Scenario 33 Accessibility for Web Sites

Lee is in the market for some new clothes, appliances, and music. As he frequently does, he is spending a weeknight evening shopping online. He has one of the most common visual disabilities for men, color blindness, which in his case means an inability to distinguish between green and red. He has difficulty reading the text on many web sites. When he first starting using the Web, he had thought that a lot of sites used poor color contrast, since to him many sites seemed to use similar...

Fki

A Submitter record cannot be deleted if there are any Message records that refer to it in the database. The Message records will have to be deleted first before the related Submitter can be deleted. A Message record cannot be added to the database if it does not point to a valid Submitter. The Submitter referred to in the Message record must exist and cannot be empty or null. There are other types of constraints that can be added to database table definitions during logical design. For...

Identify Deployment Requirements

Deployment requirements specify the ease with which a solution shall be able to be successfully installed in its production environment. A typical objective is to ensure that time and money are not wasted during the installation process. This ensures that the solutions have a clearly defined path for deployment. An example of a deployment requirement would be how long it takes for the support staff to install the required components on production equipment and time for users to perform the...

Planning the Code Review

Planning of the architecture review starts early in the project planning process, while requirements are being gathered and refined to create a functional specifications document. The architecture review is performed and recorded into project documents. The information gathered from the architecture review is then used in creating the testing and software assurance plans. The moderator determines the product's volatility status to determine when the code review is appropriate. He or she then...

Local Host vs Remote Host

When determining whether to use the local host or the remote host for the location at which to save web project files, it is important to consider the differences between the two methods. Web projects whose working location starts with http localhost are referred to as local host projects. Projects that have a nonlocal host location are referred to as remote host projects. When using remote host projects, the debug process locks the shared web server and prevents other users from working on the...

Shared Checkouts

SourceSafe has two forms of checkout exclusive checkout mode and shared checkout mode. Exclusive checkout mode allows only one user at a time to check out a file. Shared checkout mode allows multiple users to check out and modify files. This allows developers to make changes to different parts of the file that are checked out at the same time. It is important to note that the shared checkout mode sometimes results in merged conflicts overlapping changes that cannot be automatically resolved....

Risks of Skipping Functional Specifications

Sometimes the team will choose to skip the functional specifications and continue to development. Budget or time constraints may interfere with creating the functional specifications. The risks associated with skipping the functional specifications are The team may develop a solution that does not completely address the customer requirements. The team might be unable to clearly define customer expectations and share a common understanding with the customer. Consequently, the team might not know...

Developer Response Documents

Another type of developer-specific document is one that takes the project tasks and turns them into developer language. This document is called a response document. From this type of document, developers can be assigned tasks and responsibilities. The purpose of a response document is to take the tasks defined from a project point of view and turn them into developer-sensible types of tasks, which is also a useful way to determine overlaps in task responsibilities and components. The general...

Figure

.NET acts as a middleware component between the application and Windows. Also, despite COM's popularity, it remained a Microsoft-only technology. An attempt to port DCOM to Unix did not go very far. Because more than 70 percent of the web servers on the Internet use operating systems other than Windows (such as Unix), this meant another solution had to be found. In some ways, comparing the Windows DNA architecture to .NET is like comparing apples to apple trees. Microsoft has spent considerable...

Info

Specifies the degree to which a business shall protect itself and its sensitive data and communications from accidental, malicious, or unauthorized access or destruction. Examination of the current environment and external systems and data that the solution will cross processes with. Defines how the solution handles certain components being intentionally damaged or destroyed. An example would be that the application will not have a single point of failure. Documents the marketplace in which the...

Bug Convergence

Bug convergence is the point where the rate of bugs resolved exceeds the rate of bugs found. This helps to provide an indicator to customers and key stakeholders of whether the project is on track. Typically, many bugs are found early in the testing process, and the rate of bugs found exceeds the number of bugs the team is able to resolve each day. Over time, however, fewer bugs are found on average everyday, forming a downward trend line. If bug convergence actually occurs significantly later...

D

Jand'l is an intermediate developer at one of the country's largest banks. He has developed a small financial calculator component in VB .NET that will calculate the monthly principal and interest payments required for mortgages and loans. This component is used by several applications within the organization, mostly without problems. Whenever the component encounters a situation it can't handle, it raises an exception to pass a message back to the calling application. Which of the following...

Sideby Side Execution

Side-by-side execution is the ability to run multiple versions of the same assembly simultaneously. Components that can run side by side do not have to maintain backward compatibility. This allows applications to use newer components when necessary. For example, a component called Employee supports side-by-side executing. Between version 1.0.0.1 and 1.0.0.2 some incompatibilities were introduced. Multiple releases of the application have followed, and some releases support version 1.0.0.1 and...

Single Tier Solutions

A single-tier architecture is the simplest form of application architecture. Single-tier applications, sometime called standalone applications, have everything they need to run installed locally on the client computer (also called a client workstation). Typically, these applications consist of a single binary executable (EXE) file, although you will find some applications that ship with their own binary libraries (DLLs), local data stores, or both. There are many examples of single-tier...

Considerations for Synchronous or Asynchronous Architecture

Most applications developed today are synchronous. That is, when passing a task off to another component to perform, the application waits patiently for the task to complete before continuing. An example of this would be the process that occurs after a user saves a record in a data entry application. Typically, the application sends the data on to a relational database such as SQL Server and then waits for the database update to complete no matter how long that takes. Most database transactions...

Njr

Trevor is a junior programmer at a large, multi-national human resources consulting firm. Trevor has been asked to recommend a security model for the .NET-based application his project team is working on. The application's user IDs and passwords will be stored inside a SQL Server database. Which .NET Framework component can be used to enable an application to use its own user ID and password authentication system 9. Which of the following statements best describes the primary benefit of...

Versioning is done only on assemblies with strong names

As such, two assemblies that differ by version number are considered by the runtime to be completely different assemblies. This version number is physically represented as a four-part number with the following format lt major version gt . lt minor version gt . lt build number gt . lt revision gt For example, version 1.2.200.0 indicates 1 as the major version, 2 as the minor version, 200 as the build number, and 0 as the revision number. The version number is...

Creating ORM Diagrams in Visio

As we discussed in Chapter 1, Microsoft Visio for Enterprise Architects is a full-featured diagramming tool that has many applications outside of the application design arena. The tool contains hundreds of symbols and icons that can be used to create complex diagrams and graphics. Of course, because it is included with the Enterprise Architect edition of Visual Studio .NET, it contains dozens of icons and templates for designing software applications and databases as well. Chapter 2...

Analyze the Organizational Political Climate

Assessing the business political environment is another important feature of examining the organizational structure. The assessment is done to determine the key stakeholders in both the business processes and for the project. From the case study, there isn't much information about the political climate. The examination of the political climate can also be helpful in identifying individuals who can help provide a positive influence for those who are more hesitant to accept the change. Assessing...

Exercise 73

Converting Conceptual Database Design to Logical Design We will turn again to the same example we used in Exercise 7-1. A law firm has asked you to redesign their client billing application. From your conversations with the client, you have learned the following about the relationship between an invoice and a billable task Invoices contain a list of one or more billable tasks. The following illustration depicts this elementary fact using ORM notation 1. Using relational database terminology,...

User Interface Conceptual Design

Many would believe that thinking about user interface design during the conceptual design stage might be a little premature but when you think about it, user interface designers have everything they need at this stage to get started on a basic user interface design The users of the application have been defined during the user requirements stage. The required functionality of the application has been defined during the business requirements stage. An idea of the target platform and operating...

From The Classroom

Understanding the Five Rules of Normalization One of the early concepts of database development, which predates even the existence and widespread use of relational databases, is the concept of normalization. Normalization is the process of organizing a database according to certain rules. These rules exist to ensure that the database is unambiguous and operates as intended efficiently and without data loss. The ORM process does a good job ensuring that ambiguity and redundancy are removed from...

The Windows Principal is the most common principal used It is used for Windows Authentication otherwise use the Generic

The GenericPrincipal and GenericIdentity are used for authorization independent of Windows NT and Windows 2000 domain. A classic example of this would be an application that requests user name and password for authorization, and the information is checked against a database or XML file. The following code shows how to use the GenericPrincipal is very similar to the WindowsPrincipal object. GenericIdentity Myldentity new String MyStringArray new GenericPrincipal MyIdentity, MyStringArray...

Creating a Test Plan

The test plan describes the strategy used to organize, and manage the project's testing activities. It identifies testing objectives, methodologies and tools, expected results, responsibilities, and resource requirements. A test plan ensures that the testing process will be conducted in a thorough and organized manner and will enable the team to determine the stability of the solution. The test plan breaks the testing process into different elements, including unit testing, database testing,...