Aussie wine tours awt, Computer Engineering

Assignment Help:

Business Narrative

Aussie Wine Tours (AWT) conduct tours of the wineries of Victoria's Yarra Valley wine region. The tours take place on the last Sunday of each month. Currently there are seven alternative wine tours. The Old Wineries tour, the White Wine tour, the Red Wine tour, the Sparkling Wine tour and so on. Not all tours are offered on each of the Sundays. The schedule depends upon the availability of the wineries, the availability of the tour leaders and the public interest.

Each wine tour event runs for 3-6 hours. Each wine tour event is lead by a single wine expert.

No two events for the same tour can occur on the same day.

AWT have a number of printed wine tour brochures - one for each wine tour on offer. Whenever a brochure is sent AWT records the date that brochure is sent. The person the brochure is sent to is added to the AWT's list of customers and is assigned a customer number. AWT also record the customers name and address. Obviously, not all customers who request a brochure participate in any of the wine tours.

Many customers book places on a wine tour event. Each wine tour event has a price. Wine tour events sometimes include a meal. This obviously increases the price of such an event. AWT record which tour event a customer has booked on and whether payment has been made (customers may not make partial payments). Each customer attending a wine tour event must have a separate booking. E.g. A husband and wife attending a tour event will require two bookings.

AWT have a number of gifts available for participants attending tour events. Generally, three or four gifts are offered to participants of a tour event. The gifts on offer are often decided by the wine expert leading the event. On the day of the event, each participant may choose a maximum of two gifts. AWT records which gifts a participant chooses on a particular tour event. (Note: You are not expected to limit the number of gifts selected by a customer. This would normally be programmatically solved using a Stored Procedure, Trigger, or some other programming technique).


Related Discussions:- Aussie wine tours awt

Split bus operation - universal serial bus , Split Bus Operation - universa...

Split Bus Operation - universal serial bus :   USB 2.0 devices utilize a special protocol in the reset time that is called "chirping", to negotiate the high speed mode

Explain logical shift micro-operations, Q. Explain logical shift Micro-oper...

Q. Explain logical shift Micro-operations? In logical shift data entering by serial input to left most or right most flip-flop (which depends on right or left shift operations

What is the mips assembly code, Question: (a) Using an appropriate dia...

Question: (a) Using an appropriate diagram, illustrate the structure of an instruction used for branching purposes and state the purpose of each part. (b) Given the number

What is loadrunner, LoadRunner works by making virtual users who take the p...

LoadRunner works by making virtual users who take the place of real users operating client software, such as sending requests using the HTTP protocol to IIS or Apache web servers.

What is clock gating, What is Clock Gating? Clock gating is one of the...

What is Clock Gating? Clock gating is one of the power-saving methods used on several synchronous circuits with the Pentium four processors. To save power, clock gating consid

Define emulation, Define emulation. Given a computer with a particular ...

Define emulation. Given a computer with a particular instruction set, it is possible to explain additional machine instructions and execute them with extra micro routines. Emul

Explain anonymous FTP, Explain Anonymous FTP. Use of a login password...

Explain Anonymous FTP. Use of a login password and name helps maintain file secure from unauthorized access. Though, sometimes these authorizations can also be inconvenient.

Explain parsing, What is parsing? The target of parsing is to find out...

What is parsing? The target of parsing is to find out the syntactic validity of a source string. A tree is built for use through subsequent phase of compiler, if the string is

Define handshaking, Define Handshaking. Handshaking is a method commonl...

Define Handshaking. Handshaking is a method commonly used to accompany ever data item being transfer with the control signal that show the presence of data in the bus. The unit

Database, what are the Database designs to avoid?

what are the Database designs to avoid?

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd