Download as doc, pdf, or txt
Download as doc, pdf, or txt
You are on page 1of 37

INTRODUCTION

A hotal management system is required for the library function. It contains the database
of the student profile and the books and the member profile. It is beneficial for the
helping the librarians to work on the system. With the introduction of the system it gives
the new data creation for the maintaining the records of the book s, which is available in
the library and helps it to take all the information such as date of issuing of book date of
returning the book and fine collected. it also helps in the student profile which keep the
record of the student I’d. Student name student father name, student father’s name, and
his address. The library management system is also beneficial because of following
causes:-
1. it reduces the work of paper
2. This system is faster and easy to handle
3. The data become more secure
4. it gives the platform to both the reader as well as librarian
5. through this one library may connected to the other library of the world through
internet
6. it also started a new library system of using the den-let

As far as the new system concerned it gives the total information about the library abut
user about books too.
H/W and S/W REQUIREMENT

SOFTWRE REQUIREMENT

1. Microsoft xp2
2. Ms Access
3. Visual basic

MICROSOFT XP2 provides the operating system to the library managing system
It provide the platform to the ms office and security through password and antivirus
It is the advance version of the operating system which provide the platform and
marinating its quality it also used in the information system
This is the main frame to the update technology it provide the best features which is
given below:-
 this is the best operating today in the world
 it operates in the any system of update technology
 it have faster speed processing
 with clear visibility
 it is easily available in the market

MS ACESS is helpful in the creativity of the database. A database provides the all the
information to the related topics with helps of the TABLE and Query which is through
SQL (structural query language). Ms Access is useful because of following causes:-
 MS Access provides data base to the library management system.
 Ms access also provides the query
 It is easy to handle
 It have enough security i.e. needed to develop the library management
 It is easily available and easy to purchase
 It is best up to 300000 lines ,which is enough for the library system

VISUAL BASIC provides the view side of the library management system. visual basic
is the front view of the library management. The main causes of the using the visual basic
are as following:-
 V.B. provide the front view
 It easy to purchase
 It is easy to operate
 It is the best way to deal

HARDWARE REQUIREMENT

Hardware required for the library management system is as following:-


 Display adopter
 Key board
 512 ddr2 ram
 Centurion duo processor
 945 gl chipset
 80 GB hard disk
 56 kbps modem
ADVANTAGE OF DATABAS TECHNICAL
MANUAL

1. PROJECT OBJECTIVE:
To develop a project which maintain booking of rooms and
handle account of a
hotel

2. PROJECT FEATURES:

2.1 HOTEL’S ROOM INFORMATION:


It provide User to easily search about room’s
availability , its type, category & easy updating of
the room’s records.

2.2 BILLING FACILITY


Operator, using this project can easily generate the
bill for the customer,
He need not make any calculation for it

2.3 REPORT GENERATION


This feature help in easy maintenance of record of
customer & their
report Generation

2.4 PASSWORD PROTECTED


This feature provide privacy to customer’s
personal detail information
2.5 DIFFERENT LOGIN LEVELS
This feature provide protected login at different
levels.

2.5.1 ADMINISTRATOR:
Administrator can add and delete rooms.
2.5.2 USER
User can do everything except adding &
deleting the rooms records.

3.EXTENSIBLITY

3.1 CUSTOMER’S INFORMATION:


Operator has information of customer for
providing rebate
or Discount for their regular customer ,if
they provide any
such scheme in future.

3.2 NEW BRANCHES


This feature provides confirm advance
booking of room in
another branch of that hotel .

3.3 NEW USER


This feature allows for the addition of a new
user.

4. FORMS AND MODULE DESCRIPTION

4.1 LOGIN FORM


This form is used to verify the authenticity of the
user or administrator by checking the Password.
This form consists of following modules:

• Welcome_click()
This module is used to verify password
for adminstrator or user.

This form calls the form admin_win form


or user_win form.

• Exit_click()
This module is used to exit from this
form

• Text1_change()
This module is used to type password .

4.2 USER_WIN FORM


As the user login into the project the this form.
This form contains all menus by which user c
can switch over to any of the desired form.

This form contains following modules:

• rb_click()

This module invoke room booking form.


• update_click()
This module load update form.

• cancle_click()
This module load cancellation form.
• bills_click()
This module is used to display billing form.

• avail_click()
This module is used to display availability
Form.
• All_click()
This module is used to display information
about all guests.

4.3 ROOM BOOKING


This form is used to check which types of
rooms a guest want & whether they are
available or not.

This form contains following modules:

• Calendar1_Click()
This module is used to get the date from
Calendar.

• Combo1_click()
This module is to used to select room type pr
perty .

• Combo2_click()
This module is used to select room catogery
Property.

• Combo3_click()
This module is used to list the available ro_
oms.

4.4 GUEST ENTRY FORM


When a room no is assigned to guest a entry
Form is filled by the guest

This form contain following modules:

• cmdAmount_Click()
This module display the amount of room
acoording to room type and room category.

• submit_Click()

This module inform the user that room is bo_


oked and store the information in information
table.

• exit_Click()
This module is used to unload he form.

4.5 CANCELLATION
This form is used to cancel the guest entry form
Information table.
This form consists of following modules:

• cmdGetDate_Click()
This module is used to get all information
about which we want to delete from the
table.

• CmdCancel_Click()
It cancle the guest informstiom from table.

• Command2_Click()
This module is used to unload the form

4.6 BILL FORM


This form is used to calculate actual bill of guest .
This form consista of following modules:

• Command1_Click()
This module give actual bill of guest.

• Command2_Click()
This module is used to unload the form
4.7ADD FORM
This form is used to add room to the room table.

This form consista of following modules

• Combo2_Change()
This module is to used to select room type pr
perty .

• Combo1_Click()
This module is used to select room catogery
Property.

• Command1_Click()
It add new rooms imformation in room
Table.

• Command2_Click()
This module is used to unload the form
4.8 DELETE FORM
This form used is used to delete room from room
table

This form consists of following modules

• Command1_Click()
It invokes CONFIRM form .

• Command2_Click()
This module is used to unload the form.

4.9 AVAILABILITY
This form gives information about all available
rooms and their cost.
FLOW CHARTS

1. LOGIN FORM

START

USERNAME=ADMINISTRATOR
USERNAME=USER
PASSWORD=” “

IF
USERNAME=ADMI USERNAME
NISTRATOR =USER

ENTER THE
PASSWORD

IF
no DISPLAY
CORRECT “INCORRECT
PASSWORD”

yes

CLICK
WELCOME
BUTTON

LOAD MDI
FORM
2.TICKET BOOKING FORM

START

Enter room
no,room type
,room category

Cick on fill the form button

Load GUEST
ENTRY form
3. GUEST ENTRY FORM

START

ENTER DATE,
ROOM TYPE,
ROOM CATEGORY,
ROOM NO

CLICK
FILL FORM

Room booking form


Is loaded

Enter the customer


information

Click amount button

Click submit button

If any entry Display


“room is
is empty booked”

Display
“ please fill
the entry”
no

yes

4.ADD FORM
Start

Enter the entries


room for the
new room

If Enter
room no another
room no.

yes
This record set
is stored in
database
5.DELETE FORM

START

Enter room
no,room
type,room
category

Click on delete button


Display”are u
sure u want to
delete this room

If YES
Or No Click on
NO No button

yes

Click on No
Button

6. CANCELLATION FORM

start

Enter the room


no to be deleted
Click get
information
button

Click cancel
button

Are u
no
exit
sure

yes

Click yes
button

7.BILL FORM

start
Enter the
customer name

Click the
bill button

Get
amount
to pay
TEST- CONDITIONS

Sr. Test Condition Pre-requisite Expected Test


No. data Result

1. Check for entry Login form is “Incorrect


in password opened. User Password”
enters incorrect Message is
password and prompted
presses OK
button
3. Check for entry Login form is Main form is
in username and open. User enters displayed to the
password combination of user, consisting
correct user name of menu options
and password and enabled.
presses OK
button
4. Check for guest All entries are Message “ room
entries in room filled is booked”.
booking
5. Invalid Data Type User has entered Warning to enter
the invalid data correct data type.
type.
6. Check for guest User has left the Message “ fill all
entries in room entries to be the entries.
booking fulfilled, blank
7. Check entries for User fill entry for Message “ room
adding new room already existing is already
room existing”.
8. Check entries for User update Message “ room
updating of room entries for the is not booked”.
empty room.
9. Check entries for User delete the Message “room
cancellation of entries for the is not booked”.
room empty room

LIMITATIONS

1. This project can’t be used for hotel having different branches.

2. This project doesn’t assigns unique id to each customer to


distinguish between him or her. Selecting the id from some given
list. However, both the methods of specifying the product are too
vague.

ERROR HANDLING

Error Message Error Correction


no
1 Fill entry Cannot enter Enter numbers ,
properly alphabets and - hyphen,
some special ( opening
symbols in this bracket or
field ) closing
bracket
2 Fill entry Cannot enter Enter only
properly numbers and alphabets
special symbols
in this field
3 Entry already Duplicate value Enter other unique
existing entered. Cannot Room no.
enter already
existing values in
room add form.
4 Enter LOGIN Enter LOGIN Enter same value in
and and PASSWORD LOGIN and
PASSWORD field do not PASSWORD fields
match.

CONFIGURATION

Provides authentication and access control through:

1. Login and password:


This facility ask the user to enter correct login name
and password
for accessing the system. Thus preventing the system
from
unauthorized users.

3. Change button property:


This provides the user the facility for changing the
enable/disable property
the MAIN MENU buttons. It preserves the authenticity
by allowing only those users to change button property
who know the password.
E

There is a several advantage of storing data in the database.

All the data store at one location when a database is used , all tables store in a single file
thus, and we need not deal with separate first button use the single database file. Though
all the data is stored in a single file, distinction one main faired because of the use of the
tables. Each table is stored as a separate entity in the file.

1. It is possible to define relationship between tables as will be seen once defined


these relationship tables are stored in the database.

2. It is possible to define validation at the field as well table level this ensures
accuracy of data being stored.

3. We also use query, report, sorting etc.


ADVANTAGE OF VISUAL PROGRAMMING

Visual programming enables visual development of graphical user interface, and easy to
use and easy to learn.

One of the principle advantages is that the programmer need not write code to display the
required component.

The visual programming environment displays a list of available component, the


programmer pickup the required component from the list.

The component can be moved resized and even deleted if so required.

There is no restriction in the number of controls that can be placed moreover since the
programmer is creating the user interface usually we align, move or size the component
as required without having resort to writing code.
DISADVANTAGES OF OLD SYSTEM

As we know the manual processing is quite tedious, time consuming, less accurate in
comparison to computerized processing.

Obviously the present system is not exception consultant in counting the entire above
problem.

1. Time consuming
2. It is very tedious.
3. All information are not placed separately.
4. Lot of paper work.
5. Slow data processing
6. Not user-friendly environment
7. It is difficult to found record due file management system.
ENTITY RELATIONSHIP DIAGRAM

The collection of tables of data is called a data base. Entity relationship model
isused here to obtain a conceptual model of data used in this case study .
In E-R Diagram following symbols are used:

Entity
Data Flow Diagrams (DFD)
A DFD, also known as a "bubble chart", serves the purpose of
clarifying system requirements and identifying major transformations that will
become programs in system design. So it is the starting point of the design
phase that functionally decomposes the requirement specifications down to
Relationshi
the lowest level of detail. A DFD consists of a series of bubbles joined by
lines. The bubbles represent data transformations and lines represent data
p
flows in the system. A basic DFD format is shown in Figure 16. The DFD is a
representation of various processes and the input and output in each process.
Further it also represents the various data stores.

Attributes

Data Flow 1 Data Flow 4


Source Destination
Process

Data Flow 5
Data Flow 2

Data Flow 3
Data Store
Process 2
FIGURE :- SAMPLE DFD

Graphical description of a system’s data and how the processes


transform the data is known as Data Flow Diagram (DFD).

Symbols Used in DFDs


 A square defines a source or a destination of system data. (External
entity).
 An arrow identifies data flow – data in motion. It is a pipeline through
which information flows.
 A circle or a bubble (some people use an oval bubble) represents
process that transforms incoming data flow(s) into outgoing data
flow(s).
 An open rectangle is a data store – data at rest – or a temporary
repository of data.

1. Data flow 2. Process

3. Source or Destination 4. Data Store


Processing
System Requirement and
Specification Analysis
The very first step in a system, for the purpose of selection is
understanding the requirements within the framework of the organization’s
objectives and the environment in which that system is being installed.
Consideration is given to the user’s resources as well as to finances.
It is a document that serves as a foundation for hardware, software and
database engineering. It describes the functions of a system and the
constraints that will govern its development. The specifications bound each
allocated system analyst with an indication of the role of software within the
context of the computer based system as a whole and the various
subsystems described in the data flow diagrams.
The system specification also describes the information that is to input and to
output from the system.

Fact-Finding
Fact-finding means, learning as much as possible about the present system.
Fact-finding is the formal process of using research, interviews,
questionnaires, sampling and other techniques to collect information about
systems, requirements and preferences. It is also called information gathering
or data collections. Tools, such as data and process models, document facts,
and conclusions are drawn from facts. If you can’t collect the facts, you can’t
use the tools. Fact-finding skills must be learned and practiced.

How to do Fact-Finding?
For fact-finding, the system analyst does the following:
1. Sampling of written (existing) documents
2. On-site observations
3. Interview
4. Questionnaires
5. Research and site visits.
6. Observes the current system
7. Gather forms and documents currently in use
8. Determines the flow of data through the system, and
9. Clearly defines the system requirements.
Review
literature,
procedures and
forms

Onsite
observation

Information Data
Interviews
gathering tools organization

Questionnaires

FIGURE :- INFORMATION GATHERING METHODS

You might also like