SWE481 – Software Engineering Capstone 1 Page | 2
SWE481 Software Engineering Capstone I
Group Software Development Plan
11 August 2014
Week 5
Contents
1. Project Outline 4
2. Development Methodology 7
3. Requirements 9
3.1 Requirements Gathering Process 9
3.2 Project Requirements 10
3.3 Requirements Analysis 11
4. App Design 12
4.1 Music App Architecture 12
4.2 Major Application Components 13
4.3 Class Diagram 14
4.4 Use Case Diagram 15
4.5 Main Screen 16
4.6 Data Management 17
5. Development and Testing 18
5.1 Coding Agile Development 18
5.2 Key Processes 18
5.3 Testing Phases 20
5.4 Test Cases 21
6. Project Schedule 23
6.1 Master Schedule 23
6.2 Gantt Chart 25
6.3 Network Diagram 25
7. Risk Analysis 26
7.1 Risk Assessment 26
7.2 Mitigation Strategy 26
References 26
1. Project Outline
The project that we have chosen is a mobile application for music to expand the streaming music that is already available on the website. The application will have two options for the user to choose from. The first option will be a no cost listening option, which will have ads associated with it. This option will be a radio stream that will allow the user to listen to random songs based on the interests that they choose. The second option would be an ad-free paid subscription where the user can pick specific songs to add to their playlist for their listening pleasure.
The application will be developed to work on the Android 4.0+ operating system along with iOS 6.0+ and Windows 8.x+ phones. It will include integration for social media so that users can post their playlists and what they are listening. They will be able to share the playlists with their friends and family.
The application will be only need the UI developed as it will integrate with the backend that is already developed for the website. The budget for the project is estimated to be $300k with an expected timeline to be between 60 and 90 days. This will be finalized once the schedule is created and released.
The project will be broken down into 5 phases.
1. Initial pilot application. At this phase the application will allow users to create accounts, and have the majority of the front end laid out, but not completely functional.
2. Radio Module. This will be the development of the search functionality to allow users to search through the database of songs and artists and begin to find music for which they wish to listen.
3. Subscription Module. This will allow users to use the Radio Module above and save the songs to playlists and add music to the library.
4. Social Media Module. This will allow users to begin posting information on what they are listening to their social media networks.
5. Project Close. This will be the final release of the completed application.
Each of these phases corresponds to a cycle in the software development methodology that we have chosen to use for this project.
We must consider a number of things while developing this software and looking into devel ...
The document discusses the software crisis that occurred from 1960-1980 when many software projects unsuccessfully attempted to build large systems. This was due to increasing demands, low expectations, and a lack of problem understanding. Software engineering principles were developed to address this crisis by applying systematic and disciplined approaches. The key characteristics of software like maintainability and security are discussed. The software development process includes specification, design/implementation, validation, and evolution. Different software development models like waterfall, prototyping, and spiral are also summarized.
This document provides an introduction to software engineering. It discusses the objectives of software engineering which include producing high quality software products on time and within budget. Software engineering is defined as applying engineering principles to software development through the use of methods, tools, and techniques. The document then discusses why software engineering principles are needed, especially for large, complex software projects. It provides examples of software engineering failures that occurred when principles were not followed. The rest of the document outlines the software development process, including requirements, design, implementation, testing, and maintenance. It also discusses different process models like waterfall and spiral.
The document describes the development of a web application for an online newspaper. It discusses the objectives, which are to provide daily news, breaking news, and make information easily accessible to people. It also covers the technologies used like PHP, MySQL, CSS, and the development models of waterfall and prototyping. Data gathering and analysis are explained as important parts of the initial analysis phase of the project.
This document discusses several software development models and practices. It describes the waterfall model which involves sequential stages of requirement analysis, design, implementation, testing, and maintenance. It also covers prototyping, rapid application development (RAD), and component assembly models which are more iterative in nature. The prototyping model involves creating prototypes to help define requirements, RAD emphasizes reuse and short development cycles, and component assembly focuses on reusing existing software components.
Software Engineering Capstone 1
SWE481: Software Engineering Capstone
Phase 2 IP Software Engineering Methodologies
July 21, 2014
Contents
3Phase 1 Project Outline
3Development Methodology
4Phase 2 Software Production
4Requirements
5Design
6Application Architecture
7Music Player Main Screen
8Class Diagram
9Use Case Diagram
10Phase 3 Rapid Development (TBD)
11Phase 4 Project Scheduling (TBD)
12Phase 5 Project Risks (TBD)
13References
Phase 1 Project Outline
The project that our team is proposing is that of a mobile music application. This application will be a front end application that uses already in place internet services. The project involves. The mobile will contain free listening for radio and a paid listening subscription for user selected content. The application will be multiplatform based and be useable on iOS, Android, Windows 8.x. The application will also be integrated with social media sites such as Facebook and Google +, to name a few. There will be 6 phases for this project to include the following;
1. Pilot Application
2. Radio module
3. Subscription module
4. Social Media Module
5. Project CloseDevelopment Methodology
The development methodology will be that of Iterative/Incremental that allows for breaking up the project into small digestible chunks and is easy to understand. This method is similar to making small waterfalls out of each iteration of the software. This method allows for quick testing and customer feedback. This is best suited for small teams that support parallel coding and testing which will be used in this project. The ability to release the product in 90 to 120 days below budget is planned.Phase 2 Software Production
Requirements
The requirements gathering sessions will be completed by formal meetings, chat and email interaction. This will be done due to the various locations of the stakeholders and team members in this project. The original project inception and the requirements for the agreed upon project were gathered by email correspondence between the team members. The group leaded compiled a list of the initial requirements and this was discussed during a live chat meeting. The requirements are as follows;
· Initial pilot app (includes account creation)
· Player Module to include equalizer module ( Includes 5 bans of equalization)
· Radio module (search for music interest)
· Subscription module (create playlists, add music to library)
· Social media module
· Project close
· Application will operate across multiple platforms (Supports iOS, Android, Windows 8.x)
· Paid subscription for direct listening
· Free listening for radio playlists
· App will use backend services already exist from current website
· App will integrate into existing backend services
The first 5 requirements are functional requirements and the remaining 7 requirements are non functional requirements. The functional re.
This document provides an overview and summary of a project report for a password manager application. The project aims to develop a graphical user interface application that allows users to store login credentials for various websites and applications. It will feature functionality to add, update, and remove login details, as well as generate secure random passwords. The report outlines the objectives, analysis, design, and testing approach for the project. It describes the features and benefits of a password manager, as well as the tools and technologies that will be used such as Python, Tkinter for the GUI, and a MySQL database.
The Software Engineering Profession SWE311The Software Enginee.docxssusera34210
The Software Engineering Profession SWE311
The Software Engineering Profession SWE311-1503A-01 7/27/2015
Antoine Sims
Table of Contents
Project Outline 2
Overview 2
IT Infrastructure 3
Software Engineering Practices 4
Methodology 4
Software Engineering Standards 7
Standards 7
Software Engineering Communications 9
Communication 9
Software Engineering Ethics and Roles 12
TBD 12
Software Engineering Issues 13
TBD 13
References 14
Phase 3. Repurposed: “This task contains portions of material that were originally submitted during the phase 3 discussion board The Software Engineering Profession in SWE311 with Professor Tricic
Project Outline
Overview
Bungie.net is a company that serves as a community role for online gamers that have been around since 1996. Gamers continue to use the site as a place to gather information about news, events and technical information on upcoming games and projects. The primary function of the site is to serve as a community hub for anything that is Bungie Studios related. Any game or project that Bungie has is available for discussion through forums. Online gamers can also track there stats for games that they play. The site also serves as a means for Bungie to get feedback about gaming experience before issuing out updates to the latest gameplay updating.
“Bungie.net leverages the Microsoft .NET Framework running on Microsoft Windows 2003 and Microsoft SQL 2000 Servers to serve up over 3 million page views per day and accumulating over 300 GB of data a month of online game statistics from the almost 1 million online games played every day. Not only is Bungie.net built to scale, but its design and inventive features have not gone unnoticed, since it was rated as the "Most Innovative Design" by IGN Entertainment. The site also exceeds a 99 percent up-time ratio even through peak usage periods such as the week of the Halo 2 release. Clearly, the release of the Bungie.net site defines a new milestone in the era of online game play. This case study provides insight into this accomplishment” (Microsoft Corporation, 2005).
IT Infrastructure
Bungie has two IT department consists of two separate entities. One of those entities is an IT department that maintains the Bungie.net website and the other is its engineering department. The engineering department is the department where Bungie creates its software for the video game that they develop. In the IT Department or Operations there are several positions such as IT engineer, IT support/server specialist, and datacenter operations specialist. These people maintain the online gaming data and the website. They deal with the servers keeping them up and running. The Engineering Department has a host of position that incorporate it such as database engineers, infrastructure/platform engineers, mobile engineers, leads, online engineers, tools engineers, game server tools engineers, engine programmers, game service engineers, activities engineers, graphics pr ...
Vertex – The All in one Web ApplicationIRJET Journal
The document discusses the development of Vertex, an all-in-one web application that integrates social media, music streaming, video streaming, and other applications into a single platform. It aims to improve the user experience by reducing the need to switch between multiple individual applications. The key components of Vertex include a social media app for profiles, posts and messaging, face filters, media playback and controls, and a video streaming app. The integration of these features into one application provides a more seamless experience for users.
The document discusses the software crisis that occurred from 1960-1980 when many software projects unsuccessfully attempted to build large systems. This was due to increasing demands, low expectations, and a lack of problem understanding. Software engineering principles were developed to address this crisis by applying systematic and disciplined approaches. The key characteristics of software like maintainability and security are discussed. The software development process includes specification, design/implementation, validation, and evolution. Different software development models like waterfall, prototyping, and spiral are also summarized.
This document provides an introduction to software engineering. It discusses the objectives of software engineering which include producing high quality software products on time and within budget. Software engineering is defined as applying engineering principles to software development through the use of methods, tools, and techniques. The document then discusses why software engineering principles are needed, especially for large, complex software projects. It provides examples of software engineering failures that occurred when principles were not followed. The rest of the document outlines the software development process, including requirements, design, implementation, testing, and maintenance. It also discusses different process models like waterfall and spiral.
The document describes the development of a web application for an online newspaper. It discusses the objectives, which are to provide daily news, breaking news, and make information easily accessible to people. It also covers the technologies used like PHP, MySQL, CSS, and the development models of waterfall and prototyping. Data gathering and analysis are explained as important parts of the initial analysis phase of the project.
This document discusses several software development models and practices. It describes the waterfall model which involves sequential stages of requirement analysis, design, implementation, testing, and maintenance. It also covers prototyping, rapid application development (RAD), and component assembly models which are more iterative in nature. The prototyping model involves creating prototypes to help define requirements, RAD emphasizes reuse and short development cycles, and component assembly focuses on reusing existing software components.
Software Engineering Capstone 1
SWE481: Software Engineering Capstone
Phase 2 IP Software Engineering Methodologies
July 21, 2014
Contents
3Phase 1 Project Outline
3Development Methodology
4Phase 2 Software Production
4Requirements
5Design
6Application Architecture
7Music Player Main Screen
8Class Diagram
9Use Case Diagram
10Phase 3 Rapid Development (TBD)
11Phase 4 Project Scheduling (TBD)
12Phase 5 Project Risks (TBD)
13References
Phase 1 Project Outline
The project that our team is proposing is that of a mobile music application. This application will be a front end application that uses already in place internet services. The project involves. The mobile will contain free listening for radio and a paid listening subscription for user selected content. The application will be multiplatform based and be useable on iOS, Android, Windows 8.x. The application will also be integrated with social media sites such as Facebook and Google +, to name a few. There will be 6 phases for this project to include the following;
1. Pilot Application
2. Radio module
3. Subscription module
4. Social Media Module
5. Project CloseDevelopment Methodology
The development methodology will be that of Iterative/Incremental that allows for breaking up the project into small digestible chunks and is easy to understand. This method is similar to making small waterfalls out of each iteration of the software. This method allows for quick testing and customer feedback. This is best suited for small teams that support parallel coding and testing which will be used in this project. The ability to release the product in 90 to 120 days below budget is planned.Phase 2 Software Production
Requirements
The requirements gathering sessions will be completed by formal meetings, chat and email interaction. This will be done due to the various locations of the stakeholders and team members in this project. The original project inception and the requirements for the agreed upon project were gathered by email correspondence between the team members. The group leaded compiled a list of the initial requirements and this was discussed during a live chat meeting. The requirements are as follows;
· Initial pilot app (includes account creation)
· Player Module to include equalizer module ( Includes 5 bans of equalization)
· Radio module (search for music interest)
· Subscription module (create playlists, add music to library)
· Social media module
· Project close
· Application will operate across multiple platforms (Supports iOS, Android, Windows 8.x)
· Paid subscription for direct listening
· Free listening for radio playlists
· App will use backend services already exist from current website
· App will integrate into existing backend services
The first 5 requirements are functional requirements and the remaining 7 requirements are non functional requirements. The functional re.
This document provides an overview and summary of a project report for a password manager application. The project aims to develop a graphical user interface application that allows users to store login credentials for various websites and applications. It will feature functionality to add, update, and remove login details, as well as generate secure random passwords. The report outlines the objectives, analysis, design, and testing approach for the project. It describes the features and benefits of a password manager, as well as the tools and technologies that will be used such as Python, Tkinter for the GUI, and a MySQL database.
The Software Engineering Profession SWE311The Software Enginee.docxssusera34210
The Software Engineering Profession SWE311
The Software Engineering Profession SWE311-1503A-01 7/27/2015
Antoine Sims
Table of Contents
Project Outline 2
Overview 2
IT Infrastructure 3
Software Engineering Practices 4
Methodology 4
Software Engineering Standards 7
Standards 7
Software Engineering Communications 9
Communication 9
Software Engineering Ethics and Roles 12
TBD 12
Software Engineering Issues 13
TBD 13
References 14
Phase 3. Repurposed: “This task contains portions of material that were originally submitted during the phase 3 discussion board The Software Engineering Profession in SWE311 with Professor Tricic
Project Outline
Overview
Bungie.net is a company that serves as a community role for online gamers that have been around since 1996. Gamers continue to use the site as a place to gather information about news, events and technical information on upcoming games and projects. The primary function of the site is to serve as a community hub for anything that is Bungie Studios related. Any game or project that Bungie has is available for discussion through forums. Online gamers can also track there stats for games that they play. The site also serves as a means for Bungie to get feedback about gaming experience before issuing out updates to the latest gameplay updating.
“Bungie.net leverages the Microsoft .NET Framework running on Microsoft Windows 2003 and Microsoft SQL 2000 Servers to serve up over 3 million page views per day and accumulating over 300 GB of data a month of online game statistics from the almost 1 million online games played every day. Not only is Bungie.net built to scale, but its design and inventive features have not gone unnoticed, since it was rated as the "Most Innovative Design" by IGN Entertainment. The site also exceeds a 99 percent up-time ratio even through peak usage periods such as the week of the Halo 2 release. Clearly, the release of the Bungie.net site defines a new milestone in the era of online game play. This case study provides insight into this accomplishment” (Microsoft Corporation, 2005).
IT Infrastructure
Bungie has two IT department consists of two separate entities. One of those entities is an IT department that maintains the Bungie.net website and the other is its engineering department. The engineering department is the department where Bungie creates its software for the video game that they develop. In the IT Department or Operations there are several positions such as IT engineer, IT support/server specialist, and datacenter operations specialist. These people maintain the online gaming data and the website. They deal with the servers keeping them up and running. The Engineering Department has a host of position that incorporate it such as database engineers, infrastructure/platform engineers, mobile engineers, leads, online engineers, tools engineers, game server tools engineers, engine programmers, game service engineers, activities engineers, graphics pr ...
Vertex – The All in one Web ApplicationIRJET Journal
The document discusses the development of Vertex, an all-in-one web application that integrates social media, music streaming, video streaming, and other applications into a single platform. It aims to improve the user experience by reducing the need to switch between multiple individual applications. The key components of Vertex include a social media app for profiles, posts and messaging, face filters, media playback and controls, and a video streaming app. The integration of these features into one application provides a more seamless experience for users.
This document is a software requirements specification (SRS) for a movie recommender system. It provides an introduction to the purpose and scope of the project. The SRS describes the overall product perspective and functions, including providing movie recommendations to users based on their preferences and past ratings. It outlines the user classes, operating environment, design constraints, and documentation. The SRS also specifies the external interfaces, system features, and other non-functional requirements around performance, safety, security and quality.
The document provides an introduction to software engineering concepts. It discusses how software engineering aims to develop reliable software products using well-defined scientific principles and methods. It covers software evolution, different software paradigms including development, design and programming paradigms. It also discusses different software life cycle models like waterfall, incremental, prototyping and spiral models. Finally, it talks about characteristics of good software products and causes of software crisis.
Mobile application development processTalentSmart1
Mobile app development is the process of creating software applications for cell phones and other portable devices. These software programs may come pre-installed on hardware or may need to be downloaded and installed by users. Creating software for mobile apps, integrating backend services like data access APIs, and testing the application on target devices are all part of the mobile application development services provided by app development companies.
We employ cutting-edge technologies to create a variety of web and mobile applications. Our experts leverage agile methodologies to provide world-class application development services that are scalable, resilient, and swift while also providing a great customer experience.
The two main mobile app development platforms are IOS from Apple and Android from Google. In contrast to Google Android, which is made available for mobile devices and businesses that meet the requirements for Android software applications, Apple uses its iOS application specifically for its own devices.
Talent Smart is a renowned app development company, offering application development services that aid in the creation of well-designed, user-friendly, and efficient apps in India and USA. At Talent Smart, we have a skilled team that is well-educated in building applications for multiple platforms and B2B organizations.
This document discusses software paradigms and characteristics of good software. It defines software paradigms as the methods and steps used in designing software, which can be categorized into software development, software design, and programming paradigms. The document outlines the objectives, characteristics, and examples of each paradigm. It also describes characteristics of good software, noting it should satisfy operational, transitional, and maintenance criteria such as cost, usability, efficiency, flexibility, and reliability.
This document provides an overview of a final year project to develop an online banking system using Java and Oracle. It includes acknowledgments, an abstract, table of contents, and sections on project introduction and objectives, system development life cycle, system design, and testing. The project was created by 4 students for their bachelor's degree in computer science and engineering, and was supervised by a faculty member.
Mobile App Development Vs Software Development 7 Key DifferencesPolyxer Systems
The process of mobile app development will consist of lots of creativity, technical skills, and problem-solving. Google Play and Apple’s App Library are two major app stores used by the users.
Software development is a computer program-building process, crafted by software developers. During the software development process, developers incorporate their technical skills using computer science, engineering, and mathematical analysis.
This document describes the design and implementation of a music player application for Android devices. The application was developed using Java and the Eclipse IDE. It features a main playback interface, playlists, menus for playback settings and file browsing. The application allows users to browse music files on their device, play songs, switch between songs, and set playback preferences like shuffle mode. The developer used Android SDK tools and followed principles like reliability, understandability and testability in the design. Data is stored using SharedPreferences and SQLite. The application provides a simple music player that requires less memory and resources than existing options.
How Custom Software Development is Transforming the Traditional Business Prac...christiemarie4
The document discusses the process of custom software development. It begins by contrasting off-the-shelf versus custom software, noting that custom software is needed when standard solutions do not meet unique business requirements. It then outlines the typical 7 step process for custom software development: 1) analysis to understand requirements, 2) planning the development, 3) designing functionality and interfaces, 4) writing code, 5) testing, 6) deployment, and 7) maintenance and updates. The key aspects of each step are described at a high level.
Social Media Site User Management System Class 12th Informatics Practices Pyt...deboshreechatterjee2
This document is a project report submitted by a student named Debshri Chatterjee for their class XII subject Informatics Practices. The report details the development of a social media site user management system using various data analysis, visualization, and manipulation techniques in Python. The system was developed using the system development life cycle methodology, which includes phases for initiation, planning, analysis, design, development, testing, implementation, and maintenance. The report includes the source code implementing functions for reading, sorting, plotting, and manipulating the user data.
The document discusses several software development life cycle (SDLC) models, including waterfall, iterative, prototyping, and spiral models. It describes the basic stages and processes involved in each model. The waterfall model involves sequential stages of requirements analysis, design, implementation, testing, and deployment. The iterative model allows revisiting earlier stages and incremental releases. The prototyping model uses prototypes to gather early user feedback. Finally, the spiral model combines iterative development and risk analysis, proceeding in cycles of planning, risk analysis, development, and evaluation.
The document discusses the software development life cycle (SDLC) and different software development models. SDLC involves stages like requirements gathering, design, coding, testing, implementation and maintenance. The waterfall model follows a linear sequence of stages from requirements to maintenance. Prototyping allows for user feedback earlier to refine requirements before implementation.
This document provides an overview of software engineering concepts covered in lecture notes. It discusses the software development life cycle (SDLC) which includes key stages like requirements gathering, design, coding, testing, integration and maintenance. The SDLC framework aims to develop software efficiently using a well-defined process. Software engineering principles like abstraction and decomposition are used to reduce complexity when developing large programs.
The document provides information on various topics related to software engineering:
1. It defines software engineering and discusses why it is required to manage large, scalable software projects and improve quality and cost management.
2. It describes common software processes like specification, development, validation and evolution and different process models like waterfall, iterative and prototyping.
3. It discusses the "software crisis" due to increasing size, costs and delays in software projects and differentiates between a program and software.
4. It explains popular process models like waterfall, iterative and prototyping in detail outlining their phases, advantages and disadvantages.
Software Engineering Process in Web Application DevelopmentIOSR Journals
This document discusses the software engineering process for developing web applications. It begins by noting that conventional software engineering models cannot be directly applied to web development due to the unique characteristics of web applications. The document then outlines the conventional software development process and various models used. It describes how web engineering adapts these conventional processes, using an incremental development approach better suited to evolving web requirements. The document identifies differences between traditional software and web engineering, and proposes a modified process model for web application development.
This document discusses the differences between conventional software engineering processes and web application development processes. It notes that web applications have large user bases, evolving requirements, and frequent changes, requiring an incremental development approach. The document outlines the typical phases of conventional software development (analysis, design, coding, testing, implementation) and various process models (waterfall, V-model, etc.). It then describes adaptations needed for web engineering, including incorporating analysis of content, interactions, functions and configurations. The design phase in web engineering includes aesthetic and navigation design elements not present in conventional models. Testing for web applications must also consider functionality, usability, interfaces, compatibility and security across various hardware/software environments.
The document presents a software requirements specification for an online movie ticketing system for Starmall Cinema that will allow users to purchase tickets online, see movie times and trailers, and provide customer feedback. It describes the purpose, scope, users, functions, and design of the system. The system will be a web-based application developed using programming languages like PHP and JavaScript and a MySQL database.
1) The document discusses the software development method which includes 6 key phases: requirement gathering, system analysis, system design, coding, testing, and deployment.
2) It provides details on each phase, including requirement gathering and analysis to define requirements, system analysis to divide the system into modules, system design to design the software architecture, coding to develop the software, testing to identify bugs, and deployment to launch the software.
3) It also discusses related topics like problem analysis, pseudocode, algorithms, and flowcharts which are techniques used during the software development process.
This document provides an overview of software engineering and its models. It discusses the evolution of software engineering from the 1960s to present day. It describes key software engineering concepts like the software development life cycle, capability maturity models, and various software development models including waterfall, iterative enhancement, prototyping, spiral, and RAD approaches. The document emphasizes that software engineering applies systematic and disciplined processes to software development in order to address challenges like increasing complexity, high costs, and quality issues.
The SANA Project aimed to democratize access to healthcare through open source technologies. The Impulse team worked on extending the SANA module application over 5 sprints. They focused on implementing media playback functionality to allow clinicians to play audio and video files within the mobile app without external players. The team successfully delivered the Impulse Media Player to render .mp3, .mp4 and .flv files by the final sprint deadline of November 23rd, 2015.
The changes required in the IT project plan for Telecomm Ltd would.docxmattinsonjanel
The changes required in the IT project plan for Telecomm Ltd would entail specific variation in the platforms used in the initial implementation plan. Initially, the three projects that were planned for implementation included; the installation of business intelligence platform, the implementation of Statistical Analysis System software technology, and the creation of an effectively network infrastructure. In this case, the changes would include an addition of an ERP software to ensure the performance of the workforce within the Telecomms Ltd employees.
ERP is an effectively coordinated information technology system that would ensure the company’s performance is enhanced. To understand how the implementation of a coordinated IT system offers a competitive advantage of a firm, it is essential to acknowledge three core reasons for the failure of information technology related projects as commonly cited by IT managers. In this case, IT managers cite the three reasons as; poor planning or management, change in business objectives and goals during the implementation process of a project, and lack of proper management support completion (Houston, 2011). Also, in the majority of completed projects, technology is usually deployed in a vacuum; hence users resist it. The implementation of coordinated information technology systems, such as ERP would provide an ultimate solution to the three reasons for failure, and thus would give Telecomms Ltd a competitive advantage in the already competitive market. Since the implementation of systems like ERP directly provides solution to common problems that act as drawbacks regarding the competitiveness of firm, it is, therefore, evident that its use place Telecomms Ltd above its rival companies in the market share (Wallace & Kremzar, 2001).
The use ERP, which is a reliable coordinated IT system entails three distinctive implementation strategies that a firm can choose depending on its specific needs. The changes in the projects would be as follows: The three implementation strategies are independently capable of providing a relatively competitive advantage for many companies. These strategies are: big bang, phased rollout, and parallel adoption. In the big bang implementation strategy, happens in a single instance, whereby all the users are moved to a new system on a designated (Wallace & Kremzar, 2001). The phased rollout implementation on the other hand usually involves a changeover in several phases, and it is executed in an extended period. In this case, the users move onto the new system in a series of steps (Houston, 2011). Lastly, the parallel adoption implementation strategy allows both legacy and the new ERP system to run at the same time. It is also essential to note that users in this strategy get to learn the new system while still working on the old system (Wallace & Kremzar, 2001). The three strategies effectively change the information system of Telecomms Ltd tremendously such that it positiv ...
The Catholic University of America Metropolitan School of .docxmattinsonjanel
The Catholic University of America
Metropolitan School of Professional Studies
Course Syllabus
THE CATHOLIC UNIVERSITY OF AMERICA
Metropolitan School of Professional Studies
MBU 514 and MBU 315 Leadership Foundations
Fall 2015
Credits: 3
Classroom: Online
Dates: August 31, 2015 to December 14, 2015
Instructor:
Dr. Jacquie Hamp
Email: [email protected]
Twitter: @drjacquie
Telephone: 202 215 8117 cell
Office Hours: By Appointment
Dr. Jacquie Hamp is an educator, coach and consultant with particular expertise in leadership development, organizational development and human resources development strategy. From 2006 to 2015 she held the position as the Senior Director of Leadership Development for Goodwill Industries International in Rockville, Maryland. Dr. Hamp was responsible for the design and execution of leadership development programs and activities for all levels of the 4 billion dollar social enterprise network of Goodwill Industries across 165 independent local agencies. Jacquie is also a part time Associate Professor at George Washington University teaching at the graduate level and she is an adjunct professor at Catholic University of America, teaching leadership theory in the Masters Program.
Jacquie has a Master of Science degree in Human Resources Development Administration from Barry University. She holds a Doctor of Education degree in Human and Organizational Learning from the Graduate School of Education and Human Development at George Washington University. Jacquie has received a certificate in Executive Coaching from Georgetown University, a certificate in the Practice of Teaching Leadership from Harvard University and holds the national certification of Senior Professional in Human Resources (SPHR).
Jacquie has been invited to speak at conferences in the United States and the United Kingdom on the topic of how women learn through transformative experiences and techniques for effective leadership development in the social enterprise sector. She is a member of the Society of Human Resource Management (SHRM) and the International Leadership Association (ILA). In 2011 Dr. Hamp was awarded the Strategic Alignment Award by the Human Resources Leadership Association of Washington DC for her work in the redesign of the Goodwill Industries International leadership programs in order to meet the strategic goals of the organization.
Course Description: Surveys, compares, and contrasts contemporary theories of leadership, providing students the opportunity to assess their own leadership competencies and how they fit in with models of leadership. Students also discuss current literature, media coverage, and case studies on leadership issues.
Instructional Methods This course is based on the following adult learning concepts:
1. Learning is done by the learners, who are encouraged to achieve the overall course objectives through individual learning styles that meet their personal learning needs. ...
More Related Content
Similar to SWE481 – Software Engineering Capstone 1 Page 2SWE.docx
This document is a software requirements specification (SRS) for a movie recommender system. It provides an introduction to the purpose and scope of the project. The SRS describes the overall product perspective and functions, including providing movie recommendations to users based on their preferences and past ratings. It outlines the user classes, operating environment, design constraints, and documentation. The SRS also specifies the external interfaces, system features, and other non-functional requirements around performance, safety, security and quality.
The document provides an introduction to software engineering concepts. It discusses how software engineering aims to develop reliable software products using well-defined scientific principles and methods. It covers software evolution, different software paradigms including development, design and programming paradigms. It also discusses different software life cycle models like waterfall, incremental, prototyping and spiral models. Finally, it talks about characteristics of good software products and causes of software crisis.
Mobile application development processTalentSmart1
Mobile app development is the process of creating software applications for cell phones and other portable devices. These software programs may come pre-installed on hardware or may need to be downloaded and installed by users. Creating software for mobile apps, integrating backend services like data access APIs, and testing the application on target devices are all part of the mobile application development services provided by app development companies.
We employ cutting-edge technologies to create a variety of web and mobile applications. Our experts leverage agile methodologies to provide world-class application development services that are scalable, resilient, and swift while also providing a great customer experience.
The two main mobile app development platforms are IOS from Apple and Android from Google. In contrast to Google Android, which is made available for mobile devices and businesses that meet the requirements for Android software applications, Apple uses its iOS application specifically for its own devices.
Talent Smart is a renowned app development company, offering application development services that aid in the creation of well-designed, user-friendly, and efficient apps in India and USA. At Talent Smart, we have a skilled team that is well-educated in building applications for multiple platforms and B2B organizations.
This document discusses software paradigms and characteristics of good software. It defines software paradigms as the methods and steps used in designing software, which can be categorized into software development, software design, and programming paradigms. The document outlines the objectives, characteristics, and examples of each paradigm. It also describes characteristics of good software, noting it should satisfy operational, transitional, and maintenance criteria such as cost, usability, efficiency, flexibility, and reliability.
This document provides an overview of a final year project to develop an online banking system using Java and Oracle. It includes acknowledgments, an abstract, table of contents, and sections on project introduction and objectives, system development life cycle, system design, and testing. The project was created by 4 students for their bachelor's degree in computer science and engineering, and was supervised by a faculty member.
Mobile App Development Vs Software Development 7 Key DifferencesPolyxer Systems
The process of mobile app development will consist of lots of creativity, technical skills, and problem-solving. Google Play and Apple’s App Library are two major app stores used by the users.
Software development is a computer program-building process, crafted by software developers. During the software development process, developers incorporate their technical skills using computer science, engineering, and mathematical analysis.
This document describes the design and implementation of a music player application for Android devices. The application was developed using Java and the Eclipse IDE. It features a main playback interface, playlists, menus for playback settings and file browsing. The application allows users to browse music files on their device, play songs, switch between songs, and set playback preferences like shuffle mode. The developer used Android SDK tools and followed principles like reliability, understandability and testability in the design. Data is stored using SharedPreferences and SQLite. The application provides a simple music player that requires less memory and resources than existing options.
How Custom Software Development is Transforming the Traditional Business Prac...christiemarie4
The document discusses the process of custom software development. It begins by contrasting off-the-shelf versus custom software, noting that custom software is needed when standard solutions do not meet unique business requirements. It then outlines the typical 7 step process for custom software development: 1) analysis to understand requirements, 2) planning the development, 3) designing functionality and interfaces, 4) writing code, 5) testing, 6) deployment, and 7) maintenance and updates. The key aspects of each step are described at a high level.
Social Media Site User Management System Class 12th Informatics Practices Pyt...deboshreechatterjee2
This document is a project report submitted by a student named Debshri Chatterjee for their class XII subject Informatics Practices. The report details the development of a social media site user management system using various data analysis, visualization, and manipulation techniques in Python. The system was developed using the system development life cycle methodology, which includes phases for initiation, planning, analysis, design, development, testing, implementation, and maintenance. The report includes the source code implementing functions for reading, sorting, plotting, and manipulating the user data.
The document discusses several software development life cycle (SDLC) models, including waterfall, iterative, prototyping, and spiral models. It describes the basic stages and processes involved in each model. The waterfall model involves sequential stages of requirements analysis, design, implementation, testing, and deployment. The iterative model allows revisiting earlier stages and incremental releases. The prototyping model uses prototypes to gather early user feedback. Finally, the spiral model combines iterative development and risk analysis, proceeding in cycles of planning, risk analysis, development, and evaluation.
The document discusses the software development life cycle (SDLC) and different software development models. SDLC involves stages like requirements gathering, design, coding, testing, implementation and maintenance. The waterfall model follows a linear sequence of stages from requirements to maintenance. Prototyping allows for user feedback earlier to refine requirements before implementation.
This document provides an overview of software engineering concepts covered in lecture notes. It discusses the software development life cycle (SDLC) which includes key stages like requirements gathering, design, coding, testing, integration and maintenance. The SDLC framework aims to develop software efficiently using a well-defined process. Software engineering principles like abstraction and decomposition are used to reduce complexity when developing large programs.
The document provides information on various topics related to software engineering:
1. It defines software engineering and discusses why it is required to manage large, scalable software projects and improve quality and cost management.
2. It describes common software processes like specification, development, validation and evolution and different process models like waterfall, iterative and prototyping.
3. It discusses the "software crisis" due to increasing size, costs and delays in software projects and differentiates between a program and software.
4. It explains popular process models like waterfall, iterative and prototyping in detail outlining their phases, advantages and disadvantages.
Software Engineering Process in Web Application DevelopmentIOSR Journals
This document discusses the software engineering process for developing web applications. It begins by noting that conventional software engineering models cannot be directly applied to web development due to the unique characteristics of web applications. The document then outlines the conventional software development process and various models used. It describes how web engineering adapts these conventional processes, using an incremental development approach better suited to evolving web requirements. The document identifies differences between traditional software and web engineering, and proposes a modified process model for web application development.
This document discusses the differences between conventional software engineering processes and web application development processes. It notes that web applications have large user bases, evolving requirements, and frequent changes, requiring an incremental development approach. The document outlines the typical phases of conventional software development (analysis, design, coding, testing, implementation) and various process models (waterfall, V-model, etc.). It then describes adaptations needed for web engineering, including incorporating analysis of content, interactions, functions and configurations. The design phase in web engineering includes aesthetic and navigation design elements not present in conventional models. Testing for web applications must also consider functionality, usability, interfaces, compatibility and security across various hardware/software environments.
The document presents a software requirements specification for an online movie ticketing system for Starmall Cinema that will allow users to purchase tickets online, see movie times and trailers, and provide customer feedback. It describes the purpose, scope, users, functions, and design of the system. The system will be a web-based application developed using programming languages like PHP and JavaScript and a MySQL database.
1) The document discusses the software development method which includes 6 key phases: requirement gathering, system analysis, system design, coding, testing, and deployment.
2) It provides details on each phase, including requirement gathering and analysis to define requirements, system analysis to divide the system into modules, system design to design the software architecture, coding to develop the software, testing to identify bugs, and deployment to launch the software.
3) It also discusses related topics like problem analysis, pseudocode, algorithms, and flowcharts which are techniques used during the software development process.
This document provides an overview of software engineering and its models. It discusses the evolution of software engineering from the 1960s to present day. It describes key software engineering concepts like the software development life cycle, capability maturity models, and various software development models including waterfall, iterative enhancement, prototyping, spiral, and RAD approaches. The document emphasizes that software engineering applies systematic and disciplined processes to software development in order to address challenges like increasing complexity, high costs, and quality issues.
The SANA Project aimed to democratize access to healthcare through open source technologies. The Impulse team worked on extending the SANA module application over 5 sprints. They focused on implementing media playback functionality to allow clinicians to play audio and video files within the mobile app without external players. The team successfully delivered the Impulse Media Player to render .mp3, .mp4 and .flv files by the final sprint deadline of November 23rd, 2015.
Similar to SWE481 – Software Engineering Capstone 1 Page 2SWE.docx (20)
The changes required in the IT project plan for Telecomm Ltd would.docxmattinsonjanel
The changes required in the IT project plan for Telecomm Ltd would entail specific variation in the platforms used in the initial implementation plan. Initially, the three projects that were planned for implementation included; the installation of business intelligence platform, the implementation of Statistical Analysis System software technology, and the creation of an effectively network infrastructure. In this case, the changes would include an addition of an ERP software to ensure the performance of the workforce within the Telecomms Ltd employees.
ERP is an effectively coordinated information technology system that would ensure the company’s performance is enhanced. To understand how the implementation of a coordinated IT system offers a competitive advantage of a firm, it is essential to acknowledge three core reasons for the failure of information technology related projects as commonly cited by IT managers. In this case, IT managers cite the three reasons as; poor planning or management, change in business objectives and goals during the implementation process of a project, and lack of proper management support completion (Houston, 2011). Also, in the majority of completed projects, technology is usually deployed in a vacuum; hence users resist it. The implementation of coordinated information technology systems, such as ERP would provide an ultimate solution to the three reasons for failure, and thus would give Telecomms Ltd a competitive advantage in the already competitive market. Since the implementation of systems like ERP directly provides solution to common problems that act as drawbacks regarding the competitiveness of firm, it is, therefore, evident that its use place Telecomms Ltd above its rival companies in the market share (Wallace & Kremzar, 2001).
The use ERP, which is a reliable coordinated IT system entails three distinctive implementation strategies that a firm can choose depending on its specific needs. The changes in the projects would be as follows: The three implementation strategies are independently capable of providing a relatively competitive advantage for many companies. These strategies are: big bang, phased rollout, and parallel adoption. In the big bang implementation strategy, happens in a single instance, whereby all the users are moved to a new system on a designated (Wallace & Kremzar, 2001). The phased rollout implementation on the other hand usually involves a changeover in several phases, and it is executed in an extended period. In this case, the users move onto the new system in a series of steps (Houston, 2011). Lastly, the parallel adoption implementation strategy allows both legacy and the new ERP system to run at the same time. It is also essential to note that users in this strategy get to learn the new system while still working on the old system (Wallace & Kremzar, 2001). The three strategies effectively change the information system of Telecomms Ltd tremendously such that it positiv ...
The Catholic University of America Metropolitan School of .docxmattinsonjanel
The Catholic University of America
Metropolitan School of Professional Studies
Course Syllabus
THE CATHOLIC UNIVERSITY OF AMERICA
Metropolitan School of Professional Studies
MBU 514 and MBU 315 Leadership Foundations
Fall 2015
Credits: 3
Classroom: Online
Dates: August 31, 2015 to December 14, 2015
Instructor:
Dr. Jacquie Hamp
Email: [email protected]
Twitter: @drjacquie
Telephone: 202 215 8117 cell
Office Hours: By Appointment
Dr. Jacquie Hamp is an educator, coach and consultant with particular expertise in leadership development, organizational development and human resources development strategy. From 2006 to 2015 she held the position as the Senior Director of Leadership Development for Goodwill Industries International in Rockville, Maryland. Dr. Hamp was responsible for the design and execution of leadership development programs and activities for all levels of the 4 billion dollar social enterprise network of Goodwill Industries across 165 independent local agencies. Jacquie is also a part time Associate Professor at George Washington University teaching at the graduate level and she is an adjunct professor at Catholic University of America, teaching leadership theory in the Masters Program.
Jacquie has a Master of Science degree in Human Resources Development Administration from Barry University. She holds a Doctor of Education degree in Human and Organizational Learning from the Graduate School of Education and Human Development at George Washington University. Jacquie has received a certificate in Executive Coaching from Georgetown University, a certificate in the Practice of Teaching Leadership from Harvard University and holds the national certification of Senior Professional in Human Resources (SPHR).
Jacquie has been invited to speak at conferences in the United States and the United Kingdom on the topic of how women learn through transformative experiences and techniques for effective leadership development in the social enterprise sector. She is a member of the Society of Human Resource Management (SHRM) and the International Leadership Association (ILA). In 2011 Dr. Hamp was awarded the Strategic Alignment Award by the Human Resources Leadership Association of Washington DC for her work in the redesign of the Goodwill Industries International leadership programs in order to meet the strategic goals of the organization.
Course Description: Surveys, compares, and contrasts contemporary theories of leadership, providing students the opportunity to assess their own leadership competencies and how they fit in with models of leadership. Students also discuss current literature, media coverage, and case studies on leadership issues.
Instructional Methods This course is based on the following adult learning concepts:
1. Learning is done by the learners, who are encouraged to achieve the overall course objectives through individual learning styles that meet their personal learning needs. ...
The Case of Frank and Judy. During the past few years Frank an.docxmattinsonjanel
The Case of Frank and Judy.
During the past few years Frank and Judy have experienced many conflicts in their marriage. Although they have made attempts to resolve their problems by themselves, they have finally decided to seek the help of a professional marriage counselor. Even though they have been thinking about divorce with increasing frequency, they still have some hope that they can achieve a satisfactory marriage.
Three couples counselors, each holding a different set of values pertaining to marriage and the family, describe their approach to working with Frank and Judy. As you read these responses, think about the degree to which each represents what you might say and do if you were counseling this couple.
· Counselor A. This counselor believes it is not her place to bring her values pertaining to the family into the sessions. She is fully aware of her biases regarding marriage and divorce, but she does not impose them or expose them in all cases. Her primary interest is to help Frank and Judy discover what is best for them as individuals 459460and as a couple. She sees it as unethical to push her clients toward a definite course of action, and she lets them know that her job is to help them be honest with themselves.
·
· What are your reactions to this counselor's approach?
· ▪ What values of yours could interfere with your work with Frank and Judy?
Counselor B. This counselor has been married three times herself. Although she believes in marriage, she is quick to maintain that far too many couples stay in their marriages and suffer unnecessarily. She explores with Judy and Frank the conflicts that they bring to the sessions. The counselor's interventions are leading them in the direction of divorce as the desired course of action, especially after they express this as an option. She suggests a trial separation and states her willingness to counsel them individually, with some joint sessions. When Frank brings up his guilt and reluctance to divorce because of the welfare of the children, the counselor confronts him with the harm that is being done to them by a destructive marriage. She tells him that it is too much of a burden to put on the children to keep the family together.
· ▪ What, if any, ethical issues do you see in this case? Is this counselor exposing or imposing her values?
· ▪ Do you think this person should be a marriage counselor, given her bias?
· ▪ What interventions made by the counselor do you agree with? What are your areas of disagreement?
Counselor C. At the first session this counselor states his belief in the preservation of marriage and the family. He believes that many couples give up too soon in the face of difficulty. He says that most couples have unrealistically high expectations of what constitutes a “happy marriage.” The counselor lets it be known that his experience continues to teach him that divorce rarely solves any problems but instead creates new problems that are often worse. The counsel ...
The Case of MikeChapter 5 • Common Theoretical Counseling Perspe.docxmattinsonjanel
The Case of Mike
Chapter 5 • Common Theoretical Counseling Perspectives 135
Mike is a 20-year-old male who has just recently been released from jail. Mike is technically on probation for car theft, though he has been involved in crime to a much greater extent. Mike has been identified as a cocaine user and has been suspected, though not convicted, for dealing cocaine. Mike has been tested for drugs by his probation department and was found positive for cocaine. The county has mandated that Mike receive drug counseling but the drug counselor has referred Mike to your office because the drug counselor suspects that Mike has issues beyond simple drug addiction. In fact, the drug counselor’s notes suggest that Mike has Narcissistic personality disorder. Mike seems to have little regard for the feelings of others. Coupled with this is his complete sensitivity to the comments of others. In fact, his prior fiancé has broken off her relationship with him due to what she calls his “constant need for admiration and attention. He is completely self-centered.” After talking with Mike, you quickly find that he has no close friends. As he talks about people who have been close to him, he discounts them for one imperfection or another. These imperfections are all considered severe enough to warrant dismissing the person entirely. Mike makes a point of noting how many have betrayed their loyalty to him or have otherwise failed to give him the credit that he deserves. When asked about getting caught in the auto theft, he remarks that “well my dumb partner got me out of a hot situation by driving me out in a stolen get-a-way car.” (Word on the street has it that Mike was involved in a sour drug deal and was unlikely to have made it out alive if not for his partner.) Mike adds, “you know, I plan everything out perfectly, but you just cannot rely on anybody . . . if you want it done right, do it yourself.” Mike recently has been involved with another woman (unknown to his prior fiancé) who has become pregnant. When she told Mike he said “tough, you can go get an abortionor something, it isn’t like we were in love or something.” Then he laughed at her and toldher to go find some other guy who would shack up with her. Incidentally, Mike is a very attractive man and he likes to point that out on occasion. “Yeah, I was going to be a male model in L. A.,but my agent did not know what he was doing . . . could never get things settled out right . . . so I had to fire him.” Mike is very popular with women and has had a constant string of failed relationships due to what he calls “their inability to keep things exciting.” As Mike puts it “hey, I am too smart for this stuff. These people around me, they don’t deserve the good dummies. But me, well I know how to run things and get over on people. And I am not about to let these dummies get in my way. I got it all figured out . . . see?”
Effective Small Business Management: An Entrepreneurial Approach 9th Edition, 2009 IS ...
THE CHRONICLE OF HIGHER EDUCATIONNovember 8, 2002 -- vol. 49, .docxmattinsonjanel
THE CHRONICLE OF HIGHER EDUCATION
November 8, 2002 -- vol. 49, no. 11, p. B7
The Dangerous Myth of Grade Inflation
By Alfie Kohn
Grade inflation got started ... in the late '60s and early '70s.... The grades that faculty members now give ... deserve to be a scandal.
--Professor Harvey Mansfield, Harvard University, 2001
Grades A and B are sometimes given too readily -- Grade A for work of no very high merit, and Grade B for work not far above mediocrity. ... One of the chief obstacles to raising the standards of the degree is the readiness with which insincere students gain passable grades by sham work.
--Report of the Committee on Raising the Standard, Harvard University, 1894
Complaints about grade inflation have been around for a very long time. Every so often a fresh flurry of publicity pushes the issue to the foreground again, the latest example being a series of articles in The Boston Globe last year that disclosed -- in a tone normally reserved for the discovery of entrenched corruption in state government -- that a lot of students at Harvard were receiving A's and being graduated with honors.
The fact that people were offering the same complaints more than a century ago puts the latest bout of harrumphing in perspective, not unlike those quotations about the disgraceful values of the younger generation that turn out to be hundreds of years old. The long history of indignation also pretty well derails any attempts to place the blame for higher grades on a residue of bleeding-heart liberal professors hired in the '60s. (Unless, of course, there was a similar countercultural phenomenon in the 1860s.)
Yet on campuses across America today, academe's usual requirements for supporting data and reasoned analysis have been suspended for some reason where this issue is concerned. It is largely accepted on faith that grade inflation -- an upward shift in students' grade-point averages without a similar rise in achievement -- exists, and that it is a bad thing. Meanwhile, the truly substantive issues surrounding grades and motivation have been obscured or ignored.
The fact is that it is hard to substantiate even the simple claim that grades have been rising. Depending on the time period we're talking about, that claim may well be false. In their book When Hope and Fear Collide (Jossey-Bass, 1998), Arthur Levine and Jeanette Cureton tell us that more undergraduates in 1993 reported receiving A's (and fewer reported receiving grades of C or below) compared with their counterparts in 1969 and 1976 surveys. Unfortunately, self-reports are notoriously unreliable, and the numbers become even more dubious when only a self-selected, and possibly unrepresentative, segment bothers to return the questionnaires. (One out of three failed to do so in 1993; no information is offered about the return rates in the earlier surveys.)
To get a more accurate picture of whether grades have changed over the years, one needs to look at official student tran ...
The chart is a guide rather than an absolute – feel free to modify.docxmattinsonjanel
The chart is a guide rather than an absolute – feel free to modify or adjust it as need to fit the specific ideas that you are developing.
Area: SALES
Specific Change Plans for Functional Areas
Capability Being Addressed
This can be pulled from the strategic proposal recommended in Part 2B
How do the recommended changes (details provided below) help improve the capability?
This is a logic "double check". Be sure you can show how the changes recommended below improve the capability and help address the product and market focus and add to accomplishment of the value proposition
Details of Specific Changes:
Proposed Changes in Resources
Proposed Changes to Management
Preferences
Proposed Changes to Organizational
Processes
Detailed Change Plans
(Lay out here the specifics of all recommended changes for this area. Modify the layout as necessary to account for the changes being recommended)
Proposed Change
Timing
Costs
On going impact on budget
On going impact on revenue
Wiki
Template
Part-‐2:
Gaps,
Issues
and
New
Strategy
BUSI
4940
–
Business
Policy
1
THE ENVIRONMENT/INDUSTRY
1. Drivers of change
Key drivers of change begin with the availability of substitute products. Many
other
companies can easily provide a substitute and the firm will have to find a way to
stand
out among them. Next would be the ability to differentiate yourself among other
firms
that pose a threat in the industry. Last, the political sector. The the federal, state,
and local governments could all shape the way healthcare is everywhere.
2. Key survival factors
Key survival factors would include making the firm stand out above the rest in the
industry and creating a name for itself. Second would be making sure there is a
broad
network of providers available for the customers. Giving the customer options
will
make the customer happy. Providing excellent customer service is key to any
firm in
the industry.
3. Product/Market and Value Proposition possibilities
Maintaining the use of heavy discounts will keep Careington in the competitive
market. They also concentrate on constantly innovating technology to make
sure that
they have the latest devices to offer their customers. To have high value proposition, Careington
will need to show their costumers that they can believe in them and trust them to
do the right thing. Showing the customers that they can always be on top of the
latest
technology and new age products will help build trust with the customers.
STRATEGY OF THE FIRM
1. Goals
Striving to promote the health and well being of their clients by continuing to
provide
low cost health care solutions. A lot of this concentration is on clients that cannot
afford health care very easily or that a ...
The Challenge of Choosing FoodFor this forum, please read http.docxmattinsonjanel
The Challenge of Choosing Food:
For this forum, please read: https://www.washingtonpost.com/lifestyle/food/no-food-is-healthy-not-even-kale/2016/01/15/4a5c2d24-ba52-11e5-829c-26ffb874a18d_story.html?postshare=3401453180639248&tid=ss_fb-bottom
The article is from the Washington Post, January 17, 2016, by Michael Ruhlmanentitled: "No Food is Healthy, Not even Kale."
Based on your reading in the textbook share the following information with your classmates:
(1) To what degree to you agree with article, "No Food is Healthy, Not even Kale." Do semantics count? Should we focus on foods that are described as nourishing (nutrient-dense) instead of foods described as healthy because the word "healthy" is a "bankrupt" word? Explain and refer to information from the article.
(2) Based on the article and the textbook reading (review pages 9-30), how challenging is it for you to choose nutritious foods that promote health? What factors drive your food choices? Explain to your classmates.
(3) What do you think is the biggest concern we face health-wise in the US today?
(4) What are some obstacles as to why we may not be eating as well as we would like to?
Please complete all questions, if you have any question let me knowv
Test file, (Do not modify it)
// $> javac -cp .:junit-cs211.jar ProperQueueTests.java #compile
// $> java -cp .:junit-cs211.jar ProperQueueTests #run tests
//
// On windows replace : with ; (colon with semicolon)
// $> javac -cp .;junit-cs211.jar ProperQueueTests.java #compile
// $> java -cp .;junit-cs211.jar ProperQueueTests #run tests
import org.junit.*;
import static org.junit.Assert.*;
import java.util.*;
public class ProperQueueTests {
public static void main(String args[]){
org.junit.runner.JUnitCore.main("ProperQueueTests");
}
/*
building queues:
- build small empty queue. (2)
- build larger empty queue. (11)
- build length-zero queue. (0)
*/
@Test(timeout=1000) public void ProperQueue_makeQueue_1(){
String expected = "";
ProperQueue q = new ProperQueue(2);
String actual = q.toString();
assertEquals(2, q.getCapacity());
assertEquals(expected, actual);
}
@Test(timeout=1000) public void ProperQueue_makeQueue_2(){
String expected = "";
ProperQueue q = new ProperQueue(11);
String actual = q.toString();
assertEquals(11, q.getCapacity());
assertEquals(expected, actual);
}
@Test(timeout=1000) public void Queue_makeQueue_3(){
String expected = "";
ProperQueue q = new ProperQueue(0);
String actual = q.toString();
assertEquals(0, q.getCapacity());
assertEquals(expected, actual);
}
/*
add/offer tests.
- add a single value to a short queue.
- fill up a small queue.
- over-add to a queue and witness it struggle.
- add many but don't finish filling a queue.
- make size-zero queue, adds fail, check it's still empty.
*/
@Test(timeout=1000) public void ProperQueue_add_1(){
String expecte ...
The Civil Rights Movement
Dr. James Patterson
Black Civil Rights Movement
Basic denial of civil rights (review)
Segregation in society
Inferior schools
Job discrimination
Political disenfranchisement
Over ½ lived below poverty level
Unemployment double national ave.
Ghettoes: gangs, drugs, substandard housing, crime
Early Victories
WWII egalitarianism and backlash against German racism
Jackie Robinson integrated professional baseball—1947
Desegregation of the armed forces ordered by president Truman—1948
Marian Anderson performed at the New York Metropolitan Opera House—1955
Increased interest in civil rights a result of Cold War propaganda
Brown v. Board of Education
1954 – Topeka, Kansas
Linda Brown: filed suit to attend a neighborhood school
“Separate educational institutions are inherently unequal.”
Overturned Plessy v. Ferguson
Court says: integrate "with all deliberate speed.”
What did this mean?
Linda Brown and Family
Circumvention of Brown v. Board of Education Ruling
White supremacist parents feared racial mixing and attempted to block black enrollment.
Ignored the integration issue
Token integration
Segregation through standardized placement tests
Segregation through private schools
Stalling through legal action
By 1964, 10 years after the Brown case, only 1% of black children attended truly integrated schools.
Little Rock High School
1957 courts order integration in Little Rock
9 black students enrolled.
Governor called out militia to block it.
Mobs replaced militia after recall.
Eisenhower ordered federal troops to protect the students.
Daily harassment
Courageous black students persevered.
Montgomery Bus Boycott
1955--Rosa Parks arrested for not giving up seat to white man
Boycott of bus system led by Martin Luther King, Jr.:
Walking, church busses, car pools, bicycles
Bus lines caught in the middle
Rosa Parks being Booked
Supreme Court ruled bus companies must integrate.
Inspired other protests:
Sit-ins, wade-ins, kneel-ins
Woolworth’s lunch counter
Montgomery Bus Boycott
Martin Luther King, Jr.
Martin Luther King, Jr.
Non-Violent
Influenced by Ghandi
“The blood may flow, but it must be our blood, not that of the white man.”
“Lord, we ain’t what we oughta be. We ain’t what we wanna be. We ain’t what we gonna be. But thank God, we ain’t what we was.”
Freedom Riders
Activists traveled from city to city to ignite the protest.
Bull Conner:
in Montgomery
Dogs
Whips
Water hoses
Cattle prods
Television
Public backlash
Civil Rights March (AL. 1965)
1963 - Washington, D.C. "I have a Dream“—200,000 Attended
Civil Rights Legislation
1964 - Civil Rights Act
1964 - 24th Amendment
Abolished Poll Tax
1965 Voting Rights Act
Affirmative action
Int ...
The Churchill CentreReturn to Full GraphicsThe Churchi.docxmattinsonjanel
The Churchill Centre
Return to Full Graphics
The Churchill Centre | Calendar | Churchill Facts | Speeches & Quotations | Publications and Resources |
News | Join The Centre! | Churchill Stores | Contact Us | Links | Search
Their Finest Hour
Sir Winston Churchill > Speeches & Quotations > Speeches
June 18, 1940
House of Commons
I spoke the other day of the colossal military disaster which occurred when the French High Command
failed to withdraw the northern Armies from Belgium at the moment when they knew that the French front
was decisively broken at Sedan and on the Meuse. This delay entailed the loss of fifteen or sixteen French
divisions and threw out of action for the critical period the whole of the British Expeditionary Force. Our
Army and 120,000 French troops were indeed rescued by the British Navy from Dunkirk but only with the
loss of their cannon, vehicles and modern equipment. This loss inevitably took some weeks to repair, and in
the first two of those weeks the battle in France has been lost. When we consider the heroic resistance
made by the French Army against heavy odds in this battle, the enormous losses inflicted upon the enemy
and the evident exhaustion of the enemy, it may well be the thought that these 25 divisions of the
best-trained and best-equipped troops might have turned the scale. However, General Weygand had to fight
without them. Only three British divisions or their equivalent were able to stand in the line with their French
comrades. They have suffered severely, but they have fought well. We sent every man we could to France
as fast as we could re-equip and transport their formations.
I am not reciting these facts for the purpose of recrimination. That I judge to be utterly futile and even
harmful. We cannot afford it. I recite them in order to explain why it was we did not have, as we could have
had, between twelve and fourteen British divisions fighting in the line in this great battle instead of only
three. Now I put all this aside. I put it on the shelf, from which the historians, when they have time, will
select their documents to tell their stories. We have to think of the future and not of the past. This also
applies in a small way to our own affairs at home. There are many who would hold an inquest in the House
of Commons on the conduct of the Governments-and of Parliaments, for they are in it, too-during the years
which led up to this catastrophe. They seek to indict those who were responsible for the guidance of our
affairs. This also would be a foolish and pernicious process. There are too many in it. Let each man search
his conscience and search his speeches. I frequently search mine.
Of this I am quite sure, that if we open a quarrel between the past and the present, we shall find that we
have lost the future. Therefore, I cannot accept the drawing of any distinctions between Members of the
present Government. It was formed at a moment of crisis in order to unite a ...
The Categorical Imperative (selections taken from The Foundati.docxmattinsonjanel
The Categorical Imperative (selections taken from The Foundations of the Metaphysics of
Morals)
Preface
As my concern here is with moral philosophy, I limit the question suggested to this:
Whether it is not of the utmost necessity to construct a pure thing which is only empirical and
which belongs to anthropology? for that such a philosophy must be possible is evident from the
common idea of duty and of the moral laws. Everyone must admit that if a law is to have moral
force, i.e., to be the basis of an obligation, it must carry with it absolute necessity; that, for
example, the precept, "Thou shalt not lie," is not valid for men alone, as if other rational beings
had no need to observe it; and so with all the other moral laws properly so called; that, therefore,
the basis of obligation must not be sought in the nature of man, or in the circumstances in the
world in which he is placed, but a priori simply in the conception of pure reason; and although
any other precept which is founded on principles of mere experience may be in certain respects
universal, yet in as far as it rests even in the least degree on an empirical basis, perhaps only as to
a motive, such a precept, while it may be a practical rule, can never be called a moral law…
What is the “Good Will?”
NOTHING can possibly be conceived in the world, or even out of it, which can be called
good, without qualification, except a good will. Intelligence, wit, judgement, and the other
talents of the mind, however they may be named, or courage, resolution, perseverance, as
qualities of temperament, are undoubtedly good and desirable in many respects; but these gifts of
nature may also become extremely bad and mischievous if the will which is to make use of them,
and which, therefore, constitutes what is called character, is not good. It is the same with the
gifts of fortune. Power, riches, honour, even health, and the general well-being and contentment
with one's condition which is called happiness, inspire pride, and often presumption, if there is
not a good will to correct the influence of these on the mind, and with this also to rectify the
whole principle of acting and adapt it to its end. The sight of a being who is not adorned with a
single feature of a pure and good will, enjoying unbroken prosperity, can never give pleasure to
an impartial rational spectator. Thus a good will appears to constitute the indispensable condition
even of being worthy of happiness.
There are even some qualities which are of service to this good will itself and may
facilitate its action, yet which have no intrinsic unconditional value, but always presuppose a
good will, and this qualifies the esteem that we justly have for them and does not permit us to
regard them as absolutely good. Moderation in the affections and passions, self-control, and calm
deliberation are not only good in many respects, but even seem to constitute part of th ...
The cave represents how we are trained to think, fell or act accor.docxmattinsonjanel
The cave represents how we are trained to think, fell or act according to society, following our own way and not the way intended for us. The shadows are merely a reflection of what they perceived to be reality instead of an illusion. The prisoners are trapped in society, each one of us who choose to stay trapped in our own way. The man that escapes is the person who no longer is a slave to society and can see the difference between reality and illusion. The day light can be compared to God’s will. When you don’t follow the plan that has been laid out for you by God, than you are trapped and you will only see illusions or reflections of reality. Escaping and choosing to go into “the light,” or following the will of God, only then can you be set free from your prison.
When looking at a piece of art, a painting, for example, at first glance the painting can appear to be something other what it is intended to be (reality). This reminds me of those pictures that everyone sees on social media, the picture that has circles all over it. When you look at the picture it appears that the circles are moving, but in reality the circles do not move at all. So art can more or less be perceived as more of an illusion.
An example of the picture can be seen here http://www.dailyhaha.com/_pics/movie_circles_illusion.jpg
Accepting illusion as reality happens a lot more times than we probably think. Anything that we see on T.V., Social Media, internet, or even dating, can all be perceived as an illusion at some point. Take dating for example; how a person acts on a date is most likely not how they would act to someone they have known for a while (illusion). Not all people pretend to be something different but in many cases they do. Recognizing what you failed to see after the initial first date and thereafter is how you would know what you first seen was just simply an illusion and therefore not reality, unless of course in reality they are simply a fake person I suppose. Following this pattern makes you realize most people do not appear to be who they are. A good “first impression” doesn’t necessarily mean much when thinking about illusions vs reality, because that’s all the “first impression” is in fact more or less an illusion.
People live in shadows because they fail to recognize reality and choose to continue to believe in illusions. With the growth of Social media, more and more people are falling victim to what things appear to be and will stay in the dark (cave). We as a society are imprisoned by what we see and read through news channels and social media. We will believe anything that comes across CNN or any news station (not fox news though) and let them make up our mind for us. People comment on any shooting victims and assume the cop was in the wrong and is racist, in reality that is not always the case.
It’s interesting to think in terms of appearance vs reality when viewing not only art, but the world. Not taking things for what they appear to ...
The Case Superior Foods Corporation Faces a ChallengeOn his way.docxmattinsonjanel
The Case: Superior Foods Corporation Faces a Challenge
On his way to the plant office, Jason Starnes passed by the production line where hundreds of gloved, uniformed workers were packing sausages and processed meats for shipment to grocery stores around the world.
Jason's company, Superior Foods Corporation, based in Wichita, Kansas, employed 30,000 people in eight countries and had beef and pork processing plants in Arkansas, California, Milwaukee, and Nebraska City. Since a landmark United States–Japan trade agreement signed in 1988, markets had opened up for major exports of American beef, now representing 10 percent of U.S. production. Products called “variety meats”—including intestines, hearts, brains, and tongues—were very much in demand for export to international markets.
Jason was in Nebraska City to talk with the plant manager, Ben Schroeder, about the U.S. outbreak of bovine spongiform encephalopathy (mad cow disease) and its impact on the plant. On December 23, 2011, the U.S. Department of Agriculture had announced that bovine spongiform encephalopathy had been discovered in a Holstein cow in Washington State. The global reaction was swift: Seven countries imposed either total or partial bans on the importation of U.S. beef, and thousands of people were chatting about it on blogs and social networking sites. Superior had moved quickly to intercept a container load of frozen Asian-bound beef from its shipping port in Los Angeles, and all other shipments were on hold.
After walking into Ben's office, Jason sat down across from him and said, “Ben, your plant has been a top producer of variety meats for Superior, and we have appreciated all your hard work out here. Unfortunately, it looks like we need to limit production for a while—at least three months, or until the bans get relaxed. I know Senator Nelson is working hard to get the bans lifted. In the meantime, we need to shut down production and lay off about 25 percent of your workers. I know it is going to be difficult, and I'm hoping we can work out a way to communicate this to your employees.”
...
The Case You can choose to discuss relativism in view of one .docxmattinsonjanel
The Case:
You can choose to discuss relativism in view of one of the following two cases:
The Case:
· Start by giving a brief explanation of relativism (200 words).
· what is the difference between ethical & cultural relativism. Then discuss, in view of relativism, how we can reconcile the apparent conflict between the need for enforcement of human rights standards with the need for protection of cultural diversity. (400 words).
...
The Case Study of Jim, Week Six The body or text (i.e., not rest.docxmattinsonjanel
The Case Study of Jim, Week Six
The body or text (i.e., not restating the question in your answer, not including your references or your signature) of your initial response should be at least 300 words of text to be considered substantive. You will see a red U for initial responses that are not at least 300 words. Note: your initial response to this required discussion will not count toward participation
The Case Study of Jim, Week 6
Title of Activity: In class discussion of the case study of Jim, Week Six
Objective: Review the concepts of the case study in Ch.13 of Personality and then relate Jim’s case to the theorists discussed during the week. In addition, summarize the entire case study.
1. Read “The Case of Jim” in Ch. 13 of Personality.
2. Discuss the case. This week, discussion should focus on social-cognitive theory.
3. Provide a summary of the entire case.
THE CASE OF JIM Twenty years ago Jim was assessed from various theoretical points of view: psychoanalytic, phenomenological, personal construct, and trait.
At the time, social-cognitive theory was just beginning to evolve, and thus he was not considered from this standpoint. Later, however, it was possible to gather at least some data from this theoretical standpoint as well. Although comparisons with earlier data may be problematic because of the time lapse, we can gain at least some insight into Jim’s personality from this theoretical point of view. We do so by considering
Jim’s goals, reinforcers he experiences, and his self-efficacy beliefs.
Jim was asked about his goals for the immediate future and for the long-range future. He felt that his immediate and long-term goals were pretty much the same: (1) getting to know his son and being a good parent, (2) becoming more accepting and less critical of his wife and others, and (3) feeling good about his professional work as a consultant.
Generally he feels that there is a good chance of achieving these goals but is guarded in that estimate, with some uncertainty about just how much he will be able to “get out of myself” and thereby be more able to give to his wife and child.
Jim also was asked about positive and aversive reinforcers, things that were important to him that he found rewarding or unpleasant.
Concerning positive reinforcers, Jim reported that money was “a biggie.”
In addition he emphasized time with loved ones, the glamour of going to an opening night, and generally going to the theater or movies.
He had a difficult time thinking of aversive reinforcers. He described writing as a struggle and then noted, “I’m having trouble with this.”
Jim also discussed another social-cognitive variable: his competencies or skills (both intellectual and social). He reported that he considered himself to be very bright and functioning at a very high intellectual level. He felt that he writes well from the standpoint of a clear, organized presentation, but he had not written anything that is innovative or creative. Ji ...
The Case of Missing Boots Made in ItalyYou can lead a shipper to.docxmattinsonjanel
The Case of Missing Boots Made in Italy
You can lead a shipper to the water, but if the horse does not want to drink…
Vocabulary:
Shipper: In commercial trade, the person who gives goods to a shipping company to be transported to a foreign destination; in export transactions, it is usually the exporter. Do not confuse the shipper with the shipping company or carrier.
Consignee: The person who is ultimately receiving the goods, generally the buyer or importer. Sometimes these people will designate a “notify party” to be notified when the goods arrive in the port of entry, so that customs clearance can be arranged and the goods picked up for further domestic transport.
Carrier: A company that transports goods (sometimes referred to as a “shipping company” or a “freight company”).
Forwarder (or “freight forwarder”): A forwarder is like a travel agent for cargo – forwarders organize the transport of your goods from departure to destination, and charge a fee for their services. There are many different kinds of forwarders. There are firms that act as both forwarders and carriers. Sometimes forwarders will have relationships with a whole string of carriers and other forwarders, so that the shipper only deals with the forwarder but in the end the goods are actually carrier by a series of independent transport companies.
NVOCC: Non-vessel operating common carrier. A “common carrier” in the legal terminology refers to a carrier who has accepted the additional legal burdens imposed on a company that regularly carries goods for a fee (as opposed to someone with a truck who might agree to help you out just this once because you’re in trouble).
Container: Large standard-sized metal boxes for transporting merchandise; you see them on the back of trucks, or stacked up outside of ports like Lego toys, or on top of large ocean-going container ships. The capacity of container vessels is measured in TEU (twenty-foot equivalent units; containers generally measure 20 or 40 feet long; large vessels can now carry in excess of 4,000 TEU). There are different kinds of containers for different purposes. For example, refrigerated containers (for transporting meat or fruit, for example) are called “reefers,” so be careful where you use this term.
Consolidator: When large companies ship a lot of goods, they are usually able to fill entire containers. However, shippers who ship smaller amounts (like the shipper in the example below), often have their goods “stuffed” (the industry term) along with other goods into the same container; hence, they are “consolidated.” Some firms specialize in consolidating various shipments from different shippers, these are “consolidators.” A load which requires consolidation is a “LCL” or less-than-full-container load, as opposed to a “FCL” – full-container-load.
Marine Insurance: This is a common term for cargo insurance for international shipments, even in cases where much of the transport is NOT by sea; “marine insurance ...
The Cardiovascular SystemNSCI281 Version 51University of .docxmattinsonjanel
The Cardiovascular System
NSCI/281 Version 5
1
University of Phoenix Material
The Cardiovascular System
Exercise 9.6: Cardiovascular System—Thorax, Arteries, Anterior View
Layer 1 (p. 470)
A. .
B. .
C. .
D. .
E. .
F. .
G. .
H. .
Layer 2 (p. 470)
A. .
B. .
C. .
D. .
E. .
F. .
G. .
H. .
I. .
J. .
Layer 3 (p. 471)
A. .
B. .
C. .
D. .
E. .
F. .
G. .
H. .
I. .
J. .
Layer 4 (pp. 471-472)
A. .
B. .
C. .
D. .
E. .
F. .
G. .
H. .
I. .
J. .
K. .
L. .
M. .
N. .
O. .
P. .
Q. .
R. .
S. .
T. .
U. .
V. .
W. .
Layer 5 (p. 472)
A. .
B. .
C. .
D. .
E. .
F. .
G. .
H. .
I. .
J. .
K. .
Layer 6 (pp. 472-473)
A. .
B. .
C. .
D. .
E. .
F. .
G. .
H. .
I. .
J. .
K. .
L. .
M. .
N. .
O. .
P. .
Q. .
R. .
S. .
T. .
U. .
V. .
W. .
X. .
Exercise 9.7a: Imaging—Aortic Arch
A. .
B. .
C. .
D. .
E. .
F. .
G. .
H. .
I. .
J. .
K. .
L. .
M. .
N. .
O. .
P. .
Q. .
R. .
S. .
T. .
U. .
V. .
W. .
X. .
Y. .
Z. .
AA. .
Exercise 9.7b: Imaging—Aortic Arch
A. .
B. .
C. .
D. .
E. .
F. .
G. .
H. .
I. .
J. .
K. .
L. .
M. .
N. .
O. .
P. .
Q. .
R. .
S. .
T. .
U. .
Exercise 9.8: Cardiovascular System—Thorax, Veins, Anterior View
Layer 2 (pp. 474-475)
A. .
B. .
C. .
D. .
E. .
F. .
G. .
H. .
I. .
J. .
Layer 3 (p. 475)
A. .
B. .
C. .
D. .
E. .
F. .
G. .
H. .
I. .
J. .
Layer 4 (p. 476)
A. .
B. .
C. .
D. .
E. .
F. .
G. .
H. .
I. .
J. .
K. .
L. .
M. .
N. .
O. .
P. .
Q. .
R. .
S. .
T. .
U. .
V. .
W. .
Layer 5 (pp. 476-477)
A. .
B. .
C. .
D. .
E. .
F. .
G. .
H. .
I. .
J. .
Layer 6 (p. 476)
A. .
B. .
C. .
D. .
E. .
F. .
G. .
H. .
I. .
J. .
K. .
L. .
M. .
N. .
O. .
P. .
Q. .
R. .
S. .
Animation: Pulmonary and Systemic Circulation
After viewing the animation, answer these questions:
1. Name the two divisions of the cardiovascular system.
2. What are the destinations of these two circuits?
3. In the systemic circulation, where does gas exchange occur?
4. In the pulmonary circulation, where does gas exchange occur?
5. Name the blood vessels that carry oxygen-rich blood to the heart. How many are there? Where do they terminate?
Exercise 9.9: Imaging—Thorax
A. .
B. .
C. .
D. .
E. .
F. .
G. .
H. .
I. .
J. .
K. .
In Review
1. What is the name for the fibrous sac that encloses the heart?
2. Name the lymphatic organ that is large in children but atrophies during adolescence.
3. Name the bilobed endocrine gland located lateral to the trachea and larynx.
4. How do large arteries supply blood to body structures?
5. Name the large vessel that conveys oxygen-poor blood from the right ventricle of the heart.
6. Name the two branches of the blood vessel mentioned in question 5 that convey oxygen-poor blood to the lungs.
7. Name the blunt tip of the left ventricle.
8. What is the carotid sheath? What structures are found within it?
9. What is the serous pericardium?
10. Name the structure that ...
The Cardiovascular SystemNSCI281 Version 55University of .docxmattinsonjanel
The Cardiovascular System
NSCI/281 Version 5
5
University of Phoenix Material
The Cardiovascular System
Exercise 9.6: Cardiovascular System—Thorax, Arteries, Anterior View
Layer 1 (p. 470)
A. .
B. .
C. .
D. .
E. .
F. .
G. .
H. .
Layer 2 (p. 470)
A. .
B. .
C. .
D. .
E. .
F. .
G. .
H. .
I. .
J. .
Layer 3 (p. 471)
A. .
B. .
C. .
D. .
E. .
F. .
G. .
H. .
I. .
J. .
Layer 4 (pp. 471-472)
A. .
B. .
C. .
D. .
E. .
F. .
G. .
H. .
I. .
J. .
K. .
L. .
M. .
N. .
O. .
P. .
Q. .
R. .
S. .
T. .
U. .
V. .
W. .
Layer 5 (p. 472)
A. .
B. .
C. .
D. .
E. .
F. .
G. .
H. .
I. .
J. .
K. .
Layer 6 (pp. 472-473)
A. .
B. .
C. .
D. .
E. .
F. .
G. .
H. .
I. .
J. .
K. .
L. .
M. .
N. .
O. .
P. .
Q. .
R. .
S. .
T. .
U. .
V. .
W. .
X. .
Exercise 9.7a: Imaging—Aortic Arch
A. .
B. .
C. .
D. .
E. .
F. .
G. .
H. .
I. .
J. .
K. .
L. .
M. .
N. .
O. .
P. .
Q. .
R. .
S. .
T. .
U. .
V. .
W. .
X. .
Y. .
Z. .
AA. .
Exercise 9.7b: Imaging—Aortic Arch
A. .
B. .
C. .
D. .
E. .
F. .
G. .
H. .
I. .
J. .
K. .
L. .
M. .
N. .
O. .
P. .
Q. .
R. .
S. .
T. .
U. .
Exercise 9.8: Cardiovascular System—Thorax, Veins, Anterior View
Layer 2 (pp. 474-475)
A. .
B. .
C. .
D. .
E. .
F. .
G. .
H. .
I. .
J. .
Layer 3 (p. 475)
A. .
B. .
C. .
D. .
E. .
F. .
G. .
H. .
I. .
J. .
Layer 4 (p. 476)
A. .
B. .
C. .
D. .
E. .
F. .
G. .
H. .
I. .
J. .
K. .
L. .
M. .
N. .
O. .
P. .
Q. .
R. .
S. .
T. .
U. .
V. .
W. .
Layer 5 (pp. 476-477)
A. .
B. .
C. .
D. .
E. .
F. .
G. .
H. .
I. .
J. .
Layer 6 (p. 476)
A. .
B. .
C. .
D. .
E. .
F. .
G. .
H. .
I. .
J. .
K. .
L. .
M. .
N. .
O. .
P. .
Q. .
R. .
S. .
Animation: Pulmonary and Systemic Circulation
After viewing the animation, answer these questions:
1. Name the two divisions of the cardiovascular system.
2. What are the destinations of these two circuits?
3. In the systemic circulation, where does gas exchange occur?
4. In the pulmonary circulation, where does gas exchange occur?
5. Name the blood vessels that carry oxygen-rich blood to the heart. How many are there? Where do they terminate?
Exercise 9.9: Imaging—Thorax
A. .
B. .
C. .
D. .
E. .
F. .
G. .
H. .
I. .
J. .
K. .
In Review
1. What is the name for the fibrous sac that encloses the heart?
2. Name the lymphatic organ that is large in children but atrophies during adolescence.
3. Name the bilobed endocrine gland located lateral to the trachea and larynx.
4. How do large arteries supply blood to body structures?
5. Name the large vessel that conveys oxygen-poor blood from the right ventricle of the heart.
6. Name the two branches of the blood vessel mentioned in question 5 that convey oxygen-poor blood to the lungs.
7. Name the blunt tip of the left ventricle.
8. What is the carotid sheath? What structures are found within it?
9. What is the serous pericardium?
10. Name the structure that ...
The British Airways Swipe Card Debacle case study;On Friday, Jul.docxmattinsonjanel
The British Airways Swipe Card Debacle case study;
On Friday, July 18, 2003, British Airways staff in Terminals 1 and 4 at London’s busy Heathrow Airport held a 24 hour wildcat strike. The strike was not officially sanctioned by the trade unions but was spontaneous action by over 250 check in staff who walked out at 4 pm. The wildcat strike occurred at the start of a peak holiday season weekend which led to chaotic scenes at Heathrow. Some 60 departure flights were grounded and over 10,000 passengers left stranded. The situation was heralded as the worst industrial situation BA had faced since 1997 when a strike was called by its cabin crew. BA response was to cancel its services from both terminals, apologize for the disruption and ask those who were due to fly not to go to the airport as they would be unable to service them. BA also set up a tent outside Heathrow to provide refreshments and police were called in to manage the crow. BA was criticized by many American visitors who were trying to fly back to the US for not providing them with sufficient information about what was going on. Staff returned to work on Saturday evening but the effects of the strike flowed on through the weekend. By Monday morning July 21, BA reported that Heathrow was still extremely busy. There is still a large backlog of more than 1000 passengers from services cancelled over the weekend. We are doing everything we can to get these passengers away in the next couple of days. As a result of the strike BA lost around 40 million and its reputation was severely dented. The strike also came at a time when BA was still recovering from other environmental jolts such as 9/11 the Iraqi war, SARS, and inroads on its markets from budget airlines. Afterwards BA revealed that it lost over 100,000 customers a result of the dispute.
BA staff were protesting the introduction of a system for electronic clocking in that would record when they started and finished work for the day. Staff were concerned that the system would enable managers to manipulate their working patterns and shift hours. The clocking in system was one small part of a broader restructuring program in BA, titled the Future Size and Shape recovery program. Over the previous two years this had led to approximately 13,000 or almost one in four jobs, being cut within the airline. As The Economist noted, the side effects of these cuts were emerging with delayed departures resulting from a shortage of ground staff at Gatwick and a high rate of sickness causing the airline to hire in aircraft and crew to fill gaps. Rising absenteeism is a sure sign of stress in an organization that is contracting. For BA management introduction of the swipe card system was a way of modernizing BA and improving the efficient use of staff and resources. As one BA official was quoted as saying We needed to simplify things and bring in the best system to manage people. For staff it was seen as a prelude to a radical shakeup in working ...
The Case Abstract Accuracy International (AI) is a s.docxmattinsonjanel
The Case
Abstract
Accuracy International (AI) is a specialist British firearms manufacturer based in Portsmouth,
Hampshire, England and best known for producing the Accuracy International Arctic Warfare
series of precision sniper rifles. The company was established in 1978 by British Olympic shooting
gold medallist Malcolm Cooper, MBE (1947–2001), Sarah Cooper, Martin Kay, and the designers
of the weapons, Dave Walls and Dave Craig. All were highly skilled international or national target
shooters. Accuracy International's high-accuracy sniper rifles are in use with many military units
and police departments around the world. Accuracy International went into liquidation in 2005, and
was bought by a British consortium including the original design team of Dave Walls and Dave
Craig.
Earlier this year, AI's computer network was hit by a data stealing malware which cost thousands of
pounds to recover from. Also last year there have been a couple of incidents of industrial
espionage, involving staff who were later sacked and prosecuted.
As part of an ongoing covert investigation, the head of Security at AI (DG) has hired you to
conduct a forensic investigation on an image of a USB device. The USB device, it is a non-
company issued device, allegedly belonging to an employee Christian Macleod, a consultant and
technical manager at AI for more than six years.
Case details
Christian’s manager, David Bolton, is the regional manager and head of R&D and has been
working at AI for the last three years. David initiated this fact finding covert investigation which is
conducted with the support of the head of Security at AI.
The USB device in question allegedly was removed from Christian's workstation at AI while he
was out of the office for lunch, the device was imaged and then it was plugged in back into
Christian's workstation. You have been provided with a copy of that image (the original copy is at
the moment secure in a secure locker at the security department).
You have been told by DG that Dave was alarmed by some of the work practices of Christian and
that prompted him to start this investigation by contacting the Head of Security at AI. According to
Dave, Christian would bring in devices such as his iPod and his iPhone and he would often plug
these into his workstation. There is no policy against personal music devices and there is no
BYOD policy but there is a strict policy against copying corporate data is any personal device. The
company's policy states that such data is not to be stored unencrypted, on unauthorised, non
company approved devices. According to DG, Dave has reasons to believe that an earlier malware
infection incident at AI had its origins in one of Christian's personal devices.
Supporting information
1. You need to be aware that Dave and Christian do not get along as they had a few verbal exchanges
in the last year. Christian has filled in a ...
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UPRAHUL
This Dissertation explores the particular circumstances of Mirzapur, a region located in the
core of India. Mirzapur, with its varied terrains and abundant biodiversity, offers an optimal
environment for investigating the changes in vegetation cover dynamics. Our study utilizes
advanced technologies such as GIS (Geographic Information Systems) and Remote sensing to
analyze the transformations that have taken place over the course of a decade.
The complex relationship between human activities and the environment has been the focus
of extensive research and worry. As the global community grapples with swift urbanization,
population expansion, and economic progress, the effects on natural ecosystems are becoming
more evident. A crucial element of this impact is the alteration of vegetation cover, which plays a
significant role in maintaining the ecological equilibrium of our planet.Land serves as the foundation for all human activities and provides the necessary materials for
these activities. As the most crucial natural resource, its utilization by humans results in different
'Land uses,' which are determined by both human activities and the physical characteristics of the
land.
The utilization of land is impacted by human needs and environmental factors. In countries
like India, rapid population growth and the emphasis on extensive resource exploitation can lead
to significant land degradation, adversely affecting the region's land cover.
Therefore, human intervention has significantly influenced land use patterns over many
centuries, evolving its structure over time and space. In the present era, these changes have
accelerated due to factors such as agriculture and urbanization. Information regarding land use and
cover is essential for various planning and management tasks related to the Earth's surface,
providing crucial environmental data for scientific, resource management, policy purposes, and
diverse human activities.
Accurate understanding of land use and cover is imperative for the development planning
of any area. Consequently, a wide range of professionals, including earth system scientists, land
and water managers, and urban planners, are interested in obtaining data on land use and cover
changes, conversion trends, and other related patterns. The spatial dimensions of land use and
cover support policymakers and scientists in making well-informed decisions, as alterations in
these patterns indicate shifts in economic and social conditions. Monitoring such changes with the
help of Advanced technologies like Remote Sensing and Geographic Information Systems is
crucial for coordinated efforts across different administrative levels. Advanced technologies like
Remote Sensing and Geographic Information Systems
9
Changes in vegetation cover refer to variations in the distribution, composition, and overall
structure of plant communities across different temporal and spatial scales. These changes can
occur natural.
This presentation was provided by Steph Pollock of The American Psychological Association’s Journals Program, and Damita Snow, of The American Society of Civil Engineers (ASCE), for the initial session of NISO's 2024 Training Series "DEIA in the Scholarly Landscape." Session One: 'Setting Expectations: a DEIA Primer,' was held June 6, 2024.
বাংলাদেশের অর্থনৈতিক সমীক্ষা ২০২৪ [Bangladesh Economic Review 2024 Bangla.pdf] কম্পিউটার , ট্যাব ও স্মার্ট ফোন ভার্সন সহ সম্পূর্ণ বাংলা ই-বুক বা pdf বই " সুচিপত্র ...বুকমার্ক মেনু 🔖 ও হাইপার লিংক মেনু 📝👆 যুক্ত ..
আমাদের সবার জন্য খুব খুব গুরুত্বপূর্ণ একটি বই ..বিসিএস, ব্যাংক, ইউনিভার্সিটি ভর্তি ও যে কোন প্রতিযোগিতা মূলক পরীক্ষার জন্য এর খুব ইম্পরট্যান্ট একটি বিষয় ...তাছাড়া বাংলাদেশের সাম্প্রতিক যে কোন ডাটা বা তথ্য এই বইতে পাবেন ...
তাই একজন নাগরিক হিসাবে এই তথ্য গুলো আপনার জানা প্রয়োজন ...।
বিসিএস ও ব্যাংক এর লিখিত পরীক্ষা ...+এছাড়া মাধ্যমিক ও উচ্চমাধ্যমিকের স্টুডেন্টদের জন্য অনেক কাজে আসবে ...
How to Make a Field Mandatory in Odoo 17Celine George
In Odoo, making a field required can be done through both Python code and XML views. When you set the required attribute to True in Python code, it makes the field required across all views where it's used. Conversely, when you set the required attribute in XML views, it makes the field required only in the context of that particular view.
How to Add Chatter in the odoo 17 ERP ModuleCeline George
In Odoo, the chatter is like a chat tool that helps you work together on records. You can leave notes and track things, making it easier to talk with your team and partners. Inside chatter, all communication history, activity, and changes will be displayed.
How to Build a Module in Odoo 17 Using the Scaffold MethodCeline George
Odoo provides an option for creating a module by using a single line command. By using this command the user can make a whole structure of a module. It is very easy for a beginner to make a module. There is no need to make each file manually. This slide will show how to create a module using the scaffold method.
A review of the growth of the Israel Genealogy Research Association Database Collection for the last 12 months. Our collection is now passed the 3 million mark and still growing. See which archives have contributed the most. See the different types of records we have, and which years have had records added. You can also see what we have for the future.
Walmart Business+ and Spark Good for Nonprofits.pdfTechSoup
"Learn about all the ways Walmart supports nonprofit organizations.
You will hear from Liz Willett, the Head of Nonprofits, and hear about what Walmart is doing to help nonprofits, including Walmart Business and Spark Good. Walmart Business+ is a new offer for nonprofits that offers discounts and also streamlines nonprofits order and expense tracking, saving time and money.
The webinar may also give some examples on how nonprofits can best leverage Walmart Business+.
The event will cover the following::
Walmart Business + (https://business.walmart.com/plus) is a new shopping experience for nonprofits, schools, and local business customers that connects an exclusive online shopping experience to stores. Benefits include free delivery and shipping, a 'Spend Analytics” feature, special discounts, deals and tax-exempt shopping.
Special TechSoup offer for a free 180 days membership, and up to $150 in discounts on eligible orders.
Spark Good (walmart.com/sparkgood) is a charitable platform that enables nonprofits to receive donations directly from customers and associates.
Answers about how you can do more with Walmart!"
How to Setup Warehouse & Location in Odoo 17 InventoryCeline George
In this slide, we'll explore how to set up warehouses and locations in Odoo 17 Inventory. This will help us manage our stock effectively, track inventory levels, and streamline warehouse operations.
1. SWE481 – Software Engineering Capstone 1 Page | 2
SWE481 Software Engineering Capstone I
Group Software Development Plan
11 August 2014
Week 5
Contents
1. Project Outline 4
2. Development Methodology 7
3. Requirements 9
3.1 Requirements Gathering Process 9
3.2 Project Requirements 10
3.3 Requirements Analysis 11
4. App Design 12
4.1 Music App Architecture 12
4.2 Major Application Components 13
4.3 Class Diagram 14
4.4 Use Case Diagram 15
4.5 Main Screen 16
4.6 Data Management 17
5. Development and Testing 18
5.1 Coding Agile Development 18
5.2 Key Processes 18
5.3 Testing Phases 20
5.4 Test Cases 21
6. Project Schedule 23
6.1 Master Schedule 23
6.2 Gantt Chart25
6.3 Network Diagram 25
7. Risk Analysis 26
2. 7.1 Risk Assessment26
7.2 Mitigation Strategy 26
References 26
1. Project Outline
The project that we have chosen is a mobile application for
music to expand the streaming music that is already available
on the website. The application will have two options for the
user to choose from. The first option will be a no cost listening
option, which will have ads associated with it. This option will
be a radio stream that will allow the user to listen to random
songs based on the interests that they choose. The second option
would be an ad-free paid subscription where the user can pick
specific songs to add to their playlist for their listening
pleasure.
The application will be developed to work on the Android 4.0+
operating system along with iOS 6.0+ and Windows 8.x+
phones. It will include integration for social media so that users
can post their playlists and what they are listening. They will be
able to share the playlists with their friends and family.
The application will be only need the UI developed as it will
integrate with the backend that is already developed for the
website. The budget for the project is estimated to be $300k
with an expected timeline to be between 60 and 90 days. This
will be finalized once the schedule is created and released.
The project will be broken down into 5 phases.
1. Initial pilot application. At this phase the application will
allow users to create accounts, and have the majority of the
front end laid out, but not completely functional.
2. Radio Module. This will be the development of the search
functionality to allow users to search through the database of
songs and artists and begin to find music for which they wish to
listen.
3. Subscription Module. This will allow users to use the Radio
Module above and save the songs to playlists and add music to
3. the library.
4. Social Media Module. This will allow users to begin posting
information on what they are listening to their social media
networks.
5. Project Close. This will be the final release of the completed
application.
Each of these phases corresponds to a cycle in the software
development methodology that we have chosen to use for this
project.
We must consider a number of things while developing this
software and looking into developing the requirements. One of
which is the legal aspect of allowing users to access music for
which we are currently licensed to use on a mobile device
versus in their PC web browser. We will have to investigate and
potentially modify any agreements we have with the various
music labels to ensure that our end users have access to the
most music. If we are unable to provide a wide range of music,
especially for what is currently popular, users will not purchase
and use the application, and the investment into the project will
have ultimately been a waste.
A second piece to look at will be the user interface itself.
We should be sure to ensure that the interface is usable by all
levels of user. It should be simple and intuitive, but also cater
to those who may have visual or auditory difficulties. For the
visually impaired we can include large text and album pictures
to go along with each artist so the user can easily read and
identify what it is they are looking for. For those with auditory
impairments we can include Bluetooth connectivity to connect
to external speakers and devices that are Bluetooth enabled to
enhance their listening pleasure.
2. Development Methodology
The development methodology being used for this project is a
form of Agile software development called Iterative
development. This type of a software development methodology
works on cycles. These cycles are broken down into several
steps. They are as follows:
4. 1. Inception
a. Planning
b. Gathering Requirements
2. Elaboration
a. Analysis
b. Design
3. Construction
a. Code Review
b. Testing
4. Transition
a. Acceptance
b. Deployment
The inception phase identifies the scope, all requirements both
functional and non-functional, and a high level overview of
risks. Next, the elaboration phase creates the architecture that
helps to alleviate the risks identified in the inception phase and
also will fulfill the non-functional requirements. Then the
construction phase fleshes out the previously generated
architecture using the functional requirements as an outline of
what the expectations are. Lastly, the transition phase delivers
the finalized and fully tested code into production and moves
forward to the next cycle.
This type of software development methodology will allow us to
break down the software being developed into several individual
pieces of functionality that will have to be created for the
project. This will allow us to create each piece and then build
upon the previously created code for each cycle, until a fully
functional and robust application is delivered (Duval, 2007).
3. Requirements3.1 Requirements Gathering Process
The requirements gathering process will consist of a
multiphase approach that will include questionnaires, meetings,
and visual tools. Using a multiphase approach will aid the
development team in understanding the project and business.
The goal will be to get information from each level of the
business to gather important requirements that must be included
in the project. Below are the steps this project will take to elicit
5. and gather requirements.
Steps for elicitation and requirements gathering
1. Questionnaire: Step 1 will be the project questionnaire and
will focus on business requirements, process requirements, and
the music app requirements. Business requirements will focus
on business methodology, business tolerance, and performance
requirements. Process requirements will cover the business’
operational processes and their definition. The last item will be
product requirements and will point to functional and non-
functional requirements. Included in the product requirements
will be portability, system interface, and what the impact of a
system failure would be (Seilevel, n.d.).
2. UML tools: The next step is to create UML tools like use
cases, class diagrams, and sequence diagrams made from the
initial questionnaire. The UML tools will be used to elicit and
gather more requirements. They aid the requirements processes
by describing usability and flow of the system.
3. Meetings: The last step will be the meetings that will bring
stakeholders together, and individually, to gather as many
requirements as possible. The meetings will consist of
brainstorming and analysis meetings. Included tools will be
results from questionnaires, UML documents, white boards, and
storyboards or mockups. The tools will aid discussion and allow
the meetings to progress more quickly (Seilevel, n.d.). 3.2
Project Requirements
Requirement ID
Description
Criteria
Rationale
Type
Priority
MA001
App shall have touch screen support
Yes/No
Provides app navigation
6. Functional
1
MA002
Music search results shall be < 2 sec from pressing search
button
Must be < 2 secs
Reduce user wait time
Functional
2
MA003
App shall have native device appearance
Yes/No
App blends with device environment
Nonfunctional
2
MA004
App shall stream music online from server
Yes/No
Provides on demand access to entire music selection
Functional
1
MA005
App shall play music offline with full subscription
Yes/No
Allows user to listen without incurring data charges
Functional
1
MA006
App shall allow free radio access
Yes/No
User can listen to music without paying monthly fee
Functional
3
MA007
App shall provide music preference recommendations
Yes/No/
7. Partial
Entices user to explore other like music interests
Nonfunctional
3
MA008
App shall have < 3 search process steps
Must be < 3 steps
Simplifies music searching
Functional
2
MA009
App shall support Facebook, Google+ integration
Yes/No
Allow sharing of music interests with friends
Functional
2
MA010
App size shall be < 20 MB
Must be <20 MB
Ensures app is easy to download/install
Nonfunctional
3
MA011
App music storage size shall be < max device capacity
Storage size
Ensures app doesn’t limit storage space
Nonfunctional
2
MA012
App run size shall be < 15 MB
Must be <15 MB
Ensures app is not intrusive
Nonfunctional
3
MA013
App shall support Bluetooth 2.0+
8. Yes/No
Supports user accessories
Nonfunctional
1
MA014
App shall support iOS 6.0+, Android 4.0+, Windows 8.0+
Yes/No
Cross platform device support
Nonfunctional
1
MA015
App shall provide 3 failed login attempt lockout
No more than 3 attempts
Provides account access security
Nonfunctional
1
MA016
App shall meet ADA compliance
Yes/No
Provides easy access for impaired users
Nonfunctional
1
MA017
App shall have unique user accounts
Yes/No
Ensures no more than one account per username
Nonfunctional
1
MA018
App shall have salt/hash password storage
Yes/No
Provides secure storage of passwords
Nonfunctional
1
MA019
App shall support SSL/256 bit login encryption support
9. Yes/No
Provides end-to-end encryption for login
Nonfunctional
1
MA020
App shall have minimum 98.99% reliability
Minimum of 98.99%
Ensures availability of service
Nonfunctional
1
3.3 Requirements Analysis
The requirements listed in section 3.2 cover the most
important requirements for this project. During analysis of the
requirements the team found that all of the major categories for
the app have been covered. The major categories include user
interface, performance, reliability, supportability, and security.
User interface requirements are shown in the touch screen
support and ADA compliance. Performance has been covered by
app size, run size, and search time. Also, the requirements listed
the needed reliability to be at 98.99%. Supportability has been
taken into consideration by ensuring the app cross platform.
Finally, security has been addressed by ensuring there is a lock
out mechanism, unique user accounts, and system encryption.
The team has done a great job in securing the major
requirements needed for the application.
4. App Design4.1 Music App Architecture
This project is to create a frontend application that will
utilize the existing backend servers and services. Although the
team will create music apps for multiple platforms there will be
some similarities. The apps will contain four main layers that
will include an interface layer, media layer, services layer, and
OS layer. The interface layer will provide the user interaction
and allow for gestures and app navigation. Next will be the
media layer, which will provide graphics, audio, and wireless
streaming.
After the media layer is the core service layer. The core
10. service layer provides networking, cloud storage, string
management, and in-app purchases. The last layer is the OS or
Kernel layer. The OS/Kernel layer is what will handle signal
processing, security, policies, memory management, and inter-
process communication. The music app will interface with the
backend music servers and store downloaded music in a local
cache (Helal & Bose, 2012).
Figure 1. Music App Architecture (Helal & Bose, 2012)4.2
Major Application Components
The major app components are shown in the component
diagram. As shown in the diagram, the app will have two
distinct ways the app will be usable. First is the radio stream
service. This is available to users for free but will limit the apps
components. With this type of account the user will only be able
to stream preprogrammed stations, search stations, share via
social media and use Bluetooth. Several other components will
only be useable with a full paid subscription. If the user has a
paid subscription (direct listen) they will be able to access the
download music, library, and playlists components in addition
all of the free service components. Also with a direct listen
account the user will still be able to listen to radio streams
provided to free account users.
Figure 2. Component Diagram
4.3 Class Diagram
The below class diagram illustrates the classes contained
within the music app system. The classes include user classes
like customer and employee. Customer services representatives,
site administrators, and third parties will inherit from the
employee class. Other classes include the main class, user
account, music, and search classes. All relationships between
11. classes are also shown in the diagram.
Figure 3. Class Diagram
4.4 Use Case Diagram
The below use case diagram shows all of the major
components of the music application. The user of the
application is on the left of the diagram. They will have access
to create an account, login or out, music library, and payment
information. Additional actors on the right are for the customer
service representatives, third party payment verification, and
site administrators. Each of these actors has access to their
specific area of the system.
Figure 4. Use Case Diagram
4.5 Main Screen
This section displays a mockup of the app’s main screen. Across
the top of the screen are four tabs for home, library, search, and
settings. Each of these tabs provides the user with unique
options to use the application. The main screen will display top
items from the music service. Under the music service banner
will be additional options for the user to use. The user will be
able to browse top albums, songs, and artists by tapping one of
the options.
Figure 5. Music App Screen
4.6 Data Management
A 2012 Pew survey found 57% of users have either
declined to install or removed an app based on privacy concerns
(Boyles, Smith, & Madden, 2012). A data management policy
will be developed for this project that will apply to both data
12. access and restriction. Care will be taken to ensure the data
owned by the user and third parties are not open to public
domain. Below are the initial requirements for data management
of the music app.
· Ownership and Custodianship – The app’s data management
shall delineate ownership between user, music service, and third
party data. The music app will protect all data owned by users
and music labels, however, it will allow these entities access to
what information is collected and maintained in the music app.
· Privacy – The music app shall adhere to all privacy legislation
to ensure that personal information is protected from the public
domain.
· Liability – The music service’s liability shall be clearly stated
in the end-user agreements and licenses.
· Sensitivity – The music app shall ensure sensitive data is not
publicly available to unauthorized parties.
· Existing Law & Policy Requirements – The music app shall
abide by all laws, existing legislation, and business policies
(Caviglione, Coccoli, & Merlo, 2013).
5. Development and Testing5.1 Coding Agile Development
The coding approach for the music app will match the agile
development methodology for the project. The music app will
be coded in small phases to ensure optimal iterative
development and continuous integration into the system. Not all
requirements will be initially known for the entire project. The
project will mature and reveal more requirements after
development begins. For this reason the project will be coded in
different iterations. The iterations will be mini-projects that
will be integrated into the bigger project.
The main goal of this development methodology is to
continuously add features to the project. The overall project
plan will be modified to add new features that will be integrated
into the system. There is also a short timeline, 2-4 weeks,
between development and deployment for the iterations. Due to
the short timeline, iterations will be limited to what can be
coded during the iteration sprint. The coding that occurs during
13. the sprints should not take more than 5-7 days to complete. This
will allow the necessary time for testing and integration into the
music app (Perry, 2006).5.2 Key Processes
The three key processes that will be used to drive the coding
phase of the project will be milestones, meetings, and constant
testing. All three of these three processes will work hand-in-
hand to accomplish the completion of the project. First, the
milestones will cover both large and small parts of the project.
The larger milestones will be setup for each development phase.
For example, the large milestones for this project are:
· 1. The initial pilot app (includes account creation)
· 2. Radio module (search for music interest)
· 3. Subscription module (create playlists, add music to library)
· 4. Social media module
· 5. Project close
There will also be smaller milestones inside each of the five
large milestones. The milestones will be tracked using
Teamwork.com milestone tracking software. The milestone
tracking software will be utilized so that the whole team will
know the progress of the development any phase of the project.
The milestones will be created and reviewed during the sprint
review meetings, which is part of the next key process (Davis,
2013).
It is essential that the development team have frequent
meetings. Meetings are held to ensure everyone is aware of the
projects current status; report any issues or risks; create,
modify, or change milestones; or request additional resources.
Below are the four main meetings that are predefined and will
be built into the project.
MEETING
PURPOSE
DURATION
FREQUENCY
Sprint Planning
Lay the ground work for the next sprint
14. 2-4 hours
1 per sprint
Daily Meetings
Allows the team to discuss risks, and milestones
15-20 minutes
Daily
Sprint Review
Display work that has been completed to the stakeholders
2-4 hours
1 per sprint
Retrospective Meeting
Discuss lessons learned
1-2 hours
1 per sprint
(Microsoft, 2014)
The last key process is continuous testing. Continuous testing is
essential to keep the project on time. Testing will start early in
the project and continue until the music app is accepted by the
customer. The testing will start at the module level. Each
module will have to be tested and approved before it is
integrated into the project. Once all of the phase modules have
been completed the phase will have to be tested before it is
integrated. After a module or phase is integrated the app will
undergo regression testing to ensure the added feature did not
cause something else to malfunction. The app testing will be
tracked via the testing plan documents. A more in depth look at
the music app testing will be covered in the next section (Duval,
2007). 5.3 Testing Phases
The music app development plan will call for several different
phases and levels for testing. For the design phase of the project
the project will start at the unit level of testing. The unit tests
will test a small part of software that will make up an
integration sprint. During this phase of testing the test will
focus on a single class and will use a one-to-one relationship. It
is possible to add additional classes however this should only be
done if absolutely necessary. If additional classes are required
15. the unit tests should not use outside dependencies (Duval,
2007).
Next, is the development phase and will include integration
testing. Integration tests will include outside dependencies to
ensure they will work with the system. Examples of
dependencies are acceptable will be music databases, file
systems, and network connectivity. The development phase will
also include system tests. It is at the system level that tests
require as many outside dependencies as possible. This will
ensure that the music app is tested with web services, outside
databases, and that the user interfaces work end-to-end (Duval,
2007).
The next phase will start the release phase for the project and
will include acceptance testing. Due to the sort timeline of the
sprints most of the acceptance testing will be completed using
automated testing. The music app development team will use a
testing an automated testing framework like Selenium. Even
though most of the testing will be automated there will be some
real-world tests that occur as well. The goal during this phase is
to use the system like a user would. This type of testing will
help ensure the system functions and performs to meet the
customer’s needs (Duval, 2007).
Finally, the last part of the release phase for the iterations will
be performance testing. The music app sprint performance
testing will be a limited deployment. This will allow the
customer and users the ability to use the system in real-world
environment. The goal for this phase is to ensure the sprint will
meet quality performance objectives for the project (Duval,
2007).5.4 Test Cases
Test 1 Information
Test Details
Script ID
TS-CROSSPF
Description
Test cross platform support
Type of Test
16. User Interface
Expected Results
The app will operate properly on iOS, Android, & Windows
Phone
Priority
Mandatory
Pass/Fail Criteria
To pass the test the app should be fully functional on System
shall support iOS 6.0+, Android 4.0+, and Windows 8.0+ Oses
other wise the test will receive a fail.
Traceability
MA014
Test Case ID
Input Values
Enviro/Config
Expected Results
TC-CROSSPF -01
Perform Music Search
App Installed on iOS versions 6-7
The music app will open and function as required per the
requirements documents
TC- CROSSPF -02
Perform Music Search
App Installed on Android versions 4.0-4.5
The music app will open and function as required per the
requirements documents
TC- CROSSPF -03
Perform Music Search
App Installed on Windows Phone versions 8.0-8.1
The music app will open and function as required per the
requirements documents
Test 2 Information
Test Details
Script ID
17. TS-STREAM
Description
Testing the user can stream radio music
Type of Test
Functional
Expected Results
System allow the user to stream radio music
Priority
Critical
Pass/Fail Criteria
To pass the system must allow the user to stream music without
error otherwise the test will fail.
Traceability
MA004
Test Case ID
Input Values
Enviro/Config
Expected Results
TC-STREAM-01
Select stream with free account, non-wireless speakers
Browsing radio stations
User is able to stream radio without error to internal or wire-
connected speakers
TC-STREAM-02
Select stream with paid account, non-wireless speakers
Browsing radio stations
User is able to stream radio without error to internal or wire-
connected speakers
TC-STREAM-03
Select stream with free account, Bluetooth wireless speakers
Browsing radio stations, Bluetooth enabled
User is able to stream radio without error to Bluetooth wireless
speakers
TC-STREAM-04
18. Select stream with paid account, Bluetooth wireless speakers
Browsing radio stations, Bluetooth enabled
User is able to stream radio without error to Bluetooth wireless
speakers
Test 3 Information
Test Details
Script ID
TS-LOGIN
Description
Test user login screen to ensure access to user account
Type of Test
Functional
Expected Results
System should authenticate the user and allow or deny access to
the account
Priority
Critical
Pass/Fail Criteria
To pass the test the system should only allow users with a valid
user name and password to access the system. Tests will fail if
unauthenticated users can access the system.
Traceability
MA015
Case ID/Script ID
Input Values
Enviro/Config
Expected Results
TC-LOGIN-01
Accurate username/password
System Login Screen
User is authenticated and granted access to account
TC-LOGIN-02
19. Invalid username and password
System Login Screen
User is denied entry and prompted to re-enter credentials
TC-LOGIN-03
Third invalid username and password entry
Reenter Login Information Screen
User is denied and directed to Forgot Login screen
(Perry, 2006)6. Project Schedule
The schedule for this project was completed in MS Project.
Two separate teams, in parallel, will develop the software
modules. The first two modules over a 7 day period with a 3 day
extension at the end of the period to account for unforeseen
issues. The next two modules will be developed in the same
manner. Following the acceptance of all the individual modules,
Integration of the system will be completed. 6.1 Master
Schedule
WBS
Task Name
Duration
Start
Finish
Predecessors
Resource Names
1
Pilot
7 days
Mon 8/4/14
Tue 8/12/14
Development Team A
1.1
Plan
1 day
Mon 8/4/14
Mon 8/4/14
20. 1.2
Requirements
1 day
Tue 8/5/14
Tue 8/5/14
2
1.3
Analysis
1 day
Wed 8/6/14
Wed 8/6/14
3
1.4
Design
1 day
Thu 8/7/14
Thu 8/7/14
4
1.5
Test
1 day
Fri 8/8/14
Fri 8/8/14
5
1.6
Acceptance
1 day
Mon 8/11/14
Mon 8/11/14
6
21. 1.7
Deployment
1 day
Tue 8/12/14
Tue 8/12/14
7
2
Radio
7 days
Mon 8/4/14
Tue 8/12/14
Development Team B
2.1
Plan
1 day
Mon 8/4/14
Mon 8/4/14
2.2
Requirements
1 day
Tue 8/5/14
Tue 8/5/14
10
2.3
Analysis
1 day
Wed 8/6/14
Wed 8/6/14
11
22. 2.4
Design
1 day
Thu 8/7/14
Thu 8/7/14
12
2.5
Test
1 day
Fri 8/8/14
Fri 8/8/14
13
2.6
Acceptance
1 day
Mon 8/11/14
Mon 8/11/14
14
2.7
Deployment
1 day
Tue 8/12/14
Tue 8/12/14
15
3
Subscription
7 days
Mon 8/18/14
Tue 8/26/14
Development Team A
3.1
23. Plan
1 day
Mon 8/18/14
Mon 8/18/14
3.2
Requirements
1 day
Tue 8/19/14
Tue 8/19/14
18
3.3
Analysis
1 day
Wed 8/20/14
Wed 8/20/14
19
3.4
Design
1 day
Thu 8/21/14
Thu 8/21/14
20
3.5
Test
1 day
Fri 8/22/14
Fri 8/22/14
21
3.6
Acceptance
24. 1 day
Mon 8/25/14
Mon 8/25/14
22
3.7
Deployment
1 day
Tue 8/26/14
Tue 8/26/14
23
4
Social Media
7 days
Mon 8/18/14
Tue 8/26/14
Development Team B
4.1
Plan
1 day
Mon 8/18/14
Mon 8/18/14
4.2
Requirements
1 day
Tue 8/19/14
Tue 8/19/14
26
4.3
Analysis
1 day
25. Wed 8/20/14
Wed 8/20/14
27
4.4
Design
1 day
Thu 8/21/14
Thu 8/21/14
28
4.5
Test
1 day
Fri 8/22/14
Fri 8/22/14
29
4.6
Acceptance
1 day
Mon 8/25/14
Mon 8/25/14
30
4.7
Deployment
1 day
Tue 8/26/14
Tue 8/26/14
31
5
Integration
7 days
Mon 9/1/14
26. Tue 9/4/14
Teams A and B
5.1
Design
1 day
Mon 9/1/14
Mon 9/1/14
28
5.2
Test
1 day
Tue 9/2/14
Tue 9/2/14
29
5.3
Acceptance
1 day
Wed 9/3/14
Wed 9/3/14
30
5.4
Deployment
1 day
Thu 9/4/14
Thu 9/4/14
31
6
Close
1 day
Fri 9/5/14
Fri 9/5/14
27. 6.2 Gantt Chart
6.3 Network Diagram
7. Risk Analysis7.1 Risk Assessment
7.2 Mitigation Strategy
References
Bittner, K., & Spence, I. (2006). Managing Iterative Software
Development Projects. Boston, MA: Addison-Wesley
Professional.
Boyles, J., Smith, A., & Madden, M. (2012). Privacy and Data
Management on Mobile Devices. Retrieved July 21, 2014, from
Pew Research: http://www.pewinternet.org/2012/09/05/main-
findings-7/
Caviglione, L., Coccoli, M., & Merlo, A. (2013). Social
Network Engineering for Secure Web Data and Services. IGI
Global.
Davis, A. (2013). Just Enough Requirements Management:
Where Software Development Meets Marketing. New York, NY:
Addison-Wesley Professional.
Duval, P. (2007). Continuous Integration: Improving Software
Quality and Reducing Risk. Boston, MA: Pearson Education,
Inc. .
Helal, S., & Bose, R. (2012). Mobile Platforms and
Development Environments. Morgan & Claypool Publishers.
Microsoft. (2014). Meetings (Agile). Retrieved July 27, 2014,
from MSDN: http://msdn.microsoft.com/en-
us/library/dd997582(v=vs.100).aspx
Perry, W. (2006). Effective Methods for Software Testing
28. (Third ed.). Indianapolis, IN: John Wiley & Sons.
Seilevel. (n.d.). Tools for Requirements Gathering Sessions.
Retrieved November 20, 2013, from http://www.seilevel.com:
http://www.seilevel.com/wp-
content/uploads/RequirementsGatheringTools.pdf
Start Date Initial Pilot Sprint Radio Sprint Paid Subscription
Sprint Social Media Sprint Integration Project Close
8/12/14 8/12/14 8/26/14 8/26/14 9/4/14 9/6/14
8/4/14 8/4/14 8/18/14 8/18/14 9/1/14 9/5/14
41855 41855 41869 41869 41883 41887
Duration 9 9 9 9 4 1
User
Interface Layer
Media Layer
Core Services
OS/Kernel Layer
Music App
Music Service Infrastructure
Data Sync
Data Cache
29. User
Interfa ce Layer
Media Layer
Core Services
OS/Kernel Layer
Music App
Music Service Infrastructure
Data Sync
Data Cache
HU1440: Week 7 Essay
Page 1
Visual Argument
Create a visual argument for a public service announcement of
your choice. Here are some ideas that
you can use for public service announcements:
1. Should prisoners be released due to lack of funding?
2. Should libraries shut down due to lack of funding?
3. Should soldiers be pulled out of Iraq and Afghanistan?
4. Should music and art programs be the first to be taken out of
schools to cut costs?
5. Should the E-reader replace traditional texts in schools?
You may create this argument in a number of ways, such as by
30. using Microsoft PowerPoint or Adobe
Photoshop. You can also create your own poster, scan it, and
submit it. Remember to properly cite all
the references and information such as web images that you
have borrowed for your document.
Answer the following questions after creating the visual
argument:
1. How have you made the visual argument immediate and
tangible? How does this visual argument
pull you into the picture?
2. What common ground is established with the viewer through
shared values and points of view?
What emotional response is evoked from your image?
3. What is the importance of the placement of objects, people,
and actions in your visual argument?
4. Did you use any icons or symbols to prompt response from
your viewers? If so, which icons did
you use, and what response did you hope to evoke?
5. What audience do you imagine your visual argument to be
directed at and why?
6. What are the claims of your visual argument, and what
supporting evidence is given to support
those claims?
31. Submission requirements:
You may create this argument in a number of ways, such as by
using PowerPoint or Adobe
Photoshop. You can also create your own poster, scan it, and
submit it. Submit your response to all
the questions in a minimum of 50 words per question in a Word
document.
Font: Arial, 12 point, double-spaced
File name: InitialName_FirstName_Essay7.1_Date