Download as doc, pdf, or txt
Download as doc, pdf, or txt
You are on page 1of 46

ACKNOWLEDGEMENT

I take this opportunity to express our sincere thanks and deep gratitude to all those people who extended their wholehearted co-operation and have helped us in completing this project successfully and for the encouragement and unstinted support given by them. First of all, I would like to thank Dr. Naveen prakash, Director of MANAV RACHNA COLLEGE OF ENGINEERING for creating opportunities to undertake us in the esteemed organization. I would also like to thank Mr. Sachin lakra, Head of the Department of Information Technology for giving us continuous guidance and incessant support not only for this project but also in our overall career development. His contribution is profusely acknowledged. Moral, intellectual and very frequently required support from all the faculty members is also hereby acknowledged. Lastly we would also like to thank each and every person who contributed directly or indirectly for completion of this project.

ABSTRACT

The project entitled Front Office Management is a Real Life Project used to help front office managers to have an easy access to their database. The project is made using Java framework as a front end and Ms. Access is used a backend for making a database. When I thought of making a project, I wanted to make something that is useful to someone so, I consulted a Receptionist of our teaching institute and asked her inspite of all already available softwares in market, what all is there that she still needs or what type of problems is she facing due to lack of certain softwares and I got to know that the biggest problem that she was facing was in accessing a database and she needed an easy GUI to access his database say where she just has to enter the first name of the customer, all his records appear. This project is developed with the keen intention of creating an easy to access and a user friendly Graphical User Interface for any receptionist who wants to access the Database. This is a GUI, which can be connected to Ms. Access database residing on the system. Moreover, the queries can be executed very easily, since the user need not type any queries, but can simply select the appropriate options according to his requirements. The product is developed using Java as front end and Ms. Access Server as backend. The main features integrated in this product are: User Login Courses Taught Enquiry Admissions Searching Records Inserting Records Modifying Records Deleting Records

Showing Complete Database Table Change Password

A form of security has been imposed on the project in the form of username and password, so that only the authorized users can access the software and work with it. The project is user friendly and generates all the required reports.

Front Office Management


CONTENTS

1. 2. 3.
o

INTRODUCTION SYSTEM ANALYSIS


Existing System Feasibility Study

1 4
4 5

SYSTEM REQUIREMENTS
Hardware Requirements Software Requirements Software Features (About Java)

7
7 7 8

4.

SYSTEM DEVELOPMENT
Coding Structure
TESTING ER DIAGRAMS DATA FLOW DIAGRAMS (DFD) SNAPSHOTS CONCLUSION

13
14

5. 6. 7. 8. 9.

16 20 22 27 47 49

10. BIBLIOGRAPHY

INTRODUCTION
4

The term, front office is used in business settings and may refer to the Sales and Marketing divisions of a company. It may also refer to any other divisions in a company that interact with their customers. The term front office is in contrast to the back office operations, which include departments such as personnel, accounting, payroll and financial reporting which do not interact directly with customers. In information technology, it may refer to an integrated CRM software program. In financial services companies, it may refer to the offices of investment management, corporate finance or sales teams. In professional sports, it often refers to the management office of the team, conference or league. In service design the term is used to indicate the place and time of the interaction between customers and service provider. The study and management of a front office requires an adequate time plan to regulate the interaction between actors, an adequate process of experience design and interaction design. At hotels, front office refers to the front desk or reception area or the core operations department for the hotel. This would include the reception and front desk, as well as reservations, sales & marketing, housekeeping and concierge. [1] In terms of aviation, the front office is the flight deck of the aircraft. A receptionist is a person in an office/administrative support position. The work is usually performed in a waiting area such as a lobby or front office desk of an organization or business. The title "receptionist" is attributed to the person who is specifically employed by an organization to greet any visitors, patients, or clients.

A receptionist may also assume some security guard access control functions for an organization by verifying employee identification, issuing visitor passes, and by observing and reporting any unusual or suspicious persons or activities Java is a programming language originally developed by James Gosling at Sun Microsystems and released in 1995 as a core component of Sun Microsystems' Java platform. The language derives much of its syntax from C and C++ but has a simpler object model and fewer low-level facilities. Java applications are typically compiled to bytecode (class file) that can run on any Java Virtual Machine (JVM) regardless of computer architecture.

Principles
There were five primary goals in the creation of the Java language:[16] 1. It should be "simple, object oriented, and familiar". 2. It should be "robust and secure". 3. It should be "architecture neutral and portable". 4. It should execute with "high performance". 5. It should be "interpreted, threaded, and dynamic".

One characteristic of Java is portability, which means that computer programs written in the Java language must run similarly on any supported hardware/operating-system platform. This is achieved by compiling the Java language code to an intermediate representation called Java bytecode, instead of directly to platform-specific machine code. Java bytecode instructions are analogous to machine code, but are intended to be interpreted by a virtual machine (VM) written specifically for the host hardware. Endusers commonly use a Java Runtime Environment (JRE) installed on their own machine for standalone Java applications, or in a Web browser for Java applets.

Standardized libraries provide a generic way to access host-specific features such as graphics, threading and networking. A major benefit of using bytecode is porting. However, the overhead of interpretation means that interpreted programs almost always run more slowly than programs compiled to native executables would, and Java suffered a reputation for poor performance. This gap has been narrowed by a number of optimization techniques introduced in the more recent JVM implementations.

SYSTEM ANALYSIS
System analysis is the process of identification of the objectives and requirements ,evaluation of alternative solutions and recommentation for a more feasible solution.In other words, system analysis is the step by step process of gathering ,recording and interpreting facts. It is the reduction of an entire system by studying the various operations. It includes studying the problems encountered in the present system and introducing a new computer system into an organization. The main aim of analysis is to determine problem areas and decide on solutions to reduce or eliminate them. System analysis itself breaks into two stages.Preliminary and Detailed.During preliminary analysis the analyst list the objectives of the proposed system.These findings come together in the preliminary report. Once the preliminary report is approved ,the system analysis phase adavanes into a second stage.During detailed analysis required data and information are collected and a detailed study is made. During analysis ,data are collected on the available files,decision points,and transactions of the system using various tools like data flow diagram.

THE EXISTING SYSTEM


We have many database management systems available in the market,many of them with friendly Graphical User Interfaces, using which the users can execute queries and handle tables and other objects. However, the GUIs provided by each database server is exclusive to its own database. Moreover, a person with little technical knowledge will find it difficult to use one.

LIMITATIONS OF THE EXISTING SYSTEM 1. GUIs provided by most of the database is exclusive to its own database
2. Working with different databases through a single friendly interface is impossible 3. The features and functionality provided by each GUIs differ from one RDBMS to another 4. A GUI that provides a friendly environment to a user with little knowledge of SQL in such a way that he can work with more than one type of databases is hard to find

FEASIBILITY STUDY
In any project,feasibilityanalysis is a very important stage.Feasibility study is system proposal according to its workability, impact on the operation, ability to meet user needs and efficient use of resources.Any project may face scarcity in resources,time or workforce. An important outcome of the preliminary investigation is the determination whether the system requested is feasible or not. The key considerations involved in the feasibility analysis are technical,operational ,economic .

Technical Feasibility
Technical feasibility is the most important of all types of feasibility analysis. Technical feasibility deals with hardware as well as software requirements.An idea from the outline design to system requirements in terms of of inputs outputs,files and procedures is drawn and the type of hardware, software, and the methods required for running the system are analysed.Keeping in mind of the above considerations,the resource availability at this company was observed.It was found that the company has the company has the

sufficient resources to develop the current project;hence the system is technically feasible.

Economic Feasibility
Economic analysis is the most frequently used method for evaluating the effectiveness of the software, more commonly known as the cost /benefit analysis. The procedure is to determine the benefits and savings that are expected from a candidate system and compare them with costs.If the benefits outweigh cost, the decision is made to design and implement the system, otherwise further alternatives have to be made.Here it is seen that no new hardware or software is needed for the development of the system. Hence the project is economically feasible for development in this company.

Schedule Feasibility :
Schedule feasibility is concerned with the completion of the project development within the fixed time span.It is an important factor as it can affect other factors like machine availability ,tools,cost development and delay in the development of other systems.Besides these,this project is assigned to the student as an academic exercise to be completed within a fixed period of time.

Operational Feasibility
The purpose of the operational feasibility study was to determine whether the new

system will be used if it is developed and implemented? Will there be resistance from users that will undermine the possible application benefits? From the outputs of the meeting that was held with the system users , it was found that all of them support the development of new system. The positive response from them encouraged in building such a system.

10

SYSTEM REQUIREMENTS
HARDWARE REQIUREMENTS
System Processor Main Memory Cache Memory Keyboard HDD Monitor Mouse PC Pentium III Celeron or higher 128 MB minimum 512 KB 104 standard keyboard 40 GB or more 17 monitor or TFT Any Mouse

SOFTWARE REQUIREMENTS
Operating System Back End Front End Windows Ms Access JAVA

Software Features
Java Overview The best thing about Java is that it is object oriented and architecture neutral. The promise of object-oriented programming (OOP) is the capability to reuse code. With Java, we no longer have to develop separate applications for different platforms. Large corporations use Java's platform independence to save millions of dollars on a single project. Java has captivated much more than the imaginations.

11

Java is two things: 1. Java is a high level programming language. Java is both compiled and interpreted. With compiler, you can translate a Java program into an intermediate language called Java Byte codes the platform independent codes interpreted by the Java interpreter. With an interpreter, each Java Byte codes instruction is parsed and run on a computer. Compilation happens just once; interpretation occurs each time the program is executed. 2. A platform. A platform is the hardware or software environment in which each a program runs. The Java platform differs from most other platform in that it is software only platform that runs on top other, hardware based platforms. Its two components are A) Java virtual machine (Java VM) B) Java application programming interface (Java API) Java is modeled after C and C++. Java also borrows extensions from Objective C. These extensions allow for extremely dynamic method resolution. This makes it very easy for current C, Objective C, and C++ developers to transition to Java. Java gets rid of pointers, automatically manages memory, and even features a garbage-collection routine that runs in the background. Because of its intended use on the Web, where even the smallest security vulnerability could potentially be exploited and cause global mayhem, Java was designed with multiple layers of security countermeasures embedded in the compiler, runtime system, and in browsers that support Java, known as Java-enabled browsers. These countermeasures make Java inherently more secure for developing any type of trusted application software.

12

Java is a sound choice for developing software where reliability is of utmost concern, such as mission-critical applications. Java's object-oriented nature combined with numerous, compile-time and runtime integrity checks eliminate many difficult-tofind programming errors. The Java language has removed many of the dangerous programming capabilities, such as modifiable pointers, unchecked type conversion, and relaxed bounds checking, that are commonly found in other programming languages, such as C and C++. The Java API provides full support of multithreaded programming. Multithreaded programs can be developed in a single, consistent manner, independent of the vagaries of the host operating system interface. The Java API provides extensive support of windowing and graphical user interface development without the complexities associated with maintaining multiple window class libraries. Java TAPI (Telephone Application Programmers Interface) provides facilities for accessing modem and Telephone line. It has built in classes for Modem operation.

Java Features
Some of the important features of Java are as follows: Simplicity Object oriented Platform Independent Security High Performance Mutlithreading Garbage Collection Distributed

13

Dynamic Linking Robust Portable Interpreted

Swings
In Java ,we buid user interfaces using a separate class called Abstract Wondow Toolkit or AWT.But there is a supercharged alternative called Swing .Swing is a set of classes that provides more powerful and flexible components than are possible with the AWT. Swings supply several exciting additions that includes tabbed panes,scrollpanes,trees and ta2bles. Unlike AWT components,Swing componenets are entirely written in Java and therefore are platform-independent.The term lightweight is used to describe such elements.Swing class provides toolbars,tooltips and progress bars.Swing components can provide a pluggable look and feel,which means that it is easy to substitute another appearance and behavior for an element.The proposed software is makes extensive use of a number of swing components.

JDBC Overview
JDBC is a Java TM API for executing SQL statements. It consists of a set of classes and interfaces written in the Java programming language that makes it easy to send SQL statements virtually to any relational database. In other words, with the JDBC API, it is not necessary to write one program to access a Sybase database, another program to access an Oracle Database, another program to access MySQL database and so on. On can write a single program using the JDBC API and the program will be able to send SQL statements to the appropriate database. And, with a program written in the Java programming language one also doesnt have to worry about writing different programs

14

to run on different platforms. The combination of Java and JDBC lets a programmer write it once and run it anywhere. Java, being robust, secures, easy to use, easy to understand and automatically down loadable on a network is an excellent language basis for database applications. What is needed is a way for Java application to talk to variety of different databases JDBC is the mechanism for doing this. JDBC extends what you can do in Java. for e.g., with Java and the JDBC API it is possible to publish a web page containing an applet that uses information obtained from a remote database . Or an enterprise can use JDBC to connect all it employees (even if they are using a conglomeration of Windows, Macintosh and UNIX machines) to one or more internal database via an intra net. With more and more programmers using the accesses from java is continuing to grow. MIS managers like the combination of Java because it makes disseminating information easy and economical. Business can continue to use their installed databases and access information easily even if it is stored on different database management systems. Development time for new applications is short. Installation and version controls are greatly simplified. Here a programmer can write an application or update once, put it on the server and everybody has access to the latest version. And for business selling information services, Java and JDBC offers better way of getting out information updates to external customers. JDBC makes it possible to do four things: 1. Establishes a connection to databases. 2. Send SQL statements 3. Process the results. 4. Close the connection . Microsoft Office Access, previously known as Microsoft Access, is a relational database management system from Microsoft that combines the relational Microsoft Jet

15

Database Engine with a graphical user interface and software development tools. It is a member of the Microsoft Office suite of applications and is included in the Professional and higher versions for Windows and also sold separately Access stores data in its own format based on the Access Jet Database Engine. It can also import or link directly to data stored in other Access databases, Excel, SharePoint lists, text, XML, Outlook, HTML, dBase, Paradox, Lotus 1-2-3, or any ODBC-compliant data container including Microsoft SQL Server, Oracle, MySQL and PostgreSQL. Software developers and data architects can use it to develop application software and non-programmer "power users" can use it to build simple applications. Like other Office applications Access is supported by Visual Basic for Applications, an objectoriented programming language that can reference a wide variety of objects, including DAO (Data Access Objects) and ActiveX Data Objects, and many other ActiveX components provided by Microsoft or by third parties. Visual objects used in forms and reports expose their methods and properties gracefully in the VBA programming environment, and a huge selection of Windows operating system functions can be declared and called from VBA code modules, making Access a rich programming environment.

Uses
Microsoft Access is used by programmers and non-programmers to create their own simple database solutions. Access tables support a variety of standard field types, indices, and referential integrity. Access also includes a query interface, forms to display and enter data, and reports for printing. The underlying Jet database, which contains these objects, is multiuser-aware and handles record-locking and referential integrity including cascading updates and deletes

16

SYSTEM DEVELOPMENT
System development is a series of operations performed to manipulate data to produce output from a computer system.This is highly dependent on the programming language used.During the system development phase,the system is constructed from the specifications prepared in the design phase.The principal activities performed during the development phase can be divided into two major related sequence.They are : External system development(to the computer program component) Internal system development(to the computer program component) The major external system development activities are: Implementation Planning Equipment acquisition Installation

The major internal system development activities are: Computer program development Performance testing

17

CODING STRUCTRUE
Coding structure transalates detailed design representation of software into a programming language realization. Front end tool has been seleted after analyzing: Ease of design to code translation Availabilty of development tools Maintainability

Code design has been implemented giving priority to understandability,simplicity, and clarity. Java 2.0 has been selected as the front tool for software development.As the system aims at creating an user friendly interface ,the swing class of JAVA is of much use in its development.Eventhough we can buid interfaces using the Abstract Window Toolkit(AWT)classes of Java,the Swing classes provides more powerful and flexible components than are possible with AWT.In addition to the familiar components ,Swing supplies several additions,including tabbed panes,scroll panes,trees and tables.Even familiar components have more capabilities in Swing,which helps in making the proposed system user friendly to the maximum extend .Swing components can provide a pluggable look and feel i.e.it is easy to substitute another appearnce for an element. And as the proposed system has to communicate with more than one type of RDBMS using the query language SQL,JDBC (Java Database connection) in Java is the right choice for making database connections .Every database has its own Application Program Interface(API) that we must know to write programs that interact with the database.This means that writing code capable of interfacing with databases from more than one vendor has been a daunting challenge.The JDBC API provides Java applications with midlevel access to most database systems via SQL.JDBC is a key enterprise API.JDBC is Suns attempt to create a platform-neutral interface between 18

databases and Java.The JDBC API defines a set of database functionality,including running queries,processing results, and determining configuration information.JDBC driver is a set of classes that implements interface for a particular database systems. An application can use a number of drivers interchangeably.

USER INTERFACE SPECIFIACTION


Access to the application is restricted through a login name and a password.Only those who have given correct login name and password in the login section can have access to the connection section ,where the connection with a particular RDBMS is established.After establishing the connection only ,the appropriate options for various operations in database and its objects are enabled.The login window and connection section is given in appendix2.

19

TESTING

Testing is the process of executing the program with the intent of finding errors. Testing cannot show the absence of defects, it can only show that software errors are present. The testing principles used are 1. Tests are traceable to customer requirements. 2. 80% of errors will likely be traceable to 20 % of program modules 3.Testing should begin in-small and progress towards testing in large System testing is vital for the success of any software system .In this phase, several tests and validations will be carried out on modules to check for their functionality. Testing and debugging is a very critical in system development. The quality of the system is confirmed by the thoroughness of its testing. Duration and cost of testing and debugging is a significant fraction of the system development life cycle and hence influences overall productivity during the system development .In this phase the errors in the program or module are localized and modifications are done to eliminate them. Some of the methods of system testing are given below:

White Box Testing:


This test is conducted during the code generation phase itself. All the errors were rectified at the moment of its discovery. During this testing, it is ensured that 1. All independent paths within a module have been exercised at least once. 2. Exercise all logical decisions on their true or false side. 3. Execute all loops at their boundaries.

20

Black Box Testing:


It is focused on the functional requirements of the software. It is not an alternative to White Box Testing; rather, it is a complementary approach that is likely to uncover a different class of errors than White Box methods. It is attempted to find errors in the following categories 1. Incorrect or missing functions 2. Interface errors 3. Errors in data structures or external database access 4. Performance errors and 5. Initialization errors. 6.

Unit Testing:
Unit testing is carried out to screen wise,each screen being identified as anobject.Attention is diverted to individual modules,independently to one another to locate errors.in coding and logic. In unit testing, Module interface is tested to ensure that information properly flows into and out of the program under test. Local data structures are examined to ensure that data stored temporarily maintains its integrity during all steps in algorithm execution. Boundary condition is tested to ensure that the module operates properly at boundaries established to limit or restrict processing. All independent paths through the control structures are executed to ensure that all statements in the module have been executed at least once. Error handling paths are also tested This test focuses verification effort on the smallest unit of software unit of software design, the module .Here, the module interfaces

21

,boundary conditions ,and all independent paths were verified by inputting false data .Each single operation is tested individually for its correct functionality.

Intergration testing
Integration testing is a systematic technique for constructing the program structure while at the same time conducting tests to uncover errors associated with interfacing.Unit tested module were taken and a single program structure was built that has been dictated by the design.Incremental integration has adopted here.The entire software was developed and tested in small segments,where errors were easy to locate and rectify.Each database or table manipulation operation was written as a single java class files and separately tested and combined to form a single program .After integration,the single program was tested again with numerous test data to check for its functionality. The integration can be performed in two ways-Top down integration and Bottom up integration.Here bottom up integration is performed. This strategy is implemented with the following steps. 1. Low-level modules are combined to form clusters that perform a specific software sub function. 2. The cluster is tested. 3. Drivers are removed and clusters are combined moving upward in the program structure.

Alpha Testing:
A series of Acceptance tests were conducted to enable the employees of the firm to validate requirements. The end user conducted it. The suggestions, along with the additional requirements of the end user were included in the project.

22

Beta Testing:
It is to be conducted by the end-user without the presence of the developer. It can be conducted over a period of weeks or month. Since it is a long time consuming activity, its result is out of scope of this project report. But its result will help to enhance the product at a later time.

23

E-R DIAGRAMS
In software engineering, an Entity-Relationship Model (ERM) is an abstract and conceptual representation of data. Entity-relationship modeling is a database modeling method, used to produce a type of conceptual schema or semantic data model of a system, often a relational database, and its requirements in a top-down fashion. Diagrams created using this process are called entity-relationship diagrams, or ER diagrams or ERDs for short. An entity may be defined as a thing which is recognized as being capable of an independent existence and which can be uniquely identified. An entity is an abstraction from the complexities of some domain. When we speak of an entity we normally speak of some aspect of the real world which can be distinguished from other aspects of the real world. An entity may be a physical object such as a house or a car, an event such as a house sale or a car service, or a concept such as a customer transaction or order. Although the term entity is the one most commonly used, following Chen we should really distinguish between an entity and an entity-type. An entity-type is a category. An entity, strictly speaking, is an instance of a given entity-type. There are usually many instances of an entity-type. Because the term entity-type is somewhat cumbersome, most people tend to use the term entity as a synonym for this term. Entities can be thought of as nouns. Examples: a computer, an employee, a song, a mathematical theorem. Entities are represented as rectangles. A relationship captures how two or more entities are related to one another. Relationships can be thought of as verbs, linking two or more nouns. Examples: an owns relationship between a company and a computer, a supervises relationship between an employee and a department, a performs relationship between an artist and a song, a

24

proved relationship between a mathematician and a theorem. Relationships are represented as diamonds, connected by lines to each of the entities in the relationship

E.R DIAGRAM IN Ms. Access

25

DATA FLOW DIAGRAM


A data-flow diagram (DFD) is a graphical representation of the "flow" of data through an information system. DFDs can also be used for the visualization of data processing (structured design). On a DFD, data items flow from an external data source or an internal data store to an internal data store or an external data sink, via an internal process. A DFD provides no information about the timing or ordering of processes, or about whether processes will operate in sequence or in parallel. It is therefore quite different from a flowchart, which shows the flow of control through an algorithm, allowing a reader to determine what operations will be performed, in what order, and under what circumstances, but not what kinds of data will be input to and output from the system, nor where the data will come from and go to, nor where the data will be stored (all of which are shown on a DFD). DFD shows the movement of data through the different transformations or processes on the system.A DFD has the following features: The information flow is gathered on time consuming basis Control information is passed throughout the system and associated control processing Multiple instances of the same transformation,which are sometimes encountered in multitasking situations System states and the mechanism that causes transition between states. In the normal convention,a DFD can be completed using four notations.

26

: A square defines a source or destination of the system data. : An arrow identifies data flow data in motion. It is a pipeline through which information flows.

: A circle or a bubble represents a process that transforms in incoming data flows into outgoing data flows

:An open rectangle is a data store- data at rest or a temporary repository of data .

Data flow diagrams are the central tool basing on which components are developed. The transformation of data from input to output, through process may be describe logically and independently of physical components associated with the system.They are called Logical data flow diagrams. In contrast, Physical data flow diagrams show the actual implementation and movement of data. The data flow diagrams show functional composition of the system.

27

USER LEVEL DFD

28

0-LEVEL-DFD

Administrators

Stimulu s Ms Acess
Users

29

I - LEVEL DFD

Courses

Admn

Addmission s

Stimulus

Enquiry Ms Access

Users

Settings

Change Password 30

Snapshots

31

LOGIN PAGE
The snapshot of above page is login page. In this there are two text fields, one for username and other for password. The user who has to access enters its username and password. If the details of the users matches with the one in database then a message box appears Authentication Passed and the user enters to next page and if the details doent match then message box appears Authentication Failed and the user has to enter the details again. If the authentication of the user fails continuously for three times then that username blocked. Stimulus is the customized name given to the project.

32

MAIN PAGE
The snapshot of above page is the main page that comes after the login page. This page contains all the fields that diverts the user to the different application of stimulus. The different applications are :

1. Courses :
This tells the courses offered in the project stimulus and details about the project like duration, fees and details of the students learning that course.

2. Enquiry :
This field give all the details of the students or user we want to know. It finds the records from the database and display it there.

33

3. Admissions:
This helps in adding details of the people who are taking admission in the stimulus. Its makes database of the people. 4. Settings: It helps new users and stored their details in the database. Only these users can access stimulus. 5. Change Password : This is change password field where the users who can access stimulus can change their login password if they want to.

34

COURSES
The snapshot of the above is of the field courses. This tells the courses offered in the project stimulus and details about the project like duration, fees and details of the students learning that course. There are many buttons in the form. These are for all the different operations like adding a new record, editing a new record, deleting a new record, updating a new record, finding an existing Stimulus. All the records are retrieved or saved from/to the database which contains the table for course with the essential fields. record, going back to the previous page and logging out from

35

ADMISSIONS:
The snapshot of the above is of the field admissions. This tells the admitted pupil for the different courses in the project stimulus and gives pupil who are already admitted like name.,address,contact number,courses taken,technologies known etc. There are many buttons in the form. These are for all the different operations like adding a new record, editing a new record, deleting a new record, updating a new record, finding an existing Stimulus. All the records are retrieved or saved from/to the database which contains the table for course with the essential fields. record, going back to the previous page and logging out from

36

ENQUIRY:
The snapshot of the above is of the field enquiry. This field give all the details of the students or user we want to know. It finds the records from the database and display it there. There are many buttons in the form. These are for all the different operations like adding a new record, editing a new record, deleting a new record, updating a new record, finding an existing Stimulus. All the records are retrieved or saved from/to the database which contains the table for course with the essential fields. record, going back to the previous page and logging out from

37

SETTINGS
The snapshot of the above is of the field settings. It helps new users and stored their details in the database. Only these users can access stimulus. There are many buttons in the form. These are for all the different operations like adding a new record, editing a new record, deleting a new record, updating a new record, finding an existing Stimulus. All the records are retrieved or saved from/to the database which contains the table for course with the essential fields. record, going back to the previous page and logging out from

38

CHANGE PASSWORD
The above snap shot is of change password form. This is change password field where the users who can access stimulus can change their login password if they want to. Here the user who has logged in to stimulus can change his/her password. There are links in this form for moving back to the previous form and also reseting the data that has been entered in the text box.

39

Snapshots of Ms. Access DataBase:


The following snapshots are of Ms Access. It is the backend of our project. Here data or records of all the forms has been stored. There are four snapshots of it. The first one is of the access 2000 file format which shows all the tables in our database details. The second is of login table. It has database of the users who can login to stimulus. The third is of the courses avaibla at the center. The fourth is of table admissions. It has all the records of the students in the center.

40

41

42

CONCLUSION
43

SYSTEM EVALUATION
The system is developed aiming at helping a user easily access and work with databases in different RDBMS,even he have little knowledge of SQL.Also the developed system provides a single interface for communicating with more than one type of RDBMS..The new system is developed in Java using MS SQLServer and Oracle. MS SQL Server and Oracle are two commonly used RDBMS, very efficient back end tool for handling databases.The Swing class of Java helped to create many user friendly features like menus,buttons,messages etc in the system.All these can provide better service to the users of this software .So the system succesfully serves the purpose it is aimed at.

MERITS AND SCOPE FOR FUTURE DEVELOPMENT


The Swing class of Java provides many tools that allows to design more user friendly interface such as menus,buttons,dialog boxes,text areas etc.As the system is menu driven ,a user can use it with little training.The user just want to click on certain buttons or select a menu to work with a database and its objects; he doesnt have to type the queries ,nor does he have to possess any knowledge of SQL to work with different databases.For making the system adaptive to the changing environment,it will be necessary that the system will be required to handle some more functions in the future to satisfy the requirements,we can write separate program modules and combine them to the main program.For eg: the system can be further enhanced to handle nested queries,sub queries etc .An option for backing up databases and restoring them is another enhancement.Or the system can be further developed to work as an interface for the MySQL Server ,with some modifications.

DRAWBACKS
44

Eventhough the proposed system succeeded in creating a general level Graphical User Interface for most of the commonly used RDBMSs, it still has certain disadvantages.The following are the some of the main disadvantages of the system: enviroment. Database can b access by any user who has accesed. Security of database is not ensured. No new users can be added. Stand alone application that is it wont work in any distributed

BIBLOGRAPHY
45

JAVA Developer's Guide by Jamie Jaworski Peter Norton's Guide to Java Programming 3. JAVA2 -The Complete Reference SQL Server 7.0 ,BPB Publications 2000 by Mike Gunderloy and Joseh L.Jorden

46

You might also like