Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
How can you create the new system
System is to be computerised. Following will be created:
(i) All DVD and CD data will be stored on a database
(ii) All items for sale will have a bar code on them
(iii) A sales file will be set up
(iv) A database will be created showing supplier and customer details
A customer goes into the shop and finds a CD/DVD she/he wants to buy. Shop assistant scans the bar code on item and CD/DVD details have been found including its price. Stock files are updated (i.e. 1 is reduced from the number in stock) and takings file updated. Stock levels for that item are checked and an automatic order is sent out after accessing supplier database.
If customer has requested the assistant to find a specific CD/DVD assistant keys in the name/artist and finds out if item is in stock, where it can be found and it's price (the subsequent stage is the same as above). If item isn't in stock, assistant takes customer details and updates the database and adds a request for that item to be ordered and this is added to customer's file.
What is the use of CMM? Capability Maturity Model is used in assessing how well an organisation's processes permit to complete and manage latest software projects.
What are the characteristics of software measurement? Measured property Object of measurement Source of measure Purpose measurement Context of measurement.
Describe Data dictionary ?
Q. Describe the Importance of function point? - This is independent of the languages tools or else methodology used for implementation. - They are able to be estimated from
What are the reasons behind to perform white box testing? There are three main reasons behind performing the white box testing. 1. Programmers may have some incorrect assum
DMA data transfer The position of the DMA controller between the other components in a computer system. The CPU communicates with the DMA by the address and data buses as with
fff
ER model shows Static view.
What are the principle stages of VORD method? Viewpoint identification: Identify the services provided to each point of view Viewpoint structuring: Sorting related viewpoint
What is security testing? Security testing attempts to determine that protection mechanism built into a system will protect it from improper penetration.
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd