Professional Documents
Culture Documents
Final Documentation
Final Documentation
Final Documentation
DEPARTMENT OF ELECTRONICS
PROGRAMME: BSIT
LEVEL: 3.1
clivemhuri4@gmail.com
1
C17131768N
ATTACHMENT PERIOD JANUARY 2020-DECEMBER
2020
TABLE OF CONTENTS
CHAPTER ONE: INTRODUCTION 4
1.1 INTRODUCTION 4
1.2 BACKGROUND. 5
1.3 PROBLEM DEFINITION. 5
1.4 AIMS AND OBJECTIVES 5
1.5 JUSTIFICATION 6
1.6 CONCLUSION 7
CHAPTER TWO 7
PLANNING 7
2.1 INTRODUCTION 7
2.2 BUSINESS VALUE 8
2.3 FEASIBILITY STUDY: 9
2.3.1 Technical 9
2.3.2Operational 10
2.3.3 Economic 11
2.4 RISK ANALYSIS 12
2.5 PROJECT PLAN AND SCHEDULE/GANTT CHAT 15
2.6 CONCLUSION 17
CHAPTER THREE: ANALYSIS 18
3.1 INTRODUCTION 18
3.2 PROCESS ANALYSIS (FLOWCHART FMEA / MISTAKE POOFING / SPAGHETTI DIAGRAM) 19
3.3 CONTEXT DIAGRAM 20
3.4 DATA FLOW DIAGRAM 21
2
C17131768N
3.5 WEAKNESSES IN CURRENT SYSTEM 22
3.6 EVALUATION OF ALTERNATIVES 22
3.7 REQUIREMENTS ANALYSIS 23
3.8 FUNCTIONAL REQUIREMENTS 23
3.9 NON-FUNCTIONAL REQUIREMENTS 24
3.10 CONCLUSION 24
4 CHAPTER FOUR: DESIGN 25
4.1 INTRODUCTION 25
4.2 ARCHITECTURAL DESIGN 25
4.3 DATABASE DESIGN 26
4.4 CONTEXT DIAGRAM 27
4.5 SEQUENCE DIAGRAM 28
4.6 DATA-FLOW DIAGRAM 28
4.7 INTERFACE DESIGN 29
4.8 USE-CASE DIAGRAM 30
4.9 SYSTEM FLOW-CHART 31
4.10 SECURITY DESIGN 32
4.11 CONCLUSION 32
CHAPTER FIVE: IMPLEMENTATION AND TESTING 32
5.1INTRODUCTION 32
5.2 SCREENSHOTS OF SYSTEM 33
5.3APPLICATION / SYSTEM INSTALLATION 42
5.4 UNIT TESTING 42
5.5 MODULAR TESTING 43
5.6 OBJECTIVES TESTING 43
5.7 ACCEPTANCE TESTING 44
5.8 VALIDATION 44
5.9 CONCLUSION 44
6. APPENDIX 45
7. REFERENCING 45
8. FORMATTING 46
3
C17131768N
CHAPTER ONE: INTRODUCTION
1.1 INTRODUCTION
Online helpdesk is a computer based system that is designed mainly to allow computer users at
ZPC to communicate or submit any challenges they face to the ICT department and also records
of the ZPC’s ICT assets and problems received and solved by the department as well as viewing
reports which will help to accurately track work progress and records of all requests made by
computer users and ICT asset movement.
The system allows the users to log in and submit their requests to the ICT System administrator
who will also need to log in to view all requests or calls and then assign an ICT staff member to
work on the request. It also involves manual entry upon arrival of new asset and upon asset
movement for instance from one office/user to another, for example every end of year, the
administrator may want to generate report for the movement of assets from one office to another,
getting information about the asset i.e. date received, maintenance report etc.
At present, manual systems are being utilized in the ICT department. It requires the administrator
to manually monitor each asset that is available in an asset register which is an excel document
4
C17131768N
and record all requests and projects on documents which are then stored on a file server. This
usually leads to mistakes as the workload of the ICT department increases.
1.2 BACKGROUND.
Due to the rapid growth of technology each and every day it leads to greater need for people to
use it in their day to day business. Technology has improved lives in every area especially if it
can be handled in a good way. Manually driven systems are now being overtaken by
computerized systems. The basic function of this system is to keep the records of the assets and
allow computer users to send calls to the ICT department. This will allow the ICT staff to keep
track of their work, records and pull out detailed reports whenever they are required, making life
much easier for them compared to using the current system which requires manual entering,
searching and processing the information from the previous records. This system is mainly used
by the ICT Administrator, ICT support officers and all computer users at the company to
communicate, send requests, complaints and store records.
The purpose of this study is to develop a web based system which will allow users to send ICT
related complaints to the ICT department and keep records of all the complaints and calls made
as well as generating reports whenever they are needed.
5
C17131768N
1.4 AIMS AND OBJECTIVES
The aim of this project is to develop a software for the effective management of the ICT
department that will be able to achieve the following objectives:
⮚ Recording each call made by a user reporting a certain ICT related problem.
company.
⮚ To ensure that there exists a level of restricted access based on functionality and role.
6
C17131768N
1.5 JUSTIFICATION
The proposed system will enhance better communication and automatic record keeping which
will save time in recording as compared to manual system of recording each and every complaint
or problem solved by the ICT department. This system also matches our modern day business.
The system will reduce the chances of losing data and records of all activities done when a file
server crashed. In addition automatically recording everything done in the system eliminates the
errors of omission which are currently being experienced as the work load sometimes increases.
The procedures of recording records manually have been experienced with the following
problems:
⮚ Less efficiency due to poor record keeping some complaints can be forgotten and left
unattended.
⮚ Too much labor in trying to identify the exact asset being reported of by the user
⮚ More time is taken in recording the activities done, dates and processing the records
Moreover, this system is designed for the particular need of the department to carry out
operations in a smooth and effective manner.
1.6 CONCLUSION
The main objective of this chapter was to give an overview of the problem and where it is
emanating from through the background of the study. The major objective of undertaking this
7
C17131768N
study is to reduce the usage of time and other resources in keeping records and communicating
with the ICT department at ZPC Munyati
CHAPTER TWO
PLANNING
2.1 INTRODUCTION
Due to the inconveniences caused by the current system to the ZPC Staff including the ICT staff,
triggered the development of an Online Help desk application for ZPC Munyati ICT department.
This chapter is going to enlighten on cost benefit analysis which assists in determining whether
to develop the Help Desk System or not. More so, sunk costs, which are the little costs incurred
by the organization if the project is dropped due various reasons such as failure to satisfy
operational, technical, economic feasibility studies. Additionally, this chapter identifies the fact
gathering techniques employed to find out about the current system and new things that can be
done for smooth flow of work.
The Online Helpdesk application will reduce the chances of leaving other tasks undone which will in turn
improve efficiency at work. The system will add value to the services offered by the ICT department and
the image of the company at large by providing appropriate, affordable and reliable services. Suppose
fully if all the proposed objectives are met there will be improved efficiency and reduced losses.
⮚ The system will produce more accurate reports used for strategic decisions for the
department, and indicate what type of training the users need and areas to be improved.
8
C17131768N
⮚ The proposed system will be able to validate and verify data which is being input into the
system. This means reduction of duplication and redundancy errors thereby increasing
organization’s efficiency, record keeping and effectiveness.
⮚ The proposed system will reduce the time required in compiling reports.
⮚ The Online Helpdesk application will ensure smooth flow of the day to day operations of
the company.
⮚ Security: The system will address the problem of security through the use of passwords.
9
C17131768N
According to www.investopedia.com Feasibility study is an analysis of how successful a project
can be completed, accounting for factors that affect it such as economic, technological legal and
scheduling factors. The feasibility analysis enables us to provide justification on whether the
proposed system’s desired objectives can be achieved. “Feasibility study is one-step into the
business idea assessment and business development process”. Overally, the main objective of a
feasibility study is to ascertain technical, economic, operational and social feasibility.
2.3.1 Technical
Technical feasibility is assessing whether the required functionality is compatible with the
software and hardware available. The technical requirements will then be compared with the
ability of the organization. Technical feasibility focuses on these following questions:
⮚ Is the manpower required available that is the programmers, testers and debuggers?
In order to fully assess the technical feasibility of the project I had to explore the following area:
Does the system to be developed use the software and hardware technologies that are already
available and accessible at ZPC?
Software: There costs associated with the hiring and buying of software application packages
will be eliminated since Clive is ready to do the coding of all the required software.
10
C17131768N
Hardware: The management is in support of the development of a new system and has agreed to
add some hardware components supporting the development of the system, thus with such a
resource on the technical I’m covered.
Expertise: In collaboration with my supervisor it’s definitely that the system will operate at an
upper standard through some will be needed there and after.
The project has been considered technically viable since the technology employed is available
at the organization. Most of the tools used to implement this project are available within the
organization which makes it viable to develop.
2.3.2Operational
Operational feasibility deals with the effects of the system on the stakeholders of the
organization and whether the system will be a welcome development to the management.
Operational questions include the following
⮚ Changes to staffing levels and working practices and how such changes may be managed
and absorbed
⮚ Reaction of individuals both inside and outside the organization
The designed system was used by the employees since they have computer skills and it will
improve their efficiency at work specially the client, and the ICT staff members will be able to
track what they have done during a specified interval of time.
The proposed system to be developed in this project was accepted since its inception stage by
both operative staff and the management since:
⮚ More errors were being encountered due to fatigue as a result of tedious work
⮚ The new system is going to make optimum use of the available resources
11
C17131768N
⮚ There would be training and familiarization with the new system
⮚ All the users are computer literate although they were using a manual system, therefore
they need to be trained and acknowledged about the procedures in the new computerized
system.
⮚ There is absolutely no need to retrench any of the staff as some fear. The new system
will arrest the laborious and time consuming elements in the old system.
⮚ Management wants the current system to be replaced as soon as possible because of its
inefficiencies and lack of crucial information like accurate reports for good decision
making.
2.3.3 Economic
Economic feasibility answers the question Can the expected benefits outweigh the costs to be
incurred by the system?
The system shall improve efficiency and reduce the cost of time taken to manually record every
call of a complaint made by users. The system will also help keep records of assets and indicate
their condition, this will help the administrator to quickly identify and repair malfunctioning
computers and other assets in time.
Do we have the sufficient resources to finance the proposed system?
12
C17131768N
● improved efficiency in salary calculation
PROJECT RISKS
The project may suffer from high input costs before getting any returns on investment
Since foreign currency is a problem we may not have enough to buy all the hardware and
software we need for the project to complete.
Rejection: the system is exposed to the risk of being rejected by the computer users as they
prefer to use the old system of sending their complaints and requests to the ICT department.
During the course of designing the system, the management might come with some additional
requirements of the system which they would want the system to perform. This will compromise
the quality of the system since the system would be already under in the designing process.
● The main technical risks are related to hardware and software failure which can be
disastrous to the whole project. However, the use of anti-virus and regular system
backups will help counter these problems, as well as consulting the developer for system
maintenance once in a while or periodically.
13
C17131768N
● The targeted user base may also have trouble with the ability to use the system. To solve
such problems, users will have to be properly and adequately trained. Prototyping
during the system development may also help in familiarizing the users with the system
during the system development phase.
● Risks that the system may not meet the user expectations or the intended objectives.
● Computerization is a calculated risk venture as there are always the risks of project
failure entailing the loss of a lot of resources such as precious time in the development
processes.
● The company may have other pending projects which might be given the first priority.
Any person who has interest in the system can be technical or non-technical. There are six
groups, which are:
1. ICT staff
They own the set priority for the system and determine policies for example:
● How will the system return value or the advantage to the business?
14
C17131768N
● What are the visions, goals and objectives of the system?
● The management (managers) and the supervisors answer all these questions since they
pay for the building and maintenance of the system. Management may also lack
leadership skill that in turn disturbs the monitoring of the project.
2. System Users
These are the people who use or are affected by the information system on a regular basis
capturing, validating, storing exchanging data, and information concerned with business
requirements. Internal users are the employees of the company for whom the information system
is solely built. Supervisors tend to focus on the day-to-day management issues.
3. System Designers
They translate system users, business requirements and constraints into technical solutions,
designing computer files database input and output, screen programs that will meet system
OTHER RISKS
● Employees who were abusing and taking advantage of the weaknesses of the old manual
system may feel threatened and sabotage attempts to implement the system.
SOCIAL IMPLICATIONS
Introduction of the system will have positive and negative social implications on the normal
running of the organization.
15
C17131768N
2.4.3 POSITIVE EFFECTS
● There would be reduced workload as repetitive and tedious tasks are reduced or
eliminated
● Increased morale of the computer users, ICT support officers and the Administrator.
● Computer use is associated with health problems such as eye straining and repetitive
● Some staff members may be retrenched in future as their skills become less required.
As a countermeasure to reduce the above mentioned risks the structured systems analysis and
design (SAD) approach has been adopted in favor of this project. This ensures that users are
involved and that their requirements are captured.
The project plan illustrates how the project is going to be carried out from project proposal to the
implementation phase. Project managers use a work plan to determine the resources that are
needed for the project to complete in time. The project plan sets out the resources available to the
project and any activities that need to be carried out. The idea is to breakdown the project into
different phases, which are scheduled to start and ends at a certain estimated times, running for a
set duration of time
16
C17131768N
PROJECT SCHEDULE
Below is a schedule showing the stages of system development and the time taken to complete
each of the phases. It also provides the start and end dates of the phases.
taken(weeks
)
17
C17131768N
Testing and 1 03/08/20– 10/08/20
implementation
review(Evaluation)
Time in weeks
Activity/Period 1 2 3 4 5 6 7 8 9
Documentation
Project
proposal
Planning
phase
Analysis phase
Design phase
Testing &
implementation
18
C17131768N
Maintenance &
review
2.6 CONCLUSION
During this phase, the technical, operational and economic feasibility of the system was weighed
to enable an assessment of the practicability of the system and to determine its viability. This
phase also enabled us to assess the risks that could be faced in developing the proposed system.
A project schedule to be used in carrying out the project activities was also developed. Having
concluded that the project is highly feasible.
3.1 INTRODUCTION
This chapter covers the analysis of the system. It includes the user and system requirements, the
strengths and weaknesses of the current system and the major strength of the intended Online
Helpdesk, the system flowchart, data flow diagrams, context diagram and Entity relationship
diagram.
19
C17131768N
3.2 PROCESS ANALYSIS (FLOWCHART FMEA / MISTAKE POOFING /
SPAGHETTI DIAGRAM)
20
C17131768N
3.3 CONTEXT DIAGRAM
START
Administrator Staff
SELECT LOGIN
Assign tasks and add issues view calls
View reports
Online
HelpDesk ADMINISTRA
AS ADMIN? Update issue TOR
andLOGIN
task status
Make a call
NO
user
NO
USER LOGIN
USER
NO
NO EXIT?
YES
STOP
21
C17131768N
3.4 DATA FLOW DIAGRAM
22
C17131768N
3.5 WEAKNESSES IN CURRENT SYSTEM
. Below are some of the problems associated with the existing system;
● Significant amount of time is allocated for writing and recording the activities done.
In this stage alternative solutions are weighed and one with more weight is considered as the best
solution. Time and cost are the major factors to consider one solution as the best. The following
are the alternative solutions:
● Upgrade of the existing system- This method involves the addition of extra
features to the already existing system (Hoffer et al, 2002). The features may
involve improving security of the records to prevent data loss. Also manual
recording systems are difficult to update since they would still require the same
materials and process. This means time and cost have not been reduced. Therefore
23
C17131768N
it is the worse alternative since most of the weaknesses of the old system may still
be experienced.
● Development of the new system- This is the creation of a new software system that takes
into account all the requirements from users and the organization (Hoffer et al, 2002).
The whole process of software development will be led by I.T experts, from the
elicitation of requirements up to the deployment of the system into the organization. It is
efficient because it reduces workload and costs incurred during report generation.
Therefore making it the best alternative.
Functional requirements are those that directly affect the performance of the system and include
the following;
24
C17131768N
● The application should have a user-friendly interface
● The application should not allow a record to be saved with omitted data.
● The application should reduce the workload of creating reports as it is to produce reports
● The application should have strict security measures whereby admin and user have
25
C17131768N
3.10 CONCLUSION
In this chapter the system was broken down , inspected and understood and weaknesses were
resolved in the best way therefore the system is worth developing since the current system’s
weaknesses were resolved in the new system.
System design is the process of defining the architecture, components, modules, interfaces, and
data for a system to satisfy specified requirements through system modeling. One could see it as
the application of systems theory to produce development. The design of this system will be user
friendly. It shall be designed in such a way that employees will be able to navigate easily through
In other words, system design consists of design activities that produce system specifications
satisfying the functional requirements that were developed in the system analysis process.
System design specifies how the system will accomplish. System design is the structural
26
C17131768N
4.2 ARCHITECTURAL DESIGN
● User interface- this where all the process of logging in, reports, adding records, deleting
records and editing them and viewing them.
● Database- MySQL database will be used to store the data and of assets, user accounts and
records
A context diagram in engineering is a diagram that defines the boundary between the system,
part of the system and its environments, showing the entities that interact with it. It shows a
system as a whole and its inputs and outputs from and to external factors according to Kossiakoff
and Sweet (2011).
Administrator Staff
27
C17131768N
Assign tasks and add issues view calls
View reports
Online
HelpDesk
Update issue and task status
Make a call
user
28
C17131768N
4.5 SEQUENCE DIAGRAM
29
C17131768N
4.7 INTERFACE DESIGN
It is a stage whereby an outlay of how users will be interrelating with the developed system. This
is of paramount importance as it determines the acceptability of the system by the users (Coronel
and Crockett, 2008). It shows the input and output structures the system will require and every
interface has got its own oddity and capability. The interfaces are to be suitable to the user’s
needs and expectancy (Braude, 2014).
● My interfaces are designed in such a way that the system user always be aware of what
to do next
30
C17131768N
4.8 USE-CASE DIAGRAM
A use case focuses on the goals of the actors who interact with the system and the relationship
between actors and different use cases in which the user is involved. In the student examination
attendance system the students and administrator are the actors
31
C17131768N
4.9 SYSTEM FLOW-CHART
A system flowchart is a way of displaying how data flows in a system and how decisions are
made to control the events. Symbols are used, they are connected together to show what happens
to data and where it goes.
LOGIN
USER MENU
ADD USERS ADD ASSETS
VIEW DELETE
CALLS ASSET
VIEW AND
VIEW UPDATE
DOWNLOAD
ASSETS ASSETS
DOCUMENT
GENERATE VIEW
REPORTS CALLS
32
C17131768N
4.10 SECURITY DESIGN
This is development of a system with little to no vulnerabilities and free of impervious to attack
as possible through measures such as authentication and continuous testing. In the new system
this is practiced when the administrator has to enter user name and password to be able to access
the system.
4.11 CONCLUSION
This chapter ensured that the researcher understood what is expected of the system and designed
how the various capabilities of the system will be realized. The design in this chapter was used to
implement the system and the implemented system is outlined in the next chapter.
5.1INTRODUCTION
This chapter covers systems development, results of testing and system implementation. It brings
the project to life by giving a visual expression of the new system as was developed.
In this phase, all programs of the system will be loaded onto the user’s computer.
Implementation will involve the use of programming languages that will be used to develop the
system. The system will be built using PHP, MYSQL, JavaScript and HTML and CSS
33
C17131768N
5.2 SCREENSHOTS OF SYSTEM
Login Page
The login page allows users to access the system after entering their username and password. As
the user clicks on the sign in button, a popup form with username and password appears where
the user has to feed in his or her details to have access to the system.
34
C17131768N
Admin homepage
After entering the correct credentials for the administrator account the system will authenticate
and navigate to the admin’s home page which looks like the following
35
C17131768N
Staff homepage
After entering the correct credentials for a staff account the system will authenticate and navigate
to the staff’s home page which looks like the following
36
C17131768N
User Homepage
The user can only view a number of assets, call logs, issues and users but has no rights to open
and view details. After being authenticated the user can then make a call to the administrator
reporting the issue or problem he/she is having with an
37
C17131768N
Add an asset
Admin or staff has the rights and permissions to add assets to the system.
38
C17131768N
Add user
The following is the page where only the admin can create new accounts for users and staff.
39
C17131768N
Add issues
The following is Admin’s page where can assign issues to the staff and the staff will be able to
view the tasks assigned to him on his dashboard
Edit calls
40
C17131768N
.
41
C17131768N
View all call logs
42
C17131768N
The Admin and Staff can view all call logs made by users and their states as well as updating
state and sending replies to the users.
43
C17131768N
5.3APPLICATION / SYSTEM INSTALLATION
● Install XAMPP
● You might need to change the upload size limit for XAMPP.
Unit testing involves the design of test cases that validate that the internal program logic is
functioning properly, and that program inputs produce valid outputs. All decision branches and
internal code flow should be validated. It is the testing of individual software units of the
application. It is done after the completion of an individual unit before integration. This is a
structural testing, that relies on knowledge of its construction and is invasive. Unit tests perform
44
C17131768N
basic tests at component level and test a specific business process, application, and/or system
configuration. Unit tests ensure that each unique path of a business process performs accurately
to the documented specifications and contains clearly defined inputs and expected results.
Unit testing is usually conducted as part of a combined code and unit test phase of the software
lifecycle, although it is not uncommon for coding and unit testing to be conducted as two distinct
phases.
Field testing will be performed manually and functional tests will be written in detail.
Test objectives
● All field entries must work properly.
● Features to be tested
45
C17131768N
5.5 MODULAR TESTING
Module testing is defined as a software testing type, which checks individual subprograms,
subroutines, classes, or procedures in a program. Instead of testing the whole system program at
once, module testing recommends testing the smaller building blocks of the program.
5.8 VALIDATION
This is whereby one checks whether the right system is being built. The system checks whether it
meets the specifications of the user. Based on the comments from the positive feedback from the
control room and the technicians it was validated.
46
C17131768N
5.9 CONCLUSION
Effective implementation of this software will take care of the basic requirements of the ICT
help desk and asset management as well as project management because it is capable of
providing easy and effective storage of information related to activities happening in the
stipulated area. With these, the objectives of the system design will be achieved.
In order to allow for future expansion, the system has been designed in such a way that will
allow possible modification as it may deem necessary by the department, whenever the idea
arises.
6. APPENDIX
Proposed Budget
1 Printing 100
2 Airtime(Data) 2,000
4 Transport 1,000
47
C17131768N
5 Pens 10 10 250
TOTAL 380,000
7. REFERENCING
In S. Katsikas,,J. Lopez, & G. Pernul (Eds.), LNCS: Vol. 3592.TrustBus (2005) (pp. 70–79).
Berlin: Springer.
[2] C. E. Landwehr, Best available technologies for computer security, IEEE Computer, July,
1983.
Gemino, A., Parker, D.(2009) "Use case diagrams in support of use case modeling: Deriving
understanding from the picture", Journal of Database Management, .
Jacobson, I., Christerson M., Jonsson P., Övergaard G., (1992). Object-Oriented Software
Engineering - A Use Case Driven Approach, Addison-Wesley.
http://www.w3schools.com/
http://wikipedia.com/
48
C17131768N
8. FORMATTING
49
C17131768N