EBK SOFTWARE ENGINEERING
EBK SOFTWARE ENGINEERING
10th Edition
ISBN: 8220101455970
Author: SOMMERVILLE
Publisher: PEARSON
bartleby

Concept explainers

Question
Book Icon
Chapter 7, Problem 7.1E
Program Plan Intro

Given Information:

Use case for Report Weather:

The below given table show the description of the Report Weather use case.

System:Weather Station
Use Case:Report Weather
Actors:Weather information system, Weather station
Data:The weather station wills send a summary of the weather data that is collected from the instruments in the collection period to the weather information system.
Stimulus:The weather information system will establish a satellite communication link with the weather station and it will request for the data transmission.
Response:The summarized data is sent to the weather information system.
Comments:Weather stations need to report once per hour, but there are chances that this frequency may differ from one station to another and it may be even modified in future.

Expert Solution & Answer
Check Mark

Explanation of Solution

Use case for Report Status:

The below given table show the description of the Report Status use case.

System:Weather Station
Use Case:Report Status
Actors:Weather information system, Weather station
Data:The weather station will send a status update to the weather information system. It gives information about the status of its instruments, computers and power supply.
Stimulus:The weather information system establishes a satellite link with the weather station and it requests for the status information.
Response:A status summary is uploaded to the weather information system.
Comments:System status is usually requested at the same time as the weather report.

Use case for Reconfigure:

The below given table show the description of the Reconfigure use case.

System:Weather Station
Use Case:Reconfigure
Actors:Weather information system, Weather station
Data:The weather information system will send a reconfiguration command to the weather station. This will place it into remote control mode where further commands may be sent from the remote system for updating the weather station software.
Stimulus:A command from the weather information system.
Response:A confirmation is made that the system is in remote control mode.
Comments:It is used occasionally whenever software updates have to be installed.

Want to see more full solutions like this?

Subscribe now to access step-by-step solutions to millions of textbook problems written by subject matter experts!
Students have asked these similar questions
Node.js, Express.js, MongoDB, and Mongoose: Create, Read, Update, and Delete Operations There is a program similar to this assignment given as the last example, CRUD, in the lecture notes for the week that discusses the introduction to MongoDB. Basically, you need to adapt this example program to the data given in this assignment. This program will take more time that previous assignments. So, hopefully you'll start early and you've kept to the schedule in terms of reading the lecture notes. You can use compass if you want to create this database. Or, when your connection string in the model runs it will create the database for you if one does not yet exist. So, ⚫ create a Mongoose model based on the info given below. The index.html page is given in the same folder as these notes. • When you successfully run index.js and instantiate the model, your database is created. • Once the database is created, you need to perfect the addCar route so you can add data using the index.html page. •…
1. Enabled with SSL, HTTPS protocol is widely used to provide secure Web services to Web users using Web browsers on the Internet. How is a secure communication channel established at the start of communication between a Web server running HTTPS and a Web browser? Consider the following threats to Web security and how each of these threats is countered by a particular feature of SSL. Man-in-the-middle attack: An attacker interposes during key exchange, acting as the client to the server and as the server to the client. Password sniffing: Passwords in HTTP or other application traffic are “eavesdropped.” SYN flooding: An attacker sends TCP SYN messages to request a connection but does not respond to the final message to establish the connection fully. The attacked TCP module typically leaves the “half-open” connection around for a few minutes. Repeated SYN messages can clog the TCP module.
SQL Injection on UPDATE Statement for educational purpose only  Based on the information below how do i update this code in order to update the emplyees field, eg admin nickname, email,address, phone number etc? ' ; UPDATE users SET NickName='Hacked' WHERE role='admin' --  If a SQL injection vulnerability happens to an UPDATE statement, the damage will be more severe, because attackers can use the vulnerability to modify databases. In our Employee Management application, there is an Edit Profile page (Figure 2) that allows employees to update their profile information, including nickname, email, address, phone number, and password. To go to this page, employees need to log in first. When employees update their information through the Edit Profile page, the following SQL UPDATE query will be executed. The PHP code implemented in unsafe edit backend.php file is used to update employee’s profile information. The PHP file is located in the /var/www/SQLInjection directory.
Knowledge Booster
Background pattern image
Computer Science
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, computer-science and related others by exploring similar questions and additional content below.
Similar questions
SEE MORE QUESTIONS
Recommended textbooks for you
Text book image
Np Ms Office 365/Excel 2016 I Ntermed
Computer Science
ISBN:9781337508841
Author:Carey
Publisher:Cengage
Text book image
CMPTR
Computer Science
ISBN:9781337681872
Author:PINARD
Publisher:Cengage
Text book image
A Guide to SQL
Computer Science
ISBN:9781111527273
Author:Philip J. Pratt
Publisher:Course Technology Ptr
Text book image
Database Systems: Design, Implementation, & Manag...
Computer Science
ISBN:9781305627482
Author:Carlos Coronel, Steven Morris
Publisher:Cengage Learning
Text book image
Management Of Information Security
Computer Science
ISBN:9781337405713
Author:WHITMAN, Michael.
Publisher:Cengage Learning,
Text book image
COMPREHENSIVE MICROSOFT OFFICE 365 EXCE
Computer Science
ISBN:9780357392676
Author:FREUND, Steven
Publisher:CENGAGE L