Beruflich Dokumente
Kultur Dokumente
1) Preface:
This is the first version for SL system.
This document is the basic intended for visitor or Admin ,Customer,Worker or documentation
writer that needs to understand the basic system architecture and its specifications.
2) Introduction:
The purpose of this SRS document is to write the functional and non-functional user or system
requirements that represent the characteristics of SL.
The user requirement for this system is to make the system fast, flexible, less prone to error,
reduce expenses and save the time.
Time can be saved by scheduling the programs, if it is available give the result to the
visitor.
A facility to generate a result chart as pre required without manual interface.
The system should have records of visitor and Admin ,Customer,Worker that can be
access to the system which can be used only for the authorized person.
The system should be more secure for management user records and more reliable to
work at any conditions.
Quick scheduling:
The system helps the Customers to generate Different Workers skills list instead of
going here and there to search . Which save a time for your work and get positive results
because this platform have multiple workers so “NO FRAUSTRATION ” .
Immediate results :
When the customer search for the required skill, the system checks . And the system
search and then give the result to the customer.
Admin module.
Customer module.
Worker Module.
Visitor Module.
The functionality of each module is as follows:
Admin module: The admin able to manage the whole system modules and their
activities. He can also check the details of customer, worker, visitor means how
many views of the system. The admin will manage the DATABASE and perform
CRUD operation on it.
Customer module: The Customer can search the Worker according to his/her
need by sign up the website after login can also become a worker.
Worker Module: The Worker can add voluntarily or by sign up through number
customer contact the worker according to desired skill (which needs).
Some of the factors that are identified to protect the software from accidental or
malicious access, use, modification, destruction, or disclosure are described below.
Keep specific log or history data sets
Assign certain functions to different modules
Restrict communications between some areas of the program
Check data integrity for critical variables
Later version of the software will incorporate encryption techniques in the
user/license authentication process.
Communication needs to be restricted when the website is validating the user or
license. (i.e., using https).
This section describes how the software interfaces with other software products or
users for input or output.