a) Draw use case diagram for Altered State University (ASU) Registration System Professors indicate which courses they will teach on-line. A course catalog can be printed Allow students to select on-line four courses for upcoming semester. No course may have more than 10 students or less than 3 students. When the registration is completed, the system sends information to the billing system. Professors can obtain course rosters on-line. Students can add or drop classes on-line.
Q: Identify if the following relation is in 1NF: STUDENT(StudentID, FirstName, LastName, (CourseID, Co...
A:
Q: Exercise Database Management Concepts - BITS Corporation You've described replication to management,...
A: Introduction: Because we have two databases, it will aid in improving aggregate function performance...
Q: Does it explain how a computer works? Then we'll talk about computer components, right?
A: Introduction: A computer is a device that stores and processes data. Most computers employ a binary ...
Q: for x = 3 to x = 5 x+ Evaluate the function y in steps 0.5. Write the complete code.
A: ALGORITHM:- 1. Assign a loop for x=3 to x=5 and make a increment of 0.5 each time. 2. Calculate the ...
Q: What is the procedure for recovering data from a solid state disk in a forensically sound manner?
A: The procedure for recovering data from a solid state disk in a forensically sound manner is as foll...
Q: ACCOUNT AND TRANSACTION and establish constraints
A: Given :
Q: 1. Given the data below, construct a Pandas program to generate and display a DataFrame with index l...
A: Program: import pandas as pdimport numpy as npdf = pd.DataFrame( {'ord_no':[70001,np.nan,7000...
Q: Using HTML and CSS and Javascript. Include a new page named “funpage.html” about coffee shop websit...
A: Jump Game <!DOCTYPE html><html lang="en"><head> <meta charset="UTF-8">...
Q: Implement a function readEmpFromFile that takes a FILE * as the only argument and returns a pointer ...
A: Solution:: Step 1 #include <stdio.h> #include <stdlib.h> #include <string.h> #...
Q: What was the driving force behind Cisco Systems' move from a standalone access control system to an ...
A: Introduction: Cisco Network Admission Control (NAC) feature, in its first phase, allows Cisco router...
Q: Deadlock is a term that refers to a situation where there is no way out What is the difference betwe...
A: Introduction: Deadlock: A deadlock occurs in an operating system when any process enters a waiting s...
Q: Instead of using a formal argument to provide data into a function, why not use a symbolic constant ...
A: Introduction In a function declaration, the formal arguments are the parameters/arguments. Legal arg...
Q: Given the following binary number in 32-bit (single precision) IEEE-754 format, the decimal value cl...
A:
Q: secure your cloud network with Security Groups
A: Security groups are security firewalls for the cloud networks network access control lists (NACLs) a...
Q: Which of the following creates and manages a VM (virtual machine) and allocates hardware resources f...
A: We need to find which creates and manages a virtual machine. Which allocates hardware resources for ...
Q: Write a Java program to take a string from user, print a string made of the chars at indexes 0,1, 4,...
A: Required:- Write a Java program to take a string from the user, print a string made of the chars at ...
Q: List and briefly describe the processes that a computer or operating system will follow if a TLB mis...
A: Introduction Paging is a mechanism for non-contiguous memory allocation in the operating system. It...
Q: Give two advantages of using virtualization as a networking technique on a network.
A: Intro Give two advantages of using virtualization as a networking technique on a network.
Q: 10. Convert the following ASCII character 'N' to binary or HEX. Add 3 (in base 10) to this value, w...
A: Given Character : 'N' Requirements : Convert 'N' into binary or Hexadecimal, Then Add 3 (in base 10...
Q: Question 1 for f(t) = t", use loop statement in Matlab to get the summation of f(t) at t=2 and n ran...
A: Hello student Greetings Hope you are doing great. As per our policy guidelines in case of multiple q...
Q: Pick one number and convert it into these (4×3=12) 12 types of number system
A: Task : Pick a number in decimal. Convert it into base 12 digits.
Q: You want to designate a unique index on the vehicle_id and VIN columns because together they filter ...
A: Unique indexes are indexing that support maintaining data integrity by ensuring that no rows of data...
Q: Assume a computer contains two network interface cards, NIC1 and NIC2. NIC1 is a Wifi USB card, and ...
A: INtro The network interface card (NIC) enables computers to interact across a computer network via w...
Q: A young family is relocating to a new residence. They want to utilise the network for online educati...
A: Introduction: LAN: It is a group of computers and peripheral devices linked in a confined area like ...
Q: Explain various types of addresses supported in IPv6 with their reserved bits.
A: A small part of the monstrous IPv6 address space has been set aside for special addresses.
Q: What are the main procedures you should take if you want the computer to search for operating system...
A: Introduction: The process of a computer's operating system starting when it is switched on is known ...
Q: List and briefly describe the processes that a computer or operating system will follow if a TLB mis...
A: Introduction Paging is a mechanism for non-contiguous memory allocation in the operating system. It...
Q: B. Describe in words what each of these string slices does? Don't just tell me the answer but also t...
A: As per the requirement statements are executed in python. Algorithm: Step 1: Initializing string wit...
Q: Scenario Fill in the blanks in a program. After this, test your program (just run it). Your version ...
A: As per the requirement program is completed. Algorithm: Step 1: Write the main() method Step 2: Defi...
Q: A home security company for an apartment complex, HSS, wants to automate its manual functions using ...
A: A home security for apartments to motion detection, facial recognition, speech recognition or ethic...
Q: Explain control structure used in C with an example program and state the importance of 'for()' cons...
A: Control structure are the structures in the programming concept where the flows run on the basis of ...
Q: PLEASE HELP ME WITH THIS WHOLE PYTHON PROGRAMME QUESTION USE Bivariate Barplots Activity 2: Create...
A: Requirements: To create two sub Dataframes from the main dataframe where one data frame holds only m...
Q: create a survey page about coffee using HTML and CSS and Javascript, use multiple choice questions a...
A: The page was created with HTML, CSS and it is a fully functional survey form.
Q: windows form Application. 1. Add these specific colors Red, Blue, Green, Yellow in the combobox. 2.W...
A: Windows forms application in C# has the name WorkingWithColors Form1.cs[Design] :
Q: When it comes to iOS, what is the difference between the IPA and.am extensions?
A: In this question we have to discuss about the IPA and .am extensions First we will look into what bo...
Q: TensorFlow ParameterServerStrategy in order to see how the general structure of the code looks like....
A: Example code for coordinator This section provides code snippets that are intended to be run on (the...
Q: What are the various computer programming languages? Provide a succinct summary of each.
A: What are the various computer programming languages? Provide a succinct summary of each.
Q: Explain why firewalls are such a critical component of network security and cybersecurity. Make sure...
A: Introduction: In order to answer the question, we must explain the importance of network scanning an...
Q: For this exercise you are going to write a program that will allow you to accept and load different ...
A: import csv from datetime import datetime from matplotlib import pyplot as plt def get_weather_data(f...
Q: Write C++ program to read 20 integers to be stored in a One dimension array of size 20: 1. Find the ...
A: #include <iostream> using namespace std; int main() { int arr[20]; int sum = 0,max=0; ...
Q: Find the compliment 1 (A+B')C = ?
A:
Q: What is the name of the Microsoft Office word processing programme?
A: Introduction: We've requested the name of the word processing program that comes with Microsoft Offi...
Q: please fast answer
A: ANSWER ANS 1. The er 1 and er 2 is given below :-
Q: Your task is to write a function toLeetSpeak that converts a regular english sentence to Leetspeak. ...
A: Iterate over the input sentence Use another string and keep on updating respective value from dictio...
Q: What are the primary areas of conoern for risk management, and how wwould you define them?
A: the answer for below question is: Risk management is the process of identifying, evaluating and mana...
Q: The implementation of instruction set architecture exemplifies abstraction as a concept in computer ...
A: Abstraction: Intending to allow just the most crucial information to be focused on, it is an instru...
Q: What examples of Python rules and methods can you provide?
A: Introduction: Note: Python's syntax rules and rules for defining methods are discussed in the follow...
Q: Home:Woark Programtocompute the average of seven degree, and if the student success, then print "pas...
A: Hello student Greetings Hope you are doing great Thank You!!!
Q: Which network topologies are practical and which would you recommend?
A: A network's topology describes how nodes and links are arranged physically and logically Devices hav...
Q: For the following C statement, what is the corresponding MIPS assembly code? Assume that the variabl...
A: As per guidelines I can answer only first question. I hope you can understand. Thank You. First br...
Trending now
This is a popular solution!
Step by step
Solved in 4 steps with 1 images
- uml sheet question 2: Design UML diagram for the license issuing process of vehicles. Therequirements are as follows:o The country is divided into departments (Cairo, Giza, Alex….etc.). Each department is described by a code (unique), and severalservice locations (e.g., for Cairo department, there are: Heliopolis,Nasr City etc.).o Each Vehicle is described by a number (unique: for all vehicles inthe same department), model, type (private, Limousine, taxi….etc.), color, motor capacity, number of seats, manufacturing year,license issue date, license expiry date, owner, tax rate, and a set offins. The owner, type, and tax rate information are mandatory foreach vehicle. Each vehicle type is identified by a code (unique),name (unique), and has a set of tax categories. Each tax categoryhas a specific tax rate.o Each vehicle fin is described by number (unique), type, date, andvehicleo Each fin type is associated with specific value. When a vehicle istransferred from one department to another…1. Draw the context diagram or Level 0 DFD for the following case/scenario. “The purpose of the SALALAH acres real estate system is to assist agents as they sell houses.Sellers contact the agency, and an agent is assigned to help the seller complete a listing reqeuest.Information about the house and lot taken from that request is stored in a file. Personal informationabout the sellers is copied by the agent into a sellers file.When a buyer contacts the agency, he or she fills out a buyer request. Every two weeks, the agency sendsprospective buyers area real estate listings and an address cross reference listing containing actual streetaddresses. Periodically, the agent will find a particular house that satisfies most or all of a specificbuyer’s requirements, as indicated in the buyer’s requisrements statement distributed weekly to allagents. The agent will occasionally photocopy a picture of the house along with vital data and send themultiple listing statement to the potential…Q no 1 FYP-1 stores the student’s name, where student name identifies project name. Write formal specification using Z-specification language for the creating of schema and following functions of a FYP-1 system, add project entry, get project name, and delete project from FYP-1 schema. Q no 2 We consider a specification of a system which keep track of the students’ fees submission. In the FYP-2 class there are two types of students: submitted fees: (all the students in the class who have submitted their fees) not Submitted (all the students in the class who have not submitted their fees) Create a Schema and do following operation using Z specification. Registration function where you can check whether student submit the fees or not, if fees already submitted then the student name store in the submitted fees set, otherwise the name store in the not submitted fees set. Print the name of students whose fees are already submitted. This should be noted the same student’s…
- Question 1: Create an ERD that can be implemented for a medical clinic, using at least the following business rules: A patient can make many appointments with one or more doctors in the clinic, and a doctor can accept appointments with many patients. However, each appointment is made with only one doctor, and each appointment references a single patient. Emergency cases do not require an appointment. However, an emergency is entered into the appointment book as "unscheduled" for appointment management purposes. If kept, an appointment yields a visit with the doctor specified in the appointment. The visit yields a diagnosis and, when appropriate, treatment. Each visit updates the patient's records to provide a medical history. Each patient visit creates a bill. Each patient visit is billed by one doctor, and each doctor can bill many patients. Each bill must be paid. However, a bill may be…ABC is a pharmaceutical company that recruits volunteers for clinical trials on drugscurrently under development at the company. The company conducts multipleclinical trials concurrently. Each clinical trial is assigned a trial code together with description of theclinical trial, start date, end date, and the lead scientist. Each clinical trialinvolves at least one treatment, and each treatment belongs to only one trial.Treatment has its conduct date. When volunteers sign up for a treatment of a clinical trial, their contact detailsincluding full name, address, contact number, email address, as well as theirunique volunteer number are recorded. Each volunteer is involved in at leastone treatment, while each treatment is tested on at least 30 volunteers. In addition, medical details for each volunteer including weight, height, bloodtype, race, gender, and medical condition are also recorded separately. At each treatment each volunteer involves a specific drug of certain type,…ABC is a pharmaceutical company that recruits volunteers for clinical trials on drugscurrently under development at the company. The company conducts multipleclinical trials concurrently. Each clinical trial is assigned a trial code together with description of theclinical trial, start date, end date, and the lead scientist. Each clinical trialinvolves at least one treatment, and each treatment belongs to only one trial.Treatment has its conduct date. When volunteers sign up for a treatment of a clinical trial, their contact detailsincluding full name, address, contact number, email address, as well as theirunique volunteer number are recorded. Each volunteer is involved in at leastone treatment, while each treatment is tested on at least 30 volunteers. In addition, medical details for each volunteer including weight, height, bloodtype, race, gender, and medical condition are also recorded separately. At each treatment each volunteer involves a specific drug of certain type,…
- Computer Science The Academic Affairs Department of ABC College provides photocopy services for the lecturers. Lecturers need to provide their name, staff id, faculty code (FHTM-Faculty of Hotel and Tourism, FSSR-Faculty of Sports Science and Recreation), type of assessment (quiz, test, examination), number of pages for master/original copy and number of copies required, to request for the photocopy service. The following class of Photocopy defines all the details for the photocopy service.G: Race conditions can be occurred in any computer program. Consider a group of two students develop a FYP project and maintain a database in it. One student calls an update( ) function on some data and at the same time second student calls update( ) on the same data to update the database. Describe what problem can be arise in the scenario and what might be done to prevent such problem?Refer to Question 1(b) and sketch a UML sequence diagram for the scenario where the administrator registers a patient who only has public health insurance NOTE 1(B) answer is given in picture
- Let’s take a look at the following context diagram of payroll system. 2. Design level-2 DFD based on following scenario. Calculate pay process is decomposed in two processes, compute net pay and prepare payroll. Compute net pay process take valid payroll data and exemption data from withholding datastore and generate Net pay and deduction which is saved to employee datastore and also sends to prepare payroll process. Finally prepare payroll process saves posting information to payroll journal datastore and send paychecks to Employees.Problem 1: Use Case Modeling Altered State University (ASU) Registration System requires the following users and functions: 1. Professors indicate which courses they will teach on- line. A course catalog can be printed. 2. Students are allowed to select on-line courses for the upcoming semester. They have to be registered first. When the registration is completed, the registrar office sends information to the billing system. 3. Professors can also obtain course rosters on-line. Students can add or drop classes on-line. 4. The registrar is responsible of maintaining the professor information, the student’s information and the courses information. The system enable him to create student catalog. Give the use-case model diagram, showing the interaction between actors and each of the use-cases in the system, and showing the dependencies among use cases (initiates, includes, extends, or depends on} - )Draw an ER diagram for the EMU Slimming Center based on the specification given below. Case Study 01 A wedding hall (Shadi Hall) organizes different types of functions for its customers. Each function is hosted (owned) by exactly one customer. A customer may host many functions. There are many employees working at the company. Before each function date, the administrations of the wedding hall calls a meeting of relevant employees to finalize the arrangements of the function. Each meeting belongs to exactly one function. Comments/suggestions of each employee in the meetings and the decisions of the meetings are also recorded. Instructions: • Identify the relationship between Entities (clearly showing the cardinality and participation)