The document provides information for a university examination for a Project Management practical. It includes three questions related to class diagrams, activity diagrams, and use case diagrams. For question 1, students are asked to draw a class diagram for a university course management system scenario. For question 2, students are asked to draw an activity diagram for an online paper submission system based on a provided summary. For question 3, students are asked to draw a use case diagram for a web shopping system based on a provided scenario. The document provides details for students to model systems using UML diagrams for the practical examination.
The document discusses an ERP marketing module presentation. It begins with an introduction to ERP systems and what they are used for. It then focuses on the marketing module, explaining that it allows organizations to maximize marketing efficiencies and empower marketers. The marketing module supports critical processes like marketing resource management, campaign management, surveys, lead management, and analytics. It provides examples of how each of these processes works and the benefits they provide for marketing functions.
The document discusses offloading in mobile cloud computing. It defines offloading as migrating data storage and computations from a mobile device to a remote cloud to improve performance and save energy. This is done to address limitations of mobile devices like poor battery life, limited storage, and resources. Offloading can take full or partial forms. Factors like bandwidth, amount of data, and computation are considered to determine if offloading improves performance or saves energy. Different types and topologies of offloading are also discussed.
A ppt on Mac Operating System by Apple. I've made this presentation simpler by changing the words in it to a simpler English which everyone can understand and explain it easily. For getting customized projects on Information Technology, contact at https://quvor.com
This document summarizes and compares paging and segmentation, two common memory management techniques. Paging divides physical memory into fixed-size frames and logical memory into same-sized pages. It maps pages to frames using a page table. Segmentation divides logical memory into variable-sized segments and uses a segment table to map segment numbers to physical addresses. Paging avoids external fragmentation but can cause internal fragmentation, while segmentation avoids internal fragmentation but can cause external fragmentation. Both approaches separate logical and physical address spaces but represent different models of how a process views memory.
Operating System ,UNIX & LINUX base System Calls
1) Process Creation
2) Executing a Command
3) Wait command
4) Sleep Command
5) Sleep Command using getpid
6) Signal Handling
With C-Programming & BASH Programming
Cloud computing allows for location-independent computing resources that can be accessed on demand. It has evolved from earlier technologies like utility computing and now commonly uses a client-server model. The key features of cloud computing include agility, cost savings, scalability, and reliability, though privacy and security concerns still need to be addressed.
The document discusses process management in operating systems. It defines a process as a program during execution, which requires resources like memory and CPU registers. The document outlines the life cycle of a process, including the different states a process can be in like ready, running, waiting, blocked. It describes process creation and termination. The process control block (PCB) contains information needed to control and monitor each process. Context switching allows the CPU to switch between processes. Scheduling determines which process enters the running state. The document lists some common process control system calls and discusses advantages and disadvantages of process management.
The document discusses an ERP marketing module presentation. It begins with an introduction to ERP systems and what they are used for. It then focuses on the marketing module, explaining that it allows organizations to maximize marketing efficiencies and empower marketers. The marketing module supports critical processes like marketing resource management, campaign management, surveys, lead management, and analytics. It provides examples of how each of these processes works and the benefits they provide for marketing functions.
The document discusses offloading in mobile cloud computing. It defines offloading as migrating data storage and computations from a mobile device to a remote cloud to improve performance and save energy. This is done to address limitations of mobile devices like poor battery life, limited storage, and resources. Offloading can take full or partial forms. Factors like bandwidth, amount of data, and computation are considered to determine if offloading improves performance or saves energy. Different types and topologies of offloading are also discussed.
A ppt on Mac Operating System by Apple. I've made this presentation simpler by changing the words in it to a simpler English which everyone can understand and explain it easily. For getting customized projects on Information Technology, contact at https://quvor.com
This document summarizes and compares paging and segmentation, two common memory management techniques. Paging divides physical memory into fixed-size frames and logical memory into same-sized pages. It maps pages to frames using a page table. Segmentation divides logical memory into variable-sized segments and uses a segment table to map segment numbers to physical addresses. Paging avoids external fragmentation but can cause internal fragmentation, while segmentation avoids internal fragmentation but can cause external fragmentation. Both approaches separate logical and physical address spaces but represent different models of how a process views memory.
Operating System ,UNIX & LINUX base System Calls
1) Process Creation
2) Executing a Command
3) Wait command
4) Sleep Command
5) Sleep Command using getpid
6) Signal Handling
With C-Programming & BASH Programming
Cloud computing allows for location-independent computing resources that can be accessed on demand. It has evolved from earlier technologies like utility computing and now commonly uses a client-server model. The key features of cloud computing include agility, cost savings, scalability, and reliability, though privacy and security concerns still need to be addressed.
The document discusses process management in operating systems. It defines a process as a program during execution, which requires resources like memory and CPU registers. The document outlines the life cycle of a process, including the different states a process can be in like ready, running, waiting, blocked. It describes process creation and termination. The process control block (PCB) contains information needed to control and monitor each process. Context switching allows the CPU to switch between processes. Scheduling determines which process enters the running state. The document lists some common process control system calls and discusses advantages and disadvantages of process management.
This document provides course material for the subject of Operating Systems for 4th semester B.E. Computer Science Engineering students at A.V.C. College of Engineering. It includes information on the name and designation of the faculty teaching the course, the academic year, curriculum regulations, 5 units that make up the course content, textbook and reference details. The course aims to cover key topics in operating systems including processes, process scheduling, storage management, file systems and I/O systems.
This document discusses inter-process communication (IPC) mechanisms. It describes how independent processes can cooperate by affecting or being affected by each other's execution. Common IPC mechanisms include message passing using messages queues or sockets, and shared memory. The document provides details on message passing implementations, pipes, signals for asynchronous event notification, and System V IPC mechanisms like semaphores and shared memory. It also discusses IPC in the MACH kernel using message passing and port-based communication.
The document discusses several important operating system security issues. The operating system must provide protection mechanisms to prevent unauthorized access to processes and resources. It also needs flexibility to configure how resources are shared between processes and change these configurations as needed. Key security issues for an operating system include implementing protection mechanisms, controlling resource sharing, enforcing security policies, and utilizing authentication and authorization.
The document discusses parallel programming using MPI (Message Passing Interface). It introduces MPI as a standard for message passing between processes. It describes how to set up a basic parallel computing environment using a cluster of networked computers. It provides examples of using MPI functions to implement parallel algorithms, including point-to-point and collective communication like broadcast, gather, and scatter.
Virtualization is a technique, which allows to share single physical instance of an application or resource among multiple organizations or tenants (customers)..
Virtualization is a proved technology that makes it possible to run multiple operating system and applications on the same server at same time.
Virtualization is the process of creating a logical(virtual) version of a server operating system, a storage device, or network services.
The technology that work behind virtualization is known as a virtual machine monitor(VM), or virtual manager which separates compute environments from the actual physical infrastructure.
Implementation levels of virtualizationGokulnath S
Virtualization allows multiple virtual machines to run on the same physical machine. It improves resource sharing and utilization. Traditional computers run a single operating system tailored to the hardware, while virtualization allows different guest operating systems to run independently on the same hardware. Virtualization software creates an abstraction layer at different levels - instruction set architecture, hardware, operating system, library, and application levels. Virtual machines at the operating system level have low startup costs and can easily synchronize with the environment, but all virtual machines must use the same or similar guest operating system.
This document provides an overview of the Mac operating system (OS) from its origins in 1984 to the current OS X 10.15 Catalina. It discusses what an operating system is and examples like Mac OS X, Windows, Android, and Linux. The history section outlines the development of the Classic Mac OS from 1984 to 2001 and its graphical user interface. It then summarizes the transition to Mac OS X starting in 2001 and the updates through each new version leading to the current free Catalina system. Advantages of the Mac OS mentioned are its ease of use, reliability, and well-designed interface, while disadvantages include cost, limited gaming, and inability to be customized.
The document describes the analysis-synthesis model of compilation which has two parts: analysis breaks down the source program into pieces and creates an intermediate representation, and synthesis constructs the target program from the intermediate representation. During analysis, the operations of the source program are determined and recorded in a syntax tree where each node represents an operation and children are the arguments.
The document provides information about mobile platforms and applications. It discusses mobile device operating systems, their special constraints and requirements. It describes commercial mobile operating systems like iOS, Android, Blackberry and Windows Phone. It covers mobile commerce structure and pros and cons. It discusses mobile payment systems and related security issues. It focuses on different mobile platforms, their application development kits and features of the Android operating system. Specifically, it provides details about the Android architecture including its software stack, application components and SDK.
This document discusses parallel computing. It begins by defining parallel processing as using simultaneous data processing tasks to save time and/or money and solve larger problems. It then discusses how parallel computing uses multiple compute resources simultaneously to solve computational problems. Some examples of parallel phenomena in nature and technology are provided. The document outlines several areas where parallel computing is applied, including physics, bioscience, and computer science. It discusses the benefits of parallel computing in saving time and money and solving larger problems too large for a single computer. Finally, it briefly mentions ways to classify parallel computers and some basic requirements for achieving parallel execution.
Fundamentals of Computer Design including performance measurements & quantita...Gaditek
This document provides an overview of the Computer Architecture course CNE-301 taught by Irfan Ali. The course outline covers topics like fundamentals of computer design, instruction set design, pipelining, memory hierarchy, multiprocessors, and case studies. Recommended books are also mentioned. The document then provides background on computer architecture and organization, the history of computers from first to fourth generations, and embedded systems.
The document provides instructions for a practical examination on project management. It includes multiple scenarios to be modeled using UML diagrams, including class diagrams, activity diagrams, use case diagrams, and work breakdown structures. Students are asked to draw diagrams for scenarios involving university course modeling, payroll systems, library management systems, ATM cash withdrawals, online paper submissions, and software development projects. The tasks assess students' ability to analyze requirements and derive UML diagrams from descriptive texts.
The document discusses different types of computers and their basic structure and functioning. It begins by classifying computers into categories like microcomputers, laptops, workstations, supercomputers, and more. It then explains the functional units of a computer including the input, output, memory, arithmetic logic, and control units. Finally, it covers various performance metrics for computers like clock rate, pipelining, superscalar operations, and differences between RISC and CISC instruction sets.
Mobile computing faces issues such as insufficient bandwidth, security concerns, power consumption, transmission interference, and potential health hazards. Solutions include compression to reduce data transmission size, caching frequently accessed data, switching between cellular and satellite modes depending on location, and battery/chip redesigns to improve power efficiency. Researchers also recommend limiting phone use and choosing lower radiation cell phones to reduce potential health risks.
INTRODUCTIONTO OPERATING SYSTEM
What is an Operating System?
Mainframe Systems
Desktop Systems
Multiprocessor Systems
Distributed Systems
Clustered System
Real -Time Systems
Handheld Systems
Computing Environments
The document discusses several security challenges related to cloud computing. It covers topics like data breaches, misconfiguration issues, lack of cloud security strategy, insufficient identity and access management, account hijacking, insider threats, and insecure application programming interfaces. The document emphasizes that securing customer data and applications is critical for cloud service providers to maintain trust and meet compliance requirements.
1. The document discusses various ERP systems including their origins, features, and industries they serve.
2. It also covers e-commerce workflows and the growth of e-commerce in India, particularly in online travel.
3. Key ERP systems discussed are SAP, Oracle, Baan, and PeopleSoft along with their founding years, modules, technologies, and target industries.
The document contains instructions for a practical examination project on project management. It includes three scenarios to model using class diagrams in StarUML: 1) a university course management system, 2) a company payroll/reporting system, and 3) a library management system. It also includes tasks to create activity diagrams and a work breakdown structure (WBS) chart for given narratives. The scenarios and tasks are to be completed for the examination.
The document describes a class diagram assignment for a university project management course. It provides three scenarios to model with class diagrams:
1) A university course management system with classes for Course, Lecturer, Student, and interface Person.
2) A payroll/reporting system with classes for Company, Employee, Manager, and Contractor.
3) A library management system with classes for Book, Author, BookItem, Account, User, and interfaces Search and Catalog.
Students are asked to draw class diagrams for each scenario using StarUML and show appropriate relationships between classes.
This document provides course material for the subject of Operating Systems for 4th semester B.E. Computer Science Engineering students at A.V.C. College of Engineering. It includes information on the name and designation of the faculty teaching the course, the academic year, curriculum regulations, 5 units that make up the course content, textbook and reference details. The course aims to cover key topics in operating systems including processes, process scheduling, storage management, file systems and I/O systems.
This document discusses inter-process communication (IPC) mechanisms. It describes how independent processes can cooperate by affecting or being affected by each other's execution. Common IPC mechanisms include message passing using messages queues or sockets, and shared memory. The document provides details on message passing implementations, pipes, signals for asynchronous event notification, and System V IPC mechanisms like semaphores and shared memory. It also discusses IPC in the MACH kernel using message passing and port-based communication.
The document discusses several important operating system security issues. The operating system must provide protection mechanisms to prevent unauthorized access to processes and resources. It also needs flexibility to configure how resources are shared between processes and change these configurations as needed. Key security issues for an operating system include implementing protection mechanisms, controlling resource sharing, enforcing security policies, and utilizing authentication and authorization.
The document discusses parallel programming using MPI (Message Passing Interface). It introduces MPI as a standard for message passing between processes. It describes how to set up a basic parallel computing environment using a cluster of networked computers. It provides examples of using MPI functions to implement parallel algorithms, including point-to-point and collective communication like broadcast, gather, and scatter.
Virtualization is a technique, which allows to share single physical instance of an application or resource among multiple organizations or tenants (customers)..
Virtualization is a proved technology that makes it possible to run multiple operating system and applications on the same server at same time.
Virtualization is the process of creating a logical(virtual) version of a server operating system, a storage device, or network services.
The technology that work behind virtualization is known as a virtual machine monitor(VM), or virtual manager which separates compute environments from the actual physical infrastructure.
Implementation levels of virtualizationGokulnath S
Virtualization allows multiple virtual machines to run on the same physical machine. It improves resource sharing and utilization. Traditional computers run a single operating system tailored to the hardware, while virtualization allows different guest operating systems to run independently on the same hardware. Virtualization software creates an abstraction layer at different levels - instruction set architecture, hardware, operating system, library, and application levels. Virtual machines at the operating system level have low startup costs and can easily synchronize with the environment, but all virtual machines must use the same or similar guest operating system.
This document provides an overview of the Mac operating system (OS) from its origins in 1984 to the current OS X 10.15 Catalina. It discusses what an operating system is and examples like Mac OS X, Windows, Android, and Linux. The history section outlines the development of the Classic Mac OS from 1984 to 2001 and its graphical user interface. It then summarizes the transition to Mac OS X starting in 2001 and the updates through each new version leading to the current free Catalina system. Advantages of the Mac OS mentioned are its ease of use, reliability, and well-designed interface, while disadvantages include cost, limited gaming, and inability to be customized.
The document describes the analysis-synthesis model of compilation which has two parts: analysis breaks down the source program into pieces and creates an intermediate representation, and synthesis constructs the target program from the intermediate representation. During analysis, the operations of the source program are determined and recorded in a syntax tree where each node represents an operation and children are the arguments.
The document provides information about mobile platforms and applications. It discusses mobile device operating systems, their special constraints and requirements. It describes commercial mobile operating systems like iOS, Android, Blackberry and Windows Phone. It covers mobile commerce structure and pros and cons. It discusses mobile payment systems and related security issues. It focuses on different mobile platforms, their application development kits and features of the Android operating system. Specifically, it provides details about the Android architecture including its software stack, application components and SDK.
This document discusses parallel computing. It begins by defining parallel processing as using simultaneous data processing tasks to save time and/or money and solve larger problems. It then discusses how parallel computing uses multiple compute resources simultaneously to solve computational problems. Some examples of parallel phenomena in nature and technology are provided. The document outlines several areas where parallel computing is applied, including physics, bioscience, and computer science. It discusses the benefits of parallel computing in saving time and money and solving larger problems too large for a single computer. Finally, it briefly mentions ways to classify parallel computers and some basic requirements for achieving parallel execution.
Fundamentals of Computer Design including performance measurements & quantita...Gaditek
This document provides an overview of the Computer Architecture course CNE-301 taught by Irfan Ali. The course outline covers topics like fundamentals of computer design, instruction set design, pipelining, memory hierarchy, multiprocessors, and case studies. Recommended books are also mentioned. The document then provides background on computer architecture and organization, the history of computers from first to fourth generations, and embedded systems.
The document provides instructions for a practical examination on project management. It includes multiple scenarios to be modeled using UML diagrams, including class diagrams, activity diagrams, use case diagrams, and work breakdown structures. Students are asked to draw diagrams for scenarios involving university course modeling, payroll systems, library management systems, ATM cash withdrawals, online paper submissions, and software development projects. The tasks assess students' ability to analyze requirements and derive UML diagrams from descriptive texts.
The document discusses different types of computers and their basic structure and functioning. It begins by classifying computers into categories like microcomputers, laptops, workstations, supercomputers, and more. It then explains the functional units of a computer including the input, output, memory, arithmetic logic, and control units. Finally, it covers various performance metrics for computers like clock rate, pipelining, superscalar operations, and differences between RISC and CISC instruction sets.
Mobile computing faces issues such as insufficient bandwidth, security concerns, power consumption, transmission interference, and potential health hazards. Solutions include compression to reduce data transmission size, caching frequently accessed data, switching between cellular and satellite modes depending on location, and battery/chip redesigns to improve power efficiency. Researchers also recommend limiting phone use and choosing lower radiation cell phones to reduce potential health risks.
INTRODUCTIONTO OPERATING SYSTEM
What is an Operating System?
Mainframe Systems
Desktop Systems
Multiprocessor Systems
Distributed Systems
Clustered System
Real -Time Systems
Handheld Systems
Computing Environments
The document discusses several security challenges related to cloud computing. It covers topics like data breaches, misconfiguration issues, lack of cloud security strategy, insufficient identity and access management, account hijacking, insider threats, and insecure application programming interfaces. The document emphasizes that securing customer data and applications is critical for cloud service providers to maintain trust and meet compliance requirements.
1. The document discusses various ERP systems including their origins, features, and industries they serve.
2. It also covers e-commerce workflows and the growth of e-commerce in India, particularly in online travel.
3. Key ERP systems discussed are SAP, Oracle, Baan, and PeopleSoft along with their founding years, modules, technologies, and target industries.
The document contains instructions for a practical examination project on project management. It includes three scenarios to model using class diagrams in StarUML: 1) a university course management system, 2) a company payroll/reporting system, and 3) a library management system. It also includes tasks to create activity diagrams and a work breakdown structure (WBS) chart for given narratives. The scenarios and tasks are to be completed for the examination.
The document describes a class diagram assignment for a university project management course. It provides three scenarios to model with class diagrams:
1) A university course management system with classes for Course, Lecturer, Student, and interface Person.
2) A payroll/reporting system with classes for Company, Employee, Manager, and Contractor.
3) A library management system with classes for Book, Author, BookItem, Account, User, and interfaces Search and Catalog.
Students are asked to draw class diagrams for each scenario using StarUML and show appropriate relationships between classes.
IGNOU BCS-051 Software Engineering December 2022 - Exam Solutions.docxAnilVhatkar
The document describes requirements for an Online Examination Form Submission System (OEFSS) according to the IEEE format, including developing a software requirements specification, explaining the prototype model of software development with an example, providing a structure chart to decompose a system into executable tasks using a hotel billing system as an example, and presenting a Gantt chart showing the tasks, dependencies, and time estimates for developing the OEFSS.
The document describes a student-faculty document sharing application called Stufac Connect. It was developed by Priyanka Thakker and guided by Bharat K Patel. The application allows faculty to upload documents like syllabi, timetables, notes etc. for students to view and download on their android devices. It discusses the project objectives, tools used, feasibility analysis, system design with modules for students and faculty, database tables, and testing conducted. Future enhancements planned include adding more features like password reset and improving the user interface.
The document outlines a proposed student result management system with the following key points:
1. The system will manage student, subject, and marks information for classes 6-10 and generate tabulation sheets. It will also maintain the institute website.
2. The background discusses similar existing systems used in education sectors.
3. Performance will be evaluated based on user interfaces, validity checks, and software attributes like security, maintainability and portability.
The system aims to simplify and speed up the result preparation and management process for educational institutes.
Online course register system project report.pdfKamal Acharya
Student course registration process in colleges involve filling registration forms manually, getting it signed by respective subject teachers, and then getting the documents acknowledged from the concerned Advisors, College Deans and Accounts Officers respectively. Finally the registration forms are submitted in the Administrative Branch. As is evident, this process is very laborious and time consuming. An Online Student Course Registration System has been developed to simplify the current manual procedure. This system has been developed using PHP and MySQL. The front-end is designed using PHP with excerpts of code written using and back-end is designed and managed through MySQL. This system software is more secured, user-friendly and less time-consuming. Basically, systems are implemented for facilitating complex manual processes and that is exactly what we are trying to achieve. System is implemented as per user requirement such as a manufacturing concern may install a plant for easing out manual processes. We have sought help from computer programming for automation of manual registration system. With the introduction of computers, every aspect of our lives has been revolutionized. When used judiciously, computers can help us save time, secure our personal information, access the required information whenever and wherever required. Keeping all these positive points in mind, we have developed an Online Student Course Registration System for easily managing the semester registration process for the student in an institution. Ours is an advisory based system. In state agricultural universities the course allocation is advisory based and more complicated. The courses are assigned according to the skill set and industry requirements. Hence, in current scenario, automated system is required for course registration of students.
This document outlines requirements for a student result management system. The system will manage student information, subjects offered each semester, and student marks. It will include modules for user login, student data entry, subject data entry, marks entry, and report generation. Key requirements include security through password protection, maintainability to allow new features, and portability. The system will store student, subject, marks, and user data in a database.
The document describes a library management system project that was developed using object-oriented programming concepts in C++. It includes login functionality for librarians and students, along with features for adding, searching, updating, and deleting book and student records. Object-oriented programming concepts like classes, abstraction, encapsulation, and inheritance were used. Validation checks were included and the data is stored in files for future retrieval. The project aims to efficiently manage all activities in a library.
The document describes a student result management system that will manage information about users, subjects offered each semester, and marks obtained by students. It will generate reports. The system requirements include maintaining data on students, subjects, marks and user accounts with validation checks. The system will have security, maintainability and portability. Key modules include login, subject info maintenance, marks entry and maintenance of user accounts.
IRJET - Online Seminar Hall Booking SystemIRJET Journal
This document describes a proposed online seminar hall booking system. The system would allow users to book seminar halls online, reducing manual efforts. It discusses the modules of the system, including maintenance of user and hall details, online booking, approval by hall in-charges, and oversight by the principal. Technologies used would include Visual Studio, JavaScript, HTML, PHP, CSS, and MySQL. The system aims to streamline the booking process and improve utilization of seminar hall facilities.
This resume is for Gan Eng Cin, a 24-year-old Malaysian citizen currently living in Singapore. He has a diploma and advanced diploma in business information systems. His objective is to succeed in a growth-oriented environment and help achieve organizational goals. He has strengths in logical thinking, being friendly, hardworking, honest, and willing to learn. He has experience as a software engineer and has completed several projects involving database, web, and software development. His technical skills include programming languages like COBOL, C#, Java and databases like SQL Server and Oracle.
CIS 321 Case Study ‘Equipment Check-Out System’MILESTONE 3 – PRO.docxclarebernice
CIS 321 Case Study ‘Equipment Check-Out System’MILESTONE 3 – PROCESS MODELING- Part I
______________________________________________________________________________________________________
Synopsis
The requirements analysis phase answers the question, "What does the user need and want from a new system?" The requirements analysis phase is critical to the success of any new information system! In this milestone we need to identify what information systems requirements need to be defined from the system users’ perspectives.
The Data flow diagram (DFD) has gained popularity as a technique for expressing system requirements for two reasons:
• It facilitates development, which often leads to building systems that better
satisfy user needs
• Data flow diagrams and narratives are easy for users to understand.
In this milestone you will first uncover external agents, processes and data flows that define the requirements for the proposed system and document that information. You will use that to build the Context Data Flow Diagrams.
Objectives
After completing this milestone, you should be able to:
• Understand and perform the techniques for requirements discovery.
• Determine external agents (external entities) and their relationship with the
System, identify data flows.
• Construct the Context DFD using VISIO.
Prerequisites
Before starting this milestone, the following topics should be covered:
• The problem analysis phase — Chapters 3 and 5
• PIECES framework — Chapters 3 and 5
• Problem analysis techniques — Chapter 6
• Process modeling techniques — Chapter 9
Assignment
Now that we have studied the current system and analyzed some of its problems and opportunities, plus gained approval to proceed, we can now start to identify the business requirements for the system and model them. In this assignment we will use our results of the previous Milestone and transcripts of an interview with the Equipment Depot staff. The results of this activity will identify the system requirements for the proposed system.
Exhibit 3.1 is a copy of the transcript of the interview. Refer to the transcript, sample forms, and results from Milestones 1 and 2 for the information necessary to complete the activities.
Activities
1. Identify External entities and relationship with system
2. Identify data flows
3. Prepare Context level Data FlowDiagram
Deliverable format and software to be used are according to your instructor’s specifications. Deliverables should be neatly packaged in a binder, separated with a tab divider labeled “Milestone 3”.
References
• Transcripts of Interview - Exhibit 3.1 (see below)
Deliverables:
Context level DFD:
Due: __/__/__
Time: _______
ADVANCED OPTIONFor the advanced option, compile the process description to note processes’ input and output.
Due: __/__/__
Time: _______
Milestone’s Poin ...
The document proposes a College Project Management System to help reduce the workload of project coordinators in managing student projects. It describes the existing manual process and outlines the features and design of the new system, which uses Spring Boot and React to allow project coordinators, students, and guides to submit and view project details online. The system aims to save time and effort by automating tasks like batch and guide assignment and communication of submission deadlines.
This document provides a software requirements specification for a College Management System (CMS) being developed for an engineering college. It describes the purpose, scope, user characteristics, functional and technical requirements of the CMS. The CMS will be a web-based intranet application that allows students, staff and administrators to access information related to attendance, marks, feedback, library resources and more. It provides context level, user level and system level details of the CMS through use case diagrams, interaction diagrams, data flow diagrams and database tables.
A Research Paper On College Management SystemTony Lisko
This document provides a software requirements specification for a College Management System (CMS) being developed for an engineering college. It describes the purpose, scope, user characteristics, functional and technical requirements of the CMS. The CMS will be a web-based intranet application that allows students, staff and administrators to access information related to attendance, marks, feedback, library resources and more. It provides context level, user level and system level details of the CMS through use case diagrams, interaction diagrams, data flow diagrams and database tables.
The document describes the software requirements for a student result processing system. It outlines three key user modules - administrator, staff, and student. The administrator can manage student and staff details, attendance, results, and schedules. Staff can view student details, attendance, results, and schedules. Students can view their attendance, results, and schedules. The system uses Java, servlets, JSP, and MySQL and has requirements for hardware, software, and networking.
The document discusses use case modeling. It defines use cases as narrative descriptions of domain processes in a structured prose format. It describes key concepts like actors, scenarios, and the relationships between use cases such as include and extend. It provides guidelines for writing use cases, including identifying the system boundary, primary actors, and their goals to derive use cases. It also describes different styles and levels of detail for writing use cases.
The document describes two projects in a portfolio: a mobile communication system project and an internal evaluation system project. The mobile project involved developing an application for a school to enable communication between administrators, teachers, and parents. The technologies used were ASP.NET and SQL Server. The evaluation system project automated the internal evaluation process for a college using PHP and MySQL to allow adding, modifying, searching, and deleting student records and generating reports. It included modules for registration, login, record management, and viewing/searching records.
The document describes a project report for a Student Information Management System. The system allows education institutes to easily maintain student records by solving problems with manual systems where information is scattered and redundant. The project aims to strengthen students' technical skills by having them complete a project according to university guidelines. Key features of the system include student registration, attendance tracking, timetable generation, and report generation. It was developed using technologies like HTML, PHP and allows authorized users to securely access and update student information.
Similar to Project Management (2017) slip question (MUM University) (20)
Internet Technology Practical (Mumbai University) -2017Satyendra Singh
The document provides information on various diagnostic commands used for TCP/IP networking including ARP, hostname, ipconfig, netstat, ping, route, tracert. It describes the syntax and parameters of each command and provides examples of how to use them to troubleshoot networking issues. Specific topics covered include how to display and modify ARP entries, view host names, view TCP/IP configuration, view network connections and statistics, verify host connections, manipulate routing tables, and trace routes to determine network paths. The document also provides instructions on configuring static and RIP routing between routers as well as setting up DHCP, DNS, and Telnet services on a network.
The document describes several UML modeling exercises completed in a project management course. It includes class diagrams drawn for different systems, use case diagrams, activity diagrams including one using swim lanes, and the creation of a work breakdown structure for a project using WBS Pro software. Diagrams were created using Star UML software to model library management, hospital, order processing, payroll, university, passenger, point of sale, airport, checkout, and conference management systems.
This document provides a system requirements study for an inventory management system called ABC Inventory being developed by ABC company. The system will track parts, finished goods, and transactions in company warehouses. It will interface with existing purchase, production, and customer order systems. Key requirements include compatibility with other systems, high reliability and availability, and the ability to support multiple simultaneous users. The new system must allow adding new parts and goods, issuing parts to manufacturing, entering finished goods, and providing reports. Functionality, interfaces, data requirements, and constraints are defined to guide the development of the new inventory system using an object-oriented approach.
Data warehosing (2017) New Practical slip --Mumbai UniversitySatyendra Singh
The document outlines the practical examination questions for a Data Warehousing course. It provides multiple choice questions that involve tasks like importing data from databases and flat files, creating metadata, drawing ER diagrams, designing ETL processes using various operators, creating dimensions and cubes, mapping source and target tables, deploying cubes, and more. Students are evaluated based on demonstrating these processes and their understanding during a viva voce section.
Geographic Information sysytem (2017) PracticalNew Slip --Mumbai UniversitySatyendra Singh
This document contains instructions for the practical examination in Geographic Information Systems (GIS) for students at the University of Mumbai. It outlines multiple exam questions that involve creating vector and raster maps using GIS software, adding location data, performing spatial queries and analysis, and maintaining an exam journal. Students are evaluated based on their ability to create and analyze map layers, apply GIS tools, and demonstrate GIS concepts and skills.
Internet Technology (2017) Slip---Mumbai University Satyendra Singh
The documents contain exam questions and instructions for the University of Mumbai's T.Y.B.Sc. Information Technology semester VI practical examination on Internet Technology for April 2017. The exam consists of questions on IP addressing, network commands, and configuring routing protocols and network services on different topology diagrams.
The document describes steps to install Oracle 11g Release 2, configure the listener and create a database. It also outlines creating a non-Oracle module using SQL Server, creating source and target users and modules, importing data from Oracle to create a flat file and metadata, and using target structures to create dimensions and a cube. The practicals provide instructions for setting up an Oracle data warehouse.
This document outlines the syllabus for courses in the 5th and 6th semesters of the B.Sc. Information Technology program at the University of Mumbai for the 2013-2014 academic year.
In the 5th semester, courses include Network Security, ASP.Net with C#, Software Testing, Advanced Java, and Linux Administration. The corresponding practical courses are also listed.
The 6th semester courses include Internet Technology, Project Management, Data Warehousing, and electives such as IPR and Cyber Laws. Again, the corresponding practical courses are listed.
For each course, the document provides information on teaching hours, evaluation methods, textbooks, and a brief outline of topics to be covered.
This document contains exam guidelines for a Geographic Information Systems practical exam from the University of Mumbai. It outlines multiple exam questions involving tasks like creating vector layers from maps, performing spatial queries, creating maps using print composers, performing network and raster analysis, and more. Students are asked to demonstrate proficiency with GIS software skills like loading layers, geocoding, spatial queries, and map production.
INFORMATION TECHNOLOGY (2016)- SEM_VI - PRACTICAL (SLIP) QUESTIONSSatyendra Singh
The document contains the exam papers from multiple semesters of a university's practical examination in Internet Technology. Each paper contains 5 questions assessing students' knowledge of networking concepts like IP addressing, subnetting, routing protocols, and server configuration. The questions involve tasks like analyzing IP blocks, demonstrating command use, configuring routing protocols on sample networks, and setting up servers.
Leveraging Generative AI to Drive Nonprofit InnovationTechSoup
In this webinar, participants learned how to utilize Generative AI to streamline operations and elevate member engagement. Amazon Web Service experts provided a customer specific use cases and dived into low/no-code tools that are quick and easy to deploy through Amazon Web Service (AWS.)
How Barcodes Can Be Leveraged Within Odoo 17Celine George
In this presentation, we will explore how barcodes can be leveraged within Odoo 17 to streamline our manufacturing processes. We will cover the configuration steps, how to utilize barcodes in different manufacturing scenarios, and the overall benefits of implementing this technology.
CapTechTalks Webinar Slides June 2024 Donovan Wright.pptxCapitolTechU
Slides from a Capitol Technology University webinar held June 20, 2024. The webinar featured Dr. Donovan Wright, presenting on the Department of Defense Digital Transformation.
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) CurriculumMJDuyan
(𝐓𝐋𝐄 𝟏𝟎𝟎) (𝐋𝐞𝐬𝐬𝐨𝐧 𝟏)-𝐏𝐫𝐞𝐥𝐢𝐦𝐬
𝐃𝐢𝐬𝐜𝐮𝐬𝐬 𝐭𝐡𝐞 𝐄𝐏𝐏 𝐂𝐮𝐫𝐫𝐢𝐜𝐮𝐥𝐮𝐦 𝐢𝐧 𝐭𝐡𝐞 𝐏𝐡𝐢𝐥𝐢𝐩𝐩𝐢𝐧𝐞𝐬:
- Understand the goals and objectives of the Edukasyong Pantahanan at Pangkabuhayan (EPP) curriculum, recognizing its importance in fostering practical life skills and values among students. Students will also be able to identify the key components and subjects covered, such as agriculture, home economics, industrial arts, and information and communication technology.
𝐄𝐱𝐩𝐥𝐚𝐢𝐧 𝐭𝐡𝐞 𝐍𝐚𝐭𝐮𝐫𝐞 𝐚𝐧𝐝 𝐒𝐜𝐨𝐩𝐞 𝐨𝐟 𝐚𝐧 𝐄𝐧𝐭𝐫𝐞𝐩𝐫𝐞𝐧𝐞𝐮𝐫:
-Define entrepreneurship, distinguishing it from general business activities by emphasizing its focus on innovation, risk-taking, and value creation. Students will describe the characteristics and traits of successful entrepreneurs, including their roles and responsibilities, and discuss the broader economic and social impacts of entrepreneurial activities on both local and global scales.
How to Manage Reception Report in Odoo 17Celine George
A business may deal with both sales and purchases occasionally. They buy things from vendors and then sell them to their customers. Such dealings can be confusing at times. Because multiple clients may inquire about the same product at the same time, after purchasing those products, customers must be assigned to them. Odoo has a tool called Reception Report that can be used to complete this assignment. By enabling this, a reception report comes automatically after confirming a receipt, from which we can assign products to orders.
Gender and Mental Health - Counselling and Family Therapy Applications and In...PsychoTech Services
A proprietary approach developed by bringing together the best of learning theories from Psychology, design principles from the world of visualization, and pedagogical methods from over a decade of training experience, that enables you to: Learn better, faster!
🔥🔥🔥🔥🔥🔥🔥🔥🔥
إضغ بين إيديكم من أقوى الملازم التي صممتها
ملزمة تشريح الجهاز الهيكلي (نظري 3)
💀💀💀💀💀💀💀💀💀💀
تتميز هذهِ الملزمة بعِدة مُميزات :
1- مُترجمة ترجمة تُناسب جميع المستويات
2- تحتوي على 78 رسم توضيحي لكل كلمة موجودة بالملزمة (لكل كلمة !!!!)
#فهم_ماكو_درخ
3- دقة الكتابة والصور عالية جداً جداً جداً
4- هُنالك بعض المعلومات تم توضيحها بشكل تفصيلي جداً (تُعتبر لدى الطالب أو الطالبة بإنها معلومات مُبهمة ومع ذلك تم توضيح هذهِ المعلومات المُبهمة بشكل تفصيلي جداً
5- الملزمة تشرح نفسها ب نفسها بس تكلك تعال اقراني
6- تحتوي الملزمة في اول سلايد على خارطة تتضمن جميع تفرُعات معلومات الجهاز الهيكلي المذكورة في هذهِ الملزمة
واخيراً هذهِ الملزمة حلالٌ عليكم وإتمنى منكم إن تدعولي بالخير والصحة والعافية فقط
كل التوفيق زملائي وزميلاتي ، زميلكم محمد الذهبي 💊💊
🔥🔥🔥🔥🔥🔥🔥🔥🔥
1. UNIVERSITY OF MUMBAI
T.Y.B.Sc. INFORMATION TECHNOLOGY (Semester VI) (Practical) EXAMINATION
APRIL 2017
Project Management
Seat No:_________________ Max Marks: 50
1. Draw a class diagram for the scenario given below.
This is an example that models University Courses. Assume three
classes’ such as course, lecturer, student and an interface person.
Each course objects maintains a list of student on that course and
lecturer who has been assigned to teach that course. The course
object has behavior that allows adding and removing student to and
from course, assigning the teacher and getting a list of currently
assigned student and currently assigned teacher. A teacher may
teach several courses but a course only has a single teacher .A
lecturer object maintains a list of courses that it teaches, course is
attended by 0 or more student and student may attend multiple
courses. A person interface will have getName() and
getEmailAddress () methods both lecturer and student are shown to
be the type of person.
40
2. Viva 5
3. Journal 5
2. UNIVERSITY OF MUMBAI
T.Y.B.Sc. INFORMATION TECHNOLOGY (Semester VI) (Practical) EXAMINATION
APRIL 2017
Project Management
Seat No:_________________ Max Marks: 50
1. Draw a class diagram for the scenario given below.
This scenario is from system that models companies for a payroll or
reporting system. Company object has properties such as name and
employees_list and getName and getEmployees as its behavior.
Employee object includes employee no, name, salary and manager
as its properties getName (), getEmplyoeeNo () , getSalary() and
getManager() as its methods. getManager() accepts object of
manager. Company may have one or more employees. A manager
object keeps manages as list property and add
TeamMember(employee_list) and getTeamMember() as its
behaviors. One or more employee can be managed by manager
objects. Some employees are contractual employees who are within
a lieu of a contractor object. A contractor object may have length_
of _contract as its property and getLength() as its behavior.
40
2. Viva 5
3. Journal 5
3. UNIVERSITY OF MUMBAI
T.Y.B.Sc. INFORMATION TECHNOLOGY (Semester VI) (Practical) EXAMINATION
APRIL 2017
Project Management
Seat No:_________________ Max Marks: 50
1. Create a class diagram(Use Star UML) for “library management”
using the classes with their attributes and operation given below.
Also set the appropriate relationship between the classes using the
relationship tools from the toolbox following the overview of the
system given below.
Overview of the system:-
a) It has a class “Book”. Book has authors so it has an “Author”
class.
b) In order to collect book information it has “BookItem” class
which uses some of the properties from book class.
c) It needs an account for reserving book by the user so it has an
“Account class.”
d) In account class there is an attribute named state which uses an
enumeration named “AccountState”.
e) It also has a class “Library” to manage the account, user and the
books.
f) It has a user class to manage the user detail that has an account
in the library and he can borrow and return books to library.
g) The system also has an interface “Search” where the user
searches the book he needed from the “Catalog” class.
40
2. Viva 5
3. Journal 5
4. UNIVERSITY OF MUMBAI
T.Y.B.Sc. INFORMATION TECHNOLOGY (Semester VI) (Practical) EXAMINATION
APRIL 2017
Project Management
Seat No:_________________ Max Marks: 50
Max Marks: 50
1.Q1 DRAW AN ACTIVITY DIAGRAM FROM THE NARRATIVE
TEXT ON “BANK ATM MACHINE FOR WITHDRAWING
CASH”.
Summary:
An automated teller machine (ATM) or the automatic banking machine
(ABM) is a banking subsystem that provides bank customers with access
to financial transactions in a public space without the need for a cashier,
clerk or bank teller.
Customer uses bank ATM to check balances of his/her bank accounts,
deposit funds, withdraw cash and/or transfer funds which are the
generalization alternative of ATM transaction use case.
FOR WITHDRAWING CASH
On most bank ATMs, the customer is authenticated by inserting a plastic
ATM card and entering a personal identification number (PIN). Bank will
than authenticate the customer’s pin number. Only authenticated
customer can request the system for withdrawing money while the
unauthenticated customer will get back his ATM card as the system will
reject the card.
Then the system will request the authenticated customer to enter the
amount be de withdrawn. The bank will check the balance amount of the
customer if it is sufficient bank will provide the requested amount to the
customer and debit the respective amount from the balance. The customer
will collect or take the amount from the slot. In case of insufficient
amount the system will show the balance and reject the card. At the end
of all the process the customer will take back his ATM card.
40
2. Viva 5
3. Journal 5
5. UNIVERSITY OF MUMBAI
T.Y.B.Sc. INFORMATION TECHNOLOGY (Semester VI) (Practical) EXAMINATION
APRIL 2017
Project Management
Seat No:_________________ Max Marks: 50
1. DRAW AN ACTIVITY DIAGRAM FROM THE NARRATIVE TEXT
ON “ONLINE PAPER SUBMISSION SYSTEM”.
SUMMARY
The author completes an online form that requests the user to
input author name, Correspondence address, email and, title of
paper. The system validates this data and, if correct, asks the
author to submit the paper. The author then browses to find the
correct paper on their system and submits it. Once received and
stored, the system returns to the author a reference number for the
paper. Authors may submit as many papers as they like to be
considered for acceptance to the conference up until the deadline
date for submissions. Papers are allocated to referees for
assessment. They review each paper and submit to the system
their decision. Once the program organizer has agreed the
decisions authors are informed by email. Accepted papers are then
schedule to be delivered at a conference. This involves allocating
a date, time and place for the presentation of the paper.
40
2. Viva 5
3. Journal 5
6. UNIVERSITY OF MUMBAI
T.Y.B.Sc. INFORMATION TECHNOLOGY (Semester VI) (Practical) EXAMINATION
APRIL 2017
Project Management
Seat No:_________________ Max Marks: 50
1.Q DRAW THE ACTIVITY DIAGRAM FOR THE GIVEN PROBLEM OF
USE CASE.
DESCRIPTION OF THE EXAMINATION PAPER PREPARATION
SUPPORT SYSTEM.
Use case name: submit question
Participant: lecturer
Entry conditions:
1. The question is ready and stored in a file
2. The lecturer is assigned to the module
Exit conditions:
1. The file is uploaded to the system
2. The module leader is notified of the availability of the question
3. The event is logged by the system
Flow of Events:
1. The lecturer logs into the system by entering his/her username and
password;
2. The system checks the username and password;
3. The system displays the list of modules of which he/she is the lecturer,
module leader
And/or internal examiner;
4. The lecturer selects a module and his/her role in the module as a lecturer;
5. The system prompts the user to enter the file name and location on his/her
computer, and Additional information if any;
Exceptional conditions and alternative flow of events:
When the username and password is not correct:
3.1: display error message, go back to step 1;
When the lecturer is not listed on the module:
4.1: quit the system;
Special requirements:
1. The file should be encrypted when transmitted from lecturer’s computer to
the server
2. The notification of success in uploading the file should be within 20
seconds
3. The event should be recorded in a log file to contain the following
information:
a) Name of the lecturer,
b) Date and time of the event,
c) The name of the event (upload exam question).
d) The file on the server that stores the questions.
40
2. Viva 5
3. Journal 5
7. UNIVERSITY OF MUMBAI
T.Y.B.Sc. INFORMATION TECHNOLOGY (Semester VI) (Practical) EXAMINATION
APRIL 2017
Project Management
Seat No:_________________ Max Marks: 50
1. DRAW WORK BREAK DOWN STRUCTURE FOR THE TASK
OUTLINE GIVEN BELOW USING WBS CHART PRO TOOL.
TASK OUTLINE FOR A SOFTWARE DEVELOPMENT PROJECT
FOLLOWING WATERFALL MODEL: -
Project
1.1 requirements
1.1.1 Product investigation
1.1.2 Product survey
1.1.3 Assess product suitability
1.2. Design
1.2.1 Concept design
1.2.2 Final design
1.2.2.1 Detailed design
1.2.2.2 Drawing
1.2.2.3 Design review and approval
1.3 constructions
1.3.1 Purchase material
1.3.2 Building system
1.3.2.1 Mark out dimensions
1.3.2.2 Install foundation
1.3.2.3 Install superstructure
1.4 testing
1.4.1 Test functionality
1.4.1.1 Routine testing
1.4.1.2 Random investigation
40
2. Viva 5
3. Journal 5
8. UNIVERSITY OF MUMBAI
T.Y.B.Sc. INFORMATION TECHNOLOGY (Semester VI) (Practical) EXAMINATION
APRIL 2017
Project Management
Seat No:_________________ Max Marks: 50
1. Draw a use-case diagram using StarUML for the scenario given
below.
Web Customer actor uses some web site to make purchases online.
Top level use cases are View Items, Make Purchase and Client
Register. View Items use case could be used by customer as top
level use case if customer only wants to find and see some products.
This use case could also be used as a part of Make Purchase use case.
Client Register use case allows customer to register on the web site,
for example to get some coupons or be invited to private sales. Note
that Checkout use case is included use case not available by itself
- checkout is part of making purchase. Except for the Web
Customer actor there are several other actors which will be
described below with detailed use cases. View Items use case
is extended by several optional use cases - customer may search for
items, browse catalog, view items recommended for him/her, add
items to shopping cart or wish list. All these use cases are extending
use cases because they provide some optional functions allowing
customer to find item. Customer Authentication use case
is included in View Recommended Items and Add to Wish
List because both require customer to be authenticated. At the same
time, item could be added to the shopping cart without user
authentication. Checkout use case includes several required uses
cases. Web customer should be authenticated. It could be done
through user login page, user authentication cookie ("Remember
me") or Single Sign-On (SSO). Web site authentication service is
used in all these use cases, while SSO also requires participation of
external identity provider. Checkout use case also
includes Payment use case which could be done either by using
credit card and external credit payment service or with PayPal.
40
2. Viva 5
3. Journal 5
9. UNIVERSITY OF MUMBAI
T.Y.B.Sc. INFORMATION TECHNOLOGY (Semester VI) (Practical) EXAMINATION
APRIL 2017
Project Management
Seat No:_________________ Max Marks: 50
1. Draw an activity diagram using StarUML for the
Airport check-in and security screening system depicted below.
40
2. Viva 5
3. Journal 5
10. UNIVERSITY OF MUMBAI
T.Y.B.Sc. INFORMATION TECHNOLOGY (Semester VI) (Practical) EXAMINATION
APRIL 2017
Project Management
Seat No:_________________ Max Marks: 50
1. Draw an activity diagram using StarUML for the
Credit card processing system depicted below.
40
2. Viva 5
3. Journal 5
11. UNIVERSITY OF MUMBAI
T.Y.B.Sc. INFORMATION TECHNOLOGY (Semester VI) (Practical) EXAMINATION
APRIL 2017
Project Management
Seat No:_________________ Max Marks: 50
1. Draw a use-case diagram using StarUML for the retail Point-of-
sale system depicted below.
A retail POS system typically includes a computer, monitor,
keyboard, barcode scanners, weight scale, receipt printer, credit card
processing system, etc. and POS terminal software.
Checkout use case involves Customer, Clerk and Credit Payment
Service actors and includes scanning items, calculating total and
taxes, payment use cases.
Checkout use case requires Customer actor, hence the 1 multiplicity
of Customer. Clerk can only participate in a single Checkout use
case. Credit Payment Service can participate with many Checkout
use cases at the same time. Checkout use case may not need Credit
Payment Service (for example, if payment is in cash), thus the 0..1
multiplicity.
Checkout use case is an example of a large and complex use case
split into several use cases each describing some logical unit of
behavior. Note, that including use case becomes incomplete by itself
and requires the included use cases to be complete. Payment use case
is represented using generalization relationship. It means that only
one specific type of payment is accepted - either by cash, or by
credit, debit, or with check. An alternative to such representation
could be to use include relationship so that not just single but
several forms of payment could be accepted from the same client
during checkout.
40
2. Viva 5
3. Journal 5
12. UNIVERSITY OF MUMBAI
T.Y.B.Sc. INFORMATION TECHNOLOGY (Semester VI) (Practical) EXAMINATION
APRIL 2017
Project Management
Seat No:_________________ Max Marks: 50
1. Draw a class diagram using StarUML for the scenario given
below.
This scenario shows an inheritance hierarchy of a series of classes
and their subclasses. It’s for an imaginary application that must
model different kinds of vehicles such as bicycles, motor bike and
cars. All Vehicles have some common attributes (speed and color)
and common behavior (turnLeft, turnRight). Bicycle and
MotorVehicle are both kinds of Vehicle and are therefore shown to
inherit from Vehicle. To put another way, Vehicle is the superclass
of both Bicycle and MotorVehicle. In our model MotorVehicles
have engines and license plates. Attributes have been added
accordingly, along with some behavior that allows us to examine
those attributes. MotorVehicles is the base class of both MotorBike
and Car; therefore these classes not only inherit the speed and color
properties from Vehicle, but also the additional attributes and
behavior from MotorVehicle. Both MotorBike and Car have
additional attributes and behavior which are specific to those kinds
of object.
40
2. Viva 5
3. Journal 5
13. UNIVERSITY OF MUMBAI
T.Y.B.Sc. INFORMATION TECHNOLOGY (Semester VI) (Practical) EXAMINATION
APRIL 2017
Project Management
Seat No:_________________ Max Marks: 50
1. Explain the process of cost estimation using Basic COCOMO
model. (Refer phase distribution of effort and schedule tables for the
necessary values)
20
2. Explain the process of cost estimation using intermediate COCOMO
model. (Refer Project Characteristics, phase distribution of effort
and schedule tables for the necessary values)
20
3. Viva 5
4. Journal 5
14. UNIVERSITY OF MUMBAI
T.Y.B.Sc. INFORMATION TECHNOLOGY (Semester VI) (Practical) EXAMINATION
APRIL 2017
Project Management
Seat No:_________________ Max Marks: 50
1. Using function point analysis technique, calculate the cost of effort
for application software “FPTacker” developed in java. The
application has following number of data functions and transaction
functions mentioned in the table given bellow. With TDI of 35. Note
that the application involves 2 average programmers. Each of them
is getting $150.00 per day including all benefits.
TABLE:-
Function type Complexity
low Average high
External inputs(EI) 3 4 6
External queries(EQ) 3 4 6
External outputs(EO) 4 5 7
Internal logical
file(ILF)
7 10 15
External Interface
file(EIF)
5 7 10
40
2. Viva 5
3. Journal 5
15. UNIVERSITY OF MUMBAI
T.Y.B.Sc. INFORMATION TECHNOLOGY (Semester VI) (Practical) EXAMINATION
APRIL 2017
Project Management
Seat No:_________________ Max Marks: 50
1. Estimate effort and schedule, productivity and full time personnel
required for an MIS project having three programs with DSI of 1028,
using basic COCOMO1 model in organic mode and intermediate
COCOMO model in organic mode (rate all the cost drivers as law).
Also calculate the programming effort for the same application.
40
2. An initial study of application software has determined that the size
of the program will be roughly 62,000 delivered source instruction
for an “ABC” inventory. Using intermediate COCOMO1 model
equations to calculate the effort, duration and staffing required to
developing this application software.
Note that:-
This project is rated Very High for Complexity (Effort Multiplier of
1.30), and Low for Tools Use (Effort Multiplier of 1.10), and all of
the other cost drivers are rated to be Nominal. Use these two Effort
Multipliers to calculate the Effort Adjustment Factor (EAF).
3. Viva 5
4. Journal 5
16. UNIVERSITY OF MUMBAI
T.Y.B.Sc. INFORMATION TECHNOLOGY (Semester VI) (Practical) EXAMINATION
APRIL 2017
Project Management
Seat No:_________________ Max Marks: 50
1. Using function point analysis technique, calculate the cost of effort
for application software “online shopping” developed in c# by three
programmers, which has the following number of data functions and
transaction functions mentioned in the table given bellow. With TDI
of 35. Note that in this project an average programmer is getting
$5,500 per month including all benefits.
Function Type Complexity
Low Average High
Inputs (EI) 2 4 6
Outputs (EO) 3 5 7
Files(ILF) 5 10 15
Inquiries(EQ) 2 4 6
Interfaces(EIF) 4 7 10
40
2. Viva 5
3. Journal 5
17. UNIVERSITY OF MUMBAI
T.Y.B.Sc. INFORMATION TECHNOLOGY (Semester VI) (Practical) EXAMINATION
APRIL 2017
Project Management
Seat No:_________________ Max Marks: 50
1. DRAW A CLASS DIAGRAM FOR THE SCENARIO GIVEN
BELOW:
This is an example that models “ORDER MANAGEMENT”. The
Customer object has properties such as CustomerId,
CustomerName, Address and Phone and methods such as
AddCustomer(),DeleteCustomer() and EditCustomer(). Order
object includes OrderId, CustomerId, CustomerName, ProductId,
Amount and OrderDate as its property and CreateOrder() and
EditOrder(OrderId) as its behavior. A customer can place one or
many orders. Further there are SpecialOrder object and
NormalOrder object which have same methods CreateOrder(),
confirm(), close(), dispatch() whereas the SpecialOrder object also
has one property named SpecialDiscount. SpecialOrder and
NormalOrder objects are both kinds of order and are therefore
shown to inherit from order entity. Moreover the system also has
Product entity having attributes such as ProductId, ProductPrice,
ProductType and methods such as AddProduct(), ModifyProduct()
and SelectProduct(ProductId). Stock object has properties like
ProductId, Quality and ShopNo and behavior such as addStock(),
ModifyStock(ProductId) and slectStockItem(ProductId). Note that
specialOrder and NormalOrder has 1 or more product whereas stock
has many products.
40
2. Viva 5
3. Journal 5
18. UNIVERSITY OF MUMBAI
T.Y.B.Sc. INFORMATION TECHNOLOGY (Semester VI) (Practical) EXAMINATION
APRIL 2017
Project Management
Seat No:_________________ Max Marks: 50
1. DRAW A CLASS DIAGRAM FOR THE SCENARIO GIVEN
BELOW:
This is an example that models “Hospital Management”. The ward
object of this system has attributes such as name, patient-gender and
capacity. Note that patient-gender is a gender type which is an
enumeration containing enums male and female. The system also
has Patient entity with attributes such as patient_id, admitted,
sickness _history, prescriptions, special_reqs and allergies and
gender which is again a gender enumeration type. And operations
such as getPatient() and deletePatient(Patient_id).Ward is a division
of a hospital object having attributes such as name address and
phone number. In hospital there are number of wards each of which
may be empty or have one or more patient. Each ward has unique
name. This ward is shared by patients who need a similar kind of
care. Each patient is on a single ward. The system also has Doctor
entity which is further classified into Consultant Doctor and Junior
Doctor. The doctors in the hospital are organized into Teams entity
with attribute team_name. Each team can have two or more doctors.
Each patient is under the care of a single team of doctors. A patient
may be treated by any number of doctors but all the doctors must
belong to same team that cares for the patient. Note that team is own
by the hospital.
40
2. Viva 5
3. Journal 5
19. UNIVERSITY OF MUMBAI
T.Y.B.Sc. INFORMATION TECHNOLOGY (Semester VI) (Practical) EXAMINATION
APRIL 2017
Project Management
Seat No:_________________ Max Marks: 50
1. DRAW A USE-CASE DIAGRAM USING STARUML FOR THE
“Hospital Reception Subsystem” explained below:
“Hospital Reception Subsystem” supports some of the many job
duties of hospital receptionist. Receptionist schedule patient’s
appointments with the doctor and also schedule patient hospital
admission. If doctor is available and admission to the hospital is
possible then receptionist can extend the service to patient
registration by collecting the patient information on patient arrival
or over the phone. Patient registration is an integral part of patient
Hospital Administration use case. Hospital administration use case
is further generalized into outpatient hospital admission and
inpatient hospital administration. Note that for the patient that will
stay in the hospital, he or she should have a bed allotted in a ward.
Receptionists might also receive patient’s payments, record them
in a database and provide receipts, file insurance claims and
medical reports.
40
2. Viva 5
3. Journal 5
20. UNIVERSITY OF MUMBAI
T.Y.B.Sc. INFORMATION TECHNOLOGY (Semester VI) (Practical) EXAMINATION
APRIL 2017
Project Management
Seat No:_________________ Max Marks: 50
1. DRAW A USE-CASE DIAGRAM USING STARUML FOR
THE “MUSIC PORTAL SYSTEM” DEPICTED BELOW.
The following narration describes some of the use cases for “Music
Portal System”. This system has web user as its main actor. The
web user can perform first level uses cases namely SearchAlbum,
login, logout and ViewAccount. Registration use case extends
login i.e. if the user doesn’t have a login and wishes to create a new
one, he or she can register to get a login. Moreover the
ViewAlbumDetail use case is extending the SearchAlbum use case.
Further the ViewAlbumDetail use case is extended by two more
services viz. DownloadAlbum and BuyAlbum. Note that to
download or to buy an album the user must be a registered member.
Moreover the buyalbum and ViewAccount is further extended with
Recharge use case.
40
2. Viva 5
3. Journal 5
21. UNIVERSITY OF MUMBAI
T.Y.B.Sc. INFORMATION TECHNOLOGY (Semester VI) (Practical) EXAMINATION
APRIL 2017
Project Management
Seat No:_________________ Max Marks: 50
1. DERIVE AN ACTIVITY DIAGRAM FROM THE CASE
GIVEN BELOW ON “ORDER PROCESSING SUBSYSTEM“
Web Customer uses some web site to make purchases
online. Where customer can search item, View item, add item to
the cart, place order and make payment.For placing an order the
customer first searches the required items from the system. As and
when the customer finds the item available in the system he starts
adding item to the chart. The System provides facility to the
Customer to add any number of items to the chart. Customer can
also view his shopping chart containing items.Ones the customer
finishes his shopping he can place the order by requesting system to
confirm the order.The system will then check whether the order is
normal order or any special order and according to that the system
will generate the bill and request for payment.
After getting the bill the customer can make payment.The bank will
validate the credit card number. If the credit card number is valid the
system will confirm the order. Otherwise the process will get
terminated.
40
2. Viva 5
3. Journal 5
22. UNIVERSITY OF MUMBAI
T.Y.B.Sc. INFORMATION TECHNOLOGY (Semester VI) (Practical) EXAMINATION
APRIL 2017
Project Management
Seat No:_________________ Max Marks: 50
1. DRAW AN ACTIVITY DIAGRAM FROM THE NARRATIVE
TEXT ON “TICKET VENDING MACHINE”
The scenario provided below describes the behavior of the purchase
ticket use case.
Activity is started by Commuter actor who needs to buy a ticket.
Ticket vending machine will request trip information from
Commuter. The commuter will provide trip information to the
machine. Based on the provided trip information, the ticket vending
machine will process the trip information and calculate payment
due by requesting payment. Commuter will provide payment
information to the machine. The machine will process the
payment on the basis of payment by cash or credit or debit card. If
payment by card was selected by Commuter, another actor, Bank
will participate in the activity by authorizing the payment. After
payment is complete, ticket is dispensed to the Commuter. And the
commuter will get the ticket.
Cash payment might result in some change due, so the change is
dispensed to the Commuter in this case by the machine. Ticket
vending machine will show some "Thank You" screen at the end of
all the activity.
40
2. Viva 5
3. Journal 5
23. UNIVERSITY OF MUMBAI
T.Y.B.Sc. INFORMATION TECHNOLOGY (Semester VI) (Practical) EXAMINATION
APRIL 2017
Project Management
Seat No:_________________ Max Marks: 50
1. Calculate Final Function Points, SLOC, Man-Months(MM) and total cost of
the project developed in Java. The scale value is given below:
Simple Average Complex
Inputs 2 5 1
Outputs - 5 3
Files - 1 3
Interface - 2 5
Inquires - 5 -
Assume nominal value for Degree of Influences except the following:
performance criteria (0.3),
ease of installation (3.2),
online update (0.8) &
maintainability (1.7)
The average Function Point of company is estimated as 14 .The average salary of a
programmer is Rs. 37000.
As per Universal Function Points, SLOC per FP for the technology java is 32.
20
2. An initial study has determined that the size of the program that ABC tele Industries
developed by their in-house expertise is 52,000.
Calculate Staff-Months(SM/effort), Time taken for development and productivity.
Also calculate Average Staffing requirement of project. Use COCOMO -I to calculate
the same.
20
3. Viva 5
4. Journal 5
24. UNIVERSITY OF MUMBAI
T.Y.B.Sc. INFORMATION TECHNOLOGY (Semester VI) (Practical) EXAMINATION
APRIL 2017
Project Management
Seat No:_________________ Max Marks: 50
1. Calculate Final Function Points, SLOC, Man-Months(MM) and total cost of
the project developed in C#. The scale value is given below:
Simple Average Complex
Inputs 1 3 3
Outputs - 2 3
Files - 1 3
Interface - 2 4
Inquires - - 3
All the degree of influence factors remains nominal except the following:
portability (1.85),
On-line updation (1.15) ,
scalability(1.2) and
maintainability (0.5).
The average Function Point of company is estimated as 14 .The average salary of a
programmer is Rs. 28000.
As per Universal Function Points, SLOC per FP for the technology C# is 28.
20
2. An initial study has determined that the size of the program which was developed
with the help of high complexity hardware is 255 KLOC. Calculate Effort(man-
month), Productivity, time taken for development and average staffing requirement
(FSP) of the project.
20
3. Viva 5
4. Journal 5
25. UNIVERSITY OF MUMBAI
T.Y.B.Sc. INFORMATION TECHNOLOGY (Semester VI) (Practical) EXAMINATION
APRIL 2017
Project Management
Seat No:_________________ Max Marks: 50
1. Draw a use-case diagram using StarUML for the scenario given
below.
Customer actor uses some web site to book flight tickets on-line.
Sometimes they book tickets through agents and agents book tickets
on-line for them. Privileged customers and privileged agents get
special discount upon booking. Students, Senior citizens and Armed
forces customers are also given special discounts upon proper
authentication which is verified through security service of airline
company. Top level use cases are Book Tickets, deliver
tickets and Payment. When the customer or agent book tickets,
they may reserve their seats with the help of airline company and
they may choose priority booking with the help of the company.
Package tour agents plan the schedule and they deliver the tickets
along with the schedule if the customer opts for package tour. Note
that the package tour is always scheduled in align with the schedule
of the airline company. Note that payment use case includes
payment of agent and package tour operators (if applicable) as
well. Payment use case which could be done either by using debit
card, net banking, credit card and external credit payment service or
with PayPal.
40
2. Viva 5
3. Journal 5
26. UNIVERSITY OF MUMBAI
T.Y.B.Sc. INFORMATION TECHNOLOGY (Semester VI) (Practical) EXAMINATION
APRIL 2017
Project Management
Seat No:_________________ Max Marks: 50
1. Draw a use-case diagram using StarUML for the scenario given
below.
In “Akash Mercantile Bank” the customers open account to be the
members. The customers can open either saving account or current
account. Employees of the bank give induction to the customers towards
several utilities offered by the bank. When opens an account, the customers
should give referral accounts to prove their authentication. The customers
are to keep Rs. 5000 as the minimum balance. If the rule is violated, then
they have to pay the penalty of Rs. 250 which will be debited from their
account.
If the customer is more than 55 years old or if the deposit amount is more
than 25000 then the customers are allowed to deposit the amount in the FD
account of the bank. Upon successful transaction, the customers may
calculate the bonus. The customers can withdraw funds either from the
account balance or from the maturity amount of deposit. In either form of
withdrawal, the balance should be automatically updated.
NRI customer of the bank can convert currencies and do money transfer.
40
2. Viva 5
3. Journal 5