Cs Project Report_sample1

Embed Size (px)

Citation preview

  • 8/2/2019 Cs Project Report_sample1

    1/55

    BY : COMPUTER

    STUDIES

    , COMPUTER STUDIES -1-

    TABLE OF

    CONTENTS

    Cover

    Page..1

    Table of

    Contents

    2-3

    A. Problem

    Investigation

    4

    Introduction

    CRIMINAL

    INFORMA

    TION

    SYSTEM

  • 8/2/2019 Cs Project Report_sample1

    2/55

    Versatile Computers.

    ..4

    Problem Investigation.

    4

    Manual System

    Process

    ..5

    Benefits

    ..6

    Drawbacks

    .7

    Proposed

    System

    .8

    Benefits

    .9

    Drawbacks

    10

    Objectives11

    B. System Planning And Design

    PLANNING

    ..12

    Topic

    Planning

    12

    Project

    Planning

    12

    Time

    Planning

    13

    Time

    Plan

    .14

  • 8/2/2019 Cs Project Report_sample1

    3/55

    Hardware

    Specification

    15-16

    Software

    Specification

    ..16

    Software

    Selection....................................................................................

    ............17

    Implementation

    .18-19

    , COMPUTER STUDIES -2-

    C. Testing

    ..20

    CHECK FOR

    LOGIN

    20-22

    Check FOR SEARCHING A Criminal

    Record..23

    On the basis of

    name.

    23-25

    On the basis of ID

    Number

    26-28

    On the basis of

    Location...29-31

    CHECKING FOR THE ADDITON OF A NEW

    RECORD..32-33

    D. User

    Documentation

    .34-50

    E. Evaluation

  • 8/2/2019 Cs Project Report_sample1

    4/55

    System Evaluation..

    Limitation.

    Developments..

    , COMPUTER STUDIES -3-

    Problem investigation

    Versatile Computers

    Computers have now become equally as important as breathing to us.

    Through computers we can share, collect, communicate, entertain, and

    conduct business. It is used by grade school students to scientists. In my

    project I want to utilize two significant features of a computer which is

    speed and storage space. Long ago computers were the size of an entire

    house and could only store data in bytes and megabytes. Now computers

    come in the size of a book and can hold terabytes of data. Whatever the

    reason may be, computers are now part of our daily lives. The main reasonof a computer is to make the work done manually easier and faster. So I

  • 8/2/2019 Cs Project Report_sample1

    5/55

    decided to make a program that makes criminal information system easy to

    process.

    Problem Investigation

    At the early age people used to file or their documents making stacks offiles. The police also used this method to store any person affiliated with

    crime. In this process begins with the crime itself. After the crime has

    occurred the police will have the CSU (crime scene unit) to collect any data

    like the location, mode of the crime, the time of the crime and etc. Then

    this data is sent to the police headquarter where it is documented here all

    the data that has been collected is put together or added if it is a file

    already exists about that criminal. After the criminal data has been

    documented the data is searched this where police tries to find recurring

    data like the location and type of crime, which prepares the starting list forthe police to begin their leads on, and the investigation begins. But, this

    method was working because there werent many criminal at the time.

    Though as time passed number of criminals increased and more types of

    crime were happening. This is where the computer came in, but a computer

    cannot do this without a program.

    , COMPUTER STUDIES -4-

    Manual System Process

    Though this method seems to be very frustrating, it was used for many

    years lets see why. But to know why it was used for many years we first

    have to know how this manual system works.

    THE CRIME OCCURS

    DATA COLLECTED BY

    THE CSU (crime sceneunit)

  • 8/2/2019 Cs Project Report_sample1

    6/55

    , COMPUTER STUDIES -5-

    Now lets find out why it was used so much!

    Benefits

    1. Security

    In the manual system where everything is written and kept in file just

    needs to be stored behind a locked door and it is safe. Also there are

    no duplicates made this prevents people of getting a copy of the

    folder. This reduces the chances of unauthorized access to those

    data. Since all of it is written there is no chance of a virus

    damaging/corrupting or even deleting the information.

    2. Expenses In the Short Term-

    DATA IS SENT TO

    THE POLICEHEADQUARTERS

    CRIMINAL

    DOCUMENTS

    ARE MADE

    CRIMINAL

    DATA IS

    SEARCHED

    STARTING LIST

    IS PREPARED

    THE

    INVESTIAGTION

    BEGINS

  • 8/2/2019 Cs Project Report_sample1

    7/55

    In the manual system all we have to do is write all the data so the

    person would only need paper, pen and some other materials but

    even with some extra materials the overall cost in the short term is

    very less. Also not much electricity in needed to do this work.

    3. Easy to understand-

    For a person to learn the manual system only needs to know how

    write, speak, and read. This process does not require the person to

    have extensive technical information. This allows more people to

    have opportunities to have job in this department.

    , COMPUTER STUDIES -6-

    Now we will see why an alternate system is required

    Drawbacks

    1. Time Taken-

    This manual method is very time consuming not because there is so

    much to do but because at the rate it is done. Doing it through this

    method people have to transfer some data to another person who

    only has to modify it but since there is no copy & past option it has to

    be rewritten every time.

    2. Storage Space-

  • 8/2/2019 Cs Project Report_sample1

    8/55

    As time passes, the number of criminal is to increase and this would

    mean the increase in records of data and eventually what used to

    take one a closet space will need an entire room.

    3. Safety/Retrieval of old files -

    When someone wishes to look over some older files it will be very

    tough to find since there is no search option available also even if the

    person has all the reference numbers it will take a long period of time

    to find the correct file because there would be thousands of files

    present. Also if there was some sort of disaster or any other reason

    the files were lost there would be no back up to retrieve those files.

    4. Inaccuracy/Mistakes-

    Since all of the criminal processing via the manual method would bedone by humans there is chance of more errors occurring than a

    computerized method. The mistakes can range from a small spelling

    mistake to the entering of a wrong data in another field.

    5. Backup-

    Making a backup for all the criminal data present in the police

    database using the manual method is impossible because everything

    would have to be written again and stored somewhere else.

    6. Cost Long Term-

    Though it may look inexpensive at first but after collecting so much

    data can cost a lot and even more

    to maintain. First the storage

    space will be needed more, then

    the cost of hiring more people to

    keep all the files in order (e.g.

    Clean, Stacked, and in order).

    , COMPUTER STUDIES -7-

    Proposed System

    My system is to speed up process of

    this method. As you can see to the left

    my goal is to cut that by half so the

    police can process the criminals at

    much faster pace.

  • 8/2/2019 Cs Project Report_sample1

    9/55

    Here it is shown how my system speeds up the process

    by going straight from the collected data to the processing.My system

    would do all the processing part which is shownat the third box in the flow

    chart. This is where the

    computerized system would replace the manual system

    and speed up the process.

    , COMPUTER STUDIES -8-

    Lets see how this system is better

    Benefits

    1. Time/Processing speed-

    When the criminal data is sent for processing we wont have to copy

    the entire data over again because we can simply copy it from one

    THE CRIME

    OCCURS

    DATA COLLECTED

    BY THE CSU

    SENT AND PROCESSED AT

    HEADQUATRERS

    THE

    INVESTIAGTION

    BEGINS

  • 8/2/2019 Cs Project Report_sample1

    10/55

    place and paste it where we desire. Also if there is a need for

    changing any of the criminal data it can be done quickly because we

    would not have to rewrite everything, making modifying data easier.

    2.Storage Space-

    Instead of having a huge room filled with files of the criminal we can

    have all of that data in a hard disk which would be as big as

    calculator. This would save a lot of space which could be used for any

    other purpose.

    3.Safety/Searching/Backup-

    When all of the files are in a hard disk it is very hard to lose those

    files because there will no need of thousands of them like files. Also if

    at any case the data is lost or corrupted having a backup would be

    easy. Because, all the files are on the disk we would just have to

    make a copy of them and store it another hard disk in case the

    primary disk is not function this will insure the safety of the data.Even searching would be easy so If anyone wants to look at some old

    files for reference they wont have to look through all the files store

    they would only have type in the file search name.

    4.Perfection-

    Since all of the data will be computerized the chance of error is very

    low. Everything will be checked because the person entering the

    data would be human they can mistake while entering the data. But,

    in a computer there can be so many types of validation and

    verification checks so even if the person wants to make a mistake

    they wont be able to.

  • 8/2/2019 Cs Project Report_sample1

    11/55

    , COMPUTER STUDIES -9-

    No system is perfect it might dwell in some aspects but it does have its

    drawbacks.

    Drawbacks

    1. Security-

    As we are advancing so do the rest of the people. Though there is

    copyright protection people can get their hands on this program and

    find a way to get inside the system and misuse the data. If this is to

    happen it can do a lot of damage like interfere with evidence whichwould be used to prosecute a criminal or lead an investigation to

    another path.

    2. Cost-

    Some of the program that is used by the police are very expensive

    and are made by professionals. Since there are a lot of programs

    used the cost from one program to another can be very expensive

    like having protection software or analyzing software for DNA. Also

    the hardware used can be very expensive like a simple hard disk or a

    huge server for the entire city.

    3. User-

    The person using this program or a person who wants to use it much

    be familiar with the program and must require technical expertise.

    Because, not anybody can use it, though it is not that complicated

    the people who want to use it must know the basic computer skills.

  • 8/2/2019 Cs Project Report_sample1

    12/55

    , COMPUTER STUDIES -10-

    Objectives

    To create my computerized method of processing criminal data I had these

    objectives.

    1. A quick search on the data about stored criminals may be carried

    out to start an investigation. If the police have an idea about, who the

    criminal is because of past encounters the police only has to search

    for them in the criminal database and from there they can begin their

    investigation.

    2. Adding new criminal records whenever someone commits a crime.

    When a crime has occurred and it is done by criminal who is new or

    not in their database, their information will be added on to the

    system.

    3. Editing the records of criminals so whenever a criminal record

    needs to be changed can easily be modified. So when a criminal in

    the database already present does or something happens to them

    which will cause some of the data to be changed would be possible.

    So with the system we can change the data that is present.

    4. Security only people which are allowed will be able to access the

    data. Since this information is only for the police members only

    selected people should be able to access this data. So there will be alog in page and only the people who have access could enter. This

    would prevent from non-police members to have access to the

    information.

    5. Signing up for new recruitsPeople who want to add their data so

    they can access the data. The police are always hiring more staff that

    will require access to this data so there will be a sign up from which

    take their information and added to the data base so they will be

    recognized when they want to log in to access the data.

  • 8/2/2019 Cs Project Report_sample1

    13/55

    6. Manufacturing of reports the appropriate reports will be generated

    whenever a police has searched the data. After a search has been

    done the police might want some sort of report. In the report they

    might want to add any of the data that they want off the criminal.

    7. Removal/Deleting of Data about the criminals can be deleted if

    required and moved. When there is need of removing of the criminal

    data maybe because the criminal has died or has to be deleted

    because it was a mistake that the criminal data was entered.

    8. User FriendlyThe program will be very user friendly so even the

    people with minimum knowledge can operate. The person using this

    system would not require the highest knowledge about system

    because it would be very much straight forward so it would be easy

    to use the system.

    , COMPUTER STUDIES -11-

    System Planning And Design

    PLANNING

    Topic Planning

    When I was first told about the CS project, I was extremely fascinated by

    the idea. There were a lot of different and unique ideas that came up

    immediately. I had ideas such as sports, games, and books. I first thought

    about creating a database of football leagues around the world and then

    thought of car dealership agency. Though, when I discussed with my

    teacher,I realized that I wasnt solving any of the problems that I had come

    up with.

    I had seen a few past projects and I was astonished on how many people

    had done on library database but I refused to be a copycat and decided to

    be unique. I watch a lot of old detective movies in which the hero will solve

    a mysterious case using clues that he finds along in his search but, inmovies they never show you more than five to ten minutes of the criminal

    processing. So the idea struck me, why dont I make a program which

    makes processing criminals much easier and quicker. Some forms maybe

    similar to the library database but even being a little different makes it

    unique.

    Project PlanningBefore I could go and work on the program, I had to plan

    what I was going to include in my database and what are the problems I

    wanted to solve. First, I researched about all the problems people can face

    while processing criminals and storing their data. The first problem with themethod was time efficiency since the criminal records were all hand written

  • 8/2/2019 Cs Project Report_sample1

    14/55

    the time taken to process one criminal was enormous. Another problem

    faced was searching, since using the old method a lot of files were

    accumulated through time so if a detective wanted to see a file one or even

    six months old he would have to go through hundreds or if he was in a big

    city he would have to go through thousands of files.

    Therefore, after atiring search, I planned to include the following in my

    project. First of all, I decided make a search form through which anyone

    could search criminals on the basis of name, id and the location they were

    in. Also, there would be a form which allowed the person to add new

    criminal data which would be stored into the database or modify an existing

    criminal record.

    However, some people may/will misuse the system if I would allow anyone

    to come and change the details about the criminal. It is because of thisreason that I decided to make a security form so that only selected users

    can come in and modify, add or delete the data. In my case the people who

    could change these data were the admins. Admins did not have the need to

    search the criminals only to edit and add. When thinking about this option, I

    discovered another problem. What if there is a new admin member who had

    these privileged access. In that case, how will the new admin login? For this

    problem, so I decided to make a sign up form in which a user or admin can

    create a username and password.

    , COMPUTER STUDIES-12-

    Time Planning

    This project was being carried out over an extremely long time so I had to plan my

    time accordingly:

  • 8/2/2019 Cs Project Report_sample1

    15/55

    , COMPUTER STUDIES -13-

    Topic Description Time

    Problem

    Identification

    Figuring out the problem. 14 days

    Problem Solution After the problem is established, Ill

    search for the solution.

    7 days

    Feasibility study After the solution is accepted, I will

    study if the solution is acceptable to

    the problem and if the

    implementation of the solution will

    work.

    21 days

    Research After a solution is found then I will

    research on the needs of the criminal

    processing unit.

    7 days

    Design I decide what program I will use, the

    system input and output processing

    as well as the layout design using a

    flowchart.

    7 days

    Programing & Coding I build the program solution 28 days

    Testing After the system is complete I check

    to see if it meets all my objectives.

    7 days

    Documentation I create manual system for my

    program for other people to use.

    14 days

    Evaluation I check for minor errors and fix them

    or better the system any way

    possible.

    7days

  • 8/2/2019 Cs Project Report_sample1

    16/55

    , COMPUTER STUDIES -14-

    Hardware Specification

  • 8/2/2019 Cs Project Report_sample1

    17/55

    Laptop

    The most important hardware needed for this project. Using a laptop is

    much easier than a desktop computer because unlike a desktop computer I

    can move the laptop around so it makes carrying data around much easier.

    My laptop is

    An Alienware M15x

    Monitor of 15.4 inch screen having a resolution of 1920 x 1080.

    CPU

    It is the central processing unit where it processes the inputs from the input

    devices like a mouse or keyboard etc.

    My CPU

    IntelCorei7 CPU Q720 @ 1.60GHz (8CPUs)

    Memory/RAM- 4096MB

    To clearly check my computer performance I ran the windows 7 system

    information diagnostic tool which showed these results

    , COMPUTER STUDIES -15-

    Printer

    It is an output device it is used to print documents and pictures. I will use it

    to print the system layout documents.

  • 8/2/2019 Cs Project Report_sample1

    18/55

    My Printer

    Canon ip1800 series

    USB Mass Storage Device

    The flash disk is a portable storage device. I will use it to back up my data

    and also carry it around safely.

    My USB

    Toshiba TransMemory USB Device 16 GB

    SoftwareSpecification

    Microsoft Visual Fox Pro 7

    I will use this program to create my system, where all the forms and tables

    are made.

    Microsoft Paint

    To copy pictures from the system or to the system. Also I will use it for

    processing some of the screen shots taken from the system.

    PhotoScape

    It is a photo editing program I will use it to crop pictures and edit them to fit

    for the from or the documents.

    Microsoft Office Word 2010

    It is a word processer I will use it to write the document.

    Operating System

    Windows 7 Home Premium 64-bit build 7600

    , COMPUTER STUDIES -16-

    Software Selection

    When we were first told about this project, there were various soft waresfrom which we could choose, we were told about Visual FoxPro and

  • 8/2/2019 Cs Project Report_sample1

    19/55

    Microsoft Access. However, before I thought about using any other

    software, I thought that Visual FoxPro would be best for me because of

    various reasons.

    I had been using this software for 2 years

    I was comfortable and familiar with all the functions of this software.

    I was learning about this software and would learn more as in school

    as this was the program being taught

    I had already created a program as part of my school project before

    and could reuse some of the commands

    I would not need much help, where as if I would shift the software, I

    would be requiring much more effort and time to spend on it.

    The only drawback, I feel, of using Visual Foxpro is that the project is

    very simple in design as there are not many options to make it

    attractive.

    Though Microsoft Access was a good program against the Visual Fox proso I decided to make table showing their pros and cons

    As you can see it was a hard choice but I chose the visual fox pro.

    Feature Visual Fox Pro Microsoft Access

    Appearance x Good

    Interface & Features x Good

    Ease of Interface Good x

    Speed Good x

    Storage, Transfer &

    Backup

    Good x

  • 8/2/2019 Cs Project Report_sample1

    20/55

    , COMPUTER STUDIES -17-

    Implementation

    Entire Flow Chart of how my project works

    , COMPUTER STUDIES -18-

    SECURITY

  • 8/2/2019 Cs Project Report_sample1

    21/55

    Description

    The above is a basic flowchart showing the exact functions that my criminal

    database would carry out so that it would be worth implementing. When the

    user first enters the database, there will be an option user or admin. If he

    enters as a user, he will be login as user and he can in search any criminal

    on the basis of name, id number, location and/or they can view all the

    criminal data going through each one by one. This is an advantage to the

    user, as many a times; the user might not know the name of the criminal

    but other primary details about the criminal.

    Only the admin can alter with the data present. The admin can modify the

    existing criminal records and add new records, because there can be many

    user and if someone wishes to change a criminal record he will be able to

    that is why only the admin can alter data.

    One major option which cannot be forgotten is the case when a newuser

    joins. So that, this person can also have access to the records, he or she

    must get their own user name and password to go past the security form.

    This free for all who have access to this program but only admin can add

    new admins.

  • 8/2/2019 Cs Project Report_sample1

    22/55

    , COMPUTER STUDIES -19-

    Testing

    Before, I could show my project to anybody, I had to check if all the options

    in my program were working properly or not. This would be a necessity andso there were various tests that I carried out. I performed my test by giving

    the computer three types of data. The first one being the normal data (the

    data that is correct and will show a result), the second type of data would

    be the abnormal data (which would not show any result). As I had created

    various different types of forms, I decided that I would test each and every

    one of those with normal and abnormal data to see the result that the

    program would show. There should be a positive output for the normal data

    and a negative output for the abnormal data. In some cases, I also checked

    by not entering important data (such as in addition) to see what wouldhappen. If required, I made changes so that the output would be the one

    that I had desired.

    CHECK FOR LOGIN (USER NAME AND PASSWORD)

    Above is the form that would appear for the login of authorized users

    Username: aaaa NORMAL DATA

    Password : 1111

    Username :sdas ABNORMAL DATA

    Password :1111

    The following forms would appear.

  • 8/2/2019 Cs Project Report_sample1

    23/55

    , COMPUTER STUDIES -20-

    Normal Data

    (The password is being shown just for proof, the program will not show the

    password when people are logging in.)

    This form will be shown with the correct data to the user, the form where

    users can search (only if correct data is entered)

    , COMPUTER STUDIES-21-

  • 8/2/2019 Cs Project Report_sample1

    24/55

    Abnormal Data

    This form will be shown with the incorrect data to the user( this is vice

    versa as well if the password isnt correct the person will not be allowed to

    search the criminal record)

    , COMPUTER STUDIES-22-

  • 8/2/2019 Cs Project Report_sample1

    25/55

    Check For SEARCHING A Criminal Record:

    1. On the basis of name

    This is when the user has already been logged in. Here the user can search

    for the criminal by the criminals name

    Criminal name: luke NORMAL DATA

    Criminal name :sdas ABNORMAL DATA

    , COMPUTER STUDIES-23-

  • 8/2/2019 Cs Project Report_sample1

    26/55

    Normal Data

    This form will be shown with the correct data to the user. If the correct

    name is entered that criminals record will be shown

    , COMPUTER STUDIES -24

    Abnormal Data

  • 8/2/2019 Cs Project Report_sample1

    27/55

    This form will be shown with the incorrect data to the user. If the wrong

    name is entered the criminal record wont be shown.

    , COMPUTER STUDIES -25-

    Check For SEARCHING FOR A Criminal Record:

  • 8/2/2019 Cs Project Report_sample1

    28/55

    2. On the basis of ID Number

    This is for users to search via the criminals id number.

    Criminal id: 1231231241 NORMAL DATA

    Criminal id: 1123 ABNORMAL DATA

    , COMPUTER STUDIES-26-

    Normal Data

  • 8/2/2019 Cs Project Report_sample1

    29/55

    This form will be shown with the correct data to the user. If the user has

    entered the correct id that criminals record will be shown.

    , COMPUTER STUDIES-27-

    Abnormal Data

  • 8/2/2019 Cs Project Report_sample1

    30/55

    This form will be shown with the incorrect data to the user. If id the number

    entered is wrong the record wont be shown.

    , COMPUTER STUDIES-28-

    Check For SEARCHING FOR A Criminal Record:

  • 8/2/2019 Cs Project Report_sample1

    31/55

    3. On the basis of Location

    If the user wishes to search the criminal by the criminals location, this will

    be the form that they will use.

    Criminal location: vegasNORMAL DATA

    Criminal location: sdafABNORMAL DATA

    , COMPUTER STUDIES-29-

    NORMAL DATA

  • 8/2/2019 Cs Project Report_sample1

    32/55

    This form will be shown with the correct data to the user. If the correct

    location entered, the criminal of that locations record will be shown.

    , COMPUTER STUDIES-30-

    Abnormal Data

  • 8/2/2019 Cs Project Report_sample1

    33/55

    This form will be shown with the incorrect data to the user. If the wrong

    location is entered no records will be shown.

    , COMPUTER STUDIES-31-

    CHECKING FOR THE ADDITON OF A NEW RECORD:

  • 8/2/2019 Cs Project Report_sample1

    34/55

    This check is only for admins because users are limited to only searching,

    sincecriminal records are always being updated new data have to be

    entered.

    New Addition of Criminal Record

    , COMPUTER STUDIES-32-

  • 8/2/2019 Cs Project Report_sample1

    35/55

    Then the criminals record is added to the database

    , COMPUTER STUDIES-33-

  • 8/2/2019 Cs Project Report_sample1

    36/55

    User Documentation

    First these are some tips that might come in handy.

    The red X button will close the form that you are on.

    Use of CTRL Z is handy if you are modifying the criminal records.

    The MAIN FORM (first form)

    Once the program has started this is the first form that you will see and if

    you wish to continue using the database you will click on ENTER.

    , COMPUTER STUDIES-34-

  • 8/2/2019 Cs Project Report_sample1

    37/55

    After you have ENTERED, you will have an option to choose, ADMIN OR

    USER.

    If you choose ADMIN you will be taken to a different form than the USER

    and vice versa.

    , COMPUTER STUDIES-35-

  • 8/2/2019 Cs Project Report_sample1

    38/55

    If you chose ADMIN then you will have to login to confirm you are ADMIN so

    this form will be shown to you.

    Here you will enter your ADMIN username and password. If you want to

    leave the form you can just click on EXIT.

    , COMPUTER STUDIES-36-

  • 8/2/2019 Cs Project Report_sample1

    39/55

    Once you have logged in ( default admin username is bbbb and the

    password is 2222)

    This form will be shown to you

    In this form as the ADMIN you can add new criminal record or modify

    the existing ones. Also if you dont want to change the database you

    leave by clicking on EXIT

    , COMPUTER STUDIES-37-

  • 8/2/2019 Cs Project Report_sample1

    40/55

    If you chose to add new criminal record then this form will be shown to

    you.

    After you are done with adding the new criminals data on the form, which

    you can do by clicking on any of the textbox and from there, you, can type

    in the data. After you are done you can click on FINISHED in doing so the

    data that you have entered will be stored in the database. Also if you havecompleted partially on the criminals record and want exit without saving

    clicking on FINISHED will not store the partial data and you would have

    exited the form. So if you wish to exit clicking on FINISHED will exit you

    from the form and back to the form where you can choose between adding

    and modifying the criminal database.

  • 8/2/2019 Cs Project Report_sample1

    41/55

    , COMPUTER STUDIES-38-

    If you chose to modify the existing criminal records then this form will

    be shown to you.

    ADMIN if you have seen this form on the user form as well do not panic this

    is just one feature off modifying.

    Since ADMINS job is only to add and modify the database, he has to first

    search the criminals record then only can the ADMIN can modify the data.

    So that is why the ADMIN can choose how to find the criminal he is looking

    for.

  • 8/2/2019 Cs Project Report_sample1

    42/55

    , COMPUTER STUDIES-39-

    When the ADMIN has decided that he wants to modify the criminal record

    he can search the criminals records these ways. The forms that open willvary on how the ADMIN wants to search.

    If wants to search by name:

    Or by ID

    Or by location

  • 8/2/2019 Cs Project Report_sample1

    43/55

    , COMPUTER STUDIES-40-

    Regardless of the method the ADMIN chooses to search the criminals

    record the result will be same either the criminals record will be shown or amessage box saying that the record is not present.

    The form to modify will be like how the user searches for the criminal but

    here the ADMIN can modify the data.

    This how the criminal record will be shown (for example I have chosen a

    random criminals record)

    To modify the criminals record the ADMIN has to only select one of the

    textboxes and type in the new data and when the ADMIN is done he can

    just click on done and the new data will be saved.

    , COMPUTER STUDIES-41-

  • 8/2/2019 Cs Project Report_sample1

    44/55

    Now for the USERS, they too will have the same login from but remember

    only ADMIN CAN MAKE NEW ADMINS.The login form will be like this.

    If the USER wants to leave he can click on the EXIT and the form will

    close. If he has forgotten his password then he can click on the FORGOT

    PASSWORD.

  • 8/2/2019 Cs Project Report_sample1

    45/55

    , COMPUTER STUDIES-42-

    When the USER has forgotten his password he can go to the FORGOT

    PASSWORD form. The form will be like this:

    In the form the USER will have to enter is USERNAME then pick the security

    question that he had chosen and the answer to that question (the question

    is in combo box so the USER does not need to make the question) then he

    has to click on SUBMIT and his password will be shown under SUBMIT if

    the answer is wrong and/or doesnt match the USERNAME no password will

    be shown. For example:

    Password =B

    Username= A

    Security Question= what is your pet name

    Answer= C

  • 8/2/2019 Cs Project Report_sample1

    46/55

    , COMPUTER STUDIES-43-

    So the USER types in the information:

    From this information the Password should be C

    So if the user ever forgets his password he can always get it back.

  • 8/2/2019 Cs Project Report_sample1

    47/55

    , COMPUTER STUDIES-44-

    Also if there is a new USER who wants to search the criminal database he

    will have the SIGNUP option by clicking on SIGNUP from the login form.

    This will be the form:

    After the person has filled in the information he just has to click on the

    SIGNUP and his information will be stored on the database so he can login

    as the USER whenever he wants to.

  • 8/2/2019 Cs Project Report_sample1

    48/55

    , COMPUTER STUDIES-45-

    This is an example SIGNUP

    Now let us try to login using this information

  • 8/2/2019 Cs Project Report_sample1

    49/55

    , COMPUTER STUDIES-46-

    Since now we can login lets see what the USER has access to.

    The first form that the USER sees after logging in:

    Like always if the USER wants to Exit he can click on EXIT and the form

    will close.

    The USER privilege is only searching on the criminals because not

    everybody should have access to altering the database.

    If the USER wants to see all the criminal records in the database he will

    click on VIEW ALL DATA

  • 8/2/2019 Cs Project Report_sample1

    50/55

    , COMPUTER STUDIES-47-

    This is the VIEW ALL DATA FORM:

    The USER can click on FIRST CRIMINAL RECORD to go to the first record in

    the database.

    If the USER clicks on LAST CRIMINAL RECORD the last record in the

    database will be shown.

    If the USER clicks on NEXT CRIMINAL RECORD the next record in line will

    be shown.

    And if the user clicks on PREVIOUS CRIMINAL RECORD then the record

    before the current record will be shown.

    When the USER is done searching the USER can click on EXIT and this

    form will be closed and he will be taken to the USERS main form.

  • 8/2/2019 Cs Project Report_sample1

    51/55

    , COMPUTER STUDIES-48-

    If the USER knows the name, id or the location of the criminal he can search

    on the basis of that too.

  • 8/2/2019 Cs Project Report_sample1

    52/55

    , COMPUTER STUDIES-49-

    From this the USER will have these options:

    , COMPUTER STUDIES-50-

  • 8/2/2019 Cs Project Report_sample1

    53/55

    Evaluation

    System Evaluation

    The system I have built is actually good. Most of my objectives were fulfilled

    completely; my system is able to create new criminal records, edit theexisting criminal records, help search within them without much effort, it

    saves time, it maintains the data very safely, it takes up less physical space

    (like you do not need lots of shelves to keep the files like the old method), it

    is continent to use, reduces errors and increases accuracy. Also my system

    is very simple to understand since most of the labels on the forms guide the

    person using the system.

    The system process very fast, not because the data is small compare to

    real life criminal databases, it is fast because it is running on a computer, so

    even if the data was increased ten or twenty times more it will still be

    equally fast.

    Limitations of the New System

    1. Granted that there are validation checks but mistakes can always

    happen and since this criminal databases information can be very

    vital sometimes. Though it is better than the old method accuracy but

    not by a longshot.

    2. Lack oftransactions/reports in real police stations they can print

    reports on specific criminal, the reports can generate many types of

    data from the existing data like the criminals behavior or

    psychological capabilities etc. But, this feature is very complex and to

    build it will require very high programing skills.

    3.Staff information, Admins are allowed every feature of the systembut there is no information about the admin like name, or address

    etc.

  • 8/2/2019 Cs Project Report_sample1

    54/55

    , COMPUTER STUDIES-51-

    Possible Developments

    1. Creating reports on the criminals, so when a User wants to have a

    hard copy of the criminals information for an investigation the user

    can print one to aid him in the investigation.

    2. I could add more information about the staff/Admins/Users like their

    contact numbers, address and E-Mail id etc. So it would make

    contacting them easier. Like a User might want to become an Admin

    so he should know who to contact regarding this matter.

    3. Also tracking the staff members, when a person access the system at

    what time and who was the person that accessed the system and

    what changes did he make or which criminal database was he

    searching or editing.

  • 8/2/2019 Cs Project Report_sample1

    55/55

    , COMPUTER STUDIES-52-