Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Q. A supermarket requires to develop software to encourage regular customers. For this the customer requires to supply his name address telephone number and driving license number. A customer is assigned an exclusive customer number (CN) by the computer. When a customer composes a purchase the value of the purchase is credited against his CN. At the end of every year surprise gifts to 10 customers who have made the highest purchase is given. Additionally a 22 carat gold coin is given to every customer who has made a purchase over USD 200/-. The entrance are reset on the last day of the year.
(i) Draw the context diagram
(ii) Give data dictionary entries for
Data dictionary entries for
address: name + house# + street# + city + pin
name: string
house#: string
street#: string
city: string
pin: integer
CN: {integer|character|spl. chararacter}*
Gold-coin-winner-list: {address}*
Total sales: integer
Methodology and system Functionality: High level views of the proposed system in terms of the requirements that will be supported by the proposed system in the context of busine
what is the advantage of Iterative Enhancement Model in developing a system?
Q. What is structured programming and why is it important? Ans. Structured programming is a term that was coined in the late 1960's to mean programming without using go to st
I am working on DD development project and I am using 475 field communicator for testing DD. While development of DD, I tested DD with SDC 625 PC application using HART modem. I h
Q. Illustrate the Features of function count? Features:- Function point goes forward is independent of the language tools or methodologies used for implementation.
Explain in detail about system testing. System testing Stress testing Performance testing Security testing
What is Data integrity? Ans) Data integrity is one of the six fundamental components of information security. Data integrity is the soundness, completeness and wholeness of the
Question 1: We have a small system with a call graph as given below. Consider that each vertex is a module. All modules are new (i.e., n = n0) Also consider that the number of
Define the process of Requirements Gathering Tools Requirements gathering is an art. Person who gathers requirements must have knowledge of what and when to gather information
give the example of data dictionary
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd