Summary Design Report (1)
1, task overview
Objective: By design, the goal to achieve this system is to relieve the daily management of students.
The complexity of the complexity of work and the complexity of data processing and other data processing, improve the work efficiency of schools.
Operating environment: This system requires that you can run on systems such as WIN 9X / 2000 / XP.
Demand Overview: After selecting the type of operation, follow the information entered, complete the relevant information, add or information (grade) query, and output the corresponding report or transcript as required, and in the operation, pay attention to judgment The legality of the user, prevents unlailized users from maliciously modify the information stored by the system database. Security confidentiality requires entering the system to enter a password (when logging in) to verify the user's legitimacy; and requires that the system is maintainable, Portability, there is a corresponding interface.
Conditions and restrictions: 1. Develop this teaching transaction management system for VC 6.0;
2. Only the administrator-level user has the right to modify the operation after entering the system, and generally users can only browse or query, no modification.
2, overall design
Overall structure and module external design:
The following is to map the data flow map with the transformed characteristics into a software structure by transforming data flow graphs with change in shift.
(1) Review basic system model
The purpose of review is to ensure that the system's input data and output data are in line with practical.
(2) Review and refine data flow map
The data flow maps derived from the demand analysis phase carefully reviewed and refined when necessary. Not only must be ensured that the data flow map gives the correct logical model of the target system, but also makes each process in the data flow diagram represents a single size relatively independent sub-function.
(3) Determine the data flow map has transform characteristics or transaction features.
The design method for the data stream is generated to flow into the software structure, and the type of information stream determines the mapping method. Depending on the data flow map, it can be judged that the information enters the input path, and the information enters the system passes through the conversion center, and after the processing process is changed to the external form to leave the software structure. The information flow that meets these characteristics is precisely transform stream. All information about this system is converted into the flow.
(4) Determine the boundary of the input stream and output stream, so that the conversion center is isolated.
Data flow map with boundaries
(5) Complete "First Level Decomposition"
The overall structure of the teaching transaction management system first decomposition
(6) Complete "Second Level Decomposition"
Map each of the processing in the data flow diagram into an appropriate module in the software structure.
Receive query conditions
Judging whether the information is legal
Unseained input structure
(7) Further refine the software structure
3, interface design
a. User Login Interface
The interface main is to welcome the user to log in. One of the important links is to verify the legality of the user, which is set to resolve the login certification through the form of administrator authorization. This interface is comparative judgment by calling the authorized authorization information entered by the user in the outer memory in the outer memory. When it is a legal user, it can be connected to the next structural module, otherwise it is wrong. Processing in the processing design is processed.
b. System main interface
The job to be completed is that the user completes the selection work that will operate, divided into three ribs: information addition module, information maintenance module, related information query module. The module should implement the interface implementation with the next interface by calling the relevant data structure (such as the data structure of the additional module, the data structure of the information maintenance module, etc.), and can be implemented with the setting keyword or the main index. The connection of the form (other module).
c. Additional information module interface
This interface includes authentication work that completes user legality (mainly to system administrators) The job that needs to be completed is to complete the basic information and student selection information inputs and their associations. When the information input area of this interface fills in the student information, when it is determined, the work of this phase data structure should be completed is to write the file generated by the input information to the outer memory where the database is located for the operation call.
d. Information query module interface