Inter national Advances Diploma in Computer Study (IADCS) System Analysis and Design (SAD) Introduction In this assignment will allow my demonstrate an understanding of the object-oriented analysis and design of a cataloguing system. I have analysis and design a system for an Art Gallery including the creation of a prototype user interface and the transfer of information held on standard paper into the system. Candidate name: MD. Ibrahim Amin NCC candidate NO: Examination Cycle: March 2009 Assignment title: Art gallery Module name: System Analysis and Design (SAD) Page no : 1
49
Embed
system analysis and design(SAD)march2009@NccEducation
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Inter national Advances Diploma in Computer Study (IADCS) System Analysis and Design (SAD)
Introduction
In this assignment will allow my demonstrate an understanding of the object-
oriented analysis and design of a cataloguing system. I have analysis and
design a system for an Art Gallery including the creation of a prototype user
interface and the transfer of information held on standard paper into the
system.
Candidate name: MD. Ibrahim Amin NCC candidate NO: Examination Cycle: March 2009
Assignment title: Art gallery Module name: System Analysis and Design (SAD) Page no : 1
Inter national Advances Diploma in Computer Study (IADCS) System Analysis and Design (SAD)
Task 1Analysis the required system using object-oriented method and produce a function
Model including..
● Use case diagrams
● Use case specifications
● Activity diagrams
Candidate name: MD. Ibrahim Amin NCC candidate NO: Examination Cycle: March 2009
Assignment title: Art gallery Module name: System Analysis and Design (SAD) Page no : 2
Inter national Advances Diploma in Computer Study (IADCS) System Analysis and Design (SAD)
Figure: Use case diagram for loan exhibit
Candidate name: MD. Ibrahim Amin NCC candidate NO: Examination Cycle: March 2009
Assignment title: Art gallery Module name: System Analysis and Design (SAD) Page no :
Order exhibit
Provide exhibit
Manage catalogue
Update record Staff
Other gallery
Privet collector
Curator Assistant Curator
Use case diagram for loan exhibit
<<Extend>>
3
Inter national Advances Diploma in Computer Study (IADCS) System Analysis and Design (SAD)
Figure: Use case diagram for return exhibit
Candidate name: MD. Ibrahim Amin NCC candidate NO: Examination Cycle: March 2009
Assignment title: Art gallery Module name: System Analysis and Design (SAD) Page no :
Return Exhibit
Payment
Update Record
Staff
Other gallery
Privet collector
Curator Assistant Curator
Check exhibit Record
Manage record
<<Extend>>
Fees
Due
Use case diagram for return exhibit
4
Inter national Advances Diploma in Computer Study (IADCS) System Analysis and Design (SAD)
Use case speciation for loan exhibit:
Display item for public viewing to art gallery management staff are responsibilities for order
item as a loan for certain time to author gallery or privet collector E.g. curator and assistant
curator.
The author gallery and privet curator give loan item for certain time,
Management staff also keeps record and these items are held in the art gallery to exhibit in
exhibition room.
After processing of that management staff will update the records by extend manage record.
Use case speciation for return exhibit:
Display item for public viewing to art gallery management staff are responsibilities for Collect
item as a loan for certain time to author gallery or privet collector E.g. curator and assistant
curator.
After collect items, will be keeping record and these items are held in the art gallery to exhibit in
exhibition room. After complete exhibition it is responsibility of management staff to return item
to the owner. e.g. Other gallery and privet collector. In the time of return staff also requires
making payment to the owner. If the item is not return on time there will be include Due.
After processing of that management staff will update the records by extend manage record.
Candidate name: MD. Ibrahim Amin NCC candidate NO: Examination Cycle: March 2009
Assignment title: Art gallery Module name: System Analysis and Design (SAD) Page no : 5
Inter national Advances Diploma in Computer Study (IADCS) System Analysis and Design (SAD)
Figure: Activity diagram for loan exhibit
Candidate name: MD. Ibrahim Amin NCC candidate NO: Examination Cycle: March 2009
Assignment title: Art gallery Module name: System Analysis and Design (SAD) Page no :
Yes
Request for exhibit loan
Other gallery Privet collector
Add record
Received exhibit
Show exhibit
Activity diagram for loan exhibit
No
6
Inter national Advances Diploma in Computer Study (IADCS) System Analysis and Design (SAD)
Candidate name: MD. Ibrahim Amin NCC candidate NO: Examination Cycle: March 2009
Assignment title: Art gallery Module name: System Analysis and Design (SAD) Page no :
Yes
Return exhibit
Other gallery Privet collector
Add record
Received exhibit
Check Due
Activity diagram for return exhibit
No
Pay fees
Pay Due
7
Inter national Advances Diploma in Computer Study (IADCS) System Analysis and Design (SAD)
Figure: Activity diagram for return exhibit
Task 2
Analysis the required system using object –oriented method and produce a standard
model including.
● Class diagram
● Attribute operation
Candidate name: MD. Ibrahim Amin NCC candidate NO: Examination Cycle: March 2009
Assignment title: Art gallery Module name: System Analysis and Design (SAD) Page no : 8
Inter national Advances Diploma in Computer Study (IADCS) System Analysis and Design (SAD)
Candidate name: MD. Ibrahim Amin NCC candidate NO: Examination Cycle: March 2009
Assignment title: Art gallery Module name: System Analysis and Design (SAD) Page no : 9
Inter national Advances Diploma in Computer Study (IADCS) System Analysis and Design (SAD)
Candidate name: MD. Ibrahim Amin NCC candidate NO: Examination Cycle: March 2009
Assignment title: Art gallery Module name: System Analysis and Design (SAD) Page no :
Inter national Advances Diploma in Computer Study (IADCS) System Analysis and Design (SAD)
Data dictionary for Loan Item
Candidate name: MD. Ibrahim Amin NCC candidate NO: Examination Cycle: March 2009
Assignment title: Art gallery Module name: System Analysis and Design (SAD) Page no :
Data Diction
ary
Title
Exhibition
System
Local art gallery
Sheet 4
Type: item Name: loan
Local art
gallery system
Definition:
Loan item = Item type+ Loan id +date of issue + date of return
Occurrence: One or, two time per month
Operation: Get loan. Add loan record. Update loan, Due
Author: Md: Ibrahim
Date: 05/02/2009
Length:
120 kbps
31
Inter national Advances Diploma in Computer Study (IADCS) System Analysis and Design (SAD)
Task 7Research the security issue relating to the gallery computer system write a
brief report:
a) Explain the possible treats to security.
b) Describe the possible consequences of a branch of security.
c) States the method you would use to ensure that only the curator and
assistant curators have write, edit and delete permission.
d) Explain how you would allow the website to have read-only access to
the relevant information.
Candidate name: MD. Ibrahim Amin NCC candidate NO: Examination Cycle: March 2009
Assignment title: Art gallery Module name: System Analysis and Design (SAD) Page no : 32
Inter national Advances Diploma in Computer Study (IADCS) System Analysis and Design (SAD)
a)
Possible treats to security in an Art Gallery:
Physical attacks
Along with the many ways that a network can be attested by electronic means. There
are many ways that it can be attested physically. This can be as a result of malicious
activity, or a consequence of natural events, or by accident. In general, physical
attacks tend to result in denial of service. This kind of attest including…
Fire, either accidentally started or deliberately.
Lighting strikes
Flood
Earthquake damage
Theft of equipment
Damage to Hardware
Damage software
Virus attacks
A virus is a malicious program that can be attacked to an executable program, or can
be in other executable forms, such as macros scripts. The program can carry a
payload that causes damage to the host computer system that has been infected.
Unauthorized access
Candidate name: MD. Ibrahim Amin NCC candidate NO: Examination Cycle: March 2009
Assignment title: Art gallery Module name: System Analysis and Design (SAD) Page no : 33
Inter national Advances Diploma in Computer Study (IADCS) System Analysis and Design (SAD)
Unauthorized access System attempt to access computing facilities for which they
have not been authorized. Cracking a computer's defenses is seen as the ultimate
victimless crime. The perception is that nobody is hurt or even endangered by a little
stolen machine time. Crackers enjoy the simple challenge of trying to log in, just to see
whether it can be done. Most crackers can do their harm without confronting anybody,
not even making a sound. In the absence of explicit warnings not to trespass in a
system, crackers infer that access is permitted. An underground network of hackers
helps pass along secrets of success; as with a jigsaw puzzle, a few isolated pieces
joined together may produce a large effect. Others attack for curiosity, personal gain,
or self-satisfaction. And still others enjoy causing chaos, loss, or harm. There is no
common profile or motivation for these attackers.
A person not authorized to use information in the computer can get access to
information and use the information.
b) Possible consequences of a branch of security
Building Maintenance
A regime of planned and documented building maintenance will go a long way towards
minimizing the risk of floods, fire, theft, vandalism and invasion by pests. Routines
should include regular temperature and humidity checks in areas designated as
vulnerable to damp.
Equipment Maintenance
Equipment maintenance is essential both to ensure that equipment failure does not
cause a treats and to assure the reliability of equipment in a disaster situation. Ensure
that equipment stored to deal with a disaster is included in maintenance routines
Anti-virus software Candidate name: MD. Ibrahim Amin NCC candidate NO: Examination Cycle: March 2009
Assignment title: Art gallery Module name: System Analysis and Design (SAD) Page no : 34
Inter national Advances Diploma in Computer Study (IADCS) System Analysis and Design (SAD)
Anti-virus is used to identify and remove computer viruses, as well as many other
types of harmful computer software, collectively referred to as malware. While the first
antivirus software was designed exclusively to combat computer viruses.
User authentication
One of the mechanisms that is used in computerized system is authentication. These
are mechanisms that allow the computer system to identify person, or system
attaching to the computer system, and to determine whatever or not are they allowed
doing so.
A simple example of an authentication mechanism is the use of a user name and
password. The systems examine the username, looks the password it expects for that
user and compares it with the password given.
In a general authentication mechanism consist of a series of one or more Challenges
from the system to the user, flowing by the response from the user to the system. In
the password example, the Challenge request the username and password the
response tells the system what they are. Other types of challenge might include the
use of …
Pin number
Finger print recognition
Smart card
Voice recognition
Handwriting (signature ) recognition
In some case these mechanism might be used in combination.
Candidate name: MD. Ibrahim Amin NCC candidate NO: Examination Cycle: March 2009
Assignment title: Art gallery Module name: System Analysis and Design (SAD) Page no : 35
Inter national Advances Diploma in Computer Study (IADCS) System Analysis and Design (SAD)
c)
Method to ensure that only the curator and assistant curator have write, edit and
delete permission:
I will be ensure only the management staff write, edit and delete by flowing
way ….
First go database and “click on” Tools ” then “click on” security and again “click on” User and
Group Permission. Figure:1
figure: 1
Than “click on” Groups and pick up Modify Design, Administer, then “click on” Apply and OK. In Figure: 2 Candidate name: MD. Ibrahim Amin NCC candidate NO: Examination Cycle: March 2009
Assignment title: Art gallery Module name: System Analysis and Design (SAD) Page no : 36
Inter national Advances Diploma in Computer Study (IADCS) System Analysis and Design (SAD)
Figure: 2
Staff (curator and assistant curator) is required to sign an art gallery system and
accept the Usage Policy.
For each will be an individual User-ID and password.
Patrons/ Brower are can access only display item and comment to this item.
Only staff can access ADD, Update. Search, Edit and delete function.
Database can access with a limited number of licenses needs to have regulated
access.
I will be provide filtered Internet access to staff
d)
Read only access method of web site to relevant information
In Web applications, it is very common for a page to simply display data — that is, for
the data on the page to be read-only. Typical examples include catalog listings, search
results, and so on. Users might act on the data by clicking a button to add an item to a
shopping cart or clicking a link on the page, but those actions do not directly affect the
data on the page.
Candidate name: MD. Ibrahim Amin NCC candidate NO: Examination Cycle: March 2009
Assignment title: Art gallery Module name: System Analysis and Design (SAD) Page no : 37
Inter national Advances Diploma in Computer Study (IADCS) System Analysis and Design (SAD)
It is possible to grant read-only repository access to people using the password-
authenticated server (The other access methods do not have explicit support for read-
only users because those methods all assume login access to the repository machine
anyway, and therefore the user can do whatever local file permissions allow her to do.)
A user who has read-only access can do only those CVS operations which do not
modify the repository, except for certain "administrative" files (such as lock files and
the history file). It may be desirable to use this feature in conjunction with user-
aliasing (*note Password authentication server ::.). However, note that read-only
access does not repeal the existing security considerations in *Note Password
authentication security.
There are two ways to specify read-only access for a user: by inclusion, and by
exclusion.
Inclusion" means listing that user specifically in the
`$CVSROOT/CVSROOT/readers' file, which is simply a new line-separated list of
users. Here is a sample `readers' file:
Melissa
Splotnik
Jrandom
(Don't forget the new line after the last user.)
"Exclusion" means explicitly listing everyone who has *write* access--if the file
$CVSROOT/CVSROOT/writers exists, then only those users listed in it have write
access, and everyone else has read-only access (of course, even the read-only users
still need to be listed in the CVS `password' file). The `writers' file has the same format
as the `readers' file.
Candidate name: MD. Ibrahim Amin NCC candidate NO: Examination Cycle: March 2009
Assignment title: Art gallery Module name: System Analysis and Design (SAD) Page no : 38