Questions
Ms. Asma Ahmed is the new director of the Al-Ekra University library. Your team has been...

Ms. Asma Ahmed is the new director of the Al-Ekra University library. Your team has been contacted by Ms. Asma to develop a software system for the library only. She has prepared a description of some basic functions of the library loan system currently done manually. Ms. Asma wants an automatic library system that should work as described below: “The library loan system that we have at present is mostly manual. The library has three types of items for loan to its members: Book, DVD, and Magazine. Each item is identified with a unique call number of six digit long. The item has also a title and year of publication/production. Not all items are for loan. Some items are only for the use inside the library. For a book, 4 weeks; for a DVD, one week; and for a magazine 2 weeks loan is granted if the item is available for loan. A member can borrow maximum 5 items. The library maintains three different file systems: Membership, Item, and Loan. The university has also a separate software system called UniSys that deals with students and staff. The system has three major components: Staff/Student data, Registration data, and Course data. However, our library system needs data from UniSys to check the validity of the membership of the library. The university has another software system that deals with finance and payments, called FinSys which is also independent but communicates with other systems in the university. It has three components: Financial account of the staff/student, Salary, and Expenditure. Every person at Al-Ekra University has a FinSys account called Fin_Account. The information on the salary of the staff and the tuition fee of the student are stored here. We now want a library system that can provide the following functions. The member of the library can only borrow items from the library. The person must be either staff or student of Al-Ekra University. The person first submits an online application form. The forms include the name and address of the person, and the Fin_Account of the person with Al-Ekra University. A library administrative staff is immediately informed by the system that an application has been submitted. The admin staff first checks the application, and provides input if needed. The system saves the updated information of the application, and then contacts UniSys to get the confirmation that the applicant is either staff or student. Once the library system gets the feedback from UniSys, it records the feedback. If the person is a member of the university, the application is preliminary accepted; otherwise the application is rejected without further processing. The library system then requests FinSys to transfer QR. 500 from the applicant’s Fin_Account to the library. Once the money is transferred, the system creates a library membership account, and deposits the money in this account. After transferring the money to the library system, FinSys records in the applicant’s Fin_Account that QR. 500 has been transferred to library. Finally, it produces a membership card, and assigns a unique membership number. The system finally sends the membership card to the member. If FinSys does not transfer money, the system generates an error message to enter valid Fin_Account. Every team member MUST read this document carefully Page 2 In order to borrow an item from the library, a member first enters the membership card into a card reader of the library. The system retrieves the membership details and contacts the university system UniSys to find if the member is an active staff or student. If not, the system does not allow the member to borrow any item from the library and terminates the function. Otherwise, the system asks the member to place the item in the scanner. Once the member does this, the system gets the item details and its type. It also checks if the item is available for loan. The system also finds out the total items already borrowed but not returned. If the item is available for loan, and the total item borrowed but not returned is less than 5, it makes a loan for the member. The item is included in the membership account with the borrowing date and due date for return. The system then increments the total borrowed items by 1, and it makes the item unavailable for other members. The system also decrements the total items reserved of the member if the item was reserved by the member. The member has also choice to request for extended loan time for one more week. If the item was not reserved, one more week is added with the original return date. Finally, it creates a receipt of the loan, and releases the security code of the item. The receipt includes information such as membership number, item call number, loan date, and return date. A member can return a borrowed item to the library by scanning the item into the system that finds the loan details. It then checks the due date. If the due date already passed, it calculates the fine based on number late days. The system updates the member account with the fine. It then makes the item available and sets the security code of the item. The system decrements the total item borrowed by 1. It then creates a receipt of the return. The members can also extend the return date of an item if not reserved by other members. The member first inserts the membership card into the card reader. The system retrieves the list of all currently borrowed items. The member then selects the item that he/she wants to be extended. The system finds the current return date. If the return date has already passed, no extension is possible. An extension is only possible if the request is made before the return date. It also checks if the item has already been reserved. If reserved by other, the return date cannot be extended, otherwise one week extension is made. The system updates the member account with the new return date. It prepares a receipt with the new return date. A member can reserve an item if it is currently on loan with other member. The member first enters the card into the card reader. The system finds the membership details. It checks the total number of current reserved items. It the member has already reserved 3 items, no more reservation request is possible. The system asks for the call number of the item he/she wants to reserve. The system retrieves the item details once the member enters the call number of the item. If already reserved by other, it cannot be reserved by anyone. If not, the item is reserved under the member account, and increments the total reserved item by 1. The system confirms the reservation to the member. Every day at 10 am, the library system automatically checks if any item was not returned after 10 days of the due date. The system generates a list of such items and alerts the admin staff with the list. The staff then enters the call number of each item into the system which finds the loan details. It changes the status of the item as ‘lost’. The system deducts QR. 500 from the deposit money as a fine from the member account. It then requests FinSys with the Fin_Account of the applicant to transfer QR. 500 to the library. FinSys forwards the transfer information to the library that receives the advice and updates the member account with the deposit money. The member is informed about the lost item. The system should know which item was borrowed by which member, borrowing date, the return date, if the item was returned and when. It can also find out which item was lost and by which member, how many items were borrowed by one member, which item was borrowed by which members so far, etc. " Page 3 Ms. Asma wants that the managing of the above activities of the library should be automated as much as possible. There will be also possibility that the administrative staff can generate summary report of loans, returns, fines, etc. At this stage, she wants you to analysis ONLY the functionalities of the library system. She also warns you that you should not analyze any functionality of other systems in this phase. You need to define the system boundary carefully.

Prepare design sequence diagrams for all 3 use cases proposed, ( return item,reserve item, generate sum mary report)

In: Computer Science

Please No Plagiarism must be in your own 500 words There is much discussion regarding Data...

Please No Plagiarism must be in your own 500 words

There is much discussion regarding Data Analytics and Data Mining. Sometimes these terms are used synonymously but there is a difference.  What is the difference between Data Analytics vs Data Mining? Please provide an example of how each is used.

In: Computer Science

In java, (include javadoc comments for each method, please use ArrayList, not Array, and ensure that...

In java, (include javadoc comments for each method, please use ArrayList, not Array, and ensure that the program compiles).
design a class named Contact that has fields for a person’s name, phone number and email address. The class should have a no-arg constructor and a constructor that takes in all fields, appropriate setter and getter methods.

Then, write a program that creates at least five Contact objects and stores them in an ArrayList. In the program create a method, that will display each object in the ArrayList. Call the method to demonstrate that it works.

In: Computer Science

Write a C program to run on ocelot which will either set or clear a single...

Write a C program to run on ocelot which will either set or clear a single bit in a number entered by the user using the binary representation of the number. The user should input the original integer value between 1 and 1000 inclusive using a scanf. Use an unsigned integer type. Output is to the screen. You must use only bitwise operators for this program. You can shift bits and or use the logical bitwise operators.

For this assignment give the user directions asking them to enter the integer and then ask the user if he or she wants to clear or set a bit. Then ask the user which bit to set or clear. That can be a number between 0 and 31. Prompt the user for what should be entered each time. Be sure to validate all user input so the program cannot be crashed. After completing the operation ask the user if they want to do the entire operation again. The user would enter Y or y to do it again. This would be the entire operation from entering the first integer.

You do not need to use getopt for this program since there are no command line arguments.

• If the user enters a 1 as the initial value and a 0 for the bit to clear the result would be 0.

• If the user enters a 1 as the initial value and a 0 for the bit to set the result would be 1.

• If the user enters a 10 as the initial value and a 1 for the bit to clear then the result would be 8.

• If the user enters a 10 as the initial value and a 1 for the bit to set then the result would be 10.

• If the user enters a 10 as the initial value and a 2 for the bit to clear then the result would be 10.

• If the user enters a 10 as the initial value and a 2 for the bit to set then the result would be 14.

Output for each operation should be easy to read giving the number before the switch and then the decimal number after the switch. No other output should be included.

The program should compile to create an executable called bitops.

• Test the program with the following commands:

                  - bitops

                              ▪ enter 10 as the initial value and a 2 for the bit to clear

                  - bitops

                              ▪ enter 10 as the initial value and a 1 for the bit to set

• Take a screenshot of the screen showing the output on ocelot. Name it FirstNameLastName.png or .jpg.

Submit your source file, the screenshot and your Makefile in one zip file called FirstnameLastnameL4.zip to the assignment dropbox in Canvas. If the program does not compile and do something useful when it runs it will not earn any credit

In: Computer Science

in java language. There are three classes for the project, and two inner classes defined in...

in java language.

There are three classes for the project, and two inner classes defined in the Cuboid class.

Create the following classes:

•   Shape. It’s an abstract class with two abstract methods, area and perimeter.
•   Rectangle. It’s a concrete class that extends Shape. Implement area() and perimeter(). Implement the compareTo(object) method to sort rectangles by area in ascending order.
•   Cuboid. It’s a concrete class that extends Rectangle. A cuboid is a 3D rectangle. The shape has a third dimension, Depth. Override the area() method to compute the surface area of the object and implement new method volume(). The perimeter method is invalid in this context. The best way to handle this is to throw an exception called “UnsupportedOperationException”. If perimeter() is called, throw this exception.
•   SortByArea and SortByVolume are two classes defined as attributes of the Cuboid class. If you want to sort, the easiest way is to implement the compareto() method. If you want to sort more than one way, you must implement multiple comparators. Implement these methods so they are sorting by area in ascending order and volume in ascending order.


Complete the following unit tests:
•   Rectangle
o   Test Construction
o   Test getter / setter methods
o   Test area()
o   Test perimeter
o   Test compareTo(Object), ensuring rectangles are being sorted correctly (2x2 sorts < 4x6, for example)
•   Cuboid
o   Test Construction
o   Test getter / setter methods.
o   Test area()
o   Test perimeter
o   Test SortByArea
o   Test SortByVolume

In: Computer Science

Considering the power of the attackers in KPA, CPA, and CCA assumptions(given in the lecture slides...

Considering the power of the attackers in KPA, CPA, and CCA assumptions(given in the lecture slides of week 1a), define the KPA-Game, CPA-Game, CCA-Game and the associated computational indistinguishable definition under these attack games.

Note, computational indistinguishability under CPA-Game is the minimum requirement for message confidentiality in real applications. And once again, we write computational indistinguishable under KPA-Game, CPA-Game, CCA-Game as KPA-IND, CPA-IND, and CCA-IND, respectively

In: Computer Science

JAVA public class StringQueue {    //You may NOT add any more fields to this class....

JAVA

public class StringQueue {
   //You may NOT add any more fields to this class.
   private Stack<String> stack1;
   private Stack<String> stack2;

   /**
   * Initializes an empty queue.
   */
   public StringQueue() {
       // TODO
       throw new RuntimeException("Not Implemented");
   }

   /**
   * Returns true if this queue is empty.
   *
   * @return {@code true} if this queue is empty; {@code false} otherwise
   */
   public boolean isEmpty() {
       // TODO
       throw new RuntimeException("Not Implemented");
   }

   /**
   * Returns the number of items in this queue.
   *
   * @return the number of items in this queue
   */
   public int size() {
       // TODO
       throw new RuntimeException("Not Implemented");
   }


   /**
   * Adds the item to this queue.
   *
   * @param item the item to add
   */
   public void enqueue(String item) {
       // TODO
       throw new RuntimeException("Not Implemented");
   }

   /**
   * Removes and returns the item on this queue that was least recently added.
   *
   * @return the item on this queue that was least recently added
   * @throws NoSuchElementException if the queue is empty
   */
   public String dequeue() throws NoSuchElementException {
       // TODO
       throw new RuntimeException("Not Implemented");
   }

In: Computer Science

Research the following five (5) tools below that could be using during a penetration test: Nmap...

  1. Research the following five (5) tools below that could be using during a penetration test:
    1. Nmap
    2. Wireshark
    3. John the Ripper
    4. Maltego
    5. Recon-ng

For each tool, answer the following questions:

  1. 1) What does the tool do?
  2. 2) Why is the tool favored by attackers for badness?
  3. 3) How can the tool be used by a Defender for good?
  4. 4) What risk does the tool present if used incorrectly on the organization?

In: Computer Science

C++ What Should This Program Do? Linked List Class Design your own linked list class (List.h)...

C++

What Should This Program Do?

Linked List Class

  • Design your own linked list class (List.h) to hold a series of strings.
  • The linked list node should be implemented as a struct.
  • The class should have member functions for appending, inserting, and deleting nodes.
  • You should also have a display function that will traverse the list & display each node’s value.
  • Don’t forget to add a destructor that destroys the list.

DRIVER – driver.cpp

Write a driver program (driver.cpp) that will do the following:

  1. Create a linked list object
  2. Call the linked list’s append function to append the following strings to your linked list. Afterwards, print to the screen to tell the user that you are inserting several strings to the list.
    1. “boogeyman”
    2. “ghost”
    3. “scarecrow”
    4. “witch”
    5. “zombie”
  3. Now call the linked list’s display function to print the list.
  4. Now call the linked list’s insert function to insert the “vampire” string in the correct sorted position. Print to the screen to tell the user that you are inserting “vampire” in to the list.
  5. Now call the linked list’s display function again to print the list.
  6. Now call the delete function to delete “ghost” from the list. Print to the screen to tell the user that you are deleting “ghost” from the list.
  7. Last, call the linked list’s display function again to print the list.

------------------------------------------------------------------------------

Sample Output

The linked list has been created.

I am appending several strings to the list.

boogeyman

ghost

scarecrow

witch

zombie

I am inserting vampire in the list.

boogeyman

ghost

scarecrow

vampire

witch

zombie

I am deleting ghost from the list.

boogeyman

scarecrow

vampire

witch

zombie

All list nodes have been removed.

---------------------------------------------------------------------------------------------------------------------

What to Turn In

  • List.h
  • driver.cpp

In: Computer Science

You are hired to design a database for a fitness center. As the fitness center is...

You are hired to design a database for a fitness center. As the fitness center is expanding with more than one branch, they want to create a database to keep track of its customers, facilities and employees. Each branch has a unique id and address (building number, street, district, and city). A branch may have more than one facility (e.g. swimming pool, spa, etc.). Each facility must belong to only one branch, and the information for a facility is name and fees. In addition, each fitness branch offers different classes (such as Yoga, Pilates, Zumba, etc.). All classes should be led by at most one trainer, who is an employee.

Employees must work at one and only one branch. Each employee has an id, name, address (building number, street, district, and city) and can have multiple phone numbers. An employee can only be an admin, managing the facility or working as a clerk, or a trainer. An employee cannot be a trainer and an admin because the trainer id compensated an hourly wage while an admin staff paid a monthly salary. Trainers can train individual customers at different time sessions.

A customer must register at one branch. Each customer has a membership number, name (stored as first name and last name), email, and only one phone number. A customer can join more than one class or uses any number of facilities. A customer may also decide to be trained by at most one personal trainer.

Given the above description:

  1. Draw an ERD for the database, identifying the following:
    1. All the entities, attributes and relationships
    2. Primary key and (discriminator in weak entity, if any). Don’t forget each entity has to have PK.
    3. Participation and cardinality constraints. (Explain your choices for two constraints- i.e. identify the words the guided your decision)
    4. Specialization and completeness constraints (if there is an ISA relationship).
  1. Write a schema for two entities and two relationships of your choice. Remember, sometimes a relationship is better not be represented in a separate schema; if this is the case with your chosen relationship explain what you will do.
  2. Please use a tool to draw the ERD exactly draw it use the word microsoft to make it clear answer .

In: Computer Science

Select either OSSTMM, PTES, or ATT&CK and explain the importance of using a formal testing methodology....

Select either OSSTMM, PTES, or ATT&CK and explain the importance of using a formal testing methodology. Clearly define what occurs in each phase of your selection and the significance of each phase.

In: Computer Science

After reading chapter 5 of the textbook and watching the video “JavaScript Loops” JavaScript Loops and...

After reading chapter 5 of the textbook and watching the video “JavaScript Loops” JavaScript Loops and “JavaScript Decision Statements” 11 JavaScript Decision Statements

Create a html web page that allows the coach of a town’s soccer league to enter the ages of all the children who have registered for soccer this year. Children between the ages of 4 and 15 are allowed to sign up for soccer but there can be a lot of variation in the number of children who sign up each year and their ages. Eventually the children will be placed into one of three leagues: Junior, Intermediate, and Senior. The Junior League is for children ages 4–7, the Junior League is for children ages 8–11, and the Senior League is for children ages 12–15. The coach wants to know how many children will be in each group. Your program should allow the coach to enter the ages of as many children as desired and should keep track of how many are in each group. The final display should tell the coach how many children signed up and how many will be in each group. Save your page as soccer.html and be sure to include an appropriate page title.


Please upload a screenshot of the working program along with a zipped folder with the .HTML file and any other files or pictures.

In: Computer Science

C++ code a program should prompt the user for the name of the output file. The...

C++ code

a program should prompt the user for the name of the output file. The file should be opened for write operations. Values calculated by the program will be written to this file. The program must verify that the file opened correctly. If the file did not open, an error message should be printed and the user should be prompted again. This should continue until the user supplies a valid filename.

In: Computer Science

Q1.Which of the following are propositions? (a) The Apple Macintosh is a 256-bit computer. (b) Why...

Q1.Which of the following are propositions?

(a) The Apple Macintosh is a 256-bit computer.

(b) Why are you here?

(c) 8 + 10 = 12

Q2.Construct truth tables for each of the following compound propositions. What do you notice about the results?

(a) p∨(¬pq)

(b) pq

Q3.For the following multiple choice question, pick one choice (1. A tautology; 2. A contradiction; 3. Neither) for each compound proposition.

  • p ⋏(¬p)    
  • p ⋏(¬q)    

For the following multiple choice question, pick one choice by circling it (you may have to give some explanations.)

Q4. Match the term on the left to the number of the matching expression on the right.

(a) converse of Q ଠS                                                                              

(b) a tautology                                                                                               

(c) a contradiction                                                                                        1. ¬Q àS

(d) equivalent to Q àS                                                                                   2. ¬S v S ^ S

(e) inverse of Q à¬S                                                                                     

(f) contrapositive of QàS   

                                                                      

Q5.Is this a valid argument?                                                                                                                 

               

                                                                                                                      

Q6. For each of the premise-conclusion pairs below, give a valid step-by-step argument (proof) along with the name of the inference rule used in each step.

Premise: {p v q, q àr, p ^ s àt, ¬r,¬q àu ^ s}, conclusion:t.

Q7.Use the truth table to verify the following statement:

¬ (p ∨¬q) ∨(¬p ∧¬q) ≡ p

Q8.Let Q(n) be the predicate “n2≤ 49.”

Write Q(3), Q(−3), Q(5), Q(−5), Q(8), and Q(−8) and indicate which of these statements are true and which are false.

Q9.In 1–2, write a negation (¬) for each statement.

1.∃x ∈R, if x2≥ 1 then x ≤ 0.

  1. ∀n ∈Z, if n is composite then n is even or n =

PS: A composite number is a positive integer which is not prime (i.e., which has factors other than 1 and itself).

In: Computer Science

In this Pluralsight Lab, you will continue viewing the course C++ Fundamentals Including C++ 17 by...

In this Pluralsight Lab, you will continue viewing the course C++ Fundamentals Including C++ 17 by Kate Gregory. Note that in this lab, some concepts are covered that we will cover in class later in the course. However, Having a introduction to these concepts will definitely aid in your understanding later in the course. Also, the application created in this lab will be used in subsequent Pluralsight labs.

You may access the course by following this link: https://app.pluralsight.com/library/courses/cplusplus-fundamentals-c17/table-of-contents

Instructions

Begin this lab by viewing the following modules in the Pluralsight course:

  • Module 5 (Language Basics - User Defined Types)
  • Module 6 (Language Basics - Flow of Control)

Then complete the following tasks:

  • Use the Class Wizard in Visual Studio to create a class called Student. (Note that the Class Wizard will automatically create the .h and .cpp files.)
  • Your Student class should have the following class members/properties: studentID, firstName, lastName, and studentStatus. (Note that the studentStatus member will be of type Status, which is an enum you will create.)
  • Create a default and constructor and a constructor that requires only the Student Id, first name, and last name. (The studentStatus member should not be initialized at this time.)
  • Create a member function called getStudentInfo() that returns a string that contains the students first name, last name, and their status.
  • Create a destructor for the Student class. (Note that the Class Wizard automatically includes a destructor.)
  • Add a status.h file to the solution. Then add a Status enumeration to that file with the following entries: Attending, NonAttending, and Graduated. Then include this file in your class file.
  • Add #pragma once to all of your header files
  • Write a simple program that asks the user for the Student Id, first name, and last name of the student. Then instantiates a new student object with this information.
  • Ask the user if the student is presently attending the school. If the user states "no", ask if a degree was obtain. Use the ternary operator to set studentStatus member of the object to either NonAttending or Graduated based on whether a degree was obtained.
  • If the user states that the student is attending, set the studentStatus to Attending.
  • Display the student's information by calling the getStudentInfo() member function.

C++

You may access the course by following this link: https://app.pluralsight.com/library/courses/cplusplus-fundamentals-c17/table-of-contents

and it have free trial for 4 days I thin you can access

In: Computer Science