Electronic download for registered students.

Assignment Help Basic Computer Science
Reference no: EM13952280

Electronic download for registered students.

1. Student visit library website.
2. Student search for downloadable resources.
3. Student input his student ID no. and date of birth.
4. Students submit information to library attendant system.
5. Library attendant request student to enter access code.
6. Library attendant forward the information to student database for processing.
7. Student database identify student Account with his Student ID and date of Birth.
8. Student database send access code to students emails on file and store a copy.
9. Students receive access code by email.
10. Student input the access code and submit to library attendant.
11. Library attendant forward the access code to student database for authentication.
12. Student database match the access code submitted with the stored copy and approved student access to download if access code is correct

Alternative: at step 12 Student database match the access code submitted with the stored copy and decline student access to download if access code is wrong.

Actors:

1. Student
2. Library Attendant System
3. Student Database System.

Question:

1. Draw the Use case Draw Class Diagram
2. Draw Sequence diagram
3. Draw Collaboration diagram

NOTE: include, use case relationship, use case generalization, and extend features must be included.

Scenario.

Students have restricted access to educational recourses in the online library, only registered students are allowed to access the online library (Precondition). Student visit the online library website and enter his student's id no and date of birth and the student submit, this information will be passed to the library system, and the library system will store the information and forward a copy to the student database confirm if the student is registered to use the online library.
The student database will use the students ID and his date of birth to bring up his account and then identify the email address associated with his account and then send a random access code to the student's email address as stated in his account.
The student check his email and receive the access code and then input the access code on the screen as requested by the library system.
The library system will receive the access code and will forward it to the student database to verify if the access code entered is the same as the one sent by email to the student. If it is correct, the student database will return success to the library attendant who further allow student access to download otherwise access will not be allowed.

Reference no: EM13952280

Questions Cloud

Calculate the weighted average cost-dividend-expected common : Given the following information, calculate the weighted average cost for the Han Corp. Percent of capital structure: Preferred stock 10% Common equity 70% Debt 20% Additional information: Corporate tax rate 34% Dividend, preferred $8.00 Dividend, exp..
What will be gauge pressure be when its temperature is 100°f : A tire contains 1ft3 of air at a gauge pressure of 28lb/in2. How much additional air at atmosphere pressure must be pumped into the tire to raise the pressure to 36lb/in2 at the same temperature?
Decrease the chances of falling victim to identity theft : A lot of customers use payment cards when purchasing items online. Identify the advantages and disadvantages for both the company and the customer in using payment cards for purchases. Due to phishing attacks online, identity theft is prevalent. Desc..
Wage effects of unionization and occupational licensing : Locate and review a scholarly article found in a peer reviewed journal related to: Unions, Labor Relations, or International Human Resources Management. Article - Wage Effects of Unionization and Occupational Licensing Coverage in the United States
Electronic download for registered students. : Student database match the access code submitted with the stored copy and approved student access to download if access code is correct
Financial market risk : An explanation on how risk plays a role within financial markets and how did Bernard Madoff change the way in which individuals viewed the stock market and their investing plans. Please include information and topics from the chapter readings to just..
Movements-naturalism and the victorian era : Up to this point we have discussed two literary movements, naturalism and the Victorian era. You will select one era and in partial fulfillment of Course Objective 4, you will discuss a literary movement in connection with one of our assigned read..
What is the gauge pressure at this faucet : A person could not balance her entire weight on the pointed end of a single nail, because it would penetrate her skin. However she can lie safely on a "bed of nails" consists of many nails driven through a sheet of wood so that the pointed ends fo..
Find one example of cognitive dissonance : You now must find one example of cognitive dissonance, one example of rationalization, and one example each of two other defense mechanisms. You must take these examples from everyday life.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  The planet venus is closer to the sun than earth

The planet Venus is closer to the sun than Earth and has a thick atmosphere of mostly CO2. Because of the greenhouse gas effect, the average surface temperature is about 475 degrees. What would the average temperature be if there were no atmosphere? ..

  Write a create table statement that recreastes the table

write a create table statement that recreastes the table, this time with a unique constraint that prevents an individual from being a memeber in the same group twice.

  Call and write methods with parameters and return values

Call and write methods with parameters and return values.

  Write for loops to produce the following output

Write for loops to produce the following output

  How protocols support business processes

Define upper layer applications.Explain how the application layer manages distributed applications and their protocols.Describes the application protocols associated with these services

  How might a source quenched sender recover

How might a source quenched sender recover from the resulting reduced transmission rate?

  Use the raptor to complete the problem

Use the Raptor to complete the problem, Input names of students from the user, terminated by "ZZZ", 0, 0, 0, and create a data file grades with records of the following form: student (string), test (integer), test 2 (integer), test 3 (integer)

  What types of databases are used by companies like google

What types of databases are used by companies like Google in implementing worldwide search engines

  Program should contain menu driven program

1.Program should contain menu- driven program. 2.One function shows the user how to use the program.

  Gui library to convert celsius to fahrenheit

Write a program in Java using Swing GUI library to convert Celsius to Fahrenheit. If the input is in Celsius, the program can output equivalent Fahrenheit. Both the input and output should use Swing GUI program. Both the input and output should use S..

  What roles do firewalls and proxy servers play in network

What roles do firewalls and proxy servers play in network security? What is the importance of maintaining security on a LAN? Provide examples to support your answer. What are the key security requirements of confidentiality, integrity and availabilit..

  Consider the social effects of information technologies

Consider the social effects of information technologies.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd