Write a valid schema for the container, Software Engineering

Assignment Help:

A storage tank has a container to keep a certain amount of fuel and it also has an indicator to inform about the level of fuel inside the container.

The container cannot exceed the maximum capacity of the tank and the indicator is represented by a light with states on and off. Also the indicator reads the level of fuel inside the tank and it signals when the level has reached the maximum by switching to state 'off', that is it is on during the fill operation. Assume the maximum capacity of the tank to be 5000 and the indicator to signal a danger level when capacity of the tank reaches 50.

(a) Write a valid schema for the container.

(b) Write a valid schema for the indicator.

(c) Write a schema for the storage tank by combining both of the above schemas.

(d) Write a schema for the fill operation.

(e) Write a schema to represent the state when the tank is overfilled.


Related Discussions:- Write a valid schema for the container

Use cases, 1. Perform a requirements analysis for the Case Study. Express t...

1. Perform a requirements analysis for the Case Study. Express the results using the following artefacts:     a. A use case diagram for the functional requirements of the entire

Explain steps in building the structure chart, Q. Explain Steps in Building...

Q. Explain Steps in Building the Structure Chart? Steps in Building the Structure Chart 1. Identify top level modules as well as decompose them into lower levels 2. Add

What is a test configuration manager, Test Configuration Managers handles t...

Test Configuration Managers handles test environments, scripts, software and test data. Depending on the project, single person may wear more than single hat. For example, Test Eng

What are the benefits of smoke testing, What are the benefits of smoke test...

What are the benefits of smoke testing? Integration risk is minimized. The quality of the end-product is improved. Error diagnosis and correction are simplified. Asses

What are the three activities of risk assessment, What are the three activi...

What are the three activities of risk assessment? Ans: The three activities are analyzing, identifying and giving priorities. Risks are able to be identified by a check list

Determine the repeatable level of maturity model, Level 2 (Repeatable) ...

Level 2 (Repeatable) Organisation satisfies all the requirements of level-1. At this stage, basic project management policies and associated procedures are established. Insti

Explain about subroutines, Subroutines  Frequently, the similar piece ...

Subroutines  Frequently, the similar piece of code must write over again in many dissimilar parts of a program.  Instead of repeating the code every time it is required, there

Important issues related to srs, Q. Important issues related to SRS? (a...

Q. Important issues related to SRS? (a) System goals as well as requirements are different- Goal is a more general characteristics. For example Whole system must be designed in

Explain verification, The process of evaluating the products of a given sof...

The process of evaluating the products of a given software development activity to verify correctness and consistency with respect to the products and standards given as input to t

What are the main approaches in debugging, What are the common approaches i...

What are the common approaches in debugging? Brute force method: The memory dumps and run-time tracks are checked and program with write statements is loaded to get clues to er

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd