Preview

Ooad Design Specifications

Satisfactory Essays
Open Document
Open Document
427 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Ooad Design Specifications
ooad

Restaurant All-in-one Management System (RAMs)
Design Specification with UML

by

Leung Chun Kit and Leung Ting Fong
03011720 and 03011739
(Group 22)

COMP 2221
Lecturer: Prof. Jiming Liu
December 4, 2004 I. Table of Content

I. Table of Content 1

II. Graphical Notion Used 2

Notation of Use Case Diagram 2 Notation of Class Diagram 2 Notation of Sequence Diagram 3

1. Use Case Diagram 4

1.1. Use Case Diagram of End User Acting with the RAMsystem 4

2. Class Diagram 5

2.1. Class Diagram of RAMsystem 5

3. Sequence Diagram 6

3.1. Sequence Diagram of staff 6 3.2. Sequence Diagram of manager 8 3.3. Sequence Diagram of administrator 9
II. Graphical Notion Used

Notation of Use Case Diagram
[pic]

Notation of Class Diagram
[pic]
Notation of Sequence Diagram
[pic]
1. Use Case Diagram

1. Use Case Diagram of End User Acting with the RAMsystem
Description:
End users(administrator, manager, staff) can perform ordering, editing ,checking and management function insider the RAMsystem. End user can use food ordering function and food editing function only bill had been created by user. Only manager can manage the duty roaster. No one can edit the database or checks the password database execpt the administrator.

[pic]
2. Class Diagram

1. Class Diagram of RAMsystem
Description:
All user and database of RAMsystem is created by the administrator. Administrator can modify any of the data in the RAMsystem. Staff and manager can create or edit bill but only manager can edit duty roaster. Bill has id, date and cost. Each bill has a unique id. User can be categorized into 3 types, administrator, manager and staff. All users have their own unique id and password. Both the administrator and the other user can change their own password. However, administrator can change the password everyone.

[pic]
3. Sequence Diagram

1. Sequence Diagram of staff
Description:
Staff can only add order,

You May Also Find These Documents Helpful

  • Better Essays

    This IT security report will go over the top security IT threats, security considerations, security policies, and awareness training. The security report will help the design team protect the new system from the threats that have been identified during the design phase of the new system. At the end of this report there will be provisions suggested that will help Kudler Fine Foods internal staff to help validate security measures once the new program is up and running so they can keep the system safe from hackers, attacks or any…

    • 2101 Words
    • 8 Pages
    Better Essays
  • Good Essays

    • Manager – user/users group with access rights to change all database information, including database ACL, replication and local encryption settings;…

    • 767 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Report Tma04

    • 4361 Words
    • 18 Pages

    as a Breakfast Manager and Inventory Manager Assistant. My roles and responsibilities consists of opening procedures, which are mainly ensuring there is sufficient raw materials available for a smooth breakfast operation, cash handling procedures, which are mainly ensuring there is enough change on the floor available for staff by following company security guidelines, rotation of raw food, following the "first in first out" procedures by monitoring use by dates. This is to maintain the branch's financial position by minimize waste and also provide the best possible quality food for our customers. My daily responsibilities also includes ongoing training and coaching, providing corrective feedback to my crew members, ensuring the correct procedures are followed and maintain a good working…

    • 4361 Words
    • 18 Pages
    Powerful Essays
  • Powerful Essays

    Privileged Users will be presented the ROB for Users with Privileged Access to Information Systems. Non-Privileged Users are required to select the appropriate ROB at first login per database prior to receiving access to the application. If a user elects to decline the ROB, access to…

    • 1211 Words
    • 5 Pages
    Powerful Essays
  • Powerful Essays

    Nt1330 Unit 1 Study Guide

    • 1178 Words
    • 5 Pages

    They are the responsible to manage the DBMS’s use and also creating, modifying and maintaining the database. Which to ensure the database is functioning properly.…

    • 1178 Words
    • 5 Pages
    Powerful Essays
  • Good Essays

    Use least-privileged accounts, consider the granularity of access, enforcing separation of privileges, secure the system resources against system identities DB system having multiple administrators…

    • 1000 Words
    • 4 Pages
    Good Essays
  • Better Essays

    Cmgt400 Week3

    • 1493 Words
    • 6 Pages

    Security authentication is, as defined by our text, “the process of establishing a user 's identity to enable the granting of permissions.” This is a rather simple definition of a process that has many different areas and permutations that it encapsulates and includes within its scope. In order to better illustrate the concepts and requirements of a viable information security plan, they will be applied to Kudler Fine Foods. The final analysis of the weaknesses and strengths in the current setup of Kudler Fine Foods information security setup will provide a good direction for the new policy to be implemented.…

    • 1493 Words
    • 6 Pages
    Better Essays
  • Good Essays

    Pm3110 Unit 1 Paper

    • 529 Words
    • 3 Pages

    • Data Administrator – control the access permissions and privileges, install the new DBMS, data available in consistent form, provide scope for data recovery and data security…

    • 529 Words
    • 3 Pages
    Good Essays
  • Good Essays

    | 5. Batches checks 6. Sends checks to cashier 7. Uses payments stub to enter payments into computer…

    • 787 Words
    • 4 Pages
    Good Essays
  • Better Essays

    Week 2 Individual

    • 852 Words
    • 3 Pages

    To create a database environment for Smith Consulting so they can track their consulting staff, each staff’s member skill sets, and what projects they are working on, they require the installation of a databases setup such as, Microsoft SQL Server, DB2, or Sybase in their machines as well as a separate server room for the database to maintain the connections and servers. To handle this database environment, the Smith Consulting also requires database administrators for each database who can maintain the database at every situation and make it easily accessible to the users who are working on it. (Verdiem Corporation, 2014) This is a kind of decision making process is one in which the management needs to decide which server they need to install so that they achieve the above mentioned goals within the organization. Let’s assume the management installed the Oracle database environment in their machines as well as in the separate database room. Now it is responsibility of the database administrator to properly handle the database environment so it is mostly recommended by all of the DBA’s to install the database server at a remote location which makes it less likely to be hacked and adds stability while using it. Another important role of the DBA is to have proper access to the database and based on the requirements and specifications to assign the permissions for the database to the management such as read, write and execute permissions. This will create the scenario of giving write permissions to the HR department which normally handles the new and old employees staffing. Now the HR department will update about the staff’s projects which means, which employees are allocated to which project and which employees are yet allocated to any projects. Write permissions are also given to the managers of every…

    • 852 Words
    • 3 Pages
    Better Essays
  • Good Essays

    Unit 3

    • 680 Words
    • 3 Pages

    SQL injections can be used to enter the database with administrator rights in which are also the…

    • 680 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Within settings, designated people will be responsible for different areas. The ultimate responsibility lies with the manager. Other…

    • 3144 Words
    • 13 Pages
    Good Essays
  • Better Essays

    This paper will discuss a better way to control user access to data is to tie data access to the role a user plays in an organization. It will cover the value of separating duties in the organization. Then discuss the value of using roles to segregate the data and system access needs of individuals in the organization. Then describe in detail why a role-based access control system (RBAC) would be the best way to accomplish this. Finally, how to handle distributed trust management issues for users going to or from business partner networks.…

    • 1167 Words
    • 4 Pages
    Better Essays
  • Satisfactory Essays

    whether its deciding on dinner or picking out floor plans for a new home. But…

    • 361 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    The topic is “designer babies.” Pre-natal screening for certain conditions like Down Syndrome is common practice, at least in places that offer that option. But now there’s a fertility clinic in Los Angeles that says it will soon help couples select for non-medical markers. It’s already possible to choose your unborn child’s gender. As genetics research advances, parents may soon have many more choices available to them: their child’s size, hair color, and intelligence. Because of gene technology, inherited diseases may someday be a thing of the past.…

    • 450 Words
    • 2 Pages
    Good Essays

Related Topics