cs project report_sample1
TRANSCRIPT
-
8/2/2019 Cs Project Report_sample1
1/55
BY : COMPUTER
STUDIES
, COMPUTER STUDIES -1-
TABLE OF
CONTENTS
Cover
Page..1
Table of
Contents
2-3
A. Problem
Investigation
4
Introduction
CRIMINAL
INFORMA
TION
SYSTEM
-
8/2/2019 Cs Project Report_sample1
2/55
Versatile Computers.
..4
Problem Investigation.
4
Manual System
Process
..5
Benefits
..6
Drawbacks
.7
Proposed
System
.8
Benefits
.9
Drawbacks
10
Objectives11
B. System Planning And Design
PLANNING
..12
Topic
Planning
12
Project
Planning
12
Time
Planning
13
Time
Plan
.14
-
8/2/2019 Cs Project Report_sample1
3/55
Hardware
Specification
15-16
Software
Specification
..16
Software
Selection....................................................................................
............17
Implementation
.18-19
, COMPUTER STUDIES -2-
C. Testing
..20
CHECK FOR
LOGIN
20-22
Check FOR SEARCHING A Criminal
Record..23
On the basis of
name.
23-25
On the basis of ID
Number
26-28
On the basis of
Location...29-31
CHECKING FOR THE ADDITON OF A NEW
RECORD..32-33
D. User
Documentation
.34-50
E. Evaluation
-
8/2/2019 Cs Project Report_sample1
4/55
System Evaluation..
Limitation.
Developments..
, COMPUTER STUDIES -3-
Problem investigation
Versatile Computers
Computers have now become equally as important as breathing to us.
Through computers we can share, collect, communicate, entertain, and
conduct business. It is used by grade school students to scientists. In my
project I want to utilize two significant features of a computer which is
speed and storage space. Long ago computers were the size of an entire
house and could only store data in bytes and megabytes. Now computers
come in the size of a book and can hold terabytes of data. Whatever the
reason may be, computers are now part of our daily lives. The main reasonof a computer is to make the work done manually easier and faster. So I
-
8/2/2019 Cs Project Report_sample1
5/55
decided to make a program that makes criminal information system easy to
process.
Problem Investigation
At the early age people used to file or their documents making stacks offiles. The police also used this method to store any person affiliated with
crime. In this process begins with the crime itself. After the crime has
occurred the police will have the CSU (crime scene unit) to collect any data
like the location, mode of the crime, the time of the crime and etc. Then
this data is sent to the police headquarter where it is documented here all
the data that has been collected is put together or added if it is a file
already exists about that criminal. After the criminal data has been
documented the data is searched this where police tries to find recurring
data like the location and type of crime, which prepares the starting list forthe police to begin their leads on, and the investigation begins. But, this
method was working because there werent many criminal at the time.
Though as time passed number of criminals increased and more types of
crime were happening. This is where the computer came in, but a computer
cannot do this without a program.
, COMPUTER STUDIES -4-
Manual System Process
Though this method seems to be very frustrating, it was used for many
years lets see why. But to know why it was used for many years we first
have to know how this manual system works.
THE CRIME OCCURS
DATA COLLECTED BY
THE CSU (crime sceneunit)
-
8/2/2019 Cs Project Report_sample1
6/55
, COMPUTER STUDIES -5-
Now lets find out why it was used so much!
Benefits
1. Security
In the manual system where everything is written and kept in file just
needs to be stored behind a locked door and it is safe. Also there are
no duplicates made this prevents people of getting a copy of the
folder. This reduces the chances of unauthorized access to those
data. Since all of it is written there is no chance of a virus
damaging/corrupting or even deleting the information.
2. Expenses In the Short Term-
DATA IS SENT TO
THE POLICEHEADQUARTERS
CRIMINAL
DOCUMENTS
ARE MADE
CRIMINAL
DATA IS
SEARCHED
STARTING LIST
IS PREPARED
THE
INVESTIAGTION
BEGINS
-
8/2/2019 Cs Project Report_sample1
7/55
In the manual system all we have to do is write all the data so the
person would only need paper, pen and some other materials but
even with some extra materials the overall cost in the short term is
very less. Also not much electricity in needed to do this work.
3. Easy to understand-
For a person to learn the manual system only needs to know how
write, speak, and read. This process does not require the person to
have extensive technical information. This allows more people to
have opportunities to have job in this department.
, COMPUTER STUDIES -6-
Now we will see why an alternate system is required
Drawbacks
1. Time Taken-
This manual method is very time consuming not because there is so
much to do but because at the rate it is done. Doing it through this
method people have to transfer some data to another person who
only has to modify it but since there is no copy & past option it has to
be rewritten every time.
2. Storage Space-
-
8/2/2019 Cs Project Report_sample1
8/55
As time passes, the number of criminal is to increase and this would
mean the increase in records of data and eventually what used to
take one a closet space will need an entire room.
3. Safety/Retrieval of old files -
When someone wishes to look over some older files it will be very
tough to find since there is no search option available also even if the
person has all the reference numbers it will take a long period of time
to find the correct file because there would be thousands of files
present. Also if there was some sort of disaster or any other reason
the files were lost there would be no back up to retrieve those files.
4. Inaccuracy/Mistakes-
Since all of the criminal processing via the manual method would bedone by humans there is chance of more errors occurring than a
computerized method. The mistakes can range from a small spelling
mistake to the entering of a wrong data in another field.
5. Backup-
Making a backup for all the criminal data present in the police
database using the manual method is impossible because everything
would have to be written again and stored somewhere else.
6. Cost Long Term-
Though it may look inexpensive at first but after collecting so much
data can cost a lot and even more
to maintain. First the storage
space will be needed more, then
the cost of hiring more people to
keep all the files in order (e.g.
Clean, Stacked, and in order).
, COMPUTER STUDIES -7-
Proposed System
My system is to speed up process of
this method. As you can see to the left
my goal is to cut that by half so the
police can process the criminals at
much faster pace.
-
8/2/2019 Cs Project Report_sample1
9/55
Here it is shown how my system speeds up the process
by going straight from the collected data to the processing.My system
would do all the processing part which is shownat the third box in the flow
chart. This is where the
computerized system would replace the manual system
and speed up the process.
, COMPUTER STUDIES -8-
Lets see how this system is better
Benefits
1. Time/Processing speed-
When the criminal data is sent for processing we wont have to copy
the entire data over again because we can simply copy it from one
THE CRIME
OCCURS
DATA COLLECTED
BY THE CSU
SENT AND PROCESSED AT
HEADQUATRERS
THE
INVESTIAGTION
BEGINS
-
8/2/2019 Cs Project Report_sample1
10/55
place and paste it where we desire. Also if there is a need for
changing any of the criminal data it can be done quickly because we
would not have to rewrite everything, making modifying data easier.
2.Storage Space-
Instead of having a huge room filled with files of the criminal we can
have all of that data in a hard disk which would be as big as
calculator. This would save a lot of space which could be used for any
other purpose.
3.Safety/Searching/Backup-
When all of the files are in a hard disk it is very hard to lose those
files because there will no need of thousands of them like files. Also if
at any case the data is lost or corrupted having a backup would be
easy. Because, all the files are on the disk we would just have to
make a copy of them and store it another hard disk in case the
primary disk is not function this will insure the safety of the data.Even searching would be easy so If anyone wants to look at some old
files for reference they wont have to look through all the files store
they would only have type in the file search name.
4.Perfection-
Since all of the data will be computerized the chance of error is very
low. Everything will be checked because the person entering the
data would be human they can mistake while entering the data. But,
in a computer there can be so many types of validation and
verification checks so even if the person wants to make a mistake
they wont be able to.
-
8/2/2019 Cs Project Report_sample1
11/55
, COMPUTER STUDIES -9-
No system is perfect it might dwell in some aspects but it does have its
drawbacks.
Drawbacks
1. Security-
As we are advancing so do the rest of the people. Though there is
copyright protection people can get their hands on this program and
find a way to get inside the system and misuse the data. If this is to
happen it can do a lot of damage like interfere with evidence whichwould be used to prosecute a criminal or lead an investigation to
another path.
2. Cost-
Some of the program that is used by the police are very expensive
and are made by professionals. Since there are a lot of programs
used the cost from one program to another can be very expensive
like having protection software or analyzing software for DNA. Also
the hardware used can be very expensive like a simple hard disk or a
huge server for the entire city.
3. User-
The person using this program or a person who wants to use it much
be familiar with the program and must require technical expertise.
Because, not anybody can use it, though it is not that complicated
the people who want to use it must know the basic computer skills.
-
8/2/2019 Cs Project Report_sample1
12/55
, COMPUTER STUDIES -10-
Objectives
To create my computerized method of processing criminal data I had these
objectives.
1. A quick search on the data about stored criminals may be carried
out to start an investigation. If the police have an idea about, who the
criminal is because of past encounters the police only has to search
for them in the criminal database and from there they can begin their
investigation.
2. Adding new criminal records whenever someone commits a crime.
When a crime has occurred and it is done by criminal who is new or
not in their database, their information will be added on to the
system.
3. Editing the records of criminals so whenever a criminal record
needs to be changed can easily be modified. So when a criminal in
the database already present does or something happens to them
which will cause some of the data to be changed would be possible.
So with the system we can change the data that is present.
4. Security only people which are allowed will be able to access the
data. Since this information is only for the police members only
selected people should be able to access this data. So there will be alog in page and only the people who have access could enter. This
would prevent from non-police members to have access to the
information.
5. Signing up for new recruitsPeople who want to add their data so
they can access the data. The police are always hiring more staff that
will require access to this data so there will be a sign up from which
take their information and added to the data base so they will be
recognized when they want to log in to access the data.
-
8/2/2019 Cs Project Report_sample1
13/55
6. Manufacturing of reports the appropriate reports will be generated
whenever a police has searched the data. After a search has been
done the police might want some sort of report. In the report they
might want to add any of the data that they want off the criminal.
7. Removal/Deleting of Data about the criminals can be deleted if
required and moved. When there is need of removing of the criminal
data maybe because the criminal has died or has to be deleted
because it was a mistake that the criminal data was entered.
8. User FriendlyThe program will be very user friendly so even the
people with minimum knowledge can operate. The person using this
system would not require the highest knowledge about system
because it would be very much straight forward so it would be easy
to use the system.
, COMPUTER STUDIES -11-
System Planning And Design
PLANNING
Topic Planning
When I was first told about the CS project, I was extremely fascinated by
the idea. There were a lot of different and unique ideas that came up
immediately. I had ideas such as sports, games, and books. I first thought
about creating a database of football leagues around the world and then
thought of car dealership agency. Though, when I discussed with my
teacher,I realized that I wasnt solving any of the problems that I had come
up with.
I had seen a few past projects and I was astonished on how many people
had done on library database but I refused to be a copycat and decided to
be unique. I watch a lot of old detective movies in which the hero will solve
a mysterious case using clues that he finds along in his search but, inmovies they never show you more than five to ten minutes of the criminal
processing. So the idea struck me, why dont I make a program which
makes processing criminals much easier and quicker. Some forms maybe
similar to the library database but even being a little different makes it
unique.
Project PlanningBefore I could go and work on the program, I had to plan
what I was going to include in my database and what are the problems I
wanted to solve. First, I researched about all the problems people can face
while processing criminals and storing their data. The first problem with themethod was time efficiency since the criminal records were all hand written
-
8/2/2019 Cs Project Report_sample1
14/55
the time taken to process one criminal was enormous. Another problem
faced was searching, since using the old method a lot of files were
accumulated through time so if a detective wanted to see a file one or even
six months old he would have to go through hundreds or if he was in a big
city he would have to go through thousands of files.
Therefore, after atiring search, I planned to include the following in my
project. First of all, I decided make a search form through which anyone
could search criminals on the basis of name, id and the location they were
in. Also, there would be a form which allowed the person to add new
criminal data which would be stored into the database or modify an existing
criminal record.
However, some people may/will misuse the system if I would allow anyone
to come and change the details about the criminal. It is because of thisreason that I decided to make a security form so that only selected users
can come in and modify, add or delete the data. In my case the people who
could change these data were the admins. Admins did not have the need to
search the criminals only to edit and add. When thinking about this option, I
discovered another problem. What if there is a new admin member who had
these privileged access. In that case, how will the new admin login? For this
problem, so I decided to make a sign up form in which a user or admin can
create a username and password.
, COMPUTER STUDIES-12-
Time Planning
This project was being carried out over an extremely long time so I had to plan my
time accordingly:
-
8/2/2019 Cs Project Report_sample1
15/55
, COMPUTER STUDIES -13-
Topic Description Time
Problem
Identification
Figuring out the problem. 14 days
Problem Solution After the problem is established, Ill
search for the solution.
7 days
Feasibility study After the solution is accepted, I will
study if the solution is acceptable to
the problem and if the
implementation of the solution will
work.
21 days
Research After a solution is found then I will
research on the needs of the criminal
processing unit.
7 days
Design I decide what program I will use, the
system input and output processing
as well as the layout design using a
flowchart.
7 days
Programing & Coding I build the program solution 28 days
Testing After the system is complete I check
to see if it meets all my objectives.
7 days
Documentation I create manual system for my
program for other people to use.
14 days
Evaluation I check for minor errors and fix them
or better the system any way
possible.
7days
-
8/2/2019 Cs Project Report_sample1
16/55
, COMPUTER STUDIES -14-
Hardware Specification
-
8/2/2019 Cs Project Report_sample1
17/55
Laptop
The most important hardware needed for this project. Using a laptop is
much easier than a desktop computer because unlike a desktop computer I
can move the laptop around so it makes carrying data around much easier.
My laptop is
An Alienware M15x
Monitor of 15.4 inch screen having a resolution of 1920 x 1080.
CPU
It is the central processing unit where it processes the inputs from the input
devices like a mouse or keyboard etc.
My CPU
IntelCorei7 CPU Q720 @ 1.60GHz (8CPUs)
Memory/RAM- 4096MB
To clearly check my computer performance I ran the windows 7 system
information diagnostic tool which showed these results
, COMPUTER STUDIES -15-
Printer
It is an output device it is used to print documents and pictures. I will use it
to print the system layout documents.
-
8/2/2019 Cs Project Report_sample1
18/55
My Printer
Canon ip1800 series
USB Mass Storage Device
The flash disk is a portable storage device. I will use it to back up my data
and also carry it around safely.
My USB
Toshiba TransMemory USB Device 16 GB
SoftwareSpecification
Microsoft Visual Fox Pro 7
I will use this program to create my system, where all the forms and tables
are made.
Microsoft Paint
To copy pictures from the system or to the system. Also I will use it for
processing some of the screen shots taken from the system.
PhotoScape
It is a photo editing program I will use it to crop pictures and edit them to fit
for the from or the documents.
Microsoft Office Word 2010
It is a word processer I will use it to write the document.
Operating System
Windows 7 Home Premium 64-bit build 7600
, COMPUTER STUDIES -16-
Software Selection
When we were first told about this project, there were various soft waresfrom which we could choose, we were told about Visual FoxPro and
-
8/2/2019 Cs Project Report_sample1
19/55
Microsoft Access. However, before I thought about using any other
software, I thought that Visual FoxPro would be best for me because of
various reasons.
I had been using this software for 2 years
I was comfortable and familiar with all the functions of this software.
I was learning about this software and would learn more as in school
as this was the program being taught
I had already created a program as part of my school project before
and could reuse some of the commands
I would not need much help, where as if I would shift the software, I
would be requiring much more effort and time to spend on it.
The only drawback, I feel, of using Visual Foxpro is that the project is
very simple in design as there are not many options to make it
attractive.
Though Microsoft Access was a good program against the Visual Fox proso I decided to make table showing their pros and cons
As you can see it was a hard choice but I chose the visual fox pro.
Feature Visual Fox Pro Microsoft Access
Appearance x Good
Interface & Features x Good
Ease of Interface Good x
Speed Good x
Storage, Transfer &
Backup
Good x
-
8/2/2019 Cs Project Report_sample1
20/55
, COMPUTER STUDIES -17-
Implementation
Entire Flow Chart of how my project works
, COMPUTER STUDIES -18-
SECURITY
-
8/2/2019 Cs Project Report_sample1
21/55
Description
The above is a basic flowchart showing the exact functions that my criminal
database would carry out so that it would be worth implementing. When the
user first enters the database, there will be an option user or admin. If he
enters as a user, he will be login as user and he can in search any criminal
on the basis of name, id number, location and/or they can view all the
criminal data going through each one by one. This is an advantage to the
user, as many a times; the user might not know the name of the criminal
but other primary details about the criminal.
Only the admin can alter with the data present. The admin can modify the
existing criminal records and add new records, because there can be many
user and if someone wishes to change a criminal record he will be able to
that is why only the admin can alter data.
One major option which cannot be forgotten is the case when a newuser
joins. So that, this person can also have access to the records, he or she
must get their own user name and password to go past the security form.
This free for all who have access to this program but only admin can add
new admins.
-
8/2/2019 Cs Project Report_sample1
22/55
, COMPUTER STUDIES -19-
Testing
Before, I could show my project to anybody, I had to check if all the options
in my program were working properly or not. This would be a necessity andso there were various tests that I carried out. I performed my test by giving
the computer three types of data. The first one being the normal data (the
data that is correct and will show a result), the second type of data would
be the abnormal data (which would not show any result). As I had created
various different types of forms, I decided that I would test each and every
one of those with normal and abnormal data to see the result that the
program would show. There should be a positive output for the normal data
and a negative output for the abnormal data. In some cases, I also checked
by not entering important data (such as in addition) to see what wouldhappen. If required, I made changes so that the output would be the one
that I had desired.
CHECK FOR LOGIN (USER NAME AND PASSWORD)
Above is the form that would appear for the login of authorized users
Username: aaaa NORMAL DATA
Password : 1111
Username :sdas ABNORMAL DATA
Password :1111
The following forms would appear.
-
8/2/2019 Cs Project Report_sample1
23/55
, COMPUTER STUDIES -20-
Normal Data
(The password is being shown just for proof, the program will not show the
password when people are logging in.)
This form will be shown with the correct data to the user, the form where
users can search (only if correct data is entered)
, COMPUTER STUDIES-21-
-
8/2/2019 Cs Project Report_sample1
24/55
Abnormal Data
This form will be shown with the incorrect data to the user( this is vice
versa as well if the password isnt correct the person will not be allowed to
search the criminal record)
, COMPUTER STUDIES-22-
-
8/2/2019 Cs Project Report_sample1
25/55
Check For SEARCHING A Criminal Record:
1. On the basis of name
This is when the user has already been logged in. Here the user can search
for the criminal by the criminals name
Criminal name: luke NORMAL DATA
Criminal name :sdas ABNORMAL DATA
, COMPUTER STUDIES-23-
-
8/2/2019 Cs Project Report_sample1
26/55
Normal Data
This form will be shown with the correct data to the user. If the correct
name is entered that criminals record will be shown
, COMPUTER STUDIES -24
Abnormal Data
-
8/2/2019 Cs Project Report_sample1
27/55
This form will be shown with the incorrect data to the user. If the wrong
name is entered the criminal record wont be shown.
, COMPUTER STUDIES -25-
Check For SEARCHING FOR A Criminal Record:
-
8/2/2019 Cs Project Report_sample1
28/55
2. On the basis of ID Number
This is for users to search via the criminals id number.
Criminal id: 1231231241 NORMAL DATA
Criminal id: 1123 ABNORMAL DATA
, COMPUTER STUDIES-26-
Normal Data
-
8/2/2019 Cs Project Report_sample1
29/55
This form will be shown with the correct data to the user. If the user has
entered the correct id that criminals record will be shown.
, COMPUTER STUDIES-27-
Abnormal Data
-
8/2/2019 Cs Project Report_sample1
30/55
This form will be shown with the incorrect data to the user. If id the number
entered is wrong the record wont be shown.
, COMPUTER STUDIES-28-
Check For SEARCHING FOR A Criminal Record:
-
8/2/2019 Cs Project Report_sample1
31/55
3. On the basis of Location
If the user wishes to search the criminal by the criminals location, this will
be the form that they will use.
Criminal location: vegasNORMAL DATA
Criminal location: sdafABNORMAL DATA
, COMPUTER STUDIES-29-
NORMAL DATA
-
8/2/2019 Cs Project Report_sample1
32/55
This form will be shown with the correct data to the user. If the correct
location entered, the criminal of that locations record will be shown.
, COMPUTER STUDIES-30-
Abnormal Data
-
8/2/2019 Cs Project Report_sample1
33/55
This form will be shown with the incorrect data to the user. If the wrong
location is entered no records will be shown.
, COMPUTER STUDIES-31-
CHECKING FOR THE ADDITON OF A NEW RECORD:
-
8/2/2019 Cs Project Report_sample1
34/55
This check is only for admins because users are limited to only searching,
sincecriminal records are always being updated new data have to be
entered.
New Addition of Criminal Record
, COMPUTER STUDIES-32-
-
8/2/2019 Cs Project Report_sample1
35/55
Then the criminals record is added to the database
, COMPUTER STUDIES-33-
-
8/2/2019 Cs Project Report_sample1
36/55
User Documentation
First these are some tips that might come in handy.
The red X button will close the form that you are on.
Use of CTRL Z is handy if you are modifying the criminal records.
The MAIN FORM (first form)
Once the program has started this is the first form that you will see and if
you wish to continue using the database you will click on ENTER.
, COMPUTER STUDIES-34-
-
8/2/2019 Cs Project Report_sample1
37/55
After you have ENTERED, you will have an option to choose, ADMIN OR
USER.
If you choose ADMIN you will be taken to a different form than the USER
and vice versa.
, COMPUTER STUDIES-35-
-
8/2/2019 Cs Project Report_sample1
38/55
If you chose ADMIN then you will have to login to confirm you are ADMIN so
this form will be shown to you.
Here you will enter your ADMIN username and password. If you want to
leave the form you can just click on EXIT.
, COMPUTER STUDIES-36-
-
8/2/2019 Cs Project Report_sample1
39/55
Once you have logged in ( default admin username is bbbb and the
password is 2222)
This form will be shown to you
In this form as the ADMIN you can add new criminal record or modify
the existing ones. Also if you dont want to change the database you
leave by clicking on EXIT
, COMPUTER STUDIES-37-
-
8/2/2019 Cs Project Report_sample1
40/55
If you chose to add new criminal record then this form will be shown to
you.
After you are done with adding the new criminals data on the form, which
you can do by clicking on any of the textbox and from there, you, can type
in the data. After you are done you can click on FINISHED in doing so the
data that you have entered will be stored in the database. Also if you havecompleted partially on the criminals record and want exit without saving
clicking on FINISHED will not store the partial data and you would have
exited the form. So if you wish to exit clicking on FINISHED will exit you
from the form and back to the form where you can choose between adding
and modifying the criminal database.
-
8/2/2019 Cs Project Report_sample1
41/55
, COMPUTER STUDIES-38-
If you chose to modify the existing criminal records then this form will
be shown to you.
ADMIN if you have seen this form on the user form as well do not panic this
is just one feature off modifying.
Since ADMINS job is only to add and modify the database, he has to first
search the criminals record then only can the ADMIN can modify the data.
So that is why the ADMIN can choose how to find the criminal he is looking
for.
-
8/2/2019 Cs Project Report_sample1
42/55
, COMPUTER STUDIES-39-
When the ADMIN has decided that he wants to modify the criminal record
he can search the criminals records these ways. The forms that open willvary on how the ADMIN wants to search.
If wants to search by name:
Or by ID
Or by location
-
8/2/2019 Cs Project Report_sample1
43/55
, COMPUTER STUDIES-40-
Regardless of the method the ADMIN chooses to search the criminals
record the result will be same either the criminals record will be shown or amessage box saying that the record is not present.
The form to modify will be like how the user searches for the criminal but
here the ADMIN can modify the data.
This how the criminal record will be shown (for example I have chosen a
random criminals record)
To modify the criminals record the ADMIN has to only select one of the
textboxes and type in the new data and when the ADMIN is done he can
just click on done and the new data will be saved.
, COMPUTER STUDIES-41-
-
8/2/2019 Cs Project Report_sample1
44/55
Now for the USERS, they too will have the same login from but remember
only ADMIN CAN MAKE NEW ADMINS.The login form will be like this.
If the USER wants to leave he can click on the EXIT and the form will
close. If he has forgotten his password then he can click on the FORGOT
PASSWORD.
-
8/2/2019 Cs Project Report_sample1
45/55
, COMPUTER STUDIES-42-
When the USER has forgotten his password he can go to the FORGOT
PASSWORD form. The form will be like this:
In the form the USER will have to enter is USERNAME then pick the security
question that he had chosen and the answer to that question (the question
is in combo box so the USER does not need to make the question) then he
has to click on SUBMIT and his password will be shown under SUBMIT if
the answer is wrong and/or doesnt match the USERNAME no password will
be shown. For example:
Password =B
Username= A
Security Question= what is your pet name
Answer= C
-
8/2/2019 Cs Project Report_sample1
46/55
, COMPUTER STUDIES-43-
So the USER types in the information:
From this information the Password should be C
So if the user ever forgets his password he can always get it back.
-
8/2/2019 Cs Project Report_sample1
47/55
, COMPUTER STUDIES-44-
Also if there is a new USER who wants to search the criminal database he
will have the SIGNUP option by clicking on SIGNUP from the login form.
This will be the form:
After the person has filled in the information he just has to click on the
SIGNUP and his information will be stored on the database so he can login
as the USER whenever he wants to.
-
8/2/2019 Cs Project Report_sample1
48/55
, COMPUTER STUDIES-45-
This is an example SIGNUP
Now let us try to login using this information
-
8/2/2019 Cs Project Report_sample1
49/55
, COMPUTER STUDIES-46-
Since now we can login lets see what the USER has access to.
The first form that the USER sees after logging in:
Like always if the USER wants to Exit he can click on EXIT and the form
will close.
The USER privilege is only searching on the criminals because not
everybody should have access to altering the database.
If the USER wants to see all the criminal records in the database he will
click on VIEW ALL DATA
-
8/2/2019 Cs Project Report_sample1
50/55
, COMPUTER STUDIES-47-
This is the VIEW ALL DATA FORM:
The USER can click on FIRST CRIMINAL RECORD to go to the first record in
the database.
If the USER clicks on LAST CRIMINAL RECORD the last record in the
database will be shown.
If the USER clicks on NEXT CRIMINAL RECORD the next record in line will
be shown.
And if the user clicks on PREVIOUS CRIMINAL RECORD then the record
before the current record will be shown.
When the USER is done searching the USER can click on EXIT and this
form will be closed and he will be taken to the USERS main form.
-
8/2/2019 Cs Project Report_sample1
51/55
, COMPUTER STUDIES-48-
If the USER knows the name, id or the location of the criminal he can search
on the basis of that too.
-
8/2/2019 Cs Project Report_sample1
52/55
, COMPUTER STUDIES-49-
From this the USER will have these options:
, COMPUTER STUDIES-50-
-
8/2/2019 Cs Project Report_sample1
53/55
Evaluation
System Evaluation
The system I have built is actually good. Most of my objectives were fulfilled
completely; my system is able to create new criminal records, edit theexisting criminal records, help search within them without much effort, it
saves time, it maintains the data very safely, it takes up less physical space
(like you do not need lots of shelves to keep the files like the old method), it
is continent to use, reduces errors and increases accuracy. Also my system
is very simple to understand since most of the labels on the forms guide the
person using the system.
The system process very fast, not because the data is small compare to
real life criminal databases, it is fast because it is running on a computer, so
even if the data was increased ten or twenty times more it will still be
equally fast.
Limitations of the New System
1. Granted that there are validation checks but mistakes can always
happen and since this criminal databases information can be very
vital sometimes. Though it is better than the old method accuracy but
not by a longshot.
2. Lack oftransactions/reports in real police stations they can print
reports on specific criminal, the reports can generate many types of
data from the existing data like the criminals behavior or
psychological capabilities etc. But, this feature is very complex and to
build it will require very high programing skills.
3.Staff information, Admins are allowed every feature of the systembut there is no information about the admin like name, or address
etc.
-
8/2/2019 Cs Project Report_sample1
54/55
, COMPUTER STUDIES-51-
Possible Developments
1. Creating reports on the criminals, so when a User wants to have a
hard copy of the criminals information for an investigation the user
can print one to aid him in the investigation.
2. I could add more information about the staff/Admins/Users like their
contact numbers, address and E-Mail id etc. So it would make
contacting them easier. Like a User might want to become an Admin
so he should know who to contact regarding this matter.
3. Also tracking the staff members, when a person access the system at
what time and who was the person that accessed the system and
what changes did he make or which criminal database was he
searching or editing.
-
8/2/2019 Cs Project Report_sample1
55/55
, COMPUTER STUDIES-52-