Project Report
Project Report
A
PROJECT REPORT (MCA 3rd Semester)
MASTER OF COMPUTER APPLICATIONS
ACKNOWLEDGEMENT The project entitled Jewelry shop Management System cannot be completed without a word of thanks to those people whose invaluable support & guidance led to its successful completion. I extend my sincere through & grateful to Prof. S. R. Gupta (HOD).
The project entitled Jewelry shop Management System cannot be completed without a word of thanks to those people whose invaluable support & guidance led to its successful completion. Prof. Kamlesh Malpani, Prof. Gopal Phoolkar and Computer center that have been continuous source of inspiration & guided the development of the whole project. His guidance not only helped us technically, but also kept our morale high during the development of the project.
I also avail this opportunity to express our heartiest thanks to all Professors of SVIM, Indore & my classmates for providing me invaluable support & inspiration all through MCA course.
Page 2
CERTIFICATE
This is to certify that the work embodied in this dissertation entitled Jewelry shop Management System has been satisfactorily completed by Prem Kumar Patel (0807CA101075), Rajendra Kumar Yadav (0807CA101079), and Ritu Malviya (0807CA101087). It is a bonafide piece of work, carried out under my guidance in the Master of Computer Application, Shri Vaishnav of Institute Management, Indore for the partial fulfillment of the Master of Computer of Applications degree during the academic Session July-Dec, 2011.
Prof. Kamlesh Malpani (SVIM, Indore) Prof. Gopal Phoolkar (SVIM, Indore)
Page 3
CERTIFICATE
This is to certify that the work embodied in this dissertation entitled Jewelry shop Management System has been satisfactorily completed by Prem Kumar Patel (0807CA101075), Rajendra Kumar Yadav (0807CA101079), and Ritu Malviya (0807CA101087). It is a bonafide piece of work, carried out under the guidance of Project mentor in the Master of Computer Application, Shri Vaishnav of Institute Management, Indore for the partial fulfillment of the Master of Computer of Applications degree during the academic Session JulyDec, 2011.
External Examiner
. Internal Examiner
Page 4
Index
1. Introduction of client/organization 2. Problem Investigation Introduction to Existing System Objective 12 Goal & Need of project Solution suggested 3. System analysis Information Gathering Online Observation Interviews Questionnaires Record Review Process model used 1.) Select model 2.) Advantage of select model Limitations to current system Introductions to proposed system Merits of proposed system 18 1.) Required documents 2.) Hardware & software requirements 3.) Time Team organization Specify the role in team. Schedule 5. Feasibility study 20 Project resources 07 08
4. Project Planning
Page 5
23
78. Tools used and descriptions Front end Back end Reason for tools selected
29
8. Implementation Programming approach followed Top Down Approach / Bottom Up Approach Screen layouts Forms Layouts Reports Layouts 9. Testing Testing Objectives of testing methods Testing methods (Test cases used) 10. Maintenance 11. Conclusion Conclusion and discussion Limitations Suggestion for future extension of work 12. Bibliography
31
42
46 47
48
Page 6
CHAPTER-1 1. INTRODUCTION
PUNJAB JWELLERS E-biller is a client based billing system. This system deals with shops, it provides a complete solution to all problems that arise in conventional client based billing software. E-biller is customizable software; this enables it to be used anywhere in the shopping system. E-biller has one Component; the windows form application for the branch. It can be easily used to any system where we want to put the billing system. It is an offline system so we dont need any internet facility to run the program. It can replace the manual billing entry of book keeping. The client uses MS Excel, and maintains their product list, customer list, and prints the invoice, however it is not possible them to share the data from multiple system in multi user environment, there is lot of duplicate work, and chance of mistake. When the product price are changed they need to update each and every excel file. There is no option to find and print previous saved invoice. There is no security; anybody can access any report and sensitive data, also no reports to find out the sales volume, stock list, and summary report. This e-billing and invoicing system is used to overcome the entire problem which they are facing currently, and making complete atomization of manual billing and invoicing system. It is far faster than the conventional billing system and saves so much of time to increase the efficiency of billing work for the shop. This is the system which will provide easy entry, viewing products and keeping the billing records safe in the database. The owner of shop can easily view all the transactions of billing from the system without any problem. He can keep the track of the billing of the shop without any error.
Page 7
Page 8
Drawbacks: Online billing systems wont support offline billing. Offline billing systems wont support Multi shops. Inter shop communication was not supported. Low speed of operation due to huge local database. Manual billing was difficult. Customizing of software was not possible.
Page 9
The current system makes the work of Jewelry Shop Management System easier. The project Jewelry Shop Management System can help to the activity performed in a Jewelry Shop Management System to reduce the complexity in different fields like Customer data, transaction data, and data about items, managing the bills actively, and what the customers want, what are the titles available etc.
2.4 Objectives
3 4 5 6 7 8 9 The objectives of this system are as follows: Scientifically manage the project development life cycle. Systematically study the working of Jewelry Shop. Develop Systems Requirement Specification for the Jewelry Shop. Design a suitable model, which can represent the Universe of Database. Give documentation on the user requirements. Design a suitable conceptual model, which can represent the Universe of Database.
10 Design a logical model suitable for Database implementation. 11 Perform Testing and closure activities.
Page 10
Page 11
1. Online Observation
This technique refers to gathering requirements for the system by searching for the resources available online, so that facts about already existing similar systems could be studied. This forms the layout for the system that is to be built.
2. Interviews
This technique refers to gathering requirements for the system by interviewing the clients. Here, the clients show how they want the system to be and how will the system interact with the users, what data will be stored, what data will be retrieved and how.
3. Questionnaires
This technique refers to gathering requirements for the system by asking questions. These questions can be asked by team members themselves, or else Users of the already existing similar systems.
4. Record Review
After requirements gathering phase, the facts gathered about the system are reviewed, so that the overall layout and working of the system could be analyzed and studied.
Page 12
1. Select Model
Water fall model
One such approach used in software development is the waterfall model ,waterfall model approach was first a process model to be introduced and fallowed widely in software engineering to ensure success of the project . In waterfall approach the whole process of software development is divided in to separate phases .these phases in waterfall model are A: Requirement specification phase B: software design C: implementation D: testing and maintenance
Page 13
Diagram
Requirement gathering and analysis System design
Page 14
Page 15
Page 16
Page 17
1.1
Project Report
Project report provides an introduction to current system and system to be built. It gives the brief knowledge of current system.
1.2
Project Documentation
A complete documentation will be given in the form of SRS. Software requirement specification (SRS) will provide an introduction an introduction of current system and the system to be built. This overview includes the purpose of SRS and a brief knowledge of current system. The overview also provides an introduction of the proposed system.
Page 18
2.2 Software RequiredWindows 98/2000/XP/NT/2003 Microsoft Office 2000/or later Microsoft visual studio 6.0
4.3 Time
Successful information system projects are those that have been successfully managed. Poorly planned systems project to meet the schedule and disappoint the enthusiastic users. Those projects that are developed on time have these characteristics in common1. A carefully formulated estimation of time requirements. 2. A mean for management to monitor progress. 3. A mean of comparing actual against planned performance. 4. Sufficient information to deal with problems when they arise. One of the most aspects of project management is the formulation of estimates of the time required to develop a system. Estimates and time scheduling is an approximation of the hours, days, or months. The time includes collection requirements for the system from the current users of the similar system available, then actually implementing the system with the help of development tools like visual basic 6.0(for front end) and MS Access(for back end).
Page 19
Page 20
2. Reliable: we assume that the device will receive a lot of shock, from mishandling, vibrations, etc.
3. Easy maintenance of information Since the records of all the activities performed by the various sites are stored digitally and with the use of software it becomes east to retrieve and maintain data. It is also easy to backup the data.
4. Save time and effort Since the entire data management task is done by the system, it saves lot of time, effort and energy of the user to get the work done.
5. Various processes running The various processes that will be running through the project execution time can be summarized as follows:
1. User login 2. Changing password 3. Adding new item 4. Adding new copies of existing item
Page 21
5. View an item 6. Searching an item 7. Entry of transaction detail(rent/purchase) 8. Return of items, if rented 9. Searching a customer 10. Looking at transactions and incomes 6. Secure: the system should be secure enough to provide access to only authorized users. In our project the technical feasibility is considered up to a greater extent. The software is build using visual basic 6.0. Thus the problem of non availability of software is eradicated. The backend of the system is MS access, which is freeware database application. Proposed system can be expanded in future if required. Proposed system also provides data security by password protecting.
Page 22
Username
Login
Password
System use
6.2 ERD
Service to user
System responsible
Page 23
User
Process
Administer
Check database
Database
Page 24
Login Password
Login
Login Name
Login Id
Item Name
Item Weight
Present Item Id
Bill No.
C. Id Item Id
Page 25
Login
user A Naresh PANJAB JWELERS a prem PANJAB JWELERS password
Item
Item_Id Item_Name 1 RING 2 EARRING 3 PENDANT 4 NECKLACE 5 DIAMONDRING 6 BROOCH 7 BRACELET 8 BANGEL 9 GOLD RING 10 BELT 11 RING 12 CHAIN 13 CLIP Gold Gold Gold Gold Gold Gold Gold Gold Gold Silver Silver Gold Silver Item_Type Item_W 10 11 12 13 15 14 16 17 18 20 10 100 3
Page 26
Stock
S_Id 1 2 3 5 6 7 8 9 10 11 17 18 19 20 21 22 Item_Id 1 2 3 4 5 6 6 7 8 8 9 9 10 11 12 12 U_Q 4 2 6 2 2 1 0 1 1 0 2 0 5 4 9 0
Customer
C_Id 1 2 3 4 5 6 7 8 9 10 13 14 15 16 17 18 19 C_Name ABC a b cc dd nm mm abc ww q v nnnn gh asas vb q a C_P_No 0 0 C_M_No C_Add ABC a b cc dd nm mm abc ww q v nnnn gh asas vb q a
11
11
Page 27
Bill
B_Id 1 3 4 5 6 7 8 9 10 11 12 13 14 15 18 19 21 23 25 27 28 29 30 31 C_Id 1 2 3 3 3 4 4 5 5 6 7 8 9 10 11 14 15 16 17 18 18 18 19 19 Item_Id 1 2 1 4 6 1 2 1 2 1 1 1 1 1 2 10 2 2 1 3 6 8 1 2 S_POI $1,000.00 $3,000.00 $1,000.00 $5,000.00 $2,000.00 $2,000.00 $2,000.00 $3,000.00 $4,000.00 $2,000.00 $4,000.00 $1,500.00 $1,000.00 $1,800.00 $2,222.00 $1,111.00 $2,222.00 $3,333.00 $1,000.00 $444.00 $666.00 $88.00 $1,200.00 $6,000.00 T_POI $2,000.00 $6,000.00 $3,000.00 $10,000.00 $4,000.00 $4,000.00 $4,000.00 $6,000.00 $8,000.00 $2,000.00 $4,000.00 $1,500.00 $2,000.00 $3,600.00 $4,444.00 $1,111.00 $2,222.00 $3,333.00 $1,000.00 $444.00 $666.00 $88.00 $2,400.00 $6,000.00 P_AOI 2 2 3 2 2 2 2 2 2 1 1 1 2 2 2 1 1 1 1 1 1 1 2 1
Page 28
Page 29
edition plus tools such as visual source safe (a version control system) and automation and component manager. Advantage- a standard language means that, no matter which program you use, you have to learn only on set of statements and techniques. VB is easier to use than most programming language. You can also create dialog box by simply drawing appropriate controls on to a document or on to separate user form by providing title codes as desired by user. VB is a full blown programming environment that includes high level programming constructors as well as every access to every future in the application it also include the powerful tools and the ability to create a help system .
Page 30
Bottom-up Approach
A bottomup approach is the piecing together of systems to give rise to grander systems, thus making the original systems sub-systems of the emergent system. Bottom-up processing is a type of information processing based on incoming data from the environment to form a perception. Information enters the eyes in one direction (input), and is then turned into an image by the brain that can be interpreted and recognized as a perception (output). In a bottomup approach the individual base elements of the system are first specified in great detail. These elements are then linked together to form larger subsystems, which then in turn are linked, sometimes in many levels, until a complete top-level system is formed. This strategy often resembles a "seed" model, whereby the beginnings are small but eventually grow in complexity and completeness. However, "organic strategies" may result in a tangle of elements and subsystems, developed in isolation and subject to local optimization as opposed to meeting a global purpose.
Advantages:
User and business awareness of the product. Benefits are realized in the early phases. You can replace many manual processes with early automation. You can implement password management for a large number of users. You do not have to develop custom adapters in the early phases.
Page 31
Your organization broadens identity management skills and understanding during the first phase.
Tivoli Identity Manager is introduced to your business with less intrusion to your operations.
Disadvantages:
The organizational structure you establish might have to be changed in a later roll-out phase.
Because of the immediate changes to repository owners and the user population, the rollout will have a higher impact earlier and require greater cooperation.
This strategy is driven by the existing infrastructure instead of the business processes.
Conversion
Conversion means changing from one system to another. The objective is to put the tested system into operation while holding costs, risks and personnel irritation to minimum. It involves: Creating computer-compatible files Training the operation staff and Installing terminals and hardware
Page 32
Welcome Screen
Page 33
Login Screen
Page 34
Change Password
Page 35
Page 36
Page 37
Page 38
Sales
Page 39
Bill
Page 40
2 Reports Layouts
Report
Page 41
The objective is to design tests that systematically uncover different classes of errors and to do so with a minimum amount of time and effort.
Test Planning
Test planning is concerned with setting out standards for the testing process. The test plans are intended for both management and software developers. The preparation of test plans usually starts at the end of the requirements analysis stage and developed throughout the design stage. Plans should be made for both development testing (done by software developers) and independent testing (done by an independent team of testers). We will look at techniques for testing in the small (i.e. testing individual components) first. Later we will discuss techniques of testing in the large i.e. testing clusters of components and testing the complete system. We will discuss black box and white box techniques. In black box testing, the tester does not know the internal structure to design test cases. These techniques are applicable to both traditional and
Page 42
object oriented systems. In object oriented systems, test techniques would be applied to the operations within a class. It is impossible to test exhaustively (i.e. test every possible situation that might occur). The goal is to select a set of test cases, which provides good coverage and can be completed with a reasonable amount of effort.
1. Unit Testing In unit testing, individual components are tested individually. This can
be done throughout the coding process, as each unit is completed. White box methods are typically used for unit testing.
Page 43
Page 44
Recovery: How well does the system recover from faults and how quickly does it resume processing?
Security: How secure is the system? How easy it is for unauthorized users to break into the system?
Stress: How well does the system stand up to abnormal situations in which there are unusual demands for resources? Performance: Does the system meet all performance requirements? Debugging It is the process of locating and fixing an error, after testing has determined that the error exists. Usually locating the error rather than fixing it, takes the majority of the effort required for debugging. After fixing an error, it is important to do regression testing to make sure that the correction did not introduce new errors into the program.
Page 45
Corrective maintenance means repairing process or performance failures or making changes because of previously unconnected problem or false assumption.
Perceptive maintenance means enhancing the performance or modifying the programs to respond to the users additional or changing needs.
For providing maintenance and security to databases the users have been classified in two types the administrator and general user. Administrator handles the maintenance part and other system design.
Documentation is as much a part of maintenance as it is of system development as system is well documented user can understand the system unambiguously, so modifications in the programs can be performed in the system with great case.
Page 46
11.2 Limitations
As we are also student according to our views we have tried our best of fulfill the Requirement about the project inspire other awareness may be left some important things. As we have realized later after discussion in our friends.
1. Visual Studio can make system slower. 2. Any Unexpected bug can be cause the data failure.
Page 47
CHAPTER-12
12. BIBLIOGRAPHY
1.Complete reference: Visual Basic 6.0, Tata McGraw-Hill Publication by jerky 2.Complete reference: Visual Basic 6.0, Tata McGraw-Hill Publication by Bradley 3.Mastering Visual Basic 6.0, Gupta Publishing by Petroutsos Davis 4.Mastering Visual Basic 6.0, Gupta Publishing by Evangelos Petroutsos
Page 48