Software requirement specification online national polling




















During making of my Project he helped me a lot. NIIT 4. Most countries, Kenya not an exception have problems when it comes to voting. Some of the problems involved include ridging votes during election, insecure or inaccessible polling stations, inadequate polling materials and also inexperienced personnel. It should be noted that with this system in place, the users, citizens in this case shall be given ample time during the voting period.

They shall also be trained on how to vote online before the election time. In this system people who have citizenship of Kenya and whose age is above 18 years of age and any sex can give hisher vote online without going to any physical polling station. NIIT 7. NIIT There is a database which is maintained in which all the names of voters with complete information is stored. Registration is mainly done by the system administrator for security reasons.

The system Administrator registers the voters on a special site of the system visited by him only by simply filling a registration form to register voter. Citizens seeking registration are expected to contact the system administrator to submit their details. After the validity of them being citizens of India has been confirmed by the system administrator by comparing their details submitted with those in existing databases such as those as the Registrar of Persons, the citizen is then registered as a voter.

Electronic voting technology can include punched cards, optical scan voting systems and specialized voting kiosks including self contained direct- recording electronic voting systems or DRE.

It can also involve transmission of ballots and votes via telephones, private computer networks, or the internet. Online voting is an electronic way of choosing leaders via a web driven application. NIIT reduced congestion. It also minimizes on errors of vote counting. The individual votes are submitted in a database which can be queried to find out who of the aspirants for a given post has the highest number of votes. With system in place also, if high security is applied, cases of false votes shall be reduced.

HeShe has to register as a voter first before being authorized to vote. The registration should be done prior to the voting date to enable data update in the database.

However, not just anybody can vote. Internet voting systems are appealing for several reasons which include; People are getting more used to work with computers to do all sorts of things, namely sensitive operations such as shopping and home banking and they allow people to vote far from where they usually live, helping to reduce absenteeism rate.

NIIT 9. Require less number of staff during the election. This system is a lot easier to independently moderate the elections and subsequently reinforce its transparency and fairness. Less capital, less effort, and less labor intensive, as the primary cost and effort will focus primarily on creating, managing, and running a secure online portal.

Increased number of voters as individual will find it easier and more convenient to vote, especially those abroad. It shall also enable the voters to vote from any part of the globe as explained since this is an online application available on the internet.

Since the voting process shall be open as early as possible, the voters shall have ample time to decide when and whom to vote for. NIIT Paper-based voting: The voter gets a blank ballot and use a pen or a marker to indicate he want to vote for which candidate. Hand-counted ballots is a time and labor consuming process, but it is easy to manufacture paper ballots and the ballots can be retained for verifying, this type is still the most common way to vote. Lever voting machine: Lever machine is peculiar equipment, and each lever is assigned for a corresponding candidate.

The voter pulls the lever to poll for his favorite candidate. This kind of voting machine can count up the ballots automatically. Because its interface is not user- friendly enough, giving some training to voters is necessary. Direct recording electronic voting machine: This type, which is abbreviated to DRE, integrates with keyboard; touch screen, or buttons for the voter press to poll.

The following software requirements specification report has been prepared for a project named eAdministration of computer labs. Suggested Read:. It eases the tasks of the administrator, instructors, head of the department of various departments, technical staff and students.

This software also helps the administrator and instructor s to maintain proper documentation of the computing systems. This software is a web-based application and can be hosted on the Internet. It also provides a clean and user-friendly interface to the users.

The purpose of this project is to provide the solution for an organization to help in monitoring working condition of computing facilities such as Computers, Printers, LCDs, Digital Boards, ACs etc. Our college has 10 computer labs. Each lab is managed by an instructor. It is difficult for the administrator and newly hired instructor to know the entire information such as a number of computers, software installed in each system, vendors etc.

It is also difficult for an administrator to integrate the entire information of all labs in college. Our software solves these problems. The e-Administration of Computer Labs is a new attempt to speed up the process of managing Computer Labs in an educational institute. The existing systems are time-consuming and there are many difficulties faced by the administrator to get information about each lab within the organization.

Presently in labs, most of the tasks are carried on manually such as lodging complaints, extra lab requests etc. There are many difficulties faced by instructors, HODs of various departments for carrying out any lab related activities.

This software provides a solution to these problems. It provides an interactive user interface and helps users in an organization to get information immediately at that instant of time. The different users of the system are the administrator, the heads of various department, technical staff and lab instructor.

These users are assigned with different privileges based on the level of administration. This system helps the technical staff, instructor, and head of various departments to register a specific complaint and to view the status of their complaint. Here the instructor gets SMS on expiry of specific software. The head of the department can send the extra lab request and can also view complaints associated with the respective department.

This software establishes a smooth communication between different users and user admin. If there is extensive damage to a wide portion of the database due to catastrophic failure, such as a disk crash, the recovery method restores a past copy of the database that was backed up to archival storage typically tape and reconstructs a more current state by reapplying or redoing the operations of committed transactions from the backed up log, up to the time of failure.

Security systems need database storage just like many other applications. However, the special requirements of the security market mean that vendors must choose their database partner carefully.

The waterfall model is a sequential design process, often used in software development processes, in which progress is seen as flowing steadily downwards like a waterfall through the phases of Analysis, Requirement Specification, Design, Implementation, Testing and Integration, and Operation and Maintenance.

If at the beginning of the project failures are detected, it takes less effort and therefore time and money for this error. In the waterfall model phases to be properly sealed first before proceeding to the next stage.

It is believed that the phases are correct before proceeding to the next phase. In the waterfall model lay the emphasis on documentation. It is a straightforward method. The way of working ensures that there are specific phases. This tells you what stage it is. One can use this method of milestones. Milestones can be used to monitor the progress of the project to estimate. In our Project, all the requirements are clear and well known and the project is large. After gathering data, the researchers analyse the possible problem based on the needs and requirements of the user.

After all the Planning and analysis were met, the system design will take place. This part covers the physical and logical design of the developed system. The screen layout of the proposed system will show in this page. The data design and the architectural design of the system will also be viewed in this page.

The ERD is a database design tool that provides graphical representation of database table, the columns in table and the relationship between tables. A data dictionary is a collection of description of the data object or items in a data model for the benefit of programmer and others who need to refer them. The proposed system will be constructed during this phase. The researchers evaluated the system design and the data gathered during the data gathering stage.

With these data, the researcher made sure that the application met all the criteria as stated in the objectives of the study. In this phase, we will perform series of testing to check for any possible problems that may occur during implementation and operation of the software and if the specification has been met.

The researcher prepares the system for final testing. The researcher once again let the users explore and test the system. After the test is done, again the researcher distribute questionnaire to the users to rate the system. For user acceptance testing, we will provide a system evaluation questionnaire for our respondents. The questionnaire will be validated by three 3 Experts. Proper implementation procedure should be imposed to ensure system operability.

During the maintenance phase, errors or defects may exist, which would require repairs during additional testing of the software. Monitoring the performance of the software is also included during the maintenance phase. The faculty will then give students term grades and grade updates. The students can only view their respective grades given by the faculty.

Figure 3. The proposed system is composed of three 3 namely: main process, query 1. The faculty will then input or encode the student term subject grades in faculty controls 2.

Requirements ID Log xls e. Electrical Inspection Plan Guidance. Section D Attachment E : Alarm Management Guidance. DOE G Form 1 : Preliminary Project Determinations Instructions.

Form 2 : HazMat Determination. Attachment B : Statement of Special Inspections. Attachment C : Nonconformance Report Example. Attachment H : Subcontractor's Statement of Responsibility.



0コメント

  • 1000 / 1000