Professional Documents
Culture Documents
Complete Contact Book Report
Complete Contact Book Report
MY CONTACT BOOK
By
This is to certify that the project report entitled My Contact Book: an application based project
submitted to Indira Gandhi National Open University in partial fulfillment of the requirement of the
award of the degree of Masters of Computer Applications (MCA) is an original work carried out by
Varinder Kaur Saluja enrollment no _____________ under my guidance. The matter embodied in
this project is authentic and is genuine work done by the student and has not been submitted to this
university or to any other University / Institute for the fulfillment of the requirement of any course of
study.
…………………………
…………………………
Enrollment no:
1…………………………….. Signature………………………………………..
2…………………………….. …………………………………………….
ABSTRACT
My Contact Book will provide the basic set of features of adding a new contact, searching, updating,
deleting a contact. It also provides the user to connect to the face book. The project also generates a
report, also export it to pdf. The user can provide its feedback and can also give any suggestions.
By successfully implementing the Contact Book: a substantial knowledge has been acquired
regarding the implementation of the application based database system in order to store the records.
ACKNOWLEDGMENT
Besides, I would like to thank the authority of_______________College, IGNOU Study Centre for
providing me with a good environment and facilities to complete this project.
In addition WE express gratitude to _______________ and all other faculty members for the guidance and
support rendered to us throughout my academic career as a student in the institution .
Also I would like to take the opportunity to thank my family members for giving me full support,
without which this endeavor could not have been possible.
Complete Contact Book is an application based project. It is designed for people to store the
information about their contacts. Rather than going through the pages of their diaries and copies to
search a person information, a person can simply use this software to view any of his stored contacts.
A user can also add or update or delete the contact information according to his need. Big
Organizations need to have this software in order to keep the records of thousands of his employees
at one place without any paper work. Also registers maintained for this purpose can be left around, or
can be destroyed in any accident, but in software no such problem will occur This software also
provides an option to connect to facebook , it also provides the report , you can also view people
1.1 Background
The project Complete Contact Book provides a person to add its personal information like name ,
company, phone number, designation , etc. to the database. A user can search any other person or can
update or add a new contact onto the software. Also, user can view the report generated or can view
Project provides a questionnaire and suggestions page for the betterment of the project.
1
1.2Project Objective
For easy and convenient processing we need to develop software which works as per our
requirements. While preparing this software we got to remember few things i.e. this software must
have a friendly environment, in other words it should not be much complicated to handle, it should
have options for future modifications in the society. For smooth functioning, we had to prepare a
database by which we could enter the required data in their respective locations. In this data base all
the records of daily transactions made are stored i.e. Contact Details , so that we can use them in
future whenever needed. From security point of view this software has a special login name and
password allotted to their Administrator. Other than that no one could use this and on entering an
To allow only authorized user to access various function and processed available in
the system.
Reduced written work and problem of storing the diaries as most of the work done by
computer.
The overall purpose of this project is to develop a Visual Basic .net which will provide an interface
between controls applications written in the VB.net language and the MYSQL Server Management.
One aspect of this work will be to develop a language independent object-oriented model to the
accelerator devices.
and again
User can automatically connect themselves to social media site
User can give all suggestions they need and can save their files.
1.3.2. Scope:
3
1.3.3. Applicability:
The application is to be deployed as a application based program which would be accessible to the
issued people only. Searching of contacts can be done and nothing can be done without entering in
the software as it is password protected. Reports are generated electronically and could be converted
into pdf files for later use and can be kept as a record on client side.
1.4Achievements
By successfully implementing Contact Book , a substantial knowledge has been acquired on the
implementation of an application based database system. This knowledge will be useful in the future
The objective of Contact Book was the creation of an application based system for the use on a large
scale as well as on a small scale and even for a personal use on the home basis. This system can be
easily modified to serve the needs of various people and make their life easier.
deal withthe important aspects of the Systems Development Life Cycle. Each of the chapters
are divided into headings and sub-headings. Chapter 1 introduces the project, its background and
purpose. The technologies used in the project and the reason thereof are explained in Chapter 2.
Chapter 3 broadly deals with the requirements, analysis and planning of the project. All the
design aspects have been dealt with in. Chapter 4 including schema design, interface design,
4
security and test cases. The actual implementation has been discussed in Chapter 5, which
includes coding and testing of the working of the system. Chapter 6 discusses the test report and
project documentation and finally the conclusions have been drawn in Chapter 7. At the end of
the report, the references made and the glossary has been included.
2. Survey of Technologies
In an application based system like Contact Book, there is a scope for a large number of platforms,
languages, web servers and frameworks to choose from. Before selecting from this large array of
Performance
Reliability
Portability
Security
Performance
Fast speed
Cost Constraint
Time Constraint
The project Contact Book could have been built by various technologies like VB.net, C#, C++,
Java.
It is easy to understand
It is easy to install
It has a good GUI which makes it very easy to work with.
MSDN library supports us and give us all the help needed while we come through any errors
or problems.
I was convenient to work with it.
5
To develop this package different types of tools and database are used which are as follows:
VB.NET 2008
Framework 4.0
Microsoft MYSQL Server 2008
Microsoft Word
VB.NET 2008
Visual Basic .NET (VB.NET) is an object-oriented computer programming language that can be
viewed as an evolution of the classic Visual Basic (VB), implemented on the .NET Framework.
Microsoft currently supplies two main editions of IDEs for developing in Visual Basic: Microsoft
Visual Studio 2012, which is commercial software and Visual Basic Express Edition 2012, which
is free of charge. The command-line compiler, VBC.EXE, is installed as part of the freeware .NET
Advantages of VB.NET
1. First of all, VB.NET provides managed code execution that runs under the Common
Language Runtime (CLR), resulting in robust, stable and secure applications. All features of
2. VB.NET is totally object oriented. This is a major addition that VB6 and other earlier releases
didn't have.
3. The .NET framework comes with ADO.NET, which follows the disconnected paradigm, i.e.
once the required records are fetched the connection no longer exists. It also retrieves the
records that are expected to be accessed in the immediate future. This enhances Scalability of
4. VB.NET uses XML to transfer data between the various layers in the DNA Architecture i.e.
6
5. Error handling has changed in VB.NET. A new Try-Catch-Finally block has been introduced
6. Another great feature added to VB.NET is free threading against the VB single-threaded
apartment feature.
7. Security has become more robust in VB.NET. In addition to the role-based security in VB6,
8. The CLR takes care of garbage collection i.e. the CLR releases resources as soon as an object
is no more in use. This relieves the developer from thinking of ways to manage memory.
Framework 4.0
Dot net framework is a platform that is provided by Microsoft technology in which we can develop
web based application,window based application and console base application with C#(c sharp),VB
Centralized control of the dba avoids the unnecessary duplication of data and effectively
reduces the total amount of data storage required. It also eliminates the extra processing and
of the inconsistencies eg. Same format of grade card for all student.
Sharing data :
Any number of application program of user’s can share the same database .For example we
Data integrity :
Data integrity means that the data contains in the database both accurate and consistent.
7
Data security :
In this facility the confidential data must not be accessed by unauthorized person.
SQL Server provides rapid access to data by utilizing indexes and storing frequently accessed
data in memory
The Enterprise Manager is the central console from which most SQL Server database-
management tasks can be coordinated. SQL Enterprise Manager provides a single interface
Microsoft Word
Microsoft Word is a word processor developed by Microsoft. It was first released in 1983 under the
name Multi-Tool Word for Xenix systems .Subsequent versions were later written for several other
platforms including IBM PCs running DOS (1983), the Apple Macintosh (1984), the AT&T Unix
PC (1985), Atari ST (1986), SCO UNIX, OS/2, and Microsoft Windows (1989). It is a component of
the Microsoft Office software system; it is also sold as a standalone product and included
8
3. Requirement Analysis
The Contact Book requires computerizing its storage of contacts in order to provide fully service to
automate the following activities. The requirements from the proposed software are as follows:
The problem here is that storing the contact information on paper is little bulky and is difficult to
manage and store these papers. They can be forgotten where they were placed or could be destroyed
by the small animals like rat etc. For a personal purpose it could be managed but for organizations
where there is a need to keep these information’s for later use it will create a problem if such thing
happens.
So, why don’t we keep it in our computer as a record? You may say that we could have used WORD
or NOTEPAD, yes we could have used but in that case it would be a little difficult to search a contact
or delete one or add a contact after scrolling thousands of pages of word but the software CONTACT
BOOK provides a total and an easy interface to add , search , delete a contact without going through
User Requirements:-
9
A careful study of the requirement of the end user; i.e. the Contact Book should meet the
following requirements:
User should be able to add image for his contact
No User without the correct login and password may be allowed to enter the project
User should be provided with an option to add the record just by adding the fields
value.
User could be able to delete any record he/she wants.
User should be able to search a record either by entering name or part of name or by
choosing groups.
User should be able to update the record.
User should be able to connect to facebook.
User should be able to see the records in a file and in report also.
Although the system is to be installed in a low end system with Windows based OS at
The database of the Contact Book consists of five tables. First table consists of the basic
information of the record. The next table consists of the address details, The third table
consists of the phone details. The next table consists of other details. The last table consists of
Name Description
e
Designation The designation of contact
works
Aoffice Address of office of contact
living
Apermanent Permanent address of contact
10
Poffice Contact no. of office
Functional Requirements:-
To provide login interface through which only authorized user can pass by.
The application provide contact the option to add the photo from any file in its pc..
Performance Requirements:
• Response Time
• Workload
11
• Scalability
• Platform
Planning and Scheduling are two of the most critical elements for project success. Project
determines the direction, goals, scope, quality and ultimately the outcomes for any given
project.
1. Define activities, durations, and relationship logic to implement the project plan Monitor,
update, and communicate the schedule to reflect current status and the impact of project
changes.
The Planning and Scheduling professional provides the project management team with the
SNC's highly pprofessionals are using Primavera Project Management( P6) as main software
for scheduling and besidesMicrosoft Office especially Excel for cost analysis and reporting.
12
GANTT Chart :
A Gantt chart is a type of bar chart, developed by Henry Gantt in the 1910s, that illustrates
a project schedule. Gantt charts illustrate the start and finish dates of the terminal elements
and summary elements of a project. Terminal elements and summary elements comprise
PERT Chart:
13
3.4 Software and Hardware Requirements
Software Requirements
14
Editor : Microsoft word 2007
For Development : visual studio .Net setup tools
For Design : Visual studio designer
1. Intel Core
2. 40GB hard disk
3. 4 GB RAM
The system will store the contact information to the software. The system can add various
contacts for various persons. One person can be a part of one or more groups.All one needs to
do is to change the database accordingly. Project deals with storing all the information of a
person , delete a person information , update a person information. The modules with its
The application has Login module we need the user name and password facility and only
15
The application has view module to view all the tables of the database.
The application has query module to perform different queries on the database.
The application has report module to generate a report on the tables currently we have.
The application has group module to show if person belongs to more than one group.
3.6 Conceptual Models
The view of the screen with all the possible operations is shown diagrammatically below:
Add Form
Delete Form
Search Form
Update Form
LOGIN WELCOME Connect to facebook form
SCREEN Group Form
Report Form
Table Form
3.6.2 Entity Relationship Diagram: Questionnaire Form
Pdf Form
An ER model is an abstract way of describing a database. In Suggestions
the case of aForm
relational database,
which stores data in tables, some of the data in these tables point to data in other tables - for
instance, your entry in the database could point to several entries for each of the phone
numbers that are yours. The ER model would say that you are an entity, and each phone
number is an entity, and the relationship between you and the phone numbers is 'has a phone
number'. Diagrams created to design these entities and relationships are called entity–
16
3.6.3 Data Flow Diagrams:
The table structure for the various tables to be used in the proposed software is described in
to show a detailed functions of project we can make level 1 , level 2 dfd and so on…….
USER
CONTACT BOOK
DATABASE
ATTEND Access
ALL TABLES OF
DATABASE
17
Level 1 DFD
This level of DFD shows a little detailed pictorial description of the project.
Level 2 DFD
This is the last phase of dfd according to the need of this project. The level 2 DFD is as follows:
18
MODULE DESIGN BY DFD
19
DFD for each individual module is shown below
1. LOGIN MODULE
VALUES
PROCESS
ENTER
TRUEPROJECT PAGE
RESULT
FALSE
2. ADD MODULE
20
ENTER ADDING
VALUES OF FIELDS
MODULE
VALIDATION CHECK
WRITE CONTACT
DETAILS TO
CHECK ALL PROCESS DATABASE
CHECK IS SET
FIELDS HAVE OF CHECK MOBILE NUMBER
VALUES VALIDITY IS VALID THAT IS OF 10
DIGITS
ASK USER TO ENTER
VALID NUMBER
GIVE A
ASK USER TO WARNING
ENTER ONLY
NUMBER
CHECK FAX NUMBER, MOBILE
PHONE,RESIDENCE PHONE
AND OFFICE PHONE CONSISTS
ONLY OF DIGITS
3. DELETE MODULE
21
NAME OF CONTACT
ENTER
DELETE
MODULE
SEARCH
FOUND
CONFIRM TO DELETE CONFIRM YES
ASK PROCESS DELETE CONTACT
NO
GO BACK
4. SEARCH MODULE
22
By entering name or VALUE
part of name
SEND VALUE
FETCH
VIEW THE CONTACT DETAILS
SEARCH IN DATABASE
DATABASE FOUND
VALUES
NOT FOUND
DISPLAY AN APPROPRIATE
MESSAGE
5. UPDATE MODULE
ID ENTER
VALIDATION
UPDATE CHECK
MODULE
FIRSTLY SEARCH
NOT
FOUND
DISPLAY AN APPROPRIATE
6. QUERY MODULE UPDATE THE VALUES
MESSAGE
23
QUERY CHOSEN VALUE
QUERY
MODULE
RESULT
QUERY
PROCESSOR
RESULT
RUN ON DATA GRID
REQUEST FETCH
DATABASE
7. GROUP MODULE
24
CHOOSE SEND VALUE GROUP
NAME MODULE
RESULT
QUERY
RESULT
PROCESING
SHOW CONTACT
WITH GROUP
FETCH
DATABASE
4. SYSTEM DESIGN
25
4.1 Basic Modules
viewed
Schema Design:-
26
Personal Table Address Table
Name Name
Designation Residence Address
Company Permanent Address
Office Address
Phone Table
Name
Photo Table
Home Phone
Others Table
Office Phone
Id
Mobile Phone
Image Name
Fax
Email id
Website
Data Integrity and constraint have been implemented on database level. checks and
constraints have been implemented within the MySQL database in the following
CONSTRAINT
FIELD_NAME DATA_TYPE DESCRIPTION
S
Id Int It show contact id Primary key
Contact_name Varchar It show Contact Name Candidate Key
Designation Varchar It show Contact’s Designation
Company_Nam Varchar It shows name of company person is working
e in.
27
Contact_name Varchar It show Contact Name Foreign Key relates to other
tables
Mobile Number Varchar It show Mobile Number Length of 10 digits
Residence Varchar It show Residence phone
Number number
Office Number Varchar It shows office phone number
CONSTRAINT
FIELD_NAME DATA_TYPE DESCRIPTION
S
Id Int It show Contact id Primary key
Contact_name Varchar It show Contact Name Foreign key
Permanent Address Varchar It show Permanent
address
Residence Address Varchar It show Residence address
Office Address Varchar It shows office address
CONSTRAINT
FIELD_NAME DATA_TYPE DESCRIPTION
S
Id Int It show Contact id Primary key
Contact_name Varchar It show Contact Name Foreign Key
Email ID Varchar It show Email id of the
person
Website Address Varchar It show website address
Fax Number Varchar It shows fax number
Table 5 Photo
28
FIELD_NAM CONSTRAIN
DATA_TYPE DESCRIPTION
E T
Id Int It show Contact id Primary Key
PHOTO Picture It stores picture Image
address
Logic Diagrams: A flowchart is a type of diagram that represents an algorithm or process, showing
the steps as boxes of various kinds, and their order by connecting them with arrows
Start
Admin login
Main page
The Contact Book gives a user an option to have its personal contact diary stored on a system. A
system always works more fast than a person can. User is given an interface to add a new record in
case he wants to add a record , a option to delete a record , search a record with various options,
update a record, view the contacts according to the groups. Also there are other options of connecting
to facebook also.It also gives option to view report. User can also perform a questionnaire. User can
30
External Interface Requirements:
31
Data Formats None
End Messages On button click user comes to main page of project
32
Name of Item Select for Delete page
Description of purpose Users of Contact Book use it to delete one or
more records.
Source of input or Destination of output User types the name of the record user want to
delete.
Valid range, accuracy and/or tolerance Only characters are allowed as name is asked to
input
Units of measure Characters
Timing User is able to delete a record from database
Relationship to other inputs /outputs On successful deletion user is asked to either
delete again or go back to the main page to
perform any other option.
Screen formats/Organization Frame format of page in order to enter name of
the record.
Data Formats A-Z, a-z
End Messages On successful deletion from database, a message
of successful deletion is displayed, but on the
failure of deletion i.e. in case name is not found
in the records a sorry message is displayed.
33
Name of Item Select for Update page
Description of purpose Users of Contact Book use it to update one or
more records.
Source of input or Destination of output User types the id of the record he wants to
update.
Valid range, accuracy and/or tolerance Only number is allowed as id is asked.
Units of measure Numbers
Timing User is able to update a record from database
Relationship to other inputs /outputs On successful updation user is given an option
to either go back to the main page to perform
any other option or to search again if the
corresponding record is not the one he wanted
or if he wants to update again.
Screen formats/Organization Frame format of page in order to enter id of
the record
Data Formats 0-9
End Messages On successful searching from database, the
record are asked to update and if its not the
record the user wanted to search then an option
is given to search again by rechecking the list
of ids , but on the failure of searching i.e. in
case id is not found in the records a sorry
message is displayed and user is asked to
check the list of ids.
Name of Item Select for Group page
Description of purpose Users of Contact Book use it to view groups of
people based on various options given.
Source of input or Destination of output User chooses which type of group he wants to
view.
Valid range, accuracy and/or tolerance None
Units of measure None
Timing User is able to view the groups
Relationship to other inputs /outputs None
Screen formats/Organization Button format of page in order to choose from
the options
Data Formats None
End Messages On successful completion user is able to view
the groups.
34
Name of Item Select for Group of people page
Description of purpose Users of Contact Book use it to view groups of
people by choosing name.
Source of input or Destination of output User chooses name of person from the list whose
group he wants to view.
Valid range, accuracy and/or tolerance None
Units of measure None
Timing User is able to view the group by name
Relationship to other inputs /outputs None
Screen formats/Organization Combo box format of page in order to choose
from the options of name.
Data Formats None
End Messages On successful completion user is able to view the
groups by name.
35
Timing User is able to view the group by designation.
Relationship to other inputs /outputs None
Screen formats/Organization Combo box format of page in order to choose
from the options of designation.
Data Formats None
End Messages On successful completion user is able to view the
groups by designation.
36
Valid range, accuracy and/or tolerance None
Units of measure None
Timing User is able to view all the records
Relationship to other inputs /outputs None
Screen formats/Organization Tabular format of page to view the records
Data Formats None
End Messages On button click all the records are viewed in
tabular form.
37
Relationship to other inputs /outputs None
Screen formats/Organization Question format of page
Data Formats None
End Messages On button click a calculated percent is shown
telling how much user is satisfied with the
project.
38
automatically written
Valid range, accuracy and/or tolerance 12 size of characters for password
Units of measure Characters
Timing User is able to use his/her facebook profile
Relationship to other inputs /outputs Displays error and asks to input again if wrong
password is entered
Screen formats/Organization Web format of page
Data Formats A-Z, a-z, 0-9, special characters
End Messages On successful login the facebook profile is
viewed. On failure user is asked to again enter
the values.
The security provided by a password system depends on the passwords being kept secret at all times.
39
The system must maintain a "password database."
Users must enter their passwords into the system at authentication time.
Employees may not disclose their passwords to anyone. This includes administrators and IT
managers.
Password policies can be set depending on the needs of the organization. For example, it is possible
to specify minimum password length, no blank passwords, and maximum and minimum password
age. It is also possible to prevent users from reusing passwords and ensure that users use specific
“A test case has components that describes an input, action or event and an expected response, to
determine if a feature of an application is working correctly.” There are levels in which each test case
2 been viewed
T00 Add: Fields to enter the record values should be They are Same
4 before deletion should be done if yes is said then it should be done no, the record
40
should be deleted and if o the deletion should be got deleted
cancelled
T00 Search: Searching by given options will be done Searching is done Same
5 with various
options
T00 Update: Updation should be done without any Updation should Same
8 choice
T00 Questionaire: A survey should be performed and a Percentage is Same
0 records
T011 Tables: All tables should be viewed with values Tables are shown Same
5. Implementation and Testing
The Software Design Description Document has been used as input in the implementation process.
The actual implementation of the system has been done using VB.net, which is a GUI based
application language. VB.net has been used to interact with the backend database. In this
implementation, MySQL has been used as the backend RDBMS. VB.net processes the inputs or
commands given by the user and translates them in the commands understandable to the backend
database. The output produced by the backend database are also handled by VB.net, which then
generates code in real-time and formats the output produced by MySQL format, which can be
displayed by the software. Since VB.net and MySQL are both available in varied platforms like
Windows, Unix, Macintosh and Linux, Contact Book can be implemented in a truly platform
41
independent manner. Since both these technologies are open source and free and have a large user
community, the development cost of Contact Book using VB.net/MySQL is very low.
As we are using VB.Net so all the designing of forms via buttons, labels, textboxes etc. is done here
only by mouse. Now the rest comes to coding. Coding of the form will be shown here one by one.
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
5.2.2 Code Efficiency
Efficiency is the amount of computing resources and code required by a program to perform its
functions. Efficient codes are required for the better performance of the system. Efficient coding makes
a system robust. A method is robust if it does not fail even if it receives improper parameters.
The need for efficiency arises due to the cost of consideration. If some resources are scarce and
expensive, it is desirable that those resources should be used efficiently. In the computer system the
resources the most often considered for efficiency are processor time and less memory. This coding for
the system has been started after completing the design phase, because all software methodologies
emphasize the importance of first designing then coding. The codes that construct this system are
68
structured, modular, efficient, and require less amount of computing resources. All functions of this
system are understandable since the functions are small and coherent. Functions and variables are
meaningful variable names to increase the readability and avoided abbreviations that may confuse the
users.
In order to execute the database queries faster used the following methods. During the retrieval of data
from the database using SELECT statement all the known conditions are specified in the WHERE
clause.
If we want to find the maximum, minimum, sum and average value or the count of a database column,
use a Select list with aggregate functions instead of computing the aggregates within the program. The
RDBMS is responsible for aggregated computations instead of transferring large amount of data to the
application. Overall network, application server and database load is also considerably less. Simplicity
The code repeating again was made as a module which is common for all
Proper indentation is given to understand the code
The forms are designed in a way that all the data and buttons are properly viewed and
Code Optimization
1. Modulo and division operation take a lot of time and they should be replaced by something
else.
2. Try to analyze the problem and obtain an alternate representation of the problem.
3. Try to eliminate the IF statements from your code in the case that their only purpose is to set
69
5.3 Testing Approach:
Software testing is an investigation conducted to provide stakeholders with information about the
quality of the product or service under test. [1] Software testing can also provide an objective,
independent view of the software to allow the business to appreciate and understand the risks of
software implementation
Unit testing is a method by which individual units of source code, sets of one or more computer
program modules together with associated control data, usage procedures, and operating procedures
Integration Testing is the phase in software testing in which individual software modules are
Problem: On clicking No while confirmation no deletion should have been performed but
End If
Else
MessageBox.Show("The Contact you are searching is not in the
database.Please re-check the name and try. You can go back to main page
by hitting the button", "Attempt to delete")
TextBox1.Text = ""
End If
cn.Close()
71
Findings and rectification:
It was found that the position of cancelling the confirmation was wrong that is why this test was
failed.
Now the message box position is changed and the project has been run and cross checked once again
thus, the problem has been rectified.
l
T001 20/10/201 PASS Tested with three different ids and passwords
3
T002 23/10/201 PASS Only one test required
3
T003 26/10/201 PASS Only one test required
3
T004 2/11/2013 PASS Failed for the first time and was then
rectified
T005 8/11/2013 PASS Tested 6 times with each of the options given
T007 15/11/2013 PASS Tested 2 times with all the options given
T008 15/11/2013 PASS Only one test required
T009 17/11/2013 PASS Only one test required
T010 19/11/2013 PASS Only one test required
T011 22/11/2013 PASS Only one test required
72
6.2 User Documentation:
Introduction:
The system will store the contact information to the software. The system can add various contacts
for various persons. One person can be a part of one or more groups. All one needs to do is to change
the database accordingly. Project deals with storing all the information of a person, delete person
information, update person information. The modules with its functions described below as:
The application has Login module we need the user name and password facility and only
This user documentation is intended for the users of the Contact Book where the handling of
important operations of the Contact Book system, like addition, deletion, searching, updation, and
grouping have been explained. This user documentation follows the guidelines and specifications of
IEEE 1063-2001 relating to Software User Documentation. The following pages describe the concept
of operations, procedures, information on software commands and error messages and problem
73
Procedures
The following is the login interface for administrators. Here the user has to enter the user id and
password in order to login. If the user enters the wrong values user is given another chance to enter
the values… but only for three times and after that project exits itself. The login screen is as shown
below:
After successful login the user is taken to the welcome screen. Here you can only see two buttons
one for entering into the project and other to exit from the project. If the button is pressed it will lead
to the main operational page of the project. The welcome screen is as follows:
74
After this main page comes to display in which user chooses an option to perform. Here we can see
many buttons each giving an option of operation from which user will choose any one to perform.
75
Firstly, assuming the user chooses the first option i.e. to add a contact. Here, we can see many text
boxes asking us to enter the values of the record we want to enter. Also there is an option to upload a
photo for the contact. By clicking on the Add to database button the record will be automatically
added to the database despite some of the fields are compulsory to enter and other constraints are
applied as fax contact numbers should only contain numbers and mobile number should be of 10
digits not less not more. There is also other option of adding contact as a .vcf file which will store the
After pressing the add to database button the following record will be added to database.
Also a person can add the entered values as a vcf file. So the values will be stored as a vcf file.
76
Now assuming if the user would choose to delete a record. Here we can see user is asked to enter a
name whose record is to be deleted. When after entering name we press the delete button, firstly
software searches the database that if the name is available or not. If it is available then a
confirmation message is shown, if user presses yes then the record is deleted otherwise operation is
cancelled. And if the name is not found then a sorry message is displayed with a request to enter the
name again.
Assuming if user chose to search a record. Then here we have three options through which searching
can be done.
1. By entering id
2. By entering name or part of name
3. By choosing from group of people
77
Now let us start firstly by Search by ID option. Here we see that user has to enter the id of the record.
In case, one don’t remember the id he can view it by the button given of view ids to see which ids are
present. When a user presses the search button system searches in the database for the record if it is
found then the details are viewed otherwise a message of record not found is displayed.
78
As soon as the user searches we get:
79
Also you can see an option of connect to facebook.As soon as we press the button the specific
contacts email id is copied to user name text box and he is asked to enter password which is bounded
with maximum 12 characters only he enters the password and presses the login button if it is a valid
login then the profile is viewed otherwise the user is asked to again enter the values.
80
Now going back to searching lets search by name or part of name. Here again we see two options i.e.
either by entering the name or part of name or by directly choosing the name from the list.
In the former part we are asked to enter the name or part of name and when search button is pressed
the record is searched in the database. If the record is found then it is viewed in the tabular form
81
In the latter part, the names are shown in the form of list in a combo box which ever name is choosed
by the user the corresponding record is shown in tabular form. There is no chance of not founding
82
Now searching by the groups will first show us the available groups of name in table and as soon as
the user clicks on any row the records full information will be displayed on the screen.
83
Considering the user wants to update the record then user is asked to enter id of the record one wants
to update If a person do not remember the id he can view the list of ids from the button given. If user
after entering the id clicks directly on the update button he will be given a warning message to first
search the record then update, then searching is performed. If record is found then the user is first
told that record is found and its corresponding name is shown to user to confirm if this is the record
he wanted to update If he clicks yes then the textboxes are shown in order to update the record, but if
he clicks no then he is asked to again check the ids and then input them. After making the changes
when the update button is pressed then the following changes are performed on the database.
84
Now considering if user wanted to view the groups will also give us four options
1. Group of people
2. Group of address
3. Group of designation
4. Group of company
When group of people is choosed , then option of choosing names from the list of names is given.
When the user chooses name the number of times that name is present in database is first viewed and
it is asked by the user if we should display the values .If user says yes then the record details is
shown in tabular form and if no is clicked then a message showing “thank you for working with us
85
If user chooses group of address. Here we have address of three types a. Permanent b. Office c.
Present Address. Here we will see two combo boxes one of address other of city. As soon as the user
chooses one of the addresses at that time the next combo box of cities is updated by the cities
belonging to the choosed address. Then the user have to choose city also and then he clicks on the
button to view the group then the names of those people living at the address chosen are displayed.
86
If the group of designation is choosed then a list of available designations is displayed and when the
user chooses any one of the designation then the names of those records with the choosed
87
If the user chooses the option of group of company then list of companies is displayed. When the
user chooses any one then the name of the records working with the company are displayed.
If the user chose to view table’s page here we have a button of show tables by clicking the same the
tables are shown with all the existing records of the system.
88
If user wants to perform questionnaire there are option box of yes/no under each question User can
give a yes or a no or can leave it. The number of answers will be counted and viewed to the user then
the percent is calculated and shown telling them this much percent you are satisfied from the project.
89
If user wants to view the report there is a button to view report. After clicking it we will be able to
view the report of records containing all of them. Here is one more option of exporting it to pdf file
which means by clicking it the report will also be made as a pdf file for a backup.
90
If user wants to give suggestions he can do so by putting text in textbox and then save them to a txt
file.
91
After writing your views an automatic Thank you page comes to show the gratitude to everyone and
92
7. Conclusion
7.1 Conclusion
The Contact Book project has been successfully completed by the developer well within the
scheduled time and all the functional requirements of the project that were set in the SRS have been
fully achieved. The external interface requirements and Input/output formats have also been
implemented as per the requirement specifications. The security aspects of the system have been a
particular concern and it has been implemented in a unique manner. The logical design was carried
out in a very thorough manner and a modular approach was adopted, with each developer given the
responsibility of one module. Special attention was given to the implementation of database
constraints and towards maintaining the integrity of the database, so that even if the coding fails at
some place, the data integrity will not be violated. At the end of it, all the modules were integrated
without any problem and the system was observed functioning as a whole in the predicted manner.
Extensive testing of the system, as well as that of the all the modules have been done using various
test cases and it was revealed that the system is operating well within the prescribed parameters and
the expected outcome of the test cases were observed in most cases. A few coding errors were
detected following the extensive testing, which were minor in nature and the same have been
rectified promptly.
93
7.2 Limitations of the System
Contact Book has been primarily targeted for a medium to large-sized organization and has
been tested, keeping in view the specific requirements. It is possible that the system may not
this system in an insecure environment, other types of security features like encrypted keys,
biometric authentication etc. might be conceived and additional features will be required to
Although Contact Book has been conceived as an successful system for storing contacts for any
organization, it may easily be converted for use in any other environment also like schools , hospitals
etc. Its unique security feature and the facility to create new contacts as a vcf file and as a database
record gives it a flexibility which would enable its owners to offer any type of implementation
through various fields. The strength of the open-source SQL/VB.net combination used in the project
means that Contact Book will be a cheaper option than other such software’s and the large user
community and support services will ensure that any future development and extension efforts can be
References
94
S.No. Website Address Explanation
1 http://ignou.ac.in Our ignou home page which helped me
project.
Sql
us/vstudio/hh388573.aspx vb.net
Tem R. Nieto
Visual Basic .NET How to Program (2nd
Edition)
Simply Sql
95
Glossary
Data Dictionary a set of information describing the contents, format, and structure of a
database and the relationship between its elements, used to control access to
GANTT chart A Gantt chart is a visual representation of a project schedule. A type of bar
chart, a Gantt charts show the start and finish dates of the different required
elements of a project.
96
IEEE The Institute of Electrical and Electronics Engineers is a professional
Integration Integration testing is the phase in software testing in which individual software
MySQL MySQL is the world's second most widely used open-source relational
developed by the United States Navy for the Polaris submarine missile
program in the 1950s. PERT charts allow the tasks in a particular project to be
analyzed, with particular attention to the time required to complete each task,
leads to a schema
the intended purpose and environment for software under development. The
SRS fully describes what the software will do and how it will be expected to
perform.
97
Unit testing unit testing is a method by which individual units of source code, sets of one
usage procedures, and operating procedures are tested to determine if they are
text string used by Web browsers, email clients and other software to identify
W3C The W3C is an industry consortium which seeks to promote standard for the
*********************
******************
*************
********
***
Password 3530 *
98