0% found this document useful (0 votes)
12 views41 pages

Ip Project2

Uploaded by

yuvrajforfake
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
12 views41 pages

Ip Project2

Uploaded by

yuvrajforfake
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 41

PM SHRI Kendriya

Vidyalaya No.1 Udaipur

CERTIFICATE

This is to certify that YUVRAJ GUSSAR Of Class XII –


C has prepared the report on the Project entitled

“CONTACT MANAGEMENT SYSTEM”.

The report is result of his Efforts and Endeavour. The


report is found worthy of acceptance As final project
report for the subject Informatics Practices of Class XII.

He has prepared the report under my guidance.

(Mr. Narayan Lal Mali) Principal

1
PM SHRI Kendriya Vidyalaya No. 1, KV
No 1 Udaipur
Pratap Nagar, Udaipur

ACKNOWLEDGEMENT

I would like to express a deep sense of thank and


gratitude to my project guide Mr. Narayan Lal Mali
for guiding me immensely through the course of the
project. He always evinced keen interest in my work.
His constructive advice and constant motivation have
been responsible for the successful completion of this
project.

My sincere thanks goes to Mr. DB Singh Our


Principal sir, for his co-ordination in extending every
possible support for the completion of this project.

I also thank to my parents for their motivation and


support. I must thank to my classmates for their timely
help and support for completion of this project.

2
Last but not least, I would like to thank all those who
had helped directly and indirectly towards this project.

(YUVRAJ GUSSAR)

3
CONTENTS
S.N
DESCRIPTION PAGE NO
O
1 Introduction 4
2 Objectives Of The Project 5
3 Proposed System 6
System Development Life Cycle
4 7
(SDLC)
Phases Of System Development Life
5 8-20
Cycle
6 Flow Chart 21
7 Database And Tables 22
8 Source Code 23-25
9 Output 26-31
10 Testing
11 Conclusion
12 Bibliography

4
INTRODUCTION

This Contact Management System is a


Python-based program that uses MySQL as its
database to manage contact information. It
provides an intuitive Main Menu for navigation
and detailed Sub-Menus for various operations,
such as adding, searching, updating, and deleting
contacts.

This project is designed for beginners in Python


programming and database connectivity,
focusing on the practical application of CRUD
operations (Create, Read, Update, Delete). The
system is menu-driven, ensuring ease of use and
smooth workflow management.

VIEW
MAIN DELETE
CONTACT
CONTACTS MENU
ADD EXIT
SEARCH
CONTACT
CONTACTS UPDATE EXPORT
SORT CONTACTS
CONTACT CONTACTS
NAME
PHONE
NAME NAME
EMAIL
PHONE PHONE
BACK
EMAIL EMAIL
ADDRESS BACK
5
BACK
OBJECTIVES OF THE
PROJECT

The objective of this project is to let the students


apply the programming knowledge into a real-
world situation/problem and exposed the
students how programming skills helps in
developing a good software.
 Write programs utilizing modern software tools.
 Apply object-oriented programming principles
effectively when developing small to medium
sized projects.
 Write effective procedural code to solve small
to medium sized problems.
 Students will demonstrate a breadth of
knowledge in , as exemplified in the areas of
systems, theory and software development.

6
 Students will demonstrate ability to conduct a
research or applied Informatics Practices
project, requiring writing and presentation skills
which exemplify scholarly style in Informatics
Practices.

PROPOSED SYSTEM
Today one cannot afford to rely on the
fallible human beings of be really wants to stand
against today’s merciless competition where not
to wise saying “to err is human” no longer valid,
it’s outdated to rationalize your mistake. So, to
keep pace with time, to bring about the best
result without malfunctioning and greater
efficiency so to replace the unending heaps of
flies with a much-sophisticated hard disk of the
computer.
One has to use the data management
software. Software has been an ascent in
atomization various organisations. Many software
products working are now in markets, which have
helped in making the organizations work easier
7
and efficiently. Data management initially had to
maintain a lot of ledgers and a lot of paper work
has to be done but now software product on this
organization has made their work faster and
easier. Now only this software has to be loaded
on the computer and work can be done.
This prevents a lot of time and money. The
work becomes fully automated and any
information regarding the organization can be
obtained by clicking the button. Moreover, now
it’s an age of computers of and automating such
an organization gives the better look.

SYSTEM DEVELOPMENT LIFE


CYCLE (SDLC)

8
The systems development life cycle is a project
management technique that divides complex projects
into smaller, more easily managed segments or phases.
Segmenting projects allows managers to verify the
successful completion of project phases before
allocating resources to subsequent phases.
Software development projects typically include
initiation, planning, design, development, testing,
implementation, and maintenance phases. However,
the phases may be divided differently depending on the
organization involved.
For example, initial project activities might be
designated as request, requirements-definition, and
planning phases, or initiation, concept-development,
and planning phases. End users of the system under
development should be involved in reviewing the
output of each phase to ensure the system is being
built to deliver the needed functionality.

9
PHASES DEVELOPMENT LIFE
CYCLE
INITIATION PHASE :-

The Initiation Phase begins when a business


sponsor identifies a need or an opportunity.

The purpose of the Initiation Phase is to :

 Identify and validate an opportunity to


improve business accomplishments of the
organization or a deficiency related to a
business need.
 Identify significant assumptions and
constraints on solutions to that need.
 Recommend the exploration of alternative
concepts and methods to satisfy the need
including questioning the need for
technology, i.e., will a change in the business
process offer a solution?

10
 Assure executive business and executive
technical sponsorship. The Sponsor
designates a Project Manager and the
business need is documented in a Concept
Proposal. The Concept Proposal includes
information about the business process and
the relationship to the Agency/Organization.
 Infrastructure and the Strategic Plan. A
successful Concept Proposal results in a
Project Management Charter which outlines
the authority of the project manager to begin
the project.

Careful oversight is required to ensure


projects support strategic business objectives
and resources are effectively implemented into
an organization's enterprise architecture. The
initiation phase begins when an opportunity to
add, improve, or correct a system is identified
and formally requested through the presentation
of a business case. The business case should, at
a minimum, describe a proposal’s purpose,

11
identify expected benefits, and explain how the
proposed system supports one of the
organization’s business strategies. The business
case should also identify alternative solutions
and detail as many informational, functional, and
network requirements as possible.

SYSTEM CONCEPT
DEVELOPMENT PHASE :-

The System Concept Development Phase begins


after a business need or opportunity is validated
by the Agency/Organization Program Leadership
and the Agency/Organization CIO.

The purpose of the System Concept Development


Phase is to :

12
 Determine the feasibility and appropriateness
of the alternatives.
 Identify system interfaces.
 Identify basic functional and data
requirements to satisfy the business need.
 Establish system boundaries; identify goals,
objectives, critical success factors, and
performance measures.
 Evaluate costs and benefits of alternative
approaches to satisfy the basic functional
requirements.
 Assess project risks
 Identify and initiate risk mitigation actions,
and Develop high-level technical
architecture, process models, data models,
and a concept of operations. This phase
explores potential technical solutions within
the context of the business need.
 It may include several trade-off decisions
such as the decision to use COTS software
products as opposed to developing custom
software or reusing software components, or

13
the decision to use an incremental delivery
versus a complete, onetime deployment.
 Construction of executable prototypes is
encouraged to evaluate technology to
support the business process. The System
Boundary Document serves as an important
reference document to support the
Information Technology Project Request
(ITPR) process.
 The ITPR must be approved by the State CIO
before the project can move forward.

PICTORIAL PRESENTATION OF
SDLC

14
PLANNING PHASE:-

The planning phase is the most critical step in


completing development, acquisition, and maintenance
15
projects. Careful planning, particularly in the early
stages of a project, is necessary to coordinate activities
and manage project risks effectively. The depth and
formality of project plans should be commensurate with
the characteristics and risks of a given project. Project
plans refine the information gathered during the
initiation phase by further identifying the specific
activities and resources required to complete a project.
A critical part of a project manager’s job is to
coordinate discussions between user, audit, security,
design, development, and network personnel to identify
and document as many functional, security, and
network requirements as possible. During this phase, a
plan is developed that documents the approach to be
used and includes a discussion of methods, tools, tasks,
resources, project schedules, and user input. Personnel
assignments, costs, project schedule, and target dates
are established.
A Project Management Plan is created with
components related to acquisition planning,
configuration management planning, quality assurance
planning, concept of operations, system security,
verification and validation, and systems engineering
management planning.

16
REQUIREMENTS ANALYSIS P
HASE:

This phase formally defines the detailed


functional user requirements using high-level
requirements identified in the Initiation, System
Concept, and Planning phases. It also delineates
the requirements in terms of data, system
performance, security, and maintainability
requirements for the system. The requirements
are defined in this phase to a level of detail
sufficient for systems design to proceed. They
need to be measurable, testable, and relate to
the business need or opportunity identified in the
Initiation Phase. The requirements that will be
used to determine acceptance of the system are
captured in the Test and Evaluation Masterplan.

The purposes of this phase are to:

 Further define and refine the functional and


data requirements and document them in the
Requirements Document,
 Complete business process reengineering of
the functions to be supported (i.e., verify
what information drives the business process,
what information is generated, who
17
generates it, where does the information go,
and who processes it),
 Develop detailed data and process models
(system inputs, outputs, and the process.
 Develop the test and evaluation
requirements that will be used to determine
acceptable system performance.
SOFTWARE AND
HARDWARE USED

SOFTWARE:
Operating System : Windows 10 Home
Single

Language

Programming Language : Python

IDLE : Python 3.11 64-


bit

Editing : Microsoft Word 2019

HARDWARE:
Processor : Intel(R)Core(TM) i3-
10110U CPU

@ 2.10GHz
2.59 GHz

18
RAM : 4GB

Settings:
Display Resolution : 1366*768

Others:
Printer : HP Ink Tank 310
series

DESIGN PHASE:-
Identifying potential risks and defining mitigating
design features.
 Performing a security risk assessment.

 Developing a conversion plan to migrate


current data to the new system.
 Determining the operating environment.

 Defining major subsystems and their inputs

and outputs.
 Allocating processes to resources.

 Preparing detailed logic specifications for


each software module. The result is a draft
System Design Document which captures the
preliminary design for the system.

19
 Everything requiring user input or approval is
documented and reviewed by the user. Once
these documents have been approved by the
Agency CIO and Business Sponsor, the final
System Design Document is created to serve
as the Critical/Detailed Design for the
system.
 This document receives a rigorous review by
Agency technical and functional
representatives to ensure that it satisfies the
business requirements. Concurrent with the
development of the system design, the
Agency Project Manager begins development
of the Implementation Plan, Operations and
Maintenance Manual, and the Training Plan.

DEVELOPMENT PHASE:-

The development phase involves converting


design specifications into executable programs.
Effective development standards include
requirements that programmers and other project
participants discuss design specifications before
programming begins. The procedures help ensure
programmers clearly understand program designs

20
and functional requirements. Programmers use
various techniques to develop computer programs.
The large transaction-oriented programs associated
with financial institutions have traditionally been
developed using procedural programming
techniques. Procedural programming involves the
line-by-line scripting of logical instructions that are
combined to form a program. Effective completion of
the previous stages is a key factor in the success of
the Development phase. The Development phase
consists of:

 Translating the detailed requirements and design


into system components.
 Testing individual elements (units) for usability.
 Preparing for integration and testing of the IT
system.

TESTING PHASE:-
Subsystem integration, system, security,
and user acceptance testing is conducted during
21
the integration and test phase. The user, with
those responsible for quality assurance, validates
that the functional requirements, as defined in
the functional requirements document, are
satisfied by the developed or modified system.
OIT Security staff assess the system security and
issue a security certification and accreditation
prior to installation/implementation.

Multiple levels of testing are


performed, including:
 Testing at the development facility by the
contractor and possibly supported by end
users
 Testing as a deployed system with end users
working together with contract personnel
 Operational testing by the end user alone
performing all functions. Requirements are
traced throughout testing; a final
Independent Verification & Validation
evaluation is performed and all
documentation is reviewed and accepted
prior to acceptance of the system.

22
IMPLEMENTATION PHASE:-

This phase is initiated after the system has


been tested and accepted by the user. In this
phase, the system is installed to support the
intended business functions. System
performance is compared to performance
objectives established during the planning phase.
Implementation includes user notification, user
training, installation of hardware, installation of
software onto production computers, and
integration of the system into daily work
processes. This phase continues until the system
is operating in production in accordance with the
defined user requirements.

23
OPERATIONS AND
MAINTENANCE PHASE :-
The system operation is ongoing. The system
is monitored for continued performance in
accordance with user requirements and needed
system modifications are incorporated.
Operations continue as long as the system can
be effectively adapted to respond to the
organization’s needs. When modifications or
changes are identified, the system may renter
the planning phase.

The purpose of this phase is to:

 Operate, maintain, and enhance the system.


 Certify that the system can process sensitive
information.
 Conduct periodic assessments of the system
to ensure the functional requirements
continue to be satisfied.
 Determine when the system needs to be
modernized, replaced, or retired.

24
FLOW CHART

25
DATABASE AND TABLES

Database And Table :-

Table Structure :-

26
SOURCE CODE

27
28
29
30
OUTPUT

MAIN MENU :-

31
To perform all functions :-
1. Adding Multiple
Contacts

32
2. Viewing All Contacts

3. Searching Contacts

33
4. Updating Contact

5. Deleting Contact

6. Sorting Contacts
 Adding another contact first

34
 Performing sort command

35
7. Exporting contacts

8. Exit

36
TESTING

Software Testing is an empirical investigation


conducted to provide stakeholders with
information about the quality of the product or
service under test[1] , with respect to the context
in which it is intended to operate. Software
Testing also provides an objective, independent
view of the software to allow the business to
appreciate and understand the risks at
implementation of the software. Test techniques
37
include, but are not limited to, the process of
executing a program or application with the
intent of finding software bugs.
It can also be stated as the process of
validating and verifying that a software
program/application/product meets the business
and technical requirements that guided its design
and development, so that it works as expected
and can be implemented with the same
characteristics. Software Testing, depending on
the testing method employed, can be
implemented at any time in the development
process, however the most test effort is
employed after the requirements have been
defined and coding process has been completed.

Conclusion
In conclusion, this project demonstrates the
successful implementation of a contact
management system that combines Python's
programming capabilities with MySQL's robust

38
database management features. While it serves
as a functional prototype for real-world
applications, it also highlights areas for
improvement, such as adding a graphical user
interface or integrating cloud-based storage
solutions. Overall, it has been an enriching
experience to design, develop, and implement
this project, showcasing the practical application
of programming and database skills.

Features of the System:-


1.Add Contacts: Allows users to store contact
details like name, phone number, email, and
address.
2.View All Contacts: Displays all saved
contacts in a clear and organized manner.
3.Search Contacts: Enables searching for
contacts using criteria like name, phone, or
email.
4.Update Contact Details: Provides the
ability to modify existing contact information.
5.Delete Contacts: Facilitates the removal of
unnecessary or duplicate contacts.
6.Sort Contacts: Offers options to sort
contacts by name, phone, or email.
7.Export Contacts: Allows exporting contact
data into a file (e.g., CSV format) for offline
use.

39
8.Menu-Driven Navigation: A user-friendly
main menu and sub-menus guide users
through various operations seamlessly.

Advantages
 User-Friendly Interface: The menu-driven
design ensures ease of use for beginners and
advanced users alike.
 Data Security: Contacts are stored securely
in a MySQL database, preventing data loss.
 Scalability: The system can handle a large
number of contacts efficiently.
 Customization: The modular structure
allows for easy modifications and
enhancements.
 Portability: The program can run on any
system with Python and MySQL installed.

Disadvantages
1.Command-Line Interface: The absence of
a graphical user interface (GUI) may make it
less appealing for some users.
2.Dependency on MySQL: Requires MySQL to
be installed and configured on the user's
system.
3.Limited Validation: While basic validations
are implemented, more robust error handling
could improve the program.

40
4.Not Real-Time: The system lacks advanced
features like real-time syncing with online
contact lists.

BIBLIOGRAPHY

 Informatics Practices - Class XII By :


Sumita Arora

 Website: https://www.w3resource.com

 en.Wikipedia.org

 Website: https://www.quora.com/
 Website: https://python.mykvs.in/

41

You might also like