You are on page 1of 18

CLO2:P2 /60

TOTAL
%
MARK
DEPARTMENT OF INFORMATION & COMMUNICATION TECHNOLOGY
PROJECT 2 | SESSION DEC 2020

Code & Course DFC40163 SYSTEM ANALYSIS AND Class


DESIGN
Lecturer Duration 3 Weeks
Chapter 4 (System Design) & 5 (System Implementation and Support)
CLO 2 Prepare the appropriate key deliverable’s of each phase in System
Development Life Cycle (SDLC) activities. (P2, PLO3)

No. NAME REGISTRATION NO


10DDT19F2056
1. Bhrunthashini karthikesen
Navintheren Sangkar
2. 10DDT19F2054
10DDT19F2044
3. Niveshaa Mohene Sundaram
4. Tevatarusi Rajandran 10DDT19F2035
5. Ko Shui Xian 10DDT19F2034

INSTRUCTION:
1. Starts with any system/project name and state a description about the system at the
beginning of your answer section. You are encouraged to use the same system proposed in
Project 1.
2. Prepare a report contains all the information need for your proposed system/project by
referring the question given. All scope of answers provided must be BASED ON THE
PROPOSED SYSTEM only.
3. Scoring for all sections is according to the included rubric.
4. Complete your report by stating the reference sources that have been used.
5. Each group will consist of 4-5 students only.
6. Project presentation will be carried out after the date of submission of the report according
to the decision of the lecturer of the respective class.

Submission Procedure:
Report of this project can be submitted in a group. Submit the softcopy of the PROJECT REPORT
through LMS CIDOS. The project report must be submitted according to the set time period.

Warning for PLAGIARISM!


COPYCAT & PLAGIARISM ARE STRICTLY PROHIBITED. Answers found copied from
the internet or other parties without modifying as required will not be given marks. Marks will
be deducted for any plagiarism.

1
QUESTION:
Part 1 - System Design [32 marks]
1.Strict input controls are important during the conversion process to protect data integrity and
quality. EXPLAIN four (4) input controls design that can be applied to your proposed system. [8
marks]
2.Input mask is a template or pattern that restricts data entry and prevents errors. Standard input
masks for fields such as dates, telephone numbers, postal codes, and Social Security numbers. Create
four (4) custom input masks for the proposed system. State the field and input mask with a specific
format. EXPLAIN the input mask and the format applied. [8 marks]
3.A data validation rule improves input quality by testing the data and rejecting any entry that fails to
meet specified conditions. The design can include at least eight types of data validation rules.
Implement four (4) validation rules into your system. State the field from any form in the proposed
system and EXPLAIN how the validation rules implement for the field. [8 marks]
4.Choose one (1) type of reports and prepare the report based on your system. EXPLAIN four (4) the
design report principles applied. [8 marks]

Part 2 - System Implementation and Support [20 marks]

1. Explain how you implement software testing for your system. [4 marks]
2. Explain your system installation and evaluation. [4 marks]
3. Explain types of maintenance that will perform if any problem occurs. Give ONE (1)
possible example of situation for each type for your system.
[8 marks]
4. Explain the system security and backup that you suggest for the system.
[4 marks]
Other requirements [8 marks]

1.Description of the proposed system. [4 marks]


2.Clarity and neatness of report. [4 marks]

2
INFORMATION AND COMMUNICATION TECHNOLOGY DEPARTMENT
PROJECT 2 RUBRIC | DECEMBER 2020

COURSE CODE DFC40163 COURSE NAME SYSTEM ANALYSIS AND DESIGN

ASSESSMENT TASK PROJECT 2 LECTURER’S NAME

STUDENT’S NAME 1 REGISTRATION 1


NUMBER
2 2

3 3

4 4

SCORE STUDENTS’ SCORE


4 3 2 1 0
ITEM 1 2 3 4

TASK 1
No answer
1 - input controls design Explain four (4) input Explain only three (3) Explain only two (2) Explain only one (1)
controls design that can input controls design input controls design input controls design
be applied that can be applied that can be applied that can be applied

Excellent explanation Good explanation and Moderate explanation Fairly explanation and No explanation
and justification justification and justification justification

2 - input masks Create four (4) custom Create only three (3) Create only two (2) Create only one (1) No answer
input masks custom input masks custom input masks custom input masks

Excellent explanation Good explanation and Moderate explanation Fairly explanation and No explanation
and justification justification and justification justification

3
SCORE STUDENTS’ SCORE
4 3 2 1 0
ITEM 1 2 3 4

3 - validation rules Implement four (4) Implement only three (3) Implement only two (2) Implement only one (1) No answer
validation rules validation rules. validation rules validation rule

Excellent explanation Good explanation and Moderate explanation Fairly explanation and No explanation
and justification justification. and justification justification

4 - report principles Report design Report design No design given


completely prepared incompletely prepared

Explain four (4) design Explain only three (3) Explain only two (2) Explain only one (1) No explanation
report principles applied design report principles design report principles design report principles
applied applied applied

Good explanation and Moderate explanation No explanation


justification and justification

Total mark for TASK 1 [ /32m]

TASK 2

1 - implementation of Excellent explanation Good explanation and Moderate explanation Fairly explanation and No explanation
software testing and justification justification and justification justification

2 - system installation Excellent explanation Good explanation and Moderate explanation Fairly explanation and No explanation
and evaluation and justification justification and justification justification

3 - types of maintenance Explain four (4) types Explain only three (3) Explain only two (2) Explain only one (1) No explanation
of maintenance types of maintenance types of maintenance type of maintenance

Give an example for Give an example for Give an example for Give an example for No example given
each type of only three (3) types of only two (2) types of only one (1) type of
maintenance maintenance maintenance maintenance

4
SCORE STUDENTS’ SCORE
4 3 2 1 0
ITEM 1 2 3 4

4 - system security and Excellent explanation Good explanation and Moderate explanation Fairly explanation and No explanation
backup and justification justification and justification justification

Total mark for TASK 2 [ /20m]

OTHER REQUIREMENT

Description of the The description of the The main idea is clear The main idea is The main idea is not No explanation
proposed system proposed system is clear, but the supporting somewhat clear but there clear. There is too
well-focused topic; the information is general. is a need for more general and seemingly
main idea stands out and supporting information. random collection of
is supported by detailed information.
information.

Clarity and neatness of Report is easy to read Report is easy to read Only a part of the The content in the report -
report. and all elements are so and almost all elements content in the report is is unclear and not neatly
clearly written, labelled, are so clearly written, clearly written, labelled, arranged.
or arranged properly. labelled, or arranged or properly arranged.
properly.

Total mark for Other Requirement [ /8m]

Grand total mark [ /60m]

5
ANSWER:
Part 1 - System Design [32 marks]

QUESTION 1.
 Checkboxes : A Checkbox is a small square box that a user can check (with a little tick) or
uncheck. It allows the user to select one or multiple options from a set. It is usually best to
present check boxes in a vertical list. Moreover, if the list is long then check boxes are also
presented in more than one column. For example- Suppose you are looking to book a hotel for
vacation. You visit booking.com and enter your travel destination.

 Dropdown list A drop-down list appears as a button which, when clicked, reveals a list that
allows the user to select from a list of options. Because they are compact, they allow you to
save lot of space on the screen. For example- Suppose you visited amazon.com to check out
groceries. When you hover cursor on one of the items on the main menu, a list would appear
for you to choose from, that list is called the drop down list.

 Text fields : Text fields allow users to enter text information to be used by the program, and
allows either a single line or multiple lines of text. Sometimes a text entry field is pre filled with
text, and can include additional buttons or icons. Consider entering your house address in a text
field while looking for delivery of your favorite food from a Food site.

6
 List boxes : List boxes are very similar to check boxes, however more compact and can support
a long list of options if needed. They also allow users to select multiple items at a time too.

 Buttons: A button tells users that they can perform a particular action upon touch. Button is
typically displayed as shapes with a label using text, an icon, or both.

QUESTION 2

7
Input Mask Wizard
STEP 1: In Design View, click the field you want to create an input mask for.

STEP 2: Click the Input Mask box.

STEP 3: You can also create an Input Mask by entering characters directly into the Input Mask box in the Field
Properties area.

STEP 4: Click the Build button.

The first step of the Input Mask Wizard appears. All you need to do here is select the input mask you
want to use.If you want to try an input mask to see how it works, click the input mask you want to
use and then type some sample text in the Try It box.

STEP 4 :Select an input mask from the predefined list.

STEP 5: Click Next.

Here you can customize the input mask to your specifications.

8
STEP 6: Make modifications to the characters in the Input Mask box. Click the Placeholder
character list arrow to select a different placeholder.

STEP 7: Click Next.

The next step of the Input Wizard is very important—specifying how Access should store your data.
You have two choices:

 With the symbols in the mask: This will store the text you type in the field and the input mask
symbols. For example, if you enter 5555555555 in a Phone field, Access will save the input mask
symbols with the text you enter, so (555) 555-5555 would be saved.

 Without the symbols in the mask: This will store only the text you type in the field. For example,
if you enter 5555555555 in a Phone field, Access will display (555) 555-5555 but only store the
numbers you typed (5555555555).

STEP8: Select an option for storing your data.

STEP 9: Click Next.

STEP 10 :Click Finish.

9
Input Masks for Your Site’s Forms 

Step 1: Create a New WordPress Form


The first thing you’ll need to do is install and activate the WPForms plugin. For more details, follow
this step by step guide on how to install a plugin in WordPress.

Step 2: Add a Single Line Text and Customize Your Input Mask
In order to add an input mask to your contact form, you’ll need to add a Single Line Text form field.

Click on the Advanced Section. This is where you’ll define your custom input mask.

10
In our example, we’ll ask people filling out our form to enter their United States phone number,
complete with the country code:

Click Save.

Step 3: Add Your Form to Your Site

Now that contact form is customized with an input mask, it’s time to embed the form onto your
website.

WPForms allows you to add your forms to several places on your website. For example, posts, pages,
and even your sidebar widgets areas.

First, we’ll look at how to add your form in a post or page.

To start, create a new post or page, or edit an existing one. Then, click on the Add Form button.

Select your contact form from the dropdown menu and click Add Form.

Next, publish your post or page so your contact form will appear on your site visitors.
Take a look:

11
Notice the underscores that guide the user to finish filling out their phone number.

To add your contact form to your site in the sidebar widget area, go to Appearance » Widgets and
add a WPForms widget to your sidebar. After that, select your form from the drop-down menu and
save your changes to the widgets area.

Now you can view your published order form live on your site.

12
In Conclusion

And there you have it! You now know how to create input masks for your site’s forms.

If you are looking for ways to encourage more site visitors to fill out your site’s contact forms, be
sure to check out our roundup of research based tips for improving conversions.

And if you want to take it a step further, check out this helpful guide for improving your email
marketing efforts using your WordPress contact forms.

And don’t forget, if you like this article, then please follow us on Facebook and Twitter.

Input mask for lookup field

STEP 1: display the table in design view.

STEP 2: click the field's data type box, click the list arrow, and select lookup wizard.

STEP 3: click the i want the lookup column to look up the values in a table or query option and click
next.

STEP 4: select the table or query you want to use for the lookup list and click next.

STEP 5: select the fields you want to add to the lookup field and click next.

STEP 6: select a sort order for your list (optional) and click next.

STEP 7: adjust the width of the columns that will appear in the lookup list and indicate whether or
not to include the primary key in the column. click next.

STEP 8: if prompted, select a column that will act as the bound column and click next.

STEP 9: enter a label for the lookup column and click finish.

Input mask yourself by typing a series of characters in the Input Mask box
STEP 1: Click the Input Mask box.

STEP 2: also create an Input Mask by entering characters directly into the Input Mask box in the Field
Properties area.

STEP 3: Click the Build button.

STEP 4: Select an input mask from the predefined list.

STEP 5: Click Next.

STEP 6: Make modifications to the characters in the Input Mask box.

STEP 7 :Click the Placeholder character list arrow to select a different placeholder

13
STEP 8; Click Next.

STEP 9 :Select an option for storing your data

STEP 10: Click Next.

STEP 11: Click finish.

QUESTION 3

 Allowed character checks : Checks to ascertain that only expected characters are present in a
field. For example a numeric field may only allow the digits 0–9, the decimal point and perhaps
a minus sign or commas. An e-mail address might require at least one @ sign and various other
structural details. Regular expressions can be effective ways to implement such checks.

 Batch totals: Checks for missing records. Numerical fields may be added together for all records
in a batch. The batch total is entered and the computer checks that the total is correct, e.g., add
the 'Total Cost' field of a number of transactions together.

 Check digits: Used for numerical data. To support error detection, an extra digit is added to a
number which is calculated from the other digits.

 Consistency checks: Checks fields to ensure data in these fields correspond,if expiration date is
in the past then status is not "active".

QUESTION 4
Performance Reports. Performance reports that are put together with two font styles , one for the
normal text and one for the headings ,aren’t just boring and monotonous to the eye. They are also
hard to navigate, and make it quite a challenge to find the information you need rapidly and
frustration-free.

 Proximity gives a report structure

For performance reports, proximity is about the structure of the report and the use of white space
to visually “chunk” related information together, such as collating related measures under strategic
goal headings.

 Alignment gives a report navigatability.

14
Alignment is about how space on each page or dashboard screen is used so that graphs,
explanations, cause analysis and recommendations have obvious connections to one another.

 Repetition gives a report familiarity.

Repetition is about consistency, such as using the same graph type and formatting to display
performance measures for a trend over time comparison.

  Contrast gives a report fast interpretatability.

And contrast is about making the important things really stand out, like signals of sudden or gradual
change in performance or the attainment of a target.

15
.

16
Part 2 - System Implementation and Support [20 marks]

QUESTION 1
1. Functional Testing - Also known as functional completeness testing, Functional Testing involves
trying to think of any possible missing functions. Testers might make a list of additional
functionalities that a product could have to improve it during functional testing.

2. Hardware/Software Testing - IBM refers to Hardware/Software testing as "HW/SW Testing".


This is when the tester focuses his/her attention on the interactions between the hardware and
software during system testing.

3. Usability Testing- mainly focuses on the user's ease to use the application, flexibility in handling
controls and ability of the system to meet its objectives

4. Load Testing- is necessary to know that a software solution will perform under real-life loads.

QUESTION 2
= Systems implementation is the process of defining how the information system should be built
,example by physical system design.Next ensuring that the information system is operational and
used, Then ensuring that the information system meets quality standard example quality assurance

QUESTION 3
 Corrective maintenance is implemented right after a defect has been detected on a piece of
equipment or a production line: its objective is to make the piece of equipment work normally
again, so that it can perform its assigned function. Corrective maintenance can either be
planned or unplanned depending on whether or not a maintenance plan has been created.

 Predetermined maintenance, probably the less known one of all the maintenance types
presented in this article, doesn’t rely on the actual equipment’s state but rather on the
programs delivered by manufacturers. They elaborate these programs based on their
knowledge of failure mechanisms as well as on MTTF (mean time to failure) statistics which they
observed on a piece of equipment and its various components in the past.

 Condition-based maintenance , Among all types of maintenance cited above, the condition-
based maintenance is the most complicated to implement. It aims to prevent failures and
requires regular check-ups of the state, the efficiency as well as other indicators of the system.
All this data can be gathered automatically on the field or remotely thanks to a direct network
connection to the equipment, in order to make sure that it is constantly controlled. 

 Preventive maintenance is applied by technicians teams and managers before any breakdown
or failure occurs. Its aim is to reduce the probability of breakdown or degradation of a piece of
equipment, component or spare part. In order to implement such maintenance, teams have to
take the part’s history into consideration and keep track of the past failures.

QUESTION 4

17
1. Include backup in your security strategy

Ensure your security policies include backup-related systems within their scope. Practically every
type of security policy , from access control to physical security to system monitoring and, especially,
malware protection , applies directly to data backups.

2. Include backup systems in your DR strategy

Include your data backup systems in your disaster recovery and incident response plans. Data
backups can be breached, compromised or destroyed in situations such as a ransomware outbreak,
employee break-in or something environmental including a flood or hurricane.

3. Limit access rights to data backups

Assign backup access rights only to those who have a business need to be involved in the backup
process.

4. Consider different backup locations

Store your backups offsite or at least in another building. A natural disaster, a fire or other rare, yet
impactful, incident could be all that's needed to take out your data center and your backups in one
fell swoop.

18

You might also like