Understanding of the concepts from the cmis

Assignment Help Basic Computer Science
Reference no: EM131489261

Final Project

This assignment demonstrates your understanding of the concepts from the CMIS 141 class.

Before attempting this project, be sure you have completed all of the reading assignments, hands-on labs, discussions, and assignments to date.

Design a Java application that will read a file containing data related to the US. Crime statistics from 1994-2013. The description of the file is at the end of this file. The application should provide statistical results on the data including:

a. Population growth in percentages from each consecutive year (e.g. 1994-1995 calculation is ((262803276 - 260327021)/260327021)*100 = 0.9512%, 1995-1996 would be ((265228572 - 262803276)/262803276)*100 = 0.9229%)

b. Years where the maximum and minimum Murder rates occurred.

c. Years where the maximum and minimum Robbery rates occurred.

d. Total percentage change in Motor Vehicle Theft between the years 1998 and 2012.

e. Three (3) additional crime statistics results you add to enhance the application functionality.

The following are some design criteria and specific requirements that need to be addressed:

a. Use command line arguments to send in the name of the US Crime Data file.

b. You should also use Java classes to their full extent to include multiple methods and at least two classes

c. You are not allowed to modify the Crime.csv Statistic data file included in this assignment.

d. Use arrays and Java classes to store the data. (Hint: You can and should create a USCrimeClass to store the fields. You can also have an Array of US Crime Objects.)

e. Your design should include multiple classes to separate the functionality of the application.

f. You should create separate methods for each of the required functionality. (e.g. getMaxMurderYear() will return the Year where the Murder rate was highest. )

g. A user-friendly and well-organized menu should be used for users to select which data to return. A sample menu is shown in run example. You are free to enhance your design and you should add additional menu items and functionality.

h. The menu system should be displayed at the command prompt, and continue to redisplay after results are returned or until Q is selected. If a user enters an invalid menu item, the system should redisplay the menu with a prompt asking them to enter a valid menu selection

i. The application should keep track of the elapsed time (in seconds) between once the application starts and when the user quits the program. After the program is exited, the application should provide a prompt thanking the user for trying the US Crime Statistics program and providing the total time elapsed.

Here is sample run:

java TestUSCrime Crime.csv

********** Welcome to the US Crime Statistical Application ************************** Enter the number of the question you want answered.  Enter 'Q' to quit the program :

1. What were the percentages in population growth for each consecutive year from 1994 - 2013?

2. What year was the Murder rate the highest?

3. What year was the Murder rate the lowest?

4. What year was the Robbery rate the highest?

5. What year was the Robbery rate the lowest?

6. What was the total percentage change in Motor Vehicle Theft between 1998 and 2012?

7. What was [enter your first unique statistic here]?

8. What was [enter your second unique statistic here]?

9. What was [enter your third unique statistic here]?

Q. Quit the program

Enter your selection: 2

The Murder rate was highest in 1994

Enter the number of the question you want answered.  Enter 'Q' to quit the program :

1. What were the percentages in population growth for each consecutive year from 1994 - 2013?

2. What year was the Murder rate the highest?

3. What year was the Murder rate the lowest?

4. What year was the Robbery rate the highest?

5. What year was the Robbery rate the lowest?

6. What was the total percentage change in Motor Vehicle Theft between 1998 and 2012?

7. What was [enter your first unique statistic here]?

8. What was [enter your second unique statistic here]?

9. What was [enter your third unique statistic here]?

Q. Quit the program

Enter your selection: 5

The Robbery rate was lowest in 2013

Enter the number of the question you want answered.  Enter 'Q' to quit the program :

1. What were the percentages in population growth for each consecutive year from 1994 - 2013?

2. What year was the Murder rate the highest?

3. What year was the Murder rate the lowest?

4. What year was the Robbery rate the highest?

5. What year was the Robbery rate the lowest?

6. What was the total percentage change in Motor Vehicle Theft between 1998 and 2012?

7. What was [enter your first unique statistic here]?

8. What was [enter your second unique statistic here]?

9. What was [enter your third unique statistic here]?

Q. Quit the program

Enter your selection: Q

Thank you for trying the US Crimes Statistics Program.

Elapsed time in seconds was: 32

The google recommended Java style guide, provided as link in the week 2 content, should be used to format and document your code. Specifically, the following style guide attributes should be addressed:

  • Header comments include filename, author, date and brief purpose of the program.
  • In-line comments used to describe major functionality of the code.
  • Meaningful variable names and prompts applied.
  • Class names are written in UpperCamelCase.
  • Variable names are written in lowerCamelCase.
  • Constant names are in written in All Capitals.
  • Braces use K&R style.

Reference no: EM131489261

Questions Cloud

User and account management and training : In your role as information security consultant, create a strategy for an effective user training, access, and account management program.
How did such a rapid change happen : China's Thirst for Gas: Hurricanes in the Gulf of Mexico, deteriorating pipelines in Alaska, and conflict in Iraq can cause gasoline prices to rise.
Definite versus indefinite loops : Describe one (1) scenario not mentioned in the textbook in which it would be advantageous for you to use a definite loop as opposed to an indefinite loop.
Maximum possible forward price : In what sense is $3.316 (= 3 × e0.10) a maximum possible forward price?
Understanding of the concepts from the cmis : This assignment demonstrates your understanding of the concepts from the CMIS 141 class.
What principal is owed immediately following the payment : What principal is owed immediately following the 6th payment?
What are portfolio weights of each stock : What are the portfolio weights of each stock?
Example of nondiversifiable risk : Which one of the following is an example of a nondiversifiable risk?
Describe the budget of the alabama agency : Describe the budget of the agency by addressing the Financial Summary, Department Budgets, Funding, Capital Projects and Debt Administration.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Configuration in a workstation environment

Explain the need for DHCP configuration in a workstation environment and why companies might use DHCP over static addressing at the desktops.  Be sure to include devices that may be statically addressed within this environment.

  Approach for solving algebraic word problems

Question: In your own words, describe a step-by-step approach for solving algebraic word problems.

  A subclass of an abstract class does not provide implement

f a subclass of an abstract class does not provide implementation code for all the abstract methods of its superclass, it too becomes an _______

  Reverse a sixteen-bit binary number by lc program

How to reverse a 16-bit binary number by LC-3 program? Program should assume that the word to be reversed is stored in memory location x3100.

  Find the maximum size of the send and receive windows

Find the maximum size of the send and receive windows, the number of bits in the sequence number field (m), and an appropriate time-out value for the timer.

  What career opportunities are available in computer industry

An IT consultant is a professional who draws upon his or her expertise in a specialized area of computers and provides computer services to clients.

  Explain activities of business modeling discipline

Activities of business modeling discipline study the information needs of user, the ways in which those requirements are being.

  What are the three characteristics of an ideal primary key

Identify the three major tasks for transforming a data model into a database design.

  Design implement and test a class that represents a phone no

The class will have observers that enable each data member to be retrieved, and transformers that allow each data member to be changed. An additional observer should be provided that compares two phone numbers for equality.

  Corporate social responsibility

Corporate Social Responsibility does not always help companies' achieve their strategic objectives. Provide an example and provide at least three reasons to support this position.

  Show the risk mitigation strategy

Each member selects one of the highest risks. Explain why these are considered high risk, and explain their potential effect on the project and outline a risk mitigation strategy for the each of the selected high risks.

  Design the control with multiplexers

The state diagram of a control unit is shown in Fig. P8-10. It has four states and two in-puts. x and y. (a) Draw the equivalent ASM chart, leaving the state boxes empty. (b) Design the control with multiplexers.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd