-
Notifications
You must be signed in to change notification settings - Fork 0
Expand file tree
/
Copy pathComp4Project.out
More file actions
29 lines (29 loc) · 2.3 KB
/
Comp4Project.out
File metadata and controls
29 lines (29 loc) · 2.3 KB
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
\BOOKMARK [1][-]{section.1}{1 Analysis}{}% 1
\BOOKMARK [2][-]{subsection.1.1}{1.1 Background to and Identification of the Problem}{section.1}% 2
\BOOKMARK [2][-]{subsection.1.2}{1.2 Interview With Primary User}{section.1}% 3
\BOOKMARK [2][-]{subsection.1.3}{1.3 The Current System}{section.1}% 4
\BOOKMARK [2][-]{subsection.1.4}{1.4 Prospective Users}{section.1}% 5
\BOOKMARK [2][-]{subsection.1.5}{1.5 User Needs and Acceptable Limitations}{section.1}% 6
\BOOKMARK [2][-]{subsection.1.6}{1.6 Data Sources and Destinations}{section.1}% 7
\BOOKMARK [2][-]{subsection.1.7}{1.7 Data Volumes and Data Dictionaries}{section.1}% 8
\BOOKMARK [2][-]{subsection.1.8}{1.8 Data Flow Diagrams}{section.1}% 9
\BOOKMARK [2][-]{subsection.1.9}{1.9 Entity Relationship Models}{section.1}% 10
\BOOKMARK [2][-]{subsection.1.10}{1.10 Entity Description}{section.1}% 11
\BOOKMARK [2][-]{subsection.1.11}{1.11 Objectives for the Proposed System}{section.1}% 12
\BOOKMARK [2][-]{subsection.1.12}{1.12 Potential Solutions}{section.1}% 13
\BOOKMARK [2][-]{subsection.1.13}{1.13 Feasibility of Potential Solutions}{section.1}% 14
\BOOKMARK [2][-]{subsection.1.14}{1.14 Justification of Chosen Solution}{section.1}% 15
\BOOKMARK [1][-]{section.2}{2 Design}{}% 16
\BOOKMARK [2][-]{subsection.2.1}{2.1 Overall System Design}{section.2}% 17
\BOOKMARK [2][-]{subsection.2.2}{2.2 Description of Modular System Structure}{section.2}% 18
\BOOKMARK [2][-]{subsection.2.3}{2.3 Design Data Dictionary}{section.2}% 19
\BOOKMARK [2][-]{subsection.2.4}{2.4 Database Design}{section.2}% 20
\BOOKMARK [2][-]{subsection.2.5}{2.5 Identification of Storage Material and Format}{section.2}% 21
\BOOKMARK [2][-]{subsection.2.6}{2.6 Identification of Processes and Algorithms for Data Transformation}{section.2}% 22
\BOOKMARK [2][-]{subsection.2.7}{2.7 User Interface Design and Rationale}{section.2}% 23
\BOOKMARK [2][-]{subsection.2.8}{2.8 Planned Data Capture and Entry}{section.2}% 24
\BOOKMARK [2][-]{subsection.2.9}{2.9 Planned Valid Output Designs}{section.2}% 25
\BOOKMARK [2][-]{subsection.2.10}{2.10 Measures Planned for Security and Integrity of Data}{section.2}% 26
\BOOKMARK [2][-]{subsection.2.11}{2.11 Measures Planned for System Security}{section.2}% 27
\BOOKMARK [2][-]{subsection.2.12}{2.12 Overall Test Strategy}{section.2}% 28
\BOOKMARK [1][-]{section.3}{3 Technical Solution}{}% 29