Professional Documents
Culture Documents
Project Report
On
Interior decoration
Submitted In Partial Fulfillment of the Requirements for the Award of the Degree
From
Year: 2016-17
Submitted to
Guided by:
Mrs.Deepshikha Sharma
CERTIFICATE OF EVALUATION
Date: Date:
DECLARATION
This to certify that the project report entitled ” Interior Decoration “,
which is submitted by me in the partial fulfillment for the award of the degree
of Post Graduate Diploma in Computer Application, Gurukul Mahila
Mahavidhyalay, comprises the original work carried out by me.
I further declare that the work reported in this project has not been
submitted and will not be submitted, either in part or in full for the award of any
other degree or diploma in this Institute or any other Institute or University.
(Mamta Sen)
”.
INDEX
S.No. Page No.
Particular
1. Synopsis of the project
2. Objectives & Scope of the project
3. Theoretical Background of project
4. Definition of problem
5. System Analysis and Design
6. System Planning
7. Methodology adopted, System Implementation & Details
of Hardware & Software used
8. System maintenance & Evaluation
9. Cost and benefits Analysis
10. Detailed life cycle of the Project
a. ERD, DFD
b. Input and Output screen design
c. Process involved
d. Methodology used for testing
e. Test report, Printout of the code sheet
Objective:-
Proposed System:-
friendly and error proof package .It means all the requirement of the proper
The report is made to be used in very comfortable manner, all the report is
managed using a single screen only so that the user may not be confused
The between dates report used in this project is very user friendly & provides
All the security levels maintained by the DBA prevent unauthorized users
can be made in the existing system in future. All data will locate as
centralized.
The project was initially formally discussed among us and later designedin VB
6.0. The project's back end is Microsoft Access. The program, as the name
suggests is an “Hostel Management” maintains records in the organization.
2. Concentrate on Accuracy
INTRODUCTION:-
After analyzing the requirements of the task performed, the next step is to
analyze the problem and understand its context this first activity in the phase is
studying the existing system and other is to understand the requirement and
domain of new system. Both the activities are equally important, but the first
activity serves as the basis of the proposed system. Understanding the
properties and requirement of a new system is more difficult and require
creative thinking. It can be made effective only when we have through
understanding of the existing system. The process becomes even more difficult
when the existing system is almost entirely different from the one to be
developed.
ANALYSIS MODEL:-
The design starts after the requirement analysis is complete and coding
begins after the design is complete. Once the programming is complete the
testing is done. In this model the sequence of activity performed in a software
development projects are ……
Requirement analysis
Project planning
System design
Coding
Unit testing
System integration
Here the linear ordering of these activities is critical. End of the phase and the
output of one phase is the input of another phase. The output of each has to be
consistent with the overall requirement of the system. Some models are also
incorporated like after the people concerned with the project .Review
completion of each of the phase the work done.
FEASIBILITY STUDY:-
All project are feasible given unlimited resources and infinite time,
unfortunately. The development of a computer based system or product is more
likely plagued. By the scarcity of resources and difficult delivery dares. It is
both necessary and prudent to evaluate the feasibility of a project at the earliest
possible time.
NEED OF COMPUTERIZATION:-
We all know the importance of computerization. The world is moving ahead at a
lighting speed and everyone is running short of time. One always wants to get
the information and perform the task he/she/they desires within a short period
of time and that too with a good amount of efficiency and accuracy. In entry
pass management system this can be achieved through computerization
The whole process of maintaining records is a rather tedious job.
Quarries about past database are not easy to answer in the present system.
Searching of record manually is time consuming and requires data collection
from various registers.
SYSTEM DESIGN
INTRODUCTION:-
Methodology Adopted:-
The waterfall model is one of the earliest structured models for software
development. It consists of the following sequential phases through which the
development life cycle progresses:
• System feasibility. In this phase, you consider the various aspects
of the targeted business process, find out which aspects are worth
incorporating into a system, and evaluate various approaches to building
the required software.
Coding and unit testing. In this phase, you write code for the
modules that make up the system. You also review the code and
individually test the functionality of each module.
Integration and system testing. In this phase, you integrate all
of the modules in the system and test them as a single system for all of
the use cases, making sure that the modules meet the requirements.
It enforces testing in every stage in the form of reviews and unit testing.
You conduct design reviews, code reviews, unit testing, and integration
testing during the stages of the life cycle.
It allows you to set expectations for deliverables after each phase.
You do not see a working version of the software until late in the life
cycle. For this reason, you can fail to detect problems until the system
testing phase. Problems may be more costly to fix in this phase than they
would have been earlier in the life cycle.
When an application is in the system testing phase, it is difficult to
change something that was not carefully considered in the system design
phase. The emphasis on early planning tends to delay or restrict the
amount of change that the testing effort can instigate, which is not the
case when a working model is tested for immediate feedback.
For a phase to begin, the preceding phase must be complete; for example, the
system design phase cannot begin until the requirement analysis phase is
complete and the requirements are frozen. As a result, the waterfall model is
not able to accommodate uncertainties that may persist after a phase is
completed. These uncertainties may lead to delays and extended project
schedules
HARDWARE & SOFTWARE REQUIREMENT
Introduction:-
The hostel management program is an application program for assisting
any hostel accommodation for educational institute and college for managing
the room records, student‟s address record their education detail records .
1. Purpose: automate the manual system
2. Scope of the Project: project/system deals with Block wise hostel rooms
detail, hostel room allocation detail records, payment/ fees receipt,
complain records, and print report
Goals & Purpose
The city hostel management would have the following goals :
- Provide a GUI for hostel to interface with the backend stock detail
database.
- Screens to add/update new admission for the students and room
allocations database
- Screen to search for any record of the student and their room status.
- Payment/Education Entry for students changing their room.
General description
1. Functionality and capabilities
(a) Complete system is GUI i.e. menu driven
(b) Generates any kind of report
(c) Students wise report
(d) Database has no limit
2. User characteristics: administrator has all rights for updating, deletion and
modification.
3. Information flow:
Enquiry for new room Room Entry Room Allocation Entry
Payment / Receipt Entry reports
4. General constraints
(a) Database will be update every year
(b) No automatic backup facilities
(c) No facility of online reports
SOFTWARE & HARDWARE REQUIREMENT
Interface requirements
Software :WINDOWS O.S., XP
1. MS ACCESS
2. MsPowerpoint
Processor :
Minimum P1 machine or Higher version 133 Mhz
We use P-IV machine 2.66 GHz.
RAM :
Minimum 32MB RAM.
We use 256 MB RAM.
VGA Graphics :
VGA Support On-Board Motherboard
Floppy Drive :
1.44 MB – 3 ¼ “ Size
Printer :
Laser Jet Printer
Inkjet Printer
CD Rom/Writer :
52x CD Writer/ROM
Detailed life cycle of the project
The VISUAL‟ part refer to the method used to create the graphical
user interface (GUI ).Rather than writing numerous lines of code to describe the
appearance and location of interface elements ,you simply add pre-built object
into place on a screen. If you have used a drawing program. Such paint you
already have most of the skills necessary to create an effective user
interface.The „BASIC‟ part refers to the Basic( beginners all purpose symbolic
instruction code) language, a language used by more programmers than any
other language in the history of competing Visual basic has evolved from the
original basic language and now content sever hundred statements function and
keywords, many of which relate directly to window GUI beginners can create
an useful application by learning just a few of the keywords, yet to power of the
language allows professionals to accomplish anything that can be accomplished
using any other window programming language.
BACKEND
MS ACCESS
DFD SYMBOLS:
INPUT OUTPU
PROCESSING T
ENTITY RELATIONSHIP DIAGRAM (E.R.D)
OF HOSTEL MANAGEMENT
FLOW CHART
Start
User Name
password
If
Valid
MDIFORM
LOPAD/UNLOAD
REPORT
INSTANCE INSTALATION
CONNECTION PROCESS
End
SOFTWARE TESTING
Is the menu bar displayed in the appropriate contested some system related features included
either in menus or tools? Do pull –Down menu operation and Tool-bars work properly? Are
all menu function and pull down sub function properly listed ?; Is it possible to invoke each
menu function using a logical assumptions that if all parts of the system are correct, the goal
will be successfully achieved .? In adequate testing or non-testing will leads to errors that
may appear few months later.
This create two problem
1. Time delay between the cause and appearance of the problem.
2. The effect of the system errors on files and records within the system.
The purpose of the system testing is to consider all the likely variations to which it will be
suggested and push the systems to limits.
The testing process focuses on the logical intervals of the software ensuring that all
statements have been tested and on functional interval is
conducting tests to uncover errors and ensure that defined input will produce actual results
that agree with the required results.
Program level testing, modules level testing integrated and carried out.
White box sometimes called “Glass box testing”, “clear box testing”, “transparent box
testing”, and “structural testing” is a test case design uses the control structure of the
procedural design to drive test case.
Using white box testing methods, the following tests were made on the system.
1. All independent paths within a module have been exercised once. In our system,
ensuring that case was selected and executed checked all case structures. The bugs
that were prevailing in some part of the code where fixed
2. All logical decisions were checked for the truth and falsity of the values.
While white-box testing can be applied at the unit, integration and system levels of the
software testing process, it is usually done at the unit level. It can test paths within a unit,
paths between units during integration, and between subsystems during a system–level test.
Though this method of test design can uncover many errors or problems, it might not detect
unimplemented parts of the specification or missing requirements.
WHITE BOX TESTING DIAGRAM
STATEMENT
TESTING
CONDITION
TESTING
White Box Testing
White box testing assumes that the tester can take a look at the code for the application block
and create test cases that look for any potential failure scenarios. During white box testing,
you analyze the code of the application block and prepare test cases for testing the
functionality to ensure that the class is behaving in accordance with the specifications and
testing for robustness.
Input
Requirements
Functional specifications
High-level design documents
Detailed design documents
Application block source code
The white box testing process for an application block is shown in Figure 6.2.
White box testing involves the following steps:
1. Create test plans. Identify all white box test scenarios and prioritize them.
2. Profile the application block. This step involves studying the code at run time to
understand the resource utilization, time spent by various methods and operations,
areas in code that are not accessed, and so on.
3. Test the internal subroutines. This step ensures that the subroutines or the nonpublic
interfaces can handle all types of data appropriately.
4. Test loops and conditional statements. This step focuses on testing the loops and
conditional statements for accuracy and efficiency for different data inputs.
5. Perform security testing. White box security testing helps you understand possible
security loopholes by looking at the way the code handles security.
Black-box testing is a method of software testing that tests the functionality of an application
as opposed to its internal structures or workings .Specific knowledge of the application's
code/internal structure and programming knowledge in general is not required. This is black
box testing enables the software engineering to derive a set of input conditions that will fully
exercise all functional requirements for a program. Black box testing is not an alternative to
White box testing rather it is complementary approach that is likely to uncover a different
class of errors that white box methods like.
The tester is only aware of what the software is supposed to do, but not how i.e. when he
enters a certain input, he gets a certain output; without being aware of how the output was
produced in the first place
1. Interface errors
2. Performance in data structure
3. Performance errors
4. Initializing and termination errors
BLACK BOX TESTING DIAGRAM
Input
Requirements
Functional specifications
High-level design documents
Application block source code
The black box testing process for an application block is shown below
1. Create test plans. Create prioritized test plans for black box testing.
2. Test the external interfaces. Test the external interfaces for various type of inputs
using automated test suite.
3. Perform load testing. Load test the application block to analyze the behavior at
various load levels. This ensures that it meets all performance objectives that are
stated as requirements.
4. Perform stress testing. Stress test the application block to analyze various
bottlenecks and to identify any issues visible only under extreme load conditions,
such as race conditions and contentions.
5. Perform security testing. Test for possible threats in deployment scenarios. Deploy
the application block in a simulated target environment and try to hack the application
by exploiting any possible weakness of the application block.
6. Perform globalization testing. Execute test cases to ensure that the application block
can be integrated with applications targeted toward locales other than the default
locale used for development.
The first step in the process of black box testing is to create prioritized test plans. You can
prepare the test cases for black box testing even before you implement the application block.
The test cases are based on the requirements and the functional specification documents.
The detailed test plan document includes test cases for the following:
You need to test the external interfaces of the application block using the following
strategies:
Ensure that the application block exposes interfaces that address all functional
specifications and requirements. To perform this validation testing, do the
following:
1. Prepare a checklist of all requirements and features that are expected from the
application block.
2. Create test harnesses, such as NUnit, and small "hello world"' applications to
use all exposed APIs of the test application block.
3. Run the test harnesses.
This testing ensures that the application block provides expected output for data within the
specified range and gracefully handles all invalid data. Meaningful error messages should be
displayed for invalid input.
Use load testing to analyze the application block behavior under normal and peak load
conditions. Load testing allows you to verify that the application block can meet the desired
performance objectives and does not overshoot the allocated budget for resource utilization
such as memory, processor, and network I/O. The requirements document usually lists the
resource utilization budget for the application block and the workload it should be able to
support.
For example, the CMAB had the following performance objectives on a Web server (please
note that these objectives are totally fictitious and are only for the purpose of illustration):
You can measure metrics related to response times, throughput rates, and so on, for the load
test. In addition, you can measure other metrics that help you identify any potential
bottlenecks.
Use stress testing to evaluate the application block's behavior when it is pushed beyond the
normal or peak load conditions. The expectation from the system beyond load conditions is to
either return expected output or return meaningful error messages to the user without
corrupting the integrity of any data. The goal of stress testing is to discover bugs that surface
only under high load conditions, such as synchronization issues, race conditions, and memory
leaks.
Step 5: Perform Security Testing
Black box security testing the application block identifies security vulnerabilities within the
application block by treating it as an independent unit. The testing is done at run time. The
purpose is to forcefully break the interfaces of the application block, intercept sensitive data
within the block, and so on.
Depending on the functionality the application block provides, test cases can be identified.
Examples of test cases and tests can be the following:
If the application block accepts data from a user, make sure it validates the input data
by creating test cases to pass different types of data, including unsafe data, through
the application block's interfaces and confirming that the application block is able to
stop it and handle it by providing appropriate error messages.
The goal of globalization testing is to detect potential problems in the application block that
could inhibit its successful integration with an application that uses culture resources different
than the default culture resources used for development. Globalization testing involves
passing culture-specific input to a sample application integrating the application block. It
makes sure that the code can handle all international support and supports any culture or
locale settings without breaking functionality that would cause data loss.
To perform globalization testing, you must install multiple language groups and set the
culture or locale to different cultures or locales, such as Japanese or German, from the local
culture or locale. Executing test cases in both Japanese and German environments, and a
combination of both, can cover most globalization issues.
Order List Report
Payment Detail Report
Quotation Detail Report
CODINGS OF PASSWORD PROGRAM
End Sub
End Sub
We took the help of all the possible people we could ask them for, and
with their assistance we came out in triumph
FUTURE ENHANCEMENTS
Site Address
www.associatedcontent.com
www.members.tripod.com