Use machine learning to relate nonfunctional requirement

Assignment Help Basic Computer Science
Reference no: EM132428096

Your team has been tasked with developing an app for both Apple IOS and Google Android which graphically shows which nonfunctional requirements are applicable to each functional requirement. The application has two modes:

1. A developer can use a pointing device (mouse, stylus, finger on a touch screen) to draw lines from nonfunctional requirements to the affected functional requirements. The application keeps track of this information for later use in requested displays;

2. The application attempts to use machine learning to relate a nonfunctional requirement to affected functional requirements. A developer can correct what the application automatically displays.

Here are two nonfunctional requirements for this application:

1. The user interface must require no training of developers for them to be able to use it effectively;

2. The application must be secure from man-in-the-middle attacks.

Select one of these nonfunctional requirements and provide five possible functional requirements that you believe could be affected by that nonfunctional requirement. Explain how each proposed effect might occur.

Reference no: EM132428096

Questions Cloud

What role do end users play in incident reporting : What role do end users play in incident reporting? Should end users be encouraged to report suspicious occurrences? Why or why not?
The average person definition vs. legal definition : Discuss differing definitions, "the average person" definition vs. a legal definition, and how these differences impact risk assessments for privacy protections
Digital steganography : Write paper on Digital Steganography
Create data model and Create ER Diagram : The hospital not only admits patients but also has an out-patient department (OPD). Create a data model. Create an ER Diagram.
Use machine learning to relate nonfunctional requirement : The application attempts to use machine learning to relate a nonfunctional requirement to affected functional requirements.
Adoption of cloud solution-digital transformation project : A Project Manager was assigned to begin managing your project of the adoption of a cloud solution and digital transformation project.
Necessitate enactment and establishment of federal : What are the issues and root causes that necessitate the enactment and/or establishment of Federal, state and local government laws,
What helps promote good team player behavior : Do you think everyone can easily be a team player? What types of people have more difficulty being team players? What helps promote good team player behavior?
Describe some of main cloud-specific security threats : Provide a brief definition of network access control. List and briefly define three cloud service models. Describe some of main cloud-specific security threats

Reviews

Write a Review

Basic Computer Science Questions & Answers

  What is its surface temperature at that point

The sphere diameter is 1 cm, and it rises through the bath at 1 m/s. How far will the sphere rise before its center temperature is 300°C? What is its surface temperature at that point? (The sphere has a thin nickel plating to protect the copper fr..

  How might such a move affect you and your role

You are the database administrator for the customer database of a medium-sized manufacturing firm. The database runs on an Oracle database management system.

  Review problem on structure component

Like C, C++ provides a facility for defining a structure type composed of multiple named components.

  Determine whether the markets

Determine whether the markets, businesses, or products listed below belong in a competitive market, a monopoly, or a monopolistically competitive market.

  Analysis of the overall effect of macroeconomic principles

An analysis of the overall effect of macroeconomic principles, theories, policies and tools that have influenced the economic decisions.

  Discuss the issue of securing backups

Discuss the issue of securing backups. There have been several incidents lately in which backup media containing personal customer information were lost-stolen

  Describe the concept of polymorphism

Describe the concept of polymorphism. Provide an example to illustrate your point. The example may be pseudocode

  Would like to set up 100 subnets

How to represent that using the/notation (CIDR)? Address ranges (full range) of the last two subnets

  Summer vacation working as a waiter

A college student earned $7300 during summer vacation working as a waiter in a popular restaurant. The student invested part of the money at 7% and the rest at 6%. If the student received a total of $458 in interest at the end of the year, how muc..

  Current cyber environment and research

Pick a topic pertaining to a security threat in the current cyber environment and research the dangers posed by the threat and steps that

  Volumes of internal storage space

One technology that has been used for storage is RAID. How is this technology implemented in company data centers today? Do companies buy servers with large volumes of internal storage space? Or do they tap in to more centralized storage? Why?

  Leverage in the capital structure

What is the value of the firm's tax shield (i.e. the change in firm value due to the use of leverage in the capital structure)?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd