Questions
******You do not need to get everything working exactly as it says, I mostly just need...

******You do not need to get everything working exactly as it says, I mostly just need an outline of how to create this GUI and add up the costs and print them all out. Any help at all will be greatly appreciated*******

********MUST BE IN JAVAFX**********

Design and implement a Java program that creates a GUI that will allow a customer to order pizza and other items from a Pizza Paarlor.  The customer should be able to order a variety of items which are listed below. The GUI should allow the customer (via JavaFX UI Controls - text areas, buttons, checkbox, radio button, etc.) to input the following information:

  • Customer Contact Info (Use text fields to input these from user)
    • First Name
    • Last Name
    • Phone Number
    • Address
  • Type of food that can be ordered are: (Use checkboxes to pick)
    • pizza
      • Small
      • Large
    • calzone
    • garlic knots
  • Quantity of each food item being ordered (Use text field that only accepts numbers to type in a number between 1 and 50)
    • Pizza toppings (Use checkboxes to pick)
      • Plain
      • Extra cheese
      • Mushrooms
      • Pepperoni

    Pricing (assign these prices to each item)

    Base Price for items :

  • Small Plain Pie –  $11.25
  • Large Plain Pie –  $14.00
  • Calzone - $7.75
  • Garlic Knots -$3.50
  • Additional fees for Toppings:

  • Small Pie - $2.00 per topping
  • Large Pie - $3.00 per topping

Conditions:

  • The GUI will have two buttons. The first will be used to create a running total of the current order. This button should be clicked every time an item is added to the order to give a current total of the order.
  • The second button will be used to print the following:
    • Customer Contact Info
    • All items and the quantity ordered
    • The grand total for the order

In: Computer Science

Discussion about strategies to identify critical satiations in informatics systems

Discussion about strategies to identify critical satiations in informatics systems

In: Computer Science

c program Write a program that asks the user to enter a sequence of 15 integers,...

c program

Write a program that asks the user to enter a sequence of 15 integers, each either being 0, 1, or 2, and then prints the number of times the user has entered a "2" immediately following a "1". Arrays are not allowed to appear in your code. Include ONLY THE SCREENSHOT OF YOUR CODE in an image file and submit the file.

In: Computer Science

Given an array A of n integers, describe an O(n log n) algorithm to decide if...

Given an array A of n integers, describe an O(n log n) algorithm to decide if the elements of A are all distinct. Why does your algorithm run in O(n log n) time?

In: Computer Science

using the C programming language I need a program that includes comments/ screen shots that it...

using the C programming language I need a program that includes comments/ screen shots that it works/ and the code it self

for a hang man game

this game has to be to complie no errors please you can even keep it super basic if u want and no( studio.c) that never works THANK UUUUUU

In: Computer Science

27. Which of the following chart types can be created as a PivotChart? Select all the...

27. Which of the following chart types can be created as a PivotChart? Select all the options that apply.

28. You should not move a PivotChart because it must be on the same worksheet as its PivotTable.

29. Which of the following formatting options can you apply to PivotCharts and other Excel charts? Select all the options that apply.

In: Computer Science

Show how each of the following C statements would be translated to ARM Cortex M3/M4 assembly...

Show how each of the following C statements would be translated to ARM Cortex M3/M4
assembly language:
3.1. a |= (1<<3)
3.2. a &= ~(1<<1)
3.3. a ^= 1<<2
If a was an 8-bit variable with initial value 0xA7:
3.4. What would be its value after each operation, assuming each operation runs individually.

In: Computer Science

Define and test a function myRange. This function should behave like Python’s standard range function, with...

Define and test a function myRange. This function should behave like Python’s standard range function, with the required and optional arguments, but it should return a list. Do not use the range function in your implementation!

Study Python’s help on the range to determine the names, positions, and what to do with your function’s parameters. Use a default value of None for the two optional parameters. If these parameters both equal None, then the only provided argument should be considered the stop value, and the start value should default to 0. If just the third parameter equals None, then the function has been called with a start and stop value. Thus, the first part of the function’s code establishes what the values of the parameters are or should be. The rest of the code uses those values to build a list by counting up or down.

An example of the range function with only one argument provided is shown below:

print(myRange(10))

[0, 1, 2, 3, 4, 5, 6, 7, 8, 9]

In: Computer Science

IN BASIC PYTHON: Cafeteria Selections Program. This program permits students to choose their lunch purchases from...

IN BASIC PYTHON:

Cafeteria Selections Program. This program permits students to choose their lunch purchases from a menu in the cafeteria. It calculates the tax on taxable items (candy, pop) and presents the user with a total. The program accepts a tendered amount and computes and outputs change down to the actual coins and bills involved. An added inventory component could keep a running total of individual items purchased. No graphics needed here.

Mars Bar $1.25

Kit Kat $1.25

Soda Pop $1.50

Water $1.00

Muffins $2,00

Coffee / Tea $1.75

Expresso / Specialty Teas $2.50

Cold Sandwiches $5.00

Pasta $7.50

Gum $.140

In: Computer Science

C# Programming In C# .NET you can build 3 different kinds of Presentation Layers. List them.

C# Programming

In C# .NET you can build 3 different kinds of Presentation Layers. List them.

In: Computer Science

(3) Briefly (in just a few words), describe the difference between an instance and a class.

(3) Briefly (in just a few words), describe the difference between

an instance and a class.

In: Computer Science

Define a function replaceCharAtPos(orig,pos)  which receives two input parameters, a string (orig) and a positive integer number...

Define a function replaceCharAtPos(orig,pos)  which receives two input parameters, a string (orig) and a positive integer number (pos).


If the number is a position within the string, the function should return a new string. The new string should be the original string except that instead of the original character in that position pos, it should have the position number itself (if the position number has more than 1 digit, the character should be replaced by the digit in the units part of the position number, e.g. 2 if the position number is 12).


If the number pos is not a valid position within the original string orig, the string returned should be exactly the same as the original string.


For example
replaceCharAtPos('abcd',1) should return 'a1cd'
replaceCharAtPos('abcd',10) should return 'abcd'
replaceCharAtPos('abcdefghijklmn',12) should return 'abcdefghijkl2n'

As an example, the following code fragment:

print (replaceCharAtPos("abcd",2))

should produce the output:

ab2d

language: Python

In: Computer Science

(a) Why can't records use private data members (instead of public). (b) Why shouldn't objects use...

(a) Why can't records use private data members (instead of public).

(b) Why shouldn't objects use public data members?

In: Computer Science

ITSC 1212 – Programming Checkpoint 3 – Candle Shop The main idea behind this activity is...

ITSC 1212 – Programming Checkpoint 3 – Candle Shop

The main idea behind this activity is to create a program that accepts multiple inputs from a user and use that information to control the operation of the method.

Preliminaries

The owner of a candle shop has asked for your help. The shop sells three types of candles as shown below:

Type

Price

Burn Time (hours)

1

$2.50

5

2

$3.75

7

3

$5.99

12

The owner wants you to write a program to perform certain calculations when customers buy different numbers of the candles.

Part A – Develop an algorithm (5 points)

Develop an algorithm to satisfy the following requirements:

  1. Prompt the user to enter the number of candles of each type the customer wants to buy. Since you can’t buy a fraction of a candle, the input for each type of candle must be an integer. (You may assume that only integer values between 0 and 10 will be entered when this program is tested.)
  2. Calculate the total price of all the candles bought using the information in the table above. For example, two Type 1 candles and one Type 2 candle would have a total price of $8.75.
  3. Calculate the total burn time of all the candles if they were burned consecutively (i.e., one after the other). For example, one Type 1 and one Type 3 candles would burn for 17 hours.
  4. Calculate the cost-per-minute for that purchase.
  5. Output some kind of meaningful display that includes the number of candles of each type bought, the total price, the total burn time, and the cost-per-minute. You can be as creative as you want with this!

Write the pseudocode for the algorithm and store it in a file (file format can be text, pdf or doc) with the name CandleShopSteps.

Part B – Write the code (20 points)

Once you've written your algorithm it is time to turn it into a Java program. that can be executed (run). Here are some things to keep in mind:

  • the class should be name CastleShop.
  • the program will need to import the Scanner class from the Java util package.
  • the class should have a main method that will include the logic for the algorithm you developed in Part A. You may choose to add additional methods that are called in the main method.

In: Computer Science

How do we know the Public Key for a person is turly theirs? A. It decrypts...

How do we know the Public Key for a person is turly theirs?

A.

It decrypts by private key

B.

It is verified by a Digital Certificate issued by a trusted CA

C.

The product of the two keys is the original large prime

D.

All of these

Which of these is true of a public key cipher?

A.

AES is the current algorithm

B.

Any number of people can send someone an encrypted message with Public Key, and they can decrypt it with their private key

C.

A single key is used for both encryption and decryption

D.

It has been superseded by symmetric key algorithms

E.

It has been superseded by one-time pad algorithms

Which of theses is a disadvantage of public key cryptography relative to symmetric key cryptography?

A.

They require two keys instead of just one

B.

They are slower

C.

They require larger keys to be secure

D.

All of these

What bad cryptographic practice got the Soviet Union in trouble during the Cold War?

A.

Re-using one time cryptographic pads

B.

Using Outdate cryptographic systems

C.

None of these

D.

Lack of awareness of spies being under surveillance.

Which of these is the current reccomended symmetric cryptography algorithm?

A.

None of these

B.

Caesar

C.

DES

D.

RSA

In: Computer Science