1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
valentinak56 [21]
3 years ago
12

A simple system is to be designed to allow for the selling of old books. There are two different types of users: buyers and sell

ers. All users are registered externally from the system. The sellers can post information on the books they have for sale and remove the books once they are sold. Buyers can search the system and then contact a seller offline if they want to make a purchase.
Using problem 1, draw the UML Use Case Diagram, and write the stories for each use case above.

Computers and Technology
1 answer:
Sidana [21]3 years ago
3 0

Answer:

The  UML diagram and the story is shown on the first uploaded image

Explanation:

You might be interested in
HELP ME PLZZZ I'll give brainist​
kow [346]

Answer:

Um do you have pointers for us?

Explanation:

7 0
3 years ago
So I was looking at my profile and it says i'm a brainly PLUS member didn't sign up for it tho. Any ideas why this could have ha
DiKsa [7]

Answer: you should contact help

Explanation:maybe one of your family members just bought it and then u noticed.or maybe they surprised you..   .__.

6 0
3 years ago
Read 2 more answers
Software that allows users to use and adapt it for any purpose, often allowing the public to participate in further development
Sphinxa [80]

Answer:

Open Source

Explanation:

When a developer makes something open to the public, free to edit and use how they want, they make the project open source.

4 0
3 years ago
Read 2 more answers
Network is a process by which several protocols evolve to form a single product.
astraxan [27]

Answer:

Is this like a true or false thing or just a statement?

6 0
3 years ago
QUESTION 1
slava [35]
Answer is Bit defender Internet security
B
6 0
3 years ago
Other questions:
  • People with healthy media diets:
    12·1 answer
  • A short-circuit evaluation is where each part of an expression is evaluated only as far as necessary to determine whether the en
    14·1 answer
  • What is the seventh byte in the roller coasters file?
    12·1 answer
  • You have just finished writing a lengthy research paper and you are ready for formatting. You insert your paragraph headings and
    15·1 answer
  • Type the correct answer in the box.
    15·1 answer
  • PLEASE HELP!! Kou converged his Word document to a PowerPoint document. When he received the PowerPoint, he was missing material
    12·1 answer
  • What's the best strategy for avoiding ATM fe
    14·1 answer
  • In the textbox below, write an email that you, as an administrative assistant at Techno Inc., would write to request information
    7·1 answer
  • Describe the main roles of the communication layer, the network-wide state-management layer, and the network-control application
    15·1 answer
  • When conducting memory and recall tests, some people make an effort to normalize memories by not reporting extreme cases. this l
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!