Professional Documents
Culture Documents
Non Govt Org
Non Govt Org
CHAPTER 1
INTRODUCTION
1.1 General introduction
A Cyber Café will have some number of PC’s which the customers will use for certain
amount of time. Now a day it may also require saving some details of the customers for security
reasons. When a customer enters a cyber café he has to be allotted a PC and the start time is
noted.
At any time the cyber administrator should be able to see the status of any Pc, when the
customer wants to do some other activities like taking a print out or scan a copy etc.. It should
be recorded. And finally all the details will be stored with the cyber administrator and he can
generate bill.
The internet Café Monitoring System mainly deals with the problems faced by the internet café
owners or organizers and the Users. The main problem in present times the café owners has to
manage the whole café work manually i.e., users registration, login time, logout time , billing
amount etc. Moreover user has to go to any internet café, and reduces indentity.
The Internet Café Monitoring system is a software solution for operating a computer rental
system that can help management , accounting and billing. The software program comes as a
client and server version. The server version needs to be deployed on all computer systems that
are to be monitored. The system administrator can monitor and record all activities on client
computer systems. New user accounts with distinct rights can be created in the software
program easily. After account is created user is given id and password with which he can access
internet at any of the cyber café which is linked through software.
We will make use of C language as as software tool for the development of this application.
After the analysis of the requirement from the proposed system and specification ,the
feasibility study is done to find whether the system is beneficial to user and organization
The feasibility study includes the collecting the information of the end user and
objectives, constraints, basic requirement and cost benefits. The main and prime
objective of feasibility study is not to solve the problem, but to acquire a sense of its
scope. Major categories on which it is executed are :
Economical Feasibility
The project requires the software tools to run the project which are available
very easily. Nowadays built in NIC are available on systems thus no extra amount is
required to purchase them. Thus our project is economically feasible.
Operational Feasibility
CHAPTER 2
REVIEW OF LITERATURE
2.1Literature survey
Proposed Solution
A proper management for information of various workstations at the internet cafe is must .
CHAPTER 3
SYSTEM CONFIGURATION
3.1 Hardware requirements
CHAPTER 4
MODULE DESCRIPTION
4.1 Module1
Login :
This module deals storing the details of login of admin and customer such as username
and password.
4.2 Module2
Generate card: This module deals with generating card id for customer who comes to
surf the data, Using which the customers data can be viewed and edited.
4.3 Module3
Check in for regular customer
This module allows the admin to check details regarding the regular customer and is
surfing data. The browsing charge for prepaid users will be deducted from his/her
account while the post-paid users will have to make the entire payment by cash in
accordance to his browsing time.
4.4 Module4
Check in for irregular customer
The customers here are offered two choices to make for the time plan that is prepaid and
Post-paid.
4.5 Module5
Check out for irregular customer
This module deals with checkout of the regular customer and prints the bill.
4.6 Module6
Update card: This module deals with updating the card by adding the extra amount or
adding the time .
Bill This module deals with printing the bill after the check in and checkout of
customer
CHAPTER 5
Admin is the super user of the scheme. The owner is just like admin. The owner has all
right to view and modify the data in the system. The owner has the following attributes. The
owner has the authority to generat
generatee the id and give connection to user to access system .
CHAPTER 6
SYSTEM IMPLIMENTATION
6.1 Implementation
#include<stdio.h>
#include<conio.h>
#include<string.h>
#include<stdlib.h>
//#include "update.h"
//void random();
char name[20];
char date[20];
char mob[20];
int n,a;
char ch;
int money;
void random1()
FILE *fp;
int c,n1;
int res,found=0;
fp=fopen("card_registeration.txt","r");
n1 = rand() % 1000000 + 1;
while(fscanf(fp,"%s %s %s %d %d\n",name,date,mob,&money,&n)!=EOF)
if(n1==n)
found=1;
fclose(fp);
random1();
break;
if(found!=1)
n=n1;
fclose(fp);
//fp=fopen("card_registeration.txt","a");
//fclose(fp);
//fclose(fp1);
// registeration
void card_registeration()
FILE *fp;
fp=fopen("card_registeration.txt","a");
random1();
scanf("%s",name);
scanf("%s",date);
scanf("%s",mob);
scanf("%d",&money);
printf("\ncard issued\n");
//random1();
printf("your ID is %d",n);
fprintf(fp,"%s %s %s %d %d\n",name,date,mob,money,n);
//card update
scanf("%d",&n);
switch(n)
case 1:
checkin_card();
break;
case 2:
checkout_card();
break;
case 3:
checkin_cus();
break;
case 4:
checkout_cus();
break;
case 5:
card_registeration();
break;
card_update1();
break;
case 7:
see_record();
break;
case 8:
exit(0);
default:
printf("error");
fflush(stdin);
scanf("%c",&ch);
while(ch!=',');
/*void main()
clrscr();
main_module();
getch();
The above figure 6.1 explains the procedure of generating the card details
The above figure 6.2 explains how the error messages are displayed when an mistake is made
during entering details and the figure 6.3 displays the procedure of updating the card .
The above figures explains the procedures for check in of both regular and registered
customers.
The above figure explains the procedure of ccheck-out of the registered customer.
Fig 6.7 U
Updating the details of the registered customer.
The above figures explains the updating details of the registered customer and checkout of the
irregular customers
The above figure explains the procedure of printing the date wise income and exiting the
project.
CHAPTER 7
SYSTEM TESTING
We can find error by testing. If we want to make our software error free then testing is
very essential step. Until we test our software by different test processes, we cannot say the
software is right or wrong.
White-box Testing-
Black-box testing-
Unit Testing-
This is primitive level of testing. Here every part of program will be tested independently.
Integration Testing-
After integrating all modules if any error occurred or not that will be tested.
System Testing-
Stress Testing- It will be check how much abnormal quantity; frequency or volume software can
handle.
Performance testing-
Since we accept that our work may have botches, subsequently we as a whole need to
check our own work. Anyway a few missteps originate from terrible presumptions and
vulnerable sides, so we may commit similar errors when we check our very own work as we
made when we did it. So we may not see the imperfections in what we have done.
In a perfect world, we ought to get another person to check our work in light of the fact
that someone else is bound to detect the defects.
There are a few reasons which unmistakably explains to us as why Software Testing is
Programming testing is truly required to call attention to the deformities and mistakes
that were made amid the advancement stages.
Model: Programmers may commit an error amid the usage of the product. There could
be numerous explanations behind this like absence of experience of the software engineer,
absence of information of the programming language, inadequate involvement in the space,
wrong usage of the calculation because of complex rationale or just human blunder.
It's basic since it ensures that the client finds the association solid and their fulfillment in
the application is kept up.
On the off chance that the client does not discover the testing association solid or isn't
happy with the nature of the deliverable, at that point they may change to a contender
association.
It is essential to guarantee the Quality of the item. Quality item conveyed to the clients
helps in picking up their certainty. (Find out about Software Quality)
As clarified in the past point, conveying great quality item on time manufactures the
clients trust in the group and the association.
Testing is essential so as to give the offices to the clients like the conveyance of
excellent item or programming application which requires lower upkeep cost and consequently
results into progressively exact, predictable and dependable outcomes.
Brilliant item ordinarily has less deformities and requires lesser upkeep exertion, which
thusly implies diminished expenses. Testing is required for a successful execution of
programming application or item.
It's critical to guarantee that the application ought not result into any disappointments
Legitimate testing guarantees that bugs and issues are identified from the get-go in the
existence cycle of the item or application.
In the event that deserts identified with necessities or configuration are distinguished late
in the life cycle, it tends to be over the top expensive to fix them since this may require update,
re-execution and retesting of the application. It's required to remain in the business.
Clients are not slanted to utilize programming that has bugs. They may not receive a
product on the off chance that they are not content with the solidness of the application.
If there should be an occurrence of an item association or startup which has just a single
item, low quality of programming may result in absence of reception of the item and this may
result in misfortunes which the business may not recoup from.
7.2 Maintenance
Maintenance has been an important subject for software since several years and it is the
problem of future. To maintain higher quality of software, different types modification at
different times maintenance is very important.
CHAPTER 8
8.1. Conclusion
Modern world is computer world where the things have to be done promptly that
requires proper standards. Due to this inevitable requirement, computerization of each and every
sector in the main stream is must, so that it can be held itself in the race. Our software incorporates
all the features and facilities provided by the Visual Studio software. This project has been
developed to manage the entire working of the Cyber Café which reduces manual work.
8.2. Limitations
This is currently applied at a single café or a group of café‘s in a city and later on
it can be extended by joining café‘s in various cities and across the country. We can
also make a session time partition; by this if a person use internet for only sometime
then he can use the remaining session time next time (for example, if a person has a
session time of 60 min and he used only 15 min this time then his remaining 45 min he
can use next time.)
CHAPTER 9
REFERENCES
9.1 Text Reference
[1] “Herbert Schildt: C++ the complete Referance, 4th edition, Tata McGraw Hill,
2007
[2] William Stalling, “Operating System – Internal and Design principle” Pearson 6 th
edition 2012
[3] “Programming in Ansi C” E Balagurusamy