Case Study - Library System
The librarian will access the system to issue books, record reservations, generate return requests for reserved books and record books being returned. Returning a book may involve generating an availability notification if the returned book has been reserved by another member. If an availability notification is generated then the librarian sends it out to the member. When a book is requested to be issued or requested to be reserved then the system validates details on the membership card as well as validating that the requested book is one stocked by the library. If the membership card is invalid or the library does not stock the book then the request is rejected. If a book is requested for issue but is on-loan then that book will be reserved. Members of the library can display details of books stocked. The subscriptions section deals with membership issues e.g. renewing membership cards on an annual basis etc. The purchasing section deals with adding new books to the library.
There may be multiple copies of books held in the library. When a book is borrowed the borrowing date is noted and when the book is returned the return date is noted. The details held about each reservation include who the current borrower(s) is and who has reserved the book.
When a copy of a book arrives from the suppliers, it is held in storage until its details are registered on the system. These details include the number, author and title of the book. Once registered the copy is put in the lending shelf which means that it is available to be borrowed. When a copy is returned, if the book has been reserved then the copy is held in a reservation area otherwise it is returned to the lending shelf. If a copy is reported lost by the borrower then the copy details are deleted from the system by the librarian.
A reservation
Reservation
Number:
Date:
Book
Number:
Title:
Author:
Reserver
Number:
Name:
Address:
Current Borrower
Number:
Name:
Address:
-Produce use case diagrams and a set of associated sequence diagrams for the above case study.
Correct Answer:
Verified
View Answer
Unlock this answer now
Get Access to more Verified Answers free of charge
Q2: Under the three-phase commit protocol, discuss how
Q3: Consider six transactions T1, T2, T3, T4,
Q4: One of the most well-known methods for
Q5: Using the above transactions, demonstrate how Obermarck's
Q6: Discuss why traditional transaction management protocols are
Q8: Give your definition of an Object-Oriented Database
Q9: Despite the superior expressive power of the
Q10: Object databases have roots in both programming
Q11: Discuss the concept of object identifiers (OIDs)
Q12: Discuss how OIDs differ from C++ pointers.
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents