Operational excellence

Discussion: 

 This week we focus on the knowledge management cycle noted in Figure 5.3 in the Information Technology and Organizational Learning text. Note the various aspects of knowledge management, continuous innovation, and competitive advantage and how they integrate with one another. 

Assignment: 

 Information Systems for Business and Beyond Questions:

  • Chapter 5 – study questions 1-9, Exercise 1
  • Chapter 6 – study questions 1-10, Exercise 6, & 7

Information Technology and Organizational Learning Assignment:

  • Chapter 4 – Review the section on Linear Development in Learning Approaches.  Discuss how learning changes over time impact organizational culture.  What is the impact of this cultural change on the success of IT projects?
  • Chapter 5 – Review the Roles of Line Management and Social Network and Information Technology sections.  Note the various roles in the organization and note the similarities and differences within each role.  Also, note how innovation technology management shapes how we communicate amongst coworkers within an organization. 

Scenario and Summary

  

Scenario and Summary 

 In this lab you will create a single program that creates and reads a sequential file.

  

Deliverables

Program files for each of the following two programs

  1. GuessGame 
  2. Text File I/O 

At the beginning of ALL your programs, put a comment box that includes the program name, your name, and a brief description of the program. 

Example: 

/***********************************************************************
Program Name: ProgramName.java
Programmer’s Name: Student Name
Program Description: Describe here what this program will do
***********************************************************************/ 

How to submit your assignment: 

  1. The programs MUST have the same names as the assignment      title. 
  2. Each Java source file (*.java) must include a      corresponding class file (*.class) program as evidence of success. 
  3. In addition to the program source code files and byte      code files, put all your program source code files and screen shots of      your program output files into a Word document. 
  4. You must use a zipped folder to send your weekly      assignment to the Dropbox. Do not send subfolders within your zipped      folder. Place ALL of the .java and .class files for the week into the one      zipped folder. The zip folder should be named:      CIS355A_YourLastName_iLab_Week5, and this zip folder will contain all the      weekly programming assignments.

  

i L A B S T E P S 

  

STEP 1: GuessGame (20   points)

Back to Top

Write a program named GuessGame.java that plays the game “guess the number” as follows: Your program chooses the number to be guessed by selecting an integer at random in the range 1–100 The program then displays the following in a label.

I have a number between 1 and 100 — can you guess my number?

Please enter your guess: ____________________

A JTextField should be used to input the guess. A JButton must be provided to allow the user to press each time a guess is entered. As each guess is input, the background color should change to either red or blue. Red indicates that the user is getting warmer, and blue indicates that the user is getting colder. A JLabel should display either Too High or Too Low to help the user zero in on the correct answer. When the user gets the correct answer, Correct! should be displayed, and the JTextField used for input should be cleared and changed to be uneditable. Also, a JButton should be provided to allow the user to play the game again. When the New Game JButton is clicked, a new random number should be generated and the input JTextField changed to be editable. A JButton must be provided to allow the user to exit the application. Also provide a count of the number of guesses the user entered when the correct number is guessed. 

Grading Rubric 

   

GuessGame

Points

Description

 

Standard header included

1

Must contain program’s name, student name, and description of   the program

 

Program compiles

1

Program does not have any error

 

Program executes

1

Program runs without any error

 

GUI contains the required   labels

2

GUI contains the label with the initial question, the label for   the input field, and the label for the Too high or Too low message

 

GUI contains input text   field for the guess

2

GUI contains the input field for entering the guess

 

GUI contains the Guess, New   Game, and Exit buttons

3

GUI contains the Guess button, New Game button, and Exit button

 

Each button handles the   corresponding events properly

6

Each button handles and processes its corresponding behavior

 

Program displays the   correct output

4

Program displays the correct messages, changes the colors   appropriately, and displays the count of guesses

 

Subtotal

20

  

STEP 2: Text File I/O (20   points)

Back to Top

Write a program called TextFileIO.java to create a file named numbers.dat. Then create an algorithm that writes all even numbered integers from 1 to 100, separated by a comma. After the file has been created, close and reopen the file and display the results to the screen. After the results have been displayed append the odd number integers from 1 to 100, separated by a comma to the end of the file. Reopen the file and display the results. The contents of the file should be the even numbers from 1 to 100 separated by a comma followed by the odd number from 1 to 100 separated by a comma. The output of this program would be something like the following 

2,4,6,8,10,12,14,……,98,100
2,4,6,8,10,12,14,……,98,100,1,3,5,7,9,……..97,99 

scripting assignment

NOTE:  This is a little different than what is described in video.  

Create one script that does two things.  It creates a backup of your directory or performs a security check to be sure the files have not been changed without you knowing. 

Your script must do the following:

1) If the user indicates option 1 on the command line, it performs a backup of your home directory structure.

2) If the user indicates option 2 on the command line,  to does a security check. The script checks if any files in a directory have changed (use sha1sum and diff).  You will need to create a temporary file to hold the new data so you can compare the two. You code should also do the following:

  • Create a maintenance log of who (username) and when (date) the hash checks were completed.  Store the date and name in a file called maintenance.  If the file already exists the code should append to the end.
  • Make sure you check to be sure if you can read the file and you can write to it before doing it. If you can’t print out an error.  
  • The script should print out the name of the file(s) that changed and its old and new hash. 
  • Prove that your code works: 
    • Show maintenance log
    • Show all conditions including error conditions working 

Marketing Strategies.

  

Marketing Plan Milestone 1 :

Using the approved company and product/service, you will answer the following questions:    

Approved Company: Amazon.

  • Who are      the competitors in this space? 
  • What      are the overarching benefits they have to offer the consumer? What do they      offer that is different or attractive to the consumer?
  • What      gap will you fill by offering your redefined or new product or service?

Paper length should be 3 to 4 pages in length using APA formatting and should include a cover page and reference page which are not included in the page count. APA style.

java red black tree

 

Trace the operation of a Red-Black Tree given the following operations:
insert(49)
insert(85)
insert(51)
insert(90)
insert(28)
insert(37)
insert(61)
insert(10)
insert(32)
insert(40)
insert(59)
insert(19)
insert(63)
insert(26)
insert(55)
Next, Delete the following items sequentially.
delete(49)
delete(59)
delete(51)
delete(19)
delete(26)
delete(10)
Starting with an empty tree, perform the following insertion operations:

2
insert(14)
insert(95)
insert(71)
insert(36)
insert(25)
insert(88)
insert(27)
insert(33)
insert(79)
insert(81)
insert(63)
insert(26)
insert(30)
insert(44)
insert(62)
And then do the following deletions:
delete(88)
delete(30)
delete(27)
delete(79)
delete(62)
delete(44)
2 Deliverables
(a) Implement the above using Java
(b) Your paper work sheets showing work sufficient to show what you were d

Project Part 3: Risk Mitigation Plan

 

Senior management at Health Network allocated funds to support a risk mitigation plan. They have requested that the risk manager and team create a plan in response to the deliverables produced within earlier phases of the project.

The risk mitigation plan should address the identified threats described in the scenario for this project, as well as any new threats that may have been discovered during the risk assessment. You have been assigned to develop a draft of this new plan.

Submission Requirements

  • Format: Microsoft Word (or compatible)
  • Font: Arial, size 12, double-space
  • Citation style: Your school’s preferred style guide

Estimated length: 4–6 pages

paper 2

Please read full details on paper before asking to complete work . will be on turnitin.com so please no plagiarism. see file attached