Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Computer Engineering Expert

Need a use case diagram for a case study:

The case study

Paul is the Director of IT Services for a consulting firm Avant. The firm has been growing fast since it was launched in 2010. With over 100 employees and hundreds of clients, Avant is facing a challenge of operating more efficient, particularly in its internal IT services. Avant equips each consultant with multiple mobile devices. Typically, a consultant will receive a laptop and a cell phone on the first day of his/her job. Every two years Avant will replace the existing mobile devices with new ones. Each mobile device is tagged with a unique ID and registered under the employee ID of person to whom it is assigned. If for some reason, a mobile device is not working, the consultant needs to contact the IT Services, and an IT Services staff will provide a loaner to the employee until the mobile device is fixed. If the device is not fixable, a replacement will be provided upon the return of the loaner. If a device is lost, the staff will investigate the issue, and then either write the device off or charge the employee for the device's residual market value. Over time, as the number of employees goes up which results in corresponding increase in the number of equipment to manage, Paul and his department of ten staff have found it increasingly difficult to manage all the devices efficiently. Quite often, an employee is given a loaner without returning the original device, and sometimes a returned loaner is not recorded so the department runs out of loaners. Paul has received numerous complaints recently from other departments, which forces Paul to come up with a solution to deal with the issues. "Maybe an asset management system (AMS) would help solve the headache," he says to himself. Then he starts to jot down some key functions of the asset management system. Device Module This module is important to Paul because he needs to have a full inventory count of all devices that are currently being used by employees, used by the IT Services as loaners, or need to be replaced. For each device, he wants the system to store at least following information including manufacturer, type (e.g., laptop, cell phone), model name, model number, serial number, color, screen size (laptop), device image, year purchased, purpose of use (e.g., for employees, as a loaner), and status (e.g., just arrived, assigned, being in use, to be replaced, returned, lost). Each device shall be tagged with a unique five digit ID. Device Assignment Module Paul really wants a clear view of device assignment. In particular, he wants his staff to be able to use the system to record to whom a device is assigned. For example, on March 1, 2018, Jane Smith was provided a device with the tag ID 22335. He wants the system to record all the information. Specifically, the staff should be able to use the system to indicate that the device has been picked up by Jane at the pickup time (date and time). And the system shall record Jane's signed signature as a proof. 2 If the employee David needs a loaner for the malfunctioning device he is using, he would file a loaner request using the AMS. With the full inventory information in the system, David shall be able to see what is available in inventory and pick one he likes. After receiving the request, the staff would prepare the requested device, note in the system when the device is ready for pickup and send the notification to David. Upon receiving the notification, David needs to return in person the malfunctioning device, for which the staff will first update the status in the AMS, indicate the time of receipt of the device and reasons for return. Before giving the loaner to David, the staff will need to indicate in the system the pickup time. David will then add his signature; the staff will update the status of the loaner request to "closed" as well as the status of the loaner. Once a replacement arrives, the staff will implement a record of the replacement first in the AMS and then notify David to pick up the replacement. David will then return the loaner, and pick up the replacement. His signature is required for the replacement pickup and loaner return, and the staff needs to show the time of the return/pickup and update the status of both devices. Paul also wants to be able to get an overview of the status of all devices as well as a view of history of devices used by one particular individual employee. After carefully reviewing the requirements of two modules, Paul seems to be convinced that the AMS is the solution for the inefficiency faced by his department.

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M93118127
  • Price:- $10

Priced at Now at $10, Verified Solution

Have any Question?


Related Questions in Computer Engineering

Small business e-commerce portals check out small business

Small Business e-Commerce Portals Check out Small Business Center and the other e-commerce portals mentioned. Then answer the questions. Note: Small Business Center and Entrabase.com are interesting sites that offer a wi ...

Question a with respect to huffman coding devise a formula

Question : (a) With respect to Huffman Coding, devise a formula to compute the average compression based on the number of characters in a piece of text, n, and the number of unique characters in its alphabet, m. (b) Does ...

Question suppose we have two binary search trees b1 and b2

Question : Suppose we have two binary search trees B 1 and B 2 Give an algorithm to merge B 1 and B 2 into a single binary search tree, and runs in time linear in the sum of the sizes of the two trees. Give good justific ...

Quesiton an important principle in information security is

Quesiton: An important principle in information security is the concept of layers of security, which is often referred to as layered security, or defense in depth. 1) Please explain the concept of layers of security. 2) ...

Question define and briefly discuss the following

Question: Define and briefly discuss the following brainstorming techniques, the delphi technique, brainstorming, or nominal group technique. 1. you are required to write an initial post (300 words). 2. Also discuss adva ...

Select an appropriate data structure for each problem below

Select an appropriate data structure for each problem below. For each, write the name of the type of each data structure (queue, for example). Declare the structure using C code, and draw a picture of the structure. dict ...

Explain that our ability to secure each computers stored

Explain that our ability to secure each computers stored information is now influenced by the security on each computer to which it is connected

Questiondiscusses the development and evolution of decision

Question: Discusses the development and evolution of Decision Support Systems and identifies several categories : Model Driven DSS Data Driven DSS Communications Driven DSS Document Driven DSS Knowledge Driven DSS Conduc ...

Consider the market for small business loans in the context

Consider the market for small business loans. In the context of this market. How adverse selection impact lenders. How does adverse selection impact borrowers? In the context of this market provide 2 things that a lender ...

Kelly and jennifer are roommates kelly loves listening to

Kelly and Jennifer are roommates. Kelly loves listening to rock music and uses the radio in their common area to play it. Jennifer, on the other hand, prefers the peace and quiet around the common area. Answer the follow ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As