Aussie wine tours awt, Computer Engineering

Assignment Help:

Business Narrative

Aussie Wine Tours (AWT) conduct tours of the wineries of Victoria's Yarra Valley wine region. The tours take place on the last Sunday of each month. Currently there are seven alternative wine tours. The Old Wineries tour, the White Wine tour, the Red Wine tour, the Sparkling Wine tour and so on. Not all tours are offered on each of the Sundays. The schedule depends upon the availability of the wineries, the availability of the tour leaders and the public interest.

Each wine tour event runs for 3-6 hours. Each wine tour event is lead by a single wine expert.

No two events for the same tour can occur on the same day.

AWT have a number of printed wine tour brochures - one for each wine tour on offer. Whenever a brochure is sent AWT records the date that brochure is sent. The person the brochure is sent to is added to the AWT's list of customers and is assigned a customer number. AWT also record the customers name and address. Obviously, not all customers who request a brochure participate in any of the wine tours.

Many customers book places on a wine tour event. Each wine tour event has a price. Wine tour events sometimes include a meal. This obviously increases the price of such an event. AWT record which tour event a customer has booked on and whether payment has been made (customers may not make partial payments). Each customer attending a wine tour event must have a separate booking. E.g. A husband and wife attending a tour event will require two bookings.

AWT have a number of gifts available for participants attending tour events. Generally, three or four gifts are offered to participants of a tour event. The gifts on offer are often decided by the wine expert leading the event. On the day of the event, each participant may choose a maximum of two gifts. AWT records which gifts a participant chooses on a particular tour event. (Note: You are not expected to limit the number of gifts selected by a customer. This would normally be programmatically solved using a Stored Procedure, Trigger, or some other programming technique).


Related Discussions:- Aussie wine tours awt

Cell array variable , a)   Make a cell array variable that would kept for a...

a)   Make a cell array variable that would kept for a student his or her name, university id number, and GPA.  Print this information. b) Make a structure variable that would kept

Determine the basic machine language instructions, Determine the basic Mach...

Determine the basic Machine language instructions Machine language instructions and data are in terms of 0s and 1s and are stored in the memory. It isn't possible to distinguis

Show basic types of transmission technologies, Q. What are the basic types ...

Q. What are the basic types of Transmission technologies, basis on which computer networks will be categorized? Ans: Broadly there are two kinds of transmission technology:

The long and short date option , In MS Access, the long and short date opti...

In MS Access, the long and short date option does not show 4 digit years. How do I achieve the mm/dd/yyyy format? Ans) In the date field properties of the table, form, or prop

JSP, What is java server pages

What is java server pages

Symbol for the new euro currency in my spreadsheet, How can I go in the sym...

How can I go in the symbol for the new Euro currency in my spreadsheet? Ans) Microsoft suggestted a new Tahoma font with the Euro symbol.

Classify computer systems according to capacity, Classify computer systems ...

Classify computer systems according to capacity. How they are different from computers according to the classification of technology. Provide comparative study also

How to use messages in lists, How to use messages in lists? ABAP/4  pe...

How to use messages in lists? ABAP/4  permits you to react to incorrect or doubtful user input by displaying messages that influence the program flow depending on how serious

Explain the use of ssl to secure the network, Explain the use of SSL to sec...

Explain the use of SSL to secure the network.  SSL (Secure Sockets Layer) is a protocol developed by Netscape for transferring private documents by the Internet. SSL works by u

What are the values of the slack or surplus variables, Consider the followi...

Consider the following linear programming problem: Minimize:        70M + 40N Subject to:           3M + 7N ≥ 233                             10M + 2N ≥ 254

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd