SlideShare a Scribd company logo
1 of 15
‘’BIT DEFENDER ANTIVIRUS’’
PRESENTED BY:
M.SAAD FARMAN (UW-14-CS-BS-
138)
USAMA TANVEER (UOW-15-CS-BS-022)
PRSEENTED TO:
MAM.SADAF ANWAR
CLASS. BS(cs) 4TH A
Intro of Bit DefenderAntivirus:
 Bitdefender antivirus scan all the computer data dectect the virus and fix. It doesn’t
harm the system.
 When we use the computer Interment ads are irritating the user, ads are blocking,
copying and deleting your personal data.
 Bitdefender can block this kind of advertisement and protect system from this
Trojan virus.
 Usb and other data cables are sometimes harmful for the pc, because when they
connect with system they caries virus.
 Bitdefender antivirus first scan the virus and then give permission to connect with
computer
 Some type of bugs are very dangerous for the computer
 Bitdefender antivirus also used to detect the bugs from cache memory and fix the
computer bugs that harms the data.
Update
System
Protection
Real Time
ptotection
Web
Protection
Unsafe
URL FileScan
Safe
State diagram:
Activity
Diagram:
;
Update
softwareUpdate
setting
Software
update
Update
automatically
Update
Manually
update time
Scan virus
Time
Time
scheduling
Scan
manually
scan
atutomaticall
y
Set scan time
Class Diagram
Bit Defender
+Anti Spyware
+Anti worm
+AntiMalware
+Secure Network
+Sacan Virus
+Malware detection
+Update
User
ID
Name
DOB
+Scan
+Update
Scanning
+Scan Running apps
+Critical Locatiion
+Entire System
Secure Network
Anti Malware
Bugs Detect
Anti Spyware
Detect virus
Fix virus
Sequence Diagram:
User
Main
interface Antivirus Data base
scan file start scan
show analysis
dell infectted files Delete File Update database
Data flow
diagram: Input Files
Clean Files
Scan Cache
Memory Quick
Scan
System
protection
Perform
Analysis
Virus
detection
Update
Datbase
Component Diagram:
Antivirus
System scan
Real Time
Protection
Wallet
Virus DB
<<database>>
Wallet DB
<<Database>>
access
Use Case Diagram:
Input
Files
Clean
file
Perform
analysis
Quick
scan
Advance
analysis
See
Infected
Files
Update
Virus
Database
Save file
infacted
select files and
Report to
analysis
<<include>>
<<extend>><<include>>
<<include>>
<<extend>>
USER
Steps Test Step Test Data Expected Results Actual Result Status
1 Pass
2 Pass
3 Pass
Testing module: Input files Test By: Usama Tanveer
Test Case ID: OO-12 Test Date: 31-5-2017
Test priority: 1 Test Execution By: M. SAAD
Description: Input file module perform selection of
file to perform scanning and detect bugs or errors.

 Tap on
“ Input files”
Press “yes button”
press” no button”
Test Execution date: 10-5-2017
Error should be errors successfully
Find found and fixed
Should Back back to initial stage
to initial state
Testing Module: Perform Analysis Test By: Usama Tanveer
Test Case ID: OO-12 Test Date: 31-5-2017
Teat Priority: 2 Test Execution By: M. SAAD
Description: Quick scan and advance analysis.
Precondition selected files and report to analysis.
Test Execution date: 10-5-2017
Steps Test Step Test Data Expected Results Actual Result Status
1  Tap on
“ Input files”
Pass
2
Press “yes button”
Should give
report of analysis
scanning is done Pass
3 press” no button” Back previous
position
Show previous
position
Pass
Steps Test Step Test Data Expected Results Actual Result Status
1 Pass
2 Pass
3 Pass
Test Module: Clean files Test By: Usama Tanveer
Test Case ID: OO-13 Test Date: 31-5-2017
Test priority:3 Test Execution By: M. SAAD
Description: clean junk files and remove ADS
Tap on
“ Clean Files”
Press “yes button”
press” no button”
.
Test Execution date: 10-5-2017
clean junk and remove ads and
Detect bugs clean pc
From cache mem
Testing Module: Update virus data base. Test By: Usama Tanveer
Test Case ID: OO-14 Test Date: 10-5-2017
Module Name: 4 Test Execution By: M. SAAD
Description: for cleaning infected file software must be
update.
Pre condition is user must be install update version.
Test Execution date: 10-5-2017
Uptadate database
should detect all
viruses
Steps Test Step Test Data Expected Results Actual Result Status
1 Tap on
“Update data base”
Aware us about the
upcoming
Viruses
Pass
2
Press “yes button”
Detect bugs Pass
3
press” no button”
No detection back to
initial stage
Pass
Bit defender antivirus UML diagrams in software engineering

More Related Content

What's hot

Kaspersky antivirus ppt
Kaspersky antivirus pptKaspersky antivirus ppt
Kaspersky antivirus pptDipak Bamugade
 
Mobile Application Security
Mobile Application SecurityMobile Application Security
Mobile Application SecurityDirk Nicol
 
Malicious software
Malicious softwareMalicious software
Malicious softwaremsdeepika
 
Security in Windows operating system
Security in Windows operating systemSecurity in Windows operating system
Security in Windows operating systemabdullah roomi
 
Operating System Security
Operating System SecurityOperating System Security
Operating System SecurityRamesh Upadhaya
 
Mobile protection
Mobile protection Mobile protection
Mobile protection preetpatel72
 
Endpoint Protection
Endpoint ProtectionEndpoint Protection
Endpoint ProtectionSophos
 
Patch Management Best Practices 2019
Patch Management Best Practices 2019Patch Management Best Practices 2019
Patch Management Best Practices 2019Ivanti
 
Introduction to Malware Analysis
Introduction to Malware AnalysisIntroduction to Malware Analysis
Introduction to Malware AnalysisAndrew McNicol
 
Machine Learning in Malware Detection
Machine Learning in Malware DetectionMachine Learning in Malware Detection
Machine Learning in Malware DetectionKaspersky
 
Real World Application Threat Modelling By Example
Real World Application Threat Modelling By ExampleReal World Application Threat Modelling By Example
Real World Application Threat Modelling By ExampleNCC Group
 
What is Ransomware?
What is Ransomware?What is Ransomware?
What is Ransomware?Datto
 
Android Security
Android SecurityAndroid Security
Android SecurityArqum Ahmad
 
Zero-Day Vulnerability and Heuristic Analysis
Zero-Day Vulnerability and Heuristic AnalysisZero-Day Vulnerability and Heuristic Analysis
Zero-Day Vulnerability and Heuristic AnalysisAhmed Banafa
 
Malware classification using Machine Learning
Malware classification using Machine LearningMalware classification using Machine Learning
Malware classification using Machine LearningJapneet Singh
 

What's hot (20)

Kaspersky antivirus ppt
Kaspersky antivirus pptKaspersky antivirus ppt
Kaspersky antivirus ppt
 
Mobile Application Security
Mobile Application SecurityMobile Application Security
Mobile Application Security
 
Adware
AdwareAdware
Adware
 
Mobile security
Mobile security Mobile security
Mobile security
 
Malicious software
Malicious softwareMalicious software
Malicious software
 
pegasus spyware
pegasus spywarepegasus spyware
pegasus spyware
 
Security in Windows operating system
Security in Windows operating systemSecurity in Windows operating system
Security in Windows operating system
 
Operating System Security
Operating System SecurityOperating System Security
Operating System Security
 
Mobile protection
Mobile protection Mobile protection
Mobile protection
 
Endpoint Protection
Endpoint ProtectionEndpoint Protection
Endpoint Protection
 
Patch Management Best Practices 2019
Patch Management Best Practices 2019Patch Management Best Practices 2019
Patch Management Best Practices 2019
 
Cyber Security Threat Modeling
Cyber Security Threat ModelingCyber Security Threat Modeling
Cyber Security Threat Modeling
 
Introduction to Malware Analysis
Introduction to Malware AnalysisIntroduction to Malware Analysis
Introduction to Malware Analysis
 
Machine Learning in Malware Detection
Machine Learning in Malware DetectionMachine Learning in Malware Detection
Machine Learning in Malware Detection
 
Real World Application Threat Modelling By Example
Real World Application Threat Modelling By ExampleReal World Application Threat Modelling By Example
Real World Application Threat Modelling By Example
 
Keyloggers
KeyloggersKeyloggers
Keyloggers
 
What is Ransomware?
What is Ransomware?What is Ransomware?
What is Ransomware?
 
Android Security
Android SecurityAndroid Security
Android Security
 
Zero-Day Vulnerability and Heuristic Analysis
Zero-Day Vulnerability and Heuristic AnalysisZero-Day Vulnerability and Heuristic Analysis
Zero-Day Vulnerability and Heuristic Analysis
 
Malware classification using Machine Learning
Malware classification using Machine LearningMalware classification using Machine Learning
Malware classification using Machine Learning
 

Similar to Bit defender antivirus UML diagrams in software engineering

so big 22
so big 22so big 22
so big 22cainem
 
so big
so bigso big
so bigcainem
 
so big ppt
so big pptso big ppt
so big pptcainem
 
The AV-Comparatives Guide to the Best Cybersecurity Solutions of 2017
The AV-Comparatives Guide to the Best Cybersecurity Solutions of 2017The AV-Comparatives Guide to the Best Cybersecurity Solutions of 2017
The AV-Comparatives Guide to the Best Cybersecurity Solutions of 2017Jermund Ottermo
 
Antivirus Comparative junio 2014
Antivirus Comparative junio 2014Antivirus Comparative junio 2014
Antivirus Comparative junio 2014Doryan Mathos
 
AV Comparatives 2013 (Comparación de Antivirus)
AV Comparatives 2013 (Comparación de Antivirus)AV Comparatives 2013 (Comparación de Antivirus)
AV Comparatives 2013 (Comparación de Antivirus)Doryan Mathos
 
operating system Security presentation vol 3
operating system Security presentation vol 3operating system Security presentation vol 3
operating system Security presentation vol 3qacaybagirovv
 
Test Strategies & Common Mistakes
Test Strategies & Common MistakesTest Strategies & Common Mistakes
Test Strategies & Common Mistakesfrisksoftware
 
ANTIVIRUS
ANTIVIRUSANTIVIRUS
ANTIVIRUSfauscha
 
PC Maintenance Security and Troubleshooting
PC Maintenance Security and TroubleshootingPC Maintenance Security and Troubleshooting
PC Maintenance Security and TroubleshootingThe Toolbox, Inc.
 
AV-Comparatives Performance Test
AV-Comparatives Performance TestAV-Comparatives Performance Test
AV-Comparatives Performance TestHerbert Rodriguez
 
Errorssolvingppt
ErrorssolvingpptErrorssolvingppt
Errorssolvingpptjohn wick
 
Errorssolvingppt
ErrorssolvingpptErrorssolvingppt
Errorssolvingpptjohn wick
 

Similar to Bit defender antivirus UML diagrams in software engineering (20)

so big 22
so big 22so big 22
so big 22
 
so big
so bigso big
so big
 
so big ppt
so big pptso big ppt
so big ppt
 
The AV-Comparatives Guide to the Best Cybersecurity Solutions of 2017
The AV-Comparatives Guide to the Best Cybersecurity Solutions of 2017The AV-Comparatives Guide to the Best Cybersecurity Solutions of 2017
The AV-Comparatives Guide to the Best Cybersecurity Solutions of 2017
 
Avc per 201304_en
Avc per 201304_enAvc per 201304_en
Avc per 201304_en
 
Antivirus Comparative junio 2014
Antivirus Comparative junio 2014Antivirus Comparative junio 2014
Antivirus Comparative junio 2014
 
AV Comparatives 2013 (Comparación de Antivirus)
AV Comparatives 2013 (Comparación de Antivirus)AV Comparatives 2013 (Comparación de Antivirus)
AV Comparatives 2013 (Comparación de Antivirus)
 
Performance dec 2010
Performance dec 2010Performance dec 2010
Performance dec 2010
 
Avc prot 2016a_en
Avc prot 2016a_enAvc prot 2016a_en
Avc prot 2016a_en
 
operating system Security presentation vol 3
operating system Security presentation vol 3operating system Security presentation vol 3
operating system Security presentation vol 3
 
Test Strategies & Common Mistakes
Test Strategies & Common MistakesTest Strategies & Common Mistakes
Test Strategies & Common Mistakes
 
ANTIVIRUS
ANTIVIRUSANTIVIRUS
ANTIVIRUS
 
PC Maintenance Security and Troubleshooting
PC Maintenance Security and TroubleshootingPC Maintenance Security and Troubleshooting
PC Maintenance Security and Troubleshooting
 
Antivirus
AntivirusAntivirus
Antivirus
 
AV-Comparatives Performance Test
AV-Comparatives Performance TestAV-Comparatives Performance Test
AV-Comparatives Performance Test
 
How to schedule Avast boot-time scan?
How to schedule Avast boot-time scan?How to schedule Avast boot-time scan?
How to schedule Avast boot-time scan?
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Errorssolvingppt
ErrorssolvingpptErrorssolvingppt
Errorssolvingppt
 
Errorssolvingppt
ErrorssolvingpptErrorssolvingppt
Errorssolvingppt
 
Avc prot 2013a_en
Avc prot 2013a_enAvc prot 2013a_en
Avc prot 2013a_en
 

Recently uploaded

Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Christo Ananth
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)Suman Mia
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSRajkumarAkumalla
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingrknatarajan
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxAsutosh Ranjan
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...ranjana rawat
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college projectTonystark477637
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINESIVASHANKAR N
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...ranjana rawat
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Call Girls in Nagpur High Profile
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Dr.Costas Sachpazis
 

Recently uploaded (20)

Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEDJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college project
 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 

Bit defender antivirus UML diagrams in software engineering

  • 1.
  • 2. ‘’BIT DEFENDER ANTIVIRUS’’ PRESENTED BY: M.SAAD FARMAN (UW-14-CS-BS- 138) USAMA TANVEER (UOW-15-CS-BS-022) PRSEENTED TO: MAM.SADAF ANWAR CLASS. BS(cs) 4TH A
  • 3. Intro of Bit DefenderAntivirus:  Bitdefender antivirus scan all the computer data dectect the virus and fix. It doesn’t harm the system.  When we use the computer Interment ads are irritating the user, ads are blocking, copying and deleting your personal data.  Bitdefender can block this kind of advertisement and protect system from this Trojan virus.  Usb and other data cables are sometimes harmful for the pc, because when they connect with system they caries virus.  Bitdefender antivirus first scan the virus and then give permission to connect with computer  Some type of bugs are very dangerous for the computer  Bitdefender antivirus also used to detect the bugs from cache memory and fix the computer bugs that harms the data.
  • 6. Class Diagram Bit Defender +Anti Spyware +Anti worm +AntiMalware +Secure Network +Sacan Virus +Malware detection +Update User ID Name DOB +Scan +Update Scanning +Scan Running apps +Critical Locatiion +Entire System Secure Network Anti Malware Bugs Detect Anti Spyware Detect virus Fix virus
  • 7. Sequence Diagram: User Main interface Antivirus Data base scan file start scan show analysis dell infectted files Delete File Update database
  • 8. Data flow diagram: Input Files Clean Files Scan Cache Memory Quick Scan System protection Perform Analysis Virus detection Update Datbase
  • 9. Component Diagram: Antivirus System scan Real Time Protection Wallet Virus DB <<database>> Wallet DB <<Database>> access
  • 10. Use Case Diagram: Input Files Clean file Perform analysis Quick scan Advance analysis See Infected Files Update Virus Database Save file infacted select files and Report to analysis <<include>> <<extend>><<include>> <<include>> <<extend>> USER
  • 11. Steps Test Step Test Data Expected Results Actual Result Status 1 Pass 2 Pass 3 Pass Testing module: Input files Test By: Usama Tanveer Test Case ID: OO-12 Test Date: 31-5-2017 Test priority: 1 Test Execution By: M. SAAD Description: Input file module perform selection of file to perform scanning and detect bugs or errors.   Tap on “ Input files” Press “yes button” press” no button” Test Execution date: 10-5-2017 Error should be errors successfully Find found and fixed Should Back back to initial stage to initial state
  • 12. Testing Module: Perform Analysis Test By: Usama Tanveer Test Case ID: OO-12 Test Date: 31-5-2017 Teat Priority: 2 Test Execution By: M. SAAD Description: Quick scan and advance analysis. Precondition selected files and report to analysis. Test Execution date: 10-5-2017 Steps Test Step Test Data Expected Results Actual Result Status 1  Tap on “ Input files” Pass 2 Press “yes button” Should give report of analysis scanning is done Pass 3 press” no button” Back previous position Show previous position Pass
  • 13. Steps Test Step Test Data Expected Results Actual Result Status 1 Pass 2 Pass 3 Pass Test Module: Clean files Test By: Usama Tanveer Test Case ID: OO-13 Test Date: 31-5-2017 Test priority:3 Test Execution By: M. SAAD Description: clean junk files and remove ADS Tap on “ Clean Files” Press “yes button” press” no button” . Test Execution date: 10-5-2017 clean junk and remove ads and Detect bugs clean pc From cache mem
  • 14. Testing Module: Update virus data base. Test By: Usama Tanveer Test Case ID: OO-14 Test Date: 10-5-2017 Module Name: 4 Test Execution By: M. SAAD Description: for cleaning infected file software must be update. Pre condition is user must be install update version. Test Execution date: 10-5-2017 Uptadate database should detect all viruses Steps Test Step Test Data Expected Results Actual Result Status 1 Tap on “Update data base” Aware us about the upcoming Viruses Pass 2 Press “yes button” Detect bugs Pass 3 press” no button” No detection back to initial stage Pass