The abafm first letter of all group members names

Assignment Help Software Engineering
Reference no: EM13347077

The ABAFM (First Letter of all Group Member's Names) Landscaping Corporation is located at 1 Park Place Drive Markham, Ontario. It was incorporated in Ontario in the year of 2012. Currently there are 10 full-time and 10 part-time/seasonal employees. ABAFM Landscaping Corporation provides services primarily in the York Region.

Services

Following are the Services which are provided by ABAFM Landscaping Corporation:

• Landscape design and consultation
• Interlocking stone pavers (tumbled and non-tumbled)
• Natural stone retaining walls and stone accents
• Manufactured retaining walls (oaks, unilock, Hansen)
• Flagstone (random or square cut)
• Concrete walkways, patios, pool decks
• Pool construction
• Water features of all shapes and sizes
• Carpentry crew to complete all your fence, deck, and wood structures
• Excavation, grading, and sod

 FUNCTIONAL REQUIREMENTS

1.1 Profile Creation

Input: Customer has to create a new file at https://www.abafmlandscaping.com to register. Customers will receive the confirmation of their registration through auto-response from [email protected].

Process: System generates the customer's profile.

Output: A profile is created with specific tasks and access rights

1.2 Login For existing Administration

Input: User ID is generated by the potential customers

Process: System authorizes the legitimate users

Output: Only valid users can access the system for requesting the services, maintain their account, pay online, etc.

1.3 System Requirements

1.3.1 System to create a user profile

1.3.2 System create employee team to take care of customer

1.3.3 Evaluation by team to identify user / customer needs

1.3.4 System to create services provided (Database)

1.3.5 System to create module to order items from outside supplies when items not in stock

2. NON FUNCTIONAL REQUIREMENTS

2.1 Performance Requirements

Response Time

The data system will not only accommodate the present clients but also would easily perform well for the future demands.

Loading Speed

The data system would be running and loading/uploading as quickly operating in normal environment.

2.2 Payment processing

Types of payments accepted:

• Cash
• Check
• Credit card

2.3 Software Quality Attributes

Probability

The data system would be portable and could be managed through RMON

Adaptability

Implementation of the ABAFM system and design of database structure of ABAFM is being flexible for necessary change in latter phase.

Safety Requirements

The data is secured up to the maximum level, someone who is unauthorized cannot use this system. For checking authentication own User Id and password required.Password requires minimum 8 digits including mandatory one upper case letter, minimum one alpha numeric number, and minimum one special character to enhance the security level. Customers can't chose their passwords which contain their name, date of birth, and their residential address as the password. For further data integrity, intrusion detecting devices (IDS) and firewalls protect the malicious activities performed by unauthorized users.
Security

Security will have following primary components:

• User information security

• System information security

• Business information security

Authentication

Authentication security requirements to ensure those using system who they say they are. This is the greatest concern when data are being changed or updated. This is primarily done through user ids and password. ABAFM has role based login facility so even one user of system can't access the part of the system which is not assigned to him. CHAP is used for the maximum data security enhancement.

Data Integrity

Data have not been changed inappropriately, whether by accident or deliberately malign activity. Extensive data validation and review will be performed on an ongoing basis both before data are uploaded to the system and part of the uploaded process. The system will need procedures and policy protecting data from intentional or unintentional modification and to ensure accurate data are made available. Data is encrypted through Hash Algorithm and MD-5.

Reference no: EM13347077

Questions Cloud

Task aprepare a document using your group analyzed : task a.prepare a document using your group analyzed organization as a case study to compare their best practice supply
Question 1 select a real-life example of an employment : question 1 select a real-life example of an employment agreement and describe the agreement for its conditions
How you manage your cash or money on a day-to-day basis : how you manage your cash or money on a day-to-day basis will impact whether your long-term financial objectives will be
The case of armaniwrite anbsp paper applying the following : the case of armaniwrite anbsp paper applying the following informationsummarize the situation and identify the ethical
The abafm first letter of all group members names : the abafm first letter of all group members names landscaping corporation is located at 1 park place drive markham
Conduct an interview in a simulated work environment and : conduct an interview in a simulated work environment and make selection decisions. assessment description conduct an
Assessment descriptionfor this assessment task you are : assessment descriptionfor this assessment task you are required to develop a job description and advertisement for a
Monitor and review the performance of members of a teamto : monitor and review the performance of members of a team.to do this you will need to create a fictitious company with
The primary purpose of this assessment task is to help : the primary purpose of this assessment task is to help students develop skills in the use of human resource management

Reviews

Write a Review

Software Engineering Questions & Answers

  Research report on software design

Write a Research Report on software design and answer diffrent type of questions related to design. Report contain diffrent basic questions related to software design.

  A case study in c to java conversion and extensibility

A Case Study in C to Java Conversion and Extensibility

  Create a structural model

Structural modeling is a different view of the same system that you analyzed from a functional perspective. This model shows how data is organized within the system.

  Write an report on a significant software security

Write an report on a significant software security

  Development of a small software system

Analysis, design and development of a small software system.

  Systems analysis and design requirements

Systems Analysis and Design requirements

  Create a complete limited entry decision table

Create a complete limited entry decision table

  Explain flow boundaries map

Explain flow boundaries map the dfd into a software architecture using transform mapping.

  Frame diagrams

Prepare a frame diagram for the software systems.

  Identified systems and elements of the sap system

Identify computing devices, which could be used to support Your Improved Process

  Design a wireframe prototype

Design a wireframe prototype to meet the needs of the personas and requirements.

  Explain the characteristics of visual studio 2005

Explain the characteristics of Visual Studio 2005.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd