The document is a travel writing from imperial China translated and annotated by Richard E. Strassberg. It contains an introduction to Fan Chung-yen, a Chinese scholar and official from the 11th century who wrote travel accounts during his service in northern China defending against the Hsi-Hsia Kingdom and negotiating a peace treaty between the two countries. The introduction provides biographical details of Fan Chung-yen's career and accomplishments.
Pandora FMS: End to End Exchange PluginPandora FMS
This plugin monitors the correct working of the Exchange mail system from the client point of view. For more information visit the following webpage: http://pandorafms.com/index.php?sec=Library&sec2=repository&lng=en&action=view_PUI&id_PUI=573
This is chapter 5 of ISTQB Specialist Performance Tester certification. This presentation helps aspirants understand and prepare the content of the certification.
Software Requirements ElicitationRequirements specify a set of f.docxwhitneyleman54422
Software Requirements Elicitation
Requirements specify a set of functions a software development project must deliver. Functional requirements define system capabilities, for example, “The system shall permit users to inquire about Berta’s Pizzeria menu via an email message.” Additionally requirements specify non-functional standards that the system must operate within. Examples of non-functional requirements are performance, quality, safety, security, and interface requirements. An example of a performance requirement is, “The system shall have the ability to process 1MB/sec of input.” An example of a quality requirement is, “The MTBF (mean time between failures) shall be greater than 90 days.”
The iterative and incremental development processes of agile methods permit frequent changes to requirements and documentation. Early requirements analysis is required only for features developed in early iterations. Scrum and XP are agile methods that facilitate requirements gathering flexibility. Agile methods require direct involvement of the end-user though-out the software lifecycle. The requirement elicitation differs depending on the agile methodology used. The Unified Process (UP) creates use cases as requirements. Scrum records initial requirements in the form of a product backlog and prioritises them. Extreme Programming (XP) derives user stories and organizes them on a corkboard, or storyboard into deliverables for each iteration.
Requirements elicitation is considered the most difficult part of a development project. The Importance of identifying correct requirements is valuable to the both software developer and the customer. Systems delivered according to incorrect or inadequate requirements may be disparaging to the development organization and disappointing and wasteful to the client. Difficulties with requirements elicitation and analysis include:
1. lack of domain knowledge by the development team
2. Users are not knowledgeable of software capabilities
3. A communication disconnect between the users and the development team
4. Stakeholders cannot definitively specify the requirements
5. Stakeholders underestimate the importance of requirements gathering
6. Nonfunctional requirements are not addressed
7. Stakeholders alter the requirements during the software lifecycle
Requirements elicitation steps include:
1. collection of application information
2. optionally building analysis models
3. developing requirements and constraints
4. feasibility study
5. requirements specification review
The collection of application information involves inquiries about internal and external influences on the business environment, policies, regulations, business goals, and standards. Analysis models may be constructed to understand the business processes and objectives. The customer or user plays a critical role in driving and prioritizing requirements to satisfy the business needs. When the practicability of implementing particular requirements is in q.
Cyber terrorism, by definition, is the politically motivated use.docxdorishigh
Cyber terrorism, by definition, is the politically motivated use of computers and information technology to cause severe disruption or widespread fear in society. The Center for Strategic and International Studies reported in March 2019 that Chinese Hackers targeted at least 27 Universities to steal Naval Technologies research, being one of many cyber-terrorist attacks. Besides these attacks, Hacktivism is a cyber-attack either by legal or illegal digital means in the pursuit of political ends, free speech, and the right of free speech. A most notable example would be the group Anonymous conducting numerous hacks from 2008 to 2012 against companies, organizations, and even governments that go against their moral codes. Behind the Tunisia Operation in 2010, Anonymous took down eight government websites with DDOS (Distributed Denial of Service) attacks in support of Arab Spring movements. Between the two Cyberterrorism is meant to instill fear and panic in society. At the same time, Hacktivism brings about a voice or an opposition to the government and other organizations to support a cause against them. Hacktivism is more politically based, pointing out flaws in the system raising awareness on our rights as human beings. Advances in technology lead to newer and different types of attacks either group can conduct. From viruses waiting for you to log into your bank account to massive-scale attacks against the banks' systems themselves, terrorists, or hacktivists, have infinite ways to infiltrate and attack for their cause. Many laws have been put in place to combat these groups, acts put in place such as Cybersecurity Information Sharing Act (CISA) or Cybersecurity Enhancement Act of 2014 helping share information and build research and development to fight against cyber-attacks. Given the push against both groups by our government, I can't help but feel concern for our rights and freedoms that may be infringed upon that our government or some corporation is doing while combating the whistleblower with Hacktivist tactics. It only keeps me and others mindful while fighting against cyberattacks that may be classified as cyberterrorism. There is a fine line on what would be a genuine noble act of hacking or something labeled as cyberterrorism placing information and lives at risk, its not so black and white as some areas can be considered grey. Thankfully some events in history, thanks to Hacktivism has brought good results that benefit society, such as Operation "Nice" which organized to hunt down the terrorist responsible for attacks in the French city, killing nearly a hundred people. Also, Operation Darknet which infiltrated 40 child pornography websites publishing 1500 plus names of frequent visitors to the sites stopping such activity. In these instances, I am for hacktivism and specific groups that act for the benefit of society and our rights as humans.
Cyberterrorism. (n.d.). Retrieved from
https://www.dictionary.com/browse/cyberterroris.
More Related Content
Similar to cuACS Requirements Analysis Document Nicholas Aubé.docx
Pandora FMS: End to End Exchange PluginPandora FMS
This plugin monitors the correct working of the Exchange mail system from the client point of view. For more information visit the following webpage: http://pandorafms.com/index.php?sec=Library&sec2=repository&lng=en&action=view_PUI&id_PUI=573
This is chapter 5 of ISTQB Specialist Performance Tester certification. This presentation helps aspirants understand and prepare the content of the certification.
Software Requirements ElicitationRequirements specify a set of f.docxwhitneyleman54422
Software Requirements Elicitation
Requirements specify a set of functions a software development project must deliver. Functional requirements define system capabilities, for example, “The system shall permit users to inquire about Berta’s Pizzeria menu via an email message.” Additionally requirements specify non-functional standards that the system must operate within. Examples of non-functional requirements are performance, quality, safety, security, and interface requirements. An example of a performance requirement is, “The system shall have the ability to process 1MB/sec of input.” An example of a quality requirement is, “The MTBF (mean time between failures) shall be greater than 90 days.”
The iterative and incremental development processes of agile methods permit frequent changes to requirements and documentation. Early requirements analysis is required only for features developed in early iterations. Scrum and XP are agile methods that facilitate requirements gathering flexibility. Agile methods require direct involvement of the end-user though-out the software lifecycle. The requirement elicitation differs depending on the agile methodology used. The Unified Process (UP) creates use cases as requirements. Scrum records initial requirements in the form of a product backlog and prioritises them. Extreme Programming (XP) derives user stories and organizes them on a corkboard, or storyboard into deliverables for each iteration.
Requirements elicitation is considered the most difficult part of a development project. The Importance of identifying correct requirements is valuable to the both software developer and the customer. Systems delivered according to incorrect or inadequate requirements may be disparaging to the development organization and disappointing and wasteful to the client. Difficulties with requirements elicitation and analysis include:
1. lack of domain knowledge by the development team
2. Users are not knowledgeable of software capabilities
3. A communication disconnect between the users and the development team
4. Stakeholders cannot definitively specify the requirements
5. Stakeholders underestimate the importance of requirements gathering
6. Nonfunctional requirements are not addressed
7. Stakeholders alter the requirements during the software lifecycle
Requirements elicitation steps include:
1. collection of application information
2. optionally building analysis models
3. developing requirements and constraints
4. feasibility study
5. requirements specification review
The collection of application information involves inquiries about internal and external influences on the business environment, policies, regulations, business goals, and standards. Analysis models may be constructed to understand the business processes and objectives. The customer or user plays a critical role in driving and prioritizing requirements to satisfy the business needs. When the practicability of implementing particular requirements is in q.
Cyber terrorism, by definition, is the politically motivated use.docxdorishigh
Cyber terrorism, by definition, is the politically motivated use of computers and information technology to cause severe disruption or widespread fear in society. The Center for Strategic and International Studies reported in March 2019 that Chinese Hackers targeted at least 27 Universities to steal Naval Technologies research, being one of many cyber-terrorist attacks. Besides these attacks, Hacktivism is a cyber-attack either by legal or illegal digital means in the pursuit of political ends, free speech, and the right of free speech. A most notable example would be the group Anonymous conducting numerous hacks from 2008 to 2012 against companies, organizations, and even governments that go against their moral codes. Behind the Tunisia Operation in 2010, Anonymous took down eight government websites with DDOS (Distributed Denial of Service) attacks in support of Arab Spring movements. Between the two Cyberterrorism is meant to instill fear and panic in society. At the same time, Hacktivism brings about a voice or an opposition to the government and other organizations to support a cause against them. Hacktivism is more politically based, pointing out flaws in the system raising awareness on our rights as human beings. Advances in technology lead to newer and different types of attacks either group can conduct. From viruses waiting for you to log into your bank account to massive-scale attacks against the banks' systems themselves, terrorists, or hacktivists, have infinite ways to infiltrate and attack for their cause. Many laws have been put in place to combat these groups, acts put in place such as Cybersecurity Information Sharing Act (CISA) or Cybersecurity Enhancement Act of 2014 helping share information and build research and development to fight against cyber-attacks. Given the push against both groups by our government, I can't help but feel concern for our rights and freedoms that may be infringed upon that our government or some corporation is doing while combating the whistleblower with Hacktivist tactics. It only keeps me and others mindful while fighting against cyberattacks that may be classified as cyberterrorism. There is a fine line on what would be a genuine noble act of hacking or something labeled as cyberterrorism placing information and lives at risk, its not so black and white as some areas can be considered grey. Thankfully some events in history, thanks to Hacktivism has brought good results that benefit society, such as Operation "Nice" which organized to hunt down the terrorist responsible for attacks in the French city, killing nearly a hundred people. Also, Operation Darknet which infiltrated 40 child pornography websites publishing 1500 plus names of frequent visitors to the sites stopping such activity. In these instances, I am for hacktivism and specific groups that act for the benefit of society and our rights as humans.
Cyberterrorism. (n.d.). Retrieved from
https://www.dictionary.com/browse/cyberterroris.
Cyber Security Threats
Yassir Nour
Dr. Fonda Ingram
ETCS-690
Cybersecurity Research Seminar
Date: 02/08/2019
1. Denial-of-Service (DoS) Attacks
A denial-of-service (DoS) is any kind of assault where the assailants (programmers) endeavor to keep real clients from getting to the service.
Programmer sends undesirable high volumes of traffic through the system until it ends up stacked and can never again work.
https://www.incapsula.com/ddos/ddos-attacks/denial-of-service.html
2
Company and summary of how the threat affected the firm
Deezer, an online music streaming service, says it was affected by a vast scale DDoS assault on June 7 through a botnet, which brought about the organization's site being down for a few hours.
https://www.theguardian.com/technology/2014/jun/10/deezer-user-data-hack-attack-ddos
3
Possible
Solution
s
These threats could been avoided by:
Reinforcing the security frameworks and servers
WAFs (Web Application Firewalls) are an incredible instrument to use against these assaults as they give you more command over your web traffic while perceiving malicious web misuses.
2. Malware
A malware assault is a sort of cyber-attack in which malware or malicious programming performs exercises on the unfortunate casualty's PC system, more often than not without his/her insight.
In straightforward words, it is a code with the expectation to takes information or obliterates something on the PC.
https://us.norton.com/internetsecurity-malware.html
5
Company and summary of how the threat affected the firm
Onslow Water and Sewer Authority (OWASA) on October 15, 2018, was assaulted by Ryuk ransomware making huge harm to the association's system and brought about various databases and systems being modified starting from the group up.
The ransomware corrupted vast quantities of endpoints and requested higher payments than what we ordinarily observe (15 to 50 Bitcoins).
https://blog.malwarebytes.com/cybercrime/malware/2019/01/ryuk-ransomware-attacks-businesses-over-the-holidays/
6
Possible
.
Cyber Security in Industry 4.0Cyber Security in Industry 4.0 (.docxdorishigh
Cyber Security in Industry 4.0
Cyber Security in Industry 4.0 (IEEE) Using Emerging Technology to Improve Compliance As cyber threats, malicious software, and cyber-attacks continue to escalate in sophistication, and no industry can remain immune to these threats. The IEEE has used industry-inspired advances in innovation and implementation to promote the highest level of cybersecurity standards for the most robustly protected information and communication technology infrastructure, from networks and telecommunication systems through websites, digital certificates, and passwords, and other software-based systems (Ardito et al., 2019). This Enhanced Canada Cybersecurity Standards and Certificates (ECCS&C) project strives to provide a common framework for enhanced cybersecurity across all sectors. The fourth industrial revolution is referred to as cybersecurity in Industry 4.0 and is encompassing three discrete components: machine learning, artificial intelligence, and automation.The effects of these four technologies will most certainly impact the processes and processes aspects of technology adoption. Over the next decade, we will most certainly see further and the further rise of robotics (Ardito et al., 2019).
The industrial revolution will begin with smart factory security systems. For now, those systems are secure, but many manufacturers will soon provide safeguards against attack and malware threats to help prevent malware attacks and lawsuits. The processes can look simple like a boiler next to a giant hexagon. For example, all these processes would trigger heating or cooling at some point, and the heating or cooling can be controlled by digital control boxes connected to a smart grid (Shi et al., 2019).
The industrial network will soon have more people connected in more complex networks, such as industrial warehouses. All of these buildings can communicate with each other and can remotely activate or deactivate automation systems to reduce manufacturing costs. The need for the defense, control, and monitoring of systems and networks. The blockchain is the most viable platform for these purposes (Shi et al., 2019). Decentralization is gaining respect and confidence on a global scale, and so there is a renewed emphasis on the blockchain in the industry. There is an abundance of articles on the blockchain's potential and benefits for companies. For example, more than fifty articles are covering the blockchain's potential for authentication, threat modeling, and development of social payment interfaces. Companies are beginning to explore smart contracts and smart systems for security, reputation, and data. All in all, it seems that all the evidence points to blockchain technology as the future of the financial industry (Shi et al., 2019).
References
Ardito, L., Petruzzelli, A. M., Panniello, U., & Garavelli, A. C. (2019). Towards Industry 4.0. Business Process Management Journal.
Shi, L., Chen, X., Wen, S., & Xiang, Y. (2019, December)..
Cyber Security Gone too farCarlos Diego LimaExce.docxdorishigh
Cyber Security Gone too far
Carlos Diego Lima
Excelsior College
BNS301 National Security Ethics and Diversity
How far is it too far when protecting the peoples' rights in cyberspace and its national security? In an ever-evolving cyber world, many states tend to infringe on citizens' cyber information privacy for their own accord. Sometimes governments overstep boundaries and bend the rules to protect the land and overstep the peoples' privacy to enforce rules and regulations. My final paper will analyze rules and regulations within the Cybersecurity realm within the United States. The National Security Strategy is a good guideline on the laws and what the U.S is looking to implement soon. This paper intends not to make conspiracy theories to show facts and existing laws and regulations on how the citizens' privacy has no longer been protected and some examples of historical events. (Snowden) had an ethical dilemma when he made his decisions. My paper will include my opinions and the bullet points below to construct a good argument on how the U.S can protect its citizens' privacy.
· National Security Strategy
· Cyber laws within the United States
· Privacy Laws
· Phone settings
· Phone Companies and laws sharing information to the government
· Internal agencies search and espionage laws
Edgar, T. H. (2017). Beyond Snowden privacy, mass surveillance, and the struggle to reform the NSA. Washington, D.C: Brookings Institution Press.
J., T. P., & Upton, D. (2016). Cyber security culture: Counteracting cyber threats through organizational learning and training. Routledge.
Miloshoska, D., & Smilkovski, I. (2016).
Http://uklo.edu.mk/filemanager/HORIZONTI 2017/Horizonti serija A volume 19/14. Security and trade facilitation - the evidence from Macedonia- Milososka, Smilkovski.pdf.
HORIZONS.A, 19, 153-163. doi:10.20544/horizons.a.19.1.16.p14
Omand, D. (2018). Principled Spying: The Ethics of Secret Intelligence. Georgetown University Pre Omand, D. (2018). Principled Spying: The Ethics of Secret Intelligence. Georgetown University Press.
Zimmerman, R. (2015). The Department of Homeland Security: Assessment, recommendations, and appropriations. New York: Nova.
Running Head: METHODS, RESULTS AND DISCUSSION 1
METHODS, RESULTS AND DISCUSSION
Kaytlin De Los Santos
Florida International University
METHODS, RESULTS AND DISCUSSION 2
Methods, Results and Discussion
Methods
Participants
One hundred and thirty-nine participants were randomly selected and requested to fill a
questionnaire during the study. Every one of the 48 researchers looked for about 3 participants
each who were strangers to them or students at FIU. The participants needed to have not taken a
psychology research methods class in the fall of 2019.
Male participants for the study were 53 which accounted 38.1% while female participants
were 86 which accounted for 61.9% of the total number of particip.
CW 1R Checklist and Feedback Sheet Student Copy Go through this.docxdorishigh
CW 1R Checklist and Feedback Sheet: Student Copy
Go through this checklist before you submit your CW 1R assessment. You can also use this sheet to make notes on your tutor’s feedback in the following areas. This information will be essential when you are improving your draft.
Tutor’s comments
Part 3
Is your referencing complete and accurate?
Part 1
Have you evaluated the required number of sources?
Have you included all the sources in your evaluation in your list?
Is it clear how you have identified your sources as reliable and appropriate for academic use? Have you considered a number of aspects eg. currency, authority, etc?
Are your sources all clearly relevant to your topic?
Have you explained the key points or identified useful data from each source? Have you explained points in your own words?
Have you noted how you will use the source in your essay? Will it support a point / provide data / offer a counter-argument?
Have you identified the relationship between the information you have read? Do articles support an argument presented in another source? Provide additional information? Offer an alternative view?
Part 2
Have you included all your sources in part 2 in your outline?
Is your introduction clear? Have you included: the background /context for your essay? An overview of the essay structure?
Is your position clear?
Does your position relate to the main body of the essay? Do all your points relate to your position?
Is the development of your argument logical throughout your outline? Do any paragraphs seem repetitive / irrelevant or out of place?
For each paragraph
Is it clear how each paragraph develops your argument?
Does each paragraph focus and develop one key point?
Is the topic sentence clear?
Do the supporting points develop the topic sentence?
Is there clear evidence / data to support your points?
Are citations included for the support you will use?
Have you used more than one source for each paragraph?
Conclusion
Does your conclusion effectively answer your question?
1
BERNICE BOBS HER HAIR
by
F. Scott Fitzgerald
After dark on Saturday night one could stand on the first tee
of the golf-course and see the country-club windows as a
yellow expanse over a very black and wavy ocean. The
waves of this ocean, so to speak, were the heads of many
curious caddies, a few of the more ingenious chauffeurs, the
golf professional's deaf sister--and there were usually several
stray, diffident waves who might have rolled inside had they
so desired. This was the gallery.
The balcony was inside. It consisted of the circle of wicker
chairs that lined the wall of the combination clubroom and
ballroom. At these Saturday-night dances it was largely
feminine; a great babel of middle-aged ladies with sharp eyes
and icy hearts behind lorgnettes and large bosoms. The main
function of the balcony was critical. It occasionally showed
grudging admira.
CW 1 Car Industry and AIby Victoria StephensonSubmission.docxdorishigh
CW 1 Car Industry and AI
by Victoria Stephenson
Submission date: 03-Jan-2020 12:53PM (UTC+0000)
Submission ID: 1239134764
File name: 14900_Victoria_Stephenson_CW_1_Car_Industry_and_AI_278016_1651532176.docx (39.1K)
Word count: 2448
Character count: 13114
Overall structure looks clear, but what is the main focus of paragraph
5?
Non-academic source
Referencing error
Good point /
s
Pt 1. Search method
issue 1
This is not the title of the article - it is 'Driving Tests Coming for Autonomous Cars'. Make sure your referencing
is accurate.
Pt 1. Search method
issue
This article does not come up on a Google Scholar
search.
G
oo
d
so
ur
ce
s
el
ec
tio
n
R
ef
er
en
ci
ng
e
rr
or
P
t 2
. C
le
ar
s
ou
rc
e
ev
al
ua
tio
n
G
oo
d
po
in
t /
s
P
t 2
. G
oo
d,
c
le
ar
in
di
ca
tio
n
of
h
ow
s
ou
rc
e
w
ill
b
e
us
ed
.
2
P
t 2
. G
oo
d,
c
le
ar
s
up
po
rt
pr
ov
id
ed
G
oo
d
so
ur
ce
s
el
ec
tio
n
P
t 2
. C
le
ar
s
ou
rc
e
ev
al
ua
tio
n
P
t 2
. G
oo
d,
c
le
ar
in
di
ca
tio
n
of
h
ow
s
ou
rc
e
w
ill
b
e
us
ed
.
P
t 2
. G
oo
d,
c
le
ar
po
in
t
P
t 2
. G
oo
d,
c
le
ar
s
up
po
rt
pr
ov
id
ed
Good point /
s
QM
QM
FINAL GRADE
60/100
CW 1 Car Industry and AI
GRADEMARK REPORT
GENERAL COMMENTS
Instructor
Source Selection: 6 (One merit criteria met; two of the
sources are less academic)
Source Evaluation and Use of Sources: 7 (Both Merit
criteria met)
Processing Text: 6.5 (mid-mark) One Distinction criteria
met - main points are all clear, support is repetitive /
less clear in places - make sure you give specific
examples / data).
Research and Understanding: 4.5 - mid-mark awarded.
Search methods are unclear / could not be followed.
Conclusions are good and clearly indicate reading has
been undertaken and understood.
24 / 40
PAGE 1
Text Comment. Overall structure looks clear, but what is the main focus of paragraph 5?
PAGE 2
Non-academic source
Remember that your sources must be reliable/trustworthy. This means they should be books,
academic journal articles, or reports from governments or international organisations. Do not use
general websites as primary sources.
Referencing error
QM
QM
QM
QM
QM
QM
QM
Check the guidelines on the cover page of this submission template to make sure you have
formatted the reference accurately.
Good point / s
Pt 1. Search method issue
You have not explained where you found your source or have used a non-academic search engine.
This is not good practice for academic study; please use either Google Scholar, StarPlus or the
reference lists of other related academic papers.
Comment 1
Google Scholar would be a better starting point, or you could follow up on research cited in the
website article to make sure that the research is academic and non-biased.
PAGE 3
Text Comment. This is not the title of the article - it is 'Driving Tests Coming for Autonomous
Cars'. Make .
CWTS
CWFT Module 7 Chapter 2
Eco-maps
1
ECO-MAPS
The eco-map helps to identify family resources at-a-glance. Areas of strength and concern are presented to assist in
creating a picture of the family’s world. Information is gathered in circles. Eco-maps are a snapshot in time.
Periodically update changes in connections to resources—especially natural familial and community resources to
maximize usefulness of the tool. The list below helps spur questions and generate deeper discussion about resources
and strengths during the initial visit.
Extended Family Medical/Health Care
Who is in the area that can be a support for you ALL family members: physical illness or disease
What kind of relationship Effects of chemical use
What kind of insurance
Income Effects of chemical use
Financial status Access to medical care
Sources of income Psychological illness, disease
Budgeting
Social Services/Resources
Friends County or Tribal/Financial Services/Child Welfare
Close – Supportive – Conflictive Names of workers
Where located Neighborhood centers
What kind of contact - frequency Agencies / counseling involved with in the past
Positive or negative experiences
Recreation
What do you do for fun Work/School
What do you do for relaxation Employment—past/present
What would you like to do What work are you interested in pursuing
Interests and / or hobbies What type of skills, vocation
What have you done in the past Degree or school until what grade
Positive or negative experiences
Spiritually/Religion
Spirituality and/or religious affiliation growing up Neighborhood
What kind of experiences did you have How long at present home
With what activities were you involved What is your neighborhood like
Current spiritual beliefs and religious affiliations Do you feel safe in your home and neighborhood
Where did you grow up, and what was it like
When showing connections with the ecomap, indicate the nature of the connections with a descriptive word or by
drawing different kinds of lines:
Strong connections: ----------
Tenuous connections: ._._._._
Stressful connections: //////
Draw arrows along the connection lines to signify the flow of energy and resources.
Identify significant people and fill in empty circles as needed. See the example Kelly Family below.
CWTS
CWFT Module 7 Chapter 2
Eco-maps
2
CHURCH/SPIRITUALITY
RECREATION
WORK/SCHOOL
FRIENDS
Extended Family/
Significant Others NEIGHBORHOOD
INCOME
SOCIAL SERVICES/
RESOURCES
NAME: ________________________
MEDICAL/
HEALTH CARE
STRENGTHS:
CONCERNS:
CWTS
CWFT Module 7 Chapter 2
Eco-maps
3
KELLY
FAMILY
Example
HEALTH CARE
EXTENDED
FAMILY
Absent father
WILLIAM
13
VERONA
9
GLORIA
14
SCHOOL
HOUSING:
Homeless
DANGEROUS
NEIGHBORHOOD
CHILD
WELFARE
(foster homes)
MFIP
BENEFITS
JOB TRAINING
Vocational
Rehabilitation
Prog.
Cw2 Marking Rubric Managerial Finance
0
Fail
2
(1-29) Fail
30-39
Fail
40-49
3rd
50-59
2:2
60-69
2:1
70+
1st
Grade Descriptors (Right)
Learning Pillars, Criterion Description and Expectations (Below)
Module Learning Outcome and Industry Competencies
Weighting
No attempt, No submission, Absent
Unsatisfactory, Poor, Week
Incomplete, Inadequate, Limited
Basic, Satisfactory, Sufficient
Appropriate, Fair, Reasonable,
Commendable, Competent, Judicious
Highly Commendable, Outstanding, Exceptional
1
Professional Skills - Executive Summary - Degree to which the executive summary explains the key themes and outcomes of the report in a one page summary
1A,1C
5%
As per grade descriptor
Poor attempt at identifying and
including key themes and/or outcomes. Is unlikely to be limited to one page only
The summary is limited in approach and
therefore incomplete. Possibly over one page in length.
Covers most of the key themes and
outcomes, basic use of information and sources, likely over one page in length.
A one page summary, which provides a
fair and appropriate executive summary to the report.
A commendable, one page summary.
Efficient structure which conveys and logically explains key themes and outcomes.
A strong one page summary. Which is
proficient in explaining key themes and outcomes. Very good structure to the summary.
2
Knowledge and Understanding:
- Introduction completeness and clarity of introduction to the organisation, background, context and rationale for the report being prepared
LO5,4A,4B,5A
10%
As per grade descriptor
Unsatisfactory introduction to the
organisation and background to report. Poor rational is presented. The scope of the report is very broad.
Incomplete introduction and/or background,
inadequate rationale for the report presented. Scope not adequately defined
Acceptable intro and/or background.
Somewhat basic rationale for the research presented. Satisfactory definition of report scope.
Appropriate introduction and/or
background. Fair rationale for the report presented. Scope reasonably well defined.
Commendable introduction and
background presented. Competent rationale presented. Scope well defined.
A strong and well articulated
introduction, the background is proficiently presented with excellent explanation of rationale to the report.
Scope very well defined.
3
Cognitive (thinking) Skills: Literature review:
Information is gathered from multiple, research- based sources. The appropriate content in consideration is covered in depth without being redundant. Sources are cited when specific statements are made. Significance to the
course is unquestionable
LO2,4A,1C,3C,3D
10%
As per grade descriptor
The literature review is
unsatisfactory in that the research content is irrelevant and/or incomplete with poor analysis and conclusions.
The literature review is inadequate in
that the research content is limited and/or incomplete with the same for it's analysis and conclusions.
The review is a.
CVPSales price per unit$75.00Variable Cost per unit$67.00Fixed C.docxdorishigh
CVPSales price per unit$75.00*Variable Cost per unit$67.00*Fixed Cost$100,000.00*Targeted Net Income$0.00*(assume 0 if you want to calculate breakeven)Calculated Volume12,500calculated* inputted by user
Social Networking Channels
Thomas Lamonte Esters
Independence University
29 September 2018
SOCIAL NETWORKING CHANNELS 1
I dislike social networking sites because of the dangerous hazards connected to it.
The ProCon article vividly describes the numerous benefits that are attached to the social networking sites such as connecting people, enhancing advertising and marketing, promoting research and education, assisting to spread information faster as compared to other media, connecting employers and employees and assisting the government to identify and prosecute criminals. These are just a few examples that the article illustrates to support the necessity of the social networking sites in the society today. According to the article, the social networking channels have significantly transformed different sectors such as businesses for the better since they can sell their products and services globally (Procon.org, 2018).
However, the detrimental effects connected with the social networking channels are also numerous and most of them may lead to permanent damage to our lives. It is very clear that the education is the backbone of our lives and also the key to success. Currently, about 69% of the American population use social media channels which is a drastic increase in the usage from 2008 where about 26% of the Americans were connected to the social media (Procon.org, 2018). Most of the social networking sites users are the youths who are in their lower grade level, colleges or even universities. The research shows that using social media when handling assignments decreases the quality of work and makes the students drop in their performance. Education is a core value to a successful life and allowing social media to intrude in the academics will be detrimental since it will lead to the production of incompetent individuals who may end up causing problems in the society (Rowell, 2015).
Moreover, the social media channels expose individuals’ to privacy problems and intrusion by any interested parties. In fact, nothing which is shared in the social media channels is private. According to the survey conducted, 81% of the people surveyed believed that social media is insecure. The government through the NSA (National Security Agencies) intrudes to people’s data and communication in social media meaning that their private information ends up in the hands of the government. Many people do not know about social media privacy settings and this means that they leave their social media accounts prone to invasion (Procon.org, 2018). Viruses such as Steck. Evl can also be propagated via the social media to cause harm to the users. Most of these viruses are spies and send users priv.
CYB207 v2Wk 4 – Assignment TemplateCYB205 v2Page 2 of 2.docxdorishigh
CYB/207 v2
Wk 4 – Assignment Template
CYB/205 v2
Page 2 of 2
NIST Risk Management Framework Step
What is the key NIST Special Publication that guides this step?
What are the typically deliverables for this step??
Who typically works on the deliverables for this step??
Step 1
Categorize
<(list NIST special pub)
(Describe the deliverable)
(List Author)
Step 2
Select
Step 3
Implement
Step 4
Assess
Step 5
Authorize
Step 6
Monitor
Copyright 2020 by University of Phoenix. All rights reserved.
Copyright 2020 by University of Phoenix. All rights reserved.
A Selection From
HAMMURABI'S CODE OF LAWS
(circa 1780 B.C.)
Translated by L. W. King
CODE OF LAWS
2. If any one bring an accusation against a man, and the accused go to the river and leap into the river, if he sink in the river his accuser shall take possession of his house. But if the river prove that the accused is not guilty, and he escape unhurt, then he who had brought the accusation shall be put to death, while he who leaped into the river shall take possession of the house that had belonged to his accuser.
3. If any one bring an accusation of any crime before the elders, and does not prove what he has charged, he shall, if it be a capital offense charged, be put to death.
6. If any one steal the property of a temple or of the court, he shall be put to death, and also the one who receives the stolen thing from him shall be put to death.
14. If any one steal the minor son of another, he shall be put to death.
15. If any one take a male or female slave of the court, or a male or female slave of a freed man, outside the city gates, he shall be put to death.
17. If any one find runaway male or female slaves in the open country and bring them to their masters, the master of the slaves shall pay him two shekels of silver.
21. If any one break a hole into a house (break in to steal), he shall be put to death before that hole and be buried.
22. If any one is committing a robbery and is caught, then he shall be put to death.
25. If fire break out in a house, and some one who comes to put it out cast his eye upon the property of the owner of the house, and take the property of the master of the house, he shall be thrown into that self-same fire.
59. If any man, without the knowledge of the owner of a garden, fell a tree in a garden he shall pay half a mina in money.
108. If a tavern-keeper (feminine) does not accept corn according to gross weight in payment of drink, but takes money, and the price of the drink is less than that of the corn, she shall be convicted and thrown into the water.
112. If any one be on a journey and entrust silver, gold, precious stones, or any movable property to another, and wish to recover it from him; if the latter do not bring all of the property to the appointed place, but appropriate it to his own use, then shall this man, who did not bring the property to hand it over, be convicted, and he shall pay fivefold for all that had been entrusted to him.
.
CUSTOMER SERVICE- TRAINIG PROGRAM
2
TABLE OF CONTENTS
Introduction ------------------------------------------------------------------------------------------------------------3
Training Needs Analysis ---------------------------------------------------------------------------------------------4
Training Design -------------------------------------------------------------------------------------------------------9
Training Objectives --------------------------------------------------------------------------------------------------10
Training Methods ----------------------------------------------------------------------------------------------------11
Training Development ----------------------------------------------------------------------------------------------13
Training Evaluation -------------------------------------------------------------------------------------------------14
Appendix I ------------------------------------------------------------------------------------------------------------16
References ------------------------------------------------------------------------------------------------------------17
3
INTRODUCTION
Background
In contrast to Walmart’s ability in maintaining leadership as a multinational retail aiming sustainability,
corporate philanthropy and employment opportunity, the company is falling behind in terms of customer
service satisfaction. Despite to the effort of Walmart’s executives throughout these years, in building a better
relationship with their customers, it seems they remain still unsuccessful. This can be measured as their
satisfaction rating levels are still extremely low when compared to other businesses in the same industry. Per
the American Customer Satisfaction Index (ACSI) annual ranking for 2016, Walmart, “still between one of
the 10 companies with the worst customer satisfaction”. (Tim Denman-March 01, 2016)
Since we all recognize the crucial importance that represents to any business keeping their customers happy,
not only with the price of the product but most important with the service provided. I will create a training
plan mainly focused in the delivery of effective customer service practices for all Walmart customer services
associates. This training program will provide to all Walmart’s new hires and current associates the
opportunity of not only learning, but also expanding, reinforcing and creating consistency of their knowledge
on how to deal with customers in different situations. How to improve happiness for the customers while
shopping and how to improve the associate’s customer service attitude and efficiency with the goal of
offering an outstanding service. Ultimately, to achieve delivering an enjoyable shopping experience to all
Walmart’s clients. This training will be presented in five different modules; each module will represent a
fundamental aspect inside of customer service job in order to make the associates.
Customer Service Test (Chapter 6 - 10)Name Multiple Choice.docxdorishigh
Customer Service
Test (Chapter 6 - 10)
Name:
Multiple Choice Questions (3 points each – please highlight your response)
1) ____ The Regional Sales Manager of a medical device company is an assertive person who proactively engages in confrontational dialogue during sales meetings of his company. Being a forceful businessman, he prefers firm handshakes in his interactions and is inclined to project a confident, arrogant demeanor. He is most likely to prefer what personality style:
a. Inquisitive
b. Rational
c. Expressive
d. Decisive
2) ____ An individual who favors solitary leisure activities over people-oriented activities is most likely to adopt what personality style:
a. Decisive
b. Expressive
c. Inquisitive
d. Rational
3) ____ People who adopt the inquisitive style differ from people who adopt the expressive style in that the former tends to be more like which of the following:
a. Volunteers feelings freely
b. Be very punctual and time conscious
c. Enjoys engaging individuals in person
d. Prefers informality and closeness in interactions
4) ____ A customer approaches a salesperson to discuss details of a product he is interested in. Given her preference for the expressive style, which of the following would the customer likely be interested in:
a. The bottom line of using the product
b. Instructions that discuss the use of the product
c. Questions related to rebates and other technical information
d. The color and sizes that the product is available in
5) ____ A good way to establish good relationships with an internal customer is to:
a. Tell your co-worker about all your work and family challenges
b. Wear strong fragrances to make sure you get noticed
c. Stay connected by stopping by their work area periodically
d. Forward your calls to him/her when you are away from your desk
6) ____ One strategy for dealing with talkative customers is to:
a. Ignore all the other customers while listening to them
b. Roll your eyes and look away
c. Direct them to your co-workers
d. Used closed-end questions to guide the conversation
7) ____ Which of the following is the last step of the problem solving model:
a. Evaluate the alternatives
b. Identify the alternatives
c. Monitor the results
d. Make a decision
8) ____ The Customer Experience Representative is confronted by an upset customers and uses a problem solving model to address the issue. She first identified the problem. The next step she should take is:
a. Monitor the results
b. Identify the alternatives
c. Make a decision
d. Evaluate the alternatives
9) ____ The last step of the service recover process is:
a. Show compassion
b. Conduct a follow up
c. Take further action
d. Apologize another time
10) ____ Which of the following statements is an example of an individualistic culture:
a. A country that provides all of it citizens with complete healthcare
b. A native tribe whose members pursue personal goals over the tribe’s
c. An ethnic group that runs all its decis.
Customer Value Funnel Questions1. Identify the relevant .docxdorishigh
Customer Value Funnel Questions
1. Identify the relevant macroenvironmental factors (level 1). What impact do these issues have on the focal organization?
2. Discuss the market factors (level 2). How do collaboration, competition, suppliers and regulators affect the performance of the focal organization?
.
Customer service is something that we have all heard of and have som.docxdorishigh
Customer service is something that we have all heard of and have some degree of familiarity with. However, customer service issues are a frequent complaint amongst customers. Using the Internet or another resource identify an organization with a reputation in customer service excellence. Then find another that has had a long history of customer service issues and complaints.
How do organizations promote customer service excellence?
What are the effects of poor customer service?
How does quality tie into customer service?
How can organizations improve their customer service models?
.
Customer requests are:
Proposed Cloud Architecture (5 pages needed from step 1 to step 5)
Final Report Evaluating AWS and Azure Providers (5 pages (step1 to5) + 2 pages from step 6 to 7 = the final report would be 7 pages), also you will find
the template for the final
report is on the last pages
Below are the instructions
Since you have become familiar with the foundations of cloud computing technologies, along with their risks and the legal and compliance issues, you will now explore cloud offerings of popular cloud providers and evaluate them to recommend one that would be the best fit for BallotOnline.
In this project, you will first learn about networking in the cloud and auxiliary cloud services provided by cloud vendors. Next, you will explore cloud computing trends, best practices, and issues involved in migrating IT deployments to the cloud, as well as typical architectures of cloud deployments. Then, you will apply your findings to propose a general architecture for BallotOnline’s cloud deployment to best address the company’s business requirements.
Once you have selected a deployment architecture, you will research two leading cloud vendors: Amazon Web Services (AWS) and Microsoft Azure. Exploring and comparing the tools available for application migration will enable you to recommend a vendor to the executives in your final report. The final deliverable is a written report to BallotOnline management, describing the results of your research and recommending the cloud deployment architecture and the vendor for its deployment, with justification.
Your final report should demonstrate that you understand the IT needs of the organization as you evaluate and select cloud providers. The report should include your insights on the appropriate direction to take to handle the company’s IT business needs. You will also be assessed on the ability to integrate relevant risk, policy, and compliance consideration into the recommendations, as well as the clarity of your writing and a demonstration of logical, step-by-step decision making to formulate and justify your ideas.
Check the
Project 3 FAQ thread
in the discussion area for any last-minute updates or clarifications about the project.
Step 1: Research Networking and Auxiliary Services in the Cloud
The executives at BallotOnline have been impressed with your research on cloud computing thus far. While there are a variety of
cloud providers
, BallotOnline is considering using Amazon Web Services (AWS) and Microsoft Azure, two of the top providers in the market. BallotOnline's executives want you to help determine which would be the best provider for the organization.
You will start with learning about
internet networking basics
and
cloud networking
. You will also research many
cloud services
that cloud providers make available to their customers to help them take full advantage of cloud service and deployment models.
Step 2: Research Cloud Trends, Best Practices, and Mig.
Customer Relationship Management
Presented By:
Shan Gu
Cristobal Vaca
Amber Vargas
Jasmine Villasenor- Team Leader
Xiaoqi Zhou
1
IST 309
Professor He
Group 10
3/18/20
23-25 minute presentation
Overview
Introduction to Customer Relationship Management (CRM)
Objectives of CRM
Different forms of CRM
Examples of businesses that use CRM
The problem, context, & architecture of CRM
The state of art & current best practices of CRM
Advantages and Disadvantages of CRM
Recommendations
2
Introduction to CRM
Customer relationship management (CRM) is an approach to manage a company's interaction with current and potential customers
It’s seen as both an organizational strategy & information technology
Takes form in various systems and applications
Builds sustainable long-term customer relationships that create value for both the company and it’s customers
Contributes to customer retention & expansion of their relationships with advantageous existing customers
Obtains new customers
3
It uses data analysis about customers' history with a company to improve business relationships with customers, specifically focusing on customer retention and ultimately driving sales growth.
CRM helps companies acquire new customers and retain and expand their relationships with profitable existing customers. Retaining customers is particularly important because repeat customers are the largest generator of revenue for an enterprise. Also, organizations have long understood that winning back a customer who has switched to a competitor is vastly more expensive than keeping that customer satisfied in the first place.
The goal is simple: Improve business relationships. A CRM system helps companies stay connected to customers, streamline processes, and improve profitability.
Objectives
Who is CRM for?
Large businesses
Small businesses
Customers of both types of businesses listed above
4
Key Features:
stay connected to customers
streamline processes
provide visibility & easy access to data
improve efficiency & profitability
How does CRM benefit businesses?
Provides a clear overview of your customers
Can be used as both a sales and marketing tool
Contributes information from HR → Customer service → Supply-chain management
A CRM system gives eve#ryone — from sales, customer service, business development, recruiting, marketing, or any other line of business — a better way to manage the external interactions and relationships that drive success. A CRM tool lets you store customer and prospect contact information, identify sales opportunities, record service issues, and manage marketing campaigns, all in one central location — and make information about every customer interaction available to anyone at your company who might need it.
Some of the biggest gains in productivity can come from moving beyond CRM as a sales and marketing tool, and embedding it in your business – from HR to customer services and supply-chain management.
E.
Custom Vans Inc. Custom Vans Inc. specializes in converting st.docxdorishigh
Custom Vans Inc. Custom Vans Inc
. specializes in converting standard vans into campers. Depending on the amount of work and customizing to be done, the customizing could cost less than $1,000 to more than $5,000. In less than four years, Tony Rizzo was able to expand his small operation in Gary, Indiana, to other major outlets in Chicago, Milwaukee, Minneapolis, and Detroit.
Innovation was the major factor in Tony’ s success in converting a small van shop into one of the largest and most profitable custom van operations in the Midwest. Tony seemed to have a special ability to design and develop unique features and devices that were always in high demand by van owners. An example was Shower-Rific, which Tony developed only six months after he started Custom Vans Inc. These small showers were completely self-contained, and they could be placed in almost any type of van and in a number of different locations within a van. Shower-Rific was made of fiberglass and contained towel racks, built-in soap and shampoo holders, and a unique plastic door. Each Shower-Rific took 2 gallons of fiberglass and 3 hours of labor to manufacture.
Most of the Shower-Rifics were manufactured in Gary, in the same warehouse where Custom Vans Inc. was founded. The manufacturing plant in Gary could produce 300 Shower-Rifics in a month, but that capacity never seemed to be enough. Custom Vans shops in all locations were complaining about not getting enough Shower-Rifics, and because Minneapolis was farther away from Gary than the other locations, Tony was always inclined to ship Shower-Rifics to the other locations before Minneapolis. This infuriated the manager of Custom Vans at Minneapolis, and after many heated discussions, Tony decided to start another manufacturing plant for Shower-Rifics at Fort Wayne, Indiana.
The manufacturing plant at Fort Wayne could produce 150 Shower-Rifics per month. The manufacturing plant at Fort Wayne was still not able to meet current demand for Shower-Rifics, and Tony knew that the demand for his unique camper shower would grow rapidly in the next year. After consulting with his lawyer and banker, Tony concluded that he should open two new manufacturing plants as soon as possible. Each plant would have the same capacity as the Fort Wayne manufacturing plant. An initial investigation into possible manufacturing locations was made, and Tony decided that the two new plants should be located in Detroit, Michigan; Rockford, Illinois; or Madison, Wisconsin. Tony knew that selecting the best location for the two new manufacturing plants would be difficult. Transportation costs and demands for the various locations were important considerations.
The Chicago shop was managed by Bill Burch. This Custom Vans shop was one of the first established by Tony, and it continued to outperform the other locations. The manufacturing plant at Gary was supplying the Chicago shop with 200 Shower-Rifics each month, although Bill knew that the demand for the.
The Roman Empire A Historical Colossus.pdfkaushalkr1407
The Roman Empire, a vast and enduring power, stands as one of history's most remarkable civilizations, leaving an indelible imprint on the world. It emerged from the Roman Republic, transitioning into an imperial powerhouse under the leadership of Augustus Caesar in 27 BCE. This transformation marked the beginning of an era defined by unprecedented territorial expansion, architectural marvels, and profound cultural influence.
The empire's roots lie in the city of Rome, founded, according to legend, by Romulus in 753 BCE. Over centuries, Rome evolved from a small settlement to a formidable republic, characterized by a complex political system with elected officials and checks on power. However, internal strife, class conflicts, and military ambitions paved the way for the end of the Republic. Julius Caesar’s dictatorship and subsequent assassination in 44 BCE created a power vacuum, leading to a civil war. Octavian, later Augustus, emerged victorious, heralding the Roman Empire’s birth.
Under Augustus, the empire experienced the Pax Romana, a 200-year period of relative peace and stability. Augustus reformed the military, established efficient administrative systems, and initiated grand construction projects. The empire's borders expanded, encompassing territories from Britain to Egypt and from Spain to the Euphrates. Roman legions, renowned for their discipline and engineering prowess, secured and maintained these vast territories, building roads, fortifications, and cities that facilitated control and integration.
The Roman Empire’s society was hierarchical, with a rigid class system. At the top were the patricians, wealthy elites who held significant political power. Below them were the plebeians, free citizens with limited political influence, and the vast numbers of slaves who formed the backbone of the economy. The family unit was central, governed by the paterfamilias, the male head who held absolute authority.
Culturally, the Romans were eclectic, absorbing and adapting elements from the civilizations they encountered, particularly the Greeks. Roman art, literature, and philosophy reflected this synthesis, creating a rich cultural tapestry. Latin, the Roman language, became the lingua franca of the Western world, influencing numerous modern languages.
Roman architecture and engineering achievements were monumental. They perfected the arch, vault, and dome, constructing enduring structures like the Colosseum, Pantheon, and aqueducts. These engineering marvels not only showcased Roman ingenuity but also served practical purposes, from public entertainment to water supply.
Palestine last event orientationfvgnh .pptxRaedMohamed3
An EFL lesson about the current events in Palestine. It is intended to be for intermediate students who wish to increase their listening skills through a short lesson in power point.
Honest Reviews of Tim Han LMA Course Program.pptxtimhan337
Personal development courses are widely available today, with each one promising life-changing outcomes. Tim Han’s Life Mastery Achievers (LMA) Course has drawn a lot of interest. In addition to offering my frank assessment of Success Insider’s LMA Course, this piece examines the course’s effects via a variety of Tim Han LMA course reviews and Success Insider comments.
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...Levi Shapiro
Letter from the Congress of the United States regarding Anti-Semitism sent June 3rd to MIT President Sally Kornbluth, MIT Corp Chair, Mark Gorenberg
Dear Dr. Kornbluth and Mr. Gorenberg,
The US House of Representatives is deeply concerned by ongoing and pervasive acts of antisemitic
harassment and intimidation at the Massachusetts Institute of Technology (MIT). Failing to act decisively to ensure a safe learning environment for all students would be a grave dereliction of your responsibilities as President of MIT and Chair of the MIT Corporation.
This Congress will not stand idly by and allow an environment hostile to Jewish students to persist. The House believes that your institution is in violation of Title VI of the Civil Rights Act, and the inability or
unwillingness to rectify this violation through action requires accountability.
Postsecondary education is a unique opportunity for students to learn and have their ideas and beliefs challenged. However, universities receiving hundreds of millions of federal funds annually have denied
students that opportunity and have been hijacked to become venues for the promotion of terrorism, antisemitic harassment and intimidation, unlawful encampments, and in some cases, assaults and riots.
The House of Representatives will not countenance the use of federal funds to indoctrinate students into hateful, antisemitic, anti-American supporters of terrorism. Investigations into campus antisemitism by the Committee on Education and the Workforce and the Committee on Ways and Means have been expanded into a Congress-wide probe across all relevant jurisdictions to address this national crisis. The undersigned Committees will conduct oversight into the use of federal funds at MIT and its learning environment under authorities granted to each Committee.
• The Committee on Education and the Workforce has been investigating your institution since December 7, 2023. The Committee has broad jurisdiction over postsecondary education, including its compliance with Title VI of the Civil Rights Act, campus safety concerns over disruptions to the learning environment, and the awarding of federal student aid under the Higher Education Act.
• The Committee on Oversight and Accountability is investigating the sources of funding and other support flowing to groups espousing pro-Hamas propaganda and engaged in antisemitic harassment and intimidation of students. The Committee on Oversight and Accountability is the principal oversight committee of the US House of Representatives and has broad authority to investigate “any matter” at “any time” under House Rule X.
• The Committee on Ways and Means has been investigating several universities since November 15, 2023, when the Committee held a hearing entitled From Ivory Towers to Dark Corners: Investigating the Nexus Between Antisemitism, Tax-Exempt Universities, and Terror Financing. The Committee followed the hearing with letters to those institutions on January 10, 202
Unit 8 - Information and Communication Technology (Paper I).pdfThiyagu K
This slides describes the basic concepts of ICT, basics of Email, Emerging Technology and Digital Initiatives in Education. This presentations aligns with the UGC Paper I syllabus.
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdfTechSoup
In this webinar you will learn how your organization can access TechSoup's wide variety of product discount and donation programs. From hardware to software, we'll give you a tour of the tools available to help your nonprofit with productivity, collaboration, financial management, donor tracking, security, and more.
Introduction to AI for Nonprofits with Tapp NetworkTechSoup
Dive into the world of AI! Experts Jon Hill and Tareq Monaur will guide you through AI's role in enhancing nonprofit websites and basic marketing strategies, making it easy to understand and apply.
Home assignment II on Spectroscopy 2024 Answers.pdf
cuACS Requirements Analysis Document Nicholas Aubé.docx
1. cuACS
Requirements Analysis Document
Nicholas Aubé 101032093
Ibiduneyitayo, 101018199
Peter MacDonald, 100683150
Submitted to:
Dr. Christine Laurendeau
COMP 3004 Object-Oriented Software Engineering
School of Computer Science
Carleton University
2. 1
Table of Contents
Introduction + Overview of
Document……………………………………………………………
……………….1
Functional
Requirements…………..……………………………………………
………..……………………………..2
Non-functional
Requirements…………………………………………………………
……………………………2-4
Use Case
Model…………………………………………………………………
………………………….……………4-15
Object
Model…………………………………………………………………
…………………………………………...…16
Introduction
3. The cuACS program is designed to find the best possible
matches between a variety
of different animals and clients that are looking for a new pet.
The Carleton University
Animal Case System will revolutionize the way that we adopt
animals. The main advantage
of the cuACS system is the dynamic algorithm that matches
shelter animals and human
clients based on compatibility factors such as habitat, size, and
temperament. The
algorithm is optimized to create the largest number of sufficient
matches, not just one or
two perfect ones. The cuACS program will allow clients to look
at animal profiles and edit
their own detailed profiles. There will also be functionality to
manage client profiles and
animal preferences. There are even multiple types of users that
can access the system, staff
and clients. Both types of users have different permissions,
which will be managed by the
system.
This report will cover many different aspects of the cuACS
system, including an
4. overview of the program, functional and non-functional
requirements, the user case model
and the object model.
2
Functional requirements
Traceability: functional requirements are preceded by the letter
F when referred to in
other sections of the requirements analysis. E.g. F-1.1 refers to
the staff interaction 1.1
functional requirement.
1. Staff interactions
1.1. Staff should be able to add new animals and clients
1.2. Staff should be able to view client and animal information
1.3. Staff should be able to edit animal and client profiles
1.4. Staff should be able to start the Matching algorithm process
1.5. Staff should be able to view a summary of matches made by
the Matching algorithm
1.6. Staff should be able to view the details of a specific match
made by the algorithm
5. 2. Client interactions
2.1. Clients can view and edit their profile
2.2. Clients can view animal profiles
3. Algorithm
3.1. There should be an algorithm that can create optimal
matches between clients and
animals
3.2. The algorithm should look at client preferences and match
them with animal traits
3.3. The algorithm should attempt to create the largest number
of acceptable matches
possible rather than a small number of extremely compatible
matches.
3.4. The algorithm should provide output in a form that can be
easily turned into a
report for user reading.
Non-Functional Requirements
Traceability: non-functional requirements are preceded by the
letters NF when referred
to in other sections of the requirements analysis. E.g. NF-1.1
refers to the open source
6. licensing non-functional requirement.
1. Legal
1.1. Our software must be distributed under an open source
licence
1.2. Our software’s use of the QT framework must conform to
the terms of its
Open-Source GPL 3.0 licence.
1.3. Our software must be licensed for non-profit use only
2. Usability
2.1. All error messages should be descriptive and, where
applicable, suggest
solutions
3
2.2. The GUI should provide hotkey shortcuts for common tasks
on relevant
platforms
2.3. The database should be automatically updated when users
have finished
editing a profile, without requiring them specific user input.
7. 3. Reliability
3.1. If the system fails while a profile is being updated they
should be prompted
to save their progress
3.2. The system should be able to perform the functional
requirements without
crashing, hanging, or otherwise failing.
3.3. The system should consistently be able to run without
crashing after release
4. Performance
4.1 The matching algorithm should provide results in a
reasonable time frame
(< 60 seconds).
4.2 The program should minimize both system resources and
system time by
ensuring that unnecessary calls to the database are avoided
4.3 When running the matching algorithm, the thread that is
handling UI
processes should not be blocked while waiting for the results.
5. Supportability
5.1. The back-end and the GUI should be sufficiently decoupled
that porting the
8. system to a different GUI framework would be easy
5.2. Adding, removing, or modifying animal and client traits
should be easy
5.3. Modifying one part of the GUI should not require remaking
other portions to
preserve functionality
6. Implementation
6.1. The system must be written in C++
6.2. The system needs to have a GUI
6.3. Persistent storage must be provided through an SQL
database
7. Interface
7.1. The interface should be clean and professional
7.2. The interface needs to have a sign in as either a staff
member or a client
7.3. The interface should be designed and programmed using the
QT framework
8. Operations
8.1. The client should not be able to access the information of
other clients
8.2. The client should not be able to modify the information of
9. animals
8.3. Only staff members can create client profiles and
9. Packaging
9.1. The system should build in a single command and run with
a single
command
9.2. The system must be accessible as an executable for
download
4
9.3. The codebase should be packaged in a way that it is easy to
navigate and
intuitive for all programmers to be able to easily find the
intended piece of
code
Use Case Model
Diagrams
11. 10
11
12
Reminder: UC-3.1 refers to the algorithm use case where it
creates matches.
Descriptions
Use Case Identifier UC-1.1/UC-1.2
Name StaffAddClient/StaffAddAnimal
Participating actors StaffMember
Flow of events 1. A staff member starts the creation process
2. The program creates the form to initialize the new item’s
properties
3. The staff member fills out the form and submits it
4. The program will add the new client/animal to the
appropriate
table after verifying that all the fields are entered correctly
12. Entry conditions The Staff member elects to begin the creation
process
Exit conditions The system will return a message saying that the
action is complete
Quality requirements The user must be in the staff portion of
the software.
Traceability F-1.1
13
Use Case Identifier UC-1.3/UC1.4
Name StaffViewClient/StaffViewAnimal
Participating actors StaffMember
Flow of events 1. A staff member selects the client or animal
profile that they
would like to view
2. The staff member clicks on the view details button
3. The program opens the details page for the client or animal
Entry conditions The Staff member elects to open the details
page
Exit conditions The program returns back to the main menu
Quality requirements The user must be in the staff portion of
the software.
Traceability F-1.2
Use Case Identifier UC-1.5/UC1.6
Name StaffEditClient/StaffEditAnimal
13. Participating actors StaffMember
Flow of events 1. A staff member starts the edit process
2. The program creates the form to edit the item’s properties
3. The staff member fills out the form and submits it
4. The program will update the client/animal to the appropriate
table after verifying that all the fields are entered correctly
Entry conditions The Staff member elects to open the edit page
Exit conditions The system will return a message saying that the
action is complete
Quality requirements The user must be in the staff portion of
the software.
Traceability F-1.3
Use Case Identifier UC-1.7
Name StaffStartAlgorithm
Participating actors StaffMember
Flow of events 1. A staff member starts the algorithm
2. The program creates the appropriate matches and saves them
Entry conditions The Staff member elects to start the algorithm
Exit conditions The system will return a message saying that the
action is complete
Quality requirements The user must be in the staff portion of
the software.
Traceability F-1.4
Use Case Identifier UC-1.8
Name StaffViewMatchSummary
Participating actors StaffMember
Flow of events 1. A staff member starts UC-1.7
2. The program creates the appropriate matches and saves them
14. 3. The staff member clicks the summary button of the algorithm
4. The program reprints the general summary of the matches
Entry conditions The Staff member elects to open the summary
of matches
Exit conditions The system will return to the menu
Quality requirements The user must be in the staff portion of
the software.
Traceability F-1.5
14
Use Case Identifier UC-1.9
Name StaffViewMatchDetails
Participating actors StaffMember
Flow of events 1. A staff member starts UC-1.7
2. The program creates the appropriate matches and saves them
3. The staff member clicks the details button on a certain match
4. The program prints the summary of that specific match
Entry conditions The Staff member elects to start the algorithm
Exit conditions The system will return a message saying that the
action is complete
Quality requirements The user must be in the staff portion of
the software.
Traceability F-1.6
Use Case Identifier UC-2.1/UC-2.2
Name ClientViewSelf/ClientEditSelf
Participating actors ClientMember
15. Flow of events 1. A client clicks on their profile
2. For UC-2.2, the client can press the edit button on their
profile
a) The program creates a form for the user to make changes and
submit
b) The user submits the updated information and the program
checks to make sure it is correct
c) The program updates the client’s profile and returns back to
their
profile page
3. The program displays the client’s profile
Entry conditions The Staff member elects to view their profile
Exit conditions The system will return a message saying that the
action is complete
Quality requirements The user must be in the client portion of
the software.
Traceability F-2.1
Use Case Identifier UC-2.3
Name ClentViewAnimal
Participating actors ClientMember
Flow of events 1. Client clicks on the animal details button
2. Program fetches and displays the list of animals and their
details
Entry conditions The Staff member elects to open the animals
page
Exit conditions The program returns back to the main menu
Quality requirements The user must be in the client portion of
the software.
16. Traceability F-2.2
15
Use Case Identifier UC-3.1
Name StaffStartMatches
Participating actors StaffMember
Flow of events 1. The program is called to make matches
2. The algorithm fetches animal information and client
preferences
and creates matches according to all F-3.X functional
requirements
3. The program saves the displays the matches
Entry conditions The Staff member elects begin the matching
algorithm
Exit conditions The system will return a message saying that the
action is complete
Quality requirements The user must be in the staff portion of
the software.
Traceability F-3.1, F-3.2, F-3.3, F-3.4
17. Object Model
Data Dictionary
Name / ID
Number
Attributes / Associations Definition Use
Cases
User
O-01
• Username
• password
A user of the cuACS system. All use
Cases
Staff User
O-02
• Has access to the
client database
• Has access to the
animal database
• Has access to the
matching system
• Is a User
18. A user of the cuACS system with
staff/writing privileges.
UC-1.1
UC-1.2
UC-1.3
UC-1.4
UC-1.5
UC-1.6
UC-1.7
UC-1.8
UC-1.9
UC-3.1
Client User
O-03
• Has a client profile in
the Client database
• Has read-only access
to the animal database
• Is a User
A user of the cuACS system with
client privileges.
UC-2.1
UC-2.2
UC-2.3
16
19. Client
Profile
O-04
• Stored in the client
database
• Can be edited by any
staff user
• Can be edited by one
client user
• Used by the Matching
System to create
Matches
• Name
• Age
• Gender
• Size preference
• Species preference
• Allergies
• Living space
• Activity level
preference
• Family size
A profile in the cuACS system that
describes a client and their
preferences.
UC-1.1
UC-2.1
20. UC-2.2
UC-2.3
UC-3.1
Animal
Profile
O-05
• Stored in the animal
database
• Can be edited by any
staff user
• Can be viewed by any
Client user
• Used by the Matching
System to create
Matches
• Name
• Species
• Gender
• Weight
• Size
• Color
• Age
• Ease of training
• Playfulness
• Friendliness with
strangers
• Friendliness with
children
21. • Aggressiveness
• Activity Level
• Affection Level
• Hypoallergenic (yes/no)
• Nocturnal (yes/no)
• Shedding level
• Living area needed
• Ideal habitat
A profile in the cuACS system that
describes an animal kept at the
shelter and up for adoption.
UC-1.1
UC-1.3
UC-1.4
UC-1.5
UC-1.6
UC-1.7
UC-1.8
UC-1.9
UC-3.1
17
• Indoors or outdoors
pet?
• Preferred climate
• Responsiveness to
toys
• Diet
22. Client
Database
O-06
• Contains client profiles
• Can be read by staff
users
• Can be edited by staff
users
• Can be read by the
Matching System
The database system storing the
client profiles for the cuACS system.
UC-1.1
UC-1.3
UC-1.5
UC-1.7
UC-3.1
Animal
Database
O-07
• Contains animal
profiles
• Can be read by all
users
• Can be edited by staff
23. users
• Can be read by the
Matching System
The database system storing the
animal profiles for the cuACS
system.
UC-1.2
UC-1.4
UC-1.6
UC-1.7
UC-2.3
UC-3.1
Match
O-08
• Contains one animal
and one client
• Created by the
Matching system
• Can be viewed by staff
users
A match between a client and a
compatible animal, as judged by the
Matching system
UC-1.8
UC-1.9
UC-3.1
24. Matching
System
O-09
• Can read client
database
• Can read animal
database
• Can be activated and
viewed by staff users
• Creates matches
• Stores matches
This system reads both the client
and animal databases and creates
matches between compatible clients
and animals.
UC-1.7
UC-1.8
UC-3.1
Association Diagrams
18
25. Fig 1:
19
Fig 2:
INSCRIBED LANDSCAPES
Travel Writing from Imperial China
Translated with Annotations and an Introduction by
RICHARD E. STRASSBERG
UNIVERSITY OF CALIFORNIA PRESS BERKELEY LOS
ANGELES LONDON
16
Fan Chung-yen (989-1052)
j~ 1~ ~~
Fan Chung-yen was born in Su-chou in what is today Chiang-su.
26. His
father died when he was still young, and he was educated in
Buddhist
temple schools with the support of patrons. Becoming a
Presented
Scholar in 1015, he enjoyed a distinguished career, although he
suffered
demotion three times during his early years in office. He was
nevertheless admired as an idealistic Confucian and achieved
notable
success in military and diplomatic affairs. In 1041, when he was
auxiliary academician of the Dragon Diagram Hall, he was sent
as
assistant military commissioner for the Shaan-hsi Circuit, where
he
fortified a critical area against the Hsi-Hsia Kingdom and
arranged a
durable peace between the two countries. In 1043, he proposed a
reform program-later regarded as the "Minor Reform" of the
Northern Sung, since it antedated the more pervasive reforms of
Ou-
yang Hsiu and Wang An-shih (1021-1086). It failed in 1045
owing to
political opposition. Fan was then assigned to local posts at his
request,
where he continued to serve with distinction as a prefect.
His literary theory embraced the ideals of Ancient Style prose
but
also included interest in the conventions of parallel prose. The
Pavilion
ofYueh-yang was commissioned by a friend, T'eng Tzu-ching
(991-
1047), who, like Fan, was demoted and exiled to the post of
prefect.
Fan wrote the piece from a distance, relying both on his memory
27. of the
place and on an illustration. It became one of the most widely
known
works of travel literature, combining a documentary function
with a
lyrical description of the scenery that reflects the ambivalent
moods of
the writer. His statement "First feel concern for the concerns of
the
world. Defer pleasure until the world can take pleasure" became
an
enduring motto for Confucian officials. · 157
158 FAN CHUNG-YEN
The Pavilion ofYiieh-yang faces Grotto Lake and was first built
above the West Gate of the city wall ofYiieh-yang in present-
day Hu-
nan during the K'ai-yiian era (713-741) of the T'ang dynasty. It
was
renovated a number of times through the centuries and was
completely
rebuilt in 1867. Presently, its three stories stand about sixty-
five feet
high. Although celebrated as early as the T'ang in a poem by Tu
Fu
(712-770), the pavilion became a literary shrine largely as a
result of
Fan Chung-yen's account. Later, an engraving of this piece
written by
the Ch'ing calligrapher Chang Chao (169I-1745) was placed
inside the
main hall.
28. The Pavilion ofYiieh-yang *~t!~C. (1046)
In the spring of the fourth year of the Ch'ing-li era [1044],
T'eng Tzu-
ching was demoted to the post of prefect of Pa-ling. 1 Two
years later,
his administration was well ordered and the people lived in
harmony;
numerous affairs that had languished were revived with success.
Then
he had the Pavilion of Yiieh-yang restored, expanding its
original de-
sign. Poems and prose by worthies of the T'ang as well as by
men of
the present dynasty were inscribed upstairs. I was asked to write
a piece
in commemoration.
I have observed the magnificent scenery of Pa-ling at this lake
named "Grotto," which bites the distant mountains and swallows
up
the Long River, surging restlessly as it extends beyond the
horizon. Be-
tween the radiant mornings and the shadowy twilight, its
atmosphere
undergoes myriad transformations. This is the grand view from
the
Pavilion of Yiieh-yang, which ancient writers have described in
detail.
Because the water routes lead north to Shaman's Gorge and
stretch
south all the way to the Hsiao and Hsiang rivers, exiled officials
and
tragic poets have always gathered here. Did they not have
various feel-
ings upon viewing this scene?
29. When it rains constantly in heavy showers and the sun does not
shine through for months on end, cold winds howl, and muddy
waves
strike at the sky. The sun and stars hide their radiance; the hills
and
mountains conceal their forms. Merchants and travelers cannot
set sail,
for the masts would break and the oars snap. At twilight, all
turns to
darkness: tigers roar and gibbons cry. Ascending to the pavilion
now,
FAN CHUNG-YEN I59
one feels remote from the capital and longs for home, worried
about
slander and fearful of ridicule. A bleak vista fills one's eyes;
regrets in-
tensify and turn to melancholy.
When it turns to balmy spring and the entire scene brightens,
the
waves are no longer aroused. The sky above and its reflection
below
form a single, vast expanse of blue-green. Seagulls soar about
and
gather to rest; colorful fish swim and submerge. Angelica by the
banks
and orchids on the islets diffuse their fragrances as they
flourish. And
sometimes, when the blanketing mist vanishes, the luminous
moon
shines for a thousand li. Floating light beams shimmer like
30. gold; the
moon's quiet reflection forms a submerged jade disc.
Fishermen's songs
respond to one another. How could one ever tire of such joy?
Ascend-
ing to the pavilion now, one's heart opens and one's spirit is
delighted.
Favor and disgrace are both forgotten as one faces the breeze
with a cup
of wine in boundless satisfaction.
Ah! I have often sought to attain the mind of those ancient
paragons
of humaneness, for some of them did not experience these two
kinds of
feelings. Why was this? They took no delight in external things,
nor
felt sorry for themselves. When they occupied a high position at
court,
they felt concern for the people. When banished to distant rivers
and
lakes, they felt concern for their sovereign. When serving at
court, they
felt concern, when forced to withdraw they felt concern. Then
when
did they enjoy happiness? Would these ancients not have said,
"First
feel concern for the concerns of the world. Defer pleasure until
the
world can take pleasure." Alas! If there were not such people,
then
whom could I follow?
ON THE FIFTEENTH DAY OF THE NINTH LUNAR MONTH
IN THE SIXTH YEAR [OCTOBER I7, I046J2
31. Fig. 23.
Chin Nung (1687-1773), "Tilt Pavilion oftht
Old Dnmkard" by 0••-yaug Hsiu. Leaf f of
Album of Ltmdscapts Illustrating Poems and
Essays By Famous Writers (1736), Museum
Rietberg, Zurich, Gift of Charles A.
Drenowatz. Ou-yang Hsiu is depicted here
sitting with a companion by the pavilion
with his travel account fully inscribed as a
colophon.
17
Ou-yang Hsiu (1007-1072)
~k~1~
Ou-yang Hsiu was one of the dominant figures ofNorthern Sung
literature and politics, a leader of a circle ofliterary
progressives who
consolidated the ideals of the Ancient Style. Later canonized as
one of
the Eight Masters ofT'ang and Sung Prose, he was a prolific
writer in
a variety of prose and poetic genres. Born in Yung-feng, Chi
Prefecture (modern Chi-shui, Chiang-hsi), Ou-yang entered the
Imperial University after twice failing the prefectural
examinations and,
in 1030, distinguished himself by placing fourteenth in the
palace
32. examinations. In 1036, he was exiled and demoted for
supporting Fan
Chung-yen's criticisms; he was recalled in 1040 along with Fan
and
rose to become a drafting official because ofhis fame as a
writer. Fan
and his faction again fell from power in 1045. The following
year, Ou-
yang's reputation was damaged by a scandal in which he was
falsely
charged with incest and imprisoned; his known fondness for
singers
and writing romantic poetry may have made him particularly
vulnerable to such charges. After his acquittal, he was once
again exiled
and made prefect of Ch'u Prefecture (modern Ch'u District, An-
hui),
where he wrote The Pavilion of the Old Drunkard, one of his
most
enduring works. Ou-yang Hsiu subsequently served as prefect of
Yang-chou, where he revived his romantic reputation, as well as
prefect ofYing Prefecture (modern Fu-yang, An-hui), a scenic
area
where he later retired. He returned to the capital in 1054 and
became
increasingly influential in the central government, rising to the
powerful position of assistant chief minister. During the
following
period of thirteen years he served as co-editor of The New
History of the
T'ang Dynasty (Hsin T'ang shu, 1060) and single-handedly
wrote The
New History of the Five Dynasties (Hsin Wu-tai shih,
posthumously 161
33. 162 OU-YANG HSIU
published in 1072) as models of the Ancient Style; both works
were
praised by literary stylists but later criticized by historians. He
further
consolidated the position of the Ancient Style when, as chief
examiner
in 1057, he required it in examination essays and failed those
who
wrote in other styles. It was through this examination that he
discovered Su Shih and Su Ch'e, destined to become leading
literary
figures of the next generation. Ou-yang Hsiu served in various
high-
level positions during the 106os, and his administration was
noted for
its stability and several progressive reforms. However, he was
again
falsely accused of incest, though again cleared. He repeatedly
requested
assignments away from the capital and finally, in 1071, was
allowed to
retire with the title of Junior Preceptor of the Heir Apparent.
Ou-yang Hsiu left over five hundred pieces of prose in a variety
of
forms, all characterized by a tight sense of structure. He was
also an
early proponent of the miscellany (pi-chi), producing several
influential collections as well as an early travel diary, Diary of
My Route
to Assume Office (Yii-i chih), written while journeying to a
new post to
which he was demoted in 1036. In The Pavilion of the Old
34. Drunkard, the
presence of parallelistic elements and syntactical repetitions
create a
sense of playfulness and humor reflecting the informality of the
piece.
Ou-yang was relatively unconcerned with the metaphysics of
Nature
or speculative philosophy; this piece reveals instead his
pragmatic
interest in concrete human activity and in the texture of the
observable
world. Its cumulative effect is to convey Ou-yang Hsiu's
undiminished
humanity and commitment while an official in exile.
The Pavilion of the Old Drunkard (Tsui-weng-t'ing) is located
on
Lang-ya Mountain in the southwest of modern Ch'u District,
An-hui,
about two miles from the city. It was ordered built by Ou-yang
Hsiu
himself, who had the monk Chih-hsien supervise its
construction on a
scenic spot next to a spring. The elegant open building has been
restored many times, and the area abounds in inscriptions dating
back
to the T'ang and Sung. Ou-yang's original calligraphy of the text
was
engraved at the site in 1048 but proved unsuitable for making
rubbings.
In 1091, Su Shih was asked to rewrite the text in larger
characters, and
this engraving was widely reproduced.
The Pavilion of the Old Drunkard !W- ~ .f~C. ( 1046)
35. Mountains ring the seat of Ch'u Prefecture. 1 The many peaks
on the
southwest are especially beautiful, with their forests and
valleys. I
OU-Y ANG HSIU 163
gazed into the distance at one that was luxuriant, deep, and
graceful-
Lang-ya Mountain. 2 I walked more than two miles up the
mountain
and gradually heard the gurgling sound of water, "ch'an-ch'an,"
until I
found, splashing out from between two peaks-Fermentation
Spring.
The peaks circled around me as the road twisted and turned
until there
was a pavilion with eaves like wings, facing the spring-the
Pavilion of
the Old Drunkard. Who built this pavilion? A monk on the
mountain
-Chih-hsien. Who named this pavilion? The Prefect did, after
himself.
For the Prefect comes here to drink with his guests. After
drinking
only a bit, he quickly becomes drunk, and because he is the
oldest,
he calls himself "the Old Drunkard." But wine is not uppermost
in the Old Drunkard's mind. What he cares about is to be amid
moun-
tains and streams. The joy of the landscape has been captured in
his
heart, and wine drinking merely expresses this.
36. When the sun appears, the mist disperses through the forest;
when
clouds return to the mountains, the caves in the cliffs darken.
These
transformations from brightness to darkness-such is dawn and
dusk
on the mountain. When wildflowers blossom giving off subtle
fra-
grances, when fine trees flourish providing extensive shade,
when the
wind is clean and the frost is pure, when the water is low and
the rocks
become visible-such are the four seasons in these mountains. If
one
comes here in the morning and returns in the evening, one will
notice
the scenes differing throughout the four seasons and experience
a joy
that is likewise inexhaustible.
Men bearing loads sing along the road, while travelers rest
under
the trees. Those in front call out; those behind respond. The
elderly,
hunched over ones leading the young by the hand as they come
and go
ceaselessly-these are the people of Ch'u on their outings. Along
the
stream they fish: the stream is deep, the fish, stout; they
ferment the
spring water into wine: the water is sweet, the wine, clear.
Various
kinds of mountain game and wild vegetables casually served-
such is
the Prefect's banquet. The gaiety of the feasting and drinking is
unaccompanied by strings or flutes. Someone wins at tossing
37. arrows
into a pot; another gains victory at chess. Winecups and wine
tallies
crisscross back and forth. Shouting out as they jump up or sit
down-
such is the happiness of all the guests. And the person with the
aged
face and whitened hair who sits slumped among them-the
Prefect,
drunk.
Before long, the sun sets behind the mountain; the people along
with their shadows disperse. The Prefect returns, followed by
his
guests. As the forest covers everything in darkness, cries ring
out all
over-such is the joy of the birds as the visitors depart. The birds
can
164 OU - YANC HSIU
only enjoy the mountains and forests: they cannot understand
the joy
of people. The people can only enjoy this outing along with the
Prefect: they cannot understand that the Prefect was enjoying
their joy.
He who, when drunk, was able to share their joy and, when
sober,
could describe it with literary flourish is-the Prefect. And who
is this
Prefect? Ou-yang Hsiu of Lu-ling. 3
38. Fig. 24.
Rubbing ofSu Shih's Inscription of Tile
Pavilion o_{joyful Abuuda/l(e (detail. original
ca. 1091 ) . From Su Shih, Fw,~-le-t'i11,~ chi
(rpt. Taipei, 1975).
OU-YANC HSIU 165
The Pavilion of]oyful Abundance t$.f"tC. (1046)
This piece was also written while Ou-yang Hsiu was exiled in
Ch'u
Prefecture. In contrast to the casual attitude of The Pavilion of
the Old
Drunkard, this is a more decorous composition meant to be
publicly
displayed as an explanation of the moral significance of the
pavilion's
name. It displays a historical sense of place, as well as loyal
political
sentiments. Ou-yang Hsiu contrasts the past, a long phase of
disorder
166 OU-YANG HSIU
and suffering, with the present state of peace and prosperity in
which
he implicitly participates. The theme of joyful abundance
enables him
to offer praise to the dynasty that was punishing him for his
views and
to articulate the Confucian virtues that would merit his recall to
39. the
capital. The pavilion at the foot of Mount Abundance (Feng-
shan) near
Lang-ya Mountain was also ordered built by Ou-yang Hsiu in
1046 in
order to celebrate the bountiful era. Standing beside a spring
surrounded by a tall peak and bamboo-covered hills, it became a
frequent destination for his excursions. The text was also
rewritten by
Su Shih and engraved at the site.
Only in the summer of the second year after I took office in
Ch'u
Prefecture was I able to taste the spring water hereabouts and
discover
its sweetness. When I asked a local person about it, I found that
it had
come from the south of the prefectural city, no more than a
hundred
paces away. Above it stood Abundance Mountain, 1 lofty and
strikingly
erect; below it was a secluded valley, remote and shady, and
hidden
deep. Between them was a pure spring overflowing and spurting
up-
ward. I gazed up and peered down to the left and right, and was
de-
lighted at what I observed. So I cut through the rocks to make a
path
for the spring, and cleared some land for a pavilion so that I
could
make excursions here along with the people of Ch'u.
Ch'u was a battlefield during the wars of the Five Dynasties.
Formerly, Emperor T'ai-tsu of the Sung2 led the army of the
Latter
40. Chou to defeat the 150,000 troops of Li Ching at the foot of
Pure
Stream Mountain. 3 He took prisoner Generals Huang-fu Hui
and Yao
Feng outside the East Gate of the city of Ch'u Prefecture, finally
pacify-
ing Ch'u. 4 I investigated the terrain, consulted maps and
records,
climbed up high to observe Pure Stream Pass, and sought to find
the
place where Huang-fu Hui and Y ao Feng were captured. But
there
were no living survivors, for it has been a long time since peace
was
established through the empire.
After the T'ang dynasty lost control, the entire land split apart.
Strongmen arose and fought each other. Were not those warring
king-
doms beyond counting? Then, when the Sung received the
Mandate of
Heaven, a sage arose and unified all within the four seas. 5 The
strategic
bases of those contenders have been demolished and leveled. A
century
later, all is peaceful: nothing remains except the tall mountains
and pure
streams. I wanted to inquire about these events, but the
survivors are
OU-Y ANG HSIU I67
all gone now. Nowadays, Ch'u Prefecture is located between the
Long
41. and Huai rivers, yet merchants and travelers do not come here.
The
people are unaware of events outside and are content with
farming and
providing clothing and food so that they are happy in life and
provided
for in death. But who among them realizes that it is the
achievements
and virtue of Our Sovereign which has allowed them to thrive
and
prosper, flourishing for as long as a century?
When I came here, I was delighted by the isolation of the place
and
the simplicity of official business. I was especially fond of the
relaxed
way oflife. So, ever since discovering this spring in a mountain
valley,
I have come here daily together with the people of Ch'u to look
up-
ward and gaze at the mountain and to peer down to listen to the
spring.
I gather hidden flowers and seek shade under the lofty trees. I
have
visited it in wind, frost, ice, and snow, when its pure beauty is
revealed.
The scenery during the four seasons is always charming.
Moreover, it
is fortunate that the people are joyful over the abundant
harvests and
are happy to travel here together with me. I have used this
landscape to
praise the excellence of their customs so as to remind the people
that
they can rest content in the joy of this year's abundant harvest,
because
42. they are fortunate enough to live during a time free from
trouble.
To proclaim the benevolence and virtue of Our Sovereign and
share
the joy of the people is the duty of a prefect. Thus, I have
written this
account and named the pavilion after this.
WRITTEN BY OU-YANG HSIU, EXHORTER ON THE RIGHT,
PROCLAMATION
DRAFTER, AND PREFECT OF CH'U AND CHUN
PREFECTURES, IN THE SIXTH MONTH
OF THE YEAR PING-HSU DURING THE CH'ING-LI ERA
[JULY-AUGUST I046) 6
2I
Su Shih (1037-1101)
Su Shih, widely known by his artistic name, Tung-p'o (Eastern
Slope),
became one of the dominant figures in Chinese literati culture,
influencing not only prose and poetry but aesthetic theory,
painting,
and calligraphy as well. He was born into a gentry family
oflimited
means and educated primarily by his father, Su Hsiin (1009-
1066), later
famous as a political essayist, and also by his mother, nee
Ch'eng. He
and his younger brother, Su Ch'e, were regarded as newly
43. discovered
talents after passing the Presented Scholar examination in 1057
under
Ou-yang Hsiu. In 1061, Su Shih passed the special examination
held to
recruit new officials and began his career as a case reviewer at
the Court
of Judicial Review. During these early years, he wrote
numerous
memorials identifying critical national problems in areas of
finance and
military defense. Although interested in reform, he opposed
Wang An-
shih's New Policies, objecting to the dislocation caused by their
rapid
implementation and Wang's use oflegalist methods. In 1079, Su
was
arrested in a "literary inquisition" for allegedly defaming the
court in
one of his poems. After several months of investigation, he was
released, demoted to the nominal post of assistant military
training
commissioner, and exiled to Huang Prefecture in what is today
Hu-pei.
There, he wrote some of his best-known travel pieces while
continuing
to address current issues. Given a slight promotion to Ju
Prefecture in
1084, he passed through Nanking on his way and met Wang An-
shih,
with whom he continued to maintain cordial literary relations
despite
political differences.
Su Shih returned to the capital after the reversal ofWang's
policies
44. ~~
under the Empress Dowager Hsiian-jen, regent for the young
Emperor 183
184 S U SHIH
Fig . .z8.
Wu Yiian-chih (active late 12th cent. ), Red
C/!ff(detail). National Palace Museum, Taipei.
Che-tsung (r. I08s-noo), and served as a Han-lin Academician
when
the conservative party of Szu-ma Kuang gained power. He
angered
them, however, when he protested the indiscriminate
dismantling of
Wang's New Policies, with none of their beneficial aspects
preserved,
and was sent to administer Hang-chou in 1089. A series of other
local
posts followed in which he was able to institute progressive
changes
despite the reigning conservative atmosphere. In 1094 when the
Che-
tsung Emperor assumed personal rule, another faction
supplanted those
favored under the Empress Dowager, and Su Shih was again
exiled,
this time to remote Hai-nan Island in the south, where living
conditions were particularly severe. H ere, coo, he wrote travel
pieces,
which continued to express his acceptance of the vicissitudes of
45. life and
SU SHIH 185
a vitalistic engagement with his surroundings. Pardoned in 1100
upon
the accession of the Emperor Hui-tsung (r. II00-1125), he died
the
following year while on his way north.
Though an activist Confucian official, Su Shih was eclectic in
his
intellectual interests. He was deeply influenced by Ch'an
Buddhist
concepts of enlightenment, the mind, and human nature, and
searched
for transcendence through engagement with social reality and
the
natural environment. He was also enthralled by the mysterious
pageant
of universal transformation. Such themes as the equivalence of
objective and subjective viewpoints, the Tao as a ceaseless
alternation
between change and constancy, the affirmation ofhappiness in
this life,
equanimity toward fate, and unflagging curiosity about the
natural
world pervade his prolific writings. Su's shih poems alone
number
almost 2,8oo, of which those containing perceptions of Nature
and his
philosophical views have been the most widely read. His tz'u
poems,
numbering about 3 50, expanded the range of content in this
46. genre and
are considered innovative examples of an attitude of "heroic
abandon"
(hao1ang). One of the Eight Masters ofT'ang and Sung Prose, Su
was
further canonized by the literary tradition as the personification
of the
Northern Sung zeitgeist, an expansive, optimistic personality
who later
was celebrated in drama, painting, and the decorative arts.
As a travel writer Su employed a variety of forms such as
letters, ju
rhapsodies, travel records, random notes, and prefaces. His two
pieces
on Red Cliff were written during his exile in Huang Prefecture.
The
first is perhaps the best-known work of Chinese travel writing.
In it,
Su Shih achieved an optimistic solution to a lyric vision
imperiled by an
awareness of tragic history. His mood shifted in the second
piece to a
sober recognition of Nature's awesome power and the limits
ofhuman
ambition. Yet even here he concluded with an affirmation of the
possibility of transcendence. Together, these pieces became
monuments
of Chinese literature and art, establishing the place as a literary
shrine.
Red Cliff I "ff.r~5! ~ (1082)
In the fall of the year jen-hsii in the seventh month on the day
after the
moon had reached its height [August 12, 1082], I traveled in a
47. boat
with some guests to the foot of Red Cliff. 1 A light wind wafted
by, and
not a ripple was stirred. I poured wine for my guests as we
chanted the
poem about the bright moon and sang the song about the
graceful
186 SU SHIH
maiden. 2 Before long, the moon appeared over East Mountain
and
lingered by the constellations Dipper and Ox. 3 White dew
extended
over the Long River; the water's gleam mingled with the sky.
We let
this reed of a boat follow its course as it traversed an expanse
of
myriad ch'ing. I felt boundless, as if gliding through the void
not know-
ing where I might land; I felt like I was soaring about, having
left the
world behind to stand alone as I sprouted wings to become a
Transcen-
dent.
Then we drank more wine and reached the height of joy. I beat
out
a rhythm against the side of the boat and sang:
Cassia-wood oars,
Magnolia-wood rudder,
Stroke the moon's pure reflection
As we glide upstream on its shimmering light.
48. Ever distant, the object of my longings.
I gaze at the beautiful one
In a faraway corner ofHeaven.4
One of the guests could play the flute and accompanied my
song. 5
Yet his sounds-"wu-wu"-were plaintive, yearning, weeping,
accus-
ing. The lingering notes meandered through the air, drawn out
like
silken threads. They would have aroused a submerged chiao-
dragon to
whirl around in the cavernous depths, and caused a widow to
weep in
her lonely boat.
I was saddened. Straightening my clothes, I sat up and asked my
guest, "Why are you playing this way?" He replied,
" 'The moon is bright, stars are few
Crows and magpies are flying south. '6
"Isn't this from the poem by Ts'ao Ts'ao? Westward is Hsia-
k'ou; to
the east lies Wu-ch'ang.7 The mountains and the river encircle
one
another; how dense the viridian growth! Yet, is this not the
place
where Ts'ao was trapped by Chou Yii?8 He had just conquered
Ching-chou and sailed down to Chiang-ling9 as he followed the
course
of the river eastward. His fleet stretched bow to stern for a
thousand li;
his banners and flags blotted out the sky. As he drank wine by
the bank
49. of the river, he lay down his lance and composed this poem.
Indeed, he
dominated his age, yet where is he now? And what about you
and me,
SU SHIH 187
conversing here by the riverbank like a fisherman and a
woodcutter,
joined by fish and shrimp with the deer as our companions? We
ride on
a boat no bigger than a leaf as we drink to each other out of
simple
gourds. We exist no longer than mayflies between Heaven and
Earth,
and are of no more consequence than a kernel in the vast ocean.
I grieve
that my life is but a moment and envy the Long River's endless
flow. If
only I could grasp hold of a flying Transcendent and wander
with him
through the Heavens to embrace the bright moon and live
forever. But
I realize this cannot be, so I confide these lingering sounds to
the sad
autumn wind."
I said, "Do you really understand the water and the moon? Here,
it
flows by yet never leaves us; over there, it waxes and wanes
without
growing or shrinking. If you look at things as changing, then
Heaven
and Earth do not last for even the blink of an eye. If you look at
50. them
as unchanging, then I along with everything am eternal. So why
be en-
vious? Moreover, each thing within Heaven and Earth has its
master. If
I did not possess it, then I would not take even a hair of it.
However,
the pure wind over the river becomes sound when our ears
capture it,
and the bright moon between the mountains takes on form when
our
eyes encounter it. There is no prohibition against our acquiring
them,
and we can use them without ever consuming them. They are
from the
inexhaustible treasury of the Creator-of-Things, which you and
I can
enjoy together."
My guest became happy and laughed. We washed out the cups
and
drank again. Soon the food was gone, and the cups and plates
were
strewn about. We lay down in the boat, leaning against each
other for
pillows, unaware that it was becoming light in the east.
Red Cliff II 1~*~~ (1082)
In the tenth month of the same year on the day the moon
reached its
height [November 7], I walked from the Snow Lodge back
toward
Lin-kao. 1 Two guests accompanied me as we crossed over Yell
ow Clay
Slope. Frost and dew had already fallen; the leaves had all
51. dropped off
from the trees. Our shadows lay on the ground as we gazed up at
the
bright moon. We looked around us, delighted by the scene, and
sang
songs for each other as we walked along.
After a while I sighed, "I have guests but no wine, and even if I
had
wine, there is no food to go along with it. The moon is white,
the
wind, gentle. But how can we enjoy such a fine evening?" One
of the
188 SU SHIH
guests replied, "Today at twilight, I cast a net and caught a fish
with
a large mouth and fine scales. It resembles a Pine River perch. 2
But
where can we obtain some wine?" I went back and discussed
this with
my wife, who said, "There are two gallons of wine which I have
been
keeping for some time in case you should ever need it."
So we took along the wine and the fish and traveled once again
to
the foot of Red Cliff. The river flowed vociferously, the cleaved
banks
rose a thousand ch'ih. The mountain was high, the moon small.
The
water level had fallen, rocks protruded. How long had it been
since my
52. last visit? The scene was no longer recognizable! I lifted up my
robe and
alighted. I made my way among sharp crags, parting the
overgrowth
to crouch on rocks shaped like tigers and leopards and to climb
up trees
twisted like horned dragons. I pulled myself up to the
precarious nests
of falcons and peered down at the hidden palace of the river god
P'ing
1. 3 My two guests were unable to follow me this far. I
suddenly let out
a sharp cry. The plants and trees were startled and shook;
mountains
resounded, valleys echoed. Winds arose, and the water became
agi-
tated. For my part, I became hushed and melancholy, then awed
and
fearful. Then I began to tremble so that I could no longer
remain there.
I returned, got back on board, and had the boat steered into the
main-
stream. We let it drift until it came to rest there.
By then it was toward midnight. All around us it was deathly si-
lent. Suddenly, a solitary crane came toward us across the river
from
the east. Its wings traced cartwheels in the air. It seemed
dressed in a
white jacket over a black gown, and let out a long, piercing cry-
"chia"-as it swept past our boat and headed west.
A short while later the guests left, and I fell asleep. I dreamed
of
two Taoists clothed in feathers, fluttering about. 4 As they
passed by
53. Lin-kao, they greeted me and asked, "Did you enjoy your
journey to
Red Cliff?" When I asked their names, they looked down
without
answering. "Oh! Now I understand! Last night, was it not you
who
called out as you flew by?" The Taoists looked back at me and
laughed.
And then I suddenly awakened. I opened the door and looked
outside
but saw no trace of them. 5
Stone Bells Mountain ;Gjj:J.dC. (1084)
In 1084, Su Shih was given a slight promotion and transferred
from
Huang Prefecture to Ju Prefecture. He traveled to his new post
by boat
along the Long River together with his son, Su Mai (1059-?),
stopping
25
Fan Ch'eng-ta (1126-1193)
~,. ...; ...l-
~~ nx.,. ~
Fan Ch'eng-ta, from P'ing-chiang, Wu-chiin (modern Su-chou,
Chiang-su), was born into an official family. At the age of
seventeen,
he was identified as a promising young talent and asked to
submit
poetry to the Ministry of Rites. In I I 54, he became a
Metropolitan
54. Graduate and, two years later, began serving in local posts. Fan
was a
dedicated Confucian official concerned with the welfare of the
people,
the military strengthening of the state, and the recovery of the
north
from the Chin dynasty. By 1166 he had quickly risen to the
position of
vice-director in the Ministry of Personnel, causing political
opponents
to claim that he had been promoted above his rank; he was
therefore
dismissed and sent home. After two years in retirement, he
returned to
office, gaining the confidence of the Emperor Hsiao-tsung (r. I
I62-
ll 89) as a member of the irredentist faction. He successfully
carried out
a diplomatic mission to the Chin in I I70, which resulted in the
first of
his travel diaries, Grasping the Carriage Reins (Lan-p'ei lu),
along with a
cycle of seventy-two poems on the events of this journey. He
subsequently lost power at court for opposing a favorite of the
emperor
and again retired in I I7I. Fan returned to public life in I I 73 to
serve in
Kuang-hsi; he recorded his investigations of the area around
Kuei-lin in
a local gazetteer and in another travel diary, Riding in the Luan-
bird
Chariot (Ts'an-luan lu, II73). The following year he served as
military
commissioner in Szu-ch'uan, where he employed Lu Yu.
Returning to
the capital in 1177, Fan took over the Ministry ofRites and, in
55. II78,
became Examination Administrator and Participant in
Determining
Government Matters, an important policymaking position. A
few
months later he was again impeached by a jealous censor. After
213
Fig. 34·
Sung Hsii (1 525- ?), Eyebrows Mou11tai11 After a
Snowfall (1605}. N anking Museum, Nanking .
FAN CH'ENG-TA 215
returning to government in I I So for one final period of service,
he
retired in n83 owing to ill health; he lived on at Stone Lake
(Shih-hu)
in the Su-chou area for another ten years.
Later canonized as one of the Four Masters of Southern Sung
poetry, Fan worked largely in the field-and-garden genre. He
brought
to its tradition of reclusiveness, assertion of moral purity, and
transcendental longings a thorough realism, conveyed through
objective observations about moral and social life in the
countryside.
Some poems have a quality of egoless impersonality and sudden
shifts
in perspective, reflecting his interest in Ch'an Buddhism. His
monumental Gazetteer of Wu-chiin (Wu-chiin chih, I I92-I I93)
was
56. considered a model work. In his lyric travel records, he was
influenced
by the descriptive style of Liu Tsung-yiian and the
philosophical
attitudes of Su Shih, particularly in two accounts of his outings
on
Stone Lake. Fan was also regarded as an outstanding
calligrapher.
Diary of a Boat Trip to Wu (Wu-ch'uan lu) was written
following
Fan Ch'eng-ta's service in Szu-ch'uan. InJune II77, he set out on
his
return to Hang-chou at a leisurely pace that enabled him to stop
at
scenic places along the river route. The following selection
describes
the IO, I65-foot Eyebrows Mountain (0-mei-shan), located in
modern
0-mei District, Szu-ch'uan. One of the four sacred mountains of
Buddhism in China, its patron being the Bodhisattva
Samantabhadra, it
has been a site of religious pilgrimage since the T'ang. Even
earlier,
during the Eastern Chin, the calligrapher Wang Hsi-chih had
viewed it
from a nearby mountain and praised its beauty. Fan moored his
boat at
Chia Prefecture (modern Le-shan, Szu-ch'uan) and spent three
days
making the seventeen mile ascent to the summit, where pilgrims
and
sightseers could visit an ancient shrine and view "Buddha's
Halo." His
descriptive style is clear and reportorial, revealing his curiosity
about
57. the observable world and his interest in "the classification of
things";
some of his explanations of natural phenomena, though, would
be
considered unscientific today.
From Diary of a Boat Trip to Wu: Eyebrows Mountain
~4ltr~:"'lt.vQ J4 (1177)
On the day i-wei [July 24, 1177], the sky cleared after a
snowfall ....
We passed New Station, Eighty-four Slopes, and Sala Plateau. 1
The
wood and leaves of the sa/a-tree resemble the hai-t'ung, and it is
also like
the yang-mei. 2 Its flowers are red and white, blossoming in
spring and
216 FAN CH'ENG-TA
summer. It grows only on this mountain. I saw them as soon as I
climbed halfway up, but when I reached this point, they covered
the
whole mountain. In general, all the plants, trees, birds, and
insects on
Greater Eyebrow Peak differ from those found in the world
below.
Previously, I had only heard descriptions of them; now I have
been able
to investigate them for myself. I came in the last month of
summer. 3
Several days before, there was a heavy snowfall, and there were
still
58. fresh traces of it on the tree leaves. Among the rare plants, there
is one
that resembles the Eight Transcendents hydrangea, except that it
is a
deep purple. Another is like the morning glory, but several
times
larger. Yet another resembles smartweed but is a pale green. I
have
heard that rare flowers are especially plentiful in spring, but at
this sea-
son it is cold on the mountain and few can be seen. As for rare
herbs,
there are so many I could not enumerate them all. The mountain
is
high and windy, so trees cannot grow tall. Their branches all
hang
downward. Old moss clings to the trees like disheveled hair,
hanging
down several tens of feet and touching the ground. There is also
the
pagoda pine, shaped like a fir but with leaves that are round and
small.
It, too, cannot attain great height but grows erect in stages, like
a pa-
goda. They are especially plentiful on the summit. Furthermore,
there
are no birds at all, probably owing to the mountain's elevation,
for they
cannot fly this high.
From Sala Plateau I passed the Pavilion for Contemplating
Buddha,
Soft-Grass Plateau, and the Stream for Cleansing Feet before
finally
arriving at the Temple of the Brilliant Image on the summit.
Though it
59. contains several tens of wooden chambers, no one lives there. In
the
middle is a small chapel dedicated to the Bodhisattva
Samantabhadra. 4 I
began the climb at the beginning of the hours of mao [5 :oo-
7:00 A.M.];
now, it was already past shen [3:oo-s:oo P.M.]. At first I wore
summer
linen, but it gradually grew colder as I ascended. At Eighty-four
Slopes, it suddenly became quite cold. And when I reached the
sum-
mit, I had to quickly don a double layer of silk-padded clothes
as well
as a woolen gown and a camel-hair jacket. This exhausted the
clothing
I had brought along in the trunks. I wrapped a turban around my
head
in several layers and put on felt boots. Still, it was shiveringly
cold,
quite unbearable. So I burned charcoal in a brazier, which I
clutched as
I sat up straight. There is a spring on the summit, but the water
cannot
boil rice. The kernels remain hard like grains of sand. I knew
that water
from ancient ice and snow cannot be used to cook with, 5 so I
had a jar
of water brought along from down below, and this was enough
to sus-
tain me.
FAN CH'ENG-TA 217
A while passed, then I braved the cold and went up over the
60. Bridge
of the Celestial Transcendent to Brilliance Cliff, where I lit
some
incense. The chapel there is covered with a roofing of bark. The
Vice-Grand Councillor Wang Chan-shu6 once had the roof tiled,
but
the snow and frost seeped in and within a year the tiles had all
cracked.
Later it was reroofed with bark that at least lasts for two to
three
years. Someone said to me, "Buddha's Halo always appears at
the hours
of wu [u:oo A.M.-I:oo P.M.]. Now it is past shen [3:oo-s:oo
P.M.]. We
had better return to our lodgings and come again tomorrow."
While
we were hesitating, suddenly clouds arose below the cliff from a
valley
to the side, just where Thunder Cave Mountain is located. The
clouds
paraded by vigorously like an honor guard. When they
encountered the
cliff, they paused for a short while. From the top of the clouds,
a grand
halo appeared containing several rings of various colors. I stood
exactly
opposite it and saw an inky shadow in its center, like a
Transcendent or
a sage astride an elephant. 7 In the time it would take to drink a
cup of
tea, the halo vanished, while beside it appeared another halo
just like
the one before. It, too, vanished after a while. From the clouds
there
then appeared two rays of golden light, which extended along
the waist
61. of the cliff. People call it the "Lesser Manifestation." By sunset,
the
clouds had all dispersed, and the surrounding mountains became
quite
tranquil. By the second night watch [9:oo-u:oo P.M.], lights
appeared
all over below the cliff. When viewed from a distance, they
seemed to
number in the many hundreds, perhaps even a thousand. At
night, the
cold was intense; I could not stand outside for long.
The next day, ping-shen [July 25], I again ascended Brilliance
Cliff
for the view. Behind the cliff were the many layers of the
Mount Min
range. Slightly to the north was Tiled House Mountain, located
in Y a
Prefecture. 8 A bit to the south was Greater Tiled House
Mountain,
close to the area of Nan-chao. 9 Its shape looked just like a one-
room
house with a tiled roof. There was also a halo at Lesser Tiled
Roof
Mountain, known as the "Manifestation of Self-Enlightenment. "
10 Be-
hind these mountains are the Snowy Mountains of the Western
Re-
gion.11 Lofty, rugged, carved, sliced; scores, perhaps a hundred
peaks in
all. When the rising sun first illuminates them, the snow
glistens like
shiny silver, shimmering in the light of the dawn. From
antiquity to
the present, this snow has never melted. These mountains
extend all
62. the way to the land of India and to tributary kingdoms along the
border
for a distance of I don't know how many thousands of li. It
looks
like it is spread out on a table before one. This spectacular,
unique,
unsurpassable view was truly the crowning one of my entire
life.
218 FAN CH'ENG-TA
I returned to the chapel on the cliff to offer up a prayer. Soon, a
dense mist arose on all sides, blending everything into a single
white-
ness. A monk said to me, "This is the 'Silvery World."' After a
while,
a heavy rain fell and the mist dispersed. The monk said, "This is
the
'Rain That Cleanses the Cliff.' 'Buddha's Halo' is about to
appear."
Flossy clouds once again spread out below the cliff, billowing
upward
until they reached only several tens of feet below the top. The
clouds
smoothed themselves out like a floor of jade. There was a
sudden rain,
and droplets flew about. I looked down at the middle of the
cliff-
there was a large halo lying on top of the smooth clouds.
Encircling it
were three rings, each containing blue, yellow, red, and green
colors.
The center of the halo was empty, bright, dense, and clear. Each
ob-
63. server could see his form appear in the empty, bright area
without the
slightest degree of obscurity, just like a mirror. When one
raised one's
hands and moved one's legs, the reflection indicated this
without show-
ing anyone else's form. The monk said, "This is the 'Halo That
Captures
the Body.'" When this halo vanished, winds arose from the
mountains
in front and the clouds quickly drifted away.
From the midst of the wind and clouds appeared yet another
large
halo. It stretched across several mountains and contained many
unusual
hues, all gathered together in a multicolored light. Peaks,
plants, and
trees were so fresh, gorgeous, brilliant, and glittering that I
couldn't
look at them directly. When the clouds and mist dispersed, this
halo
remained to shine alone. People call it the "Pure Manifestation."
When
Buddha's Halo is about to appear, clouds must gather first,
forming
what is known as the "Flossy World." It is from out of these
clouds
that the halo appears. But when it appears without the help of
clouds, it
is called a "Pure Manifestation" and is extremely rare. After the
time it
would take to have a meal, the halo gradually shifted westward
past the
mountain. I glanced to the left above Thunder Cave Mountain
and
64. again saw a halo just like the one before, only slightly smaller.
After a
moment it, too, flew off beyond the mountain, moving over
toward
the plateau, where it hovered just opposite the cliff. Its colors
had all
changed, and it became the "Golden Bridge," similar to the
Rainbow
Bridge over the Wu River12 except that the two ends of this
"bridge"
were supported by purple clouds. Between the hours of wu [I I
:oo
A.M.-I:oo P.M.] and wei [1:oo-3:oo P.M.] the clouds all
disappeared, and
this is called "The Final Scene at the Cliff." Only Golden
Bridge re-
mained visible until after yu [s:oo-7:oo P.M.], when it vanished.
13
26
Chu Hsi (11J0-12oo)
Chu Hsi was the major formulator ofNeo-Confucianism, which
absorbed concepts of metaphysics and consciousness from
Buddhism
and Taoism into traditional Confucian ethics. His
comprehensive views
on the classics were accepted as orthodox thought by the end of
the
Southern Sung and became the basis of the examination system
when it
was reinstated in the late Yiian. During the Ming and Ch'ing
dynasties,
65. he was canonized as a Sage and sacrificed to in temples along
with
Confucius and Mencius. His career, however, followed a pattern
similar to that of many officials: public service in a variety of
offices
alternating with periods of political disfavor. While he lived,
there was
little indication of the extraordinary veneration he was to be
accorded
throughout the later Chinese empire.
Chu Hsi grew up in Ch'ung-an, Chien-yang, in what is today Fu-
chien, in an official family originally from Chiang-hsi. His
father was
demoted for opposing Ch'in Kuei's appeasement policies and
died
when Chu Hsi was fourteen; subsequently, Chu Hsi continued to
espouse his father's patriotic views and suffered similar
punishments
during his own career. He earned the Metropolitan Graduate
degree in
1 148 and began to serve in local positions. Meanwhile, he
attracted
disciples and developed his own program of Confucian
education. In
1163, under Emperor Hsiao-tsung, he was granted an audience
and
argued for war against the Chin. Though appointed to a number
of
positions both in the provinces and in the capital, he often
refused to
accept appointments because of policy differences, or served
only
briefly before retiring or being demoted. During a fifty-year
career, he
spent only nine years in office and about forty days at court.
66. His
~~
influence was greater through the educational institutions he
sponsored. 219
Fig. 35·
Portrait ofChu Hsi. (n.d .) National Pa lace
Museum , Taipei.
CHU HSI 221
He helped to restore the White Deer Cave Academy in I I79
while
serving in Chiang-hsi and the Academy at the Foothills of the
Sacred
Mount in I I94 while serving as military commissioner in Hu-
nan. By
the end of his career in I I95 he had become an edict attendant
in the
Han-lin Academy, but, after angering the powerful official Han
T'o-
chou, he was finally impeached. His remaining years were spent
back
in Chien-yang writing and teaching.
Chu Hsi's aesthetics asserted the absolute identity ofliterature
and
the Tao, in contrast to more conventional formulations, which
saw
writing as but an expression or vehicle of the Tao. For Chu Hsi,
67. they
were one and the same, unified through the moral cultivation of
the
individual. Similarly, he espoused the view, stated in the "Mao
Preface" to The Book of Poetry, that poetry was simply the
expression of
the moral will. His poems, for which he achieved some note,
conveyed
an archaistic temperament, employing few allusions or metrical
intricacies in favor of direct, uncomplicated emotions and
objective
observations of the world. His prose, as might be expected, was
largely
didactic and pragmatic. Among the more influential texts
associated
with him is the Collected Sayings of Master Chu (Chu-tzu yii-
lei), which
transmitted his remarks on philosophy and literature. It came to
be
looked upon as a literary model for its inclusion of colloquial
elements
that captured a sense of actual speech.
The following travel piece is undated, but it must have been
written
before 1185, when one ofhis traveling companions, Liu P'ing-fu,
died.
That it has been often anthologized is probably due to the
prestige of
the writer, for it is a conventional, though well-wrought, travel
account. Like many travel narratives, it was originally written
in
conjunction with poems. Chu Hsi represented his experience of
a
journey as a linear progress through a world of concrete
appearances
68. and sensations with only brief autobiographical and lyric
elements. The
piece reveals a restrained imagination focused on "the
classification of
things," recording immediate observations of the environment.
The Mountain a Hundred Chang High a~ J.i ~C.
After ascending the Mountain a Hundred Chang High 1 for
about a
mile, I peered down to the right at a deep valley and braced
myself on
the left against an overhanging cliff. Stones had been stacked to
form
stairs. I climbed all ten or so of them. The scenic beauty of the
moun-
tain began from here.
222 CHU HSI
I followed more stairs eastward and encountered a small stream;
a
rock bridge spanned it. Everywhere were aged vines and ancient
trees.
Although it was the height of summer, it was not hot, even at
noon-
time. The water was completely clear and deep. It splashed
down from
higher up with splattering sounds-" chien-chien." I crossed the
rock
bridge, followed alongside two cliffs, winding my way higher
until I
reached the outer gate of a temple. It was a small building with
three
69. rooms, hardly capable of accommodating ten or so people. Still,
from
the front it surveyed the stream below; in back, it faced a rock
pond.
Wind comes wafting through two gorges all day long without
respite.
Inside the gate, one passes over a pond by another rock bridge.
Cross-
ing it and turning northward, I climbed up many stone steps to
arrive
at the temple. The temple itself was an old building of several
rooms-
small, low, cramped, and narrow-not much to look at. Only its
west-
ern pavilion offered a scenic view. Water flows out from the
valley to
the west, then through a fissure in the rock, and shoots out from
be-
neath the pavilion. Southward, it meets the stream from the
valley to
the east and flows into the pond. When it leaves the pond, it
becomes
the small stream mentioned earlier. The pavilion occupies a
position
upstream, just where the onrushing water and steep rocks
confront
each other, a most enjoyable site. But a wall was built behind it,
so
there is nothing further to see. I spent the night upstairs in the
pavilion
alone. Below my bed was the gurgling of water-"chan-chan"-
throughout the evening. After a long while, the sounds became
in-
creasingly melancholy; it was all quite charming.
Exiting through the temple gate eastward ten or so paces, I
70. came
upon a rock terrace. Below, it extended to a steep cliff, which
was deep,
dark, dangerous, and inaccessible. I gazed to the southeast
through
a dense grove and saw a cascade from a rock cave in front shoot
out
into the air and then drop down for several tens of feet. The
foam was
like scattering pearls and exhaled mist: as the sunlight
illuminated it,
the luster was so striking that I couldn't look at it directly. The
terrace
occupies an open spot on the southwest of the mountain. In
front it
greets Reed Peak Mountain, 2 whose single peak soars
handsomely
while for several hundred li about peaks and pinnacles, high and
low,
one by one, are displayed before one's eyes.
As the sun drew near to the mountains on the west, its twilight
rays
glowed across the sky. Purple and emerald green intermingled-
an in-
describable sight. When I arose at dawn and looked down
below, white
clouds formed a river rising and falling like waves in the ocean.
All the
mountains, far and near, protruded through the middle. They
seemed
CHU HSI 223
71. to fly and float, back and forth, now surging, now engulfed. In
but a
short while, a myriad transformations occurred. East of the
terrace, the
path ended. Local people have cut stairs into the rock in order
to pass.
They have placed a shrine to the east of it. In times of drought,
they
offer up prayers to it. Those who are frightened by the
dangerous
steepness dare not cross, though beyond this point there is
nothing
more worth viewing on the mountain anyway.
I traveled here with Liu Ch'ung-fu, Liu P'ing-fu, 3 Lii Shu-
ching,
and my cousin Hsii Chou-pin. We all wrote poems to mark the
scenic
spots. I also wrote this description of the sequence of sights.
Those
most worth viewing are the stone stairs, the small stream, the
temple
gate, the rock terrace, the West Pavilion, and the cascade.
Because these
places are so distinctive, I composed a short poem to record
each one
and offer them to my fellow travelers as well as to those who
would
like to journey here but cannot.
RECORDED ON THE-- DAY, IN THE __ MONTH OF THE--
YEAR4
72. COMP 3004 – cuACS Deliverable #2
Due: Tuesday, March 5, 2019 at 8:30 AM (morning)
Algorithm Design Document
You will design your Animal-Client Matching (ACM)
algorithm, as specified in the project description posted
in cuLearn, and you will provide a PDF document that describes
it. Your document will define, explain, and
justify the following:
• a minimum of twelve (12) separate and original non-physical
attributes to be used by your algorithm
for matching animals available for adoption with the clients
who wish to adopt them
NOTE: a large proportion of binary attributes, such as those
with yes/no values, will result in an
algorithm that is insufficiently original and complex, and will
likely earn a failing grade
• the valid range of values for each attribute
• a unique set of rules for matching together animal and client
profiles, based on the attributes
contained in those profiles; the rules must use all the attributes
that you define, including a client’s
own attributes and their matching preferences
• a description of the algorithm detailing how the rules are used
to compute the optimal set of matches
Your algorithm will be evaluated based on the variety,
originality, complexity, and appropriateness of its
73. matching rules and attributes.
Algorithm Design Presentation
Presentations discussing each team’s ACM algorithm will take
place in class on March 5, 7, 12, 14, and
possibly into March 19. The projected date each team’s
presentation will be decided a few days in advance,
but the exact time will be random. All teams are expected to be
in the classroom at the start of their
presentation day. Each team will be given five (5) minutes to
explain and justify their algorithm, including
their choice of attributes and matching rules.
Each team will submit their presentation slides in cuLearn
before the Deliverable #2 due date. Modifications
to the presentation slides after the due date and time will be
disallowed.
Feature Implementation
You will implement the following cuACS features, as specified
in the project description posted in cuLearn:
• Staff/client feature: View all animals (listing and detailed
information)
• Staff feature: Add animal, with all the animal profile
information required by the ACM
algorithm
• Staff feature: View all clients (listing and detailed
information)
• Staff feature: Add client, with the basic contact information
74. Your submission must contain a minimum of 25 different
animal profiles and 5 client profiles in persistent
storage. These profiles must be loaded into memory when the
program launches. The animal profiles must
include values for all physical attributes, as well as all the
attributes defined for the ACM algorithm. The client
profiles must include the basic contact information.
COMP 3004 -- Winter 2019 cuACS -- Deliverable #2 1/2
Grading
Grading breakdown:
• Algorithm design document: 40%
• Algorithm design presentation: 20%
• Feature implementation: 40%
View all animals (staff/client) 10%
Add animal 10%
View all clients 10%
Add client 10%
Format
Documentation deliverables must be submitted as a PDF
document. They must be typed and legible,
and they must be professional documents, including a cover
page, page numbers, table of contents,
75. table of figures, section numbers and names, etc. All diagrams
and tables must be introduced and
explained in the text. All the text must be in your own words.
Copying or pasting from any sources,
even cited ones, is strictly disallowed. Documents that do not
conform to these specifications will not be
graded.
Coding deliverables must be delivered as a single tar file
consisting of all source code, data files, and
configuration scripts, as well as installation, build, and launch
instructions in a readme file. Do not
provide object files and project executables as part of your
submission. Coding submissions that cannot
be downloaded into a fresh directory and un-tar’ed, then
successfully built with a single command in the
course VM, and successfully launched with a single command in
the course VM, will not be graded.
Submissions without a readme file to explain installation, build,
and launch instructions will not be
graded.
COMP 3004 -- Winter 2019 cuACS -- Deliverable #2 2/2
./addnewanimalform.cpp
#include "addnewanimalform.h"
#include "iostream"
AddNewAnimalForm::AddNewAnimalForm(QWidget *parent) :
QDialog(parent),
ui(new Ui::Dialog)
{
ui->setupUi(this);
76. nameBox = new QLineEdit();
speciesBox = new QLineEdit();
ageBox = new QLineEdit();
ageBox->setValidator(new QIntValidator());//Only ints
allowed
weightBox = new QLineEdit();
weightBox->setValidator(new QIntValidator());//Only ints
allowed
sizeBox = new QLineEdit();
colorBox = new QLineEdit();
genderBox = new QComboBox(); //Set up the options for the
drop-down menu
QStringList genderOptions = QStringList();
genderOptions << "Male" << "Female";
genderBox->addItems(genderOptions);
//Now that we've created all the input fields, we add them to
the form
ui->addForm->addRow(QString("Name:"), nameBox);
ui->addForm->addRow(QString("Species:"), speciesBox);
ui->addForm->addRow(QString("Gender:"), genderBox);
ui->addForm->addRow(QString("Color:"), colorBox);
ui->addForm->addRow(QString("Age:"), ageBox);
ui->addForm->addRow(QString("Weight(g):"), weightBox);
ui->addForm->addRow(QString("Size:"), sizeBox);
}
AddNewAnimalForm::~AddNewAnimalForm()
{
delete nameBox;
delete speciesBox;
delete genderBox;
delete colorBox;
delete ageBox;
delete weightBox;
delete sizeBox;
77. delete ui;
}
void AddNewAnimalForm::accept()
{
std::string name = nameBox->text().toStdString();
std::string species = speciesBox->text().toStdString();
std::string color = colorBox->text().toStdString();
std::string age = ageBox->text().toStdString();
std::string weight = weightBox->text().toStdString();
std::string gender = genderBox->currentText().toStdString();
std::string size = sizeBox->text().toStdString();
//If all of the fields hold a value, we create a new animal and
emit the addNew signal
if (!name.empty() && !species.empty() && !color.empty()
&& !age.empty() && !weight.empty() && !gender.empty() &&
!size.empty()) {
Animal * newAnimal = new Animal(name, species, color,
std::stoi(age), std::stoi(weight), gender, size);
emit addNew(newAnimal);
}
//Either way we close the panel
emit closePane();
close();
}
void AddNewAnimalForm::reject()
{
emit closePane();
close();
}
./addnewanimalform.h
#ifndef ADDNEWANIMALFORM_H
78. #define ADDNEWANIMALFORM_H
#include <QWidget>
#include <QDialog>
#include <QLineEdit>
#include <QComboBox>
#include "ui_addnewanimalform.h"
#include "animal.h"
//This is the class for the form that pops down when you click
File > Add Animal. addnewanimalform.ui is the .ui file which
corresponds to it.
class AddNewAnimalForm : public QDialog
{
Q_OBJECT
public:
explicit AddNewAnimalForm(QWidget *parent = nullptr);
~AddNewAnimalForm();
signals:
void addNew(Animal * animal);//Sent when the user hits
'OK' and successfully adds an animal to the program
void closePane();//Sent when the user closes the form by any
means
public slots:
void accept(); //Received when the user hits the OK button
void reject(); //Received when the user hits the Cancel button
private:
Ui::Dialog *ui;
//We add these widgets to the FormLayout located in ui, and
get user input from them.
QLineEdit * nameBox;
QLineEdit * ageBox;
QLineEdit * colorBox;
QLineEdit * weightBox;
QLineEdit * sizeBox;
QLineEdit * speciesBox;
81. ./animal.cpp
#include "animal.h"
Animal::Animal(int id, std::string &name, std::string &species,
std::string &color, int age, int weight, std::string &gender,
std::string &size):
id(id),
name(name),
species(species),
color(color),
age(age),
weight(weight),
gender(gender),
size(size)
{
}
//This constructor is for brand-new animals, for whom we don't
have a database ID yet. We set the id to -1 so that we know to
assign the proper id later.
Animal::Animal(std::string &name, std::string &species,
std::string &color, int age, int weight, std::string &gender,
std::string &size):
Animal(-1, name, species, color, age, weight, gender, size)
{
}
std::string Animal::getName()
{
return name;
}
84. //We can only set the ID if the current ID is less than 0
(meaning, is not a valid database ID)
if (id < 0) {
id = value;
}
}
./Animal.db
./animal.h
#ifndef ANIMAL_H
#define ANIMAL_H
#include<string>
//A class representing a generic animal. Will probably see
significant restructuring as the project continues. Right now,
just a container for attributes.
class Animal
{
public:
Animal(int id, std::string & name, std::string & species,
std::string & color, int age, int weight, std::string & gender,
std::string & size);
Animal(std::string & name, std::string & species, std::string
& color, int age, int weight, std::string & gender, std::string &
size);
std::string getName();
std::string getSpecies();
std::string getColor();
int getAge();
int getWeight();
std::string getGender();
std::string getSize();
void setName(const std::string &value);
86. storedParent = parent;
animals = std::vector<Animal *>();
}
AnimalTableModel::~AnimalTableModel()
{
foreach (Animal * animal, animals) {
delete animal;
}
}
int AnimalTableModel::rowCount(const QModelIndex &parent)
const
{
return animals.size();
}
int AnimalTableModel::columnCount(const QModelIndex
&parent) const
{
return 2;
}
QVariant AnimalTableModel::data(const QModelIndex &index,
int role) const
{
if (role == Qt::DisplayRole)
{
if (index.column() == 0) {
auto name = animals[index.row()]->getName().c_str();
return QString("%1").arg(name);
} else if (index.column() == 1) {
auto species = animals[index.row()]-
>getSpecies().c_str();
return QString("%1").arg(species);
}
87. }
return QVariant();
}
QVariant AnimalTableModel::headerData(int section,
Qt::Orientation orientation, int role) const
{
if (role == Qt::DisplayRole)
{
if (orientation == Qt::Horizontal) {
switch (section)
{
case 0:
return QString("Name");
case 1:
return QString("Species");
}
}
}
return QVariant();
}
void AnimalTableModel::addItem(Animal *item)
{
//If the animal's ID is less than or equal to zero, it is not yet
in the database, so we add it and retrieve the new ID#.
if (item->getId() <= 0) {
SqlHandler::addNew(item);
}
beginInsertRows(QModelIndex(), animals.size(),
animals.size());
animals.push_back(item);
insertRows(animals.size(), 1);
endInsertRows();
88. }
//Not currently used, database not supported, largely untested
void AnimalTableModel::removeItem(Animal *item)
{
int index = -1;
for (unsigned int i = 0; i < animals.size(); i++) {
if (animals[i]->getName() == item->getName()) {
index = i;
}
}
if (index < 0) {
return;
}
animals.erase(animals.begin() + index);
}
std::vector<Animal *> AnimalTableModel::getAnimals()
{
return animals;
}
./animaltablemodel.h
#ifndef ANIMALTABLEMODEL_H
#define ANIMALTABLEMODEL_H
#include <QAbstractTableModel>
#include "animal.h"
#include "sqlhandler.h"
#include <vector>
89. //The Model for the table containing the animals. Displays the
name and species, and stores the rest of the data for display
elsewhere
class AnimalTableModel : public QAbstractTableModel
{
Q_OBJECT
public:
AnimalTableModel(QObject *parent);
~AnimalTableModel();
int rowCount(const QModelIndex &parent = QModelIndex())
const ;
int columnCount(const QModelIndex &parent =
QModelIndex()) const;
QVariant data(const QModelIndex &index, int role =
Qt::DisplayRole) const; //Function which defines the output to
the table
QVariant headerData(int section, Qt::Orientation orientation,
int role) const;
void removeItem(Animal * item); //We have the capability to
remove objects from the table but it is not currently used and
does not remove from the database
std::vector<Animal *> getAnimals();
public slots:
void addItem(Animal * item); //Adds an animal to the table
and database
private:
std::vector<Animal *> animals; //A vector containing all of
the animals in the table
QObject *storedParent; //We store the parent of the model;
not currently used
};
#endif // ANIMALTABLEMODEL_H
./cuACS.pro
90. #-------------------------------------------------
#
# Project created by QtCreator 2019-02-08T23:09:20
#
#-------------------------------------------------
QT += core gui sql
greaterThan(QT_MAJOR_VERSION, 4): QT += widgets
TARGET = cuACS
TEMPLATE = app
# The following define makes your compiler emit warnings if
you use
# any feature of Qt which has been marked as deprecated (the
exact warnings
# depend on your compiler). Please consult the documentation
of the
# deprecated API in order to know how to port your code away
from it.
DEFINES += QT_DEPRECATED_WARNINGS
# You can also make your code fail to compile if you use
deprecated APIs.
# In order to do so, uncomment the following line.
# You can also select to disable deprecated APIs only up to a
certain version of Qt.
#DEFINES +=
QT_DISABLE_DEPRECATED_BEFORE=0x060000 #
disables all the APIs deprecated before Qt 6.0.0
SOURCES +=
main.cpp
mainwindow.cpp
106. docker = new QDockWidget(QString("Add New"), this);
AddNewAnimalForm * form = new
AddNewAnimalForm(this);
docker->setWidget(form);
connect(form, SIGNAL(addNew(Animal *)), model,
SLOT(addItem(Animal*)));
connect(form, SIGNAL(closePane()), this,
SLOT(removeDocker()));
addDockWidget(Qt::TopDockWidgetArea, docker);
}
./mainwindow.h
#ifndef MAINWINDOW_H
#define MAINWINDOW_H
#include <QMainWindow>
#include <QLineEdit>
#include <QComboBox>
#include <QItemSelection>
#include <QInputDialog>
#include <QFormLayout>
#include <QDockWidget>
#include "animaltablemodel.h"
#include "addnewanimalform.h"
#include "sqlhandler.h"
//This class defines and controls the main window of the UI.
//The ui file corresponding to this class is mainwindow.ui
namespace Ui {
class MainWindow;
}
class MainWindow : public QMainWindow
{
Q_OBJECT
107. public:
explicit MainWindow(QWidget *parent = 0);
~MainWindow();
public slots:
void removeDocker(); //Removes the docked widget (the add
animals widget) because it's no longer needed
private:
Ui::MainWindow *ui;
//These are the input fields on the right which allow the user
to edit the sleected animal
QComboBox * genderBox;
QLineEdit * nameBox;
QLineEdit * ageBox;
QLineEdit * speciesBox;
QLineEdit * colorBox;
QLineEdit * weightBox;
QLineEdit * sizeBox;
//The current animal selected in the table
Animal * currentAnimal;
//The table model
AnimalTableModel * model;
//The form layout containing the details/edit fields for the
selected animal
QFormLayout * detailsPanel;
//The widget for adding animals to the database
QDockWidget * docker;
private slots:
void selectionChangedSlot(const QItemSelection &
newSelection, const QItemSelection & oldSelection); //Received
when the selected item in the table changes
void valueUpdatedSlot(); //Received when the value in an
input field changes
void on_actionAdd_triggered(); //Received when File > Add
Animal is clicked on
};
109. File
Add Animal
./README.md
# Carleton University Animal Care System
Created for Carleton University's COMP3004 course (taught by
Prof. Christine Laurendeau) by Peter MacDonald (100683150),
Ibiduneyitayo(101018199), and Nicholas Aubé(101032093)
## Installation
To install the software after extracting it from the .tar file,
simply run the following command in the directory:
```
sudo bash install
```
110. You will likely be prompted to input your administrator
password in order to run the install script with sudo.
Local files, such as the animal database, are installed to the
directory /opt/cuACS in your file system. If this directory
already contains files, they may be overwritten in this process.
## Running
To run the software, after installing, run the following command
from the same directory:
```
./cuACS
```
## Cleanup
To clean up the software, run the following command from its
directory:
```
sudo bash uninstall
```
Note that this uninstall script will delete the /opt/cuACS
directory we are storing local files in. If you wish to retain this
directory, you may want to run:
```
make clean
```
Instead. This will clean up the software directory without
affecting /opt/cuACS. You will likely be prompted to input your
administrator password in order to run the uninstall script with
sudo.
## A note for developers
111. When you open the project in QT Creator, it has its own build
directory in mind, and does not know to deploy the local files to
/opt/cuACS. Either run the installer script yourself, or manually
move the files over.
./sqlhandler.cpp
#include "sqlhandler.h"
const QString SqlHandler::DB_LOCATION =
"/opt/cuACS/Animal.db";
QSqlDatabase SqlHandler::db =
QSqlDatabase::addDatabase("QSQLITE", "Connection");
std::vector<Animal *> SqlHandler::fetchDatabase()
{
std::vector<Animal *> returnValue = std::vector<Animal
*>();
db.setDatabaseName(DB_LOCATION);
if (!db.open()) {
qDebug("Error occurred opening the database.");
qDebug("%s.", qPrintable(db.lastError().text()));
throw "Error opening database.";
}
QSqlQuery query(db);
//Get the properties for all the animals in the table
query.prepare("SELECT animal_ID, name, type, color, age,
weight_kg, gender, size FROM animal");
if (!query.exec()) {
qDebug("Error occurred querying.");
qDebug("%s.", qPrintable(db.lastError().text()));
db.close();
throw "Error reading database.";
112. }
//For each animal, assemble the object in memory from the
properties retrieved from the server
while (query.next()) {
int id = query.value(0).toInt();
std::string name = qPrintable(query.value(1).toString());
std::string type = qPrintable(query.value(2).toString());
std::string color = qPrintable(query.value(3).toString());
int age = query.value(4).toInt();
int weight = query.value(5).toInt();
std::string gender = qPrintable(query.value(6).toString());
std::string size = qPrintable(query.value(7).toString());
returnValue.push_back(new Animal(id, name, type, color,
age, weight, gender, size));
}
db.close();
return returnValue;
}
bool SqlHandler::updateItem(Animal * animal)
{
db.setDatabaseName(DB_LOCATION);
if (!db.open()) {
qDebug("Error occurred opening the database.");
qDebug("%s.", qPrintable(db.lastError().text()));
return false;
}
QSqlQuery query(db);
//Update the animal corresponding to our ID in the database
with the current property values
query.prepare("UPDATE animal SET name=:name,
type=:type, color=:color, age=:age, weight_kg=:weight,
114. qDebug("%s.", qPrintable(db.lastError().text()));
return false;
}
//Add the animal to the database
QSqlQuery query(db);
query.prepare("INSERT INTO animal (name, color, type,
age, weight_kg, gender, size) VALUES (:name, :color, :type,
:age, :weight, :gender, :size)");
query.bindValue(":name", QVariant(animal-
>getName().c_str()));
query.bindValue(":color", QVariant(animal-
>getColor().c_str()));
query.bindValue(":type", QVariant(animal-
>getSpecies().c_str()));
query.bindValue(":age", QVariant(animal->getAge()));
query.bindValue(":weight", QVariant(animal->getWeight()));
query.bindValue(":gender", QVariant(animal-
>getGender().c_str()));
query.bindValue(":size", QVariant(animal-
>getSize().c_str()));
if (!query.exec()) {
qDebug("Error occurred inserting.");
qDebug("%s.", qPrintable(db.lastError().text()));
db.close();
return false;
}
//Retrieve the auto-generated id from the database for the
animal we just put in
QSqlQuery idQuery(db);
idQuery.prepare("SELECT animal_ID FROM animal WHERE
name=:name AND type=:type AND color=:color AND age=:age
AND weight_kg=:weight AND gender=:gender AND
115. size=:size");
idQuery.bindValue(":name", QVariant(animal-
>getName().c_str()));
idQuery.bindValue(":color", QVariant(animal-
>getColor().c_str()));
idQuery.bindValue(":type", QVariant(animal-
>getSpecies().c_str()));
idQuery.bindValue(":age", QVariant(animal->getAge()));
idQuery.bindValue(":weight", QVariant(animal-
>getWeight()));
idQuery.bindValue(":gender", QVariant(animal-
>getGender().c_str()));
idQuery.bindValue(":size", QVariant(animal-
>getSize().c_str()));
if (!idQuery.exec()) {
qDebug("Error occurred querying.");
qDebug("%s.", qPrintable(db.lastError().text()));
db.close();
return false;
}
idQuery.next();
//Set the animal object's ID to match the database ID.
animal->setId(idQuery.value(0).toInt());
db.close();
return true;
}
SqlHandler::SqlHandler()
{
}