Customers access the abm terminal to deposit

Assignment Help Basic Computer Science
Reference no: EM13768600

1. Consider an automated banking system. Customers access the ABM terminal to deposit or withdraw money or pay bills. TrentMoney wants to set up generic ABMs to cash in on transaction fees.

We need to come up with a software architecture that covers the entire system - ABM terminals, Interac, banking servers, and the companies receiving monies for bills. We may not know exactly how the banking servers deal with transactions but we can show the components that they would need and suggest possibilities for communication. Your first step is to identify the components in the system and possible connectors. Then you'll need to consider the three parts of a software architecture: elements, form, rationale.

Then I want you to develop three alternative software architectures for TrentMoney. For each of these provide:

• A description of the architectural style and the rationale for this choice

• A description of any architectural patterns chosen and the rationale for these choices

• A topological diagram of the system

• A deployment diagram of the system

You should submit a professional looking report containing the three alternatives for the software architecture for TrentMoney along with the supporting information. You should also include a recommendation for the architecture that you prefer along with the rationale for your choice.

2. Find 5 examples of software projects that have failed due to faulty design. Describe the reasons for the failure, whether it was caused by an accidental or essential difficulty, and provide solutions for how they could have avoided the failure.

3. Search the Internet for software design tools. Select one of them to write a 1 to 2 pages report on the application of the tool. Your report should including the following:

• Background information - company (URL), motivation of development and purpose of the tool;

• Application - how to use the product (example);

• Input/Output and user Interface;

• Cost and Product reviews - are there any outside reviews of the product, if so find them and summarize the review;

• Possible references.

Reference no: EM13768600

Questions Cloud

Analyze kinds of risks that are most intimidating for each : Risks are common for all firms, but there are different levels of risks in different industries and in different countries. The differences in risks from firm to firm or industry to industry are called unsystematic risks.
Write an essay on marijuana should not be legal : write an essay on Marijuana should not be legal.
Why are background checks important to information security : Be sure to list your two required references at the end of your post. References must be in APA citation format. Answer the following questions below must be a minimum of 300 words combined. Why are background checks important to information securi..
Correlation between the amounts of profits and total sales : Is there a positive correlation between the amounts of profits (Dependent Variable) and total sales (Independent Variable) based on the costs of the process of production and distribution?
Customers access the abm terminal to deposit : Consider an automated banking system. Customers access the ABM terminal to deposit or withdraw money or pay bills. TrentMoney wants to set up generic ABMs to cash in on transaction fees.
Compare at least three of the characters of of mice and men : Compare at least three of the characters of Of Mice and Men traits and/or societal representations during this era to how society views these traits today.
What role integration play in the organizational redesign : What role will differentiation and integration play in the organizational redesign for CARE? What teams would you recommend creating to facilitate the success of this redesign?
Business structures-sole proprietorship and partnership : Explain the following business structures: sole proprietorship, partnership, LLC, and a corporation. In your analysis address the following for each business structure: Steps to form
Design a moore machine that performs a parity check : Design (draw the diagram) a Moore machine that performs a parity check on the input string (string of 0 and 1): that is, the output string ends in 1 if the total number of 1-bits in the input string is odd and 0 if the total number of 1-bits in th..

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Involved in a team charged to repair

1. You are involved in a team charged to repair and maintain a web-based ticket distribution system, what are the necessary questions your team should pose to the owner? Make up five questions and suggest solutions to them. Keep your answe..

  Which resumes are chosen for further scrutiny

Often a candidate's suitability for a particular job application is determined by the keywords identified by the software used for the purpose of screening.

  Solution to demonstrate the operation of hoare

Solution to Demonstrate the operation of HOARE-PARTITION on the array A D h13; 19; 9; 5; 12; 8; 7; 4; 11; 2; 6; 21i, showing the values of the array and auxiliary values after each iteration of the while loop in lines 4-13.

  Major information security threats

Write a 3-to 4-page paper on at least three major information security threats that a specific organization you choose faces today. This portion of the assignment should provide a foundation for the sections to be added in Weeks 3 and 4

  Project in designated area of coastal zone is significant

Have you contacted State Historic Preservation Office (SHPO) to see if the project is in designated area of coastal zone which is significant to the study, understanding, or illustration of national, state.

  What type of data is stored in the genographic database

What type of data is stored in the genographic database? Design a set of relational tables to store this data. . Identify the primary key in each table. Identify the foreign keys needed in the table to implement referential integrity

  Recursive multiplication

Recursive Multiplication Write a main program that uses a recursive function. This function accepts two arguments into the parameters x and y.

  Explaining os not designed for smartphones and pdas

which OS is not designed for smartphones and PDAs?1. Which OS is not designed for smartphones and PDAs?

  Calculate the product of the two numbers

In general ask the user for 2 numbers, calculate the product of the two numbers (mul) and store product in memory. Then divide the 2 numbers entered and store the quotient and remainder in memory.

  What is projectitis

What is projectitis? How is it cured or its impact minimized?

  Objectives of ibm behind

While Jeopardy is a fun game, and while explicit goal is to build a program to beat a human champion at game, the real goal for building Watson is different and multi fold.

  What rc key value leave state vector during initialization

What RC4 key value will leave state vector, S unchanged during initialization? That is after the initial permutation of S, the entries of S will be equal to the values.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd