Description
Which of the following is NOT one of the MOST common uses of Twitter?
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.
Explanation & Answer
Hi there! Thank you for the opportunity to help you with your question!
Dear aloma22,
What are the choices for this question?
Please let me know if you need any clarification. Always glad to help!Completion Status:
100%
Review
Review
Anonymous
This is great! Exactly what I wanted.
Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4
24/7 Homework Help
Stuck on a homework question? Our verified tutors can answer all questions, from basic math to advanced rocket science!
Most Popular Content
Java Code and Destructive and Non Destructive Methods Questionnaire
What is wrong with this pseudocode?
try {
// open some resource
} catch (Exception e) {
&nbs ...
Java Code and Destructive and Non Destructive Methods Questionnaire
What is wrong with this pseudocode?
try {
// open some resource
} catch (Exception e) {
// handle exception
} finally {
// close the resource
}
2. Which of the following statements is false?
If a String is not explicitly assigned a value, it will be null.
Strings are immutable.
The static parser methods in the String class can convert strings to other variable types.
Combining strings with + is less computationally efficient than doing so using StringBuffer's append() method.
3. Which of the following statements about exceptions in Java is true?
An exception stack trace provides important diagnostic information such as memory consumption
A class may only have one catch block.
Variables declared within the try block are accessible from within catch.
A method does not have to declare that it may throw an unchecked exception.
4. What problem(s) will result when this code, which compiles successfully, is executed?
int a = 16;
int b = 14;
boolean c = true;
boolean d = false;
if (c && !d) {
String result = "There are " + a + b + " days in September.";
System.out.println(result.substring(result.length() - result.length()));
}
A. The code within the if block will never execute.
B. The message in result will show the wrong number of days in September because a and b are concatenated as strings rather than added mathematically.
C. The substring() method could cause an exception.
5. Which statement about the following code is false?
String string1 = "Java";
String string2 = "JAVA";
String string3 = "jAvA";
You could test whether all three strings have the same value by evaluating this expression:
string1.equals(string2) && string2.equals(string3);
Though the strings look different to us, Java considers them equal because of their characters.
Comparing any two of them to one another using equalsIgnoreCase() will return true.
Calling trim() on all three would have no discernible effect.
SNHU Mobile Application for A Customer Programming Project
Competency
In this project, you will demonstrate your mastery of the following competency:
Create unit tests using code ...
SNHU Mobile Application for A Customer Programming Project
Competency
In this project, you will demonstrate your mastery of the following competency:
Create unit tests using code to uncover errors
Scenario
You are a software engineer for Grand Strand Systems, a software engineering company that focuses on developing and testing back-end services. You’ve been given an assignment to develop a mobile application for a customer. The customer will provide you with the requirements. Your job is to code up the application and provide unit tests to verify that it meets the customer’s requirements. You will be delivering the contact, task, and appointment services. The purpose of these services is to add, update, and delete contact, task, and appointment objects within the application.
Directions
ContactService, TaskService, and AppointmentService Files
For this assignment, you will incorporate the code and unit tests that you have developed for the mobile application. First, you developed the contact service and contact object, which you completed in the Module Three milestone. Second, you developed the task service and task object, which you completed in the Module Four milestone. Last, you developed the appointment service and appointment object, which you completed in Module Five milestone. Any feedback received on these assignments should be incorporated prior to submitting the files for this final project.
You have been asked to code up a mobile application for a client and provide unit tests to verify that it meets the customer’s requirements. In order to do so, you must complete the following:
Contact Service: In the Module Three milestone, you developed the contact service. The contact service used in-memory data structures to support storing contacts (no database required). In addition, there was no UI for this assignment. You verified the contact service through JUnit tests. The contact service contained a contact object along with the contact service. The requirements were as follows:
Contact Class Requirements
The contact object shall have a required unique contact ID String that cannot be longer than 10 characters. The contact ID shall not be null and shall not be updatable.
The contact object shall have a required firstName String field that cannot be longer than 10 characters. The firstName field shall not be null.
The contact object shall have a required lastName String field that cannot be longer than 10 characters. The lastName field shall not be null.
The contact object shall have a required phone String field that must be exactly 10 digits. The phone field shall not be null.
The contact object shall have a required address field that must be no longer than 30 characters. The address field shall not be null.
Contact Service Requirements
The contact service shall be able to add contacts with unique ID.
The contact service shall be able to delete contacts per contactId.
The contact service shall be able to update contact fields per contactId. The following fields are updatable:
firstName
lastName
PhoneNumber
Address
Task Service: In the Module Four milestone, you developed the task service. The task service used in-memory data structures to support storing tasks (no database required). In addition, there was no UI for this assignment. You verified the task service through JUnit tests. The task service contained a task object along with the task service. The requirements were as follows:
Task Requirements
The task object shall have a required unique task ID String that cannot be longer than 10 characters. The task ID shall not be null and shall not be updatable.
The task object shall have a required name String field that cannot be longer than 20 characters. The name field shall not be null.
The task object shall have a required description String field that cannot be longer than 50 characters. The description field shall not be null.
Task Service Requirements
The task service shall be able to add tasks with a unique ID.
The task service shall be able to delete tasks per taskId.
The task service shall be able to update task fields per taskId. The following fields are updatable:
name
description
Appointment Service: In the Module Five milestone, you developed the appointment service. The appointment service used in-memory data structures to support storing appointments (no database required). In addition, there was no UI for this assignment. You verified the appointment service through JUnit tests. The appointment service contained an appointment object along with the appointment service. The requirements were as follows:
Appointment Requirements
The appointment object shall have a required unique appointment ID String that cannot be longer than 10 characters. The appointment ID shall not be null and shall not be updatable.
The appointment object shall have a required appointment Date field. The appointmentDate field cannot be in the past. The appointmentDate field shall not be null. Note: Use java.util.Date for the appointmentDate field and use before(new Date()) to check if the date is in the past.
The appointment object shall have a required description String field that cannot be longer than 50 characters. The description field shall not be null.
Appointment Service Requirements
The appointment service shall be able to add appointments with a unique appointmentId.
The appointment service shall be able to delete appointments per appointmentId.
Specifically, the following rubric criteria must be addressed:
Verify the Contact class meets the requirements through JUnit tests.
Verify the ContactService class meets the requirements through JUnit tests.
Verify the Task class meets the requirements through JUnit tests.
Verify the TaskService class meets the requirements through JUnit tests.
Verify the Appointment class meets the requirements through JUnit tests.
Verify the AppointmentService class meets the requirements through JUnit tests.
Ensure the test coverage for the java files has 80% coverage or higher.
What to Submit
To complete this project, you must submit a ZIP folder containing the following deliverables:
ContactService, TaskService, and AppointmentService Files
ContactService
Contact.java
ContactService.java
ContactTest.java
ContactServiceTest.java
TaskService
Task.java
TaskService.java
TaskTest.java
TaskServiceTest.java
AppointmentService
Appointment.java
AppointmentService.java
AppointmentTest.java
AppointmentServiceTest.java
4 pages
Security Awareness
Security awareness is the attitude and knowledge possessed by employees in an organization regarding the protection of inf ...
Security Awareness
Security awareness is the attitude and knowledge possessed by employees in an organization regarding the protection of information technology assets ...
MIS 6000 UoPX Wk 4 Modeling Language & Operational Workflows Paper
PART I
Discussion Questions
In the unified modeling language (UML), use-case modeling captures different aspects of th ...
MIS 6000 UoPX Wk 4 Modeling Language & Operational Workflows Paper
PART I
Discussion Questions
In the unified modeling language (UML), use-case modeling captures different aspects of the operational workflows of a system. How would you extend use-case models that you created in the requirements phase, to use-case models that apply to the design phase?
Prepare a list containing at least 10 criteria for evaluating computer hardware and system software. The method for evaluating alternatives called weighting and scoring implies that the total utility of an alternative is the product of the weights of each criterion times the weight of the criterion for the alternative. What assumptions are characteristic of this method for evaluating alternatives?
NOTE: Please, support your answers with examples and research, and cite your research using the APA format for each part.
PART II
Week 4 Project Tasks
Now that you have created use-case models for your system, you plan your design, implementation, and test phases
Discuss the development methodology that you will use for your development process, clearly explaining the rationale of your choice.
Determine a plan to study whether the implementation of your target system will be successful or not.
Outline a test plan for your application, and design a format for test documentation that your testing members would use to explain how they tested the system (including what types of testing) to document the results of these tests. Create at least five (5) detailed test cases for your system-test phase.
Design a stakeholder feedback form that will be used to capture comments from stakeholders during the acceptance phase. Include measures of usability that should be established and collected in the feedback form.
Submission Details:
Submit your complete report in a 3- to 5-page MS Word document saved as W4_Project_Lastname_Firstname
Rasmussen College Meow Mart Information Technology Plan Paper
ScenarioMeow-Mart is a locally owned cat boutique specializing in custom-built cat condos. Meow-Mart has teamed up with a ...
Rasmussen College Meow Mart Information Technology Plan Paper
ScenarioMeow-Mart is a locally owned cat boutique specializing in custom-built cat condos. Meow-Mart has teamed up with a local carpentry business and have seen a boom in business within a 100 mile proximity to the stores premise.Meow-Mart has decided to hire a Management Information Systems consultant to assess and recommend an Information Technology plan that supports the following business objectives:Improves marketing to all 50 statesAutomates business transactionsSecures personal dataStreamlines logistics such as supply management and distributionProvides a collaborative communications platformEnsures that there is no loss of data due to unexpected outagesInstructionsYou will present your IT plan to Meow-Mart’s Owner using Microsoft PowerPoint. You will need to include audio explaining the slides, diagrams/charts, quantitative analysis, and Disaster Recovery Planning worksheet. To find help on how to include audio with your PowerPoint presentation see the link in Resources.****Just put explanation in the NOTES section in the POWERPOINT for each slide****The strategy must include the following components:Explain the types of Information Technology systems that would support the objectives (1 slide, include text explanation in the notes)Use diagrams and/or charts as a visual aid (2 slides minimum)Provide quantitative analysis in order to measure performance and benchmarks (1-2 slides)Use the Disaster Recovery planning worksheet (attached) to develop a strategy that ensures no loss of data due to unexpected outages (1 slide, include text explanation in the notes)
Similar Content
ECOM 201 Saudi Electronic University Management Worksheet
Saudi Electronic University
College of Administrative and Financial Sciences
Introduction to E-Management
ECOM 201
Proje...
New England College Human and Technology Interaction Discussion
It is important to understand that humans and technology interact in all information systems. Why do you feel businesses m...
Machine Learning Methodologies Help to Predict Students Discussion Questions
Machine Learning Methodologies Help to Predict Student :
What interview questions would you ask? What are some recru...
University of the Cumberlands Common Customer Data and A Shared Customer Service Center Questions
Submit a Word document with answers to questions two and five on page 159. Your answer to each question should be about tw...
Writing Assignment
For this writing assignment, both questions need to be addressed:Your response for question 1 should be 3-5 pages in lengt...
IT 110 Saudi Electronic University Write a Little Man Program Computer Coding Task
College of Computing and Informatics
Assignment 3
Deadline: Tuesday 23/03/2021 @ 23:59
[Total Mark for this Assignment is...
Team Conflicts And Creativity.edited
Disagreements cause team conflicts over the needs, goals, and methods of a team. Personality differences can also cause co...
Solution
1. Sticky note containing information is left behind making the information public and letting them know that the desk wou...
Part1.microsoft Project Assignment
Microsoft project tool is a windows-based software product that helps in management of projects. The software is developed...
Related Tags
Book Guides
The House of the Seven Gables
by Nathaniel Hawthorne
The Atlantis Gene
by S. A. Beck
The Prince
by Niccolò Machiavelli
Notes from Underground
by Fyodor Dostoyevsky
The Dispossessed
by Ursula Kroeber Le Guin
The Second Sex
by Simone de Beauvoir
Othello
by Wiliam Shakespeare
The Splendid and The Vile
by Erik Larson
Shutter Island
by Dennis Lehane
Get 24/7
Homework help
Our tutors provide high quality explanations & answers.
Post question
Most Popular Content
Java Code and Destructive and Non Destructive Methods Questionnaire
What is wrong with this pseudocode?
try {
// open some resource
} catch (Exception e) {
&nbs ...
Java Code and Destructive and Non Destructive Methods Questionnaire
What is wrong with this pseudocode?
try {
// open some resource
} catch (Exception e) {
// handle exception
} finally {
// close the resource
}
2. Which of the following statements is false?
If a String is not explicitly assigned a value, it will be null.
Strings are immutable.
The static parser methods in the String class can convert strings to other variable types.
Combining strings with + is less computationally efficient than doing so using StringBuffer's append() method.
3. Which of the following statements about exceptions in Java is true?
An exception stack trace provides important diagnostic information such as memory consumption
A class may only have one catch block.
Variables declared within the try block are accessible from within catch.
A method does not have to declare that it may throw an unchecked exception.
4. What problem(s) will result when this code, which compiles successfully, is executed?
int a = 16;
int b = 14;
boolean c = true;
boolean d = false;
if (c && !d) {
String result = "There are " + a + b + " days in September.";
System.out.println(result.substring(result.length() - result.length()));
}
A. The code within the if block will never execute.
B. The message in result will show the wrong number of days in September because a and b are concatenated as strings rather than added mathematically.
C. The substring() method could cause an exception.
5. Which statement about the following code is false?
String string1 = "Java";
String string2 = "JAVA";
String string3 = "jAvA";
You could test whether all three strings have the same value by evaluating this expression:
string1.equals(string2) && string2.equals(string3);
Though the strings look different to us, Java considers them equal because of their characters.
Comparing any two of them to one another using equalsIgnoreCase() will return true.
Calling trim() on all three would have no discernible effect.
SNHU Mobile Application for A Customer Programming Project
Competency
In this project, you will demonstrate your mastery of the following competency:
Create unit tests using code ...
SNHU Mobile Application for A Customer Programming Project
Competency
In this project, you will demonstrate your mastery of the following competency:
Create unit tests using code to uncover errors
Scenario
You are a software engineer for Grand Strand Systems, a software engineering company that focuses on developing and testing back-end services. You’ve been given an assignment to develop a mobile application for a customer. The customer will provide you with the requirements. Your job is to code up the application and provide unit tests to verify that it meets the customer’s requirements. You will be delivering the contact, task, and appointment services. The purpose of these services is to add, update, and delete contact, task, and appointment objects within the application.
Directions
ContactService, TaskService, and AppointmentService Files
For this assignment, you will incorporate the code and unit tests that you have developed for the mobile application. First, you developed the contact service and contact object, which you completed in the Module Three milestone. Second, you developed the task service and task object, which you completed in the Module Four milestone. Last, you developed the appointment service and appointment object, which you completed in Module Five milestone. Any feedback received on these assignments should be incorporated prior to submitting the files for this final project.
You have been asked to code up a mobile application for a client and provide unit tests to verify that it meets the customer’s requirements. In order to do so, you must complete the following:
Contact Service: In the Module Three milestone, you developed the contact service. The contact service used in-memory data structures to support storing contacts (no database required). In addition, there was no UI for this assignment. You verified the contact service through JUnit tests. The contact service contained a contact object along with the contact service. The requirements were as follows:
Contact Class Requirements
The contact object shall have a required unique contact ID String that cannot be longer than 10 characters. The contact ID shall not be null and shall not be updatable.
The contact object shall have a required firstName String field that cannot be longer than 10 characters. The firstName field shall not be null.
The contact object shall have a required lastName String field that cannot be longer than 10 characters. The lastName field shall not be null.
The contact object shall have a required phone String field that must be exactly 10 digits. The phone field shall not be null.
The contact object shall have a required address field that must be no longer than 30 characters. The address field shall not be null.
Contact Service Requirements
The contact service shall be able to add contacts with unique ID.
The contact service shall be able to delete contacts per contactId.
The contact service shall be able to update contact fields per contactId. The following fields are updatable:
firstName
lastName
PhoneNumber
Address
Task Service: In the Module Four milestone, you developed the task service. The task service used in-memory data structures to support storing tasks (no database required). In addition, there was no UI for this assignment. You verified the task service through JUnit tests. The task service contained a task object along with the task service. The requirements were as follows:
Task Requirements
The task object shall have a required unique task ID String that cannot be longer than 10 characters. The task ID shall not be null and shall not be updatable.
The task object shall have a required name String field that cannot be longer than 20 characters. The name field shall not be null.
The task object shall have a required description String field that cannot be longer than 50 characters. The description field shall not be null.
Task Service Requirements
The task service shall be able to add tasks with a unique ID.
The task service shall be able to delete tasks per taskId.
The task service shall be able to update task fields per taskId. The following fields are updatable:
name
description
Appointment Service: In the Module Five milestone, you developed the appointment service. The appointment service used in-memory data structures to support storing appointments (no database required). In addition, there was no UI for this assignment. You verified the appointment service through JUnit tests. The appointment service contained an appointment object along with the appointment service. The requirements were as follows:
Appointment Requirements
The appointment object shall have a required unique appointment ID String that cannot be longer than 10 characters. The appointment ID shall not be null and shall not be updatable.
The appointment object shall have a required appointment Date field. The appointmentDate field cannot be in the past. The appointmentDate field shall not be null. Note: Use java.util.Date for the appointmentDate field and use before(new Date()) to check if the date is in the past.
The appointment object shall have a required description String field that cannot be longer than 50 characters. The description field shall not be null.
Appointment Service Requirements
The appointment service shall be able to add appointments with a unique appointmentId.
The appointment service shall be able to delete appointments per appointmentId.
Specifically, the following rubric criteria must be addressed:
Verify the Contact class meets the requirements through JUnit tests.
Verify the ContactService class meets the requirements through JUnit tests.
Verify the Task class meets the requirements through JUnit tests.
Verify the TaskService class meets the requirements through JUnit tests.
Verify the Appointment class meets the requirements through JUnit tests.
Verify the AppointmentService class meets the requirements through JUnit tests.
Ensure the test coverage for the java files has 80% coverage or higher.
What to Submit
To complete this project, you must submit a ZIP folder containing the following deliverables:
ContactService, TaskService, and AppointmentService Files
ContactService
Contact.java
ContactService.java
ContactTest.java
ContactServiceTest.java
TaskService
Task.java
TaskService.java
TaskTest.java
TaskServiceTest.java
AppointmentService
Appointment.java
AppointmentService.java
AppointmentTest.java
AppointmentServiceTest.java
4 pages
Security Awareness
Security awareness is the attitude and knowledge possessed by employees in an organization regarding the protection of inf ...
Security Awareness
Security awareness is the attitude and knowledge possessed by employees in an organization regarding the protection of information technology assets ...
MIS 6000 UoPX Wk 4 Modeling Language & Operational Workflows Paper
PART I
Discussion Questions
In the unified modeling language (UML), use-case modeling captures different aspects of th ...
MIS 6000 UoPX Wk 4 Modeling Language & Operational Workflows Paper
PART I
Discussion Questions
In the unified modeling language (UML), use-case modeling captures different aspects of the operational workflows of a system. How would you extend use-case models that you created in the requirements phase, to use-case models that apply to the design phase?
Prepare a list containing at least 10 criteria for evaluating computer hardware and system software. The method for evaluating alternatives called weighting and scoring implies that the total utility of an alternative is the product of the weights of each criterion times the weight of the criterion for the alternative. What assumptions are characteristic of this method for evaluating alternatives?
NOTE: Please, support your answers with examples and research, and cite your research using the APA format for each part.
PART II
Week 4 Project Tasks
Now that you have created use-case models for your system, you plan your design, implementation, and test phases
Discuss the development methodology that you will use for your development process, clearly explaining the rationale of your choice.
Determine a plan to study whether the implementation of your target system will be successful or not.
Outline a test plan for your application, and design a format for test documentation that your testing members would use to explain how they tested the system (including what types of testing) to document the results of these tests. Create at least five (5) detailed test cases for your system-test phase.
Design a stakeholder feedback form that will be used to capture comments from stakeholders during the acceptance phase. Include measures of usability that should be established and collected in the feedback form.
Submission Details:
Submit your complete report in a 3- to 5-page MS Word document saved as W4_Project_Lastname_Firstname
Rasmussen College Meow Mart Information Technology Plan Paper
ScenarioMeow-Mart is a locally owned cat boutique specializing in custom-built cat condos. Meow-Mart has teamed up with a ...
Rasmussen College Meow Mart Information Technology Plan Paper
ScenarioMeow-Mart is a locally owned cat boutique specializing in custom-built cat condos. Meow-Mart has teamed up with a local carpentry business and have seen a boom in business within a 100 mile proximity to the stores premise.Meow-Mart has decided to hire a Management Information Systems consultant to assess and recommend an Information Technology plan that supports the following business objectives:Improves marketing to all 50 statesAutomates business transactionsSecures personal dataStreamlines logistics such as supply management and distributionProvides a collaborative communications platformEnsures that there is no loss of data due to unexpected outagesInstructionsYou will present your IT plan to Meow-Mart’s Owner using Microsoft PowerPoint. You will need to include audio explaining the slides, diagrams/charts, quantitative analysis, and Disaster Recovery Planning worksheet. To find help on how to include audio with your PowerPoint presentation see the link in Resources.****Just put explanation in the NOTES section in the POWERPOINT for each slide****The strategy must include the following components:Explain the types of Information Technology systems that would support the objectives (1 slide, include text explanation in the notes)Use diagrams and/or charts as a visual aid (2 slides minimum)Provide quantitative analysis in order to measure performance and benchmarks (1-2 slides)Use the Disaster Recovery planning worksheet (attached) to develop a strategy that ensures no loss of data due to unexpected outages (1 slide, include text explanation in the notes)
Earn money selling
your Study Documents