My code wont print results then im trying to print the tallest player name and a

My code wont print results then im trying to print the tallest player name and age with their height and inchest my code: import java.util.ArrayList;
import java.util.List;
import java.util.Scanner;
public class Project1 {
private static Player tallestPlayer;
public static void main(String[] args) {
try (Scanner scanner = new Scanner(System.in)) {
List players = new ArrayList<>();
System.out.println(“Enter the number of players:”);
int numPlayers = scanner.nextInt();
for (int i = 0; i < numPlayers; i++) { System.out.println("Enter player " + (i+1) + " information:"); System.out.print("Name:"); String name = scanner.next(); System.out.print("Height (feet):"); int feet = scanner.nextInt(); System.out.print("Height (inches):"); int inches = scanner.nextInt(); System.out.print("age:"); int age = scanner.nextInt(); players.add(new Player(name, new Height(feet, inches), age)); } double totalAge = 0; for (Player player : players) { totalAge += player.getAge(); } double averageAge = totalAge / players.size(); System.out.println("Average age: " + averageAge); Player tallestPlayer = players.get(0); for (int i = 1; i < players.size(); i++) { Player player = players.get(i); int totalFeet = player.getHeight().getFeets(); int totalInches = player.getHeight().toInches(); if (totalFeet > tallestPlayer.getHeight().getFeets() || (totalFeet == tallestPlayer.getHeight().getFeets() && totalInches > tallestPlayer.getHeight().toInches())) {
tallestPlayer = player;
}
}
}
System.out.println(“tallest player: ” + tallestPlayer.getName());
}
}
class Height {
private int feet;
private int inches;
public Height(int feet, int inches) {
this.feet = feet;
this.inches = inches;
}
public int toInches() {
return feet * 12 + inches;
}
public int getFeets() {
return feet;
}
@Override
public String toString() {
return feet + “‘:'” + inches;
}
}
class Player {
private String name;
private Height height;
private int age;
public Player(String name, Height height, int age) {
this.name = name;
this.height = height;
this.age = age;
}
public String getName() {
return name;
}
public Height getHeight() {
return height;
}
public int getAge() {
return age;
}
@Override
public String toString() {
return “Name: ” + name + “, Hectaight: ” + height.toString() + “, Age: ” + age;
}
}

From Unit 2, PowerPoint Presentation in part 2, run all the queries in DB Browse

From Unit 2, PowerPoint Presentation in part 2, run all the queries in DB Browser. Save each query as instructed in the following video. When finished with your assignment, submit the three following files:
The database file ( .db format)
The SQL scriipt file. ( a .sql file)
A “screenshot” file showing the results of the SQL scriipt. (a Word or PDF file)
Add a comment to name your queries according to the slide number as instructed in the following video. Begin the comment with — (two hyphens)
Example:
— Slide 19
SELECT SUM(ExtendedPrice) AS WaterSportsRevenue
FROM ORDER_ITEM
WHERE SKU IN
(SELECT SKU
FROM SKU_DATA
WHERE Department = ‘Water Sports’);
To view the results of a specific query, select the query you want to execute and then click on the execute button. This will show the output related to the selected query.
Capture a screenshot of the entire DB browser window, including the query and its output.
Combine the screenshots by copying and pasting them into a single Word document file. Afterward, submit the file in either Word or PDF format.
Guidelines
Include the following:
Include your last name in the filename (example: Unit-5 ASLab Smith.).
The database file should be in .db format.
The SQL scriipt file should be in SQL (.sql) format.
The screenshot file should be in either Word or PDF format.

The first project involves modifying the attached lexical analyzer and the compi

The first project involves modifying the attached lexical analyzer and the compilation listing generator code. You need to make the following modifications to the lexical analyzer, scanner.l:
1. The following reserved words should be added: else, elsif, endfold, endif, fold, if, left, real, right, then Each reserved words should be a separate token. The token name should be the same as the lexeme, but in all upper case.
2. Two additional logical operators should be added. The lexeme for the first should be | and its token should be OROP. The second logical operator added should be ! and its token should be NOTOP.
3. Five relational operators should be added. They are =, <>, >, >= and <=. All of the lexemes should be represented by the single token RELOP. 4. One additional lexeme should be added for the ADDOP token. It is binary operator – that is the subtraction operator. 5. One additional lexeme should be added for the MULOP token. It is/ that is the division operator. 6. A new token REMOP should be added for the remainder operator. Its lexeme should be %. 7. A new token EXPOP should be added for the exponentiation operator. Its lexeme should be ^. 8. A new token NEGOP should be added for the unary minus operator. Its lexeme should be ~. 9. A second type of comment should be added that begins with -- and ends with the end of line. As with the existing comment, no token should be returned. 10. The definition for the identifiers should be modified so that underscores can be included, however, no more than two consecutive underscores are permitted, but leading and trailing underscores should not be permitted. 11. One additional type of integer literal should be added, which are hexadecimal integers. The begin with the # character followed by one of more decimal digits, or the letter A-F, in either upper or lower case. 12. A real literal token should be added. It should begin with a sequence of zero or more digits following by a decimal point followed by one or more additional digits. It may optionally end with an exponent. If present, the exponent should begin with an e or E, followed by an optional plus or minus sign followed by one or more digits. 13. The definition for the character literals should be modified so that five additional escape characters are also allowed: 'b', 't', 'n', 'b' and 'f'.

Prompt: In response to your peers, select one of the situations described by a p

Prompt: In response to your peers, select one of the situations described by a peer and think about a way that you could increase the overall security measures of the situation. Use a systems thinking approach, and think outside of the box!
PEER POST # 1
Symmetric encryption requires less computational complexity, it uses one key to encrypt and decrypt and the key is shorter in length as compared to asymmetric encryption. This makes symmetric encryption the most efficient and reliable option for large transfers of data such as emails, files, securing communication through closed systems and VPN’s. It’s also widely compatible with most hardware and software. Asymmetric encryption utilizes two keys, one public to encrypt and the other private to decrypt. This can slow down efficiency due to the use of more than one key but is considered more secure for that very reason. Asymmetric encryption is best suited for applications such as block chain transactions, banking, digital signatures and authentication. However, it is more practical to use both, the data or message can be encrypted with symmetric encryption while the session key or signature can be encrypted with asymmetric. PEER POST # 2
Symmetric encryption utilizes a single key for process of decryption and encryption. Symmetric encryption is said to be faster for both encryption and decryption as only one key is utilized, this allows for this process to be both fast and efficient. A situation where this is most appropriately used is when sending data over a secure network within a corporation. This allows for larger amounts of data to be transmitted not only faster but also strong security as they within their own network. Asymmetric encryption utilizes two keys, one for the process of decryption, and one for the process of encryption. With speed in mind asymmetric encryption is obviously slower and not as efficient. Asymmetric encryption does however offer greater security as it has both a public key for encryption and a private key for decryption. This would more appropriately be used when sending an email or signing a document as it assists the the verification of identity.

Prompt: In your responses to your peers, provide feedback on their explanations.

Prompt: In your responses to your peers, provide feedback on their explanations. Your feedback should be constructive and should address the following:
How do their posts help clarify the concepts for you?
What in their posts causes confusion for you?
What other information could your peers have included in their responses?
PEER POST # 1
Most banks will fall into multiple categories of digital business models. Traditionally banks will use the omnichannel model to provide access to its services through multiple means, such as online, in-person, over the phone, and through a mobile app. However they also cover other models such as becoming ecosystem drivers by offering services for major life events. The customer relationship management process for a financial institution is based on building the trust of their clients. Financial institutions must analyze both the speed at which users can receive their data, and they level of security that is perceived by those users. This could be seen through the actions of users or by things like user surveys. I think that financial institutions should pay close attention to analytics, but not be trapped in them. Analytics don’t always tell the full story, so financial institutions need to remain flexible in their processes so they can tailor their business model to fit with changing circumstances. PEER POST # 2
Banks and financial companies are taking full advantage of advancing technologies to improve their business models. By switching to an all online model they are able to immediately respond to customer requests and provide better services. With insurance companies all the information you need is included in the app and it is relatively easy to file claims on your phone, at least from my experience. Customer relations are a little different than how they used to be. Companies are able to tailor there products to more diverse audiences, in my banking app you can customize and change what is on the homepage so each person can pick and choose what is important to them instead of just having a basic layout. In my opinion the most important business processes involve adaptability and transparency. In todays society people want to know about the ethics and direction that a company has before making decisions. Personally I will never use Bank of America because they have a history of not taking care of customers and constant data breaches. Since we are able to see companies shortcomings extremely easy they need to prove they can keep up and treat employees correctly. Frequent reviews and innovations will allow companies to stay with the pace of the digital world and will help them provide good value that will keep customers returning.

Prompt: For your response posts, address the following: 1. Compare and contrast

Prompt: For your response posts, address the following:
1. Compare and contrast your answers to further everyone’s understanding of technology and the lens of history.
PEER POST # 1
Technology is increasingly prominent in shaping society in today’s rapidly evolving world. However, to truly understand the impact of technology on our lives, it’s essential to examine it through the lens of history. Tracing the historical roots of technological advancements and their societal implications can give us valuable insights into the complex relationship between technology and society.
A compelling example of how history enriches our understanding of technology’s role in society is the current debate surrounding privacy concerns in the era of digital surveillance. One recent news event that echoes historical parallels is the controversy surrounding government surveillance programs, such as the NSA’s mass collection of digital communications data.
A relevant historical counterpart to this issue can be found in the widespread surveillance practices employed by governments during the Cold War era, exemplified by programs like COINTELPRO in the United States. By examining past surveillance and its impact on society, we can draw parallels to contemporary debates and understand how technological advancements have amplified both the benefits and risks of surveillance.
News Link: https://www.eff.org/nsa-spying
Looking through the history lens helps us connect and analyze current and historical events by providing context and perspective. By understanding the historical evolution of technology and its societal implications, we can identify recurring patterns, anticipate potential consequences, and make more informed decisions about the role of technology in our lives.
Analyzing the relationship between history, culture, and technology has profound implications for various disciplines, professions, and personal experiences. In academia, studying this relationship fosters interdisciplinary approaches that bridge the gap between technology and the humanities, enabling scholars to explore the cultural, ethical, and social dimensions of technological innovation.
In professional settings, such as technology development or policy-making, an understanding of history and culture helps practitioners anticipate the societal impact of their work, mitigate potential risks, and design more inclusive and ethical solutions. Moreover, for individuals navigating the digital age, historical insights provide a deeper understanding of the forces shaping their technological landscape, empowering them to evaluate new technologies and advocate for positive societal change critically.
PEER POST # 2
Analyzing the role of technology through a historical lens can greatly enhance my understanding of its impact on society. By looking back at how technologies have developed and been adopted in the past, we can gain insights into the patterns and trends that shape our current technological landscape. Understanding the historical context of technological advancements can also help us appreciate the significance of these innovations and the challenges they have overcome.
One current event involving technology with a historical counterpart is the rise of cryptocurrencies, such as Bitcoin, and its impact on financial systems. The concept of digital currencies has historical roots in early attempts to create digital cash, such as eCash and DigiCash in the 1990s. By examining these past efforts, we can better understand the challenges and opportunities facing cryptocurrencies today, such as regulatory issues, security concerns, and adoption barriers.
Analyzing the relationship between history, culture, and technology can profoundly influence my cybersecurity and social engineering discipline. By understanding the historical context of security breaches and cyberattacks, I can better anticipate future threats and develop more effective security strategies. Additionally, considering the cultural implications of technology can help me design more user-friendly and culturally sensitive security solutions.

Module 01: Reflection Blog- Cybersecurity Threats (What you need to know to stay

Module 01: Reflection Blog- Cybersecurity Threats (What you need to know to stay Safe Online)
Module 01 Table of Contents
Purpose
It is important to understand the possible cyber threats you may encounter while working online. By understanding the possible threats you will be prepared to keep yourself and your data safe in an online environment.
Directions
Write a blog post (2 paragraph minimum for each step) to reflect on your learning experience and how you are planning to apply what you learned. Label each paragraph with the appropriate title with Part 1 or Part 2 of the Blog. Note: You will not see anyone’s post until you post first. Blog Topic
There are two parts to this exercise, be to complete both parts. Part 1: Watch a video and demonstrate knowledge #1: Watch the video below about Cybersecurity and Crime:
Part 1: #2: Write a blog post to answer ALL the questions below (2 paragraph minimum). What three threats are mentioned in the video? Explain these threats.
What steps should you take to stay safe while working online?
Blog organizational hints:Label Part 1, #2. Please include the question in your text. Part 2: Apply knowledge and reflect (2 paragraph minimum)
Have you experienced, or come close to experiencing, a potential threat with viruses or phishing while working online? Explain how you were able to tell and what steps you took to avoid or solve the problem.
If you have not experienced a virus, worm, trojan, or phishing, what safeguards have you taken to avoid this experience?
Blog organizational hints:Label Part 2. Discuss either “Have you” or “If you have not”
Please include the question in your text. Grading TasksPoints
Part 1: Knowledge (minimum 2 paragraphs) 12.5 points
Part 2: Reflection (minimum 2 paragraphs) 12.5 points
Total25

The first project involves modifying the attached lexical analyzer and the compi

The first project involves modifying the attached lexical analyzer and the compilation listing generator code. You need to make the following modifications to the lexical analyzer, scanner.l:
1. The following reserved words should be added: else, elsif, endfold, endif, fold, if, left, real, right, then Each reserved words should be a separate token. The token name should be the same as the lexeme, but in all upper case.
2. Two additional logical operators should be added. The lexeme for the first should be | and its token should be OROP. The second logical operator added should be ! and its token should be NOTOP.
3. Five relational operators should be added. They are =, <>, >, >= and <=. All of the lexemes should be represented by the single token RELOP. 4. One additional lexeme should be added for the ADDOP token. It is binary operator – that is the subtraction operator. 5. One additional lexeme should be added for the MULOP token. It is/ that is the division operator. 6. A new token REMOP should be added for the remainder operator. Its lexeme should be %. 7. A new token EXPOP should be added for the exponentiation operator. Its lexeme should be ^. 8. A new token NEGOP should be added for the unary minus operator. Its lexeme should be ~. 9. A second type of comment should be added that begins with -- and ends with the end of line. As with the existing comment, no token should be returned. 10. The definition for the identifiers should be modified so that underscores can be included, however, no more than two consecutive underscores are permitted, but leading and trailing underscores should not be permitted. 11. One additional type of integer literal should be added, which are hexadecimal integers. The begin with the # character followed by one of more decimal digits, or the letter A-F, in either upper or lower case. 12. A real literal token should be added. It should begin with a sequence of zero or more digits following by a decimal point followed by one or more additional digits. It may optionally end with an exponent. If present, the exponent should begin with an e or E, followed by an optional plus or minus sign followed by one or more digits. 13. The definition for the character literals should be modified so that five additional escape characters are also allowed: 'b', 't', 'n', 'b' and 'f'.

A.10 python template # TODO; My functions def main(): # TODO; Test my funct

A.10 python template # TODO; My functions
def main():
# TODO; Test my functions
pass
if __name__ == “__main__”:
main()
DD.10 Follow the instructions in A/DD.10 and record your designs for each of the problems in your Design Document. Make sure to:
List each design in a clearly marked section indicates which question the design belongs to.
For each design make sure to note any details about the question that are relevant to your design, such as the inputs, outputs, any required displays.
Also make sure to detail your tests including all inputs and outputs you’d expect to see.
Each problem should have a detailed plan which outlines step-by-step how you get the required outputs from the provided inputs.
If you divide any problem into smaller algorithms, make sure to detail all of the information for those designs as well.
As a rule of thumb, your designs should include enough detail that anyone else could take your design and implement the same solution without confusion. If you’re questioning if a design is clear enough, ask a TA if they understand your work!
A/DD.10
It’s tax season (boo)! While we’ve been rushing around getting everything ready to file that mess, we’ve noticed that we have quite a few receipts from eating out and ordering food — more than a few, really… Well, okay, there’s a ton of receipts here, perhaps too many. That has us wondering how much we spent on food during the last few months of last year. Instead of fighting with all that paper like some old-time accountant, we’ve decided to use the computer to do those calculations for us!
To start, we’ve already created several CSVs that contain data related to this task. Each of these CSVs has four columns that describe some data related to our purchase:
A unique location ID as an integer.
The subtotal of the purchase as a float.
The tax as a percentage from 0.0 to 1.0.
The amount we added as a tip.
Many receipts only had a little more information, so we have to go off of only these four pieces of data to determine what we’re interested in: the total we spend at each location. For each row in each of our receipt CSVs, we can calculate the total cost of that purchase using this formula:
total=subtotal+(subtotal×tax)+tiptotal=subtotal+(subtotal×tax)+tip
We frequent a few places, so expect multiple rows with duplicate IDs. We’ll need to design a way to account for this as we get the sum of our repeated purchases all under a single ID.
Having a whole bunch of numeric identifiers is fine, but weirdly abstract numbers are a computer thing, not a human thing, so we’ve gone through and found all of the proper names for a whole bunch of the identifiers. We’ve stored this data in another CSV file with two columns, one for the ID and the other for a string name. That CSV file will always have unique IDs for each row, but there might be more IDs than we have receipts. We are sure that our receipts will always have a valid entry on this list, so searching this list for a particular ID is how our program can determine the name of the location we care about when showing our report.
Speaking of, we’ve had some free time to write a function that prints our final data, which is already given below. We’ll want to modify that function so it writes to a text file instead so we can run our program many times with different receipts and see all of the details later.
Our task is this:
Complete the functions listed below to expose the true horror of how much we’ve spent on dining! Before starting our design, note the requirements for each function and the formats we should expect the CSVs to be in. Note that some information (or even the functions themselves) may be helpful for later functions!
Example Files:
The following are some example files you can use with your application. The “places.csv” can be used with load_locations, and the rest can be used with load_receipts and load_many_receipts.
places.csv
receipt_sep.csv
receipt_oct.csv
receipt_nov.csv
1.) Find (for a 2D list)
Design and implement the function find_2d, which will take a 2D list and a value to find in that 2D list. For every row, the value should be checked against the first entry in the list. Return the index of the first matching value; otherwise, return -1 if the value was not in the list. You may assume that if the input list has rows, it will always have rows of at least length one.
2.) Load Locations
Design and implement the function load_locations, which will take a filename to a locations CSV, read its data, and return a 2D list containing all of the identifiers and names of locations we expect to see in the receipts. The output 2D list should follow the same column order as the CSV.
3.) Load Receipts
Design and implement load_receipts, a function which will take a filename to one of our receipt CSV files, read its data, and will return a 2D list that contains the identifier for a locations and the total sum of all entries for that identifier in this single file. Note that many rows might have the same identifier, but our output list should properly sum all of those together into a single entry. For example, if the input to our function looks like this:
id,subtotal,tax_percent,tip
1111,20.00,0.05,5.00
2222,36.50,0.10,7.25
1111,10.00,0.05,3.00We expect to get a list that looks similar to:
[[1111, 39.5],[2222, 47.4]]4.) Load Many Receipts
We’ll want to make a function that is able to take several filenames for receipts and calls the previous function on each one, so design and implement load_many_receipts, which takes a list of receipt filenames along with the locations filename and does just that. This function shouldn’t return anything, and instead call the function below to save our calculations to a file. Be aware that we will have to merge the data from each call to load_receipts so that the location identifiers in one file don’t overwrite the data from another!
5.) Write Report
Finally, we’ll need to have a way to save our data. Thankfully, we’ve already done some of this with the write_report below, but we’ll need to change it so that it appends data to report.txt instead of just printing things out.
def write_report(fn: str, data: list[list], places: list[list]) -> None:
“””Writes out the final report for this set of data.
Args:
fn (str): The filename to append to.
data (list[list]): A 2D list of receipt record data.
places (list[list]): A 2D list of identifiers and locations names.
“””
# Print the very front of the record
print(“****************************************n”)
print(“Total Records:” + str(len(data)) + “n”)
# For each entry in the data list
for i in range(len(data)):
row = data[i]
# Print out the name of the location this row represents
print(places[find_2d(places, row[0])][1])
# Print out the total amount spent at this location
print(“t$” + str(row[1]) + “n”)Hints and Notes
You may assume that the CSV files will always start with their header row and will always contain data that follows the specified format.This means that you don’t have to worry about casts of the appropriate type failing when converting from strings.
Every location identifier seen in a receipt will be in the locations CSV at some point.
The receipt and location data loaded from the CSVs will not be in any particular order.
All input filenames will be valid.
You can use the provided write_report as-is while developing!
Errata
For the example given in load_receipts, previously the first row of data was being ignored instead of only the header row. Only the resulting value in the output was changed.