Modify DepartmentSalesS project posted on Blackboard as “Observer Pattern Example – Chart Using Swing” Add an Observer to display monthly sales in a pie chart. You modify YDTChart.java so it will display a pie chart. Modify SupervisorView.java to add a PieChart observer and change Layout so it has three columns. Follow the link to see how to draw pie chart as multiple pies. http://cs111.wellesley.edu/~cs111/archive/cs111_fall06/public_html/labs/lab12/arc.html You may use a Color array like Color[] colors= {Color.blue,Color.yellow, Color.gray, Color.green, Color.cyan, Color.red,Color.magenta, Color.orange, Color.pink, Color.darkGray, Color.black, Color.lightGray}; Before you draw the pie piece for a month i, you set color like g.setColor(colors[i]); 2. Modify ChartS posted on Blackboard as “Observer Pattern Example – Chart Using Swing” Add a PieChart to display monthly sales You may follow the following website: http://tutorials.jenkov.com/javafx/piechart.html Create array of PieChart.Data using a loop. Add one a time to PieChart using a loop. To display the tip of %, you may follow the following website https://riptutorial.com/javafx/example/8733/pie-chart
Requirements and Testing Presentation: Presentation of Research
Purpose
The systems analyst job carries into and beyond the implementation stage. Often, this is a confusing time for the client, who may not understand the complexities of these steps. You will need to research key terms and provide examples. The selection of appropriate sources establishes your credibility with clients. A “Research Methodology” Appendix allows your client to critically evaluate a study’s overall validity and reliability. In addition to research and presentation of ideas, this assignment will test your ability to explain technology concepts to non-technical clients.
This assignment addressed two content areas: first, types of system architecture design requirements; and second, methods of testing systems for implementation.
Assignment Instructions and Requirements
When finalizing system requirements, it is helpful to return to previous parts of the SDLC and the design specifications. In this case, we want to review requirements related to architecture design. Your task is to explain the four primary types of nonfunctional requirements that can be important in designing the architecture. You’ll want to examine relevant subtypes and research examples of these types of requirements.
The second main concept to explore this week is to review various testing methods – ways to verify that the system does what it was designed to do.
As you are researching the examples, you will want to evaluate your sources and document it in a Research Methodology Appendix. You will need at least 3 sources beyond the textbook (the textbook does not count as a source). Appropriate academic or scholarly resources include books, academic journal articles, and published expert reports. Be wary of advertisements, opinion sources, and crowd-sourced documentation (like Wikipedia).
There are two research methodology components: Process and Evaluation. For process, you will want to explain what was your method of research? How did you search for your examples? For source evaluation you will want to identify what makes your sources appropriate for this presentation? Why are they relevant?
Documentation
Prepare a PowerPoint with the following requirements. The outline below corresponds to the slides and information necessary for this assignment. For each slide, write in your own words. You are additionally required to use (at least) 3 quality/academic/scholarly resources beyond the textbook. Provide an APA in-text citation and an APA references slide(s) as part of the presentation. Images are encouraged. Presentation and layout matters.
- Cover slide, course, your name, and the date.
- Define the overall purpose of Operational Requirements
- Operational Requirements (subtype and example one)
- Operational Requirements (subtype and example two)
- Performance Requirements (overall purpose)
- Performance Requirements (subtype and example one)
- Performance Requirements (subtype and example two)
- Security Requirements (overall purpose)
- Security Requirements (subtype and example one)
- Security Requirements (subtype and example two)
- Cultural and Political Requirements (overall purpose)
- Cultural and Political Requirements (subtype and example one)
- Cultural and Political Requirements (subtype and example two)
- Unit Testing defined and example
- Integration Testing defined and example
- System Testing defined and example
- Acceptance Testing defined and example
- Summary
- Appendix: Research Methodology – Process
- Appendix: Research Methodology – Source Evaluation
- References slide(s) as needed
Design notes:
- Use a design theme.
- Images and other visual aids are encouraged
- Creativity and visual presentation matters.
- The outline is a suggested, but not required structure. If you can compress two examples onto one slide you are welcome. If you need additional slides for documentation (especially research methodology) you can include more information.
- Ensure good readability (consider color, text size, etc.)
- Do not use animation or transitions.
- Do not include content in the notes area – every slide should be self-sufficient.
Physical access security
Week 6 Assignment – Physical Access Security
Introduction
In this assignment, you will search the Web to identify incidents of current physical security breaches, analyze each incident, and identify best practices that could have been used to prevent the attacks.The specific course learning outcome associated with this assignment is:
- Research examples of physical security breaches.
This course requires the use of Strayer Writing Standards. For assistance and information, please refer to the Strayer Writing Standards link in the left-hand menu of your course. Check with your professor for any additional instructions.
Instructions
Write a 3- to 5-page paper in which you analyze two physical security breaches.Using either the Wall Street Journal or U.S. Newsstream, search for the term “physical security breach.” Select two news articles on the search topic that were posted within the last six months.
Article 1
- Summarize, concisely, the key details of the physical security breach described in Article 1.
- Include the date of the attack, the type of attack, who or what was affected, and any reported loss of revenue or personally identifiable information (PII).
- Provide a screenshot that includes the article’s name and the date it was published, along with a valid URL.
- Describe, clearly and accurately, the steps described in Article 1 that were taken, or are being taken, to alleviate the effects of the breach after the fact or to resolve the issue.
- Explain whether the physical security breach described in Article 1 was preventable, why or why not, and if preventable, what preventive steps could have been taken.
- Note: These are steps that would have prevented the security breach from having occurred in the first place, not mitigation steps taken after the breach has already occurred.
- Describe the physical access security best practices that could have been used to prevent the breach described in Article 1, citing specific, credible sources of best practices.
Article 2
- Summarize, concisely, the key details of the physical security breach described in Article 2.
- Include the date of the attack, the type of attack, who or what was affected, and any reported loss of revenue or personally identifiable information (PII).
- Provide a screenshot that includes the article’s name and the date it was published, along with a valid URL.
- Describe, clearly and accurately, the steps described in Article 2 that were taken, or are being taken, to alleviate the effects of the breach after the fact or to resolve the issue.
- Explain whether the physical security breach described in Article 2 was preventable, why or why not, and if preventable, what preventive steps could have been taken.
- Note: These are steps that would have prevented the security breach from having occurred in the first place, not mitigation steps taken after the breach has already occurred.
- Describe the physical access security best practices that could have been used to prevent the breach described in Article 2, citing specific, credible sources of best practices.
Source Citations and Writing
- Support your main points, assertions, arguments, or conclusions with at least three specific and credible academic references synthesized into a coherent analysis of the evidence.
- Cite each source listed on your references page at least one time within your assignment.
- For help with research, writing, and citation, access the library or review library guides.
- Write clearly and concisely in a manner that is well-organized; grammatically correct; and free of spelling, typographical, formatting, and/or punctuation errors.
- Use section headers in your paper to clearly delineate your main topics.
CMPUTER NETWORKING3
Please provide an elaborate answer to each of the following questions:
1. Name the advantages of optical fiber over twisted-pair and coaxial cable. Please elaborate on your answer.
2. What are the Basic Types of Topologies? What capabilities and limitations do they have?
3. Explain routing concept?
4. Explain switching concept?
5. Explain routing algorithms?
6. What are the four generic architectural components of a public communications network? Define and elaborate on each of term.
7. Explain and elaborate on the impact that communication network applications have had on business and everyday life.
8. Why are standards important for protocols? Please elaborate.
Word Count: 5000 words (maximum)
Your work needs to be well written and have quality information. Your work must be clear and must be able to educate someone with no prior knowledge in the field of operating systems.
Assignment Evaluation Rules:
• Overall presentation 10%
• Structure 10%
• Introduction 10%
• Main body
o Critical analysis/evaluation 50%
o Recommendations 10%
o Conclusion 10%
Unit 7 Assignment 2
Use library research to learn more about a great problem solver or innovator (for example, Thomas Edison, Steve Jobs or Bill Gates, Mother Theresa, Albert Einstein, Eleanor Roosevelt, or Jonas Salk). Find out as much as you can about the methods the person used in seeking solutions. Give an oral presentation of your findings to your class.
Scripting
1. Script Requirements
This task requires you to create two scripts – one that can run in a Linux environment (BASH) and one that can run in a windows environment (Powershell). The tasks required in both scripts are the same. Scripts must adhere to good design practices and be well commented. Here is a summary of the tasks:
1. Design two Scripts which can be used to create an Inventory (details below) of hardware and software stored on computers in a business.
2. The names of the Computers (to create the Inventory from), must be read in from a text file.
3. The Inventory data must then be output to a text file, suitably formatted.
4. Additional marks will be allocated to students who show independent learning for example outputting to Excel or Word files.
Required Inventory Data
Name of Computer
CPU: Number of cores, clock speed, manufacturer/description
RAM: Total amount. Number of sticks.
Disk Drives: All local disk drives
Network Interfaces: IP address of each
Local Users: Username and description of each.
Operating System Version
Uptime
2. Technical Report
Write a report detailing the work carried out. It should contain the following sections:
Introduction
Task List
Code with Explanation
Problems and Solutions
Conclusion
Bibliography
3. Submission Requirements
You should submit the following on the Repeat CA section on Moodle by the deadline:
1. Your report in PDF
2. Your script(s)
3. The documents produced by your script
JAVA program
a. Write a Java program that is reading from the keyboard a value between 111 and 900 and is printing on the screen the prime factors of the number.
Your program should use a cycle for validating the input (if the value typed from the keyboard is less than 111 or bigger than 900 to print an error and ask the user to input another value).
Also the program should print the prime factors in the order from smallest to biggest.
For example,
for the value 128 the program should print 128=2*2*2*2*2*2*2
for the value 122 the program should print: 122=2*61
b. change the program at a. to print one time a prime factor but provide the power of that factor:
for the value 128 the program should print 128=2^7
for the value 122 the program should print: 122=2^1*61^1
Artificial intelligence exam DUE IN 30 minutes
If you can help with computer science exam in artificial intelligence talk to me.
discussion
refer to the attached document
technology
Is offshore outsourcing the right thing to do? Why or why not? (Chose ONE AND ONLY ONE position.)
A minimum of two APA references with correlating in-text citation(s) are required
