Create a computer-supported system

Assignment Help Computer Network Security
Reference no: EM133361617

Assignment:

Journal circulation

An insurance company with about 1,000 employees subscribes to about 50 periodicals (magazines and journals). The periodicals are circulated in-house and employees can subscribe to the circulation. At present subscription works in this way: When a periodical arrives to the company, it goes to the library where it is registered. Next the librarian attaches a list of the subscribers to it, and sends it to the first employee on the list. The internal snail-mail distribution is used to transport the journal round the building. The employee is supposed to read it within three work days, sign off on the list with name and date, and send it to the next employee on the list. When the last employee on the list has read it, he returns it to the library, where it becomes available for common use.

Unfortunately, employees often forget that they have received the journal and they don't pass it on to the next person on the list. After a while nobody knows who is supposed to have the journal. It is difficult to keep track of the whole thing, and employees keep accusing each other of being forgetful, careless, etc.

The company has an IT department that develops business applications for in- house use. The department suggests that they create a computer-supported system that can keep track of where the journals are. When an employee has finished reading a journal, he tells the system, and the system tells him where to send the journal in the internal snail-mail system. The next reader has to acknowledge that he has received the journal. The system should of course warn people when they have forgotten to pass a journal on.

The personnel department, where the library belongs, thinks this is an excellent idea. In particular, they would like to prioritize people on the circulation list according to vacation (people cannot read journals when they are on a two-week vacation) and according to their ability to observe the circulation deadlines (the three work days for passing the journal on). However, they have experience of such systems dragging on for years while the IT department and the user department fight about what the system is supposed to do. For this reason they want a requirement specification as basis for the study.

Imagine that you are a consultant from the IT department.

A. Specify a context diagram. If you feel you don't know enough, make your best guess and state what you would like to discuss with the customer.

B. Draw a class diagram (conceptual data model) for the project.

C. Define two usability requirements.

D. Suggest an elicitation technique for the project.

E. Outline two business goals for the project.

Reference no: EM133361617

Questions Cloud

Discuss law enforcement involvement in security incidents : How the definition of privacy that is commonly used (freedom from observation) may differ from definition of privacy from the information security perspective.
Analysis of the ethical implications of cybersecurity police : An analysis of the ethical implications of cybersecurity policies and regulations put in place to protect the confidentiality, integrity.
What might happen if we had an electromagnetic pulse attack : What MIGHT happen if we had an Electromagnetic Pulse (EMP) attack. I recognize that this is not an everyday occurrence, but this could occur sometime in future.
Explain which of the risk domains vulnerability : Explain which of the risk domains Vulnerability One exemplifies. Implement security controls to mitigate the risk that is introduced by Vulnerability One.
Create a computer-supported system : The department suggests that they create a computer-supported system that can keep track of where the journals are.
How the probabilistic forwarding protocol works : Briefly describe, in layman terms, how the Probabilistic Forwarding (PFR) protocol works and how it compares to the Energy Balance Protocol (EBP).
Summarize the working with emotional intelligence : Based on Daniel Goleman's book, Working with Emotional Intelligence, summarize your reaction. Including, what was interesting or caught your attention?
Create the next mind-blowing ideas that will transform healh : We are relentless about harnessing creativity, technology, data, science and culture to create next mind-blowing ideas that will transform health & wellness.
Discuss the medicare sustainable growth rate : Once you have read the article, discuss the Medicare Sustainable Growth Rate. "The SGR target is calculated on the basis of projected changes in 4 factors.

Reviews

Write a Review

Computer Network Security Questions & Answers

  Challenge structural realism and constructivism

How does climate change challenge structural realism and constructivism?

  Explain what mbt and sandra could have done to protect

Assuming MBT wishes to continue using 3DES as its cryptographic system, explain what MBT and Sandra could have done to protect against this controversy arising.

  Identify software needed to secure your choice of networks

Assignment: LAN/WAN Paper- Identify hardware and software needed to secure your choice of networks against all electronic threats.

  What are legal ramifications of ransomware attack

Explain what are the legal ramifications of a ransomware attack for company(Australian transport and logistics company) should the company paid the ransom?

  How can dynamic access control benefit the organization

You are required to supply IMIwith a solution which addresses the integration and configuration of their Active Directory updates

  Explain the concepts of information systems security

Explain the concepts of information systems security as applied to an IT infrastructure and describe how malicious attacks, threats, and vulnerabilities impact an IT infrastructure.

  Design the elements of network servers storage and security

Design the elements of network, servers, storage, and security that will support key solutions. Design should incorporte backup, and failover services.

  What are microsoft system center-googles autoscaler

What are Microsoft System Center, Google's autoscaler, and SmartFrog examples of? Choose the best response.

  Compare and contrast different approaches to system analysis

MN611 - System Architecture - Melbourne Institute of technology - Cloud Based Smart Application Management - Compare and contrast different approaches to system

  Headquarters of Advanced Topologies

An employee opened an attachment to an e-mail from an unknown source. This attachment introduced a virus into the company network.

  Propose one way in which the pki could assist in the process

Propose one way in which the PKI could assist in the process of signing the company's software, and explain the main reason why a customer could then believe that software to be authentic.

  How to manage the file system encryption keys

Setup a 64MB encrypted file system in a file on a Flash drive so that it can be used with the cryptmount command.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd