Frequent shopper program

Assignment Help Basic Computer Science
Reference no: EM13820441

Frequent Shopper Program defining the following:

Hardware platform: Describe the hardware environment to support the development and production of this system.

Network connections between the stores and headquarters: A network diagram is required.

Database information: An entity-relationship diagram (ERD) is expected for customer data covering personal data and purchases.

User interfaces: Describe the interface for data collection and notification to store personnel and customers.

Controls: Describe the controls to make sure the customer information is accurately maintained and the purchase activity is accurately captured.

Security: Describe the security measures to protect the customer's personal and purchase history data.

Reference no: EM13820441

Questions Cloud

Supply of cashews and the price of cashews : In the long run, what will happen to the supply of cashews and the price of cashews?
Create a class named date that stores date values : Create a class named Date that stores date values
Calculate the mass fraction of sulfuric acid : Two aqueous sulfuric acid solutions containing 20.0 wt% H2SO4 (SG = 1.139) and 60.0 wt% H2SO4 (SG = 1.498) are mixed to form a 4.00 molar solution (SG = 1.213). Calculate the mass fraction of sulfuric acid in the product solution.
Find the probability of the number of women : A random sample of 13 adult women is selected. Use the binomial probabilities table or technology to find the probability of the number of women in this sample of 13 who had tried 5 or more diets in their lifetime is
Frequent shopper program : Frequent Shopper Program
Triple constraint-cost/revenue-schedule and scope-quality : Form a two-person groups and select a topic on which you are “experts” (such as choosing a class) and you are challenged to develop a consensus knowledge base and inference rules. What model did you use to arrive at your decision?
The occupational safety and health administration : Under the Occupational Safety and Health Administration (OSHA), who has primary responsibility for employee safety and what types of hazards are covered under OSHA regulations? Explain and provide examples.
What methods of financing : Service and the sandwiches have caused an increase in demand for his products. Jason now thinks he needs to buy more cars to deliver sandwiches. He is trying to determine the most appropriate way of financing the acquisition of two cars. What methods..
What types of activities occur before initiating a project : Briefly describe what happens in each of the five project management process groups (initiating, planning, executing, monitoring and controlling, and closing). What types of activities occur before initiating a project?

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Which of the following are advantages of the osi model

The OSI model was designed to provide a framework for networking and internetworking standards. Which of the following are advantages of the OSI model? There are 4 correct answers.

  What is the main advantage of using master pages

What is the main advantage of using master pages. Explain the purpose and advantage of using styles.

  Include the terms iterative and recursive query

Describe the process a client would perform to resolve the name yahoo.com. Assume that the full DNS names resolution process must be performed. Include the terms iterative and recursive query

  Discuss how the it department helps the organization achieve

Discuss how the IT department helps the organization achieve their strategic goals

  Explain reasons for consulting different kinds of sources

Explain reasons for consulting different kinds of sources on the same subject.

  The it manager for the only print shop in a small town in id

The IT manager for the only print shop in a small town in Idaho. The shop is connected to the internet by satellite link. Orders are received via the internet as well as by walk-ins with portable storage drives or smart phones that can transfer files..

  Design, simulate and verify a 16-bit ripple-carry

Design, simulate and verify a 16-bit ripple-carry adder by performing the following additions/subtractions (the values of a and b are given in decimal): (i) (-10) + (100), (ii) (63) - (-127), (iii) (15) + (95), (iv) (-32) + (79), (v) (-59) + (-16)..

  Find the second plain text

Find the second plain text x2 - Can somebody provide the answer for given question with example?

  Preparing company-wide migration to windows 8

Crescent Manufacturing Inc. (CMI) is a luxury leader in crafted and customized home furnishings. The corporate headquarters and a production facility are located in Texas, with additional manufacturing facilities located in Nebraska and Maryland.

  Compare the hardware of the two devices

Compare their user interfaces and discuss major advantages and/or disadvantages of one over the other.

  It will be more difficult for them to create exploits

Security through obscurity...this expression suggests that proprietary software is more secure because it is closed. If hackers cannot see the code, then it will be more difficult for them to create exploits...or so the thinking goes.

  Develop a plan for at least three types of tests

For this assignment, you will develop a plan for at least 3 types of tests, and describe the quality controls that you plan to perform quality assurance.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd