Task 1

1.1

Preliminary analysis- To see if the project will be a viable investment. This involves gathering essential information and determining cost benefit.

Analysis- To define the requirements of the system and estimate the costs.

Design- Creating a blueprint of the system, this includes detailed specifications and includes things like user interface.

Development- Building the system. This is where developers make the program based on the design specifications.

Implementation- Switching from the old system to the new one. This can also involve testing the system.

Maintenance/Evaluation- Looking after the system and repairing it over time. It also involves putting out updates.

1.1.1

Context diagrams show inputs and outputs of a system.

External entities sending and receiving data from the system are drawn as boxes.

The flow of data is depicted with arrows.

The system itself is drawn as a circle.

1.2.1

Mouse

Keyboard

1.2.2

Speaker

Monitor

1.2.3

CPU

GPU

1.2.4

Primary- RAM

Volatile memory that is fast.

Secondary- SSD, HDD

Non-volatile memory that is slow compared to primary memory.

1.3

Role of SOE – to make it easier to implement software and maintain a network of computers.

1.4

Privacy considerations for a company in Australia-

Only collect what is necessary from users.

Make sure user data is stored safely.

Make sure users can access their data.

Only use user data for what was originally agreed upon.

1.5.1

Encryption- The process of jumbling up data so that it can only be read by people with a correct key.

1.5.2

Authentication- Verifying someone is who they claim they are.

1.5.2.1

Passwords- a unique set of characters that can be used to access a system and verify someones identity.

1.5.2.2

Biometrics- Identifying someone based on their physical properties e.g fingerprint.

1.5.2.3

Digital signature- A way of verifying the authenticity of a document.

1.6

Making sure people don’t use others data for personal use.

1.7

Making sure only authorised people can access certain data.

1.8

Data breaches.

2.1

-Make website

-Research information

-Put it onto website

3.2.1

IO Diagram

3.2.2

Context Diagram

4.1.1

A product should include encryption to keep user data safe.

An example of encryption is 256 bit encryption.

4.1.2

Authentication is important to stop unauthorised individuals from accessing the system or parts of the system.

4.1.3

Passwords can be used to verify the identity of someone trying to access and account.

Biometrics can be used to access a fingerprint unlocking phone.

Digital signatures can be used to make sure a document comes from a verified source.