You are on page 1of 35

GOODS MANAGEMENT SYSTEM

SYNOPSIS

This project “GOODS MANAGEMENT SYSTEM” has been developed for the
computerization to handle the garments details. The proposed system is windows application
software used to maintain product details, order details, purchase details, production details has
been developed for the entire respective module. This makes the database manager to manage
the product easily and can retrieve the information easily.

The main goal of this project is to reduce manual works, increase the processing
speed and ensure reliability of data. This project also takes care of maintaining records of all the
students’ details, staff details viewing the status of the concern.

Various reports are generated based on the requirement of the concern; reports will
present the management with the current position of the company. The project will be an
efficient tool for the company and it will aid in the improvement of the company. It has been
designed and developed by PHP as Front-End tool and MYSQL as back-end tool.

1. INTRODUCTION
The proposed system is windows application software used to maintain supplier details,
order details, purchase details, production details, delivery details, staff details, carrier details
and report has been developed for all the respective module of the private organization.

This helps to eliminate the human errors and can be processed easily. The purpose of the
system is to provide accurate results in all transaction of data in effective manner. This package
is designed for the particular need of the company to work out the operations effectively and
efficiently.

So that the various departments can more easily share information and communicate with
each other. Each of those departments typically has its own computer system optimized for the
particular ways that the department does its work

1.1 ORGANISATION PROFILE

Who We Are
Live Technologies is an established web development company delivering web development
services of any complexity to clients worldwide. Being in IT business for over 4 years now Live
Technologies has a strong team of skilled experienced IT experts. Our customers are companies
of all sizes ranging from startups to large enterprises who realize that they need a professional
internet solution to generate revenue streams, establish communication channels or streamline
business operations.

What We Do

Live Technologies delivers comprehensive web services ranging from custom website design to
development of complex internet systems. We base our offerings on an understanding of clients’
business requirements and providing dependable solutions. We combine business domain
knowledge with technology competence and proven methodologies to deliver high quality results
in a cost-effective manner to maximize your competitive advantage and productivity.

Our Strengths

One-stopInternetSolutionsVendor
Whether you need an appealing website design or complex multi-tier internet system
development or custom programming using latest technologies and industry trends (e.g. Web
2.0) – Live Technologies has required experience and expertise to do it all.

Full-CycleDevelopmentServices
At Live Technologies we support a full-cycle development process from requirements definition
and specification, architecture design, coding, testing and validation to product maintenance and
support. Depending on your specific requirements our experts will take you step by step through
each phase of solution development providing you with a sound advice on technology and
application options.

ExperienceandExpertise
Having over 5 years of experience in providing internet services and solutions and having
completed hundreds of projects in different domains Live Technologies has built a large database
of knowledge that enables us to deliver the “right” solutions that address the needs of clients.
Quality Standards

Live Technologies Quality Initiatives are based on a 3Q approach:

1. Quality personnel
2. Quality Process
3. Quality Communications

Each project at Live Technologies is under constant control of a dedicated quality assurance
department that monitors project activities and results at each development phase.

VastPoolofITProfessionals
Whether you need a top-notch expert with a specific knowledge or a team with diverse
technology skills and domain expertise Live Technologies has a pool of over IT experts
including business analysts, project managers, software architects, web and graphic designers,
flash animators, software developers, quality assurance and testing specialists.

Our Business Philosophy

We at Live Technologies are committed to delivering maximum value to our clients helping
them succeed in a constantly changing and challenging biz world. Our fundamental company
values stem from understanding that our success is tied with success of our clients. Our key
business principles.

Understand Clients Needs


We carefully study each customer particular case to understand the client’s needs and objectives
and deliver a dependable solution. We make you aware of all available options and provide you
with a competent advice enabling you to take an informed business decision.

1.2 SYSTEM SPECIFICATION

1.2.1 HARDWARE SPECIFICATION:


Processor : Intel Pentium Dual Core

Processor Speed : 1.7 GHz

Memory (RAM) : 512MB

Floppy Drive : 3 ½ “1.44 MB Drive

Monitor : Acer Color Monitor

Keyboard : 104 keys Acer Keyboard

Mouse : Acer Optical Mouse

1.2.2 SOFTWARE SPECIFICATION:

Operating System : Windows XP,7,8

Software Tools : Visual basic .Net

Database : SQL Server 2005

Framework : .Net Frame work 2005

SOFTWARE FEATURES

FRONT-END TOOL VB.NET:


Visual Basic .NET (VB.NET) is a multi-paradigm, high level programming language,
implemented on the .NET Framework. Microsoft launched VB.NET in 2002 as the successor to
its original Visual Basic language. Although ".NET" portion dropped in 2005, this article uses
"Visual Basic .NET" to refer to all Visual Basic languages releases since 2002, in order to
distinguish between them and the classic Visual Basic. Along with Visual C#, it is one of the two
main languages targeting the .NET framework.

Microsoft's integrated development environment (IDE) for developing in Visual Basic


.NET language is Visual Studio. Most of Visual Studio editions are commercial; the only
exceptions are Visual Studio Express and Visual Studio Community which are freeware. In
addition, .NET Framework SDK includes a freeware command-line compiler called
vbc.exe. Mono also includes a command-line VB.NET compiler.

Visual Basic .NET is the second series of Microsoft's Visual Basic series. It is sometimes
shortened to VB.NET. It is an IDE (Integrated Development Environment) and it includes an
easy 'drag-and-drop' interface. It can make complete programs for Windows very easily.

This package is the 'backbone' of Visual Basic .NET. When applications are created,
the Windows Installer includes the framework with it. It includes all the items needed to run the
VB.NET applications that have been made.

A programmer can create an application using the components provided by the Visual
Basic program itself. Over time the community of programmers has developed new third party
components, keeping this programming language to modern standards. Programs written in
Visual Basic can also use the Windows API, which requires external function declarations.

Advantages of VB.NET
 First of all, VB.NET provides managed code execution that runs under the Common
Language Runtime (CLR), resulting in robust, stable and secure applications. All features
of the .NET framework are readily available in VB.NET.
 VB.NET is totally object oriented. This is a major addition that VB6 and other earlier
releases didn't have.
 The .NET framework comes with ADO.NET, which follows the disconnected paradigm,
i.e. once the required records are fetched the connection no longer exists. It also retrieves
the records that are expected to be accessed in the immediate future. This enhances
Scalability of the application to a great extent.
 VB.NET uses XML to transfer data between the various layers in the DNA Architecture
i.e. data are passed as simple text strings.
 Error handling has changed in VB.NET. A new Try-Catch-Finally block has been
introduced to handle errors and exceptions as a unit, allowing appropriate action to be
taken at the place the error occurred thus discouraging the use of ON ERROR GOTO
statement. This again credits to the maintainability of the code.
 Another great feature added to VB.NET is free threading against the VB single-threaded
apartment feature. In many situations developers need spawning of a new thread to run as
a background process and increase the usability of the application. VB.NET allows
developers to spawn threads wherever they feel like, hence giving freedom and better
control on the application.
 The CLR takes care of garbage collection i.e. the CLR releases resources as soon as an
object is no more in use. This relieves the developer from thinking of ways to manage
memory. CLR does this for them.

SQL SERVER 2005


SQL Server 2005 (formerly codenamed "Yukon") released in October 2005. It included
native support for managing XML data, in addition to relational data. For this purpose, it defined
an xml data type that could be used either as a data type in database columns or as literals in
queries. XML columns can be associated with XSD schemas; XML data being stored is verified
against the schema. XML is converted to an internal binary data type before being stored in the
database. Specialized indexing methods were made available for XML data. XML data is
queried using XQuery; SQL Server 2005 added some extensions to the T-SQL language to allow
embedding XQuery queries in T-SQL. In addition, it also defines a new extension to XQuery,
called XML DML that allows query-based modifications to XML data. SQL Server 2005 also
allows a database server to be exposed over web services using Tabular Data Stream (TDS)
packets encapsulated within SOAP (protocol) requests. When the data is accessed over web
services, results are returned as XML.

Common Language Runtime (CLR) integration was introduced with this version,
enabling one to write SQL code as Managed Code by the CLR. For relational data, T-SQL has
been augmented with error handling features (try/catch) and support for recursive queries with
CTEs (Common Table Expressions). SQL Server 2005 has also been enhanced with new
indexing algorithms, syntax and better error recovery systems. Data pages are check summed for
better error resiliency, and optimistic concurrency support has been added for better
performance. Permissions and access control have been made more granular and the query
processor handles concurrent execution of queries in a more efficient way. Partitions on tables
and indexes are supported natively, so scaling out a database onto a cluster is easier. SQL CLR
was introduced with SQL Server 2005 to let it integrate with the .NET Framework.

SQL Server 2005 introduced Multi-Version Concurrency Control. User facing features
include new transaction isolation level called SNAPSHOT and a variation of the READ
COMMITTED isolation level based on statement-level data snapshots. SQL Server 2005
introduced "MARS" (Multiple Active Results Sets), a method of allowing usage of database
connections for multiple purposes.

SQL Server 2005 introduced DMVs (Dynamic Management Views), which are
specialized views and functions that return server state information that can be used to monitor
the health of a server instance, diagnose problems, and tune performance.
Service Pack 1 (SP1) of SQL Server 2005 introduced Database Mirroring, a high
availability option that provides redundancy and failover capabilities at the database level.
Failover can be performed manually or can be configured for automatic failover. Automatic
failover requires a witness partner and an operating mode of synchronous (also known as high-
safety or full safety).

ADVANTAGES OF SQL SERVER 2005:

SQL Server 2005 has reduced application downtime, increased scalability and
performance, and tight yet flexible security controls.

Sql server 2005 provides the ability to have more than one pending request per
connection. In Sql Server 2000 while reading records with one reader we can update another
record at the same time.

We need to depend on ERROR for any errors that way that developers program more
powerful and error resistant SQL code with structured exception handling. We can use try/catch
compare in Sql Server 2005 Performance of query execution is much faster as compared to sql.

It supports Integration of the .NET common language runtime. By default it is off. We


explicitly need to start from configuration.

Setting It has a new XML data type as well as a new varbinary(max) data type Integration
with the Visual Studio development environment provides more efficient development and
debugging of line-of-business and business intelligence (BI) applications.
BACK END: SQL SERVER 2005
Enterprise (only support Windows Server OS) Enterprise (only support Windows Server
OS) –Includes all of the features of Includes all of the features of SQL Server 2005 and meets the
hi SQL Server 2005 and meets the high demands of demands of enterprise online transaction pr
enterprise online transaction processing and data warehousing and data warehousing applications
Standard (mostly support Windows Server OS) Standard (mostly support Windows Server OS) –
Includes the essential functionality needed for e Includes the essential functionality needed for e-
commerce, data warehousing, commerce, data warehousing, and line and line-of-business
solutions business solutions

Workgroup– – Includes the core database Includes the core database features of the SQL
Server product of the SQL Server product line, and is the ne, and is the data management
solution for small data management solution for small organizations that need a dat organizations
that need a database with no abase with no limits on size or number of users limits on size or
number of users

Express (free) Express (free) –A free, easy A free, easy-to-use, lightweight, and
embeddable use, lightweight, and embeddable version of SQL Server 2005, of SQL Server 2005,
includes powerful features such as SQL Server 2005 Reporting Ser includes powerful features
such as SQL Server 2005 Reporting Services and vices and SQL Server 2005 Management
Studio Express

Developer (can support Windows XP OS) Developer (can support Windows XP OS) –
Includes all of the functionality of Includes all of the functionality of Enterprise Edition, but is
Enterprise Edition, but is licensed only for licensed only for development, test, and demo use
development, test, and demo use

Compact–A free, easy A free, easy-to-use embedded database engine that use embedded
database engine that lets developers build robust lets developers build robust Windows Desktop
and mobile Windows Desktop and mobile applications that run on all Windows ions that run on
all Windows platforms

ADVANTAGES OF SQL SERVER


SQL Server 2005 has reduced application downtime, increased scalability and
performance, and tight yet flexible security controls. SQL Server 2005 makes it simpler and
easier to deploy, manage, and optimize enterprise data and analytical applications. It enables you
to monitor, manage, and tune all of the databases in the effective way. Failure of the primary
system, applications can immediately reconnect to the database on the secondary server using
Database Mirroring.

SQL Server 2005 provides a new capability for the partitioning of tables across
filegroups in a database. Has Features of XML, Multidimensional Expressions (MDX), and
XML for Analysis (XMLA). Integration with the Visual Studio development environment
provides more efficient development and debugging of line-of-business and business intelligence
(BI) applications SQL Server 2005 provides a lot of benefits over SQL Server 2000 including
within the replication feature set. You might be relieved to know that, although most of the
benefits accrue on the side of a SQL Server 2005 Publisher, you can still set up SQL Server 2005
as a subscriber on a SQL Server 2000 Publisher.

Thus, you can begin to merge in the newest release of SQL Server into an existing
replication scheme. You can read more about this here. Although major advantage to SQL Server
2005 over 2000 is that changes to the schema, such as through ALTER TABLE statements,
replicate out to all subscribing servers. The cool news in a mixed version environment is that the
ALTER TABLE statements will be published to SQL Server 2000 Subscribers from a SQL
Server 2005 Publisher.

 Security Enhancements:

The security model in SQL Server 2005 separate users from objects, provides fine-grain access,
and enables greater control of data access. Additionally, all system tables are implemented as
views, providing more control over database system objects

2. SYSTEM ANALYSIS
2.1 EXISTING SYSTEM:
The existing system is developed using Microsoft Visual basic as front end and
Microsoft Access as back end. It is not secure. It takes long time to identify a supplier details,
order details, purchase details, production details, delivery details, staff details, carrier details in
the database so it cannot handle large amount of data. So the proposed system is planned to be
developed using VB.Net and SQL Server .To keep the large amount of data with quick accessing
and security. In the existing there is no security but using the proposed system it is possible.

2.1.1. MAJOR DISADVANTAGES OF EXISTING SYSTEM ARE :

1. Huge amount of data cannot be maintained manually.


2. Lacks faster processing.
3. More Manpower is required.
4. Duplication of records can occur.
5. Expensive.
6. No security is assured.

2.2 PROPOSED SYSTEM


The proposed system computerizes the details of the company in an easy Manner. It
maintains a centralized database, which can store the relevant Information about the general
users like, supplier details, order details, purchase details, production details, delivery details,
staff details, carrier details. To develop user friendly software that meets the user needs any time.
Information can be created and altered by administrator.

The Primary Objective of the proposed system is to achieve competitiveness.

1. Manpower is reduced.
2. Duplication of records gets reduced.
3. Increases the customer satisfaction through shorter delivery cycle.
4. Data tampering is reduced
5. Provides security that protect against outsider crime.
6. Reduces cost of operations
7. Brings down number of order processing mistakes.
2.2.1 Advantages:
 Expense becomes less.
 Large volumes of data can be stored with ease.
 Security is assured.
 Maintenance of file is flexible.
 Stored data and procedures can be easily edited.
 Easy report generation.
 Less manpower required.
3. SYSTEM DESIGN AND DVELOPMENT

System design centres the software engineering and applied science regardless of the
software process model that is used. Once the software requirements have been analyzed and
specified, tests that are required in the building and verifying the software is done. Each activity
transforms information in a number that ultimately results in validated computer software.

There are mainly three characteristics that serve as guide for evaluation of good design,

 The design must implement all of explicit requirements contained in the analysis model,
and it must accommodate all of the implicit requirements desired by the customer.

 The design must be readable, understandable guide for those who generate code and for
those who test and subsequently support the software.

 The design should provide a complete picture of software, addressing the data, its
functional and behavioural domains from the implementation perspective.

System design is a process of planning a new system or to the complement of the existing
system. The design based on the limitations of the existing system and the requirements
specification gathered in the phase of system analysis.
3.2 INPUT DESIGN

Input design is the process of converting the user-oriented description of the computer
based business information into program-oriented specification. The goal of designing input data
is to make the automation as easy and free from errors as possible.
Input design and control:

Input specifications describe the manner in which data enter the system for processing.
Input design features will ensure the reliability of the systems and produce results from accurate
data, or thus can be result in the production of erroneous information. The input design also
determines whenever the user can interact efficiently with this system.

Objectives of input design:

Input design consists of developing specifications and procedures for data preparation,
the steps necessary to put transaction data into a usable from for processing and data entry, the
activity of data into the computer processing. The five objectives of input design are:

 Controlling the amount of input


 Avoiding delay
 Avoiding error in data
 Avoiding extra steps
 Keeping the process simple

Controlling the amount of input:

Data preparation and data entry operation depend on people, because labour costs are
high, the cost of preparing and entering data is also high. Reducing data requirement expense. By
reducing input requirement the speed of entire process from data capturing to processing to
provide results to users.
Avoiding delay:

The processing delay resulting from data preparation or data entry operations is called
bottlenecks. Avoiding bottlenecks should be one objective of input.

Avoiding errors:

Through input validation we control the errors in the input data.

Avoiding extra steps:

The designer should avoid the input design that cause extra steps in processing saving or
adding a single step in large number of transactions saves a lot of processing time or takes more
time to process.

Keeping process simple:

If controls are more people may feel difficult in using the systems. The best-designed
system fits the people who use it in a way that is comfortable for them.
3.3 OUTPUT DESIGN

Output Design is the most important and direct source of information to the user. The
output design is an ongoing activity during study phase. The objectives of the output design
define the contents and format of all documents and reports in an attractive and useful format.

One of the most important factors of an information system for the user is the output the
system produces. Without the quality of the output, the entire system may appear unnecessary
that will make us avoid using it possibly causing it to fail. Designing the output should process
the in an organized well throughout the manner. The right output must be developed while
ensuring that each output element is designed so that people will find the system easy to use
effectively.

The term output applying to information produced by an information system whether


printed or displayed while designing the output we should identify the specific output that is
needed to information requirements select a method to present the formation and create a
document report or other formats that contains produced by the system.

Types of output:

Whether the output is formatted report or a simple listing of the contents of a file, a
computer process will produce the output.

 A Document
 A Message
 Retrieval from a data store
 Transmission from a process or system activity
 Directly from an output sources
3.4 DATA BASE DESIGN

Data Constraints

All business in the world runs on business data being gathered stored and analyzed.
Business managers determine a set of rules that must be applied to the data being stored to
ensure its integrity.

Types of Data Constraints

There are two types of data constraints that can be applied to data being inserted into a
database table .One type of constraint is called an I/O constraint. The other type of constraint is
called a business rule constraint.
 I/O Constraints

The input /output data constraint is further divided into two distinctly different
constraints.

The Primary Key Constraint


Here the data constraint attached to a column ensures:
 That the data entered in the table column is unique across the entire
column.

 That none of the cells belonging to the table column are left empty.
The Foreign Key Constraint

Foreign constraint establishes a relationship between records across a master and a detail table.
The relationship ensures.
 Records cannot be inserted in a detail table if corresponding records in the master
table does not exist.

 Records of the master table cannot be deleted if corresponding records in the


detail table exist.

Business Rule Constraints

The Database allows the application of business rules to table columns. Business
managers determine business rules.

The Database allows programmers to define constraints at:


 Column Level

 Table Level
Column Level Constraints
If data constraints are defined along with the column definition where creating or altering
a table structure, they are column level constraints.

Table Level Constraints

If data constraints are defined after defining all the table columns when creating or
altering a table structure, it is a table level constraint.

Null Value Concepts

A NULL value is different from a blank of zero. NULL values are treated specially by
the database. A NULL value can be inserted into the columns of any data type.
Not Null Constraint Defined at the Column Level

When a column is defined as not null, then that column becomes a mandatory column .It
implies that a value must be entered into the column if the record is to be accepted for storage in
the table.

The Primary Key Constraint


Primary Key Concepts

A primary key in a table used to uniquely identify each row in the table .A primary key
column in a table has special attributes.
 It defines the column as a mandatory column i.e. the column cannot be left blank.
The NOT NULL attribute is active.

 The date held across the column MUST BE UNIQUE.

The database is implemented by using MYSQL Server7.0.

Normalization :

It is a technique for designing relational database tables to minimize duplication of


information.

The goals of normalization are,

Eliminating redundant data

Ensuring data dependencies make sense.

Types of Normalization are,


 1st Normal form
 2nd Normal form
 3rd Normal form
1st Normal form

The first normal form (or 1NF) requires that the values in each column of a table are
atomic. By atomic we mean that there are no sets of values within a column.

2nd Normal form

The second normal form (or 2NF) any non-key columns must depend on the entire
primary key. In the case of a composite primary key, this means that a non-key column cannot
depend on only part of the composite key.

3rd Normal form

Third Normal Form (3NF) requires that all columns depend directly on the primary key.
Tables violate the Third Normal Form when one column depends on another column, which in
turn depends on the primary key (a transitive dependency).
TABLE DESIGN:

TABLE NAME: Production Primary Key: bid

Field Name Data Type Size Description

P_id Varchar 15 Product id

P_name Varchar 20 Production name

Cmpname Var 10 Company name

Paddress Varchar 25 Address

phone Number 12 Phone number

email Varchar 20 Mail id

TABLE NAME: Staff

Primary Key: S_id

Field Name Data Type Size Constraints

S_id Varchar 10 Primary key

S_name Date 15 Not Null

Department Varchar 10 Not Null

Address Varchar 25 Not Null

Join_date Date 50 Not Null

Phone_no Number 10 Not Null


TABLE NAME: Delivery Detail

Primary Key: Del_no

Field Name Data Type Size Constraints

Del_no Varchar 10 Primary key

Del_date Date 8 Not Null

Party_name Varchar 25 Not Null

Del_courier Varchar 15 Not Null

Del_transport Varchar 15 Not Null

Serial_no Varchar 10 Not Null

Rate Varchar 8 Not Null

Amount Money 8 Not Null

Totamt Money 8 Not Null


TABLE NAME: Order_Details

Primary Key:Order_no

Field Name Data Type Size Constraints

Order_no Varchar 10 Not Null

Order_Date Date 10 Not Null

Del_Date Date 10 Not Null

Style Varchar 20 Not Null

Color Varchar 15 Not Null

Width Number (8,3) Not Null

Qty Varchar 20 Not Null

Unit Number 10 Not Null

Rate Number 10 Not Null

Amt Number 10 Not Null

Remark Varchar 20 Not Null


TABLE NAME: Purchase_Detail

Primary Key: pur_no

Field Name Data Type Size Constraints

Pur_no Varchar 10 Not Null

Desc Varchar 20 Not Null

Rate/mtr Number (10,2) Not Null

Amt Number 8 Not Null

Date Number 8 Not Null

TABLE NAME: Supplier_Details

Primary Key: sid

Field Name Data Type Size Constraints

sid Varchar 10 Not Null

SName Varchar 20 Not Null

Saddr Varchar 25 Not Null

Sphone Number 12 Not Null

Semail Varchar 20 Not Null


3.5 SYSTEM DEVELOPMENT

The systems development is a conceptual model used in project Management that describes the
stages involved in an information system development project, from an initial feasibility study
through maintenance of the completed application.

1. The existing system is evaluated. Deficiencies are identified. This can be done by
interviewing users of the system and consulting with support personnel.
2. The new system requirements are defined. In particular, the deficiencies in the existing
system must be addressed with specific proposals for improvement.
3. The proposed system is designed. Plans are laid out concerning the physical construction,
hardware, operating systems, programming, communications, and security issues.
4. The new system is developed. The new components and programs must be obtained and
installed. Users of the system must be trained in its use, and all aspects of performance
must be tested. If necessary, adjustments must be made at this stage.
5. The system is put into use. This can be done in various ways. The new system can phased
in, according to application or location, and the old system gradually replaced. In some
cases, it may be more cost-effective to shut down the old system and implement the new
system all at once.
6. Once the new system is up and running for a while, it should be exhaustively evaluated.
Maintenance must be kept up rigorously at all times. Users of the system should be kept
up-to-date concerning the latest modifications and procedures.
3.5 MODULE DESCRIPTION

Supplier Details:

This module deals with information about the details of the supplier. It consist of details
such as the supplier id, name, address phone no etc.

Order Details:
This module deals with the information about the order details of the organization. It
consists of details such as order no, delivery date, quantity, remarks, total amount etc.

Purchase Details:
This module deals with the information about the purchase details of the organization. It
consists of details such as purchase no, description, rate, quantity, vat, round off, total amount
etc.

Production Details:
This production module deals with the information about the production details of the
organization.

Delivery Details:
This module deals with the information about the delivery details of the fabrics in the
organization. It consists of details such as order no, delivery date, delivery no, party name,
quantity, rate, total amount etc.

Staff Details:
This module deals with the information about the staff details of the organization. It
consists of details such as staff id, name, date of joining, relieving date, experience etc.

Report Generation:
This module is used to view all the information.
4. SYSTEM TESTING AND IMPLEMENTATION

4.1 SOFTWARE TESTING:

The software testing is an investigation conducted to provide stakeholders with information


about the quality of the product or service under test. Software testing can also provide an
objective, independent view of the software to allow the business to appreciate and understand
the risks of software implementation. Test techniques include, but are not limited to, the process
of executing a program or application with the intent of finding software bugs.

It involves the execution of a software component or system to evaluate one or more


properties of interest. In general, these properties indicate the extent to which the component or
system under test:
 meets the requirements that guided its design and development,

 responds correctly to all kinds of inputs,

 performs its functions within an acceptable time,

 is sufficiently usable,

 It Can be installed and run in its intended environments, and achieves the general result
its stakeholders desire.

The textile management project followed by


 Unit Testing.
 Integration Testing.
 User Acceptance testing.
 Block box testing.
 White box testing.
 Security testing
UNIT TESTING:

The Unit testing used in the each and every modules of the textile management project.
Unit testing focuses verification efforts on the smallest unit of the software design, the module.
This is also known as “Module Testing”. The modules are tested separately. This testing carried
out during programming stage itself. In this testing each module is found to be working
satisfactorily as regards to the expected output from the module.

This testing refers to tests that verify the functionality of a specific section of code,
usually at the function level. In an object-oriented environment, this is usually at the class level,
and the minimal unit tests include the constructors and destructors.

Unit testing aims to eliminate construction errors before code is promoted to QA; this
strategy is intended to increase the quality of the resulting software as well as the efficiency of
the overall development and QA process.

INTEGRATION TESTING:

The integration testing used in the main module or the MDI form of the textile
management project. All the modules are combined and tested as a whole. Here correction is
difficult because the isolation of cause is complicate by the vast expense of the entire program.
Thus in the integration testing stop, all the errors uncovered are corrected for the text testing
steps.

The Integration testing is any type of software testing that seeks to verify the interfaces
between components against a software design. Software components may be integrated in an
iterative way or all together. Normally the former is considered a better practice since it allows
interface issues to be located more quickly and fixed.

Integration testing works to expose defects in the interfaces and interaction between
integrated components. Progressively larger groups of tested software components corresponding
to elements of the architectural design are integrated and tested until the software works as a
system.

ACCEPTANCE TESTING:

At last the time of the desktop security project is delivered to the user for Acceptance
testing.

SECURITY TESTING:

The textile management project is also user for system security. The Security testing is
essential for software that processes confidential data to prevent system intrusion by hackers, this
system followed by the third modules of the desktop security project.

BLACK BOX TESTING

Internal system design is not considered in this type of testing. Tests are based on
requirements and functionality.

WHITE BOX TESTING

This testing is based on knowledge of the internal logic of an application’s code. Also
known as Glass box Testing. Internal software and code working should be known for this type
of testing. Tests are based on coverage of code statements, branches, paths, conditions.
4.2 SYSTEM IMPLEMENTATION

In the implementation section, firstly the difficulties and the reasons leading to a specific
approach are explained. Then, the basic components of the system like Window and Document
processing unit are stated. The other aspects of the system are explained briefly at the end.

The difficulties of the implementation are numerous. The fundamental difficulties are
firstly from the shortage of debugging tool. It is hard to debug Script and even harder to debug
.net. The Visual Studio is not designed for .Net products, or it is better to say that there is no
serious debug tool for the project implementation.

The MSSQL and VB.NET at the time of writing. In order to have an intuitive feeling of
the Scripting code, the components such as window are isolated as a single .net file. The file is
then read into the main page at runtime through the database. assessment of the manner in which
the system functions, including ease of use, response time, suitability of information formats,
overall reliability, and level of utilization.
5. CONCLUSION:

The Software Entitled “TEXTILE MANAGEMENT SYSTEM” is implemented to


replace the manual system effectively. It can eliminate the human errors, which are likely to
creep in the kind of working which bulk quantity of data, and typical calculation has to be
processed. This package designed for the particular need of the company is found to work out the
operations effectively and efficiently.

The System reduces the Clerical work and result in retrieval of information, which is very
vital for the progress of an organization. Cost is minimized in the case of the stationary and man
power. Burden of Manual work is reduced whenever transaction takes place, where there is no
need for recording it many places manually. The report can be taken easily.

6. FUTURE SCOPE OF THE PROJECT:

The application has many options as its future scope. Development of Textile
management application will be emphasized on following aspects:

 Can be used to lock media folders for user’s privacy.

 Can be used to lock applications.

 Can be used to protect my computer so that no one can view the information.

 Can be used enhance the entire platform like Mac, windows, Linux, Android.
BIBLIOGRAPHY

BOOK REFERENCES

 Davis, Harold. Visual Basic.Net for Windows. Berkeley, CA: Peach pit Press, 2008.

 Sandvig, Chris. ASCII Character Codes for VBScript and VB.NET (ISO 8859-1). 8
January 2008.

 SYBEX. Visual Basic Dot Net Complete. Alameda, CA: SYBEX, 1999.

 Karve, Sandit. File Handling using VB6. 28 December 2010 Microsoft. MSDN
Library. 2010.

WEB REFERENCES:
 http://www.vbdotnetheaven.com/

 http://www.stellarpc.com/articles/board.aspx?id=5

 http://www.homeandlearn.co.uk/net/vbnet.html

 www.codeproject.com

 <http://yorktown.cbe.wwu.edu/sandvig/docs/ASCIICodes.aspx>.
 <http://swik.net/SWiK/Dream.In.Code+Programming+Tutorials/File+
Handling+in+Visual+Basic+6+Part+1+-
+Sequential+Files+in+Visual+Basic+Tutorials/bbv3x>.

You might also like