الخميس، 28 مارس 2013

حل الواجب b120 المدرس 00966544321455 // 0544321455 // a_al_shora@hotmail.com


 

B120 TMA Spring 2013
The Four Seasons Corporation
The Four Seasons Corporation is a new firm to the market that is established recently. Since the garment industry is growing in a pace rate worldwide, the company decided initially to focus on this industry. The total available capital of the company is $350,000. The company owes no assets at this stage. As a distinguished graduate from AOU the company decided to appoint you as a consultant. Your main task is preparing a feasibility study to aid the company to make the final decision of its intended business. The following inquiries are the underlying bases for the feasibility study:

1.      What market segment will the company be targeting? Why?
2.      Which is more appropriate type of business: garment production or retailer? Why?
3.      Does the company extends its operation regionally or keep it locally? Why?
4.      What type of assets is required?
5.      What promotion will be used to get maximum effect?
6.      Conduct a SWOT analysis for the company.
7.      Prepare the forecasted income statement for the first fiscal year showing profit/losses of the company.
8.      As a consultant, what is your final conclusion and recommendation? Why?
  

حل واجب t306a مدرس 0544321455 - 00966544321455 // a_al_shora@hotmail.com




T306A TMA- Spring 2013

NBK leveraged Microsoft's Team Foundation Server to simplify and automate the software development cycle for the bank
Questions:

1.      Critique the relevance and suitability of hard or soft approach in highlighting issues faced by NBK. (20% marks)

2.      Apply the Soft Systems Method to this NBK’s Situation case, including rich picture and conceptual mapping in order to brainstorm, analyse and make suitable recommendations. Provide a detailed narrative explaining your thinking process. (60% marks)

3.      Investigate further suitable approaches and tools that could be used to investigate, illustrate and make recommendation to solving problems. Please consult all your course materials and undertake relevant literature search. (20% marks)

حل واجب t215a مدرس 0544321455 - 00966544321455 - a_al_shora@hotmail.com


T215A: Communication and information technologies (I)
Question 1 (Solved in a Group):
Read the article described as “Reading 6” entitled “The intellectual challenge of CSCW” which is attached to this TMA, and answer the following questions:
1)      In no more than 300 words, discuss the idea “social-technical gap” presented in the paper by the author.
2)      In no more than 200 words, discuss the idea that “computational entities such as information transfer, roles, and policies need to be flexible nuanced, and contextualized similar to human activity”.
3)      Briefly explain CSCW role in finding ways to manage the problems and trade-offs resulting from conflict and coordination.
4)   Using your own words, summarize TWO of the CSCW findings discussed in the paper.
Question 2 (Solved in a Group):
Imagine that you work for an ICT consultancy company. Your company sends out a short report about a different technology each year. The purpose of these reports is to help the mid-level technicians  to keep abreast of some technical concepts and terms. This year your company’s Chief Executive Officer (CEO) has decided that the short report will be about High-speed packet access (HSPA), and you have been asked to write it.

brief include:
·        What is HSPA?
·        Some technical details about HSPA.
·        HSPA advantages and shortages, if any.
Question 3 (To be Solved Individually):
1)      Discuss and elaborate your own and individual contribution in solving “Question 1” of this TMA.
2)      Discuss and elaborate your own and individual contribution in solving “Question 2” of this TMA.
Question 4 (To be Solved Individually):
Search for the following article from the web:
“Robert W. Lucky, "Are Social Technologies Really Invented?", IEEE Spectrum, May 2011.”
Then write a summary discussing  the article’s main idea. This summary aims to explain the general, yet important idea of social technologies to intermediate level reader. It must cover the most important aspects of the topic from the author perspective.

حل واجب tt284 المدرس 0544321455 - 00966544321455 - اميل a_al_shora@hotmail.com


TT284 Web Technologies

TMA01 TT284
Question 1: [4 Marks]
Assume that the user is visiting a website with an average data transmission rate of 512 (Kbps); consider the request for a single webpage comprising 8000 bytes of text (including HTML tags), and a CSS file containing 3000 bytes, along with three images at an average size of 4000 bytes, and a single image for the banner at a size of 11000 bytes. Assume that it takes the server 9 millisecond to respond to each file request.

Note: the single image for the banner is stored in the browser’s cache.

Calculate the total time required to download all these files.

Question 2: [4 Marks]

 Distinguish between thin and thick clients in terms of differences and advantages of each.

Question 3: [6 Marks]
Create a home page for the AOU University, the home page should include:
1. Title
2. Sub menus of the 7 branches
3. Image (choose a proper image for your branch)
4. Short introduction about AOU.

You need to submit the following:
1-     An initial stitch of the web page using The Pencil Environment Application  (2 marks)
2-     The required XHTML code including the needed CSS code where it is a must to adapt Alternative web accessibility initiative ( use ‘alt’ and ‘longdesc’ attributes)    (4 Marks)

Question 4: [6 Marks]
 What are the challenges of producing websites for mobile devices based on their screen sizes? What is the difference between screen size and pixel size? Calculate is the resolution in pixels per inch for the I-phone 5 based on the information in the below image?    ( 6 Marks)


حل واجب m359 للمدرس 0544321455 - 00966544321455 // ايميل a_al_shora@hotmail.com


M359 Relational databases: theory and practice
TMA Spring 2013

Question 1
This question covers Sections 1 and 2 of Block 1. It assesses your understanding of various concepts covered in those sections and your ability to relate those concepts together.

Data quality issues are described in section 2.3 of Block 1. Briefly explain the problems could you face if each of the quality issues are not met in your SIS page.

Briefly describe the term “Geographic Information System (GIS)”. Also provide two uses of GIS.
Describe the importance of data warehousing and data mining in business organizations.
                                                              


Question 2:

AOU is planning to create a conference management system to keep
information about the conferences such as papers presented in the
conference, d ate of conference, location etc. The conferences are cond ucted
in any of the seven branches. One branch may conduct several
conferences. Each conference is id entified by a conference ID. Other
d etails to be stored are name, field, year, start date, end d ate and the
branch name cond ucting the conference. The branch d etails to be stored
are the organizing d epartment, contact person, conference location, email
add ress, and telephone number. The contact person could be the branch
director or the programme coord inator
A conference would receive lots of paper to be submitted to the
conference, but only selected number of these papers will be accepted.
Paper d etails are paper ID, title, author name, and number of pages. The
paper may have secondary authors. In ad d ition, each paper is given a type
(for example S: Survey, B: Brief, F: Full). A paper can be submitted in only
one conference and many papers may be submitted to the same
conference. Once a paper is submitted in a conference, the system send s a
message to the author acknowledging the paper submission.
If a paper is accepted , at least one author should attend the conference to
present the paper. The system needs to keep information about the author
who presented the paper in the conference. Each author is id entified by a
unique author ID, Also has a name, ad d ress, email ad dress, affiliation and
contact telephone number of this affiliation. An author can write one or
more research papers and a paper have one main author and one or more
secondary authors.

The system should also store the number of papers submitted and
accepted for each conference along with the paper ID, author ID,
conference date, number of attend ees and the conference location for
archiving purpose.
Give a conceptual data model (CDM) for this application using the Entity-
Relationship model, including the complete E-R diagram, the entity types
and any required constraints and assumptions. Give all degree and
participation conditions details.                        




AOU is planning to create a conference management system to keep information about the conferences such as papers presented in the conference, d ate of conference, location etc. The conferences are conducted in any of the seven branches. One branch may conduct several conferences. Each conference is identified by a conference ID. Other details to be stored are name, field, year, start date, end d ate and the branch name conducting the conference. The branch details to be stored are the organizing department, contact person, conference location, email address, and telephone number. The contact person could be the branch director or the programme coordinator
A conference would receive lots of paper to be submitted to the conference, but only selected number of these papers will be accepted. Paper details are paper ID, title, author name, and number of pages. The paper may have secondary authors. In addition, each paper is given a type (for example S: Survey, B: Brief, F: Full). A paper can be submitted in only one conference and many papers may be submitted to the same conference. Once a paper is submitted in a conference, the system sends a message to the author acknowledging the paper submission. If a paper is accepted , at least one author should attend the conference to present the paper. The system needs to keep information about the author who presented the paper in the conference. Each author is identified by a unique author ID, Also has a name, address, email ad dress, affiliation and contact telephone number of this affiliation. An author can write one or more research papers and a paper have one main author and one or more secondary authors.
The system should also store the number of papers submitted and accepted for each conference along with the paper ID, author ID, conference date, number of attendees and the conference location for archiving purpose.
Give a conceptual data model (CDM) for this application using the Entity-Relationship model, including the complete E-R diagram, the entity types and any required constraints and assumptions. Give all degree and participation conditions details.
Question 3
Give an E-R diagram and the simplest possible representative occurrence diagram for each of the following situations; State any assumptions you made.

Relationship between AOU-ITC student and their graduation project (T471).

Relationship between AOU-ITC tutors and graduation project (T471).

Relationship between External Examiner and ITC graduation project (T471) in AOU

Relationship between assessment (MTA, TMA and Final Exam) and graduation project (T471) in AOU


Question 4

Assume the following relation R is taken from AOU database
R(StudentID,DepartmentID,TutorID,CourseID,EnrollmentDate,StartDate, FinalExam)with the following FDs
StudentID, CourseID EnrollmentDate
DepartmentID TutorID
DepartmentID, EnrollmentDate StartDate
StudentID, StartDate FinalExam
1. What are the candidate keys of R?
2. Provide a BCNF lossless-join decomposition for R(StudentID,DepartmentID,TutorID,CourseID,EnrollmentDate,StartDate,FinalExam). Show your steps.




Question 5

Given the following relational schema for part of a University database
Tutor(TutorID, TutorName, Position, Salary)
Course(CourseCode, CourseDescription, Credit)
CourseOffered(CourseCode, Semester, TutorID)
Assumption:
Each course has only one tutor in each semester. All tutors have different salaries, all tutors have different names, all courses have different descriptions, and position can take values FROM “Full”, “Part”, and “LabAssistant”.

Display those tutors’ ID who is a tutor for ‘M359’ but not for ‘M257’.
Display those courses whose tutors are only Part Time tutors.
List all the course names for Prof.Mark in Spring 2012.
Display those courses that have been offered in all semesters.
Display the names of full time tutors of ‘M105’ course.

Question 6
Write SQL queries, and run them using iSQL against the University database. Include in your answer BOTH the SQL query you wrote and the output table that results. You MUST use meaningful column names, which may require using column aliases in the SQL query.


Write a SQL query to find the ids for all students who achieved the lowest mark on the assignment among all students in the course ‘C2’, along with the course code and the assignment mark.

Write a SQL query to find the number of students attended the exam for the courses c2 and c4, your result should include the course codes also.

List the course code, number of students registered in each course along with their tutor.

Write a SQL query to list the student ID, student name, email address whose email address is in ‘.com’ domain and registered for course with course code C4. Output should show the course code and the enrollment date.


حل واجب t325 مدرس خاص 0544321455 // 00966544321455 والايميل a_al_shora@hotmail.com


Question 1
« Supercapacitors » are challenging the dominance of lithium batteries as energy storage elements to power modern electronic gadgets (mobile phones, tablets, etc.)
Using the AOU e-library or any other Internet reliable resource, you are asked to prepare a short report about supercapacitors for portable devices.
You report should include the following information:
Introduction about supercapacitors how supercapacitors work
Advantages of supercapacitors compared to Lithium batteries
Difficulties to use of supercapacitors in portable devices
Question 2
Convolutional encoding is used in different communication technologies to detect and correct transmission errors. In a convolutional code, each m-bit information symbol to be encoded is transformed into an n-bit, where m/n is the code rate (n ≥ m) and the transformation is a function of the last k information bits, where k is the constraint length of the code. [1].


The figure above represents the internal structure of a convolutional encoder. This encoder has one input bit (I), three shift registers (R1, R2 and R3), three XOR gates (+ sign) and three outputs (O1, O2 and O3). The three registers are initialized to zero. Note that (A XOR B XOR C) = (A XOR B) XOR C.
a)      Based on the definitions mentioned above, what are the code rate and the constraint length of this convolutional encoder? Justify your answer
b)      Consider the following symbol: 10110 to be encoded using this convolutional encoder. What is the encoded symbol? The sequence of input bits starts with the most significant bit of the symbol (1) and ends with the least significant bit (0). You SHOULD detail your answer by drawing the detailed state of the encoder (the value of the three registers, inputs of XOR gates) for each input bit and the corresponding output bits. Providing the final answer only is not acceptable
c)      Express each of the three output bits (O1, O2 and O3) as a function of the input bit (I) and the value of three registers ((R1, R2 and R3)
d)      The trellis diagram is a way to represent the operation of the convolutional encoder. It has a number of levels that correspond to the different possible states of the encoder and the transition between the different states based on the input bit. The transition between two levels (states) is represented by an arrow going from one level to another level. The arrow is labeled with the input bit and the corresponding output bits (between parenthesis). Based on this definition, answer the following questions:
                                 i.            How many levels the trellis diagram of the convolutional encoder (illustrated in the figure above) has?
                               ii.            Draw the trellis diagram of the convolutional encoder. You can use the result of part c) to simplify the elaboration of this diagram.
Question 3
HDMI (High-Definition Multimedia Interface) is “the industry-leading technology and de-facto standard connecting high-definition (HD) equipment, from HDTVs and personal computers to cameras, camcorders, tablets, Blu-ray players, gaming consoles, smart phones, and just about any other device capable of sending or receiving an HD signal” [2].
The specifications of the HDMI evolved from version 1.0 (December 2002) to 2.0 (ongoing work – will be released in the first half 2013). In this question, you are asked to describe this evolution by indicating the difference improvements (maximum throughputs, color depth, etc.) between the different specifications.

Question 4
Many people consider Copyright laws (with the associated complexity and bureaucracy) as a limitation to creativity. This led to the emergence of a number of concepts that try to solve the copyright-laws issues while not discarding the concept of copyright. One of them is the “Share Alike” introduced by the Creative Common (CC) movement [3] (you have been introduced to the CC in Block 2 of T325).
Using AOU E-Library and/or any other Internet reliable resources, present
·        The objectives of this movement
·        The different license elements defined by the CC 
·        The possible licenses available.
Support your explanation by providing examples of Copyrighted material protected under each type of license.

M150 Data, computing and information مدرس 0544321455 ايميل a_al_shora@hotmail.com مهندس 00966544321455


M150 Data, computing and information

Question 1 [20 marks]
1. Write JavaScript program according to the following: [20]
a. Define a function called findMax which takes an array argument and returns the maximum number in the array.
b. Define two arrays of numbers:
  • The first array is initialized on declaration. It has 5 elements of your choice.
  • The second array has 6 elements and is initialized by values entered by the user (in a loop). Enter the values of your choice.
c. Call the function findMax to find the maximum number is the two arrays. Print the returned numbers in the output window. You need also to print the elements of both arrays.
d. Provide a screenshot of the output of your program. Make sure that the output includes the elements of both arrays and the maximum number in each one.

Question 2 [20 marks]
In unit9, page 21 you were introduced to the methods associated with Date object. In the same unit, section 4.2 you learned how to use functions from the "dateLibrary.js" in JavaScript programs. The specifications for all the functions in this library are in Appendix 1 at the end of unit 9.
Write JavaScript statements to do the following:
a. Create the date 7 June 2000 and assign it to the variable date1.
b. Create the date 18 May 2020 and assign it to the variable date2.
c. Calculate the difference in days and years between date1 and date2 and print them in the output window.
d. Change the month of date1 to be September and print the new value in the output window.
e. Change the year of date2 to be 2013 and print the new value in the output window.
f. Display the day name of date1.
g. Display date1 in short form.
h. Insert a snapshot that shows the resulted output of parts d, e, f and g.
i. Provide a copy of the specifications of all the functions you’ve used in writing your program.
j. What information do we find in function specifications?

Question 3 [20 marks]
You are required to model a new user-defined object type, Website.
The Website object type has the following properties:
name: a string variable representing the name of the website.
url: a string variable representing the address of the website.
description: a string variable holding a brief description of the website.
The Website object type has the following methods:
getName(): returns the name of the website.
getUrl(): returns the url of the website.
getDescription(): returns the description of the website.
display(): displays the name , url and description of the Website in an alert window. The method should use the methods getName(),getUrl() and getDescription().


a. Write the Website constructor function Website(aName,aUrl,aDescription).
b. Implement the methods getName(), getUrl(),
getDescription()and display() according to the above specifications.
c. Prompt the user for values of name, URL and description of a site he wants to create.
d. Create a Website instance and initialize its properties by the values entered by the user.
e. Use an appropriate method to print the Website instance information.
f. Run your program and test it to make sure it works properly. In your Solution document insert two screenshots: [3]
  • one showing the program prompting for the website name, with you having entered the name but not yet pressed OK;
  • one showing the resulted alert window.
g. Change the description of the Website instance.
h. Suggest another way to change the description of the Website instance other than what you've done in g. Show the changes needed in the program to implement it and give an example on how you are going to use it.

Question 4 [20 marks]
1. Discuss four features of a good website. [4 marks]
2. Many computer users think that the user interface through which they communicate with the computer is the system. What are the impacts of having a poor UI system in an organization? [3 marks]
3. The course book has given you the definition for the term usability. Illustrate it using your own words and understanding. [4 marks]
4. Login to the SIS using your user name and password. Write a short paragraph discussing the usability of the SIS, in your point of view. Do you think it is usable? Why? Why not? How can we improve it? Give suggestions. [9 marks]



                                

الخميس، 21 مارس 2013

Question 2: Explain the recruitment process which Audi use to recruit their staff across Audi supply chain


للحصول على حل الواجب ارسل رساله الى ايميل a_al_shora@hotmail.com او اتصل بنا على رقم 0544321455 -00966544321455

Supplementary material for M363: Software engineering with Objects Question One: Use the following description of a vending machine to answer the below questions: A vending machine sells small, packaged, ready to eat items (chocolate bars, cookies, candies, etc.). A customer can buy an item, using a smart card (issued by the vending machine company) to pay for it. The buying process involved: choose an item, pay for it, and take item. The system can be used by a customer, a maintenance employee (who check items, and recharges items in the machines), an administrator (who sets up the machine). a. Extract a functional requirement. b. Extract a pre-condition and nominate use case that has this pre-condition. c. Draw a use case diagram for vending machine system. Question Two Draw a class diagram of the below banking system. A bank have several branches; each branch has one ATM machine. The ATM machine has several accounts, Accounts could be: a chequing account or a savings account. Each bank has zero or more customers and each customer has 2 accounts: a chequing account and a savings account . The ATM is used by customers of a bank. Question Three: Use the diagram in figure 1 that represents airline reservation system to answer the below questions. a. What is the name of the diagram? b. List sequence of steps that represent airline reservation system as appeared in figure 1. c. Redraw the diagram to show the following extension. After selecting flight, the system gives you two different paths dependent on whether you are using reward points. If you use reward points then enter points and at the same time hold reservation. Then payment information is supplied.

حل واجب m363 : 0544321455 : 00966544321455

Question 4: Based on your understanding of the case, what you have learned from the textbook and probably from your own experience, describe the role of the Audi management that leads to a successful workplace.


للحصول على حل الواجب ارسل رساله الى ايميل a_al_shora@hotmail.com او اتصل بنا على رقم 0544321455 -00966544321455

Question 3: Analyze the steps that Audi undertakes to enhance retention and decrease the turnover


للحصول على حل الواجب ارسل رساله الى ايميل a_al_shora@hotmail.com او اتصل بنا على رقم 0544321455 -00966544321455

Question 1: Define “ Employee Development” concept with appropriate examples using


للحصول على حل الواجب ارسل رساله الى ايميل a_al_shora@hotmail.com او اتصل بنا على رقم 0544321455 -00966544321455

B121 TMA Spring Semester 2012 – 2013


Investing in People and in Brands

(An Audi UK case study)

Question 1: Define “ Employee Development” concept with appropriate examples using

external resources

Question 2: Explain the recruitment process which Audi use to recruit their staff across

Audi supply chain

Question 3: Analyze the steps that Audi undertakes to enhance retention and decrease

the turnover 

Question 4: Based on your understanding of the case, what you have learned from the

textbook and probably from your own experience, describe the role of the

Audi management that leads to a successful workplace.

للحصول على حل الواجب ارسل رساله الى ايميل a_al_shora@hotmail.com او اتصل بنا على رقم 0544321455 -00966544321455

حل واجب t215b حاليا 2013 - 0544321455 - 00966544321455 - ايميل a_al_shora@hotmail.com



T215B: Communication and information technologies (II)
Question 1 :
Read the article described as “Reading 3” entitled “UK Confidential, Introduction” available in Block 4 Document Book accompanied with the course material, and modified and attached to this TMA. Answer the following questions:
1) discuss the main idea of the article.
2) Define “Today’s Privacy” as seen by the article’s authors.
3) discuss the idea that “Technology is not the problem confronting our civil liberties, nor will it define the future of privacy”.
4) explain the following idea quoted from the article: “Personal information is attached to a market decision in most cases and is increasingly hidden from view”.
5) Explain how at both the domestic and the international level, there are strong justifications for a degree of surveillance.

Question 2 :
Imagine that you work for a security consultancy company. Your company has signed a contract to implement an encryption system for one of its clients.  The system relies on the idea of Quantum Cryptography, and you have been asked to write a general description about this system.

Your brief should include the following items:
What is Quantum Cryptography?
Some technical details about Quantum Cryptography.
Quantum Cryptography  advantages and shortages, if any.
The maximum permitted number of diagrams and/or tables is two.(4 Marks)
Question 3:
1) Discuss and elaborate your own and individual contribution in solving “Question 1” of this TMA.
2) Discuss and elaborate your own and individual contribution in solving “Question 2” of this TMA.
Question 4:

Write a summary discussing  the  latest developments of the two fingerprint sensors: Optical sensors and Solid-state sensors. This summary aims to explain the important idea of the two sensors to intermediate level reader.

حل واجب M105 - ايميل a_al_shora@hotmail.com رقم 0544321455 -00966544321455


Question One: [10 marks]
a. Write a Java class (program) that reads from the user the temperature in degrees Celsius as a real number. Then calculates and prints the equivalent temperature in degrees Fahrenheit (rounded to 1 decimal place). [9 marks]
b. Give the exact output of your program. Provide a snapshot representing the exact output of any value from your choice. [1 mark]
Hint:
Question Two: [20 marks]
a. Write a Java application that reads from the user three integers represent the lengths of three sides. Then checks if the three sides can form a triangle or not; and if they can, the application should also checks if the formed triangle is a right triangle or not. [17 marks]
b. Give the exact output of your application. Provide 3 snapshots representing the exact output of 3 different cases (i.e., the integers cannot form a triangle, can form a triangle but not a right one, or can form a right triangle). [3 marks]
Hints:
 Request from the user to enter the three sides from the shortest to the longest.
 Do not use the method Math.pow(). It will not give accurate results.
 Read about “the triangle inequality" in any algebraic geometry book, or search the internet in order to know when the lengths of three sides can form a triangle.
 Read about “the Pythagorean theorem" in any algebraic geometry book, or search the internet in order to know how to determine if a triangle is a right triangle or not.
Question Three: [15 marks]
a. The following code includes 10 errors (an error per line). Find these errors and classify them as a compilation error, a fatal logical error or a non-fatal logical error. [10 marks]
public class Q3_StudentID {
public static void main(String[] args) {
int x, y, my Num = 0;
double d = 10 + x; x = 3;
y = d + 2;
if (! x>5)
System.out.println('Result1 = ' + x);
Else
System.out.printIn("Result1 = " + y);
System.out.println("Result2 = %d" + myNum);
System.out.println("Result3 = " + x / myNum); myNum++;
System.out.printf("Result4 = %.0f\n" + d);
} // end main method
} // end Class Q3_StudentID
4
b. Rewrite the above code after correcting the errors. [1 mark]
c. Provide a snapshot representing the exact output after correcting the code. [1 mark]
d. Give the exact output of the following program. [3 marks]
import java.util.Scanner;
public class Q3_D {
public static void main(String[] args) {
int a = 4, b = 7, c;
System.out.println("Sum = " + a + b);
c = 5;
do {
System.out.printf("c = %-9d" , c);
if (c-- == 3)
break;
System.out.printf("OK\n" , c);
} while (c > 0);
double d = (c == 3) ? 1.5 : 2.5;
System.out.printf("d = %.2f\n", d);
double f = 6 + 3 / 2;
System.out.printf("f = %.2f\n", f);
if (a > b);
System.out.println("Done");
} // end main method
} // end class Q3_D
Question Four: [15 marks]
a. Giving the following triangle for the number 4: 4 3 2 1 4 3 2 4 3 4 Write a Java application that reads from the user a positive integer. Then displays on the screen a similar triangle which depends on that integer, using tabs to separate numbers in the same line. [13 marks]
b. Give the exact output of your application. Provide 2 snapshots representing the exact output of 2 different values. [2 marks]
5
Question Five: [30 marks]
a. Write a Java application that does the following: [28 marks]
 Reads an integer from the user represents the number of the students in a class.
 Reads the scores of the students from the user (the user should enter the scores in one line separated by spaces).
 Calculates and prints the average of the passed students (rounded to 2 decimal places).
 Calculates and prints the number of the students whose scores are more than the average of the passed students.
b. Give the exact output of your application. Provide 2 snapshots representing the exact output of 2 different inputs. [2 marks]
Hints:
 Assume that the scores of the students are integers between 0 and 100 (inclusive)
 Assume that there is at least one passed student in the class
 The student considered to be “passed” if his/her score is greater than or equal to 50.
Sample Input: Enter the number of the students in the class: 5 Enter the scores of the 5 students: 90 80 40 60 70
Sample Output: The average of the passed students is: 75.00 There are 2 students whose scores are more than the average of the passed students.
6
Question Six: [30 marks]
a. Write a Java method called distance that calculates the distance between 2 points in the xy coordinate system. The method takes 4 integers x1 , y1,x2 and y2 as arguments which represent the x and y coordinates of the 2 points, respectively. Then it calculates and returns the distance as a real number according to the following formula: [6 marks]

b. Include your method into a Java program that reads a sequence of inputs. Each input consists of 4 integers represent the x and y coordinates of 2 points in the xy coordinate system in the following order: x1 , y1,x2 then y2 The program invokes (calls) the method distance and prints the result for each input (rounded to 2 decimal places). The user could stop the program via entering the value 0 for all the coordinates. At the end, the program should prints the longest calculated distance (rounded to 2 decimal places). [23 marks]
c. Give the exact output of your program. Provide a snapshot representing the exact output of a sequence of at least 3 inputs before the user enters the value 0 for all the coordinates. [1 mark]
Sample Input and Output: To halt the program, enter 0 for all the coordinates The coordinates of any point should be separated by a single space ------------------------------------------------------------------ Enter the x and y coordinates of the first point: 1 1 Enter the x and y coordinates of the second point: 1 3 The distance between (1,1) and (1,3) is 2.00 Enter the x and y coordinates of the first point: 2 3 Enter the x and y coordinates of the second point: 6 7 The distance between (2,3) and (6,7) is 5.66 Enter the x and y coordinates of the first point: 0 0 Enter the x and y coordinates of the second point: 4 5 The distance between (0,0) and (4,5) is 6.40 Enter the x and y coordinates of the first point: 0 0 Enter the x and y coordinates of the second point: 0 0 ------------------------------------------------------------------ The longest calculated distance is: 6.40

6. Conduct a SWOT analysis for the company.

ايميل a_al_shora@hotmail.com رقم 0544321455 -00966544321455

7. Prepare the forecasted income statement for the first fiscal year showing profit/losses of the company.


ايميل a_al_shora@hotmail.com رقم 0544321455 -00966544321455

3. Does the company extends its operation regionally or keep it locally? Why?

حل الواجبات ايميل a_al_shora@hotmail.com رقم 0544321455 -00966544321455

2. Which is more appropriate type of business: garment production or retailer? Why?

حل الواجبات ايميل a_al_shora@hotmail.com رقم 0544321455 -00966544321455

1. What market segment will the company be targeting? Why?

حل الواجبات ايميل a_al_shora@hotmail.com رقم 0544321455 -00966544321455

Imagine that you work for a security consultancy company. Your company has signed a contract to implement an encryption system for one of its clients. The system relies on the idea of Quantum Cryptography, and you have been asked to write a general description about this system. • What is Quantum Cryptography? • Some technical details about Quantum Cryptography. • Quantum Cryptography advantages and shortages, if any.

حل الواجبات ايميل a_al_shora@hotmail.com رقم 0544321455 -00966544321455

5) Explain how at both the domestic and the international level, there are strong justifications for a degree of surveillance.

حل الواجبات ايميل a_al_shora@hotmail.com رقم 0544321455 -00966544321455

4) explain the following idea quoted from the article: “Personal information is attached to a market decision in most cases and is increasingly hidden from view”. .


1)      explain the following idea quoted from the article: “Personal information is attached to a market decision in most cases and is increasingly hidden from view”. .

3) discuss the idea that “Technology is not the problem confronting our civil liberties, nor will it define the future of privacy”.


حل الواجبات ايميل a_al_shora@hotmail.com رقم 0544321455 -00966544321455

2) Define “Today’s Privacy” as seen by the article’s authors.

حل الواجبات ايميل a_al_shora@hotmail.com رقم 0544321455 -00966544321455

Write a summary discussing the latest developments of the two fingerprint sensors: Optical sensors and Solid-state sensors. This summary aims to explain the important idea of the two sensors to intermediate level reader.

حل الواجبات ايميل a_al_shora@hotmail.com رقم 0544321455 -00966544321455

2) Discuss and elaborate your own and individual contribution in solving “Question 2” of this TMA.

حل الواجبات ايميل a_al_shora@hotmail.com رقم 0544321455 -00966544321455

1) Discuss and elaborate your own and individual contribution in solving “Question 1” of this TMA.


حل الواجبات ايميل a_al_shora@hotmail.com رقم 0544321455 -00966544321455

ايميل a_al_shora@hotmail.com رقم 0544321455 -00966544321455 Imagine that you work for a security consultancy company. Your company has signed a contract to implement an encryption system for one of its clients. The system relies on the idea of Quantum Cryptography, and you have been asked to write a general description about this system. • What is Quantum Cryptography? • Some technical details about Quantum Cryptography. • Quantum Cryptography advantages and shortages, if any. ايميل a_al_shora@hotmail.com رقم 0544321455 -00966544321455


ايميل a_al_shora@hotmail.com رقم 0544321455 -00966544321455 Imagine that you work for a security consultancy company. Your company has signed a contract to implement an encryption system for one of its clients.  The system relies on the idea of Quantum Cryptography, and you have been asked to write a general description about this system.
What is Quantum Cryptography?
Some technical details about Quantum Cryptography.
Quantum Cryptography  advantages and shortages, if any.
ايميل a_al_shora@hotmail.com رقم 0544321455 -00966544321455

Read the article described as “Reading 3” entitled “UK Confidential, Introduction” available in Block 4 Document Book accompanied with the course material, and modified and attached to this TMA.:ايميل a_al_shora@hotmail.com رقم 0544321455 -00966544321455 1) discuss the main idea of the article. ايميل a_al_shora@hotmail.com رقم 0544321455 -00966544321455 2) Define “Today’s Privacy” as seen by the article’s authors. ايميل a_al_shora@hotmail.com رقم 0544321455 -00966544321455 3) discuss the idea that “Technology is not the problem confronting our civil liberties, nor will it define the future of privacy”.ايميل a_al_shora@hotmail.com رقم 0544321455 -00966544321455 4) explain the following idea quoted from the article: “Personal information is attached to a market decision in most cases and is increasingly hidden from view”. ايميل a_al_shora@hotmail.com رقم 0544321455 -00966544321455 5) Explain how at both the domestic and the international level, there are strong justifications for a degree of surveillance.ايميل a_al_shora@hotmail.com رقم 0544321455 -00966544321455


Read the article described as “Reading 3” entitled “UK Confidential, Introduction” available in Block 4 Document Book accompanied with the course material, and modified and attached to this TMA.:ايميل a_al_shora@hotmail.com رقم 0544321455 -00966544321455
1) discuss the main idea of the article. ايميل a_al_shora@hotmail.com رقم 0544321455 -00966544321455
2) Define “Today’s Privacy” as seen by the article’s authors. ايميل a_al_shora@hotmail.com رقم 0544321455 -00966544321455
3) discuss the idea that “Technology is not the problem confronting our civil liberties, nor will it define the future of privacy”.ايميل a_al_shora@hotmail.com رقم 0544321455 -00966544321455
4) explain the following idea quoted from the article: “Personal information is attached to a market decision in most cases and is increasingly hidden from view”. ايميل a_al_shora@hotmail.com رقم 0544321455 -00966544321455
5) Explain how at both the domestic and the international level, there are strong justifications for a degree of surveillance.ايميل a_al_shora@hotmail.com رقم 0544321455 -00966544321455

ايميل a_al_shora@hotmail.com رقم 0544321455 -00966544321455 T215B: Communication and information technologies (II) Question 1 : ايميل a_al_shora@hotmail.com رقم 0544321455 -00966544321455 Read the article described as “Reading 3” entitled “UK Confidential, Introduction” available in Block 4 Document Book accompanied with the course material, and modified and attached to this TMA. ايميل a_al_shora@hotmail.com رقم 0544321455 -00966544321455 1) discuss the main idea of the article. 2) Define “Today’s Privacy” as seen by the article’s authors. 3) discuss the idea that “Technology is not the problem confronting our civil liberties, nor will it define the future of privacy”.ايميل a_al_shora@hotmail.com رقم 0544321455 -00966544321455 4) explain the following idea quoted from the article: “Personal information is attached to a market decision in most cases and is increasingly hidden from view”. .ايميل a_al_shora@hotmail.com رقم 0544321455 -00966544321455 5) Explain how at both the domestic and the international level, there are strong justifications for a degree of surveillance.ايميل a_al_shora@hotmail.com رقم 0544321455 -00966544321455 ايميل a_al_shora@hotmail.com رقم 0544321455 -00966544321455 Question 2 : Imagine that you work for a security consultancy company. Your company has signed a contract to implement an encryption system for one of its clients. The system relies on the idea of Quantum Cryptography, and you have been asked to write a general description about this system. • What is Quantum Cryptography?ايميل a_al_shora@hotmail.com رقم 0544321455 -00966544321455 • Some technical details about Quantum Cryptography.ايميل a_al_shora@hotmail.com رقم 0544321455 -00966544321455 • Quantum Cryptography advantages and shortages, if any. ايميل a_al_shora@hotmail.com رقم 0544321455 -00966544321455 ايميل a_al_shora@hotmail.com رقم 0544321455 -00966544321455 Question 3 : 1) Discuss and elaborate your own and individual contribution in solving “Question 1” of this TMA. ايميل a_al_shora@hotmail.com رقم 0544321455 -00966544321455 2) Discuss and elaborate your own and individual contribution in solving “Question 2” of this TMA. Question 4 : Write a summary discussing the latest developments of the two fingerprint sensors: Optical sensors and Solid-state sensors. This summary aims to explain the important idea of the two sensors to intermediate level reader. ايميل a_al_shora@hotmail.com رقم 0544321455 -00966544321455


ايميل a_al_shora@hotmail.com رقم 0544321455 -00966544321455
T215B: Communication and information technologies (II)
Question 1 : ايميل a_al_shora@hotmail.com رقم 0544321455 -00966544321455
Read the article described as “Reading 3” entitled “UK Confidential, Introduction” available in Block 4 Document Book accompanied with the course material, and modified and attached to this TMA. ايميل a_al_shora@hotmail.com رقم 0544321455 -00966544321455
1) discuss the main idea of the article.
2) Define “Today’s Privacy” as seen by the article’s authors.
3) discuss the idea that “Technology is not the problem confronting our civil liberties, nor will it define the future of privacy”.ايميل a_al_shora@hotmail.com رقم 0544321455 -00966544321455
4) explain the following idea quoted from the article: “Personal information is attached to a market decision in most cases and is increasingly hidden from view”. .ايميل a_al_shora@hotmail.com رقم 0544321455 -00966544321455
5) Explain how at both the domestic and the international level, there are strong justifications for a degree of surveillance.ايميل a_al_shora@hotmail.com رقم 0544321455 -00966544321455
ايميل a_al_shora@hotmail.com رقم 0544321455 -00966544321455
Question 2 :
Imagine that you work for a security consultancy company. Your company has signed a contract to implement an encryption system for one of its clients.  The system relies on the idea of Quantum Cryptography, and you have been asked to write a general description about this system.
What is Quantum Cryptography?ايميل a_al_shora@hotmail.com رقم 0544321455 -00966544321455
Some technical details about Quantum Cryptography.ايميل a_al_shora@hotmail.com رقم 0544321455 -00966544321455
Quantum Cryptography  advantages and shortages, if any. ايميل a_al_shora@hotmail.com رقم 0544321455 -00966544321455
ايميل a_al_shora@hotmail.com رقم 0544321455 -00966544321455
Question 3 :
1) Discuss and elaborate your own and individual contribution in solving “Question 1” of this TMA. ايميل a_al_shora@hotmail.com رقم 0544321455 -00966544321455
2) Discuss and elaborate your own and individual contribution in solving “Question 2” of this TMA.
Question 4 :
Write a summary discussing  the  latest developments of the two fingerprint sensors: Optical sensors and Solid-state sensors. This summary aims to explain the important idea of the two sensors to intermediate level reader. ايميل a_al_shora@hotmail.com رقم 0544321455 -00966544321455