1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Step2247 [10]
3 years ago
8

Book checkout scenario at a library: The Worker tells the System the identity of a patron who wishes to check out books. The Sys

tem confirms that the patron is allowed to check out books and remembers the patron's identity. The Worker tells the system the identity of a book this patron is checking out. The System confirms that the book can circulate based on book type, calculates the due date based on whether the patron is a faculty member or a student, and records that the patron has checked out this book, which is due on the calculated due date, and makes that information available from the library catalog. The System tells the Worker the due date (which also confirms that the book has been checked out).
Identify two valid classes, one class generalization, and two valid associations from the problem scenario provided.
Computers and Technology
1 answer:
Alinara [238K]3 years ago
8 0

Answer:

Check the explanation

Explanation:

To solve the above question.

The two valid classes are:

1. Patron_identity

2. Books

Class generalization can be between Books and Patrol_identity to create a new superclass for All The Books that this patron has ever checked out.

Two valid associations can be between:

1.Patron_identity and books

2.Books and library catalogue

You might be interested in
Hi weegy, what is the latest android os?
KatRina [158]
<span>The newest android os is:
Android 7.0 Nougat

</span>
7 0
3 years ago
write a function that given an integer Y and 3 non-empty string A,B,W, denotingthe year of vacations, the beginning month, the e
chubhunter [2.5K]

Answer:un spain please

Explanation:

4 0
3 years ago
If you configure any more passwords on the switch, will they be displayed in the configuration file as plain text or in encrypte
Elza [17]

Answer:

The "service password-encryption" global configuration command encrypts passwords configured before and after the command is issued.

Explanation:

A switch is an intermediate network device that is used to transfer frames to nodes on its collision domain. It operates in the Data-link layer of the OSI model.

Switches uses media address control (MAC) table, containing the MAC addresses of the nodes in the network, to determine the destination of nodes.

In the global configuration mode in a switch, the password and other protocols are configured. The service password-encryption command in the global execution mode encrypts passwords configured before and after the command.

4 0
3 years ago
What is the newest iphone?
OlgaM077 [116]

xR max is the newest iPhone out right now

7 0
3 years ago
Read 2 more answers
Which of these is a necessary component of any computer?
Aleonysh [2.5K]

Answer:

Components:

Components:1.Motherboard:

The motherboard is the core of the system. It really is the PC; everything else is connected to it, and it controls everything in the system. 2.Processor:

2.processor:

The processor is often thought of as the "engine" of the computer. It's also called the CPU (central processing unit).

3.Memory (RAM):

The system memory is often called RAM (for random access memory). This is the primary memory, which holds all the programs and data the processor is using at a given time.

4.Case/chassis:

The case is the frame or chassis that houses the motherboard, power supply, disk drives, adapter cards, and any other physical components in the system.

5.Power supply:

The power supply is what feeds electrical power to every single part in the PC.

6.Floppy drive:

The floppy drive is a simple, inexpensive, low-capacity, removable-media, magnetic storage device.

7.Hard drive:

The hard disk is the primary archival storage

memory for the system.

8.CD-ROM/DVD-ROM:

CD-ROM (compact disc read-only) and DVD-ROM (digital versatile disc read-only) drives are relatively high-capacity, removable media, optical drives.

9.Keyboard:

The keyboard is the primary device on a PC that is used by a human to communicate with and control a system.

10.Mouse

Although many types of pointing devices are on the market today, the first and most popular device for this purpose is the mouse.

11.Video card:

The video card controls the information you see on the monitor.

12.Monitor:

Monitor is output device.

13.Sound card:

It enables the PC to generate complex

sounds.

14.Modem:

Most prebuilt PCs ship with a modem (generally an internal modem).

6 0
2 years ago
Other questions:
  • Kim is creating a one-page presentation in Word about her parents’ home country, Vietnam. She has inserted images that are each
    7·2 answers
  • When using the red / yellow / green method to present status of a project, yellow can mean which of the following? A. There are
    5·2 answers
  • Make a program that prints each line of its input that mentions fred. (It shouldn’t do anything for other lines of input.) Does
    10·1 answer
  • An attacker compromises the Washington Post's web server and proceeds to modify the homepage slightly by inserting a 1x1 pixel i
    12·1 answer
  • You suspect a component in a computer is fried. You remove any unnecessary hardware devices one by one to narrow down where the
    7·1 answer
  • Which disc store compacity for full lenght movie? dvd or cd
    14·1 answer
  • PLEASE HURRY!!!
    11·1 answer
  • Designing advanced power systems for naval vessels is an example of nuclear engineering.
    7·2 answers
  • You are trying to sell a new product to a store owner. Which method of presentation
    10·1 answer
  • An independent penetration testing company is invited to test a company's legacy banking application developed for Android phone
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!