Application Development using Object Oriented Paradigm: A Case Study

Problem Statement:

A transportation company operates individual taxis and shuttles. It uses its taxis for transporting in the form of an individual or small group from one location to another. On the other hand, the shuttles have different scenario. They are used to pick up individuals from separate locations and provide them conveyance to several destinations. Any individual can call the company form anywhere. It may be a hotel, a mall, entertainment venue or any tourist company. When the company receives a call from such individuals, it tries schedule any available taxi for pickup service for a fare. If it has no free vehicles, it does not operate any form of queuing system. If the vehicles are available, then it confirms the individual for pick-up. After arrival at the pick-up place the driver notify the company that it has picked up the passenger. The driver notifies the company again at the time of dropping him off at his destination.

The company is now intending to have expansion in its volume. It thinks that this expansion will be vital to get more profit. For this purpose it needs more vehicles in addition to the existing ones. The company is willing to record details of lost fares and details of how each vehicle passes its time. These issues will help assess potential profitability.

Keeping the above mentioned problem statement, explain the following 5 steps in detail

  1. You need to discover all the classes from problem statement.[1 mark for discovering the classes from the problem statement given]
  2. Find out the methods associated with all the classes.[2 marks for the methods associated with the classes from the verbs of the problem statement]
  3. Create the CRC cards for all the classes found from the problem statement.[1 marks for creating all scenarios of CRC ]
  4. Create a Class relationship diagram using UML symbols [2 marks for creating the class relationship diagram using UML notations].
  5. As a final step Design (outline) classes and interfaces that have been discovered in the initial design phase [1 mark for outlining the classes and interface.]
  6. Give complete java programming implementation for at least two classes that were found in design phase. You must mention their most probable instance variables and methods. [2×1.5=3 marks]

Continuing professional development in Database

Below is the Complete Question : 

– Present how you understand and recognize the need for and engage in continuing professional development in Database.

– Write a 2 pages to demonstrate how you learn independently and/or collaboratively by exploring new trends, issues, and developments in the field. 

Discussion And Reflections(Essary)- W8

Discussion 

How will VEEM impact payment systems and global commerce?

500 words

APA with proper citation

Introduction

Body

Conclusion

Due date – tomorrow Oct 12th, 2020. 

Reflection which is an essay with 5-page paper (APA style)

Submit a 5-page paper (APA style) and accompanying presentation with recorded audio (PowerPoint) that addresses how VEEM and Blockchain will transform global marketing.

Final Project is an essay assignment. 

Final Project is due by Tuesday before Oct 13th 2020 11:59 PM EST.

Reflection Two (R2) is an essay assignment. 

1- Introduction

2- All the body part with proper, I mean point wise

3- Conclusion 

4- References with proper citation. 

Read:

Watch:

Discussion

 

  • How does network cost of ownership (aka real TCO) differ from total cost of ownership? 
  • Which is the most useful measure of network costs from the point of view of the network manager? Why?

Questions

 1. Cloud Computing usage for Ecommerce developer (500 words)

In a Word document, write a paper describing how the knowledge, skills, or theories of Cloud Computing have been applied or could be applied, in a practical manner to your current work environment. If you are not currently working, share how you could leverage the knowledge gained working as an IT consultant working for an organization of your choice.

Requirements

  • The reflection paper should be 2pages in length 
  • Page count does not include title and reference pages
  • The paper should include a title page and reference page
  • Correct use of APA 7th edition guidelines is required
  • Save as a Word document (not Pdf)

2.  4 pages (Please Find Attached For this Question)

This week’s journal article focus on the how positive team culture can correct the impact of lagging leadership creativity. Additionally, we discussed how digital transformation leaders in regard to artificial intelligence (AI).  After reviewing the reading, please answer the following questions:

  1. What is your definition of AI?  Please explain.
  2. What is your opinion of AI, is the technology currently available? Why or why not?
  3. Please note at least four AI technologies, explain if they are truly AI or something else.  Thoroughly explain your answer.
  4. How is AI perceived as different in various industries and locations? Please explain

Data Recovery

 Use the web or other resources to research at least two criminal or civil cases in which  recovered files played a significant role in how the case was resolved. 

ns-p-11

  • 11.1 List and briefly define three classes of intruders.
  • 11.2 What are two common techniques used to protect a password file?
  • 11.3 What are three benefits that can be provided by an intrusion detection system?
  • 11.4 What is the difference between statistical anomaly detection and rule-based intrusion detection?
  • 11.5 What metrics are useful for profile-based intrusion detection?
  • 11.6 What is the difference between rule-based anomaly detection and rule-based penetration identification?
  • 11.7 What is a honeypot?
  • 11.8 What is a salt in the context of UNIX password management?
  • 11.9 List and briefly define four techniques used to avoid guessable passwords

Digital Forensics

  

  1. To what extent are there significant      differences between Computer Intrusion attack and Social Engineering      attack on individuals, private and public organizations?

Social engineering attacks are underhanded, labeled as non-technical threats to any organization but require well-structured protective measures to decrease ongoing large-scale confrontation by criminals. As you may be aware, perpetrators often adopt self-assurance tricks, exploiting naivety, lethargy, and good nature of authorized users to launch social engineering attacks on organizations’ main file servers. 

Journal Article Review

 Critical review of the Journal Article: “Ontologies describing concepts and relations in a specific domain are necessary for knowledge representation and knowledge exchange. Waterson and Preece define ontology as “he Specification of Shared Knowledge”. Ontologies (semantic data) facilitate the usability of e-technology and realize its full power. here are several Languages, Tools and Formalisms that accompany the term ontology. Among those languages, we enumerate XML (Extensible Markup Language), RDF (Resource Description Framework), RDFS (RDF Schema), DAML+OIL and OWL that are used in several contexts (compatibility with other concepts, expressiveness, etc.). Moreover, there exist several ontology formalisms with a definite advantages and drawbacks, which support particular features. Ontologies should be created for a specific function in the most appropriate formalism satisfying needs of a fine target community.” (Slimani 2015) 

 (PDF) Ontology Development: A Comparing Study on Tools, Languages and Formalisms (researchgate.net) 

Critically review various toolsets used in the design and development of ontology for various scenarios. Document your review in maximum 800 words. You may also refer to any other research articles for more information. Proper citations and referencing must be provided in CU Harvard style. Key findings may include (but not limited to):  Introduction to ontology  Application areas  Explanation with one example

Apply the knowledge gained from the previous section and discuss the role of ontology in Web Development. Further discuss various Semantic Heterogeneity issues on Web