Discussion is right way to get Solution of the every assignment, Quiz and GDB.
We are always here to discuss and Guideline, Please Don't visit Cyberian only for Solution.
Cyberian Team always happy to facilitate to provide the idea solution. Please don't hesitate to contact us! NOTE: Don't copy or replicating idea solutions. Quiz Copy Solution Mid and Final Past Papers Live Chat
Steps to develop Activity Diagrams
The steps below outline the major steps to take in creating a UML Activity Diagram.
Finding system Actors, Classes and use cases
Identifying key scenarios of system use cases
Combining the scenarios to produce comprehensive workflows described using activity diagrams
Where significant object behavior is triggered by a workflow, adding object flows to the diagrams
Where workflows cross technology boundaries, using swimlanes to map the activities
Refining complicated high level activities similarly, nested activity diagrams
Suppose you are attempting the exam for the post of Information Security Engineer in the ABC organization. During the exam, you are given the following real life scenarios associated with the three main pillars of informing security (C.I.A) :
Suppose fifty cancer patient’s treatment is being carried out by Dr. Ali in the well-reputed cancer hospital in Lahore. All the medical information of those patients is stored in the table of the hospital’s database system. Dr. Ali suggests medicine to the patients on the basis of patient’s relevant information stored in the database. If another doctor who has also legal rights to access this table of the database, unintentionally changes the information that can mislead the patient treatment.
CSS Exam’s applicants are checking their results online through the FPSC website but the FPSC website takes too much time to load.
The AZB limited Bank makes a plan for launching a new offer for capturing customers in a market but this plan leaked to its competitors.
A bank’s ATM is not responding due to general backend server error.
If a renowned shoe brand’s prices and specifications available on online shopping stores are changed by an unauthorized person.
If you are replying to the messages of your friend, then it should be received in the original form as it is sent by you.
Upon the last date of applying for the online job application, the related website is not responding due to some technical problems which makes the candidates unable to submit their job application on time.
Student’s board results information (Marks, CGPA) is considered very important and it should be available only for that specific student and their parents rather than other class students.
A developer’s salary slip in the software house should not be visible to any other developer.
Student’s semester grades are posted on the class Facebook group by some unauthorized student.
After carefully reading and analyzing the above-mentioned scenarios and fill the following table: