Create a swimlane document flowchart

Assignment Help Basic Computer Science
Reference no: EM13716105

Create a swimlane document flowchart for the following Fitter Snacker sales process. Use the swimlanes of Customer, Sales, Manufacturing, and Procurement.

Here is a description of what happens when a customer wants to buy cases of Fitter Snacker bars. In this situation, they are not buying through the sales person, they are buying through the inside sales department (handled only by phone):

1.   The Customer that wants to buy the bars fills out a multipart paper request and sends it to the sales department.

2.   The Sales department sends a copy of the customer's request to the Manufacturing Department and to the Procurement Department.  The Sales Department files their copy of the paper form alphabetically by customer name.

3.   The order arriving in the Manufacturing Department triggers the creation of a preliminary work order.  To create this preliminary work order, the department gets data from (a) the sales order, (b) their current production plan file (a window on the plant manager's PC), (c) their current capacity requirement plan (another  paper document), and (d) their history of prior work file which is on the plant manager's PC's hard drive and read off the computer screen.  An estimate of time, labor, and overhead is manually prepared and entered into a preliminary work order form, which is a multi-part paper form. One copy of the form is sent to the Procurement Department, one copy sent to the Sales Department which is filed by sales order number in a file cabinet, and the Manufacturing department files one copy of the report by order date in the cabinet. The prior work file is not yet updated since the bars have yet to be manufactured.

4.   To simplify matters, let's assume that the Procurement Department does NOT have to buy any raw materials. Since this is the case, assume the Procurement Department simply files the preliminary work order form and also files the Sales Request (order).

5.         Since the raw materials are available, the Manufacturing Department can now go ahead and create a complete work order.  The preliminary work order is retrieved from the file cabinet.  This is used as input to the computer program: Final work order scheduling.  There are two outputs to this program: a printed final work order document and an update to the Current Production Plan file. The printed work order document is filed in the "To-do" file by order date..

Reference no: EM13716105

Questions Cloud

Confidence intervals : Many people do not "like" or "trust" single point estimates for things they need measured. Looking back at the data examples you have provided in the previous discussion questions on this issue, how might adding confidence intervals help manage..
Explain why there is a chance that the social security trust : 1. Explain why there is a chance that the social security trust fund may be depleted by 2035. Does this mean that social security will be bankrupt and will not be able to make any payments to retirees after 2035?2. Consider the savings-investm..
How can the principles of (a) classical conditioning theory : How can the principles of (a) classical conditioning theory and (b) instrumental conditioning theory be applied to the development of marketing strategies? Please write a page.
What would say in a job interview : What would say in a job interview if you were asked to comment on the following statement: "A Database Administrator (DBA) should create as many indexes as possible for a table because that will result in the greatest speed for all operations ..
Create a swimlane document flowchart : Create a swimlane document flowchart for the following Fitter Snacker sales process. Use the swimlanes of Customer, Sales, Manufacturing, and Procurement.Here is a description of what happens when a customer wants to buy cases of Fitter Snack..
Draw the relation from the following problem : Draw the relation from the following Problem as an arrow diagram : Let A = {0, 1, 2, 3, 4, 5, 6, 7, 8} and B = {1, 2, 3, 4, 5, 6, 7, 8}. Now let R be a binary relation R from A to B such that for all (x, y) ? A x B, (x, y) ? R if and only if y =..
Differences between sequential access and random access : Define and explain the differences between SEQUENTIAL ACCESS and RANDOM ACCESS
Information security audits : Network Security - Information Security Audits (word count 850) Which of the following would be part of an bi-annual corporate audit and what type of information would be gathered including which polices if any would apply?
What needs to be protected and from what to protect it : In order to successfully manage risk, one must understand risk itself and the assets at risks. The way one goes about managing risk will depend on what needs to be protected, and from what to protect it.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Calculate roots of function by newton-raphson approximation

Best known iterative method for calculating roots of a function f (that is, x-values for which f(x) is 0) is Newton-Raphson approximation.

  Imagine you are an entrepreneur starting a new business

1. assess the challenges e-business and e-commerce technologies present to the field of information technology.

  How to use system tools to identify problems

How can you use system tools, such as the Task Manager, to help identify and troubleshoot these problems? Report your findings in a one page paper.

  Create an application that allow a new customer order house

Create an application that will allow a new customer to order a house. You'll allow the customer to choose among four models (Aspen, Britattany, Colonial, and Dartmoor) by creating separate ButtonGroups.

  Write a program to find the nth busalem number

write a program to find the nth BuSalem number. You must use functions.

  Cores on computer systems

Assignment : Cores on Computer Systems:  Differentiate between multiprocessor systems and many-core systems in terms of power efficiency, cost benefit analysis, instructions processing efficiency, and packaging form factors.

  Subsets of cardinality

Prove by induction that for every n >= 3, any set of cardinality n has exactly n(n-1)(n-2)/6 subsets of cardinality

  Write a c++ program that calculates distance of a golf ball

write a C++ program that calculates the distance of a golf ball fallen in with each one-seconds interval drop from airplane calculate the distance in the current time Interval (ft) and total distance the golf ball falls at the end of each interval..

  Write a recursive function called add_digits

Write a recursive function called ‘add_digits’ that takes an integer as a parameter and adds its digits. For example, if we call this function with the parameter n=1234, the returned value is 1+2+3+4=10.

  Find syntax errors the definitions of the following classes

Find the syntax errors in the definitions of the following classes. a. class AA { public: void print() const ; int sum(); AA(); int AA(int, int); private: int x; int y; }; b. class BB { int one; int two; public: ..

  What challenges think a computer forensic analyst

what challenges you think a computer forensic analyst and prosecutors would face when trying a case that involves digital evidence?

  Map elements can placed anywhere within body the web page

Map elements can be placed anywhere within the body of the Web page because they are not actually displayed by the browser, but used as references for mapping ____ to inline images.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd