Make two alternative design strategies

Assignment Help Computer Engineering
Reference no: EM1326895

create two alternative design strategies for a new system that has been proposed.

The owner of two ice-cream parlors wants to computerize and integrate sales transactions and inventory management within each parlor and between both parlors. The systems at each parlor should be connected to each other so that the owner can determine the inventory levels for each parlor and for both parlors combined. The owner can allocate $60,000 for hardware and $30,000 for software. The ownerâ??s requirements are that each system should be fast and easy to use, should require minimal training, and should be operational within 4 months from project initiation.

Describe two alternative design strategies, and explain how each would meet the owner's requirements. What are the constraints in this situation?

Reference no: EM1326895

Questions Cloud

Be sure to describe the two step method : Be sure to describe the two step method used in FASB 52 and how highly inflationary economies
Distinguish between open and closed applications. : explain  HTML, XML and Java programming. What is the difference between the three.
Suppose a friend you know requires a mortgage loan : Suppose a friend you know requires a mortgage loan to purchase a house. Your friend can purchase it now or wait until later and is unsure of what to do.
Describing the gender discrimination : During their trial for gender discrimination brought by a group of women denied jobs as bouncers at the casino, the general manager defended the policy.
Make two alternative design strategies : Describe two alternative design strategies, and explain how each would meet the requirements. What are the constraints in this situation.
Goals of transformational leadership : What are the goals of transformational leadership and transactional leadership? Do they lead to the same results/outcomes in organizations?
World bank is orientating its action in a right way : Do you think that the World Bank is orientating its action in a right way or not and if not, any ideas of how to redefine its action.
Explain what fields may be used as keys and indexes : select an information system in a health care organization that uses a database. The application can be simple or complex, but it must utilize a database that is part of an overall system to collect, store, process, and disseminate information.
Describing attribute or capacity of servant leadership : Describe one attribute or capacity of servant leadership and explain how and where you might apply this principle at work or in a community setting you are familiar with.

Reviews

Write a Review

Computer Engineering Questions & Answers

  What is role of risk assessment

What is role of risk assessment

  Access time and cache miss

Explain the access time when there is a cache miss? Suppose that the cache waits till the line has been fetched from the main memory and then re-executes for a hit.

  Intermediate programming

Design a program that reads in a text file with drawing commands and then outputs a bitmap with all the items drawn correctly

  Write down four logic functions that are true

Implement the four functions using a ROM.Assume that X consists of 3 bits, x2 x1 x0

  Program that stores and converts a number

Write down a program that stores and converts a number entered in Roman numerals to an integer value. Your program should consist of a class named Roman.

  Fixing errors in software to control the security

While reading the code top-down, we always try to use our expectations regarding the application domain in order to predict what major functional elements of the code will be.

  Designing an erd

xplain why all this normalization stuff is so significant?" he asks. "The old system worked “OK” most of time, and now you're telling me we require all these special rules. Why is this essential?" Develop the ERD in MS Visio.

  Computing the fmin value

Compute the minimum: Graphically, Numerically with the f min search function

  How to set a rule that used by snort to detect an ack scan

How to set a rule that used by snort to detect an ACK scan What do you think Bro can do a better job detecting an ACK scan?

  Type of connections in elevator shaft

Describe what type of connections would work within the elevator shaft. If more than one choice is possible, choose the best option and describe the reasons for your choice.

  Design and organize forensics report

When the investigation is complete and facts and findings are captured within your forensics report you should assure that the forensic report is organized in the correct manner and you are prepared for the courtroom testimony. Explain the details..

  Draw a class diagram for the situation

We store each employee's name, social insurance number, address, salary, sex, and birth date, An employee is assigned to one department but may work on several projects, that are not necessarily controlled by the same department.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd