Current Event Journal Assignment U5-6

 Why do we study history? You’ve probably heard many references to the idea that we need to study history because history repeats itself. While this does hold validity in certain cases, it is also important to understand that history connects today to yesterday. Political decisions today are based on past decisions or events, we continue to work on social justice, and we see new interpretations of past legislation and primary source documents. History surrounds us. Over the course of the class, you will be retrieving and evaluating current event articles (in the last 5 years); making connections between the units we are currently studying and today. You will be responsible for finding an online article from a reputable news source. For example: Time.com, USA Today, The New York Times, etc. 

Write a program that generates n random integers between 0 and 9 and displays the count for each number

 

 

Write a program that generates n random  integers between 0 and 9 and displays the count for each number. (Hint:  Use an array of ten integers, say count, to store the counts for the  number of 0s, 1s, . . . , 9s.)

A modular program is expected – use Methods. The program specifications are as below. 

  1. In the main() method, declare an int array of size 10, named count.
  2. Implement a method populateCount(int[] cnt) that initializes the array to zero.
  3.  Implement a method countNums(int[] cnt, int n) that accepts  the count array and an integer n. The method should generate n random  numbers in the range of 0 to 9. It should keep a count of how many times  each number, 0 to 9; is generated in the array count. 
  4. Implement a method printNums(int[] cnt) to print the count  array.  Note, print “time” or “times” – which ever is appropriate. 
  5. Use basic structured programming and procedural programming.
  6.  Write a main() method that declares the count array. Invokes  the countNums() method with n = 10 followed by invoking the printNums().  Then invokes the countNums() method with n = 100 followed  by printNums(). And again, invokes the countNums() method with n =  1000 followed by printNums(). 
  7. Make sure you invoke  the populateCount(int[] cnt) method at appropriate times. And write out  the heading for each set, n = 10, 100, and 1000.
  8. Documentation. Includes your name, create date and purpose of lab.

short answer

 As you proceed through your IT career, you will discover that it takes more than just technical skills to advance through the ranks and earn the right to lead teams, projects, and, ultimately, companies. These non-technical skills, also referred to as soft skills, are just as important as the technical expertise you will acquire. Engage in research on the Internet and describe one soft skill that you feel would be the most important to you and potential employers. Provide the details that show how this skill will translate into not just a “good job,” but a great career in technology.  Analyze the soft skill from your own perspective and from the perspective of potential employers.  How can the soft skill enhance your technical prowess? 

Artificial Intelligence Writing Assignment

What are heuristic functions and informed search strategies.Provide examples and present your written findings

Requirement 

APA format. You must include 3 scholarly reviewed references that are DIRECTLY related to the subject. 

Pages : 3 ( 1000 words) 

ITSD424U41P

 

Assignment Details

Assignment Description

Part 1

Modify your Java application so that it is an easy-to-use GUI application where all of the interaction is performed on one screen. You will now take the individual components and translate them to a single interactive GUI interface using the following GUI components, container, the event listeners, and event subclasses to enhance your application as a more GUI-appropriate interface:

  • GUI components
  • Container
  • Event listeners
  • Event subclasses (at least 3–4 utilized)
    • ActionEvent
    • ItemEvent
    • FocusEvent
    • KeyEvent
    • MouseEvent
    • WindowEvent
  • ActionPerformed Method

Part 2

For this assignment, you are being asked to make sure you are exception handling by verifying that all of the customer-entered information is valid before the order is submitted to ensure order accuracy.

The customer information that the customer must now enter that should be validated includes the following:

  • Entered user name (must fill in a name)
  • Entered at least one sub to order
  • Selected all three attributes for sub (such as bread type, sub type, and sub size)
  • Entered delivery address that includes street, city, state, and zip code
  • Entered telephone number xxx-xxx-xxxx

In this assignment, you are adding in error handling to make sure the customer is filling in all of the required information.

To accomplish this task, you will be utilizing the following Java classes:

  • Methods in the character class and StringBuilder class to validate and manipulate characters in a string
  • Try… Catch for the exception handling of all input fields

Deliverable

The following are the Unit 4 Individual Project deliverables:

  • Update the title page for the Design Document with the project name (Unit 4 IP) and the date.
  • Add the following section header: Phase 4 Revised Application Screenshots.
  • Add screenshots of each distinct screen from your running application.
  • Name the document yourname_ITSD424_IP4.doc.
  • Submit the design document and the zipped Java project files for grading.

It214 week 7 dis

Define, mathematically, the Fibonacci sequence. Find and post four occurrences of Fibonacci sequences in nature. Justify your posting.

The Request for Proposal (RFP)

 

nstructions

One of the critical stages of a project is planning. Through project management standards and practices, enterprises are conducting and executing information technology solutions implementations. Therefore, project management activities interact with the SDLC, extreme prototype software development, or infrastructure implementations. For this course, you will develop a project plan for an information systems development. This plan will be part of the formal request for proposal (RFP) document. You can work on your own document or use a template provided with the syllabus.

In this final project, you will research, analyze, propose, and design a comprehensive RFP for a complex IT solution or development. You can complete the project plan for the scenario or project worked in assignments for Weeks 1-4, or select a scenario to work on your information technology development, as part of the requirements and specifications document to be part of the RFP.

For this assignment, create a mock request for proposal (RFP) either for the scenario you worked on during Weeks 1-4, or for a selected IT application design project as suggested in Week 1. You can use your own document format, use templates published by the Project Management Docs portal supported by PMI, or follow the outline below. In this document, you will provide all the key items anticipated in the closing phase. Include each item using a heading to identify the item and brief sample content under the heading.

Project Plan Outline:

  1. Introduction
    1. Purpose of the project
    2. Executive summary
      1. Company at-a-glance
      2. Project at-a-glance
      3. Business mission, vision, goals, and objectives
    3. Project approach
  2. Project Scope
    1. Scope description
    2. Key milestones and deliverables
    3. Assumptions and constraints
  3. Overview of Applications and Functions
    1. Description of current operations
    2. Inventory of current databases and applications
  4. Project Requirements
    1. Functional Requirements
    2. Technical Requirements
      1. Network Infrastructure
      2. Hardware Requirements
  5. Schedule
    1. Timetable
    2. Major deliverables

When selecting your project topic, make sure it is not too small or too complex (remember time constraints—this course lasts eight weeks), and avoid choosing an area where you have little or no knowledge. The project should not identify a specific organization or sensitive data; therefore, if you are working with a known scenario, all names, locations, and operations indicators must be protected.

Some sample topic selections are:

  1. Client Technology Tracking System
  2. Employee Self-Service Systems
  3. Network Design Proposal for Casino
  4. Small Business Network Design
  5. Small Network for a Physician’s Office
  6. Network Security Policy Implementation for a University Campus
  7. Home Wireless Network Design
  8. Campus Secure Virtual Lab

Length: 10-15 pages not including the cover page.

This document will not follow the APA format, but any content must be properly cited and references presented at the end of the document, if applicable.