Team # 2 Members: Sowmya Krishnaswamy Hakan Terzioglu Manu Mehan Jerome Tunaya.

Slides:



Advertisements
Similar presentations
MFA for Business Banking – Security Questions with 2nd Request Multifactor Authentication: Quick Tip Sheets Note to Financial Institutions: We are providing.
Advertisements

MFA for Business Banking – Security Questions with Reset Multifactor Authentication: Quick Tip Sheets Note to Financial Institutions: We are providing.
Indistar® Leadership Team Meetings. Where can we plan a meeting? Choose ‘Plan Your Meeting’ from the main menu screen Click on Meeting Agenda Setup.
Home This training presentation is designed to introduce the Residency Management Suite to new users. This presentation covers the following topics: Login.
LiberRATE Estimating It thinks like you do! Edition 3 Instructions Click on buttons to advance or to repeat the previous slide PreviousNext.
AIMSweb Progress Monitor Online User Training
Electronic Timesheet User Manual
Ordering Textbooks Using the KIMRC On-Line Ordering System Reminder: The KIMRC is unable to purchase workbooks.
Polycom Quotes on Demand Tool Partner User Guide Version 1.1
SIS – NBS Online Specimen Tracking System Training
Center Accreditation Online System
WebDFS Budget Amendment and Personnel Processing.
TECHNICAL TRAINING December Quick Overview Project Sunlight requires certain New York State entities to report certain appearances by the public.
Reference and Instruction Automated Statistics Gathering and Reporting System Members: Patrick Chen (pyc7) Soo-Yung Cho (sc444) Gregg Herlacher (gah24)
Need your MyMathLab card with your access code Need a Valid Address Need to know Purdue’s zip code is and your course ID for your Class You.
Downloading and Installing AutoCAD Architecture 2015 This is a 4 step process 1.Register with the Autodesk Student Community 2.Downloading the software.
Information for students Welcome to the S 3 P system. Login to the system by entering your User ID and password. The User ID is the same as your normal.
Updating User Information Password – use this field to change your own password Confirm Password – retype the new password for verification purposes To.
Software Development, Programming, Testing & Implementation.
How To Batch Register Your Students
Internet Banking Standard and Standard-Hybrid Registration Intuit Financial Services University Internet Banking Certification Training.
Form Handling, Validation and Functions. Form Handling Forms are a graphical user interfaces (GUIs) that enables the interaction between users and servers.
Welcome to the Sinclair Community College Online Employment Applicant Tutorial.
Welcome to the Southeastern Louisiana University’s Online Employment Site Applicant Tutorial!
March 2008 Electronic Billing (EB) Developed by the Department of Developmental Services Developed by the Department of Developmental Services.
1 Entering Grades and Indicators in the Standards-Based Report Card (SBRC) Users Manual for SBRC On-line Entry Interim Progress ReportsInterim Progress.
Topics Covered: Data preparation Data preparation Data capturing Data capturing Data verification and validation Data verification and validation Data.
FireRMS SQL Audit, Archiving & Purging Presented by Laura Small FireRMS Quality Assurance.
Address Refer to Slide 2 for instructions on how to view the full-screen slideshow.Slide 2.
Risk Assessment/Risk Reduction © Risk Assessment/Risk Reduction Risk Assessment Risk Reduction Software.
ENTERING ELIGIBLE ENERGY RESOURCE APPLICATIONS IN DELAFILE Version 2.0 August 25, 2015.
Copyright © 2007, Oracle. All rights reserved. Managing Concurrent Requests.
1 ADVANCED MICROSOFT EXCEL Lesson 9 Applying Advanced Worksheets and Charts Options.
1 INITIAL SETUP OF THE ST ScI ELECTRONIC GRANTS MANAGEMENT SYSTEM BY AO DESIGNEES September, 2000.
Administrator – Employee Overview September, 2011.
1 OPOL Training (OrderPro Online) Prepared by Christina Van Metre Independent Educational Consultant CTO, Business Development Team © Training Version.
1. Chapter 25 Protecting and Preparing Documents.
1. If you know your user name (first initial, last name) and password, you will start here If you do not know your user name, start here and register.
1. To start the process, Warehouse Stationery (WSL) will invite you to use The Warehouse Group Supplier Electronic Portal and will send you the link to.
 Whether using paper forms or forms on the web, forms are used for gathering information. User enter information into designated areas, or fields. Forms.
Journalism & Media Studies Graduate Student Culminating Work : Steps for Submitting to the Campus Digital Archive at USFSP November 21, 2011 by Carol Hixson.
REAL TIME GPS TRACKING SYSTEM MSE PROJECT PHASE I PRESENTATION Bakor Kamal CIS 895.
Diagnostic Pathfinder for Instructors. Diagnostic Pathfinder Local File vs. Database Normal operations Expert operations Admin operations.
Downloading and Installing Autodesk Inventor Professional 2015 This is a 4 step process 1.Register with the Autodesk Student Community 2.Downloading the.
Once all screens are completed in good order, you will be prompted to lock the application. Choose a signature method by checking the appropriate box on.
Home This training presentation is designed to introduce the Residency Management Suite to new users This presentation covers the following topics: Login.
NYS Division of Homeland Security And Emergency Services (DHSES) E-Grants Tutorial Creating an Application for the EOC RFP To access DHSES E-Grants you.
1 ACTIVATION OF THE ST ScI ELECTRONIC GRANTS MANAGEMENT SYSTEM BY INSTITUTIONAL AUTHORIZING OFFICIALS January, 2001.
Tutorial Center Log-in Logout-system Group #2 Sowmya Krishnaswamy Jerome Tunaya Manu Mehan Hakan Terzioglu.
Vendor Bid System (VBS) Seminar. Agenda Vendor Bid System Overview Step-by-Step Advertisement Posting Editing Active Advertisements Recommended Practices.
Page 1 of 42 To the ETS – Create Client Account & Maintenance Online Training Course Individual accounts (called a Client Account) are subsets of the Site.
Walk Through of VEEP Online System Updated May 2011.
Automated Control System User Guide. Logging In After you have obtained your User ID number you can log on to the ACS website by typing in the address.
Navigation: If the tutorial opens up in your web browser, simply click your mouse to advance to the next slide. Use the “Backspace”
Day in the Life (DITL) Production Operations with Energy Builder Copyright © 2015 EDataViz LLC.
Online Self Enrollment & Statement Access UCM Business Procurement Card (BPC) Bank of America Merrill Lynch.
ELISTING How to use eListing to conveniently and quickly file your personal property listing online. DEPARTMENT OF ASSESSMENTS King County To navigate.
Reporter Training for High School RIO TM
V 0.1Slide 1 Security - User Account How to maintain user account ? Access Control Other Information Configuration  maintain user group and access rights.
Inquiry Tracking. Inquiry Tracking :: Logon Non-Weidmuller employees use the first initial of your first name and your full last name. (i.e. bjones for.
Training Guide for Residents
PearsonAccess EOC Training
Customer Log-In One-Stop Service Tracking (OSST) System
Welcome! To the ETS – Create Client Account & Maintenance
Risk Assessment Risk Reduction Software
For a new user you must click on the “Registration for Generator” link
Presentation transcript:

Team # 2 Members: Sowmya Krishnaswamy Hakan Terzioglu Manu Mehan Jerome Tunaya

Project Overview  Provide a secure login and logout system which will be used by tutors, students and administrators in the Minority Engineering and Computer Science department.  This product will keep a track of what has been done in the tutorial center and give a useful feedback that will be used in the future for requests of additional funding for this tutorial program.

Requirements Specific requirements Efficient way to keep track of all of the students who receive help. The software will compute the duration of time that is spent by student or tutor in the center. A need for the administrators of the lab to quickly figure out certain statistics such as the average number of visitors to the lab, average time spent in the lab, and the area of study that the student receives help in is needed.

Requirements (cont.) Specific requirements System will avoid login of a student/tutor before he logout in a given day. In other words there will not be duplication of login. The system will give error messages in the case of invalid inputs. The system will give options to students for self- study or tutorial. If self-study is chosen, self-study register is flagged and there will be no evaluation of the tutor. (that space becomes gray, no edit). If the tutorial is chosen, the system will provide levels for tutor evaluation.

Requirements (cont.) Specific requirements The system will provide the opportunity to change the password for tutors. The initial password for the tutors is specified by the administrator and when the tutor login the system for the first time, he will be forced to change his password. The system will determine the duration of time spent in the center as three hours if the tutor or the student forgets to logout.

Requirements (cont.) Specific requirements The administrator shall be able to reset all the data stored in the system. The system will provide a confirmation message box if the administrator clicks the clear box. The system shall provide graphical representation of the statistical data which is stored in the database.

Requirements (cont.) Functional requirements The data will be checked if it is in the specified format or it is in the database. Then two types of error messages can be generated: The one that tells the input is not in the proper format and the one that there is no match to the entered input in the database.

Requirements (cont.) Functional requirements For the output data, there is a simple subtraction function which calculates the difference between logout and login time. The result will be the duration of study in the tutorial center.

Requirements (cont.) Interface Requirements Input data items Student ID User name for the tutor Password for the tutor Password for the admin Output data items Duration of time Error messages in the case of invalid data input

Requirements (cont.) Interface Requirements(cont.) Format of the input and output data items Student ID must be a nine digit number User name for the tutor is a string of 6-8 characters Password for the tutor must be at least 5 characters long and should include only letters and numbers. Password for the admin must be at least 5 characters long and should include only letters and numbers.

Requirements (cont.) Interface Requirements(cont.) Accuracy of the data There is no accuracy requirement for the input data but the duration of time spent in the tutorial center must be captured accurately. The frequency of the data received and sent The data is received when a student or tutor comes to the tutorial center and wants to login the system. So there is no specific frequency of the data. It depends on the number of students and tutors entering to the center in a given interval.

Requirements (cont.) Physical Environment Requirements: The software will run on J2SE, which is the abbreviation of Java 2 Platform, Standard Edition. The code developers will use this software in their own PCs at home. They may also work in lab 257 in Engineering building I since the computers in that lab have that software.

Requirements (cont.) Physical Environment Requirements: The code developers will make changes in the code to their local copies of the software. So there would be a main copy of the code and the modification to that code is done after inspection to that problem by the whole group. The main copy will be kept in a different folder by all of the members of the group.

Requirements (cont.) Users and Human Factors Requirements: Our system will support three types of users.(students, tutors and administrator.) Since the software will be designed in a user friendly manner, a high level of skill in computer usage is not necessary for the users.

Requirements (cont.) Users and Human Factors Requirements The users will not require any special accommodations, every user will be assumed to have enough physical property to use the system. ( for example we will not provide large fonts for possible users with eye problems)

Requirements (cont.) Documentation Requirements: The system will store statistical data and the administrator will have access to it. The data will be classified according to their occurrence of date i.e. the data that were formed in January for example would be saved in the folder January. The system will provide graphical representation of the statistics. The administrator will be able to print them or observe online.

Requirements (cont.) Data Requirements: No data calculations will be performed. There is a simple time difference computation within the system which gives the duration of the time spent in the tutorial center by either the student of the tutor. The student ID which the students enter when they login the system and the user name, password which the tutors enter when they login the system must be retained.

Requirements (cont.) Security Requirements: The one who may abuse this system are tutors since they may be employed or not according to the evaluation results. So a tutor may enter the system by finding the student ID s (since there is no password required for the students) and may give high evaluation points to him. The client did not want us to recover this problem so there will be no security requirement. The code developers may deal with this problem if the group would decide to overcome this bottleneck.

Requirements (cont.) Quality Assurance Requirements: The software must be reliable if the user enter a valid input. ( the format of the inputs is specified above) The system should give some predefined error messages if the input data is not valid. Test cases must be run in the software developed to assure high quality.

Requirements (cont.) Quality Assurance Requirements: The client also should test before the deliverance of the product. No maintenance will be supplied after the client accepts the product. The documentation is so important in this manner because the maintenance can be performed by the technical staff of the tutorial center if the project is fully documented.

The Proposed System: Users and Modes of Operation The proposed system will be computer program that will be active at all times the lab is open. It will consist of many features that will make the overall log sheet concept that is previously used ancient. It will provide a secure login and logout method used by students, tutors, and administrators.

Users and Modes of Operation Students Login process- The first screen that the student will come across is the main option screen, which consists of logging in as a student, tutor, or administrator. Once the student chooses the proper option, they will be brought to another screen asking for their login identity, a password and the area of study to they need assistance with. After filling out these questions the student will than exit the system by clicking on the login button.

Users and Modes of Operation Students(cont.) Logout process Once the student is ready to leave the lab, they will be asked to enter the system again. They will asked to fill out an evaluation which consists of the tutor’s name that they received help from and a rating box to check off. The student can than properly log out of the system by clicking on the logout button.

Users and Modes of Operation Tutors Login process- The first screen that the tutor will come across is the main option screen, which consists of logging in as a student, tutor, or administrator. Once the tutor chooses the appropriate option, they will be brought to another screen asking for their login identity and a password. The tutor can than exit the system by clicking on the login button.

Users and Modes of Operation Tutors Logout process- Once the tutor is ready to leave the lab, they will be asked to enter the system again. They will be asked to logout properly so the system can record this logout time.

Users and Modes of Operation Administrators Login process The first screen that the administrator will come across is the main option screen, which consists of logging in as a student, tutor, or administrator. Once the administrator chooses the appropriate option, they will be brought to another screen asking for their login identity and a password.

Users and Modes of Operation Administrators Modifying process- After logging into the system, the administrator has the option to modify and view many forms of information. They can choose to add or remove tutor’s names and passwords. They can also choose to print out of view certain information about the student’s and tutor’s activity in the lab.

Users and Modes of Operation Administrators Logout process Once the administrator is ready to leave the system, they will be asked to properly logout by clicking on the logout button.

The Proposed System: Operational Scenarios Typical Scenario 1 The student sits down at the login system and prepares to log in. They are asked to enter their student identity number as well as a corresponding password. However, the password they enter is incorrect. The system will than let the student know that the password was invalid by a popup message saying “Invalid Password.”

The Proposed System: Operational Scenarios Typical Scenario 2- The student sits down at the login system and prepares to log in.They are asked to enter their student identity number as well as a corresponding password. They successfully log into the system and begin to fill out the proper information required from them. The student than receives help from the tutor and prepares to leave the lab. They are than asked to enter the system to properly log out. The student than fills out the evaluation sheet properly and logs out by clicking on the logout button. The login and logout times are properly recorded by the system.

The Proposed System: Operational Scenarios Typical Scenario 3- The administrator sits down at the login system and prepares to log in. They are asked to enter their identity and the corresponding password. They successfully log into the system and begin to modify and view tutor information. They choose to add a new tutor to the system. By clicking on the add new tutor button and filling out the tutor’s name and password for the specific tutor, they are able to accomplish this task quickly and efficiently. The administrator than logs out of the system by clicking the logout button.

The Proposed System: Operational Scenarios Atypical Scenario 1 The student sits down at the login system and prepares to log in. They are asked to enter their student identity number as well as a corresponding password. They successfully log into the system and begin to fill out the proper information required from them. The student than receives help from the tutor and prepares to leave the lab. They are than asked to enter the system to properly log out. However, the student forgets to log out properly and does not record a log out time. The system will than default the visit of the student to a time of three hours.

The Proposed System: Operational Scenarios Atypical Scenario 2- The tutor sits down at the login system and prepares to log in. They are asked to enter their identity number as well as a corresponding password. They successfully log into the system by clicking on the login button. They are than required to enter the system to properly log out. The student than fills out the evaluation sheet properly and logs out by clicking on the logout button. However, the tutor forgets to log out properly and does not record a log out time. The system will than default the tutor’s work time to three hours.

The Proposed System: Operational Scenarios Atypical Scenario 3 The administrator sits down at the login system and prepares to log in. They are asked to enter their identity and the corresponding password. They successfully log into the system and begin to modify and view tutor information. They choose to add a new tutor to the system. By clicking on the add new tutor button and filling out the tutor’s name and password for the specific tutor, they are able to accomplish this task quickly and efficiently. However, the specific tutor has already been previously added to the system. The administrator will than get a message saying “User Already Exists” letting the administrator know that the specific tutor is already in the system. The administrator can than log out of the system properly.

Future Modifications Graphical representation of the statistical data may be evaluated. The system can be modified to be more secure.

Conclusion This project is intended to keep a track of studies handled in tutorial center of Minority Engineering and Computer Science department. The data obtained from the system will be used as proof of progress in the center and it can be also used for additional funding requests.