Bikky Part PC Setup Suggestion System (1)
Bikky Part PC Setup Suggestion System (1)
System Analysis
Effective review of systems and processes can help organizations provide quality and
functional offerings that meet user needs. A systems analysis is one method technology
professionals can use to identify concerns and suggest improvements to the systems
businesses and organizations use in their operations. Learning what a systems analysis is
and how it works can help you better understand its importance and necessity. In this
article, we define a systems analysis, list some tools analysts can use to perform their
analysis, explain why this type of analysis is important and offer tips for conducting
effective reviews.
i.Functional Requirement:
The functional requirement of this project is explained through the use case diagram.
To sign up to the system by entering name, address, email address, etc., and very often
creating a password to log in. Websites may offer free information, news and other
services but require registration in order to learn more about the user. As registered users
frequent the site, the publisher derives demographics about its audience and can target ads
and services that make the site more profitable. For the user, registration makes logging in
again faster, and it may enable the site to tailor information to the user.
LOGIN:
A login is a set of credentials used to gain access to a system, website, or application that
requires authentication. It ensures that only authorized users can access certain areas,
data, or services.
During registration, users create their login credentials, which are securely stored in the
system. However, passwords are encrypted before storage, ensuring that even the system
administrators cannot read them. Instead of storing actual passwords, systems use hashing
algorithms (e.g., bcrypt, SHA-256) to store a unique, irreversible representation of the
password.
When a user attempts to log in, the system verifies the credentials by comparing the
entered password (after hashing) with the stored hashed version. This process ensures
user confidentiality and data security.
FORGOT PASSWORD :
The Forgot Password feature allows users to reset their password if they forget it. This
ensures they can regain access to their account securely.
How It Works:
1. User Request:
2. Verification:
3. Password Reset:
SEARCH:
The Search in a system allows users to find specific information quickly within a
database, or software application. It improves user efficiency and experience by retrieving
relevant data based on search queries.User can get any required information quickly if
information is availble.
CATEGORY GUIDE:
A Category Guide provides essential guidelines for choosing the right type of computer
based on its purpose. Computers are classified into different categories, such as gaming
PCs, streaming PCs, and general-purpose PCs, each designed with specific hardware and
software requirements. For instance, a gaming PC requires a high-performance CPU,
GPU, and RAM to handle graphically demanding games smoothly, while a streaming PC
focuses on multitasking capabilities, requiring a powerful processor, high RAM, and a
good GPU for encoding and real-time streaming. On the other hand, a general-purpose
PC, often used for office work, web browsing, and basic applications, requires minimal
hardware, such as an entry-level CPU, 8GB RAM, and basic storage. The Category Guide
helps users understand what type of system they need based on their workload, ensuring
they choose the most efficient and cost-effective configuration for their needs.
HARDWARE PRICE:
This gives the information about the price of hardware product based on diffferent brand.
REQUIREMENT:
Requirement is given by user that provide the sepecifiaction of system hardware based
on price, band and size and performance to sytem so that sytem will provide user a proper
model under long range of budget relative to provide price point.
MODEL_BUILT:
The sytem provide the general model (prototype )to confirm so essentail need of user.
MODEL VARIENT:
After the conformation system provide wide range of model of PC setup base on user
need as final outcomes.
PERFORMANCE ANALYSIS:
Performance analysis analyized the PC system and provide the perfomace report and
details about hardware compatibility.
RELIABILITY:
The system aims to deliver highly reliable suggestions by minimizing errors and
inconsistencies. It uses an extensive database of hardware specifications and software
compatibility information to provide well-researched recommendations. Regular updates
will be implemented to ensure the system remains reliable with changing technology.
PERFORMANCE:
The system must operate with high speed and accuracy, handling multiple user requests
simultaneously. It should be capable of filtering and analyzing large datasets, ensuring
that performance is not compromised even under heavy usage. The system should be
designed to handle expected and unexpected inputs efficiently.
PORTABILITY:
SECURITY:
To protect user data and ensure secure access, the system will implement password
protection and user authentication mechanisms. Any personal preferences or stored
configurations will be encrypted. The system will also prevent unauthorized access and
ensure the safety of stored data through secure authentication protocols.
FEASIBILITY STUDY
The feasibility study evaluates whether the development and implementation of the PC
Setup Suggestion System are practical based on different feasibility factors.
TECHNICAL FEASIBILITY:
The system requires standard hardware and internet connectivity to function. Any modern
device such as a laptop, desktop, or smartphone can run the system, making it technically
feasible. The system will be developed using widely available technologies such as
HTML, CSS, JavaScript, and a backend framework like PHP or Python.
ECONOMIC FEASIBILITY:
SCHEDULE FEASIBILITY:
The system will be developed within a predefined timeline, ensuring timely completion.
A structured schedule will be followed to ensure each phase, from research to
implementation, is completed as planned. If the project is completed within the proposed
timeline, it will be considered schedule feasible.
This structured approach ensures the successful completion of the project within the
defined timeline.
Data Flow Diagrams (DFDs) are graphical representations of the "flow" of data through
an information system. Data flow diagrams can be used for the visualization of data
processing. Data Flow Diagrams Solution is a powerful data flow diagramming
application that allows you quickly create any Data Flow Diagrams including the data
storages, external entities, functional transforms, data flows, as well as control transforms
and signals. The flow ofinformation and the information of demanded book should be
displayed by the library information system that can be used by the student while level 0
DFD and level 1 DFD.
CONTEXTLEVELDFD (0 level):
DFD Level 0 is also called a Context Diagram. It’s a basic overview of the whole system
or process being analyzed or modeled.
LEVEL 1 DFD:
The Level 0 DFD is broken down into more specific, Level 1 DFD. Level 1 DFD depicts
basic modules in the system and flow of data among various modules. Level 1 DFD also
mentions basic processes and sources of information. It provides a more detailed view of
the Context Level Diagram.
The data flow chart is a visual representation of all processed in sequential order. The
data flow chart diagram is a graphical representation of the relation between all the major
parts or step of the system. Flow chart diagram cannot include minor parts of the system.
Figure 3.3: Flow Chart of PC Setup Suggestion System
3.2. System Design
The architecture of a PC Setup Suggestion System is key in helping users find optimized
hardware configurations. Designers approach the system from several perspectives:
REGISTER PAGE:
The register page which includes register the users basic user information. Easy link for
register page.
HOME PAGE:
The background in which the name of my system ‘PCPARTPICKER' along with the tabs
to the pages which blend in perfectly. The welcome section introducing what the site is
about. The register column for easy signing up of a user within seconds. A section
showing browser compatibility.
CATEGORY PAGE:
A sequence diagram is structured in such a way that it represents a timeline which begins
at the top and descends gradually to mark the sequence of interactions. Each object has a
column and the messages exchanged between them are represented by arrows. A
sequence diagram is made up of several of these lifeline notations that should be arranged
horizontally across the top of the diagram. In a sequence diagram, an interaction between
two objects occurs when one object sends a message to another.
Figure 3.10: Sequence diagram