Identify some of the obvious actors of the above library

Assignment Help Computer Engineering
Reference no: EM132154631

UML diagram:

You have been contracted to develop a computer system for a university library.

The library holds many types of documents for its users which are students, faculty, and staffs of the university. Some of those documents are books, journals, and conference proceedings.

Documents such as journals are for short-term loan only (i.e 10 working days). Other documents such as books may be borrowed for up to six months for a student and a year for a faculty or a staff member. The maximum items that a faculty or staff member can borrow are 12 while it is only 6 for students.

It is essential that the system keep track of the number of copies of books when books are borrowed and returned. The system should produce a reminder when a book borrowed by a user is overdue.

A user should be able to extend the loan if the borrowed item is a book and others have not reserved it. The system should allow users to search for a document based on a particular title, by a particular author or by certain keywords. Any user can search for documents hold in the library. To be able to borrow documents from the library, the user must be registered.

1. Identify some of the obvious actors of the above library system. Must identify at least three actors.

2. Identify and document three main use cases of the library system. Write a short description of these use cases. Use case description must have a name, participating actors, the entry condition, the exit condition and the flow of events.

3. Draw a sequence diagram for at least a usage scenario of a user (Dr. Shi, a faculty of the university) returning a book successfully. Make sure the sequence diagram is drawn with the correct UML notations.

 

Reference no: EM132154631

Questions Cloud

Which command can be used to rename a file or directory : What command flag can you use with cp so that it doesn't accidentally overwrite a file if it already exists (hint: look up the man page for cp)?
What do you understand by network security threat : What do you understand by network security threat? What tools and Techniques are available to make the nwtwork more secure.
Propose the subnet address and subnet mask to be allocated : A university has been allocated the 192.1.0.0/16 address block. As the network administrator of the university, you have been asked to subnet the network.
What is your understanding of the issue : PSPGOV412A ASSESSMENT TASK - Audio Assignment - Workplace issue - What is your understanding of the issue. What are the options in relation to the issue
Identify some of the obvious actors of the above library : Identify some of the obvious actors of the above library system. Must identify at least three actors.
Can someone provide an example of this from any type : Can someone provide an example of this from any type of UML diagram and explain what I am looking for?.
What do you understand by just-in-time compilation : What do you understand by just-in-time compilation? How is it different from traditional interpretation and compilation? Explain using a figure.
Why is an understanding of boolean algebra not important : Why is an understanding of Boolean algebra not important to a weather forecaster?
What is a universal shift register : What is a universal shift register? Draw the schematic and block diagram of a 4-bit universal shift register.

Reviews

Write a Review

Computer Engineering Questions & Answers

  For the sr-nand and sr-nor latches derive

For the SR-NAND and SR-NOR latches derive - Characteristic tables

  Design the function "count" which takes a list of items

design the function "count" which takes a list of items and an item as arguments, and returns the number of times the item occurs in the list.

  Expalin the file system that will be installed

define the file system that will be installed in the server of your local hospital to support remote access of information by the hospital's doctors while they are using their mobile devices such as cellular phones or PDAs.

  How can you backup oracle database using rman

What is RMAN? How can you Backup Oracle Database using RMAN? Give examples. How to recover a database if we lost the control file and we do not have a backup?

  Find the minimum number of periods required

Find the minimum number of periods required to add 100 floating-point numbers A1 + A2 + - + Al00 using this pipeline adder.

  Describe in detail the purpose of a process control block

Compare and contrast the two models of inter process communications. Describe in detail the purpose of a process control block (PCB).

  When is off-line programming normally used

Timers and counters use words of memory, but contacts, coils, and branch start instructions do not.

  Write the usual interactive driver

Write the "usual" interactive driver, and manually enter the test cases.

  Smmarize onenbsp theory of victimization that dr carla

in the scenarios and resulting simulations dr. carla odonnell discusses theories of victimization. sgt. barry evans

  What are the advantages of using search engines like google

what are the benefits of using search engines such as google yahoo or bing? what are some of the limitations and

  Develop a database model based on the business rules

You are the Senior Consultant at Abacus Consulting, tasked with the database project for Amadeus Real Estate client.

  Draw a diagram to show the general idea behind the protocols

Draw a diagram to show the general idea behind the three protocols discussed in this chapter for zero-knowledge authentication.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd