Convince your local public library to offer self-serve kiosk

Assignment Help Basic Computer Science
Reference no: EM132397455

Convince your local public library to offer self-serve kiosks so patrons can check their materials in and out.

Write a proposal of not more than 650 words that evaluates the operational, technical, and economic feasibility of these kiosks.

Draw use-case diagrams that illustrate how a patron would interact with the kiosk. These diagrams should illustrate all of the interactions in enough detail to derive functional requirements for the kiosk.

Assume that all materials and library cards carry a unique bar code.

The patron should have the option to receive a receipt for items checked in or out.

Write sample instructions on how to use the kiosk. The library intends to post these instructions on a sign next to the kiosk, so they must be short (not more than 350 words), clear, complete, and well organized.

Your document must follow these formatting requirements:

Follow the Strayer Writing Standards (SWS). The format is different than other Strayer University courses. Please take a moment to review the SWS documentation for details.

Properly cite all sources.

Include a cover page containing the title of the assignment, the student's name, the professor's name, the course title, and the date.

All charts and diagrams must be the student's original work. They must be pasted into the document as neat, legible images.

The cover page and the reference page do not count toward the assignment's length.

The specific course learning outcome associated with this assignment is as follows:

Outline a plan for the operational, technical, and economic feasibility of an information technology-based solution.

Reference no: EM132397455

Questions Cloud

Intellectual property still exists in the age of internet : Intellectual property still exists in the age of the Internet and is still protected under the law.
Company privacy policy : You are asked to locate any company privacy policy. Some of the more popular ones might include GOOGLE, APPLE, or MICROSOFT,
What steps could be taken to stop security violations : What type of security policies that are in place in your organization, and what steps could be taken to stop security Violations?
Importance of stakeholder engagement in policy making : Discussed the importance of stakeholder engagement in policy making. what measures would you take to engage stakeholders in that project?
Convince your local public library to offer self-serve kiosk : Convince your local public library to offer self-serve kiosks so patrons can check their materials in and out.
Share with your peers database system : Share with your peers a database system that you have encountered over the past two weeks.
Comprehensive policy for managing pedestrian traffic flow : If you were leading a project to develop a comprehensive policy for managing pedestrian traffic flow in a popular downtown metropolitan district,
Vulnerabilities associated with retina scanning method : Explain the benefits and the vulnerabilities associated with Retina scanning method in 3-4 paragraphs.
SCLT 6318 Supply Chain Strategies - Assignment Problem : SCLT 6318 - Supply Chain Strategies Assignment Help and Solutions, University of Houston USA-How can Ned Stark quantify the retailer's Bullwhip effect?

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Identifies the cost of computer

identifies the cost of computer components to configure a computer system (including all peripheral devices where needed) for use in one of the following four situations:

  Input devices

Compare how the gestures data is generated and represented for interpretation in each of the following input devices. In your comparison, consider the data formats (radio waves, electrical signal, sound, etc.), device drivers, operating systems suppo..

  Cores on computer systems

Assignment : Cores on Computer Systems:  Differentiate between multiprocessor systems and many-core systems in terms of power efficiency, cost benefit analysis, instructions processing efficiency, and packaging form factors.

  Prepare an annual budget in an excel spreadsheet

Prepare working solutions in Excel that will manage the annual budget

  Write a research paper in relation to a software design

Research paper in relation to a Software Design related topic

  Describe the forest, domain, ou, and trust configuration

Describe the forest, domain, OU, and trust configuration for Bluesky. Include a chart or diagram of the current configuration. Currently Bluesky has a single domain and default OU structure.

  Construct a truth table for the boolean expression

Construct a truth table for the Boolean expressions ABC + A'B'C' ABC + AB'C' + A'B'C' A(BC' + B'C)

  Evaluate the cost of materials

Evaluate the cost of materials

  The marie simulator

Depending on how comfortable you are with using the MARIE simulator after reading

  What is the main advantage of using master pages

What is the main advantage of using master pages. Explain the purpose and advantage of using styles.

  Describe the three fundamental models of distributed systems

Explain the two approaches to packet delivery by the network layer in Distributed Systems. Describe the three fundamental models of Distributed Systems

  Distinguish between caching and buffering

Distinguish between caching and buffering The failure model defines the ways in which failure may occur in order to provide an understanding of the effects of failure. Give one type of failure with a brief description of the failure

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd