The abafm first letter of all group members names

Assignment Help Software Engineering
Reference no: EM13347077

The ABAFM (First Letter of all Group Member's Names) Landscaping Corporation is located at 1 Park Place Drive Markham, Ontario. It was incorporated in Ontario in the year of 2012. Currently there are 10 full-time and 10 part-time/seasonal employees. ABAFM Landscaping Corporation provides services primarily in the York Region.

Services

Following are the Services which are provided by ABAFM Landscaping Corporation:

• Landscape design and consultation
• Interlocking stone pavers (tumbled and non-tumbled)
• Natural stone retaining walls and stone accents
• Manufactured retaining walls (oaks, unilock, Hansen)
• Flagstone (random or square cut)
• Concrete walkways, patios, pool decks
• Pool construction
• Water features of all shapes and sizes
• Carpentry crew to complete all your fence, deck, and wood structures
• Excavation, grading, and sod

 FUNCTIONAL REQUIREMENTS

1.1 Profile Creation

Input: Customer has to create a new file at https://www.abafmlandscaping.com to register. Customers will receive the confirmation of their registration through auto-response from [email protected].

Process: System generates the customer's profile.

Output: A profile is created with specific tasks and access rights

1.2 Login For existing Administration

Input: User ID is generated by the potential customers

Process: System authorizes the legitimate users

Output: Only valid users can access the system for requesting the services, maintain their account, pay online, etc.

1.3 System Requirements

1.3.1 System to create a user profile

1.3.2 System create employee team to take care of customer

1.3.3 Evaluation by team to identify user / customer needs

1.3.4 System to create services provided (Database)

1.3.5 System to create module to order items from outside supplies when items not in stock

2. NON FUNCTIONAL REQUIREMENTS

2.1 Performance Requirements

Response Time

The data system will not only accommodate the present clients but also would easily perform well for the future demands.

Loading Speed

The data system would be running and loading/uploading as quickly operating in normal environment.

2.2 Payment processing

Types of payments accepted:

• Cash
• Check
• Credit card

2.3 Software Quality Attributes

Probability

The data system would be portable and could be managed through RMON

Adaptability

Implementation of the ABAFM system and design of database structure of ABAFM is being flexible for necessary change in latter phase.

Safety Requirements

The data is secured up to the maximum level, someone who is unauthorized cannot use this system. For checking authentication own User Id and password required.Password requires minimum 8 digits including mandatory one upper case letter, minimum one alpha numeric number, and minimum one special character to enhance the security level. Customers can't chose their passwords which contain their name, date of birth, and their residential address as the password. For further data integrity, intrusion detecting devices (IDS) and firewalls protect the malicious activities performed by unauthorized users.
Security

Security will have following primary components:

• User information security

• System information security

• Business information security

Authentication

Authentication security requirements to ensure those using system who they say they are. This is the greatest concern when data are being changed or updated. This is primarily done through user ids and password. ABAFM has role based login facility so even one user of system can't access the part of the system which is not assigned to him. CHAP is used for the maximum data security enhancement.

Data Integrity

Data have not been changed inappropriately, whether by accident or deliberately malign activity. Extensive data validation and review will be performed on an ongoing basis both before data are uploaded to the system and part of the uploaded process. The system will need procedures and policy protecting data from intentional or unintentional modification and to ensure accurate data are made available. Data is encrypted through Hash Algorithm and MD-5.

Reference no: EM13347077

Questions Cloud

Task aprepare a document using your group analyzed : task a.prepare a document using your group analyzed organization as a case study to compare their best practice supply
Question 1 select a real-life example of an employment : question 1 select a real-life example of an employment agreement and describe the agreement for its conditions
How you manage your cash or money on a day-to-day basis : how you manage your cash or money on a day-to-day basis will impact whether your long-term financial objectives will be
The case of armaniwrite anbsp paper applying the following : the case of armaniwrite anbsp paper applying the following informationsummarize the situation and identify the ethical
The abafm first letter of all group members names : the abafm first letter of all group members names landscaping corporation is located at 1 park place drive markham
Conduct an interview in a simulated work environment and : conduct an interview in a simulated work environment and make selection decisions. assessment description conduct an
Assessment descriptionfor this assessment task you are : assessment descriptionfor this assessment task you are required to develop a job description and advertisement for a
Monitor and review the performance of members of a teamto : monitor and review the performance of members of a team.to do this you will need to create a fictitious company with
The primary purpose of this assessment task is to help : the primary purpose of this assessment task is to help students develop skills in the use of human resource management

Reviews

Write a Review

Software Engineering Questions & Answers

  Explain and fix java code errors

The code compiles properly, but when you run, you get the following output, Exception in thread "main" java.land.IndexoutBoundsException:

  Poor database mission statement

Use internet to find an example of what you think is a good database mission statement. Then, find an example of what a poor database mission statement.

  Describe the procedure that occurs in client and web server

Describe the procedure that occurs in a client and Web server through describing the functionality of the OSI reference model.

  Tcp sender and receiver sequence

Think about a TCP sender and receiver. Suppose bytes 0 .. 99 have been sent, received, and acknowledged (the sender has received ack's for them). Suppose the sender sends the following segments

  Example of an ebusiness on the internet

Discuss some example of an eBusiness on the Internet (WWW). Give a link to that business and a one-paragraph summary as to its focus.

  Explain understanding plan-do-check-act process flow

The project where risk and quality processes make obsolete portions of project plan, how is plan maintained (updates, corrections)? What is context for understanding plan-do-check-act process flow?

  Creating a modularized body mass index program

Create a modularized Body Mass Index (BMI) Program which will compute the BMI of a team player.

  Sketch flowchart to print average for student

Sketch a flowchart to print average for each student in class.Input. Input consists of student records each containing student's name(STUDENT-NAME), score for first test(TEST), score for second test(TEST2), and score for third test(TEST3).

  Discuss the nature of the attacker

Discuss the nature of the attacker, their motivations, the nature of the vulnerability that they exploited, the assets attacked, the consequences of the attack and any defensive actions that were taken in response to the attack.

  Describe a non-agile alternative

Include a cover page containing the title of the assignment, the student's name, the professor's name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

  Describe purpose of the keyword super in programs

Describe purpose of the keyword super in programs

  Program to calculate the average salary and years employed

Construct a program that determines how many consonants are in an entered string of fifty characters or less. Output the entered string and the number of consonants in the string.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd