A self-reflective essay on the skills learned during the course of your STW 201CS- Effective Communication Skills program. Include any strengths, weaknesses, and personal areas of development.

In this reflective essay as a template for this assignment I am using Gibbs Reflective Cycle. Every person interaction varies how they interact with other people. This is a expressing adverse reflection on importance of self-awareness and personal development. In other term it is a detail inspection from their own behaviors of one’s outlook on life.

By examining myself and friends’ feedback to me to become aware of myself. Conscious of my privileges, perceptions, prejudices, beliefs, core values and behaviors. Aware of blind spots, my strengths and weaknesses. I have learned many things throughout the semester. I can say effective communication is about understanding the intentions and emotion behind the information, we also need to listen and gain full meaning of what others say or convey to us and make them feel that we are hearing them and also understanding them. Yes, it is about more than exchanging information.

Effective communication sounds like it is done without conscious thought, but many times when we try to communicate to people something goes away from the correct path. People have different perspective and maybe misunderstand us or have frustration, there might be conflict. This can cause us difficulty at work, relationship or college.

For us communication skills can intensify our connection with others, improve team work, our overall emotional and social health, problem solving and build significant respect and trust. So, we need learning skills to improve communication with our sir, friends and family.

 

Weaknesses

My first interpretation is I usually get tense and overburdened when there is assignment or any types of workload. I usually avoid taking risky or even related activities. Yes, it is not good characteristic as an aim to be IT manager in future. I should always be ready to take risk and deal with it. My behavior changes with a people around me when sometimes things do not work out properly. Because a leader should have ability to tackle and manage tough situation instead, I get hyperactive, which is not good characteristic of my personality.

Common barriers that stops me from communicating effectively:

Lack of Focus:  We need to stay focused and avoid distractions. I easily get distracted. When we are multitasking, we can’t communicate effectively. If we are checking Facebook, we are likely to miss some clues in conversation.

Out of control emotion and stress:  We can learn how to rapidly calm down before continuing a conversation to avoid misunderstanding and conflicts. When I am emotionally overwhelmed or stressed out, I am likely to misread another person.

Negative body language: tapping my feet, crossing my arm or avoiding eye contact are my negative body language. If I disagree with somebody’s saying I usually use these body languages. Avoiding sending negative signal is important.

Inconsistent body language: My body language mostly doesn’t match what I am saying. Our listener can feel like we are being dishonest with them.

Strengths

My strength actually is my special skills. I think they are gift to me. Everybody has some special skills. I have many skills one of them is athletic. I love sports weather I’m playing them or watching them. I always know what I want and I try my hardest to get it. I can also say myself as very hard working and very determined person. Currently my strength includes my passion and honesty toward my work. I am always confident and positive regarding my targets and aims. I can take quick decision and right or good decision among all of above. Along with these, I can motivate group of people and do team work. If I make target I work day and night and I achieve my goal since I am responsible person.

Personal Areas of Development

Looking back to everything that I have learned in effective communication. I knew that I have some personal areas to be developed. I am not kind of listener person. I have poor body language. I am not engaged listener.

Here are some areas that I will be developing:

Focusing fully on the speaker: We can’t listen consistently to anyone for long time. My main distraction here is phone. We need to be focused on the moment to really pick up fine details and important clue in conversation. We can try repeating the speakers or influencers word to stay focused if we find hard to concentrate.

Spiritual Development: Spirituality plays vital role whether you follow religion or not. Truth be told, Religion and spirituality are actually two altogether different things and we can be spiritual without being even the slightest bit religious. When I work on improving my spirituality, I am making deeper connection with the world around me. This help me learn more about myself and it can help me in other area of personal development.

Conclusion

Personal development refers to a set of exercise that one can participate for the propose of enhancing identity and self-knowledge.  It includes ability and potential advancement, working of human capital just as employability, improving the quality of life, and last but not least playing a role towards the realization of aspirations and dreams.

Office Solutions Development: The Health and Energy Centre

Introduction
You are a self-employed IT contractor and have been approached by the Director of The
Health and Energy Centre to provide advice on the software needed for a new information
system at the centre. The centre has been providing health and fitness classes for
thousands of people for the past twelve years.
The Director has decided that he wants to sell health and fitness goods in addition to
offering health and fitness classes. He is interested in purchasing Project Management
Software to help him achieve a new system. He is also interested in how data mining
software could benefit the centre and he would like advice on application software that
would help advertise the centre’s services and products.

=>

Task 1 – Application software and business processes

a)   Explain the purpose of project management software and discuss, with reference to FOUR (4) examples, FOUR (4) ways that project management software could benefit the Health and Energy Centre.

The software which is used for resource allocation, project scheduling, planning and change management. It helps person to manage budgeting, quality management with cost control on expenses and time management.

  • Risk analyzation and taking measures:

it sees the future hazard and take measures for the issues that may emerge in the coming future.

  • Cost management:

it sees where and how much the measure of money must be contributed in an alternate segment for activity of the venture.

  • Quality management:

it decides and supervise the quality and time for the assignment to be finished.

  • Resource allocation:

it gives legitimate diagram to the client from the information given by the about step by step instructions to apportion the assets in a viable manner

Benefits of the health and energy center in the ways that a project management software is through:

  • Time Management:

for various errand execution the middle can utilize venture the executives programming to oversee time and designate staff as indicated by errand that must be performed.

  • Risk evaluation:

evaluation of the hazard should be possible by the utilization of venture the board programming through which Center can go for broke a few measures for market hazard to avert misfortunes.

  • Task Monitoring:

(measure, assess, right) this product assesses the assignment and take measures to address the mistake. for example, in the event that the item brought for the Center is outdated or will cause hurt in any capacity to the client those items ought to be supplanted with great ones.

  • Budget management:

for the diverse errand and for the pay the executives of the staff which will give legitimate diagram of the interest in various parts.

b)   Discuss how data mining software could benefit the center and support your answer with reference to EIGHT (8) features of data mining software.

  • Perceives client necessity which could be satisfied.
  • It gives legitimate examined information to the Center to expand its business further.
  • It makes decision making on a product that are to be available for customer.
  • It makes work easier by the data which was collected.
  • It makes simpler for promoting through information gathered from client looking for related administrations and items given by the Center.
  • Data mining is useful to anticipate future patterns wellness items and administrations.
  • showcase examination on wellbeing and wellness classes and item offers movement identified with it.
  • It encourages understanding client needs.

c)   Identify FOUR (4) types of application software that could be used to market the services and products offered at The Health and Energy Centre and for FOUR (4) marks explain how each type of software that you have identified could be used to promote the center’s services and products.

The four types of application software are-

  • Enterprise Software:

It manages prerequisite of association and stream of information.

  • Words Processing Software:

The program is utilized for making type papers, letters, word sheets and so forth. Example:  MS word

  • Information employee Software:

 It can handle creation projects and needs in the department. Example- PowerPoint

  • Database Software:

This product stores information that are connected to the project management software. example- MS excel.

Task 2 – End-user development

a)   If staff at the center are involved in developing elements of application software they will need to plan carefully. Outline SEVEN (7) factors that the staff will need to consider when planning end user development.

  • The worker must make the application that is comprise of differ comparable working procedure as the application client have utilized previously.
  • The application must fill in according to the necessity gave by the provider.
  • The application they are making must be maintainable because any moment there can be chances of making modification according to the requirement.
  • The client must have legitimate learning of programming and coding so they could appropriate programming language which will be reasonable for their task.
  • The security arrangement of the application must be made excellent so the information robbery and other hacking stuff isn’t possible.
  • The producer must have confidence to give documentation about the project.
  • Before starting the project in first they have to manage the budget system.

 


b)   Describe NINE (9) potential problems that the center could face if its end users are involved in developing elements of application software.

  • Staff are not prepared so they can’t set up a legitimate arrangement and estimation to build up the product it isn’t effectively.
  • Staff have not learning of programming and coding so they may set aside a lot of effort to build up the product.
  • Their created Software there may be botch in the total outcome.
  • Programming are does not tried legitimately so it contains numerous blunder and bugs while programming testing time.
  • It may occur errors in financial management.
  • Programming ought to be grown yet its plan probably won’t be all around reported so it is inadequately.
  • Programming were not organization so it can’t keep running on various stages.
  • Programming are does not tried legitimately so it contains numerous mistake and bugs while programming testing time
  • Staff are not trained to develop the software efficiently.

c)   Explain how problems arising from end user development can be avoided. Support your answer with NINE (9) recommendations.

  • There may be poor comprehension between experienced engineer they have to discuss the misconception.
  • User Interface must be made so every client could utilize and effectively get it.
  • The file should be kept safe and the work should be done nicely.
  • It may occur bug in code we have to consult to expert programmer.
  • The testing should be done properly for the future reference.
  • There should be present of validation while doing the program.
  • The user interface must be made easy so all the users can understand.
  • Before making any changes, they have to consult to the excellent programmers.
  • In the documentation there should be explained properly.

Task 3 – Advanced features and functions of Microsoft Word

a)   Create a macro that demonstrates how a word processing feature can be undertaken more efficiently if it includes automation.

  • Initiating macros
Initiating macros
  • Recording the macro and giving style to bold and Italian and underlining the text.
Recording the macro and giving style
  • Start to record macros.
button design and start of macros record.
  • Macro successfully completed by clicking the toolbar and selecting the remaining paragraph .
Macro successfully completed by clicking the toolbar
  • Code of macros
macros function performed.

b)   The Director has asked you to create an additional macro to demonstrate the efficiency of automation in a word-processed document.

Macros name
recording the macros
start initiating name
mail merges- value data placement
mail merges data placement
inputting the data in mail merges
making macros for mail merges
making macros step 5
step 6 of mail merges
Code for macros
Testing macros worked

Task 4 – Advanced features and functions of Microsoft Excel

a)   The Director has requested that you produce an interactive form that facilitates the following:

creating a form in excel
Form created
Form data input
code for application form

b)   You have been asked to add to the interactive form that you have produced for Task 4 You should edit the macro so that the following actions occur:

form with macros level showing message
form with macros level showing buttons
codes of form
message code of form

Conclusion

The health and fitness center have asked for following queries which was solved in this task. Application software and business process with end user development was done. We also have used advanced feature and function of Microsoft word and excel.

References

               Opentextbc.ca. (2019). 12. Budget Planning – Project Management. [online] Available at: https://opentextbc.ca/projectmanagement/chapter/chapter-12-budget-planning-project-management/ [Accessed 30 Apr. 2019].

Designing and Developing a Website : MardiDrama Club

Introduction
MardiDrama Club is a fun after school and weekend club that is open to children between
the ages of 5-16. It offers a fun programme but also teaches children some of the
fundamentals about speaking and helping them develop confidence.

Scenario
MardiDrama Club have approached you and asked you to develop a new website for
them. Although they currently won’t be taking any payments online, they hope to develop
this later in the year. They need you to create a website which will allow parents to find
out about the different drama classes that are available and to register for these. The
website should be visual and should be viewable on different devices.

MardiDrama have the following basic requirements for the contents of the website:
• Home Page: This page will advertise the different classes (Musical Theatre, After
School, Holiday Programmes) and should have three image links to these classes.
Relevant social media buttons and search bar should be included on a clean
looking home page which includes interactive elements which grabs the attention of
the visitor.
• Blog: This page will provide up to date information about events and classes
happening in the Drama Club.
• Register: This page will allow parents to register their child for one of the classes.
Registration will be via email following the completion of an online form.
• About: This page should give parents an overview of the different classes and the
club which started in 2001. It should have space for information about the teacher
and links back to the contact page and blog.
• Where: This page should include an interactive map of the club’s location in
Taunton.
• Classes: This page should provide videos and information about the different
classes including payment information (£15.00 or equivalent per hour).
• Events: This page provides a list of the events that take place in the drama club
such as Nativity, Summer Play or guest appearances from well-known stars from
the industry.

At the initial stage of the development process, you are required to make an HTML/CSS
prototype of the website that will clearly show MardiDrama Club how the final website
could work.
Content hasn’t been provided. Suitable content can be found on the web e.g. images of
drama clubs. Use creative commons (https://ccsearch.creativecommons.org/) or
Wikimedia Commons (http://commons.wikimedia.org/wiki/Main_Page) as a starting point
to find content. Remember the content you include in your site must be licensed for re-use.
Do not spend excessive amounts of time researching and gathering content. The
purpose is to provide a clear indication of how the final website could look and function.
The client would provide the actual content at a later point if they are happy with the
website you have proposed.

Task 1 – HTML
The website must be developed using XHTML 1.0 Strict or HTML 5 and feature a
minimum of SEVEN (7) interlinked pages which can be viewed also on a mobile device.
The website must feature the content described above and meet the following criteria:
• Feature between 7 and 10 HTML pages.
• Have a lightblue background colour.
• Be usable in at least TWO (2) different web browsers including a mobile device.
You should consult your tutor for guidance on the specific browsers and versions
you should use.
• Be viewable on monitors with screen resolutions of 1024×768 without users having
to scroll horizontally.
• Integrate and use a range of media appropriately.
• Embed functional multimedia components in your site.
• Demonstrate a good application of web design principles and be easy to navigate
and use and really captures the attention of the parents.

=>

I have used HTML 5 for designing website. HTML 5 is latest version of HTML. We use <!DOCTYPE html> syntax for declaration. The default character encoding in HRML 5 is UTF-8.

            HTML 5 consists of new element such as <header>, <section>, <article>, <svg>, <canvas>, <audio>, <video>, <footer> and attributes like number, date, time, calendar, and range.

doctype declaration
Firefox Preview
Chrome Preview
Resolution 1024*768 – no horizontal scroll
Image link on the home page
social media links
Search Bar
HTML CODE OF THE FORM
INTERFACE OF THE HTML FORM
CSS used for html form a
CSS used for html form b
CSS used for html form c
CSS used for html form d
CSS used for html form e
multimedia elements used – video
Background Color Sky-blue

Types of images

I have used PNG format for my design of website. PNG file format has many advantages over jpeg and gif. PNG has higher compression rate. It has better compression rate. This type of file is easy to low while user has low internet connection.

PNG helps in transparency layer image. It also has built in gamma correction due to which user can see an image which was meant to see while captured. It is open standard and free license which is developed by W3C and will always be free. This is why I choose PNG format for websites.

Accessibility features used in your media

There is not much accessibility feature in this web design. Though I have used alt tags for image alternative. Placeholder are used for thumbnail so that it’s easy for video preview. There is play, pause, Fullscreen, play picture in picture and also user can download for offline on the go.

Task 2 – CSS

Create external CSS file that specifies the design for the website. Each of the HTML pages must link to this CSS file. There should be no use of the style attribute or the <style> element in the website.

The boxes on the home page should include relevant elements such as border radius,
box-shadow, hover etc.
Include CSS animation-timing for at least one of the elements on the home page.
Add in a mediarule which changes the background colour from lightblue to white when the
browser window is 600px wide or less

=> CSS stands for Cascading Style Sheets. The way I used external CSS because It is style sheet language used for explaining the presentation of document written in a markup language like hyper text mark of language. It is useful for designing the website with its respective viewing specific experience.

External CSS link

CSS selectors

Id: It identify one element. It is indicated as “#” in CSS.

Class: It identifies one and more than one CSS elements. It is indicated as “.” In CSS.

Inheritance: It is last thing we need to investigate for all the information. It is also used to understand what style is applied in the element.

Multiple selectors: It is usually used for grouping. Any type of valid selector can be placed in that group and match up as same style-based property.

Descendant: All the elements that are descendants of a specified element are always matched with descendant selector.

CSS
Search Box
Animation
Media Query code
white background on width 600px

Task 3 – Test the Website and Write a Test Report

You must use the W3C validation service (http://validator.w3.org/) to check your HTML and
CSS code. You should attempt to remove as many non-compliant features as possible.
Make sure ‘show source’ is selected and save the output from this tool.
Test the website using at least TWO (2) different web browsers. Record any significant
differences between the rendering of the two browsers and attempt to diagnose the cause.
You do NOT need to modify your code to correct any differences between browsers.
Please consult your tutor for advice on the specific browsers you should use for testing.
Write a short report describing your testing. Provide a description of any outstanding
problems and recommendations for fixing them and include a clear description of the
differences between the brewers and the reasons for these. Add in a description of how
the site works on a mobile device and the reasons for these.

Validation and Browser testing:

Browser testing was done. While testing in chrome Version 73.0.3683.86 (Official Build) (64-bit) I found the design and layout was awesome. It looked well designed in width 600px. I also tested my design in Firefox Quantum 66.0.3 (64-bit). The result was quite different. I found that search bar icon was not in place. While I looked for 600px width I found that everything was working well and design was awesome.

Home page validation

Home Page Validation
Home Page error

Blog page validation

Blog Page Validation
Blog Page Error

All HTML page validation

There was same warning Because of header and footer and I found one error in google maps embedded link and also there were some warnings.

CSS validation

CSS validation

Mobile Validator

mobile validator

Findings

At the end, I have corrected the warning and errors while testing all the design of website. There was some mismatch in paragraph. I corrected headers and navigation too. After completion I found some warning. Some warning was ignored and many were removed. I also found error in google maps embedded link which was ignored. Now. After all validation I have seen no errors to be corrected.

Chrome Output
Firefox Output

There were lots for problem and mismatch code due to which there was mismatch in overall design. Finally, after solving all problem on chrome, the design in chrome seems to be perfect. There was the same design as I had designed in photoshop.

After that, I looked same code on Firefox I found that the search icon was somehow below. There was design mismatch. So, these are the only problem that I faced while seeing output on both web browser. First of all, I looked into code to find some error but I only found warnings which didn’t affect website.

The recommendation of fixing is to see output on different website and the give extra code that fixes all the design mismatch for all the browser individually.

Task 4 – Critical Evaluation

Analysis of the website

You are required to write a short report (500 words) analysing the website you have
submitted.
You should:
• Evaluate and demonstrate an understanding of accessibility issues
• Evaluate the effectiveness of the CSS and what improvements you feel should be
made to this file now you have completed it
• Explain the advantages and disadvantages of using various types of multimedia file
formats
• Explain the advantages and disadvantages of different types of multimedia
elements in relation to different contexts
• Recommend improvements for further development of the website.
This analysis must include a discussion of the accessibility of the website and the ways in
which the website has been designed to support mobile users.

Additional Information for Clarification
Consult with your tutor/lecturer if you are uncertain about any aspects of the assignment.
The website must be developed using XHTML 1.0 Strict or HTML 5 and CSS. No other
technologies should be used. You do not need to write any computer programs for this
assignment.
The purpose of this assignment is to show abilities in web design. Although you should be
wary of needlessly adding features, websites that demonstrate a range of HTML features
used appropriately have the potential to gain higher marks. For example, a form that
features a range of different form elements applied in a useful and relevant way would
generally score a higher mark than a simple form that only uses text boxes to gather data.

Accessibility of the website:

Internet is vast, World Wide Web have conquered the world. Accessibility of website is very import on modern website designing and developing. In this modern world almost, all website is designed as accessible. In the current world there is room for all the differently able people. This is understood by designer and developer too. This website has much accessibility feature in this web design. Though I have used alt tags for image alternative. Placeholder are used for thumbnail so that it’s easy for video preview. There is play, pause, Fullscreen, play picture in picture and also user can download for offline on the go.

Designed to support mobile users

There is lot of mobile device than laptop in hand of people. Everyone takes mobile devices anywhere they want because they are portable and are cheaper comparatively laptop. There are more people surfing internet in their mobile devices so it’s also important to develop a well designed mobile friendly website for user accessibility too. As the task, I have also designed for the mobile devices that has less than 600px width. So, there is white background and beautifully designed website on every mobile device. They can easily read the content of web page. Photo and video have simplified there is all sort of feature included so that user can use as what they find easy.

Effectiveness of the CSS

CSS (Cascading Style Sheets) is an external file which is linked in HTML (Hyper Text Mark of Language). Since our website is viewed in many screen sizes, we also need to provide specific media query to each screen size which can be frustrating in HTML. This can be used for one CSS file rather than editing bulky content pages. For each site, all the CSS ought to be structured by a single, focal plan gathering. Two reasons: First, brought together plan is the best way to guarantee a steady style and receive one of the principle rewards of templates. Second, most of Web content makers are not equipped for planning and composing great templates.

Multimedia file formats

Adding Video and Audio elements to a Site page make it simpler to grab user attention users. Visual is the most prominent sight and sound options, locales additionally add audio and intuitive substance to crave in and hold the taking of consideration of the users which is major advantage. While HTML5 content-based sites are more intricate than site of the past, they are yet limited from numerous points of view. It is hard to speak to a brand/brand’s picture without including audio or video substance to help it. All things considered, mixed media departments are every now and again favored by promoting offices as a result of their capacity to totally show banding.

There are also some drawbacks too. Loading time of video can increase which is not to for modern website developers, compatibility of video differs with web browser. There are lots of web browser currently and many people has their choice in browsers. It is also harmful for search engine ranking.

Types of multimedia elements

Text is one of the media components utilized in the site. Ordinarily we can discover it from Web. Human are utilizing texts to speak with other individuals. From Web we can utilize Email to send instant message to other individuals, we additionally can utilize share status or offer anything you need to share to give your companion or family realize what is at the forefront of your thoughts. We likewise can share or give data in forum. While most Internet browsers suit numerous audios, video, and visual photo documents groups, problem can occur.

Conclusion

In this assignment I have designed well accessible website for Mardi Drama Club. I also have done testing of website and I also have done critical evaluation to find better version of this website. I have only used HTML and CSS for this website.

Reference

Fileformat.info. (2019). Multimedia File Formats. [online] Available at: https://www.fileformat.info/mirror/egff/ch10_02.htm [Accessed 30 Apr. 2019].

Preview Website

Mardi Drama Club

Designing and Developing Object-Oriented Computer Programs : Language Trainer

Introduction
The mind is like any part of the body – it needs exercise to stay healthy. There are many
cognitive training regimes that exist for that, but one of the most effective for memory is
the game known as ‘concentration’. In this game, fifty-two cards are laid face down on a
table. Each player takes a turn flipping over a card and then attempting to flip over a
second card with the same colour and value. For example, if we flip over the five of hearts
we would want to flip over the five of diamonds as our secondary selection. If we make a
match, the cards are removed and added to our score. If they don’t match, they are flipped
back face down and the other player is given an opportunity to flip two matching cards.
Players continue taking turns until all cards have been matched.
This is a powerful technique for training observational faculties and short-term memory,
and it’s your job for this assessment to write a piece of software that implements this
system with a difference – you’ll be looking to match English words and their translation for
several languages (two for the purposes of this assessment). For example, we might want
to match the English word ‘Hot’ with the French word ‘chaud’. For the purposes of this
assessment, it does not matter what language you use but the flashcards presented at
https://www.studystack.com/ would be an appropriate place to find suitable pairings. You
can use whatever language you like otherwise.
Your application should present players with a grid of fifty-two buttons, and each of those
will map on to a word or its translation. Each player will select a button, which will reveal its
contents, and a second button which will do the same. If there is a match, the buttons
should disappear, and the player should get a point. If not, the contents should be hidden,
and control should go to the next player.
The system then needs to allow the following:
• It needs to permit for players to choose a word set.
• It needs to create a grid of twenty-six words and their translations and map those to the
UI
• It needs to keep track of turn order and player actions within a turn
• It needs to eliminate used words from the UI
• It needs to track score and matches of buttons.
• A high score table of players and scores for each language should be retained
The program will also need to store user data such as name, success rates with particular
words, average score and average time to complete a game.
Your program then will need to perform the following operations:
• Set up the GUI
• Provide a way to add, modify and delete word sets.
• Provide players a way to choose word sets
• Set up an internal representation of words to their translation
• Map UI buttons to the words in the word set
• Implement a turn order for players
• Award points based on matching words and their translation
• Disable UI elements based on correctness of matches.
• Save the user data and statistics of each user along with the high score table.

Task 1

For a program which fully meets the requirements of the brief as
outlined above.

Class

dB connection

Db Connection 1
DB Connection 2
DB Connection 3
DB Connection 4

Player

Player Class

Word

Word Class

Forms

Add Player

Insert form 1
Insert Form 2
Insert Form 3

Game

GameForm 1
Game Form 2
Game Form 3
Game Form 4
Game Form 5
Game Form 6
Game Form 7
Game Form 8
Game Form 9

Dash

Dash Form 1
Dash Form 2
Dash Form 3

Insert

Insert form 1
Insert form 2
Insert Form 3

Update

Update Form1
Update Form 2
Update from 3

View

View Form 1
View Form 2

Task 2- Testing

Black Box

IdFormDescriptionTest ValuesExpectedActualResult
1Insert PlayerInserting player namePlayer1: test Player2: testGame form should be opened and insert player form should be closedGame form is opened and insert player form is closedPass
2Insert PlayerTesting Back button Insertplayer form should be closed and dash should be openedInsertplayer is closed and dash is openedPass
3GameTesting loading of player name from insert player formPlayer1:test Player2:testGame should load with player1 and player 2 nameGame is loaded with player1 and player2 namePass
4GameTesting English button click at first Button should display English language wordButton displays English language wordPass
5GameTesting Nepali button at first Messagebox showing “Please select English word first” should be displayedMessagebox showing “Please select English word first” is displayedPass
6DashTesting start button click Dash should be closed and insertplayer form should be loadedDash is closed and insertplayer form should be loadedPass
7UpdateTesting update buttonId:25 Word1: Test Word2:TestMessagebox showing “Updated” should be displayedMessagebox showing “Updated” is displayedPass
8UpdateTesting delete buttonId:25Messagebox showing “Deleted” should be displayedMessagebox showing “Deleted” is displayedPass
Black box test

Whitebox

White Box 1
White Box 2
White Box 3
White Box 4
White Box 5
White Box 6
White Box 7
White Box 8
White box all

Task 3- Class Diagram

Class Diagram

Computer Networks: Wheeler Energy

This assignment enables you to demonstrate your knowledge and understanding of
computer networks. You are required to produce a substantial document that totals 3000
words. Subsequently, you are advised to start work on the assignment at an early stage
during the unit. The assignment is divided into tasks, which relate to the sequence of the
module, so you do not need to wait until all the teaching is finished to start them.
Some aspects of this assignment will require you to research real components that are
currently available in the marketplace. Furthermore, you will also be asked to make
judgements about what is best for a particular scenario. Please note that there is not
always one right answer. However, you will need to justify your reasons for any choices
you make to get high marks.
You are NOT required to design a complete network. You are required to detail the
specifics covered by the task list shown below.

Scenario
Wheeler Energy is an organisation that specialises in Sustainable Energy Systems.
Wheeler Energy provide energy solutions across the globe to industries such as Military,
Oil and Gas, Transportation, Correctional, and Physical Data.
Wheeler Energy has a small head office that is in Milton Keynes, England. Founded in
2001, the company has 15 employees that are based in Milton Keynes, and a team of 18
sales and support personnel who work across the world. All installations are managed by
contractors who sit outside of the organisation.
As the company has grown, no strategic plan for IT has been put in place, and employees
generally had their own PCs or laptops that were connected to an office router via Wi-Fi or
some direct UTP cable. Information stored electronically consists of normal business
documentation, together with sales materials (including some product and training videos).
Information has historically been shared using personal Google Docs accounts, and
private information kept on individuals’ PCs. Users have various versions of anti-virus
software installed and administer their own PCs. Users manage their own security
including passwords. Contact with sales staff across the globe, including the Middle East,
Asia and Africa is achieved mostly via email and less often through mobile phone. To
complicate communication matters, one of the Company Directors lives in Spain for most
of the year, and there is no member of staff with IT support responsibility.
After a security audit, the company has realised it needs to take a more systematic and
professional approach to its IT and security infrastructure. The CEO has asked you to
advise her on some specific points of the network. She is keen to make the most of
technology and the following outline requirements have been identified:

Overall System Requirements

  1. To provide a network solution (hardware and software) to meet the needs of the
    company, which would improve the communication, productivity and the security of the
    business and information stored within.
  2. Increase efficiency through reduction of paper-based procedures and allow staff
    working on site to access information at the head office from a tablet PC (Microsoft
    Surface has been selected).
  3. Accommodate company expansion.
  4. Internet access with a faster bandwidth.

Data and information
Company information to be stored centrally in the head office in an electronic format. This
replaces the reliance on Google for all shared storage, and local PCs for individuals’
information.

Hardware

  1. New computers to meet performance, security and storage requirements (including
    backup)
  2. New PC workstations / laptops (total 33: 15 x desktop; 18 x Laptop) running Microsoft
    Windows.
  3. New network printer
  4. Network components as required
  5. 33 x Microsoft smartphones

Software

  1. Latest Microsoft Office Suite required
  2. Up-to-date Sage® accountancy software
  3. E-mail server or software with a calendar feature, which can be shared between
    employees
  4. Web & email Internet access
  5. Suitable security software

Security requirements

  1. Information security must meet the ISO27001 standard, and the CEO has discovered
    ISO27001, the Government’s ‘Cyber Essentials’ programme and ’10 steps to Cyber
    Security’ guidance from National Cyber Security Centre
    (https://www.ncsc.gov.uk/guidance/10-steps-cyber-security)
  2. GDPR requirements must also be met.
  3. Restrictions are required to be implemented to control access to the confidential client
    information.
  4. The system is required to be secure from internal and external threats
  5. An automated daily backup policy and procedure, for all of the information stored within
    the business
  6. Further discussion will be required to establish downtime that is acceptable
    The company has a website, but this is hosted by their ISP and is not part of this
    requirement. The CEO currently favours hosting email in the office but is open to
    persuasive alternatives. The office space consists of a large open plan area with separate
  7. meeting room and manager’s office. The current internet connection consists of a single
  8. ADSL router with WLAN. Some PCs are connected directly to the router with UTP cables.

Introduction

Wheeler Energy is a global organization. It offers energy solutions across the globe to the several industrial areas. Wheeler Energy was established in 2001 AD. It has small head office located at Milton Keynes, England. This company has 15 employees, 18 sales and support personal. There has employee covered all over the world. Wheeler Energy recently got problem on networking and data security. It also lacks proper staff connection.

Wheeler Energy want us to advice for proper network solution for this company which provides proper network system.

Task 1 – Networking Infrastructure and Protocols

The building has unmanaged loose wires and cable and not controlled Wi-Fi. As per chief requirement here are the queries.

a)   Explain how the network components should be connected. Identify a suitable network topology, data rate and the type of cable (if selected). Your answer must clearly state how your recommendation relates to the business requirements of the Wheeler Energy scenario specifically.

The segments of the system network ought to be associated by overseeing interconnection with equipment and through programming for example switch, switch, remote, firewall, escape, VPN, fix board with gigabyte quicker Ethernet ports overseeing IP addresses, subletting the diverse segments or resources.

The star topologies are most suggested for association by a large portion of the system backing and administrations giving organizations. appropriate system topology star topology would be reasonable system since it is effectively viable and have great information stream control plan. This topology gives the office of simple for interfacing the new hubs, appropriate brought together control and the executive’s framework, disappointment location and investigate is simple, security and information trustworthiness is exceedingly kept up.

Category 6 uses cable type UTP or STP and has maximum data transfer rate of 1000mbps and maximum frequency of 240MHz. Category 7 uses SSTP cable type and can transfer data of 10000mbps and maximum frequency of 600MHz.

Since it is a worldwide association the information stream rate will be clearly high so for the link association feline 7 for the server and feline 6 for the end client gadgets for quicker execution in authoritative workplace. feline 7 for the server in light of the fact that immense measure of information is embedded and taken from it so link with quicker information exchange rate will lessen traffic.

b)   Computer networks use a ‘layered architecture’. Briefly explain what is meant by the term ‘layered architecture and provide TWO (2) advantages and TWO (2) disadvantages of having layered architecture in a network system.

layer engineering is a most straightforward type of system correspondence design. it demonstrates the engineering of a systems network administration activity process by partitioning the system work into more parts which makes it simply get it. it is separated into introduction layer, application layer, space layer and application framework layer. By doing as such it makes a system network framework simple to look after, secure, and adaptability to associate with another system network

  • Advantages of layered architecture:
  • Helps in Making a systems administration framework simple keep up.
  • Layer engineering is straightforward and execute.
  • Helps in charge and exemplify the multifaceted nature of vast application.
  • Helps any groups to chip away at different pieces of the application one next to the other having to less rely upon other group.
  • Disadvantages of layered architecture:
  • The adaptability of system is discovered hard to work in it.
  • Layer engineering expands the unpredictability to the basic applications.


c)   A hub, a switch, a wireless access point and a router are networking components. Identify the OSI layer at which each component operates. For each component, support your answer with ONE (1) reason.

Networking Components are Wireless Access Point, switch, router and a hub. Component operator identifies the OSI layers at which each component operates. Reason are following:

  • Hub:

The physical layer of OSI model in a networking device is called hub. Hub creates traffic in all ports. It is mainly useful in private networks. To all connected device it broadcasts the data packets. Hub doesn’t have mac address. It has no networks identity. Hub can only be used to share data on properly connected devices.

  • Switch:

The data link layer of OSI model in a networking device is called switch.  Switch doesn’t broadcast while sending package but it is possible to broadcast. Switch has network identity also called mac address. It has Mac address directly connected to the ports i.e. host 5 is linked to port f0/5 and host 9 is connected to 0/6.

  • Wireless access point:

Its short form is WAP. WAP is a systems administration gadget of information connect layer. Wireless access point is a gadget that associates a remote nearby system to the wired system. Wireless access point is viewed as Layer 2 bridge that brings 802.3 Ethernet traffic to 802.11 traffic.

  • Router:

Router is a systems administration gadget of System layer of the OSI model. Router associates separate systems through the (IP). This gadget looks at a parcel header’s destination IP address analyzes it against routing table to decide bundle next best route.

d)   Given the applications that will be used, and making any suitable assumptions, identify and briefly explain the purpose of SEVEN (7) OSI protocol layer. For each protocol, identify the layer at which they operate.

As given the application we use, the 7 layers of OSI protocol layer are:

  • Network layer:

IPv4, ipv6, IPS, ICMP, apple talk are a few conventions of network layer. Information are transported as bundles through Logical network routes in an arranged configuration constrained by this layer. This layer gives routing directing ways to arrange correspondence.

  • Session layer:

This layer is in charge of systematically shutting of sessions and furthermore for session registration and recuperation. SAP, L2TP, PPTS, NetBIOS are a few conventions of this layer. this layer builds up, oversees, and ends the connectivity between the end user application forms.

  • Application layer:

DHCP, SMNP, SMTP, Telnet, FTP, HTTP are a few conventions of application layer. In this layer correspondence accomplices are distinguished. Likewise give office of use to trade of information/records, network Software and Email.

  • Physical layer:

This layer connector between a device and transmission medium like optical link and copper link connector cables. Which incorporates voltage, pins, link determination. For example, USB, ATM, RJ-45. Ethernet, Faster Ethernet, gigabit Ethernet are some protocol of this layer.

  • Data interface layer:

This layer center around nearby conveyance of casings among nodes on the comparative dimension of system. It guarantees that all parcels of information are conveyed free of mistakes. Ethernet remote Ethernet, (PPP) point to point over sequential connection, (STP) Spreading over tree convention are a few conventions of information interface layer.

  • Transport layer:

This layer serves to during the time spent transport work and appropriate information conveyance to the goal. TCP, UDP, DCCP, RDP, ATP are a few conventions of Transport layer.

  • Presentation layer:

In this layer the capacity of inscription and decryption are characterized. In this information design is changed over into an organization comprehensible by application layer. MMI, XDR, TLS, SSL are a few conventions of introduction layer.

e)   There are numerous standards of Wi-Fi. Provide a table of the frequency used, maximum data rate and maximum indoor range of the 802.11g, 802.11n and 802.11ac standards.

The numerous standards of WIFI are 802.11g, 802.11n and 802.11ac.

  • 802.11g:

It has 2.4GHz.  A CPU’s clock rate of speed is a proportion of what number of clocks cycles a CPU can give performance every second. E.g.: a CPU with a clock speed rate of 2.4 GHz can perform 2,400,000,000 clocks cycles per second. It was approved in June 2003, 802.11g was the successor to 802.11b. It can achieve up to 54mbps. Its max indoor range is 5181cm. It is introduced OFDM to generate WIFI signal. It also matches the speed of 802.11a but in lower range.

  • 802.11n:

It has 2.4GHz and 5GHz. Double band data could be delivered in two different frequencies. It is first standard to specify MIMO. It has data rate of 300mbps and can reach up to 450mbps. It has 7010cm max indoor range.

  • 802.ac:

It has 5GHz. It uses MIMO and helps in reduce errors and boost speed. Its maximum range indoor is 7010cm and it can transfer data of 433mbps and can reach up to 3.46GBps.

f)     Which Wi-Fi standard(s) do you recommend? Would you recommend the entire LAN be connected wirelessly? Justify your answer.

I would like to suggest 802.11ac Wi-Fi standards. This Wi-Fi standard high information exchange rate and Use MIMO and aides in diminish errors and lift speed organization additionally have more seasoned gadgets. Since the association gives benefits comprehensively to the especially significant ventures and association they must be set up for their costumers when they requirement for that they would require quicker, reliable, secure systems administration framework in their organization.

No, I don’t recommend the whole LAN to be associated remotely. The organization do require secure, speed, reliable and simple and quick viable system framework of network. Many issues can emerge with wireless system there will be high issue of flag associating and disengaging while information is voyaging. There are many network gadgets that could perform better in a system while associated utilizing wire rather than remote. it is smarter to utilize both wire and wireless system association framework as indicated by the need of device thinking about the execution.

Task 2 – Addressing

a)   Explain the terms MAC address and IP address and outline ONE (1) difference between them. Outline how MAC address and IP address also differ from IPv4 and IPv6. You should relate your answer to the OSI model.

Media Access Control Address is the full form of MAC address. MAC address is permanent having physical address and mac address of 48bits.  It is unique machine address given to the system so has no classification helping to identify the device which are participating in a network.

Internet Protocol Address is the full form of IP Address. IP can change in networks & are classified into different classes like A, B, C, D and E. It is logical Address and IP address are 32 bits helping to identify connection to device in network.

IPV4 address size is 32 bits & is a version 4 of IP having Prefix Notation 192.168.0.0/16 as well as header of 20 bytes and supports the 4.3×10^9 (4.3billion) address. IPV4 is divided in A-E classes & lacks security.

IPV6 address size is 128 bits & is a new version of IP having Prefix Notation 4FFE:E200:0234::/44. It supports the 3.4×1038 address. IPV6 is classless having a strong security than IPV4 and double the header of the IPV4, it has 40bytes.

.

b)   Explain how a computer gets its MAC and IP addresses. Does it need both? If so, explain why.

Personal Computers get its MAC address from producer’s from where their equipment body parts are made. All the MAC addresses are one of a kind. Furthermore, the IP addresses are relegated by the web access suppliers or system overseer to the systems administration gadgets. IP addresses are for transitory location area for organized gadgets it very well may be changed effectively.

While associating with the system numerous gadgets can have comparative IP addresses so the gadgets interesting location MAC address allots its goal through web conventions foreordains in a system model.

c)   What is ARP and why is it needed?

ARP is layer 2 standing for Address Resolution Protocol & is an element of the IP layer of the TCP/IP convention stack having great importance to decipher a host’s programming address (IP address) to an equipment address (MAC address). … Inside the IP layer there is additionally another convention, called RARP (Reverse ARP) that makes an interpretation of a MAC Address into an IP address.

The portal asks the ARP program to locate a physical host or MAC address that coordinates the IP address when an approaching bundle bound for a host machine on a specific neighborhood lands at an entryway. The ARP program checks the ARP store & during the event that it finds the location, it responds with the goal that the bundle can be changed over to the correct parcel length and configuration and sent back to the machine. During the off chance that no section is found after search for the IP address, ARP communicates a solicitation bundle in a unique organization to every one of the machines on the LAN to check whether one machine identifies that it has that IP address related with it or not.  A machine that perceives the IP address as its very own profits an answer so showing. ARP refreshes the ARP store for future reference and sends the bundle to the MAC address that answered.

d)   Define the terms Default Gateway and Subnet Mask and briefly explain why both are required in this project. You should provide THREE (3) points relating to a subnet mask for full marks.

Default gateway:

The way through which sub netted IP are allowed to travel carrying the data send by the user is known as default gateway. For the purpose of elating the IPS travel through network devices, default gateway is needed in the project. Subnet mask: While defining the range of IP addresses used in a network, subnet mask is used. In local area network it is mostly used. For letting default gateway know that it is from its related network and let it pass through protocols, it is widely used in this project. Sub-netting: This is the method of logically dividing the IP network into smaller network into equal halves each time.

  • It is a connection between network address and IP addresses.
  • It mostly used in local networks.
  • Used in identifying network IP ranges


e)   Briefly explain what is meant by the term sub-netting and how it could be used in this network. Do you recommend sub-netting in this case? Give a reason for your answer clearly showing how it applies to the Wheeler Energy scenario.

Sub-netting:

This is the method of logically dividing the IP network into smaller network into equal halves each time. It makes easier to grant authorization related to network much easier for different section organization having different IP. For network division and authorization restriction as well as granting processes, sub-netting is mainly used. In an organization there are different faculties in which different tasks are handled. For the purpose of maintaining data integrity and data security sub-netting plays vital role of providing secure data exchange over different network through the authorization maintainability function/setting policies implemented. Hence, I would recommend sub-netting.

f)   Explain what is meant by an IP Routing Table and provide ONE (1) example of how a router uses its routing table on the Internet. You do NOT have to explain every field in the routing table. In your example, explain how a packet gets from source to destination.

IP routing diagram

IP routing table is shown in table design. IP routing table is a set of instruction which is used to determine the data packets are flowing on IP. Router and switches are also IP enabled devices which uses routing table.

IP directing table holds the information required to advance the bundle along the better way to its goal. Every one of the bundles have data about its source and goal. After the bundle is sent device administration gadgets examines the parcel and match its to the steering table passages giving the better match to goal. After that the table gives the gadget information to coordinating the bundles towards the following jumps on it’s course through the system.

Task 3 – Security

a)   Using the ’10 steps to Cyber Security’ referenced above, provide TWO (2) examples with justifications of how the company has weaknesses in access control measures.

  • Managing User Privileges:

According to their authority It can provides limited access to the client connected to their network. This will very verify the information that could be abused by undesirable personals.

  • Malware Presentation:

security from the undesirable malwares which can assist third close to home with accessing the date of the association. This likewise keep from numerous different infections accessible in web that could degenerate framework network information.

b)   Provide a list of FIVE (5) measures that you recommend should be taken to keep the network secure. This should include hardware, software, policies and ways of checking them.

1. Policies:

  • Monitoring:

Systems are found to be used properly as per agreement with organization policies and this is confirmed by regular monitoring.

  • Form:

Employees are the one with whom contract should be made. That means any transfer of data should be restricted without the approval of an organization.

2. Hardware security:

  • Removing media control:

Scanning out the media devices and limiting the connection that is mainly storage devices before connecting with the system.

  • Firewall:

It helps to block unnecessary traffic as per security rule defined and hence having a firewall in a network system is considered to be a wise decision.

3. Software security:

  • Antivirus installation:

Antivirus is the most essential program in a network. It helps to prevent data corruption.

  • Password protection:

To keep the network secure and protected, a strong password is highly recommended.

  • Backup:

To prevent any harm to the first hand data storing server system, the backup system should be maintained.

  • User privileges:

In order to maintain privacy and security, controlling or limiting the data flow and exchange process within the organization should be done.

c)   What do you think is the biggest threat for this system? Justify your answer.

Many threats are there for example; data backup, hacking, poor system management, no access control, staff biasness to data security. And the most threatening issue I have found is the risk of hacking or data theft. No any protection protocol is there for data security. Staffs are found to be using private devices in any network. In such a case many other competing companies would have easy access of the valuable information of their system data which third parties could get in their hand easily. So, things could get better if we install different security devices, protocols and implement good security measure and policies.

Task 4 – Diagram and explanation

a)   Draw a logical network diagram (topology) that shows the main components of the network.

Network Diagram

b)   Allocate suitable IP addresses and add them in the diagram. You should ensure you include the subnet mask and identify the IP addresses that are provided by the ISP.

DeviceIPsubnet
Wireless EUD192.55.0.1 to 62/26
Lan Wire Network connection192.55.0.64 to 192.55.0.127/26
Backup server192.55.0.128 to 192.55.0.191/26
Router192.168.17.1/24

In figure 3 network diagram shows the connectivity on the network system. This table shows Device IP and subnet of /26. Subnetting can help to expand network later if necessary.

c)   Explain why you have chosen the hardware components and why you have connected them the way you have in your design for Task 4a.

  1. Switch:

Switch interfaces distinctive systems administration part in wired system framework network.

  • Fire wall:

Firewall gives security to the system framework network.

  • Server:

Wellspring of reinforcement for the information of the association.

  • WAP:

WAP provides wireless network services to many other devices and mobile wireless devices.

  • Router:

Router provides facility to link between two different framework networks.

  • VPN:

VPN gives extra secure information trade administrations for the assurance of the records of association.

d)   Give local prices and specification of suitable hardware/ software you recommend.

  • Switch:

 We require 2 switches. It is used to connect EUD in a network. It may cost around NRS 1500 and total sum will be NRS 3000.

  • Firewall:

We require 3 firewalls. It is used to protect network from threat. It may cost around NRS 4000 and total sum will be NRS 12000.

  • Router:

We need 1 router. It is used for connecting two different networks. It may cost around NRS 4000.

  • Backup Server:

We need 1 backup server. It is used to backup all important data. It may cost around NRS 400000.

  • Cloud Services:

We need unlimited cloud services which is almost impossible.  We can take 5000TB for data handling. It is used to backup all data through internet. It may cost around NRS 140000.

  • WAP:

We need 1 WAP. It provides wireless connectivity to wireless EUD networking devices. It may cost around NRS 4000.

  • VPN:

We need 1 strong VPN. It provides extra security to the data over the internet. It may cost around NRS 4000.

Task 5 – Remote access

a)   Explain how you could incorporate remote access into the system. You should identify the components you would need and state the actions you would complete to get it to work. Do you think Google Docs is a good solution?

Remote access VPN connection is the most common way for providing remote access. With the intention to enable user and office branch with secure access to organizational data VPN technology was developed. An encrypted and safe connection is formed by VPN over a less secure network such as internet. To legitimate VPN traffic to pass unchecked VPN allows routers and firewalls authorization. VPN additionally help by giving burrowing office so information security is keeping up.

VPN provides following advantages:

  • Confidentiality:

Data privacy can be maintained through tunneling.

  • Data-integrity:

The alteration or modification of transferred data is prevented.

  • Control-access:

Controlling of access granted to get into the network and helps to keep unauthorized personal out of the network.

  • Authentication Header:

Provides authentication and integrity prevent data tempering.

b)   How does the remote access requirement regarding mobile devices impact network security?

making a network remotely available methods giving the network access outside the border of the Wheelers Energy. So as to pick up a remote access, the cell phone needs to associate with some other system to gain admittance to organization arrange which probably won’t be extremely protected. Additionally, information burglary action chances will be expanded to have a sheltered remote access arrange framework legitimate system approaches, client approval and access control ought to be executed.

Conclusion:

Hereby given above task we can easily convince the organizational network system. We have hence provided network solution, increase efficiency and internet access with a faster bandwidth to Wheeler Energy Organization.

Reference:

Aem-test.com. (2019). AEM Test and Measurement. [online] Available at: http://aem-test.com [Accessed 30 Apr. 2019].

address, M. (2019). MAC address. [online] 1&1 Digital guide. Available at: https://www.ionos.com/digitalguide/server/know-how/mac-address/ [Accessed 30 Apr. 2019].

Installation of windows 10, ZoneAlarm Free Firewall Antivirus as antivirus software, Apache OpenOffice as office package and VeraCrypt as utility software. Also, Installation of Linux mint mate, google chrome and Testing, Solution in Virtual Box.

Task_1 – Windows Installation

1.    Installation of Windows

a.     Identification of key stages in the installation.

Firstly, we need an Oracle VirtualBox Manager to install windows 10. Oracle VirtualBox Manager was downloaded from virtualbox.org and Windows 10 ISO file was downloaded from (Microsoft, 2018).

Key stages in the installation are as follow:

  • While opening Oracle VirtualBox I clicked in new and then named my Operating system as Roshan Windows 10 selecting type as Microsoft Windows and Version as Windows 7 (64-bit).
  • Clicking Next brought me to allocate memory size as image given below. I gave approximate 1.5 GB and clicked on next.
  • Selecting Create a virtual hard disk now I clicked on Create. I then selected VDI in Hard disk file type and clicked on next. On next Dynamically allocated Storage on physical hard disk was selected.
  • Clicking next File size was taken 50 GB as shown in below image.
  •  Now going into setting of Roshan Windows 10 and Clicking on Enable Network Adaptor as host only adaptor on Adaptor 2 of Network panel.
  • Locating the windows 10 ISO file in storage panel and then clicking okay. Clicking on start this new windows prompts.
  • Clicking on Install now Windows installation begins.
  • Accepting Terms and condition, I then gave partition of whole 50 GB storage as primary and clicked on next. And I went through custom upgrade which allowed me to install windows.
  • After choosing custom OS installation. Then Windows installation begins.
  • After the installation I chose use express settings and installation easily completes. It says to enter the pc name, I named as Roshan Sah.

After several minute home page of windows 10 displays with desktop view. Username also can be displayed in settings app.

b.     Identification and description of required device drivers and their source locations.

Drivers are important for computers parts to run due to its links between computer hardware and software. Network Interface card, Sound Card, Graphic card, Card Reader, etc. are some of important drivers. It provides instruction to the different chips. This is a picture of installed drivers.

We can also find driver source location in C:\Windows\System32\DriverStore\FileRepository

c.     Identification and description of unresolved issues – especially missing device drivers.

After installation mouse cursor was not functioning well and also, I found USB Root Hub disabled. I checked for driver update and enabled USB Root Hub. Everything seems to be working then after.

2.    Installation of antivirus software

a.     Identification of product used.

For installation of ZoneAlarm Free Firewall Antivirus, setup file was downloaded from (Zonealarm, 2018). To install setup file, we need an internet access. It is easy to use software and has more powerful tools.

b.     Identification and description of key stages in installation.

Key stage of installing ZoneAlarm Free Firewall Antivirus are:

After clicking on finish, the installation is done. Here is the image of ZoneAlarm Free Firewall Antivirus.

d.     Identification and description of problems and unresolved issues.

While installing the ZoneAlarm Free Firewall Antiviruses there was no problem at all since it was quite easy setup. First of all, I make sure that my computer has access to internet and setup was for 64-bit operating system.

e.     Outline of the update process for the antivirus software.

ZoneAlarm Free Firewall Antivirus had already updated to newest version. I also checked for updates to make sure that I had latest antiviruses.

3.    Installation of office software

a.      Identification of product used.

For the installation of Apache OpenOffice setup file is required. I have downloaded Apache OpenOffice from (OpenOffice, 2018). Its User Interface is easier to use.

b.     Identification and description of key stages in installation.

Key stage of installing ZoneAlarm Free Firewall Antivirus are:

  • Give internet access and run setup file.
  • Click on Quick Install
  • Click in Agree to Terms and condition and then ZoneAlarm free firewall antivirus will start downloading.
  • After downloads begins this below image will appear.
  • After download completes you can also provide email id to receive product updates or Click on finish.
  • After clicking on finish, the installation is done. Here is the image of ZoneAlarm Free Firewall Antivirus.

d.     Identification and description of problems and unresolved issues.

While installing the ZoneAlarm Free Firewall Antiviruses there was no problem at all since it was quite easy setup. First of all, I make sure that my computer has access to internet and setup was for 64-bit operating system.

e.     Outline of the update process for the antivirus software.

ZoneAlarm Free Firewall Antivirus had already updated to newest version. I also checked for updates to make sure that I had latest antiviruses.

3.    Installation of office software

a.      Identification of product used.

For the installation of Apache OpenOffice setup file is required. I have downloaded Apache OpenOffice from (OpenOffice, 2018). Its User Interface is easier to use.

b. Identification and description of key stages in installation.

  • Downloaded Apache OpenOffice and run the setup.
  • Clicked on next then on install as shown in image below.
  • Give the username.
  • Clicked next as typical setup type again click on install.

After clicking on finish, the installation is done. Here is the image of Apache OpenOffice.

 

c.     Identification and description of problems and unresolved issues.

Apache OpenOffice is easy to install I didn’t find any error while installing it. To prevent errors, I firstly checked weather the setup file is for 32bit or 64bit operating system and waited till download completed without any error.

4.    Installation of free utility

a.     Identification of utility, outline of what it does and reason why you chose this

VeraCrypt is free utility software which help to manage and analyze the computer. VeraCrypt is a free open source disk encryption software. VeraCrypt is used to Create a virtual encrypt disk within a file and mounts it as an original disk. Encrypts whole partition or storages device like usb flash drive.

b.     Identification and description of key stages in installation.

We need setup file for installation. VeraCrypt was downloaded from (Veracrypt, 2018).

               Key stages of Installing VeraCrypt are as follow:

  • Run setup file and click yes.
  • Choose language as English. Click on next.
  • Accept the license terms and click on next.
  • Select install and click on next.
  • After clicking next installation begins and below image will appear after successfully installed.
  • Click on ok then on finish. To get tutorial click on yes else on no.

d.     Identification and description of key stages in installation.

While running program I didn’t found any error. It is quite interesting software. Before installing make sure to check system requirement to run program properly.

Task 2 – Linux Installation

1.     Installation of Linux

a.     Installation of Linux

Linux is an open source operating system. For Linux installation I’ve choose Linux Mint Mate.

b.     Description of disk partitioning (e.g. partition options, partition size).

For Linux partitioning, I allocated 63 GB. Partition option and partition size are:

  • Partition 1: /boot

I gave 1GB spaces for booting system which stores kernel image and bootloader Configuration.

  • Partition 2: /home

I gave approx. 10GB spaces for installation file where home directories stores.

  • Partition 3:  /tmp

I gave 5GB spaces for storing temporary file of software and application.

  • Partition 4: /usr

 I gave approx. 6GB for user documentation, binaries of executables and the kernel sources.

  • Partition 5: /var

 I gave 1GB spaces to perform tasks and store error logs.

  • Partition 6: swap area

 I gave 4GB spaces to provide over flow when RAM memory fills up completely.

  • Partition 7: /

 I gave remaining storage to store primary files which runs the system.

c.     Identification and description of required device drivers and their source

locations.

  • In Linux Mint Mate I used lspci code in terminal to show drivers details
  • For driver lists and details in Linux mint mate I used modinfo pata_acpi code.

 I used lsmod code to shows which loadable kernel modules are currently loaded.

d.     Description of setting up administrator and standard user.

  • Administrator User:

Default user which is created while installation of Linux mint mate is known as administrator user. It is also known as primary or main user.

  • Standard User:

Standard User can be created under menu. Click on control panel, open users and group and click on add new. Then fill form and click on add. Then this image will appear in lock screen.

e.     Description of network set-up

To access the internet, we need to setup network. Under the menu go to control center. Click on network connection and go to setting and give IPV4 address, netmask and gateway. Then click on save.

f.       Identification and description of installation process for one application.

  • Open Terminal. Download google signed key and install it using code “wget -q -O – https://dl.google.com/linux/linux_signing_key.pub | sudo apt-key add –“ (ITZGEEK, 2018)
  • Setup chrome repos using code “echo “deb [arch=amd64] http://dl.google.com/linux/chrome/deb/ stable main” | sudo tee /etc/apt/sources.list.d/google-chrome.list”
    • Update repos using “code sudo apt update”
    • Now install stable chrome by using code “sudo apt install -y google-chrome-stable”
    • Now you can find google chrome under menus.

2.    Testing of Linux system

a.     Identification of test plan for system.

Test plan is required to know weather computer system is working or not like installation, booting, etc.  It helps to know that the part of system is working properly or not. It helps user to test the Linux system.

  • Users Config.:

In installation of Linux mint mate, user was available and also creating a user and partitioning of drive was done easily but user setting and network config. were unable to test, the process took about 40 minutes.

  • Network:

The connection of internet wasn’t working so I changed gateway and assigned its address.

  • Device and peripheral:

I was able to watch movies, listen music’s. The usb port was recognized and later file were shared. Devices worked well as well as peripherals.

  • System tool:

The Graphical User Interface tools must run properly but it wasn’t operating well so I downloaded extended tools for GUI to make it operate properly. After installing extended tools, I could manually do the partition.

  • Hardware’s installations:

In hardware installation, all the files and drivers were installed. Apps were installed and displayed well.

b.     Record of how system performs against test plan.

TestRequired ResultOutputResult AnalysisMeasure Taken
Users ConfigUser was created.User named as Roshan Sah.Administration user was created No measure taken. Work done successfully.
NetworkInternet access should be required.Network was possible in automatic setting.Network access was possible.No measure taken network. Internet access was possible.
Device and peripheralDevice and peripheral should be work properly.Mouse cursor did not work.Driver was updated.Driver was updated and mouse cursor started working.
System toolDrivers should run properly.Mouse was not working.Driver were checked if it has latest version.All drivers worked properly.
Hardware’s installationsProper partitioning should run system properly.System ran smoothly.Installation of Linux mint mate was done properly.No measure taken. It worked successfully.

 

Task 3 –   Faulty PCs

While running the system we counter so many problems then we call it Faulty PC.

Some of the Faulty PC are as follow:

1.    Mouse not working

  • Identification: While moving mouse, cursor didn’t move.
  • Cause: Driver was disabled.
  • Solution: Enabled the driver.
  • Remedy: Mouse cursor started working.

2.    Sound not working

  • Identification: while watching movies sound not working.
  • Cause: The speaker doesn’t work or maybe driver problem.
  • Solution: updated sound driver.
  •  Remedy: worked properly, I completed movie.

3.    Network not working

  • Identification: Network cannot be connected.
  • Cause: Airplane mode was enabled.
  • Solution: Disabled airplane mode and enabled WIFI.
  • Remedy: Now internet has access.

4.    USB drive not working

  • Identification: USB drive was not recognized.
  • Cause: Defected USB drive.
  • Solution: Add new USB drive.
  • Remedy: USB drive recognized.

 Conclusion

Installation of windows 10 was completed. I have installed ZoneAlarm Free Firewall Antivirus as antivirus software, Apache OpenOffice as office package and VeraCrypt as utility software. Also, Installation of Linux mint mate was completed. I have installed google chrome and did testing and also done some faulty pc of computer and Found its solution.

Creation of Website and Staff Training for Theme Park

Scenario
You are an independent IT consultant. You have been asked to build a website for a
theme park based in the UK. The theme park has a number of rollercoasters and other
rides for members of the public to enjoy. The theme park has a range of theatres that put
on shows during the day, for example a car stunt show, and a puppet show for children.
The company has decided that they need to create a new website to attract new
customers to the theme park.
The website should allow customers to perform the following tasks:
• View information about the theme park e.g. a map of the park, videos of the rides
• View opening times and prices
• Purchase tickets for a specific date and make payments securely online
• Arrange to collect tickets from the park, or have them posted at an additional cost
• View and enter a monthly puzzle competition to win tickets to the park
• Register their details so that a monthly email can be sent to them giving information
about new attractions, competitions, etc
• View information about other local attractions and links to nearby accommodation
The project will require the creation of a new website. The theme park would like their four
office staff members to receive training on how to operate, update and maintain the
website.
The theme park has allocated a budget of £40 000 for the project. The problem that you
must solve is how you will spend the money to get the best results, with the aim of having
a website which is capable of meeting the above stated requirements. In addition, the
office staff must be fully trained and competent in using the website.
The senior management has requested a detailed report on your plans before they make
the funds available. This should include any assumptions you have made.

Introduction

My name is Roshan Oscar Sah. I have also been an IT consultant. As I see there is requirement of web design and development, of theme park. The theme park is globally popular park which is located in London. The purpose of building this new website is to attract the viewers who like to have fun. Website can actually make easy to know details about theme park by staying at home and also have their inquiry solved. So, I have planned to make your website.

 The theme park has high range of theaters which is available during day. I think of adding 3D maps so viewer can see park in 3D and this integration to website can boost website traffic. There will be lots of videos and photograph of rides, instruction and safety measures. The site will have opening time and closing time with real time integration and live traffic and also people can book online ticket. As per requirement says there will also be monthly puzzle competition.

Company wants a design and development of website in which it can have easy access to information to the costumer. Costumer will have all sort of benefits and rewards like legit price which they can directly book or buy from website and monthly puzzle competition.

Budget of £40 000 is mentioned to build this website. Training of four office staff is also included. The office staff should be able to operate, update and maintain the website. I would like to use mentioned budget wisely to meet every requirement of this website.  

Task 1

1.    Plan

Plan is to develop and design a website inside the given budget. I have planned the selection criteria of creating a beautiful web page with dedicated hosting services. Name the domain name as same as the name of theme park for easy search engine and also make the user interface smooth and clean. Since the budget for this project is €40,000 to finish all the tasks I will have to utilize all my skills for that selection of criteria. Website should have all the required contents with privacy and securities. Lastly we should teach their 4 staff to maintain website.

a.     Problem definition:

The website will have online ticket system. In which people or visitor will have two option either to buy ticket form theme park or buy it in website from home. The website will have variety of contents about theme park like videos of joy rides, how it’s operated, opening and closing time and also include the maps. Online payment in this website will be secure like other e-commerce website. Park will have all sorts of joy rides and theaters with different shows like car stunt show and puppet show for children.

Visitor will get more information about theme park and also local attraction. First day of every month there will be held monthly puzzle competition in which user have to login, if not sign up for competition. Website will be designed and developed well in time and as well as the training the four staff of theme park to operate and maintain the website. The budget of theme park website is £40 000 which includes only one time of development, designing and training. For further maintenance or upgrade to website can cost extra pound.

b.     Identifying selection Criteria

Developing a good and secure website in cutting edge world is not easier. We need many sorts of things like domain, storage hosting which should be running 24/7, server, security, secure payment, etc.

Selection criteria are listed below:

·       Domain (Top10 Website hosting, 2018)

  • Domain.com
  • Buydomains.com
  • Godaddy.com

·       Storage hosting (Editors Review.org, 2018)

  • Himalayan host
  • Blue host
  • Hostgater

·       Server (opensource.com, 2018)

  • Apache http server
  • Node.js
  • Monkey http server

·       Security (techradar, 2018)

  • Avast
  • Kaspersky
  • Norton

·       Image editor (Creative, 2018)

  • Picmonkey
  • Gimp
  • Snapseed

·       Logo design (Vyond, 2018)

  • Logo maker
  • Laughing bird
  • So think

·       Website building software (TemplateToaster, 2018)

  • Adobe Photoshop
  • Adobe Dreamweaver
  • mobirise

·       Secure payment (SEJ, 2018)

  • we pay
  • PayPal
  • Amazon

C. Process of selection (Evaluation of selections)

For the selection that we required to build the website for the theme park at London there are some analyzed data in the table ranked properly below:

  • Domain
NamesTransferCustomer SupportPriceDroppingExtra FeaturesTotalRank
Domain.com  34223142nd
Buydomains.com  35242163rd
Godaddy.com  1113391st
  • Storage hosting
NamesReliabilityUp timeLoadPriceCustomer SupportTotalRank
Himalayan host14354173rd
Blue host43255192nd
HostGator  52242151st
  • Server
NamesReliabilityPriceCustomer ServicesTotalRank
Apache http server12141st
Node.js12252nd
Monkey http server23493rd
  • Security
NamePricingCustomer SupportReliabilityExtra FeatureTotalRank
Avast1522101st
Kaspersky  2443132nd
Norton  4244143rd
  • Image editor
NamesStoragetimePricequalitytotalrank
Picmonkey  232293rd
Gimp  3431112nd
Snapseed  221271st
  • Logo design
NameUser InterfaceTimePriceExtrasTotalRank
Logo maker131161st
Laughing bird2243113rd
So think  2143102nd
  • Website building software
NamesUser InterfaceCompatibilityFlexibilitySupportPricetotalRank
Adobe Photoshop14243142nd
Adobe Dreamweaver  2122291st
mobirise  42432153rd
  • Secure payment
NameSecureReliablePriceTotalRank
we pay  334103rd
PayPal12141st
Amazon  32492nd

D. Statement and detail of solution

Ranking is necessary to be focused at the important required area. I have chosen these following from ranked table.

  • Domain

GoDaddy is best option to choose the domain name. It has its cheapest range of domain and also have some discount on seasons.it may cost up to £1.99 per year.

  • Storage Hosting

HostGator has reliable hosting services. In £999 for year we can get up to 1 TB storage, and 20 TB bandwidth.

  • Server

Apache Http server is one of the best server in the world right now. It is more dedicated and usually cost minimum amount like £595 year.

  • Security

Security is more important in current world. Avast is more secure and reliable in in world. It is more important to stay secure at £399 per year.

  • Image editor

Snapseed makes us easy for image post processing. Snapseed is an app made by Google and it is quite easier to use. This app has great user interface and is free to use.

  • Logo design

Logo maker is simple software which helps to design a beautiful logo and create a unique design. Software will cost £199 and is one time purchase.

  • Website building software

Adobe Dreamweaver is cool and elegant software. Its user interface is nice to spend an hours of coding. It has predication and it saves a lot of times. Adobe Dreamweaver costs £99 per year.

  • Secure payment

PayPal is one of the secure way for payment which can be used for payment and any types of transition. It is easy to integrate in website and it has real time monitoring. For year it will cost £200 per year

Total Costing might not be to the sum but it may cover up after teaching your 4 members and my hard work and advertising of theme park.

Conclusion

Everything here in this solution of development of website is settled for single year. The solution is made by researching all the possibilities and to give the final output at its best.

Though this website will be made once at high cost I think that it will go high and will worth more than it costing. Costing is made only for single year. After that your staff can also help to maintain website.

References

Creative. (2018, 9 6). Retrieved from https://www.creativebloq.com/design-tools/best-photo-apps-513764

Editors Review.org. (2018, 9 6). Retrieved from https://hosting.editorsreview.org/?utm_source=google&utm_medium=genericsearch&kclickid=5c74ca5e-b6bf-42fa-8cb8-f1328172260c&utm_source=google&utm_medium=genericsearch&gclid=Cj0KCQjwsMDeBRDMARIsAKrOP7HlsFsBEYvI3KsCnTXBdkMOvuusn7kq6xDcLdNmPjZDH27C6YglhPgaAi

opensource.com. (2018, 9 6). Retrieved from https://opensource.com/business/16/8/top-5-open-source-web-servers

SEJ. (2018, 9 6). Retrieved from https://www.searchenginejournal.com/top-12-alternatives-paypal/

techradar. (2018, 9 6). Retrieved from https://www.techradar.com/news/best-antivirus

TemplateToaster. (2018, 9 6). Retrieved from https://blog.templatetoaster.com/web-design-software-list/

Top10 Website hosting. (2018, 9 6). Retrieved from https://www.top10bestwebsitehosting.com/DomainHosting-Comparison?utm_source=google&kw=domainname&c=237829173015&t=search&p=&m=p&adpos=1t1&dev=c&devmod=&mobval=0&network=g&campaignid=247009428&adgroupid=9537074388&targetid=kwd-76733591&interest=&physical=1

Vyond. (2018, 9 6). Retrieved from https://www.vyond.com/resources/6-best-logo-maker-and-creation-tools/

Database : Stella Arts Event Booking System

Background and requirements

Stella Arts is an arts company which manages and produces a range of performances including ballet, plays and musicals at a range of venues across the country. They run a loyalty scheme which many customers join as they receive a discount on future bookings. Current discount levels are 5% for bronze customers, 7% for silver and 10% for gold customers (see figure 1).

The current system starts with customers booking events. The customer will phone Stella Arts and the receptionist will book the tickets. Each booking can have many tickets. The booking form will include the customer details (see figure 2), the quantity of tickets, the event name and other details such as the venue and price (see figure 3). Each event must be at different dates/times. Payment can be made either in cash on the door when they arrive at the event or by credit card or debit card. After the booking has been made the customer will receive email confirmation and tickets (figure 4) are either collected at the venue or sent in the post.

Venue details such as the name of the venue, address, capacity and contact details are stored in a notebook (see figure 5).

The client would like a database system so that they can keep track of bookings and to reduce the pressure on reception staff. Stella Arts would like an online booking system and one can also provide management information relating to bookings for business planning purposes.

Introduction

Scenario given above is about creating database for Stella art company. Stella art company manages performances that includes musicals play, ballet at a variety of Venues across the country. Book keeping system of the company have been recorded at notebook. Company also gives loyalty Scheme in which customer can get offer. Company has different loyalty level like gold bronze and silver for their customer. Booking can be completed by the form of customer detail, event, venue, ticket and payment details. payment is accepted in different method. Only one event and date can be booked at one time. Ticket can be taken at given address or also can be collected at venue.

Task 1 – Design

a)    Produce an entity relationship model for the proposed database system for Stella Arts. This should be a fully normalized model to 3rd normal form.

The relationships of entity sets stored in a database is An entity relationship diagram (ERD) shows. An entity in this context is an object, a component of data. … By defining the entities, their attributes, and showing the relationships between them, an ER diagram illustrates the logical structure of databases. (SmartDraw, 2018)

ER diagram was created

b)    Discuss how normalization of each of the samples of data in the scenario contributed to your finished ER diagram.

Normalization is the process of making many simple tables from complicated table. It helps to reduce data and make easier for user by removing duplication, partial dependency and in dependent dependency.

Loyalty Scheme Levels
Customer Details
Bookings
Tickets
Venues

C)    Produce a data dictionary for the entity relationship model showing all attributes, with data types and identifying primary and foreign keys.

Roshan_Loyalty

nameTypelengthnullkeyconstraint
loyaltyidInteger Not nullPrimary keypk_loyaltyid
loyaltylevelVarchar20   
noofbookingInteger    
discountFloat    

Roshan_Manager

nameTypelengthnullkeyconstraint
manager_idinteger Not nullPrimary keypk_mid  
manager_f_nameVarchar15   
manager_l_name  Varchar15   
tel_numberVarchar20   

Roshan_post_Colect

nameTypelengthnullkeyconstraint
post_collect_idinteger Not nullPrimary keypk_ptctid  
post_collectVarchar  10   

Roshan_Payment

nameTypelengthnullkeyconstraint
paymentid  Integer Not nullPrimary keypk_paymentid  
paymentmethod  varchar15   

Roshan_Venue

nameTypelengthnullkeyconstraint
venue_id  Integer Not nullPrimary keypk_event_id  
venue_name  Varchar50   
full_price  Float    
event_time  Time    
venue_id  int  Foreign keyfk_vid  

Roshan_event

nameTypelengthnullkeyconstraint
event_id  Integer Not nullPrimary keypk_event_id  
event_name  Varchar50   
full_price  Float    
event_time  Time    
venue_id  int  Foreign keyfk_vid  

Roshan_Customer

nameTypelengthnullkeyconstraint
customer_refInteger Not nullPrimary keypk_customer_ref
customerf_nameVarchar50   
customerl_nameVarchar50   
addressVarchar100   
contact_numberVarchar20   
emailVarchar50   
loyaltyidInteger  Foreign keyfk_cr_lid

Roshan_Ticket

nameTypelengthnullkeyconstraint
ticketnointeger Not nullPrimary keypk_tno
seatnointeger    
rowVarchar10   
post_collect_idinteger  Foreign keyfk_tno_pcid
customer_refinteger  Foreign keyfk_tno_cr

Roshan_Booking

nameTypelengthnullkeyconstraint
booking_refInteger Not nullPrimary keypk_bref
booking_datedate    
ticket_qtyinteger    
event_dateDate    
customer_refInteger  Foreign keyfk_cusref
payment_idInteger  Foreign keyfk_bref_eid
event_idinteger  Foreign keyfk_bref_pid

Task 2 – Data Entry and Data Manipulation

1.    Create all the normalized tables in SQL. Show your SQL scripts and the finished tables. 

Loyalty
Manager
Post/collect
Payment
Venue
Events
Customer
Ticket
Booking

2.    Enter all data on all customers and loyalty level

 Inserting the given queries and executing data into table

loyalty values

Inserting the given queries and executing data into Customer table

Customer

3.    Enter venue data

Inserting the given queries and executing data into Venue table

Venue Values

Inserting the given queries and executing data into manager table

Manager Values

4.    Enter booking and event data

Inserting the given queries and executing data into booking table

Booking Values

Inserting the given queries and executing data into event table

Event Values

Inserting the given queries and executing data into payment table

Payment Values

5.    Enter ticket data

Inserting the given queries and executing data into ticket table

Ticket Values

Inserting the given queries and executing data into post/Collect table

Post/Collect Values

6.    Write a query that selects the first name and surname of customers in alphabetical order of surname

7. Write a query that selects all bookings by event date in ascending order

8. Write a query that counts all the bookings where the payment method is credit card

9. Write a query that returns all event bookings where the quantity of tickets is greater than 1 ordered by description

10. Write a query that selects all customer first names and surnames and loyalty level who pay by credit card grouped by their loyalty level

11. Change the contact name for ‘The Coliseum’ to Mark Hibbart

12. Add a new venue: ‘The Round Theatre, 12 Grayson Lane, Manchester, M1 2RT’ to the venue table. It has a capacity of 230. The contact name is ‘Sarah Jones’ and the contact number is 07667543444

13. Delete the venue ‘The Octagon’

Task 3 – Assessment

1.    Your understanding of the requirement explaining any assumptions made

Since every company needs managed and easy data and Stella also needs data related to booking, event, event date, ticket, venue and loyalty level. So, the company needs a organized data to keep records of customer. So table of booking, ticket, event, venue and loyalty level is required to create.

2.    Initial design to meet the requirements including your design decisions and justifications.

Every data on table was normalized. Broken into 1NF, 2NF and 3NF. After that dependency like partial dependency, non-key dependency and repeating group will separate. To design the database of Stella arts I have divided data into 9 tables.

3.     How the requirement has been met.

Company requirement is to have a reliable record keeping database system. It must be also easy for working staff to easily input the data. Staff should input data effortlessly. Data should look clearer. As shown in above data ER diagram the relation between table was established. After that it became easier to input the data, view the files, delete the record and edit the given records.

Conclusion

Stella Art Company record data management was designed. The data of Stella Art could be added, removed, view and update. Company requirement was met by the following development. Now it time for company to decide weather they likes or not and if it meets company standard.

References

SmartDraw. (2018, 10 15). Retrieved from https://www.smartdraw.com/entity-relationship-diagram/

progress bar gif

Best Practices for Animated Progress Indicators

Visibility of system status is one of the most important principles in user interface design. Users want to feel in control of the system they’re using, which means they want to know and understand their current context at any given time, and especially when a system is busy doing work. A wait-animation progress indicator is the most common form of providing a system status for users when something is happening or loading. While an instant response from an app is the best, there are times when your app won’t be able to comply with the guidelines for speed. A slow response could be caused by a bad internet connection, or an operation itself can take a long time (e.g. install an update for OS). For such cases, in order to minimize user tension, you must reassure users that the app is working on their request and that actual progress is being made. Thus, you should provide feedback to the user about what is happening with the app within a reasonable amount of time.

To get a better understanding of how your UI designs can benefit from animated progress indicators, it will help to sketch out your (app) ideas. A few months back, Adobe introduced a new design and wireframing app called Experience Design (or Adobe XD), designed for creating interactive wireframes and user interfaces. The app is still in public beta, with features added on a regular base, and you can download and try it out for free. In this article, we’ll explore the main types of animated progress indicators and provide recommendations on when and how to use each type.

Designing the Perfect Feature Comparison Table

When Is A Feature Comparison Useful?

In observing customers in a few e-commerce projects, I found it quite revealing to notice how seemingly irrelevant a comparison feature appears to be to many customers. Quite often users will say that it clutters the interface, and that they never use the feature. The reason for it is simple: While we tend to purchase small low-priced items quite often, we tend to buy large high-priced items not so frequently. In fact, there are just not that many situations where we actually need a feature comparison.

The Building Blocks Of Feature Comparison

If we wanted to compare two or more items against each other to find the better fit, what would be the most obvious way to do that? With clothes, we would try them on and pick the one that feels right. But what if trying things on isn’t an option? When purchasing products online, we can rely on our past experiences, ratings, expert reviews, customer reviews and trustworthy recommendations to reduce the scope of options to just a few candidates.

Still, at some point, you might be left with a few too similar items — maybe one a bit too expensive, the other missing an important quality, and the third a recommendation from a friend’s friend. So, what do you do? You list all options, examine their attributes side by side, and eliminate options until you have a winner. (Well, at least most people do that.)

Translated to common interface patterns, this naturally calls for a structured layout that aids in the quick scanning of options — probably a good ol’ comparison table, with columns for products, and rows for their attributes. Once the user has selected products and prompted the comparison view, we can just extract all attributes from all selected products and list them as rows in the table. Should be easy enough, right? Yes, but that’s not necessarily the best approach for meaningful comparison.

Not All Attributes Are Created Equal

Ideally, we’d love to display only meaningful, comparable attributes that the customer cares about. Rather than extracting and lining up all product specs, we could determine and highlight all relevant product attributes, while keeping all other attributes accessible. This requires us to (1) find out what the user is interested in and (2) have consistent, well-structured data about our products.