Edudorm Facebook

Questions and Topics We Can Help You To Answer:
Paper Instructions:

3.4.4.1 Your Task: For this assignment you are required to develop a programmatic solution, using the Java programming language, to a specific problem as detailed below. You will be required to demonstrate the completed work to your tutor in order to receive a mark. During this demonstration your tutor will examine your solution and also ask questions about how the work was undertaken, and any difficulties that you had. Any awarded mark is for the demonstration and explanation of the work, rather than for the submitted work itself. 3.4.4.2 The Problem: The overall aim of this assignment is to implement a Free Drawing and Click-based Graphics tool. This must be built as a graphical application using the Java Swing and/or AWT classes. The software will allow users to click around a virtual canvas area causing a specific shape to be drawn with specific parameters, ex. a rectangle with width and height. The user must enter the parameters (height and width) or should be able to specify these by clicking and dragging the mouse. The application will allow the user to draw freely on the canvas using the mouse as a pen. The shapes vary between regular a 2d shapes (circle, pentagon, hexagon, octagon) and 3d shapes (Cuboid, Cube, Sphere etc.). The 3d shapes can be drawn using a collection of 2d shapes, (ex, a cuboid is a set of rectangles, please note that these should be made ready for the user, i.e. it is your task as a programmer to put these shapes together to make a cuboid). The final product should be a fully working application which includes a typical application window (with the canvas), containing a menu bar. The application must have and command textbox for typing a drawing commands with dimensions along with three text boxes (to specify the shapes dimensions, we will refer to these as the dimension textboxes) these will be used with the mouse drawing activities and not with the command drawing activities. The layout is left to the student to decide but it should make the application easy to use and appealing. As well as implementing a programmatic solution to the defined requirements, you are required to submit a graphical representation of your final solution as a Unified Modelling Language (UML) class model. The class model should show all classes used in your solution, along with all attributes and methods which you have written. Although classes used from 2017/18 Module Handbook 12 the Swing library should be shown there is no need to display their attributes and methods. You will be provided with a starter project, representing the skeleton of the full-fledge project, which you can build on to develop the full-fledged project. The starter project contains some of the main objects declaration and their functions prototypes. Part of the implementations will be covered during the online sessions, while the rest of the implementation details will be left for the student. Attending and actively participating in the sessions should help in this task since most of the needed functionalities will be covered throughout the module lectures and the assignment is linked with the lectures. 3.4.4.3 Requirement 1: The first requirement is to develop a simple GUI which contains an outer window (frame), a canvas drawing area, a console type text input area (to draw using commands input in the text box), a menu bar and a set of three text box to provide the shape’s parameters if necessary. The menu bar should contain at least a ‘File’ and a ‘Help’ menu. The ‘File’ menu should contain the options “New”, “Load”, “Save” and “Exit”. The ‘Help’ menu should contain an “About” option. The application window should be resizable by the user. For this first requirement the menu options should simply act as stubs, later requirements will provide the actual functionality. When selected each option should pop–up a dialogue saying that the option has been selected. 3.4.4.4 Requirement 2: The second requirement is to implement some basic functionality to allow drawing. The users should be able to either type some specific commands to draw on the canvas or to click a set of buttons within the app area in order to draw on the canvas. The “New” menu option should cause the canvas to be cleared. The commands that the user can input in order to draw a shape are very explicit and MUST match those shown in the following table. Commands for drawing Desсrіption Pen-up Lifts the mouse pen, so that typed commands (and free mouse dragging movement) do not draw anything on the canvas. 2017/18 Module Handbook 13 Pend-own Sets the mouse pen on, so that typed commands (and free mouse dragging movement) draws on the canvas. rectangle, circle, square, pentagon Draws the respective 2d shape (ex if the user type square 2 1 then a square of 2x1 cm2 is drawn) cube, cuboid, sphere Draws the respective 3d shape (ex if the user type cuboid 2 1 2 then a cuboid of 2x1x1 cm3 is drawn) Reset Resets the canvas to its initial state, i.e. clear the canvas. The mouse functionality that the user can utilise is shown in the following table Buttons and Click combination Desсrіption Drag with shift Straight line is drawn. 2D Shape click (rectangle, circle, square, pentagon) Draws a specific 2D shape (ex if the user clicks on a rectangle menu then a rectangle with whatever dimensions in the dimension text boxes is drawn) 3D Shape click (cube, cuboid, sphere) Draws a specific 3D shape (cube, cuboid, sphere, etc.) Parameters Panel Provides extra information for the current shape to be drawn. For example, the circle diameter, the side length, the degrees etc. The parameter list should be changed during run time. The application should check and report any invalid parameter, for example, typing a text instead a numeric value. Colour Panel Sets the output pen colour to whatever colour is selected. Reset Resets the canvas to its initial state, i.e. clear the canvas. 3.4.4.5 Requirement 3: The main aim of requirement three is to implement the remaining menu options. The “Load” and “Save” should allow the user to select a file name via a dialogue box. The current image should then be either loaded or saved to a file. If the user attempts to load a new image without the current one been saved first then a warning dialogue should be shown to the user, which should provide the opportunity for the current image to be saved first. The “Exit” 2017/18 Module Handbook 14 and “About” menu options should also be completed. During exit a similar check should be made to see whether the user is attempting to exit without saving changes. 3.4.4.6 Requirement 4: The final requirement is to add some more advanced features to the application. This gives you a chance to extend your solution in a variety of ways. Several suggestions for features are stated below, however you are also free to add (sensible) functionality of your own which is not described here. You should aim to add at least Five additional features. The number of features, along with their complexity, will be used to determine the marks awarded. Additional features to consider: ▪ Use of graphical toolbar for common operations. ▪ Use of icons within the menus. ▪ Use of short-cuts for operation selection. ▪ Use of a status bar to show information such as whether the current image has been saved etc. ▪ Straight line rotated in the direction of the mouse drag (Drag with ctl.). ▪ Ability to print the image. ▪ Additional combination of readymade shapes that draw a skeleton for a cartoon object ex. “face”, “body” etc. 3.4.5 MARKING SCHEME / CRITERIA Each requirement you provide will contribute between 15 to 30 marks towards the final grade, a maximum of 75 marks are achievable for this assignment. A maximum mark for a requirement will only be awarded if it fully complies with the requirement, and you are able to discuss your solution with the tutor in a knowledgeable way. Specifically, each requirement will be judged as follows – Mark Criteria 0-39% The code submitted is a very limited implementation of the requirement, or the student is incapable of discussing the submitted work in any real detail. 40%-59% A program is submitted which provides a partially working, but incomplete, implementation of the requirement. The student is capable of explaining the submitted code. 2017/18 Module Handbook 15 60%-69% A program is submitted which provides a mostly working, with slight deficiency of the implementation of the requirement. The student is capable of explaining the submitted code. 70%-100% A commented program is submitted which can be fully explained by the student and fully implements the defined requirement.

1490 Words  5 Pages

Questions and Topics We Can Help You To Answer:
Paper Instructions:

Compose a brief synopsis compiling what you have learned about the Linux File System. Describe how you will use this knowledge to create Linux (Unix) based system in the future, whether at home or at your job.
At least four paragraphs in length (not counting the title page), include a title page, double spaced, and font size of 10 or 12.

72 Words  1 Pages

Questions and Topics We Can Help You To Answer:
Paper Instructions:

I need to write a short essay describing maximum power point tracking. It can be between 13 to 20 pages and is mainly focused on the algorithms on power point tracking, but you can also write something else if you want as long as it has to do with mppt.

61 Words  1 Pages

152 Words  1 Pages

232 Words  1 Pages

Questions and Topics We Can Help You To Answer:
Paper Instructions:

Leadership Update: Cyber Crime 

Must post first. 
The senior leadership of your organization is preparing for its annual three day meeting. During these meetings, one day is devoted to current events / issues which the company finds itself needing to address. For this year's meeting, you have been asked to give a presentation on Cybercrime as a strategic threat to the organization.
To prepare for your presentation, you should find a recent news report or law enforcement press release about a specific instance of a cybercrime which impacted the financial services industry (or customers). Analyze the report / press release and then write a background paper containing your analysis and findings.
In your background paper, include a summary of the report or press release that addresses the crime, the perpetrator, motive (if known), methods, the victim(s), the object of the crime (systems, data, networks, etc.), and the outcome of the investigation / prosecution.  (Who did what to whom? What happened?)
Should the company take actions or develop strategies to protect itself from similar crimes? What are your recommendations in this regard?

have Introduction and transition header plus summary.

200 Words  1 Pages

Questions and Topics We Can Help You To Answer:
Paper Instructions:

Describing the historical approaches and techniques hackers use to gain access, privileges, and control of information systems.

28 Words  1 Pages

Questions and Topics We Can Help You To Answer:
Paper Instructions:

For the Final Project, you are asked to write an eight-to ten-page research report (typed, double-spaced) in which you describe a company of your choice, the nature of its business, a specific product or service, and how that product or service is produced and distributed by the company and then recommend the information technology system you think should be in place and why. Address the following questions in narrative form (according to APA style). Be sure to provide examples and supporting rationale throughout the paper.

Company Background and Information Systems

What is the name, nature of business, and specific products or services of your chosen organization?
How are the products or services produced and distributed by the company?
Why are information systems essential in managing the organization’s business?
Describe the existing information systems supporting the major business functions of the organization (e.g., sales and marketing, manufacturing and production, accounting, human resources, etc.)
Information Technology Recommendation

What is your recommendation for the information technology systems you think should be in place and why? Your recommendation should include the following:
Information needs:
What types of decisions do users need to make by accessing the information systems?
What are the different levels of information groups?
Need for system automation
Benefits of the proposed system (savings, quality improvements, faster processing, etc.)
Types of database data elements (data, images, photographs, sound, video, etc.)
Networking and interactive processing
Centralization versus decentralization
End-user computing needs
Your recommendation to develop or acquire the system software
Potential Security Threats

Describe the various threats and security threats to the proposed information system. What security controls are required to address the threats?
Social, Political, and Diversity Impacts

Summarize the social and political issues raised by the proposed information system.
Discuss the impact of diversity to the development and management of the proposed information system.
Conclusion

References

The Final Project – IT System Recommendation

Must be eight to ten double-spaced pages in length (not including title and references pages) and formatted according to APA style as outlined in the Ashford Writing Center (Links to an external site.).
Must include a separate title page with the following:
Title of paper
Student’s name
Course name and number
Instructor’s name
Date submitted
Must use at least three scholarly sources in addition to the course text.
The Scholarly, Peer Reviewed, and Other Credible Sources (Links to an external site.) table offers additional guidance on appropriate source types. If you have questions about whether a specific source is appropriate for this assignment, please contact your instructor. Your instructor has the final say about the appropriateness of a specific source for a particular assignment.
Must document all sources in APA style as outlined in the Ashford Writing Center.
Must include a separate references page that is formatted according to APA style as outlined in the Ashford Writing Center.

487 Words  1 Pages

Questions and Topics We Can Help You To Answer:
Paper Instructions:

The human resources department is updating its HIPAA Basic Training for Privacy and Security course. 
HIPAA Basic Training for Privacy and Security Course Topics
What is HIPAA?    HIPAA Privacy Rule    HIPAA Security Rule
Why HIPAA is Important    Safeguarding of PII and PHI and ePHI     Disclosures of PII and PHI and ePHI
HIPAA, PII, PHI, and ePHI Definitions    BA Agreements    Potential Violations
Patients´ Rights    Breach Notifications    Reporting Procedures
Vendors and Contractors     Policy Enforcement    Sanctions for Privacy and  
Information Security Violations
As a security analyst for the hospital, you have been tasked with covering the topics in the training related to the HIPAA security rule and the information that hospital staff need to know regarding personally identifiable information (PII), personal health information (PHI), and electronic personal health information (ePHI) to comply with federal regulations.  

The deliverable for this assignment is a narrated PowerPoint presentation that provides definitions of HIPAA, PII, PHI, and ePHI, and describes the security measures required for compliance. 

Your narrated presentation should contain one to two slides for each of the following topics:

HIPAA Security Rule 
HIPAA, PII, PHI, and ePHI Definitions
Safeguarding of PII, PHI, and ePHI 
Disclosures of PII, PHI, and ePHI

The human resource department is updating its HIPAA Basic Training for Privacy and Security course. As a security analyst for the hospital, you have been tasked with covering the topics in the training related to the HIPAA security rule and the information that hospital staff need to know regarding personally identifiable information (PII), personal health information (PHI), and electronic personal health information (ePHI) to comply with federal regulations.

This week, you will submit your presentation. The presentation should include voice overlays as narrative for each slide. Include one to two slides explaining the following:

HIPAA Security Rule
HIPAA, PII, PHI, and ePHI Definitions
Safeguarding of PII, PHI, and ePHI
Disclosures of PII, PHI, and ePHI
You may want to refer to the HIPAA Learning Resources from last week.

How Will My Work Be Evaluated?

In this training guide, you will demonstrate how to integrate your IT skills in an organizational setting. You’ll be combining your technical skills with effective communication techniques to provide learning resources for the client/customer.

You will not be evaluated on the voice recording quality.

The following evaluation criteria aligned to the competencies will be used to grade your assignment:

1.2.2: Employ a format, style, and tone appropriate to the audience, context, and goal.
1.3.3: Integrate appropriate credible sources to illustrate and validate ideas.
1.4.2: Use vocabulary appropriate for the discipline, genre, and intended audience.
2.3.3: Explain inferences and deductions that follow logically from the evidence provided.
12.1.3: Communicate policies, processes, and/or procedures to stakeholders.
12.3.1: Select controls.
12.3.2: Describe the implementation of controls.
12.3.3: Explain how to assess controls.
12.9.1: Describe organizational compliance with government legislation that impacts technology.
12.9.2: Explain organizational compliance with industry regulations.

506 Words  1 Pages

Questions and Topics We Can Help You To Answer:
Paper Instructions:

Choose an industry that has undergone tumultuous change due to digitization. What were the effects of moving to the digital age? How has the industry changed to adapt? What steps can be taken to keep the industry competitive and profitable in the information age?

55 Words  1 Pages

Questions and Topics We Can Help You To Answer:
Paper Instructions:

critically discuss cultural, psychological and emotional impacts of using ICT to teach History to learners from disadvantaged and minority communities in South Africa

34 Words  1 Pages

Questions and Topics We Can Help You To Answer:
Paper Instructions:

Of the five primary components of an information system (hardware, software, data, people, process), which do you think is the most important to the success of a business organization?


Part A - Define each primary component of the information system.

Part B - Include your perspective on why your selection is most important.

Part C - Provide an example from your personal experience to support your answer.


Length/Formatting Instructions
Length    4 pages, double spaced, 1" margins
Font    12 point, Calibri Font
Program/File Type    Submit in Word
Referencing system    APA referencing system is necessary in assignments, especially material copied from the Internet.

112 Words  1 Pages

Questions and Topics We Can Help You To Answer:
Paper Instructions:

You are the Senior Manager of a large company who has been developing information systems
over a number of years in response to business demands. In the last Board Meeting, you were
chosen to determine whether your company should develop an information systems and
information technology strategy in order to address the long term objectives of the organisation.
Please consider a fictitious scenario.

The Board has a few concerns:
· What information systems and information technology are essential for the efficiency of
the key functional areas of the organisation? Discuss on the key functional areas in this
particular scenario.
· Who are the main stakeholders, both internal and external to the organisation?
· Are there other technical issues that need to be considered?

Submit a report of not less than 2500 words to the Board evaluating the case for developing
a strategy for information systems and information technology for your company.
The report must be fully referenced and contain a bibliography in Harvard referencing style. Marks
may be deducted for poorly-presented scripts and awarded for well-presented diagrams, layout to
report style and well referenced points in the body of the text.
The scenario is open. However, you will have to justify your assumptions and choices

216 Words  1 Pages
Get in Touch

If you have any questions or suggestions, please feel free to inform us and we will gladly take care of it.

Email us at support@edudorm.com Discounts

LOGIN
Busy loading action
  Working. Please Wait...