Gym Management System: A Synopsis On
Gym Management System: A Synopsis On
SYNOPSIS ON
1
Chapter:1
INTRODUCTION
2
INTRODUCTION
A gym which predominately or exclusively consists of free weights (dumbbells and barbells),
as opposed to exercise machines, is sometimes referred to as a black-iron gym, after the
traditional color of weight plates.
Cardio area/Theatre
A cardio theater or cardio area includes many types of cardiovascular training-related equipment
such as rowing machines, stationary exercise bikes, elliptical trainers and treadmills. These areas
often include a number of audio-visual displays (either integrated into the equipment, or placed
on walls around the area itself) in order to keep exercisers entertained during long cardio
workout sessions.
3
Group exercise classes
Most newer health clubs offer group exercise classes that are conducted by qualified fitness
instructors. Many types of group exercise classes exist, but generally these include classes based
on aerobics, cycling (spin cycle), boxing, high intensity training, regular and hot (Bikram)
yoga, pilates and muscle training. Health clubs with swimming pools often offer aqua
aerobics classes.
Sports facilities
Some health clubs offer sports facilities such as a swimming pools, squash courts or boxing
areas. In some cases, additional fees are charged for the use of these facilities.
Personal training
Most health clubs employ personal trainers who are accessible to members for
training/fitness/nutrition/health advice and consultation. Personal trainers can devise a
customized fitness routine, sometimes including a nutrition plan, to help clients achieve their
goals. They can also monitor and train with members. More often than not, access to personal
trainers involves an additional hourly fee.
Other services
Newer health clubs generally include health-shops, snack bars, restaurants, child-care facilities,
member lounges and cafes. It is not unusual for a sauna, steam shower, or wellness areas to be
present. Health clubs generally charge a fee to allow visitors to use the equipment, courses, and
other provided services.
Costs can be altered through the purchase of a higher-level membership, such as a Founders
or a Life membership. Such memberships often have a high up-front cost but a lower monthly
4
rate, which are most likely to be beneficial to those who use the club frequently and hold their
memberships for years.
5
1.3MAJOR PLAYERS IN INDIAN HEALTH CLUB INDUSTRY
GOLD GYM
Today, Gold’s Gym has over 680 facilities. It is the largest international gym chain in the world
recognized for its passion, unique heritage, and experience as the final authority in fitness and
lifestyle.
The India chapter of Gold’s Gym started in 2002, when the first Gold’s Gym India branch was
set up at Nepean Sea Road, Mumbai. In the next few years this number grew, and today Gold’s
Gym has cut out for itself 18 gym facilities in various cities of the country in Mumbai – at
Nepean Sea Road, Bandra, Worli, Santacruz, Andheri, Chembur, Mulund and Vashi and outside
Mumbai at Chennai, Ahmedabad, Baroda, Surat, Bangalore, Pune, Noida, Ludhiana, Kolkata,
Jaipur, Jalandhar and outside India in Dhaka, Bangladesh.
Gold’s Gym India has slowly and steadily carved its name in the Indian market and built a
reputation to reckon with
FITNESS FIRST
Fitness First Gym & Health Club started as a single health and fitness club in Bournemouth, UK
in 1992.
Since then, it has grown quite a bit - we're now the largest gym, health and fitness club group in
the world with more than 1.5 million Fitness First members in over 550 clubs worldwide. In
Asia Pacific alone, we have over 140 clubs! But we still keep that Fitness First one-health club
mentality - every single Fitness First member counts.
It has a motto at Fitness First that sets us apart – Real People, Real Results. We're proud to say
that more people achieve their health and fitness goals with Fitness First than at any other fitness
club!
As the fastest growing fitness chain club, it will continue to deliver on its promise of
guaranteedvalue and its aim is to help you achieve your fitness goals - a simple formula with a
proven trackrecord of success!18 countries, over 500 clubs, 1.4 million members and growing
worldwide.
6
POWERHOUSE GYM
Powerhouse gym India is brought to you by Q’s Fitness Studio. Q’s Fitness Studio was started in
the year 1999. It was in the year 2005 when Q’s Fitness Studio brought Powerhouse Gym to
India. Powerhouse Gym had a launch of its Indian operation on 26th November 2005 with state
of art 6000 sq ft area facility at Concorde Co-op Housing Society, Ns Road No 10, Juhu.
Two existing braches running under Q’s Fitness Studio are now called Powerhouse Gym.
Powerhouse Gym India is a Ltd Company concern of Powerhouse Fitness Ltd, the
chairperson ,Ashok Gupta who has a Master Franchisee for SAARC Countries (India, Nepal,
Bhutan, Pakistan, Bangladesh, Srilanka and Maldives).Powerhouse Gym India has state of art
facilities, be it equipments, technology and fitness programs that are required to get the desired
results for the members.
TALWALKAR’S
Established in 1932, Talwalkar’s Better Value Pvt Ltd (TBVF), commonly famous
asTalwalkar’s, is India's largest chain of health centres. It has 45 ultramodern branches
acrossmajor cities in the country, with 50,000 members.
Talwalkar’s' phenomenal growth can be attributed directly to the trust our customers have in
us,and the benefits they derive from our expert advice, personalized supervision, on-going
facilityupgrades, result-oriented approach, and above all from Talwalkar’s' immense know-how
andexperience in this field over 75 years of existence.
Talwalkar’s was founded by the late V.R.Talwalkar in 1932, as a single one-room facility in
Citylight, Mumbai. Son Madhukar Talwalkar’s gave the business a new direction by imparting
ascientific, disciplined and customer-friendly perspective to the fitness and health regimes
offeredat the gyms. Today, Talwalkar’s gyms are perceived not as a meeting place for
boisterousbodybuilders, but as a health centre where customer health priorities are managed
withsensitivity and care. The user-friendly environs and world-class facilities make the
Talwalkar’s'experience wholesome and encouraging.
7
CELEBRITY FITNESS
Celebrity Fitness was founded by John Franklin in 2003, and commenced operations in
February 2004 with the opening of Jakarta's groundbreaking EX club. The Celebrity
Fitness name was chosen for a reason: it is meant to convey each member can exercise as if they
are a celebrity as the clubs are designed with Hollywood and Beverly Hills' standards in mind, to
pamper and give first quality service to our members. Staying true to the entertainment
ambiance, Celebrity Fitness' venues are exclusive malls so that members can conveniently
shop, dine-in and go to the cinema after working out in the gym.
1.4Gym Equipment
Aerobic Machines
Aerobic machines work your cardiovascular system. Aerobic exercise is continuous exercise
performed for longer periods (20 minutes or more) at low to moderate levels of intensity. Gym
equipment normally available for aerobic exercise includes stair climbers, elliptical trainers,
treadmills, rowers and stationary bicycles. Most also contain software that includes pre-
programmed routines so that you don't have to calculate mathematical problems in your head to
gauge calories burned or effort. Enter your weight, program option, time to exercise and the
equipment's software does the rest. From its display you'll see statistics appear with everything
from heart rate to power output in watts. Which equipment you should choose depends on your
personal assessment and your goals. Here's a brief overview of each.
8
Stair Climber - the stair climber recreates the act of climbing a series of stairs using two block-
like pedals attached to a frame. Using the computer, you're able to adjust the resistance.
Predominately the lower body muscles are worked, including quadriceps (front of thighs),
hamstrings (back of thighs), gluteal muscles (buttocks), hip flexors, and calves. The stair climber
provides a low impact, safe form of aerobic exercise for the heart and legs.
Elliptical Trainer - The elliptical trainer may have apparatus for an upper body workout in
addition to the lower body workout. The part of the elliptical trainer that works the lower body
uses two foot pads that move along a short elliptical path, back and forth. The motion feels like
cross country skiing. Using the computer's program, you can adjust the amount of incline as well
as the amount of resistance. The elliptical trainer has a very low impact on the knees and joints.
If you're deciding whether to use this trainer or the treadmill, the elliptical is a better choice for
older individuals or those with injuries. The lower body muscles worked include all of the leg
muscles as well as the gluteal muscles. Elliptical devices that work the upper body as well
provide a total body workout.
Treadmill - The treadmill hasn't changed from it's original design allowing a person to walk, jog
or run continuously on a moving belt. Over the years more software and durability have been
built into the treadmill making it a standard piece of exercise equipment found in a gym. Like the
elliptical trainer, the treamill's resistance and incline can be adjusted. Running on a treadmill
offers a cushioned surface and provides less impact than running on concrete or asphalt.
However, the treadmill is more stressful to the knees and joints than the other aerobic equipment
mentioned here.
Rower - There are a few different designs of rowing machines on the market. Each machine
utilizes a motion similar to rowing a boat but varies when it comes to how the resistance is
applied and how much software is included. Rowing is extremely low impact and if the person
using it works the legs with a push, then both the upper and lower body get a good workout.
Stationary Bicycle - if you haven't ever exercised or it's been a long time since you have, then
the stationary bike is where you need to start. This very low impact machine provides all types of
feedback, including heart rate monitors on the newer models. There are two types of stationary
bikes --upright and recumbent. The upright style will feel like a traditional bicycle and place the
body in an upright posture. The recumbent bike will place the body in more of a sitting position.
If you're a multi-tasker and want to read while you're exercising, then the stationary bike is the
way to go. Body movement is kept to a minimum and the eyes can focus on book's pages.
Among athletes, there's a never-ending discussion over whether machines are better than free
weights or if the opposite is true. One thing we know for sure, there are benefits to each training
method and pros and cons of each. The following are points made about each:
9
Exercise machines ensure correct movement when muscles become fatigued.
Exercise machines can change the amount of resistance easily.
If you have an injury, exercise machines help stabilize the body.
There are a few machines that fall into a gray area between the two groups. The Smith machine
is one example. The Smith machine uses a barbell with hooks attached to a frame that removes
the need for a spotter, as horizontal movement is prevented by the frame. This allows the person
to concentrate on vertical movement of the squat exercise. Free weights are loaded onto the
barbell for increased resistance. Thus, the Smith machine is a machine that uses free weights.
The leg press is another example of the hybrid.
10
Home gym exercise equipment is something a little more easy to use and compact enough that
you can stow it away in your closet after two hours of working out. Convenience is all about the
home gym exercise equipment, especially if they are the shy type who could not stand to flaunt
themselves in public, even in a gym. They can be as attractive to look at like their commercial
counterparts, but with a price tag that is a bit easy on the pocket. They require little effort when
adjusting the setting to get out its maximum exercise performance.
A first-timer can acquire and use the home exercise equipment without too much flub. But as he
or she gains experience, and not to mention a greater body, they go for more body specific
machines that will bring out the best in (and out of) them. All they have to do is to draw a layout
of his or her personalized body building program from books and go from there.
Know your self, as well as your body. Whether you purchased it in a store, or holding a gleaming
member's card, gym exercise equipment is the next best thing since the home-made dumbbells
and barbells out of cement on a pair of large milk cans and a metal water pipe.
Chapter:2
11
Objectives of The Project
12
The main objectives of Gym Management are:
Budget Management
The budget of a exercise department is subjective--classes are usually included in
the price of membership and can go a long way in winning new members and retaining them.
The Budget management makes sure the gym is making a profit each month.
Department Management
Gyms are divided into several departments, which are overseen by the Department
management. Departments include membership, front desk, personal training, group
exercise, housekeeping, facilities and massage. Some gyms have more departments, such
as those with on-site cafes or in-house salons. The Department management holds
frequent one-on-one meetings with department directors as well as meetings with all
departments present. The Management’s principal duty is to listen to departmental needs
and concerns and put them in balance with those of the club.
Member Communications
Management between the club and its members in important communication
matters. Even though the membership, front desk and fitness departments play crucial
roles in developing relationships with members, it’s the good management who takes the
ultimate responsibility
Facility Upkeep
Fitness club managers oversee every aspect of a club, including the daily cleanliness of the
front desk, locker rooms, fitness floor and pool area. Management are also responsible for
supervising the maintenance of current equipment and ordering new equipment.
Gym Objectives
Main objective of our project is provide the better fitness and gain proper profit by the
good management. Management sees all aspects of the gym and is in a position to set
short- and long-term objectives, which are essentially goals
Chapter:3
13
Project Category(RDBMS)
The main objectives of using Relational Database Management System are as follows: -
1. CONTROL REDUNDANCY
14
The System should identify existence of common data and avoid duplicate recording
relationships of pointers should be used to locate data which are used many times selective
redundancy is sometimes allowed to improve performance or far better reliability.
2. DATA INTEGRITY
Consistency of data values and relationships must be preserved in order to achieve this
the system must ensure validity of data by using good editing, synchronize updating and
propagating changes to other related data element it also involves maintaining audit trails to
enable recovery if errors are deleted.
3. DATA SECURITY
This is concerned with protecting access to data protection is needed at many levels for
access, modification, deletion or display access restriction may be for individual data items or
group of items.
4. DATABASE PERFORMANCE
The system should be able to provide timely information as required. The cost of storing
and retrieving the data should be commensurate with the value of information provided.
5. MANAGEMENT CONTROL
As the dependence of an organization on a data base increases positive management
controls should be exercised over addition, deletion, changes and disposition of data must be
protected to start legal accounting and auditing requirements.
Chapter:4
15
SYSTEM ANALYSIS
SYSTEM ANALYSIS
16
System Analysis by definition is a process of systematic investigation for the purpose of
gathering data, interpreting the facts, diagnosing the problem and using this information to either
build a completely new system or to recommend the improvements to the existing system.
A satisfactory system analysis involves the process of examining a business situation with the
intent of improving it through better methods and procedures. In its core sense, the analysis
phase defines the requirements of the system and the problems which user is trying to solve
Structured Analysis is an analysis method that provides a basis for developing a model of
17
1 Data Dictionary
1 Process Specification
1 Control Specification
It refers to a detailed study of the various objects involved in a system and the relationship of
these objects with each other. While performing an object oriented analysis, the focus of the
system analyst is on the availability of the objects that are relevant to software development.
First and foremost we have to identify the need for development of such a System for India
Today.
18
4.3Software Engineering Paradigm
The basic objective of software engineering is to: develop methods and procedures for software
development that can scale up for large systems and that can be used to consistently produce
high quality software at low cost and with a small cycle time. That is, the key objectives are
consistency, low cost, high quality, small cycle time, and scalability.
The basic approach that software engineering takes is to separate the development process from
the software. The premise is that the development process controls the quality, scalability,
consistency, and productivity. Hence to satisfy the objectives, one must focus on the
development process. Design of proper development process and their control is the primary goal
of the software engineering. It is this focus on the process that distinguishes it from most other
computing disciplines. Most other computing disciplines focus on some type of the product-
algorithms, operating systems, databases etc. while software engineering focuses on the process
for producing products.
To better manage the development process and to achieve consistency, it is essential that the
software development be done in phases.
4.3.1 Different Phases Of The Development Process:
1) Requirement Analysis:
Requirement analysis is done in order to understand the problem the software system is to
solve. The problem could be automating an existing manual process, developing a new
automated system, or a combination of the two. The emphasis in requirements analysis is on
identifying what is needed from the system, not how the system will achieve its goals. There are
atleast two parties involved in the software development-a client and a developer. The developer
has to develop the system to satisfy the client’s needs. The developer does not understand the
client’s problem domain, and the client does not understand the issues involved in the software
19
systems. This causes a communication gap, which has to be adequately bridged during
requirements analysis.
2) Software Design:
The purpose of the design phase is to plan a solution of the problem specified by the
requirements documents. This phase is the first step in moving from the problem domain to the
solution domain. Starting with what is needed, design takes us toward how to satisfy the needs.
The design of a system is perhaps the most critical factor affecting the quality of the software. It
has a major impact on the later phases, particularly testing and maintenance.
The design activity is divided into two phases: System Design and Detailed Design. In
system design the focus is on identifying the modules, whereas during detailed design the focus
is on designing the logic for each of the modules.
3) Coding:
The goal of the coding phase is to translate the design of the system into code in a given
programming language. Hence during coding, the focus should be on developing programs that
are easy to read and understand, and not simply on developing programs that are easy to write.
4) Testing:
Testing is the major quality control measure used during software development. Its
basic function is to detect errors in the software. Testing not only uncover errors introduced
during coding, but also errors introduced during the previous phases. Thus, the goal of the testing
is to uncover requirement, design and coding errors in the programs.
Therefore, different levels of testing are used. Testing is an extremely critical and time
consuming activity. It requires proper planning of the overall testing process. The output of the
testing phase is the test report and the error report. Test report contains the set of test cases and
20
the result of executing the code with these test cases. The error report describes the errors
encountered and the action taken to remove the errors.
21
Chapter:5
FEASIBILITY STUDY
22
FEASIBILITY STUDY
A feasibility study determines whether the proposed solution is feasible based on the
report that recommends a solution. It helps you to evaluate the cost-effectiveness of a proposed
system.
The feasibility study is carried out to test if the proposed system is worth being
implemented. Given unlimited resources and infinite time, all projects are feasible.
After performing a Preliminary Investigation, gathering and interpreting data and details
concerning the project, a Feasibility Check is done which involves a series of steps to check the
During this phase, various solutions to the existing problems were examined.
For each of these solutions the Cost and Benefits were the major criteria to be examined before
a) A clear cut description of what tasks will be done manually and what needs to be
23
A system that passes the feasibility tests is considered a feasible system. Let us see some
It is related to the software and equipment specified in the design for implementing a new
system. Technical feasibility is a study of function, performance and constraints that may affect
the ability to achieve an acceptable system. During technical analysis, the analyst evaluates the
technical merits of the system, at the same time collecting additional information about
The main technical issue raised during feasibility is the existence of necessary technology
and whether the proposed equipment has the capacity to hold required data. The technical
Assessing System Performance: It involves ensuring that the system responds to user queries
and is efficient, reliable, accurate and easy to use. Since we have the excellent network setup
which is supported and excellent configuration of servers with 80 GB hard disk and 512 MB
After the conducting the technical analysis we found that our project fulfills all the technical
pre-requisites, the network environments if necessary are also adaptable according to the
project and
24
5.2 ECONOMIC FEASIBILITY
This feasibility has great importance as it can outweigh other feasibilities because costs
affect organization decisions. The concept of Economic Feasibility deals with the fact that a
system that can be developed and will be used on installation must be profitable for the
Organization. The cost to conduct a full system investigation, the cost of hardware and software,
the benefits in the form of reduced expenditure are all discussed during the economic feasibility.
Return on Investment
database.
iv. There will be awareness among not only the Subscribers ,but
downgrades.
Cost of No Change
The cost will be in terms of utilization of resources leading to the cost to the
company. Since our cost of project is our efforts, which is obviously less than the
25
COST- BENEFIT ANALYSIS
objective of the cost benefit analysis is to find out whether it is economically worthwhile to
invest in the project. If the returns on the investment are good, then the project is considered
economically worthwhile. Cost benefit analysis is performed by first listing all the costs
associated with the project cost which consists of both direct costs and indirect costs. Direct
costs are those incurred by buying software, hiring people, cost of consumable items , rent for
accommodation etc. Indirect costs include those involving time spent by user in discussing
Operation feasibility is a measure of how people feel about the system. Operational Feasibility
criteria measure the urgency of the problem or the acceptability of a solution. Operational
Feasibility is dependent upon determining human resources for the project. It refers to projecting
1. If the ultimate users are comfortable with the present system and they see no problem
Behaviorally also the proposed system is feasible. A particular application may be technically
and but may fail to produce the forecasted benefits, because the company is not able to get it to
work. For the system, it is not necessary that the user must be a computer expert, but any
computer operator given a little bit of knowledge and training can easily operate.
26
Our Project is operationally feasible since there is no need for special training of staff member
and whatever little instructing on this system is required can be done so quite easily and quickly
as it is essentially This project is being developed keeping in mind the general people who one
have very little knowledge of computer operation, but can easily access their required
database and other related information. The redundancies can be decreased to a large extent as
27
28
Chapter:6
SOFTWARE/HARDWARE SPECIFICATION
29
SOFTWARE/HARDWARE SPECIFICATION
1 20 GB HDD
1 40 GB Server HDD
6 SQL Server
6 Asp.Net with C#
30
6.3SOFTWARE USED
Visual Studio is a complete suite of tools for building both desktop and team-based Enterprise
Web applications. In addition to building high-performing desktop applications, you can use
Visual Studio's powerful component-based development tools and other technologies to simplify
team-based design, development, and deployment of Enterprise solutions.
Visual Studio .NET is a complete set of development tools for building ASP Web applications,
XML Web services, desktop applications, and mobile applications. Visual Basic .NET, Visual
C++ .NET, and Visual C# .NET all use the same integrated development environment (IDE),
which allows them to share tools and facilitates in the creation of mixed-language solutions. In
addition, these languages leverage the functionality of the .NET Framework, which provides
access to key technologies that simplify the development of ASP Web applications and XML
Web services.
Some of the latest features available in the Visual Studio .NET are:
Language Enhancements
Microsoft Visual Basic, Microsoft C++, and Microsoft JScript have all been updated to meet
your development needs. Additionally, a new language, Microsoft C#, has been introduced.
These languages leverage the functionality of the .NET Framework, which provides access to
key technologies that simplify the development of ASP Web applications and XML Web
services
The .NET Framework is a new computing platform that simplifies application development in
the highly distributed environment of the Internet. The .NET Framework is designed to fulfill the
following objectives:
31
To provide a code-execution environment that eliminates the performance problems of
scripted or interpreted environments.
To make the developer experience consistent across widely varying types of applications,
such as Windows-based applications and Web-based applications.
To build all communication on industry standards to ensure that code based on the .NET
Framework can integrate with any other code.
The .NET Framework has two main components: the common language runtime and the
.NET Framework class library. The common language runtime is the foundation of the .NET
Framework. You can think of the runtime as an agent that manages code at execution time,
providing core services such as memory management, thread management, and remoting, while
also enforcing strict type safety and other forms of code accuracy that ensure security and
robustness. In fact, the concept of code management is a fundamental principle of the runtime.
Code that targets the runtime is known as managed code, while code that does not target the
runtime is known as unmanaged code. The class library, the other main component of the .NET
Framework, is a comprehensive, object-oriented collection of reusable types that you can use to
develop applications ranging from traditional command-line or graphical user interface (GUI)
applications to applications based on the latest innovations provided by ASP.NET, such as Web
Forms and XML Web services.
The .NET Framework can be hosted by unmanaged components that load the common language
runtime into their processes and initiate the execution of managed code, thereby creating a
software environment that can exploit both managed and unmanaged features. The .NET
Framework not only provides several runtime hosts, but also supports the development of third-
party runtime hosts.
The common language runtime manages memory, thread execution, code execution, code safety
verification, compilation, and other system services. These features are intrinsic to the managed
code that runs on the common language runtime.
With regards to security, managed components are awarded varying degrees of trust, depending
on a number of factors that include their origin (such as the Internet, enterprise network, or local
computer). This means that a managed component might or might not be able to perform file-
access operations, registry-access operations, or other sensitive functions, even if it is being used
in the same active application.
The runtime also enforces code robustness by implementing a strict type- and code-verification
infrastructure called the common type system (CTS). The CTS ensures that all managed code is
self-describing. The various Microsoft and third-party language compilers generate managed
code that conforms to the CTS. This means that managed code can consume other managed
types and instances, while strictly enforcing type fidelity and type safety.
In addition, the managed environment of the runtime eliminates many common software issues.
For example, the runtime automatically handles object layout and manages references to objects,
32
releasing them when they are no longer being used. This automatic memory management
resolves the two most common application errors, memory leaks and invalid memory references.
The runtime also accelerates developer productivity. For example, programmers can write
applications in their development language of choice, yet take full advantage of the runtime, the
class library, and components written in other languages by other developers. Any compiler
vendor who chooses to target the runtime can do so. Language compilers that target the .NET
Framework make the features of the .NET Framework available to existing code written in that
language, greatly easing the migration process for existing applications.
The .NET Framework class library is a collection of reusable types that tightly integrate with
the common language runtime. The class library is object oriented, providing types from which
your own managed code can derive functionality. This not only makes the .NET Framework
types easy to use, but also reduces the time associated with learning new features of the .NET
Framework. In addition, third-party components can integrate seamlessly with classes in the
.NET Framework.
For example, the .NET Framework collection classes implement a set of interfaces that you
can use to develop your own collection classes. Your collection classes will blend seamlessly
with the classes in the .NET Framework.
As you would expect from an object-oriented class library, the .NET Framework types enable
you to accomplish a range of common programming tasks, including tasks such as string
management, data collection, database connectivity, and file access. In addition to these common
tasks, the class library includes types that support a variety of specialized development scenarios.
For example, you can use the .NET Framework to develop the following types of applications
and services:
Console applications.
Scripted or hosted applications.
Windows GUI applications (Windows Forms).
ASP.NET applications.
XML Web services.
Windows services.
For example, the Windows Forms classes are a comprehensive set of reusable types that vastly
simplify Windows GUI development. If you write an ASP.NET Web Form application, you can
use the Web Forms classes.
33
ADO .NET
ADO .NET is extremely flexible and dynamic and you can do anything. A simplified diagram of
ADO .NET objects was given below:
The Active-X data object data control (ADODC) allows the user to create a connection to the
data source. A connection can be established to any type of database whether relational or non-
34
relational, local or remote. It provides an object-oriented programming interface for accessing a
data source using an OLE DB data provider.
The ADO model has three main components: the connection object, the command object, and the
recordset object.
Objects
Connection Object:
The connection object is the highest-level object in the ADO object model. It is used to make a
connection between your application and an external data source, here Microsoft Sql server.
Command Object:
The command object is used to build queries, including user-specific parameters, in order to
access records from a data source. Typically, these records are returned in a recordset object.
Recordset Object:
The recordset object is used to access records returned from a SQL query. Using this object, you
can navigate through the records returned, modify the existing record, add new record or delete
specific records.
The main benefit of this, and one of the greatest innovations of ADO .NET, is that once you
build a DataSet in your project, you can process it in about the same way no matter what the
original source of the data was. It doesn't really matter to your program where the data came
from. The DataAdapter objects provide the unique capability that different sources of data
require but they all create the same DataSet object.
A key advantage is that this means ADO .NET works great with muli-tiered ('client/server' or
'client/middleware/server') systems -- such as the Internet! After a DataSet is created, your
program can disconnect from the actual physical source of the data (the database) and only needs
to reconnect once either a change or more data is needed. A DataSet can be thought of as being
like a custom database just for your program. There are tables, columns, relationships,
constraints, views, and so forth. Changes to the 'real' database are communicated using messages
(that is, SQL commands in our case) and this further isolates your program from changes,
differences, or even problems (such as the database being taken offline) to the 'real' database.
C#.NET
35
Design Goal
Features
C# is the programming language that most directly reflects the underlying Common
Language Infrastructure (CLI). Most of its intrinsic types correspond to value-types
implemented by the CLI framework. However, the language specification does not state the
code generation requirements of the compiler: that is, it does not state that a C# compiler
must target a Common Language Runtime, or generate Common Intermediate Language
(CIL), or generate any other specific format. Theoretically, a C# compiler could generate
machine code like traditional compilers of C++ or Fortran.
There are no global variables or functions. All methods and members must be declared
within classes. Static members of public classes can substitute for global variables and
functions.
36
Local variables cannot shadow variables of the enclosing block, unlike C and C++.
Variable shadowing is often considered confusing by C++ texts.
C# supports a strict Boolean datatype, bool. Statements that take conditions, such as
while and if, require an expression of a type that implements the true operator, such as the
boolean type. While C++ also has a boolean type, it can be freely converted to and from
integers, and expressions such as if(a) require only that a is convertible to bool, allowing
a to be an int, or a pointer. C# disallows this "integer meaning true or false" approach on
the grounds that forcing programmers to use expressions that return exactly bool can
prevent certain types of common programming mistakes in C or C++ such as if (a = b)
(use of assignment = instead of equality ==).
In C#, memory address pointers can only be used within blocks specifically marked as
unsafe, and programs with unsafe code need appropriate permissions to run. Most object
access is done through safe object references, which always either point to a "live" object
or have the well-defined null value; it is impossible to obtain a reference to a "dead"
object (one which has been garbage collected), or to a random block of memory. An
unsafe pointer can point to an instance of a value-type, array, string, or a block of
memory allocated on a stack. Code that is not marked as unsafe can still store and
manipulate pointers through the System.IntPtr type, but it cannot dereference them.
Managed memory cannot be explicitly freed; instead, it is automatically garbage
collected. Garbage collection addresses the problem of memory leaks by freeing the
programmer of responsibility for releasing memory which is no longer needed.
In addition to the try...catch construct to handle exceptions, C# has a try...finally
construct to guarantee execution of the code in the finally block.
Multiple inheritance is not supported, although a class can implement any number of
interfaces. This was a design decision by the language's lead architect to avoid
complication and simplify architectural requirements throughout CLI.
C# is more type safe than C++. The only implicit conversions by default are those which
are considered safe, such as widening of integers. This is enforced at compile-time,
during JIT, and, in some cases, at runtime. There are no implicit conversions between
booleans and integers, nor between enumeration members and integers (except for literal
0, which can be implicitly converted to any enumerated type). Any user-defined
conversion must be explicitly marked as explicit or implicit, unlike C++ copy
constructors and conversion operators, which are both implicit by default.
Enumeration members are placed in their own scope.
37
C# provides properties as syntactic sugar for a common pattern in which a pair of
methods, accessor (getter) and mutator (setter) encapsulate operations on a single
attribute of a class.
Full type reflection and discovery is available.
C# currently (as of version 4.0) has 77 reserved words.
Checked exceptions are not present in C# (in contrast to Java). This has been a conscious
decision based on the issues of scalability and versionability.
C# has a unified type system. This unified type system is called Common Type System
(CTS).
A unified type system implies that all types, including primitives such as integers, are
subclasses of the System.Object class. For example, every type inherits a ToString() method.
For performance reasons, primitive types (and value types in general) are internally allocated
on the stack.
Categories of datatypes
Value types
Reference types
Value types are plain aggregations of data. Instances of value types do not have referential
identity nor a referential comparison semantics - equality and inequality comparisons for
value types compare the actual data values within the instances, unless the corresponding
operators are overloaded. Value types are derived from System.ValueType, always have a
default value, and can always be created and copied. Some other limitations on value types
are that they cannot derive from each other (but can implement interfaces) and cannot have
an explicit default (parameterless) constructor. Examples of value types are some primitive
types, such as int (a signed 32-bit integer), float (a 32-bit IEEE floating-point number), char
(a 16-bit Unicode code unit), and System.DateTime (identifies a specific point in time with
nanosecond precision). Other examples are enum (enumerations) and struct (user defined
structures).
38
In contrast, reference types have the notion of referential identity - each instance of a
reference type is inherently distinct from every other instance, even if the data within both
instances is the same. This is reflected in default equality and inequality comparisons for
reference types, which test for referential rather than structural equality, unless the
corresponding operators are overloaded (such as the case for System.String). In general, it is
not always possible to create an instance of a reference type, nor to copy an existing instance,
or perform a value comparison on two existing instances, though specific reference types can
provide such services by exposing a public constructor or implementing a corresponding
interface (such as ICloneable or IComparable). Examples of reference types are object (the
ultimate base class for all other C# classes), System.String (a string of Unicode characters),
and System.Array (a base class for all C# arrays).
Boxing is the operation of converting a value of a value type into a value of a corresponding
reference type. Boxing in C# is implicit.
Unboxing is the operation of converting a value of a reference type (previously boxed) into a
value of a value type. Unboxing in C# requires an explicit type cast. A boxed object of type T
can only be unboxed to a T (or a nullable T).
Implementation
The reference C# compiler is Microsoft Visual C#.
39
the Microsoft proprietary .NET class libraries up to .NET 3.5. As of Mono 2.6, there are no
plans to implement WPF; WF is planned for a later release; and there are only partial
implementations of LINQ to SQL and WCF.
The DotGNU project also provides an open source C# compiler, a nearly complete
implementation of the Common Language Infrastructure including the required framework
libraries as they appear in the ECMA specification, and subset of some of the remaining
Microsoft proprietary .NET class libraries up to .NET 2.0 (those not documented or included
in the ECMA specification but included in Microsoft's standard .NET Framework
distribution).
The DotNetAnywhere Micro Framework-like Common Language Runtime is targeted at
embedded systems, and supports almost all C# 2.0 specifications. It is licensed under the
MIT license conditions, is implemented in C and directed towards embedded devices.
Unity 3D uses C# as a scripting language as an alternative to JavaScript
The SQL Server is an industry leading database system designed for mission critical data
storage and retrieval. The RDBMS is responsible for accurately storing data and efficiently
Its Popularity is owned to a number of factors like its ability to support dozens to thousands
of simultaneous users, its ability to handle high transaction rates and its ability to access
databases that ranges in size from several hundred megabytes to many gigabytes.
The Oracle Corporation also supplies interface tools to access data stored in an Oracle
database. Two of these tools are known as SQL*Plus, a command line interface, and Developer
6i (now called simply Developer), a collection of forms, reports and graphic interfaces. This
40
technical working paper introduces the features of the SQL*Plus tool and provides a tutorial that
Developing applications using an Oracle database requires access to a copy of the Oracle
RDBMS (or a central Oracle RDBMS server), and one or more of the development tools.
RDBMS server running on a server machine. Distributed client PCs can develop the applications
Regardless of the development environment used, the Oracle SQL*Plus utility is a convenient
and capable tool for manipulating data in an Oracle database. In the following section, the
SQL*Plus commands allow a user to manipulate and submit SQL statements. Specifically,
1 Format, perform calculations, store, and print query results in the form of reports
41
There are many features of SQL Server
combination of privileges.
1 Backup and Recovery: SQL Server provides sophisticated security backup and recovery
routines.
1 Open connectivity: SQL Server provides open connectivity to and from other vendor’s
1 Also SQL Server database can be accessed by various front-end software’s such as
Visual Basic, C
1 Space Management: In SQL Server one can flexibly allocate disk spaces for data
1 (OLTP) systems are usually concerned with entering and retrieving mission-critical data
1 Availability, reliability, and performance are extremely important for these systems.
delivers
serviceability,
42
2 Import/export support is provided for domain indexes. Indexes (including domain
indexes) are exported by exporting the index definitions, namely the DELETE INDEX
statements.
3 Because domain index data stored in database objects, such as tables, is exported, there is
43
Chapter:7
TESTING
44
TESTING (TESTING TECHNIQUES AND TESTING STRATEGIES)
All software intended for public consumption should receive some level of testing. Without
testing , you have no assurance that software will behave as expected. The results in public
environment can be truly embarrassing.
Testing is a critical element of software quality assurance and represents the ultimate review of
specification, designing, and coding. Testing is done throughout the system development at
various stages. If this is not done, then the poorly tested system can fail after installation. Testing
is a very important part of SDLC and takes approximately 50%of the time.
The first step in testing is developing a test plan based on the product requirements. The test plan
is usually a formal document that ensures that the product meets the following standards:
1 Is thoroughly Tested- Untested code adds an unknown element to the product and
increases the risk of product failure
1 Meets product requirements- To meet customer needs, the product must provide the
features and behavior described in the product specification.
1 Does not contain defects- Features must work within established quality standards and
those standards should be clearly stated within the test plan.
45
Testing Techniques
7.1 Black box Testing: aims to test a given program’s behavior against its specification or
component without making any reference to the internal structures of the program or the
algorithms used. Therefore the source code is not needed, and so even purchased modules can be
tested. We study the system by examining its inputs and related outputs. The key is to devise
inputs that have a higher likelihood of causing outputs that reveal the presence of defects. We
use experience and knowledge of the domain to identify such test cases. Failing this a systematic
approach may be necessary. Equivalence partitioning is where the input to a program falls into a
number of classes. e.g. positive numbers vs. negative numbers. Programs normally behave the
same way for each member of a class. Partitions exist for both input and output. Partitions may
be discrete or overlap. Invalid data (i.e. outside the normal partitions) is one for which partitions
should be tested. Test cases are chosen to exercise each portion. Also test boundary cases
(atypical, extreme, zero) should be considered since these frequently show up defects. For
completeness, test all combinations of partitions. Black box testing is rarely exhaustive (because
one doesn't test every value in an equivalence partition) and sometimes fails to reveal corruption
defects caused by weird combination of inputs. Black box testing should not be used to try and
reveal corruption defects caused, Example, by assigning a pointer to point to an object of the
wrong type. Static inspection (or using a better programming language) is preferred.
46
7.2 White box Testing: was used as an important primary testing approach. Code is tested using
code scripts, drivers, stubs, etc. which are employed to directly interface with it and drive the
code. The tester can analyze the code and use the knowledge about the structure of a component
to derive test data. This testing is based on the knowledge of structure of component (e.g. by
looking at source code). The advantage is that structure of code can be used to find out how
many test cases needed to be performed. Knowledge of the algorithm (examination of the code)
can be used to identify the equivalence partitions. Path testing is where the tester aims to exercise
every independent execution path through the component. All conditional statements tested for
both true and false cases. If a unit has n control statements, there will be up to 2n possible paths
through it. This demonstrates that it is much easier to test small program units than large ones.
Flow graphs are a pictorial representation of the paths of control through a program (ignoring
assignments, procedure calls and I/O statements). We use a flow graph to design test cases that
execute each path. Static tools may be used to make this easier in programs that have a complex
branching structure. Dynamic program analyzers instrument a program with additional code.
Typically this will count how many times each statement is executed. At end, print out report
Possible methods:
1 Usual method is to ensure that every line of code is executed at least once.
1 Test capabilities rather than components (e.g. concentrate on tests for data loss over ones
1 Test old in preference to new (users less affected by failure of new capabilities).
1 Test typical cases rather than boundary ones (ensure normal operation works properly).
47
Debugging: Debugging is a cycle of detection, location, repair and test. Debugging is a
hypothesis testing process. When a bug is detected, the tester must form a hypothesis about the
cause and location of the bug. Further examination of the execution of the program (possible
including many returns of it) will usually take place to confirm the hypothesis. If the hypothesis
is demonstrated to be incorrect, a new hypothesis must be formed. Debugging tools that show the
state of the program are useful for this, but inserting print statements is often the only approach.
Experienced debuggers use their knowledge of common and/or obscure bugs to facilitate the
hypothesis testing process. After fixing a bug, the system must be reset to ensure that the fix has
worked and that no other bugs have been introduced. In principle, all tests should be performed
Testing needs to be planned to be cost and time effective. Planning is setting out standards
for tests. Test plans set the context in which individual engineers can place their own work.
1 Constraints.
48
7.4 OVERVIEW OF TESTING STRATEGIES:
A strategy for software testing integrates test case design methods into a well-planned series of
steps that result in the successful construction of software. It provides a road map for the
software developer, the quality assurance organization and the customer- a road map that
describes the steps to be conducted as part of testing, when these steps are planned and then
undertaken, and how much effort, time and resources will be required. Therefore, any testing
strategy must incorporate test planning, test case design, test execution, and resultant data
Large system are usually tested using a mixture of strategies. Different strategies may be needed
49
7.5 Testing Strategies
Global variable) .One places data there and the other retrieves it.
Architectures.
Regression Test Newly Added features do not introduce errors to other features
that are already working.
Load Test (also
called Stress Test) The product continues to work under extreme usage. Test
design limit until system fails (this test particularly important for
distributed systems).
Platform Test The product works on all the target hardware and software
platforms.
50
Top Down Test
Bottom Up Test
to write test drivers for each unit. These are as reusable as the unit
discussed above.
Back To Back Test
51
saving test case results. Then running the second system, also
test a system during the implementation stage in form of small sub steps rather then large
chunks. We have tested each module separately i.e. have completed unit testing first and system
testing was done after combining /linking all different Modules with different menus and
thorough testing was done. Once each lowest level unit has been tested, units are combined with
related units and retested in combination. This proceeds hierarchically bottom-up until the entire
system is tested as a whole. Hence we have used the Top Up approach for testing our system.
1 Acceptance Testing - whole system with real data(involve customer, user , etc)
BetaTesting is acceptance testing with a single client. It is conducted at the developer’s site by a
customer. The software is used in a natural setting with the developer “looking over the
shoulder” of the user and recording errors and usage problems. Conducted in a controlled
environment. usually comes in after the completion of basic design of the program. The project
guide who looks over the program or other knowledgeable officials may make suggestions and
52
give ideas to the designer for further improvement. They also report any minor or major
problems and help in locating them and may further suggest ideas to get rid of them. Naturally a
number of bugs are expected after the completion of a program and are most likely to be known
involves distributing the system to potential customers to use and provide feedback. It is
conducted at one or more customer sites by the end-user of the software. Unlike alpha testing,
the developer is generally not present. Therefore, the beta test is a “live” application of the
software in an environment that cannot be controlled by the developer. The customer records all
problems (real or imagined) that are encountered during beta testing and reports these to the
developer at regular intervals. As a result of problems reported during beta test, software
engineers make modifications and then prepare for release of the software product to the entire
customer base.
In, this project,. This exposes system to situations and errors that might not be anticipated by us.
Chapter:8
53
Future Scope of project
54
Health and fitness has always been a key driver to increasing participation in the India
encouraging people to improve their personal fitness levels through regular visits to health and
fitness facilities including gymnasiums, health clubs and fitness suites.
With the current focus on healthy, active lifestyles and the government’s increasing concern
about inactivity levels and obesity, what are the innovative opportunities to be explored for the
health and fitness industry?
In ‘building fitness for the future’ this seminar will reveal the findings of the first-ever National
Audit of Fitness Consumers, profiling users and identifying future fitness trends. To drive up
participation rates the industry will require professional well trained staff to provide high quality
services. What skills are required and what training opportunities are available to inspire and
motivate staff to be the best?
Find out about the latest health and fitness initiatives and campaigns, partnerships and projects as
well as hearing from national award winners who are leading the way in setting standards for the
future of the fitness industry.
The results of the first-ever National Audit of Fitness Consumers – a profile of more that 1.8
million health and fitness club users have been revealed.
This, the largest survey to date, will have far reaching consequences for health and fitness
operators and local authorities in the future provision of health and fitness services and the
government in tackling national initiatives such as obesity.
Data was collected from some 668 public and private leisure centres, health clubs and fitness
centres giving an insight into fitness participation in the UK. The survey profiled 1.8 million
health and fitness consumers, providing a valuable source of business intelligence for healthclubs
and sport centers.
Managing health and fitness gymnasiums and clubs requires special skills and knowledge across
a broad range of areas. Does the industry have the necessary resources, skills and training
opportunities required to build fitness for the future? Are employees positive about remaining in
the fitness industry? Are they happy with their employers, degree of responsibility, hours of
work, job security, remuneration packages and career development prospects? A recent salaries
55
survey claimed fitness industry wages are rising – is this the case, and is it sufficient to motivate
and retain staff?
With the government now looking towards the active sport and recreation sector to help achieve
its physical activity targets, the industry must make sure it is providing a high quality service
using well trained and professional staff.
56