Description
Around what time did the Internet come around and how did it all start? Would like to know more of the history of how the internet started - just a brief discussion will do.
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.
Explanation & Answer
Review
Review
Anonymous
Just what I was looking for! Super helpful.
Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4
24/7 Homework Help
Stuck on a homework question? Our verified tutors can answer all questions, from basic math to advanced rocket science!
Most Popular Content
Reliable Data Transport - Programing
In this programming assignment, you will write the sending and receiving transport-layer code for a simple reliable data t ...
Reliable Data Transport - Programing
In this programming assignment, you will write the sending and receiving transport-layer code for a simple reliable data transfer protocol. You will implement two different versions:Stop-and-Wait Protocol.Go-Back-N protocol.please use Java 7 or 8 and Netbeans 8.0.2 or later are the only requirementsthe description should be in well-written with clear references to the source code
CYB 6040 Wilmington University Week 2 OSINT & SCADA Systems Powerpoint
Week 2 Assignment: OSINT & SCADA Systems PowerPoint (TEAM)Download DHS National Infrastructure Protection Plan & see page ...
CYB 6040 Wilmington University Week 2 OSINT & SCADA Systems Powerpoint
Week 2 Assignment: OSINT & SCADA Systems PowerPoint (TEAM)Download DHS National Infrastructure Protection Plan & see page 19 (29/188) for 12 sectors at: LinkREAD Executive Summary. CIKR = Critical Infrastructure & Key ResourcesChoose ONE of 12 National Critical Infrastructure Sectors (NCIS) defined by DHS that uses SCADA systems (they all do) and document the 5 top SPECIFIC threats to that sector. See the CIS Interrelationships Figure uploaded previously to get an idea of the cyber and SCADA inter-dependencies. We are expanding our target vector space from SCADA networks (Assignment W1) to much large game, National Critical Infrastructure. (Assignment W2)Use: Link to clarify NCIS interrelationships. Provide a brief description of the threat, parties involved, and reason why the threat is one of the top five. Include any maps,diagrams, charts, etc. that would enhance the readers understanding of group, target, and/or attack. USE the RN equation format *** shown in the Week 1 individual assignment to present your case. In addition, Pick 3 OSINT sources that you used to develop your case. This would diminish confirmation bias in sources. Ideally, every threat team reviewed would have 1 or more OSINT source.This assignment should be a minimum 25-40 slides, BUT 50 slides would be better (including references in APA format to do justice).Philosophy note: Don't stick to the minimums. Students who think minimum performance generally settle for minimum salaries at job time. Think bigger. Get out of your comfort zone. A little extra goes a long way. Students in this class use their final team preparation as a point of differentiation on their resumes. It always starts a "warm conversation with recruiters." That is what you want - show your talent is better than others in the game. You are a Dragon / Dragoness and your training is much better! You can negotiate for more when the time comes and it will be worth your effort. The "others" will be sucking their thumbs as they watch you get the job First!All,Please proceed as follows:1. NCIS SectorKolawole Oyekanmi (XO) will select the NCIS Sector for the project.2. NCIS Sector Top 5 ThreatsKolawole Oyekanmi (XO) will determine what the top 5 threats are in order from the highest to lowest threat.3. NCIS Sector Threat Group Member AssignmentKolawole Oyekanmi (XO) will inform Panagou, Imassi, Muller, and Nguyen which particular threat to research.4. NCIS Sector Threat ResearchEach group member prepares the following for their assigned threat:NCIS Sector Threat:A. Threat DescriptionB. Parties InvolvedC. Why is it a top 5 threat to the chosen NCIS Sector?1. Vulnerabilities2. Impact3. CountermeasuresD. R/N Equation (based upon the vulnerabilities/impact/countermeasures)E. Include at least one figure (map, chart, etc.)F. One OSINT used in your research (Three OSINT for the top threat)G. List of ReferencesThe information does not have to be in any particular format. Just make sure that everything is included that is listed in number 4 above. 24-29THREAT 4Group Member. DescriptionParties InvolvedReason why top 5VulnerabilitiesImpactCountermeasuresAt least 1 figure (map, chart, etc)R/N Equation for threat
Server Technology - Apache versus Internet Information Services (IIS)
Apache versus Internet Information Services (IIS)Zeus Books is a local bookstore which doesn't have a strong knowledge of ...
Server Technology - Apache versus Internet Information Services (IIS)
Apache versus Internet Information Services (IIS)Zeus Books is a local bookstore which doesn't have a strong knowledge of server and web technology. Zeus Books has held out on having an ecommerce website but they understand that they will not be able to compete without a strong online presence. You've been hired by Zeus Books to be their consultant services on their endeavor to create and host an e-commerce website. Zeus Books requires more knowledge on web server technology.Based on your understanding of server and web technology, create a 2- to 3-page report in a Microsoft Word document showing a comparison and contrast between Apache versus Internet Information Services (IIS).Also include a diagram and description displaying how the end user interacts with the web server so that Zeus Books understands the technologies and terminology involved with a web server.Submission Details:Support your responses with examples.Cite any sources in APA format.
5 pages
Developing Erm Plan
1. From a management perspective, decide which key policies and procedures one should consider as the starting point when ...
Developing Erm Plan
1. From a management perspective, decide which key policies and procedures one should consider as the starting point when developing an ERM plan for
Java object-oriented GUI programming features, computer science homework help
605.201 Mini-Project 3:
Please do the following to complete this assignment.
Purpose:
The purpose of this project is to ...
Java object-oriented GUI programming features, computer science homework help
605.201 Mini-Project 3:
Please do the following to complete this assignment.
Purpose:
The purpose of this project is to provide non-trivial practice in the use of Java object-oriented GUI
programming features to implement an object-oriented GUI design and have a bit of fun doing it.
Resources Needed:
You will need a computer system with Java 7 or greater SE edition run-time and Java Development Kit
(JDK). You may optionally use a Java IDE for example NetBeans, Eclipse, etc. However application
builders are not allowed.
Submitted Files:
Design and Analysis:
This is an informal essay-style single-spaced word-processed document. The file formats accepted are
.odt, .doc, and .docx. The length of the document should be between 1 and 1.5 pages. The following
subjects should be discussed in this order:
1. General program design. How is the program organized? What major data structures were
used? How did you divide the functionality among your classes? How are commands
processed? Etc.
2. What alternative approaches were considered and why were they rejected?
3. What did you learn from doing this project and what would you do differently?
Source files:
Each public class must be contained in a separate Java source file. Only one source file will have a
main() method and this source will be named SongDatabase.java. Other source/class names are up to
you following the guidelines specified so far in the course.
The format of the Java source must meet the general Java coding style guidelines discussed so far
during the course. Pay special attention to naming guidelines, use of appropriate variable names and
types, variable scope (public, private, protected, etc.), indentation, and comments. Classes and
methods should be commented with JavaDoc-style comments (see below). Please use course office
hours or contact the instructor directly if there are any coding style questions.
JavaDocs:
Sources should be commented using JavaDoc-style comments for classes and methods. Each class
should have a short comment on what it represents and use the @author annotation. Methods should
have a short (usually 1 short sentence) description of what the results are of calling it. Parameters and
returns should be documented with the @param and @return annotations respectively with a short
comment on each.
JavaDocs must be generated against every project Java source file. They should be generated with a
-private option (to document all protection-level classes) and a –d [dir] option to place the resulting
files in a javadocs directory/folder at the same level as your source files. See the JavaDocs
demonstration for more details.
Submit file:
The submit file is to be a Zip file containing your design and analysis document, your Java sources, and
your javadocs directory/folder. Any appropriate file name for this Zip file is acceptable.
If you know how to create a standard Java JAR file, this is also acceptable for your source code.
However, make sure you include the source code in your JAR file.
Collaboration:
It is encouraged to discuss technical or small design parts of this project with your fellow students.
However the resulting design and implementation must be your own. For example, it is acceptable to
discuss different ways of maintaining the system state but not detailed design or implementation
information on processing the purchase command. When in doubt, ask during office hours or contact
your instructor.
Program Specification:
This project involves implementing a Java program that builds and manages a database of songs using
a GUI-based user interface.
The application will consist of a single frame that allows a user to add, edit, or delete songs from the
database. Here’s a rough prototype for what the frame might look like. Yours doesn’t have to look
exactly like this…the prototype is provided just to help you envision the ultimate application.
The application shall work as follows:
1. Upon start-up, the application will read the database file. The path of the database file will be
supplied by a run-time parameter. If the database file does not exist, the user will be told the
database does not exist and prompted (non-GUI text prompt) asking if they want to create a new
one. If the user answers positive, the application will continue with an initially empty song
database. If the user answers negatively, the application will exit. An example of an appropriate
start-up command is as follows:
java SongDB mySongDB.data
2. The original state of the frame shall display the combo box with the first song in the database
selected. The Item Code, Description, Artist, Album, and Price fields for this item shall be
displayed with the fields disabled (non-editable). The Add, Edit, Delete, and Exit buttons shall be
enabled, and the Accept and Cancel buttons shall be disabled.
3. To add a song, the user clicks on the Add button. This will cause the application to clear and enable
the Item Code, Description, Artist, Album, and Price fields so the user can enter information for the
new song. The Edit and Delete buttons are also disabled, and the Accept and Cancel buttons are
enabled. When the user presses the Accept button, the new song will be added to the database and
combo box. If the user presses the Cancel button, the entry transaction is canceled and the frame
reverts to its original state.
4. To edit an existing song, the user shall select the song from the combo box. The information for the
selected song shall then be displayed in the disabled fields. The user then presses the Edit button,
which enables the Description, Artist, and Price fields. The user may not change the Item Code.
Select Song: Yellow Submarine
Item Code: BT012
Description: Yellow Submarine
Artist: The Beatles
Album: Beatles Greatest Hits 1
Price: 1.99
Add Edit Delete Accept Cancel
Exit
The Add, Edit, and Delete buttons are disabled, and the Accept and Cancel buttons are enabled. If
the user presses the Accept button, the changes are saved and the combo box is updated. If the user
presses the Cancel button, the edit transaction is canceled and the frame reverts to its original state.
5. To delete an existing song, the user shall select the song from the combo box. The information for
the song shall then be displayed in the disabled fields. If the user presses the Delete button, the song
is deleted from the database and the combo box.
6. When the user presses the Exit button the application shall terminate. The current state of the
database shall be saved in a file using the pathname supplied at program start-up (see above).
7. Data fields shall be validated to ensure they are not blank with appropriate error messages
displayed. If the song is a single, the text “None” will be used for the album name. The price field
shall be validated to ensure only numeric data is entered.
Other Activates:
1. Create a compressed zipped folder containing your Design and Analysis document, your Java
source code files, and your javadocs folder.
2. Submit your compressed zipped folder as directed by your instructor.
Assignment Rubric:
Part 70% 80% 90% 100% % of
Grade
Design and
Analysis
Document
All but one subject
addressed with
relevant,
information. Few
minor
typographical
issues. Document
is close to assigned
length
All assigned
subjects address
with mostly
relevant
information.
Nicely formatted
document.
Document is
close to assigned
length
All assigned subjects
address with
accurate and
relevant. Nicely
formatted document.
Document is within
assigned length
All assigned
subjects address
with accurate,
relevant, and
insightful
information.
Very nicely
formatted.
Document is
within assigned
length
15%
Functionality Majority of
required function
parts work as
indicted in the
assignment text.
One major or 3
minor defects. All
major functionality
at least partially
working (example
change provided
but not correct).
Most required
function parts
work as indicted
in the
assignment text
above and
submitted
documentation.
One major or 3
minor defects.
All major
functionality at
Nearly all required
function parts work
as indicted in the
assignment text
above and submitted
documentation. One
to two minor
defects.
All required
function parts
work as indicted
in the assignment
text above and
submitted
documentation.
50%
Design document
does not fully
reflect
functionality.
least partially
working
((example
change provided
but not correct).
Code Majority of the
code conforms to
coding standards as
explained and
demonstrated so far
in the course (ex.
method design,
naming,
formatting, etc.).
Five to six minor
coding standard
violations. Some
useful comments.
Some JavaDocs
commenting.
Code compiles
with multiple
warnings or fails to
compile with
difficult to
diagnose error.
Most of the code
conforms to
coding standards
as explained and
demonstrated so
far in the course
(ex. method
design, naming,
formatting, etc.).
Three to four
minor coding
standard
violations.
Mostly useful
comments.
Public class
JavaDocs
complete. Code
compiles with
one to two
warnings.
Almost all code
conforms to coding
standards as
explained and
demonstrated so far
in the course (ex.
method design,
naming, formatting,
etc.). One to two
minor coding
standard violations.
Appropriate level of
useful comments.
Public class
JavaDocs complete.
Code compiles.
Code compiles with
no errors or
warnings.
All code
conforms to
coding standards
as explained and
demonstrated so
far in the course
(ex. method
design, naming,
formatting, etc.).
Appropriate level
of useful
comments.
Complete
JavaDocs as
specified. Code
compiles with no
errors or
warnings.
25%
Submit
package
More than one file
submitted in
incorrect format.
Files not enclosed
in the specified
compressed file.
All but one file
submitted in
correct format.
Files not
enclosed in the
specified
compressed file.
All file submitted in
correct format but
not in the specified
compressed file.
All file submitted
in correct file
formats and
compressed as
specified.
10%
3 pages
Review The Section On Linear Development In Learning Approaches
Discuss how learning changes over time impact organizational culture Organizational learning helps within the execution of ...
Review The Section On Linear Development In Learning Approaches
Discuss how learning changes over time impact organizational culture Organizational learning helps within the execution of technologies through the ...
Similar Content
ITEC 411 Alaska Bible College Smart Kiosks Design and Production Project
answer the following questions on the world documentation feel free to ask when it is not clear.thank you...
Assignment
In today's world, both government and the private sector are struggling to provide a secure, efficient, timely, and separa...
Web Security- CASE PROJECT. I NEED AN EXPERT WHO KNOWS ABOUT CYBER SECURITY
CASE PROJECT: LAW FIRM Points (1000) Company: Law Firm: Lincoln Partners, Esq. A law firm has hired you as a Network ...
Web and Data Warehousing and Mining in the Business World
Based on the feedback you have received with respect to your data model and DDL, now is your chance to implement the final...
RP steps, assignment help
Read the article and answer the questions and follow the step by step....
NEC Failed Security Controls Leading to The Incident at Target Company Duscyssion
In the first milestone, you identified a recent security incident that took place. There were multiple incidents that were...
Cyber Warfare
The use of computers is vital in the economic growth and Cyber warfare is commonly used by an organization or othe...
Differentiating For Diverse Students
The best reading text for the student is “Don’t Give Up” by Phoebe Cary. The text is basically a short poem by Phebe...
Riskmngt
No matter how keenly project is planned, there always trouble. Even if you come up with a good plan, the project always fa...
Related Tags
Book Guides
The President is Missing
by James Patterson, Bill Clinton
The Kite Runner
by Khaled Hosseini
The Tipping Point
by Malcolm Gladwell
Dune
by Frank Herbert
Macbeth
by William Shakespeare
Broke Millennial: Stop Scraping by and Get Your Financial Life Together
by Erin Lowry
The House of the Seven Gables
by Nathaniel Hawthorne
Jane Eyre
by Charlotte Brontë
Get 24/7
Homework help
Our tutors provide high quality explanations & answers.
Post question
Most Popular Content
Reliable Data Transport - Programing
In this programming assignment, you will write the sending and receiving transport-layer code for a simple reliable data t ...
Reliable Data Transport - Programing
In this programming assignment, you will write the sending and receiving transport-layer code for a simple reliable data transfer protocol. You will implement two different versions:Stop-and-Wait Protocol.Go-Back-N protocol.please use Java 7 or 8 and Netbeans 8.0.2 or later are the only requirementsthe description should be in well-written with clear references to the source code
CYB 6040 Wilmington University Week 2 OSINT & SCADA Systems Powerpoint
Week 2 Assignment: OSINT & SCADA Systems PowerPoint (TEAM)Download DHS National Infrastructure Protection Plan & see page ...
CYB 6040 Wilmington University Week 2 OSINT & SCADA Systems Powerpoint
Week 2 Assignment: OSINT & SCADA Systems PowerPoint (TEAM)Download DHS National Infrastructure Protection Plan & see page 19 (29/188) for 12 sectors at: LinkREAD Executive Summary. CIKR = Critical Infrastructure & Key ResourcesChoose ONE of 12 National Critical Infrastructure Sectors (NCIS) defined by DHS that uses SCADA systems (they all do) and document the 5 top SPECIFIC threats to that sector. See the CIS Interrelationships Figure uploaded previously to get an idea of the cyber and SCADA inter-dependencies. We are expanding our target vector space from SCADA networks (Assignment W1) to much large game, National Critical Infrastructure. (Assignment W2)Use: Link to clarify NCIS interrelationships. Provide a brief description of the threat, parties involved, and reason why the threat is one of the top five. Include any maps,diagrams, charts, etc. that would enhance the readers understanding of group, target, and/or attack. USE the RN equation format *** shown in the Week 1 individual assignment to present your case. In addition, Pick 3 OSINT sources that you used to develop your case. This would diminish confirmation bias in sources. Ideally, every threat team reviewed would have 1 or more OSINT source.This assignment should be a minimum 25-40 slides, BUT 50 slides would be better (including references in APA format to do justice).Philosophy note: Don't stick to the minimums. Students who think minimum performance generally settle for minimum salaries at job time. Think bigger. Get out of your comfort zone. A little extra goes a long way. Students in this class use their final team preparation as a point of differentiation on their resumes. It always starts a "warm conversation with recruiters." That is what you want - show your talent is better than others in the game. You are a Dragon / Dragoness and your training is much better! You can negotiate for more when the time comes and it will be worth your effort. The "others" will be sucking their thumbs as they watch you get the job First!All,Please proceed as follows:1. NCIS SectorKolawole Oyekanmi (XO) will select the NCIS Sector for the project.2. NCIS Sector Top 5 ThreatsKolawole Oyekanmi (XO) will determine what the top 5 threats are in order from the highest to lowest threat.3. NCIS Sector Threat Group Member AssignmentKolawole Oyekanmi (XO) will inform Panagou, Imassi, Muller, and Nguyen which particular threat to research.4. NCIS Sector Threat ResearchEach group member prepares the following for their assigned threat:NCIS Sector Threat:A. Threat DescriptionB. Parties InvolvedC. Why is it a top 5 threat to the chosen NCIS Sector?1. Vulnerabilities2. Impact3. CountermeasuresD. R/N Equation (based upon the vulnerabilities/impact/countermeasures)E. Include at least one figure (map, chart, etc.)F. One OSINT used in your research (Three OSINT for the top threat)G. List of ReferencesThe information does not have to be in any particular format. Just make sure that everything is included that is listed in number 4 above. 24-29THREAT 4Group Member. DescriptionParties InvolvedReason why top 5VulnerabilitiesImpactCountermeasuresAt least 1 figure (map, chart, etc)R/N Equation for threat
Server Technology - Apache versus Internet Information Services (IIS)
Apache versus Internet Information Services (IIS)Zeus Books is a local bookstore which doesn't have a strong knowledge of ...
Server Technology - Apache versus Internet Information Services (IIS)
Apache versus Internet Information Services (IIS)Zeus Books is a local bookstore which doesn't have a strong knowledge of server and web technology. Zeus Books has held out on having an ecommerce website but they understand that they will not be able to compete without a strong online presence. You've been hired by Zeus Books to be their consultant services on their endeavor to create and host an e-commerce website. Zeus Books requires more knowledge on web server technology.Based on your understanding of server and web technology, create a 2- to 3-page report in a Microsoft Word document showing a comparison and contrast between Apache versus Internet Information Services (IIS).Also include a diagram and description displaying how the end user interacts with the web server so that Zeus Books understands the technologies and terminology involved with a web server.Submission Details:Support your responses with examples.Cite any sources in APA format.
5 pages
Developing Erm Plan
1. From a management perspective, decide which key policies and procedures one should consider as the starting point when ...
Developing Erm Plan
1. From a management perspective, decide which key policies and procedures one should consider as the starting point when developing an ERM plan for
Java object-oriented GUI programming features, computer science homework help
605.201 Mini-Project 3:
Please do the following to complete this assignment.
Purpose:
The purpose of this project is to ...
Java object-oriented GUI programming features, computer science homework help
605.201 Mini-Project 3:
Please do the following to complete this assignment.
Purpose:
The purpose of this project is to provide non-trivial practice in the use of Java object-oriented GUI
programming features to implement an object-oriented GUI design and have a bit of fun doing it.
Resources Needed:
You will need a computer system with Java 7 or greater SE edition run-time and Java Development Kit
(JDK). You may optionally use a Java IDE for example NetBeans, Eclipse, etc. However application
builders are not allowed.
Submitted Files:
Design and Analysis:
This is an informal essay-style single-spaced word-processed document. The file formats accepted are
.odt, .doc, and .docx. The length of the document should be between 1 and 1.5 pages. The following
subjects should be discussed in this order:
1. General program design. How is the program organized? What major data structures were
used? How did you divide the functionality among your classes? How are commands
processed? Etc.
2. What alternative approaches were considered and why were they rejected?
3. What did you learn from doing this project and what would you do differently?
Source files:
Each public class must be contained in a separate Java source file. Only one source file will have a
main() method and this source will be named SongDatabase.java. Other source/class names are up to
you following the guidelines specified so far in the course.
The format of the Java source must meet the general Java coding style guidelines discussed so far
during the course. Pay special attention to naming guidelines, use of appropriate variable names and
types, variable scope (public, private, protected, etc.), indentation, and comments. Classes and
methods should be commented with JavaDoc-style comments (see below). Please use course office
hours or contact the instructor directly if there are any coding style questions.
JavaDocs:
Sources should be commented using JavaDoc-style comments for classes and methods. Each class
should have a short comment on what it represents and use the @author annotation. Methods should
have a short (usually 1 short sentence) description of what the results are of calling it. Parameters and
returns should be documented with the @param and @return annotations respectively with a short
comment on each.
JavaDocs must be generated against every project Java source file. They should be generated with a
-private option (to document all protection-level classes) and a –d [dir] option to place the resulting
files in a javadocs directory/folder at the same level as your source files. See the JavaDocs
demonstration for more details.
Submit file:
The submit file is to be a Zip file containing your design and analysis document, your Java sources, and
your javadocs directory/folder. Any appropriate file name for this Zip file is acceptable.
If you know how to create a standard Java JAR file, this is also acceptable for your source code.
However, make sure you include the source code in your JAR file.
Collaboration:
It is encouraged to discuss technical or small design parts of this project with your fellow students.
However the resulting design and implementation must be your own. For example, it is acceptable to
discuss different ways of maintaining the system state but not detailed design or implementation
information on processing the purchase command. When in doubt, ask during office hours or contact
your instructor.
Program Specification:
This project involves implementing a Java program that builds and manages a database of songs using
a GUI-based user interface.
The application will consist of a single frame that allows a user to add, edit, or delete songs from the
database. Here’s a rough prototype for what the frame might look like. Yours doesn’t have to look
exactly like this…the prototype is provided just to help you envision the ultimate application.
The application shall work as follows:
1. Upon start-up, the application will read the database file. The path of the database file will be
supplied by a run-time parameter. If the database file does not exist, the user will be told the
database does not exist and prompted (non-GUI text prompt) asking if they want to create a new
one. If the user answers positive, the application will continue with an initially empty song
database. If the user answers negatively, the application will exit. An example of an appropriate
start-up command is as follows:
java SongDB mySongDB.data
2. The original state of the frame shall display the combo box with the first song in the database
selected. The Item Code, Description, Artist, Album, and Price fields for this item shall be
displayed with the fields disabled (non-editable). The Add, Edit, Delete, and Exit buttons shall be
enabled, and the Accept and Cancel buttons shall be disabled.
3. To add a song, the user clicks on the Add button. This will cause the application to clear and enable
the Item Code, Description, Artist, Album, and Price fields so the user can enter information for the
new song. The Edit and Delete buttons are also disabled, and the Accept and Cancel buttons are
enabled. When the user presses the Accept button, the new song will be added to the database and
combo box. If the user presses the Cancel button, the entry transaction is canceled and the frame
reverts to its original state.
4. To edit an existing song, the user shall select the song from the combo box. The information for the
selected song shall then be displayed in the disabled fields. The user then presses the Edit button,
which enables the Description, Artist, and Price fields. The user may not change the Item Code.
Select Song: Yellow Submarine
Item Code: BT012
Description: Yellow Submarine
Artist: The Beatles
Album: Beatles Greatest Hits 1
Price: 1.99
Add Edit Delete Accept Cancel
Exit
The Add, Edit, and Delete buttons are disabled, and the Accept and Cancel buttons are enabled. If
the user presses the Accept button, the changes are saved and the combo box is updated. If the user
presses the Cancel button, the edit transaction is canceled and the frame reverts to its original state.
5. To delete an existing song, the user shall select the song from the combo box. The information for
the song shall then be displayed in the disabled fields. If the user presses the Delete button, the song
is deleted from the database and the combo box.
6. When the user presses the Exit button the application shall terminate. The current state of the
database shall be saved in a file using the pathname supplied at program start-up (see above).
7. Data fields shall be validated to ensure they are not blank with appropriate error messages
displayed. If the song is a single, the text “None” will be used for the album name. The price field
shall be validated to ensure only numeric data is entered.
Other Activates:
1. Create a compressed zipped folder containing your Design and Analysis document, your Java
source code files, and your javadocs folder.
2. Submit your compressed zipped folder as directed by your instructor.
Assignment Rubric:
Part 70% 80% 90% 100% % of
Grade
Design and
Analysis
Document
All but one subject
addressed with
relevant,
information. Few
minor
typographical
issues. Document
is close to assigned
length
All assigned
subjects address
with mostly
relevant
information.
Nicely formatted
document.
Document is
close to assigned
length
All assigned subjects
address with
accurate and
relevant. Nicely
formatted document.
Document is within
assigned length
All assigned
subjects address
with accurate,
relevant, and
insightful
information.
Very nicely
formatted.
Document is
within assigned
length
15%
Functionality Majority of
required function
parts work as
indicted in the
assignment text.
One major or 3
minor defects. All
major functionality
at least partially
working (example
change provided
but not correct).
Most required
function parts
work as indicted
in the
assignment text
above and
submitted
documentation.
One major or 3
minor defects.
All major
functionality at
Nearly all required
function parts work
as indicted in the
assignment text
above and submitted
documentation. One
to two minor
defects.
All required
function parts
work as indicted
in the assignment
text above and
submitted
documentation.
50%
Design document
does not fully
reflect
functionality.
least partially
working
((example
change provided
but not correct).
Code Majority of the
code conforms to
coding standards as
explained and
demonstrated so far
in the course (ex.
method design,
naming,
formatting, etc.).
Five to six minor
coding standard
violations. Some
useful comments.
Some JavaDocs
commenting.
Code compiles
with multiple
warnings or fails to
compile with
difficult to
diagnose error.
Most of the code
conforms to
coding standards
as explained and
demonstrated so
far in the course
(ex. method
design, naming,
formatting, etc.).
Three to four
minor coding
standard
violations.
Mostly useful
comments.
Public class
JavaDocs
complete. Code
compiles with
one to two
warnings.
Almost all code
conforms to coding
standards as
explained and
demonstrated so far
in the course (ex.
method design,
naming, formatting,
etc.). One to two
minor coding
standard violations.
Appropriate level of
useful comments.
Public class
JavaDocs complete.
Code compiles.
Code compiles with
no errors or
warnings.
All code
conforms to
coding standards
as explained and
demonstrated so
far in the course
(ex. method
design, naming,
formatting, etc.).
Appropriate level
of useful
comments.
Complete
JavaDocs as
specified. Code
compiles with no
errors or
warnings.
25%
Submit
package
More than one file
submitted in
incorrect format.
Files not enclosed
in the specified
compressed file.
All but one file
submitted in
correct format.
Files not
enclosed in the
specified
compressed file.
All file submitted in
correct format but
not in the specified
compressed file.
All file submitted
in correct file
formats and
compressed as
specified.
10%
3 pages
Review The Section On Linear Development In Learning Approaches
Discuss how learning changes over time impact organizational culture Organizational learning helps within the execution of ...
Review The Section On Linear Development In Learning Approaches
Discuss how learning changes over time impact organizational culture Organizational learning helps within the execution of technologies through the ...
Earn money selling
your Study Documents