Project #4 CRC cards and Class diagram

Project #4 CRC cards and Class diagram

ACTIVITY DIAGRAM

The following activity diagram depicts the process of buying eye glasses from the viewpoint of the patient. The first step is to see an eye doctor who determines if the patient needs glasses then gives the patient a prescription. The patient goes to a glasses store, where he selects the frame and places the order for the glasses. Once the glasses have been made, the patient returns to the store for a fitting and pays for the glasses.

page1image2113242272

USE CASE DIAGRAM

The following use case diagram illustrates the process of buying eye glasses.

page2image2139489200

CRC CARDS AND CLASS DIAGRAM

The following concepts were identified from the Activity diagram and Use Case diagram above.

Patient Prescription Eyeglasses Frame

Lenses Order Doctor Store

ATTRIBUTES AND BEHAVIORS

The system needs to remember at minimum the following attributes and perform the following operations

System Attributes

System Behaviors

Eyeglasses getLenseID Eyeglasses getFrameID Order calculateTax
Order calculateItemCost Order calculateTotalCost Customer getContact Customer getPaymentInfo Prescription getSpecification Lens getStrength

Frame getStyle
Store getDirections Doctor getAppointment

Bill to address CC#
Email address ID

Customer
Customer
Customer
Customer
Customer
Customer
Customer
Doctor ID
Eye glasses Base cost Eyeglasses Description Eyeglasses Discount cost Eyeglasses Manufacturer Eyeglasses Model

Frame ID
Lens ID
Order Date
Order Discount price Order ID

Order Quantity
Order Retail price Prescription Date Prescription specification Product ID (eyeglasses) Ship to address

Store name Store phone Store address Store number

Name
Phone number (home) Phone number (work)

PROJECT REQUIREMENTS

1. Create a CRC card for each class
2. Use the classes that were outlined for you and create the CLASS diagram for the system.

  •   Determine which class each attribute belongs to.
  •   Identify and add associations to the diagram
  •   Name your associations
  •   Add attributes and behaviors to the diagram
  •   Identify and add multiplicity indicators to the diagram
    PROJECT DELIVERABLES
    1. Upload your PDF version of the project to the assignment posting on blackboard 2. Use the cover page at the end of this handout as the first page of your assignment

Digital Forensics Evidence

  

Dwayne and Debbie Tamai Family of Emeryville, Ontario.

Mr. Dwayne Tamai and Mrs. Debbie Tamai case of electronic harassment involved 15-year-old son, Billy, who took control of all of the electronic devices in the family’s home, including the phone, and manipulated them to the distress of other family members for his own amusement. The incidents began in December 1996, when friends of the family complained that phone calls to the Tamai home were repeatedly being waylaid, cut off missed messages, strange clicking and appears like a minor with a disembodied voice, unnervingly distorted by computer, who interrupted calls to make himself known.

After burping repeatedly, the caller frightened Mr. and Mrs. Tamai, and stated that I know who you are, and I stole your voice mail. Mocking, sometimes menacing, the high-tech stalker became a constant presence, eavesdropping on family conversations, switching TV channels, and shutting off the electricity.

The police department confirmed that the sabotage was an inside activity but refrain from releasing the name the culprit. The police further stated that nothing would be gained by filing charges against the suspect. Mr. Dwayne and Mrs. Debbie Tamai asserted that their son, Billy, had admitted engaging in the mysterious calls. The interruptions included burps, blathering and claims having control over the inner workings of the Tamai’s custom-built home, and the power to turn individual appliances on and off via remote control.

It started off as a witticism with friends and got out of control to an extent that he didn’t know how to end the entire operation, become afraid to come forward and tell the parents for the fear of us disowning him.

On Saturday, Mr., and Mrs. Tamai get organized and planned to take their son to the police department to defend him against persistent rumors on him. Instead, Mr., and Mrs. Tamai’s son confessed and labelled an intruder code-named, Sommy. Mr., and Mrs. Tamai eliminated all external sources and had confidence in interior sources. After 2-days, a team of investigators, intelligence and security experts loaded with high-tech equipment failed to locate Sommy. The next day, the team brought in two television networks to assist in the process.

In conclusion, the son, Billy not (Sommy) contacted the victims; (his biological parents), launched verbal threats in combination with the electronic harassment, in an effort to demonstrate his power and authority over them. The best option was, Mr., and Mrs. Tamai victims were not physically harmed, but terrified and greatly inconvenienced by the fact that the unknown force appeared to have control over a great many aspects of their lives, and the unknown force turned out to be their biological son, Billy.

Scenario: 1
Criminal motive is connected to emotional, psychological, and material need are often impel by means of behavior and independent of technology operation. These criminal tendencies are believed to champion the restoration of the criminal’s self-confidence, and self-worth which lead criminals to the path of temporary gratification, inadequacy, and incompetence.

Question 1

1:1 Provide a comprehensive narrative of Billy’s competency and creating emotional distress on his parents.

1:2 Identify the role of Sommy in this operation

Scenario 2

The police department confirmed that the sabotage was an inside activity but refrain from releasing the name the culprit. The police further stated that nothing would be gained by filing charges against the suspect.

2:1 What level of criminal behavior was exhibited by Billy in this operation?

2:2 The entire operation is classified as a serious domestic problem, why didn’t the police officer file charges against the suspect?

Scenario 3

3:1 Modern approach use computer and internet technologies identify offender modus operandi, criminal intent, and motive. 

3:2 Describe the impact of computer and internet technologies of Billy MO and criminal motive in this situation.

Rewrite the programming example in chapter 4. (Cable company BILLING.)

1. Write a pseudo code before starting your program (you may not use SWITCH, replace it with IF structures)

1.1 Draw a flow chart for your program based on your pseudo code 
2. Identify your constants
3. Your input will come from the text file of a least 15 customers
3.1 Input file format – customerType accountNumber premiumChannels
 (I.e residential example: R12345 5, business example B12345 16 8)
 residential customers 
RaccountNumber numOfPremChannels
 
Business customers
BaccountNumber numOfBasicServConn numOfpremChannels
4. Precision should be two decimal places
5. Calculate the running average for residential and business customer spending 
6. Print all customer’s bill to a single file and the end of the file you should have the average summary for each customer type.
6.1 pay attention to details when you formatting your output

mad pratical connection

 

Provide a reflection of at least 500 words (or 2 pages double spaced) of how the knowledge, skills, or theories of this course(Enterprise Risk Management (ITS-835-B08))  have been applied, or could be applied, in a practical manner to your current work environment. If you are not currently working, share times when you have or could observe these theories and knowledge could be applied to an employment opportunity in your field of study(Fall 2020 – Enterprise Risk Management (ITS-835-B08) ). 

Requirements:

  • Provide a 500 word (or 2 pages double spaced) minimum reflection.
  • Use of proper APA formatting and citations. If supporting evidence from outside resources is used those must be properly cited.
  • Share a personal connection that identifies specific knowledge and theories from this course.
  • Demonstrate a connection to your current work environment. If you are not employed, demonstrate a connection to your desired work environment. 
  • You should NOT, provide an overview of the assignments assigned in the course. The assignment asks that you reflect how the knowledge and skills obtained through meeting course objectives were applied or could be applied in the workplace. 
  • Any use of outside sources, including your own prior work, will result in a zero on the activity and a report being filed with Academic Affairs regarding plagiarism (even if self-plagiarism).

RM Research-4

Four to Six pages in length, not including the required cover page and reference page. 

APA 7 format (Remember, APA is double spaced)) , citation are key. (No Need of replies.)This is a research paper not discussion.  

Topic:

The reading this week discusses strategy and how ERM can be integrated with an organization’s overall strategy. Prepare a research paper on some of the various issues, protocols, methods, frameworks you found and discuss how – if possible – organizations can use ERM as strategy. It is perfectly acceptable if you deem ERM cannot be used as strategy, just back up your claim with scholarly research and justifications. 

No Text book you can get the content from google.

KPI's

Assignment Scenario: You are the web analytics professional for a Fortune 500 company and your company has a Facebook Business Page. You just received the KPI summary for the Facebook account activity. What are these numbers telling you, is the Facebook account working for your company? Please answer the following:

Review the Facebook Management Report located in the KPI Sample-Report.pdf (page 8) to answer this assignment.

Analyze the data from the Facebook Management Report.

Explain the metrics is your company doing well or not and why?

Should your company maintain the Facebook account and should anything be changed to boost Fan Posts?

Please submit a Word Doc with your answers, in 500 words or more, and use references in support of your answers. 

Assessment

inventory of door and window locks in your living area or place of work to identify areas of concern and improvement. Remember to get permission from security.

Instructions: Attached  Door and Window Lock Assessment template (MS Word), which is already in APA 7 format, using size 12 Times New Roman font, 1-inch margins, TOC, Headings and Reference page. If you insert images or tables in your report make sure you label them appropriately according to APA. Once completed name your file: YourName_Assignment_3_Door_and _Window_Lock_Assessment.docx and submit to the appropriate assignment folder. Also review any additional files attached for more information.