Does the business problem make sense

Assignment Help Computer Engineering
Reference no: EM132103204

Prepare a design for a Java program that would solve a significant business problem. To limit the problem to a reasonable scope, assume the system will be used in a small business environment (less than 50 employees). I have provided simple business case examples but you are welcome to use a real-world business case as a basis for your evaluation.

Research and evaluate the essential requirements and usage of such a system, and create a design for a Java program that would solve the problem. Roughly three or four pages are common for this design document.

For full points, your solution must include all five of these sections. Please clearly identify the sections in your document:

Problem Description: Describe the salient features and main components of the business problem. Document the sources you used to obtain the problem examples or business case information.

Interpretation: Does the business problem make sense? Did you notice any unmentioned requirements that should be addressed by a solution? If you have experience relating to the business problem, can you identify anything that should be resolved differently than stated in the business case?

Classes: Detail the specific classes that would be required for the problem solution. Use the concepts from Chapter 8's first two sections to determine what classes are best suited to the problem - as noted in Chapter 8, classes typically are related to specific "nouns" in the problem description. For example, our accounts receivable programs used in homeworks have a CustomerAccount class, which is an obvious noun relating to a customer account in accounts receivable.

Class Methods: For each of the classes from section (2), describe in detail (but do not implement) the methods that would be required in each class. Explain the purpose and the action for each method. Remember that methods are typically "verbs" or "actions" related to the problem and its solution. For example, our CustomerAccount class contains the methods "purchase", "payment", and "getAccountBalance".

Summary: Explain why your classes and methods completely solve the business problem outlined in step 1, and discuss whether your assumptions and alternatives are suitable, appropriate and completely solve the problem.

Your assignment will be graded using the College of Business's Critical Thinking Rubric involving these four aspects:

1. Problem Identification: Correctness of description of problem & completeness of context surrounding the problem

2. Information Collection and Interpretation: Completeness of relevant information & credibility of information

3. Solution Development: Information is correctly interpreted & analyzed, assumptions are stated, and alternative solutions are discussed

4. Recommendation: The recommendation, justification, and limitations are clearly discussed and summarized.

Reference no: EM132103204

Questions Cloud

Calculate the present day value of an amount received : Present Value (PV) is a formula used in finance that calculates the present day value of an amount received at a future date.
What is a primary actor in a use-case : What is a primary Actor in a Use-Case? How is it drawn in the diagram? How is that same actor represented in the DFD diagram?
Provide an example of each and outline their differences : Prescriptive analytics is considered to be a step further ahead of predictive analysis and substantially different from it.
Describe the interface types that you expect to model : Prepare a report that describes the proposed interface platform and describe the interface types that you expect to model.
Does the business problem make sense : Explain the purpose and the action for each method. Remember that methods are typically "verbs" or "actions" related to the problem and its solution.
Develop a detailed asset management strategy : SITXFIN005 - Manage physical assets - develop a detailed asset management strategy to ensure streamlined acquisition and management
What role do security analysts play in preventing web server : What roles do security analysts play in preventing Web server, application, and database attacks?
What harm could result from a successful attack : What risks do Web and database attacks create for an organization? What harm could result from a successful attack?
Represent a full adder as a block diagram : Represent a Full adder as a block diagram . Specify the function of a full adder using a truth table.

Reviews

Write a Review

Computer Engineering Questions & Answers

  Identify each explorer and state what country they were from

Provide a brief summary of their journeys and some of the significant settlements they founded or what discoveries they may have made that benefited their sponsoring country. Identify each explorer and state what country they were from and under wh..

  Perform a comparative analysis that studies collision rates

Perform a comparative analysis that studies the collision rates for various hash codes for character strings, such as various polynomial hash codes.

  Compute the greatest common divisor of two integers

Write down a recursive function that calculates the greatest common divisor of two integers using the Euclidean algorithm. Write a driver program to test your function.

  Constructing a workable methodology

You will need to describe the overall process and the main elements i.e. the main stages or phases, the main techniques and when they would be used

  What purpose does the text-indent property serve

What purpose does the text-indent property serve? What properties are used to set margins around elements?

  Flow chart in modular approach

Design an algorithm in order to prepare a daily hotel charge report. Input comprises of the series of records that consists of the room number, the customer name, cost of room.

  Make a use of microsoft project to create a project plan

make a Use of Microsoft Project to create a project plan

  Propose the general layout for a web-based source document

castle point antique auction operates a successful web site that offers an auction forum for buyers and sellers of fine

  Write program that implements a login window with text field

Write a program with a graphical interface that implements a login window with text fields for the user name and password.

  How are devices are vulnerable to hacking

Based on the TED talks video on " How are devices are vulnerable to hacking", the presenter goes into an overview on how various technology like Pace Makers, vehicles, and radios are susceptible to attack.

  Desktop pc and a computer suitable as a web server

This solution provides the learner with an understanding of two and 3 tierd architectures and explains the role of each architecture. Futher this solution explain the main differences between a desktop PC and a computer suitable as a web server.

  Analyze the four main browsers firefox ie safari chrome and

question 1. examine the four major browsers firefox ie safari chrome and discuss their dominance through an evaluation

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd