Describe the kiosk check-out process in brief

Assignment Help Computer Engineering
Reference no: EM132520264

Assignment: The library board wants to investigate self-service kiosks in more detail. They want to be sure that the kiosks will enforce these two rules: (i) a patron may not have more than 10 items checked out at any time, and (ii) patrons may not check out any materials if they owe $5 or more in fines.

1. Write a short (not more than 750 words) narrative that describes the kiosk check-out process.

2. Illustrate the check-out process using your choice of workflow diagram, activity diagram, or flow chart. Explain why you selected that type of diagram.

3. The library's IT department could create its own software for the kiosk or purchase an off-the-shelf system. Prepare a detailed list of the benefits and drawbacks of each option. Recommend one option and explain your reasoning.

4. Identify an ethical, legal, or cultural issue that may arise in connection with these kiosks. Suggest how it could be addressed.

Important Note: The required attached template must be used for this assignment and is not optional. It has been designed so that papers are logically organized and includes prompts for all required information for the assignment. Assignments submitted not using this template will be returned ungraded and must be resubmitted using the template. Late penalties on improperly submitted papers will apply in accordance with the published late policy.

Your document must follow these formatting requirements:

• Follow the Strayer Writing Standards (SWS). The format is different from other Strayer University courses. Please take a moment to review the SWS documentation for details.

• Properly cite all sources.

• Include a cover page containing the title of the assignment, the student's name, the professor's name, the course title, and the date.

• All charts and diagrams must be the student's original work. They must be pasted into the document as neat, legible images.

• The cover page and the reference page do not count towards the assignment's length.

The specific Course Learning Outcomes associated with this assignment are:

• Recommend requirements for a system that enable a productive change in a way the business is conducted.

Reference no: EM132520264

Questions Cloud

Develop an abridged marketing mix with strategies : Develop an abridged Marketing Mix with Strategies for every 'P' for restaurant business and Explain how your marketing mix aligns with your company long-term
Prepare direct materials purchases budget for month of may : Prepare direct materials purchases budget for the month of May. Each ruler requires 0.25 pounds of resin. The cost of resin is $4.40 per pound.
Ethical issues that may arise in information management : Read at least four (4) academically reviewed articles on the ethical issues that may arise in information management (cite them)
Prepare schedule of cost of goods sold and simple job cost : Prepare schedule of cost of goods sold, identifying both normal and adjusted cost of goods sold, for the year ended December 31, 2020.
Describe the kiosk check-out process in brief : Write a short (not more than 750 words) narrative that describes the kiosk check-out process. Illustrate the check-out process using your choice of workflow.
Define osmoregulation : Define osmoregulation, and discuss the excretory system.
Muscular walls of the large arteries : Describe the function of each of the following: (a) the muscular walls of the large arteries, (b) the valves in the veins, and (c) the valves in the heart.
Why are cia factors so important to businesses : In your own words, explain what the following terms mean to you as they apply to information security and safe computing: Confidentiality, Integrity.
How creativity-flexibility and innovation : Provide three examples of how creativity, flexibility, innovation, and leadership intersect to drive organizational success.

Reviews

Write a Review

Computer Engineering Questions & Answers

  Define difference between a shallow copy and a deep copy

Overload the operator += for the class newString to perform the following string concatenation; suppose that s1 is "Hello" and s2 it "there". Then the statement s1 += s2; should assign "Hello there" to s1, where s1 and s2 are newString objects.

  Discuss data acquisition and data examination

Kirk (2016) designed his text to help understand the four steps involved in working with data. Kirk (2016) discusses the following working with data steps.

  What will be formula of digital certificate of the server

Point out what will be the formula of digital certificate of the server N. we denote the public and private keys of server N as K+ ,N KN, and public or private keys of CA are denoted as K+ CA KCA.

  Create a plan for the next iteration

Create a plan for the next iteration, setting out individual tasks and objective completion criteria for the coming week.

  Implement the system using sockets programming

Design and implementation details and a CD having the system source code -  implement the system using sockets programming for message exchange over TCP/IP. You may choose any programming language provided that it provides low-level socket APIs.

  Create a program that reads an exchange rate

Write a program that reads an exchange rate for converting English currency to U.S. currency and after that reads several values in English currency and converts each amount to the equivalent U.S. currency.

  What is the ip address of your workstation

If you have access to the Internet at work, school, or home, what is the IP address of your workstation? Explain your reasoning.

  Identify a case study with an appropriate situation

Identify a case study with an appropriate situation related to penetration testing or hacking for or against a business, organization, or government facility.

  Designing the calculator program

Develop a calculator program which will subtract, add, multiply, or divide two numbers input given by a user. If user selects division, do not permit the user to divide by 0

  Find issues involved in protecting organization information

Discuss the issues involved in protecting all of the organization's information. How might an organization notify its users that all communications.

  Build appropriate functions for these classes

A CollegeCourse class includes fields representing department, course number, credit hours, and tuition. Its child, LabCourse, includes one more field that holds a lab fee charged in addition to the tuition.

  Verilog system

Develop a Verilog system which will accept a block of data words; then check the parity for each data word and for the block.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd