This website uses cookies to ensure you have the best experience. Learn more

Unix Essay

580 words - 3 pages

Suppose you are helping to develop a library system for your community. Here is a brief description of various scenarios using this library system.
• Bob wanted to become a member at his local library. He went in and filled out an application form with his name, address, phone number, and driver's license number and gave it to the librarian, Alice. Alice logged into the system with her id and created a new membership for Bob. She then provided Bob with his new library card, and a login and password to his account.
• Bob wanted to borrow two novels by C.S. Lewis, but he couldn’t remember their names. He used one of the computers at the library to search for the books by using the author's name. He found the titles he wanted, which were “The Chronicles of Narnia” and "The Space Trilogy". ...view middle of the document...


• Before leaving the library, Bob saw his friend Simon. He chatted with Simon (quietly), and asked if he was a member and came to the library often. Simon said yes he was, and that he came every day before work and read both the local paper and the New York Times in the periodicals room. He liked that the library provided the papers, so that he did not need to buy them both himself.
• Bob was very anxious to read "The Space Trilogy", so every day at home he would login to the library system and check the status of the book. Every day its status showed as recalled, but finally one day its status changed to reserved, which meant that it was ready for him to pick up. He brought "The Chronicles of Narnia" with him since he had finished it, and put it in the slot outside the library to return it.
• By the time Bob finished reading "The Space Trilogy" it was overdue. For this reason, when he returned it to the library, rather than dropping in the slot outside, he went to the librarian at the desk to return it and paid the fine on his account.
• After two years, Bob needed to move to another city. He went to library and cancelled his library membership with the librarian.
Please answer the following questions, and submit your assignment as a single Word document with all diagrams inserted into that one document:
1. Identify all actors and use cases from the above description and draw a use case diagram for this library system.
2. Draw a class diagram (or split it into multiple diagrams if it cannot fit in one diagram) for entity objects based on the above description. For each class show the class name, major attributes and operations. Draw associations between classes, and indicate multiplicity at the association endings.
3. Draw a state diagram to show the status change of a book in library.
4. Briefly describe the architecture design of this library system.

Other Papers Like Unix

Linux And Windows Server Critique Essay

2469 words - 10 pages Linux versus Windows The purpose of this document is to explore the benefits or disadvantages of using UNIX® or Linux® versus Windows Server® for company business operations at Kudler Fine Foods. Background Three grocery stores in southern California comprise Kudler Fine Foods. Employing approximately 150 people, Kudler caters to people who enjoy gourmet-class foods, first-rate service, and a friendly atmosphere helps make a pleasant

Eed 430 Week 5 Assignment Integrated Unit

355 words - 2 pages requirements. ·  Option 2: Write a 2-page paper that explains the differences in memory management between Windows® and Linux®. Format your paper consistent with APA guidelines. UNIX/Linux Versus Mac Versus Windows Write an 8- to 10-page paper that compares and contrasts the basic system differences between UNIX®/Linux®, Mac®, and Microsoft ® Windows® operating systems. Include discussion and comparison of the following

Sec280-Week2

602 words - 3 pages Dear CIO, It has come to my attention that you are wondering why I should secure Windows and our Unix/Linux servers from shortcomings and vulnerabilities. I will explain to you what I plan to do about these. So, you can understand what these are I will explain to you first what shortcomings are and how they work. Next, I will explain what vulnerabilities are and how they work. Then, I will explain to you what my plan of action to ensure our

Inside The Internet

762 words - 4 pages message processor allowed two computers to “talk” with each other. With this ability email was added in and dominated the traffic on the ARPANET. The addition of email created a dynamic social human network and showed the social potential of the Internet. Over at Bell Laboratories, Dennis Richie created the UNIX, a user-friendly operating system. The system was licensed to the academic world. Nearly every university adopted Bell Telephone’s UNIX

Pos 355 Week 3 - Gnu Public License

643 words - 3 pages | Open and Closed Source Systems | GNU Public License and It’s Role | Type College Here | [Type the author name] | 5/13/2013 | | GNU General Public License To start, a GNU is a Unix-like OS that gives users complete freedom to modify or edit the software as they see fit. (GNU.org, 2013) “A Unix-like operating system is a software collection of applications, libraries, and developer tools, plus a program to allocate

Copy Cat

307 words - 2 pages sophisticated developing environment which helped these graduates succeed in the industry as UNIX was being spread throughout the world. What are multiuser systems? Why are they successful?Multiuser is a term that defines an operating system or application software that allows access by multiple users of a computer. They are so successful because they allow for collaborative projects to be conducted with much more ease and efficiency. What is the

Introduction To Network Security

428 words - 2 pages because the software is developed by computer scientists and engineers. Faults are a precise interaction of hardware and software that can be fixed given enough time. 15. The Chief Information Security Officer (CISO) 16. It was the first and operating system created with security as its primary goal. Shortly after the restructuring of MULTICS, several key engineers started working on UNIX which did not require the same level of security

Huffman Trucking Paper

471 words - 2 pages three major players to choose from: Microsoft, Mac OS and Unix. (Linux, of course, was also available, but it was—and still is—used primarily by computer “hackers” and other IT gurus who needed little in the way of software or network training. And since guys like that don’t often find employment at small transport-hauling companies, Huffman ended up using Microsoft 3.x and 9x as their primary operating systems. The decision to use a

Hardware & Software Concepts

572 words - 3 pages computer language was the UNIX operating system developed in? The high-level computer language was written in C. 19. An internal system within a company using a browser and web technology is called what? An internal system within a company using a browser and web technology is called intranet. 20. What is the purpose and function of DNS (Domain Name Service)? To identify the IP address of the Web server to which the request is to be sent.

Dr; Gtjkn

467 words - 2 pages system is up and running. 8. What is a mount point? A. A mount point is a term used to describe where the computer puts the files in a file system on Unix-like systems. 9. How many primary drive partitions are supported on computers that still conform to the standard established by MS-DOS? How many total partitions can a standard computer disk [IDE/SATA] support? How many does the SCSI support? A. 4 primary partitions, Due to

Objective C

556 words - 3 pages (C and Unix-style operating systems), which it includes and extends. The extensions presently include a complied and an interpreted implementation of Objective-C (an object-oriented programming language based on C) and several libraries of reusable components (ICpaks). Smartphones provide applications that are increasingly similar to those of interactive desktop programs, providing rich graphics and animations. To simplify the creation of

Related Essays

Guide To Unix Using Linux Essay

1150 words - 5 pages Review Questions 1. b cat > Meeting 2. a cal 3. a Ctrl + b 4. d passwd 5. c man cat 6. d System V 7. a Bash shell 8. c cat >> Annual_Report 9. b log in remotely to another computer on a network 10. d the administrative account that has complete access to a UNIX/Linux system 11. c tail –n 2 project 12. a q 13 A SUSE Linux Enterprise B Mandriva C Fedora D Red Hat Enterprise Linux 14. a less

Unix/Linux Versus Mac Versus Windows Essay

4984 words - 20 pages systems provide a basis for application programs and intermediate between the computer’s user and its hardware. There are many different types of Operating serves that are available to use. There are four main Operating systems that are used in today’s Technological world: UNIX, Linux, Mac, and Windows. Each one of these systems has its own unique aspects to offer users, while still sharing the same basics that an operating system needs. Memory

How The Unix Permission System Implements Access Control

440 words - 2 pages Explain how the UNIX permission system implements access control. Describe an extension of this system that permits finer control. Access Control in Unix UNIX has an implementation of access control lists for providing the features of security to its users. Every user has a right to log into the system with his/her credentials (username and password) and initiate a process which can further make system requests. Every process is assigned a

Comparison Between The Unix And The Windows 2008 Servers

1747 words - 7 pages Comparison between the UNIX and the Windows 2008 servers Instructor Keating   ECPI University CIS305 Advanced UNIX Administration   June 15, 2013 There are many reasons that I choose this speaking about the UNIX server verses the Window 2008 server but mainly it was the fact that I had no idea how this server worked and why it was so important. At first when I heard of UNIX it didn’t seem important at all in fact all I could remember