******You do not need to get everything working exactly as it says, I mostly just need an outline of how to create this GUI and add up the costs and print them all out. Any help at all will be greatly appreciated*******
********MUST BE IN JAVAFX**********
Design and implement a Java program that creates a GUI that will allow a customer to order pizza and other items from a Pizza Paarlor. The customer should be able to order a variety of items which are listed below. The GUI should allow the customer (via JavaFX UI Controls - text areas, buttons, checkbox, radio button, etc.) to input the following information:
Pricing (assign these prices to each item)
Base Price for items :
Additional fees for Toppings:
Conditions:
In: Computer Science
Discussion about strategies to identify critical satiations in informatics systems
In: Computer Science
c program
Write a program that asks the user to enter a sequence of 15 integers, each either being 0, 1, or 2, and then prints the number of times the user has entered a "2" immediately following a "1". Arrays are not allowed to appear in your code. Include ONLY THE SCREENSHOT OF YOUR CODE in an image file and submit the file.
In: Computer Science
Given an array A of n integers, describe an O(n log n)
algorithm to decide if the elements of A are all distinct. Why does
your algorithm run in O(n log n) time?
In: Computer Science
using the C programming language I need a program that includes comments/ screen shots that it works/ and the code it self
for a hang man game
this game has to be to complie no errors please you can even keep it super basic if u want and no( studio.c) that never works THANK UUUUUU
In: Computer Science
27. Which of the following chart types can be created as a PivotChart? Select all the options that apply.
|
||||||||||||
28. You should not move a PivotChart because it must be on the same worksheet as its PivotTable.
|
||||||||||||
29. Which of the following formatting options can you apply to PivotCharts and other Excel charts? Select all the options that apply.
|
In: Computer Science
Show how each of the following C statements would be
translated to ARM Cortex M3/M4
assembly language:
3.1. a |= (1<<3)
3.2. a &= ~(1<<1)
3.3. a ^= 1<<2
If a was an 8-bit variable with initial value 0xA7:
3.4. What would be its value after each operation, assuming each
operation runs individually.
In: Computer Science
Define and test a function myRange. This function should behave like Python’s standard range function, with the required and optional arguments, but it should return a list. Do not use the range function in your implementation!
Study Python’s help on the range to determine the names, positions, and what to do with your function’s parameters. Use a default value of None for the two optional parameters. If these parameters both equal None, then the only provided argument should be considered the stop value, and the start value should default to 0. If just the third parameter equals None, then the function has been called with a start and stop value. Thus, the first part of the function’s code establishes what the values of the parameters are or should be. The rest of the code uses those values to build a list by counting up or down.
An example of the range function with only one argument provided is shown below:
print(myRange(10)) [0, 1, 2, 3, 4, 5, 6, 7, 8, 9]
In: Computer Science
IN BASIC PYTHON:
Cafeteria Selections Program. This program permits students to choose their lunch purchases from a menu in the cafeteria. It calculates the tax on taxable items (candy, pop) and presents the user with a total. The program accepts a tendered amount and computes and outputs change down to the actual coins and bills involved. An added inventory component could keep a running total of individual items purchased. No graphics needed here.
Mars Bar $1.25
Kit Kat $1.25
Soda Pop $1.50
Water $1.00
Muffins $2,00
Coffee / Tea $1.75
Expresso / Specialty Teas $2.50
Cold Sandwiches $5.00
Pasta $7.50
Gum $.140
In: Computer Science
C# Programming
In C# .NET you can build 3 different kinds of Presentation Layers. List them.
In: Computer Science
(3) Briefly (in just a few words), describe the difference between
an instance and a class.
In: Computer Science
Define a function replaceCharAtPos(orig,pos) which receives two input parameters, a string (orig) and a positive integer number (pos).
If the number is a position within the string, the function should
return a new string. The new string should be the original
string except that instead of the original character in that
position pos, it should have the position number itself (if the
position number has more than 1 digit, the character should be
replaced by the digit in the units part of the position number,
e.g. 2 if the position number is 12).
If the number pos is not a valid position within the original
string orig, the string returned should be exactly the same as the
original string.
For example
replaceCharAtPos('abcd',1) should return 'a1cd'
replaceCharAtPos('abcd',10) should return 'abcd'
replaceCharAtPos('abcdefghijklmn',12) should return
'abcdefghijkl2n'
As an example, the following code fragment:
print (replaceCharAtPos("abcd",2))
should produce the output:
ab2d
language: Python
In: Computer Science
(a) Why can't records use private data members (instead of public).
(b) Why shouldn't objects use public data members?
In: Computer Science
ITSC 1212 – Programming Checkpoint 3 – Candle Shop
The main idea behind this activity is to create a program that accepts multiple inputs from a user and use that information to control the operation of the method.
Preliminaries
The owner of a candle shop has asked for your help. The shop sells three types of candles as shown below:
Type |
Price |
Burn Time (hours) |
1 |
$2.50 |
5 |
2 |
$3.75 |
7 |
3 |
$5.99 |
12 |
The owner wants you to write a program to perform certain calculations when customers buy different numbers of the candles.
Part A – Develop an algorithm (5 points)
Develop an algorithm to satisfy the following requirements:
Write the pseudocode for the algorithm and store it in a file (file format can be text, pdf or doc) with the name CandleShopSteps.
Part B – Write the code (20 points)
Once you've written your algorithm it is time to turn it into a Java program. that can be executed (run). Here are some things to keep in mind:
In: Computer Science
How do we know the Public Key for a person is turly theirs?
A. |
It decrypts by private key |
|
B. |
It is verified by a Digital Certificate issued by a trusted CA |
|
C. |
The product of the two keys is the original large prime |
|
D. |
All of these |
Which of these is true of a public key cipher?
A. |
AES is the current algorithm |
|
B. |
Any number of people can send someone an encrypted message with Public Key, and they can decrypt it with their private key |
|
C. |
A single key is used for both encryption and decryption |
|
D. |
It has been superseded by symmetric key algorithms |
|
E. |
It has been superseded by one-time pad algorithms |
Which of theses is a disadvantage of public key cryptography relative to symmetric key cryptography?
A. |
They require two keys instead of just one |
|
B. |
They are slower |
|
C. |
They require larger keys to be secure |
|
D. |
All of these |
What bad cryptographic practice got the Soviet Union in trouble during the Cold War?
A. |
Re-using one time cryptographic pads |
|
B. |
Using Outdate cryptographic systems |
|
C. |
None of these |
|
D. |
Lack of awareness of spies being under surveillance. |
Which of these is the current reccomended symmetric cryptography algorithm?
A. |
None of these |
|
B. |
Caesar |
|
C. |
DES |
|
D. |
RSA |
In: Computer Science