Payroll Management Project
Payroll Management Project
ON
“PAYROLL MANAGEMENT”
SUBMITTED BY
Name: VIKEY KUMAR SINGH
Enroll No.:
Class : XII
Group Members : VIKEY KUMAR SINGH
TUSHAR RAJ GUPTA
RAJ KUMAR
Date: 13/01/2025
APPROVED BY-
1
TABLE OF CONTENT
PAGE
SER DESCRIPTION
NO
01 CERTIFICATE 03
02 ACKNOWLEDGEMENT 04
03 INTRODUCTION 05
05 PROPOSED SYSTEM 06
08 FLOW CHART
09 SOURCE CODE 18
10 OUTPUT 27
11 TESTING 32
13 REFERNCES 36
2
CERTIFICATE
3
ACKNOWLEDGEMENT
4
PROJECT ON PAYROLL MANAGEMENT
INTRODUCTION
A payroll management system is an accounting method used to
process, streamline, and manage wages paid to employees. It
calculates salaries after the deduction of taxes, benefits payments,
track hours worked, issues payments through check or direct deposit
and keeps accurate records of all employees
5
PROPOSED OF THE PROJECT
regulations.
policies.
6
● Direct Deposit: Offers employees the option to receive their
employees.
manual labor.
7
SYSTEM DEVELOPMENT LIFE CYCLE (SDLC)
8
For example, initial project activities might be designated as request,
requirements-definition, and planning phases, or initiation, concept-
development, and planning phases. End users of the system under development
should be involved in reviewing the output of each phase to ensure the system is
being built to deliver the needed functionality.
INITIATION PHASE
The Initiation Phase begins when a business sponsor identifies a need or an
opportunity.
9
• Infrastructure and the Strategic Plan. A successful Concept Proposal
results in a Project Management Charter which outlines the authority of
the project manager to begin
the project.
10
• Establish system boundaries; identify goals, objectives, critical success
factors, and performance measures.
• Evaluate costs and benefits of alternative approaches to satisfy the basic
functional requirements
• Assess project risks
• Identify and initiate risk mitigation actions, and Develop high-level
technical architecture, process models, data models, and a concept of
operations. This phase explores potential technical solutions within the
context of the business need.
• It may include several trade-off decisions such as the decision to use
COTS software products as opposed to developing custom software or
reusing software components, or the decision to use an incremental
delivery versus a complete, onetime deployment.
• Construction of executable prototypes is encouraged to evaluate
technology to support the business process. The System Boundary
Document serves as an important reference document to support the
Information Technology Project Request (ITPR) process.
• The ITPR must be approved by the State CIO before the project can
move forward.
11
PLANNING PHASE
12
concept of operations, system security, verification and validation, and systems
engineering management planning.
This phase formally defines the detailed functional user requirements using
high-level requirements identified in the Initiation, System Concept, and
Planning phases. It also delineates the requirements in terms of data, system
performance, security, and maintainability requirements for the system. The
requirements are defined in this phase to a level of detail sufficient for systems
design to proceed. They need to be measurable, testable, and relate to the
business need or opportunity identified in the Initiation Phase. The requirements
that will be used to determine acceptance of the system are captured in the Test
and Evaluation Master Plan.
• Further define and refine the functional and data requirements and
document them in the Requirements Document,
• Complete business process reengineering of the functions to be supported
(i.e., verify what information drives the business process, what
information is generated, who generates it, where does the information
go, and who processes it),
• Develop detailed data and process models (system inputs, outputs, and
the process.
• Develop the test and evaluation requirements that will be used to
determine acceptable system performance.
DESIGN PHASE
13
The design phase involves converting the informational, functional, and
network requirements identified during the initiation and planning phases into
unified design specifications that developers use to script programs during the
development phase. Program designs are constructed in various ways. Using a
top-down approach, designers first identify and link major program components
and interfaces, then expand design layouts as they identify and link smaller
subsystems and connections. Using a bottom-up approach, designers first
identify and link minor program components and interfaces, then expand design
layouts as they identify and link larger systems and connections. Contemporary
design techniques often use prototyping tools that build mock-up designs of
items such as application screens, database layouts, and system architectures.
End users, designers, developers, database managers, and network
administrators should review and refine the prototyped designs in an iterative
process until they agree on an acceptable design. Audit, security, and quality
assurance personnel should be involved in the review and approval process.
During this phase, the system is designed to satisfy the functional requirements
identified in the previous phase. Since problems in the design phase could be
very expensive to solve in the later stage of the software development, a variety
of elements are considered in the design to mitigate risk. These include:
14
• Preparing detailed logic specifications for each software module. The
result is a draft System Design Document which captures the preliminary
design for the system.
• Everything requiring user input or approval is documented and reviewed
by the user. Once these documents have been approved by the Agency
CIO and Business Sponsor, the final System Design Document is created
to serve as the Critical/Detailed Design for the system.
• This document receives a rigorous review byAgency technical and
functional representatives to ensure that it satisfies the business
requirements. Concurrent with the development of the system design, the
Agency Project Manager begins development of the Implementation
Plan, Operations and Maintenance Manual, and the Training Plan.
DEVELOPMENT PHASE
IMPLEMENTATION PHASE
This phase is initiated after the system has been tested and accepted by the user.
In this phase, the system is installed to support the intended business functions.
System performance is compared to performance objectives established during
16
the planning phase. Implementation includes user notification, user training,
installation of hardware, installation of software onto production computers, and
integration of the system into daily work processes. This phase continues until
the system is operating in production in accordance with the defined user
requirements.
17
SOURCE CODE
import mysql.connector as m
import datetime
mydb=m.connect(host="localhost",user="root",password="vikey@123")
mycursor = mydb.cursor()
mycursor.execute(sql)
mycursor=mydb.cursor()
mycursor.execute("Use "+db)
job varchar(15),\
BasicSalary int,\
DA float,\
HRA float,\
GrossSalary float,\
Tax float,\
NetSalary float)"
print("Table"+TableName+"created successfully...")
mycursor.execute(query)
18
while True:
print('\n\n\n')
print("*"*95)
print('\t\t\t\t\tMAIN MENU')
print("*"*95)
print('Enter Choice:-',end='')
choice=int(input())
if choice==1:
try:
if mjob.upper()=="OFFICER" :
mda=mbasic*0.5
mhra=mbasic*0.35
19
mtax=mbasic*0.2
elif mjob.upper()=="MANAGER" :
mda=mbasic*0.45
mhra=mbasic*0.30
mtax=mbasic*0.15
else:
mda=mbasic*0.40
mhra=mbasic*0.25
mtax=mbasic*0.1
mgross=mbasic+mda+mhra
mnet=mgross-mtax
rec =(mempno,mname,mjob,mbasic,mda,mhra,mgross,mtax,mnet)
mycursor.execute(query,rec)
mydb.commit()
except:
elif choice==2:
try:
mycursor.execute(query)
#print(query)
'''myrecords=mycursor.fetchall()
20
print(rec)'''
except:
elif choice==3:
try:
mycursor.execute(query)
myrecord=mycursor.fetchone()
print(myrecord)
c=mycursor.rowcount
if c==-1:
print('Nothing to display')
except:
elif choice==4:
try:
if ch.upper()=='Y':
mydb.commit()
except:
elif choice==5:
21
try:
mycursor.execute(query)
mydb.commit()
c=mycursor.rowcount
if c>0:
print('Deletion done')
else:
except:
elif choice==6:
try:
mycursor.execute(query)
myrecord=mycursor.fetchone()
c=mycursor.rowcount
if c==-1:
else:
mname=myrecord[1]
mjob=myrecord[2]
mbasic=myrecord[3]
print('empno :',myrecord[0])
print('name :',myrecord[1])
22
print('job :',myrecord[2])
print('basic :',myrecord[3])
print('da :',myrecord[4])
print('hra :',myrecord[5])
print('gross :',myrecord[6])
print('tax :',myrecord[7])
print('net :',myrecord[8])
print('----------------------')
x=input('Enter name')
if len(x)>0:
mname=x
x=input('Enter job')
if len(x)>0:
mjob=x
if len(x)>0:
mbasic=float(x)
print(query)
mycursor.execute(query)
mydb.commit()
print('Record modified')
except:
elif choice==7:
23
try:
mycursor.execute(query)
myrecords=mycursor.fetchall()
print("\n\n\n")
print(95*'*')
print('Employee Payroll'.center(90))
print(95*'*')
now = datetime.datetime.now()
print(now.strftime("%d-%m-%Y %H:%M:%S"))
print()
print(95*'-')
%('Empno','Name','Job','Basic','DA','HRA','Gross','Tax','Net'))
print(95*'-')
print(95*'-')
except:
elif choice==8:
try:
mycursor.execute(query)
myrecords=mycursor.fetchall()
print("\n\n\n")
24
print(95*'*')
print('Salary Slip'.center(90))
print(95*'*')
now = datetime.datetime.now()
print(now.strftime("%d-%m-%Y %H:%M:%S"))
print()
print(95*'-')
print(95*'-')
except:
elif choice==9:
try:
now = datetime.datetime.now()
print(now.strftime("%d-%m-%y %H:%M:%S"))
#print(query)
except Exception as e:
25
print('Something went wrong')
elif choice==10:
break
else:
print('Wrong Choice.')
OUTPUT
================================================================
CREATINGH DATABASE
● PYTHON OUTPUT
● MYSQL OUTPUT
26
ADDING EMPLOYEE RECORDS
● PYTHON OUTPUT
● MYSQL OUTPUT
27
FOR DISPLAYING ALL EMPLOYEE DETAILS
● PYTHON OUTPUT
● MYSQL OUTPUT
28
FOR DISPLAYING PARTICULAR EMPLOYEE
● PYTHON OUTPUT
29
● MYSQL OUTPUT
● MYSQL OUTPUT
30
DISPLAYING PAYSLIP OF EMPLOYEES
● PYTHON OUTPUT
TESTING
31
Software Testing is an empirical investigation conducted to provide
stakeholders with information about the quality of the product or service under
test, with respect to the context in which it is intended to operate. Software
Testing also provides an objective, independent view of the software to allow
the business to appreciate and understand the risks at implementation of the
software. Test techniques include, but are not limited to, the process of
executing a program or application with the intent of finding software bugs.
It can also be stated as the process of validating and verifying that a software
program/application/product meets the business and technical requirements that
guided its design and development, so that it works as expected and can be
implemented with the same characteristics. Software Testing, depending on the
testing method employed, can be implemented at any time in the development
process, however the most test effort is employed after the requirements have
been defined and coding process has been completed.
TESTING METHODS
Software testing methods are traditionally divided into black box testing and
white box testing. These two approaches are used to describe the point of view
that a test engineer takes when designing test cases.
Black box testing treats the software as a "black box," without any knowledge
of internal implementation. Black box testing methods include: equivalence
partitioning, boundary value analysis, all-pairs testing, fuzz testing, model-
based testing, traceability matrix, exploratory testing and specification-based
testing.
32
SPECIFICATION-BASED TESTING
The black box tester has no "bonds" with the code, and a tester's perception is
very simple: a code must have bugs. Using the principle, "Ask and you shall
receive," black box testers find bugs where programmers don't. But, on the other
hand, black box testing has been said to be "like a walk in a dark labyrinth
without a flashlight," because the tester doesn't know how the software being
tested was actually constructed.
That's why there are situations when (1) a black box tester writes many test
cases to check something that can be tested by only one test case, and/or (2)
some parts of the back end are not tested at all. Therefore, black box testing has
the advantage of "an unaffiliated opinion," on the one hand, and the
disadvantage of "blind exploring," on the other.
33
White box testing, by contrast to black box testing, is when the tester has access
to the internal data structures and algorithms (and the code that implement
these)
For example, the test designer can create tests to cause all statements in the
program to be executed at least once.
• fault injection methods.
• mutation testing methods.
• static testing - White box testingincludes all static testing.
CODE COMPLETENESS EVALUATION
White box testing methods can also be used to evaluate the completeness of a
test suite that was created with black box testing methods. This allows the
software team to examine parts of a system that are rarely tested and ensures
that the most important function points have been tested.
34
ATHALON(3800+- 4200+ DUAL CORE)
X. Printer : required
SOFTWARE REQUIREMENTS:
• Windows O
• Python–
• MySQL
REFERENCES
1.Python Documentation : https://docs.python.org/
THANK YOU
35