Nt1310 Unit 6

Decent Essays
2.2.2 Empathy Summary Canvas
It consists of five key parts:
1. First part is for user. In this section, we need to specify about the main user of the utility. The main user of this utility is the Administrator only.
2. Second part is for stakeholders. In this section, we write the stakeholder who is relevant to the user. In project, the main user is the administrator and the employees could be the stakeholders as they are relevant to the activities.
3. Third part is for Activity which is related to the user and stakeholders. Example - Monitoring. All the activities in cluding file renaming, searching a file, find the location, etc.
4. Fourth part is for a happy story. In this section, we write two happy stories which are related to the project.
…show more content…
• Product Experience –We want a utility which could do all the above mentioned tasks with easy and fast access.
• Product Functions - Product functions deliver the product experience.
• Product Features – It includes a LAN network, Win OS 10, and a database.
• Components –These include the database, three tools and LAN.
• Customer Revalidation – The customer can revalidate the search functions, the speed and response time and the ease of use of this utility.
• Reject/Retain/Redesign – We can redesign the User Interface so that it matches the User’s needs for ease of use. We retain the functions as they are all required by the users.
2.3 System Design and Modelling Diagrams
The system design and modelling diagrams help us to better understand the system for which we will be coding for in the next phase.
The following diagrams show how the user would act and interact with the system and the various activities that user would perform:

2.3.1 NOTATIONS

DATA FLOW
…show more content…
4.2 Usefulness with respect to existing solutions
Until now there were no single utility consisting of these three tools. There are many similar utilities which are successfully working individually for private use.
Our system consists of SQLite database which requires no installation, no extra drives, extensible up to 4B, unlimited backup and NDT framework.

4.3 Scope of future work
Currently we have performed renaming a single file in C# .net as we are learning along with the implementation needs. Once we complete this utility in the next semester, we may also think about improvements that the users need in the next versions and updates of the utility.

4.4 Unique Features of Our Innovation/Project
Our project implements a unique and user friendly utility on .net framework 4.6 that meets the requirements and needs of the users and the department.
Other utilities on other platforms had only provided functioning of a particular type, but we are merging the three similar utilities as an executable file under IT

Related Documents

  • Decent Essays

    Nt1310 Unit 2

    • 234 Words
    • 1 Pages

    1. Who will participate in the evaluation? The person that will participate in this evaluation is my cousin. 2.…

    • 234 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    Nt1330 Unit 2

    • 369 Words
    • 2 Pages

    Based on the findings obtained from the analysis of security information then compiled recommendations for improvement of the condition of the company. Some recommendations are: 1. Describe in detail the confidentiality agreement and specifically including maintaining the confidentiality of the password 2. Reexamination of the access rights of each and updating access rights in case of transfer of part or advancement in accordance with their respective access rights. 3.…

    • 369 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Nt1330 Unit 7

    • 1149 Words
    • 5 Pages

    1. Focus on the overall “security assessment” risk rating that appears at the top of your report. Considering what security measures you (or the computer owner) have undertaken for your computer, does the assessment surprise you? Why or why not? What measures should you plan to undertake if the green checkmark did not appear?…

    • 1149 Words
    • 5 Pages
    Improved Essays
  • Great Essays

    Nt1330 Unit 3 Quiz

    • 1731 Words
    • 7 Pages

    Please note that, we only discuss couple of options for each command to get the familiarity, and get you going with your learning. At the end of each command, there is a link to the command reference, where we discuss the most relevant and practical usages of the commands. It not practical to discuss all the options available for each command we discuss. We recommend you to refer to the man page of the command on your Linux system. Listing Files…

    • 1731 Words
    • 7 Pages
    Great Essays
  • Improved Essays

    Nt1310 Unit 6

    • 470 Words
    • 2 Pages

    Protecting ones privacy is something that many people desire and will go to great lengths to protect it. Privacy for most people starts with electronic communications and the smartphone is at the top of that list. Earlier this week SIRIN Labs announced the launch of the SOLARIN, a super phone of sorts - one that the company says is the worlds first truly smartphone. The phone geared towards the travelling business professional, is meant to ultra secure while at the same time not compromising on looks and usability. The company boasts that the device has over 2,500 inner components, and superior exterior compared to any other smartphone on the market - they believe its the best mobile phone in the world.…

    • 470 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Nt1310 Unit 4

    • 961 Words
    • 4 Pages

    The problem is to ensure that elderly medical patients take their medication and recommended dose at the proper time to ensure that they receive the necessary treatment, and prevent the condition from worsening in the process. To solve this problem, a device will need to be implemented that allows the user to be reminded when to take the medicine, and also be sure that the patient is taking the correct amount of medication. Our first idea was to develop a portable watch device with built in audio and visual cues to remind the patient of their need to take the medication. The device could be programmed ahead of time by a technician, and instruct the user to take the recommended dosage at the correct time.…

    • 961 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    CS457-1801A-01: Software Design Unit: Software Design Process Dr. Howard Evans Colorado Technical University Larry Bargers January 19, 2018 Software design concepts give developers a set of fundamental and sophisticated architectures to help organize logic throughout the software development phase. Developing can often be a cumbersome process that can eased by leveraging modern concepts which includes abstraction, modularity, refinement and software architecture. With the ever changing landscape of computer programming you can place a safe bet that core development are always in state of flux (usually for the better) by being revised and improved. Abstraction establishes an easier to comprehend approach for the developer at the higher level while…

    • 666 Words
    • 3 Pages
    Improved Essays
  • Great Essays

    In this phase the system needs to ready for implementation. But before this can be done the user acceptance must sign off. This requires documentation which includes the user acceptance report (Aras & Ciaramitaro, 2008). System Maintenance is the last phase.…

    • 1572 Words
    • 7 Pages
    Great Essays
  • Improved Essays

    Chapter 11: Application Portfolio Management 1. The CIO is concerned about the ever increasing cost of maintaining the inventory of IT applications in the organization. He has asked you to meet to discuss why this proliferation of applications is occurring? One of the main causes of the ever-growing costs of upholding different technologies, is simply that they are not being disposed when they are stop being relevant.…

    • 709 Words
    • 3 Pages
    Improved Essays
  • Great Essays

    The system is dependent on a design that uses multiple APIs. GUI shall be designed for the system to communicate with the users. The system depends on functioning database, operating systems, and hardware.…

    • 713 Words
    • 3 Pages
    Great Essays
  • Improved Essays

    In a complex environment, the management of user access to databases and other network resources can become a daunting task. Users are dynamic, with changing privileges, and role based access controls (RBAC) are a powerful way to both organize permissions into groups, and therefore ease user administration. Importantly, technical employees such as database administrators, are then able to dedicate more time to troubleshooting security issues and organizing the system than to micromanaging the access privileges of many individual users What is Role Based Access Controls? Role-based access control (RBAC) is an approach to managing entitlements, intended to reduce the cost of security administration, ensure that users have only appropriate entitlements…

    • 786 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    METHODS Listed below are the steps needed to create a Data Pipeline. Below the commands are the results from successful processing of those commands. 1) Verify or create required IAM Roles (for CLI or API only). IAM roles determine what actions pipelines can perform and what resources it can access. IAM roles determine what actions applications can perform and what resources they can access on a pipeline resource, such as EC2 instance Through CLI or AWS Data Pipeline console create the following roles: DataPipelineDefaultRole - Grants AWS Data Pipeline access to your AWS resources…

    • 705 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Importance Of MIS

    • 969 Words
    • 4 Pages

    The five-component model can be used to do a business process automatically. This can be done when people do a particular task by following a procedure, and move it so that the computer hardware runs following the rules from the software. It can also be used to evaluate the scope of new systems by using a set of standards that has to be met, or can also be by determining its strengths, weaknesses, opportunities, threats. Every information system involves a person, and thus it is the most important component; however, the usefulness of the information gathered is limited by the quality of a person’s thinking – it depends on how the information will be…

    • 969 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    The Startup Entrepreneurs and the Open Source Software Pivot The open source technology industry advances to become more regulated and isolating that makes it difficult for new players to have a point. The expertise of use for software with hardware is much better known. This is the era of the developer-defined system, where they have the power to take a decision in making technologies like cloud infrastructure and applications.…

    • 754 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    2.1 OVERVIEW OF PROJECT The project consists of a module that is being used for image processing. This is done by employing a Raspberry Pi development board and the convex hull method. The power source is a 230 V AC supply which is being converted to 12 V AC and then to DC using a rectifier circuit. This is powering the relay circuit that is being employed.…

    • 1077 Words
    • 5 Pages
    Improved Essays