Create a communication diagram for the scenarios

Assignment Help Basic Computer Science
Reference no: EM13653473

Think about the system that handles student admissions at your university. The primary function of the system should be able to track a student from the request for information through the admissions process until the student is either admitted to the school or rejected. 
1. Write a use-case description that can describe an Admit Student use case. Assume that applicants who are children of alumni are handled differently from other applicants. Also, assume that a generic Update Student Information use case is available for your system to use. 
2. Create a use-case diagram that includes all of the above use cases. Assume that an admissions form includes the contents of the form, SAT information, and references. Additional information is captured about children of alumni, such as their parent's graduation year, contact information, and college major.
3. Create a class diagram for the use cases identified with questions 1 and 2. Also, be sure to include the above information. Assume that a temporary student object is used by the system to hold information about people before they send in an admission form. After the form is sent in, these people are considered students.
4. Create sequence diagrams for the scenarios of the above use cases.
5. Create a communication diagram for the scenarios of the above use cases. 
6. Create a behavioral state machine to depict a person as he or she moves through the admission process.
7. Perform a CRUDE analysis to show the interactivity of the objects in the system.  

Reference no: EM13653473

Questions Cloud

Find the fluid velocity : A constriction in a pipe reduces its diameter from 6.3 cm to 2.1cm. where the pipe is wider, the fluid velocity is 8 m/s. find the fluid velocity
State a carbon dioxide fire extinguisher puts out the flame : Wood and oxygen are two reagents required to keep a campfire burning. identify the limiting and excess reagent: a) The fire dwindles over time. b) A carbon dioxide fire extinguisher puts out the flame.
Explain what is the energy of one photon of the light : In addition to continuous radiation, fluorescent lamps emit sharp lines in the visible region from a mercury discharge within the tube. Much of this light has a wavelength of 436 nm. What is the energy (in J) of one photon of this light
Estimate what tension force will break this rod : A 55cm long brass rod has a diameter of 3cm. What compression force will break this rod? What tension force will break this rod
Create a communication diagram for the scenarios : Create a communication diagram for the scenarios
Identify three major cultural artifacts : Discuss what these artifacts say about the cultural values of the time. Do these civilizations and their artifacts still impact modern life?
Find how many revolutions does the flywheel make : A flywheel with a very low friction bearing takes 1.6 h to stopafter the motor power is turned off. How many revolutions does the flywheel make before it stops
Compute the work done if the gas expands : A gas expands in volume from 35.2 mL to 82.7 mL at constant temperature. Calculate the work done (in joules) if the gas expands against a constant pressure of 4.0 atm.
Discuss the advantages and disadvantages of dbmss : Discuss the advantages and disadvantages of DBMSs

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Show both the source image/video and the resultant image

Write a short HTML report describing the details of each of the operations you wrote, perhaps with screen shots if needed. You should also include the 2 completed images after processing. Clicking on a link in the report should start your program.

  What window events can a program handle

What window events can a program handle? Explain the difference between the WindowListener interface and the WindowAdapter.

  Which search engine do you believe provided

Which search engine do you believe provided you the best results? Support your position by explaining why you believe the particular search engine to be better based upon your experience.

  Identifying the risks associated with the current position

Be sure to add a conclusion with a rationale detailing how risks can be mitigated. Reference your research so that Sean may add or refine this report before submission to senior management.

  Analyse information security vulnerabilities and threats and

Analyse information security vulnerabilities and threats and determine appropriate controls that can be applied to mitigate the potential risks

  Delete an element from the dictionary

Create a dictionary (Using the list of words in the attached file)

  Terracotta is bigmemory maximum using server arrayconfigur

how terracotta is BigMemory Maximum using Server array Configratio

  Write the c statements that will cause all to be output

Write the C statements that will cause all 1's to be output on the upper four bits of Port H, and inverts the states of the lower four bits. Assume that all Port H pins are already configured as outputs.

  A catastrophic server crash at andersen & sons

A catastrophic server crash at Andersen & Sons,

  How the chips are to be connected to the address bus

Explain in words how the chips are to be connected to the address bus. Thank You. Please Explain your answer, will help a lot.

  What types of threats does the tool mitigate

Research various security tools that an employee can use to keep his or her data safe or to thwart denial of service attacks.

  Investigation-woman having inappropriate files on computer

Young woman who was fired from her job for inappropriate files discovered on computer, and she swears she never accessed files. What questions must you ask and how should you proceed?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd