Create a communication diagram for the scenarios

Assignment Help Basic Computer Science
Reference no: EM13653473

Think about the system that handles student admissions at your university. The primary function of the system should be able to track a student from the request for information through the admissions process until the student is either admitted to the school or rejected. 
1. Write a use-case description that can describe an Admit Student use case. Assume that applicants who are children of alumni are handled differently from other applicants. Also, assume that a generic Update Student Information use case is available for your system to use. 
2. Create a use-case diagram that includes all of the above use cases. Assume that an admissions form includes the contents of the form, SAT information, and references. Additional information is captured about children of alumni, such as their parent's graduation year, contact information, and college major.
3. Create a class diagram for the use cases identified with questions 1 and 2. Also, be sure to include the above information. Assume that a temporary student object is used by the system to hold information about people before they send in an admission form. After the form is sent in, these people are considered students.
4. Create sequence diagrams for the scenarios of the above use cases.
5. Create a communication diagram for the scenarios of the above use cases. 
6. Create a behavioral state machine to depict a person as he or she moves through the admission process.
7. Perform a CRUDE analysis to show the interactivity of the objects in the system.  

Reference no: EM13653473

Questions Cloud

Find the fluid velocity : A constriction in a pipe reduces its diameter from 6.3 cm to 2.1cm. where the pipe is wider, the fluid velocity is 8 m/s. find the fluid velocity
State a carbon dioxide fire extinguisher puts out the flame : Wood and oxygen are two reagents required to keep a campfire burning. identify the limiting and excess reagent: a) The fire dwindles over time. b) A carbon dioxide fire extinguisher puts out the flame.
Explain what is the energy of one photon of the light : In addition to continuous radiation, fluorescent lamps emit sharp lines in the visible region from a mercury discharge within the tube. Much of this light has a wavelength of 436 nm. What is the energy (in J) of one photon of this light
Estimate what tension force will break this rod : A 55cm long brass rod has a diameter of 3cm. What compression force will break this rod? What tension force will break this rod
Create a communication diagram for the scenarios : Create a communication diagram for the scenarios
Identify three major cultural artifacts : Discuss what these artifacts say about the cultural values of the time. Do these civilizations and their artifacts still impact modern life?
Find how many revolutions does the flywheel make : A flywheel with a very low friction bearing takes 1.6 h to stopafter the motor power is turned off. How many revolutions does the flywheel make before it stops
Compute the work done if the gas expands : A gas expands in volume from 35.2 mL to 82.7 mL at constant temperature. Calculate the work done (in joules) if the gas expands against a constant pressure of 4.0 atm.
Discuss the advantages and disadvantages of dbmss : Discuss the advantages and disadvantages of DBMSs

Reviews

Write a Review

 

Basic Computer Science Questions & Answers

  Write program to make change for cost of item

Write down a C# program to make change. Enter cost of item which is less than one dollar. Output coins given as change, by using quarters, dimes, nickels, and pennies.

  How can organizations in a global market utilize enterprise

How can organizations in a global market utilize Enterprise Content Management technology to maintain governance and control over content in ensuring regulatory compliance

  How many bits in the instruction are used

How many bits in the instruction are used for the opcode?

  What type of malware attack is this

What type of malware attack is this and what vulnerability is she trying to exploit in order to get her malware code past the network firewalls of these companies?

  Executing edi for competitive advantage

If firm chooses to execute EDI for competitive advantage, how can it assure advantage will last?

  Keeping track of calculations manually

Explain the benefits of using Excel as opposed to keeping track of calculations manually

  System administrator at sls happened to read the details

Suppose a system administrator at SLS happened to read the details of this case. What steps should he or she take to improve the company's information security program?

  Explain how fuzz based systems work

Explain how fuzz based systems work and provide a detailed example of a system that utilises fuzzy logic.

  Research a specific brand name secure usb thumb drive

Research a specific brand name secure USB Thumb drive and list the security advantages. Discuss its specifications. How does it compare with a cloud application of similar functionality? Name two of these services.

  What was business impact of tjx-s data loss on tjx

What was the business impact of TJX's data loss on TJX, consumers and banks and how effectively did TJX deal with these problems?

  Eliminate the transitive dependency in this relation

Vendor is functionally dependent on Compname and Compname is functionally dependent on Prodname. Eliminate the transitive dependency in this relation and form 3NF (third normal form) relations.

  Describe modifications be made to poorly designed website

Discover the site which you feel is poorly designed and describe what modifications must be made using text as a guide.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd