Question

In: Computer Science

Your company is tasked with creating software for a home security system.


1. Consider the following:

Your company is tasked with creating software for a home security system. The software helps manage all the security cameras and devices installed in the house, relays communications between all parties, and provides a “dashboard” mechanism for homeowners and security personnel to access and monitor.

Develop 8 to 10 requirements concerning this scenario.

2. What is a “recommendation system” and how can it assist in requirements engineering? What tools can be used to assist in requirements gathering?

Solutions

Expert Solution

1.requirements for Home Security system:

requirements functionality

Description of its working

User login

This functionality is used to keep the system safe by authenticating only the authorized users to control the home.

Inspect

The user should able to move from one room to another my just a click and colud able to see the live recording.

Emergency alert

The system should be designed in such a way that if any abnormality observed the user should be able to alert the security personals with one click.

Camera status

The system should get the status of each camera and its angles so that if any camera is out of service or out of sight angle then it should be reported.

Camera controls

This functionality enable user to turn off or turn on the camera based on his requirement.

Camera recording

The user should be able to record the particular snap-short or time-frame and save it separately so that the original complete video recording is not downloaded completely.

Camera playback

The user should be able to view any recording by just selecting the date and time if wanted.

Cope with internet interruptions

The system should be able to pause the playback recording and still continue the live recording in case of low bandwidth.

Password change

The user should be able to change the password after few months.

2. What is a “recommendation system” and how can it assist in requirements engineering? What tools can be used to assist in requirements gathering?


Answer:

Recommendation system are nothing but a set of strong algorithms which enables the application to suggest a user new items based on his/her history of purchases. For example it a user purchased a T.V then based on his history the algorithm recommends him to purchase a t.v table or may be a good stablizer. The system says that the people purchased this T.v also purchased ....


The applicability of Recommendation system in the requirements engineering would be suggesting the client an additional functionality based on his previous functional requirements. This would be based on several other clients who choose to purchase the recommended functional requirements.

For example, If the client chooses to have a login page then the recommendation system may recommend to have a functionality such as two step verification.


Tools to assist requirements gathering are:

1. Context diagram: Try to define the system boundaries, its entities and environment. So that we can have a better understanding of the major interactions and entities of our system.

2.Functional decomposition: This model defines what the system does. For example the major functionality can be defined in top-down approach here. So that end user could able to easily relate to the business model.

3.Use case diagram: This is the most useful and helpful tool in requirement gathering as it enable the end user to see how the system is interacting with the end user thereby the client can suggest his feeling and modification if any required for acceptance of the software.




Related Solutions

My employer has me creating a system and tasked me to select network and access security...
My employer has me creating a system and tasked me to select network and access security controls. I need suggestions and real life examples on which network security controls that I should use and some access control technology for my company which is a local electric company outside of Jackson, MS.
1. You are tasked with creating the ultimate modular home that can allow a person to...
1. You are tasked with creating the ultimate modular home that can allow a person to survive in extreme temperatures.  This house must be able to survive wintering in the Antarctic,  monsoon season in Vietnam, and summering in the Atacama Desert. Due to the inhospitable areas this home model can be located, it must be able to function off-grid. 2. You've been stranded in the Salt Flats of Utah.  As you create your own make-shift shelter, what passive solar elements will you try...
You are tasked to code a software prototype of this feature in Java. The system will...
You are tasked to code a software prototype of this feature in Java. The system will be provided the course code, course name, CRN, the total number of students, course credit hours.   The system should calculate and display the following statistics: Total student credit hours, which is the total number of students times course credit hours. FTE for the course, which is the total student credit hours divided by 40. Total amount of tuition generated in USD from the course....
You are a software development employee at a startup company. Your HR department has tasked the...
You are a software development employee at a startup company. Your HR department has tasked the IT department with developing a simple application (Windows Form Application) to load and display employee records. Your application will need to do the following: Create an Employee Class with the following properties: First Name Last Name Street Address City State Zip Create a sub class for Managers which inherits from the Employee Class. The Manager class will have the following additional properties: Cost Center...
I am creating a system for a security design and need to choose controls for network...
I am creating a system for a security design and need to choose controls for network security and those with access controls as well. I need to decide what major network security controls I would need to recommend. Which ones are good examples and why? Within that, I need to describe three access control techs. and their essentials for util. apps. Are there a few cases to assist in demonstrating those access control techs.
A home security system is designed to have a 99% reliability rate. Suppose that nine home...
A home security system is designed to have a 99% reliability rate. Suppose that nine home equipped with this system experience an attempted burglary. Find the probability that at least two of the alarms are triggered. Group of answer choices A) 1- (.019 ) - 9* (.018 )* (.99) B) 1- (.999 ) - 9* (.998 )* (.01) C) 1- (.999 ) D) 1- (.019 )
What is the role of software security testing in the process of finding solutions to system...
What is the role of software security testing in the process of finding solutions to system vulnerabilities
You and your team of software developers are creating a game for children. The game has...
You and your team of software developers are creating a game for children. The game has different types of animals. As a team of software developers, create in a 1-page Word document the class "Animal," including appropriate methods and properties that are common to all animals, subclasses of Animal, such as Cats, Dogs, and Birds, and appropriate methods and properties unique to these subclasses.
A software company is creating a scheduling plan for a nine-month project,. The company has 30...
A software company is creating a scheduling plan for a nine-month project,. The company has 30 of its own full-time employees and can assign them to the project. For any shortage of personnel, the company will hire short-term contract employees. Company employees earn $5,500 per month, while short-term contract employees make $8,000/month. Contract employees can be assigned to the project beginning in any month, and their contract period is two months. The number of workers required for the project by...
What are the essential elements for creating an enthusiastic following for your venture ( Private Security...
What are the essential elements for creating an enthusiastic following for your venture ( Private Security Company) ? Explain
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT