Showing posts from January 20, 2013

Unattended Fuel Pump System

Using techniques suggesting in the text,  create a document that identifies user requirements for ONE of the following functions.  An unattended petrol (gas) pump system that includes a credit card reader.  the customer swipes the card through the reader then specifies the amount of feel required. the fuel is delivered and the customer's account is debited. The cash-dispensing function in a bank ATM   The spelling-check and correcting function in a word processor.   Please download my article from Google Drive: These are articles from my masters in software engineering classes.  Elad Shalom, CTO at

Project Software and Identifying Stakeholders

Problems in Collecting Project Software and Identifying Stakeholders   Key stakeholders in any project are really the key to the successful management and valuing a software collecting project. At time stakeholders are left out of the project both in recognizing and utilizing. A stakeholder’s role is difficult to understand and this may cause the neglect. Stakeholders in a project can be individuals who are directly or indirectly impacted by the project itself. Stake holders should be involved in the collecting process by using regular communications. Examples of individual stakeholders can be the owner of the software being used, the developers around the software and those who have bought into the project (Brugger, 2010). There are group stakeholders that may be external or internal. A software development team who develops software for different departments is an internal stakeholder.   If software being collected is to be commercialized, the pubic becomes an external sta

Feasibility Study

When determining the feasibility of a software product, we take into account such system elements as hardware, software, and people. Discuss some other elements that need to be taken into account in a computer-based systems.   Computer-Based Systems Essential Elements There are six basic components of a computer-based system. These are the hardware, software, people used to run the system, the data that is the heart of the system and the procedures that run the system. The final component is communication. Hardware is the physical component of a computer system. This includes the hard drive, motherboard, the additional drives and the components that actually make the system run. Software is the instructions given to a computer- based information system that tells the hardware how to perform. People are required to operate the system, create and use the software, choose how to apply the software and physically develop the computer based system. Without people there wou

Protecting Personal Data

Protecting personal data can be overwhelming, but it is not impossible. There are highly secure tools both online and offline to protect personal data. Shielding personal data can be logical, highly secure as well as inexpensive. Protecting Personal Data Offline   Physically lock your financial records and personal documents in a safe place in your home. Purchase an inexpensive fire-proof safe that can be stored in a secure closet, built in your floor or wall.   A good fireproof safe costs from $100 to $3000 (Sears, 2013). Protect your wallet and or purse in a desk drawer at work. Limit what you carry when you go out. Never keep your social security card in your wallet; lock it up. When filling out forms in the workplace, the doctor’s office, or your child’s school ask how your information will be safeguarded. If you do not have to fill out every little detail of your life, leave that portion blank. Ask for the consequences of not providing specific information. Shr

Privacy Laws The United States and Globally

Research laws regarding privacy and data protection in your country and tell us about them. How do they compare to those in other parts of the world?   Privacy Laws: The United States and Globally The protection of personal information has become increasingly important due to internet use that enables personal data to be distributed instantaneously. If you are conducting business in global jurisdictions you do need to be aware that privacy laws are not equal in every country. Use the most restrictive regulatory regimes to avoid difficulties (Carron, 2009). The United States is a leader in developing new technologies to support internet infrastructure and electronic commerce. As this commerce becomes more global there are concerns about new business models and the technologies that may compromise privacy interests of consumers. Advocates for privacy protections argue that privacy issues need more laws. The Federal Trade Commission Act was enacted to prevent unfair competition