Professional Documents
Culture Documents
Mohd Kashif Salmani
Mohd Kashif Salmani
ON
“PERSONAL INFORMATION SYSTEM”
BY
MOHD KASHIF SALMANI
ROLL NO: 1621614007
GUIDE NAME
MR. SANJAY PUROHIT
ASST. PROF. (MCA)
Place:
Date:
(1621614007)
This is to certify that the above statement made by the candidate is correct to
the best of my knowledge.
• Report is a list of what you have. In campus, categories og item and write
the comment of campus report and show the report through date wise.
SYSTEM INTRODUCTION
Our project name is Personal Information System. Personal Information
System. It is a system which allows an individual to gather, organize, store
and retrieve the ideas and information found to be useful to the individual.
Ideas and the organization of ideas and information have been an ongoing
pursuit of many of us for at least the last 20 years.
1. Owned by "me"
2. About "me"
3. Directed toward "me"
4. Sent/Posted by "me"
5. Experienced by "me"
6. Relevant to "me".
MODULES OF THE PROJECT
1.New Registration Record
This include the registration of the new student like Name, Aadhar no, Pen
card no, Address of a particular student. In this system, we only feed the
details of each student.
2.Delete record
This include the delete of the old students record like Name, Aadhar no,
Pen card no, Address etc. Records that have been permanently deleted will
not be recoverable. For cases where you need to permanently remove the
student remove a student record from the system.
3.Modifying record
Modifying student’s record like Address, Phone no, Name, etc. are came
under the modifying the record of the student. We need to update record year
after year the maintain the performanve.so it is very important or useful.
4.View record
In this we can view all the records of the students by using the database like
Name, Aadhar no, Pen card no, Phone no or any other information related to
a particular student. we can view all the records of a student belonging to a
particular department within a second.
ANALYSIS
1. FEASIBILITY ANALYSIS
Economic feasibility evaluates whether the system benefits greater than the
cost. The proposed system is cost –effective one since the benefit of the
software outweighs the cost incurred in installing it. It can be developed under
optimal expenses with the available hardware and software. The computerized
system provides easy and faster information retrieval and saves a lot of time
and manpower.
1.2 Technical Feasibility
DESIGN
2. SYSTEM DESIGN
The system design specification includes input design specification and output
design specification.
2.1 INPUT DESIGN
The output design phase is another very important one. The outputs are mainly
used to communicate with user, processing the input data given by the user
etc. It is documented in each stage of the project to ensure error free output.
Output screens are designed in very simple and understandable format.
1. Loss of availability
2. Loss of integrity
3. Loss of confidentiality
5.MAINTENANCE
6.CONCLUSION
The project has been developed for the successful management of the
activities at Nirmala College Muvattupuzha. In this various information of
each student mainly internal grade details has been maintained efficiently. The
system has been thoroughly tested with sample of data and the performance
of the system proved to be efficient and extremely user-friendly.
The system is flexible and changes if any can be made without much
difficulty. Every step has been taken to make the working of the project
comfortable as possible for the users. Also reports have been created and can
be called according to the requirements.
The Major Advantages Are:
SPECIFICATIONS
HARDWARE REQUIREMENTS: -
Processor Intel Pentium 2.4 GHz
RAM 1 GB(DDR2)
Hard disk 1GB
Input Device Multimedia, Keyboard, Optical
Mouse
Output Device Colored Display with high
resolution, Scanner and Printer
SOFTWARE REQUIREMENTS: -
Operating System Windows 10
BACK-END TEXT FORMAT FILE
Front-End C
Web Browser --------
3.5 DATA FLOW DIAGRAMS(DFD)
The data flow diagrams were first developed by Larry Constantine as a way
of expressing system requirements in a graphical form: this led to a modular
design. A DFD, also known as “Bubble Chart”, has the purpose of clarifying
system requirements and identifying major transformation that will become
programs in system design. A DFD consists of a sequence of bubbles joined
by lines. The bubbles represent data transformation and the line represent the
data flow in system.
0-LEVEL DFD (DATA FLOW DIAGRAM)
MANAGEMENT
Course detail summary
Problems In existing system
As we know personal information system are quite tedious, time consuming
and less efficient and accurate in comparison to the computerized system.
2. Dominant culture.
3. Security issues.
4. Implementation expenses.
Information system is not all about managing stocks and ordering goods. But
information system combined with efficient analysis tools can be truly
effective as it can help us identify the trends in the demand for various
products by carrying out various types of analysis.
Carrying out such analysis at regular intervals can help the shop manager to
decide upon the future reordering strategies and taking some major decisions
regarding purchase of goods.
PROPOSE
SCOPE OF PURPOSE SYSTEM
The scope of this system is to provide user efficient working environment and
more output can be generated through this. This system provides user friendly
interface resulting in knowing each and every usability features of the system.
This system helps in tracking records so that past records can be verified
through them and one can make decisions based on the past records. This
system completes the work in a very less time resulting in less time
consumption and high level of efficiency.
This system is developed in such a way that even a naïve user can also operate
the system easily. The calculations are made very quickly and the records are
directly saved into databases and the databases can be maintained for a longer
period of time. Each record can be retrieved and can be verified for the future
transactions.
Also, this system provides high level of security for data leaking as only admin
people can access the database no changes can be made in it until it verifies
the user login id and password.
We also have operator login through which operator can take orders but can’t
make changes in the database. Limited access is available to the operator.
Objectives
The main objective of this system is to keep records of the complete personal
information system.
B. PROCESSING
C. ERROR HANDLING
3. Should report any data type mismatches any field on the forms.
Derived data types are nothing but primary datatypes but a little twisted or
grouped together like array, structure, union and pointer. These are
discussed in details later.
Data type determines the type of data a variable will hold. If a variable x is
declared as int. it means x can hold only integer values. Every variable
which is used in the program must be declared as what data-type it is.
C INPUT & OUTPUT
Input means to provide the program with some data to be used in the
program and Output means to display data on screen or write the data to a
printer or a file.
C programming language provides many built-in functions to read any given
input and to display data on screen when there is a need to output the result.
In this tutorial, we will learn about such functions, which can be used in our
program to take input from user and to output the result on screen.
All these built-in functions are present in C header files, we will also specify
the name of header files in which a particular function is defined while
discussing about it.
FEATURES OF C LANGUAGE
Features of C language
It is a robust language with rich set of built-in functions and operators
that can be used to write any complex program.
The C compiler combines the capabilities of an assembly language with
features of a high-level language.
Programs Written in C are efficient and fast. This is due to its variety of
data type and powerful operators.
It is many time faster than BASIC.
C is highly portable this means that programs once written can be run on
another machine with little or no modification.
Another important feature of C program, is its ability to extend itself.
A C program is basically a collection of functions that are supported by
C library. We can also create our own function and add it to C library.
C language is the most widely used language in operating systems and
embedded system development today.
Crystal Reports
Checks Inventories
<<include>>
Tracks Order
Studies
Requirements
Makes payment
Customer Clerk
Invoice
Send GRN
Database Schema:
2. report
This table represents the relationship between the tables
Categories , CommentBox and Date Each tuple is uniquely identified by the
union of
foreign keys mid and sid. It stores important attributes namely,
It is the data table which records daily sales for every product
and serves as a basis for sales analysis. Each entry represents the
number of units of a particular material sold on a particular date. Its
primary key consists of mid and a date attribute named date today.
H/W & S/W
REQUIREM
ENTS
REQUIREMENTS
Hardware requirements:
1GB RAM
1GB HARDDISK
INTEL PENTIUM 2.4GHz
Software requirements:
Back End:
TEXT FORMAT FILE
FUTURE
SCOPE
The scope of the project includes that what all future enhancements can be
done in this system to make it more feasible to use
You have also asked about a few test methodologies. Time doesn't permit
covering each one, but let's take a look at the specific methodologies you
bring up, and a few related ones as well.
Smoke Testing: Smoke testing is the practice of going over a new build
at a very high level. What I tell my test teams is that smoke testing is
used to make sure you can get at each major component of a project.
Once a project is smoke tested, deeper testing can get started. It has its
benefits in large, distributed test teams -- especially when the project is
very large and takes a long time to install. For instance, building an
application like Microsoft Office or Windows Vista requires smoke tests
before a testing organization commits itself to cleaning a bunch of
machines and installing a new build.
Data Driven Testing: Data-driven testing is great for testing APIs and
Web services -- you input a series of rows of data and analyze the results.
It's what makes testing managers and IT directors feel warm and fuzzy,
because data-driven tests can be written in no time and executed even
faster. Tools like Fitness are great for DDT.
The New Product Information Form contains many textboxes which are
used to enter the information of the product in the database. The first
textbox is of Categories which is. Also, there are checkboxes to indicate
whether automatic reorder is possible and whether the product is
perishable or/and seasonal.
Update Material
When the user has updated a data field of a material and then he
presses the
‘Update’ button to save the changes. An alert message is shown to the
user to confirm the update. If the user does not want to save the
changes then he can select the ‘No’ button or else press ‘Yes’.
Testing should be being “in the small” and progress toward testing “in the
large”.
A rich variety of test case design methods have evolved for software. These
methods provide the developer with a systematic approach to testing. More
important, methods provide a mechanism that can help to ensure the
completeness of tests and provide the highest likelihood for uncovering errors
in software.
Any engineered product (and most other things) can be tested in one of
two ways:
Knowing the specified function that a product has been designed to perform,
tests can be conducted that demonstrate each function is fully operational.
While at the same time searching for errors in each function; (2) knowing the
internal.
Working of a product, tests can be conducted to ensure that “all gears mesh,”
that is, internal operations are performed according to specifications and all
internal components have been adequately exercised. The first test approach
is called black box testing and the second, white-box testing.
Testing performed were:
UNIT TESTING
INTEGRATION TESTING
DATABASE TESTING
RECOVERY TESTING
FUNCTIONALITY TESTING
SMOKE TEST
SANITY TEST
COMPATIBILITY TESTING
LOAD TESTING
SYSTEM TESTING
PERFORMANCE TESTING
USER ACCEPTANCE TESTING
(SCREEN SHOT)
LOGIN PAGE
TYPES OF REPORT (SCREEN SHOT)
LOGIN PAGE: -
Login Form:
When the administrator enters the valid username and password in the login
form he will be directed to the form called ‘Welcome Administrator’.
(SCREEN SHOT)
ADD RECORD: -
(SCREEN SHOT)
VIEW RECORD: -
1.WHOLE RECORD OF THE DAY: -
2.RECORD OF FIX TIME: -
(SCREEN SHOT)
EDIT RECORD: -
TIME EDITING: -
MEETING PERSON (EDITING): -
(SCREEN SHOT)
DELETE RECORD: -
DELETE A PARTICULAR RECORD: -
(SCREEN SHOT)
EDIT PASSWORD: -
(SCREEN SHOT)
EXIT: -
BIBLIOGRAPHY
W3School (http://www.w3school.com)
http://Google.com
YOU.