Automobile Management System Project Report

Download as pdf or txt
Download as pdf or txt
You are on page 1of 80

AN

INTERNSHIP REPORT
ON
AUTOMOBILE MANAGEMENT SYSTEM
PROJECT
BY
KAMAL ACHARYA
(Tribhuvan University)
Date: 2022/05/25

1|Page
1. INTRODUCTION

1.1 OVERVIEW OF THE PROJECT

The proposed project is developed to manage the automobile in the automobile dealer
company. The main module in this project is login, automobile management, customer
management, sales, complaints and reports. The first module is the login. The automobile
showroom owner should login to the project for usage. The username and password are verified
and if it is correct, next form opens. If the username and password are not correct, it shows the
error message.

When a customer search for a automobile, if the automobile is available, they will be
taken to a page that shows the details of the automobile including automobile name, automobile
ID, quantity, price etc. “Automobile Management System” is useful for maintaining
automobiles, customers effectively and hence helps for establishing good relation between
customer and automobile organization. It contains various customized modules for effectively
maintaining automobiles and stock information accurately and safely.

When the automobile is sold to the customer, stock will be reduced automatically.
When a new purchase is made, stock will be increased automatically. While selecting
automobiles for sale, the proposed software will automatically check for total number of
available stock of that particular item, if the total stock of that particular item is less than 5,
software will notify the user to purchase the particular item.

Also when the user tries to sale items which are not in stock, the system will prompt
the user that the stock is not enough. Customers of this system can search for a automobile; can
purchase a automobile easily by selecting fast. On the other hand the stock of automobiles can
be maintained perfectly by the automobile shop manager overcoming the drawbacks of existing
system.

2|Page
1.2 DESCRIPTION OF MODULES

Major modules of the automobile management system are

 Login module
 Registration module
 Customer module
 Automobile module
 Sales module
 Delivery module
 Supplier module
 Reports module

Login Module

It is used for logging in the automobile showroom management. It is used for verifying
the user. Once the user is authenticated, they can access the system.

Registration Module

New user can register in order to use the full features of this system. Normal users can
also access the proposed system but with limited features. Only the registered users can get
more priorities than the unregistered guest user. Once the guest users register to this system,
they can also get full access to this system.

Customer Module

It is used for adding new customers and for updating existing customers. It is used for
storing new customers as well as for updating the customer’s details. The module is very useful
to find the number of customers who paid bill. Some customers might not pay the bills on time.

Customer details can be easily searched, so it will be easy to find bill payment details.
It has a primary key field named customerno. The file is very useful for maintaining customers.

3|Page
Automobile Module

It is used for adding new automobiles and for viewing, editing and deleting existing
automobiles. It is used for searching items in this system. Here the admin have the privileges
to search items in this system. Automobile details are stored with their brand name. When a
particular brand is being liked by people, that particular brand will be purchased and kept in
stock with large quantity.

Sales Module

It is used for adding sales details to proposed system. Here the admin have privileges
to add details in automobile showroom management. Sales reports can be viewed overall as
well as date wise, month wise and year wise.

Delivery Module

It is used for storing details of new deliveries in the automobile showroom management.
Admin can perform operations like monitoring automobile stock details, customer order details
and delivery details. Delivery reports can be viewed overall as well as date wise, month wise
and year wise.

Supplier Module

It is used for maintaining supplier details like supplier ID, name, contact person and
address and phone number. Supplier or dealer can be cancelled when their items are not being
sold out. It is very essential in order to get good stock items for a company.

Reports Module

It is used for generating various reports like cash order report, credit order reports and
payment reports. Sales and delivery reports can be viewed date wise, month wise and year
wise. Reports can be viewed based on the user’s choice.

4|Page
1.3 SYSTEM SPECIFICATION

1.3.1 HARDWARE SPECIFICATION

CPU : Intel Core i3

RAM : 32MB

Hard Disk : 5 GB

Monitor : 16 LG

Mouse : Logitech mouse

Keyboard : 104 Keys

Mother Board : Intel

Speed : 3.3 GHZ

1.3.2 SOFTWARE SPECIFICATION

Operating System : Windows 2007

Front End : Visual Basic

Back End : MS Access

Reports : Data Report

5|Page
1.4 SOFTWARE FEATURES

VISUAL BASIC 6.0

Visual basic is an ideal programming language for developing sophisticated


professional applications for Microsoft Windows. Visual basic programming introduces a
variety of features that make it easier to create powerful, flexible applications. It makes use of
Graphical User Interface for creating robust and powerful applications. The Graphical user
Interface uses illustration for text, which enables users to interact with an application.

Visual basic has evolved from the original BASIC language and now contains several
hundred statements, functions, and keywords, many of which relate directly to the Windows
Operating System includes,

 Multitasking
 Message driven architecture
 Dynamic linking
 CPU time slicing

Features of visual basic

 Easier comprehension
 User-friendliness
 Faster application development
 Introduction to Active-X technology
 Internet features
 Support OLE, which is a means of communication and gives application the power
to directly use and manipulate other windows application.
 Data Environment Designer, which provides an interactive design time
environment for creating programs with runtime access to data.

Integrated Development Environment

Integrated Development Environment (IDE) is a term commonly used in the


programming world to describe the interface and environment that is used to create
applications.
6|Page
IDE is commonly referred to as the design environment or the program. IDE is made
up of components such as menu bar, tool bar, object browser, form layout window, and form
designer.

In visual basic 6.0 IDE is a Multiple Document Interface (MDI) format. In Multiple
Document Interface format, the windows associated with the project will stay within a single
container known as the parent. Code and form based windows will stay within the main
container form.

Visual basic can be used to create the following types of applications.

 Standard EXE
 Active EXE
 ActiveX DLL
 ActiveX Control
 VB application wizard

Event driven programming

Visual basic allows adopting more of a parallel approach, with independent sections of
code for each option that the user may select. This is known as Event Driven Programming.
Event Driven Programming is based on the Message Driven Architecture of windows. Visual
Basic programs are built around events. Events are various things that can happen in program.
In Event Driven application, the program statements are executed only when a particular event
calls specific parts of the code that is assigned to the event.

For example consider textbox control and some of its events,

 Click event fires when text box control is clicked.


 Mouse move event is fired when mouse is moved over the text box.

Data access options

Microsoft visual data tools allow the ability to view and manipulate tables, views, stored
procedures, and database schemas on SQL server and Oracle systems. Visual Basic provides a
variety of options to access Remote Client/Server databases.

7|Page
ADO Object Model

Visual Basic supports ActiveX Data Objects Microsoft’s new, high level interface to
all kinds of data. ADO objects can be created at design- time using the updated Data
Environment Designer. ADO is an interface for both local and remote data access, remote and
disconnected record sets and hierarchical record sets. The ADO object model provides an easy-
to-use set of objects, properties, and methods for creating script that access data in databases.

ADO consists of seven objects, three of which are independent and four are dependent
objects. Independent objects can exist by themselves; dependent objects must exist in
connection with an independent object.

 Parameter
 Connection
 Command
 Record set
 Error
 Property
 Field

Purpose of choosing Visual Basic

 It is an ideal programming language for developing sophisticated professional


application for Windows.
 It makes use of Graphical User Interface for creating robust and powerful
applications.
 It uses illustration for text, which enables users to interact with an application.
 In GUI the options open to the user is much greater allowing more freedom to the
end user and developer.
 Major features are easier comprehension, faster application development and other
aspects such as ActiveX, Internet features and VB script.

8|Page
MS-ACCESS

Microsoft Access is a powerful database management system and the user can create
entire application that requires little or no programming. It supports GUI features and an entire
programming language, VBA (Visual Basic 6.0 for application). Access is easy enough to use
that in a short time beginners can manage their own data. In MS –Access, the database means
a collection of tables that hold data. It collectively stores all other object such as queries, forms
and reports that are used to implement the database management function effectively.

The MS-Access database can act as a back-end database for Visual Basic 6.0 as affront
end tool. MA Access supports the user with its powerful management functions. Beginners can
create their own database very simply with some mouse clicks. MS-Access database supports
so many data types when a user can incorporate data from other applications. A database
created in MS-Access can be accessed through Visual Basic 6.0 using data control.

Here database means a collection of related tables and a table means a collection of
number of records where a record means a collection of inter-related fields. It should be noted
that a field in an entity is used to describe straight. A single table can have any number of
indexed fields that can be used to locate records using an expression. This helps in filtering out
information according to specific criteria. A user can move inside a table very easily using the
navigator tools supported by the MS-Access database. A table can be accessed in a number of
ways like as a snapshot, dynast, etc.

9|Page
2. SYSTEM STUDY

2.1 EXISTING SYSTEM

All automobile details like available in the company are entered and managed in this
and managed. Price details and stock details of the automobiles are managed separately. The
customer details are entered to call the customer for further purchase of automobile. The
customer name, address and phone number details are managed separately. The details are
entered and edited by the administrator.

But everything is done manually. Most of the existing system is manual, so data
manipulations are not accurate and also processing time is slow. When the stock and
automobile count increases, manual manipulation of data becomes very difficult.

2.1.1 DRAWBACKS

Even though computerized system exists, there are various drawbacks. They are as
follows.

 User cannot search automobiles fast when the number of automobiles increases.
 Primary key fields should be used wherever necessary while designing in order to
manage database efficiently and for accessing information soon.
 Stock management is not efficiently done. User can only know when the stock is
empty. Prior information about stock is not possible.
 Takes much time for searching particular automobile details.
 Difficult to maintain automobile details and employee details
 Existing system is not accurate.
 Even though some existing systems are computerized, there occur redundancy
problems due to duplication of entries.
 If the automobile entries have duplicate values, it cannot be maintained properly
and accurately

10 | P a g e
2.2 PROPOSED SYSTEM

The proposed system is very useful for the employee and customers. It avoids the
overheads for the employee. They can minimize the working stress and can keep essential
documents related to the automobile and the passengers as a softcopy. The advantage of the
proposed system is the reduction in the cost of the office equipments and the transaction is
done quickly. Any employee can answer if any delivery for a particular customer in a particular
day is available or not.

The proposed project will allow the customers to perform certain activities like login
and searching for automobiles. Customers may open an account with the store if they wish
including a username and password. In login form users will be authenticated and it is also
possible to find whether they are customer or admin through their login information which was
entered. A customer must be logged in before searching for automobiles for purchase.

If a user attempts to login with incorrect details, they will be not be redirected to access
the application. When a customer search for a automobile, if the stock of the automobile is
available, they will be taken to a page that shows the details of the automobile including
automobile title, automobile ID, quantity, price etc in order for sale.

2.2.1 ADVANTAGES OF PROPOSED SYSTEM

Features of the proposed project are as follows.

 Stock management as well as automobile management is done very quickly as well


as efficiently in proposed project.
 Another feature added in the project is, when the regular customers purchase items
from automobile, software will automatically give them discount offers.
 Prepares and produces accurate outputs
 Reduces the time needed and expenses
 Makes the information flow efficient
 Easy report generation is possible
 Provides attractive user interface.
 Efficient searching of automobile details by just entering automobile code is
possible.

11 | P a g e
3. SYSTEM DESIGN AND DEVELOPMENT

3.1 FILE DESIGN

Flat File Database

A flat file database is a database designed around a single table. The flat file design puts
all database information in one table, or list, with fields to represent all parameters. A flat file
may contain many fields, often, with duplicate data that are prone to data corruption. If data
between two flat files have to be merged, it is needed to copy and PSMte relevant information
from one file to the other. There is no automation between flat files.

If two or more flat files that contain client addresses, it is required to manually modify
the address parameters in each file that contains that client’s information. Changing
information in one file has no bearing on other files. Flat files offer the functionality to store
information, manipulate fields, print or display formatted information and exchange
information with others, through email and over the Internet. Some flat files may be attached
to external files, such as text editors, to extend functionality and manage related information.

Relational File Database

A relational database, on the other hand, incorporates multiple tables with methods for
the tables to work together. The relationships between table data can be collated, merged and
displayed in database forms. Most relational databases offer functionality to share data:

 Across networks
 Over the Internet
 With laptops and other electronic devices, such as palm pilots
 With other software systems

Designing flat file databases is simple and requires little design knowledge. Flat files
can be developed using just about any database engine. Flat files can be created in relational
database engines by not taking advantage of relational design concepts. Designing a relational
database takes more planning than flat file databases. With flat files, it is possible to add
information, as you deem necessary.

12 | P a g e
With relational databases, it is required to be careful to store data in tables such that the
relationships make sense. Building a relational database is dependent upon the ability to
establish a relational model. The model must fully describe how the data is organized, in terms
of data structure, integrity, querying, manipulation and storage. Relational databases allow
defining certain record fields, as keys or indexes, to perform search queries, join table records
and establish integrity constraints.

Search queries are faster and more accurate when based on indexed values. Table
records can be easily joined by the indexed values. Integrity constraints can be established to
ensure that table relationships are valid. If the project is able to establish a one-to-many
relationship in the data tables, relational database should be used because a flat file is not
sufficient to handle the data processing needs. Relational databases offer more robust reporting
with report generators that filter and display selected fields.

Relational databases offer the capability to building own reporting modules. Most
relational databases also offer the capability to import and export data from other software.
There are three primary relational database systems, proprietary, open source and embedded.
Proprietary relational databases require the use of proprietary development languages, often
times, to complement SQL. Microsoft Access, for example, combines Visual Basic with SQL.
Open source databases, such as MySQL, are distributed freely to encourage user development.

Embedded, relational databases are packaged as part of other software packages, such
as with tax-preparation software packages. The vendor supplies the database, and all
manipulation tools, to control the database structure. These databases are, often times,
accompanied with tools to provide audit trails of transactions. Proposed project uses relational
database files implementing SQL queries in MS Access. So 1 to many relationships can be
established between tables and the table data can be accessed soon even in the non-indexed
locations.

13 | P a g e
3.2 INPUT DESIGN

Input is any data or instructions entered into the memory of a computer. Two types of
input are data and instructions. Data is a collection of unorganized items that can include words,
numbers, pictures, sounds, and video. A computer processes data into information, which is
organized, meaningful, and useful. Instructions can be in the form of programs, commands, or
user responses.

A program is a series of instructions that tells a computer how to perform the tasks
necessary to process data into information. A command is an instruction given to a computer
program. A user response is an instruction you issue to the computer by responding to a
question posed by a computer program. Any hardware component that allows entering data,
programs, commands, and user responses into a computer is an input device. Inputs of
Automobile Management System are eid, ename, qualification, automobileid, brand, cusid,
cusname and salary.

3.3 OUTPUT DESIGN

Output design involves specifying how production of on-screen reports and paper based
reports will occur. Output may occur to database or file for storing information entered or also
for use by other systems. Output is data that has been processed into a useful form called
information. Four types of output are text, graphics, audio, and video. Text consists of
characters (letters, numbers, punctuation marks, or any other symbol requiring one byte of
computer storage space) that are used to create words, sentences, and paragraphs.

Graphics are digital representations of non-text information such as drawings, charts,


photographs, and animation (a series of still images in rapid sequence that gives the illusion of
motion). Audio is music, speech, or any other sound. Video consists of images played back at
speeds to provide the appearance of full motion. An output device is any computer component
capable of conveying information to a user.

14 | P a g e
3.4 DATABASE DESIGN

Database is designed to manage large bodies of information. The management of data


involves both the definitions of structures for the storage of information. In addition the data
base system must provide for the safety of the information solved, despite system crashes or
due to attempts at unauthorized access. For developing an efficient database proposed project
have to fulfill certain conditions such as controlled redundancy.

 Defining the data


 Inputting the data
 Locating the data
 Accessing the data
 Communicating the data
 Revising the data

Objectives of Database design

In database design several objectives are designed such as:

 Ease of use
 Control of data integrity
 Control of redundancy
 Control of security
 Data independence (logical & physical)
 Data storage protection
 System performance
 System functions
 System compatibility

For achieving the abovementioned criteria’s we have to make use of various features
that are available with the RDBMS by enforcing integrity constrains, it is possible to ensure
data integrity and reduce data inconsistency to a great extent.

15 | P a g e
3.4.1 DATAFLOW DIAGRAM

A Data Flow Diagram (DFD) is a diagram that describes the flow of data and the
processes that change data throughout a system. It’s a structured analysis and design tool that
can be used for flowcharting in place of or in association with information. Oriented and
process oriented system flowcharts. Four basic symbols are used to construct data flow
diagrams. They are symbols that represent data source, data flows, and data transformations
and data storage. The points at which data are transformed are represented by enclosed figures,
usually circles, which are called nodes.

Data Flow Diagram Symbols

- Source or Destination of data

- Data Flow

- Process

- Storage

When analysts prepare the Data Flow Diagram, they specify the user needs at a level of
detail that virtually determines the information flow into and out of the system and the required
data resources.

16 | P a g e
The network is constructed by using a set of symbols that do not imply physical
implementations. The Data Flow Diagram reviews the current physical system, prepares input
and output specification, and specifies the implementation plan.

Steps to Construct Data Flow Diagrams

Four steps are commonly used to construct a DFD

 Process should be named and numbered for easy reference. Each name should be
representative of the process.
 The destination of flow is from top to bottom and from left to right.
 When a process is exploded in to lower level details they are numbered.
 The names of data stores, sources and destinations are written in capital letters.

Rules for constructing a Data Flow Diagram

 Arrows should not cross each other.


 Squares, circles and files must bear names.
 Decomposed data flow squares and circles can have same names.
 Draw all data flow around the outside of the diagram.

Level 0

Admin
Login Login
process

Automobile
management access

17 | P a g e
Level 1

Admin Login

Custome Supplier
Supplie
r r

Customers Product Product

18 | P a g e
Level 2

Admin Login

Custome Supplier
Supplie
r r

Customers
Product Product

Order Order

Sales and
Payment
payment

Sales Order Delivery


reports reports and
Payment
reports

19 | P a g e
3.4.2 DATABASE TABLES

Table name : user

Primary key : username

Field name Data type Description


username Text Username
password Text Password

Table name : cust_info

Primary key : cid

Field name Data type Description


Cid Text Customer ID
Cname Text Customer name
Caddress Text Address of the customer
Cgender Text Gender of the customer
Ccity Text City of the customer
Cpincode Number Pin code of the customer
Cphone Number Phone number of the customer
Clandline Number Landline number of the customer
Cemail Text Email ID of the customer

20 | P a g e
Table name : automobile

Primary key : vid

Field name Data type Description


Vid Text Automobile ID
Model Text Model of the automobile
Color Text Color of the automobile
Chassisno Text Chassis number
Engineno Text Engine number
Paymentoption Text Payment option
Srprice number Selling price

Table name : booking

Foreign key : cid, eid

Field name Data type Description


cid Text Customer ID
Cname Text Customer name
Caddress Text Address of the customer
Srid Text Showroom ID
Ino Text Insurance number
Eid Text Employee ID
Date Date/time Date of booking
Time Text Time of booking
Model Text Model of the automobile
Color Text Color of the automobile
Srprice Number Showroom price
Aprice Number Advance price
Bamount Number Balance amount

21 | P a g e
Table name : insurance

Primary key : policyno Foreign key : cid, eid

Field name Data type Description


Cid Text Customer ID
Cname Text Customer name
Caddress Text Address of the customer
Cphone Number Phone number of customer
Vid Text Automobile ID
Model Text Model of the automobile
Color Text Color of the automobile
Chassisno Text Chassi number of the automobile
Eid Text Employee number
Nname Text Nominee name
Iname Text Name of the insurance
Address Text Insurer address
Relationship Text Relationship with the nominee
City Text City of the insurer
Pincode Number Pin code of the insurer
Email Text Email ID of the insurer
Premium Number Premium amount
Vfrom Date/time Insurance from
Vto Date/time Insurance end date
Srid Text Showroom ID
Policyno Text Policy number

22 | P a g e
Table name : emp

Primary key : eid

Field name Data type Description


eid Text Employee ID
Ename Text Employee name
Designation Text Designation of the employee
Fname Text Father name
Paddress Text Address
City Text City of employee
Pincode Number Pincode of employee
Mno Number Mobile number
Lno Number Landline number
Picture Text Picture of an employee
Dob Date/time Date of birth
Gender Text Gender of employee
Age Number Age of an employee

23 | P a g e
Table name : loan

Primary key : loanno Foreign key : cid, eid, vid

Field name Data type Description


Cid Text Customer ID
Cname Text Customer name
Vid Text Automobile ID
Model Text Model of the automobile
Chassisno Text Chassis number
Engineno Text Engine number
Srprice Number Showroom price
Loanamount Text Loan amount
Downpayment Text Down payment
Instaa Number Installation amount
Loanduration Text Loan duration
Loanno Number Loan number
Eid Text Employee ID
Date Date/time Date
Time Text Time

24 | P a g e
4. SYSTEM TESTING AND IMPLEMENTATION

4.1 SYSTEM TESTING

The common view of testing held by users is that it is performed to prove that there are
no errors in a program. It is extremely difficult since designer cannot prove to be one hundred
percent accurate. Therefore, the most useful and practical approach is with the understanding
that testing is the process of executing a program with explicit intention of finding errors that
make the program fail.

Testing has its own cycle. The testing process begins with the product requirements
phase and from there parallels the entire development process. In other words, for each phase
of the development process there is an important testing activity. Successful testing requires a
methodical approach. It requires focusing on basic critical factors:

 Planning
 Project and process control
 Risk management
 Inspections
 Measurement tools
 Organization and professionalism

Test Plan

Before going for testing, first we have to decide upon the type of testing to be carried
out. The following factors are taken into consideration:

 To ensure that information properly flows into and out of program


 To find out whether the local data structures maintains its integrity during all steps
in an algorithm execution
 To ensure that the module operate properly at boundaries established to limit or
restrict processing
 To find out whether error - handling paths are working correctly or not
 To find out whether the values are correctly updated or not
 Check for validations

25 | P a g e
Black Box Testing

It is a software testing approach in which the tester doesn’t know the internal working
of the item being tested. For example in a Black box test, on software design the tester only
knows the input and the expected outputs. Tester doesn’t know how the program derives the
output. Tester doesn’t even imagine as to how, the coding is done. Tester need to know only
the specifications.

The advantages of black box testing approach are

 The test is unbiased because the designer and the tester is independent of each other
 The tester needs no specific knowledge on any programming language
 The test is done from the point of view of the user, not the designer.
 The test can be designed as soon as the specifications are complete

The disadvantages of black box testing approach are

 The test can be redundant if the software designer has already run a test case.
 The test can be difficult to design
 Testing every possible input stream is unrealistic.

Unit Testing

Unit or module testing is the process of testing the individual components (subprograms
or procedures) of a program. The purpose is to discover discrepancies between the modules
interface specification and its actual behavior. In our system each module must be tested
independently for validation.

Integration Testing

Integration testing is the process of combining and testing multiple components


together. The primary objective of integration testing is to discover errors in the interfaces
between the components. In our system each of the modules mentioned above, are tested for
checking the integration between them, after each of them are tested individually.

26 | P a g e
System Maintenance

All system is dynamic and subjects to constantly changing requirements. Effort must
be devoted to adapting them and design must be flexible specified so that such changes can be
easily implemented. It activity is called system maintains. It includes improvement of system
functions and correction of errors. Back up of the entire database files are taken and stored in
secondary storage devices like magnetic tapes and disks so that it is possible to restore the
system at the earliest. If there is a break down or collapse, then the system giver provision to
restore database files, storing data in a separate secondary device leads to an effective and
efficient maintains of the system.

The master file has flags for maintains after for maintains. After the mentioned period,
the rejection suppliers, unused data in the files will be deleted in the master file. It method is
the increasing the memory to store the data. Software maintenance is a set of software
engineering activities that occur after software has been delivered for the customer and put into
operation. The success of the software and the project relies on the maintenance procedure
adopted. As with the venture of human, not a single one is perfect. The further modifications
are left to the followers. It is because the opinion or vision or a thing differs from individual to
individual. The maintenance is performed at regular intervals to keep the project safe and
reliable.

Development is single activity maintenance is a continuous activity. Maintenance


involves activities like inspections, corrections and enhancements. Once the system is delivered
and deployed, it enters the maintenance phase. The system need to be maintained not because
of some of its components wear out and need to be replaced, but because there are some residual
errors remaining in the system that must be removed as they are discovered. It includes
activities related to debugging the software after it goes live, changes are required to address
evolving software and enhancement to meet changing customer requirements. So maintenance
phase involves

 Understanding the effects of change.


 Testing the new parts
 Retesting the old parts that were not changed
 Making changes to both the code and the documents.

27 | P a g e
These changes have to be designed by the user before the change can be carried out.
Since requirement change request involves cost, user will be cautious while requesting the
software changes. The software will require continued support. The system maintenance means
the maintenance activities after and during the system development processes. It include
activities related to debugging the software after it goes live, changes acquired to meet changes
in user requirement.

Maintenance phase identifies if there are any changes required in the current system. If
the changes are identified, then an analysis is made to identify if the changes are really required.
Cost benefit analysis is away to find out if the change is really essential.

System Analysis

The term system is derived from the Greek word ‘systema’, which means of organized
relationship among functioning units of components. And the study of system concepts has
three basic implications:

 A system must be designed to achieve a predetermined objective


 Interrelationships and interdependence must exist among the components
 The objectives of the organizations as a whole have a high priority than the
objective of its subsystems.

Preliminary Analysis

Analysis is the detailed study of the various operations performed by a system and their
relationships within and outside the system. For the efficient and effective utilization of the
available resources, timing availability of accurate information is very important. Information
is the back bone of any organization. There for, it has to be made available all time to ensure
proper decision-making.

Information also has to be accurate, current, timely, relevant and usable. In other words,
an effective information system should be able to provide information to those in need of it, at
the time they need of it, at the time they need it and in the way they need it. The need for
managing data and retrieving information efficiently, lead to an extensive use of computers in
the business world.

28 | P a g e
The computers have convinced the management that computerized system is preferable
to the existing system; most organization has computerized their application areas using
traditional file processing concepts. The computerized system, by itself does not guarantee of
efficient information retrieval. The effectiveness of the system, to great deal, depends on the
way in which data is organized and managed. Way in which data is organized in the existing
system is not integrated, since there is no connection or integration between one module and
another on accomplishing the task.

Analysis is detailed study of various operations performed by a system and their


relationships within and outside the system. A key question is “what must be done to solve the
problem?” One aspect of analysis is determining the boundaries of the system and determining
whether or not a new proposed system should consider other related items. It is the process of
gathering and interpreting facts; diagnosing the problems and using the information
recommend improvements to the system.

Threats to System Security

The lists of potential threats are as follows

 Errors and Omissions


 Disgruntled and Dishonest Employees
 Fire
 Natural Disaster
 External Attack

System Security

Security is a critical stage in system development. Even candidate system must provide
built-in features for security and integrity of data. Without safe guards against unauthorized
access, fraud, embezzlement, fire and natural disaster, a system could be so vulnerable as to
threaten the survival of the organizations.

To do an adequate job on security, the risk, exposure, cost and specific measures such
as password should be analyzed to provide protection. In addition, back up of copies of
software and recovery restart procedures must be available when needed.

29 | P a g e
The amount of protection depends on the sensitivity of data, the reliability of the user
and the complexity of the system. The motive behind security is to keep the organization
running, protect data as an asset and seek management support for more installations.

System Security Measures

After system security risk has been evaluated, the next step is to select security
measures. The measures are

 Identification
 Access Control
 Audit Control
 System Integrity

Identification

It is the scheme of identifying person to the system based on “Something you know”
such as a password or a picture badge, “Something you are” such as finger print or voice print
or “Something you have” such as credit card, key or special terminal.

Access Control

Controlling the access to the computer facility is secured through encoded cards or
similar devices. Encryption prevents intruders from accessing data by scrambling messages
across telephones to the destination.

Audit Control

Auditing must be supported at all levels of management. Audit control protects a system
from external security breaches and internal fraud or embezzlement. Various software
programs are available to help in audit function.

System Integrity

The line of different safeguards the functioning of hardware, software and physical
security and operating procedure. Proper back of hardware and software are extremely
important.

30 | P a g e
4.2 SYSTEM IMPLEMENTATION

System implementation is the important stage of project when the theoretical design is
tunes into practical system. The main stages in the implementation are as follows:

 Planning
 Training
 System testing and
 Changeover planning

Planning is the first task in the system implementation. Planning is deciding on the
method and the time scale to be adapted. At the time of implementation of any system people
from different departments and system analysis involve. They are confirmed to practical
problem of controlling various activities of people outside their own data processing
departments. The line manager controlled through an implementation co-ordinate committee.
The committee consists of ideas, Problems and complaints of user department. It must also
consider,

 The implementation of system environment.


 Self selection and allocation for implementation tasks.
 Consultation with unions and resources available.
 Standby facilities and channels of communication.

31 | P a g e
5. CONCLUSION

The system is completely menu driven and extremely user friendly since it is developed
in an efficient front end tool VB. Appropriate error messages are also provided too guide the
user in a proper and user friendly manner.

The software “Automobile Management System” has been developed in windows


2007 environment using PHP as front end and MS Access as back end. Time consumptions
reduced to a great extent and user as less complexity in handling it database.

The project is fully fledged and user friendly, End users will be lightened in using it
software because it is easy to have bills and reports and mostly all contents to be entered are to
selected from combo box. It reduces the calculating efforts to be carried out by the staff.

32 | P a g e
6. SCOPE FOR FURTHER ENHANCEMENT

Further expansion of the system also can be done in future if needed. The application
can be enhanced in the future with the needs of the organization. The database and the
information can be updated to the latest forthcoming versions.

There are also possibilities for enhancing and further developing the project with
customized reports according to the latest information and needs of the company. Thus the
system can be altered in accordance with the future requirements and advancements. System
performance evaluation must be monitored not only to determine whether or not they perform
as plan but also to determine if they should have to meet changes in the information needed for
the company.

The performance of the system will be evaluated to determine whether system achieves
the results that are expected and whether the predicted benefits of the system are realized.

33 | P a g e
BIBLIOGRAPHY

REFERENCE BOOKS

 James. A Senn, ‘System Analysis and Design’, 2005.


 Pressman, ‘Software Engineering’, 2010, pp.200-230.
 Elias Award, ‘System Analysis and Design’, 2006.
 S.S. Ipress, ‘VB, 2006, pp.1-180.
 S. Parthasarathy, B. W. Khalakar, ‘System Analysis, Design and Introduction to
Software Engineering’, 2010, pp.39-80.

REFERENCE WEBSITES

 www.programmingworld.com
 www.vbnetcode.com
 www.w3schools.com
 www.vbcode.com
 www.vbdevelopplus.com
 www.codepark.com

RESEARCHER REFERENCE

Acharya, Kamal. "STUDENT INFORMATION MANAGEMENT


SYSTEM." Authorea Preprints (2023).
Acharya, Kamal. "Library Management System." Available at SSRN4807104 (2019).
ACHARYA, KAMAL, et al. "LIBRARY MANAGEMENT SYSTEM." (2019).
Acharya, Kamal. "Online bus reservation system project report." Authorea
Preprints (2024).
Acharya, Kamal. "Online bus reservation system project report." (2024).
Acharya, Kamal. “Online Bus Reservation System.” SSRN ElectroNIC ASIA
Journal (2024): n. pag.
Acharya, Kamal. “Student Information Management System Project.” SSRN

34 | P a g e
ElectroNIC ASIA Journal (2024): n. pag.
Acharya, Kamal. “ATTENDANCE MANAGEMENT SYSTEM.” International
Research Journal of Modernization in Engineering Technology and
Science (2023): n. pag.

Acharya, Kamal. “College Information Management System.” SSRN ElectroNIC


ASIA Journal (2024): n. pag.
Acharya, Kamal, Attendance Management System Project (April 28, 2024).
Available at
SSRN: https://ssrn.com/abstract=4810251 or http://dx.doi.org/10.2139/ssrn.4810251
Acharya, Kamal, Online Food Order System (May 2, 2024). Available at
SSRN: https://ssrn.com/abstract=4814732 or http://dx.doi.org/10.2139/ssrn.4814732
Acharya, Kamal, University management system project. (May 1, 2024). Availableat
SSRN: https://ssrn.com/abstract=4814103 or http://dx.doi.org/10.2139/ssrn.4814103
Acharya, Kamal, Online banking management system. (May 1, 2024). Available at
SSRN: https://ssrn.com/abstract=4813597 or http://dx.doi.org/10.2139/ssrn.4813597
Acharya, Kamal, Online Job Portal Management System (May 5, 2024). Available at
SSRN: https://ssrn.com/abstract=4817534 or http://dx.doi.org/10.2139/ssrn.4817534
Acharya, Kamal, Employee leave management system. (May 7, 2024). Available
at SSRN: https://ssrn.com/abstract=4819626 or http://dx.doi.org/10.2139/ssrn.4819626
Acharya, Kamal, Online electricity billing project report. (May 7, 2024). Available at
SSRN: https://ssrn.com/abstract=4819630 or http://dx.doi.org/10.2139/ssrn.4819630
Acharya, Kamal, POLICY MANAGEMENT SYSTEM PROJECT REPORT. (December 10, 2023).
Available at SSRN: https://ssrn.com/abstract=4831694 or http://dx.doi.org/10.2139/ssrn.4831694
Acharya, Kamal, Online job placement system project report. (January 10, 2023). Available at
SSRN: https://ssrn.com/abstract=4831638 or http://dx.doi.org/10.2139/ssrn.4831638
Acharya, Kamal, Software testing for project report. (May 16, 2023). Available at
SSRN: https://ssrn.com/abstract=4831028 or http://dx.doi.org/10.2139/ssrn.4831028
Acharya, Kamal, ONLINE CRIME REPORTING SYSTEM PROJECT. (August 10, 2022). Available at
SSRN: https://ssrn.com/abstract=4831015 or http://dx.doi.org/10.2139/ssrn.4831015
Acharya, Kamal, Burber ordering system project report. (October 10, 2022). Available at
SSRN: https://ssrn.com/abstract=4832704 or http://dx.doi.org/10.2139/ssrn.4832704
Acharya, Kamal, Teachers Record Management System Project Report (December 10, 2023). Available
at SSRN: https://ssrn.com/abstract=4833821 or http://dx.doi.org/10.2139/ssrn.4833821

35 | P a g e
Acharya, Kamal, Dairy Management System Project Report (December 20, 2020). Available at
SSRN: https://ssrn.com/abstract=4835231 or http://dx.doi.org/10.2139/ssrn.4835231
Acharya, Kamal, Electrical Shop Management System Project (December 10, 2019). Available at
SSRN: https://ssrn.com/abstract=4835238 or http://dx.doi.org/10.2139/ssrn.4835238
Acharya, Kamal, Online book store management system project report. (Febuary 10, 2020). Available
at SSRN: https://ssrn.com/abstract=4835277 or http://dx.doi.org/10.2139/ssrn.4835277
Acharya, Kamal, Paint shop management system project report. (January 10, 2019). Available at
SSRN: https://ssrn.com/abstract=4835441 or http://dx.doi.org/10.2139/ssrn.4835441
Acharya, Kamal, Supermarket billing system project report. (August 10, 2021). Available at
SSRN: https://ssrn.com/abstract=4835474 or http://dx.doi.org/10.2139/ssrn.4835474
Acharya, Kamal, Online texi booking system project report. (March 10, 2022). Available at
SSRN: https://ssrn.com/abstract=4837729 or http://dx.doi.org/10.2139/ssrn.4837729
Acharya, Kamal, Online car servicing system project report. (March 10, 2023). Available at
SSRN: https://ssrn.com/abstract=4837832 or http://dx.doi.org/10.2139/ssrn.4837832
Acharya, Kamal, School management system project report. (July 10, 2021). Available at
SSRN: https://ssrn.com/abstract=4837837 or http://dx.doi.org/10.2139/ssrn.4837837
Acharya, Kamal, Furniture Showroom Management System Project Report (March 21, 2021).
Available at SSRN: https://ssrn.com/abstract=4839422 or http://dx.doi.org/10.2139/ssrn.4839422
Acharya, Kamal, Online Vehicle Rental System Project Report (March 21, 2019). Available at
SSRN: https://ssrn.com/abstract=4839429 or http://dx.doi.org/10.2139/ssrn.4839429

36 | P a g e
APPENDIX

A. SAMPLE INPUT

Login form

37 | P a g e
Admin login

38 | P a g e
User login

39 | P a g e
Insurance form

40 | P a g e
Service form

41 | P a g e
Spare parts form

42 | P a g e
Employee details form

43 | P a g e
Customer details

44 | P a g e
Imported automobile details

45 | P a g e
Automobile import details

46 | P a g e
Booking form

47 | P a g e
Loan details

48 | P a g e
Loan payment details

49 | P a g e
Customer purchase form

50 | P a g e
B.SAMPLE OUTPUT

Splash form

51 | P a g e
On successful login

52 | P a g e
Admin welcome page

53 | P a g e
Facilities

54 | P a g e
Available facilities

55 | P a g e
Bikes

56 | P a g e
Specific bike

57 | P a g e
View bike color

58 | P a g e
Showroom details

59 | P a g e
C.SAMPLE CODING

Private Sub Command1_Click()

Me.Hide

MDIenter1.Show

End Sub

Private Sub Command10_Click()

On Error GoTo errmsg

Adodc1.Recordset.MoveFirst

Exit Sub

errmsg:

MsgBox Err.Description

End Sub

Private Sub Command11_Click()

Adodc1.Recordset.MoveLast

End Sub

Private Sub Command12_Click()

On Error GoTo errmsg

60 | P a g e
Adodc1.Recordset.MovePrevious

Exit Sub

errmsg:

MsgBox "You Are in First Record"

End Sub

Private Sub Command13_Click()

On Error GoTo errmsg

Adodc1.Recordset.MoveNext

Exit Sub

errmsg:

MsgBox "You Are in Last Record"

End Sub

Private Sub Command2_Click()

Unload Me

End Sub

Private Sub Command3_Click()

Text1.Text = ""

61 | P a g e
Text2.Text = ""

Text3.Text = ""

Text4.Text = ""

Text5.Text = ""

Text6.Text = ""

Text7.Text = ""

End Sub

Private Sub Command4_Click()

Call enable

Adodc1.Refresh

If Adodc1.Recordset.RecordCount = 0 Then

a=1

Else

Adodc1.Recordset.MoveLast

a = Adodc1.Recordset.Fields(0) + 1

End If

Adodc1.Recordset.AddNew

Text1.Text = a

Text2.SetFocus

62 | P a g e
End Sub

Private Sub Command5_Click()

Me.Hide

alldetails.Show

End Sub

Private Sub Command6_Click()

If Adodc1.Recordset.EOF = True Then

MsgBox "NO RECORDS"

Else

ans = MsgBox("DO you want to delete the record", vbOKCancel + vbExclamation +


vbDefaultButton2, "DELETE")

If ans = vbOK Then

Adodc1.Recordset.Delete

Adodc1.Refresh

MsgBox "Record Deleted", vbInformation, "Record Deleted"

End If

End If

End Sub

63 | P a g e
Private Sub Command7_Click()

'On Error GoTo err1

a = MsgBox("Do you want to save the record", vbOKCancel + vbDefaultButton1, "SAVE")

If a = vbOK Then

If Option1.Value = True Then

Adodc1.Recordset.Fields(3) = "MALE"

Else

Adodc1.Recordset.Fields(3) = "FEMALE"

End If

Adodc1.Recordset.Update

Adodc1.Refresh

Call disable

MsgBox "RECORD SAVED", vbOKCancel, "SAVED"

Else

MsgBox "Record NOT SAVED"

Adodc1.Recordset.CancelUpdate

End If

'err1:

'MsgBox Err.Description, vbQuestion, "Primary Key Error"

End Sub

64 | P a g e
Private Sub Command8_Click()

End Sub

Private Sub Command9_Click()

Call enable

End Sub

Private Sub DTPicker1_CallbackKeyDown(ByVal KeyCode As Integer, ByVal Shift As


Integer, ByVal CallbackField As String, CallbackDate As Date)

Dim DATE1 As Date

DATE1 = Date

Text6.Text = DateDiff("yyyy", Format(DTPicker1, "dd/mm/yyyy"), DATE1)

If Val(Text6.Text) < 0 Or Val(Text6.Text) < 24 Then

DTPicker1.SetFocus

MsgBox " Age limit not satisfied "

End If

End Sub

Private Sub Form_Load()

65 | P a g e
Call disable

End Sub

Private Sub Picture2_Click()

End Sub

Private Sub Picture3_Click()

End Sub

Private Sub Picture4_Click()

End Sub

Private Sub Text1_KeyPress(KeyAscii As Integer)

Call charvalid(KeyAscii)

End Sub

Private Sub text1_LostFocus()

66 | P a g e
If Text1.Text = "" Then

MsgBox "ENTER THE CUSTOMER ID ", vbCritical

End If

End Sub

Private Sub Text12_KeyPress(KeyAscii As Integer)

Call charvalid(KeyAscii)

End Sub

Private Sub Text12_LostFocus()

If Text12.Text = "" Then

MsgBox "ENTER THE LANDLINE NUMBER ", vbCritical

End If

End Sub

Private Sub Text13_KeyPress(KeyAscii As Integer)

Call emailvalid(KeyAscii)

End Sub

67 | P a g e
Private Sub Text13_LostFocus()

If Text13.Text = "" Then

MsgBox "ENTER THE EMAIL ID ", vbCritical

End If

End Sub

Private Sub Text2_KeyPress(KeyAscii As Integer)

Call alphavalid(KeyAscii)

End Sub

Private Sub text2_LostFocus()

If Text2.Text = "" Then

MsgBox "ENTER THE CUSTOMER NAME ", vbCritical

End If

End Sub

Private Sub Text3_KeyPress(KeyAscii As Integer)

Call charvalid(KeyAscii)

End Sub

Private Sub Text3_LostFocus()

68 | P a g e
If Text3.Text = "" Then

MsgBox "ENTER THE CUSTOMER MOBILE NUMBER ", vbCritical

End If

End Sub

Private Sub Text4_KeyPress(KeyAscii As Integer)

Call addressvalid(KeyAscii)

End Sub

Private Sub Text4_LostFocus()

If Text4.Text = "" Then

MsgBox "ENTER THE CUSTOMER ADDRESS ", vbCritical

End If

End Sub

Private Sub Text15_KeyPress(KeyAscii As Integer)

Call alphavalid(KeyAscii)

End Sub

Private Sub Text15_LostFocus()

If Text15.Text = "" Then

69 | P a g e
MsgBox "ENTER THE CITY ", vbCritical

End If

End Sub

Private Sub Text16_KeyPress(KeyAscii As Integer)

Call charvalid(KeyAscii)

End Sub

Private Sub Text16_LostFocus()

If Text16.Text = "" Then

MsgBox "ENTER THE PINCODE ", vbCritical

End If

End Sub

Public Sub disable()

Text2.Enabled = False

Text3.Enabled = False

Text4.Enabled = False

Text12.Enabled = False

Text13.Enabled = False

Text15.Enabled = False

70 | P a g e
Text16.Enabled = False

Option1.Enabled = False

Option2.Enabled = False

End Sub

Public Sub enable()

Text2.Enabled = True

Text3.Enabled = True

Text4.Enabled = True

Text12.Enabled = True

Text13.Enabled = True

Text15.Enabled = True

Text16.Enabled = True

Option1.Enabled = True

Option2.Enabled = True

End Sub

Private Sub Text6_Change()

If (KeyAscii >= 48 And KeyAscii <= 57) Or KeyAscii = 32 Or KeyAscii = 46 Or KeyAscii =


8 Then

Else

71 | P a g e
MsgBox " Please Enter date in format: 12.4.1990 ", vbCritical + vbOKOnly, "Warning"

KeyAscii = 0

End If

End Sub

Employee form

Dim file1 As String

Private Sub Combo1_KeyPress(KeyAscii As Integer)

Call charvalid(KeyAscii)

End Sub

Private Sub Combo1_LostFocus()

If Combo1.Text = "" Then

MsgBox "ENTER THE EMPLOYEE DESIGNATION ", vbCritical

End If

End Sub

Private Sub Command1_Click()

Me.Hide

72 | P a g e
MDIenter1.Show

End Sub

Private Sub Command10_Click()

On Error GoTo errmsg

Adodc1.Recordset.MoveFirst

Image1.Picture = LoadPicture(Adodc1.Recordset.Fields(10))

Exit Sub

errmsg:

MsgBox Err.Description

End Sub

Private Sub Command11_Click()

Adodc1.Recordset.MoveLast

Image1.Picture = LoadPicture(Adodc1.Recordset.Fields(10))

End Sub

Private Sub Command12_Click()

On Error GoTo errmsg

Adodc1.Recordset.MovePrevious

73 | P a g e
Image1.Picture = LoadPicture(Adodc1.Recordset.Fields(10))

Exit Sub

errmsg:

MsgBox "You Are in First Record"

End Sub

Private Sub Command13_Click()

On Error GoTo errmsg

Adodc1.Recordset.MoveNext

Image1.Picture = LoadPicture(Adodc1.Recordset.Fields(10))

Exit Sub

errmsg:

MsgBox "You Are in Last Record"

End Sub

Private Sub Command14_Click()

CommonDialog1.ShowOpen

file1 = CommonDialog1.FileName

Image1.Picture = LoadPicture(file1)

End Sub

74 | P a g e
Private Sub Command2_Click()

Text1.Text = ""

Text2.Text = ""

Combo1.Text = ""

'Text3.Text = ""

Text10.Text = ""

Text11.Text = ""

Text15.Text = ""

Text12.Text = ""

Text13.Text = ""

Text14.Text = ""

Option1.Value = False

Option2.Value = False

'Text5.Text = ""

'Text6.Text = ""

'Text4.Text = ""

'Text8.Text = ""

'Text7.Text = ""

'Text9.Text = ""

75 | P a g e
Text16.Text = ""

Image1.Picture = ""

End Sub

Private Sub Command3_Click()

'On Error GoTo err1

a = MsgBox("Do you want to save the record", vbOKCancel + vbDefaultButton1, "SAVE")

If a = vbOK Then

If Option1.Value = True Then

Adodc1.Recordset.Fields(12) = "MALE"

Else

Adodc1.Recordset.Fields(12) = "FEMALE"

End If

'smid = App.Path

'FILE2 = smid & "\PHOTOS\" & Text2.Text & ".JPG"

'FileCopy file1, FILE2

'Dim sql1 As String

'Dim sm As New ADODB.Recordset

'sql1 = "SELECT * FROM student_admission"

'sm.Open sql1, CON, adOpenDynamic, adLockOptimistic

76 | P a g e
'CON.Execute "INSERT INTO student_admission VALUES('" & file1 & "')"

Adodc1.Recordset.Fields(10) = file1

Adodc1.Recordset.Fields(2) = Combo1.Text

Adodc1.Recordset.Update

Adodc1.Refresh

Call disable

MsgBox "RECORD SAVED", vbOKCancel, "SAVED"

Else

MsgBox "Record NOT SAVED"

Adodc1.Recordset.CancelUpdate

End If

'err1:

'MsgBox err.Description, vbQuestion, "Primary Key Error"

End Sub

Private Sub Command4_Click()

End

End Sub

77 | P a g e
'Private Sub Command5_Click()

'sal = Val(Text3.Text)

'Select Case sal

'Case Is < 5000

'Text5.Text = sal * 10 / 100

'Text6.Text = sal * 15 / 100

'Text4.Text = sal * 18 / 100

'Case Is < 10000

'T ext5.Text = sal * 12 / 100

'Text6.Text = sal * 14 / 100

'Text4.Text = sal * 18 / 100

'Case Is < 15000

'Text5.Text = sal * 18 / 100

'Text6.Text = sal * 20 / 100

'Text4.Text = sal * 21 / 100

'Case Else

'Text5.Text = sal * 7 / 100

'Text6.Text = sal * 8 / 100

'Text4.Text = sal * 5 / 100

'End Select

78 | P a g e
'sal = Val(Text4.Text)

'Select Case sal

'Case Is < 5000

'Text8.Text = sal * 5 / 100

'Text7.Text = sal * 4 / 100

'Case Is < 10000

'Text8.Text = sal * 6 / 100

'Text7.Text = sal * 5 / 100

'Case Is < 15000

'Text8.Text = sal * 8 / 100

'Text7.Text = sal * 9 / 100

'End Select

'Text9.Text = Val(Text3.Text) + Val(Text5.Text) + Val(Text6.Text) + Val(Text4.Text) -


Val(Text8.Text) - Val(Text7.Text)

'End Sub

Private Sub Command6_Click()

If Adodc1.Recordset.EOF = True Then

MsgBox "NO RECORDS"

Else

79 | P a g e
ans = MsgBox("DO you want to delete the record", vbOKCancel + vbExclamation +
vbDefaultButton2, "DELETE")

If ans = vbOK Then

Adodc1.Recordset.Delete

Adodc1.Refresh

MsgBox "Record Deleted", vbInformation, "Record Deleted"

End If

End If

End Sub

Private Sub Command7_Click()

Call enable

Adodc1.Refresh

If Adodc1.Recordset.RecordCount = 0 Then

a=1

Else

Adodc1.Recordset.MoveLast

a = Adodc1.Recordset.Fields(0) + 1

End If

Text2.SetFocus

End Sub

80 | P a g e

You might also like