1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
VMariaS [17]
2 years ago
6

A local cinema allows customer to make a movie ticket reservation. A customer can be

Computers and Technology
1 answer:
MrRa [10]2 years ago
7 0
In cinema, people usually purchase a ticket after, they pay money for a certain show. So based on that we can design the software system like below to store each transaction that has details about purchaser of ticket, show details and so on.
Transactions: Class used to create transaction in a cinema hall 

Attribute:-

Name: Name of person Age:

Age of Person

Phone Number: Phone number

Email: email of person

customer_type: type of customer (can be ordinary or privilege)

room_type: type of customer (can be ordinary customer_type normal else luxurious)

date: transaction date

payment_mode: Transaction can be either done in cash or credit amount: amount of ticket

ticket_time: time of show
methods:
create_transaction(name, phone, email,  date, payment_mode, amount, ticket_time): creates a history of a transaction after a ticket has been purchased
You might be interested in
When using the red / yellow / green method to present status of a project, yellow can mean which of the following? A. There are
DerKrebs [107]
It would be A. Think of radar for weather. Yellow splotches mean that it could get worse, but could get better. Hoped it helped!
5 0
3 years ago
Read 2 more answers
Which word most strongly appeals to pathos?
const2013 [10]

Answer:

I think it would be unfulfilled

6 0
3 years ago
opearating system protection refers to a mechanism for controling access by programs, processes, or users to both system and use
Alekssandra [29.7K]

Answer:

The operating system must by the use of policies define access to and the use of all computer resources.

Policies are usually defined during the design of the system. These are usually default in settings. Others are defined and or modified during installation of the addon and or third-party software.

Computer Security Policies are used to exact the nature and use of an organisations computers systems. IT Policies are divided into 5 classes namely:

  1. General Policies
  2. Server Policies
  3. VPN Policies
  4. Back-Up Policies
  5. Firewall Access and Configuration Policies

Cheers!

5 0
3 years ago
What is the first step in finding a solution to a problem?
Law Incorporation [45]

Answer:

Can i have a points? Tysmm

5 0
2 years ago
Read 2 more answers
3. In which of the following places can
maw [93]

Answer:

On the World Wide Web

Explanation:

Sure theres always a homepage somewhere. But i dont know what your researching so i went with c.

8 0
3 years ago
Read 2 more answers
Other questions:
  • ____, developed by xuejia lai and james massey, is a block cipher that operates on 64-bit blocks of plaintext.
    10·1 answer
  • Which CSS attribute would change an element's font color to blue? font-color: blue; background: blue; color: blue; background-co
    10·2 answers
  • How do you close a file?
    12·2 answers
  • What is a spreadsheet program?<br> A spreadsheet program is a computerized version of _______
    5·1 answer
  • Mention two strategies of collecting data​
    13·1 answer
  • What is the full meaning of Internet and WiFi
    6·2 answers
  • Question 8 A data analyst is working with a data frame named stores. It has separate columns for city (city) and state (state).
    12·1 answer
  • Quick question if anyone knows? How do you give brainlist? Please tell me if you know! ( Here if a chiaki gif for your too lol )
    5·1 answer
  • When an EC2 instance is being modified to have more RAM, is this considered Scaling Up or Scaling Out?
    5·1 answer
  • what option can be used to create vpn connections that can be distributed to users' computers so that vpn clients do not have to
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!