Create a Use Case Diagram of Bank Management Sytem, using this scenario (see attached photo) Do not take a shortcut on use cases, you must understand the flow of the scenario
Q: What is Unpacked BCD Format?
A: In this question we need to explain the unpacked Binary Coded Decimal (BCD) format.
Q: How knowledgeable are you about computer networking? List the many types of computer networks
A: Computer networking refers to the interconnected devices of a computer that will exchange…
Q: In underdeveloped countries, wireless networks are widespread. In certain businesses, LANs and…
A: It is becoming more common for homes: To have more than one electronic device, such as a personal…
Q: A typical operating system's kernel components may be summed in a single sentence.
A: Kernel Elements The central processing unit (CPU) of an operating system for computers is called…
Q: What are the prerequisites for computer science study?
A: Introduction :- Below is the complete information about prerequisites in computer science in…
Q: Websites built on HTML, CSS, and JavaScript each have benefits and downsides.
A: Given: What distinguishes webpages written in PHP from those written in HTML, CSS, and JavaScript?
Q: Is it feasible to summarize the kernel components of an operating system in a single sentence?
A: Introduction: The kernel is a piece of programming that runs at the center of an operating system…
Q: Explain in a few lines how the Linux clone operating system differs from UNIX processes and threads.
A: Linux: UNIX has had a significant impact on Linux, a functional operating system. The process…
Q: Problem. Create a truth table for the expression p V (q^-r), by filling in the indicated columns one…
A: Truth table for P V ( q ᴧ ¬r)
Q: rokernel of the operating system created according to a certain set of guidelines? What is the…
A: Introduction: A microkernel (often abbreviated as -kernel) is the smallest amount of software that…
Q: Which of the following are obstacles to the adoption of IoT?
A: The network of physical items, or "things," that are implanted with sensors, software, and other…
Q: Define XLAT instruction used in 8086.
A: Answer is
Q: ux developers decided to construct a non-preemptive kernel is unclear. In a system with a single…
A: Introduction: When people talk about preemption in the context of the Linux kernel, they often refer…
Q: If feasible, describe the kernel of a typical operating system in a single word.
A: If feasible, describe the kernel of a typical operating system in a single word answer in below…
Q: 1. We can build a heap by repeatedly calling MAX-HEAP-INSERT to insert the ele- ments into the heap.…
A:
Q: Exist classroom or educational institution deployments of virtual servers?
A: We can see this as classroom learning and online learning. Exist classroom here is representing…
Q: What governance considerations should be made when migrating from on-premise servers to an laaS…
A: Charity management uses infrastructure as software (IaaS) deployment model to maintain charity…
Q: Show how Microsoft World documents are stored and retrieved.
A: Given- It is necessary for us to explain the process of retrieving any document and saving it in the…
Q: What language is used to create PHP websites?
A: Definition: Hypertext Preprocessor is referred to as PHP. It is a server side scripting language…
Q: What are the three types of backups that may be used to restore a database? In brief, what is the…
A: The three types of backups that may be used to restore a database are: Full Backup Incremental…
Q: In contemporary operating systems, there are two contradictory perspectives on the kernel's design.
A: Given: Describe the two competing schools of thought about the architecture of operating system…
Q: Because modern computers are so powerful, this is the case. Exist reasonable explanations for the…
A: Introduction: The value of computers in our educational system must be emphasised, along with their…
Q: Rerouting malicious traffic across VLANs is one way to get access to a network. Recognize the…
A: A virtual local area network (VLAN) shares the physical network while simultaneously establishing…
Q: Describe many ways for acquiring meeting control. What justification is there for this?
A: let us see the answer:- Introduction:- Many significant issues are successfully handled by a single…
Q: Disabling the Button and Adding an Input Element in the template.html File in the src/app Folder
A: Disabling the Button and Adding an Input Element in the template.html File in the src/app Folder:-
Q: What challenges does an operating system face when using a multithreaded architecture?
A: Introduction: According to the information that was provided, it is necessary for us to determine…
Q: Is the transfer from on-premise servers to an IaaS architecture accompanied by any governance…
A: Given: Is migrating from on-premise servers to IaaS architecture governed Charity management employs…
Q: What benefit does Linux partitioning provide an operating system?
A: The answer of this question is as follows:
Q: How does MVC fit into the broader web application framework? Which of the following are advantages…
A: Introduction Model, View, and Controller (MVC): This architectural design pattern divides an…
Q: In what ways may the usage of cookies in a web application create legal, social, or professional…
A: Introduction: List all conceivable legal, sociological, and professional AI problems from using…
Q: OLAP's function in descriptive analytics must be well stated.
A: Given: In the context of descriptive analytics, describe the OLAP.
Q: Include each component of a conventional operating system kernel along with a brief description
A: Introduction: A Kernel is a PC software that is the OS's user interface. Since the OS has influence…
Q: What is Requirement Engineering? Explain the Crucial Process steps of requirement…
A: Requirement Engineering: Requirement Engineering is the process of defining, documenting and…
Q: What advantages does MVC provide their firm in terms of web applications? How may the MVC…
A: The answer of the question is given below
Q: What is Unpacked BCD Format?
A: The answer is given below step.
Q: Define the purpose of each Linux OS tools by completing the table given below: TOOLS FUNCTION…
A: Answer is in next step.
Q: What language is used to create PHP websites?
A: When creating websites, PHP is utilised with a variety of other languages.
Q: What governance factors should be taken into account while shifting from on-premises servers to an…
A: IaaS stands for Infrastructure as a service and is a type of cloud computing. It is this service in…
Q: How is service-oriented architecture (SOA) deployed?
A: Introduction: The service-oriented design used in software development is the root of the issue.
Q: Machine Language is a straightforward notion that may be expressed in a few words. In addition, why…
A: To Be Done: Describe machine language. Answer: Computer Language: Machine language is a collection…
Q: The more time invested in social networking, the greater the benefits. The definition and advantages…
A: A social networking service, or SNS (occasionally referred to as a social networking site), is an…
Q: The original Linux kernel was non-preemptible because... What are the benefits of a non-preemptible…
A: One has a cooperative, non-preemptive kernel and is based on DOS. Because it was initially made for…
Q: Why? Modern computers are very powerful. Exists evidence that computers have been extensively used…
A: Introduction PCs have been influential ever a since they were a introduced, but they are now…
Q: Could you briefly describe the operating system's primary components? a few more words?
A: Operating system is responsible for almost all of the work in the computer . Without the operating…
Q: What does it mean for a computer's operating system to be in kernel mode?
A: Operating systems have two basic modes in which they can execute a program: 1.User-mode and…
Q: Could you provide an example of how virtual servers are used in education?
A: online server In contrast to dedicated servers, virtual servers share hardware and software…
Q: RAM and Register refer to two different types of memory.
A: RAM:- The hardware in a computer called RAM (Random Access Memory) stores the operating system (OS),…
Q: Can people with mental or physical disabilities use the internet to their advantage? What new…
A: Given: Is the internet helpful for persons who have physical or mental disabilities? What novel…
Q: Provide a short explanation of each kernel component before listing the components.
A: An operating system's kernel is its beating heart. The OS exercises control over the computer system…
Q: Is migrating from on-premises servers to an IaaS architecture a governance issue?
A: Architecture for IaaS: With the IaaS model, cloud providers host infrastructure such servers,…
Create a Use Case Diagram of Bank Management Sytem, using this scenario (see attached photo)
Do not take a shortcut on use cases, you must understand the flow of the scenario
Step by step
Solved in 3 steps with 1 images
- A company has various rules for how payments to suppliers are to be authorized.Some payments are in response to an approved purchase order. For approved purchase orders under $5,000, the accountingclerk can immediately issue a check againstthat purchase order and sign the check. Forapproved purchase orders between $5,000and $10,000, the accounting clerk can immediately issue a check but must additionallyobtain a second signature. Payments for approved purchase orders over $10,000 alwaysrequire the approval of the accounting manager to issue the check as well as the signature of two accounting clerks. Payments thatare not covered by a purchase order that areunder $5,000 must be approved by the accounting manager and a departmental manager who will absorb the cost of the paymentinto that department’s budget. Such checkscan be signed by a single accounting clerk.Payments that are not covered by a purchaseorder that are between $5,000 and $10,000must be approved by the accounting…Draw an ER diagram using Cardinality Notation for the following description: A veterinary hospital only treats dogs and cats (use ISA). Clients have an address, phone number and client ID. Each pet has a name, a pet ID and belongs to exactly one client. Each client can have at most 5 cats and 2 dogs.Create an ERD of the given scenarios and ANSWER the questions. The loan office in a bank receives from various party’s requests to investigate the credit status of a customer. Each credit request is identified by a Request ID and is described by a Request Date and Requesting Party Name. The loan office also received results of credit checks. A credit check is identified by a Credit Check ID and is described by the Credit Check Date and the Credit Rating. The loan office matches credit requests with credit check results. A credit request may be recorded before its result arrives; a particular credit result may be used in support of several credit requests. Draw an ERD for this situation. Now, assume that credit results may not be reused for multiple credit requests. Redraw the ERD for this new situation using two entity types, and then redraw it again using one entity type. Which of these two versions do you prefer, and why?
- DRAW AN ER DIAGRAM FOR THE GIVEN SITUATION The video rental company has several branches throughout the USA. The data held on each branch is the branch address made up of street, city, state, and zip code, and the telephone number. Each branch is given a branch number, which is unique throughout the company. Each branch has allocated staff which includes a Manager. The manager is responsible for the day to day running of the given branch. The data held on a member of staff is his or her name, position, and salary. Each member of staff is given a staff number, which is unique throughout the company.Each branch has a stock of videos. The data held on a video is the catalog number, video number, title, category, daily rental, cost status, and the names of the main actors, and the director. The catalog number uniquely identifies each video. However, in most cases, there are several copies of each video at a branch, and the individual copies are identified using the video number. A video…In the United States, information that a company collects about the customer is legally the company’s property. In the European Union, this information is the individual’s property. Explain why there is this difference in the legal treatment of this information.Draw the ER/EER model for the given scenario. Manufacturer have unique name, an address, and a phone number. Products have a product_id, a name and price. Products may be classified into electronics and grocery. Electronic products have description, type attributes. Groceries have fssai_number, date_of manufacture, date_of_expiry. Each product is made by one manufacturer, and different manufacturers may produce different products.. Customers are identified by their unique social security number. They have email addresses, and physical addresses. Several customers may live at the same (physical) address, but we assume that no two customers have the same email address. An order has a unique order number, and a date. An order is placed by one customer. For each order, there are one or more products ordered, and there is a quantity for each product on the order
- Rick and Ryan Enterprises is an agency that specializes in representing clients in the fields of sports and entertainment. Given the nature of the business, some employees are given a company car to drive and each company car must be assigned to an employee. Each employee has a unique employee number, plus an address and set of certifications. Not all employees have earned one or more certifications. Company cars are identified by their vehicle ID and also contain a license plate number, make, model, and year. Employees represent clients. Not all employees represent clients while some employees represent many clients. Each client is represented by one and only one employee. Each client has a unique client number. Additional attributes required for each client are name, address, and date of birth. Draw an ER diagram that shows the entity types and the relationship types for Rick and Ryan Enterprises. While you must name each relationship type and define the structural…Loan Star Credit Services Inc. (LSCS) receives from various parties requests to investigate the credit status of customers. Each credit request is identified by a Request_ID and is described by a Request_Date, Requesting_Party_Name, and Request_Period (whose value is derived by the request date and current date). LSCS also receives results of credit checks. Each credit check is identified by a Credit_Check_ID and is described by Credit_Check_Date and Credit_Check_Result. LSCS associates each credit request with a credit check. Each credit check result may be used in support of one to many credit requests. A credit request may be recorded before its credit check date. Draw an entity-relationship diagram (ERD) for this situation using the Crow's foot notation introduced in class. You may download and modify this template file (using Draw.io site Links to an external site.; click "File > Open from > Device ..." and navigate to the file you downloaded) for your drawing in this part,…A derived attribute can be stored in a table or calculated on each occasion that it is required. An example of a derived attribute is your Grade Point Average which is calculated by adding together a score for each unit (e.g., HD=4, D=3, C=2, P=1, N=0) and dividing that by the number of units you have completed. Explain how the decision as to whether the Grade Point Average would be stored in a table or calculated would be made. You are administering a database in a large retail company that records sales at each of the company’s stores. Tuning the database to improve performance by adding indexes and optimising query execution is an important ongoing aspect of the physical database design. Which attributes in a database such as this (apart from the primary key) are likely to BENEFIT from being indexed? Which attributes would you generally avoid indexing, and why?
- An university has decided to grant loans for the students. For this the financial administrator has to check with the number of students apply for loan with "Manage Loan and Grants" view. Student can enroll themself and apply for loan. Financial administrator will check whether the students has cleared the tuition fees up to last year, if the student is applying loan for current year tuition fee and enrollment was done for courses like seminars, etc. Professor will be allotted for the course once students got enrolled for subject. The actors involved in the system are student, scheduler, financial administrator and professor. The packages that are linked in the system are manage loan and grants, manage fees, manage seminars, enrollment. Identify the dependencies between one element and the other by drawing a package diagram forConsider the COMPANY database which keeps track of a company’s employees, departments, and projects:• The company is organized into departments. Each department has a unique name, a unique number and a particular employeethat manages the department.• A department controls a number of projects, each of which has a unique name and unique number.• We store each employee’s name, a national card ID, address, salary, and birth date. An employee is assigned to one department but may work on several projects, which are not controlled by the same department. We keep track of the number of hours per week that the employee works on each project. Aproject may involve more than one employee.• We want to keep track of the dependents of each employee for Insurance purposes. We keep each dependent’s first name, birth date and relationship to the employee.Answer the following questions about the COMPANY database.State clearly any assumptions that you may make.Draw the entity relationship diagram for…In a hospital setting, a patient is assigned a patient id and we need to keep track of patient’s gender, date of birth, name, current address. Also, we have staff member. Each staff member has a staff id, job title, gender, name, and address. We may want to keep track of patients even if no staff have ever seen the patient. Similarly, some staff members never have a patient contact that requires a claim to be processed. A patient sees a staff member via an appointment. An appointment has an appointment id, a date and time. Draw an ERD of this problem, you are free to use Visio, Draw.io, or others and include a screenshot below.