Academy of Computer Studies: A Project Report ON
Academy of Computer Studies: A Project Report ON
PROJECT REPORT
ON
Submitted to
STUDY CENTRE
1. Certificate
2. Acknowledge
3. About Visual Basic
Features of Visual Basic
Advantages of Visual Basic
Components of Visual Basic
4. SDLC – System Development Life Cycle
Waterfall model
Iterative Enhancement Model
Prototype model
Spiral model
5. Selection Criteria (RAD model)
6. Study of the existing system
7. Problems faced in the existing system
8. Functional Modelling and Information flow
9. Software Project Plan
Fact Finding Techniques
Feasibility analysis
Data Modelling
ER Diagram of the System
Fully attributed data models
10. Data Dictionary
Process Model (Pseudo Codes)
Access levels
10. Input and Output Screens (Screen Dumps)
11. Coding
12. Project Future Scope
13. Software Development Cost
14. Project Resources
15. Hardware Configuration
16. Software Configuration
17. Benefits associated with the product
18. Risk associated with cost and schedule estimates
19. Cost Benefit analysis of the system
20. Quality Assurance
21. Time Chart
22. Data Reports
23. System Testing
24. System Maintenance
25. Validations
ACKNOWLEDGEMENT
This project report on Library Management is the result of idea and suggestions to us by
Mr Ankit Kumar
We, student of (MCA 2011-13) Academy of Computer Studieshereby declared that this
work (Library Management) has been carried out by us for the partial fulfillment of the
MCA Program conducted by PTU University , Jalander and has not been submitted
anywhere else for the award of any other Degree or Diploma.
Special thanks to the management of the College for providing us suitable time for
developing the project.Thanks to Mr Ankit Kumar guidance candidature and for
assigning us the project.
Thanking You
Microsoft product “Visual Basic”- extremely powerful, state of the art and at the same time easy-
to-use computer programming environment that enables you to develop Windows applications.
This environment includes everything one needs to create, modify, test and compile the
application. With Visual Basic, one can automate everyday tasks, add custom required features
and functions to suits one need, and create applications which makes ones task easier.
Visual means the way you develop an application’s user interface and basic is the type of
programming code that you write. In this chapter, you as a software developer or as a
programmer, you are expected to design and develop every program that works correctly,
efficiently and at the same time easy-to-use by any person who may or may not be well versed
with the computer and its capabilities. The application programs written in any language must be
such that the user of that program should find it extremely friendly in the sense that not much
effort should be required on the part of the user to understand and use an application. It is the
ability of the user interface that you create that someone sees when your program is running. Will
learn some basic concepts of this powerful language.
FEATURES:
Visual Basic provides an excellent environment for both beginners and professionals to
create efficient applications.
It is powerful and easy-to-use programming language.
It displays five windows – a blank Microsoft Visual Basic main window, Properties
window, Project window, Toolbox and the Form window.
A window using which one can keep a track of errors while developing an application, it
is the Debug Window.
To see an output on the monitor one can use the Print command.
Arithmetic operators, to do some calculations between two numbers.
The fastest and easiest way to create applications for Microsoft Windows.
Visual Basic is based on Basic.
Fundamental design is the event-driven program concept.
Is graphical in its programming approach.
Provides with a complete set of tools to simplify Rapid Application development (RAD).
Data access features.
Active X technologies.
Internet capabilities.
COMPONENTS OF VISUAL BASIC
Form
Contains the background for the Windows program that you are writing and also the controls
with which the user can interact.
Toolbox
The Tool Box window contains tools or controls such as Label, Text Box, List Box, Image
Control, Command Button etc.
Project Window
The project window contains the list of all the files used in the current application. In VB
terminology VB application is generally called a project.
Properties Window
This describes every individual element in the application such as the form contains the
properties like color and size. And also every control contains its own properties.
Code Window
The source code for the application is written in the code window. Much of the time, the
code inside the Code Window contains the settings and retrieval instructions for form
controls.
Menu Bar
Menu Bar contains additional menus that pull down just like virtually all windows
applications use. These are also called as submenus. The commands on the submenus perform
tasks.
Commands on the Menu Bar
File – contains file related commands.
Edit – contains commands like copy, cut, paste and graphical controls.
View – controls you viewing of application’s code, form and project’s windows.
Insert – let you insert additional objects.
Run – to execute, halt and resume the application we use the run menu.
Tools – to work with additional tools.
Add Ins- lets you add additional components.
Help – to get help contents.
Standard Controls
The use of the controls in Visual Basic is to built user
interfaces. Controls are also called as Objects.
Label Control
Used to add the descriptive text to the form in any location by using different styles and sizes
of fonts.
Text Box Control
Use the text box control to place an area on the screen for the user’s keystrokes. The text box
control works just like a mini word processor.
Picture Box
This is use to display graphical images.
Command Button
Command button supply push button access to events
that you want the user to trigger.
Check Box
Check Boxes give users multiple choice accesses to
choices they make to need.
Option Buttons
Options Button controls are known as mutually exclusive
controls. Option buttons give the user a list from which to
choose, but they can select exactly one option out of the
list.
Frame Control
Frame Control enables you to group items together on a
form. The group works almost like a misinform within a form.
Dropdown Combo Lists
It is one of the three kinds of lists that you can provide.
This saves the room on the screen by consuming only one line
on the form. It displays the entire list by clicking the down
arrow.
List Box Control
List boxes are controls that give the users choices from
which they can select. The users cannot add items to a list
box.
Line Control
This is used to draw various styles of lines on the form at the design time.
Label: This control display that in a form that user can’t edit. It is used to identify other controls.
Properties of label control
Frame: This control is used to draw boxes in the form and group elements like textboxes,
command button, labels etc.
Command Button: A command button represents an action that is carried out when the user
clicks on the button.
Checkbox: It presents one or more choices that the user can select. The checkbox is a toggle, it
means every time it is checked it changes status (from checked to cleared and vice versa). It has a
value property if it is 0 means checkbox is cleared and 1 is the checkbox is checked.
Option Button:
It appears in-group and the user can choose only one of them. The option button is a toggle i.e.
every time it is checked it changes status (from checked to cleared and vice versa).
Command Dialogue
The Common Dialog control provides a standard set of dialog boxes for operations such as
opening and saving files, setting print option, and selecting colors and fonts. The control also has
the ability to display help by running the windows Help engine.
The Common Dialog control provides an interface between Visual Basic and the routines in the
Microsoft Windows dynamic-link library Commdlg.dll. To create a dialog box using this control,
Commdlg.dll must be in your Microsoft windows System directory.
You use the common Dialog control in your application by adding it to a form and setting its
properties. The dialog displayed by the control is determined by the methods of the control. At
run time, a dialog is displayed or the help engine is executed, when the appropriate method is
invoked; at design time, the Common Dialog controls displayed as icon on form. This icon can’t
be sized.
Properties Description
1 .Name Determines the name use in code to
identify the object
2. Color Set the selected color
3 Copies set the value that determines the no.
of copies to be print
4 File Name Set the path & name of selected file
5 Font Bold Set the text to bold
6 Font Italic Set the text to italic
7 Font name Set the font name
Menu editor: Menu’s can be attached only to forms when menu editor designs them. In the menu
editor window you can specify the structure of your menu by adding one command at a time.
Each menu command has two mandatory properties:
Caption: This is the string that appears on the application menu bar.
Name: This is the name of the menu command. This property doesn’t appear on the screen, but
your code uses it to program the menu command.
SDLC --- System Development Life Cycle
The process of forming and using a system follows a typical set of steps. System follows a life
cycle known as System Development Life Cycle.
The life of system starts with an initial study which is conducted to generate alternate solutions
and their feasibility. Based on this a decision is to be taken on aspects like –
is a new system needed? Detail analysis is then carried out. Design and implementation follow
this. The system put in use. After few years the system becomes less and less effective. Finally
the system retires. It is discarded and gives way to new system. The new system follows the same
life cycle.
The period of time that begins when a system is conceived and ends when a system is no longer
available for use.
Initial investigation
Feasibility
Analysis
Design
Development
Implementation
Testing
Maintenance
One of the most important tasks performed by SDLC is to choose the model with respect to
which the new system is being developed. Models a re predefined standards set of phases. Four
types of models are standard:
Waterfall model
Iterative enhancement model
Prototype model
Spiral model
Waterfall Model
System
Feasibilit
Validation
y
Software Plans
&
Requirements Validation
Product
Design
Verification
Detailed
Design
Verification
Code
Unit Test
Integratio
n Product
Verification
Implementatio
n
System
Test
Operations &
Maintenance
Revalidatio
n
Salient characteristics of waterfall model
· It brought a definite structure to the process of software development, which was a major
improvement over the previous "code and fix" culture.
· Each phase is distinct and is mandatory for every project irrespective of project size.
· Every phase has well-defined entry and exit criteria.
· This is achieved through the process of reviews and documentation.
· At every phase there is provision for verification and validation and correction of errors and
inconsistencies.
This model was certainly a major step in the right direction. Proper documentation and reviews at
different stages of any project is necessary to ensure that the final product is what the customer
originally required.
The strength of the waterfall model is that it allows for communication between the customer and
developer and specifies what will be delivered, when and at what cost.
The weakness of this model is its insistence on a complete set of user requirements before
commencement of design.
While theoretically it is all very well for the developers to say that all requirements have to be
frozen before design can begin (since it is very cumbersome to be making changes thereafter), in
real life situations it seldom happens.
This is because users cannot specify all their requirements in one shot. They generally tend to
come up with modification and additional requirements as the system progresses.
Hence if the requirements are frozen at the time of analysis, on the one hand, it leads to a great
deal of discomfort for the development team if they have to contend with requests for change
later on, after having been told originally that requirement specifications have been signed off,
and on the other hand it leads to user dissatisfaction if they find that what in their opinion are
legitimate additional requirements are not being incorporated.
Demerits of waterfall model
The iterative enhancement model has the same phases as the waterfall model but with fewer
restrictions. A process model developed whereby the construction and perhaps the delivery of the
software are done in phases. Every iteration would therefore deliver a product with incremental
capabilities. Generally the phases occur in the same order as in the waterfall model but they may
be conducted in the several cycle. A usable product is released at the end of each cycle, with each
release providing additional facility.
Requirements
Analysis
Design Design Code Test
Code
Test
Requirements
Analysis
Prototyping helps the user to see a demo of its system that further allows him to produce
few hidden requirements.
It acts as a information gathering mechanism.
Easily identify the software requirements.
Spiral model
It incorporates the elements of the prototype driven approach along with the classic software life
cycle. It also takes into account risk assessment whose outcome determines taking up of the next
phase of the development activity.
This is an aspect ignored by other models, which becomes important in large-scale software
development projects. Unlike all other models, which view development as a linear process, this
model views it as a spiral process. Representing iterative development lifecycles as an expanding
spiral does this.
Spiral Model
These activities involved in spiral model are:
a) Planning - At the beginning of every iteration, the objectives, alternatives and constraints for
that iteration are laid out.
b) Risk analysis - Here is where the alternatives are analyzed and the associated risks are
identified and evaluated. At this stage a go - no go decision is taken regarding whether it is
worthwhile proceeding with the development of this phase.
c) Engineering - This involves the actual development of the product or software for this phase.
This may follow either the prototyping or classic life cycle approach. You will find it interesting
to observe that the greater the distance of spiral from the center, the greater the time spent on this
phase. Quite simply what this means is that as the number of iteration increase, the output would
tend to be the eventual product with the developmental work increasing correspondingly.
d) Customer Evaluation - This involves a review of the preceding developmental effort and
therefore planning for the next phase.
Selection Criteria
We have used the RAD (Rapid Action Development) model approach to complete our project
due to the following reasons :
Library system is managed and owed by UICT a institute of computers & technology.
The library offers its students to access the books, issue books, deposit books and return
the books on the due date otherwise they have to pay the fine. Students have to deposit
the library fee to the institute and then access the library.
The management carries all the services mentioned above manually. All the tasks are
performed manually, and there is no automation.
1. Member of the library: For opening a new account, first the students are required to fill up
a library card, and fees of the library. The card contains following fields, which are
required to be filled:
i. Name.
ii. Program.
iii. Enrollment no.
iv. Membership no.
v. Valid dates.
vi. Specimen Signature.
vii. Photograph
After submitting the card with the fee to the Librarian they give the receipt to the students
and then he becomes the member of the library
2. Issuing and Depositing the Book: - After becoming a member of the library, he is allowed
to have access to the library. He could issue and deposit books on the library days.
When a book is issued to the member of the library the librarian takes the card from the
member and fills some details of the member in the library maintenance register. The
register contains following fields, which are required to be filled:
i. Date of issue.
ii. Book no.
iii. Enrollment no.
iv. Name of the book.
v. To whom issued.
vi. Signature (member).
vii. Due date.
viii. Date of return.
ix. Fine.
x. Signature (librarian)
PROBLEMS FACED IN THE EXISTING SYSTEM
The library encounters a number of problems with its existing manual system. Due to this the
functioning of the library is adversely affected. This all leads to dissatisfied members, extended
deadlines, chaos, slow processing, mistakes etc. The major problems identified, which the library
is facing, are as under:
3) If the staffs are absent or are on holidays, all the work gets crippled.
Feedback
& Data
STUDENT
ACCOUNT NEW MEMBER
Produced ACCOUNT
OPENING
Librarian
Rules and SYSTEM
Instructions
Process Specification: In the above DFD, the Students feed all the relevant data and information.
The librarian feeds the rules and instructions, all of which are processed by the account opening
system. After processing a new member account is produced.
LIBRARY CARD&
CARD FEE
STUDENT Submits the card &
Fills an
Fees to the library
library card
no. o
Creates the Data
account
Information
Students account
Display Data
database
NEW ACCOUNT
Process Specification: The customer fills in the fills the library card. After filling the card, he
submits the card and the fees to the library. The librarian receives the submitted card and fees.
After receiving, the librarian checks for the Enrollment no. of the student. If all the conditions are
satisfied a new account is created for the student. If any of the conditions is not satisfied, the
form is rejected and account not created. After the account is created, the customer is notified
about it. A new account is entered in the New account file.
Process Specification: The students feed in the data and request for the book, and the librarian
feeds in the rules and instructions in the transaction system. All the information is processed and
the data is displayed in the library register.
2. Level 1 DFD for issuing the book
STUDENT REQUEST
Data THE BOOK Configuration
data
Submits
Checks for
member library
status
Data
Library register
Process Specification: The member requests a book. The librarian receives it, and thereafter
performs all the verification for authentication of account and checks it. If the account is
authentic, he issues the book to the member. Thereafter he makes the necessary entry into the
library register.
Introduction
The development team of our group has undertaken the project. The project includes
development of Library automation system of UICT. The development of the software will do in
an RAD model.
Business Model: -
Questionnaires
2. Are you satisfied with the availability of the book’s you are demanding for? (Yes or no)
3. What would you expect from a book library system to do as according to your
expectations?
4. What improvement would you think the librarian must use in practice to provide you
better services for becoming a Market Leader?
All projects are feasible–given unlimited resources and infinite time! Unfortunately, the
development of a computer-based system or product is more likely plagued by a scarcity of
resources and difficult (if not downright unrealistic) delivery dates. It is both necessary and
prudent to evaluate the feasibility of a project at the earliest possible time. During system
engineering three primary areas of interest are considered:
Economic feasibility: An evaluation of development cost weighed against the ultimate income or
benefit derived from the developed system or product.
Technical feasibility: A study of function, performance, and constraints that may affect the
ability to achieve an acceptable system.
Legal feasibility: A determination of any infringement, violation, or liability that could result
from development of the system.
For this checklist, the more questions that elicit a negative response, the higher the risk that
project/product feasibility is questionable.
Economic feasibility:
Have the benefits associated with the product/system/service been Identified explicitly?
Does the configuration represent the most profitable solution?
Technical feasibility:
Are all elements of the system configuration understood?
Can the configuration be built within pre-established cost and schedule bounds?
Does the technology exist to develop all elements of the system?
Does the proposed configuration properly interface with the system's external environment?
Are machine to machine and human to machine communication handled in an intelligent
manner?
Legal feasibility:
Member
Request Data/processed
Data/processed data
2
Book DATA
Retrieve/
Data/processed data Develop
Reports
Requests/receive
Data/processed
Library REPORTS
Data
3
PURCHASE DEPT Requests Develop
Purchase
Order
Or
ders
SUPPLIERS
Process decomposition:
Here, the above mentioned pocesses are further decomposed and their Pseudo Codes are
Provided
updations
1.1
1.2.2 .3
Issue Validate
MEMBE Up
Charges +Updating
1.2.3
R dat Apply the
Data
e Policy
Regular rec
MEMBERSHIP No.
ord
Validate s
Request
BOOK data
BOOK CODE
ERD of the Library Management system
PURCHASE Orders
SUPPLIER
DEPPT.
Develops
REPORT
And DATA
MAINTENENCE
generates generates generates
IS
A
TRANSACTION
Member
STUDENT FACULTY
Key Domain
M_id Primary key
Non-Key
Name String
IS Address Addres
Reg. A Non Reg.
Telephone Numeric
Email id String
DOB Date
Course name String
IS Data Model
Fully attributed
A
Issue/Return Dept.
Student Faculty
Category String
Report Generation dept. and Data Maintenance Dept :
REPORT
Key
Report No.
Dept No.
Non Key
Purpose.
Screen No
Data
QUERY
Key
Query No.
Non-Key
Query Type
Query Text
Transaction_id
Member_id.
Books_ids
Purchase Department :
PURCHASE
MEMBERS Deppt. TRANSACTION BOOKS
SUPPLIER
Key Attributes
Key attributes
Order No. .
Supplier _id
Non –Key attributes
Non Key attributes
Supplier_id
Name
Book_author Order Address
Book Name
Contact No.
Publisher
Email
ISBN Code
Code
Copies
Date
Suggest
s
REPORT
Data Dictionary
Table: Members
Attribute Key Description
Card no. Primary Card no. of the record of
the customer in database.
Input (Request)
Switch (Request)
{
Case 1: remove ()
Case 2: new ()
Case 3: issue ()
Case 4: return ()
Default: Print, ”Invalid choice entered”
}
End
Description: This process clears the previous accounts of the customer and calls another
procedure called update() to update records.
Processing:
Start:
Print” Enter Membership code”
Input (membership code)
If membership code exits in customer database
If membership code has not taken any books
Return the deposit amount
Update (delete, membership_code)
End
Else
Return()
Update1 (delete, membership_code)
End
Else
Print” Invalid Code”
End
Processing:
Start:
Print” Enter membership code”
Input (Membership Code)
Print” Enter book_code (demanded)”
Input (book_code)
End:
Process 1.1.1.2
Process Name fine(var)
Description: It calculates the amount of fine applicable
Start:
Return Currentdate-Var.issue_date*10
End:
Processing:
Start:
If var is “Issue”
Print“ Enter Book_code”
If Book_code is “Available”
Print” Enter data for casual Member”
Input (Casual_Member)
…Assign Code
Update (enter, Member_code, Book_code)
Else
Print”video unavailable”
End
Access Levels to the different persons :
1. Administrator : The administrator have complete access over the whole system. He can
delete or modify the database and can update the database.
2. Faculty : the faculty can only search for the books that will be retrieved from the
database and can look or generate the data reports.
3. Member : the member has nearly the same access rights as the faculty. He/She search for
the books that will be retrieved from the database and can look or generate the data
reports.
4. Group : The group users have only a few options in accessing the database.
Coding
Starting Form
Main Form
Login Form
.Toolbar1.Buttons(1).Enabled = False
.Toolbar1.Buttons(2).Enabled = False
.Toolbar1.Buttons(3).Enabled = False
.Toolbar1.Buttons(4).Enabled = False
.Toolbar1.Buttons(5).Enabled = False
.Toolbar1.Buttons(6).Enabled = False
.Toolbar1.Buttons(7).Enabled = False
.Toolbar1.Buttons(1).Enabled = False
.Toolbar1.Buttons(2).Enabled = False
.Toolbar1.Buttons(3).Enabled = False
.Toolbar1.Buttons(4).Enabled = False
.Toolbar1.Buttons(5).Enabled = False
.Toolbar1.Buttons(6).Enabled = False
.Toolbar1.Buttons(7).Enabled = False
End If
End With
End Sub
Private Sub Form_Load()
logindata.DatabaseName = App.Path & "\initialsc.mdb"
Data1.DatabaseName = App.Path & "\initialsc.mdb"
End Sub
RecordData.Recordset.Fields("nrollno") = txtRollno.Text
RecordData.Recordset.Fields("nbkno") = txtBkno.Text
RecordData.Recordset.Fields("tbkname") = txtBkName.Text
RecordData.Recordset.Fields("tbkgroup") = txtBkGroup.Text
RecordData.Recordset.Fields("issued") = txtDate.Text
RecordData.Recordset.Update
IssueData.Recordset.Update
MsgBox "Book issued."
CountData.Refresh
txtStuname.Text = ""
txtBkissued.Text = ""
txtBkno.Text = ""
txtRollno.Text = ""
txtBkName.Text = ""
txtBkGroup.Text = ""
txtRollno.SetFocus
'Call general.Saaf(Me)
End If
message:
If Err.Number = 3201 Then
MsgBox "The Roll No. or Book No.,you entered doesn't exists."
End If
If Err.Number = 3022 Then
MsgBox "The book has already issued to someone."
txtBkno.SetFocus
End If
If Err.Number = 3421 Then
MsgBox "Please enter the correct format of Book No. or Roll No."
End If
End Sub
Private Sub CmdIssue_GotFocus(Index As Integer)
lbTip.Caption = " Saves the record to database."
End Sub
Private Sub CmdReset_Click(Index As Integer)
Call general.Saaf(Me)
End Sub
Private Sub CmdReset_GotFocus(Index As Integer)
lbTip.Caption = "Resets the form."
End Sub
Private Sub Form_Load()
IssueData.DatabaseName = App.Path & "\initialsc.mdb"
RecordData.DatabaseName = App.Path & "\initialsc.mdb"
StuinfoData.DatabaseName = App.Path & "\initialsc.mdb"
CountData.DatabaseName = App.Path & "\initialsc.mdb"
BookinfoData.DatabaseName = App.Path & "\initialsc.mdb"
BookinfoData.RecordSource = "BookInfo"
StuinfoData.RecordSource = "stuinfo"
txtDate.Text = general.ghadi()
Calendar1.Today
End Sub
User Options
End Sub
Module
Public Declare Function ShellExecute Lib "shell32.dll" Alias "ShellExecuteA" (ByVal hwnd As
Long, ByVal lpOperation As String, ByVal lpFile As String, ByVal lpParameters As String,
ByVal lpDirectory As String, ByVal nShowCmd As Long) As Long
Public gGroup As String
Public conn As New ADODB.Connection
Public rs As New ADODB.Recordset
Public gPassword As String
Public gUserId As String
With Issue
Check = False
If .txtRollno.Text = "" Then
MsgBox "Enter Student's card no."
.txtRollno.SetFocus
Else
If .txtBkno.Text = "" Then
MsgBox "Enter Book's No."
.txtBkno.SetFocus
Else
Check = True
End If
End If
End With
End Function
With Issue.CountData.Recordset
FillBkissued = 0
If Not .RecordCount = 0 Then
.MoveFirst
End Function
Function FillStuname() As String
With Issue.StuinfoData.Recordset
.MoveFirst
FillStuname = "No Student found."
End Function
With Issue.BookinfoData.Recordset
.MoveFirst
temp(1) = "No Book Found."
End Function
Function Saaf(temp As Object)
With temp
.txtStuname.Text = ""
.txtBkno.Text = ""
.txtRollno.Text = ""
.txtissueDate.Text = ""
.txtfine.Text = ""
.txtBkName.Text = ""
.txtBkGroup.Text = ""
.txtRollno.SetFocus
End With
End Function
Function Depositb()
Dim Check As Boolean
'checking whether the given book no or Stuname really exists.
With Deposit.DepositData
.Refresh
If Not .Recordset.RecordCount = 0 Then
.Recordset.MoveFirst
While .Recordset.EOF = False
If .Recordset.Fields("nbookno") = Deposit.txtBkno.Text Then
If .Recordset.Fields("nrollno") = Deposit.txtRollno.Text Then
Call general.filldpstdate
.Recordset.Delete
MsgBox "Book Deposited.", vbOKOnly, "Deposited"
Check = True
Exit Function
Else
MsgBox "This book was not issued to this student."
Exit Function
End If
Else
.Recordset.MoveNext
End If
Wend
Else
MsgBox "No book issued to anyone."
End If
End With
If Check = False Then
MsgBox "This Book is in Library or doesn't exists."
End If
End Function
With Issue.StuinfoData.Recordset
.MoveFirst
DepositfillStuname = "No Student found."
While Issue.StuinfoData.Recordset.EOF = False
If .Fields("nrollno") = Deposit.txtRollno.Text Then
DepositfillStuname = .Fields("tstuname")
Exit Function
Else
.MoveNext
End If
Wend
End With
End Function
Function DpstfillBkissued() As String
With Issue.CountData.Recordset
DpstfillBkissued = 0
If Not .RecordCount = 0 Then
.MoveFirst
End Function
Function filldpstdate()
If Not Issue.RecordData.Recordset.RecordCount = 0 Then
While Issue.RecordData.Recordset.EOF = False
If Issue.RecordData.Recordset.Fields("nbkno") = Deposit.txtBkno.Text Then
Issue.RecordData.Recordset.Edit
'Issue.RecordData.Recordset.Fields("deposit") = Deposit.txtDate.Text
Issue.RecordData.Recordset.Update
Exit Function
Else
Issue.RecordData.Recordset.MoveNext
End If
Wend
End If
End Function
With Issue.BookinfoData.Recordset
.MoveFirst
temp(1) = "No Book Found."
End Function
Function ghadi() As String
Dim p As String
p = Day(Date) & "-" & MonthName(Month(Date)) & "-" & Year(Date)
ghadi = p
End Function
Function addstudent()
On Error GoTo msg
If Addstu.CmdAdd.Caption = "Add Student" Then
Addstu.Data1.Recordset.AddNew
Addstu.CmdAdd.Caption = "Save"
Addstu.Txtrno.SetFocus
Addstu.Txtrno.Text = ""
Else
If Addstu.CmdAdd.Caption = "Save" Then
Addstu.Data1.Recordset.Update
Addstu.CmdAdd.Caption = "Add Student"
End If
End If
msg:
If Err.Number = 3022 Then
MsgBox "The roll no. already exists."
Addstu.Txtrno.SetFocus
End If
If Err.Number = 3426 Then
MsgBox "Enter correct format in card no."
End If
End Function
Function Bookadd()
On Error GoTo msg
If AddBook.CmdAdd.Caption = "Add Book" Then
AddBook.Data1.Recordset.AddNew
AddBook.CmdAdd.Caption = "Save"
AddBook.txtBkno.SetFocus
AddBook.txtBkno.Text = ""
ElseIf AddBook.CmdAdd.Caption = "Save" Then
AddBook.Data1.Recordset.Update
AddBook.Data1.Refresh
AddBook.CmdAdd.Caption = "Add Book"
End If
msg:
If Err.Number = 3022 Then
MsgBox "The Book No. already exists."
AddBook.txtBkno.SetFocus
End If
If Err.Number = 3426 Then
MsgBox "Enter correct format of Book No."
End If
End Function
Function unloadform()
For i = Forms.Count - 1 To 1 Step -1
Unload Forms(i)
Next
End Function
1. Status: -
Library Status: - having all the details of books issued to the member.
Student Status: - having all the details of no. of books issued to the member.
2. Tools: -
Deposit Books: - Used for deposit the books to the library.
Issue Books: - Used for Issue the books to the Member.
Search: - Used for Search, about the book in the library according to login info.
3. Database: - as name suggest
Student: - having all the details of student in the library.
Books: - having all the details of the books in the library
4. Login: -
New User: - Used for creating New User for the library (for Administrator)
Log off: - Used for Sign as the different User (ALL)
Change Password: - Used for Change Your Password (ALL)
5. About: - About Software Makers.
6. Exit: - For LogOff.
Student Advance Report Form
Book Database
User Options
Change Password Form
Project scope
Following is the description of the software -:
The software will be maintaining database pertaining to all the activities of library
The software will be producing reports for books in the library
The software will carry out all the day to day transaction processing of the books
Performance/Behavior issues
Estimation technique m
Tables or equations associated with estimation technique m are presented.
Estimation has been done for m.
Project Resources
The following resources were used in developing the software.
People, hardware, software, tools, and other resources required to build the software are
noted here.
PEOPLE:
People are considered to be the most important in the environment for software
development.
The following players participated in the software development
process, which could be categorized into the given categories:
1. Software team: This team comprises of two members, who were responsible for
developing the software. The team constituted of two members:
Project Leaders: He has multiple roles to play. Apart from imparting technical
skills, He has to look after the proper functioning of the team and the software
development process. He has to possess leadership qualities like Motivating
technical people to produce to their best ability, Ability to mold existing process
that will enable the initial concept to be translated to a final product, Should be
creative and make his team members feel creative.
HARDWARE Altogether two Pentium III Personal Computers with 128 MB of RAM
were deployed in developing the software system.
SOFTWARE
The software which were required for developing the application are as under:
Platform: Microsoft Windows 98. or window xp
Front End: Microsoft Visual Basic 6.0.
Back End: Microsoft Access.
With the implementation of the product, the library will be largely benefited.
Many of the tasks, which were quite cumbersome to be handled manually,
would now be completed without any effort.
Developing a software requires a proper timeframe, and also it is required that it stays within
budget. There is always risk associated to the software with cost and schedule estimates.
Following are the ways in which the software could fail due to failure in the estimation of cost
and schedule:
1. It may happen that with due to increasing budget, the software functionality
may be reduced. The software will be limited in the operations it could perform.
3. The software may be not so robust and full of loopholes, which could lead to
its downfall.
4. Security is a big issue with the account section in Banks. There is always a
risk of security leak if the software is not properly tested.
Apart from the system-engineering phase, there have been other feasibility checkpoints in the
life cycle. It has been agreed for the following other categories of feasibility test.
Operational Feasibility: It’s the criteria to measure the urgency of the problem or the
acceptability of the solution. There are two aspect of operational feasibility to be considered:
1. Is the problem worth solving, or will the solution to the problem work?
2. How do the end users and management feel about the problem/solution?
For measure the urgency of the problems we did operational feasibility of the system. For the
identification of the problem, we followed PIECES framework. The following is a list of the
characteristics that addressed for the existing system:
P Performance: It was noticed that the system doesn’t provide adequate throughput and
response time.
I Information: It was identified that the existing system doesn’t provided end users with timely,
pertinent, accurate, and usefully formatted information.
E Economy: The system doesn’t provide adequate service level and capacity to reduce the costs
of the business or increase the profit of the business.
C Control: The system was not adequate to control and protect against fraud and to guarantee
the accuracy and security of data and information.
E Efficiency: The system was not making optimum use of available resources including people,
time etc.
S Service: The system was not providing desirable and reliable service to those who needed
them.
So going to this operation, we identified that the problems that the Library is facing is worth
solving, and the solution to these problems will work.
After doing the operational feasibility, it was concluded that the problems were quite severe and
urgent.
Cost associated with developing the system will fall under following categories:
Personnel Costs: The cost that will fall under this category would be salaries of system
analyst, programmers, consultants, data entry personnel, computer operators etc.
Computer Usage: Computers will be used for the following activities – programming,
testing, word processing, maintaining product dictionary, etc. The cost should be
estimated.
Training: Computer personnel must have to be trained, which will again incur expenses.
Also there will be fixed operating costs at regular intervals that will fall under the following
categories:
Software Quality Assurance is conducted to ensure that the software process and the resulting
product exhibit characteristics that will result in a successful outcome.
Our organization has established a broad based “total quality assurance plan” program
Our organization will be developing metrics that will enable us to accurately predict
defect prevention costs appraisal (inspection) costs failure costs and external failure
(failure in the field) costs
Role of our team will be clearly defined. It will be carried out uniformly.
Quality-related roles are to be clearly identified for all software engineers.
Project teams will be conducting formal technical reviews (e.g., walkthroughs,
inspections)
There will be a set of written review guidelines prepared by Project Leader. The
project Leader will make sure that the guidelines are followed.
Results of reviews will be documented
Organization has established / adopted a set of standards that apply to the software
that are build
Defect measures will be collected
Statistical techniques will be applied to defect measures that the team members
collect.
Serious consideration will be given to software reliability. The team members will try
to compute the reliability of the software that are build.
ISO 9001
ISO 9001 is the standard that our software organization has adopted .
1. SDLC ||||||||||||||||||||||||||||||
2. Preliminary |||||||||||||||||||||||||||||||||||||||
investigation
3. Requirement |||||||||||||||||||||||||||
Analysis
4. Information |||||||||||||||||||||||||||
Gathering
7. Testing |||||||||||||||
8. Implementation ||||||||||||||
9. Maintenance |||||||
System Testing
During system testing the system is used experimentally to ensure that the software does not fail,
in other words we can say that it will run according to its specification & in the way user expect
special test data are input for processing and the result is examined. A limited number of users
may be allow to use the system so the analyst can see whether they try to use it unforeseen ways.
It is desirable to discover any surprise before the organization implements the system and
depends on it.
System Testing is actually a series of different tests whose primary purpose is to fully exercise
the computer- based system. Although each test has a different purpose, all work to verify that all
system elements have been properly integrated and perform allocated functions. There are mainly
two types of testing: -
Unit Testing
Combined Testing
Unit Testing begins at the vertex of the spiral and concentrates on each unit of the software as
implemented in source code. Testing progresses by moving outward along the spiral integration
testing, where the focus is on design and the construction of the software architecture. Taking
another turn outward on the spiral, we encounter validation testing, where requirements
established as part of software requirements analysis are validated against the software that has
been constructed. Finally, we arrive at system testing, where the software and other software and
other system elements are tested as a whole.
Unit testing makes heavy use of white-box testing techniques, exercising specific paths in a
module’s control structure to ensure complete coverage and maximum error detection. Next
module’s must be assembled or integrated to form the complete software package. Integration
testing addresses the issues associated with the dual problems of verification and program
construction. Black-box test case design techniques are the most prevalent during integration,
although a limited amount of white-box testing may be used to ensure coverage of major control
paths. After the software has been integrated (constructed), a set of high-order tests is conducted.
Validation criteria (established during requirements analysis) must be tested. Validation testing
provides final assurance that software meets all functional, behavioral and performance
requirements. Black-box testing techniques are used exclusively during validation.
System testing verifies that all elements mesh properly and that overall system
function/performance is achieved.
Testing Chart of the Software
Perfective maintenance: This is the maintenance is for fine tuning the system or enhancing
the processing capabilities of the system. This is different from what we have discussed in the
earlier point because in the previous point, software was changed due to changes in
technology while here, the technology may not have changed, but the software is changed to
make it more efficient and effective.
Preventive maintenance: This type of maintenance is on going and is not triggered by any
problem but by the passage of time. It is supposed to be done to prevent problems from
occurring.