Java Basics

Have you ever played the game “Mab Libs?” (http://en.wikipedia.org/wiki/Mad_Libs). The general idea was that one player would have a story and ask another player (who doesn’t know the story) for nouns and adjectives, etc. and the end result was that you’d read the pre-written story fitted with their mostly out-of-context words filling in key spots of the story. It usually was pretty funny.
 

Let’s build a Mad Labs game with Javascript … you’ll create a script that contains a list of variables. You can either use an array or individual variables. You should use variables that are integers and text. You’ll then create your story by concatenating the variables into the story. 
 

For example, to create the story you could take a paragraph like this:
 

It is a period of civil war. Rebel spaceships, striking from a hidden base, have won their first victory against the evil Galactic Empire.

You would sub in variables for certain words: 
 

It is a period of . Rebel , striking from a , have won their victory against the evil .

Steps:

1. Come up with three to four sentence paragraph, decide which words you will replace with variables and make a list of corresponding parts of speech. You should ask specifically for “a noun”, “an adjective”, “a number”, corresponding to how many elements you need.

2. In the forum denoted as “Lesson 2 – Mad Libs”, post your list of word needs for a classmate to reply to, which you can plug in for the variables.

depth research on a web browser

 You are to take one of the web browsers from the top 10 (see website below) and provide in depth research on the web browser to include such things as history of the web browser, operating system compatibility, including computer and mobile, security features and weaknesses, location of forensic artifacts, how is data stored, where web browser artifacts are found, chart of statiscal information, articles on attacks/hacking of web browser,and any other forensic data needed for an incident response to understand how an attack on a computer or computer network began and finding the source of compromise. This list is just an example and can include more than this but at a minimum should at least include these items.

Top 10 Internet Browsers – Most Popular Web Browsers of 2019 (Reviewed & Compared) 

https://www.toptenreviews.com/best-internet-browser-software

Computer science

I did this project but I got some wrong steps.  I`m uploading the instructions and what I did too.

This is my teacher comment: Good job! Some points were deducted for formatting errors (margins were not customized, rubric does not all fit onto one page) and multiple spelling/typing errors. Otherwise, nice work! 

Business Intelligence_ week 7

Discussion : Please find the attachment below for question

Paper: Please find the attachment below for question

There are two sections of conclusions mentioned in the question. Please read it carefully and make sure there is at least one logic or flow diagram in the paper.

Homework

Culture is an ongoing negotiation of learned patterns of beliefs, attitudes, values, and behaviors.

List some of your personal, social, and cultural identities.  Are there any of these that are interrelated?  In what way? For your cultural identities, which ones are dominant and which ones are nondominant? How does a person navigate between two cultural identities? 

How does your personal, social, and cultural identities impact you as a communicator and as a listener?

Strategic IT Plan

  

Strategic IT Planning: Your 3-Step Process

Introduction

Strategic IT Planning is required to ensure your resources and assets continue providing the results and the support your organization needs.

What is a Strategic Plan?

It is a roadmap to achieving a goal. It may cover your entire department or responsibility or it may focus on a specific issue or element of your role. It can be long and involved or a simply one-page document that provides guidance and steps you need to implement to achieve a goal.

Making it Happen

There are a few things that are important to your success. While it may seem that developing the Strategic Plan is the hardest part, most plans fail because of the implementation. The key is to keep it small and be successful, then build on that success for the next initiative. Don’t bite off too much or try to be too ambitious.

• Take your time and keep it manageable

• Link your plan to your company’s strategy

• Justify your initiative and get buy-in and support

• Don’t re-invent, rebuild

• Go slow, manage change

• Set aside time from your operational responsibilities to make it happen

Without a Strategic Plan, you and your team won’t be effective and you won’t be able to get results, get attention and get ahead.

Why you need an IT Strategy:

Redirect from tasks to opportunities and result

• Switch from fighting fires to preventing fires

• Reduce risk with planning and a longer view

Most Strategic Plans never get written or they fail because they are too involved and complex. Keep them simple and use these three basic steps as your core approach. Ask yourself these questions:

1. Why do you need to do it? What is your goal?

2. What are the things you need to get done to achieve your goal?

3.  How can you make those things happen?

By following the 3 steps above and writing them down, you will have the outline of your Strategic IT Plan. Then, you establish the tactical things that will help you implement your plan.

Implementation Plan

Once you have established your strategic plan using the 3-step process, you need to develop your implementation plan. This includes getting approval and resources as well as the steps you need to take to achieve your strategic objective.

1. Set the objective for each step

2. Analyze internal/external factors

3. Develop solutions

4. Identify and eliminate barriers

5. Allocate resources (people, time, money)

6. Develop detailed tasks

7. Implement your plan!

Step Implementation

What Are The Roadblocks?

How Can You Overcome The Roadblocks?

What Resources Do You Need?

What Are The Timelines?

What Are The Main Steps To Implement Your Plan?

Conflict Managment Dis 6

 Hypothetically speaking, you are assigned to a committee of three to decide on a dress code for Campbellsville University Staff and Faculty. All three committee members must agree to pass this policy. In this situation you are one of the two agreeing to a dress code. What steps might you take to gain the cooperation of the third party after the policy has been initiated. 

Need 350 words content.

software engineering report

its a group assignment about dorm management system

1 need 1 page report only due in less than 15 hrs about analysis of similar systems weaknesses , strengths, problems) for https://popartdorms.com/en/ , https://www.ciu.edu.tr/dormitories,https://www.emu.edu.tr/dormitories)

Represent Family using Graph data structure

 

Using the below image represent this family using a graph structure. The graph needs to be a weighted graph. The weights will constitute the types of relationships, I recommend using some kind mapping between numbers and strings to represent the relationships. When adding family members to the graph, this can be done programmatically for the provided family members within the description file.

Additionally,

  • I also want there to be an interface in which a user can create a new family member and add them to the tree.
  • This can be a simple CLI where the user provides a name, gender, and age to create a person.
  • Then another simple CLI where they select which member of the family, they want the original relationship to be with and what kind of relationship it should be.
  • Finally, they can edit the family member using another CLI and selecting the family member they wish to edit, the operation they wish to perform (edit name, edit age, edit relationship), and then add new relationship between family members which can call a function that you create in order to add the original relationship.

Finally, make data assertions within the FamilyTree class that enforce certain “rules” that exist in a typical human family. An example would be a person should not have any kind of relationship to itself (a person cannot marry themselves, a person cannot be their own brother, sister, father, mother, etc.). There should be at least 3 data assertions. These should exist as part of the family tree, not as part of the graph.

As a hint, for a successful design:

I would recommend using layers of abstraction. Your graph class is the backing structure to the family tree class. Your family tree should implement methods that interface with the graph class, i.e. add_family_member() should call the constructor to create a node and then call a function within the graph class to add a node to the graph. Then using the relationships function parameter, you can add edges to the graph between the new nodes and the existing nodes. The family tree should be what enforces what relationships can exist through the data assertions, the graph does not care about what relationships are made between family members. Your functions that the user would interface with would be greatly reduced compared to the total number of methods within the classes themselves. The user should be able to add, remove, and modify family members and that’s about it. Therefore, those should be your function calls.

Attachments area