HND Assignment Brief Session: September 2015
Programme title
BTEC HND in Computing and Systems Development
Unit number and title
41
Programming in Java (L5)
Assignment number & title
1 of 1
Programming in Java (L5)
Unit Leader
DR Gebremichael
Assessor (s)
Yonas Gebremichael and Hassan Baajour
Issue Date
30 Sept 2015
Final assignment submission deadline
28 May 2015 – 09 Sept 2015
Late submission deadline
11 – 16 September 2015
The learners are required to follow the strict deadline set by the
College for submissions of assignments in accordance with the BTEC level 4 – 7 submission guidelines and College policy on submissions. They should also refer to Merit and Distinction criteria that require evidence of meeting agreed timelines and ability to plan and organise time effectively without which the learner may not expect to receive a higher grade.
Resubmission deadline
TBA
Feedback
In-class feedback will be available from draft submissions on a taskby-task basis as a formative feedback and also for initial submission. Final feedback will be available within 2 – 3 weeks of the assignment submission date.
General
Guidelines
1. The work you submit must be in your own words. If you use a quote or an illustration from somewhere you must give the source.
2. Include a list of references at the end of your document. You must give all your sources of information.
3. Make sure your work is clearly presented and that you use readily understandable English.
4. Wherever possible use a word processor and its “spell-checker”.
Internal verifier
Dr. Hasan
Signature (IV of the brief) *
Dr. Hasan
Date
06/05/15
ICON College of Technology and Management
BTEC HND in Computing and Systems Development
(CSD)
Unit41: Programming in Java (L5)
Session: May\Sept 2015
Coursework
Recommended maximum words: 4,000
This Unit will be assessed by assignment and Presentation.
You are strongly recommended to read “Preparation guidelines of the Coursework Document” before answering/solving your assignment.
Scenario:
White Chapel Academy has asked you to develop a Student Information Management System (SIMS). The system shall hold the details of every student and tutor and admin staff in the school as well as storing information about the courses that are available at the school. It shall enable the school staff to enrol students to the school and manage student’s fee payments.
Once the students are enrolled, a system administrator will create classes in the system and allocate date, time and tutor for each class to enrol students to. The system shall also be used for managing students’ class attendance as well as track their progress in the course. The system shall have a facility for registered parents to login and check their sons’ or daughters’ attendance, academic progress, behaviour at school.
When a student first enrols at the school, he or she will receive a timetable with a list of classe ...
Running head Application of Semester Knowledge .docxtoddr4
Running head: Application of Semester Knowledge 1
Application of Semester Knowledge 3
Demonstrate a connection between knowledge or concepts from the current semester courses (i.e., 1. Security Architecture and Design 2. Business Continuity Planning and Disaster Recovery Planning) and how those have been or could be applied in the work place (assume you are working as a software engineer).
Application of Semester Knowledge
Name
Institution of Affiliation
Date
Throughout this semester, we have learnt and acquired knowledge and skills in the fields of Disaster Recovery planning, Business Continuity Planning and Security Architecture. The knowledge has been of great value to me as a software engineer in my place of work where I was posted recently and has even ensured I was promoted to be part of the board members of the software engineers in the company. This is due to two emergency cases of cyber-attacks that I handled professionally thanks to the prior knowledge I had from our previous semester.
DRP and CRP all fall under business domain. The knowledge acquired in this case help in protecting the company against unauthorized access into the company’s technology , building a technology system that is able to prevent security threatening emergencies and ensuring the business continues in case such disaster befalls the company or business entity. Therefore as a software engineer I was always prepared for the worst rather than just prevention part of it. This involves putting in place practices, preparations and processes that always ensure the continuity and preservation of the company in cases where there are disruptions to the day to day operations of the company or business. Part of the tasks that I was performing as a software engineer therefore involved testing, identification, selection, implementation and updating of specific processes that ensure critical services are not affected by the network disruptions. A good example is in the past month where we realized that some individuals had hacked the customer service system and taken private information of customers and were calling the ignorant ones to disclose their Pass words of mobile banking by claiming to be our agents in this case we revoked the customer services for a few hours and changed the whole system but ensured the other services were available as normal. I led part of the team that built a mobile detector that led us to one apartment within the city where with the help of security agents the culprits were captured with all the laptops and every item they were using including mobile phones.it was after this that we developed a system that would detect whenever somebody wanted to hack the customer service system thus reinstating normalcy in the business.
As a softw.
Running head Application of Semester Knowledge .docxtoddr4
Running head: Application of Semester Knowledge 1
Application of Semester Knowledge 3
Demonstrate a connection between knowledge or concepts from the current semester courses (i.e., 1. Security Architecture and Design 2. Business Continuity Planning and Disaster Recovery Planning) and how those have been or could be applied in the work place (assume you are working as a software engineer).
Application of Semester Knowledge
Name
Institution of Affiliation
Date
Throughout this semester, we have learnt and acquired knowledge and skills in the fields of Disaster Recovery planning, Business Continuity Planning and Security Architecture. The knowledge has been of great value to me as a software engineer in my place of work where I was posted recently and has even ensured I was promoted to be part of the board members of the software engineers in the company. This is due to two emergency cases of cyber-attacks that I handled professionally thanks to the prior knowledge I had from our previous semester.
DRP and CRP all fall under business domain. The knowledge acquired in this case help in protecting the company against unauthorized access into the company’s technology , building a technology system that is able to prevent security threatening emergencies and ensuring the business continues in case such disaster befalls the company or business entity. Therefore as a software engineer I was always prepared for the worst rather than just prevention part of it. This involves putting in place practices, preparations and processes that always ensure the continuity and preservation of the company in cases where there are disruptions to the day to day operations of the company or business. Part of the tasks that I was performing as a software engineer therefore involved testing, identification, selection, implementation and updating of specific processes that ensure critical services are not affected by the network disruptions. A good example is in the past month where we realized that some individuals had hacked the customer service system and taken private information of customers and were calling the ignorant ones to disclose their Pass words of mobile banking by claiming to be our agents in this case we revoked the customer services for a few hours and changed the whole system but ensured the other services were available as normal. I led part of the team that built a mobile detector that led us to one apartment within the city where with the help of security agents the culprits were captured with all the laptops and every item they were using including mobile phones.it was after this that we developed a system that would detect whenever somebody wanted to hack the customer service system thus reinstating normalcy in the business.
As a softw.
Lea
rning
Outcomes
assessed
in
this
assignment
Assignment
Title
Development of a Sorting Program.
Weighting
6
0
%
Word
Count
or
Equivalent
5
00
words
plus
implementation
and
demonstration.
1. Apply appropriate processes (design documentation and testing) and articulate the rationale for design decisions throughout the process of developing a program.
2. Communicate own algorithmic solutions for complex programming problems using appropriate notation.
3. Select and implement appropriate structures for file handling and error catching within a program.
4. Select and implement appropriate structures for data manipulation within a program.
5. Demonstrate knowledge of subject terminology and concepts, giving appropriate comparativeexamples in specific contexts.
Task(s)
Design, implement and demonstrate a program to sort a dataset from a file in to ascending order using three different algorithms. The program will time stamp the different algorithms to test the effectiveness (timeliness) of the algorithms. The methods you should user are Insertion, Selection and Bubble sort.
The program should read from a file in to an appropriate data structure. The program should then use a series of methods as discussed to sort the data and write it to another file in a sorted ascending format you have chosen. The program will calculate the length of time it took each algorithm to process the sorts and this information will be stored in another test file, which will not be overwritten only appended.
Extend the program to allow the user to select different files for sorting. Add a method to accept an additional algorithm of your own design. Your algorithm will sort the dataset in to descending order again; you will have to calculate run time. The program should continue to run until the user terminates the program.
Design documentation (500 words plus designs):
All design documentation should be in a formal report format, with a clear introduction. Any research undertaken or resources consulted should be discussed and/or presented in a bibliography. The designs should be presented in the appendices and clearly referred to from the body of the text. The following should be included:
· Identify any assumptions you have had to make (this is NOT information given in the brief)
· Discuss any research or resources you have used throughout the development, with appropriate citations.
· Given the brief evaluate the program clearly identify any areas of the brief not achieved or issues yet to be resolved
· A bibliography (all resources consulted)
· Formal design documentation in the form of use cases, Pseudo code and Flow-charts where applicable to the scenario, (in the appendices). This should be as complete as possible and reflect the final design. They main contain a number of elements that are not implemented.
Implementation:
The implemented program should demonstrate an appropriate use of programm ...
Online course registration system development software engineering project pr...MD.HABIBUR Rahman
Autometed Online Course Registration System is a software development project final presentation. here , I applyed . and software development waterfall feedback model. Development Software Engineering Project Presentation
1 Saint Leo University GBA 334 Applied Decision.docxaryan532920
1
Saint Leo University
GBA 334
Applied Decision Methods for Business
Course Description:
This course explores the use of applied quantitative techniques to aid in business-oriented decision
making. Emphasis is on problem identification and formulation with application of solution techniques and
the interpretation of results. Included are probability theory; decision making under certainty, risk and
uncertainty; utility theory; forecasting; inventory control; PERT/CPM; queuing theory; and linear
programming.
Prerequisite:
MAT 201
Textbook:
Saint Leo University. (2013), Quantitative analysis (custom). Boston, MA: Pearson Learning
Solution
s.
eBook with print upgrade option – ISBN: 978-1-269-86314-8
You will access the eBook via a link in the Course Home menu, where you can purchase the print
upgrade option.
Software
The use of statistical software is a required component in this course. It is expected that you already have
a basic understanding of computers and Microsoft Excel. In-depth training is provided during the course
on the appropriate use of the following packages:
TreePlan-Student-179 Excel Add In
Excel QM, version 4
POM QM, version 4
Analysis Tool Pack for Microsoft Excel must be activated
To access the information needed to install the software, click the Software Installation Information link
located under Resources in the course menu.
Learning Outcomes:
At the completion of the course you should be familiar with several decision methods of decision-making
in a business environment. You will find that almost every type of problem to which you will be exposed in
the business world has been explored and methods of solving them have been devised. You should be
able to apply these methods to the real-world situations in which you will one day find yourself. The skills
developed during this class include:
1. Explain the key attributes and differences between the normal, standard normal, and binomial
distribution of variables.
2. Identify and explain the underlying assumptions, key variables, theoretical basis, and solution
techniques for the following decision-making problems:
a. Decision Analysis
b. Probability Theory and Analysis
c. Regression Analysis
d. Forecasting Methods
e. Inventory Control Methods
f. Project Management (including PERT/CPM)
g. Network Models
h. Queuing Theory
i. Linear Programming Approaches and the Transportation and Assignment Special Cases
j. Statistical Process Control
2
3. Formulate and execute a solution to a variety of decision-making problems using computer
software.
4. Identify, explain, and interpret the key areas of computer output for the various decision-making
problems.
5. Apply one of the approaches covered in class to a real-world issue and present the findings.
6. VALUES OUTCOME: Demonstrate the core value of excellence by adequately preparing for
each class session, actively participating in cl ...
E-Learning Student Assistance Model for the First Computer Programming CourseIJITE
E-Learning applied to computer programming course design is a promising area of research. The student having clear understanding of the programming constructs can apply it to solve various problems. Because of limited time and availability, the instructor can go back to some extent to cover the weaknesses of their students that hinder the understanding of the problems. As more lessons are covered, the weak students become weaker in programming. To cope up with these problems an e-learning system is devised which the student can use anywhere and at any time as a web application. It comprises of both tutoring and assessment and also provides guiding the students to error correction using back-tracking technique to refine the concepts and reattempt the programming problem.
E-LEARNING STUDENT ASSISTANCE MODEL FOR THE FIRST COMPUTER PROGRAMMING COURSE IJITE
E-Learning applied to computer programming course design is a promising area of research. The student
having clear understanding of the programming constructs can apply it to solve various problems. Because
of limited time and availability, the instructor can go back to some extent to cover the weaknesses of their
students that hinder the understanding of the problems. As more lessons are covered, the weak students
become weaker in programming. To cope up with these problems an e-learning system is devised which the
student can use anywhere and at any time as a web application. It comprises of both tutoring and
assessment and also provides guiding the students to error correction using back-tracking technique to
refine the concepts and reattempt the programming problem
E-Learning Student Assistance Model for the First Computer Programming CourseIJITE
E-Learning applied to computer programming course design is a promising area of research. The student
having clear understanding of the programming constructs can apply it to solve various problems. Because
of limited time and availability, the instructor can go back to some extent to cover the weaknesses of their
students that hinder the understanding of the problems. As more lessons are covered, the weak students
become weaker in programming. To cope up with these problems an e-learning system is devised which the
student can use anywhere and at any time as a web application. It comprises of both tutoring and
assessment and also provides guiding the students to error correction using back-tracking technique to
refine the concepts and reattempt the programming problem.
Sheet1Individual Needs Appointment for Hair StylingEmployee gr.docxlesleyryder69361
Sheet1
Individual Needs Appointment for Hair Styling
Employee greets customer and asks customer last name or phone number
Calls UMUC Haircuts and requests appointment
Is appointment today ?
Does customer want to schedule next appointment?
Is one of the dates/times acceptable?
Does customer want the same stylist as last time?
Previous Customer?
Employee checks stylist availability and times and advises customer
Employee asks customer feedback questions and enters responses into the system
Drives to UMUC Haircuts
YES
YES
YES
NO
NO
NO
Employee asks customer when the service is desired
Employee tells customer cost and time needed for service
Employee asks customer what services are needed
Employee welcomes customer back and reminds of last appointment and services provided
Cashier enters info from paper receipt to system and advises customer of total charges
Customer receives service; employee documents services completed and time on paper receipt
Appointment scheduled
Customer takes paper receipt to cashier
Payment Process
Stylist selected
NO
NO
YES
Employee gets alternate date/time and/or alternate stylist from customer
Will customer provide feedback?
YES
YES
NO
Customer leaves UMUC Haircuts
Customer completes call or leaves UMUC Haircuts
Employee asks for and enters customer information
UMUC Haircuts Appointment Process
1
3
4
5
6
7
Schedule
9
Process: Enter Time Needed and Cost for Services
Service, Time, Cost
Customers
2
Appoint-ments
Customer pays bill
Employee Scheduling Process
8
Financial Data
Questions/Customer
Responses
Sheet2
Sheet3
This assignment consists of two (2) sections:
· A Java program file
· A screen shot of the output and a description of your Java program
Label each file name according to the section of the assignment for which it is written. Put both sections together in a single zip file and submit the zip file.
Imagine that you work as a Java programmer for a software company. Your company is developing a new interactive learning management tool called uGrade. You have the task of creating the functionality that will allow the user to manually enter names and grades. The program will store this information in parallel arrays. Next, it will prompt the user to sort the date by name or by grade and display the sorted data accordingly in an organized table.
Section 1: Java Program File
1. Create a Java program in which you include:
· a class called “roster”
· attributes, which must be last names and numerical grades, and must also be parallel arrays
· an indefinite loop, which allows the user to manually enter five (5) names and grades and stores them in the array. Note: The loop must end either when the user specifies that they are done or when a maximum of five (5) values have been stored in the arrays, i.e., five (5) names and a corresponding grade for each name.
· an indefinite loop, which prompts the user to select a sorting criterion or to end the program, and must also use bubble sort. Note: The user.
In a 250-300 word response, critically examine your personal level o.docxjoyjonna282
In a 250-300 word response, critically examine your personal level of intercultural communication competence. Is it important for you to achieve a certain level of intercultural communication competence? Would enhanced intercultural communication competence help you personally? Professionally? Academically? Include examples in your submission and use at least one resource to support your key points. Respond to at least two of your fellow students' posts.
.
In a 10 –12 page paper, identify and analyze the benefits and challe.docxjoyjonna282
In a 10 –12 page paper, identify and analyze the benefits and challenges that are associated with biometric evidence in the criminal justice system. Include at least 3 techniques in your paper, and use at least 2 case studies to support your position. Consider the following questions when drafting your paper:
How do courts determine if evidence is reliable and valid before allowing it into testimony?
What is the role of the Frye standard or Daubert standard in determining whether or not the courts will accept biometric evidence?
What rules does your state use in this regard?
How reliable is fingerprint evidence? Consider examples of its use in criminal courts.
How do other biometrics compare to the reliability and validity of fingerprint evidence?
What are some of the challenges associated with lower forms of biometrics, such as facial recognition, and acceptance as evidence in court?
What is the role of the expert witness related to biometric evidence in court?
Be sure to provide in-text citation and references
.
Lea
rning
Outcomes
assessed
in
this
assignment
Assignment
Title
Development of a Sorting Program.
Weighting
6
0
%
Word
Count
or
Equivalent
5
00
words
plus
implementation
and
demonstration.
1. Apply appropriate processes (design documentation and testing) and articulate the rationale for design decisions throughout the process of developing a program.
2. Communicate own algorithmic solutions for complex programming problems using appropriate notation.
3. Select and implement appropriate structures for file handling and error catching within a program.
4. Select and implement appropriate structures for data manipulation within a program.
5. Demonstrate knowledge of subject terminology and concepts, giving appropriate comparativeexamples in specific contexts.
Task(s)
Design, implement and demonstrate a program to sort a dataset from a file in to ascending order using three different algorithms. The program will time stamp the different algorithms to test the effectiveness (timeliness) of the algorithms. The methods you should user are Insertion, Selection and Bubble sort.
The program should read from a file in to an appropriate data structure. The program should then use a series of methods as discussed to sort the data and write it to another file in a sorted ascending format you have chosen. The program will calculate the length of time it took each algorithm to process the sorts and this information will be stored in another test file, which will not be overwritten only appended.
Extend the program to allow the user to select different files for sorting. Add a method to accept an additional algorithm of your own design. Your algorithm will sort the dataset in to descending order again; you will have to calculate run time. The program should continue to run until the user terminates the program.
Design documentation (500 words plus designs):
All design documentation should be in a formal report format, with a clear introduction. Any research undertaken or resources consulted should be discussed and/or presented in a bibliography. The designs should be presented in the appendices and clearly referred to from the body of the text. The following should be included:
· Identify any assumptions you have had to make (this is NOT information given in the brief)
· Discuss any research or resources you have used throughout the development, with appropriate citations.
· Given the brief evaluate the program clearly identify any areas of the brief not achieved or issues yet to be resolved
· A bibliography (all resources consulted)
· Formal design documentation in the form of use cases, Pseudo code and Flow-charts where applicable to the scenario, (in the appendices). This should be as complete as possible and reflect the final design. They main contain a number of elements that are not implemented.
Implementation:
The implemented program should demonstrate an appropriate use of programm ...
Online course registration system development software engineering project pr...MD.HABIBUR Rahman
Autometed Online Course Registration System is a software development project final presentation. here , I applyed . and software development waterfall feedback model. Development Software Engineering Project Presentation
1 Saint Leo University GBA 334 Applied Decision.docxaryan532920
1
Saint Leo University
GBA 334
Applied Decision Methods for Business
Course Description:
This course explores the use of applied quantitative techniques to aid in business-oriented decision
making. Emphasis is on problem identification and formulation with application of solution techniques and
the interpretation of results. Included are probability theory; decision making under certainty, risk and
uncertainty; utility theory; forecasting; inventory control; PERT/CPM; queuing theory; and linear
programming.
Prerequisite:
MAT 201
Textbook:
Saint Leo University. (2013), Quantitative analysis (custom). Boston, MA: Pearson Learning
Solution
s.
eBook with print upgrade option – ISBN: 978-1-269-86314-8
You will access the eBook via a link in the Course Home menu, where you can purchase the print
upgrade option.
Software
The use of statistical software is a required component in this course. It is expected that you already have
a basic understanding of computers and Microsoft Excel. In-depth training is provided during the course
on the appropriate use of the following packages:
TreePlan-Student-179 Excel Add In
Excel QM, version 4
POM QM, version 4
Analysis Tool Pack for Microsoft Excel must be activated
To access the information needed to install the software, click the Software Installation Information link
located under Resources in the course menu.
Learning Outcomes:
At the completion of the course you should be familiar with several decision methods of decision-making
in a business environment. You will find that almost every type of problem to which you will be exposed in
the business world has been explored and methods of solving them have been devised. You should be
able to apply these methods to the real-world situations in which you will one day find yourself. The skills
developed during this class include:
1. Explain the key attributes and differences between the normal, standard normal, and binomial
distribution of variables.
2. Identify and explain the underlying assumptions, key variables, theoretical basis, and solution
techniques for the following decision-making problems:
a. Decision Analysis
b. Probability Theory and Analysis
c. Regression Analysis
d. Forecasting Methods
e. Inventory Control Methods
f. Project Management (including PERT/CPM)
g. Network Models
h. Queuing Theory
i. Linear Programming Approaches and the Transportation and Assignment Special Cases
j. Statistical Process Control
2
3. Formulate and execute a solution to a variety of decision-making problems using computer
software.
4. Identify, explain, and interpret the key areas of computer output for the various decision-making
problems.
5. Apply one of the approaches covered in class to a real-world issue and present the findings.
6. VALUES OUTCOME: Demonstrate the core value of excellence by adequately preparing for
each class session, actively participating in cl ...
E-Learning Student Assistance Model for the First Computer Programming CourseIJITE
E-Learning applied to computer programming course design is a promising area of research. The student having clear understanding of the programming constructs can apply it to solve various problems. Because of limited time and availability, the instructor can go back to some extent to cover the weaknesses of their students that hinder the understanding of the problems. As more lessons are covered, the weak students become weaker in programming. To cope up with these problems an e-learning system is devised which the student can use anywhere and at any time as a web application. It comprises of both tutoring and assessment and also provides guiding the students to error correction using back-tracking technique to refine the concepts and reattempt the programming problem.
E-LEARNING STUDENT ASSISTANCE MODEL FOR THE FIRST COMPUTER PROGRAMMING COURSE IJITE
E-Learning applied to computer programming course design is a promising area of research. The student
having clear understanding of the programming constructs can apply it to solve various problems. Because
of limited time and availability, the instructor can go back to some extent to cover the weaknesses of their
students that hinder the understanding of the problems. As more lessons are covered, the weak students
become weaker in programming. To cope up with these problems an e-learning system is devised which the
student can use anywhere and at any time as a web application. It comprises of both tutoring and
assessment and also provides guiding the students to error correction using back-tracking technique to
refine the concepts and reattempt the programming problem
E-Learning Student Assistance Model for the First Computer Programming CourseIJITE
E-Learning applied to computer programming course design is a promising area of research. The student
having clear understanding of the programming constructs can apply it to solve various problems. Because
of limited time and availability, the instructor can go back to some extent to cover the weaknesses of their
students that hinder the understanding of the problems. As more lessons are covered, the weak students
become weaker in programming. To cope up with these problems an e-learning system is devised which the
student can use anywhere and at any time as a web application. It comprises of both tutoring and
assessment and also provides guiding the students to error correction using back-tracking technique to
refine the concepts and reattempt the programming problem.
Sheet1Individual Needs Appointment for Hair StylingEmployee gr.docxlesleyryder69361
Sheet1
Individual Needs Appointment for Hair Styling
Employee greets customer and asks customer last name or phone number
Calls UMUC Haircuts and requests appointment
Is appointment today ?
Does customer want to schedule next appointment?
Is one of the dates/times acceptable?
Does customer want the same stylist as last time?
Previous Customer?
Employee checks stylist availability and times and advises customer
Employee asks customer feedback questions and enters responses into the system
Drives to UMUC Haircuts
YES
YES
YES
NO
NO
NO
Employee asks customer when the service is desired
Employee tells customer cost and time needed for service
Employee asks customer what services are needed
Employee welcomes customer back and reminds of last appointment and services provided
Cashier enters info from paper receipt to system and advises customer of total charges
Customer receives service; employee documents services completed and time on paper receipt
Appointment scheduled
Customer takes paper receipt to cashier
Payment Process
Stylist selected
NO
NO
YES
Employee gets alternate date/time and/or alternate stylist from customer
Will customer provide feedback?
YES
YES
NO
Customer leaves UMUC Haircuts
Customer completes call or leaves UMUC Haircuts
Employee asks for and enters customer information
UMUC Haircuts Appointment Process
1
3
4
5
6
7
Schedule
9
Process: Enter Time Needed and Cost for Services
Service, Time, Cost
Customers
2
Appoint-ments
Customer pays bill
Employee Scheduling Process
8
Financial Data
Questions/Customer
Responses
Sheet2
Sheet3
This assignment consists of two (2) sections:
· A Java program file
· A screen shot of the output and a description of your Java program
Label each file name according to the section of the assignment for which it is written. Put both sections together in a single zip file and submit the zip file.
Imagine that you work as a Java programmer for a software company. Your company is developing a new interactive learning management tool called uGrade. You have the task of creating the functionality that will allow the user to manually enter names and grades. The program will store this information in parallel arrays. Next, it will prompt the user to sort the date by name or by grade and display the sorted data accordingly in an organized table.
Section 1: Java Program File
1. Create a Java program in which you include:
· a class called “roster”
· attributes, which must be last names and numerical grades, and must also be parallel arrays
· an indefinite loop, which allows the user to manually enter five (5) names and grades and stores them in the array. Note: The loop must end either when the user specifies that they are done or when a maximum of five (5) values have been stored in the arrays, i.e., five (5) names and a corresponding grade for each name.
· an indefinite loop, which prompts the user to select a sorting criterion or to end the program, and must also use bubble sort. Note: The user.
In a 250-300 word response, critically examine your personal level o.docxjoyjonna282
In a 250-300 word response, critically examine your personal level of intercultural communication competence. Is it important for you to achieve a certain level of intercultural communication competence? Would enhanced intercultural communication competence help you personally? Professionally? Academically? Include examples in your submission and use at least one resource to support your key points. Respond to at least two of your fellow students' posts.
.
In a 10 –12 page paper, identify and analyze the benefits and challe.docxjoyjonna282
In a 10 –12 page paper, identify and analyze the benefits and challenges that are associated with biometric evidence in the criminal justice system. Include at least 3 techniques in your paper, and use at least 2 case studies to support your position. Consider the following questions when drafting your paper:
How do courts determine if evidence is reliable and valid before allowing it into testimony?
What is the role of the Frye standard or Daubert standard in determining whether or not the courts will accept biometric evidence?
What rules does your state use in this regard?
How reliable is fingerprint evidence? Consider examples of its use in criminal courts.
How do other biometrics compare to the reliability and validity of fingerprint evidence?
What are some of the challenges associated with lower forms of biometrics, such as facial recognition, and acceptance as evidence in court?
What is the role of the expert witness related to biometric evidence in court?
Be sure to provide in-text citation and references
.
In a 1-2 page Microsoft Word document, discuss the following case st.docxjoyjonna282
In a 1-2 page Microsoft Word document, discuss the following case study:
When Alexander and Deborah married, Alexander owned a duplex in a community property state. They lived in one side of the duplex. They saved their money and bought a lake lot as tenants by the entirety. Deborah failed to pay the loans she took out from Savings Bank prior to her marriage to pay for college. The bank claimed the duplex, the lake lot and their savings.
Discuss the likelihood of success on the bank's claims against the properties.
.
In a 16–20 slide PowerPoint presentation (excluding title and refere.docxjoyjonna282
In a 16–20 slide PowerPoint presentation (excluding title and reference slides) provide information as well as analyze the roles of the following areas in criminal justice leadership strategies and practices:
Organizational culture
Behavioral theory
Planning
Community relations
Your presentation should include, at a minimum, 4 slides, with speaker notes, for each topic.
.
In a 1-2 page Microsoft Word document, using APA, discuss the follow.docxjoyjonna282
In a 1-2 page Microsoft Word document, using APA, discuss the following case study:
When Alexander and Deborah married, Alexander owned a duplex in a community property state. They lived in one side of the duplex. They saved their money and bought a lake lot as tenants by the entirety. Deborah failed to pay the loans she took out from Savings Bank prior to her marriage to pay for college. The bank claimed the duplex, the lake lot and their savings.
Discuss the likelihood of success on the bank's claims against the properties.
.
In a 1-2 page paper, discuss how the government, the media, and the .docxjoyjonna282
In a 1-2 page paper, discuss how the government, the media, and the public affect a health care organization's integration of data. Give specific examples of all three entities influencing the integration of data.
Include at least two research sources in your paper and cite them in a References page at the end in APA format. As in all writing assignments, follow standard mechanics in writing, grammar, punctuation, and spelling.
Submit your completed assignment to the drop box below. Please check the
Course Calendar
for specific due dates.
.
In 2010, plans were announced for the construction of an Islamic cul.docxjoyjonna282
In 2010, plans were announced for the construction of an Islamic cultural center, named Cordoba House, in lower Manhattan in the vicinity of where the September 11, 2001 attacks on the World Trade Center occurred. This announcement stirred up a storm of activity by groups and individuals supporting and opposing the proposal, and in early 2011, a plea by the American Center for Law and Justice was entered in the New York State Supreme Court to stop the construction. In this Discussion Board please respond to the following questions:
In 5–6 paragraphs, address the following:
What are the complaints and concerns of those who oppose construction of this building in its proposed location?
Do you agree? Why, or why not?
What are the counter-claims being made by those who support construction of this building in its present location?
Do you agree? Why, or why not?
What is the specific issue in the court case?
What activities (protests, letters to the editor, blog posts, petitions, opinion polls, etc.) are underway related to this issue? Explain.
Do you think these activities are likely to have an impact on the Court’s decision? Why, or why not?
.
In 2011, John Jones, a middle school social science teacher began .docxjoyjonna282
In 2011, John Jones, a middle school social science teacher began a unit on the American election process. He began with an introduction of political parties from the revolution to present day. At the end of the politically-balanced unit, students participated in mock debates as candidates from each party and ultimately held a mock presidential election in his classroom.
After the votes were counted and a winner determined, one of his students asked Mr. Jones who he was planning to vote for in the “real” election. He answered the question in age-appropriate language and, when prompted, explained why. He reminded his students that voting was not only a reflection of personal beliefs, but a responsibility as a citizen of the United States.
When Janie Johnson got home from school that day, she noticed – for the first time – signs in her neighbor's front yards supporting one of the presidential candidates. At dinner she asked her parents who they planned to vote for. Their choice differed significantly from her teacher’s. Janie’s father was quite upset at Janie’s explanation of the other candidate. To him, it was not Mr. Jones’ job as her teacher her to “put those kinds of ideas in her head.” The next day he called the principal demanding that Mr. Jones be removed from the classroom.
You are the principal.
1. What do you tell the father? Why?
2. What, if anything, do you say to Mr. Jones, the teacher? Why?
You are Mr. Jones.
1. Have you done anything wrong?
2. What court case(s) would you cite in your behalf? Be specific. Cite the case name, court ruling, or law.
Answer the following questions:
1. Who was Pickering and why is he important?
2. A teacher speaks out at a rally against FCAT. This is not the first “FIRE FCAT” rally held in this community. Can her statement be protected by the First Amendment? Under what circumstances?
3. A student sees a picture of math teacher James Johnson in his KKK garb that Johnson posts on his facebook page. Can Johnson be fired because of his KKK membership? Why or why not?
4. After their honeymoon Jane Jones and her new husband Jason return to their teaching jobs at JFK Middle School. At lunch that day the principal informs them that one of them must transfer to a new school. Can the principal do this? Why or why not?
Chapter 10 covers several topics, chief among which is teachers’ rights. There are three main court cases which address free speech:
· Pickering v. Board of Education
· Connick v. Myers
· Garcetti v. Ceballos
In order to respond to the questions, you will have to do some research on your own.Ask yourself this question: “Is the employee speaking as a private citizen or as an employee?”
Question 1 : What is the main difference between the Pickering decisions and the Garcetti decision? Where does the Connick decision fit in?
Question 2: A special education teacher complains to his principal that the school is violating federal law in trying to meet the n.
In 5-7 pages (double-spaced,) provide a narrative explaining the org.docxjoyjonna282
In 5-7 pages (double-spaced,) provide a narrative explaining the organization’s origins, ideology, goals & objectives. Include a discussion on the leadership, funding, and capabilities such as physical bases or operating/support location(s), personnel strengths, training programs, and communications methods. Lastly, it would be helpful to provide a description of known and suspected weapons/lethal agents and delivery methods, procedures used in prior attacks, propaganda, surveillance methods, and significant events/dates that may be used in attack planning
.
In 2004 the Bush Administration enacted changes to the FLSA and the .docxjoyjonna282
In 2004 the Bush Administration enacted changes to the FLSA and the way overtime is paid. These changes are said to have impacted millions of working Americans. The Act addresses who and how overtime is paid. It is also felt that more changes are still needed.
Using an Internet search, find the enactment highlights of 2004 and future proposed changes. Who is impacted, positively or negatively? How do you feel this impacts you? Were these changes long overdue, or do you think this is just a way for workers to work more hours without the employer being responsible for premium pay?
.
In 200-250 wordsGiven the rate of technological chang.docxjoyjonna282
*****In 200-250 words****
Given the rate of technological change and global market pressures, there is considerable change and uncertainty in many organizations. Organizational value is determined more by knowledge (intellectual capital) rather than the traditional factors of productions (land, labor and capital).
1.
Review the concept of knowledge management and how human resources can create the conditions for the effective sharing of knowledge within and throughout the organization.
****Please use one reference which includes in-text citation****
.
in 200 words or more..1 do you use twitter if so , how often do.docxjoyjonna282
in 200 words or more..
1/ do you use twitter ?if so , how often do you tweet , and what do you tweet about ? if not , explain why you chose not to participate in this social medium
2/ when you post something online , do you think carefully about what you are about to post and how it might sound to others ? do you and react to your post ? or do you shoot from the hip , writeing whatever comes to mind ? explain
.
In 200 words or more, answer the following questionsAfter reading .docxjoyjonna282
In 200 words or more, answer the following questions
After reading David Mitchel's "Branding in Pop Culture" discuss how pop culture "brand" certain products. Do you find that you gravitate toward one product over another, similar one because of the pop culture branding associated with it? Explain.
.
In 2005, serial killer Dennis Rader, also known as BTK, was arrested.docxjoyjonna282
In 2005, serial killer Dennis Rader, also known as BTK, was arrested and convicted of murdering 10 people in Kansas between the years of 1974 and 1991. Further research this incident using quality and reputable resources.
Write a two to three (2-3) page paper in which you:
Explicate how digital forensics was used to identify Rader as a suspect and lead to more concrete physical evidence.
Describe in detail the digital evidence that was uncovered from the floppy disk obtained from Rader. Discuss why you believe it took so many years to find concrete evidence in order to build a case against Rader.
Explain how the acquisition of digital evidence aided the investigation and whether or not you believe Rader would’ve been a person of interest if the floppy disk evidence wasn’t sent.
Identify the software that was used by the authorities to uncover the evidence and summarize how this software can be used for digital forensics and evidence collection.
Use at least two (2) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.
Your assignment must follow these formatting requirements:
Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.
Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.
.
In 2003, China sent a person into space. China became just the third.docxjoyjonna282
In 2003, China sent a person into space. China became just the third country to do so. It sent a spaceship to go around Earth 14 times. It took less than a day. It was very important. China had never tried this before. Most countries do not send people into space. It costs a lot of money. China wanted to show the world that it could do it. China was proud to send people into space.
The trip to space was _________ for them.
.
In 250 words briefly describe the adverse effects caused by exposure.docxjoyjonna282
In 250 words briefly describe the adverse effects caused by exposure to radiation. Include some specific exposure levels associated with these significant health effects. Lastly, give some examples of measured radiation levels associated with the Three Mile Island incident in the U.S. and in the Chernobyl incident in the Soviet Union. Provide your reference source(s). (Wikipedia is not an accepted reference source.)
.
In 2.5 pages, compare and contrast health care reform in two differe.docxjoyjonna282
In 2.5 pages, compare and contrast health care reform in two different states. Your paper should include a minimum of three specific examples of similarities or differences in health care reform in the two states.
Example:
One possibility would be to compare Maine's health care reform in 2003 to Tennessee's 1994 health care reform known as "TennCare."
APA FORMAT
APA REFERENCES
.
In 2014 Virginia scientist Eric Betzig won a Nobel Prize for his res.docxjoyjonna282
In 2014 Virginia scientist Eric Betzig won a Nobel Prize for his research in microscope technology. Since receiving the award, Betzig has improved the technology so that cell functions, growth and even movements can now be seen in real time while minimizing the damage caused by prior methods. This allows the direct study of living nerve cells forming synapses in the brain, cells undergoing mitosis and internal cell functions like protein translation and mitochondrial movements.
Your assignment is to write a Python program that
graphically
simulates viewing cellular organisms, as they might be observed using Betzig’s technology. These simulated cells will be shown in a graphics window (representing the field of view through Betzig’s microscope) and must be animated, exhibiting behaviors based on the
“Project Specifications” below
. The simulation will terminate based on user input (a mouse click) and will include two (2) types of cells,
Crete
and
Laelaps
, (
pronounced
KREET
and
LEE
-
laps
).
Crete
cells should be represented in this simulation as three (3) small green circles with a radius of 8 pixels. These cells move nonlinearly in steps of 1-4 graphics window pixels. This makes their movement appear jerky and random.
Crete
cells cannot move outside the microscope slide, (the ‘
field
’), so they may bump along the borders or even wander out into the middle of the field at times. These cells have the ability to pass “through” each other.
A single red circle with a radius of 16 pixels will represent a
Laelaps
cell in this simulation.
Laelaps
cells move across the field straight lines, appearing to ‘bounce’ off the field boundaries.
Laelaps
sometimes appear to pass through other cells, however this is an optical illusion as they are very thin and tend to slide over or under the other cells in the field of view.
Project Specifications: ====================
Graphics Window
500 x 500 pixel window
White background
0,0 (x,y) coordinate should be set to the lower left-hand corner
Crete
Cells
Three (3) green filled circles with radius of 8 pixels
Move in random increments between -4 and 4 pixels per step
Movements are not in straight lines, but appear wander aimlessly
Laelaps
Cells
One (1) red filled circle with a radius of 16 pixels
Move more quickly than Crete cells and in straight lines
The Laelaps cell should advance in either -10 or 10 pixels per step
TODO #1: Initialize the simulation environment ========================================
Import any libraries needed for the simulation
Display a welcome message in the Python Shell. Describe the program’s functionality
Create the 500 x 500 graphics window named “
Field
”
Set the
Field
window parameters as specified
TODO #2: Create the
Crete
cells –
makeCrete()
========================================
Write a function that creates three green circle objects (radius 8) and stores them in a list
Each entry of the list represents one
Crete
cell
The.
In 200-300 words - How is predation different from parasitism What.docxjoyjonna282
In 200-300 words - How is predation different from parasitism? What structures and behavior aid the predaceous insect to be successful? Please give an example.
In 200-300 words-
Why is an understanding of metamorphosis crucial to identifying adult insects? Provide examples where knowing development patterns can prevent incorrect identification.
.
In 3 and half pages, including a title page and a reference page, di.docxjoyjonna282
In 3 and half pages, including a title page and a reference page, discuss various methods of establishing the identity of a murder victim.
In your discussion include an explanation of methods used to identify the dead when only teeth and bones of the victim are available for examination.
Use materials from the text and/or any outside resources to support your response.
.
Embracing GenAI - A Strategic ImperativePeter Windle
Artificial Intelligence (AI) technologies such as Generative AI, Image Generators and Large Language Models have had a dramatic impact on teaching, learning and assessment over the past 18 months. The most immediate threat AI posed was to Academic Integrity with Higher Education Institutes (HEIs) focusing their efforts on combating the use of GenAI in assessment. Guidelines were developed for staff and students, policies put in place too. Innovative educators have forged paths in the use of Generative AI for teaching, learning and assessments leading to pockets of transformation springing up across HEIs, often with little or no top-down guidance, support or direction.
This Gasta posits a strategic approach to integrating AI into HEIs to prepare staff, students and the curriculum for an evolving world and workplace. We will highlight the advantages of working with these technologies beyond the realm of teaching, learning and assessment by considering prompt engineering skills, industry impact, curriculum changes, and the need for staff upskilling. In contrast, not engaging strategically with Generative AI poses risks, including falling behind peers, missed opportunities and failing to ensure our graduates remain employable. The rapid evolution of AI technologies necessitates a proactive and strategic approach if we are to remain relevant.
Macroeconomics- Movie Location
This will be used as part of your Personal Professional Portfolio once graded.
Objective:
Prepare a presentation or a paper using research, basic comparative analysis, data organization and application of economic information. You will make an informed assessment of an economic climate outside of the United States to accomplish an entertainment industry objective.
Introduction to AI for Nonprofits with Tapp NetworkTechSoup
Dive into the world of AI! Experts Jon Hill and Tareq Monaur will guide you through AI's role in enhancing nonprofit websites and basic marketing strategies, making it easy to understand and apply.
Francesca Gottschalk - How can education support child empowerment.pptxEduSkills OECD
Francesca Gottschalk from the OECD’s Centre for Educational Research and Innovation presents at the Ask an Expert Webinar: How can education support child empowerment?
Biological screening of herbal drugs: Introduction and Need for
Phyto-Pharmacological Screening, New Strategies for evaluating
Natural Products, In vitro evaluation techniques for Antioxidants, Antimicrobial and Anticancer drugs. In vivo evaluation techniques
for Anti-inflammatory, Antiulcer, Anticancer, Wound healing, Antidiabetic, Hepatoprotective, Cardio protective, Diuretics and
Antifertility, Toxicity studies as per OECD guidelines
The French Revolution, which began in 1789, was a period of radical social and political upheaval in France. It marked the decline of absolute monarchies, the rise of secular and democratic republics, and the eventual rise of Napoleon Bonaparte. This revolutionary period is crucial in understanding the transition from feudalism to modernity in Europe.
For more information, visit-www.vavaclasses.com
Synthetic Fiber Construction in lab .pptxPavel ( NSTU)
Synthetic fiber production is a fascinating and complex field that blends chemistry, engineering, and environmental science. By understanding these aspects, students can gain a comprehensive view of synthetic fiber production, its impact on society and the environment, and the potential for future innovations. Synthetic fibers play a crucial role in modern society, impacting various aspects of daily life, industry, and the environment. ynthetic fibers are integral to modern life, offering a range of benefits from cost-effectiveness and versatility to innovative applications and performance characteristics. While they pose environmental challenges, ongoing research and development aim to create more sustainable and eco-friendly alternatives. Understanding the importance of synthetic fibers helps in appreciating their role in the economy, industry, and daily life, while also emphasizing the need for sustainable practices and innovation.
Normal Labour/ Stages of Labour/ Mechanism of LabourWasim Ak
Normal labor is also termed spontaneous labor, defined as the natural physiological process through which the fetus, placenta, and membranes are expelled from the uterus through the birth canal at term (37 to 42 weeks
1. HND Assignment Brief Session:
September 2015
Programme title
BTEC HND in Computing and Systems Development
Unit number and title
41
Programming in Java (L5)
Assignment number & title
1 of 1
Programming in Java (L5)
Unit Leader
DR Gebremichael
Assessor (s)
Yonas Gebremichael and Hassan Baajour
Issue Date
30 Sept 2015
Final assignment submission deadline
28 May 2015 – 09 Sept 2015
Late submission deadline
11 – 16 September 2015
The learners are required to follow the strict deadline set by the
College for submissions of assignments in accordance with the
BTEC level 4 – 7 submission guidelines and College policy on
submissions. They should also refer to Merit and Distinction
criteria that require evidence of meeting agreed timelines and
ability to plan and organise time effectively without which the
learner may not expect to receive a higher grade.
Resubmission deadline
TBA
Feedback
In-class feedback will be available from draft submissions on a
taskby-task basis as a formative feedback and also for initial
submission. Final feedback will be available within 2 – 3
2. weeks of the assignment submission date.
General
Guidelines
1. The work you submit must be in your own words. If you use a
quote or an illustration from somewhere you must give the
source.
2. Include a list of references at the end of your document. You
must give all your sources of information.
3. Make sure your work is clearly presented and that you use
readily understandable English.
4. Wherever possible use a word processor and its “spell-
checker”.
Internal verifier
Dr. Hasan
Signature (IV of the brief) *
Dr. Hasan
Date
06/05/15
ICON College of Technology and Management
BTEC HND in Computing and Systems Development
(CSD)
Unit41: Programming in Java (L5)
Session: MaySept 2015
3. Coursework
Recommended maximum words: 4,000
This Unit will be assessed by assignment and Presentation.
You are strongly recommended to read “Preparation guidelines
of the Coursework Document” before answering/solving your
assignment.
Scenario:
White Chapel Academy has asked you to develop a Student
Information Management System (SIMS). The system shall hold
the details of every student and tutor and admin staff in the
school as well as storing information about the courses that are
available at the school. It shall enable the school staff to enrol
students to the school and manage student’s fee payments.
Once the students are enrolled, a system administrator will
create classes in the system and allocate date, time and tutor for
each class to enrol students to. The system shall also be used
for managing students’ class attendance as well as track their
progress in the course. The system shall have a facility for
registered parents to login and check their sons’ or daughters’
attendance, academic progress, behaviour at school.
When a student first enrols at the school, he or she will receive
a timetable with a list of classes and date/time for each class in
a term. During student registration, the system shall verify
whether the student has satisfied the necessary prerequisites for
each term by referring to the student’s online transcript of
courses completed and grades received (the student can review
his or her transcript online at any time as can his or her
parents).
Assuming that (a) the prerequisites for enrolment are satisfied,
(b) there is room available in each of the classes, the student is
enrolled in the classes else he or she is placed on a first-come,
first-served waiting list. If a class/section that he or she was
4. previously waitlisted for becomes available (either because
some other student has dropped the class or because the seating
capacity for the class has been increased), the student is
automatically enrolled in the waitlisted class, and an email
message to that effect is sent to the student and parents. Other
optional features include:
· Calendar events
· Records of detention
· Keeping correspondence history between the school & parents
· Messaging facility between students as well as students and
staff/tutors
User Interface
· Users shall have access to the system using user friendly menu
system.
· The UI implementation will be a graphical user interface.
Data Persistence
Data shall be persisted in a text file in the form of simple tab or
comma-delimited file.
Programming Environment
NetBeans with latest JDK available at the time.
Task 1
1.1 Briefly list and describe three main features of programming
in Java [P1.1]
1.2 What do we mean by BYTECODE and JVM in Java? [P1.2,
5. M1]
of the core principles of Java programming & compilation,
interpretation process and will have met the deadline to submit
the tasks and achieve the unit assessment criteria.
Task 2
2.1 Design a Java programming solution to the SIMS scenario
using use-case diagram that shows how users will interact with
the system. [P2.1, M2]
2.2 Identify the components and file structures required to
implement the SIMS. [P2.2]
2.3 Use UML class diagrams to show the classes in your system,
attributes and operations of each class and the relationship
between classes. Define clearly each class, main methods and
properties [P2.2, D1].
· To achieve M2, you should have applied the relevant theories
and use case diagrams in the design process and you must
justify the design methods and techniques used.
· To achieve D1, you must show the use of critical reflection to
evaluate your own work and justify valid conclusions. The
validity of results must be evaluated using defined criteria,
Realistic improvements have been proposed against defined
characteristics for success.
Task 3
In this section you should apply the appropriate fundamental
programming concepts (such as variables, constants, arrays,
strings, methods, constructs, inheritance, encapsulation etc.)
and make use of appropriate Java API classes (such as Scanner,
6. String etc.). In addition your program should incorporate
appropriate error handling. Comments are also to be inserted to
improve program clarity. To this end you have to:
3.1 Implement the SIMS based on your design. [P3.1, D2]
3.2 Implement classes using inheritance relationship. [P3.2,
D3]
3.3 Use methods and attributes in different classes using
instances/objects. [P3.3, D2]
3.4 Identify and implement opportunities for error handling
and reporting. [P3.4, D3]
3.5 Make effective use of the Netbeans (IDE). [P3.5]
· To achieve D2, you should have made alternative approach
and critical evaluation procedures, demonstrating autonomy and
independence. Also will have met the deadline to submit the
tasks and achieve the unit assessment criteria and thus taken the
responsibility for managing and organising activities.
· To achieve D3, you should have demonstrated effective
thinking has taken place in the context of implementing object
behaviors, idea generation and decision making in the
implementation process and finally demonstration of self-
evaluation has taken place.
Task 4
In this section you need to provide overall documentation for
the system analysis, design and implementation as follows:
4.1 critically review and test your solution. [P4.1, M3]
4.2 analyse actual test results against expected results to
identify discrepancies. [P4.2, M3]
4.3 evaluate independent feedback on your solution and make
recommendations for improvements [P4.3, M3].
4.4 create user documentation for the solution. [P4.4]
4.5 create technical documentation for the support and
7. maintenance of your system. [P4.5]
been used, coherent, logical development of principles/concepts
for the intended audience and demonstration of self-evaluation
has taken place. A range of methods of presentation (technical
and user documents) has been used and technical language have
been accurately used, Communication has taken place in
familiar and unfamiliar contexts,
Additional Specs, Hints & Good Programming Practices
The marking scheme for this coursework will assign marks for
Functionality, Quality of Code, Program Design, Style,
Documentation and Testing. Style and Documentation are
crucial – you must neatly comment your code.
Try and break the coursework down into doable chunks as
identified by the task list. These are distinct programs in the
coursework, so try and modularise your effort – for instance in
Task 3 first you need to set up the menu system and build
functionalities of each menu item one by one. This approach
will help in the testing and debugging process of your code.
DEBUGGING HINT: Compile and test your program after every
change, even if it was as simple a change as adding a single
line. This will allow you to find and fix errors early before you
write more code. This is another reason why you have to write
the skeleton program which runs first even if it does not do
anything yet.
In addition to the above, follow good programming practices.
Below are some of the common good practices generally
accepted as industry standard and followed by those in industry
who are using programming in general and the C/C++/C#/Java
in particular. You will get more marks for following good
programming practices. Some examples are given below. When
naming identifiers
· Do not start with underscore (used for technical
programming). e.g. _grades (this is bad practice)
8. · Write single word variables in all lower case , e.g. int grades,
roots;
· Space is not allowed in identifiers, e.g. ‘student grades’ is
wrong! write this as studenGrades or student_grades. Note the
use of capitalisation or the underscore.
· Use CAPITAL LETTERS TO DECLARE CONSTANTS, e.g.
SIZE = 100 or PI = 3.14;
· Start function names with capital letters. e.g.
AverageGrades(). Spaces are not allowed in function names.
‘Average Grades()’ is wrong. Use AverageGrades() or
Average_grades().
· Make a habit of using Meaningful identifier and Function
Names to make your code easier for others to understand. Think
about it, what does "g" mean? Is it grades, garbage, grave, etc.
Thus do not use cryptic identifier names, e.g. Use ‘grades’ to
refer to student grades rather than ‘g’. Similarly, use sensible
function names. If you want to write a function that assigns
student’s grades, then call it StudentGrades(). Do not use your
names or names of your pets or any name that does not describe
what the function does, but at the same time do not use more
than 3 words, i.e. do not use a sentence to name a function. e.g.
ThisIsMyAverageFunction() while syntactically correct is not
good programming practice.
· Remember Java is case sensitive so ‘Grades’ and ‘grades’ are
not the same as identifier names. Thus be case and spelling
consistent. Use an identifier name only once and spell it (upper
and lower case) the same way within your program.
Finally give the project a sensible name like E.g.
Unit41_CW_ID3344
Presentation
9. As part of the overall assessment of this assignment, the
students need to prepare an oral presentation of their
individual work. You will use power point presentation or
similar presentation package of your choice. The presentation
will last no more than 10-15 minutes. You will be marked on
content, presentation style and clarity of delivery.
Relevant Information
To gain a Pass in a BTEC HND Unit, you must meet ALL the
Pass criteria; to gain a Merit, you must meet ALL the Merit and
Pass criteria; and to gain a Distinction, you must meet ALL the
Distinction, Merit and Pass criteria.
1. Outcomes of the unit and assessment criteria
Outcomes
Assessment criteria for pass To achieve each outcome a learner
must demonstrate
Questions reflecting the outcome
1. Understand the principles of programming in Java
1.1 Briefly describe the principles, characteristics and features
of programming in Java?
1.2 Briefly describe environmental flexibility of programming
in Java?
Task 1 & presentation
2. Be able to design Java solutions
2.1 design a distributed software application for a given
problem
2.2 explain the components and data and file structures required
to implement a given design
10. Task 2 & presentation
3. Be able to implement Java solutions
3.1 implement a distributed software application solution based
on a prepared design
3.2 define relationships between components to implement
design requirements
3.3 identify and implement opportunities for error handling and
reporting
3.4 make effective use of an Integrated
Development Environment (IDE) including code and screen
templates
Task 3 & presentation
4. Be able to test and document Java solutions
4.1 critically review and test a distributed software application
4.2 analyse actual test results against expected results to
identify discrepancies
4.3 evaluate independent feedback on a developed distributed
software application and make recommendations for
improvements
4.4 create user documentation for the developed distributed
software application
4.5 create technical documentation for the support and
maintenance of a distributed software application.
Task 4 & presentation
2. Grading Criteria for Merit and Distinction of this coursework
Merit (M1, M2, M3)
Distinction (D1, D2, D3)
Descriptors
Indicative characteristics
Descriptors
Indicative characteristics
M1. Identify and apply strategies to find appropriate solution
· Pass requirements achieved
11. · effective judgment have been made
· an effective approach to study and research has been applied
D1. Use critical reflection to evaluate own work and justify
valid conclusions
Pass and Merit requirements achieved
· The validity of results has been evaluated using
defined criteria
· Realistic improvements have been proposed against defined
characteristics for success
M2.
Select/design
D2. Take responsibility for managing and
has been demonstrated
and apply appropriate methods/techniq ues
applied
· A range of sources of information has been used
· The design of methods and techniques/sources has been
justified
organising activities
· Substantial activities, projects or investigations have been
planned, managed and organised
· Activities have been managed
· The importance of independence has been recognised and
achieved
M3. Present and communicate appropriate findings
· The appropriate structure and approach has been used
· Coherent, logical development of
principles/concepts for the intended audience
· A range of methods of presentation has been used and
technical language have been accurately used
· Communication has taken place in familiar and unfamiliar
contexts
D3. Demonstrate convergent/lateral/crea tive thinking
· Ideas have been generated and decisions taken
· Convergent and lateral thinking have been applied
12. · Problems have been solved
· Innovation and creative though have been applied
· Receptiveness to new ideas is evident
· Effective thinking has taken place in unfamiliar contexts
3. Preparation guidelines of the Coursework Document
a. All coursework must be word processed.
b. Document margins must not be more than 2.54 cm (1 inch) or
less than 1.9cm (3/4 inch).
c. Font size must be within the range of 10 point to 14 point
including the headings and body text (preferred font size is 11).
d. Standard and commonly used type face such as Arial should
be used.
e. All figures, graphs and tables must be numbered.
f. Material taken from external sources must be properly
refereed and cited within the text using
Harvardstandard
g. Do not use Wikipedia as a reference.
h. Word limit must be strictly followed.
4. Plagiarism and Collusion
Any act of plagiarism or collusion will be seriously dealt with
according to the College regulations. In this context the
definition and scope of plagiarism and collusion are presented
below:
Plagiarism is presenting somebody else’s work as your own. It
includes copying information directly from the Web or books
without referencing the material; submitting joint coursework as
an individual effort.
Collusion is copying another student’s coursework; stealing
coursework from another student and submitting it as your own
work.
Suspected plagiarism or collusion will be investigated and if
found to have occurred will be dealt with according to the
college procedure. (For details on Plagiarism & Collusion
please see the student hand book)
5. Submission
a. Initial submission of coursework to the tutors is compulsory
13. in each unit of the course.
b. Student must check their assignments on ICON VLE with
plagiarism software Turnitin to make sure the similarity index
for their assignment stays within the College approved level. A
student can check the similarity index of their assignment three
times in theDraftAssignment submission point located in the
home page of the ICON VLE.
c. All Final coursework must be submitted to the Final
submission point into the unit (not to the Tutor). A student
would be allowed to submit only once and that is the final
submission.
d. Any computer files generated such as program code
(software), graphic files that form part of the coursework must
be submitted as an attachment to the assignment with all
documentation.
e. Any portfolio for a unit must be submitted as a hardcopy to
examination office.
f. The student must attach a tutor’s comment in between the
cover page and the answer in the case of Resubmission.
6. Good practice
a. Make backup of your work in different media (hard disk,
memory stick etc.) to avoid distress for loss or damage of your
original copy.
7. Extension and Late Submission
a. If you need an extension for a valid reason, you must request
one using an Exceptional Extenuating Circumstances (EEC)
form available from the College examination office and ICON
VLE. Please note that the lecturers do not have the authority to
extend the coursework deadlines and therefore do not ask them
to award a coursework extension. The completed form must be
accompanied by evidence such as a medical certificate in the
event of you being sick.
b. Late submission will be accepted and marked according to
the college procedure. It is noted that late submission may not
be graded for Merit and Distinction.
c. All Late coursework must be submitted to the Late
14. submission point into the unit (not to the Tutor). A student
would be allowed to submit only once and that is the final
submission.
8. Submission deadlines
Formative feedback
Week 11
Presentation
Week 12
Final Submission
28 May 2015 – 09 Sept 2015
Late submission
11 – 16 Sept. 2015
Submit to: Online to the ICON VLE only
Glossary:
Analyse: Break an issue or topic into smaller parts by looking in
depth at each part. Support each part with arguments and
evidence for and against (Pros and cons).
Critically Evaluate/Analyse: When you critically evaluate you
look at the arguments for and against an issue. You look at the
strengths and weaknesses of the arguments. This could be from
an article you read in a journal or from a text book.
Discuss: When you discuss you look at both sides of a
discussion. You look at both sides of the arguments. Then you
look at the reason why it is important (for) then you look at the
reason why it is important (against).
Explain: When you explain you must saywhy it is important or
not important.
Evaluate: When you evaluate you look at the arguments for and
against an issue.
Describe: When you give an account or representation of in
15. words.
Identify: When you identify you look at the most important
points.
Department of Information Technology Page 1 of 7
Department of Information Technology Page 1 of 7
Department of Information Technology Page 8 of 8
Department of Information Technology Page 1 of 10
HND Assignment Brief
Session: September 2015
Programme title BTEC HND in Computing and Systems
Development
Unit number and title 35 Web Applications Development (L5)
Assignment number &
title 1 of 1 Web Applications Development (L5)
Unit Leader Dr. Gebremichael
Assessor (s) Yonas Gebremichael and Hassan Baajour
Issue Date 30 Sep 2015
16. Final assignment
submission deadline 28 Dec 2015 – 09 Jan 2016
Late submission
deadline
11 – 16 January 2016
The learners are required to follow the strict deadline set by the
College for submissions of assignments in accordance with the
BTEC level 4 – 7 submission guidelines and College policy on
submissions. They should also refer to Merit and Distinction
criteria
that require evidence of meeting agreed timelines and ability to
plan
and organise time effectively without which the learner may not
expect to receive a higher grade.
Resubmission deadline TBA
Feedback
In-class feedback will be available from draft submissions on a
task-
by-task basis as a formative feedback and also for initial
submission.
Final feedback will be available within 2 – 3 weeks of the
assignment
submission date.
General
Guidelines
1. The work you submit must be in your own words. If you use a
17. quote or an
illustration from somewhere you must give the source.
2. Include a list of references at the end of your document. You
must give all
your sources of information.
3. Make sure your work is clearly presented and that you use
readily
understandable English.
4. Wherever possible use a word processor and its “spell-
checker”.
Internal verifier Dr. Hasan
Signature (IV of
the brief) * Dr. Hasan Date 06/10/15
Department of Information Technology Page 2 of 10
ICON College of Technology and Management
BTEC HND in Computing and Systems Development
(CSD)
Unit 35: Web Applications Development (L5)
Session: September 2015
18. Coursework
Recommended maximum words: 3,000
This Unit will be assessed by assignment and Presentation.
You are strongly recommended to read “Preparation guidelines
of the
Coursework Document” before answering/solving your
assignment.
Scenario
Lingo Academy provides people with short time courses in IT.
You are required to create a simple web
application which we will call ‘Lingo Management System’ for
the purpose of maintaining student’s
details and monitoring their academic progress. The system has
an admin who has full administrative
rights to register, remove, update and maintain the students’
details and to register and update
courses in the system. Each course at Lingo Academy has only
one teacher who has the rights to
insert and update the grades directly in the system only for his
students (less than 50 Fail, between 50
and 60 Pass, between 60 and 70 Merit, above 70 Distinction).
The student should be able to login to
the system and check his progress. To implement the site, you
19. must use HTML5, CSS and JavaScript
for the client- side coding. PHP must be used for the server side
coding. The site must run from a local
web server. The backend will be built with MySQL Server
database.
Functional Specification
1. Accounts Creation
- Create HTML forms as needed to create accounts for the users
of the system and to store and
maintain the required data.
- Account and other data (e.g. courses) details are to be stored
in your MySQL database.
- The system must prevent duplicate usernames being chosen
(Do not use the email address
as a username).
-
2. Forms Validation
It is important that you validate the forms on client side using
html5 and JavaScript code, in addition to
the validation using server side code (i.e. PHP) and you should
display proper error messages as
needed.
20. 3. Authentication
Any available login form on your website should be usable by
the all the user types of the system,
however they should be allowed to access only what is related
to their roles.
Department of Information Technology Page 3 of 10
4. Search
The admin and the teacher should be able to search available
students. However, the teacher should
only be allowed to find and view his own students. Also, all
users of the system should be allowed to
search and find courses available in the system.
5. Contact
Your website must provide users with a contacting form that
uses html5, JavaScript and PHP. The
form should send the message directly to the admin or the
teacher depending on the user selection. It
should as well keep a copy of the email inside the MYSQL db.
21. 6. Other issues
Your website should look simple and nice and must include
minimum 5 different pages including
home, courses, about, contact us (public pages) and accounts
management (private pages). All public
pages must have a header and footer with relevant logo,
navigation links menu, login form, images
and/or videos.
Task 1
In the reference to the above scenario:
1.1 Critically evaluate the functions and advantages of web
applications. [P1.1].
1.2 Critically compare different types of server-side and client-
side scripting languages. [P1.2, M1].
1.3 Examine web security concerns and make recommendations
for security improvements for
your web application. [P1.3].
ve M1; Student has to define clearly the difference
between the client side and server
side languages. In addition, student has to identify and define
multiple server and client side
languages and to list main differences between them.
Task 2
22. This task focuses in the design of the web application and
associated database. Within this context
and in the reference to the above scenario:
2.1 Design a web application to meet the given requirements in
the scenario above. Use all relevant
techniques such as wire-framing, storyboarding and sitemap.
Your website shall have all the
relevant pages for full implementation of the above scenario
including a sitemap. [P2.1, M2]
2.2 Demonstrate a client-server architecture suitable for your
web application. [P2.2, D1]
2.3 Design a database system for use in your web application.
[P2.3, D2]
2.4 Evaluate alternative designs and solutions to meet a given
requirement. [P2.4]
consistent wire-frames and storyboards
including header, footer, main content sections with logo,
navigation links menu, login form,
crumb-bread, relevant images and videos … etc.
Department of Information Technology Page 4 of 10
te proper client-server
architecture that suits his system
23. and has to demonstrate the role of each component and how
they communicate together.
database, demonstrate the relations
between them and justify his design.
Task 3
This task aims to establish a good familiarity with the
implementation of the web application using
proper client-server technologies connected to a relational
database using html, CSS, JavaScript,
PHP and MySQL DB. To this end you have to:
3.1 Implement the proposed wireframe and storyboards
introduced in task 2 using mark-up and
scripting languages as appropriate: HTML for web pages, CSS
for presentation styles,
JavaScript for client side script [P3.1].
3.2 Implement web-enabled database management system to
store, retrieve and manipulate data
in the web application as specified in the scenario above using
PHP and SQL queries. [P3.2,
D3]
3.3 Identify and implement opportunities for error handling and
reporting. [P3.3]
24. system that reflects creativity in
developing the proposed client-server architecture introduced in
Task 2.
Task 4
4.1 Review and test your web application on front end and back
end levels. [P4.1]
4.2 analyse actual test results against expected results to
identify discrepancies (Use verification
table). [P4.2]
4.3 Critically evaluate independent feedback on a developed
web application and make
recommendations for improvements [P4.3, M3]
4.4 Create user documentation for a developed web application.
[P4.4, D3]
and demonstrates how they will
deal with it in proper way.
nt has to provide proper documentation
for the technical side in a way that
allows other developers realise how to fix and update the code
of the system. Also student has
to demonstrate clearly how the actual user of the system will be
able to use it. The user guide
has to include clear instructions and relevant screen shots.
25. Assessment Methods
This is an individual coursework.
There are TWO components to this assignment.
1. Your system will be assessed at a laboratory
demonstration/viva where the complete system
(software or hardware) you produced will be demonstrated and
you will be asked to answer
related questions. For this, you will need to prepare a power
point presentation or similar
Department of Information Technology Page 5 of 10
presentation package of your choice to aid your oral
presentation. The presentation will last
no more than 10-15 minutes. You will be marked on content,
presentation style and clarity of
delivery. This is important and you should treat it as an
examination.
2. You will need to produce a short report addressing all the
questions in each learning outcome.
You must include your power point slides in this report. There
is no written examination for
this unit.
26. Additional Specs, Hints & Good Programming Practices
• The marking scheme for this coursework will assign marks for
Functionality, Quality of Code,
Program Design, Style, Documentation and Working Binaries.
Style and Documentation are
crucial – you must neatly comment your code.
• Try and break the coursework down into do-able chunks as
identified by the task list. These
are distinct programs in the coursework, so try and modularise
your effort – for instance - first
you need to set up the menu system and build functionalities of
each menu item one by one.
This approach will help in the testing and debugging process of
your code.
• You should aim in achieving good level of Modularity in
implementing your developed
Algorithm and to avoid High inter-Dependability between the
implemented Functions of your
Program Code.
• DEBUGGING HINT: Compile and test your program after
every change, even if it was as
simple a change as adding a single line. This will allow you to
find and fix errors early
before you write more code. This is another reason why you
have to write the skeleton
27. program which runs first even if it does not do anything yet.
• Your main program should have the following heading shown
below. You must customise it to
your particular details.
/****************************************************
*********************************
About: This program is written as part of the fulfilment for the
‘put your Unitname’
Course - HND in EEE/CSD at Icon College, London.
Date : Put date here
By : Put your name here. Student ID: Put your student ID
Here
*****************************************************
********************************/
• Each function must have its own comment heading which
describes exactly what the code
does as shown below as an example.
/****************************************************
*********************************
About: This program takes your date of birth as an input and
returns your age.
*****************************************************
********************************/
28. In addition to the above, follow good programming practices.
Below are some of the common good
practices generally accepted as industry standard and followed
by those in industry. You will get
more marks for following good programming practices. Some
examples are given below.
• When naming identifiers,
Department of Information Technology Page 6 of 10
o Do not start with underscore (used for technical
programming). e.g. _grades (this is
bad practice)
o Write single word variables in all lower case , e.g. int grades,
roots;
o Space is not allowed in identifiers, e.g. ‘student grades’ is
wrong! write this as
studenGrades or student_grades. Note the use of capitalisation
or the
underscore.
o Use CAPITAL LETTERS TO DECLARE CONSTANTS, e.g.
PI = 3.14, SIZE = 100;
o Start function names with capital letters. e.g.
AverageGrades(). Spaces are not
29. allowed in function names. ‘Average Grades()’ is wrong. Use
AverageGrades() or
Average_grades().
• Emphasis and care must be taken in producing good
descriptive COMMENTS in the Program
Code, following a ‘tidy’ indentation of the Program Code, and
using descriptive names for the
Functions and Variables implemented in the Program Code.
• Make a habit of using Meaningful identifier and Function
Names to make your code easier
for others to understand. Think about it, what does "g" mean? Is
it grades, garbage, grave,
etc. Thus do not use cryptic identifier names, e.g. Use ‘grades’
to refer to student grades
rather than ‘g’. Similarly, use sensible function names. If you
want to write a function that
assigns student’s grades, then call it StudentGrades(). Do not
use your names or names of
your pets or any name that does not describe what the function
does, but at the same time do
not use more than 3 words, i.e. do not use a sentence to name a
function. e.g.
ThisIsMyAverageFunction() while syntactically correct is not
30. good programming practice.
• You are encouraged to use efficient Programming skills in
implementing the designed
Algorithm, e.g. for avoiding unnecessary Variables Declarations
etc., and in taking into
consideration the Computational Costs in Hardware of your
written Program Code, e.g. avoid
unnecessary Repetition Statements etc.
• Remember PHP & JavaScript are case sensitive so ‘Grades’
and ‘grades’ are not the same as
identifier names. Thus be case and spelling consistent. Use an
identifier name only once
and spell it (upper and lower case) the same way within your
program.
Finally give the project and your report a sensible name like
E.g. Unit35_CW_ID3344.
31. Department of Information Technology Page 7 of 10
Relevant Information
To gain a Pass in a BTEC HND Unit, you must meet ALL the
Pass criteria; to gain a Merit, you must
meet ALL the Merit and Pass criteria; and to gain a Distinction,
you must meet ALL the Distinction,
Merit and Pass criteria
1. Outcomes of the unit and assessment criteria
Outcomes Assessment criteria for pass. To achieve each
outcome a learner must demonstrate
Questions
reflecting the
outcome
LO1.
Understand the concepts
of web application
development
1.1 critically evaluate the functions and advantages of
web applications
1.2 critically compare different types of server-side and
client-side scripting languages
32. 1.3 examine web security concerns and make
recommendations for security improvements
Task 1 & TCA
LO2.
Be able to design web
applications
2.1 design a web application to meet a given
requirement
2.2 synthesise client-side and server-side functionality
in a web application
2.3 apply a database design for use in a web
application
2.4 evaluate alternative designs and solutions to meet a
given requirement
Task 2 & TCA
LO3.
Be able to implement
33. Web Applications
3.1 implement a web application to a prepared design
using client-side and server-side scripting languages
3.2 implement a web-enabled database management
system to store, retrieve and manipulate data in a web
application
3.3 identify and implement opportunities for error
handling
and reporting
Task 3 & TCA
LO4.
Be able to test Web
Applications
4.1 critically review and test a web application using a
web enabled database management system
4.2 analyse actual test results against expected results
to identify discrepancies
34. 4.3 critically evaluate independent feedback on a
developed web application and make recommendations
for improvements
4.4 create user documentation for a developed web
application.
Task 4 & TCA
Department of Information Technology Page 8 of 10
2. Grading Criteria for Merit and Distinction of this coursework
Merit (M1, M2, M3) Distinction (D1, D2, D3)
Descriptors Indicative characteristics Descriptors Indicative
characteristics
M1. Identify and
apply strategies to
find appropriate
solution
35. achieved
have been made
to study and research
has been applied
D1. Use critical reflection to
evaluate own work and
justify valid conclusions
Pass and Merit requirements
achieved
been evaluated using
defined criteria
been proposed against
defined characteristics for
success
37. has been demonstrated
projects or investigations
have been planned,
managed and organised
managed
independence has been
recognised and achieved
M3. Present and
communicate
appropriate findings
structure and
approach has been
used
38. development of
principles/concepts for
the intended audience
presentation has been
used and technical
language have been
accurately used
taken place in familiar
and unfamiliar
contexts
D3. Demonstrate
convergent/lateral/creative
thinking
and decisions taken
39. thinking have been applied
though have been applied
ss to new ideas
is evident
Department of Information Technology Page 9 of 10
3. Preparation guidelines of the Coursework Document
a. All coursework must be word processed.
b. Document margins must not be more than 2.54 cm (1 inch) or
less than 1.9cm (3/4 inch).
c. Font size must be within the range of 10 point to 14 point
including the headings and body text
(preferred font size is 11).
d. Standard and commonly used type face such as Arial should
be used.
e. All figures, graphs and tables must be numbered.
f. Material taken from external sources must be properly
refereed and cited within the text using
Harvard standard
g. Do not use Wikipedia as a reference.
40. h. Word limit must be strictly followed.
4. Plagiarism and Collusion
Any act of plagiarism or collusion will be seriously dealt with
according to the College
regulations. In this context the definition and scope of
plagiarism and collusion are presented
below:
Plagiarism is presenting somebody else’s work as your own. It
includes copying information
directly from the Web or books without referencing the
material; submitting joint coursework as
an individual effort.
Collusion is copying another student’s coursework; stealing
coursework from another student
and submitting it as your own work.
Suspected plagiarism or collusion will be investigated and if
found to have occurred will be
dealt with according to the college procedure. (For details on
Plagiarism & Collusion
please see the student hand book)
5. Submission
a. Initial submission of coursework to the tutors is compulsory
in each unit of the course.
b. Student must check their assignments on ICON VLE with
plagiarism software Turnitin to
make sure the similarity index for their assignment stays within
the College approved level. A
student can check the similarity index of their assignment three
times in the Draft
41. Assignment submission point located in the home page of the
ICON VLE.
c. All Final coursework must be submitted to the Final
submission point into the unit (not to
the Tutor). A student would be allowed to submit only once and
that is the final submission.
d. Any computer files generated such as program code
(software), graphic files that form part of
the coursework must be submitted as an attachment to the
assignment with all
documentation.
e. Any portfolio for a unit must be submitted as a hardcopy to
examination office.
f. The student must attach a tutor’s comment in between the
cover page and the answer in the
case of Resubmission.
6. Good practice
a. Make backup of your work in different media (hard disk,
memory stick etc.) to avoid distress
for loss or damage of your original copy.
7. Extension and Late Submission
a. If you need an extension for a valid reason, you must request
one using an Exceptional
Extenuating Circumstances (EEC) form available from the
College examination office and
ICON VLE. Please note that the lecturers do not have the
42. authority to extend the coursework
deadlines and therefore do not ask them to award a coursework
extension. The completed
form must be accompanied by evidence such as a medical
certificate in the event of you being
sick.
b. Late submission will be accepted and marked according to
the college procedure. It is noted
that late submission may not be graded for Merit and
Distinction.
c. All Late coursework must be submitted to the Late
submission point into the unit (not to the
Tutor). A student would be allowed to submit only once and that
is the final submission.
Department of Information Technology Page 10 of 10
8. Submission deadlines
Formative feedback Week 11
Presentation Week 12
Final Submission 28 Dec 2015 – 09 Jan 2016
Late submission 11 – 16 Jan 2016
Submit to: Online to the ICON VLE only
Glossary:
Analyse: Break an issue or topic into smaller parts by looking in
depth at each part. Support each
43. part with arguments and evidence for and against (Pros and
cons).
Critically Evaluate/Analyse: When you critically evaluate you
look at the arguments for and against
an issue. You look at the strengths and weaknesses of the
arguments. This could be from an article
you read in a journal or from a text book.
Discuss: When you discuss you look at both sides of a
discussion. You look at both sides of the
arguments. Then you look at the reason why it is important (for)
then you look at the reason why it is
important (against).
Explain: When you explain you must say why it is important or
not important.
Evaluate: When you evaluate you look at the arguments for and
against an issue.
Describe: When you give an account or representation of in
words.
Identify: When you identify you look at the most important
points.
Additional Specs, Hints & Good Programming Practices