Preview

Rapid Development Tools

Powerful Essays
Open Document
Open Document
3127 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Rapid Development Tools
Rapid Development Tools

Assignment Title
Reporting Foxes
ICA CMPONENT 2

Submission Date: 3rd February 2012

Table of Contents

Task 4 3
Running-Instructions Document: 3
Task 5 4
Test Plan for Reporting Foxes: 4
Task 6: 5
Critical Evaluation of My Application and the Software and Methodology 5
Task 7 7
Question 1: 7
Question 2: 8
Compare Mendix in detail with ONE other RAD tool 8
Reference: 13

Task 4

Running-Instructions Document:

Running-Instructions Document is an important document for an application either it is small or large. Without this document it leads the users to be uninterested about any application so the purpose of the software will fail. The following Running-Instructions Document provides the step by step instructions, how to run the Application Fox Reporting.
Install the Mendix Business Modeler 2.5.6 if required.
Run the modeler
Open Reporting Fox.mpr, in the folder Mendix Reporting Fox.
Run it
It will go through several steps before the server starts
Automatically Build the application
Click “Open the browser”
A new web browser object will load the application
First it needs authentication for users (Administrator, Expert, Resident and AnyUser) to enter into the Application. The following table shows User Names and Passwords:
Role Name
User Name
Password
Administrator
A/a
a

Y/y y Admin/admin
1234
Expert
E1/e1
e

E2/e2 e Resident
R1/r1
r

R2/r2
R

John/john
123

Tawfiq/tawfiq abc If users are not authenticated then the Application shows message so that they can Register here or Exit.
Administrator can Add and Delete Expert upon some criteria
Expert can View, Add, Edit and Validate the Fox report to be displayed in the form submitted by the Residents.
Expert can Start and Make blog entries and Edit the blogs entered by the Residents.
Resident can enter reports and make blog entries of fox-sightings near their home in text and point on the map view.
Resident can query the report of fox-sighting.
Any



References: Reference: BPC, Articles and Glossary (2011) Rapid Application Development [online]

You May Also Find These Documents Helpful

  • Powerful Essays

    IS3340-Unit 2-Assignment 2

    • 1549 Words
    • 6 Pages

    vi. Each user and workforce member must ensure that their assigned User Identification is appropriately protected and only used for legitimate access to networks, systems, or applications. If a user or workforce members believes their user identification has been comprised, they must report that security incident to the appropriate Security Officer…

    • 1549 Words
    • 6 Pages
    Powerful Essays
  • Good Essays

    Nt1330 Unit 7 Lab 1

    • 566 Words
    • 3 Pages

    If you are prompted for an administrator password or for a confirmation, type the password, or click Allow or…

    • 566 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Blogging is also a new technology that Tesco uses as a way of getting personal communications because it is as an essential marketing tool. This is because the public can discuss on the Tesco website about anything they like for example Tesco have provided a place on the website where customers can have discussions about books available at the store and then decide whether they want to purchase it or not. For this particular type of communication Tesco needs an employee who likes to write via internet and put some commercial messages up. The audience should take care of the rest when that’s been completed.…

    • 494 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Tm 9-1240-413

    • 3184 Words
    • 13 Pages

    authentication and you must complete the Access Request form the first time you use it. The DA Form 2028 is located under…

    • 3184 Words
    • 13 Pages
    Satisfactory Essays
  • Powerful Essays

    The specific purpose of this paper is to describe the authentication process and to describe how this and other information security considerations will affect the design and development process for new information systems.…

    • 1478 Words
    • 5 Pages
    Powerful Essays
  • Good Essays

    dffasdfs asdf asd

    • 1342 Words
    • 6 Pages

    The requirements you would need are; to solve business problems, organise and report data, prepare text from note, support the organisation of an event, meet and welcome visitors word processing software.…

    • 1342 Words
    • 6 Pages
    Good Essays
  • Powerful Essays

    E-collaboration encompasses technology that has been built on the infrastructure provided by the internet, which has undoubtedly revolutionized the business world (DeRosa, 2011; Riemer, Steinfield, & Vogel, 2009)…

    • 5957 Words
    • 24 Pages
    Powerful Essays
  • Powerful Essays

    Manufacturing Audit Risk

    • 1585 Words
    • 7 Pages

    The applications, and any access logs are closely monitored to make sure any unauthorized user is not trying to gain access to confidential documents. The application should also restrict users with multiple sets of keys to be used in combination to login and gain access to make sure the authorized user is logging in.…

    • 1585 Words
    • 7 Pages
    Powerful Essays
  • Good Essays

    Hum/186 Week 3

    • 639 Words
    • 3 Pages

    Learning Team B knows there are many roles of blogs such as political, sports, multi-author blogs, social networking, online advertising, edublogs, online diaries, and fee advertising. It is hard to limit two…

    • 639 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Step 2 - write a paragraph on your blog answering all of the questions (SEE BELOW).…

    • 506 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    In the Microsoft SQL Server, authentication process occures when someone wanted to make a connection to Microsoft SQL Server. User and password is required for some one to be able to access resources of the Microsoft SQL Server. Once the authentication process finishes, Microsoft SQL Server takes control of authorizing user’s can access to object ( Database, table, trigger and function ) and data in the system…

    • 390 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Blog and Web

    • 1004 Words
    • 8 Pages

    Today's blogs seem to be more like personal journals, which contain an author's thoughts and feelings about a topic.…

    • 1004 Words
    • 8 Pages
    Better Essays
  • Good Essays

    Social Media

    • 547 Words
    • 3 Pages

    Assessment A, Part One - Evaluating the Pros and Cons of Different Social Media Sites…

    • 547 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Information regarding residents may be securely emailed to a regional manager, such as weekly or monthly reports.…

    • 1748 Words
    • 7 Pages
    Good Essays
  • Good Essays

    ☑ Blogging will become a more credible and valuable way to examine social, political, cultural, legal and entertainment issues.…

    • 816 Words
    • 4 Pages
    Good Essays