P5 Undertake A Software Investigation To Meet A Business Need
P5 Undertake A Software Investigation To Meet A Business Need
P5 Undertake A Software Investigation To Meet A Business Need
1.Questionare Technique:
A questionare is a research technique consisting of a series of questions
for the purpose of gathhering information from repondents.
Questionare can be thought of as a kind of written interview. They can
be carried out face to face, by telephone, computer or post.
4 List of questions:
How many times do the visitors can free listen to the music
sample?
Which payments can be used for purchase individual
downloads at a fixed fee per download
What is the suitable cost for customers whom subcribe
monthly account for unlimited download.
How to distribute music download gift cards to the
customers?
Which keywords were prioritized in search system?
( artist,album,singer,playlist,single, video)
How many songs can be download at the same moment?
How many monthly account that 1 customer can purchase?
P6
1. Stackholders:
John margolis, Phil Cooper: TUNE SOURCE’S CEO
Megan Taylor: Tune source’s share holder
Huynh Nhat Nam: Project manager
2. Costs
Web Server 10000$
Domain Name 500$
SSL certificate 200$
Website Development Team 5000$
Website Maintenance 300$
Content manage system 1000$
E-commerce functionality 1000$
3. Security considerations
Websites are always be threaten of security risks. Cyber crime impacts
our business by hacking website and install malicious software or
malware on visitor’s computer
HACKERS may steal important data from users such as credit card
information, destroy business and public sensitive information on the
Internet
Updated software
It is very important to keep the software update because it
plays vital role in keeping website secure.
SQL Injection
It is an attempt by the hackers to manipulateyour database by
insert easily rogue code into query that can be used to change
tables, get information or delete data.
Error messages
If the user fails to log in the error message should not let the
user know which field is incorrect: username or password.
Validation of Data
The validation should be performed on both server side and
client side.
Passwords
It is good to enforce password requirements such as of
minimum of eight characters, including upper case, Lower case
and speacial character. It will help to protec user’s information
in long run.
SSL
It is good practice to use SSL protocol while passing personal
information between website and web server or database.