Thread: Complete the following steps:

Develop a detailed network diagram;
Develop a detailed cloud/distributed computing diagram. After you have completed your diagram, briefly discuss how your whether or not your distributed computer system could pose ethical issues associated with security and how the issues could be solved using a biblical approach; and
Develop the first HTML user interface.
1 attachments
Slide 1 of 1

attachment_1
attachment_1

UNFORMATTED ATTACHMENT PREVIEW
Use case Description Log in and Registration of users Use case Name Use case description Actors Stakeholders Pre-Condition Post-Condition Triggers Main Activities Actors Serial Number 1 2 3 Login This is part of the system used to prevent unauthorized access to the system. It will allow only authorized users to access and use the system Administrators, Employees All users System connected to network, to access its database storage Once a user successfully logs in, storage of logs in the system is done and notification sent to the administrator. This is to enhance security. Users who wants to access the system Steps Enter User Id Enter password Verify Extensions 1a 2a 3c Use Case Name Use Case Description Actors Stakeholders Pre-Condition Post-Condition Triggers User Id not found, try again error message is displayed Invalid password, please try again message is displayed Send alert to administrator after multiple fails 3 times fails Registration This is part of the system that allow administrator to add users to the system. For security reasons all users are added to the system by the administrator. Administrator Employees and all users System connected to network, to access its database storage Keeps logs of registered employees Admin who want to add users Main activities Actors Extension Serial Number 1 2 3 4 5 1a 2a 3a 5a Steps Enter employees full name Enter employee email Enter user address code Generate User Id Add User to the system Invalid names, Minimum of two names required Invalid email, please enter a valid email address Address id not found, User name already exist, Email already in use Recording Items Use Case Use case Description Add Products Module of the system that allows employees to record products received in the store. Administrators, Employees Employees, shipments manager System connected to the network User has successfully logged into the system Generating logs of each item added to the system Keeps track of the details of user adding the products to the system Users recording new items in the system Actors Stakeholders Pre-Condition Post-Condition Triggers Main activities Actors Extension Number 1 2 3 4 5 3a 4b Steps Enter product name Enter or select product price Enter product code Enter product size (Descriptive size like 5GB hard disk) Enter Number of items Invalid product code Enter a minimum of 20 characters in the product size field Delete Items Use Case Use case Description Delete Products Module of the system that allows employees to delete recorded in the database Administrators Administrators System connected to the network User has successfully logged into the system Generating logs of each item deleted to the system and reason for deletion. Actors Stakeholders Pre-Condition Post-Condition Keeps track of the details of user deleting the products o the system Admin and high ranked users who want to remove recorded products Triggers Main activities Actors Extension Number 1 2 3 1a 2b 3a Steps Enter product code Enter reason for deletion Delete product Invalid product code, Product not found Enter a minimum of 20 characters in the product size field Failed to delete the record Update Product Use Case Use case Description Actors Stakeholders Pre-Condition Post-Condition Update Products Module of the system that allows employees to Update products recorded in the database Administrators, employees Employees, shipments manager System connected to the network User has successfully logged into the system Generating logs of each item updated to the system and reason for the update. Keeps track of the details of user deleting the products o the system Send longs to the administrator Employees who want to update existing products records Triggers Main activities Actors Number 1 2 2 3 Steps Enter product code Enter reason for update Enter details for updating Update the product Extension 1a Invalid product code, Product not found Enter a minimum of 20 characters in the description field Failed to update the product 2b 3a View Details Use Case Use case Description View Products Module of the system that allows employees to view, search available products recorded in the database Administrators, employees Employees, Administrator System connected to the network User has successfully logged into the system Generating logs of each item logged in to the system. Actors Stakeholders Pre-Condition Post-Condition Triggers Main activities Actors Extension Normal users who wish to view available products Number 1 2 1a 2b Steps Enter product code or select product View products Invalid product code Failed to read data Generating reports Use Case Use case Description Generate Products Reports This part of the system is used to generate summaries of all the products in the system. It helps to know which items are available, products that are not available. Can be used to visualize the products using some charts for better and quick understanding. Administrators, employees under specific categories Employees, shipments manager System connected to the network User has successfully logged into the system Generating logs of each item logged in to the system. Actors Stakeholders Pre-Condition Post-Condition Triggers Employees who wish to generate reports Main activities Actors Number 1 Extension 2 1a Steps Select some products or select all recorded products Generate summery Failed to read data, check your network Activity Diagram [General] Activity Diagram [Admin] Employee Products Manager Shipments Sequence Diagram Log In sequence diagram Add Data Update Data Products Generator Description The sequence diagram shown above is a representation of the main activities that can be handled by the proposed system. As seen in the diagram, all application’s functionalities can be accessed once the user has proper credentials. User will be required to log in before performing any task. Once user gets access to the system, depending on the users rank, he will be able to request data from the database via the application, hence will be able to view the stored data. With the help of the application, front-end, the data will be organized and presented to the user. Further users will be able to update the products stored in the database. This too for security reasons only authorized users will be allowed to perform this task. Finally, users will be able to remove records that are no longer wanted in the system.

Do you similar assignment and would want someone to complete it for you? Click on the ORDER NOW option to get instant services at essayloop.com

Do you have a similar assignment and would want someone to complete it for you? Click on the ORDER NOW option to get instant services at essayloop.com. We assure you of a well written and plagiarism free papers delivered within your specified deadline.