Automobile Management System Document

July 14, 2017 | Author: SathyaPriya Ramasamy | Category: Relational Database, Databases, Computer Security, Online Safety & Privacy, Microsoft Access
Share Embed Donate


Short Description

VB MS Access project for managing vehicle showrooms...

Description

1. INTRODUCTION 1.1 OVERVIEW OF THE PROJECT The proposed project is developed to manage the automobile in the automobile dealer company. The main module in this project is login, automobile management, customer management, sales, complaints and reports. The first module is the login. The automobile showroom owner should login to the project for usage. The username and password are verified and if it is correct, next form opens. If the username and password are not correct, it shows the error message. When a customer search for a automobile, if the automobile is available, they will be taken to a page that shows the details of the automobile including automobile name, automobile ID, quantity, price etc. “Automobile Management System” is useful for maintaining automobiles, customers effectively and hence helps for establishing good relation between customer and automobile organization. It contains various customized modules for effectively maintaining automobiles and stock information accurately and safely. When the automobile is sold to the customer, stock will be reduced automatically. When a new purchase is made, stock will be increased automatically. While selecting automobiles for sale, the proposed software will automatically check for total number of available stock of that particular item, if the total stock of that particular item is less than 5, software will notify the user to purchase the particular item. Also when the user tries to sale items which are not in stock, the system will prompt the user that the stock is not enough. Customers of this system can search for a automobile; can purchase a automobile easily by selecting fast. On the other hand the stock of automobiles can be maintained perfectly by the automobile shop manager overcoming the drawbacks of existing system.

1

1.2 DESCRIPTION OF MODULES Major modules of the automobile management system are        

Login module Registration module Customer module Automobile module Sales module Delivery module Supplier module Reports module

Login Module It is used for logging in the automobile showroom management. It is used for verifying the user. Once the user is authenticated, they can access the system. Registration Module New user can register in order to use the full features of this system. Normal users can also access the proposed system but with limited features. Only the registered users can get more priorities than the unregistered guest user. Once the guest users register to this system, they can also get full access to this system. Customer Module It is used for adding new customers and for updating existing customers. It is used for storing new customers as well as for updating the customer’s details. The module is very useful to find the number of customers who paid bill. Some customers might not pay the bills on time. Customer details can be easily searched, so it will be easy to find bill payment details. It has a primary key field named customerno. The file is very useful for maintaining customers. Automobile Module 2

It is used for adding new automobiles and for viewing, editing and deleting existing automobiles. It is used for searching items in this system. Here the admin have the privileges to search items in this system. Automobile details are stored with their brand name. When a particular brand is being liked by people, that particular brand will be purchased and kept in stock with large quantity. Sales Module It is used for adding sales details to proposed system. Here the admin have privileges to add details in automobile showroom management. Sales reports can be viewed overall as well as date wise, month wise and year wise. Delivery Module It is used for storing details of new deliveries in the automobile showroom management. Admin can perform operations like monitoring automobile stock details, customer order details and delivery details. Delivery reports can be viewed overall as well as date wise, month wise and year wise. Supplier Module It is used for maintaining supplier details like supplier ID, name, contact person and address and phone number. Supplier or dealer can be cancelled when their items are not being sold out. It is very essential in order to get good stock items for a company. Reports Module It is used for generating various reports like cash order report, credit order reports and payment reports. Sales and delivery reports can be viewed date wise, month wise and year wise. Reports can be viewed based on the user’s choice.

1.3 SYSTEM SPECIFICATION

3

1.3.1 HARDWARE SPECIFICATION CPU

: Intel Core i3

RAM

: 32MB

Hard Disk

: 5 GB

Monitor

: 16 LG

Mouse

: Logitech mouse

Keyboard

: 104 Keys

Mother Board

: Intel

Speed

: 3.3 GHZ

1.3.2 SOFTWARE SPECIFICATION Operating System

: Windows 2007

Front End

: Visual Basic

Back End

: MS Access

Reports

: Data Report

1.4 SOFTWARE FEATURES 4

VISUAL BASIC 6.0 Visual basic is an ideal programming language for developing sophisticated professional applications for Microsoft Windows. Visual basic programming introduces a variety of features that make it easier to create powerful, flexible applications. It makes use of Graphical User Interface for creating robust and powerful applications. The Graphical user Interface uses illustration for text, which enables users to interact with an application. Visual basic has evolved from the original BASIC language and now contains several hundred statements, functions, and keywords, many of which relate directly to the Windows Operating System includes,    

Multitasking Message driven architecture Dynamic linking CPU time slicing

Features of visual basic      

Easier comprehension User-friendliness Faster application development Introduction to Active-X technology Internet features Support OLE, which is a means of communication and gives application the



power to directly use and manipulate other windows application. Data Environment Designer, which provides an interactive design time environment for creating programs with runtime access to data.

Integrated Development Environment Integrated Development Environment (IDE) is a term commonly used in the programming world to describe the interface and environment that is used to create applications. IDE is commonly referred to as the design environment or the program. IDE is made up of components such as menu bar, tool bar, object browser, form layout window, and form designer. 5

In visual basic 6.0 IDE is a Multiple Document Interface (MDI) format. In Multiple Document Interface format, the windows associated with the project will stay within a single container known as the parent. Code and form based windows will stay within the main container form. Visual basic can be used to create the following types of applications.     

Standard EXE Active EXE ActiveX DLL ActiveX Control VB application wizard

Event driven programming Visual basic allows adopting more of a parallel approach, with independent sections of code for each option that the user may select. This is known as Event Driven Programming. Event Driven Programming is based on the Message Driven Architecture of windows. Visual Basic programs are built around events. Events are various things that can happen in program. In Event Driven application, the program statements are executed only when a particular event calls specific parts of the code that is assigned to the event. For example consider textbox control and some of its events,  

Click event fires when text box control is clicked. Mouse move event is fired when mouse is moved over the text box.

Data access options Microsoft visual data tools allow the ability to view and manipulate tables, views, stored procedures, and database schemas on SQL server and Oracle systems. Visual Basic provides a variety of options to access Remote Client/Server databases. ADO Object Model Visual Basic supports ActiveX Data Objects Microsoft’s new, high level interface to all kinds of data. ADO objects can be created at design- time using the updated Data Environment Designer. ADO is an interface for both local and remote data access, remote and 6

disconnected record sets and hierarchical record sets. The ADO object model provides an easy-to-use set of objects, properties, and methods for creating script that access data in databases. ADO consists of seven objects, three of which are independent and four are dependent objects. Independent objects can exist by themselves; dependent objects must exist in connection with an independent object.       

Parameter Connection Command Record set Error Property Field

Purpose of choosing Visual Basic 

It is an ideal programming language for developing sophisticated professional



application for Windows. It makes use of Graphical User Interface for creating robust and powerful

 

applications. It uses illustration for text, which enables users to interact with an application. In GUI the options open to the user is much greater allowing more freedom to the



end user and developer. Major features are easier comprehension, faster application development and other aspects such as ActiveX, Internet features and VB script.

MS-ACCESS Microsoft Access is a powerful database management system and the user can create entire application that requires little or no programming. It supports GUI features and an entire programming language, VBA (Visual Basic 6.0 for application). Access is easy enough to use that in a short time beginners can manage their own data. In MS –Access, the database means a collection of tables that hold data. It collectively stores all other object such as

7

queries, forms and reports that are used to implement the database management function effectively. The MS-Access database can act as a back-end database for Visual Basic 6.0 as affront end tool. MA Access supports the user with its powerful management functions. Beginners can create their own database very simply with some mouse clicks. MS-Access database supports so many data types when a user can incorporate data from other applications. A database created in MS-Access can be accessed through Visual Basic 6.0 using data control. Here database means a collection of related tables and a table means a collection of number of records where a record means a collection of inter-related fields. It should be noted that a field in an entity is used to describe straight. A single table can have any number of indexed fields that can be used to locate records using an expression. This helps in filtering out information according to specific criteria. A user can move inside a table very easily using the navigator tools supported by the MS-Access database. A table can be accessed in a number of ways like as a snapshot, dynast, etc.

2. SYSTEM STUDY 2.1 EXISTING SYSTEM All automobile details like available in the company are entered and managed in this and managed. Price details and stock details of the automobiles are managed separately. The customer details are entered to call the customer for further purchase of automobile. The 8

customer name, address and phone number details are managed separately. The details are entered and edited by the administrator. But everything is done manually. Most of the existing system is manual, so data manipulations are not accurate and also processing time is slow. When the stock and automobile count increases, manual manipulation of data becomes very difficult. 2.1.1 DRAWBACKS Even though computerized system exists, there are various drawbacks. They are as follows.  

User cannot search automobiles fast when the number of automobiles increases. Primary key fields should be used wherever necessary while designing in order to



manage database efficiently and for accessing information soon. Stock management is not efficiently done. User can only know when the stock is

   

empty. Prior information about stock is not possible. Takes much time for searching particular automobile details. Difficult to maintain automobile details and employee details Existing system is not accurate. Even though some existing systems are computerized, there occur redundancy



problems due to duplication of entries. If the automobile entries have duplicate values, it cannot be maintained properly and accurately

2.2 PROPOSED SYSTEM The proposed system is very useful for the employee and customers. It avoids the overheads for the employee. They can minimize the working stress and can keep essential documents related to the automobile and the passengers as a softcopy. The advantage of the proposed system is the reduction in the cost of the office equipments and the transaction is done quickly. Any employee can answer if any delivery for a particular customer in a particular day is available or not.

9

The proposed project will allow the customers to perform certain activities like login and searching for automobiles. Customers may open an account with the store if they wish including a username and password. In login form users will be authenticated and it is also possible to find whether they are customer or admin through their login information which was entered. A customer must be logged in before searching for automobiles for purchase. If a user attempts to login with incorrect details, they will be not be redirected to access the application. When a customer search for a automobile, if the stock of the automobile is available, they will be taken to a page that shows the details of the automobile including automobile title, automobile ID, quantity, price etc in order for sale. 2.2.1 ADVANTAGES OF PROPOSED SYSTEM Features of the proposed project are as follows. 

Stock management as well as automobile management is done very quickly as



well as efficiently in proposed project. Another feature added in the project is, when the regular customers purchase

     

items from automobile, software will automatically give them discount offers. Prepares and produces accurate outputs Reduces the time needed and expenses Makes the information flow efficient Easy report generation is possible Provides attractive user interface. Efficient searching of automobile details by just entering automobile code is possible.

3. SYSTEM DESIGN AND DEVELOPMENT 3.1 FILE DESIGN Flat File Database A flat file database is a database designed around a single table. The flat file design puts all database information in one table, or list, with fields to represent all parameters. A flat file may contain many fields, often, with duplicate data that are prone to data corruption. If

10

data between two flat files have to be merged, it is needed to copy and PSMte relevant information from one file to the other. There is no automation between flat files. If two or more flat files that contain client addresses, it is required to manually modify the address parameters in each file that contains that client’s information. Changing information in one file has no bearing on other files. Flat files offer the functionality to store information, manipulate fields, print or display formatted information and exchange information with others, through email and over the Internet. Some flat files may be attached to external files, such as text editors, to extend functionality and manage related information. Relational File Database A relational database, on the other hand, incorporates multiple tables with methods for the tables to work together. The relationships between table data can be collated, merged and displayed in database forms. Most relational databases offer functionality to share data:    

Across networks Over the Internet With laptops and other electronic devices, such as palm pilots With other software systems

Designing flat file databases is simple and requires little design knowledge. Flat files can be developed using just about any database engine. Flat files can be created in relational database engines by not taking advantage of relational design concepts. Designing a relational database takes more planning than flat file databases. With flat files, it is possible to add information, as you deem necessary. With relational databases, it is required to be careful to store data in tables such that the relationships make sense. Building a relational database is dependent upon the ability to establish a relational model. The model must fully describe how the data is organized, in terms of data structure, integrity, querying, manipulation and storage. Relational databases allow defining certain record fields, as keys or indexes, to perform search queries, join table records and establish integrity constraints. Search queries are faster and more accurate when based on indexed values. Table records can be easily joined by the indexed values. Integrity constraints can be established to 11

ensure that table relationships are valid. If the project is able to establish a one-to-many relationship in the data tables, relational database should be used because a flat file is not sufficient to handle the data processing needs. Relational databases offer more robust reporting with report generators that filter and display selected fields. Relational databases offer the capability to building own reporting modules. Most relational databases also offer the capability to import and export data from other software. There are three primary relational database systems, proprietary, open source and embedded. Proprietary relational databases require the use of proprietary development languages, often times, to complement SQL. Microsoft Access, for example, combines Visual Basic with SQL. Open source databases, such as MySQL, are distributed freely to encourage user development. Embedded, relational databases are packaged as part of other software packages, such as with tax-preparation software packages. The vendor supplies the database, and all manipulation tools, to control the database structure. These databases are, often times, accompanied with tools to provide audit trails of transactions. Proposed project uses relational database files implementing SQL queries in MS Access. So 1 to many relationships can be established between tables and the table data can be accessed soon even in the nonindexed locations.

3.2 INPUT DESIGN Input is any data or instructions entered into the memory of a computer. Two types of input are data and instructions. Data is a collection of unorganized items that can include words, numbers, pictures, sounds, and video. A computer processes data into information, which is organized, meaningful, and useful. Instructions can be in the form of programs, commands, or user responses.

12

A program is a series of instructions that tells a computer how to perform the tasks necessary to process data into information. A command is an instruction given to a computer program. A user response is an instruction you issue to the computer by responding to a question posed by a computer program. Any hardware component that allows entering data, programs, commands, and user responses into a computer is an input device. Inputs of Automobile Management System are eid, ename, qualification, automobileid, brand, cusid, cusname and salary.

3.3 OUTPUT DESIGN Output design involves specifying how production of on-screen reports and paper based reports will occur. Output may occur to database or file for storing information entered or also for use by other systems. Output is data that has been processed into a useful form called information. Four types of output are text, graphics, audio, and video. Text consists of characters (letters, numbers, punctuation marks, or any other symbol requiring one byte of computer storage space) that are used to create words, sentences, and paragraphs. Graphics are digital representations of non-text information such as drawings, charts, photographs, and animation (a series of still images in rapid sequence that gives the illusion of motion). Audio is music, speech, or any other sound. Video consists of images played back at speeds to provide the appearance of full motion. An output device is any computer component capable of conveying information to a user.

3.4 DATABASE DESIGN Database is designed to manage large bodies of information. The management of data involves both the definitions of structures for the storage of information. In addition the data base system must provide for the safety of the information solved, despite system crashes or due to attempts at unauthorized access. For developing an efficient database proposed project have to fulfill certain conditions such as controlled redundancy.

13

     

Defining the data Inputting the data Locating the data Accessing the data Communicating the data Revising the data

Objectives of Database design In database design several objectives are designed such as:         

Ease of use Control of data integrity Control of redundancy Control of security Data independence (logical & physical) Data storage protection System performance System functions System compatibility

For achieving the abovementioned criteria’s we have to make use of various features that are available with the RDBMS by enforcing integrity constrains, it is possible to ensure data integrity and reduce data inconsistency to a great extent.

3.4.1 DATAFLOW DIAGRAM A Data Flow Diagram (DFD) is a diagram that describes the flow of data and the processes that change data throughout a system. It’s a structured analysis and design tool that can be used for flowcharting in place of or in association with information. Oriented and process oriented system flowcharts. Four basic symbols are used to construct data flow diagrams. They are symbols that represent data source, data flows, and data transformations and data storage. The points at which data are transformed are represented by enclosed figures, usually circles, which are called nodes. Data Flow Diagram Symbols

14

-

Source or Destination of data

-

Data Flow

-

Process

-

Storage

When analysts prepare the Data Flow Diagram, they specify the user needs at a level of detail that virtually determines the information flow into and out of the system and the required data resources. The network is constructed by using a set of symbols that do not imply physical implementations. The Data Flow Diagram reviews the current physical system, prepares input and output specification, and specifies the implementation plan. Steps to Construct Data Flow Diagrams Four steps are commonly used to construct a DFD 

Process should be named and numbered for easy reference. Each name should be

  

representative of the process. The destination of flow is from top to bottom and from left to right. When a process is exploded in to lower level details they are numbered. The names of data stores, sources and destinations are written in capital letters.

Rules for constructing a Data Flow Diagram 15

   

Arrows should not cross each other. Squares, circles and files must bear names. Decomposed data flow squares and circles can have same names. Draw all data flow around the outside of the diagram.

Level 0

Login process

Admin

Login

Automobile management access

Level 1

Admin

Customer

Customers

Supplier

Product 16

Login

Supplier

Product

Level 2

Admin

Customer

Login

Supplier

Supplier

Order 17

Product

Customers

Product

Order

Sales and payment

Payment

Sales

Order

Delivery

reports

reports

and Payment reports

3.4.2 DATABASE TABLES Table name

: user

Primary key : username

Field name

Data type

Description

username

Text

Username

password

Text

Password

Table name

: cust_info

Primary key : cid

18

Field name

Data type

Description

Cid

Text

Customer ID

Cname

Text

Customer name

Caddress

Text

Address of the customer

Cgender

Text

Gender of the customer

Ccity

Text

City of the customer

Cpincode

Number

Pin code of the customer

Cphone

Number

Phone number of the customer

Clandline

Number

Landline number of the customer

Cemail

Text

Email ID of the customer

Table name

: automobile

Primary key : vid

Field name

Data type

Description

Vid

Text

Automobile ID

Model

Text

Model of the automobile

Color

Text

Color of the automobile

Chassisno

Text

Chassis number 19

Engineno

Text

Engine number

Paymentoption

Text

Payment option

Srprice

number

Selling price

Table name

: booking

Foreign key : cid, eid

Field name

Data type

Description

cid

Text

Customer ID

Cname

Text

Customer name

Caddress

Text

Address of the customer

Srid

Text

Showroom ID

Ino

Text

Insurance number

Eid

Text

Employee ID

Date

Date/time

Date of booking

Time

Text

Time of booking

Model

Text

Model of the automobile

Color

Text

Color of the automobile

Srprice

Number

Showroom price

Aprice

Number

Advance price

Bamount

Number

Balance amount

Table name

: insurance

Primary key : policyno

Foreign key : cid, eid 20

Field name

Data type

Description

Cid

Text

Customer ID

Cname

Text

Customer name

Caddress

Text

Address of the customer

Cphone

Number

Phone number of customer

Vid

Text

Automobile ID

Model

Text

Model of the automobile

Color

Text

Color of the automobile

Chassisno

Text

Chassi number of the automobile

Eid

Text

Employee number

Nname

Text

Nominee name

Iname

Text

Name of the insurance

Address

Text

Insurer address

Relationship

Text

Relationship with the nominee

City

Text

City of the insurer

Pincode

Number

Pin code of the insurer

Email

Text

Email ID of the insurer

Premium

Number

Premium amount

Vfrom

Date/time

Insurance from

Vto

Date/time

Insurance end date

Srid

Text

Showroom ID

Policyno

Text

Policy number

21

Table name

: emp

Primary key : eid

Field name

Data type

Description

eid

Text

Employee ID

Ename

Text

Employee name

Designation

Text

Designation of the employee

Fname

Text

Father name

Paddress

Text

Address

City

Text

City of employee

Pincode

Number

Pincode of employee

Mno

Number

Mobile number

Lno

Number

Landline number

Picture

Text

Picture of an employee

Dob

Date/time

Date of birth

Gender

Text

Gender of employee

Age

Number

Age of an employee

22

Table name

: loan

Primary key : loanno

Field name

Foreign key : cid, eid, vid

Data type

Description

Cid

Text

Customer ID

Cname

Text

Customer name

Vid

Text

Automobile ID

Model

Text

Model of the automobile

Chassisno

Text

Chassis number

Engineno

Text

Engine number

Srprice

Number

Showroom price

Loanamount

Text

Loan amount

Downpayment

Text

Down payment

Instaa

Number

Installation amount

Loanduration

Text

Loan duration

Loanno

Number

Loan number

Eid

Text

Employee ID

Date

Date/time

Date

Time

Text

Time 23

4. SYSTEM TESTING AND IMPLEMENTATION 4.1 SYSTEM TESTING The common view of testing held by users is that it is performed to prove that there are no errors in a program. It is extremely difficult since designer cannot prove to be one hundred percent accurate. Therefore, the most useful and practical approach is with the understanding that testing is the process of executing a program with explicit intention of finding errors that make the program fail. Testing has its own cycle. The testing process begins with the product requirements phase and from there parallels the entire development process. In other words, for each phase of the development process there is an important testing activity. Successful testing requires a methodical approach. It requires focusing on basic critical factors:      

Planning Project and process control Risk management Inspections Measurement tools Organization and professionalism

24

Test Plan Before going for testing, first we have to decide upon the type of testing to be carried out. The following factors are taken into consideration:  

To ensure that information properly flows into and out of program To find out whether the local data structures maintains its integrity during all steps



in an algorithm execution To ensure that the module operate properly at boundaries established to limit or

  

restrict processing To find out whether error - handling paths are working correctly or not To find out whether the values are correctly updated or not Check for validations

Black Box Testing It is a software testing approach in which the tester doesn’t know the internal working of the item being tested. For example in a Black box test, on software design the tester only knows the input and the expected outputs. Tester doesn’t know how the program derives the output. Tester doesn’t even imagine as to how, the coding is done. Tester need to know only the specifications. The advantages of black box testing approach are 

The test is unbiased because the designer and the tester is independent of each

  

other The tester needs no specific knowledge on any programming language The test is done from the point of view of the user, not the designer. The test can be designed as soon as the specifications are complete

The disadvantages of black box testing approach are   

The test can be redundant if the software designer has already run a test case. The test can be difficult to design Testing every possible input stream is unrealistic.

Unit Testing

25

Unit or module testing is the process of testing the individual components (subprograms or procedures) of a program. The purpose is to discover discrepancies between the modules interface specification and its actual behavior. In our system each module must be tested independently for validation. Integration Testing Integration testing is the process of combining and testing multiple components together. The primary objective of integration testing is to discover errors in the interfaces between the components. In our system each of the modules mentioned above, are tested for checking the integration between them, after each of them are tested individually. System Maintenance All system is dynamic and subjects to constantly changing requirements. Effort must be devoted to adapting them and design must be flexible specified so that such changes can be easily implemented. It activity is called system maintains. It includes improvement of system functions and correction of errors. Back up of the entire database files are taken and stored in secondary storage devices like magnetic tapes and disks so that it is possible to restore the system at the earliest. If there is a break down or collapse, then the system giver provision to restore database files, storing data in a separate secondary device leads to an effective and efficient maintains of the system. The master file has flags for maintains after for maintains. After the mentioned period, the rejection suppliers, unused data in the files will be deleted in the master file. It method is the increasing the memory to store the data. Software maintenance is a set of software engineering activities that occur after software has been delivered for the customer and put into operation. The success of the software and the project relies on the maintenance procedure adopted. As with the venture of human, not a single one is perfect. The further modifications are left to the followers. It is because the opinion or vision or a thing differs from individual to individual. The maintenance is performed at regular intervals to keep the project safe and reliable. Development is single activity maintenance is a continuous activity. Maintenance involves activities like inspections, corrections and enhancements. Once the system is

26

delivered and deployed, it enters the maintenance phase. The system need to be maintained not because of some of its components wear out and need to be replaced, but because there are some residual errors remaining in the system that must be removed as they are discovered. It includes activities related to debugging the software after it goes live, changes are required to address evolving software and enhancement to meet changing customer requirements. So maintenance phase involves    

Understanding the effects of change. Testing the new parts Retesting the old parts that were not changed Making changes to both the code and the documents.

These changes have to be designed by the user before the change can be carried out. Since requirement change request involves cost, user will be cautious while requesting the software changes. The software will require continued support. The system maintenance means the maintenance activities after and during the system development processes. It include activities related to debugging the software after it goes live, changes acquired to meet changes in user requirement. Maintenance phase identifies if there are any changes required in the current system. If the changes are identified, then an analysis is made to identify if the changes are really required. Cost benefit analysis is away to find out if the change is really essential. System Analysis The term system is derived from the Greek word ‘systema’, which means of organized relationship among functioning units of components. And the study of system concepts has three basic implications:   

A system must be designed to achieve a predetermined objective Interrelationships and interdependence must exist among the components The objectives of the organizations as a whole have a high priority than the objective of its subsystems.

Preliminary Analysis

27

Analysis is the detailed study of the various operations performed by a system and their relationships within and outside the system. For the efficient and effective utilization of the available resources, timing availability of accurate information is very important. Information is the back bone of any organization. There for, it has to be made available all time to ensure proper decision-making. Information also has to be accurate, current, timely, relevant and usable. In other words, an effective information system should be able to provide information to those in need of it, at the time they need of it, at the time they need it and in the way they need it. The need for managing data and retrieving information efficiently, lead to an extensive use of computers in the business world. The computers have convinced the management that computerized system is preferable to the existing system; most organization has computerized their application areas using traditional file processing concepts. The computerized system, by itself does not guarantee of efficient information retrieval. The effectiveness of the system, to great deal, depends on the way in which data is organized and managed. Way in which data is organized in the existing system is not integrated, since there is no connection or integration between one module and another on accomplishing the task. Analysis is detailed study of various operations performed by a system and their relationships within and outside the system. A key question is “what must be done to solve the problem?” One aspect of analysis is determining the boundaries of the system and determining whether or not a new proposed system should consider other related items. It is the process of gathering and interpreting facts; diagnosing the problems and using the information recommend improvements to the system. Threats to System Security The lists of potential threats are as follows     

Errors and Omissions Disgruntled and Dishonest Employees Fire Natural Disaster External Attack 28

System Security Security is a critical stage in system development. Even candidate system must provide built-in features for security and integrity of data. Without safe guards against unauthorized access, fraud, embezzlement, fire and natural disaster, a system could be so vulnerable as to threaten the survival of the organizations. To do an adequate job on security, the risk, exposure, cost and specific measures such as password should be analyzed to provide protection. In addition, back up of copies of software and recovery restart procedures must be available when needed. The amount of protection depends on the sensitivity of data, the reliability of the user and the complexity of the system. The motive behind security is to keep the organization running, protect data as an asset and seek management support for more installations. System Security Measures After system security risk has been evaluated, the next step is to select security measures. The measures are    

Identification Access Control Audit Control System Integrity

Identification It is the scheme of identifying person to the system based on “Something you know” such as a password or a picture badge, “Something you are” such as finger print or voice print or “Something you have” such as credit card, key or special terminal. Access Control Controlling the access to the computer facility is secured through encoded cards or similar devices. Encryption prevents intruders from accessing data by scrambling messages across telephones to the destination. Audit Control 29

Auditing must be supported at all levels of management. Audit control protects a system from external security breaches and internal fraud or embezzlement. Various software programs are available to help in audit function. System Integrity The line of different safeguards the functioning of hardware, software and physical security and operating procedure. Proper back of hardware and software are extremely important.

4.2 SYSTEM IMPLEMENTATION System implementation is the important stage of project when the theoretical design is tunes into practical system. The main stages in the implementation are as follows:    

Planning Training System testing and Changeover planning

Planning is the first task in the system implementation. Planning is deciding on the method and the time scale to be adapted. At the time of implementation of any system people from different departments and system analysis involve. They are confirmed to practical problem of controlling various activities of people outside their own data processing departments. The line manager controlled through an implementation co-ordinate committee. The committee consists of ideas, Problems and complaints of user department. It must also consider,    

The implementation of system environment. Self selection and allocation for implementation tasks. Consultation with unions and resources available. Standby facilities and channels of communication.

30

5. CONCLUSION The system is completely menu driven and extremely user friendly since it is developed in an efficient front end tool VB. Appropriate error messages are also provided too guide the user in a proper and user friendly manner. The software “Automobile Management System” has been developed in windows 2007 environment using PHP as front end and MS Access as back end. Time consumptions reduced to a great extent and user as less complexity in handling it database. The project is fully fledged and user friendly, End users will be lightened in using it software because it is easy to have bills and reports and mostly all contents to be entered are to selected from combo box. It reduces the calculating efforts to be carried out by the staff.

31

6. SCOPE FOR FURTHER ENHANCEMENT Further expansion of the system also can be done in future if needed. The application can be enhanced in the future with the needs of the organization. The database and the information can be updated to the latest forthcoming versions. There are also possibilities for enhancing and further developing the project with customized reports according to the latest information and needs of the company. Thus the system can be altered in accordance with the future requirements and advancements. System performance evaluation must be monitored not only to determine whether or not they perform as plan but also to determine if they should have to meet changes in the information needed for the company. The performance of the system will be evaluated to determine whether system achieves the results that are expected and whether the predicted benefits of the system are realized.

BIBLIOGRAPHY

32

REFERENCE BOOKS     

James. A Senn, ‘System Analysis and Design’, 2005. Pressman, ‘Software Engineering’, 2010, pp.200-230. Elias Award, ‘System Analysis and Design’, 2006. S.S. Ipress, ‘VB, 2006, pp.1-180. S. Parthasarathy, B. W. Khalakar, ‘System Analysis, Design and Introduction to Software Engineering’, 2010, pp.39-80.

REFERENCE WEBSITES      

www.programmingworld.com www.vbnetcode.com www.w3schools.com www.vbcode.com www.vbdevelopplus.com www.codepark.com

APPENDIX A. SAMPLE INPUT Login form 33

Admin login

34

User login 35

Insurance form 36

Service form 37

Spare parts form 38

Employee details form 39

Customer details 40

Imported automobile details 41

Automobile import details 42

Booking form 43

Loan details 44

Loan payment details 45

Customer purchase form 46

B.SAMPLE OUTPUT 47

Splash form

On successful login

48

Admin welcome page 49

Facilities

50

Available facilities 51

Bikes 52

Specific bike 53

View bike color 54

Showroom details

55

56

C.SAMPLE CODING Private Sub Command1_Click() Me.Hide MDIenter1.Show End Sub

Private Sub Command10_Click() On Error GoTo errmsg Adodc1.Recordset.MoveFirst Exit Sub errmsg: MsgBox Err.Description End Sub

Private Sub Command11_Click() Adodc1.Recordset.MoveLast End Sub

Private Sub Command12_Click() On Error GoTo errmsg

57

Adodc1.Recordset.MovePrevious Exit Sub errmsg: MsgBox "You Are in First Record" End Sub

Private Sub Command13_Click() On Error GoTo errmsg Adodc1.Recordset.MoveNext Exit Sub errmsg: MsgBox "You Are in Last Record" End Sub

Private Sub Command2_Click() Unload Me End Sub

Private Sub Command3_Click() Text1.Text = ""

58

Text2.Text = "" Text3.Text = "" Text4.Text = "" Text5.Text = "" Text6.Text = "" Text7.Text = "" End Sub

Private Sub Command4_Click() Call enable Adodc1.Refresh If Adodc1.Recordset.RecordCount = 0 Then a=1 Else Adodc1.Recordset.MoveLast a = Adodc1.Recordset.Fields(0) + 1 End If Adodc1.Recordset.AddNew Text1.Text = a Text2.SetFocus

59

End Sub

Private Sub Command5_Click() Me.Hide alldetails.Show End Sub

Private Sub Command6_Click() If Adodc1.Recordset.EOF = True Then MsgBox "NO RECORDS" Else ans = MsgBox("DO you want to delete the record", vbOKCancel + vbExclamation + vbDefaultButton2, "DELETE") If ans = vbOK Then Adodc1.Recordset.Delete Adodc1.Refresh MsgBox "Record Deleted", vbInformation, "Record Deleted" End If End If End Sub

60

Private Sub Command7_Click() 'On Error GoTo err1 a = MsgBox("Do you want to save the record", vbOKCancel + vbDefaultButton1, "SAVE") If a = vbOK Then If Option1.Value = True Then Adodc1.Recordset.Fields(3) = "MALE" Else Adodc1.Recordset.Fields(3) = "FEMALE" End If Adodc1.Recordset.Update Adodc1.Refresh Call disable MsgBox "RECORD SAVED", vbOKCancel, "SAVED" Else MsgBox "Record NOT SAVED" Adodc1.Recordset.CancelUpdate End If 'err1: 'MsgBox Err.Description, vbQuestion, "Primary Key Error" End Sub

61

Private Sub Command8_Click()

End Sub

Private Sub Command9_Click() Call enable End Sub

Private Sub DTPicker1_CallbackKeyDown(ByVal KeyCode As Integer, ByVal Shift As Integer, ByVal CallbackField As String, CallbackDate As Date) Dim DATE1 As Date DATE1 = Date Text6.Text = DateDiff("yyyy", Format(DTPicker1, "dd/mm/yyyy"), DATE1) If Val(Text6.Text) < 0 Or Val(Text6.Text) < 24 Then DTPicker1.SetFocus MsgBox " Age limit not satisfied " End If End Sub

Private Sub Form_Load() 62

Call disable End Sub

Private Sub Picture2_Click()

End Sub

Private Sub Picture3_Click()

End Sub

Private Sub Picture4_Click()

End Sub

Private Sub Text1_KeyPress(KeyAscii As Integer) Call charvalid(KeyAscii) End Sub

Private Sub text1_LostFocus()

63

If Text1.Text = "" Then MsgBox "ENTER THE CUSTOMER ID ", vbCritical End If End Sub

Private Sub Text12_KeyPress(KeyAscii As Integer) Call charvalid(KeyAscii) End Sub

Private Sub Text12_LostFocus() If Text12.Text = "" Then MsgBox "ENTER THE LANDLINE NUMBER ", vbCritical End If End Sub

Private Sub Text13_KeyPress(KeyAscii As Integer) Call emailvalid(KeyAscii) End Sub

64

Private Sub Text13_LostFocus() If Text13.Text = "" Then MsgBox "ENTER THE EMAIL ID ", vbCritical End If End Sub Private Sub Text2_KeyPress(KeyAscii As Integer) Call alphavalid(KeyAscii) End Sub

Private Sub text2_LostFocus() If Text2.Text = "" Then MsgBox "ENTER THE CUSTOMER NAME ", vbCritical End If End Sub Private Sub Text3_KeyPress(KeyAscii As Integer) Call charvalid(KeyAscii) End Sub

Private Sub Text3_LostFocus()

65

If Text3.Text = "" Then MsgBox "ENTER THE CUSTOMER MOBILE NUMBER ", vbCritical End If End Sub

Private Sub Text4_KeyPress(KeyAscii As Integer) Call addressvalid(KeyAscii) End Sub

Private Sub Text4_LostFocus() If Text4.Text = "" Then MsgBox "ENTER THE CUSTOMER ADDRESS ", vbCritical End If End Sub Private Sub Text15_KeyPress(KeyAscii As Integer) Call alphavalid(KeyAscii) End Sub

Private Sub Text15_LostFocus() If Text15.Text = "" Then

66

MsgBox "ENTER THE CITY ", vbCritical End If End Sub

Private Sub Text16_KeyPress(KeyAscii As Integer) Call charvalid(KeyAscii) End Sub

Private Sub Text16_LostFocus() If Text16.Text = "" Then MsgBox "ENTER THE PINCODE ", vbCritical End If End Sub Public Sub disable() Text2.Enabled = False Text3.Enabled = False Text4.Enabled = False Text12.Enabled = False Text13.Enabled = False Text15.Enabled = False

67

Text16.Enabled = False Option1.Enabled = False Option2.Enabled = False End Sub

Public Sub enable() Text2.Enabled = True Text3.Enabled = True Text4.Enabled = True Text12.Enabled = True Text13.Enabled = True Text15.Enabled = True Text16.Enabled = True Option1.Enabled = True Option2.Enabled = True End Sub

Private Sub Text6_Change() If (KeyAscii >= 48 And KeyAscii
View more...

Comments

Copyright ©2017 KUPDF Inc.
SUPPORT KUPDF