MIE354F_2023_Lab5_Test
.pdf
keyboard_arrow_up
School
University of Toronto *
*We aren’t endorsed by this school
Course
354
Subject
Computer Science
Date
Jan 9, 2024
Type
Pages
2
Uploaded by dqwkygefiwh on coursehero.com
MIE 354H- Business Process Engineering
Fall 2023
MIE354 Lab 5 Test
This is an
open book and notes
, invigilated test. The work in this test must be completed in person during the lab session
and working
individually
without any consultation at all. Therefore, you are not allowed to
communicate or share notes
in
paper or electronically (i.e., no email, no instant messaging, no USB keys, etc.). While at the lab you
cannot run on any device
any communication program
(email, instant messaging, etc.).
This test represents 6% of the course grade.
The deliverables for the lab exercise must be submitted by committing and pushing your work to the remote GitHub
repository that you used for your Lab 5 Preparation generated by GitHub Classroom, following the instructions provided
in the Lab5_Test_Submission_Template.docx.
Q0:
Read and follow the instructions in Lab5_Test_Submission_Template.docx, add and then Commit and
Push the Lab5_Test_Submission_Template.docx to your Lab 5 Preparation GitHub Classroom repo.
Q1:
Commit the following files in the appropriate directories from Quercus to your repo:
1.
Lab5_4.bpmn
2.
Lab5_4_UnitTest.java
3.
ReviewApprovals.java
4.
GeneratePurchaseOrder.java
The diagram in Lab5_4.bpmn models a simple approval process for making a purchase order. In this process, a purchase
requisition is first created and then sent for approval by the appropriate approvers (e.g., Finance approval and Manager-level
approval). As approvals are received, the decisions are reviewed. If approved, the purchase order is generated.
The “Submit finance approval” task is not yet functional. Add a form field to capture the decision (similar to “Submit manager
approval”) and update Lab5_4_UnitTest.java to test that it works.
For Q2-Q4
The approval process is changing to add an additional control for large purchases and streamline smaller
purchases. In the new process if the total amount of the purchase is greater than or equal to $10,000.00, then Director-level
approval is required and if the total amount is less than $1000.00, then Manager-level approval is no longer required.
Q2
Modify Lab5_4.bpmn to model the described process by (1) introducing a new user task called “Submit director
approval” that includes a form with a Boolean field that represents the approval decision and (2) updating the
conditions of the sequence flows.
Hint: Refer to “Submit manager approval” task, refer to the form in “Create purchase requisition” task and refer to the
alternate paths in Lab5_1.bpmn.
Q3
Modify ReviewApprovals.java such that the purchase requisition is only approved if the correct number of
approvals are received.
Q4
Modify
myTest
in Lab5_4_UnitTest.java to exercise this new requirement and briefly justify your new testcases in
your submission document.
For Q5-Q7
The current diagram does not model what happens in the case of rejection. A purchase is rejected if any one
of the approvers decides to reject the purchase.
Q5
Modify ReviewApprovals.java such that a new “rejected” variable is set as “true” when any of the approvers
decide to reject (e.g., managerApproval == false).
Q6
Modify Lab5_4.bpmn to model the described process using a new user task called “Reject purchase
requisition” that simply prints out “Rejecting purchase requisition…”.
Hint: use your new “rejected” variable
from part (A) to design alternate paths.
Q7
Modify
myTest
in Lab5_4_UnitTest.java to exercise this new requirement and briefly justify your new testcases in
your submission document.
REMINDER - your Lab 5 Test submission consists of ALL of your commits and push to GitHub, and you must have a
separate commit and push for each question.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Related Questions
INTI Online Book Purchasing System is a system to help student in book purchasing. The main objective for the system is to keep track of student records, student orders and the available books. The student may search for books before they order the books online. The system operator is responsible to verify the order submitted by the students. The order is process when it is available otherwise, a purchase order will be prepared. A feedback is send to the student when the process is completed.
Each student will be characterized by a unique ID number, name, address and contact number. Each book holds information on the book title, author, category, and ISBN number. Student Order characterized by an ID number, date ordered, and quantity. Each order is associated with only one student. One student may have many orders and each order contains one or many book orders. Book order is characterized by order-number, date, ISBN number, quantity and total. Any book order is related to one and only…
arrow_forward
user stories
I need 5 user stories about Online Crime Management for my project
For example, user stories might look like that:As a police officer, i would like to be able to check for past records with an ID number(like a passport), so that I don’t have to use the name of the person
arrow_forward
Case Study – Personal Trainer
Personal Trainer, Inc.
Fact-Finding Summary
A typical center has 300-500 members, with two membership levels: full and limited. Full members have access to all activities. Limited members are restricted to activities they have selected, but they can participate in other activities by paying a usage fee. All members have charge privileges. Charges for merchandise and services are recorded on a charge slip, which is signed by the member. At the end of each day, cash sales and charges are entered into the BumbleBee accounting software, which runs on a computer workstation at each location.
Daily cash receipts are deposited in a local bank and credited to the corporate Personal Trainer account. The BumbleBee program produces a daily activity report with a listing of all sales transactions. At the end of the month, the local manager uses BumbleBee to transmit an accounts receivable summary to the Personal Trainer headquarters in Chicago, where member…
arrow_forward
Q: Explain the document downloading task card please.
arrow_forward
Systems Analysis Assignment (Microsoft Word and Excel)
You and your team have been hired to set up a computer classroom for Tech United, Inc. An up
and coming tech startup who will like to become a tech training company.
Tech United, Inc. wants to offer various different kinds of tech training at their new office location.
They have only one classroom space available that can accommodate up to 30 students. The
classroom is already equipped with tables and chairs. The classroom, however, does not have any
computers, routers, projectors, smartboard etc. This is where you come in. The company has
$40,000 as a starting budget and will like for you to determine for them what
computers/keyboards/mouse/router/printer/smartboard etc. they should buy. You determine
based on their budget, how many of each item should be purchased for the classroom.
Deliverables
Deliverable Part 1: A systems analysis report on what kind of computers and hardware the
company should use in their classroom,…
arrow_forward
Describe the steps involved in doing a thorough walkthrough. During a walkthrough, who is responsible for what tasks?
arrow_forward
Personal Identification Techniques of fingerprinting unit tries to present different personal identification techniques, but there are still other methods that are not included. It is your task to look for these in the internet or other resources and provide a brief description to it. You need also to provide your sources.
arrow_forward
Briefly explain your preparation techniques about exam.
arrow_forward
strict warning if you are not sure skip else sure report dont answer
arrow_forward
Add a research method
Research MethodsHere you should describe the methodologies that you are employed in your project and the sources that you used. Basic to most projects will be online searches for materials such as web pages, articles, videos, and blogs. Social media such as Twitter or Facebook may play a role. Personal interviews with important people knowledgeable in your topic may be included. In some cases, it may be a good idea to do a survey. Include information on matchups between your sources and the stakeholders that you have identified and whose viewpoints are represented. Describe specifically how the researchmethods tie in with how you are advancing your project.
arrow_forward
– Ethical HackingLab #2 – Legal and Ethical
Overview
Write up a case that pertains to one of the laws mentioned in the course content or another law that is relevant to the cybersecurity landscape. Make sure to include your references. You should use what you learned about Google Hacking to find actual court documents that detail the case, the charges levied, and results of the case. Finding pertinent primary sources of information in this field can be quite a challenge.
Pick a case that has occurred in the last 7 years and summarize the main points of the case.
Explain which laws were cited in the case and go into detail about why they were applied. You may need to take a closer look at the law in question to describe this.
Explain the verdict of the case and your opinion of the ruling based on the law.
In your opinion, does the law need reform or will it still apply in the future. Why or why
arrow_forward
Please explain ur thought process. Starting the code like shown
arrow_forward
Case study:
Students and staff purchase ready to eat snack-foods such as chocolate bars, cookies, chips, drinks, etc. using an automated vending machine. Each snack-item has a price and a name.
Any customer can buy an item, using funds available on the university identity card to pay for it. Cash payments are not allowed. The vending machine has a card reader. Customers tap their ID card against the card-reader. The card-reader reads the card and stores its details for the duration of the interaction. After the card is verified, the customer may choose the snack item and opt to buy it. The vending machine will verify that there is sufficient balance on the card to pay for the item and automatically deducts the amount towards the purchase of the snack-item if sufficient funds are available. The customer can buy as many items as they’d like.
Task: Draw a sequence diagram depicting a successful sale scenario for the case study described above.
arrow_forward
Troubleshooting in Daily Life
Troubleshooting is a technical term for solving a problem. Chances are you have already done some troubleshooting in your daily life.
What are some examples of troubleshooting that you have experienced? What were you trying to fix and why? When you were doing it, did you think of it as "troubleshooting" or not? If you did the same activity today, would you think of it as "troubleshooting" now? Could you provide documentation for someone else who may have had the same issue so they could resolve it? How would you do that? What would you include?
arrow_forward
Briefly explain your technique's for exam preparation.
arrow_forward
Explain what the user should do before, during, and after taking the exam. Testing may either be done on an individual basis or in a group setting.
arrow_forward
When reading articles about current events on a tablet computer, it is very necessary to be knowledgeable about the source or provenance of the material.
arrow_forward
Please assist... thumbs up guaranteed if the solution is correct. thanks
arrow_forward
There is no way to share photos. You want to include pictures of a home that is for sale
when you send an email to your real estate partner. Every time the email message is
sent, it is denied by an automated response because the files are too large. How do you
intend to spend the remainder of the day?
arrow_forward
Extreme Sports Web Site (Extreme Sports Web Site)
Extreme sports include activities that are considered to have a high degree of intrinsic risk, such as BMX racing, skate boarding, mountain biking, ice climbing, and base jumping, among others. As a lifelong enthusiast, you started selling hats and t-shirts with extreme sports themes, personalities, and inspiring sayings to raise money for charity. As a consequence, you have had the pleasure of travelling to many exotic locations across the globe over the last two years in order to sell your very successful goods at a variety of events and contests. When it comes to selling your goods to extreme sports enthusiasts all over the world, you're considering launching a Web site.
What difficulties could you encounter while attempting to distribute your goods to consumers in another country?
arrow_forward
Troubleshooter
Think of a technical problem you may have encountered. It can be related to software, hardware, or even in a non-technical setting. Why is it important to follow a troubleshooting methodology to solve the problem? When faced with a problem, why do you suppose you shouldn't start trying fixes immediately as they occur?
arrow_forward
Evaluation and Management Section: Assign code(s) to a patient who received critical care services for a total of 210 minutes on July 15. On this date, the patient also underwent an inpatient comprehensive history and examination with medical decision making of high complexity. Enter codes
arrow_forward
Use Case Modeling
Instant messaging is an online chat that offers real-time text transmission over the Internet. The system contains the following requirements:
A user can:
Set profile including change profile picture, change name, and change status.
Manage account through either change privacy settings, change SIM number, or delete account
Send broadcast message by selecting a list of contacts
Create a group including choose a group name, choose the contacts to add, and choose a group picture.
Chat with a contact including send text, send an attachment, send contact, and send location.
Mute a conversation. Choose the duration to mute either one week, one month, or one year.
Make a voice/video call with a contact.
Search for a contact either through contacts chats or through contacts list
Invite friend
Model the use case diagram for the above system.
Write the use case narrative of the “Send Location” use case
Use-Case Name:
Use-Case ID:…
arrow_forward
Issue with code!!...
Cs
arrow_forward
If you're nervous before a presentation, make a list of three specific methods you may use to calm yourself down.
arrow_forward
Amateur Sports League You are the new manager for a nonprofit amateur soccer league. The league’s board of directors asked you to develop a disaster recovery plan for its main office. The main office consists of a small storefront with two back rooms: one room is the office, with all of the electronic equipment and paper files; the other is for storage of nonelectronic equipment. The staff members — you, an administrative assistant, and information technology (IT) specialist — work in the office. The electronic equipment in the office includes two desktops, a laptop, an external hard drive for backups, a wireless router, and two printers. In addition, each staff member has a smartphone.
Do This: Choose either a natural or man-made disaster. Create a disaster recovery plan for the Amateur Sports League that outlines emergency strategies, backup procedures, recovery steps, and a test plan. Assign staff member's roles for each phase of the disaster recovery plan.
arrow_forward
Question-21
Note:- Please explain in detail all the steps, how you got the answer.
arrow_forward
Match the items on the left to the ones on the right
cooperation synchronization [choose]
competition synchronization[choose]
Multitasking require the same resource that can't be used by both at the same time.
one task requires multiple resources that can only be used one at a time.
one task must wait for another before it can be performed.
arrow_forward
Video-Rental LTD case study
Video-Rental LTD is a small video rental store. The store lends videos to customers for a fee and purchases its videos from a local supplier.
A customer wishing to borrow a video provides the empty box of the video they desire, their membership card, and payment – payment is always with the credit card used to open the customer account. The customer then returns the video to the store after watching it.
If a loaned video is overdue by a day the customer's credit card is charged, and a reminder letter is sent to them. Each day after that a further card is made, and each week a reminder letter is sent. This continues until either the customer returns the video, or the charges are equal to the cost of replacing the video.
New customers fill out a form with their personal details and credit card details, and the counter staff gives the new customer a membership card. Each new customer form is added to the customer file.
The…
arrow_forward
DRY infractions are those that fall outside of the guidelines.
Why do you think that is?
arrow_forward
Differentiate between workshop and Focus groups elicitation techniques?
arrow_forward
SEE MORE QUESTIONS
Recommended textbooks for you
Database System Concepts
Computer Science
ISBN:9780078022159
Author:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:McGraw-Hill Education
Starting Out with Python (4th Edition)
Computer Science
ISBN:9780134444321
Author:Tony Gaddis
Publisher:PEARSON
Digital Fundamentals (11th Edition)
Computer Science
ISBN:9780132737968
Author:Thomas L. Floyd
Publisher:PEARSON
C How to Program (8th Edition)
Computer Science
ISBN:9780133976892
Author:Paul J. Deitel, Harvey Deitel
Publisher:PEARSON
Database Systems: Design, Implementation, & Manag...
Computer Science
ISBN:9781337627900
Author:Carlos Coronel, Steven Morris
Publisher:Cengage Learning
Programmable Logic Controllers
Computer Science
ISBN:9780073373843
Author:Frank D. Petruzella
Publisher:McGraw-Hill Education
Related Questions
- INTI Online Book Purchasing System is a system to help student in book purchasing. The main objective for the system is to keep track of student records, student orders and the available books. The student may search for books before they order the books online. The system operator is responsible to verify the order submitted by the students. The order is process when it is available otherwise, a purchase order will be prepared. A feedback is send to the student when the process is completed. Each student will be characterized by a unique ID number, name, address and contact number. Each book holds information on the book title, author, category, and ISBN number. Student Order characterized by an ID number, date ordered, and quantity. Each order is associated with only one student. One student may have many orders and each order contains one or many book orders. Book order is characterized by order-number, date, ISBN number, quantity and total. Any book order is related to one and only…arrow_forwarduser stories I need 5 user stories about Online Crime Management for my project For example, user stories might look like that:As a police officer, i would like to be able to check for past records with an ID number(like a passport), so that I don’t have to use the name of the personarrow_forwardCase Study – Personal Trainer Personal Trainer, Inc. Fact-Finding Summary A typical center has 300-500 members, with two membership levels: full and limited. Full members have access to all activities. Limited members are restricted to activities they have selected, but they can participate in other activities by paying a usage fee. All members have charge privileges. Charges for merchandise and services are recorded on a charge slip, which is signed by the member. At the end of each day, cash sales and charges are entered into the BumbleBee accounting software, which runs on a computer workstation at each location. Daily cash receipts are deposited in a local bank and credited to the corporate Personal Trainer account. The BumbleBee program produces a daily activity report with a listing of all sales transactions. At the end of the month, the local manager uses BumbleBee to transmit an accounts receivable summary to the Personal Trainer headquarters in Chicago, where member…arrow_forward
- Q: Explain the document downloading task card please.arrow_forwardSystems Analysis Assignment (Microsoft Word and Excel) You and your team have been hired to set up a computer classroom for Tech United, Inc. An up and coming tech startup who will like to become a tech training company. Tech United, Inc. wants to offer various different kinds of tech training at their new office location. They have only one classroom space available that can accommodate up to 30 students. The classroom is already equipped with tables and chairs. The classroom, however, does not have any computers, routers, projectors, smartboard etc. This is where you come in. The company has $40,000 as a starting budget and will like for you to determine for them what computers/keyboards/mouse/router/printer/smartboard etc. they should buy. You determine based on their budget, how many of each item should be purchased for the classroom. Deliverables Deliverable Part 1: A systems analysis report on what kind of computers and hardware the company should use in their classroom,…arrow_forwardDescribe the steps involved in doing a thorough walkthrough. During a walkthrough, who is responsible for what tasks?arrow_forward
- Personal Identification Techniques of fingerprinting unit tries to present different personal identification techniques, but there are still other methods that are not included. It is your task to look for these in the internet or other resources and provide a brief description to it. You need also to provide your sources.arrow_forwardBriefly explain your preparation techniques about exam.arrow_forwardstrict warning if you are not sure skip else sure report dont answerarrow_forward
- Add a research method Research MethodsHere you should describe the methodologies that you are employed in your project and the sources that you used. Basic to most projects will be online searches for materials such as web pages, articles, videos, and blogs. Social media such as Twitter or Facebook may play a role. Personal interviews with important people knowledgeable in your topic may be included. In some cases, it may be a good idea to do a survey. Include information on matchups between your sources and the stakeholders that you have identified and whose viewpoints are represented. Describe specifically how the researchmethods tie in with how you are advancing your project.arrow_forward– Ethical HackingLab #2 – Legal and Ethical Overview Write up a case that pertains to one of the laws mentioned in the course content or another law that is relevant to the cybersecurity landscape. Make sure to include your references. You should use what you learned about Google Hacking to find actual court documents that detail the case, the charges levied, and results of the case. Finding pertinent primary sources of information in this field can be quite a challenge. Pick a case that has occurred in the last 7 years and summarize the main points of the case. Explain which laws were cited in the case and go into detail about why they were applied. You may need to take a closer look at the law in question to describe this. Explain the verdict of the case and your opinion of the ruling based on the law. In your opinion, does the law need reform or will it still apply in the future. Why or whyarrow_forwardPlease explain ur thought process. Starting the code like shownarrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Database System ConceptsComputer ScienceISBN:9780078022159Author:Abraham Silberschatz Professor, Henry F. Korth, S. SudarshanPublisher:McGraw-Hill EducationStarting Out with Python (4th Edition)Computer ScienceISBN:9780134444321Author:Tony GaddisPublisher:PEARSONDigital Fundamentals (11th Edition)Computer ScienceISBN:9780132737968Author:Thomas L. FloydPublisher:PEARSON
- C How to Program (8th Edition)Computer ScienceISBN:9780133976892Author:Paul J. Deitel, Harvey DeitelPublisher:PEARSONDatabase Systems: Design, Implementation, & Manag...Computer ScienceISBN:9781337627900Author:Carlos Coronel, Steven MorrisPublisher:Cengage LearningProgrammable Logic ControllersComputer ScienceISBN:9780073373843Author:Frank D. PetruzellaPublisher:McGraw-Hill Education
Database System Concepts
Computer Science
ISBN:9780078022159
Author:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:McGraw-Hill Education
Starting Out with Python (4th Edition)
Computer Science
ISBN:9780134444321
Author:Tony Gaddis
Publisher:PEARSON
Digital Fundamentals (11th Edition)
Computer Science
ISBN:9780132737968
Author:Thomas L. Floyd
Publisher:PEARSON
C How to Program (8th Edition)
Computer Science
ISBN:9780133976892
Author:Paul J. Deitel, Harvey Deitel
Publisher:PEARSON
Database Systems: Design, Implementation, & Manag...
Computer Science
ISBN:9781337627900
Author:Carlos Coronel, Steven Morris
Publisher:Cengage Learning
Programmable Logic Controllers
Computer Science
ISBN:9780073373843
Author:Frank D. Petruzella
Publisher:McGraw-Hill Education