Implement a secure service that would allow software program

Assignment Help Computer Engineering
Reference no: EM131315634

Commercial Matching Service Scenario

www.buycomputer.com is a fictitious website to match consumers who wish to purchase computers with businesses who are able to supply them. It works as follows:

1- Consumers can visit the website and specify the computer they wish to purchase by selecting from a standard set of attributes and options (monitor, memory, etc.). Then specify the price they are willing to pay (taxes and shipping included), the address the computer must be shipped to, and the date by which the computer must be received.

2- Their offer to purchase a computer is made official when the offer is secured by a credit card that is authorized to enact payment immediatelyshould a business be found that will supply the computer to the stated location, for the stated price, by the stated date.

3- Firms can visit the website and search the list of computers that consumers have offered to purchase. Then when a they see a computer they are willing to supply, they can accept the offer and commit to delivering the computer under the terms specified.

4- Payment is enacted from the consumer's credit card to the business's merchant account at the moment the offer is accepted by the business. Also all businesses delivering computer via federal express that notify both the businesses and the company that order is fulfilled.

Describe an appropriate software architecture for www.buycomputer.comthen Identify two mechanisms you would use to address security and two otheryou would use to address scalability and availability.

Explain how www. buycomputer.com could implement a secure service that would allow software programs running at a business to communicate over the internet to automatically find offers, accept them, enact the payment transaction, and check when the purchase order has been fulfilled.

Define, in high level terms (not code), the API calls that would be supported making clear the types of inputs and outputs regarding to the machine to machine interface between it and the suppliers for the operations describe in step 3 and 4.

What change you cando to make the website available for consumerswho use smartphone?

If the company located in USA and a consumer located in France purchase a computer from a Firm located in china, explain what mechanisms need to be in place when the consumer complains that they didn't receive their order. In particular, explain how it can be determined whether or not the consumer get his order.

Identify what information needs to be persisted, at what location, and in what format in order to prove the order was delivered.

Explain briefly how each of the consumer, company and Firmswill be authenticated.

Identify a mechanism that company could use to localize labels that appear on web pages so users can view information in English, French and Chinese.

Identify three things related to the company that might need to be localized.

Reference no: EM131315634

Questions Cloud

Create a job description for a retail sales associate : Create a job description for a retail sales associate, which includes the most significant components necessary to describe the job both internally and externally.Create an organizational behavior modification (OBM) plan to define four (4) key be..
Defining training and understanding its strategic purpose : At first glance, Week 5 content spans two seemingly disparate functions - developing training and assessing employee performance. The processes are defined and presented sequentially in your text. In reality, the functions are more closely related..
Compute the tensile strength : Note that Boron fibers tend to be perfectly straight and that aluminum has a linear shear stress-strain plot before it yields
Explain for the reader why this is a problem of importance : "Statement of the Problem" states the problem and explains for the reader why this is a problem of importance that should be studied."Delineation of Problem" means share data on how prevalent problem is.
Implement a secure service that would allow software program : Explain briefly how each of the consumer, company and Firmswill be authenticated - Identify a mechanism that company could use to localize labels that appear on web pages so users can view information in English, French and Chinese.
Provide two specific examples of leonard berrys success : Provide at least two specific examples of Leonard Berry's Success Sustainability Model that apply within a health care organization with which you are familiar.
Comment on the coupling of the constitutive equations : Comment on the coupling of the constitutive equations for each case. Comment on the relative magnitude of the coefficients as the number of laminae increases
Preparing for hr transformations : Of the items that Dr. Dave Ulrich mentioned in the you tube video (in the reading assignments for the week) for preparing for HR transformations, select two that you think are most important for the transformation you will recommend in your third ..
Provide two examples of michael porters value chain model : Provide one example of such recognition of value to support your rationale. Provide at least two specific examples of the Michael Porter's Value Chain Model that apply within a health care organization with which you are familiar.

Reviews

Write a Review

Computer Engineering Questions & Answers

  Program in visual basic to calculate area of a triangle

Write down a program in the visual basic which determines the area of a triangle. If three sides a, b and c entered do not make a triangle transmit the message out to the screen that the data entered was invalid.

  Contrast the metaphors used in the design of applications

Compare and contrast the metaphors used in the design of applications that run on each type of monitor. Use Microsoft Visio, Microsoft PowerPoint, or any other modeling tool to create.

  Questionconfiguring a databasethere are two parts to this

questionconfiguring a databasethere are two parts to this work. the first part is to generate a database and some

  Design a class street that includes a number

Design a class Street that includes a number

  What resources do need to conduct

What restraints are in your workplace that prevents the new computer system installation.

  What is mflops rating of the system

What is MFLOPS rating of the system

  Define defense in depth

Define defense in depth

  Define mitigation strategies to enable business continuity

It is estimated that three out of five businesses that experience downtime of 48 hours or more will be out of business within 3 years. Creating a technology risk mitigation and data protection plan requires people, method  and technology in the ri..

  What is redundant data and why should it be avoided

What are the advantages of using relational databases in the development of interactive web applications.

  Coose one of the system development approaches structured

select one of the system development approaches structured information engineering and object-oriented and give an

  Why valuable time is lost in planning

Valuable time is lost in planning. Substantial savings could be realized if corporations would cut down on planning and concentrate on implementing.

  Latter discloses the password length

Not having the computer echo the password is safer than having it echo an asterisk for each character typed, since the latter discloses the password length to anyone nearby who can see the screen.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd