The Primary Elements And Processes Of Systems Information Technology Essay

With reading the scenario I find out the major entity for making the Use instance diagram. That means I besides try to make a new system for utilizing object oriented methods and.this diagram show the procedure of this making method of diagram. At first I am seeking to finish undertaking 01. Undertaking 01 three Torrid Zones include use instance diagram, usage instance specification and activity diagram. These diagram aid to analysis and plan for a new system. So the diagrams are really of import the existent life in this system.

Hire a custom writer who has experience.
It's time for you to submit amazing papers!


order now

A Use Case diagram is used to happen out the primary elements and procedures of a new system

Actor: Actor performs in this diagram are straight. Following the mark of histrions

Use instance: usage instance is a one sort of symbol. This symbol is use of

written process.. Chiefly I want to make a usage instance diagram to demo whole map and other activities in these new systems.

Following the chief elements of usage instance diagram

System boundary: Use Case diagram usage system boundary. System boundary done work usage instance written processes system.

Figure: Use Case Diagram of ticket engagement in individual

Figure: Use Case Diagram

Figure: Use Case Diagram of ticket engagement by over telephone

aˆ? Use instance specifications

A use-case specification provides detail information by textual system for a usage instance system. This subject helps to supply a sample lineation of a use-case specification.

Number

Name

Ticket engagement in individual

Status

working

Actors

Station maestro, client

Pre-requisites

none

Use instance relationship:

Extend:

Include:

Association: Station maestro, client

Generalization:

Description

Index

Actor event

1

Give demand

2

Select ticket

3

Suggest option

4

Procedure engagement

5

Payment procedure

6

Give ticket

Figure: Use instance specification of gross revenues ticket over telephone

Number

Name

Ticket gross revenues over telephone

Status

working

Actors

Clerical helper, client

Pre-requisites

none

Use instance relationship:

Extend:

Include:

Association: Clerical helper, client

Generalization:

Description

Index

Actor event

1

Give demand

2

Match demand

3

Choice option

4

Procedure engagement

5

Update question

Figure: Use instance specification of gross revenues ticket over telephone

Activity Diagram

We know activity diagram refers to stand for to workflow to step by measure action. Activity diagram used to specify the operation measure by measure and activity diagram in a portion of UML ( incorporate mold linguistic communication )

Activity diagram for gross revenues ticket in individual

Figure: Activity diagram 01

Activity diagram for railroad direction system

Figure: Activity diagram 01

Drumhead

In the undertaking I am complete some of diagram harmonizing to the assignment. In the undertaking I learned about three subjects and diagram. The diagrams are Use instance diagram, Use instance specification, Activity diagram. I think these diagrams are really indispensable as a pupil.

Task – 02

Introduction: In this undertaking, I want to make a category diagram with properties and operations. This undertaking helps me to happen the entity of this system and do a relationship with them.

Class diagram: The category diagram is the inactive construction diagram in the Unified Modeling Language. The chief component in structural mold is the category and category diagram. It represents the category and relationship between them. Class diagrams are largely used to specify and depict the types of objects in a system and their relationships.

Staff

-Staff ID

-Staff name

-staff type

Create staff ( )

Update staff ( )

Delete Staff ( )

Customer

-Customer ID

-customer name

-customer reference

-customer electronic mail

s

+choice ticket

Buy ticket

Select ticket monetary value

Director

Manager name

director ID

+ticket engagement ( )

+ update engagement ( )

S. maestro

S.master ID

-S.master Name

-S.master reference

+up day of the month engagement ( )

Clerical staff

-clerical staff ID

-customer ID

– perform Idaho

+ Match equipment ( )

+give ticket to client

Ticket

-Ticket ID

-customer ID

-perform ID

-booking cost

+ticket engagement ( )

+update engagement ( )

+select engagement ( )

Print

Ticked ID

-customer ID

+ticket engagement ( )

+update engagement ( )

+select engagement ( )

Properties and Operationss:

To pull the category diagram I find out some properties and operations. These are given in the below:

Customer:

Properties:

Customer ID

Customer Name

Customer electronic mail

Customer Address

Customer Contact no.

Operationss:

pick ticket

bargain ticket

travel clip select

ticket monetary value

Clerical helper

Properties:

Clerical helper name

Clerical helper ID

C.A reference

C. A contact

Operationss:

booking ticket

gross revenues ticket

posted ticket

print ticket

Staff:

Properties

Staff ID

Staff name

Staff type

Staff reference

Staff day of the month of birth

Operationss

Create staff

Update staff

Delete staff

degree of staff

Ticket

Properties:

Ticket figure

ticket type

ticket degree

ticket monetary value

ticket logo

Operationss:

permission engagement

confirm going

booking

Properties:

engagement clip

booking degree

booking sit figure

booking client item

booking cost

Operationss:

engagement clip

booking license

Booking over telephone

Operationss:

Booking ID

Booking day of the month

Properties:

Confirm

fiting information

Print ticket

Properties:

print ticket sum

print ticket figure

print ticket degree

print ticket cost

Operationss:

Customer ID

Customer Name

Customer Address

Customer electronic mail

Customer phone no

Booking over mail

Operationss:

booking ID

booking day of the month

Properties:

Confirm

Matching information

Station Maestro

Properties:

Station Master name

s. m. ID

s. m. reference

s. m. contact

s. m. exposure

Operationss:

trade haling train

sale ticket manus to manus

operate current station

Station Manager

Properties:

Station Master name

s. m. ID

s. m. reference

s. m. contact

s. m. exposure

Operationss:

trade haling train

sale ticket manus to manus

operate current station

Drumhead

To make this undertaking I learn some of import subjects, these are object oriented method and category diagram with properties and operation. These aid to student to understand for planing and developing a best package environment. This package must be user dependant.

Task – 03

Sequence diagram:

The chief elements of a sequence diagram are:

Actor and objects

Line of lifes and executing happenings

Messages

Sequence diagram for ticket gross revenues in individual

Figure: sequence diagram 01

Figure: sequence diagram 02

State machine diagram:

State machine diagram from the ticket engagement over in individual

Figure: province machine diagram 01

State machine diagram from the ticket engagement over the telephone

Figure: province machine diagram 02

Communication diagram:

There are three two-channel type categories object used in a communicating.

Boundary class=

Entity class=

Controls class=

Boundary category manage transportation of information across system boundary aid to part the system

Entity category represents the behaviours of things in the application sphere and shop information that is straight association with those things.

Control category controls the interaction between entity category and boundary category.

Figure: communicating diagram 01

Task – 04

Introduction

Harmonizing to the scenario, we have to research on the information protection issues that apply to the system and this undertaking chiefly helps the pupils to cognize about the information protection. But in our state there are no such Torahs or ordinance for informations protection that has been imposed till this day of the month.

Answer: Data protection Torahs, ordinances and best pattern in my state:

Data protection

When any organisations communicate to each other for the intent of concern or may other aim informations protection is really indispensable for this organisation. Data protection means protecting informations through backup, snapshots and transcript informations and informations protection besides may data security from a logical or physical point of view.

Physical and Logical Data protection limitations can be two types

Physical entree limitation

Logical entree limitation

Physical entree limitation: following the Physical entree limitation

Retina scan: Any company can be usage for security retina scan. Retina scan use Benefits-easily can be oculus scan and input this scan database when input this direction database so place scanning individual. Retina scan largely set up different door or other infinite. Because of this scan other individual can be entree this company subdivision. If we use this retina scan merely on employ or module enters this restricted site after so oculus scan.

Finger print: A finger print usage of company background cheque is by and large

perform by any other public bureaus making in the populace sector, although private concern are progressively trusting on fingerprint as a pre-employed status. Most public

Agencies, can be school territories and low enforcement bureaus, are mandated by province or federal low to execute a fingerprint cheque. Largely fingerprint taken from an person are compared to a national jurisprudence enforced fingerprint database.

Voice acknowledgment: voice acknowledgment one sort of machine or plan that is used to place different word or phrases in spoken linguistic communication so that is converted to a clear format and they can transport out spoken bid.

Logical entree limitation

Unauthorized entree to the systems:

If aggressors gain entree to a systems console, they can close down the system, take informations, install malicious package, or boot the system utilizing a different operating system to short-circuit all operating system security steps. Having physical entree to calculating system is a powerful active menace because this type of onslaught can short-circuit many of the logical security controls employed on the system, including screen-server watchword, user history and watchword, and file degree limitations. It is of import to set up security controls that offer the same protection as those used to forestall larceny or harm. These same countermeasures help to guarantee that merely authorised persons can touch company systems.

Users and watchwords:

Computer or an IT system are non different, utilizing the combination of user name and watchword, authorize users have the “ keys ” to come in systems as they please. Unauthorized persons do non hold usernames and watchwords and are stopped at the system boundary.

Password constabularies:

Most IT system accommodates constabularies that restrict the constellation of watchwords. We know the traditional hallmark mechanism consist of both a username and watchword. But a dictionary onslaught against this watchword would finish in a short sum of clip. Password should –

Be at least eight character long

Contain at least one small letter character

Contain at least one uppercase character

Contain at least one figure

Contain at least one symbol

Contain no portion of user name

Contain no words normally found in a dictionary

State how these would use to the computing machine system being developed

Answer: The using procedure of informations protection Torahs in the computing machine system.

If authorized user may accidentally cancel or alter some of import informations. There are two solutions to this job.

First, the user can be assigned proper rights to entree informations. Merely on the high degree or administrative licenses user may be authorized allowed modify the informations and delete informations.

Second, Data loss might be happen backup of informations for some continuance should be taken to retrieve the doomed or deleted informations.

Password, a strong watchword can be protected, that should be used to entree any resource.

We can utilize Latest antivirus package because degree Fahrenheit it can be strong and good protect and fire wall should be used to protect different onslaught.

We can utilize some strong encoding algorithms to utilize for keeping security.

Locked suites, which can be used for computing machines and all backup storage devices. It can entree merely authorized users.

We know Captcha entry is another of import issue that proves the human activity. It is a good policy for identify human activities.

Log file, it should besides be maintained. The log files record information about the any public presentation in the computing machine.

c. Recommend methods that should be utilized to guarantee that informations protection best pattern is implemented in the new system.

Encryption methods provide encrypted informations for unknown user. We know informations can be theft but stealer is non able to place and guarantee about the pure informations. So it is really of import for information protection. To code informations some method are used is called encoding method.

Encoding methods

In a simple term informations encoding refers to the procedure by which information is transformed in a format that is indecipherable. We know the encoding method refers to the four major services of protect informations ; confidentiality, unity, authorization and non-reputation. But method refers to as a key. The encoding converts field to code informations

Data encoding algorithms

The information encoding algorithm ( DES ) can be used to code informations and it is the parts of the SOAP message ; it includes the organic structure and one sort of signature. For each type of informations encoding algorithms, we know the informations encoding algorithms stipulate the algorithm unvarying resource identifier ( URI ) .

Key encoding algorithms

Key encoding algorithms are used to code and decode keys to acquire pure informations and information. This cardinal information is used to stipulate the constellation. It is needed to change over the key for digital signature and encoding. The encoding information and sign language information constellations can portion the cardinal information. The cardinal information is used for stipulating the information about the key on the consumer side that is used for formalizing the digital signature in the standard message or for decoding the encrypted parts of the message.

Drumhead

Data Protection tips provide the real-time monitoring and coverage of informations protection environment. To pass on informations protection is indispensable. In this undertaking I have gotten a good thought how to data protect. I think it is a good acquisition thing to me.

Task – 05

We know one forge ticket can be making but ticket prevent to get bying following as solutions have been provided below. They are:

Watermark-

A water line can be recognizable by image or form in paper that appears as assorted sunglassess of lightness/darkness when viewed by familial or reflected visible radiation caused by thickness fluctuations in the paper.

Hologram-

A hologram intermediate exposure ( or photographic record ) that contains information for reproducing a 3-dimensional image by holography

Issue day of the month with seal-

Ticket gross revenues issue day of the month. One twenty-four hours how many ticket gross revenues and ticket stock available or non, can be define issue day of the month with sale

Particular paper-

Particular paper used for different of import intent. Example – money

Particular Ink-

Particular can be used different intent. Ink use many pressman and other intent

Following the place program harmonizing to the multiple tickets booked by the clients.

Figure 8.6: place program

In the phase client can purchase merely ruddy colour place. And out of ruddy sit space. This is empty sit, no 1 can non booking this sit. Same as like in VIP country

Require hardware and print media for the new system with monetary value are given hollas:

Processor ( Intel 2 couple 2.53 E7200 ) — — — — — — — — – 120 $

Motherboard ( gigabyte GA-G31M ) — — — — — — — — — 100 $

HDD ( Samsung 500GB 7200RPM ) — — — — — — — — -100 $

RAM ( 2GB DDR2 800 BUS ) — — — — — — — — — — — — – 70 $

Monitor ( Dell 17 ” LCD ) — — — — — — — — — — — — — — — 200 $

DVD Writer — — — — — — — — — — — — — — — — — — — — — — 18 $

ATX Casing — — — — — — — — — — — — — — — — — — — — — -20 $

Keyboard — — — — — — — — — — — — — — — — — — — — — — — 5 $

Mouse — — — — — — — — — — — — — — — — — — — — — — — — — -5 $

UPS — — — — — — — — — — — — — — — — — — — — — — — — — – 100 $

Printer ( Epson TM-C3400 Series ) — — — — — — — -1200 $

Software and other — — — — — — — — — — — — — — — — 500 $

The annual cost for printing is all approximately — — — — — — — — — 2000 $

Task – 06

A:

Introduction:

Bill

Invoice No: Date:

Customer No:

Customer name:

Customer attention deficit disorder:

Consecutive No

Ticket No

Monetary value

Measure

Value

01.

02.

03.

101

102

103

S:9.50

DR:15.50

Strontium: 17.60

1

1

1

9.50

15.50

17.60

Entire

41.10

Gathering informations: engagement ID, staff type, staff Id, staff Name, public presentation Id, Performance name, booking type, client Id, client name, client reference, day of the month Performance day of the month, and public presentation ticket monetary value, entire.

Choosing a key: Invoice no

Converting to 1 NF: ( Remove )

Bill

Invoice no ( PK )

Cust. No

Cust.name

Cust informations attention deficit disorder

Invoice-Product

Invoice. No ( pk )

Merchandise no ( pk )

P. name

Monetary value

Measure

Value

Converting to 2NF: ( take partial key )

Invoice Invoice merchandise Merchandise

Invoice no merchandise no ( pk )

p.no p.name

Quantity monetary value

Value

change overing to 3NF: ( Remove none cardinal dep )

Invoice Customer Invo. Praseodymium

Invoice no ( PK ) Cust. No

Date cust. name

Entire cust. Add

Optimization

Bill

Invoice-Product

Cost

Merchandise

Bacillus:

Data lexicon

Railway direction

Title

System

Ticket booking system in individual

Document

Name

sheet

Type: Structure

Name: clerical helpers

Aliass:

Definition:

Customer ID

Customer Name

Customer Address

Customer phone

Happening:

Picture

Notes

Writer:

Aminul Islam

Date:

04.02.2011

Data lexicon

Railway direction

Title

System

Ticket engagement system over telephone

Document

Name

sheet

Type: Structure

Name: clerical helpers

Aliass:

Definition:

Customer ID

Customer Name

Customer Address

Customer phone

Happening:

Picture

Notes

Writer:

Md. Yusof hossain

Date:

08.02.2011

Data lexicon

Railway direction in IT System

Title

System

Ticket engagement system over telephone

Document

Name

sheet

Type: Structure

Name: clerical helpers

Aliass:

Definition:

Customer ID+

Customer Name+

Customer Address+

Customer phone+

Happening:

Picture

Notes

Writer:

Md. Yusof hossain

Date:

08.02.2011

Task- 07

Introduction:

In the undertaking I have to advert a it system utilizing whole object-oriented and structured attacks. Object-oriented attack is an Approach to forming spacial informations as distinct objects in a individual map infinite.

Following the advantages and disadvantages of both the object-oriented and structured attacks are given in the below:

Object-Oriented Approach

Advantages:

When the expert system is long, it reduces the size of expert system.

Reduce the complexness for the system.

Make good defined size constituents, such as objects.

Easier to germinate for system development,

More flexible for system development,

More robust for system development and

More reclaimable

Disadvantages:

The Unavailability of object-oriented database direction systems.

Object-oriented CASE tools are non available.

Confusion for many different object-oriented development methods.

Decreased the procedure of system or package public presentation.

Structured attacks:

Advantages:

Reduce the complex metropolis for procedure in the system.

Structured attacks are more standard.

It focuses logical system.

Structured attacks are dependable.

Structured attacks provide future orientation.

Disadvantages:

Some clip it is non faster.

It slows the procedure in the system.

Task-08

Introduction:

In this undertaking are eight. There are eight undertakings in the assignment. In this undertaking I have to finish a comprehensive and professional study. The study will incorporate the description of my system design for the theatre. In this undertaking I besides include the inside informations information about undertaking one to seven. In this undertaking I will seek to better my accomplishment and better besides the assignment.

Title

Report no- System Analysis and Design

Recipient- Sonia samad and Nowshin Rashid

Author- Yusof Hossain

Use instance diagram:

Use instance diagram include undertaking 01. This undertaking I am seek to cognizing to detail usage instance diagram. And so I am complete the usage instance diagram

Use instance specification:

I used usage instance specification in the undertaking 1. I designed usage instance specification for some activity, usage instance specification create by usage instance diagram.

Activity Diagram:

Activity diagram include undertaking 01 option c. This undertaking I am seeking to cognizing to detail activity diagram diagram. And so I am complete the usage instance diagram

Class diagram:

In the undertaking 2 I designed category diagram. I am seeking to follow the functions of the undertaking absolutely. In the usage instance diagram I find out some properties and operation.

Sequence diagram:

To make this assignment I draw sequence diagram in the undertaking 3. I designed the sequence diagram for the undermentioned system and procedure

State machines:

To make this assignment I draw province machines diagram in the undertaking 3. I am seeking to plan the province machines diagram

Communication diagram:

To make this assignment I draw communicating diagram in the undertaking 3. I am seeking to plan the communicating diagram

When any organisations communicate to each other for the intent of concern or may other aim informations protection is really indispensable for this organisation. Data protection means protecting informations through backup, snapshots and transcript informations and informations protection besides may data security from a logical or physical point of view in the undertaking 4.

In the undertaking 5 I described about the procedure of bring forthing ticket for public presentation of a new IT system. I besides mentioned about the techniques of bring forthing a perfect ticket.

In the undertaking 6 I mentioned about the standardization and informations lexicon. The standardization and informations lexicons were the chief parts of the undertaking

In the undertaking 7 I mentioned about the object oriented attacks and structured attacks. These are both of import to package design and analysis.

Appendix:

Figure: Use Case Diagram of ticket engagement in individual

Figure: usage instance diagram 01

Figure: Use Case Diagram 02

Number

Name

Ticket engagement in individual

Status

working

Actors

Station maestro, client

Pre-requisites

none

Use instance relationship:

Extend:

Include:

Association: Station maestro, client

Generalization:

Description

Index

Actor event

1

Give demand

2

Select ticket

3

Suggest option

4

Procedure engagement

5

Payment procedure

6

Give ticket

Number

Name

Ticket gross revenues over telephone

Status

working

Actors

Clerical helper, client

Pre-requisites

none

Use instance relationship:

Extend:

Include:

Association: Clerical helper, client

Generalization:

Description

Index

Actor event

1

Give demand

2

Match demand

3

Choice option

4

Procedure engagement

5

Update question

Figure: Activity diagram 01

Figure: Activity diagram 01

Staff

-Staff ID

-Staff name

-staff type

Create staff ( )

Update staff ( )

Delete Staff ( )

Customer

-Customer ID

-customer name

-customer reference

-customer electronic mail

s

+choice ticket

Buy ticket

Select ticket monetary value

Director

Manager name

director ID

+ticket engagement ( )

+ update engagement ( )

S. maestro

S.master ID

-S.master Name

-S.master reference

+up day of the month engagement ( )

Clerical staff

-clerical staff ID

-customer ID

– perform Idaho

+ Match equipment ( )

+give ticket to client

Ticket

-Ticket ID

-customer ID

-perform ID

-booking cost

+ticket engagement ( )

+update engagement ( )

+select engagement ( )

Print

Ticked ID

-customer ID

+ticket engagement ( )

+update engagement ( )

+select engagement ( )

Figure: sequence diagram 01

Figure: sequence diagram 02

Bill

Invoice-Product

Cost

Merchandise