100%(1)1 out of 1 people found this document helpful
This preview shows page 2 - 4 out of 4 pages.
The system should run fast enough that if a reservation is taken, it should show within seconds. The system should be fast enough to show real-time results. The system should update continuously for new practice exams and weekly for security updates and or policy changes.Platform Constraints2
What platforms (Windows, Unix, etc.) should the system run on? Does the back end require any tools, such as a database, to support this application?The system should run on all three major platforms, Windows, MacOS, and Linux. The system should have a web database so it can be accessed from essentially anywhere. The database will allow for the collection and storage of information. The database will be good to store tables in columns that’s going to display for the user when they access their accounts. Accuracy and PrecisionHow will you distinguish between different users?Is the input case-sensitive? When should the system inform the admin of a problem?Each user will have a unique username that can only be used once and each user should have a unique identifier like an ID number they can reference. The user should be given 5 times to enter the wrong userIDoID will be case-sensitive.oIf all attempts are made, user will need to unlock account.oAn alert should be made to the admin and contact information should be given to the user if further action is needed. oSecurity questions and two-factor authentication should be implemented as well for additional security measures. Adaptability Can you make changes to the user (add/remove/modify) without changing code? How will the system adapt to platform updates? What type of access does the IT admin need? There should be code already implemented to add, remove or modify a user without changing the code.The system should have scheduled maintenance during off peak hours of 3:00AM to 5:00AM every week. The IT admin needs full access to modify code, and update website for new rules and or policies.SecurityWhat is required for the user to log in? How can you secure the connection or the data exchange between the client and the server? What should happen to the account if there is a “brute force” hacking attempt? What happens if the user forgets their password? The user needs a unique userID and a password that will have special requirements to prevent hacking such as case-sensitivity, numbers and symbols.