Kendriya Vidyalaya Sap Peroorkada: ACADEMIC YEAR: 2021-22
Kendriya Vidyalaya Sap Peroorkada: ACADEMIC YEAR: 2021-22
Kendriya Vidyalaya Sap Peroorkada: ACADEMIC YEAR: 2021-22
PEROORKADA
ROLL NO : 12218
NAME : ANANYA D R
CLASS : XII B
1|Page
ACKNOWLEDGEMENT
SUBMITTED BY-
ANANYA D R
2|Page
CERTIFICATE
This is to certify that ANANYA D R Of Class XII B
have successfully completed the project entitled
HOSPITAL MANAGEMENT under the guidance
and supervision of Smt. Deepa P R during the
academic year 2021-22 for the partial fulfilment of
AISSCE CBSE board examination of Computer
Science. This project has been undertaken, prepared
and submitted as per CBSE guidelines.
3|Page
TABLE OF CONTENTS [ T O C ]
01 INTRODUCTION 6
03 PROPOSED SYSTEM 7
06 SOURCE CODE 20
07 OUTPUT 25
08 TESTING 27
10 BIBLIOGRAPHY 32
4|Page
PROJECT ON
HOSPITAL
MANAGEMENT
SYSTEM
SYNOPSIS
5|Page
INTRODUCTION
computer
PROPOSED SYSTEM
keep pace with time, to bring about the best result without
the computer.
this organization has made their work faster and easier. Now
can be done.
8|Page
SYSTEM DEVELOPMENT LIFE CYCLE
(SDLC)
9|Page
PHASES OF SYSTEM DEVELOPMENT LIFE CYCLE
INITIATION PHASE
The Initiation Phase begins when a business sponsor identifies
a need or an opportunity.
11 | P a g e
SYSTEM CONCEPT DEVELOPMENT PHASE
12 | P a g e
PICTORIAL REPRESENTATION OF SDLC:
PLANNING PHASE
13 | P a g e
plan is developed that documents the approach to be used and includes
a discussion of methods, tools, tasks, resources, project schedules, and
user input. Personnel assignments, costs, project schedule, and target
dates are established.
A Project Management Plan is created with components related to
acquisition planning, configuration management planning, quality
assurance planning, and concept
of operations, system security, verification and validation, and
systems engineering management planning.
REQUIREMENTS ANALYSISPHASE
Further define and refine the functional and data requirements and
document them in the Requirements Document,
Complete business process reengineering of the functions to be
supported (i.e., verify what information drives the business
process, what information is generated, who generates it, where
does the information go, and who processes it),
14 | P a g e
Develop detailed data and process models (system inputs, outputs,
and the process.
Develop the test and evaluation requirements that will be used to
determine acceptable system performance.
DESIGN PHASE
15 | P a g e
Identifying potential risks and defining mitigating design
features. Performing a security risk assessment.
Developing a conversion plan to migrate current data to the new
system. Determining the operating environment.
Defining major subsystems and their inputs and
outputs. Allocating processes to resources.
Preparing detailed logic specifications for each software module.
The result is a draft System Design Document which captures the
preliminary design for the system.
Everything requiring user input or approval is documented and
reviewed by the user. Once these documents have been approved
by the Agency CIO and Business Sponsor, the final System
Design Document is created to serve as the Critical/Detailed
Design for the system.
This document receives a rigorous review by Agency technical and
functional representatives to ensure that it satisfies the business
requirements. Concurrent with the development of the system
design, the Agency Project Manager begins development of the
Implementation Plan, Operations and Maintenance Manual, and
the Training Plan.
16 | P a g e
DEVELOPMENT PHASE
IMPLEMENTATION PHASE
This phase is initiated after the system has been tested and
accepted by the user. In this phase, the system is installed to support
the intended business functions. System performance is compared to
performance objectives established during the planning phase.
Implementation includes user notification, user training, installation of
hardware, installation of software onto production computers, and
integration of the system into daily work processes. This phase
continues until the system is operating in production in accordance with
the defined user requirements.
18 | P a g e
OPERATIONS AND MAINTENANCE PHASE
19 | P a g e
SOURCE CODE
from sys import exit
conn=sql.connect(host='localhost',user='root',passwd='',databa
se='project')
if conn.is_connected():
print('successfully connected')
c1=conn.cursor()
print('---------------------------------------------')
print('---------------------------------------------')
print("1.LOGIN")
print("2.EXIT")
ifchoice==1:
print('connected')
print("WELCOME TO HOSPITAL")
print("successfully connected")
print('1.RegisteringPatient details')
20 | P a g e
print('2.RegisteringDoctor details')
print('3.RegisteringWorker details')
print('7.Patient detail')
print('8.Doctor detail')
print('9.Worker detail')
print('10.Exit')
ifchoice==1:
p_age=int(input('Enter Age:'))
values(""'"+p_name+"',"+str(p_age)
+",'"+p_problems+"',"+str(p_phono)+")"
c1.execute(sql_insert)
print('SUCCESSFULLY REGISTERED')
conn.commit()
elifchoice==2:
d_age=int(input('Enter Age:'))
21 | P a g e
d_phono=int(input('Enter Phone number:'))
values(""'"+d_name+"',"+str(d_age)
+",'"+d_department+"',"+str(d_phono)+")"
c1.execute(sql_insert)
print('successfully registered')
conn.commit()
elifchoice==3:
w_age=int(input('Enter Age:'))
values(""'"+w_name+"',"+str(w_age)
+",'"+w_workname+"',"+str(w_phono)+")"
c1.execute(sql_insert)
print('successfully registered')
conn.commit()
elifchoice==4:
c1.execute(sql_w)
r = c1.fetchall()
for i in r :
print(i)
22 | P a g e
elif choice==5:
sql_x="select*from doctor_details"
c1.execute(sql_x)
s=c1.fetchall()
for i in s:
print(i)
elif choice==6:
sql_y="select*from worker_details"
c1.execute(sql_y)
t=c1.fetchall()
for i in t:
print(i)
elif choice==7:
p_name=("{}")'.format(h)
c1.execute(sql_w)
u = c1.fetchall()
for i in u:
print(i)
elif choice==8:
23 | P a g e
sql_d='select*from doctor_details where
p_name=("{}")'.format(d)
c1.execute(sql_d)
v=c1.fetchall()
for i in v:
print(i)
elif choice==9:
p_name=("{}")'.format(f)
c1.execute(sql_f)
w=c1.fetchall()
for i in w:
print(i)
elif choice==10:
exit()
break
else:
print('wrong username&password')
if choice==2:
exit()
24 | P a g e
OUTPUT
Login output:
After login:
25 | P a g e
After choosing choice:
26 | P a g e
TESTING
TESTING METHODS
Software testing methods are traditionally divided into black box
testing and white box testing. These two approaches are used to
describe the point of view that a test engineer takes when designing
test cases.
28 | P a g e
ADVANTAGES AND DISADVANTAGES
The black box tester has no "bonds" with the code, and a tester's perception
is very simple: a code must have bugs. Using the principle, "Ask and you shall
receive," black box testers find bugs where programmers don't. But, on the other
hand, black box testing has been said to be "like a walk in a dark labyrinth without a
flashlight," because the tester doesn't know how the software being tested was
actually constructed.
That's why there are situations when (1) a black box tester writes many test
cases to check something that can be tested by only one test case, and/or (2) some
parts of the back end are not tested at all. Therefore, black box testing has the
advantage of "an unaffiliated opinion," on the one hand, and the disadvantage of
"blind exploring," on the other.
White box testing, by contrast to black box testing, is when the tester has
access to the internal data structures and algorithms (and the code that implement
these)
29 | P a g e
CODE COMPLETENESS EVALUATION
White box testing methods can also be used to evaluate the completeness of
a test suite that was created with black box testing methods. This allows thesoftware
team to examine parts of a system that are rarely tested and ensures that the most
important function points have been tested.
30 | P a g e
HARDWARE AND SOFTWARE REQUIREMENTS
SOFTWARE REQUIREMENTS:
I. Windows OS
II. Python
III. MySQL
31 | P a g e
BIBLIOGRAPHY
***
32 | P a g e
Thank
You…
33 | P a g e