JAVA Program

You are tasked with creating a weather data collection program that asks the user for data, and then uses that data to output alerts to the user when certain conditions are met.

The data that is to be collected by the program includes:

  • Temperature in either Fahrenheit or Celisius
  • Percent chance of precipitation. (How great a chance that water will fall from the sky in some form.)
  • Percent Humidity.
  • Time of Sunrise and Sunset.
  • Wind speed.

With this data the program should send out to the user the following alerts when the conditions are met.

  • If temperature is above 90 it is a heat advisory, if above 105 it is a heat warning, if below 32 it is a freeze advisory, if below 20 it is a freeze warning.
  • If precipitation is < 25 % than it is a low chance, if it is between 25 % and 75 % chance then it is a decent chance and if it is greater than 75 % then it is a likely chance of rain. (Pair this with temperature though. If its below freezing it won’t be rain but snow that comes down)
  • If about 80 degrees with low humidity and no precipitation then it is a fire warning.
  • If wind speed is greater than 40MPH then it is a wind advisory. If above 60MPH then it is a wind warning.

There are also a few checks and balances possible.

  • Sunrise should never happen before 5AM and after 8AM
  • Sunset should never happen before 5PM and after 8PM
  • Obviously anything involving percentages should never go above 100% or below 0%

Research Report

 

Write a research paper on anyone of the following –

1. Software Engineering and SDLC (Software Development Life Cycle)
2. Software Engineering and Traditional Development Models
3. Software Engineering and Data Verification
4. Software Engineering and Data Validation
5. Software Engineering and Software Quality
6. Software Engineering and Data Analytics

Please follow the instructions in the uploaded file VERY CAREFULLY and write the paper. 

Reach out to me through messaging here on homework market if you have any questions at any point of time.

Thanks, 

IDM W 7 A

 Provide a reflection of at least 500 words (or 2 pages double spaced) of how the knowledge, skills, or theories of this course have been applied, or could be applied, in a practical manner to your current work environment. If you are not currently working, share times when you have or could observe these theories and knowledge could be applied to an employment opportunity in your field of study. 

The course mentioned here is INTRODUCTION TO DATA MINING

Current work is Software Developer

Textbook :  

Title: Introduction to Data Mining

ISBN: 9780133128901

Authors: Pang-Ning Tan, Michael Steinbach, Anuj Karpatne, Vipin Kumar

Publisher: Addison-Wesley

Publication Date: 2013-01-01

Edition: 2nd ED.

Preview the document

read the attachment and answer the question

1. Download and read attached report: “Metrics for the Second Curve of Health Care”Preview the document. You need to concentrate your reading on contents related to “Strategy 4: developing Integrated Information Systems”.

Write a report to explain

  • what is the Second Curve Health Care? (10 points)
  • why Strategy 4 is important in the transition from the First Curve to the Second Curve (40 points)? Your explanation should be written from the informatics perspective focusing on how the three components of Informatics are involved in this strategy.

If you choose to supplement your writing with resources besides the attached document, you need to include their references in APA format.

Save your report as a Word document and name it as SecondCurve_FL where FL are your first and last name initials. Your Word document should be formatted using Times New Roman font (no smaller than 10 pt but no bigger than 11 pt), single spacing, 1″ margins on all sides, and the report length (2 page minimum,

……………………………………………………………………………………………………………………………………………………………….

2. Download and read a document on Quality Data Model (QDM)Preview the document. Focus your reading on sections 1.1-1.5, and 2.1 – 2.8.

Tasks: Write a report that contains your answer to the following questions:

1. Why a quality data model is needed? Explain QDM’s importance in healthcare information system using examples you have seen or discussed in this Module’s required readings. (10 points)

2. Figure 1 in section 2.5 shows an example QDM element structure on the left. The diagram to the right is an example of QDM element called “Laboratory Test”. Suppose you are member of an interprofessional team working a quality health database project for a hospital. Explain how you would design a database table to store data containing in the ODM element “Laboratory Test”. For example, what is the name of this table? What are the columns to include in this table? (10 points)

3. Suppose the same database contains other tables describing ODM elements such as Doctor, Patient, Medication, Pharmacy, Pharmaceutical Company, etc. Describe ONE scenario where you can use this database to address questions related to QDM element “Laboratory Test”. (40 points)

In order to help you understand this question, please consider the following sample scenario: Doctor A needs to find if any of his/her patients in the age group 35-55 has low HDL so that s/he can recommend them to practice regular aerobic exercise and loss of excess weight to increase the HDL level. Doctor A asks you for help since you are a health informatics analyst. Describe how you would use the database to find the answer. For example, do you need to use the database table representing QDM element “Laboratory Test”? What other tables in this database do you need to use? How will you generate the answer for Doctor A from theses database tables?

Save your report as a Word file and save it as H3_FL2.docx where FL are your first and last name initials.

……………………………………………………………………………………………………………………………………………………………

3. The attached Ethics-III.pdfPreview the document continues the discussion on what other ethical obligations software engineers are under.

Then proceed to answer the questions inside the reading:

  • Questions 5.1 to 5.12

Because for many ethics questions there is no absolutely right or wrong answers as such, your responses will be graded based on completeness and thoughtfulness as opposed to rote or perfunctory ones. There are three grade levels for this assignment based on your responses to all the questions: 20 (no reasoning in responses), 35 (minimal to little reasoning), and 50 (sufficient reasoning and consideration).

Write your answers in a Word file using Times New Roman font (no smaller than 10 pt but no bigger than 12 pt), single spacing, 1″ margins on all sides.

Save your file as Ethics_3_FL where FL is your first and last name initial and Submit.

……………………………………………………………………………………………………………………………………………………………….

4. Answer the following two questions based on what you have learned from “Head First” book Chapter 4 and Chapter 5.

Q1. Describe the usage of the Burn Down chart in the Head First book Chapter 4. Explain how to calculate the value and update it on the chart for any particular day? (Your answer should explain the relationship between the Burn Down chart and the other techniques discussed in Chapter 4 such as the Big Board and the Standup Meeting.) (20 points)

Q2. Suppose that you are asked to add a new event to the iSwoon system: The event is “Party at a friend’s place” and it is only allowed to occur on the 4th date or later. Describe what you would have to do to add this Event to the original iSwoon design(Ch 4) AND the “fixed” iSwoon design (Ch 5) respectively.(10 points)

Give your own evaluation of the latter “fixed” design; does it address the problems of the original design? What problems might the original design have and how might you fix them? (20 points)

Save your file as iSwoon_FL where FL is your first and last name initial and Submit.

………………………………………………………………………………………………………………………………………………………………………….

5. you are going to complete a midterm paper and it’s based on the movie “Office Space”. You choose the way to watch the movie in a comfortable setting.

Write your review in a Word file using Times New Roman font (no smaller than 10 pt but no bigger than 12 pt), single spacing, 1″ margins on all sides, and the paper’s length is no more than 2 pages. Any direct quotes from the movie do not count into the length of the paper.

In the midterm paper, you need to identify at least three problems (problems identified must be from the software engineering perspective, not from the general ethics perspective) that could have been avoided if a good software development method is applied in “Office Space”.

  1. Identify the problems related to software engineering and describe what the consequences of these problems are respectively; (15 points)
  2. Explain what actions you, as a member working on a software project, would have taken in order to avoid those problem respectively; (30 points)
  3. Describe if your actions (described above) are related to any knowledge that you learned from the first 5 modules of this semester. (5 points)

Save your file as Movie_FL where FL is your first and last name initial. Submit your file through the dedicated link under the Submissions tab.

Total assignment 1250 words(Main post and 4 replies to other student post)

 Question

What is the history of the network models? What are four layers of the TCP/IP Model and how are they used? How does the networking protocol work?

Instructions

Search the peer-reviewed literature to identify its potential impact on networking and what measures can be put in place to minimize the effect. Indicate at least one source or reference in your original post

Main post -250 words

4 replies – 1000 words (Each reply 250 words)

DS-2

Write an essay discussing sqlmap, an automated tool for sql injection and database takeover in 500 words or more. Why do we need an automated tool for sql injection? 

Do not copy without providing proper attribution. This paper will be evaluated through SafeAssign. 

Write in essay format not in outline, bulleted, numbered or other list format.  

Use the five paragraph format. Each paragraph must have at least five sentences. 

Include an interesting meaningful title.

Include at least one quote from each of 3 different articles. Use the Research Databases available from the Danforth Library, not Google.    P lace the words you copied (do not alter or paraphrase the words) in quotation marks and cite in-line (as all work copied from another should be handled). The quotes should be one  full sentence (no more, no less) and should be incorporated in your discussion (they do not replace your discussion) to illustrate or emphasize your ideas. Each quote must be cited in-line and at the end. 

Wk 3 – Apply: Core Solutions of SharePoint Server 2013 and Policy

 

The director of Information Technology (IT) has indicated that the Board of Directors is compiling a corporate portfolio on ethics and has asked all departments to contribute information on how to write policy statements that reflect a code of ethics. The director of IT has asked for you to provide an example of a policy statement that reflects work you do in IT administration.

Research the cultural and global political considerations for the use of a sharing service as presented in the lab and the data which could be hosted and made available via the Internet. Reflect on the idea that some issues, such as keeping data unalterable, could transcend cultures, while other IT choices could depend on your cultural perspective.

Consider the following:

  • How cultural perspective could impact the security decisions of an administrator setting up SharePoint® Server 2013 citing choices that were made in the labs
  • Global political issues, such as corruption, human rights, and rights to privacy in the U.S. and Key Nations, based on your readings and discussions this week

Write a 1- to 2-page example of a policy statement using Microsoft Word. Complete the following in your document:

  • A brief description of the types of data that are hosted and made available via the Internet using SharePoint® Server 2013. Include at least 2 types.
  • At least 2 cultural or global political considerations for sharing services (e.g., privacy rights)
  • Your opinion regarding any IT choices that seem to transcend culture
  • At least 1 example of choices you have when administering SharePoint® Server 2013 that could depend on your ethical stance
  • A brief policy statement for configuring SharePoint® Server 2013 that aligns with your ethical stance on data integrity (e.g., “The organization will seek to protect confidential and proprietary information when configuring SharePoint® Server 2013.”)

Cite any references to support your assignment.

Format your assignment according to APA guidelines.

Submit your assignment.

Executive Program Practical Connection Assignment

Course Name : InfoTech Import in Strat Plan 

At UC, it is a priority that students are provided with strong educational programs and courses that allow them to be servant-leaders in their disciplines and communities, linking research with practice and knowledge with ethical decision-making. This assignment is a written assignment where students will demonstrate how this course research has connected and put into practice within their own career. 

Assignment:
Provide a reflection of at least 500 words (or 2 pages double spaced) of how the knowledge, skills, or theories of this course have been applied, or could be applied, in a practical manner to your current work environment. If you are not currently working, share times when you have or could observe these theories and knowledge could be applied to an employment opportunity in your field of study. 

Requirements:

  • Provide a 500 word (or 2 pages double spaced) minimum reflection.
  • Use of proper APA formatting and citations. If supporting evidence from outside resources is used those must be properly cited.
  • Share a personal connection that identifies specific knowledge and theories from this course.
  • Demonstrate a connection to your current work environment. If you are not employed, demonstrate a connection to your desired work environment. 

You should not provide an overview of the assignments assigned in the course. The assignment asks that you reflect how the knowledge and skills obtained through meeting course objectives were applied or could be applied in the workplace. 

Any use of outside sources, including your own prior work, will result in a zero on the activity and a report being filed with Academic Affairs regarding plagiarism (even if self-plagiarism).