Beruflich Dokumente
Kultur Dokumente
1. Certificate
2. Acknowlegement
3. Introduction
4. Hardware Requirements
5. Software Requirements
6. Project overview
a) Operating System
b) Introduction to VB
c) Introduction to MS Access
d) Requirement Analysis
7. Data Flow Diagram
8.Database Design
9. Object Pages and Coding
10. Conclusion
11. Bioliography
12. Soft copy of the project on CD.
0
OBJECTIVES
2. To concentrate on accuracy.
1
SCOPE
The scope of this module is to study and develop the computerized “Member,
Staff and schemes management ” for “ICE CREAM MANAGEMENT
SYSTEM”
The proposed system will function on:
1. All Ice cream type and records.
2. Details of all Ice cream type
3. Details regarding item available.
4. Search: chooses the option for data member, field and value for search.
5. Informative record for available item
6. Data report:
Member records
Ice cream type records
2
Theoretical background of the project
MICROSOFT VISUAL BASIC AS FRONT–END:
To reduce the cost and fast track application design and development, we used the
visual basic 6.0 platform, enterprise addition as it provides a component based
development of enterprise application.
Visual Basic is the most popular programming language for the worlds most
popular operating system by encapsulation of the windows application program
interface (API) in to easily manipulate objects. VB is the first language people
consider when they want rapid application development for the windows
environment. The capability of custom control to easily extend the language has
made VB the popular choice for an amazingly wide variety of programming tasks.
However the easy accessibility of the language and its enormous breath pose
challenges to both students and the instructor. Students approach the language
from a wide verity of background and abilities, some are new to programming,
some have extensive programming experience in other language (often character
based procedural languages),some want to learn the language to accomplish a very
specific task.
Frequently, instructors are challenged by the verity of students who come together
in a course.
3
MICROSOFT ACCESS AS BACKEND
Ms access has been used as the backend as it has a number of advantages which
include improved performance ,easy working facilities with filters , printing and
previewing ,designing a database, creating and customizing tables, queries ,form
and repots ,working with macros etc.
It also enables the user to work easily on the internet or an intranet. Working with
other application is yet another important feature of ms access. It allows easy
access and retrieval of data .it provides easy and conventional facility of
connectivity with visual basic. Security and administration of database is also a
significant and vital feature o ms-access.
We used ms-access as backend tool as we can manage all our information from a
single database file, within the file we can use:-
4
DEFINITION OF THE PROBLEM
It was difficult to maintain the records of each and every member manually.
The admission process was time consuming.
Manual work can cause human error.
Maintaing records of various facilities used by a particular member
was difficult.
Handling of files & paper was difficult and there was chance of misplacing
it.
ANTICIPATED BENEFITS
The database of each member will be maintained systematically.
It will keep the track records of various facilities used by a particular
member.
The receipt will be generated instantly.
It will maintain stock for Ice cream type
5
SYSTEM ANALYSIS AND DESIGNING
EXISTING SYSTEM:
System Analysis is a detailed study of the various operations performed by
a system and their relationships within and outside of the system. Here the
key question is- what all problems exist in the present system? What must
be done to solve the problem? Analysis begins when a user or manager
begins a study of the program using existing system.
In the existing system all the jobs of the bus route management is done
manually. This is very difficult to the operators who want to handle hundreds of
trips and many buses in a day. The currents system is that an operator wants to
keep the physical records of the bus route in his office and a separate record for the
passengers’ and for the booked seats. In current system there is no way to store the
6
details of the employees’ working in the bus. So many complaints against staff can
arise from the passengers’ side. More over there is no detailed record of the bus
and routes in which they service
PROPOSED SYSTEM
The proposed system is very useful for the operators and passengers.
This avoids the overheads for the operators. They can minimize the working stress
and can keep essential documents related to the bus and the passengers as a
softcopy. The advantage of the proposed system is the reduction in the cost of the
office equipments and the transaction is done quickly. Any operator can answer if
any seats for a particular route in a particular day are available or not.
Our proposed system has several advantages
User friendly interface
Fast access to database
Less error
More Storage Capacity
Search facility
Look and Feel Environment
Quick transaction
FEASIBILITY ANALYSIS
Whatever we think need not be feasible .It is wise to think about the
feasibility of any problem we undertake. Feasibility is the study of impact, which
happens in the organization by the development of a system. The impact can be
either positive or negative. When the positives nominate the negatives, then the
system is considered feasible. Here the feasibility study can be performed in two
ways such as technical feasibility and Economical Feasibility.
7
Technical Feasibility:
We can strongly says that it is technically feasible, since there will not be much
difficulty in getting required resources for the development and maintaining the
system as well. All the resources needed for the development of the software as
well as the maintenance of the same is available in the organization here we are
utilizing the resources which are available already.
Economical Feasibility
Development of this application is highly economically feasible .The
organization needed not spend much m money for the development of t he system
already available. The only thing is to be done is making an environment for the
development with an effective supervision. I f we are doing so , we can attain the
maximum usability of the corresponding resources .Even after the development ,
the organization will not be in a condition to invest more in t he organization
.There fore , the system is economically feasible.
8
METHODOLOGY ADOPTED, SYSTEM
IMPLEMENTATION & DETAIL OF HARDWARE AND
SOFTWARE REQUIREMENTS
METHODOLOGY ADOPTED
In this project,water fall model is used .
What is water fall model?
The waterfall model is one of the earliest structured models for software
development. It consists of the following sequential phases through which the
development life cycle progresses:
System feasibility. In this phase, you consider the various aspects of the
targeted business process, find out which aspects are worth incorporating
9
into a system, and evaluate various approaches to building the required
software.
Requirement analysis. In this phase, you capture software requirements
in such a way that they can be translated into actual use cases for the system.
The requirements can derive from use cases, performance goals, target
deployment, and so on.
System design. In this phase, you identify the components that make up
the system. You define the exposed interfaces, the communication between
the interfaces, key algorithms used, and the sequence of interaction. An
architecture and design review is conducted at the end of this phase to ensure
that the design conforms to the previously defined requirementsinteracting.
Coding and unit testing. In this phase, you write code for the modules
that make up the system. You also review the code and individually test the
functionality of each module.
Integration and system testing. In this phase, you integrate all of the
modules in the system and test them as a single system for all of the use
cases, making sure that the modules meet the requirements.
Deployment and maintenance. In this phase, you deploy software
system in the production environment. You then correct any errors that are
identified in this phase, and add or modify functionality based on the
updated requirements.
the It allows you to compartmentalize the life cycle into various phases,
which allows you to plan the resources and effort required through the
development process.
10
It enforces testing in every stage in the form of reviews and unit testing. You
conduct design reviews, code reviews, unit testing, and integration testing
during the stages of the life cycle.
It allows you to set expectations for deliverables after each phase.
You do not see a working version of the software until late in the life cycle.
For this reason, you can fail to detect problems until the system testing
phase. Problems may be more costly to fix in this phase than they would
have been earlier in the life cycle.
When an application is in the system testing phase, it is difficult to change
something that was not carefully considered in the system design phase. The
emphasis on early planning tends to delay or restrict the amount of change
that the testing effort can instigate, which is not the case when a working
model is tested for immediate feedback.
For a phase to begin, the preceding phase must be complete; for example,
the system design phase cannot begin until the requirement analysis phase is
complete and the requirements are frozen. As a result, the waterfall model is
not able to accommodate uncertainties that may persist after a phase is
completed. These uncertainties may lead to delays and extended project
schedules.
11
DETAIL OF HARDWARE & SOFTWARE
USED
SYSTEM REQUIREMENT:
Software:
Front End:
Visual basic 6.0 enterprise edition.
Back End:
Ms Access 2002-2003.
Operating system:
Microsoft Xp/2003 .
Hardware configuration:
12
SYSTEM MAINTAINENECE AND EVALUATION
Maintenance:
After the system was installed it was continuously analyzed
For defects, errors & compatibility problems. In case of an error
Or problem, it was rectified on the spot or within an acceptable
Time frame.
Evaluation:
ADVANTAGES:-
DISADVANTAGES:-
13
Cost and Benefit Analysis:
Developing an IT application is an investment. Since after developing that
application it provides the organization with profits. Profits can be monetary or in
the form of an improved working environment. However, it carries risks, because
in some cases an estimate can be wrong. And the project might not actually turn
out to be beneficial.
Cost benefit analysis helps to give management a picture of the costs, benefits and
risks. It usually involves comparing alternate investments.
Cost benefit determines the benefits and savings that are expected from the system
and compares them with the expected costs.
The cost of an information system involves the development cost and maintenance
cost. The development costs are one time investment whereas maintenance costs
are recurring. The development cost is basically the costs incurred during the
various stages of the system development.
Each phase of the life cycle has a cost. Some examples are :
Personnel
Equipment
Supplies
Overheads
Consultants' fees
14
Cost and Benefit Categories
In performing Cost benefit analysis (CBA) it is important to identify cost and
benefit factors. Cost and benefits can be categorized into the following categories.
There are several cost factors/elements. These are hardware, personnel, facility,
operating, and supply costs.
1. Development costs-
Development costs that are incurred during the development of the system are one
time investment.
Wages
Equipment
2. Operating costs,
e.g., Wages
Supplies
Overheads
Hardware/software costs:
It includes the cost of purchasing or leasing of computers and it's peripherals.
Software costs involve required software costs.
Personnel costs:
It is the money, spent on the people involved in the development of the system.
These expenditures include salaries, other benefits such as health insurance,
conveyance allowance, etc.
Facility costs:
15
Expenses incurred during the preparation of the physical site where the system will
be operational. These can be wiring, flooring, acoustics, lighting, and air
conditioning.
Operating costs:
Operating costs are the expenses required for the day to day running of the system.
This includes the maintenance of the system. That can be in the form of
maintaining the hardware or application programs or money paid to professionals
responsible for running or maintaining the system.
Supply costs:
These are variable costs that vary proportionately with the amount of use of paper,
ribbons, disks, and the like. These should be estimated and included in the overall
cost ofthe system.
Benefits
We can define benefit as
Profit or Benefit = Income – Costs
- Increasing income, or
- Decreasing costs, or
- both
16
Entity Relationship Diagram
Entity:
Entity is a thing or object in a Real world that is Distinguishable from all other
objects.
Relationship:
It is an association among several entities.
17
ENTITY RELATIONSHP DIGRAM(E.R.D)
OF ICE CREEM CENTER
Ic-name
custmar Unit
price
Unit name
quantity
price
Bill quantity
Selling
Purchase no Total
price
form Totel- price
Ic-name
price
custmar
name only
date
Bill no
paid
CRIDIT
18
D.F.D (DATA FLOW DIAGRAM)
Level 0
0
ICE CREAM
PURCHASE MANAGEMENT SALE CUSTMAR
OWNER
SALE SYSTEM
19
LEVEL1
1
purchase
OWNER PURCHASE PURCHASE
ditail record OF ICE CREAM
sale SALE
OWNER detail record SALE
OF ICE CREAM
BILL
cridit recoad
3 BILL
OWNER
CRIDIT
detail record
20
SCREEN DESIGNS:-
WEL COME FORM
M D I FORM
UPDATE FORM
21
DATABASE DESIGN
Credit table
22
Purchase table
23
Sales table
24
WELCOME FORM
25
MDIForm1
26
ADD NEW RECORD
27
SALES & BILLING
28
UPDATE RECORD
29
VIEW RECORD
30
METHODOLOGY USED FOR TESTING
SOFTWARE TESTING
Is the menu bar displayed in the appropriate contested some system related features
included either in menus or tools? Do pull –Down menu operation and Tool-bars
work properly? Are all menu function and pull down sub function properly listed ?;
Is it possible to invoke each menu function using a logical assumptions that if all
parts of the system are correct, the goal will be successfully achieved .? In
adequate testing or non-testing will leads to errors that may appear few months
later.
This create two problem
1. Time delay between the cause and appearance of the problem.
2. The effect of the system errors on files and records within the system.
The purpose of the system testing is to consider all the likely variations to which it
will be suggested and push the systems to limits.
The testing process focuses on the logical intervals of the software ensuring that all
statements have been tested and on functional interval is
conducting tests to uncover errors and ensure that defined input will produce actual
results that agree with the required results.
Program level testing, modules level testing integrated and carried out.
There are two major type of testing they are
1. White Box Testing.
2. Black Box Testing.
31
White Box Testing
White box sometimes called “Glass box testing”, “clear box testing”, “transparent
box testing”, and “structural testing” is a test case design uses the control structure
of the procedural design to drive test case.
Using white box testing methods, the following tests were made on the system.
1. All independent paths within a module have been exercised once. In our
system, ensuring that case was selected and executed checked all case
structures. The bugs that were prevailing in some part of the code where
fixed
2. All logical decisions were checked for the truth and falsity of the values.
While white-box testing can be applied at the unit, integration and system levels of
the software testing process, it is usually done at the unit level. It can test paths
within a unit, paths between units during integration, and between subsystems
during a system–level test. Though this method of test design can uncover many
errors or problems, it might not detect unimplemented parts of the specification or
missing requirements.
32
WHITE BOX TESTING DIAGRAM
White box testing assumes that the tester can take a look at the code for the
application block and create test cases that look for any potential failure scenarios.
During white box testing, you analyze the code of the application block and
prepare test cases for testing the functionality to ensure that the class is behaving in
accordance with the specifications and testing for robustness.
33
Input
Requirements
Functional specifications
High-level design documents
Detailed design documents
Application block source code
The white box testing process for an application block is shown in Figure 6.2.
34
White box testing involves the following steps:
1. Create test plans. Identify all white box test scenarios and prioritize
them.
2. Profile the application block. This step involves studying the code at
run time to understand the resource utilization, time spent by various
methods and operations, areas in code that are not accessed, and so on.
3. Test the internal subroutines. This step ensures that the subroutines or
the nonpublic interfaces can handle all types of data appropriately.
4. Test loops and conditional statements. This step focuses on testing
the loops and conditional statements for accuracy and efficiency for different
data inputs.
5. Perform security testing. White box security testing helps you
understand possible security loopholes by looking at the way the code
handles security.
35
BLACK BOX TESTING
Black-box testing is a method of software testing functionality of an application
as opposed to its internal structures or workings .Specific knowledge of the
application's code/internal structure and programming knowledge in general is not
required. This is black box testing enables the software engineering to derive a set
of input conditions that will fully exercise all functional requirements for a
program. Black box testing is not an alternative to White box testing rather it is
complementary approach that is likely to uncover a different class of errors that
white box methods like.
The tester is only aware of what the software is supposed to do, but not how i.e.
when he enters a certain input, he gets a certain output; without being aware of
how the output was produced in the first place
1. Interface errors
2. Performance in data structure
3. Performance errors
4. Initializing and termination errors
that tests the
BLACK BOX TESTING DIAGRAM
36
Input
The following input is required for black box testing:
Requirements
Functional specifications
High-level design documents
Application block source code
The black box testing process for an application block is shown below
1. Create test plans. Create prioritized test plans for black box testing.
2. Test the external interfaces. Test the external various type of inputs
using automated test suite.interfaces for
3. Perform load testing. Load test the application block the behavior at
various load levels. This ensures that it meets all performance objectives that
are stated as requirements.to analyze
37
4. Perform stress testing. Stress test the application block to analyze
various bottlenecks and to identify any issues visible only under extreme
load conditions, such as race conditions and contentions.
5. Perform security testing. Test for possible threats in deployment
scenarios. Deploy the application block in a simulated target environment
and try to hack the application by exploiting any possible weakness of the
application block.
6. Perform globalization testing. Execute test cases to ensure that the
application block can be integrated with applications targeted toward locales
other than the default locale used for development.
The detailed test plan document includes test cases for the following:
38
Testing for various types of inputs. After ensuring that the application
block exposes the interfaces that address all of the functional specifications, you
need to test the robustness of these interfaces. You need to test for the following
input types:
This testing ensures that the application block provides expected output for data
within the specified range and gracefully handles all invalid data. Meaningful error
messages should be displayed for invalid input.
For example, the CMAB had the following performance objectives on a Web
server (please note that these objectives are totally fictitious and are only for the
purpose of illustration):
You can measure metrics related to response times, throughput rates, and so on, for
the load test. In addition, you can measure other metrics that help you identify any
potential bottlenecks.
39
Step 4: Perform Stress Testing
Use stress testing to evaluate the application block's behavior when it is pushed
beyond the normal or peak load conditions. The expectation from the system
beyond load conditions is to either return expected output or return meaningful
error messages to the user without corrupting the integrity of any data. The goal of
stress testing is to discover bugs that surface only under high load conditions, such
as synchronization issues, race conditions, and memory leaks.
Depending on the functionality the application block provides, test cases can be
identified. Examples of test cases and tests can be the following:
If the application block accepts data from a user, make sure it validates the
input data by creating test cases to pass different types of data, including
unsafe data, through the application block's interfaces and confirming that
the application block is able to stop it and handle it by providing appropriate
error messages.
To perform globalization testing, you must install multiple language groups and set
the culture or locale to different cultures or locales, such as Japanese or German,
from the local culture or locale. Executing test cases in both Japanese and German
environments, and a combination of both, can cover most globalization issues.
40
PROBLEM ENCOUNTERED:
While developing the software we faced many major and minor problems. Initially,
we were not able to connect the data based to the front end and faced some
problems related to the connectivity and the consistency of the then it was very
difficult to print the report as a required printer drive was not available similarly
we could not manipulate the report page size.
During deployment project didn’t work as expected, which helped us to figure out
that program. Cant be ported to client machine without setup files as the program
was running fine on our machine but we were unable to run it on the client
machine in absence of appropriate runtime DLLs (dynamic link libraries ) the most
exasperating problem was to print the from thus making it impossible for us to
work further .
We took the help of all the possible people we could ask them for and with their
assistance we came out in triumph.
41
USER/OPERATION MANUAL INCLUDING
SECURITY ASPECTS, ACCESS RIGHTS,
BACKUP, CONTROLS ETC.
Get Started –
42
Your Device or Software
This button will let the user to search the records of Member.
43
CONCLUSION
It was a wonderful and learning experience for us while working on this project
.This project took us through the various phases of project development and gave
us real insight into the world if software engineering. The joy of working as a team
and the thrill involved while tackling the various problems and adapting to the
requirement put forward to us by the customer, gave us a feel of the developers
industry.
It was due to this project we came know how professional software’s are designed
and what all precautions should be taken. We also found that it is not just the task
of an individual, rather a team work, which helped us in making a fine grip on
visual basic 6.0
The project has laid the path to the depth of the subject, that requires a thorough
study and in which an engineering students have flair of proficiency. We have left
no stone unturned while developing this software and making it easy to understand
easy to navigate through the forms and making it easy to understand easy to
navigate through the forms and making re-cycling.
We enjoyed each and every bit of work we have put into this project and its
successful completion has given us our credit.
44
REFERENCES