What the customer usually orders

Assignment Help Computer Engineering
Reference no: EM132125422

Case Description: Mama Mia's (MM) pizzeria offers pizzas, breadsticks, and Buffalo chicken wings for carry out customers only. Customers phone in the order and come by to pick up their order. When regular customers call MM over phone, they are asked for their phone number. New customers must provide this information before placing orders.

Once the order is taken, the tax, and order total is computed. The order is then printed and submitted to the kitchen where the order is prepared. A receipt is printed and given to the customer. Payment from the customer should be in check or cash only.

Customers may provide coupons. Coupon information (discount applicable and validity period) must be provided when placing the order and the coupon must be submitted when picking up the order.

MM has a set of suppliers who supply the ingredients for their products (pizza & breadsticks) such as flour for pizza crust, cheese, a variety of toppings, chicken wings, spices, as well as other ingredients for the pizza sauce.

MM would like to design a system that would serve the following purposes:

• Facilitate order acceptance and tracking

• Facilitate generation of daily, weekly, and monthly sales summaries

• Facilitate generation of products sold on a daily, weekly, and monthly basis.

• Facilitate tracking promotional sales (the ones with coupons).

• To maintain the inventory of ingredients so that they can identify which supplier to call if they need a particular ingredient and to keep track of the amount of each they have on hand and on order.

• To know the customer preferences in terms of what the customer usually orders. For example when a customer calls in and gives his/her phone number and says "the usual", MM knows exactly what to prepare! MM believes that this will save customers a lot of frustration.

Reference no: EM132125422

Questions Cloud

Economics play role in global procurement decisions : How do politics, philosophy, and economics play a role in global procurement decisions? Please explain.
The advantages and disadvantages of the strategy : what strategy would you implement? What are the advantages and disadvantages of the strategy?
What is the original media format of the primary text : Find a remediation online. This digital text might be a piece of fandom, political commentary, or viral meme that is in public discussion.
Union certification drive on at your highly dangerous : There is a union certification drive on at your highly dangerous and risky job which is at the only major employer in town.
What the customer usually orders : To know the customer preferences in terms of what the customer usually orders. For example when a customer calls in and gives his/her phone number and says.
Performance is suffering opinions-attitudes and values : They are fearful of the next rumour or unsubstantiated piece of information, and their overall performance is suffering Opinions, attitudes and values.
What steps might you take to gain the cooperation : Hypothetically speaking, you are assigned to a committee of three to decide on a dress code for University Staff and Faculty. Only two of the three votes.
The optimal total production quantity per production cycle : The optimal total production quantity per production cycle and the corresponding maximal on-hand stock level.
Growth through strategic partnerships duration : Post each video response separately in the Discussion Board and label each video response with a title such as Video #1, Video #2.

Reviews

Write a Review

Computer Engineering Questions & Answers

  Brief description to the pmis framework

A topic (consisting of a definition, brief description, example, context of usage, mapping [if any] to the PMI's framework [as described in the PMBOK Guide]) on the entries chosen from the AgileBOK.

  Analysis of network

You are a $10 million consulting company responding to the Request for Proposal for a prospective client. The client seeks an analysis of its existing network in the anticipation of a large merger.

  Determine and solve recurrence equation for your algorithm

Determine and solve the recurrence equation for your algorithm. Is the recursive algorithm more efficient than the iterative algorithm?

  Explain three advantages of using siem systems

In your own words: provide and explain 3 advantages and 3 disadvantages of using SIEM systems for security in business environments. Do you consider SIEM systems sufficient for information assurance? Explain why or why not.

  List as many ways as possible to interconnect three computer

List as many ways as possible to interconnect the three computers so that they could operate on one local area network.

  What are the boundary conditions for this system

E19: Numerical Methods for Engineering Applications Spring 2016 - HOMEWORK 12. Based upon the code, what are the boundary conditions for this system? What temperature are we assuming (either implicitly or explicitly) lies along the border of the pl..

  Write a function that will accept structure array of student

Write a function that will accept a structure array of student as defined in this chapter, and calculate the final average of each one, assuming that all exams.

  Prepare a quality management plan using the elements

Prepare a quality management plan using the elements described in the PMBOK 6e (Section 8.1.3.1) for the Suburban Homes Construction Project.

  Question 1the management of your employer wants to find out

question 1the management of your employer wants to find out about desktop virtualisation and how it works. they think

  Describe the tangible and intangible values

Locate a news article in an IT trade magazine about an organization that is implementing a new computer system. Describe the tangible and intangible values that the organization likely will realize from the new system.

  Discuss the hacker group known as anonymous

Discuss the hacker group known as ‘Anonymous' and based on open source research

  Define computer systems and computer programs

What can be defined as a premeditated, politically motivated attack against information, computer systems, computer programs

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd