CSS/562: Programming Concepts – NetBeans JAVA Programming

I have  2 Assignments to be completed and I require for both of the assignments the use of only NetBeans. No other JAVA programming tool accepted. Therefore, programming only with NetBeans.

Assignment 1:  Wk 2 Assignment: GUI and Input, Output, and Variable

 

Assignment Content

  1. In your position as the leader of a programming team, sometimes you need to take on tasks when the team is overloaded with work. Your team is currently busy, so you are taking on a customer request to create a business application that allows the user to determine an approximate cost for a business trip. The customer will add functionality and features to the application throughout the development process. You will continue to modify this application throughout the remainder of the course.

    Create a Java™ travel authorization request graphical user interface (GUI) application via NetBeans to calculate the cost of a business trip.

    Include the following functionality:

    • Traveler name (text field)
    • Airfare cost (text field)
    • Food cost (text field)
    • Hotel cost (text field)
    • Car cost (text field)
    • Shuttle cost (text field)
    • Summary: Display request total in label (must use a variable to store each item and calculate totals)
    • Button
    • The user will enter the name of the traveler and the cost of each item for a trip request. When the user clicks the calculate button, 10% of the total amount will be added to the trip total and be displayed in the Summary field. The use of variables are required to store the costs of the individual items.

      Submit your assignment as follows the Netbeans project file (export/zip file), cut/paste the source to a MS Word document and a screen shoot of the output. Also, let me know if you are using a Mac or a PC platform.

Assignment 2:  Wk 3 Assignment: Condition/Objects

 

Assignment Content

  1. The customer is pleased with the first set of functionality and features added to the business application in Week 2. This week the customer wants you to add functionality and features to the application you created last week.

    Modify the deliverable from Week 2 to:

    • Include a combo box for the locations with five cities of your choice.
    • Modify the food field to make it automatically place a value in that field based on the location selected.
    • The values for the food field will be 70 when the first location is selected and 80 when the second location is selected.
    • The food values will then increase by 5 for the remaining locations when selected.
    • Add to the car field to allow for three rental car companies to select from using a radio button.
    • The value for the cost of the rental car will remain as a text field.
    • Submit your assignment.

Both assignments to be submitted by latest coming Monday 07.12.2020 6PM of USA Arozona Time

Required Files: NetBeans Exported ZIP File, Code copy to Word, a screenshot from the output showing that the displayed program GUI is working sucssesfully.

Security architecture and design final paper

  

Respond to each question below. Remember to cover all aspects of the question.

Successful security architecture needs upper management to support for effective security standards and protocols. However, there are possible disadvantages to upper management involvement. List and describe the tradeoffs in business between rigorous security and delivering products to customers. Go beyond merely the automated solutions, or the technical checks that can be done without much human support.

Examine how capturing, standardizing, applying patterns, and standard solutions help to increase efficiency and maintain delivery teams’ velocity. Provide at least 3 real-world examples which describe and examine how they provide the velocity. Do not simply provide a list of things teams can do but for each idea, define the idea and explain its relevance. 

Schoenfield lists several components of a successful security architecture practice, such as broad support across the organization, recruitment and training of security architects with the right kind of aptitude and interest, effective security requirements that enhance but do not slow down the innovation process, and finally, indicators that the security architecture team is being well utilized and adding value to project development. Describe what each of these components are and explain how each is relevant to security development. Include detail and examples.

BI_Assignment_1

 Complete the following assignment in one MS word document:  

Chapter 1 –discussion question #1 & exercises 9 and 15 (limit to one page of analysis for question 15) 

ANALYTICS, DATA SCIENCE, & ARTIFICIAL INTELLIGENCE assignment

complete the following assignment in one MS word document:

Chapter 5 –discussion question #1-4 (roughly 100-200 words each) & exercise 6 & internet exercise #7 (go to  neuroshell.com click on the examples and look at the current examples.  The Gee Whiz example is no longer on the page. I  did find mention of it here: https://nstsupport.wardsystemsgroup.com/support/gee-whiz-example-charts/ that might help you respond to the questions here. )

Chapter 6– discussion question #1-5 (roughly 100-200 words each)  & exercise 4

When submitting work, be sure to include an APA cover page and include at least two APA formatted references (and APA in-text citations) to support the work this week.

All work must be original (not copied from any source). It is checked via SafeAssign. I ensure that the SafeAssign is not just finding matches for the questions and bibliography. 

3 page APA compliant paper with NO PLAGIARISM on transformational leadership and knowledge and knowledge sharing

3 page APA compliant paper with NO PLAGIARISM with a minimum of five peer-reviewed journal articles.

Answer the following questions:

  1. How do trustworthy and ethical leaders enhance knowledge sharing in organizations?  How does this impact the rate of information technology implementations?  How does this impact data management within organizations? 
  2. How does servant leadership assist with transferring knowledge in an organization?
  3. When thinking about data analytics, how does transformational leadership assist with building good data structures?

The paper should meet the following requirements:

  • 3-5 pages in length (not including title page or references)
  • APA guidelines must be followed.  The paper must include a cover page, an introduction, a body with fully developed content, and a conclusion.
  • A minimum of five peer-reviewed journal articles.

Build a C program that has two functions: one for encryption and one for decryption.

 Procedure

 Implement one program that has two functions: one for encryption and one for decryption. 

Encryption: 1. Read keys from user input. Prompt the user to enter a character for each key. 2. Read the plain text (“data”) from the input file. The name of the input file is one of the command line argument. 3. Implement your encryption algorithm. 4. Encrypt “data” and write to a file. (The name of the file is chosen by the programmer.) 

Decryption: 1. Read keys from user input. Prompt the user to enter a character for each key. 5. Read the file that encrypted data was saved and extract the encrypted “data”. The name of the encrypted file is one of the command line argument. 2. Implement your decryption algorithm. 3. Decrypt the “data” and write to a file. 

Movement of traditional IT Staff

 

The main focus is on the movement of traditional IT staff.  To facilitate cultural assimilation, IT and non-IT must become more integrated.  What are some strategies to implement to allow this type of interaction to occur?

Note: The first post should be made by Wednesday 11:59 p.m., EST.

Your response should be 250-300 words.