Customer service officer in the destiny energy call centre

Assignment Help Basic Computer Science
Reference no: EM13936911

Program 2: Customer service logger

The problem Write a program that would be used by a customer service officer (CSO) in the Destiny Energy call centre. When a customer calls they will must either provide an account number or a meter number. The CSO will enter this into a text field. The program should then display all of the information available and relevant for this account, in particular:

• the account number;

• whether it is a domestic or commercial account;

• the name of the customer (for domestic) or the name of the business (for commercial);

• the two line address for the customer; and

• the current billing information for the customer, for each meter and tariff, and the total. All of this information is available in text files as above and another that holds the customer names and addresses, in a file with records like this:  Mr Jarred Bjelke-Newman 234 Desperate Terrace Leafy West Qld 4034. The program should then provide two text fields where the CSO will enter:

• nature of the customers enquiry; and

• a note about how the enquiry was resolved. This information, along with the customer's account number and the current date and time should be appended to a log file, called log.txt. 4.2.2 Deliverables The design document should include:

1. mock-ups (not screen shots) of the window; 2.

a paragraph that describes how the window is used by its intended user; 3. a paragraph that describes the format of the output text file; 4. a UML class design that shows how the classes in your program will relate to each other; 5. a UML class box that details the important attributes and methods in each new class; 6. a textual description of the purpose of each new class, its attributes and methods; and 7. a textual description of your Java implementation, including:

(a) any special instructions on how to compile and run it; and (b) what features are incomplete (if any).

The .java files should be:

1. properly indented and spaced out;

2. have header comments that define the purpose of each file; 3. have comments that describe the purpose of all class members, except standard methods like main; and 4. to facilitate automated testing, the class that contains the main method, must be called Main. 4.3 Program

3: Grid status display 4.3.1 The problem Power is generated at a power station, and distributed to several sub-stations, and then to many local transformers, and then to customers via their meters. The power station is at coordinates (100, 100) in a square grid 500 km by 500 km that covers the area serviced by Destiny Energy. Each substation has a unique identifying name (S1, S2, ...).

Each transformer has a unique identifying name (T1, T2, ...). The file substations.txt contains the names of the sub-stations and their coordinates: S1 203 456 . . . The file transformers.txt contains names of all of the transformers, their coordinates and the name of the sub-station they are connected to. T1 204 457 S1 . . . The file meters.txt contains all of the meter numbers for all accounts and the transformer to which they are connected. 123 456 789 T34 . . . The file outages.txt contains the meter numbers that are presently reported to not be receiving power (blacked out). Write a program that reads these files and provides a graphical display of the present status of the grid. It should display the power station, the substations (labelled with their names), the transformers, and the connections between them. Use colour to indicate their status, either operational, or possibly faulty.

A report that a given meter is blacked out means that the transformer is probably faulty. If there are two or more transformers connected to the same sub-station that are probably faulty then the sub-station is also probably faulty. If two or more sub-stations are probably faulty, then the power station is probably faulty. 4.3.2 Deliverables (4 marks) The design document should include: 1. a mock-up (not a screen shot) of the display window;

2. a textual description of the contents of the window;

3. a UML class design that shows how the classes in your program will relate to each other;

4. a UML class box that details the important attributes and methods in each new class;

5. a textual description of the purpose of each new class, its attributes and methods; and

6. a textual description of your Java implementation, including: (a) any special instructions on how to compile and run it; and (b) what features are incomplete (if any).

The .java files should be:

1. properly indented and spaced out; 4

2. have header comments that define the purpose of each file;

3. have comments that describe the purpose of all class members, except standard methods like main; and

4. to facilitate automated testing, the class that contains the main method, must be called Main.

Reference no: EM13936911

Questions Cloud

What variance investigation decisions would be made : Using the ± 2σ rule, what variance investigation decisions would be made? Present SQC charts for round-trip fuel usage for each of the three 747s in October. What inferences can you draw from them?
Create program definition with the templates and methods : This program will store in miniVector v a list of 15 random integers from 0 to 99, then it will output the vector, sort the vector, then output it again sorted.
Objective and subjective comprehension play in under armour : What role does objective and subjective comprehension play in Under Armour's ability to market its products by sponsoring up-and-coming athletes?
Find the dna sequence for the open-reading frame : show the cDNA sequence and corresponding primer sequence for both the upstream and downstream primers. be very clear about any base changes in the primer that are needed to create the restriction site and or maintain the correct reading frame.
Customer service officer in the destiny energy call centre : The problem Write a program that would be used by a customer service officer (CSO) in the Destiny Energy call centre. When a customer calls they will must either provide an account number or a meter number. The CSO will enter this into a text fiel..
Financial statement : Prepare a financial statement for 2014 had
Human resource management teams : What exactly is a Human Resource project being done today by human resource management teams? Can you give a few examples?
Analyze the elasticity of demand for products : Examine the procedure Herb will use to estimate the demand model developed in the scenario. Analyze the elasticity of demand for products within the selected industry relevant to Katrina's Candies
The hrm professional : How might you respond to a supervisor who did not coach two members of his team and whose interactions with each other were hostile and escalated into a physical altercation on the customer's premises?

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Report on content management services

Choose one Drupal site and one Joomla site (an alternative CMS package) from the lists below and evaluate them according to how well you think they manage and present their content.

  What is the difference between a hacker and a cracker

Should employees have the right to the expectation of privacy while using an employer's computer workstation? Why or why not? How far should an employer be able to take their investigation of off-work but online habits of employees? Should off..

  Hash function uniformly distributes n keys over the tables

If a hash table contains tablesize positions and n records currently occupy the table, the load factor lf is defined as n/tablesize. Suppose a hash function uniformly distributes n keys over the tablesize positions of the table and lf is the load fac..

  Design a program, in python,

Design a program, in python, that allows the user to enter 20 names into a string array. Sort the array in ascending (alphabetical) order and displays its contents.

  What is the q complexity of the sum

What is the Q complexity of the sum? Please give a detailed answer so that I may learn from it. Thank you!

  Create any required pointers needed to complete insertion

Assume that the list pointed to by startPtr is maintained in alphabetical order. (Note: you do not know what is in the list, only that it is maintained in alphabetical order.)

  What are the dangers of not cross checking between the model

What are the dangers of not cross checking between the models?

  Left for the address part of the instruction

a. How many bits are needed for the opcode? b. How many bits are left for the address part of the instruction? c. What is the maximum allowable size for memory?

  Two-way set associative with 32 kb capacity and 64 byte

1. Assume a two-way set associative with 32 KB capacity and 64 bytes blocks. a. How many bits are needed to represent the index size?

  Access and its limitations in distributed business model

describe the difference of the two terms and how they work together. Your post should include the following details: A description of Access and its limitations in a distributed business model.

  Techniques on business computing center

Imagine that you are the manager of a small business computing center. List at least three techniques that you would use to convince a busy, reluctant night operator to perform regular backups. Explain the best and worst possible technique to assu..

  8-bit two''s complement numbers

Give the 8-bit two's complement representations of the following integers: 55, 83, -79, -88.Give the integer (in standard base-10 notation) which is represented by each of the following 8-bit two's complement numbers: 10000000, 11110011, 11111111.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd