Ask Question, Ask an Expert

+1-415-315-9853

info@mywordsolution.com

Ask Computer Engineering Expert

Case Study 1: Building an Access Control System

As the member of Information Security team at the small college, you have been made project manager to install the access control system (ACS) in dormitory. The ACS would automatically unlock dormitory doors via electronic proximity reader and integrate with the existing security camera system.

Cameras are designed to face and rotate to record a person as they use their identification card to unlock door.

Prepare a 3-4 page project plan for this project in which you:

1. Include one-half page project scope statement.

2. Define five (5) main tasks, each with one to two (1-2) subtasks. Also prepare a short description for each task.

3. Prepare a Gantt chart demonstrating the project tasks (use Microsoft Project or a similar project management program).

4. Create system diagram demonstrating equipment and connections required for this project (use Microsoft Visio or a similar software package).

Your assignment should follow these formatting requirements:

• Be typed, double-spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format.

• Include cover page containing title of the assignment, student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

• Include charts or diagrams created in Excel, Visio, MS Project, or one of their equivalents such as Open Project, Dia, and OpenOffice. The completed diagrams/charts must be imported into the Word document before the paper is submitted.
The specific Course Learning Outcomes associated with this assignment are:

• Differentiate between non-functional and functional requirements.

• Use contemporary CASE tools in process and data modelling.

• Use technology and information resources to research issues in systems analysis and development.

• prepare clearly and concisely about Systems Analysis and Development topics using proper writing mechanics and technical style conventions.

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M92916

Have any Question? 


Related Questions in Computer Engineering

1the torque equation shows that for a fixed air-gap flux

1.The torque equation shows that for a fixed air-gap flux machine torque is directly proportional to slip frequency. Variable rotor resistance due to temperature suggests that a derating factor could be applied for corre ...

Assignmentnbspads and consumer promotionsthis assignment

Assignment:  Ads and Consumer Promotions This assignment will assess the competency 3. Explore Ethics, Corporate Social Responsibility and Customer Communication. It seems as if many times a year a business or organizati ...

1 why should salts be chosen at random2 does using

1. Why should salts be chosen at random? 2. Does using passwords with salts make attacking a specific account more difficult than using passwords without salts? Explain why or why not. 3. Show that a system using an EKE ...

Phase transitions and tipping points phase transitions and

Phase transitions and tipping points Phase transitions and the related idea of tipping points occur in many different systems, where a small change in one parameter causes a large change in an output variable. The Fire S ...

Consider a hash table of size 501 that contains 85 keysa

Consider a hash table of size 501 that contains 85 keys. (a) What is the load factor? (b) What is the average number of comparisons required to determine if the collection contains the key 73, if: i. linear probing is us ...

1 describe the scenario where none of philosophers ever

1. Describe the scenario where none of philosophers ever eats (i.e., starvation). What is the sequence of events that happen that lead up to this problem? 2. Describe how we can solve this problem by introducing the conc ...

1 what does cissp stand for use the internet to identify

1. What does CISSP stand for? Use the Internet to identify the ethical rules CISSP holders have agreed to follow. 2. For what kind of information security jobs does the NSA recruit? Use the Internet to visit its Web page ...

Answer the following in 300 words or morewireless

Answer the following in 300 words or more: Wireless technology has been available for quite some time. Discuss some of the reasons why businesses have been slow to adopt this technology?

Select a new shape for the turtles from the shapes editor

Select a new shape for the turtles from the shapes editor, and then create a " cloud " of turtles (a bunch of turtles in the same local area) using your new shape. Create some green patches. Make the turtles follow the m ...

In this problem we want to compare the computational

In this problem, we want to compare the computational performance of symmetric and asymmetric algorithms. Assume a fast public-key library such as OpenSSL [132] that can decrypt data at a rate of 100 Kbit/sec using the R ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro

Describe what you learned about the impact of economic

Describe what you learned about the impact of economic, social, and demographic trends affecting the US labor environmen