Conduct a grammatical parse of the following user story and create a list of potential class operations: Citizens can log onto a website and report the location and severity of potholes. As potholes are reported they are logged within a "public works department repair system" and are assigned an identifying number, stored by street address, size (on a scale of 1 to 10), location (middle, curb, etc.), district (determined from street address), and repair priority (determined from the size of the pothole).

What will be an ideal response?


Look at the verbs in the user story. Operations can be divided into four broad categories:
(1) operations that manipulate data in some way (e.g., adding, deleting, reformatting, selecting)
(2) operations that perform a computation
(3) operations that inquire about the state of an object, and
(4) operations that monitor an object for the occurrence of a controlling event.

Computer Science & Information Technology

You might also like to view...

If you need to print an Access object and know that no adjustments need to be made, you can use the ________ command

A) Quick Print B) Print C) Print Preview D) Default print

Computer Science & Information Technology

When creating a presentation, the first slide is called the ________ slide

A) title B) main C) introduction D) starter

Computer Science & Information Technology

Fiber-optic cabling uses ______________ to transmit data.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Attackers circumvent IDSs by implementing techniques such as:

A. Packet fragmentation B. UDP port scans C. NAT translation D. TCP scans

Computer Science & Information Technology