Identify some of the obvious actors of the above library

Assignment Help Computer Engineering
Reference no: EM132154631

UML diagram:

You have been contracted to develop a computer system for a university library.

The library holds many types of documents for its users which are students, faculty, and staffs of the university. Some of those documents are books, journals, and conference proceedings.

Documents such as journals are for short-term loan only (i.e 10 working days). Other documents such as books may be borrowed for up to six months for a student and a year for a faculty or a staff member. The maximum items that a faculty or staff member can borrow are 12 while it is only 6 for students.

It is essential that the system keep track of the number of copies of books when books are borrowed and returned. The system should produce a reminder when a book borrowed by a user is overdue.

A user should be able to extend the loan if the borrowed item is a book and others have not reserved it. The system should allow users to search for a document based on a particular title, by a particular author or by certain keywords. Any user can search for documents hold in the library. To be able to borrow documents from the library, the user must be registered.

1. Identify some of the obvious actors of the above library system. Must identify at least three actors.

2. Identify and document three main use cases of the library system. Write a short description of these use cases. Use case description must have a name, participating actors, the entry condition, the exit condition and the flow of events.

3. Draw a sequence diagram for at least a usage scenario of a user (Dr. Shi, a faculty of the university) returning a book successfully. Make sure the sequence diagram is drawn with the correct UML notations.

 

Reference no: EM132154631

Questions Cloud

Which command can be used to rename a file or directory : What command flag can you use with cp so that it doesn't accidentally overwrite a file if it already exists (hint: look up the man page for cp)?
What do you understand by network security threat : What do you understand by network security threat? What tools and Techniques are available to make the nwtwork more secure.
Propose the subnet address and subnet mask to be allocated : A university has been allocated the 192.1.0.0/16 address block. As the network administrator of the university, you have been asked to subnet the network.
What is your understanding of the issue : PSPGOV412A ASSESSMENT TASK - Audio Assignment - Workplace issue - What is your understanding of the issue. What are the options in relation to the issue
Identify some of the obvious actors of the above library : Identify some of the obvious actors of the above library system. Must identify at least three actors.
Can someone provide an example of this from any type : Can someone provide an example of this from any type of UML diagram and explain what I am looking for?.
What do you understand by just-in-time compilation : What do you understand by just-in-time compilation? How is it different from traditional interpretation and compilation? Explain using a figure.
Why is an understanding of boolean algebra not important : Why is an understanding of Boolean algebra not important to a weather forecaster?
What is a universal shift register : What is a universal shift register? Draw the schematic and block diagram of a 4-bit universal shift register.

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd