UML use case diagrams, sequence diagrams, class diagrams, and activity diagrams

UML use case diagrams, sequence diagrams, class diagrams, and activity diagrams
Chapter 2 System Analysis

The main purpose of system analysis is to gather the requirements and functional requirements obtained in the detailed investigation of the system together, and to analyze the internal overall management situation and information processing process. It focuses on analysis from the entire business process. The content of analysis is: the smoothness and rationality of business and data processes; the relationship between data, business processes and implementation management functions, etc. System analysis is to determine the needs of users and their solutions. The results that need to be determined include: users' needs for system functions; data and business processes, etc. The content determined by system analysis is the basis of system design and system realization. System analysis starts with system requirements and builds system models from user requirements. The user model conceptually expresses the system requirements and the close relationship between the system and users.
2.1 System Requirements Analysis
The human resource management system needs to meet the following requirements:
(1) Administrators and advanced users can manage user information, and can add, modify, delete, and query all user information, while ordinary users can only modify and view The user's own information, the user's login account is unique, the login account cannot be modified after the establishment, and the password needs to be verified twice;
(2) The administrator can add, modify, delete company department and position information, and set advanced user permissions;
(3) Users can add, modify, delete, and view work logs, and advanced users can correct work logs. The work log list needs to have clear relevant information, and can view the details of the work logs;
(4) Users can view their own work plans, And modify the task status, advanced users can add, modify, delete, search for work plans;
(5) Users can view their own tracking record information and assessment results, advanced users can add, modify, delete, search for tracking record information and assessment results.
2.2 System function analysis
Based on the system requirement analysis, the system needs to realize the following basic functions, and some main function modules are introduced below.
1. Login management
(1) Each user has a unique login account, it is recommended to use a job number;
(2) After the account and password match, the login will be successful and you will be redirected to the main page. If the login is unsuccessful, you will not be able to access the main page;
(3) After logging in, click logout to clear the login information and return to the login page;
(4) After logging in, the user authority will be automatically recognized and redirected . to the corresponding page.
2. Employee information management
(1) Administrators and advanced users can add new users in this module, and set account numbers and initial passwords. The login account cannot be changed;
(2) Administrators and advanced users can search, modify, and delete through this module. All user information, ordinary users can only view and modify their own information;
(3) Advanced users can perform advanced search or full search according to the user's name, department and position, and jump to the modification page on the search page or modify the user information. Delete;
(4) When adding a new user, there are repeated account verification, repeated password verification and non-empty verification. If an existing account is entered, the two passwords are inconsistent, or the mandatory content is not filled in, it cannot be added successfully;
(5) Department and job dropdowns are read dynamically based on information in the database.
3. Position and department management
administrators can add, modify, and delete positions and departments. Other users do not have this permission.
4. Work log management
(1) All users can add, modify, and delete their own work logs in this module, and advanced users can search for all work logs;
(2) Advanced users can approve work logs in this module, and check the work logs by viewing The approval button on the log details page can change the status of the log to "Completed";
(3) After the log is added successfully, the system will automatically add the publication time to the log, and the log status will be automatically added to "Unfinished";
(4) The The module can perform full search, or search according to the author's name, department, and title of the log, and jump to the approval, modification and other pages on the search page, or delete the log.
5. workload management
(1) Advanced users can add workload arrangements for all users through this module, edit working time and main work content, and can also modify or delete them. Ordinary users can only view their own workload arrangements;
(2) Advanced users can add workload arrangements After that, the system will automatically add the workload status as "unfinished", and ordinary users can modify their workload status as "completed" after completing the work;
(3) Advanced users can find the user who wants to add workload through the user search page. , click the add workload link to jump to the add page, and after the addition is completed, jump back to the workload list;
(4) This module can search all, or search according to the user name and department, and the existing workload can be searched through the search page. Modify or delete.
6. Employee tracking record management
(1) Advanced users can add, modify, and delete tracking record information for all users through this module. Ordinary users can only view their own tracking record information;
(2) Advanced users can find the workload to be added through the user search page. Users, click the Add Tracking Record link to jump to the add page, and jump back to the record list after adding;
(3) This module can search all, or search according to the user's name and department. Through the search page, the existing workload can be searched. Modify or delete.
7. Assessment information management
(1) Advanced users can add, modify, and delete assessment information for all users through this module, including assessment names and test scores. Ordinary users can only view their own assessment information;
(2) Advanced users can find what they want to add through the user search page. Users who have assessed results, click the Add Workload link to jump to the add page, and jump back to the score list after adding;
(3) This module can be searched in full, or according to the user's name and department.
http://www.6daixie.com/contents/21/1329.html

The core members of the team mainly include Silicon Valley engineers, BAT front-line engineers, top 5 master and doctoral students in China, and are proficient in German and English! Our main business scope is to do programming assignments, course design and so on.

 

Our field of direction: window programming, numerical algorithm, AI, artificial intelligence, financial statistics, econometric analysis, big data, network programming, WEB programming, communication programming, game programming, multimedia linux, plug-in programming program, API, image processing, embedded/MCU database programming, console process and thread, network security, assembly language hardware Programming software design engineering standards and regulations. The ghostwriting and ghostwriting programming languages ​​or tools include but are not limited to the following:

C/C++/C# ghostwriting

Java ghostwriting

IT ghostwriting

Python ghostwriting

Tutored programming assignments

Matlab ghostwriting

Haskell ghostwriting

Processing ghostwriting

Building a Linux environment

Rust ghostwriting

Data Structure Assginment

MIPS ghostwriting

Machine Learning homework ghostwriting

Oracle/SQL/PostgreSQL/Pig database ghostwriting/doing/coaching

web development, website development, website work

ASP.NET website development

Finance Insurance Statistics Statistics, Regression, Iteration

Prolog ghostwriting

Computer Computational method

 

Because professional, so trustworthy. If necessary, please add QQ: 99515681 or email: [email protected]

WeChat: codinghelp

Guess you like

Origin http://43.154.161.224:23101/article/api/json?id=325015843&siteId=291194637