Use-case matrix for the major processes of the system

Assignment Help Basic Computer Science
Reference no: EM13952782

Below is a Use-Case Matrix for the major processes of the system. To keep this simple, all "maintenance" events, such as adding new salespeople, tasks, and technicians have been ignored.

Actor

Event (or Use-Case)

Trigger

Responses

Sales

Add author

Contact comes in by phone, direct mail response, etc.

Create Author in database

Generate author mailing labels

Sales

Update call information

Sales calls

Recall Lists

Sales

Sell a promotion option

Sales calls

Create new Promotion Sale in database

Production

Add book to the production process

Manuscript comes in from author

Create Book in database

Production

Update book information

Completed promotions and ISBN registrations

Update Book information

(time)

Monitor status of book production

Daily

Generate Book Status Reports

Book "Shepherd"

Make new assignment

Decision by Book "Shepherd"

Update Task Work information in database

Send e-mail to technician

Technician

Complete assignment

Does work

Update Task Work information in database

Management

Monitor sales performance

Upon Request

Generate Sales Performance Report

(time)

Import sales from

e-commerce sites

Quarterly

Import and calculate sales information from e-commerce sites

Generate Royalty Report

(time)

Export production information

Daily

Update Author web site database

199_d1.png

Example Simple Event Diagram

Example Temporal Event Diagram

 

2257_d3.png

1264_d2.png

 

Example More Complex Event Diagram

Reference no: EM13952782

Questions Cloud

How do group dynamics impact today workplace : How do group dynamics impact today's workplace? Does corporate culture and leadership come into play? How so? Discuss
How would you make your populace obey and conform : Stanley Milgram's classic experiment of obedience focuses on social control and social conformity. Review Milgram's experiment. If you were King or Queen of your kingdom, what behaviors would you classify as deviant? How would you make your popula..
Find the irr promised by the new van : What would be the total annual cash inflows associated with the new van for capital budgeting purposes? Find the IRR promised by the new van, rounded to one decimal place.
Why do societies stratify : What are some ways in which our American culture stratifies people? See how long of a list you can come up with. Why do societies stratify
Use-case matrix for the major processes of the system : Below is a Use-Case Matrix for the major processes of the system. To keep this simple, all "maintenance" events, such as adding new salespeople, tasks, and technicians have been ignored.
Derive the second-best optimum : If there are two types of customer show that the single-crossing condition is satisfied and establish the conditions for a full-information solution.
Prepare a classified balance sheet in account form : Prepare a classified balance sheet in account form - At the bottom of the balance sheet you prepare - what does the completed balance sheet say about the financial health of Cool Beans Company?
What are some longer-term consequences of roths behaviour : What are some longer-term consequences of Roth's behaviour for Road Gear? What steps could senior management at Road Gear take to reduce the type of behaviour exhibited by Roth?
What global forces are affecting the us economy : What global forces are affecting the U.S. economy and politics? How do those global forces affect your own life? Discuss

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Why is identification of risks

Why is identification of risks, through a listing of assets and their vulnerabilities, so important to the risk management process?

  How might a cio with a larger budget have an advantage

How might a CIO with a larger budget have an advantage over Sadiq Rowther at J&J Philippines?

  Research redundant storage

Research Redundant Storage You've been hired by a company that wants to expand and improve storage on their servers. They would like to implement some form of RAID, but are unclear what the different options provide.

  Create a bourne shell script

you need to package your commands in a script so that the patching team can run them on the production environment - Create the directory structure and create the files as defined in the previous Individual Project.

  Whats the difference between mongodb collection and a table

What's the difference between MongoDB collection and a table in a relational database. Show the differences as it pertains to create a collection and also displaying the data.

  Review and discuss methods for it managers to maintain

Review and discuss methods for IT managers to maintain their skills while gaining new managerial skills

  System capabilities for the company

Please include title page and reference page with references. This term paper needs to be in APA style. Include page numbers at the top right corner of each page.  The title page includes: title, name, date, course title, and professor's name. Also, ..

  The total last year sales converted in mexican pesos

Using nested queries (correlated query) to display the total Last Year Sales converted in Mexican pesos that occurred in July 1, 2005. Only nested/correlated queries will be accepted. Round the result set to two decimal places Unit10_ConvertedCommiss..

  Specification and representation information for a data type

Compare Ada with both C++ and Java in this regard. Take and defend a position as to whether requiring separation of the specification and representation information for a data type is a good language design decision.

  Five pseudo random number generators

Evaluate the five pseudo random number generators (RNGs) supplied with respect to the quality of the generated random sequence. High quality random number generators are fundamental in ensuring reliable simulations.

  Use the heuristic evaluation method

For this coursework you must provide an Expert Appraisal of the Just Eat's takeway interface (web or mobile app) (http://just-eat.co.uk) in a web browser or phone of your choice.

  Is security mechanisms and practices

Organizations around the world often assess their IS security mechanisms and practices by using the Trusted Computer System Evaluation Criteria (TCSEC) or Information Technology Security Evaluation Criteria (ITSEC). The two standards are similar, tho..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd