Computer Science Project Class 12th Upd
Computer Science Project Class 12th Upd
INTRODUCTION
This program helps the users to make a movie ticket booking. After adding
information’s this program automatically generates a booking number and
displays it. The user can use the booking number to view their booking details.
This program can be used only if the Login ID and the Password is correct.
The objective of this project is to let the students apply the programming
knowledge into a real-world situation/problem and exposed the students how
programming skills helps in developing a good software.
1
PROPOSED SYSTEM
One has to use the data management software. Software has been an ascent
in atomization various organizations. Many software products working are now
in markets, which have helped in making the organizations work easier and
efficiently. Data management initially had to maintain a lot of ledgers and a lot
of paperwork has to be done but now software production this organization has
made their work faster and easier. Now only this software has to be loaded on the
computer and work can be done.
This prevents a lot of time and money. The work becomes fully automated
and any information regarding the organization can be obtained by clicking the
button. Moreover, now it’s an age of computers of and automating such an
organization gives the better look.
2
SYSTEM DEVELOPMENT LIFE CYCLE (SDLC)
3
PHASES OF SYSTEM DEVELOPMENT LIFE CYCLE
INITIATION PHASE
5
Construction of executable prototypes is encouraged to evaluate
technology to support the business process. The System Boundary
Document serves as an important reference document to support the
Information Technology Project Request (ITPR) process.
The ITPR must be approved by the State CIO before the project can
move forward.
6
PLANNING PHASE
This phase formally defines the detailed functional user requirements using
high-level requirements identified in the Initiation, System Concept, and Planning
phases. It also delineates the requirements in terms of data, system performance,
security, and maintainability requirements for the system. The requirements are
defined in this phase to a level of detail sufficient for systems design to proceed.
They need to be measurable, testable, and relate to the
7
business need or opportunity identified in the Initiation Phase. The requirements
that will be used to determine acceptance of the system are captured in the Test
and Evaluation Master Plan.
The purposes of this phase are to:
Further define and refine the functional and data requirements and
document them in the Requirements Document,
Complete business process reengineering of the functions to be
supported (i.e., verify what information drives the business process,
what information is generated, who generates it, where does the
information go, and who processes it),
Develop detailed data and process models (system inputs, outputs,
and the process.
Develop the test and evaluation requirements that will be used to
determine acceptable system performance.
DESIGN PHASE
9
DEVELOPMENT PHASE
10
Multiple levels of testing are performed, including:
IMPLEMENTATION PHASE
This phase is initiated after the system has been tested and accepted by the
user. In this phase, the system is installed to support the intended business
functions. System performance is compared to performance objectives
established during the planning phase. Implementation includes user notification,
user training, installation of hardware, installation of software onto production
computers, and integration of the system into daily work processes. This phase
continues until the system is operating in production in accordance with the
defined user requirements.
12
FLOW CHART
Start
if conn.is_connected:
Details Recorded
Thank you for visiting
PVR INTERNATIONAL CINEMAS
if ch==2:
14
ins1="insert into boxoffice values('{}','{}',{},{},'{}')"
.format(mname,name,tickets,phno,snacks)
cl.execute(ins1)
***TICKET BOOKED***
elif ch==3:
***TICKET BOOKED***
15
elif ch==4:
***TICKET BOOKED***
elif ch==5:
16
elif ch==6:
elif ch==7:
elif ch==8:
wrong user
17
SOURCE CODE
conn=sql.connect(host='localhost',user='root',passwd='12345',database='jai',charset="utf8")
cl=conn.cursor()
if conn.is_connected():
print()
print()
print("1. SIGNUP")
print("8. EXIT")
if ch==1:
print()
values('{}','{}','{}',{})".format(fname,lname,mname,phno)
cl.execute(ins)
conn.commit()
print("Details Recorded")
print()
elif ch==2:
print()
values('{}','{}',{},{},'{}')".format(mname,name,tickets,phno,snacks)
cl.execute(ins1)
conn.commit()
print("***TICKET BOOKED***")
elif ch==3:
print()
values('{}','{}',{},{},'{}')".format(mname,name,tickets,phno,snacks)
cl.execute(ins2)
conn.commit()
20
print("***TICKET BOOKED***")
elif ch==4:
print()
values('{}','{}',{},{},'{}')".format(mname,name,tickets,phno,snacks)
cl.execute(ins3)
conn.commit()
print("***TICKET BOOKED***")
elif ch==5:
cl.execute(dis)
data=cl.fetchall()
for i in data:
print(i)
21
elif ch==6:
cl.execute(dis)
data=cl.fetchall()
for i in data:
print(i)
elif ch==7:
cl.execute(dis)
data=cl.fetchall()
for i in data:
print(i)
elif ch==8:
print()
else:
print()
print("wrong user")
22
OUTPUT
1. SIGNUP
8. EXIT
23
Enter the phone number:637409293
Details Recorded
***TICKET BOOKED***
***TICKET BOOKED***
25
Enter the choice:7
26
TESTING
TESTING METHODS
Software testing methods are traditionally divided into black box testing
and white box testing. These two approaches are used to describe the point of
view that a test engineer takes when designing test cases.
Black box testing treats the software as a "black box," without any
knowledge of internal implementation. Black box testing methods include:
equivalence partitioning, boundary value analysis, all-pairs testing, fuzz testing,
model-based testing, traceability matrix, exploratory testing and specification-
based testing.
27
SPECIFICATION BASED TESTING
The black box tester has no "bonds" with the code, and a tester's perception
is very simple: a code must have bugs. Using the principle, "Ask and you shall
receive," black box testers find bugs where programmers don't. But, on the other
hand, black box testing has been said to be "like a walk in a dark labyrinth without
a flashlight," because the tester doesn't know how the software being tested was
actually constructed.
That's why there are situations when a black box tester writes many test
cases to check something that can be tested by only one test case, and/or some
parts of the back end are not tested at all. Therefore, black box testing has the
advantage of "an unaffiliated opinion," on the one hand, and the disadvantage of
"blind exploring," on the other.
White box testing, by contrast to black box testing, is when the tester has
access to the internal data structures and algorithms (and the code that implement
these)
28
Types of white box testing:-
White box testing methods can also be used to evaluate the completeness
of a test suite that was created with black box testing methods. This allows the
software team to examine parts of a system that are rarely tested and ensures that
the most important function points have been tested.
29
HARDWARE AND SOFTWARE REQUIREMENTS
ATHALON(3800+- 4200+
DUALCORE)
VIAK8M800+8237R PLUS
SOFTWARE REQUIREMENTS:
I. Windows OS
II. Python
30
BIBLIOGRAPHY
31