Preview

Planet Biometrics Analysis

Powerful Essays
Open Document
Open Document
1797 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Planet Biometrics Analysis
ABSTRACT

Planet Biometrics is a web based application that analyses the employee details recorded by the biometric device. Only the admin can view and analyze information in this system. This application manipulates only pre inserted data. And the data is read into the database from a .xls file. Planet biometrics is basically a data mining application because it takes a pile of data and the admin can access useful information according to his requirements.
The data it reads is made by a biometric device which reads employee intime and outtime based on their biometric login system. And this data must be converted into useful information such as obtaining average hours worked by an employee in a month, punctuality of the employee and so on.
…show more content…
The user can send or contact us if he have any query through mail.

The other activities which user can handle with Planet biometrics are;
1) Creates Accounts, Contact,, and view the information

4.2 Non Functional Requirements 1. Secure access of confidential data. 2. 24*7 availability. 3. Better design component to get best performance. 4. Security:
The security measure makes sure there could not be any unauthorized access to the system. Only the person or entity which knows the password can enter into the system and access the information. And only the admin can create login accounts.

5. Reliability The reliability of a system refers to how reliably it can handle the users with

6. MAINTAINABILITY
This system has been designed taking care of modularity. Errors in the system can be traced to modules. If system is max reliable then it will be max easy for maintenance. 7. RESOURCE UTILIZATION
Resource utilization is the process where the resource is utilized in an efficient manner, without wasting any resource. 8. Flexibility
This app is flexible for future update and modifications. 5. SYSTEM DESIGN

5.1
…show more content…
7. Software Testing
7.1 Introduction:
Software testing is a critical element of software quality assurance and represents the ultimate review of specification, design and coding. In fact, testing is the one step in the software engineering process that could be viewed as destructive rather than constructive.
A strategy for software testing integrates software test case design methods into a well-planned series of steps that result in the successful construction of software. Testing is the set of activities that can be planned in advance and conducted systematically.
Once code has been generated, program testing begins. The testing process focuses on the logical internals of the software, ensuring that all statements have been tested, and on the functional externals; that is, conducting tests to uncover errors and ensure that defined input will produce actual results that agree with required results.

Scope of testing: Testing of this application is done to verify all the validations and fulfillment of the Specifications and requirements provided by the client.

7.2 Testing

You May Also Find These Documents Helpful

  • Better Essays

    Service Request Sr Rm 004

    • 1582 Words
    • 7 Pages

    This phase requires the coordination and cooperation of many people. The system analyst cannot conduct all the work alone. The first step involves coding. Coding is process of converting writing computer language that tells the system the commands to perform when certain commands are given. As the coding process being, the process of testing is also taking place as well. When coding is written, it must pass validation or the computer will not understand the language and the expect program will not perform to standard. Many strategies are available for testing validation; the size of the system dictates which is best. Throughout the system development life cycle, software testing was taking place after certain events to ensure the preliminary creation was on track. During analysis the overall test plan was developed. In the design phase, the unit test, integration test plan, and a system test plan was developed. Inspections are formal group activities that perform manually to find obvious errors such as syntax and…

    • 1582 Words
    • 7 Pages
    Better Essays
  • Good Essays

    The intent of this document is to apprise prospective users of the proposed features of Test Case Generation for the purpose of solicitation of comments and suggestions. The current design is a product of preliminary discussions of data flow diagrams and desired features. This document covers only the current release; further functionality…

    • 1533 Words
    • 7 Pages
    Good Essays
  • Powerful Essays

    Mat 540 Week 4 Paper

    • 1775 Words
    • 8 Pages

    * Is this design robust? If so, explain why. If not, explain what you can do to make it robust.…

    • 1775 Words
    • 8 Pages
    Powerful Essays
  • Powerful Essays

    The next step in the process is to create a test plan based on the requirements document. The business analyst will perform the procedure of code and then document the expected results and the actual results. It is very important that the documentation has enough detail, so if the test fails, the developer will know where the failure occurred. (Software Testing Procedures, 2009)…

    • 2001 Words
    • 9 Pages
    Powerful Essays
  • Satisfactory Essays

    o Provide a set of test values that test the abnormal operation of this program segment.…

    • 349 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    FMECA is a methodology to identify and analyse predicted failure modes of various parts within the assembly or system. It is a technique to resolve potential problems in a system before they occur. It is most widely used reliability analysis technique performed between the conceptual and initial stage of the detailed design phase of the system in order to assure that all the potential failures have been considered and the proper provisions have been made to eliminate these failures. [1] (Ref. system reliability theory,2nd edition, Marvin Rausand) this technique can assist in selecting alternative concept for the same system and also provide a basis for maintenance planning.…

    • 976 Words
    • 4 Pages
    Powerful Essays
  • Satisfactory Essays

    This Is a Paper

    • 469 Words
    • 2 Pages

    Is this design robust? If so, explain why. If not, explain what you can do to make it robust.…

    • 469 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Adjustments can be made in the development phrase however most of the decision made will not change. Testing The testing phrase happens whenever the first initial software is created, this is because after the first creation there tends to be a series of bugs, errors and crashes. The testing phrase is used to make an evaluation of the usability of the software and allows the company to fix any bugs.…

    • 1542 Words
    • 7 Pages
    Good Essays
  • Good Essays

    The purpose of testing a research hypothesis is to prove or disprove the research question. The first step in testing a research hypothesis is to state the problem in the form of a question. The second step is to state the research question as it relates to the null hypothesis and alternative hypothesis. Then the parameters must be set to test the null hypothesis. The fourth step is to calculate the probability of the test statistics or rejection region. Finally, the findings from the tests must be stated.…

    • 824 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Senior Level Experience

    • 1237 Words
    • 5 Pages

    Test Planning manages the overall testing workload, quality assurance, and software defect management. Test Automation strives to develop automated scripts for testing and reach an optimum level of automated test cases within each software product. Test Software Execution is where the day to day software testing is performed to identify defects in application code and assist the business and applications in addressing and/or resolving the products defects in a timely manner.…

    • 1237 Words
    • 5 Pages
    Good Essays
  • Good Essays

    Jad Session

    • 369 Words
    • 2 Pages

    Control: The system must operate with existing employee ID's and apply the principle of least privilege security.…

    • 369 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    The software has recent improvements to address past issues as well as keep up with the technology of today. In 2006, the [2] National Institute of Standards and Technology (NIST) conducted numerous testing sponsored by multiple U.S. Government agencies. One of the priority testing was on the algorithm development project which was designed to advance facial recognition technology and support previous developed software.…

    • 3118 Words
    • 13 Pages
    Powerful Essays
  • Satisfactory Essays

    Square feet

    • 503 Words
    • 3 Pages

    Test plan - Prepare at least 3 sets of input data (Test data) along with their expected output for testing your program. Your test data can be presented in the form of a table as follows (note: feel free to adapt to your design)…

    • 503 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Facial recognition technology is a very well-known technology because of the high security it provides to crucial businesses and government agencies. According to the FBI this technology was, "Developed in the 1960s, the first semi-automated system for facial recognition required the administrator to locate features (such as eyes, ears, nose, and mouth) on photographs before it calculated distances and ratios to a common reference point" (Facial Recognition). Government agencies and crucial companies such as the FBI and Boeing are the main users of facial recognition technology. It was created in the 1960s using photographs, but with the hard work of coders, the technology has been greatly improved to locate images and scan faces. It is still…

    • 1033 Words
    • 5 Pages
    Good Essays
  • Satisfactory Essays

    Security; by providing the best and stable system to make customer’s information secure from unauthorized people to gain it. Through creation of administrator account who will be the only person who has access to view this kind of information in the system. This will make system secure especially for transaction.…

    • 305 Words
    • 2 Pages
    Satisfactory Essays