Maintain an electronic address book

Assignment Help Computer Engineering
Reference no: EM131442953

Introduction

The project is to develop a software that can be used to maintain an Electronic Address Book. An address book contains details of persons like a person's first and last names, address, city, state, zip and phone number.

Product Features
On an individual address book, this product support features like
- Addition of a new person to the address book.
- Edit a person's details
- Delete a person
Feature Overview

Add a new person
This feature allows the user to add a new person to an address book. This person details include his first and last names, address, city, state, zip and phone number. Each entry in the address book should have a unique first name and last name combination. Duplicate entries won't be allowed.

Edit person

This feature refers to editing a particular person's details. User selects a person from the entries of the address book either by highlighting the entry. All the details of the selected person are editable except his name.

- Delete person
This allows the user to delete a particular person's entry from the address book. In this case user selects a person from the entries of the address book by highlighting the entry. On clicking Delete button this entry will be deleted from the address book.

Supplementary Specification Document
This contains details of all those requirements not listed in the use cases or main feature list. These requirements are essential for the main requirements to function properly.

- List entries of address book
When the main window of address book opens, all the entries currently present in the address book are listed in a tabular manner. For editing and deleting an entry, user selects an entry from the listed entries. Selection is done by highlighting an entry. This list is updated if any new entry is added or deleted.

Use Case: Adding a person to address book

Scope: Electronic Address Book
Level: System feature Primary Actor: User Stakeholders and Interests:
- User: Wants a fast entry
Preconditions: Entry is identified and authenticated.

Success Guarantee (or Post conditions): Entry (Person details) is added to the address book.

Success Scenario (or Basic Flow):

1. Person details to be entered is made ready.

2. User clicks on the Add button.

3. User enters the details like name, address, zip, phone number etc.

4. Users clicks on Ok.

5. System adds the entry to the address book.

6. A success message is displayed.

Failure Scenario (or Alternate Flow):

1. Person details to be entered is made ready.

2. User clicks on the Add button.

3. User enters the details like name, address, zip, phone number etc.

4. Users clicks on Ok.

5. System detects a duplicate entry is present based on the name.

6. A failure message is displayed and entered details are cleared.
Frequency of Occurrence: Could be nearly continuous.

Use Case: Editing a person details from address book
Scope: Electronic Address Book
Level: System feature
Primary Actor: User
Stakeholders and Interests:
- User: Wants a fast search result and complete operation

Preconditions: Entry for editing is identified and authenticated.

Success Guarantee (or Post conditions): Required fields of the particular entry is edited.
Success Scenario (or Basic Flow):
1. Person details to be edited is made ready.
2. User double clicks on the person details whose details has to be edited.
3. User edits the required fields and clicks OK.
4. System updates the entry in the address book.
5. A success message is displayed.
Failure Scenario (or Alternate Flow):
1. Person details to be edited is made ready.
2. User highlights the person whose details has to be edited.
3. User clicks on Edit.
4. User updates the required fields and clicks OK.
5. Updating fails due to some wrong entry like alphabetical data in phone number.
6. A failure message is displayed.
Frequency of Occurrence: Could be nearly continuous.

Use Case: Deleting a person details from address book
Scope: Electronic Address Book
Level: System feature
Primary Actor: User
Stakeholders and Interests:

- User: Wants a fast search result and complete operation Preconditions: Entry for deletion is identified and authenticated. Success Guarantee (or Post conditions): Required entry is deleted.

Success Scenario (or Basic Flow):
1. Person details to be deleted is made ready.
2. User highlights the person whose details has to be deleted.
3. User clicks delete.
4. System deletes the entry from the address book.
5. A success message is displayed.

Failure Scenario (or Alternate Flow):
1. Person details to be deleted is made ready.
2. User highlights the person whose details has to be deleted.
3. User clicks delete.
4. System cannot delete the entry from the address book.
5. A failure message is displayed.
Frequency of Occurrence: Could be nearly continuous.

Attachment:- Multifunction Printer.pdf

Reference no: EM131442953

Questions Cloud

How would you define and describe a risk management system : you will write a three research paper in which you describe an RAROC system for risk management and identify benefits and challenges of an RAROC system. In this paper, please address the following questions:How would you define and describe a risk..
Great depression-hoover to fdr : Pick two themes from list and describe thoroughly the history associated with the themes in your forum initial post- all items in each line you pick...so if you pick 1 and 3 you will have 6 terms to discuss and link together
Conduct an organizational training needs analysis : Using publicly available information and data, propose business goals for comfort that will address the challenges the company and industry as a whole is facing. (Detailed information and data about the company and industry, business goals are bas..
Which will lead to the least amount of deadweight loss : Which of the following do you think are good markets for the government to tax if the goal is to boost tax revenue? Which will lead to the least amount of deadweight loss? Why?
Maintain an electronic address book : Develop a software that can be used to maintain an Electronic Address Book. An address book contains details of persons like a person's first and last names, address, city, state, zip and phone number.
What area represents the deadweight cost of the tax : Use the diagram to answer the following questions (a-d). a. At the equilibrium price before the tax is imposed, what area represents consumer surplus? What area represents producer surplus?
Analyse factors that affect price of an american call option : FIN359 Derivative Securities Assignment. Analyse the factors that affect the price of an American call option. Differentiate between the different actions that you can take when you own an American call option. Substantiate your analysis with real ..
What about versailles was important to louis xiv : What about Versailles was important to Louis XIV? What was important about Versailles location?
Explain how organizations use social media to communicate : You have been assigned the task as Marketing Manager to scan social media web sites and try to mitigate the negative consumer postings from a recent crisis. Explain how organizations use social media to communicate with their consumers through a c..

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd