Identify the different aspects of CIA.
Identify the different aspects of CIA and discuss the issues violating the CIA and explain how you can ensure the triad qualities for the better information security.
What is practical implication of Requirement Engineering concepts in the Pakistani industry?
Let L be the language consisting of all strings of a's and b's
containing the substring abba.
a) Construct a DFA for L
b) Represent the DFA for L as regular expression
b) Show the DFA for L scanning the shortest possible word
in L.
(Hint: A substring "abba" can comes at the beginning,
middle or end of a string of a's and b's of L)
Using ASTAH
• Give an example of a business system and model its behavior by data-driven modeling. • Give an example of a Real-time system and model its behavior by event-driven
modeling.
Identify critical use cases that could serve as a basis for understanding the requirements of an ATM system.
Develop the "Withdraw Money" use case using ASTAH.
Draw ERD, Class Diagram, System level Use Case diagram, Sequence Diagram of Online Ordering and Payment System
Write 5 Real life Examples of Volatile requirements and 5 real life Examples of Stable requirements?
What are the specific advantages and disadvantages of cloud computing for enterprise resource planning (ERP)?
(1)list the functional requirements of shopping ordering system.
(2) Non-function equipment ordering shopping system, categories into
i Usability
ii Reliability
iii Performance
iv Supportability
v Implementation
vi Interface and Operation