Explain 2 methods you would use to record the information

Assignment Help Computer Engineering
Reference no: EM133516685

Case Study: A university has a library comprising 1,000 books on five different subjects. The librarians approached you to automate the front desk activities of the library. They are willing to schedule a meeting to explain to you the functioning of the library.

  • Discuss 3 different methods by which you plan to gather information from the university's librarians?
  • Explain 2 methods you would use to record the information you gathered.

 

Reference no: EM133516685

Questions Cloud

What were the main findings and interpretations : What were the main findings and interpretations, and how do the findings and interpretations directly support your thesis/main point(s)?
What do you think are some good design strategies : What do you think are some good design strategies? In your opinion, what is the role of modeling such as UML in design?
Cybercrimes and cyberterrorism : What portentous threats exist? What technological tools will cyber terrorists use to complete their crimes?
Discuss selected interest area and justification : Introductory Statement. Literature review. Discuss selected interest area and justification. Problem statement- The problem should be evidenced-based and focus
Explain 2 methods you would use to record the information : Discuss 3 different methods by which you plan to gather information from the university's librarians? Explain 2 methods you would use to record the information
Explain the concept of situational crime theory : Explain the concept of Situational Crime Theory. what strategies or concepts could be used to help prevent crime
How each of the juvenile justice system components : Discuss how each of the juvenile justice system components can benefit from the implementation of your selected strategies.
Discuss how random-field theory was used in the case study : Denote what the study was about. Discuss how random-field theory was used in the case study. What were the results of the false recovery rate in the study?
List at least three question you would ask that stakeholder : List Three stakeholder/role, explain whether this stakeholder is inside or outside of Watershed, and list at least three question you would ask that stakeholder

Reviews

Write a Review

Computer Engineering Questions & Answers

  Use the branch-on-equal mips assembly instruction

Explain how to convert the address(hex) to words(bits) ? Is there any shortcut to do this type of conversion?

  How to open microsoft word and paste the information

In this assignment, you will find out and critique virtual information and word processing skills to make a professional-looking document that promotes personal development or financial growth and maturity.

  Which reasons can you use to justify fiber-optic cable

Which of the following reasons can you use to justify fiber-optic cable in this case, and why?

  Describe how these functions would be essential for business

Computer Science Database Discussion - Describe how these functions would be essential for business continuity and concurrency control

  What exactly is incident response in cybersecurity

CSSS 5220 Webster University What exactly is Incident Response in cybersecurity - Include recommendations and guidelines

  What code can be added

The ADT UnsortedType List function ‘DeleteItem(ItemType item)' creates an endless loop error when trying to delete a word or key that is not in the list.

  Determine how many days are in the month

Write a C program that takes as input a month and year and determines how many days are in the month, and outputs the number of days.

  Write a program to break a number into its individual digits

Write a program to break a number into its individual digits, for example to turn 1729 into 1, 7, 2 and 9. It is easy to get last digit of a number n as n % 10.

  Examine the risks and vulnerabilities to your employer

Examine the risks and vulnerabilities to your employer associated with the social networking sites that you have selected.

  Identify enemies to information materials

Conservation And Preservation-Level-Semester 2, Year 1-National Council for Higher Education- BACHELOR OF LIBRARY AND INFORMATION SCIENCE.

  Summarize the content of the chapter addressed

Summarize the content of the chapter addressed. How do you think you can apply this chapter's concepts into your home, school, personal-life or work environment

  Write the expenses to a sequential access file

Please write the expenses to a sequential access file, where the expense data for each individual are contained on a single line, separated by comma.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd