Download the free version of software Zap-Test (automated application testing (if you had any difficulties to download this software, you may ask a copy from your lecturer). A1) Research and write a brief statement about the background of Zap-Test Platform A2) Research and Document all the installation environments required for this software platform A3) Document and explain all steps from download to installation of the platf...
Fit to Sit Policy and Plagiarism DeclarationThe University operates a fit to sit policy whereby you, in submitting or presenting yourself for an assessment, are declaring that you are fit to sit the assessment. You cannot subsequently claim that your performance in this assessment was affected by extenuating factors. By submitting this assessment, you declare that it is your own work and that the sources of information and material you have...
Problem DescriptionFor this assessment, you are asked to optimise two functions (problems) using genetic algorithms. The assessment will be marked by machine. It is therefore very important that you follow the instructions given to you very carefully. Failure to do so will result in substantial loss of marks, even zero. The first problem is a black box function that takes 20 real-valued numbers as input. The function has a unique minimu...
Step 1: Set name and email addressTask 1: Preliminary Work for Setting up the Git Repository and Project1.If you have not done already, set your name and email address as instructed in the Eclipse EGit Tutorial: Task 1: Initial Setup section.2.Createa local Git repository (if one is not available in your eclipse environment).3.Create a new Java project named A1_(for example A1_300321321).4.Add the newly created project to your local Git reposito...
Module Learning Outcomes assessed in this piece of courseworkModule Learning Outcomes assessed in this piece of coursework ·Build a complex business application that satisfies an architectural design using a service oriented component technology. ·Evaluate the strengths and weaknesses of service oriented and component technologies. Assignment Brief and assessment criteria (these will be discussed within a formally timetabled ...
Academic IntegrityAcademic Integrity Statement: You must adhere to the university regulations on academic conduct. Formal inquiry proceedings will be instigated if there is any suspicion of plagiarism or any other form of misconduct in your work. Refer to the University’s Assessment Regulations for Northumbria Awards if you are unclear as to the meaning of these terms. The latest copy is available on the University website. ·&nb...
Title and Purpose1.Title: a paragraph clearlystating title, author, date, file names, and one-line statement of purpose.2.Requirements/Specification: a paragraph giving a brief account of what the program is supposed to do. State any assumptions or conditions on the form of input and expected output.3.User Guide: include clear instructions on how to compile and run the program, and how to use the program during execution.4.Structure/Design/Algor...
BackgroundUpdated submission date to 06 November 2020Title:Nodejs programingof Amazon Alexa Skill for Data and Informationof Coronavirus Pandemic BackgroundThis is a programming project to develop real world application of Voice User Interfacebased on Amazon Alexa. The objective of the project is to ensure studentsunderstand and experience the wide concept of intelligence system design, including internetproto...
Academic Integrity Statement Academic Integrity Statement: You must adhere to the university regulations on academic conduct. Formal inquiry proceedings will be instigated if there is any suspicion of plagiarism or any other form of misconduct in your work. Refer to the University’s Assessment Regulations for Northumbria Awards if you are unclear as to the meaning of these terms. The latest copy is available on the University websit...
QuestionCritically analyse architectural styles of software systems and evaluate the role of software architecture in the design and evolution of software. Submission of research report. To include in-depth background analysis. Apply the principles of software architecture construction particularly using component and service oriented programming. Submission of research report. To include detailed analysis of component oriented arc...
App ScenarioApp ScenarioThe Android app is for a company called “Tuck Box”. This company is looking to provide a lunch delivery service for customers in Palmerston North, Feilding, Ashhurst, and Longburn. Tuck Boxwill initially offer 4 different meals options for customers to select from. There will be some customisation allowed for the options:-Green Salad Lunch (Dressing Choices: none / ranch / vinaigrette)-Lamb Korma (Spices Choic...
How frequently is the water jet cutter used each month?SF&AT’s Technical Services Manager, Mr Sean Rasmussen, wants to know the following:•How frequently is the water jet cutter used eachmonth?•What day of the week is the water jet cutter most used on?•What is the shortest, average, and longest times the water jet cutter is operated foreach month?•What is the smallest, average, and largestamount of garnet usedeach m...
Define the Subscription classDefine the Subscription class.Write a function named Q1b() and include statements for these steps:(ii)Create TWO (2)Subscription objectsfor Today’s Newcurrently at $34.90 for printed version. (iii)Display the detail of subscription 1 and the name of newspaper for subscription 2.(iv)Increase the monthly subscription rate for the newspaperfor subscription1 for print version to 37.50, and then change the version ...
TasksTasks?Refactor or re-use your project started in assignment 1 to meetthe following requirements:oProjecthas a layered design and implementatione.g. Presentation, Business, and Persistence with record-objects (also known as Model or Entity objects) or uses a Model View Controller framework.For example,all user interactions are via the Presentation Layer, the sequential data structure in memory is within the Business Layer, and the File-IO is...
Knowledge and UnderstandingKnowledge and Understanding: 1. Demonstrate knowledge and critical understanding of the essential facts, concepts, principles, theories, challenges and techniques for developing software applications in the fields of Cybersecurity, Computer Forensics or Computer Networking. 2. Apply knowledge and understanding of techniques and tools to solve complex computerbased problems. Intellectual / Professional skill...