IT 204 Final Project Guidelines and Rubric


The final project for this course is the creation of a database proposal and implementation plan report that will address the needs of a given scenario. The purpose of this assessment is to assess the students’ understanding of simple database structure, functions, and terminology from an information management perspective.

You are to design a simple database framework that addresses the needs of Birchwood Lane Schools and the development of a strategy for implementing that database. Your submissions will include the relational database model you have designed, including diagrams (e.g., Microsoft Visio), a plan for implementation, and a persuasive presentation to stakeholders, in this case the Birchwood Lane School Board. The persuasive presentation will build off the work completed for this database proposal and implementation plan report and is due in Module Eight. For more details about the presentation, reference the “Final Presentation Guidelines and Rubric” document in the Assignment Guidelines and Rubrics section of the course.

The project is supported by four formative milestones, which will be submitted at various points throughout the course to scaffold learning and ensure quality final submissions. These milestones will be submitted in Modules Two, Three, Four, and Five. The final submission of your database proposal and implementation plan report will occur in Module Seven.

At the end of your degree program experience, you will develop a portfolio that will provide a clear representation of your mastery of program outcomes, skills, and abilities. The artifact that is suggested for use from this course is the case needs analysis section of your proposal and plan. It is strongly recommended that you save this document in a place where it can be accessed again at a later date.


This assessment will evaluate your mastery with respect to the following course outcomes:

· Apply the appropriate terminology of the realm of data and information management to real-world scenarios

· Develop and address complete and valid data requirements for business cases

· Design and plan to implement a simple relational data model using standard database management methods

· Differentiate between the uses, benefits, and limitations of commonly used tools and technologies in data and information management

· Present database management proposals in a persuasive manner given the needs of specific audiences


You will be developing your submissions (a relational database model, and plan for implementation) around the following scenario: Birchwood Lane Schools currently records all student, instructor, and course data on paper. To meet state and federal requirements, Birchwood Lane Schools must implement an application system that records all student, course, and instructor data electronically. You will design a DBMS model and develop a strategy for implementation, which you will flesh out in a comprehensive written report.

Current data needs include the following:

1. Student data (full name, full address, phone, email, birthdate, enrollment date, graduation date, courses taken, courses currently enrolled)

2. Instructor data (full name, full address, phone, email, birthdate, hire date, courses taught, courses currently assigned)

3. Course data (course name, course start date, course end date, course category, instructor, students)

Each student and instructor may have multiple addresses, each student may be enrolled in multiple courses during a term, and each instructor may teach multiple courses during a term.

Specifically, the following critical elements must be addressed in your submission:

I. Case Needs Analysis: Determine the data requirements of Birchwood Lane Schools.

a. What data from the scenario is needed for the database and why?

b. To what extent is additional information needed to develop complete data requirements? II. Relational Database Model

a. Based on the requirements you have determined, design a relational database model. Be sure to include applicable entities and proper relationship mapping.

b. Develop a logical database model based on the entities present in your visual conceptual database model.

BI. Database Selection: Select an appropriate DBMS (Oracle, IBM DB2, MS SQL Server, or an open-source database) for Birchwood Lane Schools andexplain your reasoning.

a. Why did you choose this DBMS? Be sure to lists all uses, benefits, and limitations for each of the following: data size limit, purchase cost, administration, operating system/hardware and requirements, features, and performance/scalability. What differentiates your selection from other selections?

b. To what extent are there additional or alternative technologies that might assist Birchwood Lane Schools in managing its data? Compare these technologies in terms of their applicability to the needs of Birchwood Lane Schools.

IV. Implementation Plan: Outline a process for implementing the new database.

a. Be sure to include all relevant information and steps.

b. Are there additional pieces of information necessary to develop a full plan for implementation or that may impact implementation success? For example, these could include DBMS management requirements, man hours, or data input.


Milestone One: Group Discussion: Defining the Audience

In task 2-3, you will submit your contribution to a small group collaborative discussion exploring how you would want to present the information to different audiences that will view the presentation. Now, who specifically is your target audience? In other words, who are the consumers? Describe the types of people who will read the report and presentation. What will they do with the material? What kind of evidence do you use to support your ideas? Finally, imagine you are making this presentation to a chief information officer (CIO). How do you present the information differently? In responding to your classmates, comment on approaches that you may not have considered. What makes you believe in these approaches? Why is using evidence important? This milestone is graded with the Discussion Rubric.

Milestone Two: Group Discussion: Business Case for the Database Framework

In task 3-2, you will submit your contribution to a small group collaborative discussion exploring the business case for the final project. Explain your perspective on the need for the new approach to managing data via a database management system and modeling data according to standards. Why does Birchwood Lane Schools need a database? Begin to develop ideas for a logical database model. Include your personal experience, and consider the diversity of perspectives from your group. In your response, comment in detail on your view of their approach and how your view is similar to or different from theirs. Highlight your view of the business value (or lack of value) of database management to Birchwood Lane Schools, and address the issue of data collection. This milestone is graded with the Discussion Rubric.

Note: You will submit an individual proposal in Module Four for your final project that includes the case needs analysis and your conceptual database model. Usethis discussion to finalize your ideas.

Milestone Three: Proposal Draft

In task 4-3, you will submit to the instructor a two- to three-page individual proposal as a Word document. In your proposal, you should include the first two elements of your project: case needs analysis and the relational database model. Use what you have discussed in your collaborative groups to finalize your proposal. This milestone will be graded using the Milestone Three Rubric.

Milestone Four: Data and Database Management System (DBMS) Comparisons Wiki

In task 5-2, you will compare different DBMS components in the Data and Database Management System (DBMS) Comparisons Wiki. For this milestone, you are going to discuss the attributes to consider for selection of an appropriate DBMS for the Birchwood Schools. That is, what are the needed attributes? This task will be done in a whole class wiki so the whole class can view all the ideas. You should view all the posts before finalizing your recommendations for your individual proposal. The wiki is graded with the DMBS Comparisons Wiki Rubric.

Final Submission: Database Proposal and Implementation Plan—Individual Report

In task 7-2, you will submit your database proposal and implementation plan report. The report should be a complete, polished artifact containing all of the critical elements of the final product. It should reflect the incorporation of feedback gained throughout the course. This submission is graded with the Final

Project Rubric.


MilestoneDeliverablesModule DueGrading
1Group Discussion: Defining the AudienceTwoGraded separately; Discussion Rubric
2Group Discussion: Business Case for theThreeGraded separately; Discussion Rubric
Database Framework
3Proposal DraftFourGraded separately; Milestone Three Rubric
4Data and Database Management SystemFiveGraded separately; DBMS Comparisons Wiki Rubric
(DBMS) Components Wiki
Final Submission: Database Proposal andSevenGraded separately; Final Project Rubric (in this document)
Implementation Plan Report

Final Project Rubric

Guidelines for Submission: Written components of project must follow these formatting guidelines when applicable: double spacing, 12-point Times New Romanfont, 1-inch margins, and discipline-appropriate citations. The written proposal report must be between 5 and 10 pages, not including cover page, diagrams, or resources.

Instructor Feedback: This activity uses an integrated rubric in Blackboard. Students can view instructor feedback in the Grade Center. For more information,review these instructions

Critical ElementsExemplary (100%)Proficient (85%)Needs Improvement (55%)Not Evident (0%)Value
Case Needs AnalysisMeets “Proficient” criteria, andDevelops complete and validDevelops data requirementsDoes not develop data20
delivery of data requirements isdata requirements forthat are not complete or are notrequirements
conciseBirchwood Lane Schoolsvalid
Conceptual ModelMeets “Proficient” criteria, andVisual conceptual model clearlyVisual conceptual model doesVisual conceptual model does10
model is organized simply andillustrates all applicable entitiesnot clearly illustrate the entitiesnot illustrate the entities and
intuitivelyand relationships as required byand relationships indicated byrelationships relevant to
the determined datathe determined datadetermined requirements, or no
requirementsrequirementsvisual conceptual model exists
Logical DatabaseMeets “Proficient” criteria andThe key elements of the entitiesThe key elements of the entitiesSubmission does not include a10
Modelthe logical database model isillustrated in the conceptualare not logically parsed outlogical model based on the
clearly and simply organizedmodel are parsed out logicallyconceptual model
Database SelectionMeets “Proficient” criteria, andDatabase selection is supportedSubmission lacks substantialSubmission lacks an explanation20
reasoning evidences keenwith an in-depth explanation ofexplanation of uses, benefits,of database selection
insight into the world ofthe uses, benefits, andand limitations over other
information technologylimitations over other optionsoptions
Additional orMeets “Proficient” criteria, andComparatively evaluatesComparatively evaluatesDoes not comparatively15
Alternativeevaluation is concise andadditional or alternativeadditional or alternativeevaluate additional or
Technologiesappropriate for the targettechnologies in terms of howtechnologies, but not in termsalternative technologies in
audiencethey could meet the needs ofof applicability to the needs ofterms of how they could meet
Birchwood Lane SchoolsBirchwood Lane Schoolsthe needs of Birchwood Lane
ImplementationMeets “Proficient” criteria, andSubmission includes a step-by-Submission fails to address theThere are gaps in the step-by-15
Outlineoutline is organized in a mannerstep plan for implementationrequirements forstep process that impede
that shows keen insight into thethat is logically organized andimplementation in accordanceunderstanding of the
nuances of successfuladdresses all the identifiedwith the needs of the scenario,implementation outline, or
implementationrequirementsconceptual model, and logicalthere is no implementation
Articulation ofSubmission is free of errorsSubmission has no major errorsSubmission has major errorsSubmission has critical errors10
Responserelated to citations, grammar,related to citations, grammar,related to citations, grammar,related to citations, grammar,
spelling, syntax, andspelling, syntax, or organizationspelling, syntax, or organizationspelling, syntax, or organization
organization and is presented inthat negatively impactthat prevent understanding of
a professional and easy-to-readreadability and articulation ofideas
formatmain ideas
"Our Prices Start at $11.99. As Our First Client, Use Coupon Code GET15 to claim 15% Discount This Month!!"


Write the pseudocode using modules and show how your module will be called for the following example:

BMI is often used to determine whether a person is overweight or underweight based on height and weight. The calculation uses the following formula:

BMI = Weight x 703/Height2

Design a program that calculates and displays a person’s body mass index (BMI).

Your 3-4 page document must include:

  • Pseudo code for the entire program.
  • Internal documentation, using block and/or line comments.
  • You must declare all variables before using them in your pseudo code. Don’t forget that variables are just names. You need to assign values to variables. For example:
    Set price = 20
    Set dollars = 2.75
  • Your pseudo code must illustrate all calculations and modules called.

Create a flowchart showing how your module will be called for the BMI example from your Module 03 lab:

BMI is often used to determine whether a person is overweight or underweight based on height and weight. The calculation uses the following formula:

BMI = Weight x 703/Height2

Design a program that calculates and displays a person’s body mass index (BMI)

Your submission must include:

  • You may use Microsoft Visio or http://draw.io/ to create your flowchart and export the drawing as a JPG. Paste your image in your Word document with your pseudo code. Use File >> Export As >> Image.

  • Your flowchart must depict each step in the program, as well as the module.
  • Your flowchart must use 3 types of symbols: ovals (start and end terminal symbols), parallelograms (input and output symbols), and rectangles (processing symbols).
  • All symbols must be connected by arrows that represent the flow of the program. The flow must make logical sense.
"Our Prices Start at $11.99. As Our First Client, Use Coupon Code GET15 to claim 15% Discount This Month!!"

Write A Research Paper That Explains How Defense-In-Depth And Awareness Are Complimentary Techniques To Detect Emerging Threats And Strengthen Countermeasures.

 Your final research paper assignment is to write a research paper that explains how defense-in-depth (chapter 6) and awareness (chapter 10) are complimentary techniques to detect emerging threats and strengthen countermeasures. 

To complete this assignment, upload a Microsoft Word document (.doc or .docx) that contains your complete paper. You must also upload a pdf of EVERY reference that you cite in your paper. Remember that your list of sources must be in APA format, and you MUST cite your reference in the body of the paper using APA in-text citation format. A source is any paper or article that you will reference in your paper. If you need more information on APA format (for references list AND in-text citations), visit this reference: https://owl.english.purdue.edu/owl/resource/560/01/

Plagiarism detected in your work will result in a grade of zero for the entire paper. 

Here are a few details about the overall research paper Please look at the attached rubric for details on how the paper will be graded. 

You must reference two (4) peer-reviewed articles or papers that support your thesis statement. The final paper must be at least 1000 words in length. (DO NOT exceed 1000 words by a material amount. Excessive words or too many references will NOT impress me.) 

So in summary, here are the research paper requirements:

  • 4 peer reviewed resources (articles or papers) 
  • Paper MUST address:  How defense-in-depth (chapter 6) and awareness (chapter 10) are complimentary techniques to detect emerging threats and strengthen countermeasures
  • Cited sources must directly support your paper (i.e. not incidental references)
  • Provide (upload) a pdf of each paper you cite in your paper
  • At least 1000 words in length (but NOT longer than 1500 words)

If you are not sure how to identify peer reviewed papers or articles, please visit the following resources:


Chapter 6 and 10 pdfs are attached below for your reference.

Please follow the instructions carefully and complete the assignment.

Professor is very strict and hard in grading appreciate your concern on this matter! 


"Our Prices Start at $11.99. As Our First Client, Use Coupon Code GET15 to claim 15% Discount This Month!!"

CMIT 425 Risk Assessment Paper

• From the devices and systems identified in the GFI Corporate Network Topology, conduct a thorough asset inventory, assign monetary values to each asset (quantitative), and assign a priority value for each asset (qualitative) that could be used to determine which assets are most critical for restoral in the event of a catastrophic event or attack.

• Evaluate the perimeter security, make a list of access points internal and external (remote), identify vulnerabilities and make suggestions for improvements to perimeter and network security.

• Evaluate the remote access infrastructure, identify vulnerabilities and suggest security improvements to mitigate risks to remote access.

• Address the COO’s concern over the mobility security and design a secure mobile computing (smart phones, tablets, laptops, etc.) in terms of authentication technologies and data protection.

• Identify wireless vulnerabilities and recommend what safeguards, authentication technologies,and network security to protect data should be implemented.

• Evaluate the authentication protocols and methodologies within the wired, wireless, mobility and remote access environments and suggest improvements to secure authentication forGFI.

• Evaluate the web system protocols and vulnerabilities within the Intranet server and suggest secure protocol improvements to improve security for web authentication.

• Design a cloud computing environment for the company with a secure means of data protection at rest, in motion and in process.

• Assess all known vulnerabilities on each asset in this environment and impacts if compromised.

• Using the asset inventory and the assigned values (monetary and priority) conduct a quantitative and qualitative risk assessment of the GFI network.

• Recommend risk mitigation procedures commensurate with the asset values from your asset inventory. Feel free to redesign the corporate infrastructure and use any combination of technologies to harden the authentication processes and network securitymeasures.

• Provide an Executive Summary.

• You are welcome to make assumptions for any unknown facts as long as you support your assumptions.

• The Title Page, Table of Contents and References page(s) don’t count in your 15 page minimum!!!

"Our Prices Start at $11.99. As Our First Client, Use Coupon Code GET15 to claim 15% Discount This Month!!"

I Need Someone Who Knows In Microsoft 2013 !!! Also, CHECK The Attachments For Each Question To Make It Easy For You.

ENGLISH IS MY SECOND LANGUAGE, SO DON’T MAKE IT SOUND PERFECT. ALSO NO PLAGIARISM PLEASE.I will work with you again if you do what i want exactly.

Q1- On Page 71 of our text are outcomes for Projects 1A and 1B.( half page writing. No sources, just your own words based on what you understand, NO PALGIARISM PLEASE) (SEE ATTACHMENT)

After reading the chapter, which outcomes do you feel are relevant to you?

If you have further questions about these objectives what are they?

Q2- On Page 121 of our text are outcomes for Projects 1A and 1B.(half page writing. No sources, just your own words based on what you understand, NO PALGIARISM PLEASE) ( see attachment)

After reading the chapter, which outcomes do you feel are relevant to you?

If you have further questions about these objectives what are they?

Q3- Complete the following assignments in your textbook: ( NO SOURCES, READ AND WORK, SEE ATTACHMENT FOR EACH ONE)

1.  Project 1E Documentary- page 169.

2.  Project 1F Pitch Festival – page 171.

3.  Project 1G Educational Website – page 173.

View in a new window

Student Data Files for this assignment can be found at Creating Documents With Microsoft Word 2013

"Our Prices Start at $11.99. As Our First Client, Use Coupon Code GET15 to claim 15% Discount This Month!!"

Pseudocode Stack And Queue

The task this week is to complete the following 2 structures using a linked list:

  • Stack
  • Queue

Assume the occurrence of a linked list node is represented by the object “Node” and its “Data” and “NextRef” attributes.

Part 1: Assume a “Head” node exists with the NextRef attribute pointing to the first node in the stack or being null if the stack is empty. Create pseudo code for the following 3 stack methods, showing the logic tied to the inverted list. Include a summary of these actions.  

push( item )
pop( )
display( )

Part 2: Assume “Front” and “Rear” nodes exist with the “NextRef” attributes pointing to the first and last nodes of the queue or being null if the queue is empty. Create pseudo code for the following 3 queue methods, showing the logic tied to the inverted list. Include a summary of these actions.

enqueue( item )
dequeue( )
display( )


  • Pseudo code implemented for both the stack and queue methods
  • Documented pseudo code
  • Add the completed pseudo code and discussion to the Key Assignment template Section 1: Lists, Stacks, and Queues.
"Our Prices Start at $11.99. As Our First Client, Use Coupon Code GET15 to claim 15% Discount This Month!!"

Wk 3 Discussion [Due Mar 2, 2019 Must Have Answer To The Question, And Respond To Three PEERS

  • Review the “Chapter Ten Case: ETSY” at the end of Ch. 10 of Business Driven Technology. Answer the following questions keeping in mind the scenario given on ThreeBirdNest:
  • What operational issues do you see and how could an effective supply chain help with these issues?
  • How can the four supply chain drivers help companies be more effective?
  • What are the advantages and disadvantages of using ETSY to sell to the global marketplace and use its global supply chain?
  • What strategy would you use to evaluate the success of SCM in ETSY?

Respond to at least three of your peers. In your response, address any thoughts you have on supply chain drivers and evaluating the success of SCM in an organization.

Students need to contribute three substantive posts in this discussion by the due date indicated. The substantive posts can be any combination of responses and replies.

Peer 1

Raise Output. Supply chain management (SCM) software is designed in way to improve communication, collaboration and coordination with vendors, transportation and shipping companies, Suppliers and raise bi-directional information flow. By Adopt a demand-driven planning and business operating model based on real-time demand insights and demand shaping. The right prediction and contingency planning tools will ensure a complete view and an effective response to risks such as suppliers going out of business, political upheaval, and natural calamities affecting manufacturing. Companies then can adjust pricing and promotions strategies to shape demand, move additional product quickly, drive revenue growth, or further expand margins for a high-demand product with limited market supply.

Also by using The demands on supply chain managers to rapidly respond to change and increase profitability are greater than ever. The good news is that effective strategies and solutions exist that support each one of the previous five strategies, and they can deliver immediate return on investment. The tools also exist. They have been battle tested, end-to-end, across some of the most valuable supply chains in the world. The way in which companies implement these strategies can mean the difference between success and failure. The tools they use should be low-risk and proven.

Some of the advantages an disadvantages of etsy:

The Pros

  • The opportunity to sell your handmade crafts: Regardless of what type of crafts you sell, you can sell everything on Etsy including woodworking, paintings, crocheting, sewing, floral arrangements, and etc.
  • You can sell craft supplies: You can sell craft supplies and help the crafters to buy the necessary materials to create their products.
  • You can sell eBooks: Etsy allows you to sell eBooks and earn a lot of money at the same time. You can sell patterns, tutorials, and etc.
  • Etsy has low fees: The reason why there are so many sellers on Etsy is because this platform has extremely low fees. For listing a new product you need to pay only 20 cents and your products will be listed for up to 4 months. Once the product is sold, you pay a fee of 3.5% to Etsy and the rest goes to you.
  • Training Courses – If you are a beginner and new in the Etsy environment, you can use the training courses and learn everything you need to know about how to run you Etsy shop.

The Cons

  • No Mass Produced Items – The only disadvantage is that you are not allowed to sell mass produced products.



Peer 2

On the manufacturing side of things, the biggest issue I see is the making sure you have enough raw material on hand to cover orders and being able to keep up with the extra not expected orders. Companies must have a fine balance between having to much on hand but not keeping to much extra. You would also have to have a way to get the material quickly if needed. This can be easily handled with SCM to ensure you do house to much or not enough materials.

On the Supplier side of things, quality of products, making enough material, cost and time for shipping. These can also all be handled by SCM. This will also allow for the price negotiation based on the product and quality of product.

Four supply chain drivers are Back Orders, Inventory Turnover, Customer and Inventory Cycle time. All these metrics help both suppliers and manufactures keep enough inventory on hand to prevent back order while making sure you will not loose any inventory from having to on hand. There is nothing worse than trying to order something and finding out during check out that the item is on back order.

Advantages of Etsy: Easy to setup selling, large customer base and community

Disadvantages of Etsy: Competition and loss of profit because of fees

What strategy would you use to evaluate the success of SCM in ETSY?

Use of KPI and CSF designed for SCM

Analytics and Business Intelligence


Baltzan, P. (2017). Business driven technology (7th ed.).

New York, NY: McGraw-Hill/Irwin.

Peer 3

What operational issues do you see and how could an effective supply chain help with these issues?

  1. Manufacturing Side Issue which can be easily handled with SCM – Plant Management makes operational decision to keep certain items in stock to ensure that production is not halted, this will increase inventory costs.
  2. Supplier Side Issue which can be easily handled with SCM – Management should make operational decision to negotiate with supplier to create a product with higher quality to ensure the quality of the finished product, if we do not have SCM in place then these decisions can cause lot of issues and loss of money.

How can the four supply chain drivers help companies be more effective?

Supply chain capabilities are guided by the decisions you make regarding the five supply chain drivers. Each of these drivers can be developed and managed to emphasize responsiveness or efficiency depending on changing business requirements.

What are the advantages and disadvantages of using ETSY to sell to the global marketplace and use its global supply chain?

Advantages – 1. Large customer base 2.Easy to setup shop 3. Strong community

Disadvantages – 1. Fees 2. Personalize of shop is difficult or not possible 3. Lot of competition.

What strategy would you use to evaluate the success of SCM in ETSY?

  1. Implement Scaled Agile Framework in SCM Implementation. Scaled Agile Framework ties and Organization or Business goals with the Delivery
  2. Data Analysis and Analytic Reports.
  3. Use KPI Metrics and Define CSF’s for SCM Delivery and Implementation.

Reference :

"Our Prices Start at $11.99. As Our First Client, Use Coupon Code GET15 to claim 15% Discount This Month!!"

Ruby Program Homework Help…

The college IT department manager no longer wants to use spreadsheets to calculate grades. The manager has asked you to create a program that will input the teachers’ files and output the students’ grades.  

Write a Ruby program named formatfile.rb, which can be run by typing ruby widgets.rb. 

In your Ruby environment, the program must read an input file formatted in CSV format, named input.csv. Each record contains data about a student and their corresponding grades. 

The data will look similar to the following: 

Student Name, assignment1, assignment 2, assignment 3, assignment 4 

John Adams, 90, 91, 99, 98

Paul Newman, 90, 92, 93, 94

Mary Smith, 95, 96, 99

Be careful to follow the output format exactly, including spacing. The output of your program must look like the following: 

Student Assignment Average

John Adams     94.5 

Compress your files into a ZIP folder. 

Review the readings for this week from Ruby on Rails Tutorial if you have additional questions on deploying Ruby applications. 

Submit the ZIP file.

"Our Prices Start at $11.99. As Our First Client, Use Coupon Code GET15 to claim 15% Discount This Month!!"

Java code


arithmetic using integer and real (floating point) values,

use of integer division and integer remainder (% in Java) operators,

data type conversions (type casting),

decision making using if statements,

using methods to modularize programs, arguments/parameters for communication among methods (class level variables are not allowed in this assignment)

using some String class methods .charAt() .substring() .length()

using Math.round.

The scenario

Your friend Joe the Cashier works the graveyard shift at the local convenience store. His cash register tells him how much change he needs to return to his customer, but he is having trouble figuring out what bills and coins to give to the customer to make up the change due. You have agreed to write a Change Maker program for him. The requirements of this program are discussed below.

Input Data

There is only one item of input data: The change due to the customer. This will be a dollars and cents figure, expressed as a decimal fraction, such as 37.67. This will be stored in a variable of type double.


The output will contain the number of each type of bill and coin to be given to the customer. Some of these numbers could be 0 and those would be omitted from the output. Here is a sample interaction between the program and the user:



We assume that the register contains an ample supply of bills ($20, $10, $5, $1) and coins (quarters, dimes, nickels, pennies) so we can always make up the change due using fewest number of bills and coins. We further assume that $20 is the largest denomination that we will use.

Strategy to solve this problem

First we need the whole numbers of dollars and cents from the real number (that may contain a decimal fraction) representing the change due. So from 37.67 we need to get 37 and 67. A real value can be assigned to an integer

variable (using a cast operator) to extract the whole number part of the real value. The difference between the real value and the whole number part can be multiplied by 100 (round the difference to nearest int) to get the total number of cents. Now we work with the dollars and the cents figures separately. We work from larger to smaller denominations.

We can use a variable to keep track of how many dollars (cents) has not yet been accounted for by the bills (coins) the program has decided to use for change making. I give an example of how the calculation could proceed.

Initially, we have 37 dollars to make change for.

Decide how many $20 bills we need. 37/20 = 1, so we need 1 $20 bill. 37%20 = 17, so we still need to make change for 17 dollars.

Decide how many $10 bills we need. 17/10 = 1, so we need 1 $10 bill. 17%10 = 7, so we still need to make change for 7 dollars.

Decide how many $5 bills we need. 7/5 = 1, so we need 1 $5 bill. 7%5 = 2, so we still need to make change for 2 dollars.

The number of dollars left over at this stage is the number of $1 bills we need.

The numbers of coins of various denominations can be calculated in a similar way.

Nicknames for the bills

The bills are often referred to by the names of the Historical Persons whose pictures appear on them. So a $20 bill is called a Jackson, $10 — Hamilton, $5 – Lincoln, $1 – Washington.

Singular and plural forms of the bill and coin names

The plural form of all the coin/bill names (except “Penny” used for 1¢ coin) can be formed by just adding an ‘s’ to the singular form. But the coin name “Penny”, has the plural “Pennies”. This is handled by checking if the last character in the name is ‘y’. If not, just concatenate an ‘s’ to the end of the singular name to form the plural. Otherwise, form a substring by removing the ‘y’ and add “ies” to that substring to form the plural. We will handle this by defining a method that gives us the plural form from the singular. The output should use the plural form of the bill/coin names when appropriate.

Program organization

The program is to be written using several methods in addition to the “main” method.

main –This method prints the sign-on message and describes its purpose. It then prompts the user to enter the changedue as a double value and accepts the input into a double variable (no validation necessary). It then calculates two integer values (dollars and cents in the change due). It then calls the methods showDollars and showCents with appropriate arguments. Finally it prints the sign-off message.

void showDollars(int) – This method accepts an int parameter representing the whole number of dollars in the changedue. It calculates the numbers of bills of various denominations to be returned and call the last method to print the number and the name for each denomination of bills used.

void showCents(int) – This method is similar to the method above but it deals with the coins to be returned, so itreceives a parameter representing the cents part of the change due.

void showNumberAndName(int, String) – This method receives a number of a particular bill/coin and the name of thatbill/coin as part of returned change. If the number is 0, this method returns without producing any output. If the number is 1 then it prints 1 followed by the name. If the number is > 1 then it prints the number followed by the plural form of the name.

String plural(String) – This method returns the parameter with an ‘s’ added to the end, when the parameter does notend with ‘y’. Otherwise it creates the plural form as described before and returns that.

Structure chart

This is a chart that shows which methods call which other method(s). This chart only includes the methods you need to write. The methods used from the Java system library are not shown here.



showDollars showCents getDouble





Data types for variables: You should have only one double variable in your program to accept the user input. Once thatvalue is used to calculate whole numbers of dollars and cents, all further calculations should use int variables and integer arithmetic only. The methods will need to declare local variables for their use.

How to submit your work

Submit a Word document containing the source code and sample output as before. Please use the Submission template

Word document (isidore Resources) provided to add your source code and output screen shot in appropriate pages.

Another screen shot from the completed program


An issue with Math.round() in Java

Math.round() has two versions: a) a version that accepts a float argument and returns an int value, b) another version that accepts a double argument and returns a long value. Since we mostly use types int and double, we will need to typecast the return value from Math.round(). Use the following as a guide:

int-variable-name = (int)Math.round( double-expression );


* @param args the command line arguments


public static void main(String[] args) {

final Scanner cin = new Scanner(System.in);

// declare double variable to hold input data

// declare int variables to hold whole dollars and cents

// Output identification

out.print(“CPS 150 Assignment 3 by _____YOUR NAME________\n\n”);

// Describe the program’s purpose on output

// dialog with user

// spacing to separate input data and output results


// calculate numbers of dollars and cents in the change

// Result heading

// call the methods showDollars and showCents

// Sign off

out.print(“\nAssignment 3 complete\n\n”);

} // end main

static void showDollars(int dollars) {

// declare variables to holds the numbers

// of bills of different denominations (int)

// calculate numbers of various bills needed

// call method showNumberAndName for each bill type

} // end showDollars

static void showCents(int cents) {

// declare variables to holds the numbers

// of coins of different denominations (int)

// calculate numbers of coins needed

// call method showNumberAndName for each coin type

} // end showCents

static void showNumberAndName(int number, String name) {

// do nothing if number <= 0

if (number <= 0)


// print number and name (use plural form if needed)

} // end showNumberAndName

static String plural(String name) {

// stub (to avoid compiler complaints)

return name;

} // end plural

// utility method getDouble

static double getDouble(String prompt) {


return cin.nextDouble();

} // end method

"Our Prices Start at $11.99. As Our First Client, Use Coupon Code GET15 to claim 15% Discount This Month!!"