https://www.google.com/contributor/welcome/?utm_source=publisher&utm_medium=banner&utm_campaign=2376261057261409

Search This Blog

Search with our Site

Custom Search

Monday, April 22, 2013

Solution Of Assignment # 1 of CS403 of Spring 2013 Due Date 29/04/2013





Database Management System (CS403)
Assignment No.1
                                                                                                                      Total marks = 20
       Deadline Date: 29/04/2013
                              
Please carefully read the following instructions before attempting the assignment.

 Deadline
Your assignment must be uploaded before or on 29th April 2013.

Rules for Marking
It should be clear that your assignment will not get any credit if:
1. The assignment is submitted after due date
2. The assignment is copied
3. You are supposed to submit your assignment in .doc / Docx format. Any other formats like scan    images, PDF, Zip, rar, bmp etc will not be accepted.

For any query please contact: CS403@vu.edu.pk

Objectives
The objectives of this assignment are,
1.      Giving the idea of the most common tool used for designing database systems i.e. Data Flow Diagram. It is used to design systems graphically and expresses different details of system in different DFD levels.
2.      To become familiar with the flow of data between different processes and to hide complexities in any given system.

Assignment

Consider a real world scenario of a university system. We are going to develop a security information system for employees so that there may be no chances of error or illegal access of an employee record or account. To complete this system we will divide this whole project in small assignment chunks (probably 4 to 5) and will try to cover every phase of the database development life cycle from scratch to implementation (SQL Queries). Scenario of the Security information system is given below.

Scenario:
The top management of the university wants to computerize the university employee’s records for security reason. The security information system will comprise of three sub applications.

1.      Fingerprint system (deployed through a biometric device)
2.      Online Employee Record Management (ERM) that will be a web based application deployed on a central server and access able through LAN
3.      Live Activity Monitoring System (LAMS) deployed through security camera (CCTVs) installed on various location in university premises.

Detail of each application is given below:
Fingerprint system:
To achieve this task the management wants to fix an automated fingerprint identification system for employee’s attendance. This system automatically matches fingerprints against a database of known prints. Attendance system uses biometrics to guarantee the accuracy in reporting. Attendance system works by having an employee place their finger on a small scanner upon entering and exiting the office, the attendance record is stored in the database. This information can later be checked by the management to track the employee’s check in, checkout times and location as well.
Online ERM:
To guarantee security, the employee’s are provided with a web account. Employees are provided with the user name and password so that no one can access his / her record. Using their account, employees can mark attendance, apply for leave, apply for loan, manage his/her bank account or see salary slip. Employee can also generate a new password by using the “Forgot your password?” link on the login page.
Live Activity Monitoring System (LAMS):
To better enhance the security system, management wants to install the security cameras to monitor the employee’s activities more closely, to keep an eye on precious assets and properties of the university. With the help of security cameras unauthorized and illegal activities are controlled. The security cameras capture images and record videos. These records are stored in the database.  The management can view all the details about their employees at any time to monitor the productivity and job related skills of employees. Further than case use the information to ensure that he/she might not indulge in any immoral activities.
Note that all the three applications share a central database (as shown in figure-1), deployed on a dedicated database server.


Task Description:

This Assignment is starting phase and in this assignment you will focus only on the tasks given below:

Task-1:
Part1. You are required to identify all the processes in the system.   (4 Marks)
Part2. Find out all the external entities interacting with the system. (4 Marks)

Task-2:
Part1. Create a Context level DFD                                                     (4 Marks)
Part2. Create Detailed DFD of the system                                           (8 Marks)

Note: In Task-2 Part2 decompose the DFD up to level-1 i.e. after context draw level-0 and then further decompose up to level-1


Important things to consider:

Ø  As happens in real world that everyone visualize a problem in different way so the solutions of all students should be according to their own thinking not taken from some source.
Ø  As this is preliminary phase of our system so it is recommended that you identify as much processes and their relationships as you can (some of them may be eliminated in coming assignments).


Good Luck

No comments:

Post a Comment