...Лабораторная работа №2 Использование коллекций Цель работы: получить навыки проектирования приложения со стоящих из нескольких взаимосвязанных классов. Задание к работе 1. Для заданной предметной области спроектировать программную структуру, состоящую из 3-5 классов. 2. В соответствии с разработанной диаграммой классов выполнить программную реализацию. 3. Предусмотреть использование типа данных – перечисление. 4. Ввод/вывод должен быть реализован вне проектируемого класса. Индивидуальные задания 1. Предметная область: АТС. На АТС хранится информация о всех клиентах станции. АТС имеет список тарифов на междугородние разговоры. Клиент АТС может совершать множество звонков в различные города. Система должна: позволять вводить информацию о тарифах; вводить информацию о клиентах и регистрировать звонки; по введенной фамилии о клиенте определять стоимость всех сделанных им звонков в соответствии с действующими тарифами; вычислять общую стоимость всех выполненных на АТС звонков. 2. Предметная область: Вокзал. Касса вокзала имеет список тарифов на различные направления. При покупке билета регистрируются паспортные данные пассажира. Пассажир покупает билеты на различные направления. Система должна: позволять вводить данные о тарифах; позволять вводить паспортные данные пассажира и регистрировать покупку билета; рассчитывать стоимость купленных пассажиром билетов; после ввода наименования направления, выводить список всех пассажиров, купивших на него билет; 3. Предметная...
Words: 1042 - Pages: 5
...Guideline for MGT 210 group project Section 21, Spring 2012 Faculty: TqM Project Theme: Analyzing an organization from the management perspective. The organization must be an established and operational organization and not any fictitious one. The analysis should be carried out by conducting an interview with a manager of the organization. Chapter 1 1. Organization’s background (when established, mission, vision, goal, functions, etc.). 2. SWOT for the company and Porter’s 5 forces analysis of the industry in which the company operates. 3. Your manager’s background (both educational and professional), his or her job role within the organization, his/her managerial level, how many subordinates he/she supervises, and so on. 4. What roles does your manager usually perform (i.e. interpersonal, informational, decisional, etc.). 5. Talk briefly about the organization’s external environment (as we discussed in chapter 3). 6. How is the organization contributing to social responsibility or responsiveness, if at all? Chapter 2 1. Organogram (i.e. organizational structure) of the organization. 2. Discuss the problems faced and decisions made by your manager (as discussed in chapter 6). 3. Discuss the span of control of your manager. 4. Discuss the plans of the organization (strategic/operational/long term/short term/directional/specific/single use/standing). Cover at least 5 plans if not all. 5. What is the decision making system of...
Words: 342 - Pages: 2
...com 1234567890 1234567890 1234567890 1234567890 1234567890 1234567890 1234567890 1234567890 1234567890 1234567890 1234567890 1234567890 1234567890 1234567890 1234567890 1234567890 1234567890 1234567890 1234567890 1234567890 1234567890 1234567890 1234567890 1234567890 1234567890 1234567890 1234567890 1234567890 1234567890 1234567890 1234567890 1234567890 1234567890 1234567890 1234567890 1234567890 1234567890 1234567890 1234567890 1234567890 1234567890 1234567890 1234567890 1234567890 1234567890 1234567890 1234567890 1234567890 1234567890 1234567890 1234567890 1234567890 1234567890 1234567890 1234567890 1234567890 1234567890 1234567890 1234567890 1234567890 1234567890 1234567890 1234567890 1234567890 1234567890 1234567890 1234567890 1234567890 1234567890 1234567890 1234567890 1234567890 1234567890 1234567890 1234567890 1234567890 1234567890 1234567890 1234567890 1234567890 1234567890 1234567890 1234567890 1234567890 1234567890 1234567890 1234567890 1234567890 1234567890 1234567890 1234567890 1234567890 1234567890 1234567890 1234567890 1234567890 1234567890 1234567890 1234567890 1234567890 1234567890 1234567890 1234567890 1234567890 1234567890 1234567890 1234567890 ...
Words: 275 - Pages: 2
...Data Management Project – Pharmacy Management System Requirement Analysis Background At the pharmacy centre of Queens Hospital, New York, pharmacists dispenses the drugs prescribed by the physician to the patients. These drugs were prescribed by the physician in written prescription form. All the prescriptions along with the dispensing information were maintained in the form of written records. These written records were used to track the medical history of the patients. It was very difficult to maintain these details in the form of written records and retrieve them whenever needed. So, the Queens Hospital officials contacted us to give a proposal for work to be done on an electronic database. On December 5 2014, a meeting was held with the health care professionals of Queens Hospital. During the meeting we were able to obtain enough information to provide the health care professionals of Queens Hospital with a Requirements Document. This document outlines the user requirements for a proposed electronic pharmacy records tracking system. Requirements General Constraints, Assumptions, Dependencies, and Guidelines The following items present the general constraints, assumptions, dependencies, and guidelines that are required upon the implementation of the electronic pharmacy record database. * A general knowledge of basic computer skills is necessary to use this product. * Most of the times health care professionals doesn’t have core knowledge on computers. So...
Words: 3164 - Pages: 13
...What’s a mobile phone virus? A mobile phone virus or mobile malware - malicious mobile software - is a computer virus specifically adapted for the mobile phone environment and designed to spread from one vulnerable phone to another. A virus is a program code that replicates by being copied to another program. Viruses can be transmitted as attachments to an email or in a download file. Some viruses take effect as soon as their code is executed; other viruses can lie dormant. A virus that replicates by resending itself as an email attachment or as a part of a network message is known as a worm. Viruses can range from benign to quite harmful; they can erase data from the infected phone or send fake messages purporting to be from the phones owner. How prevalent are mobile phone viruses? The current security risk from mobile phone viruses and worms is low. Until many more smart phones or PDAs are in use, and users of these phones are regularly exchanging executable files, the risk will remain low. The mobile industry takes the threat of viruses very seriously and is continually monitoring its networks and working to protect users from any future risk from mobile phone viruses. There are also some simple measures that individual users can implement to protect themselves. What can I do to protect my phone? The following tips can help prevent problems with viruses on your phone: 1. Switch to Bluetooth hidden mode. If your phone has Bluetooth capability, ensure...
Words: 3609 - Pages: 15
...IT Infrastructure Week 1 Lab Session – Packet Tracer Packet Tracer is a very powerful but easy to use network simulator that allows students to design both logical and physical network topologies and simulate their performance. This task is to build the logical topology shown below: [pic] 1. From the Packet Tracer device window (bottom left) select and place in to the main window the following devices: Qty 4 3560 L3 Switches Qty 1 2811 Router Qty 1 Internet cloud Qty 1 Wireless Access Point (generic) Qty 3 2960 L2 Access layer switches Qty 2 Laptops Qty 5 PCs Qty 4 Servers Qty 1 IP Phone Qty 1 Printer 2. click on the relevant device and change its name to that in the topology diagram 3. Drag and drop wiring from the menu – use crossover cables (black dashed) to connect the switches together and straight through cables (solid black) for all other connections. You can connect devices to any suitable port. 4. Configure DHCP Server The DHCP Server provides IP addresses to each network device that requests an IP address using dhcp. From the desktop menu configure the following IP addresses: IP Address: 192.168.1.103 Subnet Mask: 255.255.255.0 Default Gateway: 192.168.1.1 DNS: 192.168.1.102 From the Config menu select DHCP. Configure the serverpool with the correct DNS and Default Gateway as above. Set the start address IP address: 192.168.1.10 and Subnet...
Words: 852 - Pages: 4
...The quick brown fox jumps over the lazy dog From Wikipedia, the free encyclopedia The phrase shown in metal moveable type, used in printing presses (image reversed for readability) "The quick brown fox jumps over the lazy dog" is an English-language pangram—a phrase that contains all of the letters of the alphabet. It is commonly used for touch-typing practice. It is also used to test typewriters and computer keyboards, show fonts, and other applications involving all of the letters in the English alphabet. Owing to its brevity and coherence, it has become widely known. Contents [hide] 1 History 2 Computer usage 3 Cultural references 4 See also 5 References History[edit] The earliest known appearance of the phrase is from The Michigan School Moderator, a journal that provided many teachers with education-related news and suggestions for lessons.[1] In an article titled "Interesting Notes" in the March 14, 1885 issue, the phrase is given as a suggestion for writing practice: "The following sentence makes a good copy for practice, as it contains every letter of the alphabet: 'A quick brown fox jumps over the lazy dog.'"[2] Note that the phrase in this case begins with the word "A" rather than "The". Several other early sources also use this variation. As the use of typewriters grew in the late 19th century, the phrase began appearing in typing and stenography lesson books as a practice sentence. Early examples of publications which used the phrase include Illustrative...
Words: 990 - Pages: 4
...that particular registered customer. b.) If the user is not ordering on behalf of a customer, the user can check on the customer details and click the “CONTINUE” button to proceed. c.) A message box “Order Record Saved Successful!” will appear on the screen. d.) If the user ticks on the “on behalf of customer” checkbox, the shipping information page will display empty fields for the user to fill in on the screen. (there is no customer ID column because the receiver may not be the member) e.) If the user clicks on the text field of the house number, the condition “must be positive integer” will appear behind the text field. f.) If the user clicks on the text field of the mobile number, the condition “To ensure delivery (eg: 1234567890)” will appear behind the text...
Words: 875 - Pages: 4
...Net-Worm.Win32.Kido.ih Detected | Feb 20 2009 07:04 GMT | Released | Apr 02 2009 16:24 GMT | Published | Feb 20 2009 07:04 GMT | Manual description Auto description This description was created by experts at Kaspersky Lab. It contains the most accurate information available about this program. Manual description Auto description This is a description which has been automatically generated following analysis of this program on a test machine. This description may contain incomplete or inaccurate information. Technical Details Payload Removal instructions Technical Details This network worm spreads via local networks and removable storage media. The program itself is a Windows PE DLL file. The worm components vary in size from 155KB to 165KB. It is packed using UPX. Installation The worm copies its executable file with random names as shown below: %System%\<rnd> %Program Files%\Internet Explorer\<rnd>.dll %Program Files%\Movie Maker\<rnd>.dll %All Users Application Data%\<rnd>.dll %Temp%\<rnd>.dll %Temp%\<rnd>.tmp <rnd> is a random string of symbols. In order to ensure that the worm is launched next time the system is started, it creates a system service which launches the worm’s executable file each time Windows is booted. The following registry key will be created: [HKLM\SYSTEM\CurrentControlSet\Services\netsvcs] ...
Words: 1158 - Pages: 5
...1. Initial product backlog 4 1.1 Acceptant 4 1.2 Head of department 4 1.3 Specialist(1) 5 1.4 Specialist(2) 5 2. Use-case 6 2.1 Use-Case descriptions 7 4. Classs diagram 13 5. Class definition 14 1.5 Class Schademelding 14 1.5.1 Data descriptions 14 1.5.2 Operation descriptions 14 1.6 Class Verzekerde 15 1.6.1 Data descriptions 15 1.6.2 Operation descriptions 15 1.7 Class Behandelaar 16 1.7.1 Data descriptions 16 1.7.2 Operation descriptions 16 1.8 Class Rol 16 1.8.1 Data descriptions 16 1.8.2 Operation descriptions 16 1.9 Class KostenSpecificatie 17 1.9.1 Data descriptions 17 1.9.2 Operation descriptions 17 1.10 Class Polis 18 1.10.1 Data descriptions 18 1.10.2 Operation descriptions 18 1.11 Class Dekking 18 1.11.1 Data descriptions 18 1.11.2 Operation descriptions 19 1.12 Class Geraakte Dekking 19 1.12.1 Data descriptions 19 1.12.2 Operation descriptions 19 1.13 Class Taxatie 19 1.13.1 Data descriptions 19 1.13.2 Operation descriptions 20 6. Sequence Diagram 21 1.14 Example screens 22 7. 26 8. ERD 26 8.1 Explanation of the ERD per table 26 8.2 Constraints 29 8.3 Business rules 30 1. Initial product backlog 1.1 Acceptant As an acceptant, I want to be able to log in with my username and password so that I can handle incoming damage reports. As an acceptant, I want to able to find a customer if I fill in his/her zip code, so that I can see the customer’s information As an acceptant, I want to see the policies of the customer...
Words: 3679 - Pages: 15
...C o m m i t t e e o f S p o n s o r i n g O r g a n i z a t i o n s o f t h e T r e a d w a y C o m m i s s i o n Thought Leadership in ERM R I S K A S S E S S M E N T I N P R A C T I C E By Deloitte & Touche LLP Dr. Patchin Curtis | Mark Carey The information contained herein is of a general nature and based on authorities that are subject to change. Applicability of the information to specific situations should be determined through consultation with your professional adviser, and this paper should not be considered substitute for the services of such advisors, nor should it be used as a basis for any decision or action that may affect your organization. Authors Deloitte & Touche LLP Principal Contributors Dr. Patchin Curtis Director, Deloitte & Touche LLP Mark Carey Partner, Deloitte & Touche LLP COSO Board Members David L. Landsittel COSO Chair Marie N. Hollein Financial Executives International Douglas F. Prawitt American Accounting Association Chuck E. Landes American Institute of CPAs (AICPA) Richard F. Chambers The Institute of Internal Auditors Sandra Richtermeyer Institute of Management Accountants Preface This project was commissioned by the Committee of Sponsoring Organizations of the Treadway Commission (COSO), which is dedicated to providing thought leadership through the development of comprehensive frameworks and guidance on enterprise risk management...
Words: 5365 - Pages: 22
...The Quality of Data Introduction Value Errors Missing Data and Bad Structures Entity Resolution Anonymous Resolution Conclusion 34 35 39 50 62 66 1 DATA MINING FOR INTELLIGENCE Introduction Computer processors are faster than ever, storage is fairly cheap, network bandwidth is continually expanding, and information technologies are capable of integrating massive amounts of data. With all of these high-end systems and capabilities, there is still a limitation on performing effective analytics and much of this has to do with the quality of the data collected throughout the years. The real challenge lies in improving the accuracy of the data through better collection and representation methods. Only when this problem is appropriately addressed can one realistically expect to see improvement in the detection and analytics of fraud, terrorism, money laundering, and other critical areas. One high-profile situation emphasizes this point. It was reported1 that Senator Edward Kennedy (Massachusetts) was stopped while boarding airline fl ights on five different occasions because his name matched an entry on a government no-fly list. Additionally, Congressman John Lewis (Georgia) claims he was required to submit to additional security checks because his name also matched one on a watch list. In both cases, the data processed by these systems represented only a limited portion of what was necessary to properly perform an appropriate match. Ultimately the situations were...
Words: 10818 - Pages: 44
...THE GOAL 1 I come through the gate this morning at 7:30 and I can see it from across the lot: the crimson Mercedes. It's parked beside the plant, next to the offices. And it's in my space. Who else would do that except Bill Peach? Never mind that the whole lot is practically empty at that hour. Never mind that there are spaces marked "Visitor." No, Bill's got to park in the space with my title on it. Bill likes to make subtle statements. So, okay, he's the division vice-president, and I'm just a mere plant manager. I guess he can park his damn Mercedes wherever he wants. I put my Buick next to it (in the space marked "Controller"). A glance at the license as I walk around it assures me it has to be Bill's car because the plate says "NUMBER 1." And, as we all know, that's absolutely correct in terms of who Bill always looks out for. He wants his shot at CEO. But so do I. Too bad that I may never get the chance now. Anyway, I'm walking up to the office doors. Already the adrenalin is pumping. I'm wondering what the hell Bill is doing here. I've lost any hope of getting any work done this morning. I usually go in early to catch up on all the stuff I'm too busy to do during the day, because I can really get a lot done before the phone rings and the meetings start, before the fires break out. But not today. "Mr. Rogo!" I hear someone calling. I stop as four people come bursting out of a door on the side of the plant. I see Dempsey, the shift supervisor; Martinez, the union steward;...
Words: 120884 - Pages: 484
...CHAPTER I INTRODUCTION International Christian College of Manila (ICCM) according to the Wikipedia, is a private, non-profit co-educational Bible college of the non-denominational Christian Churches/Churches of Christ as rooted on the Stone-Campbell Restoration Movement, whose existence is anchored, among others, on the preservation of primitive New Testament Christianity. Its main campus is in San Jose, Antipolo City, province of Rizal, Philippines. In accordance with the Philippine law, ICCM first received its permit to operate from the country’s Commission on Higher Education (CHED) on 8 March 2005. The college started in July 2000 when a number of advanced students of theology from other Bible seminaries found that they no longer had a Bible college in which to study. The students approached church ministers of Metro Manila like Nick Alfafara, Robert and Nezie Cabalteja, and Ross and Cheryl Wissmann for help with a new college where they could continue their training for the church. The first classes were held in the Wissmann’s residence then in Mapayapa Village I, Quezon City. The first professors were Bobby and Nezie Cabalteja, Tito Pel, Ferdinand Rosete, and Ross and Cheryl Wissmann. By August 2000, premises were rented in Village Plaza Building at the corner of Narra and Sampaguita streets at Mapayapa Village III that served as boys’ dorm and classrooms while the girls’ dormitory was at the nearby Bueno Sol, Ramax Subdivision...
Words: 62907 - Pages: 252
...This document is exclusive property of Cisco Systems, Inc. Permission is granted to print and copy this document for non-commercial distribution and exclusive use by instructors in the CCNA Exploration: LAN Switching and Wireless course as part of an official Cisco Networking Academy Program. PT Activity 1.2.4: Build a Hierarchical Topology Topology Diagram Learning Objectives • • Add devices to a topology. Connect the devices. Introduction Packet Tracer is integrated throughout this course. You must know how to navigate the Packet Tracer environment to complete this course. Use the tutorials if you need a review of Packet Tracer fundamentals. The tutorials are located in the Packet Tracer Help menu. This activity focuses on building a hierarchical topology, from the core to the distribution and access layers. All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 1 of 3 CCNA Exploration LAN Switching and Wireless: LAN Design PT Activity 1.2.4: Build a Hierarchical Topology Task 1: Add Devices to the Topology Step 1. Add the missing distribution layer routers. The routers you need are located in Custom Made Devices. R1 and R3 are 1841 routers. Ctrl-click the 1841 router to add more than one. Press ESC to cancel. R2 is a 2621XM router. Step 2. Add the remaining access layer switches. Following the topology diagram, add nine 2960-24TT switches to complete the rest of the access...
Words: 48601 - Pages: 195