Uml conceptual view and process view

Assignment Help Basic Computer Science
Reference no: EM13495293

UML Conceptual View and Process View

You have been asked to develop UML diagrams to graphically depict and describe the architecture of two (2) unrelated software systems. The first system is for an automated ticket-issuing system used by passengers at a railway station. The second system is for a computer-controlled video conferencing system, located in a corporate office and accessible to senior management that allows video, audio, and computer data to be visible to several participants at the same time.

Write a three to five (3-5) page paper in which you:

1. Create two (2) UML diagrams, one (1) showing a conceptual view and one (1) showing a process view of the architectures for each of the two (2) following systems (for a total of four [4] diagrams) through the use of Microsoft Visio or its open source alternative, Dia. Note: The graphically depicted solution is not included in the required page length.
1. An automated ticket-issuing system used by passengers at a railway station.
2. A computer-controlled, video-conferencing system that allows video, audio, and
computer data to be visible to several participants at the same time.

2.Describe how you created the conceptual and process view for all four (4) diagrams. In the description, be sure to provide a justification for each key decision in the design.

3.Explain how you arrived at your final solution for the four (4) conceptual and process view diagrams that you have created.

Your assignment must follow these formatting requirements:
•Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA.
•Include a cover page containing the title of the assignment, the student's name, the professor's name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.
•Include charts or diagrams created in Visio or an equivalent such as Dia. The completed diagrams / charts must be imported into the Word document before the paper is submitted.


The specific course learning outcomes associated with this assignment are:

  • Compare and contrast among architectural patterns.
  • Develop system models based on the Unified Modeling Language (UML) to address and solve a business problem.
  • Describe the methods of object-oriented design using UML.
  • Use technology and information resources to research issues in software engineering.

•Write clearly and concisely about software engineering using proper writing mechanics and technical style conventions.

 

Reference no: EM13495293

Questions Cloud

Examine and analyze the principles of polymorphism : Examine and analyze the principles of polymorphism, inheritance and encapsulation. Use the Library to get started on finding resources.
Estimate the electric field at the center of the square : Three 3 uC charges are at the three corners of a square of side 0.50 m. Find the electric field at the center of the square
Secure hash function : Secure hash function (one-way hash function) is not only used in message authentication but in digit signatures
How to calculate the solubility of caso4 : The Ksp of CaSO4 is 4.93× 10-5. Calculate the solubility (in g/L) of CaSO4(s) in 0.500 M Na2SO4(aq) at 25 °C
Uml conceptual view and process view : UML Conceptual View and Process View
Use technology and information resources to research issues : Discuss the considerations for implementing an operating and database system. Recommend the optimum system, considering the types of revenue and expense transactions for this company.
Explain the zeeman effect is observed as a splitting : The Zeeman effect is observed as a splitting in the spectral lines of hydrogen in the presence of a magnetic field. What is the greatest number of lines that a single spectral line can be split into by a magnetic field? a)2 b)3 c)4 d)5 e)6
Create a sortedlist object reference : Create a SortedList object reference
Identify and analyze each of the preceding transactions : Prepare a list of accounts and their balances for Moonlight Bay at January 31, 2012. Reflect the recurring transactions for the month of January but not the necessary month-end adjustments.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  The most frequent cause of it implementation failures

An evaluation of what you think is the most frequent cause of IT implementation failures. Justify your answer. Explain how change in management can help solve software implementation failures.

  Which of the following statements are true

Consider the strings "catch" and "caught", and the alignment of these strings using the edit distance algorithm with fixed penalties of +1 for a deletion, +1 for an insertion and +2 for a substitution.

  Program that allows a user to enter 10 item stock

Write a program that allows a user to enter 10 item stock numbers, prices, quantities in stock into three parallel arrays. Display all the data in report form - that is, aligned correctly in columns.

  Complete a truth table for a 1 bit alu with 5 inputs

Complete a truth table for a 1 bit ALU with 5 inputs (A,B,f0,f1,carry in) and two outputs (Output,C_out)

  Explain why this relation is not normalized

Assume that ProjectNumber determines ProjectName and explain why this relation is not normalized?

  Design a digital filter with the following specifications

Design a digital filter with the following specifications: Cutoff frequency = 1,000 Hz Sampling rate = 16,000 Low-pass filter What is the digital normalized frequency in radians?

  Describe each of the network design goals

Describe each of the Network design goals.

  Write a method, insertat, that takes four parameters

write a method, insertAt, that takes four parameters:an array of integers; the length of the array; an integer, say insertItem; and an interger, say, index.

  Develop a two-page brief on email or phishing scams

Develop a two-page brief on email or phishing scams reported within the past six months. Indicate who they were directed to, who might be behind these attacks and why. Also address any similarities/differences between similar previous attacks.

  What is the average length of the search for worst-fit

another placement algorithm for dynamic partitioning is referred to as worst-fit. In this case, the largest free block of memory is used for bringing in process. Discuss the pros and cons of this method compared to first-, next-, and best fit. Wha..

  Create a name class of three string objects

Provide methods and operators for reading and writing Persons and for allowing the retrieval and changing of components of a Person (Name and Address)

  How the organisation has used is-it to address

how the organisation has used IS/IT to address and service its' market, not just on the products it provides.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd