls need to ensure that each level of access is only allowed to authorized users/systems.
      Create a Microsoft® Excel® spreadsheet matrix listing all applicable information for each level of access, and ensure you include this information:
    • AWS that provide access control (network access control list, domain name service, security groups, etc.)
    • Types of restrictions (port, protocols, etc.)
    • The specific implementation matrix for each level (security groups will only allow port 22 to this level)
    • A basic set of IAM users, groups, and roles
    • Write a 1-page summary in Microsoft® Word about the structures and security benefits.
      Submit your spreadsheet and summary.
      Resources
    • Center for Writing Excellence
    • Reference and Citation Generator
    • Grammar and Writing Guides
    • Learning Team Toolkit

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Description – Programming Logic in Java

 

1- This assignment is similar to an earlier Python programming assignment.  In fact you can start with the same design.

Complete Exercise 10 at the end of JLK chapter 3 (pg.54) as a programming assignment.  This involves  and branching to determine which quadrant a point is in and the use of the Java’s hypotenuse function to determine a point’s distance from the origin in a Cartesian coordinate system.

According to Java’s specifications, Java’s hypotenuse function is:

static double   hypot(double x, double y)  returns sqrt(x2 +y2)

the word static at the beginning tells that the function is used with name of it’s class, like this:

dist = Math.hypot(12.0, 16.0)   

Notice the capital M.  Math is a class name, and  names of classes are usually capitalized.  We do not need an import statement to use the Math class in Java, provided we include the name of the class with calls to methods from the class.

the word double at the beginning tells us the function returns a value of datatype double,  The specification also tells us that it takes two parameters of type double (they can be variables or values), and it will return the square root of the two values each squared and added together.   

I suggest you complete the first Zybooks reading assignment and look at the example with nested if else statements on page 32 of JLK chapter 3 before doing this assignment

Note: If a point is on the x-axis or the y-axis, which quadrant is it in?  The specifications answer this question. Read the conditions in the problem carefully and make sure the logic in your software matches what it says.

You should submit the zipped IntelliJ project file for this assignment. 

2- Complete any one of the ten programming problems at the end of JLK Chapter 4 except number 3  — the guessing game.  If you choose the problem similar to the one you chose for the Python repetition assignment in week 4 then you can use the same design for your software.

Remember, Java has a for command for count controlled loops, which may be useful for some of the problems,

You should try to format the output to make it look nice.  Lesson 4.4 on page 19 of JLK chapter 4 describes the use of printf () for formatted output.  

Pay attention — some of the problems that seem simple are actually more complicated and vice-versa.  You inly need to submit one program, but you should read through most of them and see if you understand how to do each one. 

You should begin with documentation as a design tool, but only need to submit the zipped IntelliJ file foryour finished project..

PreviousNext
 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

C# Coding Assignment- Visual Studio (MUST USE THE ATTACHED SHELL)

Steganography, as defined by Webster’s Dictionary, is the art or practice of concealing a message, image, or file within another message, image, or file.  For this week’s assignment we are going to work with arrays, strings, and StringBuilder to decode a message that has been hidden inside another file and sent to us from our friend, Randy Waterhouse (you have my sincere admiration if you get that reference!).  Randy is sending us a message that he has encoded within a regular data file.  This means he has taken the file and changed random characters within that file that will spell out a message if we can figure out which characters he changed and the ordered in which he changed them. 

The original file looked like this:

 

Randy then went line by line and changed certain characters according to the below table.  The lines and columns of the table are indexed starting at zero, just like our arrays in C#.  The first entry in the table, “0,5=n” means that Randy changed the character in line zero at the 5th letter (which is actually the 6th since we started at zero) to be “n” (it was originally “W”).  Here is the table of changes that Randy made.  Note that he only changed 5 characters per line and that each line has 60 characters in it:

 

And here is the new data with Randy’s changes:

 

If we know the order that he changed the characters in each line, we can create the following four strings of five characters each:

 

If we append all those strings together from top to bottom, we will have the full message that Randy sent us (apparently Randy is a fan of the movie “A Christmas Story”):

Drink more Ovaltine!

So how do we figure out the order?  Many cryptographic systems have two main components: an equation and a key.  The equation generates a string of numbers based on the key number that is plugged in to that equation (that’s a super-simple explanation, but this isn’t a crypto class, so…).  In this case, Randy kept it simple.  He’s a C# programmer, after all!  He used the Random class as his equation, and he knows that using a certain number as a “seed” or “key” will make Random generate the same sequence of numbers when “next” is called.  If Randy tells you the seed, and you know that he did his encryption line by line, then you can get the characters from Randy’s seemingly random data and generate the message.

Your Assignment:

The attached assignment shell has an array of 22 strings already declared for you that represent the lines in a data file.  Each line has 60 characters in it, but Randy only changed 5 of those characters.  You need to use nested for loops (i.e. one for loop inside another) and Random’s “next” method to pull the five characters from each line and store those in a different array of strings, where each string is 5 characters long.  Remember, if you seed your Random with the same number Randy did, then your “next” will generate the same sequence of numbers.  Those numbers are the indices of the characters you need to get from each line.  Once you have put the five characters from each line into your array, you need to call your printIt method.  Your printIt method should take the array of decrypted characters as input.  It should first print the contents of that array to the screen (there should be 22 lines of 5 characters each).  Then it should use a StringBuilder to put those 22 lines together into something that is more readable.  DO NOT simply  “+=” each of the 22 strings into a larger string.  You must use StringBuilder.  Finally, print the contents of your StringBuilder to the screen – you should see the message that Randy hid in the data file. For full credit, you must also include the message as part of your submission text for this assignment! 

You need to seed your random number generator with 243 because that’s the number Randy used when encrypting his message (he chose that because 243 would generate 22 5-character sequences where those 5 characters would not repeat).

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Cloud security

 

Please review Textbook, lecture slides, reputable articles and journals and write a complete essay / report and explain:

 – Cloud security issues/problems

– Cloud computing security architecture

– Security issues in virtualization

– Data security in the cloud

– Threats in the cloud

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Analyzing and visualizing data

According to Kirk (2016), most of your time will be spent working with your data.  The four following group actions were mentioned by Kirk (2016):

  • Data acquisition: Gathering the raw material
  • Data examination: Identifying physical properties and meaning
  • Data transformation: Enhancing your data through modification and consolidation
  • Data exploration: Using exploratory analysis and research techniques to learn

Select 1 data action and elaborate on the actions preformed in that action group.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

net present value analysis

 Midnight Sunday of Unit 3. 

 

In this assignment you will perform a Net Present Value Analysis for a project. 

 

1. Assume a student is planning to pursue a two-year master’s degree. There are two educational options the student is considering, with investment and cash flows as follows. 

 

Option A: Full-Time Education 

 

Example cash investment: $100,000. Currently the student is earning $30,000. The student will quit his/her current job to study a Master’s degree in computer science. Upon graduation the student hopes to earn $60,000 per year in new job.   

 

Option B: Part-Time Education 

 

Example cash investment: $100,000. Currently the student is earning $30,000. The student can work part-time for three years at a salary of $20,000 while studying towards the master’s degree in project management. Upon graduation the student anticipates a possible increase in salary by $10,000 (total $40,000) in the same company. 

 

4)    In unit 8, changes to the quiz. Open the quiz file and make the changes as indicated to numbers 3, 11, 12, and 14. 

 

The requirements for the assignment are:  Answer the following questions based on the unit readings: 1. Briefly describe what net present value is, how it is calculated, and what it is used for.  2. Calculate the NPV for each educational option. The discount rate is 8%.  3. Which option should the student choose? Explain your decision including any necessary assumptions made.  The paper must be APA-formatted as a Word document.  SafAssign will be used to check this assignment for plagiarism. Remember to paraphrase in your own words and do not copy directly.  The length must be 1-2 pages, excluding the title and reference pages.  Include at least one reference. 

CIS213 – Project Management  Net Present Value Analysis 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Data mining Assignment 4

  

1. Obtain one of the data sets available at the UCI Machine Learning Repository and apply as many of the different visualization techniques described in the chapter as possible. The bibliographic notes and book Web site provide pointers to visualization software.

2. Identify at least two advantages and two disadvantages of using color to visually represent information.

  1. What      are the arrangement issues that arise with respect      to three-dimensional plots?
  2. Discuss      the advantages and disadvantages of using sampling to reduce the number of      data objects that need to be displayed. Would simple random sampling (without      replacement) be a good approach to sampling? Why or why not?
  3. Describe      how you would create visualizations to display information that de-scribes      the following types of systems.

a) Computer networks. Be sure to include both the static aspects of the network, such as connectivity, and the dynamic aspects, such as traffic.

b) The distribution of specific plant and animal species around the world fora specific moment in time.

c) The use of computer resources, such as processor time, main memory, and disk, for a set of benchmark database programs.

d) The change in occupation of workers in a particular country over the last thirty years. Assume that you have yearly information about each person that also includes gender and level of education. 

Be sure to address the following issues:

· Representation. How will you map objects, attributes, and relation-ships to visual elements?

· Arrangement. Are there any special considerations that need to be taken into account with respect to how visual elements are displayed? Specific examples might be the choice of viewpoint, the use of transparency, or the separation of certain groups of objects.

· Selection. How will you handle a large number of attributes and data objects

6. Describe one advantage and one disadvantage of a stem and leaf plot with respect to a standard histogram.

7. How might you address the problem that a histogram depends on the number and location of the bins?

 

8. Describe how a box plot can give information about whether the value of an attribute is symmetrically distributed. What can you say about the symmetry of the distributions of the attributes shown in Figure 3.11?

 

9. Compare sepal length, sepal width, petal length, and petal width, using Figure3.12.

 

10. Comment on the use of a box plot to explore a data set with four attributes: age, weight, height, and income.

 

11. Give a possible explanation as to why most of the values of petal length and width fall in the buckets along the diagonal in Figure 3.9.

 

12. Use Figures 3.14 and 3.15 to identify a characteristic shared by the petal width and petal length attributes.

 

  

13. Simple line plots, such as that displayed in Figure 2.12 on page 56, which shows two time series, can be used to effectively display high-dimensional data. For example, in Figure 2.12 it is easy to tell that the frequencies of the two time series are different. What characteristic of time series allows the effective visualization of high-dimensional data?

 

14. Describe the types of situations that produce sparse or dense data cubes. Illustrate with examples other than those used in the book.

 

15. How might you extend the notion of multidimensional data analysis so that the target variable is a qualitative variable? In other words, what sorts of summary statistics or data visualizations would be of interest?

 

16. Construct a data cube from Table 3.14. Is this a dense or sparse data cube? If it is sparse, identify the cells that are empty.

17. Discuss the differences between dimensionality reduction based on aggregation and dimensionality reduction based on techniques such as PCA and SVD.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

4 simple questions only about 300 words

Two short paragraphs (APA format not needed for these answers and each answer can be 50-75 words) Please name this Word document Module 6 DQ’s: 

  1. You have multiple manufacturing computers that control the machinery to several assembly lines. The software for the assembly line controls rarely changes. The assembly lines cannot go down because of problem Windows updates or new features. What do you recommend?
  2. You manage 40 essential servers that must run the best they can at all times. Describe the most efficient way to review key events on all 40 servers each day.

_______________________

Two separate short questions that can be part of one document (You can also answer each question with about 75 words each, but must be in APA format) 

The point assignment is setup as:

  • Title Page = 5 points
  • Proper Font = 5 points
  • Case Answers = 10 points

Title this document Module 6 Assignment 2:

Scenario 11-1

You support Richman Investments, a brokerage firm that employs 20 brokers. Each broker has his own client computer, and the firm has a server running Windows Server. All of the client computers are configured identically. 

Over the past six months, some Windows updates have caused the computers to hang, leaving the brokers without computers to conduct business. How can you ensure that the Windows updates that install on client computers will not cause usability issues? 

Scenario 12-1

You manage several file servers. Several times during the day, the file server performance degrades significantly. Describe how to troubleshoot the problem.

**Please do not use old book references. Only use online references if needed.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now