You are on page 1of 37

Inter national Advances Diploma in Computer Study (IADCS) System Analysis and Design (SAD)

Introduction

In this assignment will allow my demonstrate an understanding of the


object-oriented analysis and design of a cataloguing system. I have
analysis and design a system for an Art Gallery including the creation of
a prototype user interface and the transfer of information held on
standard paper into the system.

Candidate name: MD. Ibrahim Amin NCC candidate NO: Examination Cycle: March 2009

Assignment title: Art gallery Module name: System Analysis and Design (SAD) Page no : 1
Inter national Advances Diploma in Computer Study (IADCS) System Analysis and Design (SAD)

Task 1
Analysis the required system using object-oriented method and produce a function
Model including..

● Use case diagrams

● Use case specifications

● Activity diagrams

Candidate name: MD. Ibrahim Amin NCC candidate NO: Examination Cycle: March 2009

Assignment title: Art gallery Module name: System Analysis and Design (SAD) Page no : 2
Inter national Advances Diploma in Computer Study (IADCS) System Analysis and Design (SAD)

Use case diagram for loan exhibit

Order exhibit

Other gallery
Provide exhibit

Staff Update record

Assistant Curator <<Extend>>


Curator

Manage Privet collector


catalogue

Figure: Use case diagram for loan exhibit

Candidate name: MD. Ibrahim Amin NCC candidate NO: Examination Cycle: March 2009

Assignment title: Art gallery Module name: System Analysis and Design (SAD) Page no : 3
Inter national Advances Diploma in Computer Study (IADCS) System Analysis and Design (SAD)

Use case diagram for return exhibit

Check exhibit
Record

Return Exhibit

Payment Other gallery

Staff
Update Record Fees Due

Curator Assistant Curator


<<Extend>>
Privet collector
Manage record

Figure: Use case diagram for return exhibit

Candidate name: MD. Ibrahim Amin NCC candidate NO: Examination Cycle: March 2009

Assignment title: Art gallery Module name: System Analysis and Design (SAD) Page no : 4
Inter national Advances Diploma in Computer Study (IADCS) System Analysis and Design (SAD)

Use case speciation for loan exhibit:


Display item for public viewing to art gallery management staff are responsibilities for order
item as a loan for certain time to author gallery or privet collector E.g. curator and assistant
curator.
The author gallery and privet curator give loan item for certain time,
Management staff also keeps record and these items are held in the art gallery to exhibit in
exhibition room.
After processing of that management staff will update the records by extend manage record.

Use case speciation for return exhibit:


Display item for public viewing to art gallery management staff are responsibilities for Collect
item as a loan for certain time to author gallery or privet collector E.g. curator and assistant
curator.
After collect items, will be keeping record and these items are held in the art gallery to exhibit in
exhibition room. After complete exhibition it is responsibility of management staff to return item
to the owner. e.g. Other gallery and privet collector. In the time of return staff also requires
making payment to the owner. If the item is not return on time there will be include Due.
After processing of that management staff will update the records by extend manage record.

Candidate name: MD. Ibrahim Amin NCC candidate NO: Examination Cycle: March 2009

Assignment title: Art gallery Module name: System Analysis and Design (SAD) Page no : 5
Inter national Advances Diploma in Computer Study (IADCS) System Analysis and Design (SAD)

Activity diagram for loan exhibit

Request for exhibit loan

Other gallery Privet collector

No

Yes

Add record

Received exhibit

Show exhibit

Figure: Activity diagram for loan exhibit

Candidate name: MD. Ibrahim Amin NCC candidate NO: Examination Cycle: March 2009

Assignment title: Art gallery Module name: System Analysis and Design (SAD) Page no : 6
Inter national Advances Diploma in Computer Study (IADCS) System Analysis and Design (SAD)

Activity diagram for return exhibit

Return exhibit

Other gallery Privet collector

Pay fees

Check Due

No
Pay Due
Yes

Add record

Received exhibit

Candidate name: MD. Ibrahim Amin NCC candidate NO: Examination Cycle: March 2009

Assignment title: Art gallery Module name: System Analysis and Design (SAD) Page no : 7
Inter national Advances Diploma in Computer Study (IADCS) System Analysis and Design (SAD)

Figure: Activity diagram for return exhibit

Task 2
Analysis the required system using object –oriented method and produce a
standard model including.
● Class diagram
● Attribute operation

Candidate name: MD. Ibrahim Amin NCC candidate NO: Examination Cycle: March 2009

Assignment title: Art gallery Module name: System Analysis and Design (SAD) Page no : 8
Inter national Advances Diploma in Computer Study (IADCS) System Analysis and Design (SAD)

Class diagram for show exhibit to art Gallery:


Other collector Loan Management staff
Loan Type: Request loan
Name: 0….*
Address: Loan id:
Phone: Date of issue:
Get Loan () Date of return:
Add () 1
Update () Get loan ()
Add ()
Curator Assistant Curator
Update ()
Name: Name:
Get loan Due ()
Title: Title:
Privet gallery 1 0….* Employ ID Employ ID
Name: 1 Phone: Phone:
Art gallery Age:
Address: Age: ADD ()
Name:
Phone: ADD () Edit ()
Get Loan () Address: Edit () Update record ()
Add () Phone: Update () Search ()
Update () Show () Search ()
Get loan ()
Ad
Return () d re
cor
Add () Collect exhibit d
Update ()

Exhibition room 0….* 1 Record


1 Show Exhibit Type:
Type: ID: Location:
Size: Name:
Room no: Location: Add ()
0….*
Show () 0…* Artist: Delete ()
Update () Fees Update ()
Show ()
Add ()
Delete ()
Search ()

Candidate name: MD. Ibrahim Amin NCC candidate NO: Examination Cycle: March 2009

Assignment title: Art gallery Module name: System Analysis and Design (SAD) Page no : 9
Inter national Advances Diploma in Computer Study (IADCS) System Analysis and Design (SAD)

Task 3
Analysis the required system using object –oriented method and
produce a behavioral model including.

● Sequence diagram
● State machines
● Communication diagram

Candidate name: MD. Ibrahim Amin NCC candidate NO: Examination Cycle: March 2009

Assignment title: Art gallery Module name: System Analysis and Design (SAD) Page no : 10
Inter national Advances Diploma in Computer Study (IADCS) System Analysis and Design (SAD)

Sequence diagram for exhibition

Art gallery Store room Other collector/ Exhibition room


privet gallery
Start search item ()

Search ()

[Found] collect
Show ()

[Not Found] Loan

Send Loan request ()


Exhibit
Request Confirmation

* Collect Exhibit and keep record ()

Done Show ()

Figure: Sequence diagram for exhibition

Candidate name: MD. Ibrahim Amin NCC candidate NO: Examination Cycle: March 2009

Assignment title: Art gallery Module name: System Analysis and Design (SAD) Page no : 11
Inter national Advances Diploma in Computer Study (IADCS) System Analysis and Design (SAD)

State machines for exhibition

Search
Held and
Exhibit Processing Loan exhibit
record
exhibit
If not

Search Show exhibit


exhibit

Figure: state machines for exhibition

Communication diagram for exhibition

Exhibition
Staff room

Fee
dbac
k
1: Request loan 4: show exhibit

Other gallery /
privet collector Record
Fee ack
dbac edb
2: k Fe
Ge rd
t lo e co
an r
a te
Exhibit
Upd
3:

Figure: Communication diagram for exhibition

Candidate name: MD. Ibrahim Amin NCC candidate NO: Examination Cycle: March 2009

Assignment title: Art gallery Module name: System Analysis and Design (SAD) Page no : 12
Inter national Advances Diploma in Computer Study (IADCS) System Analysis and Design (SAD)

Task 4
Research the possible method for adding the current paper based information
to the system. Write a brief report that:

a) Outline the possible method of transferring the data.

b) State the advantages of each method.

c) Recommendation the method should be utilized with reason for yor


recommendation

Candidate name: MD. Ibrahim Amin NCC candidate NO: Examination Cycle: March 2009

Assignment title: Art gallery Module name: System Analysis and Design (SAD) Page no : 13
Inter national Advances Diploma in Computer Study (IADCS) System Analysis and Design (SAD)

a)

Data transferring method

Tow types of data transferring method

1. Online data transferring: it is refers to data the under the direct

control of the computer. Example floppy disk, magnetic disk,


and mass storage.
Where there is a need to refer to data frequently on line storage is
employed. Online data file are commonly referred to as an
organization’s data base. Where information is currently located in
one or several data base. How ever within a distributed processing
mode, data file are referred to as distributed data base because
many data base are scattered throughout an organizational
operation.

2. Offline data transferring: it is refers to data that are not under

the direct control of the computer. Example punched card and


magnetic card.
This data file can be use in input a computer system to permit the
updating and retrieval of information, or they can be used to
produce output from the system. Generally data needing to be
referenced only periodically, usually weekly or frequently, are good
candidates for off line storage.

Candidate name: MD. Ibrahim Amin NCC candidate NO: Examination Cycle: March 2009

Assignment title: Art gallery Module name: System Analysis and Design (SAD) Page no : 14
Inter national Advances Diploma in Computer Study (IADCS) System Analysis and Design (SAD)

b)
Advantages and disadvantages of data transferring method
Off-line data transferring:
Punched card
Advantages
 Provide a check of information printed on the card
 For small volumes of data
 Economical and efficient from of file storage.
Disadvantages
 Limited amount of storage data
 Many times, it is necessary to employ more then once card to store a
record of information.
 Processing of card input and card output is slow in compression of
magnetic tape and magnetic disk.

Magnetic tape
Advantages
 It's inexpensive to operate and buy, and even cheaper to store,
 It is used for cheap backup of the system data or the information.
 The cost of storage of the data or the information in the tape drive is much
cheaper as that comparable to the other forms of the storage media.
 The heads in the tape media are separated from the media..
 The assumption is made in consideration with the tape drive’s internal
structure.
 it is in existence along with the usage of the tape drive is that the tapes
are usually stored as the offline The most common one that can be
considered is the power failure or any power surges; can also cause the

Candidate name: MD. Ibrahim Amin NCC candidate NO: Examination Cycle: March 2009

Assignment title: Art gallery Module name: System Analysis and Design (SAD) Page no : 15
Inter national Advances Diploma in Computer Study (IADCS) System Analysis and Design (SAD)

failure of the tape drive. The reliability and the cost of operation involved is
more in the case of the tape drives. In short the tape drives are considered

as more durable than the disk drives like the hard disks, floppy disks and the
optical storage disks.

Disadvantages
 Regarding the tape backup is that of the access time or the seek time that
it requires.
 Retrieving data from most tape backup drives requires that the data files
be restored to the hard disk. Other types of backup storage can be treated
as a drive letter for direct use from the media.
 The access time is more in case of the tape drives than in comparison
with the other media storage devices.

On-line data transferring:


Floppy disk
Advantages
 Floppy disk red and write information much faster.
 Stored data are sequentially
 They are very cheap to buy and floppy disc drives are very common.

Disadvantages
 They are easily physically damaged if unprotected and magnetic fields can
damage the data.
 They are relatively slow to access because floppy discs rotate far more
slowly than hard discs, at only six revolutions per second, and only start
spinning when requested. The access speed is about 36 KB per second.
 Floppy Disc is the unreliability
Candidate name: MD. Ibrahim Amin NCC candidate NO: Examination Cycle: March 2009

Assignment title: Art gallery Module name: System Analysis and Design (SAD) Page no : 16
Inter national Advances Diploma in Computer Study (IADCS) System Analysis and Design (SAD)

Magnetic disk file


Advantages
 Any item of data is as quickly obtained as any other.
 Ability to process transaction without previously storing the data.
 Random access operation
 Direct access ability plus the vast storage capability.
 Retrieve fast transfer rate made them widely used in computer operation.

Disadvantages
 Higher cost over magnetic tape file
 None really! It can however be a real disaster when they eventually fail
because few home users have the data on their home computer hard
drive backed up.

Mass storage file

Advantages
 Large amount of data that can be stored on line
 Coast of mass storage making such a method of storage economically
feasible.
 •A user is linked directly to a computer for the purpose of data input or
receiving output.
 There is a direct link from transmission medium to the computer
processor.

Candidate name: MD. Ibrahim Amin NCC candidate NO: Examination Cycle: March 2009

Assignment title: Art gallery Module name: System Analysis and Design (SAD) Page no : 17
Inter national Advances Diploma in Computer Study (IADCS) System Analysis and Design (SAD)

c)
Recommendation:

My recommendation about data transferring method that Online- Mass storage


File method is better, because mass storage file provide secondary storage
capability. Such storage system reflects significant improvement in operating
efficiency and enhanced data security over conventional computer tap libraries.
For example, the CDC 38500 mass storage system from control data corporation
holds 2000 magnetic tap cartridges, each of which has a data storage capacity of
8 million byte of on-line data, totaling a maximum of 16 billion characters of
stored data system capacity is equivalent to approximately 6400 average tape
reels or 200 disk drive. Also, IBM offers a comparable system, the 3850 Mass
storage system.

The Mass storage system may be under the control of up to four computers. It
also operates through a data string process that is information transmitted to
intermediate disk storage for subsequence computer processing. Over all, such a
system has capability to meet storage requirement of any large computer
installation.

Candidate name: MD. Ibrahim Amin NCC candidate NO: Examination Cycle: March 2009

Assignment title: Art gallery Module name: System Analysis and Design (SAD) Page no : 18
Inter national Advances Diploma in Computer Study (IADCS) System Analysis and Design (SAD)

Candidate name: MD. Ibrahim Amin NCC candidate NO: Examination Cycle: March 2009

Assignment title: Art gallery Module name: System Analysis and Design (SAD) Page no : 19
Inter national Advances Diploma in Computer Study (IADCS) System Analysis and Design (SAD)

Task 5
Create a prototype user interface for the gallery catalogue, as a minimum,
the flowing function:

a) Searching for the location of an item.

b) Editing an item’s detail

c) Adding a new item’s

d) Listing item’s due for return to their owners by a selected date

Print screenshot of the user inter face for the in a), b), c), and d) above.

Candidate name: MD. Ibrahim Amin NCC candidate NO: Examination Cycle: March 2009

Assignment title: Art gallery Module name: System Analysis and Design (SAD) Page no : 20
Inter national Advances Diploma in Computer Study (IADCS) System Analysis and Design (SAD)

I have create a prototype user interface for the art gallery catalog system including
the searching for the location of an item, editing an item’s details, adding a new item
and listing due for return to their owners by a selected data.

a) Searching for the location of an item

Location Exhibition room

Step: 1 for search item. input the item name or item number in the box of item name or
item number. After input the item name or item number click to search Button. Then
display search item.

Candidate name: MD. Ibrahim Amin NCC candidate NO: Examination Cycle: March 2009

Assignment title: Art gallery Module name: System Analysis and Design (SAD) Page no : 21
Inter national Advances Diploma in Computer Study (IADCS) System Analysis and Design (SAD)

b) Editing an item’s details

Location Exhibition room

Step: 2 for Edit item. Input the item name or item number in the box of item name or item
number. After input the item name or item number click to Edit Button. Then display and
update item on database.

Candidate name: MD. Ibrahim Amin NCC candidate NO: Examination Cycle: March 2009

Assignment title: Art gallery Module name: System Analysis and Design (SAD) Page no : 22
Inter national Advances Diploma in Computer Study (IADCS) System Analysis and Design (SAD)

c) Adding a new item

Location Exhibition room

Step: 3 for ADD item. Input the item name, item number, printer, price and Location in the
box of item name or item number, printer, price and Location. After input the item name or
item number click to Add Button. Then display and creat item on database.

Candidate name: MD. Ibrahim Amin NCC candidate NO: Examination Cycle: March 2009

Assignment title: Art gallery Module name: System Analysis and Design (SAD) Page no : 23
Inter national Advances Diploma in Computer Study (IADCS) System Analysis and Design (SAD)

Listing due for return to their owners by a selected data

View

Step: 4 listing due for return to their owners by a selected data. After
input the item name or item number click to View Button. Then display
list due for return to their owners by a selected data.

Candidate name: MD. Ibrahim Amin NCC candidate NO: Examination Cycle: March 2009

Assignment title: Art gallery Module name: System Analysis and Design (SAD) Page no : 24
Inter national Advances Diploma in Computer Study (IADCS) System Analysis and Design (SAD)

Task 6
Create a relational database design for the Art Gallery catalogue
system including:

a) A set of fully normalized showing the normalization process


for each.

B) Data dictionary for all items including in the database design.

Candidate name: MD. Ibrahim Amin NCC candidate NO: Examination Cycle: March 2009

Assignment title: Art gallery Module name: System Analysis and Design (SAD) Page no : 25
Inter national Advances Diploma in Computer Study (IADCS) System Analysis and Design (SAD)

a)
Normalization process

Un Normalized 1 NF 2NF 3 NF Fully


data normalize
Item _name Item Item Item Item
Item_ID Item _name Item _name Item _name Item _name
artist Item_ID Item_ID Item_ID Item_ID
Price artist artist artist artist
Price Price Price Price
Item Type Item Type Item Type Item Type Loan
Loan ID Loan ID Loan ID Loan ID Item Type
Date of issue: Date of issue: Date of issue: Date of issue: Loan ID
Date of return: Date of return: Date of return: Date of return: Date of issue:
Staff Name Staff Name * Employe_id Date of return:
Staff Name Employ ID Employ ID Management staff * Employe_ID
Employ ID Title Title Staff Name Management staff
Title Phone: Phone: Employ ID Staff Name
Phone: Age: Age: Title Employ ID
Age: Privet gallery Privet gallery Phone: Title
P_Name: P_Name: Age: Phone:
P_Name: P_Address: P_Address: Privet gallery Age:
P_Address: P_Phone: P_Phone: P_Name Privet gallery
P_Phone: * Loan_ID P_Address P_Name
P_Phone P_Address
* Loan_ID P_Phone
* Loan_ID

Candidate name: MD. Ibrahim Amin NCC candidate NO: Examination Cycle: March 2009

Assignment title: Art gallery Module name: System Analysis and Design (SAD) Page no : 26
Inter national Advances Diploma in Computer Study (IADCS) System Analysis and Design (SAD)

b)
Data dictionary

Data dictionary for exhibit

Title System Sheet


Data 1
Exhibitio Local art
Diction gallery
ary Type: item Name: exhibit

Definition:

Exhibit = Item name+ item number +


Location +printer +Price

Occurrence: One or, two time per month


Local
art Operation: Show, Add, Delete, Search
gallery
system

Md: Ibrahim Length:


Author:
Date:
05/02/2009 120 kbps

Candidate name: MD. Ibrahim Amin NCC candidate NO: Examination Cycle: March 2009

Assignment title: Art gallery Module name: System Analysis and Design (SAD) Page no : 27
Inter national Advances Diploma in Computer Study (IADCS) System Analysis and Design (SAD)

Data dictionary for privet gallery

Title System
Sheet
Data Local art 2
Exhibitio
Diction gallery
n
ary Type: Name: privet gallery
organization

Definition:

Privet gallery = name+ address +phone


number printer +

Occurrence: One or, two time per month


Local
art Operation: Get Loan ,Add record ,Update record
gallery
system

Md: Ibrahim Length:


Author:
Date:
05/02/2009 60 kbps

Candidate name: MD. Ibrahim Amin NCC candidate NO: Examination Cycle: March 2009

Assignment title: Art gallery Module name: System Analysis and Design (SAD) Page no : 28
Inter national Advances Diploma in Computer Study (IADCS) System Analysis and Design (SAD)

Data dictionary for management staff

Title System
Sheet
Data Local art 3
Exhibitio
Diction gallery
n
ary Type: staff Name: management
staff

Definition:

Management staff = staff id+ staff name


+Staff title+ phone+ age

Occurrence: One or, two time per month


Local
art Operation: ADD record, Edit record, Update record,
gallery Search,
system

Md: Ibrahim Length:


Author:
Date:
05/02/2009 100 kbps

Candidate name: MD. Ibrahim Amin NCC candidate NO: Examination Cycle: March 2009

Assignment title: Art gallery Module name: System Analysis and Design (SAD) Page no : 29
Inter national Advances Diploma in Computer Study (IADCS) System Analysis and Design (SAD)

Data dictionary for Loan Item

Title System Sheet


Data 4
Exhibitio Local art
Diction gallery
ary Type: item Name: loan

Definition:

Loan item = Item type+ Loan id +date of


issue + date of return

Occurrence: One or, two time per month


Local
art Operation: Get loan. Add loan record. Update loan,
gallery Due
system

Md: Ibrahim Length:


Author:
Date:
05/02/2009 120 kbps

Candidate name: MD. Ibrahim Amin NCC candidate NO: Examination Cycle: March 2009

Assignment title: Art gallery Module name: System Analysis and Design (SAD) Page no : 30
Inter national Advances Diploma in Computer Study (IADCS) System Analysis and Design (SAD)

Task 7
Research the security issue relating to the gallery computer system write a
brief report:

a) Explain the possible treats to security.

b) Describe the possible consequences of a branch of security.

c) States the method you would use to ensure that only the curator
and assistant curators have write, edit and delete permission.

d) Explain how you would allow the website to have read-only


access to the relevant information.

Candidate name: MD. Ibrahim Amin NCC candidate NO: Examination Cycle: March 2009

Assignment title: Art gallery Module name: System Analysis and Design (SAD) Page no : 31
Inter national Advances Diploma in Computer Study (IADCS) System Analysis and Design (SAD)

a)
Possible treats to security in an Art Gallery:

Physical attacks
Along with the many ways that a network can be attested by electronic means. There
are many ways that it can be attested physically. This can be as a result of malicious
activity, or a consequence of natural events, or by accident. In general, physical
attacks tend to result in denial of service. This kind of attest including…
 Fire, either accidentally started or deliberately.
 Lighting strikes
 Flood
 Earthquake damage
 Theft of equipment
 Damage to Hardware
 Damage software

Virus attacks
A virus is a malicious program that can be attacked to an executable program, or can
be in other executable forms, such as macros scripts. The program can carry a
payload that causes damage to the host computer system that has been infected.

Unauthorized access
Unauthorized access System attempt to access computing facilities for which they
have not been authorized. Cracking a computer's defenses is seen as the ultimate
victimless crime. The perception is that nobody is hurt or even endangered by a little

Candidate name: MD. Ibrahim Amin NCC candidate NO: Examination Cycle: March 2009

Assignment title: Art gallery Module name: System Analysis and Design (SAD) Page no : 32
Inter national Advances Diploma in Computer Study (IADCS) System Analysis and Design (SAD)

stolen machine time. Crackers enjoy the simple challenge of trying to log in, just to see
whether it can be done. Most crackers can do their harm without confronting anybody,
not even making a sound. In the absence of explicit warnings not to trespass in a
system, crackers infer that access is permitted. An underground network of hackers

helps pass along secrets of success; as with a jigsaw puzzle, a few isolated pieces
joined together may produce a large effect. Others attack for curiosity, personal gain,
or self-satisfaction. And still others enjoy causing chaos, loss, or harm. There is no
common profile or motivation for these attackers.
A person not authorized to use information in the computer can get access to
information and use the information.

b) Possible consequences of a branch of security

Building Maintenance
A regime of planned and documented building maintenance will go a long way towards
minimizing the risk of floods, fire, theft, vandalism and invasion by pests. Routines
should include regular temperature and humidity checks in areas designated as
vulnerable to damp.

Equipment Maintenance
Equipment maintenance is essential both to ensure that equipment failure does not
cause a treats and to assure the reliability of equipment in a disaster situation. Ensure
that equipment stored to deal with a disaster is included in maintenance routines

Anti-virus software
Anti-virus is used to identify and remove computer viruses, as well as many other
types of harmful computer software, collectively referred to as malware. While the first
antivirus software was designed exclusively to combat computer viruses.
Candidate name: MD. Ibrahim Amin NCC candidate NO: Examination Cycle: March 2009

Assignment title: Art gallery Module name: System Analysis and Design (SAD) Page no : 33
Inter national Advances Diploma in Computer Study (IADCS) System Analysis and Design (SAD)

User authentication
One of the mechanisms that is used in computerized system is authentication. These
are mechanisms that allow the computer system to identify person, or system
attaching to the computer system, and to determine whatever or not are they allowed
doing so.
A simple example of an authentication mechanism is the use of a user name and
password. The systems examine the username, looks the password it expects for that
user and compares it with the password given.
In a general authentication mechanism consist of a series of one or more Challenges
from the system to the user, flowing by the response from the user to the system. In
the password example, the Challenge request the username and password the
response tells the system what they are. Other types of challenge might include the
use of …
 Pin number
 Finger print recognition
 Smart card
 Voice recognition
 Handwriting (signature ) recognition

In some case these mechanism might be used in combination.

Candidate name: MD. Ibrahim Amin NCC candidate NO: Examination Cycle: March 2009

Assignment title: Art gallery Module name: System Analysis and Design (SAD) Page no : 34
Inter national Advances Diploma in Computer Study (IADCS) System Analysis and Design (SAD)

c)
Method to ensure that only the curator and assistant curator have write, edit and
delete permission:

 I will be ensure only the management staff write, edit and delete by flowing way
….
First go database and “click on” Tools ” then “click on” security and again “click on” User and
Group Permission. Figure:1

figure: 1
Than “click on” Groups and pick up Modify Design, Administer, then “click on”
Apply and OK. In Figure: 2

Candidate name: MD. Ibrahim Amin NCC candidate NO: Examination Cycle: March 2009

Assignment title: Art gallery Module name: System Analysis and Design (SAD) Page no : 35
Inter national Advances Diploma in Computer Study (IADCS) System Analysis and Design (SAD)

Figure: 2
 Staff (curator and assistant curator) is required to sign an art gallery system and
accept the Usage Policy.
 For each will be an individual User-ID and password.
 Patrons/ Brower are can access only display item and comment to this item.
 Only staff can access ADD, Update. Search, Edit and delete function.
 Database can access with a limited number of licenses needs to have regulated
access.
 I will be provide filtered Internet access to staff

d)
Read only access method of web site to relevant information

In Web applications, it is very common for a page to simply display data — that is, for
the data on the page to be read-only. Typical examples include catalog listings, search
results, and so on. Users might act on the data by clicking a button to add an item to a
shopping cart or clicking a link on the page, but those actions do not directly affect the
data on the page.

Candidate name: MD. Ibrahim Amin NCC candidate NO: Examination Cycle: March 2009

Assignment title: Art gallery Module name: System Analysis and Design (SAD) Page no : 36
Inter national Advances Diploma in Computer Study (IADCS) System Analysis and Design (SAD)

It is possible to grant read-only repository access to people using the password-


authenticated server (The other access methods do not have explicit support for read-
only users because those methods all assume login access to the repository machine
anyway, and therefore the user can do whatever local file permissions allow her to do.)
A user who has read-only access can do only those CVS operations which do not
modify the repository, except for certain "administrative" files (such as lock files and
the history file). It may be desirable to use this feature in conjunction with user-
aliasing (*note Password authentication server ::.). However, note that read-only
access does not repeal the existing security considerations in *Note Password
authentication security.
There are two ways to specify read-only access for a user: by inclusion, and by
exclusion.

Inclusion" means listing that user specifically in the


`$CVSROOT/CVSROOT/readers' file, which is simply a new line-separated list of
users. Here is a sample `readers' file:
Melissa
Splotnik
Jrandom

(Don't forget the new line after the last user.)

"Exclusion" means explicitly listing everyone who has *write* access--if the file

$CVSROOT/CVSROOT/writers exists, then only those users listed in it have write


access, and everyone else has read-only access (of course, even the read-only users
still need to be listed in the CVS `password' file). The `writers' file has the same format
as the `readers' file.

Candidate name: MD. Ibrahim Amin NCC candidate NO: Examination Cycle: March 2009

Assignment title: Art gallery Module name: System Analysis and Design (SAD) Page no : 37

You might also like