Describe how your architecture could be implemented

Assignment Help Basic Computer Science
Reference no: EM13804957

Read the case study titled "A Patient Infonnation System for Mental Health Care". Develop an overall architecture for the system described in the assigned reading. Your architecture should be based on anyone of the common architectural patterns (e.g., Pipe and Filter architecture pattern). Your architecture should be documented in text and in UML diagrams (at minimum a class diagram and a sequence diagram).

Write a two to four (2-4) page paper in which you:

1. Describe your chosen architecture pattern.

2. Explain why you selected the architecture of this case study.

3. Explain how your chosen pattern could be applied to this case study.

4. Describe any shortcomings associated with your chosen architecture pattern for the case study.

5. Describe how your architecture could be implemented in hardware and software.

6. Develop a UML diagram to document the architecture of the system through the use of Microsoft Visio or its open source alternative, Dia. Note: The graphically depicted solution is not included in the required page length.

Reference no: EM13804957

Questions Cloud

Does cop catch up with them before they cross the state line : Does the cop catch up with them before they cross the state line - elements of the problem solving path.
Describe about conservatism and liberalism : Compare these with what you have learned about conservatism and liberalism. What conservative ideas do you find expressed in the article
Discuss specific characters in specific works : Discuss specific characters in specific works and provide and discuss quotations from both Dante and at least two later works.
Would financial leverage have increased, decreased or rema : The recent Great Recession of 2008-2009 has had significant impact on a wide range of corporate performance. What impact would you predict it had on leverage?  Would financial leverage have increased, decreased, or remained the same? What about opera..
Describe how your architecture could be implemented : Read the case study titled "A Patient Infonnation System for Mental Health Care", Describe any shortcomings associated with your chosen architecture pattern for the case study. Describe how your architecture could be implemented in hardware and softw..
Write an essay about the given topic : Write an essay about "borders and obstacles should be used as an opportunity to change your life to make it better".
Water supply in developing world : WATER SUPPLY IN DEVELOPING WORLD
What do you think is the relationship between a firms opera : What do you think is the relationship between a firm's operating leverage and its financial leverage? Do you think the two measures are positively correlated, negatively correlated, or unrelated? Explain your answer.
Write an essay about the benefits of taking online courses : Write an essay about The benefits or drawbacks of taking online college courses.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Regular expression and regular sets that is not solvable

Give an example of a problem about FSAs, Regular Expression and Regular Sets that is not solvable?

  Why computer literacy has become fourth fundamental skill

Explain whether today, computer literacy (knowledge of how to properly use computer and its software applications) has become fourth basic skill.

  Is problem solving easier and more effective in solving

Is problem solving easier and more effective in solving business problems without information systems or with? (justify your position)

  Write a declaration for an enumerated data type

A pet store sells dogs, cats, birds, and hamsters. Write a declaration for an enumerated data type that can represent the types of pets the store sells.

  Write an isr in c to add the signed value on port t (ptt)

Write an ISR, in C, to add the signed value on PORT T (PTT) to the byte value stored in location data1.

  Enhanced home utility auditing program

The user should be able to do the following:Enter the cost per kilowatt-hour. Select from a list of home appliances which includes a > or >, among other appliances

  Steps to follow to get evidence in investigating files

Drive that you are investigating comprises several password-protected files and other files with headers which do not match extension. What procedures would you require to follow to retrieve evidence?

  Create three integer variables and initialize them

Create three integer variables and initialize them to whichever value you'd like. ? Create three functions: ? A function that accepts two integers as parameters and subtracts the second from the first.

  Using a unified modeling language class diagram

Consider the properties or attributes and methods that are related to your product. Using a Unified Modeling Language (UML) class diagram, describe these properties and methods.

  . write down each interaction with smartphone

Consider your smartphone as a system and use its calendar to set a calendar event with a reminder for your birthday. Write down each interaction between you and your smartphone as a scenario. Record all the interactions, including any feedback the sm..

  Create function that accepts one input parameter

Using Pseudocode, create your own function that accepts one input parameter and returns a float number. You decide the theme.

  Network security & how do they work together

1. In reference to firewalls, proxies, Intrusion Prevention Systems and Intrusion Detection Systems. Why are they important for network security & how do they work together?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd