Quality building supply qbs has proposed a project to

Assignment Help Data Structure & Algorithms
Reference no: EM13380236

Quality Building Supply (QBS) has proposed a project to develop a business system. The project team has gathered the following information:

The QBS stores have two kinds of customers: general public and contractors. The general public customers must supply credit card information in order to purchase any items. Their name, phone number and e-mail address are also stored for warranty/refund purposes. In addition, contractors have an account created by a QBS clerk so that they can get a specific discount. Each account thus created has a unique identifier and also stores the contractor's company name (if any), the current credit limit and the last purchase date and amount. The transactions for general public and for the contractors are accomplished by a QBS clerk who scans each item and adds them to the purchase. Items that cannot be successfully scanned are added to the purchase by hand.

If one or more items are not present on the shelf and a search reveals that the stock level is zero, they are added on an order that is created by the QBS clerk on behalf of the customer (either general public or contractor). Each order thus created has a unique identifier and stores order creation date, total amount and status (e.g. pending, closed...).

The name, price and stock level of the items stocked by QBS are recorded in the system of interest together with the item type. Items are produced by and sourced from a manufacturer, whose name and country are recorded in the system. The date of the last payment, the open balance and the date of the next shipment of items are also recorded for each manufacturer. Note that the manufacturer has no direct access to the system of interest. Also, at this stage the general public and contractors can search items online but can only purchase them in store.

The stock levels of each item are changed by the system with each purchase. However these levels need to be manually updated by a clerk in certain cases such as shipments of items from manufacturers, refunds, exchanges, etc.

Your task is (as a system analyst / designer) to prepare a report of system analysis for the above business system. Your report should consist of the following sections:

- Section 1: Identifying the use cases of the system based on the narrative above, and giving a brief description for each of the use cases.

(Please note that the narrative does not cover all the aspects of the QBS business system. You are only required to identify the use cases covered by the given information.)

From Section 2, you focus on only one use case. Although you can choose any use case identified in Section 1, we recommend that you take the use case, "Buy Items", for the following sections.

- Section 2: Developing a use case diagram.

- Section 3: Developing activity diagrams. (Please note that for the use case, "Buy Items", there are two scenarios, namely, "General public customer buys items" and "Contractor customer buys items". You should develop an activity diagram for each of the scenarios.)

- Section 4: Providing fully developed use case descriptions for the use case, (that is, a fully developed use case description for each of the scenarios).

- Section 5: Developing domain model class diagrams, (a diagram for each of the scenarios).

- Section 6: Developing system sequence diagrams, (a diagram for each of the scenarios).

Reference no: EM13380236

Questions Cloud

Consider the following udp header dumpbb400045003aff10a : consider the following udp header dumpbb400045003aff10a identify the source port number.b identify the destination port
An organisation has been granted a block of addresses : an organisation has been granted a block of addresses starting with the address 172.154.68.022.a create three subnets
Question nbsprouter x running rip has the following routing : question nbsprouter x running rip has the following routing tabledestinationcostnext routernet17anet23bnet34cnet43da
Security risk assessment is an invaluable tool in an it : security risk assessment is an invaluable tool in an it professionals quest to protect a companys information assets.
Quality building supply qbs has proposed a project to : quality building supply qbs has proposed a project to develop a business system. the project team has gathered the
Tasks1design the software architecture of a web auctioning : tasks1.design the software architecture of a web auctioning site.2.design a database for storing information about
Given the following description answer the questions belowa : given the following description answer the questions below.a hard real-time rt system is one where the failure to
1 the project could fail because the cost of a key : 1. the project could fail because the cost of a key component has increased and we could build a product that does not
Write an introspective capstone paper expressing your views : write an introspective capstone paper expressing your views aboutinformation use in todays society. this will be

Reviews

Write a Review

Data Structure & Algorithms Questions & Answers

  Question about character array

The 2-most important design issues that are specific to character string types are the given, Should strings be simply a special kind of character array or a primitive type?

  Use separate chaining to store the

Use separate chaining to store the following keys. Consider that each letter is a number corresponding to the sequence of English alphabets. That is, A->1,

  Describe why algorithm runs in on time

Assume you have the array A of n items, and you want to find k items in A closest to the median of A. Describe why your algorithm runs in O(n) time.

  Display the dfs starting from a specified vertex

Design and implement a driver to show the following (check for 2 graphs; 1 is provided, including the starting vertex):Display the dfs starting from a specified vertex;Display the discovery/finishing time for each node in the graph;Show the Parenthes..

  Computing hash value for message

For a message, he computes the hash value H = (VChar 1 x VChar 2 x VChar 3 ...x VChar N) mod(26).

  Algorithm to read arbitrary number of data records

Write the algorithm to read arbitrary number of data records, each comprising name, age, and code.

  Returns true if a string contains properly nested

Give an algorithm that returns true if a string contains properly nested and balanced parentheses, and false if otherwise. Hint: At no time while scanning a legal string from left to right will you have encountered more right parentheses than left..

  Write control structure-pseudocode algorithm for simple task

Three simple control structures which could be used to make this algorithm. What do you believe is most difficult part of creating algorithm?

  Question about isdn

Today ISDN cost $40 every month for BRI service which includes 1 D Channel and 2 B Channels. Every channel is capable of transmitting 64kbps of voice, data, video or fax for a total of 128 kbps.

  Explain binary tree by induction

Binary tree is full if all of its vertices have either zero or two children. Let Bn denote number of full binary trees with n vertices. Illustrate by induction (substitution) that Bn is 2 (n) .

  Determine complete list of nodes which ancestor

Let the following tree: tree a. Determine the children of Q? b. What is the complete list of nodes which have D as ancestor? c. Determine the height of this tree (as height is defined in text)?

  Compiler to separate the numbers using dashes

write this code using structures.with writing the SSN in one line this ask the compiler to seperate the numbers using dashes.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd