1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Step2247 [10]
3 years ago
8

Book checkout scenario at a library: The Worker tells the System the identity of a patron who wishes to check out books. The Sys

tem confirms that the patron is allowed to check out books and remembers the patron's identity. The Worker tells the system the identity of a book this patron is checking out. The System confirms that the book can circulate based on book type, calculates the due date based on whether the patron is a faculty member or a student, and records that the patron has checked out this book, which is due on the calculated due date, and makes that information available from the library catalog. The System tells the Worker the due date (which also confirms that the book has been checked out).
Identify two valid classes, one class generalization, and two valid associations from the problem scenario provided.
Computers and Technology
1 answer:
Alinara [238K]3 years ago
8 0

Answer:

Check the explanation

Explanation:

To solve the above question.

The two valid classes are:

1. Patron_identity

2. Books

Class generalization can be between Books and Patrol_identity to create a new superclass for All The Books that this patron has ever checked out.

Two valid associations can be between:

1.Patron_identity and books

2.Books and library catalogue

You might be interested in
Which 1898 film did George Melies create using camera trickery to create a illusion in which we now
8_murik_8 [283]

Answer:

four heads are better than one

Explanation:

4 0
3 years ago
Steve left his computer switched on in his room and went out to have breakfast. When he returned, he saw that the monitor had be
yanalaym [24]

Answer:

B

Explanation:

5 0
3 years ago
The conventional wisdom concerning the security frameworks of domains is that it is always preferable for an organization to cre
Valentin [98]

Answer:

False

Explanation:

A Domain Based Security. "Domain Based Security", abbreviated to "DBSy", is a model-based approach that is being used in analyzing information security risks in a business context and offers an apparent, understandable and direct mapping among the risks and the security controls needed to handle them.

While A security domain is the list of items a subject is permitted to access. More largely defined, domains are collections of subjects and objects with related security requirements.

6 0
4 years ago
While a threat intelligence analyst was researching an indicator of compromise on a search engine, the web proxy generated an al
inna [77]

Answer: the corret answer C. The analyst has prefetch enabled on the browser in use.

Explanation:

The analyst has like an indicator which is prefetch enabled on the browser in use.

7 0
3 years ago
What is the device called which typically combines the capabilities of a scanner, printer, fax, and copying machine?
maria [59]
The device which typically combines the capabilities of a scanner , fax ,and copying machine is called an input device.
5 0
3 years ago
Other questions:
  • A Web ____ is a software program that retrieves the page and displays it. Select one:
    5·1 answer
  • What is primary storage
    11·2 answers
  • Your employer gives you a list of all chemicals in the entire building and the location of the SDS collection, and he asks you t
    15·2 answers
  • If you want to open the Navigation pane to do a Find, what should you first click on the Home tab? Paragraph, Editing, Styles, o
    15·1 answer
  • What are the advantages and disadvantages of fortran?
    13·1 answer
  • For the function definition int SomeFunc( /* in */ int alpha, /* in */ int beta ) { int gamma; alpha = alpha + beta; gamma = 2 *
    6·2 answers
  • Which item is essential to know before sketching a navigation menu flowchart?
    7·2 answers
  • Please answer me <br> in Assignment - Algorithms
    10·1 answer
  • Write an expression in Boolean algebra that evaluates to 1 when an odd number of bits of the number is 1 and 0 otherwise
    14·1 answer
  • Over the last decade, the overall energy consumption of cloud data centers worldwide has remained relatively the same. Why is th
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!