Wfabilling project in java, Computer Network Security

Assignment Help:

WFABilling project in Java:

 Project Title: WFABilling 

Role                      : Developer

Domain                 : Tele-Com

Environment          : Java, J2EE, Struts, HTML, XML, CSS, JavaScript, Tomcat, Oracle, MyEclipse, Windows XP, CVS, ANT, Unix, Shell Script.

Description:

                   WFABilling is a set of applications for posting charges and credits to various company wide billing systems. The system input consists of several flat files listing repair/installation tickets. We post credits and debits based on the work performed or outage duration.

Everything we process is a work ticket. They are either charges for installation/repair or credits (when an outage is our fault). The charges are referred to as CSC tickets, the credits are CCA. Our job is to enter adjustments to customer bills for these tickets.

          We don't process the tickets as soon as we get them, we let them set for some period of time (this is the pooling period). We pool tickets for two reasons. The primary reason is to give the field time to make changes to the tickets. It's common for a ticket to be entered on one day and then updated on the next. Since we can't back out adjustments to the customer's bill, we just let the tickets sit and collect changes.

          The second reason is to give information time to flow from one mainframe system to another. Just because an account exists in WFA (a ticket source) doesn't mean that CABS (a billing system) has it yet. This second reason is also the reason we retry tickets. Just because we can't post a ticket on one day doesn't mean we can't post it the next. 

Responsibilities:

  • Involving in designing and coding of projects.
  • Involving in Unit Testing and System Testing.
  • Involving in the bug fixing and issue solving 

 


Related Discussions:- Wfabilling project in java

Describe phishing attacks, QUESTION (a) (i) Describe Phishing attacks. ...

QUESTION (a) (i) Describe Phishing attacks. (ii) Distinguish between Phishing and Spear Phishing attacks. (b) Describe two instances where an attacker sniffing on a netwo

Digital certificates-cryptography, Digital Certificates Digital Certific...

Digital Certificates Digital Certificates are electronic document having key value and identifying information about entity which controls key. Digital signature which is attach

Nstissc security model, NSTISSC SECURITY MODEL The NSTISSC Security Model ...

NSTISSC SECURITY MODEL The NSTISSC Security Model provides a detailed perspective on security. While the NSTISSC model covers the 3 dimensions of information security, it removes

Implement database security, Question: (a) Describe fully with example ...

Question: (a) Describe fully with example the two access control methods available to implement database security. (b) Discuss why database statistics (meta data) provide es

Linux, Discuss the risks of having a single root user

Discuss the risks of having a single root user

Transmission errors in networking, TRANSMISSION ERRORS:  Transmission...

TRANSMISSION ERRORS:  Transmission exceptions may happen due to different causes for example power surges or interference may delete data during transmission. In result of wh

Introduction to network protocol, In this assignment, you are required to e...

In this assignment, you are required to emulate the operation of a link layer and network layer protocols in a small computer network. Your program should behave like a single node

Discuss the importance of ontologies in agent communication, Question 1...

Question 1 The speech act theory is used as the model for communication among computational agents. Locution, illocution, and perlocution are the 3 aspects of this theory Using

Cyber security, How to pretect my computer from attacking

How to pretect my computer from attacking

Distinguish between passive and active attacks, Problem (a) Distinguis...

Problem (a) Distinguish between passive and active attacks. (b) Give two reasons why it is important to organise security awareness programs for users. (c) Describe how

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd