Preview

OBJECT ORIENTED ASSIGNMENT 2 FULL

Powerful Essays
Open Document
Open Document
1334 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
OBJECT ORIENTED ASSIGNMENT 2 FULL
Table of Contents
1.Introduction on Learning Management System 2
1.1 Introduction on Blended Learning 2
1.2 Problem System……………………………………………………………………………………………………………………2
1.3 Objective……………………………………………………………………………………………………………………………..2
2. Use Case Diagram 3
3. Intermediate Description of Learning Management System 3.1 Flow of activities for use case Lecturer upload course material.....................................4
3.2 Flow of activities for use case Student Save File Online..................................................5 3.3 Flow of activities for use case Student download course material..................................6 3.4 Flow of activities for use case Student View Course Mate...............................................7 3.5 Flow of activities for use case Lecturer Manage Own Course Marks...............................8
4. Class Diagram (Domain Class Diagram)................................................................................9
5. Activity Diagram 5.1 Activity Diagram- Lecturer upload course material............... .......................................10
5.2 Activity Diagram- Student saves files online..................................................................11
5.3 Activity Diagram- Student download course material...................................................12
6. Sequence Diagram 6.1 Sequence Diagram- Lecturer upload course material....................................................13 6.2 Sequence Diagram- Student save files online................................................................13 6.3 Sequence Diagram – Student download course material..............................................14
7. State Chart Diagram 7.1 State Chart Diagram- Student save files online..............................................................15 7.2 State Chart Diagram – Student download course material............................................15
8. Design User

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Unit 2 Assignment 1

    • 235 Words
    • 1 Page

    A common problem that happens is assuming as soon as DHCP options are changed that all PCs will automatically implement them.…

    • 235 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    Cs150 Unit 3 Assignment

    • 498 Words
    • 2 Pages

    In a Denial-of-Service (DoS) attack, a malicious client (the attacker) performs operations designed to partially or completely prevent legitimate clients from gaining service from a server (the victim). (Brustoloni, N.D.) To defend your system from DoS attacks it typically involves the use of a combination of attack detection software, aiming to block traffic that is identified as illegitimate and allow all traffic that is identified as legitimate. Some traffic classification and response tools are Firewalls, Switches, Routers, Application front end hardware, IPS based prevention, DDS based…

    • 498 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Unit 2 Assignment 1

    • 603 Words
    • 3 Pages

    In a 1-page paper, compare the different service provide types: RBOCS, ILEC, CLEC, MSO and ISP.…

    • 603 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Unit 1: Assignment

    • 480 Words
    • 2 Pages

    2) Mrs. Caretaker has severe knee pain. Mrs. Caretaker’s knee pain could be the result of working over 25 years caring for patients. Mrs. Caretaker worked in a nursing home as a CNA and then in the local hospital as an LPN. The physical demands as a CNA and LPN likely attributed to knee pain. Both jobs demanded lifting patients and standing on her feet 80% of the time.…

    • 480 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Unit 2 Assignment 2

    • 299 Words
    • 1 Page

    The evolution of the Ethernet standards will have a large effect on data storage requirements. As the speeds of these connections continue to increase, users and businesses will be able to transfer larger files faster and will required larger data storage to accommodate the increased demand of resources. Thirty years ago, when the standard was only 10MB, there was nowhere near the need for the data storage capacity as there is today, with the current standard being 100 Gbit, with 1 Tbit on the way. Data storage wasn’t as high in demand before because it would take an extremely long amount of time to transfer large files, but as the speed increases, so will the demand.…

    • 299 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    Unit 3 Assignment 1

    • 375 Words
    • 2 Pages

    1. Research the following organizations and explain their involvement with the Internet public IP addresses:…

    • 375 Words
    • 2 Pages
    Good Essays
  • Better Essays

    UNIT 2 ASSIGNMENT 1

    • 1061 Words
    • 5 Pages

    4. According to this chapter, which of the following concepts happens in a modern-day, end-to-end voice call between two home telephones in the United States? (Choose two answers.)…

    • 1061 Words
    • 5 Pages
    Better Essays
  • Satisfactory Essays

    13. This attribute configures how content is situated to the left, right, or center of a Web page: align…

    • 335 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    unit 2 assignment 2

    • 506 Words
    • 3 Pages

    Active Directory integrated zones must be hosted by Domain Controllers (DCs), and all Active Directory integrated zones are primary zones. Given this, we’re really talking about where to place Domain Controllers servicing the additional role of DNS server.…

    • 506 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Unit 3 Assignment 3

    • 288 Words
    • 1 Page

    Data classification policy is important for securing data from risks, which includes unauthorized users, modification, disclosure, access, use, and removal. This is to ensure protection on data assets from unauthorized users. Data must be maintained in a secure, accurate and reliable manner and be available for authorized use. In order to implement security measures, the data must be classified into categories like; confidential, restricted, and public. Confidential and restricted will be required some sort of access mechanism to authenticate anyone who wants to access any classified documents. In order to construct a Classification policy, one must know what type of data are available, where they are located, what type of access levels are implemented and what protection level is implemented and does it adhere to compliance regulations.…

    • 288 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    Unit 2 Assignment 2

    • 257 Words
    • 2 Pages

    1. The five vulnerabilities that exist for this LAN based workgroup are 2755801, 2501696, 2588513 2639658, 2659883.…

    • 257 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Unit 2 Assignment 1

    • 299 Words
    • 1 Page

    I believe that communication is important because without an effect communication plan in place the team would not be able to function and meet their ultimate goal of being successful.…

    • 299 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    Unit 2 Assignment 1

    • 309 Words
    • 1 Page

    Audience is needed or argument is invalid. Audience can take either side and the desired outcome is that they will take your side in the argument at the end. There is also the possibility of a common ground where each side of the argument settles.…

    • 309 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    Compiler translates a high-level program in a separate machine language program while the interpreter is a program that both translates and executes the instructions in a high-level language program.…

    • 256 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Java assignments

    • 272 Words
    • 2 Pages

    1. Write a program to print “Hello Java” (enclosed within double quotes) on the standard output.…

    • 272 Words
    • 2 Pages
    Satisfactory Essays