Ask Question, Ask an Expert

+1-415-315-9853

info@mywordsolution.com

Ask Computer Engineering Expert

Problem Statement 1: Speedy Spuds is a fast-food restaurant offering all kinds of potatoes. The manager has a 30-second rule for serving customers. Servers at the counter say they could achieve that rule if the form they must fill out and give to the kitchen crew were simplified. The information from the completed form is keyed into the computer system at the end of the day, when the data entry person needs to enter the kind of potato purchased, additional toppings purchased, the quantity, and the price charged. The current form is difficult for servers to scan and fill out quickly.

a. Create a form (you choose the size, but be sensible) that lists possible potatoes and toppings in a manner that is easy for counter servers and kitchen crew to scan, and can also be used as input for the inventory/ reorder system that is on the extranet connecting Speedy Spuds and Idaho potato growers. (Hint: Remember to observe all the guidelines for good form design.)

b. Design and draw a representation of a display screen that can be used by the servers and clerks to fill in the information captured on the form.

c. Design a display screen based on the display you designed in Problem B. This time, it should function as a display that shows a kitchen crewmember what to prepare for each Spuds order. List three changes to the existing display that you made to adapt it to function as an output display.

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M938022

Have any Question? 


Related Questions in Computer Engineering

Distinguish between a policy requirement and a mechanism

Distinguish between a policy requirement and a mechanism. Identify at least three specific security requirements for a system you know and describe at least two different mechanisms for implementing each one.

Design an algorithm that makes the following exchangethe

Design an algorithm that makes the following exchange: The arrows indicate that b is to assume the value of α, c the value of b, and so on.

Suppose a user has physical access to computer hardware

Suppose a user has physical access to computer hardware (specifically, the box containing the CPU and a hard drive). The user does not have an account on the computer. How can the user force the computer to shut down? To ...

Consider a directed random graph of the kind discussed in

Consider a directed random graph of the kind discussed in Section 13.11. a) If the in- and out-degrees of vertices are uncorre1ated, i.e., if the joint in/outdegree distribution P jk is a product of separate functions of ...

Need help writing a paper700- to 1050-word paper that will

Need help writing a paper 700- to 1,050-word paper that will be used as your reference manual in which you address the following: Define HIE Explain the purpose and use of HIE. Explain the 3 key forms of HIE. Explain how ...

Using pycharmyou are the nutritional coach for a local high

Using PyCharm. You are the nutritional coach for a local high school football team. You realize that some of the players are not up to par having returned from summer break. Realizing nutrition plays a key in a productiv ...

1 explain the advantages of ipv6 when compared to ipv42

1. Explain the advantages of IPv6 when compared to IPv4. 2. Explain the use of the flow field in IPv6. What is the potential application of this field? 3. Distinguish between compatible and mapped addresses and explain t ...

Use the internet to research design flaws in cellular

Use the Internet to research design flaws in cellular networks that affect performance or security and find alternative designs that can improve capabilities. You can include anything in the cellular networks or smartpho ...

1 consider the statement an individual threat agent like a

1. Consider the statement: an individual threat agent, like a hacker, can be a factor in more than one threat category. If a hacker hacks into a network, copies a few files, defaces the Web page, and steals credit card n ...

Explain why it is important for the safety professional to

Explain why it is important for the safety professional to become knowledgeable and skilled in system safety concepts. Your response must be at least 75 words in length.

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro

Describe what you learned about the impact of economic

Describe what you learned about the impact of economic, social, and demographic trends affecting the US labor environmen