HOSTEL MANAGEMENT SYSTEM
HOSTEL MANAGEMENT SYSTEM
1. Introduction
5. Conclusion
6. Coding
6.1 Table Structure
7. Bibliography
1.INTRODUCTION
1.1 Overview of the Project
We have got nine hostels in our university, which consist of four boy’s
hostel and five girl’s hostel. All these hostels at present are managed manually by
the hostel office. The Registration form verification to the different data
processing are done manually.
Thus there are a lot of repetitions which can be easily avoided. And hence
there is a lot of strain on the person who are running the hostel and software’s are
not usually used in this context. This particular project deals with the problems on
managing a hostel and avoids the problems which occur when carried manually.
Registration Form:
This section provides an online form to the students which can be filled by them,
and a copy of the filled page can be taken in the printed form. This is later
submitted to the Hostel authorities which can be verified by them before aloting
them to the respective hostels.
Notice Board:
All the 9 hostels have their Notice boards. Any change in the Hostel fee, mess
fee will be shown in this. It can be also used for different notifications.
Administrator Login
Their will be pre-defined criteria for the admission to the hostels. He checks the
attested application forms of the students obtained from the internet and verify it
with the student database. If the students are found eligible then they are allotted to
the hostel.
As the student’s course is over they will vacate their rooms. So it is required for
the administrator to remove their records from the database tables. This section
includes the option for the room vacation and the deletion of the particular record
from the database.
1.2. SYSTEM CONFIGURATION
PROCESSOR : PENTIUM IV
HARD DISK : 80 GB
MOUSE : OPTICAL
1.2.2 Software Specifications:
Windows XP
Windows XP brings with new features, improved programs, and tools. See
what’s new; take an entertaining tour; learn about the programs Windows XP contains,
including systems, accessories, and communications and entertainment programs. Read
articles containing full descriptions for performing key tasks from start to finish. Look up
unfamiliar terms in the glossary. Learn the benefits of registering your copy of Windows
XP online.
Windows XP provides many ways for you to communicate with friends, co-
workers, and with the rest of the world. Learn how to set up and use e-mail, including
instant messaging. Explore the World Wide Web safely and in a secure environment.
Unlock the powerful advantages of networking - linking computers at home or in a small
business. Windows XP explorer and internet explorer and web based resources integrated
in a single view:
➢ Active Desktop
Remote Desktop
Whether you're telecommunicating from home or traveling away from the
office, Windows XP helps you work where you are. Learn how to connect to your office
from home or another location, and to change your settings depending on where you are
and what you need to do.
The Disk Management snap-in is a system utility for managing hard disks and the
volumes, or partitions that they contain. With Disk Management, you can initialize disks,
create volumes, format volumes with the FAT, FAT32, or NTFS file systems, and create
fault-tolerant disk systems. Disk Management enables you to perform most disk-related
tasks without shutting down the system or interrupting users; most configuration changes
take effect immediately.
TaskManager Overview
Task Manager providesinformation about programs and processes running on
your computer. It also displays the most commonly used performance measures for
processes. You can use Task Manager to monitor key indicators of your computer's
performance. You can also assessthe activity of running processes using as many as
fifteen parameters, and see graphs and data on CPU and memory usage.
We can use Data Sources Open Database Connectivity (ODBC) to access data
from a variety of database management systems. For example, if you have a program that
accesses data in a SQL database, Data Sources(ODBC) will let you use the same
program to access data in a Visual FoxPro database. To do this, you must add software
components called drivers to your system. Data Sources (ODBC) helps you add and
configure these drivers.
Improved Reliability
∙ Widows update
∙ System file checker
∙ Scan Disk
∙ Registry checker
∙ Back up
Faster Operating System
Windows XP includes tools that help your computer run faster. Without adding
new hardware, Windows XP includes the suit of programs designed to optimize our
computer’s efficiency especially when used together:
∙ Maintenance wizard
∙ Drive Converter
∙ Disk defragmenter
One of the most significant changes in Visual Basic 6.0 is the Integrated
Development Environment (IDE). IDE is a term commonly used in the
programming world to describe the interface and environment that we use to
create our applications. It is called integrated because we can access virtually all
of the development tools that we need from one screen called an interface. The
IDE is also commonly referred to as the design environment, or the program.
➢ Menu Bar
➢ Tool Bar
➢ Project Explorer
➢ Properties window
➢ Toolbox
➢ Form Designer
➢ Object Browser
➢ Code editor
MENU BAR
This Menu Bar displays the commands that are required to build an
application. The main menu items have sub menu items that can be chosen when
needed. The toolbars in the menu bar provide quick access to the commonly used
commands and a button in the toolbar is clicked once to carry out the action
represented by it.
TOOLBOX
The Toolbox contains a set of controls that are used to place on a Form at
design time thereby creating the user interface area. Additional controls can be
included in the toolbox by using the Components menu item on the Project menu.
PROJECT EXPLORER
Docked on the right side of the screen, just under the toolbar, in the
Explorer window. The Project Explorer as shown in figure server as a quick
reference to the various elements of a project namely form, classes and modules
PROPERTIES WINDOW
CODE EDITOR
Visual Studio, like any other IDE, includes a code editor that supports
syntax highlighting and code completion using IntelliSense for not only variables,
functions and methods but also language constructs like loops and queries.
IntelliSense is supported for the included languages, as well as for XML and for
Cascading Style Sheets and JavaScript when developing web sites and web
applications.
This is where you design your form. A form is what you will present to a
user of your application. A form could be an introduction screen, it could be a
dialog box giving the user options, it could be a box containing a warning. All of
your VB programs will revolve around a number of forms.
VISUAL BASIC CONTROLS
POINTER
PICTURE BOX
TEXT BOX
FRAME
COMMAND BUTTON
OPTION BUTTON
allows the user to select only one option even it displays multiple
choices.
LIST BOX
COMBO BOX
These controls allow the user to select a value within the specified range of
values.
TIMER
Displays the valid disk drives and allows the user to select one
Allows the user to select the directories and paths, which are
LINE
IMAGE
DATA
Microsoft Access
This web site provides lessons on how to use Microsoft Office Access 2007
to create and manage databases. The lessons follow a step-by-step format with
practical examples.
To follow these lessons, you must have Microsoft Office Access 2007
installed on your computer. The lessons are listed on the left side of this age.
Below, thelessons are presented as topics.
Access stores data in its own format based on the Access Jet Database
Engine. It can also import or link directly to data stored in other Access Databases,
Excel, Share Point lists, text, XML, Outlook, HTML, dBase, Paradox, Lotus 1-2-3, or
any ODBC compliant data container, including
Visual objects used in forms and reports expose their methods and properties in the
VBA programming environment, and VBA code modules may declare and call
Windows operating system functions. VBA with .NET Framework can be considered
a successor to Accessin the sense that it can produce web front-ends for databases
and includes much of the functionality of VBA in Access.
FUNCTION
cell phone number may be listed in your database. However, demographics about the
client may be the only thing necessary to complete a given project. You can then build a
report that will extract customers by age, sex and marital status.
BENEFITS
Flexibility is the key with Access. Knowing that not everyone is skilled at making
databases, Microsoft created basic templates that a user can go and use immediately.
However, a database can be built from scratch or the templates can be tweaked as needed
to fit your needs. Rather than inputting each record every time a project is started, Access
holds thousandsof records for you to revisit whenever needed, making it a time-saver,
too. Thisis great becausenot only is the information there, but it can be used alongside
other Microsoft programs such as Word. Simply create a mail merge with thousands of
letters and join it together with the Access database. All contacts will be pulled from
Access and dumped into each letter separately. Interaction between MS Outlook is
possible too. Import contacts from your MS Outlook contact book into Access or export
contact information in Access and save it as a contact in Outlook
PROTECTION
Microsoft Access offers several ways to secure the application while allowing
users to remain productive. The most basic is a database password. Once entered, the
user has full control of all the database objects. This is a relatively weak form of
protection which can be easily cracked.
A higher level of protection is the use of workgroup security requiring a user name
and password. Users and groups can be specified along with their rights at the object type
or individual object level. This can be used to specify people with read only or data entry
rights but may be challenging to specify. A separate workgroup security file contains the
settings which can be used to manage multiple databases. Workgroup security is not
supported in the Access 2007 ACCDB database format, although Access 2007 still
supports it for MDB databases. Databases can also be encrypted.
tables with data that is private to each user for storing settings or
temporary data.
For the past few yearsthe number of educational institutions are increasing
rapidly. Thereby the number of hostels are also increasing for the accommodation of the
students studying in this institution. And hence there is a lot of strain on the person who
are running the hostel and software’s are not usually used in this context.This particular
project deals with the problems on managing a hostel and avoids the problems which
occur when carried manually Identification of the drawbacks of the existing system
leads to the designing of computerized system that will be compatible to the existing
system with the system which is more user friendly and more GUI oriented. We can
improve the efficiency of the system, thus overcome the following drawbacks of the
existing system.
∙ Economic Feasibility
Operational Feasibility
The technical requirement for this project are Windows Operating System
as software and normal hardware configuration is enough ,so the system is more
feasible on this criteria.
Economic Feasibility
Economic feasibility is the most frequently used method for evaluating the
effectiveness of a candidate system. More commonly known as cost / benefit
analysis, the procedure is to determine the benefits and saving that are expected
from a candidate and compare them with the costs. If the benefits outweigh cost
then the decision is made to design and implement the system. Otherwise drop the
system.
This system has been implemented such that it can be used to analysis the
traffic. So it does not require any extra equipment or hardware to implement.
3. SYSTEM DESIGN
3.1 Input Design
Input design is a process of converting user orientation into a computer based format.
Input data are collected and organized into groups similar data. The goal of designing input
data is to make data entry as easy, logical and free from error as possible.
Once the input data are identified appropriate input media are selected for
processing. The major approaches for entering data into computer are.
➢ Links
➢ Forms
➢ prompts
Among these links and forms are used in the proposed system. Links are used to
provide a selection list that simplifies computed data access or entry. A form is pre-designed
templates that request the user to enter data in the appropriate location. Input and designs are
considered as the heart of the system. Input design forms are developed using visual basic in
user friendly manner
DATABASE MANAGEMENT
Database Management System (DBMS) is a set of computer programs that controls the
creation, maintenance, and the use of the database with computer as a platform or of an
organization and its end users. It allows organizations to place control of organization-wide
database development in the hands of database administrators (DBA) and other specialists. A
DBMS is a system software package that helps the use of integrated collection of data records
and files known as databases. It allows different user application programs to easily access
the same database. DBMS may use any of a variety of database models, such as the network
model .
➢ Enforces user-defined rule to ensure the integrity of table data has a centralized
data dictionary for the storage of information pertaining to data and its
manipulation.
DATABASE DESIGN
When we design a database, first decide what tables we need, what type of
goes in each table, who can access each table and so on. As you create and work
with tables, you continue to make more detailed decisions about them.
The output design mainly contributes towards the reports generated for
making the decision .by checking the desired condition, the reports are generated.
4.TESTING AND
IMPLEMENTATION
4.1 Testing
Starting from the bottom, the first level of testing is component testing
some time it is called unit testing specified in the component correctly. In theory
an independent tester should do this. But in practice the developer does it as they
people to understand how a component works. The problem with a system, which
may not have been built it. To overcome component is that it performs only a
small part of functionality of a system and it relies on cooperating with other parts
of this developer either built or usesspecial software to make it accurately.
Black box testing is the most important testing to ensure that users of
the application have a flawless and satisfying experience. Because black box
testing is to identifying contradictions in function specification from the user’s
perspective, having a tool that brings efficiency to your testing process is
essential.
The main objective of this testing process is to take unit tested modules
and build a program structure that has been dictated by design.
➢ Top-down integration
➢ Bottom-Up integration
This system developed and give the different types of inputs and tested the
required outputs are displayed.
4.2 IMPLEMENTATION
The Hardware Sales and Service system developed may be totally new, replacing an
existing system. Proper implementation is essential to provide a reliable system to
meet organization requirements. Implementation is the stage of the project when the
theoretical design is turned into an actual working system.
∙ Training the implementation to learn the system. Careful planning and method to
implementation
∙ Making necessary changes to the system as desired by the user. ∙
Testing the developed program with adequate sample data.
Maintenance hold the software industry captive, typing up programming
resources; analyst and programmers spend for more time maintaining programs
that they do write them.
The development stages follows system analysis and design approach. This
system has undergone testing techniques and bugs have been removed in this
project. Input entries can be updated and maintained in several other systems. It is
also very useful for Performing day to day management activities. It is menu
driven and user-friendly.
POSSIBILITIES OF ENCHANCEMENTS:
Our aim is to make future enhancement To the Software Tool For The Additional
Business Logic. A website can be established with support of our system and the
transactions can be performed from remote access. The development stages
follows system analysis and design approach. This system has undergone testing
techniques and
bugs have been removed in the forms. It is very useful for performing day to day
management activities. Employee details and account number can also be
maintained in this project. Employee pay role can also be an Enhancement
6. CODING
#include <iostream.h>
#include <conio.h>
#include <fstream.h>
#include <string.h>
class Student {
int rollNo;
char name[50];
char gender;
int roomNo;
float feesPaid;
float totalFees;
public:
// Function to enter student details
void enterDetails() {
clrscr();
cout << "Enter Roll Number: ";
cin >> rollNo;
cout << "Enter Name: ";
cin.ignore();
cin.getline(name, 50);
cout << "Enter Gender (M/F): ";
cin >> gender;
cout << "Enter Room Number: ";
cin >> roomNo;
cout << "Enter Total Fees: ";
cin >> totalFees;
feesPaid = 0; // Initially no fee is paid
}
}
}
return 0;
}
};
if (!s.modifyDetails(roll, file)) {
cout << "Student not found!\n";
}
}
else if (choice == 5) { // Update Fees
cout << "Enter Roll Number to update fees: ";
cin >> roll;
cout << "Enter the fee amount to add: ";
cin >> amount;
if (!s.updateFeeByRollNo(roll, amount, file)) {
cout << "Student not found!\n";
}
}
else if (choice == 6) { // Exit
cout << "Exiting the system.\n";
}
else { // Invalid choice
cout << "Invalid choice! Try again.\n";
}
file.close();
}
void main() {
clrscr();
Student s;
int choice;
if (choice != 6) {
// Ask if the user wants to perform another
operation
char continueChoice;
cout << "\nDo you want to perform another operation
(Y/N)? ";
cin >> continueChoice;
if (continueChoice == 'Y' || continueChoice == 'y')
{
// Recursively call main again for another
operation
main();
} else {
cout << "Exiting the system.\n";
}
}
}
6.1 Table Structure
BRANCH_INFO
Field Data S Allow Nulls
Name Type i
z
e
DURA NUMBE
TION R
FINE_DETAILS
ROOM NO Number
_fineamount Currency
Hostel_fee
Regno Number
bcode Number
fees Currency
Hostel_info
Field Name Data Type Size Allow Nulls
roomstart Number
roomend Number
NO_OF_PERSONS Number
STUD_INFO
Manual
Wang
➢ www.w3schools.com
➢ www.learnvisualbasic.com
➢ www.visualbasic.com.ar