Professional Documents
Culture Documents
System Analysis involves a detailed study of the current system, leading to specifications of a
new system. Analysis is a detailed study of various operations performed by a system and their
relationships within and outside the system. During analysis, data are collected on the available
files, decision points and transactions handled by the present system. Interviews, on-site
observation and questionnaire are the tools used for system analysis.
System Analysis also includes sub-dividing of complex process involving the entire system,
requirements.
• Functional hierarchy showing the functions to be performed by the new system and
• Function network which are similar to function hierarchy but they highlight the
• List of attributes of the entities - these are the data items which need to be held about
1
• Providing proper login ids to the people which maintain security of the system.
• Makes the procedure simple for the people to search for their choice.
Name,
Use Login ID Logi Searc
Age,
r and n h
Gender
Password
etc.
Name,
Age,
Gender
etc. Profile
Personal Details of
the person
searched
The block diagram contains the main modules of the system that are to be used in its
development. There will be a login module, which will keep a track of security by providing
authorized access. Then there is a search module which will help the user to search the desired
results. He/she will be entering his area of interest and the rest of the work is done by the search
filter which will refine the search on the basis of the information entered. This makes easy for
one person to find the other person. After that there is a profile module which will keep the track
of the profiles of all the registers users on the website. They all have full rights to update, delete,
edit and save any changes made by them; the same will be reflected soon after they are updated.
2
2.4 System Processes and Input Output Identification
1. Login process and registration module- In this process, teacher/operator/student can access
the software by putting id and password. If id and password is correct he/she can access the
software.
In this module when user fill-ups first three registration form user will get a member id.
After getting member id user will use his/her member id to login, and user can modify his/her
3. Search Module - The user can search for his/her perfect match.
4. Profile Management Module - After login user will be redirected to the page containing his
information. User can edit, update and delete the profile if no longer he wants to retain it.
This section contains the details about all the processes that are performed in the software system
and also tells us about the input and output identification i.e. what is the input being given and
3
• User registration process: In this process all the details about the current user will be
collected. There will be many questions regarding his likes, dislikes, hobbies, interests and other
details. This will help other users to find out more and more information about the current user.
Input: The user will enter the details of current user regarding his likes, dislikes etc.
Process: All the processing regarding the addition, updating and deletion of a record is done
here.
Output: The other users can see the records of a particular person.
• Search process: This process is responsible for the search that will take place. There will be
search filters that will help the users to filter their search and categorize their interest. This will
prove to be a very powerful feature that will simplify the search process to a great extent.
Input: The current user will enter the details about the type of person he/she is interested.
Process: Based on the details that will be entered a search process will take place, that will filter
• Profile Management: Here the profiles of all the users will be maintained. If a particular
user wants to modify his/her details then he/she could do so with the help of this module.
4
2.1.5 Input / Output data description:
<<Include
>> Add
Profile <<Include
>>
<<Include Delete
>>
Updat
e 5
Use Search
r
Fig 2.5 Use Case Diagram
2.7 Identification & Description various Security checks & Validations checks in the system
Security needs
Validation checks
6
• In the textbox where name is to be entered should not contain any non alphabetic value.