Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Computer Engineering Expert

Electronic download for registered students.

1. Student visit library website.
2. Student search for downloadable resources.
3. Student input his student ID no. and date of birth.
4. Students submit information to library attendant system.
5. Library attendant request student to enter access code.
6. Library attendant forward the information to student database for processing.
7. Student database identify student Account with his Student ID and date of Birth.
8. Student database send access code to students emails on file and store a copy.
9. Students receive access code by email.
10. Student input the access code and submit to library attendant.
11. Library attendant forward the access code to student database for authentication.
12. Student database match the access code submitted with the stored copy and approved student access to download if access code is correct

Alternative: at step 12 Student database match the access code submitted with the stored copy and decline student access to download if access code is wrong.

Actors:

1. Student
2. Library Attendant System
3. Student Database System.

Question:

1. Draw the Use case Draw Class Diagram
2. Draw Sequence diagram
3. Draw Collaboration diagram

NOTE: include, use case relationship, use case generalization, and extend features must be included.

Scenario.

Students have restricted access to educational recourses in the online library, only registered students are allowed to access the online library (Precondition). Student visit the online library website and enter his student's id no and date of birth and the student submit, this information will be passed to the library system, and the library system will store the information and forward a copy to the student database confirm if the student is registered to use the online library.
The student database will use the students ID and his date of birth to bring up his account and then identify the email address associated with his account and then send a random access code to the student's email address as stated in his account.
The student check his email and receive the access code and then input the access code on the screen as requested by the library system.
The library system will receive the access code and will forward it to the student database to verify if the access code entered is the same as the one sent by email to the student. If it is correct, the student database will return success to the library attendant who further allow student access to download otherwise access will not be allowed.

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M91623117
  • Price:- $20

Priced at Now at $20, Verified Solution

Have any Question?


Related Questions in Computer Engineering

Question what role should platform providers play in social

Question : What role should platform providers play in social dis-course? Do these technology companies have an obligation to understand the impacts they are having on society? Do they have a responsibility to participat ...

Coa assignment task -q1 a the fibonacci numbers are the

COA Assignment Task - Q1. (a) The Fibonacci numbers are the numbers in the following integer sequence, called the Fibonacci sequence, and are characterised by the fact that every number after the first two is the sum of ...

The contracts manager at a company needs to make a large

The contracts manager at a company needs to make a large legal document available to an overseas customer. However, she has some challenges: The document contains sensitive information; it is too large to send via e-mail ...

In 2009 the hershey company of pennsylvania became the

In 2009, the hershey company of pennsylvania became the latest company to open a candy factory in mexico, joining other american candy companies including brach's confections and ferrara pan candy, which had opened plans ...

Can someone please help me with this pleasetaskthe purpose

Can Someone please help me with this please: Task: The purpose of this assignment is to empirically measure attributes for binary search trees. Steps: Create a program that will build a binary search tree (BST) by adding ...

Discussion a network-based intrusionimagine you live by

Discussion : A Network-Based Intrusion Imagine you live by yourself on a quiet street. Each day, you leave your house in the morning and drive to work. One day while you are at work, someone breaks into your house by kic ...

The single-cycle design on p 17 of the notes is capable of

The single-cycle design on p. 17 of the notes is capable of performing more instructions than the subset that were discussed in §4.1 of the lecture notes. Open the MIPS Architecture Volume II-A: The MIPS32 Instruction Se ...

Why hasnt health care in australia been entirely privatised

Why hasn't health care in Australia been entirely privatised, according to Boxall and Gillespie? Should health care (in Australia) be wholly privatised? Do you think it will be in the future?

Language is cgenerate a sparse vector class with operator

Language is C++ Generate a sparse vector class with * operator, such as Vector Vector::operator * (Vector& param) A multiplication (*) operators returns element-wise multiplication of two vectors in another vector. Given ...

Under the trade model with external economies of scale is

Under the trade model with external economies of scale, is it possible for a country to be worse off with trade than it would have been without trade? Justify your answer.

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As