Does the business problem make sense

Assignment Help Computer Engineering
Reference no: EM132103204

Prepare a design for a Java program that would solve a significant business problem. To limit the problem to a reasonable scope, assume the system will be used in a small business environment (less than 50 employees). I have provided simple business case examples but you are welcome to use a real-world business case as a basis for your evaluation.

Research and evaluate the essential requirements and usage of such a system, and create a design for a Java program that would solve the problem. Roughly three or four pages are common for this design document.

For full points, your solution must include all five of these sections. Please clearly identify the sections in your document:

Problem Description: Describe the salient features and main components of the business problem. Document the sources you used to obtain the problem examples or business case information.

Interpretation: Does the business problem make sense? Did you notice any unmentioned requirements that should be addressed by a solution? If you have experience relating to the business problem, can you identify anything that should be resolved differently than stated in the business case?

Classes: Detail the specific classes that would be required for the problem solution. Use the concepts from Chapter 8's first two sections to determine what classes are best suited to the problem - as noted in Chapter 8, classes typically are related to specific "nouns" in the problem description. For example, our accounts receivable programs used in homeworks have a CustomerAccount class, which is an obvious noun relating to a customer account in accounts receivable.

Class Methods: For each of the classes from section (2), describe in detail (but do not implement) the methods that would be required in each class. Explain the purpose and the action for each method. Remember that methods are typically "verbs" or "actions" related to the problem and its solution. For example, our CustomerAccount class contains the methods "purchase", "payment", and "getAccountBalance".

Summary: Explain why your classes and methods completely solve the business problem outlined in step 1, and discuss whether your assumptions and alternatives are suitable, appropriate and completely solve the problem.

Your assignment will be graded using the College of Business's Critical Thinking Rubric involving these four aspects:

1. Problem Identification: Correctness of description of problem & completeness of context surrounding the problem

2. Information Collection and Interpretation: Completeness of relevant information & credibility of information

3. Solution Development: Information is correctly interpreted & analyzed, assumptions are stated, and alternative solutions are discussed

4. Recommendation: The recommendation, justification, and limitations are clearly discussed and summarized.

Reference no: EM132103204

Questions Cloud

Calculate the present day value of an amount received : Present Value (PV) is a formula used in finance that calculates the present day value of an amount received at a future date.
What is a primary actor in a use-case : What is a primary Actor in a Use-Case? How is it drawn in the diagram? How is that same actor represented in the DFD diagram?
Provide an example of each and outline their differences : Prescriptive analytics is considered to be a step further ahead of predictive analysis and substantially different from it.
Describe the interface types that you expect to model : Prepare a report that describes the proposed interface platform and describe the interface types that you expect to model.
Does the business problem make sense : Explain the purpose and the action for each method. Remember that methods are typically "verbs" or "actions" related to the problem and its solution.
Develop a detailed asset management strategy : SITXFIN005 - Manage physical assets - develop a detailed asset management strategy to ensure streamlined acquisition and management
What role do security analysts play in preventing web server : What roles do security analysts play in preventing Web server, application, and database attacks?
What harm could result from a successful attack : What risks do Web and database attacks create for an organization? What harm could result from a successful attack?
Represent a full adder as a block diagram : Represent a Full adder as a block diagram . Specify the function of a full adder using a truth table.

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd