Case Study: The Teacher's Pet Design

Great Essays
The Teacher’s Pet design and implementation would be affected and inhibited by several constraints in terms of hardware and software, interfaces, as well as rules and regulations.

Constraints are identified as follows:
The system shall be able to run on a hardware with limited resources.
The system shall be compatible with multiple platforms for the web client.
The system shall have a functioning interface with the database.
The system shall have access to working network connection.
The system shall have GUI to interface with the users.
The system shall follow Privacy Act of 1974.
The system shall follow the rules and regulations of Federal Communication Commission.
The system shall abide with the LAN, WLAN, and TCP/IP.
The Teacher’s Pet
…show more content…
3.3.1 Assumptions
The successful implementation and use of the Teacher’s Pet have the following assumptions:
The hardwares used on-site and off-site are functioning properly.
The operating systems are up to date.
There is a working connection between the hardware to the LAN, WLAN, and/or to the TCP/IP.
Virus protections are implemented in the hardware.
The database backup, archiving, and disaster recovery processes exist.
The GUI acts as a communication between the system and the users.
The administrators, teachers, and counselors are capable of utilizing the system without difficulties.

3.3.2 Dependencies
The following are some dependencies that need to be considered for the system to function effectively:
The system is dependent on a design that uses multiple APIs.
GUI shall be designed for the system to communicate with the users.
The system depends on functioning database, operating systems, and hardware.
The system depends on working LAN, WLAN, and/or TCP/IP connections.
The success of the system is dependent on the users capability of operating the software.

4 Detailed Design
4.1 Screen Display Samples

4.2 Detailed Object
…show more content…
Home Page – Login Input Data Elements
To get access to the system, the users input username and password. The inputs are of VarChar data type with 10 characters limit. They will be passed by value to the database.
4.5.3 Output Data Elements
Identifier
Description
Data Type
Limit/Range
Destination(s)
Output Method isSuccessful Message
Bool
0 = False
1 = True
Home Page
GUI
Table 2. Home Page – Login Output Data Elements
The output is of boolean type. During verification, when the inputs match and exist, the result of isSuccessful method will be 1, and the HomePage will be displayed. Otherwise, it will be 0, and the error message “Invalid Username And/Or Password” will be displayed.
4.5.4 Processing Characteristics
4.5.4.1 Algorithms
REQUEST login
ENTER username AND password
VERIFY username AND password IN User
IF username AND password MATCH AND EXIST
RETURN getHomePage ELSE DISPLAY Error Message “Invalid Username And/Or Password”
4.5.4.2 Error Handling
Upon any error, transfer control to error handling page where the appropriate error message will be displayed. Errors that may occur include: Insufficient access rights Network communication error Database connection error Invalid/Incomplete Field
4.5.4.3 Data Conversion

Related Documents

  • Improved Essays

    BankID [11] allows users to log in into different merchants by using the same password and two-factor authentication. With this, it helps people to save their bank account. This is used in a web site (merchant) when it needs to securely identify its users. Overall the user need to enter their SSN (Social security number), a password, and at the end a one-time password.…

    • 640 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    7. Application Access Control Access to programming, framework utilities and project source libraries might be controlled and confined to those approved clients who have a sensible industry need frameworks or database administrators. Approval to utilize an application might rely on upon the accessibility of a permit from the supplier. Give security from unapproved access by any utility, OS software, and malicious programming that is equipped for bypassing framework or application controls.…

    • 118 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    Nt1330 Unit 9 Final Report

    • 1448 Words
    • 6 Pages

    To develop this application I have choose ASP.NET MVC 5.0 as a Front End and SQL SERVER 2012 Express edition as a Backend. To work on this technologies we are using Visual studio 2013 web Express and SQL SERVER Management Studio 2012. 1.1 SELECTION CRITERIA There are various reason for choosing this  Responsive design possible  SEO optimization is easy  Easy to implement …

    • 1448 Words
    • 6 Pages
    Improved Essays
  • Improved Essays

    It offers security by password technique for individual access, and protect against unauthenticated change and delicacy. High maintenance as frequent changes is instantly distributed. All changes and implementation are built on-sever. Encourage interaction and communication through java and needs Browser capable of running JAVA programs.…

    • 1180 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    Task 9 For this task I must compare the usefulness of maintaining a database with MySQL compared with if I were to use the query language (QBE). For this task I will need to evaluate the advantages for both the languages, as well as the disadvantages, to find a conclusion which is evenly presented for both of the languages. Advantages and Disadvantages Although the two languages interlink in many different ways they have many different features that must be noticed by the user before the use of either, these two tables show the brief comparisons that should be made before using either of the two languages. MySQL Advantages Disadvantages Point How it affects the user Point How it affects the user…

    • 1173 Words
    • 5 Pages
    Improved Essays
  • Decent Essays

    802.11b and 802.11a WLAN standards were made official in September of 1999 by the IEEE committee. Included with its ratification was Wired Equivalent Privacy (WEP) technology for authentication and encryption. When utilizing the WEP standard every frame is encrypted before transmission over wireless LAN by using the RC4 encryption technique. WEP utilized shared key authentication and open system authentication.…

    • 199 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    HGC Case Study

    • 1025 Words
    • 4 Pages

    These information systems are: • LAN – Switches, routers and firewall • Servers -- SHGTS Microsoft Access 97 database, Remote access server (RAS) • Workstations • Communication network – Phone and IP phones • Agency data processing center including its operating systems and utilities • Tactical radio network • Shared information processing service facilities (Bowen, Hash, & Swanson, 2006). A5: IT infrastructure that includes a description of information flow JINX application server is housed in room 1234, located at the HBWC’s executive office facility. This is a Microsoft Windows NT application server that is customized to run several applications including Microsoft Access 97 database that is used specifically for SHGTS. The database tracks all data and activities related to the grant distribution, grant users access the database to complete their grant…

    • 1025 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    For this week 's assignment you will answer some short essay questions where you should refer back to the textbook to answer the questions in complete sentences. Each question should be answered in 3-5 sentences. 1. Describe and analyze age appropriate classroom design for kindergartners ' physical, cognitive and socio-emotional characteristics of development. Give examples to support your analysis.…

    • 778 Words
    • 4 Pages
    Improved Essays
  • Decent Essays

    CIO Large health care organizations are in need of a CIO (chief information officer) to help to stay up to date on latest updates and making sure that everything is working properly. In the current organization of my employment I know we have one because it is a large facility and everything is done through electronic systems. CIO makes sure that IT support is performing their duties are they are assigned to and provide much needed help.…

    • 204 Words
    • 1 Pages
    Decent Essays
  • Decent Essays

    Instructional Design 1970

    • 218 Words
    • 1 Pages

    Describe how Instructional Design has evolved from its beginnings through to present day. What changed in the 50s-70s? As stated in the article Reiser, R. & Dempsey, J. (2012) “new ideas and innovations were created to support practices in the field. Different individuals with many careers in the field concentrated on distinctive aspects of it.”…

    • 218 Words
    • 1 Pages
    Decent Essays
  • Great Essays

    This project’s goal was to see if the application integration can be used to compile the various types of applications together, such as legacy systems, e-business solutions, databases and ERP applications. The downside of the project was that the IT department spent 60% of total pilot implementation time on system’s design and 40% on system’s development. It took a long time as a number of systems have to be changed or phased out to support an integrated process. Also, it was difficult to collaborate to automate and redesign the…

    • 1110 Words
    • 5 Pages
    Great Essays
  • Improved Essays

    There has also been research conducted on the effects of Animal-Assisted therapy among young children and preschool children in school. Janlongo et al (2004) and Gee et al (2007) both looked at how the role of therapy dogs helped children’s learning in the classroom. However Gee et al (2007) specifically looked at how the role of therapy dogs in helping children with their speed and accuracy in completing motor skill tasks. Their study explored the affect that a therapy dog’s presence would have performance on a set of motor skill tasks in school aged children (Gee et al, 2007). The study looked at 14 children between the ages of four and six, and found that the presence of a dog served as an effective motivator for increasing children’s accuracy…

    • 1607 Words
    • 7 Pages
    Improved Essays
  • Improved Essays

    This project is a milestone in easing the life of the clients. This project overcomes the frustrations in waiting for one's turn in a long queue. The use of mobile phones was established and it was a whole new factor in the communications access mode. This was proved correct based on the test conducted by the researcher in the UNO-R accounting office.…

    • 598 Words
    • 3 Pages
    Improved Essays
  • Superior Essays

    “When creating content, be empathetic above all else. Try to live the lives of your audience.” This quote by Rand Fishkin led me to explore the idea that there is more to UX design than just the overall layout. One of the first thing I found out was that in today’s world within designers, UX design is one of the most demanding job in the tech world.…

    • 1778 Words
    • 8 Pages
    Superior Essays
  • Improved Essays

    The purpose of this paper is to describe the network configuration, explaining the role of each component and connection of the scenario provided. Specifically, I will discuss the functions of the components and describe how they contribute to the network. Along with this I will modify the appropriate components of the provided database with the information regarding the employees’ computers and the upgrade. Network Configuration Network configuration allows a system admin to set up a network to use to communicate. Per Techopedia, “Network configuration is the process of setting a network 's controls, flow and operation to support the network communication of an organization and/or network owner.”…

    • 923 Words
    • 4 Pages
    Improved Essays