Laboratory Exercise 6 TECH 2251 Due: October 13, 2020 ✓ Solved
Laboratory Exercise 6 TECH 2251 Due: October 13, 2020 Advanced Pro
Write a Java program that will demonstrate the use of overloaded constructors within a given class. The program will display the current inventory count for resistors, capacitors, and transistors, then using constructors for the given class will modify those inventory numbers and display the new inventory count for resistors, capacitors, and transistors. There will be no user interaction with this program. The student is to create a class called ConstructorExample.
This class will only contain a single method – main(). The student is to create three variables local to this class for each component (resistors, capacitors, and transistors) and assign them the values shown in the Example Output section below. There will be no modifications made to the inventory of the named components within this class, all modifications to inventory will be handled using constructors in the Components class as described below, and the results will be assigned back to these variables after modifications have been made. Output to the console from the main() method will reference the private member variable defined in the Components class only. The student cannot perform the mathematical calculations to any of the variables defined within the ConstructorExample class, they can only assign the new inventory counts to these variables derived from the Components class.
The student will create another class which will be part of the org.uofm.tools package called Components. There will be a private member variable called componentCount that will be used to keep track of the inventory count for a component. There will be two constructors defined within this class. The first will be a default constructor that displays the sentence “* Default constructor for the Components class.†when called. The second will be an overridden constructor that accepts three arguments.
The first argument will be a variable called ‘action’ and is of type String, the second argument will be a variable called ‘count’ and will be of type int, and the third argument will be of type int. Each argument for this constructor serves a unique purpose. The first argument determines whether to add a part count to an inventory item or subtract a part count from an inventory item. The second argument provides the current inventory count for the component. The third argument provides the value to either add to the inventory item or subtract from the inventory item.
Within this constructor there will be logic that will handle modifications to the inventory count for the component based on the arguments passed to the constructor. The private member variable componentCount will keep track of the inventory count for each component once it has been modified. The student will also create a class called ProgramHelper. This class will contain the methods ProgramDescription and DeveloperInformation that were used in previous laboratory exercises. The information must be updated to reflect the change for Laboratory Assignment 6.
This class will only have these two methods, no other methods will be allowed. This class will be part of the org.uofm.tools package. The student is to create the output shown below (see Example Output) using the values shown in the example. Laboratory Exercise 6 TECH 2251 Due: October 13, 2020 Advanced Programming Technology Todd S. Canaday, PMP The University of Memphis Herff College of Engineering Program Requirements: 1.
The program must be written in the Java language. 2. The program description will be shown when executed. Students must create their own program description, do not copy the instructors’ example. 3.
This program does not have any user interaction. 4. All calculations must be handled within the appropriate constructor. 5. All output to the console will be handled through the main() method except where noted with constructors.
6. Each class must have appropriate program headers, class descriptions, class comment headers, and method comment headers along with in-line code comments that has been covered previously. 7. Students must do their own work! Example Output: Laboratory Exercise 6 TECH 2251 Due: October 13, 2020 Advanced Programming Technology Todd S.
Canaday, PMP The University of Memphis Herff College of Engineering Deliverables: The student is to upload the contents of the Java src folder to the TECH_2251_Lab_6 drop box directory on the eCourseware website no later than 5:30 PM on the due date shown above. Students must ZIP their Java source code and name the file using the following structure: Last Name_First Name_TECH_2251_Lab_6_F2020.zip Example: Homer Simpson Simpson_Homer_TECH_2251_Lab_6_F2020.zip Failure to follow the described file naming format will result in points deducted. Late submissions will not be accepted and the student will receive a zero for the laboratory exercise. For this exercise, the student is to include the ‘src’ directory within their ZIP file.
The ‘src’ directory will contain all classes required and will have the necessary package classes contained within it. Failure to follow instructions will result in points deducted. PROJECT: First Draft Submission / Performing Analysis 3 Economic Firm and industry analysis With the fast growth and technological advancement in this century, vulnerabilities and risks of data getting in the wrong hands have never been this high. Besides, phishing and hacking have also been on the rise as hackers try to steal intellectual property and other data in a bid to extort companies or for illegal use. This has greatly threatened the operations of businesses and they have opted to look for a way out to cushion themselves and their operations and maintain the safety of their data (McGeveran, 2018).
These imminent threats have resulted in the emergence of the data security industry which majors in offering security to businesses to allow them to proceed with their operations uninterrupted by data leakages, hacking and other forms of cyber-attacks. Firms in this industry are many, managing and offering IT support to businesses as well as offering consultancy services to them on how best they can protect their data and operations (Hoberg & Phillips, 2016). They also carry out tests to evaluate the vulnerability of businesses to cyber threats and take corrective measures. This industry has been a great player in the world economies and its absence is nothing to be thought of. It has created not only jobs but livelihoods for millions of people as well as supporting governments as they fulfill public and civic duties.
Besides that, it has been a support system for the other industries as they rely on it for data security services. One of the companies in the data security industry is CISCO. CISCO is a global IT solutions leader offering product ranging from security, cloud computing services, and software applications among others. The firm has been a major player economically and has thrived amongst many competitors in the same industry. Economically, it has been able to meet its profit maximization goal as well as maximize the shareholders’ wealth.
References Hoberg, G., & Phillips, G. (2016). Text-based network industries and endogenous product differentiation. Journal of Political Economy , 124 (5), . McGeveran, W. (2018). The Duty of Data Security.
Minn. L. Rev. , 103 , 1135. Course Project Project Outline This project offers students the opportunity to apply the concepts we have covered in this class. The project involves investigating real world industry and markets as a means to further understanding of theories and concepts presented in this managerial economics course.
This project requires student to perform analysis at two levels – the industry level and the firm level. From the list below, you are required to choose one of the industries as your industry focus; and choose one firm in your industry of choice as your firm focus. The following industries are expected to experience significant change: · Healthcare Services · Data Security · Renewable Energy · Gaming · Residential Construction · Retail · Transportation · Advertising · Insurance · Telecommunication · Banking Select the industry and firm and indicate your selection by submitting the name in the file submission area of this assignment by Sunday 11:59 p.m. EST in the Module 3 week. In essay format, you are required to perform industry and firm analysis.
The essay should explore/incorporate the following: a. A discussion of the opportunities that exist in that industry. b. Identifying the four leading firms in that industry, followed with a discussion of your opinion and analysis of why those firms are or have been industry leaders. c. An analysis of your firm using Porter’s Five Forces Framework. d. An analysis of your industry’s cost structure.
In particular, identifying and distinguishing between fixed costs, variable costs, sunk costs, and entry costs. e. An analysis of your industry’s demand drivers that may affect revenues. f. Determine the structure of the market of your industry by drawing from your insights above. g. A discussion of the factors and trends that are likely to shape that industry over the next 3-5 years. The essay should be 12–15 pages using 12-point Times New Roman font, 1.5 spacing.
All sources should be referenced in APA format. My Industry was: DATA SECURUTY My firm was: CISCO Project Rubric Criteria weight Exemplary Good Satisfactory Inadequate Topical Relevance 5% Directly relevant Somewhat relevant Remotely related Totally unrelated Organization 20% Good organization; points are logically ordered; sharp sense of beginning and ending Organized; points are somewhat jumpy; sense of beginning and ending Some organization; points jump around; beginning and ending are unclear Poorly organized; no logical progression; beginning and ending are vague Content 25% Content indicates synthesis of ideas, in-depth analysis and evidences original thought and support for the topic. Content indicates original thinking and develops ideas with sufficient and firm evidence.
Content indicates thinking and reasoning applied with original thought on a few ideas. Shows some thinking and reasoning but most ideas are underdeveloped and unoriginal. Research & Development 25% Sufficient supporting research and facts to support content and conclusions drawn. Some details and facts are non-supporting to the content. Moderate levels of research done to support content.
Little research conducted to support content. Factual accuracies are questionable. No research done to support content. No specific details or facts given. Correct application of economic concepts 25% Conclusions, inferences, and analyses are consistent with facts as well as economic concepts and theory.
Conclusions, inferences, and analyses are somewhat consistent with economic theory and concepts. Many inconsistencies with economic theory and concepts. Numerous inconsistencies with facts and economic theory and concepts.