Personal trainer

Assignment Help Basic Computer Science
Reference no: EM13518213

PERSONAL TRAINER, INC.

Personal Trainer, Inc., owns and operates fitness centers in a dozen Midwestern cities. The centers have done well, and the company is planning an international expansion by opening a new "supercenter" in the Toronto area. Personal Trainer's president, Cassia Umi, hired an IT consultant, Susan Park, to help develop an information system for the new facility. During the project, Susan will work closely with Gray Lewis, who will manage the new operation.

Background

Susan Park has completed a preliminary investigation and performed the fact-finding tasks that were described in Chapters 2 and 4. Now, she will use the results to develop a logical model of the proposed information system.

Assignments

Before you perform the following tasks, you should review the information provided in Chapters 2 and 4 of the case.

Prepare a context diagram for the new system.
Prepare a diagram 0 DFD for the new system.
Write a brief memo that explains the importance of leveling a set of DFDs.
Write a brief memo that explains the importance of balancing a set of DFDs.

Reference no: EM13518213

Questions Cloud

Strategic components in developing the overall marketing pl : Assignment 1 covers specific learning outcomes in chapters 1 through 6 and builds upon strategic components in developing the overall marketing plan. This assignment must be submitted through Blackboard by clicking the Assignments Tab and uplo..
The network administrator of lenix ventures : The network administrator of Lenix Ventures
Identify the troublesome computer''s ip address and host : What commands would you use to identify the troublesome computer's ip address and host name?
Write a small program in java that builds routing tables : Write a small program in Java that builds routing tables for nodes based on shortest path routing using dijkstras algorithm. Where path distance is measured by edges. The input for this problem is the connectivity information for all the nodes..
Personal trainer : PERSONAL TRAINER, INC.
Information of all the processes pointed by init : Print some information of all the processes pointed by init_task, something similiar to "ps -ef", including UID, PID, PPID, thread name, etc.
Linear programming problem using branch and bound : Solve this linear programming problem using Branch and Bound
Research the key terms : Research the key terms
Describe the state of nuclear energy : Based on current events, describe the state of nuclear energy and its peaceful uses in at least one country.In your opinion, which is the greater threat

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Identify and explain some different types of risks

Identify and explain some different types of risks that a network environment might face.

  Which of the following is wrong

Which of the following is wrong? A. LDX #$5000 B. LDX #2550 C. LDX #$10000 D. LDX #$00 Explain Why!

  Determine whether value parameter is within specified range

The intended purpose of the following module is to determine whether the value parameter is within a specified range. The module will not work, however. Find the problem

  What are the transport protocols

What mechanism is used to detect/avoid/correct data transmission collision in Layer 2, such as Ethernet and WiFi? Describe the mechanism in sufficient details.

  Generate the intermediate code

Generate the intermediate code for the following expression assuming the usual rules concerning parentheses, precedence and associativity. Be sure to reuse temporaries as soon as possible: x + (5 - y) * z - 1

  What does this value indicate

The value of the Destination Address in a given Ethernet frame contains ff:ff:ff:ff:ff:ff. What does this value indicate?

  Explaining responsibility ofconfidentiality to employer

Describe what you must do in such a situation. You know that cost to your present employer will increase if ambiguities are not resolved. Though, you also have a responsibility of confidentiality to previous employer.

  Numbers as 4-bit words in 2''s complement form

Q. Assume the following numbers are represented as 4-bit words in 2's complement form. Perform the following operations and identify, in each case, whether or not an overflow occurs

  Describe what is downward solution

The Conflict Resolution Phase can be thought of as control strategy, describe four types of such strategy Describe what is downward solution

  Write a conditional that assigns the boolean value true

Write a conditional that assigns the boolean value true to the variable fever if the variable temperature is greater than 98.6 .So if temperature has the value 99.5,

  A web-based registration and cashiering system

You work for a large public university that utilizes a web-based registration and cashiering system that allows students to register for, pay for, and drop classes

  What is break -even point for upgrades

You have also learned that you can upgrade your CPU to make it 1.4 times as fast for $5,000. Which would you choose to yield the best performance improvemen tfor the least amount of money?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd