Develop a complete analysis model for phtrs

Assignment Help Basic Computer Science
Reference no: EM131216724

Apply OOD approach discussed in this chapter to the PHTRS system described in Problem 12.13.

Problem 12.13:

The department of public works for a large city has decided to develop a Web-based pothole tracking and repair system (PHTRS).

A description follows:

Citizens can log onto a Web site and report the location and severity of potholes. As potholes are reported they are logged within a "public works department repair system" and are assigned an identifying number, stored by street address, size (on a scale of 1 to 10), location (middle, curb, etc.), district (determined from street address), and repair priority (determined from the size of the pothole). Work order data are associated with each pothole and includes pothole location and size, repair crew identifying number, number of people on crew, equipment assigned, hours applied to repair, hole status (work in progress, repaired, temporary repair, not repaired), amount of filler material used and cost of repair (computed from hours applied, number of people, material and equipment used). Finally, a damage file is created to hold information about reported damage due to the pothole and includes citizen's name, address, phone number, type of damage, dollar amount of damage. PHTRS is an on-line system; all queries are to be made interactively.

Using structured analysis notation, develop a complete analysis model for PHTRS.

Reference no: EM131216724

Questions Cloud

Determine how task management is achieved in that context : Task management for OO systems can be quite complex. Do some research of OOD methods for real-time systems (e.g., [BIH92] or [DOU99]) and determine how task management is achieved in that context.
Determine the small signal differential mode voltage gain : Using a computer simulation, determine the small-signal differential-mode voltage gain and common-mode voltage gain.
Develop object designs for important classes : Apply the OOD approach discussed in this chapter to flesh out the design for the SafeHome system. Define all relevant subsystems and develop object designs for important classes.
Explain the problem in the scenario that you have chosen : Define the problem in the scenario that you have chosen. Analyze the problem in the scenario. Generate options for solving the problem in the scenario. Evaluate the options for solving the problem.
Develop a complete analysis model for phtrs : The department of public works for a large city has decided to develop a Web-based pothole tracking and repair system (PHTRS).
Evaluate the significance of your chosen medium : Evaluate the significance of your chosen medium. Describe how the significance of your medium has changed over time, as well. Has it become more or less significant? What other factors have influenced its significance?
Sketch the bode magnitude plot for the function : Sketch the Bode magnitude plot for the function. - What are the corner frequencies? -  Determine |T (ω)| for ω → 0. -  Determine |T (ω)| for ω → ∞.
Describe reasons a company may establish a captive insurer : Describe the reasons a company may establish a captive insurer? Explain the advantages of using a captive insurer in a risk management program. Provide a real-life example of a large captive (include citation).
Determine transfer function corresponding to the bode plot : Determine the transfer function corresponding to the Bode plot of the magnitude shown in given figure. - What is the actual gain.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Perform round i + 1 of des encryption

Perform round i + 1 of DES encryption, using the result of the previous exercise to fill in Li and Ri , and let Ki+1 be 5af310 7a3fff. Give Ri+1, assuming that we use a simplified S box that reduces each 6-bit chunk to 4 bits by dropping the first..

  Question about flight function

An airline vice president in charge of operations requires to determine whether the current estimates of flight times are accurate. because there is a larger possiblity of variations due to wether and air traffic in the longer flights.

  Differences between data, voice, and video signals

Differences between data, voice, and video signals.  Include a description comparing the differences between a PBX and VoIP.  (200-350 words)

  How would you ensure that the diagnosis is correct

How would you ensure that the diagnosis is correct? If it is correct, explain the steps you would take to ensure a new video card is properly installed.

  Question regarding the maintenance margin

If the stock price falls to $75, what is the margin in my account? If my broker's margin requirement is 40% maintenance margin, when will I receive a margin call?

  Application that prompts for and reads a double value

Write an application that prompts for and reads a double value representing a monetary amount.

  Write application to allow user to enter a list of integer

Control flow: two sum problem. Write an application to allow user to enter a list of integers, ends the input once the user enter 0. Then ask user to enter a target number, which should be an integer too. Then go through the list of integers, find tw..

  Write a method that has the radius of the circle passed

Write a method that has the radius of the circle passed into it. It computes the area, and returns the area to the main method.

  Find a simple nondeterministic finite-state machine

Convert the nondeterministic finite state machine of part (a) to a deterministic finite-state machine by the method of Section 4.2.

  What is grid computing what are the types of grids in grid

What is grid computing? explain. What are the types of grids in grid computing. Australian Grid Computing, Grid Middleware, Nimrod/G, Robustness, Security, Nimrod Portal, Case Studies - GAMESS

  Differentiate between the interaction types

Differentiate between the interaction types and styles that apply to multi-touch screens and applications running on them. Determine the conceptual model that you would use when designing a product for your restaurant.

  Explain d-s access control list gives p full rights

Suppose that d's access control list gives p full (read, write, append, and execute) rights to d. In which ring(s) should p execute for following to occur?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd