Describe how you would correct the design issues

Assignment Help Basic Computer Science
Reference no: EM13775929

Please look over this paper. I need a very professor paper avoiding plagrism because he places our papers in turn in we are only,. So let me know if you can do this with very high quality work. The insturctor or listed here as well, it tell s you the format and the font and margins and please us incite text please put ref where they need to go. Will need this paper in 5 days. See rubic and instruction below.

Case Study 3: Security

A large, fast-food chain unveiled a new touch screen register for its franchises. Each cashier was assigned a user id and password combination to log in to the register. The system allowed the incorrect password to be entered four (4) times before the register would lock and require a manager to unlock it with a key card. To prevent unauthorized access, the registers would lock after three (3) minutes if the screen was not touched. When the register locked, only the cashier who was logged in prior to it locking could unlock it without a system restart.

After a few days in operation, restaurant managers started complaining about the amount of time they were spending unlocking the registers. Some cashiers were forgetting their user Id and password, so other cashiers would log in for them. It also seemed that the button layout made it easy for the cashiers to key in the incorrect password. The managers also complained that cashiers would leave for a break or end their shift and forget to log out of the locked register. The managers would have to reboot the system, a three to five (3-5) minute process in order for the next cashier to log in. Additionally, managers noticed that grease was building up on the touch screens, making them less responsive.

Write a five to eight (5-8) page paper in which you:

1. Analyze the new system and determine the design issues with this new system.

2. Describe how you would correct the design issues with the system to make the restaurant managers happy.

3. Create a design plan that:

  1. Lists and explains the tasks associated with improving this interface.
  2. Contains at least six (6) tasks.
  3. Includes realistic time estimates for each task to be completed.
  4. Analyzes the development of the system in your plan.
  5. Analyzes the testing of the system in your plan.
  6. Analyzes the implementation of the system in your plan.

4. Examine how this system balanced security and usability, and explain the challenges of incorporating system security and system usability into a design.

5. Suggest changes that could be made to the security of this system to still meet security objectives but make the system more usable.

6. Use Microsoft Visio or an open source alternative, Dia, to create a graphical representation of your proposed interface. Note: The graphically depicted solution is not included in the required page length.

7. Use at least three (3) quality resources in this assignment.

Reference no: EM13775929

Questions Cloud

What they are made of size vs solid wood beams : 50+ years ago one-piece solid lumber beams were harvested and plentiful.
Identify an operational definition used by the researchers : Describe the design of the study. Identify an operational definition used by the researchers. Provide one example of inductive logic and one example of deductive logic presented in the results
Write a journal paper on creating the myth by linda seger : Write a journal paper on Creating the Myth by Linda Seger.
Voidable contracts versus unenforceable contracts : Voidable Contracts versus Unenforceable Contracts-Contract experiences paper Discuss the common contracts that you and your teammates have encountered in your personal and professional lives
Describe how you would correct the design issues : Describe how you would correct the design issues with the system to make the restaurant managers happy.
The usefulness of capacitors in multistage voltage amplifier : Discuss what a swamping resistor is and name any improvements it makes to amplifier circuits.
What has been your experience with defensive medicine : The Impact of Medical Malpractice Lawsuits - What has been your experience with defensive medicine
Write an essay on examination of youth homelessness : Write an essay on Examination of Youth Homelessness.
Gender and sexual orientation influence styles of bullying : Explain why bullying is an issue to study in human development. Describe the three components or types of bullying behavior, as observed by researchers.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Write code segment in c which writes entire row red squres

Using direct console output, Write a code segment in C which writes an entire row of Red squares across the first and last row of the screen.

  Write down some of the merits of using a distributed

what are some of the advantages of using a distributed network management system in the corporate enterprise? what are

  Explain how to structure worksheet including titles

Explain how you will structure the worksheet, including the titles, column headings, and formulas to calculate the time it takes to make each size of cage.

  Write a mips program that will alter an array of 100 doubles

Write a MIPS program that will alter an array of 100 doubles. No input or output is required. We will assume somebody else did it. Your program modifies the elements in the array as described

  Create a database whose tables are at least in 2nf,3nf

Create a database whose tables are at least in 3NF, showing the dependency diagram for each table.

  For colorado customers compute the number of unique

For Colorado customers compute the number of unique products ordered. If a product is purchased on multiple orders, it should be counted only one time. The result should include customer number, customer last name and the number..

  Create direct-mapped data cache for the byte offset

Create the 128KB direct-mapped data cache which uses a 32 bit address and 16 bytes per block. Compute the following: How many bits are utilized for the byte offset?

  Give a formal proof that a = b

Give a formal proof that A = B

  Write the code of the main part of the program

Write the code of the main part of the program so that the code only uses the operations enqueue, dequeue, size, and isEmpty. Then, show that your program works with both types of queue implementation { as a linked list and as an array.

  Describe the same task using intelligent software agents

Describe the same task using intelligent software agents

  Write and describe the order fulfillment process in your

list and explain the order fulfillment process in your own words. explain unintentional and intentional threats. what

  How to add validation to a web application

How to add validation to a web application

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd