assignment booklet - transtutors€¦ · attention students/staff if you copy and or reprodue...
TRANSCRIPT
Reg. No. : 2000/000752/07
MAIN CAMPUS 292 SMITH STREET
DURBAN 4000
FACULTY OF INFORMATION TECHNOLOGY
DIPOMA IN INFORMATION TECHNOLOGY (3 Year) 2ND YEARS
ASSIGNMENT BOOKLET
Registered with the Department of Education as a Private Higher Education Institution under
the Higher Education Act, 1997. Registration Certification No. 2000/HE07/008
MODULE DUE DATE SIGNATURE
COMPULSORY MODULES
Information Systems 622 22 August 2018
Programming 622 22 August 2018
Data Base Systems 522 25 September 2018
M-Commerce 522 25 September 2018
Internet Programming 622 02 October 2018
Business Management 622
02 October 2018
Networks 622
02 October 2018
ATTENTION STUDENTS/STAFF
If you COPY AND OR REPRODUCE SOMEBODY ELSE’S WORK WITHOUT REFERENCING, your
assignment will be penalized by 30%.
TO AVOID BEING PENALISED IN YOUR ASSIGNMENTS DO NOT
Copy and paste information from the internet and on-line media, such as
encyclopedias or journal articles without acknowledging the source of
information (Referencing).
Transcribe information from any textbook, encyclopedia, newspaper,
journal articles, without acknowledging the source of information
(Referencing)
Modify information without acknowledging the source of information
(Referencing)
Use photographs, videos, or audio without permission or acknowledgement
Get other people to write your assignment
Buy assignments and submit them as your own effort
Use previous work for a new assignment without citing the original
assignment in your reference list.
Types of Student Plagiarism
Academic Integrity
Good academic practice is about adopting strategies and behaviour that allow students
to complete their studies independently and honestly, and writing assignments in an
appropriate academic style. The task submitted is also awarded better marks! Bad
academic practice includes dishonesty, cheating and plagiarism and also work that is badly
prepared and rushed.
Direct copying
This sort of plagiarism is taking the exact words somebody else wrote, (in a website, a book,
another student's work, or any other source) and putting that into an assignment, without
referencing that somebody else’s work has been cited.
Word-switching
This sort of plagiarism means taking someone else's writing and changing words here and
there, or taking little bits of sentences, without acknowledging whose ideas have been
adopted.
Concealing sources
Not making it obvious when drawing on somebody else's work will be regarded as
plagiarism. This includes:
Taking somebody else's ideas and putting them into your words without telling us
where you got the ideas.
Using a source several times, but only referencing it once. Using ideas from the same
source several times in a piece of work, requires a citation each time the source is
used.
Working with other students
It is preferable for students to do their assignments themselves. Hence
Copying another student's work is plagiarism.
Submitting all or part of another student's work as your own is plagiarism.
Sharing written work is plagiarism.
Paying somebody to do your work for you is plagiarism.
In an individual assignment, writing the assignment with other people is
plagiarism. (Group assignments are different!).
Asking another student to translate your ideas into English, or getting their help to
write your assignment is plagiarism.
Unless you are told to work in a group, you must work alone. If you want to talk to your
friends about the work, do it before you start writing. The work you submit must be your
own!
When any of the above types are identified, each case will be investigated for:
Intention of student
Degree of plagiarism – how much of the assignment has been plagiarized
Previous offences by the student
RICHFIELD GRADUATE INSTITUTE OF TECHNOLOGY (PTY) LTD FACULTY OF INFORMATION TECHNOLOGY
INFORMATION SYSTEMS 622
2ND SEMESTER ASSIGNMENT Name & Surname: _________________________________ ICAS No: _________________
Qualification: ______________________ Semester: _____ Module Name: __________________________
Date Submitted: ___________
ASSESSMENT CRITERIA MARK
ALLOCATION
EXAMINER
MARKS
MODERATOR
MARKS
MARKS FOR CONTENT
QUESTION ONE
1.1.1 10
1.1.2 10
1.1.3 20
TOTAL MARKS 40
MARKS FOR TECHNICAL ASPECTS
1. TABLE OF CONTENTS 2
2. LAYOUT AND SPELLING 3
3. REFERENCE 5
TOTAL MARKS 10
TOTAL MARKS FOR ASSIGNMENT 50*2 (100)
Examiner’s Comments:
Moderator’s Comments:
Signature of Examiner: Signature of Moderator:
QUESTIONS [50 MARKS]
QUESTIONS ONE [40 MARKS] CASE STUDY
Globally, World Vision supporters/Donors currently sponsor 3.4 million children in almost 100 countries, with over 54,000 children supported in South Africa. World Vision International (NGO) is running many droughts relieve projects around Limpopo Province. It is holding many conferences in many towns and growth points to all stake holders involved in the projects including its own staff members and volunteers. There is a very big need to capture all the information being gathered in those conferences throughout Limpopo Province. A list below shows some of the important aspects
to be compiled.
Every conference has a name and a date that also states the duration after starting.
The stakeholders may attend one or more conferences around the province
For every stakeholder in attendance would supply personal information like name, electronic mail and the conferences they wish to attend?
At each conference venue they are a number of workshop rooms depending on the project type, each room is of fixed capacity. Meeting rooms are labelled with the floor number and meeting room number
Every workshop needs an allocated meeting room; where a workshop lasts for two days, it will use the same room on both days.
Each conference around the province have a specified meeting room, if the conference is going to last for 2 days, automatically it will use the same meeting room for those 2 days.
1.1.1 By using the information above, draw an appropriate ER diagram showing this information, make sure you show suitable relationships that may exists between stakeholders,
conferences, meeting rooms and dates (10) (ii) After critical analysis of the NGO`s conferences, some relevant additions where identified, but not all of these can be included easily on a ER diagram.
Every conference must have a project leader among the conference stakeholders
No stakeholder must register more than one conference on the same day.
All stakeholders must register at least one conference compulsory. (a) Among the additions you have identified, can you list only 3 of them and explain why you
identify them as critical inclusions/additions.
1.1.2 In addition for those 3 additions, integrate them to the new updated ER diagram separately
from part (10) (b) Assume a Database of student’s information are available. It is required to develop a front
end application which will help in
inserting a record,
searching for a record if the registration number is given,
Creating reports containing the name, registration number of the students who have got more than 60%.
1.1.3 Explain clearly how this application will be developed using Open Database Connectivity,
ODBC (20)
TOTAL: 100 MARKS
RICHFIELD GRADUATE INSTITUTE OF TECHNOLOGY (PTY) LTD FACULTY OF INFORMATION TECHNOLOGY
PROGRAMMING 622 (C++)
2ND SEMESTER ASSIGNMENT Name & Surname: _________________________________ ICAS No: _________________ Qualification: ______________________ Semester: _____ Module Name: __________________________ Date Submitted: ___________
ASSESSMENT CRITERIA MARK ALLOCATION
EXAMINER MARKS
MODERATOR MARKS
MARKS FOR CONTENT
QUESTION ONE 50
QUESTION TWO 50
QUESTION THREE
QUESTION FOUR
TOTAL MARKS 100
MARKS FOR TECHNICAL ASPECTS
1. TABLE OF CONTENTS Accurate numbering according to the numbering in text and page numbers.
2. LAYOUT AND SPELLING Font – Calibri 12 Line Spacing – 1.0 Margin should be justified.
3. REFERENCE According to the Harvard Method
TOTAL MARKS
TOTAL MARKS FOR ASSIGNMENT 100 Examiner’s Comments:
Moderator’s Comments:
Signature of Examiner: Signature of Moderator:
QUESTIONS [90 MARKS]
QUESTION 1 50 MARKS
1.1 Write a C++ program that implements a linked list as an abstract data type. The program must:
Be type flexible, that is, could be a list of integers, string, or any type.
allow the user to add members into the list
delete members from the list
make sure the list is still sorted after all the deletion and addition
Show all the function implementation. NB: the addition and deletion of list members should be of the range of 5 – 10 members for each.
QUESTION 2 50 MARKS
2.1. Differentiate a stack from queue. Where would you apply each of those? Show by means of example for both.
TOTAL: 100 MARKS
RICHFIELD GRADUATE INSTITUTE OF TECHNOLOGY (PTY) LTD FACULTY OF INFORMATION TECHNOLOGY
DATABASE SYSTEMS 522 2ND SEMESTER ASSIGNMENT
Name & Surname: _________________________________ ICAS No: _________________
Qualification: ______________________ Semester: _____ Module Name: ______________________
Date Submitted: ___________
ASSESSMENT CRITERIA MARK ALLOCATION
EXAMINER MARKS
MODERATOR MARKS
MARKS FOR CONTENT
QUESTION ONE 40
QUESTION TWO 40
QUESTION THREE 10
TOTAL MARKS 90
MARKS FOR TECHNICAL ASPECTS
1. TABLE OF CONTENTS 2
2. LAYOUT AND SPELLING 3
3. REFERENCE 5
TOTAL MARKS 10
TOTAL MARKS FOR ASSIGNMENT 100
Examiner’s Comments:
Moderator’s Comments:
Signature of Examiner: Signature of Moderator:
QUESTIONS [90 MARKS]
QUESTION 1 40 MARKS
1.1 We have the following database schema:
Computer (vendor, model, machinetype) Model (num, speed, ram, hd, price) Vendor (name, address, phone) Where vendor indicates the manufacturer of a computer, and machine type takes values such as “desktop”, “laptop” and “server”. Underline indicates the primary key. Following inclusion dependencies hold: vendor ⊆ name, and model ⊆ num. Express following queries in relational algebra:
A. Find all the vendors who make laptop(s). (20) B. Find the phone numbers of all the vendors who make desktops with speed = 2 (20)
QUESTION 2 40 MARKS
2.1 For the relations s and r in your study manual of our chapter 2 (i.e., joining two relations), suppose we type a collection of relational algebra queries, and get the following results.
A B C D E
A 2 a 10 B
b 2 a 10 b
Please explain how this happened? If you think this result could happen in practice, please write the
corresponding relational algebra queries; otherwise, please explain why. (40)
QUESTION 3 10 MARKS
3.1 How many levels of abstraction a typical DB system should hold? What’s the purpose of each of
these abstraction levels? (10)
TOTAL: 100 MARKS
RICHFIELD GRADUATE INSTITUTE OF TECHNOLOGY (PTY) LTD FACULTY OF INFORMATION TECHNOLOGY
M-COMMERCE 522
2ND SEMESTER ASSIGNMENT Name & Surname: _________________________________ ICAS No: _________________
Qualification: ______________________ Semester: _____ Module Name: __________________________
Date Submitted: ___________
ASSESSMENT CRITERIA MARK ALLOCATION
EXAMINER MARKS
MODERATOR MARKS
MARKS FOR CONTENT
QUESTION ONE:
1.1 20
1.2 20
1.3 20
1.4 30
TOTAL MARKS 90
MARKS FOR TECHNICAL ASPECTS
1. TABLE OF CONTENTS 2
2. LAYOUT AND SPELLING 3
3. REFERENCE 5
TOTAL MARKS 10
TOTAL MARKS FOR ASSIGNMENT 100
Examiner’s Comments:
Moderator’s Comments:
Signature of Examiner: Signature of Moderator:
QUESTIONS [90 MARKS]
QUESTIONS ONE [25 MARKS] CASE STUDY
THE MOBILE PAYMENT MARKETPLACE Nearly every day, it seems, a new mobile payment system is announced. The mobile payment marketplace is experiencing an explosion of innovative ideas, plans, and announcements, which one commentator has likened to a goat rodeo, a chaotic situation in which powerful players with different agendas compete with one another for public acceptance, and above all, huge potential revenues. It’s a battle among the titans of online payment and retailing: PayPal, credit card companies like Visa and Master- Card, Google, Apple, start-up tech companies like Square that offer mobile credit card swiping backed by millions in venture capital, and even large retailers like Walmart, Best Buy, and Target, all of which are developing their own mobile payment systems that they control. Although consumers still prefer to pay with credit cards and cash on the go, digital mobile payment systems may finally be poised to deliver on their long-awaited promise. Apple entered the fray in 2014 with its announcement of Apple Pay for iPhone 6 smartphones, joining Google and others that already had developed a mobile payment system using Near Field Communication (NFC), a short-range radio communications protocol that operates within a range of a few inches, and allows consumers to bump, swipe, or just come close to a merchant’s NFC reader to pay for goods and services. What’s different about Apple’s announcement of an NFC-based payment system is that it’s Apple—the firm that revolutionized five different industries and introduced the first smartphones, forever changing how people shop and communicate with one another. Apple’s iTunes store already has the credit card information of 800 million users, arguably the largest such collection on earth. In 2015, Apple introduced its Apple Watch, which also includes Apple Pay.
CASE STUDY QUESTIONS
1.1 What is the value proposition that Apple Pay offers consumers? How about merchants? (20) 1.2 What are some of the limitations of Apple Pay that might prevent its widespread adoption? (20) 1.3 What advantages do the Square and PayPal mobile card-swiping solutions have in the mobile payment market? What are their weaknesses? (20) 1.4 What strategies would you recommend that Apple pursue to assure widespread consumer adoption of Apple Pay? (30)
TOTAL: 100 MARKS
Follow up the case study E-commerce 2016 12th edition Kenneth C.Lauden PG 305
RICHFIELD GRADUATE INSTITUTE OF TECHNOLOGY (PTY) LTD FACULTY OF INFORMATION TECHNOLOGY
INTERNET PROGRAMMING 622
2ND SEMESTER ASSIGNMENT Name & Surname: _________________________________ ICAS No: _________________ Qualification: ______________________ Semester: _____ Module Name: ____________________ Date Submitted: ___________
ASSESSMENT CRITERIA MARK ALLOCATION
EXAMINER MARKS
MODERATOR MARKS
MARKS FOR CONTENT
QUESTION ONE 50
QUESTION TWO 50
QUESTION FOUR
TOTAL MARKS 90
MARKS FOR TECHNICAL ASPECTS
1. TABLE OF CONTENTS Accurate numbering according to the numbering in text and page numbers.
2. LAYOUT AND SPELLING Font – Calibri 12 Line Spacing – 1.0 Margin should be justified.
3. REFERENCE According to the Harvard Method
TOTAL MARKS
TOTAL MARKS FOR ASSIGNMENT 100 Examiner’s Comments:
Moderator’s Comments:
Signature of Examiner: Signature of Moderator:
QUESTIONS [90 MARKS]
QUESTION ONE [50 MARKS]
1.1 Use PHP, HTML together with CSS to create the official Richfield’s Graduate Institute of
Technology Facebook page as shown on the screen shot below. (50)
QUESTION TWO [50 MARKS]
2.1 Based on question 1(Facebook page login page) use MySQL and PHP to create a database
called Users. Use the following fields. (10)
ID First Name Surname DOB
String String String Date
Why do I need to
provide my date
of birth?
By clicking Create Account, you agree to
our Terms and confirm that you have read
our Data Policy, including our Cookie Use
Policy. You may receive SMS message
notifications from Facebook and can opt out
at any time.
2.2 Write the code to populate the table with data(Enter at least 10 users). Refer to the above
example. (25)
ID FirstName Surname DOB
1 Palesa Zapheza 19/02/1991
2.3. Writes a php program that allows the input of two names and store them into the file called
"newfile.txt" using the fwrite() function. (15)
TOTAL: 100 MARKS
RICHFIELD GRADUATE INSTITUTE OF TECHNOLOGY (PTY) LTD FACULTY OF INFORMATION TECHNOLOGY
BUSINESS MANAGEMENT 622
2ND SEMESTER ASSIGNMENT Name & Surname: _________________________________ ICAS No: _________________ Qualification: ______________________ Semester: _____ Module Name: __________________________ Date Submitted: ___________
ASSESSMENT CRITERIA MARK ALLOCATION
EXAMINER MARKS
MODERATOR MARKS
MARKS FOR CONTENT
QUESTION ONE 35
QUESTION TWO 55
QUESTION FOUR
TOTAL MARKS 90
MARKS FOR TECHNICAL ASPECTS
1. TABLE OF CONTENTS Accurate numbering according to the numbering in text and page numbers.
2
2. LAYOUT AND SPELLING Font – Calibri 12 Line Spacing – 1.0 Margin should be justified.
3
3. REFERENCE According to the Harvard Method
5
TOTAL MARKS 10
TOTAL MARKS FOR ASSIGNMENT 100 Examiner’s Comments:
Moderator’s Comments:
Signature of Examiner: Signature of Moderator:
QUESTIONS [90 MARKS]
QUESTION ONE [35 MARKS] NEVER TOO OLD TO START A BUSINESS – MAGGIE’S ORIGINAL MAGEU At the ripe old age of 82 years, Maggie Mogase is no ordinary gogo. She is the entrepreneurial co-founder of Maggie’s Original Mageu, a business which manufactures and distributes the traditional, maize-based fermented drink. After starting on a small scale in 2006, Maggie accessed assistance from Seda and funding from the Technology Transfer Fund, which has enabled her to grow the concern and supply supermarkets across Garankuwa and neighboring areas. Mageu is the generic name for the non-dairy, non-alcoholic energy-giving beverage used by many of the maize-consuming populations in Africa. “My recipe was first formulated by my loving grandmother, the late Mrs Sapula Pooe, during the great famine of 1933,” says Maggie. “This was a difficult time in our history where crops failed, scores of livestock perished and lots of people died of starvation. Faced with the challenge of feeding fourteen grandchildren, my grandmother decided to make a tasty nourishing meal for us. This is how our Original Mageu was born and like my grandmother, I have passed the recipe down to my grandchildren who are now my business partners.” Maggie was referred to Seda and was encouraged to apply for funding from the Technology Transfer Fund in 2006. The Technology Transfer Fund assists small businesses to improve their competitiveness through technology transfer and pays for technical training. After being assessed by a Seda Technology Fund project officer, Maggie's Original Mageu received funding to acquire bottling, labelling, cooling and flavoring equipment, which enabled the business to scale up production whilst improving capacity, quality and efficiency. Seda is currently assisting the business with a quality management assessment, and will continue to provide advice and support as the business grows. Maggie’s story proves that you’re never too old to start a business! Aspiring entrepreneurs like Maggie can access information, resources and services through Seda branches. (Source: www.seda.org.za)
Reference: DOC]Grade 8 Entrepreneurship - Thutong www.thutong.doe.gov.za/ResourceDownload.aspx?id=41301 Structured questions, case study, entrepreneurship in the formal sector, Formative ... Read the case study below and answer the questions that follow. Never too.
1.1. A macro analysis will allow the budding entrepreneur to understand the uncontrollable forces that govern the profitably of the industry. Describe the skills that are required for
Entrepreneurship in Mageu. (10)
1.2 Critically evaluate all the factors involved in influencing the entrepreneurial performance in
Mageu Business (10)
1.3 Needs are unlimited but in order to satisfy those needs we have to have resources, which are generally considered to be limited. Any nation or community faces the situation of attempting to satisfy the needs of society with limited resources. Briefly explain the factors of production in Mageu
business. (10)
1.4 Do you think Maggie Mogase was an entrepreneur or a small business owner after she started
the business? Explain your answer (5)
QUESTION TWO [55 MARKS]
Motorola was the pioneer of mobile phones, and was the top cellular phone company in the world until the late 1990s, when it was overtaken by Nokia. This case discusses some of problems that Motorola faced in 2006-2007, after it failed to follow-up the success of its iconic phone model, the Razor, and was quickly overtaken by competitors who launched innovative products to capture market share. Motorola slashed the prices of most of its phone models in late 2006 to recapture some of the lost market share, drastically affecting its margins in return. In early 2007, Motorola announced that it would make an effort to revive its financial performance and not go behind market share alone.
It also embarked on a business reorganization to better align its operations with its customers and markets. However, it was widely believed that what the company needed was a path breaking new product to pull it out of difficulties. But as of mid-2007, Motorola had no products that looked likely to replicate the Razor’s success. In addition to this, CEO Ed Zander was losing much of the credibility he had earned in 2004-2005, during his early years at the company, and speculation was rife that Motorola's board might consider replacing him in the near future. http://www.icmrindia.org/casestudies/catalogue/Business%20Strategy/BSTR267.htm
2.1 Motorola had no product to replicate in mid-2007. Explain the meaning of centralisation of authority. Give detailed explanation of the advantages and disadvantages of centralisation of
authority in Motorola. (15)
2.2 Briefly discuss any principles of organizing in Motorola. (15)
2.3 Power’ can be defined as the ability to influence the behaviour of others in an organisation. Discuss the various kinds of power that can be distinguished in an organisation. Which one of these various kinds of power would be the most important one to have for a leader in Motorola?
Substantiate your answer. (10)
2.4 An important aspect of organizing is the grouping of related activities into units or departments, called departmentalization. Distinguish between the various types of departmentalization that an
organisation can implement in Motorola. (15)
TOTAL: 100 MARKS
RICHFIELD GRADUATE INSTITUTE OF TECHNOLOGY (PTY) LTD FACULTY OF INFORMATION TECHNOLOGY
NETWORKS 622
2ND SEMESTER ASSIGNMENT Name & Surname: _________________________________ ICAS No: _________________ Qualification: ______________________ Semester: _____ Module Name: __________________________ Date Submitted: ___________
ASSESSMENT CRITERIA MARK ALLOCATION
EXAMINER MARKS
MODERATOR MARKS
MARKS FOR CONTENT
QUESTION ONE
A 25
B 25
C 20
D 20
QUESTION FOUR
TOTAL MARKS 90
MARKS FOR TECHNICAL ASPECTS
1. TABLE OF CONTENTS Accurate numbering according to the numbering in text and page numbers.
2
2. LAYOUT AND SPELLING Font – Calibri 12 Line Spacing – 1.0 Margin should be justified.
3
3. REFERENCE According to the Harvard Method
5
TOTAL MARKS 10
TOTAL MARKS FOR ASSIGNMENT 100 Examiner’s Comments:
Moderator’s Comments:
Signature of Examiner: Signature of Moderator:
QUESTIONS [90 MARKS]
QUESTION ONE [90 MARKS]
Imagine you are a consultant being asked to provide advice on the design of a new network. A company is moving onto a new industrial estate and will be taking over the use of three buildings (A, B and C). The buildings are only 40 metres apart and the company is aware that a network of underground cable ducts exists linking the three buildings. All the buildings only have one floor and each measure about 50 metres by 20 metres. The company will be operating several web servers which are intended to be accessible from external locations by customers. Building A contains the company's main computer room which holds the web servers and also contains several database and fileservers used by the company's staff. The building also contains the offices of some development staff who have very high performance desktop computers. Their computers interactively exchange large amounts of data with some of the servers.
Building B contains the office of the clerical staff. They have relatively low performance desktop computers and their desks are in fixed locations. The workers only exchange a small amount of data with the servers. Building C contains the staff cafe and a lounge area. There are also areas used to welcome customers. Much of the building is open plan and the furniture is regularly moved around.
A. What type of networking should be installed in building A and what equipment or other
facilities would you need? (25)
B. What type of networking should be installed in building B and what equipment or other
facilities would you need? (25)
C. What type of networking should be installed in building C and what equipment or other
facilities would you need? How will you try to provide internet access for visiting customers
without compromising the safety of the company's own computers? (20)
D. What type of networking and equipment should be used to link together the three buildings
and how will overall Internet access be provided for the company? (20)
TOTAL: 100 MARKS