You are on page 1of 10

BIZDATA PRODUCT MANAGER

CASE STUDY

SUBMITTED BY -
Name - Mohima Chakravorty
Reg No. - FPB2123/091
Email address - fpb2123.091.mohima@gmail.com
PGDM Specialization - HR & Marketing
Role applied for – Product Manager
Case Study – 1 A - Product Manager

1> State the product definition, technical architecture and list of activities required to be done on the login
page.

Product Definition:
Bizdata helps organizations with systems integration and advanced data analytics for providing end to end visibility into
business processes. A software website/app need to developed/update which would have a login page that contains
information such as entering username, password, separate login and signup option and help option if someone forgets
their password. The second page would contain a blank dashboard.
Technical Architecture:

When it comes to 3- Tier architecture, there are three layers.


1. Presentation Layer/ Client Layer
2. Application Layer/ Business Layer
3. Database Layer
Case Study – 1 A - Product Manager

The 3-tier architecture is more secure as the client does not directly access the data. The ability to deploy application
servers on multiple machines provides higher scalability, better performance and better re-use. We can scale it
horizontally by scaling each item independently. We can abstract the core business from the database server to
efficiently perform load balancing.

List of Activities:
 Username - (label with textbox field to enter username/ email)
 Password - (textbox field to enter password with dotted text)
 Login – (Login button to validate the credentials)
 Signup – (Signup button to register user)
 Forgot – (Forgot option for if someone forget their Username/Password)
Case Study – 1 A - Product Manager

2> Prepare a test case document that will give quality assurance on the feature of the login page.

Sample Test Case:


Serial No Test Case Scenario Result

1 Verify if a user is able to login with a valid username and valid password. Pass/Fail
 
2 Verify if a user cannot login with a valid username and an invalid password Pass/Fail

3 Verify the login page for both when the field is blank and Login button is clicked Pass/Fail

4 Verify the ‘Forgot Password’ functionality. Pass/Fail

5 Verify the messages for invalid login. Pass/Fail

6 Verify if the data in password field is either visible as asterisk (*) or bullet signs Pass/Fail

7 Verify if the login page allows to log in simultaneously with different credentials in a different browser Pass/Fail

8 Verify if the ‘Enter’ key of the keyboard is working correctly on the login page Pass/Fail

9 Verify the user registration through ‘Login in’ button Pass/Fail


Case Study – 1 A - Product Manager

3> Mention the to do list of tasks that you would assign to the developers of your company to carry out the
entire task.

Developers To Do List of Tasks:

 Understanding the requirement and concept.


 Building proper design pattern based on the requirement and finalize.
 Noting down all the Database related changes required for this requirement.
 Developing the functionality feature with test data.
 Adding validations and security related code changes.
 Ensuring all the scenarios are covered and the test cases are written down.
 Completing the test feature.
Case Study – 1 A - Product Manager

4> Create a Wireframe diagram on login page


Case Study – 1 A - Product Manager

5> Create UML model for login page

UML (Unified Modeling Language)


Case Study – 1 A - Product Manager
6> Create an architecture for login page.
Three-tier architecture is a well-established software application architecture that organizes applications into three logical and physical computing tiers: the presentation tier, or
user interface; the application tier, where data is processed; and the data tier, where the data associated with the application is stored and managed.

Presentation Layer:

The topmost level of the application is the user interface. The main function of the interface is to translate tasks and result to something the user can understand.

Business Layer:

This layer co-ordinates the application, processing commands, make logical decisions and evaluations and performs calculations. It also moves and processes data between the
two surrounding layers.

Data Layer:

Here information is stored and retrieved from the database.

The information is then passed back to the logic tier for processing and then eventually back to the user.

-Username will save in database as Username/Email address.

-Password should be encrypted while user registration and encrypted password will store in the database.

-Encrypted password would be saved to database that will ensure data security.

-Encryption/Decryption method would be implemented to encrypt/decrypt user password.

-Forget password link would be provided in case if user forget the password, then they can reset the password via some authentication.

-Strongest encryption/ decryption algorithm will be used for data security and password vulnerability.
Case Study – 1 A - Product Manager

7> Create data flow diagram between user data and data that goes inside database.

Error Message:
Wrong/ Repeated
Password Attempts

LOGIN DASHBOARD PAGE


USER

Us
e rn
a m
e&
Pa
ss
wo
rd

SIGN UP
DATABASE
Case Study – 1 A - Product Manager

Thank You

You might also like