Free Essay

Software

In:

Submitted By kaine
Words 3199
Pages 13
BCS HIGHER EDUCATION QUALIFICATIONS BCS Level 6 Professional Graduate Diploma in IT April 2010 EXAMINERS’ REPORT

WEB ENGINEERING
Examiners’ General Comments The pass rate this year has significantly increased from previous years, but despite this overall increase it is clear that there are a number of candidates who are ill-prepared for the examination. Candidates should particularly note that the paper aims to cover contemporary topics, and should keep abreast of current and popular developments in preparation for this paper. The examiners would repeat the general comments made before in their report: “The subjects covered currently include XML, web programming, web 2.0 and other current technologies. The paper attempts to be contemporary in the topics it covers, and each year will introduce some new topics within the remit of the published syllabus. It is important for candidates to know that whilst on occasion questions may look similar to those in past papers, the context and approach is often significantly different, which means that previous answers cannot simply be restated; thus it is not appropriate to memorise and re-state past paper answers. Additionally, the answer pointers provided here give guidance and are only a guideline and should not be merely quoted by candidates, but applied to the topic of the question.”

A1 a) i) Explain the role and structure of a DTD in relation to an xml document. ii) Explain the role and structure of an XML schema in relation to an xml document. iii) Explain how an xml document would call:  an internal DTD  an external DTD and;  an XML schema. b) i) Compare and contrast the workings of a DTD and an xml schema. You should state the benefits of using each. [3 marks] ii) Generate an appropriate sample XML document based on the xml schema in figure 1.1 [2 marks] [2 marks]

[3 marks]

[2 marks]

Figure 1.1 – XML Schema for Question A1 b) ii)

c)

Write an external DTD for the XML file in fig 1.2:  The element trainlog may contain, in any order, one or more session and progress_report elements.  A session element must first contain a duration element, followed by distance element, followed by a location element, followed optionally by a comment element, followed by zero or more photo elements.  The date and heartrate attributes in session are optional.  The type attribute in session must be present but allow only 3 values – running, swimming, cycling - with default set to running.  A photo element must contain a url attribute, but may not contain any text.  A progress_report element must contain one or more comment elements. [13 marks]

 50 5.5 Hyde Park Mid-morning run, a little winded throughout. 1.5 26.4 Crystal Palace Hilly ride, felt strong as an ox. 2.5 16.8 Regents Park Afternoon run, felt reasonably strong. Performance improved significantly

Figure 1.2 – Sample Document for Question A1 c)

Answer Pointers a) i) The purpose of a DTD (Document Type Definition) is to define the legal building blocks of an XML document. A DTD defines the document structure with a list of legal elements and attributes. ii) XML Schema is an XML-based alternative to DTD. An XML schema describes the structure of an XML document. The XML Schema language is also referred to as XML Schema Definition (XSD). iii) The DTD is declared in a DOCTYPE declaration beneath the XML declaration contained within an XML document:  Inline Definition:



External Definition:



XML schema:

b) i) DTD's are not namespace aware.

DTD's have #define, #include, and #ifdef – or, less C-oriented, the ability to define shorthand abbreviations, external content, and some conditional parsing. A DTD describes the entire XML document (even if it leaves "holes"); a schema can define portions. XSD has a type system. XSD has a much richer language for describing what element or attribute content "looks like." This is related to the type system. You can put a DTD inline into an XML document; you cannot do this with XSD. You have far more control over what is considered a valid XML document using a schema. You can even    ii) John Smith Jane Doe 24 Bond Street London W5 UK Empire Burlesque Special Edition 1 10.90 Hide your heart 1 9.90

extend your types from other types you've created, require uniqueness within scope, and provide lookups.

c) ]>

Examiners’ Guidance Notes Most candidates answered part (a) satisfactorily with some exceptions. Some students did not know about XML schema. There were some excellent answers to the comparison of DTD and xml schema, however, b(ii) was not done well. Some students did not create the required sample to demonstrate the use of an XML schema. Answers to part (c) were of good quality. Most candidates demonstrated good competence in writing DTDs, with minor errors in the finer details of attribute types and default values.

A2 a) A simple DTD to record company information is provided in figure 3.1. i) Explain what it means for an XML document to be “well formed” and “valid.” [1 mark]

ii) The XML document in figure 3.2 contains precisely four errors when validated against the DTD of figure 3.1. Identify all the errors and for each one provide a correction. Note: the line numbers are for your benefit and are not part of the XML code. [4 marks]
1. 2. 3. 4. 5. 6. 7.

Figure 3.1 – DTD for Question A3 a) and A3 c) Figure 3.2 – XML document with errors for Question A3 a) ii)
1. 2. 3. 4. 5. 6. 7. 8. 9. IBM

b) Data can be stored in child elements or in attributes as demonstrated by figure 3.3. Briefly state five factors to be considered when using attributes instead of child elements. [5 marks] Tove Jani Reminder Don't forget me this weekend! 12/11/2002 Tove Jani Reminder Don't forget me this weekend! 12 11 2002 Tove Jani Reminder Don't forget me this weekend!

Figure 3.3 – Example of child elements and attributes for Question A3 b)

c)

A simple DTD to record company information is provided in figure 3.1. The employment agency has updated the above simple DTD to record information on all client companies that have commissioned recruitment activity since the beginning of the year. Sample XML is shown in figure 3.4. There is now a need to render this information as a web page that can be accessed by the agency staff. Using the HTML template provided in figure 3.5, complete the missing code in figure 3.5 (the section marked ) to accomplish this. A mock-up of the required rendered page is shown in figure 3.6. [15 marks] IBM Bob Jones 0044112233 bjones@ibm.com Analyst Design payment systems London £30000 25 Feb 2010 Usability Engineer Evaluation of new systems Glasgow £28000 12 Mar 2010 ORACLE Bill Smart 0044454545 bsmart@oracle.com Database Designer OO background London £40000 25 Mar 2010

Figure 3.4 – Sample XML document for Question A3 c)

Current Job Vacancies Current Job Vacancies Company Contact email Phone

Figure 3.5 – XSL stylesheet for Question A3 c)

Figure 3.6 – Mock-up of required web page for Question A3 c)

Answer Pointers a) i)  A well-formed document conforms to all XML syntax rules (e.g. opening tags must all have a closing tag, be nested properly etc.).



A valid document is a well-formed XML document that conforms to semantic rules (as defined in a DTD or XML schema)

ii) Errors are:    Line 5: invalid attribute value (the value for CODE needs quote mar Line 6: Undefined element type (company_name should be Company_name) Line 7: invalid start-tag (Required attribute not specified: page)

 Line 9: mismatched end-tag ( should be ) b) Some of the problems with attributes are:         c) DTD (not required)

attributes cannot contain multiple values (child elements can) attributes are not easily expandable (for future changes) attributes cannot describe structures (child elements can) attributes are more difficult to manipulate by program code attribute values are not easy to test against a DTD using attributes as containers for data, leads to documents that are difficult to read and maintain. use elements to describe data. Use attributes only to provide information that is not relevant to the data.,

XSLT (required) Current Job Vaccancies Current Job Vaccancies Company Contact Email Phone

Job Title Salary Location Start Date

Examiners’ Guidance Notes Most candidates did very well on part (a), identifying the errors accurately in the XML document. Answers to part (b) varied from some very good answers to very weak ones. Students could have referenced the example given to articulate the factors to be considered when deciding to use child elements or attributes. Answers to part (c) varied from very good to very poor. Some candidates had no knowledge of how to render an xml document as a web page, HTML code was submitted to mirror the sample display which clearly was not right. Some candidates failed to realise that there were two nested for loops rather than two independent for loops as part of the xslt code. A new development seen for the first time regarding this topic was an emergence of a group of candidates who were ill prepared for this question with very low scores.

B3 You are acting as a consultant for a financial institution, advising on the development of an online banking service. a) One possible security risk when accessing a banking website from a publicly accessible computer, is a hardware key logger that captures passwords; this is often solved by using on-screen (virtual) keyboards to enter data into a web form. i) What is meant by the term “hardware key logger”? [2 marks] ii) Aside from the use of key loggers, outline four other security risks and, for each risk, detail a method to prevent it. [8 marks] b) The in-house developers have outlined three possible schemes for authenticating their users. You have been asked to comment on these systems both from a security perspective (how safe the scheme will be) as well as from a user’s perspective (how easy the scheme will be to use).

Proposed scheme A    Type in your email address Type in your password (6 characters, alphabetic) Select the first and the second digits of your PIN (6 digits) from a drop-down list

Proposed scheme B    System-generated user number (created on registration, 11 digits long) Type in your password (6-12 alphanumeric characters) Type in your favourite colour

Proposed scheme C       i) Type in your first name Type in your last name Type in your postcode/Zip code Type in your date of birth Type in your mother’s maiden name Enter a one-time code using a hardware bank card reader and your debit card.

Outline TWO strengths and TWO weaknesses of each of the three schemes.

[9 marks] ii) Devise a new scheme for authenticating users on this site which is superior to all three schemes [6 marks] outlined above. Explain how it overcomes the weaknesses identified in part b) i).

Answer Pointers a) i) A hardware keylogger is a device placed inbetween a computer and keyboard that captures all keyboard activity to an internal memory. ii) Sample risks include:  Brute forcing (locking out accounts after a small number of failures)  Phishing (Microsoft’s anti-phishing filter).  Packet sniffing (use encryption).  Keylogger on client machine (check physical hardware and/or run a rootkit checker/antivirus).  SQL injection attack (ensure all user inputs are validated on the server side).  Denial of service attack (maintain mirror of server application & data).  Spyware on client machine (use antivirus/spyware checkers).  Not destroying letters with sensitive information e.g. passwords (shred confidential documents when disposing). b) i) Possible answers: Strengths Weaknesses A  Reasonably easy to remember login  Short alphabetic password gives only details. ~300 million combinations => brute forcible.  Defends against keylogging by using drop down lists  Requiring only the first and second digit of the PIN gives only 100 combinations.  Partial defence against phishing by only needing two digits from the PIN. B  Reasonably strong password.  Difficult to remember login details (randomly generate user ID), so more  Relatively fast to log in (only three text likely to write details down. fields to be entered).  All data is typed, so susceptible to keylogging.

 Favourite colour might be guessable (e.g. most people would choose a primary colour or black) C  Susceptible to identity fraud, as login details are almost entirely based on common personal details.  Lots of details to be typed in.  Mother’s maiden name is known by other people (e.g. family members).  Hardware device is not likely to be convenient for people to carry around, limiting ease of use of service when mobile. ii) An open question, but solutions must address all weaknesses of the previous schemes (both security and usability), whilst remaining reasonably simple for the end user. Possibilities might include:     Selecting random digits from a 6 digit PIN instead of merely two predetermined ones. Asking for one personal detail from a random selection (e.g. mother’s maiden name, favourite colour, name of first pet). Offering to remember the system username (not advised for multi-user PCs or accessing the site from a public computer). Allowing passwords to be alphanumeric and of variable length, with a sensible minimum length (e.g. 6 characters).  Very easy to remember login details.  Requires a collection of details that would be very difficult to brute force (but not find out through other means).  Hardware device means that attackers need physical access to an item before they can attack.

Examiners’ Guidance Notes Part a) i) was mostly well answered, though many candidates described keyloggers in general and did not notice that the question referred to hardware keyloggers. Part a) ii) was typically well answered, although a number of candidates seemed to consider “viruses,” “worms,” and “trojans” to be three entirely distinct security risks when they are all aspects of the larger security threat of “malware.” Some candidates were too vague in the risks identified, with answers such as “hacking” – an answer as vague as this does not gain any marks. Finally, some candidates were simply giving the name of a security risk – the question specifically asks the candidate to outline the risk, i.e. briefly describe. Part b) was reasonably answered by most, though there was often an emphasis on the security aspects at the expense of the usability aspects (a requirement of the question). The generic (and meaningless) phrase “for security reasons” was provided as an answer in some cases – this style of answer does not attract any marks. Part c) was typically poorly answered, with many candidates simply using one feature from each of the given schemes. Some candidates went over the top with security, producing almost entirely unusable (and therefore not very useful) systems. Some candidates mentioned the “CAPTCHA” system without explaining how this would increase security, and without identifying the impact this may have on usability.

B4 a) Write HTML to construct the form as indicated in figure 4.1. When the button marked “Search for games” is pressed, the form should submit to a script called games.php [4 marks]

b) When invalid data is entered into a form, a well-designed system will spot the invalid data and report them back to the user with an error message. i) Why is it important to catch invalid data? [2 marks] ii) What would be an appropriate error message for a login attempt that fails due to an incorrect password (but correct username)? [2 marks]

c)

Better systems will automatically re-generate the form with most data already completed (to save the user from entering it a second time). i) With a justification, give one example of form data that should NOT be automatically completed in a regenerated form. [2 marks] ii) Write code (at the server side in ASP, PHP, or Perl) to validate that the date of birth entered is not in the future, and if there is an error re-generate the original form from part a) with the entered data already filled in. [5 marks] Notes:   You do not require regular expressions to complete this task, but you may use them if you wish. You may find the PHP function int strtotime (string $time) useful in this task (which parses a string into a Unix timestamp), where $time is a textual description of a date/time e.g. "2009-12-31" for the 31st December, 2009 or "now" for the current system time on execution.

d) The server has a database named Games, with a single table named GameRatings (as shown in figure 4.2). You may assume the web server and the database server are hosted on the same computer. This database holds details of age ratings for video games which are listed in figure 4.3. For parts ii) and iii), assume that the php script games.php has already established a valid connection to this database. In all cases, you should state the language you are using (ASP, PHP or Perl). i) Write code to connect to the database. [1 mark] ii) Write code to retrieve the details of the game with the title that is exactly the same as the text entered in the “Enter the game title” field. [3 marks] iii) Write code to retrieve and display (in an appropriate format) the details of all games that can be bought by the person whose date of birth has been entered. [6 marks] Note: The following SQL syntax may be useful to accomplish these tasks:  SELECT * FROM tbl_name WHERE col1 = val1; (Where tbl_name, col1, val1 etc. are to be replaced with appropriate values)

Figure 4.1 – Sample HTML form for Question B4 a)

Figure 4.2 – Database Entity-Attribute diagram for Question B4 d)

UC PG 12 15 18 Rating 5 years 10 years 12 years 15 years 18 years Minimum age Figure 4.3 – Age rating categories and minimum age required to buy the game

Answer pointers a) Video Game Rating Search Search Games Enter the game title: Enter your date of birth:

b) i) For a program to operate effectively, correct data is vital. Data validation is important because it is not possible to predict what the user agent will enter into input fields. Data may be corrupt, missing, badly formed or even maliciously designed to exploit weaknesses in the program. Something in the vein of “Invalid username/password combination – please re-check your details and try again”. 0.5 marks should be given for a message such as “Invalid password” (since it gives information that the username might have been correct). c) i) An example of data that should not be regenerated would be passwords - this is because a) the form data may not be transmitted using HTTPS and b) because the password will be visible in the source code of the cached page (which is a potential security risk).

ii)

ii)
$dateOfBirth = $year . "-" . $month . "-" . $day; $ageInSeconds = strtotime("now") – strtotime($dateOfBirth); if $ageInSeconds < 0 { ?> Video Game Rating Search Search Games Enter the game title:

Similar Documents

Premium Essay

Software

...Principle of Software Engineering Table of Contents Abstract 3 Introduction 4 Boehm's First Law 4 Boehm's Second law 5 Conway's law 5 Parnas Law 6 Corbató Law 7 Observation 8 Theory 9 Law 9 Question 3 10 Law 11 References 12 Abstract The purpose of the study is to show the capability to understand the set of laws that are the part of principles of the software engineering. In this paper, it is discussed that there are many laws related to the software engineering but only few of them are to be addressed. Boehm first and second law, Conway’s laws, Parnas laws & Corbato law were discussed with examples. There are two relationship processes that are also discussed, related to the software Engineering. Law method and tools which are depended on each other and they are performing the task with the help of principle and process by following the rules. Same scenario is followed in other relation too, where observation, law and theory are depended on each other. Observation is repeatable to law and law is explained by theory. Theory should be confirmed by the law and it predict by the observation before further proceeding. Introduction Question No 1 Boehm's First Law Errors are more regular in the middle of fundamentals and configuration exercises and are more abundant when they are displaced. In this law, some basic configuration errors do outnumber code blunders. However, cost stays smooth...

Words: 1641 - Pages: 7

Free Essay

Software

...Identify two periodical publications that focus on software architecture (either solely or partly). Submit the following information: publication name, URL, publisher name, & the year it was first published. IEEE Potentials, First Publication Year: 1982 URL : http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=45 Publisher Name: IEEE Xplore Msdn magazine First Publication Year: 2001 URL: https://msdn.microsoft.com/en-us/magazine/dn973005.aspx Publisher Name: The Microsoft journal for developers Write a half-page short essay comparing and contrasting software architects and software engineers. Software architect has responsibility for guaranteeing coherence of all aspects of the project as an integrated system. Architect answerable for overall technical quality, developer for lower implementation selections. The architect holds the futuristic views and proactively sees the system before it\'s designed, being the holder of the vision. Software architect focuses on money and also the disposition and drive to guide individuals. a leader who will apply/share their broad framework. Pragmatic handling of the technical solution and act with the business in addition as the techies, marketing the vision to each. A software architect has the vision to own the most effective style ideas. Architects will see each micro and macro (inwards and outward) whereas engineers see small and outwards and want to be carried by the architect to examine macro/outwards. Maintaining...

Words: 892 - Pages: 4

Premium Essay

Software

...Software Quality Assurance Software quality assurance Software quality assurance, often referred to in the industry as "software testing" or "QA testing" consists of thoroughly testing every aspect of a software project to ensure that: 1. It functions as intended and does not contain errors 2. It complies with the previously established development guidelines As the interactive software industry grows, software quality assurance has become more and more complicated. Many offshoots have arisen and considerably complicated the software testing jargon: security testing, unit testing, usability testing, load testing, scripted testing, compatibility testing, etc. In the end, what software quality assurance is all about is making sure that your software product works seamlessly for all your users. While we may expand into other areas in the future, we at the Crowdsourced Testing company specialize in one particular type of testing known as functional testing. The sad reality of software quality assurance The unfortunate reality of the software development industry is that testing is often neglected because development companies are under a tremendous amount of pressure to deliver their projects faster and faster. Furthermore, software programming is a complex endeavor and it is very difficult to know ahead of time exactly how much time will be needed to develop a particular project. What usually ends up happening is that programmers work until the very last minute available...

Words: 616 - Pages: 3

Free Essay

Software

...Robert P. Ward Software Engineering in the Small Smaller-sized software companies are developing significant products that need effective, tailored software engineering practices. n 1968, the NATO Software Engineering Conference in Garmisch, Germany [6] initiated the concept of software engineering, identifying the problems with producing large, high-quality software applications. In 1975, De Remer [2] introduced the terms, “programming in the small” and “programming in the large” to differentiate the development characteristics of large-scale software development from detailed programming (for example, data structures and algorithms). The principal source of large-scale software at the time was development contracts issued by the U.S. Department of Defense. Since then, virtually all software engineering literature has concentrated explicitly and implicitly on the model of DoD contract software development. Since the late 1970s, the microcomputer revolution has dramatically increased the quantity of software produced, the average I size of programs, and the number of companies involved in software development. Much more software is produced for internal use, commercial applications, and the mass-market than for deep-pocketed government and large industry. Using the number of units sold, mass-market software dwarfs the other forms of software sales. The growth of the software industry has produced many small companies that do not do contract software, but rather compete...

Words: 2136 - Pages: 9

Free Essay

Software

...Ariel M. Vasquez November 24, 2014 CIS331 System Modeling Theory Professor Randy Arvay Software System Architecture For this case the question is asked which system would be best to implement for this case. There are several different types of cases to chose from. They all with their own particular benefits and negatives at the same time The one that fits this needs in particular would be the event driven system. What is an event driven architecture system? An event driven architecture, or EDA for short, is a pattern that focuses on promoting production, detection, and consumption. Most of its works occur during an event. In the medical field, which this case revolves around, have thing change a lot during the course of not only a day even within every hour this change. Whether it's from a patient's medical records, stock of inventory, medicines provided to a patient, and even when a patient enters and exits the hospital. With a system like EDA thing will only occur when things change and this pattern seems to be able to handle those changes better than the others. The following image will show basically how this type of system will work. A system that integrates EDA may also provide a higher level of service to help with the implementation of EDA. Things like security, reliable messaging, content based routing, and mapping and transformation. The security that this provides is message encryption, authentication, and access control. With the messaging this provides...

Words: 418 - Pages: 2

Premium Essay

Software

...Software is a general term for the various kinds of programs used to operate computers and related devices. (The term hardware describes the physical aspects of computers and related devices.) Importance of Software Security Assurance As organizations worldwide increase their reliance on software controls to protect their computing environments and data, the topic of Software Security Assurance grows in importance. The tremendous potential costs associated with security incidents, the emergence of increasingly complex regulations, and the continued operational costs associated with staying up to date with security patches all require that organizations give careful consideration to how they address software security. For more information on Software Security Assurance, see Wikipedia on Software Security Assurance. Oracle Software Security Assurance Encompassing every phase of the product development lifecycle, Oracle Software Security Assurance (OSSA) is Oracle's methodology for building security into the design, build, testing, and maintenance of its products. Oracle's goal is to ensure that Oracle's products, as well as the customer systems that leverage those products, remain as secure as possible. Oracle Software Security Assurance is a set of industry-leading standards, technologies, and practices aimed at: • Fostering security innovations. Oracle has a long tradition of security innovations. Today this legacy continues with Oracle's market leading database security...

Words: 484 - Pages: 2

Free Essay

Software

...Five Models Of Software Engineering Nabil Mohammed Ali Munassar1 and A. Govardhan2 1 Ph.D Student of Computer Science & Engineering Jawahrlal Nehru Technological University Kuktapally, Hyderabad- 500 085, Andhra Pradesh, India Professor of Computer Science & Engineering Principal JNTUH of Engineering College, Jagityal, Karimnagar (Dt), A.P., India 2 Abstract This research deals with a vital and important issue in computer world. It is concerned with the software management processes that examine the area of software development through the development models, which are known as software development life cycle. It represents five of the development models namely, waterfall, Iteration, V-shaped, spiral and Extreme programming. These models have advantages and disadvantages as well. Therefore, the main objective of this research is to represent different models of software development and make a comparison between them to show the features and defects of each model. Keywords: Software Management Processes, Software Development, Development Models, Software Development Life Cycle, Comparison between five models of Software Engineering. increased recently which results in the difficulty of enumerating such companies. During the previous four decades, software has been developed from a tool used for analyzing information or solving a problem to a product in itself. However, the early programming stages have created a number of problems turning software an obstacle to...

Words: 3810 - Pages: 16

Free Essay

Hardware and Software

...Hardware and Software Paper CIS 205 Hardware and software play a very important role in business today and if combined together they can support personal, workgroup, and enterprise computing. In my organization we use Windows based computers for each workstation in each respective location. With the appropriate hardware networking the computers together, we are able to communicate through our network. In this case, we are a small business so we followed the steps necessary to map drives together in the various locations. The hardware needed for our network is a modem, router, Ethernet cables, external hard drives, and power supplies. The software we use to run our network is Windows. When used together this hardware and software help us operate our organization efficiently by easily sending and receiving information. We are able to navigate to any computer’s information in our company through this network. As a design, printing, and embroidery company, we use many online applications to help support and organize our information. The majority of our incoming business comes from the internet. I use an online application called Oss designer to download customer art, organize customers data, and obtain the necessary information from a customer to get the job done. We also use the Oss software to obtain payments for our services. In order to track customers we use an invoice and customer tracking program called Quickbooks. This software enables us to easily create invoices...

Words: 572 - Pages: 3

Free Essay

Escoger Un Software

...calendario para una presentación del software * Reunir a todo el equipo para la presentación del software. * Seleccionar 2 candidatos posibles. * Elegir el proveedor adecuado. Primero debemos recolectar la información de los posibles proveedores y de entre ellos escoger los 3 o 5 proveedores que se ajusten más a nuestros requerimientos. Después debemos reunirnos con cada uno de ellos para poder conversar y evaluar si pueden ser posible candidatos a para convertirse nuestro proveedor. Una vez que nos hemos reunidos pasamos a agendar una presentación del software con todos los empleados que van a utilizar el mismo para que se vayan familiarizando con este. Una vez que hayamos realizado el análisis del posible proveedor y lo hayamos escogido, pasamos a la firma del contrato con el proveedor bajo los términos y condiciones pactadas entre las partes. * Proporcionar información para la personalización de aplicaciones de gestión. Debemos proporcionar cualquier información útil para el equipo: manual de políticas y procedimientos, informes clave, el acceso al sistema actual y para que de esta forma el proveedor sea más exacto con el software que vamos a usar para operar nuestra empresa. * Análisis y la firma del documento DERCA. Este documento es donde especificaremos los requerimientos de nuestra empresa como los procesos del sistema, las interfaces de entrada y los conectores de salida, como tomamos la decisión de usar un canned software tenemos...

Words: 1063 - Pages: 5

Free Essay

Hardware Software

...HARDWARE AND SOFTWARE PAPER Hardware and Software Paper Nathen Hill University of Phoenix Introduction Here at D & G Inc. we are a shipping and receiving company. We sell just about everything, we are a middle man company for several online stores. When you purchase a products online like a DVD the company you purchase through invoices D & G Inc. and we ship the product via UPS to you. At D & G Inc. the Hardware we use a basic Dell Computers running Windows XP. We have about thirty computers in the warehouse and offices. We use Telzall scanning devices to scan and keep track of all merchandise in the warehouse. Without the proper hardware and software tools, the job of keeping track of tens of thousands of products would be a much more time consuming, and need many more employees to accomplish correctly . Hardware and Software The software we use here at D & G Inc. is the most important part of smooth operations. The software we use was created for us at D & G Inc. The system is called SMART it connects all of our databases together. The SMART system makes easy access to any database through, one of the dell computers or through the handheld Telzall scanners. The SMART system runs the time clocks to keep track of all employee hours. First you scan in your ID badge in to the time clock provided on the wall next to all exits. Once you are scanned in to the SMART system you are allowed to log in to the database...

Words: 708 - Pages: 3

Free Essay

Hardware and Software

...Hardware and Software Name Professor Name Name of Class Hardware and Software Here at Enterprises we are a shipping and receiving company. We sell just about everything; we are a middleman company for several online stores. When you purchase products online like a DVD the company you purchase through invoices Enterprises and we ship the product via UPS to you. At Enterprises the Hardware we use a basic Dell Computers running Windows XP. We have about thirty computers in the warehouse and offices. We use Telzall scanning devices to scan and keep track of all merchandise in the warehouse. Without the proper hardware and software tools, the job of keeping track of tens of thousands of products would be a much more time consuming, and need many more employees to accomplish correctly. Hardware and Software The software we use here at D & G Enterprises is the most important part of smooth operations. The software we use was created for us at Enterprises. The system is called SMART it connects all of our databases together. The SMART system makes easy access to any database through, one of the dell computers or through the handheld Telzall scanners. The SMART system runs the time clocks to keep track of all employee hours. First you scan in your ID badge in to the time clock provided on the wall next to all exits. Once you are scanned in to the SMART system you are allowed to log in to the database and access information you need to perform your...

Words: 698 - Pages: 3

Free Essay

Hardware and Software

...Hardware and Software Your Name Date Class Name Teacher’s name The system that best resembles the hardware and software used at the nursing home located in PA that I used to work for is the Power Macintosh 9500. According to Wikipedia.org, the system was sold between 1995 through 1997 and has the following hardware installed, “It was powered by a PowerPC 604processor, a second-generation PowerPC chip which was faster than the earlier PowerPC 601 chip. The 180MP and 200 used the enhanced PowerPC 604e processor. The CPU was connected via a daughterboard, and so could be swapped easily. Available were single-processor cards ranging from 120 to 200 MHz, and a dual processor card with two 180 MHz CPUs. It was the first Macintosh to use the PCI standard, with six PCI slots available, with one always needed for the graphics card.” The exact breakdown of system hardware can be seen at the Apple website at the following link, http://support.apple.com/kb/SP492. The overall operations of the system are great for its age and can even be enhanced with a new program entitled “Leopard” (also available from Apple) that could help the overall performance of the system and was actually the oldest model that is compatible with that program. As for the software, we all know that there are significant differences between workgroup, personal, and enterprise uses such differences can be seen with the different programs each use has to offer, some examples of the differences are business...

Words: 847 - Pages: 4

Premium Essay

Software

... Chinyere repper. Software for Business. MS PROJECT (PROJECT PLANNING) Microsoft Project is a project management software program, developed and sold by Microsoft, which is designed to assist a project manager in developing a plan, assigning resources to tasks, tracking progress, managing the budget, and analyzing workloads. Microsoft Project was the company's third Microsoft Windows-based application, and within a couple of years of its introduction it became the dominant PC-based project management software. While part of the Microsoft Office family, it has never been included in any of the Office suites. It is available currently in two editions, Standard and Professional. Microsoft Project's proprietary file format is mpp. Microsoft Project and Microsoft Project Server are the cornerstones of the Microsoft Office Enterprise Project Management (EPM) product. Microsoft Project 2010 features the Ribbon user interface. Microsoft Project management software is closely integrated with Microsoft Office suite and also includes a Client Access License (CAL) that allows easy connection with Office Project Server. It is a project management software that is mainly used to create plans, monitor progress, analyze workloads, designate resources to tasks and manage budgets. The software also helps in establishing critical path schedules and may also be helpful...

Words: 841 - Pages: 4

Premium Essay

Computer Software

...Computer software From Wikipedia, the free encyclopedia Jump to: navigation, search "Software" redirects here. For other uses, see Software (disambiguation). Computer software, or just software, is a collection of computer programs and related data that provide the instructions for telling a computer what to do and how to do it. In other words, software is a conceptual entity which is a set of computer programs, procedures, and associated documentation concerned with the operation of a data processing system. We can also say software refers to one or more computer programs and data held in the storage of the computer for some purposes. In other words software is a set of programs, procedures, algorithms and its documentation. Program software performs the function of the program it implements, either by directly providing instructions to the computer hardware or by serving as input to another piece of software. The term was coined to contrast to the old term hardware (meaning physical devices). In contrast to hardware, software is intangible, meaning it "cannot be touched".[1] Software is also sometimes used in a more narrow sense, meaning application software only. Sometimes the term includes data that has not traditionally been associated with computers, such as film, tapes, and records.[2] Examples of computer software include: * Application software includes end-user applications of computers such as word processors or video games, and ERP software for groups of...

Words: 3223 - Pages: 13

Premium Essay

Software Licence

...Autodesk SOFTWARE LICENSE AGREEMENT Worldwide READ CAREFULLY: AUTODESK, INC. (“AUTODESK”) LICENSES THIS SOFTWARE TO YOU ONLY UPON THE CONDITION THAT YOU ACCEPT ALL OF THE TERMS CONTAINED IN THIS SOFTWARE LICENSE AGREEMENT (“AGREEMENT”). BY SELECTING THE “I ACCEPT” BUTTON BELOW THIS AGREEMENT OR BY INSTALLING, UPLOADING, ACCESSING, OR OTHERWISE COPYING OR USING ALL OR ANY PORTION OF THE SOFTWARE YOU AGREE TO BE LEGALLY BOUND BY THIS AGREEMENT. A CONTRACT IS THEN FORMED BETWEEN AUTODESK AND EITHER YOU PERSONALLY, IF YOU ACQUIRE THE SOFTWARE FOR YOURSELF, OR THE COMPANY OR OTHER LEGAL ENTITY FOR WHICH YOU ARE ACQUIRING THE SOFTWARE. IF YOU DO NOT AGREE OR DO NOT WISH TO BIND YOURSELF OR THE ENTITY YOU REPRESENT: (A) DO NOT INSTALL, UPLOAD, ACCESS, OR OTHERWISE COPY OR USE THE SOFTWARE; (B) SELECT THE “I REJECT” BUTTON BELOW THIS AGREEMENT (WHICH WILL CANCEL THE LOADING OF THE SOFTWARE); AND (C) WITHIN THIRTY (30) DAYS FROM THE DATE OF ACQUISITION, RETURN THE SOFTWARE AND ANY ACCOMPANYING DOCUMENTATION AND MATERIALS TO THE COMPANY FROM WHICH YOU ACQUIRED THE SOFTWARE FOR A REFUND. INSTALLATION, UPLOADING, ACCESS, OR OTHER COPYING OR USE OF THIS SOFTWARE OR ANY ACCOMPANYING DOCUMENTATION OR MATERIALS EXCEPT AS PERMITTED BY THIS AGREEMENT IS UNAUTHORIZED AND CONSTITUTES A MATERIAL BREACH OF THIS AGREEMENT AND AN INFRINGEMENT OF THE COPYRIGHT AND OTHER INTELLECTUAL PROPERTY RIGHTS IN SUCH SOFTWARE, DOCUMENTATION AND MATERIALS. IF YOU INSTALL, UPLOAD, ACCESS, OR OTHERWISE COPY...

Words: 6081 - Pages: 25