Thursday, August 27, 2020

Planning and time scale Essay Example | Topics and Well Written Essays - 500 words

Arranging and time scale - Essay Example dealing with the primary dangers just as estimating the VOICE venture execution lastly giving suitable undertaking the board time frame on how the usage and administration support for giving VOICE administrations to VOs. Time is everything for this specific task. In such manner, here underneath is an introduction of how the venture the board is to be done which incorporates the timescales (Kerzner, 2013: 97). It is essential to note here that however the undertaking should be bunch work, every individual from the gathering is ordered to assume a particular job and thus the arranging here beneath alludes to every part and consequently the gathering. The gathering chief requires a gathering to do assessments of the effect of the methodology picked on how good is the product to ISO 25000 SQuaRE Standards. This is finished by each part where programming item quality is altogether dissected by every part and discoveries introduced by every part in the gathering. The gathering at that point keeps an eye on all the discoveries introduced by every part Every part is designated one help process that is influenced by the VOICE venture whereby he is required to layout each key movement that is required to execute that very assistance process inside the association. Money saving advantage investigation starts and this is cooperatively done by every individual from the gathering. This includes investigation of whether the difference in the product is increasing the value of the organization. For exhaustiveness, every part is given a particular zone which he investigations completely then gives at that point gives the discoveries to the gathering who at that point does fine examination. The gathering chief leads the gathering into distinguishing and evaluating every single rising issue which incorporate every single lawful issue and any specialized dangers associated with the change. The gathering sets down relief ways. When the issues have been distinguished, the work is shared among each

Saturday, August 22, 2020

Earwax Goal and Positive Role Model Essay

Earwax Goal and Positive Role Model Essay Earwax: Goal and Positive Role Model Essay Understudy Reflection The benefit of acquiring a degree is invaluable to me. There are some drawn out outcomes that originate from having that bit of paper that has your degree on it. Practically all employment showcases out there on the planet today require preparing with an advanced education because of the considerable number of redesigns in innovation that has happened. For me, the benefit of getting my degree implies that I will have the option to add to my family salary alongside my fiancã ©e. I will assist with giving a superior method of living for my kids and ourselves. I will at last have the option to go to an occupation that I endeavored to go to. The entirety of the considering and assignments that I am experiencing right currently is only a venturing stone to my future vocation. I am trusting that by me returning to class and getting my degree will help impact my own children to need to improve themselves when they grow up. I need to be a positive good example and give them that they also c an set off for college and improve a life for them. The entirety of the evaluations and devices that are given to us in this web based learning condition are extraordinary and can be useful to every one of us for our future courses and future vocations. I never knew all the exercises that we have chipped away at in this course would give me things that I never thought about myself. My fitness test and moral focal point stock demonstrated me the sort of character I have in words. I knew things about myself yet observing them recorded as a hard copy is somewhat of an alternate perspective on everything. Building my vocation way is additionally something that helped me to discover what sort of profession decisions are out there that I had not started to think would be something that I should do when I graduate also. Going into school, my mentality was totally concentrating on social insurance organization and that was it. Presently I see what different professions there are accessible to utilize my degree with. It gave me that there are considerably more vocations that include working with the open other than working in a doctor’s office or medical clinic. Learning in this collective condition with all these different understudies is actually a great open door for me. I appreciate having the option to type my reactions to my individual cohorts and hear again from them. It instructs us to be progressively mindful of others on an unexpected level in comparison to being together in a physical study hall. Rather than being in a class with understudies your own age, you are with an assortment old enough gatherings in a community oriented web based learning condition. This permits greater decent variety and various perspectives from a wide range of individuals. There are numerous individuals that have such a large number of various encounters and we would all be able to gain from them. This course has likewise assisted with showing me somewhat more about time an d stress the executives. That is something that is critical to realize how to oversee in a positive manner particularly when you work, have children at home, and so on. It is imperative to realize how to deal with these assignments to that things complete appropriately. I am happy to

Friday, August 21, 2020

Term Paper Writers Bias

Term Paper Writers' BiasTerm paper writers and their work have been used as a weapon to convince professors to accept a student's paper for review. Now that we know how this works, we have to accept it, because the articles on this website are only out to enlighten and educate.First of all, the term paper is often filled with mistakes, misleading or unfounded information. The paper writer has no idea what the purpose of the article is supposed to be about, so she/he writes it from the start, in order to have a foundation for any conclusion or argument. The writer knows how to craft an opinion but lacks knowledge on how to write an article.Some articles on this website are so full of baseless statements, you would have to imagine them to be written by an expert. There are examples of biased writing, if you will, that can hurt not only your pride but also the reputation of a candidate. The good news is that it's easy to spot these cases.You should always look for the first thing that a writer says in an article. She/he will say something to convince you to agree with her/his point of view. If the article does not follow its own premise, you have to question why. And when you read and analyze these problematic writings, you will see an inconsistency between what the author tells you and the actual article itself.According to my experience, the best term paper writers are those who write from the heart and treat every writing experience as a trial. I've noticed that very few writers in this field, write from a place of bias.Writing from a heart is a difficult art, but it requires dedication and hard work to accomplish. It's a way of communication that conveys a message. But why is it that most students who enter this field have a bias against term papers?They all read and think like a professor, so they adopt various techniques of communication and just write what they want to tell you. Therefore, there are articles that are filled with wrong or erroneous informati on. Just because they're being written by term paper writers, doesn't mean they should be taken as gospel truth.But it is very easy to spot biased writing from term paper writers, simply because it doesn't fit the subject of the article. Other article topics don't have a bias, so when you do look at these biased topics, you must remember that these writers did not come up with the subject matter.

Monday, May 25, 2020

The Awareness Of Children s Perception Of Disabilities...

Nowadays, with the development of people’s perception of disabilities, the avoidance of this topic is on the decrease. Less and less parents are not eager to deny that their children could possibly have some kinds of disability when they were suggested to take a test by educator. In fact, more and more of them initiatively took their kids to the test center when they somehow realized their children might show a sign of any types of disabilities or did not achieve certain goals during their growing. We have learned various area of disabilities and the resources of helping people with disabilities. Advanced science and technology has made assistance by professional in special field the inevitable result of the social development and an essential part of the structure in modern society. Therefore, not only public support facilities and also the appropriate special education program shall arouse close public concern. For majority people with disabilities one of the most indispensable life experience is to enter the mainstream of society and realize one’s personal value, which promote the statues of positive spirit. The purpose of this essay is to illustrated how I have gain a deeper understanding of people with disabilities by interviewing Mr. Franco and doing research. For reaching the goals of look into the life of living with family members with disabilities, I interviewed Mr. Franco, who is a guardian of 17-year-old boy Miguel who has a dead/hard of hearing which is aShow MoreRelatedPhysically Challenged6701 Words   |  27 Pageshandicapped (ii) Mentally ill. The condition of disability may arise by birth or in accident. Polio, blindness, deafness, dumbness and mental illness may occur by birth or by other incidents or due to ill health. Handicappedness is measured by medical persons in various degrees while they give certificate to the handicapped person. It is estimated that about twelve millions Indians about 1.8 per cent of Indian population have at least one disability or the other. About 10 per cent of the handicappedRead MorePapoer6763 Words   |  28 Pagesbelieve in the power of music to engage children. What scientifically based research supports the use of music and musical instruction to build early literacy skills? This research summary answers that question, providing support to educators who wish to integrate music and musical instruction into their early language and literacy programs in schools. This research summary reviews high-quality experimental studies conducted in classrooms with young children receiving music education, plus relevantRead MoreDevelopmental Skills : Childhood And Social Emotional Development Essay1530 Words   |  7 Pagesidentifying and labeling basic emotions, preschool age children are beginning to understand mental states and differentiate between their own and others’ preferences (B ronson, 2000). Dramatic role- play activities contribute to the development and understanding of others’ perspectives; children are able to act out various scenarios and learn through trial and error what peers may want and expect. Preschool age children can identify ways to comfort people and alleviate their distress, and their desire toRead MoreEssay on Dyslexia2503 Words   |  11 Pageslife for all children. Each day children are faced with many new concepts and various challenges. Can you imagine how it feels for a child to face not only new challenges life has, but to face these challenges while living with a learning disability? These challenges are met not just when they begin school either. Students suffer from learning disabilities from the moment they begin learning, not when they start school. Learning disabilities are real and they affect millions of people. â€Å"One such disabilityRead MoreUnderstanding Spesific Needs in Health and Social Care5219 Words    |  21 PagesIntroduction The aim of this essay is to analyse the concepts of health, disability, illness and behaviour and also investigate how health and social care services and systems support individuals with specific needs and look at different approaches and intervention strategies available to support individuals with specific needs, lastly will explain what challenging behaviour is and explain strategies available for those working with people with specific needs LO1.1 Health is defined as a state of completeRead MoreEssay on Dyslexia2537 Words   |  11 Pageslife for all children. Each day children are faced with many new concepts and various challenges. Can you imagine how it feels for a child to face not only new challenges life has, but to face these challenges while living with a learning disability? These challenges are met not just when they begin school either. Students suffer from learning disabilities from the moment they begin learning, not when they start school. Learning disabilities are real and they affect millions of people. One such disabilityRead MoreAnimal Assisted Therapy ( Aat )2411 Words   |  10 Pagesmost animal assisted therapy sessions include dogs, or horses. A service dog is trained to do work, care for, for perform tasks for people with physical or mental conditions which inhibits major life activities/functions such as: caring for one’s self, learning, walking, performing manual tasks, speaking, breathing, seeing, and working (Americans with Disabilities Act, 1990). Equine therapy is a form of therapy which involves horses as a means to provide metaphoric experiences in order to promoteRead MoreHsc Level 5 Unit 534 Essay14626 Words   |  59 Pagescritical in shaping ideas, perceptions and attitudes. They can be used to reinforce existing prejudices or to liberate people from stereotypes, prejudices and misconceptions. If anyone doubts the value of this or the potential for relatively rapid change, consider the distaste with which we all now view the word â€Å"nigger†. None of us would dream of using it. Yet only a generation or two ago it was an internationally acceptable and widely used term for the individual people of an entire ethnic groupRead MoreLearning Disabilities Assignment5424 Words   |  22 Pagesï » ¿Learning Disabilities Assignment 1. Identify legislation and policies that are designed to promote the human rights, inclusion, equal life chances and citizenship of individuals with learning disabilities One of the main causes of discrimination is the fear and lack of understanding of others because they are different. In order to prevent discrimination it is important to value people and treat them differently in order to meet their different needs. The legislation and policies that are designedRead MorePerson Centred Care Essay4055 Words   |  17 PagesClients with behaviour and learning needs, and associated autistic difficulties. Clients are both sexes and range in age from four to eighteen. It will be undertaken, defining person centred care in relation to the incident, it will demonstrate awareness to roles and responsibilities of professionals in meeting the needs of the client and it will demonstrate the importance of inter-professional collaboration and discuss the issues that facilitate or act as barriers in this partnership. In Order

Thursday, May 14, 2020

Definition of Literacy Test

A literacy test measures a person’s proficiency in reading and writing. Beginning in the 19th century, literacy tests were used in the voter registration process in southern states of the U.S. with the intent to disenfranchise black voters. In 1917, with the passing of the Immigration Act, literacy tests were also included in the U.S. immigration process, and are still used today. Historically, literacy tests have served to legitimize racial and ethnic marginalization in the U.S. HISTORY OF RECONSTRUCTION AND JIM CROW ERA Literacy tests were introduced into the voting process in the South with the Jim Crow laws. Jim Crow laws were state and local laws and statutes enacted by southern and border states in the late 1870s to deny African Americans the right to vote in the South following Reconstruction (1865-1877). They were designed to keep whites and blacks segregated, to disenfranchise black voters, and to keep blacks subjugated, undermining the 14th and 15th Amendments of the United States Constitution. Despite the ratification of the 14th Amendment in 1868, granting citizenship to all persons born or naturalized in the United States which included former slaves, and the ratification of the 15th Amendment in 1870, which specifically gave African Americans the right to vote, Southern and Border states continued to find ways to keep racial minorities from voting. They used electoral fraud and violence to intimidate African American voters, and created Jim Crow laws to promote racial segregation. During the twenty years following Reconstruction, African Americans lost many of the legal rights that had been gained during Reconstruction. Even the Supreme Court of the United States â€Å"helped undermine the Constitutional protections of blacks with the infamous Plessy v. Ferguson (1896) case, which legitimized Jim Crow laws and the Jim Crow way of life.† In this case, the Supreme Court maintained that public facilities for blacks and whites could be â€Å"separate but equal.† Following this decision, it soon became the law throughout the South that public facilities had to be separate. Many of the changes made during Reconstruction proved to be short-lived, with the Supreme Court continuing to uphold racial discrimination and segregation in its decisions, thus giving southern states free reign to impose literacy tests and all manner of voting restrictions on prospective voters, discriminating against black voters. But racism was not just recurring in the South. Although the Jim Crow Laws were a Southern phenomenon, the sentiment behind them was a national one. There was a resurgence of racism in the North as well and â€Å" emerging national, indeed international, consensus (among whites at any rate) that Reconstruction had been a serious mistake. LITERACY TESTS AND VOTING RIGHTS Some states, such as Connecticut, used literacy tests in the mid-1800s to keep Irish immigrants from voting, but Southern states didn’t use literacy tests until after Reconstruction in 1890, sanctioned by the federal government, where they were used well into the 1960s. They were used ostensibly to test the voters ability to read and write, but in reality to discriminate against African American voters and sometimes poor whites. Since 40-60% of blacks were illiterate, compared to 8-18% of whites, these tests had a large differential racial impact. Southern states also imposed other standards, all of which were arbitrarily set by the test administrator. Those who were property owners or whose grandfathers had been able to vote  (â€Å"grandfather clause†),  those deemed to have â€Å"good character,† or those who paid poll taxes were able to vote. Because of these impossible standards, â€Å"in 1896, Louisiana had 130,334 registered black voters. Eight years later, only 1,342, 1 percent, could pass the state’s new rules.†Ã‚  Even in areas where the black population was substantially greater, these standards kept the white voting population in the majority. The administration of literacy tests was unfair and discriminatory. â€Å"If the official wanted a person to pass, he could ask the easiest question on the test—for example, Who is the president of the United States?† The same official might require a black person to answer every single question correctly, in an unrealistic amount of time, in order to pass.†Ã‚  It was up to the test administrator whether the prospective voter passed or failed, and even if a black man was well-educated, he would most likely fail, because â€Å"the test was created with failure as a goal.† Even if a potential black voter knew all the answers to the questions, the official administering the test could still fail him. Literacy tests were not declared unconstitutional in the South until ninety-five years after the15th Amendment was ratified, by the passage of the Voting Rights Act of 1965. Five years later, in 1970, Congress abolished literacy tests and discriminatory voting practices nationwide, and as a result, the number of registered African American voters increased dramatically. ACTUAL LITERACY TESTS In 2014 a group of Harvard University students was asked to take the 1964 Louisiana Literacy Test to raise awareness about voting discrimination.  The test is similar to those given in other Southern states since Reconstruction to potential voters who could not prove they had a fifth grade education. In order to be able to vote, a person had to pass all 30 questions in 10 minutes. All of the students failed under those conditions, because the test was meant to be failed. The questions have nothing at all to do with the U.S. Constitution and are completely nonsensical. You can try the test yourself here.   LITERACY TESTS AND IMMIGRATION In the late 19th century many people wanted to restrict the influx of immigrants to the U.S. due to increased problems of urbanization and industrialization such as crowding, lack of housing and jobs, and urban squalor. It was during this time that the idea of using literacy tests to control the number of immigrants able to enter the United States, particularly those from southern and eastern Europe, was formed. However, it took those who advocated for this approach many years to try to convince lawmakers and others that immigrants were the â€Å"cause† of many of America’s social and economic maladies. Finally, in 1917, Congress passed the Immigration Act, also known as the Literacy Act (and Asiatic Barred Zone Act), which included a literacy test that is still a requirement for becoming a U.S. citizen today. The Immigration Act demanded that those who were over the age of 16 and could read some language must read 30-40 words to show they were capable of reading. Those who were entering the U.S. to avoid religious persecution from their country of origin did not have to pass this test. The literacy test that is part of the Immigration Act of 1917 included only a few languages available to immigrants. This meant that if their native language was not included, they could not prove they were literate, and were denied entry. Beginning in 1950, immigrants could legally only take the literacy test in English, further limiting those who could gain entry to the United States. Besides demonstrating the ability to read, write, and speak English, immigrants also have to display knowledge of U.S. history, government, and civics. English literacy tests have effectively been used in the U.S. as a means to keep immigrants  that the government deemed unwanted out of the country, for the tests are demanding and rigorous.   Would you be able to pass them? REFERENCES 1.Jim Crow Museum of Racist Memorabilia, Ferris State University, 2.Foner, Eric., The Supreme Court and the History of Reconstruction -- and Vice-VersaColumbia Law Review, November 2012, 1585-1606http://www.ericfoner.com/articles/SupCtRec.html 3.4. Techniques of Direct Disenfranchisement 1880-1965,  University of Michigan, http://www.umich.edu/~lawrace/disenfranchise1.htm 4. Constitutional Rights Foundation, A Brief History of Jim Crow, http://www.crf-usa.org/black-history-month/a-brief-history-of-jim-crow 5. The Rise and Fall of Jim Crow, PBS, http://www.pbs.org/wnet/jimcrow/voting_literacy.html 6. Ibid. 7. http://epublications.marquette.edu/dissertations/AAI8708749/ RESOURCES AND FURTHER READING Alabama Literacy Test, 1965, http://www.pbs.org/wnet/jimcrow/voting_literacy.html Constitutional Rights Foundation, A Brief History of Jim Crow, http://www.crf-usa.org/black-history-month/a-brief-history-of-jim-crow Foner, Eric, The Supreme Court and the History of Reconstruction -- and Vice-Versa Columbia Law Review, November 2012, 1585-1606http://www.ericfoner.com/articles/SupCtRec.html Head, Tom, 10 Racist US Supreme Court Rulings, ThoughtCo., March 03, 2017, https://www.thoughtco.com/racist-supreme-court-rulings-721615 Jim Crow Museum of Racist Memorabilia, Ferris State University, http://www.ferris.edu/jimcrow/what.htm Onion, Rebecca, Take the Impossible â€Å"Literacy† Test Louisiana Gave Black Voters in the 1960s, http://www.slate.com/blogs/the_vault/2013/06/28/voting_rights_and_the_supreme_court_the_impossible_literacy_test_louisiana.html PBS, The Rise and Fall of Jim Crow, http://www.pbs.org/wnet/jimcrow/voting_literacy.html Schwartz, Jeff, CORE’s Freedom Summer, 1964 - My Experiences in Louisiana, http://www.crmvet.org/nars/schwartz.htm Weisberger, Mindy, Immigration Act of 1917 Turns 100: Americas Long History of Immigration Prejudice, LiveScience, Feb. 5, 2017, http://www.livescience.com/57756-1917-immigration-act-100th-anniversary.html

Wednesday, May 6, 2020

An Introduction To The Biometric Authentication System And...

block access to the card and its credentials. In the meantime, a temporary alternative must be established for communication between the authority and the user. Fig.4 shows how a message is used for authentication. If the mobile number is duplicated or the phone is tapped,the confirmation message reaches two people.In that case there is very high chance for the confirmation to be granted by the wrong person.Then, there must exist another level of security like a security question which was given to the user in the time of issuing the card.Or it can also ask for confirmation by asking the date of expiry of the card,as this bit of information might not be accessible to the fraud. And also a default message stating probable misuse must be†¦show more content†¦It is sometimes possible to replicate someone’s voice and use them for malpractice.In such cases,we can use other biometric methods. Fingerprints and retinas are unique to each individual. The card swiping machine can be connected to a biometric sensor system or a retinal scanner which acts as a confirmation for the transaction. For this method,the user’s database must be fed into the template database of the bank.As soon as the card is swiped,the biometric sensor receives the data of the user by scanning the fingerprint or retina and checks for a match in its database.The transaction can be successful only if the match exists,that is only if the identity of the person is stored in the bank template database.In case the scanned result does not match with any of the existing database ,then the system should generate a message that can be sent to the registered mobile and the auxiliary mobile number, thus making the user aware in case of any discrepancies.Along with the biometric scanned data,the user must answer a question in order to make the transaction successful,just to be on the safer side. The bank canShow MoreRelatedLiterary Review:Efficacy Of Biometric Passive Authentication1135 Words   |  5 PagesReview: Efficacy of Biometric Passive Authentication Methods These days, users have been faced with an ever-increasing number of passwords and the cognitive restrictions associated with them. Furthermore, authenticating with typical passwords means checking the user’s identity once and never questioning who utilizes a system after that process has finished. Nevertheless, new strides have been made in passive authentication, which would allow users to authenticate with a system continuously throughoutRead MoreBiometric Codes And Biometric Identification1637 Words   |  7 Pages Biometric Encryption Krishna Kumar D1304(11302033) Rajesh Kumar Thakur Meena Kumari Chandan Pathania Lovely Professional University, Punjab Introduction: A biometric is defined as a unique, measurable, biological characteristic or trait which is used to identify individuals. Most widely used biometric characteristics to identify individuals include Face, Fingerprint, Hand geometry, Retina, Iris, Voice etc. Biometric identification consists of two stages: †¢ Enrollment:Read MoreKey Role For The User Authentication1226 Words   |  5 Pages Section 1 Introduction: User Authentication plays the key role for the users to make use of the resources available in any given Environment. With the advancements in technology, it has become quite easy for a person to find out ways to access the data of the other person. It is very important to verify the true identity of the person trying to access his/her data. The concerned organization or the business group has to make sure that the person trying to access is the right user of theRead MoreUsing Elliptic Curve Cryptography ( Huang, 2015 )1413 Words   |  6 Pagesallowing/requiring their employees to work and connect remotely, authentication plays a key role in the security of a corporation. With sensitive data being available outside of a localized network, it is important to verify the identity of connecting employees in a secure and encrypted way to prevent interception by attackers that would hope to gain by a lapse in security. There are different methods for which this authentication can be achieved. Some are more secure than others but all shouldRead MoreComputer Security And The Technology1273 Words   |  6 PagesIntroduction: As time has gone on, society has advanced and the age of the computer came about, bringing its own advantages and concerns. One such concern was the question of computer security and personal information staying safe. It seems there has always been some form of computer security, however this form is dynamic, always changing and advancing. This is due to the fact that the technology that is made to bypass security is changing and advancing just as rapidly. Such as the progressionRead MoreAccess Control Policy1679 Words   |  7 PagesAssociate Level Material Appendix F Access Control Policy Student Name: Charles Williams University of Phoenix IT/244 Intro to IT Security Instructor’s Name: Tarik Lles Date: December 4, 2011 Access Control Policy Due in Week Seven: Outline the Access Control Policy. Describe how access control methodologies work to secure information systems Access control is used to restrict operations, which authorized users can perform. Access control does exactly what it says, it controlsRead MoreSecuring Healthcare Networks Against Cyber Attacks Essay1371 Words   |  6 Pagesenhancing the security and privacy of the hospital’s network. This paper proposes certain security mechanisms for a more controlled and safer access to the healthcare provider’s network, thus being aware of every device trying to access the network and making sure only authorized devices are able to connect, with the help of measures such as, intrusion detection systems to continuously monitor the network, firewalls to ensure endpoint devices comply with security policies and biometrics for identityRead MoreSecurity Issues Facing Online Banking1480 Words   |  6 PagesThere are security issues facing online banking and can these concerns be addressed. Introduction: Current technology is evolving fast, which brings new dimensions to people’s daily life. Moreover, network technological innovation not only brings huge economic benefits to the bank, but also has brought new needs for the requirements of online banking. The interaction between user and bank has been substantially enhanced by deploying computer operations, which not only reduce the cost of bank serviceRead MoreFingerprint Recognition : Fingerprint Identification Essay990 Words   |  4 Pagesrefers to the automated method of identifying or confirming the identity of an individual based on the comparison of two fingerprints. Fingerprint recognition is one of the most well known biometrics, and it is by far the most used biometric solution for authentication on computerized systems.Fingerprint authentication describes the process of obtaining a digital representation of a fingerprint and comparing it to a stored digital version of a fingerprint. Electronic fingerprint scanners capture digitalRead MoreApplication Of Using Smart Card3799 Words   |  16 Pagesimplement it utilizing three factor authentication scheme combines a one-time secret key plan for customer validation (one time password), biometric password and secure flash card (smart card). Our fundamental design contemplations were security, execution, convenience, accessibility, and scale. Biometric scan can be implemented using smart card. The created secure flash card has tamper resistant module, which contains client validation data and security keys, thus the system is highly secure. The point

Tuesday, May 5, 2020

Formal Specification and Design Techniques

Questions: 1. In natural language, write down the state information and the operations that are likely to be needed for the food order ? 2. Develop a mathematical description for the state space of the system and present it in a schema in the Z specification language ? 3. Write three possible schemas for Add User, Add Driver, Add Company, separately ? 4. Write a schema that describes a function to look up the phone number for a name (this is required when the driver will be delivering the food to the customer) ? 5. Write a robust schema to remove a company and associated information from the UBER eats database ? 6. Produce a Z specification for a card information that includes the information about account numbers, name, expiry date and CVV number ? 7. Use the Z schema calculus to get a robust version of the lookup schema ? 8. . An extensive analysis of various risk and possible way to cater the risks ? Answers: 1. State Information and the Operations for the food order The application (UberEATS) is an Android mobile app. The UberEATS app is a meal delivery service app. This app has created with the help of Uber Technologies Inc. that helps to connect the riders and drivers to use the current network for delivering the meals within minutes. In the preferred cities, such restaurants get the order from the customers for delivering that order with this Uber Smartphone Application. For every delivery, the delivery time is less than 10 minutes. The UberEATS team in various cities offered the distance limits for customer requirements. This app automatically changes the "signature items" of each restaurant which has registered in this app. Another feature of this app is having celebrity chefs in their pop-up restaurants. This feature is also preferred for customers when they are ordering the food. For example, Michael Mina is one of the partners of UberEATS for promoting his new dishes. UberEATS have 2-4 options for a meal on the daily menu. The UberEATS app is also used for transportation. The customer can easily use this app with the menu option of this app and directly order the items required if the service of UberEATS is available for that area. Every city of UberEATS has some different options such as lunch, dinner, and brunch. With the help of credit card, the user can easily pay the charges by using their mobile phone. It is like car service app. Depending upon the place of the customer, they deliver the meals either by cars, bikes or by foot. ("Course CS5232: Formal Specification and Design Techniques", 2017). The system of this app has UberEATS, customers, Uber driver, states, and restaurants. To order the foods by the customer through this app, they require the states. When the customer opens this app, he must register his details on this app. The required details of the customer are the name, address, contact number and credit card details. After completion of registration, the customer login to the UberEATS using their personal username and password. Then they order the needed food items from the options menu. After getting the customers order, all the requests have given to the nearest Uber drivers for delivery. They also get the alert from the customer directly. In such situations they can contact the selected restaurants by the customer and place the order. If the items are ready, the drivers deliver it to the customer within the time limit ("Bangkok Food Delivery - UberEATS", 2017). 2.Mathematical Description of the State space of the System and Schema in the Z Specification Language With respect to the Z specification language, the system of mathematical model has presented along with the schema. The Z specification language will be supporting the incremental specification and it is built with the use of the schema based on its components. The presented schema based on the state space of the system with support towards the incremental specification. The schema for the UBER EATS has designed in terms of the following structures of the schema like schema name, schema signature and schema predicate. All the specifications have referred using the schema name that has obtained. The signature of the schema declares the name and the types of the entities present in the schema. The relationship of the signature schema has predicted using the logical expression. The declaration made in the schema contains the specification based on the Uber Eats and the terms declared in the schema are as follows, users, drivers, order and checked. The first part of the schema describes about the pre-condition success process for the operation. The customer has to register their name first, then the nearest driver takes the order and checks the order and confirms to the customer about the selected item and the whole process has checked thoroughly for the delivery of the food for the right person within the specified place within the prescribed time. Malik Utting, 2005). Mathematical Description S Set of users m users n is one of the user the mathematical description is below: n {m: S1..m..}? n S ?(.n.) d {n: Checked/Order(n)=Item? / Driver = New Location?} ? d Checked ? Order(n) = Item? ? Driver = New Location? The describes the state that does not change. The n will be determined as one of the users. The d implies the delivery of the item also with some conditions present it, namely the location, item status and driver details. At last the delivery begins with respect to the order finalizing and the nearest location where the driver will be available (Saiedian, 2007). 3. Possible Schemas for Add User, Add Driver, Add Company With the help of following schema, the customer can easily add their details in the UberEATS app: The alerts of UberEATS are declared by UberEATS which helps to show the state of change. This schema introduces two different variables for adding new users such as users and users. The first variable is used for state observations before changing the states and the second one is used state observations after changing the states. These variables must contain both the operations before and after which is entirely forced to fulfill the need of the user. In the declaration the question mark is added by convention. The pre-condition is defined for successful operation. The condition is each person must have one user name to access the application. If the condition is not satisfied, the details are not shown on the application. It also shows the error message which is produced from this app itself. If the condition is satisfied, the second line shows the function of new users to the given location. The declaration of UberEATS alerts helps to describe change in state. It consists of two various variables. There are Driver and Driver. Driver variable is chosen for before state change and Driver variable is chosen for after state change. Both of the variables are indirectly forced for satisfying the user in before and after operations. The question mark is used for declaring the outputs. In this schema, two pre-conditions are used for completing the operations successfully. The conditions of each person should have the valid license and correct age. If any of these conditions are not satisfied, they cant utilize this app and get the error message. If it is satisfied, they utilize this app by the function of a second line in the schema (Dongmo Poll, 2011). In the company schema, it also has two variables for state change. The variables are companylist and companylist which are used for the observations of the state before and after changing respectively. It checks the existing company list with the added list. If it is new, it adds the company list into the existing list. Otherwise, it neglects it. 4. Schema that Describes a Function to look up the phone Number for a Name Every Driver in the Uber has the details of the customer for delivering their orders. The details of the customer must include the name of the customer, items ordered by the customer and contact details of the customer. At the time of delivery the Uber Driver must check the exact details of the customer before delivering the food items. For verifying the customer details, the UberEATS uses the Phone Book System. This system helps to contact the customer, when the Driver reaches the customers location. This schema consists of two different variables which are known and phone number. The first variable known is used to identify the customer for delivering the food items ordered by them. The second variable is used to get the domain variable. The domain variable is Known = dom ph.no. The Phone Book state space system has two different states such as success and failure. Phone number and the order details of the customer are important while delivering the food items by the Driver. Some verification is needed for delivery. So when the driver has the contact number of the customer, it will be easy for driver to deliver the food items. Then the process is declared as successful. If the food items are not delivered to the customer properly, the process is considered as failure. In case the driver cant get the details of the customer, the process will be stopped. The pre-condition of this schema is the failure state is assigned, if the driver cant get the contact number of the customer. If the customer verification is failed, the process is stopped (Jusoh, Md Saman, Man, 2015). In Not known operation, the name and reply are the variables which are used to show the driver cant get the details of the customer. This operation shows the message that is failure to fetch and it stops the process. During a successful operation, the reply is only one variable for indicating the process as success. It shows that the process is Ok and it declares the process is successfully completed (Dr. A.K.Sharma, 2013). 5. Robust Schema to Remove a Company from the UberEATS Database The Z schema is used to define the dynamic and static features of the system. The static feature covers the states and supports the relationship of all the invariants which are specified in every state. It easily changes the states, from any state in the system. The dynamic feature covers all the available operations, which are present in the system and support the input and output relationships of the system. The dynamic feature is specified as the state change in this system. This schema is also used for replacing the state of transformation. The pre-condition is described to do the particular operation. Functionality is examined with the help of this operation (Farahbod, Gervasi, Glsser, 2014). This UberEATS app is developed for managing the company database. Every company consists of the contact details of the labors and restaurants which supplies the food for the customers. This database is acting as a state space system. The state variable of this schema is UberEATS. The available variable is PName and Location. The variable PName is used to show the partners name. The variable Location is used to show the location of the company. The PName variable input is used to assign the location of the company. If the partners details are retrieved from the database, the name of the company is not enough for getting the full information about the partner. The database should be modified according to the number of customers. The Domain is mentioned as Location. The remove schema has designed to remove the information of the company and delete the whole database about that company. The partnership company links are also deleted, if the company remove their relationship with the UberEATS. The function of a companys database contains a single variable such as NAME, this variable is mentioned as declaration variable. The company details are deleted from the database by inserting the variables such as NAME and Location. The company details are searched by using the Location variable. This is used to show the location of the company that matches with the input given. Finally, it removes the database from the list. 7. Z Specification for a card Information The customers should pay the bill for their order before delivering the ordered food items. They cant pay instant cash, only through online transaction. For online transaction, the card details of the customer must need. So the separate schema was created that is card schema. The card schema is used for getting the details of the customers credit card. These details must contain the customers name, account number, expiry date and CVV number. It is not easy to identify the customer through their card number. So the name and other details are included in that schema. The detail function is used for collecting the information on customers card. The detail is used as a domain variable which is given below (Smith, 2017). The declaration of CardInfo alerts helps to define the state change. The variables of this schema are known and Detail. Known variable is taken as a pre-condition which is verified it is already existed or not for getting information. If the customers name is verified successfully, the details of the customer are received by this schema. The Detail variable is used for collecting the information on the customers card. The find card schema is used to identify the customers card details in the whole list. The known variable and the name variable are described for determining the information. If the card number is inserted in this schema, the name of the customer will be displayed in the application. It is very helpful for the owners to find whose card number is this. Known variable is used to get the card number and name variable is used to display the customers details. This schema was created for removing the card details of the customer in the list. It consists of a single variable such as Detail. This variable is used to delete the card details of the customer by getting the input as card number (Saiedian, 2007). 8. Z Schema Calculus to get a Robust Version of the Lookup Schema With the help of Z schema calculus, the lookup schema was created in the robust version. For making the robust version, this lookup schema was created to expand the lookup operation. This schema was created to identify the customers name by giving the card number as input. By using Card Info schema, the customer details can be easily detected. So the lookup schema has easily identify the name of the customer. Name has taken as a variable in this schema. If the customer enters the correct card number, it shows the name of the customer. The domain variable of this schema is given as follows: The bad lookup schema has created for showing the reply of failure in lookup schema. This schema consists of two variables such as name and r. The variable name is used to check, if the name exists in the list of the customer while checking the details by using card number. When they enter the unknown card number of the customer, it replies the statement as not known. The r variable is used to show the statement. The lookup operation using the robust version, then it is called bad lookup (Haghighi Afshar, 2012). During successful operation, the r is the only variable for indicating the process as success. It shows that the process is Ok and it declares the process is successfully completed. If the lookup operation is successful, it goes to success operation. 9. Analysis of Vs Risk and Possible way to cater the Risks The Z specification language has a large set of symbols. The structure is too complex to understand. There are lots of symbols used in the Z specification language. They are material function, Enumeration (e1, . . .,en), element-of-relation (),Union (), Abbreviation, Conjunction (), Equivalence(). It should be given as a clear mathematical expression. The functions of each schema are based on the notations of Z specification. The Z notations have complex symbols so it cannot be understood easily. Because of its complexity, the functional part of the schema will be affected. In Z notation, only less amount of tools used. So the functionality risk has increased to specify the functions. The quality, time effective and cost has reported at high risk. CICS has many specification properties. The execution delay is one of them. But the Z notation does not handle this property (Katz, 2017). The design of the Z specification language is more expressive and so the complexity increases. This complex design is understood by computer only. The humans cannot recognize the notations and its complex design easily. So the design becomes a threat for the Z notation. Thus the notation is not easy to understand and it leads to high risk. The requirements of specifications calculated by using software. So the manual calculation is impossible to generate code. Possible ways to deduct risk Z notation is not a well-known language, but it is used within a working environment. A formal method is used to overcome this problem. The Z specification language is a combination of unifies modelling language, Object Constraint language and Object modelling language. The Entity relationship diagram is used for modelling. The given input is recognized as ASCII file by using CADIZ, in Eclipse software. This file contains instructions to use Z Specification language. By examining the file performance, the required specifications are verified. In the software engineering process the Z notations are initiated. So, the exceptions are handled implicitly (Zeller, 2009). Conclusion The state space system for UberEATS application is analyzed. In food ordering system there are lots of operations are performed by the customer, Uber driver, Restaurant and Uber Company. These operations are managed by mobile phones. The operations performed in the state space of this system represented as the schema by using Z specification language. The Mathematical description of the states of customer, driver, company database and phonebook is derived. The UberEATS payment process has analyzed and the operation has performed by using the account number, name of the account holder, expiry date of card and CVV number. The schema which was developed for this operation uses Z notations. While performing a food order and payment operations, various risks are identified based on its function and design. Thus the Z specification language is learned in an easiest way. References Bangkok Food Delivery - UberEATS. (2017).Ubereats.com. Retrieved 21 January 2017, from https://www.ubereats.com/bangkok/ Course CS5232: Formal Specification and Design Techniques. (2017).Comp.nus.edu.sg. Retrieved 24 January 2017, from https://www.comp.nus.edu.sg/~dongjs/ic52z5.html Dongmo, C. Poll, J. (2011). Toward The Formalisation Of Use Case Maps.University Of South Africa. Dr. A.K.Sharma, D. (2013). Comparison of the Formal Specification Languages Based Upon Various Parameters.IOSR Journal Of Computer Engineering,11(5), 37-39. https://dx.doi.org/10.9790/0661-1153739 Farahbod, R., Gervasi, V., Glsser, U. (2014). Executable formal specifications of complex distributed systems with CoreASM.Science Of Computer Programming,79, 23-38. https://dx.doi.org/10.1016/j.scico.2012.02.001 Haghighi, H. Afshar, M. (2012). A Z-Based Formalism to Specify Markov Chains.Computer Science And Engineering,2(3), 24-31. https://dx.doi.org/10.5923/j.computer.20120203.04 Jusoh, J., Md Saman, M., Man, M. (2015). Formal Specification Approach In Designing Database System Using Z.ARPN Journal Of Engineering And Applied Sciences,10(3). Katz, S. (2017). The Schema Calculus. Khalafinejad, S. Mirian-Hosseinabadi, S. (2013). Translation of Z specifications to executable code: Application to the database domain.Information And Software Technology,55(6), 1017-1044. https://dx.doi.org/10.1016/j.infsof.2012.12.007 Malik, P. Utting, M. (2005). CZT: A Framework for Z Tools.The University Of Waikato, Hamilton, New Zealand. Saiedian, H. (2007). Developing Formal Specifications in Z.University Of Kansas. Smith, G. (2017). The Object-Z Specification Language.Software Verification Research Centre. Stacewicz, P. (2015). Evolutionary Schema of Modeling Based on Genetic Algorithms.Studies In Logic, Grammar And Rhetoric,40(1). https://dx.doi.org/10.1515/slgr-2015-0011 Ulfah Siregar, M. (2016). Support for Model Checking Z Specifications.Information Reuse And Integration (IRI). Ulfah Siregar, M., Derrick, J., North, S., J. H. Simons, A. (2015). Experiences using Z2SAL.Advanced Computer Science And Information Systems (ICACSIS). Utting, M., Malik, P., Toyn, I. (2010). Transformation Rules for Z. What is Z?. (2017).Staff.washington.edu. Retrieved 21 January 2017, from https://staff.washington.edu/jon/z-book/what-is-z.html Woodcock, J. Davies, J. (2017). Using Z Specification, Refinement, and Proof.University Of Oxford. Z lecture notes: Schemas and Schema Calculus. (2017).Staff.washington.edu. Retrieved 24 January 2017, from https://staff.washington.edu/jon/z-lectures/schema.html Zeller, A. (2009). Formal Specification with Z.Saarland University.