Ip Project2
Ip Project2
CERTIFICATE
1
PM SHRI Kendriya Vidyalaya No. 1, KV
No 1 Udaipur
Pratap Nagar, Udaipur
ACKNOWLEDGEMENT
2
Last but not least, I would like to thank all those who
had helped directly and indirectly towards this project.
(YUVRAJ GUSSAR)
3
CONTENTS
S.N
DESCRIPTION PAGE NO
O
1 Introduction 4
2 Objectives Of The Project 5
3 Proposed System 6
System Development Life Cycle
4 7
(SDLC)
Phases Of System Development Life
5 8-20
Cycle
6 Flow Chart 21
7 Database And Tables 22
8 Source Code 23-25
9 Output 26-31
10 Testing
11 Conclusion
12 Bibliography
4
INTRODUCTION
VIEW
MAIN DELETE
CONTACT
CONTACTS MENU
ADD EXIT
SEARCH
CONTACT
CONTACTS UPDATE EXPORT
SORT CONTACTS
CONTACT CONTACTS
NAME
PHONE
NAME NAME
EMAIL
PHONE PHONE
BACK
EMAIL EMAIL
ADDRESS BACK
5
BACK
OBJECTIVES OF THE
PROJECT
6
Students will demonstrate ability to conduct a
research or applied Informatics Practices
project, requiring writing and presentation skills
which exemplify scholarly style in Informatics
Practices.
PROPOSED SYSTEM
Today one cannot afford to rely on the
fallible human beings of be really wants to stand
against today’s merciless competition where not
to wise saying “to err is human” no longer valid,
it’s outdated to rationalize your mistake. So, to
keep pace with time, to bring about the best
result without malfunctioning and greater
efficiency so to replace the unending heaps of
flies with a much-sophisticated hard disk of the
computer.
One has to use the data management
software. Software has been an ascent in
atomization various organisations. Many software
products working are now in markets, which have
helped in making the organizations work easier
7
and efficiently. Data management initially had to
maintain a lot of ledgers and a lot of paper work
has to be done but now software product on this
organization has made their work faster and
easier. Now only this software has to be loaded
on the computer and work can be done.
This prevents a lot of time and money. The
work becomes fully automated and any
information regarding the organization can be
obtained by clicking the button. Moreover, now
it’s an age of computers of and automating such
an organization gives the better look.
8
The systems development life cycle is a project
management technique that divides complex projects
into smaller, more easily managed segments or phases.
Segmenting projects allows managers to verify the
successful completion of project phases before
allocating resources to subsequent phases.
Software development projects typically include
initiation, planning, design, development, testing,
implementation, and maintenance phases. However,
the phases may be divided differently depending on the
organization involved.
For example, initial project activities might be
designated as request, requirements-definition, and
planning phases, or initiation, concept-development,
and planning phases. End users of the system under
development should be involved in reviewing the
output of each phase to ensure the system is being
built to deliver the needed functionality.
9
PHASES DEVELOPMENT LIFE
CYCLE
INITIATION PHASE :-
10
Assure executive business and executive
technical sponsorship. The Sponsor
designates a Project Manager and the
business need is documented in a Concept
Proposal. The Concept Proposal includes
information about the business process and
the relationship to the Agency/Organization.
Infrastructure and the Strategic Plan. A
successful Concept Proposal results in a
Project Management Charter which outlines
the authority of the project manager to begin
the project.
11
identify expected benefits, and explain how the
proposed system supports one of the
organization’s business strategies. The business
case should also identify alternative solutions
and detail as many informational, functional, and
network requirements as possible.
SYSTEM CONCEPT
DEVELOPMENT PHASE :-
12
Determine the feasibility and appropriateness
of the alternatives.
Identify system interfaces.
Identify basic functional and data
requirements to satisfy the business need.
Establish system boundaries; identify goals,
objectives, critical success factors, and
performance measures.
Evaluate costs and benefits of alternative
approaches to satisfy the basic functional
requirements.
Assess project risks
Identify and initiate risk mitigation actions,
and Develop high-level technical
architecture, process models, data models,
and a concept of operations. This phase
explores potential technical solutions within
the context of the business need.
It may include several trade-off decisions
such as the decision to use COTS software
products as opposed to developing custom
software or reusing software components, or
13
the decision to use an incremental delivery
versus a complete, onetime deployment.
Construction of executable prototypes is
encouraged to evaluate technology to
support the business process. The System
Boundary Document serves as an important
reference document to support the
Information Technology Project Request
(ITPR) process.
The ITPR must be approved by the State CIO
before the project can move forward.
PICTORIAL PRESENTATION OF
SDLC
14
PLANNING PHASE:-
16
REQUIREMENTS ANALYSIS P
HASE:
SOFTWARE:
Operating System : Windows 10 Home
Single
Language
HARDWARE:
Processor : Intel(R)Core(TM) i3-
10110U CPU
@ 2.10GHz
2.59 GHz
18
RAM : 4GB
Settings:
Display Resolution : 1366*768
Others:
Printer : HP Ink Tank 310
series
DESIGN PHASE:-
Identifying potential risks and defining mitigating
design features.
Performing a security risk assessment.
and outputs.
Allocating processes to resources.
19
Everything requiring user input or approval is
documented and reviewed by the user. Once
these documents have been approved by the
Agency CIO and Business Sponsor, the final
System Design Document is created to serve
as the Critical/Detailed Design for the
system.
This document receives a rigorous review by
Agency technical and functional
representatives to ensure that it satisfies the
business requirements. Concurrent with the
development of the system design, the
Agency Project Manager begins development
of the Implementation Plan, Operations and
Maintenance Manual, and the Training Plan.
DEVELOPMENT PHASE:-
20
and functional requirements. Programmers use
various techniques to develop computer programs.
The large transaction-oriented programs associated
with financial institutions have traditionally been
developed using procedural programming
techniques. Procedural programming involves the
line-by-line scripting of logical instructions that are
combined to form a program. Effective completion of
the previous stages is a key factor in the success of
the Development phase. The Development phase
consists of:
TESTING PHASE:-
Subsystem integration, system, security,
and user acceptance testing is conducted during
21
the integration and test phase. The user, with
those responsible for quality assurance, validates
that the functional requirements, as defined in
the functional requirements document, are
satisfied by the developed or modified system.
OIT Security staff assess the system security and
issue a security certification and accreditation
prior to installation/implementation.
22
IMPLEMENTATION PHASE:-
23
OPERATIONS AND
MAINTENANCE PHASE :-
The system operation is ongoing. The system
is monitored for continued performance in
accordance with user requirements and needed
system modifications are incorporated.
Operations continue as long as the system can
be effectively adapted to respond to the
organization’s needs. When modifications or
changes are identified, the system may renter
the planning phase.
24
FLOW CHART
25
DATABASE AND TABLES
Table Structure :-
26
SOURCE CODE
27
28
29
30
OUTPUT
MAIN MENU :-
31
To perform all functions :-
1. Adding Multiple
Contacts
32
2. Viewing All Contacts
3. Searching Contacts
33
4. Updating Contact
5. Deleting Contact
6. Sorting Contacts
Adding another contact first
34
Performing sort command
35
7. Exporting contacts
8. Exit
36
TESTING
Conclusion
In conclusion, this project demonstrates the
successful implementation of a contact
management system that combines Python's
programming capabilities with MySQL's robust
38
database management features. While it serves
as a functional prototype for real-world
applications, it also highlights areas for
improvement, such as adding a graphical user
interface or integrating cloud-based storage
solutions. Overall, it has been an enriching
experience to design, develop, and implement
this project, showcasing the practical application
of programming and database skills.
39
8.Menu-Driven Navigation: A user-friendly
main menu and sub-menus guide users
through various operations seamlessly.
Advantages
User-Friendly Interface: The menu-driven
design ensures ease of use for beginners and
advanced users alike.
Data Security: Contacts are stored securely
in a MySQL database, preventing data loss.
Scalability: The system can handle a large
number of contacts efficiently.
Customization: The modular structure
allows for easy modifications and
enhancements.
Portability: The program can run on any
system with Python and MySQL installed.
Disadvantages
1.Command-Line Interface: The absence of
a graphical user interface (GUI) may make it
less appealing for some users.
2.Dependency on MySQL: Requires MySQL to
be installed and configured on the user's
system.
3.Limited Validation: While basic validations
are implemented, more robust error handling
could improve the program.
40
4.Not Real-Time: The system lacks advanced
features like real-time syncing with online
contact lists.
BIBLIOGRAPHY
Website: https://www.w3resource.com
en.Wikipedia.org
Website: https://www.quora.com/
Website: https://python.mykvs.in/
41