0% found this document useful (0 votes)
67 views88 pages

My Contact Book

The document describes a contact book application that allows users to store and manage contact information. The application allows users to add new contacts, search for existing contacts, update contact details, and delete contacts from the database. It also generates reports of the contact data and allows exporting reports to PDF. Developing the contact book application provided knowledge about implementing database systems to store user records.

Uploaded by

EEE GreenCorner
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
67 views88 pages

My Contact Book

The document describes a contact book application that allows users to store and manage contact information. The application allows users to add new contacts, search for existing contacts, update contact details, and delete contacts from the database. It also generates reports of the contact data and allows exporting reports to PDF. Developing the contact book application provided knowledge about implementing database systems to store user records.

Uploaded by

EEE GreenCorner
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 88

ABSTRACT

My Contact Book: is primarily meant for keeping the records of the persons. Records consist of their
name, office address, home address, email id, designation, phone numbers etc. In the project most of
the functions are handled.

My Contact Book will provide the basic set of features of adding a new contact, searching, updating,
deleting a contact. It also provides the user to connect to the face book. The project also generates a
report, also export it to pdf. The user can provide its feedback and can also give any suggestions.

By successfully implementing the Contact Book: a substantial knowledge has been acquired
regarding the implementation of the application based database system in order to store the records.

My Contact Book Page 1


5.3 Testing Approach - 84
5.3.1 Unit Testing - 84
TABLE OF CONTENTS
5.3.2 Integrated Testing - 89
5.3.3 System Testing - 90
Page
5.4. Modifications and Improvements - 92
CHAPTER 1: INTRODUCTION -1
CHAPTER 6 : RESULTS AND DISCUSSION -- 1 94
1.1 Background - 1
6.1
1.2 Test Reports
Objectives - 94
1
6.2 User Documentation
1.3 Purpose, Scope and Applicability - 95
1
1.3.1 Purpose - 1
CHAPTER 7 : CONCLUSIONS
1.3.2 Scopes - 106
2
1.3.3 Applicability - 2
7.1
1.4 Conclusion
Achievements - 106
2
7.2
1.5 Limitations
Organizationofofthe System
Report - 106
2
7.3 Future Scope of the Project - 107
CHAPTER 2: SURVEY OF TECHNOLOGIES -3
REFERENCES - 108
CHAPTER 3: REQUIREMENTS AND ANALYSIS -5
GLOSSARY - 109
3.1 Problem Definition - 5
3.2 Requirements Specification - 6
Table of Contents - 6
3.3 Planning and Scheduling - 42
3.3.1 GANTT Chart - 42
3.3.2 PERT Chart - 43
3.4 Software and Hardware Requirements - 44
3.4.1 Hardware Requirements - 44
3.4.2 Software Requirements - 44
3.5 Preliminary Product Description - 44
3.6 Conceptual Models - 46
3.6.1 Module Specifications - 46
3.6.2 Screen Views - 47
3.6.3 E-R Diagram - 48
3.6.4 Data Flow Diagrams - 49

CHAPTER 4 : SYSTEM DESIGN - 52

4.1 Basic Modules - 52


4.2 Data Design - 53
4.2.1 Schema Design - 53
4.2.2 Data Integrity and Constraints - 53
4.3 Procedural Design - 55
4.3.1 Logic Diagrams - 55
4.4. User Interface Design - 58
4.5 Security Issues - 63
4.6 Test Cases Design - 65

CHAPTER 5 : IMPLEMENTATION AND TESTING - 73

5.1 Implementation Approaches - 73


5.2 Coding Details and Code Efficiency - 73
5.2.1 Coding - 73
5.2.2 Code Efficiency - 80

My Contact Book Page 2


TABLE OF FIGURES

Page

3.01 ENTITY-RELATIONSHIP DIAGRAM - 38


3.02 DATA FLOW DIAGRAM - 39
CONTEXT LEVEL DFD 39
DFD LEVEL-1 40
DFD LEVEL-2 41
3.03 GANTT CHART - 42
3.04 PERT CHART - 43
3.05 LOGIN - 45
3.06 LIBRARY MATERIAL DATA PAGE - 45
3.07 LOAN CART - 45
3.08 TRANSACTION PAGE - 46
3.09 LOGIN DATA PAGE - 46
3.10 SCREEN VIEWS - 47
3.11 E-R DIAGRAM - 48
3.12 DATA FLOW DIAGRAMS 49
CONTEXT LEVEL DFD 49
DFD LEVEL-1 50
DFD LEVEL-2 51

-
MEMBER

My Contact Book Page 3


MY CONTACT BOOK

My Contact Book Page 4


1. INTRODUCTION

Complete Contact Book is an application based project. It is designed for people to store the

information about their contacts. Rather than going through the pages of their diaries and copies to

search a person information, a person can simply use this software to view any of his stored contacts.

A user can also add or update or delete the contact information according to his need. Big

Organizations need to have this software in order to keep the records of thousands of his employees

at one place without any paper work. Also registers maintained for this purpose can be left around, or

can be destroyed in any accident, but in software no such problem will occur This software also

provides an option to connect to facebook , it also provides the report , you can also view people

through various groups.

1.1 Background

The project Complete Contact Book provides a person to add its personal information like name ,

company, phone number, designation , etc. to the database. A user can search any other person or can

update or add a new contact onto the software. Also, user can view the report generated or can view

the groups according to a common field.

Project provides a questionnaire and suggestions page for the betterment of the project.

i
1.2Project Objective

For easy and convenient processing we need to develop software which works as per our

requirements. While preparing this software we got to remember few things i.e. this software must

have a friendly environment, in other words it should not be much complicated to handle, it should

have options for future modifications in the society. For smooth functioning, we had to prepare a

database by which we could enter the required data in their respective locations. In this data base all

the records of daily transactions made are stored i.e. Contact Details , so that we can use them in

future whenever needed. From security point of view this software has a special login name and

password allotted to their Administrator. Other than that no one could use this and on entering an

illegal password or login name an error message get displayed.

The major specifications of project are:

 To allow only authorized user to access various function and processed available in

the system.

 Locate any Contact wanted by the user.

 Reduced written work and problem of storing the diaries as most of the work done by

computer.

 Provide greater speed & reduced time consumption

ii
1.3Purpose and Scope

1.3.1. Purpose :

The overall purpose of this project is to develop a Visual Basic .net which will provide an interface

between controls applications written in the VB.net language and the MYSQL Server Management.

One aspect of this work will be to develop a language independent object-oriented model to the

accelerator devices.

Contact Book will have the following key goals:

 Provide an easy interface for user.

 Easy to store records

 No need to remember while storing that on what page we are storing as software will

automatically search the name you enter

 Updation can be done.

 Deletion can also be done when you do not need a contact.

 You can search a contact through his/her name , part of name, or through id.

 You can view group of people according to various options like group of people of same

address or group of people of same company etc.

 Reports can be viewed to show an abstract form of contact book containing all the contacts

together at one place

 Reports can be converted as a pdf file to store as a shortcut, no need to run the software again

and again

 User can automatically connect themselves to social media site

 User can give all suggestions they need and can save their files.

iii
1.3.2. Scope:

The main scope and deliverables of the project would be to:

 Understand and prepare detailed user requirement and specifications

 Prepare high level and detailed design specifications of the system

 Prepare Test Plan & Test cases

 Develop the system and coding

 Perform unit testing, integration testing and system testing

 Demonstrate a bug free application after suitable modification, if needed

1.3.3. Applicability:

The application is to be deployed as a application based program which would be accessible to the

issued people only. Searching of contacts can be done and nothing can be done without entering in

the software as it is password protected.Reports are generated electronically and could be converted

into pdf files for later use and can be kept as a record on client side.

1.4Achievements

By successfully implementing Contact Book , a substantial knowledge has beenacquired on the

implementation of an application based database system. This knowledge will be useful in the future

in creating any type of application or database systems

The objective of Contact Book was the creation of an application based system for the use on a large

scale as well as on a small scale and even for a personal use on the home basis. This system canbe

easily modified to serve the needs of various people and make their life easier.

iv
1.5Organization of Report

This report is organized in seven chapters, as indicated in the Table of Contents. These chapters

deal with the important aspects of the Systems Development Life Cycle. Each of the chapters are

divided into headings and sub-headings. Chapter 1 introduces the project, its background and

purpose. The technologies used in the project and the reason thereof are explained in Chapter 2.

Chapter 3 broadly deals with the requirements, analysis and planning of the project. All the

design aspects have been dealt with in. Chapter 4 including schema design, interface design,

security and test cases. The actual implementation has been discussed in Chapter 5, which

includes coding and testing of the working of the system. Chapter 6 discusses the test report and

project documentation and finally the conclusions have been drawn in Chapter 7. At the end of

the report, the references made and the glossary has been included.

2. Survey of Technologies

In an application based system like Contact Book, there is a scope for a large number of platforms,

languages, web servers and frameworks to choose from. Before selecting from this large array of

technologies the following aspects have been kept in mind:

 Performance

 Reliability

 Portability

 Security

 Performance

 Fast speed

 Cost Constraint

 Time Constraint

v
The project Contact Book could have been built by various technologies like VB.net, C#, C++,

Java.

I chose VB.net as my front end to build this project because

 It is easy to understand

 It is easy to install

 It has a good GUI which makes it very easy to work with.

 MSDN library supports us and give us all the help needed while we come through any errors

or problems.

 I was convenient to work with it.

I didn’t chose others because

 They don’t have GUI which makes it difficult to understand

 No built libraries to solve the problems.

 It was inconvenient to work with them.

To develop this package different types of tools and database are used which are as follows:

 VB.NET 2008

 Framework 4.0

 Microsoft MYSQL Server 2008

 Microsoft Word

VB.NET 2008

vi
Visual Basic .NET (VB.NET) is an object-oriented computer programming language that can be

viewed as an evolution of the classic Visual Basic (VB), implemented on the .NET Framework.

Microsoft currently supplies two main editions of IDEs for developing in Visual Basic: Microsoft

Visual Studio 2012, which is commercial software and Visual Basic Express Edition 2012, which

is free of charge. The command-line compiler, VBC.EXE, is installed as part of the freeware .NET

Framework SDK. Mono also includes a command-line VB.NET compiler.

Advantages of VB.NET

1. First of all, VB.NET provides managed code execution that runs under the Common

Language Runtime (CLR), resulting in robust, stable and secure applications. All features of

the .NET framework are readily available in VB.NET.

2. VB.NET is totally object oriented. This is a major addition that VB6 and other earlier

releases didn't have.

3. The .NET framework comes with ADO.NET, which follows the disconnected paradigm, i.e.

once the required records are fetched the connection no longer exists. It also retrieves the

records that are expected to be accessed in the immediate future. This enhances Scalability of

the application to a great extent.

4. VB.NET uses XML to transfer data between the various layers in the DNA Architecture i.e.

data are passed as simple text strings.

5. Error handling has changed in VB.NET. A new Try-Catch-Finally block has been introduced

to handle errors and exceptions as a unit.

6. Another great feature added to VB.NET is free threading against the VB single-threaded

apartment feature.

7. Security has become more robust in VB.NET. In addition to the role-based security in VB6,

VB.NET comes with a new security model, Code Access security.

vii
8. The CLR takes care of garbage collection i.e. the CLR releases resources as soon as an object

is no more in use. This relieves the developer from thinking of ways to manage memory.

CLR does this for them

Framework 4.0

Dot net framework is a platform that is provided by Microsoft technology in which we can develop

web based application,window based  application and console base application with C#(c sharp),VB

and J#(J sharp) and other 22 Language.

Microsoft SQL Server 2008

Microsoft SQL Server fulfills these responsibilities :

 Reduction and redundancy :

Centralized control of the dba avoids the unnecessary duplication of data and effectively

reduces the total amount of data storage required. It also eliminates the extra processing and

of the inconsistencies eg. Same format of grade card for all student.

 Sharing data :

Any number of application program of user’s can share the same database .For example we

can access the list of study centers.

 Data integrity :

Data integrity means that the data contains in the database both accurate and consistent.

 Data security :

In this facility the confidential data must not be accessed by unauthorized person.

 Rapidly Accessing Data :

SQL Server provides rapid access to data by utilizing indexes and storing frequently accessed

data in memory

viii
.

 SQL Server Enterprise Manager :

The Enterprise Manager is the central console from which most SQL Server database-

management tasks can be coordinated. SQL Enterprise Manager provides a single interface

from which all servers in a company can be managed.

Microsoft Word

Microsoft Word is a word processor developed by Microsoft. It was first released in 1983 under the

name Multi-Tool Word for Xenixsystems .Subsequent versions were later written for several other

platforms including IBM PCs running DOS (1983), the Apple Macintosh (1984), the AT&T Unix

PC (1985), Atari ST (1986), SCO UNIX, OS/2, and Microsoft Windows (1989). It is a component of

the Microsoft Office software system; it is also sold as a standalone product and included

in Microsoft Works Suite.

3. Requirement Analysis

ix
The Contact Book requires computerizing its storage of contacts in order to provide fully service to

automate the following activities. The requirements from the proposed software are as follows:

 Contact Information Handling

 Adding a new contact

 Deleting a contact

 Updating a contact

 Searching a contact

3.1 Problem Definition

The problem here is that storing the contact information on paper is little bulky and is difficult to

manage and store these papers. They can be forgotten where they were placed or could be destroyed

by the small animals like rat etc. For a personal purpose it could be managed but for organizations

where there is a need to keep these information’s for later use it will create a problem if such thing

happens.

So, why don’t we keep it in our computer as a record? You may say that we could have used WORD

or NOTEPAD, yes we could have used but in that case it would be a little difficult to search a

contact or delete one or add a contact after scrolling thousands of pages of word but the software

CONTACT BOOK provides a total and an easy interface to add , search , delete a contact without

going through pages. All that work will be done by he software itself.

3.2 Requirements Specification

 User Requirements:-

A careful study of the requirement of the end user; i.e. the Contact Book should meet the

following requirements:
x
 User should be able to add image for his contact

 No User without the correct login and password may be allowed to enter the project

 User should be provided with an option to add the record just by adding the fields

value.

 User could be able to delete any record he/she wants.

 User should be able to search a record either by entering name or part of name or by

choosing groups.

 User should be able to update the record.

 User should be able to connect to facebook.

 User should be able to see the records in a file and in report also.

 Although the system is to be installed in a low end system with Windows based OS at

present, in future it should be portable to a higher end system with Linux OS

 The system should have a relatively lower memory and bandwidth requirement

 Logical Database Requirements:-

The database of the Contact Book consists of five tables. First table consists of the basic

information of the record. The next table consists of the address details, The third table

consists of the phone details. The next table consists of other details. The last table consists of

image of the contact.

Keeping in view these requirements, data dictionary of the Contact Book is convinced.

Data Dictionary

Name Description

Name,aname,pname,onam Name of the contact

xi
Designation The designation of contact

Company The company where the contact works

Aoffice Address of office of contact

Aresidence Present address of contact of his living

Apermanent Permanent address of contact

Poffice Contact no. of office

Presidence Contact no. of residence

Pmobile Contact no. of mobile

Fax Fax number of contact

EmailId Email id of contact

Website Website address of contact

Functional Requirements:-

The Functional Requirements of the project are as follows:

 To provide the functionality to person to view details of contact.

 To provide login interface through which only authorized user can pass by.

 The  application provide contact the option to add the photo from any file in its pc..

 This system should handle multiple contacts at the same time.

 To functionally enable Contacts define criteria and create Admin.

 The application also provides an option to view group belonging to a person.

Performance Requirements:

xii
As Contact Book is an application based system, the application should be installed in

Windows. Usage of software should not cause consumption.

In order to assess the performance of a system the following must be clearly specified:

• Response Time

• Workload

• Scalability

• Platform

The response time should be less than 2-3 minutes.

The workload should not be so much which hangs the system.

The scalability required is often driven by the lifespan and the maturity of the system.

The platform on the system who runs is Windows.

Non Functional Requirements:-

The Non-Functional Requirements of the project are as follows:

 The system should be reliable and robust.

 The system should be User friendly.

 The system should be completely Consistent and Secure.

3.3 Planning and Scheduling

 Planning and Scheduling are two of the most critical elements for project success. Project

planning is much more than simply following well-established procedures.Proper planning

xiii
determines the direction, goals, scope, quality and ultimately the outcomes for any given

project.

 The purpose of Project Planning is to establish an acceptable plan to execute a project in an

effective manner through the review of project scope and objectives.

The purpose of Project Scheduling is to:

1. Define activities, durations, and relationship logic to implement the project planMonitor,

update, and communicate the schedule to reflect current status and the impact of project

changes.

 The Planning and Scheduling professional provides the project management team with the

expertise to deliver the project in the most effective manner.

 SNC's highly pprofessionals are using Primavera Project Management( P6) as main software

for scheduling and besidesMicrosoft Office especially Excel for cost analysis and reporting.

GANTT Chart :

A Gantt chart is a type of bar chart, developed by Henry Gantt in the 1910s, that illustrates

a project schedule. Gantt charts illustrate the start and finish dates of the terminal elements

and summary elements of a project. Terminal elements and summary elements comprise

the work breakdown structure of the project.

xiv
PERT Chart:

The Program (or Project) Evaluation and Review Technique, commonly

abbreviated PERT, is a statistical tool, used in project management, that is designed to

analyze and represent the tasks involved in completing a given project

xv
xvi
3.4 Software and Hardware Requirements

Software Requirements

For development, software’s used are:

Operating System                                :  Windows 7 professional , service pack-1

Platform                                              :   .Net

Technology                                          :   Visual Studio

Language                                             :   VB.net

Backend                                               :   SQL server 2008

Editor                                                   :   Microsoft word 2007

For Development                                 :    visual studio .Net setup tools

For Design                                           :   Visual studio designer

For deployment, software’s used are :

Operating system                                 :  Windows 7 professional, service pack-1

Framework                                           :   .Net 2008

IIS                                                        :   Configured

Backend                                               :   sql server 2008

Hardware Requirements

For Development, Hardware’s used are:

1.      Intel Core

2.      40GB hard disk

3.      4 GB RAM

xvii
For Deployment, Hardware’s used are :

Minimum

1.      Intel Core

2.      10 GB hard disk

3.      256MB RAM

Recommended

1.      Intel Core

2.      20GB hard disk

3.      1GB RAM

3.5 Preliminary Product Description

The system will store the contact information to the software. The system can add various

contacts for various persons. One person can be a part of one or more groups.All one needs to

do is to change the database accordingly. Project deals with storing all the information of a

person , delete a person information , update a person information. The modules with its

functions described below as:

 The application has Login module we need the user name and password facility and only

authorized person is allowed to enter into login page.

 The application has Project Module that shows the overview of project and provides an

interface to go to all the operations that can be performed on the software.

 The application has add module to add a new contact to the database.

 The application has delete module to delete a contact from the database.

 The application has search module to search a contact from the database.

xviii
 The application has update module to update an existing contact in the database.

 The application has view module to view all the tables of the database.

 The application has query module to perform different queries on the database.

 The application has report module to generate a report on the tables currently we have.

 The application has group module to show if person belongs to more than one group.

3.6 Conceptual Models

3.6.1 Screen Views:

The view of the screen with all the possible operations is shown diagrammatically below:

Add Form
Delete Form
Search Form
Update Form
Connect to facebook form
Group Form
LOGIN WELCOME Report Form
SCREEN Table Form
Questionnaire Form
Pdf Form
Suggestions Form

3.6.2 Entity Relationship Diagram:

An ER model is an abstract way of describing a database. In the case of a relational database,

which stores data in tables, some of the data in these tables point to data in other tables - for

instance, your entry in the database could point to several entries for each of the phone

numbers that are yours. The ER model would say that you are an entity, and each phone

xix
number is an entity, and the relationship between you and the phone numbers is 'has a phone

number'. Diagrams created to design these entities and relationships are called entity–

relationship diagrams or ER diagrams.

xx
3.6.3 Data Flow Diagrams:

The table structure for the various tables to be used in the proposed software is described in

Data Structure part of this proposal.

The data flow in the software is depicted in next page through Data Flow Diagram (DFD).

Zero Level DFD:

It is the first level of DFD. This shows a overview of the project in a short form. If we want

to show a detailed functions of project we can make level 1 , level 2 dfd and so on…….

according to the need of project.

USER

Request for Operation

COMPLETE Provide service


CONTACT
BOOK
Request Result

CONT
ATTEND Access ACT
BOOK
DATA
BASE
SE
DATABA
OF
TABLES
ALL

xxi
Level 1 DFD

This level of DFD shows a little detailed pictorial description of the project.

Level 2 DFD

This is the last phase of dfd according to the need of this project. The level 2 DFD is as follows:

xxii
xxiii
MODULE DESIGN BY DFD

DFD for each individual module is shown below

1. LOGIN MODULE

REQUEST
ENTER LOGIN ID AND VALIDATE DATABASE
PASSWORD
LOGIN MODULE

VALUES

PROCES
TRUE
ENTER PROJECT PAGE S
RESULT

FALSE

ASK USER TO ENTER AGAIN


IF USER HAS TRIED THREE TIMES THEN
EXIT THE PROJECT

xxiv
2. ADD MODULE

ENTER ADDING
VALUES OF FIELDS
MODULE

VALIDATION CHECK
WRITE CONTACT
DETAILS TO
CHECK ALL PROCESS
CHECK IS SET DATABASE
FIELDS OF CHECK MOBILE
HAVE VALIDITY NUMBER IS VALID
VALUES ASK USER TO ENTER THAT IS OF 10 DIGITS
VALID NUMBER
GIVE A
ASK USER TO WARNING
ENTER ONLY
NUMBER
CHECK FAX NUMBER,
MOBILE PHONE,RESIDENCE
PHONE AND OFFICE PHONE
CONSISTS ONLY OF DIGITS

xxv
3. DELETE MODULE

NAME OF CONTACT
ENTER
DELETE
MODULE

SEARCH

DATABASE DISPLAY AN ERROR


NOT FOUND MESSAGE AND ASK
TO TRY AGAIN

FOUND

YES CONFIRM TO DELETE CONFIRM


ASK PROCESS DELETE
CONTACT

NO
GO BACK

xxvi
4. SEARCH MODULE

VALUEBy entering name


or part of name

CHECK DON’T REMEMBER VALUE SEARCH


ID ID
MODULE
PROCES
S

SENDVALUE
FETCH
VIEW THE CONTACT
SEARCH IN DETAILS DATABASE
FOUND DATABASE

VALUES
NOT FOUND

DISPLAY AN
APPROPRIATE MESSAGE

5. UPDATE MODULE

ENTER
ID
VALIDATION
UPDATE CHECK
MODULE

FIRSTLY SEARCH

CHECK RUN
FOUND SEARCH
RESULTSMODULE ENTER VALUES
TO BE UPDATED
NOT
FOUND

DISPLAY AN xxvii
APPROPRIATE UPDATE THE VALUES
MESSAGE
6. QUERY MODULE

VALUE
QUERY CHOSEN
QUERY
MODULE

RESULT

QUERY
PROCESSOR
RESULT
RUN ON DATA GRID

REQUEST FETCH

DATABASE

xxviii
7. GROUP MODULE

SEND VALUE
CHOOSE GROUP
NAME MODULE

RESULT

RESULT QUERY
PROCESIN
SHOW CONTACT
G
WITH GROUP

FETCH

DATABASE

xxix
4. SYSTEM DESIGN

4.1 Basic Modules

Contact Book comprises of the following modules:

Name of the Module Login Module


Handled by
Description The user logins here into the system

Name of the Module Add Module


Handled by
Description The user adds the record in the database

Name of the Module Delete Module


Handled by
Description The user deletes a record from database

Name of the Module Search Module


Handled by
Description The user searches the record from database

Name of the Module Update Module


Handled by
Description The user updates the record in the database

Name of the Module Groups Module


Handled by
Description Various groups according to choosen option are

viewed

xxx
4.2 Data Design

 Schema Design:-

Personal Table Address Table

Name Name
Designation Residence Address
Company Permanent Address
Office Address

Phone Table

Name
Photo Table
Home Phone
Others Table
Office Phone
Id
Mobile Phone
Image Name
Fax
Email id
Website

 Data Integrity and Constraints:-

Data Integrity and constraint have been implemented on database level.checks and

constraints have beenimplemented within the MySQL database in the following

manner to ensure thatdata integrity is not violated.

Table 1 Basic Details

FIELD_NAME DATA_TYPE DESCRIPTION CONSTRAINTS


Id Int It show contact id Primary key
Contact_name Varchar It show Contact Name Candidate Key
Designation Varchar It show Contact’s Designation
Company_Nam Varchar It shows name of company person is working

e in.

xxxi
Table 2 Contact Details

FIELD_NAME DATA_TYPE DESCRIPTION CONSTRAINTS


Id Int It show Contact id Primary Key
Contact_name Varchar It show Contact Name Foreign Key relates to other

tables
Mobile Number Varchar It show Mobile Number Length of 10 digits
Residence Varchar It show Residence phone

Number number
Office Number Varchar It shows office phone number

Table 3 Address Details

DATA_TYP CONSTRAINTS
FIELD_NAME DESCRIPTION
E
Id Int It show Contact id Primary key
Contact_name Varchar It show Contact Name Foreign key
Permanent Address Varchar It show Permanent address
Residence Address Varchar It show Residence address
Office Address Varchar It shows office address

Table 4 Other Details

FIELD_NAME DATA_TYPE DESCRIPTION CONSTRAINTS


Id Int It show Contact id Primary key
Contact_name Varchar It show Contact Name Foreign Key
Email ID Varchar It show Email id of the person
Website Varchar It show website address

Address
Fax Number Varchar It shows fax number

xxxii
Table 5 Photo

FIELD_NAM CONSTRAINT
DATA_TYPE DESCRIPTION
E
Id Int It show Contact id Primary Key
PHOTO Picture It stores picture Image

address

4.3 Procedural Design:-

Logic Diagrams:A flowchart is a type of diagram that represents an algorithm or process, showing

the steps as boxes of various kinds, and their order by connecting them with arrows

Start

Admin login

Main page

Add page Choose Search Page Search from


operati database
on
Delete page Update
page
Add to
database
Update in
Deletes from xxxiii database
database
4.4 User Interface Design

The Contact Book gives a user an option to have its personal contact diary stored on a system. A

system always works more fast than a person can. User is given an interface to add a new record in

case he wants to add a record ,a option to delete a record , search a record with various options,

update a record, view the contacts according to the groups. Also there are other options of connecting

to facebookalso.It also gives option to view report. User can also perform a questionnaire. User can

also give their suggestions for improvement.

xxxiv
External Interface Requirements:

 Interface Requirements and Input/output Formats :

Name of Item User Login Screen


Description of purpose Users of Contact Book use it to login into the system
Source of input or Destination of User typed user name and password
output
Valid range, accuracy and/or User name should be within 6 characters and password also of 6
tolerance characters
Units of measure Number of characters
Timing User acceses the entrance page of Contact Book
Relationship to other inputs On successful login user is taken to the page of Contact Book
/outputs

xxxv
Screen formats/Organization Centre bottom area of page of Contact Book
Data Formats A-Z, a-z
End Messages On successful login-welcome page is displayed
On failure- three attempts are given if each of it fails project
terminates itself with a sorry message

Name of Item Welcome Screen


Description of purpose Users of Contact Book are welcomed to the software
Source of input or Destination of No input just a Button to go to main page
output
Valid range, accuracy and/or tolerance None
Units of measure None
Timing User acceses the main page of the project
Relationship to other inputs /outputs None
Screen formats/Organization Centre bottom area of page of Contact Book
Data Formats None
End Messages On button click user comes to main page of project

Name of Item Main Screen


Description of purpose Users of Contact Book use it to enter into
operations a user want to perform
Source of input or Destination of output User clicks the button of the operation , user
wants to perform
Valid range, accuracy and/or tolerance None
Units of measure None
Timing User acceses that operation page of Contact
Book the user chooses
Relationship to other inputs /outputs On button click user will view the page of the
operation you choose
Screen formats/Organization Centre bottom area of page of Contact Book
Data Formats None
End Messages On button click user will view the page of the
operation you choose

Name of Item Select for Add page


Description of purpose Users of Contact Book use it to enter the
record fields
Source of input or Destination of output User types the records fields
Valid range, accuracy and/or tolerance Each field has different specifications. Some
only takes alphabets and some only take
numbers. Like mobile number will be of 10

xxxvi
digits only , fax number of 4 digits and some
fields contain special characters also.User is
also asked to upload image also.
Units of measure Characters, numbers, picture
Timing User is able to add record to database
Relationship to other inputs /outputs On successful addition user is asked to either
add again or go back to the main page to
perform any other option User is also given an
option to add the contact as a .vcf file
Screen formats/Organization Frame format of page in order to enter the
values of the fields
Data Formats A-Z, a-z, 0-9, special characters like @
End Messages On successful addition it to database, a
message of successful addition is displayed,
but on the failure of addition a sorry message
is displayed.

Name of Item Select for Delete page


Description of purpose Users of Contact Book use it to delete one or
more records.
Source of input or Destination of output User types the name of the record user want to
delete.
Valid range, accuracy and/or tolerance Only characters are allowed as name is asked to
input
Units of measure Characters
Timing User is able to delete a record from database
Relationship to other inputs /outputs On successful deletion user is asked to either
delete again or go back to the main page to
perform any other option.
Screen formats/Organization Frame format of page in order to enter name of
the record.
Data Formats A-Z, a-z
End Messages On successful deletion from database, a message
of successful deletion is displayed, but on the
failure of deletion i.e. in case name is not found
in the records a sorry message is displayed.

Name of Item Select for Search page


Description of purpose Users of Contact Book use it to search one or
more records.
Source of input or Destination of output User types the id of the record or the name or
part of the name , user wants to search.
Valid range, accuracy and/or tolerance Characters are allowed as name is asked to input

xxxvii
and only number is allowed when id is asked.
Units of measure Characters, numbers
Timing User is able to search a record from database
Relationship to other inputs /outputs On successful searching user is given an option
to either search again or can connect to facebook
or go back to the main page to perform any other
option.
Screen formats/Organization Frame format of page in order to enter id of the
record or name or part of name of the record
Data Formats A-Z, a-z, 0-9
End Messages On successful searching from database, the
record details are shown on the screen in the
tabular form, but on the failure of searching i.e.
in case name is not found in the records a sorry
message is displayed.

Name of Item Select for Update page


Description of purpose Users of Contact Book use it to update one or
more records.
Source of input or Destination of output User types the id of the record he wants to
update.
Valid range, accuracy and/or tolerance Only number is allowed as id is asked.
Units of measure Numbers
Timing User is able to update a record from database
Relationship to other inputs /outputs On successful updation user is given an option
to either go back to the main page to perform
any other option or to search again if the
corresponding record is not the one he wanted
or if he wants to update again.
Screen formats/Organization Frame format of page in order to enter id of the
record
Data Formats 0-9
End Messages On successful searching from database, the
record are asked to update and if its not the
record the user wanted to search then an option
is given to search again by rechecking the list

xxxviii
of ids , but on the failure of searching i.e. in
case id is not found in the records a sorry
message is displayed and user is asked to
check the list of ids.
Name of Item Select for Group page
Description of purpose Users of Contact Book use it to view groups of
people based on various options given.
Source of input or Destination of output User chooses which type of group he wants to
view.
Valid range, accuracy and/or tolerance None
Units of measure None
Timing User is able to view the groups
Relationship to other inputs /outputs None
Screen formats/Organization Button format of page in order to choose from
the options
Data Formats None
End Messages On successful completion user is able to view
the groups.

Name of Item Select for Group of people page


Description of purpose Users of Contact Book use it to view groups of
people by choosing name.
Source of input or Destination of output User chooses name of person from the list whose
group he wants to view.
Valid range, accuracy and/or tolerance None
Units of measure None
Timing User is able to view the group by name
Relationship to other inputs /outputs None
Screen formats/Organization Combo box format of page in order to choose
from the options of name.
Data Formats None
End Messages On successful completion user is able to view the
groups by name.

Name of Item Select for Group of address page


Description of purpose Users of Contact Book use it to view groups of
address by choosing different addreses either of
residence or office or permanent.
Source of input or Destination of output User chooses type of addresses from the list
whose group he wants to view.
Valid range, accuracy and/or tolerance None

xxxix
Units of measure None
Timing User is able to view the group by address
Relationship to other inputs /outputs None
Screen formats/Organization Combo box format of page in order to choose
from the options of address.
Data Formats None
End Messages On successful completion user is able to view the
groups by address.

Name of Item Select for Group of designation page


Description of purpose Users of Contact Book use it to view groups of
designation by choosing different designations.
Source of input or Destination of output User chooses designation from the list whose
group he wants to view.
Valid range, accuracy and/or tolerance None
Units of measure None
Timing User is able to view the group by designation.
Relationship to other inputs /outputs None
Screen formats/Organization Combo box format of page in order to choose
from the options of designation.
Data Formats None
End Messages On successful completion user is able to view the
groups by designation.

Name of Item Select for Group of company page


Description of purpose Users of Contact Book use it to view groups of
company by choosing list of companies.
Source of input or Destination of output User chooses company from the list whose group
he wants to view.
Valid range, accuracy and/or tolerance None
Units of measure None
Timing User is able to view the group by company.
Relationship to other inputs /outputs None
Screen formats/Organization Combo box format of page in order to choose
from the options of company.
Data Formats None
End Messages On successful completion user is able to view the
groups by company.

xl
Name of Item Select for view tables page
Description of purpose Users of Contact Book use it to view all the
records in form of table.
Source of input or Destination of output None
Valid range, accuracy and/or tolerance None
Units of measure None
Timing User is able to view all the records
Relationship to other inputs /outputs None
Screen formats/Organization Tabular format of page to view the records
Data Formats None
End Messages On button click all the records are viewed in
tabular form.

Name of Item Select for report page


Description of purpose Users of Contact Book use it to view all the
records in form of report.
Source of input or Destination of output None
Valid range, accuracy and/or tolerance None
Units of measure None
Timing User is able to view all the records, also option of
exporting report to pdf file is given
Relationship to other inputs /outputs None
Screen formats/Organization Report format of page to view the records
Data Formats None
End Messages On button click all the records are viewed in
report form.

xli
Name of Item Select for questionnaire page
Description of purpose Users of Contact Book use it to perform survey
on the project.
Source of input or Destination of output User chooses between yes or no for each
question
Valid range, accuracy and/or tolerance Yes or no on a button click
Units of measure None
Timing User is able to perform survey
Relationship to other inputs /outputs None
Screen formats/Organization Question format of page
Data Formats None
End Messages On button click a calculated percent is shown
telling how much user is satisfied with the
project.

Name of Item Select for Give Suggestions page


Description of purpose Users of Contact Book use it to give their
suggestions
Source of input or Destination of output User writes his views and can save it in a text file
on the computer
Valid range, accuracy and/or tolerance Everything is valid as it is written itself by user
Units of measure None
Timing User is able to give suggestions
Relationship to other inputs /outputs None
Screen formats/Organization Frame format of page
Data Formats A-Z, a-z, 0-9 special characters
End Messages On button click a saving window is shown to
save the views and then automatically a Thank
You page is shown to show the gratitude and
automatically the project is exit.

xlii
Name of Item Select for view pdf page
Description of purpose Users of Contact Book use it to view the pdf file
which contains all the records.
Source of input or Destination of output None
Valid range, accuracy and/or tolerance None
Units of measure None
Timing User is able to view the records without running
the software
Relationship to other inputs /outputs None
Screen formats/Organization Report format of page
Data Formats None
End Messages On button click a pdf file is viewed which
contains all the records. It is useful as a person
does not have to run the project each time in
order to view the records.

Name of Item Select for connect to facebook page


Description of purpose Users of Contact Book useit to connect to the
facebook
Source of input or Destination of output Characters of 12 size in password and id which is
automatically written
Valid range, accuracy and/or tolerance 12 size of characters for password
Units of measure Characters
Timing User is able to use his/her facebook profile
Relationship to other inputs /outputs Displays error and asks to input again if wrong
password is entered
Screen formats/Organization Web format of page
Data Formats A-Z, a-z, 0-9, special characters
End Messages On successful login the facebook profile is
viewed. On failure user is asked to again enter
the values.

xliii
4.5 Security Issues:

The security provided by a password system depends on the passwords being kept secret at all times.

Thus, a password is vulnerable to compromise whenever it is used, stored, or even known. In a

password-based authentication mechanism implemented on a system, passwords are vulnerable to

compromise due to five essential aspects of the password system:

 A password must be initially assigned to a user when enrolled on the system.

 A user's password must be changed periodically.

 The system must maintain a "password database."

 Users must remember their passwords.

 Users must enter their passwords into the system at authentication time.

 Employees may not disclose their passwords to anyone. This includes administrators and IT

managers.

Password policies can be set depending on the needs of the organization. For example, it is possible

to specify minimum password length, no blank passwords, and maximum and minimum password

age. It is also possible to prevent users from reusing passwords and ensure that users use specific

characters in their passwords making passwords more difficult to crack. 

4.6 Test Cases Design:-

xliv
“A test case has components that describes an input, action or event and an expected response, to

determine if a feature of an application is working correctly.”There are levels in which each test case

will fall in order to avoid duplication efforts

Id Steps Expected Results Actual Results


T00 Login:Enter the correct user id and password and Welcome screen Same
1 click the login button should be
displayed
T00 Main: Buttons consisting different operations should They are viewed same

2 been viewed
T00 Add: Fields to enter the record values should be They are Same

3 displayed and the record should be successfully successfully added

added to the database


T00 Delete: Name should be asked and a confirmation The above said After pressing

4 before deletion should be done if yes is said then it should be done no, the record

should be deleted and if o the deletion should be got deleted

cancelled
T00 Search: Searching by given options will be done Searching is done Same

5 with various

options
T00 Update: Updation should be done without any Updation should Same

7 changes done to any other record be done


T00 Groups: Groups should be viewed according to The same is done Same

8 choice
T00 Questionaire: A survey should be performed and a Percentage is Same

9 calculated percent should be shown about the shown

satisfaction of the user


T01 Report: Report should be viewed containing all Report is viewed Same

0 records
T01 Tables: All tables should be viewed with values Tables are shown Same

xlv
1
5. Implementation and Testing

5.1 Implementation Approaches:

The Software Design Description Document has been used as input in the implementation process.

The actual implementation of the system has been done using VB.net, which is a GUI based

application language. VB.net has been used to interact with the backend database. In this

implementation, MySQL has been used as the backend RDBMS. VB.net processes the inputs or

commands given by the user and translates them in the commands understandable to the backend

database. The output produced by the backend database are also handled by VB.net, which then

generates code in real-time and formats the output produced by MySQL format, which can be

displayed by the software. Since VB.net and MySQL are both available in varied platforms like

Windows, Unix, Macintosh and Linux, Contact Book can be implemented in a truly platform

independent manner. Since both these technologies are open source and free and have a large user

community, the development cost of Contact Book using VB.net/MySQL is very low.

5.2 Coding Details and Code Efficiency:

5.2.1 Coding Details:-

As we are using VB.Net so all the designing of forms via buttons, labels, textboxes etc. is done here

only by mouse. Now the rest comes to coding. Coding of the form will be shown here one by one.

xlvi
xlvii
xlviii
xlix
l
li
lii
liii
liv
lv
lvi
lvii
lviii
lix
lx
lxi
lxii
lxiii
lxiv
lxv
lxvi
lxvii
lxviii
lxix
lxx
lxxi
lxxii
5.2.2 Code Efficiency

Efficiency is the amount of computing resources and code required by a program to perform its

functions. Efficient codes are required for the better performance of the system. Efficient coding

makes a system robust. A method is robust if it does not fail even if it receives improper parameters.

Robustness against internal bugs may be trade off against efficiency.

The need for efficiency arises due to the cost of consideration. If some resources are scarce and

expensive, it is desirable that those resources should be used efficiently. In the computer system the

resources the most often considered for efficiency are processor time and less memory. This coding for

the system has been started after completing the design phase, because all software methodologies

emphasize the importance of first designing then coding. The codes that construct this system are

structured, modular, efficient, and require less amount of computing resources. All functions of this

system are understandable since the functions are small and coherent. Functions and variables are

meaningful variable names to increase the readability and avoided abbreviations that may confuse the

users.

In order to execute the database queries faster used the following methods. During the retrieval of data

from the database using SELECT statement all the known conditions are specified in the WHERE

clause.

If we want to find the maximum, minimum, sum and average value or the count of a database column,

use a Select list with aggregate functions instead of computing the aggregates within the program. The

RDBMS is responsible for aggregated computations instead of transferring large amount of data to the

lxxiii
application. Overall network, application server and database load is also considerably less. Simplicity

and clarity are the main properties of the coding.

Some points are kept in mind while making the project:

 The code repeating again was made as a module which is common for all

 Proper indentation is given to understand the code

 The forms are designed in a way that all the data and buttons are properly viewed and

spaced. User can easily see and understand.

 Any person can use it easily as it is user friendly

Code Optimization

1. Modulo and division operation take a lot of time and they should be replaced by something

else. 

2. Try to analyze the problem and obtain an alternate representation of the problem.  

3. Try to eliminate the IF statements from your code in the case that their only purpose is to set

some values based on a condition.

5.3 Testing Approach:

Software testing is an investigation conducted to provide stakeholders with information about the

quality of the product or service under test.[1] Software testing can also provide an objective,

independent view of the software to allow the business to appreciate and understand the risks of

software implementation

Unit testing is a method by which individual units of source code, sets of one or more computer

program modules together with associated control data, usage procedures, and operating procedures

are tested to determine if they are fit for use.

lxxiv
Integration Testing is the phase in software testing in which individual software modules are

combined and tested as a group

Id Steps Expected Results ActualResults


T00 Login: Enter the correct user id and password and Welcome screen Same
1 click the login button should be displayed
T00 Main: Buttonsconsisting different operations should They are viewed Same
2 been viewed
T00 Add: Fields to enter the record values should be They are successfully Same
3 displayed and the record should be successfully added
added to the database
T00 Delete: Name should be asked and a confirmation The above said After
4 before deletion should be done if yes is said then it should be done pressing no,
should be deleted and if o the deletion should be the record got
cancelled deleted
T00 Search: Searching by given options will be done Searching is done Same
5 with various options
T00 Update: Updation should be done without any Updation should be Same
7 changes done to any other record done
T00 Groups: Groups should be viewed according to The same is done Same
8 choice
T00 Questionnaire: A survey should be performed and a Percentage is shown Same
9 calculated percent should be shown about the
satisfaction of the user
T01 Report: Report should be viewed containing all Report is viewed Same
0 records
T01 Tables: All tables should be viewed with values Tables are shown Same
1

lxxv
5.4 Modifications and Improvements:

One test was failed in all the tests performed.

Test Case ID: - T004

Problem: On clicking No while confirmation no deletion should have been performed but

unfortunately it was done

Investigation: The code is as follows for this test problem:

If MessageBox.Show("Do you really want to Delete this Record?",


"Delete", MessageBoxButtons.YesNo, MessageBoxIcon.Warning) =
DialogResult.No Then
MessageBox.Show("Operation Cancelled", "Cancel")
ExitSub
EndIf
If MessageBox.Show("Do you really want to Delete this Record?",
"Delete", MessageBoxButtons.YesNo, MessageBoxIcon.Warning) =
DialogResult.Yes Then
MessageBox.Show("Record Deleted.You can go back to
the main page", "Delete Succesful")
TextBox1.Text = ""
TextBox1.Focus()

EndIf
Else
MessageBox.Show("The Contact you are searching is not in the
database.Please re-check the name and try. You can go back to main
page by hitting the button", "Attempt to delete")
TextBox1.Text = ""
EndIf
cn.Close()

Findings and rectification:

It was found that the position of cancelling the confirmation was wrong that is why this test was
failed.
Now the message box position is changed and the project has been run and cross checked once again
thus, the problem has been rectified.

lxxvi
6. Results and Discussion

6.1 Test Reports:-

Test case Date Pass/Fai Comments

id l
T001 20/10/2013 PASS Tested with three different ids and passwords
T002 23/10/2013 PASS Only one test required
T003 26/10/2013 PASS Only one test required
T004 2/11/2013 PASS Failed for the first time and was then rectified
T005 8/11/2013 PASS Tested 6 times with each of the options given
T007 15/11/2013 PASS Tested 2 times with all the options given
T008 15/11/2013 PASS Only one test required
T009 17/11/2013 PASS Only one test required
T010 19/11/2013 PASS Only one test required
T011 22/11/2013 PASS Only one test required

6.2 User Documentation:

Introduction:

The system will store the contact information to the software. The system can add various contacts

for various persons. One person can be a part of one or more groups. All one needs to do is to change

the database accordingly. Project deals with storing all the information of a person, delete

personinformation, update person information. The modules with its functions described below as:

 The application has Login module we need the user name and password facility and only

authorized person is allowed to enter into login page.

 The application has Project Module that shows the overview of project and provides an

interface to go to all the operations that can be performed on the software.

lxxvii
 The application has add module to add a new contact to the database.

 The application has delete module to delete a contact from the database.

 The application has search module to search a contact from the database.

 The application has update module to update an existing contact in the database.

 The application has view module to view all the tables of the database.

 The application has query module to perform different queries on the database.

 The application has report module to generate a report on the tables currently we have.

 The application has group module to show if person belongs to more than one group.

Information for the use of the documentation:

This user documentation is intended for the users of the Contact Book where the handling of

importantoperations of the Contact Booksystem, like addition, deletion, searching, updation, and

grouping have been explained. This user documentation follows theguidelines and specifications of

IEEE 1063-2001 relating to Software UserDocumentation. The following pages describe the concept

of operations,procedures, information on software commands and error messages andproblem

resolution in respect of Contact Book.

lxxviii
7. Conclusion

7.1 Conclusion

The Contact Book project has been successfully completed by the developer well within the

scheduled time and all the functional requirements of the projectthat were set in the SRS have been

fully achieved. The external interfacerequirements and Input/output formats have also been

implemented as per therequirement specifications. The security aspects of the system have been

aparticular concern and it has been implemented in a unique manner. The logical design was

carriedout in a very thorough manner and a modular approach was adopted, with eachdeveloper

given the responsibility of one module. Special attention was given tothe implementation of database

constraints and towards maintaining the integrityof the database, so that even if the coding fails at

some place, the data integritywill not be violated. At the end of it, all the modules were integrated

without anyproblem and the system was observed functioning as a whole in the predictedmanner.

Extensive testing of the system, as well as that of the all the modules have been done using various

test cases and it wasrevealed that the system is operating well within the prescribed parameters

andthe expected outcome of the test cases were observed in most cases. A fewcoding errors were

detected following the extensive testing, which were minor innature and the same have been rectified

promptly.

The system is now fully functional and ready to be deployed on-site.

lxxix
7.2 Limitations of the System

Following limitations came in view while testing the system:

 Contact Book has been primarily targeted for a medium to large-sized organization and has

been tested, keeping in view the specific requirements. It is possible that the system may not

function as well or within the prescribed parameters if deployed in a differentenvironment

 No provision to add the image in contact when added as a .vcf file to the system is provided.

 No in-built backup facility has been incorporated within the system itself. If backup is

required to be made, use of third party tools are recommended

 While Searching if the record is found more than once the record detail of any one is only

viewed I case of search by id.

 Security policy is dependent on password protection only. However, if there is need to deploy

this system in an insecure environment, other types of security features like encrypted keys,

biometric authentication etc. might be conceived and additional features will be required to

be incorporated in the system in a modular manner.

7.3 Future Scope of the project

Although Contact Book has been conceived as an successful system for storing contacts for any

organization, it may easily be converted for use in any other environment also like schools , hospitals

etc. Its unique security feature and the facility to create new contacts as a vcf file and as a database

record gives it a flexibilitywhich would enable its owners to offer any type of implementation

through various fields. The strength of the open-source SQL/VB.net combination used in the project

means that Contact Book will be a cheaper option thanother such software’s and the large user

lxxx
community andsupport services will ensure that any future development and extension effortscan be

undertaken with ease

References

S.No. Website Address Explanation

1 http://ignou.ac.in Our ignou home page which helped me

with the guidelines and format of the

project.

2 http://dev.mysql.com It helped with clearing my basics in My

Sql

3 http://msdn.microsoft.com/en- It helped me clearing my doubts in

us/vstudio/hh388573.aspx vb.net

4. http://en.wikibooks.org/wiki/Visual_Basic_.NET Read the online book

5. Book: by Harvey M. Deitel, Paul J. Deitel,

Tem R. Nieto
Visual Basic .NET How to Program (2nd

Edition)

6. Book: By Rude Limeback

Simply Sql

lxxxi
Glossary

Contact Book An application based address book to store records.

Data Dictionary a set of information describing the contents, format, and structure of a

database and the relationship between its elements, used to control access to

and manipulation of the database

DFD A data flow diagram (DFD) is a graphical representation of the "flow" of

data through an information system, modeling itsprocess aspects.

ERD An entity-relationship diagram is a data modeling technique that creates a

graphical representation of the entities, and the relationships between entities,

within an information system

GANTT chart A Gantt chart is a visual representation of a project schedule. A type of bar

chart, a Gantt charts show the start and finish dates of the different required

elements of a project.

GUI A program interface that takes advantage of

the computer's graphics capabilities to make the program easier to use. 

lxxxii
IEEE The Institute of Electrical and Electronics Engineers is a professional

association headquartered in New York City that is dedicated to advancing

technological innovation and excellence

Integration Integration testing is the phase in software testing in which individual software

Testing modules are combined and tested as a group.

MySQL MySQL is the world's second most widely used open-source relational

database management system.

PERT A project management tool that provides a graphical representation of a

project's timeline. PERT, or Program Evaluation Review Technique, was

developed by the United States Navy for the Polaris submarine missile

program in the 1950s. PERT charts allow the tasks in a particular project to be

analyzed, with particular attention to the time required to complete each task,

and the minimum time required to finish the entire project

Schema The organization or structure of a database. The activity of data modeling

leads to a schema

SRS A software requirements specification (SRS) is a comprehensive description

of the intended purpose and environment for software under development. The

SRS fully describes what the software will do and how it will be expected to

perform.

lxxxiii
Unit testing unit testing is a method by which individual units of source code, sets of one

or more computer program modules together with associated control data,

usage procedures, and operating procedures are tested to determine if they are

fit for use.

VB.Net Visual Basic .NET (VB.NET) is an object-oriented computer programming

language that can be viewed as an evolution of the classicVisual Basic (VB),

implemented on the .NET Framework. 

URL URL stands for Uniform Resource Locator. A URL is a formatted

text string used by Web browsers, email clients and other software to identify

a network resource on the Internet.

W3C The W3C is an industry consortium which seeks to promote standard for the

by producing specifications and reference software.

*********************

******************

*************

********

***

User_id278 104 241

Password 3530 *

lxxxiv

You might also like