Develop one complete system requirement

Assignment Help Computer Engineering
Reference no: EM132218765

Question: When developing system requirements, it is very important that they be written in a way that will allow for specific design and development steps. Poorly written requirements may lead to ambiguity, resulting in missing a stakeholder's expectations.

Develop one complete system requirement for one of the following activities:

• Option A: Making a withdrawal at an ATM.

• Option B: Using your charge card for a meal at a restaurant.

• Option C: Buying a stock using an online brokerage account.

• Option D: Searching for books (on a specific topic) using an online bookstore.

In your response, consider attributes that comprise a solid system requirement, as well as the result of requirements that do not meet quality attributes.

Post your answers to the discussion forum.

Respond to at least three of your peers. In your response, consider adding another attribute that makes it a solid system requirement, or suggest another way to write the system requirement.

Peer 1: Option B: Using your charge card for a meal at a restaurant.

• Insert Card

• Read Card

• Generate Transaction Number

• Authenticate Business

• Authenticate Customer

• Select Payment Type

• Select Payment Amount

• Confirm Payment

• Transaction Ends

Once this information has been sent to the merchant, it takes the funds from your credit or debit card and deposits those funds into the account of the restaurant owner or company. This usually occurs the instantly or next day although it may take longer. The amount of money that gets debited and deposited is based entirely on what gets entered into the credit card processing machine by an employee of the restaurant.

Peer 2: I decided to choose option A: Making a withdrawal at an ATM.

• The ATM should be able to take multiple credit cards: Visa, Master Card

• The ATM should allow customer to made deposits and check their balances.

• The ATM should allow you to withdrawal different types of American Bills. ie: $5s, $10s, 20s, $50s

• The ATM should allow you to get a receipt option at the end of your transaction

• If pin is entered incorrectly 3 times the ATM card is blocked and customer is notified

• The ATM should ask you to reenter your pin if idle for 15 seconds

• The ATM will prompt customers to reenter their pin if they want to complete a new transaction

Requirements that do not meet quality attributes

Some system requirements I do not like is having just twenty dollar bills at disposal.

Peer 3: System requirements for making a withdrawal at an ATM.

- The ATM system should be able to accept a unique ID from the customer.

- The ATM system shall accept the account type from the customer for deposits, balance query, and for payments on account.

- the ATM shall give the customer several banking options

- The ATM system shall provide the customer a receipt for deposits and withdrawals.

- The ATM system shall complete the customer sign-on in 5 seconds. The design goal could be 3 seconds.

Reference no: EM132218765

Questions Cloud

Write important suggestions from the plan you select : Search the Internet for IT governance planning. Select a specific governance plan that exists at a company or a plan framework from an organization.
What are cryptography and cryptanalysis : What are cryptography and cryptanalysis? What is cryptographic key. And what is used for? What is a more formal name for a cryptographic key?
Ccompare poems from a single poet : Ccompare poems from a single poet, or compare poems across poets.
Perform a search on the web for articles and stories : Perform a search on the Web for articles and stories about social engineering attacks or reverse social engineering attacks.
Develop one complete system requirement : When developing system requirements, it is very important that they be written in a way that will allow for specific design and development steps.
How will you allow complaints to be communicated : How will you allow complaints to be communicated? Explain. How will you store and organize that information so that complaints are addressed appropriately?
Explain the capabilities of forensic science : Identify the many roles of the forensic science expert as is they relate to the forensic science disciplines. Explain the capabilities of forensic science.
What are the attributes that comprise a quality user story : What are the attributes that comprise a quality user story, and why are these attributes necessary? Consider the result of poorly written user stories.
What effects does the practice of victim blaming have : What effects does the practice of victim blaming have for future potential crime victims and the criminal justice system?

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd