What activities you will do in the software design step

Assignment Help Basic Computer Science
Reference no: EM131057858

Professionals working in software industry often refer "software design" as "building the bridge between user requirements and the software code". Assume that you are given a task of developing a web site for a retail store that has the typical online store functionality such as order a product, search for a product, pay for an order, and track an order. Please list the steps you will take in order to complete the task, and also explain which step is the "software design", and what activities you will do in the software design step, as well as the reasons behind each activity.

Software design may produce many diagrams or charts, for example class diagram, use case diagram, flowcharts, etc. Please select two diagrams or charts that you will use for the design step for the web page development task (however, you need not to create any diagram or chat for this assignment), and discuss the reasons why you need to use them, and why that diagram or chat can help you to validate and improve your design.

Reference no: EM131057858

Questions Cloud

Tax cut on households present value of lifetime resources : Suppose a government lives for two periods. It makes an exogenous amount of government expenditures each period. These have nominal value P1G1 = 100 and P2G2 = 50. It also charges households a lump sum tax, Tt each period. Write down the government’s..
Tax rate be for the calculation of the debt component : Suppose that LilyMac Photography expects EBIT to be approximately $66,000 per year for the foreseeable future, and that it has 300 10-year, 4 percent annual coupon bonds outstanding. (Use Table 11.1) What would the appropriate tax rate be for use in ..
The issues of management style-practices : You have been retained as a consultant byPaulGreen, the Managing Director of GrantpacLtd, to advise on the tasks facing the newappointee to the role of National Sales and Marketing Manager.
Competitive process in markets : As a result, collusion among private companies often seeks to divide market areas to maximize monopoly profits. To illustrate the competitive process in markets dominated by few firms, assume that a two-firm duopoly dominates the market for weekly..
What activities you will do in the software design step : discuss the reasons why you need to use them, and why that diagram or chat can help you to validate and improve your design.
Preferred stock weight-debt weight and equity weight : BetterPie Industries has 7 million shares of common stock outstanding, 4 million shares of preferred stock outstanding, and 20,000 bonds. Assume the common shares are selling for $49 per share, the preferred shares are selling for $26.50 per share, a..
Discuss interactions between westward expansion and ethnic : Discuss the interactions between westward expansion, ethnic/racial tensions, and Gilded Age industrialization. What were the significant events, characters, movements, and/or ideas?
Which is better suited for web applications : Explain the difference between two-tier and three-tier architectures.
Explains division of eastern and western europe after wwii : Explains the division of Eastern and Western Europe after WWII and The creation of Collective Security alliances for both America and the Soviet Union. NATO & the Warsaw Pact.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Method called is isosceles that accepts three integers

The method returns true if the triangle is isosceles but not equilateral (meaning that exactly two of the sides have an equal length), and false otherwise.

  What typical units of data are distributed over sites

What typical units of data are distributed over sites?

  Maintaining security in a company

Write a 4 page paper describing the some of the issues you might face when maintaining security in a company that has offices in multiple countries.

  Obtain funding and project approval to get a project started

To submit to me in three weeks maximum a paper on the above and stating why the details in the business case template are there and how this represents the corpus of data that would be submitted to obtain funding and project approval to get a project..

  Why do some block cipher modes of operation only

Why do some block cipher modes of operation only use encryption while others use both encryption and decryption?

  Write the definition of function dashedline

Write down the definition of a function dashedLine, with one parameter, an int. If parameter is negative or zero, function does nothing. Otherwise it prints complete line terminated by new line character to standard output consisting of dashes

  File of the game tic-tac-toe

First have a good grasp on the game, its concepts, and its rules.  For your first assignment, download the linked file below. This is a .cpp file of the game Tic-Tac-Toe.

  How many times would we have to perform a fetch

That is, the reorganization cost and subsequent search cost are less than the search cost before reorganization. Support your answer. Assume s = 16 ms, rd = 8.3 ms, and btt = 1 ms.

  Write a function called parkingcharge

Write a function called parkingCharge that, given the type of vehilce (c = car, b = bus, t = truck) and the hours a vehicle spent in the parking lot, retruns the parking charge based on the rates shown below.

  Charge of communications for a company

When responding to your peers, review the types of social media that are addressed in their posts, and offer further possible examples for their choices.

  Short paper on three-tiered architecture

Submit a report for the CIO about three-tiered architecture. The organization has continued to grow, and the architecture of the existing database needs to be changed to increase performance, scalability, and reliability. Your CIO has asked you to..

  Relational schema

What would be the correct answer for them? For questions x - y refer to the following relational schema: Which of the following statements is true? (a)  a key is a superkey (b)  a candidate key is a superkey (c)  a primary key is a superkey (d)  all ..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd