Professional Documents
Culture Documents
INDIVIDUAL ASSIGNMENT
Lecturer
Student Name
Module Code
: CT098-3.5-2-RMCT
Module Title
Assignment Title
Intake
: UC2F1404SE
CT098-3.5-2-RMCT
Page 1
Contents
1.0 Title...................................................................................................................... 3
2.0 Introduction.......................................................................................................... 3
3.0 Problem Statement............................................................................................... 3
4.0 Research Aims & Objectives.................................................................................6
4.1 Aims.................................................................................................................. 6
4.2 Objectives......................................................................................................... 6
5.0 Research Questions.............................................................................................. 7
5.1 Domain Research.............................................................................................. 7
5.2 Technical Research............................................................................................ 7
6.0 Research Design................................................................................................... 8
6.1 Primary Data Collection..................................................................................... 8
6.2 Secondary Data Collection................................................................................9
6.3 Timeline........................................................................................................... 10
7.0
Personal Reflection.......................................................................................... 11
CT098-3.5-2-RMCT
Page 2
1.0 Title
NFC Login Application for Mobile Devices
2.0 Introduction
In this era of technology, it is safe to say that every household and office has a desktop or
personal computer, whether for work or entertainment purposes. A developing country is no
exception of having such devices, which includes cities that are growing tremendously every
year. A household computer has multiple functions, depending on the necessities of the user. A
computer is usually unique to either one or a limited set of owners, meaning only a few select
people can access his/her computer at a given time. Thus, a security system is usually
implemented in each personal computer to ensure safeguard of information and privacy is kept to
a maximum.
Page 3
Page 4
CT098-3.5-2-RMCT
Page 5
4.2 Objectives
- To implement a hassle free login system, where users only require an Android Device to access
their personal computer.
- To provide optimal security and safeguard data from unauthorized users
- To be fast and efficient in a professional working environment
CT098-3.5-2-RMCT
Page 6
1.
2.
3.
4.
5.
6.
7.
CT098-3.5-2-RMCT
Page 7
b) Questionnaires
Questionnaires consist of a set of questions which can be given to a group of select respondents
in order to collect specific information. The questions should be concise and easily understood
CT098-3.5-2-RMCT
Page 8
6.3 Timeline
CT098-3.5-2-RMCT
Page 9
7.1
Personal Reflection
CT098-3.5-2-RMCT
Page 10
CT098-3.5-2-RMCT
Page 11
Page 12
CT098-3.5-2-RMCT
Page 13