Usetutoringspotscode to get 8% OFF on your first order!

  • time icon24/7 online - support@tutoringspots.com
  • phone icon1-316-444-1378 or 44-141-628-6690
  • login iconLogin

Topic: Individual: Frequent Shopper Program, Part II

Paper details:

Watch the Lynda.com video, “Foundations of Programming: Object-Oriented Design.”

Assignment:

Background. Smith Consulting as described in week 2.

Create a 750 to 1,000-word paper that provides a technical architecture document defining the following components for the Frequent Shopper Program. Include the following in your discussion:

Note: Your response must be substantive and detailed. I will not accept responses without substantive details. Please refer to section “Required Assignment Response Length” in Instructor Policy document about the minimum word count policy.

Format: Copy and paste each below bolded item into your paper in the start of your response for that item. Bold each item in your paper to clearly define your responses.

Hardware platform (2 points). Describe the hardware environment (desktops and servers) and configuration such as CPU, memory, storage, etc, to support the development and production of this system. Note that you need to discuss two separate environments – development and production, even if they already exist.
Network (2 points). Network connections between the stores and headquarters. A network diagram is required. Embed the diagram in the main document.
Database information (2 points). An ERD, including relationship between the tables, is expected for customer data covering personal data and purchases. Show primary keys. Embed the diagram in the main document.
User interfaces (2 points). Describe the interface for data collection and notification to store personnel and customers.
Controls (1 points). Describe the controls to make sure the customer information is accurately maintained and the purchase activity is accurately captured.
Security (1 points). Describe the security measures to protect the customer’s personal and purchase history data. Identify a minimum of two security measures and provide details.

You can leave a response, or trackback from your own site.

Leave a Reply

Topic: Individual: Frequent Shopper Program, Part II

Paper details:

Watch the Lynda.com video, “Foundations of Programming: Object-Oriented Design.”

Assignment:

Background. Smith Consulting as described in week 2.

Create a 750 to 1,000-word paper that provides a technical architecture document defining the following components for the Frequent Shopper Program. Include the following in your discussion:

Note: Your response must be substantive and detailed. I will not accept responses without substantive details. Please refer to section “Required Assignment Response Length” in Instructor Policy document about the minimum word count policy.

Format: Copy and paste each below bolded item into your paper in the start of your response for that item. Bold each item in your paper to clearly define your responses.

Hardware platform (2 points). Describe the hardware environment (desktops and servers) and configuration such as CPU, memory, storage, etc, to support the development and production of this system. Note that you need to discuss two separate environments – development and production, even if they already exist.
Network (2 points). Network connections between the stores and headquarters. A network diagram is required. Embed the diagram in the main document.
Database information (2 points). An ERD, including relationship between the tables, is expected for customer data covering personal data and purchases. Show primary keys. Embed the diagram in the main document.
User interfaces (2 points). Describe the interface for data collection and notification to store personnel and customers.
Controls (1 points). Describe the controls to make sure the customer information is accurately maintained and the purchase activity is accurately captured.
Security (1 points). Describe the security measures to protect the customer’s personal and purchase history data. Identify a minimum of two security measures and provide details.

Responses are currently closed, but you can trackback from your own site.

Comments are closed.

Topic: Individual: Frequent Shopper Program, Part II

Paper details:

Watch the Lynda.com video, “Foundations of Programming: Object-Oriented Design.”

Assignment:

Background. Smith Consulting as described in week 2.

Create a 750 to 1,000-word paper that provides a technical architecture document defining the following components for the Frequent Shopper Program. Include the following in your discussion:

Note: Your response must be substantive and detailed. I will not accept responses without substantive details. Please refer to section “Required Assignment Response Length” in Instructor Policy document about the minimum word count policy.

Format: Copy and paste each below bolded item into your paper in the start of your response for that item. Bold each item in your paper to clearly define your responses.

Hardware platform (2 points). Describe the hardware environment (desktops and servers) and configuration such as CPU, memory, storage, etc, to support the development and production of this system. Note that you need to discuss two separate environments – development and production, even if they already exist.
Network (2 points). Network connections between the stores and headquarters. A network diagram is required. Embed the diagram in the main document.
Database information (2 points). An ERD, including relationship between the tables, is expected for customer data covering personal data and purchases. Show primary keys. Embed the diagram in the main document.
User interfaces (2 points). Describe the interface for data collection and notification to store personnel and customers.
Controls (1 points). Describe the controls to make sure the customer information is accurately maintained and the purchase activity is accurately captured.
Security (1 points). Describe the security measures to protect the customer’s personal and purchase history data. Identify a minimum of two security measures and provide details.

Responses are currently closed, but you can trackback from your own site.

Comments are closed.

Powered by WordPress | Designed by: Premium WordPress Themes | Thanks to Themes Gallery, Bromoney and Wordpress Themes