As a system analyst Design the decision table for the following cases Car Alnsurance Policy. Owner cars with AInsurance may or may not receive reimbursements for any accidents reported regarding their car, depending on a couple of factors. First of all, no charges are reimbursed to the owner until the deductible has been met. If the deductible has been met, then reimbursement depends on the type of accident: Light accidents are reimbursed at 50%, Severe accidents are reimbursed at 80%, and Mild accidents are reimbursed at 70%
Q: If each application is well tested on its own, there is no need for integration testing." Please…
A: Comment Section: Publishers who take the time to read and respond to reader feedback develop a…
Q: If you're designing an interface for the Internet of Things (IoT), how beneficial is unified user…
A: Encryption: User interface (UI) design, also known as user interface engineering design, is a…
Q: What is it that software engineering doesn't take into consideration in its foundational concepts?…
A: Encryption: First, let's define software engineering. It's been referred to as both software and…
Q: Using the C++ Switch Statement, write a program that will calculate a person's pay based on the…
A: //Code in C++ #include<iostream>#include<iomanip>using namespace std; int main() {int…
Q: If you're a Toyota analyst, compose a quick SWOT analysis including probable strengths, weaknesses,…
A: Given: If you work for Toyota, do a SWOT analysis of the company's prospective strengths,…
Q: Explain the following concepts: (a) intranet and extranet
A: Intranet: Intranet is basically termed as the private network that is contained in any particular…
Q: Question 3 What is y after the following switch statement? 0; int y = 0; switch (x + 1){ int x = %3D…
A: Value of y after switch condition
Q: What is the difference between shaping and planning?
A:
Q: Computer science What are the two most significant benefits of encrypting database data?
A: Introduction: What are the two most significant benefits of encrypting database data?
Q: Does having an integrated user experience (UX) in the context of SoS design help? There are a slew…
A: Cost-Effectiveness: A cost-effectiveness analysis may help identify areas where resources might be…
Q: What are the three phases that a software must go through when it uses a file?
A: Introduction: The files that make up a programming language
Q: What role does code indentation have in Python?
A: Intro the importance of code indentation in Python is given below:--
Q: By simply adding relevant properties, we may turn any weak entity set into a strong entity set. So…
A: Answer: We must first understand what a weak entity set is. Insufficient entity set definition:…
Q: There must be something fundamentally missing from the fundamentals of software engineering.…
A: Software engineering : Software engineering is described as evaluating user requirements before…
Q: "Integration testing is a waste of time," your boss says. Integration testing is unnecessary if each…
A: Introduction: Integration testing (sometimes known as integration and testing, or I&T) is a step…
Q: Fragments, Fragment Creation with Java Code discuss in detail
A: Intro A fragment is a reusable class executing a part of a movement. A Fragment ordinarily…
Q: Is it possible to provide instances of invasion of privacy and doxing in the real world?
A: Answer:
Q: Explain how you'l handle changes in the project's needs. Which software development life cycle model…
A: Let us look at the solution: Working in Agile-style two-week sprints and using a different approach…
Q: What exactly is the MEMS storage concept?
A: Given : What exactly is the MEMS storage concept?
Q: Draw a diagram to highlight testing with early test design using V-Model.
A:
Q: In the C++ compilation process, what are the most critical steps?
A: What exactly does compilation imply? Compilation is the process of translating human-written…
Q: What are the different parts of a typical Web application?
A: The following are the different components of a typical Web application: Client Side Database…
Q: The Mac OS, unlike most other PC operating systems, saves a major chunk of the operating system in…
A: Intro ROM: • ROM is "inherent" PC memory having data that regularly must be perused, not written…
Q: Explain why adaptors are typically needed when a system is constructed by merging several…
A: Software: A set of instructions, data, or programmes used to control computers and perform certain…
Q: In terms of SoS interface design, what are the benefits of a unified user interface (UX)? The…
A: In the interface design of Sops, a unified user interface is advantageous: The Advantages of a…
Q: To what extent does privacy matter when it comes to computer security? Whether you're a teenager or…
A: Digital privacy : Privacy is often defined as the ability to protect sensitive personal…
Q: hysical hard drives, but it reduces the hard drive's useable capacity. Do you want backup at the…
A: Strike represents Redundant Array of an Independent or Inexpensive Disks, and it is a storage…
Q: In the following array, Arr[O][2][1] is equal to |4 2 3 0 -3 9 11 3 13 4 56 3 5 9 3 5 23 12 23 2 5 1…
A: Find the required answer with explanation given as below :
Q: When building the SoS interface, how vital is it to maintain a consistent user experience? A single…
A: It is critical to be consistent in providing UX User eXperience because everyone enjoys being…
Q: Explain three strategies for optimising audio files for the web in a nutshell.
A: Introduction: Basic sound editing is used to remove extraneous recording takes as well as artefacts…
Q: How can a PHP application make a file upload to a server, such as Google Drive, faster? What changes…
A: Introduction: Examine your video files and the sizes of those files.When it comes to enormous files,…
Q: Compare and contrast the numerous challenges that arise when designers attempt to elicit demands for…
A: Iterative design is a simple concept: After determining a user's need and producing ideas to meet…
Q: Explain what a consensus protocol is and how it solves an issue.
A: Introduction: Blockchain, a distributed decentralised network, is characterised by its immutability,…
Q: What are the advantages of using Java encapsulation?
A: Intro Encapsulation The process of enclosing data in a single unit is known as encapsulation. It is…
Q: What might a business case for cloud migration look like?
A: Introduction: In the process of developing a business case, we are eventually pushing a…
Q: ease, can you help me with this question? Please, can you provide any examples? How does AJAX work…
A: Lets see the solution.
Q: A hospital wishes to maintain database of all the doctors and the patients in the hospital. For each…
A: We need to create a simple hospital management system as per the given scenario.
Q: Computer science What is it about capacitors that distinguishes them?
A: Introduction: What is it about capacitors that distinguishes them?
Q: Your data warehouse project team is debating whether to develop a prototype before going live.…
A: Introduction:- I would suggest making a Prototype. Data warehouses can be costly and time-consuming…
Q: What methods are there for reducing the overhead imposed by page table shadowing?
A: About approaches may be utilized to decrease the overhead caused by page table shadowing
Q: “Integration testing is pointless,” your boss stated. Not required if each programme is sufficiently…
A: Software testing: Three layers of testing are often conducted in software testing. Unit testing…
Q: If we want to build an LMS portal, what type of system development life cycle should we use?
A: An LMS portal may be used by administrators: and content providers to create, distribute, and manage…
Q: Give two instances of an ALM environment and describe what it does.
A: Humans, tools, and procedures that govern the life cycle of an application from inception to end of…
Q: Computer science List and describe the many types of search engines.
A: Introduction: Search engines assist users in finding and accessing information on the Internet.…
Q: Specifically, what are the essential software engineering ideas missing? explain?
A: what are the essential software engineering ideas missing? explain?
Q: Identify one of the services/ports that you enumerated on the MS2 box and exploit it to obtain a…
A: Connect to the port and send the commands to the server. The services that expose the port are: ssh,…
Q: Why should general-purpose programs not be written in assembly language? In what circumstances do…
A: Assembly language is not used in the creation of general purpose applications because of the…
Q: Given a page of HTML, you can add spans around some specific terms on the page. When the script is…
A: <TABLE border = 2><TR><TD><TABLE border =…
Q: Explain how you'l handle changes in the project's needs. Which software development life cycle model…
A: Agile Model Agile is defined as quick or adaptable.A software development approach based on…
Q: What are the fundamental concepts of software engineering missing here? explain?
A: A surrogate key, also known as a synthetic primary key, is created when a database automatically…
As a
Step by step
Solved in 2 steps with 1 images
- After merging all the Colleges in University of Technology and Applied Sciences (UTAS) the course registration process is as follows: A student may register for classes during a specified registration period. To register, a student must see their advisor. The advisor must approve each course that the student has selected. The advisor will use the registration system to determine if the student has met the course prerequisites, is in good academic standings and is eligible to register. If the advisor approves the courses, the advisor enters the student's college id into the course registration system. The course registration number for each course is entered. The course description, course number and section for those courses will automatically display. The system will check for schedule conflicts before saving the registrations. A bill for the courses will print in the Bursar's office. The student should proceed to pick it up. A)ldentify the nouns that are used to identify the…Question 1: Case Description INU Printing Press, a part of a university undertakes printing jobs from different departments of the University. The press can take printing-related orders from other organizations or individuals also, but this is a rare practice. Orders once placed cannot be canceled. Any financial transactions of the various departments with the printing press are done through the University Office only. The University Office maintains the accounts of the press and the various departments of the University. The press acquires its inventory from outside suppliers. This is done by accepting the quotations from various suppliers and placing orders respectively. They maintain information of vendors/suppliers for the raw materials. A supplier can supply more than one item and an item can be supplied by more than one supplier. The supplier may supply the item in parts. Stock for a particular item can be acquired more than once a year. The suppliers send two copies of the…Question 1: Case Description INU Printing Press, a part of a university undertakes printing jobs from different departments of the University. The press can take printing related orders from other organizations or individuals also, but this is a rare practice. Orders once placed cannot be canceled. Any financial transactions of the various departments with the printing press are done through the University Office only. The University Office maintains the accounts of the press and the various departments of the University. The press acquires its inventory from outside suppliers. This is done by accepting the quotations from various suppliers and placing orders respectively. They maintain information of vendors / suppliers for the raw materials. A supplier can supply more than one item and an item can be supplied by more than one supplier. The supplier may supply the item in parts. Stock for a particular item can be acquired more than once in a year. The suppliers send two copies of…
- After merging all the Colleges in University of Technology and Applied Sciences (UTAS) the course registration process is as follows: A student may register for classes during a specified registration period. To register, a student must see their advisor. The advisor must approve each course that the student has selected. The advisor will use the registration system to determine if the student has met the course prerequisites, is in good academic standings and is eligible to register. If the advisor approves the courses, the advisor enters the student's college id into the course registration system. The course registration number for each course is entered. The course description, course number and section for those courses will automatically display. The system will check for schedule conflicts before saving the registrations. A bill for the courses will print in the Bursar's office. The student should proceed to pick it up. b)Draw a class diagrams which represents the generic…Asset valuation is the process of determining the fair market value of an asset, which is one of the first priorities of risk management. The asset value can be determined from the asset replacement value (how much does it cost to replace it) or what the asset provides to the organization (how much dollar value does the organization get from having the asset). The value can also be determined using a combination of both values. Are personnel assets (employees, vendors, etc) or data assets (business information, databases, financial records, etc) more difficult to quantify? Why?Recruitment Policy in UEM Group Bhd UEM Group Bhd has re-evaluated their recruitment policy for future applications. Their evaluations are based on the following conditions and actions. If the applicant has a Bachelor Degree's scroll and transcript, then recruit otherwise not. If the student is from Computer Science, place the student in the Information Technology Department. Students who are from non-computer science will be placed in Business Development department. If the student is from Computer Science and having experience equal to or greater than three years, the company will appoint them as team leader. Meanwhile, if their experience less than that, the management will take them as team member. The management had decided to make them as management trainee if the students are recruited from non-computer science who having experience less than three years, otherwise they will be a supervisor. a) Construct decision table based on scenario given.
- A company has various rules for how payments to suppliers are to be authorized.Some payments are in response to an approved purchase order. For approved purchase orders under $5,000, the accountingclerk can immediately issue a check againstthat purchase order and sign the check. Forapproved purchase orders between $5,000and $10,000, the accounting clerk can immediately issue a check but must additionallyobtain a second signature. Payments for approved purchase orders over $10,000 alwaysrequire the approval of the accounting manager to issue the check as well as the signature of two accounting clerks. Payments thatare not covered by a purchase order that areunder $5,000 must be approved by the accounting manager and a departmental manager who will absorb the cost of the paymentinto that department’s budget. Such checkscan be signed by a single accounting clerk.Payments that are not covered by a purchaseorder that are between $5,000 and $10,000must be approved by the accounting…Luxury-Oriented Scenic Tours (LOST) provides guided tours to groups of visitors to the Washington, D.C. area. In recent years, LOST has grown quickly and is having difficulty keeping up with all of the various information needs of the company. The company's operations are as follows: LOST offers many different tours. For each tour, the tour name, approximate length (in hours), and fee charged is needed. Guides are identified by an employee ID, but the system should also record a guide's name, home address, and date of hire. Guides take a test to be qualified to lead specific tours. It is important to know which guides are qualified to lead which tours and the date that they completed the qualification test for each tour. A guide may be qualified to lead many different tours. A tour can have many different qualified guides. New guides may or may not be qualified to lead any tours, just as a new tour may or may not have any qualified guides. Every tour must be designed to visit at least…Chapter 4 Requirements Model Case Study – Personal Trainer Personal Trainer, Inc. Fact-Finding Summary A typical center has 300-500 members, with two membership levels: full and limited. Full members have access to all activities. Limited members are restricted to activities they have selected, but they can participate in other activities by paying a usage fee. All members have charge privileges. Charges for merchandise and services are recorded on a charge slip, which is signed by the member. At the end of each day, cash sales and charges are entered into the BumbleBee accounting software, which runs on a computer workstation at each location. Daily cash receipts are deposited in a local bank and credited to the corporate Personal Trainer account. The BumbleBee program produces a daily activity report with a listing of all sales transactions. At the end of the month, the local manager uses BumbleBee to transmit an accounts receivable summary to the Personal Trainer headquarters…
- When a customer contacts the company to ask for an estimate, the proprietormakes a note of the customer’s contact details and an outline of the proposedwork. He agrees a date with the customer to view the property in order to givean estimate of the cost for the work. When visiting the property on the agreeddate the proprietor adds more detail to the outline of the proposed work. Within3 days of visiting the property the proprietor produces a fully detailed estimateand sends it to the customer. If the customer agrees the estimate, the proprietorschedules a date to start the job (this is based on the size of the job and otherjobs that have already been scheduled).A few days before the agreed start date of a job, the proprietor contacts thecustomer to confirm the start date, and then orders the required buildingmaterials from suppliers to be delivered on the date the job starts. At theend/completion of the job the proprietor calculates the actual cost of the job toproduce an invoice which…Case 1: As a consulting engineer you were asked to monitor a water supply project financed by an NGO and handled by local water users committee at Natore district. The project must be completed by the end of December 2020; otherwise the donor would stop the payment. When you visited the site at the middle of May 2020, you found that the project was not completed. The users committee requested to submit the completion report so that they could finish the work after some time and will be beneficial to 100 household of the project. Answer the following questions.Question: 3) Discuss different options for the engineer in reporting the project progress status, considering personal integrity.Create a UML Use Case Diagram for the following scenario: Scenario: CDM - Cash Deposit Machine User can do different types of transactions named withdraw, transfer or deposit cash at the CDM in association with the bank.In every transaction type, the system will validate the user.During the withdraw, insufficient funds notification may arises.Staff fills the CDM. he needs to shut down the system during filling.