*1ST Assignment:
Real World Inception Introduction Identify an opportunity you perceive from your work life for new or improved software to be developed. Recall from your reading on the Rational Unified Process Framework (RUP) that the Inception Phase is when the scope and goals of a software product are identified and articulated. So, essentially this assignment calls upon you to perceive a problem or need and to begin to articulate a solution to that problem. For this assignment, it will be necessary for you to provide appropriate background and explanation of both your work environment and of the problem and the solution you have identified.
For this assignment specifically, it is especially important for you to consider both the instructor and your classmates as the audience for your answer. Keep in mind that we may have widely diverse work experiences. After providing appropriate background, context and explanation, you are to focus on the following points for the RUP Inception Phase, as presented in Chapter 4 of the Essentials of Software Engineering text.
1st ASSIGNMENT: Inception Phase: Inception is a planning phase that includes the following primary objectives: (Do these things on a word document) -Establish the scope and clarify the goals of the software project. -Establish the critical use cases and the major scenarios that will drive the architecture and design. -Establish some architecture and early design alternatives. -Estimate the schedule and required resources. -Plan the implementation, testing, integration, and configuration methodologies. -Estimate the potential risks. Although you may find some aspects of this difficult to do, you are to do your best to apply your understanding of these objectives to the opportunity you have identified for this assignment.
**2ND ASSIGNMENT: (PICTURES INCLUDED OF ASSIGNMENT, SEE ATTACHED) Chapter 7: Consider the depiction of a “chunk of memory" given to the left.
Exercise Question 2. Consider the following data that describes the “adjacency” of the states in the Northeast. Two states are considered adjacent if they share a common border.
(SEE ATTACHED) CT: NY, MA, RI DE: MD, PA, NJ MA: RI, CT, NY, NH, VT MD: VA, WV, PA, DE ME: NH NH: VT, ME, MA NJ: DE, PA, NY NY: NJ, PA, VT, MA, CT PA: NY, NJ, DE, MD RI: CT, MA VT: NY, NH, MA For example, note that Pennsylvania is adjacent to New York, New Jersey, Delaware and Maryland.
Pennsylvania is also adjacent to Ohio and West Virginia, but these facts are not represented in this data. First, depict this data as a graph drawing consisting of nodes (one for each state, and labeled with the state abbreviation) and arcs that represent the adjacencies reflected in the data. Second, complete the depiction of the “chunk of memory” showing how this graph could be represented and stored using the “linking scheme” presented in Chapter 7. Although there are multiple correct answers to this part of the question, for the sake of having some continuity you are to anchor the graph at address 125 using the node for PA. Exercise Question 2a.
Note that a complete set of data, showing the adjacencies of all of the states in the union plus the District of Columbia, may be found online at: https://writeonly.wordpress.com/2009/03/20/adjacency-list-of-states-of-the-united-states-us/.
For this question, you are to analyze the storage needs for this complete set of data (using the linking scheme) and determine the precise total number of memory cells needed to represent it. (This is what you are doing)
Additional Questions: Since a tree is a graph that has certain properties (i.e. a tree is a connected acyclic graph), it is the case that trees can then be readily represented the same way as graphs.
An interesting and important special type of tree, known as a binary tree, is one in which no node has more than two children. Although a binary tree may be represented the same way as a tree (and thus also the same way as a graph), the specializations present in binary trees may be exploited to gain some efficiency.
Consider the following depiction of a chunk of memory and the corresponding binary tree it represents. Here a different representation scheme that uses “indexing” is employed. Binary Tree In the indexing scheme used here the tree’s representation is anchored at memory address 1. In this scheme, the left child of every node is represented in memory at the address of the parent node multiplied by 2, and the right child is represented in the address immediately following the left child. Thus, node B is stored in memory at 1 and its left child, G, is at 2 and its right child E is at 3. Similarly, node F is stored in memory at 5 and its children are represented at 10 and 11 respectively. Note that nodes that do not exist, such as the left child of E and its descendants still consume space in the representation.
This indexing scheme that maps the nodes in a rooted binary tree to the positive integers as described above provides a straightforward and reasonably efficient representation for most binary trees. The best case is when the tree is “complete” meaning that every node at every level, except the lowest level, has two children and all nodes at the lowest level are as far left as possible. Binary Tree 2 (SEE ATTACHED) Of course, binary trees with certain structures may result in inefficient uses of memory. Consider this binary tree. Binary Tree 3 (SEE ATTACHED) For each of the three binary trees presented here determine the precise number of memory cells needed to store the representations of the tree in both of the representation schemes given (i.e. the one given for graphs in Chapter 7 and the specialized one for binary trees.) Please do this in a word document 3RD ASSIGNMENT***:
Week 6 Assignment: String Sorter Part 1 In this assignment, your goal will be to make modifications to a set of programs that all perform the same basic task. You will be provided a list of medications for patients on a hospital unit. The list is not sorted. In order to make the list as easy as possible for nurses to scan, you are to help write a program to sort these medications. In part 1 of this assignment, you will be presented with 2 complete programs: StringSorterV1.py and StringSorterV2.py. They both perform the same task, sorting a list of medications; however each approach is slightly different. Each of these performs the task specified in Section 1.1 and developed in Chapter 1 of the Essentials of Software Engineering text, and are further illustrated in the Python for Chapter 1 document. (String_Sorter.zip is provided in the attachments section)
Testing the Programs You are to first test the operation of each of these modules with the provided lists of medications to familiarize yourself with them, and to convince yourself that they work. If you discover that one or more of these implementations does not work correctly then you are to prepare a document in which you illustrate (through screen shots) and explain representative cases that fail. Modifying the Programs Next, you are to modify each of these implementations (V1 and V2) so that blank lines in the input are ignored in the result. Please do not change the name of the methods, but do rename your modified files by appending an ‘R’ to each filename; thus StringSorterV1.py becomes StringSorterV1R.py, etc. Along with submitting these two Python source code files, you are to prepare and submit a single document in which you illustrate (through screenshots) the execution of your revised implementations, with accompanying narrative explanations as appropriate.
CS 340 Milestone One Guidelines and Rubric Overview: For this assignment, you will implement the fundamental operations of create, read, update,
Retail Transaction Programming Project Project Requirements: Develop a program to emulate a purchase transaction at a retail store. This
7COM1028 Secure Systems Programming Referral Coursework: Secure
Create a GUI program that:Accepts the following from a user:Item NameItem QuantityItem PriceAllows the user to create a file to store the sales receip
CS 340 Final Project Guidelines and Rubric Overview The final project will encompass developing a web service using a software stack and impleme