Professional Documents
Culture Documents
BY
AKHIGBE DAVID CHDOZIE
BU/18A/IT/2993
September, 2020
Personal Services Locator
B.Sc.
In
Software Engineering
By
September, 2020
DECLARATION
This is to certify that this Thesis/Report, Personal Services Locator which is submitted by
AKHIGBE DAVID CHIDOZIE in partial fulfilment of the requirement for the award of
degree for B.Sc. in Software Engineering to the Department of Computer Science, Baze
University Abuja, Nigeria, comprises of only my original work and due acknowledgement
has been made in the text to all other materials used.
APPROVED BY …………………
Dean
This is to certify that this Thesis/Report entitled Personal Services Locator, which is
submitted by AKHIGBE DAVID CHIDOZIE in partial fulfilment of the requirement for
the award of degree for B.Sc. in Information Technology to the Department of Computer
Science, Baze University Abuja, Nigeria is a record of the candidate’s own work carried
out by the candidate under my/our supervision. The matter embodied in this thesis is
original and has not been submitted for the award of any other degree.
This is to certify that the research work, Personal Services Locator and the subsequent
preparation by Akhigbe David chidozie with [BU/18A/IT/2993] has been approved by the
Department of Computer Science, Faculty of Computing and Applied Science, Baze
University, Abuja, Nigeria.
By
This project is dedicated to the almighty God for his mercy and grace for keeping me to
see the end of this chapter of my life, and to my Father Mr. Michael Akhigbe,and my
mother Mrs. Ngozi Akhigbe, thank you for your unwavering support towards me against
all oddsI also dedicate this to my lecturer’s Dr Sylvanus, Dr Amit, Mr. Julius, Mr.
Abubakar, Mr. Kvac for their immeasurable assistance and also to my classmates and great
friends Fidelis, Al-Kassim, Bill, Basil, Shin-shil these elite individuals work ethic rubbed
off on me and helped me conquer my fear and for which I am eternally grateful.
ABSTRACT
In this Thesis, The Personal Services Locator helps users to find personalized workers or
“Handymen” as fast as possible. The issue of finding a person or an individual to do a certain
job has always been around, even though it has been reduced with the use of adverts and
various social media, it’s not as fast and as efficient at locating people. This application finds
the closest person(s) with the services running depending on which personalized service the
user is looking for and which service the other user provides and links them together thus
creating an appointment within the two users on where to meet and the transaction will be
carried out. This software will run on Android and will be developed using Java
programming language.
‘
TABLE OF CONTENTS
TABLE 3. 1 ADVANTAGES AND DISADVANTAGES OF THE AGILE FRAMEWORK (MEDIUM, 2018) ................. 25
TABLE 3. 2 FUNCTIONAL REQUIREMENT SPECIFICATIONS ............................................................................ 31
TABLE 3. 3 NON-FUNCTIONAL REQUIREMENT SPECIFICATIONS ................................................................... 32
IT Information Technology
DB Database
UI User Interface
CHAPTER 1: INTRODUCTION
1.1 Overview
Personal Services Locator is a platform that helps individuals find workers or “Handymen”
that are closest to the individuals’ location. This is achieved by creating a platform that helps
with easier access to personal workers. This application helps to find workers effectively and
efficiently with the ease and comfort from homes or offices or wherever a user may be. With
a few clicks of a button on the Personal Services Locator, details of the user’s location (i.e
the person ordering the services) will be sent to the closest “Handymen” around that area
who may offer the specific services being requested
• To develop an android application that allows users make quick requests for personal
workers.
• To alert Personal Service workers that someone needs help in their field of expertise.
Inability to carry out research due to loss of Be aware of and observe school security procedures.
hardware/software resources.
(Ehikioya, 2018)
SERVICE
SERVICE SERVICE
REGISTRY
PROVIDER CONSUMER
PLATFORM
In the conceptual model fig 2.1, users provide services and other users (who are the
consumers will consume these services the platform which makes this possible will have a
matchmaking function which links the consumers and providers together and also a way of
communication to reduce wrong information sent and secure way to make payments and
accept payments to reduce scam situations. In most situations these applications aren't solely
by provider and consumer, they would always be a middleman who is introduced to deal
with the requests and multiple services as seen in fig 2.1
MIDDLEMAN /
ADMIN
DISCOVERABLE
FIND
SERVICE COMMUNICATION
SERVICE PROVIDER
CONSUMER
The Uber app and the TaskRabbit apps are Examples of peer to peer applications that are
running.
2.5.1 Uber
Uber is a technology platform. Where apps connect drivers and clients In urban areas where
Uber works, individuals utilize their rider application to demand a ride. At the point when a
close by driver-accomplice acknowledges your solicitation, your application shows an
expected time of appearance for the driver-accomplice going to your pickup area. Your
application informs you when the driver-accomplice is going to show up. The driver at that
point takes the client to the ideal area and the client would be charged dependent on the
separation of the ride (How does Uber work?,2020)
The fruitful development of Uber has been in light of a misleadingly basic utilization of
current innovation, in which the underlying appointments, the course to be taken, the figuring
of pay also, at long last, payment, are totally made by implementation of an advanced mobile
phone application. In operational terms, this innovative base is joined with the monetary idea
of the 'sharing economy,' which means to unite providers and shoppers by utilizing save
limit. On account of Uber, this implies that, given that an engine vehicle is ordinarily inactive
for more than 90% of the time, the driver of a private vehicle can download the Uber
application and be placed in contact with clients who are utilizing their own Uber savvy
telephone application. Innovation, joined with the ‘sharing economy', should mean a more
productive coordinating of gracefully and request than for customary taxi administrations. ,
(Dudley, Banister, & Schwanen, 2017) Also, Uber utilizes variable estimating that can be applied
to manage times of pinnacle request, while both driver and client give score appraisals to one
another. The capacity of Uber to challenge and regularly undercut the officeholder taxi
administrators has unavoidably caused savage resistance to its administrations in numerous
nations. Especially for administrative purposes. Uber looks to separate itself from its
opponents by depicting itself as an innovation stage as opposed to a taxi organization, while
it groups its drivers not as employees, but as 'partners’. Uber and its rivals have rolled out
basic improvements to an old industry that worked similarly to it did decades back:
Individuals needing a taxi needed to either truly wave at a taxi or call a neighborhood vehicle
administration to hold a vehicle at any rate thirty minutes before the pickup time. E-hail
administrations like Uber have made it conceivable to make sure about a vehicle or taxi by
means of a cell phone from any area. A disadvantage, in any case, is that this problematic
innovation has diminished the piece of the pie of customary taxi benefits and brought down
the general benefits of drivers. Uber and its rivals have a few particular points of interest
over customary taxicabs: like the use of credit cards
Rather than pursuing down a taxi on a road—or calling and standing by thirty minutes for a
vehicle administration—e-hail application clients can hail a vehicle from any area and have
it show up in practically no time. Since the traveler's Visa card is connected to the account,
no money changes hands. Upon landing in the objective, the driver carries the ride to a stop
and the traveler can basically leave the vehicle. A receipt is sent through email. Another
advantage is proficient services. In significant urban communities like New York where the
taxi business is directed, most vehicles are later models, very much kept up and chauffeured
by proficient drivers who have legitimate business protection inclusion. When a driver
acknowledges a task, travelers can follow a driver's position and course, and speak with their
driver if essential. A driver possibly learns the traveler's objective when the passage begins.
This deals with the issue of being declined admittance to a taxi on the grounds that the
traveler wishes to venture out to unfortunate pieces of town. Amateurish drivers are removed
on the grounds that travelers get the opportunity to rate the driver's exhibition. A reliably low
evaluating will constrain a driver out of Uber or its rivals. In numerous urban communities,
as Los Angeles, and states with less rigid guidelines (contrasted with New York), normal
residents can give the Uber administration. This builds the quantity of drivers and makes
more vehicles accessible. The entirety of the above mentioned and more encourage a positive
encounter for Uber clients. (Jalloh, 2020)
2.5.3 TaskRabbit
In the work of TaskRabbit. TaskRabbit is a two-sided marketplace that connects ‘Task
Posters,’ people who need help, with ‘Task Rabbits,' a network of pre-approved and
background checked individuals, who have the time and skills needed to complete the
listed task. Hailed as a godsend to people with more money than time, it allows people to
outsource small jobs and tasks to others in their neighborhood. TaskRabbit aims to help
people take back their lives, be their boss, help people out, and make some money.
2.6 Summary
Even though all knowledge that since the beginning of civilization, personal services have
been needed from different people with specific abilities and expertise to get things done.
This also consists of what personal services are in the world today are needed by virtually
almost everybody. This shows how personal services have fared nicely in the world without
being automated and how it will fare better if we added information technology to it and
make it easier for people to get jobs done
The figure above depicts the agile framework and its lifecycle with some of its deliverables.
It is not a methodology but rather a framework to apply towards any preferred methodology.
Advantages Disadvantages
The table above describes some of the advantages and disadvantages of the agile framework
in minimal details.
In far left we see the client table that store similar data structures. Which have an auto-
generated 27 character ID, this is good because it is more secure than user assigned id’s.
While the client collection has data about the client and the handyman table has data about
the handyman the client table which makes it easier to store information with these
collections we
The client database always accesses the customer request which means one client can make
one request and the customer request would access the table of the handymen available and
only picks one driver at a time which is the closest. The available table doesn’t have
handyman Information just the Handyman’s unique key and their location which uses geo
fire go query the handyman's updated location is then moved from the available to the
working table when being accessed by the customer request which puts the customer work
id into the handyman map for the time being to indicate that’s whom the handyman is
working for and when the work has been done the details of the handyman and the client
would be put into the history table which has a unique key to identify the client and the
handyman involved in that job. which will also be a foreign key in both handyman and the
client table to track history in case of history retrieval.
3.6 Ethical Consideration
There have to be guidelines that govern a software developer in the creation of software and
the organizations, and they include:
• The risk of harm: We ought to make every effort to protect study members. For this,
we should concentrate on the hazard to profit proportion. If potential dangers exceed
the advantages, at that point we should desert or change the research. risk of harm
additionally expects us to quantify the hazard to profit proportion as the research
advances.
• Validity: The research configuration must address explicit research questions. Thus,
the findings of the study must associate with the inquiries presented and the
outcomes. Likewise, research about morals requests that the techniques utilized must
relate explicitly to the research questions.
• Checking of necessity
R-104 The smartphone should have a minimum of 1Gb disk space Configuration
for installation
R-105 Firebase Realtime Database Configuration
R-106 The application should include a user interface. Functional
R-107 The application should work on all android smartphones Functional
R-108 The application should use Location Services to search for Functional
nearby devices
R-109 The application shall allow users find the closest Handyman Functional
R-110 The application shall Activate Location Services on the users Functional
Device
R-111 The application should work on all android smartphones Functional
• Application Architecture
• Database description
• Data Flow Diagram
• Activity Diagram
• Use Case Diagram
3.8.1 Application Architecture
This section consists of the application architecture which defines the framework of the
application to be developed against the several requirements identified to ensure scalability,
reliability and manageability.
Splash Screen
Choices
Database Database
Accessor Accessor
API
API Client Map Handyman map
Handyma
n details Cloud
Maker Cloud
Database
Accessor
Cloud Placer
CloudDatabase
Accessor
Client
Details
Marker
Handyman placer
Client Profile History profile
Polyliines
Direction
Cloud
Update
profile Cloud
Database
Accessor
Update
profile
View
profile View
profile
Detailed
History
Cloud
Cloud
Database
Accessor
Figure 6
The figure above describes the interaction between the several components of the system
and how the system will appear to the user of the application. Several major components
have been identified based on the provided requirements and this will aid in a much better
implementation process by ensuring ease of understanding.
3.8.2 Use case diagram
The use case diagrams describe system functionality as a set of tasks that the system must
carry out and actors who interact with the system to complete the tasks.
MANAGE USERS
<<extend>> ADMIN
<<extend>> <<extend>>
register users
edit users delete users
PHONE NUMBER
REGISTER <<include>>
AUTHENTICATION
<<include>>
VALIDATE USER
LOGOUT
CALL
HANDYMAN
REQUEST
VIEW CLIENT
MAKE
<<extend>> Cash DETAILS
PAYMENTS
<<extend>>
ANSWER
Card debit REQUEST
The figure above shows the use case for the Handyman application which depicts the
interaction between the user and the system to achieve certain objectives.
3.8.4 Activity Diagram
Activity diagram is a type of UML that describes the dynamic aspects of a system. It
represents the flow from one activity to another which can also be referred to as the
operations of a system. This application will be represented in several activity diagrams so
as to give a better picture of the dynamic aspects of the system
fill in details
If account is taken
true
If account is not taken
If code is valid
display success
message
display home
screen
The figure above shows the flow of processes to be registered into the system.
3.8.5 Data flow diagram
The DFD shows the representation of the flow of data of a process or a system, it also
provides information on the inputs and outputs of each entity and the process itself.
Sign In Sign In
Sign Up Sign Up
Search for handyman Turn on location
Make payment Make Calls
Client Handyman Handyman
Make calls Sees Clients in need
Handyman location Client location
Handyman information
Admin
Database
Click Profile
Update database
Call History
Search
Profile
Udate profie
View history
Client Client
Client
Handyman
general understanding
The splash screen in the first thing a user first sees when the application is opened, this splash
screen lasts a period of 5 seconds.
fig 3. 9: sign up page
The sign-up page is accessible for new users, this page gathers vital data that is used to make
an account for a user,
3
The login page allows the user put in their credentials to log in to the system and start
making use of the functionalities
fig 3. 11: Home page
This page shows what a user sees when successfully signed in. in this page, A user can call
for a “handyman” and a “handyman” can wait for request or turn off and on their locations
fig 3. 12: User info page
In this page a user can edit their info or check what their info says to other people they can
also choose to add a profile picture or not
3.9 Summary
This chapter explained the research methodology, analysis and design of the application.
This chapter also explained how the process flow of data and activities are being carried out
in the system. This section carefully analyzed the current existing system, and identified the
opportunities for improvements by conducting thorough desk research
CHAPTER 4: IMPLEMENTATION AND TESTING
4.1 Overview
This chapter is dedicated to going over the main features of the application and going
through details of its implementation, and Identifying any problems experienced during
the implementation. After problems have been Identified details on how and why the
problems occurred will be provided, as well as how said problems were overcome. The
chapter will also go through the testing plan by identifying all major components and
report on their behavior. We will also go through the test and error report summary and
look at corrections for those errors. Finally, the user guide will be provided and then the
contents of this chapter will be summarized.
The application was implemented through coding. Some of the codes that were used to
implement this application will be further shown to explain the main features of this
application.
fig 4. 1: Implementation code for getting Handymans current location
This figure above shows the implementation to connect the handyman to the database with a switch so he
can be found if there is a request the switch is used so as not to be logged in and always ready for work
The figure above shows the code for finding the closest handyman device the clients device using geo
locations
fig 4. 3: Implementation code for polyline activation
This snippet of code shows the implementation of the polyline activation for the direction to the client
fig 4. 4: Implementation code for getting client info
The figure above shows the code that was used to implement getting the client info from the cloud database
and display it on the Handymans map /device
• Coding
• Integrating the database in the android environment
• Integrating maps
• Payment services
It was really difficult understanding how to integrate the firebase database I watched a lot
of you tube videos to help me understand the new kind of no sql database I was about to
get into because the way firebase works you have to make references to the different json
trees in the fire base and there are many commands for that in the documentations
Coding
I had to find a way to code the phone calls and make sure the phone number being called
is the one being displayed and the ne being gotten from the database but it wasn’t working
at first because I was making reference to a string in the database so it went to that string
and usually called a bunch of things that shouldn’t be called (the file path). So I had to
make a string and set that string to what was already gotten from the database which was
in the textview ui and then that is what will be called when the button is pressed.
Integrating maps
Integrating the maps API was a huge problem because of the billing and the attainment of
the SHA keys to link to your android project It took days of going through pages and pages
of the web to find out how to get an SHA key and SHA keys change if a system is formatted
which was done to my system for risk mitigation. Another Problem with the maps was
trying to get the current location of the user, it was hard because google deprecated the
maps API and made an update so I had to research on how to access current location with
the new implementation.
Notwithstanding these issues I experienced I had the option to beat the greater part of them,
I was as yet ready to convey a proficient framework that meets the client prerequisite that
was expressed in the investigation and configuration stage. I conquered the blunders in my
code via cautiously investigating each line of code, evaluating the module that were having
issues.
4.5 Testing
Testing is one of the most significant pieces of a product improvement life cycle. It assists
with giving check and approval on whether the entirety of our useful necessities are met.
This is finished by creating test information and taking care of it to the application to screen
the conduct. This assists with recognizing the weaknesses and impediments of our
application. On the off chance that an element neglects to meet desires it will be separated
from different segments and will be looked at.
This is where the application would be tested. Several tests were conducted such as unit test,
integration test, system test, and acceptance test.
• Unit Test: Unit test is the testing of the individual modules of a system or application. It
tests if the objects and methods of an application are working and performing as well as they
should. The unit tests carried out can be found in the appendices section.
• Integration test: This is the test carried out after the unit test. The modules which have been
tested individually in the unit test are then grouped to form larger groups or aggregates. The
large aggregates are then tested according to the integration test plan. In the case of this
application, the acceptance of speech and the results return method were grouped together
and tested.
• System Test: This test comes after integration testing. After all the components have been
integrated and tested, the system test comes in. Here, the whole system is tested altogether.
It ensures that the system is tested altogether. It ensures that the system as a whole achieves
its stated objectives; that it fulfils the purpose for which it was created. In the case of this
application its main purpose is to recognize verses of the Quran and return the English
meaning together with other criteria’s like the English Surah name and so on. Another
purpose is to guide Muslims towards the direction to face whilst praying. The system test
was conducted to see if this application can perform the its required functions.
• Acceptance Test: The test is performed by users of the application. It tests to verify that the
application meets user’s requirements. The user uses the application and concludes whether
it conforms to what they need. This application was tested under this technique by sending
the installation media to 13 different individuals for their consumption and all the feedbacks
were positive with some few criticisms towards the color theme and new features to consider
like the prayer notification feature and so on.
4.5.1.1 Test Identifier:
TEST LEVEL: Master Test Plan
4.5.1.2 Reference
• Work Plane
• Test summary
4.5.1.3 Introduction
The personal Services locator app master test plan is provided here which will
verify and validate the functional requirement. Different testing methods such
as white and black box testing will be performed.
5.1.4 Features To Be Tested
The following is a list of the areas to be focused on during testing of the
application.
• Login
• Logout
• Search Request
• Cancel Request
• History page
• Detailed History page
• Real time Tracking of Handyman
• User Info page update and display
• Making phone calls to linked Handyman or client
4.5.1.5 Features Not To Be Tested
• External APIs
• Internet protocols
4.5.1.6 Approach
Theses testing can be done at different levels but using measuring criteria. Built in debugger
in android studio will be used, android emulator would also be used to test the application
before it is then deployed.
APPROVALS
Akhigbe David Chidozie
Chief Technology Officer
4.5.2 Test Suite (for Unit Testing, Integration Testing, and System Testing)
Table 4. 1Test Suite Performed for Login
Test case summary This test case is designed to allow user cancel a request after finding
a handyman
• Sign in
Expected Result The application allows the markers to be removed from the map and
all other pop ups of the handyman’s information
Actual Result The result was as expected
1. Login
2. Click logout
Test Data Logout
Expected Result The user should be logged out redirected to the choices page
Actual Result The user is logged out
Status Test case passes
Remarks The test was successful
Created by Akhigbe David Chidozie
Date Created 28th August 2020
Executed by Akhigbe David Chidozie
Date of Execution 28th August 2020
Test Environment Hardware: Infinix Android , Windows envy (Windows 10 pro)
Test case summary This test case is designed to allow user call a user that he /she is linked to
• Sign in
Expected Result The phone allows the application to call displayed number
• Sign in
Figures 16-20 show all the screenshots of the various test procedures followed to
prove test results stated as either pass or fail in the status field.
Measurement metrics: The measure of the extent to which each tested case satisfies
specified requirements would be given in form of pass or fail. “pass” means that the
test case satisfies the given requirement. While “fail” means the test case does not
conform to the specified requirements.
Pass/Fail criteria: these are the conditions which determine whether each test item
passes or fails the corresponding tests.
The table above is the summary of all the test suites executed coupled together with
their various descriptions.
4.5.2 Test Traceability Matrix (for Unit Testing, Integration Testing, and
System Testing)
This section captures the requirements identified during data gathering and maps these
requirements to test cases executed during the testing phase to ensure that all test cases
have been covered and documented. See figures 4.7-4.11 to see tests carried out.
#
Case
4.5.4 Test Report Summary (for Unit Testing, Integration Testing, and
System Testing)
Table 4. 9:Test report summary
OUT
Corrections
• In order to correct this error, I isolated the faulty module and each
line of code till the error was identified and fixed also ran the code
and found the errors through the error messages from the logcat
4.7 Summary
This chapter explained the software tools used in developing the system, the system
implementation procedure, and test conducted on the software before it was deployed for
user consumption and the documentation of the software, this chapter also explained how
and why all these processes where carried out. This chapter is very critical in the software
development life cycle of a project because adequate implementation is important to provide
a reliable and efficient system that meets the requirements of the organizations; an improper
installation may affect the efficiency an overall general output of a system.
CHAPTER 5: DISCUSSION, CONCLUSION, AND
RECOMMENDATIONS
5.1 Overview
This chapter is the final chapter of this thesis. In it, we’ll go over an objective assessment
of the project as a whole in section 5.2. And then discuss the limitations and challenges
faced during the development of this project in section 5.3. in section 5.4 we’ll also go
over plans for future enhancements for this project. and finally, recommendations will be
made, based on the findings of this project.
5.6 Summary
This chapter concluded this project thesis. In it, we were able to give an objective
assessment of the project itself. And discussed limitations and challenges such as the
nationwide lockdown, we discussed plans for future improvements such as Different
categories of help such as plumbers and carpenters, Choosing from specific said handymen
list rather than closest to location, Versatility of operating systems and plans for evolving
the application for major project supervision. And finally, we discussed the author's
recommendation.
REFERENCES
[1] Investopedia. 2020. Personal-Service Activity. [online] Available at:
<https://www.investopedia.com/terms/p/personal-service-activity.asp> [Accessed
25 March 2020].
[2] Rosenberg, Kathryn. "Restoring the Seven Year Rule in the Music Industry."
Fordham Intell. Prop. Media & Ent. LJ 26 (2015): 275.
[3] Medium. 2020. How Taskrabbit Works: Insights Into Business & Revenue Model.
[online] Available at: <https://medium.com/uber-for-x/how-taskrabbit-works-
insights-into-business-revenue-model-640c8e4895ef> [Accessed 3 April 2020].
[4] Ehikioya, S. A. (2018). A formal model of peer-to-peer digital product marketplace.
International Journal of Networked and Distributed Computing, 6(3), 143-154.\
[5] U. (n.d.). How does Uber work? Retrieved July 30, 2020, from
https://help.uber.com/riders/article/how-does-uber-work?nodeId=738d1ff7-5fe0-
4383-b34c-4a2480efd71e
[6] Ramer, G. B. (n.d.). Personal Service With A Smile: A History Of California's.
Retrieved July 30, 2020, from https://www.mondaq.com/unitedstates/employee-
rights-labour-relations/279512/personal-service-with-a-smile-a-history-of-
california39s-seven-year-rule
[7] How TaskRabbit Works: Insights into Business & Revenue Model. (2019, July
05). Retrieved August 27, 2020, from https://jungleworks.com/how-task-rabbit-
works-insights-into-business-revenue-model/
[8] Jalloh, M. (2020, February 05). Uber: Advantages and Disadvantages. Retrieved
August 27, 2020, from
https://www.investopedia.com/articles/investing/110614/taxi-industry-pros-cons-
uber-and-other-ehail-apps.asp
[9] Dudley, G., Banister, D., & Schwanen, T. (2017). The rise of Uber and regulating
the disruptive innovator. The political quarterly, 88(3), 492-499.
[10] Azene, F. (2014). Location based services for low-end mobile phones. Enschede:
University of Twente Faculty of Geo-Information and Earth Observation (ITC).
[11] Huang, H., & Gao, S. CP-12-Location-Based Services.
[12] Schiller, J., & Voisard, A. (Eds.). (2004). Location-based services. Elsevier.
[13] Bellavista, P., Küpper, A., & Helal, S. (2008). Location-based services: Back to the
future. IEEE Pervasive Computing, 7(2), 85-89.
APPENDICES
Appendix A - Project Document
The project documentation Personal service locator
• Sign in
• Sign in
3. Login
4. Click logout
Test Data Logout
Expected Result The user should be logged out redirected to the choices page
Actual Result The user is logged out
Status Test case passes
Remarks The test was successful
Created by Akhigbe David Chidozie
Date Created 28th August 2020
Executed by Akhigbe David Chidozie
Date of Execution 28th August 2020
Test Environment Hardware: HP Laptop
1. The application shall be installed on an android phone. The Sign in page is the
next page after the splash screen. In this page you will have to sign in if you have an
account already.
2. The Choices in page is the next page after the splash screen. In this page you will have
to choose your role
3. After a role is chosen the login page is the next page which you can login and it takes
you to the maps page
4. If you are a new user, you will have to click sign up at the bottom of the page.
5. If you are the new user, you are expected to input email, password, first name, last
name, mobile number then click sign up.
6. After clicking sign up, it will take the user to the page for confirming their phone
number which a code will be sent to them for confirmation
7. After the correct code has been inputted, they will be taken to the login page