Creation of an activity diagram

Assignment Help Basic Computer Science
Reference no: EM131102809

Creation of an Activity Diagram

A car rental company owner calls a car insurance company. The owner gives her insurance policy number to the insurance clerk, who enters this information into the system to make sure the policy is still valid and the premium has been paid. The owner then provides information about each car to be added: the model, year of manufacture, and vehicle identification number. The clerk enters that information into the system to check its validity.

The owner selects the type of insurance coverage and the amount for each type of car. The clerk enters the selected coverage information, and the system validates the amount for the selected policy. The system also validates and provides a total of the coverage for other cars on the same policy. The owner provides the identity of drivers and the time they would drive a particular car. The system updates the policy, calculates the new premium amounts, and sends the information oon the updated policy in an e-mail to the owner.

Based on this information, perform the following tasks:

  1. Run Violet UML editor.
  2. Use the Violet UML editor to create an activity diagram to model this interaction between the owner, the insurance clerk, and the computer system. Use correct UML notations.Note: The activity diagram should have a start and an end state.
  3. Save the activity diagram and submit.Note: Alternatively, you may take a screen shot, paste it into a Word document, and submit the Word document.

Reference no: EM131102809

Questions Cloud

Why would you expect its stock price to first rise : If a firm went from zero debt to successively higher levels of debt, why would you expect its stock price to first rise, then hit a peak, and then begin to decline?
Effective communication in psychology : As we mentioned in Unit 1, effective and professional communication skills are essential for psychology. In this course, we are focusing on practicing these skills in writing to help you develop this proficiency for your profession and your role a..
Analyze the execution strategy for the sbu you selected : Analyze the execution strategy for the SBU you selected. What elements affect the execution strategy? How is the execution strategy affected by culture, balanced scorecard, and internal operations?
Discuss how kelsey care plans for future cases and services : Write a 700 to 1050 word executive summary as in which you assume the role of a case management services provider, Kelsey Care. Your service has a staff of six case managers.
Creation of an activity diagram : A car rental company owner calls a car insurance company. The owner gives her insurance policy number to the insurance clerk, who enters this information into the system to make sure the policy is still valid and the premium has been paid. The own..
How far were most people willing to go to obey authority : How far were most people willing to go to obey authority? Would you have gone this far? According to the text, "ordinary" people are more likely than not to follow an authority figure. Does this seem believable? Why or why not?
Gaap and economic consequences : Why do you believe a copy of this letter was sent by the business community to influential members of the United States Congress?
What is the probability of a or b or both occurring : In general, what must be true for two events be both statistically independent and mutually exclusive?
Question regarding the return date and time : Other material can be loaned for 2 weeks. For every loan, the library records the user, the loan date and time, and the return date and time. For users, the library maintains their name, address and phone number.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Advantages and disadvantages of a multi-user os

Determine whether or not Windows (e.g., Vista, 7, 8, and 10) can be considered a multi-user operating system. Provide a rationale for your response.

  String formed from the letters of a string

A mirror has the following pattern: LmR where L is a (possibly empty) string formed from the letters of a string, and R is the reverse of the string L. m is an pivot string whose characters are not in L or R. For example, the following strings have t..

  Analyze the major threats to mobile devices

Analyze the major threats to mobile devices, and suggest at least two (2) methods to mitigate the concerns and make the devices more secure from an organizational standpoint. Justify your response.

  Examine the impact to the it support personnel

Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.

  Estimate the height of a building

An observer wants to estimate the height of a building. At herfirst measurement, the angle of elevation to the top of thebuilding is 45 degrees. She walks 300 feet closer to the building and determines the angle of elevation to be 60 degrees

  Write a c program to draw an analog clock

Write a c program to draw an analog clock. Simulate the movement of needles.

  Prove or disprove formally

The number of leaf nodes (nodes with no children) in a perfect binary tree of height h is no more than 2h -

  Implementing a doubly linked list

Modify the class LinkedList to make it a doubly linked list. Name your class DoublyLinkedList. Add a method addEnd to add an integer at the end of the list and a method displayInReverse to print the list backwards:

  How should her managers react to this behavior

How should her managers react to this behavior?

  Why mpi allows these two different implementations

Discuss some of the potential reasons why MPI allows these two different implementations. In particular, consider the cases of different message-sizes and/or different architectural characteristics.

  Can a computer system function without one of these element

- What purposes do CPUs, memory and I-O devices individually serve in a computer system? - How do these 3 elements work together to compute? - Can a computer system function without one of these elements?

  Discuss insertion deletion and modification anomalies

Why are they considered bad? Illustrate with examples.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd