1 Specification of IT Systems Mandatory Exercise Week 3 Jonas B. Jørgensen, 20021728 Rune Simonsen, 20022374 Torsten Aaboe Andersen, 20033031 Jesper G.

Slides:



Advertisements
Similar presentations
Exercise 1 Consider the ER diagram below. Assume that an employee may work in up to two departments or may not be assigned to any department. Assume that.
Advertisements

E Bidding Log on Screen. Bid Details Search Criteria for Bid Details.
D EVELOPING D ATA M ODELS Joe Meehean 1. B USINESS R EQUIREMENTS Business Narrative How the company works, what do they do Consistency and Simplicity.
OCS Library Systems TIMED ACCESS GATEKEEPER ON-LINE PRINT VENDING.
INFO 425 Week 31 INFO 425 Design Problem I Week 3 – SDS Improvements Glenn Booker.
Warm-up: April 11 What’s the difference between a checking and savings account?
Debit Card Plastic card that looks like a credit card
Security: Playing in Safe By: Matt Hill Identification and Access Identification and Access | When Disaster Strikes | Disaster Recovery Plan | Software.
ATM User Interface Design. Requirements A bank customer is able to access his or her account using an automatic teller machine. To be able to use an ATM.
1 Specification of IT Systems Mandatory Exercise Week 5 Jonas B. Jorgensen, Rune Simonsen, Torsten Aaboe Andersen, Jesper G.
Specification of IT Systems Mandatory Exercise Week 3 Group 3, Søren Vestergaard, Smari Waage, Belma Boyraz, Jannick Hoy.
Combi Oven Controller By Theis Kristensen Johan Haslev Martin Tilsted Jens Bjerre.
Entity-Relationship Diagrams Elements, Syntax Guidelines Dictionary.
1 Specification of IT Systems Mandatory Exercise Week 3.
Morten Bohøj, Jakob Dam og Brian Jensen Gruppe 2 A A R H U S U N I V E R S I T E T SoITS d. 19. september 2006 Assignment 3 ERD.
Database – Part 2a Dr. V.T. Raja Oregon State University.
EFTPOS and credit Card payments Jana Skriveris Line 4 Due: 14 th Nov Business Admin.
Data Modeling using Entity Relationship Diagramming (ERD)
Bite sized training sessions: Data Modelling – Part 1 of 2 Data Model Diagrams Feb 2011 Prepared by Guy Beauchamp Group Projects & IT.
Check: A written order to a bank to pay the stated amount to the person or business (payee)named on the check. Canceled check: A check that bears the.
Completing QualityNet Identity Provisioning System (QIPS) Registration Form for User Editors and Viewers.
Conceptual Design Lecture - 2 Database Development.
Database Design Sections 6 & 7 Second Normal Form (2NF), Unique Identifiers (UID), Third Normal Form (3NF), Arcs, Hierarchies and Recursive relationships.
Individual DFD Assignment
Tutorial 3. This tutorial went through how to convert multiplicity numbering used in UML modelling to ERD, and vice versa. In the exam and assignments,
ENTITIES & ATTRIBUTES Introduction to Databases. STARTER ACTIVITY… What is the pattern between these flash cards?
SFWR ENG 3KO4 Software Development for Computer/Electrical Engineering Fall 2009 Instructor: Dr. Kamran Sartipi Software Requirement Specification (SRS)
June 2007 Frontline staff SCONUL Access The largest borrowing scheme for higher education in the UK and Ireland.
UML’s StateChart FSM, EFSM in UML Concurrent states Tool support.
Copyright Ó Oracle Corporation, All rights reserved. Assign Unique Identifiers A Unique Identifier (UID) is any combination of attributes and/or.
Entity Relationship Diagram (ERD). Objectives Define terms related to entity relationship modeling, including entity, entity instance, attribute, relationship.
Checking & Savings Accounts Economics What is a Checking Account?  Common financial service used by many consumers (a place to keep money)  Funds.
Combined Problems. Reminder For the Class DO NOT put your names on any assignments, midterms or finals, only your ID number. DO NOT put your names on.
Submitted By: DRPU Software Team Site:
1 Object-Oriented Static Modeling of the Banking System - III Lecture # 33.
ENTITY RELATIONSHIP DIAGRAM. Objectives Define terms related to entity relationship modeling, including entity, entity instances, attribute, relationship.
1 Database Design Sections 6 & 7 First Normal Form (1NF), Second Normal Form (2NF), Unique Identifiers (UID), Third Normal Form (3NF), Arcs, Hierarchies.
Introduction What would our society be like now if we did not have ATm’s? Not able to access money when we urgently want it. You will have to go to the.
7/10/20161 Computer Security Protection in general purpose Operating Systems.
DEVRY CIS 321 iLab 4 Check this A+ tutorial guideline at For more classes visit
CJA 444 Week 2 Learning Team Team Diversity Paper NEW Check this A+ tutorial guideline at Learning-Team-Team-Diversity-Paper-NEW.
CJS 200 Week 8 Individual Parole and Truth-in-Sentencing Paper Check this A+ tutorial guideline at
CPMGT 300 Week 3 Learning Team Planning Process Groups and Developing the Scope Check this A+ tutorial guideline at
DBM 380 Week 3 DQ 2 Why do you think the use of icons in entity-relationship diagrams as described in the Masri (2008) article resulted in a better understanding.
DBM 380 Week 3 Individual Assignment ERD Creation Project The following assignment refers to material found in the Virtual Organizations. Create a detailed.
Week-2-Individual-Reliability-and-Validity- Paper Check this A+ tutorial guideline at 382/BSHS-382-Week-2-Individual-Reliability-
BIS 303 Week 3 Individual Assignment Hospitality Information Systems and Users Paper Check this A+ tutorial guideline at
BSA 385 Week 3 Individual Assignment Frequent Shopper Program Part 2 Check this A+ tutorial guideline at
BSA 411 Week 4 Individual Assignment Process Analysis and System Concept Development Process Analysis and System Concept Development Submit a 3- to 4-page.
Checking Account & Debit Card Simulation
Information system for fitness centre
Multiplication Strategies
Object-Oriented Static Modeling of the Banking System - I
UML’s StateChart FSM, EFSM in UML Concurrent states Tool support.
CIS 321Competitive Success/snaptutorial.com
CIS 321 Lessons in Excellence-- cis321.com. CIS 321 Entire Course (Devry) For more course tutorials visit CIS 321 Week 1 iLab 1 Milestone.
CIS 321 Education for Service-- snaptutorial.com
CIS 321 Teaching Effectively-- snaptutorial.com
Entity Relationship Diagrams
If you want to retake the vocabulary quiz, print a reassessment form from my website and fill it out. The concept/TEK is: 2E;7A Check Additional Practice.
Technical Module A Data Modeling Definitions
United Arab Emirates University Level 4 Students 2016/2017
INFS 6225 Object Oriented Systems Analysis & Design
IELTS Online Registration
United Arab Emirates University Level 4 Students 2017/2018
Database Design and Development
Computer Security Protection in general purpose Operating Systems
Real-Time Structured Analysis and Design Technique (RSTAD)
G061 - Data Dictionary.
Presentation transcript:

1 Specification of IT Systems Mandatory Exercise Week 3 Jonas B. Jørgensen, Rune Simonsen, Torsten Aaboe Andersen, Jesper G. Jensen,

2 Exercise 1 - ERD

3 Exercise 2 - Dictionary (1) Card reader. Entity type. A piece of hardware able to read access cards and accept pincodes(numbers). Keypad terminal. Entity type. A piece of hardware able to accept numbers (user ID and pincode) Card. Entity type. A piece of plastic of size approx. 5cm*6cm*2mm that contains an ID written on the card and in a magnetic area. Access control form. Entity type. A piece of paper the user fills out to gain access. Must contain studentID/employeeID, name, signature, expiry date and where the person wants access. Access log. Entity type. A log of when and to whom access is given. Access right. Entity type. A list of locations and corresponding timeframes in which a user has access. This list has an expire date.

4 Exercise 2 - Dictionary (2) Logs access to (ah: Access hardware al: Access log). Relationship name. An access hardware terminal ah writes time and user for all given access in al. Can read (cr: Card reader c: Card). Relationship name. Cr can read the identification of the card. Exp. date. Attribute name. Describes the date where a users access rights expires.

5 Consistency  Consistency

6 Checking validity by elementary sentences  The user will always have exactly one card  Each location can have multiple access hardware  A user can access any location in his access right list  The card printer can write its actions in the card log. ...

7 Checking Validity by snapshots  A student is issued a new card but his access rights contains no locations. (ok)  A location exists in the system but no users have access to the location. (ok)  An access right is created with an expire date earlier than the current date. (bad) ...