Professional Documents
Culture Documents
Bookshop Management System
Bookshop Management System
Bookshop Management System
ON
PROJECT ENTITLED
“BOOKSHOP MANAGEMENT SYSTEM”
SUBMITTED BY-
ASHISHBAROI
Roll No- 45/10
BCA 6th Semester
Department of Computer Science
Cotton College
INTERNAL GUIDE
Thisis to certifythat ASHISH BAROI, B.C.A 6th semester, Roll No. 45/10, a
student of Computer Science Department, Cotton College is working in this project
under my guidance since February 2013, on the project entitled “BOOKSHOP
MANAGEMENT SYSTEM”. He has prepared this progress report on the project work
carried out by him, for partial fulfillment of the requirements of B.C.A degree.
LECTURER
COTTON COLLEGE
CERTIFICATE
This is to certify that the project work entitled “BOOKSHOP MANAGEMENT SYSTEM” is a bonafide
work carried out by ASHISH BAROI student of BCA,Computer science 6th semester of Cotton
College,Gauhati affiliated to GauhatiUniversity.He has done the project under my supervision and
guidance to the best of my knowledge.
This project has been prepared as a fulfilment of the degree of Bachelor of Computer application-
computer science(BCA) to be awarded by GauhatiUniversity.This work has not been submitted
earlier for any other academic activity.
During the period of his work,he have been found sincere and hard working.
Lecturer
Cotton College
CERTIFICATE
This is to certify that the project work entitled “BOOKSHOP MANAGEMENT SYSTEM” is a bonafide
work carried out by ASHISH BAROI students of BCA Computer science 6thSemester,of Cotton
College, Gauhati affiliated to gauhatiuniversity.He has done the project under my supervision and
guidance to the best of my knowledge.
This project work has been prepared as a fullifillment of the degree of Bachelors of
computer application-Computer science(BCA) to be awarded by GauhatiUniversity.This work has
not been submitted earlier for any other academic activity.
During the period of his work,he has been found sincere and hard working.
Head of Department
Cotton college
Acknowledgement
A great deal of time and effort has gone into the completion of this project. Several special
people have contributed significantly to this effort. We, the undersigned, take this opportunity to
thank them.
First of all, I would like to express our heartiest gratitude to our project Guide
Mrs.SangitaBaruah, Head of the Department of Computer Science, Cotton College, for his
constant support, suggestions and encouragement during the project work.
Session -
CONTENTS IN DETAILS
CHAPTER 1. INTRODUCTION
1.1 INTRODUCTION
1.2 ABOUT JAVA
1.3 ABOUT SQL SERVER 7.0
1.4 STRUCTURED QUERY LANGUAGE (SQL)
1.5 ABOUT OPERATING SYSTEM
7.1 INTRODUCTION
7.1.1 LOGICAL DESIGN
7.1.2 PHYSICAL DESIGN
7.2 INPUT DESIGN
7.3 OUTPUT DESIGN
7.4 NORMALISTION
7.5 DATABASE DESIGN
CHAPTER 13 . CODING
INTRODUCTION
1.1 INTRODUCTION
Innovation in technology is the buzzword today. Computer the wonder machine has fulfilled
more than its share of expectations. We are currently in the midst of a technological revolution in
which outdated system has made way for outstanding ones. One of the major applications of
computer technology has been information processing activity. Computer has been an essential part
of the organizational info processing because the power of the technology and volume of data it
can process.
1.2 JAVA:
● Stand-alone application.
●Web applets.
Stand alone application are programs witten in Java to carry out certain tasks on a stand-alone local
computer.Infact,Java can be used to develop programs for all kinds of application,which were
developed earlier,using languages like C and C++.As pointed out earlier,Hot Java itself is a Java
application program.Executing a stand-alone Java program involves two steps.
Applets are small Java programs developed for Internet applications.An applet located on a
distant computer(Server) can be downloaded via Internet and executed on a local computer (Client)
using a java-capable browser.We can develop applets for doing everything from simple animated
graphics to complex games and utilities.
1.3 MySQL:
MySQL is a open source Relational Database Management System. MySQL is very fast
reliable and flexible Database Management System. It provides a very high performance and it is
multi threaded and multi user Relational Database management system.
MySQL is one of the most popular relational database Management System on the web. The
MySQL Database has become the world's most popular open source Database, because it is free
and available on almost all the platforms. The MySQL can run on Unix , window, and Mac OS.
MySQL is used for the internet applications as it provides good speed and is very secure. MySQL
was developed to manage large volumes of data at very high speed to overcome the problems of
existing solutions. MySQL can be used for verity of applications but it is mostly used for the web
applications on the internet.
MySQL Features:
1. MySQL are very fast and much reliable for any type of application.
2. MySQL is very Lightweight application.
3. MySQL command line tool is very powerful and can be used to run SQL queries against
database.
4. MySQL Supports indexing and binary objects.
5. It is allow changes to structure of table while server is running.
6. MySQL has a wide user base.
7. It is a very fast thread-based memory allocation system.
8. MySQL Written in C and C++ language.
9. MySQL code is tested with different compilers.
10.MySQL is available as a separate program for use in a client/server network environment.
11.The MySQL available for the most Unix operating platform.
12.MySQL are the available for window operating system window NT, window 95 ,and
window 98.
13.MySQL available for OS/2.
14.Programming libraries for C, Python, PHP, Java , Delphi etc. are available to connect to
MySQL database.
MySQL Advantages:
MySQL is very reliable and high performance relational database management system. It
can used to store many GB's of data into database.
Availability of Source
MySQL source code is available that's why now you can recompile the source code.
Cross-Platform support
MySQL supports more than twenty different platform including the major Linux
distribution .Mac OS X ,Unix and Microsoft windows.
MySQL is very popular and it is world most popular open source Database. So it is easy to
find high quality staff around the world.
The MySQL has most capabilities to handle most corporate database application and used to
very easy and fast
1. Interactive SQL: It is used to operate directly on a database to produce output for desired
purpose. In this form of SQL, a command is entered and executed. The output can be seen
immediately.
2. Embedded SQL: It consists of SQL commands put inside the programs which are written in
other high level language such as C, C++, and COBOL etc. This method makes query system
more powerful and efficient. The output of SQL commands in embedded SQL is passed off to
variables or parameters which are used by the program in which SQL commands are embedded.
TYPES OF SQL COMMANDS: SQL commands can be classified into the following
three types.
Data manipulation language (DML) is that part of SQL which consists of a set of
commands that determine which values are present in the tables at any given time. DML is
divided into three categories.
a) Retrieving Data : It means getting information out of a table. A selection of data items
stored in a table is presented on the screen. The command for retrieving data items is SELECT.
b) Manipulating Data :It refers to the DML features that allow us to perform statistical
functions on data, namely averaging and summing columns and other arithmetic functions like
multiplying values in two or more columns of a table.
c) Updating Data :It refers to inserting and deleting rows in tables and changing values in the
columns i.e. it performs the maintenance of a database.
For manipulation and updation, the commands used are Update, Insert and Delete.
DCL allows definition of a security mechanism or scheme for protecting data from
unauthorized access. DCL consists of features that determine whether a user is permitted to
perform a particular action. It contains commands like Grant, Revoke etc. These are also known
as Transaction Control Commands.
The operating system used is Windows XP. It is a very popular and widely used operating
system developed by Microsoft Corporation. Its popularity is due to the fact that it has a user
friendly environment compatible with the latest software and hardware in the market.
CHAPTER 2
PROJECT OUTLINE
INTRODUCTION:
A Bookshop management system basically a system to record incoming and outgoing material in a
book shop. It also maintain the outgoing and incoming finance record from the bookshop account
book. It also release the paper works and process every efficiently without much mistake. It will
provide faster and reliable service to the customers.
Its main object is to provide fast and error free service to the customers. It can be use in a
bookshop to maintain database and maintain details transaction with the customer .This project is
used for handling customer need will provide an user friendly interface to process the needs. It
much be outgoing process to know requirement of the customers during whole process of system
development cycle.
Database
Quantity of products.
Customer billing
Product list
Rate list.
OBJECTIVES:
2). To handle a new entry books record, price list structure, extra -activity,
carriage charge, stock, billingetc, the management system properly manage by
using a computerized data keeping system.
3). BookShop Management System Supports the new book entry, pricelist, bill process etc.
4). Database maintained by this system usually contains the book’s personal records,
publisher and price related information. It focuses on storing and processing (insertion, updation)
by using user friendly GUI interface.
5). Generates books information in formatted design, generates the price
invoice.
6). Generate Book Detail Report.
7). Generate Book price list Detail Report.
8). Generate Sale Amount Deposition Status Report.
9). Generate Sale Purchase balance sheet.
Besides the key benefits of designing such a system over any existing manual
system are illustrated below:
Tools:
MANAGEMENT SYSTEM”
In this section an overview of the project has been presented. The section starts with a brief
description of the project undertaken. Thereafter a brief note on the traditional system along with
its limitations has been highlighted. Finally the section portrays the proposed system along its
possible advantages and limitations.
• File searching is a time consuming and tedious process. There is possibility of giving wrong
information in time of hurry can result in giving wrong information to the concerned authority.
• In the transaction, there is always chance of losing file, which result in loss of information.
• It is not possible to get all the information sitting in one place. This is because the
management maintains a collection of files for individual transaction which is normally kept in
their respective premises.
After studying the existing system conclusion can be drawn that it is highly beneficial to
have a computerized system that ensures accurate information at right time with less manual
effort.
The proposed system is“Book Publication management system”. The main objective of the
proposed system is to computerize the book publication management system. The proposed
system that they are requesting and which I have develop is a computerized management
system which is intended to keep the information of all books and writers present in the
system so as to fulfill the requirement of all customers. In a publication house a writers
comes for publish his/her book and customers also comes to buy a book written by specific
writer. The system that I have designed keeps all information about books, writers. In this
way it keeps each and every task performed in the system.The main objective of thesystem
is to store whole information of all books easily and to provide better facility to all
customers.Also to the profile of the system .also the system that I have design is very easy
to manage, modified and maintain and also it is reliable.
The objective of the system is to overcome the drawbacks of the existing manual
system and make a hassle free computerized system.
Some of the advantages of the proposed system:
Store the data with minimum redundancy.
Provide updated information.
Efficient, easy to use, less error prone, accurate.
The system under consideration must include all those activities that are necessary for the
smooth functioning of the different process. The system will
1. Save time
2. Enhance data security
3. Easy access of information from wherever required
4. Comfort of data maintained.
Advantages:
The proposed system can be converted to a more useful one with slight modification.
Some aspects that can be enhanced latter are:
a) Can easily convert into Multi-user application.
b) Can extend to applicable with Internet.
c) Can provide Protection Module.
d) Can provide Back Support etc.
CHAPTER 4
FEASIBILITY STUDY
FEASIBILITY STUDY
4.1 INTRODUCTION
4.3 CONCLUSION
4.1 INTRODUCTION:
This section depicts on of the most important stages of the initial investigation carried out as
a part of life cycle of the project development-feasibility of the project faces certain
shortcomings.
Many feasibility studies are dis-illusionary for both the user and the analyst. First, the
study often presupposes that when feasibility document being prepared, the analyst is in a
position to evaluate solutions. Secondly, most studies tend to overlook the confusion inherent in
the system development, the constraints and assumed attributes.
Feasibility of the proposed system is evaluated to determine whether the new system can
be implemented or not. The feasibility study is a must prior to the proposed system. The impact
proposed system must be weighted carefully because there is a great deal at stake. The feasibility
study helps to estimate whether the project will be beneficial or not. During feasibility study one
has to consider the following fields—
The economic feasibility aims at determining the benefits of the candidate system, which
is accepted if the benefits outweigh the cost involved in the development of the new system.
Primary economic considerations are with respect to the configuration of the system used.
Both PIII and PII based configurations are normally available and are not very expensive.
Economic feasibility may also be influenced by the time required to develop the project. With
normal working schedule of four hours, the coding part of the project may be completed within
one month. Testing and further modifications may require another one month. That way the
economic aspect of the project makes it feasible.
This involves whether the project is feasible enough to be completed within the stipulated
time. Schedule feasibility depends on
The behavioral feasibility should also be judged in order to estimate the mentality of the
people to whom the system is being developed and with whom the system is being carried out as
well as ultimate beneficiaries. In case if they are not motivated to use the new system or they
resist it, the whole thing will be messy and the project will be a failure.
In case of proposed system the organization has no computerized system and people in
Reliance Clinical Laboratory have partial idea about it. Hence, while implementing the system I
will have to guide them through the project.
The minimum required resolution for the project is 1024 X 768 pixels at 55 KHz.
Technical evaluation must also assess whether the existing system can be upgraded to use
the new technologies and whether the organization has the expertise to use it.
Once the existence of a problem is acknowledged and the need for a solution is agreed
upon, it is necessary to establish that a solution to the problem is feasible. For this, a study is
conducted.
The study of a system is initiated by the management to check whether the proposed
computerized solution is technically, economically, socially and operationally feasible.
Management usually initiates this by giving a formal go-ahead to conduct the study.
4.2.6 TIME FEASIBILITY:
4.3 CONCLUSION:
From the observation made in the feasibility study described above it was recommended that
the proposed Student Information Management System is feasible for its development and
implementation.
CHAPTER 5
STRUCTURED ANALYSIS
5.1 INTRODUCTION.
DFD is a pictorial representation which depicts the different processes at work within a
system. It is used to show the information flow from process to process, process to store, or store
to process. The DFD of the individual processes may be broken down into forms which may be
shown level wise.
The context diagram is the starting point of the DFD. A DFD is a series of bubbles joined by
lines-which represents the data transformations and the lines represent the data flows in the
system. So it is also known as “BUBBLE CHART”. There are various symbols used to draw a
DFD, like-
ARROW: - An arrow indicates data flow- data in motion. It is a pipeline for flow of
information.
Entity Relationship Diagram represents the relationship between various entities and their
attributes. Relationship between entities makes up a data structure. There are three type of
relationship we can find in an ERD,
One to one.
One to many
Many to many.
4. Lines: Line is nothing but it connects the relationships, attributes and entities.
E-R DIAGRAM FOR
Data elements: It is the smallest unit of data that provide for no further decomposition.
Data structure: It is a group of data element handled as a unit.
Data flows & data stores: They are data structures in motion and data structures at rest
respectively.
In constructing the Data Dictionary the analyst have to consider several points:
Each data flow in the DFD has one Data Dictionary entry.
Definitions must be readily accessible by name.
There should not be data redundancy in the data definition.
The procedures for writing definition should be precise.
SI.NO FIELD NAME DESCRIPTION FIELD TYPE SIZE CONSTRAIN TABLE NAME
1 Name Name of the supplier Varchar 20 Supplier
SYSTEM PLANNING
Effective software project management focuses on: people, problem and process.
The manager who forgets that software restaurant work is an intensely human endeavor will
never have success in project management. Before software can be planned, its objectives and
scope should be established, alternative solutions should be considered, technical and managerial
constraints should be identified. Persons who are categorized into one of five constituencies
populate the software process:
Senior Managers – who defines the business issues that often, have significant influence on
the project.
Project Managers – who plan, motivate, organize and control the practitioners who do
the software, work.
Practitioners – who deliver the technical skills that, are necessary to engineer a project or
application.
Customers – who specifies the requirements for the software to be engineered.
End users –who interacts with the users once it is released for production use.
6.2 COST ESTIMATION:
Software cost and effort estimation will never be exact science. Too many variables –
human, technical, environmental and political – can affect the ultimate cost of software and effort
to develop it. However, software project estimation can be transformed from a mysterious art to a
series of systematic steps that provide estimates with acceptable risk.
To achieve reliable cost and effort estimates, a number of options arise:
1. Delay estimation until late in the project (obviously, we can achieve 100% accurate
estimates after the project is complete).
2. Base estimates on similar projects that have already been completed.
3. Use relatively simple “decomposition techniques” top generate project cost and effort estimation .
6.3 SOFTWARE SIZE ESTIMATION:
The exact size of the software was not known at the beginning because the requirements
of the clients could not freeze at the beginning. At an approximate the total size of the software
was 5-6 MB.
6.4 PRINCIPLES OF PROJECT SCHEDULING:
Like all other areas of software engineering, a number of basic principles guide
software project scheduling.
Compartmentalization: -The project must be compartmentalized into a number of
manageable activities and tasks. To accomplish compartmentalization, both product and the
process are decomposed.
Interdependency: -The interdependence of each compartmentalized activity or task must be
determined.Some tasks must occur in sequence; others occur in parallel. Some activities cannot
commence until the work product produced by another is available. Other activities occur
independently.
Time Allocation:- Each task to be scheduled must be allocated some numbers or work units. In
addition, each task must be assigned a start date and a completion date that are functions of
interdependencies and whether work will be conducted on a full time basis.
Effort Validation: - Every project has a defined number of staff members. As time allocation
occurs, the project manager must ensure that no more than the allocated numbers of people have
been allocated at a given time.
Defined Responsibilities: - Every task that is scheduled should be assigned to a specific team
member.
Defined Outcomes: - Every task that is scheduled should have a defined outcome. For software
projects, the outcome is normally a work product (e.g., the design of a module) or a part of a
work product.
Defined Milestones:- Every task or group of tasks should be associated with a project milestone.
A milestone is accomplished when one or more work products have been reviewed for quality
and have been approved.
The output of the software process is information that may be divided into three broad
categories:
2. Documents that describe the computer programs (targeted at both technical practitioners
and users) and
3. Data (contained within the program or external to the items that comprises all information
produced as part of the software process) are collectively called a software configuration.
In my software, I have assured the client whatever changes are required will be done but
in case of any major changes, those changes which will require to change the back-end or the
front-end to a quite large extent.
6.6 PLANNING TOOLS:
The Gantt chart uses horizontal bars to show the durations of actions or tasks. The left end
marks the beginning of the task, the right end its finish. Earlier tasks appear in the upper left and
latter ones in the lower right. A task is specific job that can be assigned to one person to perform
in a specific time. A group of tasks makes up an activity, which ends in a milestone.
Gantt charts have one drawback they do not show precedence relationships among the
tasks and milestones of a project, i.e. interdependence of tasks is not evident. The critical tasks of
those that must be done on time are not evident either. Like Gantt chart, PERT makes use of
tasks. It shows achievements, which are terminal achievements, called events. Arrows are used to
represent tasks and circles represent the beginning or completion of a task. The PERT chart uses
these paths and events to show the interrelationships of project activities.
System
System
Testing
System Development
Design (Coding)
Feasibility
Problem Study
Study
2nd Feb, 2013 19th Feb,2013 To 2nd March,2013 2nd May,2013 2nd June,2013
To 1st March, 13 To To To
SYSTEM DESIGN
7.1 INTRODUCTION
7.4 NORMALISATION
System design is a solution a “how to approach the creation of a new system”. This
important phase is composed of several steps. It provides the understanding and Procedural
details necessary for implementing in the system recommended in the feasibility study. Emphasis
is on translating the performance requirement into design specification
Design goes through logical and physical stages of development. Logical design review
the present physical system, prepares input and output specification details the implementation
plan and prepares a logical design walkthrough. The physical design maps out details of the
physical system, plans the system implementation, devices a test and implementation plan and
specifies any new hardware and software.
System design goes through two phases of developments:-
a. Logical Design
b. Physical Design
We know that the data flow diagram shows the logical flow of the system and defines the
boundaries of the system. A logical design specifies the user needs at the level of detail that
virtually determines the information flow into and out of the system and the required data
resources. Logical design describes the inputs, outputs, databases and procedures all in a format
that meets the user requirements.
It provides the working system by defying the design specification that tells the programmers
exactly what the candidate system must do. In short it can state that physical design is the
implementation of the logical design.
Physical system design consists of the following steps:-
Input Design
Output Design
Database Design
MENU DESIGN:
In any computer system, a user first interact with its menus, therefore it should be good
enough such that the user can feel comfortable while using it.
Like most of the system, the format will be shown along with a list of number, and users are
expected to choose appropriate option by positioning the cursor or keying the appropriate
number. A series of menus allow the user to step through a series of hierarchical levels of
increasing specificity.
The advantage of the well designed menu is that it provides a familiar format and clear set of
choice which were well understood by the user. Menus therefore require less training than
common languages. One important feature of a menu structure is the capability of back tracking
to a higher or returning to the higher level and starting ones. An ideal interface should have
shortcut. Example of a shortcut are menu of menu name so that a user may immediately specify a
lower level menu and a feature to permit direct writing of a complex command that by passes the
menu displays.
Input design is a circle part of any system design. Inaccurate input data are the most
important cause of error in data processing. Data entry can be controlled by input design. Input
design is the process of converting user oriented inputs to computer based format. The goal of
designing input data is to make data entry as easy, logical and free from errors can possible.
While entering the data the operator needs to know the following:-
The allocated field for each field.
Fields sequence which most match that in the source document.
The format in which data field is entered.
Keeping in view the users requirements, the input screens have been designed and
developed for easy and error free data entry. Based on the various types of inputs to be fed to the
computer in using the proposed system, all input screens are designed in real mode and help are
given in the form of guide the data entry operators step by step.
1. Form Design.
2. Report Design.
7.4 NORMALISATION:
Normalization is logical database design where step by step decomposition of complex records into
simpler records is done. Normalization can thus be described as the process during which
unsatisfactory relational schemes are decomposed by breaking up their attributes into smaller
relational schemes. The main objective of normalization is to reduce redundancy using the
principle of ‘No-Loss Decomposition’. No loss decomposition implies reduction of tables without
loss of information.
Several normal forms have been identified out of which the most important and widely used
are-
First Normal Form (1 NF)
Second Normal Form (2 NF)
Third Normal Form (3 NF)
The process of Normalization and how much necessary it will be depend on how much
detailed and precise our E-R Diagram is.
4.5.1 First Normal Form:-
A table is said to be in the First Normal Form if every cell in the table contains
precisely one value i.e. first Normal Form disallows multi valued attributes and composite
value attributes.
SYSTEM TESTING
8.1 INTRODUCTION
8.2 TESTING
8.3 DEBUGGING
8.1 INTRODUCTION :
1. All tests should be traceable to customer requirement. The objectives of system testing
are to uncover errors.
2. Tests should be planned long before testing begins. Test planning can begin as soon as
requirement model is complete. Therefore, all tests can be planned and designed before
any code has been generated.
3. Testing should begin “in the small” and progress towards testing “in the large”. The
first tests planned and executed generally focus on individual program modules. As
testing progresses, testing shifts focus in an attempt to find errors in integrated clusters
of modules and ultimately in the entire system.
4. Exhaustive testing is not possible. The number of path permutations for even a
moderately sized program is exceptionally large.
8.2 TESTING :
Programs are invariably related to one another and interact in a total system.
Each portion of the system is tested against the entire module with both test and live
data before the entire system is ready to be tested.
An acceptance test has the objective of selling the user on the validity and
reliability of the system. It verifies the system’s procedures operate to system
specification and that the integrity of vital data is maintained.
The functional testing specifies the operating conditions, input values and
expected results. The functional testing in this project results in positive. All the various
operating conditions and expected are accurate. When this test is carried out it does not
arise any situation it is able to take care of all the situations.
8.3 DEBUGGING:
The software was tested vigorously before implementation and when errors were
found they were corrected and removed.
CHAPTER 9
SYSTEM IMPLEMENTATION
9.1 INTRODUCTION
9.3POST IMPLEMENTATION
9.1 INTRODUCTION :
System implementation means converting a new system design into operation. The
successful implementation of the new software package is the most important part of
the System Development life cycle.
System implementation comprises the followings:
(a) Creating computer-compatible files.
(b) Training the people who are going to actually operate the system i.e. the operating
aff.
(c) Installing the necessary hardware, terminals and telecommunication network (if
required).
(d) Installing the application packages.
After the installation phase is completed and the user staff is adjusting to the
changes created by the candidate system, evaluation and maintenance begins. If the new
information is inconsistence with the design specification then changes have to be
made. Hardware also requires periodic maintenance to keep it that does better with its
design specifications. User priorities, changes in organizational requirements,
environmental factors output and input qualities etc are the factors of maintenance.
CHAPTER 10
SYSTEM SECURITY
10.2 PREVENTION.
10.3 DETECTION.
The best method is of course stopping all breaches of security before they
occur. ‘Need-to knows’ policy is an offshoot of the principle of prevention.
10.3 DETECTION:
However one may try to ensure it, total security is almost impossible. The
next principle, therefore, is that one must be able to detect breaches to
security, whenever they occur, within the shortest possible time. This helps in
damage assessment and, also, in devising further preventive measures.
These measures are for PCs being used by us. The measures
available are:
Physically bolt down the PC to a table so that it can’t be casually lifted
and taken away.
Locate the PC in such a way that it is conveniently accessible to the user,
but hidden from casual passes-by.
Have likeable cupboards for floppies and keep them locked at all times,
except when used.
Keyboard and PC locking devices can be fitted so that the PC can’t be
operated unless these locks are opened.
Keep a record of all floppies in use; don’t permit alien floppies into the
organization.
Use lockable rooms for PCs, specially those handling sensitive data.
Make it a practice to lock the room when leaving it for even a short time.
Time above apply to server, gateways and the like.
The PCs are fairly rugged and can tolerate wide ranges of
temperatures, humidity, and voltages. To ensure trouble free and
prolonged life, consider the following measures:
Have temperature and humidity gauge placed in the close proximity of
PC and keep a casual watch to ensure that condition are within limits.
Switch off if the limits are exceeded.
If the normal electrical supply is subject to large variations of voltage and
frequency or spikes, it is prudent to have voltage and frequency
stabilizers for the PC.
Ensure that excessive dust or paper scrap does not accumulate near the
PC.
The plug sockets should fit snugly and cables leading to terminals and
printers should be secured properly and not left hanging.
We may consider putting a thin transparent plastic cover on the keyboard
if it does not hamper to handling the keyboard.
The most important is the use of a vacuum cleaner at regular intervals.
There are some measures we can take to ensure that that is not
corrupted or modified by unauthorized users and to reinitiate the
database to its known status in case this happens and these are:
Use original software for Operating System, Compilers or software
packages. We have to pay for it, but we can then be sure that it would be
bug-free, known also as “licensed” software.
Use correct procedures for shutting down the PC so that all files etc.
would be properly closed.
If we develop our own applications, introduce passwords to access our
application; these passwords should not be visible on the screen when
keyed-in.
Keep back-ups of all our files. Whenever we operate on any file,
(especially in update/append/alter mode), if we have our own programs
they should include a “copy” procedure; this ensures that a back up of our
data files would always be automatically taken.
10.9.1 IDENTIFICATION:
10.9.2 AUTHENTICATION:
10.9.3 AUTHORIZATION:
This is the last step in the process; through this, we can ensure that only a
given user, terminal or other resource, can access data to which permission has
been guaranteed to read, write or alter; thus a matrix can be created to indicate
which users have access to which files, records or fields. If the user request
passes the matrix he is allowed to access, otherwise he is denied access to
some part of the database.
We have had a fairly close look at the measures for data protection
available on stand alone as well as network PCs. Some of the measures that
we studied can be implemented only on mini computer and mainframe system
easily, while trying to introduce them on PCs may incur too much of resource
overhead. We would now a quick look at the protection, detection and
recovery mechanism available on large systems. This is in order to give us
pointers for discerning when to go in for a larger system rather than a PC LAN
and what facilities to look for.
10.11.1 DATABASE SQL SERVER:
CONCLUSION
I have collected the information necessary for the system as much as possible
and I have tried my level best to develop user-friendly software but due to my
inexperience and lack of time there are also some limitations in the system.
These are: -
1. Not any special error handling procedure has been used.
2. Although the system is password protected, there is no administrative
and operating system level security.
For the new entry, save, deleting, updating and closing the forms,
almost the same command buttons are used. The commands are:
To discontinue the system just click on the ‘CANCEL’ button of the form.
OK:If this button is clicked, it gives space to enter new data.
UPDATE: If this button is clicked, it updates the specific database.
This is how anyone can enter the records, maintain the database and generate
the Reports. The person need not be a computer expert to run this software.
CHAPTER 14
BIBLIOGRAPHY
4. JAVA PROJECT
BY SOMA DAS GUPTA
5. JAVA 6.0
BY APTECH