Give Authentic And Relevant Answer. (Review these requirements using the checklist and discover possible problems with them. ) A centralized lock control system which controls the locks of all external doors in University buildings is to be implemented. Some requirements for this system are: Req. 1 Staff and students are issued with a card which provides them with access to those buildings which they are authorized to use after normal working hours. Req.2 Access is implemented by wiping a personalized card through a card reader and, if entry is allowed, the door lock is released. Req.3 Users must use the card to both enter and leave locked buildings. Req.4 If a card is lost, it should be reported to the security office that will issue a new card and arrange for all access rights associated with the old card to be cancelled.Review these requirements using the checklist and discover possible problems with them.

COMPREHENSIVE MICROSOFT OFFICE 365 EXCE
1st Edition
ISBN:9780357392676
Author:FREUND, Steven
Publisher:FREUND, Steven
Chapter5: Working With Multiple Worksheets And Workbooks
Section: Chapter Questions
Problem 8AYK
icon
Related questions
Question

Give Authentic And Relevant Answer.

(Review these requirements using the checklist and discover possible problems with them. )

A centralized lock control system which controls the locks of all external doors in University buildings is to be implemented. Some requirements for this system are:

  • Req. 1 Staff and students are issued with a card which provides them with access to those buildings which they are authorized to use after normal working hours.
  • Req.2 Access is implemented by wiping a personalized card through a card reader and, if entry is allowed, the door lock is released.
  • Req.3 Users must use the card to both enter and leave locked buildings.
  • Req.4 If a card is lost, it should be reported to the security office that will issue a new card and arrange for all access rights associated with the old card to be cancelled.Review these requirements using the checklist and discover possible problems with them.   

 

Expert Solution
steps

Step by step

Solved in 7 steps

Blurred answer
Knowledge Booster
Avoiding deadlock
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, computer-science and related others by exploring similar questions and additional content below.
Similar questions
  • SEE MORE QUESTIONS
Recommended textbooks for you
COMPREHENSIVE MICROSOFT OFFICE 365 EXCE
COMPREHENSIVE MICROSOFT OFFICE 365 EXCE
Computer Science
ISBN:
9780357392676
Author:
FREUND, Steven
Publisher:
CENGAGE L
Management Of Information Security
Management Of Information Security
Computer Science
ISBN:
9781337405713
Author:
WHITMAN, Michael.
Publisher:
Cengage Learning,
Database Systems: Design, Implementation, & Manag…
Database Systems: Design, Implementation, & Manag…
Computer Science
ISBN:
9781305627482
Author:
Carlos Coronel, Steven Morris
Publisher:
Cengage Learning
Database Systems: Design, Implementation, & Manag…
Database Systems: Design, Implementation, & Manag…
Computer Science
ISBN:
9781285196145
Author:
Steven, Steven Morris, Carlos Coronel, Carlos, Coronel, Carlos; Morris, Carlos Coronel and Steven Morris, Carlos Coronel; Steven Morris, Steven Morris; Carlos Coronel
Publisher:
Cengage Learning