SOF535: Application Design and Development
New Zealand Diploma in Information Technology
Technical Support Level 5
Case Study Research (worth 20% of final grade)
74 Marks
| Student Name |
| Student ID |
| Student Signature |
| Assessor Name |
| Assessor’s Signature |
| Final Result / Grade |
| Assessed By / Date |
SOF535: Application Design and Development
Version 1.2, Level 5, Credits 20
Instructions and Guidelines for Project Submission
Task completion
• Project will be judged on the basis of completeness, correctness and clarity.
• Complete ALL tasks.
• Warning: All media must be virus free! Media containing viruses or media that
cannot be run directly will result in a FAIL grade.
Format
• The report must have a title page with your name, class and ID number clearly printed.
• All written work must be done in size 12 font with 1.5 line spacing.
• All printouts must include your student ID (or group IDs) in the footer (printed).
• You may need to attach the task cover sheet found on Moodle to the front of the final
submission of your task (please confirm with your tutor).
Submission
• The completed research must be handed to the tutor at the beginning of the class on
the due date.
• Submit a printed and bound copy of your report along with the soft copy. Tutor will
inform you on how to submit the soft copy.
Plagiarism
• By submitting your assignment you agree to Ntec’s policy on ‘Academic Dishonesty and Plagiarism’.
Assignments completed using unfair means or plagiarised material will receive a FAIL grade.
• All tasks must be done in your own words and referenced.
Feedback
• You may request feedback from your lecturer to verify the accuracy of your marks.
| Learning Outcomes covered: |
| 1. Identify common issues related to IT security and apply a range of solutions. |
Student Undertaking:
I have read and understood the instructions for exam given above. I understand that I will be given
zero marks and will be reported to the disciplinary committee if I am found cheating or engaging in
any unfair practice.
Student Name: _____________________________________________________________
Student Signature: __________________________________________________________
Date: _____________________________________________________________________
Case Study: Auckland EZ hotel
Auckland EZ hotel located near Britomart is a 3-star hotel with 10 floors and each floor has 20
rooms. The management of the hotel has hired your company (BBC Software Ltd) to develop an
attendance and payroll management system. This software takes attendance of their staff member,
help the payroll department to calculate the number hours worked, leaves and takes into account
other parameters that might be necessary for deciding the pay made to an employee.
Security is of utmost concern to the hotel and they would like to have different access level for
different employee roles. The different employee roles are as follows –
• A hotel manager who oversees the functioning of the entire hotel from all aspects including
payroll and attendance
• Two receptionists who deal with reservation, check-in, check-out, scheduling of
housekeeping and room service
• One accountant dealing with the finances of the hotel like payroll
• Twenty housekeeping staff will only use the system to register their attendance
• One chef and ten kitchen and restaurant staff
The employees can perform the following actions – apply for leave and choose to work in a
particular shift. The hotel has three shifts – morning shift, evening shift and night shift. Additionally,
the manager can assign shifts or apply for leave on behalf of any employee. An employee not on
leave must be allocated to one and only one of the three kinds of shift in one day. Each shift must
at least have one employee. The hotel has the following work zones- rooms, restaurant, lounge and
toilet. For each shift (i.e. morning, evening or night), there must be an allocation for each of the
work zones. Every working employee must be allocated to one and only work zone in his or her
shift. Each work zone must have at least one employee.
The hotel is also concerned about the safety of their data and would like to have policies and
strategies in place to protect the integrity and safety of their data.
Write a report to cover the following tasks. Use APA referencing.
Task 1: Requirement Gathering and Analysis (Total 40 Marks)
Your company BBC Software Ltd being a start-up has a team of 7 software professionals excluding
the management. Keeping the project and your company structure in mind answer the following:
a. From a security perspective, identify the two types of requirements, with each type
having three (3) examples for this project. (5 Marks)
b. Keeping in mind the importance given to security by the hotel, make a comparison
between four (4) software development methodologies and choose an appropriate
methodology that is suitable for this project clearly justifying your choice. (10 Marks)
c. Identify and explain five threats to the hotel’s business that need to be considered
for the success of this system. (10 Marks)
d. Write down three elements of risk with two examples each that relate to the project’s
scenario. (9 Marks)
Task 2: System Design (Total 60 Marks)
Base on the requirement gathered in Task 1, answer the following:
a. Draw a Use Case Diagram that highlights the security related interactions of the
system amongst other interactions. (10 Marks)
b. Keeping the case study in mind draw a UML Class Diagram focussing on the different
access levels for each employee type. The diagram must contain the following –
employee first name and last name, ID no, telephone no, address, date(s) present,
date(s) on leave, hotel work zone and shift allocated”. (10 Marks)
c. Since physical security is an important aspect of the security Auckland EZ hotel is
highly concerned about each employee’s entry and exit from the building. To help
develop such a secure system, map out a State Transition Network (STN) for the daily
functioning of the attendance management part of the software. To scope the STN
use the following assumptions
1. The starting state is when the employee enters the company first and the finish state is when
the employee leaves finally for the day.
2. The attendance system is electronic and the employees have to tap their card on the card
reader to register their entry and exit from the company.
3. Once the employee taps, an entry is made in a database table, this entry can be called
‘Employee In’
4. If the employee taps a second time the database entry is ‘Employee Out’.
5. An employee can tap in and out multiple times during the work hours of 9 am to 5 pm. The
final exit for the day is considered at 5pm and total hours worked is calculated from the first
tap to the last tap before or at 5pm.
6. If an employee has a gap of more than 1 hr between a tap in and out, they are reported to the
HR
Comment and justify the STN (10 Marks)
| Marking Schedule | |||
| Marking Criteria | Designated Marks |
Awarded Mark |
Comment(s): |
| Task 1 | |||
| Task1 – a Naming the two requirements Giving examples for each of the two types |
2 3 | ||
| Task1- b Making correct comparison Choosing the right methodology |
8 2 | ||
| Task1- c 2 Marks for each threat. Total 5 threats |
10 | ||
| Task1 – d Stating three elements of risk Two examples for each risk |
3 6 | ||
| Total of Question 1>> | 34 | ||
| Task 2 | |||
| Task2 – a The correct use case notations are used All the possible actors are included All use cases are covered |
2 4 4 | ||
| Task2- b At least three classes used in the UML class diagram List all the data and methods of each class Different kind of relationships between classes used Relationships are logical to the case study scenario |
2 2 2 4 | ||
| Task2- c The STN has been described and aptly justified The correct notations have been used All possible states are present |
4 2 4 | ||
| Total of Question 2>> | 30 | ||
| Professionally formatted report | 5 | ||
| Used APA referencing | 5 | ||
| Total: | 74 |
-
- Assignment status: Resolved by our Writing Team
CLICK HERE TO ORDER 100% ORIGINAL PAPERS AT PrimeWritersBay.com GET THIS PAPER COMPLETED FOR YOU FROM THE WRITING EXPERTS
Comments
Post a Comment