The Anonymous Crime Reporting System Development

System Implementation and Testing

The Anonymous Crime Reporting System was implemented using a three tier architecture consisting of a user interface front end, middleware and a database backend. The front end was developed using HTML and CSS. The middleware was developed using the C# programming language while the database backend was developed using the SQL database management system. System implementation follows the approval of the system proposals and its objectives, so as to arrive at a satisfactory, implemented, completed and evaluated function of the automated system. This chapter is aimed at presentation of the developed application’s implementation. It shows the demonstration of the design software to the end users

Choice of Development Tools

The following programming tools were used to implement the system.HTML: Hypertext Markup Language (HTML) is the main markup language for web pages. HTML elements are the basic building-blocks of webpages. HTML is written in the form of HTML elements consisting of tags enclosed in angle brackets (like), within the web page content. C#:C-sharp is a general-purpose client/server-side language originally designed for Web development to produce dynamic Web pages.SQL: SQL is the world's most used relational database management system (RDBMS) that runs as a server providing multi-user access to a number of databases. It is named after developer Michael Widenius' daughter; The SQL phrase stands for Structured Query Language.

Software Requirements

The software requirements for the installation of the system are listed below:

  • Windows Operating System.
  • Web Browser Software.
  • SQL server.
  • Anti-Virus Software.

Hardware Requirements

For proper installation of the system, the following minimum hardware requirements are:

  • Color Monitor.
  • 512MB Random Access Memory (RAM Size).
  • 1 Gigabyte Hard Disk Drive.
  • Keyboard.
  • Mouse.

Testing the New System

Software testing can be stated as the process of validating and verifying that a software program/application/product:

  • Meets the requirements that guided its design and development.
  • Works as expected.
  • Can be implemented with a high degree of reliability.

During testing of the Anonymous Crime Reporting System, all of the above criteria for successful software testing were met. Below are the various scenarios that were encountered during the testing of the newly proposed system:

  • Login Screen (Administrator): This is the administrative login screen for thesystem. The administrator of the system will gain access via this form by providing their username and password.
  • Login Screen (Officer): This is the officers login screen for thesystem. The system’s registered officer will gain access via this form by providing their Staff Id and password.
  • Reporter Screen (Anonymous): This is the page where the anonymous reporter will be able to report crime through the porter. He or she will be able to send crime report and upload any attachment.
  • Officer Registration: This form is used by the admin to register all officer into the system so that they can gain access into the system.
  • Crime Designation Module: This interface is used to assign crime reported to any officers in the system by the DPO using the case ID.
  • Admin Portal: This interface is the control panel that is used by the administrative user where access to their menu options is provided.
  • View Report: This interface is used by the administrative staff to view the reports

Integration and Testing

All the units developed in the implementation phase are integrated into a system after testing of each unit. Post integration the entire system is tested for any faults and failures. During testing, programmers and analysts test individual programs and the entire system in order to find and correct errors. During installation, the new system becomes a part of the daily activities of the organization. Application software is installed, or loaded, on existing or new hardware; then users are introduced to the new system and trained. Begin planning for both testing and installation as early as the project planning and selection phase, because they both require extensive analysis in order to develop exactly the right approach.

Maintenance

There are some issues which come up in the client environment. To fix those issues patches are released. Also to enhance the product some better versions are released. Maintenance is done to deliver these changes in the customer environment

Procedures for the Installation of the Anonymous Crime Reporting System

  1. Windows 7 or 8 operating system is recommended and must be installed and running on the client or server machine, as any other lower operating system may give issues.
  2. Install the sql 2008 server express or sql 2008 enterprise edition, while on the clients or deployment server machine make sure that the account is on windows account not sql account during installation, because you don’t need to have username and password to have access to the database but if you install the enterprise edition of the sql server 2008 You will need to use sql authentication because you will need to have username and password to access the database, however, an sql installation manual in pdf is attached to help with the installation.
  3. The application needs to run and will be looking for the backend database named "IncidenceloggingDB" the application will be looking for this database backup to work you must be able to create this database name exactly as above and connect it to the software.
  4. The database of the application named " IncidenceloggingDB.mdf” and " IncidenceloggingDB _log will be copied and housed inside the sqlserver 2008 express inside the path below :my computer/local c/program files/Microsoft sqlserver/mssql2008/data.
  5. The clients or server machine must be running on a minimum of 3gb RAM memory for the application to run successfully.
  6. make sure visual studio 2010 premium (not trial version) is running on the deployment machine and make sure that c sharp language is selected.
  7. The software named "CrimeReportingSystem2" should be copied and placed inside the path below:my document/visual studio 2010/projects.
  8. Run the.sin extensions of the Crime Reporting System2.se software to lunch the application once visual studio has been installed9. the application connection string or configuration is inside the folder called web.config inside the application ” CrimeReportingSystem2 " attached.

Software Testing

Software testing is a critical element of software quality assurance and represents the ultimate review of specification, design and code generation.

Testing Objectives

  • To ensure that during operation the system will perform as per specification.
  • To make sure that system meets the user requirements during operation.
  • To make sure that during the operation, incorrect input, processing and output will be detected.
  • To see that when correct inputs are fed to the system the outputs are correct.
  • To verify that the controls incorporated in the same system as intended.

Testing is a process of executing a program with the intent of finding an error. A good test case is one that has a high probability of finding an as yet undiscovered error. The software developed has been tested successfully using the following testing strategies and any errors that are encountered are corrected and again the part of the program or the procedure or function is put to testing until all the errors are removed. A successful test is one that uncovers an as yet undiscovered error. Note that the result of the system testing will prove that the system is working correctly. It will give confidence to system designer, users of the system, prevent frustration during implementation process etc.

Test Case Design

White box testing

White box testing is a testing case design method that uses the control structure of the procedure design to derive test cases. All independents path in a module are exercised at least once, all logical decisions are exercised at once, execute all loops at boundaries and within their operational bounds exercise internal data structure to ensure their validity. Here the customer is given three chances to enter a valid choice out of the given menu. After which the control exits the current menu.

Black Box Testing

Black Box Testing attempts to find errors in following areas or categories, incorrect or missing functions, interface error, errors in data structures, performance error and initialization and termination error. Here all the input data must match the data type to become a valid entry.

Unit Testing

Unit testing is essentially for the verification of the code produced during the coding phase and the goal is test the internal logic of the module/program. In the Generic code project, the unit testing is done during coding phase of data entry forms whether the functions are working properly or not. In this phase all the drivers are tested they are rightly connected or not.

Integration Testing

All the tested modules are combined into sub systems, which are then tested. The goal is to see if the modules are properly integrated, and the emphasis being on the testing interfaces between the modules. In the generic code integration testing is done mainly on table creation module and insertion module.

Validation Testing

This testing concentrates on confirming that the software is error-free in all respects. All the specified validations are verified and the software is subjected to hard-core testing. It also aims at determining the degree of deviation that exists in the software designed from the specification; they are listed out and are corrected.

System Testing

This testing is a series of different tests whose primary is to fully exercise the computer-based system. This involves implementing the system in a simulated production environment and testing it.

User Guides/Manuals

This application is to be used by three groups of people namely:

  • Anonymous Logger. These are crime logger that will submit all crime encountered with location details ,casualty figure if any, crime local government, image, personal name and other relevant details.
  • Police Officer. These are registers police users in the system back office staff who attends to assigned crime and verse visa assigned to them, they will find a way to resolve the crime, or stop the crime. however, whatever was done must be logged into the system.
  • Administrator. This is the officer that manages the software application and uses it to create the department in the system, the division all other department that needs to be created, creates the staff, creates region and generally customized reports.
18 March 2020
close
Your Email

By clicking “Send”, you agree to our Terms of service and  Privacy statement. We will occasionally send you account related emails.

close thanks-icon
Thanks!

Your essay sample has been sent.

Order now
exit-popup-close
exit-popup-image
Still can’t find what you need?

Order custom paper and save your time
for priority classes!

Order paper now