Submitted by: Submitted by garethyoo
Views: 399
Words: 3338
Pages: 14
Category: Other Topics
Date Submitted: 08/28/2012 02:08 PM
Assignment No 2
Question 2
Use case name : View policy details
Actors : Call-centre staff member
Start Page : Home Page
Use case description :
1. The actor chooses to view policy detail
2. The system requests the actor’s user name and password
3. The actor enters his/her personal details
4. The system requests the policy number of the policy holder
5. The actor enters the policy number
6. The system displays all insurance policies of the policy holder
7. The actor chooses to view the buildings insurance policy
8. The system displays the building insurance policy
Alternate flow – content insurance only
7a. The actor chooses to view the content insurance policy of the policy holder
8a. The system displays the content insurance policy
Question 4
<!ELEMENT general ( #PCDATA ) >
<!ELEMENT long-range ( #PCDATA ) >
<!ELEMENT maximum ( #PCDATA ) >
<!ELEMENT minimum ( #PCDATA ) >
<!ELEMENT temperature ( maximum, minimum ) >
<!ELEMENT today ( general, temperature ) >
<!ELEMENT tomorrow ( general, temperature ) >
<!ELEMENT weather-forecast ( today, tomorrow, long-range ) >
Question 5
* The mail exchange (MX) domain name service (DNS) is used.
* The main purpose of the back-up SMTP server is to queue e-mail messages for later delivery to the recipient’s actual SMTP server.
* Internet message access protocol (IMAP) and Post office protocol (POP).
* False.
* 25
* Because mobile devices are so small, they are susceptible to being lost or stolen. A strong authentication that is still light enough to fit in a small device must be implemented to verify that the person attempting to access the device is a legitimate user. This can be done using PIN number, password, or biometric authentication such as a thumbprint.
* Physical perimeter access refers to a power-on password that is used as the first gate for protecting access to a device. Application-level...