Component interface for an emergency control room

Assignment Help Basic Computer Science
Reference no: EM13897080

Component Interface for an Emergency Control Room

As the lead software engineer for a medium-sized hospital, you have been asked to spearhead an effort to improve the tracking of Voice Over IP (VOIP) calls made within the hospital system. You have also been asked to begin planning out an emergency vehicle discovery program that will improve the response times of medical personnel to remote emergency locations by pinpointing the closest vehicle to the emergency using GPS.

Write a three to five (3-5) page paper in which you:

1. Design the Requires and the Provides interfaces of at least two (2) components that might be used in a system in an emergency control room for a call-logging component that records calls made.

2. Design the interfaces of at least two (2) components that might be used in a system in an emergency control room for a vehicle discovery component that, given a post code (zip code) and an incident type, finds the nearest suitable vehicle to be dispatched to the incident.

3. Include both the Requires interface and the Provides interface in your design.

4. Develop a visual rendering depicting your design through the use of Microsoft Visio or its open source alternative, Dia. Note: The graphically depicted solution is not included in the required page length.

Your assignment must follow these formatting requirements:

· Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.

· Include a cover page containing the title of the assignment, the student's name, the professor's name, the course title, and the date.

The cover page and the reference page are not included in the required assignment page length.

· Include charts or diagrams created in Visio or an equivalent such as Dia. The completed diagrams / charts must be imported into the Word document before the paper is submitted.


The specific course learning outcomes associated with this assignment are:

· Explain the importance of software reuse.

· Use technology and information resources to research issues in software engineering.

· Write clearly and concisely about software engineering using proper writing mechanics and technical style conventions.

Grading for this assignment will be based on answer quality, logic / organization of the paper, and language and writing skills.

Reference no: EM13897080

Questions Cloud

Do modern technologies make the environment more toxic : What is the most serious environmental threat, SW or HW? Why? Give examples of the activities that generate SW or HW in most urban cities.
What are the advantages and disadvantages of zaras methods : What are the advantages and disadvantages of Zara's methods? Would these methods work at a company like C&F? What advice would you give to Bill Smith?
Develop forecasts using regressions of sales : Develop forecasts using regressions of sales on each of the series of rain forecasts respectively. Calculate the MFE (bias), MAD, and MAPE for the two forecasting models.
Poor housing conditions and adverse health outcomes : Is there any association between poor housing conditions and adverse health outcomes? Please justify your position with in-text citations and a min of 250 + words.
Component interface for an emergency control room : Assignment on the Component Interface for an Emergency Control Room
Discuss human health aspects of noise pollution : Discuss human health aspects of noise pollution and indicate noise control measures to achieve quiet in the community. Please provide a min of 250+words and references.
Features of a change management tool : Features of a Change Management Tool
Is a simple model or seasonally enhanced model better : Evaluate alternative forecasting models. Is a simple model or a trend or seasonally enhanced model better? How could you use this information to solve the paper shortage problem?
Explain access control methods and attacks : Explain access control methods and attacks.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Explain the conceptual model employed in the design

Explain the conceptual model employed in the design of these types. Describe the analogies and concepts these monitors expose to users, including the task-domain objects users manipulate on the screen.

  Explaining resulting scheme is not ind-cpa-secure

Let a variant of CBC-mode encryption where sender simply increments the IV by 1 each time a message is encrypted. Illustrate that resulting scheme is not IND-CPA-secure.

  The xor gates are ideal for testing parity

The XOR gates are ideal for testing parity because even-parity words produce a _____ output and odd-parity words produce a _____ output

  Computer will ever be developed which can think like human

Do you think a computer will ever be developed which can think like human? Write down the ethical implications of creating such a computer?

  Determine the expected number of empty bins

Assume that n balls are tossed into n bins, where each toss is independent and ball is equally likely to end up in any bin. Determine the expected number of empty bins?

  Structured systems analysis and design

What is the difference between a context diagram and diagram 0? Which symbol is not used in a context diagram?

  Apply the tools and techniques in research and analysis

Project objective: 1.Apply the tools and techniques in research and analysis required to evaluate computer and information science products. 2.Describe how pipelining and superscalar processing improve the speed at which a computer program is execute..

  What some of the ways you would troubleshoot a dns problem

What are some of the ways you would troubleshoot a DNS problem

  How does pdf manage bitmap images

What is the effect of shifting an unsigned number in a register two bits to the left?

  Explaining mandatory access control implementation

How are Novell AppArmor and the Red Hat "targeted" SELinux policy similar? Is either a true Mandatory Access Control implementation. If not, explain why.

  Designing structured cyclic scheduler with fixed frame size

Executed according to structured cyclic scheduler with fixed frame size. We require to make three types of design decisions according to: i) Select suitable frame size based on constraints.

  You are a systems development consultant

You are a systems development consultant who has been approached by a client, a law firm, to develop an automated case tracking system. The first step is to negotiate the project scope

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd