Reduce competition for desirable properties

Assignment Help Computer Engineering
Reference no: EM133482095

Data and Process modeling Shorecliff College

Shorecliff College, a liberal arts college located on the West Coast, provides dormitory housing for approximately half of its students. Students who choose not to live on campus, or who do not get assigned dormitory space, must find housing in the surrounding community. Currently, the housing office uses a cumbersome system of multiple binders to keep track of housing opportunities for students, faculty, and staff of the college. Housing listings are for both university-owned housing and for housing owned by private parties. The current system is difficult to maintain and keep up-to-date. The new college president approved a request to fund the development of a system to provide easier access and maintenance of listings. You are the systems analyst assigned from the college IT department to conduct the initial investigation into the feasibility of such a system. The preliminary investigation reports resulted in approval for you to proceed with the systems analysis phase.

Background

Director

Based on your information gathering to date, you have determined the following about a listing system for the housing office at Shorecliff College:

The current listing system revolves around multiple copies of three binders of housing listings. These are separate binders for undergraduate listings, graduate listings, and faculty/staff listings. Within each binder are copies of listings available to a particular group. Listings either are generated by the college housing office from their own housing units, or from private landlords who call the housing office to list housing vacancies. In addition, students or other groups of people who have rooms available in a residence may list the room.

Each listing contains the following information: type of housing (apartment, house, condo, etc.), number of bedrooms, number of bathrooms, other rooms, handicap features, other features, rent, security deposit, utilities, date of availability, lease term, landlord name and contact information, and restrictions on rental (gender, etc). Each property may be listed in any or all of the binders, to allow the listing party to direct their listing to their target audience.

When the college rents a property, the listing is removed from all binders in which it appears. Private landlords are asked to call in when a property is rented to facilitate the removal of that listing from the binders. People using the binders who find housing listings that already have been rented are asked to report those so they can be removed. The binders are reviewed at the end of each month by the housing office staff, and private listings older than 2 months are removed.

The biggest problems that the housing office encounters are:

Listings not being removed from all binders upon rental. There are five copies of each binder to accommodate the large number of people seeking housing, and often a binder is missed when rented properties are being culled from the binders.

Listings being removed from the binders prior to being rented, by people trying to reduce competition for desirable properties. During the peak housing search periods of April/May and August, this is a significant problem.

Based on the results of your information gathering, the next step is to develop a logical model of the proposed listing system.

a context diagram for the new system.
a diagram 0 DFD for the new system.
at least one diagram 1 DFD from the results of #2 (more than one will garner extra credit)
a brief memo that explains the importance of leveling and balancing a set of DFDs.

Reference no: EM133482095

Questions Cloud

Explain and paraphrase the quote from alex grijelmo : Explain and paraphrase the quote from Alex Grijelmo: "Words are the embryos of ideas, the germ of thought, the structure of reasons..."
Analyze the security controls measures : Describe what you consider to be the two to three most significant wireless threats and vulnerabilities and to what degree these concerns keep some organization
Research a linux version : Research a Linux version of one of the following security monitoring and investigation tools (categories). In your discussion include, name of the specific tool
Should companies introduce flexible working hours : Should companies introduce flexible working hours for more effective operations? Do you agree or disagree?
Reduce competition for desirable properties : dormitory housing for approximately half of its students. Students who choose not to live on campus, or who do not get assigned dormitory space
Which nps can access in practice such as on mobile apps : Describe the benefits of the resource and be creative in considering resources which NPs can access in practice such as on mobile apps.
Identify five specifics about standard where you do not see : Identify 3-5 specifics about Standard 1 where you do not see what is being called for in the standard being used by the principal in the scenario, Moving into P
Design a security policy for a database : Design a security policy for a database that contains very sensitive information. Discuss five important issues that should be addressed
Identify affect the current state of health care delivery : Identify two major policy issues that affect the current state of health care delivery and population health equity in the United States.

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd