Professional Documents
Culture Documents
Acknowledgement
Acknowledgement
Acknowledgement
LO2 Develop a fully functional relational database system, based on an existing system design
Pass, Merit & Distinction P2 P3 M3 M3 D2
Descripts
* Please note that grade decisions are provisional. They are only confirmed once internal and external moderation has taken place and
grades decisions have been agreed at the assessment board.
Assignment Feedback
Formative Feedback: Assessor to Student
Action Plan
Summative feedback
1. A cover page or title page should be attached to your assignment. Use page 1 of this
assignment brief as your cover page and make sure all details are accurately filled.
2. The entire assignment brief should be attached as the first section of your assignment.
3. The assignment should be prepared using a word processing software.
4. The assignment should be printed single sided in an A4 sized paper.
5. Allow 1” margin on top, bottom and right sides of the paper and 1.25” on the left side (for
binding).
1. The font size should be 12 point, and should be in the style of Time New Roman.
2. Set line spacing to 1.5. Justify all paragraphs.
3. Ensure that all headings are consistent in terms of size and font style.
4. Use footer function on the word processor to insert your name, unit, assignment no, and
page number on each page. This is useful if individual sheets get detached from the
submission.
5. Use the spell check and grammar check function of the word processing application to
review the use of language on your assignment.
Important Points:
1. Carefully check carefully the hand in date and the instructions given with the assignment.
Late submissions will not be accepted.
2. Ensure that sufficient time is spent to complete the assignment by the due date.
3. Do not wait till the last minute to print or bind the assignment. Such excuses will not be
accepted for late submissions.
4. You must be responsible for efficient management of your time.
5. If you are unable to hand in your assignment on time and have valid reasons such as illness,
you may apply (in writing) for an extension.
6. Failure to achieve at least a PASS grade will result in a REFERRAL grade.
7. Non-submission of work without valid reasons will lead to an automatic REFERRAL. You will
then be asked to complete an alternative assignment.
8. If you use other people’s work or ideas in your assignment, it must be properly referenced,
using the HARVARD referencing system, in your text or any bibliography. Otherwise, you’ll
be found guilty of committing plagiarism.
9. If you are caught plagiarising, your grade will be reduced to a REFERRAL or at worst, you
could be excluded from the course.
Student Declaration
I hereby, declare that I know what plagiarism entails, namely to use another’s work and to present it
as my own without attributing the sources in the correct form. I further understand what it means to
copy another’s work.
Issue Date
Submission Date
Submission format
Part 1: The submission is in the form of an individual written report. This should be written
in a concise, formal business style using single spacing and font size 12. You are required
to make use of headings, paragraphs and subsections as appropriate, and all work must be
supported with research and referenced using the Harvard referencing system. Please also
provide a bibliography using the Harvard referencing system. The recommended word
limit is 2,000–2,500 words, although you will not be penalised for exceeding the total word
limit.
Part 2: The submission is in the form of a fully functional relational database system
demonstrated to the Tutor; and an individual written report (please see details in Part 1
above).
Part 3: The submission is in the form of a witness statement of the testing completed by
the Tutor; technical documentation; and a written report (please see details in Part 1
above).
Unit Learning Outcomes:
LO1 Use an appropriate design tool to design a relational database system for a
substantial problem.
LO2 Develop a fully functional relational database system, based on an existing
system design.
LO3 Test the system against user and system requirements.
LO4 Produce technical and user documentation.
Assignment Brief and Guidance:
*Please note that assignment guidance is for reference only and should be more
specific in detail to meet customized needs.
Assignment brief
Case study
You are employed as a Database Developer for a large IT development company.
The company has been approached by a transport company called Smart
Movers which has grown to a level where need to have an automated system to
handle day today operational activities to meet customer demands. You are
given the job to design and develop a database solution for Smart Movers to
meet their business requirements.
The company transports chemical products from one location to another on
behalf of registered customers. Customers are of three types namely Catogory1,
2 and 3. Each customer is given a unique customer number and his or her details
have to be recorded in the system.
Each transport operation is called a job, which involves picking up one or more
loads of the products from a customer requested start location and delivers it to
a customer requested destination. A unique number is given for each job and for
each load when they are created.
A Load is transported using a particular transport unit, which consists of a lorry,
a driver, assistant, and a container (for carrying the product) A container is fixed
to a trailer so it needs to be coupled to a lorry at the start of a Job. (Single
container can transport only one chemical product due to safety requirements)
Payments for a job depends on customer type, product type (No Risk, High risk)
and the load type (small, medium and large). Transport operations are run from
9 regional depots. Jobs are allocated to individual depots to service. Depots
hold, manage and maintain their own transport units which are permanently
allocated to them to service Jobs. Normally transport units are held at the base
Depot they belong.
The final system should be able to provide the required information for
management decision making and to handle daily operations efficiently and
effectively.
Activity 1
1) Design and produce a comprehensive database design document for the above
scenario and it should cover the below mentioned points.
Activity 2
• Implement the database according to the provided ER diagram and use DDL
statements.
• Implement a GUI based system to view, insert, update, delete data in the tables.
• Implement validation methods explained in the Activity 1.
• Implement join queries display the details payment with the job details and the
customer details
• Implement and access DML (select, update, delete) by giving meaningful
examples
from the developed database
• Explain and implement the security mechanisms in the developed database (EX:
- User groups, access permissions).
• Explain and implement the below mentioned SQL statements from the
developed
database by giving meaningful examples.
• (Group by, Order by, Having, Between, Where)
Activity 3
3) Test the developed database system which has created in the Activity 2.
• Create a test plan to test the system against user and system requirements.
• Create test cases to test the developed database.
• Explain and access how the selected test data can be used improve the
effectiveness of testing.
• Get independent feedback and evaluate the effectiveness on the developed
database solution from the non-technical users and some developers.
Activity 4
P1 Design a relational
database system using
appropriate design tools and
techniques, containing at
least four interrelated tables,
with clear statements of user
and system requirements.
M1 Produce a comprehensive
design for a fully functional
system that includes interface
and output designs, data
validations and data
normalization.
P3 Implement a query
language into the relational
database system
M2 Implement a fully
functional database system
that includes system
security and database
maintenance.
M3 Assess whether
meaningful data has been
extracted using query tools to
produce appropriate
management information.
In preparation for the Database Assignment of the first semester, I would like to thank our
lecturer Miss Dulashi Athauda who was very helpful for us to complete this task in time. In
addition, I would like to thank all my friends and family members who helped me
accomplish this target in no time. I gained a vast knowledge about database development
through this module and through the online tutorials from the internet. I am very grateful to
have this assignment done in time and I thank our lecturer; Miss Dulashi immensely and
ESOFT Metro Campus for laying out a good online educational platform to study even
during these pandemic times.
Acknowledgement..............................................................................................................................17
Activity 1.............................................................................................................................................20
Definition of a Database..................................................................................................................20
User and System Requirements......................................................................................................22
User Requirements.....................................................................................................................22
System Requirements.................................................................................................................24
ER Diagram and Data normalization................................................................................................26
Complete Normalized ER Diagram..............................................................................................26
Data Normalization.....................................................................................................................27
Primary Key.................................................................................................................................31
Cardinality...................................................................................................................................31
Relationship................................................................................................................................31
Entity Relationship Diagram (ERD) of the Smart Movers above:.................................................32
Customer_ ID..............................................................................................................................32
Product _ID.................................................................................................................................32
Load _ID......................................................................................................................................32
Payment_ ID................................................................................................................................32
Validations that used to validate data in the tables........................................................................33
Domain integrity.........................................................................................................................33
Entity integrity.............................................................................................................................34
Referential integrity....................................................................................................................34
Simple interfaces to input and output data to the tables...............................................................35
Critical evaluation and access the effectiveness of the user and system requirements with the
database design..............................................................................................................................36
Activity 2.............................................................................................................................................37
Implement the database according to the provided ER diagram and use DDL...............................37
Statements......................................................................................................................................37
2.2 Implement a GUI based system to view,insert,update,delete data in the tables......................39
Implement validation methods explained in the Activity 1.............................................................41
Data Validation............................................................................................................................41
Implement join queries display the details payment with the job details and the customer details.
........................................................................................................................................................43
SQL Join.........................................................................................43
2.5 Implement and access DML
(select,update,delete) by giving meaningful examples from the developed database...................44
Data Manipulation Language (DML)............................................................................................44
2.6 Explain and implement the security mechanisms in the developed database (EX: - User groups,
access permissions).........................................................................................................................48
Security Mechanism Used In a Database....................................................................................48
Importance of these security Mechanisms.................................................................................49
Explain and implement the below mentioned SQL statements from the developed database by
giving meaningful examples. (Group by,Order by,Having,Between,Where)...................................51
Group by Statement....................................................................................................................51
Order by Statement....................................................................................................................51
Having Statement........................................................................................................................52
Between Statement....................................................................................................................52
Where Statement........................................................................................................................53
Implement the Above mentioned SQL statements from the developed database by giving
meaningful examples..................................................................................................................53
Activity 3.............................................................................................................................................55
3.1/2Create a test plan to test the system against user and system requirements........................55
Test Cases....................................................................................................................................55
Test Plan for Smart Movers.........................................................................................................56
3.3 Explain and access how the selected test data can be used improve the effectiveness of
testing.............................................................................................................................................57
Effectiveness of the Testing Explanation.....................................................................................57
3.4 Get independent feedback and evaluate the effectiveness on the developed database solution
from the non-technical users and some developers.......................................................................58
Effectiveness of the Database Solution.......................................................................................59
Activity 4.............................................................................................................................................61
4) Produce a technical documentation for the developed database system that contains a user
guide, UML diagrams (Use case diagram, class diagram, flow charts, DFD level 0 and 1) and
evaluate the database suggesting future enhancements to be implemented to ensure continuous
effectiveness of the system.............................................................................................................61
Future Improvements.................................................................................................................68
Activity 1
Definition of a Database
Data within the most common types of databases in operation today is typically modeled in
rows and columns in a series of tables to make processing and data querying efficient. The
data can then be easily accessed, managed, modified, updated, controlled, and organized.
Most databases use structured query language (SQL) for writing and querying data.”
(Anon., 2020)
At the present day, we use various kinds of programs and tools to create databases such as,
MY SQL
Oracle RDBMS
Improvado
Knack
MS Access
Features of a Good Database
Minimal Data Redundancy – Integrated data into a single, logical structure where
duplicated data is minimum as possible.
Data Consistency – Data is consistent throughout the whole database such that a
single update could easily update the total database.
Data Shareable – Database is created to share the data and information among users
who have different levels of authorized access.
Data Independence – No dependency among the data in the database.
High data security – Different levels of access for the users as a guest, administrator
for updating and protecting the data.
Advantages of a Database
Data consistency
Disadvantages of a Database
1. Hardware
2. Software
b) Application Software
3. People
a) Users
b) Practitioners
4. Data
User Requirements
User requirement is the requirement of the user when using the database system. User
requirement is a document, which is used in projects that tells us about the expected outcome
of the user while using the software. User requirement can be the user document or the user
manual, which is mainly, documented targeting the customers.
II. The means by which the user supplies data to the program to be processed, covering
format and the content of the data together with any restrictions on values included,
and so on (Anon., 2020)
The accountable manager should be able to create a new job according to the specific
criteria like product type, customer type and the load type relating to the customer’s
satisfaction within a few seconds.
The software; the DBMS created for the Smart Movers should store all the details as
per each customer enrolled for their specific jobs.
The front desk officer should be able to register new customers easily and handle all
the transactions details and payment details easily without any delaying the customers
so that we can provide a good service to our customers.
There should not be any major hidden bugs and errors in the system as per the
agreement.
A proper training should be provided to the IT team of Smart Movers as per the
agreement.
System Requirements
System requirement is a document that describes the features and the functions of the system,
which is designed for Smart Movers.
Single container can transport only one chemical product due to safety requirements
Customers are of three types namely Catogory1, 2 and 3, each customer is given a
unique customer number and his or her details have to be recorded in the system
Payments for a job depends on customer type, product type (No Risk, High risk) and
the load type (small, medium and large)
Jobs are allocated to individual depots to service. Depots hold, manage and maintain
their own transport units which are permanently allocated to them to service Jobs
The final system should be able to provide the required information for management
decision making and to handle daily operations efficiently and effectively
Data integrity- Data has to be consistent throughout the system that via a
single update we can completely
Reliability
Maintainability
Usability
Conceptual Design
An entity relational model or conceptual model, also called an entity-relational (ER) diagram
is a design representation of entities and their relationships to each other, ER model is used to
create relational database. In addition, they show how the different parts of a data model link
to each other.
Database normalization is a process used to organize a database into tables and columns.
Data Normalization should meet two basic requirements:
1. There is no redundancy of data (all data is stored in only one place, there should not be
duplicates available in the database anymore)
2. Data dependencies are logical (all the related data items in the database are stored
together)
No Anomalies No redundancy
Updating
Deleting
Non-key attribute is functionally depends on just a part of the key attribute. To achieve 2NF
the partial dependency of the table has to be removed.
Transitive dependency:
Full dependency:
A relation is in 1NF, if it does not contain repeating groups or multivalued attributes. This
can be achieved by making every tuple/row unique.
We have to remove multivalued attribute or repeating groups when coming from zero
normalization form into first Normalization form.
Primary Key
A Primary Key is helps to uniquely identify the each row or record in Database. Primary Key
is contain the unique value. The Primary Key cannot have NULL values. Always one table
have only one Primary Key.
Cardinality
Cardinality is the context of database and this is refer to the singularity of the data values
contained in a column. The large columns contains percentage is totally unique value and it
means the column contains large. Low cardinality means that the column has lot of repeat in
data range.
Relationship
Database relationship is the context of database and it is exists between two relational
database table. The one table has a foreign key that is reference the primary key of the other
table. Relationship allows to the relational database to split and store the data in different
tables. An entity set is a collection of same entity, these entities are have attribute that is
define properties by major entities, attributes and viewing the relationship between tables.
Customer Job
Customer ID Job ID
Customer ID Transport _Unit ID
Mobile Number Deport ID
DOB Job ID
Customer Name Pickup _Location ID
Address Product _ID
Customer type Customer ID
Payment
Depot Payment Id
Depot ID Customer_ ID
Transport_ Unit ID Product _ID
Deport ID Load _ID
Name Payment_ ID
Address
Tel No
Product Location
Product ID
Load ID
Price
Quantity
No Risk Transport Unit
High Risk
Risk ID Transport ID
Transport Name
Depot ID
Load ID
Load
Load ID
Load ID
Pro _ID
Transport
Start Location
Data validation means checking the accuracy and quality of source data before using,
importing or processing the data. Different types of validation techniques can be performed
depending on objectives. Data validation is also known as Input Validation.
The relational data model/conceptual model includes several types of constraints. The major
types of integrity constraints used are:
Domain integrity
Entity integrity
Referential integrity
Domain integrity
Domain integrity specifies that the columns in a relational database have to be declared upon
a defined domain. All of the values that appears in a column must be taken from the same
domain. A domain is a finite valid set of values that may be assigned to an attribute.
Entity integrity
The entity integrity technique is designed to assure that every relation has a Primary key. The
entity integrity assures that the primary key is not null and the values for the primary key are
valid all the time.
Referential integrity
A referential integrity constraint is a rule that maintains consistency among the rows of two
relations. In the relational data model, associations between tables are defined with foreign
keys. The rule is that if there is a foreign key in one relation, either each foreign key must
match a primary key value in referred relation or the foreign key value must be null.
Referential Integrity Rule in DBMS is based on Primary and Foreign Key. The Rule defines
that a foreign key have a matching primary key. Reference from a table to another table
should be valid. To allow join, the
referential integrity rule states that the Primary Key and Foreign Key
have same data types. (Meador, 2018).
Database quality depends greatly on the accuracy of the need specification and therefore the
greatest effort should specialize in improving the first stages of the database life cycle.
Conceptual data models form the idea of all later design work and determine what
information are often represented by a database. Therefore, its quality features a significant
impact on the standard of the database, which ultimately implemented. Ultimately, the user
requirements and the system requirements have to be fulfilled in the final database design
such that the database design is aligned with the technical requirements asked by the Smart
Movers Company.
Activity 2
Implement the database according to the provided ER diagram and use DDL
Statements
Data definition Language (DDL) is a standard for commands that define the different
structures in a database. DDL statements create, modify, and remove database objects such as
tables, indexes and users. Common DDL statement are CREATE, ALTER, AND DROP
(Rouse, 2019).
According to the scenario, smart movers there are seven types of table should be added in the
designed database. These tables can be created in SQL DDL statement in MS SQL
Customer
Transport Unit
Payment
Load
Products
Job
Depot
2.2 Implement a GUI based system to view,insert,update,delete data in the tables.
Implement validation methods explained in the Activity 1.
Data Validation.
Data validation means checking the accuracy and quality of source data before using,
importing or processing the data. Different types of validation techniques can be performed
depending on objectives. Data validation is also known as Input Validation.
Data validation is an essential part of any data handling task whether you’re in the field
collecting information, analyzing data, or preparing to present your data to stakeholders. If
your data isn’t accurate from the start, your results definitely won’t be accurate either. That’s
why it’s necessary to verify and validate your data before it is used.
While data validation is a critical step in any data workflow, it’s often skipped over. It may
seem as if data validation is a step that slows down your pace of work, however, it is
essential because it will help you create the best results possible. These days data validation
can be a much quicker process than you might’ve thought. With data integration platforms
that can incorporate and automate validation processes, validation can be treated as an
essential ingredient to your workflow rather than an additional step (Anon., 2021)
Validation
Method of Data Validation Examples
type
Lookup table Looks up acceptable values in a table There are only seven possible days of the week
Checks that a value falls within the Number of hours worked must be less than 50
Range check
specified range and more than 0
SQL Join
A SQL Join statement is used to combine data or rows from two or more tables based on a
common field between them.
Inner Join- The inner join selects all rows from both the tables as long as the
condition satisfies.
Left Join- This join returns all the rows of the table on the left side of the join . Left
join is also known as left outer join.
Right Join- Right Join is similar to Left Join. This join returns all the rows of the table
on the right side of the join. Right Join is also known as Right outer Join.
Full outer Join- Full Join creates the result-set by combining result of both left and
right joins. The result-set will be a combination of both the tables.
2.5 Implement and access DML (select,update,delete) by giving meaningful
examples from the developed database.
DML statements are SQL statements that manipulate data. DML stands for Data
Manipulation Language. The SQL statements that are in the DML class are INSERT,
UPDATE and DELETE. Some people also lump the SELECT statement in the DML
classification (Rouse, 2006).
The data manipulation language is that the programing language when using data inserting,
deleting, and modifying in database. DML is use as a sublanguage in mainly database
language like SQL operating language.
Select
Insert
Update
Delete
SELECT – The select query is employed to pick the database. This Selected command
commonly utilized in SQL. This enables users to database the extract information for an
operation or retrieve information from specified columns or from all of the columns in the table.
Syntax:
Syntax:
INSERT INTO TABLE_NAME
[(col1, col2, col3,...colN)]
VALUES (value1, value2, value3,...valueN);
col1, col2,...colN
UPDATE – The UPDATE statement in SQL is used to update the data of an existing table in
database. We can update single columns as well as multiple columns using UPDATE
statement as per our requirement
Syntax:
UPDATE table_name
WHERE some_column=some_value
DELETE – this is often wont to delete the info into the database. We will use the WHERE
clause with the Delete query. This question deletes the chosen rows because otherwise all
records are deleted into the database.
Syntax:
Database security must do strictly. This is often to stay the entire info safe within the
database. There is a regulation in database demand the quality from any business with online
components.
The database security is analysis implemented includes with:
Restrict unauthorized access in use by implementing strong access and data internal
control.
The testing capacity of a database makes sure it does not crash with the service attack
in user overload.
Review the system for any known or unknown awareness a mapping or decide to
reduce them.
Database security is important to any organization because of the value of data in the
database.
The database security helps to dam the firewall attacks, prevent malware viral, data
corruption, and every one sort of data spread in end-point devices.
This prevents data loss through the corruption file or programming errors within the
system.
Make sure that any quite damage can prevent the loss of knowledge on the server.
Restrict data loss through the corruption of programmed errors.
Company’s block attacks, including ransom ware and breached firewalls, which
keeps sensitive information’s safe.
Explain and implement the below mentioned SQL statements from the developed
database by giving meaningful examples. (Group by,Order
by,Having,Between,Where)
Group by Statement
Group by is one of the most frequently used SQL clauses. It allows you to collapse a field
into its distinct values. This clause is most often used with aggregations to show one value
per grouped field or combination of fields.
SELECT column_name(s)
FROM table_name
WHERE condition
GROUP BY column_name(s)
ORDER BY column_name(s);
Order by Statement
The ORDER BY statement in sql is used to sort the fetched data in either ascending or
descending according to one or more columns. Order the result set of a query by the specified
column list and, optionally, limit the rows returned to a specified range.
The HAVING clause was added to SQL because the WHERE keyword could not be used
with aggregate functions.
SELECT column_name(s)
FROM table_name
WHERE condition
GROUP BY column_name(s)
HAVING condition
ORDER BY column_name(s);
Between Statement
The SQL BETWEEN condition allows you to easily test if an expression is within a range of
values (inclusive) .The BETWEEN operator selects values within a given range. The values
can be numbers, text, or dates. The BETWEEN operator is inclusive: begin and end values
are included.
SELECT column_name(s)
FROM table_name
The WHERE clause is used to filter records. The WHERE clause is used to extract only
those records that fulfill a specified condition.
FROM table_name
WHERE condition;
Implement the Above mentioned SQL statements from the developed database by
giving meaningful examples.
Activity 3
3.1/2Create a test plan to test the system against user and system requirements.
Test Cases.
According to the smart mover’s database, a test plan document that outlines the planning for
test process. It contains guideline for the test process such as approach, testing tasks,
environment needs, resources requirement, schedule and constraints. And it describes the
scope of testing, testing technique to be used, resources required for testing and the schedule
of intended test activities. The scope helps identifying test items and the features to be tested.
A test plan also contain details of who will perform a given task.
INTRODUCTION- This test plan describes the testing approach and overall framework
which will drive the testing of the Smart Movers 1.0 – The document introduces:
Test Strategy: rules the test are going to be supported, including the givens of the project
(e.g.: start/end dates, objectives, assumptions); description of the method to line up a
legitimate test (e.g.: entry/exit criteria, creation of test cases, specific tasks to perform,
scheduling, data strategy).
Execution Strategy: describes how the test are going to be performed and process to spot and
report defects, and to repair and implement fixes.
Test Management: process to handle the logistics of the test and every one the events that
come up during execution (e.g.: communications, escalation procedures, risk, and mitigation,
team roster)
Overview of Project- Smart Movers is a powerful tool that allows corporate employees to
view relevant information such as payments and enter payment information without the
hassle of an Internet-enabled computer.
3.3 Explain and access how the selected test data can be used improve the
effectiveness of testing.
Accurate and up-to-date data guarantee the success of a business. It prevents many
miscommunications and misleading decisions and situations. Therefore, SmartMovers needs
modifiable software and databases to regulate customer, transportation and payment details.
It provides the need to select test cases as described above to assess whether the database is
capable of providing return results. To be an effective database, it must be designed to be
simple to
Maintain and store external knowledge. In
order to deal with customer information that is becoming obsolete,
there must be a process to systematically verify or update individual information. Therefore,
monitoring the database from time to time, it is very important to maintain it so far, and the
above tests have given me the opportunity to see the power of trying for it. Also, testing
allows you to check for flaws in the database, correct them, and prevent future use.
Information security is violated when more people access information. Therefore, enhancing
security is essential if data and access and access are restricted.
3.4 Get independent feedback and evaluate the effectiveness on the developed
database solution from the non-technical users and some developers.
80% of the respondents agreed that software offered useful feedback once they got wrong in
working with the software.
50% of the respondents agreed that software used scoring and from that 80% believes that it
is sensible and it encourages the learner.
65% of the respondents agreed that it's easy to navigate through the program and most of the
people 90% agreed that software is straightforward to start out and 80% said interface is
straightforward to know.
Only 40% of the respondents agreed that the icons won’t to assist navigation clear and
intelligible therefore it should be improved by reorganizing the icons during a more
understandable way.
Only a half the respondents agreed that it always clear to the learner which point s/he reached
within the program and thus users should be more informed and made conscious of what to
try to once they reach the assistance needed.
Feedback forms include the employee's name, department, and position, and are measured
according to the following principles: A questionnaire was distributed by 5 developers and 5
non-technical users, and feedback was distributed as follows.
80% of the respondents agreed that software offered useful feedback once they got
wrong in working with the software.
60% of the respondents agreed that it's easy to navigate through the program and
most of the people 90% agreed that software is straightforward to start out and 80%
said interface is straightforward to know.
Only 40% of the respondents agreed that the icons won’t to assist navigation clear
and intelligible therefore it should be improved by reorganizing the icons during a
more understandable way.
Only a half the respondents agreed that it always clear to the learner which point s/he
reached within the program and thus users should be more informed and made
conscious of what to try to once they reach the assistance needed.
Activity 4
4) Produce a technical documentation for the developed database system that
contains a user guide, UML diagrams (Use case diagram, class diagram, flow charts,
DFD level 0 and 1) and evaluate the database suggesting future enhancements to be
implemented to ensure continuous effectiveness of the system.
User’ guide and technical documentation for the support and maintenance of the software
User guide for the support and maintenance of the software by the fellow it staff.
The purpose of the system database that is to say it analyses the component of the system and
their inter-relationships, which enables us to understand the structure and behaviors of the
SmartMovers database system. And also to manage day to day transportation process of the
SmartMovers organization.
Simply to document the system and confirm that is has certain required features, such as a
security, privacy, system evidential sufficiency etc. To understand the system so that one can
design critical tests to confirm that the system functioning perfectly. A full system analysis
takes into account the whole system of SmartMovers database and includes looking at future
consideration.
Data Flow
System features/functionalities
One container must only transport one product at a time due to safety requirements
Unique number must be given for each job and load when they are created
Input the details of the customer dividing into their category 1,2 & 3
Transport unit, assistant, lorry, driver and container details must be inputted into the
system
Input the depots details to the depots table (E.g. DID, location, address)
Input unique number to load and job when they created (E.g. loads and job tables)
o Windows: 7 or newer
o MAC: OS X v 10.7 or higher
o Linux: Ubuntu
System features/functionalities
Performance, security and user ability
Reports should be created according to the system on time and should update all those
on time (e.g. customer details, transactions etc.)
Hardware and software requirements
Recommended Operating Systems
Windows: 7 or newer
Linux: Ubuntu
The logistics management and transportation companies are finding the categories for
themselves by becoming reliable within the delivery of products and services. Especially the
smart movers are the products transport service. They need to deliver the foreseeable and
safe manner and offer transparency in their delivery process. They need to estimate the
impact of their transport vehicles, crew, and facilities available. Although Smart movers got
to improve their database system and software consistent with the changes in customers need
by their account convenience to raised customer relationship between business and therefore
the customer.
In predictive analytics are the sort used with data warehouse solution today to optimize the
vehicle routing, crew, and goods. Like directly fundamental to supply rock bottom possible
cost of transport to the customer, will maintaining limit? Smart movers must implement the
collect all the info of consumers to realize the advantage of cost-saving database and
software.
The vehicle divers risk analysis supported sensor or data will improve the security of the
drive and
Minimize warranty costs by avoiding potential cost recall. That’s the rationale Smart Movers
must adjust the software in risk analysis data facts.
References
Alan Faisandier, G. R. T. R. A. A. S., 2020. System Requirements. [Online]
Available at: sebokwiki.org/wiki/System_Requirements