Submission / Use Cases

User Generated

QrLbhat

Computer Science

Description

Week 6 Assignment 2 Submission

Assignment 2: Use Cases
As an intern software developer for a retail bank, you have been tasked with developing use cases to support the ATM service.

Prepare a 5-6 page paper in which you:

  • Describe (in a one to two (1-2) page narrative) a use case, complete with typical and alternate courses, that documents the event of a bank customer withdrawing money from an ATM.
  • Illustrate the use case using Visio or a similar product.
  • Describe (in a one to two (1-2) page narrative) a use case dependency for making an account deposit. Illustrate this use case with Visio or a similar product.
  • Describe (in a one to two (1-2) page narrative) a use case dependency for making an account transfer. Illustrate this use case with Visio or a similar product.
  • Identify and explain at least one (1) ethical issue that the use case exposes in connection with the development or use of the ATM system.
  • Research and cite at least three (3) authoritative academic sources.

Your assignment must:

  • Be typed, double-spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.
  • Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.
  • Include charts or diagrams created in Excel, Visio, MS Project, or one of their equivalents such as Open Project, Dia, and OpenOffice. The completed diagrams/charts must be imported into the Word document before the paper is submitted.

The specific Course Learning Outcomes associated with this assignment are:

  • Summarize the various requirements modeling techniques.
  • Create a use case based on relating functional requirements.
  • Analyze and articulate ethical, cultural, and legal issues and their feasibilities among alternative solutions.
  • Use contemporary CASE tools in process and data modeling.
  • Use technology and information resources to research issues in systems analysis and development.
  • Write clearly and concisely about Systems Analysis and Development topics using proper writing mechanics and technical style conventions.

Unformatted Attachment Preview

Running head: INVENTORY MANAGEMENT SYSTEMS Inventory Management Systems Tim DeYoung Rasoul Ahari CIS 210 12-Jul-18 1 INVENTORY MANAGEMENT SYSTEMS 2 Introduction Manual inventory tracking can be difficult especially in a clothing store which needs to make a profit. For the success of the business, it is important to ensure that stock is controlled in a very effective and efficient way. Keeping inventory in check enables the business owner to know and understand which stock if fast moving. Being able to differentiate which is fast moving and slow moving is important in decision making on what or not to stock. Manual ordering and inventory management can result in costly mistakes in a small business (Zipkin, 2000). Without a proper inventory management system, it is very difficult to determine what to order, when, and why it is important to stock that item. Installing an inventory management system will of significant use can increase the success rate as well as the profitability of the business. It also helps in time-saving in the tracking of inventory hence giving the owner of the business more time to concentrate on expanding the business. Other than reducing management cost and stress related to stocking, inventory management will serve the following roles; Customer service Customers hate to be disappointed and, in many cases, this is as a result of not meeting their expectations. Customer disappointments resulting from faux pas like allowing them to order products that are out of stock can cost the business severely. To avoid this, effective inventory management helps to easily cross-check the available stock before committing to the customer (Parpia, I. H., & Singh, 2016). It also helps to track demand of each provide. My sister will be able to determine which clothes are more favorable for stock in her business and which ones are more profitable to her. INVENTORY MANAGEMENT SYSTEMS 3 Theft control and financial management This is a non-issue in a small business where there is only one handler. It is, however, necessary since theft can also be by customers. Effective inventory control helps to confirm stock easily from time to time without wasting much time. It will also improve bookkeeping as the number of each and every stocked item will be tracked. This will help to improve the financial position of the business since any loss of items will be controlled. Describe all the necessary equipment In order to be able to categorically decide the necessary equipment needed, it is important to first understand the problem that needs to solve. A new system has to solve a specified challenge which in this case is tracking of inventory. Since the problem is taking manual track and recording of inventory, the system should ensure that it is effective and efficient in its role of inventory management. Fortunately, technology has made it not only possible but also easy for both small and established businesses to manage their inventory. There is a cost-effective inventory control system that can be applicable irrespective of the budget stated. Barcode has been used for decades not and still proves to be effective in inventory management. This system has advanced and can be implemented easily and fully manage inventory with very minimal upfront investment (Müller, & Amacom, 2011). A basic and cost-effective barcode inventory system requires the following equipment; scanners, barcode markers or printers as well as accessories, inventory control software, label printers, backup devices and but not limited to computer software. This system is known to eliminate human error in inventory management. The role of the laptop is to utilize the software, INVENTORY MANAGEMENT SYSTEMS 4 establishment of the barcode reference form, and data implementation. An external hardware will help in backing up the business’s information that can be used to restore the system in the event of a system breakdown. The costs involved in the creation of the system Since my sister has a controlled or small budget for the establishment and management of the inventory control, this cost analysis will only focus on the basics that are necessary. Much of the budget will be channeled towards purchases of the equipment. This includes the purchase of; laptop, barcode scanner and related accessories, label printer, and an external backup device. These are the basic purchases that will cover up to 60% of the total budget. For the effectiveness of the system to be realized, there must be a software that will necessitate the process. This will require a software developer who will be tasked with the responsibility of designing reliable software for the system. This is the second highest expenditure that will take up to 20% of the total budget. The remaining 10 percent will be incurred in training my sister on how to use the system and initial data entry for all the available stock (Relph, 2016). The ongoing maintenance that will be required For effective inventory management, there must be a control center where product labeling will be done. Each cloth that comes in must be recorded with the rest of the stock before it is released to the rest of the stock for sale. This requires a control center to be established on just a side desk. Such a system does not require intensive ongoing maintenance, but it is important to update the system from time to time. Systems required regular updates whether it is used daily or not. The label printer will have to be checked regularly and feed with the required INVENTORY MANAGEMENT SYSTEMS 5 printing ink and papers. The printer will also have to be serviced and if need be replaced for effective delivery of its services. This will equally apply to the barcode marker which needs to be maintained or replaced (Parpia, I. H., & Singh, 2016). The software developer should have a regular check of the entire system not just when issue(s) arises but just to ensure that it is working as it should be. If the system fails to work or to meet my sister’s expectations as time goes by, she will have to adopt another inventory maintenance that suits her business better. This will, however, require a bigger budget. Workflow diagram INVENTORY MANAGEMENT SYSTEMS 6 Conclusion In conclusion, it is important for my sister to ensure that she has an effective and efficient inventory management solution to avoid making unnecessary loses. In this scenario, the use of a barcode is the most appropriate and within her small budget. The use of barcodes is a reliable way of managing inventory and has no limitations attached to it. The system will help her improve her customer service and control her stock appropriately. It will also save her a lot of time that will enable her to concentrate more on expanding her small business. The system will have to be maintained from time to time so as to ensure that it serves its purpose as intended (Zipkin, 2000). Maintenance will include replacement of label printers and the barcode makers. If well used, this will help my sister to solve the issue of inventory control. INVENTORY MANAGEMENT SYSTEMS 7 References Müller, M., & Amacom. (2011). Essentials of inventory management. New York, NY: American Management Association. Parpia, I. H., & Singh, G. (2016). U.S. Patent No. 9,280,757. Washington, DC: U.S. Patent and Trademark Office. Relph, G. (2016). Inventory management: Advanced methods for managing inventory within business systems. Place of publication not identified: Kogan Page Stylus. Zipkin, P. H. (2000). Foundations of inventory management. Boston: McGraw-Hill. Running head: BUILDING AN ACCESS CONTROL SYSTEM Building an Access Control System Timothy DeYoung Rasoul Ahari CIS 210 26 July 2018 1 BUILDING AN ACCESS CONTROL SYSTEM 2 Abstract As a project manager, a small university has ordered the building is an access control system to their dormitories to control the access of the building and in the process only allow authorized personnel inside the building. The access control system will automatically lock the dormitories using an electrical reader, and on the same account, cameras will be available to record persons accessing the vicinity. The team will develop a scope for the project giving detail to all the necessary aspects to complete the project. Moreover, the scope will indicate other elements such as charts showing the task to be carried out in the project (Numao, M., Kudoh, M., & Amano, T, 2003). Project Scope Statement The small university has given full rights to my information security team to install an access control system in the dormitories of the college. The system is highly depended on to boost the aspects of security within the dormitory regions where there have been numerous complaints by students about the rise in theft cases. To achieve this state of security the access control system will moderate the number of unauthorized individuals who access the dormitories and in addition to that control, the number of authorized individuals since the scope of the project is to ensure the installation of an access control system. To make the project successful upon completion, it has to include installation, operation, maintenance, repair and the support of the system. The system will automatically lock and unlock the doors via an electric reader with the aid of a camera that will be used to identify and allow access or deny access to individuals attempting to make an entrance to the dormitories (Outwater, C., & Redmann, W. G, 2018). BUILDING AN ACCESS CONTROL SYSTEM 3 The college regards the control system as a solution to the problem as it consists of software and hardware that are designed to allow entry or access into a specific area which in this case is the dormitory. The system is therefore designed with the sole purpose of controlling access hence increasing the security in the selected area. A unique feature in this particular installation is that the system will have a storage space that will allow safekeeping of log events meaning in case any footage will be needed from a given past date it can be retrieved. To enhance the security at the institution, the system will require the assistance of the best technology available with the goal being the installation of an access control system that will identify the student using the individual identification, for instance, the school ID or respective dormitory ID. The identification will best be improvised using a card which may be swiped to gain access to the dormitory. The cameras will be used to confirm the identity of the student. For instance, an unauthorized student using the card of an authorized student will not be allowed due to the use of the cameras limiting the instance where a card may be stolen and used to access the area. The financial part of the project needs to be sufficient enough to cover all the activities required in the project. These activities will be in the form of tasks which will make the project take an approximate of one month to complete and get implemented. The project will have to be carried out within the school to allow a more comfortable and efficient testing of the system. Students will not be available because it will be during the holiday season. After the installation, the team will ensure that they provide support and maintenance of the system to ensure correct working or functioning of the access control system (Webb, M. A., Corwin, L. G., & Petersen, M. L, 2018). BUILDING AN ACCESS CONTROL SYSTEM 4 Tasks involved in the project Preparation; this is the first task in the installation of the system, and it entails constituting a team to perform the initial part of the project which is the survey of the whole school and the specified area which in this case is the dormitory. The second aspect is the design of the system which will include a diagram of how the system will operate in and out of the dormitory. Feasibility; as the second task this stage will involve a pilot study of the situation hence the first subtask will be the investigation of the existing system and creation of a proposal to the management on the estimates for the materials needed for the project. Installation; this is regarded as the core task of the project as it will involve the actual implementation of the design in the feasibility part. The first subtask is the installation of the control panel and the wires which make up the communications line and the second subtask will be the installation of readers at the entrance doors in the dormitories. Configuration; this is another task that will involve the arrangement of the different installed parts to mark the completion of installation. The first subtask will be the configuration of the system to carry out system administration activities and secondly the creation of commands in the form of codes that will either permit or deny an individual accessing the dormitory. Execution; this is the final task in which the end of the project will be marked by first testing the installed system and secondly announcement of the deployment which will only be done once the test is completed. BUILDING AN ACCESS CONTROL SYSTEM 5 Gantt Chart of the tasks Gantt Chart 29-Mar 3-Apr 8-Apr 13-Apr 18-Apr 23-Apr 28-Apr Preparation Feasibility Instalation Configuration Execution Staring date Days to complete Execution 26-Apr Configuration 19-Apr Instalation 7-Apr Feasibility 2-Apr Preparation 29-Mar 2 8 12 5 4 Figure 1.0 Gantt Chart showing the tasks in the project System Diagram Figure 1.1 figure showing the requirement of the project BUILDING AN ACCESS CONTROL SYSTEM 6 References Numao, M., Kudoh, M., & Amano, T. (2003). U.S. Patent No. 6,647,388. Washington, DC: U.S. Patent and Trademark Office. Outwater, C., & Redmann, W. G. (2018). U.S. Patent No. 9,911,258. Washington, DC: U.S. Patent and Trademark Office. Webb, M. A., Corwin, L. G., & Petersen, M. L. (2018). U.S. Patent No. 9,957,733. Washington, DC: U.S. Patent and Trademark Office.
Purchase answer to see full attachment
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

Attached.

Running head: USE CASE

1

Use cases to support an ATM service
Student name
Institution
Date

USE CASE

2

Introduction
A session is begun once a user slots in a card into an ATM Machine. The card is pulled in
by the ATM machine which subsequently read it. The user is requested for a PIN if the card is
proper but incase the card is improperly fitted into or damaged, it is declined. Once the card is
confirmed that it is proper, the user is permitted to complete a number of transactions which he
or she selects from a menu of likely kind of transactions in every case. Following every
transaction, the user is asked if he or she is interested in competing an additional dealing. The
user holds the opportunity to abort any session through pressing the cancel key while keying a
PIN or selecting the nature of transaction. This paper seeks to explore several use case
transactions for an ATM use cases.

USE CASE

3

A Use Case for a Transaction session
A use case for a transaction session is begun once a user decides a transaction form from a
menu of choices. The user is demanded to furnish the bank with appropriate credentials such as
accounts involved. The transaction is subsequently conveyed to the bank together with data from
the card of the user and the PIN the user keyed in. In case the bank grants the transaction, the
steps necessary to complete the transaction will be done and a receipt is printed (Hay, 2011). The
user will after that be prompted to make another transaction if need be for any other transaction.
In case there is a report of invalid PIN, the invalid PIN extension will be done and the effort may
be continued for the transaction. In case the card of the user is held ow...


Anonymous
Just what I needed. Studypool is a lifesaver!

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4

Similar Content

Related Tags