Write a program that will draw a house with 2 windows, a door and a roof using the JavaFX graphics framework. Add a label to the top of the drawing with your name and a title in the application. Save the program as HouseBlueprint.java.

Programming Assignment

Write a program that will draw a house with 2 windows, a door and a roof using the JavaFX graphics framework. Add a label to the top of the drawing with your name and a title in the application. Save the program as HouseBlueprint.java.

Also ensure that the following requirements are met:

1) Java file is named correctly.
2) Name, date and assignment information is included at the top of your Java code file as a comment.
3) Java code is properly indented and readable.
4) Code comments are present within each major section of code.
5) Output is formatted correctly and meets the requirements above.

Once you verify that your program runs correctly and you have met the requirements, create a Word or PDF document with the following

1) Your name, date and assignment identification at the top of the page Ex. CIS-210 Week 4 Programming Assignment
2) Full Java source code listing
3) Screenshot of the code compiling successfully in the IDE with the timestamp showing.
4) Screenshot of the code running showing the correct output.

Archive (zip) the results document and the actual .java code files into a single zip file and submit through the classroom. Please name the zip file with <flast>_CIS210_Week_4 where <flast> is your first initial and last name.

Classroom book: Java Illuminated Julie Anderson; Hervé J. Franceschi’

What is one of the predictive models, descriptive models, explanatory theories, generative theories, and predictive theories that mostly resonate with your future studies and why?

HUMAN-COMPUTER INTERACTION

Within Human Computer Interaction, models and theories help researchers predict interactions and modify their software and design accordingly.

What is one of the predictive models, descriptive models, explanatory theories, generative theories, and predictive theories that mostly resonate with your future studies and why?

 

Choose an area of computer/networking technology AND explain which science principles impact it, influence it, or make it work. Write a three (3) page report using APA writing style and a minimum of three (3) sources.

Computer/networking technology

Choose an area of computer/networking technology AND explain which science principles impact it, influence it, or make it work.

Write a three (3) page report using APA writing style and a minimum of three (3) sources.

Use one of the tools (RStudio, Python, Jupyter, RapidMiner, or Tableau) to demonstrate Predictive Analytics and explain your logic.

Computer Science Question

Use one of the tools (RStudio, Python, Jupyter, RapidMiner, or Tableau) to demonstrate Predictive Analytics and explain your logic. This assignment should be two pages minimum, double spaced, with APA formatting and references. Use screenshots where applicable.

 

Post your opinion and thoughts on the documents and comment on at least two of your peers’ responses. Ask technical questions or respond generally to the overall experience.

Home Modules Announcements Files

Since this is a Security Standard related course and you’re taking it at a University, it seems apropos to address the FERPA regulations. The FERPA regulations are federally sponsored and help to protect information that students have on his with colleges, schools, Universities, etc.

Initially, Me parent’s tights for the privacy of this information are covered. When a student turns 18 years old, the rights transfer to the student and the parent loses Al rights associated with that individual’s information. This transfer of rights can also take place when a high school students moves into a higher education institution but may not meet the 18 year age requirement.
The individual holding these rights has the right to review the documents on his with Me institution at any time. This includes ALL information pertaining to Me student The school, however, is not required to provide copies.

The individual holding the rights has Me right to request the school correct records it holds on the student that are believed to be incorrect If the school retists, there can be a hearing on the matter. Aker the hearing, if the school STILL decides there is no error, a record can be placed in the his by the individual slating the point of contention. This is in case anyone reads the file late, they can see both sides of the issue.

Written permission must be obtained, in MOST cases before releasing any information related to a student. In cases of law enforcement, this doesn’t always hold true. Another avenue is when a directory listing is made telling student name, address, phone, honors, etc. However, the school IS required to notify Audents and parents about these actions in advance, allowing enough time to deny the action if warranted.

Now when we take all of this information and start considering, what does this mean to UAT as as institution and our networks? A compromise of the UAT administrative systems would mean what? A loss of company information? Perhaps. A loss of student information? Possibly. A loss of credibility? Probably.

Now, Aong with every other security standard were studying, you’ve probably started to notice a severe lack of details concerning technical security implementations to protect information. There are lots of fines, penalties, and what ifs, but not real structured guidance. So in order to avoid these bothersome things, the institution is left with individuals such as yourself to give them advice on securing their networks and systems in order to protect their student information.

Expectations • Read the FERPA document ft-Pare. Pdf Deliverables

Post your opinion and thoughts on the documents and comment on at least two of your peers’ responses. You can ask technical questions or respond generally to the overall experience. Be objective, clear, and concise. Always use constructive language, even in criticism, to work towards the goal of positive progress.

Discuss why mobile application development is considered unique in comparison to other development. Discuss what an “Activity” is and why its understanding is important in designing UIs for Android.

Info Tech and Mobile Application

  • Discuss why mobile application development is considered unique in comparison to other development.
  • Discuss what an “Activity” is and why its understanding is important in designing UIs for Android.
  • What Object-Oriented programming language is essential to effectively build UI (layouts) in Android Studio? Explain
  • What Object-Oriented programming language is essential to customize functions/behavior for UI elements in your Android layout? Explain
  • Discuss some interface (UI) principles (at least 4) that should be employed when designing mobile applications

 

Explain in your own words (no cut and paste) what each of the following documents mean and what they are trying to accomplish.

Nist & FIPS DOCUMENTS

This is an individual assignment. Explain  in your own words (no cut and paste) what each of the following documents mean and what they are trying to accomplish.

Write 2-3 sentences for each of these.

  • FIPS 199 • FIPS 200 • FIPS 140-2 • 800-18 • 800-30 • 800-34 • 800-39 • 800-37 Rev. 2 • 800-50 • 800-53(A) Rev. 5 • 800-53 Rev. 5 • 800-59 • 800-60 Vol. I & II • 800-61 • 800-64 Rev. 2 • 800-128 • 800-145 • 800-207

 

Discuss how symmetric key encryption works was cryptography used in the old testament? Can you reference a story from the old testament about the use of cryptography?

DISCUSSION ESSAY

Ancient societies used the power of cryptography to not only safeguard information, but how they were able to utilize it and break it as well. Surprisingly, symmetric key encryption has been in use for thousands of years. Discuss how symmetric key encryption works was cryptography used in the old testament? Can you reference a story from the old testament about the use of cryptography?

Review the Discussion Assignment Instructions prior to posting. You may also click the three dots in the upper corner to Show Rubric.

Post-First: This course utilizes the Post-First feature in all Discussions. This means you will only be able to read and interact with your classmates’ threads after you have submitted your thread in response to the provided prompt. Submit your thread by 11:59 p.m. (ET) on Thursday of Module 1: Week 1.

Examine the difference between flaws and vulnerabilities. Analyze the differences between functional and non-functional requirements. Discuss how a security professional may impact a project through NFR and “bake in security.”

Discussion replies

Description
In a software project, there are functional and non-functional requirements. Non-functional requirements include security requirements. In the first paragraph, examine the difference between flaws and vulnerabilities. In the second paragraph, analyze the differences between functional and non-functional requirements. In the third paragraph, discuss how a security professional may impact a project through NFR and “bake in security.” Be sure to provide at least 1 citation from the text or scripture.

Review the i.,ussion Assignment Instructions prior to posting. You may also click the three dots in the upper corner to Show Rubric.
Post-First: This course utilizes the Post-First feature in all Discussions. This means you will only be able to read and interact with your classmates’ threads after you have submitted your thread in response to the provided prompt.

Review the Information regarding GitHub installation tutorials. Explain the installation process of GitHub in detail.

DISCUSSION ESSAY

There are many Dev Ops Tools. Select two tools that you like the best. Provide information on how it works and why you think they are the most useful for Developers.

Note: For 1st question, please write minimum 650-800 words answer

Review the Information regarding GitHub installation tutorials. Explain the installation process of GitHub in detail.

Note: For 2nd question, please write minimum 3-4 pages