Ip Project Completed
Ip Project Completed
INFORMATICS PRACTICES
PROJECT FILE
ANIKET PRAKASH
CLASS:12TH A
TABLE OF CONTENT
S NO. TOPIC PAGE
1 ACKNOLEDGEMENT 4
2 INTRODUCTION 5
3 OBJECTIVE OF THE PROJECT 5
4 PROPOSED SYSTEM 6
5 SYSTEM DEVELOPMENT LIFE 7
CYCLE
6 PHASE OF SYSTEM 8
DEVELOPMENT LIFE CYCLE
7 SOURCE CODE 14
8 OUTPUT 18
9 TESTING 21
10 HARDWARE AND SOFTWARE 23
11 INSTALLATION PROCEDURE 24
12 BIBILOGRAPHY 25
ACKNOWLEDGEMENT
Apart from the efforts of me, the success of any project depends largely on the
encouragement and guidelines of many others. I take this opportunity to express my
gratitude to the people who have been instrumental in the successful completion of this
project
I express deep sense of gratitude to almighty God for giving me strength for the successful
completion of the project
I express my heartfelt gratitude to my parents for constant encouragement while carrying
out this project
I gratefully acknowledge the contribution of the individuals who contributed in bringing this
project up to this level, who continues to look after me despite my flaws.
I express my deep sense of gratitude to the luminary The Principal, Kendnya Vidyalaya
Bairagarh who has been continuously motivating and extending their helping hand to us
I express my sincere thanks to the academician The Vice Principal, Kendriya Vidyalaya
Bairagarh, for constant encouragement and the guidance provided during this project
This prevents a lot of time and money The work becomes fully automated and any
information regarding the organization can be obtained by clicking the button Moreover,
now it's an age of computers of and automating such an organization gives the better look
SYSTEM DEVELOPMENT LIFE CYCLE(SDLC)
The systems development life cycle is a project management technique that divides complex projects into smaller
more easily managed segments or phases Segmenting project sallows managers to venfy the successful completion
of project phases before allocating resources to subsequent phases
Software development projects typically include initiation, planning design development, testing, implementation,
and maintenance phases. However, the phases may be divided differently depending on the organization involved
For example, initial project activities might be designated as request requirements-definition, and planning phases,
or initiation, concept-development and planning phases End users of the system under development should be
involved in reviewing the output of each phase to ensure the system is being built to deliver the needed functionality
PHASES OF SYSTEM DEVELOPMENT LIFE CYCLE
INITIATION PHASE
The Initiation Phase begins when a business sponsor identifies a need or an opportunity
Careful oversight is required to ensure projects support strategic business objectives and resources are effectively
implemented into an organization's enterprise architecture. The initiation phase begins when an opportunity to add,
improve, or correct a system is identified and formally requested through the presentation of a business case. The
business case should at a minimum, describe a proposal's purpose, identify expected benefits, and explain how the
proposed system supports one of the organization's business strategies. The business case should also identify
alternative solutions and detail as many informational functional and network requirements as possible.
SYSTEM CONCEPT DEVELOPMENT PHASE
The System Concept Development Phase begins after a business need or opportunity is validated by the
Agency/Organization Program Leadership and the Agency/Organization CIO
PLANNING PHASE
The planning phase is the most critical step in completing development acquisition, and maintenance projects
Careful planning, particularly in the early stages of a project, is necessary to coordinate activities and manage project
risks effectively The depth and formality of project plans should be commensurate with the characteristics and risks
of a given project Project plans refine the information gathered during the initiation phase by further identifying the
specific activities and resources required to complete a project
A critical part of a project manager's job is to coordinate discussions between user, audit, security, design,
development, and network personnel to identify and document as many functional, security and network
requirements as possible During this phase, a plan is developed that documents the approach to be used and
includes a discussion of methods, tools, tasks, resources, project schedules, and user input Personnel assignments,
costs, project schedule, and target dates are established
A Project Management Plan is created with components related to acquisition planning, configuration management
planning, quality assurance planning, concept of operations, system security verification and validation and systems
engineering management planning
REQUIREMENTS ANALYSISPHASE
This phase formally defines the detailed functional user requirements using high-level requirements identified in the
Initiation System Concept and Planning phases It also delineates the requirements in terms of data system
performance secunty and maintainability requirements for the system. The requirements are defined in this phase
to a level of detail sufficient for systems design to proceed They need to be measurable testable, and relate to the
business need or opportunity identified in the initiation Phase The requirements that will be used to determine
acceptance of the system are captured in the Test and Evaluation Master Plan
IMPLEMENTATION PHASE
This phase is initiated after the system has been tested and accepted by the user In this phase the system is
installed to support the intended business functions. System performance is compared to performance
objectives established during the planning phase Implementation includes user notification user training
installation of hardware installation of software onto production computers, and integration of the system
into daily work processes. This phase continues until the system is operating in production in accordance
with the defined user equirement
conn=sql.connect (host='localhost',user='kskartik3829',password='38293829',database='tony_bank')
if conn.is_connected():
print('connected succesfully')
cur=conn.cursor()
cur.execute ('create table customer_details(acct_no int(12) not null primary key,acct_name varchar(25) not
null,phone_no int(10) not null, address varchar(25) not null,cr_amt float(25) not null);')
menu.py
import mysql.connector as sql
cur=conn.cursor()
conn.autocommit - True
print('2.TRANSACTION')
print('4.TRANSACTION DETAILS')
print('5.DELETE DETAILS')
print('6 QUIT')
if n ==1:
cur.execute(V_SQLInsert)
conn.commit()
if n==2:
acct_no=int(input('Enter Your Account Number='))
data=cur.fetchall()
count=cur.rowcount
conn.commit()
if count == 0:
else:
print('2.ADD AMOUNT')
if x==1:
conn.commit()
if x==2:
conn.commit()
if n==3:
if cur.fetchone() is None:
else:
data=cur.fetchall()
print('ADDRESS=', row[3])
print('cr_amt=', row[4])
if n== 4:
print()
if cur.fetchone() is None:
print()
else:
data=cur.fetchall()
print()
print('DATE=',row[1])
print()
print('WITHDRAWAL AMOUNT=',row[2])
print()
print()
if n==5:
if n==6:
quit()
main.py
import mysql.connector as msql
cur = conn.cursor()
print('1.REGISTER')
print('2.LOGIN')
n=int(input('enter your choice='))
if n==1:
name=input('Enter a Username=')
V_SQLInsert="INSERT INTOuser_table(passwd, username) values (" + str (passwd) +"+name+" ") "
cur.execute (V_SQLInsert)
conn.commit()
if n==2:
V_Sql_Sel="select * from user_table where passwrd=',"+str (passwd)+",' and username= "+name+" ' "
cur.execute (V_Sql_Sel)
if cur.fetchone() is None:
else:
import main.py
OUTPUT
MENU PAGE
2020-01-01 10:38:14.014927
1.REGISTER
2.LOGIN
2. TRANSACTION
3.CUSTOMER DETAILS
4. TRANSACTION DETAILS
5.DELETE ACCOUNT
6.QUIT
2. TRANSACTION
3. CUSTOMER DETAILS
4. TRANSACTION DETAILS
S.DELETE ACCOUNT
6.QUIT
2. TRANSACTION
3 CUSTOMER DETAILS
4 TRANSACTION DETAILS
5 DELETE ACCOUNT
6.QUIT
1 WITHDRAW AMOUNT
2.ADD AMOUNT
TRANSACTION DETAILS
2. TRANSACTION
3. CUSTOMER DETAILS
RIDING
ACCOUNT NO-6009
DATE-2020-01-01
AMOUNT ADDED=O
TESTING
Software Testing is an empirical investigation conducted to provide stakeholders with information about the quality
of the product or service under test[1] with respect to the context in which it is intended to operate Software Testing
also provides an objective independent view of the software to allow the business to appreciate and understand the
risks at implementation of the software Test techniques include but are not limited to, the process of executing a
program or application with the intent of finding software bugs
It can also be stated as the process of validating and verifying that a software program/application/product meets
the business and technical requirements that guided its design and development, so that it works as expected and
can be implemented with the same characteristics Software Testing, depending on the testing method employed,
can be implemented at any time in the development process, however the most test effort is employed after the
requirements have been defined and coding process has been completed
TESTING METHODS
Software testing methods are traditionally divided into black box testing and white box testing These two
approaches are used to describe the point of view that a test engineer takes when designing test cases
SPECIFICATION-BASED TESTING
Specification-based testing aims to test the functionality of software accordin to the applicable requirements [16]
Thus, the tester inputs data into, and only see the output from the test object This level of testing usually requires
thorough tes cases to be provided to the tester, who then can simply verify that for a given inpu the output value (or
behaviour), either "is" or "is not the same as the expected value specified in the test case Specification-based testing
is necessary, but it insufficient to guard against certain risks
That's why there are situations when (1) a black box tester writes many test cases to check something that can be
tested by only one test case and/or (2) some parts of the back end are not tested at all Therefore, black box festing
has the advantage of "an unaffiliated opinion" on the one hand, and the disadvantage of "blind exploring" of the
other
For example, the test designer can create tests to cause all statements in the program to be executed at least once
ATHALON(3800+-4200+ DUALCORE)
IV RAM 512MB+
SOFTWARE REQUIREMENTS:
Windows OS
Python
INSTALLATION PROCEDURE
Install python and mysql from the web
Open mysql and create the database
bank
Then run the table.py file
Next run the user table.py file
Then the transactions table.py file
Open the main bank file
Then register your account
BIBLIOGRAPHY
2. Website: https://www.w3resource.com
3.
https://en.wikipedia.org/wiki/E_(mathematic
al_constant)