logo

Object and Data Modelling

   

Added on  2023-01-03

14 Pages3010 Words50 Views
 | 
 | 
 | 
Running head: OBJECT AND DATA MODELLING
Object and Data Modelling
Name of the Student
Name of the University
Author’s note:
Object and Data Modelling_1

OBJECT AND DATA MODELLING1
Table of Contents
1. Functional and Non-Functional Requirements:...........................................................................2
2. Use Cases:....................................................................................................................................5
3. UML Domain Model Class Diagram:.........................................................................................9
4. Event Partitioned System Model:..............................................................................................10
Bibliography:.................................................................................................................................11
Object and Data Modelling_2

OBJECT AND DATA MODELLING2
1. Functional and Non-Functional Requirements:
Functional requirements Non-functional requirements
The selection of the major is one of the functional
requirements. When a student gets an enrollment
in a National university the first thing that is
needed to be done is selecting the major. The
university offers an interactive interface that
allows the student to select from the available list
of majors. The student s not allowed selecting
more than one major. Although the list of the
majors other than the majors offered by the
university cannot be available to the student in the
interface. The student is thus applicable of
selecting from a certain list that is offered to them
(Kurtanović & Maalej, 2017).
The security of such system is very important.
This is one of the major requirement in the non-
functionality areas. The details of the cards are
stored in the system in secure manner and it
should ensure that the information is not visible to
a third person. The data that are related t the
transaction need to be stored in a safe way that
will not not b assessed by anyone. The
methodology of the encryption and decryption
process need to be strong that cannot be hacked.
The encrypted data need to be decrypted by the
management and no one in the middle of such
process can hamper the process.
The next step after the selection of the major is
the selection of the course. After that the user is
redirected to the next page where they have to
select the course. These courses are the
subcategories of the majors that is selected by the
student. The number of courses s also limited as
the University offered only certain courses. The
student can redo or undo different course that is
selected.
The flow o the data within the system need to be
real time. The real time term means that when an
user enter a data it need to be visible before it is
entered in the database. The flow of th data within
the system need to be fast and accessible by the
users. The refreshing option in the system will
allow the user to see the updated information
every-time they access the database.
Object and Data Modelling_3

OBJECT AND DATA MODELLING3
One of the important step of the process is the
login step. The important function that the
interactive system need to offer is the login. The
user will need to enter certain credential
information to login to their account. The user
have the right of accessing there account from
anywhere and by using any system. These also
make the process of detecting the user little
critical. The different activities that is performed
by the user in their particular account to remain
secure. They can keep a track on their activities
and can also save the same. The facility of
accessing one account by only one user make it
possible to save the activities.
The availability of the system need to be there for
twenty four hours and throughout the seven data
in the week. The restriction on the time for which
the user can access the data need to be restricted
so that they will not suffer any problem related to
the time.
The process of gathering the data that belongs to
the user is known as registration process. The
details of the user in a personal level need to be
provided to ensure the process of registration.
The admin of the university demands for data
from the student in order to complete the process
of the registration. A password that is provided by
the student is confidential and it ensures that only
the student can access the account. Password
verification s also provided by the system as it
asks the student to type the password for two
Object and Data Modelling_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Object and Data Modelling
|15
|3156
|75

Object and Data Modelling
|12
|2130
|1

Personal Financial Management and Prediction Tool
|9
|1505
|144

Object and Data Modelling
|16
|3006
|476

Assignment on Internet Security
|10
|2633
|51

Object Modelling
|16
|2644
|32