Dairy Management System
Short Description
Download Dairy Management System...
Description
Cyber Cafe
Acknowledgement
We sincerely feel the credit of the project work could not be narrowed down to only on individual. The development of this project involves many valuable contributions.
We are thankful to Mr.K.H.Wandra sir to introduce this mini project and inspiring us all time. We would like to thank Ms. Madhu Shukla and Mr. Dhaval Nimavat to being very co-operative and helpful while project was being processed. The project could not have completed without help of them. Finally, we would be thankful to our parents, friends & almighty that have inspired and gave us strength while making this project.
Dipesh Sompura (43) Divyarajsinh Vaghela (47)
Cyber Cafe
Abstract This is era of information technology. Science has taken and is taking great strides in this field, which has result in making man’s life more comfortable and easier. Today computers have become necessity of everyone’s life like food Water and air. More efficient computers are invented and more advanced software are developed in order to make many complex processes fast and easy.
Our project is on ‘Cyber Café Management’ for cyber cafe owner. We have made our best attempt to make software for all Customers’ information store in database safely. This software is used for reliability and efficiency.
Cyber Cafe
Content Abstract 1. Introduction 1.1 Project purpose 1.2 Purpose 1.3 Scope 1.4 Technology and Literature Reviews 2. Project Management 2.1 Project planning and scheduling 2.1.1 Project Development Approach 2.1.2 Project Plan 2.1.3 Schedule Representation 3. System Requirement Study 3.1 User Characteristics 3.2 Hardware and Software Requirements 3.3 Constraints 4. System Analysis 4.1 Study of Current Study 4.2 Feasibility Study 4.3 Requirements Validation 4.4 Functions of System 4.5 Data Modeling 4.5.1 Use Case Diagram 4.5.2 Class Diagram/ER Diagram 4.5.3 System Activity or Object Interaction Diagram 4.5.4 Data Dictionary 4.6 Functional and Behavioral Modeling 4.6.1 Context Diagram 4.6.2 Data Flow Diagram (including leveling) 4.6.3 Process Specification and Decision table 4.7 Selection of Hardware and Software (Justification) 5. System Design 5.1 Database Design/Data structure design 5.1.1 Table and Relationship 6. Implementation Planning and Detail 6.1 Implementation Environment 6.2 Program/module specification 6.3 Security features 6.4 Coding Standard
Cyber Cafe 6.5 Sample Coding 7. Testing 7.1 Testing Plan 7.2 Testing Strategy 7.3 Testing Methods 7.4 Test Cases 8. Screen shots and User Manual 9. Limitation and Future Enhancement 10. Conclusion
Cyber Cafe
PROJECT PROFILE
Project Title
: Cyber Cafe
Project Definition
:
to manage customer’s information & space in café is available or not
Project Members
:
1) Dipesh Sompura (43) 2) Divyarajsinh Vaghela (47)
Hardware Requirements :
1) Pentium a microprocessor 2) 256 MB RAM 3) 40 GB HARD DISK
Software requirements
:
1) Microsoft Windows XP Professional 2) Microsoft Windows 3) Visual Studio 2008
Platform
:
1) .Net Technology
Cyber Cafe
1. INTRODUCTION: 1.1 Project Summary: We have made the project on “Cyber Café System”. We are sure that this is going to be useful to cyber cafe owner.. In which we have used C# and .Net Technology. All the processes, which are included in making this project successful in technical terms, will be described in this report. The basic idea of how the software will work is described in this document. In our project, we have provided the way that if the space is not available then it can automatically not enter the user. It will make the time duration of customer automatically and also the payment as well. 1.2 Purpose Earlier the customer had to give time of surfing in cyber café. But we have made our project that customer will come out of this headache. Because this software does all that things automatically. On the other hand, the payment is displayed itself. So,café owner has no more migraine of that. If customer’s information is needed then it can be easily available from the database. So, it reduces paperwork or manual work as well. In short, we have tried to make a project that can be useful to the people in future. We are sure that it is also going to be helpful to us to learn about what is helpful for our future. System should also maintain reports properly, which are generated by different computers. Payment information should be also properly stored which will help while performing calculations related to expense on particular customer. 1.3 Scope Speed and faster access to data Easy cafe process Better availability of day to day schedules Easily available information Reduced paperwork It can’t store customer’s data long time
Cyber Cafe 1.4 Technology & Literature View: We are being familiar with .Net technology in this 6th -Sem. So, we thought to make software that is relied on it. On the other hand, it gives us more idea in our studies also. This technology is well known and widely used in the market. Therefore, it would be helpful to us in future also. We will have to keep pace with this technology in future. So, it is good for us also. This technology can work with all the languages of software. So, we get on well with this as well. This technology is widely used in market and not so expensive at all. Its features are very effective for making software. We have made an attempt to give our best in this project by using recent technologies. As we knew the requirements of “Cyber Café Management”, we made our mind to make project on this. We have tried to carry all needs of particular system. In short, we can say that this project has used .Net technology very frequently.
Cyber Cafe
2. PROJECT MANAGEMENT 2.1 Project planning & scheduling 2.1.1 Project development Approach: First, we just gathered the information needed to cyber cafe process. We just decided to give an easy approach to the user and customer. We have reached the brief description about requirements of cyber cafe management. So, we made software that is useful to cyber café. It makes an easy and simple way to the customer as well as user. We have Used easy technology to reach at our goal. 2.1.2 Project plan Project Name
Cyber cafe system To develop a system that facilitates maintenance &
Project Objectives
monitoring of different processes followed by cyber cafe
Duration Guided by Team size Technology
system Two months Ms. Madhu Shukla 2 C#,.Net tech Easy process of
Advantages Limitation
cyber cafe, fast find customer
information, efficient, Flexibility, less paperwork It can’t store customer’s data long time
2.1.3. Schedule Representation A project schedule provides a road map for us to achieve our milestones. If it has been properly developed, the project schedule defines the tasks and milestones that must be tracked and controlled as the project proceeds. Tracking can be accomplished in number of different ways:
Conducting periodic project status meeting in which each team member report progress and problems.
Cyber Cafe
Evaluating the result of all reviews conducted throughout the software engineering process.
Determining whether formal project milestones have been accomplished by the scheduled rate.
Comparing actual start date for each project task listed in the resource table.
Meeting informally with practitioners to be obtained their subjective assessment of progress to date and problems on the horizon.
Using earned value analysis to assess progress quantitatively. Control is employed by a software project manager to administer project
recourse, cope with problems, and direct project staff. If things are going well, control is light. But when problems occur, the project manager must exercises control to reconcile them as quickly as possible. RESPONSIBILITIES Analysis Analysis Review Design Design Review Coding Front-site Design Design Review Testing Documentation
DIPESH
DIVYARAJ
Cyber Cafe
3. SYSTEM REQUIREMENT STUDY System requirement specification contains the requirement for the system and its functional operations. 3.1 User Characteristic: User:
User can enter the data about customers.
User can proceed to provide space
User can edit / search the customer’s data.
User can get the information of time & payment
User can be free with migraine of paperwork.
User can store large no of data & retrieve easily.
3.2 Hardware and Software Requirements:
Hardware Requirement:
We have required the devices as we have mentioned below while making our airways reservation software.
Computer : Intel P4 Processor with 2.0 GHz
RAM – 256MB
HDD - 40GB
CD Drive – 150kbps Software Requirement:
Cyber Cafe As we are learning .net technology, so we had decided to keep our pace with this technology. Therefore, we used which is familiar to us. We also used some other softwares to achieve our goal as below.
Windows XP with higher version
Visual studio 2008 C# with .Net .Net technology
MS office for documentation 3.3 Constraints: This topic includes hardware requirements for installing the various Visual Studio editions, the Express editions available for Visual Studio programming languages. The computer on which you install your Visual Studio edition should meet minimum the following system requirements Pentium IV Processor or above. 40GB hard-disk.
256 MB of RAM. These constraints are needed while making project. It includes some symbols and photographs as well from the particular program to add into the project. It makes our software simply graceful.
Cyber Cafe
4. SYSTEM ANALYSIS
4.1 Study Of Current System
In the current system no monthly report generation is specified by just clicking generate report.
1.
If the user is unauthorized then he or she can break the password because password is stored in the same application in which the application is running so the security is poor.
2.
The user will be in the confusion because of some difficult task.
The current system is manual writing system. If the space in cyber café is not found then it will inform the user about that there is no space available. It will display that “ Space is not available now”.
4.2 Feasibility Objectives of System Feasibility Analysis
Identify the user’s need
Evaluate the system concept for feasibility
Perform economic and technical analysis
Allocate functions to H/W, S/W, people, database and other System
analysis
Establish cost and schedule constraints
Create system definition forming the foundation for all subsequent
work. Three specific tests were carried out on the system to test its feasibility namely, Operational, Technical and Economical. 4.2.1 Technical Feasibility
Cyber Cafe This system is technically feasible because all required technologies are available today in market. Visual studio 2008 is available in market now which includes all requirements to complete this software. On the whole, this is very interesting technology. This provides every tool to make this project. Even this technology is concerned with many languages like C, C++, C#, Oracle and many. The technical issues and their answers are as follows: Is the proposed technology or solution practical? Accuracy:
The system here is accurate and it provides accurate and correct
result. Reliability: The system is trustworthy and gives perfect return on investment. Easy of access: Any technical and non technical user can use the system and easily get response or get solution of their queries from the system. Security: User has to enter valid password and id for accessing the system. So, we can say that the proposed technology or solution is practical. Do we currently have necessary technology? Yes, this project needs .Net Technology. Here, we have used this technology in making of this project. Do we possess necessary expertise? Yes, that is possible because this technology is frequently used in market and we can possess them if needed. 4.2.2 Economical Feasibility This project requires no more requirements rather than computer. Because, it’s all about making software. Even the softwares it needs are very easily available in market at very cheaper cost. So this is economically feasible at all. Cost – Benefits Analysis: Cost Analysis:
The initial cost of the System will include PCs & software.
Cyber Cafe
The basic cost of the System will be the Software, which will be required for
the System. It also includes the purchasing of that
Software.
The operator by entering the id or name of the field can easily access the information
The billing and searching of the system is quiet accurate and quick that it will save the time consumption.
Benefit Analysis: Tangible benefits: The system is directly saving cost as there is no requirement of direct training to the users, no wastage of extra recourses like time, human power etc. Intangible benefits:The system provides better services to the users. It also provides the users with accurate, reliable and up-to-date information about the system. 4.2.3 Operational Feasibility Any project proposed can be beneficial only if it satisfies the customer’s requirements. If project is included with everything which is in old project in addition with new features then this system is operationally feasible if all Users are satisfied with system. The following points have been probed to declare the proposed system as operationally feasible. The newer system will accommodate all the requirements. The new system can greatly help by reducing all paper work and availing all needed information of the customer with just a click of the mouse button. The newer system will fit to its existing system and perform more function than manual system. The user of the system will get the information at the time when they need it, and also speed up the transaction processing.
Cyber Cafe The system will work when it is developed and installed and there are no major barriers to its implementation. This accounts for the operational feasibility of the proposed system. 4.2.4 Schedule feasibility: The project was assigned on starting of the semester and we have enough time of 2 month to complete our project. The project completion is 31-Mar-2009. So the project is schedule feasible. Here, we have given milestones to achieve the task.
Milestones and Deliverables A milestone is a subproject that you should have completed at the given point in time, if you want to keep on track then. A deliverable is a documentation of a part of a project that you are required to hand in. The given deadlines are firm. Deliverables are usually milestones but milestones need not to be deliverables. SR
ACTION
START DATE
END DATE
NO 1
Analysis
27/01/2009
05/02/2009
2
Design
10/02/2008
25/02/2008
3
Development
03/03/2009
08/04/2009
4.3 Requirements Validation Requirement validation is concerned with showing that the requirement actually defines the system which customer wants. It has much common with analysis as it is concerned with finding problems with the requirement. However they are distinct processes since validation should be concerned with a complete
Cyber Cafe draft of the requirement document whereas analysis involves working it incomplete Requirement. During requirement validation process different types of check should be carried out on the requirement in the requirement document. This check includes: The Name of the Users should be character oriented. The Password should contain only characters and numbers. It should not include special character. The format of the date should be DD-MON-YYYY In the Find and Search models, we have to enter the Name of the Customer or id of the customer in order to find the all information of customer.
4.4 Function of System Our system for cyber café management system specifies how the information held by the cyber café about, booking and availability is maintained. Hence following functions are carried out: 1. Registration Of Surfing: Description: This functionality is used to register the operator. It is compulsory for the operator to fill the Register then only they get the information related to the System. Inputs: Username and Password Source: Username and Password provided by operator, password from database. Output: Authentication to operator to access the ticket, passenger and bill related information. 2. Search and Viewing: Description: This functionality is used to find zip codes of various state, city and country. It also includes a functionality, which is used to find zip codes of
Cyber Cafe state, city or country by just providing the address (that is name of state, city or country). Input: Take the various zip codes from the user. Sources: Username and Password provided by user. Outputs: The zip code from the given information of the user. Input: Request the user for the any services. Sources: Username and Password by user. Outputs: The request services will be provided and desirable output will be provided.
4.5 Data Modeling 4.5.1 Use-case Diagram:
Cyber Cafe
4.5.2 CLASS DIAGRAM:
Cyber Cafe
4.5.3 Activity Diagram:
Cyber Cafe
Cyber Cafe
Relogin
Start Login Customer Information Valid
Menu
Available
space space
entry
Invalid
Relogin
Cyber Cafe
Start Login
Valid
Menu
Available
space space
entry
Payment
End
4.5.4 DATA DICTIONARY:
Invalid
Cyber Cafe
Login:
Field
Sr.No
Data Nam
Type Description
e
s
1.
Admin_id
Text
Describes the administrator’s identification
2.
Password
Varchar(50)
Describes the administrator’s password
Table name: cust_info
Sr.No
Field
Data Name
Types
1.
id
Int
2.
name
varchar(50)
3.
addresh
varchar(50)
4
age
int
5
gender
int
6
Ph_no
varchar(MAX)
7
In_date_time
bit
8
Pc_no
float
Table name :- bill_info
Cyber Cafe
Sr.No
Field
Data Name
Types
1.
id
Int
2.
name
varchar(50)
3.
Pc_np
varchar(50)
4
In_date_time
int
5
Out_date_time
int
6
Total_duration
varchar(MAX)
7
Total_amount
bit
Cyber Cafe
4.6.1 context diagram Surfing information
Time Information
customer Details
Payment
Customer
Time Details
Customer Information
Cyber Cafe Management
Customer Information
Receptionist
Payment Information
Surfing Information time Information
Manager
Cyber Cafe
4.6.2 Data Flow Diagram
Password
Process for login system
User
Conformation Inquiry about customer
User Customer info.
Process for Cyber Cafe system
Customer
Payment
Customer data
Time info
Manager Info. about availability of space
Surfing info
Cyber Cafe
4.6.3 Process Specification & Decision Table Login Process IF user enters username & password THEN
enter into the system.
ELSE Invalid user. END IF. Process For Surfing WHILE customer make request IF space is available THEN provide pc to customer ELSE Not available ENDIF ENDWHILE Process For Payment: WHILE customer log off pc IF customer doing payment THEN receive & confirmation ELSE Not receive & not confirmation ENDIF ENDWHILE
Cyber Cafe 4.7 Selection Of Hardware & Software Hardware Technology Used: To run the application software of the system in the computer the minimum configuration required is as below: 768 MHz Pentium processor or other compatible. Intel Chipset Motherboard. 256 MB-RAM. 10 GB Hard-Disk. 52X Compact Disc drive or faster. Monitor. [640 * 600 Display] Software Technology Used: .Net Platform
Cyber Cafe
5.
SYSTEM DESIGN 5.1 Database Design / Data Structure Design 5.1.1. Table and Relationship
Table name: cust_info
Sr.No
Field
Data Name
Types
1.
id
Int
2.
name
varchar(50)
3.
addresh
varchar(50)
4
age
int
5
gender
int
6
Ph_no
varchar(MAX)
7
In_date_time
bit
8
Pc_no
float
Cyber Cafe Table name :- bill_info
Sr.No
Field
Data Name
Types
1.
id
Int
2.
name
varchar(50)
3.
Pc_np
varchar(50)
4
In_date_time
int
5
Out_date_time
int
6
Total_duration
varchar(MAX)
7
Total_amount
bit
Cyber Cafe
6.
IMPLEMENTATION PLANNING AND DETAILS 6.1. Implementation Environment Single vs. Multiuser As the cyber cafe management system is going to be developed id desktop application,at the time of the implementation it should be kept in mind that system will be used con currently.So the development approach would remain for the concurrent use. GUI vs. Non GUI The system is completely GUI. This is because today customer feels comfortable while working with images or pictures.The user should feel convient while wporking with the system
6.2
Program/Module specification
Single Layer This module of the project deals with the categorized the different themes of the map like point,line and polygon into their respective types after distinguishing them differently from the database. It displays the map single layer that can be of any feature like point, line or polygon theme.Displaying map of single layer explorers the entire details of the selected layer.
Multi Layer Seconly, comes the module for the multilayer.Here the individual themes that were selected in the above module are overlaid on the other type of the theme.Doing this makes the decision making process eaiser about which place is related to other like if there is no way near very good polygon feature then it would show that would be profitable to dig well at that place.
6.3
Query Builder In the above two modules we were just retrieving the data from database which already store after converting from SHP to SQL format in the form of map .Now we need to query that map.So as per the type of query fired we could be able to get the result using query builder.Thus ,in order to get the detail and display of the desired location we make use of query builder. Security Features
The editing of database and the result is all protected by the password, which only administers can access. (In this case it’s us.) The admin side is password protected.Only authorized user can access the admin side.
Cyber Cafe
6.4
Coding Standard We have followed the coding standards throughout this application
Each table name is given in such a manner that it indicates its use Each script is properly documented by comments to carify its presence. Variables names are related to the process and the behavior of the entity. We have used tab instead of space in our project. Keywords are never used as variable name in our project 6.5 Sample Coding using System; using System.Collections.Generic; using System.ComponentModel; using System.Data; using System.Drawing; using System.Linq; using System.Text; using System.Windows.Forms; using System.Data.SqlClient; namespace WindowsFormsApplication1 { public partial class Form4 : Form { SqlConnection cn; SqlCommand cmd; SqlDataAdapter da; DataSet ds = new DataSet(); public Form4() { InitializeComponent(); } private void label7_Click_1(object sender, EventArgs e) { textBox5.Text = DateTime.Now.ToString(); } private void button1_Click(object sender, EventArgs e) { cmd = new SqlCommand("insert into cust_info values(@a,@b,@c,@d,@e,@f,@g,@h)", cn); cmd.Parameters.AddWithValue("@a", Convert.ToString(textBox1.Text)); cmd.Parameters.AddWithValue("@b",textBox2.Text); cmd.Parameters.AddWithValue("@c", textBox3.Text); cmd.Parameters.AddWithValue("@d", textBox4.Text); if (radioButton1.Checked == true) {
Cyber Cafe cmd.Parameters.AddWithValue("@e",Convert.ToString(radioButton1.Text = "male") ); } else if (radioButton2.Checked == true) { cmd.Parameters.AddWithValue("@e",Convert.ToString(radioButton2.Text = "female")); } cmd.Parameters.AddWithValue("@f", maskedTextBox1.Text); if (maskedTextBox1.MaskFull) { MessageBox.Show("full space"); maskedTextBox1.Text = ""; maskedTextBox1.Focus(); return; } cmd.Parameters.AddWithValue("@g", textBox5.Text); cmd.Parameters.AddWithValue("@h", textBox6.Text); cn.Open(); cmd.ExecuteNonQuery(); cn.Close(); MessageBox.Show("done"); ds.Clear(); reload(); Form5 f5 = new Form5(); f5.Show(); this.Hide(); } private void Form4_Load(object sender, EventArgs e) { cn = new SqlConnection(@"Data Source=.\SQLEXPRESS;AttachDbFilename=C:\Documents and Settings\dipesh sompura\My Documents\Visual Studio 2008\Projects\WindowsFormsApplication1\WindowsFormsApplication1\Database1.mdf;Integrated Security=True;User Instance=True"); reload(); } public void reload() { da = new SqlDataAdapter("select * from cust_info", cn); da.Fill(ds); } private string remove(int p) { throw new NotImplementedException(); } private void button2_Click(object sender, EventArgs e) { Form3 v = new Form3(); v.Show(); this.Hide(); } private void button3_Click(object sender, EventArgs e) { cmd = new SqlCommand("update cust_info set id ='" + textBox1.Text + "',address='" + textBox3.Text + "',Age='" + textBox4.Text + "',gender='" + radioButton1.Text + "',ph_no = '" +
Cyber Cafe maskedTextBox1.Text + "',date_time = '" + textBox5.Text + "',pc_no = '" + textBox6.Text + "'where name ='" + textBox2.Text + "'", cn); cn.Open(); cmd.ExecuteNonQuery(); MessageBox.Show("Data Updated"); textBox1.Text = ""; textBox2.Text = ""; textBox3.Text = ""; textBox4.Text = ""; if (radioButton1.Checked == true) { radioButton1.Text = "male"; } else if (radioButton2.Checked == true) { radioButton2.Text = "female"; } maskedTextBox1.Text = ""; textBox5.Text = ""; textBox6.Text = ""; cn.Close(); Form5 b = new Form5(); b.Show(); this.Hide(); } private void button4_Click(object sender, EventArgs e) { cmd = new SqlCommand("delete from cust_info where name='" + textBox2.Text + "'", cn); cn.Open(); cmd.ExecuteNonQuery(); MessageBox.Show("Data deleted"); textBox1.Text = ""; cn.Close(); Form5 a = new Form5(); a.Show(); this.Hide(); } private void button5_Click(object sender, EventArgs e) { MDIParent1 W = new MDIParent1(); W.Show(); this.Hide(); } private void button6_Click(object sender, EventArgs e) { Form5 h = new Form5(); h.Show(); this.Hide(); } }}
7.
TESTING
Cyber Cafe The aim of testing process is to identify all defects existing in software product. Testing a program consists of subjecting the program to as test inputs and observing if the program behaves expectedly or not. If the program fails by any means or gives unexpected results than the failure occurred are noted for later debugging and corrections. 7.1 Testing Plan The testing process is a process that to a greater extends runs in parallel with other processes. As the same thing applied for the whole system for testing and once the entire module works perfectly as desired, at later stages test suite are made to test in integrated environment to check for proper functioning. So the software is tested at various levels by various testing techniques. A well rounded test plan notes any risk factors that jeopardize and includes a testing schedule. So we can say that Test planning details the activities, dependencies and effort required to conducting the system test. 7.2 Testing Strategy The test strategy is a formal description of how a software product will be tested. A test strategy is developed for all levels of testing as and when required. The testing team analysis the requirements, writes the test strategy and reviews the plan with the project team. The test plan may include test cases, conditions and the test environment, a list of related tasks, pass/fail criteria and risk assessment. As we were working in a team it was a bit difficult to check the work done as no individual was assigned for that particular task or work. Moreover checking the work done was very important to reduce risk factor. Right from the starting we planned to adopt one technique called Assessment by rotation. Thus the work done by one member was assessed by the other for some time and again revolved for other level check reduced the errors.
1) 2)
7.3 Testing Methods Testing methods are mainly divided into two parts: Black Box Testing While Box Testing
1) Black box testing: It is the testing without the knowledge of the internal working of the item being tested. For this testing test groups are often used. Due to the nature of this testing the test planning can begin as soon as the specifications are written. This testing has some advantages like it is more effective on larger units of code than glass box testing, tester needs no knowledge of implementation, including specific programming languages, tester and programmer are independent of each other, tests are done from a user’s point of view, will help to expose any ambiguities or inconsistencies in the specifications, test cases can be designed as soon as the specifications are complete.
Cyber Cafe 2) White box testing: It is the testing strategy that deals with the internal logic and structure of the code. White box texting is also called as the glass testing, structural testing, open testing or the clear box testing. The advantages of the white box testing are that as the knowledge of internal coding structure is needed, it becomes easy to find out which type of input data can help min testing the application effectively. It helps in optimizing the code helping in removing the extra code which may cause hidden defects in the system.
The other sub testing techniques are as follows: Unit Testing Unit testing focuses on verification effort on the smallest unit of the project that is the module. Unit testing exercises specific paths in a module’s control structure to ensure complete coverage and maximum error detection. This test focuses on each module individually, ensuring that it functions properly as a unit. Hence, the naming is Unit testing.
Integration Testing Integration testing addresses the issues associated with the dual problems of verification and program construction. After the software has been integrated a set of high order tests are conducted. The main objective in this testing process is to take unit tested modules and builds a program structure that has been dictated by design.
Task Testing Task testing helps the system to test whether all the tasks are carried out properly or not. It also solves logical errors. By carrying this test we were assured that all processes in our project are appropriate.
Behavioral Testing This testing is used to check the behavior of the system. This test helped us to develop the test case for the particular system. This testing thus helps to test the different events associated with the system.
Inter Task Testing There are several processes or tasks which are carried simultaneously. Moreover this testing also helps to test the errors associated with the data storage activities. This testing helped our project to solve the error while data designing which is very much important for a successful project.
Final Testing After the integration of all the modules we deploy whole application. One of the member of the development team will do the testing of the whole project and create the excel sheet of the
Cyber Cafe bugs. After the completion of the solving of these errors the project would be ready to use.
Alpha Testing Alpha testing is done by the person not involved in the project. In our case it would be done by out concerned faculty members itself. 7.4 Test Cases In software engineering the most common definition of a test case is set of conditions or variables under which a tester will determine if a requirement or use case upon an application is partially or fully satisfied. In the situation each sub requirement must have at least one test case. A good test should neither be too simple nor too complex.
Cyber Cafe
8.
SCREEN SHOTS AND USER MANUAL
LOGIN FORM: This form is used by administrator to login and access Menu form :(mdi form)
Cyber Cafe Available space
Customer entry
Cyber Cafe Customer & system detail
Customer bill paid
Cyber Cafe
9.
LIMITATION AND FUTURE ENHANCEMENT IQ test is developed to serve the very basic purpose to check the user’s IQ level.
The limitation of the project can be considered it to be a windows application and so no online test can be conducted. The project being developed in Oracle and Microsoft Visual Studio .Net which are extensively used tools today so can be easily converted to other system structure according to the requirement in near future.
Cyber Cafe
Cyber Cafe
10.
CONCLUSION
The project ‘CYBER CAFE helps the user to keep record. Moreover the system also provided with the option to begin with any subject of choice. This project deals management of cyber café The project aids an additional feature like bill generation, number of user display, data of each user, efficient management .
View more...
Comments