Distinguish between non-functional and functionalrequirement

Assignment Help Basic Computer Science
Reference no: EM13866255

As a member of the Information Security team at a small college, you have been made the project manager to install an access control system (ACS) in a dormitory. The ACS will automatically unlock the dormitory doors via an electronic proximity reader and integrate with an existing security camera system. The cameras are designed to face and rotate to record a person as they use their identification card to unlock the door.

Create a 3-4 page project plan for this project in which you:

Include a one-half page project scope statement.

Define five (5) major tasks, each with one to two (1-2) subtasks. Also write a brief description for each task.

Create a Gantt chart illustrating the project tasks (use Microsoft Project or a similar project management program).

Create a system diagram illustrating the equipment and connections required for this project (use Microsoft Visio or a similar software package).

Your assignment must:

Be typed, double-spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.

Include a cover page containing the title of the assignment, the student's name, the professor's name, the course title, and the date.

The cover page and the reference page are not included in the required assignment page length.

Include charts or diagrams created in Excel, Visio, MS Project, or one of their equivalents such as Open Project, Dia, and OpenOffice. The

completed diagrams/charts must be imported into the Word document before the paper is submitted.

The specific Course Learning Outcomes associated with this assignment are:

Distinguish between non-functional and functional requirements.

Use contemporary CASE tools in process and data modeling.

Use technology and information resources to research issues in systems analysis and development.

Write clearly and concisely about Systems Analysis and Development topics using proper writing mechanics and technical style conventions.

Verified Expert

The solution file is prepared in ms word which discussed about to build an access control list for small college. The report has introduction , problem statement , Gantt chart of project, system design , Major task and conclusion of the project. The project plan done it in ms project to create task and Gantt chart of the project. The report has 1300 words around and references are included as per APA format.

Reference no: EM13866255

Questions Cloud

How do these requirements relate to the hoch elder decision? : How do these requirements relate to the Hoch elder decision?
The equipment has the following characteristics: : The Winsey Company purchased equipment on January 2, 2010, for $700,000. The equipment has the following characteristics:Estimated service life ......... 20 years 100,000 hours950,000 units of outputEstimated residual value ....... $50,000During 2010..
Role of sport in forging a national identity : What do you think of the role of sport in forging a "national identity"? Is it over-valued, or is sport truly a uniting force for national pride
Hy is it important from an auditing perspective : Why is it important from an auditing perspective that an auditor be required to adjust the financial statement amounts for some material subsequent events? If an auditor fails to live up to this standard, what is the potential liability exposure for ..
Distinguish between non-functional and functionalrequirement : Distinguish between non-functional and functional requirements
Parameters to work out the speed : Select any passenger or F1 race car, collect data from the web information, Identify all the parameters to work out the speed of 0-100 KM/Hr in 7 seconds and 4 seconds for Passenger and F1 race car respectively.
Explains why it is important for christians : Write a paragraph that explains why it is important for Christians that the New Testament contains passages that refer to Jesus' humanity and to Jesus' divinity
The defenses available to the auditor to rebut such charges? : What are the defenses available to the auditor to rebut such charges? How does adherence to the ethical standards of the accounting profession relate to these defenses?
Brake power and indicated power of a petrol engine : The difference between the brake power and indicated power of a petrol engine and a diesel engine

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Compare and contrast the features of both the apple ipad

Compare and contrast the features of both the Apple iPad and the Samsung Galaxy Tab.Compare and contrast the available accessories, potential for future upgrades, warranties, and available support of both the iPad and the Galaxy Tab.

  Limit approach to determine the order

Use the limit approach to determine the order for g(n) = n^J and f(n) = n^k, where k > j > 2

  Describe a violation of opsec principles

Describe a violation of OPSEC principles that plays a major role in the plot of a movie you have seen, then describe briefly how the 5 step process.

  Description of social-political and economic effects

What role does digital technology play in freedom of speech and democracy.

  Calculate the average cpi for each machine

Calculate the average CPI for each machine, M1, and M2 and calculate the average MIPS ratings for each machine, M1 and M2.

  Development approaches of firm with relevant examples

Discuss technology generation vs technology development approaches of a firm with relevant examples?

  Explain change like that for business purposes

This adaptation of gaming by seniors was due in large part to ease of use. The Wii controller changed everything. Take a look at the news article and imagine a change like that for business purposes. Will it happen?

  Bia determines the extent of the impact

According to the text, a BIA determines the extent of the impact that a particular incident would have on business operation over time. Determine the major ways in which people, systems, data, and property will impact a BIA. Provide specific ex..

  Design and implement an application that performs flashcard

The user is to input the answer, and the program will tell them if it is right or wrong. Ask user if they want to do another. Keep score of the user's score of correct answers and the number of problems presented.

  Explain network security plan and make modifications

Please review your previous work including that of last week with your Network Security Plan and make revisions and modifications as necessary based on our discussions and research up to this point. This is a plan that would be submitted to your c..

  What is maximum size of a file can be stores in file system

This file system has 12 direct disk blocks, as well as single, double, and triple indirect disk blocks. What is the maximum size of a file that can be stores in this file system?

  An information security professional

Imagine the university that employs you as an information security professional has recently identified the need to design and build a digital forensic laboratory. You have been tasked with designing the lab for the organization.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd