Examining The Computer Systems Of Railways Information Technology Essay

August 9, 2017 Information Technology

So, I will stepwise seven undertakings to analysis what the system demand and plan the construction and map of a computing machine system to acquire the well design to Steam Railway Company.

In this undertaking, we will acquire the usage instance diagrams, usage instance specifications and the activity diagrams. At now, we get the usage instance diagram foremost.

This is a usage instance diagram of the Steam Railway Company. It named Steam Railway Company Ticket System. We can see the stairss of the client and the railroad company staff will make. And which methods of the measure include or extends.

We Will Write a Custom Essay Specifically
For You For Only $13.90/page!


order now

We can see the measure of the client and the staff besides has a contact by ‘Telephone booking ‘ , ‘E-mail engagement ‘ , and ‘Sale by counter ‘and ‘Ticket collect ‘ . Another two measure are for railroad staff merely, ‘Record client inside informations ‘ is include the method ‘Record ticket sold ‘ . And the method ‘Print reference labels ‘ is extends by ‘Print ticket ‘ .

Now, allow me acquire the usage instance specification.

This is the tabular array of usage instance description. In this tabular array for Ticket sale in Railway Company, we can saw the measure 1 to 3 should be to make it, step 4 and measure 5 has a pick to make, like the Railway Company staff printout the reference labels or non, the staff mail the ticket to the client or the client acquire the ticket by counter.

After the usage instance diagram and usage instance specification, we get the activity diagram now.

This is a flat one activity diagram of the computing machine system. We can see I have integrating some stairss to four activities. Because some stairss are similitude, and some map can be include by other measure.

This is a flat two activity diagram for tickets sale and booking with swim lanes. I have already breakdown the first activity to a item drawing. We can see the measure ‘ Get Customer Details ‘ and Step ‘Confirm Data and Request ‘ are for the staff, other measure are all for the client.

This is a flat two activity diagram for record inside informations and tickets sold with out swim lanes. Cause this activity need the staff merely, and I have already breakdown this activity to a item drawing. After the flow ‘Get Details and Sold Record ‘ , I have utilize a fork node to treat ‘Input Customer Data ‘ and ‘Input Tickets Sold information ‘ in a same clip, so I use the merge node to convey it to flux ‘Save Data ‘ .

This is a flat two activity diagram for print tickets with out swim lanes. Cause this activity besides work by the staff merely. And I have already breakdown this activity to a item drawing. This diagram has include a determination, after ‘Print Tickets ‘ , we need to take the type for the tickets frontward need the references labels or non.

This is a flat two activity diagram for ticket collect with swim lanes. After the tickets check, I need take the tickets frontward by counter or mail. Then the client gets the tickets at the terminal.

In this undertaking I will expose a category diagram, and input the properties and operations.

This is a category diagram for the computing machine system of Railway Company includes the database already. It is already include the properties. We can see what the types of the properties on each category are. And some operations are already indoors besides.

In undertaking 3, I will expose the Sequence diagram, State machine diagram and Communication diagram.

This is a sequence diagram for the client purchase the ticket by counter. First, the client has a communicating ‘buy tickets ‘ to the Railway Company staff, so the staff acquire the client inside informations and record that, after record inside informations, the staff printout the tickets and give it to the client.

This is a sequence diagram for the clients book the tickets by telephone. We can see this diagram merely has more measure ‘address labels printout ‘ , other measure all same as bargain ticket at counter. And the ticket frontward by mail after the tickets cheques.

This is a province machine diagram for the tickets sale and engagement usage instance. We can see the action and object on this diagram. The clients go to the station counter to bespeak tickets or phone to the Railway to booking tickets, and disburse after the tickets request complete.

This is a province machine diagram for the record inside informations and ticket sold usage instance. The flow on this diagram merely has informations get and information input, and the object has file created and salvage record.

This is a province machine diagram for print tickets use instance. This diagram displays the flow of print tickets, and extends the references labels printout map.

This is a province machine diagram for ticket collect usage instance. We can see it is has two tickets frontward type indoors, one is pass by counter, the other one is bringing by mail. Two choose are acquiring the tickets by client at the terminal.

This is a communicating diagram for the tickets sale and engagement. In this diagram, we can see the measure of flow. The client give the messages to the staff to bespeak tickets, so the staff make a new file to enter the inside informations and journeys, and take a confirm at the terminal.

This is a communicating diagram for the record inside informations and ticket sold. This diagram merely has railway staff to input the inside informations and sold record in to the database.

This is a communicating diagram for print tickets. In the diagram the work of staff has acquire the inside informations and record signifier database, so publish the tickets and references labels.

This is a communicating diagram for ticket collect. We can see the railroad staff do the tickets collect to client after print tickets and print references labels.

In this undertaking I will research the information protection in the computing machine system development.

In this undertaking 4a, I will explicate the information protection Torahs how to ordinances and best pattern in my place of birth: Hong Kong.

In Hong Kong, we have an Office of the Privacy Commissioner for Personal Data, Hong Kong to Elmer and execute signifier the information protection Torahs. And we have six points of rules:

Principle 1 — Purpose and mode of aggregation This provides for the lawful and just aggregation of personal informations and sets out the information a information user must give to a information topic when roll uping personal informations from that topic.

Principle 2 — Accuracy and continuance of keeping This provides that personal informations should be accurate, up-to-date and kept no longer than necessary.

Principle 3 — Use of personal informations This provides that unless the information topic gives consent otherwise personal informations should be used for the intents for which they were collected or a straight related intent.

Principle 4 — Security of personal informations This requires appropriate security steps to be applied to personal informations ( including informations in a signifier in which entree to or processing of the information is non operable ) .

Principle 5 — Information to be by and large available This provides for openness by informations users about the sorts of personal informations they hold and the chief intents for which personal informations are used.

Principle 6 — Entree to personal informations This provides for informations topics to hold rights of entree to and rectification of their personal informations.

It was proposed by Office of the Privacy Commissioner for Personal Data, Hong Kong ( 2001 ) that.

Base on these six rules, and we have the commissioner to pattern the Torahs, so we can do certain the ordinances is work and hold best pattern in my place of birth.

The computing machine system development has limitary by the information protection Torahs, because the system will hive away a batch of informations for the client. So we are need to managing really cautiousness for the esthesia information concernment.

The computing machine system will hold a database to hive away the information of client, and base on the protection Torahs the Railway Company merely can acquire the name, references and telephone figure of the client.

In the new system, I have set an entree right map to do certain that information protection is best pattern. We give the username and watchword to the staff. The competency of this username and watchword merely can input a information into the database. If need to palinode, backup and travel the information, the entree right competency is needed to up on director rubric.

x

Hi!
I'm Amanda

Would you like to get a custom essay? How about receiving a customized one?

Check it out