Gym - Management - System Java Report
Gym - Management - System Java Report
Name:-
Reg num:-
Topic:-
2
TABLE OF CONTENTS
1. Introduction.
1.1 Introduction of the Project.
1.2 Objectives Of The Project.
2. System Analysis
2.1. Identification Of The Need
2.2. Preliminary Investigation
2.3. Feasibility Study
2.3.1. Technical Feasibility
2.3.2. Economical Feasibility
2.3.3. Operational Feasibility
2.4. Proposed System Functionality
5. Design
5.1. Data Flow Diagram (DFD)
5.2. Database Design
5.3. Entity Relationship Diagram
6. Source Code
7. Screen Layouts
8. Testing
9. Implementation
10. Maintenance
11. Conclusion
12. Bibliography
3
SECTION 1
INTRODUCTION
4
INTRODUCTION TO THE PROJECT
5
OBJECTIVES OF THE PROJECT
6
What the Software Provides in this Regard?
The software is capable enough to allow the concerned person to
store and retrieve any type of record with just a single click of
mouse.The software allows Interactive ,Self decribing Graphic User
Interface environment where even standalone users can work very
comfortably and easily.
7
SECTION 2
SYSTEM ANALYSIS
8
System Analysis refers into the process of examining a situation with
the intent of improving it through better procedures and methods.
System Analysis is the process of planning a new System to either
replace or complement an existing system. But before any planning is
done the old system must be thoroughly understood and the
requirements determined. System Analysis, is therefore, the process of
gathering and interpreting facts, diagnosing problems and using the
information to re-comment improvements in the System. Or in other
words, System Analysis means a detailed explanation or description.
Before computerized a system under consideration, it has to be
analyzed. We need to study how it functions currently, what are the
problems, and what are the requirements that the proposed system
should meet.
System Analysis is conducted with the following objectives in mind:
6. Create a system definition that forms the foundation for all the
subsequent engineering work.
9
2.2 Preliminary Investigation
The client set is just a worker(s),who is regularly indulged in
manual maintainence transactions,keeping regular
records,maintaining the records of fine details of members.
Following manual registers are maintained:
Inventory Register:
The register is used to record the details of the
products(supplements,beverages and apparels supplied and
required) such as its ID,Description,Quantity,Price,service date,time
period for which it is under maintainence etc.
10
3. Details of findings :
An outline of the methods and procedures under-taken
by the existing system, followed by coverage of the
objectives and procedures of the candidate system.
Included are also discussions of output reports, file
structures, and costs and benefits of the candidate
system.
11
iv. The cost if nothing changes (i.e. The proposed system
is not developed).
12
2.4 Proposed System Functionality
The proposed system provides the facility to pull the data from
the server using a key (such as id) and get the desired report.
If you have ever programmed in C++, you will find Java's appeal to be instantaneous.
Since Java's syntax mirrors that of C++, you will be able to write Java programs within
minutes. Your first programs will come quickly and easily, with very little programming
overhead.
You will have the feeling that you have eliminated a lot of clutter from your programs-and
you will have. All the cryptic header files and pre-processor statements of C and C++ are
gone. All the arcane #define statements and typesets have been taken away. You will no
longer have to delve through several levels of header files to correctly reference API calls.
And no one will have to suffer to figure out how to use your software.
13
Java programs simply import the software packages they need. These packages may be in
another directory, on another drive, or on a machine on the other side of the Internet. The
Java compiler and interpreter figure out what objects are referenced and supply the
necessary linkage.
Java Is Object-Oriented
If you think C++ is an object-oriented programming language, you are in for a big
surprise. After using Java to write a few programs, you'll get a better feeling for what
object-oriented software is all about. I know I did.
Java deals with classes and objects, pure and simple. They aren't just more data structures
that are available to the programmer-they are the basis for the entire programming
language.
In C++, you can declare a class, but you don't have to. You can declare a structure or a
union instead. You can declare a whole bunch of loosely associated variables and use them
with C-style functions. In Java, classes and objects are at the centre of the language.
Everything else revolves around them. You can't declare functions and procedures. They
don't exist. You can't use structures, unions, or typedefs. They're gone, too. You either use
classes and objects or you don't use Java. It's that simple.
Once you have begun developing software in Java, you have two choices:
Build on the classes you have developed, thereby reusing them.
Rewrite your software from scratch, copying and tailoring useful parts of existing
software.
14
With Java, the temptation to start from scratch is no longer appealing. Java's object-
oriented structure forces you to develop more useful, more tailor able, and much simpler
software the first time around.
Java Is Safer and More Reliable
Java is safer to use than C++ because it keeps you from doing the things that you do badly,
while making it easier to do the things that you do well.
Java won't automatically convert data types. You have to explicitly convert from one class
to another. C++, under the most undesirable conditions, will automatically convert one
type to another. It has all the flexibility of assembly code. Java doesn't assume that you
know what you are doing. It makes sure that you do.
C++ pointers don't exist in Java. You can no longer access objects indirectly or by chance.
You don't need to. You declare objects and reference those objects directly. Complex
pointer arithmetic is avoided. If you need an indexed set of objects, you can use an array
of objects. The concept of "the address of an object" is eliminated from the programming
model, and another assembly language dinosaur is laid to rest. As a result, it becomes
much easier to do things correctly in Java.
Java's reliability extends beyond the language level to the compiler and the runtime
system. Compile-time checks identify many programming errors that go undetected in
other programming languages. These checks go beyond syntactic checking to ensure that
statements are semantically correct.
Runtime checks are also more extensive and effective. Remember your teacher or mom
telling you to "Check your work twice to make sure it's right"? The Java linker
understands class types and performs compiler-level type checking, adding redundancy to
reliability. It also performs bounds checking and eliminates indirect object access, even
under error conditions.
Java Is Secure
15
If you gave a skilled hacker a program written in C or C++ and told him to find any
security flaws, there are half a dozen things that he would immediately look for: gaining
access to the operating system, causing an unexpected return of control, overwriting
critical memory areas, acquiring the ability to spoof or modify other programs, browsing
for security information, and gaining unauthorized access to the file system.
Why is C or C++ more vulnerable than Java? When a programmer develops software, he
or she usually focuses on how to get the software to work correctly and efficiently. C and
C++ do not constrain the programmer from meeting these goals and provide a number of
flexible features that enable the programmer to meet his end. The hacker is also able to
take advantage of these features and use them in ways that weren't originally intended,
causing the undesirable consequences identified in the previous paragraph. In short, C and
C++ provide a great offense, but no defense. Java, on the other hand, is defensive by
nature. Every time a Java-enabled browser downloads a compiled Java class, such as an
applet, it runs the risk of running Trojan horse code. Because of this ever-present threat, it
subjects the code to a series of checks that ensure that it is correct and secure.
The Java runtime system is designed to enforce a security policy that prevents execution
of malicious code. It does this by remembering how objects are stored in memory and
enforcing correct and secure access to those objects according to its security rules. It
performs bytecode verification by passing compiled classes through a simple theorem
prover that either proves that the code is secure or prevents the code from being loaded
and executed. The class is Java's basic execution unit and security is implemented at the
class level.
The Java runtime system also segregates software according to its origin. Classes from the
local system are processed separately from those of other systems. This prevents remote
systems from replacing local system software with code that is less trustworthy.
Java-enabled browsers, such as HotJava, allow the user to control the accesses that Java
software may make of the local system. When a Java applet needs permission to access
local resources, such as files, a security dialog box is presented to the user, requesting
explicit user permission. This "Mother may I?" approach ensures that the user always has
the final say in the security of his system.
16
Java security is covered in detail in Chapter 39, "Java Security."
Java Is Multithreaded
Java, like Ada, and unlike other languages, provides built-in language support for
multithreading. Multithreading allows more than one thread of execution to take place
within a single program. This allows your program to do many things at once: make the
Duke dance, play his favorite tune, and interact with the user, seemingly all at the same
time. Multithreading is an important asset because it allows the programmer to write
programs as independent threads, rather than as a convoluted gaggle of intertwined
activities. Multithreading also allows Java to use idle CPU time to perform necessary
garbage collection and general system maintenance, enabling these functions to be
performed with less impact on program performance.
While it is true that compiled code will almost always run more quickly than interpreted
code, it is also true that interpreted code can usually be developed and fielded more
inexpensively, more quickly, and in a more flexible manner. It is also usually much more
portable.
17
The advantages of being interpreted outweigh any performance impacts. Because Java is
interpreted, it is much more portable. If an operating system can run the Java interpreter
and support the Java API, then it can faithfully run all Java programs.
Interpreted programs are much more easily kept up-to-date. You don't have to recompile
them for every change. In Java, recompilation is automatic. The interpreter detects the fact
that a program's bytecode file is out-of-date with respect to its source code file and
recompiles it as it is loaded.
Because of Java's interpreted nature, linking is also more powerful and flexible. Java's
runtime system supports dynamic linking between local class files and those that are
downloaded from across the Internet. This feature provides the basis for Web
programming.
Java Is the Programming Language of the Web
Java has become the de facto programming language of the Web. It is being licensed by
nearly every major software company. It has some offshoots and potential competition,
such as JavaScript, VBScript, and Bell Labs's Inferno, but it remains the first Web
programming language and the most powerful language for developing platform-
independent software.
Java is also evolving beyond the Web and becoming a key component in distributed
application development. Sun's release of the NEO and JOE products emphasizes Java's
importance to distributed object-based software development. Several other vendors have
introduced products that enable Java to be integrated into the Common Object Request
Broker Architecture (CORBA), which is the framework for distributed object
communication.
18
from being a really good programming language to making it a very powerful and efficient
programming environment.
The Java API consists of eight major development packages and a supporting debug
package, as shown in Figure 2.9. Packages are collections of related objects. For example,
there are separate packages for developing window programs, applets, and networking
software.
19
Eclipse
Eclipse is an integrated development environment (IDE) for developing primarily
with Java, but also with other languages, in particular PHP, C/C++, and HTML5. It is also
an application platformframework for Java desktop applications and others.
The Eclipse IDE is written in Java and can run on Windows, OS X, Linux, Solaris
and other platforms supporting a compatible JVM.
The Eclipse Platform allows applications to be developed from a set of modular
software components called modules. Applications based on the Eclipse Platform
(including the Eclipse IDE itself) can be extended by third party developers.
The Eclipse Team actively support the product and seek future suggestions from
the wider community. Every release is preceded by a time for Community testing and
feedback
Database
A database is similar to a data file in that it is a storage place for data. Like a
data file, a database does not present information directly to a user; the user
runs an application that accesses data from the database and presents it to the
user in an understandable format.
A database typically has two components: the files holding the physical
database and the database management system (DBMS) software that
20
applications use to access data. The DBMS is responsible for enforcing the
database structure, including:
Maintaining the relationships between data in the database.
Ensuring that data is stored correctly and that the rules defining data
relationships are not violated.
Recovering all data to a point of known consistency in case of system
failures.
Relational Database
There are different ways to organize data in a database but relational databases
are one of the most effective. Relational database systems are an application of
mathematical set theory to the problem of effectively organizing data. In a
relational database, data is collected into tables (called relations in relational
theory).
When organizing data into tables, you can usually find many different ways to
define tables. Relational database theory defines a process, normalization,
which ensures that the set of tables you define will organize your data
effectively.
Client/Server:-
In a client/server system, the server is a relatively large computer in a central
location that manages a resource used by many people. When individuals need
to use the resource, they connect over the network from their computers, or
clients, to the server.
Examples of servers are: In client/server database architecture, the database
files and DBMS software reside on a server. A communications component is
provided so applications can run on separate clients and communicate to the
database server over a network. The SQL Server communication component
also allows communication between an application running on the server and
SQL Server.
Server applications are usually capable of working with several clients at the
same time. SQL Server can work with thousands of client applications
21
simultaneously. The server has features to prevent the logical problems that
occur if a user tries to read or modify data currently being used by others.
To work with data in a database, you must use a set of commands and
statements (language) defined by the DBMS software. There are several
different languages that can be used with relational databases; the most
common is SQL. Both the American National Standards Institute (ANSI) and
the International Standards Organization (ISO) have defined standards for
SQL. Most modern DBMS products support the Entry Level of SQL-92, the
latest SQL standard (published in 1992).
My SQL Server supports a set of features that result in the following benefits:
Scalability
The same database engine can be used across platforms ranging from laptop
computers running Microsoft Windows® 95/98 to large, multiprocessor
servers running Microsoft Windows NT®, Enterprise Edition.
Data warehousing
22
SQL Server includes tools for extracting and analyzing summary data for
online analytical processing (OLAP). SQL Server also includes tools for
visually designing databases and analyzing data using English-based questions.
Databases
SQL Server can support many databases, and each database can store either
interrelated data or data unrelated to that in the other databases. For example, a
server can have one database that stores personnel data and another that stores
product-related data. Alternatively, one database can store current customer
order data, and another; related database can store historical customer orders
that are used for yearly reporting. Before you create a database, it is Important
to understand the parts of a database and how to design these parts to ensure
that the database performs well after it is implemented.
Normalization theory:
23
1. 1 st Normal Form (1 N.F): A relation is said to be in 1 NF is and
only if all unaligned domains contain values only. That is the fields of
an n-set should have no group items and no repeating groups.
2. 2 nd Normal Form (2 N.F) : A relation is said to be in 2 NF is and
only if it is in 1 NF and every non key attribute is fully dependent on
primary key. This normal takes care of functional dependencies on
non-key attributes.
3. 3 rd Normal Form (3 N.F) : A relation is said to be in 3 NF is and
only if it is in 2 NF and every non key attribute is non transitively
dependent on the primary key. This normal form avoids the transitive
dependencies on the primary key.
4. Boyce code Normal Form (BCNF) : This is a stronger definition than
that of NF. A relation is said to be in BCNF if and only if every
determinant is a Candidate key.
5. 4 th Normal Form (4 NF) : A relation is said to be in 4 NF if and
only if whenever there exists a multi valued dependency in a relation
say A->->B then all of the relation are also functionally dependent
on A(i.e. A->X for all attributes x of the relation.).
6. 5 th Normal Form (5 NF) OR Projection Join Normal Form (PJNF):
A relation R is in 5 NF .if and only if every join dependency in R is
implied by the candidate key on R. A relation can’t be non-loss split
into two tables but can be split into three tables. This is called Join
Dependency.
JavaScript:
JavaScript is a new scripting language for WebPages. Scripts written with java
script can be embedded into your HTML pages. With java script you have
many possibilities for enhancing your HTML page with interesting elements.
For example you are able to respond to user-initiated events quite easily.
Some effects that are now possible with java script were some time ago only
24
possible with CGI. So you can create really sophisticated pages with the helps
of java script on the Internet.
The Mac version for example seems to have many bugs. In the near future
there are going to be some other browsers, which support java script. The
Microsoft Internet explorer 3.0 is going to support java script. JavaScript
enabled browsers are going to spread soon - it is worth learning this new
technique now. You might realize that is really easy to write Java Script
scripts. We have to know is some basic techniques and some work-around for
problems you might encounter. Of course we need a basic. Understanding
HTML before reading this tutorial you can find many really good online
resources about HTML. Best you make an online search about ‘html’ at yahoo
if you want to get informed about HTML. Now I want to show some small
scripts so you can learn how they are implemented into HTML-documents and
to show which possibilities you have with the new scripting language. The
following is a very small script, which will only print a text into an HTML
document.
<html>
<head>
My first JavaScript
</head>
<body><br>
25
This is a normal HTML document
<br>
<script language=”JavaScript”>
Document.write (“this is a java script”)
</script><b r>
Backing HTML again
</body>
</html>
If you are using a java script enabled-browser at the moment then you will
have the possibility to see this script working. If your browser doesn’t support
Java Script then this output might be some kind of strange…
This is a normal HTML document
This is java script!
Back in HTML again.
Functions
Functions are bet declared between the <Head> tag of HTML page. Functions
are called by user-initiated events. Seems reasonable to keep the functions
between the <Head> tags. They are loaded first before a user can do anything
that might call a function. Scripts can be placed between inside comment
fields to ensure that older browser do not display the script itself.
<html>
<head>
<script language=”JavaScript”>
function pushbutton ()
{
alert (“Hello!”);
}
</script>
26
</head>
<body>
<form>
<input type=”button” name=”Button1” value=”push me” onclick=”pushbutton
()”>
</form>
</body>
</html>
If we want to test this one immediately and you are using a Java Script
enabled browser then please go ahead and push the button.
This script will create a button and when you press it a window will pop up
saying “hello!” In fact we have a lot of possibilities just by adding functions to
our scripts.
The common browsers transmit the form information by either method:
here’s the complete tag including the GET transmission method attribute for
the previous form
Example
Input elements.
Use the <input> tag to define any one of a number of common form elements
including text fields multiple choice lists click able images and submission
buttons. There are many attributers for this tag only that types and name
attributes are required for each element, each type of input element uses only a
subset of the followed attributes. Additional <input> attributes may be
required based upon which type of the form element you specify.
27
Submit button:
The submit button (<input type=submit>) does what its name implies, settings
in motion the form’s submission to the server from the browser. We many
have more than submit buttons will be added to the parameter list the browser
sends along to the server.
Example
< Input type =”submit”>
<Input type=”submit” value=”submit” name=”name”>
Reset button:
The reset button if firm <input> button is nearly self- explanatory; it lets the
user reset erase or set to some default value all elements in the form. By
default the browser displays a reset button worth the label “reset”. We can
change that by specifying a value attribute with tour own button label.
FEASIBILITY STUDY:
The system has been tested for feasibility in the following points.
1. Technical Feasibility
2. Economical Feasibility
3. Operational Feasibility.
28
Technical Feasibility
The project entitles "Courier Service System” is technically
feasibility because of the below mentioned feature. The project was developed
in Java which Graphical User Interface.
Economical Feasibility
Operational Feasibility
In this project, the management will know the details of each project
where he may be presented and the data will be maintained as decentralized
and if any inquires for that particular contract can be known as per their
requirements and necessaries.
Implementation:
29
The system can be implemented only after thorough testing is done and if it is
found to work according to the specification.
The more complex the system being implemented, the more involved will be
the systems analysis and design effort required just for implementation.
TESTING:
The testing phase is an important part of software development. It is the
computerized system will help in automate process of finding errors and
missing operations and also a complete verification to determine whether the
objectives are met and the user requirements are satisfied.
30
2. The second step includes Integration testing. It need not be the
case, the software whose modules when run individually and showing perfect
results, will also show perfect results when run as a whole. The individual
modules are clipped under this major module and tested again and verified the
results. This is due to poor interfacing, which may results in data being lost
across an interface. A module can have inadvertent, adverse effect on any other
or on the global data structures, causing serious problems.
Correction
Adaptation
Enhancement
Prevention
31
Correction:
Even with the best quality assurance activities is lightly that the customer
will uncover defects in the software. Corrective maintenance changes the
software to correct defects.
Corrective Maintenance
Adaptive Maintenance
Perfective Maintenance or Enhancement
Preventive Maintenance or reengineering
Only about 20 percent of all maintenance work are spent "fixing mistakes".
The remaining 80 percent are spent adapting existing systems to changes in
their external environment, making enhancements requested by users, and
reengineering an application for use.
ADAPTATION:
ENHANCEMENT:
32
As software is used, the customer/user will recognize additional functions
that will provide benefit. Perceptive maintenance extends the software beyond
its original function requirements.
PREVENTION:
SOFTWARE METHODOLOGY
33
described in detail since it continues to be an appropriate methodology for a
significant part of new development work.
The basic idea of the system development life cycle is that there is a
well-defined process by which an application is conceived and developed and
implemented. The life cycle gives structure to a creative process. In order to
manage and control the development effort, it is necessary to know what
should have been done, what has been done, and what has yet to be
accomplished. The phrases in the system development life cycle provide a
basis for management and control because they define segments of the flow of
work, which can be identified for managerial purposes and specifies the
documents or other deliverables to be produced in each phase.
The phases in the life cycle for information system development are
described differently by different writers, but the differences are primarily in
the amount of necessity and manner of categorization. There is a general
agreement on the flow of development steps and the necessity for control
procedures at each stage.
The information system development cycle for an application consists of three
major stages.
Definition.
Development.
Installation and operation.
The first stage of the process, which defines the information requirements for
a feasible cost effective system. The requirements are then translated into a
physical system of forms, procedures, programs etc., by the system design,
computer programming and procedure development. The resulting system is
test and put into operation. No system is perfect so there is always a need for
maintenance changes. To complete the cycle, there should be a post audit of
the system to evaluate how well it performs and how well it meets the cost and
performance specifications. The stages of definition, development and
installation and operation can therefore be divided into smaller steps or phrases
as follows.
34
Definition
Design
Development
35
SECTION 3
36
Software Engineering
The basic objective of software engineering is to: develop methods
and procedures for software development that can scale up for large
systems and that can be used to consistently produce high quality
software at low cost and with a small cycle time. That is, the key
objectives are consistency, low cost, high quality, small cycle time,
and scalability.
1) Requirement Analysis
Requirement analysis is done in order to understand the problem the
software system is to solve. The problem could be automating an
existing manual process, developing a new automated system, or a
combination of the two. The amphasis in requirements analysis is on
identifying what is needed from the system, not how the system will
achieve its goals. There are atleast two parties involved in the
software development-a client and a developer. The developer has
to develop the system to satisfy the client’s needs. The developer
does not understand the client’s problem domain, and the client
does not understand the issues involved in the software systems.
This causes a communication gap, which has to be adequately
bridged during requirements analysis.
2) Software Design
The purpose of the design phase is to plan a solution of the problem
specified by the requirements documents. This phase is the first step
in moving from the problem domain to the solution domain. Starting
with what is needed, design takes us toward how to satisfy the
needs. The design of a system is perhaps the most critical factor
affecting the quality of the software. It has a major impact on the
later phases, particularly testing and maintenance.
37
The design activity is divided into two phases: System Design and
Detailed Design. In system design the focus is on identifying the
modules, whereas during detailed design the focus is on designing
the logic for each of the modules.
3) Coding
The goal of the coding phase is to translate the design of the system
into code in a given programming language. Hence during coding,
the focus should be on developing programs that are easy to read
and understand, and not simply on developing programs that are
easy to write.
4) Testing
Testing is the major quality control measure used during software
development. Its basic function is to detect errors in the software.
Testing not only uncover errors introduced during coding, but also
errors introduced during the previous phases. Thus, the goal of the
testing is to uncover requirement, design and coding errors in the
programs. Therefore, different levels of testing are used. Testing is
an extremely critical and time consuming activity. It requires proper
planning of the overall testing process. The output of the testing
phase is the test report and the error report. Test report contains
the set of test cases and the result of executing the code with these
test cases. The error report describes the errors encountered and
the action taken to remove the errors.
5) Implementation
It is the process of having systems personnel check out and put new
equipment into use, train users, install the new application and
construct any files of data needed to use it. This phase is less
creative than system design. Depending on the size of the
organization that will be involved in using the application and the
risk involved in its use, systems developers may choose to test the
operation in only one area of the firm with only one or two persons.
Sometimes, they will run both old and new system in parallel way to
compares the results.
Paradigm Applied
In this project,The Spiral Model is applied in order to provide rigid
efficiency and functionality in the overall working style of the
project.Moreover, In order to cater to new or modified requirements
of the user, Spiral model is very effective .I used “The Spiral model”
as it is best suited to those development environments where
probability of uncertainity is very high and chances of mistakes are
uncontrollable.
38
What about Spiral Model?
The spiral model is a software development process combining
elements of both design and prototyping-in-stages, in an effort to
combine advantages of top-down and bottom-up concepts. Also
known as the spiral lifecycle model, it is a systems development
method (SDM) used in information technology (IT). This model of
development combines the features of the prototyping model and the
waterfall model. The spiral model is intended for large, expensive
and complicated projects.
39
1. Evaluating the first prototype in terms of its strengths,
weaknesses, and risks;
Advantages
40
SECTION 4
41
The Methodology:
I was assigned the duty for developing a computerized system for a
fitness center. The project time and resources were very limited .
The optimum use of practical time neccessiates that every session
and every activity is planned. For effective Planning ,Efficient Project
Managerial skils are required,Efficiant skills then trace out best
methodology to be used.
The methodology used by me includes the following things:
Topic Understanding:
It is vital that the field of application as introduced in the project
may be totally a new field. So as soon as the project was allocated
to me, I carefully went through the project requirements to identify
the requirements of the project.
MEMBER DETAILS
i. Member id
ii. Name
iii. Gender
MEMBERSHIP DETAILS
i. Membership type
ii. Expiration date
MEMBERSHIP DETAILS
i. Address
ii. Date of birth
iii. Phone number
ACCOUNT INFORMATION
42
i. Due date
ii. Amount Due
iii. Amount Paid
iv. Days late
v. Balance
After processing all this information records are saved and in this
module itself there is a provision for report generation for viewing
details of all the members.
There is also a provision for generating a receipt for an individual
member thus agin giving some of his relevant details.
43
It facilitates the owner to place an order and based on the
category of the product(apparels,beverages,supplements)
following information is displayed along includin the
provision for order placement:
a.Category
b.Id
c.Description
d.Brand
e.Supplier
f.Number of cases
g.Quantity in each case
h.Case Price
i.Sales Price
j.Order Date
3. PRODUCTS
Generates an inventory record of the product based on the
product category selected and displays the following
information:
a.Category
b.Id
c.Description
d.Brand
e.Supplier
f.Number of cases
g.Quantity in each case
h.Quantity ordered
i.Case Price
j.Sales Price
k.Order Date
l.Last ordered
m.Last inventory
It also provides the facility of generating reports of all the
products of a paticular category.
44
SECTION 5
DESIGN
45
5.1 DATA FLOW DIAGRAM (DFD)
DFD is a model, which gives the insight into the information domain
and functional domain at the same time. DFD is refined into
different levels. The more refined DFD is, more details of the
system are incorporated. In the process of creating a DFD, we
decompose the system into different functional subsystems. The
DFD refinement results in a corresponding refinement of data.
Following is the DFD of the “Proposed System”. We have refined the
system up to two levels. Each break-up has been numbered as per
the rule of DFD. We have tried to incorporate all the details of the
system but there is some chance of further improvisation because of
the study that is still going on for the project development.
Member details
Database Operations on
MEMBERS record
Member list
Database Operations on
Reciept
GYM EMPLOYEES record
CENTER’S Member’s Record
RECORD
MANAGEMEN Database Operations on
Employee details
-T SYSTEM INVENTIRY record
Employee schedule
IInventory(orders
and products)
46
5.2 DATABASE DESIGN
Introduction
Database
A Database is the systematic collection of logically related Data
with some inherent purpose to access and operate on various
different data stored in the form of records so as to raise the ease
and esfficiancy in data Handelling.
Relational database
Database Tables
47
5.3 ENTITY-RELATIONSHIP DIAGRAM
48
SECTION 6
SOURCE CODE
49
50
SECTION 7
SCREEN LAYOUTS
51
Homepage
AboutPage
52
Services
Gallery
53
AdminLogin
StaffLogin
54
UserLogin
NewUserPage
55
ContactPage
AdminMainPage
56
AddStaffPage
AddPlanPage
57
AdminViewReportsPage
AdminViewUsersPage
58
ADMINVIEWSTAFFSPAGE
Adminviewplanspage
59
AdminViewContactsPage
60
SECTION 8
TESTING
61
Levels of Testing:
Systems are not designed as entire systems nor are they tested as
single systems. The analyst must perform both unit and system testing.
Unit Testing:
In unit testing the analyst tests the programs making up a
system. For this reason, unit testing is sometimes called program
testing. Unit testing gives stress on the modules independently of
one another, to find errors. This helps the tester in detecting
errors in coding and logic that are contained within that module
alone. The errors resulting from the interaction between modules
are initially avoided. The test cases needed for unit testing should
exercise each condition and option.
Unit testing can be performed from the bottom up, starting with
smallest and lowest-level modules and proceeding one at a time.
For each module in bottom-up testing a short program is used to
execute the module and provides the needed data, so that the
module is asked to perform the way it will when embedded within
the larger system.
System Testing:
The important and essential part of the system development
phase, after designing and developing the software is system
testing. We cannot say that every program or system design is
perfect and because of lack of communication between the user
and the designer, some error is there in the software
development. The number and nature of errors in a newly
designed system depend on some usual factors like
communication between the user and the designer; the
programmer's ability to generate a code that reflects exactly the
systems specifications and the time frame for the design.
62
Another reason for system testing is its utility as a user-oriented
vehicle before implementation.
1) Program Testing
A program represents the logical elements of a system. For a
program to run satisfactorily, it must compile and test data
correctly and tie in properly with other programs. it is the
responsibility of a programmer to have an error free program. At
the time of testing the system, there exists two types of errors
that should be checked. These errors are syntax and logic. A
syntax error is a program statement that violates one or more
rules of the language in which it is written. An improperly defined
field dimension or omitted key words are common syntax errors.
These errors are shown through error messages generated by the
computer. A logic error, on the other hand, deals with incorrect
data fields out of range items, and invalid combinations. Since
the logical errors are not detected by compiler, the programmer
must examine the output carefully to detect them.
When a program is tested, the actual output is compared with the
expected output. When there is a discrepancy, the sequence of
the instructions, must be traced to determine the problem. The
process is facilitated by breaking the program down into self-
contained portions, each of which can be checked at certain key
points.
2) String Testing
Programs are invariably related to one another and interact in a
total system. Each program is tested to see whether it conforms
to related programs in the system. Each part of the system is
tested against the entire module with both test and live data
before the whole system is ready to be tested.
3) System Testing
System testing is designed to uncover weaknesses that were not
found in earlier tests. This includes forced system failure and
validation of total system as it will be implemented by its user in
the operational environment. Under this testing, generally we
take low volumes of transactions based on live data. This volume
is increased until the maximum level for each transaction type is
reached. The total system is also tested for recovery and fallback
after various major failures to ensure that no data are lost during
the emergency. All this is done with the old system still in
operation. When we see that the proposed system is successful in
the test, the old system is discontinued.
63
4) System Documentation
All design and test documentation should be well prepared and
kept in the library for future reference. The library is the central
location for maintenance of the new system.
64
SECTION 9
IMPLEMENTATION
65
After completing the packaging process and produced distribution
media for the application, The application requires perfectly working
Microsoft Visual Studio 6.0 installed on the client system along with Ms
Offfice Access. It can run on all applicable operating systems.
REQUIREMENT ANALYSIS
HARDWARE REQUIREMENTS
SOFTWARE REQUIREMENTS
Database :MySQL.
Documentation :MS-Office
66
IMPLEMENTATION
Conversion
Direct Implementation
67
SECTION 10
MAINTAINENCE
68
MAINTENANCE
69
SECTION 11
CONCLUSION
70
The objective of this project was to build a program for maintaining the
details of all the members,employees and inventory .The system
developed is able to meet all the basic requirements. The management
of the records (both members and employees)will be also benefited by
the proposed system, as it will automate the whole procedure, which
will reduce the workload. The security of the system is also one of the
prime concerns.
71
SECTION 12
BIBLIOGRAPHY
72
Bibliography
73