The Library Management System for ACM Class ACM Xinchen Yan Nov. 15 th,2011

Size: px
Start display at page:

Download "The Library Management System for ACM Class 2011. 10 ACM Xinchen Yan Nov. 15 th,2011"

Transcription

1 The Library Management System for ACM Class ACM Xinchen Yan Nov. 15 th,2011

2 Outline Understanding Requirements Manager Design Pattern Advanced Features Testing and Grading Implementation Hints

3 Understanding Requirements We provide several classes: Book, User, Library, etc. That provide the functionality of the library system. You can build library management system on your own. Or build library management system by using our design. But you must follow some rules.

4 Rules If you try to build it on your own, please pay attention to CLI Standard and how we test your project. Do not submit project with unfinished methods.

5 Understanding Requirements To build the system as a whole What are the requirements? How to classify the requirements? CLASS Four Parts: User, Book, Manager and Lib

6 A User s perspective As a reader - Login & Logout - Change Password - Borrow, Return, Renew and Reserve Books - List all borrowed/reserved books - Inquiry my penalty A reader use username to identify itself

7 A User s perspective What s the difference between teachers and students. - The reader Type(TEACHER and STUDENT) - The number of books that can be borrowed - The Borrowed-Expired-Days - Only teachers can reserve books.

8 A User s perspective As an admin - Login & Logout - Change Password - Create a new User/Book/Kind - Update an existing User/Book/Kind - Remove an existing User/Book/Kind - List all Users An admin use username to identify itself as well

9 A Book s Perspective Difficulties in understanding Book(something in the real world) Kind(a class/type of Book) - C++ Primer (a Kind) - My C++ Primer ( a Book)

10 A Book s Perspective A Kind has the following attributes - ISBN - Book-name - Authors(a series of authors) No two Kinds share the same ISBN

11 A Book s Perspective A Book has the following attributes - Kind - Index No two Books share the same Index The process of reserving books Priority for reserving books

12 A Book s Perspective Reserving priority - Books have not been borrowed - Books have been borrowed but have not been reserved by another User

13 Architecture overview Library Reader Manager Admin Manager Kind Manager Book Manager Student Teacher Reader Admin Kind Book User CLI

14 Manager Design Pattern The MDP puts functionality that considers all objects of a class into a separate managing object. Relation between Object and ObjectManager - Reader vs. ReaderManager - Admin vs. AdminManager - Book vs. BookManager - Kind vs. KindManager

15 Manager Design Pattern Object ObjectManager CLI Data(external file)

16 Manager Design Pattern The MDP helps with manipulating data - create, update and remove In this Library Management System, MDP also hold a universal copy of corresponging data objects ObjectManager::loadAll called by Library::initialize ObjectManager::saveAll called by Library::finalize

17 Manager Design Pattern loadall() - load data(from external files) and store it in your Library System saveall() - save data(to external files) You may design your own file format

18 Advanced Features reorderresults searchlikename searchbyexpress - Simple cases - Powerful cases A + B A B

19 Testing and Grading All programs will be tested automatically Provided 20 testcases Your score will be score = testcases passed/20 You need to design a class acting like Command-line interface Provided standard of CLI

20 Command-line interface

21 Standard of CLI Restart Authentication User-user User-book Time Query

22 Authentication

23 User-user

24 User-book

25 Time

26 Query

27 Implementation Hints Pointer std::vector Wide-character set - wchar_t vs. char - std::wstirng vs. std::string - conversion File Operations - Check file existence - Read from a file & Write to a file

28 Implementation Hints Pointer vs. Reference - How to create a new object - How to remove an object std::vector - Vectors are a kind of sequence container. As such, their elements are ordered following a strict linear sequence. -

29 Implementation Hints Vectors are good at: - Accessing individual elements by their position index (constant time). - Iterating over the elements in any order (linear time). - Add and remove elements from its end (constant amortized time).

30 Implementation Hints Conversion between string and wstring Find materials about character set and encodings by yourself. The following codes are supposed to be compiled under Windows(Win32 Platform) #include <windows.h>

31 inline string wtos(const wstring&w) { } int len= WideCharToMultiByte(GetACP(), 0, w.c_str(), -1, NULL, 0, NULL, NULL); char *buf= new char[len]; WideCharToMultiByte(GetACP(), 0, w.c_str(), -1, buf, len, NULL, NULL); string s(buf); delete[] buf; return s;

32 inline wstring stow(const string &s) { } int len= MultiByteToWideChar(GetACP(), 0, s.c_str(), -1, NULL, 0); wchar_t*buf= new wchar_t[len]; MultiByteToWideChar(GetACP(), 0, s.c_str(), -1, buf, len); wstringw(buf); delete[] buf; return w;

33 Check file existence bool file_exists(string const &path) { fstreamf(path.c_str()); boolexists = f.is_open(); f.close(); return exists; }

34 THANK YOU FOR LISTENING

C++ Programming Language

C++ Programming Language C++ Programming Language Lecturer: Yuri Nefedov 7th and 8th semesters Lectures: 34 hours (7th semester); 32 hours (8th semester). Seminars: 34 hours (7th semester); 32 hours (8th semester). Course abstract

More information

Software Design Specification

Software Design Specification GROUP 7 SEVEN SOFTWARE PROJECT: ONLINE SCHEDULING SYSTEM COMPANY: VIA MAGNA GOTHENBURG SWEDEN GROUP MEMBERS: IBRAHIM KRVAVAC ALI BAHALOO HORE SEYED SAMAD GHASEMI KUHAN LOH DANIEL ASOVIC Software Design

More information

CORBA Programming with TAOX11. The C++11 CORBA Implementation

CORBA Programming with TAOX11. The C++11 CORBA Implementation CORBA Programming with TAOX11 The C++11 CORBA Implementation TAOX11: the CORBA Implementation by Remedy IT TAOX11 simplifies development of CORBA based applications IDL to C++11 language mapping is easy

More information

C++ Wrapper Library for Firebird Embedded SQL

C++ Wrapper Library for Firebird Embedded SQL C++ Wrapper Library for Firebird Embedded SQL Written by: Eugene Wineblat, Software Developer of Network Security Team, ApriorIT Inc. www.apriorit.com 1. Introduction 2. Embedded Firebird 2.1. Limitations

More information

El Dorado Union High School District Educational Services

El Dorado Union High School District Educational Services El Dorado Union High School District Course of Study Information Page Course Title: ACE Computer Programming II (#495) Rationale: A continuum of courses, including advanced classes in technology is needed.

More information

SPEECH REPOSITORY 2.0. Registration procedure

SPEECH REPOSITORY 2.0. Registration procedure EUROPEAN COMMISSION DIRECTORATE GENERAL FOR INTERPRETATION Provision of Interpretation Multilingualism and interpreter training support SPEECH REPOSITORY 2.0 Registration procedure Date: 26/09/2014 Version:

More information

DESIGN DOCUMETATION OPEN SOURCE TIME TRACKING SYSTEM. Supervisors. Prepared by: SA-G3

DESIGN DOCUMETATION OPEN SOURCE TIME TRACKING SYSTEM. Supervisors. Prepared by: SA-G3 DESIGN DOCUMETATION OPEN SOURCE TIME TRACKING SYSTEM Supervisors Mr. Shantha Fernando, Senior Lecturer Dept. of Computer Science & Engineering Mr. Indika Perera, Lecturer Dept. of Computer Science & Engineering

More information

Using Blackboard Learn 9 Web Services - Part 2 Learning About The Web Service Classes And Methods

Using Blackboard Learn 9 Web Services - Part 2 Learning About The Web Service Classes And Methods Using Blackboard Learn 9 Web Services - Part 2 Learning About The Web Service Classes And Methods Introduction Blackboard Learn 9.1 provides many different web service classes and those class have numerous

More information

Online College Management System

Online College Management System College Management System Perceiving the need for the advanced college management software, Kittys has developed new, essential, enhanced college management product to keep the management team out of laden

More information

Safewhere*Identify 3.4. Release Notes

Safewhere*Identify 3.4. Release Notes Safewhere*Identify 3.4 Release Notes Safewhere*identify is a new kind of user identification and administration service providing for externalized and seamless authentication and authorization across organizations.

More information

Installation Steps for PAN User-ID Agent

Installation Steps for PAN User-ID Agent Installation Steps for PAN User-ID Agent If you have an Active Directory domain, and would like the Palo Alto Networks firewall to match traffic to particular logged-in users, you can install the PAN User-ID

More information

System Administration and Log Management

System Administration and Log Management CHAPTER 6 System Overview System Administration and Log Management Users must have sufficient access rights, or permission levels, to perform any operations on network elements (the devices, such as routers,

More information

Reading and Writing PCD Files The PCD File Format The Grabber Interface Writing a Custom Grabber PCL :: I/O. Suat Gedikli, Nico Blodow

Reading and Writing PCD Files The PCD File Format The Grabber Interface Writing a Custom Grabber PCL :: I/O. Suat Gedikli, Nico Blodow PCL :: I/O Suat Gedikli, Nico Blodow July 1, 2011 Outline 1. Reading and Writing PCD Files 2. The PCD File Format 3. The Grabber Interface 4. Writing a Custom Grabber global functions in the namespace

More information

Configuring Steel-Belted RADIUS Proxy to Send Group Attributes

Configuring Steel-Belted RADIUS Proxy to Send Group Attributes Configuring Steel-Belted RADIUS Proxy to Send Group Attributes Copyright 2007 Sophos Group. All rights reserved. No part of this publication may be reproduced, stored in retrieval system, or transmitted,

More information

Kittys School Management System

Kittys School Management System Management Module: Login Module: In this module site admin can be able to login by using their unique username and password. Add Section and Standard: Subject: Syllabus: Inbox: i. Admin can add the Standard

More information

SQL Injection January 23, 2013

SQL Injection January 23, 2013 Web-based Attack: SQL Injection SQL Injection January 23, 2013 Authored By: Stephanie Reetz, SOC Analyst Contents Introduction Introduction...1 Web applications are everywhere on the Internet. Almost Overview...2

More information

Sequences in the C++ STL

Sequences in the C++ STL CS 311 Data Structures and Algorithms Lecture Slides Wednesday, November 4, 2009 Glenn G. Chappell Department of Computer Science University of Alaska Fairbanks CHAPPELLG@member.ams.org 2005 2009 Glenn

More information

PHP Language Binding Guide For The Connection Cloud Web Services

PHP Language Binding Guide For The Connection Cloud Web Services PHP Language Binding Guide For The Connection Cloud Web Services Table Of Contents Overview... 3 Intended Audience... 3 Prerequisites... 3 Term Definitions... 3 Introduction... 4 What s Required... 5 Language

More information

Online Valuation Portal User Guide

Online Valuation Portal User Guide Online Valuation Portal User Guide Online User Guide Logging in for the first time This guide is designed to help explain how to login in to our updated Online Client Portal. If you are unable to login

More information

BGL Client Centre Set up Instructions

BGL Client Centre Set up Instructions BGL Client Centre Set up Instructions What is the BGL Client Centre? The BGL Client Centre provides you with a direct connection to BGL. At the Client Centre you can: View your client details Log a support

More information

sqlpp11 - An SQL Library Worthy of Modern C++

sqlpp11 - An SQL Library Worthy of Modern C++ 2014-09-11 Code samples Prefer compile-time and link-time errors to runtime errors Scott Meyers, Effective C++ (2nd Edition) Code samples Let s look at some code String based In the talk, we looked at

More information

INTRODUCTION: SQL SERVER ACCESS / LOGIN ACCOUNT INFO:

INTRODUCTION: SQL SERVER ACCESS / LOGIN ACCOUNT INFO: INTRODUCTION: You can extract data (i.e. the total cost report) directly from the Truck Tracker SQL Server database by using a 3 rd party data tools such as Excel or Crystal Reports. Basically any software

More information

Web Development using PHP (WD_PHP) Duration 1.5 months

Web Development using PHP (WD_PHP) Duration 1.5 months Duration 1.5 months Our program is a practical knowledge oriented program aimed at learning the techniques of web development using PHP, HTML, CSS & JavaScript. It has some unique features which are as

More information

How to set up your NMC Online account. How to set up your NMC Online account

How to set up your NMC Online account. How to set up your NMC Online account How to set up your NMC Online account 1 Introduction NMC Online is a secure service which allows you to manage your registration with us online. This guidance explains how you can set up your account.

More information

An Incomplete C++ Primer. University of Wyoming MA 5310

An Incomplete C++ Primer. University of Wyoming MA 5310 An Incomplete C++ Primer University of Wyoming MA 5310 Professor Craig C. Douglas http://www.mgnet.org/~douglas/classes/na-sc/notes/c++primer.pdf C++ is a legacy programming language, as is other languages

More information

4. You must link at least one student before you can create a user profile for yourself.

4. You must link at least one student before you can create a user profile for yourself. PowerSchool Parent and Student Access Website 1. Sign into the Peace Wapiti PowerSchool Public Access Website at https://sis.pwsd76.ab.ca/public 2. Click Create Account 3. Fill in the information on the

More information

E-Commerce: Designing And Creating An Online Store

E-Commerce: Designing And Creating An Online Store E-Commerce: Designing And Creating An Online Store Introduction About Steve Green Ministries Solo Performance Artist for 19 Years. Released over 26 Records, Several Kids Movies, and Books. My History With

More information

How To - Implement Clientless Single Sign On Authentication in Single Active Directory Domain Controller Environment

How To - Implement Clientless Single Sign On Authentication in Single Active Directory Domain Controller Environment How To - Implement Clientless Single Sign On Authentication in Single Active Directory Domain Controller Environment How To - Implement Clientless Single Sign On Authentication with Active Directory Applicable

More information

First programming project: Key-Word indexer

First programming project: Key-Word indexer University of Illinois at Chicago CS 202: Data Structures and Discrete Mathematics II Handout 2 Professor Robert H. Sloan Friday, August 30, 2002 First programming project: Key-Word indexer 1 Indexing

More information

Software Requirements Specification. Web Library Management System

Software Requirements Specification. Web Library Management System Software Requirements Specification For Web Library Management System Version x.xx Prepared by Proposed to Software Requirements Specification for WLMS Page

More information

InfoPrint isupplier Portal Training

InfoPrint isupplier Portal Training InfoPrint isupplier Portal Training After Completion of this Course, you should be able to: Understand InfoPrint isupplier Process Overview Understand isupplier Portal On boarding Process Access isupplier

More information

SCADA Security. Enabling Integrated Windows Authentication For CitectSCADA Web Client. Applies To: CitectSCADA 6.xx and 7.xx VijeoCitect 6.xx and 7.

SCADA Security. Enabling Integrated Windows Authentication For CitectSCADA Web Client. Applies To: CitectSCADA 6.xx and 7.xx VijeoCitect 6.xx and 7. Enabling Integrated Windows Authentication For CitectSCADA Web Client Applies To: CitectSCADA 6.xx and 7.xx VijeoCitect 6.xx and 7.xx Summary: What is the difference between Basic Authentication and Windows

More information

SQL Injection Vulnerabilities in Desktop Applications

SQL Injection Vulnerabilities in Desktop Applications Vulnerabilities in Desktop Applications Derek Ditch (lead) Dylan McDonald Justin Miller Missouri University of Science & Technology Computer Science Department April 29, 2008 Vulnerabilities in Desktop

More information

Check list for web developers

Check list for web developers Check list for web developers Requirement Yes No Remarks 1. Input Validation 1.1) Have you done input validation for all the user inputs using white listing and/or sanitization? 1.2) Does the input validation

More information

Project: Simulated Encrypted File System (SEFS)

Project: Simulated Encrypted File System (SEFS) Project: Simulated Encrypted File System (SEFS) Omar Chowdhury Fall 2015 CS526: Information Security 1 Motivation Traditionally files are stored in the disk in plaintext. If the disk gets stolen by a perpetrator,

More information

HOW TO SET UP SINGLE SIGN ON FOR PARENT PORTAL IN POWERSCHOOL

HOW TO SET UP SINGLE SIGN ON FOR PARENT PORTAL IN POWERSCHOOL HOW TO SET UP SINGLE SIGN ON FOR PARENT PORTAL IN POWERSCHOOL Before you can access your student(s) information, you MUST create your account which ties you to your student(s). Even if you have your user

More information

for Networks Installation Guide for the application on a server September 2015 (GUIDE 2) Memory Booster version 1.3-N and later

for Networks Installation Guide for the application on a server September 2015 (GUIDE 2) Memory Booster version 1.3-N and later for Networks Installation Guide for the application on a server September 2015 (GUIDE 2) Memory Booster version 1.3-N and later Copyright 2015, Lucid Innovations Limited. All Rights Reserved Lucid Research

More information

VCE Single Study Language Quick Guide for VASS Administrators 2015

VCE Single Study Language Quick Guide for VASS Administrators 2015 VCE Single Study Language Quick Guide for VASS Administrators 2015 Contents Introduction... 1 Web Address... 2 2015 Important Administrative Dates for Single Study Languages Schools... 3 Logging in...

More information

TIMS Web Industry Administrator Guide United States Department of the Interior Information Technology Division

TIMS Web Industry Administrator Guide United States Department of the Interior Information Technology Division TIMS Web Industry Administrator Guide United States Department of the Interior Information Technology Division August 2012 https://timsweb.bsee.gov Introduction... 1 What is TIMS Web... 1 WebCenter Spaces...

More information

Threat Modeling. Categorizing the nature and severity of system vulnerabilities. John B. Dickson, CISSP

Threat Modeling. Categorizing the nature and severity of system vulnerabilities. John B. Dickson, CISSP Threat Modeling Categorizing the nature and severity of system vulnerabilities John B. Dickson, CISSP What is Threat Modeling? Structured approach to identifying, quantifying, and addressing threats. Threat

More information

A SQL Injection : Internal Investigation of Injection, Detection and Prevention of SQL Injection Attacks

A SQL Injection : Internal Investigation of Injection, Detection and Prevention of SQL Injection Attacks A SQL Injection : Internal Investigation of Injection, Detection and Prevention of SQL Injection Attacks Abhay K. Kolhe Faculty, Dept. Of Computer Engineering MPSTME, NMIMS Mumbai, India Pratik Adhikari

More information

Guidelines for Installing SQL Server and Client (SQL Server Management Studio)

Guidelines for Installing SQL Server and Client (SQL Server Management Studio) Guidelines for Installing SQL Server and Client (SQL Server Management Studio) Installing process is pretty straightforward. Any Express version would be ok with writing SQL part of the course, but Stored

More information

Linked Lists: Implementation Sequences in the C++ STL

Linked Lists: Implementation Sequences in the C++ STL Linked Lists: Implementation Sequences in the C++ STL continued CS 311 Data Structures and Algorithms Lecture Slides Wednesday, April 1, 2009 Glenn G. Chappell Department of Computer Science University

More information

CHAPTER 5 INTELLIGENT TECHNIQUES TO PREVENT SQL INJECTION ATTACKS

CHAPTER 5 INTELLIGENT TECHNIQUES TO PREVENT SQL INJECTION ATTACKS 66 CHAPTER 5 INTELLIGENT TECHNIQUES TO PREVENT SQL INJECTION ATTACKS 5.1 INTRODUCTION In this research work, two new techniques have been proposed for addressing the problem of SQL injection attacks, one

More information

Sources: On the Web: Slides will be available on:

Sources: On the Web: Slides will be available on: C programming Introduction The basics of algorithms Structure of a C code, compilation step Constant, variable type, variable scope Expression and operators: assignment, arithmetic operators, comparison,

More information

User Manager. Manual for the User Manager Option v.3.0.6. epdq 2014, All rights reserved.

User Manager. Manual for the User Manager Option v.3.0.6. epdq 2014, All rights reserved. Manual for the User Manager Option v.3.0.6 Table of Contents 1 What is the... User Manager? 4 1.1 Benefits 1.2 Access... 4... 4 1.3 Number of users... 4 2 User Profiles... and User Types 5 2.1 User profiles...

More information

Cisco ISE Command-Line Interface

Cisco ISE Command-Line Interface This chapter provides information on the Cisco Identity Services Engine (Cisco ISE) command-line interface (CLI) that you can use to configure and maintain Cisco ISE. Cisco ISE Administration and Configuration

More information

Graduate Assessment Test (Sample)

Graduate Assessment Test (Sample) Graduate Assessment Test (Sample) CS201-203 1. Fibonacci sequence is defined by a recurrence relation. The series is: 0,1,1,2,3,5,8,13,... Write a complete recursive method/function that returns the fibonacci

More information

Binary storage of graphs and related data

Binary storage of graphs and related data EÖTVÖS LORÁND UNIVERSITY Faculty of Informatics Department of Algorithms and their Applications Binary storage of graphs and related data BSc thesis Author: Frantisek Csajka full-time student Informatics

More information

Developing an ODBC C++ Client with MySQL Database

Developing an ODBC C++ Client with MySQL Database Developing an ODBC C++ Client with MySQL Database Author: Rajinder Yadav Date: Aug 21, 2007 Web: http://devmentor.org Email: rajinder@devmentor.org Assumptions I am going to assume you already know how

More information

Object Oriented Software Design II

Object Oriented Software Design II Object Oriented Software Design II Real Application Design Christian Nastasi http://retis.sssup.it/~lipari http://retis.sssup.it/~chris/cpp Scuola Superiore Sant Anna Pisa April 25, 2012 C. Nastasi (Scuola

More information

Virtual Code Authentication User s Guide. June 25, 2015

Virtual Code Authentication User s Guide. June 25, 2015 Virtual Code Authentication User s Guide June 25, 2015 Virtual Code Authentication User s Guide Overview of New Security Modern technologies call for higher security standards as practiced among many other

More information

Compiling CAO: from Cryptographic Specifications to C Implementations

Compiling CAO: from Cryptographic Specifications to C Implementations Compiling CAO: from Cryptographic Specifications to C Implementations Manuel Barbosa David Castro Paulo Silva HASLab/INESC TEC Universidade do Minho Braga, Portugal April 8, 2014 Grenoble Motivation Developing

More information

C++ INTERVIEW QUESTIONS

C++ INTERVIEW QUESTIONS C++ INTERVIEW QUESTIONS http://www.tutorialspoint.com/cplusplus/cpp_interview_questions.htm Copyright tutorialspoint.com Dear readers, these C++ Interview Questions have been designed specially to get

More information

Course Name: ADVANCE COURSE IN SOFTWARE DEVELOPMENT (Specialization:.Net Technologies)

Course Name: ADVANCE COURSE IN SOFTWARE DEVELOPMENT (Specialization:.Net Technologies) Course Name: ADVANCE COURSE IN SOFTWARE DEVELOPMENT (Specialization:.Net Technologies) Duration of Course: 6 Months Fees: Rs. 25,000/- (including Service Tax) Eligibility: B.E./B.Tech., M.Sc.(IT/ computer

More information

MySQL Manager. User Guide. July 2012

MySQL Manager. User Guide. July 2012 July 2012 MySQL Manager User Guide Welcome to AT&T Website Solutions SM We are focused on providing you the very best web hosting service including all the tools necessary to establish and maintain a successful

More information

Napster and Gnutella: a Comparison of two Popular Peer-to-Peer Protocols. Anthony J. Howe Supervisor: Dr. Mantis Cheng University of Victoria

Napster and Gnutella: a Comparison of two Popular Peer-to-Peer Protocols. Anthony J. Howe Supervisor: Dr. Mantis Cheng University of Victoria Napster and Gnutella: a Comparison of two Popular Peer-to-Peer Protocols Anthony J Howe Supervisor: Dr Mantis Cheng University of Victoria February 28, 2002 Abstract This article presents the reverse engineered

More information

INDIVIDUAL MASTERY for: St#: 1153366 Test: CH 9 Acceleration Test on 29/07/2015 Grade: B Score: 85.37 % (35.00 of 41.00)

INDIVIDUAL MASTERY for: St#: 1153366 Test: CH 9 Acceleration Test on 29/07/2015 Grade: B Score: 85.37 % (35.00 of 41.00) INDIVIDUAL MASTERY for: St#: 1153366 Grade: B Score: 85.37 % (35.00 of 41.00) INDIVIDUAL MASTERY for: St#: 1346350 Grade: I Score: 21.95 % (9.00 of 41.00) INDIVIDUAL MASTERY for: St#: 1350672 Grade: A

More information

INDIVIDUAL MASTERY for: St#: 1141027 Test: CH 9 Acceleration Test on 09/06/2015 Grade: A Score: 92.68 % (38.00 of 41.00)

INDIVIDUAL MASTERY for: St#: 1141027 Test: CH 9 Acceleration Test on 09/06/2015 Grade: A Score: 92.68 % (38.00 of 41.00) INDIVIDUAL MASTERY for: St#: 1141027 Grade: A Score: 92.68 % (38.00 of 41.00) INDIVIDUAL MASTERY for: St#: 1172998 Grade: B Score: 85.37 % (35.00 of 41.00) INDIVIDUAL MASTERY for: St#: 1232138 Grade: B

More information

User Manual. Learning Management System COMSATS Virtual Campus

User Manual. Learning Management System COMSATS Virtual Campus User Manual Learning Management System COMSATS Virtual Campus Table of Contents Overview... 3 The LMS Home Screen... 4 The Main Menu bar... 4 1. LMS Home:... 4 2. About LMS:... 4 3. Contacts:... 4 4. Login

More information

Python Programming: An Introduction to Computer Science

Python Programming: An Introduction to Computer Science Python Programming: An Introduction to Computer Science Sequences: Strings and Lists Python Programming, 2/e 1 Objectives To understand the string data type and how strings are represented in the computer.

More information

Protocols for Dummies

Protocols for Dummies Protocols for Dummies Part 1: SMB Family March 20, 2014 Peter Murray Senior Product Specialist Housekeeping Items Ask Questions Ask questions throughout the presentation by typing them into the chat area

More information

A Guide to Connecting to FreePBX

A Guide to Connecting to FreePBX A Guide to Connecting to FreePBX FreePBX is a basic web Graphical User Interface that manages Asterisk PBX. It includes many features available in other PBX systems such as voice mail, conference calling,

More information

Setting up single signon with Zendesk Remote Authentication

Setting up single signon with Zendesk Remote Authentication Setting up single signon with Zendesk Remote Authentication Zendesk Inc. 2 Zendesk Developer Library Introduction Notice Copyright and trademark notice Copyright 2009 2013 Zendesk, Inc. All rights reserved.

More information

Logging. Working with the POCO logging framework.

Logging. Working with the POCO logging framework. Logging Working with the POCO logging framework. Overview > Messages, Loggers and Channels > Formatting > Performance Considerations Logging Architecture Message Logger Channel Log File Logging Architecture

More information

Strathmore Elementary Renaissance Place Teacher s Guide. Table of Contents. How do I sign on to Renaissance Place? (teacher account)...

Strathmore Elementary Renaissance Place Teacher s Guide. Table of Contents. How do I sign on to Renaissance Place? (teacher account)... Table of Contents How do I sign on to Renaissance Place? (teacher account)... 2 How do students sign on to Renaissance Place?... 2 How do I print my students user names and passwords?... 2 How do I unlock

More information

Horizon Debt Collect. User s and Administrator s Guide

Horizon Debt Collect. User s and Administrator s Guide Horizon Debt Collect User s and Administrator s Guide Microsoft, Windows, Windows NT, Windows 2000, Windows XP, and SQL Server are registered trademarks of Microsoft Corporation. Sybase is a registered

More information

1.0 November 23, 2015 Version for user review

1.0 November 23, 2015 Version for user review Prepared by: Applications Support Help Desk Version: 1.0 Date: November 23, 2015 Disclosure Information The information in this document may not be changed without the express written agreement of both

More information

ATEA eshop. Basic Administration Guide

ATEA eshop. Basic Administration Guide Basic Administration Guide Contents Introduction... 3 Audience... 3 Document Location... 3 Special information... 3 1. Login... 4 2. Managing users... 5 3. Increase or decrease licenses... 6 4. Upgrade/Downgrade

More information

Database 10g Edition: All possible 10g features, either bundled or available at additional cost.

Database 10g Edition: All possible 10g features, either bundled or available at additional cost. Concepts Oracle Corporation offers a wide variety of products. The Oracle Database 10g, the product this exam focuses on, is the centerpiece of the Oracle product set. The "g" in "10g" stands for the Grid

More information

Integrating the C++ Standard Template Library Into the Undergraduate Computer Science Curriculum

Integrating the C++ Standard Template Library Into the Undergraduate Computer Science Curriculum Integrating the C++ Standard Template Library Into the Undergraduate Computer Science Curriculum James P. Kelsh James.Kelsh@cmich.edu Roger Y. Lee lee@cps.cmich.edu Department of Computer Science Central

More information

Understanding Sql Injection

Understanding Sql Injection Understanding Sql Injection Hardik Shah Understanding SQL Injection Introduction: SQL injection is a technique used by a malicious user to gain illegal access on the remote machines through the web applications

More information

Report on the Train Ticketing System

Report on the Train Ticketing System Report on the Train Ticketing System Author: Zaobo He, Bing Jiang, Zhuojun Duan 1.Introduction... 2 1.1 Intentions... 2 1.2 Background... 2 2. Overview of the Tasks... 3 2.1 Modules of the system... 3

More information

Object-Oriented Desin and Prorammin C++ Container Classes Outline Introduction Container Class Objectives Class Library Architecture Parameterized Types Preprocessor Macros enclass void Pointer Method

More information

Cloud Elements ecommerce Hub Provisioning Guide API Version 2.0 BETA

Cloud Elements ecommerce Hub Provisioning Guide API Version 2.0 BETA Cloud Elements ecommerce Hub Provisioning Guide API Version 2.0 BETA Page 1 Introduction The ecommerce Hub provides a uniform API to allow applications to use various endpoints such as Shopify. The following

More information

Answers to Review Questions Chapter 7

Answers to Review Questions Chapter 7 Answers to Review Questions Chapter 7 1. The size declarator is used in a definition of an array to indicate the number of elements the array will have. A subscript is used to access a specific element

More information

Registrar Ramp Up Process. Prepared by Afilias

Registrar Ramp Up Process. Prepared by Afilias Registrar Ramp Up Process Prepared by Afilias December 2013 Contents Introduction... 2 Get Started By Having Someone Contact You... 2 Become a Registrar... 3 Step One Business and Legal Process... 3 Step

More information

SECURING APACHE : THE BASICS - III

SECURING APACHE : THE BASICS - III SECURING APACHE : THE BASICS - III Securing your applications learn how break-ins occur Shown in Figure 2 is a typical client-server Web architecture, which also indicates various attack vectors, or ways

More information

Introduction to Programming System Design. CSCI 455x (4 Units)

Introduction to Programming System Design. CSCI 455x (4 Units) Introduction to Programming System Design CSCI 455x (4 Units) Description This course covers programming in Java and C++. Topics include review of basic programming concepts such as control structures,

More information

Curriculum Map. Discipline: Computer Science Course: C++

Curriculum Map. Discipline: Computer Science Course: C++ Curriculum Map Discipline: Computer Science Course: C++ August/September: How can computer programs make problem solving easier and more efficient? In what order does a computer execute the lines of code

More information

An API for Reading the MySQL Binary Log

An API for Reading the MySQL Binary Log An API for Reading the MySQL Binary Log Mats Kindahl Lead Software Engineer, MySQL Replication & Utilities Lars Thalmann Development Director, MySQL Replication, Backup & Connectors

More information

Operating System Structure

Operating System Structure Operating System Structure Lecture 3 Disclaimer: some slides are adopted from the book authors slides with permission Recap Computer architecture CPU, memory, disk, I/O devices Memory hierarchy Architectural

More information

CBM Archives State Office of Administrative Hearings (SOAH): Document Upload System

CBM Archives State Office of Administrative Hearings (SOAH): Document Upload System CBM Archives State Office of Administrative Hearings (SOAH): Document Upload System User Guide August, 2010 Table of Contents Introduction... 3 Getting Started... 3 Logging in... 3 User Registration...

More information

Help with Primo. How do I..

Help with Primo. How do I.. Help with Primo What is Primo? Primo is a search tool that allows you to find and access a wide range of print and electronic resources provided by the CCC libraries. No more searching separate places

More information

Criteria for web application security check. Version 2015.1

Criteria for web application security check. Version 2015.1 Criteria for web application security check Version 2015.1 i Content Introduction... iii ISC- P- 001 ISC- P- 001.1 ISC- P- 001.2 ISC- P- 001.3 ISC- P- 001.4 ISC- P- 001.5 ISC- P- 001.6 ISC- P- 001.7 ISC-

More information

Fahad H.Alshammari, Rami Alnaqeib, M.A.Zaidan, Ali K.Hmood, B.B.Zaidan, A.A.Zaidan

Fahad H.Alshammari, Rami Alnaqeib, M.A.Zaidan, Ali K.Hmood, B.B.Zaidan, A.A.Zaidan WWW.JOURNALOFCOMPUTING.ORG 85 New Quantitative Study for Dissertations Repository System Fahad H.Alshammari, Rami Alnaqeib, M.A.Zaidan, Ali K.Hmood, B.B.Zaidan, A.A.Zaidan Abstract In the age of technology,

More information

PageScope Router. Version 1.5. Configuration Guide

PageScope Router. Version 1.5. Configuration Guide PageScope Router Version 1.5 Configuration Guide Table of Contents TABLE OF CONTENTS... 2 1. Introduction...3 1.1 IP Address and Domain Name...3 2. Sending Files to PageScope Router...4 2.1 MFP Device

More information

SecureLock Tool Functions:

SecureLock Tool Functions: The SecureLock utility allows users to manage the Axiom EHP Flash disk by setting passwords to the secure partition and adjust the partition size. This guide will illustrate the steps required in order

More information

Java (12 Weeks) Introduction to Java Programming Language

Java (12 Weeks) Introduction to Java Programming Language Java (12 Weeks) Topic Lecture No. Introduction to Java Programming Language 1 An Introduction to Java o Java as a Programming Platform, The Java "White Paper" Buzzwords, Java and the Internet, A Short

More information

Design Document Inventory App

Design Document Inventory App Design Document Inventory App Student: Keith Mullins Supervisor: Nigel Whyte Student ID: C00118202 1 Contents Introduction... 3 Scope... 4 Overview... 4 Use Case Diagram... 5 Class Diagram... 6 Use Cases...

More information

Designing and Implementing an Online Bookstore Website

Designing and Implementing an Online Bookstore Website KEMI-TORNIO UNIVERSITY OF APPLIED SCIENCES TECHNOLOGY Cha Li Designing and Implementing an Online Bookstore Website The Bachelor s Thesis Information Technology programme Kemi 2011 Cha Li BACHELOR S THESIS

More information

Passing 1D arrays to functions.

Passing 1D arrays to functions. Passing 1D arrays to functions. In C++ arrays can only be reference parameters. It is not possible to pass an array by value. Therefore, the ampersand (&) is omitted. What is actually passed to the function,

More information

Specific Simple Network Management Tools

Specific Simple Network Management Tools Specific Simple Network Management Tools Jürgen Schönwälder University of Osnabrück Albrechtstr. 28 49069 Osnabrück, Germany Tel.: +49 541 969 2483 Email: Web:

More information

Topic Completing the Insure Montana Tax Credit Business annual online Program Renewal

Topic Completing the Insure Montana Tax Credit Business annual online Program Renewal 840 Helena Ave Helena, MT 59601 Toll Free: (800) 332-6148 Fax: (406) 444-3435 Email: insuremt@mt.gov Topic Completing the Insure Montana Tax Credit Business annual online Program Renewal Your business

More information

econtrol 3.5 for Active Directory & Exchange Self-Service Guide

econtrol 3.5 for Active Directory & Exchange Self-Service Guide econtrol 3.5 for Active Directory & Exchange Self-Service Guide This Guide Welcome to the econtrol 3.5 for Active Directory and Exchange Self-Service Guide. This guide is econtrol end-users who have been

More information

eg Enterprise v5.2 Clariion SAN storage system eg Enterprise v5.6

eg Enterprise v5.2 Clariion SAN storage system eg Enterprise v5.6 EMC Configuring Clariion and SAN and Monitoring Monitoring storage an system EMC an eg Enterprise v5.2 Clariion SAN storage system eg Enterprise v5.6 Restricted Rights Legend The information contained

More information

Open Directory. Contents. Before You Start 2. Configuring Rumpus 3. Testing Accessible Directory Service Access 4. Specifying Home Folders 4

Open Directory. Contents. Before You Start 2. Configuring Rumpus 3. Testing Accessible Directory Service Access 4. Specifying Home Folders 4 Contents Before You Start 2 Configuring Rumpus 3 Testing Accessible Directory Service Access 4 Specifying Home Folders 4 Open Directory Groups 6 Maxum Development Corp. Before You Start Open Directory

More information

VoIP Probe 3.4. Functions, Parameters & Metrics for integration with HP Business Availability Center via HP Business Process Monitor

VoIP Probe 3.4. Functions, Parameters & Metrics for integration with HP Business Availability Center via HP Business Process Monitor VoIP Probe 3.4 Functions, Parameters & Metrics for integration with HP Business Availability Center via HP Business Process Monitor ADVENAGE GmbH Blumenhagenstr. 10 D-30167 Hannover Germany March 2010

More information

White Paper. Blindfolded SQL Injection

White Paper. Blindfolded SQL Injection White Paper In the past few years, SQL Injection attacks have been on the rise. The increase in the number of Database based applications, combined with various publications that explain the problem and

More information

ASCII Encoding. The char Type. Manipulating Characters. Manipulating Characters

ASCII Encoding. The char Type. Manipulating Characters. Manipulating Characters The char Type ASCII Encoding The C char type stores small integers. It is usually 8 bits. char variables guaranteed to be able to hold integers 0.. +127. char variables mostly used to store characters

More information