What would be your software acquisition method

Assignment Help Computer Engineering
Reference no: EM133571277

Discussion Post

Smart Airport Passenger Processing System (SAPPS) will replace the human ID control, Airport check-in and boarding-pass process.

The new airport will have faster process timing and better security with SAPPS. The passenger will not interact with any officer at the airport with SAPPS. There will be no direct human interaction at the airport. The passenger will simply walk through a passage surrounded with hidden cameras and other remote readers.

Once SAPPS installed, in the new airport, the passenger will walk through a passage surrounded with cameras, microphones and other remote readers to do "ID control, Airport check-in and boarding-pass process" all at the same time. ID control, Airport check-in and boarding-pass process will be done while the passenger is walking from terminal entrance to his/her seat in the aircraft. The passenger will not interact with any officer at the airport.

In the new airport, passenger will get RFID bracelet at automated kiosk, this is an ATM type machine has face recognition cameras, finger-print reader and connection to DMV and IRS to authenticate the passenger and update the Airport database. This is the only step where passenger will stop and wait for the machine to put the RFID bracelet on his/her wrist. Then, passenger with RFID bracelet never stops until seating in the aircraft. One Centralized database will record and authenticate each passenger in the airport terminal.

You as the IT Manager for SAPPS were expected to address the following questions

SAPPS will need new software for ID and passport control, Airport check-in and boarding-pass processes. How can you fulfill the software needs of SAPPS project? Provide the list of software package and answer the following questions; What would be your software acquisition method? And, what type of Software Development Options you would recommend for each software package? And, explain your reasoning for the solution you selected? Why?

Reference no: EM133571277

Questions Cloud

Child welfare unit of local department of social services : You are a social worker in the child welfare unit of the local Department of Social Services. You are working with a client, Jean V., an unemployed
Concept of data governance : Consider the concept of data governance. Discuss the important strategies required for an effective data governance program.
Explain the concept of storage hierarchy in computer systems : Explain the concept of storage hierarchy in computer systems, and describe the primary characteristics of secondary storage devices.
Widespread disregard for basic principles of social justice : Why many people remain passive in the face of ?agrant violations of human rights and widespread disregard for basic principles of social justice.
What would be your software acquisition method : What would be your software acquisition method? And, what type of Software Development Options you would recommend for each software package?
How are rights of juveniles different from those of adults : How are the rights of juveniles different from those of adults? What are the conditions of custody? How are cases handled differently from those involving adult
What are data collection and data analysis in healthcare : What are the key differences between data collection and data analysis in healthcare?
Which one do you believe best explains sexual violence : Of the six sexual violence theories mentioned in the textbook, which one do you believe best explains sexual violence by men? Explain and provide rationale.
Examine challenge and opportunity associate with integration : Examine challenges and opportunities associated with integration of distributed computing solutions into comprehensive cybersecurity frameworks for adolescents.

Reviews

Write a Review

Computer Engineering Questions & Answers

  Describe the four clusters of n systems using quality

Describe the four clusters of N systems using "quality" versus "business value" coordinates. Provide a pie chart showing the approximate distribution of costs

  Discuss at least five key drivers of erm efficiency

Discuss at least five key drivers of ERM efficiency that are or should be present in your selected organization. Your discussion should include.

  Draw what a binary search tree would look like

Draw what a binary search tree would look like if the following values were added to an ini5ally empty tree in the following order.

  Write a function that converts an input of some integer

Write a function that converts an input of some integer number of inches into outputs of integer numbers of yards, feet, and inches. Do not write a main function. Your function does not do cin or cout.

  How may each stage of the procedure be implemented

New York University, Phases of Compiler perform their fundamental responsibilities in a variety of ways. How may each stage of the procedure be implemented

  What are the worst case and best case running times

What are the worst case and best case running times for this sorting algorithm? Give concrete examples on when that happens.

  What purpose would each feature serve for your site

Select at least three interactive features that could be added to your site. What purpose would each feature serve for your site and its visitors? How would you construct these features?

  What are the implications for organizational change

What areas of organizational behavior or design are impacted by information technology, and what are the implications for organizational change?

  Description in the last episode of the mafghanistan trilogy

description in the last episode of the mafghanistan trilogy the mamerican forces invaded liberated mafghanistan in

  How costly is damage done by computer viruses

What did you leam? How costly is damage done by computer viruses? Search for reports that summarize the impact both in terms on dollar value and the number

  Write a script that compares two directories

Write a script that compares two directories bar1 and bar2 and copies or overwrites to bar1 from bar2 every file that is not present in bar1.

  Determine the type of computer forensic skill and procedures

Determine the type of computer forensic skills and procedures or tools that could have been used to extract and preserve the data. Interpret how you believe a computer was used to commit the crimes they were being accused of.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd