subject: system analysis (2000 word), Operating System

Assignment Help:
Overview:
In this assignment, you are going to perform a system analysis and design of a membership and
facility management system of a gymnasium of given case study
Task:
You are to perform an analysis and design of a “membership and facility management” system. You are required to submit:
i) Discuss the six core processes of the SDLC required to develop the membership and facility management system (Marks 6*5=30)
ii) A Class Diagram for the entire membership and facility management system, showing: (Marks 30)
• Attributes
• Custom methods
• Various relationships
• Association names
• Multiplicities
• Association Classes (if any)
iii) A use case diagram which models the actors and the use cases of the Manager schedules staff roster (Marks 15)
iv) A use case diagram which models the actors and the use cases of the Member registers for class (just before the commencement of a class) (Marks 15)
v) Develop PERT/CPM chart explaining the early and late start for each task. Identify the critical path and the total time to finish the project (Marks 10)Whenever you make assumptions, please state these clearly.
You will be marked on various aspects, including among other things:
• Completeness of analysis (thoroughness)
• Correctness of analysis – i.e. how much the analysis represents the described
system.
• Use of notation – whether you correctly used the UML notations.
• Appropriate use of generalization/specialization (in class diagram)
• Appropriate use of aggregation/composition (in class diagram)
• Clearness of diagrams

Related Discussions:- subject: system analysis (2000 word)

Execution without entering a deadlock state, Q. Presume that a system is in...

Q. Presume that a system is in an unsafe state. Illustrate that it is possible for the processes to complete their execution without entering a deadlock state. Answer: An unsaf

Model, list trhe various classification of model and types?

list trhe various classification of model and types?

What methods are used to monitor intrusion detection, Question : a) Wh...

Question : a) What do you understand by a Directory Structure? Support your answer with a diagram. b) Give an example how Access Lists and Groups are arranged to mode of

Comparing, Compare 2 different operating systems.

Compare 2 different operating systems.

CPU, TURNAROUND TIME

TURNAROUND TIME

Explanation of modern cpu architectures, Your CTO liked your proposal from ...

Your CTO liked your proposal from Unit 2 so much he only trusts you to explain complex concepts to his managers. He now wants you to write him a four page paper explaining the CPU,

What do you understand by “line balancing”? What happens if , What do you u...

What do you understand by “line balancing”? What happens if balance doesn’t exist?

Explain the features that bash shell provides, LINUX OPERATING SYSTEM 1...

LINUX OPERATING SYSTEM 1. Write a brief explanation about the Linux distribution. 2. Explain the features that Bash shell provides? 3. Who is responsible for managing use

Blocking locks, We have talked about blocking locks, which voluntarily yiel...

We have talked about blocking locks, which voluntarily yield, and spinlocks, which just spin until they acquire the lock. At ?rst, it seems like spinlocks are verywasteful, and tha

Define how to manage the interaction of client and server, Managing the int...

Managing the interaction of client and server  Among the differences between traditional application programs and client server ones is that developers must create a mechanism

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd