Develop Swimlane Activity diagram for Assignment announcement and submission system.

Answers

Answer 1
Using cases can be visualized in greater detail in this report of an activity diagram. In other words, it's a behavioral diagram that regulates the number of actions via systems. They can also be used to show sequences of activities in business operations. UML Activity Diagrams A business process can be examined to determine its flow and demands that use these tools.

The steps to this question can be defined as follows:

For step 1:

The task is to decide the action steps depending upon your use case.

For step 2: Identify all parties involved

If you know whoever the actors are, it's easier to determine the acts they are liable for.

For step 3: Establish a movement among activities

Change the priority in which the action is required by studying the flowchart. If you need to add any branches to the graph, note the conditions that must be met for certain processes to take place. Furthermore, do you even have to finish some tasks before moving onto someone else?

For step 4: Adding swimlanes

We know who is to blame for each act. It's time to assign everyone a swimming lane and group every action they are accountable for under it.Some many activities and actions make up your sales system or process.

Please find the diagram in the attachment file.

Learn more:

Assignment submission: brainly.com/question/11714037

Develop Swimlane Activity Diagram For Assignment Announcement And Submission System.

Related Questions

What does the statement that follows do? double gallons[6] = { 12.75, 14.87 }; a. It assigns the two values in the initialization list to the first two elements but leaves the other elements with the values currently in memory. b. It assigns the two values in the initialization list to the first and second elements, third and fourth elements, and fifth and sixth elements. c. This statement is invalid. d. It assigns the two values in the initialization list to the first two elements and default values to the other elements.

Answers

Answer:

It assigns the two values in the initialization list to the first two elements and default values to the other elements.

Explanation:

Given

The array initialization

Required

Interpret the statement

double gallons[6] implies that the length/size of the array gallons is 6.

In other words, the array will hold 6 elements

{12.75, 14.87} implies that only the first two elements of the array are initialized ; the remain 4 elements will be set to default 0.

After reading the background, please work on the following problem: a. The source process reads information from a file (Therefore, you need to prepare a small text file for testing purpose). b. The source process calls fork() to create the filter process. c. The filter process reads information from the source process (passed via an anonymous pipe), converts the uppercase characters to lowercase ones and vice versa, and then prints out the converted characters to the screen.

Answers

Answer:

Explanation:

The following code is written in Java. It has the main method (source process) and a function called fork() which contains the filter process as described in the question. fork() takes in the file information as a parameter and prints out the information to the screen. The test can be seen with the output in the attached image below.

import java.io.File;

import java.io.FileNotFoundException;

import java.util.Scanner;

class Brainly {

   public static void main(String[] args) {

       String data = "";

       try {

           File myObj = new File("C:\\Users\\Gabriel2\\AppData\\Roaming\\JetBrains\\IdeaIC2020.2\\scratches\\input.txt"); //USE YOUR FILE LOCATION

           Scanner myReader = new Scanner(myObj);

           while (myReader.hasNextLine()) {

               data += myReader.nextLine();

               data += "\n";

           }

           myReader.close();

       } catch (FileNotFoundException e) {

           System.out.println("An error occurred.");

           e.printStackTrace();

       }

       System.out.println("Original: \n" + data);

       fork(data);

   }

   public static void fork(String data) {

       String output = "";

       for (int i = 0; i < data.length(); i++) {

           if (Character.isUpperCase(data.charAt(i)) == true) {

               output += Character.toLowerCase(data.charAt(i));

           } else if (Character.isLowerCase(data.charAt(i)) == true) {

               output += Character.toUpperCase(data.charAt(i));

           } else {

               output += data.charAt(i);

           }

       }

       System.out.println("Modified: \n" + output );

   }

}

How does Accenture view automation?

Answers

Answer:

The description of the given question is summarized below.

Explanation:

These organizations retrained, retooled, and empowered our employees amongst all organization's internal management operating areas throughout order to create an increased automation attitude.Accenture's Innovative Software department was indeed adopting a concept called Human Plus technology, which includes this type of training.

kỹ năng học tập ở bậc đại học là gì

Answers

Answer:

please translate

Thank you ✌️

Phân tích vai trò của các yếu tố trong biên tập Audio và Video

Answers

Answer:

Answer to the following question is as follows;

Explanation:

A visual language may go a long way without even text or narrative. Introductory angles, action shots, and tracker shots may all be utilised to build a narrative, but you must be mindful of the storey being conveyed at all times. When it comes to video editing, it's often best to be as cautious as possible.

you are the network administrator for a college. wireless access is widely used at the college. you want the most secure wireless connections you can have. which of the following would you use?
A WPA
B WEP2
CWEP
D WPA2

Answers

Answer:

D. WPA2

Explanation:

Required

Of the 4 options, which is the most secured?

WPA was created as a solution to the vulnerabilities in WEP/WEP2. Then, WPA was upgraded to WPA2.

WPA2 is the least vulnerable to hacks because for every user that is connected to the network through WPA2, a unique encryption is made available for such connection.

Hence, the most secure connection, of the 4 is WPA2.

Write a program whose input is a character and a string, and whose output indicates the number of times the character appears in the string. The output should include the input character and use the plural form, n's, if the number of times the characters appears is not exactly 1. Ex: If the input is: n Monday the output is: 1 n Ex: If the input is: z Today is Monday the output is: 0 z's Ex: If the input is: n It's a sunny day the output is: 2 n's Case matters. Ex: If the input is: n Nobody the output is: 0 n's n is different than N.

Answers

Answer:

The program in Python is as follows:

char = input("Character: ")[0]

string = input("String: ")

kount = string.count(char)

print(kount,char,end="")

if kount!=1:

   print("'s")

Explanation:

This gets character input

char = input("Character: ")[0]

This gets string input

string = input("String: ")

This counts the occurrence of char in string

kount = string.count(char)

This prints the number of occurrence and the character

print(kount,char,end="")

This prints 's, if kount is other than 1

if kount!=1:

   print("'s")

slide transition can be defined as ____ of one slide after another​

Answers

Answer:

visual effect

Explanation:

A slide transition is the visual effect that occurs when you move from one slide to the next during a presentation. You can control the speed, add sound, and customize the look of transition effects.

why SSTF disk scheduling is not practically feasible?​

Answers

Answer:

There is a lack of predictability because of the high variance of response time. Additionally, SSTF may cause starvation of some requests. Starvation is possible for some requests as it favors easy to reach requests and ignores the far-away processes.

SSTF disk scheduling is not practically feasible because it makes an external call and is forced to wait for I/O to complete, thereby giving up its first-place position.

What is SSTF disk scheduling?

Shortest Seek Time First (SSTF) is a disc scheduling algorithm that is abbreviated as SSTF. Before moving the head away to service other requests, it selects the request that is closest to the current head location.

Because of the high variance in response time, there is a lack of predictability. Furthermore, SSTF may cause some requests to be denied. Some requests may experience starvation because the system prioritizes nearby requests and overlooks distant operations.

Therefore, because it makes an external call and is obliged to wait for I/O to complete, SSTF disc scheduling is not viable because it loses its first-place status.

To learn more about SSTF disk scheduling, refer to the link:

https://brainly.com/question/23552555

#SPJ2

Queues can be represented using linear arrays and have the variable REAR that point to the position from where insertions can be done. Suppose the size of the array is 20, REAR=5. What is the value of the REAR after adding three elements to the queue?

Answers

Answer:

8

Explanation:

Queues can be implemented using linear arrays; such that when items are added or removed from the queue, the queue repositions its front and rear elements.

The value of the REAR after adding 3 elements is 5

Given that:

[tex]REAR = 5[/tex] --- the rear value

[tex]n = 20[/tex] --- size of array

[tex]Elements = 3[/tex] --- number of elements to be added

When 3 elements are added, the position of the REAR element will move 3 elements backward.

However, the value of the REAR element will remain unchanged because the new elements that are added will only change the positioning of the REAR element and not the value of the REAR element.

Read more about queues at:

https://brainly.com/question/13150995

Book information (overriding member functions) Given main() and a base Book class, define a derived class called Encyclopedia. Within the derived Encyclopedia class, define a PrintInfo() function that overrides the Book class' PrintInfo() function by printing not only the title, author, publisher, and publication date, but also the edition and number of volumes. Ex. If the input is: The Hobbit J. R. R. Tolkien George Allen & Unwin 21 September 1937 The Illustrated Encyclopedia of the Universe James W. Guthrie Watson-Guptill 2001 2nd 1 the output is: Book Information: Book Title: The Hobbit Author: J. R. R. Tolkien Publisher: George Allen & Unwin Publication Date: 21 September 1937 Book Information: Book Title: The Illustrated Encyclopedia of the Universe the output is: Book Information: Book Title: The Hobbit Author: J. R. R. Tolkien Publisher: George Allen & Unwin Publication Date: 21 September 1937 Book Information: Book Title: The Illustrated Encyclopedia of the Universe Author: James W. Guthrie Publisher: Watson-Guptill Publication Date: 2001 Edition: 2nd Number of Volumes: 1 Note: Indentations use 3 spaces. LAB ACTIVITY 11.14.1: LAB: Book information (overriding member functions) File is marked as read only Current file: main.cpp cin >> numVolumes; main.cpp Book.h 25 26 27 28 29 30 31 32 33 34 35 36 myBook. SetTitle(title); myBook. SetAuthor(author); myBook. SetPublisher(publisher); myBook.SetPublicationDate(publicationDate); myBook.PrintInfo(); Book.cpp Encyclopedia.h myEncyclopedia. SetTitle(eTitle); myEncyclopedia. SetAuthor(eAuthor); myEncyclopedia. SetPublisher(ePublisher); myEncyclopedia. SetPublicationDate(ePublicationDate); Encyclopedia.cpp

Answers

Answer:

hansnmakqkai8aiaiakqklqlqlqlqlqqqw

An organization needs to integrate with a third-party cloud application. The organization has 15000 users and does not want to allow the cloud provider to query its LDAP authentication server directly. Which of the following is the BEST way for the organization to integrate with the cloud application?

a. Upload a separate list of users and passwords with a batch import.
b. Distribute hardware tokens to the users for authentication to the cloud
c. Implement SAML with the organization's server acting as the identity provider.
d. Configure a RADIUS federation between the organization and the cloud provider

Answers

Answer:

The BEST way for the organization to integrate with the cloud application is:

c. Implement SAML with the organization's server acting as the identity provider.

Explanation:

Implementing SAML (Security Assertion Markup Language) integrations will provide more security to the organization (identity provider) as users' credentials are exposed to fewer parties.  SAML authenticates the users to the cloud application provider.  SAML enables the organization to pass authorization credentials to the service provider by transferring the users' identities to the service provider.

Ann, a customer, purchased a pedometer and created an account or the manufacturer's website to keep track of her progress. Which of the following technologies will Ann MOST likely use to connect the pedometer to her desktop to transfer her information to the website?

a. Bluetooth
b. Infared
c. NFC
d. Tethering

Answers

Answer:

The technologies that Ann will MOST likely use to connect the pedometer to her desktop to transfer her information to the website are:

a. Bluetooth

and

c. NFC

Explanation:

Bluetooth and NFC (Near Field Communication) are wireless technologies that enable the exchange of data between different devices.  Bluetooth operates on wavelength.  NFC operates on high frequency.  The security of NFC over Bluetooth makes it a better tool of choice.  NFC also operates on a shorter range than Bluetooth, enabling a more stable connection. NFC also enjoys a shorter set-up time than Bluetooth.  It also functions better than Bluetooth in crowded areas.  Tethering requires the use of physical connectors.  Infrared is not a connecting technology but wave radiation.

Brooke is trying to save enough money in the next year to purchase a plane ticket to Australia. Every month Brooke saves $200. Write a for loop that displays how much money Brooke will save at the end of each month for the next 12 months.

Answers

Answer:

var monthlyDeposit = 200;

var accountBalance = 0;

for(var i = 0;i<12;i++){

   accountBalance += monthlyDeposit;

   console.log(accountBalance);

}

Chất xơ có nhiều trong thực phẩm nào?

Answers

Answer: rau củ quả đều có lượng chất xơ nhiều hơn so với các loại thực phẩn khác

Explanation:

how do you format a cd or a DVD ​

Answers

No. The DVD format can't be read by a CD.

which technique is the best to help you manage time better ​

Answers

Answer:

Make a schedule and select certain times to do certain things so that you could have time for more things.

Explanation:

I did the same thing now I can make time for myself.

The menu bar display information about your connection process, notifies you when you connect to another website, and identifies the percentage information transferred from the Website server to your browser true or false

Answers

Answer:

false

Explanation:

My teacher quized me on this

you get a call from a customer who says she can't access your site with her username and password. both are case-sensitive and you have verified she is entering what she remembers to be her user and password correctly. what should you do to resolve this problem?

a. have the customer clear her browser history and retry

b. look up her username and password, and inform her of the correct information over the phone

c. have the user reboot her system and attempt to enter her password again

d. reset the password and have her check her email account to verify she has the information

Answers

Answer:

answer would be D. I do customer service and would never give information over the phone always give a solution

In order to resolve this problem correctly, you should: D. reset the password and have her check her email account to verify she has the information.

Cybersecurity can be defined as a group of preventive practice that are adopted for the protection of computers, software applications (programs), servers, networks, and data from unauthorized access, attack, potential theft, or damage, through the use of the following;

Processes.A body of technology.Policies.Network engineers.Frameworks.

For web assistance, the security standard and policy which must be adopted to enhance data integrity, secure (protect) data and mitigate any unauthorized access or usage of a user's sensitive information such as username and password, by a hacker, is to ensure the information is shared discreetly with the user but not over the phone (call).

In this context, the most appropriate thing to do would be resetting the password and have the customer check her email account to verify she has the information.

Read more: https://brainly.com/question/24112967

Write a program that prompts the user to enter a positive integer and displays all its smallest factors in decreasing order.

Answers

Answer:

<fact>[ZRjKt9sw6V(gh6E)ehNM3]<zip>

Explanation:

Consider the following JavaScript code fragment:var greeting = function ( name ) {console.log ( name )}The best answer for what is wrong with this code is:Group of answer choices

Answers

Answer:

name is a reserved word in JS and cannot be used as an identifier

Explanation:

From the group of answer choices provided the only one that may be a problem would be using the word name as a parameter. Although name is not a reserved word per say in JS it is in HTML, and since JS targets HTML it could cause some errors. This however does not prevent this code from running correctly. JS does not require semicolons anymore, and the opening and closing braces for a body of code does not need to be on their own lines. Also, variable names are not Strings and do not need to be inside quotes, even for console.log()

All of the following are true of using the database approach to managing data except Group of answer choices Decentralized management of data Minimal data redundancy Data integration and sharing

Answers

Answer:

Decentralized management of data

Explanation:

The database management approach is one approach based on the improved standard file solution with the use of DBMS and allows for the stimulus access of data with a large number of users.

The tax calculator program of the case study outputs a floating-point number that might show more than two digits of precision. Use the round function to modify the program to display at most two digits of precision in the output number.

Answers

Answer:

Explanation:

The following code is written in Python. The tax calculator program was not provided, therefore I created a tax calculator that takes in the total price as an input and adds a 7% tax to it. Then it uses the round() function to make sure that the total is outputted as a decimal with two decimal digits at most.

def taxCalculator(price):

   total = price * 1.07

   formattedTotal = round(total, 2)

   return formattedTotal

A desktop computer is a type of mobile device.

a. true
b. false

Answers

Answer:B.false
Answer B

A desktop computer is a type of mobile device: B. False.

What is a desktop computer?

A desktop computer simply refers to an electronic device that is designed and developed to receive data in its raw form as an input and processes these data into an output that's usable by an end user.

Generally, desktop computers are fitted with a power supply unit (PSU) and designed to be used with an external display screen (monitor) unlike mobile device.

In conclusion, a desktop computer is not a type of mobile device.

Learn more about desktop computer here: brainly.com/question/959479

#SPJ9

Which of the following are advantages of a local area network, as opposed to a wide area network? Select 3 options.

provides access to more networks

higher speeds

more secure

lower cost

greater geographic reach

Answers

higher speeds lower cost more secure

Answer:

✅ more secure

✅ lower cost

✅ higher speeds

Explanation:

Edge 2022

Fit a boosting model to the training set with Purchase as the response and the other variables as predictors. Use 1,000 trees, and a shrinkage value of 0.01. Which predictors appear to be the most important

Answers

Answer and Explanation:

For the training set consist of 1000 observations, let's have a set consist of the observations such as sets.seed train boost.caravan gbm(Purchase., data = Caravan.train , distribution = "gaussian" , n trees = 1000 summary(boost.caravan) The tree classification such as tree(formula = Purchase data - train where variable are used in tree construction and number of terminal nodes 0 and deviance is 0.7 and error is 0.165

Using Java:
Background
Markdownis a formatting syntax used by many documents (these instructions, for example!) because of it's plain-text simplicity and it's ability to be translated directly into HTML.
Task
Let's write a simple markdown parser function that will take in a single line of markdown and be translated into the appropriate HTML. To keep it simple, we'll support only one feature of markdown in atx syntax: headers.
Headers are designated by (1-6) hashes followed by a space, followed by text. The number of hashes determines the header level of the HTML output.
Examples
# Header will become Header
## Header will become

Header


###### Header will become Header
Additional Rules
Header content should only come after the initial hashtag(s) plus a space character.
Invalid headers should just be returned as the markdown that was recieved, no translation necessary.
Spaces before and after both the header content and the hashtag(s) should be ignored in the resulting output.

Answers

what’s the question ? What are you suppose to do

Which of the following views is the best view to use when setting transition effects for all slides in a presentation?

Answers

Answer:

Slide sorter view

Answer:

Slide sorter view !!!!!

Which factors are involved in search engine optimization​

Answers

Answer:

A Secure and Accessible Website.

Page Speed (Including Mobile Page Speed)

Explanation:

What unit of measurement is used for DIMM read and write times?​

Answers

Answer:

Nanosecond

Explanation:

Nanosecond is used for measuring DIMM read and write times.

Other Questions
Consider a coupon bond with a 5% coupon rate. It will mature in one year and its yield to maturity is 10%. If the 1-year interest rate increases to 12% over the course of the year, what is the return on the bond? Angelicas bouquet of a dozen roses contains 5 white roses. The rest of the roses are pink what fraction of the bouquet is pink? There are 12 roses in a dozen.A. 5/12B. 7/12C. 5/7D. 7/5 What computer measures physical quantities? What are the solutions to the system of equations?{y=2x6x+3{y=x2 Which one is it------------------ what is the difference between Absorption and adsorption Vous tes en Provence. Quels domiciles y voyez-vous? Choisissez toutes les rponses justes.un chteauune habitation loyer modrun mas.n un appartementune maison de ferme whats the area in square inches PLEASE HELP!!BRAINLYEST TOO 1st 3. Explain the phrase, "love not only what is your, but love all that belongs to the human race' in yourown words. What is one good reason for having a purpose in your reading?It guides your reading.It answers all your questions.It ensures that you don't have to think.It prevents you from falling asleep. mountains poem in nepali for class 7 I dont know if this is enough but please help me Lowest to highest degree of internal organization stomach The equation k(x+1)^2/3+(y+2)^2/4=1 represent circle if Solve |6k + 12| + 9 = 9 for k. Jane is trying to decide which courses to take next semester. She has narrowed down her choice to two courses, Econ 1 and Econ 2. Now she is having trouble and cannot decide which of the two courses to take. It's not that she is indifferent between the two courses, she just cannot decide. An economist would say that this is an example of preferences that: Group of answer choices all the other three answers are correct violate the assumption that more is preferred to less. are not transitive. are incomplete. Anyone knows the answer?Please! If God exists and he (or she) revealed themselves, would people who believe in God actually accept God as God? :-'| Write a function rule for tableIs it a, b, c or d?