
Download - CSE307 – ARTEFACT
-
8/6/2019 CSE307 ARTEFACT
1/17
HCI
CSE307ARTEFACT
Prepared By:
Name: SHAHZAD IDREES
Student ID: 109059820/1
Date: April 2011
Alpha Meridian College
BScUniversity of Sunderland
-
8/6/2019 CSE307 ARTEFACT
2/17
Table of Contents
Table of Contents ............................................................................................................................ 0Introduction ..................................................................................................................................... 2
Why JustRite? ........................................................................................................................... 2Project Scope ................................................................................................................................... 3Proposed Solution ............................................................................................................................ 4
Solution Objectives ................................................................................................................... 4Main Features of System ................................................................................................................. 4Hardware Requirements .................................................................................................................. 5Software Requirements ................................................................................................................... 5Implementation Approach ............................................................................................................... 6Project Schedule .............................................................................................................................. 7Deliverables ..................................................................................................................................... 8Costs ................................................................................................................................................ 9
Validity of Proposal .................................................................................................................. 9
Payment Schedule and Terms ....................................................................................................... 10Appendix A: Resumes of Key Resources...................................................................................... 11Appendix B: CPM - Critical Path Method .................................................................................... 12Appendix B: Risk List ................................................................................................................... 15
-
8/6/2019 CSE307 ARTEFACT
3/17
Page 2 of 17
All right [email protected] JustRite
Introduction
Why JustRite?JustRite believes that it is uniquely positioned to provide the optimal services to Law Enforce
Agency due to our vast experience as an IT Solutions Provider, our technical capabilities andknowledge base, methodology and processes, our strong positioning as a Microsoft GoldCertified Partner and we are also ISO certified.The value proposition of working with JustRite includes:
Leveraging vast experience technology turnkey rollouts in diverse and complexenvironments
Access to a large team of TK based consulting team for review of architecture, designand rollout related work items
Extensive experience of application design and implementation in technologies likeMicrosoft Systems Management Server, Microsoft Operations Manager, MicrosoftIdentity Integration Server, Microsoft Rights Management Server, and Microsoft OfficeSharePoint Server and Microsoft Project Server, which are planned on the Law Enforce
Agency infrastructure upgrade roadmap. This experience can be leveraged to align theinfrastructure with future needs
-
8/6/2019 CSE307 ARTEFACT
4/17
Page 3 of 17
All right [email protected] JustRite
Project Scope
Scope for this software project is to develop the system of Law Enforce department based on new
technology that will be used for faster & efficient processing instead of manual system.
The developed software project is totally based on the requirements of the end users, and will beused onwards for the better data manipulation than before. It will enhance the data reliability,
security in a user-friendly graphical environment. In this way, the user would not be sick of using
the software. It will enhance the work capability of the end user and the management will
obviously like to use the software, as it is easy to uses.
-
8/6/2019 CSE307 ARTEFACT
5/17
Page 4 of 17
All right [email protected] JustRite
Proposed Solution
Solution Objectives The developed system will be user friendly, developed using the graphical user interface. The developed system will be efficient with respect to report generation and searching. The developed system will minimize the chance of data redundancy. The developed system will provide a reliable data manipulation, which will reduce the
chance of mistake.
The developed system will provide the improved mechanism for new entry system. The developed system will provide an easy and quick way to search and maintain
records.
The developed system will be capable of storing the address and contact numbers.. The developed system will be capable of report generation case progress
Main Features of System
This system will be designed by using Microsoft technologies having below features
The new system is based on new technology. In the new system data security should be available in order to protect from unauthorized
persons or accidental loss or destruction of data. Suggested system should contain error-free information that should ensure accurate
record keeping.
The new proposed system is totally based on graphics. In the new proposed system, the easy to use help is designed which is for the feasibility
of the end user.
-
8/6/2019 CSE307 ARTEFACT
6/17
Page 5 of 17
All right [email protected] JustRite
Hardware Requirements
Following section presents hardware requirements to implement this solution. Costs areintentionally left blank on the assumption that is well positioned to procure thishardware at a competitive price using its direct procurement channel.
Hardware RequirementsHardware Quantity Assumptions
Database Server 1 Core I 7 FSB with 4 MB cache, RAM 4 GB 667 MHZ, Harddisk 500 GB
Application Server 1 Core I 7 FSB with 4 MB cache, RAM 4 GB 667 MHZ, Harddisk 500 GB
Software Requirements
Following section presents software licensing requirements to implement this solution. Costs areintentionally left blank on the assumption that client is well positioned to procure these licenses ata competitive price using its direct procurement channel.
Software Requirements
SoftwareQuantity(License) Assumptions
Microsoft SQAServer2008
1 License Allocation:1 license per PC
Microsoft VisualStudio2008
1 License Allocation:1 license per PC
Crystal Reports 1 License Allocation:1 license per PC
Microsoft Operationsystem Windows 7
2 License Allocation:2 license per PC
-
8/6/2019 CSE307 ARTEFACT
7/17
Page 6 of 17
All right [email protected] JustRite
Implementation Approach
JustRite will use the following phased approach towards designing, implementation and roll-outof up graded infrastructure at Law Enforcement Agency. We will use Waterfall modeldevelopment methodology for this project. Also have an independent Quality Assurance
department which will inspect the software at all levels of development.1. Planning2. Identify System Requirements3. Design System4. Code the System Components and Test Them Individually5. Integration6. System Testing7. Deploy the System & Maintenance (if required)
Planning
Requirements
Design
Code & Test
Integration
SystemTesting
Delivery &
Maintenance
Advantages of Waterfall model1. Most appropriate when requirements are completely, correctly, and consistently
defined2. Customer receives system functionality all at once3. Fairly accurate cost and schedule estimates can be made when applied correctly4. Straightforward, simple to understand and use.5. Deliverables are frozen at the end of each phase and serves as the baseline for the
following phases.
-
8/6/2019 CSE307 ARTEFACT
8/17
Page 7 of 17
All right [email protected] JustRite
Project Schedule
The project duration estimate is comprised of the following phase estimates:
Project Phase Duration (Estimate)Planning 2 weeks
Assessment Identify System Requirements 2 week
Design System 1month
Implementation 2-3 month
Testing 1 month
Total Project Duration 5 to 6 months
-
8/6/2019 CSE307 ARTEFACT
9/17
Page 8 of 17
All right [email protected] JustRite
Deliverables
JustRite team will generate the following deliverables on this project:
Project Plan and schedules Project status updates Technical design document consisting(if required) Installation and configuration of in scope infrastructure components Test plan and test cases and test results (if required) Training of infrastructure support team Operations guide
-
8/6/2019 CSE307 ARTEFACT
10/17
Page 9 of 17
All right [email protected] JustRite
Costs
This section presents only project implementations costs related to consulting services offered byJustRite. Other costs including hardware and software related costs are not part of this section.These numbers represents best estimates based on the initial representation made to JustRite
consultants by client personnel. It is suggested that a contingency budget of 15% to be considercovering the risk of project overruns.
Services Cost
Service Effort (man hrs) Cost
Project management 100 300
Assessment/Requirement gathering andanalysis
100200
Infrastructure Design 150 300
Solution Implementation 400 500
System Testing 100 300
Training and Post Implementation Support 200 300
Total Services Cost
1900
Services Cost: $
Pricing Model: Fixed Cost
Terms of Payment: All invoices to be paid using Net-7 payment terms.
Validity of Proposal
The Proposal is valid for thirty (30) days from the date imprinted below.
__10-April-2011__
-
8/6/2019 CSE307 ARTEFACT
11/17
Page 10 of 17
All right [email protected] JustRite
Payment Schedule and Terms
JustRite will invoice based on successful completion of the various phases of the project as perthe following details:
Phase Deliverable Payment
Initiation a. Project team allocation 25%Assessment
a. Existing infrastructure layoutb. Desired state layoutc. Roadmap of infrastructure upgrade 25%
Designa. Technical design documentb. Test plan and test cases 20%
Implementationa. Implementation of in scope infrastructure
components in Productionb. Test results 20%
Closinga. Operations guideb. Training of infrastructure support team 10%
-
8/6/2019 CSE307 ARTEFACT
12/17
Appendix A: Resumes of Key Resources
-
8/6/2019 CSE307 ARTEFACT
13/17
Page 12 of 17
All right [email protected] JustRite
Appendix B: CPM - Critical Path Method
Name Task Predecessor Duration (Days)
A Feasibility Study None 5
B Cost Estimation None 3
C Project Planning A,B 10
D Requirement Gathering C 7
E Write Use Case F 5
F Analyze the requirement D 6
G Design System E 15
H Design Database F 5
I Coding G,H 30
J Unit Testing I 7
K System Testing J 4
L Deployment Installation K 2
-
8/6/2019 CSE307 ARTEFACT
14/17
Page 13 of 17
All right [email protected] JustRite
START
A B
C
G
F
E
D
H
K
J
I
L
End
5 3
10
7
6
15
5 5
30
7
4 2
-
8/6/2019 CSE307 ARTEFACT
15/17
Page 14 of 17
All right [email protected] JustRite
Activity Duration ES EF LS LF TS FS
A 5 0 5 0 5 0 0
B 3 0 3 2 5 2 2
C 10 5 15 5 15 0 0
D 7 15 22 15 22 0 0
E 6 22 28 22 28 0 0
F 15 28 43 28 43 0 0
G 5 43 48 43 48 0 0
H 5 43 48 43 48 0 0
I 30 48 78 48 78 0 0
J 7 78 85 78 85 0 0
K 4 85 89 85 89 0 0
L 2 89 91 89 91 0 0
There are two critical paths, which are as follows:
1- A->C->D->E->F->G->I->J->K->L2- A->C->D->E->F->H->I->J->K->L
-
8/6/2019 CSE307 ARTEFACT
16/17
Page 15 of 17
All right [email protected] JustRite
Appendix C: Risk List
Risk ID Risks description Category Probability
1 Scope of the project is not
so clear.
Project Risks 10%
2 Ambiguous requirements Requirements Risks 30%
3 There are requirements that
are technically difficult to
implement.
Technical Risks 30%
4 Larger no. of users than
planned
Business Risk 5%
5 Problem in team member
collaboration
Staff size and
experience
20%
The possibility of suffering harm or loss in terms of danger is called risk. We are excepting
following threads and we are trying to prevent our system from the following threads. These
threads are Virus attacking, Hacking, and electricity failure.
Virus Attacking
Virus is an important factor when we are talking about computerized system. Because
management will use internet also. Many new viruses are introduces day by day.
Preventing Technique:
-
8/6/2019 CSE307 ARTEFACT
17/17
Page 16 of 17
All right [email protected] JustRite
We will maintain and install high level anti-software for preventing the system from viruses.
Hacking:
Our system is desktop so there is a little chance of data hacking.
Preventing Technique:
A user can not be login without user name and Password
Data Crash
It is possible that our data is crash in any reason so we have to be prepare ourselves for such
situation.
Preventing Technique:
We can save them in such situation by creating back of data. Or in case if it is also be lost then
use the recovery software for recovering the data.
Electricity Failure:
Being a Pakistani we know failure of electricity is not a big problem. So we have to ready for this
kind of problem.
Preventing Technique
We can save by using the UPS.