LECTURE 17: LIBRARY CASE STUDY. Software Engineering Mike Wooldridge
|
|
|
- Wilfred Watson
- 9 years ago
- Views:
Transcription
1 LECTURE 17: LIBRARY CASE STUDY Mike Wooldridge
2 1 A Library Management System In this lecture, we specify a simple library system. Operations: check out a book; return a book; add a book to library; remove book from library; get list of books by author or subject area; get list of books checked out by particular borrower; Mike Wooldridge 1
3 All books must either be checked out or available for check out. No book may be simultaneously checked out and available. There is an upper limit to number of books that may be checked out. Mike Wooldridge 2
4 1.1 Types We need sets for: all possible books; all possible copies of books; all possible people; all possible authors; all possible subjects; the various reports that may be produced. So parachute in: [BOOK, COPY, PERSON, AUTHOR, SUBJECT, REPORT] Mike Wooldridge 3
5 1.2 State Space The state space is describes in several steps. First, a schema containing information relating to books in the library. ParaLibrary instance of : COPY BOOK written by : BOOK IP AUTHOR about : BOOK IP SUBJECT dom written by ran instance of dom about ran instance of Mike Wooldridge 4
6 instance of tells us what book a copy is an instance of; the set ran instance of is the set of all books in the library; written by tells us who a book is written by; there may be more than one author, hence the powerset operation; there may be no authors; about tells us the subjects a book is about; there may be no subjects; first invariant tells us that we only know who wrote books in the library; second invariant tells us that we only know subjects of books in the library. Mike Wooldridge 5
7 The database part of the schema is as follows: LibraryDB borrower, staff : IP PERSON available, out : IP COPY borrowed by : COPY PERSON borrower staff = available out = dom borrowed by = out ran borrowed by borrower p : borrower #borrowed by ( {p} ) MaxCopies Mike Wooldridge 6
8 borrower is the set of all borrowers known to the system; staff is the set of all staff known to the system; available is the set of all available books; out is the set of borrowed books (i.e., ones that have been checked out); borrowed by tells us who borrowed the books out on loan. Mike Wooldridge 7
9 1st invariant tells us that a person cannot be both a borrower and a staff; 2nd invariant tells us that books cannot be both available and checked out; 3rd invariant tells us that the only books appear have been borrowed by someone are those that are out; 4th invariant tells us that books can only be borrowed by borrowers; 5th invariant tells us that a borrower can only have out up to the maximum number of books. Mike Wooldridge 8
10 The library state space is then as follows: Library ParaLibrary LibraryDB dom instance of = available out the only invariant in this schema tells us that the library does not know anything about books which are not in stock. Mike Wooldridge 9
11 1.3 The Operations We assume initialisation operations; these are trivial. First we look at checking out books... Inputs: person name (n?) and copy (c?). CheckOut Library n? : PERSON c? : COPY n? borrower c? available #borrowed by ( {n?} ) < MaxCopies available = available \ {c?} out = out {c?} borrowed by = borrowed by {c? n?} Mike Wooldridge 10
12 (Note that f is the inverse of f.) 1st precondition is that the person trying to borrow must be a known borrower; 2nd precondition is that the book must be available; 3rd precondition is that the person trying to borrow must have out fewer than the maximum number of books available; the postconditions define the changes made to available, out and borrowed by. Mike Wooldridge 11
13 1.4 Returning a Book One input: the copy to be returned. Return Library c? : COPY c? out available = available {c?} out = out \ {c?} borrowed by = {c?} borrowed by Mike Wooldridge 12
14 precondition states that the book can only be returned if it is out; 1st post-condition says that the book is available after the operation; 2nd post-condition says that the book is no longer out; 3rd post-condition uses domain subtraction to remove the correct record from the borrowed by function. For example, borrowed by = {b01 mjw, b02 en, b03 mjw} {b01} borrowed by = {b02 en, b03 mjw} Mike Wooldridge 13
15 1.5 Adding Books to the Library There are two cases to consider: where the book is completely new to the library; where the book is another copy of a book that is already in the library. We have two schemas to capture these two situations: AddNewBook; AddAnotherCopy. Mike Wooldridge 14
16 AddNewBook Library c? : COPY b? : BOOK a? : IP AUTHOR s? : IP SUBJECT b? ran instance of c? available out available = available {c?} instance of = instance of {c? b?} written by = written by {b? a?} about = about {b? s?} Mike Wooldridge 15
17 AddAnotherCopy Library c? : COPY b? : BOOK c? available out b? ran instance of available = available {c?} instance of = instance of {c? b?} Mike Wooldridge 16
18 1.6 Removing Books Removing a books from the library is similarly complicated; once again there are 2 possibilities to consider... removing a book that is the only copy; removing one copy of a book leaving several other copies behind. Two schemas: RemoveOther to remove one of several copies; RemoveLast to remove the last copy. Mike Wooldridge 17
19 RemoveOther Library c? : COPY c? available #(instance of ( {instance of (c?)} )) > 1 available = available \ {c?} Note that there is no need to alter any variables in ParaLibrary; we only change available, to indicate that the book is no longer available. Mike Wooldridge 18
20 RemoveLast Library c? : COPY c? available #(instance of ( {instance of (c?)} )) = 1 available = available \ {c?} instance of = {c?} instance of written by = {instance of (c?)} instance of about = {instance of (c?)} about Mike Wooldridge 19
21 1.7 Interrogating the Database Two options: search by author; search by subject; find out what copies someone has borrowed. Mike Wooldridge 20
22 ByAuthor takes an author name and produces the set of all books that the author appeared in the author list of. ByAuthor ΞLibrary a? : AUTHOR out! : IP BOOK out! = {b : BOOK a? written by(x)} BySubject takes a set of subjects and produces a list of all the books which have these subjects in their about list. BySubject ΞLibrary s? : IP SUBJECT out! : IP BOOK out! = {b : BOOK s? about(b)} Mike Wooldridge 21
23 Finally, finding out who has borrowed what... BooksBorrowedBy ΞLibrary n? : PERSON out! : IP COPY n? borrower out! = borrowed by ( {n?} ) Mike Wooldridge 22
Domain of a Composition
Domain of a Composition Definition Given the function f and g, the composition of f with g is a function defined as (f g)() f(g()). The domain of f g is the set of all real numbers in the domain of g such
160 CHAPTER 4. VECTOR SPACES
160 CHAPTER 4. VECTOR SPACES 4. Rank and Nullity In this section, we look at relationships between the row space, column space, null space of a matrix and its transpose. We will derive fundamental results
Lecture Notes on Linear Search
Lecture Notes on Linear Search 15-122: Principles of Imperative Computation Frank Pfenning Lecture 5 January 29, 2013 1 Introduction One of the fundamental and recurring problems in computer science is
Pigeonhole Principle Solutions
Pigeonhole Principle Solutions 1. Show that if we take n + 1 numbers from the set {1, 2,..., 2n}, then some pair of numbers will have no factors in common. Solution: Note that consecutive numbers (such
South East of Process Main Building / 1F. North East of Process Main Building / 1F. At 14:05 April 16, 2011. Sample not collected
At 14:05 April 16, 2011 At 13:55 April 16, 2011 At 14:20 April 16, 2011 ND ND 3.6E-01 ND ND 3.6E-01 1.3E-01 9.1E-02 5.0E-01 ND 3.7E-02 4.5E-01 ND ND 2.2E-02 ND 3.3E-02 4.5E-01 At 11:37 April 17, 2011 At
Section 2.7 One-to-One Functions and Their Inverses
Section. One-to-One Functions and Their Inverses One-to-One Functions HORIZONTAL LINE TEST: A function is one-to-one if and only if no horizontal line intersects its graph more than once. EXAMPLES: 1.
So let us begin our quest to find the holy grail of real analysis.
1 Section 5.2 The Complete Ordered Field: Purpose of Section We present an axiomatic description of the real numbers as a complete ordered field. The axioms which describe the arithmetic of the real numbers
MATH10212 Linear Algebra. Systems of Linear Equations. Definition. An n-dimensional vector is a row or a column of n numbers (or letters): a 1.
MATH10212 Linear Algebra Textbook: D. Poole, Linear Algebra: A Modern Introduction. Thompson, 2006. ISBN 0-534-40596-7. Systems of Linear Equations Definition. An n-dimensional vector is a row or a column
Lecture 5: Put - Call Parity
Lecture 5: Put - Call Parity Reading: J.C.Hull, Chapter 9 Reminder: basic assumptions 1. There are no arbitrage opportunities, i.e. no party can get a riskless profit. 2. Borrowing and lending are possible
NPV I: Time Value of Money
NPV I: Time Value of Money This module introduces the concept of the time value of money, interest rates, discount rates, the future value of an investment, the present value of a future payment, and the
MATH 140 Lab 4: Probability and the Standard Normal Distribution
MATH 140 Lab 4: Probability and the Standard Normal Distribution Problem 1. Flipping a Coin Problem In this problem, we want to simualte the process of flipping a fair coin 1000 times. Note that the outcomes
Lecture 4: Writing shell scripts
Handout 5 06/03/03 1 Your rst shell script Lecture 4: Writing shell scripts Shell scripts are nothing other than les that contain shell commands that are run when you type the le at the command line. That
Pre-Session Review. Part 2: Mathematics of Finance
Pre-Session Review Part 2: Mathematics of Finance For this section you will need a calculator with logarithmic and exponential function keys (such as log, ln, and x y ) D. Exponential and Logarithmic Functions
TCP/IP Drill Pack. By Donna Warren. Created by Donna P. Warren Revised: 1/2/2012 Page 1 of 19
TCP/IP Drill Pack By Donna Warren Created by Donna P. Warren Revised: 1/2/2012 Page 1 of 19 Drill 1: OSI vs DOD and the TCP/IP Protocol Suite Complete the following chart. On the next page give a brief
Solving Linear Systems, Continued and The Inverse of a Matrix
, Continued and The of a Matrix Calculus III Summer 2013, Session II Monday, July 15, 2013 Agenda 1. The rank of a matrix 2. The inverse of a square matrix Gaussian Gaussian solves a linear system by reducing
Credit Card Loans. Student Worksheet
Student Worksheet Credit Card Loans Name: Recall the formula for simple interest where, I is the interest owed P is the principal amount outstanding r is the interest rate t is the time in years. Note:
3. Mathematical Induction
3. MATHEMATICAL INDUCTION 83 3. Mathematical Induction 3.1. First Principle of Mathematical Induction. Let P (n) be a predicate with domain of discourse (over) the natural numbers N = {0, 1,,...}. If (1)
True or False: A statement of cash flow (SCF) documents the changes in a company s cash position over an accounting period.
ENGM 401 & 620 - X1 Fundamentals of Engineering Finance Fall 2010 Lecture 15: Statement of Cash Flow (2) Let all the learned say what they can, Tis ready money makes the man. -Shakespeare M.G. Lipsett
Life Insurance Buyer s Guide
Page 1 of 5 Life Insurance Buyer s Guide Illinois This guide can show you how to save money when you shop for life insurance. It helps you to: Decide how much life insurance you should buy, Decide what
36 CHAPTER 1. LIMITS AND CONTINUITY. Figure 1.17: At which points is f not continuous?
36 CHAPTER 1. LIMITS AND CONTINUITY 1.3 Continuity Before Calculus became clearly de ned, continuity meant that one could draw the graph of a function without having to lift the pen and pencil. While this
Playing with Numbers
PLAYING WITH NUMBERS 249 Playing with Numbers CHAPTER 16 16.1 Introduction You have studied various types of numbers such as natural numbers, whole numbers, integers and rational numbers. You have also
a 11 x 1 + a 12 x 2 + + a 1n x n = b 1 a 21 x 1 + a 22 x 2 + + a 2n x n = b 2.
Chapter 1 LINEAR EQUATIONS 1.1 Introduction to linear equations A linear equation in n unknowns x 1, x,, x n is an equation of the form a 1 x 1 + a x + + a n x n = b, where a 1, a,..., a n, b are given
Online Shop System Use Case Diagram Report (Demo)
Online Shop System Use Case Diagram Report (Demo) Visual Paradigm International Ltd. Table of Contents initial use case diagram... 4 Revised Use Case Diagram... 7 Table of Figures initial use case diagram...
Lecture Notes on MONEY, BANKING, AND FINANCIAL MARKETS. Peter N. Ireland Department of Economics Boston College. [email protected]
Lecture Notes on MONEY, BANKING, AND FINANCIAL MARKETS Peter N. Ireland Department of Economics Boston College [email protected] http://www2.bc.edu/~irelandp/ec261.html Chapter 16: Determinants of the Money
25 Integers: Addition and Subtraction
25 Integers: Addition and Subtraction Whole numbers and their operations were developed as a direct result of people s need to count. But nowadays many quantitative needs aside from counting require numbers
Case studies: Outline. Requirement Engineering. Case Study: Automated Banking System. UML and Case Studies ITNP090 - Object Oriented Software Design
I. Automated Banking System Case studies: Outline Requirements Engineering: OO and incremental software development 1. case study: withdraw money a. use cases b. identifying class/object (class diagram)
26 Integers: Multiplication, Division, and Order
26 Integers: Multiplication, Division, and Order Integer multiplication and division are extensions of whole number multiplication and division. In multiplying and dividing integers, the one new issue
The normal approximation to the binomial
The normal approximation to the binomial In order for a continuous distribution (like the normal) to be used to approximate a discrete one (like the binomial), a continuity correction should be used. There
Normal Distribution. Definition A continuous random variable has a normal distribution if its probability density. f ( y ) = 1.
Normal Distribution Definition A continuous random variable has a normal distribution if its probability density e -(y -µ Y ) 2 2 / 2 σ function can be written as for < y < as Y f ( y ) = 1 σ Y 2 π Notation:
Pre-Algebra Lecture 6
Pre-Algebra Lecture 6 Today we will discuss Decimals and Percentages. Outline: 1. Decimals 2. Ordering Decimals 3. Rounding Decimals 4. Adding and subtracting Decimals 5. Multiplying and Dividing Decimals
Sequences. A sequence is a list of numbers, or a pattern, which obeys a rule.
Sequences A sequence is a list of numbers, or a pattern, which obeys a rule. Each number in a sequence is called a term. ie the fourth term of the sequence 2, 4, 6, 8, 10, 12... is 8, because it is the
Order of Operations More Essential Practice
Order of Operations More Essential Practice We will be simplifying expressions using the order of operations in this section. Automatic Skill: Order of operations needs to become an automatic skill. Failure
Maths methods Key Stage 2: Year 3 and Year 4
Maths methods Key Stage 2: Year 3 and Year 4 Maths methods and strategies taught in school now are very different from those that many parents learned at school. This can often cause confusion when parents
MATRIX ALGEBRA AND SYSTEMS OF EQUATIONS
MATRIX ALGEBRA AND SYSTEMS OF EQUATIONS Systems of Equations and Matrices Representation of a linear system The general system of m equations in n unknowns can be written a x + a 2 x 2 + + a n x n b a
Introduction to Hypothesis Testing
I. Terms, Concepts. Introduction to Hypothesis Testing A. In general, we do not know the true value of population parameters - they must be estimated. However, we do have hypotheses about what the true
Life Insurance Buyer s Guide
Life Insurance Buyer s Guide This guide can show you how to save money when you shop for life insurance. It helps you to: - Decide how much life insurance you should buy, - Decide what kind of life insurance
6.4 Logarithmic Equations and Inequalities
6.4 Logarithmic Equations and Inequalities 459 6.4 Logarithmic Equations and Inequalities In Section 6.3 we solved equations and inequalities involving exponential functions using one of two basic strategies.
Software Engineering
Software Engineering Lecture 04: The B Specification Method Peter Thiemann University of Freiburg, Germany SS 2013 Peter Thiemann (Univ. Freiburg) Software Engineering SWT 1 / 50 The B specification method
CHAPTER 7 SUGGESTED ANSWERS TO CHAPTER 7 QUESTIONS
INSTRUCTOR S MANUAL: MULTINATIONAL FINANCIAL MANAGEMENT, 9 TH ED. CHAPTER 7 SUGGESTED ANSWERS TO CHAPTER 7 QUESTIONS 1. Answer the following questions based on data in Exhibit 7.5. a. How many Swiss francs
Solving simultaneous equations using the inverse matrix
Solving simultaneous equations using the inverse matrix 8.2 Introduction The power of matrix algebra is seen in the representation of a system of simultaneous linear equations as a matrix equation. Matrix
Loop Invariants and Binary Search
Loop Invariants and Binary Search Chapter 4.3.3 and 9.3.1-1 - Outline Ø Iterative Algorithms, Assertions and Proofs of Correctness Ø Binary Search: A Case Study - 2 - Outline Ø Iterative Algorithms, Assertions
Representation of functions as power series
Representation of functions as power series Dr. Philippe B. Laval Kennesaw State University November 9, 008 Abstract This document is a summary of the theory and techniques used to represent functions
MTH6120 Further Topics in Mathematical Finance Lesson 2
MTH6120 Further Topics in Mathematical Finance Lesson 2 Contents 1.2.3 Non-constant interest rates....................... 15 1.3 Arbitrage and Black-Scholes Theory....................... 16 1.3.1 Informal
Describe the functions of the Federal Reserve System (the Fed).
The Monetary System Chapter CHAPTER CHECKLIST Define money and describe its functions. Money is any commodity or token that is generally accepted as a means of payment. Money serves as a medium of exchange,
The Prime Numbers. Definition. A prime number is a positive integer with exactly two positive divisors.
The Prime Numbers Before starting our study of primes, we record the following important lemma. Recall that integers a, b are said to be relatively prime if gcd(a, b) = 1. Lemma (Euclid s Lemma). If gcd(a,
Sensitivity Analysis 3.1 AN EXAMPLE FOR ANALYSIS
Sensitivity Analysis 3 We have already been introduced to sensitivity analysis in Chapter via the geometry of a simple example. We saw that the values of the decision variables and those of the slack and
Section 1. Inequalities -5-4 -3-2 -1 0 1 2 3 4 5
Worksheet 2.4 Introduction to Inequalities Section 1 Inequalities The sign < stands for less than. It was introduced so that we could write in shorthand things like 3 is less than 5. This becomes 3 < 5.
5. Linear algebra I: dimension
5. Linear algebra I: dimension 5.1 Some simple results 5.2 Bases and dimension 5.3 Homomorphisms and dimension 1. Some simple results Several observations should be made. Once stated explicitly, the proofs
Cubes and Cube Roots
CUBES AND CUBE ROOTS 109 Cubes and Cube Roots CHAPTER 7 7.1 Introduction This is a story about one of India s great mathematical geniuses, S. Ramanujan. Once another famous mathematician Prof. G.H. Hardy
1.2 Solving a System of Linear Equations
1.. SOLVING A SYSTEM OF LINEAR EQUATIONS 1. Solving a System of Linear Equations 1..1 Simple Systems - Basic De nitions As noticed above, the general form of a linear system of m equations in n variables
Life Insurance Buyer's Guide
Life Insurance Buyer's Guide This guide can help you when you shop for life insurance. It discusses how to: Find a Policy That Meets Your Needs and Fits Your Budget Decide How Much Insurance You Need Make
Systems of Linear Equations
Systems of Linear Equations Beifang Chen Systems of linear equations Linear systems A linear equation in variables x, x,, x n is an equation of the form a x + a x + + a n x n = b, where a, a,, a n and
Indicator 2: Use a variety of algebraic concepts and methods to solve equations and inequalities.
3 rd Grade Math Learning Targets Algebra: Indicator 1: Use procedures to transform algebraic expressions. 3.A.1.1. Students are able to explain the relationship between repeated addition and multiplication.
Study Guide for the Middle School Science Test
Study Guide for the Middle School Science Test A PUBLICATION OF ETS Copyright 2008 by Educational Testing Service EDUCATIONAL TESTING SERVICE, ETS, the ETS logo, LISTENING., LEARNING., LEADING., and GRE,
Linear Programming Problems
Linear Programming Problems Linear programming problems come up in many applications. In a linear programming problem, we have a function, called the objective function, which depends linearly on a number
Software Engineering Concepts: Testing. Pointers & Dynamic Allocation. CS 311 Data Structures and Algorithms Lecture Slides Monday, September 14, 2009
Software Engineering Concepts: Testing Simple Class Example continued Pointers & Dynamic Allocation CS 311 Data Structures and Algorithms Lecture Slides Monday, September 14, 2009 Glenn G. Chappell Department
c 2008 Je rey A. Miron We have described the constraints that a consumer faces, i.e., discussed the budget constraint.
Lecture 2b: Utility c 2008 Je rey A. Miron Outline: 1. Introduction 2. Utility: A De nition 3. Monotonic Transformations 4. Cardinal Utility 5. Constructing a Utility Function 6. Examples of Utility Functions
Operation Count; Numerical Linear Algebra
10 Operation Count; Numerical Linear Algebra 10.1 Introduction Many computations are limited simply by the sheer number of required additions, multiplications, or function evaluations. If floating-point
Lecture 2 Mathcad Basics
Operators Lecture 2 Mathcad Basics + Addition, - Subtraction, * Multiplication, / Division, ^ Power ( ) Specify evaluation order Order of Operations ( ) ^ highest level, first priority * / next priority
Linear Algebra Review. Vectors
Linear Algebra Review By Tim K. Marks UCSD Borrows heavily from: Jana Kosecka [email protected] http://cs.gmu.edu/~kosecka/cs682.html Virginia de Sa Cogsci 8F Linear Algebra review UCSD Vectors The length
2 When is a 2-Digit Number the Sum of the Squares of its Digits?
When Does a Number Equal the Sum of the Squares or Cubes of its Digits? An Exposition and a Call for a More elegant Proof 1 Introduction We will look at theorems of the following form: by William Gasarch
CS 3719 (Theory of Computation and Algorithms) Lecture 4
CS 3719 (Theory of Computation and Algorithms) Lecture 4 Antonina Kolokolova January 18, 2012 1 Undecidable languages 1.1 Church-Turing thesis Let s recap how it all started. In 1990, Hilbert stated a
Unit 1 Number Sense. In this unit, students will study repeating decimals, percents, fractions, decimals, and proportions.
Unit 1 Number Sense In this unit, students will study repeating decimals, percents, fractions, decimals, and proportions. BLM Three Types of Percent Problems (p L-34) is a summary BLM for the material
List the elements of the given set that are natural numbers, integers, rational numbers, and irrational numbers. (Enter your answers as commaseparated
MATH 142 Review #1 (4717995) Question 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 Description This is the review for Exam #1. Please work as many problems as possible
Source net: 200.1.1.0 Destination net: 200.1.2.0 Subnet mask: 255.255.255.0 Subnet mask: 255.255.255.0. Router Hub
then to a router. Remember that with a Class C network address, the first 3 octets, or 24 bits, are assigned as the network address. So, these are two different Class C networks. This leaves one octet,
Learn about. How to deposit money. How to make withdrawals and write checks. How to keep track of your money
Cumberland Security Bank s Checking School Learn about How to deposit money How to make withdrawals and write checks How to keep track of your money Depositing Money You can deposit cash and/or checks
Study Guide for the Elementary Education: Content Knowledge Test
Study Guide for the Elementary Education: Content Knowledge Test A PUBLICATION OF ETS Copyright 2011 by Educational Testing Service. All rights reserved. ETS, the ETS logo, GRE, and LISTENING. LEARNING.
Your guide to Using a solicitor
www.lawsociety.org.uk 1 Most of us need expert legal help at some time in our lives. Some of the most common issues are to do with buying a house, getting a divorce or making a will. But you might also
Library ebooks and Your Amazon Kindle (1st or 2nd Generation), Paperwhite, Keyboard, DX or Touch
Library ebooks and Your Amazon Kindle (1st or 2nd Generation), Paperwhite, Keyboard, DX or Touch Library ebooks can be read on your Amazon Kindle. You need a computer with an Internet connection and a
Welcome to Basic Math Skills!
Basic Math Skills Welcome to Basic Math Skills! Most students find the math sections to be the most difficult. Basic Math Skills was designed to give you a refresher on the basics of math. There are lots
Introduction to Matrix Algebra
Psychology 7291: Multivariate Statistics (Carey) 8/27/98 Matrix Algebra - 1 Introduction to Matrix Algebra Definitions: A matrix is a collection of numbers ordered by rows and columns. It is customary
north seattle community college
INTRODUCTION TO FRACTIONS If we divide a whole number into equal parts we get a fraction: For example, this circle is divided into quarters. Three quarters, or, of the circle is shaded. DEFINITIONS: The
Agent-Oriented Software Engineering
ID2209 Distributed Artificial Intelligence and Intelligent Agents Agent-Oriented Software Engineering Mihhail Matskin: www.ict.kth.se/courses/id2209 Autumn 2015 Lecture Outline 1. When is an agent-based
Lesson Plan #2. Performance Objective(s): Given a worksheet of 12 sentences, the 2 nd grade students will identify the action verb 9 out of 12 times.
Lesson Plan #2 Lesson: Action Verb Lesson with Book, Game, and Video Length: 45 minutes Age or Grade Level Intended: 2 nd Grade Source: Taken from www.lessonsnips.com and Emily Gallmeyer Academic Standard(s):
Chapter Three: Income and Careers
Chapter Three: Income and Careers Chapter Learning Objectives 1. Recognize how personal choices, education, training, and other factors affect future income. 2. Identify sources of income including entrepreneurial
Mathematical Induction
Mathematical Induction In logic, we often want to prove that every member of an infinite set has some feature. E.g., we would like to show: N 1 : is a number 1 : has the feature Φ ( x)(n 1 x! 1 x) How
Number Theory. Proof. Suppose otherwise. Then there would be a finite number n of primes, which we may
Number Theory Divisibility and Primes Definition. If a and b are integers and there is some integer c such that a = b c, then we say that b divides a or is a factor or divisor of a and write b a. Definition
Lab 10.3.5a Basic Subnetting
Lab 10.3.5a Basic Subnetting Objective How to identify reasons to use a subnet mask How to distinguish between a default subnet mask and a custom subnet mask What given requirements determine the subnet
Chapter Four: Saving and Investing
Chapter Four: Saving and Investing Chapter Learning Objectives 1. Compare advantages and disadvantages of saving early versus saving later. 2. Explain the importance of short-term and long-term saving
From Business Event to BUC
From Business Event to BUC This is the third article in a series that explains the thinking behind the Volere 1 requirements techniques. Subsequent articles will explore various aspects of applying these
Significant Figures, Propagation of Error, Graphs and Graphing
Chapter Two Significant Figures, Propagation of Error, Graphs and Graphing Every measurement has an error associated with it. If you were to put an object on a balance and weight it several times you will
12. Transformers, Impedance Matching and Maximum Power Transfer
1 1. Transformers, Impedance Matching and Maximum Power Transfer Introduction The transformer is a device that takes AC at one voltage and transforms it into another voltage either higher or lower than
COMP 250 Fall 2012 lecture 2 binary representations Sept. 11, 2012
Binary numbers The reason humans represent numbers using decimal (the ten digits from 0,1,... 9) is that we have ten fingers. There is no other reason than that. There is nothing special otherwise about
Logistics. Software Testing. Logistics. Logistics. Plan for this week. Before we begin. Project. Final exam. Questions?
Logistics Project Part 3 (block) due Sunday, Oct 30 Feedback by Monday Logistics Project Part 4 (clock variant) due Sunday, Nov 13 th Individual submission Recommended: Submit by Nov 6 th Scoring Functionality
Section V.3: Dot Product
Section V.3: Dot Product Introduction So far we have looked at operations on a single vector. There are a number of ways to combine two vectors. Vector addition and subtraction will not be covered here,
Example 1. Consider the following two portfolios: 2. Buy one c(s(t), 20, τ, r) and sell one c(s(t), 10, τ, r).
Chapter 4 Put-Call Parity 1 Bull and Bear Financial analysts use words such as bull and bear to describe the trend in stock markets. Generally speaking, a bull market is characterized by rising prices.
2.1 The Present Value of an Annuity
2.1 The Present Value of an Annuity One example of a fixed annuity is an agreement to pay someone a fixed amount x for N periods (commonly months or years), e.g. a fixed pension It is assumed that the
Part 1 Expressions, Equations, and Inequalities: Simplifying and Solving
Section 7 Algebraic Manipulations and Solving Part 1 Expressions, Equations, and Inequalities: Simplifying and Solving Before launching into the mathematics, let s take a moment to talk about the words
IP Subnetting Colin Weaver, ITdojo
IP Subnetting Colin Weaver, ITdojo Note: This document assumes that subnet zero is NOT used. For a description of subnet-zero, go here (http://www.cisco.com/warp/public/105/40.html). Subnetting IP networks
Quotes from Object-Oriented Software Construction
Quotes from Object-Oriented Software Construction Bertrand Meyer Prentice-Hall, 1988 Preface, p. xiv We study the object-oriented approach as a set of principles, methods and tools which can be instrumental
ECON 459 Game Theory. Lecture Notes Auctions. Luca Anderlini Spring 2015
ECON 459 Game Theory Lecture Notes Auctions Luca Anderlini Spring 2015 These notes have been used before. If you can still spot any errors or have any suggestions for improvement, please let me know. 1
Borrowing NWRLS ebooks with your Kindle No Software to download! No USB cable required if you have Wi-Fi!
Borrowing NWRLS ebooks with your Kindle No Software to download! No USB cable required if you have Wi-Fi! What you will need: An Amazon Kindle, or a device with the Kindle app A computer to checkout your
Microsoft Access XP Session 1 Week 8
Creating a Database Click-on the Start button in the lower left corner of the screen, then click-on Programs, and then click-on Microsoft Access. New File The Access XP New File Task Pane will appear on
Chapter 4: Design Principles I: Correctness and Robustness
Chapter 4: Design Principles I: Correctness and Robustness King Fahd University of Petroleum & Minerals SWE 316: Software Design & Architecture Semester: 072 Objectives To introduce two design principles
Intro to Simulation (using Excel)
Intro to Simulation (using Excel) DSC340 Mike Pangburn Generating random numbers in Excel Excel has a RAND() function for generating random numbers The numbers are really coming from a formula and hence
Expert Reference Series of White Papers. Solving the Mysteries of Subnetting 1-800-COURSES. www.globalknowledge.com
Expert Reference Series of White Papers Solving the Mysteries of Subnetting 1-800-COURSES www.globalknowledge.com Solving the Mysteries of Subnetting Raj Tolani, Global Knowledge Instructor Introduction
