Case Study: The Teacher's Pet Design

Great Essays
The Teacher’s Pet design and implementation would be affected and inhibited by several constraints in terms of hardware and software, interfaces, as well as rules and regulations.

Constraints are identified as follows:
The system shall be able to run on a hardware with limited resources.
The system shall be compatible with multiple platforms for the web client.
The system shall have a functioning interface with the database.
The system shall have access to working network connection.
The system shall have GUI to interface with the users.
The system shall follow Privacy Act of 1974.
The system shall follow the rules and regulations of Federal Communication Commission.
The system shall abide with the LAN, WLAN, and TCP/IP.
The Teacher’s Pet
…show more content…
3.3.1 Assumptions
The successful implementation and use of the Teacher’s Pet have the following assumptions:
The hardwares used on-site and off-site are functioning properly.
The operating systems are up to date.
There is a working connection between the hardware to the LAN, WLAN, and/or to the TCP/IP.
Virus protections are implemented in the hardware.
The database backup, archiving, and disaster recovery processes exist.
The GUI acts as a communication between the system and the users.
The administrators, teachers, and counselors are capable of utilizing the system without difficulties.

3.3.2 Dependencies
The following are some dependencies that need to be considered for the system to function effectively:
The system is dependent on a design that uses multiple APIs.
GUI shall be designed for the system to communicate with the users.
The system depends on functioning database, operating systems, and hardware.
The system depends on working LAN, WLAN, and/or TCP/IP connections.
The success of the system is dependent on the users capability of operating the software.

4 Detailed Design
4.1 Screen Display Samples

4.2 Detailed Object
…show more content…
Home Page – Login Input Data Elements
To get access to the system, the users input username and password. The inputs are of VarChar data type with 10 characters limit. They will be passed by value to the database.
4.5.3 Output Data Elements
Identifier
Description
Data Type
Limit/Range
Destination(s)
Output Method isSuccessful Message
Bool
0 = False
1 = True
Home Page
GUI
Table 2. Home Page – Login Output Data Elements
The output is of boolean type. During verification, when the inputs match and exist, the result of isSuccessful method will be 1, and the HomePage will be displayed. Otherwise, it will be 0, and the error message “Invalid Username And/Or Password” will be displayed.
4.5.4 Processing Characteristics
4.5.4.1 Algorithms
REQUEST login
ENTER username AND password
VERIFY username AND password IN User
IF username AND password MATCH AND EXIST
RETURN getHomePage ELSE DISPLAY Error Message “Invalid Username And/Or Password”
4.5.4.2 Error Handling
Upon any error, transfer control to error handling page where the appropriate error message will be displayed. Errors that may occur include: Insufficient access rights Network communication error Database connection error Invalid/Incomplete Field
4.5.4.3 Data Conversion

Related Documents

  • Improved Essays

    The purpose of generalized audit software programs is to perform a variety of auditing operations on the computer files used to store the information. The steps to be followed by the internal auditor to use generalized computer audit software include: • planning and designing the audit application. • ensuring that the output and final reports are generated from the files being • tested. ii. The purpose of integrated test facility (ITF) packages is to test both source data controls and processing controls.…

    • 828 Words
    • 4 Pages
    Improved Essays
  • Great Essays

    Through this interface, user can interact with our system. 1. To give a ngerprint as an input to our system, scanner needs to be connected to PC. 2. To connect scanner to PC, SecuGen device drivers need to be installed.…

    • 1824 Words
    • 8 Pages
    Great Essays
  • Improved Essays

    This interaction will be characterised by the system’s capabilities and processes that will help the system accept inputs, process these inputs and generate an output. This will include the systems hardware devices. These devices will reflect on the contributions from computer science and engineering, whereas the human capabilities, both mental and physical, are understood through cognitive science and ergonomics. The interaction that exist between the computer and the human will consist of user interface software that will govern the meaning of the inputs and outputs for the computer. This will include the corresponding rules and expectations that the user would apply to generate meaningful actions.…

    • 902 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Interface Management securely opens and managed enterprise data and applications that are need to fill a request. It offers a range of functionalities, such as; transforming data to fill the request, filtering data to collect the right information, combining different sets of data stored in different enterprise systems, transporting the data by translating the protocols between the request and the database, controlling traffic amongst multiple request from multiple users, and overall routing the requests to the right areas of the enterprise system to develop a response that can be sent back to the client. Development Management engages, educates, and empowers internal and external developers. It has functionalities that suit the developer needs by providing an onboarding training process, a plan management system, collaborating amongst developers, a consistently updated API discover, and Analytics for testing future APIs. Operations management is the manage lifecycle and performance operations functionalities.…

    • 1025 Words
    • 5 Pages
    Improved Essays
  • Great Essays

    Kelly's Salon Case Study

    • 1186 Words
    • 5 Pages

    SaaS has an automated vendor that offers testing services. Automated testing is necessary since SaaS is a web-based solution and during this procedure it uses devices to handle quality aspects in the functioning, interface and unit. Therefore, to ensure that the system operates effectively to meet Kelly’s business requirements, she will create at least two databases; Production database for the daily activities of the…

    • 1186 Words
    • 5 Pages
    Great Essays
  • Great Essays

    The above shows that the main issue of distributed computing is programs in execution, which are called processes. The second issue is that these processes cooperate or compete in order to provide the requested services. This means that these processes are synchronized. A natural model of distributed computing is the client-server model, which is able to deal with the problems generated by distribution, could be used to describe computation processes and their behavior when providing services to users, and allows design of system and application software for distributed computing systems. Client-server communicates at the virtual (logical) level by exchanging requests and responses.…

    • 1122 Words
    • 5 Pages
    Great Essays
  • Great Essays

    Nt1310 Unit 7

    • 1416 Words
    • 6 Pages

    What directs the flow of data over the network? A switch/hub/router directs the flow of data over the network. 3. What are the three functions of network software? The three functions of the network software are: To make sure that the information is addressed properly.…

    • 1416 Words
    • 6 Pages
    Great Essays
  • Improved Essays

    Nt1310 Operating System

    • 1022 Words
    • 5 Pages

    The OS organises machine and peripheral actions so they can achieve optimum results.To do this it uses a function to connect with hardware such as the USB, RAM,ROM, keyboard and mouse. Data is sent back and forth to the RAM to help the system run its applications.The computers device drivers are used to manage the machine and these drivers are controlled by the OS. How do they facilitate users? Different types of operating systems provide their own levels of stability and reliability to facilitate the user. Software developers will often update the OS by…

    • 1022 Words
    • 5 Pages
    Improved Essays
  • Great Essays

    Django Case Study

    • 1057 Words
    • 5 Pages

    Answer: Django architecture consists of: Models: It describes your database schema and your data structure Views: It controls what a user sees, the view retrieves data from appropriate models and execute any calculation made to the data and pass it to the template Templates: It determines how the user sees it. It describes how the data received from the views should be changed or formatted for display on the page Controller: It is the heart of the system. It handles request and responses, setting up database connections and loading add-ons and specifies Django framework and URL parsing. Question: Why Django should be used for web development? Answer: Django should be used for web development because of following reasons: • It allows to divide code module into logical groups to make it flexible to change.…

    • 1057 Words
    • 5 Pages
    Great Essays
  • Superior Essays

    2. Objectives The key objectives of the lab are : • Learning Fiber to the home - BPON and Fiber to the home - GEPON systems. • To process the layer 2 internet services in Gigabit passive optical network (GPON) FTTH using OLT CLI command and FTTH U2000 client-server and monitoring the performance of fiber optic media. • [1] The main motive for this lab is to introduce and investigate the information of…

    • 1575 Words
    • 7 Pages
    Superior Essays