Professional Documents
Culture Documents
LITERATURE REVIEW
2.1.1.2. Students tend to use software that mitigates their problem with
the advent of innovation and the rise of Internet users. Before
that, they had to go to the office to discuss the issues and find a
free time table for disputes on the board. Now you can use the
software to do all this. The system includes software for
Android. Program designed to solve the problems faced by
hamdard students in each semester.
2.1.1.3. 2.1. Project Analysis
2.1.1.4. When we evaluated this company, we created critical data that
helped us build a system technologically, if not better than at
least the standard with which we can compete in the market.
2.1.1.5. 2.1.1. Purpose of the project
2.1.1.6. The main objective of this project is to establish an effective
and efficient "Clash Free Time Table" for the Islamabad
Campus of Hamdard University. This system is designed to
eliminate the shortcomings of the current system and provide a
permanent solution to existing problems. By automating the
process, we are not only able to perform efficient and reliable
work, but we can also maintain a backup so that there is no
data loss.
2.1.1.7. 2.1.2. Existing Systems
2.1.1.8. The current manual system method for creating a time table
and removing conflicts from the course, time, and local set.
2.1.1.9. 1. It needs extra effort.
2.1.1.10. 2. More time to find a suitable solution to the time
management problem.
2.1.1.11. 3. You needed a lot of paper work.
2.1.1.12. 4. It's not easy to use.
2.1.1.13.
1. Evaluation of the first prototype against its strengths, weaknesses and risks.
2. Defining the second requirements of the prototype.
3. The second prototype is designed and designed.
4. Build and test the second prototype.
The entire project can be terminated in the dependent option if the risk is considered too good.
Risk factors may include excessive development costs, misconceptions of operating costs, or any
other factor that may result in a decision made by an employee as a less than satisfactory end
product.
The existing prototype is evaluated in the same way as the previous prototype and, if necessary,
according to the quadruple process described above, another prototype is developed from it.
The previous steps will be passed until the employee is satisfied that the sophisticated prototype
is the final product. The final system is carefully evaluated and tested. To avoid massive failures
and reduce downtime, maintenance continues.
The following diagram shows how a spiral model acts like:
Figure 2.1: Spiral Model System
2.1.2. 2.1.2. System Study
2.1.3. In terms of flexibility of use, a graphical concept was developed with a graphic
concept in mind for the interface. GUIated at the top level are classified as follows:
2.1.4. - Administrative user interface
2.1.5. - Operational or common user interface
2.1.6. The administrative user interface focuses on consistent information that is
practical, part of organizational tasks, and requires appropriate data collection
authentication. The interface enables full data search capabilities, as well as
managing with all transactional states, such as data entry, data deletion, and data
updates. essential data and services, the operational or common user interface
assists system users in transactions. The operational user interface also helps
common users manage their information and helps common users manage their
information based on personalized flexibility.
2.1.7. Number of modules
2.1.8. After careful analysis, it is identified that the system has the following modules:
2.1.9. 1. The modules included are: Administration
2.1.10. 2. Users
2.1.11. 3. Personal information
2.1.12. 4. Lesson Time
2.1.13.
2.1.14. 2.1.2.1. Administration
2.1.15. To monitor the entire system, the administrator has authentication. He's got all the
privileges he can have. The administrator can register the user directly and delete
information about the registered user.
2.1.16. Users 2.1.2.2.
2.1.17. The TTMS administrator has the only one who defines the role he played in
creating the user for the administrator. The user has limited access to the system
provided only by the tTMS administrator
2.1.18. 2.1.2.3. Personal information
2.1.19. The TTMS administrator will have the personal record of all students and faculty
members who are currently studying and teaching at hamdard University's
Islamabad Campus.
2.1.20. 2.1.2.4. Class class of lesson time
2.1.21. The user class is associated with the class planning class. It consists of course-related
attributes, such as the room number. It has features that give the user the ability to
find a program for classrooms.
2.1.22. 2.2. System Requirements Specifications
2.1.23. 2.2.1. Hardware and software requirements:
2.1.24. Processor: 1GHz
2.1.25. RAM: 4GB
2.1.26. - Hard disk: 40 GB
2.1.27. - Peripheral devices
2.1.28. Software requirements:
2.1.29. Operating system: Windows XP
2.1.30. Developer Tool: Dreamweaver, Visual Studio
2.1.31. - Back end: SQL Server 2015
2.1.32.
2.1.33. 2.2.2. Required Computerization
2.1.34. We all know the importance of computerization. The world moves at the speed of
light and there is little time for everyone to run. A person always wants to get
information, and he/she performs a task (within a short period of time) with an
amount of efficiency and accuracy as well. The areas of application of
computerization were selected based on the following factors:
2.1.35.
2.1.36. - Minimize manual records stored in different locations. There will be more data
integrity.
2.1.37. Installing the display of the desired information very quickly by getting information
from users. Provide different statistical information to make decisions?
2.1.38. Reduce manual effort in repetitive work.
2.1.39. Updating and deleting large amounts of data will be easy. Functional features of the
model
2.1.40. As for the development of the project, the functionality is simple, the proposal aims
to save and keep individual employees.
2.1.41. 2.2.3. Inand and Exit
2.1.42. The main inputs and outputs and the functions of the system are as follows:
2.1.43. Contribution:
2.1.44. The administrator enters the user's email address and password to sign in. The user
will enter the login email ID and password. To track user information, the
administrator enters the user's email address or role.
2.1.45. exit:
2.1.46. The administrator can have their own home page. Users enter their home page. You
can store user-defined tasks in a centralized database. The administrator will
receive the sign-in information for a specific user.Process Model Used With
Justification
Contact control for data that uses a requirement
The following commands specify access control identifiers and are typically used for user
authentication and authorization (in parentheses, command codes are displayed).
USERNAME (USER)
The user's identity is what the server needs to access the file system. Typically, this
command will be the user's first command after a control connection has been established
(some servers may be required).
PASSWORD (PASS)
This command must immediately precede the username command and complete the user
identity for access control for certain sites. Because the password information is very
sensitive, it is usually appropriate to "mask" or delete the type.