Reference no: EM133214231
INFORMATION SYSTEM DEVELOPMENT
Case study 1
Store's activity diagram
Mydin Mart, a small grocery store chain, is developing a website that will allow customers to place orders for groceries and other items they sell. The customer places a Web order, the customer master is updated, and an order record is created. The order is printed at a nearby store, and store employees select the items from the shelves. Customers are notified via email when their order is ready. Frozen goods, chilled products, and other items are assembled when they pick up the order.
Case study questions:
Q1. cthe website to place an order, verification of the order, order confirmation, order details sent to the local store, and a customer email sent to the customer. Please DO NOT use hand-drawing.
Q2. What does an activity diagram depict?
Q3. Write one paragraph that describes the use of swimlanes on activity diagrams.
Q4. Why is using UML for modeling important?
Describe the pros and cons of computer certifications
: Describe the pros and cons of computer certifications. Consider the position of both the employer and the employee.
|
Conduct a policy gap analysis
: Identify what, if any, laws and regulations the target company is subject to.
|
Conduct a policy gap analysis
: Identify what, if any, laws and regulations the target company is subject to.
|
What does an activity diagram depict
: Mydin Mart, a small grocery store chain, is developing a website that will allow customers to place orders for groceries and other items they sell. The customer
|
Draw an activity diagram showing the customer
: Mydin Mart, a small grocery store chain, is developing a website that will allow customers to place orders for groceries and other items they sell.
|
Obtaining raw materials or a product
: A supply chain consists of all parties involved, directly or indirectly, in obtaining raw materials or a product. Explain why a project manager would use Gantt
|
Black box database security test
: You have been hired as a security consultant for XYZ company. You are to create and implement a black box, external database security test. Write a paper that r
|
How might five methods be associated with unethical behavior
: How might these five methods be associated with unethical behavior? Can you determine rules or procedures that could prevent managers from behaving unethically?
|
Explain what is meant by event-driven programming
: Explain what is meant by event-driven programming and describe how it is different from procedural programming and how it is similar.
|