Sie sind auf Seite 1von 27

PHONEBOOK 1

ACKNOWLEDGEMENTS

CMR Institute of Technology Department of MCA


2013-2014
PHONEBOOK 2

ACKNOWLEDGEMENTS

The beautiful fragrance that accompanies completion of our project task would be incomplete
without the appreciation to the people who made it possible. However, words are not enough to
express the sense of gratitude to everyone who helped us directly or indirectly”.

First and foremost we would express our sincere gratitude to our beloved Principal
for the strong encouragement in bringing out this project.

We are grateful to Prof. Rachna Sharma, HOD of MCA Department who spared her time in
pursuing us in doing the project.

We also extend our regards to our project guide Prof. Vikash Kumar, Senior Lecturer,
Department of MCA for his timely guidance, painstaking attention and suggestion at every stage
during our project.

Last but not least we wish to express our gratitude to our family members, friends and all
the well-wishers who stood behind us.

CMR Institute of Technology Department of MCA


2013-2014
PHONEBOOK 3

CONTENTS

CMR Institute of Technology Department of MCA


2013-2014
PHONEBOOK 4

CONTENTS

1. Abstract……………………………………………………………………………5
2. Requirement Specification………………………………………………………...7
3. System Analysis…………………………………………………………………...9
4. Design………………………………………………………………………....….11
5. Coding……………………………………………………………………….……14
6. Testing………………………………………………………………………....….18
7. Implementation…………………………………………………………..…….....20
8. Screen Shots...............……………………………………………...……………..23
9. Future Enhancements........………………………………………………………..26
10. Conclusion....……………………………………………………………………...26
11. Bibiliography....…………………………………………………………………...27

CMR Institute of Technology Department of MCA


2013-2014
PHONEBOOK 5

ABSTRACT

1. ABSTRACT

A phone book is a listing of information of the person along with their contact
information like mobile number, address, email. For the easy retrieval purpose. The goal of this
project is to enter the details of the person.

CMR Institute of Technology Department of MCA


2013-2014
PHONEBOOK 6

It has the list of all the information about the person. The user have to login for the
process, then the details are entered such as the name, telephone number, address email etc.. This
helps the user in inserting easily and effortlessly in no time, as the information about the
respective requirements can be retrieved easily.

The user has the database of all the information about persons whose details has been
entered ,for further retrieval.

Hence, this is a better and efficient way of using the technology and making it easier
for all.

CMR Institute of Technology Department of MCA


2013-2014
PHONEBOOK 7

REQUIREMENTS

SPECIFICATION

2. REQUIREMENTS SPECIFICATION

2.1 FUNCTIONAL REQUIREMENTS:

1. User has to login into his account.


2. Once the User login, admin can add the details of his contact persons.
3. User can also view all the contacts that has been saved.
4. User can also update the existing details .

CMR Institute of Technology Department of MCA


2013-2014
PHONEBOOK 8

2.2 HARDWARE REQUIREMENTS:

 HDD: 10 GB
 RAM: 512 MB
 Processor: Pentium 4 CPU 3.06 GHz

2.3 SOFTWARE REQUIREMENTS:

 Operating System: Windows 7 or Higher Version


 Platform: Microsoft Visual Studio 2010 or above
 Scripting : C#
 Database: Microsoft Access

CMR Institute of Technology Department of MCA


2013-2014
PHONEBOOK 9

SYSTEM ANALYSIS

3. SYSTEM ANALYSIS

3.1 INTRODUCTION:

The blue print of the developer is nothing but the Requirement Analysis document when the
requirement of the system is to be converted into an actual documentation. The programmer has
to use his intuition to determine what activities the module is supposed to perform.

3.2 FEASIBILITY STUDY:

The purpose of this document is to describe the various studies that were carried out to validate
the feasibility of this module or system in terms of Economic, Technical and Operational
Feasibility.

CMR Institute of Technology Department of MCA


2013-2014
PHONEBOOK 10

3.2.1 Economic Feasibility:

Economic justification is the bottom line consideration for most of the systems. But in
general, this is the most frequently used method for evaluating the effectiveness of the
system. It mainly depends on the cost/benefit analysis. It is found that due to free availability
of the required existing hardware resources, the project is feasible economically.

3.2.2 Technical Feasibility:

The technical feasibility is one of the main parameters on which the feasibility of the
project is decided. It is found that hardware requirements are easily satisfied, as the
requirements are small. The software requirements are met. The skill set required developing
the project modules are knowledge of C# and Microsoft Access.

3.2.3 Operational Feasibility:

In the project development the project is likely to be operationally feasible if it meets


the expectations of the users. In this project the process of accessing the information about the
buyers and sellers by the users easily. Users use the system at any point of time.

DESIGN

CMR Institute of Technology Department of MCA


2013-2014
PHONEBOOK 11

4. DESIGN

4.1 DATA FLOW DIAGRAM:

Data Flow diagram depicts information flow, the transformation flow and the transforms that are
applied as data move from input to output. DFD describes what data flows rather that how they
are processed. So it does not depend on how hardware, software and data structure of file
organization.

Data Flow diagram shows the information moves through the system and how it is
modified by the series of transactions. It is a graphical technique that depicts information flow
and the transformations that are applied as data moves from input to output. A DFD may be used
to represent a system at any level of abstraction.

ENTER
USER LOGIN CONTAC
T
DETAILS

ERRO
RTechnology
CMR Institute of Department of MCA
2013-2014
PHONEBOOK 12

SAVE

VIEW DATABASE

4.2 TABLE:

4.2.1 Login Table:

FIELD NAME DATA TYPE FIELD SIZE


Username Text 30
Password Text 30

4.2.2 AddUser Table:

FIELD NAME DATA TYPE FIELD SIZE


First Name Text 30
Last Name Text 30
Mobile Number Text 10
Telephone Number Text 10
Home Address Text 10
Email Id Text 10

CMR Institute of Technology Department of MCA


2013-2014
PHONEBOOK 13

CODING

CMR Institute of Technology Department of MCA


2013-2014
PHONEBOOK 14

5. CODING

5.1 Adduser.cs:

using System;
using System.Collections.Generic;
using System.ComponentModel;
using System.Data;
using System.Data.OleDb;
using System.Drawing;
using System.Linq;
using System.Text;
using System.Threading.Tasks;
using System.Windows.Forms;

namespace phonebook
{
public partial class frmAddUser : Form
{
OleDbConnection con = new OleDbConnection("Provider=Microsoft.Jet.OLEDB.4.0; Data
Source=Phonebook.mdb");
public frmAddUser()
{
InitializeComponent();
}
public void clearAll()
{
txtfname.Text = String.Empty;
txtlname.Text = String.Empty;
txtmno.Text = String.Empty;
txttno.Text = String.Empty;
txthaddrs.Text = String.Empty;
txteaddrs.Text = String.Empty;
}
private void btnsave_Click(object sender, EventArgs e)
{
con.Open();
OleDbCommand cmd = new OleDbCommand("insert into Phonebook.tblAddUser
values('" + txtfname.Text.ToString() + "','" + txtlname.Text.ToString() + "'," +

CMR Institute of Technology Department of MCA


2013-2014
PHONEBOOK 15

txtmno.Text.ToString() + "," + txttno.Text.ToString() + ",'" + txthaddrs.Text.ToString()


+ "','" + txteaddrs.Text.ToString() + "')", con);
cmd.ExecuteNonQuery();
MessageBox.Show("User Details Added");
clearAll();
txtfname.Focus();
con.Close();
}

private void btncancel_Click(object sender, EventArgs e)


{
this.Close();
}

private void txtmno_KeyPress(object sender, KeyPressEventArgs ep)


{
if (Char.IsLetter(ep.KeyChar) || Char.IsPunctuation(ep.KeyChar) ||
Char.IsSymbol(ep.KeyChar))
{
ep.Handled = true;
}

private void txttno_KeyPress(object sender, KeyPressEventArgs ep)


{
if (Char.IsLetter(ep.KeyChar) || Char.IsPunctuation(ep.KeyChar) ||
Char.IsSymbol(ep.KeyChar))
{
ep.Handled = true;
}
}

private void txtfname_KeyPress(object sender, KeyPressEventArgs e)


{
if (e.KeyChar == (Char)13)
{
txtlname.Select();
}
}

private void txtlname_KeyPress(object sender, KeyPressEventArgs e)


{
if (e.KeyChar == (Char)13)
{
txtmno.Select();
}
}

private void txtmno_KeyPress_1(object sender, KeyPressEventArgs e)


{
if (Char.IsLetter(e.KeyChar) || Char.IsPunctuation(e.KeyChar) ||
Char.IsSymbol(e.KeyChar))
{
e.Handled=true;
}
if (e.KeyChar == (Char)13)
{

CMR Institute of Technology Department of MCA


2013-2014
PHONEBOOK 16

txttno.Select();
}
}

private void txttno_KeyPress_1(object sender, KeyPressEventArgs e)


{
if (Char.IsLetter(e.KeyChar) || Char.IsPunctuation(e.KeyChar) ||
Char.IsSymbol(e.KeyChar))
{
e.Handled = true;
}
if (e.KeyChar == (Char)13)
{
txthaddrs.Select();
}
}

private void txthaddrs_KeyPress(object sender, KeyPressEventArgs e)


{
if (e.KeyChar == (Char)13)
{
txteaddrs.Select();
}
}

private void txteaddrs_KeyPress(object sender, KeyPressEventArgs e)


{
if(e.KeyChar == (Char)13)
{
btnsave.PerformClick();
}
}
}
}

CMR Institute of Technology Department of MCA


2013-2014
PHONEBOOK 17

TESTING

CMR Institute of Technology Department of MCA


2013-2014
PHONEBOOK 18

6. TESTING

6.1 INTRODUCTION:

Testing is a process of executing a program with the intent of finding an error. Software
testing is the execution of program to find its faults. The testing process focuses on the logical
internals of the software, ensuring that all statements have been testing and on the functional
externals, that is conducting test to uncover and ensure that defined input will produce actual
results with required results.

The testing phase is an important part of software development. It is the processes of


finding errors and missing operations and also complete verifications to determine whether the
objectives are requirements are satisfied.

Software testing is carried out in three steps .

Unit testing is the first level of testing. In this, different modules are tested against the
specifications produced during the design for the modules. Unit testing is essentially for
verification of the code produced during the coding phase. It is done by the programmer of the
module.

Second step include integration testing .If we need not be the case that software whose
modules when run individually and showing perfect result with also show perfect result as whole

CMR Institute of Technology Department of MCA


2013-2014
PHONEBOOK 19

.The individual modules are clipped under this major module and tested again and verified the
results.

The final step involves validation and testing which determines whether the software
function as the user expected.

CMR Institute of Technology Department of MCA


2013-2014
PHONEBOOK 20

IMPLEMENTATION

CMR Institute of Technology Department of MCA


2013-2014
PHONEBOOK 21

7. IMPLEMENTATION

7.1 INTRODUCTION:

Implementation is the process of bringing the developed system and turning it over to user. It can
be the most crucial stage in achieving a successful new system and in giving the users
confidence that the new system will work and be effective .

Implementation plan

For successful implementations of the system, implementation plan is necessary. Its


major elements include test plan, training plans, an equipment installation plan and a conversion
plan. The test plan provides for the preparations of the test ad for testing the system in a planned,
structured manner. Training plan is necessary to ensure that all people who are associated with
the computer related information system have the necessary knowledge and skills .The important
activities are preparations, equipment installation and hardware –software checkout.

Conversion is the process if initiating and performing all the physical operations that
result directly in the turnover of the new system to the user. There are two parts of conversion
.The conversion plan is implemented throughout the development phase into the operational
phase. The conversion plan includes procedural conversion, program conversion and the file
conversion.

7.2 DATABASE MANIPULATION:

A common framework class is created for database connectivity and data manipulation. Using
this class we can perform database activities like retrieval, insertion, deletion, updation etc..Hash
map is used to recognize the values in the form of key value pair. In this we have created a
common class which supports database operations like

 Insert
 Delete
 Update
 Display

CMR Institute of Technology Department of MCA


2013-2014
PHONEBOOK 22

7.3 IMPLEMENTATION OF SOFTWARE:

STEPS FOR INSTALLATION:

Installation Guidelines for Microsoft Visual Studio 2012 Express Edition components:

1. Before installing, you must uninstall any previous Beta, CTP or Tech Preview versions of

Visual Studio 2012, and the .NET Framework 2.0.


2. The windows XP must have service pack 2 installed. If not sure, go to start->control panel-

>automatic updates and update your system to have service pack 2 installed.
3. Copy the set-up file from the CD to the hard disk.
4. Double-click on it to execute the installer.
5. Chose English as the language.
6. Select the appropriate option (Typical. Custom) for installing the components of Visual

Studio 2012.
7. Click on Next.
8. Click on Install.
9. It will instruct you the process for the installation.
10. Click on finish for successful installation.

CMR Institute of Technology Department of MCA


2013-2014
PHONEBOOK 23

SCREEN SHOTS

CMR Institute of Technology Department of MCA


2013-2014
PHONEBOOK 24

8. SCREEN SHOTS

8.1 LOGIN PAGE:

8.2 HOME PAGE:

CMR Institute of Technology Department of MCA


2013-2014
PHONEBOOK 25

8.3 ADD USER PAGE:

8.4 VIEW DETAILS OF THE CONTACTS:

CMR Institute of Technology Department of MCA


2013-2014
PHONEBOOK 26

9. FUTURE ENHANCEMENT

The mechanism Phone book can be further extended to include the following

 Can be implemented on Cloud Storage.


 Can be implemented as an android application on phones.

10. CONCLUSION

“Phonebook” provides an easy and flexible way to add the details of a person to store his/her
information . Various details about the person can be inserted and updated easily and effortlessly
in no time, as the information about the respective requirements can be retrieved easily from the
database.

The Major Advantages Are:

• Easy retrieval of data available in database

• Quick implementation of results

• Very user friendly

• Does not require large amount of memory

• Very less manual work is needed

CMR Institute of Technology Department of MCA


2013-2014
PHONEBOOK 27

11. BIBLIOGRAPHY

11.1 BOOKS:

 Pro C# with .NET – Andrew Troelson


 Programming in C# - E Balaguruswamy
 Software Engineering – Sommerville

11.2 WEBSITES:

 www.google.com
 http://stackoverflow.com/

CMR Institute of Technology Department of MCA


2013-2014

Das könnte Ihnen auch gefallen