Thanks for your cooperation! The Questionnaire of the Developers' Experiment 1

Size: px
Start display at page:

Download "Thanks for your cooperation! The Questionnaire of the Developers' Experiment 1"

Transcription

1 The Questionnaire of the Developers' Experiment 1 This experiment deals with comparative analysis of two variability representation notations: Application-based DOmain Modeling (ADOM), which is a UML-based notation, and Cardinality-Based Feature Modeling (CBFM), which is a feature-oriented notation. The aim is to point out the benefits and shortcomings of these notations when developing and utilizing core assets (domain models). For this purpose, assume that you are a software (product) engineer / domain (product line) engineer. You should utilize domain models for developing particular applications in the domain / develop domain models for assisting software (product) engineers in developing particular application models. The domain of interest in this experiment is Virtual Office of the Future (VOF). The VOF domain deals with virtual offices, which are a type of telecommunication in which workers are occupied with the tools, technologies, and skills to perform their jobs from anywhere in the world, e.g., home, office, or customer site. Virtual offices allow users to reduce traditional office costs while maintaining business professionalism. The applications and devices in virtual offices actively adapt their services with respect to the role of their users or to the states of workflows a user is actually involved in. The main motto of virtual offices is provision of all services anywhere (adaptability) and anytime (availability). Below you may find an ADOM model / a CBFM model of the VOF domain, followed by two parts of questions. All the questions in this questionnaire refer to the provided model. The description can be used as a background only. Thanks for your cooperation! 1 The questionnaire had two versions: one with parts A and B (for "product line engineers") and the other with A and C (for "product engineers"). 1

2 Please fill your personal and background information below. Full Name: Degree: BA MA Year in the IS department: more Additional studies (other academic degrees, non-academic courses relevant to modeling and software engineering fields): Please estimate your knowledge regarding modeling, analysis, and design (grade 1-10) Please estimate your knowledge regarding ADOM/CBFM (grade 1-10) Please estimate your knowledge regarding the VOF domain (grade 1-10) Please provide details regarding your practice in relevant fields (systems modeling, analysis and design) Your role in this experiment is: 2

3 The basic terms in the VOF domain and their explanations Term Peripheral Personal Computer Network Perform Task Initialize Device Maintain Device Operate Peripheral Receive Fax Send Fax Print Document Convert Document Scan Document Send Notifications Check Devices Detect Physical Location Automatic Detection Manual Detection Using Authentication Go physical Schedule Actual Meeting Plan a Business Trip Explanation A peripheral is a device attached to a host computer, but not part of it, and is more or less dependent on the host, Examples: printers, fax machines, and scanners. A PC is any general-purpose computer whose size, capabilities, and original sales price make it useful for individuals, and which is intended to be operated directly by an end-user with no intervening computer operator. PCs in the VOF domain are roughly divided into desktops (personal computers designed to fit on desks), laptops (personal computers designed for mobile use), and pocket PC (a hardware specification for a handheld-sized computer that runs the Microsoft Windows Mobile operating system; it has many of the capabilities of modern desktop PCs). A computer network allows sharing of resources and information among interconnected devices. Networks can be classified according to their technologies: wired vs. wireless. They can be also classified according to their physical scope: LAN (local area network; connects computers and devices in a limited geographical area, such as home and school) and WAN (wide area network; covers a large geographic area such as a city or a country). Enables performing every day tasks. Initializes a device prior to usage. Enables device maintenance during its usage period. Enables using peripherals (such as scanners, fax machines, and printers). Receives a fax by a fax machine. Sends a (delayed or immediate) fax by a fax machine Prints a document to a printer Converts a document into different formats (such as pdf) using a printer-like device. Scans a document to a personal computer or to a peripheral (e.g., a fax machine). Sends notification about peripheral operations, e.g. fax receiving or sending, document printing, converting, or scanning. Checks that allocation of the required devices is feasible for a given (specific) task. Detects the user's physical location for providing context-relevant services, such as ordering flight tickets from the user's actual location to a requested destination. Allows a user to access facilities (e.g., personal computers, peripherals, etc.) without manual operations for authentication. When the system does not succeed in automatic detection of the physical location, the user is requested to manually identify in order to access facilities (e.g., personal computers, peripherals, etc.). Enables performing tasks that have physical content, "outside" the virtual environment. Plans a meeting that includes inviting people to the meeting, scheduling a time for the meeting with the persons attending, allocating a room for the meeting, and so on. Although this information is not stored in the system, the system supports its activation. Supports planning, approving, preparing, and reporting a (physical) business trip. Although this information is not stored in the system, the system supports its activation. 3

4 Legend for CBFM method 2 Explanation Feature F must appear exactly once. Feature F must appear at least once. Feature F may appear at most once. Feature F may appear 0 or more times. Variant is an optional member in a feature group (the parent of this feature) Variant is a mandatory feature in a feature group (the parent of this feature) Notation F [1..m] F F [0..m] F Variant Variant Only one member from the feature group can be selected. At least one member from the feature group must be selected. Between m to n members from the feature group needs to be selected. m..n Feature A is elaborated and specified in another feature diagram. The feature F represents an attribute of kind T. A(1) F (T) If feature A is selected, then feature B must be selected. A requires B A.isSelected() implies B.isSelected() If feature A is selected, then feature B must not be selected. A excludes B A.isSelected() implies not B.isSelected() 2 Only the participants that belonged to CBFM group got this part. 4

5 VOF domain model depicted by CBFM method 3 Virtual Office of the Future [1 *] [1 *] [0 *] Peripheral Personal Computer (PC) Device 3..3 Network Serial Number (string) [0 *] Status (enum) Initialize Device Maintain Device Operate Peripheral Perform Task 3..*... Detect Physical Location (1) Go Physical (1) [1 *] Check Device 1..* [0 *] Physical Location (String) Model (String) Manufacturer (String) Fax Machine Scanner Printer... Laptop Desktop Pocket PC Memory Size (Integer) Hard Disk Size (Integer) Wired Technology Wireless Technology LAN WAN Receive Fax Send Fax Print Document Convert Document Scan Document... Send Notification [1 *] [1 *] [1 *] [0 *] Phone Number (String) Paper Size (String) Image Quality (String) Paper Size (String) Print Quality (String) Physical Location (String) requires requires requires requires requires 1. VOF.Device.Peripheral.FaxMachine.isSelected() implies VOF.PerformTask.OperateDevice.ReceiveFax.isSelected() or VOF.PerformTask.OperateDevice.SendFax.isSelected 2. VOF.Device.Peripheral.Printer.IsSelected() implies VOF.PerformTask.OperateDevice.PrintDocument.isSelected() or VOF.PerformTask.OperateDevice.ConvertDocument.isSelected() requires requires Figure 1 Top level CBFM Diagram 3 Only the participants that belonged to CBFM group got this part. 5

6 Go Physical Detect Physical Location Schedule Actual Meeting Plan a Business Trip Manual Detection Using Authentication Automatic Detection requires Detect Physical Location (2) (a) (b) Figure2. Additional CBFM Diagrams: (a) Go "Physical" and (b) Detect Physical Location 6

7 Legend for ADOM method 4 Elements Explanation Use case represents a functional requirement from the system (software product). An actor represents a user (a human or a machine). notation Use case A includes (always uses) use case B. Use case B extends use case A in some cases (that are specified in the extension point). Class represents a set of objects that have similar attributes and available methods (operations). Inheritance; the parent element (the top of the triangle) bequeaths its attributes, methods, and relationships) to the child element (in the base of the triangle). The association relation represents a logical relation between elements (classes, or use cases and actors). Aggregation relation represents a whole-part relation such that the part can independently exist. whole Composition relation represents a whole-part relation where the part has no existence without the whole. whole part Stereotypes: Name Explanation Can be associated to «mandatory single» Mandatory single element; exactly one variant of the element Any element should appear in a specific product in the line. «mandatory many» Mandatory many element; a least one variant of the element Any element should appear in a specific product in the line. «optional single» Optional single element; only one versions of it may appear in Any element a specific application. «optional many» An optional many element; one or more variants of this Any element element may appear in a specific product in the line. «variation_point open=true/false A location at which variation may occur. An open variation Any element card= m..n» point enables adding new variants in the product level; card indicates the range of variants that need or can be selected in this variation point. «variant» A variant represents a possible choice in a particular product. Any element «requires» Selection of a specific element requires the selection of Dependencies relations another element. «excludes» Selection of a specific element excludes (requires the Dependencies relations part 4 Only the participants that belonged to ADOM group got this part.

8 omittion) of another element.

9 VOF Domain model depicted by ADOM method 5 Figure 1. Top Level Use Case Diagram 5 Only the participants that belonged to ADOM group got this part.

10 Figure 2. Use Case Diagram elaborating Operate Peripherals

11 Figure 3. Top level Class Diagram

12 Part A: comprehension of the domain model For each of the following statements, mark correct or and provide an explanation based on the VOF model. Statement Correctness Explanation 1. A VOF application may have only fax machines, scanners, and printers, without any Personal Computer (PC). 2. Each VOF application needs to enable manual detection (using authentication) of the user's physical location, while planning a business trip. 3. A VOF application may have only a wireless WAN Network. 4. A VOF application may detect physical locations both manually (using authentication) and automatically.

13 Statement Correctness Explanation 5. A VOF application that handles fax machines may store for each fax machine only its serial number, phone number, paper size, and image quality. 6. A VOF application may perform tasks of sending and receiving s using an server. 7. A VOF application may have Personal Computers (PC) which are not laptops, desktops, and Pocket PCs. 8. A VOF application may have a fax machine without the ability to send faxes. 9. A VOF application that supports Pocket PCs has both wired and wireless network communications.

14 Statement Correctness Explanation 10. A VOF application may not receive/send faxes neither print/ convert/scan documents. 11. A VOF application must have a single element for detecting physical location. 12. The only difference between Desktops and Laptops is that for Desktops a VOF application may store also the physical location. 13. While maintaining a device, a VOF application should support detecting the employee's physical location. 14. The VOF domain supports the specification of servers. A server is a non-personal computer that helps to deliver content that can be accessed through the internet.

15 Statement Correctness Explanation 15. Any VOF application have either Schedule Actual Meeting and Plan a Business Trip, or none

16 Part B: Development of a Domain Model 6 After developing many VOF applications, the following changes are requested to the domain model. Refer to each change individually. Shortly describe the changes in the space given for each question and make the actual modifications on the diagrams in the general part (write near each modification to which question it refers). 1. For checking devices two strategies are available: distance-based and attribute-based. In the distance-based strategy the application locates the nearest available devices for the task at hand. For this purpose, the application should detect the physical location of the employee that performs the task, either manually (using authentication) or automatically. In the attribute-based strategy, the employee needs to supply values to different relevant parameters of the device, such as the paper size and the print quality for printers and the paper size and the image quality for fax machines. Each application in VOF domain must support the distance-based strategy, but may support both strategies. 2. A new peripheral is introduced, called All-in-One. This peripheral consists of a fax machine, a printer, and a scanner. Accordingly, it allows sending and receiving faxes, as well as printing, converting, and scanning documents. 3. A VOF application may have a server computer, which is a device that links computers or (electronic) devices together. They often provide essential services across a network, either to private users inside a large organization (LAN) or to public users via the internet (WAN). Many servers have dedicated functionality, such as web servers, print servers (that manage printers), file servers, servers, and database servers. For each server, the following information is stored: CPU characteristics, RAM characteristics, and optionally the number of hard drives. A print server is a dedicated device that connects one or more printers to a local area network (LAN). It is characterized by at least one printing protocol. 4. VOF applications can support the collaboration of their employee's Personal Computers. This collaboration can be done in three ways: via instant messaging, via hosting, or via 6 Only the participants who played the role of product line engineers got this part.

17 shared control. If a VOF application supports collaboration, then it must support at least instant messaging. It should also automatically detect the employees' physical locations and ping (test the reach-ability of) the relevant personal computers (the latter is one of the maintenance operations of a personal computer). 5. In VOF applications, planning business trips are classified as either short-distance or long distance trip planning. The trip planning category is determined according to the employee's physical location (and the requested destination). Both trip planning types require reserving hotel activities and ordering local arrangement activities. Long distance trip planning requires in addition reserving flight activities. Part C: Utilization a Domain Model for creating specific Applications 7 Bellow you may find partial requirements for a Brokers application. You are requested to model the parts of each requirement that are in-line with the domain model and fully list the parts of the requirements that violate the domain model. For each violation explain why it violates the domain model. Pay attention: you need to specify also parts that are unambiguously derived from the domain model. Example Assume that the domain model looks like this: DM 1..* A B C 1..2 D E F G H I Requirement 1: application 1 has only A, D1, D2, E, and C. 7 Only the participants who played the role of software (product) engineers got this part, and only the relevant example for their method was presented.

18 DM No violation A D1 D2 E C G1 G2 G3 H Requirement 2: application 2 has only A, D, E, F, C1, and C2. Answer: DM A D E The specification of maximum of two variants of B is violated (D, E, and F is selected). C is instantiated twice instead of maximum once. G1 G3 H 1. The devices in the Brokers application are a fax machine, 2 laptops, 1 desktop, 1 pocket PC, and a wired LAN network. The fax machine enables copying documents and sending immediate or delayed faxes, but it does not support receiving faxes. 2. The only physical action that the Brokers application supports is planning a business trip. While performing this action, the system needs to detect the physical location of the employee, both manually (using authentication) and automatically, in order to prevent impersonator.

19 3. The broker application has a single peripheral, called All-in-One that consists of a fax machine, a printer, and a scanner. This device enables only copying, printing, and saving documents. 4. While operating a peripheral in the broker application, notifications are sent to both employees (via s) and log files. Furthermore, when performing a task on a device, three main checks are performed: accessibility, feasibility, and profitability. 5. While preparing an actual meeting the broker application enables allocating a room for the meeting according to the location of the employee who requests the meeting. Furthermore, the allocated room should include a slides projector and be near a printer. These peripherals, as well as the laptop brought by the meeting initiator to the room, should be connected via a wireless WAN network.

COMPUTER SKILLS COMP101

COMPUTER SKILLS COMP101 COMPUTER SKILLS COMP101 Chapter 4 Introduction to Computer Networks Definitions and Terminologies Computer Network A network consists of two or more computers that are linked in order to share resources

More information

Introduction to Computer Networks INTRODUCTION TO COMPUTER NETWORKS

Introduction to Computer Networks INTRODUCTION TO COMPUTER NETWORKS INTRODUCTION TO COMPUTER NETWORKS Computer Networks Computer network connects two or more autonomous computers. The computers can be geographically located anywhere. LAN, MAN & WAN Network in small geographical

More information

Unified Modeling Language (UML)

Unified Modeling Language (UML) Appendix H Unified Modeling Language (UML) Preview The Unified Modeling Language (UML) is an object-oriented modeling language sponsored by the Object Management Group (OMG) and published as a standard

More information

More on the Chen Notation

More on the Chen Notation More on the Chen Notation Reference: http://www.vertabelo.com/blog/technical-articles/chen-erd-notation Peter Chen, who developed entity-relationship modeling and published his work in 1976, was one of

More information

Centrify Server Suite, Standard Edition Design Service

Centrify Server Suite, Standard Edition Design Service CENTRIFY JUMP START OVERVIEW OCTOBER 2014 Centrify Server Suite, Standard Edition Design Service What is the Centrify Server Suite, Standard Edition Design Service? This package creates a design document

More information

Chapter 2 Conceptual Modeling. Objectives

Chapter 2 Conceptual Modeling. Objectives Chapter 2 Conceptual Modeling Basic Entity Relationship Diagrams 1 Objectives Definition of terms Importance of data modeling Write good names and definitions for entities, relationships, and attributes

More information

Course Description. Audience. Prerequisites. Skills Taught. Module Title. Duration. Course Outline :: CompTIA A+ Certification ::

Course Description. Audience. Prerequisites. Skills Taught. Module Title. Duration. Course Outline :: CompTIA A+ Certification :: Module Title Duration : Course CompTIA : CompTIA A+ Certification : 5 days Course Description CompTIA's A+ certification is the industry standard for validating the foundational skills needed by today's

More information

Liferay User Management. Kar Joon Chew Oct 2011

Liferay User Management. Kar Joon Chew Oct 2011 Liferay User Management Kar Joon Chew Oct 2011 Terminology You will See 2 Understand the Relationship 3 Resource Resources are scoped into portal, group, page, and content model-resource and application

More information

31270 Networking Essentials Focus, Pre-Quiz, and Sample Exam Answers

31270 Networking Essentials Focus, Pre-Quiz, and Sample Exam Answers 31270 Networking Essentials Focus, Pre-Quiz, and Sample Exam Answers CONTENTS Focus Questions... 2 Chapter 1: Explore the Network... 2 Chapter 2: Configure a Network Operating System... 5 Chapter 3: Network

More information

Modeling with UML. (1) Use Case Diagram. (2) Class Diagram. (3) Interaction Diagram. (4) State Diagram

Modeling with UML. (1) Use Case Diagram. (2) Class Diagram. (3) Interaction Diagram. (4) State Diagram Modeling with UML A language or notation intended for analyzing, describing and documenting all aspects of the object-oriented software system. UML uses graphical notations to express the design of software

More information

SLIDES: Introductory Modeling Example Employing UML and OCL [UML: Unified Modeling Language, OCL:Object Constarint Language]

SLIDES: Introductory Modeling Example Employing UML and OCL [UML: Unified Modeling Language, OCL:Object Constarint Language] Lecture day 2016-04-07 SLIDES: Introductory Modeling Example Employing UML and OCL [UML: Unified Modeling Language, OCL:Object Constarint Language] - System design in an object-oriented way employing USE

More information

Types of Computer Networks. ICS 614: Computer Networks Concepts and Principles 11

Types of Computer Networks. ICS 614: Computer Networks Concepts and Principles 11 Types of Computer Networks ICS 614: Computer Networks Concepts and Principles 11 Types of networks Networks are categorized by distribution, size, and architecture. A network can be as simple as a single

More information

3050 Integrated Communications Platform

3050 Integrated Communications Platform 3050 Integrated Communications Platform Network Configuration Guide Release 1 October 2002 Copyright 2002 Mitel Networks Corporation. This document is unpublished and the foregoing notice is affixed to

More information

Request for Proposal Technology Services, Maintenance and Support

Request for Proposal Technology Services, Maintenance and Support Maintenance and Support April 26 th, 2018 Request for Proposal Technology Services, Maintenance and Support Celerity Schools Louisiana Inc. is seeking an IT consulting firm to manage Maintenance of our

More information

The Privacy Professor. Information Security and Privacy Training and Awareness Program

The Privacy Professor. Information Security and Privacy Training and Awareness Program The Privacy Professor Information Security and Privacy Training and Awareness Program Supports regulatory requirements for information security and privacy training Covers current information security

More information

Credit where Credit is Due. Lecture 4: Fundamentals of Object Technology. Goals for this Lecture. Real-World Objects

Credit where Credit is Due. Lecture 4: Fundamentals of Object Technology. Goals for this Lecture. Real-World Objects Lecture 4: Fundamentals of Object Technology Kenneth M. Anderson Object-Oriented Analysis and Design CSCI 6448 - Spring Semester, 2003 Credit where Credit is Due Some material presented in this lecture

More information

ICDL-IT. ICDL The ICDL L4 IT. ICDL-IT ICDL

ICDL-IT. ICDL The ICDL L4 IT.   ICDL-IT ICDL ICDL The ICDL L4 IT https://ensure2pass.com/-exam.html ICDL QUESTION: 1 Ram Can Hold The Data And Programs Which In Currently Use, It Is UN Volatile Memory. A. True B. False QUESTION: 2 With Suitable Applications

More information

Pre- War Room Questionnaire

Pre- War Room Questionnaire Pre- War Room Questionnaire Purpose The purpose of the Pre-War Room information sheet is to find out as much detail as possible about the war room before our technicians go onsite for the setup. The more

More information

IT Boosting Employee & Business Productivity with Innovative Technologies and Solutions Refresh Now

IT Boosting Employee & Business Productivity with Innovative Technologies and Solutions Refresh Now IT Boosting Employee & Business Productivity with Innovative Technologies and Solutions Refresh Now Lawson Lu Site Manager Vietnam August 20, 2013 Legal Notices This presentation is for informational purposes

More information

Networks. Computer Technology

Networks. Computer Technology Networks Computer Technology Network Two or more computers and other devices (printers or scanners) that are connected, for the purpose of sharing data and programs Advantages of Networks Communication

More information

GEORGIA DEPARTMENT OF CORRECTIONS Standard Operating Procedures IIA (204.07) Authority: Effective Date: Page 1 of Bryson/Jacobs 04/21/15 6

GEORGIA DEPARTMENT OF CORRECTIONS Standard Operating Procedures IIA (204.07) Authority: Effective Date: Page 1 of Bryson/Jacobs 04/21/15 6 GEORGIA DEPARTMENT OF CORRECTIONS Standard Operating Procedures Facility /Education Subject: Inmate Use of Computers (204.07) Revises Previous Authority: Page 1 of Bryson/Jacobs I. POLICY: It is the policy

More information

A l Ain University Of Science and Technology

A l Ain University Of Science and Technology A l Ain University Of Science and Technology 4 Handout(4) Database Management Principles and Applications The Entity Relationship (ER) Model http://alainauh.webs.com/ http://www.comp.nus.edu.sg/~lingt

More information

Brother Mobility Solutions for Business

Brother Mobility Solutions for Business Brother Mobility Solutions for Business Advanced Connectivity Options Meet On-the-Go Workgroup Demands Meeting the Mobile Mentality From remote locations to customer offices, business today is being done

More information

From Analysis to Design. LTOOD/OOAD Verified Software Systems

From Analysis to Design. LTOOD/OOAD Verified Software Systems From Analysis to Design 1 Use Cases: Notation Overview Actor Use case System X System boundary UCBase «extend» UCExt Actor A UCVar1 UCVar2 Extending case Generalization «include» Actor B UCIncl Included

More information

Data Communication and Network. Introducing Networks

Data Communication and Network. Introducing Networks Data Communication and Network Introducing Networks Introduction to Networking Computer network, or simply network Refers to the connection of two or more computers by some type of medium You can connect

More information

Printing Solutions for Higher Education. Secure, on-premise mobile printing platform

Printing Solutions for Higher Education. Secure, on-premise mobile printing platform Printing Solutions for Higher Education Secure, on-premise mobile printing platform PrinterOn Enterprise enables students and faculty to Print Simply Anywhere For more than a decade, PrinterOn has been

More information

A - 1. CS 494 Object-Oriented Analysis & Design. UML Class Models. Overview. Class Model Perspectives (cont d) Developing Class Models

A - 1. CS 494 Object-Oriented Analysis & Design. UML Class Models. Overview. Class Model Perspectives (cont d) Developing Class Models CS 494 Object-Oriented Analysis & Design UML Class Models Overview How class models are used? Perspectives Classes: attributes and operations Associations Multiplicity Generalization and Inheritance Aggregation

More information

Netis WF-2411 Quick Configuration Guide NTC November TCS Webinar 1

Netis WF-2411 Quick Configuration Guide NTC November TCS Webinar 1 Netis WF-2411 Quick Configuration Guide 1 Background AARP Policy on Public WiFi No computer being used for AARP Foundation Tax-Aide work is allowed to be connected directly to a public WiFi All connections

More information

Scope and Sequence: CCNA Discovery

Scope and Sequence: CCNA Discovery Scope and Sequence: CCNA Discovery Last updated June 19, 2009 Target Audience The Cisco CCNA Discovery curriculum is primarily designed for Cisco Networking Academy students who are seeking entry-level

More information

Broward College Telecommuting and Hoteling Technology Proposal (2017)

Broward College Telecommuting and Hoteling Technology Proposal (2017) Broward College Telecommuting and Hoteling Technology Proposal (2017) CONTENTS Introduction... 2 Telecommuting or Telework (Offsite)... 2 Equipment, Software and Communication Requirements... 2 Standard

More information

UML diagrams. Software artifacts include: SRS, SDS, test cases, source code, technical/user manual, software architecture, etc.

UML diagrams. Software artifacts include: SRS, SDS, test cases, source code, technical/user manual, software architecture, etc. UML Modeling UML diagrams UML (Unified Modeling Language) is a general purpose visual modeling language that provides different types of diagrammatic techniques and notations to specify, visualize, analyze,

More information

Build a Talent Profile

Build a Talent Profile In your Talent Profile you can share information such as job history, education, skills, certifications and language proficiency. Updating your Talent Profile allows managers and Human Resources to utilize

More information

Chapter One. Introduction to Computer System. Definition Objectives Types according to their size Internet

Chapter One. Introduction to Computer System. Definition Objectives Types according to their size Internet Principles of Programming-I / 131101 Prepared by: Dr. Bahjat Qazzaz -------------------------------------------------------------------------------------------- Chapter One Introduction to Computer System

More information

Chapter 5: Structural Modeling

Chapter 5: Structural Modeling Chapter 5: Structural Modeling Objectives Understand the rules and style guidelines for creating CRC cards, class diagrams, and object diagrams. Understand the processes used to create CRC cards, class

More information

2. Give advantages and disadvantages of computer network. (Any 2 advantages- 2 Marks, Any 2 disadvantages- 2 Marks) Answer: Advantages:

2. Give advantages and disadvantages of computer network. (Any 2 advantages- 2 Marks, Any 2 disadvantages- 2 Marks) Answer: Advantages: Summer-15 1. Compare human network and computer network. (Each point- 1 Mark, any two points) Human Network 1. Human Network is a network of human beings. 2.It consist of individuals,organizations, schools,

More information

Bring more control and added efficiency to your scanning and print environment

Bring more control and added efficiency to your scanning and print environment Bring more control and added efficiency to your scanning and print environment Incorporating into your processes will lead to real improvements in the control and efficiency of multifunctional devices.

More information

RELATIONSHIP WITH KONICA MINOLTA

RELATIONSHIP WITH KONICA MINOLTA JOHN ENJOY DOE A FLEXIBLE INC. ENJOYS MOBILE TRUSTFUL WORKSTYLE RELATIONSHIP WITH KONICA MINOLTA Global technology leader profits from document security, lower costs, greener printing and the same level

More information

Navpreet Singh INTRODUCTION TO COMPUTER NETWORKS. Computer Centre Indian Institute of Technology Kanpur Kanpur INDIA

Navpreet Singh INTRODUCTION TO COMPUTER NETWORKS. Computer Centre Indian Institute of Technology Kanpur Kanpur INDIA INTRODUCTION TO COMPUTER NETWORKS Navpreet Singh Computer Centre Indian Institute of Technology Kanpur Kanpur INDIA (Ph : 2597371, Email : navi@iitk.ac.in) About Myself About Myself I am Network Manager

More information

UML Primer. -Elango Sundaram

UML Primer. -Elango Sundaram UML Primer -Elango Sundaram About UML UML Can be thought of as a blue print for Software Graphical notation for expressing underlying OOA&D ideas Can be used to design any type of application, hardware,

More information

Management Instruction

Management Instruction Management Instruction The Advanced Computing Environment This Management Instruction sets forth policy for the Advanced Computing Environment (ACE) within the United States Postal Service. All Web links

More information

XV. The Entity-Relationship Model

XV. The Entity-Relationship Model XV. The Entity-Relationship Model The Entity-Relationship Model Entities, Relationships and Attributes Cardinalities, Identifiers and Generalization Documentation of E-R Diagrams and Business Rules Acknowledgment:

More information

Networking Basics. Crystal Printer Network Installation Guidelines

Networking Basics. Crystal Printer Network Installation Guidelines Networking Basics & Crystal Printer Network Installation Guidelines 1. Overview This guide is intended to provide the necessary basic knowledge of wireless networking needed to enable the Crystal printer

More information

KONICA MINOLTA MOBILE PRINTING SOLUTIONS

KONICA MINOLTA MOBILE PRINTING SOLUTIONS JOHN ENJOY DOE A FLEXIBLE INC. ENJOYS WORKSTYLE TRUSTFUL WITH RELATIONSHIP MOBILE PRINTING WITH KONICA MINOLTA Global technology leader profits from document security, lower costs, greener printing and

More information

PART IV. Internetworking Using TCP/IP

PART IV. Internetworking Using TCP/IP PART IV Internetworking Using TCP/IP Internet architecture, addressing, binding, encapsulation, and protocols in the TCP/IP suite Chapters 20 Internetworking: Concepts, Architecture, and Protocols 21 IP:

More information

IT and Interface Requirements

IT and Interface Requirements IT and Interface Requirements Recommended Server Hardware Specifications Server Hardware General Requirements Processor 3.0GHz quad core Xeon Memory 16GB RAM (minimum) 32GB RAM recommended. Storage 500GB

More information

ITEC 3800 Data Communication and Network. Introducing Networks

ITEC 3800 Data Communication and Network. Introducing Networks ITEC 3800 Data Communication and Network Introducing Networks Introduction to Networking Computer network, or simply network Refers to the connection of two or more computers by some type of medium You

More information

SMART Questionnaire. Fields marked with * are mandatory. Introduction

SMART Questionnaire. Fields marked with * are mandatory. Introduction SMART Questionnaire Fields marked with are mandatory. Introduction Dear Sir or Madam, We have been tasked by the European Commission's DG CONNECT to gain a detailed understanding of the different measurement

More information

A network is a group of connected, communicating devices such as computers and printers. An internet

A network is a group of connected, communicating devices such as computers and printers. An internet 14 A network is a group of connected, communicating devices such as computers and printers. An internet (note the lowercase i) is two or more networks that can communicate with each other. The most notable

More information

Chapter 6: Entity-Relationship Model

Chapter 6: Entity-Relationship Model Chapter 6: Entity-Relationship Model Database System Concepts, 5th Ed. See www.db-book.com for conditions on re-use Chapter 6: Entity-Relationship Model Design Process Modeling Constraints E-R Diagram

More information

Agent appointment and credentialing quick reference guide

Agent appointment and credentialing quick reference guide Questions? Email us at brokers@brighthealthplan.com or call us at 1-888-325-1747 Monday-Friday 8:30am 5pm (CST) Agent appointment and credentialing quick reference guide Welcome to the Bright Health appointment

More information

Control printing and copying effectively with uniflow Output Manager

Control printing and copying effectively with uniflow Output Manager Control printing and copying effectively with Output Manager This Added control and extra efficiency Whatever the size of your company, you can use Output Manager to gain effective control and management

More information

Deployment User Guide

Deployment User Guide Deployment User Guide Version: 010319-2 Contents STEP 1: (Windows Users Only): Determine if your PC is running the 32-bit or 64-bit version of Windows. If you are not a PC user, please proceed to step

More information

HPE Intelligent Management Center

HPE Intelligent Management Center HPE Intelligent Management Center EAD Security Policy Administrator Guide Abstract This guide contains comprehensive information for network administrators, engineers, and operators working with the TAM

More information

Chapter 8 Networking and Digital Communication

Chapter 8 Networking and Digital Communication Tomorrow s Technology and You 8/e George Beekman Michael J. Quinn Networking and Digital Communication 2008 Prentice-Hall, Inc. Slide 1 A computer network is any system of two or more computers that are

More information

Simplifying Document Make-Ready Workflow and Production

Simplifying Document Make-Ready Workflow and Production Simplifying Document Make-Ready Workflow and Production imageware Prepress Manager Simplifying Document Make-Ready Workflow and Production Canon s imageware Prepress Manager is a comprehensive document

More information

Huawei FusionCloud Desktop Solution 5.3. Branch Technical White Paper. Issue 01. Date HUAWEI TECHNOLOGIES CO., LTD.

Huawei FusionCloud Desktop Solution 5.3. Branch Technical White Paper. Issue 01. Date HUAWEI TECHNOLOGIES CO., LTD. Issue 01 Date 2015-06-30 HUAWEI TECHNOLOGIES CO., LTD. 2015. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means without prior written consent of

More information

Background Brief. The need to foster the IXPs ecosystem in the Arab region

Background Brief. The need to foster the IXPs ecosystem in the Arab region Background Brief The need to foster the IXPs ecosystem in the Arab region The Internet has become a shared global public medium that is driving social and economic development worldwide. Its distributed

More information

EXPENSE ENTRY INSTRUCTION MANUAL SILVERLIGHT VERSION. Child & Youth School Services

EXPENSE ENTRY INSTRUCTION MANUAL SILVERLIGHT VERSION. Child & Youth School Services EXPENSE ENTRY INSTRUCTION MANUAL SILVERLIGHT VERSION Child & Youth School Services 2 Table of Contents 1. Expense Entry Instruction Manual 2. Table of Contents 3. Logging In 4 7. Starting a New Expense

More information

AT&T Collaborate. February, 2018

AT&T Collaborate. February, 2018 AT&T Collaborate February, 2018 Changing Work Environment Presentation title here edit on Slide Master Mobility of business Business anytime, anywhere Change is constant Need for real-time information

More information

Network fundamentals IB Computer Science. Content developed by Dartford Grammar School Computer Science Department

Network fundamentals IB Computer Science. Content developed by Dartford Grammar School Computer Science Department Network fundamentals IB Computer Science Content developed by Dartford Grammar School Computer Science Department HL Topics 1-7, D1-4 1: System design 2: Computer Organisation 3: Networks 4: Computational

More information

TRAVEL EXPENSE REIMBURSEMENT USER GUIDE. JHM SAP Training May 29, 2013

TRAVEL EXPENSE REIMBURSEMENT USER GUIDE. JHM SAP Training   May 29, 2013 TRAVEL & EXPENSE REIMBURSEMENT USER GUIDE JHM SAP Training www.hopkinsmedicine.org/sap saptraining@jhmi.edu May 29, 2013 CONTENTS Contents... 2 Introduction... 5 Purpose: Reimbursement... 5 Requesting

More information

Virtual Postman Manual. Version

Virtual Postman Manual. Version Virtual Postman Manual Version 6.20.5 Virtual Postman Manual Version 6.20.5 Copyright 2004-2014 Virtual Postman CC Abstract This manual presents the Virtual Postman document management system, version

More information

Fig (1) client and Server network

Fig (1) client and Server network 2.2 How Does the Internet Work? The international network known as the internet consists of hundreds of thousands of smaller networks linking educational, commercial, nonprofit, and military organizations,

More information

Data Communication. Introduction of Communication. Data Communication. Elements of Data Communication (Communication Model)

Data Communication. Introduction of Communication. Data Communication. Elements of Data Communication (Communication Model) Data Communication Introduction of Communication The need to communicate is part of man s inherent being. Since the beginning of time the human race has communicated using different techniques and methods.

More information

IBM Security Identity Manager Version Planning Topics IBM

IBM Security Identity Manager Version Planning Topics IBM IBM Security Identity Manager Version 7.0.1 Planning Topics IBM IBM Security Identity Manager Version 7.0.1 Planning Topics IBM ii IBM Security Identity Manager Version 7.0.1: Planning Topics Table of

More information

Experiment no 4 Study of Class Diagram in Rational Rose

Experiment no 4 Study of Class Diagram in Rational Rose Experiment no 4 Study of Class Diagram in Rational Rose Objective-: To studyclass Diagram in Rational Rose. References-: www.developer.com The Unified Modeling Language User Guide by Grady Booch Mastering

More information

INFORMATION TECHNOLOGY NETWORK ADMINISTRATOR ANALYST Series Specification Information Technology Network Administrator Analyst II

INFORMATION TECHNOLOGY NETWORK ADMINISTRATOR ANALYST Series Specification Information Technology Network Administrator Analyst II Adopted: July 2000 Revised : April 2004; August 2009; June 2014; February 2018 INFORMATION TECHNOLOGY NETWORK ADMINISTRATOR ANALYST Series Specification Information Technology Network Administrator Analyst

More information

Advanced UML Class Models

Advanced UML Class Models Advanced UML Class Models Or: Love s Labors Lost Jonathan Sprinkle 1 University of Arizona Department of Electrical and Computer Engineering PO Box 210104, Tucson, AZ 85721, USA August 27, 2012 Jonathan

More information

Custom Connect. All Area Networks. customer s guide to how it works version 1.0

Custom Connect. All Area Networks. customer s guide to how it works version 1.0 All Area Networks Custom Connect customer s guide to how it works version 1.0 The information in this technical user guide and the glossary of terms has been prepared in good faith and is correct at the

More information

QUALIFICATION: IC3 INTERNET AND COMPUTING CORE CERTIFICATION MODE OF DELIVERY: DISTANCE LEARNING

QUALIFICATION: IC3 INTERNET AND COMPUTING CORE CERTIFICATION MODE OF DELIVERY: DISTANCE LEARNING JOHANNESBURG CAMPUS: Tel: (011) 718-4000 Fax: (011) 482-1814 Cnr Main Road and Landau Terrace, Melville Ext 2 P O Box 91714, Auckland Park, 2006 Email: studentservices@milpark.ac.za Website: www.milpark.ac.za

More information

Scope and Sequence: CCNA Discovery v4.0

Scope and Sequence: CCNA Discovery v4.0 Scope and Sequence: CCNA Discovery v4.0 Last Updated August 30, 2007 The course objectives and outline for the final two CCNA Discovery courses, Introducing Routing and Switching in the Enterprise and

More information

Scope and Sequence: CCNA Discovery

Scope and Sequence: CCNA Discovery Scope and Sequence: CCNA Discovery Last updated April 22, 2008 Target Audience CCNA Discovery is primarily designed for Cisco Networking Academy students who are looking for career-oriented, information

More information

Chapter 2: Entity-Relationship Model

Chapter 2: Entity-Relationship Model Chapter 2: Entity-Relationship Model! Entity Sets! Relationship Sets! Design Issues! Mapping Constraints! Keys! E-R Diagram! Extended E-R Features! Design of an E-R Database Schema! Reduction of an E-R

More information

Prerequisit. cies. overview of. David. interviews. In research, the

Prerequisit. cies. overview of. David. interviews. In research, the IT Essentials I: PC Hardware and Software (CPMT 1305) Credit: 3 semester credit hours (2 hours lecture, 4 hours lab) Prerequisit te/co-requisite: None Course Description Provides comprehensive overview

More information

SECURING YOUR BUSINESS INFRASTRUCTURE Today s Security Challenges & What You Can Do About Them

SECURING YOUR BUSINESS INFRASTRUCTURE Today s Security Challenges & What You Can Do About Them BROTHER SECURITY WHITE PAPER NOVEMBER 2017 SECURING YOUR BUSINESS INFRASTRUCTURE Today s Security Challenges & What You Can Do About Them The last decade has seen many exciting advances in connectivity

More information

Computer Technology Flash Card 2

Computer Technology Flash Card 2 Computer Technology Flash Card 2 Mouse An input device that allows the user to manipulate objects on the screen by moving the mouse along the surface of a desk. Data Refers to the symbols that represent

More information

ETSI TR V1.1.1 ( )

ETSI TR V1.1.1 ( ) TR 101 886 V1.1.1 (2002-02) Technical Report Telecommunications and Internet Protocol Harmonization Over Networks (TIPHON); Requirements Definition Study; Real time aspects of a service 2 TR 101 886 V1.1.1

More information

Texas Health Resources

Texas Health Resources Texas Health Resources POLICY NAME: Remote Access Page 1 of 7 1.0 Purpose: To establish security standards for remote electronic Access to Texas Health Information Assets. 2.0 Policy: Remote Access to

More information

Cisco Systems Networking Academy

Cisco Systems Networking Academy LIVONIA CAREER TECHNICAL CENTER 8985 NEWBURGH LIVONIA, MI 48150 734-744-2816 Course Name: Cisco Systems Networking Academy Course Number: 906 Course Credit: 1.0 credit/semester School Year: 2008-2009 Instructor:

More information

Six Questions to Answer When Buying a Phone System

Six Questions to Answer When Buying a Phone System NEW PHONE SYSTEM BUYER S GUIDE Six Questions to Answer When Buying a Phone System In addition to the most comprehensive portfolio of voice communications, data and wireless networking products in the industry,

More information

Online Bus Ticket Resevevation System Class: HD J

Online Bus Ticket Resevevation System Class: HD J INTERNATIONAL DEVELOPERS TRAINING CENTER FOR SOFTWARE MEKONG DELTA-APTECH 1, Ly Tu Trong St, Cantho City Tel: 0710.3731072 Fax: 0710.3731071 PROJECT ACCPi10 Online Bus Ticket Resevevation System Class:

More information

COMPUTER NETWORKING LAB EXERCISES (TP) 1 BASIC CONFIGURATION AND TOOLS FOR EVERYBODY:

COMPUTER NETWORKING LAB EXERCISES (TP) 1 BASIC CONFIGURATION AND TOOLS FOR EVERYBODY: Name 1: Name 2: Group number: COMPUTER NETWORKING LAB EXERCISES (TP) 1 BASIC CONFIGURATION AND TOOLS FOR EVERYBODY: PING(6), DIG, TRACEROUTE(6), NETSTAT September 24, 2012 Abstract In this TP you will

More information

A l Ain University Of Science and Technology

A l Ain University Of Science and Technology A l Ain University Of Science and Technology 4 Handout(4) Database Management Principles and Applications The Entity Relationship (ER) Model http://alainauh.webs.com/ 1 In this chapter, you will learn:

More information

KYOCERA Net Viewer User Guide Supplement

KYOCERA Net Viewer User Guide Supplement KYOCERA Net Viewer User Guide Supplement Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change without notice. We cannot be

More information

2004 John Mylopoulos. The Entity-Relationship Model John Mylopoulos. The Entity-Relationship Model John Mylopoulos

2004 John Mylopoulos. The Entity-Relationship Model John Mylopoulos. The Entity-Relationship Model John Mylopoulos XVI. The Entity-Relationship Model The Entity Relationship Model The Entity-Relationship Model Entities, Relationships and Attributes Cardinalities, Identifiers and Generalization Documentation of E-R

More information

COMPUTER HARDWARE RAYMOND ROSE

COMPUTER HARDWARE RAYMOND ROSE COMPUTER HARDWARE RAYMOND ROSE LEARNING OUTCOMES 1.1 Identify types of computer how they process information, and the purpose and function of different hardware components. Understanding the computer and

More information

COP 3330 Final Exam Review

COP 3330 Final Exam Review COP 3330 Final Exam Review I. The Basics (Chapters 2, 5, 6) a. comments b. identifiers, reserved words c. white space d. compilers vs. interpreters e. syntax, semantics f. errors i. syntax ii. run-time

More information

Conceptual Data Models for Database Design

Conceptual Data Models for Database Design Conceptual Data Models for Database Design Entity Relationship (ER) Model The most popular high-level conceptual data model is the ER model. It is frequently used for the conceptual design of database

More information

GoToMyPC Corporate Product Guide

GoToMyPC Corporate Product Guide GoToMyPC Corporate Product Guide 072402 Contents Product Overview...1 How It Works...1 Target Audiences/Product Uses...2 Primary Selling Points...3 Software Features and Benefits...4 Administration Center

More information

Background Brief. The need to foster the IXPs ecosystem in the Arab region

Background Brief. The need to foster the IXPs ecosystem in the Arab region Background Brief The need to foster the IXPs ecosystem in the Arab region The Internet has become a shared global public medium that is driving social and economic development worldwide. Its distributed

More information

Tablets for Business Exploring Compute Models for Mobile Professionals

Tablets for Business Exploring Compute Models for Mobile Professionals Tablets for Business Exploring Compute Models for Mobile Professionals Use this interactive guide to explore the new single and dual-device compute models enabled by tablets in business. Example: Two-System

More information

Quick Reference Card Completing an Expense Report in Concur Travel and Expense

Quick Reference Card Completing an Expense Report in Concur Travel and Expense Use this QRC when completing an expense report from an approved travel request in Concur Travel and Expense. Log In To Concur Go to the Employee Portal at www.purdue.edu/employeeportal. Choose Travel System

More information

3. UML Class Diagrams Page 1 of 15

3. UML Class Diagrams Page 1 of 15 3. UML Class Diagrams Page 1 of 15 The UML Class Diagram: Part 1 In the last article, we saw what use cases were, and how to identify and create use cases. Taking the series ahead, in this article, we

More information

Operating Systems Introduction. Mathieu Delalandre (PhD) University of Tours, Tours city, France

Operating Systems Introduction. Mathieu Delalandre (PhD) University of Tours, Tours city, France Operating Systems Introduction Mathieu Delalandre (PhD) University of Tours, Tours city, France mathieu.delalandre@univ-tours.fr 1 Operating Systems Introduction 1. Definition of OS 2. A brief history

More information

Modeling variability in software product lines with the variation point model

Modeling variability in software product lines with the variation point model Science of Computer Programming 53 (2004) 305 331 www.elsevier.com/locate/scico Modeling variability in software product lines with the variation point model Diana L. Webber a,, Hassan Gomaa b a Booz Allen

More information

City College Computing

City College Computing City College Computing European Computer Driving Licence Module 1 Sample Test 1 1. Which of these is an input device? A. CD-ROM B. Mouse C. Printer D. Zip drive 2. What does RSI mean? A. Repeated Syndrome

More information

Concur Travel & Expense CAMPUS TRAINING GUIDE & LIVE DEMO

Concur Travel & Expense CAMPUS TRAINING GUIDE & LIVE DEMO Concur Travel & Expense CAMPUS TRAINING GUIDE & LIVE DEMO Training Agenda This training will be approximately 1.5 hours long and will go over the basics of Concur Travel and Expense system. Additional

More information

Introduction to Networking

Introduction to Networking Introduction to Networking The fundamental purpose of data communications is to exchange information between user's computers, terminals and applications programs. Simplified Communications System Block

More information

EEC-484/584 Computer Networks

EEC-484/584 Computer Networks EEC-484/584 Computer Networks Lecture 1 Department of Electrical and Computer Engineering Cleveland State University wenbing@ieee.org (Lecture nodes are based on materials supplied by Dr. Louise Moser

More information

System Management. User Guide

System Management. User Guide System Management User Guide The information in this document is subject to change without notice and does not represent a commitment on the part of Horizon. The software described in this document is

More information