Overview of the ProjectTask: You will have a total of three weeks to finish this project: two weeks for discussion and the Google Analytics tutorial, and one week to answer the client’s data analytics questions. You should complete the four steps of this project by the end of Week 7: Step 1: Discuss Customer Relationship Management and Search Engine OptimizationStep 2: Discuss Data Analytics and Complete Google Analytics TutorialStep 3: ...
Queue Implementation1.Queue ImplementationUse a circular array, as described in paragraphs 8.10 – 8.16, to implement a queue, based on an array with one unused location and no counter. Test all methods before you proceed to use your class in the application. 2.Queue ApplicationAll words in bold are meant to be classes: Route, Train, Station, Passenger. Write a program to simulate a Train route. A train route consists of an array o...
LocationCount for finding the number of animals at a given distance from a specified location1) Find the number of animals at a given distance from a specified location (40%) Write a function LocationCount which returns the number of animals found within a specified distance of a given location, the function should take four parameters, a file name containing the data, a distance in kilometres, and the latitude and longitude of the location. I...
Language/Platform/ApproachLanguage/Platform/ApproachThis project must target a Unix platform and execute properly on our CS1 server.The project must be written in C, C++, or Java.Problem OverviewThis project will simulate a scheduler scheduling a set of jobs.The project will allow the user to choose a scheduling algorithm from among the six presented in the textbook. It will output a representation of how the jobs are executed.DesignYou ma...
TaskYour assignment is to create a Python program that calculates the federal income tax owed for individuals filing taxes or married couples filing taxes jointly. Your program should allow the user to specify the name of a CSV file that they would like to have analyzed. Your program should open and read the specified file, and it should calculate and print the federal income tax owed for each entry (row) in that file. The program should ask t...
How to Copy-and Paste in PuttyYou’ve been hired to develop statistics software. Specifically, your software will calculate the samestatistics as in the statistics program in PP#3, as well as one new statistic. In each individual run of your software, you will input two lists of numbers, and these two lists will have the same length, a length that will be input (and idiotproofed) at runtime, just before allocating and then inputting the ...
Overview of the AssignmentThis coursework requires you to form teams of between three and seven members to carry out a Rapid Application Development (RAD) exercise. Each team will appoint members to one of the following roles: 1.Facilitator 2.Scribe 3.Senior Management Representative 4.User Representative 5.Developer The roles are described in more detail in the next section of this document. It will be noted that the ideal team size is ...
Overview of the Bank Account Application with two usersYou will develop a simple Bank Account Application. The application must be a graphical user interface (GUI) based. There are two kinds of users of this application: Manager and Customer. Here we will assume there is only one manager and zero or more customers who uses the application. Every customer has only one bank account. A customer can login, logout, deposit money, withdraw money, ...
TaskIn this project, you will design agents for the classic version of Pacman, including ghosts. Along the way, you will implement both minimax and expectimax search and try your hand at evaluation function design. The codebase has not changed much from the previous project, but please start with a fresh installation, rather than intermingling files from project 1. As in project 1, this project includes an autograder for you to grade your an...
Exploring the Flowchart for Vigenere CipherQuestion 1Open TMA Q1.fprg with Flowgorithm, and examine the flowchart for Vigenere Cipher, a symmetric encryption, . A pictorial representation of symmetric key encryption is shown in Figure Q1.1. Symmetric key encryption uses the same secret key to encrypt and decrypt a message: The sender uses a secret key to encrypt a plain text (the message) into cipher text (scrambled text that is intelligible).Th...
Exercise 1Assignment Instructions This assignment involves building, testing and debugging Java programs, that create and manipulate composition of classes that model simple types of object; and that employ the full gamut of implementing technologies: fields, constructors, methods and access modifiers.Exercise 1 Your first task is to develop a TimePeriod class of object that meets the following specification How are you to evaluate your work?...
Task: Overview In this assignment you will design a screen for a specific task, evaluate your design using a simplified heuristic evaluation, and build the UI in JavaFX using the MVC design pattern. Part 1 covers the screen design, Part 2 covers the heuristic evaluation, and Part 3 covers the development of the interface. Part 1: screen design for a milkshake construction screen Result for Part 1: a photo of your (hand-drawn) screen design, i...
Grocery Inventory System Formulate classes and use objects to store and compute tabular information. A small grocery in your neighbourhood needs to track the items that it carries. An item is either perishable or non-perishable. Test data for three items is given in Table Q1.1 below: The class Item is an abstract class. It has the following methods: 1.Getter and setter methods for both quantity on hand and cost price. Use the property decor...
Q1: Preparing the Grid & Colouring Cells Download the A5Q1template.pde file in the Assignment 5 folder in UM Learn.The grid parameters have been set for you. A global constant CELLSIZE stores the width and height of each square cell on the gameboard, in pixels. The global constants NUM_ROWS and NUM_COLS store the number of rows and number of columns on the game board. The size of the canvas is set in setup(), so that it is the correct size ...
Learning OutcomesIn ICT1010 Computer Networks you’ve learned about socket programming which allows you to write network applications to send and receive network packets, but does not allow you to manipulate the values in the protocol headers. Programming security tools is like writing network applications to send and receive network packets. The key difference is that you need to be able to manipulate then values in the protocol headers! ...