How a worker would order a lunch using your application

Assignment Help Computer Engineering
Reference no: EM133558486

Case Study: To upgrade and keep up with the technologies, Nina's Little Pot Cafe has installed a "Nasi Briyani, Nasi Lemak, Fried Kuey Tiaw and Sizzling Mee" making robot to supply office service lunch hour every day. The restaurant also has an automated delivery system that will take the meals to a specified department / office room. You have been asked to program an application to order lunch.

Question a. Write a short scenario describing how a worker would order a lunch using your application.

Question b. Provide a hierarchical task diagram and description of the lunch ordering process. Note particularly where there might be choice points or alternative methods.

Question c. Would you use a voice recognition system or ask the user to use touch screen to responses? Explain the relative advantages and disadvantages of each for this particular.

 

Reference no: EM133558486

Questions Cloud

How might a topic such as art literature music dance etc : How might a topic such as art, literature, music, dance, etc., from other time periods enhance your career and personal life in the present?
How can individuals and organizations stay vigilant : how can individuals and organizations stay vigilant and protect themselves from these threats? Are there any specific cybersecurity practices or strategies
Create quizzes and test users based on the quizzes : You are asked to create a program that will be used to create quizzes and test users based on these quizzes.
Eight different project delivery methods : List the eight different project delivery methods listed in the book. You've won $50,000,000 in the lottery and want to build a bank to hold all your money.
How a worker would order a lunch using your application : Write a short scenario describing how a worker would order a lunch using your application. Provide a hierarchical task diagram and description of the lunch
Moral responsibility to future generations : To what extent do humans have a moral responsibility to future generations that are yet to be born? Explain your reasoning.
Identify threats to the seven domains of it : Identify threats to the seven domains of IT within the organization. Identify vulnerabilities in the seven domains of IT within the organization.
What tips did you learn about effective presentations : What common mistakes do people make when presenting information to a group? What tips did you learn about effective PowerPoint presentations?
What is malware and why we use malware : What is malware? Why we use malware? What are the key concepts of malware ? What is dumpster diving ? Why er use dumspter diving? What are the key concepts

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd