subject: system analysis (2000 word), Operating System

Assignment Help:
Overview:
In this assignment, you are going to perform a system analysis and design of a membership and
facility management system of a gymnasium of given case study
Task:
You are to perform an analysis and design of a “membership and facility management” system. You are required to submit:
i) Discuss the six core processes of the SDLC required to develop the membership and facility management system (Marks 6*5=30)
ii) A Class Diagram for the entire membership and facility management system, showing: (Marks 30)
• Attributes
• Custom methods
• Various relationships
• Association names
• Multiplicities
• Association Classes (if any)
iii) A use case diagram which models the actors and the use cases of the Manager schedules staff roster (Marks 15)
iv) A use case diagram which models the actors and the use cases of the Member registers for class (just before the commencement of a class) (Marks 15)
v) Develop PERT/CPM chart explaining the early and late start for each task. Identify the critical path and the total time to finish the project (Marks 10)Whenever you make assumptions, please state these clearly.
You will be marked on various aspects, including among other things:
• Completeness of analysis (thoroughness)
• Correctness of analysis – i.e. how much the analysis represents the described
system.
• Use of notation – whether you correctly used the UML notations.
• Appropriate use of generalization/specialization (in class diagram)
• Appropriate use of aggregation/composition (in class diagram)
• Clearness of diagrams

Related Discussions:- subject: system analysis (2000 word)

Several cpu-scheduling algorithms, Q. Several CPU-scheduling algorithms are...

Q. Several CPU-scheduling algorithms are parameterized for instance the RR algorithm requires a parameter to indicate the time slice. Multilevel response queues require parameters

PSEUDO CODE FOR PROGRAM, THE PROGRAM WILL CHOOSE TWO RANDOM NUMBERS,THEN PR...

THE PROGRAM WILL CHOOSE TWO RANDOM NUMBERS,THEN PRINT THEM OUT AS AN ADDITION PROBLEM.THE PROGRAM WILL THEN ASK THE USERTO ENTER THE CORRECT ANSWER.IF THE ANSWER IS CORRECT,THE PRO

What methods are used to monitor intrusion detection, Question : a) Wh...

Question : a) What do you understand by a Directory Structure? Support your answer with a diagram. b) Give an example how Access Lists and Groups are arranged to mode of

What are the advantages of contiguous allocation, What are the advantages o...

What are the advantages of Contiguous allocation? The advantages are a. Supports direct access b. Supports sequential access c. Number of disk seeks is minimal.

Use of the computing hardware, Q. We have stressed the require for an oper...

Q. We have stressed the require for an operating system to make efficient use of the computing hardware. When is it suitable for the operating system to forsake this principle and

Conversion of binary to hex, Take the binary number and divide it into grou...

Take the binary number and divide it into groups of 4 bits starting from the right hand side , if no group of 4 exists fill out leading 0's, then convert each group of 4 to a hex n

Ipc, Explain in detail about ipc in linux

Explain in detail about ipc in linux

Linux os, Introduction of linux

Introduction of linux

Explain a working of file control block, Explain a working of file control ...

Explain a working of file control block A file control block (FCB) has information about the file, containing ownership, permission, and location of the file contents. The log

Assignment, i need the job to be done within 3 days

i need the job to be done within 3 days

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd