Identify each use case in the functional model

Assignment Help Management Information Sys
Reference no: EM132241163

Assignment : Structural Modeling and Behavior Modeling

Refer to the functional model you verified and validated for ABS in the Week 4 assignment to complete this assignment.

Based on your performance, ABS management was so satisfied that it wants you to develop both the structural and behavior models. This way, ABS can fully understand both the interaction that would take place between the users and the system, and the system itself in greater detail.

Note: You may create and / or assume all necessary assumptions needed for the completion of this assignment.

Write a four to five (4-5) page paper in which you:

Create Class-Responsibility-Collaboration (CRC) cards and a class diagram based on the functional models through the use of graphical tools in Microsoft Word or Visio, or an open source alternative such as Dia. Note: The graphically depicted solution is not included in the required page length.

Identify each use case in the functional model and create a sequence and communication diagram for each scenario of each use case identified through the use of graphical tools in Microsoft Word or Visio, or an open source alternative such as Dia. Note: The graphically depicted solution is not included in the required page length.

Create a behavioral state machine for each of the complex classes in the class diagram.

Perform a CRUDE analysis to show the interactivity of the objects in the system.

Perform a verification and validation walk-through of each:

Functional model

Structural model

Behavioral model

Revise the requirements document created in Assignment 1 with additional information found in this assignment and document the assumptions.

Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

Your assignment must follow these formatting requirements:

Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.

Include a cover page containing the title of the assignment, the student's name, the professor's name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

Include charts or diagrams created in Visio or Dia. The completed diagrams / charts must be imported into the Word document before the paper is submitted.

The specific course learning outcomes associated with this assignment are:

Describe object-oriented modeling, structural modeling, and behavioral modeling.

Develop class diagram based on business scenarios.

Use technology and information resources to research issues in procuring and designing project requirements.

Write clearly and concisely about project requirements and design topics using proper writing mechanics and technical style conventions.

Reference no: EM132241163

Questions Cloud

Compute ending merchandise inventory : Compute ending merchandise inventory, cost of goods sold, and gross profit using the weighted-average inventory costing method
Research the it security policy used by your university : If possible, identify any legal or regulatory requirements that apply to the organization. Do you believe the policy appropriately addresses all relevant issues
Identify and explain at least one ethical issue : Describe (in a one to two (1-2) page narrative) a use case dependency for making an account deposit.
Determine a business information system : Information systems increasingly emphasize the user experience. identify a business information system
Identify each use case in the functional model : Identify each use case in the functional model and create a sequence and communication diagram for each scenario .
Explain why we use roles rather than simply assigning rights : Explain why we use roles rather than simply assigning rights and privileges to each individual user. Consider how to handle new hires and job changes.
What role end-users typically play in incident reporting : hould end users be encouraged to report suspicious occurrences? If so, why; if not, why not.
What constraints did you experience : What is that project? Provide complete description. Consider using PPM. What constraints did you experience and how did you handle them?
How correlated are gross state product per capita : How correlated are gross state product per capita and education spending per student? Compute and analyze the results.

Reviews

Write a Review

Management Information Sys Questions & Answers

  What are the positions both sides are taking

Which side do you believe has the strongest argument and why? Support your argument with what you have learned about some of the legal principles involved.

  Discuss strategies that information security can use

Discuss strategies that information security professionals can use in their unregulated organizations to motivate company executives.

  What is an associative entity

What is an associative entity? When must a many-to-many relationship be modelled as an associative entity?

  How to proceed with the wan connection

Based on your discussions outcome, decide as a group if a VPN-based WAN is a good solution to connect the two organizations (Telex and Virex).

  Build a good database

In order to build a good Database (or any system), you need to model the data and how it's related, and the processes by which that data moves around.

  Electronic health recordsdescribe an electronic health

electronic health recordsdescribe an electronic health record and discuss how it can help decrease medical

  Why your suggested policy or technology will protect

your task is to suggest which policy or technology to be used. Provide also your reasoning, why your suggested policy or technology will protect organization.

  An area of computer security for further investigation

Network security should to be a prevailing and ongoing concern for users and administrators alike. Last chapter discussed many aspects of security.

  How many IP addresses does the school need immediately

How many IP addresses does the school need immediately? How many might the school eventually need for the initial seven rooms

  What types of coding skills are being required by employers

How can programming benefit you in your chosen career field? What types of coding skills are being required by employers?

  What is the most likely system acquisition method

HI5019 STRATEGIC INFORMATION SYSTEMS ASSIGNMENT. What is the most likely system acquisition method- commercial software, custom software, or ERP

  Develop a petri net system that captures all the processes

IAB201 - Modelling Information Systems - Develop a Petri net system that captures all the processes in the proposed scenario description and discuss limitations of Petri nets that you have experienced when capturing the proposed scenario description..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd