input - Notepad File Edit Format View Help This is an input file to be used for project 1 in Computer Science 212 The words a

Write a main application called Project1.java, and a GUI (that extends JFrame) called WordGUI.java. The main program should open a file called “input.txt” which

 

*This is java programming 

Write a main application called Project1.java, and a GUI (that extends JFrame) called WordGUI.java. The main program should open a file called “input.txt” which will contain words, one per line. As the words are read from the file, they should be displayed in the GUI as follows:

      The GUI should have a grid layout of two rows (row 0 and row 1) and three columns (column 0, 1 and 2). All words that start with an ‘A’ or ‘a’ should be displayed in row 0, column 0. All words that start with an ‘E’ or ‘e’ should be displayed in row 0, column 1. Likewise for words starting with ‘I’ or ‘I’ in row 0 column 2, with ‘O’ or’o’ in row 1 column 0, with ‘U’ or ‘u’ in row 1 column 1, and the rest of the words in row 1, column 2.

“input.txt” file is looks like that:

input - Notepad File Edit Format View Help This is an input file to be used for project 1 in Computer Science 212 The words aWrite a main application called Project1.java, and a GUI (that extends JFrame) called WordGUI.java. The main program should o

Activity 6- Project HR & Stakeholder Mngt

How does communicating with stakeholders virtually versus in-person differ? Is one more effective than another?

Text

Title: Managing Project Stakeholders 

ISBN: 9781118504277 

Authors: Tres Roeder 

Publisher: John Wiley & Sons 

Publication Date: 2013-04-22

Reflection

1 page

Please share your experience (both educational and non-educational) at university with us in a Reflection Paper.

this class is Computer and Information Networking

Security Architecture and Design

Briefly respond to all the following questions. Make sure to explain and backup your responses with facts and examples. This assignment should be in APA format and have to include at least two references. (Minimum of 600 words)

1. When should the architect begin the analysis?

2. What are the activities the architect must execute?

3. What is the set of knowledge domains applied to the analysis?

4. What are the tips and tricks that make security architecture risk assessment easier?

Electronic innovation and the government

 

Electronic innovation and the government

Find a peer-reviewed scholarly journal article discussing electronic innovation and the government. Complete a review of the article by writing a 2-3 page overview of the article. This will be a detailed summary of the journal article, including concepts discussed and findings. Additionally, find one other source (it does not have to be a peer-reviewed journal article) that substantiates the findings in the article you are reviewing. 

You should use the UC library (https://www.ucumberlands.edu/library) and/or Google Scholar to find these types of articles (https://scholar.google.com/ )

Once you find the article, you will read it and write a review of it.  This is considered a research article review.

Your paper should meet these requirements: 

  • Be approximately three to four pages in length, not including the required cover page and reference page.
  • Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Mobile Application Forensic

 Mobile ForensicsLearning Objectives and Outcomes

  • Describe the steps involved in seizing evidence from a mobile device.
  • Describe the information a mobile device reveals about the owner.

Assignment Requirements
You are an experienced employee of the DigiFirm Investigation Company. DigiFirm is conducting an employee training activity in which employees describe the process of how they would look for evidence on their own mobile devices.For this assignment, write a report that:

  • Details the properties of one of your own mobile devices
  • Outlines the steps you would take to seize evidence from your device, including device storage system data, and so on
  • A few legal issues related to mobile device forensic activities in general
  • Lists the general information that your device reveals about your life

Required Resources

  • Course textbook
  • Internet

Submission RequirementsFormat:Microsoft WordFont:Arial, size 12, double-spaceCitation Style:Follow your school’s preferred style guideLength:1-2 pages
Self-Assessment Checklist

  • I wrote a report that details the properties of one of my mobile devices, outlines the steps I would take to seize evidence from my device, describes a few legal issues related to mobile device forensic activities in general, and lists the general information that my device reveals about my life.
  • I created a professional, well-developed report with proper documentation, grammar, spelling, and punctuation.

Data component and Bayes Classifiers

Assignment 1

Please note a system that you work with frequently that has a major data component.  Note the type of data, how the data is managed and maintained, and any other important factors regarding the data in the system.

250 words. There must be APA formatted references (and APA in-text citations) to support the thoughts in the post.

Textbook: Kirk, Andy.  Data Visualization: A Handbook for Data Driven Design, Second Edition. Sage, 2019.

Assignment 2

Chapter 4

  1. What are the various types of classifiers?
  2. What is a rule-based classifier?
  3. What is the difference between nearest neighbor and naïve Bayes classifiers?
  4. What is logistic regression?

The assignment should be 100-150 words. There must be APA formatted references (and APA in-text citations) to support the thoughts in the post.

Textbook: Introduction to Data Mining 

ISBN: 9780133128901 

module 04

 

Module 04 Content

  1. As part of XYZ’s normal auditing processes, the process of validating the employees of XYZ is very important. One element that is important is to find a particular group or organizational unit where all employees can be found. In this case, all the employees are granted access to XYZ’s VPN network. Therefore, this becomes the most consistent location of users, and accomplishes a secondary audit.
    You will be provided an Active Directory Users and computers query based on the distinguished name of the VPN user group. You will also be provided an employee census report from HR detailing the existing and terminated employees. Taking this information, you will combine the two data pieces to determine variants. You will then need to complete an audit checklist provided as well. If an element within the checklist has no information to include, the proper response in these cases is to note, “no exceptions found”.
    Use the following documents to complete this part of your project:

    • Employee Census
    • Employee Census.xlsx
    • Audit Checklist
    • Audit Checklist.docxBe sure to look at all the tabs on the Employee Census document and use VLOOKUP to perform your analysis. After you complete your audit on the census, complete the Audit Checklist. Finally, submit both your updated Employee Census and Audit Checklist.
      Submit your completed assignments by following the directions linked below. Please check the Course Calendar for specific due dates.
      Save your assignments as a Microsoft Word and Mircrosoft Excel document. (Mac users, please remember to append the “.docx” and “xlsx” to the filename.) The name of the file should be your first initial and last name, followed by an underscore and the name of the assignment, and an underscore and the date. An example is shown below:
      Jstudent_exampleproblem_101504

Develop a Java application that plays

  

Develop a Java application that plays a “guess the number” game as described below.
a) Your application first gets a random number in the range 1-1000 inclusive (you might want to use Math.random() or the Random class).
b) The application then displays the following prompt (probably via a JLabel):
I have a number between 1 and 1000. Can you guess my number?
Please enter your first guess.
Post a textbox for the user to enter a number and post a message telling the user to hit ‘Enter’ after entering a guess in a textbox (probably using a JTextField).
c) Input the user’s guess in the code for a previously-registered event-handler method (consider using the event-handling approach discussed in the text, or the actionPerformed() method of class based on the ActionListener interface, which will require some additional research outside the text).
d) For the first guess, color the entire background red, meaning that they are getting warmer (you might want to use the setBackground() method for a container). If this is the second or later guess, and they are further from the correct number than the last guess, then color the entire background blue. If they get the correct number then color the background some other color than red or blue.
e) If the user guessed the number correctly, respond with their number, post a congratulatory message, get a new random number, and display a JButton to start a new game. Otherwise, to help the user close in on the correct number, post a message, with their guessed number, whether they are “TOO HIGH” or “TOO LOW” from the correct number, and whether they are “WARMER” or “COLDER” (this should match the background color). Also report the guess number of the next guess (e.g. “Enter guess number nnn”). You might want to use a concatenated string in JLabel for these incorrect guess messages.
f) The process is repeated each game until the user guesses the correct number. Be sure that you erase obsolete status messages.