Express the process of customer identification

Assignment Help Computer Engineering
Reference no: EM1329280

? Build use case diagrams and write use case descriptions
? Build class diagrams for static system modeling
? Build collaboration and sequence diagrams for dynamic system modeling

Aims
This assignment aims to establish a basic familiarity with the object-oriented system design
and the use of UML for system modelling

Objectives
On completion of this assignment you should be able to:
? build use case diagrams and write use case descriptions
? build class diagrams for static system modelling
? build collaboration and sequence diagrams for dynamic system modelling

Tasks
Can You provid with initial requirements collected at the first interview with the owner of a video rental store, who is ordering an information system to improve efficiency of his business. The system is expected to maintain an inventory of rentable videos. Rentable videos can be DVD, VCD and video cassettes.
The client wants an information system to fit in the following business scenario:
A customer enters the store and browses the inventory to select any number of videos to rent.

Then, the customer brings the videos to the front desk where an attendant identifies the customer using customer's ID Card, checks the customer's records in the system, and then enters information about rented videos into the system. The system calculates the total rental price. The attendant gives the customer an invoice, which lists the videos, the total price and the due date. The customer pays for the rental and leaves.

The videos may become worn-out. By tracking the reported problems over time, the store can stop renting the damaged videos. The customer complains counter that is originally equal to 0, may change up to 2 before the video is discarded.
The renting price depends if a video is in the new release, or ordinary category. A video is moved by the attendant from the new release to ordinary after a month.
The system is expected to assist in identifying those videos, which have been overdue. The attendant may request an overdue report that produces a list of videos followed by names of those who rented them and their phone numbers.
The system is expected to assist in identifying those videos that make the most profit. To do this, the system needs to look at the number of times each video was rented and produce a report for when requested.

Customer's information includes: name, address, and telephone number.
Information on videos includes: title, style ( comedy, drama,...), category, media ( DVD, cassette..), number in stock, number of rents, user complains counter.
Besides that, DVD and VCD includes: subtitles (English, French, ...), sound (Dolby,...) Besides that DVD includes information on: languages(English, French, Spanish...), the aspect ratio (4:3 or 16:9) Video cassettes are labeled to prevent tape replacement. The system has to contain a field that indicates if the label is damaged or not. You need to take into account that this information about functional requirements has been collected at the first interview and may not be sufficient to start the system modeling. Considering an iterative nature of the process of collecting user requirements, extend the description yourself making assumptions about outcomes of further interviews.

Deliverables
? A use case diagram
? Two use case descriptions
- renting a DVD
- moving videos from the new release category to the ordinary category
? A class diagram
? A collaboration diagram modeling the process of customer identification
? A sequence diagram modeling the process of updating the customer complains counter
? Symbols of all classes with their attributes and methods included. You must indicate visibility and types of the attributes, visibility of the methods and types of the values returned by the methods. If at the modeling stage some attributes of some of the classes may not be finalized, provide comments.

Reference no: EM1329280

Questions Cloud

Difference between simple and compound interest : What is the difference between "simple" and "compound" interest? What are some of the uses of compound interest in business?
Description of supply and demand simulation : Description of Supply and Demand Simulation - What has happened to the price of the substitutes and complementary goods/services for your selected product over the last year?
Different constitutional issues : What are the main provisions of the 8th Amendment?
Develop a similar table to show the effects of operations : Develop a similar table to show the effects of adding operations on Saturday. (Assume that 30 operations would still be performed each day.) How would this affect the utilization of the bed capacity? Is this capacity sufficient for the additional pat..
Express the process of customer identification : Then, customer brings the videos to the front desk where an attendant identifies the customer using customer's ID Card, checks the customer's records in the system, and then enters information about rented videos into the system.
Compounding of interest-present-future value of investment : Explain how annuities affect TVM problems and investment outcomes with the impact of the following items listed below - this does not have to be exstensively long
Explain ethical consideration for ebusiness website : Explain Ethical consideration for eBusiness website and discuss organizational ethical processes as well as regulatory and legal rulings that might affect consumer trust when using an eBusiness Web site
Show the chain of authority for compliance : Organizational structure: Chain of authority for compliance and In my last company the compliance office was assigned to the same manager who consistently violated the ethics of the corporation.
Attitudes influence attempts by leaders to introduce change : How do personal attitudes influence attempts by leaders to introduce change?

Reviews

Write a Review

Computer Engineering Questions & Answers

  Find the initial interval for the root search

Write down the corresponding MATLAB code. You should check (just for yourself) how your function works with an arbitrary unsorted array.

  Note concepts using the osi model as a framework

describe protocols at the different layers of the OSI model and explain their functionality, and identify various hardwarecomponents and network topologies.

  Implementing an intrusion detection system

Your company is trying to decide whether to implement an intrusion detection system (IDS), or an intrusion prevention system (IPS).

  Explain how vb .net uses a database

express how VB .NET uses a database. Briefly summarize the components of a database and the characteristics of a DBMS. Include a discussion of ADO .NET and its capabilities.

  What is the importance of the program telnet

My co-worker Mark and I both regularly use our mainframe UNIX system. I've fingered him, and know that he's logged on. when I do not want to have a conversation with him, instant messenger with him, or send him an email, I would like to send him a..

  Explain the following hypothetical scenario

The new CIO and his biker buddy COO decide to form a Steering Committee to clean up the mess. They involve the key decision makers from their respective organizations and get the commitment from Senior VP of Marketing. The CIO and COO make it clea..

  What is time estimate

How does an estimator arrive at a time estimate for a particular task.

  Imagine 5,000 input time slots are to be switched

The time slots are refreshed every 100 microsec. What memory cycle time is needed to keep up with the data flow.

  What are the most effective ways to filter data

what are the others ways to secure data on a wired or wireless network.

  Constraint programming

It is about the constraint programming. We have party organizations for being social. Each participant has their own preference list for parties, every party organizers has their own preference list for providing the parties.

  What happen if you did not break

When using Case statements, what would happen if you did not "Break?" Please give an example and explain. Where, in your everyday life, would you use all of the looping techniques.

  Troubleshooting the software

AV software has eliminated the malware from highly infected system. After the first reboot, an error message is displayed that consists of the reference to strange DLL file that is missing.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd