Create a computer-supported system

Assignment Help Computer Network Security
Reference no: EM133361617

Assignment:

Journal circulation

An insurance company with about 1,000 employees subscribes to about 50 periodicals (magazines and journals). The periodicals are circulated in-house and employees can subscribe to the circulation. At present subscription works in this way: When a periodical arrives to the company, it goes to the library where it is registered. Next the librarian attaches a list of the subscribers to it, and sends it to the first employee on the list. The internal snail-mail distribution is used to transport the journal round the building. The employee is supposed to read it within three work days, sign off on the list with name and date, and send it to the next employee on the list. When the last employee on the list has read it, he returns it to the library, where it becomes available for common use.

Unfortunately, employees often forget that they have received the journal and they don't pass it on to the next person on the list. After a while nobody knows who is supposed to have the journal. It is difficult to keep track of the whole thing, and employees keep accusing each other of being forgetful, careless, etc.

The company has an IT department that develops business applications for in- house use. The department suggests that they create a computer-supported system that can keep track of where the journals are. When an employee has finished reading a journal, he tells the system, and the system tells him where to send the journal in the internal snail-mail system. The next reader has to acknowledge that he has received the journal. The system should of course warn people when they have forgotten to pass a journal on.

The personnel department, where the library belongs, thinks this is an excellent idea. In particular, they would like to prioritize people on the circulation list according to vacation (people cannot read journals when they are on a two-week vacation) and according to their ability to observe the circulation deadlines (the three work days for passing the journal on). However, they have experience of such systems dragging on for years while the IT department and the user department fight about what the system is supposed to do. For this reason they want a requirement specification as basis for the study.

Imagine that you are a consultant from the IT department.

A. Specify a context diagram. If you feel you don't know enough, make your best guess and state what you would like to discuss with the customer.

B. Draw a class diagram (conceptual data model) for the project.

C. Define two usability requirements.

D. Suggest an elicitation technique for the project.

E. Outline two business goals for the project.

Reference no: EM133361617

Questions Cloud

Discuss law enforcement involvement in security incidents : How the definition of privacy that is commonly used (freedom from observation) may differ from definition of privacy from the information security perspective.
Analysis of the ethical implications of cybersecurity police : An analysis of the ethical implications of cybersecurity policies and regulations put in place to protect the confidentiality, integrity.
What might happen if we had an electromagnetic pulse attack : What MIGHT happen if we had an Electromagnetic Pulse (EMP) attack. I recognize that this is not an everyday occurrence, but this could occur sometime in future.
Explain which of the risk domains vulnerability : Explain which of the risk domains Vulnerability One exemplifies. Implement security controls to mitigate the risk that is introduced by Vulnerability One.
Create a computer-supported system : The department suggests that they create a computer-supported system that can keep track of where the journals are.
How the probabilistic forwarding protocol works : Briefly describe, in layman terms, how the Probabilistic Forwarding (PFR) protocol works and how it compares to the Energy Balance Protocol (EBP).
Summarize the working with emotional intelligence : Based on Daniel Goleman's book, Working with Emotional Intelligence, summarize your reaction. Including, what was interesting or caught your attention?
Create the next mind-blowing ideas that will transform healh : We are relentless about harnessing creativity, technology, data, science and culture to create next mind-blowing ideas that will transform health & wellness.
Discuss the medicare sustainable growth rate : Once you have read the article, discuss the Medicare Sustainable Growth Rate. "The SGR target is calculated on the basis of projected changes in 4 factors.

Reviews

Write a Review

Computer Network Security Questions & Answers

  An overview of wireless lan security - term paper

Computer Science or Information Technology deals with Wireless LAN Security. Wireless LAN Security is gaining importance in the recent times. This report talks about how vulnerable are wireless LAN networks without any security measures and also talk..

  Computer networks and security against hackers

This case study about a company named Magna International, a Canada based global supplier of automotive components, modules and systems. Along with the company analysis have been made in this assignment.

  New attack models

The Internet evolution is and is very fast and the Internet exposes the connected computers to attacks and the subsequent losses are in rise.

  Islamic Calligraphy

Islamic calligraphy or Arabic calligraphy is a primary form of art for Islamic visual expression and creativity.

  A comprehensive study about web-based email implementation

Conduct a comprehensive study about web-based email implementation in gmail. Optionally, you may use sniffer like wireshark or your choice to analyze the communication traffic.

  Retention policy and litigation hold notices

The purpose of this project is to provide you with an opportunity to create a document retention policy. You will also learn how to serve a litigation hold notice for an educational institute.

  Tools to enhance password protection

A report on Tools to enhance Password Protection.

  Analyse security procedures

Analyse security procedures

  Write a report on denial of service

Write a report on DENIAL OF SERVICE (DoS).

  Phising email

Phising email It is multipart, what are the two parts? The HTML part, is it inviting the recepient to click somewhere? What is the email proporting to do when the link is clicked?

  Express the shannon-hartley capacity theorem

Express the Shannon-Hartley capacity theorem in terms of where is the Energy/bit and is the psd of white noise.

  Modern symmetric encryption schemes

Pseudo-random generators, pseudo-random functions and pseudo-random permutations

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd