debugging (JAVA)

Overview

Many Java programs that you create will receive and process user input. In order to ensure that user input is accurate, you will need to use input validation and exception handling. For example, if you ask for a zip code, you want to ensure the user inputs a five-digit number. In this activity, you are given “buggy” code for a paint program that calculates the number of cans of paint required to paint a wall, given the wall’s height and width. You will need to debug the code and improve it by adding code to validate user input and handle exceptions.

Prompt

For this assignment, you will complete the paint program by debugging the original code and adding code that validates user input and handles exceptions. Use the Uploading Files to Eclipse and the Downloading Files From Eclipse tutorials to help you with this project.

  • Debugging
    • Open the Virtual Lab by clicking on the link in the Virtual Lab Access module. Then open your IDE. Upload the Paint1.zip folder and review the code for the Paint1.java file.
    • Find and fix the three errors in the given code.
    • Use the input values below to test your program. If you found and fixed all errors, your output should exactly match what is below.
      TIP: When you run your program in Eclipse, it will prompt you to enter input in the Console window. If you cannot find this window, go to Window, then Show View, then Console.

Input value table with the numerals 30 and 25

Output value table with the wall area as 750.0 square feet and the paint needed as 2.142857142857143 gallons

  • Input Validation and Exception Handling
    • Review the code, looking for the two code blocks where user input is required.
    • Implement a do-while loop in both blocks of code to ensure that input is valid and any exceptions are handled.
      TIP: Consider using a try-catch block for exception handling, but it is not required.
    • Use the two sample invalid inputs below to test your program. Your program should respond to each by prompting the user to enter valid input. This should continue to loop until valid input is received.

A table with two columns titled Input 1 and Input 2. The items under Input 1 are the spelled-out number thirty and the numeral 25. The items under Input 2 are the numerals 30 and 0.

THINK: Why is 0 invalid input for this problem? What is the user being asked to input?

Guidelines for Submission

Attach your completed Paint1.java file to the assignment submission page.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Project 3: Proof of Concept Report

Turnitin®Turnitin® enabledThis assignment will be submitted to Turnitin®.Instructions

This week, you will complete your proof of concept and submit the report. This is the final report to management before the actual cloud deployment process begins.

Use the Proof-of-Concept Report Template to prepare a report that shows the steps and results for the proof of concept. In the template, you will see specific instructions. Delete the instruction text before you submit the project.

Your report should:

  • Be between five to seven pages (plus an appendix for screenshots, cover page, and table of contents)
  • Address the topics listed in the Proof-of-Concept Report Template
  • Include the following screenshots from the “Build a Virtual Private Cloud and Launch a Web Server” activity:
    • Start Lab page
    • AWS Management Console Name with your name visible from user drop-down
    • Task 1: Create Your VPC
    • Task 2: Create Additional Subnets
    • Task 3: Create a VPC Security Group
    • Task 4: Launch a Web Server Instance

How Will My Work Be Evaluated?

As a cloud professional tasked with developing a proof of concept for the companies cloud adoption, you will prepare a proof of concept report to be submitted to the company owner. By developing a well-structured report of your results and recommendations to management, you are demonstrating how you use your technical knowledge to convey your ideas to others in a professional setting. Your ability to express recommendations to decision makers with the right mix of technical detail in an accepted format is an important workplace and career skill.

The following evaluation criteria aligned to the competencies will be used to grade your assignment:

  • 1.1.3: Present ideas in a clear, logical order appropriate to the task.
  • 1.1.4: Explain the relationship between the ideas presented to enhance clarity and comprehension.
  • 2.1.1: Identify the issue or problem under consideration.
  • 2.1.2: Describe the context surrounding the issue or problem.
  • 2.2.3: Explain the assumptions underlying viewpoints, solutions, or conclusions.
  • 2.3.4: Address alternative viewpoints, perspectives, and methods.
  • 11.1.3: Install software.
  • 11.2.1: Configure technology according to stakeholder specifications and requirements.
  • 13.1.1: Create documentation appropriate to the stakeholder.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Blue Lake Sports

 

Guided Project 7-2

In this project, you complete the purchase order for Blue Lake Sports by adding a data validation list and check box form controls. You protect the sheet and the workbook, save it as a template, and share it for testing.

 

File Needed: BlueLakeSports-07.xlsx (Student data files are available in the Library of your SIMnet account)

Completed Project File Names: [your initials] Excel 7-2Template.xltx, [your initials] Excel 7-2User1.xlsx, [your initials] Excel 7-2User2.xlsx, and [your initials] Excel 7-2Merged.xlsx

Skills Covered in this Project

  • Set data validation to use a list.
  • Use an error alert for data validation.
  • Insert a check box form control.
  • Unlock worksheet cells and protect a worksheet.
  • Save a workbook as a template.
  • Create a new workbook from a template.
  • Share a workbook and track changes.
  • Accept or reject changes.
  1. Open the BlueLakeSports-07 workbook from your student data files.
  2. Save the workbook as a template.
    1. Click the Save As button [File tab] and choose This PC.
    2. Click the More Options link.
    3. Type the file name [your initials] Excel 7-2Template in the File name box.
    4. Verify that the Save Thumbnail box is selected or select it.
    5. Choose Excel Template from the Save as type drop-down box.
    6. Click Save.
  3. Set data validation with an error alert to use a list.
    1. Click the Purchase Order sheet tab, select B17, and click the Data Validation button [Data tab, Data Tools group].
    2. Click the Allow arrow and choose List on the Settings tab.
    3. Click the Source entry box.
    4. Click the Departments worksheet tab and select cells A2:A14.
    5. Click the Error Alert tab.
    6. Verify that the Show error alert after invalid data is entered box is selected.
    7. Use Stop for the Style to prohibit an invalid entry.
    8. Click the Title box and type Wait!.
    9. Click the Error message box and type Please choose from the list.
    10. Click OK.
  4. Display the Developer tab and the Compare and Merge Workbooks button.
    1. Select the Options command [File tab] and click Customize Ribbon in the left pane.
    2. Select the Developer box in the Main Tabs group.
    3. Click Quick Access Toolbar in the left pane.
    4. Choose All Commands from the Choose commands from list.
    5. Click Compare and Merge Workbooks in the commands list.
    6. Click Add and click OK.
  5. Insert a check box form control.
    1. Click the View tab and check the Gridlines box in the Show group to draw and position controls with gridlines visible.
    2. Click the Insert Controls button [Developer tab, Controls group] and click the Check Box (Form Control) button.
    3. Draw a control directly over cell B15.
    4. page E7-476Click the Properties button [Developer tab, Controls group].
    5. Verify that the Unchecked radio button is selected on the Control tab.
    6. Select the 3-D shading box.
    7. Click the Protection tab and deselect the Locked box.
    8. Click OK.
    9. Click two times near the word “Check” with the control to place an insertion point.
    10. Delete Check Box 1, press Spacebar, and type Yes
    11. Click cell E15 to deselect the control. If you accidentally placed a check mark within the control, point and click to remove it.
  6. Copy a check box form control.
    1. Point to the check box control label Yes and right-click.
    2. Choose Copy from the menu and then press Ctrl+V to paste the control.
    3. Point to any border of the copied control to display a move pointer.
    4. Drag the copy to cell C15.
    5. Press Ctrl and right-click while pointing to the first check box control to select both controls (Figure 7-65).7-65 Two controls selected
    6. Click the Align button [Drawing Tools Format tab, Arrange group] and choose Align Middle.
    7. Select cell E15 to deselect both controls.
    8. Right-click the copied control and choose Edit Text to place an insertion point.
    9. Delete Yes and type No (Figure 7-66).7-66 Controls are aligned
    10. Select cell E15. Remove check marks that were accidentally entered.
  7. Protect the worksheet and the workbook structure.
    1. Select D7.
    2. Press Ctrl and select cell D9, cells B11:D13, cell B17, and cells A20:D28.
    3. Click the Format button [Home tab, Cells group].
    4. Select Lock Cell to remove the Locked property.
    5. Click cell D7.
    6. Click the Protect Sheet button [Review tab, Changes group].
    7. Allow the options to select locked and unlocked cells. Do not use a password.
    8. Click OK.
    9. Click the Protect Workbook button [Review tab, Changes group].
    10. Do not use a password and click OK.
  8. Save and close the template.
  9. Create a workbook from a template.
    1. Click the New button [File tab] and click PERSONAL near the top of the gallery.
    2. Click [your initials] Excel 7-2Template to create a workbook.
    3. Type BLS00120 in cell D7 and press Tab.
    4. page E7-477Type =to in cell D9, press Tab to select TODAY, and press Enter.
    5. Type the following in cells B11:B13:
      • Outdoor Apparel, Inc
      • 4232 South Water Street
      • Omaha, NE 68107
    6. Select the check box control for Yes.
    7. Select cell B17, click the data validation arrow, and choose Apparel.
    8. Save the workbook as an Excel workbook named [your initials] Excel 7-2User1 in your usual location for saving files.
  10. Inspect the workbook.
    1. Click the File tab. You cannot inspect a worksheet that is protected.
    2. Click Unprotect in the Protect Workbook area 
    3. Click the Check for Issues button and choose Inspect Document.
    4. Choose Yes to save the document before inspection.
    5. Click Inspect in the Document Inspector dialog box.
    6. Click Remove All to remove all personal information and document properties.
    7. Click Close.
  11. Check compatibility.
    1. Click the Protect Workbook button [Review group, Changes group]. In order to generate a compatibility report, the Protect Workbook property must be disabled.
    2. Click the Check for Issues button [File tab, Info group] and choose Check Compatibility.
    3. Click Copy to New Sheet.
    4. Click the Purchase Order sheet tab.
  12. Share the workbook.
    1. Click the File tab.
    2. Click Allow this information to be saved in your file in the Inspect Workbook group. This property was activated when you removed metadata; it prohibits sharing the workbook.
    3. Return to the Purchase Order sheet and click the Share Workbook button [Review tab, Changes category].
    4. Select the Allow changes by more than one user at the same time box.
    5. Click the Advanced tab and set the Keep change history for option to 15 days.
    6. Click OK to close the Share Workbook dialog box.
    7. Click OK to resave the shared workbook.
  13. Make a copy of the shared workbook in the same folder.
    1. Click the File tab and choose Save As.
    2. Select This PC and click the More Options link.
    3. Navigate to and choose your folder and save the workbook as [your initials] Excel 7-2User2.
    4. page E7-478Type the following in cells A20:D20:
      • Ladies Parka LP10Blue 4 87
    5. Save and close the workbook.
  14. Open [your initials] Excel 7-2User1 and select cell A21.
    1. In cells A21:D21, type the following:
      • Men’s Parka MP16Black 4 98
    2. Save the workbook and leave it open.
  15. Merge copies of the shared workbook.
    1. Click the Compare and Merge Workbooks button. (Save the file if prompted.)
    2. Navigate to the folder with [your initials] Excel 7-2User2 in the Select Files to Merge Into Current Workbook dialog box.
    3. Select [your initials] Excel 7-2User2 and click OK.
  16. Accept or reject changes.
    1. Click the Track Changes button [Review tab, Changes group] and choose Accept/Reject Changes.
    2. Verify that Not yet reviewed displays as the When option.
    3. Click OK. The first edit is cell A21.
    4. Click Accept to locate the next edit.
    5. Click Accept All and then press Ctrl+Home.
  17. Save the workbook as [your initials] Excel 7-2Merged in your folder and close it 

 

  1. Move the template from the default folder.
    1. Click the File tab, select Open, and click Browse.
    2. Expand the Quick access list in the left pane and select Documents.
    3. Double-click Custom Office Templates.
    4. Right-click [your initials] Excel 7-2Template and choose Cut.
    5. In the left pane, navigate to and select the folder for saving files.
    6. Right-click an unused area of the dialog box and choose Paste.
    7. Click Cancel to close the dialog box.
  2. Remove the Compare and Merge Workbooks button and the Developer tab.
    1. Select the Options command [File tab] and click Quick Access Toolbar in the left pane.
    2. Click Compare and Merge Workbooks in the list on the right.
    3. Click Remove.
    4. Click Customize Ribbon in the left pane.
    5. Deselect the Developer box in the Main Tabs group and click OK.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Wk 3 Discussion [due Mar 2, 2019 must have answer to the question, and respond to three PEERS

  • THIS ASSIGNMENT IS DUE TODAY 2 MAR 19
  • Review the “Chapter Ten Case: ETSY” at the end of Ch. 10 of Business Driven Technology. Answer the following questions keeping in mind the scenario given on ThreeBirdNest:
  • What operational issues do you see and how could an effective supply chain help with these issues?
  • How can the four supply chain drivers help companies be more effective?
  • What are the advantages and disadvantages of using ETSY to sell to the global marketplace and use its global supply chain?
  • What strategy would you use to evaluate the success of SCM in ETSY?

Respond to at least three of your peers. In your response, address any thoughts you have on supply chain drivers and evaluating the success of SCM in an organization.

Students need to contribute three substantive posts in this discussion by the due date indicated. The substantive posts can be any combination of responses and replies.

Peer 1

Raise Output. Supply chain management (SCM) software is designed in way to improve communication, collaboration and coordination with vendors, transportation and shipping companies, Suppliers and raise bi-directional information flow. By Adopt a demand-driven planning and business operating model based on real-time demand insights and demand shaping. The right prediction and contingency planning tools will ensure a complete view and an effective response to risks such as suppliers going out of business, political upheaval, and natural calamities affecting manufacturing. Companies then can adjust pricing and promotions strategies to shape demand, move additional product quickly, drive revenue growth, or further expand margins for a high-demand product with limited market supply.

Also by using The demands on supply chain managers to rapidly respond to change and increase profitability are greater than ever. The good news is that effective strategies and solutions exist that support each one of the previous five strategies, and they can deliver immediate return on investment. The tools also exist. They have been battle tested, end-to-end, across some of the most valuable supply chains in the world. The way in which companies implement these strategies can mean the difference between success and failure. The tools they use should be low-risk and proven.

Some of the advantages an disadvantages of etsy:

The Pros

  • The opportunity to sell your handmade crafts: Regardless of what type of crafts you sell, you can sell everything on Etsy including woodworking, paintings, crocheting, sewing, floral arrangements, and etc.
  • You can sell craft supplies: You can sell craft supplies and help the crafters to buy the necessary materials to create their products.
  • You can sell eBooks: Etsy allows you to sell eBooks and earn a lot of money at the same time. You can sell patterns, tutorials, and etc.
  • Etsy has low fees: The reason why there are so many sellers on Etsy is because this platform has extremely low fees. For listing a new product you need to pay only 20 cents and your products will be listed for up to 4 months. Once the product is sold, you pay a fee of 3.5% to Etsy and the rest goes to you.
  • Training Courses – If you are a beginner and new in the Etsy environment, you can use the training courses and learn everything you need to know about how to run you Etsy shop.

The Cons

  • No Mass Produced Items – The only disadvantage is that you are not allowed to sell mass produced products.

Reference:

https://solutiondots.com/blog/benefits-of-supply-chain-management/

https://blogs.oracle.com/scm/5-strategies-for-better-supply-chain-management-in-the-current-economy

http://willametteangelconference.com/advantages-disadvantages-using-etsy

Peer 2

On the manufacturing side of things, the biggest issue I see is the making sure you have enough raw material on hand to cover orders and being able to keep up with the extra not expected orders. Companies must have a fine balance between having to much on hand but not keeping to much extra. You would also have to have a way to get the material quickly if needed. This can be easily handled with SCM to ensure you do house to much or not enough materials.

On the Supplier side of things, quality of products, making enough material, cost and time for shipping. These can also all be handled by SCM. This will also allow for the price negotiation based on the product and quality of product.

Four supply chain drivers are Back Orders, Inventory Turnover, Customer and Inventory Cycle time. All these metrics help both suppliers and manufactures keep enough inventory on hand to prevent back order while making sure you will not loose any inventory from having to on hand. There is nothing worse than trying to order something and finding out during check out that the item is on back order.

Advantages of Etsy: Easy to setup selling, large customer base and community

Disadvantages of Etsy: Competition and loss of profit because of fees

What strategy would you use to evaluate the success of SCM in ETSY?

Use of KPI and CSF designed for SCM

Analytics and Business Intelligence

Reference:

Baltzan, P. (2017). Business driven technology (7th ed.).

New York, NY: McGraw-Hill/Irwin.

Peer 3

What operational issues do you see and how could an effective supply chain help with these issues?

  1. Manufacturing Side Issue which can be easily handled with SCM – Plant Management makes operational decision to keep certain items in stock to ensure that production is not halted, this will increase inventory costs.
  2. Supplier Side Issue which can be easily handled with SCM – Management should make operational decision to negotiate with supplier to create a product with higher quality to ensure the quality of the finished product, if we do not have SCM in place then these decisions can cause lot of issues and loss of money.

How can the four supply chain drivers help companies be more effective?

Supply chain capabilities are guided by the decisions you make regarding the five supply chain drivers. Each of these drivers can be developed and managed to emphasize responsiveness or efficiency depending on changing business requirements.

What are the advantages and disadvantages of using ETSY to sell to the global marketplace and use its global supply chain?

Advantages – 1. Large customer base 2.Easy to setup shop 3. Strong community

Disadvantages – 1. Fees 2. Personalize of shop is difficult or not possible 3. Lot of competition.

What strategy would you use to evaluate the success of SCM in ETSY?

  1. Implement Scaled Agile Framework in SCM Implementation. Scaled Agile Framework ties and Organization or Business goals with the Delivery
  2. Data Analysis and Analytic Reports.
  3. Use KPI Metrics and Define CSF’s for SCM Delivery and Implementation.

Reference :

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

SDN & IBN White Paper

  

PLEASE READ ALL REQUIREMENTS BEFORE SUBMITTING A BID PLEASE

Software-defined networking (SDN) and intent-based networking (IBN) offer an ability to revolutionize the modern network architecture. Both of these concepts are relatively new, and your chief technology officer (CTO) has only heard them in passing. In fact, she pawned them off as the new “marketing fad” dressed up as a new concept. Since you have researched both technologies, you understand this is not a fad. When used in combination with virtualization and cloud computing, you know SDN and IBN could revolutionize how the organization operates, providing for reduced costs, efficiency, better management of the network assets, and security. 

However, you need to develop a white paper for the Caduceus CTO to highlight these benefits. Given the CTO has only heard the term in passing, you must describe in this white paper, the SDN and IBN concepts, their benefits, and what it would take for the organization to implement.

In your white paper, use additional sources of information but also describe the concept in layman’s terms. Use visuals where appropriate. Describe how an SDN/IBN architecture would look different than network architectures we have traditionally deployed. Compare and contrast the network architectures and discuss the pros and cons of each. Use the Company Highlights below when developing your paper.

The paper should include the following sections:

· introduction to software-defined networking (SDN) (discussed in Week 3)

· introduction to intent-based networking (IBN) (discussed in Week 4)

· discussion on how virtualizing the desktop and now back-end infrastructure are complementary and related

· discussion of how SDN and IBN are related

Company Highlights

● The organization currently maintains 2,000 Microsoft Windows desktop computers

for the workforce. As you recall, these desktop computers were about to be

refreshed. The organization is currently considering the Dell Optiplex series.

Specifically, each computer would have a Intel Core i5 processor, run Microsoft

Windows 10, contain 8GB DDR4 RAM, and have a 256GB solid state drive. The

rough estimate for each PC is $1,250, which equates to a $2,500,000 upgrade cost

to the organization.

● Microsoft Office runs on each of these computers. The license fee for each

computer is $150, which equates to a $300,000 outlay. The organization typically

upgrades all PCs with the latest version of Microsoft Office when it is released.

● The organization used multiples instances of Oracle Database. These databases

are distributed across 10 Dell PowerEdge servers. These servers cost a minimum of

$2,159 each, for a total cost of $21,580.

● The organization maintains an additional 20 Dell PowerEdge servers for a variety of

reasons to include email, file backup, remote access, etc. The total cost to refresh

each of these servers is $3,000 for a total cost of $60,000.

● The organization maintains various networking devices. The total cost of this

equipment is $3,000,000 and yearly refresh costs are $750,000.

● The organization maintains a suite of network security hardware and software

solutions. They include a DMZ configuration, multiple firewalls, VPN hardware,

antivirus solutions, intrusion detection and protection devices, and log management

solutions. The total yearly hardware and software costs for the organization

cybersecurity efforts are $2,000,000.

● The organization also allows users to access the network via their company-issued

Android phones, or iPads. Employees receive a mobile device with VPN software

installed so that they may remotely access company systems when they are at

home, or traveling.

● Because this is a notional example and assignment, you may make further

assumptions about the organization IT environment. There is no need to ask your

instructor for permission. Simply make explicit your assumptions in the white paper.

For example, you are free to assume the number of IT professionals, their

specialties, and more importantly the cost to run the IT department.

Software-defined networking (SDN) and intent-based networking (IBN) offer an ability to revolutionize the modern network architecture. Both of these concepts are relatively new, and your chief technology officer (CTO) has only heard them in passing. In fact, she pawned them off as the new “marketing fad” dressed up as a new concept. Since you have researched both technologies, you understand this is not a fad. When used in combination with virtualization and cloud computing, you know SDN and IBN could revolutionize how the organization operates, providing for reduced costs, efficiency, better management of the network assets, and security. 

However, you need to develop a white paper for the Caduceus CTO to highlight these benefits. Given the CTO has only heard the term in passing, you must describe in this white paper, the SDN and IBN concepts, their benefits, and what it would take for the organization to implement.

In your white paper, use additional sources of information but also describe the concept in layman’s terms. Use visuals where appropriate. Describe how an SDN/IBN architecture would look different than network architectures we have traditionally deployed. Compare and contrast the network architectures and discuss the pros and cons of each. Use the Company Highlights below when developing your paper.

The paper should include the following sections:

· introduction to software-defined networking (SDN) (discussed in Week 3)

· introduction to intent-based networking (IBN) (discussed in Week 4)

· discussion on how virtualizing the desktop and now back-end infrastructure are complementary and related

· discussion of how SDN and IBN are related

Company Highlights

● The organization currently maintains 2,000 Microsoft Windows desktop computers

for the workforce. As you recall, these desktop computers were about to be

refreshed. The organization is currently considering the Dell Optiplex series.

Specifically, each computer would have a Intel Core i5 processor, run Microsoft

Windows 10, contain 8GB DDR4 RAM, and have a 256GB solid state drive. The

rough estimate for each PC is $1,250, which equates to a $2,500,000 upgrade cost

to the organization.

● Microsoft Office runs on each of these computers. The license fee for each

computer is $150, which equates to a $300,000 outlay. The organization typically

upgrades all PCs with the latest version of Microsoft Office when it is released.

● The organization used multiples instances of Oracle Database. These databases

are distributed across 10 Dell PowerEdge servers. These servers cost a minimum of

$2,159 each, for a total cost of $21,580.

● The organization maintains an additional 20 Dell PowerEdge servers for a variety of

reasons to include email, file backup, remote access, etc. The total cost to refresh

each of these servers is $3,000 for a total cost of $60,000.

● The organization maintains various networking devices. The total cost of this

equipment is $3,000,000 and yearly refresh costs are $750,000.

● The organization maintains a suite of network security hardware and software

solutions. They include a DMZ configuration, multiple firewalls, VPN hardware,

antivirus solutions, intrusion detection and protection devices, and log management

solutions. The total yearly hardware and software costs for the organization

cybersecurity efforts are $2,000,000.

● The organization also allows users to access the network via their company-issued

Android phones, or iPads. Employees receive a mobile device with VPN software

installed so that they may remotely access company systems when they are at

home, or traveling.

● Because this is a notional example and assignment, you may make further

assumptions about the organization IT environment. There is no need to ask your

instructor for permission. Simply make explicit your assumptions in the white paper.

For example, you are free to assume the number of IT professionals, their

specialties, and more importantly the cost to run the IT department.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Troubleshooting Process to explain how you would tackle problems

  

There are three groups of tickets, Level 1, Level 2, and Level 3. You will pick two tickets from each group. 

As you prepare to analyze and hopefully solve these typical IT help desk tickets, keep in mind that for this course, it is more about the process and less about finding the “correct” answer. You may not always find an exact answer from the information given. The problems are structured to approximate what you will find in the workplace. Use a logical and repeatable process (e.g., the CompTIA 6-Step Troubleshooting Process) and eliminate the improbable as you work your way through each scenario.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

URGENT: Need C++ and PYTHON CODE HELP.

Hello, 

   Can anyone help me?  I am completely lost. and have 6 hours to complete this.  

Competency

In this project, you will demonstrate your mastery of the following competency:

  • Utilize various programming languages to develop secure, efficient code

Scenario

You are doing a fantastic job at Chada Tech in your new role as a junior developer, and you exceeded expectations in your last assignment for Airgead Banking. Since your team is impressed with your work, they have given you another, more complex assignment. Some of the code for this project has already been completed by a senior developer on your team. Because this work will require you to use both C++ and Python, the senior developer has given you the code to begin linking between C++ and Python. Your task is to build an item-tracking program for the Corner Grocer, which should incorporate all of their requested functionality.

The Corner Grocer needs a program that analyzes the text records they generate throughout the day. These records list items purchased in chronological order from the time the store opens to the time it closes. They are interested in rearranging their produce section and need to know how often items are purchased so they can create the most effective layout for their customers. The program that the Corner Grocer is asking you to create should address the following three requirements for a given text-based input file that contains a list of purchased items for a single day:

  1. Produce a list of all items purchased in a given day along with the number of times each item was purchased.
  2. Produce a number representing how many times a specific item was purchased in a given day.
  3. Produce a text-based histogram listing all items purchased in a given day, along with a representation of the number of times each item was purchased.

As you complete this work, your manager at Chada Tech is interested to see your thought process regarding how you use the different programming languages, C++ and Python. To help explain your rationale, you will also complete a written explanation of your code’s design and functionality.

Directions

One of Python’s strengths is its ability to search through text and process large amounts of data, so that programming language will be used to manage internal functions of the program you create. Alternatively, C++ will be used to interface with users who are interested in using the prototype tracking program.

Grocery Tracking Program
Begin with a Visual Studio project file that has been set up correctly to work with both C++ and Python, as you have done in a previous module. Remember to be sure you are working in Release mode, rather than Debug mode. Then add the CS210_Starter_CPP_Code and CS210_Starter_PY_Code files, linked in the Supporting Materials section, to their appropriate tabs within the project file so that C++ and Python will be able to effectively communicate with one another. After you have begun to code, you will also wish to access the CS210_Project_Three_Input_File, linked in the Supporting Materials section, to check the functionality and output of your work.

As you work, continue checking your code’s syntax to ensure your code will run. Note that when you compile your code, you will be able to tell if this is successful overall because it will produce an error message for any issues regarding syntax. Some common syntax errors are missing a semicolon, calling a function that does not exist, not closing an open bracket, or using double quotes and not closing them in a string, among others.

  1. Use C++ to develop a menu display that asks users what they would like to do. Include options for each of the three requirements outlined in the scenario and number them 1, 2, and 3. You should also include an option 4 to exit the program. All of your code needs to effectively validate user input.
  2. Create code to determine the number of times each individual item appears. Here you will be addressing the first requirement from the scenario to produce a list of all items purchased in a given day along with the number of times each item was purchased. Note that each grocery item is represented by a word in the input file. Reference the following to help guide how you can break down the coding work.
    • Write C++ code for when a user selects option 1 from the menu. Select and apply a C++ function to call the appropriate Python function, which will display the number of times each item (or word) appears.
    • Write Python code to calculate the frequency of every word that appears from the input file. It is recommended that you build off the code you have already been given for this work.
    • Use Python to display the final result of items and their corresponding numeric value on the screen.
  3. Create code to determine the frequency of a specific item. Here you will be addressing the second requirement from the scenario to produce a number representing how many times a specific item was purchased in a given day. Remember an item is represented by a word and its frequency is the number of times that word appears in the input file. Reference the following to help guide how you can break down the coding work.
    1. Use C++ to validate user input for option 2 in the menu. Prompt a user to input the item, or word, they wish to look for. Write a C++ function to take the user’s input and pass it to Python.
    2. Write Python code to return the frequency of a specific word. It will be useful to build off the code you just wrote to address the first requirement. You can use the logic you wrote but modify it to return just one value; this should be a fairly simple change (about one line). Next, instead of displaying the result on the screen from Python, return a numeric value for the frequency of the specific word to C++.
    3. Write a C++ function to display the value returned from Python. Remember, this should be displayed on the screen in C++. We recommend reviewing the C++ functions that have already been provided to you for this work.
  4. Create code to graphically display a data file as a text-based histogram. Here you will be addressing the third requirement from the scenario: to produce a text-based histogram listing all items purchased in a given day, along with a representation of the number of times each item was purchased. Reference the following to help guide how you can break down the coding work:
    1. Use C++ to validate user input for option 3 in the menu. Then have C++ prompt Python to execute its relevant function.
    2. Write a Python function that reads an input file (CS210_Project_Three_Input_File, which is linked in the Supporting Materials section) and then creates a file, which contains the words and their frequencies. The file that you create should be named frequency.dat, which needs to be specified in your C++ code and in your Python code. Note that you may wish to refer to work you completed in a previous assignment where you practiced reading and writing to a file. Some of your code from that work may be useful to reuse or manipulate here. The frequency.dat file should include every item (represented by a word) paired with the number of times that item appears in the input file. For example, the file might read as follows:
      • Potatoes 4
      • Pumpkins 5
      • Onions 3
    3. Write C++ code to read the frequency.dat file and display a histogram. Loop through the newly created file and read the name and frequency on each row. Then print the name, followed by asterisks or another special character to represent the numeric amount. The number of asterisks should equal the frequency read from the file. For example, if the file includes 4 potatoes, 5 pumpkins, and 3 onions then your text-based histogram may appear as represented below. However, you can alter the appearance or color of the histogram in any way you choose.
      • Potatoes ****
      • Pumpkins *****
      • Onions ***
  5. Apply industry standard best practices such as in-line comments and appropriate naming conventions to enhance readability and maintainability. Remember that you must demonstrate industry standard best practices in all your code to ensure clarity, consistency, and efficiency. This includes the following:
    1. Using input validation and error handling to anticipate, detect, and respond to run-time and user errors (for example, make sure you have option 4 on your menu so users can exit the program)
    2. Inserting in-line comments to denote your changes and briefly describe the functionality of the code
    3. Using appropriate variable, parameter, and other naming conventions throughout your code

Programming Languages Explanation
Consider the coding work you have completed for the grocery-tracking program. You will now take the time to think more deeply regarding how you were able to combine two different programming languages, C++ and Python, to create a complete program. The following should be completed as a written explanation.

  1. Explain the benefits and drawbacks of using C++ in a coding project. Think about the user-focused portion of the grocery-tracking program you completed using C++. What control does this give you over the user interface? How does it allow you to use colors or formatting effectively?
  2. Explain the benefits and drawbacks of using Python in a coding project. Think about the analysis portions of the grocery-tracking program you completed using Python. How does Python allow you to deal with regular expressions? How is Python able to work through large amounts of data? What makes it efficient for this process?
  3. Discuss when two or more coding languages can effectively be combined in a project. Think about how C++ and Python’s different functions were able to support one another in the overall grocery-tracking program. How do the two function well together? What is another scenario where you may wish to use both? Then, consider what would happen if you added in a third language or switched Python or C++ for something else. In past courses, you have worked with Java as a possible example. What could another language add that would be unique or interesting? Could it help you do something more effectively or efficiently in the grocery-tracking program?

#include <Python.h>
#include <iostream>
#include <Windows.h>
#include <cmath>
#include <string>

using namespace std;

/*
Description:
To call this function, simply pass the function name in Python that you wish to call.
Example:
callProcedure(“printsomething”);
Output:
Python will print on the screen: Hello from python!
Return:
None
*/
void CallProcedure(string pName)
{
char *procname = new char[pName.length() + 1];
std::strcpy(procname, pName.c_str());

Py_Initialize();
PyObject* my_module = PyImport_ImportModule(“PythonCode”);
PyErr_Print();
PyObject* my_function = PyObject_GetAttrString(my_module, procname);
PyObject* my_result = PyObject_CallObject(my_function, NULL);
Py_Finalize();

delete[] procname;
}

/*
Description:
To call this function, pass the name of the Python functino you wish to call and the string parameter you want to send
Example:
int x = callIntFunc(“PrintMe”,”Test”);
Output:
Python will print on the screen:
You sent me: Test
Return:
100 is returned to the C++
*/
int callIntFunc(string proc, string param)
{
char *procname = new char[proc.length() + 1];
std::strcpy(procname, proc.c_str());

char *paramval = new char[param.length() + 1];
std::strcpy(paramval, param.c_str());

PyObject *pName, *pModule, *pDict, *pFunc, *pValue = nullptr, *presult = nullptr;
// Initialize the Python Interpreter
Py_Initialize();
// Build the name object
pName = PyUnicode_FromString((char*)”PythonCode”);
// Load the module object
pModule = PyImport_Import(pName);
// pDict is a borrowed reference
pDict = PyModule_GetDict(pModule);
// pFunc is also a borrowed reference
pFunc = PyDict_GetItemString(pDict, procname);
if (PyCallable_Check(pFunc))
{
pValue = Py_BuildValue(“(z)”, paramval);
PyErr_Print();
presult = PyObject_CallObject(pFunc, pValue);
PyErr_Print();
}
else
{
PyErr_Print();
}
//printf(“Result is %d\n”, _PyLong_AsInt(presult));
Py_DECREF(pValue);
// Clean up
Py_DECREF(pModule);
Py_DECREF(pName);
// Finish the Python Interpreter
Py_Finalize();

// clean
delete[] procname;
delete[] paramval;

return _PyLong_AsInt(presult);
}

/*
Description:
To call this function, pass the name of the Python functino you wish to call and the string parameter you want to send
Example:
int x = callIntFunc(“doublevalue”,5);
Return:
25 is returned to the C++
*/
int callIntFunc(string proc, int param)
{
char *procname = new char[proc.length() + 1];
std::strcpy(procname, proc.c_str());

PyObject *pName, *pModule, *pDict, *pFunc, *pValue = nullptr, *presult = nullptr;
// Initialize the Python Interpreter
Py_Initialize();
// Build the name object
pName = PyUnicode_FromString((char*)”PythonCode”);
// Load the module object
pModule = PyImport_Import(pName);
// pDict is a borrowed reference
pDict = PyModule_GetDict(pModule);
// pFunc is also a borrowed reference
pFunc = PyDict_GetItemString(pDict, procname);
if (PyCallable_Check(pFunc))
{
pValue = Py_BuildValue(“(i)”, param);
PyErr_Print();
presult = PyObject_CallObject(pFunc, pValue);
PyErr_Print();
}
else
{
PyErr_Print();
}
//printf(“Result is %d\n”, _PyLong_AsInt(presult));
Py_DECREF(pValue);
// Clean up
Py_DECREF(pModule);
Py_DECREF(pName);
// Finish the Python Interpreter
Py_Finalize();

// clean
delete[] procname;

return _PyLong_AsInt(presult);
}

void main()
{
CallProcedure(“printsomething”);
cout << callIntFunc(“PrintMe”,”House”) << endl;
cout << callIntFunc(“SquareValue”, 2);

}

import re 

import string 

def printsomething():

print (“Hello from python!”)

def PrintMe(v):

print(“You sent me: ” + v)

return 100;

def SquareValue(v):

return v * V 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Java Programming Project #5 – Histogram

Create a Java non-GUI stand-alone application that displays a histogram.  A histogram is a kind of non-GUI bar chart that shows how many times a given value occurs in an input sample.  The more times a given value appears, the longer the bar becomes for that value.  With a histogram, you draw the chart sideways.

This program can be used to examine all sorts of frequency data.  In the example below I used this histogram program to analyze the scores of a previous COP 2800 Exam #1.  I entered in all the question numbers that were answered incorrectly, for each and every student exam.  (For instance, on the first student answered questions 1, 3, 4, and 19 incorrectly, so I input: 1 3 4 19.  The next student had questions 4, 17, 19, and 22 incorrect, so I continued by entering 4 17 19 22 this time.  I kept this up for each student’s exam.)  The output shows 8 questions were much harder than the rest, and that two questions were so trivial nobody answered them incorrectly.  (I have used this information to update my test bank.)

To actually draw the horizontal lines of the histogram, you must use the utils.TextKit.lineOfStars method you created in TextKit Project.  This project will require the use of arrays and input.

 

Write a Java non-GUI program that will accept as input integer values, each value is a number between 1 and 25, with one value per line.  The input might contain any number of values.  The user will indicate the end of the list by signaling EOF, which on DOS/Windows systems is done by hitting a control-Z.  (On Unix and Macintosh systems EOF can be signaled by hitting a control-D instead.)

The output shall consist of 25 lines of stars (asterisks), one line for each of the possible input values (the numbers 1 to 25).  The number of stars drawn shows how many times each value was entered as input.  Each line should be labeled with the value it is showing the bar for.  So, if the input was:

   C:\TEMP>  java Histogram 

   Enter integers <= 25, one per line, hit control-Z when done:

   1

   2

   4

   2

   1

   2

   
control-Z 

Then the output would be:

    1: **

    2: ***

    3:

    4: *

    5:

    6:

    7:

    8:

    9:

   10:

   11:

   12:

   13:

   14:

   15:

   16:

   17:

   18:

   19:

   20:

   21:

   22:

   23:

   24:

   25:

Your Java program must use the method called lineOfStars to create the stars for each line of output.  This method must take a single int parameter which says how many stars to draw.  This method must be a static method of a class called TextKit, which must be in a package called utils.  This should be the method you created for the previous project.  You are not allowed to modify your utils.TextKit class in any way from what you completed in the previous project without the approval of your instructor.

Your program will have its class in the default, nameless package and not in the utils package (where TextKit is located).

TextKit.java

package util;

/**

 * This is a utility class. It contains two utility methods and can be 

 * used in different applications.

 */

public class TextKit {

    /**

     * This method will create and return a String containing a line of asterisks (or stars).

     * If invalid argument is passed, it throws IllegalArgumentException.

     * 

     * @param n number of stars to draw.

     * @return a string containing stars.

     * @exception IllegalArgumentException if the argument is negative.

     */

    public static String lineOfStar(int n){

        //If n is negative then throw IllegalArgumentException.

        if(n < 0){

           throw new IllegalArgumentException(“Negative number”); 

        } 

        //A String object that will contain stars.

        String starLine = “”;

        //Create the string of stars.

        for(int i=1; i<=n; i++ ){

            starLine = “*” + starLine;

        }        

       return starLine; //Return the string.

    }

    

    /**

     * This method will format integers by adding spaces (called padding) to the 

     * left end, to make the resulting String a certain minimum length.If the number 

     * contains more digits than the specified width, then no padding is added.

     * If invalid argument is passed, it throws IllegalArgumentException.

     * 

     * @param num  number to format.    

     * @param minLen desired minimum String length.

     * @return the padded string.

     * @exception IllegalArgumentException if the argument is negative.

     */

    public static String pad(int num, int minLen){

        //If minLen is negative then throw IllegalArgumentException.

        if(minLen < 0){

           throw new IllegalArgumentException(“Negative number”); 

        }   

        //String object to store padded string.

        String paddedLine = String.valueOf(num);

        //If the number contains more digits than the specified width, then no 

        //padding is added and the string is returned.

        if(paddedLine.length() >= minLen){

            return paddedLine;

        }

        //Calculate the number of blank spaces to be padded.

        int padLength = minLen – paddedLine.length();

        //Pad the blank spaces.

        for(int i=1; i<=padLength; i++ ){

            paddedLine = ” ” + paddedLine;

        }

       return paddedLine;   //Return the padded string.

    }    

}

TextKitApp.java

import util.TextKit;

/**

 * This is the application class to test TextKit.

 */

public class TextKitApp {

    public static void main(String[] args){

        System.out.println(TextKit.lineOfStar(4));

        

        try{

         System.out.println(TextKit.lineOfStar(-4));

        }catch(IllegalArgumentException ex){

         System.out.println(“Argument can not be negative.”);

        }

        

        int num = 17;

        System.out.println(“*” + TextKit.pad(num, 4) + “*”);

        

        try{

         System.out.println(“*” + TextKit.pad(num, -4) + “*”);

        }catch(IllegalArgumentException ex){

         System.out.println(“Argument can not be negative.”);

        }        

    }

}

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Agile for All…

For this assignment, given what we have discussed about waterfall and agile development, tell me which process do you think will work better in our project this semester – agile or waterfall?…explain why you think one will work better, and why you think the other will not work as well…be VERY SPECIFIC regarding class project tasks that have to be completed and how they line up to either agile or waterfall processes…use your past experience with group projects as a reference…

Again, when you have completed this, you should have 1 to 2 pages…if you have any questions about anything, just let me know…

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Unit 3 IP Access Controls and Security Mechanisms

 Length 3-4 pgs –  Use APA 7 style, and cite references published within the last 5 years.  

Only working on Section 3 for this assignment add to the file attached (the first part, including Section 1 & 2, has been completed). 

Throughout this course, you will be working with a scenario in which some basic background information is provided about a consulting firm. This scenario and information is typical in many companies today. You are tasked to select a company that you are familiar with that is facing a similar situation. The company can be real or fictitious, but the framework and problems that it faces should be similar. The assignments that you complete each week are based on the problems and potential solutions that similar companies may face. The end goal for these assignments is to analyze the problems that the company faces with respect to the upcoming audit and to provide guidance on how it can provide security for its infrastructure.

Description

Create the following section for Week 3: 

The case study company has provided you with the flexibility to identify many different information systems that are used by the employees. Some systems need strict access control, whereas others should be available to everyone. What access control methods need to be employed for the various systems? How can the company protect the new consultant network while providing the protection of data that the stakeholders and customers require?

In addition, you have been asked to describe 2 access control mechanisms and consider whether they can be used in the organization. Describe single sign-on (SSO) and virtual private network (VPN) technology and whether they can be used in the company.

Complete the following section for Week 3:

  • Week 3: Access Controls and Security Mechanisms
    • For each of the applications and systems that were described in Individual Project 2, describe the access control mechanisms that are needed for each.
    • Describe how the new expanded network can be protected through access control.
    • Describe SSO and VPN technology, and discuss whether they can be used in the company.
  • Name the document “CS651_FirstnameLastname_IP3.doc.”

The template document should follow this format:

  • Security Management Document shell
    • Use Word
    • Title page
      • Course number and name
      • Project name
      • Your name
      • Date
    • Table of Contents (TOC)
      • Use an autogenerated TOC.
      • This should be on a separate page.
      • This should be a maximum of 3 levels deep.
      • Be sure to update the fields of the TOC so that it is up-to-date before submitting your project.
    • Section headings (create each heading on a new page with “TBD” as content, except for Week 1)
      • Week 1: Introduction to Information Security
        • This section will describe the organization and establish the security model that it will use.
      • Week 2: Security Assessment
        • This section will focus on risks that are faced by organizations and how to deal with or safeguard against them.
      • Week 3: Access Controls and Security Mechanisms
        • This section examines how to control access and implement sound security controls to ensure restricted access to data.
      • Week 4: Security Policies, Procedures, and Regulatory Compliance
        • This section will focus on the protection of data and regulatory requirements that the company needs to implement.
      • Week 5: Network Security
        • This section combines all of the previous sections and gives the opportunity to examine the security mechanisms that are needed at the network level.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now