Maintain an electronic address book

Assignment Help Computer Engineering
Reference no: EM131442953

Introduction

The project is to develop a software that can be used to maintain an Electronic Address Book. An address book contains details of persons like a person's first and last names, address, city, state, zip and phone number.

Product Features
On an individual address book, this product support features like
- Addition of a new person to the address book.
- Edit a person's details
- Delete a person
Feature Overview

Add a new person
This feature allows the user to add a new person to an address book. This person details include his first and last names, address, city, state, zip and phone number. Each entry in the address book should have a unique first name and last name combination. Duplicate entries won't be allowed.

Edit person

This feature refers to editing a particular person's details. User selects a person from the entries of the address book either by highlighting the entry. All the details of the selected person are editable except his name.

- Delete person
This allows the user to delete a particular person's entry from the address book. In this case user selects a person from the entries of the address book by highlighting the entry. On clicking Delete button this entry will be deleted from the address book.

Supplementary Specification Document
This contains details of all those requirements not listed in the use cases or main feature list. These requirements are essential for the main requirements to function properly.

- List entries of address book
When the main window of address book opens, all the entries currently present in the address book are listed in a tabular manner. For editing and deleting an entry, user selects an entry from the listed entries. Selection is done by highlighting an entry. This list is updated if any new entry is added or deleted.

Use Case: Adding a person to address book

Scope: Electronic Address Book
Level: System feature Primary Actor: User Stakeholders and Interests:
- User: Wants a fast entry
Preconditions: Entry is identified and authenticated.

Success Guarantee (or Post conditions): Entry (Person details) is added to the address book.

Success Scenario (or Basic Flow):

1. Person details to be entered is made ready.

2. User clicks on the Add button.

3. User enters the details like name, address, zip, phone number etc.

4. Users clicks on Ok.

5. System adds the entry to the address book.

6. A success message is displayed.

Failure Scenario (or Alternate Flow):

1. Person details to be entered is made ready.

2. User clicks on the Add button.

3. User enters the details like name, address, zip, phone number etc.

4. Users clicks on Ok.

5. System detects a duplicate entry is present based on the name.

6. A failure message is displayed and entered details are cleared.
Frequency of Occurrence: Could be nearly continuous.

Use Case: Editing a person details from address book
Scope: Electronic Address Book
Level: System feature
Primary Actor: User
Stakeholders and Interests:
- User: Wants a fast search result and complete operation

Preconditions: Entry for editing is identified and authenticated.

Success Guarantee (or Post conditions): Required fields of the particular entry is edited.
Success Scenario (or Basic Flow):
1. Person details to be edited is made ready.
2. User double clicks on the person details whose details has to be edited.
3. User edits the required fields and clicks OK.
4. System updates the entry in the address book.
5. A success message is displayed.
Failure Scenario (or Alternate Flow):
1. Person details to be edited is made ready.
2. User highlights the person whose details has to be edited.
3. User clicks on Edit.
4. User updates the required fields and clicks OK.
5. Updating fails due to some wrong entry like alphabetical data in phone number.
6. A failure message is displayed.
Frequency of Occurrence: Could be nearly continuous.

Use Case: Deleting a person details from address book
Scope: Electronic Address Book
Level: System feature
Primary Actor: User
Stakeholders and Interests:

- User: Wants a fast search result and complete operation Preconditions: Entry for deletion is identified and authenticated. Success Guarantee (or Post conditions): Required entry is deleted.

Success Scenario (or Basic Flow):
1. Person details to be deleted is made ready.
2. User highlights the person whose details has to be deleted.
3. User clicks delete.
4. System deletes the entry from the address book.
5. A success message is displayed.

Failure Scenario (or Alternate Flow):
1. Person details to be deleted is made ready.
2. User highlights the person whose details has to be deleted.
3. User clicks delete.
4. System cannot delete the entry from the address book.
5. A failure message is displayed.
Frequency of Occurrence: Could be nearly continuous.

Attachment:- Multifunction Printer.pdf

Reference no: EM131442953

Questions Cloud

How would you define and describe a risk management system : you will write a three research paper in which you describe an RAROC system for risk management and identify benefits and challenges of an RAROC system. In this paper, please address the following questions:How would you define and describe a risk..
Great depression-hoover to fdr : Pick two themes from list and describe thoroughly the history associated with the themes in your forum initial post- all items in each line you pick...so if you pick 1 and 3 you will have 6 terms to discuss and link together
Conduct an organizational training needs analysis : Using publicly available information and data, propose business goals for comfort that will address the challenges the company and industry as a whole is facing. (Detailed information and data about the company and industry, business goals are bas..
Which will lead to the least amount of deadweight loss : Which of the following do you think are good markets for the government to tax if the goal is to boost tax revenue? Which will lead to the least amount of deadweight loss? Why?
Maintain an electronic address book : Develop a software that can be used to maintain an Electronic Address Book. An address book contains details of persons like a person's first and last names, address, city, state, zip and phone number.
What area represents the deadweight cost of the tax : Use the diagram to answer the following questions (a-d). a. At the equilibrium price before the tax is imposed, what area represents consumer surplus? What area represents producer surplus?
Analyse factors that affect price of an american call option : FIN359 Derivative Securities Assignment. Analyse the factors that affect the price of an American call option. Differentiate between the different actions that you can take when you own an American call option. Substantiate your analysis with real ..
What about versailles was important to louis xiv : What about Versailles was important to Louis XIV? What was important about Versailles location?
Explain how organizations use social media to communicate : You have been assigned the task as Marketing Manager to scan social media web sites and try to mitigate the negative consumer postings from a recent crisis. Explain how organizations use social media to communicate with their consumers through a c..

Reviews

Write a Review

Computer Engineering Questions & Answers

  What is the aim of a firewall

Name and explain two of the network devices used to create a network. What is the purpose of a firewall?

  Produce new file which contains the first and second fields

From the file download as above, produce a new file which contains the first and second fields, plus the fourth to the sixth fields. So, the files contains the following: Note that fields 1 and 2 are on the left and followed by the fields 4, 5 and ..

  Calculate the average test score and display it

Write a program that asks for five test scores. The program should calculate the average test score and display it. The number displayed should be formatted in fixed-point notation, with one decimal point of precision.

  Write down a new program in pseudo-code

desplay what PC monitor will display when values 86, 55, and 100 are used.

  Disadvantages of using each method

The first process is to create slides from scratch. This means starting each slide as a blank slide; inserting text boxes and formatted text; and then adding bullets and numbering, colors, clip art, charts, and graphics you might want to use.

  Questionplan a wan network linking a toy manufacturing

questionplan a wan network linking a toy manufacturing plant located in dallas texas with two division centres los

  What do you mean by search engine optimization and how is

what is search engine optimization and how is it achieved? your response should be at least 200 words in

  Professional ethics play a vital role in the computing

professional ethics play a vital role in the computing profession. the conduct of it professionals influences many

  Explain two specific products from different vendors

At this point, you have been introduced to various security tools. You are to take one of the five identified categories of tools and identify two specific products from different vendors.

  Draw a block diagram of a possible architecture

Draw a block diagram of a possible architecture for such a system.You should identify the principal sub-systems and the links between them.

  Anomaly and intrusion detection systems

CSC 7210 - Anomaly and Intrusion Detection Systems Executable of your program (runnable in either Windows or Unix) and Output from running your program with the provided data set - You will then evaluate the accuracy of the algorithm on the provided ..

  Test a class that prints william on the screen

Write down compile, and test a class that prints William Nichols, 777 Mockingbird Lane, Detroit MI 48222 on three separate lines on the sceen. Sace as Address.java

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd