system analysis and design(SAD)march2009@NccEducation
Transcript of system analysis and design(SAD)march2009@NccEducation
Inter national Advances Diploma in Computer Study (IADCS) System Analysis and Design (SAD)
Introduction
In this assignment will allow my demonstrate an understanding of the object-
oriented analysis and design of a cataloguing system. I have analysis and
design a system for an Art Gallery including the creation of a prototype user
interface and the transfer of information held on standard paper into the
system.
Candidate name: MD. Ibrahim Amin NCC candidate NO: Examination Cycle: March 2009
Assignment title: Art gallery Module name: System Analysis and Design (SAD) Page no : 1
Inter national Advances Diploma in Computer Study (IADCS) System Analysis and Design (SAD)
Task 1Analysis the required system using object-oriented method and produce a function
Model including..
● Use case diagrams
● Use case specifications
● Activity diagrams
Candidate name: MD. Ibrahim Amin NCC candidate NO: Examination Cycle: March 2009
Assignment title: Art gallery Module name: System Analysis and Design (SAD) Page no : 2
Inter national Advances Diploma in Computer Study (IADCS) System Analysis and Design (SAD)
Figure: Use case diagram for loan exhibit
Candidate name: MD. Ibrahim Amin NCC candidate NO: Examination Cycle: March 2009
Assignment title: Art gallery Module name: System Analysis and Design (SAD) Page no :
Order exhibit
Provide exhibit
Manage catalogue
Update record Staff
Other gallery
Privet collector
Curator Assistant Curator
Use case diagram for loan exhibit
<<Extend>>
3
Inter national Advances Diploma in Computer Study (IADCS) System Analysis and Design (SAD)
Figure: Use case diagram for return exhibit
Candidate name: MD. Ibrahim Amin NCC candidate NO: Examination Cycle: March 2009
Assignment title: Art gallery Module name: System Analysis and Design (SAD) Page no :
Return Exhibit
Payment
Update Record
Staff
Other gallery
Privet collector
Curator Assistant Curator
Check exhibit Record
Manage record
<<Extend>>
Fees
Due
Use case diagram for return exhibit
4
Inter national Advances Diploma in Computer Study (IADCS) System Analysis and Design (SAD)
Use case speciation for loan exhibit:
Display item for public viewing to art gallery management staff are responsibilities for order
item as a loan for certain time to author gallery or privet collector E.g. curator and assistant
curator.
The author gallery and privet curator give loan item for certain time,
Management staff also keeps record and these items are held in the art gallery to exhibit in
exhibition room.
After processing of that management staff will update the records by extend manage record.
Use case speciation for return exhibit:
Display item for public viewing to art gallery management staff are responsibilities for Collect
item as a loan for certain time to author gallery or privet collector E.g. curator and assistant
curator.
After collect items, will be keeping record and these items are held in the art gallery to exhibit in
exhibition room. After complete exhibition it is responsibility of management staff to return item
to the owner. e.g. Other gallery and privet collector. In the time of return staff also requires
making payment to the owner. If the item is not return on time there will be include Due.
After processing of that management staff will update the records by extend manage record.
Candidate name: MD. Ibrahim Amin NCC candidate NO: Examination Cycle: March 2009
Assignment title: Art gallery Module name: System Analysis and Design (SAD) Page no : 5
Inter national Advances Diploma in Computer Study (IADCS) System Analysis and Design (SAD)
Figure: Activity diagram for loan exhibit
Candidate name: MD. Ibrahim Amin NCC candidate NO: Examination Cycle: March 2009
Assignment title: Art gallery Module name: System Analysis and Design (SAD) Page no :
Yes
Request for exhibit loan
Other gallery Privet collector
Add record
Received exhibit
Show exhibit
Activity diagram for loan exhibit
No
6
Inter national Advances Diploma in Computer Study (IADCS) System Analysis and Design (SAD)
Candidate name: MD. Ibrahim Amin NCC candidate NO: Examination Cycle: March 2009
Assignment title: Art gallery Module name: System Analysis and Design (SAD) Page no :
Yes
Return exhibit
Other gallery Privet collector
Add record
Received exhibit
Check Due
Activity diagram for return exhibit
No
Pay fees
Pay Due
7
Inter national Advances Diploma in Computer Study (IADCS) System Analysis and Design (SAD)
Figure: Activity diagram for return exhibit
Task 2
Analysis the required system using object –oriented method and produce a standard
model including.
● Class diagram
● Attribute operation
Candidate name: MD. Ibrahim Amin NCC candidate NO: Examination Cycle: March 2009
Assignment title: Art gallery Module name: System Analysis and Design (SAD) Page no : 8
Inter national Advances Diploma in Computer Study (IADCS) System Analysis and Design (SAD)
Candidate name: MD. Ibrahim Amin NCC candidate NO: Examination Cycle: March 2009
Assignment title: Art gallery Module name: System Analysis and Design (SAD) Page no : 9
Inter national Advances Diploma in Computer Study (IADCS) System Analysis and Design (SAD)
Candidate name: MD. Ibrahim Amin NCC candidate NO: Examination Cycle: March 2009
Assignment title: Art gallery Module name: System Analysis and Design (SAD) Page no :
Name: Address: Phone: Get Loan ()Add () Update ()
Other collector
Name: Title: Employ ID Phone: Age:
ADD ()Edit ()Update () Search ()
Curator
Management staff
ID:Name: Location: Artist:Fees
Show ()Add () Delete () Search ()
Exhibit Type: Size: Room no: Show ()Update ()
Exhibition room
Loan Type:Loan id:Date of issue: Date of return:
Get loan ()Add () Update () Due ()
Loan
Name: Address: Phone: Get Loan ()Add () Update ()
Privet gallery
Name: Address: Phone: Show ()Get loan ()Return ()Add () Update ()
Art gallery
Name: Title:Employ IDPhone: Age: ADD ()Edit ()Update record () Search ()
Assistant Curator
Type: Location:
Add () Delete () Update ()
Record
Class diagram for show exhibit to art Gallery:
1
1
0…*
0….*
1
1
0….*
0….*1
0….*
Add record
Request loan
Collect exhibit
Show
Get loan
10
Inter national Advances Diploma in Computer Study (IADCS) System Analysis and Design (SAD)
Task 3Analysis the required system using object –oriented method and produce a
behavioral model including.
● Sequence diagram
● State machines
● Communication diagram
Candidate name: MD. Ibrahim Amin NCC candidate NO: Examination Cycle: March 2009
Assignment title: Art gallery Module name: System Analysis and Design (SAD) Page no : 11
Inter national Advances Diploma in Computer Study (IADCS) System Analysis and Design (SAD)
Figure: Sequence diagram for exhibition
Candidate name: MD. Ibrahim Amin NCC candidate NO: Examination Cycle: March 2009
Assignment title: Art gallery Module name: System Analysis and Design (SAD) Page no :
Art gallery Store room
Other collector/ privet gallery
Start search item ()
Search ()
Exhibit
Exhibition room
[Found] collect
[Not Found] Loan
Send Loan request ()
Request Confirmation
* Collect Exhibit and keep record ()
Show ()
Show () Done
Sequence diagram for exhibition
12
Inter national Advances Diploma in Computer Study (IADCS) System Analysis and Design (SAD)
Figure: state machines for exhibition
Figure: Communication diagram for exhibition
Candidate name: MD. Ibrahim Amin NCC candidate NO: Examination Cycle: March 2009
Assignment title: Art gallery Module name: System Analysis and Design (SAD) Page no :
Exhibit Processing Loan exhibit
Show exhibit
Held and record exhibit
Search exhibit
Search
If not found
State machines for exhibition
Staff
Record Other gallery / privet collector
1: Request loan
2: Get loan
4: show exhibit
Exhibition room
Feedback
Exhibit
Feedback
3: Upd
ate re
cord
Feedback
Communication diagram for exhibition
13
Inter national Advances Diploma in Computer Study (IADCS) System Analysis and Design (SAD)
Task 4Research the possible method for adding the current paper based information
to the system. Write a brief report that:
a) Outline the possible method of transferring the data.
b) State the advantages of each method.
c) Recommendation the method should be utilized with reason for yor
recommendation
Candidate name: MD. Ibrahim Amin NCC candidate NO: Examination Cycle: March 2009
Assignment title: Art gallery Module name: System Analysis and Design (SAD) Page no : 14
Inter national Advances Diploma in Computer Study (IADCS) System Analysis and Design (SAD)
a)
Data transferring method
Tow types of data transferring method
1. Online data transferring : it is refers to data the under the direct
control of the computer. Example floppy disk, magnetic disk,
and mass storage.
Where there is a need to refer to data frequently on line storage is
employed. Online data file are commonly referred to as an
organization’s data base. Where information is currently located in
one or several data base. How ever within a distributed processing
mode, data file are referred to as distributed data base because
many data base are scattered throughout an organizational
operation.
2. Offline data transferring : it is refers to data that are not under
the direct control of the computer. Example punched card and
magnetic card.
This data file can be use in input a computer system to permit the
updating and retrieval of information, or they can be used to
produce output from the system. Generally data needing to be
referenced only periodically, usually weekly or frequently, are good
candidates for off line storage.
Candidate name: MD. Ibrahim Amin NCC candidate NO: Examination Cycle: March 2009
Assignment title: Art gallery Module name: System Analysis and Design (SAD) Page no : 15
Inter national Advances Diploma in Computer Study (IADCS) System Analysis and Design (SAD)
b)
Advantages and disadvantages of data transferring method
Off-line data transferring:
Punched card
Advantages
Provide a check of information printed on the card
For small volumes of data
Economical and efficient from of file storage.
Disadvantages
Limited amount of storage data
Many times, it is necessary to employ more then once card to store a
record of information.
Processing of card input and card output is slow in compression of
magnetic tape and magnetic disk.
Magnetic tape
Advantages
It's inexpensive to operate and buy, and even cheaper to store,
It is used for cheap backup of the system data or the information.
The cost of storage of the data or the information in the tape drive is much
cheaper as that comparable to the other forms of the storage media.
The heads in the tape media are separated from the media..
The assumption is made in consideration with the tape drive’s internal
structure.
it is in existence along with the usage of the tape drive is that the tapes
are usually stored as the offline The most common one that can be
considered is the power failure or any power surges; can also cause the
failure of the tape drive. The reliability and the cost of operation involved is
more in the case of the tape drives. In short the tape drives are considered
Candidate name: MD. Ibrahim Amin NCC candidate NO: Examination Cycle: March 2009
Assignment title: Art gallery Module name: System Analysis and Design (SAD) Page no : 16
Inter national Advances Diploma in Computer Study (IADCS) System Analysis and Design (SAD)
as more durable than the disk drives like the hard disks, floppy disks and the
optical storage disks.
Disadvantages
Regarding the tape backup is that of the access time or the seek time that
it requires.
Retrieving data from most tape backup drives requires that the data files
be restored to the hard disk. Other types of backup storage can be treated
as a drive letter for direct use from the media.
The access time is more in case of the tape drives than in comparison
with the other media storage devices.
On-line data transferring:
Floppy disk
Advantages
Floppy disk red and write information much faster.
Stored data are sequentially
They are very cheap to buy and floppy disc drives are very common.
Disadvantages
They are easily physically damaged if unprotected and magnetic fields can
damage the data.
They are relatively slow to access because floppy discs rotate far more
slowly than hard discs, at only six revolutions per second, and only start
spinning when requested. The access speed is about 36 KB per second.
Floppy Disc is the unreliability
Candidate name: MD. Ibrahim Amin NCC candidate NO: Examination Cycle: March 2009
Assignment title: Art gallery Module name: System Analysis and Design (SAD) Page no : 17
Inter national Advances Diploma in Computer Study (IADCS) System Analysis and Design (SAD)
Magnetic disk file
Advantages
Any item of data is as quickly obtained as any other.
Ability to process transaction without previously storing the data.
Random access operation
Direct access ability plus the vast storage capability.
Retrieve fast transfer rate made them widely used in computer operation.
Disadvantages
Higher cost over magnetic tape file
None really! It can however be a real disaster when they eventually fail
because few home users have the data on their home computer hard
drive backed up.
Mass storage file
Advantages
Large amount of data that can be stored on line
Coast of mass storage making such a method of storage economically
feasible.
•A user is linked directly to a computer for the purpose of data input or
receiving output.
There is a direct link from transmission medium to the computer
processor.
Candidate name: MD. Ibrahim Amin NCC candidate NO: Examination Cycle: March 2009
Assignment title: Art gallery Module name: System Analysis and Design (SAD) Page no : 18
Inter national Advances Diploma in Computer Study (IADCS) System Analysis and Design (SAD)
c)
Recommendation:
My recommendation about data transferring method that Online- Mass storage
File method is better, because mass storage file provide secondary storage
capability. Such storage system reflects significant improvement in operating
efficiency and enhanced data security over conventional computer tap libraries.
For example, the CDC 38500 mass storage system from control data corporation
holds 2000 magnetic tap cartridges, each of which has a data storage capacity of
8 million byte of on-line data, totaling a maximum of 16 billion characters of
stored data system capacity is equivalent to approximately 6400 average tape
reels or 200 disk drive. Also, IBM offers a comparable system, the 3850 Mass
storage system.
The Mass storage system may be under the control of up to four computers. It
also operates through a data string process that is information transmitted to
intermediate disk storage for subsequence computer processing. Over all, such a
system has capability to meet storage requirement of any large computer
installation.
Candidate name: MD. Ibrahim Amin NCC candidate NO: Examination Cycle: March 2009
Assignment title: Art gallery Module name: System Analysis and Design (SAD) Page no : 19
Inter national Advances Diploma in Computer Study (IADCS) System Analysis and Design (SAD)
Candidate name: MD. Ibrahim Amin NCC candidate NO: Examination Cycle: March 2009
Assignment title: Art gallery Module name: System Analysis and Design (SAD) Page no : 20
Inter national Advances Diploma in Computer Study (IADCS) System Analysis and Design (SAD)
Task 5Create a prototype user interface for the gallery catalogue, as a minimum, the
flowing function:
a) Searching for the location of an item.
b) Editing an item’s detail
c) Adding a new item’s
d) Listing item’s due for return to their owners by a selected date
Print screenshot of the user inter face for the in a), b), c), and d) above.
Candidate name: MD. Ibrahim Amin NCC candidate NO: Examination Cycle: March 2009
Assignment title: Art gallery Module name: System Analysis and Design (SAD) Page no : 21
Inter national Advances Diploma in Computer Study (IADCS) System Analysis and Design (SAD)
I have create a prototype user interface for the art gallery catalog system including
the searching for the location of an item, editing an item’s details, adding a new item
and listing due for return to their owners by a selected data.
a) Searching for the location of an item
Step: 1 for search item. input the item name or item number in the box of item name or
item number. After input the item name or item number click to search Button. Then
display search item.
Candidate name: MD. Ibrahim Amin NCC candidate NO: Examination Cycle: March 2009
Assignment title: Art gallery Module name: System Analysis and Design (SAD) Page no :
Exhibition roomLocation
22
Inter national Advances Diploma in Computer Study (IADCS) System Analysis and Design (SAD)
b) Editing an item’s details
Step: 2 for Edit item. Input the item name or item number in the box of item name or item
number. After input the item name or item number click to Edit Button. Then display and
update item on database.
Candidate name: MD. Ibrahim Amin NCC candidate NO: Examination Cycle: March 2009
Assignment title: Art gallery Module name: System Analysis and Design (SAD) Page no :
Exhibition roomLocation
23
Inter national Advances Diploma in Computer Study (IADCS) System Analysis and Design (SAD)
c ) Adding a new item
Step: 3 for ADD item. Input the item name, item number, printer, price and Location in the
box of item name or item number, printer, price and Location. After input the item name
or item number click to Add Button. Then display and creat item on database.
Candidate name: MD. Ibrahim Amin NCC candidate NO: Examination Cycle: March 2009
Assignment title: Art gallery Module name: System Analysis and Design (SAD) Page no :
Location Exhibition room
24
Inter national Advances Diploma in Computer Study (IADCS) System Analysis and Design (SAD)
Listing due for return to their owners by a selected data
Step: 4 listing due for return to their owners by a selected data. After
input the item name or item number click to View Button. Then display
list due for return to their owners by a selected data.
Candidate name: MD. Ibrahim Amin NCC candidate NO: Examination Cycle: March 2009
Assignment title: Art gallery Module name: System Analysis and Design (SAD) Page no :
View
25
Inter national Advances Diploma in Computer Study (IADCS) System Analysis and Design (SAD)
Task 6Create a relational database design for the Art Gallery catalogue
system including:
a) A set of fully normalized showing the normalization process for
each.
B) Data dictionary for all items including in the database design.
Candidate name: MD. Ibrahim Amin NCC candidate NO: Examination Cycle: March 2009
Assignment title: Art gallery Module name: System Analysis and Design (SAD) Page no : 26
Inter national Advances Diploma in Computer Study (IADCS) System Analysis and Design (SAD)
a)
Normalization process
Un Normalized data
1 NF 2NF 3 NF Fully normalize
Item _name
Item_ID
artist
Price
Item Type
Loan ID
Date of issue:
Date of return:
Staff Name
Employ ID
Title
Phone:
Age:
P_Name:
P_Address:
P_Phone:
Item
Item _name
Item_ID
artist
Price
Item Type
Loan ID
Date of issue:
Date of return:
Staff Name
Employ ID
Title
Phone:
Age:
Privet gallery
P_Name:
P_Address:
P_Phone:
Item
Item _name
Item_ID
artist
Price
Item Type
Loan ID
Date of issue:
Date of return:
Staff Name
Employ ID
Title
Phone:
Age:
Privet gallery
P_Name:
P_Address:
P_Phone:
* Loan_ID
Item
Item _name
Item_ID
artist
Price
Item Type
Loan ID
Date of issue:
Date of return:
* Employe_id
Management staff
Staff Name
Employ ID
Title
Phone:
Age:
Privet gallery
P_Name
P_Address
P_Phone
* Loan_ID
Item
Item _name
Item_ID
artist
Price
Loan
Item Type
Loan ID
Date of issue:
Date of return:
* Employe_ID
Management staff
Staff Name
Employ ID
Title
Phone:
Age:
Privet gallery
P_Name
P_Address
P_Phone
* Loan_ID
Candidate name: MD. Ibrahim Amin NCC candidate NO: Examination Cycle: March 2009
Assignment title: Art gallery Module name: System Analysis and Design (SAD) Page no : 27
Inter national Advances Diploma in Computer Study (IADCS) System Analysis and Design (SAD)
b)Data dictionary
Data dictionary for exhibit
Candidate name: MD. Ibrahim Amin NCC candidate NO: Examination Cycle: March 2009
Assignment title: Art gallery Module name: System Analysis and Design (SAD) Page no :
Data Diction
ary
Title
Exhibition
System
Local art gallery
Sheet 1
Type: item Name: exhibit
Local art
gallery system
Definition:
Exhibit = Item name+ item number + Location +printer +Price
Occurrence: One or, two time per month
Operation: Show, Add, Delete, Search
Author: Md: Ibrahim
Date: 05/02/2009
Length:
120 kbps
28
Inter national Advances Diploma in Computer Study (IADCS) System Analysis and Design (SAD)
Data dictionary for privet gallery
Candidate name: MD. Ibrahim Amin NCC candidate NO: Examination Cycle: March 2009
Assignment title: Art gallery Module name: System Analysis and Design (SAD) Page no :
Data Diction
ary
Title
Exhibition
System
Local art gallery
Sheet2
Type: organization
Name: privet gallery
Local art
gallery system
Definition:
Privet gallery = name+ address +phone number printer +
Occurrence: One or, two time per month
Operation: Get Loan ,Add record ,Update record
Author: Md: Ibrahim
Date: 05/02/2009
Length:
60 kbps
29
Inter national Advances Diploma in Computer Study (IADCS) System Analysis and Design (SAD)
Data dictionary for management staff
Candidate name: MD. Ibrahim Amin NCC candidate NO: Examination Cycle: March 2009
Assignment title: Art gallery Module name: System Analysis and Design (SAD) Page no :
Data Diction
ary
Title
Exhibition
System
Local art gallery
Sheet3
Type: staff Name: management
staff
Local art
gallery system
Definition:
Management staff = staff id+ staff name +Staff title+ phone+ age
Occurrence: One or, two time per month
Operation: ADD record, Edit record, Update record,Search,
Author: Md: Ibrahim
Date: 05/02/2009
Length:
100 kbps
30
Inter national Advances Diploma in Computer Study (IADCS) System Analysis and Design (SAD)
Data dictionary for Loan Item
Candidate name: MD. Ibrahim Amin NCC candidate NO: Examination Cycle: March 2009
Assignment title: Art gallery Module name: System Analysis and Design (SAD) Page no :
Data Diction
ary
Title
Exhibition
System
Local art gallery
Sheet 4
Type: item Name: loan
Local art
gallery system
Definition:
Loan item = Item type+ Loan id +date of issue + date of return
Occurrence: One or, two time per month
Operation: Get loan. Add loan record. Update loan, Due
Author: Md: Ibrahim
Date: 05/02/2009
Length:
120 kbps
31
Inter national Advances Diploma in Computer Study (IADCS) System Analysis and Design (SAD)
Task 7Research the security issue relating to the gallery computer system write a
brief report:
a) Explain the possible treats to security.
b) Describe the possible consequences of a branch of security.
c) States the method you would use to ensure that only the curator and
assistant curators have write, edit and delete permission.
d) Explain how you would allow the website to have read-only access to
the relevant information.
Candidate name: MD. Ibrahim Amin NCC candidate NO: Examination Cycle: March 2009
Assignment title: Art gallery Module name: System Analysis and Design (SAD) Page no : 32
Inter national Advances Diploma in Computer Study (IADCS) System Analysis and Design (SAD)
a)
Possible treats to security in an Art Gallery:
Physical attacks
Along with the many ways that a network can be attested by electronic means. There
are many ways that it can be attested physically. This can be as a result of malicious
activity, or a consequence of natural events, or by accident. In general, physical
attacks tend to result in denial of service. This kind of attest including…
Fire, either accidentally started or deliberately.
Lighting strikes
Flood
Earthquake damage
Theft of equipment
Damage to Hardware
Damage software
Virus attacks
A virus is a malicious program that can be attacked to an executable program, or can
be in other executable forms, such as macros scripts. The program can carry a
payload that causes damage to the host computer system that has been infected.
Unauthorized access
Candidate name: MD. Ibrahim Amin NCC candidate NO: Examination Cycle: March 2009
Assignment title: Art gallery Module name: System Analysis and Design (SAD) Page no : 33
Inter national Advances Diploma in Computer Study (IADCS) System Analysis and Design (SAD)
Unauthorized access System attempt to access computing facilities for which they
have not been authorized. Cracking a computer's defenses is seen as the ultimate
victimless crime. The perception is that nobody is hurt or even endangered by a little
stolen machine time. Crackers enjoy the simple challenge of trying to log in, just to see
whether it can be done. Most crackers can do their harm without confronting anybody,
not even making a sound. In the absence of explicit warnings not to trespass in a
system, crackers infer that access is permitted. An underground network of hackers
helps pass along secrets of success; as with a jigsaw puzzle, a few isolated pieces
joined together may produce a large effect. Others attack for curiosity, personal gain,
or self-satisfaction. And still others enjoy causing chaos, loss, or harm. There is no
common profile or motivation for these attackers.
A person not authorized to use information in the computer can get access to
information and use the information.
b) Possible consequences of a branch of security
Building Maintenance
A regime of planned and documented building maintenance will go a long way towards
minimizing the risk of floods, fire, theft, vandalism and invasion by pests. Routines
should include regular temperature and humidity checks in areas designated as
vulnerable to damp.
Equipment Maintenance
Equipment maintenance is essential both to ensure that equipment failure does not
cause a treats and to assure the reliability of equipment in a disaster situation. Ensure
that equipment stored to deal with a disaster is included in maintenance routines
Anti-virus software Candidate name: MD. Ibrahim Amin NCC candidate NO: Examination Cycle: March 2009
Assignment title: Art gallery Module name: System Analysis and Design (SAD) Page no : 34
Inter national Advances Diploma in Computer Study (IADCS) System Analysis and Design (SAD)
Anti-virus is used to identify and remove computer viruses, as well as many other
types of harmful computer software, collectively referred to as malware. While the first
antivirus software was designed exclusively to combat computer viruses.
User authentication
One of the mechanisms that is used in computerized system is authentication. These
are mechanisms that allow the computer system to identify person, or system
attaching to the computer system, and to determine whatever or not are they allowed
doing so.
A simple example of an authentication mechanism is the use of a user name and
password. The systems examine the username, looks the password it expects for that
user and compares it with the password given.
In a general authentication mechanism consist of a series of one or more Challenges
from the system to the user, flowing by the response from the user to the system. In
the password example, the Challenge request the username and password the
response tells the system what they are. Other types of challenge might include the
use of …
Pin number
Finger print recognition
Smart card
Voice recognition
Handwriting (signature ) recognition
In some case these mechanism might be used in combination.
Candidate name: MD. Ibrahim Amin NCC candidate NO: Examination Cycle: March 2009
Assignment title: Art gallery Module name: System Analysis and Design (SAD) Page no : 35
Inter national Advances Diploma in Computer Study (IADCS) System Analysis and Design (SAD)
c)
Method to ensure that only the curator and assistant curator have write, edit and
delete permission:
I will be ensure only the management staff write, edit and delete by flowing
way ….
First go database and “click on” Tools ” then “click on” security and again “click on” User and
Group Permission. Figure:1
figure: 1
Than “click on” Groups and pick up Modify Design, Administer, then “click on” Apply and OK. In Figure: 2 Candidate name: MD. Ibrahim Amin NCC candidate NO: Examination Cycle: March 2009
Assignment title: Art gallery Module name: System Analysis and Design (SAD) Page no : 36
Inter national Advances Diploma in Computer Study (IADCS) System Analysis and Design (SAD)
Figure: 2
Staff (curator and assistant curator) is required to sign an art gallery system and
accept the Usage Policy.
For each will be an individual User-ID and password.
Patrons/ Brower are can access only display item and comment to this item.
Only staff can access ADD, Update. Search, Edit and delete function.
Database can access with a limited number of licenses needs to have regulated
access.
I will be provide filtered Internet access to staff
d)
Read only access method of web site to relevant information
In Web applications, it is very common for a page to simply display data — that is, for
the data on the page to be read-only. Typical examples include catalog listings, search
results, and so on. Users might act on the data by clicking a button to add an item to a
shopping cart or clicking a link on the page, but those actions do not directly affect the
data on the page.
Candidate name: MD. Ibrahim Amin NCC candidate NO: Examination Cycle: March 2009
Assignment title: Art gallery Module name: System Analysis and Design (SAD) Page no : 37
Inter national Advances Diploma in Computer Study (IADCS) System Analysis and Design (SAD)
It is possible to grant read-only repository access to people using the password-
authenticated server (The other access methods do not have explicit support for read-
only users because those methods all assume login access to the repository machine
anyway, and therefore the user can do whatever local file permissions allow her to do.)
A user who has read-only access can do only those CVS operations which do not
modify the repository, except for certain "administrative" files (such as lock files and
the history file). It may be desirable to use this feature in conjunction with user-
aliasing (*note Password authentication server ::.). However, note that read-only
access does not repeal the existing security considerations in *Note Password
authentication security.
There are two ways to specify read-only access for a user: by inclusion, and by
exclusion.
Inclusion" means listing that user specifically in the
`$CVSROOT/CVSROOT/readers' file, which is simply a new line-separated list of
users. Here is a sample `readers' file:
Melissa
Splotnik
Jrandom
(Don't forget the new line after the last user.)
"Exclusion" means explicitly listing everyone who has *write* access--if the file
$CVSROOT/CVSROOT/writers exists, then only those users listed in it have write
access, and everyone else has read-only access (of course, even the read-only users
still need to be listed in the CVS `password' file). The `writers' file has the same format
as the `readers' file.
Candidate name: MD. Ibrahim Amin NCC candidate NO: Examination Cycle: March 2009
Assignment title: Art gallery Module name: System Analysis and Design (SAD) Page no : 38