...If you are using the Machly Destin Week 4 Assignment 2: Use Cases CIS 210 May 4, 2015 Modeling tools and techniques that can be used to understand the design of the system There are many. During this process, these tools and techniques, can help you to describe the interaction of the user's business processes, requirements, and with the system. One type of modeling is a functional exploded view (FDD). It is to describe the process, to use the top-down model is similar to the organization chart. FDD is in the lower level of the process, is a good way to destroy a higher level of process. Another type of modeling technology is the business process model. Business process model, you can either fill the product order, it is suitable...
Words: 1230 - Pages: 5
...Use Cases As an intern software developer for a retail bank, you have been tasked with developing use cases to support the ATM service. Prepare a 5-6 page paper in which you: 1. Describe (in a one to two (1-2) page narrative) a use case, complete with typical and alternate courses, that documents the event of a bank customer withdrawing money from an ATM. 2. Illustrate the use case using Visio or a similar product. 3. Describe (in a one to two (1-2) page narrative) a use case dependency for making an account deposit. Illustrate this use case with Visio or a similar product. 4. Describe (in a one to two (1-2) page narrative) a use case dependency for making an account transfer. Illustrate this use case with Visio or a similar product. 5. Identify and explain at least one (1) ethical issue that the use case exposes in connection with the development or use of the ATM system. 6. Research and cite at least three (3) authoritative academic sources Use case diagrams in ATM usage CIS210 Use case diagrams of an ATM system Use case diagrams are pictorial representations of different process involved during a specific operation. They are used in modeling real world interaction of system modules and the outside user during the systems analysis stage of software development. They are used mainly in the representation of how the software works in defining the requirements analysis. Use case diagrams in this field are used...
Words: 1140 - Pages: 5
...ase CIS210: Systems Analysis & Design Week 6/Assignment 2: ATM Use Case November 15, 2015 The use case in this narrative describes the process and flow of data when a bank customer uses their debit or credit card when withdrawing funds from their account. The use case actors in this scenario are the bank itself and the customer. As a pre-verified condition, the following has already been introduced or pre-existing already within the bank location: a network connection within the bank and to the ATM, an ATM on-site and cash available for withdrawals from the ATM. * In this use case, the ATM withdrawal is consistent with that of data flow and customer selected options, similar to the process of a flow chart. This particular use case scenario, the following events are completed to withdraw funds from an ATM account: (Step 1) The use case begins when a customer inserts their debit/credit card into the ATM. (Step 2) After use case is initialized, the ATM network must validate the customer by requesting for card PIN. (Step 3) Various options are presented for the customer including balance, transfer, withdrawal, fast cash, etc. As part of this use case scenario, the customer wants a withdrawal transaction from the ATM. (Step 4) Customer selects “Withdrawal” from the available accounts shown on ATM display. (Step 7) ATM displays the amount a customer may withdraw with pre-determined amounts ($10, $20, $30, etc.) or “Other” option for customer to request a specific amount...
Words: 1393 - Pages: 6
... Title 1 Introduction 1.1 project background 1.2 Problem statement 1.3 Project objectives 2 Project Deliverables 2.1 Introduction project management and 2.2 planning 2.3 Analysis 2.4 Design 2.5 Implementation 2.6 2.7 3 Testing Evaluation Research 3.1 Research on strategy 3.2 Research on similar project 3.3 Research on methodologies Research on Development 3.4 tools 4 References Page Number 1 1 3 3 3 3 4 5 5 6 7 8 8 8 8 9 12 14 1 THE WORKING OF ATM Chapter 1: Introduction 1.1 project background Automated teller Goods (Automatic teller equipment) will often be a growing number of utilized these days as a possible easy and simple, hassle-free assortment with regards to guide Tellers. However, there may be present research upwards with regards to quite a few apparent many different numerous insecurities by way of ATMs, their own features and the way they may be successful. This kind of forms identifies what sort of financial institution works usually in addition to signifies specific issues regarding security through employing these kinds of Cash machine gadgets. Evaluation signifies that existing Bank techniques appear to offer we “security through obscurity” instead of the a lot encouraged “open, specialist review” strategy. This may at risk of become due to Financial institution businesses never improving their unique executive so that we can preserve computability along with ATM machine vendors. Work with a considerably guarded style concerning financial particular modifications...
Words: 5025 - Pages: 21
...CHAPTER I INTRODUCTION Overview of the Current State of Technology With the increasing demand for up- to- date, correct and relevant information in the business world, it is crucial for each business to take advantage of breakthroughs in information technology specifically in the field of information systems. Information generated is used by decision makers to gain competitive advantage against competitors and to take advantage of opportunities to increase business performance, effectiveness and efficiency. One of the several information systems which are considered to be of the great help for managers in decision making is the decision support system. Decision Support System (DSS) combines models and data in an attempt to solve semi- structured and some unstructured problems with extensive user involvement. With correct gathering and manipulation of data, DSS can provide several alternative solutions which in turn can lead to correct decision making. Today, there are many companies adopting decision – support systems and data mining software not only in the U.S. but also in the Philippines. However, there is limited literature on companies in Iloilo City adopting this technology. For this reason, the proponents saw the need to study the process of one company in Iloilo City where this type of information system can be adopted. That company is Westvis Marketing Corporation. Westvis Marketing Corporation (WMC) was founded by Mr. Honesto Tomas Hsia on April 2011. Mr....
Words: 8773 - Pages: 36
...can be either: • Recognize and eliminate those activities that are non profit making and lower down the prices of the ones that are priced high • Or recognize and eliminate processes that are not effective and allocate processing concepts that lead to similar product at a better output Methodology Methodology of ABC mainly focuses on the allocation of cost in management. ABC helps to broadly divide the cost into three parts: • Fixed Cost • Variable Cost • Overhead Cost The split of cost into three categories helps to locate the cost drivers. There are some costs that are relatively easy to achieve like direct labor and materials are but some are very difficult to allocate directly like indirect costs to products. Where products use various common resources in...
Words: 1423 - Pages: 6
...On the Use of Quality of Service in IP over ATM Bruce A. Mah1 bmah@CS.Berkeley.EDU The Tenet Group Computer Science Division University of California at Berkeley Berkeley, CA 94720-1776 (510) 642-8905 (voice) (510) 642-5775 (fax) ABSTRACT The future Internet will very likely include some components based on Asynchronous Transfer Mode (ATM), as well as existing network technologies. This environment produces the possibility of using one of the strengths of ATM (namely, quality-of-service guarantees) to improve the performance of Internet traffic. In this report, we document some of our work in progress on the use of performance-guaranteed ATM virtual circuits to carry IP datagrams. We are currently addressing the implications of various IP-over-ATM strategies on network performance, particularly those aspects relating to quality of service, multiplexing, and virtual circuit management. We are evaluating these performance effects using INSANE, a new object-oriented, discrete-event network simulator. 1 Introduction The construction and deployment of Asynchronous Transfer Mode (ATM) networks are a recent development in the field of computer communications. Integrating this new technology into the existing Internet requires schemes for managing the transmission of IP datagrams over ATM networks. Such schemes ideally will take advantage of the strengths of ATM, such as its capability for supporting quality of service guarantees, while effectively bridging the ...
Words: 7430 - Pages: 30
...Analysis of Costs and Income of the M.S.U.F.C.U ATM Network* Brian R. Armstrong Jeffery K. Barron Jeffrey D. Elgas April 26, 2002 Abstract. We examined the profitability of the automated teller machine (ATM) service provided by the Michigan State University Federal Credit Union (M.S.U.F.C.U) for one month. The cost of operating each M.S.U.F.C.U ATM in the 76-machine network was determined. We constructed a tool for determining the monthly profit for the M.S.U.F.C.U ATM network. Observations were made concerning the relationship between ATM profitability and distances from the M.S.U.F.C.U. Simulations of surcharges for guest transactions were performed. * Work done for the Michigan State University Federal Credit Union under the direction of Jeffrey G. Jackson, Vice President of Finance, in partial fulfillment of the requirements of Michigan State University MTH 844, advised by Professor Gábor Francsics. Table of Contents Introduction…………………………………………………………………………..…… 3 Experimental Data From the M.S.U.F.C.U ATM Network………………………..… 3 Experimental Data Analysis of Revenue…………..………………………………..… 4 Experimental Data Analysis of Costs….…………...………………………………..… 5 Experimental Analysis of Distance versus Profitability ……………………………... 5 Experimental Analysis of Surcharges….……………..……………………………..… 6 Recommendations……………………………………………………………………..… 8 Future Work……………………………………………...……………………………..… 8 References………………………………………………………………………………...
Words: 4615 - Pages: 19
...GUI Based Real Time Monitoring and Controlling Approach on Networking A Technical Project report Submitted in the partial fulfillment of the requirement For the award of the degree of BACHELOR OF TECHNOLOGY IN COMPUTER SCIENCE AND ENGINEERING Submitted By K.BHARGAVI CH.KOMALI (Regd. no: 11981A0528) (Regd. no: 11981A0537) K.L.V.S.SANKAR ANDE BINDU YATHISHA (Regd. no: 11981A0541) (Regd. no: 11981A0543) Under the esteemed guidance of Mr. B. SATHISH KUMAR Assistant Professor DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING [pic] RAGHU ENGINEERING COLLEGE (Affiliated to JNTU-KAKINADA) Dakamari, Bheemunipatnam Mandal,Visakhapatnam-531162 2014-2015 DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING RAGHU ENGINEERING COLLEGE (AFFILIATED TO JNTUK) BHEEMUNIPATNAM MANDAL VISAKHAPATNAM [pic] CERTIFICATE This is to certify that this Project Report Entitled “ GUI Based Real Time Monitoring and Controlling Approach on Networking” is the bonafide work carried out by K.Bhargavi(11981A0528),CH.Komli(11981A0537),K.L.V.S.Sankar(11981A0541),Ande Bindu Yathisha(11981A0543)of final year B.Tech, Computer Science Engineering, submitted in the partial fulfillment of the requirements for award of Degree of Bachelor of Technology during the...
Words: 12675 - Pages: 51
...Advanced Network Technology June 1993 OTA-BP-TCT-101 NTIS order #PB93-203735 Recommended Citation: U.S. Congress, Office of Technology Assessment, Advanced Network Technology--Background Paper, OTA-BP-TCT-1O1 (Washington, DC: U.S. Government printing Office, June 1993). For sale by the U.S. Government Printing Office Supcl IIIILWIICIII (If [k)c ulllLlll\. \lAll stop $s01’, \$ Allllg((u. [)(’ 2(141? () ~?x ISBN 0-16 -041805-4 -— . . Foreword omputer networks are having dramatic impacts on our lives. What were once esoteric tools used only by scientists and engineers are becoming more widely used in schools, libraries, and businesses. At the same time, researchers are working to develop even more capable networks that promise to change fundamentally the way we communicate. This background paper analyzes technologies for tomorrow’s information superhighways. Advanced networks will first be used to support scientists in their work, linking researchers to supercomputers, databases, and scientific instruments. As the new networks are deployed more widely, they will be used by a broader range of users for business, entertainment, health care, and education applications. The background paper also describes six test networks that are being funded as part of the High Performance Computing and Communications Program. These test networks are a collaboration of government, industry, and academia, and allow researchers to try new approaches to network design and to attack a variety...
Words: 37290 - Pages: 150
...Reminders Write something readable. Casual,readable use cases are still useful, whereas unreadable use cases won't get read. Work breadth-first, from lower precision to higher precision. Precision Level 1: Primary actor’ name and goal s Precision Level 2: The use case brief, or the main success scenario Precision Level 3: The extension conditions Precision Level 4: The extension handling steps For each step: Show a goal succeeding. Highlight the actor's intention, not the user interface details. Have an actor pass information, validate a condition, or update state. Write between-step commentary to indicate step sequencing (or lack of). Ask ’ why’ to find a next-higher level goal. For data descriptions: Only put precision level 1 into the use case text. Precision Level 1: Data nickname Precision Level 2: Data fields associated with the nickname Precision Level 3: Field types, lengths and validations Icons Design Scope Organization (black-box) Organization (white-box) System (black box) System (white box) Component Goal Level 1 Very high summary Summary User-goal Subfunction too low For Goal Level, alternatively, append one of these characters to the use case name: Append "+" to summary use case names . Append "!" or nothing to user-goal use case names. Append "-" to subfunction use case names. The Writing Process 1. Name the system scope and boundaries. Track changes to this initial context diagram with the in/out list. 2. Brainstorm and list the primary actors. Find every...
Words: 31616 - Pages: 127
...company and medical researcher. A general basic idea of data mining would be introduced. In this article, they are divided into four types, predictive modeling, database segmentation, link analysis and deviation detection. A brief introduction will explain the variation among them. For the next part, current privacy, ethical as well as technical issue regarding data mining will be discussed. Besides, the future development trends, especially concept of the developing sport data mining is written. Last but not the least different views on data mining including the good side, the drawback and our views are integrated into the paragraph. 1. Introduction This century, is the age of digital world. We are no longer able to live without the computing technology. Due to information explosion, we are having difficulty to obtain knowledge from large amount of unorganized data. One of the solutions, Knowledge Discovery in Database (KDD) is introduced. KDD works by select the source, pre-process followed by data mining, some unknown patterns are able to be discovered. After that the result allows us to investigate further base on the results to find out the hidden reasons behind the patterns. Data mining usually does not give answer directly, but to raise more questions leading to the goal, then to obtain knowledge from the database. 2....
Words: 1700 - Pages: 7
...ACKNOWLEDGMENT DECLARATION I hereby declare that the work reported in this project work on “Nepal Investment Bank Limited.” submitted to Thames International College, Tribhuvan University is my original work done in the form of partial requirement for the degree of Bachelor of Information Management (BIM). It has not been previously submitted to any other University or any other examination(s) nor has been duplicated from any other reports. ………………………………………. Laju Shrestha Exam Roll No:2763/10 TU Registration No: 7-2-450-106-2010 Contents APPROVAL LETTER i TO WHOM IT MAY CONCERN ii ACKNOWLEDGMENT iii DECLARATION iv LIST OF TABLES vii LIST OF FIGURES viii ABBREVIATION ix CHAPTER: 1 1 INTRODUCTION 1 1.1Background 1 1.2Objective of the Internship 2 1.3Methodology 3 1.3.1Organization Selection 3 1.3.2 Sources of Data 3 1.3.3 Placement 4 1.3.4Duration of field work 4 1.3.5 Activities performed in various department 5 CHAPTER: 2 6 INTRODUCTION TO THE BANKING INDUSTRY 6 2.1 Introduction to Banking 6 2.2 Nature and Importance of Banks 6 2.3 History of Banking 7 2.4 History of Banking in Nepal 8 2.5 Types of Banks 9 2.6 Commercial Bank 9 2.6.1 Functions of Commercial Bank 10 CHAPTER: 3 11 INTRODUCTION TO THE ORGANIZATION 11 3.1 Introduction of NIBL 11 3.2 Vision 11 3.3 Mission 11 3.4 Background 12 3.5 Capital Structure of NIBL 12 3.6 Organization structure of bank 13 3.7 Product and Services Offered 14 3.8...
Words: 7410 - Pages: 30
...1- What is object-oriented analysis, and how does it differ from structured analysis? Object Oriented analysis is “the examination of a problem by modeling it as a group of interacting objects. An object is defined by its class, data elements and behavior. For example; in an order processing system, an invoice is a class, and printing, viewing and totaling are examples of its behavior. Objects (individual invoices) inherit this behavior and combine it with their own data elements.” ( (The Computer Language Company, 1981-2012) Object-oriented analysis (OOA) applies object-modeling techniques to analyze the functional requirements for a system. “Analysis is done by identifying the use cases and detailing a flow of events for each. Also, an initial set of functional test cases is specified, to serve as a vehicle for checking that the implementation is complete and basically correct. Analysis culminates in identifying classes implied by the use cases, and documenting them using an Analysis Class Diagram.” (Russell C. Bjork Professor of Computer Science, 2004) The difference is in object oriented analysis the data is combined in a process that acts on the data in the object whereas structured analysis treats the process and the data as separate components. 2- Describe the phases of the system development life cycle, and compare the SDLC waterfall model with the spiral model? “The Systems Development Life Cycle (SDLC) is a conceptual model used in project management that...
Words: 2695 - Pages: 11
...research paper. I would to like to convey my sense of gratitude to Professor.Rajni Palikhey who helped and supported us right throughout the semester. This paper would not have been possible without her cooperation and technical assistance. We would also thank our Institution and our faculty members without whom this project would have been a distant reality. We also extend our heartfelt thanks to our family and well wishers. I would like to take this occasion to specially thank University of Northern Virginia to provide us with excellent faculty and also in supporting us getting quality education remotely. Contents SL No Title Page no 1 Abstract 5 2 Introduction to Databases 6 3 OLTP and OLAP Systems 7 4 Difference between OLTP and OLAP 9 5 Data Modeling 13 6 Workflows in Enterprise level Data warehousing 18 7 Business Intelligence tools used in Data flow and Data Warehousing 21 8 Analysis in Data warehousing 24 9 Conclusion 28 10 Foot Note 30 11 References 31 ABSTRACT These days majority of the applications, may it be web applications or windows applications or mobile applications, are completely database dependent. Most of the application developments are becoming database driven environments, hence rendering databases as one of the most key elements in a software environment. This dependency on databases can attributed to the increasing number of data requirements from the...
Words: 6349 - Pages: 26