logo

Introduction of Self-Service Kiosk in Library | Report

   

Added on  2022-08-11

7 Pages837 Words15 Views
Running head: SELF-SERVICE KIOSK
SELF-SERVICE KIOSK
Name of student
Name of university
Author’s note:

1
SELF-SERVICE KIOSK
Table of Contents
Introduction....................................................................................................................2
Discussion......................................................................................................................3
Activity diagram.........................................................................................................3
In house and off-the-shelf software development......................................................4
Ethical, legal and cultural issues................................................................................4
Conclusion......................................................................................................................5
Reference........................................................................................................................6

2
SELF-SERVICE KIOSK
Introduction
The technological developments in the various sectors of the modern world has led to
the introduction of automation that could be helpful for eliminating the manual processes.
The kiosk checkout process helps the libraries in introducing automation is allowing the
member to gain books. The members could enter their choice of books in the kiosk and then
make the payment in the kiosk. If all the details of the member is valid and the people have
no outstanding balance against their name then the kiosk would direct the member to the
appropriate rack where the book has been placed.

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Kiosk Checkout Process: Library Self-Service Technology
|7
|1064
|156

Principles of Software Engineering
|17
|5087
|42

Project Risk Table
|7
|795
|50

Manage Construction Work Assessment
|18
|4687
|19

Target Data Breach: Threats, Protections, and Legal/Ethical Issues
|8
|1725
|99