Project For 2025 Computer Science Change
Project For 2025 Computer Science Change
1. The solutions are given as a proposal. The suggestion Is revised on user request
and optimal changes are Made. This loop terminates as soon as the user is gratified
with the proposal.
2. So on the whole, system analysis is done to improve the system performance by
monitoring it and obtaining the best throughput possible from it. Therefore system
analysis plays a crucial role in designing any system.
3. This is basically an interface of global distribute System to carry out reservation
on desired airline from any place.
4. Airline reservation system make the life of Passengers very easy as they don’t
need to stand in Queues for getting their seats reserved.
5. They can easily make reservation of any airline just from a single system. On the
other hand, it also Remove an extra burden from the Airline Department as most
of the passengers and travel Agencies use this service instead of making
Reservations from the counters
BIBLIOGRAPHY
https://www.google.com
https://www.wikipedia.org
http://www.botskook.com
COMPUTER SCIENCE WITH
PYTHON BY SUMIT ARORA
INDEX
4. Advantages of Project
5. Limitations of Project
7. Output Screens
9. Bibliography
SOFTWARE AND
HARDWAREREQUIREMENTS:
Data file handling has been effectively used in the
program. The database is a collection of interrelated
data to serve multiple applications. That is database
program secrete file so for information. So we see that
files are worked with most, inside the program.
DBMS : The software required for the management
ofdataiscalledasDBMS.Ithas3 models:
• Relation model
• Hierarchical model
• Network model
RELATIONALMODEL: It’s based on the concept on
relation. Relation is the table that consists of rows and
columns. The rows of the table are called tuple and the
columns of the table are called attribute. Numbers of
rows in the table is called as cardinality. Number of
columns in the table is called as degree.
HIERARCHICAL MODEL: In this type of model, we
have multiple records for each record. particular
Record has one parent record. No chide record can
exist without parent record. In this, the records are
organized in tree
NETWORK MODEL: In this, the data is represented by
collection of records and relationship is represented
by(in kop association.)
CHARACTERISTICSOFDBMS:
• It reduces the redundancy
• Reduction of data in inconsistency
• Data sharing
• Data standardization
DIFFERENTTYPESOFFILES:-BASEDONACCESS:
• Sequential file
• Serial file
• Random(direct access)file BASED ON STORAGE:-
• Text file
• Binary File
Advantages
1. Increased Efficiency: Automating tasks like inventory tracking and
sales processing saves time and reduces manual errors, allowing staff
to focus on customer service.
2. Real-Time Data Access: Instant access to sales, inventory levels,
and customer information facilitates informed decision-making and
quick adjustments to stock and pricing.
3. Improved Inventory Management: Automated reorder alerts and
stock tracking minimize the risk of overstocking or running out of
popular items, optimizing inventory levels.
4. Enhanced Customer Experience: Faster checkout processes,
personalized marketing, and loyalty programs improve customer
satisfaction and retention.
5. Comprehensive Reporting: Detailed sales and performance reports
help identify trends, optimize pricing strategies, and enhance overall
business performance.
Limitations
1. Initial Costs: Setting up a computerized system requires significant
investment in software, hardware, and training, which can be a
barrier for small stores.
2. Technical Issues: Reliance on technology can lead to disruptions if
software malfunctions or hardware fails, impacting store operations.
3. Training Requirements: Staff need training to effectively use new
systems, which can take time and may face resistance from
employees accustomed to manual processes.
4. Data Security Risks: Storing sensitive customer and business data
digitally poses risks of data breaches or cyber attacks, requiring
robust security measures.
5. Dependence on Technology: Over-reliance on computer systems
can make businesses vulnerable to system outages or failures,
impacting day-to-day operations.