Systems analysis and design requirements

Assignment Help Software Engineering
Reference no: EM13992

The ABAFM (First Letter of all Group Member's Names) Landscaping Corporation is located at 1 Park Place Drive Markham, Ontario. It was incorporated in Ontario in the year of 2012. Currently there are 10 full-time and 10 part-time/seasonal employees. ABAFM Landscaping Corporation provides services primarily in the York Region.

Services

Following are the Services which are provided by ABAFM Landscaping Corporation:

• Landscape design and consultation
• Interlocking stone pavers (tumbled and non-tumbled)
• Natural stone retaining walls and stone accents
• Manufactured retaining walls (oaks, unilock, Hansen)
• Flagstone (random or square cut)
• Concrete walkways, patios, pool decks
• Pool construction
• Water features of all shapes and sizes
• Carpentry crew to complete all your fence, deck, and wood structures
• Excavation, grading, and sod

 FUNCTIONAL REQUIREMENTS

1.1 Profile Creation

Input: Customer has to create a new file at https://www.abafmlandscaping.com to register. Customers will receive the confirmation of their registration through auto-response from [email protected].

Process: System generates the customer's profile.

Output: A profile is created with specific tasks and access rights

1.2 Login For existing Administration

Input: User ID is generated by the potential customers

Process: System authorizes the legitimate users

Output: Only valid users can access the system for requesting the services, maintain their account, pay online, etc.

1.3 System Requirements

1.3.1 System to create a user profile

1.3.2 System create employee team to take care of customer

1.3.3 Evaluation by team to identify user / customer needs

1.3.4 System to create services provided (Database)

1.3.5 System to create module to order items from outside supplies when items not in stock

2. NON FUNCTIONAL REQUIREMENTS

2.1 Performance Requirements

Response Time

The data system will not only accommodate the present clients but also would easily perform well for the future demands.

Loading Speed

The data system would be running and loading/uploading as quickly operating in normal environment.

2.2 Payment processing

Types of payments accepted:

• Cash
• Check
• Credit card

2.3 Software Quality Attributes

Probability

The data system would be portable and could be managed through RMON

Adaptability

Implementation of the ABAFM system and design of database structure of ABAFM is being flexible for necessary change in latter phase.

Safety Requirements

The data is secured up to the maximum level, someone who is unauthorized cannot use this system. For checking authentication own User Id and password required.Password requires minimum 8 digits including mandatory one upper case letter, minimum one alpha numeric number, and minimum one special character to enhance the security level. Customers can't chose their passwords which contain their name, date of birth, and their residential address as the password. For further data integrity, intrusion detecting devices (IDS) and firewalls protect the malicious activities performed by unauthorized users.
Security

Security will have following primary components:

• User information security

• System information security

• Business information security

Authentication

Authentication security requirements to ensure those using system who they say they are. This is the greatest concern when data are being changed or updated. This is primarily done through user ids and password. ABAFM has role based login facility so even one user of system can't access the part of the system which is not assigned to him. CHAP is used for the maximum data security enhancement.

Data Integrity

Data have not been changed inappropriately, whether by accident or deliberately malign activity. Extensive data validation and review will be performed on an ongoing basis both before data are uploaded to the system and part of the uploaded process. The system will need procedures and policy protecting data from intentional or unintentional modification and to ensure accurate data are made available. Data is encrypted through Hash Algorithm and MD-5.

Reference no: EM13992

Questions Cloud

Supply chain strategy : Supply chain strategy
Examine the contracts : Examine the contracts and explain to Calvin his rights and obligations under his contracts with FixIt and Door Expert.
Determine the percentage of total payment spent : Determine the Percentage of Total Payment Spent
The case of armani : The case of Armani
Systems analysis and design requirements : Systems Analysis and Design requirements
Conduct an interview in a simulated work environment : Conduct an interview in a simulated work environment and make selection decisions.
Develop a job description and advertisement for a job : Develop a job description and advertisement for a job
Monitor and review the performance of members of a team : Monitor and review the performance of members of a team.
Case study: downsizing at st bedes : Case study: Downsizing at St Bedes

Reviews

Write a Review

Software Engineering Questions & Answers

  Write an report on a significant software security

Write an report on a significant software security

  Create a structural model

Structural modeling is a different view of the same system that you analyzed from a functional perspective. This model shows how data is organized within the system.

  Development of a small software system

Analysis, design and development of a small software system.

  A case study in c to java conversion and extensibility

A Case Study in C to Java Conversion and Extensibility

  Research report on software design

Write a Research Report on software design and answer diffrent type of questions related to design. Report contain diffrent basic questions related to software design.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd