Professional Documents
Culture Documents
(Solved) Please See An Attachment For Details - Course Hero
(Solved) Please See An Attachment For Details - Course Hero
(Solved) Please See An Attachment For Details - Course Hero
Answer resources
Explanation Related Questions Related Courses 숿
Comments (3) 쇱
a) Feasibility report
Technical problems
Security - if proper security is not implemented, then the data can be compromised.
b) Functional requirements
Calculate the charge for the customer based on weight, and waste type
Customer old and new is ambiguous because it would be difficult to separate old and new customer since they are in the same entity and
have similar attributes. Recognizing or defining what constitutes old and new is ambiguous.
Ambiguities arise when involving the clients. There are separated clients as Residential and Business. To remove this ambiguity, merging
the two entities into one and then creating an attribute for describing the type (Commercial or Residential) will be necessary.
c) Methodology
e) Visual Code is a good software development tool because it allows easy debugging. A preferred programming language is PHP, and the
database
Find
Questionapplicationstudy
Answer resources
that & Explanation
would Related Questions
be used is phpMyadmin.
Related Courses 숿
Step-by-step explanation
a) Feasibility report
Financial feasibility - the project is feasible. The design of the project will cost less than $500
Time Feasibility - the time take would be enough. It is estimated that it would take less than a month to achieve the software design.
Technical Feasibility - the business logic is implementable. The user specifications are doable and implementable
Technical problems
Scalability - there is a likely limitation to scalability when data growth. If the data grows substantial, there might be a poor
performance and the system may not perform as expected.
Security - if proper security is not implemented, then the data can be compromised. Designing the software without proper input
validation can result to SQL injection.
b) Functional requirements
Calculate the charge for the customer based on weight, and waste type
Customer old and new is ambiguous because it would be difficult to separate old and new customer since they are in the same
entity and have similar attributes. Recognizing or defining what constitutes old and new is ambiguous.
Ambiguities arise when involving the clients. There are separated clients as Residential and Business. To remove this ambiguity,
merging the two entities into one and then creating an attribute for describing the type (Commercial or Residential) will be
necessary.
c) Methodology
Software Development Lifecycle. It is a recommendable development methodology because it structures the design of the software
into systematic stages. It offers better control and management of the entries development process. It results to clarity of
requirements with proper meeting of the user needs. Through the methodology, one can easily keep track of the schedule (Okesola
et al., 2020).
e) Visual Code is a good software development tool because it allows easy debugging. A preferred programming language is PHP,
and the database application that would be used is phpMyadmin. XAMP is an application that has the Apache Server and
phpMyadmin that is structured to process MySQL queries (XAMP, n.d)
Question FindAdebiyi,
study &
Okesola, O. J.,Answer
resources
A.Explanation
A., Owoade, A. A.,Related
Adeaga,Questions Related
O., Adeyemi, O., & Courses
Odun-Ayo, 숿
I. (2020, July). Software Requirement in Iterative
SDLC Model. In Computer Science On-line Conference (pp. 26-34). Springer, Cham.
Thorough explanation
Add to library
숵 Q: The most critical factor in protecting information assets and privacy is laying the foundation for effective information
숵 Q: What are some of the things you should look at in terms of hardening the computer and network security posture of an o
숵 Q: Evaluate and compare the predictions made in the article mentioned below to the application of Machine Learning, Artific
숵 Q: Assessment Task: Background: A brand-new Airline Company has approached Cardiff Airport to establish a new base for thei
숵 Q: Develop an information security program that aligns with organizational strategies by evaluating business requirements,
See more 쇵
ITM 304
섵 32 Documents