HND Assignment Brief Session: September 2015
Programme title
BTEC HND in Computing and Systems Development
Unit number and title
41
Programming in Java (L5)
Assignment number & title
1 of 1
Programming in Java (L5)
Unit Leader
DR Gebremichael
Assessor (s)
Yonas Gebremichael and Hassan Baajour
Issue Date
30 Sept 2015
Final assignment submission deadline
28 May 2015 – 09 Sept 2015
Late submission deadline
11 – 16 September 2015
The learners are required to follow the strict deadline set by the
College for submissions of assignments in accordance with the BTEC level 4 – 7 submission guidelines and College policy on submissions. They should also refer to Merit and Distinction criteria that require evidence of meeting agreed timelines and ability to plan and organise time effectively without which the learner may not expect to receive a higher grade.
Resubmission deadline
TBA
Feedback
In-class feedback will be available from draft submissions on a taskby-task basis as a formative feedback and also for initial submission. Final feedback will be available within 2 – 3 weeks of the assignment submission date.
General
Guidelines
1. The work you submit must be in your own words. If you use a quote or an illustration from somewhere you must give the source.
2. Include a list of references at the end of your document. You must give all your sources of information.
3. Make sure your work is clearly presented and that you use readily understandable English.
4. Wherever possible use a word processor and its “spell-checker”.
Internal verifier
Dr. Hasan
Signature (IV of the brief) *
Dr. Hasan
Date
06/05/15
ICON College of Technology and Management
BTEC HND in Computing and Systems Development
(CSD)
Unit41: Programming in Java (L5)
Session: May\Sept 2015
Coursework
Recommended maximum words: 4,000
This Unit will be assessed by assignment and Presentation.
You are strongly recommended to read “Preparation guidelines of the Coursework Document” before answering/solving your assignment.
Scenario:
White Chapel Academy has asked you to develop a Student Information Management System (SIMS). The system shall hold the details of every student and tutor and admin staff in the school as well as storing information about the courses that are available at the school. It shall enable the school staff to enrol students to the school and manage student’s fee payments.
Once the students are enrolled, a system administrator will create classes in the system and allocate date, time and tutor for each class to enrol students to. The system shall also be used for managing students’ class attendance as well as track their progress in the course. The system shall have a facility for registered parents to login and check their sons’ or daughters’ attendance, academic progress, behaviour at school.
When a student first enrols at the school, he or she will receive a timetable with a list of classe ...
The document describes a proposed computerized grading system for Key Way International School. It discusses problems with the current manual system such as errors, redundancy and inefficiency. The proposed system would address these by automating the recording and computation of student grades. It would include modules for student registration, entering grades, and searching/viewing student records and report cards. The system's design, implementation, and coding are also outlined according to a waterfall model. The system aims to reduce teachers' workload and improve the accuracy and timeliness of grading.
This course provides an introduction to learning analytics through four units focused on common techniques in the field. Students will gain hands-on experience using various analytics tools like Tableau, NodeXL, Topic Modeling Tool, and RapidMiner. The course aims to help students better understand how to leverage educational data to improve online and blended learning environments. Students will complete small data analysis projects corresponding to each unit to develop skills in collecting, analyzing, and reporting education data.
This document provides a template for a coursework assignment on usability engineering. It outlines the tasks, learning outcomes, submission requirements, marking scheme, and contact details. The coursework involves designing prototypes, predicting efficiency using a tool, running a user experiment to test a hypothesis, and analyzing the results. Students will complete various sections of a report, submit code and files, and receive feedback on their work. The assignment is peer-assessed and due on March 23rd, with feedback provided by April 17th.
This 3-sentence summary provides the high-level and essential information from the document:
This document outlines a course on scripting for design at Durham College, including prerequisites, course description, learning outcomes, evaluation methods, and policies. Students will learn JavaScript programming and how to use it to enhance web page design and interactivity. Evaluation will include in-class coding reviews, assignments, tests, and individual coding projects assessed based on function, documentation, and style. Course policies address attendance, communication, and academic honesty.
This 3-sentence summary provides the high-level and essential information from the document:
This document outlines a course on scripting for design at Durham College, including prerequisites, course description, learning outcomes, evaluation methods, and policies. Students will learn JavaScript programming and how to use it to enhance web page design and interactivity. Evaluation will include in-class coding reviews, assignments, tests, and individual coding projects assessed based on function, documentation, and style. Course policies address attendance, communication, and academic honesty.
This document provides information about a CIS 170 Introduction to Computer Information Systems course at Valley City State University. The course will introduce students to basic computer concepts like file management, software applications, computer ethics, and Microsoft Office programs. Students will learn to use Word, PowerPoint, and Excel through completing assignments. The final project will incorporate work from individual units into a comprehensive project to demonstrate skills learned throughout the course. The course aims to help students advance their technology knowledge and abilities.
Running head Application of Semester Knowledge .docxtoddr4
Running head: Application of Semester Knowledge 1
Application of Semester Knowledge 3
Demonstrate a connection between knowledge or concepts from the current semester courses (i.e., 1. Security Architecture and Design 2. Business Continuity Planning and Disaster Recovery Planning) and how those have been or could be applied in the work place (assume you are working as a software engineer).
Application of Semester Knowledge
Name
Institution of Affiliation
Date
Throughout this semester, we have learnt and acquired knowledge and skills in the fields of Disaster Recovery planning, Business Continuity Planning and Security Architecture. The knowledge has been of great value to me as a software engineer in my place of work where I was posted recently and has even ensured I was promoted to be part of the board members of the software engineers in the company. This is due to two emergency cases of cyber-attacks that I handled professionally thanks to the prior knowledge I had from our previous semester.
DRP and CRP all fall under business domain. The knowledge acquired in this case help in protecting the company against unauthorized access into the company’s technology , building a technology system that is able to prevent security threatening emergencies and ensuring the business continues in case such disaster befalls the company or business entity. Therefore as a software engineer I was always prepared for the worst rather than just prevention part of it. This involves putting in place practices, preparations and processes that always ensure the continuity and preservation of the company in cases where there are disruptions to the day to day operations of the company or business. Part of the tasks that I was performing as a software engineer therefore involved testing, identification, selection, implementation and updating of specific processes that ensure critical services are not affected by the network disruptions. A good example is in the past month where we realized that some individuals had hacked the customer service system and taken private information of customers and were calling the ignorant ones to disclose their Pass words of mobile banking by claiming to be our agents in this case we revoked the customer services for a few hours and changed the whole system but ensured the other services were available as normal. I led part of the team that built a mobile detector that led us to one apartment within the city where with the help of security agents the culprits were captured with all the laptops and every item they were using including mobile phones.it was after this that we developed a system that would detect whenever somebody wanted to hack the customer service system thus reinstating normalcy in the business.
As a softw.
The document describes a proposed computerized grading system for Key Way International School. It discusses problems with the current manual system such as errors, redundancy and inefficiency. The proposed system would address these by automating the recording and computation of student grades. It would include modules for student registration, entering grades, and searching/viewing student records and report cards. The system's design, implementation, and coding are also outlined according to a waterfall model. The system aims to reduce teachers' workload and improve the accuracy and timeliness of grading.
This course provides an introduction to learning analytics through four units focused on common techniques in the field. Students will gain hands-on experience using various analytics tools like Tableau, NodeXL, Topic Modeling Tool, and RapidMiner. The course aims to help students better understand how to leverage educational data to improve online and blended learning environments. Students will complete small data analysis projects corresponding to each unit to develop skills in collecting, analyzing, and reporting education data.
This document provides a template for a coursework assignment on usability engineering. It outlines the tasks, learning outcomes, submission requirements, marking scheme, and contact details. The coursework involves designing prototypes, predicting efficiency using a tool, running a user experiment to test a hypothesis, and analyzing the results. Students will complete various sections of a report, submit code and files, and receive feedback on their work. The assignment is peer-assessed and due on March 23rd, with feedback provided by April 17th.
This 3-sentence summary provides the high-level and essential information from the document:
This document outlines a course on scripting for design at Durham College, including prerequisites, course description, learning outcomes, evaluation methods, and policies. Students will learn JavaScript programming and how to use it to enhance web page design and interactivity. Evaluation will include in-class coding reviews, assignments, tests, and individual coding projects assessed based on function, documentation, and style. Course policies address attendance, communication, and academic honesty.
This 3-sentence summary provides the high-level and essential information from the document:
This document outlines a course on scripting for design at Durham College, including prerequisites, course description, learning outcomes, evaluation methods, and policies. Students will learn JavaScript programming and how to use it to enhance web page design and interactivity. Evaluation will include in-class coding reviews, assignments, tests, and individual coding projects assessed based on function, documentation, and style. Course policies address attendance, communication, and academic honesty.
This document provides information about a CIS 170 Introduction to Computer Information Systems course at Valley City State University. The course will introduce students to basic computer concepts like file management, software applications, computer ethics, and Microsoft Office programs. Students will learn to use Word, PowerPoint, and Excel through completing assignments. The final project will incorporate work from individual units into a comprehensive project to demonstrate skills learned throughout the course. The course aims to help students advance their technology knowledge and abilities.
Running head Application of Semester Knowledge .docxtoddr4
Running head: Application of Semester Knowledge 1
Application of Semester Knowledge 3
Demonstrate a connection between knowledge or concepts from the current semester courses (i.e., 1. Security Architecture and Design 2. Business Continuity Planning and Disaster Recovery Planning) and how those have been or could be applied in the work place (assume you are working as a software engineer).
Application of Semester Knowledge
Name
Institution of Affiliation
Date
Throughout this semester, we have learnt and acquired knowledge and skills in the fields of Disaster Recovery planning, Business Continuity Planning and Security Architecture. The knowledge has been of great value to me as a software engineer in my place of work where I was posted recently and has even ensured I was promoted to be part of the board members of the software engineers in the company. This is due to two emergency cases of cyber-attacks that I handled professionally thanks to the prior knowledge I had from our previous semester.
DRP and CRP all fall under business domain. The knowledge acquired in this case help in protecting the company against unauthorized access into the company’s technology , building a technology system that is able to prevent security threatening emergencies and ensuring the business continues in case such disaster befalls the company or business entity. Therefore as a software engineer I was always prepared for the worst rather than just prevention part of it. This involves putting in place practices, preparations and processes that always ensure the continuity and preservation of the company in cases where there are disruptions to the day to day operations of the company or business. Part of the tasks that I was performing as a software engineer therefore involved testing, identification, selection, implementation and updating of specific processes that ensure critical services are not affected by the network disruptions. A good example is in the past month where we realized that some individuals had hacked the customer service system and taken private information of customers and were calling the ignorant ones to disclose their Pass words of mobile banking by claiming to be our agents in this case we revoked the customer services for a few hours and changed the whole system but ensured the other services were available as normal. I led part of the team that built a mobile detector that led us to one apartment within the city where with the help of security agents the culprits were captured with all the laptops and every item they were using including mobile phones.it was after this that we developed a system that would detect whenever somebody wanted to hack the customer service system thus reinstating normalcy in the business.
As a softw.
Georgian College offers two- and three-year co-op programs in Computer Programming and Computer Programming Analysis. Through co-op education, students gain real-world work experience by alternating academic terms with paid work terms in industry. Employers benefit from hiring motivated students who can take on projects and help during busy periods. Students develop job-ready skills, and employers can assess students as potential future hires. The document provides details on student competencies, contact information, and program highlights.
This document outlines the requirements and guidelines for an internship course. The course is worth 6 credits and takes place in the 8th semester. Students must complete a minimum of 180 hours of internship work at an approved host organization. They are evaluated based on a proposal, midterm report, and final report and presentation. The final report must follow a prescribed format and include details of the organization, internship activities, conclusions, and learning outcomes. Students are supervised by both a faculty member and mentor from the host organization. The internship aims to provide real-world experience to students and enhance their practical skills.
Lea
rning
Outcomes
assessed
in
this
assignment
Assignment
Title
Development of a Sorting Program.
Weighting
6
0
%
Word
Count
or
Equivalent
5
00
words
plus
implementation
and
demonstration.
1. Apply appropriate processes (design documentation and testing) and articulate the rationale for design decisions throughout the process of developing a program.
2. Communicate own algorithmic solutions for complex programming problems using appropriate notation.
3. Select and implement appropriate structures for file handling and error catching within a program.
4. Select and implement appropriate structures for data manipulation within a program.
5. Demonstrate knowledge of subject terminology and concepts, giving appropriate comparativeexamples in specific contexts.
Task(s)
Design, implement and demonstrate a program to sort a dataset from a file in to ascending order using three different algorithms. The program will time stamp the different algorithms to test the effectiveness (timeliness) of the algorithms. The methods you should user are Insertion, Selection and Bubble sort.
The program should read from a file in to an appropriate data structure. The program should then use a series of methods as discussed to sort the data and write it to another file in a sorted ascending format you have chosen. The program will calculate the length of time it took each algorithm to process the sorts and this information will be stored in another test file, which will not be overwritten only appended.
Extend the program to allow the user to select different files for sorting. Add a method to accept an additional algorithm of your own design. Your algorithm will sort the dataset in to descending order again; you will have to calculate run time. The program should continue to run until the user terminates the program.
Design documentation (500 words plus designs):
All design documentation should be in a formal report format, with a clear introduction. Any research undertaken or resources consulted should be discussed and/or presented in a bibliography. The designs should be presented in the appendices and clearly referred to from the body of the text. The following should be included:
· Identify any assumptions you have had to make (this is NOT information given in the brief)
· Discuss any research or resources you have used throughout the development, with appropriate citations.
· Given the brief evaluate the program clearly identify any areas of the brief not achieved or issues yet to be resolved
· A bibliography (all resources consulted)
· Formal design documentation in the form of use cases, Pseudo code and Flow-charts where applicable to the scenario, (in the appendices). This should be as complete as possible and reflect the final design. They main contain a number of elements that are not implemented.
Implementation:
The implemented program should demonstrate an appropriate use of programm ...
Online course registration system development software engineering project pr...MD.HABIBUR Rahman
Autometed Online Course Registration System is a software development project final presentation. here , I applyed . and software development waterfall feedback model. Development Software Engineering Project Presentation
1 Saint Leo University GBA 334 Applied Decision.docxaryan532920
The film The Godfather explores the theme of revenge. When Michael Corleone's father Vito is attacked, Michael seeks revenge by killing the ones responsible. This act of vengeance draws Michael deeper into the family crime business. Throughout the film, Michael takes revenge on anyone who wrongs or betrays his family, solidifying his role as the new head of the crime family. Cinematography in The Godfather features unique shots and scenes that helped introduce new techniques to films.
IRJET- Automatic Generation of Question Paper using Blooms TaxonomyIRJET Journal
This document describes a system for automatically generating question papers from a semantically tagged question bank or repository. The system allows users like teachers to specify parameters like topic coverage, question type distribution, cognitive levels, and difficulty levels. It then generates a question paper by selecting questions from the bank that match the specified parameters. This overcomes issues with existing methods of question paper creation, which depend heavily on a teacher's expertise and experience. The automatic system could generate question papers more quickly and consistently based on learning objectives. It also helps avoid duplicating questions across multiple exams while the question bank grows over time.
This course focuses on the fundamentals of wireless sensor networks. It covers topics such as node architecture, operating systems, network protocols, and hands-on experience programming sensors. The course includes lectures, labs, assignments, a project, midterm exam, and final exam. The primary goal is for students to gain practical experience designing and implementing wireless sensor network systems.
Priyanka Agarwal is seeking a position that allows her to utilize her 8.4 years of experience in clinical data management. She has worked as an analyst, programmer/analyst, and clinical database programmer at Quintiles Technologies since 2011. Her technical skills include Oracle InForm and Central Designer, and she has experience designing eCRFs, programming edit checks, and performing post-production changes. She holds a Master's degree in Business Administration and Bachelor's degree in Bio-Technology.
This document outlines the requirements for a major project assignment for a high school Information Processing and Technology course. Students must design, implement, and evaluate a single-page web application using JavaScript and other approved web technologies. The project involves four phases: problem definition, design, implementation, and testing/evaluation. Students are expected to maintain a log of their work and receive feedback at various stages from their teacher. The document provides criteria for assessing students' knowledge and application of programming techniques, analysis and synthesis skills, and ability to evaluate and communicate their work.
The document describes the design of two software engineering case studies using Rational Rose:
1) A Student Mark Analysis System to allow students and faculty to view marks and generate report cards. Key modules include generating and distributing report cards, updating grades, and viewing grades. UML diagrams like use case, class, sequence, and deployment diagrams are developed.
2) An Online Quiz Management System to organize quiz programs and produce results. The system will be developed using UML components and offers reliability and efficiency.
Both case studies involve analyzing requirements, designing the system using UML diagrams in Rational Rose, and developing the necessary software engineering methodology and documentation for the projects.
2016 ieee uae_student_day_sep_description_aau-dec-01-2015MUSAAB HASAN
This document describes a software engineering project competition to develop an Intelligent Time Table Scheduling system. It provides details on the competition rules, project summary, technical specifications, functionality requirements, theoretical knowledge evaluation, user interface criteria, documentation requirements, testing procedures, and evaluation metrics. Competing teams must develop a software system that generates course timetables for an educational institution by optimizing constraints such as classroom capacity, instructor workload, and student course preferences. The system will be judged on functionality, theoretical optimization knowledge, user-friendliness, additional features, and documentation.
The document discusses the development of Grade Analyser, a web application that uses machine learning and natural language processing to automate the grading of subjective answer-type exams. It aims to address the inefficiencies and inaccuracies of manual grading by teachers. The application allows teachers to upload assignments and answer keys, and students to submit handwritten answer scripts digitally. Google Cloud Vision API converts handwriting to text for analysis using a Cosine similarity algorithm to determine similarity to the answers and grade responses fairly. The tool is intended to speed up grading, reduce errors, and ensure more impartial student assessments.
This document outlines a distributed systems assignment for students to design, implement, and monitor a private cloud. It consists of 5 tasks: 1) designing a private cloud architecture, 2) implementing the private cloud, 3) monitoring the private cloud, 4) developing a Facebook-like application to deploy on the private cloud, and 5) submitting a critical review of the design and implementation. Students will work in groups of about 4 but be individually assessed. The assignment aims to develop skills in distributed systems and providing feedback to improve expertise in designing robust and scalable distributed architectures.
E-Learning Student Assistance Model for the First Computer Programming CourseIJITE
The document presents an e-learning student assistance model called c-Learn for novice computer programming students. c-Learn was developed to address low passing rates in introductory programming courses by providing tutoring, assessment, and backtracking guidance. It was tested on 11 students who used c-Learn for 2.5 hours, showing improved exam scores compared to their initial midterm. c-Learn uses color-coded syntax, interactive exercises, and compiler feedback. It requires achieving a 70% threshold in each section before advancing, or backs students to relevant earlier sections if below the threshold. The study found c-Learn improved students' marks and increased the standard deviation, indicating it positively impacted learning for students with different capabilities.
E-Learning Student Assistance Model for the First Computer Programming CourseIJITE
E-Learning applied to computer programming course design is a promising area of research. The student having clear understanding of the programming constructs can apply it to solve various problems. Because of limited time and availability, the instructor can go back to some extent to cover the weaknesses of their students that hinder the understanding of the problems. As more lessons are covered, the weak students become weaker in programming. To cope up with these problems an e-learning system is devised which the student can use anywhere and at any time as a web application. It comprises of both tutoring and assessment and also provides guiding the students to error correction using back-tracking technique to refine the concepts and reattempt the programming problem.
E-LEARNING STUDENT ASSISTANCE MODEL FOR THE FIRST COMPUTER PROGRAMMING COURSE IJITE
E-Learning applied to computer programming course design is a promising area of research. The student
having clear understanding of the programming constructs can apply it to solve various problems. Because
of limited time and availability, the instructor can go back to some extent to cover the weaknesses of their
students that hinder the understanding of the problems. As more lessons are covered, the weak students
become weaker in programming. To cope up with these problems an e-learning system is devised which the
student can use anywhere and at any time as a web application. It comprises of both tutoring and
assessment and also provides guiding the students to error correction using back-tracking technique to
refine the concepts and reattempt the programming problem
The document provides details about the software requirements specification for an Internal Assessment System project. It includes sections on the problem statement, process model, software requirements specification, scheduling, risk management, design, and testing. The software requirements specification section describes the purpose, scope, user interfaces, functional requirements, and data flow diagram for the system. It will allow teachers to enter and update internal marks for students and allow students to view their marks. The system will follow an incremental process model and be developed using Python, Django, HTML, CSS, JavaScript, and MySQL.
Sheet1Individual Needs Appointment for Hair StylingEmployee gr.docxlesleyryder69361
Sheet1
Individual Needs Appointment for Hair Styling
Employee greets customer and asks customer last name or phone number
Calls UMUC Haircuts and requests appointment
Is appointment today ?
Does customer want to schedule next appointment?
Is one of the dates/times acceptable?
Does customer want the same stylist as last time?
Previous Customer?
Employee checks stylist availability and times and advises customer
Employee asks customer feedback questions and enters responses into the system
Drives to UMUC Haircuts
YES
YES
YES
NO
NO
NO
Employee asks customer when the service is desired
Employee tells customer cost and time needed for service
Employee asks customer what services are needed
Employee welcomes customer back and reminds of last appointment and services provided
Cashier enters info from paper receipt to system and advises customer of total charges
Customer receives service; employee documents services completed and time on paper receipt
Appointment scheduled
Customer takes paper receipt to cashier
Payment Process
Stylist selected
NO
NO
YES
Employee gets alternate date/time and/or alternate stylist from customer
Will customer provide feedback?
YES
YES
NO
Customer leaves UMUC Haircuts
Customer completes call or leaves UMUC Haircuts
Employee asks for and enters customer information
UMUC Haircuts Appointment Process
1
3
4
5
6
7
Schedule
9
Process: Enter Time Needed and Cost for Services
Service, Time, Cost
Customers
2
Appoint-ments
Customer pays bill
Employee Scheduling Process
8
Financial Data
Questions/Customer
Responses
Sheet2
Sheet3
This assignment consists of two (2) sections:
· A Java program file
· A screen shot of the output and a description of your Java program
Label each file name according to the section of the assignment for which it is written. Put both sections together in a single zip file and submit the zip file.
Imagine that you work as a Java programmer for a software company. Your company is developing a new interactive learning management tool called uGrade. You have the task of creating the functionality that will allow the user to manually enter names and grades. The program will store this information in parallel arrays. Next, it will prompt the user to sort the date by name or by grade and display the sorted data accordingly in an organized table.
Section 1: Java Program File
1. Create a Java program in which you include:
· a class called “roster”
· attributes, which must be last names and numerical grades, and must also be parallel arrays
· an indefinite loop, which allows the user to manually enter five (5) names and grades and stores them in the array. Note: The loop must end either when the user specifies that they are done or when a maximum of five (5) values have been stored in the arrays, i.e., five (5) names and a corresponding grade for each name.
· an indefinite loop, which prompts the user to select a sorting criterion or to end the program, and must also use bubble sort. Note: The user.
Presentation for Six Sigma certificationElena Titova
The document provides information for a Six Sigma Green Belt certification project focused on creating online military family training. Key points:
- The project aims to create online centers focused on life skills, education, and career training for five military branches to help military families, active members, and those transitioning out of service.
- Six Sigma tools that will be used include a project charter, SIPOC, process map, fishbone diagram, C&E matrix, and control plan.
- The project charter outlines the problem of a need for military family support services, and the objective is to establish a baseline and improve customer satisfaction and retention through the online centers.
- A SIPOC details the suppliers,
IRJET- Personalized E-Learning using Learner’s Capability Score (LCS)IRJET Journal
1) The document discusses a personalized e-learning model that calculates a learner's capability score (LCS) based on performance, learning style, and time to determine an optimal learning path.
2) The LCS algorithm uses parameters like time, performance on tests, learning style, objective, difficulty of concepts, and question level to analyze a learner's capabilities and provide personalized course sequencing.
3) The proposed model involves developing an application where learners can register for courses, take tests on concepts, and receive personalized sequencing of concepts based on their calculated LCS.
In a 250-300 word response, critically examine your personal level o.docxjoyjonna282
In a 250-300 word response, critically examine your personal level of intercultural communication competence. Is it important for you to achieve a certain level of intercultural communication competence? Would enhanced intercultural communication competence help you personally? Professionally? Academically? Include examples in your submission and use at least one resource to support your key points. Respond to at least two of your fellow students' posts.
.
In a 10 –12 page paper, identify and analyze the benefits and challe.docxjoyjonna282
In a 10 –12 page paper, identify and analyze the benefits and challenges that are associated with biometric evidence in the criminal justice system. Include at least 3 techniques in your paper, and use at least 2 case studies to support your position. Consider the following questions when drafting your paper:
How do courts determine if evidence is reliable and valid before allowing it into testimony?
What is the role of the Frye standard or Daubert standard in determining whether or not the courts will accept biometric evidence?
What rules does your state use in this regard?
How reliable is fingerprint evidence? Consider examples of its use in criminal courts.
How do other biometrics compare to the reliability and validity of fingerprint evidence?
What are some of the challenges associated with lower forms of biometrics, such as facial recognition, and acceptance as evidence in court?
What is the role of the expert witness related to biometric evidence in court?
Be sure to provide in-text citation and references
.
Georgian College offers two- and three-year co-op programs in Computer Programming and Computer Programming Analysis. Through co-op education, students gain real-world work experience by alternating academic terms with paid work terms in industry. Employers benefit from hiring motivated students who can take on projects and help during busy periods. Students develop job-ready skills, and employers can assess students as potential future hires. The document provides details on student competencies, contact information, and program highlights.
This document outlines the requirements and guidelines for an internship course. The course is worth 6 credits and takes place in the 8th semester. Students must complete a minimum of 180 hours of internship work at an approved host organization. They are evaluated based on a proposal, midterm report, and final report and presentation. The final report must follow a prescribed format and include details of the organization, internship activities, conclusions, and learning outcomes. Students are supervised by both a faculty member and mentor from the host organization. The internship aims to provide real-world experience to students and enhance their practical skills.
Lea
rning
Outcomes
assessed
in
this
assignment
Assignment
Title
Development of a Sorting Program.
Weighting
6
0
%
Word
Count
or
Equivalent
5
00
words
plus
implementation
and
demonstration.
1. Apply appropriate processes (design documentation and testing) and articulate the rationale for design decisions throughout the process of developing a program.
2. Communicate own algorithmic solutions for complex programming problems using appropriate notation.
3. Select and implement appropriate structures for file handling and error catching within a program.
4. Select and implement appropriate structures for data manipulation within a program.
5. Demonstrate knowledge of subject terminology and concepts, giving appropriate comparativeexamples in specific contexts.
Task(s)
Design, implement and demonstrate a program to sort a dataset from a file in to ascending order using three different algorithms. The program will time stamp the different algorithms to test the effectiveness (timeliness) of the algorithms. The methods you should user are Insertion, Selection and Bubble sort.
The program should read from a file in to an appropriate data structure. The program should then use a series of methods as discussed to sort the data and write it to another file in a sorted ascending format you have chosen. The program will calculate the length of time it took each algorithm to process the sorts and this information will be stored in another test file, which will not be overwritten only appended.
Extend the program to allow the user to select different files for sorting. Add a method to accept an additional algorithm of your own design. Your algorithm will sort the dataset in to descending order again; you will have to calculate run time. The program should continue to run until the user terminates the program.
Design documentation (500 words plus designs):
All design documentation should be in a formal report format, with a clear introduction. Any research undertaken or resources consulted should be discussed and/or presented in a bibliography. The designs should be presented in the appendices and clearly referred to from the body of the text. The following should be included:
· Identify any assumptions you have had to make (this is NOT information given in the brief)
· Discuss any research or resources you have used throughout the development, with appropriate citations.
· Given the brief evaluate the program clearly identify any areas of the brief not achieved or issues yet to be resolved
· A bibliography (all resources consulted)
· Formal design documentation in the form of use cases, Pseudo code and Flow-charts where applicable to the scenario, (in the appendices). This should be as complete as possible and reflect the final design. They main contain a number of elements that are not implemented.
Implementation:
The implemented program should demonstrate an appropriate use of programm ...
Online course registration system development software engineering project pr...MD.HABIBUR Rahman
Autometed Online Course Registration System is a software development project final presentation. here , I applyed . and software development waterfall feedback model. Development Software Engineering Project Presentation
1 Saint Leo University GBA 334 Applied Decision.docxaryan532920
The film The Godfather explores the theme of revenge. When Michael Corleone's father Vito is attacked, Michael seeks revenge by killing the ones responsible. This act of vengeance draws Michael deeper into the family crime business. Throughout the film, Michael takes revenge on anyone who wrongs or betrays his family, solidifying his role as the new head of the crime family. Cinematography in The Godfather features unique shots and scenes that helped introduce new techniques to films.
IRJET- Automatic Generation of Question Paper using Blooms TaxonomyIRJET Journal
This document describes a system for automatically generating question papers from a semantically tagged question bank or repository. The system allows users like teachers to specify parameters like topic coverage, question type distribution, cognitive levels, and difficulty levels. It then generates a question paper by selecting questions from the bank that match the specified parameters. This overcomes issues with existing methods of question paper creation, which depend heavily on a teacher's expertise and experience. The automatic system could generate question papers more quickly and consistently based on learning objectives. It also helps avoid duplicating questions across multiple exams while the question bank grows over time.
This course focuses on the fundamentals of wireless sensor networks. It covers topics such as node architecture, operating systems, network protocols, and hands-on experience programming sensors. The course includes lectures, labs, assignments, a project, midterm exam, and final exam. The primary goal is for students to gain practical experience designing and implementing wireless sensor network systems.
Priyanka Agarwal is seeking a position that allows her to utilize her 8.4 years of experience in clinical data management. She has worked as an analyst, programmer/analyst, and clinical database programmer at Quintiles Technologies since 2011. Her technical skills include Oracle InForm and Central Designer, and she has experience designing eCRFs, programming edit checks, and performing post-production changes. She holds a Master's degree in Business Administration and Bachelor's degree in Bio-Technology.
This document outlines the requirements for a major project assignment for a high school Information Processing and Technology course. Students must design, implement, and evaluate a single-page web application using JavaScript and other approved web technologies. The project involves four phases: problem definition, design, implementation, and testing/evaluation. Students are expected to maintain a log of their work and receive feedback at various stages from their teacher. The document provides criteria for assessing students' knowledge and application of programming techniques, analysis and synthesis skills, and ability to evaluate and communicate their work.
The document describes the design of two software engineering case studies using Rational Rose:
1) A Student Mark Analysis System to allow students and faculty to view marks and generate report cards. Key modules include generating and distributing report cards, updating grades, and viewing grades. UML diagrams like use case, class, sequence, and deployment diagrams are developed.
2) An Online Quiz Management System to organize quiz programs and produce results. The system will be developed using UML components and offers reliability and efficiency.
Both case studies involve analyzing requirements, designing the system using UML diagrams in Rational Rose, and developing the necessary software engineering methodology and documentation for the projects.
2016 ieee uae_student_day_sep_description_aau-dec-01-2015MUSAAB HASAN
This document describes a software engineering project competition to develop an Intelligent Time Table Scheduling system. It provides details on the competition rules, project summary, technical specifications, functionality requirements, theoretical knowledge evaluation, user interface criteria, documentation requirements, testing procedures, and evaluation metrics. Competing teams must develop a software system that generates course timetables for an educational institution by optimizing constraints such as classroom capacity, instructor workload, and student course preferences. The system will be judged on functionality, theoretical optimization knowledge, user-friendliness, additional features, and documentation.
The document discusses the development of Grade Analyser, a web application that uses machine learning and natural language processing to automate the grading of subjective answer-type exams. It aims to address the inefficiencies and inaccuracies of manual grading by teachers. The application allows teachers to upload assignments and answer keys, and students to submit handwritten answer scripts digitally. Google Cloud Vision API converts handwriting to text for analysis using a Cosine similarity algorithm to determine similarity to the answers and grade responses fairly. The tool is intended to speed up grading, reduce errors, and ensure more impartial student assessments.
This document outlines a distributed systems assignment for students to design, implement, and monitor a private cloud. It consists of 5 tasks: 1) designing a private cloud architecture, 2) implementing the private cloud, 3) monitoring the private cloud, 4) developing a Facebook-like application to deploy on the private cloud, and 5) submitting a critical review of the design and implementation. Students will work in groups of about 4 but be individually assessed. The assignment aims to develop skills in distributed systems and providing feedback to improve expertise in designing robust and scalable distributed architectures.
E-Learning Student Assistance Model for the First Computer Programming CourseIJITE
The document presents an e-learning student assistance model called c-Learn for novice computer programming students. c-Learn was developed to address low passing rates in introductory programming courses by providing tutoring, assessment, and backtracking guidance. It was tested on 11 students who used c-Learn for 2.5 hours, showing improved exam scores compared to their initial midterm. c-Learn uses color-coded syntax, interactive exercises, and compiler feedback. It requires achieving a 70% threshold in each section before advancing, or backs students to relevant earlier sections if below the threshold. The study found c-Learn improved students' marks and increased the standard deviation, indicating it positively impacted learning for students with different capabilities.
E-Learning Student Assistance Model for the First Computer Programming CourseIJITE
E-Learning applied to computer programming course design is a promising area of research. The student having clear understanding of the programming constructs can apply it to solve various problems. Because of limited time and availability, the instructor can go back to some extent to cover the weaknesses of their students that hinder the understanding of the problems. As more lessons are covered, the weak students become weaker in programming. To cope up with these problems an e-learning system is devised which the student can use anywhere and at any time as a web application. It comprises of both tutoring and assessment and also provides guiding the students to error correction using back-tracking technique to refine the concepts and reattempt the programming problem.
E-LEARNING STUDENT ASSISTANCE MODEL FOR THE FIRST COMPUTER PROGRAMMING COURSE IJITE
E-Learning applied to computer programming course design is a promising area of research. The student
having clear understanding of the programming constructs can apply it to solve various problems. Because
of limited time and availability, the instructor can go back to some extent to cover the weaknesses of their
students that hinder the understanding of the problems. As more lessons are covered, the weak students
become weaker in programming. To cope up with these problems an e-learning system is devised which the
student can use anywhere and at any time as a web application. It comprises of both tutoring and
assessment and also provides guiding the students to error correction using back-tracking technique to
refine the concepts and reattempt the programming problem
The document provides details about the software requirements specification for an Internal Assessment System project. It includes sections on the problem statement, process model, software requirements specification, scheduling, risk management, design, and testing. The software requirements specification section describes the purpose, scope, user interfaces, functional requirements, and data flow diagram for the system. It will allow teachers to enter and update internal marks for students and allow students to view their marks. The system will follow an incremental process model and be developed using Python, Django, HTML, CSS, JavaScript, and MySQL.
Sheet1Individual Needs Appointment for Hair StylingEmployee gr.docxlesleyryder69361
Sheet1
Individual Needs Appointment for Hair Styling
Employee greets customer and asks customer last name or phone number
Calls UMUC Haircuts and requests appointment
Is appointment today ?
Does customer want to schedule next appointment?
Is one of the dates/times acceptable?
Does customer want the same stylist as last time?
Previous Customer?
Employee checks stylist availability and times and advises customer
Employee asks customer feedback questions and enters responses into the system
Drives to UMUC Haircuts
YES
YES
YES
NO
NO
NO
Employee asks customer when the service is desired
Employee tells customer cost and time needed for service
Employee asks customer what services are needed
Employee welcomes customer back and reminds of last appointment and services provided
Cashier enters info from paper receipt to system and advises customer of total charges
Customer receives service; employee documents services completed and time on paper receipt
Appointment scheduled
Customer takes paper receipt to cashier
Payment Process
Stylist selected
NO
NO
YES
Employee gets alternate date/time and/or alternate stylist from customer
Will customer provide feedback?
YES
YES
NO
Customer leaves UMUC Haircuts
Customer completes call or leaves UMUC Haircuts
Employee asks for and enters customer information
UMUC Haircuts Appointment Process
1
3
4
5
6
7
Schedule
9
Process: Enter Time Needed and Cost for Services
Service, Time, Cost
Customers
2
Appoint-ments
Customer pays bill
Employee Scheduling Process
8
Financial Data
Questions/Customer
Responses
Sheet2
Sheet3
This assignment consists of two (2) sections:
· A Java program file
· A screen shot of the output and a description of your Java program
Label each file name according to the section of the assignment for which it is written. Put both sections together in a single zip file and submit the zip file.
Imagine that you work as a Java programmer for a software company. Your company is developing a new interactive learning management tool called uGrade. You have the task of creating the functionality that will allow the user to manually enter names and grades. The program will store this information in parallel arrays. Next, it will prompt the user to sort the date by name or by grade and display the sorted data accordingly in an organized table.
Section 1: Java Program File
1. Create a Java program in which you include:
· a class called “roster”
· attributes, which must be last names and numerical grades, and must also be parallel arrays
· an indefinite loop, which allows the user to manually enter five (5) names and grades and stores them in the array. Note: The loop must end either when the user specifies that they are done or when a maximum of five (5) values have been stored in the arrays, i.e., five (5) names and a corresponding grade for each name.
· an indefinite loop, which prompts the user to select a sorting criterion or to end the program, and must also use bubble sort. Note: The user.
Presentation for Six Sigma certificationElena Titova
The document provides information for a Six Sigma Green Belt certification project focused on creating online military family training. Key points:
- The project aims to create online centers focused on life skills, education, and career training for five military branches to help military families, active members, and those transitioning out of service.
- Six Sigma tools that will be used include a project charter, SIPOC, process map, fishbone diagram, C&E matrix, and control plan.
- The project charter outlines the problem of a need for military family support services, and the objective is to establish a baseline and improve customer satisfaction and retention through the online centers.
- A SIPOC details the suppliers,
IRJET- Personalized E-Learning using Learner’s Capability Score (LCS)IRJET Journal
1) The document discusses a personalized e-learning model that calculates a learner's capability score (LCS) based on performance, learning style, and time to determine an optimal learning path.
2) The LCS algorithm uses parameters like time, performance on tests, learning style, objective, difficulty of concepts, and question level to analyze a learner's capabilities and provide personalized course sequencing.
3) The proposed model involves developing an application where learners can register for courses, take tests on concepts, and receive personalized sequencing of concepts based on their calculated LCS.
Similar to HND Assignment Brief Session Sept.docx (20)
In a 250-300 word response, critically examine your personal level o.docxjoyjonna282
In a 250-300 word response, critically examine your personal level of intercultural communication competence. Is it important for you to achieve a certain level of intercultural communication competence? Would enhanced intercultural communication competence help you personally? Professionally? Academically? Include examples in your submission and use at least one resource to support your key points. Respond to at least two of your fellow students' posts.
.
In a 10 –12 page paper, identify and analyze the benefits and challe.docxjoyjonna282
In a 10 –12 page paper, identify and analyze the benefits and challenges that are associated with biometric evidence in the criminal justice system. Include at least 3 techniques in your paper, and use at least 2 case studies to support your position. Consider the following questions when drafting your paper:
How do courts determine if evidence is reliable and valid before allowing it into testimony?
What is the role of the Frye standard or Daubert standard in determining whether or not the courts will accept biometric evidence?
What rules does your state use in this regard?
How reliable is fingerprint evidence? Consider examples of its use in criminal courts.
How do other biometrics compare to the reliability and validity of fingerprint evidence?
What are some of the challenges associated with lower forms of biometrics, such as facial recognition, and acceptance as evidence in court?
What is the role of the expert witness related to biometric evidence in court?
Be sure to provide in-text citation and references
.
In a 1-2 page Microsoft Word document, discuss the following case st.docxjoyjonna282
In a 1-2 page Microsoft Word document, discuss the following case study:
When Alexander and Deborah married, Alexander owned a duplex in a community property state. They lived in one side of the duplex. They saved their money and bought a lake lot as tenants by the entirety. Deborah failed to pay the loans she took out from Savings Bank prior to her marriage to pay for college. The bank claimed the duplex, the lake lot and their savings.
Discuss the likelihood of success on the bank's claims against the properties.
.
In a 16–20 slide PowerPoint presentation (excluding title and refere.docxjoyjonna282
In a 16–20 slide PowerPoint presentation (excluding title and reference slides) provide information as well as analyze the roles of the following areas in criminal justice leadership strategies and practices:
Organizational culture
Behavioral theory
Planning
Community relations
Your presentation should include, at a minimum, 4 slides, with speaker notes, for each topic.
.
In a 1-2 page Microsoft Word document, using APA, discuss the follow.docxjoyjonna282
In a 1-2 page Microsoft Word document, using APA, discuss the following case study:
When Alexander and Deborah married, Alexander owned a duplex in a community property state. They lived in one side of the duplex. They saved their money and bought a lake lot as tenants by the entirety. Deborah failed to pay the loans she took out from Savings Bank prior to her marriage to pay for college. The bank claimed the duplex, the lake lot and their savings.
Discuss the likelihood of success on the bank's claims against the properties.
.
In a 1-2 page paper, discuss how the government, the media, and the .docxjoyjonna282
In a 1-2 page paper, discuss how the government, the media, and the public affect a health care organization's integration of data. Give specific examples of all three entities influencing the integration of data.
Include at least two research sources in your paper and cite them in a References page at the end in APA format. As in all writing assignments, follow standard mechanics in writing, grammar, punctuation, and spelling.
Submit your completed assignment to the drop box below. Please check the
Course Calendar
for specific due dates.
.
In 2010, plans were announced for the construction of an Islamic cul.docxjoyjonna282
In 2010, plans were announced for the construction of an Islamic cultural center, named Cordoba House, in lower Manhattan in the vicinity of where the September 11, 2001 attacks on the World Trade Center occurred. This announcement stirred up a storm of activity by groups and individuals supporting and opposing the proposal, and in early 2011, a plea by the American Center for Law and Justice was entered in the New York State Supreme Court to stop the construction. In this Discussion Board please respond to the following questions:
In 5–6 paragraphs, address the following:
What are the complaints and concerns of those who oppose construction of this building in its proposed location?
Do you agree? Why, or why not?
What are the counter-claims being made by those who support construction of this building in its present location?
Do you agree? Why, or why not?
What is the specific issue in the court case?
What activities (protests, letters to the editor, blog posts, petitions, opinion polls, etc.) are underway related to this issue? Explain.
Do you think these activities are likely to have an impact on the Court’s decision? Why, or why not?
.
In 2011, John Jones, a middle school social science teacher began .docxjoyjonna282
In 2011, John Jones, a middle school social science teacher began a unit on the American election process. He began with an introduction of political parties from the revolution to present day. At the end of the politically-balanced unit, students participated in mock debates as candidates from each party and ultimately held a mock presidential election in his classroom.
After the votes were counted and a winner determined, one of his students asked Mr. Jones who he was planning to vote for in the “real” election. He answered the question in age-appropriate language and, when prompted, explained why. He reminded his students that voting was not only a reflection of personal beliefs, but a responsibility as a citizen of the United States.
When Janie Johnson got home from school that day, she noticed – for the first time – signs in her neighbor's front yards supporting one of the presidential candidates. At dinner she asked her parents who they planned to vote for. Their choice differed significantly from her teacher’s. Janie’s father was quite upset at Janie’s explanation of the other candidate. To him, it was not Mr. Jones’ job as her teacher her to “put those kinds of ideas in her head.” The next day he called the principal demanding that Mr. Jones be removed from the classroom.
You are the principal.
1. What do you tell the father? Why?
2. What, if anything, do you say to Mr. Jones, the teacher? Why?
You are Mr. Jones.
1. Have you done anything wrong?
2. What court case(s) would you cite in your behalf? Be specific. Cite the case name, court ruling, or law.
Answer the following questions:
1. Who was Pickering and why is he important?
2. A teacher speaks out at a rally against FCAT. This is not the first “FIRE FCAT” rally held in this community. Can her statement be protected by the First Amendment? Under what circumstances?
3. A student sees a picture of math teacher James Johnson in his KKK garb that Johnson posts on his facebook page. Can Johnson be fired because of his KKK membership? Why or why not?
4. After their honeymoon Jane Jones and her new husband Jason return to their teaching jobs at JFK Middle School. At lunch that day the principal informs them that one of them must transfer to a new school. Can the principal do this? Why or why not?
Chapter 10 covers several topics, chief among which is teachers’ rights. There are three main court cases which address free speech:
· Pickering v. Board of Education
· Connick v. Myers
· Garcetti v. Ceballos
In order to respond to the questions, you will have to do some research on your own.Ask yourself this question: “Is the employee speaking as a private citizen or as an employee?”
Question 1 : What is the main difference between the Pickering decisions and the Garcetti decision? Where does the Connick decision fit in?
Question 2: A special education teacher complains to his principal that the school is violating federal law in trying to meet the n.
In 5-7 pages (double-spaced,) provide a narrative explaining the org.docxjoyjonna282
This document requests a 5-7 page double-spaced narrative summarizing an organization's origins, ideology, goals, leadership, funding, capabilities, bases, personnel, training, communications, weapons, attack methods, propaganda, surveillance techniques, and significant events or dates related to past or potential future attacks.
In 2004 the Bush Administration enacted changes to the FLSA and the .docxjoyjonna282
In 2004 the Bush Administration enacted changes to the FLSA and the way overtime is paid. These changes are said to have impacted millions of working Americans. The Act addresses who and how overtime is paid. It is also felt that more changes are still needed.
Using an Internet search, find the enactment highlights of 2004 and future proposed changes. Who is impacted, positively or negatively? How do you feel this impacts you? Were these changes long overdue, or do you think this is just a way for workers to work more hours without the employer being responsible for premium pay?
.
In 200-250 wordsGiven the rate of technological chang.docxjoyjonna282
*****In 200-250 words****
Given the rate of technological change and global market pressures, there is considerable change and uncertainty in many organizations. Organizational value is determined more by knowledge (intellectual capital) rather than the traditional factors of productions (land, labor and capital).
1.
Review the concept of knowledge management and how human resources can create the conditions for the effective sharing of knowledge within and throughout the organization.
****Please use one reference which includes in-text citation****
.
in 200 words or more..1 do you use twitter if so , how often do.docxjoyjonna282
in 200 words or more..
1/ do you use twitter ?if so , how often do you tweet , and what do you tweet about ? if not , explain why you chose not to participate in this social medium
2/ when you post something online , do you think carefully about what you are about to post and how it might sound to others ? do you and react to your post ? or do you shoot from the hip , writeing whatever comes to mind ? explain
.
In 200 words or more, answer the following questionsAfter reading .docxjoyjonna282
Pop culture brands products by associating them with popular movies, celebrities, or television shows which can influence consumers to gravitate toward one product over another similar product. Pop culture branding aims to make products appealing and familiar by connecting them with characters or stories people find entertaining or admire. When done effectively, pop culture branding can sway people's preferences and purchasing decisions between comparable products based on the branding associations.
In 2005, serial killer Dennis Rader, also known as BTK, was arrested.docxjoyjonna282
In 2005, serial killer Dennis Rader, also known as BTK, was arrested and convicted of murdering 10 people in Kansas between the years of 1974 and 1991. Further research this incident using quality and reputable resources.
Write a two to three (2-3) page paper in which you:
Explicate how digital forensics was used to identify Rader as a suspect and lead to more concrete physical evidence.
Describe in detail the digital evidence that was uncovered from the floppy disk obtained from Rader. Discuss why you believe it took so many years to find concrete evidence in order to build a case against Rader.
Explain how the acquisition of digital evidence aided the investigation and whether or not you believe Rader would’ve been a person of interest if the floppy disk evidence wasn’t sent.
Identify the software that was used by the authorities to uncover the evidence and summarize how this software can be used for digital forensics and evidence collection.
Use at least two (2) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.
Your assignment must follow these formatting requirements:
Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.
Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.
.
In 2003, China sent a person into space. China became just the third.docxjoyjonna282
China became the third country to send a person into space in 2003 by launching a spaceship that orbited Earth 14 times in less than a day, demonstrating China's ability to independently send people to space for the first time and establishing itself as an emerging space power despite the high costs typically associated with human spaceflight.
In 250 words briefly describe the adverse effects caused by exposure.docxjoyjonna282
Exposure to radiation can cause adverse health effects such as radiation sickness and cancer. Significant health risks occur at exposure levels of 100 mSv or more over a short period. Radiation levels near Three Mile Island peaked at 0.5 mSv/hour and levels near Chernobyl were as high as 800 mSv during the incidents according to reports from the World Health Organization and International Atomic Energy Agency.
In 2.5 pages, compare and contrast health care reform in two differe.docxjoyjonna282
In 2.5 pages, compare and contrast health care reform in two different states. Your paper should include a minimum of three specific examples of similarities or differences in health care reform in the two states.
Example:
One possibility would be to compare Maine's health care reform in 2003 to Tennessee's 1994 health care reform known as "TennCare."
APA FORMAT
APA REFERENCES
.
In 2014 Virginia scientist Eric Betzig won a Nobel Prize for his res.docxjoyjonna282
In 2014 Virginia scientist Eric Betzig won a Nobel Prize for his research in microscope technology. Since receiving the award, Betzig has improved the technology so that cell functions, growth and even movements can now be seen in real time while minimizing the damage caused by prior methods. This allows the direct study of living nerve cells forming synapses in the brain, cells undergoing mitosis and internal cell functions like protein translation and mitochondrial movements.
Your assignment is to write a Python program that
graphically
simulates viewing cellular organisms, as they might be observed using Betzig’s technology. These simulated cells will be shown in a graphics window (representing the field of view through Betzig’s microscope) and must be animated, exhibiting behaviors based on the
“Project Specifications” below
. The simulation will terminate based on user input (a mouse click) and will include two (2) types of cells,
Crete
and
Laelaps
, (
pronounced
KREET
and
LEE
-
laps
).
Crete
cells should be represented in this simulation as three (3) small green circles with a radius of 8 pixels. These cells move nonlinearly in steps of 1-4 graphics window pixels. This makes their movement appear jerky and random.
Crete
cells cannot move outside the microscope slide, (the ‘
field
’), so they may bump along the borders or even wander out into the middle of the field at times. These cells have the ability to pass “through” each other.
A single red circle with a radius of 16 pixels will represent a
Laelaps
cell in this simulation.
Laelaps
cells move across the field straight lines, appearing to ‘bounce’ off the field boundaries.
Laelaps
sometimes appear to pass through other cells, however this is an optical illusion as they are very thin and tend to slide over or under the other cells in the field of view.
Project Specifications: ====================
Graphics Window
500 x 500 pixel window
White background
0,0 (x,y) coordinate should be set to the lower left-hand corner
Crete
Cells
Three (3) green filled circles with radius of 8 pixels
Move in random increments between -4 and 4 pixels per step
Movements are not in straight lines, but appear wander aimlessly
Laelaps
Cells
One (1) red filled circle with a radius of 16 pixels
Move more quickly than Crete cells and in straight lines
The Laelaps cell should advance in either -10 or 10 pixels per step
TODO #1: Initialize the simulation environment ========================================
Import any libraries needed for the simulation
Display a welcome message in the Python Shell. Describe the program’s functionality
Create the 500 x 500 graphics window named “
Field
”
Set the
Field
window parameters as specified
TODO #2: Create the
Crete
cells –
makeCrete()
========================================
Write a function that creates three green circle objects (radius 8) and stores them in a list
Each entry of the list represents one
Crete
cell
The.
In 200-300 words - How is predation different from parasitism What.docxjoyjonna282
In 200-300 words - How is predation different from parasitism? What structures and behavior aid the predaceous insect to be successful? Please give an example.
In 200-300 words-
Why is an understanding of metamorphosis crucial to identifying adult insects? Provide examples where knowing development patterns can prevent incorrect identification.
.
In 3 and half pages, including a title page and a reference page, di.docxjoyjonna282
In 3 and half pages, including a title page and a reference page, discuss various methods of establishing the identity of a murder victim.
In your discussion include an explanation of methods used to identify the dead when only teeth and bones of the victim are available for examination.
Use materials from the text and/or any outside resources to support your response.
.
Decolonizing Universal Design for LearningFrederic Fovet
UDL has gained in popularity over the last decade both in the K-12 and the post-secondary sectors. The usefulness of UDL to create inclusive learning experiences for the full array of diverse learners has been well documented in the literature, and there is now increasing scholarship examining the process of integrating UDL strategically across organisations. One concern, however, remains under-reported and under-researched. Much of the scholarship on UDL ironically remains while and Eurocentric. Even if UDL, as a discourse, considers the decolonization of the curriculum, it is abundantly clear that the research and advocacy related to UDL originates almost exclusively from the Global North and from a Euro-Caucasian authorship. It is argued that it is high time for the way UDL has been monopolized by Global North scholars and practitioners to be challenged. Voices discussing and framing UDL, from the Global South and Indigenous communities, must be amplified and showcased in order to rectify this glaring imbalance and contradiction.
This session represents an opportunity for the author to reflect on a volume he has just finished editing entitled Decolonizing UDL and to highlight and share insights into the key innovations, promising practices, and calls for change, originating from the Global South and Indigenous Communities, that have woven the canvas of this book. The session seeks to create a space for critical dialogue, for the challenging of existing power dynamics within the UDL scholarship, and for the emergence of transformative voices from underrepresented communities. The workshop will use the UDL principles scrupulously to engage participants in diverse ways (challenging single story approaches to the narrative that surrounds UDL implementation) , as well as offer multiple means of action and expression for them to gain ownership over the key themes and concerns of the session (by encouraging a broad range of interventions, contributions, and stances).
CapTechTalks Webinar Slides June 2024 Donovan Wright.pptxCapitolTechU
Slides from a Capitol Technology University webinar held June 20, 2024. The webinar featured Dr. Donovan Wright, presenting on the Department of Defense Digital Transformation.
How to Create User Notification in Odoo 17Celine George
This slide will represent how to create user notification in Odoo 17. Odoo allows us to create and send custom notifications on some events or actions. We have different types of notification such as sticky notification, rainbow man effect, alert and raise exception warning or validation.
Get Success with the Latest UiPath UIPATH-ADPV1 Exam Dumps (V11.02) 2024yarusun
Are you worried about your preparation for the UiPath Power Platform Functional Consultant Certification Exam? You can come to DumpsBase to download the latest UiPath UIPATH-ADPV1 exam dumps (V11.02) to evaluate your preparation for the UIPATH-ADPV1 exam with the PDF format and testing engine software. The latest UiPath UIPATH-ADPV1 exam questions and answers go over every subject on the exam so you can easily understand them. You won't need to worry about passing the UIPATH-ADPV1 exam if you master all of these UiPath UIPATH-ADPV1 dumps (V11.02) of DumpsBase. #UIPATH-ADPV1 Dumps #UIPATH-ADPV1 #UIPATH-ADPV1 Exam Dumps
Information and Communication Technology in EducationMJDuyan
(𝐓𝐋𝐄 𝟏𝟎𝟎) (𝐋𝐞𝐬𝐬𝐨𝐧 2)-𝐏𝐫𝐞𝐥𝐢𝐦𝐬
𝐄𝐱𝐩𝐥𝐚𝐢𝐧 𝐭𝐡𝐞 𝐈𝐂𝐓 𝐢𝐧 𝐞𝐝𝐮𝐜𝐚𝐭𝐢𝐨𝐧:
Students will be able to explain the role and impact of Information and Communication Technology (ICT) in education. They will understand how ICT tools, such as computers, the internet, and educational software, enhance learning and teaching processes. By exploring various ICT applications, students will recognize how these technologies facilitate access to information, improve communication, support collaboration, and enable personalized learning experiences.
𝐃𝐢𝐬𝐜𝐮𝐬𝐬 𝐭𝐡𝐞 𝐫𝐞𝐥𝐢𝐚𝐛𝐥𝐞 𝐬𝐨𝐮𝐫𝐜𝐞𝐬 𝐨𝐧 𝐭𝐡𝐞 𝐢𝐧𝐭𝐞𝐫𝐧𝐞𝐭:
-Students will be able to discuss what constitutes reliable sources on the internet. They will learn to identify key characteristics of trustworthy information, such as credibility, accuracy, and authority. By examining different types of online sources, students will develop skills to evaluate the reliability of websites and content, ensuring they can distinguish between reputable information and misinformation.
How to Create a Stage or a Pipeline in Odoo 17 CRMCeline George
Using CRM module, we can manage and keep track of all new leads and opportunities in one location. It helps to manage your sales pipeline with customizable stages. In this slide let’s discuss how to create a stage or pipeline inside the CRM module in odoo 17.
pol sci Election and Representation Class 11 Notes.pdf
HND Assignment Brief Session Sept.docx
1. HND Assignment Brief Session:
September 2015
Programme title
BTEC HND in Computing and Systems Development
Unit number and title
41
Programming in Java (L5)
Assignment number & title
1 of 1
Programming in Java (L5)
Unit Leader
DR Gebremichael
Assessor (s)
Yonas Gebremichael and Hassan Baajour
Issue Date
30 Sept 2015
Final assignment submission deadline
28 May 2015 – 09 Sept 2015
Late submission deadline
11 – 16 September 2015
The learners are required to follow the strict deadline set by the
College for submissions of assignments in accordance with the
BTEC level 4 – 7 submission guidelines and College policy on
submissions. They should also refer to Merit and Distinction
criteria that require evidence of meeting agreed timelines and
ability to plan and organise time effectively without which the
learner may not expect to receive a higher grade.
Resubmission deadline
TBA
Feedback
In-class feedback will be available from draft submissions on a
taskby-task basis as a formative feedback and also for initial
submission. Final feedback will be available within 2 – 3
2. weeks of the assignment submission date.
General
Guidelines
1. The work you submit must be in your own words. If you use a
quote or an illustration from somewhere you must give the
source.
2. Include a list of references at the end of your document. You
must give all your sources of information.
3. Make sure your work is clearly presented and that you use
readily understandable English.
4. Wherever possible use a word processor and its “spell-
checker”.
Internal verifier
Dr. Hasan
Signature (IV of the brief) *
Dr. Hasan
Date
06/05/15
ICON College of Technology and Management
BTEC HND in Computing and Systems Development
(CSD)
Unit41: Programming in Java (L5)
Session: MaySept 2015
3. Coursework
Recommended maximum words: 4,000
This Unit will be assessed by assignment and Presentation.
You are strongly recommended to read “Preparation guidelines
of the Coursework Document” before answering/solving your
assignment.
Scenario:
White Chapel Academy has asked you to develop a Student
Information Management System (SIMS). The system shall hold
the details of every student and tutor and admin staff in the
school as well as storing information about the courses that are
available at the school. It shall enable the school staff to enrol
students to the school and manage student’s fee payments.
Once the students are enrolled, a system administrator will
create classes in the system and allocate date, time and tutor for
each class to enrol students to. The system shall also be used
for managing students’ class attendance as well as track their
progress in the course. The system shall have a facility for
registered parents to login and check their sons’ or daughters’
attendance, academic progress, behaviour at school.
When a student first enrols at the school, he or she will receive
a timetable with a list of classes and date/time for each class in
a term. During student registration, the system shall verify
whether the student has satisfied the necessary prerequisites for
each term by referring to the student’s online transcript of
courses completed and grades received (the student can review
his or her transcript online at any time as can his or her
parents).
Assuming that (a) the prerequisites for enrolment are satisfied,
(b) there is room available in each of the classes, the student is
enrolled in the classes else he or she is placed on a first-come,
first-served waiting list. If a class/section that he or she was
4. previously waitlisted for becomes available (either because
some other student has dropped the class or because the seating
capacity for the class has been increased), the student is
automatically enrolled in the waitlisted class, and an email
message to that effect is sent to the student and parents. Other
optional features include:
· Calendar events
· Records of detention
· Keeping correspondence history between the school & parents
· Messaging facility between students as well as students and
staff/tutors
User Interface
· Users shall have access to the system using user friendly menu
system.
· The UI implementation will be a graphical user interface.
Data Persistence
Data shall be persisted in a text file in the form of simple tab or
comma-delimited file.
Programming Environment
NetBeans with latest JDK available at the time.
Task 1
1.1 Briefly list and describe three main features of programming
in Java [P1.1]
1.2 What do we mean by BYTECODE and JVM in Java? [P1.2,
5. M1]
of the core principles of Java programming & compilation,
interpretation process and will have met the deadline to submit
the tasks and achieve the unit assessment criteria.
Task 2
2.1 Design a Java programming solution to the SIMS scenario
using use-case diagram that shows how users will interact with
the system. [P2.1, M2]
2.2 Identify the components and file structures required to
implement the SIMS. [P2.2]
2.3 Use UML class diagrams to show the classes in your system,
attributes and operations of each class and the relationship
between classes. Define clearly each class, main methods and
properties [P2.2, D1].
· To achieve M2, you should have applied the relevant theories
and use case diagrams in the design process and you must
justify the design methods and techniques used.
· To achieve D1, you must show the use of critical reflection to
evaluate your own work and justify valid conclusions. The
validity of results must be evaluated using defined criteria,
Realistic improvements have been proposed against defined
characteristics for success.
Task 3
In this section you should apply the appropriate fundamental
programming concepts (such as variables, constants, arrays,
strings, methods, constructs, inheritance, encapsulation etc.)
and make use of appropriate Java API classes (such as Scanner,
6. String etc.). In addition your program should incorporate
appropriate error handling. Comments are also to be inserted to
improve program clarity. To this end you have to:
3.1 Implement the SIMS based on your design. [P3.1, D2]
3.2 Implement classes using inheritance relationship. [P3.2,
D3]
3.3 Use methods and attributes in different classes using
instances/objects. [P3.3, D2]
3.4 Identify and implement opportunities for error handling
and reporting. [P3.4, D3]
3.5 Make effective use of the Netbeans (IDE). [P3.5]
· To achieve D2, you should have made alternative approach
and critical evaluation procedures, demonstrating autonomy and
independence. Also will have met the deadline to submit the
tasks and achieve the unit assessment criteria and thus taken the
responsibility for managing and organising activities.
· To achieve D3, you should have demonstrated effective
thinking has taken place in the context of implementing object
behaviors, idea generation and decision making in the
implementation process and finally demonstration of self-
evaluation has taken place.
Task 4
In this section you need to provide overall documentation for
the system analysis, design and implementation as follows:
4.1 critically review and test your solution. [P4.1, M3]
4.2 analyse actual test results against expected results to
identify discrepancies. [P4.2, M3]
4.3 evaluate independent feedback on your solution and make
recommendations for improvements [P4.3, M3].
4.4 create user documentation for the solution. [P4.4]
4.5 create technical documentation for the support and
7. maintenance of your system. [P4.5]
been used, coherent, logical development of principles/concepts
for the intended audience and demonstration of self-evaluation
has taken place. A range of methods of presentation (technical
and user documents) has been used and technical language have
been accurately used, Communication has taken place in
familiar and unfamiliar contexts,
Additional Specs, Hints & Good Programming Practices
The marking scheme for this coursework will assign marks for
Functionality, Quality of Code, Program Design, Style,
Documentation and Testing. Style and Documentation are
crucial – you must neatly comment your code.
Try and break the coursework down into doable chunks as
identified by the task list. These are distinct programs in the
coursework, so try and modularise your effort – for instance in
Task 3 first you need to set up the menu system and build
functionalities of each menu item one by one. This approach
will help in the testing and debugging process of your code.
DEBUGGING HINT: Compile and test your program after every
change, even if it was as simple a change as adding a single
line. This will allow you to find and fix errors early before you
write more code. This is another reason why you have to write
the skeleton program which runs first even if it does not do
anything yet.
In addition to the above, follow good programming practices.
Below are some of the common good practices generally
accepted as industry standard and followed by those in industry
who are using programming in general and the C/C++/C#/Java
in particular. You will get more marks for following good
programming practices. Some examples are given below. When
naming identifiers
· Do not start with underscore (used for technical
programming). e.g. _grades (this is bad practice)
8. · Write single word variables in all lower case , e.g. int grades,
roots;
· Space is not allowed in identifiers, e.g. ‘student grades’ is
wrong! write this as studenGrades or student_grades. Note the
use of capitalisation or the underscore.
· Use CAPITAL LETTERS TO DECLARE CONSTANTS, e.g.
SIZE = 100 or PI = 3.14;
· Start function names with capital letters. e.g.
AverageGrades(). Spaces are not allowed in function names.
‘Average Grades()’ is wrong. Use AverageGrades() or
Average_grades().
· Make a habit of using Meaningful identifier and Function
Names to make your code easier for others to understand. Think
about it, what does "g" mean? Is it grades, garbage, grave, etc.
Thus do not use cryptic identifier names, e.g. Use ‘grades’ to
refer to student grades rather than ‘g’. Similarly, use sensible
function names. If you want to write a function that assigns
student’s grades, then call it StudentGrades(). Do not use your
names or names of your pets or any name that does not describe
what the function does, but at the same time do not use more
than 3 words, i.e. do not use a sentence to name a function. e.g.
ThisIsMyAverageFunction() while syntactically correct is not
good programming practice.
· Remember Java is case sensitive so ‘Grades’ and ‘grades’ are
not the same as identifier names. Thus be case and spelling
consistent. Use an identifier name only once and spell it (upper
and lower case) the same way within your program.
Finally give the project a sensible name like E.g.
Unit41_CW_ID3344
Presentation
9. As part of the overall assessment of this assignment, the
students need to prepare an oral presentation of their
individual work. You will use power point presentation or
similar presentation package of your choice. The presentation
will last no more than 10-15 minutes. You will be marked on
content, presentation style and clarity of delivery.
Relevant Information
To gain a Pass in a BTEC HND Unit, you must meet ALL the
Pass criteria; to gain a Merit, you must meet ALL the Merit and
Pass criteria; and to gain a Distinction, you must meet ALL the
Distinction, Merit and Pass criteria.
1. Outcomes of the unit and assessment criteria
Outcomes
Assessment criteria for pass To achieve each outcome a learner
must demonstrate
Questions reflecting the outcome
1. Understand the principles of programming in Java
1.1 Briefly describe the principles, characteristics and features
of programming in Java?
1.2 Briefly describe environmental flexibility of programming
in Java?
Task 1 & presentation
2. Be able to design Java solutions
2.1 design a distributed software application for a given
problem
2.2 explain the components and data and file structures required
to implement a given design
10. Task 2 & presentation
3. Be able to implement Java solutions
3.1 implement a distributed software application solution based
on a prepared design
3.2 define relationships between components to implement
design requirements
3.3 identify and implement opportunities for error handling and
reporting
3.4 make effective use of an Integrated
Development Environment (IDE) including code and screen
templates
Task 3 & presentation
4. Be able to test and document Java solutions
4.1 critically review and test a distributed software application
4.2 analyse actual test results against expected results to
identify discrepancies
4.3 evaluate independent feedback on a developed distributed
software application and make recommendations for
improvements
4.4 create user documentation for the developed distributed
software application
4.5 create technical documentation for the support and
maintenance of a distributed software application.
Task 4 & presentation
2. Grading Criteria for Merit and Distinction of this coursework
Merit (M1, M2, M3)
Distinction (D1, D2, D3)
Descriptors
Indicative characteristics
Descriptors
Indicative characteristics
M1. Identify and apply strategies to find appropriate solution
· Pass requirements achieved
11. · effective judgment have been made
· an effective approach to study and research has been applied
D1. Use critical reflection to evaluate own work and justify
valid conclusions
Pass and Merit requirements achieved
· The validity of results has been evaluated using
defined criteria
· Realistic improvements have been proposed against defined
characteristics for success
M2.
Select/design
D2. Take responsibility for managing and
has been demonstrated
and apply appropriate methods/techniq ues
applied
· A range of sources of information has been used
· The design of methods and techniques/sources has been
justified
organising activities
· Substantial activities, projects or investigations have been
planned, managed and organised
· Activities have been managed
· The importance of independence has been recognised and
achieved
M3. Present and communicate appropriate findings
· The appropriate structure and approach has been used
· Coherent, logical development of
principles/concepts for the intended audience
· A range of methods of presentation has been used and
technical language have been accurately used
· Communication has taken place in familiar and unfamiliar
contexts
D3. Demonstrate convergent/lateral/crea tive thinking
· Ideas have been generated and decisions taken
· Convergent and lateral thinking have been applied
12. · Problems have been solved
· Innovation and creative though have been applied
· Receptiveness to new ideas is evident
· Effective thinking has taken place in unfamiliar contexts
3. Preparation guidelines of the Coursework Document
a. All coursework must be word processed.
b. Document margins must not be more than 2.54 cm (1 inch) or
less than 1.9cm (3/4 inch).
c. Font size must be within the range of 10 point to 14 point
including the headings and body text (preferred font size is 11).
d. Standard and commonly used type face such as Arial should
be used.
e. All figures, graphs and tables must be numbered.
f. Material taken from external sources must be properly
refereed and cited within the text using
Harvardstandard
g. Do not use Wikipedia as a reference.
h. Word limit must be strictly followed.
4. Plagiarism and Collusion
Any act of plagiarism or collusion will be seriously dealt with
according to the College regulations. In this context the
definition and scope of plagiarism and collusion are presented
below:
Plagiarism is presenting somebody else’s work as your own. It
includes copying information directly from the Web or books
without referencing the material; submitting joint coursework as
an individual effort.
Collusion is copying another student’s coursework; stealing
coursework from another student and submitting it as your own
work.
Suspected plagiarism or collusion will be investigated and if
found to have occurred will be dealt with according to the
college procedure. (For details on Plagiarism & Collusion
please see the student hand book)
5. Submission
a. Initial submission of coursework to the tutors is compulsory
13. in each unit of the course.
b. Student must check their assignments on ICON VLE with
plagiarism software Turnitin to make sure the similarity index
for their assignment stays within the College approved level. A
student can check the similarity index of their assignment three
times in theDraftAssignment submission point located in the
home page of the ICON VLE.
c. All Final coursework must be submitted to the Final
submission point into the unit (not to the Tutor). A student
would be allowed to submit only once and that is the final
submission.
d. Any computer files generated such as program code
(software), graphic files that form part of the coursework must
be submitted as an attachment to the assignment with all
documentation.
e. Any portfolio for a unit must be submitted as a hardcopy to
examination office.
f. The student must attach a tutor’s comment in between the
cover page and the answer in the case of Resubmission.
6. Good practice
a. Make backup of your work in different media (hard disk,
memory stick etc.) to avoid distress for loss or damage of your
original copy.
7. Extension and Late Submission
a. If you need an extension for a valid reason, you must request
one using an Exceptional Extenuating Circumstances (EEC)
form available from the College examination office and ICON
VLE. Please note that the lecturers do not have the authority to
extend the coursework deadlines and therefore do not ask them
to award a coursework extension. The completed form must be
accompanied by evidence such as a medical certificate in the
event of you being sick.
b. Late submission will be accepted and marked according to
the college procedure. It is noted that late submission may not
be graded for Merit and Distinction.
c. All Late coursework must be submitted to the Late
14. submission point into the unit (not to the Tutor). A student
would be allowed to submit only once and that is the final
submission.
8. Submission deadlines
Formative feedback
Week 11
Presentation
Week 12
Final Submission
28 May 2015 – 09 Sept 2015
Late submission
11 – 16 Sept. 2015
Submit to: Online to the ICON VLE only
Glossary:
Analyse: Break an issue or topic into smaller parts by looking in
depth at each part. Support each part with arguments and
evidence for and against (Pros and cons).
Critically Evaluate/Analyse: When you critically evaluate you
look at the arguments for and against an issue. You look at the
strengths and weaknesses of the arguments. This could be from
an article you read in a journal or from a text book.
Discuss: When you discuss you look at both sides of a
discussion. You look at both sides of the arguments. Then you
look at the reason why it is important (for) then you look at the
reason why it is important (against).
Explain: When you explain you must saywhy it is important or
not important.
Evaluate: When you evaluate you look at the arguments for and
against an issue.
Describe: When you give an account or representation of in
15. words.
Identify: When you identify you look at the most important
points.
Department of Information Technology Page 1 of 7
Department of Information Technology Page 1 of 7
Department of Information Technology Page 8 of 8
Department of Information Technology Page 1 of 10
HND Assignment Brief
Session: September 2015
Programme title BTEC HND in Computing and Systems
Development
Unit number and title 35 Web Applications Development (L5)
Assignment number &
title 1 of 1 Web Applications Development (L5)
Unit Leader Dr. Gebremichael
Assessor (s) Yonas Gebremichael and Hassan Baajour
Issue Date 30 Sep 2015
16. Final assignment
submission deadline 28 Dec 2015 – 09 Jan 2016
Late submission
deadline
11 – 16 January 2016
The learners are required to follow the strict deadline set by the
College for submissions of assignments in accordance with the
BTEC level 4 – 7 submission guidelines and College policy on
submissions. They should also refer to Merit and Distinction
criteria
that require evidence of meeting agreed timelines and ability to
plan
and organise time effectively without which the learner may not
expect to receive a higher grade.
Resubmission deadline TBA
Feedback
In-class feedback will be available from draft submissions on a
task-
by-task basis as a formative feedback and also for initial
submission.
Final feedback will be available within 2 – 3 weeks of the
assignment
submission date.
General
Guidelines
1. The work you submit must be in your own words. If you use a
17. quote or an
illustration from somewhere you must give the source.
2. Include a list of references at the end of your document. You
must give all
your sources of information.
3. Make sure your work is clearly presented and that you use
readily
understandable English.
4. Wherever possible use a word processor and its “spell-
checker”.
Internal verifier Dr. Hasan
Signature (IV of
the brief) * Dr. Hasan Date 06/10/15
Department of Information Technology Page 2 of 10
ICON College of Technology and Management
BTEC HND in Computing and Systems Development
(CSD)
Unit 35: Web Applications Development (L5)
Session: September 2015
18. Coursework
Recommended maximum words: 3,000
This Unit will be assessed by assignment and Presentation.
You are strongly recommended to read “Preparation guidelines
of the
Coursework Document” before answering/solving your
assignment.
Scenario
Lingo Academy provides people with short time courses in IT.
You are required to create a simple web
application which we will call ‘Lingo Management System’ for
the purpose of maintaining student’s
details and monitoring their academic progress. The system has
an admin who has full administrative
rights to register, remove, update and maintain the students’
details and to register and update
courses in the system. Each course at Lingo Academy has only
one teacher who has the rights to
insert and update the grades directly in the system only for his
students (less than 50 Fail, between 50
and 60 Pass, between 60 and 70 Merit, above 70 Distinction).
The student should be able to login to
the system and check his progress. To implement the site, you
19. must use HTML5, CSS and JavaScript
for the client- side coding. PHP must be used for the server side
coding. The site must run from a local
web server. The backend will be built with MySQL Server
database.
Functional Specification
1. Accounts Creation
- Create HTML forms as needed to create accounts for the users
of the system and to store and
maintain the required data.
- Account and other data (e.g. courses) details are to be stored
in your MySQL database.
- The system must prevent duplicate usernames being chosen
(Do not use the email address
as a username).
-
2. Forms Validation
It is important that you validate the forms on client side using
html5 and JavaScript code, in addition to
the validation using server side code (i.e. PHP) and you should
display proper error messages as
needed.
20. 3. Authentication
Any available login form on your website should be usable by
the all the user types of the system,
however they should be allowed to access only what is related
to their roles.
Department of Information Technology Page 3 of 10
4. Search
The admin and the teacher should be able to search available
students. However, the teacher should
only be allowed to find and view his own students. Also, all
users of the system should be allowed to
search and find courses available in the system.
5. Contact
Your website must provide users with a contacting form that
uses html5, JavaScript and PHP. The
form should send the message directly to the admin or the
teacher depending on the user selection. It
should as well keep a copy of the email inside the MYSQL db.
21. 6. Other issues
Your website should look simple and nice and must include
minimum 5 different pages including
home, courses, about, contact us (public pages) and accounts
management (private pages). All public
pages must have a header and footer with relevant logo,
navigation links menu, login form, images
and/or videos.
Task 1
In the reference to the above scenario:
1.1 Critically evaluate the functions and advantages of web
applications. [P1.1].
1.2 Critically compare different types of server-side and client-
side scripting languages. [P1.2, M1].
1.3 Examine web security concerns and make recommendations
for security improvements for
your web application. [P1.3].
ve M1; Student has to define clearly the difference
between the client side and server
side languages. In addition, student has to identify and define
multiple server and client side
languages and to list main differences between them.
Task 2
22. This task focuses in the design of the web application and
associated database. Within this context
and in the reference to the above scenario:
2.1 Design a web application to meet the given requirements in
the scenario above. Use all relevant
techniques such as wire-framing, storyboarding and sitemap.
Your website shall have all the
relevant pages for full implementation of the above scenario
including a sitemap. [P2.1, M2]
2.2 Demonstrate a client-server architecture suitable for your
web application. [P2.2, D1]
2.3 Design a database system for use in your web application.
[P2.3, D2]
2.4 Evaluate alternative designs and solutions to meet a given
requirement. [P2.4]
consistent wire-frames and storyboards
including header, footer, main content sections with logo,
navigation links menu, login form,
crumb-bread, relevant images and videos … etc.
Department of Information Technology Page 4 of 10
te proper client-server
architecture that suits his system
23. and has to demonstrate the role of each component and how
they communicate together.
database, demonstrate the relations
between them and justify his design.
Task 3
This task aims to establish a good familiarity with the
implementation of the web application using
proper client-server technologies connected to a relational
database using html, CSS, JavaScript,
PHP and MySQL DB. To this end you have to:
3.1 Implement the proposed wireframe and storyboards
introduced in task 2 using mark-up and
scripting languages as appropriate: HTML for web pages, CSS
for presentation styles,
JavaScript for client side script [P3.1].
3.2 Implement web-enabled database management system to
store, retrieve and manipulate data
in the web application as specified in the scenario above using
PHP and SQL queries. [P3.2,
D3]
3.3 Identify and implement opportunities for error handling and
reporting. [P3.3]
24. system that reflects creativity in
developing the proposed client-server architecture introduced in
Task 2.
Task 4
4.1 Review and test your web application on front end and back
end levels. [P4.1]
4.2 analyse actual test results against expected results to
identify discrepancies (Use verification
table). [P4.2]
4.3 Critically evaluate independent feedback on a developed
web application and make
recommendations for improvements [P4.3, M3]
4.4 Create user documentation for a developed web application.
[P4.4, D3]
and demonstrates how they will
deal with it in proper way.
nt has to provide proper documentation
for the technical side in a way that
allows other developers realise how to fix and update the code
of the system. Also student has
to demonstrate clearly how the actual user of the system will be
able to use it. The user guide
has to include clear instructions and relevant screen shots.
25. Assessment Methods
This is an individual coursework.
There are TWO components to this assignment.
1. Your system will be assessed at a laboratory
demonstration/viva where the complete system
(software or hardware) you produced will be demonstrated and
you will be asked to answer
related questions. For this, you will need to prepare a power
point presentation or similar
Department of Information Technology Page 5 of 10
presentation package of your choice to aid your oral
presentation. The presentation will last
no more than 10-15 minutes. You will be marked on content,
presentation style and clarity of
delivery. This is important and you should treat it as an
examination.
2. You will need to produce a short report addressing all the
questions in each learning outcome.
You must include your power point slides in this report. There
is no written examination for
this unit.
26. Additional Specs, Hints & Good Programming Practices
• The marking scheme for this coursework will assign marks for
Functionality, Quality of Code,
Program Design, Style, Documentation and Working Binaries.
Style and Documentation are
crucial – you must neatly comment your code.
• Try and break the coursework down into do-able chunks as
identified by the task list. These
are distinct programs in the coursework, so try and modularise
your effort – for instance - first
you need to set up the menu system and build functionalities of
each menu item one by one.
This approach will help in the testing and debugging process of
your code.
• You should aim in achieving good level of Modularity in
implementing your developed
Algorithm and to avoid High inter-Dependability between the
implemented Functions of your
Program Code.
• DEBUGGING HINT: Compile and test your program after
every change, even if it was as
simple a change as adding a single line. This will allow you to
find and fix errors early
before you write more code. This is another reason why you
have to write the skeleton
27. program which runs first even if it does not do anything yet.
• Your main program should have the following heading shown
below. You must customise it to
your particular details.
/****************************************************
*********************************
About: This program is written as part of the fulfilment for the
‘put your Unitname’
Course - HND in EEE/CSD at Icon College, London.
Date : Put date here
By : Put your name here. Student ID: Put your student ID
Here
*****************************************************
********************************/
• Each function must have its own comment heading which
describes exactly what the code
does as shown below as an example.
/****************************************************
*********************************
About: This program takes your date of birth as an input and
returns your age.
*****************************************************
********************************/
28. In addition to the above, follow good programming practices.
Below are some of the common good
practices generally accepted as industry standard and followed
by those in industry. You will get
more marks for following good programming practices. Some
examples are given below.
• When naming identifiers,
Department of Information Technology Page 6 of 10
o Do not start with underscore (used for technical
programming). e.g. _grades (this is
bad practice)
o Write single word variables in all lower case , e.g. int grades,
roots;
o Space is not allowed in identifiers, e.g. ‘student grades’ is
wrong! write this as
studenGrades or student_grades. Note the use of capitalisation
or the
underscore.
o Use CAPITAL LETTERS TO DECLARE CONSTANTS, e.g.
PI = 3.14, SIZE = 100;
o Start function names with capital letters. e.g.
AverageGrades(). Spaces are not
29. allowed in function names. ‘Average Grades()’ is wrong. Use
AverageGrades() or
Average_grades().
• Emphasis and care must be taken in producing good
descriptive COMMENTS in the Program
Code, following a ‘tidy’ indentation of the Program Code, and
using descriptive names for the
Functions and Variables implemented in the Program Code.
• Make a habit of using Meaningful identifier and Function
Names to make your code easier
for others to understand. Think about it, what does "g" mean? Is
it grades, garbage, grave,
etc. Thus do not use cryptic identifier names, e.g. Use ‘grades’
to refer to student grades
rather than ‘g’. Similarly, use sensible function names. If you
want to write a function that
assigns student’s grades, then call it StudentGrades(). Do not
use your names or names of
your pets or any name that does not describe what the function
does, but at the same time do
not use more than 3 words, i.e. do not use a sentence to name a
function. e.g.
ThisIsMyAverageFunction() while syntactically correct is not
30. good programming practice.
• You are encouraged to use efficient Programming skills in
implementing the designed
Algorithm, e.g. for avoiding unnecessary Variables Declarations
etc., and in taking into
consideration the Computational Costs in Hardware of your
written Program Code, e.g. avoid
unnecessary Repetition Statements etc.
• Remember PHP & JavaScript are case sensitive so ‘Grades’
and ‘grades’ are not the same as
identifier names. Thus be case and spelling consistent. Use an
identifier name only once
and spell it (upper and lower case) the same way within your
program.
Finally give the project and your report a sensible name like
E.g. Unit35_CW_ID3344.
31. Department of Information Technology Page 7 of 10
Relevant Information
To gain a Pass in a BTEC HND Unit, you must meet ALL the
Pass criteria; to gain a Merit, you must
meet ALL the Merit and Pass criteria; and to gain a Distinction,
you must meet ALL the Distinction,
Merit and Pass criteria
1. Outcomes of the unit and assessment criteria
Outcomes Assessment criteria for pass. To achieve each
outcome a learner must demonstrate
Questions
reflecting the
outcome
LO1.
Understand the concepts
of web application
development
1.1 critically evaluate the functions and advantages of
web applications
1.2 critically compare different types of server-side and
client-side scripting languages
32. 1.3 examine web security concerns and make
recommendations for security improvements
Task 1 & TCA
LO2.
Be able to design web
applications
2.1 design a web application to meet a given
requirement
2.2 synthesise client-side and server-side functionality
in a web application
2.3 apply a database design for use in a web
application
2.4 evaluate alternative designs and solutions to meet a
given requirement
Task 2 & TCA
LO3.
Be able to implement
33. Web Applications
3.1 implement a web application to a prepared design
using client-side and server-side scripting languages
3.2 implement a web-enabled database management
system to store, retrieve and manipulate data in a web
application
3.3 identify and implement opportunities for error
handling
and reporting
Task 3 & TCA
LO4.
Be able to test Web
Applications
4.1 critically review and test a web application using a
web enabled database management system
4.2 analyse actual test results against expected results
to identify discrepancies
34. 4.3 critically evaluate independent feedback on a
developed web application and make recommendations
for improvements
4.4 create user documentation for a developed web
application.
Task 4 & TCA
Department of Information Technology Page 8 of 10
2. Grading Criteria for Merit and Distinction of this coursework
Merit (M1, M2, M3) Distinction (D1, D2, D3)
Descriptors Indicative characteristics Descriptors Indicative
characteristics
M1. Identify and
apply strategies to
find appropriate
solution
35. achieved
have been made
to study and research
has been applied
D1. Use critical reflection to
evaluate own work and
justify valid conclusions
Pass and Merit requirements
achieved
been evaluated using
defined criteria
been proposed against
defined characteristics for
success
37. has been demonstrated
projects or investigations
have been planned,
managed and organised
managed
independence has been
recognised and achieved
M3. Present and
communicate
appropriate findings
structure and
approach has been
used
38. development of
principles/concepts for
the intended audience
presentation has been
used and technical
language have been
accurately used
taken place in familiar
and unfamiliar
contexts
D3. Demonstrate
convergent/lateral/creative
thinking
and decisions taken
39. thinking have been applied
though have been applied
ss to new ideas
is evident
Department of Information Technology Page 9 of 10
3. Preparation guidelines of the Coursework Document
a. All coursework must be word processed.
b. Document margins must not be more than 2.54 cm (1 inch) or
less than 1.9cm (3/4 inch).
c. Font size must be within the range of 10 point to 14 point
including the headings and body text
(preferred font size is 11).
d. Standard and commonly used type face such as Arial should
be used.
e. All figures, graphs and tables must be numbered.
f. Material taken from external sources must be properly
refereed and cited within the text using
Harvard standard
g. Do not use Wikipedia as a reference.
40. h. Word limit must be strictly followed.
4. Plagiarism and Collusion
Any act of plagiarism or collusion will be seriously dealt with
according to the College
regulations. In this context the definition and scope of
plagiarism and collusion are presented
below:
Plagiarism is presenting somebody else’s work as your own. It
includes copying information
directly from the Web or books without referencing the
material; submitting joint coursework as
an individual effort.
Collusion is copying another student’s coursework; stealing
coursework from another student
and submitting it as your own work.
Suspected plagiarism or collusion will be investigated and if
found to have occurred will be
dealt with according to the college procedure. (For details on
Plagiarism & Collusion
please see the student hand book)
5. Submission
a. Initial submission of coursework to the tutors is compulsory
in each unit of the course.
b. Student must check their assignments on ICON VLE with
plagiarism software Turnitin to
make sure the similarity index for their assignment stays within
the College approved level. A
student can check the similarity index of their assignment three
times in the Draft
41. Assignment submission point located in the home page of the
ICON VLE.
c. All Final coursework must be submitted to the Final
submission point into the unit (not to
the Tutor). A student would be allowed to submit only once and
that is the final submission.
d. Any computer files generated such as program code
(software), graphic files that form part of
the coursework must be submitted as an attachment to the
assignment with all
documentation.
e. Any portfolio for a unit must be submitted as a hardcopy to
examination office.
f. The student must attach a tutor’s comment in between the
cover page and the answer in the
case of Resubmission.
6. Good practice
a. Make backup of your work in different media (hard disk,
memory stick etc.) to avoid distress
for loss or damage of your original copy.
7. Extension and Late Submission
a. If you need an extension for a valid reason, you must request
one using an Exceptional
Extenuating Circumstances (EEC) form available from the
College examination office and
ICON VLE. Please note that the lecturers do not have the
42. authority to extend the coursework
deadlines and therefore do not ask them to award a coursework
extension. The completed
form must be accompanied by evidence such as a medical
certificate in the event of you being
sick.
b. Late submission will be accepted and marked according to
the college procedure. It is noted
that late submission may not be graded for Merit and
Distinction.
c. All Late coursework must be submitted to the Late
submission point into the unit (not to the
Tutor). A student would be allowed to submit only once and that
is the final submission.
Department of Information Technology Page 10 of 10
8. Submission deadlines
Formative feedback Week 11
Presentation Week 12
Final Submission 28 Dec 2015 – 09 Jan 2016
Late submission 11 – 16 Jan 2016
Submit to: Online to the ICON VLE only
Glossary:
Analyse: Break an issue or topic into smaller parts by looking in
depth at each part. Support each
43. part with arguments and evidence for and against (Pros and
cons).
Critically Evaluate/Analyse: When you critically evaluate you
look at the arguments for and against
an issue. You look at the strengths and weaknesses of the
arguments. This could be from an article
you read in a journal or from a text book.
Discuss: When you discuss you look at both sides of a
discussion. You look at both sides of the
arguments. Then you look at the reason why it is important (for)
then you look at the reason why it is
important (against).
Explain: When you explain you must say why it is important or
not important.
Evaluate: When you evaluate you look at the arguments for and
against an issue.
Describe: When you give an account or representation of in
words.
Identify: When you identify you look at the most important
points.
Additional Specs, Hints & Good Programming Practices