1. In Benbunan-Fich (2001), the three main parameters used to
evaluate website usability are:
display, layout, buttons
content, organization, links
display, navigation,
interfaces
content, layout, format
content, navigation,
interactivity
2.One of these methods creates different versions of a system to
test which one is better:
Think aloud
A/B Testing
Retrospective
Surveys
Walkthrough
3. Which of the following method(s) allows to evaluate usability
indirectly?
Interviews
Observations
Focus Groups
Think Aloud
Only A and C
4.
Observer effect describes:
when a researcher identifies herself as a researcher and watches
when the user interacts with a system
the influence of the presence of an person has on the behavior of
participants
when the subjects may or may not realize they are being
observed
when researchers do not participate in the activity being observed
but sit on the sidelines and watch
when participants observe what other participants are doing
5. A sequence of interactions between a user and a system is
called a(n):
Interface
Graphical User Interface
Dialogue
Navigation
All of the above
In: Computer Science
As you analyze any modern corporate setup, you will see that companies want to ensure that all users are aware of their own individual responsibility to help protect the enterprise. Social engineering (SE) is becoming a more prevalent threat at all levels of business. To combat it, you first need to understand it. Therefore, you must complete the following: Describe what social engineering is and explain its existence and prevalence. Explain why SE is an important part of an information technology security course. Discuss employee and management responsibilities with regard to information security and combating SE. Make sure your work clarifies your opinion as to who carries more responsibility for preventing SE-the employees or management. Provide examples to back up your statements. Prepare a 1-2 page Word document that covers the above areas.
In: Computer Science
Write a report about cache memory
The report should contain the folowing information.
In: Computer Science
This is a three part question. For each part the answer requires identifying an asymmetric encryption technique, hashing or both. As part of each question you need to discuss the technique to demonstrate your understanding of how the functionality (confidentiality, authenticity, integrity) is supported. You need to discuss the details of what the sender and receiver do and the key usage if applicable.
What technique is used to exchange messages between two parties ensuring confidentiality? Discuss.
What technique is used to exchange messages between two parties ensuring authenticity? Discuss
c. What technique is used to exchange messages between two parties ensuring integrity? Discuss.
In: Computer Science
Alameen is a railway system and wants to install Ticket Vending Machines (TVMs) on the platforms of all rail stations in Peshawar. The TVMs will allow the passenger to buy a ticket/pass using cash, coins, debit cards, or credit cards. The interface of the TVMs should be very easy for the passengers to buy their tickets.
This system should be designed in such a way that the passenger first selects the ticket type, transaction mode, and then get a pass/ticket. Passengers can be adult, senior/disabled citizens, child (5-14 years old), high school, or college students. Ticket type can be either a two-hour pass, midday pass, or AM pass (Monday through Friday from 09:30 am to 02:30 pm), a PM pass (noon through the end of service on the date purchased), a day pass, a 7-day pass, or a 31-day pass. There will be no ticket fare for senior or disabled citizens. The only thing they have to show during traveling is the valid ID and ticket. The ticket fare for a child (5-14 years old), high school or college students will be reduced, and they will have to show valid Id along with ticket (reduced fare) to the ticket checking authority.
The system should restrict the unauthorized users from using the system. The system should be fast enough that it should accept the input from the user in less than 1 second. The system should be fast enough to print the ticket to the user within 3 to 5 secs when user inserts all the required information. The system should be available 24 hours a day and 7 days a week. The system will also be used by the operator to know the cash and coins inside the machine and withdraw or deposit cash when required. The system is designed in such a way to allow admin to generate reports. The reports include how many tickets are sold, the number of transactions, cash or coins collected, change fares, cash, or coins dispensed.
To understand the operation of Ticket Vending Machines (TVMs) and how to buy a ticket through TVMs, please watch the following short tutorials (one is 4:52 and other is 2:35 min: secs) as listed below:
Read the above-mentioned scenario and answer the following questions which are as follows:
In: Computer Science
What program would you write to solve the following problems and why does it work? Please also comment on other students’ code at least three times. 1) Write code to partition a linked list around a value x, such that all nodes less than x come before all nodes greater than or equal to x. If x is contained within the list, the values of x only need to be after the elements less than x. The partition element x can appear anywhere in the “right partition”; it does not need to appear between the left and right partitions. Input: 3à5à8à5à10à2à1 (partition=5) Output: 3à1à2à10à5à5à8. 2) Write a method that finds the maximum of two numbers. You should not use if-else or any other comparison operator. 3) Write methods to implement the multiply, subtract and divide operations for integers. The results of all of these are integers. Use only the add operator.
In: Computer Science
The purpose of this lab is to manipulate an array of integers. The assignment is to write a program that: 1. Declares an array of integers of size equal to constant int SIZE = 10. 2. Implements the following methods: A method that displays a menu. The menu should be displayed after each completed menu selection. A method that prompts the user to initialize the array. The entire array does not need to be initialized. The user may enter only as many (or as few) values as they would like in the array. The user will enter a negative value to indicate no more to be added. Hint: This implies that the number of elements in the array does not necessarily have to be the same as the maximum size of the array. A method that displays the contents of the array. Only elements currently contained in the array should be horizontally displayed. A method that displays the minimum, maximum, sum and average of all the elements currently contained in the array. A method that accepts a number and determines how many times (if any) that number appears as an element in the array. A method that allows the user to add a number to the end of the array. A method that allows you to insert a specified number at a specified index within the currently filled portion of the array. Hint: In order to accomplish this, the method must first check to see if there is room in the array to accept a new number. If the array is currently full (e.g. number of elements equals the maximum size of the array) then the user has to first delete an element from the array. Think carefully about what an insert into the array implies. The physical size of the array cannot change, therefore what must happen if a value is to be inserted somewhere in the middle of the array without losing any of the existing elements. A method that removes an element at a specified index in the array. Hint: As with the insert method, the physical size of the array cannot change, therefore how could we simulate an element of the array being deleted? CSCI 125 Array Manipulation Prof. Kadri Page 2 of 4 Sample run: Menu only displayed once here. Your program should display the menu after each completed menu selection. 1. Initialize Array 2. Display Array 3. Add element to the end 4. Add an element at a specific index 5. Remove an element at specific index 6. Show min, max, sum and average 7. Search 8. Exit 1. Initialize Array Enter integer values to fill the array -ve value to stop: 1 2 3 4 5 6 8 -9 2. Display Array 1 2 3 4 5 6 8 6. Show min, max, sum and average Min=1 Max=8 Sum=29 Average=4.14 7. Search Enter number to search for: 2 2 occurs 1 time. 5. Remove an element at specific index Enter index between 0 and 6 7 Invalid index Enter index between 0 and 6 1 2. Display Array 1 3 4 5 6 8 4. Add an element at a specific index Enter index between 0 and 5 6 Invalid index Enter index between 0 and 5 3 Enter number to insert 9 CSCI 125 Array Manipulation Prof. Kadri Page 3 of 4 2. Display Array 1 3 4 9 5 6 8 1. Initialize Array Enter integer values to fill the array -ve value to stop: 1 2 3 4 5 6 7 8 9 10 11 -9 Array is full. One or more numbers could not be inserted 2. Display Array 1 2 3 4 5 6 7 8 9 10 3. Add element to the end Array is full. 8. Exit Goodby
import java.util.Scanner;
public class ArrayMenu
{
static int count;
static Scanner kb = new Scanner(System.in);
public static void main()
{
int item=0;
int[] numArray=new int[100];
count=0;
while (item !=8)
{
menu();
item=kb.nextInt();
if (item==1)
initializeArray(numArray);
else if (item==2)
printArray(numArray);
}
System.out.println("Goodby!");
}
public static void menu()
{
System.out.println("1. Initialize Array");
System.out.println("2. Display Array");
System.out.println("3. Add element to the end");
System.out.println("4. Add an element at a specific index");
System.out.println("5. Remove an element at specific index");
System.out.println("6. Show min, max, sum and average");
System.out.println("7. Search");
System.out.println("8. Exit");
System.out.print(": ");
}
public static void initializeArray(int[] arr)
{
count=0;
int num;
System.out.print("Enter integer values to fill the array -vevalue to stop: ");
do
{
num = kb.nextInt();
if (num >=0)
{
arr[count]=num;
count++;
}
} while (num > 0);
}
public static void printArray(int[] arr)
{
for (int i=0; i< count; i++)
System.out.print(arr[i]+" ");
System.out.println();
}
}
CODING LANGAUGE JAVA
In: Computer Science
In java What program would you write to solve the following problems and why does it work? Please also comment on other students’ code at least three times. 1) Implement MyArrayStack (constructor, push, pop, peek and isEmpty), and MyLinkedQueue with both next and previous pointers (constructor, enqueuer/offer, dequeuer/poll, peek and isEmpty), and write the following two program to test them. You must use MyArrayList or MyLinkedList for the implementation. 2) For stack testing, write a program to check if a string has matching parenthesis such as “(())”, but not “)(“. 3) For stack testing, use it to “Evaluating Expressions” using the algorithm given in the class.
What program would you write to solve the following problems and why does it work? Please also comment on other students’ code at least three times. 1) Add support for exponent ~ for the problem in the previous discussion question. 2) An animal shelter, which holds only dogs and cats, operates on a strictly "first in, first out" basis. People must adopt either the "oldest" (based on arrival time) of all animals at the shelter, or they can select whether they would prefer a dog or a cat (and will receive the oldest animal of that type). They cannot select which specific animal they would like. Create the data structures to maintain this system and implement operations such as enqueue, dequeueAny, dequeueDog, and dequeueCat. You may use the myLinkedlist data structure you created in previous discussion question. 3) You have an integer and you can flip exactly one bit from a O to a 1. Write code to find the length of the longest sequence of 1 s you could create. EXAMPLE Input: 1775 (or: 11011101111) Output: 8.
In: Computer Science
How can an information management strategy reduce the costs of IT systems and investments?
In: Computer Science
View 2
Seneca Courses Inc.
Product Spreadsheet
All the course books are maintained on the following Product spreadsheet. SCI is currently having difficulty searching for books written by the same author, and would like the new database system to list each author separately. There can be one or many authors for each book, but there is no limit to the number of authors of a book.
|
PROD ID |
TITLE |
EDITION |
Purchase Cost |
Retail Price |
AUTHOR |
|
100860 |
DATABASE SYSTEMS: DESIGN AND IMPLEMENTATION |
THIRD EDITION |
$84.98 |
$99.98 |
CARLOS CORONEL, PETER ROB |
|
100861 |
DATABASE SYSTEMS: DESIGN AND IMPLEMENTATION |
FOURTH EDITION |
$92.82 |
$109.20 |
CARLOS CORONEL, PETER ROB |
|
100871 |
MODERN RETAILING |
FOURTH EDITION |
$88.36 |
$110.45 |
DANIEL CASTON, JENNY TAPSCOTT |
|
100890 |
UNDERSTANDING MICROSOFT ACCESS |
NINTH EDITION |
$65.52 |
$72.80 |
PIERRE LEBLAND, ROBERT COBB |
|
102130 |
ORACLE: INTRODUCTION TO PL/SQL |
$53.24 |
$59.15 |
PHILIP ROBB |
|
|
200376 |
ORACLE: ADVANCED PL/SQL DEVELOPMENT |
$64.26 |
$71.40 |
PHILIP ROBB, DAN CHEN |
Business Rules:
1. PURCHASE COST the default value is 0.
2. RETAIL PRICE must always have a value.
Normalize the above user view. Document all steps including UNF, 1NF, Dependencies, 2NF, and 3NF and explain or list the primary key and foreign
In: Computer Science
Why is SolarWinds Network Performance Monitoring Tool the best tool?
In: Computer Science
View 3
Seneca Courses Inc.
Employee Forms
All employee information for SCI is maintained on file forms. The following are sample employee information forms:
|
EMP_ID |
7839 |
EMP_ID |
7654 |
|||
|
EMP_NAME |
JOHN CHIU |
EMP_NAME |
ANDRE MARTIN |
|||
|
SOC_INS |
123-234-345 |
SOC_INS |
678-345-123 |
|||
|
POSITION |
MANAGER |
POSITION |
SALES |
|||
|
SUPERVISOR |
SUPERVISOR |
JOHN CHIU |
||||
|
HIREDATE |
November 13, 1999 |
HIREDATE |
September 24, 1999 |
|
EMP_ID |
7434 |
EMP_ID |
7435 |
|||
|
EMP_NAME |
PARVEZ RAI |
EMP_NAME |
DANIEL CHOY |
|||
|
SOC_INS |
234-123-432 |
SOC_INS |
345-312-234 |
|||
|
POSITION |
SALES |
POSITION |
CLERK |
|||
|
SUPERVISOR |
JOHN CHIU |
SUPERVISOR |
||||
|
HIREDATE |
June 24, 1980 |
HIREDATE |
August 4, 1998 |
Business Rules:
1. SOC_INS must always be different for each employee.
2. EMP_NAME must always have a value.
Normalize the above user view. Document all steps including UNF, 1NF, Dependencies, 2NF, and 3NF and explain or list the primary key and foreign
In: Computer Science
How computer Hardware is protected, Explain Dual-Mode Operation concept for Hardware protection?
In: Computer Science
How do you differentiate layered approach from Micro-kernel approach and Modular approach. Compare their advantages and disadvantages. ?
How could a system be designed to allow a choice of operating systems to boot from? What would the bootstrap program need to do?
In: Computer Science
What revolutionized or was paramount in getting us to where we are today in terms of technology (software, hardware and the intenet); and what's most influencial or life chainging?
In: Computer Science