Nt1330 Unit 9 Final Project

Improved Essays
Isolate Prices Project

My program runs as follows first displays the local start time, which would be the current time and would work as almost like the starting point of stopwatch. We than have a vector which is where all the input files information is stored. After, the vector is created we have to fill the vector with the information from the input files. Then we read all the data from the vector and output into 2 files. Lastly the end time is display with the elapsed time.
I created a Stock class which contains the private member variables and the public constructors, destructors and accessor functions, that will be used. After my Stock class is created the function definition are displayed. In the function definitions, the definitions are used to retrieve the date from the vector after the vector is created.
…show more content…
In the void function named fill vector will store the data from the input files. There’re seven strings which are used to hold the input files lines. I used ifstream to input all the files from the input directory. Then there is a while loop that would check if the opened file is good, then its used to retrieve each line and word. After I only store ticker name, date, open price, close price and push them back to the vector for each input file and after I closed and cleared each file. All 25 files date retrieve using this void function. Now we have the print vector function, which will output all of the information from the vector. In this function there is two ofstreams one that is Open prices and the other that is Close prices, in the streams are directories where the files will be outputted. Next there is a for loop that will allow to display by the vector’s size. Now we us the streams open price and close price to output the date, ticker name, open price and close price into their corresponding

Related Documents

  • Improved Essays

    Nt1310 Unit 1 Case Study

    • 1039 Words
    • 5 Pages

    Amazon 5 Bullet Points: MONITOR LOVED ONES OR PATIENTS REMOTELY: Receive instant alerts when a loved one or patient exits the chair to enabling you to provide immediate assistance to reduce falls and prevent injuries. EASY SET UP: Easy to use sensor pad connection is wireless for convenience and portability for use in different settings. Alarm is easily reset by reapplying pressure to the sensor pad or turning off the alarm setting. COMFORTABLE WATERPROOF PAD:…

    • 1039 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    Nt1310 Unit 4 Case Study

    • 424 Words
    • 2 Pages

    Utilizing the information from the table above the mean, median and standard deviation will be calculated. The mean equals the average of the sample by adding all the values of the samples and then dividing by the total number of items. The mean for the samples collected is 14.87 ounces which rounded up 14.9 ounces.…

    • 424 Words
    • 2 Pages
    Improved Essays
  • Decent Essays

    1. Name two creatures that have been discovered since you were born. Titi Monkey and Dumbo Octopus have been discovered since I was born. 2. How tall would a redwood be compared to you right now?…

    • 317 Words
    • 2 Pages
    Decent Essays
  • Decent Essays

    Hi Marcos, That's no problem; I'm always happy to help! You can access and download the required files using the credential's below. Once you access the FTP server, you will find a “FreeFlyer_Releases” folder that contains the most recent version of FreeFlyer, FreeFlyer 7.1.1. Within that subfolder you can select the bitness version installed on your system and access the "Extras" folder. Once you're in the folder then you will find a "Network Licensing" folder that will contain an lmadmin folder from which you can download and save freeflyr.exe to your system.…

    • 115 Words
    • 1 Pages
    Decent Essays
  • Great Essays

    Nt1330 Unit 3

    • 1174 Words
    • 5 Pages

    Secure Shell (SSH) In this paper, I will discuss the network protocol Secure shell, better known as SSH. Interest in choosing this protocol came from my frequent use of SSH to run applications on the remote servers in Coover Hall. Because of this, I will be exploring the details on how the protocol works, vulnerabilities associated with it and mitigation techniques put in place to counter attacks. SSH is a Cryptographic Network Protocol created to replace Telnet.…

    • 1174 Words
    • 5 Pages
    Great Essays
  • Decent Essays

    Nt1310 Unit 2

    • 234 Words
    • 1 Pages

    1. Who will participate in the evaluation? The person that will participate in this evaluation is my cousin. 2.…

    • 234 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    Nt1330 Unit 2

    • 369 Words
    • 2 Pages

    Based on the findings obtained from the analysis of security information then compiled recommendations for improvement of the condition of the company. Some recommendations are: 1. Describe in detail the confidentiality agreement and specifically including maintaining the confidentiality of the password 2. Reexamination of the access rights of each and updating access rights in case of transfer of part or advancement in accordance with their respective access rights. 3.…

    • 369 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Nt1310 Unit 3

    • 271 Words
    • 2 Pages

    -------------------------------------------------------------------------------- Security ( show explanationhide explanation ) This is a public or shared computer Select this option if you are connecting from a public computer. Be sure to log off and close all browser windows to end your session.…

    • 271 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Nt1320 Unit 2

    • 866 Words
    • 4 Pages

    2. D H C I J E K A B F G 4. SQL-92 was a major revision and was structured into three levels: Entry, Intermediate, and Full.…

    • 866 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Task 1 In Unix/Linux operating system a user can have root access or not, the root access provides complete access to user of a system. There are some following risks to have a single root user on Unix/Linux operating system. Easy to hack: If any security error broke the security then a hacker can get the access of all data and can get the whole control of hardware. It allow to retrieve all files and data without root access.…

    • 1228 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    Nt1330 Unit 3

    • 483 Words
    • 2 Pages

    Microsoft was the one to develop Active Directory. Directory services are provided by Active Directory to windows domain network. It stores all the information related to files, users, resources and computers. It places them in proper hierarchal logical groupings. It uses this information to provide the right access and authority to the right user.…

    • 483 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Application / Files sharing between computers Windows Homegroup Windows home networking has been extremely complicated to configure in the past, but Homegroup is easy to set up. Just create a Homegroup from the Homegroup option within Windows Explorer (File Explorer on Windows 8) and you’ll get a password which enables you to access fromyour nearby computers and they can join your Homegroup. The other members of the Homegroup will now have access to your shared files when they log ON to the same network — then you may select the libraries whichever you want to share while you create a Homegroup. Dropbox LAN Sync Many people exchange files between their computers by synchronising them with any one of the cloud storage solutions like Dropbox, Google Drive, or SkyDrive. This can take a while — the file first gets uploaded to your cloud storage provider’s servers and then it gets downloaded back to your other computers.…

    • 457 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    ASSIGNMENT QUESTIONS: 1. What is the regulation or law that you would propose? Be very specific in the wording. (This will be your own idea and written in your own words). (20 points) Answer:…

    • 672 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Nt1310 Unit 2

    • 241 Words
    • 1 Pages

    1. Education for All Handicapped Children Act- Education for all Handicapped Children Act is also referred to as Public Law (PL) 94-142. This act was passed in 1975 ensuring equal access to education for all students, including students with physical and mental disabilities (Connolly, 1989). 2. Individuals with Disabilities Act (IDEA) – IDEA is a statute which entitles all students with a disability educational services to meet their unique needs (Zirkel, 2013). 3.…

    • 241 Words
    • 1 Pages
    Improved Essays
  • Brilliant Essays

    3. What are the necessary journal entries for the quarters ending December 31, 20X9, and March 31, 20Y0? Case 2: Assembly Lines Incorporated (ALI) is a public company with a calendar year-end. In its current fiscal quarter, ending September 30, 20X9, it entered into a sales agreement with Candy Maker International (CMI). Under the sales agreement, ALI is selling an assembly line system to CMI that consists of the following three components: • Mixer Segment…

    • 1851 Words
    • 8 Pages
    Brilliant Essays