Political party System Design

Task 1

Use case diagram: I found six use case by analyzing the required system:

Use case specifications

1. Use case : Record staff details

Scope: The national parliament election

Level: User goal

Actor: Party officer, staff

Goal: To add stuff record

Main success scenario:

* Person enquires about party

* Person take

* Person join as staff

2. Use case : Record party member details

Scope: The national parliament election

Level: User goal

Actor: Party officer, Member

Goal: To add details of party member

Main success scenario:

* Person enquires about party

* Person take form and fill it up

* Person give member fees and an invoice is given

* Person receives the rules of party

* Person takes the member id

3. Use case : Record election candidate details

Scope: The national parliament election

Level: User goal

Actor: Party officer, member

Goal: To record election candidate details

Main success scenario:

* Member provide details for election candidate

* Member select as election candidate

* Member receives the rules of election

* Member takes the election candidate id

4. Use case : Record national and regional member details

Scope: The national parliament election

Level: User goal

Actor: Party officer

Goal: To add national and regional member details

Main success scenario:

* Member provide details for national or regional member details

* Member select as national or regional member

* Member receives the rules for national or regional member

* Member takes id for national or regional member

5. Use case : Record worker payment details

Scope: The national parliament election

Level: User goal

Actor: Clerk, Party officer, National officer

Goal: To add stuff record

Main success scenario:

* Party worker and national officer provide details for payment

* Party worker and national officer takes payment and an invoice

6. Use case : Record monthly expense details

Scope: The national parliament election

Level: User goal

Actor: National officer

Goal: To add monthly expense details

Main success scenario:

* National officer check all the expenses

* National officer calculate all expenses

* National office make id for record expense details

* National officer record all expense details

Activity Diagram

The activity diagram for this task is:

Task 2

Class diagram:

1 * 1

*

*

1

* 1 1

1 *

1 *

Assignment: Political party 2 March 2010

International Advanced Diploma in Computer Studies Systems Analysis and Design

Task 3

Communication Diagram:

1. Record member details:

2. Record Staff details:

3. Record election candidate details

4. Record national and regional member details

5. Record worker payment

6. Record monthly expense

Sequence diagram:

1. Record member details:

2. Record Staff details

3. Record election candidate details :

4. Record national and regional member details:

5. Record worker payment details :

6. Record monthly expense :

State Machine:

To create a state machine I found two items income and member.

Income:

Member:

Task 4

Data protection laws:

* Explains what data can be held, what information can be disclosed, what the subjects' rights are, whether data can be transferred from one jurisdiction to another and what the procedures are for the transfer.

* Shows the legality or otherwise of transferring data from one jurisdiction to another.

* Explains how to comply with different jurisdictions' data protection laws when transferring data.

* Enables the status of the host jurisdiction and recipient jurisdiction's laws to be assessed prior to the transfer of data.

* Sets out which authorities have to be informed of intended data transfers and what fees are payable.

* Itemises offences relating to data protection, the remedies which can be used and the sanctions which can be imposed.

* Looks at the effect of the EU Directive and the standards of data protection it requires of member states and those operating in or with member states.

http://www.sweetandmaxwell.co.uk/Catalogue/ProductDetails.aspx?recordid=275&productid=6376

b. To develop the computer system this can apply by :

* Encrypt everything (all laptops, desktops, external hard drives).Specially encrypts USB drives by using a full disk encryption solution.

* A secure client communication system should implement. This may include the use of a client or customer portal and encrypted e-mail.

* Strict protection for e-mail sending.

* Use strong passwords.

* All wireless access of network should encrypt.

* A strong firewall and an intrusion prevention system should use.

* All systems should keep fully patched.

* A system can implement for monitoring compliance with the company's security policies and procedures.

* A well known security software can install in system.

http://www.cpa2biz.com/Content/media/PRODUCER_CONTENT/Newsletters/Articles_2008/CorpFin/Protection_Laws.jsp

c. The methods that should be utilized to ensure that data protection best practice is implemented in the new system are:

* Virus/Worm filters are used before data enters into server

* Access control for unauthorized copies.

* Data copies that leave the officer should be protected against unauthorized use by policy-based combinations of physical security and digital security, such as encryption of media.

* If encryption is used to protect data, all backup and archival policies which apply to data should have parallel policies applying to encryption keys, to ensure the keys are secure and protected to the same degree as the data.

Task 5

a. Searching for the party's election candidates for a particular county:

Task 6

a. A set of full normalized tables

0NF:

C_id

C_name

C_address

Member_type

P_member_id

P_member_name

P_member_address

Age

Nationality

DoB

W_id

W_name

W_address

W_age

Phone_number

Worker_type

N_id

N_working_experience

R_id

R_working_experience

exp_id

exp_type

exp_purpose

exp_amount

exp_date

Income_id

Income_id

income_type

income_amount

income_from

income_date

total_income

wp_id

wp_type

wp_amount

wp_date

staff_id

staff_name

staff_address

age

phone_number

DoB

1NF:

Non repetitive data:

P_member_id

P_member_name

P_member_address

Age

Nationality

DoB

C_id

C_name

C_address

Member_type

N_id

N_working_experience

R_id

R_working_experience

Repititive data:

P_member_id

W_id

W_name

W_address

W_age

Phone_number

Worker_type

exp_id

exp_type

exp_purpose

exp_amount

exp_date

Income_id

Income_id

income_type

income_amount

income_from

income_date

total_income

wp_id

wp_type

wp_amount

wp_date

staff_id

staff_name

staff_address

age

phone_number

DoB

2NF:

Repititive data:

Staff

staff_id

staff_name

staff_address

age

phone_number

DoB

Income

Income_id

Income_id

income_type

income_amount

income_from

income_date

total_income

Monthly Expense

exp_id

exp_type

exp_purpose

exp_amount

exp_date

Worker payment

wp_id

wp_type

wp_amount

wp_date

Full time worker

W_id

W_name

W_address

W_age

Phone_number

Worker_type

3rd NF:

Election candidate:

C_id

C_name

C_address

Member_type

P_member_id

Party member

P_member_id

P_member_name

P_member_address

Age

Nationality

DoB

Full time worker

W_id

W_name

W_address

W_age

Phone_number

Worker_type

National Member

N_id

N_working_experience

C_id

Regional Member

R_id

R_working_experience

C_id

Monthly expense

exp_id

exp_type

exp_purpose

exp_amount

exp_date

Income_id

Income

Income_id

income_type

income_amount

income_from

income_date

total_income

stuff_id

p_member_id

Worker payment

wp_id

wp_type

wp_amount

wp_date

income_id

w_id

Staff

staff_id

staff_name

staff_address

age

phone_number

DoB

b. Data dictionary:

Election candidate:

Field Name

Data Type

Length

Primary key

Reference key

Reference table

C_id

int

10

A

N/A

N/A

C_name

varchar

30

N/A

N/A

N/A

Candidate_address

Varchar

60

N/A

N/A

N/A

Member_type

Varchar

40

N/A

N/A

N/A

P_Member_id

Int

30

N/A

A

Party member

National member:

Field Name

Data Type

Length

Primary key

Reference key

Reference table

N_id

int

10

A

N/A

N/A

N_working_experience

varchar

30

N/A

N/A

N/A

C_id

Int

10

N/A

A

Election candidate

Regional Member:

Field Name

Data Type

Length

Primary key

Reference key

Reference table

R_id

int

10

A

N/A

N/A

R_working_experience

varchar

30

N/A

N/A

N/A

C_id

Int

10

N/A

A

Election candidate

Party member:

Field Name

Data Type

Length

Primary key

Reference key

Reference table

P_member_id

int

10

A

N/A

N/A

P_member_address

varchar

60

N/A

N/A

N/A

Age

int

10

N/A

N/A

N/A

Nationality

Varchar

10

N/A

N/A

N/A

DoB

Date

10

N/A

N/A

N/A

Income:

Field Name

Data Type

Length

Primary key

Reference key

Reference table

Income_id

int

10

A

N/A

N/A

Income_type

varchar

30

N/A

N/A

N/A

Income_amount

Double

20

N/A

N/A

N/A

Income_from

Varchar

10

N/A

N/A

N/A

Income_date

Date

10

N/A

N/A

N/A

Total income

Double

20

N/A

N/A

N/A

P_member_id

Int

10

N/A

A

Party member

Staff_id

Int

10

N/A

A

staff

Monthly expense:

Field Name

Data Type

Length

Primary key

Reference key

Reference table

Exp_id

int

10

A

N/A

N/A

Exp_type

varchar

30

N/A

N/A

N/A

Exp_purpose

varchar

20

N/A

N/A

N/A

Exp_amount

Double

20

N/A

N/A

N/A

Exp_date

Date

10

N/A

N/A

N/A

Income_id

Double

20

N/A

A

Income

Staff

Field Name

Data Type

Length

Primary key

Reference key

Reference table

Staff_id

int

10

A

N/A

N/A

Staff_name

varchar

30

N/A

N/A

N/A

Staff_address

Varchar

60

N/A

N/A

N/A

Age

Int

10

N/A

N/A

N/A

Phone_number

Varchar

10

N/A

N/A

N/A

DoB

date

10

N/A

N/A

N/A

Full time worker

Field Name

Data Type

Length

Primary key

Reference key

Reference table

W_id

int

10

A

N/A

N/A

W_name

varchar

30

N/A

N/A

N/A

W_address

varchar

60

N/A

N/A

N/A

W_age

int

10

N/A

N/A

N/A

Phone_number

varchar

10

N/A

N/A

N/A

Worker_type

varchar

20

N/A

N/A

N/A

Worker payment

Field Name

Data Type

Length

Primary key

Reference key

Reference table

Wp_id

int

10

A

N/A

N/A

Wp_type

varchar

20

N/A

N/A

N/A

Wp_amount

double

20

N/A

N/A

N/A

Wp_date

date

10

N/A

N/A

N/A

Income_id

int

10

N/A

A

Income

W_id

int

10

N/A

A

Full time worker

Task 7

I have completed the task 1-3 by using object-oriented approach. In object-oriented approach it's easier to evolve, flexible and its more robust and reusable which is not easier to do in structured approaches.

The advantages of object-oriented approach:

* Its encourages re-use not only of modules but also of entire designs

* In particular it allows the construction of a class hierarchy from which classess required in a new application can either be re-used, or constructed.

* Object-oriented approaches tend to be based upon stable forms which are more resilient to change

* Object- based models appeal to the working of human cognition, and hence the human input into the development of a software systems is likely to be more natural and less error prone

The disadvantages of object-oriented approach:

* Unavailability of object-oriented CASE tools

* Confusion with too many different object-oriented development methods

* Increased initials development time

* Decrease systems performance

www.cs.bham.ac.uk/internal/courses/intro.../unit-3-4-ood-conclusion.pdf

The advantages of structured approaches:

* It is used for requirements specifications and system design

* It is structure a project into small with well defined activities

* Structured approaches can specify the sequence and interaction of this activities

* Its understandable by both users and developers

The disadvantages of structured approaches:

* Its cant allow for ever change the user requirements

* Some problems are more difficult to solve using this approaches

* In structured approaches, nested structures can be difficult to follow

http://www.dcs.bbk.ac.uk/~steve/cdm6/index.htm

http://books.google.com.bd/books?id=2OBm9ZQy9PMC&pg=PA233&lpg=PA233&dq=disadvantages+of+using+Structured+approach&source=bl&ots=byotK57-7u&sig=la9G3Jd4YUGPXU8DGdqAlWR8bn0&hl=bn&ei=FbCBS5WmNtqI4gaY5qz1Bg&sa=X&oi=book_result&ct=result&resnum=1&ved=0CAQQ6AEwADhQ#v=onepage&q=disadvantages%20of%20using%20Structured%20approach&f=false

Task 8

To: The national officer

Date: February 22, 2010

From: IT manager

Subject: A report about description of the new system

Introduction:

On February 11, 2010 I have investigated for making a new system for a political party. For making this I have completed some tasks which are below.

Task1

In this task I produced a functional model includes use case diagrams, use case specifications, activity diagrams by analyzing the required system. In use case diagram I found six use case and six actors from required system. All of that use case names are: record staff details, record member details, record election candidate details, record national and regional member details, record worker payment details, record monthly expense details. After that I did the specification for all of this use cases with main success scenario. In this task I also did the activity diagram through the actors. As I mentioned that I found five actors named national officer, party member, clerk, party officer, staff, party worker.

Task 2

In task 2 I have analyzed the required system and produced a structural model, which includes class diagrams with attributes and operations. For class diagrams I found nine classes and their attributes and operations. I found the operations from sequence diagram.

Task 3

In this task I have created a behavioral model including communication diagrams, sequence diagrams and state machines. For making a communication and sequence diagrams I used six use case. In this diagram I got the operations for using in class diagram. After that I did a state machine. For this required systems I found 2 classes for making a state machine named income and member.

Task 4

In task 4 I researched the data protection law that is available in my country for my system. I have exposed the outline of data protection laws and regulations. I also have exposed how this applies to the computer system being developed. Finally I recommend the methods to ensure that data protection best practice is implemented in the new system.

Task 5

In this task I have created a prototype user interface by using vb.net 2005. In this task I have created a page to search for the party's election candidates for a particular county. I also have created a page for editing a member details and for adding a new member. Finally I have created a page for to show the list of part's MPs where each was elected.

Task 6

In this task I have created the database for this system including a set of fully normalised tables and I have also shown the normalisation process for each. I have also provided the data dictionary entries for all items included in the database design. The steps I followed for normalisation are as follows:

Ø First I gathered the set of data items and listed down all the possible data items of the system. These are the un normalised data.

Ø From this list of un normalised data , I chose a candidate key which particularly identifies this particular grouping of data. In this system the candidate key is the p_member_id as the p_member_id is related to all the entities in the system.

Ø The next step is to convert the un normalised data to the First normal form. I have done this by separating out the repetitive and the non repetitive data from the listed out un normalised data on the basis of the candidate key.

Ø After the First normal form is completed, I converted it into the Second normal form.

Ø I listed out all the non repetitive data separately and then I identified the non repetitive data dependencies between the attributes and then separate them.

Ø Then I converted the Second normal form to the Third normal form. I did this by identifying the repetitive data dependencies on one attribute and created a separate table for those attributes.

After the normalization I have created the data dictionary entries for all items included in database design. In this data dictionary I defined field name, data type, length, primary key, foreign key, and reference table for every table.

Task 7

In this task I described how the object-oriented approach to the design of the system in tasks 1-3 differs using a structured methodology. I also explained the advantages and the disadvantages of both object-oriented and structured approaches using the system that I have designed.

Hardware Specification

For using this system the party need to create a network with some pc's which will connected under a server pc. The pc's should be good cond. At least Pentium 3 or Pentium 4 configuration need.

Conclusion:

Finally I have done that entire task to complete a new system for a political party by analysing the required system.

Appendix

Appendix A (Assumption)

There are some assumptions that I have made during the development of this system. These are:

* The system will store information about the payment information by the clerk.

* The party officer will be recording the necessary details of every staff and members working in the party.

* A member will pay the annual subscription fee and any individual organizations can provide donation to increase the income.

Appendix B (Improvement of my system)

The limitation in this system is a member cant join or pay money for the party by online. So this is the further improvement of my system.

Appendix C (Alternative approach to system design)

The alternative approach for this system is I can add a subsystem like a record of total votes that the candidate will get in next election and also can implement a survey system to know that how populate he/she in his/her county.

Please be aware that the free essay that you were just reading was not written by us. This essay, and all of the others available to view on the website, were provided to us by students in exchange for services that we offer. This relationship helps our students to get an even better deal while also contributing to the biggest free essay resource in the UK!