Thanks for your cooperation! The Questionnaire of the Developers' Experiment 1
|
|
- Stephen McGee
- 6 years ago
- Views:
Transcription
1 The Questionnaire of the Developers' Experiment 1 This experiment deals with comparative analysis of two variability representation notations: Application-based DOmain Modeling (ADOM), which is a UML-based notation, and Cardinality-Based Feature Modeling (CBFM), which is a feature-oriented notation. The aim is to point out the benefits and shortcomings of these notations when developing and utilizing core assets (domain models). For this purpose, assume that you are a software (product) engineer / domain (product line) engineer. You should utilize domain models for developing particular applications in the domain / develop domain models for assisting software (product) engineers in developing particular application models. The domain of interest in this experiment is Virtual Office of the Future (VOF). The VOF domain deals with virtual offices, which are a type of telecommunication in which workers are occupied with the tools, technologies, and skills to perform their jobs from anywhere in the world, e.g., home, office, or customer site. Virtual offices allow users to reduce traditional office costs while maintaining business professionalism. The applications and devices in virtual offices actively adapt their services with respect to the role of their users or to the states of workflows a user is actually involved in. The main motto of virtual offices is provision of all services anywhere (adaptability) and anytime (availability). Below you may find an ADOM model / a CBFM model of the VOF domain, followed by two parts of questions. All the questions in this questionnaire refer to the provided model. The description can be used as a background only. Thanks for your cooperation! 1 The questionnaire had two versions: one with parts A and B (for "product line engineers") and the other with A and C (for "product engineers"). 1
2 Please fill your personal and background information below. Full Name: Degree: BA MA Year in the IS department: more Additional studies (other academic degrees, non-academic courses relevant to modeling and software engineering fields): Please estimate your knowledge regarding modeling, analysis, and design (grade 1-10) Please estimate your knowledge regarding ADOM/CBFM (grade 1-10) Please estimate your knowledge regarding the VOF domain (grade 1-10) Please provide details regarding your practice in relevant fields (systems modeling, analysis and design) Your role in this experiment is: 2
3 The basic terms in the VOF domain and their explanations Term Peripheral Personal Computer Network Perform Task Initialize Device Maintain Device Operate Peripheral Receive Fax Send Fax Print Document Convert Document Scan Document Send Notifications Check Devices Detect Physical Location Automatic Detection Manual Detection Using Authentication Go physical Schedule Actual Meeting Plan a Business Trip Explanation A peripheral is a device attached to a host computer, but not part of it, and is more or less dependent on the host, Examples: printers, fax machines, and scanners. A PC is any general-purpose computer whose size, capabilities, and original sales price make it useful for individuals, and which is intended to be operated directly by an end-user with no intervening computer operator. PCs in the VOF domain are roughly divided into desktops (personal computers designed to fit on desks), laptops (personal computers designed for mobile use), and pocket PC (a hardware specification for a handheld-sized computer that runs the Microsoft Windows Mobile operating system; it has many of the capabilities of modern desktop PCs). A computer network allows sharing of resources and information among interconnected devices. Networks can be classified according to their technologies: wired vs. wireless. They can be also classified according to their physical scope: LAN (local area network; connects computers and devices in a limited geographical area, such as home and school) and WAN (wide area network; covers a large geographic area such as a city or a country). Enables performing every day tasks. Initializes a device prior to usage. Enables device maintenance during its usage period. Enables using peripherals (such as scanners, fax machines, and printers). Receives a fax by a fax machine. Sends a (delayed or immediate) fax by a fax machine Prints a document to a printer Converts a document into different formats (such as pdf) using a printer-like device. Scans a document to a personal computer or to a peripheral (e.g., a fax machine). Sends notification about peripheral operations, e.g. fax receiving or sending, document printing, converting, or scanning. Checks that allocation of the required devices is feasible for a given (specific) task. Detects the user's physical location for providing context-relevant services, such as ordering flight tickets from the user's actual location to a requested destination. Allows a user to access facilities (e.g., personal computers, peripherals, etc.) without manual operations for authentication. When the system does not succeed in automatic detection of the physical location, the user is requested to manually identify in order to access facilities (e.g., personal computers, peripherals, etc.). Enables performing tasks that have physical content, "outside" the virtual environment. Plans a meeting that includes inviting people to the meeting, scheduling a time for the meeting with the persons attending, allocating a room for the meeting, and so on. Although this information is not stored in the system, the system supports its activation. Supports planning, approving, preparing, and reporting a (physical) business trip. Although this information is not stored in the system, the system supports its activation. 3
4 Legend for CBFM method 2 Explanation Feature F must appear exactly once. Feature F must appear at least once. Feature F may appear at most once. Feature F may appear 0 or more times. Variant is an optional member in a feature group (the parent of this feature) Variant is a mandatory feature in a feature group (the parent of this feature) Notation F [1..m] F F [0..m] F Variant Variant Only one member from the feature group can be selected. At least one member from the feature group must be selected. Between m to n members from the feature group needs to be selected. m..n Feature A is elaborated and specified in another feature diagram. The feature F represents an attribute of kind T. A(1) F (T) If feature A is selected, then feature B must be selected. A requires B A.isSelected() implies B.isSelected() If feature A is selected, then feature B must not be selected. A excludes B A.isSelected() implies not B.isSelected() 2 Only the participants that belonged to CBFM group got this part. 4
5 VOF domain model depicted by CBFM method 3 Virtual Office of the Future [1 *] [1 *] [0 *] Peripheral Personal Computer (PC) Device 3..3 Network Serial Number (string) [0 *] Status (enum) Initialize Device Maintain Device Operate Peripheral Perform Task 3..*... Detect Physical Location (1) Go Physical (1) [1 *] Check Device 1..* [0 *] Physical Location (String) Model (String) Manufacturer (String) Fax Machine Scanner Printer... Laptop Desktop Pocket PC Memory Size (Integer) Hard Disk Size (Integer) Wired Technology Wireless Technology LAN WAN Receive Fax Send Fax Print Document Convert Document Scan Document... Send Notification [1 *] [1 *] [1 *] [0 *] Phone Number (String) Paper Size (String) Image Quality (String) Paper Size (String) Print Quality (String) Physical Location (String) requires requires requires requires requires 1. VOF.Device.Peripheral.FaxMachine.isSelected() implies VOF.PerformTask.OperateDevice.ReceiveFax.isSelected() or VOF.PerformTask.OperateDevice.SendFax.isSelected 2. VOF.Device.Peripheral.Printer.IsSelected() implies VOF.PerformTask.OperateDevice.PrintDocument.isSelected() or VOF.PerformTask.OperateDevice.ConvertDocument.isSelected() requires requires Figure 1 Top level CBFM Diagram 3 Only the participants that belonged to CBFM group got this part. 5
6 Go Physical Detect Physical Location Schedule Actual Meeting Plan a Business Trip Manual Detection Using Authentication Automatic Detection requires Detect Physical Location (2) (a) (b) Figure2. Additional CBFM Diagrams: (a) Go "Physical" and (b) Detect Physical Location 6
7 Legend for ADOM method 4 Elements Explanation Use case represents a functional requirement from the system (software product). An actor represents a user (a human or a machine). notation Use case A includes (always uses) use case B. Use case B extends use case A in some cases (that are specified in the extension point). Class represents a set of objects that have similar attributes and available methods (operations). Inheritance; the parent element (the top of the triangle) bequeaths its attributes, methods, and relationships) to the child element (in the base of the triangle). The association relation represents a logical relation between elements (classes, or use cases and actors). Aggregation relation represents a whole-part relation such that the part can independently exist. whole Composition relation represents a whole-part relation where the part has no existence without the whole. whole part Stereotypes: Name Explanation Can be associated to «mandatory single» Mandatory single element; exactly one variant of the element Any element should appear in a specific product in the line. «mandatory many» Mandatory many element; a least one variant of the element Any element should appear in a specific product in the line. «optional single» Optional single element; only one versions of it may appear in Any element a specific application. «optional many» An optional many element; one or more variants of this Any element element may appear in a specific product in the line. «variation_point open=true/false A location at which variation may occur. An open variation Any element card= m..n» point enables adding new variants in the product level; card indicates the range of variants that need or can be selected in this variation point. «variant» A variant represents a possible choice in a particular product. Any element «requires» Selection of a specific element requires the selection of Dependencies relations another element. «excludes» Selection of a specific element excludes (requires the Dependencies relations part 4 Only the participants that belonged to ADOM group got this part.
8 omittion) of another element.
9 VOF Domain model depicted by ADOM method 5 Figure 1. Top Level Use Case Diagram 5 Only the participants that belonged to ADOM group got this part.
10 Figure 2. Use Case Diagram elaborating Operate Peripherals
11 Figure 3. Top level Class Diagram
12 Part A: comprehension of the domain model For each of the following statements, mark correct or and provide an explanation based on the VOF model. Statement Correctness Explanation 1. A VOF application may have only fax machines, scanners, and printers, without any Personal Computer (PC). 2. Each VOF application needs to enable manual detection (using authentication) of the user's physical location, while planning a business trip. 3. A VOF application may have only a wireless WAN Network. 4. A VOF application may detect physical locations both manually (using authentication) and automatically.
13 Statement Correctness Explanation 5. A VOF application that handles fax machines may store for each fax machine only its serial number, phone number, paper size, and image quality. 6. A VOF application may perform tasks of sending and receiving s using an server. 7. A VOF application may have Personal Computers (PC) which are not laptops, desktops, and Pocket PCs. 8. A VOF application may have a fax machine without the ability to send faxes. 9. A VOF application that supports Pocket PCs has both wired and wireless network communications.
14 Statement Correctness Explanation 10. A VOF application may not receive/send faxes neither print/ convert/scan documents. 11. A VOF application must have a single element for detecting physical location. 12. The only difference between Desktops and Laptops is that for Desktops a VOF application may store also the physical location. 13. While maintaining a device, a VOF application should support detecting the employee's physical location. 14. The VOF domain supports the specification of servers. A server is a non-personal computer that helps to deliver content that can be accessed through the internet.
15 Statement Correctness Explanation 15. Any VOF application have either Schedule Actual Meeting and Plan a Business Trip, or none
16 Part B: Development of a Domain Model 6 After developing many VOF applications, the following changes are requested to the domain model. Refer to each change individually. Shortly describe the changes in the space given for each question and make the actual modifications on the diagrams in the general part (write near each modification to which question it refers). 1. For checking devices two strategies are available: distance-based and attribute-based. In the distance-based strategy the application locates the nearest available devices for the task at hand. For this purpose, the application should detect the physical location of the employee that performs the task, either manually (using authentication) or automatically. In the attribute-based strategy, the employee needs to supply values to different relevant parameters of the device, such as the paper size and the print quality for printers and the paper size and the image quality for fax machines. Each application in VOF domain must support the distance-based strategy, but may support both strategies. 2. A new peripheral is introduced, called All-in-One. This peripheral consists of a fax machine, a printer, and a scanner. Accordingly, it allows sending and receiving faxes, as well as printing, converting, and scanning documents. 3. A VOF application may have a server computer, which is a device that links computers or (electronic) devices together. They often provide essential services across a network, either to private users inside a large organization (LAN) or to public users via the internet (WAN). Many servers have dedicated functionality, such as web servers, print servers (that manage printers), file servers, servers, and database servers. For each server, the following information is stored: CPU characteristics, RAM characteristics, and optionally the number of hard drives. A print server is a dedicated device that connects one or more printers to a local area network (LAN). It is characterized by at least one printing protocol. 4. VOF applications can support the collaboration of their employee's Personal Computers. This collaboration can be done in three ways: via instant messaging, via hosting, or via 6 Only the participants who played the role of product line engineers got this part.
17 shared control. If a VOF application supports collaboration, then it must support at least instant messaging. It should also automatically detect the employees' physical locations and ping (test the reach-ability of) the relevant personal computers (the latter is one of the maintenance operations of a personal computer). 5. In VOF applications, planning business trips are classified as either short-distance or long distance trip planning. The trip planning category is determined according to the employee's physical location (and the requested destination). Both trip planning types require reserving hotel activities and ordering local arrangement activities. Long distance trip planning requires in addition reserving flight activities. Part C: Utilization a Domain Model for creating specific Applications 7 Bellow you may find partial requirements for a Brokers application. You are requested to model the parts of each requirement that are in-line with the domain model and fully list the parts of the requirements that violate the domain model. For each violation explain why it violates the domain model. Pay attention: you need to specify also parts that are unambiguously derived from the domain model. Example Assume that the domain model looks like this: DM 1..* A B C 1..2 D E F G H I Requirement 1: application 1 has only A, D1, D2, E, and C. 7 Only the participants who played the role of software (product) engineers got this part, and only the relevant example for their method was presented.
18 DM No violation A D1 D2 E C G1 G2 G3 H Requirement 2: application 2 has only A, D, E, F, C1, and C2. Answer: DM A D E The specification of maximum of two variants of B is violated (D, E, and F is selected). C is instantiated twice instead of maximum once. G1 G3 H 1. The devices in the Brokers application are a fax machine, 2 laptops, 1 desktop, 1 pocket PC, and a wired LAN network. The fax machine enables copying documents and sending immediate or delayed faxes, but it does not support receiving faxes. 2. The only physical action that the Brokers application supports is planning a business trip. While performing this action, the system needs to detect the physical location of the employee, both manually (using authentication) and automatically, in order to prevent impersonator.
19 3. The broker application has a single peripheral, called All-in-One that consists of a fax machine, a printer, and a scanner. This device enables only copying, printing, and saving documents. 4. While operating a peripheral in the broker application, notifications are sent to both employees (via s) and log files. Furthermore, when performing a task on a device, three main checks are performed: accessibility, feasibility, and profitability. 5. While preparing an actual meeting the broker application enables allocating a room for the meeting according to the location of the employee who requests the meeting. Furthermore, the allocated room should include a slides projector and be near a printer. These peripherals, as well as the laptop brought by the meeting initiator to the room, should be connected via a wireless WAN network.
COMPUTER SKILLS COMP101
COMPUTER SKILLS COMP101 Chapter 4 Introduction to Computer Networks Definitions and Terminologies Computer Network A network consists of two or more computers that are linked in order to share resources
More informationIntroduction to Computer Networks INTRODUCTION TO COMPUTER NETWORKS
INTRODUCTION TO COMPUTER NETWORKS Computer Networks Computer network connects two or more autonomous computers. The computers can be geographically located anywhere. LAN, MAN & WAN Network in small geographical
More informationUnified Modeling Language (UML)
Appendix H Unified Modeling Language (UML) Preview The Unified Modeling Language (UML) is an object-oriented modeling language sponsored by the Object Management Group (OMG) and published as a standard
More informationMore on the Chen Notation
More on the Chen Notation Reference: http://www.vertabelo.com/blog/technical-articles/chen-erd-notation Peter Chen, who developed entity-relationship modeling and published his work in 1976, was one of
More informationCentrify Server Suite, Standard Edition Design Service
CENTRIFY JUMP START OVERVIEW OCTOBER 2014 Centrify Server Suite, Standard Edition Design Service What is the Centrify Server Suite, Standard Edition Design Service? This package creates a design document
More informationChapter 2 Conceptual Modeling. Objectives
Chapter 2 Conceptual Modeling Basic Entity Relationship Diagrams 1 Objectives Definition of terms Importance of data modeling Write good names and definitions for entities, relationships, and attributes
More informationCourse Description. Audience. Prerequisites. Skills Taught. Module Title. Duration. Course Outline :: CompTIA A+ Certification ::
Module Title Duration : Course CompTIA : CompTIA A+ Certification : 5 days Course Description CompTIA's A+ certification is the industry standard for validating the foundational skills needed by today's
More informationLiferay User Management. Kar Joon Chew Oct 2011
Liferay User Management Kar Joon Chew Oct 2011 Terminology You will See 2 Understand the Relationship 3 Resource Resources are scoped into portal, group, page, and content model-resource and application
More information31270 Networking Essentials Focus, Pre-Quiz, and Sample Exam Answers
31270 Networking Essentials Focus, Pre-Quiz, and Sample Exam Answers CONTENTS Focus Questions... 2 Chapter 1: Explore the Network... 2 Chapter 2: Configure a Network Operating System... 5 Chapter 3: Network
More informationModeling with UML. (1) Use Case Diagram. (2) Class Diagram. (3) Interaction Diagram. (4) State Diagram
Modeling with UML A language or notation intended for analyzing, describing and documenting all aspects of the object-oriented software system. UML uses graphical notations to express the design of software
More informationSLIDES: Introductory Modeling Example Employing UML and OCL [UML: Unified Modeling Language, OCL:Object Constarint Language]
Lecture day 2016-04-07 SLIDES: Introductory Modeling Example Employing UML and OCL [UML: Unified Modeling Language, OCL:Object Constarint Language] - System design in an object-oriented way employing USE
More informationTypes of Computer Networks. ICS 614: Computer Networks Concepts and Principles 11
Types of Computer Networks ICS 614: Computer Networks Concepts and Principles 11 Types of networks Networks are categorized by distribution, size, and architecture. A network can be as simple as a single
More information3050 Integrated Communications Platform
3050 Integrated Communications Platform Network Configuration Guide Release 1 October 2002 Copyright 2002 Mitel Networks Corporation. This document is unpublished and the foregoing notice is affixed to
More informationRequest for Proposal Technology Services, Maintenance and Support
Maintenance and Support April 26 th, 2018 Request for Proposal Technology Services, Maintenance and Support Celerity Schools Louisiana Inc. is seeking an IT consulting firm to manage Maintenance of our
More informationThe Privacy Professor. Information Security and Privacy Training and Awareness Program
The Privacy Professor Information Security and Privacy Training and Awareness Program Supports regulatory requirements for information security and privacy training Covers current information security
More informationCredit where Credit is Due. Lecture 4: Fundamentals of Object Technology. Goals for this Lecture. Real-World Objects
Lecture 4: Fundamentals of Object Technology Kenneth M. Anderson Object-Oriented Analysis and Design CSCI 6448 - Spring Semester, 2003 Credit where Credit is Due Some material presented in this lecture
More informationICDL-IT. ICDL The ICDL L4 IT. ICDL-IT ICDL
ICDL The ICDL L4 IT https://ensure2pass.com/-exam.html ICDL QUESTION: 1 Ram Can Hold The Data And Programs Which In Currently Use, It Is UN Volatile Memory. A. True B. False QUESTION: 2 With Suitable Applications
More informationPre- War Room Questionnaire
Pre- War Room Questionnaire Purpose The purpose of the Pre-War Room information sheet is to find out as much detail as possible about the war room before our technicians go onsite for the setup. The more
More informationIT Boosting Employee & Business Productivity with Innovative Technologies and Solutions Refresh Now
IT Boosting Employee & Business Productivity with Innovative Technologies and Solutions Refresh Now Lawson Lu Site Manager Vietnam August 20, 2013 Legal Notices This presentation is for informational purposes
More informationNetworks. Computer Technology
Networks Computer Technology Network Two or more computers and other devices (printers or scanners) that are connected, for the purpose of sharing data and programs Advantages of Networks Communication
More informationGEORGIA DEPARTMENT OF CORRECTIONS Standard Operating Procedures IIA (204.07) Authority: Effective Date: Page 1 of Bryson/Jacobs 04/21/15 6
GEORGIA DEPARTMENT OF CORRECTIONS Standard Operating Procedures Facility /Education Subject: Inmate Use of Computers (204.07) Revises Previous Authority: Page 1 of Bryson/Jacobs I. POLICY: It is the policy
More informationA l Ain University Of Science and Technology
A l Ain University Of Science and Technology 4 Handout(4) Database Management Principles and Applications The Entity Relationship (ER) Model http://alainauh.webs.com/ http://www.comp.nus.edu.sg/~lingt
More informationBrother Mobility Solutions for Business
Brother Mobility Solutions for Business Advanced Connectivity Options Meet On-the-Go Workgroup Demands Meeting the Mobile Mentality From remote locations to customer offices, business today is being done
More informationFrom Analysis to Design. LTOOD/OOAD Verified Software Systems
From Analysis to Design 1 Use Cases: Notation Overview Actor Use case System X System boundary UCBase «extend» UCExt Actor A UCVar1 UCVar2 Extending case Generalization «include» Actor B UCIncl Included
More informationData Communication and Network. Introducing Networks
Data Communication and Network Introducing Networks Introduction to Networking Computer network, or simply network Refers to the connection of two or more computers by some type of medium You can connect
More informationPrinting Solutions for Higher Education. Secure, on-premise mobile printing platform
Printing Solutions for Higher Education Secure, on-premise mobile printing platform PrinterOn Enterprise enables students and faculty to Print Simply Anywhere For more than a decade, PrinterOn has been
More informationA - 1. CS 494 Object-Oriented Analysis & Design. UML Class Models. Overview. Class Model Perspectives (cont d) Developing Class Models
CS 494 Object-Oriented Analysis & Design UML Class Models Overview How class models are used? Perspectives Classes: attributes and operations Associations Multiplicity Generalization and Inheritance Aggregation
More informationNetis WF-2411 Quick Configuration Guide NTC November TCS Webinar 1
Netis WF-2411 Quick Configuration Guide 1 Background AARP Policy on Public WiFi No computer being used for AARP Foundation Tax-Aide work is allowed to be connected directly to a public WiFi All connections
More informationScope and Sequence: CCNA Discovery
Scope and Sequence: CCNA Discovery Last updated June 19, 2009 Target Audience The Cisco CCNA Discovery curriculum is primarily designed for Cisco Networking Academy students who are seeking entry-level
More informationBroward College Telecommuting and Hoteling Technology Proposal (2017)
Broward College Telecommuting and Hoteling Technology Proposal (2017) CONTENTS Introduction... 2 Telecommuting or Telework (Offsite)... 2 Equipment, Software and Communication Requirements... 2 Standard
More informationUML diagrams. Software artifacts include: SRS, SDS, test cases, source code, technical/user manual, software architecture, etc.
UML Modeling UML diagrams UML (Unified Modeling Language) is a general purpose visual modeling language that provides different types of diagrammatic techniques and notations to specify, visualize, analyze,
More informationBuild a Talent Profile
In your Talent Profile you can share information such as job history, education, skills, certifications and language proficiency. Updating your Talent Profile allows managers and Human Resources to utilize
More informationChapter One. Introduction to Computer System. Definition Objectives Types according to their size Internet
Principles of Programming-I / 131101 Prepared by: Dr. Bahjat Qazzaz -------------------------------------------------------------------------------------------- Chapter One Introduction to Computer System
More informationChapter 5: Structural Modeling
Chapter 5: Structural Modeling Objectives Understand the rules and style guidelines for creating CRC cards, class diagrams, and object diagrams. Understand the processes used to create CRC cards, class
More information2. Give advantages and disadvantages of computer network. (Any 2 advantages- 2 Marks, Any 2 disadvantages- 2 Marks) Answer: Advantages:
Summer-15 1. Compare human network and computer network. (Each point- 1 Mark, any two points) Human Network 1. Human Network is a network of human beings. 2.It consist of individuals,organizations, schools,
More informationBring more control and added efficiency to your scanning and print environment
Bring more control and added efficiency to your scanning and print environment Incorporating into your processes will lead to real improvements in the control and efficiency of multifunctional devices.
More informationRELATIONSHIP WITH KONICA MINOLTA
JOHN ENJOY DOE A FLEXIBLE INC. ENJOYS MOBILE TRUSTFUL WORKSTYLE RELATIONSHIP WITH KONICA MINOLTA Global technology leader profits from document security, lower costs, greener printing and the same level
More informationNavpreet Singh INTRODUCTION TO COMPUTER NETWORKS. Computer Centre Indian Institute of Technology Kanpur Kanpur INDIA
INTRODUCTION TO COMPUTER NETWORKS Navpreet Singh Computer Centre Indian Institute of Technology Kanpur Kanpur INDIA (Ph : 2597371, Email : navi@iitk.ac.in) About Myself About Myself I am Network Manager
More informationUML Primer. -Elango Sundaram
UML Primer -Elango Sundaram About UML UML Can be thought of as a blue print for Software Graphical notation for expressing underlying OOA&D ideas Can be used to design any type of application, hardware,
More informationManagement Instruction
Management Instruction The Advanced Computing Environment This Management Instruction sets forth policy for the Advanced Computing Environment (ACE) within the United States Postal Service. All Web links
More informationXV. The Entity-Relationship Model
XV. The Entity-Relationship Model The Entity-Relationship Model Entities, Relationships and Attributes Cardinalities, Identifiers and Generalization Documentation of E-R Diagrams and Business Rules Acknowledgment:
More informationNetworking Basics. Crystal Printer Network Installation Guidelines
Networking Basics & Crystal Printer Network Installation Guidelines 1. Overview This guide is intended to provide the necessary basic knowledge of wireless networking needed to enable the Crystal printer
More informationKONICA MINOLTA MOBILE PRINTING SOLUTIONS
JOHN ENJOY DOE A FLEXIBLE INC. ENJOYS WORKSTYLE TRUSTFUL WITH RELATIONSHIP MOBILE PRINTING WITH KONICA MINOLTA Global technology leader profits from document security, lower costs, greener printing and
More informationPART IV. Internetworking Using TCP/IP
PART IV Internetworking Using TCP/IP Internet architecture, addressing, binding, encapsulation, and protocols in the TCP/IP suite Chapters 20 Internetworking: Concepts, Architecture, and Protocols 21 IP:
More informationIT and Interface Requirements
IT and Interface Requirements Recommended Server Hardware Specifications Server Hardware General Requirements Processor 3.0GHz quad core Xeon Memory 16GB RAM (minimum) 32GB RAM recommended. Storage 500GB
More informationITEC 3800 Data Communication and Network. Introducing Networks
ITEC 3800 Data Communication and Network Introducing Networks Introduction to Networking Computer network, or simply network Refers to the connection of two or more computers by some type of medium You
More informationSMART Questionnaire. Fields marked with * are mandatory. Introduction
SMART Questionnaire Fields marked with are mandatory. Introduction Dear Sir or Madam, We have been tasked by the European Commission's DG CONNECT to gain a detailed understanding of the different measurement
More informationA network is a group of connected, communicating devices such as computers and printers. An internet
14 A network is a group of connected, communicating devices such as computers and printers. An internet (note the lowercase i) is two or more networks that can communicate with each other. The most notable
More informationChapter 6: Entity-Relationship Model
Chapter 6: Entity-Relationship Model Database System Concepts, 5th Ed. See www.db-book.com for conditions on re-use Chapter 6: Entity-Relationship Model Design Process Modeling Constraints E-R Diagram
More informationAgent appointment and credentialing quick reference guide
Questions? Email us at brokers@brighthealthplan.com or call us at 1-888-325-1747 Monday-Friday 8:30am 5pm (CST) Agent appointment and credentialing quick reference guide Welcome to the Bright Health appointment
More informationControl printing and copying effectively with uniflow Output Manager
Control printing and copying effectively with Output Manager This Added control and extra efficiency Whatever the size of your company, you can use Output Manager to gain effective control and management
More informationDeployment User Guide
Deployment User Guide Version: 010319-2 Contents STEP 1: (Windows Users Only): Determine if your PC is running the 32-bit or 64-bit version of Windows. If you are not a PC user, please proceed to step
More informationHPE Intelligent Management Center
HPE Intelligent Management Center EAD Security Policy Administrator Guide Abstract This guide contains comprehensive information for network administrators, engineers, and operators working with the TAM
More informationChapter 8 Networking and Digital Communication
Tomorrow s Technology and You 8/e George Beekman Michael J. Quinn Networking and Digital Communication 2008 Prentice-Hall, Inc. Slide 1 A computer network is any system of two or more computers that are
More informationSimplifying Document Make-Ready Workflow and Production
Simplifying Document Make-Ready Workflow and Production imageware Prepress Manager Simplifying Document Make-Ready Workflow and Production Canon s imageware Prepress Manager is a comprehensive document
More informationHuawei FusionCloud Desktop Solution 5.3. Branch Technical White Paper. Issue 01. Date HUAWEI TECHNOLOGIES CO., LTD.
Issue 01 Date 2015-06-30 HUAWEI TECHNOLOGIES CO., LTD. 2015. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means without prior written consent of
More informationBackground Brief. The need to foster the IXPs ecosystem in the Arab region
Background Brief The need to foster the IXPs ecosystem in the Arab region The Internet has become a shared global public medium that is driving social and economic development worldwide. Its distributed
More informationEXPENSE ENTRY INSTRUCTION MANUAL SILVERLIGHT VERSION. Child & Youth School Services
EXPENSE ENTRY INSTRUCTION MANUAL SILVERLIGHT VERSION Child & Youth School Services 2 Table of Contents 1. Expense Entry Instruction Manual 2. Table of Contents 3. Logging In 4 7. Starting a New Expense
More informationAT&T Collaborate. February, 2018
AT&T Collaborate February, 2018 Changing Work Environment Presentation title here edit on Slide Master Mobility of business Business anytime, anywhere Change is constant Need for real-time information
More informationNetwork fundamentals IB Computer Science. Content developed by Dartford Grammar School Computer Science Department
Network fundamentals IB Computer Science Content developed by Dartford Grammar School Computer Science Department HL Topics 1-7, D1-4 1: System design 2: Computer Organisation 3: Networks 4: Computational
More informationTRAVEL EXPENSE REIMBURSEMENT USER GUIDE. JHM SAP Training May 29, 2013
TRAVEL & EXPENSE REIMBURSEMENT USER GUIDE JHM SAP Training www.hopkinsmedicine.org/sap saptraining@jhmi.edu May 29, 2013 CONTENTS Contents... 2 Introduction... 5 Purpose: Reimbursement... 5 Requesting
More informationVirtual Postman Manual. Version
Virtual Postman Manual Version 6.20.5 Virtual Postman Manual Version 6.20.5 Copyright 2004-2014 Virtual Postman CC Abstract This manual presents the Virtual Postman document management system, version
More informationFig (1) client and Server network
2.2 How Does the Internet Work? The international network known as the internet consists of hundreds of thousands of smaller networks linking educational, commercial, nonprofit, and military organizations,
More informationData Communication. Introduction of Communication. Data Communication. Elements of Data Communication (Communication Model)
Data Communication Introduction of Communication The need to communicate is part of man s inherent being. Since the beginning of time the human race has communicated using different techniques and methods.
More informationIBM Security Identity Manager Version Planning Topics IBM
IBM Security Identity Manager Version 7.0.1 Planning Topics IBM IBM Security Identity Manager Version 7.0.1 Planning Topics IBM ii IBM Security Identity Manager Version 7.0.1: Planning Topics Table of
More informationExperiment no 4 Study of Class Diagram in Rational Rose
Experiment no 4 Study of Class Diagram in Rational Rose Objective-: To studyclass Diagram in Rational Rose. References-: www.developer.com The Unified Modeling Language User Guide by Grady Booch Mastering
More informationINFORMATION TECHNOLOGY NETWORK ADMINISTRATOR ANALYST Series Specification Information Technology Network Administrator Analyst II
Adopted: July 2000 Revised : April 2004; August 2009; June 2014; February 2018 INFORMATION TECHNOLOGY NETWORK ADMINISTRATOR ANALYST Series Specification Information Technology Network Administrator Analyst
More informationAdvanced UML Class Models
Advanced UML Class Models Or: Love s Labors Lost Jonathan Sprinkle 1 University of Arizona Department of Electrical and Computer Engineering PO Box 210104, Tucson, AZ 85721, USA August 27, 2012 Jonathan
More informationCustom Connect. All Area Networks. customer s guide to how it works version 1.0
All Area Networks Custom Connect customer s guide to how it works version 1.0 The information in this technical user guide and the glossary of terms has been prepared in good faith and is correct at the
More informationQUALIFICATION: IC3 INTERNET AND COMPUTING CORE CERTIFICATION MODE OF DELIVERY: DISTANCE LEARNING
JOHANNESBURG CAMPUS: Tel: (011) 718-4000 Fax: (011) 482-1814 Cnr Main Road and Landau Terrace, Melville Ext 2 P O Box 91714, Auckland Park, 2006 Email: studentservices@milpark.ac.za Website: www.milpark.ac.za
More informationScope and Sequence: CCNA Discovery v4.0
Scope and Sequence: CCNA Discovery v4.0 Last Updated August 30, 2007 The course objectives and outline for the final two CCNA Discovery courses, Introducing Routing and Switching in the Enterprise and
More informationScope and Sequence: CCNA Discovery
Scope and Sequence: CCNA Discovery Last updated April 22, 2008 Target Audience CCNA Discovery is primarily designed for Cisco Networking Academy students who are looking for career-oriented, information
More informationChapter 2: Entity-Relationship Model
Chapter 2: Entity-Relationship Model! Entity Sets! Relationship Sets! Design Issues! Mapping Constraints! Keys! E-R Diagram! Extended E-R Features! Design of an E-R Database Schema! Reduction of an E-R
More informationPrerequisit. cies. overview of. David. interviews. In research, the
IT Essentials I: PC Hardware and Software (CPMT 1305) Credit: 3 semester credit hours (2 hours lecture, 4 hours lab) Prerequisit te/co-requisite: None Course Description Provides comprehensive overview
More informationSECURING YOUR BUSINESS INFRASTRUCTURE Today s Security Challenges & What You Can Do About Them
BROTHER SECURITY WHITE PAPER NOVEMBER 2017 SECURING YOUR BUSINESS INFRASTRUCTURE Today s Security Challenges & What You Can Do About Them The last decade has seen many exciting advances in connectivity
More informationComputer Technology Flash Card 2
Computer Technology Flash Card 2 Mouse An input device that allows the user to manipulate objects on the screen by moving the mouse along the surface of a desk. Data Refers to the symbols that represent
More informationETSI TR V1.1.1 ( )
TR 101 886 V1.1.1 (2002-02) Technical Report Telecommunications and Internet Protocol Harmonization Over Networks (TIPHON); Requirements Definition Study; Real time aspects of a service 2 TR 101 886 V1.1.1
More informationTexas Health Resources
Texas Health Resources POLICY NAME: Remote Access Page 1 of 7 1.0 Purpose: To establish security standards for remote electronic Access to Texas Health Information Assets. 2.0 Policy: Remote Access to
More informationCisco Systems Networking Academy
LIVONIA CAREER TECHNICAL CENTER 8985 NEWBURGH LIVONIA, MI 48150 734-744-2816 Course Name: Cisco Systems Networking Academy Course Number: 906 Course Credit: 1.0 credit/semester School Year: 2008-2009 Instructor:
More informationSix Questions to Answer When Buying a Phone System
NEW PHONE SYSTEM BUYER S GUIDE Six Questions to Answer When Buying a Phone System In addition to the most comprehensive portfolio of voice communications, data and wireless networking products in the industry,
More informationOnline Bus Ticket Resevevation System Class: HD J
INTERNATIONAL DEVELOPERS TRAINING CENTER FOR SOFTWARE MEKONG DELTA-APTECH 1, Ly Tu Trong St, Cantho City Tel: 0710.3731072 Fax: 0710.3731071 PROJECT ACCPi10 Online Bus Ticket Resevevation System Class:
More informationCOMPUTER NETWORKING LAB EXERCISES (TP) 1 BASIC CONFIGURATION AND TOOLS FOR EVERYBODY:
Name 1: Name 2: Group number: COMPUTER NETWORKING LAB EXERCISES (TP) 1 BASIC CONFIGURATION AND TOOLS FOR EVERYBODY: PING(6), DIG, TRACEROUTE(6), NETSTAT September 24, 2012 Abstract In this TP you will
More informationA l Ain University Of Science and Technology
A l Ain University Of Science and Technology 4 Handout(4) Database Management Principles and Applications The Entity Relationship (ER) Model http://alainauh.webs.com/ 1 In this chapter, you will learn:
More informationKYOCERA Net Viewer User Guide Supplement
KYOCERA Net Viewer User Guide Supplement Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change without notice. We cannot be
More information2004 John Mylopoulos. The Entity-Relationship Model John Mylopoulos. The Entity-Relationship Model John Mylopoulos
XVI. The Entity-Relationship Model The Entity Relationship Model The Entity-Relationship Model Entities, Relationships and Attributes Cardinalities, Identifiers and Generalization Documentation of E-R
More informationCOMPUTER HARDWARE RAYMOND ROSE
COMPUTER HARDWARE RAYMOND ROSE LEARNING OUTCOMES 1.1 Identify types of computer how they process information, and the purpose and function of different hardware components. Understanding the computer and
More informationCOP 3330 Final Exam Review
COP 3330 Final Exam Review I. The Basics (Chapters 2, 5, 6) a. comments b. identifiers, reserved words c. white space d. compilers vs. interpreters e. syntax, semantics f. errors i. syntax ii. run-time
More informationConceptual Data Models for Database Design
Conceptual Data Models for Database Design Entity Relationship (ER) Model The most popular high-level conceptual data model is the ER model. It is frequently used for the conceptual design of database
More informationGoToMyPC Corporate Product Guide
GoToMyPC Corporate Product Guide 072402 Contents Product Overview...1 How It Works...1 Target Audiences/Product Uses...2 Primary Selling Points...3 Software Features and Benefits...4 Administration Center
More informationBackground Brief. The need to foster the IXPs ecosystem in the Arab region
Background Brief The need to foster the IXPs ecosystem in the Arab region The Internet has become a shared global public medium that is driving social and economic development worldwide. Its distributed
More informationTablets for Business Exploring Compute Models for Mobile Professionals
Tablets for Business Exploring Compute Models for Mobile Professionals Use this interactive guide to explore the new single and dual-device compute models enabled by tablets in business. Example: Two-System
More informationQuick Reference Card Completing an Expense Report in Concur Travel and Expense
Use this QRC when completing an expense report from an approved travel request in Concur Travel and Expense. Log In To Concur Go to the Employee Portal at www.purdue.edu/employeeportal. Choose Travel System
More information3. UML Class Diagrams Page 1 of 15
3. UML Class Diagrams Page 1 of 15 The UML Class Diagram: Part 1 In the last article, we saw what use cases were, and how to identify and create use cases. Taking the series ahead, in this article, we
More informationOperating Systems Introduction. Mathieu Delalandre (PhD) University of Tours, Tours city, France
Operating Systems Introduction Mathieu Delalandre (PhD) University of Tours, Tours city, France mathieu.delalandre@univ-tours.fr 1 Operating Systems Introduction 1. Definition of OS 2. A brief history
More informationModeling variability in software product lines with the variation point model
Science of Computer Programming 53 (2004) 305 331 www.elsevier.com/locate/scico Modeling variability in software product lines with the variation point model Diana L. Webber a,, Hassan Gomaa b a Booz Allen
More informationCity College Computing
City College Computing European Computer Driving Licence Module 1 Sample Test 1 1. Which of these is an input device? A. CD-ROM B. Mouse C. Printer D. Zip drive 2. What does RSI mean? A. Repeated Syndrome
More informationConcur Travel & Expense CAMPUS TRAINING GUIDE & LIVE DEMO
Concur Travel & Expense CAMPUS TRAINING GUIDE & LIVE DEMO Training Agenda This training will be approximately 1.5 hours long and will go over the basics of Concur Travel and Expense system. Additional
More informationIntroduction to Networking
Introduction to Networking The fundamental purpose of data communications is to exchange information between user's computers, terminals and applications programs. Simplified Communications System Block
More informationEEC-484/584 Computer Networks
EEC-484/584 Computer Networks Lecture 1 Department of Electrical and Computer Engineering Cleveland State University wenbing@ieee.org (Lecture nodes are based on materials supplied by Dr. Louise Moser
More informationSystem Management. User Guide
System Management User Guide The information in this document is subject to change without notice and does not represent a commitment on the part of Horizon. The software described in this document is
More information