Customers access the abm terminal to deposit

Assignment Help Basic Computer Science
Reference no: EM13768600

1. Consider an automated banking system. Customers access the ABM terminal to deposit or withdraw money or pay bills. TrentMoney wants to set up generic ABMs to cash in on transaction fees.

We need to come up with a software architecture that covers the entire system - ABM terminals, Interac, banking servers, and the companies receiving monies for bills. We may not know exactly how the banking servers deal with transactions but we can show the components that they would need and suggest possibilities for communication. Your first step is to identify the components in the system and possible connectors. Then you'll need to consider the three parts of a software architecture: elements, form, rationale.

Then I want you to develop three alternative software architectures for TrentMoney. For each of these provide:

• A description of the architectural style and the rationale for this choice

• A description of any architectural patterns chosen and the rationale for these choices

• A topological diagram of the system

• A deployment diagram of the system

You should submit a professional looking report containing the three alternatives for the software architecture for TrentMoney along with the supporting information. You should also include a recommendation for the architecture that you prefer along with the rationale for your choice.

2. Find 5 examples of software projects that have failed due to faulty design. Describe the reasons for the failure, whether it was caused by an accidental or essential difficulty, and provide solutions for how they could have avoided the failure.

3. Search the Internet for software design tools. Select one of them to write a 1 to 2 pages report on the application of the tool. Your report should including the following:

• Background information - company (URL), motivation of development and purpose of the tool;

• Application - how to use the product (example);

• Input/Output and user Interface;

• Cost and Product reviews - are there any outside reviews of the product, if so find them and summarize the review;

• Possible references.

Reference no: EM13768600

Questions Cloud

Analyze kinds of risks that are most intimidating for each : Risks are common for all firms, but there are different levels of risks in different industries and in different countries. The differences in risks from firm to firm or industry to industry are called unsystematic risks.
Write an essay on marijuana should not be legal : write an essay on Marijuana should not be legal.
Why are background checks important to information security : Be sure to list your two required references at the end of your post. References must be in APA citation format. Answer the following questions below must be a minimum of 300 words combined. Why are background checks important to information securi..
Correlation between the amounts of profits and total sales : Is there a positive correlation between the amounts of profits (Dependent Variable) and total sales (Independent Variable) based on the costs of the process of production and distribution?
Customers access the abm terminal to deposit : Consider an automated banking system. Customers access the ABM terminal to deposit or withdraw money or pay bills. TrentMoney wants to set up generic ABMs to cash in on transaction fees.
Compare at least three of the characters of of mice and men : Compare at least three of the characters of Of Mice and Men traits and/or societal representations during this era to how society views these traits today.
What role integration play in the organizational redesign : What role will differentiation and integration play in the organizational redesign for CARE? What teams would you recommend creating to facilitate the success of this redesign?
Business structures-sole proprietorship and partnership : Explain the following business structures: sole proprietorship, partnership, LLC, and a corporation. In your analysis address the following for each business structure: Steps to form
Design a moore machine that performs a parity check : Design (draw the diagram) a Moore machine that performs a parity check on the input string (string of 0 and 1): that is, the output string ends in 1 if the total number of 1-bits in the input string is odd and 0 if the total number of 1-bits in th..

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Provide a description of the algorithm in pseudocode

You are required to create a detailed analysis for each of the following array-based sorting algorithms.

  Creating the powerpoint slides

Create an outline from your topics and from the outline, develop aPowerPoint presentation that contains at least 10 slides. • Use PowerPoint features such as: o Decorative WordArt, SmartArt with text, Shape with text or picture, correct spelling • Us..

  Additional manufacturing facilities located in nebraska

Crescent Manufacturing Inc. (CMI) is a luxury leader in crafted and customized home furnishings. The corporate headquarters and a production facility are located in Texas, with additional manufacturing facilities located in Nebraska and Maryland.

  Determine each root with a maximum absolute error

Determine each root with a maximum absolute error max and print the intermediate results. (b) Use Matlab's zero function to solve the equations from (a) with a high precision. Compare the results.

  • create a network reference model diagram of the current

Create a network reference model diagram of the current network that describes the role of each layer for both OSI and TCP/IP that are used to transmit data between the devices and applications specifically in your retail store.

  Cultural-political or geo-economics challenges affect

How might cultural, political, or geo-economics challenges affect a global company's use of the Internet? Give several examples.

  Explain cause and effect transition happen

One process could cause another process to make a transition. Under what circumstance, if any, would the following. Cause and effect transition happen ?

  What are the shortcomings and limitations

Assume you have decided to implement DFS so remote sites can access files and folders. What are the requirements for DFS? What are benefits of using DFS? What are the shortcomings and limitations?

  How face-to-face project meetings provide greater value

Identify three techniques that can be used to make project meetings more effective. How do face-to-face project meetings provide greater value than phone conferences and virtual meetings?

  Excel independent projects

I have 10 excel independent projects .There all form the text " Microsof Office 2013 Excel : In Complete " I have all the info and the start files. Since they're relatively easy and less then a page on the majority of them. I have no knowledge wit..

  Smallest exponent that can be stored using this 16 bit stand

storing number in a string of 16 bits, the first bit is used for the sign of the number, and the next 5 bits store the exponent plus the bias, and the remaining 10 bits store the mantissa.  The bias is 15. What is the smallest exponent that can be st..

  Creating a hashing function

Suppose you are creating a hashing function to use for storing string data in hashtable. One Candidate hasing function would be to sum the ASCII or Unicode values for each character, and that result as the hashcode.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd