Examination cover sheet

Size: px
Start display at page:

Download "Examination cover sheet"

Transcription

1 Student name: Student number: Examination cover sheet (to be completed by the examiner) Course name: Software specification and architecture Course code: 2IW81 Date: Start time: 09:00 End time : 12:00 Number of pages: 11 Number of questions: 5 Maximum number of points/distribution of points over questions:100 Method of determining final grade: divide total of points by 10 Answering style: multiple choice questions; open questions Exam inspection: With your instructor Other remarks: It is not allowed to use study materials or a computer during the exam. The examination questions have been inspected by Julien Schmaltz, Kees Huizing, Anton Wijs, Loek Cleophas, and Serguei Roubstov. Instructions for students and invigilators Permitted examination aids (to be supplied by students): Notebook Calculator Graphic calculator Lecture notes/book One A4 sheet of annotations Dictionar(y)(ies). If yes, please specify: Other: Important: examinees are only permitted to visit the toilets under supervision it is not permitted to leave the examination room within 15 minutes of the start and within the final 15 minutes of the examination, unless stated otherwise examination scripts (fully completed examination paper, stating name, student number, etc.) must always be handed in the house rules must be observed during the examination the instructions of examiners and invigilators must be followed no pencil cases are permitted on desks examinees are not permitted to share examination aids or lend them to each other During written examinations, the following actions will in any case be deemed to constitute fraud or attempted fraud: using another person s proof of identity/campus card (student identity card) having a mobile telephone or any other type of media-carrying device on your desk or in your clothes using, or attempting to use, unauthorized resources and aids, such as the internet, a mobile telephone, etc. using a clicker that does not belong to you having any paper at hand other than that provided by TU/e, unless stated otherwise visiting the toilet (or going outside) without permission or supervision Associated with the Central Examination Regulations

2 TECHNISCHE UNIVERSITEIT EINDHOVEN Department of Mathematics and Computer Science Examination Software specification and architecture Tuesday, April 12th 2016, 09h00 12h00. Your answers must be formulated and written down clearly. First read ALL questions once! This examination consists in two parts: the first part is composed of 20 multiplechoice questions. Each question gives you 2 or 0 points. The second part is composed of 4 exercises worth 20 points each. You need to complete at least 3 of these exercises. Students following 2IHS10 need to address questions 1 to 12 and the first two exercises (exercise A and exercise B). Multiple Choice Questions (40 points) Answer the following multiple-choice questions. Each question has only one correct answer. You should encircle your answer. For each question, you will get 2 points if you circled the correct answer; 0 point otherwise. Question 1 Consider the statement "The system shall be able to process up to 40 executing jobs at a time". Among the four options below, select the best formulation for this statement as a requirement: a. The system shall not be able to process more than 40 jobs at a time. b. The system shall process jobs up to 40 simultaneous jobs. c. The system shall be able to process jobs up to 40 simultaneous jobs. d. The system shall process typically 40 jobs at a time. Question 2 Select from the requirements below, the one that is S.M.A.R.T. a. The system shall start quickly. b. The system shall start in a few seconds. c. The system shall start within 4 seconds. d. The system shall start as fast as possible. 1

3 Question 3 Select the answer below that best describes the relation between the three use-cases A, B, and C below: a. Use-case A always executes use-case B and always executes use-case C. Question 4 b. Use-case A always executes use-case B and sometimes executes use-case C. c. Use-case A sometimes executes use-case B and always se-case executes C. d. Use-case A sometimes executes use-case B and sometimes executes use-case C. Which of the following statements pertaining to actors in use-cases is "FALSE"? a. In presence of generalization a more general actor can always replace the specialized one. b. One user might be represented by multiple actors in the same use-case. c. Actor is a class of entities falling beyond the system boundaries and interacting with the systems. d. One use-case might involve multiple actors. Question 5 Consider the class diagram below composed of 3 classes, namely, A, B, and C. Which of the following statements about this class diagram is "TRUE": a. When an instance of A is deleted, all instances of B are deleted. Instances of C are unchanged. b. When an instance of A is deleted, all instances of B created by A are deleted. Instances of C are unchanged. c. When an instance of A is deleted, all instances of B created by A are deleted. Instances of C are deleted as well. d. When an instance of A is deleted, instances of B and C are unchanged. 2

4 Question 6 Consider the class diagram below composed of 3 classes, namely, company, role, and contract. Note that no multiplicity means a multiplicity of 1. Which of the following statements about this class diagram is "TRUE": a. Every company can have only one contract. Question 7 b. Every company can play only one role per contract. c. Every contract can be associated to only one company. d. Every company can have multiple roles within one contract. Consider the class diagram below composed of 2 classes, namely, A and B. Which of the following statements about this class diagram is "TRUE": a. A is a generalization of B. b. A is a composition of B. c. B is an implementation of A. d. B is a generalization of A. Question 8 Consider the class diagram below composed of 2 classes, namely, plane and flight. Which of the following statements about this class diagram is "TRUE": a. One flight can be assigned only to zero or one planes. b. One flight can be assigned to any number of planes. c. One plane can be assigned only to zero or one flight. d. One plane must be assigned to at least one flight. Question 9 Consider the sequence diagram below composed of 2 instances of classes A and B. Which of the following statements about this class diagram is "TRUE": 3

5 a. Method1 must be implemented by class B. b. Method1 must be implemented by class A and B. c. Method1 must not be implemented by A nor by B. d. Method1 must be implemented by class A. Question 10 Consider the sequence diagram below composed of 3 class instances, namely, A, B, and C. Which of the following statements is not enforced by the sequence diagram: a. m1 is received before m2 is sent. b. m2 is received before m3 is sent. c. m1 is sent before m2 is sent. d. m2 is sent before m3 is sent. Question 11 In the activity diagram below, which one of the executions (to completion) is not possible? a. A completes then C completes. B starts but is killed. b. B completes then C completes. A starts but is killed. c. A and B complete, C completes once. d. A and B complete, then C completes twice. Question 12 Consider the UML state machine below. Consider the sequence of events: e1, e3, e4, e5, e2. What state is reached at the end of this sequence? 4

6 H 1 e1 e2 2 a. 1 b. 2 c. 3 e3 e5 d. 4 3 e4 4 Question 13 Consider a traffic light. Whenever the light becomes green, it remains green until it becomes orange. It might remains orange for some time before it eventually becomes red. Which of the following LTL formulas expresses this statement? a. G(green green U (orange U red) b. G(green U orange U red) c. G(green X(green U (orange U red)) d. G(green X(green U (orange (orange U red))) Question 14 Consider a printer. A user can access the printer by sending a req signal to the printer. The printer will grant access to its services by responding with an ack signal. A requirement of the printer is to be fair, that is, it eventually serves all requests. Which of the following LTL formulas expresses this statement? a. G(req U ack) b. G(req Fack) c. G(req ack) d. GF(req ack) 5

7 Question 15 Consider the Labelled Transition System (LTS) below over atomic propositions a and b. Which of the following LTL properties holds for this LTS? a. GFb b. FGb c. Ga d. Gb Question 16 Which statement about the notion of "Time convergent sequences" of Timed Automata is "TRUE"? a. Time convergent sequences are flaws in model. b. Time convergent sequences come from zeno paths. c. Time convergent sequences cannot be avoided. d. Time convergent sequences are only present in models with timelocks. Question 17 Which statement defines the notion of "Timelock" in the theory of Timed Automata? a. A Timed Automaton has a timelock in state s if and only if there are no zeno paths starting from state s. b. A Timed Automaton has a timelock in state s if and only if there are no infinite sequences starting from state s. c. A Timed Automaton has a timelock in state s if and only if there are no time divergent sequences starting from s. d. A Timed Automaton has a timelock in state s if and only if there are no time convergent sequences starting from s 6

8 Question 18 Consider the Timed Automaton below over atomic propositions start and stop and clock x. The initial state is state number 0. Select the statement below that holds for this Timed Automaton a. This timed automaton has a timelock. b. This timed automaton has a zeno path. c. The time spent in state 1 is at least 2 time units and at most 5 time units. d. When in state 1, a stoptransition always takes place when clock x equals 2. Question 19 Which stakeholders are addressed by the process view of the 4+1 Views model of Kruchten: a. end-users b. programmers c. system integrators d. system engineers Question 20 The Gnutella protocol is an open decentralized group membership and search protocol. Gnutella has been designed to operate in a dynamic environment, where hosts can join and leave the network frequently. Furthermore, Gnutella is expected to be scalable and reliable, that is, external attacks should not cause significant data or performance loss. Which one of the following architectural styles would you apply if you would be designing Gnutella? a. Blackboard b. Client-server c. Peer-to-peer d. Mobile code 7

9 Exercises (60 points) The second part of the examination consists in four exercises, 20 points each. You should answer at least three of these exercises. Please read all exercises first, choose the ones you are most comfortable with. Should you decide to answer four exercises, we will consider the three best solutions. Please, keep in mind that three correct solutions will give you more points than four wrong ones! Exercise A (Class Diagram) An internet shop sells items via shopping carts. Customers have a name, delivery address, address, and preferred payment strategy (see below). A customer has at most one shopping cart to which he/she can add and remove items. When finished with shopping, the customer takes the cart to checkout. There are several payment strategies (credit card, Paypal, ideal) that can be chosen (or changed) at checkout. After successful checkout, an order is created that is kept in a list of standing orders, until the order is delivered. Write a class diagram that models the internet shop described above. Pay attention to multiplicities. Do not add attributes for references that are drawn as relations (arrows representing association, etc.). Do not add getter and setter methods for attributes. Exercise B (General UML diagrams) Consider a software system supporting the work process of the TU/e Bureau for Computer Facilities (BCF). This bureau handles purchase laptop requests from employees. A case worker within BCF receives that request and monitors it until it is ordered and received. Case workers process the requests for laptops under Euro s, write a purchase order, and then send it to the approved vendor. Purchase requests over Euro s must first be sent out for a bid from the vendor that supplies the product. When the bids return, the case worker selects one bid. Then, the case worker writes a purchase order to be sent to the approved vendor. Once a laptop is received, BCF workers need to register it for easy network access and administrative purposes (who has which laptop). BCF also creates a special BCF account on every laptop for remote maintenance. It might happen that a laptop is given to its user before it is properly registered (say, the MAC address has not been registered). In that case, the software system will automatically send reminders to BCF workers to complete the laptop registration. a. (6 points) Draw a use case diagram for the BCF software system. In addition, give a detailed scenario (pre-condition, trigger, post-condition, main scenario, alternatives) of one of the use cases of your use case diagram. 8

10 b. (6 points) Based on the description of your scenario, draw an activity diagram for it. c. (6 points) Based on the description of this scenario, draw a sequence diagram for it. d. (2 points) informally argue about the consistency between the different diagrams. 9

11 Figure 1: Paper producer machine. Exercise C (LTL and TA) Consider the system shown in Figure 1. It is composed of a Machine, a coffee craving Person, and an Observer. The Machine is a coffee machine accepting coins as input and producing coffee. As you can see from the Timed Automaton of the Person, the Person repeatedly (tries to) insert a coin, (tries to) extract coffee after which (s)he will make a publication. Between each action the person requires a suitable time-delay before being ready to participate in the next one. The machine takes some time for brewing the coffee and will time-out if coffee has not been taken before a certain upper time limit. As a requirement we want the overall behaviour to ensure that the indicated Observer experiences a constant flow of publications from the system. In particular we want the Observer to complain if at any time more than 8 time-units elapse between two consecutive publications. a. (8 points) Create a Timed Automaton modelling the Machine and a Timed Automaton modelling the Observer. The objective is to insert state labels to all these models so that it is possible to express the following properties. You must also formalise those properties in LTL: (a) The Observer never complains. (b) If a coin has been inserted and next coffee has been received, a publication will eventually follow. (c) If a coin has been inserted, coffee is eventually produced. 10

12 b. (2 points) Do the models have timelock or zeno paths? Motivate your answer. c. (10 points) In the previous you formalised three properties. Do they hold? If yes, justify your answer. If not, please provide a counter-example to each property. A counter-example is a finite trace so that at the end of the trace the property is violated. If the properties do not hold, correct your models. Explain the motivation for your changes. 11

13 Exercise D (Architecture) (David Parnas, 1972) The KWIC ("keyword in context") index system accepts an ordered set of lines, each line is an ordered set of words, and each word is an ordered set of characters. Any line may be "circularly shifted" by repeatedly removing the first word and appending it at the end of the line. The KWIC index system outputs a listing of all circular shifts of all lines in alphabetical order. For example, given the following lines as the input: Programming methods Software specification and architecture Software engineering KWIC can be expected to produce the following output: and architecture Software specification architecture Software specification and engineering Software methods Programming Programming methods Software engineering Software specification and architecture specification and architecture Software While full-text search is possible these days instead, a KWIC index system may still be used in e.g. a search engine to show the context of a queried keyword in a search results. Your goal is to define a software architecture for the KWIC system. a. (5 points) Decide on the functional blocks needed for this system. b. (5 points) Select an architecture style to map these functional blocks to an architecture. Why and how would you use this style? c. What are the advantages and the disadvantages of your architecture? Consider how your architecture accommodates (a) (2 points) changes in data representation (e.g., circular shifts are stored as separate entities or lines are stored only as they have been entered and shifts are indicated using an index), (b) (2 points) changes in the algorithm (e.g., lines can be shifted as they are read or after all lines have been read and sorting can be done incrementally), 12

14 (c) (2 points) new functionality being added (e.g., removal of so-called stop words such as "and" or "the", or adding/removing case-sensitivity), (d) (2 points) huge amounts of data to process, (e) (2 points) the need to reuse some of the KWIC components as building blocks for a different system? 13

Software Specification and Architecture 2IW80

Software Specification and Architecture 2IW80 Software Specification and Architecture 2IW80 Julien Schmaltz Recapitulation Session Exam» April 12.04.2016 09:00 12:00» Location: check OASE» Part I. 40 multiple choice questions (4 options)» 1 point

More information

CPSC 410 Advanced Software Engineering Mid-term Examination (Term I ): Solution Instructor: Gail Murphy

CPSC 410 Advanced Software Engineering Mid-term Examination (Term I ): Solution Instructor: Gail Murphy CPSC 410 Advanced Software Engineering Mid-term Examination (Term I 2003-2004): Solution Instructor: Gail Murphy Do NOT start until you are informed you can start! This examination has 6 questions. The

More information

Frequently asked questions on the Exam Period

Frequently asked questions on the Exam Period Frequently asked questions on the Exam Period - Autumn 2018/2019-1. What can I do if I passed the exam, but I am not satisfied with my mark? You can take a grade improvement examination: retaking a successful

More information

Informatics 1 - Computation & Logic: Tutorial 5

Informatics 1 - Computation & Logic: Tutorial 5 Informatics - Computation & Logic: Tutorial 5 Computation: Introduction to Finite State Machines Week 7: 3 October - 4 November 206 Please attempt the entire worksheet in advance of the tutorial, and bring

More information

University of Virginia Department of Computer Science. CS 4501: Information Retrieval Fall 2015

University of Virginia Department of Computer Science. CS 4501: Information Retrieval Fall 2015 University of Virginia Department of Computer Science CS 4501: Information Retrieval Fall 2015 2:00pm-3:30pm, Tuesday, December 15th Name: ComputingID: This is a closed book and closed notes exam. No electronic

More information

Test 2 Version A. On my honor, I have neither given nor received inappropriate or unauthorized information at any time before or during this test.

Test 2 Version A. On my honor, I have neither given nor received inappropriate or unauthorized information at any time before or during this test. Student s Printed Name: Instructor: CUID: Section: Instructions: You are not permitted to use a calculator on any portion of this test. You are not allowed to use any textbook, notes, cell phone, laptop,

More information

download instant at The Relational Data Model

download instant at  The Relational Data Model 3 The Relational Data Model EXERCISES 3.1 Define data atomicity as it relates to the definition of relational databases. Contrast data atomicity with transaction atomicity as used in a transaction processing

More information

Algorithms, Probability, and Computing Midterm Exam HS17

Algorithms, Probability, and Computing Midterm Exam HS17 Institute of Theoretical Computer Science Mohsen Ghaffari, Angelika Steger, David Steurer, Emo Welzl, Peter Widmayer Algorithms, Probability, and Computing Midterm Exam HS17 Candidate First name:...................................................

More information

Chapter 10. Object-Oriented Analysis and Modeling Using the UML. McGraw-Hill/Irwin

Chapter 10. Object-Oriented Analysis and Modeling Using the UML. McGraw-Hill/Irwin Chapter 10 Object-Oriented Analysis and Modeling Using the UML McGraw-Hill/Irwin Copyright 2007 by The McGraw-Hill Companies, Inc. All rights reserved. Objectives 10-2 Define object modeling and explain

More information

ITS310: Introduction to Computer Based Systems Credit Hours: 3

ITS310: Introduction to Computer Based Systems Credit Hours: 3 ITS310: Introduction to Computer Based Systems Credit Hours: 3 Contact Hours: This is a 3 credit course, offered in accelerated format. This means that 16 weeks of material is covered in 8 weeks. The exact

More information

The University of British Columbia Final Examination - December 02, 2014 Mathematics 308. Closed book examination. No calculators.

The University of British Columbia Final Examination - December 02, 2014 Mathematics 308. Closed book examination. No calculators. The University of British Columbia Final Examination - December 02, 2014 Mathematics 308 Closed book examination. No calculators. Time: 2.5 hours Last Name First Signature Student Number No books, notes,

More information

Instructions to Examination Invigilators

Instructions to Examination Invigilators Instructions to Examination Invigilators APMP APMP for registered PRINCE2 Practitioners Introductory Certificate Risk Level 1 Risk Level 2 Invigilator Guidance Notes v1.3 Page 1 of 9 Introduction.....

More information

Model checking and timed CTL

Model checking and timed CTL Chapter 6 Model checking and timed CTL Ah! What did I tell you? 88 miles per hour! The temporal displacement occurred at exactly 1:20am and *zero* seconds! [Dr Emmett Brown] 6.1 Timed CTL Page 86 Formal

More information

Lesson 3: Identifying Key Characteristics of Workgroups and Domains

Lesson 3: Identifying Key Characteristics of Workgroups and Domains 1-16 Chapter 1 Introduction to Windows XP Professional Lesson 3: Identifying Key Characteristics of Workgroups and Domains Windows XP Professional supports two types of network environments in which users

More information

Word Processor Procedure

Word Processor Procedure Document Control Appendix 4 Word Processor Procedure Version Number: 1 Applicable To: Committee: All Secondary Academies Achievement for All Approved By Committee On: November 2016 Review Cycle: Bi-annually

More information

CPSC 121 Some Sample Questions for the Final Exam Tuesday, April 15, 2014, 8:30AM

CPSC 121 Some Sample Questions for the Final Exam Tuesday, April 15, 2014, 8:30AM CPSC 121 Some Sample Questions for the Final Exam Tuesday, April 15, 2014, 8:30AM Name: Student ID: Signature: Section (circle one): George Steve Your signature acknowledges your understanding of and agreement

More information

Software Specification and Architecture 2IW80

Software Specification and Architecture 2IW80 Software Specification and Architecture 2IW80 Julien Schmaltz (slides partly from M. Mousavi and A. Serebrenik) Lecture 02: Requirements Requirements specification» Textual description of system behaviour»

More information

EECS 3214 Final Exam Winter 2017 April 19, 2017 Instructor: S. Datta. 3. You have 180 minutes to complete the exam. Use your time judiciously.

EECS 3214 Final Exam Winter 2017 April 19, 2017 Instructor: S. Datta. 3. You have 180 minutes to complete the exam. Use your time judiciously. EECS 3214 Final Exam Winter 2017 April 19, 2017 Instructor: S. Datta Name (LAST, FIRST): Student number: Instructions: 1. If you have not done so, put away all books, papers, and electronic communication

More information

Course Modelling of Concurrent Systems Summer Semester 2016 University of Duisburg-Essen

Course Modelling of Concurrent Systems Summer Semester 2016 University of Duisburg-Essen Course Modelling of Concurrent Systems Summer Semester 2016 University of Duisburg-Essen Harsh Beohar LF 265, harsh.beohar@uni-due.de Harsh Beohar Course Modelling of Concurrent Systems 1 Course handler

More information

Confined Space Entry (CSE) Certification Training Standard

Confined Space Entry (CSE) Certification Training Standard Confined Space Entry (CSE) Certification Training Standard The Newfoundland and Labrador Occupational Health and Safety Regulations, Section 511 (3) states that a person shall not work in a Confined Space

More information

Criteria to Participate as an ACE Authorized Test Provider

Criteria to Participate as an ACE Authorized Test Provider Criteria to Participate as an ACE Authorized Test Provider Overview of the Authorized Test Provider Program Organizations with ACE credit-recommendation sometimes distribute or sell their courseware to

More information

Automated Formal Methods for Embedded Systems

Automated Formal Methods for Embedded Systems Automated Formal Methods for Embedded Systems Bernd Finkbeiner Universität des Saarlandes Reactive Systems Group 2011/02/03 Bernd Finkbeiner (UdS) Embedded Systems 2011/02/03 1 / 48 Automated Formal Methods

More information

CLAN: A Tool for Contract Analysis and Conflict Discovery

CLAN: A Tool for Contract Analysis and Conflict Discovery CLAN: A Tool for Contract Analysis and Conflict Discovery Stephen Fenech 1, Gordon J. Pace 1, and Gerardo Schneider 2 1 Dept. of Computer Science, University of Malta, Malta 2 Dept. of Informatics, University

More information

Discrete Mathematics and Probability Theory Spring 2016 Rao and Walrand Midterm 1

Discrete Mathematics and Probability Theory Spring 2016 Rao and Walrand Midterm 1 CS 70 Discrete Mathematics and Probability Theory Spring 2016 Rao and Walrand Midterm 1 PRINT Your Name:, (last) SIGN Your Name: (first) PRINT Your Student ID: CIRCLE your exam room: 1 Pimentel 141 Mccone

More information

Joint Entity Resolution

Joint Entity Resolution Joint Entity Resolution Steven Euijong Whang, Hector Garcia-Molina Computer Science Department, Stanford University 353 Serra Mall, Stanford, CA 94305, USA {swhang, hector}@cs.stanford.edu No Institute

More information

2014 Proctor's Guide for the Certified Public Finance Officer Examinations

2014 Proctor's Guide for the Certified Public Finance Officer Examinations What's Your Next Move? Get ready for a move up by earning designation as a Certified Public Finance Officer! 2014 Proctor's Guide for the Certified Public Finance Officer Examinations Government Finance

More information

ASOPE PROCTOR TRAINING AND GUIDELINES

ASOPE PROCTOR TRAINING AND GUIDELINES ASOPE ASOPE PROCTOR TRAINING AND GUIDELINES Produced By ASOPE Overview The American Society of Power Engineers, Inc. (ASOPE) testing modules are executed in testing locations by Proctors who are assigned

More information

Course Modelling of Concurrent Systems Summer Semester 2016 University of Duisburg-Essen

Course Modelling of Concurrent Systems Summer Semester 2016 University of Duisburg-Essen Course Modelling of Concurrent Systems Summer Semester 2016 University of Duisburg-Essen Harsh Beohar LF 265, harsh.beohar@uni-due.de Harsh Beohar Course Modelling of Concurrent Systems 1 Course handler

More information

Administration and Examination Guidelines for Holding ISEB BSD Written Examinations

Administration and Examination Guidelines for Holding ISEB BSD Written Examinations 1. New BSD Modules Administration and Examination Guidelines for Holding ISEB BSD Written Examinations Examination Guidelines Providers who are eligible to hold an examination for the first time must submit

More information

Word processor policy 2016/17. Approved by. Name: Title:

Word processor policy 2016/17. Approved by. Name: Title: Word processor policy 2016/17 Approved by Name: Title: Date of next review January 2018 Contents Introduction... 3 Principles for using a word processor... 3 The use of a word processor... 4 Word processors

More information

FUJAA GENERAL EXAMINATION REQUIREMENTS & PROCEDURE

FUJAA GENERAL EXAMINATION REQUIREMENTS & PROCEDURE FUJAA GENERAL EXAMINATION REQUIREMENTS & PROCEDURE Please read and understand the following requirements of Part/CAR 66 Examination before completing the application / registration form. Part/CAR Examinations

More information

Word Processor policy 2016/17

Word Processor policy 2016/17 Appendix E Word Processor policy 2016/17 This policy is reviewed annually to ensure compliance with current regulations Completed by Exams/Data Manager Approved by SLT Date of next review January 2018

More information

GUIDELINES FOR EXAM CANDIDATES AT UNIVERSITY OF NORDLAND

GUIDELINES FOR EXAM CANDIDATES AT UNIVERSITY OF NORDLAND GUIDELINES FOR EXAM CANDIDATES AT UNIVERSITY OF NORDLAND These guidelines are supplementary provisions to The Regulations Concerning Studies and exams at University of Nordland. Decided upon by The Board

More information

Renewal Registration & CPE for CPAs in Iowa

Renewal Registration & CPE for CPAs in Iowa 1. When must I renew my certificate? Renewal Registration Process You must renew your certificate annually with the Iowa Accountancy Examining Board (IAEB). Online renewal is typically available May 15

More information

Writing Diploma Exams Using Computers Humanities Part(ie) A, Mathematics 30-2 and Science 30

Writing Diploma Exams Using Computers Humanities Part(ie) A, Mathematics 30-2 and Science 30 Writing Diploma Exams Using Computers Humanities Part(ie) A, Mathematics 30-2 and Science 30 BACKGROUND Examinees are permitted to use computers when writing some diploma exams. The principles, directives,

More information

Higher Reach Online Registration

Higher Reach Online Registration Higher Reach Online Registration July 12, 2013 (Version 1) kc This procedure guide contains information for students and administration. QUICK ADMIT Define three roles that someone can use to log in to

More information

Overview. Discrete Event Systems - Verification of Finite Automata. What can finite automata be used for? What can finite automata be used for?

Overview. Discrete Event Systems - Verification of Finite Automata. What can finite automata be used for? What can finite automata be used for? Computer Engineering and Networks Overview Discrete Event Systems - Verification of Finite Automata Lothar Thiele Introduction Binary Decision Diagrams Representation of Boolean Functions Comparing two

More information

Object Oriented Programming

Object Oriented Programming Binnur Kurt kurt@ce.itu.edu.tr Istanbul Technical University Computer Engineering Department 1 Version 0.1.2 About the Lecturer BSc İTÜ, Computer Engineering Department, 1995 MSc İTÜ, Computer Engineering

More information

Further Topics in Modelling & Verification

Further Topics in Modelling & Verification Further Topics in Modelling & Verification Thursday Oct 09, 2014 Philipp Rümmer Uppsala University Philipp.Ruemmer@it.uu.se 1/34 Recap: Timed automata (TA) 2/34 Recap: Properties 3/34 Questions about TA

More information

THE UNIVERSITY OF BRITISH COLUMBIA CPSC 121: MIDTERM 2 Group March 12, 2014

THE UNIVERSITY OF BRITISH COLUMBIA CPSC 121: MIDTERM 2 Group March 12, 2014 THE UNIVERSITY OF BRITISH COLUMBIA CPSC 121: MIDTERM 2 Group March 12, 2014 Important notes about this examination 1. You have 40 minutes to complete this exam. 2. No electronic aides (e.g., phones or

More information

Home Inspection 2014

Home Inspection 2014 Home Inspection 2014 Home Inspection A fifteen hour continuing education course approved by the California Bureau of Real Estate (CalBRE) to meet the requirements of the Business and Professions Code Section

More information

Formal Methods for Software Development

Formal Methods for Software Development Formal Methods for Software Development Model Checking with Temporal Logic Wolfgang Ahrendt 21st September 2018 FMSD: Model Checking with Temporal Logic /GU 180921 1 / 37 Model Checking Check whether a

More information

(a) Assuming the server is up, do stockholders receive price quotes within 3 seconds even if 200 stockholders request quotes simultaneously?

(a) Assuming the server is up, do stockholders receive price quotes within 3 seconds even if 200 stockholders request quotes simultaneously? Name: CS3733: Software Engineering B00 Midterm Exam Question Poss. Points Grade 1 15 2 20 3 20 4 15 5 15 6 15 Total Answer all questions in the spaces provided on this exam. If you need additional space,

More information

IS 263 Database Concepts

IS 263 Database Concepts IS 263 Database Concepts Lecture 4: Normalization Instructor: Henry Kalisti 1 Department of Computer Science and Engineering Limitations of E- R Designs Provides a set of guidelines, does not result in

More information

Software Life-Cycle Models

Software Life-Cycle Models Software Life-Cycle Models CMPSC 487 Lecture 03 Topics: UML Class Diagram Rosenburg Chap 2. Domain Modeling A. UML: Unified Modeling Language UML is a general-purpose, developmental, modeling language

More information

Software Engineering Fall 2014

Software Engineering Fall 2014 Software Engineering Fall 2014 (CSC 4350/6350) Mon.- Wed. 5:30 pm 7:15 pm ALC : 107 Rao Casturi 10/01/2014 Class Announcements Grading is done for the Deliverable #2 (Requirement Elicitation) Will be posed

More information

course 3 Levels of Database Design CSCI 403 Database Management Mines Courses ERD Attributes Entities title 9/26/2018

course 3 Levels of Database Design CSCI 403 Database Management Mines Courses ERD Attributes Entities title 9/26/2018 3 Levels of Database Design CSCI 403 Database Management 13 Database Modeling with Entity-Relationship Diagrams Conceptual (this lecture) Understand data entities & relationships between them Communication

More information

Introduction to Software Engineering. 6. Modeling Behaviour

Introduction to Software Engineering. 6. Modeling Behaviour Introduction to Software Engineering 6. Modeling Behaviour Roadmap > Use Case Diagrams > Sequence Diagrams > Collaboration (Communication) Diagrams > Activity Diagrams > Statechart Diagrams Nested statecharts

More information

Salesforce Enterprise Edition Upgrade Guide

Salesforce Enterprise Edition Upgrade Guide Salesforce Enterprise Edition Upgrade Guide Salesforce, Spring 16 @salesforcedocs Last updated: February 11, 2016 Copyright 2000 2016 salesforce.com, inc. All rights reserved. Salesforce is a registered

More information

Introduction to Algorithms May 14, 2003 Massachusetts Institute of Technology Professors Erik Demaine and Shafi Goldwasser.

Introduction to Algorithms May 14, 2003 Massachusetts Institute of Technology Professors Erik Demaine and Shafi Goldwasser. Introduction to Algorithms May 14, 2003 Massachusetts Institute of Technology 6.046J/18.410J Professors Erik Demaine and Shafi Goldwasser Practice Final Practice Final Do not open this exam booklet until

More information

Week 8: The fundamentals of graph theory; Planar Graphs 25 and 27 October, 2017

Week 8: The fundamentals of graph theory; Planar Graphs 25 and 27 October, 2017 (1/25) MA284 : Discrete Mathematics Week 8: The fundamentals of graph theory; Planar Graphs 25 and 27 October, 2017 1 Definitions 1. A graph 2. Paths and connected graphs 3. Complete graphs 4. Vertex degree

More information

PRIVACY POLICY QUICK GUIDE TO CONTENTS

PRIVACY POLICY QUICK GUIDE TO CONTENTS PRIVACY POLICY This privacy policy describes the policies and practices of Comodo Security Solutions, Inc. and Comodo Security Solutions Ltd. (collectively and individually referred to herein as "Comodo"),

More information

THE UNIVERSITY OF BRITISH COLUMBIA CPSC 110: MIDTERM 1 Part B May 26, Important notes about this examination

THE UNIVERSITY OF BRITISH COLUMBIA CPSC 110: MIDTERM 1 Part B May 26, Important notes about this examination THE UNIVERSITY OF BRITISH COLUMBIA CPSC 110: MIDTERM 1 Part B May 26, 2014 Last Name: First Name: Signature: UBC Student #: Important notes about this examination 1. This exam has two separate parts. Your

More information

CSC2108: Automated Verification Assignment 1 - Solutions

CSC2108: Automated Verification Assignment 1 - Solutions 8 CSC218: Automated Verification Assignment 1 - Solutions 1. Solve the following problem: Use the definition of between states and CTL formulas to explain why means that is true infinitely often along

More information

Chapter 13. Digital Cash. Information Security/System Security p. 570/626

Chapter 13. Digital Cash. Information Security/System Security p. 570/626 Chapter 13 Digital Cash Information Security/System Security p. 570/626 Introduction While cash is used in illegal activities such as bribing money laundering tax evasion it also protects privacy: not

More information

CPSC 121 Sample Final Examination December 2013

CPSC 121 Sample Final Examination December 2013 CPSC 121 Sample Final Examination December 2013 Name: Student ID: Signature: You have 150 minutes to write the 11 questions on this examination. A total of 98 marks are available. Justify all of your answers.

More information

INCREMENTAL SOFTWARE CONSTRUCTION WITH REFINEMENT DIAGRAMS

INCREMENTAL SOFTWARE CONSTRUCTION WITH REFINEMENT DIAGRAMS INCREMENTAL SOFTWARE CONSTRUCTION WITH REFINEMENT DIAGRAMS Ralph-Johan Back Abo Akademi University July 6, 2006 Home page: www.abo.fi/~backrj Research / Current research / Incremental Software Construction

More information

TECHNISCHE UNIVERSITEIT EINDHOVEN Faculteit Wiskunde en Informatica

TECHNISCHE UNIVERSITEIT EINDHOVEN Faculteit Wiskunde en Informatica TECHNISCHE UNIVERSITEIT EINDHOVEN Faculteit Wiskunde en Informatica Examination Architecture of Distributed Systems (2IMN10/2II45), on Monday January 25, 2016, from 18.00 to 21.00 hours. Indicate on your

More information

B) Symmetric Ciphers. B.a) Fundamentals B.b) Block Ciphers B.c) Stream Ciphers

B) Symmetric Ciphers. B.a) Fundamentals B.b) Block Ciphers B.c) Stream Ciphers 1 B) Symmetric Ciphers B.a) Fundamentals B.b) Block Ciphers B.c) Stream Ciphers B.a) Fundamentals 2 B.1 Definition 3 A mapping Enc: P K C for which ϕ k := Enc(,k): P C is bijective for each k K is called

More information

General Terms and Conditions

General Terms and Conditions General Terms and Conditions Contents: Article 1 Applicability Article 2 Definitions Article 3 Identity and Customer Support Article 4 The services provided by Online PrePaid Services Article 5 The offer

More information

Baruch Cellular Device Policy

Baruch Cellular Device Policy Baruch Cellular Device Policy 1. General: a. The need for cellular devices must be justified. Convenience is not sufficient justification. There must be a demonstrated business purpose for an employee

More information

Michael Kifer, Arthur Bernstein, Philip M. Lewis. Solutions Manual

Michael Kifer, Arthur Bernstein, Philip M. Lewis. Solutions Manual Michael Kifer, Arthur Bernstein, Philip M. Lewis Solutions Manual Copyright (C) 2006 by Pearson Education, Inc. For information on obtaining permission for use of material in this work, please submit a

More information

INSTRUCTIONS. What are the steps to apply? What is this? Who can apply? How does it work? What does the test cover?

INSTRUCTIONS. What are the steps to apply? What is this? Who can apply? How does it work? What does the test cover? INSTRUCTIONS What is this? This program has been established to enable experienced fire sprinkler fitters/installers a means to demonstrate their knowledge in the field of fire sprinkler installation.

More information

START the Registration Process

START the Registration Process Obtain the following information from your instructor before you begin enrolling in Undergraduate CGE UNI-TRACK classes for Credit Course Title: Class # Class Term: Spring 2018 FIRST TIME Uni-track student.

More information

WHAT S CHANGING IN PROCURE-TO-PAY

WHAT S CHANGING IN PROCURE-TO-PAY epayment Forum WHAT S CHANGING IN PROCURE-TO-PAY August 2017 Session Objectives During this session, we will discuss: Overview of the University s Preferred Purchasing Methods Changes to the check request

More information

Updated: 2/14/2017 Page 1 of 6

Updated: 2/14/2017 Page 1 of 6 MASTER SYLLABUS 2017-2018 A. Academic Division: Business, Industry, and Technology B. Discipline: Engineering Technology C. Course Number and Title: ENGR1910 Engineering Programming D. Course Coordinator:

More information

CMSC 132: Object-Oriented Programming II

CMSC 132: Object-Oriented Programming II CMSC 132: Object-Oriented Programming II Problem Specification & Software Architecture Department of Computer Science University of Maryland, College Park Overview Problem specification Obstacles Software

More information

UNIT 3 INTRODUCTORY MICROSOFT EXCEL LESSON 6 MAKING THE WORKSHEET USEFUL

UNIT 3 INTRODUCTORY MICROSOFT EXCEL LESSON 6 MAKING THE WORKSHEET USEFUL UNIT 3 INTRODUCTORY MICROSOFT EXCEL LESSON 6 MAKING THE WORKSHEET USEFUL Objectives Sort data in a worksheet. Use the AutoFilter to extract specified data from the worksheet. Hide worksheet columns or

More information

Network Systems ( / ), Test 3 March 24, 2017, 13:45 15:15

Network Systems ( / ), Test 3 March 24, 2017, 13:45 15:15 Network Systems (201600146/201600197), Test 3 March 24, 2017, 13:45 15:15 This is an open-book exam: you are allowed to use the book by Peterson & Davie and the reader that belongs to this module. Furthermore,

More information

21) Functional and Modular Design

21) Functional and Modular Design Fakultät Informatik - Institut Software- und Multimediatechnik - Softwaretechnologie Prof. Aßmann - 21) Functional and Modular Design Prof. Dr. U. Aßmann Technische Universität Dresden Institut für Software-

More information

Finite Mathematical Structures A

Finite Mathematical Structures A MS 301.2 (Spring, 2010) stie rkin inite Mathematical Structures xam 1: Thursday, ebruary 25, 2010 R TS INSTRUTIONS RULLY. o not start the exam until told to do so. Make certain that you have all 5 pages

More information

CONNECT TRANSIT CARD Pilot Program - Privacy Policy Effective Date: April 18, 2014

CONNECT TRANSIT CARD Pilot Program - Privacy Policy Effective Date: April 18, 2014 CONNECT TRANSIT CARD Pilot Program - Privacy Policy Effective Date: April 18, 2014 1. Welcome 1.1 Welcome to the Connect Transit Card Program. The Connect Card Program makes using public transit easier

More information

Examiners/Instructors Manual for Practical Examinations For trades of Hairstylist, Esthetician and Electrologist

Examiners/Instructors Manual for Practical Examinations For trades of Hairstylist, Esthetician and Electrologist Examiners/Instructors Manual for Practical Examinations INTRODUCTION The purpose of this document is to provide a comprehensive source of information for examiners and instructors regarding the mandatory

More information

Seattle University Identity Theft Prevention Program. Purpose. Definitions

Seattle University Identity Theft Prevention Program. Purpose. Definitions Seattle University Identity Theft Prevention Program Purpose The purpose of the program is to establish an Identity Theft Prevention Program designed to detect, prevent and mitigate identity theft in connection

More information

TECHNISCHE UNIVERSITEIT EINDHOVEN Faculteit Wiskunde en Informatica

TECHNISCHE UNIVERSITEIT EINDHOVEN Faculteit Wiskunde en Informatica TECHNISCHE UNIVERSITEIT EINDHOVEN Faculteit Wiskunde en Informatica Examination Operating Systems (2IN05) on January 18, 2010, 14.00h-17.00h. The exam consists of two parts that are handed in separately.

More information

May Comp-B 11, Advanced Software Design. 3 hours duration

May Comp-B 11, Advanced Software Design. 3 hours duration May 2016 98-Comp-B 11, Advanced Software Design 3 hours duration NOTES: 1. If doubt exists as to the interpretation of any question, the candidate is urged to submit, with the answer paper, a clear statement

More information

In his paper of 1972, Parnas proposed the following problem [42]:

In his paper of 1972, Parnas proposed the following problem [42]: another part of its interface. (In fact, Unix pipe and filter systems do this, the file system playing the role of the repository and initialization switches playing the role of control.) Another example

More information

4: Specifying State-based Behavior With UML Statechart Diagrams

4: Specifying State-based Behavior With UML Statechart Diagrams Outline UML Design Supplement 4: Specifying State-based Behavior With UML Statechart Diagrams Introduction to Statecharts Statechart building blocks States Transitions Advanced Characteristics Composite

More information

Building Standards Department Markham eplan Applicant Handbook For Building Permits, Sign Permits and Zoning Preliminary Review

Building Standards Department Markham eplan Applicant Handbook For Building Permits, Sign Permits and Zoning Preliminary Review Markham eplan Applicant Handbook For Building Permits, Sign Permits and Zoning Preliminary Review In addition to this user manual, please refer to the instructions provided in the electronic forms (eforms)

More information

Software Engineering Fall 2015 (CSC 4350/6350) TR. 5:30 pm 7:15 pm. Rao Casturi 09/29/2015

Software Engineering Fall 2015 (CSC 4350/6350) TR. 5:30 pm 7:15 pm. Rao Casturi 09/29/2015 Software Engineering Fall 2015 (CSC 4350/6350) TR. 5:30 pm 7:15 pm Rao Casturi 09/29/2015 http://cs.gsu.edu/~ncasturi1 Class Announcements Grading is done for the Deliverable #2 (Requirement Elicitation)

More information

GENERAL CONDITIONS FOR POWER ENGINEERING EXAMINATIONS AND REFRIGERATION OPERATORS A AND B AND COMPRESSOR OPERATORS

GENERAL CONDITIONS FOR POWER ENGINEERING EXAMINATIONS AND REFRIGERATION OPERATORS A AND B AND COMPRESSOR OPERATORS GENERAL CONDITIONS F POWER ENGINEERING EXAMINATIONS AND REFRIGERATION OPERATS A AND B AND COMPRESS OPERATS TABLE OF CONTENTS PAGE 1. Definitions..3 2. Classification..3 3. Applications for Examinations.3

More information

Software Engineering Fall 2015 (CSC 4350/6350) TR. 5:30 pm 7:15 pm. Rao Casturi 09/17/2015

Software Engineering Fall 2015 (CSC 4350/6350) TR. 5:30 pm 7:15 pm. Rao Casturi 09/17/2015 Software Engineering Fall 2015 (CSC 4350/6350) TR. 5:30 pm 7:15 pm Rao Casturi 09/17/2015 http://cs.gsu.edu/~ncasturi1 Requirement Elicitation 2 Requirement Engineering First step for understanding the

More information

Database Systems: Concepts, design, and implementation ISE 382 (3 Units)

Database Systems: Concepts, design, and implementation ISE 382 (3 Units) Database Systems: Concepts, design, and implementation ISE 382 (3 Units) Spring 2013 Description Obectives Instructor Contact Information Office Hours Concepts in modeling data for industry applications.

More information

Formal Verification: Practical Exercise Model Checking with NuSMV

Formal Verification: Practical Exercise Model Checking with NuSMV Formal Verification: Practical Exercise Model Checking with NuSMV Jacques Fleuriot Daniel Raggi Semester 2, 2017 This is the first non-assessed practical exercise for the Formal Verification course. You

More information

Movie Tickets Frequently Asked Questions. How will I receive my discounted tickets? How secure is my purchase and my data?

Movie Tickets Frequently Asked Questions. How will I receive my discounted tickets? How secure is my purchase and my data? Movie Tickets Frequently Asked Questions How will I receive my discounted tickets? Ticket choices are either hard copy which are mailed via Australia Post, or evouchers which are emailed to your nominated

More information

Software Architecture. Lecture 4

Software Architecture. Lecture 4 Software Architecture Lecture 4 Last time We discussed tactics to achieve architecture qualities We briefly surveyed architectural styles 23-Jan-08 http://www.users.abo.fi/lpetre/sa08/ 2 Today We check

More information

Industry Competency Examination Proctor Guide

Industry Competency Examination Proctor Guide Industry Competency Examination Proctor Guide TABLE OF CONTENTS INDUSTRY COMPETENCY EXAMINATION...1 INTRODUCTION...1 RECEIPT OF EXAMINATION MATERIALS...1 EXAMINATION SECURITY... 2 EXAMINATION SCHEDULE...

More information

Rules and Regulations of the Examination Board of Radboud University, Faculty of Science

Rules and Regulations of the Examination Board of Radboud University, Faculty of Science Rules and Regulations of the Examination Board of Radboud University, Faculty of Science 2017-2018 General Section 1. Scope These Rules and Regulations apply to all exams given by the Faculty of Science

More information

ONLINE ENROLLMENT FOR OLLI COURSES (FALL 2018)

ONLINE ENROLLMENT FOR OLLI COURSES (FALL 2018) ONLINE ENROLLMENT FOR OLLI COURSES (FALL 2018) Before starting the online enrollment process, consult the catalog to decide what courses you want to take. Before You Begin Sample Course Description from

More information

What personal data we collect and why we collect it

What personal data we collect and why we collect it Who we are Jinny Beyer Studio is a two-story shop located in Great Falls, Virginia. We also have a mailorder business run through our website. Our website address is: https://jinnybeyer.com. What personal

More information

System and Software Architecture Description (SSAD)

System and Software Architecture Description (SSAD) System and Software Architecture Description (SSAD) FlowerSeeker Team 05 Name Eder Figueroa Sophia Wu Doris Lam Hiram Garcia Roles Primary Role: Project Manager/ Implementer. Secondary Role: Tester. Primary

More information

SALES LEAD MULTIPLIER INC. PRIVACY POLICY

SALES LEAD MULTIPLIER INC. PRIVACY POLICY SALES LEAD MULTIPLIER INC. LAST UPDATED: July 31, 2016 PRIVACY POLICY PLEASE NOTE THAT THIS PRIVACY POLICY APPLIES ONLY TO OUR ONLINE COLLECTION AND USE OF INFORMATION AND DOES NOT APPLY TO ANY INFORMATION

More information

Privacy Policy. Information about us. What personal data do we collect and how do we use it?

Privacy Policy. Information about us. What personal data do we collect and how do we use it? This privacy policy sets out the way in which your personal data is handled by Leeds Bradford Airport Limited (referred to as "we", "us" and "our") whether collected through one of the websites we operate,

More information

1. Draw the state graphs for the finite automata which accept sets of strings composed of zeros and ones which:

1. Draw the state graphs for the finite automata which accept sets of strings composed of zeros and ones which: P R O B L E M S Finite Autom ata. Draw the state graphs for the finite automata which accept sets of strings composed of zeros and ones which: a) Are a multiple of three in length. b) End with the string

More information

The Registry of Fitness Professionals. Fitness Leader User Manual

The Registry of Fitness Professionals. Fitness Leader User Manual The Registry of Fitness Professionals Fitness Leader User Manual 1 Table of Contents Introduction... 4 A. SETUP AND OVERVIEW OF THE REGISTRY... 5 I. The Registry Home Page... 5 SEARCH THE REGISTRY...5

More information

Excel 2013 Beyond TheBasics

Excel 2013 Beyond TheBasics Excel 2013 Beyond TheBasics INSTRUCTOR: IGNACIO DURAN Excel 2013 Beyond The Basics This is a class for beginning computer users. You are only expected to know how to use the mouse and keyboard, open a

More information

Content Manager User Guide

Content Manager User Guide Content Manager User Guide Read these guide to learn how to use Content Manager to browse, buy, download and install updates and extra contents to your Becker PND. 1.) How to install Content Manager Installation

More information

CSE Theory of Computing Fall 2017 Project 2-Finite Automata

CSE Theory of Computing Fall 2017 Project 2-Finite Automata CSE 30151 Theory of Computing Fall 2017 Project 2-Finite Automata Version 1: Sept. 27, 2017 1 Overview The goal of this project is to have each student understand at a deep level the functioning of a finite

More information

Operator Frequently Asked Questions

Operator Frequently Asked Questions Water & Wastewater Facility Operators Certification Program Operator Frequently Asked Questions Exam: 1. How often / when are exam sessions held? 2. How can I register to write the exam? 3. What if my

More information

Chapter 6 Architectural Design. Chapter 6 Architectural design

Chapter 6 Architectural Design. Chapter 6 Architectural design Chapter 6 Architectural Design 1 Topics covered Architectural design decisions Architectural views Architectural patterns Application architectures 2 Software architecture The design process for identifying

More information