Questions
The data warehouse is one of the most important business intelligence tools a business needs to...

The data warehouse is one of the most important business intelligence tools a business needs to have. It turns the massive amount of data generated from multiple sources into a format that is easy to understand.

Discuss the data warehouse concept?

In: Computer Science

JAVA CODE Using the PurchaseDemo program and output from the previous problem as your guide, write...

JAVA CODE

Using the PurchaseDemo program and output from the previous problem as your guide, write a program that uses the Purchase class to set the following prices, and buy the number of items as indicated. Calculate the subtotals and total bill called total. Using the writeOutput() method display the subtotals as they are generated as in the PurchaseDemo program. Then print the total bill at the end. You may use integer, double, and String variables as needed but you may use only one object of the Purchase class and a for loop.

(Use the readInput() method for the following input data, you may assume the prompts and Scanner for the readInput() method takes place but you need not include either in your program output. )

Oranges: 10 for 2.99 buy 2 dozen oranges

Eggs; 12 for 1.69 buy 3 dozen eggs

Apples: 3 for 1.00 buy 20 apples

Watermelons: 4.39 each buy 2 watermelons

Bagels; 6 for 3.50 buy 1 dozen bagels

public class PurchaseDemo

{

public static void main(String[] args)

{

Purchase oneSale = new Purchase();

oneSale.readInput();

oneSale.writeOutput();

System.out.println("Cost each $" + oneSale.getUnitCost());

System.out.println("Total cost $" + oneSale.getTotalCost());

}

}

import java.util.Scanner;
/**   
Class for the purchase of one kind of item, such as 3 oranges.
Prices are set supermarket style, such as 5 for $1.25.
*/
public class Purchase   
{
private String name;
private int groupCount; //Part of a price, like the 2 in //2 for $1.99.
private double groupPrice; //Part of a price, like the $1.99
// in 2 for $1.99.
private int numberBought; //Number of items bought.
public void setName(String newName)
{
name = newName;
}
/**   
Sets price to count pieces for $costForCount.   
For example, 2 for $1.99.   
*/
public void setPrice(int count, double costForCount)
{
if ((count <= 0) || (costForCount <= 0))
{
System.out.println("Error: Bad parameter in " +
"setPrice.");
System.exit(0);
}
else
{
groupCount = count;
groupPrice = costForCount;
}
}
public void setNumberBought(int number)
{
if (number <= 0)
{
System.out.println("Error: Bad parameter in " +
"setNumberBought.");
System.exit(0);
}
else
numberBought = number;
}
/**
Reads from keyboard the price and number of a purchase.
*/   
public void readInput()
{
Scanner keyboard = new Scanner(System.in);
System.out.println("Enter name of item you are purchasing:");
name = keyboard.nextLine();
System.out.println("Enter price of item as two numbers.");
System.out.println("For example, 3 for $2.99 is entered as");
System.out.println("3 2.99");
System.out.println("Enter price of item as two numbers, " +
"now:");
groupCount = keyboard.nextInt();
groupPrice = keyboard.nextDouble();
while ((groupCount <= 0) || (groupPrice <= 0))
{ //Try again:
System.out.println("Both numbers must " +
"be positive. Try again.");
System.out.println("Enter price of " +
"item as two numbers.");
System.out.println("For example, 3 for " +
"$2.99 is entered as");
System.out.println("3 2.99");
System.out.println(
"Enter price of item as two numbers, now:");
groupCount = keyboard.nextInt();
groupPrice = keyboard.nextDouble();
}
System.out.println("Enter number of items purchased:");
numberBought = keyboard.nextInt();
while (numberBought <= 0)
{ //Try again:
System.out.println("Number must be positive. " +
"Try again.");
System.out.println("Enter number of items purchased:");
numberBought = keyboard.nextInt();
}
}
/**   
Displays price and number being purchased.
*/
public void writeOutput()   
{
System.out.println(numberBought + " " + name);
System.out.println("at " + groupCount +
" for $" + groupPrice);
}
public String getName()
{
return name;
}
public double getTotalCost()
{
return (groupPrice / groupCount) * numberBought;
}
public double getUnitCost()
{
return groupPrice / groupCount;
}
public int getNumberBought()
{
return numberBought;
}
}

In: Computer Science

Respond to the following in a minimum of 175 words: Organizations need to know the value...

Respond to the following in a minimum of 175 words:

Organizations need to know the value of their data to find the best way to protect it. The data must be categorized according to the organization’s level of concern for confidentiality, integrity, and availability. The potential impact on assets and operations should be known in case data, systems, and/or networks are compromised (through unauthorized access, use, disclosure, disruption, modification, or destruction).

Choose an organization from the Health Care, Finance, or Education sector to study throughout this course.

Based on your chosen organization, ensure you:

  • Discuss the organization’s data.
  • Discuss the organization’s categorization of the data based on the Standards for Security Categorization of Federal Information and Information Systems.

In: Computer Science

6. Write a Python function that checks whether a passed string is palindrome or not. Note:-A...

6. Write a Python function that checks whether a passed string is palindrome or

not. Note:-A palindrome is a word, phrase, or sequence that reads the same backward

as forward

. Some examples you may try: “madam”

redder

“race car”

Eva, Can I Stab Bats In A Cave?

If the argument passed is not a string,

invoke an exception or an assertion

and state in a comment which one you have chosen and why.

In: Computer Science

Research the common client hardware and software that is used by end users to access virtual...

Research the common client hardware and software that is used by end users to access virtual desktop environments. Explore each of the client connection methods in detail list both pros and cons for each connection method or device. You need to have a minimum of 3 different devices or connection types discussed in your paper.

In: Computer Science

In C++, Write a function to reverse the nodes in a linked list. You should not...

In C++, Write a function to reverse the nodes in a linked list. You should not create new nodes when you reverse the the linked list.

The function prototype:          void reverse(Node*& head);

Use the following Node definition:

struct Node

{

   int data;

   Node *next;

}

In: Computer Science

Please type answer for i can copy it. Thank you very much. -Question Respond to the...

Please type answer for i can copy it. Thank you very much.

-Question

Respond to the following in a minimum of 175 words:

Discuss the following:  

  • Differences, advantages, and disadvantages of Java® compared to another language of your choice (e.g., C++, Python, Ruby)
  • Database connectivity and file handling in Java® and in your other chosen language  

In: Computer Science

P1) Duplicated code P2) Feature Envy P3) Long Method P4) Intimacy (same questions for each) 1)...

P1) Duplicated code
P2) Feature Envy
P3) Long Method
P4) Intimacy
(same questions for each)
1) What is this ? What problem will it cause?
2) Can you show any example for this problem?
3) What is you solution? Show an example.

In: Computer Science

A regional transit company wants to determine whether there is a relationship between the age of...

A regional transit company wants to determine whether there is a relationship between the age of a bus and the annual maintenance cost. A sample of 10 buses resulted in the following data: spss

Age of Bus (years)

Annual Maintenance Cost ($)

1

350

2

370

2

480

2

520

2

590

3

550

4

750

4

800

5

790

5

950

Instructions:

  1. Input the data into an SPSS work sheet making sure that all your variables are labelled appropriately
  2. Create a scatter plot for these data.
  3. What does the scatter plot indicate about the relationship between the age of a bus and its annual maintenance costs?
  4. What is the correlation coefficient between the age of a bus and annual maintenance cost?
  5. Estimate a regression model that could be used to predict the annual maintenance cost given the age of the bus.
  6. What is the equation of the estimated model?
  7. Test whether each of the regression parameters β0 and β1 is equal to zero at the 0.05 level of significance testing.
  8. What is the correct interpretations of these parameters?
  9. How much of the variation in the sample values of annual maintenance costs does the regression model you estimated explain?
  10. What do you predict the annual maintenance cost to be for a 4.5 year old bus?
  11. Save all your commands to a syntax file

In: Computer Science

What are some of the benefits of batch scripting? What are some of the limitations? How...

What are some of the benefits of batch scripting? What are some of the limitations? How does batch scripting help us when dealing with large scale windows administration tasks such as creating users or modifying group policy?

In: Computer Science

For this Discussion, explain two important risks facing an organization by its employees using corporate e-mail...

For this Discussion, explain two important risks facing an organization by its employees using corporate e-mail (Microsoft Exchange, for example). What privacy safeguards and countermeasures would you suggest to the organization to protect e-mails going outside the company, and address junk mail, phishing attacks, and malicious links and attachments in incoming e-mail? Justify your selections.

In: Computer Science

Let Ajay and Bijay public key is certified by a CA. Both of them uses secure...

Let Ajay and Bijay public key is certified by a CA. Both of them uses secure DHKE with parameters α and p for encrypting/decrypting messages with a symmetric algorithm such as AES. Now assume Ranjit hold the CA’s signature algorithm (and especially its private key), which was used to generate certificates. Can Ranjit decrypt old cipher-texts which were exchanged between Ajay and Bijay before the CA signature algorithm and private key was compromised, which Ranjit had stored? Explain.

In: Computer Science

Explain what factors come into play when selecting a particular cloud service model and a cloud...

Explain what factors come into play when selecting a particular cloud service model and a cloud deployment model for a given organization.

In: Computer Science

Explain the idea of human-centered design and explain four characteristics of mental models Draw the mixed-reality...

Explain the idea of human-centered design

and explain four characteristics of mental models

Draw the mixed-reality continuum

In: Computer Science

State four limitations of tangible interactions


State four limitations of tangible interactions

In: Computer Science