Blood donation system

Assignment Help Basic Computer Science
Reference no: EM133220481

Blood Donation System

The blood donation center is responsible for managing the donations process as it is received from the donor until it is sent to the distribution office.

First the blood center worker will enter the donor's general information like name and birthdate then the system will create an account for the donor and generate an id if it was the first donation by the donor. Next, the donor will give the donation and the worker will create new record of the donation in the system by entering the donor's ID. Then the donation will be sent to a testing unit. The testing unit will conduct tests on the donation and sends the blood donation along with test results to the processing office, which will fill a form for the donation if they pass the test and finally sends the blood units and forms to the distribution office. If the donation failed the test, the processing office will destroy the donation and will notify the worker. Please note that the donor must at least be 18 years old otherwise the system won't accept the donations.

For this case, develop the following diagrams:

1. A domain model class diagram

2. A use case diagram

3. SSDs for three use cases

4. A first-cut sequence diagram for each of the above use cases including both view and data access layers.

5. An integrated design class diagram that includes classes, methods, and navigation attributes.

Reference no: EM133220481

Questions Cloud

Enterprise resource planning systems : How do Enterprise Resource Planning Systems (ERPs) make finance processes more effective and efficient?
Develop personal mission statement : Develop a personal mission statement. Develop long- and short-term academic goals plus a plan for monitoring progress.
Wireless infrastructure in cloud wireless devices : Capstone project topic Wireless Infrastructure in the Cloud Wireless devices have changed the way organisations and their customers interact.
Dashboards-secure databases and collaboration tools : Secure email, dashboards, secure databases, collaboration tools, and a business social networks are all examples of:
Blood donation system : The blood donation center is responsible for managing the donations process as it is received from the donor until it is sent to the distribution office.
Describe startup process for your default run-level : Describe the startup process for your default run-level on your distro. Please follow the format of the template excel file that is attached
Enterprise architecture layer for healthcare practice : What would stakeholder concerns and methodologies to address these concerns be for each Enterprise architecture layer for a healthcare practice.
Difference between pixel dimensions and document size : Within just a few sentences, describe the difference between Pixel Dimensions and Document Size.
Appropriate data structure to save that data and why : Facebook comments or twitter tweets could be very important data what might be the appropriate data structure to save that data and why?

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Calculate the length of the remaining side

The hypotenuse of a right angle triangle is 5m and the length of one of its sides is 3m. Calculate the length of the remaining side.

  Point of sales terminals

Many recent breaches have involved payment card systems, otherwise known as point of sales (POS) terminals.

  The psychology of security

The paper "The Psychology of Security" (Communications of the ACM [2008]: 36-41) states that people are more likely to gamble for a loss than to accept

  Case involving online protection of patent

Summarizing a court's interpretation in a case involving online protection of a patent. Cite both the case and statute using standard legal notation.

  Designers install software into the kernel

Since it is so dangerous, why would designers install software into the kernel at all (or make use of kernel software)?

  Cryptography provides confidentiality

Cryptography provides confidentiality, integrity authentication, and nonrepudiation for sensitive information while it is stored (at rest),

  Provides permanent storage for data and instructions

Provides permanent storage for data and instructions that do not change, such as programs and data from the computer manufacturer.

  What does it mean if they are public or private

When creating classes you have member functions and member variables. What are they and what data types can you use for member variables

  Resulting impact to the mortgage industry

Based on your review of the mortgage rate trends, predict the future (within a year) rate of the 30-year fixed and the 15-year fixed rate mortgage

  Was his subsequent firing justified

Was his behavior improper? Was his subsequent firing justified?

  Create the correct messages when called

Complete the Error, SyntaxError, and ZeroDivisionError classes such that they create the correct messages when called.

  Identify Risk and Assess Risk and Define Risk Appetite

Identify assets that can impact company compliance, customer satisfaction, competitive advantage, or business productivity.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd