Describe the logical characteristics of each interface

Assignment Help Computer Engineering
Reference no: EM132083503

A newly developed hospital requires an Electronic Decision Support System (DSS) for clinicians. This DSS is required to have all the necessary features to help the practice.

Develop a Software Requirements Specification (SRS) document that identifies all the necessary requirements for the system. This document must strictly follow the IEEE template uploaded on canvas.

However, there may be sections in the template that may not apply to the project, these sections can be eliminated.

3. External Interface Requirements

3.1 User Interfaces

<Describe the logical characteristics of each interface between the software product and the users.This may include sample screen images, any GUI standards or product family style guides that areto be followed, screen layout constraints, standard buttons and functions (e.g., help) that willappear on every screen, keyboard shortcuts, error message display standards, and so on. Definethe software components for which a user interface is needed. Details of the user interface designshould be documented in a separate user interface specification.>

3.2 Hardware Interfaces

<Describe the logical and physical characteristics of each interface between the software product and the hardware components of the system. This may include the supported device types, the nature of the data and control interactions between the software and the hardware, and communication protocols to be used.>

3.3 Software Interfaces

<Describe the connections between this product and other specific software components (name and version), including databases, operating systems, tools, libraries, and integrated commercial components. Identify the data items or messages coming into the system and going out and describe the purpose of each.

Describe the services needed and the nature of communications.Refer to documents that describe detailed application programming interface protocols. Identify data that will be shared across software components. If the data sharing mechanism must beimplemented in a specific way (for example, use of a global data area in a multitasking operating system), specify this as an implementation constraint.>

3.4 Communications Interfaces

<Describe the requirements associated with any communications functions required by this product, including e-mail, web browser, network server communications protocols, electronic forms,and so on. Define any pertinent message formatting. Identify any communication standards that will be used, such as FTP or HTTP. Specify any communication security or encryption issues, data transfer rates, and synchronization mechanisms.>

Reference no: EM132083503

Questions Cloud

Rebuilding of mcdonald corporation : In light of the pending rebuilding of McDonald's Corporation, how have you seen McDonald's change in the course of recent years?
What is the most surprising thing to you from the teardown : Select three components related to digital logic. What is the most surprising thing to you from the teardown?
Prepare all necessary journal entries : Contract price: 3,000,000; Actual cost: $1,200,000; Estimated cost to complete: $800,000; Prepare all necessary journal entries including the revenue
What are the basic assumptions that would have to be made : What are the basic assumptions that would have to be made before we could conclude that the decision being made was even intended to be made rationally?
Describe the logical characteristics of each interface : Describe the logical characteristics of each interface between the software product and the users.
Calculate cost of goods sold : A company reports the following amounts for 2015: Inventory (beginning) $ 20,000. Calculate cost of goods sold, the inventory turnover ratio
Develop a plan that by using the methods : Develop a plan that, by using the methods, tools and ideals covered in this course, integrates effective security and protection against the potential threats
Cvp analysis graph depicting the base case situation : How do I sketch out a CVP analysis graph depicting the base case situation?
How long will it take to double vinod money : Current Interest rates for the 20 year bond are 2.25%. How long will it take to double Vinod's money

Reviews

Write a Review

Computer Engineering Questions & Answers

  How locks could be used in order to qualify data transaction

Describe how locks could be used in order to qualify data transactions and enhance concurrency control. Suggest two business scenarios that would benefit.

  How is the pruned tree used for classification

How is the pruned tree used for classification? Examine the unpruned tree. What are the top three predictors according to this tree?

  Describe the main purpose of prototyping describe why a

question a. explain the main purpose of prototyping.question b. explain why a prototype might or might not evolve into

  Discuss the form of architectural adjustments

You need to include a summary of corrective options, which may be in the form of architectural adjustments or other configuration changes that will prevent.

  Questionsstudy any two multicore processor architecture and

questionsstudy any two multicore processor architecture and discuss the following features briefly.a bus architectureb

  Which remote access implementation is the best

Which remote access implementation is the best, Research how to secure your network for remote access

  Describing rules for developing websites

All the Web pages in the Web site consist of the word “Museum”. Write down a formula describing these rules. It must be a series of logical conditions which is equivalent to the rules.

  Write a complete java console program to load the data file

For this assignment, you will write a complete Java console program to load the data file into an ArrayList data structure.

  You are a networking intern at richman investments you

you are a networking intern at richman investments. you recently developed a design for a remote access control policy

  Write an ada procedure called reverse-list

Write an Ada procedure called Reverse_List that takes a parameter called Grade_List of type Grade_Array and reverses the order of the record components.

  Discuss the issue by arguing for one of the techniques

Discuss the issue by arguing for one of the techniques. You can argue why sampling is the best option for analysis and or argue why full- population analysis must be done.

  What values that distinguish field of educational technology

What are those values that distinguish field of educational technology from all other educational fields? What you see as advantages of educational technology?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd