ASAP PLEASE!!! DO THIS IN JAVA A Company Needs To Develop An Oriented Library
Get college assignment help at Smashing Essays ASAP PLEASE!!! DO THIS IN JAVA A company needs to develop an oriented library with a few Java classes for the following project.: Overall,they need to have Java classes to model the geometric shapes in Mathematics and calculate their areas. These geometric shapes include Square, Rectangle, Circle and Triangle. You are required to do a design to solve the above problem. Draw UML diagram for your design,then implement using Java code. Hints: 1.Users should be able to draw the above shapes. Decide what Java structure you should define to provide this method. Use the name Drawable for this Java structure. Draw its UML diagram. Write its code. 2. Users should be able to calculateArea of the above shapes. But different shape’s area is calculated differently. Decide what Java structure you should define to provide this method. Use the name Shape for this Java structure. Decide what data members you need for Shape. Draw its UML diagram. Write its code. 3. Now you need to write the code for four classes: Square, Rectangle,Circle and Triangle. These are the steps: a.Decide what class data members you should have for each class. b. Determine the relationship between four classes and Drawable/Shape. c. Draw the UML diagram for four classes along with their connections with Drawable and Shape. d. Write the Java code of the four classes. You should provide all constructors, get/set methods, calculateArea method,and toString() methods. Note the following formulas for calculating their areas: Area of Square = side*side Area of Rectangle= width*height Area of Circle=PI*radius*radius Area of Triangle=0.5*base*height e. In the driver code,do the following: 1. Create objects of the four classes with some dimension data. 2. Display the areas of the Square object and the Circle object in two separate threads in the main method. 3. Put the Triangle object and the Rectangle object in an array named shapeObjectArray. 4. Create anew method named displayArea in the driver class which receives shapeObjectArray and has the objects in the array display their areas.
New Century Health Clinic New Century Health Clinic Offers Preventive Medicine And Traditional Medical
New Century Health Clinic New Century Health Clinic offers preventive medicine and traditional medical care. In your role as an IT consultant, you will help New Century develop a new information system. Background You began the systems analysis phase at New Century Health Clinic by completing a series of interviews, reviewing existing reports, and observing office operations. (Your instructor may provide you with a sample set of interview summaries.) As you learned, the doctors, nurses, and physical therapists provide services and perform various medical procedures. All procedures are coded according to Current Procedure Terminology, which is published by the American Medical Association. The procedure codes consist of five numeric digits and a two-digit suffix, and are used for all billing and insurance claims. From your fact-finding, you determined that seven reports are required at the clinic. The first report is the daily appointment list for each provider. The list shows all scheduled appointment times, patient names, and services to be performed, including the procedure code and description. A second daily report is the call list, which shows the patients who are to be reminded of their next day’s appointments. The call list includes the patient name, telephone number, appointment time, and provider name. The third report is the weekly provider report that lists each of the providers and the weekly charges generated, plus a month-to-date (MTD) and a year-to-date (YTD) summary. The fourth report is the statement—a pre-printed form that is produced monthly and mailed in a window envelope. Statement header information includes the statement date, head of household name and address, the previous month’s balance, the total household charges MTD, the total payments MTD, and the current balance. The bottom section of the statement lists all activity for the month in date order. For each service performed, a line shows the patient’s name, the service date, the procedure code and description, and the charge. The statement also shows the date and amount of all payments and insurance claims. When an insurance payment is received, the source and amount are noted on the form. If the claim is denied or only partially paid, a code is used to explain the reason. A running balance appears at the far right of each activity line. The associates also require two insurance reports: the weekly Insurance Company Report and the monthly Claim Status Summary. In addition to these six reports, the office staff would like to have mailing labels and computer-generated postcards for sending reminders to patients when it is time to schedule their next appointment. Reminders usually are mailed twice monthly. Now you are ready to organize the facts you gathered and prepare a system requirements document that represents a logical model of the proposed system. Your tools will include DFDs, a data dictionary, and process descriptions. Task Prepare a context diagram for New Century’s information system. Prepare a diagram 0 DFD for New Century. Be sure to show numbered processes for handling appointment processing, payment and insurance processing, report processing, and records maintenance Reference : Shelly and Rosenblatt, Systems Analysis and Design, 9th Edition,
JAVA 1.1 Create A Class Called Person That Has Encapsulated Variables: Id, Firstname, Surname,
JAVA 1.1 Create a class called Person that has encapsulated variables: id, firstname, surname, cellphone, email. Create appropriate getter and setter methods for the variables. (10 marks) 1.2 Create a subclass of Person called Student that has 2 variables of its own: studentNumber and yearOfStudy. These variables should be declared private with the appropriate getter and setter methods to access them. (10 marks) Include a main program called “UseStudent”. The reference variable for Student is S1. Pass the following values to the related variable: studentNumber = A10135 yearOfStudy = 1 Include System.out to display the output in the main program. Use the example below as a guide for output statements: Student number is = Year of study = 1.3 Create a subclass of Person called Lecturer that has 2 variables of its own: employeeNumber and salary. As in the above scenario, these variables should be declared private with the appropriate getter and setter methods to access them. (10 marks) Include a main program called “UseLecturer”. The reference variable for Lecturer is L1. Pass the following values to the related variables: EmployeeNumber = EMP001 Salary = 30000.99 Include System.out to display the output in the main program. Use the example below as a guide for output statements: Employee number = Salary =
The Language Is Java Programing. The Purpose Of This Is To Practice OOP Programming
The language is Java Programing. The purpose of this is to practice OOP programming covering Inheritance. The scenario is to design an online shopping system for a local supermarket (e.g., Europa Foods Supermarket or Wang Long Oriental Supermarket). Design and draw a UML diagram, and write the code for the following classes: The first product category is a fresh product, it contains the following attributes. – ID: The identification number must start with 1 and follows with 6 numbers, e.g., “1123456”. – Description, e.g. “Banana” – Recommended Price per unit, e.g. 5.54. Note that this is the suggested price, it is not the actual price in the online shopping system. – Unit (by default is 1) – Weight (in gram) – Unit Type, e.g. “Each, Kilogram, Bunch, Box and Pack” – The packing or baking date (it should include the date, month, year and time), this information is not required for some product, hence, it default may be set to 1/1/1900. – The expiry date is (it should include the date, month, year) The purpose of this class is to maintain the general information of fresh or daily product such as meat, seafood, bread, milk, and vegetable. The second product category is a packaged product such as can, source, snack, etc. It contains the following attributes. – ID: The identification number must start with 2 and follows with 6 numbers, e.g., “2123456”. – Description, e.g. “Corn cream can” – Recommended Price per unit, e.g. 5.54. – Unit (by default is 1) – Weight (in gram) – The dimension of the package (including height, width, deep). If a product doesn’t provide this information, then it set to (0, 0, 0) as a default value. – Nutrition Information o Quantity per 100 g or 100 ml o Energy/kilojoules o Protein o Fat o Sugars(mg) o Sodium/salt(mg) – Unit Type for this class is limited to only “Box, Bottle and Pack” – Packing or manufacturing date (it should include the date, month, year and time), this information is not required for some product, hence, it default may be set to 1/1/1900. – Expire date is (it should include the date, month, year), its default may be set to 1/1/3000 for the product that doesn’t have an expiry date. The purpose of this class is to maintain the general information of package product such as can, sauce, instant noodle, flour, and snack. Noted that all classes should override and implement the toString methods to transform the information of the object into the string variable. Ensure that your classes are well designed with practical attributes (either primitive type, class object or Enumerated Data type) and have proper methods to handle all tasks (Encapsulation). Students are allowed to add any classes to the design, it is necessary to perfect the design. Task 1: Class design (Code and UML). 1. Design and write the java code for the above two categories. 2. Design 2 subclass with 2 additional attributes for each category. Task 2: Your classes should be able to provide methods allowing one to 1. (verifyUnitType) Check whether the input arguments (a unit type) passed to the method matches with the user type stored in the object or not. 2. (getAttributeDescriptionForSavingTofile) output the description of all attributes to a String format that can be used to save it to a CVS format file directly, e.g. “ID, Description, …. , Expire date”. 3. (getInformationForSavingToFile) Take all attributes in the object and output them to a String format that can be used to save it to a CVS format file directly, e.g. “1222344, Corn Cream,…. , 20/11/2019”. Choose the appropriate input or/and output type for each method. Test Code: write the test code (a separate class/file called “TestCode” with the Main method in it), create the object of each class, and create an ArrayList to keep all the above classes. For each object, call methods in Task 2 to check whether the method works properly. Display the output of the methods to the console. Finally, display information of all the object in the ArrayList to the console. Design and draw a UML diagram, and write the code for the following additional category: The third product category is the equipment and household product, it contains the following attributes. – ID: The identification number must start with 3 and follows with 6 numbers, e.g., “3123456”. – Description, e.g. “Toothbrush” – Recommended Price per unit, e.g. 5.54. Note that this is the suggested price, it is not the actual price in the online shopping system. – Unit (by default is 1) – The dimension of the package (including height, width, deep). If a product doesn’t provide this information, then it set to (0, 0, 0) as a default value. – Weight (in gram) – Unit Type, e.g. “Bag, Bottle, Box and Pack” – The packing or baking date (it should include the date, month, year and time), this information is not required for some product, hence, it default may be set to 1/1/1000. – The expiry date is (it should include the date, month, year). its default may be set to 1/1/3000 for the product that doesn’t have an expiry date. – The purpose of this class is to maintain the general information of fresh or daily product such as kitchenware, stationery and household. Task 1: Class design (Code and UML). 1. Design and write the java code for the above category. 2. Design 2 subclass with 2 additional attributes. Task 2: Your classes should be able to provide methods allowing one to 1. (comparePrice) Compare the price whether more than or less than or equal to the given number. 2. (verifyExpireProduct) Check whether the product is expired or not when it compares to the giving date. 3. (getVolumn) Calculate the volume from the dimension of the product in cubic centimetres. 4. (editProductInformation) Edit the product’s main information that shares among all class such as ID, Description, etc. Your classes should be able to provide methods allowing one to 1. Overload the constructor of all classes such that an object can be created with a default value for some attributes specified in the above requirement. 2. (A static method named “findProductFromDescription”) Take an array list of product objects and a string as an input, and output objects (a new array list of product objects) that description contains the input string. 3. (A static method named “sortByPrice”) Take an array list of product objects and sort them and return a new sorted array list. 4. (A static method named “allProductToString”) Taking an input of an array list and output a string that contains the information of all products in the array list. (Noted that you can use the output to string method in this method and each product should separate by a new line.) Write the test code (a separate class/file with the Main method) to test all methods.
Python3: Write The Function LongestSubpalindrome(s), That Takes A String S And Returns The Longest
Python3: Write the function longestSubpalindrome(s), that takes a string s and returns the longest palindrome that occurs as consecutive characters (not just letters, but any characters) in s. so longestSubpalindrome(“ab-4-be!!!”) returns “b-4-b”.If there is a tie, return the lexicographically larger value — in Python, a string s1 is lexicographically greater than a string s2 if (s1 > s2). So: longestSubpalindrome(“abcbce”) returns “cbc”, since (“cbc” > “bcb”). Note that unlike the previous functions, this function is case-sensitive (so “A” is not treated the same as “a” here). Also, from the explanation above, we see that longestSubpalindrome(“aba”) is “aba”, and longestSubpalindrome(“a”) is “a”. Restrictions: for loop, slicing, ‘in’ keyword, list comprehension, lambda function can’t be used. It is recommended to use while loop to solve this problem. hints: pick all possible starting and ending positions for a substring, and verify if it is a palindrome.
Task :This Is A Practical Assessment And Will Enhance And Test Your Practical Skills
Task :This is a practical assessment and will enhance and test your practical skills related to the subject topic. Students are required to set up a network consisting of PCs, routers, switches and servers. You will need to configure routing between routers, use any dynamic routing protocol. The PCs (clients) will be connected to switches and switches to the router’s interfaces. Clients and Servers are connected on different networks (don’t attach clients and servers on same network). Client(s) Switch Router Router Switch Server(s) To complete this assessment you are expected to refer to information beyond the text book. This assignment is open; in that you are free to choose the devices or software you use to complete the specified tasks. Students are expected to accomplish this task by utilising the necessary commands discussed in lectures and also described in the prescribed text book. There are numerous web sites available that discuss networking , however you MUST list your sources of information for the different tasks. When completing this project, you may encounter errors or experience difficulties getting your setup to work. If this occurs, your challenge is to analyse why they happen and report on how you solved the problems you encountered. Task 1 – Setting up a Network [10 marks] Perform the following activities and support your workings with screenshots [10 marks]: Configure the PCs, Server and Router interfaces with appropriate network addressing; Configure any classless dynamic routing protocol on the routers; On any client, ping the client’s own network interfaces, then the local router gateway interface, then the remote router interface, then the servers. Check full network conductivity; Use the traceroute command from the client to the server. Include results of the traceroute in your submission, explaining meaning of traceroute output. Task 2 – Configuring Network Services [10 marks]: Using the same network topology that you have setup in Task 1, perform the following additional activities 1.DHCP: Configure DHCP servers and show that the client PC has successfully received IP Addresses and other network parameters (default gateway, subnet mask and DNS IP address) using DHCP 2.WEB Server: Configure WEBs server on the dedicated machines in their specified networks, with URL as yourname.csu.org 3.DNS: Configure DNS Servers on the server device and demonstrate that forward and reverse DNS are working from the client PC; test DNS Server by browsing yourname.csu.org from client PC, DNS must resolve this URL to IP address of WEB Server 4.Firewall: Configure traffic filtering on the web servers to block ONLY HTTP TCP traffic between one of the client PCs and WEB Servers and allowing all other IP traffic, provide evidence of such traffic filtering. You should verify firewall by using PING and HTTPS TCP traffic which should not be blocked. A series of screenshots with commentary on each of the required tasks is to be submitted. The submission must include a comprehensive explanation of each task in your own words and all the commands used along with the output (or final result) in report format. No description or lack of comprehensive description will result in deduction of marks. Task 3 [5 marks] Task 3 has been designed to detect and prevent unauthorized assistance with your work. This task is a question and answer session with your lecturer. You must contact your lecturer after submitting your assessment to book an individual appointment. Your lecturer will advise on how to book individual one-on-one sessions, for online students these may be over the phone or Skype sessions. Failure to contact your lecturer may result in loss of marks associated with this task
Please Explain RAW, WAR And WAW In Detailed Steps For I1, I2 And I3
Please explain RAW, WAR and WAW in detailed steps for I1, I2 and I3 given above
1. If Executed What Would Be The The Data Type Of Obj Variable Var
1. if executed what would be the the data type of obj variable var obj= xml.Http.responseXML; 2. Create an angular js code: (a) Take an input field color and associate its value to the background of a paragraph using proper directives. (b) Initailize an array of objects employee(name, age, salary) and display the details of those employees whose name with ‘P”. 3. State one similiarity between the returned value of getElementsByTagName() and getElementsByClass() 4. In Js how will you declare and intialize an obejct an array
Can Any One Provide Program In Python How To Calculate Volume Of Rectangle
can any one provide program in python how to calculate volume of rectangle
You Are Required To Use Weka 3.6 (or A Later Version), You Will Then
You are required to use Weka 3.6 (or a later version), you will then use throughout the duration of this subject. Task 1: Weka data exploration [5 marks] In Weka workbench (workbench option for 3.8 or explorer option for older versions), load diabetes.arffdataset to answer the following questions. (a) How many instances and attributes (including the class attribute) does this dataset have? [1 mark] (b) How many classes are present in the dataset and how many instances are there for each class ?[2 marks] (c) Use histograms (with default settings) to show which age group has the highest number of samples? [2 marks]
Write A Bash Command That Will Perform An ‘ls -ld’ Command On Every Directory
Get college assignment help at Smashing Essays Write a bash command that will perform an ‘ls -ld’ command on every directory listed in the PATH variable. An example PATH variable looks like: .:/home/student/abby.smith/.bin/:/usr/lib64/mpi/gcc/openmpi/bin:/usr/local/bin:/usr/bin:/bin:/usr/bin/X11:/usr/X11R6/bin:/usr/games and the output should look like: drwx—— 2 abby.smith students 4096 Nov 14 07:05 . drwxr-xr-x 2 root root 4096 Dec 1 2017 /bin DO NOT USE ‘xargs’ in your answer – use command output capture $( ) and the ‘tr’ command instead.
In C ! Please Don’t Use Code That’s Already Been Posted. Thank You! A Text-based
In C ! Please don’t use code that’s already been posted. Thank you! A Text-based Game Goals Design a game with pointer-linked spaces Use object-oriented programming concepts Requirements This is the final project and you will be able to design and implement a one-player, text-based game where the player can move through spaces to get items and accomplish goals. You have the freedom to decide what kind of them you would like to create for your game as long the requirements below are met. Space class The game requires a Space class, which represents the space the player can be in. The Space class must be an abstract class that will have pure virtual functions (you can add not pure virtual functions, too). Inside the Space class, there must be at least 4 Space pointers: top, right, left, and bottom. Use the class to create a game with the structure of linked space. (You are free to add more Space pointers to the Space class, but must have at least 4 Space pointers) Note: Even if your structure is linear, such as a train, you still have at least 4 pointers in the Space class Any unused pointers need to point to NULL. The game must have at least 3 derived classes that are derived from the Space Each representing a different type of space, and need to have a special action for the player to interact with. It can be opening the door to another space, or maybe attack the monster, or turn on the light switch, or sing a song to please the king. The game must have at least 6 spaces. Gameplay The game must have a theme. It can be a crime-solving theme, a fantasy game. The game must also have a goal for the player, so the player can complete the goal to achieve victory. The game must keep track of which space the player is in. It can be in a form of visualized space, by printing the map out and indicate where the player is, or printing text describing where the player is at and what adjacent space is around the player’s space. You must create a container for the player, to carry “items”. The container must have a capacity limit. The game must contain some items for the player to obtain in the game and one or more of these items must be required as part of the solution to accomplish game’s goal, such as a key to open a locked door, etc. The game must have a time limit, which limits the amount of time/steps/turn the user can take before losing the game. The following are some notable examples of the time limit: Step limit that limits the number of times the user can switch spaces. Health system which decreases the player’s health point from space to space, and maybe some painkillers scattered around the spaces. Note: make sure you give enough steps to allow the game to perform testing. Again, the user must be able to interact with parts of the space structure, not just collecting items to complete the game. Interface At the beginning of the game, the goal of the game must be declared and printed to let the player know the goal of the game. The game cannot contain free-form input. An example of free-form input would be to type out “kitchen” to go to the kitchen space in the game. It is tedious and counter-intuitive. The game must provide the user a menu option for each scenario of the game. You are not required to have a printed map to visualize space, a text-based game is sufficient. But, it would be great to have a printed map, it is easier to interact with, and it’s cool to show a cool game with a map to friends and family. Extra Credit Best theme 10%: the graders will have the option to give extra credit for the most creative, interesting and well-designed games in the class. What you need to Submit All the program files including header and source files (.cpp/.hpp) makefile Your reflection pdf file Important: Put all the files in a single .zip file and submit it on Canvas. GRADING Programming style and documentation 10% : The program runs smoothly as intended on the flip, no segmentation fault, no memory leak, all files are put into a zip file, the code is well-commented. Create basic game structure 50%: Create at least 6 spaces of at least 3 different types (the abstract and derived classes): 20% Correctly use at least 4 pointers for each space to link them together: 10% Implement a goal for the player to achieve (sequence of actions to win and exit): 10% Keep track of player status: 10% Meet the advanced requirement 20%: Properly implement the step limit: 10% Properly implement the interaction of player and space structures: 10% Create a menu function to run the game: 10% Reflection document 10%: include the design description, test plan and results, comments about how you solved the problems
Create A Biographical Website In HTML That Contains The Following: An HTML Title Tag
Create a biographical website in HTML that contains the following: An HTML Title Tag At least two HTML Heading Tags At least three different size fonts – Font Tags At least two different color fonts – Font Color Tags Text formatting of italics, bold, and underline – HTML Formatting A table – Table Tags An ordered or bulleted list – List Tags A specified background color – Background Color Tags An anchor Link, which returns the user to the top of the page – Hyperlinks Tags At least one hyperlink to another website or email address – Hyperlinks Tags
Note: Create A Console Application Program (unless Otherwise Specified In The Problem) And Do
Note: Create a console application program (unless otherwise specified in the problem) and do not use the String.Format() method in formatting numbers for each of the following problems. 2. Mick’s Wicks makes candles in various sizes. Create a class for the business named Candle that contains data fields for color, height, and price. Create get methods for all three fields. Create set methods for color and height, but not for price. Instead, when a height is set, determine the price as $2 per inch. Create a child class named ScentedCandle that contains an additional data field named scent and methods to get and set it. In the child class override the parent’s setHeight() method to set the price of a ScentedCandle object and $3 per inch. Write a C# program that instantiates and object of each type and displays the details. Place all classes into one file. Output should be user friendly.
Note: Create A Console Application Program (unless Otherwise Specified In The Problem) And Do
Note: Create a console application program (unless otherwise specified in the problem) and do not use the String.Format() method in formatting numbers for each of the following problems. Your professor wants to send a message to his friend but is afraid of the message being read by others. He has a simple encryption scheme to apply to his message. Instead of sending characters, your professor will send numbers. He wants to use the ASCII values of characters but that is a little too obvious. So, he will represent the numbers using bases other than base ten. To make his code harder to break he is going to change the base for each line. The first line of the message will use base two, the second line will use base three, the third line will use base five, the fourth line will use base seven. If there are more than four lines in the message the fifth line will cycle back to base two, the sixth line will be base three and so forth. Here is an example of which base to use on a given line Line 1 — uses base two Line 2 — uses base three Line 3 — uses base five Line 4 — base seven Line 5 — uses base two Line 6 — uses base three Line 7 — uses base five Line 8 — uses base seven Line 9 — uses base two … Each character in the message will be replaced by a number, including spaces. The number will be the ASCII value of the character in the appropriate base. The newline characters at the end of the line are not encoded. The number for each character will be followed by a single underscore character, ‘_’, except for the last character on a given line. Write a C# program to perform this encryption scheme. The first line of input will contain a single integer n that indicates the number lines in Sam’s message from a data file. The following n lines will be the plain text version of Sam’s message. Output the encoded messaging using your professor’s encryption algorithm. Let the user input the file name from the keyboard. Refer to the sample output below. Sample File 5 Mik Hi! How are u? “car” is yellow Bye
Sample Run: Enter the file name: code.txt Message: 1001101_1101001_1101011 2200_10220_1020_1012 242_421_434_112_342_424_401_112_432_223 46_201_166_222_46_44_210_223_44_232_203_213_213_216_230 1000010_1111001_1100101_100000_111010_101001
Note: Create A Console Application Program (unless Otherwise Specified In The Problem) And Do
Note: Create a console application program (unless otherwise specified in the problem) and do not use the String.Format() method in formatting numbers for each of the following problems. Your professor is doing research using some very precise floating-point measurement values, some very large, some very small, and the first step is simply to sort them in ascending order. Write a C# program to accomplish this. Input is a datafile containing several non-negative floating-point values. Output to the screen an ascending sorted list of the values, each value shown in the exact format as provided in the data file. Let the user input the file name from the keyboard. Refer to the sample output below. Sample File– Enter the file name: numbers.txt 395.96774839412213864694087795 375.286439548498——– 0.23943358855017051969126499 8.412190040221——– 0.382560882678260591251068 0.382560882678260591251068—— 0.392863116206040 0.23943358855017051969126499——– 0.91986136436504 95.96038946102548087733835——– 8.412190040221 0.392863116206040——— 46.8020528027329 557.91740143772795279——- 95.96038946102548087733835 46.8020528027329——— 375.286439548498 0.91986136436504——— 395.96774839412213864694087795 557.91740143772795279
Nstructions: You Are Taking Calls For A Help Desk. Read The 2 Scenarios Provided
nstructions: You are taking calls for a help desk. Read the 2 scenarios provided below. A customer brings you her laptop computer and tells you that it will not connect to any Wi-Fi networks. She tells you that it was working yesterday, and that she was on the web updating her Facebook page and then downloading a coupon-shopping program. Now she cannot connect to the Internet. A friend asks you to look at his laptop computer. He tells you that any time the screen is moved, the image on the screen flickers and then goes blank. He also says that when he is on the World Wide Web, random webpages open without his authorization. When he tries to close them, more of these pages open up. Click the link below this assignment to open the Knowledge Based Assignment (KBA) Template. Read the instructions for each item in the template. In a new Word document, create 1 Knowledge Based Assignment for EACH scenario, following the template instructions. You will be creating 2 KBAs in the same Word document. Fill out the KBA for each section as directed in the KBA template, save your work, and submit your Word document to your instructor. Please review the rubric below to see how you will be graded. Knowledge Based Assignment (KBA) Template This is the (KBA) Template below Date Created: Date Article Written Author: Name of person writing article Date Last Updated: Date article was change or reviewed for continued use Editors: N/A ARTICLE NUMBER: This section will be completed when the article is reviewed. The article number will be set to one number higher than the last article number used. Please use you student ID number. TITLE: This will be a unique name of the article determined by the author. It should include a brief description of what the article addresses (i.e. Computer Will Not Boot or How-To Create a User Account). SYMPTOMS: This will be used to describe what may be experienced if this article is related to the occurring problems or why you would perform certain tasks. APPLIES TO: This section will list all of the applications affected by the “CAUSE”. For instance, if there is a problem or a HOW-TO with MS OFFICE, the APPLIES TO section would include Microsoft Outlook 2013, Microsoft Word 2013, Microsoft Excel 2013, Microsoft PowerPoint 2013 and Microsoft Access 2013. KEYWORDS: This section will be used to list words that you may search upon if you are experiencing a problem related to this article. Although the works may be used elsewhere in the document, typing them in this section will emphasize their importance. Please type the words/phrases in bold separating them with a comma. Think Google. RESOLUTION: This section will be used for the resolution if one exists. The resolution should be written in steps that are numbered. The article should also include several screen shots to assist the user of the document in resolving the issue. For example: 1. Log off of computer 2. Log on as a local administrator 3. Click on the start menu and select run 4. Do … 5. Log off of computer a. Click on the start menu b. Shutdown, do not just log off i. Choose Shutdown ii. Select Shutdown from the dropdown list iii. Click OK 6. Log back on with original username
It Is Important To Program Your Code Efficiently. Efficient Code Manages Errors And Exceptions
It is important to program your code efficiently. Efficient code manages errors and exceptions and cleans up memory after it ends. The try-except statements are helpful in handling errors that are detected during execution. What are the two categories of errors when debugging code? How can the try-except statements handle errors in Python? Provide a code example that supports your comments.
A. This Model Can Only Be Fitted To Data Without Trend Or Seasonality: 1.
A. This model can only be fitted to data without trend or seasonality: 1. ARIMA 2. AR 3. ARMA 4. BOTH B AND C B. In this combination approach, multiple methods are applied to the time series. The resulting forecasts are then averaged to produce the final forecast. 1. Neural Networks 2. Multi level method 3. ensembles 4. none of the above C. In this approach, we create multiple training validation partitions by moving the partitioning one period at a time. This also simulates a deployment scenario where we refresh our forecasts period-by-period. 1. Imputation 2. Arima 3. Smoothing Method 4. Roll-forward validation D. This approach is generally taken to take advantage of auto correlation: 1. Directly build autocorrelation into the regression model 2. construct a second level forecasting model on the residual series 3. both a and b 4. none of the above
B.You Have Been Requested To Improve The Security Of A Computer Encryption System From
b.You have been requested to improve the security of a computer encryption system from 14-bit encryption to 18-bit system. i.How many possible keys are available in the 14-bit system? ii.How many possible keys are available in the 18-bit system? iii.How much more secure is the new 18-bit system?
A. Typically Model Driven Methods Are Easier To Automate Because They Learn Patterns From
A. Typically Model driven methods are easier to automate because they learn patterns from data. true or false B. We can use this function in R to compute and plot the autocorrelations of a series at different lags. 1. Arima Function 2. ACF Function (forecast package) 3. Plot function 4. All of the above C. This pattern in time series means observations that fall in some seasons have consistently higher or lower values than those that fall in other seasons. 1. Non Linear trend 2. Seasonality 3. Polynomial Trend 4. Expondential Trend D. Dunne and Shneiderman list this as a graph readability principle 1. Every node should be visible 2. For every node, you should be able to count its degree 3. Clusters and Outliers should be identifiable 4. all of the above
The post ASAP PLEASE!!! DO THIS IN JAVA A Company Needs To Develop An Oriented Library appeared first on Smashing Essays.