Premium Essay

Cis Web Gaming

In:

Submitted By bdkohn
Words 734
Pages 3
COMP-274
Week 1 Homework Assignment
Week 1 Reading:

Lecture Java and C++ Similarities Chapter 1: Introduction to Computers, Programs, and Java Sections 1.5, 1.6, 1.7, 1.8, 1.9 Chapter 2: Elementary Programming Sections 2.3, 2.7, 2.11, 2.13, 2,15, 2.16, 2.18 Chapter 3: Selections Sections 3.16, 3.17, 3.18, 3.19 Chapter 4: Loops Section 4.10 Chapter 5: Methods Sections 5.2, 5.3, 5.8, 5.9, 5.10, 5.11 Chapter 6: Single Dimensional Arrays Sections 6.1, 6.2, 6.5, 6.6
Create a Word document containing the answers to all the problems given below.

1. What is the Java source filename extension? What is the Java bytecode filename extension?

Java Source filename extension is .java Java Bytecode will be stored in .class filename

2. Write a Java statement to display the string “The value is 100” to a user in a plain dialog box.

import javax.swing.JOptionPane;

public class ValueMessage
{
public static void main (String[] args) { JOptionPane.showMessageDialog(null, “The value is 100”); }
}

3. What is the command you would use to compile the file Addition.java?

Javac

4. What is the command you would use to execute the Addition class?

Java

5. What does a Java class contain that identifies it as a Java application?

A Main Method

public static void main(String args[])

6. Write a Java statement that declares a constant called MAX which has a value of 1000.

Final int MAX = 1000

7. How do C++ chars differ from Java chars?

The char in C++ is an 8-bit type that uses the ASCII character set while Java is a 16-bit type that uses the Unicode character set.

8. Given a double variable called dval, write a single Java statement to prompt the user

Similar Documents

Free Essay

Cis 333 Asignment 2

...Identifying Potential Risk, Response, and Recovery during Gaming Software Development Bandon Wilson Professor Ali Abedin CIS 333 November 25, 2014 Internet bots, also known as web robots, WWW robots or simply bots, are software applications that run automated tasks over the Internet. Typically, bots perform tasks that are both simple and structurally repetitive, at a much higher rate than would be possible for a human alone. The largest use of bots is in web spidering, in which an automated script fetches, analyzes and files information from web servers at many times the speed of a human. Each server can have a file called robots.txt, containing rules for the spidering of that server that the bot is supposed to obey. In addition to their uses outlined above, bots may also be implemented where a response speed faster than that of humans is required for example, gaming bots and auction-site robots or less commonly in situations where the emulation of human activity is required, for example chat bots. Recently bots have been used for search advertising, such as Google AdSense. (Juusi, 2012) Internet bots are also commonly used in games such as RuneScape, despite the fact that it's not allowed. RuneScape has now known bots as illegal and you will receive a fine of $500-$2,500. Another, more malicious use of bots is the coordination and operation of an automated attack on networked computers, such as a denial-of-service attack by a botnet. Internet bots can also...

Words: 1003 - Pages: 5

Free Essay

Waze

...Phone et Symbian. Elle fournit aux conducteurs des mises à jour en temps réel sur la circulation routière, et leur délivre d’autres informations fiables sur les embouteillages, accidents de la route, etc. Cela en utilisant la plate-forme sociale sur laquelle les utilisateurs eux-mêmes sont ceux qui créent les cartes et délivrent les informations, et en ajoutant du divertissement et du géo-gaming. Au plus les utilisateurs s’en servent, au mieux ça marche. Son innovation repose sur l’usage des données obtenues en crowdsourcing pour le système de navigation, une combinaison qui transforme ce service de navigation en plate-forme sociale. En décembre 2011, le nombre d’utilisateurs de Waze a atteint 10 millions dans le monde entier, et propose ses services dans 100 pays. Waze a remporté le Prix Mobile Premier Award de l’innovation en 2010. 2 1. LE CONTEXTE SOCIETAL Il existe plusieurs phénomènes sociaux qui ont permis l’émergence de Waze. Ceux-ci sont la hausse du trafic routier au niveau mondial, l’augmentation de l’utilisation des smartphones et l’émergence d’un nouvel Internet : le web 2.0, qui a introduit le contenu généré par les utilisateurs. 1.1. Le trafic routier comme macro-tendance L’augmentation de la congestion du trafic routier n’est qu’une partie de la macrotendance qui est la croissance de la population mondiale. Le nombre de voitures en 2010 s’élève à plus de 750 millions dans le monde : «Ce parc de véhicules croît...

Words: 3434 - Pages: 14

Premium Essay

Pc Gaming

...CIS 10 | PC Gaming | | Ryan Mills 4-24-2014 | PCs are a good choice for gaming for a multitude of reasons, including but not limited to price, reparability, upgradability, value, versatility, performance, game selection, game prices, and more. Computers are an ever-evolving platform. It grows in power, capability, and value almost every single year. The cause of this improvement is partially because it is free of control from any single entity. Rather than being regulated by a single company, control and improvement influence over the PC belongs to everyone equally. Everybody has the freedom to create and/or sell software and hardware for it. It's being constantly improved by competing companies and individuals all over the hardware spectrum, and all of them are trying to offer you (and game developers) the best experience possible. A common misconception is that pc gaming is more expensive than consoles. It is not. Especially if you only plan to target console performance. There are already graphics cards available on the market for $150 that surpass the PS4 and XBox One in terms of frame rate, resolution, detail, value, and power draw. A lot of people incorrectly believe that you have to spend upwards of $750-$1000 to get a PC fully capable of handling games. These inaccuracies can be attributed partially to the highly vocal and misinformed masses, and to the availability and hype of the expensive PC hardware we see advertised a lot. You see it more because it's...

Words: 2894 - Pages: 12

Premium Essay

Apple Inc. Group Case

...Group Case Group #8 The Information Technology Industry MAN4720-011 GLOBAL STRATEGY AND POLICY Fall 2014 CRITICAL CASE ISSUES: (CI #1) INTERNAL ENVIRONMENT: Leadership The change in leadership led to changes in the internal environment and marketing strategies. (CI #2) ECONOMIC: Domestic Market Apple (iOS capable) phones are losing market share to Android capable phones. (CI #3) EXTERNAL ENVIRONMENT: Foreign Markets The Apple Corporation is criticized for manufacture issues and the lack of ability to acquire market share from foreign competitors overseas. (CI #4) SOCIAL ENVIRONMENT: Technological The Apple Corporation constantly faces criticism for various technological and security issues. I. CURRENT SITUATION A. CURRENT PERFORMANCE 2013 was a rough year for the Apple Corporation, closing the fiscal year down 29.1%. Despite the record breaking release of the iPhone 5S and 5C and a total revenue of $170 Billion, up 9.55%, net income was only $37 Billion, down 11.25% from the previous year. The Apple Corporation’s market share in smartphones was only 12.9% and 18% in application downloads. The Apple Corporation controls only a relatively small section of the computer market, but its market share has grown with the decrease in sale of windows machines. B. STRATEGIC POSTURE 1. Mission a. As of 2013: “Apple designs Macs, the best personal computers in the world, along with OS X, iLife, iWork and professional software...

Words: 10734 - Pages: 43

Free Essay

Peripheral

...A peripheral is a piece of computer hardware that is added to a host computer, i.e any hardware except the computer, in order to expand its abilities. More specifically, the term is used to describe those devices that are optional in nature, as opposed to hardware that is either demanded or always required in principle. The term also tends to be applied to devices that are hooked up externally, typically through some form of computer bus like USB. Typical examples include joysticks, printers and scanners. Devices such as monitors and disk drives are not considered peripherals when they are not truly optional. Some people do not consider internal devices such as video capture cards to be peripherals because they are added inside the computer case; for them, the term peripherals is reserved exclusively for devices that are hooked up externally to the computer. It is debatable however whether PCMCIA cards qualify as peripherals under this restrictive definition, because some of them go fully inside the laptop, while some, like WiFi cards, have external appendages. Due to these considerations, the term has somewhat fallen out of modern usage; it was mainly used in the early days of the home computer boom to refer to things like floppy disk drives and modems. Today most devices are integrated inside the computer's case, and external devices typically function on their own such as mp3 players and cell phones. The term is different from computer accessories: Computer peripheral has...

Words: 1333 - Pages: 6

Premium Essay

Effect of Social Networking on Academic Performance

...begin to engage in person-to-person conversation at these websites. They appear in many forms like blogs, microblogs, forums and many others. Facebook, Twitter and Tumblr are one of the many social networks that are well-known. The potential for computer networking to facilitate newly improved forms of computer-mediated social interaction was suggested early on. Efforts to support social networks via computer-mediated communication were made in many early online services, including Usenet, ARPANET, LISTSERV, and bulletin board services (BBS). Many prototypical features of social networking sites were also present in online services such as America Online, Prodigy, CompuServe, ChatNet, and The WELL. Early social networking on the World Wide Web began in the form of generalized online communities such as Theglobe.com (1995), Geocities (1994) and Tripod.com (1995). Many of these early communities focused on bringing people together to interact with each other through chat rooms, and encouraged users to share personal information and ideas via personal webpages by providing easy-to-use publishing tools and free or inexpensive webspace. Some communities - such as Classmates.com - took a different approach by simply having people link to each other via email addresses. In the late 1990s, user profiles became a central feature of social networking sites, allowing users to compile lists of "friends" and search for other users with similar interests. New social networking methods were developed...

Words: 3098 - Pages: 13

Premium Essay

Best Buys

...Best Buy Corporation - S. Bensen, A. El Haddi, K. Fitzsimmons, A. Hussein, H. Marotske -- UST EMBA [1] “Best Buy Corporation: Strategic Management Analysis” S. Bensen, A. El Haddi, K. Fitzsimmons, A. Hussein, H. Marotske Strategic Management University of St Thomas, College of Business Executive MBA program, Cohort 62 Abstract Best Buy’s news coverage of the last few years has been consistently negative. The company’s performance and reputation suffered greatly. Its Earnings per Share fell by more than 200% in 2012 alone. These negative events were the result of governance problems, a changing market landscape (cloud computing, music streaming, online purchasing, online gaming, etc.) and a significant leadership turnover in a period of crisis. The company’s value stream is in a state of flux and could be said to be a master of none at this time. This paper presents strategies to deal with these problems by creating a strategic road map that will first stabilize Best Buy and eventually put it on a growth path. As a result of our analysis, we recommend that the company employs new strategies that include growing its online business by capitalizing on Geek- Squad’s expertise and exploring an internal fix-it strategy with the development of a compelling mission and vision. Finally, we recommend that BB explore the formation of an alliance with its rivals and leverage opportunities presented by new markets. 1. INTRODUCTION The purpose of this paper is to examine Best...

Words: 4483 - Pages: 18

Premium Essay

Opsec and Terrorism

...OPSEC in Warfare and Terrorism “The enemy aggressively "reads" our open source and continues to exploit such information for use against our forces. Some soldiers continue to post sensitive information to internet websites and blogs, e.g., photos depicting weapon system vulnerabilities and tactics, techniques, and procedures. Such OPSEC violations needlessly place lives at risk and degrade the effectiveness of our operations.” Peter Schoomaker (1). Operations Security (OPSEC), while a relatively recent term, is an operations enabler that has been practiced in varying degrees throughout history. This document will explore the history of OPSEC as it’s known today, discuss the process and its role in disrupting the capabilities of adversarial forces using multiple collection and planning models and examine the rapidly advancing technical capabilities of threat vectors. OPSEC as a concept was developed during the Vietnam War under the command of Admiral Ulyssess Sharp. The mission of the newly-established “Purple Dragon” team was to determine how the enemy was able to gather information on military operations (2). The team was able to understand the need to alter tactics and procedures to reduce an adversary's ability to make educated predictions based on the knowledge of routines (3). Post-war OPSEC was formally established as a national program when President Ronald Regan signed the National Security Decision Directive Number...

Words: 5936 - Pages: 24

Free Essay

Office Equiptment

...Accounting Equipment An electronic calculator is a small, portable, often inexpensive electronic device used to perform both basic and complex operations of arithmetic. Modern calculators are more portable than most computers, though most PDAs or mobile phones are comparable in size to handheld calculators and may soon replace them. The first solid state electronic calculator was created in the 1960s, building on the extensive history of tools such as the abacus, developed arou nd 2000 BC; and the mechanical calculator, developed in the 17th century. It was developed in parallel with the analog computers of the day. Pocket sized devices became available in the 1970s, especially after the invention of the microprocessor developed by Intel for the Japanese calculator company Busicom. An adding machine was a class of mechanical calculator, usually specialized for bookkeeping calculations. In the United States, the earliest adding machines were usually built to read in dollars and cents. Adding machines were ubiquitous office equipment until they were phased out in favor of calculators in the 1980s and by personal computers beginning in about 1995. The older adding machines were rarely seen in American office settings by the year 2010. A spreadsheet is an interactive computer application program for organization and analysis of information in tabular form. Spreadsheets developed as computerized simulations of paper accounting worksheets. The program operates on...

Words: 3224 - Pages: 13

Premium Essay

Aceptable Use Policy

...ACCEPTABLE USE POLICY (AUP), v 1.4, 6 January 2012 Reference: AR 25-2 (Information Assurance). A well-protected DoD/Army network enables organizations to easily handle the increasing dependence on the Internet. For a DoD/Army organization to be successful, it needs to integrate information that is secure from all aspects of the organization. The purpose of this policy is to outline the acceptable use of computer equipment within a DoD/Army organization. These rules are in place to protect the employee and the organization. Inappropriate use exposes DoD/Army units to risks including attacks, compromise of network systems and services, and legal issues. This policy applies to all employees, contractors, consultants, temporary employees, and other workers assigned to the DoD/Army organizations. 1. Understanding. I understand that I have the primary responsibility to safeguard the information contained in the Secret Internet Protocol Router Network (SIPRNET) and/or Non-secure Internet Protocol Router Network (NIPRNET) from unauthorized or inadvertent use, modification, disclosure, destruction, and denial of service. 2. Access. Access to this network is for official use and authorized purposes and as set forth in DOD Directives 5500.7-R, Joint Ethics Regulation (JER), AR 25-2 (Information Assurance) and Army network policy and accreditation. 3. Revocability. Access to Army Information Systems resources is a revocable privilege and is subject to content monitoring and security testing...

Words: 3671 - Pages: 15

Premium Essay

Chapter 4 Managing Marketing Information to Gain Customer Insights

...Part 1: Defining Marketing and the Marketing Process (Chapters 1–2) Part 2: Understanding the Marketplace and Consumers (Chapters 3–6) Part 3: Designing a Customer-Driven Strategy and Mix (Chapters 7–17) Part 4: Extending Marketing (Chapters 18–20) 4 Marketing Information to Gain Managing Customer Insights Chapter Preview In this chapter, we continue our exploration of how marketers gain insights into consumers and the marketplace. We look at how companies develop and manage information about important marketplace elements: customers, competitors, products, and marketing programs. To succeed in today’s marketplace, companies must know how to turn mountains of marketing information into fresh customer insights that will help them deliver greater value to customers. Let’s start with a good story about marketing research and customer insights in action at P&G, one of the world’s largest and most re- spected marketing companies. P&G makes and markets a who’s who list of consumer megabrands, including the likes of Tide, Crest, Bounty, Charmin, Puffs, Pampers, Pringles, Gillette, Dawn, Ivory, Febreze, Swiffer, Olay, Cover Girl, Pantene, Scope, NyQuil, Duracell, and dozens more. The company’s stated purpose is to provide products that “improve the lives of the world’s consumers.” P&G’s brands really do create value for consumers by solving their problems. But to build meaningful relationships with customers, you first have to understand them and how...

Words: 26161 - Pages: 105

Premium Essay

Microsoft Study

...Environmental Analysis The information technology (IT) industry has always been highly driven by innovations in technology. It is dynamic and highly competitive, with frequent changes in both technologies and business models. Each industry shift is an opportunity to conceive new products, new technologies, or new ideas that can further transform the industry and businesses. The following PESTEL analysis will try to gain an understanding of Microsoft’s business potential, future market situation and the direction of its operation. The political, economic, social, technological, environmental and legal factors are six components of PESTEL analysis. Table 1: PESTEL Analysis of IT industry | Political * Restrictions on foreign recruitments * Regulations to education * Regulations to the industry * Regulations at emerging markets | Economic * Fluctuations and unpredictable behaviours of foreign currency * Trade cycles * Economic growth rates (around the world) * Disposable income level of people * Demand and supply...

Words: 7080 - Pages: 29

Premium Essay

Cola Wars

...Robert Ronec PMP, PMOP, CSM, ITIL v3, CSSGB +1.704.779.0072 | robert@ronec.com PROFILE A dynamic, certified IT program and project manager, with broad expertise in all phases of project lifecycle planning and implementation. Highly skilled in solving complex engineering, operations and technology problems, along with managing budgets, risk and vendors. Extensive experience in bridging technology and business goals to provide productive solutions. Expertise in managing and working on large-scale development, rollouts, implementations, and migration projects. Depth of experience complemented by international leadership of large outsourcing and infrastructure projects. Diverse experience in many industries including technology, finance, entertainment, and consulting. Natural leader with the unique ability to empower and motivate teams. Big picture focus and flawless execution. Proven areas of expertise include: • Budget planning/management • Negotiations with clients & vendors • IT systems integration • Relationships development management • Software development/implementation • Program/Project management • Vendor Selection & Management • Proposal/project planning and WBS development • Global Project Team • Risk assessment/management • IT service management • Configuration/Asset Management QUALIFICATION HIGHLIGHTS • A tried and tested “hands-on” IT PM professional with experience in IT, ITSM, ERP, QA, Strategy Development, Process Improvement, Team...

Words: 4744 - Pages: 19

Premium Essay

Kjhgfd

...A REPORT ON MOBILE MARKETING Submitted by Aatish Khemka INTRODUCTION Mobile marketing is marketing on or with a mobile device, such as a cell phone. One definition comes from marketing professor Andreas Kaplan who defines mobile marketing as "any marketing activity conducted through a ubiquitous network to which consumers are constantly connected using a personal mobile device". Within this definition, Kaplan uses two variables, i.e. the degree of consumer knowledge and the trigger of communication, to differentiate between four types of mobile marketing applications: Strangers, Victims, Groupies, and Patrons. Mobile marketing can also be defined as “the use of the mobile medium as a means of marketing communication”, the “distribution of any kind of promotional or advertising messages to customer through wireless networks”. More specific definition is the following: “using interactive wireless media to provide customers with time and location sensitive, personalized information that promotes goods, services and ideas, thereby generating value for all stakeholders". Mobile marketing is commonly known as wireless marketing, although viewing advertising on a computer connected to a home local area network is not considered to be mobile marketing. Mobile Marketing involves communicating with the consumer via cellular (or mobile) device, either to send a simple marketing message, to introduce them to...

Words: 4624 - Pages: 19

Premium Essay

Information System

...information security, database management, and decision support systems. Information Management deals with the practical and theoretical problems of collecting and analyzing information in a business function area including business productivity tools, applications programming and implementation, electronic commerce, digital media production, data mining, and decision support. Communications and Networking deals with the telecommunication technologies. Information Systems bridges business and computer science using the theoretical foundations of information and computation to study various business models and related algorithmic processes within a computer science discipline.[4][5][6][7][8][9][10][11][12][13][14] Computer information system(s) (CIS) is a field studying computers and algorithmic processes, including their principles, their software and hardware designs, their applications, and their impact on society[15][16][17] while IS emphasizes functionality over design.[18] Any specific information system aims to support operations, management and decision making.[19] In a broad sense, the term is used to refer not only to the information and communication technology (ICT) that an organization uses, but also to the way in which people interact with this technology in support of business processes.[20] Some authors make a clear distinction between information systems, computer systems, and business processes. Information systems typically include an ICT component but...

Words: 5388 - Pages: 22