Aussie wine tours awt, Computer Engineering

Assignment Help:

Business Narrative

Aussie Wine Tours (AWT) conduct tours of the wineries of Victoria's Yarra Valley wine region. The tours take place on the last Sunday of each month. Currently there are seven alternative wine tours. The Old Wineries tour, the White Wine tour, the Red Wine tour, the Sparkling Wine tour and so on. Not all tours are offered on each of the Sundays. The schedule depends upon the availability of the wineries, the availability of the tour leaders and the public interest.

Each wine tour event runs for 3-6 hours. Each wine tour event is lead by a single wine expert.

No two events for the same tour can occur on the same day.

AWT have a number of printed wine tour brochures - one for each wine tour on offer. Whenever a brochure is sent AWT records the date that brochure is sent. The person the brochure is sent to is added to the AWT's list of customers and is assigned a customer number. AWT also record the customers name and address. Obviously, not all customers who request a brochure participate in any of the wine tours.

Many customers book places on a wine tour event. Each wine tour event has a price. Wine tour events sometimes include a meal. This obviously increases the price of such an event. AWT record which tour event a customer has booked on and whether payment has been made (customers may not make partial payments). Each customer attending a wine tour event must have a separate booking. E.g. A husband and wife attending a tour event will require two bookings.

AWT have a number of gifts available for participants attending tour events. Generally, three or four gifts are offered to participants of a tour event. The gifts on offer are often decided by the wine expert leading the event. On the day of the event, each participant may choose a maximum of two gifts. AWT records which gifts a participant chooses on a particular tour event. (Note: You are not expected to limit the number of gifts selected by a customer. This would normally be programmatically solved using a Stored Procedure, Trigger, or some other programming technique).


Related Discussions:- Aussie wine tours awt

Why are high-speed memories required, Q. Why are high-speed memories requir...

Q. Why are high-speed memories required? Is the main memory not a high-speed memory? The answer to second question is absolutely 'No' though why so? Then if memories are slowe

Explain the architectural framework for electronic commerce, Explain the Ar...

Explain the Architectural framework for electronic commerce. An application independent framework to categorize service interaction relies on four basic dimensions   1.  Ser

Illustrate what is a centrifugal force, Q. Illustrate what is a Centrifugal...

Q. Illustrate what is a Centrifugal Force? Answer:- Centrifugal force is the force that is equivalent in magnitude but opposite in direction to the centripetal force which

Concept development journal, The Concept Development journal must contain: ...

The Concept Development journal must contain: An introductory paragraph detailing what conclusions you have drawn from your research and how you intend to proceed. This should b

Fundamental components of a microprocessor, Q. Fundamental components of a ...

Q. Fundamental components of a microprocessor? The word 'micro' is used in microphones, microscopes, microwaves, microprocessors, microcomputers, microprogramming, microcodes e

Explain properties of the webservice attribute, Question: (a) (i) Expl...

Question: (a) (i) Explain properties of the WebService attribute. (ii) Discuss three properties of the WebMethod attribute. (b) What are WSDL documents used for? (c)

C++ programming, how does a ohms law c++ programming works

how does a ohms law c++ programming works

Does gimp have scanner support, Yes. It's available on Windows and uses TWA...

Yes. It's available on Windows and uses TWAIN, and on GNU/Linux you constant have a choice among XSane and gnome-scan - both can be used as GIMP plug-ins.

What is link destruction, What is link destruction? Link destruction is...

What is link destruction? Link destruction is inverse of link creation. When a link is destroyed makes sure the associated objects accessible by other handles or intentionally

What is interrupt vector table, Interrupt vector table is always created in...

Interrupt vector table is always created in first 1K area of the memory. Explain why? When CPU receives an interrupt type number from PIC, it uses this number to look up corres

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd