Identify at least three possible use cases and actors

Assignment Help Computer Engineering
Reference no: EM132144433

Systems analysis chapter 6: Please answer the four questions at the tasks section

Campus Bikes is a popular bicycle shop located near a major university. The business has grown and the owner, Mark Turner, wants to install an up-to-date computer system to handle all business functions.

Background

Campus Bikes sells several brands of new bikes, including everything from high-end racing models to beach cruisers. In addition to sales of new bikes and accessories, Mark's service department is always busy.

The staff includes Mark himself, a bookkeeper, two part-time sales reps, a full-time mechanic, and several part-time service helpers who assemble bikes. Before opening the shop three years ago, Mark worked for many years in his father's auto dealership, Turner Motors, and he learned all about the automobile business. In the bike shop, he runs a similar operation, but on a much smaller scale. For example, sales orders are recorded on pre-printed forms, and service requests are written up just as they would be in an auto service department.

Mark's customers find him fair and reasonable. He likes to say that the main difference between his business and a big-box retailer is that he knows his customers and will do whatever it takes to keep them happy. You work at the college as a lab assistant in the computer information department. You earned a computer science degree at a two-year school, and you recently decided to work toward your four-degree. The computer lab manager, Jill, often suggests that local businesses contact you for help in troubleshooting IT issues.

This morning, you received a call from Mark, who wants to hire you as a consultant to help plan a system for Campus Bikes. You learned that Jill had referred him, and you are excited to have this opportunity. It probably didn't hurt that both you and Jill had bought bikes from Mark, and already knew him. After spending several weekends talking with Mark and the staff, you are ready to start. You decide to use an object-oriented approach that will be easy to understand.

Tasks:

1. List possible objects in the new bike shop system, including their attributes and methods.

2. Identify at least three possible use cases and actors.

3. Create a use case diagram that shows how service requests are handled.

4. Create a state transition diagram that describes typical customer states and how they change based on specific actions and events.

Reference no: EM132144433

Questions Cloud

How that the real data is transferred from the main memory : With neat sketch, explain and show how that the real data is transferred from the main memory to the MBR.
Explain the factors that went into your decision : Disc jockeys must also be able to change playlists when they areused because what is actually played is often different from what isplanned.
How you can change the above table into 2nf : Is this table in first normal form? Why or Why Not? Why it is not in 2NF? How you can change the above table into 2NF.
What speed-up do you get with 10 versus 100 processors : Calculate the speedups assuming the matrices grow to 100 by 100. Which are strong scaling and which are weak scaling in this exercise?
Identify at least three possible use cases and actors : Create a state transition diagram that describes typical customer states and how they change based on specific actions and events.
Draw an fdd that shows the personal trainers main functions : The BumbleBee program stores basic member information, but does not include information about member preferences, activities, and history.
What is price of stock : What's is price of this stock? using Constant dividend model
Statement of the hewlett-packard company : Write a report on the Hewlett-Packard Company (HP) case study (available on Moodle) - how the best practices of Enterprise Architecture
Complete the schedules for quantity demanded : PRINCIPLES OF MACROECONOMICS ASSESSMENT - Supply and Demand, and Equilibrium Analysis. Complete the schedules for Quantity Demanded

Reviews

Write a Review

Computer Engineering Questions & Answers

  Write application that enable to randomly record water depth

Write an application that enables you to randomly record water depths for 5 different locations at 0700 (7 a.m.), 1200 (noon), 1700 (5 p.m.), and 2100 (9 p.m.).

  Discuss the use of networking and social capital

As a group, review at least four (6) academically reviewed articles on the use of Networking and Social Capital to manage the external dynamics of a team.

  What skill set should the individuals have and why

Using the Internet and all of your course materials, research an incident response team. What skill set should the individuals have, and why?

  Explain which styles take precedence

magz64- Explain which styles take precedence and how the precedence is established. Provide an example where multiple levels of styles would be used and why.

  Devise a script that takes a filename as argument

Devise a script that takes a filename as argument and looks in the home directory tree to display the listing of all its links.

  List the hierarchy of java swing containers from top down

List four features of the JFC. List the hierarchy of Java Swing Containers from the top down. Give an example of each.

  Comprehensive literature review

Comprehensive literature review. Choose to conduct a project that is technical (i.e. practically based e.g. development of a prototype, simulation, design framework etc) that fall within computing and IT curriculum.

  Describing lan and wan

Write down in words and describe the meanings of terms LAN and WAN. Explain how do they differ? State three basic topologies for LAN use, and describe the differences among then.

  Discuss what are the four main areas of investigation

design the feasibility analysis of a proposed new security project. What are the four main areas of investigation

  What is your opinion of todays state of iss security

What is hacking? In what four major areas are there security holes? What is your opinion of today's state of ISs security and privacy?

  Describe the fundamental components of a distributed system

Describe the fundamental components of a distributed system. Compare and contrast advantages and disadvantages of at least 2 distributed system architectures.

  Calculate the average train and test accuracies

Experiment with different initializations of the parameter used for gradient descent . Clearly mention the initial values of the parameter tried, 1a.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd