IT3349 all units discussions latest 2018 july

Unit 1 discussion Extending and Overriding Two of the main object-oriented features of the Java programming language are the ability to inherit the code of one class, and the ability to override some of the inherited methods to affect a polymorphic behavior. In this discussion, you will explore both of these concepts and how should they be programmed. Unzip the NetBeans project zip file (U1D1_ExtendOverride.zip) and load it into your NetBeans IDE.

Examine the loaded project, and answer these questions:

What would be the output of this program when it is run? Why does calling toString() on the Person and Student objects return their names ("Person" and "Student") while calling toString() on the Employee object returns "Person"? How can we fix this such that calling toString() on the Employee object return its name as well? Provide a screenshot of your result of your fix. Explain, briefly, how you completed this exercise, the algorithm you used (via pseudo code or other description tools), the major issues you faced. and how you solved these issues. Reflect on your experience and what you learned. Response Guidelines Comment on the response of at least one other learner. Learning Components

This activity will help you achieve the following learning components:

Explain algorithms used to complete a fix. Unit 2 discussion Writing to a Text File Reading from and writing to a text file are common tasks in Java programming. Developers often use text files in lieu of databases to store and retrieve the data that a program needs. In this discussion, you will practice writing to a text file from within your Java program. Create a Java program that writes your name and today’s date to a text file called “mytext.txt”. Answer the question, should we use exception if the “mytext.txt” exists when we try to write to it? Why or why not? Provide a screenshot of your result of your work (code + text file). Explain, briefly, how you completed this exercise, the algorithm you used (via pseudo code or other description tools), the major issues you faced, and how you solved these issues. Reflect on your experience and what you learned. Response Guidelines Comment on the responses of at least one other learner. Learning Components

This activity will help you achieve the following learning components:

Perform text input and output to and from a Java application Explain Java exceptions and their types Unit 3 discussion Coloring Four Quadrants of a JavaFX Square Scene JavaFX is a new and exciting framework to develop Java GUI applications. There is always more than one way for completing a GUI task with JavaFX. For this discussion, you practiced using the fundamentals of JavaFX to color the four quadrants of a JavaFX square scene by creating a new JavaFX application that displays a JavaFX square scene divided into four quadrants. Each quadrant should have a different background color. (Example provided in study resources.) Please note: The colors you use are unimportant. The important element is the fact that there are four separate colors in your final product. Provide a screenshot of your result of your work (code + application output). Explain, briefly, how you completed this exercise, the algorithm you used (via pseudo code or other description tools), the major issues you faced, and how you solved these issues. Reflect on your experience and what you learned. Response Guidelines Comment on the responses of at least one other learner. Learning Components

This activity will help you achieve the following learning components:

Explain how to use the Color and the Font classes Explain algorithms used to complete a fix. Unit 4 discussion Handling JavaFX Events The JavaFX framework provides more than one way to handle events. For event handlers, we could use inner classes, anonymous inner classes, or the new Java 8 feature of lambda expressions. In this discussion, you will explore these different ways of writing event handles in JavaFX. To prepare for this discussion, you must unzip the attached NetBeans project zip file (U4D1_HandleEvents.zip) and load it into your NetBeans IDE. The project uses an inner class to handle the click event on the button node. Rewrite the event handler using either an anonymous inner class, or a lambda expression.

In this discussion:

Provide a screenshot of your result of your work (code + application output). Explain, briefly, how you completed this exercise, the algorithm you used (via pseudo code or other description tools), the major issues you faced, and how you solved these issues. Reflect on your experience and what you learned. Response Guidelines Comment on the responses of at least one other learner. Learning Components

This activity will help you achieve the following learning components:

Describe how user actions are handled in a JavaFX application Explain what event-driven programming means Unit 5 discussion Using Generic ArrayList Java generics features ensures strong typing validation at compile time. That is, an object must be of the same type it is expected to be at compile time. Generics are applied extensively in all types of Java collection libraries.

To prepare for this discussion you must:

Create a Java program that declares an instance of ArrayList. Add four elements to your instance representing four of your favorite food items. Print the content of your instance of ArrayList. Provide a screenshot of the result of your work (code + application output). Explain briefly how you completed this exercise, the algorithm you used (via pseudo code or other description tools), the major issues you faced, and how you solved these issues. Reflect on your experience and what you learned. Response Guidelines Comment on the responses of at least one other learner. Learning Components

This activity will help you achieve the following learning components:

Explain what the Java generics feature means and how it is used

4,251views
4.4
(275 ratings)

Related Study Guides

Q-2 | Computer Science homework help

q-2 UnknownpSpoofing attacks involve a malicious actor disguising their identity or masquerading as a trusted entity to gain unauthorized access, manipulate data, or trick users into divulging sensiti...

communicationsociology

DOC660 | General Business in Business - Trident university

DOC660 Innovation and Creativity in Business Module 2 Case PROCESS INNOVATION Assignment Overview In this assignment, you will identify and apply BPR principles to problems within an organization that...

writingenglish-literature

IT3215 | Programming Methods in Computer Science - Capella university

IT3215 Introduction to JavaScript Unit 05 Discussion DQ1 Cookies: Storing and Passing Information On their own, HTML and CSS are unable to store user information, so once the Web browser is closed, an...

communicationart-design

IT3215 | Programming Methods in Computer Science - Capella university

Unit 5 discussion DQ1 Cookies-Storing and Passing Information On their own, HTML and CSS are unable to store user information, so once the Web browser is closed, any user information is lost. Cookies,...

communicationcomputer-science

CIS333 Assignment 1: Creating and Communicating a Security Strategy

4. Develop practices Develop the practices that will be used to ensure the business enforces what is stated in the security policy or policies and standards. Format your assignment according to the fo...

writingcommunication

4 case studies due date today 8pm | Computer Science homework help

4. A mother calls you to report that her 15-year-old daughter has run away from home. She has access to her daughter's e-mail account and says her daughter has a number of emails in her inbox suggesti...

computer-scienceenglish-literature

Project 2: introduction to programming in python | comp 200 | athabasca university

Project 2: introduction to programming in python B56 Introduction The purpose of this project component is to provide a first experience in the actual writing of computer programs. Using a relatively...

computer-sciencewriting

Assignment 1 Securing a Remote Work Environment for a Global Corporation | CSIS 343 - Cybersecurity

3. Home Network Security Guidelines: Develop guidelines for securing home networks to ensure a secure connection for remote employees. Discuss the importance of strong Wi- Fi passwords, router securit...

educationcomputer-science

Need Help With A Similar Question?

Our experts deliver perfect solutions with guaranteed A+ grades

A+
Student Grade
98%
Success Rate
12h
Delivery Time
Join 1,000+ students who got their perfect solutions
Rated 4.9/5 by satisfied students

Need Help With This Question?

Academic Expert

Subject Matter Specialist

98%
Success Rate
24/7
Support

Why Students Trust Us

  • PhD-Level Expertise
  • Original Work Guarantee
  • Better Grade or Free

"Got an A+ on my assignment. Exactly what I needed!"

Recent Student