1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
notsponge [240]
3 years ago
15

Case Study

Computers and Technology
1 answer:
larisa [96]3 years ago
7 0

Answer:

1. Design system to avoid theatre tickets selling issue.

2. Resources provided to student who can built a system for the theatre tickets booking.

3. Medallion Theatre Booking System

Add/edit patron

Add/edit production

Add/edit performance

Add/edit seats

Purchase tickets

Generate Tickets Sold Report

4.GUI or graphical user interface allows the user to connect through graphical icons.

Explanation:

The main purpose is to avoid problems of duplicate tickets sales in future. The system will enable the selling of each seat to one customer only and when an attempt is made to resold the seat the system warns the user creating a check for original sale. This will help theatre to avoid any issues in future and customers will be happy with their ease of confirmation of booking.

You might be interested in
Which type of backup ensures you capture a complete snapshot of everything that makes your computer run?.
Elanso [62]

Answer:

Answer is D / If not : A full image backup, or mirror backup

Explanation:

is an exact replica of everything on your computer's hard drive, from the operating system, boot information, apps, and hidden files to your preferences and settings. Imaging software not only captures individual files, but everything you need to get your system running again.

Thanks for asking this question. If my response helped, please mark as brainliest. Thank you!

5 0
3 years ago
When code is compiled it
lesantik [10]

Answer:

A compiler takes the program code (source code) and converts the source code to a machine language module (called an object file). Another specialized program, called a linker, combines this object file with other previously compiled object files (in particular run-time modules) to create an executable file. In short, it's A or D.

5 0
3 years ago
Read 2 more answers
Would you buy a 2017 SYM WOLF CLASSIC 150 for $2,999?<br><br> Just wondering.
Anika [276]

seeing that its a 2017 it sounds pretty good.... as long as thats really what you want ( you should totally just get a dirt bike lol)

3 0
3 years ago
SMTP (Simple Mail Transfer Protocol) is the standard protocol for transferring mail between hosts over TCP. A TCP connection is
ruslelena [56]

Answer:

The five rules are described as follows:

Rule A permits the inbound Simple Mail Transfer Protocol (SMTP) connection.

Rule B permits the inbound Simple Mail Transfer Protocol (SMTP) connection.

Rule C permits the outbound Simple Mail Transfer Protocol (SMTP) connection.

Rule D permits the outbound Simple Mail Transfer Protocol (SMTP) connection.

Rule E does not perform any action. Thus it is when the action is denied.

Explanation:

Rule A allows information transfer of the incoming email from the external server to the internal remote server, thus this allows an inbound connection.

Rule B allows information transfer of the incoming email from the remote server to the external remote server, thus this allows an inbound connection.

Rule C allows information transfer of outgoing email from the external server to the internal remote server, thus this allows an outbound connection.

Rule D allows information transfer of the outgoing email from the remote server to the external remote server, thus this allows an outbound connection.

Rule E does not allow any action in either direction thus it is when action is denied.

5 0
3 years ago
A Program is an Algorithm – a set of directions for the computer to follow.<br><br> True<br> False
d1i1m1o1n [39]

Answer:

True

Explanation:

5 0
3 years ago
Other questions:
  • major m,ajorrr points helpppppppppppppppppppppppppppi have a question i hit a few buttons and now my computer is saying everythi
    11·2 answers
  • In the Remote Access Domain, if private data or confidential data is compromised remotely, you should set automatic blocking for
    5·1 answer
  • After a new technology is purchased,what are some additional costs that must be incorporated into an upgrade budget?
    6·1 answer
  • Which of the following can be considered beta testing? A programmer at Linus Systems checks the integration of multiple modules
    14·1 answer
  • The term that describes the connection of all kinds of devices; computers, phones, laptops, appliances, cars, etc. to the intern
    7·1 answer
  • _____ provides vital protection and maintenance services for system hardware and software, including enterprise computing system
    12·1 answer
  • Which information purpose uses video from a security camera?
    15·1 answer
  • Can someone please find the IP address of a 3630 hp printer?
    8·1 answer
  • Under the Home tab, controls for aligning text and objects can be found in the
    5·2 answers
  • How to block admin on school chromebook managed by admin
    9·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!