Chosen to enter a new person into the contact list

Assignment Help Basic Computer Science
Reference no: EM13772037

Contact list project where The user enters first name, last name, street address, email address, phone number and notes.

Use Case Name: Enter a new person

ID number: 1

Actors: user

Preconditions: The user has chosen to enter a new person into the contact list

Primary course: The user enters first name, last name, street address, email address, phone number and notes.

Alternate course: If the user leaves one or more of the fields blank, the person will still be entered into the contact list.

Exception courses: If the user leaves the last name blank, then the person will not be entered into the contact list. If the list is full, the person will not be entered into the contact list.

Postcondition: The new person is stored in memory. When the user quits the program, the new person is saved to disk with the rest of the contacts.

Use Case Name: Print the contact list

ID number: 2

Actors: user

Preconditions: The user has chosen to print the entire contact list

Primary course: The system prints all information about all contacts to the console, sorted by last name.

Alternate courses: none

Exception courses: none

Postconditions: The contact list is printed to the console.

Use Case Name: Retrieve a person's information by last name

ID number: 3

Actors: user

Preconditions: The user has chosen to retrieve a person's information from the contact list by last name

Primary course: The user enters a last name, and the system displays all of the information that was previously entered on that person.

Alternate courses: 1) If there is no one in the contact list with the given last name, the system will display a message to the user telling her that.

2) If there is more than one person in the contact list with the given last name, then all of the people with that last name will be displayed.

Exception courses: none

Postconditions: A person's information is displayed.

Use Case Name: Retrieve a person's information by email address

ID number: 4

Actors: user

Preconditions: The user has chosen to retrieve a person's information from the contact list by email address.

Primary course: The user enters an email address, and the system displays all of the information that was previously entered on the person with that email address.

Alternate courses:

1) If there is no one in the contact list with the given email address, the system will display a message to the user telling her that.

2) If there is more than one person in the contact list with the given email address, then all of the people with that email address will be displayed.

Exception courses: none

Postconditions: All of the information about one or more people is displayed.

Use Case Name: Retrieve all people who live in a given zip code

ID number: 5

Actors: user

Preconditions: The user has chosen to retrieve all people from the contact list who live in a given zip code.

Primary course: The user enters a zip code, and the system displays all of the information on anyone in the contact list with that zip code.

Alternate courses:

1) If there is no one in the contact list with the given zip code, the system will display a message to the user telling her that.

2) If there is more than one person in the contact list with the given zip code, then all of the people with that zip code will be displayed.

Exception courses: none

Postconditions: All of the information about one or more people is displayed.

The following Use Case #1a would be "nice to have." This use case would replace the Use Case #1 as specified above. Do not spend any time working on this until you have a fully functioning program that satisfies the first 5 use cases.

Use Case Name: Enter a new person

ID number: 1a

Actors: user

Preconditions: The user has chosen to enter a new person into the contact list

Primary course: The user enters first name, last name, street address, email address, phone number and notes.

Alternate courses:

1) If the user leaves one or more of the fields blank, the person will still be entered into the contact list.

2) If the user cancels out of the operation in the middle, the person will not be entered into the contact list.

Exception courses:

1) If the user leaves the last name and/or the first name blank, then the person will not be entered into the contact list.

2) If the user enters an email address that does not satisfy the correct syntax for an email address, the system asks the user to reenter.

3) If the user enters a phone number that does not satisfy the correct syntax for a phone number, the system asks the user to reenter.

Postconditions: The new person is stored in memory. When the user quits the program

Reference no: EM13772037

Questions Cloud

Understand the preparation and use of such a plan : We all face potential hazards in our workplaces and in our homes. Ideally we can eliminate or control many of these; however, if and when they occur, a Risk Assessment Plan is our best defense.
Summarize a communications plan : Prepare an organization list showing at least three primary roles and an assignment list with at least three specific tasks and their owners.
Some functionality into functions or submodules : Design a program that will allow a user to Input a list of your family members along with their age and state where they reside. Determine and print the average age of your family and print the names of anyone who lives in Texas.
Discussing current view that race is social construction : Write a 1,050- to 1,400-word paper discussing the current view that race is a social construction supported by political realities.  Include the following:
Chosen to enter a new person into the contact list : Contact list project where The user enters first name, last name, street address, email address, phone number and notes.
What do you think the title means before you read the poem : What do you think the title means before you read the poem? What do you think the poet is trying to say in this poem? Go beyind the literal meaning or the plot of the poem.
What will be the monopolist''s profit from each type of consu : Suppose the demand functions facing the wireless telephone monopolist are QdL=80-50P for each low-demand consumer and QdH=2000-50P for each high-demand consumer, wherePis the per-minute price in dollars. The marginal cost is $0.10 per minute. Suppose..
Ecet digital signal processing class issues : How does the transfer function tell us about a system's stability?
Write a film review of kinky boots : Write a film review of Kinky Boots according to review format. Introduce the film you saw. Be sure to include any background information about the film that may be interesting to the read.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Terms of depictions of graphic interpersonal violence

Video games are a very big business these days, and ever more "realistic" (at least in terms of depictions of graphic interpersonal violence)-and also more accessible to more and more children of any age.

  Networking media

What are the most important components to evaluate when you look for a new computer? Defend your choice.

  Describe the multicultural and multinational issues

Describe the multicultural and multinational issues surrounding information security and describe the security challenges presented when an organization has multiple directors leading information technology departments.

  Assignment concerns consumer profiling

The third participation assignment concerns consumer profiling! The attached article "What do firms know about you? FTC would pull back the curtain," by Craig Timberg from the Washington Post of 5-28-14 has some details. There are three questions ..

  It industry is becoming increasingly globalized

As you know, the IT industry is becoming increasingly globalized due to outsourcing. Select a country that your industry is likely to outsource to. Using the Internet, find three distinct cultural traits that might affect how you communicate with ..

  Define the contested boundaries among amazon

Define the contested boundaries among Amazon, Apple, Facebook and Google

  Perform analysis and prove new bounds

For each of these sublists, the median is found. Further, the median of these medians is found and returned as the pivot. Perform the analysis and prove the new bounds.

  Describe how they are similar

5.  Cloud computing is used as a means to provide off-site computing power to an organization. Compare cloud computing with grid computing and describe how they are similar and at least one way in which they differ.

  Explain what information was accessed

Find a major data breach that has occurred recently. Explain what information was accessed and how this information could be misused, such as identity theft, spear phishing, and so on. Remember to include references to chapter 11 or 12 and an ..

  Body mass index program

You are the nutritional coach for a local high school football team. You realize that some of the players are not up to par having returned from summer break. Realizing nutrition plays a key in a productive team, you decide to implement a Body Mas..

  Revisiting the deployment diagram

The only thing constant in the information technology landscape is that things always change. Such is the case for the textbook ordering system you examined in the previous unit.

  What is the standard iana-registered higher-level

How could you determine whether or not a TCP service is running at port 13 of a given Internet host? Test this for the host(s) assigned by your instructor. What is the standard IANA-registered higher-level protocol associated with this port?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd