You are on page 1of 2

Table 1.2 shows the software components that will be used in the project.

It consists of the Microsoft


excel, which will be the platform that users can easily enter expenses, categorize them and perform
basic calculations. It is a highly flexible tool that allows users to customize their expense tracker based
on specific needs.

Info about the Database Design in this paragraph.

Figure 5 shows the level 0 data flow diagram (DFD). The administrator or staff initialized the system
using the inputted username and password. However, only the administrator has ability to add, edit and
delete the expense categories.

Subsequently, the system sent the updated expense data and expense report to the administrator and
staff. While the administrator has additional capabilities to manage expense categories.

The following are the functional requirements of the system.

1. The system shall be able to carry out user authentication.

2. The system shall be able to monitor expenses data.

3. The system shall be capable to monitor expenses report.

4. The system shall be able to capture details such as date, category, amount and description of each
expense.

5. The system shall be capable to provide the ability for users to categorize expenses.

6. The system shall be able to allow users to create, edit and delete expense categories.

7. The system shall be capable to implement validation checks to ensure the accuracy and completeness
of entered data.

8. The system shall be able to display error messages for invalid or missing information during data
entry.

9. The system shall be capable to generate reports summarizing expenses based on criteria such as date
range, category and user.

10. The system shall be capable to implement a notification for reminders or alerts related to expenses.

11. The system shall be able to support export options for reports such as Pdf or Csv formats.
The following are the non-functional requirements of the system.

Security. The system shall be able to secure storage of user data including usernames and passwords
and implement encryption to protect sensitive information during data transmission.

You might also like