Category Archives: Management

What financial losses does the merchant incur when a stolen credit card is used to purchase something?

Who Pays the Bill for Theft? Who is responsible for the financial loses when a stolen credit card is used by a criminal? The criminal usually has a short-term financial gain. The issue then becomes how to allocate the financial loss associated with the theft. Who pays for the criminal’s gain? Is it the card holder (you), card issuer (your bank), credit card company (e.g., Visa®), or merchant (the retail store)? Many people errantly believe it is the credit card company. It turns out that the merchant is almost always forced to absorb the loss. In addition to the financial loss associated with the stolen merchandise, the merchant may also be “penalized” by the credit card company if the merchant was responsible for the loss of customer data…..

Imagine you are designing a framework for the following classes of applications. Describe what services you might put in the framework. Answer this question using a simple list of things the system should be capable of doing.

Imagine you are designing a framework for the following classes of applications. Describe what services you might put in the framework. Answer this question using a simple list of things the system should be capable of doing.

(a) A reservation framework. This could be expanded into an application to reserve anything that needs reserving, e.g. dental appointments, meetings, tickets at the theater, etc.

(b) A scheduling framework. This could be expanded for scheduling meetings, trains, classes etc.

(c) A language-processing framework. This could be expanded to process a programming language, a database query language or a command language.

(d) An editing framework. This could be expanded to allow editing of text, spreadsheets, and elements of different kinds of diagrams. Think about common features of editing tools provide.

The next step is to group the drugs hierarchically according to their similarity.

The next step is to group the drugs hierarchically according to their similarity. To do so, first take the two drugs that are closest and draw a circle around them. Then, take the drug that is next closest to either of these first two and draw a curve that encloses all three (see Figure 2). Proceed until all drugs are included, giving a diagram depicting hierarchical clusters of decreasing similarity as shown in Figure 2. It is also possible to depict the drug similarities using a dendogram, where the length of the path in the diagram between two drugs reflects the similarity between the drugs (see Figure 3). Construct both.

Imagine you are designing a framework for the following classes of applications. Describe what services you might put in the framework. Answer this question using a simple list of things the system should be capable of doing.

Imagine you are designing a framework for the following classes of applications. Describe what services you might put in the framework. Answer this question using a simple list of things the system should be capable of doing.

(a) A reservation framework. This could be expanded into an application to reserve anything that needs reserving, e.g. dental appointments, meetings, tickets at the theater, etc.

(b) A scheduling framework. This could be expanded for scheduling meetings, trains, classes etc.

(c) A language-processing framework. This could be expanded to process a programming language, a database query language or a command language.

(d) An editing framework. This could be expanded to allow editing of text, spreadsheets, and elements of different kinds of diagrams. Think about common features of editing tools provide.

What is wrong with the following designs from the perspective of cohesion, and what could be done to improve them?

What is wrong with the following designs from the perspective of cohesion, and what could be done to improve them?

(a) There are two subsystems in a university registration system that do the following. Subsystem A displays lists of courses to a student, accepts requests from the student to register in courses, ensures that the student has no schedule conflicts and is eligible to register in the courses, stores the data in the database and periodically backs up the database. Subsystem B allows faculty members to input student grades, and allows administrators to assign courses to faculty members, add new courses, and change a student registration. It also prints the bills that are sent to students.

(b) In an electronic commerce application, a module is created to add….

Companies always want to tailor their Web sites to the needs of their customers to stay competitive; sites that are easier to navigate or provide the desired information quicker will be most in demand by consumers.

Companies always want to tailor their Web sites to the needs of their customers to stay competitive; sites that are easier to navigate or provide the desired information quicker will be most in demand by consumers. One way to accomplish this is with Web site knowledge work software that monitors traffic on a Web server and provides reports that summarize visitors’ activities. Visit our Web site at www.computing-2012.comand enter the keyword knowledge to link to a company that delivers such software. Once connected, review the company’s products and then answer the following questions: (a) What events can the software monitor for? Briefly describe each. (b) How are reports about Web site usage delivered? What information do they include? (c) How can a company apply this information to improve….

Imagine your goal is to develop a web-based application to access your voice messaging system (or your answering machine). This application can allow you to select messages, play them, drag messages to other applications, etc.

Perform a heuristic evaluation of the GANA UI that you drew in Exercise E141. Update your GUI if necessary; also, indicate any requirements that should be changed based on your UI review.

Exercise E141

Work in groups of two or three to do the following. First, each member of the group should independently perform a heuristic evaluation of the paper prototype you developed in Exercise E139 or E140. Then the group members should get together and study each other’s lists of defects. Determine how many were found by only one person, how many were found by two people and how many were found by all three (if you have three members). This exercise should demonstrate that having more than one evaluator is important.

Exercise E139

You are asked….

Working in groups of four or five, conduct inspections of some code and documents you have produced while working on the exercises in this book.

Working in groups of four or five, conduct inspections of some code and documents you have produced while working on the exercises in this book. Each member of the group should have their turn as author, presenting the group with one item of about 100 lines of code or five pages of text. The members of the group should exchange material several days before the inspection meeting. Group members should prepare for the meeting by making sure they understand what is to be inspected. The meetings themselves, which should last for about half an hour for each author, should be conducted as discussed above. The role of moderator can be rotated among the various group members. The deliverables from this exercise are the inspection logs.

Design a team for implementing Release 1 of the GANA software whose cost you estimated in Exercise E217

Design a team for implementing Release 1 of the GANA software whose cost you estimated in Exercise E217. Specify an appropriate team structure, the number of people you believe should be on the team, how the team structure would evolve as the project progresses, and the skills you believe team members should have.

Exercise E217

Working in groups of four, estimate the cost of developing Release 1 of the GANA software, whose requirements were described in Chapter 4. Use as many of the techniques described in this section as possible. Among other things, this means you will use the ‘divide and conquer’ strategy to divide the software into parts, and divide the development process into detailed activities. You should also make optimistic, likely and pessimistic estimates. Each group….

Generate a list of experiences you have encountered that meet the criteria of transitions and turning points.

Generate a list of experiences you have encountered that meet the criteria of transitions and turning points. It may be that the life events you listed in Learning Task 3.1 (p. 54) and considered in Learning Task 3.2 (p. 61) will fi t the bill. Try, however, not to restrict yourself to these examples.

• Now think of clients you have worked with, and identify transitions and turning points they were facing at the time.

• Think about what marked these experiences out as transitions or turning point, and then, if possible, compare notes with a partner or small group of colleagues.

• Keep a record of these examples in your Learning Journal and keep them in mind as you read through the rest of this chapter. Consider….