Here, the task is to identify how the given requirements are
incomplete , Lets discuss in detail one by one :
REQUIREMENT -(a) :
An email
notification must be sent to user when he successfully registers
into the system.
- It can be generally seen that in
this modern world of technology it is very easy for the technical
frauds and scammers to perform illegal operations and manipulate
with the original digital data of the users,which is one of the
valuable digital asset to any organization or the company.
- The organizations use these data
for various purpose such as for their own prediction of the user
demand and interest as well as for the outsourcing purpose. If the
data is not secured and is manipulated, it creates distrust with
their clients and also hampers the organizations to predict the
need and also the quality and efficiency of the product.
- So , the requirement should be like
this "An email notification must be sent to the user ,asking for
proper authentication of he credentials as well as the
device/system authentication, When the user successfully registers
into the system. This notification system will help the
organization to overcome from from the data manipulation and also
from automatic form submissions during the registrations.
REQUIREMENT (b)
:
The system will allow salesman
to maintain their personal contact manager. When a contact is
converted into client then other salesman having duplicate of these
contacts in their personal contact manager are informed that they
cannot do business with this contact.
- This requirement is incomplete in
the manner that it is not sufficient just to inform the other
salesman about its contact becoming a client.
- This does not make sure about
blocking of the transactions between the two.So there must be two
separate list or contact managers for the the two entities i.e
normal contacts and clients contacts. the boundary should be well
defied between them and the system should make sure that no two-way
transactions can be done to maintain the security for the
users.
- And whenever a contact s converted
into a client , it must be moved from the contacts list to the
clients lists and all the previous transactions between the two
must be settled before the contact is properly assigned/converted
as client.
REQUIREMENT (c)
:
The installer should check the
prerequisites before starting itself.
- The requirement that the installer
should check the prerequisites before starting itself, is
incomplete and insecure int the way that the installer should not
only check for the prerequisites but also should get verification
from the security wall of the system so as to reduce the risk of
any further slowdown.
- The given prerequisites check is
not sufficient , the installer should also check for any viruses or
any data risks associated.since once the installer has performed
its operation, the installed system has the control over various
segments of the device and this can lead to the data loss as well
as the system failure.
- So, the requirement should be "The
installer should check for all the pre-requisites as well as check
for all the verifications possible from each and every segment of
the device before installing ". This will save the device or the
system from any type of failure or threat that may come over the
period the time.