MindMap Gallery Library management system requirements analysis
Library management system requirements analysis mind map determines the requirements, functional scope and implementation methods of the library management system, and provides a basis for subsequent design, coding and testing work.
Edited at 2023-06-18 23:43:22Avatar 3 centers on the Sully family, showcasing the internal rift caused by the sacrifice of their eldest son, and their alliance with other tribes on Pandora against the external conflict of the Ashbringers, who adhere to the philosophy of fire and are allied with humans. It explores the grand themes of family, faith, and survival.
This article discusses the Easter eggs and homages in Zootopia 2 that you may have discovered. The main content includes: character and archetype Easter eggs, cinematic universe crossover Easter eggs, animal ecology and behavior references, symbol and metaphor Easter eggs, social satire and brand allusions, and emotional storylines and sequel foreshadowing.
[Zootopia Character Relationship Chart] The idealistic rabbit police officer Judy and the cynical fox conman Nick form a charmingly contrasting duo, rising from street hustlers to become Zootopia police officers!
Avatar 3 centers on the Sully family, showcasing the internal rift caused by the sacrifice of their eldest son, and their alliance with other tribes on Pandora against the external conflict of the Ashbringers, who adhere to the philosophy of fire and are allied with humans. It explores the grand themes of family, faith, and survival.
This article discusses the Easter eggs and homages in Zootopia 2 that you may have discovered. The main content includes: character and archetype Easter eggs, cinematic universe crossover Easter eggs, animal ecology and behavior references, symbol and metaphor Easter eggs, social satire and brand allusions, and emotional storylines and sequel foreshadowing.
[Zootopia Character Relationship Chart] The idealistic rabbit police officer Judy and the cynical fox conman Nick form a charmingly contrasting duo, rising from street hustlers to become Zootopia police officers!
Library management system requirements analysis
Database design steps:
1. Requirements analysis
According to the given design topic, explain the meaning, purpose, system function design and information of the topic, draw diagrams and write relevant text descriptions.
2. Conceptual structural design
Draw a detailed E-R diagram of the selected topic.
3. Logical structure design
Convert the E-R diagram into an equivalent relational schema; standardize the relational schema as required; evaluate the standardized schema and adjust the schema to meet performance, storage, etc. requirements; design external schema (view) according to local application needs .
4.Physical structure design
Determine the basic structure of the database table, select the implementation environment, access methods, etc.
5. Database implementation and maintenance
one,
Purpose
Determine the requirements, functional scope and implementation methods of the library management system, and provide a basis for subsequent design, coding and testing work.
two,
demand analysis
The book borrowing management system can realize computer networked book borrowing management, can provide convenient and fast book information retrieval functions and convenient book borrowing and returning functions, and can manage book information and reader information, making it convenient for administrators and readers. Borrowing processing.
3. Function scope
Client functions
1.Book inquiry
Search by book type
Conduct precise and fuzzy queries based on book type, book title, and author
Conduct precise and fuzzy queries based on book title and author
Paging query
2.Book borrowing
The number of borrowed books and the number of borrowing days are different for different user types.
3.Book return
4. Borrowing information inquiry
5. Query historical borrowing information
6. Personal information inquiry and modification
7.Change password
8. User registration, login and forgotten password (according to password protection)
Administrator functions
1.Book information management
Query books (same as client)
Add book
Delete a book (make sure the book has not been borrowed by the user before deleting it)
Update book
2. Book type information management
Query book type
Add new book type
Delete the book type (the book type can only be deleted if it does not have a book application)
Update book type
3. Reader information management
Query readers (student number, name, department, class precise query and fuzzy query; query based on reader type; reader type student number, name, department, class precise query and fuzzy query)
Add new readers
Delete a reader (to ensure that the secondary reader has not borrowed books)
Update readers
4. Reader type information management
Query reader type
Add new reader type
Delete the reader type (guarantee there are no readers for this reader type)
Update reader type
5. Query user borrowing information and historical borrowing information (based on student number)
6. Inquiry and modification of administrator’s personal information
7. Administrator login
8. The administrator forgets the password (according to the password protection)
Super administrator interface
The administrator needs to pass the super administrator verification before it can be used (super administrator login, background hardcoding)
Query administrator information (according to account)
Add new administrator
Delete the administrator (delete the administrator account you logged in to prompt, end the program after deletion, and open the login interface)
Update administrator information
4. Specific implementation of functions
login interface
1. Log in
Users and administrators click the "Login" button to log in using their account number and password.
2.Register
The user clicks the "Register" button and a registration window pops up. Complete the information and register. However, you must ensure that the registered account is not repeated. The responsible person will be prompted. The "Register" button is hidden when the radio button selects "Administrator"
3. Forgot password
The user clicks the "Forgot Password" button and a dialog box pops up. The user can reset the password by verifying the account and password. The "Forgot Password" button is hidden when the radio button is selected "Administrator"
client interface
It is divided into three tab panes, namely "Book Query and Borrowing", "Borrowing and Return Information", and "Personal Information Management"
Book inquiry and borrowing:
Query based on book type
Conduct precise and fuzzy queries based on book type, book title, and author
Conduct precise and fuzzy queries based on book title and author
Paging query
Borrowing: Click on a table row, select the book, click on the borrow button, and a dialog box will pop up. If the borrowing is successful, the inventory of this book in the book table is -1, the inventory of the table data is -1, and a piece of borrowing information (including borrowing ID, student number, book ID, borrowing time, and return time should be included in the borrowing table) is inserted into the borrowing table. Set isborrow to '0' ; If the borrowing is unsuccessful, there will be a prompt. Reasons: ① The number of books borrowed by the reader has reached the upper limit ② The reader has borrowed this book and has not returned it
Borrowing and returning information:
Query the books that this user has borrowed, isborrow is 0
Query the books borrowed by the user in history, isborrow is 1
Return the book - click on the table to get the book ID, set the inventory of this book in the book table to 1, and set the borrowing information isborrow to 1 in the borrow table
Personal information management:
Query personal information (put into a row of tables)
Query reader permissions - put your corresponding reader permissions directly into the table (only one row)
Modify personal information - click the "Modify Information" button to pop up a dialog box and obtain your own information for modification.
Change password - click the "Change Password" button, a dialog box will pop up, enter the old password and password to reset the password
Administrator interface
It is divided into 6 tab panes, namely "Book Information Management", "Book Category Information Management", "Reader Information Management", "Reader Type Information Management", "Borrowing and Return Information Management", "Administrator Information and Super administrator"
Basic implementation method of adding, deleting, modifying and checking
Query function: Query information from the database and put it into the front desk table
New features: Pop up dialog box, enter information, and add new items
Delete function: Click on a row of the table to obtain the specified information of the table for deletion
Update function: Click on the table to get the data into the dialog box for modification
books
information management
Query books (same as the client implementation)
Add a new book and a dialog box will pop up to enter book information.
Delete a book (click a row in the table to get the book ID. If it is not borrowed by the user, the deletion is successful; if it is borrowed by the user, the deletion fails and a dialog box pops up)
To update a book, click the form to get the book information and modify it in the dialog box (only the title, author, publisher, price, and inventory can be changed)
Book type management:
Delete (No book application other than book type can be deleted)
The remaining additions, deletions, modifications and checks are the basic implementation methods.
Reader information management:
Reader information inquiry:
Query readers (student number, name, department, class precise query and fuzzy query; query based on reader type; reader type student number, name, department, class precise query and fuzzy query)
Add new readers (directly use the registration interface)
Delete a reader (check the reader's borrowed books before deleting, and delete only if there are no borrowed books, otherwise it cannot be deleted)
Update readers (only departments, classes, mobile phone numbers, and email addresses can be updated)
Reader type information management
Delete the reader type (make sure there is no reader application for this reader type before deleting)
The remaining additions, deletions, modifications and checks are the basic implementation methods.
Borrowing and returning information management:
You can check the borrowing information and historical borrowing information of all readers (via student ID)
Administrator information and super administrator
Login administrator information is displayed by default
Modifying personal administrator information is the basic implementation method
Change the password, forget the password and implement it in the same way as the user
Super administrator function
It is not available by default and requires super administrator verification (account and password) to be hard-coded in the background.
If the super administrator is successfully authenticated, he can add, delete, modify and check the administrator.
ps: Delete the administrator. If you delete the administrator account you logged in to, you will be prompted to end the program after deletion and open the login interface.
The remaining functions are basic implementation methods
5. Data Dictionary
Create the following tables based on data analysis:
Reader type table (readertype)
Reader information table (reader)
Administrator information table (administrator)
Book type table (booktype)
Book information table (book)
Book borrowing form (borrow)
6. Based on the above functional requirements, draw the following functional module diagram