System functional requirements

Assignment Help Basic Computer Science
Reference no: EM131939735

System Functional Requirements 

1. System must ask a user to make an account before he/she can access any features.

2. All system access is secured through login name and a password which are part of user account.

3. System must capture potential CEV buyer (user) profile information. This should include buyer's preference for location, vehicle type, vehicle seats, monthly mileage and monthly payments.

4. Taking user's profile information, system recommends 3 vehicles to chose from. While doing this, system automatically calculates any applicable rebates or credits applicable to the user based on the profile.

5. User selects one of the 3 options and system generates a list of dealers offering the vehicle.

6. User contacts the dealer through email.

7. A system administrator is able to generate a set of reports pertaining to system performance.

Deliverables

  1. Develop a high-level object model for the system using class diagram notation.

Reference no: EM131939735

Questions Cloud

Cause the price to be set to zero : Any other entered size invalid and should cause the price to be set to zero.
Organizing shared information : Information architecture can be simply defined as organizing shared information. There are many different ways to organize web sites
Personnel should have access to the it infrastructure : 1. How do you determine which personnel should have access to the IT infrastructure? Should a CEO automatically have access? Should a CIO?
Best practices for access control methods : What are some of industry's best practices for access control methods? What are some common access control models and the differences between each?
System functional requirements : 1. System must ask a user to make an account before he/she can access any features.
Explain how fortune 500 companies can use a data : Explain how Fortune 500 companies can use a data classification standard similar to the US Government and how/why it fits with the IT Security Policies already
Meaningful question about the research : Ask at least one meaningful question about the research. Compare your research findings to that of this other career.
Discuss components and behaviors of devices : Discuss components and behaviors of devices needed to build a simple office network based on the following office scenario:
Shrink the size of the trusted computing base : A reason to shrink the size of the Trusted Computing Base (TCB) is that:

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Economic consequences of climate change

What were the demographic and economic consequences of climate change?

  Explaining rea modeling and rea diagrams

REA data modeling does not include traditional accounting elements such as ledgers, chart of accounts, debits and credits.

  Determine the minimum pipe diameter

Water is to be supplied to the Pelton wheel of a hydroelectric power plant by a pipe of uniform diameter, 400 m long, from a reservoir whose surface is 200 m vertically above the nozzles. The required volume flow of water to the Pelton wheel is 30..

  What are two common ways to implement adapters

What are two common ways to implement adapters? What are the trade-offs between these implementation methods?

  Use a common data center of twenty

Analyze and explain how you would use DNS in your plan. Compose a two-paragraph executive summary highlighting the main points of your plan. Use at least three (3) quality resources in this assignment.

  Conduct internet searches to find the information described

Conduct Internet searches to find the information described in one of the activities below. Write a brief report summarizing your research results. Be sure to document your sources, using the APA format. Submit the report to your instructor.

  Determine the magnitude and direction of the x and y

Determine the magnitude and direction of the x and y components of the anchoring force required to hold in place the horizontal 180° elbow and nozzle combination shown in Fig. P12.19. Neglect gravity.

  Price and income elasticities

Calculate the price and income elasticities for the following demand functions.

  Write one java statement that creates an array of integers

Write one Java statement that creates an array of integers containing the multiples of 10 between 10 and 100, including 10 and 100.

  Define static binding and dynamic binding

1. Define static binding and dynamic binding and give an example of each. Static binding occurs at compile time and dynamic binding occurs at run time. 2. Describe a situation when a history sensitive variable in a subprogram is useful.

  What is the equilibrium quantity and price of x prior to any

A large country named H is considering an import tariff to protect the industry that produces good X. The world's excess supply curve is P=500+6X.

  What are the pros and cons of having a phr

Patient portals and personal health records (PHRs) are commonplace today. What are the pros and cons of having a PHR?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd