C BookBankSystem
C BookBankSystem
PROJECT REPORT
ON
"BOOK BANK SYSTEM"
To fully acknowledge everyone who had a part in this work would take
more space than this entire project report. With that in mind, I would like to
mention a few people who were key.
SUMIT JAISWAL
BCA
A1004807044
2
CERIFICATE
This report has not been submitted earlier in any university/institute for
any degree/diploma.
3
INDEX
INTRODUCTION
PROJECT CATEGORY
VALIDATION CHECKS
LANGUAGE USED
DESIGN DOCUMENT
ANALYSIS DOCUMENT
DATABASE DESIGNING
BIBLOGRAPHY
OUTPUT SCREENS
4
INTRODUCTION
Book Bank is an organization where we put the record of the books issued to
the students. The main concept behind book banking is to maintain all the
previous records. It maintain all the records such as how many books are
available for issuing and particular student gets how many books.
Our project helps in saving time, money, extra paperwork etc. The prime feature
of our projects that it is compatible with any academic department.
In this Project you can keep record for total number of books.
This program is capable of holding any no. of students
This program takes very less time for ani complicated operation and very
user friendly.
PROJECT CATEGORY
5
This project will fall in RDBMS category because it will handle the huge
data of member’s account and the details of the account in file and file will
be related to each other to produce required information.
VALIDATION CHECKS
6
In this project system checks the entered data valid or not. If data is valid
then system accepts the data and if data is invalid then system show error
message and give the prompt for entering the correct data.
The validation-check when saving the data or pressing the <Enter> key.
MEANS OF PROJECT:
C
Computer is the most powerful tool man has ever created. Computers have
made a great impact on our every day life. Their presence is felt at almost every
working place viz. Homes, schools, colleges, offices, industries, hospitals,
banks, retail stores, railways, research and design organization, etc.
7
They were very costly and hence only large organizations could afford them.
The technological breakthrough in design and fabrication of semiconductor
devices namely, microprocessor had made it possible to manufacture powerful
microcomputers, which are within the reach of small organizations and even
individuals. These computes being very fast can be used not only for
computation but also to store and retrieve information, to control certain
processes and machines, to measure and display certain physical and electrical
quantities and so forth.
A user would like to have certain information, which is not in a single file. The
program will search all the required information from different files and supply it
to user. Take an example of records maintained by an advocate. He maintains
two files. One file contains the records of different clients. It may be named as
client file. It records client number, client identification number, name of the
client, address, phone number, amount due etc. He maintains another file, which
keeps the records of different cases. It may be named as the case file. It records
case number, identification number of the client of different cases, attorney,
court, judge, opening date, court date etc. Suppose the advocate wants
information about which case are to be taken up on a particular date, the details
of the cases and details of clients to obtain information require searching both
the files -- client file as well as case file. The software package will collect
8
information from both the files. The case file gives the information about the
cases that are due on a particular date. It also gives the identification numbers
of the client corresponding to each case. For these identification numbers the
details of clients are obtained from the client file. The information so retrieved is
gives to the user in a very short time.
‘J’ for Joint effort: - Joint efforts are very necessary for
programming and result of any project. The help from other wins many time
battles.
9
‘E’ for economic feasibility: It is important that the
planned scheme is economically feasible. It is a most to analyze & estimate time
too for completion of the project.
Documenting.
Periodic Evaluating.
Contingency Planning.
It also uses tools and software packages for planning and managing each
project. Managing projects also requires the following:
10
1. Top management commitment to setting project priorities and allocating
resources to approve protects.
Despite the high stakes, however, system projects often fail and there are
many reasons. Most project managers have experienced some of the problem
illustrated. Of these problems, the following are especially critical:
Conflicting objectives:
When everyone on the project team has conflicting objectives, the project
is bound to suffer. For example: the user demands a workable system, while the
designer strives for a high-powered code. The comptroller interprets success
from the bottom line whatever the cost.
11
Often promised objectives have been achieved only partially, or the original cost
estimate was over optimistic. As a result, the use is not welling to get involved.
Another problem steam from the conventional way project managers are
selected. For example: an analyst is given responsibility for implementing a
substantial application while, in practice, he/she has no management tools or
business experience to manage the project.
12
Crisis Elimination through Planning:
Without planning it is difficult is measure progress. As plans are
crystallized, crises should begin to disappear. A project manager must plan the
life cycle of the project and delegate authority for its implementation.
Project organization:
We have explained the major tools used in project planning after tasks
have been mapped out and the manpower requirements determined the next
step is to decide on the best way to organize manpower. We shall begin by
identifying the staffing and appropriate skills for a project and then suggesting a
management style and approach to manage and control the staff.
Reporting Structure:
Most people associated with major project are outside the direct control
of the project leader. Ideally, each team member should report directly to the
project leader. In practice, however, most team members report to their
respective supervisors. This means that the project leader has to use special
skills to coordinate a host of person over whom he/she has no real authority for
this reason, some authors refer to such a position as project manager rather
than project leader.
13
Management styles:
In discussing project management style, we need to examine two type of
work performed in system projects: mechanistic and creative tasks. Mechanistic
talks occur primarily during coding, testing and maintenance, which take up to
80 percent of the system development effort. Managing these tasks is made
possible by controlling against predefined standards and formats.
Their work could affect more than 80 percent of the outcome of his project.
14
management, requiring no formal procedures or project control. Unlike in larger
project, each staff member in a smaller project performs several functions.
Consequently, small projects tend to be less thorough and more prone to error.
Furthermore, there is psychological pressure on the project manager to make
sure the project will be success. The excuse of system failure through
committee is absent in small projects.
15
Looking at these variables, it is clear that success in managing system
project means making the best of project team abilities, getting them interested
in their work, assigning them worthwhile jobs, recognizing their efforts in a
spontaneous way, and providing opportunities for them to use their abilities,
advance, and develop their careers. These factors become goals that a project
manager should try to achieve for each member of the project staff and for the
group as a whole.
He/she most builds teams of mature people who are motivated and can be
trusted to see a project through to completion. This is the essence of project
management.
16
important components. General systems theory is concerned with “developing a
systematic, theoretical framework upon which to make decisions.” It
discourages thinking in vacuum and encourages consideration of all the
activities of the organization and its external environment pioneering work in
general systems theory emphasized that organizations be viewed as total
systems. The idea of systems has become most practical and necessary in
conceptualizing the interrelationships and integration of operations, especially
when using computers. Thus, a system is a way of thinking about organizations
and their problems. It also involves a set of techniques that helps in solving
problems.
17
ELEMENTS OF A SYSTEM:
In most cases, systems analysts operate in a dynamic environment where
change is a way of life. The environment may be a business firm, a business
application, or a computer system. To reconstructs a system, the following key
elements must be considered:
2. Processor(s).
3. Control.
4. Feedback.
5. Environment.
18
Processor(s):
The processor is the element of a system that involves the actual
transformation of input into output. It is the operational component of a system.
Processors may modify the input totally or partially, depending on the
specifications of the output. This means that as the output specifications
change, so does the processing. In some cases, input is also modified to enable
the processor to handle the transformation.
Control:
The control element guides the system. It is the decision-making
subsystem controls the pattern of activities governing input, processing and
output. In an organizational context, management as a decision-making body
controls the inflow, handling and outflow of activities that affect the welfare of
the business. In a computer system, the operating system and accompanying
software influence the behaviors of the system... Output specifications
determine what and how much input to needed to keep the system in balance.
In system analysis, knowing the attitude of the individual who controls the
area for which a computer is being considered can make a different between the
success and failure of the installation.
Feedback:
Control in a dynamic system is achieved by feedback. Feedback measures
output against a standard in some form of cybernetic procedure that includes
communications and control.
19
Feedback may be positive or negative, routine or informational.
Reinforces the controller with information for action. In system analysis,
feedback is important in different ways. During analysis, the user may be told
that the problems in a given application ways. During analysis, the user may be
told that the problems in a given application verify his/her initial concerns and
justify the need for change. Another form of feedback comes after the system is
implemented. The user informs the analyst about the performance of the new
installation. This feedback often results in enhancements to meet the user’s
requirements.
Environment:
The environment is the “super system” within which an organization
operates. It is the source of external elements that impinge on the system. In
fact, it often determines how a system must function.
Each system has boundaries that determine its sphere of influence and
control, although in an integrated banking wide computer system design, a
customer who has a mortgage and a checking account with the same bank may
write a check through the “teller system” to pay the premium that is later
processed by the “mortgage loan system”. Recently, funds from a bank account
to pay bills and other obligations to creditors, regardless of distance or location.
This means system analysis, knowledge of the boundaries of a given system is
crucial in determine the nature of its interface with other systems for successful
design.
20
The database is an organized collection of related information
organization information is necessary for database. Any unorganized
information is just a pile or dump, and it cannot be called a database.
Organized information or database serves as an information base and we can
use it for below: -
Recognize information
Processing information
For building database the software, which is generally used, is called the
Data Base Management System (DBMS). As the name suggest, it is used to build
and manage the database, i.e. add change, delete and sort information in the
database to keep the database up to date. DBMS also helps to retrieve the
desired information in the required format from the database.
Speed
Accuracy
Reliable
Economically
21
Computer does not make mistakes. Hence the processing had done by
them can be far more accurate reliable then that done by persons. However
adequate control methods have to be uncorrupted to ensure that the transaction
processing software and transaction processing software and transaction data
feed into the computer are correct. As the volume of transaction to be
processed increase computer based transaction-processing system becomes
22
OBJECTIVE AND SCOPE OF THE PROJECT
The computerized book banking system can maintenance application for a book
bank should have all the data pertaining to all the students. The system should
have records of the entire students who issued the books. It has all the records
of the total number of books available with their bill no., book code, price and
name of the author. It also shows the status of the book whether it is issued or
not.
To add the new member we have to enter his name, address and phone number.
We can modify and edit the records easily and save the new records. It also
shows the entire list of all the members and books with their additional
information in the form of table. Every book and member has his particular code
number. Wecan access them with their code number. If we are accessing the
record and we don’t know the code number then it facilitates us with the code.
23
TOOLS AND ENVIORNMENT
ANALYSIS AND DESIGN TOOLS-:
DATA DICTIONRIES-:
A data dictionary defines each term (called a data element) encountered during
analysis and design of a new system. Data elements can describe files, dataflow
or processes.
24
DECISION TABLES AND TREES-:
Decision tables and trees are developed long before the widespread use if
computers. They only isolate many conditions and possible actions, but they
help ensure that nothing has been overloaded. A decision table may be
visualized as a cluster of selective connections. It lists each condition to be
taken into consideration. The basis format of a decision table consists of two
rectangles placed one above other. The upper rectangle is meant for containing
“conditional statements” and the lower is meant for “action statements”.
Process
Data File (Data Stores)
Data Flows
Terminator
1-PROCESS: -
Processes are also called by function and are show as circle or bubbles in
the diagram function perform input into output.
2-DATA FLOWS: -
Data flows are show by curved direction is a data flow presents the data
that flows from one components of the system to the other.
25
3-DATA STORES: -
Two parallel lines show data stores. A data stores represent a collection
of data items of it types that the system needs to remember over a period of
time.
4-TERMINATORS: -
Terminators are also called external entities and show as rectangle.
Terminators represent and external entities from witch the system either
receives input data or output data external entities are outside the boundary of
the system. They belong to the environment.
26
LANGUAGE USED
INTRODUCTION TO LANGUAGE: -
WHAT IS OBJECT-ORIENTED ?
Superficially the term “object-oriented” means that we organize
software as a collection of discrete objects that incorporate both
data structure and behavior. This is in contrast to conventional
programming in which data structure and behavior are only loosely
connected. There is some dispute about exactly what characteristics
are required by and object-oriented approach, but they generally
include four aspects: identity, classification, polymorphism, and
inheritance.
CHARACTERISTICS OF OBJECTS -:
27
OBJECT-ORIENTED METHODOLOGY-:
System design: The system designer makes high-level decisions about the
overall architecture during system design; the target system is organized
into subsystems based on both the analysis structure and the proposed
architecture. The system designer must decide what performance
characteristics to optimize, choose a strategy of attacking the problem,
and make tentative resource allocations. For example, the system designer
might decide that changes to the workstation screen must be fast smooth
even when windows are moved or erased, and choose an choose an
appropriate communications protocol and memory buffering strategy.
28
OBJECT DESIGN:
The object designer builds a design model base on the analysis model but
containing implementation details. The designer adds details to the design
model in accordance with the strategy established during system design.
The focus of object design is the data structures and algorithms needed
to implement each class. The object classes from analysis are still
meaningful, but they are augmented with computer-domain data structures
and algorithms chosen to optimize important performance measures. Both
the application-domain objects and the computer-domain objects and the
computer-domain objects are described using the same object-oriented
concepts and notation, although they exist on different conceptual planes.
For example, the window class operations are now specified in terms of
the underlying hardware and operating system.
IMPLEMENTATION:
The object classes and relationships developed during object design are
finally translated into a particular programming language, database, or
hardware implementation. Programming should be a relatively minor and
mechanical part of the development cycle, because all of the hard
decisions should be made during design. The target language influences
design decisions to some extent, but design should not depend on fine
details of a programming language. During implementation, it is important
to follow good software engineering practice so that tractability to the
design is straight forward and so that the implemented system remains
flexible and extensible. For example, the window class would be coded in
a programming language, using calls to the underlying graphics system on
the workstation.
29
OBJECT-ORIENTED THEMES-:
ABSTRACTION-:
ENCAPSULATION-:
30
One may want to change the implementation of object-oriented
languages, but the ability to combine data structure and behavior in a
single entity makes encapsulation cleaner and more powerful than in
conventional languages that separate data structure and behavior.
INHERITANCE-:
POLYMORPHISM-:
31
CHARACTERISTICS OF OOP
Behavior: What the object does or what is capable of doing? For example, a
person can sit, stand, sleep, walk, talk etc. Similarly, a cup can be filled, drunk
from, washed, broken etc.
The following objects can be recognized as bottles. These objects have been
classified as belonging to a group or class on the basis of commonality of
possible states and behaviors. In simple words we can say that the objects
belong to a class called bottles sharing common states and behaviors.
In software, we can describe objects by defining the possible common states
and behaviors of all objects of a particular type in the form of a class. A class is
also called as an abstract data type, ADT. Thus, the common elements of a set
of objects, which allow us to classify them, are represented by an ADT.
32
PROGRAMMING ENVIORMENT-:
TURBO C++
VERSION 3.BORLAND INTERNATION
33
ANALYSIS DOCUMENT
PRLIMINARY INVESTIGATION-:
FACT FINDING TECHIQUES
FEASIBILITY STUDY
Normally more than one of these techniques are used to ensure accurate
investigation. Important points of each of these techniques are listed
below:
Interviews-:
Analysts use interviews for collection of information from individuals or
groups who are generally current users of the existing system or potential
users of the proposed system. They may be managers or employees who
provide data for the proposed system or who will be affected by it.
Interview is a time consuming method. It is the best source of qualitative
information (opinions, policies, and subjective descriptions of activities and
problems).
Interviews allow analysts to discover areas of misunderstanding,
unrealistic expectations and even indications of resistance to the proposed
system.
34
Interviews could be:
Structured
Open response format.
Here the questions are answered in ones own words.
Close response format
Here set of prescribed answers are used.
Or
Unstructured
Here the questions are worded to suit respondent and may produce
information about areas overlooked and which could be important.
Questionnaires-:
The use of questionnaires allows collection of data from large
number of persons.
Standardized question formats yield more reliable data where the
responses could be more honest. In this method the Analyst cannot
observe reactions or expressions of respondents.
Questionnaires could be Open-ended or Closed questionnaires. Open-ended
are used to learn feelings, opinions, and general experiences on process
detail or problem. Closed questionnaires course specific responses which
have to selected. Questionnaires need to be printed and hence it is costly
method.
RECORD REVIEW -:
Many kinds of records and reports provide valuable information
about organization and operations. Records include written policy manuals,
regulations, standard operation procedures used by the organization a
guide. These do not show actual activities, where decision-making power
lies or how tasks are performed. They help in understanding the system–
while observing the current reports one should scrutiny the data present
in them.
35
OBSERVATION -:
This method helps to obtain first hand information on how
activities are being carried out. It is useful when analysts need to
observe how processes are carried out, and whether specified steps are
actually followed. One should know what to look for and how to
assess the significance of what is observed.
FEASIBLIITY STUDY-:
The purpose of this phase is to produce a feasibility study
document that evaluates the costs and benefits of the proposed
application. To do so, it is first necessary to analyze the problem, at least
at a global level. Obviously, their costs, and their potential benefits to the
user. Therefore, ideally, one should perform as much analysis of the
problem as is needed to do well-founded feasibility study.
Its result is a document that should contain at least the following items: -
A definition of the problem.
Alternative solution and their expected benefits.
Required resources, costs, and delivery dates in each proposed alternative
solution.
A possible checklist of the contents of the requirements specification
document that might guide in its production is the following:
Functional requirements-:These describe what the product does by using
informal, semiformal, formal notations, or a suitable mixture.
Non-functional requirements-: These may be classified into the following
categories: reliability (availability, integrity, security, safety, etc.), accuracy
of results, performance, human-computer interface issues, operating
constraints, physical constraints, portability issues, and others.
Requirements on the development and maintenance process. These include
quality control procedures-in particular, system test procedure-priorities of
the required functions, likely changes to the system maintenance
procedures, and other requirements.
36
RISK FACTORS:-
37
DETERMINATION OF SYSTEM REQUIRMENTS-:
SYSTEM DESIGN-:
After the feasibility study is done, a formal acceptance of the
proposed system is taken from the user. The feasibility report is then
taken as the basis for the next activity.
The next activity is Determination of systems requirements, which involves
studying the current business system in great detail, to find out how it
works and where improvements have to be made. A requirement is a
feature that must be included in a new system. It may include a way of
capturing or processing data, producing information, controlling a business
activity, or supporting management.
The determination of requirement thus includes studying the existing
system and collecting data about it to find out what the requirements are.
This activity may be carried out in two phases.
DETAILED INVESTIGATION
The heart of systems analysis is aimed at having a detailed
understanding of all the important facts of the project under consideration.
Analysis working closely with employees and managers must be able to
answer the following key questions: -
What is being done by the current system?
How it is being done?
How frequently does it occur?
How big is the volume of transactions or decisions?
How well is the task being performed?
Does a problem exist?
If a problem exists, how serious it is?
If a problem exists, what is the underlying cause?
38
To answer the above questions systems talk to a variety
of people to gather details about the project. Questionnaires are used to
collect this information from large groups of people who cannot be
interviewed individually.
Detailed investigations also require the study of manuals and
reports, actual observations of work activities and collection of existing
forms and documents to fully understand the project.
As the details are gathered, the analyst studies the requirements
and identifies features the new system should have. The feature include
the information the system should produce and operational feature such
as processing controls, response times and input and output methods.
39
ANALYSIS OR DETERMINATION OF SYSTEMS REQUIREMENTS-:
40
REQUIREMRENT ANALYSIS
System Requirement-:
Software:—The Software requirements are:
Operating System: - Dos, Win-95, Win – 98, Win-2000.
Hardware Requirement: - Ram -64Mb, Hardisk-2GB
People- The people should be computer literate so they can handle the
project well.
Database – all the databases which contains the relevant data to be
stored and fleshed.
Documentation- It will contain all the information about the project like
DFD, E-R diagram, Context Free Diagram,
Procedures- It will contain the small parts of the program which perform
some specific functions.
41
PERFORMANCE REQUIREMENTS
ERROR HANDLING— the project must be handling each and every type of
errors that the execution that is project must be capable of handling
exceptions also.
Safety and Robustness— a safety means the project must be reliable so
that is it provide every type of quality and it will not fail at any time.
42
PRODUCT OPERATION-:
43
system uses too much memory, it may affect the other applications that
are run on the same system, or it may run slowly while the operating
system tries to balance the memory usage of the different applications.
PRODUCT REVISION -:
VERIFIABILITY-:
A software system is verifiable if its properties can be verified
easily. A common technique for improving verifiability is the use of
“software monitors”, that is code inserted in the software to monitor
various qualities such as performance or correctness.
Modular design, disciplined coding practices, and the use of an
appropriate programming language all contribute to verifiability.
Verifiability is usually an internal quality, although it becomes an
external quality also. For e.g., in many security-critical application, the
customer requires the verifiability of certain properties. The highest level
of the security standard for a “trusted computer system” requires the
verifiability of the operating system kernel.
MAINTANANCE -:
44
distressing to discover that so much effort was being spent on fixing
defects. Software maintenance is divided into three categories: corrective,
adaptive and perceptive maintenance.
Corrective maintenance has to do with the removal of residual errors
present in the product when it is delivered as well as errors introduced
into the software during its maintenance. Corrective maintenance accounts
for about 20 percent of maintenance costs.
Adaptive maintenance involve adjusting the application to changes in
the environment. In other words, in adaptive maintenance need for
software changes cannot be attributed to a feature in the software itself,
such as the presence of residual errors or the inability to provide some
functionality required by the user. Rather, the software must change as
the environment in which it is embedded changes.
REPAIRABILITY-:
A software system is repairable if it allows the correction of its
defects with a limited amount of work. In many engineering works,
Reparability is major goal. For e.g., automobile engines are built with the
parts that are most likely to fail as the most accessible. In computer
hardware engineering, there is a subspecialty called reparability, availability,
and serviceability (RAS).
45
CLASSIFICATION OF SOFTWARE QUALITIES
There are must desirable qualities. Some of these apply both to the
product and to the process used to produce the product. The user wants
the software product to be reliable, efficient, and easy to use. The
producer of the software wants it to be verifiable maintainable, portable,
and extensible. The manager of the software project wants the process of
software development to be productive and easy to control.
PRODUCT TRANSITION-:
REUSABILITY: -
Reusability is a key factor that characterizes the maturity of an
industrial field. We see high degrees of reusability in such mature areas
as the automobile industry and consumer electronics. For example, in
automobile industry, the engine is often reused from model to model.
Moreover, a car is constructed by assembling together many components
that are highly standardized and used across many models produced by
the same industry. Finally, the manufacturing process is often reused. The
low degree of reusability in software is a clear indication that the field
must evolve to achieve the status of a well-established engineering
discipline.
PORTABILITY: -
Portability refers to the ability to run a system on different hardware
platforms. As the ratio of many spent on software versus hardware
increases, portability gains more importance. Portability can be important
because of the variations in memory capacity and additional instructions.
One way to achieve portability within one machine architecture is to have
the software system assume a minimum configuration as far as memory
capacity is concerned and use a subset of the machine facilities the are
guaranteed to be available on all models of
the architecture.
46
INTEROPERABILITY: -
Interoperability refers to the ability of a system to coexist and
cooperate with other systems- for example, a word-processor’s ability to
incorporate a chart produced by a graphing package, or the graphics
package’s ability to graph the data produced by a spreadsheet, or the
spreadsheet’s ability to process an image scanned by a scanner.
47
DESIGN DOCUMENT
SYSTEM DESIGN-:
48
Limitations that help to bound the system. For example, an aircraft
avionics system is being modeled for a next generation aircraft. Since the
aircraft will be a two-engine design, the monitoring domain for propulsion
will be modeled to accommodate a maximum of two engines and
associated redundant systems.
Constraints that will guide the manner in which the model is created and
the approach taken when the model is implemented. For example, the
technology infrastructure for the three-dimensional rendering system
described previously is a single G-based processor. The computational
complexity of problems must be constrained to fit within the processing
bounds imposed by the processor.
Preferences that indicate the preferred architecture for all data,
functions, and technology. The preferred solution sometimes comes into
conflict with other restraining factors. Yet, customer satisfaction is often
predicted on the degree to which the preferred approach is realized.
49
COMPARISON OF DESIGN NOTATION
50
Logic verification: Automatic verification of design logic is a goal that is
paramount during software testing. Notation that enhances the ability to
verify logic greatly improves testing adequacy.
“Code-to” ability: The software engineering task that follows component-
level design is code generation.
51
DATABASE DESIGNING
Database of this hotel automation system is based on .dat file features of the C+
+ programming environment. In this project we have create some .dat files. Here
is the description of these files and how they are organized-:
1. BOOK.DAT-:
FIELD USED-:
Integer ----Bookcode:
Character----Name
Character----Status
Character----Author
Character----Billno
Float----Price
52
2. TEMP.DAT
FIELD USED-:
Character----memname
Character----Address
Character----Phone
Character----Name
Character----Status
Float----Price
TABLE:-TEMPORARY
53
MEMBER.DAT-:
FIELDS USED-:
Integer----Memcode
Integer----Bookcode
Character----Name[30]
Character----Phone[8]
Character----Address.
Integer----dd
Integer----mm
Integer----yy
7 2 BYTE
MM INTEGER RETUNING MONTH OF
THE BOOK
8 2 BYTE
YY INTEGER RETUNING YEAR OF THE
BOOK
54
TESTING & DEBUGGING
PROGRAM TESTING-:
A program represents the logical elements of a
system. For a program to run satisfactorily, it must compile and test data
correctly and tie in properly with other programs. It is the responsibility of a
programmer to have error free programs.
STRING TESTING-:
Program is invariably related to one another and interacts
in total system. Each program is tested to see whether it conforms to related
programs in the system. Each part of the system is tested against the entire
module with both test and live data before the whole system is ready to be
tested.
SYSTEM TESTING -:
System testing is designed to uncover weaknesses
that were not found in earlier tests. This includes forced system failure and
validation of total system, as its user in the operational environment will
implement it. Under this testing, generally we take low volumes or
transactions type is reached.
55
system’s procedures operate to system specifications and that the integrity
of important data is maintained. Performance of an acceptance test is
actually the user’s show. User motivation is very important of the successful
performance of the system. After that a comprehensive test report is
prepared. This report shows the system’s tolerance performance range, error
rate and accuracy.
STORAGE TESTING-:
It determines the capacity of the system too store
transaction data on a disk or in other files. For example verifier
documentation statements that the system will store 10,000 records of 400
bytes length on a single flexible disk.
PERFORMANCE TESTING-:
It determines the length of time system used by
the system to process transaction data. This test is conducted prior to
implementation to determine how long it takes to get a response to an
inquiry, make a backup copy of a file, or send a transmission and get a
response.
Recovery testing-:
This testing determines the ability of user to recover
data or restart system after failure. For example, load backup copy of data
and resume processing without data or integrity loss.
56
DESIGNING TEST DATA-:
The proper designing of test data is as important as the test itself. If test data as
input are not valid or representation of the data to be provided by the user, then
the reliability of the output is doubtful. Test data may be live or artificial. The live
data is that which is actually extracted from the users files. After a system is
partially constructed the programmers or analysts as the users to key in set of
data from their normal activities. It is difficult to obtain live data in sufficient
amount to conduct extensive testing.
The artificial tests data is created solely for test purposed. Properly created
artificial data should provide all combinations of values and formats and make it
possible to test all logic and control paths through the program. Unlike live data,
which are biased toward typical values, artificial data provide extreme values of
testing the limits of the proposed system. A test case is a set of data that the
system will process as normal input. However, the quantities to be withdrawn
from inventory exceed, equal and ate less than the actual quantities to be
withdrawn from inventory exceed, equal and are less than the actual quantities
on hand. Each test case is designed with the intent of finding errors in the way
the system will process it. There are two general strategies for testing software:
Code testing, and specification testing. In code testing, the analyst develops
those cases to execute every instructions and path in program. Under
specification testing that cases to execute every instruction and path in a
program. Under specification testing the analyst examines the program
specification and then writes test data to determine how the program operates
under specific conditions.
57
THE DEBUGGING PROCESS :-
The symptom and the cause may be geographically remote. That is the
symptom may appear in one part of a program, while the cause may actually
be located at a site that is far removed. Highly coupled program structures
exacerbate this situation.
58
EFFORT DISTRIBUTION WITH PHASE
A typical software product may take a few months to a few years for
development, and is in operation for five to twenty years before if is retired. For
software, the cost of development is the cost incurred during requirements
analysis, design, coding and testing. Thus the development cost is total cost
incurred before the product delivery. The cost of maintenance is the cost of
modifying the software due to residual faults in the software for enhancing or
for updating the software. The cost is spread over the operational years of the
software. Software engineers generally agree that the total cost of maintenance
is more than the cost f development of software. The ratio of development to
maintenance cost has been various suggested as 40/66, 30/70, or even lower.
However it is generally accepted that the cost of maintenance is likely to be
higher than the development cost, this is significant because in most
development projects, the developers are most concerned with reducing the
development cost and are often not at all concerned with the maintenance cost.
Since maintenance depends critically on the software characteristics that are
decided during development , maintenance costs can be reduced if maintenance
concept is kept in the forefront during development. One of the reasons why
this is often not done is that the development cost is borne by the developers
while maintenance is often done by the users hence. The developers do not
have much incentive for increasing the developed effort. In order to reduce the
maintenance cost. However for reduction in overall cost of software, it is
imperative that maintenance cost. However for reduction in overall cost of
software, it is imperative that the software be developed so maintenance is cays.
The exact number will differ with organization and the type of the project.
59
ERROR DISTRIBUTION :-
60
SECURITY OF SYSTEM
Lighting the rule require careful planning operators and maintenance engineer
should be provided with sufficient late in the right place without excising
contrast.
(2) Earthing:- Good earthling for computer installing is require considering the
nuisance that stray pick-up can cause in data processing “Electrical Growth” for
the equipment should be draw from a separately constructed earthling pit.
(4)Electrical Requirements:-
Security is the most part of the any software. so any endures cannot
open the software. this is must essential because we works daily in many
users.
61
Any endures open our software and changes the our data. so safety of
our project we use the some security option.
In our project we plant a form for security. when a user opens this project
then first run the security form. in this form we put the user name and user
password. if we know the user name or password then we open the our project.
If a user that did not know the username and password that did not open
the software. so we protect the our software using the security option.
If we want to change the user name and password then we click on the
change button before this we put the old username and user password then
click on the change button then a new text box is paper . in the new text box we
put the new password and click on the update button then the user password
has been changed.
Next time when we start the our software then we put the new username
and password if password is correct then open the project the project and we
work the successfully in our software.
62
H/W AND S/W SPECIFICATION
Processor : Pentium4
RAM : 256 MB
Hard disk : 80 GB
Mouse : Multimedia
63
H/W & S/W SPECIFICATION FOR RUN THE PROJECT
RAM = 16 MB
HARD DISK = 20 MB
VGA
LANGUAGE = Turbo C+ +
64
DATA FLOW DIAGRAMS
PROCESS AND COMPLING
System Ready
C++
Compiler Compile Source Program
Synta Yes
x
Error
?
No Object Code
System
Library Link with the System Library
Data Error
Logic
Data
Errors?
No Error
CORRECT OUTPUT
STOP
65
FUNCTIONAL DIAGRAM
CHECK DETAILS
UPDATE RECORDS
SEARCH RECORDS
AUTOMATED
USER SYSTEM
66
CONTEXT LEVEL DATA FLOW DIAGRAM
1-
Intro
duca
tion
2-
Add
Book
3-
Add
Mem
ber
4- User
User
List
Boo
5-
k
List
Me
6-
mbe
Edit
r
7-
Exit
67
2. Addition of Book
Generate
New
BOOK.DAT
User Book
Code
Information
Book.Dat
68
3. Addition of Members
Accept User
User Related
Information
MemberDat
69
4. List of Books
Book.Dat
70
5. List of Members
Member.Dat
71
6. Edit Menu
6.1
6.0
Books 6.2 Exit
Members
72
7.1 Editing for Books
7.1(a)
7.1(c)
Modify 7.1(b) Exit
Delete
73
8.1(a) Modification of Books Record
Check Valid
Book.Dat for Book
Book Code
Code
Invalid
Book
Code
Display
Book.Dat The
Records
User
No
Conformation
Accep Ye
t s
Book.Dat New
Info.
74
8.1(b) Deletion of Books Record
Check Valid
Book.Dat for Book
Book Code
Code
Invalid
Book
Code
Display
The
Book.Dat Records
No User
Conformation
Yes
Delete
The
Record
75
8.2 Editing for Members
8.2(a)
8.2(c)
Modify 8.2(b) Exit
Delete
76
8.2(a) Modification of Members Record
Check Valid
for Membe
MemberDat
Member r ID
Id
Invalid
Member
Id
Display
Member.Dat The
Records
User
No
Conformation
Accep Ye
t s
Mem.Dat New
Info.
77
8.2(b) Deletion of Members Record
Invalid
Member
Id
Code Display
Member.Dat The
Records
User
No Conformation
Yes
Delete
The
Record
SCREEN SHOTS
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
LIMITATION OF THE PROJECT
The limitation of project is that only ten thousands records can be store
at a time however this number can be store at a time however this
number can be increased in future by making slightly change in the
project.
Data may be lost if the system is not closed properly. Such accidental
deletion of data may cause problem.
Power failure is also another problem because it may terminate the
transaction that are not stored or saved.
94
BIBLOGRAPHY
[V. K. Jain] System Analysis & MIS, Khanna Book Company Ltd.
95