【正文】
The response time required. The suitability for the device to the particular application. Will decimal points need to be inserted 167。 Volume of the output 167。 Location of the output 167。 Content of the output 167。 Interface outputs, which involve the user in municating directly with OUTPUT DEFINITION The outputs should be defined in terms of the following points: 167。 User’s main interface with the puter. External Outputs, whose destination is outside the organization. Conducting any user training that might be needed for using the system. s location after the acceptance testing is successful. Developing the system, which meets the SRS and solving all the requirements of the system? Will the system be used and work properly if it is being developed and implemented? Are there technical guarantees of accuracy, reliability, ease of access and data security? Earlier no system existed to cater to the needs of ‘Secure Infrastructure Implementation System’. The current system developed is technically feasible. It is a web based user interface for audit workflow at NICCSD. Thus it provides an easy access to the users. The database’s purpose is to create, establish and maintain a workflow among various entities in order to facilitate all concerned users in their various capacities or roles. Permission to the users would be granted based on the roles specified. Therefore, it provides the technical guarantee of accuracy, reliability and security. The software and hard requirements for the development of this project are not many and are already available inhouse at NIC or are available as free as open source. The work for the project is done with the current equipment and existing software technology. Necessary bandwidth exists for providing a fast feedback to the users irrespective of the number of users using the system. . Operational Feasibility Proposed projects are beneficial only if they can be turned out into information system. That will meet the organization’s operating requirements. Operational feasibility aspects of the project are to be taken as an important part of the project implementation. Some of the important issues raised are to test the operational feasibility of a project includes the following: Will the proposed system provide adequate response to inquiries, regardless of the number or location of users? Does the necessary technology exist to do what is suggested? Operation Feasibility s identification for access control. Since password information is quite sensitive, it is desirable in general to mask it or suppress type out. Chapter 3 Feasibility Report Preliminary investigation examine project feasibility, the likelihood the system will be useful to the organization. The main objective of the feasibility study is to test the Technical, Operational and Economical feasibility for adding new modules and debugging old running system. All system is feasible if they are unlimited resources and infinite time. There are aspects in the feasibility study portion of the preliminary investigation: Displays search result. Users receive the personal details. Public user requests the search. Admin generate the reports. Admin enters his or her user id and password. To reduce manual efforts in activities that involved repetitive work. Facilitating desired information display, very quickly, by retrieving information from users. Minimizing the manual records kept at different locations. Visual Studio .Net Framework (Minimal for Deployment) Visual Studio .Net 2005 Enterprise Edition HDD 20 GB Hard Disk Space and Above SOFTWARE REQUIREMENTS: PIV GHz Processor and Above Based on the given requirements, conceptualize the Solution Architecture. Choose the domain of your interest otherwise develop the application for . Depict the various architectural ponents, show interactions and connectedness and show internal and external elements. Design the web services, web methods and database infrastructure needed both and client and server. User maintenance is used to create a new user, modify the details of existing user or remove the existing user. Only the admin type user will have access to this part. Normal user won’t have access to this. While storing into database the password should be encrypted and stored. The user can choose its own logic to encrypt the password. Conducting any user training that might be needed for using the system. s location after the acceptance testing is successful. Developing the system, which meets the SRS and solving all the requirements of the system? The final system is constructed, based on the refined prototype. The existing prototype is evaluated in the same manner as was the previous prototype, and if necessary, another prototype is developed from it according to the fourfold procedure outlined above. A second prototype is evolved by a fourfold procedure: 1. Evaluating the first prototype in terms of its strengths, weakness, and risks. 2. Defining the requirements of the second prototype. 3. Planning an designing the second prototype. 4. Constructing and testing the second prototype. A preliminary design is created for the new system. Report generation feature is provided using Crystal Reports to generate different kinds of reports like bar graphs, pie charts and table type charts etc. It provides high level of security using different protocols like etc. Chapter 2