Discussion Response Java Exceptions

Please respond with a minimum of  at least 150 words

 

Sorting exceptions into two categories (namely “unchecked” and  “checked” exceptions) can significantly change how we handle exceptions  within our program. 

Checked exceptions are exceptions that occur at compile-time. These  exceptions occur due to factors or events that are outside of our  program’s immediate control–such as network issues, Input/Output device  issues, files not being found when called, etc. Checked exceptions must  either be dealt with inside of the method in which they are thrown, or  else they must be passed up to an exception handler in higher-up method  (by adding a “throws” clause in the method’s argument parameter).

Because of this ability to pass the exception to another method,  these types of exceptions have the potential to be ignored or  “swallowed” (as some of the material has dubbed), although this is not  recommended of course. These exceptions should be dealt with in some way  within our program wherever absolutely possible utilizing try-catch  blocks or try-catch-finally blocks.

Unchecked exceptions are exceptions that occur at run-time. These  consist of exceptions that deal with issues within our actual program  code (or possible issues due to the user’s interaction with our code).  Examples of these would be trying to access an element outside of a  specified array, attempting to divide a number by 0, or a user  attempting to input a letter or string into an input box designed to  accept an integer. 

These types of exceptions are dealt with on an “as-needed” basis, one  might could say, as they attempt to catch specific errors that can  spring up from the execution of buggy code. Thoroughly testing our code  and being aware of the different types of exceptions that could occur  within our code (and then properly handling them) can keep our code  functioning smoothly and efficiently. 

When it comes to which method I would prefer:

The geeksforgeeks.com website reads that throwing checked exceptions  may be a better option if the user has a decent amount of control over  recovering from the exceptions, and if not, unchecked exceptions are  better used. It also appears that checked exceptions can allow for more  robust code, although (as stated earlier), this does give programmers  the opportunity to pass the buck and not deal with certain exceptions  simply because they do not want to be thorough. But I also found from my  research that some languages (such as C#) do not have checked  exceptions, and that language appears to work well without them.

Reflecting upon my researching of this subject, (and my limited  experience utilizing exceptions in my own code in my last course), I  feel as though I would be more inclined to utilize unchecked exceptions,  when possible. I think it makes more sense to be able to address the  exceptions as needed rather than “covering the entire code with ‘throws’  clauses” as the infoworld.com website puts it. Although, I am totally  new to this realm, so I’m sure I’ll learn more as I go!

Thanks for reading, all and best of wishes in the module!

Computers and the Patriot Act

 

In order to complete assignment #2 you will need to answer the below questions. Please complete the questions in a Word document and then upload the assignment for grading. When assigning a name to your document please use the following format (last name_Assignment #2). Use examples from the readings, lecture notes and outside research to support your answers. The assignment must be a minimum of 1-full page in length with a minimum of 2 – outside sources. Please be sure to follow APA guidelines for citing and referencing source. Assignments are due by 11:59 pm Eastern time on Sunday.

Chapter 2

  1. For apps to be featured on the iPhone, developers must build it with Apple’s software development kit and then apply for approval. Apple rejected the Google Voice iPhone App, and further stated that it would not accept any applications that incorporated Google Voice functionality. Apple reasoned that this app duplicates the phone’s core features. It also rejected Google’s location-based app Google Latitude. If you were developing a collaborative platform, do you think the best model is this collaborative model, or is the open innovation model better – if your main goal is to maximize innovation? What if your main goal is to make money?

Chapter 3
2.Plaintiffs filed a class action lawsuit against investment banks alleging that they inflated prices on more than 300 IPOs, causing IPO investors to overpay for stock, and unlawfully benefited these banks through overcompensation of banking commissions and profits made through quick sales of this stock in their own accounts before prices settled into a more realistic valuation. How would you combat such abuses going forward?

3. Read the following laws and articles:

1. The Computer Security Act of 1987

2. The Patriot Act.

3. Jaeger, P. T., McClure, C. R., Bertot, J. C., & Snead, J. T. (2004). The USA PATRIOT Act, the Foreign Intelligence Surveillance Act, and information policy research in libraries: Issues, impacts, and questions for libraries and researchers. The Library Quarterly, 74(2), 99-121.

4. Politics

Discuss the relationship and impacts of CSA, USA PATRIOT ACT, and FISA. Also discuss the current status of these laws and the replacement of these laws.

research report 4

Need a research report for the attached PPT with the references and terms used to search for the topic 

Note: No Plagiarism

               APA format 

                The word should be in its own words and it should look like a summary.

Discussion with 500 words and

 

Write an essay of at least 500 words discussing discussing IAM in a federated cloud application. 

Do not copy without providing proper attribution. This paper will be evaluated through SafeAssign. 

Write in essay format not in outline, bulleted, numbered or other list format.  

Use the five paragraph format. Each paragraph must have at least five sentences. Include 3 quotes with quotation marks and cited in-line and in a list of references. Include an interesting meaninful title.

Include at least one quote from each of 3 different articles. Use the Research Databases available from the Danforth Library, not Google.   Place the words you copied (do not alter or paraphrase the words) in quotation marks and cite in-line (as all work copied from another should be handled). The quotes should be full sentences (no more, less) and should be incorporated in your discussion (they do not replace your discussion) to illustrate or emphasize your ideas.

Cite your sources in a clickable reference list at the end. Do not copy without providing proper attribution (quotation marks and in-line citations).

It is important that you use your own words, that you cite your sources, that you comply with the instructions regarding length of your submission Do not use spinbot or other word replacement software. Proof read your work or have it edited. Find something interesting and/or relevant to your work to write about. 

300 words Essay

 Learning About Cookies as Spyware.Research what kind of information cookies store. You might find the following  websites helpful:

  • www.allaboutcookies.org/
  • www.howstuffworks.com/cookie1.htm

Using WORD, write an ORIGINAL brief essay of 300 words or more describing cookies and the way they can invade privacy.Safe Assign is software that verifies the originality of your work against on-line sources and other students.Note your Safe Assign score. Continue submitting until your Safe Assign score is less than 25. For your first written assignment, you have unlimited times to retry your assignment.Submit references separately (or add as text) otherwise they cause the Safe Assign score to increase.
Attach your WORD doc and then hit SUBMT 

Digital Forensics

Research some tools that would be valuable in collecting both live memory images and images of various forms off media. Put together a shopping list for your manager that includes tools needed  to be purchased. Include a price if applicable. 300 words

APA Format with 3 References

CMIS 102 6383 Introduction to Problem Solving and Algorithm Design

 

Post a Python program that contains a while loop. The number of times the loop iterates should depend upon input supplied by the user. Your program should display some output each time the loop executes. Include comments in your program that describe what the program does. Also post a screen shot of executing your program on at least one test case.

Assignment #2

INT 1111 Lab 555

 

Lab FIVE

Number Analysis ProgramProblem Statement:Design a program that asks the user to enter a series of 10 integers.  The program should store the numbers within a list and then calculate and display the following data:

  • the lowest number on the list
  • the highest number on the list
  • the sum of the numbers on the list, and
  • the average of the numbers on the list

—————————————————————————————————Details:Develop a function for each of the following: 

  • A function to determine the lowest number on the list
    • The function receives the list as an argument
    • The function returns the lowest number on the list back to the main function
    •  The lowest number then is displayed within the main function
  • A function to determine the highest number on the list
    • The function receives the list as an argument
    • The function returns the highest number on the list back to the main function
    • The highest number then is displayed within the main function
  • A function to determine the sum of the numbers on the list
    • The function receives the list as an argument
    • The function calculates and returns the sum of the numbers on the list back to the main function
    • The  sum of the numbers is then displayed within the main function
  • A function to determine the average of the numbers on the list
    • The function receives the list as an argument
    • The function calculates and returns the average of the numbers on the list back to the main function
    • The  average of the numbers is then displayed within the main function
  • A main function, based on the following algorithm:
    • Set up a list for 10 integers
    • Set up a loop to ask the user to enter 10 integers, one at a time, into the list
    • Set up another loop to display the contents of the list, one at a time
    • Make a call to the function that determines the lowest number on the list
    • Display the lowest number on the list
    • Make a call to the function that determines the highest number on the list
    • Display the highest number on the list
    • Make a call to the function that determines the sum of the numbers on the list
    • Display the sum of the numbers on the list
    • Make a call to the function that determines the average of the numbers on the list
    • Display the average of the numbers on the list

Once all the functions have been developed, make a call to the main function to start the execution of your program.
==================================================================================NOTE 1: As you may be aware, there are built-in functions in Python.   Examples of these include:min ()max ()sum () You do NOT want to use such built-in functions; rather, you want to develop your own code to calculate the lowest and the highest numbers on the list.  You also want to  develop your own code to calculate the sum and the average of the numbers on the listYou will receive NO credit for using the above-mentioned built-in functions.NOTE 2:A sample program run is attached below.  It illustrates user’s interactions with the program, as the program is run, ten integers are entered, one at a time.  Then, the contents of the list are displayed, and then calls are made to the above functions, one at a time; and, as each piece of data is returned to the main function, it is displayed: Lab 5 – Sample Program Run.pdf Lab 5 – Sample Program Run.pdf – Alternative Formats  =======================================================================You need to set up a    Python solution that is    complete and    workable.  

For your solution to be    complete, you must

  • Prompt the user for the specific input data asked for within the problem statement
  • Set up a correct formula to process the input data, arriving at the output data
  • Provide the output data asked for within the problem statement to the user

For your solution to be    workable,

  • Your solution should be free of any type of errors (syntax, run-time, logic)
  • You may want to develop an algorithm first, using pseudocode or flowchart
  • You do NOT need to turn in any algorithm

========================================================================Grading rubric:

  • You’ll receive full credit, if 
    • your program
      • compiles and runs with no problems 
      • produces the expected output
  • You’ll receive partial credit, if 
    • your program
      • compiles and runs with no problems 
      • produces partial output (that is, incomplete output)
  • You’ll receive 25% of the points, if your program will not compile
  • You’ll receive 30% of the points, if your program compiles but has a run-time problem
  • You’ll receive 40% of the points, if your program produces logic error(s)
  • You’ll receive 50% of the points, if your program compiles and run, but no functions are used

computer

 

Please read case studies II-3 and II-4.



Answer these questions about the case studies:

II-3:

1. Describe the benefits of data warehousing and business intelligence at Norfolk Southern.



2. What did the company do right that has led to the successful deployment of data

warehousing and business intelligence within Norfolk Southern?



3. What has promoted the spread or growth of data warehousing and business intelligence

within and across Norfolk Southern over time?

II-4:



1. Why didn’t the California Franchise Tax Board do this type of data mining in 1980 or

1990?



2. How well did managers at the Filing Compliance Bureau address technical challenges?



3. How well did managers at the Bureau address various political and social challenges?



Instructions: Double spaced- 9-10 pages.

https://drive.google.com/file/d/1tvzbX33WasGjB07KsY-Qc72ZoFx8gFvl/view?usp=sharing

Please answer the following questions with complete sentences, well-thought-out paragraphs, and supported by information from the pertinent chapters. Use the case studies themselves for material and any pertinent sections of the textbook to support your answers; online sources are acceptable. Anytime you use sources outside of the textbook, they must be cited appropriately. Textbook sources may be briefly cited with a simple page number (e.g. “ref. p.34”).

Requirements: 9-10

Mock Dissertation Chapter One Introduction

Topic:

 Enhancing Cyber Security In Healthcare -With The Help Of Machine Learning

There is a connection between chapter three and chapter one. Therefore, as an extension of our week in the mock chapter three from last week, we will write a mock chapter one. This assignment will help determine your readiness to write a full-length chapter one.

Directions:

Develop a 2 page (more is fine) mock chapter one to include the following expectations from the university:

Overview (1-2 well developed paragraphs)

Background and problem statement (1-2 well developed paragraphs)

Purpose of the study (1 well developed paragraph)

Significance of the study (1 well developed paragraph)

Research Questions (numbered list)

Limitations of the Study (1 short paragraph)

Assumptions (1 short paragraph)

Definitions (list)

Summary (1 well developed paragraph)

References needed