51

Click here to load reader

Dairy Management System

Embed Size (px)

Citation preview

Page 1: Dairy Management System

Cyber Cafe

Acknowledgement

We sincerely feel the credit of the project work could not be narrowed

down to only on individual. The development of this project involves many

valuable contributions.

We are thankful to Mr.K.H.Wandra sir to introduce this mini project and

inspiring us all time. We would like to thank Ms. Madhu Shukla and Mr. Dhaval

Nimavat to being very co-operative and helpful while project was being

processed. The project could not have completed without help of them.

Finally, we would be thankful to our parents, friends & almighty that have

inspired and gave us strength while making this project.

Dipesh Sompura (43)

Divyarajsinh Vaghela (47)

Page 2: Dairy Management System

Cyber Cafe

Abstract

This is era of information technology. Science has taken and is taking great strides in this field, which has result in making man’s life more comfortable and easier. Today computers have become necessity of everyone’s life like food Water and air.

More efficient computers are invented and more advanced software are

developed in order to make many complex processes fast and easy.

Our project is on ‘Cyber Café Management’ for cyber cafe owner. We have

made our best attempt to make software for all Customers’ information store in

database safely. This software is used for reliability and efficiency.

Page 3: Dairy Management System

Cyber Cafe

ContentAbstract

1. Introduction 1.1 Project purpose 1.2 Purpose 1.3 Scope 1.4 Technology and Literature Reviews

2. Project Management 2.1 Project planning and scheduling 2.1.1 Project Development Approach 2.1.2 Project Plan 2.1.3 Schedule Representation

3. System Requirement Study 3.1 User Characteristics 3.2 Hardware and Software Requirements 3.3 Constraints

4. System Analysis 4.1 Study of Current Study 4.2 Feasibility Study 4.3 Requirements Validation 4.4 Functions of System 4.5 Data Modeling 4.5.1 Use Case Diagram 4.5.2 Class Diagram/ER Diagram 4.5.3 System Activity or Object Interaction Diagram 4.5.4 Data Dictionary 4.6 Functional and Behavioral Modeling 4.6.1 Context Diagram 4.6.2 Data Flow Diagram (including leveling) 4.6.3 Process Specification and Decision table 4.7 Selection of Hardware and Software (Justification)

5. System Design 5.1 Database Design/Data structure design 5.1.1 Table and Relationship

6. Implementation Planning and Detail 6.1 Implementation Environment 6.2 Program/module specification 6.3 Security features 6.4 Coding Standard

Page 4: Dairy Management System

Cyber Cafe

6.5 Sample Coding

7. Testing 7.1 Testing Plan 7.2 Testing Strategy 7.3 Testing Methods 7.4 Test Cases

8. Screen shots and User Manual9. Limitation and Future Enhancement10. Conclusion

Page 5: Dairy Management System

Cyber Cafe

PROJECT PROFILE

Project Title : Cyber Cafe

Project Definition : to manage customer’s information & space in café is

available or not

Project Members : 1) Dipesh Sompura (43)

2) Divyarajsinh Vaghela (47)

Hardware Requirements : 1) Pentium a microprocessor

2) 256 MB RAM

3) 40 GB HARD DISK

Software requirements : 1) Microsoft Windows XP Professional

2) Microsoft Windows

3) Visual Studio 2008

Platform : 1) .Net Technology

Page 6: Dairy Management System

Cyber Cafe

1. INTRODUCTION:

1.1 Project Summary:

We have made the project on “Cyber Café System”. We are sure that this

is going to be useful to cyber cafe owner.. In which we have used C# and .Net

Technology. All the processes, which are included in making this project

successful in technical terms, will be described in this report. The basic idea of

how the software will work is described in this document.

In our project, we have provided the way that if the space is not available

then it can automatically not enter the user. It will make the time duration of

customer automatically and also the payment as well.

1.2Purpose

Earlier the customer had to give time of surfing in cyber café. But we have

made our project that customer will come out of this headache. Because this

software does all that things automatically. On the other hand, the payment is

displayed itself. So,café owner has no more migraine of that.

If customer’s information is needed then it can be easily available from the

database. So, it reduces paperwork or manual work as well. In short, we have

tried to make a project that can be useful to the people in future. We are sure that

it is also going to be helpful to us to learn about what is helpful for our future.

System should also maintain reports properly, which are generated by

different computers. Payment information should be also properly stored which

will help while performing calculations related to expense on particular customer.

1.3Scope

Speed and faster access to data

Easy cafe process

Better availability of day to day schedules

Easily available information

Reduced paperwork

It can’t store customer’s data long time

Page 7: Dairy Management System

Cyber Cafe

1.4 Technology & Literature View:

We are being familiar with .Net technology in this 6th -Sem. So, we thought

to make software that is relied on it. On the other hand, it gives us more idea in

our studies also. This technology is well known and widely used in the market.

Therefore, it would be helpful to us in future also.

We will have to keep pace with this technology in future. So, it is good for

us also. This technology can work with all the languages of software. So, we get

on well with this as well. This technology is widely used in market and not so

expensive at all. Its features are very effective for making software.

We have made an attempt to give our best in this project by using recent

technologies. As we knew the requirements of “Cyber Café Management”, we

made our mind to make project on this. We have tried to carry all needs of

particular system. In short, we can say that this project has used .Net technology

very frequently.

Page 8: Dairy Management System

Cyber Cafe

2. PROJECT MANAGEMENT

2.1 Project planning & scheduling

2.1.1 Project development Approach:

First, we just gathered the information needed to cyber cafe process. We

just decided to give an easy approach to the user and customer.

We have reached the brief description about requirements of cyber cafe

management. So, we made software that is useful to cyber café.

It makes an easy and simple way to the customer as well as user. We

have

Used easy technology to reach at our goal.

2.1.2 Project plan

Project Name Cyber cafe system

Project Objectives

To develop a system that facilitates maintenance &

monitoring of different processes followed by cyber cafe

system

Duration Two months

Guided by Ms. Madhu Shukla

Team size 2

Technology C#,.Net tech

AdvantagesEasy process of cyber cafe, fast find customer

information, efficient, Flexibility, less paperwork

Limitation It can’t store customer’s data long time

2.1.3. Schedule Representation

A project schedule provides a road map for us to achieve our milestones.

If it has been properly developed, the project schedule defines the tasks and

milestones that must be tracked and controlled as the project proceeds. Tracking

can be accomplished in number of different ways:

Page 9: Dairy Management System

Cyber Cafe

Conducting periodic project status meeting in which each team member

report progress and problems.

Evaluating the result of all reviews conducted throughout the software

engineering process.

Determining whether formal project milestones have been accomplished

by the scheduled rate.

Comparing actual start date for each project task listed in the resource

table.

Meeting informally with practitioners to be obtained their subjective

assessment of progress to date and problems on the horizon.

Using earned value analysis to assess progress quantitatively.

Control is employed by a software project manager to administer project recourse,

cope with problems, and direct project staff. If things are going well, control is light. But

when problems occur, the project manager must exercises control to reconcile them as

quickly as possible.

RESPONSIBILITIES DIPESH DIVYARAJ

Analysis

Analysis Review

Design

Design Review

Coding

Front-site Design

Design Review

Testing

Documentation

Page 10: Dairy Management System

Cyber Cafe

3. SYSTEM REQUIREMENT STUDY

System requirement specification contains the requirement for the system

and its functional operations.

3.1 User Characteristic:

User:

User can enter the data about customers.

User can proceed to provide space

User can edit / search the customer’s data.

User can get the information of time & payment

User can be free with migraine of paperwork.

User can store large no of data & retrieve easily.

3.2 Hardware and Software Requirements:

Hardware Requirement:

We have required the devices as we have mentioned below while making our airways reservation software.

Computer : Intel P4 Processor with 2.0 GHz

RAM – 256MB

HDD - 40GB

CD Drive – 150kbps

Software Requirement:

As we are learning .net technology, so we had decided to keep our pace with this technology. Therefore, we used which is familiar to us. We also used some other softwares to achieve our goal as below.

Page 11: Dairy Management System

Cyber Cafe

Windows XP with higher version Visual studio 2008

C# with .Net.Net technology

MS office for documentation

3.3 Constraints:

This topic includes hardware requirements for installing the various Visual

Studio editions, the Express editions available for Visual Studio programming

languages. The computer on which you install your Visual Studio edition should

meet minimum the following system requirements

Pentium IV Processor or above. 40GB hard-disk. 256 MB of RAM.

These constraints are needed while making project. It includes some

symbols and photographs as well from the particular program to add into

the project. It makes our software simply graceful.

Page 12: Dairy Management System

Cyber Cafe

4. SYSTEM ANALYSIS

4.1 Study Of Current System

In the current system no monthly report generation is specified by just clicking generate report.

1. If the user is unauthorized then he or she can break the password

because password is stored in the same application in which the

application is running so the security is poor.

2. The user will be in the confusion because of some difficult task.

The current system is manual writing system. If the space in cyber café is

not found then it will inform the user about that there is no space available. It will

display that “ Space is not available now”.

4.2 Feasibility

Objectives of System Feasibility Analysis

Identify the user’s need

Evaluate the system concept for feasibility

Perform economic and technical analysis

Allocate functions to H/W, S/W, people, database and other System

analysis

Establish cost and schedule constraints

Create system definition forming the foundation for all subsequent work.

Three specific tests were carried out on the system to test its feasibility namely,

Operational, Technical and Economical.

4.2.1 Technical Feasibility

This system is technically feasible because all required technologies are

available today in market. Visual studio 2008 is available in market now which

includes all requirements to complete this software. On the whole, this is very

interesting technology. This provides every tool to make this project. Even this

Page 13: Dairy Management System

Cyber Cafe

technology is concerned with many languages like C, C++, C#, Oracle and many.

The technical issues and their answers are as follows:

Is the proposed technology or solution practical?

Accuracy: The system here is accurate and it provides accurate and correct

result.

Reliability: The system is trustworthy and gives perfect return on investment.

Easy of access: Any technical and non technical user can use the system and

easily get response or get solution of their queries from the system.

Security: User has to enter valid password and id for accessing the system.

So, we can say that the proposed technology or solution is practical.

Do we currently have necessary technology?

Yes, this project needs .Net Technology. Here, we have used this

technology in making of this project.

Do we possess necessary expertise?

Yes, that is possible because this technology is frequently used in market

and we can possess them if needed.

4.2.2 Economical Feasibility

This project requires no more requirements rather than computer.

Because, it’s all about making software. Even the softwares it needs are very

easily available in market at very cheaper cost. So this is economically feasible at

all.

Cost – Benefits Analysis: -

Cost Analysis:

The initial cost of the System will include PCs & software.

The basic cost of the System will be the Software, which will be

required for the System. It also includes the purchasing of that

Software.

The operator by entering the id or name of the field can easily access

the information

Page 14: Dairy Management System

Cyber Cafe

The billing and searching of the system is quiet accurate and quick that

it will save the time consumption.

Benefit Analysis:

Tangible benefits: -

The system is directly saving cost as there is no requirement of direct

training to the users, no wastage of extra recourses like time, human power etc.

Intangible benefits:-

The system provides better services to the users. It also provides the

users with accurate, reliable and up-to-date information about the system.

4.2.3 Operational Feasibility

Any project proposed can be beneficial only if it satisfies the customer’s

requirements. If project is included with everything which is in old project in

addition with new features then this system is operationally feasible if all Users

are satisfied with system. The following points have been probed to declare the

proposed system as operationally feasible.

The newer system will accommodate all the requirements.

The new system can greatly help by reducing all paper work and availing all

needed information of the customer with just a click of the mouse button.

The newer system will fit to its existing system and perform more function

than manual system.

The user of the system will get the information at the time when they need it,

and also speed up the transaction processing.

The system will work when it is developed and installed and there are no

major barriers to its implementation. This accounts for the operational

feasibility of the proposed system.

4.2.4 Schedule feasibility:

Page 15: Dairy Management System

Cyber Cafe

The project was assigned on starting of the semester and we have enough

time of 2 month to complete our project. The project completion is 31-Mar-2009.

So the project is schedule feasible. Here, we have given milestones to achieve

the task.

Milestones and Deliverables

A milestone is a subproject that you should have completed at the given

point in time, if you want to keep on track then.

A deliverable is a documentation of a part of a project that you are

required to hand in. The given deadlines are firm.

Deliverables are usually milestones but milestones need not to be

deliverables.

SR

NO

ACTION START DATE END DATE

1 Analysis 27/01/2009 05/02/2009

2 Design 10/02/2008 25/02/2008

3 Development 03/03/2009 08/04/2009

4.3 Requirements Validation

Requirement validation is concerned with showing that the requirement

actually defines the system which customer wants. It has much common with

analysis as it is concerned with finding problems with the requirement. However

they are distinct processes since validation should be concerned with a complete

draft of the requirement document whereas analysis involves working it

incomplete Requirement.

Page 16: Dairy Management System

Cyber Cafe

During requirement validation process different types of check should be

carried out on the requirement in the requirement document. This check includes:

The Name of the Users should be character oriented.

The Password should contain only characters and numbers. It should not

include special character.

The format of the date should be DD-MON-YYYY

In the Find and Search models, we have to enter the Name of the Customer

or id of the customer in order to find the all information of customer.

4.4 Function of System

Our system for cyber café management system specifies how the

information held by the cyber café about, booking and availability is maintained.

Hence following functions are carried out:

1. Registration Of Surfing:

Description: This functionality is used to register the operator. It is

compulsory for the operator to fill the Register then only they get the information

related to the System.

Inputs: Username and Password

Source: Username and Password provided by operator, password from

database.

Output: Authentication to operator to access the ticket, passenger and bill related

information.

2. Search and Viewing:

Description: This functionality is used to find zip codes of various state,

city and country. It also includes a functionality, which is used to find zip codes of

state, city or country by just providing the address (that is name of state, city or

country).

Input: Take the various zip codes from the user.

Sources: Username and Password provided by user.

Page 17: Dairy Management System

Cyber Cafe

Outputs: The zip code from the given information of the user.

Input: Request the user for the any services.

Sources: Username and Password by user.

Outputs: The request services will be provided and desirable output will be

provided.

4.5 Data Modeling

4.5.1 Use-case Diagram:

Page 18: Dairy Management System

Cyber Cafe

4.5.2 CLASS DIAGRAM:

Page 19: Dairy Management System

Cyber Cafe

4.5.3 Activity Diagram:

Page 20: Dairy Management System

Cyber Cafe

LoginLogin

MenuMenu ReloginRelogin

Valid Invalid

Start

End

Availablespace space

Availablespace space

Payment Payment

entry entryCustomer

Information

Customer Information

Page 21: Dairy Management System

Cyber Cafe

4.5.4 DATA DICTIONARY:

Login:

Sr.NoField Name

Data Types

Description

1. Admin_id Text Describes the administrator’s identification

2. Password Varchar(50) Describes the administrator’spassword

Table name: cust_info

Table name :- bill_info

Sr.NoField Name

Data Types

1. id Int

2. name varchar(50)

3. addresh varchar(50)

4 age int

5 gender int

6 Ph_no varchar(MAX)

7 In_date_time bit

8 Pc_no float

Page 22: Dairy Management System

Cyber Cafe

4.6.1 context diagram

Sr.NoField Name

Data Types

1. id Int

2. name varchar(50)

3. Pc_np varchar(50)

4 In_date_time int

5 Out_date_time int

6 Total_duration varchar(MAX)

7 Total_amount bit

Page 23: Dairy Management System

Cyber Cafe

Cyber Cafe Management

Surfinginformation

TimeInformation

customer Details

Receptionist

Customer Information

PaymentInformation

Manager

Customer

Payment

Time Details

Customer Information

Surfing Information

time Information

Page 24: Dairy Management System

Cyber Cafe

4.6.2 Data Flow Diagram

4.6.3 Process Specification & Decision Table

Login Process

Process for Cyber Cafe system

Process for login system

User

ManagerCustomer

Password

Surfing info

Time info

Customer data

UserInquiry about

customer Customer

info.

Info. about availability of space

Payment

Conformation

Page 25: Dairy Management System

Cyber Cafe

IF user enters username & password

THEN enter into the system.

ELSE

Invalid user.

END IF.

Process For Surfing

WHILE customer make request

IF space is available

THEN provide pc to customer

ELSE Not available

ENDIF

ENDWHILE

Process For Payment:

WHILE customer log off pc

IF customer doing payment

THEN receive & confirmation

ELSE Not receive & not confirmation

ENDIF

ENDWHILE

Page 26: Dairy Management System

Cyber Cafe

4.7 Selection Of Hardware & Software

Hardware Technology Used:

To run the application software of the system in the computer the

minimum configuration required is as below:

768 MHz Pentium processor or other compatible.

Intel Chipset Motherboard.

256 MB-RAM.

10 GB Hard-Disk.

52X Compact Disc drive or faster.

Monitor. [640 * 600 Display]

Software Technology Used:

.Net Platform

Page 27: Dairy Management System

Cyber Cafe

5. SYSTEM DESIGN5.1 Database Design / Data Structure Design 5.1.1. Table and Relationship

Table name: cust_info

Table name :- bill_info

Sr.NoField Name

Data Types

1. id Int

2. name varchar(50)

3. addresh varchar(50)

4 age int

5 gender int

6 Ph_no varchar(MAX)

7 In_date_time bit

8 Pc_no float

Page 28: Dairy Management System

Cyber Cafe

Sr.NoField Name

Data Types

1. id Int

2. name varchar(50)

3. Pc_np varchar(50)

4 In_date_time int

5 Out_date_time int

6 Total_duration varchar(MAX)

7 Total_amount bit

Page 29: Dairy Management System

Cyber Cafe

6. IMPLEMENTATION PLANNING AND DETAILS 6.1. Implementation Environment

Single vs. MultiuserAs the cyber cafe management system is going to be

developed id desktop application,at the time of the implementation it should be kept in mind that system will be used con currently.So the development approach would remain for the concurrent use.

GUI vs. Non GUI The system is completely GUI. This is because today customer feels comfortable while working with images or pictures.The user should feel convient while wporking with the system

6.2Program/Module specification

Single Layer This module of the project deals with the categorized the different themes of the map like point,line and polygon into their respective types after distinguishing them differently from the database. It displays the map single layer that can be of any feature like point, line or polygon theme.Displaying map of single layer explorers the entire details of the selected layer.

Multi LayerSeconly, comes the module for the multilayer.Here the

individual themes that were selected in the above module are overlaid on the other type of the theme.Doing this makes the decision making process eaiser about which place is related to other like if there is no way near very good polygon feature then it would show that would be profitable to dig well at that place.

Query BuilderIn the above two modules we were just retrieving the data from database which already store after converting from SHP to SQL format in the form of map .Now we need to query that map.So as per the type of query fired we could be able to get the result using query builder.Thus ,in order to get the detail and display of the desired location we make use of query builder.

6.3 Security Features

The editing of database and the result is all protected by the password, which only administers can access. (In this case it’s us.)

The admin side is password protected.Only authorized user can accessthe admin side.

Page 30: Dairy Management System

Cyber Cafe

6.4Coding Standard We have followed the coding standards throughout this application

Each table name is given in such a manner that it indicates its use

Each script is properly documented by comments to carify its presence.

Variables names are related to the process and the behavior of the entity.

We have used tab instead of space in our project. Keywords are never used as variable name in our project

6.5 Sample Coding

using System;using System.Collections.Generic;using System.ComponentModel;using System.Data;using System.Drawing;using System.Linq;using System.Text;using System.Windows.Forms;using System.Data.SqlClient;

namespace WindowsFormsApplication1{ public partial class Form4 : Form { SqlConnection cn; SqlCommand cmd; SqlDataAdapter da; DataSet ds = new DataSet(); public Form4() { InitializeComponent(); }

private void label7_Click_1(object sender, EventArgs e) {

textBox5.Text = DateTime.Now.ToString(); }

private void button1_Click(object sender, EventArgs e) { cmd = new SqlCommand("insert into cust_info values(@a,@b,@c,@d,@e,@f,@g,@h)", cn); cmd.Parameters.AddWithValue("@a", Convert.ToString(textBox1.Text)); cmd.Parameters.AddWithValue("@b",textBox2.Text); cmd.Parameters.AddWithValue("@c", textBox3.Text); cmd.Parameters.AddWithValue("@d", textBox4.Text); if (radioButton1.Checked == true)

Page 31: Dairy Management System

Cyber Cafe

{ cmd.Parameters.AddWithValue("@e",Convert.ToString(radioButton1.Text = "male") ); } else if (radioButton2.Checked == true) { cmd.Parameters.AddWithValue("@e",Convert.ToString(radioButton2.Text = "female")); } cmd.Parameters.AddWithValue("@f", maskedTextBox1.Text); if (maskedTextBox1.MaskFull) { MessageBox.Show("full space"); maskedTextBox1.Text = ""; maskedTextBox1.Focus(); return; } cmd.Parameters.AddWithValue("@g", textBox5.Text); cmd.Parameters.AddWithValue("@h", textBox6.Text);

cn.Open(); cmd.ExecuteNonQuery(); cn.Close(); MessageBox.Show("done"); ds.Clear(); reload(); Form5 f5 = new Form5(); f5.Show(); this.Hide(); }

private void Form4_Load(object sender, EventArgs e) { cn = new SqlConnection(@"Data Source=.\SQLEXPRESS;AttachDbFilename=C:\Documents and Settings\dipesh sompura\My Documents\Visual Studio 2008\Projects\WindowsFormsApplication1\WindowsFormsApplication1\Database1.mdf;Integrated Security=True;User Instance=True"); reload(); } public void reload() { da = new SqlDataAdapter("select * from cust_info", cn); da.Fill(ds); }

private string remove(int p) { throw new NotImplementedException(); }

private void button2_Click(object sender, EventArgs e) { Form3 v = new Form3(); v.Show(); this.Hide(); }

private void button3_Click(object sender, EventArgs e) {

Page 32: Dairy Management System

Cyber Cafe

cmd = new SqlCommand("update cust_info set id ='" + textBox1.Text + "',address='" + textBox3.Text + "',Age='" + textBox4.Text + "',gender='" + radioButton1.Text + "',ph_no = '" + maskedTextBox1.Text + "',date_time = '" + textBox5.Text + "',pc_no = '" + textBox6.Text + "'where name ='" + textBox2.Text + "'", cn); cn.Open(); cmd.ExecuteNonQuery(); MessageBox.Show("Data Updated"); textBox1.Text = ""; textBox2.Text = ""; textBox3.Text = ""; textBox4.Text = ""; if (radioButton1.Checked == true) { radioButton1.Text = "male"; } else if (radioButton2.Checked == true) { radioButton2.Text = "female"; } maskedTextBox1.Text = ""; textBox5.Text = ""; textBox6.Text = ""; cn.Close(); Form5 b = new Form5(); b.Show(); this.Hide(); }

private void button4_Click(object sender, EventArgs e) { cmd = new SqlCommand("delete from cust_info where name='" + textBox2.Text + "'", cn); cn.Open(); cmd.ExecuteNonQuery(); MessageBox.Show("Data deleted"); textBox1.Text = ""; cn.Close(); Form5 a = new Form5(); a.Show(); this.Hide(); }

private void button5_Click(object sender, EventArgs e) { MDIParent1 W = new MDIParent1(); W.Show(); this.Hide(); }

private void button6_Click(object sender, EventArgs e) { Form5 h = new Form5(); h.Show(); this.Hide(); } }}

Page 33: Dairy Management System

Cyber Cafe

7. TESTING The aim of testing process is to identify all defects existing in software product. Testing a program consists of subjecting the program to as test inputs and observing if the program behaves expectedly or not. If the program fails by any means or gives unexpected results than the failure occurred are noted for later debugging and corrections.

7.1 Testing Plan The testing process is a process that to a greater extends runs in parallel with other processes. As the same thing applied for the whole system for testing and once the entire module works perfectly as desired, at later stages test suite are made to test in integrated environment to check for proper functioning. So the software is tested at various levels by various testing techniques. A well rounded test plan notes any risk factors that jeopardize and includes a testing schedule. So we can say that Test planning details the activities, dependencies and effort required to conducting the system test.

7.2 Testing Strategy The test strategy is a formal description of how a software product will be tested. A test strategy is developed for all levels of testing as and when required. The testing team analysis the requirements, writes the test strategy and reviews the plan with the project team. The test plan may include test cases, conditions and the test environment, a list of related tasks, pass/fail criteria and risk assessment. As we were working in a team it was a bit difficult to check the work done as no individual was assigned for that particular task or work. Moreover checking the work done was very important to reduce risk factor. Right from the starting we planned to adopt one technique called Assessment by rotation. Thus the work done by one member was assessed by the other for some time and again revolved for other level check reduced the errors.

7.3 Testing Methods Testing methods are mainly divided into two parts:

1) Black Box Testing2) While Box Testing

1) Black box testing: It is the testing without the knowledge of the internal working of the item being tested. For this testing test groups are often used. Due to the nature of this testing the test planning can begin as soon as the specifications are written. This testing has some advantages like it is more effective on larger units of code than glass box testing, tester needs no knowledge of implementation, including specific programming languages, tester and programmer are independent of each other, tests are done from a user’s point of view, will help to expose any ambiguities or inconsistencies in the specifications, test cases can be designed as soon as the specifications are complete.

Page 34: Dairy Management System

Cyber Cafe

2) White box testing: It is the testing strategy that deals with the

internal logic and structure of the code. White box texting is also called as the glass testing, structural testing, open testing or the clear box testing. The advantages of the white box testing are that as the knowledge of internal coding structure is needed, it becomes easy to find out which type of input data can help min testing the application effectively. It helps in optimizing the code helping in removing the extra code which may cause hidden defects in the system.

The other sub testing techniques are as follows: Unit Testing

Unit testing focuses on verification effort on the smallest unit of the project that is the module. Unit testing exercises specific paths in a module’s control structure to ensure complete coverage and maximum error detection. This test focuses on each module individually, ensuring that it functions properly as a unit. Hence, the naming is Unit testing.

Integration TestingIntegration testing addresses the issues associated with the dual problems of verification and program construction. After the software has been integrated a set of high order tests are conducted. The main objective in this testing process is to take unit tested modules and builds a program structure that has been dictated by design.

Task TestingTask testing helps the system to test whether all the tasks are carried out properly or not. It also solves logical errors. By carrying this test we were assured that all processes in our project are appropriate.

Behavioral TestingThis testing is used to check the behavior of the system. This test helped us to develop the test case for the particular system. This testing thus helps to test the different events associated with the system.

Inter Task TestingThere are several processes or tasks which are carried simultaneously. Moreover this testing also helps to test the errors associated with the data storage activities. This testing helped our project to solve the error while data designing which is very much important for a successful project.

Final TestingAfter the integration of all the modules we deploy whole application. One of the member of the development team will do

Page 35: Dairy Management System

Cyber Cafe

the testing of the whole project and create the excel sheet of the bugs. After the completion of the solving of these errors the project would be ready to use.

Alpha TestingAlpha testing is done by the person not involved in the project. In our case it would be done by out concerned faculty members itself.

7.4 Test CasesIn software engineering the most common definition of a test case is set of conditions or variables under which a tester will determine if a requirement or use case upon an application is partially or fully satisfied. In the situation each sub requirement must have at least one test case. A good test should neither be too simple nor too complex.

Page 36: Dairy Management System

Cyber Cafe

8. SCREEN SHOTS AND USER MANUAL

LOGIN FORM: This form is used by administrator to login and accessMenu form :(mdi form)

Page 37: Dairy Management System

Cyber Cafe

Available space

Customer entry

Page 38: Dairy Management System

Cyber Cafe

Customer & system detail

Customer bill paid

Page 39: Dairy Management System

Cyber Cafe

Page 40: Dairy Management System

Cyber Cafe

9. LIMITATION AND FUTURE ENHANCEMENT

IQ test is developed to serve the very basic purpose to check the user’s IQ level.

The limitation of the project can be considered it to be a windows application and so no online test can be conducted.

The project being developed in Oracle and Microsoft Visual Studio .Net which are extensively used tools today so can be easily converted to other system structure according to the requirement in near future.

Page 41: Dairy Management System

Cyber Cafe

10. CONCLUSION

The project ‘CYBER CAFE helps the user to keep record. Moreover the system also provided with the option to begin with any subject of choice. This project deals management of cyber café The project aids an additional feature like bill generation, number of user display, data of each user, efficient management .