Java HW 3.2

[IFT 102]

Introduction to Java Technologies

Lab 3: Objects & Classes

Score: 50 pts

I. Prelab Exercises

1. Constructors are special methods included in class definitions.

a. What is a constructor used for?

b. How do constructors differ from other methods in a class?

2. Both methods and variables in a class are declared as either private or public. Describe the difference between private and public and indicate how a programmer decides which parts of a class should be private and which public.

3. Consider a class that represents a bank account.

a. Such a class might store information about the account balance, the name of the account holder, and an account number. What instance variables would you declare to hold this information? Give a type and name for each.

b. There are a number of operations that would make sense for a bank account—withdraw money, deposit money, check the balance, and so on. Write a method header with return type, name, and parameter list, for each such operation described below. Don’t write the whole method—just the header. They will all be public methods. The first one is done for you as an example.

i. Withdraw a given amount from the account. This changes the account balance, but does not return a value.

public void withdraw(double amount)

ii. Deposit a given amount into the account. This changes the account balance, but does not return a value.

iii. Get the balance from the account. This does not change anything in the account; it simply returns the balance.

iv. Return a string containing the account information (name, account number, balance). This does not change anything in the account.

v. Charge a $ 10 fee. This changes the account balance but does not return a value.

vi. Create a new account given an initial balance, the name of the owner, and the account number. Note that this will be a constructor, and that a constructor does not have a return type.

II. A Bank Account Class

1. File Account.java contains a partial definition for a class representing a bank account. Save it to your directory and study it to see what methods it contains. Then complete the Account class as described below. Note that you won’t be able to test your methods until you write ManageAccounts in question #2.

a. Fill in the code for method toString, which should return a string containing the name, account number, and balance for the account.

b. Fill in the code for method chargeFee, which should deduct a service fee from the account.

c. Modify chargeFee so that instead of returning void, it returns the new balance. Note that you will have to make changes in two places.

d. Fill in the code for method changeName which takes a string as a parameter and changes the name on the account to be that string.

2. File ManageAccounts.java contains a shell program that uses the Account class above. Save it to your directory, and complete it as indicated by the comments.

3. Modify ManageAccounts so that it prints the balance after the calls to chargeFees. Instead of using the getBalance method like you did after the deposit and withdrawal, use the balance that is returned from the chargeFees method. You can either store it in a variable and then print the value of the variable, or embed the method call in a println statement.

// *******************************************************

// Account.java

//

// A bank account class with methods to deposit to, withdraw from,

// change the name on, charge a fee to, and print a summary of the account.

// *******************************************************

public class Account

{

private double balance;

private String name;

private long acctNum;

// ———————————————

//Constructor — initializes balance, owner, and account number

// ——————————————–

public Account(double initBal, String owner, long number)

{

balance = initBal;

name = owner;

acctNum = number;

}

// ——————————————–

// Checks to see if balance is sufficient for withdrawal.

// If so, decrements balance by amount; if not, prints message.

// ——————————————–

public void withdraw(double amount)

{

if (balance >= amount)

balance -= amount;

else

System.out.println(“Insufficient funds”);

}

// ——————————————–

// Adds deposit amount to balance.

// ——————————————–

public void deposit(double amount)

{

balance += amount;

}

// ——————————————–

// Returns balance.

// ——————————————–

public double getBalance()

{

return balance;

}

// ——————————————–

// Returns a string containing the name, account number, and balance.

// ——————————————–

public String toString()

{

}

// ——————————————–

// Deducts $10 service fee //

// ——————————————–

public void chargeFee()

{

}

// ——————————————–

// Changes the name on the account

// ——————————————–

public void changeName(String newName)

{

}

}

// ************************************************************

// ManageAccounts.java

//

// Use Account class to create and manage Sally and Joe’s

// bank accounts

// ************************************************************

public class ManageAccounts

{

public static void main(String[] args)

{

Account acct1, acct2;

//create account1 for Sally with $1000

acct1 = new Account(1000, “Sally”, 1111);

//create account2 for Joe with $500

//deposit $100 to Joe’s account

//print Joe’s new balance (use getBalance())

//withdraw $50 from Sally’s account

//print Sally’s new balance (use getBalance())

//charge fees to both accounts

//change the name on Joe’s account to Joseph

//print summary for both accounts

}

}

III. Tracking Grades

A teacher wants a program to keep track of grades for students and decides to create a student class for his program as follows:

· Each student will be described by three pieces of data: his/her name, his/her score on test #1, and his/her score on test#2.

· There will be one constructor, which will have one argument—the name of the student.

· There will be three methods: getName, which will return the student’s name; inputGrades, which will prompt for and read in the student’s test grades; and getAverage, which will compute and return the student’s average.

1. File Student.java contains an incomplete definition for the Student class. Save it to your directory and complete the class definition as follows:

a. Declare the instance data (name, score for test1, and score for test2).

b. Create a Scanner object for reading in the scores.

c. Add the missing method headers.

d. Add the missing method bodies.

2. File Grades.java contains a shell program that declares two Student objects. Save it to your directory and use the inputGrades method to read in each student’s test scores, then use the getAverage method to find their average. Print the average with the student’s name, e.g., “The average for Joe is 87.” You can use the getName method to print the student’s name.

3. Add statements to your Grades program that print the values of your Student variables directly, e.g.:

System.out.println(“Student 1: ” + student1);

This should compile, but notice what it does when you run it—nothing very useful! When an object is printed, Java looks for a toString method for that object. This method must have no parameters and must return a String. If such a method has been defined for this object, it is called and the string it returns is printed. Otherwise the default toString method, which is inherited from the Object class, is called; it simply returns a unique hexadecimal identifier for the object such as the ones you saw above.

Add a toString method to your Student class that returns a string containing the student’s name and test scores, e.g.:

Name: Joe Test1: 85 Test2: 91

Note that the toString method does not call System.out.println—it just returns a string.

Recompile your Student class and the Grades program (you shouldn’t have to change the Grades program—you don’t have to call toString explicitly). Now see what happens when you print a student object—much nicer!

// ************************************************************

// Student.java

//

// Define a student class that stores name, score on test 1, and

// score on test 2. Methods prompt for and read in grades,

// compute the average, and return a string containing student’s info.

// ************************************************************

import java.util.Scanner;

public class Student

{

//declare instance data

// ———————————————

//constructor

// ———————————————

public Student(String studentName)

{

//add body of constructor

}

// ———————————————

//inputGrades: prompt for and read in student’s grades for test1 & test2.

//Use name in prompts, e.g., “Enter’s Joe’s score for test1”.

// ———————————————

public void inputGrades()

{

//add body of inputGrades

}

// ———————————————

//getAverage: compute and return the student’s test average

// ———————————————

//add header for getAverage

{

//add body of getAverage

}

// ———————————————

//getName: print the student’s name

// ———————————————

//add header for printName

{

//add body of printName

}

}

// ************************************************************

// Grades.java

//

// Use Student class to get test grades for two students

// and compute averages

//

// ************************************************************

public class Grades

{

public static void main(String[] args)

{

Student student1 = new Student(“Mary”);

//create student2, “Mike”

//input grades for Mary

//print average for Mary

System.out.println();

//input grades for Mike

//print average for Mike

}

}

IV. Band Booster Class

In this exercise, you will write a class that models a band booster and use your class to update sales of band candy.

1. Write the BandBooster class assuming a band booster object is described by two pieces of instance data: name (a String) and boxesSold (an integer that represents the number of boxes of band candy the booster has sold in the band fundraiser).

The class should have the following methods:

· A constructor that has one parameter—a String containing the name of the band booster. The constructor should set boxesSold to 0.

· A method getName that returns the name of the band booster (it has no parameters).

· A method updateSales that takes a single integer parameter representing the number of additional boxes of candy sold. The method should add this number to boxesSold.

· A toString method that returns a string containing the name of the band booster and the number of boxes of candy sold in a format similar to the following:

Joe: 16 boxes

2. Write a program that uses BandBooster objects to track the sales of 2 band boosters over 3 weeks. Your program should do the following:

· Read in the names of the two band boosters and construct an object for each.

· Prompt for and read in the number of boxes sold by each booster for each of the three weeks. Your prompts should include the booster’s name as stored in the BandBooster object. For example,

Enter the number of boxes sold by Joe this week:

For each member, after reading in the weekly sales, invoke the updateSales method to update the total sales by that member.

· After reading the data, print the name and total sales for each member (you will implicitly use the toString method here).

V. Representing Names

1. Write a class Name that stores a person’s first, middle, and last names and provides the following methods:

· public Name(String first, String middle, String last)—constructor. The name should be stored in the case given; don’t convert to all upper or lower case.

· public String getFirst()—returns the first name

· public String getMiddle()—returns the middle name

· public String getLast()—returns the last name

· public String firstMiddleLast()—returns a string containing the person’s full name in order, e.g., “Mary Jane Smith”.

· public String lastFirstMiddle()—returns a string containing the person’s full name with the last name first followed by a comma, e.g., “Smith, Mary Jane”.

· public boolean equals(Name otherName)—returns true if this name is the same as otherName. Comparisons should not be case sensitive. (Hint: There is a String method equalsIgnoreCase that is just like the String method equals except it does not consider case in doing its comparison.)

· public String initials()—returns the person’s initials (a 3-character string). The initials should be all in upper case, regardless of what case the name was entered in. (Hint: Instead of using charAt, use the substring method of String to get a string containing only the first letter—then you can upcase this one-letter string. See Figure 3.1 in the text for a description of the substring method.)

· public int length()—returns the total number of characters in the full name, not including spaces.

2. Now write a program TestNames.java that prompts for and reads in two names from the user (you’ll need first, middle, and last for each), creates a Name object for each, and uses the methods of the Name class to do the following:

a. For each name, print

· first-middle-last version

· last-first-middle version

· initials

· length

b. Tell whether or not the names are the same.

Deliverables

1. Complete all the activities in sections II thru V in this lab; then zip all your Java SOURCE CODE FILES for submission.

2. Write a lab report in Word or PDF document. The report should be named lab3.docx or lab3.pdf and must contain the following:

a. The first page should be a cover page that includes the Class Number, Lab Activity Number, Date, and Instructor’s name.

b. Answer of all the questions in section I: Prelab Exercises. No code file is required here. All the code involved, if any, must be copied and pasted in this report.

c. Provide a 1-paragraph conclusion about your experience; how long you spent completing the lab, the challenges you faced, and what you learned.

3. Upload your lab report and the zip file of your source code to Blackboard. DO NOT SUBMIT separate source files. If you do, they will be ignored.

 
Do you need a similar assignment done for you from scratch? Order now!
Use Discount Code "Newclient" for a 15% Discount!

Database Management Systems 1

Chapter 5

 

5.1 Describe the circumstances in which you would choose to use embedded SQL rather than SQL alone or only a general-purpose programming language.

Answer:

5.2 Write a Java function using JDBC metadata features that takes aResultSet as an input parameter, and prints out the result in tabular form, with appropriate names as column headings.

Answer:

 

5.3 Write a Java function using JDBC metadata features that prints a list of all relations in the database, displaying for each relation the names and types of its attributes. (Database Management Systems 1)

Answer:

5.4 Show how to enforce the constraint “an instructor cannot teach in two different classrooms in a semester in the same time slot.” using a trigger (remember that the constraint can be violated by changes to the teachesrelation as well as to the section relation).

Answer:

5.5 Write triggers to enforce the referential integrity constraint from sectiontotimeslot, on updates to section, and time
in Figure 5.8 do not cover the update operation.slot. Note that the ones we wrote 5.6 To maintain the tot cred attribute of the studentrelation, carry out the fol-lowing:
a. Modify the trigger on updates of takes, to handle all updates that canaffect the value of tot
b. Write a trigger to handle inserts to the takes relation.cred.
c. Under what assumptions is it reasonable not to create triggers on thecourse relation?

Answer:

5.7 Consider the bank database of Figure 5.25. Let us define a view branch custas follows:

     create view branch cust as
select 
branch name, customer name
     from depositor, account
     where depositor.account number account.account number

Answer:

5.8 Consider the bank database of Figure 5.25. Write an SQL trigger to carry out the following action: On delete of an account, for each owner of the account, check if the owner has any remaining accounts, and if she does not, delete her from the depositor relation. (Database Management Systems 1)

Answer:

 

5.9 Show how to express group by cube(abcd) using rollup; your answer should have only one group by clause.

Answer:

 

5.10 Given a relation S(studentsubjectmarks), write a query to find the top students by total marks, by using ranking.

Answer:

 

5.11 Consider the sales relation from Section 5.6.Write an SQL query to compute the cube operation on the relation, giving the relation in Figure 5.21. Do not use the cube construct.

Answer:

 

5.12 Consider the following relations for a company database:

• emp (enamednamesalary)

• mgr (enamemname) and the Java code in Figure 5.26, which uses the JDBC API. Assume that the userid, password, machine name, etc. are all okay. Describe in concise

English what the Java program does. (That is, produce an English sentence like “It finds the manager of the toy department,” not a line-by-line description of what each Java statement does.)

Answer:

 

5.13 Suppose you were asked to define a class MetaDisplay in Java, containing a method static void printTable(String r); the method takes a relation name as input, executes the query “select from r”, and prints the result out in nice tabular format, with the attribute names displayed in the header of the table.

 

import java.sql.*;

public class Mystery {

public static void main(String[] args) {

try {

Connection con=null;

Class.forName(“oracle.jdbc.driver.OracleDriver”);

con=DriverManager.getConnection(

“jdbc:oracle:thin:star/X@//edgar.cse.lehigh.edu:1521/XE”);

Statement s=con.createStatement();

String q;

String empName = “dog”;

boolean more;

ResultSet result;

do {

q = “select mname from mgr where ename = ’” + empName + “’”;

result = s.executeQuery(q);

more = result.next();

if (more) {

empName = result.getString(“mname”);

System.out.println (empName);

}

while (more);

s.close();

con.close();

catch(Exception e){e.printStackTrace();} }}

 

a. What do you need to know about relation to be able to print the result in the specified tabular format.

b. What JDBC methods(s) can get you the required information?

c. Write the method printTable(String r) using the JDBC API.

Answer:

 

5.14 Repeat Exercise 5.13 using ODBC, defining void printTable(char *r) as a function instead of a method. (Database Management Systems 1)

Answer:

 

5.15 Consider an employee database with two relations

     employee (employee namestreetcity)

     works (employee namecompany namesalary)

where the primary keys are underlined. Write a query to find companies

whose employees earn a higher salary, on average, than the average salary at “First Bank Corporation”.

a. Using SQL functions as appropriate.

b. Without using SQL functions.

Answer:

 

5.16 Rewrite the query in Section 5.2.1 that returns the name and budget of all

departments with more than 12 instructors, using the with clause instead of using a function call.

Answer:

 

5.17 Compare the use of embedded SQL with the use in SQL of functions defined in a general-purpose programming language. Under what circumstances would you use each of these features?

Answer:

 

5.18 Modify the recursive query in Figure 5.15 to define a relation

     prereq depth(course idprereq iddepth)

where the attribute depth indicates how many levels of intermediate prerequisites are there between the course and the prerequisite. Direct prerequisites have a depth of 0.

Answer:

 

5.19 Consider the relational schema

     part(part idnamecost)

     subpart(part idsubpart idcount)

A tuple (p1p23) in the subpart relation denotes that the part with part-id p2 is a direct subpart of the part with part-id p1, and p1 has 3 copies of p2.

Note that p2 may itself have further subparts. Write a recursive SQL query that outputs the names of all subparts of the part with part-id “P-100”. (Database Management Systems 1)

Answer:

 

5.20 Consider again the relational schema from Exercise 5.19. Write a JDBC function using non-recursive SQL to find the total cost of part “P-100”,including the costs of all its subparts. Be sure to take into account thefact that a part may have multiple occurrences of a subpart. You may userecursion in Java if you wish.

Answer:

 

5.21 Suppose there are two relations and s, such that the foreign key of references the primary key Aof s. Describe how the trigger mechanism canbe used to implement the on delete cascade option,when a tuple is deleted from s.

Answer:

 

5.22 The execution of a trigger can cause another action to be triggered. Most database systems place a limit on how deep the nesting can be. Explain why they might place such a limit.

Answer:

 

5.23 Consider the relation, , shown in Figure 5.27. Give the result of the following query:

 

uilding room

number

time

slot

id

course

id

sec

id

Garfield Garfield Saucon Saucon Painter Painter 359

359

651

550

705

403

A B A C D D BIO-101 BIO-101 CS-101 CS-319 MU-199 FIN-201 1 2 2 1 1 1

 

     select buildingroom numbertime slot idcount(*)

     from r

     group by rollup (buildingroom numbertime slot id)

Answer:

 

5.24 For each of the SQL aggregate functions sum, count, min, and max, show how to compute the aggregate value on a multiset S1 ∪S2, given the aggregate values on multisets S1 and S2.

On the basis of the above, give expressions to compute aggregate values with grouping on a subset of the attributes of a relation (AB,CDE), given aggregate values for grouping on attributes S, for the following aggregate functions:

a. sum, count, min, and max

b. avg

c. Standard deviation

Answer:

 

5.25 In Section 5.5.1, we used the student grades view of Exercise 4.5 to write a query to find the rank of each student based on grade-point average.

Modify that query to show only the top 10 students (that is, those students whose rank is 1 through 10).

Answer:

 

5.26 Give an example of a pair of groupings that cannot be expressed by using a single group by clause with cube and rollup.

5.27 Given relation s(abc), show how to use the extended SQL features to generate a histogram of versus a, dividing into 20 equal-sized partitions

(that is, where each partition contains 5 percent of the tuples in s, sorted by

a).

Answer:

 

5.28 Consider the bank database of Figure 5.25 and the balance attribute of the account relation. Write an SQL query to compute a histogram of balance values, dividing the range 0 to the maximum account balance present, into three equal ranges. (Database Management Systems 1)

 

Answer:

 
Do you need a similar assignment done for you from scratch? Order now!
Use Discount Code "Newclient" for a 15% Discount!

Programming Assignment Help: Example

Given an integer representing a 7-digit phone number, excluding the area code, output the prefix and line number, separated by a hyphen.

Ex: If the input is 5551212, the output is:

555-1212

Hint: Use % to get the desired rightmost digits. Ex: The rightmost 2 digits of 572 is gotten by 572 % 100, which is 72.

Hint: Use / to shift right by the desired amount. Ex: Shifting 572 right by 2 digits is done by 572 / 100, which yields 5. (Recall integer division discards the fraction).

For simplicity, assume any part starts with a non-zero digit. So 011-9999 is not allowed.

2. Summary: Given integer values for red, green, and blue, subtract the gray from each value.

Computers represent color by combining the sub-colors red, green, and blue (rgb). Each sub-color’s value can range from 0 to 255. Thus (255, 0, 0) is bright red, (130, 0, 130) is a medium purple, (0, 0, 0) is black, (255, 255, 255) is white, and (40, 40, 40) is a dark gray. (130, 50, 130) is a faded purple, due to the (50, 50, 50) gray part. (In other words, equal amounts of red, green, blue yield gray).

Given values for red, green, and blue, remove the gray part.

Ex: If the input is 130 50 130, the output is:

80 0 80

Find the smallest value, and then subtract it from all three values, thus removing the gray.

3. On a piano, each key has a frequency, and each subsequent key (black or white) is a known amount higher. Ex: The A key above the middle C key has a frequency of 440 Hz. Each subsequent key (black or white) has a frequency of 440 * r^n, where n is the number of keys from that A key, and r is 2^(1/12). Given an initial frequency, output that frequency and the next 4 higher key frequencies.

Ex: If the input is 440, the output is:

440.0 466.1637615180899 493.8833012561241 523.2511306011974 554.3652619537442

Note: Include one statement to compute r = 2^(1/12) using the RaiseToPower() function, then use r in the formula fn = f0 * r^n. (You’ll have four statements using that formula, different only in the value for n).

 
Do you need a similar assignment done for you from scratch? Order now!
Use Discount Code "Newclient" for a 15% Discount!

Assignment Help on The Physical-Network Layer Of The Cyber Domain

Assignment Help on The Physical-Network Layer Of The Cyber Domain

Describe How You Are Connected To The Physical-Network Layer Of The Cyber Domain.

Write a 1- to 2-page paper or create a 6- to 8-slide presentation with visuals and speaker notes about how you are connected to the physical-network layer of the cyber domain. Identify the devices in your home that are connected to a network, such as your phone, computers, or other networked devices. Explain how those devices are connected to a larger network, such as a cellular provider or ISP. Discuss at least 3 threats to you and your connected networks. Format any references according to APA guidelines.

Typical devices I have connected to my house are as follows:

Modem from ISP (Wave)

Orbi Router – plus 2 satellites

5 laptops

2 smart TV’s

14 FEIT Smart dimmable light switches

4 FEIT/Wemo smart plugs

5 Alexa’s

Garage Opener unit

1 networked printer

Dual Microwave/Oven smart appliance

2 Roomba Vacuum Cleaners

Honeywell Thermostat (Assignment Help on The Physical-Network Layer Of The Cyber Domain)

The physical-network layer

The physical-network layer is a crucial component of the cyber domain, serving as the foundation for all digital interactions. This layer encompasses the tangible infrastructure that facilitates data transfer and communication between devices. At its core, it includes physical cables, routers, switches, servers, and other hardware elements that form the backbone of the internet and interconnected networks.

In the physical-network layer, data travels in the form of electrical signals or light pulses through cables and optical fibers. This layer is responsible for the reliable and efficient transmission of information across vast distances, linking disparate devices and enabling seamless communication. The architecture of this layer is designed to ensure the stability, scalability, and security of the entire cyber ecosystem.

Cybersecurity measures at the physical-network layer are paramount to protect against physical threats, such as unauthorized access to data centers or the tampering of network infrastructure. Additionally, advancements in technology, like 5G networks and high-speed fiber optics, continue to shape and enhance the capabilities of the physical-network layer, fostering a more interconnected and digitally agile world. As the digital landscape evolves, the physical-network layer remains a critical enabler of the modern cyber domain.

Assignment Help on The Physical-Network Layer Of The Cyber Domain

References

https://www.sciencedirect.com/topics/engineering/connected-network

 
Do you need a similar assignment done for you from scratch? Order now!
Use Discount Code "Newclient" for a 15% Discount!

MS CS – Machine Learning Assignment Help

MS CS – Machine Learning Assignment Help

CS Machine Learning

Homework 1 – Theory

Keywords: Boolean functions, mistake bounds, PAC learning

Instructions: Please either typeset your answers (LATEX recommended) or write them very clearly and legibly and scan them, and upload the PDF on edX. Legibility and clarity are critical for fair grading.

1. Let D be an arbitrary distribution on the domain {−1, 1}n, and let f, g : {−1, 1}n → {−1, 1} be two Boolean functions. Prove that

Px∼D[f(x) 6= g(x)] = 1− Ex∼D[f(x)g(x)]

2 .

Would this still be true if the domain were some other domain (such as Rn, where R denotes the real numbers, with say the Gaussian distribution) instead of {−1, 1}n? If yes, justify your answer. If not, give a counterexample.

2. Let f be a decision tree with t leaves over the variables x = (x1, . . . , xn) ∈ {−1, 1}n. Explain how to write f as a multivariate polynomial p(x1, . . . , xn) such that for every input x ∈ {−1, 1}n, f(x) = p(x). (You may interpret −1 as FALSE and 1 as TRUE or the other way round, at your preference.) (Hint: try to come up with an “indicator polynomial” for every leaf, i.e. one that evaluates to the leaf ’s value if x is such that that path is taken, and 0 otherwise.)

3. Compute a depth-two decision tree for the training data in table 1 using the Gini function, C(a) = 2a(1− a) as described in class. What is the overall accuracy on the training data of the tree?

X Y Z Number of positive examples Number of negative examples

0 0 0 10 20 0 0 1 25 5 0 1 0 35 15 0 1 1 35 5 1 0 0 5 15 1 0 1 30 10 1 1 0 10 10 1 1 1 15 5

Table 1: decision tree training data

4. Suppose the domain X is the real line, R, and the labels lie in Y = {−1, 1}, Let C be the concept class consisting of simple threshold functions of the form hθ for some θ ∈ R, where hθ(x) = −1 for all x ≤ θ and hθ(x) = 1 otherwise. Give a simple and efficient PAC learning algorithm for C that uses only m = O(1� log

1 δ ) training examples to output a classifier with

error at most � with probability at least 1− δ.

1

 

gchourasia
Cross-Out

 

5. In this problem we will show that mistake bounded learning is stronger than PAC learning, which should help crystallize both definitions. Let C be a function class with domain X = {−1, 1}n and labels Y = {−1, 1}. Assume that C can be learned with mistake bound t using algorithm A. (You may also assume at each iteration A runs in time polynomial in n, as well as that A only updates its state when it gets an example wrong.) The concrete goal of this problem is to show how a learner, given A, can PAC-learn concept class C with respect to any distribution D on {−1, 1}n. The learner can use A as part of its output hypothesis and should run in time polynomial in n, 1/�, and 1/δ.

To achieve this concrete goal in steps, we will break down this problem into a few parts. Fix some distribution D on X, and say the examples are labeled by an unknown c ∈ C. For a hypothesis (i.e. function) h : X → Y , let err(h) = Px∼D[h(x) 6= c(x)].

(a) Fix a hypothesis h : X → Y . If err(h) > �, what is the probability that h gets k random examples all correct? How large does k need to be for this probability to be at most δ′? (The contrapositive view would be: unless the data is highly misleading, which happens with probability at most δ′, it must be the case that err(h) ≤ �. Make sure this makes sense.)

(b) As we feed examples to A, how many examples do we need to see before we can be sure of getting a block of k examples all correct? (This doesn’t mean the hypothesis needs to be perfect; it just needs to get a block of k all correct. Think about dividing the stream of examples into blocks of size k, and exploit the mistake bound. How many different hypotheses could A go through?)

(c) Put everything together and fully describe (with proof) a PAC learner that is able, with probability of failure at most δ, to output a hypothesis with error at most �. How many examples does the learner need to use (as a function of �, δ, and t)? (MS CS – Machine Learning Assignment Help)

References

https://www.ibm.com/topics/machine-learning

 
Do you need a similar assignment done for you from scratch? Order now!
Use Discount Code "Newclient" for a 15% Discount!

Nursing Paper Example on Antisocial Personality Disorder (ASPD)

Nursing Paper Example on Antisocial Personality Disorder (ASPD)

Introduction

Nursing Paper Example on Antisocial Personality Disorder (ASPD)

Antisocial Personality Disorder (ASPD), like all personality disorders represents a stable, pervasive pattern of behavior that is present for an individual’s entire life. In ASPD generally, the configuration is primarily one of a disregard for, and a violation of, the rights of others. This manifests itself in the individual fundamentally not caring about the wants, needs, and desires of others. The result of this core belief that others do not matter is behavior that mostly leads to arrest for petty offenses like theft. Though these crimes are not personality traits, the record that they create is reliable and traceable, making a good diagnostic tool. Another similar diagnostic tool is the individual’s work and school record. ASPD traits make listening to authority figures nearly impossible so most of these individuals have spotty educational and work histories.

These behavioral markers are the result of several personality traits. One of these chief characteristics is impulsiveness. Individuals with ASPD do not stop to carefully consider the consequences of their activity, rather they simply do what they want for themselves in the moment. This impulsivity can lead to reckless and dangerous activity both for their own safety and for the safety of others. They may drive with excessive speed or push others near a traffic filled intersection. If they desire the property of others and they can take it, they will. This same attitude that is used toward property is used toward other people. They will lie or con others in order to fulfill their personal desires. (Nursing Paper Example on Antisocial Personality Disorder (ASPD))

If the individual with ASPD is not able to meet their desires through theft or con, they will not stop trying to fulfill their needs. They are prone to get very irritable and often get very aggressive towards others. Fighting with others will likely be prevalent in their personal history. At the end of their theft, maltreatment, and aggressiveness they will not feel sorry for their actions. They will either not care that they have caused harm or rationalize the situation.

In order to qualify for a diagnosis three other criteria must be met:

The individual must be at least 18 years old. Individuals who are growing up and going through puberty do not have the stable personality required to be diagnosed with a personality disorder.

There must also be proof in their developmental history that the individual had antisocial traits as a child. This is demonstrated by fulfilling criteria for Conduct Disorder before age 15. Diagnosticians want to know that the individual’s personality has been set. They would like to know that the individual was like this before puberty and will be like this long after puberty before diagnosing a personality disorder.

The antisocial behavior must not be exclusively during schizophrenia or a manic episode. The behavior should not be because of an Axis I condition. (Nursing Paper Example on Antisocial Personality Disorder (ASPD))

Psychopathy & Sociopathy

In the literature there is a much greater emphasis on studying psychopathy and sociopathy than there is antisocial personality disorder. These three are related but are not identical. Antisocial personality disorder is the only one of these three terms that exists in the DSM-IV-TR. Psychopathy is defined by characteristics such as a lack of empathy and remorse, criminality, antisocial behavior, egocentricity, manipulativeness, irresponsibility and a parasitic lifestyle. It is commonly conceptualized that psychopathy is a more severe form of APD and this thinking is reasonably accurate. Almost all individuals who fulfill the requirements to receive the label of psychopathy fulfill the requirements for ASPD but most of the individuals who fulfill the requirements of ASPD do not also get the label of psychopath. The term sociopath is an attempt to demystify the term psychopath since many generalize the term psycho in psychopath to apply to other terms like psychotic. Sociopathy is also an attempt by some clinicians to explain the etiology of the condition as characterized by early socialization experiences. (Nursing Paper Example on Antisocial Personality Disorder (ASPD))

Nursing Paper Example on Antisocial Personality Disorder (ASPD)

Still Human

Subtypes

One of the diagnostic challenges with any personality diorder is that there is typically significant overlap between the personality disorders. This is due both to the diagnostic overlap in the definition of each of the personality disorders and the fact that individuals typically display many different traits throughout their lifetime. In order to get a better understanding of the common personality trait overlaps, Theodore Miller created a series of 5 subtypes of ASPD:

Coveteus—this type is purely made up of ASPD traits. This individual feels intentionally denied and deprived and seeks to get the things s/he covets but gets little satisfaction from ownership.

Nomadic—this type is ASPD with schizoid, schizotypal and avoidant features. This individual feels cast aside and is typically a drifter and societal dropout. When this individual acts out it is against that impulse.

Malevolent—this type is a mix of ASPD with paranoid personality features. This individual is typically more violent than the other personality disorder types. He expects betrayal and punishment and attempts to get revenge in a pre-emptive manner.

Risk-taking—this type is a mix of ASPD and histrionic features. This individual has the risk taking features of ASPD amplified heavily. They are very audacious and bold to the point of recklessness and they continuously pursue perilous adventures.

Reputation-defending—this type is a mix between ASPD and narcissistic features. This individual has a need to be thought of as unflawed and formidable and will react extremely negatively to perceived slights to status. (Nursing Paper Example on Antisocial Personality Disorder (ASPD))

Differences

Two of the most problematic differences for ASPD are Narcissistic and Histrionic personality disorder. Narcissistic Personality Disorder shows similar distorted thinking about others. They care little for the wants and needs of others and have limited empathy. Individuals with Narcissistic PD can be manipulative as well. However, Narcissistic individuals rarely show evidence of conduct disorder in youth or antisocial aggression. The underlying thought process behind their rules and norms breaking behavior is different as well. With ASPD the individual feels that they are entitled and special and that they can break the rules because of this fact. The ASPD individual does not need the rationalization, typically they do what they want because they want to do it. (Nursing Paper Example on Antisocial Personality Disorder (ASPD))

Individuals with Histrionic PD are often impulsive, show very little depth in their empathy and understanding of others. Their dramatic flair can be seen as impulsivity and can do things like maintaining affairs that can be characterized as violating social norms. However, histrionic individuals are not aggressive and will not show evidence of Conduct Disorder in typical presentation.

Symptom Overlap Between Antisocial and Narcissistic/Histrionic

 

Etiology

The nature of personality disorders makes their etiology more difficult to pin down than other disorders. ASPD requires even more evidence of prolonged atypical functioning than other personality disorders because it requires evidence of maladaptive functioning before age 18. This requirement muddies the already murky waters that are the interplay of genetics and environment and their expression in both brain anatamy and psychological activity. (Nursing Paper Example on Antisocial Personality Disorder (ASPD))

Irregularities of the serotonin network in the brain responsible for the release, use, and reuptake of the neurotransmitter are linked to individuals with ASPD. This network has been linked separately both to individuals diagnosed with ASPD and to highly impulsive behavior. The theory is that this deficit can lead either to arousal thresholds being too low in individuals who show impulsivity or the arousal threshold is too high in individuals who are cold or callous.

Psychological and family systems factors have also been shown to have an effect on the expression of ASPD. The researchers used national epidemiological survey and found individuals from a data set of alcohol users who also were antisocial, finding 1200 individuals on which to base their results. They found that significant childhood experiences of abuse and neglect significantly predict eventual display of ASPD. These early experiences of violence or abandonment have significant effects on attachment and relationship formation. (Nursing Paper Example on Antisocial Personality Disorder (ASPD))

Duggan (Duggan, et al. 2012) showed a positive relationship between early onset of alcohol use and the transition of conduct disorder to ASPD. Those who used alcohol and other substances at an earlier age more often wound up being diagnosed with ASPD than those who did not. This effect can easily by hypothesized to have an etiological function in either biological or social bases. Perhaps the drug use affected neurological pathways to make the individuals more susceptible. Perhaps early onset drug use was indicative of a social network that was more conducive to reinforcing antisocial behavior.

Gender Gap

There is a very wide diparity between the number of men and women who meet the criteria for diagnosis with ASPD. Epidemiological research suggests that as many as 3% of men have ASPD while less than 1% of women do. Some theorists, like Miller, have argued that the disparity in men and women in ASPD is mirrored by the same disparity with the diagnosis of Borderline Personality Disorder. Women are proportionately more likely to receive that diagnosis than men are to receive a diagnosis of ASPD. This may be due to the fact that the criteria for APD are heavily gender biased. Where men will use naked aggression in a way that leads to multiple arrests (criteria A-1 and criterion A-4) women tend to use relational aggression which has very different outcomes. The same underlying etiology and pathology lead to very different behaviors because these behaviors are mediated by cultural norms. The masculine ideal in the United States contains many antisocial traits. Men are encouraged to be self-reliant, independent, and to use physical force when necessary. They are taught to be stoic and unemotional. This antisocial personality is an overextension of that ideal. Women, on the other hand, are not taught to be unemotional or physically violent, so they manifest that same aggression in different ways. Alegria (Alegria, et al. 2013) found that women have to have a significantly higher lifetime loading of abuse and neglect to show antisocial traits than men do. (Nursing Paper Example on Antisocial Personality Disorder (ASPD))

The top theoretical explanations for antisocial personality traits unfortunately leave little for individual agency. The difficulty is that the diagnosis of ASPD requires that the individual gain their personality traits when they are least able to defend against them – during or before their teen years. The biological explanation leaves basically no room for personal agency. It is impossible to willfully change your brain chemistry. Other theoretical standpoints argue that childhood maltreatment and neglect are to blame. A neglected or abused child has little ability to even avoid their maltreatment, let alone recover from their own psychological load. One simple step that is clear from the literature is to delay the onset of alcohol and substance use. Using substances at an early age is a significant loading factor for ASPD. Avoiding early alcohol use can positively affect brain chemistry and alter future habitual activity for the better.

Hypothetical Conceptualization

Psychodynamic

Psychodynamic theorists conceptualize ASPD begins in the early childhood phase of trust vs. mistrust. Children who will later show evidence of conduct disorder and then ASPD do not have adequate social relationships as children. These inadequate relationships center on a lack of parental love. A lack of parental love can lead a child in many different pathological directions and is not necessarily indicative of ASPD in and of itself. Some subset of these children respond to the lack of love demonstrated by their parents by becoming emotionally aloof. They begin to develop the relational style that they are taught at home by bonding with others through overt power dynamics instead of a shared emotional bond. Psychodynamic theorists can point to the evidence of pervasive early childhood trauma in individuals who eventually develop ASPD as proof of their conceptual framework. (Nursing Paper Example on Antisocial Personality Disorder (ASPD))

Unfortunately, psychodynamic theoretical framework is largely ineffective. There are a number of hypothesized reasons for this therapeutic failure. The first is that almost no one with ASPD is in treatment voluntarily. In addition to this difficulty, individuals with ASPD also have no conscience and little motivation to change who they are naturally which further compounds treatment difficulty. Antisocial individuals also tend to have a very low frustration tolerance which makes seeing treatment through to its conclusion very difficult. (Nursing Paper Example on Antisocial Personality Disorder (ASPD))

Cognitive-Behavioral

Cognitive-Behavioral therapists conceptualize antisocial activity as a modeled behavior. Children may be reenacting the violent behavior that they experience in a far too personal manner. Theorists also believe that the negative acting out and violent behaviors may be reinforced by the attention that they receive. Parents may give in to violent outbursts simply to restore the peace once individuals have acted out.

Cognitive-behavioral therapists do not attempt to repair the causes of ASPD, consistent with their treatment modalities. They target problem behavior. Therapists attempt to give APD individuals skills to understand moral issues and conceptualize the needs of others. Some prisons and hospitals have tried to put ASPD individuals in group settings to teach responsibility. This approach does not seem to have any effect in most cases. (Arntz, Cima and Lobbestael 2013). (Nursing Paper Example on Antisocial Personality Disorder (ASPD))

Biological Theories

Biological theorists have begun using psychotropic medications on individuals with ASPD. Atypical Antipsychotic drugs have been used to treat ASPD. These newer antipsychotic medications bind to multiple dopamine receptor but also have an effect on serotonin. These therapies have not been evaluated in large scale trials to date. (Brook and Kosson 2013)

Biological models have many findings pertinent to individuals with ASPD. First, as was stated in depth earlier, serotonin deficits may be responsible for ASPD traits, especially in individuals who display highly impulsive behavior. Another area of research is the frontal lobes. Many individuals with ASPD have smaller or deficient frontal lobes. Lastly, it appears that many individuals with ASPD have very low resting levels of anxiety. Low levels of anxiety explain why it is difficult for individuals to learn from past negative experiences. (Boccaccini, et al. 2012)The biological model theorizes multiple etiologies for these deficiencies. They may come from genetic factors that cause malformation as children, nutritional deficiencies at key periods in development, the effect of viruses, or from physical harm such as brain lesions. (Nursing Paper Example on Antisocial Personality Disorder (ASPD))

Conclusion

Antisocial Personality Disorder is a difficult but influential disorder. It is an important problem both for the psychological community and for society. The psychological community has not been able to offer any meaningful therapeutic approaches. Part of the reason that this is the case has to do with the very recalcitrant nature of the disorder itself. Another significant part of that reason is that the psychological community cannot decide where to focus its research. Many very distinguished individuals have been trying to dissect a tiny subset of the APD population because they are very scary and are good for getting grant money. Society at large has a vested interest in ASPD because it makes up such a significant portion of the prison population. These individuals are likely to recidivate and likely to commit violent crimes. Understanding this population better is vital for long term meaningful prison reform. (Lewis, Olver and Wong 2013)

In addition to failing individuals with ASPD in terms of treatment, it is relevant to note that society is failing individuals with ASPD in their formative years. Recurrent episodes of neglect and abuse are run-of-the-mill for individuals with ASPD. Society at large needs to do a better job of policing this kind of abuse and neglect and provide safe, rehabilitative experiences for those who are victims of it. (Nursing Paper Example on Antisocial Personality Disorder (ASPD))

References

https://pubmed.ncbi.nlm.nih.gov/31536279/

 
Do you need a similar assignment done for you from scratch? Order now!
Use Discount Code "Newclient" for a 15% Discount!

PC & Industrial Networks

PC & Industrial Networks

 

70 Points

Answer each of the following questions in complete detail:

 

1. (10 points) Assume a host computer has the following configuration:

IP Address: 200.110.84.176

Subnet Mask: 255.255.248.0

Default Gateway: 200.110.84.1

a. What is the Class of this ‘network’?

 

b. Is this a Network, Subnetwork, Supernetwork or something else? How do you know?

 

c. How many possible hosts would there be on the above network if all usable addresses were assigned?

 

d. How would this IP address be expressed using CIDR notation?

 

e. Using CIDR notation, what is the range of the block of addresses this Host belongs to?

 

2. (6 points) Explain everything that can be determined from the following:

 

a. fe80::9890:96ff:fea1:53ed%12

b. 2002:77fe:8921::77fe:8921

c. ::01

d. ::

 

3. (4 points) What is the significance of the ninth octet in the header of the IP datagram?

 

 

4. (5 points) SSK Corp has offices in Toledo, Detroit and Columbus. Each office has 127

 

Computers. The IT plan calls for connecting all offices using data lines. The Toledo site will also connect to the Internet. SSK Corp. has elected to use PUBLIC IP address space on all computers at each of its sites.

Their ISP has restricted the IP ranges to the ones below. The ISP’s Network

Administrator is on vacation – you have been asked to fill-in and select a range of addresses that will satisfy SSK Corp.’s needs with the least amount of wasted IP addresses. Propose a range of addresses for SSK Corp. and explain your answer.

225.113.8.0/24

225.113.9.0/24

192.168.0.0/16

221.127.136.0/24

221.128.135.0/24

221.128.136.0/24

221.128.137.0/24

221.128.138.0/24

206.122.148.0/24

10.0.0.0/8

221.125.138.0/24

221.126.137.0/25

221.128.139.0/24

5. (5 points) Using the IP ranges below:

a) What IP range would an ISP provide to a customer, if the customer wanted a range of Public IP’s for use on the Internet? Explain your choice and why you feel the other choices are not adequate?

b) Using the Range you selected in ‘5a’ above – subnet the range into as many /28 networks as possible – show your work and each /28 range of addresses. (Show the network address and the broadcast address for each /28 subnet)

225.113.8.0/24

225.113.9.0/25

192.168.0.0/16

201.127.136.0/24

172.16.0.0/24

10.0.0.0/8

169.254.137.0/25

245.125.1378.0/24

10.0.0.0/24

245.0.0.0/8

127.0.0.0/8

6. (15 points) The following information was extracted from an Ethernet Frame:

IP Datagram Header: 45 00 00 44 5b d2 00 00 80 11 ef 4d 83 b7 75 39 83 b7 72 e1

Based on the above information, describe everything that can be determined about this packet (give the actual data value for each field). Convert each field to its normally displayed value (i.e. Hexadecimal/Decimal/Binary).

Example: Version is 4 which is IPv4

7. (10 points) Bob obtained the following information from a workstation: C:\>ipconfig

Ethernet adapter Local Area Connection:

IP Address. . . . . . . ……… . : 169.254.10.105 Subnet Mask . . . . . . ……… : 255.255.0.0 Default Gateway . . . . ……..:

Link-Local IPv6 Address…..fe80::9890:96ff:fea1:53ed%12

a. Explain everything that can be determined about this host.

 

After waiting 5 minutes and making no changes to his workstation. Bob obtained the following information from his workstation.

C:\>ipconfig

Ethernet adapter Local Area Connection:

IP Address. . . . . . . . ………………: 138.110.10.50 Subnet Mask . . . . . . …………….. : 255.255.0.0

Default Gateway . . . …………….. : 138.110.10.1

Link-Local IPv6 Address………….:fe80::9890:96ff:fea1:53ed%12

b. How would you explain the changes to the IP stack? Explain in detail what occurred.

 

8. (5 points) Explain each of the good ‘Network Design goals’ as discussed in class.

9. (10 points) You have been given the task of changing the IP Address and enabling telnet remote access on a CISCO 2950 enterprise switch.

The current IP address is 172.25.2/16 the new IP address is 10.0.0.2/24

The enterprise switch has no password configured.

a. Explain all of the commands needed for you to successfully accomplish the IP Address change and telnet remote access.

 
Do you need a similar assignment done for you from scratch? Order now!
Use Discount Code "Newclient" for a 15% Discount!

Coding Assignment Help on Project 3 – Play Tetris

Coding Assignment Help on Project 3 – Play Tetris

Commenting guidelines

Documenting Your Classes and Methods

It is important always to document your code clearly. For Java programmers, some general commenting conventions have been established by a tool called javadoc (Links to an external site.)Links to an external site., the Java API documentation generator. This tool can automatically extract documentation comments from source code and generate HTML class descriptions, like those in the Sofia API (Links to an external site.)Links to an external site.. This tool is so popular and so commonly used that it has set the standard for how people document the externally visible features in their Java code. (See the Sun article on “How to Write Doc Comments for the Javadoc Tool” (Links to an external site.)Links to an external site..) (Coding Assignment Help on Project 3 – Play Tetris)

JavaDoc (Links to an external site.)Links to an external site. Comments

The javadoc tool expects comments to be written in a particular way–other comments are ignored. JavaDoc comments (also called just “doc comments”) always start with “/**” and end with “*/“. Any other comments are ignored when generating documentation for your code. Further, a JavaDoc comment describing something always appears immediately before the thing it documents.

Within a JavaDoc comment, special tags can be embedded to signal particular kinds of information. These doc tags enable complete, well-formatted API documentation to be automatically generated from your source code. All JavaDoc tags start with an at-sign (@).

If you already know some HTML, you can even embed simple HTML markup inside your JavaDoc comments, and it will appear in the generated documentation for your classes. This is handy if you want to add bullet lists in a class description, or wish to make part of your comment stand out in boldface, and so on.

Describing a Class

You should place a descriptive JavaDoc comment just before the start of each class you write:

/**

* Write a one-sentence summary of your class here.

* Follow it with additional details about its purpose, what abstraction

* it represents, and how to use it.

*

* @author Stephen Edwards (stedwar2)

* @version 2011.01.30

*/

public class UserProfile

. . .

{

. . .

}

Class descriptions typically use two tags: @author indicates who wrote the file, and @version indicates the “version” of this file or project. You can use your full name, or just PID, in an @author tag. In this course, it is fine to use the date when the file was written as the version information in the @version tag. (Coding Assignment Help on Project 3 – Play Tetris)

When using tags like @author and @version, make sure to put them at the beginning of the line within the doc comment.

For the @author line be sure to list your user name (PID) as well as your first and last name. Also, if you started off with a default comment generated by the IDE (like the example above) don’t forget to replace the text inside the comment with your own. The javadoc tool will use the very first sentence of your comment as a one-sentence summary of your class, and will use the entire text of your comment as the full class description.

Remember that if you just write regular comments, they won’t be recognized as “official” descriptive text for document generation:

// This comment describes what this class does, but because it

// uses //, it won’t be recognized as a JavaDoc comment.

public class UserProfile

. . .

{

. . .

}

Documenting a Method

You should place a descriptive JavaDoc comment just before each method or constructor you write:

/**

* Move the robot forward to the next HTML heading.

*/

public void advanceToNextHeading()

{

. . .

}

As with other JavaDoc comments, make sure this appears just before the method it describes. For methods that have parameters, you should also include a brief description of what each parameter means. For example, we might have a UserProfile class that provides a setter method for its name:

/**

* Set the profile’s name to the given value.

*

* @param newName The new name for this profile.

*/

public void setName(String newName)

{

. . .

}

Here, a @param tag has been used to give a description of the meaning and use of the parameter. Use a separate @param tag to describe each parameter in the method (or constructor). Be sure to start these tags at the beginning of a comment line, and group all of the tags with the same name together (i.e., all @param tags should be next to each other). (Coding Assignment Help on Project 3 – Play Tetris)

Again, javadoc will take the first sentence in your comment as a one-sentence summary of what the method does. The remainder of the comment will be used in generating a full description of the method.

Some methods have return values–that is, they give back information to their caller. For example, a getName() method might return a String containing the user profile’s current name. You can document what information is returned using a @return tag:

/**

* Get this profile’s name.

*

* @return This profile’s name

*/

public String getName()

{

. . .

}

Generating Your Documentation

Within an Eclipse project, you can use the Project->Generate Javadoc… command to generate full documentation for your own project straight from your source code. Click Next twice, and in the final screen check to “Open generated index file in browser” near the bottom.  Once complete, a new tab will open showing all of the generated documentation for your classes.

Other Comments in Your Code

JavaDoc comments are “public” documentation of the externally accessible features of your classes. Often, you may also wish to include “internal” (that is, private) documentation that is only useful to someone reading the source code directly. Any comment that does not begin with /** is treated as private, purely for someone with access to the source code. You are free to use such comments where ever you like to improve the readability of your code, but …

Internal Comments Are the Documentation Technique of Last Resort

Choose all names carefully so that a naïve reader’s first interpretation will always be right. Do not choose names that might mislead someone about what a method is supposed to do, or what information a variable holds. Choosing poor names or convoluted logic structure and then trying to explain it in lengthy comments does little to improve readability. This is doubly true for methods, because half the time a reader will see your method name where it is called, not when they are reading your method itself. If it is not immediately clear what the method should do, that affects the readability of all the code calling this method, no matter how many comments you put in the method itself.

Strive to write code that is clear and understandable on its own, simply by virtue of the names you have chosen and the structure you use. If you feel you have to add an internal comment to explain something, ask yourself what needs explaining. If you need to explain what a name refers to or how you intend to use it, consider choosing a better name. If you have to explain a complex series of if statements or some other convoluted structure, ask yourself (or a TA) if there is a better way. Only after considering these alternatives should you add descriptive comments. (Coding Assignment Help on Project 3 – Play Tetris)

Redundant Comments Are Worse Than No Comments

Consider these comments:

user = new UserProfile(); // Create a new user profile

 

x = x + 1; // Add one to x

 

user.setName(“Ben”); // change the profile name

These are examples of useless comments. Many students add comments to their code just to “make sure everything is documented,” or because they believe copious comments are what the instructor is looking for. Comments like this just get in the way of reading the code, however. You should only add comments when they express something that isn’t already evident from the code itself. Comments are more information that the poor reader has to wade through, so you need to carefully balance their benefits against the cost of having to read them. This reader might be – and often will be – you, so a good mental model to adopt is that you are writing comments as messages to your future self. This future you will be more experienced than the current you when it comes to programming, but will have forgotten the details of the code written even a week ago. You should write your comments with an eye towards minimizing the mental effort this future you has to expend to be able to understand and maintain your code. (Coding Assignment Help on Project 3 – Play Tetris)

References

https://www.w3schools.com/java/java_intro.asp

 
Do you need a similar assignment done for you from scratch? Order now!
Use Discount Code "Newclient" for a 15% Discount!

CITA 110 Homework Help

CITA 110 Homework Help

We go on location to photograph both teams and individual player portraits on playing fields or at schools. We capture athletes enjoying their sport in natural light—doing what they love—and provide a lasting memory to treasure with a team photo, individual portrait, or Photo CD.

Some of the sports we photograph include football, baseball, soccer, volleyball, swimming, water polo, cheerleading, spirit teams, ice skating, and karate. We offer a unique selection of popular add-ons to our sports packages, including: (CITA 110 Homework Help)

Photo CD with action shots

Photo mugs, water bottles, travel mugs

Photo t-shirts, sweatshirts, hoodies

Team up with Light Magic Studios for your next fundraiser:

The video presentation below provides an overview of our catalog of products and fundraising opportunities for your sports team. For additional information about how we can team up with your organization, feel free to contact us at webmaster@lightmagicstudios.com or call us at (212) 555-0433 during the following days and times:

Monday-Wednesday 9 a.m. to 5 p.m.

Thursday 9 a.m. to 2 p.m.

Friday 10 a.m. to 2 p.m.

cita homework/ch 12/AIO16WDCH12GRADER12FAS_-_Fundraiser_11_Instructions.docx

Grader – Instructions Word 2016 Project ((CITA 110 Homework Help))

AIO16_WD_CH12_GRADER_12F_AS – Fundraiser 1.1

 

Project Description:

In the following project, you will edit a handout that describes fundraising opportunities available with Light Magic Studios. (CITA 110 Homework Help)

 

Steps to Perform:

Step Instructions Points Possible
1 Start Word. Download and open the file named aio16_wd_ch12_grader_12f_as.docx. 0
2 Insert the File Name in the footer. 6
3 Change the Line Spacing for the entire document to 1.5. 10
4 Center the document title, Light Magic Studios, and then change the title Font Size to 24. 11
5 Change the top and bottom margins to 0.5. 6
6 Select the three paragraphs below the title and then apply a First line indent. 10
7 Select the entire document and then change the Spacing Before to 6 pt and the Spacing After to 6 pt. 6
8 Select the three paragraphs containing the photo options beginning with Small Size Add-ons. Apply filled square bullets. With the bulleted list selected, set a right tab with dot leaders at 6”. 11
9 Locate the paragraph that begins with Light Magic Studios can provide. Click at the end of the paragraph (after the colon) and press ENTER. Remove the first line indent from the new paragraph. Starting in the blank line that you inserted, create a numbered list with the following three numbered items: Earn 5% off of every order Free preview photos Photo packages and add-ons 11
10 Position the insertion point after the period at the end of the document. Insert a SmartArt from the Process category—in the second to last row, the first layout—Equation. Select the outside border of the SmartArt, and then change the Height of the SmartArt to 1 and the Width to 6.5. 11
11 With the SmartArt selected, change the layout to Square, the Horizontal Alignment to Centered relative to the page, and the Vertical Alignment to Bottom relative to the Margin. 6
12 In the first circle, type Quality and in the second circle, type Service In the third circle type Light Magic 6
13 Change the SmartArt color to Colorful Range – Accent Colors 4 to 5. Apply the 3-D Polished style—under 3D, in the first row, the first style. 6
14 Click at the end of the paragraph below the title. Press ENTER, remove the first line indent, and then center the blank line. Insert an Online Video. In the YouTube search box, including the quotations marks, type “GO Word Chapter 1 A2 Grader project” and then insert the video of the street band (its title is Light Magic A2 Video – Go Word Ch01 A2). Change the height of the video to 1.5. Note, Mac users will need to insert the downloaded video file Light Magic A2 Video – Go Word Ch01 A2.mp4. 0
15 Save and close the document. Exit Word. Submit the file as directed. 0
Total Points 100

Created On: 07/05/2019 1 AIO16_WD_CH12_GRADER_12F_AS – Fundraiser 1.1

cita homework/ch 12/AIO16WDCH12GRADER12GAS_-_Sports_Photography_17_Instructions.docx

Grader – Instructions Word 2016 Project

AIO16_WD_CH12_GRADER_12G_AS – Sports Photography 1.7 (CITA 110 Homework Help)

 

Project Description:

In the following project, you will edit a handout that describes sports photography services offered by Light Magic Studios. (CITA 110 Homework Help)

 

Steps to Perform:

Step Instructions Points Possible
1 Start Word. Download and open the file named aio16_wd_ch12_grader_12g_as.docx. Ensure that the Office theme is applied to the document. 0
2 Type Sports and Team Photography and then press ENTER. Type Light Magic Studios is a full service photography studio. Press SPACEBAR after the period. Insert the text from the grader data file aio12G_Teams.docx. 4
3 Change the Line Spacing for the entire document to 1.5 and the spacing After to 6 pt. Apply a First line indent of 0.5” to each of the four paragraphs that begin Light Magic StudiosSome of the sportsTeam up with, and The video presentation. 6
4 Change the title font size to 50 and the title Line Spacing to 1.0. Center the title. From the Text Effects and Typography gallery, apply the second effect to the title—Fill: Blue, Accent color 1; Shadow. Note, depending on the version of Office you are using, the effect may be called Fill – Blue, Accent 1, Shadow. 10
5 At the beginning of the paragraph below the title, insert the picture downloaded with your grader files—aio12G_Swim.jpg. Change the picture Height to 1.75, and the Layout Options to Square. Format the picture with a 10 Point Soft Edges effect. 8
6 Use the Position command to display the Layout dialog box. Change the picture position so that the Horizontal Alignment is Right relative to the Margin. Change the Vertical Alignment to Top relative to the Line. 4
7 Select the three paragraphs beginning with Photo CD and ending with Photo t-shirts, and then apply checkmark bullets. 5
8 Locate the paragraph that begins Team up with Light Magic and then click after the colon. Press ENTER and remove the first line indent. Type a numbered list using the format 1.2.3. with the following three numbered items: Earn 5% off of every order Individual photos on CD Free team portrait included 6
9 With the insertion point located at the end of the numbered list, insert a Basic Chevron Process SmartArt. In the first shape, type Selection. In the second shape, type Service and in the third shape type Quality. Select the outside border of the SmartArt. Change the SmartArt color to Colorful Range – Accent Colors 5 to 6, and then apply the 3-D Cartoon style. 9
10 Change the Height of the SmartArt to 1.75 and the Width to 6.5. Change the layout options to Square, and then change the position of the SmartArt so that the Horizontal Alignment is Centered relative to the Page and the Vertical Alignment is set to Bottom relative to the Margin. 8
11 Select the days and times at the end of the document and then set a Right tab with dot leaders at 6”. 4
12 Click in the blank line below the tabbed list, and then click Center. Insert an Online Video. Including the quotations marks, search YouTube for “Go 2013 Light Magic”, and then insert the first video that displays. Change the height of the video to 1. Note, Mac users, insert a hyperlink to an online video using the search phrase “Go 2013 Light Magic”. 2
13 Below the video, insert a Rectangle: Rounded Corners shape. Note, depending on the version of Office you are using, the shape name may be Rounded Rectangle. Change the Shape Height to 1.5 and the Shape Width to 6.5. Display the Shape Styles gallery and in the second row, apply the sixth style— Colored Fill – Blue, Accent 5. 10
14 Use the Position command to display the Layout dialog box, and then change the position so that both the Horizontal and Vertical Alignment of the shape are Centered relative to the Margin. 4
15 In the rectangle, type Light Magic Studios and then press ENTER. Type Capturing Your Memories! and then change the font size to 24. 2
16 Move to the top of the document and insert a Text Box above the title. Change the Height of the text box to 0.5 and the width to 3.6. Type Light Magic Studios and then change the font size to 22. Center the text. 6
17 Use the Position command to display the Layout dialog box, and then position the text box so that the Horizontal Alignment is Centered relative to the Page and the Vertical Absolute position is 0.5 below the Page. 2
18 Change the text box Shape Fill color to Blue, Accent 5, Lighter 80%. Change the Shape Outline to the same color—Blue, Accent 5, Lighter 80%. 4
19 Apply a Box setting page border and choose the first style. Change the Color to Blue, Accent 5. Insert the File Name field in the left section of the footer. Reapply the Office theme, if necessary. 6
20 Save and close the document. Exit Word. Submit the file as directed. 0
Total Points 100

Created On: 07/05/2019 1 AIO16_WD_CH12_GRADER_12G_AS – Sports Photography 1.7 (CITA 110 Homework Help)

cita homework/ch 12/Light Magic A2 Video – Go Word Ch01 A2.mp4

cita homework/ch 12/Nolan_aio16_wd_ch12_grader_12f_as.docx

LIGHT MAGIC STUDIOS

Light Magic Studios is a full service photography studio. Celebrating over 15 years of service, our studio specializes in high quality family and individual portraits, weddings, special occasion photography, as well as school, sport, and group photo packages. The following video provides additional information: (CITA 110 Homework Help)

Light Magic Studios can provide a valuable service for parents, while earning profits for your school or organization. Some of the benefits and features of fundraising with our studio include:

We can provide a number of add-ons to your photo package to add value and exponentially increase the amount of money you can earn for your school, sport, club, or organization. The following is a list of some of our extra options for your photos: (CITA 110 Homework Help)

Small Size Add-ons Key chains, luggage tags, buttons

Apparel Photo t-shirts, sweatshirts, hoodies

Papers Stationary, invitations, thank you cards

For a list of all of our products and services visit our website at www.lightmagicstudios.com or call us at (212) 555-0433. (CITA 110 Homework Help)

cita homework/ch 12/Nolan_aio16_wd_ch12_grader_12g_as.docx

cita homework/ch 12/Read me.txt

This folder contains 2 Assignments click on AI0 file and the intructions are there for you after finishing the assaignment, just send each Nolan_ai0 file in the homeowork market website (CITA 110 Homework Help)

cita homework/ch 14 (4 assignments)/AIO16WDCH14GRADER14EAS_-_Hazard_Report_12_Instructions.docx

Grader – Instructions Word 2016 Project

AIO16_WD_CH14_GRADER_14E_AS – Hazard Report 1.2

 

Project Description:

In this project, you will edit and format a research paper for Memphis Primary Materials on the topic of hazardous materials in electronic waste. To accomplish this, you will insert footnotes, create citations, and create and format a bibliography.

(CITA 110 Homework Help)

Steps to Perform:

Step Instructions Points Possible
1 Start Word. Download and open the file named aio16_wd_ch14_grader_14e_as.docx. 0
2 For all the text, change the line spacing to 2.0 and the spacing after to 0 pt. 5
3 At the top of the document, insert a new blank paragraph, click in the new blank paragraph, and then by pressing ENTER, type the following four lines: June Whitlock Henry Miller Marketing July 5, 2016 (press ENTER one time to create a new blank paragraph) 5
4 In the new blank paragraph, type Hazardous Materials Found in E-Waste 5
5 Center the title Hazardous Materials Found in E-Waste 5
6 Insert a header, type Whitlock and then press SPACEBAR one time. Insert a page number in the current position using the Plain Number Style. Note, Mac users, to insert the page number, click the Field button, then in the Field dialog box, click Numbering on the left, and then click Page on the right. 5
7 Apply Align Right formatting to the header. 5
8 Apply a first line indent of 0.5 inches to the paragraph that begins Most people in the United States. 5
9 On Page 1, in the paragraph that begins One material, in the second line, click to position the insertion point to the right of period following lead, and then insert the footnote In 2009 the U.S. government required that all television signals be transmitted in digital format resulting in many discarded TV sets. Be sure to type the period at the end of the footnote. 5
10 Modify the Footnote Text style so that the Font Size is 11, there is a first line indent of 0.5”, and the spacing is Double. 8
11 On Page 1, in the paragraph that begins Toxic effects, in the third line, click to the left of the period following learning, and then using MLA format, insert a citation for a Journal Article using the following information: Author: Robinson, Eliot Title: EPA May Allow More Lead in Gasoline Journal Name: Science Year: 1982 Pages: 1375-1377 Medium: Print Note, Mac users, do not add a value for Medium. 10
12 Update the Robinson citation to include 1375-1377 as the page numbers. 5
13 On Page 2, at the end of the paragraph that begins Cadmium is another, click to the left of the period, and then insert a citation for a book with a Corporate Author using the following information: Corporate Author: American Cancer Society Title: Cancer Source Book for Nurses, Eighth Edition Year: 2004 City: Sudbury, MA Publisher: Jones and Bartlett Publishers, Inc. Medium: Print Note, Mac users, do not add a value for Medium. 10
14 Update the American Cancer Society citation to include 291 as the page number. 2
15 At the end of the document, insert a manual page break. 4
16 On the new Page 3, display the Paragraph dialog box, and then change the Indentation under Special to (none). 5
17 Insert a built-in Works Cited MLA style bibliography. 8
18 Select all the references in the bibliography, apply Double line spacing, and then set the spacing after to 0 pt. Center the Works Cited title. 8
19 Save and close the document. Close Word. Submit the document as directed. 0
Total Points 100

Created On: 07/05/2019 1 AIO16_WD_CH14_GRADER_14E_AS – Hazard Report 1.2

(CITA 110 Homework Help)

cita homework/ch 14 (4 assignments)/AIO16WDCH14GRADER14EHW_-_Skin_Protection_15_Instructions.docx

Grader – Instructions Word 2016 Project

AIO16_WD_CH14_GRADER_14E_HW – Skin Protection 1.5

 

Project Description:

In this project, you will edit and format a research paper for University Medical Center on the topic of skin protection. To accomplish this, you will insert footnotes, create citations, and create and format a bibliography.

(CITA 110 Homework Help)

Steps to Perform:

Step Instructions Points Possible
1 Start Word. Download and open the file named aio16_wd_ch14_grader_14e_hw.docx. 0
2 For all the text, change the line spacing to 2.0 and the spacing after to 0. 5
3 At the top of the document, insert a new blank paragraph, click in the new blank paragraph, and then by pressing ENTER after each line, type the following four lines: Rachel Holder Dr. Hillary Kim Dermatology 544 August 31, 2016 (press ENTER one time to create a new blank paragraph) 5
4 In the new blank paragraph, type Skin Protection 3
5 Center the title Skin Protection 3
6 Insert a header, type Holder and then press SPACEBAR one time. Insert a page number in the current position using the Plain Number Style. 0
7 Apply Align Right formatting to the header. 0
8 Apply a first line indent of 0.5 inches to the paragraph that begins One way to prevent. 6
9 In the paragraph that begins In the medical field, immediately following the period at the end of the paragraph, insert the footnote The American Academy of Dermatology recommends using a broad spectrum sunscreen with an SPF of 30 or more. Be sure to type the period at the end of the footnote. 6
10 Modify the Footnote Text style so that the Font Size is 11, there is a first line indent of 0.5”, and the spacing is Double. 10
11 On Page 1, at the end of the paragraph that begins According to an article, click to the left of the period, and then using MLA format, insert a citation for a Journal Article using the following information: Author: Brash, D. E. Title: Sunlight and Sunburn in Human Skin Cancer Journal Name: The Journal of Investigative Dermatology Year: 1996 Pages: 136-142 Medium: Print 11
12 Update the Brash citation you just created to include 136-142 as the page numbers. 4
13 On Page 2, at the end of the paragraph that begins According to Dr. Lawrence, click to the left of the period, and then insert a citation for a Web site using the following information: Author: Gibson, Lawrence E. Name of the Web Page: Does Sunscreen Expire? Year: 2011 Month: April Day: 01 Year Accessed: 2016 Month Accessed: June Day Accessed: 30 Medium: Web 11
14 On Page 3, at the end of the last paragraph of the report, click to the left of the period, and then using MLA format insert a citation for a book using the following information: Author: Leffell, David. Title: Total Skin: The Definitive Guide to Whole Skin Care for Life Year: 2000 City: New York Publisher: Hyperion Medium: Print 8
15 Update the Leffell citation to include 96 as the page number. 5
16 At the end of the document, insert a manual page break. 5
17 On the new Page 4, display the Paragraph dialog box, and then change the Indentation under Special to (none). 5
18 At the top of Page 4, insert a built-in Works Cited bibliography using the MLA style. 5
19 Select all the references in the bibliography, apply Double line spacing, and then set the spacing after to 0 pt. Center the Works Cited title. 8
20 Save and close the document. Close Word. Submit the document as directed. 0
Total Points 100

Created On: 07/05/2019 1 AIO16_WD_CH14_GRADER_14E_HW – Skin Protection 1.5

(CITA 110 Homework Help)

cita homework/ch 14 (4 assignments)/AIO16WDCH14GRADER14FAS_-_Recycling_Newsletter_13_Instructions.docx

Grader – Instructions Word 2016 Project

AIO16_WD_CH14_GRADER_14F_AS – Recycling Newsletter 1.3

 

Project Description:

In the following project, you will format a newsletter by inserting pictures and screenshots, applying two-column formatting, and adding a border to a paragraph.

(CITA 110 Homework Help)

Steps to Perform:

Step Instructions Points Possible
1 Start Word. Download and open the file named aio16_wd_ch14_grader_14f_as.docx. 0
2 Change the font color of the first three lines to Blue, Accent 1. Apply a 3 pt bottom border in Black, Text 1 to the third paragraph. 16
3 Press CTRL+HOME. Use Online Pictures to search for an image using the term recycle lights and then insert an appropriate image from the results. Note, Mac users, search for an image in a web browser, and then download and insert a relevant image from the results. Change the Brightness/Contrast to Brightness – 40% Contrast +40%. Apply a 1 pt, Black, Text 1 border to the picture. Change the Text Wrapping to Square. Change the Horizontal Alignment to Left relative to Margin and the Vertical Alignment to Top relative to Margin. Change the width of the picture to 1.05″, if necessary. 12
4 Starting with the paragraph CARE Enough to Recycle, select all of the text from that point to the end of the document. Change the Spacing After to 10 pt. Format the selected text in two columns, and apply Justify alignment. Click at the beginning of the paragraph that begins This initiative creates, and then insert a Column break. 20
5 Click at the beginning of the sentence that begins with In 2006, the Environmental. Use Online Pictures to search for an image using the term refrigerator household appliance and then insert an appropriate image from the results. Note, Mac users, search for an image in a web browser, and then download and insert a relevant image from the results. Rotate the picture using Flip Horizontal and change the picture height to 1″. Change the wrapping style of the picture to Square. Change the Horizontal Alignment to Left relative to Margin and the Vertical Alignment to Top relative to Line. 12
6 Start Internet Explorer and ensure that window is maximized. Navigate to www.epa.gov/ozone/title6/608/disposal/. Display your aio16_wd_ch14_grader_14f_as.docx file, click at the end of the last line of text in the second column, and then press ENTER. Insert a screenshot of the website. Do not link the screenshot to the URL. Apply a Black, Text 1 Picture Border and change the weight to 1 pt. 12
7 Select the subheading CARE Enough to Recycle including the paragraph mark. Use the Font dialog box to change the Size to 14, to apply Bold and Small Caps, and to change the Font color to Dark Blue, Text 2. Apply the same formatting to the subheadings Hazards of Old Home Appliances, and What We Are Doing. 16
8 Select the last paragraph in the newsletter, and then apply a 1 pt Shadow border, in Black, Text 1. Change the Fill color to Blue, Accent 1, Lighter 80%. 12
9 Save and close the aio16_wd_ch14_grader_14f_as.docx document. Exit Word. Submit the aio16_wd_ch14_grader_14f_as.docx document as directed. 0
Total Points 100

Created On: 07/05/2019 1 AIO16_WD_CH14_GRADER_14F_AS – Recycling Newsletter 1.3

cita homework/ch 14 (4 assignments)/AIO16WDCH14GRADER14FHW_-_Dogs_Newsletter_13_Instructions.docx

Grader – Instructions Word 2016 Project

AIO16_WD_CH14_GRADER_14F_HW – Dogs Newsletter 1.3

(CITA 110 Homework Help)

Project Description:

In the following project, you will format a newsletter by inserting pictures and screenshots, applying two-column formatting, and adding a border to a paragraph.

 

Steps to Perform:

Step Instructions Points Possible
1 Start Word. Download and open the file named aio16_wd_ch14_grader_14f_hw.docx. 0
2 Change the font color of the first three lines to Olive Green, Accent 3, Darker 25%. Apply a 3 pt bottom border in Black, Text 1. 13
3 Press CTRL+HOME. Use Online Pictures to search for an image using the term physician symbols and then insert an appropriate image from the results. Alternatively, search for an image in a web browser, and then download and insert a relevant image from the results. Set the image Height to 1″. Change the Brightness/Contrast to Brightness 0% (Normal) Contrast +40%. Change the Text Wrapping to Square. Change the Horizontal Alignment of the image to Left relative to Margin and the Vertical Alignment to Top relative to Margin. 12
4 Starting with the paragraph Dogs for Healing, select all of the text from that point to the end of the document. Change the Spacing After to 10 pt. Format the selected text in two columns, and apply Justify alignment. Insert a Column break before the subheading Cuddles. 13
5 Click at the beginning of the sentence that begins with Brandy is a 6-year-old Beagle. From the files downloaded with this project, insert the picture w014F_Dog.jpg. Rotate the picture using Flip Horizontal. Change the width of the picture to 1″. 13
6 Change the wrapping style of the picture to Square. Change the Horizontal Alignment to Right relative to Margin and the Vertical Alignment to Top relative to Line. Apply a Black, Text 1 Picture Border and change the weight to 2 1/4 pt. Save your file. 13
7 Start your web browser and ensure that the window is maximized. Navigate to www.ada.gov/qasrvc.htm. If the website is not available, choose another page on the www.ada.gov site. Display your aio16_wd_ch14_grader_14f_hw.docx file, click at the end of the paragraph below the Dogs for Healing subheading, and then insert a screenshot of the website. Apply a Black, Text 1 Picture Border and change the weight to 1 pt. 12
8 Select the subheading Dogs for Healing including the paragraph mark. Use the Font dialog box to change the Size to 16, to apply Bold and Small Caps, and to change the Font color to Olive Green, Accent 3, Darker 50%. Apply the same formatting to the subheadings Benefits to PatientsCuddles, and Brandy. 12
9 Select the last paragraph in the newsletter including the paragraph mark, and then apply a 1 pt Shadow border, in Black, Text 1. Shade the paragraph by changing the Fill color to Olive Green, Accent 3, Lighter 80%. 12
10 Save and close the document. Close all other documents without saving the changes. Exit Word. Submit the aio16_wd_ch14_grader_14f_hw.docx document as directed. 0
Total Points 100

Created On: 07/05/2019 1 AIO16_WD_CH14_GRADER_14F_HW – Dogs Newsletter 1.3

(CITA 110 Homework Help)

cita homework/ch 14 (4 assignments)/Nolan_aio16_wd_ch14_grader_14e_as.docx

Most people in the United States are now aware that disposing of electronic equipment by traditional methods—such as dumping in landfills—is harmful to the environment. It is intuitive to people that placing large items that will never completely break down in landfills is a wasteful use of land, but the reasons for special treatment of electronic waste go beyond that. Electronics contain hazardous materials that can harm the planet if placed untreated in landfills. Also, many electronic devices contain valuable materials that can be reused, thereby conserving natural resources.

One material that is hazardous is lead. Televisions and old CRT computer monitors contain varying amounts of lead. Due to its characteristics and ease of use, lead has been used since ancient times to make pottery, build ships, act as weights, and construct pipes. Lead has also been used in gasoline, batteries, paint, crystal, and insecticides. Lead, however, is also poisonous. As awareness of its side effects grew and the public began expressing concerns about its widespread use, in the 1970s the U.S. government began restricting its use. However, lead continues to be a leading environmental health risk for children in the U.S.

Toxic effects of lead on children are well documented. Research in the last few decades shows quite convincingly that there is a relationship between the amount of lead a child ingests and problems in thinking and learning. Furthermore, this sort of poisoning appears to be caused by what had been considered “safe” levels of lead exposure. Even very low levels of exposure to lead may cause significant damage to learning ability.

Cadmium is another toxic product found in electronic equipment, especially in the nickel and cadmium (Ni-Cd) batteries used in many portable electronic devices.[footnoteRef:1] In addition to causing lung and liver damage, cadmium is a human carcinogen. For example, occupational and environmental risk factors for renal cancer include exposure to cadmium. [1: Newer lithium batteries are not considered hazardous waste if they are fully discharged prior to disposal.]

Mercury is found in fluorescent lamps and computer circuit boards as well as many scientific instruments. Occupational exposure to mercury can result in a number of toxic effects on humans, such as personality disorders, insomnia, fatigue, tremors, and muscle spasms.

Using modern electronic waste processing methods, most electronic waste can be rendered harmless or reused.

Businesses must find a way to insure that unwanted electronics are disposed of in a way that will minimize toxins in the environment, and need to be sure to work with waste processing facilities that follow all applicable laws and regulations in order to maximize worker safety and minimize release of toxins.

cita homework/ch 14 (4 assignments)/Nolan_aio16_wd_ch14_grader_14e_hw.docx

One way to prevent skin cancer, sunburn, and skin damage is to completely avoid the sun. Most individuals, however, will not resign themselves to living in a dark cave, so they seek more practical ways to protect themselves through the proper use of sunscreens, sunblocks, and protective clothing.

According to an article in The Journal of Investigative Dermatology, everyone is exposed to the carcinogen sunlight. Epidemiology—all the factors that control the presence or absence of a disease or pathogen—indicates that the exposure to carcinogenic sunlight can take place several decades before a tumor arises.

Most sunburns and skin cancers are caused by UVB radiation. UVA rays can also contribute to skin cancer, as well as causing skin aging and wrinkles. Both UVB and UVA rays should be avoided at all costs. Sunblocks are creams, sprays, or lotions that reflect the sun’s rays. Sunscreens are chemical agents that absorb the sun rather than reflect it. Look for a good sunblock or sunscreen that promises to block both UVA and UVB rays and that has an SPF—sun protection factor—of a level of fifteen or higher. The sunblock zinc oxide offers the strongest protection against both UVA and UVB rays. Titanium dioxide is a type of zinc oxide that is more commonly found in many quality products.

For users of a sunblock or sunscreen, SPF should be taken into consideration. SPF is often confused with the protective strength of the product, but SPF is actually a measure of the amount of time one can expose one’s skin to the sun while using the product before the sun will burn the skin. For example, a sunscreen or sunblock with an SPF of 25 means that it will take 25 times longer for your skin to burn while using the product than it would without the product.

According to Dr. Lawrence E. Gibson, a dermatologist at the Mayo Clinic, sunscreens have an expiration date. Most sunscreens are designed to remain effective for up to three years. A sunscreen past its expiration date should be discarded. Additionally, sunscreen that has been exposed to very high temperatures for any length of time should be discarded.

An appropriate amount of sunscreen to use is 1 ounce (30 milliliters)—the equivalent of a shot glass. This should be used to cover all exposed parts of the body. That means that for a 4-ounce (118-milliliter) bottle, one-fourth of it will be gone after only one application. Sunscreen should be applied thirty minutes before going outside and reapplied every two hours—more if an individual has been swimming or sweating excessively.

Individuals should protect their skin while they are young. Studies indicate that 85 percent of lifetime sun exposure is acquired by the age of 18. Chronic repeated sun exposure can lead to the genetic changes which could cause skin cancer, so it is critical that children develop good habits regarding sunscreen at an early age. Additionally, infants under six months old should be kept out of direct sunlight at all times, because their skin is exceptionally sensitive to any of the rays of the sun.[footnoteRef:1] [1: For babies, the American Academy of Dermatology recommends using a sunscreen that contains only inorganic filters, such as zinc oxide and titanium dioxide, to avoid any skin or eye irritation.]

In the medical field, dermatologists and their societies recommend the use of sunscreen coupled with avoidance of midday sun, wearing protective clothing, and regular application of a sunblock with a sun protection factor of 15 to 30. The sunblock should have both UVB and UVA coverage.

Another way to prevent sunburn, in addition to sunscreen, is by wearing protective clothing. A broad brimmed hat is a great way to protect one’s face and head from sunburn. Additionally, long- sleeved shirts and pants may offer some protection from the sun’s harmful rays.

When educating patients and youngsters about how best to protect themselves from overexposure to the sun, the best advice is to be prepared before planning a day in the sun. Heed weather reports and the listings of the UV index. These reports warn of the estimated time that ultraviolet rays are at their peak during the day. Avoiding the sun during these times and staying out of the sun during the peak hours from 10 a.m. to 4 p.m. is good practice.

Because the effect of the sun’s rays does not appear until several hours after exposure, one cannot notice if he or she is getting sunburn. The full effect of sunburn is usually not felt until eighteen hours after the exposure.

(CITA 110 Homework Help)

cita homework/ch 14 (4 assignments)/Nolan_aio16_wd_ch14_grader_14f_as.docx

Memphis Primary Materials

Recycling Newsletter

Volume 1, Number 3 March 2016

CARE Enough to Recycle

Carpet America Recovery Effort (CARE) is a joint effort between the carpet industry and the US Government to reduce the amount of carpet and padding being disposed of in landfills. Billions of pounds of carpet are disposed of each year.

Fortunately, carpet and padding can be recycled into new padding fiber, home accessories, erosion control products, and construction products. The CARE initiative combines the resources of manufacturers and local governments to find new ideas for old carpet and to overcome barriers to recycling.

For information on companies participating in the program and to find out if you are near a carpet reclamation center, please visit http://www.carpetrecovery.org

Hazards of Old Home Appliances

In 2006, the Environmental Protection Agency created a voluntary partnership effort to recover ozone-depleting materials from appliances like old refrigerators, freezers, air conditioners, and humidifiers. The program outlines best practices for recovering or destroying refrigerant and foam, recycling metals, plastic, and glass, and proper disposal of hazards like PCBs, oil, and mercury.

This initiative creates opportunities for for-profit companies like Memphis Primary Materials. We provide appliance recycling services to our business clients that include picking up old products, advising on the most energy-efficient new products, and processing discarded items for optimum safety and minimal environmental impact.

What We Are Doing

Memphis Primary Materials also completes the EPA RAD (Responsible Appliance Disposal) worksheet, which calculates how much energy usage and carbon-equivalent emissions were reduced as a result of their efforts. This information helps customers to determine how they can improve their energy-efficiency performance and have a positive impact on the environment.

For more information on the EPA programs for appliance recycling, see their Web site at http://www.epa.gov/ozone/title6.

cita homework/ch 14 (4 assignments)/Nolan_aio16_wd_ch14_grader_14f_hw.docx

University Medical Center

Health Improvement Newsletter

Volume 3 Spring 2016

Dogs for Healing

At University Medical Center, therapy dogs have been a welcomed asset to patient care and recovery since 2004. UMC works with several non-profit organizations to bring dedicated volunteers and their canine teams into the hospital to visit children, adults, and seniors. Information regarding service dog regulations, training, and laws is available on the ADA website.

Benefits to Patients

Medical research shows that petting a dog or other domestic animal relaxes patients and helps ease symptoms of stress from illness or from the hospital setting. Studies have shown that such therapies contribute to decreased blood pressure and heart rate, and can help with patient respiratory rate.

Cuddles

Cuddles, a 4 year-old Labrador, is one of our most popular therapy dogs and is loved by both young and senior patients. You’ll see Cuddles in the Children’s wing on Mondays with his owner, Jason, who trained him since he was a tiny pup.

Brandy

Brandy is a 6-year-old Beagle who brings smiles and giggles to everyone she meets. Over the past several years, Brandy has received accolades and awards for her service as a therapy dog. Brandy is owned by Melinda Sparks, a 17-year veteran employee of University Medical Center. Brandy and Melinda can be seen making the rounds on Wednesdays in the Children’s wing and on Mondays and Fridays.

To request a visit from a therapy dog, or to learn how to become involved with therapy dog training, call Carole Yates at extension 2365.

(CITA 110 Homework Help)

cita homework/ch 14 (4 assignments)/w014F_Dog.jpg

cita homework/ch 15 Assignments (2 Assignments)/AIO16XLCH15GRADER15EHW_-_Gym_Sales_12_Instructions.docx

Grader – Instructions Excel 2016 Project

AIO16_XL_CH15_GRADER_15E_HW – Gym Sales 1.2

(CITA 110 Homework Help)

Project Description:

In the following project, you will create a worksheet comparing the sales of different types of home gym equipment sold in the second quarter.

 

Steps to Perform:

Step Instructions Points Possible
1 Start Excel. Download and open the file named aio16_xl_ch15_grader_15e_hw.xlsx. 0
2 Change the worksheet theme to Wisp. 4
3 Use the fill handle to enter the months May and June in the range C3:D3. 6
4 Merge & Center the title across A1:F1, and then apply the Title cell style. Merge & Center the subtitle across A2:F2, and then apply the Heading 1 style. Center the column titles in the range B3:F3. 10
5 Widen column A to 180 pixels, and then widen columns B:F to 115 pixels. Note, Mac users will need to set column A to a width of 21.88 and columns B:F to a width of 13.83. In the range B7:D7, enter the following values: 137727.85, 121691.64, and 128964.64. 10
6 In cell B8, use the AutoSum button to sum the April sales. Fill the formula across to cells C8:D8. In cell E4, use the AutoSum button to sum the Basic Home Gym sales. Fill the formula down to cells E4:E8. 10
7 Apply the Heading 4 cell style to the row titles and column titles, and then apply the Total cell style to the totals in the range B8:E8. 6
8 Apply the Accounting Number Format to the first row of sales figures and to the total row. Apply the Comma Style to the remaining sales figures. 6
9 Select the range that represents the sales figures for the three months, including the month names and the product names—do not include any totals in the range. With this data selected, use the Recommended Charts command to insert a Clustered Column chart with the month names displayed on the category axis and the product names displayed in the legend. 10
10 Move the chart so that its upper left corner is positioned in the center of cell A10. Then drag the center right sizing handle to the right until the right edge of the chart aligns with the right edge of column E. 6
11 Apply Chart Style 6 and Color 2 under Colorful. Change the Chart Title to Second Quarter Home Gym Sales. 10
12 In the range F4:F7, insert Line sparklines that compare the monthly data. Do not include the totals. Show the sparkline Markers and apply Sparkline Style Accent 2, Darker 50%—in the first row, the second style. 10
13 Center the worksheet Horizontally on the page, and then insert a Footer with the File Name in the left section. 6
14 Change the Orientation to Landscape. 6
15 Save and close the document. Exit Excel. Submit the file as directed. 0
Total Points 100

Created On: 07/05/2019 1 AIO16_XL_CH15_GRADER_15E_HW – Gym Sales 1.2

(CITA 110 Homework Help)

cita homework/ch 15 Assignments (2 Assignments)/AIO16XLCH15GRADER15FAS_-_Dispenser_Sales_11_Instructions.docx

Grader – Instructions Excel 2016 Project

AIO16_XL_CH15_GRADER_15F_AS – Dispenser Sales 1.1

 

Project Description:

In the following project, you will create a worksheet summarizing the sales of Tabletop Dispenser equipment that Millstone Restaurant Supply is marketing.

 

Steps to Perform:

Step Instructions Points Possible
1 Start Excel. Download and open the file named aio16_xl_ch15_grader_15f_as.xlsx. 0
2 Merge and center the title and then the subtitle across columns A:F and apply the Title and Heading 1 cell styles respectively. 8
3 Check spelling in your worksheet, and correct Npkin to Napkin. Widen column A to 25 and columns B:F to 12.85. 8
4 In cell E4, construct a formula to calculate the Total Sales of the Condiment Rack by multiplying the Quantity Sold by the Retail Price. Copy the formula down for the remaining products. 12
5 Select the range E4:E10, and then use the Quick Analysis tool to sum the Total Sales for All Products, which will be formatted in bold. Note, Mac users, sum the Total Sales for All Products in cell E11 and apply bold. To the total in cell E11, apply the Total cell style. 10
6 Using absolute cell references as necessary so that you can copy the formula, in cell F4, construct a formula to calculate the Percent of Total Sales for the first product. Copy the formula down for the remaining products. 10
7 To the computed percentages, apply Percent Style with two decimal places, and then center the percentages. 8
8 Apply the Comma Style with no decimal places to the Quantity Sold figures. To cells D4, E4, and E11 apply the Accounting Number Format with two decimal places 4
9 To the range D5:E10, apply the Comma Style. 4
10 Change the Retail Price of the Artisan Rack to 29.95 and the Quantity Sold of the Cheese Shaker to 425. 4
11 Delete column B. 6
12 Insert a new row 3. In cell A3, type Month Ending March 31 and then merge and center the text across the range A3:E3. Apply the Heading 2 cell style. 10
13 To cell A12, apply the 20% – Accent1 cell style. 4
14 Select the four column titles. Apply Wrap Text, Middle Align, and Center formatting, and then apply the Heading 3 cell style. 8
15 Center the worksheet Horizontally on the page, and then insert the file name in the footer in the left section. Return the worksheet to Normal view, if necessary. 4
16 Save and close the workbook. Exit Excel. Submit the file as directed. 0

(CITA 110 Homework Help)

Total Points 100
 
Do you need a similar assignment done for you from scratch? Order now!
Use Discount Code "Newclient" for a 15% Discount!

Homework Help on Internet Programming QUIZ

Homework Help on Internet Programming QUIZ

1-MVC inspects the constructors of the objects it is preparing to inject and, if necessary, injects any objects needed by those objects in a process known as

core attribution
dependency chaining
coupling
dependency attribution

 

2-A controller that uses dependency injection to get a class that inherits the DbContext class is _____________ to EF.

idempotent
chained
loosely coupled
tightly coupled

 

3-To configure dependency injection, which method of the Startup.cs file should contain the code that maps the dependencies?

ConfigureServices()
the constructor
DependencyInject()
SingletonInject()

 

4-Which of the following is NOT a dependency life cycle (Homework Help on Internet Programming QUIZ )

injectable
transient
singleton
scoped

 

5-Which HTML elements does the following tag helper class apply to?

[HtmlTargetElement(“input”, ParentTag = “form”)]

public class MyInputTagHelper : TagHelper {…}

<my-input> elements coded within a form
<input> or <form> elements
<my-input> or <form> elements
<input> elements coded within a form

6-Which of the following is a tag helper element?

environment
asp-area
asp-controller
asp-action

7-Which of the following class declarations is for a custom tag helper for a standard HTML element?

public class ButtonTagHelper : StandardHtmlElement
public class ButtonTagHelper : TagHelper
public class StandardButtonTagHelper : HtmlElement
public class StandardButtonTagHelper : TagHelper

8-What does the following directive do?

@addTagHelper *, GuitarShop

 

It registers all tag helpers in the GuitarShop namespace.
It registers all tag helpers available from ASP.NET Core MVC.
It registers a tag helper named GuitarShop.
It registers a tag helper named *.

 

9-Which of the following is a good way to pass data to a view component?

By adding parameters to its Invoke() method
By using URL routing
By using its TempData property
By using a Razor code block

10-Given a Book object named book, which of the following passes the Book object as the model for the partial view named _BookLinkPartial?

<partial name=”BookLinkPartial.cshtml” model=”@book” />
<partial name=”_BookLinkPartial” model=”@book” />
<partial name=”BookLinkPartial.cshtml” viewData=”@book” />
<partial name=”_BookLinkPartial” viewData=”@book” />

11-A partial view typically contains _________________ that’s used by multiple views.

HTML and Razor code
view components
CSS
entity classes

12-Which of the following statements is true?

A view component sends data to a partial view.
A partial view acts as a controller for a view component.
A view component stores all of its code in a .cshtml file.
A partial view sends data to a view component.

(Homework Help on Internet Programming QUIZ)

 
Do you need a similar assignment done for you from scratch? Order now!
Use Discount Code "Newclient" for a 15% Discount!