Software Design Specification Document (SDD)
By David M. Jones
November 16, 2014
Table of Contents
1. Introduction ……………………………………………………………………………………………… 1
1.1 Purpose ……………………………………………………………………………………… 1
1.2 Scope …………………………………………………………………………………………. 1
1.3 Definitions and acronyms …………………………………………………………… 1
2. References ……………………………………………………………………………………………….. 1
3. Decomposition description ………………………………………………………………………. 2
3.1 Module decomposition ……………………………………………………………… 3
3.2 Concurrent process decomposition ………………….………………………. 9
3.3 Data decomposition ………………………………………………………………… 10
4 Dependency description …………………………………………………………………………. 11
4.1 Intermodule dependencies ……………………………………………………… 13
4.2 Interprocess dependencies ……………………………………………………… 14
4.3 Data dependencies ………………………………………………………………….. 15
5. Interface description …………………………………………………………………….………… 16
5.1 Module description …………………………………………………………….……. 16
5.2 Process description ………………………………………………………………….. 24
6. Detailed design ……………………………………………………………………………….….….. 25
6.1 Module detailed design ………………………………………………….………. 25
6.2 Data detailed design ……………………………………………………….….…… 30
1. Introduction
1.1 Purpose
This document’s purpose is to document the set of requirements for the development of a software
management system for a bed and breakfast operation. It describes how reservations and financial
transactions are made. It also specifies the human to computer graphical user interface screens.
1.2 Scope
This Bed and Breakfast Management System enables a the automated operation of a 3 bedroom bed and
breakfast business. Customers can call the Bed and Breakfast reservation phone number and give desired
reservation dates. A staff member can check the available and give the daily price rate for each room. The
customer can provide a reservation guarantee date. The guest reservation information will be entered by
the staff member while the customer is on the phone. After the stay, there is a check out process.
Additionally the owner can generate a profit report to monitor the financial status of the operation.
1.3 Definitions
a. BBMS – Bed and Breakfast Management System
b. Reservation – A room assigned to a guest stay for a specific date range
c. Guarantee – Financial contract between the management of the bed and breakfast and a guest that
a room reservation will be available to the guest
d. Workflow – Sequential steps needed to accomplish a task
e. Domain Object – A computer entity that holds information for a given function
f. User interface – A computer graphical element that enables the user to interact with the software
g. GUI – Graphical User Interface which the method by which the user interacts with the BBMS
2. References
IEEE. Std 1016-1998 IEEE Recommended Practice for Software Design Descriptions. IEEE Computer Society,
1998.
3. Decomposition description
Entity Rel.
4.2 Service TestThis test is for the Services module. It designe.docxgilbertkpeters11344
4.2 Service Test
This test is for the Services module. It designed to test the software routines that perform the service functions of the BBMS. {{Add some more here about the white-box testing, etc}}
4.2.1 CalendarLookup Service
(See SDD sections 5.1.2 and 6.1.1)
This tests the algorithm that displays a calendar with reservation days highlighted in calendar days.
{{ Refer to the section number with the screen in the SDD and the section with the module in the module detailed design section of the SDD }}
{{ Also there is a description of what the module is supposed to do in the module detailed design of the SDD detail design section }}
Input Specifications
Output Specifications
Click Reservations button from the main menu.
Calendar screen will come up.
Click Room 1 button
setRoomId has value of 1
getPrice retutns a value of 80.00
getReservedFlag returns false value
all calendar display day have white value
Click Room 2 button
setRoomId has value of 2
getPrice returns a value of 90.00
getReservedFlag returns true value
all calendar display day have white value except days 15 and 16 which a have blue value
Click Room 3 button
setRoomId has value of 3
getPrice returns a value of 100.00
getReservedFlag returns false value
all calendar display day have white value
Click Exit Button
Calendar screen closes and main menu screen is displayed
4.2.2 MakeReservation Service
(See SDD sections 5.1.3 and 6.1.2)
Input Specifications
Output Specifications
Click Room 3 button
setRoomId to Rooms has value 3
getPrice from Rooms has value 100.00
Click the calendar pop-up button the Reservation Start Date box
GUI function to pop-up small calendar is executed
Click 14 on the pop-up calendar
GUI calendar puts value 14 in putStartDate
Click the calendar pop-up button in the Reservation End Date box
GUI function to pop-up small calendar is executed
Click 16 on the pop-up calendar
GUI calendar puts value 16 in putEndDate
Click the Guaranteed box
setGuaranteed is set to true
Click the calendar pop-up button in the Guaranteed Date box
GUI function to pop-up small calendar is executed
Click 10 on the pop-up calendar
GUI calendar puts value 20141110 putGuaranteedDate
Click Create Reservation button
addReservation executes to create a new reservation record in the Reservation domain object.
It returns a new reservation index value which is put into reservationId of Rooms domain object to link the reservation to the room.
It puts the values inputted from user interface into new reservation record.
4.2.3 AddGuest Service
(See SDD sections 5.1.4 and 6.1.3)
Input Specifications
Output Specifications
Enter James in the First Name box and press the enter key.
Value nameFirst associated with the reservationId is set to “James”
Enter Markman in the Last Name box and press the enter key.
Value nameLast associated with nameFirst and reservationId is set to “Markman”
Enter 101 Fairview Street and press the enter key.
Value cusAddress associated with active reservationId.
Project link: https://github.com/nafizmd09/Hotel_Information_Management_System-DART-FlutterProject
Knock for another document for this slide
~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Name: Nafiz Md Imtiaz Uddin
B.Sc. student of Computer Science & Technology (江西理工大学) [2019-2023]
personal Email: nafizmdimtiazuddin@yahoo.com
Academic Email: 2520190011@mail.jxust.edu.cn
~~~~~~~~~~~~~~~~~~~~~~~~~~~~
• More than 10 screens have been used in this app. Which has been done through every beautiful
design.
• Clients can get some benefits if they use this application. With this mobile app, the user can control
the lights and AC of his room.
• Users can even scan their doors through this mobile app. Due to this, they will not need to use any
additional access card.
• In this project, here is used Dart programming language. This application is not delayed too much.
• This code is intended for Android users only.
• This app will not work without internet connection.
• And finally, this app is testing the handset. It is perfectly run. The next will be upgraded according
to the needs for the audience
4.2 Service TestThis test is for the Services module. It designe.docxgilbertkpeters11344
4.2 Service Test
This test is for the Services module. It designed to test the software routines that perform the service functions of the BBMS. {{Add some more here about the white-box testing, etc}}
4.2.1 CalendarLookup Service
(See SDD sections 5.1.2 and 6.1.1)
This tests the algorithm that displays a calendar with reservation days highlighted in calendar days.
{{ Refer to the section number with the screen in the SDD and the section with the module in the module detailed design section of the SDD }}
{{ Also there is a description of what the module is supposed to do in the module detailed design of the SDD detail design section }}
Input Specifications
Output Specifications
Click Reservations button from the main menu.
Calendar screen will come up.
Click Room 1 button
setRoomId has value of 1
getPrice retutns a value of 80.00
getReservedFlag returns false value
all calendar display day have white value
Click Room 2 button
setRoomId has value of 2
getPrice returns a value of 90.00
getReservedFlag returns true value
all calendar display day have white value except days 15 and 16 which a have blue value
Click Room 3 button
setRoomId has value of 3
getPrice returns a value of 100.00
getReservedFlag returns false value
all calendar display day have white value
Click Exit Button
Calendar screen closes and main menu screen is displayed
4.2.2 MakeReservation Service
(See SDD sections 5.1.3 and 6.1.2)
Input Specifications
Output Specifications
Click Room 3 button
setRoomId to Rooms has value 3
getPrice from Rooms has value 100.00
Click the calendar pop-up button the Reservation Start Date box
GUI function to pop-up small calendar is executed
Click 14 on the pop-up calendar
GUI calendar puts value 14 in putStartDate
Click the calendar pop-up button in the Reservation End Date box
GUI function to pop-up small calendar is executed
Click 16 on the pop-up calendar
GUI calendar puts value 16 in putEndDate
Click the Guaranteed box
setGuaranteed is set to true
Click the calendar pop-up button in the Guaranteed Date box
GUI function to pop-up small calendar is executed
Click 10 on the pop-up calendar
GUI calendar puts value 20141110 putGuaranteedDate
Click Create Reservation button
addReservation executes to create a new reservation record in the Reservation domain object.
It returns a new reservation index value which is put into reservationId of Rooms domain object to link the reservation to the room.
It puts the values inputted from user interface into new reservation record.
4.2.3 AddGuest Service
(See SDD sections 5.1.4 and 6.1.3)
Input Specifications
Output Specifications
Enter James in the First Name box and press the enter key.
Value nameFirst associated with the reservationId is set to “James”
Enter Markman in the Last Name box and press the enter key.
Value nameLast associated with nameFirst and reservationId is set to “Markman”
Enter 101 Fairview Street and press the enter key.
Value cusAddress associated with active reservationId.
Project link: https://github.com/nafizmd09/Hotel_Information_Management_System-DART-FlutterProject
Knock for another document for this slide
~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Name: Nafiz Md Imtiaz Uddin
B.Sc. student of Computer Science & Technology (江西理工大学) [2019-2023]
personal Email: nafizmdimtiazuddin@yahoo.com
Academic Email: 2520190011@mail.jxust.edu.cn
~~~~~~~~~~~~~~~~~~~~~~~~~~~~
• More than 10 screens have been used in this app. Which has been done through every beautiful
design.
• Clients can get some benefits if they use this application. With this mobile app, the user can control
the lights and AC of his room.
• Users can even scan their doors through this mobile app. Due to this, they will not need to use any
additional access card.
• In this project, here is used Dart programming language. This application is not delayed too much.
• This code is intended for Android users only.
• This app will not work without internet connection.
• And finally, this app is testing the handset. It is perfectly run. The next will be upgraded according
to the needs for the audience
In this system we will make extensive use of files system in C++.
We will have a login id system initially. In this system we will be having separate functions for
• Getting the information
• Getting customer information who are lodged in
• Allocating a room to the customer
• Checking the availability
• Displaying the features of the rooms.
• Preparing a billing function for the customer according to his room no.
In the software developed separate functions will be there for each of the above points so that there is ample scope for adding more features in the near future.
Download From Here : https://drive.google.com/folderview?id=0B5y_t4zL91BZaWRkY1VPeElJNVE&usp=sharing
An Enhanced Authentication System Using Face and Fingerprint Technologiesiosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Students are expected to watch at least 30 minutes of political ne.docxjensgosney
Students are expected to watch at least 30 minutes of political news a week. Nearly any news program is acceptable, foreign or domestic, including public television, cable, and online sources. The key is diversity. Do not take in the same news source week after week. Be sure to take notes during the program that you watch, including the program’s name, outlet (cable, television, online, etc.), and date viewed. You will write
two
1-2 paged papers, connecting current political news to the material from the textbook and lecture outlines. Detailed instructions will be posted on Titanium within the first two weeks of the semester. These two papers, along with your notes from watching the news, are to be stapled together and turned in as one assignment.
.
Student will review prior readings (Chapter #8) and Klein Journal Ar.docxjensgosney
Student will review prior readings (Chapter #8) and Klein Journal Article to prepare a 10-page paper that will compare and contrast (analyze) one traditional gang and one neo-traditional gang.
The assignment will encompass gang structure, factors in gang membership, group dynamics, and aggression.
Paper will be completed in APA format.
.
More Related Content
Similar to Software Design Specification Document (SDD) By Da.docx
In this system we will make extensive use of files system in C++.
We will have a login id system initially. In this system we will be having separate functions for
• Getting the information
• Getting customer information who are lodged in
• Allocating a room to the customer
• Checking the availability
• Displaying the features of the rooms.
• Preparing a billing function for the customer according to his room no.
In the software developed separate functions will be there for each of the above points so that there is ample scope for adding more features in the near future.
Download From Here : https://drive.google.com/folderview?id=0B5y_t4zL91BZaWRkY1VPeElJNVE&usp=sharing
An Enhanced Authentication System Using Face and Fingerprint Technologiesiosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Students are expected to watch at least 30 minutes of political ne.docxjensgosney
Students are expected to watch at least 30 minutes of political news a week. Nearly any news program is acceptable, foreign or domestic, including public television, cable, and online sources. The key is diversity. Do not take in the same news source week after week. Be sure to take notes during the program that you watch, including the program’s name, outlet (cable, television, online, etc.), and date viewed. You will write
two
1-2 paged papers, connecting current political news to the material from the textbook and lecture outlines. Detailed instructions will be posted on Titanium within the first two weeks of the semester. These two papers, along with your notes from watching the news, are to be stapled together and turned in as one assignment.
.
Student will review prior readings (Chapter #8) and Klein Journal Ar.docxjensgosney
Student will review prior readings (Chapter #8) and Klein Journal Article to prepare a 10-page paper that will compare and contrast (analyze) one traditional gang and one neo-traditional gang.
The assignment will encompass gang structure, factors in gang membership, group dynamics, and aggression.
Paper will be completed in APA format.
.
Student Name Date Read the following case study and thorou.docxjensgosney
Student Name:
Date:
Read the following case study and thoroughly and completely answer the questions that follow. Remember to use full sentences and cite sources to support any contentions that you make, using proper APA formatting.
CASE STUDY:
Mary is a 36-year-old stay-at-home mother of four children. She is starting to become a bit bored with staying home, having done that for the past 15 years. Prior to having children, Mary worked in a credit union and enjoyed her job. She especially liked the precision of number crunching. She has carried this characteristic into her housekeeping chores. She tries to keep her home spotless, even with four children. She cleans the two bathrooms every day, vacuums, dusts, picks up toys, and performs various and sundry cleaning chores. Clutter and messiness bother her, and she is almost neurotic about cleaning. She is a perfectionist and knows it. All of her friends agree, but she is able to laugh at this quirk and not take herself too seriously.
Although maintaining a house with four children might seem overwhelming to others, Mary handles these chores fine and has time (sometimes while cleaning) to keep in close touch with her friends, especially with phone calls. Mary is continuously on the phone. Her friends are a very important part of her social support network, especially since she does not have coworkers with whom to interact and because her husband travels a lot for his job. Often, her friends seem more important to her than her spouse and she seems to have a better relationship with them than her husband. They describe her as being fiercely loyal, supportive, and talkative. They also know that she has a good heart. She is always willing to help another mom whose babysitter got sick by watching their child while she goes to work. If a friend is feeling overwhelmed about preparing for an upcoming party, she is willing to cook or bake something for them. You would never know from looking at her that Mary is such a warm and caring person. She actually looks a bit intimidating and angry, but that is just because her age is starting to show with somewhat deep lines between her eyes, which is mistaken for a frown. She is aware of this contradiction and is a bit self-conscious of her frown lines.
Mary is also insecure about not having attended college. Many of her friends graduated from college. Some even have doctorate degrees, but Mary never did. She does not think of herself as unintelligent, but she sees herself as uneducated and defers to others with a better education. Her friends see her as very intelligent, and they encourage her to pursue at least an associate’s degree mainly so she will feel better about herself. Mary is considering this possibility. It is something that she has always wanted to do. In particular, she is thinking about getting an associate’s degree in legal business studies and becoming a legal assistant after all of her children are in middle school. They will be old.
Strategy DevelopmentDiscuss the role that an I-O psychologist pl.docxjensgosney
Strategy Development
Discuss the role that an I-O psychologist plays when integrating theory during strategy development.
Include a detailed example to demonstrate the importance of careful planning and employee buy-in.
Support your position with the use of one additional outside source.
1 page APA
.
Sociology in a Nutshell A Brief Introduction to the Discipl.docxjensgosney
Sociology in a Nutshell:
A Brief Introduction to the Discipline of Sociology
Alan Barton, Ph.D.
As an independent discipline, Sociology dates back to the end of the 19
th
century, although
Sociology has influences from various other disciplines, including Philosophy, Political Economy
and Statistics. The first practitioners of Sociology were in France and Germany, as the effects of
the industrial revolution were being felt across Europe, and early sociologists were primarily
concerned with understanding the nature of industrial society (Levine, 1995). The first theories
that emerged contrasted community structures, common in agrarian societies, with societal
structures, common in industrial settings (Tönnies, 1887/2002; Durkheim, 1893/1997; Redfield,
1953). Community systems are rooted in personal emotional attachments, a desire for
homogeneity, strict normative (informal) controls, and a rudimentary division of labor (e.g., by
gender, within the household), while societal systems are based on professional rational
attachments, valuing diversity, legal (formal) controls, and a complex division of labor (e.g., by
occupation, at workplaces). As industrialization develops, systems of social organization move
from community to society, and states and markets take central roles in the operation of society
(Polanyi, 1944).
Sociology came to America in the early twentieth century, and was first established at the
University of Chicago (Collins, 1994). American sociologists developed a new approach to the
study of modern (industrial) society, by appropriating ecological theories from Biology and
applying them to urban settings. American sociologists also highlighted interaction as the root of
social structures (Mead, 1934; Goffman, 1959; Blumer, 1969). As Sociology spread, other
perspectives grew as well, including Functionalist Sociology, which emphasizes social order and
the “social glue” that holds society together, and Conflict Sociology, which emphasizes social
hierarchies and the differing levels of status accorded to different groups (Collins, 1994).
At its core, Sociology is the study of the relationship between individuals and their social
contexts. This is sometimes known as the Sociological Perspective (or the Sociological
Imagination) , because in order to understand the social causes of human behavior, sociologists
typically must adopt a way of thinking that differs from how most people see the world (Mills,
1959). Humans are by nature social beings; we cannot survive unless we interact with other
humans. But our interactions are not random, they are shaped by our relationships with others,
by our cultural values and beliefs, by the rules of institutions we participate in, and by our
experiences in previous interactions, among other influences (Bellah, Madsen, Sullivan, Swidler
& Tipton, 1991). Through interaction, we create the terms of these social structures―the
r.
Struggling to understand how to implement a Hash bucket for program..docxjensgosney
Struggling to understand how to implement a Hash bucket for program. It would likely be easiest if the person wrote the program from scratch. See attached Screenshots of the assignment. Building Week1 and then Week2. The .csv file has been changed to a .txt for inclusion.
This is written in Java.
.
StratificationWhat are three ways that social stratification is .docxjensgosney
Stratification
What are three ways that social stratification is evident in the community where you live? Explain using detailed examples of exactly what is unequal and why it matters. Do you think that individual effort or family background is the major reason for the examples of stratification that you have identified in the community where you live?
word count should be 200-250 words in length, no plagiarism, and cite all references used
.
Strategy maps are used in creating a balanced scorecard. Give one st.docxjensgosney
Strategy maps are used in creating a balanced scorecard. Give one strategic measure and one objective measure for each dimension of a balanced score-card (financial, customer, learning and growth, internal processes). Discuss how the elements of a strategy map assist in reaching a company's financial goals.
2 paragraphs due today 9m cst
.
Structured DebateBased on the required readings, lecture mater.docxjensgosney
Structured Debate
Based on the required readings, lecture materials, scenario, and video for Week 4, you will turn in a word processing document with the following elements:
Lectures: The Landscape of Intelligence / Interagency Interest / Doing Structured Debate/ Challenge Analysis
1.A cover sheet.
2. A well-structured, written argument of no less than
three full pages
explicitly presenting:
a. Your key assumptions,
b. Your key pieces of evidence
c. And a careful articulation of the logic behind your methods.
APA Format and 2 References needed
.
Software Test DocumentCard Czar Android AppCMSC .docxjensgosney
Software Test Document
Card Czar Android App
CMSC 495
Group 2 Final Project
Kenneth Mikkalson
Alton Hinton
Shawn Henson
Sarah Holley
Tara Lawson
Richard Wysong
Table of Contents
1.0 Test plan identifier 4
2.0 Introduction 4
2.1 Objectives 4
2.2 Background 4
2.3 Scope 4
2.3.1 In Scope 4
2.3.2 Out of Scope 6
2.4 References 6
2.5 Roles and Responsibilities 6
2.5.1 Developer 6
2.5.2 Test Team Member 6
2.5.3 Test Lead 6
2.6 Definitions 7
2.7 Suspension Criteria and Resumption 7
2.8 Pass/Fail criteria 7
2.9 Testing Resources 7
3.0 Methodology 8
3.1 Overview 8
3.2 Unit Testing 8
3.3 Integration Testing 8
3.4 Final Delivery Testing 9
3.5 Bug Regression 9
3.6 Test Complete Criteria 9
3.7 Test Deliverables 9
4.0 Bug Tracking & Reporting 10
4.1 Bug Reporting 10
4.2Assigning Labels 10
5. Approvals 11
List of Figures
Figure 1: GitHub Issue Form10
List of Appendix
Appendix A
Appendix B
1.0 Test plan identifier
CMS-02142.0 Introduction2.1 Objectives
The system test plan for the Card Czar Android Application will support the following objectives:
1. Identify responsible persons for quality assurance, test management and testing tasks
2. Define the test plan and testing methods involved
3. Identify resource information for test plan development 2.2 Background
The Card Czar Android application is a spin-off of the popular board game Apples to Apples. The purpose of the software test plan is to identify key aspects of software verification and requirements validation. Comment by Admin: Based on project plan comments maybe we should provide a short synopsis of how the game/app will work?
The Card Czar is an android application multiplayer card game that can deliver hours of fun. It allows a user to create a new game room and invite friends to play with them. For a game to begin there must be at least 3 players. Once a game is started each player is dealt at random a hand of response cards that will contain a noun (or response) on them. After all players are given the response cards a dealer will be randomly chosen to start the game. The dealer (card baron) will draw a bait card that consists of an adjective (or other text to be responded to). Each player then selects from their cards a noun that they think the dealer will choose as the best response to the question. Once all responses are received the dealer (Card Baron) then picks the answer they like the best and the player whose response it was gets a point and becomes the dealer (Card Baron) for the next round. This continues until a player has reached 5 points and becomes the winner (the Card Czar).
Maximum players: 6
Minimum players: 3
Bait cards: (Adjective/Question Options)
Response cards: (Noun/Answer Options)2.3 Scope
2.3.1 In Scope
The Card Czar Test Plan defines the unit, integration and acceptance testing. The test plan will include the following:
1. Testing of all interfaces between Android application modules
2. Testing of all quality requirements
3. Security test.
Software Training ProgramABC Company has 50,000 employees and wa.docxjensgosney
Software Training Program
ABC Company has 50,000 employees and wants to increase employee productivity by setting
up an internal software applications training program. The training program will teach employees how to use Microsoft software programs such as Vista, Word 2010, Excel 2010, PowerPoint 2010, Access 2010, and Project 2010. Courses will be offered in the evenings and
on Saturdays and taught by qualified volunteer employees. Instructors will be paid $40 per
hour. In the past, employees were sent to courses offered by local vendors during company
time. In contrast, this internal training program should save the company money on training
as well as make people more productive. The Human Resources department will manage the
program, and any employee can take the courses. Employees will receive a certificate for completing
courses, and a copy will be put in their personnel files. The company is not sure which
vendor's off-the-shelf training materials to use. The company needs to set up a training classroom,
survey employees on desired courses, find qualified volunteer instructors, and start offering
courses. The company wants to offer the first courses within six months. One person
from Human Resources is assigned full time to manage this project, and top management has
pledged its support.
1. Project Scope Management
Create a WBS for this project and enter the tasks in Project 201 0. Create milestones
and summary tasks. Assume that some of the project management tasks you need
to do are similar to tasks from the Project Tracking Database example. Some of the
tasks specific to this project will be to:
a. Review off-the-shelf training materials from three major vendors and decide
which materials to use.
b. Negotiate a contract with the selected vendor for its materials.
c. Develop communications information about this new training program. Disseminate
the information via department meetings, e-mail, the company's intranet,
and flyers to all employees.
d. Create a survey to determine the number and type of courses needed and
employees' preferred times for taking courses.
e. Administer the survey.
f. Solicit qualified volunteers to teach the courses.
g.
h.
Review resumes, interview candidates for teaching the courses, and develop a
list of preferred instructors.
Coordinate with the Facilities department to build two classrooms with 20 personal
computers each, a teacher station, and an overhead projection system
(assume that Facilities will manage this part of the project).
i. Schedule courses.
j. Develop a fair system for signing up for classes.
k. Develop a course evaluation form to assess the usefulness of each course and
the instructor's teaching ability.
I. Offer classes.
2. Project Time Management
a. Enter realistic durations for each task and then link appropriate tasks. Be sure
that all tasks are linked in some fashion to the start and end of the project. Use
the Project Tracking Database as an example. Assume that you have six mont.
Soft skills are most often characterized as the personal attribu.docxjensgosney
Soft skills are most often characterized as the personal attributes that make up the interpersonal and intrapersonal aspects of an individual. Soft skills can include attitude, manners, social skills, the ability to communicate, listen, delegate, resolve conflicts, work as a team player, adapt to change, and work hard.
The term “soft skills” is not an indication on their importance; in fact, it can be argued that soft skills are more important to character and success you might achieve. Soft skills are compared to, and more specifically complement, a person’s “hard skills” which are the specific skills required for a job. For example, the soft skills necessary for a leader in an organization would be vision, social skills, emotional intelligence, empathy, work ethic, communication, and flexibility while the hard skills would be execution, organization, knowledge of computer programs, a second language, planning, coordinating and a thorough understanding of the organization’s policies and procedures.
In the previous section, many soft skills have already been discussed. You practice a variety of soft skills every day as a matter of fact. They occur so naturally you may not even notice them or have never spent time to realize strengths that you regularly exhibit. Identifying your soft skills will give you talking point in interviews and in promotion discussions, as well as give you new goals and areas to improve upon.
Critical Soft Skills
The following is a list of primary soft skills that just about every employer is looking for from their staff. It is no means inclusive as soft skills refer to an often intangible set of abilities that to some degree are engrained in everyone. While the primary soft skills are generally agreed upon as important in any job capacity, there are countless others that are deemed imperative as well (See Module 3: Personal and Career Evaluation). Depending on the job or function you are performing, these may be just as imperative as the ones listed below but not as universal. Review the following and determine which areas are personal strengths and which are areas in need of improvement.
· Communication. Communication permeates just about every aspect of both personal and professional endeavors. It is associated with active listening, comprehension, and clear expression of thoughts and ideas. It includes oral, written, and non-verbal types. To improve your communication skills, focus on both what you are saying and how you are saying it, and always remember that receiving information is just as crucial as providing it so practice active listening instead of just thinking of what to say next.
· A Good Work Ethic. Your work ethic is the sum of your attitude, actions, and guiding values. It is how company leadership knows that you are trustworthy and have the best interests of the organization at heart. A good work ethic is demonstrated through your decisive behavior, motivation, and dedication. You cannot .
Software Engineering Capstone 1
SWE481: Software Engineering Capstone
Phase 2 IP Software Engineering Methodologies
July 21, 2014
Contents
3Phase 1 Project Outline
3Development Methodology
4Phase 2 Software Production
4Requirements
5Design
6Application Architecture
7Music Player Main Screen
8Class Diagram
9Use Case Diagram
10Phase 3 Rapid Development (TBD)
11Phase 4 Project Scheduling (TBD)
12Phase 5 Project Risks (TBD)
13References
Phase 1 Project Outline
The project that our team is proposing is that of a mobile music application. This application will be a front end application that uses already in place internet services. The project involves. The mobile will contain free listening for radio and a paid listening subscription for user selected content. The application will be multiplatform based and be useable on iOS, Android, Windows 8.x. The application will also be integrated with social media sites such as Facebook and Google +, to name a few. There will be 6 phases for this project to include the following;
1. Pilot Application
2. Radio module
3. Subscription module
4. Social Media Module
5. Project CloseDevelopment Methodology
The development methodology will be that of Iterative/Incremental that allows for breaking up the project into small digestible chunks and is easy to understand. This method is similar to making small waterfalls out of each iteration of the software. This method allows for quick testing and customer feedback. This is best suited for small teams that support parallel coding and testing which will be used in this project. The ability to release the product in 90 to 120 days below budget is planned.Phase 2 Software Production
Requirements
The requirements gathering sessions will be completed by formal meetings, chat and email interaction. This will be done due to the various locations of the stakeholders and team members in this project. The original project inception and the requirements for the agreed upon project were gathered by email correspondence between the team members. The group leaded compiled a list of the initial requirements and this was discussed during a live chat meeting. The requirements are as follows;
· Initial pilot app (includes account creation)
· Player Module to include equalizer module ( Includes 5 bans of equalization)
· Radio module (search for music interest)
· Subscription module (create playlists, add music to library)
· Social media module
· Project close
· Application will operate across multiple platforms (Supports iOS, Android, Windows 8.x)
· Paid subscription for direct listening
· Free listening for radio playlists
· App will use backend services already exist from current website
· App will integrate into existing backend services
The first 5 requirements are functional requirements and the remaining 7 requirements are non functional requirements. The functional re.
Strength–Based Approaches Paper
Covering
Displaced Homemakers
People over 60
·
All key elements of the assignment are covered in a substantive way.
o
The learning team selected a special population from those listed in University of Phoenix Material: Strength-Based Approaches and included the following topics:
·
Problems faced by special populations in society
·
Strengths of these special populations and how those strengths can enhance individual and community empowerment
·
Combining Western healing approaches with traditional indigenous healing approaches to enhance solutions for the individual and community
The content is comprehensive and accurate.
.
Sociology Project
CLASSROOM “COMPARATIVE CULTURE” STUDY
Write an essay comparing / contrasting the classroom culture of three
different teachers (Do not use actual names – substitute “Teacher A”, etc.)
A. Describe the class as a culture. Include:
· General atmosphere of class
· Seating patterns (e.g., students sitting toward back, male/female division, etc.)
· Rules – formal and informal
· Teacher’s mannerisms, attitude, teaching method / style.
B. Assess student comfortability and productivity in each setting.
C. As you write the essay, attempt to determine whether classroom culture has an impact on students’ lives / attitudes and, if so, what that impact might be.
.
Socometal Rewarding African WorkersBy Evalde Mutabazi and C. B.docxjensgosney
Socometal: Rewarding African Workers
By: Evalde Mutabazi and C. Brooklyn Derr
It was a most unusual meeting at a local café in Dakar. Diop, a young Senegalese engineer who was educated at one of Frances’s elite engineering grandes ‘ecoles in Lyon, was meeting with N’Diaye, a model factory worker to whom other workers from his tribe often turned when there were personal or professional difficulties. N’Diaye was a chief’s son, but he didn’t belong to the union and he was not an official representative of any group within the factory.
Socometal is a metal container and can company. While multinational, this particular plant is a joint venture wherein 52 percent is owned by the French parent company and 48 percent is Senegalese. Over the last twenty years Socometal has grown in size from 150 to 800 employees and it has returns of about 400 million FCFA (African francs) or $144 million. The firm is often held up as a model in terms of its Africanization of management policies, whereby most managers are now West African with only 8-10 top managers coming from France.
During the meeting N’Diaye asked Diop if he would accept an agreement to pay each worker for two extra hours in exchange for a 30 percent increase in daily production levels. If so, N’Diaye would the guarantor for this target production level that would enable the company to meet the order in the shortest time period. “If you accept my offer,” he said with a smile, “we could even produce more. We are at 12,000 (units) a day, but we’ve never been confronted with this situation. I would never have made this proposal to Mr. Bernard but, if you agree today, I will see that the 20,000 (unit) level is reached as of tomorrow evening. I’ll ask each worker to find ways of going faster, to communicate this to the others and to help each other if they have problems…”
Mr. Olivier Bernard, a graduate of Ecole Centrale in Paris (one of Frances’s more prestigious engineering schools), was the French production manager, and Diop was the assistant production manager. Mr. Bernard was about 40 and had not succeeded at climbing the hierarchal ladder in the parent company. Some report that this was due to his tendency to be arrogant, uncommunicative and negative. His family lived in a very nice neighborhood in Marseille, and it was his practice to come to Dakar, precisely organize the work using various flowcharts, tell Diop exactly what was expected by a certain date and then return to France for periods of two to six weeks. This time he maintained that he had contracted a virus and needed to return for medical treatment.
Shortly before Mr. Bernard fell ill, Socometal agreed to a contract requiring them to reach in short time a volume of production never before achieved. Mr. Bernard, after having done a quick calculation, declared, “We’ll never get that from our workers--- c’est impossible!” After organizing as best he could, he left for Marseille.
Diop pondered what N’Diaye had propos.
Sociology and General Education [1964]By Robert Bierstedt.docxjensgosney
Sociology and General Education:
[1964]
By Robert Bierstedt
Sociology has many uses that are alike unsung and unappreciated. Some of these uses pertain not to its function as an instrument in the acquisition of knowledge but to a rather different kind of function—its function in the course and process of education. I am inclined to think in fact, as I hope the following remarks will show, that sociology is one of the most valuable of all of the disciplines in the university curriculum and that one of its most distinctive virtues lies precisely and centrally in the realm of general education.
Those of us who are engaged in the sociological enterprise ourselves tend to think—perhaps inevitably—that sociology is for sociologists, or at least for those who want to become sociologists. In our colleges and universities, however, we teach sociology to many more than these. It has been estimated that only two per cent of undergraduate students major in sociology and that only three per cent of this statistically small figure go on to do graduate work in sociology. The vast majority, in short, study sociology with no vocational or professional purpose. They appear in our undergraduate classes and study our introductory texts either because sociology is required as a supplementary subject in a closely related curriculum or because it satisfies a social science requirement in a curriculum for which another science would do equally well. There are those in addition, we may suppose and hope, who study sociology without being required to do so because it satisfies some wayward or vagrant curiosity of their own, because it stimulates an intellectual interest, because it has its own intrinsic fascination. This paper examines some of the educational and cultural advantages that sociology has to offer these other groups of students, particularly the last, comprised of those who have no intention of making a career in the field and who have no professional requirement to satisfy. I propose to show, in short, that sociology has an important role to play in general education, a role that is wholly commensurate with and sometimes even superior to the roles played by such older disciplines as history, literature, and philosophy. I shall maintain that sociology has many virtues that contribute to the cultivation of the intellect and that it merits a high rank. therefore, among the liberal arts and sciences.
The Liberated Mind:
The first of the educational virtues of sociology is that, like all al the liberal arts, it liberates the student from the provincialism of time, place, and circumstance. One of the great disabilities al those who have been denied the benefits of education is their parochialism, their attachment to the narrow corner of earth wherein they dwell. These are the people—and unfortunately they are the vast majority of mankind—who retain throughout their lives a primitive loyalty to their initial culture. For the uneducated t1 initial culture .
Socioautobiography Assignment GuidelinesThe purpose of this assign.docxjensgosney
Socioautobiography Assignment Guidelines
The purpose of this assignment is to give you the opportunity to apply the sociological imagination to your everyday life: to make connections between your everyday life and the broad sociocultural structures within which you live. In this assignment, you will reference appropriate Terminal Course Objectives (TCOs) that relate to your socioautobiography. You can find the TCOs in this course listed in the Syllabus and in the weekly objectives. This assignment can be related to any and all of the TCOs.
The Socioautobiography is a reflective paper that allows you the opportunity to explore the interconnections between biography (a slice of your life), the social structure, and culture. In preparation for this paper, please read this document, Socioautobiography Assignment Guideline boldface and underlined. At the end of the paragraph where a concept is used, indicate which TCOs your sociological concept refers. This should be done using parenthetical citation. An example of how to do this is provided below.
The final paper will be due at the end of Week 5. It should be three- to four-pages in length and may be in any format you choose. Feel free to get creative. You may choose to do a standard APA style paper or you can do your socioautobiography as a news story, movie review of your life, letter home to family, obituary, poem, lyrics, dialogue, old time radio program, or Shakespearean play whatever format you choose. Be sure to identify your format, double-space your paper, and correctly use a minimum of six sociological concepts covered in the weekly readings or lecture. Your six concepts should be in boldface and underlined. Consider the following example:
As I think about my college experience, because of my lack of English language skills, I realized that I was at a disadvantage with other students who were from upper-middle-class suburbs. I grew up in a farming community and, while there was the expectation that farm kids were going off to college, the community’s educational policy was based on the idea that farm kids would take over the family farm. As such, learning proper academic language was not a high priority (TCO 5 and TCO 9).
Note how, in this mini-socioautobiography, there are references to social class, education, and place of residence.Below are guidelines to follow as you work on your socioautobiography assignment.
· Papers should contain 3-to 4-pages of text, double-spaced (this does not include the title page).
· Refer to and properly use at least six sociological concepts covered in the lectures or textbook reading.
· Underline andboldface these concepts.
· Connect your concepts to the TCOs. Indicate the TCOs covered in parentheses, as demonstrated in the assignment instructions.
· Cite the textbook and/or lecture for the concepts and the Syllabus or course objectives for the TCOs in addition to any outside source material used both I body and on your reference page.
Grading:
Comp.
Introduction to AI for Nonprofits with Tapp NetworkTechSoup
Dive into the world of AI! Experts Jon Hill and Tareq Monaur will guide you through AI's role in enhancing nonprofit websites and basic marketing strategies, making it easy to understand and apply.
Honest Reviews of Tim Han LMA Course Program.pptxtimhan337
Personal development courses are widely available today, with each one promising life-changing outcomes. Tim Han’s Life Mastery Achievers (LMA) Course has drawn a lot of interest. In addition to offering my frank assessment of Success Insider’s LMA Course, this piece examines the course’s effects via a variety of Tim Han LMA course reviews and Success Insider comments.
The Roman Empire A Historical Colossus.pdfkaushalkr1407
The Roman Empire, a vast and enduring power, stands as one of history's most remarkable civilizations, leaving an indelible imprint on the world. It emerged from the Roman Republic, transitioning into an imperial powerhouse under the leadership of Augustus Caesar in 27 BCE. This transformation marked the beginning of an era defined by unprecedented territorial expansion, architectural marvels, and profound cultural influence.
The empire's roots lie in the city of Rome, founded, according to legend, by Romulus in 753 BCE. Over centuries, Rome evolved from a small settlement to a formidable republic, characterized by a complex political system with elected officials and checks on power. However, internal strife, class conflicts, and military ambitions paved the way for the end of the Republic. Julius Caesar’s dictatorship and subsequent assassination in 44 BCE created a power vacuum, leading to a civil war. Octavian, later Augustus, emerged victorious, heralding the Roman Empire’s birth.
Under Augustus, the empire experienced the Pax Romana, a 200-year period of relative peace and stability. Augustus reformed the military, established efficient administrative systems, and initiated grand construction projects. The empire's borders expanded, encompassing territories from Britain to Egypt and from Spain to the Euphrates. Roman legions, renowned for their discipline and engineering prowess, secured and maintained these vast territories, building roads, fortifications, and cities that facilitated control and integration.
The Roman Empire’s society was hierarchical, with a rigid class system. At the top were the patricians, wealthy elites who held significant political power. Below them were the plebeians, free citizens with limited political influence, and the vast numbers of slaves who formed the backbone of the economy. The family unit was central, governed by the paterfamilias, the male head who held absolute authority.
Culturally, the Romans were eclectic, absorbing and adapting elements from the civilizations they encountered, particularly the Greeks. Roman art, literature, and philosophy reflected this synthesis, creating a rich cultural tapestry. Latin, the Roman language, became the lingua franca of the Western world, influencing numerous modern languages.
Roman architecture and engineering achievements were monumental. They perfected the arch, vault, and dome, constructing enduring structures like the Colosseum, Pantheon, and aqueducts. These engineering marvels not only showcased Roman ingenuity but also served practical purposes, from public entertainment to water supply.
Palestine last event orientationfvgnh .pptxRaedMohamed3
An EFL lesson about the current events in Palestine. It is intended to be for intermediate students who wish to increase their listening skills through a short lesson in power point.
Synthetic Fiber Construction in lab .pptxPavel ( NSTU)
Synthetic fiber production is a fascinating and complex field that blends chemistry, engineering, and environmental science. By understanding these aspects, students can gain a comprehensive view of synthetic fiber production, its impact on society and the environment, and the potential for future innovations. Synthetic fibers play a crucial role in modern society, impacting various aspects of daily life, industry, and the environment. ynthetic fibers are integral to modern life, offering a range of benefits from cost-effectiveness and versatility to innovative applications and performance characteristics. While they pose environmental challenges, ongoing research and development aim to create more sustainable and eco-friendly alternatives. Understanding the importance of synthetic fibers helps in appreciating their role in the economy, industry, and daily life, while also emphasizing the need for sustainable practices and innovation.
Francesca Gottschalk - How can education support child empowerment.pptxEduSkills OECD
Francesca Gottschalk from the OECD’s Centre for Educational Research and Innovation presents at the Ask an Expert Webinar: How can education support child empowerment?
2024.06.01 Introducing a competency framework for languag learning materials ...Sandy Millin
http://sandymillin.wordpress.com/iateflwebinar2024
Published classroom materials form the basis of syllabuses, drive teacher professional development, and have a potentially huge influence on learners, teachers and education systems. All teachers also create their own materials, whether a few sentences on a blackboard, a highly-structured fully-realised online course, or anything in between. Despite this, the knowledge and skills needed to create effective language learning materials are rarely part of teacher training, and are mostly learnt by trial and error.
Knowledge and skills frameworks, generally called competency frameworks, for ELT teachers, trainers and managers have existed for a few years now. However, until I created one for my MA dissertation, there wasn’t one drawing together what we need to know and do to be able to effectively produce language learning materials.
This webinar will introduce you to my framework, highlighting the key competencies I identified from my research. It will also show how anybody involved in language teaching (any language, not just English!), teacher training, managing schools or developing language learning materials can benefit from using the framework.
Instructions for Submissions thorugh G- Classroom.pptxJheel Barad
This presentation provides a briefing on how to upload submissions and documents in Google Classroom. It was prepared as part of an orientation for new Sainik School in-service teacher trainees. As a training officer, my goal is to ensure that you are comfortable and proficient with this essential tool for managing assignments and fostering student engagement.
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...Levi Shapiro
Letter from the Congress of the United States regarding Anti-Semitism sent June 3rd to MIT President Sally Kornbluth, MIT Corp Chair, Mark Gorenberg
Dear Dr. Kornbluth and Mr. Gorenberg,
The US House of Representatives is deeply concerned by ongoing and pervasive acts of antisemitic
harassment and intimidation at the Massachusetts Institute of Technology (MIT). Failing to act decisively to ensure a safe learning environment for all students would be a grave dereliction of your responsibilities as President of MIT and Chair of the MIT Corporation.
This Congress will not stand idly by and allow an environment hostile to Jewish students to persist. The House believes that your institution is in violation of Title VI of the Civil Rights Act, and the inability or
unwillingness to rectify this violation through action requires accountability.
Postsecondary education is a unique opportunity for students to learn and have their ideas and beliefs challenged. However, universities receiving hundreds of millions of federal funds annually have denied
students that opportunity and have been hijacked to become venues for the promotion of terrorism, antisemitic harassment and intimidation, unlawful encampments, and in some cases, assaults and riots.
The House of Representatives will not countenance the use of federal funds to indoctrinate students into hateful, antisemitic, anti-American supporters of terrorism. Investigations into campus antisemitism by the Committee on Education and the Workforce and the Committee on Ways and Means have been expanded into a Congress-wide probe across all relevant jurisdictions to address this national crisis. The undersigned Committees will conduct oversight into the use of federal funds at MIT and its learning environment under authorities granted to each Committee.
• The Committee on Education and the Workforce has been investigating your institution since December 7, 2023. The Committee has broad jurisdiction over postsecondary education, including its compliance with Title VI of the Civil Rights Act, campus safety concerns over disruptions to the learning environment, and the awarding of federal student aid under the Higher Education Act.
• The Committee on Oversight and Accountability is investigating the sources of funding and other support flowing to groups espousing pro-Hamas propaganda and engaged in antisemitic harassment and intimidation of students. The Committee on Oversight and Accountability is the principal oversight committee of the US House of Representatives and has broad authority to investigate “any matter” at “any time” under House Rule X.
• The Committee on Ways and Means has been investigating several universities since November 15, 2023, when the Committee held a hearing entitled From Ivory Towers to Dark Corners: Investigating the Nexus Between Antisemitism, Tax-Exempt Universities, and Terror Financing. The Committee followed the hearing with letters to those institutions on January 10, 202
3. 1.1 Purpose
This document’s purpose is to document the set of requirements
for the development of a software
management system for a bed and breakfast operation. It
describes how reservations and financial
transactions are made. It also specifies the human to computer
graphical user interface screens.
1.2 Scope
This Bed and Breakfast Management System enables a the
automated operation of a 3 bedroom bed and
breakfast business. Customers can call the Bed and Breakfast
reservation phone number and give desired
reservation dates. A staff member can check the available and
give the daily price rate for each room. The
customer can provide a reservation guarantee date. The guest
reservation information will be entered by
the staff member while the customer is on the phone. After the
stay, there is a check out process.
Additionally the owner can generate a profit report to monitor
the financial status of the operation.
1.3 Definitions
4. a. BBMS – Bed and Breakfast Management System
b. Reservation – A room assigned to a guest stay for a specific
date range
c. Guarantee – Financial contract between the management of
the bed and breakfast and a guest that
a room reservation will be available to the guest
d. Workflow – Sequential steps needed to accomplish a task
e. Domain Object – A computer entity that holds information
for a given function
f. User interface – A computer graphical element that enables
the user to interact with the software
g. GUI – Graphical User Interface which the method by which
the user interacts with the BBMS
2. References
IEEE. Std 1016-1998 IEEE Recommended Practice for Software
Design Descriptions. IEEE Computer Society,
1998.
3. Decomposition description
5. Entity Relationship Diagram
This describes the complete ERD for the entire BBMS. It shows
the relationship between domain objects, as
shown in blue, and their services, as shown in gray.
Reservation
Check Out
10. 3.1 Module decomposition
This BBMS is comprised of 4 different components, providing
specific functions of the software system. The
overall design has the following functions: User Interface,
Services, Domain objects, and Database. The high
level architectural context diagram shows how the user
interface, services, and domain objects function
together and how they access the database.
Architectural Context Diagram
This architectural context diagram shows the 4 contexts. The
first is the user interface where staff interact
with the computer. The second is the software services used
throughout the full operation of the BBMS. The
11. third part diagrams the data domain objects contain the data.
The last part is the database that is the
software mechanism of data disk storage and retrieval.
Services
User
Interface
Domain
Objects
Database
Stores
Retrieves
Stores
Retrieves
Manages
Interacts
3.1.1 User Interface
This module contains the GUI functions of user interface. The
12. external part of this system is the computer
monitor, keyboard, mouse. Although not part of the GUI, a
printer is also an external part for printing the
profit report.
Architectural Context Diagram of the User Interface
3.1.1.1 Main Menu
This is the first user interface entity. It gives the user the choice
of starting new reservations, checking out a
guest, and printing the profit report. The Reports selection that
goes to the profit report is password
protected.
3.1.1.2 Calendar Lookup
This displays a calendar with room reservation days in
highlighted date squares on the calendar. The room is
selected by a button. Additionally the daily price rate for the
selected room is shown at the top of the
13. screen. Also the process interfacing with this screen will check
the selected room’s guaranteed reservation
date and if it is expired, the room is marked and displayed as
unreserved.
3.1.1.3 Room Reservation
This is the starting point of making a reservation. The start and
end dates can be entered manually or by a
pop-up calendar button in the date boxes. The room is reserved
and the user clicks the button the create
the reservation and go on the entering guest data. The
reservation can be canceled with the cancel button.
3.1.1.3 Guest Information
Calendar Lookup Room Reservation Guest Information Guest
Payment
Check Out
User
Interface
Main Menu
Print Report
This is where the guest name, address, and credit card
information is entered. The save guest button is then
14. clicked to go to the next screen. If the user wishes to cancel the
reservation, the cancel button is clicked and
the room is marked a unreserved.
3.1.1.4 Guest Payment
This screen is where the user enters the guest’s payment. Also if
the reservation is guaranteed the
guaranteed box is clicked and the guarantee date is entered.
3.1.1.5 Finalize Payment
This screen is accessed by way of the main menu Check Out
button. It lists guest names by room number.
The user clicks the desired guest name and the total amount of
the customer’s bill is displayed. If there is
any balance due the finalize payment button will atomically
charge that amount to the guest’s credit card. If
the is no balance due the finalize payment button only
completes the stay.
3.1.2 Services
This module contains the descriptions of the services required
for the data processing of the BBMS
15. functions. It provides output and input to the user interface and
manages the domain objects. It’s functions
include looking up reservation dates for rooms, making the
reservation, final checkout, and the profit report.
Architectural Context Diagram of the Services
3.1.2.1 CalenderLookup Service
This service retrieves reservation dates for a selected room and
displays the start to end dates on calendar
screen. Since the user is relaying room reservation to the
potential guest over the phone, the daily cost rate
is also displayed on the screen for the selected room.
3.1.2.2 MakeReservation Service
This service is used to reserve the selected room by setting the
room’s reserved flag to true and creating a
reservation record. The reservation record is populated with the
start and end dates. It sets the reservation
16. guaranteed flag and date. This service’s logic is triggered by the
Create Reservation button being clicked on
the user interface screen.
3.1.2.3 AddGuest Service
This service creates a guest record and populates it with the
guest’s name, address, phone number, and
credit card information. This logic is triggered by clicking Save
Guest button on the user interface screen.
Clicking Cancel on that screen will set the room reserved flag to
false and deleting the reservation record.
3.1.2.4 MakePayment Service
CalendarLookup
ReserveRoom
AddGuest
MakePayment
CheckOut
Services
ProfitLossReport
This service makes a payment by the guest for reserving a room.
When the payment amount is obtained, a
17. payment record is created and the guest’s credit card is charged.
This logic is triggered by clicking the Make
Payment button on the screen. If the Cancel Reservation button
is clicked, the room’s reserved flag is set to
false, the customer record is deleted, and the reservation record
is deleted.
3.1.2.5 CheckOut Sercvice
This service is executed upon guest checkout. If there is any
balance due, that amount is charged to the
guest’s credit card. It sets the room’s reserved flag to false.
3.1.2.6 ProfitReport Service
This service calculates the sum of the payment record amounts
and prints the profit report.
3.1.3 Domain Objects
This module contains the descriptions of the domain objects
required for the functioning of the BBMS
functions. These objects contain the data used in the 7 services.
18. Architectural Context Diagram of the Domain Objects
3.1.3.1 Room
This object contains the daily price rate of the room and the flag
stating if it is reserved.
3.1.3.2 Reservation
This object contains the reservation information that is assigned
to a room.
3.1.3.3 Guest
This object contains the guest information that is assigned to a
reservation.
3.1.3.4 Payments
This object contains the payments made by a guest.
Room Reservation Guest Payments
Domain
Objects
19. 3.1.4 Database
This module describes the software mechanism by which data in
the domain objects is stored and retrieved
to the disk drive for long term storage. The database preserves
the data state of the BBMS regardless of
which service is current functioning. Also if the computer is
shut down for maintenance, the database allows
the BBMS to start backup with the same data state that was in
the system before the shutdown.
Architectural Context Diagram of the Database
Database
20. Services
Domain
Objects
3.2 Concurrent process decomposition
This describes the processes from the user interface through the
services to the domain objects. The
services function independently of the user. Also the services
create, update, and delete the domain objects
of the BBMS.
3.2.1 Display Reservation Entity
This entity is used to display reservation dates in calendar
format for a selected room.
3.2.2. Make Reservation Entity
This entity is used to make the reservation of the selected room.
It creates a new reservation, new guest,
and first payment.
3.2.3 Check Out Entity
This entity is use for a selected guest to make payment of any
balance due. It also sets the room the guest
stayed in to available for reservation.
21. 3.3 Data Decomposition
This describes the software entities that contain data for the
operation of the BBMS.
3.3.1 Room Entity
This entity holds data for determining if a room is available for
reservation and also holds the daily rate price
of the room.
3.3.2 Reservation Entity
This entity holds the reservation data for a reserved room.
3.3.3 Guest Entity
This entity holds the guest data associated to a reserved room.
3.3.4 Payments Entity
This entity holds the payment data the a guest pays for the stay
in the room.
4. Dependency Description
22. Data Flow Diagram
Service functions create, update, and delete domain objects
which have the data stored on the disk drive by
the database mechanism.
Services
Reserve
Room
Check Out
25. Retrieves
Stores
Retrieves
4.1 Intermodule Dependencies
There are 4 key modules of the BBMS. They are user interface,
services, domain objects, and the database.
Intermodule Dependency Diagram
4.1.1 User Interface Module
This module is dependent on the service module for the user
GUI operation. It is also dependent on the
domain objects for data entry and display.
4.1.2 Services Module
26. This module is dependent on the data that is contained in the
domain objects.
4.1.3 Domain Objects Module
This module are dependent on the services to process the data
contained in it.
4.1.4 Database Module
This module is dependent on the services module to store,
retrieve, and delete data that is used in the
BBMS. It is also dependent on the domain objects module for
the actual data that is processed in the
services module.
User
Interface
Services
Domain
Objects
Interacts
Manages
Database
Stores
28. 4.2.2 AddGuest is dependent on the MakeReservation service to
create a reservation record so it can update
it with the guest ID number.
4.2.3 MakePayment is dependent on the AddGuest service to get
the guest ID number for the guest
payment.
4.2.4 CheckOut is dependent on the AddGuest service to get the
guest name and guest ID number. It is also
dependent on the MakePayment to get any amount still owed by
the guest.
4.2.4 GenerateReport is dependent on the MakePayment service
to get the sum of the payments made.
ViewCalendar
room: Rooms
reservation: Reservations
setRoomId(integer): void
setReservationId: void
getPrice(double): void
getReservedFlag(boolean): void
getReservationStartDate(date):void
getReservationEndDate(date):void
32. Data dependencies are associated with the process
dependencies.
Data Dependency Diagram
4.3.1 Rooms and Reservations are dependent by roomID.
4.3.2 Reservations and Guests are dependent by guestID.
4.3.3 Guests and Payments are dependent by guestID.
ViewCalendar
room: Rooms
36. Payments
guestId: Intiger
paymentDate: Date
amountPaid: Double
totalAmount: Double
CheckOut
guest: Guests
reservation: Reservations
payment: Payments
room: Rooms
displayGuests(string): void
setGuestId(integer): void
getAmountOwed(double): void
getCreditCardNumber(integer):void
chargeAmount(double): void
setRoomUnreserved(boolean): void
5. Interface Description
5.1 Module Description
The module description of the interface description is a
description of the user interface.
37. User Interface
The user interface provides the users through the use of GUI’s
with the means of interacting with the BBMS
software system. The functions in the user interface gives the
ability to:
1. Check the selected room available by calendar display.
2. Reserve a room.
3. Enter Guest information.
4. Guarantee a reservation.
5. Make initial payment.
6. Checkout.
a. Make final, if any, payment
b. Automatically set the room reserved flag to available
39. Check Out
Reports
5.1.2 Reservation Calendar
The reservation calendar screen presents the user with a
calendar display with colored boxes for the days
that the selected room is reserved. The Previous and Next
Month buttons bring the previous or next month
40. into the display. The Room buttons select the room to check
reservations for. At the top of the screen the
daily room rate price for the selected room is displayed. If the
user wants to make a reservation the Start
Reservation button is clicked, otherwise Cancel returns to the
main menu.
Sun Mon Tue Wed Thu Fri Sat
1 2
8
15
22
29
9
16
23
30
3
42. Daily room rate $120.00
5.1.3 Room Reservation Entry
Reservation Start Date
12/14/2014
Reservation End Date
12/16/2014
Room 1
Room 2
Room 3
Create Reservation
Cancel
Daily Rate $120.00
Guaranteed X Guaranteed Date 12/10/2014
43. 5.1.4 Guest Data Entry
The guest data entry screen provides the user with the ability to
enter the guest’s name, address, phone
number, and credit card information. To save the data entered,
the Save Guest button is clicked. The Cancel
button returns to the main menu.
Cancel Save Guest
44. First Name
Last Name
Address
Phone (999)999-9999
Credit Card Number 999-999-999-9999 Expiration Date
99/99/99
5.1.5 Payment Entry
The payment entry screen display’s the guest’s name and the
daily room price rate for the room. The
Guaranteed box is clicked and the guarantee date is entered if
the reservation is guaranteed. The payment
amount is entered. When the Make Payment button is clicked,
the guest’s credit card is charged and the
45. payment for that guest is stored. If Canceled Reservation is
clicked the guest data is deleted from the
database, the room reserved flag for that room is cleared, and
the system returns to the main menu screen.
John Smith
Daily Room Rate $120.00
Payment Amount $360.00
Make Payment Cancel Reservation
Total Amount $360.00
5.1.6 Check Out
46. The check out screen is displayed when the Check Out button is
clicked from the main menu. A selection list
of names assigned to each room is displayed. The user clicks
the guest name to check out. If there is any
balance still owed by the customer, the Finalize button will
charge any remaining amount owed by the guest
to the guest’s credit card. Also when the Finalize button is
clicked, the reserved flag is automatically cleared
for that room in the room database.
Guest name 1
Guest name 2
Guest name 3
Room 1
Room 2
47. Room 3
Total amount $999.99
Balance Due $999.99
Finalize Cancel
5.1.7 Profit Report
The profit report screen is displayed when the Reports button of
the main menu is clicked. It produces a sum
of all payments made with in enter date range by month and
year. When the Print button is clicked, the
report is printed on the printer. The Exit button returns to the
48. main menu.
Print
Starting
Month 1 2014 Year
Ending
Month 12 2014 Year
Exit
Sum of all Payments:
Month
$999,999.99
5.2 Process Description
This is the descriptions of the processes, known as services,
interface with each other.
5.2.1 CalenderLookup Service
This service interfaces with the MakeReservation service to get
the room is reserved or not flag from the
Rooms.
49. 5.2.2 MakeReservation Service
This service interfaces with the AddGuest service since the
added guest makes the reservation.
5.2.3 AddGuest Service
This service interfaces with the MakeReservation service since
guest information is associated with the new
reservation. It also interfaces with the MakePayment service
since the guest that was added makes a payent
forthereservatin.
5.2.4 MakePayment Service
This service interfaces with the AddGuest service since the
added guest makes the payment for the room
reservation.
5.2.5 CheckOut Sercvice
This service interfaces with the MakeReservation, AddGuest,
and MakePayment services. Since it access the
Rooms, Guests, Reservations, and Payments objects with data
that was created and updated by these
services.
5.2.6 ProfitReport Service
This service interfaces with the MakePayment service. The
common data object is the Payments object. The
50. interface occurs as payments are recorded in MakePayments and
totaled in PorfitReport.
6. Detailed Design
6.1 Module Detailed Design
6.1.1 ViewCalendar Module
This module is a service that uses Room and Reservation
domain objects to display reservation dates in
calendar format as well as the daily room price rate for a
selected room. The module has 2 attributes that
are shown below.
1. room: This attribute holds the select room number used to get
the selected room from the Rooms.
2. Reservation: This attribute holds the reservations object
The functions in this module are:
1. setRoomId(integer): This sets the room selection roomId in
the rooms object to return information
on that room.
2. getPrice(double): This returns the daily rate for the selected
room.
51. 3. setReservationId (integer): This sets the reservation id index
in the reservations object
4. getReservedFlag(boolean): This determines if a room is
reserved or not.
5. getReservationStartDate(date): This gets the starting date of
the reservation.
6. getReservationEndDate(date): This gets the ending date of
the reservation.
ViewCalendar
room: Rooms
reservation: Reservations
setRoomId(integer): void
setReservationId: void
getPrice(double): void
getReservedFlag(boolean): void
getReservationStartDate(date):void
getReservationEndDate(date):void
52. 6.1.2 MakeReservation Module
This module is a service that reserves a room. It gets the
starting date and the ending date of the
reservation. The module has 2 attributes that are shown below.
1. room: This attribute holds room data that is used to update
the rooms object
2. reservation: This attribute holds the reservation data that is
used to add a reservation to the
reservations object.
The functions in this module are:
1. setReserved(boolean): This sets the reserved flag to true in
the rooms object.
2. addReservation(integer): This adds a reservation record to the
reservation object with a reservation
id as the reservation index value.
3. setGuaranteed(boolean): This set the guaranteed flag in the
reservation record of the reservation
object.
53. 4. putGuaranteedDate(date): This puts the guaranteed date in
the reservation record of the
reservation object.
5. putStartDate(date): This puts the starting reservation date in
the reservation object by reservation
Id.
6. putEndDate(date): This puts the ending reservation date in
the reservation object by reservation Id.
MakeReservation
room: Rooms
reservation: Reservations
setReservated (boolean): void
addReservation(integer): void
setGuaranteed(boolean): void
putGuaranteedDate(date): void
putStartDate(date): void
putEndDate(date): void
54. 6.1.3 AddGuest Module
This module is a service that creates and populates a guest
record in the guests object. It also adds the
guestId index value in the newly created reservation record.
The module has 2 attributes that are shown
below.
1. reservation: This attribute holds the reservation index id for
the reservation record in the
reservations object.
2. guest: This attribute holds the guest information used to
create a new guest record in the guests
object.
The functions in this module are:
1. addGuest(integer): This adds a guest record to the guests
object with guestId as the index value. It
also puts the guest id in the guestId index value in the
reservation record of the reservation object.
2. putFirstName(string): This puts the guest first name in the
guest record.
55. 3. putLastName(string): This puts the guest last name in the
guest record.
4. putAddress(string): This puts the guest address in the guest
record.
5. putPhone(integer): This puts the guest phone number in the
guest record.
6. putCreditCardNumber(integer): This puts the guest credit
card number in the guest record.
7. putCreditExpDate(interger): This puts the guest credit card
expiration date in the guest record.
AddGuest
reservation: Reservations
guest: Guests
addGuest(integer): void
putFirstName(string): void
putLastName(string): void
putAddress(string): void
putPhone(integer): void
putCreditCardNumber(integer): void
putCreditCartExpDate(integer): void
56. 6.1.4 MakePayment Module
This module is a service that creates and populates a payment
record in the Payments object. It is indexed
by the guest id value. The module has 2 attributes that are
shown below.
1. guest: This attribute holds the credit card number from the
guest record to charge the payment
against.
2. payment : This attribute holds the data used to create and
populate a payment record in the
payments object.
The functions of this module are:
1. addPayment(integer): This creates a payment record in the
payments object with a guest id as the
index value.
2. putPaymentDate(date): This put the date the payment is made
in the payment record. The date is
57. used for printing the profit report month and by year.
3. putTotalAmount(double): This puts the total amount owed in
the payment record.
4. putPaymentAmount(douoble): This puts the payment amount
in the payment record.
5. getCreditcardNumber(integer): This gets the credit card.
6. chargePayment(double): This charges the payment against the
guest’s credit card.
MakePayment
guest: Guests
payment: Payments
addPayment(integer): void
putPaymentDate(date): void
putTotalAmount(double):void
putPaymentAmount(double): void
getCreditCardNumber(integer): void
chargePayment(double): void
58. 6.1.5 CheckOut Module
This module is a service that charges any remaining payment
amount due by the guest to the guest’s credit
card. It sets the room reserved flag to false. This module has 4
attributes as shown below.
1. guest: This attribute holds the guest name and guest id for
the reservation index value. It also holds
the credit card number if there is any remaining amount owed to
be charged.
2. reservation: This attribute gets the room index number from
the reservation object that is retrieved
by the guest id.
3. payment: This attribute holds any remaining amount to be
paid by the guest.
4. room: This attribute sets the room reserved flag to false for
the room record that is retrieved from
room id n the guest record.
The functions of this module are:
1. displayGuests(string): This displays all the guest names by
59. room number for guest selection in the
GUI.
2. setGuestId(integer): This sets the guest id index value from
the selected guest name in the GUI.
3. getAmountOwed(double): This gets any remaining amount
still owed by the guest
4. getCreditCardNumber(integer): This executes if there is any
remaining amount owed and gets the
guest’s credit card number.
5. chargeAmount(double): This executes if there is any
remaining amount owed and charges it against
the guest’s cred card.
6. setRoomUnreserved(boolean): This accessed the room
number indexed from the reservation record
and sets the room reserved flag to false.
CheckOut
60. guest: Guests
reservation: Reservations
payment: Payments
room: Rooms
displayGuests(string): void
setGuestId(integer): void
getAmountOwed(double): void
getCreditCardNumber(integer):void
chargeAmount(double): void
setRoomUnreserved(boolean): void
6.1.6 PrintReport Module
This module is a service that that adds up the payments by a
selection of months or by year for printing the
profit report. This module has 1 attribute as shown below.
1. payment(double): This is used to adding the payments by date
for a total that is to be printed in the
profit report.
The functions of this module are:
1. getStartDate(date): This gets the starting date of payments to
be totaled from the GUI.
2. getEndDate(date): This gets the ending date of payments to
61. be totaled from the GUI.
3. getPaymentDate(date): This gets the payment date to see if
the payment was made within the
range of dates selected in the profit report.
4. getAmount(double): This gets the amount of the payment
made for the running total of payments
made.
5. printStartDate(date): This prints the starting date of payments
included in the report.
6. printEndDate(date): This prints the ending date of payments
included in the report.
7. printProfit(double): This prints the sum of all payments made
within the selected date range.
PrintReport
payment: Payments
getStartDate(date): void
getEndDate(date): void
getPaymentDate(date): void
getAmount(double): void
printStartDate(date): void
printEndDate(date):void
printProfit(double):void
62. 6.2 Data Detailed Design
6.2.1 Room Entity
This entity is used to represent information contained in a room
record of the Rooms object. It holds the
daily price rate of the room and a boolean flag used to indicate
if a room is reserved or not. There are 4
attributes as shown below.
1. roomId(integer): This is the room number and is the index of
the Rooms object.
2. roomRate(double): This is the daily price rate of the room.
3. reserved (boolean): This is the flag to tell if the room is
reserved or not.
4. reservationId(integer): This is the reservation index id
number of the reservation currently reserving
the room.
63. Rooms
roomId: Integer
roomRate: double
reserved: boolean
reservationId: integer
6.2.2 Reservations Entity
This entity is used to represent a reservation of a room. It is an
added record to the Reservations object. It
holds the reservation dates and guaranteed information. When a
guest record is created in the Guests
object Reservations is updated with the guest ID of the guest
that reserved the room. When a payment
record is created in the Payments object the payment ID is
updated with the payment ID form the
corresponding payment. There are 8 attributes as shown below.
1. reservationId(integer): This is the index value of the newly
created reservation record.
2. startDate(date): This is the starting date of the reservation.
3. endDate(date): This is the ending date of the reservation.
4. guaranteed(Boolean): This is the flag to tell if the reservation
is guaranteed.
64. 5. guaranteedDate(date): This is the date of the guarantee.
6. roomId(integer): This is the room number the reservation was
made for.
7. guestId(integer): This is the index value of the guest ID that
made the reservation from the Guests
object.
8. paymentId(integer):This is the payment index number for the
payment made for the reservation
from the Payments object.
65. Reservations
reservationId: Integer
startDate: Date
endDate: Date
guaranteed: Boolean
guarenteeDate: Date
roomId: Integer
guestId: Integer
paymentId: Integer
6.2.3 Guests Entity
This entity is used to represent the information of the guest who
is making the reservation. There are 6
attributes as shown below.
1. guestId(integer): This is the index number if the guest record
in the Guests object. It is used in the
Reservations and Payments objects.
2. lastName(string): This is the last name of the guest making
the reservation.
3. firstName(string): This is the first name of the guest making
the reservation.
4. address(string): This is the address of the guest making the
reservation.
66. 5. creditCardNumber(integer): This is the guest’s credit card
number.
6. creditCartExpDate(integer): This is the expiration month and
year of the guest’s credit card
Guests
guestId: Integer
lastName: String
firstName: String
address: String
phoneNumber: Integer
creditCardNumber: Integer
creditCardExpDate: Integer
6.2.4 Payments Entity
This entity is used to represent payments made by guests in the
BBMS operation. There are attributes as
67. shown below.
1. guestId(integer): This is the ID number of the guest making
the payment.
2. paymentDate(date): This is the date that the payment was
made. This date is used in the
PrintReport service so a start and end range of dates can be
selected.
3. amountPaid(double): This is the amount of the payment made
by the guest.
4. totalAmount(double): This is the full amount the guest is to
pay. It is calculated by the room rate
multiplied by the number of days in the stay.
Payments
68. guestId: Intiger
paymentDate: Date
amountPaid: Double
totalAmount: Double
Scenario
You have been asked to lead a software development team to
build a system fulfilling the Statement of Need specified in
project 1. Your team is employed by a small company. The
customer wants a project that balances reasonable development
cost, timely delivery, software quality, and functionality.
In this project, you will work as part of team to define, refine,
and proof test case descriptions for the B&B system. If you do
not submit project 3 as part of a team you shall receive a zero
for this project.
Assume that the code for your B&B system has been developed
based on the SDD whose requirements trace through the SRS to
the SS. The next step is to develop a software test specification
(STS) that describes the test cases that you will perform to
verify correctness and validate compliance to customer
requirements of your B&B system.
You will select components from the Architectural Context
Diagram (ACD) for the B&B system and using the derived use
case and software requirements set for each software component
(as detailed in project 2) write the complete set of associated
white and black box test case definitions.
Completing this project will require that you produce a software
test specification (STS) document for the system. The objective
is to produce a cookbook for testers. A tester really only needs
the STS, the test environment, the test tools, the test data, and
of course, the software.
STS Templates
Please develop your STS using the IEEE Standard for Software
69. Test Documentation, standard 829-1998, posted in the Course
Resources > eReserves.Section6 in the IEEE Std 829-1998 is
most relevant to this assignment, so focus on completing this
section as thoroughly as you can.
The assignment
Complete the template as best as you can. Make any reasonable
assumptions based on your understanding of the problem that
allow you to address as many sections of the STS template as
possible. (Please read the “project descriptions” in the project
description section of the syllabus for additional context and
information on course projects).
Pay special attention to the following. The bulk of your grade
will be decided on how well you address these issues.
· Detailed Test Environment description - including test
hardware, software, test tools, and data
· White Box Test Cases (at least two): including; name of
the component being tested, test inputs, and expected outputs
· Black Box Test Cases: Select (at least) two components from
your ACD and using the derived use cases, scenarios, and
software requirements set for each of those components (from
your SRS), write the complete set of associated black box test
case definitions, including; name of the component being tested,
test inputs, expected outputs, and requirement(s) from the SRS
being tested.
· Traceability matrix: Each test case is used to assess
compliance to a SRS/SS requirement (i.e., Black Box) or to
assess correct computation, e.g., correct inventory level (i.e.,
White Box). Your Test Cases should trace to one or more SRS
requirements. See Table 4.4 (week 5 activities module 4
reading: Testing Strategies and Techniques) for an example of a
Traceability Matrix. (Please endeavor to use the use
cases/scenarios and requirements as you specified them in your
SRS).
Also please see chapter 7: Software Testing and chapter 8:
Software Testing Strategies from the online text (Books 24x7:
Software Engineering, Second Edition by Bharat Bhushan
70. Agarwal and Sumit Prakash Tayal) for additional context and
information on testing.
Section 7.6 discusses white-box testing; section 7.7 discusses
black-box testing; section 7.9 discusses test case design;
Hints and suggestions
1. For the STS, we shall be using only a subset of the IEEE
template; specifically section 6 of the IEEE (Test Case
Specification). Refer to Module 4 (week 5 activities module 4
reading: Testing Strategies and Techniques) for information on
software testing and examples of black-box and white-box test
case definitions. Remember: Each test case is used to assess
compliance to a SRS/SS requirement (i.e., Black Box) or to
assess correct computation, e.g., correct inventory level (i.e.,
White Box). Here are the details required for each test case
description:
· Test objective
· unique test case identifier
· input specification
· output specification
· special environment conditions
· special procedural requirements
· execution procedure steps
· dependencies
2. You are encouraged to select and use any one of your team
member's ACD, use cases or requirements set to complete this
assignment. Collaborate with your team and decide who has the
best representation to use.
Make sure your work is neat and legible. Your charts,
illustrations and diagrams can be done using any word
processing, drawing, and/or software CASE drawing tool (or by
hand) as long as it is neat and organized. Embed or scan any
diagrams that you create in your STS document—do not upload
them separately.
71. SRS Homework Project for
David M. Jones
Bed and Breakfast Management System
SRS
1. Introduction
1.1 Purpose
The purpose of this SRS document is to provide a detailed
description of the Bed and Breakfast Management System. It
will detail the purpose and features of this software and
hardware system. It will describe what the system will do and
its constraints. Also it will detail human interaction, program
input and output.
1.2 Scope
This system will be a Bed and Breakfast Management System. It
will manage reservations and monitor expenses and profits. The
design is to enable automatic reservations based on room
availability by a given date. The will enable customers enter
72. desired stay and duration dates to see what rooms are available
and what the rate is. Once the start and end dates for the
selected room are entered, the customer will make a reservation
by paying a deposit payment for one day. The payment is made
by entering a credit card number. In addition to payment
information, the customer's name, address, and phone number
are inputted. Reservations are held without guarantee for an
agreed upon date. If the reservation is not guaranteed by that
date, the reservation will be dropped.
1.3 Definitions, acronyms, and abbreviations
Guest – The person paying to stay at the bed and breakfast
Guarantee – A contract between the owners of the bed and
breakfast and the prospective guest the the selected room will
be available within the reservation dates
ERD - Entity Relationship Diagram
1.4 References
IEEE. IEEE Std 830-1998 IEEE Recommended Practice for
Software Requirements Specifications. IEEE Computer Society,
1998.
1.5 Overview
The next section, Overall Description, of this document
provides an overview of this system's functionality. It describes
the product functions , requirements for its operation, and
expected operation outcome. The Specific Requirements section
is written primarily for the development of the software for this
system and details the system functionality.
2. Overall description
2.1 Product Perspective
73. The Bed and Breakfast Management System is a self-contained
system. It is a system that can be used with any Bed and
Breakfast operation. It that has 2 main database structures. The
first database structure is for room reservations. It has the
following entities: room availability, rate, reservations,
customer information. The second database structure is for
financial record keeping. It has the following entities: AR, AP,
GL and record the customer payments. The GL has the profit-
loss report. The financial database receives input from
payments. It is used for all financial transactions. It also has
user input for expenses and output for monies in payments, and
the profit-loss statement. There are two types of users: customer
and supplier. The hardware is a network of desktop computers, a
central computer that manages the databases, and an Internet
web server that is a service leased from a web server company.
The operating system are Windows 7 Profession for staff users,
Linux for the database server of the reservation and financial
systems.
2.2 Product Functions
The functions of the Bed and Breakfast Management System are
as follows.
2.2.1 Room reservation lookup
2.2.2 Reservation entry
2.2.3 Guest entry
2.2.4 Guest check out
2.2.5 Payment processing
2.2.6 Profit report
2.3 User characteristics
The users of the BBMS are staff and managers of a small bed
and breakfast operation. They have sufficient knowledge on
using the Windows operating system and computer hardware.
74. They will have training on operating the BBMS software.
2.4 Constraints
There are no constrains other than what is needed to operate a
small bed and breakfast operation.
2.5 Assumptions and dependencies
In order for the BBMS to operate the following assumptions are
made:
2.5.1 The business provides a computer on which the BBMS can
run.
2.5.2 The business provides a telephone service with which the
customer can call in to make a reservation.
3. Specific Requirements
3.1 External interface requirements
The requirements are to enable the user interaction with the
BBMS.
3.1.1 User interfaces
3.1.1.1 Main menu – Displays choice of making a reservation,
checking a guest out, and printing the profit report.
3.1.1.2 Calendar – Displays any reservations by calendar days a
room may have.
3.1.1.3 Reservations – Provides a means to make a reservation
3.1.1.4 Check out – Charges any amount owed by a selected
guest and removes the reservation for the room the guest stayed
in.
3.1.1.5 Profit report – Display the total of all payments made by
75. a given range of months.
3.2 Objects
The following is a decomposition of attributes and methods as
represented in the ERD.
3.2.1 Rooms
The Room attributes are:
3.2.1.1 roomNumber – The room number
3.2.1.2 dailyRate – The cost per day to stay in the room
3.2.1.3 reserved – A boolean value to indicate if a room is
reserved or not
3.2.1.4 reservationId – The ID number belong to the reservation
assigned to the room
3.2.2 Guests
The guest attributes are:
3.2.2.1 lastName – The guest’s last name
3.2.2.2 firstName – The guest’s firstname
3.2.2.3 address – The guest’s address
3.2.2.3 phoneNumber – The guest’s telephone number
3.2.2.4 creditCardNumber – The guest’s credit card number
3.2.2.5 creditCartExpDate – The expiration date of the credit
card
3.2.3 Reservations
3.2.3.1 guestId - ID number of guest who is making the
reservation
3.2.3.2 roomId – The room number the reservation is made for
3.2.3.2 roomNumber – The room number the guest will stay in
3.2.3.3 startDate – The first day of the stay
76. 3.2.3.4 lastDay – The last day of the stay
3.2.3.5 guaranteed – A boolean value to indicate if the room is
reserved
3.2.3.6 guaranteeDate - The date the reservation guaranteed for
3.2.4 Payments
3.2.4.1 guestId - ID number of guest who is making the payment
3.2.4.2 paymentDate – The date the payment was made
3.2.4.3 amountPaid – The amount paid for the room so far
3.2.4.4 totalAmoutn – The total amount that is payable