Aussie wine tours awt, Computer Engineering

Assignment Help:

Business Narrative

Aussie Wine Tours (AWT) conduct tours of the wineries of Victoria's Yarra Valley wine region. The tours take place on the last Sunday of each month. Currently there are seven alternative wine tours. The Old Wineries tour, the White Wine tour, the Red Wine tour, the Sparkling Wine tour and so on. Not all tours are offered on each of the Sundays. The schedule depends upon the availability of the wineries, the availability of the tour leaders and the public interest.

Each wine tour event runs for 3-6 hours. Each wine tour event is lead by a single wine expert.

No two events for the same tour can occur on the same day.

AWT have a number of printed wine tour brochures - one for each wine tour on offer. Whenever a brochure is sent AWT records the date that brochure is sent. The person the brochure is sent to is added to the AWT's list of customers and is assigned a customer number. AWT also record the customers name and address. Obviously, not all customers who request a brochure participate in any of the wine tours.

Many customers book places on a wine tour event. Each wine tour event has a price. Wine tour events sometimes include a meal. This obviously increases the price of such an event. AWT record which tour event a customer has booked on and whether payment has been made (customers may not make partial payments). Each customer attending a wine tour event must have a separate booking. E.g. A husband and wife attending a tour event will require two bookings.

AWT have a number of gifts available for participants attending tour events. Generally, three or four gifts are offered to participants of a tour event. The gifts on offer are often decided by the wine expert leading the event. On the day of the event, each participant may choose a maximum of two gifts. AWT records which gifts a participant chooses on a particular tour event. (Note: You are not expected to limit the number of gifts selected by a customer. This would normally be programmatically solved using a Stored Procedure, Trigger, or some other programming technique).


Related Discussions:- Aussie wine tours awt

Define diffrent aspects of a system, Q. Define diffrent aspects of a System...

Q. Define diffrent aspects of a System? The aspects of a System are as below: Organization implies order and structure. It is aprearrangement of components which helps t

What is the function of a tlb, What is the function of a TLB (translation...

What is the function of a TLB (translation look-aside buffer)? A small cache called the TLB is interporated into MMU, which having of the page table entries that correspondi

Use of overlapped register windows, Q. Use of Overlapped Register Windows? ...

Q. Use of Overlapped Register Windows? Register file comprises 138 registers. Let them be called by register number 0 - 137.  Diagram demonstrates the use of registers: when

Determine the minimal sum of products for boolean expression, Determine the...

Determine the Minimal sum of products for the Boolean expression? Obtain the minimal sum of products for the Boolean expression f=(1,2,3,7,8,9,10,11,14,15) using Quine-McCluske

Java Applet, Simple codes for robot using applet

Simple codes for robot using applet

Explain about the flash memories, Explain about the Flash memories Thes...

Explain about the Flash memories These are re-writable non-volatile memories evolved from EEPROM; they are generally connected to the USB port on the computer enabling a user t

File structures, Write in brief about UNIX process structure.

Write in brief about UNIX process structure.

What are different ways synchronize between two clock domain, What are the ...

What are the different ways synchronize between two clock domains? The following section describes clock domain interfacing one of the biggest challenges of system-on-chip (SOC

What is the advantage of dividing an email address, What is the advantage o...

What is the advantage of dividing an email address into two parts? The division of an e-mail address in two parts is significant since it achieve two objectives. First, the div

What is public key cryptography, What is Public Key Cryptography? Pub...

What is Public Key Cryptography? Public-key cryptography is a type of modern cryptography that allows users to communicate safely without any previously agreeing on a shared

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd