
EBK SOFTWARE ENGINEERING
10th Edition
ISBN: 8220101455970
Author: SOMMERVILLE
Publisher: PEARSON
expand_more
expand_more
format_list_bulleted
Concept explainers
Question
Chapter 7, Problem 7.1E
Program Plan Intro
Given Information:
Use case for Report Weather:
The below given table show the description of the Report Weather use case.
System: | Weather Station |
Use Case: | Report Weather |
Actors: | Weather |
Data: | The weather station wills send a summary of the weather data that is collected from the instruments in the collection period to the weather information system. |
Stimulus: | The weather information system will establish a satellite communication link with the weather station and it will request for the data transmission. |
Response: | The summarized data is sent to the weather information system. |
Comments: | Weather stations need to report once per hour, but there are chances that this frequency may differ from one station to another and it may be even modified in future. |
Expert Solution & Answer

Explanation of Solution
Use case for Report Status:
The below given table show the description of the Report Status use case.
System: | Weather Station |
Use Case: | Report Status |
Actors: | Weather information system, Weather station |
Data: | The weather station will send a status update to the weather information system. It gives information about the status of its instruments, computers and power supply. |
Stimulus: | The weather information system establishes a satellite link with the weather station and it requests for the status information. |
Response: | A status summary is uploaded to the weather information system. |
Comments: | System status is usually requested at the same time as the weather report. |
Use case for Reconfigure:
The below given table show the description of the Reconfigure use case.
System: | Weather Station |
Use Case: | Reconfigure |
Actors: | Weather information system, Weather station |
Data: | The weather information system will send a reconfiguration command to the weather station. This will place it into remote control mode where further commands may be sent from the remote system for updating the weather station software. |
Stimulus: | A command from the weather information system. |
Response: | A confirmation is made that the system is in remote control mode. |
Comments: | It is used occasionally whenever software updates have to be installed. |
Want to see more full solutions like this?
Subscribe now to access step-by-step solutions to millions of textbook problems written by subject matter experts!
Students have asked these similar questions
Node.js, Express.js, MongoDB, and Mongoose: Create, Read, Update, and Delete
Operations
There is a program similar to this assignment given as the last example, CRUD,
in the lecture notes for the week that discusses the introduction to MongoDB.
Basically, you need to adapt this example program to the data given in this
assignment.
This program will take more time that previous assignments. So, hopefully you'll
start early and you've kept to the schedule in terms of reading the lecture
notes.
You can use compass if you want to create this database. Or, when your
connection string in the model runs it will create the database for you if one
does not yet exist. So,
⚫ create a Mongoose model based on the info given below. The index.html
page is given in the same folder as these notes.
• When you successfully run index.js and instantiate the model, your
database is created.
• Once the database is created, you need to perfect the addCar route so
you can add data using the index.html page.
•…
1. Enabled with SSL, HTTPS protocol is widely used to provide secure Web services to Web users using Web browsers on the Internet. How is a secure communication channel established at the start of communication between a Web server running HTTPS and a Web browser?
Consider the following threats to Web security and how each of these threats is countered by a particular feature of SSL.
Man-in-the-middle attack: An attacker interposes during key exchange, acting as the client to the server and as the server to the client.
Password sniffing: Passwords in HTTP or other application traffic are “eavesdropped.”
SYN flooding: An attacker sends TCP SYN messages to request a connection but does not respond to the final message to establish the connection fully. The attacked TCP module typically leaves the “half-open” connection around for a few minutes. Repeated SYN messages can clog the TCP module.
SQL Injection on UPDATE Statement for educational purpose only
Based on the information below how do i update this code in order to update the emplyees field, eg admin nickname, email,address, phone number etc?
' ; UPDATE users SET NickName='Hacked' WHERE role='admin' --
If a SQL injection vulnerability happens to an UPDATE statement, the damage will be more severe, because attackers can use the vulnerability to modify databases. In our Employee Management application, there is an Edit Profile page (Figure 2) that allows employees to update their profile information, including nickname, email, address, phone number, and password. To go to this page, employees need to log in first.
When employees update their information through the Edit Profile page, the following SQL UPDATE query will be executed. The PHP code implemented in unsafe edit backend.php file is used to update employee’s profile information. The PHP file is located in the /var/www/SQLInjection directory.
Chapter 7 Solutions
EBK SOFTWARE ENGINEERING
Ch. 7 - Prob. 7.1ECh. 7 - Assume that the Mentcare system is being developed...Ch. 7 - Prob. 7.3ECh. 7 - Prob. 7.4ECh. 7 - Develop the design of the weather station to show...Ch. 7 - Prob. 7.6ECh. 7 - Draw a sequence diagram showing the interactions...Ch. 7 - Draw a UML state diagram showing the possible...Ch. 7 - Prob. 7.9ECh. 7 - Prob. 7.10E
Knowledge Booster
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, computer-science and related others by exploring similar questions and additional content below.Similar questions
- 4. Suppose we have a perfect binary tree with height h 0 representing a heap, meaning it = has n 2+1 1 keys indexed from 1 to 2+1 1. When we run convertomaxheap we run maxheapify in reverse order on every key with children. Let's examine the worst-case - In the worst-case every single key gets swapped all the way to the leaf level. (a) For each level in the tree there are a certain number of nodes and each of those nodes [10 pts] requires a certain number of swaps. Fill in the appropriate values/expressions in the table: Level Number of Keys Number of Swaps per Key 0 2 .. (b) Write down a sum for the total number of swaps required. This should involve h, not n. [10 pts] Totalarrow_forwardThe next problem concerns the following C code: /copy input string x to buf */ void foo (char *x) { char buf [8]; strcpy((char *) buf, x); } void callfoo() { } foo("ZYXWVUTSRQPONMLKJIHGFEDCBA"); Here is the corresponding machine code on a Linux/x86 machine: 0000000000400530 : 400530: 48 83 ec 18 sub $0x18,%rsp 400534: 48 89 fe mov %rdi, %rsi 400537: 48 89 e7 mov %rsp,%rdi 40053a: e8 di fe ff ff callq 400410 40053f: 48 83 c4 18 add $0x18,%rsp 400543: c3 retq 400544: 0000000000400544 : 48 83 ec 08 sub $0x8,%rsp 400548: bf 00 06 40 00 mov $0x400600,%edi 40054d: e8 de ff ff ff callq 400530 400552: 48 83 c4 08 add $0x8,%rsp 400556: c3 This problem tests your understanding of the program stack. Here are some notes to help you work the problem: ⚫ strcpy(char *dst, char *src) copies the string at address src (including the terminating '\0' character) to address dst. It does not check the size of the destination buffer. • You will need to know the hex values of the following characters:arrow_forward1234 3. Which line prevents compiler optimization? Circle one: 1234 Suggested solution: Store strlen(str) in a variable before the if statement. ⚫ Remove the if statement. Replace index 0 && index < strlen(str)) { 5 } } = str [index] = val;arrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Np Ms Office 365/Excel 2016 I NtermedComputer ScienceISBN:9781337508841Author:CareyPublisher:CengageA Guide to SQLComputer ScienceISBN:9781111527273Author:Philip J. PrattPublisher:Course Technology Ptr
- Database Systems: Design, Implementation, & Manag...Computer ScienceISBN:9781305627482Author:Carlos Coronel, Steven MorrisPublisher:Cengage LearningManagement Of Information SecurityComputer ScienceISBN:9781337405713Author:WHITMAN, Michael.Publisher:Cengage Learning,COMPREHENSIVE MICROSOFT OFFICE 365 EXCEComputer ScienceISBN:9780357392676Author:FREUND, StevenPublisher:CENGAGE L
Np Ms Office 365/Excel 2016 I Ntermed
Computer Science
ISBN:9781337508841
Author:Carey
Publisher:Cengage

A Guide to SQL
Computer Science
ISBN:9781111527273
Author:Philip J. Pratt
Publisher:Course Technology Ptr

Database Systems: Design, Implementation, & Manag...
Computer Science
ISBN:9781305627482
Author:Carlos Coronel, Steven Morris
Publisher:Cengage Learning

Management Of Information Security
Computer Science
ISBN:9781337405713
Author:WHITMAN, Michael.
Publisher:Cengage Learning,
COMPREHENSIVE MICROSOFT OFFICE 365 EXCE
Computer Science
ISBN:9780357392676
Author:FREUND, Steven
Publisher:CENGAGE L