Write an application that meets list of provided functional

Assignment Help Management Information Sys
Reference no: EM131066022

Assignment: Processing Log Files of a Computer Management System

Objectives-

On successful completion of this assignment you should have demonstrated that you are able to:

  • Write a program consisting of multiple objects which interact with each other by following appropriate design practices
  • Write a program that provides the requested functionality for the system
  • Implement classes which have generalization relationships with other classes
  • Utilise polymorphism and abstraction techniques
  • Utilise appropriate collection classes from Java's Collections API in appropriate ways/places
  • Read data from and write data to text files
  • Handle exceptions by constructing try ... catch blocks for appropriate circumstances

Overview of Assignment-

This assignment requires you to write an application that meets a list of provided functional and design requirements, utilising the concepts and techniques taught in this course. You will write your own classes that will create a text-menu based program for the user to control the operation.

You will be required to develop your application using Java (preferably in the Eclipse IDE). You will need to add all your work to a zip file when you are finished and submit it on Moodle by the due date. You will also need to submit a report which will require some written information describing your system as well as addressing design and testing requirements which will be outlined below. Please write this supporting documentation clearly and IN YOUR OWN WORDS (plagiarism is NOT acceptable - refer to Course Description).

Tasks to Complete-

Task-1: Plan your program

Consider the functional and additional design requirements, and determine which classes you will need to implement. In the Word document, write a short description of the role/purpose of each class that you have in your program - please sort them in alphabetic order by class name.

Task-2: Code a functioning program that addresses the behavioural and additional design requirements

Write the classes that you have determined are needed to make a functioning program. You should aim to write code following high quality coding practices that have been taught in this course this semester - including comments, catching checked and potential exceptions and exhibiting good design where code is separated into separate methods.

Task-3: Ensure all supplementary documentation is complete.

Go through your Word document and make sure that everything required to be included, has actually been included and is complete.

Attachment:- Assignment.rar

Reference no: EM131066022

Questions Cloud

Compound interest per annum : Calculate the principal that will earn a total of £2,535 in 4 years at 3¼% compound interest per annum.
Represents the value of a particular outcome : Consider the following discrete distribution. Note that x represents the value of a particular outcome and P(x) represents the probability of that outcome.
Would earned value management process work well for projects : Describe some of the barriers to successfully implement Earned Value Management. Would the Earned Value Management process work well for projects in an organization where you have worked? Why or why not?
Identify any symbols you choose to use : Identify any symbols you choose to use.
Write an application that meets list of provided functional : ITECH2100 Assignment: Processing Log Files of a Computer Management System. This assignment requires you to write an application that meets a list of provided functional and design requirements, utilising the concepts and techniques taught in this ..
Depreciation that occurs during the first year : A Tractor that cost £8,500,000 is depreciated by 40% of its value each year using the diminishing balance method.
Watching the prices in the housing market : Susan has been watching the prices in the housing market, hoping to one day own hee dream house. Last year, houses with the features she desires cost $194,600. This year, similar houses are selling for $203,552. What is the inflation rate on Susan..
Percentage of the liabilities : A trader owed £39,175 to fully secured creditors and £205,000 to unsecured creditors. The assets of the business realized £138,600. Express the business assets as a percentage of the liabilities
What fact allows you to conclude that the system ax = w : What fact allows you to conclude that the system Ax = w is consistent?

Reviews

Write a Review

Management Information Sys Questions & Answers

  How technology impacts the four basic functions of

how technology impacts the four basic functions of management ford mortor companyford motor companyidentify areas in

  What is the amount sold by each salesperson

Use the PivotTable to calculate and summarize the data. Once you have created a PivotTable, change the order amount to currency. What is the amount sold by each salesperson? What is the total amount sold in each month

  Components of implementing strategyi need assistance with

components of implementing strategyi need assistance with the following i know what they are but i cant get the words

  What is the typical it implementation process

Read "Case: Concerns and Workarounds with a Clinical Documentation System." What is the typical IT implementation process? What are the roles and responsibilities involved in system implementation

  Describe the main tasks performed by a web server

Describe the main task(s) performed by a Web server. Define the term "static Web page" and outline the disadvantages of building a Web site using such pages.

  Opt-in vs opt-out memoprepare a 3 page memorandum that

opt-in vs opt-out memoprepare a 3 page memorandum that examines an opt-in vs opt-out startegy for an online buiness to

  Produce a professional report for a business audience

Explain the issues and benefits associated with implementing an information system and Produce a professional report for a business audience

  Information technology consulting firm business plani have

information technology consulting firm business plani have to write a 2800 word paper on a made up it consulting

  Summarise resources that discuss social engineering attacks

Attacks on human judgement or more specifically, social engineering attacks, are some of the most difficult to prevent form an ICT security perspective. Collect and summarise two resources that discuss specific examples social engineering attacks...

  Why are ftp and telnet considered insecure protocols

Briefly explain what all the protocols do (approximately one paragraph per protocol). Please do not copy and paste from Wikipedia or some other source. Why are FTP and Telnet considered insecure protocols

  Evaluate of website based on the visibility and affordance

Evaluate of the website based on the visibility and affordance. Does the website optimal balance between the number of pages refreshes and delay between page refreshes? Would your answer change if you were using a different network, or assessing th..

  Discuss the social ethical and economic impact

Discuss the impact of your product, service, or application on quality of care, quality of life, cost of care, and access. Discuss the social, ethical, and economic impact of your product, service, or application to the organization

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd