The current system does not accurately track configuration information, leading to wasted time for technicians and clients. The component and configuration parts of the system should not be online. Whether or not they identify the optional entities will depend on how they interpret the user requirements and on their experience level with database normalization. Configuration information should not be accessible from the Internet for security reasons. Leads to wasted effort and dissatisfied clients. The real problem with adding purchase orders to CTTS is that it opens the door on accounting functions.
Clients, technicians, and management should be able to view unresolved service requests and the history of work performed on them. The Equipment entity has EquipNum as the primary key. Work done to resolve a SeviceRequest. System should be easy to update in the field. Make sure students specify primary keys that uniquely identify the entities as well as use proper names for the keys. However, Jeff Summers states that the computer name is sometimes changed.
Sadm 7ed case study ctts milestone 9 course hero Give ctts case study milestone 9 application architecture solution.
The following matrix illustrates one possible solution. Ctts project charter solution course aides M looking for ctts case study solution 9 and 10 to see if i did the problem right. None of the forms hint at a ClientID.
M looking for ctts case study solution 9 and 10 to see if i did the problem right.
Students should realize that the Parent-Child relationship found in PurchaseOrder and PurchaseOrderDetail will be present in any invoicing system and many other systems as well. Work done to resolve a SeviceRequest.
Case Study CTTS – Milestone 04 Data Modeling Solution_图文_百度文库
Primary keys cannot be changed in some systems, and it is never good practice. A request for service on Equipment. If you, the instructor, choose to do your own solution, it may be different, depending on your interpretation of the forms provided. In your class discussion you might point out that functional requirements show up in the context model, while generally non-functional requirements do not show up in the context model other than to specify the actors that can do send or receive certain information.
Ctts case study milestone 9 solution milestone 10 database design solution.
Ctts Case Study Milestone 9 Solution –
Ctts case study milestone 6 solution ctts case study milestone 6 solution. The following completed matrix is one possible solution. System Constraint Internet application must have adequate security.
Would you track accounts payable? Visio cannot easily produce a Context Diagram exactly like the one shown in chapter 5. Read this essay on ctts case study milestone 1 2.
Ctts case study milestone 9 application architecture Solution?
Entire course milestones a graded material. Evaluate their thought processes.
A classification of EquipmentComponent. The system must make it easy for technicians to update the component and configuration information. If use barcode scanning, would have to make sure barcode was on every piece of equipment. Would you also have payments? Leads to wasted effort and dissatisfied clients.
Ctts Case Study Milestone 9 Solution
The proposed system could provide a customer history that would allow for better service. The following tables mipestone the attributes identified from each form and the interview.
A numeric ClientID serves better. But a long text field such as the client name would make a poor primary key for Client, cqse extra storage space, slowing down database operations, and probably requiring extra typing. System would allow technicians to record notes on work done on service requests. Optional Entities A classification of Equipment. A component anything from a stick of RAM to an entire turn-key system that is or has been installed in Equipment.
If you will be doing Milestone 5 as a separate assignment, you may want to withhold this solution. Make sure students identify a cause and not restate the problem. The service request part of the system should have adequate security. Family Vacation Rentals Machine Name i.
solktion Techs should be able to mark a service request as resolved The system should be able to mark as service request as resolved if nothing more is heard from the client after the passage of a set amount of time Classification Functional Functional Non-functional Non-functional Functional Non-functional Non-functional Non-functional Functional Functional Non-functional Functional Non-functional Functional Functional Prepared by Gary B.