Need help in homework

Assignment:
Provide a reflection on Artificial Intelligence at least 500 words (or 2 pages double spaced) of how the knowledge, skills, or theories of this course have been applied, or could be applied, in a practical manner to your current work environment. If you are not currently working, share times when you have or could observe these theories and knowledge could be applied to an employment opportunity in your field of study. 

Requirements:

  • Provide a 500 word (or 2 pages double spaced) minimum reflection.
  • Use of proper APA formatting and citations. If supporting evidence from outside resources is used those must be properly cited.
  • Share a personal connection that identifies specific knowledge and theories from this course.
  • Demonstrate a connection to your current work environment. If you are not employed, demonstrate a connection to your desired work environment. 
  • You should not provide an overview of the assignments assigned in the course. The assignment asks that you reflect how the knowledge and skills obtained through meeting course objectives were applied or could be applied in the workplace.

assign

 

Assignment Instructions and Requirements

There are three parts of this assignment: development of a process,  writing a job description, and formulating interview questions. Each  must be presented in a separate Word document, with formatting and  document names that would be appropriate for the workplace.

Do not format your documents to look anything like APA papers.

  • Paragraphs should be single-spaced with a blank line between paragraphs.
  • Lists should be single-spaced.
  • Do not include a running head or other APA style elements.
  • It is acceptable but not required to have a cover page for your  documents. If you choose to do this, use the same cover for all three  documents for consistency sake (as you would in the workplace for  branding purposes).

Formality, neatness, and readability are expected.

Scenario:

You are the top IT manager for 504 Technologies and realize the need  for hiring a new tech employee. The company has not yet set up a hiring  process and the CEO has tasked you with creating one before writing the  job description and planning for interviews.

Document 1: Develop a hiring process.

  • Content: 
    • Write a suitable descriptive title in the document.
    • Include at least six distinct steps. 
      • Provide enough detail so that someone else would be able to easily  understand and follow all steps and sub-steps of this process.
      • You may write this entirely from your own experiences and critical  thinking. However, if you decide to use any source material, do not  quote or copy, and make sure you cite/reference using APA standards.
    • Include your first and last names at the very end of the document to identify yourself as the author.
  • Format: 
    • Write in complete sentences, and present your process in a numbered list form.
    • Format the document so that it looks professional and is highly readable.
  • Length: 
    • This document must contain 200–250 words. Should you find this difficult to attain, include your reasoning for the steps.
  • Document name: 
    • Use a logical, descriptive name for your Word document. Do not include the course number, unit number, or your name.

Document 2: Write a job description.

  • Preparation: Choose a career from the following list. If you wish to  investigate an IT career not on this list, you must receive prior  permission from the professor (ask via email). Note that the professor  reserves the right to deny requests, and if this occurs, will give you a  reason. 
    • Computer Programmer
    • Cybersecurity Specialist
    • Database Administrator
    • Graphics/Multimedia Designer
    • Information Security Analyst
    • IT Project Manager
    • Network Administrator
    • Tech Support / Help Desk
    • Webmaster
  • Content: 
    • Write a suitable descriptive title in the document.
    • Provide content as explained in the Reading PDF. 
      • Invent information about the company (do not copy from the course).
      • This person will work at the Springfield campus.
      • Do not include a salary or a salary range.
      • While reviewing job descriptions online may be helpful, do not copy,  quote, or cite sources. This description must be written from your  understanding of the job itself.
    • Include your first and last names at the very end of the document to identify yourself as the author.
  • Format: 
    • This will be a combination of a few paragraphs and several lists. Review the Reading PDF for this information.
    • Format the document so that it looks professional and is highly readable.
  • Length: 
    • This document must contain 200–250 words.
  • Document name: 
    • Use a logical, descriptive name for your Word document. Do not include the course number, unit number, or your name.

Document 3: Develop interview questions.

  • Content: 
    • Write a suitable descriptive title in the document.
    • Identify the job for which these questions are relevant. This must relate to the job description you wrote for Document 2.
    • Develop six (6) interview questions that the manager will ask candidates who are invited for interviews. 
      • Write meaningful questions that will help you focus on the  candidate’s qualifications and suitability for the job that you  advertised. Assume you already know the person’s name and that you will  not be asking simple questions that should be found in his/her resume.
      • Write open-ended questions (see the Reading PDF).
      • Do not ask illegal or unethical questions (see the Reading PDF).
      • Do not use source material for this document; it is okay to peruse  online ideas, but you must write this entirely in your own words and use  your critical thinking.
    • For each of your six questions, explain what you intend to learn  from the candidate’s answers. Examples are given in the Reading PDF.
    • Include your first and last names at the very end of the document to identify yourself as the author.
  • Format: 
    • Write in complete sentences, and present your questions in list  form. Reasoning should follow each question. You may use the bulleted  format shown in the Reading PDF examples.
    • Format the document so that it looks professional and is highly readable.
  • Length: 
    • There is no designated length except for ensuring that you have six complete questions accompanied by reasons for asking them.
  • Document name: 
    • Use a logical, descriptive name for your Word document. Do not include the course number, unit number, or your name.

4/3 Discussion

There will be a final project due in Workshop Six. Note the information below related to the completion of the final project.

You will complete the final paper in the form of a compliance and governance plan for an organization. You may use your own organization (although you must change the name for confidentiality purposes) or use a fictitious company. You may use the internet to look for examples of privacy policies and compliance and governance plans; however, the plan you develop must be in your own words. The plan must cover the issues and concerns that need to be addressed by the plan, including the following:

  • Privacy issues of customers
  • Protection of intellectual property your organization possesses (assume the company has some copyrighted or patented material [e.g., software] or some product)
  • Cyberlaws that will apply to your organization

The paper should be outlined as follows:

  • Executive summary/introduction, including the issues and concerns to be addressed by the plan
  • Sections that address each of the concerns noted above
  • Conclusion

The paper should be about 15 pages in length (double-spaced), and transitions between sections should be addressed. Any graphics or tables do not count toward the page count. Make sure to use 7th edition of the APA style guide where required. The paper should include credible references that are cited according to the 7th edition of the APA style guide. You may and should use research to develop your plans, but make sure to cite your sources.

Comprehension

  

Part I: Comprehension of java programming concepts (Total 16):

Answer the following questions in a paragraph using full sentences.

  1. Define the term inheritance in java and give an      example.(4 points).

2. List two differences and one similarity between an interface and an abstract class (6

Points).

Differences 

1) Abstract class is a class which contains one or more abstract methods, which has to be implemented by sub classes. An abstract class can contain no abstract methods also i.e. abstract class may contain concrete methods. 

 

3. Describe the Java Collections Framework. Explain the differences between the Set, List and Map interfaces referring to the elements/objects that they store. (6 points)

Part II Fill in the blanks (Total 20 points):

Complete each sentence or statement with the missing word(s)

Type in the missing word(s) in the given box, , to complete each statement.

1. (2 pts)The constructor of a derived class can access the constructor of its base class by

using the java reserved word(keyword).

2. (2 pts) binding is when the meaning of a method invocation is not bound to it until the program is run.

3. (2 pts) Adding the  modifier to a method heading prevents derived classes from

overriding the method.

4. (2 pts) A(n) specifies headings for methods that must be defined by an

class.

5. ( 2 pts) In Java, every class is a descendant of the class

6. ( 2 pts) Object-oriented programming allows you to derive new classes from existing

classes. This is called.

7. (2 pts) may be used to convert an object of one class type to another within the

inheritance hierarchy.

8. (1 point each) A(n) class can be extended with the condition of providing

implementations for all of the methods of the class.

9. (2 pts) A(n) is a kind of component that can have other components added to it.

10. ( 2 pts) You can refer to any member of the current object from within an instance

method or a constructor by using the java keyword .

 

Part III: Multiple Choice Questions(Total 28 pts)

Identify the letter of the choice that best completes the statement or answers the question.

Type the letter “X” in the given box, , to indicate the selection. (2 points each).

1.When comparing two objects to see if they have the same contents, one should

a. use the = operator

b. use the == operator

c. define an equals method in the class and use it

d. use the equals method to see if they have the same variable name

2. The term overloaded refers to

a. an error where more than one method matches a method call

b. two or more methods in the same class that have the same name

c. method calls where there are two many actual parameters

d. two or more methods in different classes that have the same name

3. Suppose Child is a derived class of Parent and doStuff() is a private method in the class

Parent. Which of the following is true?

a. doStuff() may be used in the definition of methods in Child.

b. doStuff() may not be used in the definition of methods in Child.

c. In some, but not all cases, doStuff() may be used in the definition of methods in Child..

d. none of the above

4. Which statement best describes overriding a method?

a. Methods in a base class and derived class have the same name but different visibility

modifiers.

b. Methods in a base class and derived class have the same name and have the same

number and types of parameters.

c. Methods in a base class and derived class have the same name but have different return

types.

d. Methods in a base class and derived class have the same name but different number or

types of parameters.

5. Assume that Sub1 and Sub2 are both subclasses of class Super.

Given the declarations:

Super super = new Super();

Sub1 sub1 = new Sub1();

Sub2 sub2 = new Sub2();

Which statement best describes the result of attempting to compile and execute the following

statement:

super = sub1;

a. Compiles and definitely legal at runtime

b. Does not compile

c. Compiles and may be illegal at runtime

6. For the following code:

class Super

{ int index = 5;

public void printVal()

{ System.out.println( “Super” );

}

}

class Sub extends Super

{ int index = 2;

public void printVal()

{ System.out.println( “Sub” );

}

}

public class Runner

{ public static void main( String argv[] )

{ Super sup = new Super();

System.out.print( sup.index + “,” );

sup.printVal();

}

}

What will be printed to standard output?

a. The code will not compile.

b. The code compiles and “5, Super” is printed to standard output.

c. The code compiles and “5, Sub” is printed to standard output.

d. The code compiles and “2, Super” is printed to standard output.

e. The code compiles and “2, Sub” is printed to standard output.

f. The code compiles, but throws an exception.

7. What will happen when you attempt to compile and run the following code. Classes are

saved in separate files.

8. Which of the following statements is true?

a. An interface can only contain method(s) and not variables

b. Interfaces cannot have constructors

c. A class may extend only one other class and implement only one interface

d. A class accesses an interface via the keyword uses

9. An abstract class

a. is a class which cannot be instantiated

b. is a class which has no methods

c. is a class which has only abstract methods

d. is a class which has only overridden methods

CMIS 242 2009-10, Spring, Session 1 Nafia Gungordu

10) Which of the following statements is false?

a. If a class has any abstract methods it must be declared abstract itself.

b. All methods in an abstract class must be declared as abstract

c. When applied to a class, the final modifier means it cannot be sub-classed

d. abstract and interface are Java keywords

11. A catch-block

a. is a special method used in exception handling

b. allows the user to specify what will happen next in the program

c. is not allowed in the same method as a try-block

d. contains code that is executed when an exception occurs

12. Given the following code

import java.io.*;

public class Ppvg{

public static void main(String argv[]){

Ppvg p = new Ppvg();

p.fliton();

}

public int fliton(){

try{

FileInputStream din = new FileInputStream(“Ppvg.java”);

din.read();

}catch(IOException ioe){

System.out.println(“flytwick”);

return 99;

}finally{

System.out.println(“fliton”);

}

return -1;

}

}

Assuming the file Ppvg.java is available to be read correctly which of the following

statements is true if you try to compile and run the program?

a. The program will run and output only “flytwick”

b. The program will run and output only “fliton”

c. The program will run and output both “fliton” and “flytwick”

d. An error will occur at compile time because the method fliton attempts to return two

values

13. What is the default layout manager for a JPanel?

a. FlowLayout

b. BorderLayout

c. GirdLayout

d. No default layout manager

14.Suppose you want to display a text in multiple lines, which component should you use?

a. JButton

b. JLabel

c. JTextField

d. JTextArea

Part IV: Comprehension of java programming code (Total 36pts. ):

Please indicate what is displayed on the console(standard output) when the following program/code is

executed? Please note that all the given codes can be compiled and executed.

1. (5 Points) Consider the following classes saved separately:

public class Base

{

private int num = 10;

public void print()

{

System.out.println(num);

}

public void setNum(int j)

{

num = j;

}

}

public class Derived extends Base

{

public void setNum(int j)

{

super.setNum(j + 10);

}

}

public class BaseDriver{

public static void main(String[] args)

{

Derived d = new Derived();

d.setNum(20);

d.print();

}

}

What is the output?

         

2. (5 points)Consider the following classes saved in separate files:

public class Base

{

public void print(Base b)

{

System.out.println(“Base”);

}

}

public class Derived extends Base

{

public void print(Derived b)

{

System.out.println(“Derived”);

}

}

public class BaseDriver{

public static void main(String[] args)

{

Base d1 = new Base();

Derived d2 = new Derived();

d1.print(d1);

d1.print(d2);

}

}

What is the output?

 

3. (6 points)Consider the code below:

void myMethod()

{ try

{

fragile();

}

catch( NullPointerException npex )

{

System.out.println( “NullPointerException thrown ” );

}

catch( Exception ex )

{

System.out.println( “Exception thrown ” );

}

finally

{

System.out.println( “Done with exceptions ” );

}

System.out.println( “myMethod is done” );

}

What is printed to standard output if fragile() throws an Exception called

IllegalArgumentException?

 

4. ( 6 points)What is displayed on the console when the following program is run?

public class Test {

public static void main(String[] args) {

try {

int[] a = new int[10];

a[10] = 1;

System.out.println(“Welcome to HTML”);

}

catch (Exception ex) {

System.out.println(“There is an exception”);

}

finally {

System.out.println(“The finally clause is executed”);

}

}

}

What is the output?

5. (6 pts)Design a java interface called Priority that includes two methods: incrementPriority

(void method)and getPriority(returns an integer). The interface should define a way to

establish numeric priority among a set of objects.

6. ( 8 points)What is the output of the following program? Please view/use the “References”

section at the end of the exam.

import java.util.*;

public class Exercise{

public static void main(String[] arg){

ArrayList list = new ArrayList();

list.add(0,”One”);

list.add(1,”Two”);

list.add(2,”Three”);

list.add(3,”Four”);

list.add(4,”Five”);

System.out.println(list);

list.remove( 3 );

System.out.println(list);

System.out.println(list.get(2));

list.set(1,”Hello”);

System.out.println(list);

}

}

What is the output?

Class ArrayList

Resizable-array implementation of the List interface. Implements all optional list operations,

and permits all elements, including null. In addition to implementing the List interface, this

class provides methods to manipulate the size of the array that is used internally to store the

list. (This class is roughly equivalent to Vector, except that it is unsynchronized.)

Method Summary

Appends the specified element to the end of this list.

Inserts the specified element at the specified position in this list.

Appends all of the elements in the specified Collection to the end of this list,

in the order that they are returned by the specified Collection’s Iterator.

Inserts all of the elements in the specified Collection into this list, starting at

the specified position.

Removes all of the elements from this list.

Returns a shallow copy of this ArrayList instance.

Returns true if this list contains the specified element.

Increases the capacity of this ArrayList instance, if necessary, to ensure that it

can hold at least the number of elements specified by the minimum capacity

argument.

Returns the element at the specified position in this list.

Searches for the first occurence of the given argument, testing for equality

using the equals method.

Returns the index of the last occurrence of the specified object in this list.

Removes the element at the specified position in this list.

Removes a single instance of the specified element from this list, if it is

present (optional operation).

protected

void

Removes from this List all of the elements whose index is between

fromIndex, inclusive and toIndex, exclusive.

Replaces the element at the specified position in this list with the specified

element.

Returns the number of elements in this list.

Returns an array containing all of the elements in this list in the correct order.

T[]

Returns an array containing all of the elements in this list in the correct order;

the runtime type of the returned array is that of the specified array.

Trims the capacity of this ArrayList instance to be the list’s current size.

wk 7

What role do you feel that VR/AR will play in the future for managing products within an enterprise supply chain system?

Exp19_Excel_Ch08_ML1_Portfolio_Analysis

Exp19_Excel_Ch08_ML1_Portfolio_Analysis

Exp19 Excel Ch08 ML1 Portfolio Analysis 

Excel Chapter 8 Mid-Level 1 – Portfolio Analysis

Project Description:

You are a financial advisor, and a client would like you to complete an analysis of his portfolio. As part of the analysis you will calculate basic descriptive statistics with the Analysis ToolPak, calculate standard devi-ation and variance in value, calculate correlation between asset age and value, and create a stock forecast sheet.

     

Start Excel. Download and open   the file named Exp19_Excel_Ch08_ML1_HW_PortfolioAnalysis.xlsx.   Grader has automatically added your last name to the beginning of the   filename.

 

Use the STDEV.S function to   calculate the standard deviation between the current values of all   commodities in cell G6.

 

Use the VAR.S function to   calculate the variance between the current values of all commodities in cell   G9.

 

Ensure the Analysis ToolPak is   loaded. Create a descriptive statistics summary based on the current value of   investments in column E. Display the output in cell G12.

 

Format the mean, median, mode,   minimum, maximum, and sum in the report as Accounting Number Format. Resize   the column as needed.

 

Use the FREQUENCY function to   calculate the frequency distribution of commodity values based on the values   located in the range I6:I10.

 

Click the Trend worksheet and   use the CORREL function to calculate the correlation of purchase price and   current value listed in the range C3:D9.

 

Create a Forecast Sheet   displaying a forecast of purchase price through 1/1/2025. Name the worksheet Forecast_2025. Mac users, insert a new sheet   named Forecast_2025. Copy the range B2:C9 on the   Trend worksheet and paste it into cell A1 on the Forecast_2025 sheet. Type Forecast(Purchase   Price) in cell   C1 and 1/1/2025 in cell A9. In cell C9, enter   the formula =FORECAST.ETS(A9,B2:B8,A2:A8).

 

Save and close EXP19_Excel_Ch08_ML1_HW_PortfolioAnalysis.   Exit Excel. Submit the file as directed.

webserver

 

Web server auditing can go a long way in enforcing tighter security and ensuring business continuity. The power of log data is tremendous. Web server logs record valuable information pertaining to usage, errors, and other important security events. Using a specialized auditing tool can be extremely helpful during the audit of web servers. In your discussion this week, please discuss the methods of identifying weak web server configurations and how to mitigate them for a secure web server. Possible concepts to include are SSL certificates, HTTPS usage, attack surface, SQL injection, vulnerability migration, and least privilege. In at least one of your peer responses, provide an overview of how to audit the web server’s security and implement best practices.

Please make your initial post and two response posts substantive. A substantive post will do at least TWO of the following:

  • Ask an interesting, thoughtful question pertaining to the topic
  • Answer a question (in detail) posted by another student or the instructor
  • Provide extensive additional information on the topic
  • Explain, define, or analyze the topic in detail
  • Share an applicable personal experience
  • Provide an outside source that applies to the topic, along with additional information about the topic or the source (please cite properly in APA 7)
  • Make an argument concerning the topic.

At least two scholarly source should be used in the initial discussion thread. Use proper citations and references in your post.

Discussion 4-2

????Week 4 Discussion 2 Week 4 Discussion 2When thinking about data visualization, it is important to understand regular expressions in data analytics.  Therefore, note the importance of data visualizations and choose two types of expressions (* – wildcards for example) and discuss the difference between the two types of expressions.