Essay Available:
You are here: Home → Research Paper → IT & Computer Science
Pages:
4 pages/≈1100 words
Sources:
3 Sources
Level:
APA
Subject:
IT & Computer Science
Type:
Research Paper
Language:
English (U.S.)
Document:
MS Word
Date:
Total cost:
$ 25.92
Topic:
Error Handling In An Activity Diagram: Explanation Of The Reasons (Research Paper Sample)
Instructions:
This an error handling assignment had a flow chart that needed to be completed.
source..Content:
Error Handling in an Activity Diagram
Student’s Name
Institutional Affiliation
Error Handling in an Activity Diagram
Introduction
This paper will give a closer look into error handling in an activity diagram. I will provide a diagram that would include two error-handling pathways. I will provide a narrative, which describes the added error-handling pathways. It will also include an explanation of the reasons checking for errors is so important. Lastly, I will incorporate and overview of other possible errors. The diagram is used in the creation of business processes and are used to describe the many activities of users, the flow of the different activities and users in charge (Satzinger, 2012). Workflow visual features are shown by the diagram throughout a particular process in the business that operates as a functional support mechanism. An organization must carry out a detailed inspection to fix possible errors in the process and so keep the activity diagram free of mistakes. The definition of error handling is merely the communication of error, application, programming determination, recognition, and reckoning.
Pathways of Error-Handling
The diagram below provides an updated view that includes two channels of error handling which lack in the activity diagram in Figure 2-15 located in page 59 of the System Design and Analysis in a world that is changing, Sixth Edition. In the chart, an illustration is provided of the different processes between the company doing shipping, warehouse, inventory system, and order system.
Overview of the Error under Check
Upon placing an order, it is when computerization is initiated through identification to be done between shipping of the items and when they will be received (Satzinger, 2012). The errors being inspected by the diagram include; details available in stock or the unavailable as well as checking for the right shipping address (Wrycza & Bajaj, 2009).It is important to identify whether the item is available in stock for it can only be shipped if it's available and that projection is also needed on the duration the item will take to arrive at the destination (Wazlawick, 2014). A check should also be carried out on the address to ensure it is the right one before shipping of the items is done for it will be a loss to the company if they are shipped to the wrong destination.
Why Error Checking is Critical
The importance of ensuring that errors are checked is to avoid great losses and at the same time avoid challenges that may arise in life cycle transaction.
Other Errors ...
Get the Whole Paper!
Not exactly what you need?
Do you need a custom essay? Order right now:
Other Topics:
- The Major Data Security Breaches That Have Happened In The Recent TimeDescription: The assignment discussed some of the major data security breaches that have happened in the recent time and identified the main reasons behind these security breaches and how it could have been avoided....7 pages/≈1925 words| 7 Sources | APA | IT & Computer Science | Research Paper |
- Cybercrime: The Corrective Measures Of Protecting Our ComputerDescription: Cybercrime can be avoided if we take the corrective measures of protecting our computer devices. Firstly one should ensure that his/her computer has a unique password which is complicated....2 pages/≈550 words| 3 Sources | APA | IT & Computer Science | Research Paper |
- An Analysis Of The Security Technology Deployment Plan For Company XYZDescription: The paper evaluates the security deployment plan for company XYZ, in a semi-conductor manufacturing industry. The paper is structured in 6 different phases. The paper sets out by discussing the IT system architecture, then plan of protection....12 pages/≈3300 words| 16 Sources | APA | IT & Computer Science | Research Paper |