Illustrate the use case using visio or a similar product

Assignment Help Management Information Sys
Reference no: EM132191469

Assignment : Use Cases

As an intern software developer for a retail bank, you have been tasked with developing use cases to support the ATM service.

Prepare a 5-6 page paper in which you:

Describe (in a one to two (1-2) page narrative) a use case, complete with typical and alternate courses, that documents the event of a bank customer withdrawing money from an ATM.

Illustrate the use case using Visio or a similar product.

Describe (in a one to two (1-2) page narrative) a use case dependency for making an account deposit. Illustrate this use case with Visio or a similar product.

Describe (in a one to two (1-2) page narrative) a use case dependency for making an account transfer. Illustrate this use case with Visio or a similar product.

Identify and explain at least one (1) ethical issue that the use case exposes in connection with the development or use of the ATM system.

Research and cite at least three (3) authoritative academic sources.

Your assignment must:

This course requires use of Strayer Writing Standards (SWS). The format is different than other Strayer University courses. Please take a moment to review the SWS documentation for details.

Include a cover page containing the title of the assignment, the student's name, the professor's name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

Include charts or diagrams created in Excel, Visio, MS Project, or one of their equivalents such as Open Project, Dia, and OpenOffice. The completed diagrams/charts must be imported into the Word document before the paper is submitted.

The specific Course Learning Outcomes associated with this assignment are:

Summarize the various requirements modeling techniques.

Create a use case based on relating functional requirements.

Analyze and articulate ethical, cultural, and legal issues and their feasibilities among alternative solutions.

Use contemporary CASE tools in process and data modeling.

Use technology and information resources to research issues in systems analysis and development.

Write clearly and concisely about Systems Analysis and Development topics using proper writing mechanics and technical style conventions.

Reference no: EM132191469

Questions Cloud

What is the probability of obtaining all heads : What is the probability of obtaining all heads? Explain your reasoning or show your calculations.
How does multitasking confuse the resource availability : "In modern organizations, it is impossible to eliminate multitasking for the average ­employee." Do you agree or disagree with this statement? Why?
Economic system attempts to allocate resources effectively : Analyze at least three specific thought leadership strategies. Explain how each economic system attempts to allocate resources effectively.
Define and discuss corporate social responsibility : Define and discuss corporate social responsibility. Consider Milton Friedman's approach to this theory.
Illustrate the use case using visio or a similar product : Describe a use case, complete with typical and alternate courses, that documents the event of a bank customer withdrawing money from an ATM.
Capture a spam email message : Showing the Email itself is not sufficient. You need to show the header information embedded in the message metadata.
Pricing strategies are part of product and service research : Environmental analysis requires researching the competitors in the marketplace. Pricing Strategies are part of product and service research.
What type of presentation do you have in mind : Respond to the following scenario with your thoughts, ideas, and comments. Be substantive and clear, and use research to reinforce your ideas.
Consider the list of common roles for team members : Consider the list of common roles for team members which of these roles do you think you play in your own team or group? Why?

Reviews

Write a Review

Management Information Sys Questions & Answers

  How does a syn attack deny service

If you use a packet driver, Wireshark can both capture packets and read trace files of packets that have already been captured. However, the packet driver must access parts of your operating system that some students may not have access to. That i..

  As a group identify the three key aspects of a team

As a group, identify the three (3) key aspects of a team. What are their characteristics? As a group, which of the teams do you mostly identify with and why?

  Analysing hostile code

Computer Forensics - Analysing hostile code - To deeply understand it, you may also try to figure out why it uses which resources. Write a report on your findings and submit it by the end of this week in the assignment folder.

  Plan to properly document and report the incident

The person who discovers the incident will report it to someone who has access to this list. In turn, that person shall follow the instructions in this plan to properly document and report the incident. We anticipate the following initial contact poi..

  How public-private partnerships can strengthen cybersecurity

CIS402 : Suggest at least four (4) best practices that should be implemented when developing a cybersecurity strategy within a security enterprise.

  Determine the benefit and total cost of ownership

When analyzing cost/benefit and total cost of ownership (TCO), should systems analysts concentrate most on payback analysis, net present value.

  Create a physical database design

IT 650: Devise a conceptual model that will best address the case study scenario you selected for the final project.

  Provide all requirements necessary for securing application

Provide all requirements necessary for securing the application software. Explain and give proper reasoning for each step to secure the application software.

  Idnetify the security management goal

Identify and talk about at least one security management goal, then explain a difficulty in meeting that goal.

  Create a new network using packet tracker file

For this part of the course project, you will create a new network using Packet Tracker file with all locations wired and working with a firewall.

  Identify possible network infrastructure vulnerabilities

With the parameters set forth at the onset of the project, present the infrastructure and security policy that will support the expected development and growth of the organization. The network solution that is chosen should support the conceived i..

  Why any proposed process change requires cost estimating

Assess business continuity planning (BCP) as a process that adds business value. Explain the correlation between business value and project cost estimation as they relate to BCP. List and support three business justifications for business value o..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd