You are on page 1of 32

Kandi Hostel Management System

Software Requirements Specification


<Version 1.0>
10th August 2016

Project Members
TE CSE 2 (Batch B3)
Ameya D. Pandya (36152)
Table of Contents

Page N

OnlineQuestionPaperDeliverySystem

1. INTRODUCTION
1.1

1
PURPOSE
1

1.2

SCOPE
2

1.3 DEFINITIONS, ACRONYMS, AND ABBREVIATIONS

1.4 REFERENCES

1.5 OVERVIEW

2. GENERAL DESCRIPTION

2.1 PRODUCT PERSPECTIVE

2.2 PRODUCT FUNCTIONS

2.3 USER CHARACTERISTICS

2.4 GENERAL CONSTRAINTS

2.5 ASSUMPTIONS AND DEPENDENCIES

3. SPECIFIC REQUIREMENTS
3.1 EXTERNAL INTERFACE REQUIREMENTS

10
11

3.1.1 User Interfaces

13

3.1.2 Hardware Interfaces

13

3.1.3 Software Interfaces

14

3.1.4 Communications Interfaces

15

3.2 FUNCTIONAL REQUIREMENTS

16

3.2.1 <Functional Requirement or Feature #1>

17

3.2.2 <Functional Requirement or Feature #2>

18

3.3 NON-FUNCTIONAL REQUIREMENTS

19

3.5.1 Performance

19

3.5.2 Reliability

19

3.5.3 Availability

20

3.5.4 Security

20

3.5.5 Maintainability

20

3.5.6 Portability

20
3.5DESIGN CONSTRAINTS
21

SoftwareRequirementsSpecification

Page2

OnlineQuestionPaperDeliverySystem

3.5.1StandardDevelopmentTools
21

3.5.2WebBasedProduct
22
3.6LOGICAL DATABASE REQUIREMENTS

22

3.7 OTHER REQUIREMENTS

23

4. ANALYSIS MODELS
4.1 DATA FLOW DIAGRAMS (DFD)

24
25

4.2StateTransitionDiagrams(STD)
27
4.3UsecaseDiagram

SoftwareRequirementsSpecification

30

Page3

OnlineQuestionPaperDeliverySystem

1. Introduction
Kandi Hostel Management System is meant to deliver a solution for all the
operations related to hostel management. In which all the transactions related to a hostel
management system such as adding new student, checking availability of rooms, mess
management will be provided.
Every student who wants to apply for the hostel will have to provide their
information which will be stored into our system. Our system will be handled by an
operator which will be assigned by the system administrator which will be responsible for
the assessment of the data that is inputted by the administrator.
It has several modules such as:
1. Login This will be used to provide the authentication to the authorized operator.
2. Registration This will be used to add new operators for the system. Only the
administrator will have the access to this module.
3. Main Menu - This module is the intermediate for all the other transactions that are
specified by the client.
4. Add New Student This module will be used to add the information of the students who
want to apply for the hostel.
5. Transaction Management This module will be only accessible for the administrator
and it will provide the information about all the transactions that have done till date.
6. Mess Management This module will be used by the operator store the information of
those students who have applied for the mess facility.
7. Wi-Fi Management This module will be used by the operator store the information of
those students who have applied for the Wi-Fi facility.
Kandi Hostel Management System aims to increase transparency and maintainability of hostel
records as well as hostel management tasks.

SoftwareRequirementsSpecification

Page1

OnlineQuestionPaperDeliverySystem

1.1 Purpose
The purpose of this SRS is to provide the overview of a developing system that is Kandi
Hostel Management System. Developing the Kandi Hostel Management System to maintain and
to reduce manual work of the existing system. This will reduce the human interface in the
existing system and reduce the risk of loss of data.
The present system is a manual system or a semi-automated system. Manual system
involves paper work in the form of maintaining various files and manuals. Maintaining critical
information in the files and manuals is full of risk and a tedious process may lead to loss of
hostel records.
As the Kandi Hostel Management System is one that aims to provide the hostel manager
less efforts for managing and storing all the transactional as well as students records better than
the sort they would find in a traditional manual systems-a full loss proof management system.

1.2 Scope
The Kandi Hostel Management System is aimed to develop a digitized system for the
storage and management of the hostel records. The scope of the Kandi Hostel Management
System is that we are developing this system for the Kandi Hostel and also for only the main
branch of the hostel.

1.3 Definitions, Acronyms, and Abbreviations


1. SRS

Software Requirement Specification.

2. SQL

Structured Query Language.

3. C#

C Sharp.

4. KHMS

Kandi Hostel Management System

SoftwareRequirementsSpecification

Page2

OnlineQuestionPaperDeliverySystem

1.4 References
Internet Sources:

1.5 Overview
As the Kandi Hostel Management System is one that aims to provide the hostel manager
less efforts for managing and storing all the transactional as well as students records better than
the sort they would find in a traditional manual systems-a full loss proof management system.
The main user of this system is the Operator that is accessing this system for adding,
removing, altering and also maintaining the hostel records.
A security code to access the question papers is delivered to each college around 30
minutes before the examination. In each college, the principal, deputy chief superintendent and a
systems administrator appointed will be responsible for the Online Question Paper Delivery
system.
The three question papers will be uploaded of the same subject by Admin of the system.
These question papers will be in the PDF format that cannot be changed. After receiving the
security code, the downloader i.e chief superintendent of college will logs into the system and
download a paper that is allowed for the institute.
Online Question Paper Delivery system aims to increase transparency and prevent
question paper leakage by eliminating two steps which have been associated with malpractices
transport of the question papers and their storage in store rooms manned by officials.
The Online Question Paper Delivery System is implemented in some universities Even as
other universities in the State are reluctant to experiment with technology as far as the
examination process, especially the question paper part, is concerned, the Visvesvaraya
Technological University (VTU), Belgaum, has embraced the system in a big way.

SoftwareRequirementsSpecification

Page3

OnlineQuestionPaperDeliverySystem

2. General Description
2.1 Product Perspective
The Existing System:
The present system is a manual system or a semi-automated system. Manual system
involves paper work in the form of maintaining various files and manuals. Maintaining critical
information in the files and manuals is full of risk and a tedious process; may lead to loss of data
as well as difficulty in maintainability.
The existing system needs to save his information in the form of excel sheets or Disk Drives.
There is no sharing is possible if the data is in the form of paper or Disk drives.
The manual system gives us very less security for saving data; some data may be lost due to
mismanagement.
Its a limited system and fewer users friendly.
In the existing system there is too much of human interface. Hence leads to risks of accounting
information tampering.
In the manual system management need bare the lot of time and cost.

The Proposed System:


The development of this new system contains the following activities, which try to
automate the entire process keeping in the view of database integration approach.

User Friendliness is provided in the application with various controls provided by system
Rich User Interface.

The system makes the overall hostel management much easier and flexible.

The operators information files can be stored in centralized database which can be
maintained by the system.

This can give the good security for overall system because data is not in client machine.

SoftwareRequirementsSpecification

Page4

OnlineQuestionPaperDeliverySystem

Authentication is provided for this application only registered members can access the
system.

SoftwareRequirementsSpecification

Page5

OnlineQuestionPaperDeliverySystem

2.2 Product Functions


The system after careful analysis has been identified to be presented with the following modules:

Web Registration

Administrator

Chief Superintendent

1. Web Registration:
The system has a process of registration. Every downloader i.e. Chief Superintendent of
the educational institute should submit complete details of his educational institution along with
college code, college name, principal name, contact details, email ids etc. in the form of
registration. When registration completed an automatically generated password is sent to the CS
for login into the system. By using that user id and password he/she can log into the system.
2. Administrator:
Administrator is treated as a super user in this system. He can have all the privileges to
do anything in this system i.e. principal. Admin can appoint the particular faculty as uploader of
the paper who will act as a uploader of the question papers.
Another tasks done by the administrator is he can design and upload question papers. He
can Supervise entire system. System generates a unique password of the particular upload which
is sent on the registered mobile number of the appointed member of examination conducting
body of that particular center.
3. Chief Superintendent:
The appointed member of examination conducting cell of that particular college enters
the username as the college code & password which is sent as security code for each time he/she
logs in and access the question paper for printing. Different kind of reports is generated by the
system.
Authentication:

SoftwareRequirementsSpecification

Page6

OnlineQuestionPaperDeliverySystem

Authentication is nothing but providing security to the system. Here every must enter into
the system through login page. For registering a secure email communication is used. The login
page will restrict the UN authorized users. A user must provide his credential like user Id and
password for log into the system. For that the system maintains data for all users.
Whenever a user enters his user id and password, it checks in the database for user
existence. If the user is exists he can be treated as a valid user. Otherwise the request will throw
back. For the exam conductor unique security code is generated each and every time, so unless
and until he provides security code chances of paper leakage.

2.3 User Characteristics

In Online Question Paper Delivery System The question papers are uploaded 45 minutes
before the commencement of the examination. The software allocates the relevant question
papers to each college based on the examination application data received from each college.
A security code to access the question papers is delivered to each college around 30
minutes before the examination. In each college, the principal, deputy chief superintendent and a
systems administrator appointed will be responsible for the Online Question Paper Delivery
system.
The three question papers will be uploaded of the same subject by Admin of the system.
These question papers will be in the PDF format that cannot be changed .After receiving the
security code, the downloader i.e chief superintendent of college will logs into the system and
download a paper that is allowed for the institute.

SoftwareRequirementsSpecification

Page7

OnlineQuestionPaperDeliverySystem

2.4 General Constraints


The general constraints of the Online Question Paper Delivery System is that we are
developing this system for the Engineering. And also for only the two branches that is
Information Technology & Computer branch. The institute which has one of the either mention
branch in their college then and only then they are able to use this system.

2.5 Assumptions and Dependencies

The size of the database increases day-by-day, increasing the load on the database back up
and data maintenance activity. so that we need large database.

The Admin of the system who uploades the question papers and chief superintendent of the
college who Downloads the paper must have knowledge and awareness of this system.so
here full system depends on the admin and the chief superintendet

SoftwareRequirementsSpecification

Page8

OnlineQuestionPaperDeliverySystem

3. Specific Requirements
3.1 External Interface Requirements
3.1.1 User Interface
The system has a process of registration. Every downloader i.e. Chief Superintendent of
the educational institute should submit complete details of his educational institution
along with college code, college name, principal name, contact details, email ids etc. in
the form of registration.

When registration completed an automatically generated

password is sent to the CS for login into the system. By using that user id and password
he/she can log into the system.

Administrator is treated as a super user in this system. He can have all the privileges to
do anything in this system i.e. principal. Admin can appoint the particular faculty as
uploader of the paper who will act as a uploader of the question papers.

Another tasks done by the administrator is he can design and upload question papers. He
can Supervise entire system. System generates a unique password of the particular upload
which is sent on the registered mobile number of the appointed member of examination
conducting body of that particular center.

The appointed member of examination conducting cell of that particular college enters
the username as the college code & password which is sent as security code for each
time he/she logs in and access the question paper for printing. Different kind of reports is
generated by the system.

3.1.2 Hardware Interfaces

Intel Pentium 4 ( 2.8 GHz ) Processor and Above

RAM 1 GB and Above

System Type 32-bit and above

HDD 40 GB Hard Disk Space and Above

SoftwareRequirementsSpecification

Page9

OnlineQuestionPaperDeliverySystem

3.1.3 Software Interfaces

Operating System: Windows XP or later:


Microsoft Windows is a meta family of graphical operating systems developed, marketed,
and sold by Microsoft. It consists of several families of operating systems, each of which cater to
a certain sector of the computing industry. Active Windows families include Windows
NT, Windows Embedded and Windows Phone; these may encompass subfamilies, e.g. Windows
Embedded

Compact (Windows

CE)

or Windows

Server.

Defunct

Windows

families

include Windows 9x and Windows Mobile.


Database Server: Microsoft SQL Server
A database management, or DBMS, gives the user access to their data and helps them
transform the data into information. Such database management systems include dBase, paradox,
IMS, SQL Server and SQL Server. These systems allow users to create, update and extract
information from their database.
A database is a structured collection of data. Data refers to the characteristics of people,
things and events. SQL Server stores each data item in its own fields. In SQL Server, the fields
relating to a particular person, thing or event are bundled together to form a single complete unit
of data, called a record (it can also be referred to as raw or an occurrence). Each record is made
up of a number of fields. No two fields in a record can have the same field name.
During an SQL Server Database design project, the analysis of your business needs
identifies all the fields or attributes of interest. If your business needs change over time, you
define any additional fields or change the definition of existing fields.
Microsoft Internet Explorer
Internet Explorer is a series of graphical web browsers developed by Microsoft and
included as part of the Microsoft Windows line of operating systems, starting in 1995. It was first
released as part of the add-on package Plus! for Windows 95 that year. Later versions were

SoftwareRequirementsSpecification

Page10

OnlineQuestionPaperDeliverySystem

available as free downloads, or in service packs, and included in the Original Equipment
Manufacturer (OEM) service releases of Windows 95 and later versions of Windows.
Internet Explorer is one of the most widely used web browsers, attaining a peak of about
95% usage share during 2002 and 2003.[6] This came after it managed to win the first browser
war against Netscape, which was the dominant browser in the 1990s. Its usage share has since
declined with the launch of Firefox (2004) and Google Chrome (2008), and with the growing
popularity of operating systems such as OS X, Linux, iOS and Android that do not run Internet
Explorer.
SmartDraw
SmartDraw is a visual processor used to create flowcharts, organization charts, mind
maps, project charts, and other visuals. SmartDraw is compatible only with Windows operating
systems. Since version 7, it uses Microsofts Fluent User Interface in conjunction with automated
panels specific to each type of diagram.It integrates with Microsoft Word, Excel, PowerPoint and
Microsoft Project; it can export diagrams to common image formats and PDF format.
Microsoft Visual Studio .Net 2008 or later
Microsoft Visual Studio is an integrated development environment (IDE) from Microsoft.
It is used to develop console and graphical user interface applications along with Windows
Forms or WPF applications, web sites, web applications, and web services in both code together
with managed

code for

all

platforms

supported

by Microsoft

Windows, Windows

Mobile, Windows CE, .NET Framework, .NET Compact Framework and Microsoft Silver light.
Visual Studio includes a code editor supporting IntelliSense as well as code refactoring. The
integrated debugger works both as a source-level debugger and a machine-level debugger. Other
built-in tools include a forms designer for building GUI applications, designer, class designer,
and database schema designer. It accepts plug-ins that enhance the functionality at almost every
level including adding support for source-control systems and adding new toolsets like editors
and visual designers for domain or toolsets for other aspects of the software development
lifecycle .
SoftwareRequirementsSpecification

Page11

OnlineQuestionPaperDeliverySystem

3.1.4 Communications Interfaces


Visual C# .Net
Microsoft Visual C# is Microsoft's implementation of the C# specification, included in
the Microsoft Visual Studio suite of products. It is based on the ECMA/ISO specification of the
C# language, which Microsoft also created. While multiple implementations of the specification
exist, Visual C# is by far the one most commonly used. [1] In most contexts, an unqualified
reference to "C#" is taken to mean "Visual C#."

3.2 Functional Requirements

1. Question papers of Multiple Courses


2. Availability of Number of sufficient printers or photocopy machines
3. A registered mobile number of the member of examination conducting body of that particular
center.
4. Availability of internet facility

Output Design:
Outputs from computer systems are required primarily to communicate the results of
processing to users. They are also used to provides a permanent copy of the results for later
consultation. The various types of outputs in general are:

External Outputs, whose destination is outside the organization.

Internal Outputs whose destination is within organization

Users main interface with the computer.

Operational outputs whose use is purely within the computer department.

SoftwareRequirementsSpecification

Page12

OnlineQuestionPaperDeliverySystem

Interface outputs, which involve the user in communicating directly.

Output Definition:
The outputs should be defined in terms of the following points:

Type of the output

Content of the output

Format of the output

Location of the output

Frequency of the output

Volume of the output

Sequence of the output

It is not always desirable to print or display data as it is held on a computer. It should be decided
as which form of the output is the most suitable.
Output Media:
In the next stage it is to be decided that which medium is the most appropriate for the
output. The main considerations when deciding about the output media are:

The suitability for the device to the particular application.

The need for a hard copy.

The response time required.

The location of the users

The software and hardware available.

Keeping in view the above description the project is to have outputs mainly coming under
the category of internal outputs. The main outputs desired according to the requirement
specification are:
The outputs were needed to be generated as a hot copy and as well as queries to be
viewed on the screen. Keeping in view these outputs, the format for the output is taken from the
SoftwareRequirementsSpecification

Page13

OnlineQuestionPaperDeliverySystem

outputs, which are currently being obtained after manual processing. The standard printer is to
be used as output media for hard copies.
Input Design:
Input design is a part of overall system design. The main objective during the input
design is as given below:

To produce a cost-effective method of input.

To achieve the highest possible level of accuracy.

To ensure that the input is acceptable and understood by the user.

Input Stages:
The main input stages can be listed as below:

Data recording

Data transcription

Data conversion

Data verification

Data control

Data transmission

Data validation

Data correction

Input Types:
It is necessary to determine the various types of inputs. Inputs can be categorized as
follows:

External inputs, which are prime inputs for the system.

Internal inputs, which are user communications with the system.

Operational, which are computer departments communications to the system?

SoftwareRequirementsSpecification

Page14

OnlineQuestionPaperDeliverySystem

Interactive, which are inputs entered during a dialogue.

Input Media:
At this stage choice has to be made about the input media. To conclude about the input
media consideration has to be given to;

Type of input

Flexibility of format

Speed

Accuracy

Verification methods

Rejection rates

Ease of correction

Storage and handling requirements

Security

Easy to use

Portability
Keeping in view the above description of the input types and input media, it can

be said that most of the inputs are of the form of internal and interactive. As Input data is to be
the directly keyed in by the user, the keyboard can be considered to be the most suitable input
device.
Error Avoidance:
At this stage care is to be taken to ensure that input data remains accurate form the stage
at which it is recorded up to the stage in which the data is accepted by the system. This can be
achieved only by means of careful control each time the data is handled.

SoftwareRequirementsSpecification

Page15

OnlineQuestionPaperDeliverySystem

Error Detection:
Even though every effort is make to avoid the occurrence of errors, still a small
proportion of errors is always likely to occur, these types of errors can be discovered by using
validations to check the input data.
Data Validation:
Procedures are designed to detect errors in data at a lower level of detail.

Data

validations have been included in the system in almost every area where there is a possibility for
the user to commit errors. The system will not accept invalid data. Whenever an invalid data is
keyed in, the system immediately prompts the user and the user has to again key in the data and
the system will accept the data only if the data is correct. Validations have been included where
necessary.
The system is designed to be a user friendly one. In other words the system has been
designed to communicate effectively with the user. The system has been designed with popup
menus.
User Interface Design:
It is essential to consult the system users and discuss their needs while designing the user
interface:

User Interface Systems Can Be Broadly Classified As:


User initiated interface:

SoftwareRequirementsSpecification

Page16

OnlineQuestionPaperDeliverySystem

The user is in charge, controlling the progress of the user/computer dialogue. In the
computer-initiated interface, the computer selects the next stage in the interaction.
Computer initiated interfaces:
In the computer initiated interfaces the computer guides the progress of the user/computer
dialogue. Information is displayed and the user response of the computer takes action or displays
further information.
User Initiated Interfaces:
User initiated interfaces fall into two approximate classes:
1. Command driven interfaces: In this type of interface the user inputs commands or queries
which are interpreted by the computer.
2. Forms oriented interface: The user calls up an image of the form to his/her screen and fills in
the form. The forms oriented interface is chosen because it is the best choice.
Computer-Initiated Interfaces:
The following computer initiated interfaces were used:
1. The menu system for the user is presented with a list of alternatives and the user chooses one;
of alternatives.
2. Questions answer type dialog system where the computer asks question and takes action
based on the basis of the users reply.
Right from the start the system is going to be menu driven, the opening menu displays the
available options. Choosing one option gives another popup menu with more options. In this
way every option leads the users to data entry form where the user can key in the data.
Error Message Design:
The design of error messages is an important part of the user interface design. As user is
bound to commit some errors or other while designing a system the system should be designed to
SoftwareRequirementsSpecification

Page17

OnlineQuestionPaperDeliverySystem

be helpful by providing the user with information regarding the error he/she has committed.This
application must be able to produce output at different modules for different inputs.

3.3 Non-Functional Requirements


3.5.1. Performance
Performance can be measured in various ways. One way is technical, seeing how fast a
page loads and how many bytes are transferred. Another is perceived performance, which ties
into usability testing. This can only be measured by testing with patient users and seeing how
satisfied they are with the speed of your interface.
Performance is that 80-90 % of performance happens in the front end. Once the browser
gets the html, the server is done the back end developer can do nothing more. The browser then
starts doing things to our html, and we are at its mercy. This means that to achieve good
performance.

3.5.2. Availability

The application should be available at all times, meaning the user can access it using a web
browser, only restricted by the down time of the server on which the application runs. In case of
a hardware failure or database corruption, a replacement page will be shown. Also in case of a
hardware failure or database corruption, backups of the database should be retrieved from the
server and saved by the administrator. Then the service will be restarted.
3.5.3. Reliability
The reliability of the overall program depends on the reliability of the separate components.
The main pillar of reliability of the application is the backup of the database which is
continuously maintained and updated to reflect the most recent changes. Also the application will
be functioning inside a container (since the implementation is .net oriented). Thus the overall
stability of the application depends on the stability of container and its underlying operating
application.
SoftwareRequirementsSpecification

Page18

OnlineQuestionPaperDeliverySystem

3.5.4. Security

Passwords will be saved encrypted in the database in order to ensure the user's privacy.

Sensitive data will be encrypted before being sent over insecure connections like the
internet.

Certain functions will be assigned to certain modules only.

Data integrity will be checked for critical variables.

3.5.5. Maintainability
A commercial database is used for maintaining the database and the application server
takes care of the site. In case of a failure, a re-initialization of the program will be done. Also the
software design is being done with modularity in mind so that maintainability can be done
efficiently.
3.5.6. Portability
The application is web based and should be compatible with all other systems which have
a installed web browser. The end-user part is fully portable and any system using any web
browser should be able to use the features of the application, including any hardware platform
that is available or will be available in the future.

3.6 Design Constraints

SoftwareRequirementsSpecification

Page19

OnlineQuestionPaperDeliverySystem

3.6.1 Standard Development Tools


The application shall be built using a standard web page development tool that conforms
to Microsofts GUI standards.

3.6.2 Web Based Product


There are no memory requirements:
The computers must be equipped with web browsers such as Internet explorer. The
product must be stored in such a way that allows the client easy access to it. Response time for
loading the product should take no longer than five minutes. A general knowledge of basic
computer skills is required to use the product.

3.7Logical Database Requirements


SQL SERVER 2008
A database management, or DBMS, gives the user access to their data and helps them
transform the data into information. Such database management systems include
dBase, paradox, IMS, SQL Server and SQL Server. These systems allow users to
create, update and extract information from their database.
A database is a structured collection of data. Data refers to the characteristics of people,
things and events. SQL Server stores each data item in its own fields. In SQL Server, the fields
relating to a particular person, thing or event are bundled together to form a single complete unit
of data, called a record (it can also be referred to as raw or an occurrence). Each record is made
up of a number of fields. No two fields in a record can have the same field name.
During an SQL Server Database design project, the analysis of your business needs
identifies all the fields or attributes of interest. If your business needs change over time, you
define any additional fields or change the definition of existing fields.

3.8 Other Requirements


Performance Requirements:
SoftwareRequirementsSpecification

Page20

OnlineQuestionPaperDeliverySystem

Need Of Computerization:
We all know the importance of computerization. The world is moving ahead at

lightning speed and everyone is running short of time. One always wants to get the information
and perform a task he/she/they desire(s) within a short period of time and too with amount of
efficiency and accuracy. The application areas for the computerization have been selected on the
basis of following factors:
1. Minimizing the manual records kept at different locations.
2. There will be more data integrity.
3. Facilitating desired information display, very quickly, by retrieving information from users.
4. Facilitating various statistical information which helps in decision-making?
5. To reduce manual efforts in activities that involved repetitive work.
Updating and deletion of such a huge amount of data will become easier.

4. Analysis Models
Spiral Model
Here in the Online Question Paper Delivery System the spiral model will use as analysis
model.
The steps for Spiral Model can be generalized as follows:

The new system requirements are defined in as much details as possible. This usually
involves interviewing a number of users representing all the external or internal users and
other aspects of the existing system.

A preliminary design is created for the new system.

A first prototype of the new system is constructed from the preliminary design. This is
usually a scaled-down system, and represents an approximation of the characteristics of the
final product.

A second prototype is evolved by a fourfold procedure:


1. Evaluating the first prototype in terms of its strengths, weakness, and risks.
2. Defining the requirements of the second prototype.
3. Planning an designing the second prototype.

SoftwareRequirementsSpecification

Page21

OnlineQuestionPaperDeliverySystem

4. Constructing and testing the second prototype.

At the customer option, the entire project can be aborted if the risk is deemed too great.
Risk factors might involved development cost overruns, operating-cost miscalculation, or
any other factor that could, in the customers judgment, result in a less-than-satisfactory
final product.

The existing prototype is evaluated in the same manner as was the previous prototype, and
if necessary, another prototype is developed from it according to the fourfold procedure
outlined above.

The preceding steps are iterated until the customer is satisfied that the refined prototype
represents the final product desired.

The final system is constructed, based on the refined prototype.

The final system is thoroughly evaluated and tested. Routine maintenance is carried on a
continuing basis to prevent large scale failures and to minimize down time.

4.1 Data Flow Diagrams (DFD)


SoftwareRequirementsSpecification

Page22

OnlineQuestionPaperDeliverySystem

Admin

Admin

Downloader

Data
Storage

Download
Papers

Downloader

SystemProcess

Fig:Context 0th Level Diagram

OpenLogin
Form

Enter
Username
and
Password

Yes

Check
User

Yes

User
Home
Page

No

ValidatesData

Fig:login DFD

SoftwareRequirementsSpecification

Page23

OnlineQuestionPaperDeliverySystem

Admin Details Data Flow:


1st level DFD:

Downloader

LoginMaster
OpenForm
Downloaders
Registration

EnterLogin
Details

ValidatesData

Manage
College
Master

Upload
Paper

Manage
Subject
Master

Manage
Branch
Master

Manage
Exam
Master

Logout

DataStorage

Fig:Admin Details Data Flow 1st level DFD

SoftwareRequirementsSpecification

Page24

OnlineQuestionPaperDeliverySystem

Downloader Details Data Flow:


1st level DFD:
LoginMaster
OpenForm
Manage
ContactDetails

EnterLogin
Details
Download
Paper

Verification

Logout

ValidatesData

Fig:Downloader Details Data Flow 1st level DFD

SoftwareRequirementsSpecification

Page25

OnlineQuestionPaperDeliverySystem

Admin Details Data Flow:


2nd level DFD:
Downloader

Send
PasswordVia
SMS

Manage
Downloader

SendSecurity
CodeViaSMS

Display
Downloader
Registration

Manage
College
Master

Manage
Branch
Master

Display
Colleges

Manage
Subject
Master

Display
Branches

ManageExam
Master

Displays
Subjects

UploadPaper

Fig:Admin Details Data Flow2nd level DFD

SoftwareRequirementsSpecification

Page26

OnlineQuestionPaperDeliverySystem

Downloader Details Data Flow:


2nd level DFD:
LoginMaster

Manage
Contact
Details

Downloaders
Login

Update
Details

Fig:Downloader Details Data Flow 2nd level DFD

4.2 State Transition Diagram

Fig: Downloader Details


SoftwareRequirementsSpecification

Page27

OnlineQuestionPaperDeliverySystem

Fig: Admin Details

SoftwareRequirementsSpecification

Page28

OnlineQuestionPaperDeliverySystem

4.3 Usecase Diagram

Fig: Usecase of OQDS

SoftwareRequirementsSpecification

Page29

You might also like