Develop a candidate architecture to meet the functional

Assignment Help Basic Computer Science
Reference no: EM13723295

Analyse the Case Study documents and develop a candidate architecture to meet the functional and non-functional requirements you have identified in Assignment 1 and Part A of Assignment 2. Document this candidate architecture with:
i. An Architectural Notebook. Make sure this notebook addresses:
a) The key concerns driving the overall architecture. b) Assumptions and dependencies c) Architecturally significant requirements d) Decisions, constraints, and justifications that shape the architecture e) Architectural mechanisms to be applied f) Key abstractions g) Any architectural frameworks or patterns that will be applied
Use the Architectural Notebook template
ii. A high level Logical View of the architecture in the form of a UML component diagram.
iii. A Physical View of the architecture showing how components will be deployed on hardware in the form of a UML Deployment Diagram.
Part C - Detailed Design
Show how your architecture will support the critical core use case for the system by developing a detailed design to support that use case. Your design should be consistent with your architecture and respect any component and hardware boundaries. Document your design with:
i. A UML Communication Diagram showing the interaction between user interface, control, and domain object classes for the critical core use case.
ii. A UML Sequence Diagram showing the interaction between user interface, control, and domain object classes for the critical core use case. (10 marks)
iii. A UML Design Class Diagram showing all classes, attributes, methods, and relationships required to support the critical core use case.
Part D - Reflection on Object Oriented Design
Reflect on the design principles you have employed in your architecture and design in a written text of between 800 to 1000 words (between 4 and 5 pages). Make sure your reflection addresses:
a) A discussion of any issues you encountered in deciding on a particular architectural framework or pattern. b) Identifies and discusses any object oriented design principles you applied in your detailed design. c) Identifies and discusses any software design patterns you applied in your detailed design.

Reference no: EM13723295

Questions Cloud

Paper about coaching within organizations : Write a research paper about coaching within organizations. In addition to coaching, what other aspects do you think are necessary for an organization to have an effective performance management system? Why? Conduct research into several different..
Research update for specific information : Upon completion of the Required Readings, write a thorough, well-planned narrative answer to each of the following discussion questions. Rely on your Required Readings and the Lecture and Research Update for specific information to answer each dis..
Types of leader power : Discuss how each of the five (5) types of leader power impact and/or motivate followers. Which of the five types of leader power fall into the category of position power, and which fall into the category of personal power?
What are the components of pki : 1. What are the components of PKI? 2. What is physical security? What are the primary threats to physical security? How are they manifested in attacks against the organization? 3. What are certification and accreditation when applied to informati..
Develop a candidate architecture to meet the functional : Analyse the Case Study documents and develop a candidate architecture to meet the functional and non-functional requirements you have identified in Assignment 1 and Part A of Assignment 2. Document this candidate architecture with:i. An Archite..
Lecture and research update for specific information : Upon completion of the Required Readings, write a thorough, well-planned narrative answer to each of the following discussion questions. Rely on your Required Readings and the Lecture and Research Update for specific information to answer each dis..
How your company activities will affect the environment : Discuss how your company's activities will affect the environment and identify the steps you will take to mitigate any negative impacts
What are the profit-maximizing price and output levels : What are the profit-maximizing price and output levels? Explain them and calculate algebraically for equilibrium P - How much economic profit do you expect that Robert's company will make in the first year?
Use a computer for multimedia : To use a computer for multimedia (moving video and sound), it is important to maximize the efficiency of the I/O. Assume that the blocks of a movie are stored consecutively on a CD-ROM. Describe the steps used to retrieve the blocks for use by the..

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Suppose fred sees your rsa signature on m1 and m2

Suppose Fred sees your RSA signature on m1 and m2

  Develop a first-cut sequence diagram

Develop a first-cut sequence diagram, which only includes the actor and problem domain classes. Add the view layer classes and the data access classes to your diagram from part a.

  Draw a circuit which implements a 1-to-2 decoder

Q1. Write the truth table for a 1-to-2 decoder. Draw a circuit which implements a 1-to-2 decoder using AND gates, OR gates and NOT gates only.

  Algorithms for finding possible winers-analysing complexity

Create algorithms for finding the possible winers and the Condorcet winner with analysing its complexity.

  Determine characters in the encyclopedia

The text of the Encyclopedia Britannica is about 44 million words. For a sample of about 2000 words, the average word length was 6.1 characters per word. Approximately how many characters are there in the encyclopedia?

  Write pseudocode algorithms addition subtraction multiply

Describe the classes and write pseudo-code algorithms to perform addition, subtraction and multiplication of polynomial expressions.

  What are the risks associated with throwing out old info

1. What are the risks associated with throwing out old information systems and replacing them with new information systems? Provide examples to support your answer.

  Write a program that reads three integers and print

Write a program that reads three integers and print "In order" if they are sorted in ascending order or descending order, or "not in order" otherwise. For example: 1 2 5 in order 1 5 2 not in order 5 2 1 in order 1 2 2 in order 5 1 2 not in order.

  Adding two unsigned and signed binary numbers

Add the two binary numbers and interpret the sum assuming that the numbers are (1) unsigned, and (2) signed.

  A subroutine in marie assembly that multiplies two value

1)Write a subroutine in MARIE assembly that multiplies two values where the arguments for this subroutine are two pointers(each pointing to a value). The routine, multiply(a,b), performs *a x *b where a's value is the address storing the value being ..

  Find parity of binary number stored in accumulator

Use an algorithm similar to one in Question 1 to find the parity (odd/even) of a binary number stored in the accumulator.

  Convert the message into ascii (use hex notation)

Convert the following message into ASCII (use Hex notation) Easy as 1.2.3!

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd