Add a new project and assign it to an existing contract

Assignment Help Computer Engineering
Reference no: EM133577496

Homework: GUI Design

Overview

For this homework, you are required to designa GUI that will manage clients, contracts, and projects.

Clients:

The system should allow you to enter information for a client. The fields necessary to record client information are as follows:

1) Client Name
2) Legal Name
3) Client Address (Street or PO Box, City, State, Zip)
4) Client Type (may be "End User," "Value Added Reseller," or "Partner")

The system should allow the user to edit existing Clients as well as delete clients.

Contracts:

Every client in the system has a contract.
Each contract has the following information:
Contract Name
Legal Location
Contract Type (can be either "Time and Materials," "Fixed Price," "License," or"Maintenance")
[If Fixed Price or License, the user needs to enter the total amount of the contract.]

Possible products included (may be any combination of the following, but at least one product must be associated with a contract):

Telecom BP
Telecom FM
TeleSource
Start Date
End Date

Multiple contracts are possible for a given client. Therefore, the system must allow the user to enter as many contracts as needed. The user should also be allowed to edit existing contracts and delete contracts.

Projects:

A contract can have multiple projects assigned to it. The system must keep track of project information and project homeworks to contracts.

The user should be able to (i) Add a new project and assign it to an existing contract, (ii) Modify an existing project, (iii) Delete a project, and (iv) Remove a project from a contract.

The following information is associated with a project:

I. Project Name

II. Start Date

III. End Date

IV. Maintenance Term (in months) - Maintenance Term is the length of maintenance service that is provided free of charge for a new system. It is within the range of 1-12 months

V. Service Level Agreement (SLA) - Service Level represents the priority given to a project in production when a problem occurs. For a project with a Maintenance Term between 9-12 months (inclusive), a high priority is given (i.e., a 3 hour response time). For 3-8 months (inclusive), medium priority is assigned (i.e.,12 hour response time). For 1-3 months (inclusive), low priority is assigned (i.e.,24 hour response time).

VI. Manager - Any employee in the company can be the manager of a project. Only one manager exists at any given time for a project.

Task

This homework is intended to give you practice in implementing guidelines on Windows and Controls.

For this homework, you are required to design the GUI the system described above. You do not have to implement any functionality. Your task is to design the windows andcontrols that would be used to implement the system.You may use any drawing application to draw your screens such as Adobe Illustrator or Photoshop.

Paste your designs in a single Word document. Below each screen, describe its functionality, including a discussion of the controls on the screen

Indicate what types of controls are used for each element and if they are to be pre-populated with any values. For instance, an employee combo box that is pre-populated with the names of all the employees in the company may be used on a screen to select the manager of a project.

There are many different ways to design this system. Adhere to the guidelines you have learned, and use the descriptions above to design a system to meet the needs of the organization.Have fun with this exercise.

Reference no: EM133577496

Questions Cloud

Risk assessment methodology related to reentry into society : Discuss advantages and disadvantages of the risk assessment methodology related to reentry into society.
Type of fraud be detected and prevented : Provide an overview of the case JM3 Construction LLC . How can this type of fraud be detected and prevented? What role would the expert play in this case?
How power is used to enforce and reinforce gender roles : How structures, organizations and laws affect our understanding of gender, discuss how power is used to enforce/reinforce gender roles.
State the problem from the ceos perspective : State the problem from the CEO's perspective. Explain how each of these solutions presented can address the CEO's concerns.
Add a new project and assign it to an existing contract : Add a new project and assign it to an existing contract, Modify an existing project, Delete a project, and Remove a project from a contract.
Criminal cases-civil penaltie for tax fraud applies in civil : The federal exclusionary rule Group of answer choices applies only in criminal cases applies in criminal cases and civil penaltie for tax fraud applies in civil
Harold wall has committed assault causing bodily harm : You have conducted a criminal investigation and developed reasonable grounds to believe that Harold Wall has committed an assault causing bodily harm
Analyzing the jobs of corrections officer : Write a page length introduction analyzing the jobs of a Corrections officer, Judge, and a Patrol Officer, and detailing what their responsibilities are.
What is the demand elasticity : What is the demand elasticity? If his MC is $4 per shirt, what is his desired markup and what is his initial actual markup? Was raising the price profitable?

Reviews

Write a Review

Computer Engineering Questions & Answers

  Create a list object of ten elements

Create a List object of 10 elements. Display the elements in the list (which will be of course empty to start- has the default value 0).

  What types of data would you want a blog collection to hold

CST 345 Grand Canyon University what types of data would you want a blog collection to hold? How would you construct this blog collection and briefly describe

  Describe any of the internetworking

examine the impact of Global Intellectual Property Law upon the Telecommunication industry and upon businesses. Does it have a positive impact or none at all?

  Are cyberactivists cyber criminals

Cyberactivists Discussion - Are cyberactivists cyber criminals? Why or why not? What are some of the security vulnerabilities of using WebApps

  Explain an example of data you had to look

Computer Applications class. Must be 250 words. Explain an example of data you had to look at that would have been easier to understand if a chart had been provided?

  Determine the top 10 books purchased each month

Determine the top 10 books purchased each month based on the library's location. This particular library is in Pawnee, Indiana.

  Compute the support for item sets

Compute the support for item sets {e}, {b, d}, and {b, d, e} by treating each transaction ID as a market basket. Use the results in part (a) to compute.

  How can mixing agile approaches like scrum, kanban

What are some of the business challenges that may occur during agile transitions? Where might hybrid waterfall-agile approaches work better than complete

  Write an application which prompts the user to enter

Write an application which prompts the user to enter a valid password. The password is valid if it is at least 7 characters long, contains.

  Fom an accountants viewpoint separation of duties is

from an accountants perspective separation of duties is self-explanatory. how do small companies that have minimal

  Calculate the alternating sum of the first digits

Do a search for how to write a for-loop in R. Practice some simple examples from the internet.

  Determine the number of clusters in the data

COSC2110 - Data Mining - RMIT University - What is the effect of lowering the number of examples in the training set? Include your runs in your table

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd