0% found this document useful (0 votes)
5 views17 pages

Bikky Part PC Setup Suggestion System (1)

The document discusses the importance and methodology of systems analysis in improving organizational systems and processes, emphasizing the need for effective reviews to meet user needs. It outlines functional and non-functional requirements for a PC Setup Suggestion System, detailing features like user registration, login, and password recovery, as well as performance analysis and security measures. Additionally, it covers the system's architecture design, database schema, and various diagrams to illustrate data flow and interactions within the system.

Uploaded by

bikkykarki171
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
5 views17 pages

Bikky Part PC Setup Suggestion System (1)

The document discusses the importance and methodology of systems analysis in improving organizational systems and processes, emphasizing the need for effective reviews to meet user needs. It outlines functional and non-functional requirements for a PC Setup Suggestion System, detailing features like user registration, login, and password recovery, as well as performance analysis and security measures. Additionally, it covers the system's architecture design, database schema, and various diagrams to illustrate data flow and interactions within the system.

Uploaded by

bikkykarki171
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 17

3.1.

System Analysis

Effective review of systems and processes can help organizations provide quality and
functional offerings that meet user needs. A systems analysis is one method technology
professionals can use to identify concerns and suggest improvements to the systems
businesses and organizations use in their operations. Learning what a systems analysis is
and how it works can help you better understand its importance and necessity. In this
article, we define a systems analysis, list some tools analysts can use to perform their
analysis, explain why this type of analysis is important and offer tips for conducting
effective reviews.

System analysis is a review of a technological system, like a software package, for


troubleshooting, development or improvement purposes. Through in-depth analysis,
analysts can uncover errors in code, accessibility issues for end-users or design
incompatibilities. Performing an effective systems analysis often requires experts to have
knowledge of a software product's or package's requirements so that they can approach
their analysis effectively. Unlike systems administrators, who focus on day-to-day system
maintenance, systems analysts consider the viability and effectiveness of a product
overall. This allows them to suggest changes or make fixes that improve the system.With
a systems analysis, considering the goals of the system is important for solving problems
and creating efficiencies. From there, dividing a system into components can make it
easier to perform individual analyses that influence the complete system.

Systems analysis is "the process of studying a procedure or business in order to identify


its goals and purposes and create systems and procedures that will achieve them in an
efficient way". Another view sees system analysis as a problem-solving technique that
breaks down a system into its component pieces for the purpose of the studying how well
those component parts work and interact to accomplish their purpose[4]. The field of
system analysis relates closely to requirements analysis or to operations research. System
analysis is used in every field where something is developed. Analysis can also be a series
of components that perform organic functions together, such as system engineering.
System engineering is an interdisciplinary field of engineering that focuses on how
complex engineering projects should be designed and managed.
3.1.1. Requirement Analysis:

i.Functional Requirement:

The functional requirement of this project is explained through the use case diagram.

Fig:Use case diagram


REGISTER:

To sign up to the system by entering name, address, email address, etc., and very often
creating a password to log in. Websites may offer free information, news and other
services but require registration in order to learn more about the user. As registered users
frequent the site, the publisher derives demographics about its audience and can target ads
and services that make the site more profitable. For the user, registration makes logging in
again faster, and it may enable the site to tailor information to the user.

LOGIN:

A login is a set of credentials used to gain access to a system, website, or application that
requires authentication. It ensures that only authorized users can access certain areas,
data, or services.

Most logins consist of:

 Username or Email: Identifies the user


 Password: A secret key for authentication

During registration, users create their login credentials, which are securely stored in the
system. However, passwords are encrypted before storage, ensuring that even the system
administrators cannot read them. Instead of storing actual passwords, systems use hashing
algorithms (e.g., bcrypt, SHA-256) to store a unique, irreversible representation of the
password.

When a user attempts to log in, the system verifies the credentials by comparing the
entered password (after hashing) with the stored hashed version. This process ensures
user confidentiality and data security.

FORGOT PASSWORD :

The Forgot Password feature allows users to reset their password if they forget it. This
ensures they can regain access to their account securely.
How It Works:

1. User Request:

 The user clicks on "Forgot Password" on the login page.


 They enter their registered email or phone number.

2. Verification:

 The system checks if the email/phone exists in the database.


 A password reset link or OTP (One-Time Password) is sent to the user's
email/phone.

3. Password Reset:

 The user clicks the link or enters the OTP.


 They are redirected to a password reset page.
 They create a new password (following security rules).

4. Update & Confirmation:

 The new password is hashed and stored securely.


 The user is notified that their password has been updated

SEARCH:

The Search in a system allows users to find specific information quickly within a
database, or software application. It improves user efficiency and experience by retrieving
relevant data based on search queries.User can get any required information quickly if
information is availble.

CATEGORY GUIDE:

A Category Guide provides essential guidelines for choosing the right type of computer
based on its purpose. Computers are classified into different categories, such as gaming
PCs, streaming PCs, and general-purpose PCs, each designed with specific hardware and
software requirements. For instance, a gaming PC requires a high-performance CPU,
GPU, and RAM to handle graphically demanding games smoothly, while a streaming PC
focuses on multitasking capabilities, requiring a powerful processor, high RAM, and a
good GPU for encoding and real-time streaming. On the other hand, a general-purpose
PC, often used for office work, web browsing, and basic applications, requires minimal
hardware, such as an entry-level CPU, 8GB RAM, and basic storage. The Category Guide
helps users understand what type of system they need based on their workload, ensuring
they choose the most efficient and cost-effective configuration for their needs.

HARDWARE PRICE:

This gives the information about the price of hardware product based on diffferent brand.

REQUIREMENT:

Requirement is given by user that provide the sepecifiaction of system hardware based
on price, band and size and performance to sytem so that sytem will provide user a proper
model under long range of budget relative to provide price point.

MODEL_BUILT:

The sytem provide the general model (prototype )to confirm so essentail need of user.

MODEL VARIENT:

After the conformation system provide wide range of model of PC setup base on user
need as final outcomes.

PERFORMANCE ANALYSIS:

Performance analysis analyized the PC system and provide the perfomace report and
details about hardware compatibility.

ii. Non-functional Requirements

This section includes the non-functional requirements of this project.

RELIABILITY:

The system aims to deliver highly reliable suggestions by minimizing errors and
inconsistencies. It uses an extensive database of hardware specifications and software
compatibility information to provide well-researched recommendations. Regular updates
will be implemented to ensure the system remains reliable with changing technology.

PERFORMANCE:

The system must operate with high speed and accuracy, handling multiple user requests
simultaneously. It should be capable of filtering and analyzing large datasets, ensuring
that performance is not compromised even under heavy usage. The system should be
designed to handle expected and unexpected inputs efficiently.

PORTABILITY:

The PC Setup Suggestion System should be accessible on multiple platforms, including


web browsers and mobile devices. The application must function seamlessly across
different operating systems, allowing users to generate recommendations regardless of
their device type. The system should also allow users to export suggested configurations
for offline use.

SECURITY:

To protect user data and ensure secure access, the system will implement password
protection and user authentication mechanisms. Any personal preferences or stored
configurations will be encrypted. The system will also prevent unauthorized access and
ensure the safety of stored data through secure authentication protocols.

FEASIBILITY STUDY

The feasibility study evaluates whether the development and implementation of the PC
Setup Suggestion System are practical based on different feasibility factors.

TECHNICAL FEASIBILITY:

The system requires standard hardware and internet connectivity to function. Any modern
device such as a laptop, desktop, or smartphone can run the system, making it technically
feasible. The system will be developed using widely available technologies such as
HTML, CSS, JavaScript, and a backend framework like PHP or Python.
ECONOMIC FEASIBILITY:

The system is economically feasible as it does not require additional hardware


investments. Open-source platforms and libraries will be used to minimize development
costs. Since the system relies on publicly available hardware data, there are no significant
costs associated with data acquisition.

SCHEDULE FEASIBILITY:

The system will be developed within a predefined timeline, ensuring timely completion.
A structured schedule will be followed to ensure each phase, from research to
implementation, is completed as planned. If the project is completed within the proposed
timeline, it will be considered schedule feasible.

Table 3.1: Gantt Chart for Schedule

This structured approach ensures the successful completion of the project within the
defined timeline.

3.1.3 Data Flow Diagram

Data Flow Diagrams (DFDs) are graphical representations of the "flow" of data through
an information system. Data flow diagrams can be used for the visualization of data
processing. Data Flow Diagrams Solution is a powerful data flow diagramming
application that allows you quickly create any Data Flow Diagrams including the data
storages, external entities, functional transforms, data flows, as well as control transforms
and signals. The flow ofinformation and the information of demanded book should be
displayed by the library information system that can be used by the student while level 0
DFD and level 1 DFD.

CONTEXTLEVELDFD (0 level):

DFD Level 0 is also called a Context Diagram. It’s a basic overview of the whole system
or process being analyzed or modeled.

Figure 3.1: Context-Level Diagram

LEVEL 1 DFD:
The Level 0 DFD is broken down into more specific, Level 1 DFD. Level 1 DFD depicts
basic modules in the system and flow of data among various modules. Level 1 DFD also
mentions basic processes and sources of information. It provides a more detailed view of
the Context Level Diagram.

Figure 2.3: Level 1 DFD

2.1.3 Data Flow Chart

The data flow chart is a visual representation of all processed in sequential order. The
data flow chart diagram is a graphical representation of the relation between all the major
parts or step of the system. Flow chart diagram cannot include minor parts of the system.
Figure 3.3: Flow Chart of PC Setup Suggestion System
3.2. System Design

3.2.1. Architecture Design

The architecture of a PC Setup Suggestion System is key in helping users find optimized
hardware configurations. Designers approach the system from several perspectives:

1. Who will use the system?


The system serves users such as gamers, content creators, and programmers,
allowing them to input preferences like use case, budget, and desired performance
to receive personalized PC configurations.
2. How will users interact?
Users will interact through a web-based interface, using forms or filters to input
data, with the backend processing the information and recommending suitable
configurations.
3. What data will the system house?
The system stores hardware specs, real-time pricing, user preferences, and saved
configurations. It also includes suggested PC setups based on performance needs
and budgets.
4. How much can be determined about future collections?
While predicting future hardware is difficult, the system remains flexible,
adapting to new components as they emerge and integrating the latest trends and
benchmarks to stay current.
Figure 3.4: Architecture of PC Setup Suggestion System
3.2.2. Database Schema Design

Figure 3.5:Database Schema Design of PC Setup Suggestion System


3.2.3. Interface Design

The login page which includes login interface for users .

Figure 3.6: Login Page

REGISTER PAGE:

The register page which includes register the users basic user information. Easy link for
register page.

Figure 3.7: Register Page

HOME PAGE:
The background in which the name of my system ‘PCPARTPICKER' along with the tabs
to the pages which blend in perfectly. The welcome section introducing what the site is
about. The register column for easy signing up of a user within seconds. A section
showing browser compatibility.

Figure 3.8:Home page

CATEGORY PAGE:

3.2.4. Class Diagram


In Object-Oriented modeling, the main building block generally represents different
objects in a system, their attributes, their different functions, and relationships among
objects. These building blocks are known as class diagram. Class diagrams are
generally used for conceptual modeling of static view of a software application, and for
modeling translating models into programming code in a detailed manner. At time of
developing or construction software systems, a class diagram is widely used. They are
also used for data modeling. It is used to show classes, relationships among them,
interface, association, etc.

Figure 3.9: Class Diagram of Library System

3.2.5. Sequence Diagram

A sequence diagram is structured in such a way that it represents a timeline which begins
at the top and descends gradually to mark the sequence of interactions. Each object has a
column and the messages exchanged between them are represented by arrows. A
sequence diagram is made up of several of these lifeline notations that should be arranged
horizontally across the top of the diagram. In a sequence diagram, an interaction between
two objects occurs when one object sends a message to another.
Figure 3.10: Sequence diagram

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy