1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
omeli [17]
3 years ago
13

An online conference room reservation system lets a user reserve rooms. The user is required to enter contact information and re

servation detail before saving the room reservation. Which of the following identifies the use cases?
a)
Reserve Room.

b)
Reserve Room, Enter Contact Information, Enter Reservation Detail.

c)
Reserve Room, Enter Contact Information and Reservation Detail.

d)
Reserve Room, Save Reservation.
Computers and Technology
1 answer:
lisov135 [29]3 years ago
7 0

Answer:b)Reserve Room, Enter Contact Information, Enter Reservation Detail

Explanation: The use case is described as actors , actors goal, usage of use cases, units of scope and initial point and terminating point of use cases .

The situation mentioned in the question will take place for the reservation of the room through the instances in the form like filling the contact details for the identification , filling out reservation information as well for getting the knowledge about the room requirement by the person.

These details help in reaching out the particular person if required, number of days he wants to book the room,any extra facility he would like to have etc. After these detail filling activity the room can be reserved successfully.Thus , the most appropriate option is option (b).

Other options are incorrect because room reservation cannot be done without any formality as mentioned in the question and entering contact detail and reservation detail one by one.

You might be interested in
What are the oop concept of java
mash [69]

Answer: OOP concepts in Java are the main ideas behind Java’s Object Oriented Programming. They are abstraction, encapsulation, inheritance, and polymorphism. Grasping them is key to understanding how Java works. Basically, Java OOP concepts let us create working methods and variables, then re-use all or part of them without compromising security.

HOPE THIS HELPED IS NOT SORRY.

4 0
3 years ago
Read 2 more answers
I need help with this​
Elodia [21]
The answer is number 2.
8 0
3 years ago
15)Which of the following statements is generally true about a V8 engine...
Vladimir79 [104]

Answer: Generally, there is an increase in power with a V8 engine.

Explanation:

A V8 engine has a bigger engine that cars with a V4 or V6 engines. They can go faster and gain speed at a faster rate than the other cars. They are not good on gas and use more gas than other cars with smaller engines.

Two things that are great about having a V8 engine is the torque and the power output. One of the most powerful engines with a V8 is a Dodge Challenger SRT. These engines are usually in bigger trucks and sports cars.

7 0
3 years ago
Which of the following statements accurately describes the early history of digital recording?
Alchen [17]
I would like to say that it was D. If I am not correct, try asking this in history.
6 0
3 years ago
Who invented the balloons?
Alexandra [31]
<span>Professor Michael Faraday</span>
6 0
3 years ago
Read 2 more answers
Other questions:
  • What type of device is built into a tablet computer and can send data over radio waves to another device such as a laser printer
    10·1 answer
  • What exactly does the value recorded in a single dimension of a sift keypoint descriptor signify?
    15·1 answer
  • This measures how close a biometric reading is to a prerecorded template
    11·1 answer
  • The entirety of a packet at one layer becoming the payload section at another layer is known as
    8·2 answers
  • What is the relationship between a method and a function
    11·2 answers
  • How are modern computers different from eniac?
    5·1 answer
  • (BRAINLIEST QUESTION) What are some challenges that will need to be overcome in order for the Internet of Vehicles to become a r
    13·1 answer
  • When performing actions between your computer and one that is infected with a virus, which of the following offers NO risk of yo
    11·2 answers
  • Why are you unable to modify the budget file, when you have the allow full control ntfs permission?
    5·1 answer
  • In this class, it is very common for your computer screen to look like this. What is this?​
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!