Create a use case diagram that would illustrate the use cases for the following online university registration system: The system should enable the staff members of each academic department to examine the courses offered by their department, add and remove courses, and change the information about courses (e.g., the maximum number of students permitted). It should permit students to examine currently available courses, add and drop courses to and from their schedules, and examine the courses for which they are enrolled. Department staff should be able to print a variety of reports about the courses and the students enrolled in them. The system should ensure that no student takes too many courses and that students who have any unpaid fees are not permitted to register. (Assume that a fees data store is maintained by the university’s financial office, which the registration system accesses but does not change.)

Management Of Information Security
6th Edition
ISBN:9781337405713
Author:WHITMAN, Michael.
Publisher:WHITMAN, Michael.
Chapter8: Security Management Models
Section: Chapter Questions
Problem 18RQ
icon
Related questions
Question

Create a use case diagram that would illustrate the use cases for the following online
university registration system: The system should enable the staff members of each
academic department to examine the courses offered by their department, add and
remove courses, and change the information about courses (e.g., the maximum number
of students permitted). It should permit students to examine currently available courses,
add and drop courses to and from their schedules, and examine the courses for which
they are enrolled. Department staff should be able to print a variety of reports about the
courses and the students enrolled in them. The system should ensure that no student
takes too many courses and that students who have any unpaid fees are not permitted
to register. (Assume that a fees data store is maintained by the university’s financial
office, which the registration system accesses but does not change.)

Expert Solution
trending now

Trending now

This is a popular solution!

steps

Step by step

Solved in 2 steps

Blurred answer
Knowledge Booster
Types of Security Models
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, computer-science and related others by exploring similar questions and additional content below.
Similar questions
  • SEE MORE QUESTIONS
Recommended textbooks for you
Management Of Information Security
Management Of Information Security
Computer Science
ISBN:
9781337405713
Author:
WHITMAN, Michael.
Publisher:
Cengage Learning,
Systems Architecture
Systems Architecture
Computer Science
ISBN:
9781305080195
Author:
Stephen D. Burd
Publisher:
Cengage Learning