Вы находитесь на странице: 1из 61

Learning Reg Updation Licence Learning Reg Updation Licence Renewal RTO USER Management Permanent Permanent USER

Licence Licence New RTO Search Reg Registration MANAGEMENT USER Reg Search RESPONSE Duplicate Registration REQUEST Licence NEWREG Renewal LEARNERS Duplicate LOGIN ID Licence PERMENT

Project Report

INTRODUCTION

M.M.N.S.S College, Konni

Dept Of Computer Science

RTO Management

Project Report

1.1 ABOUT THE PROJECT


The software RTO MANAGEMENT provides better and efficient service to transport administrator. This software makes the license activities of drivers more smoothened. This software provides the facilities of maintaining the details of registration and license. In this the administrator and the user can update each and every. Administrator can easily manage the software. This project deals with replacing manual functions of license by computerizing all the functions involved in it. We can improve the efficiency of the system, thus overcome the drawbacks of the existing system. Management of license by manual way is tedious process, since it involves work load and time consumption .In this system, we can easily manage the details of new registration, learners license permanent license, renewal and duplicate license. The main features of this project is easy to register for a new license and store the details .All details will be available on a click.

1.2OBJECTIVES OF PROJECT
The main objective of our project is to overcome the drawbacks of existing system. Manual system processing makes the problem slow and other problem such as inconsistency and ambiguity on operations inspire all of these, lots of paper works is also required currently which in turn results in difficulty for retrieving information .The proposed system intends user friendly operations ,which may resolve ambiguity .Hence make the software user friendly and interactive.

Objectives of the software


New Registration details. Learning License details Renewal details. Duplicate License details

M.M.N.S.S College, Konni

Dept Of Computer Science

RTO Management

Project Report

REQUIREMENT ANALYSIS

2.1 INTRODUCTION
M.M.N.S.S College, Konni

Dept Of Computer Science

RTO Management

Project Report

System analysis is for finding out what happens in existing system deciding on what changes and new features are required and defining exactly what the proposed system must be. The process of the system analysis is largely concerned with determining, developing and agreeing to the users requirement .It provides prime opportunity to communicate well with the user and conceive a joint understanding of what a system should be doing together with a view of relative importance of the system facilities using interactive techniques.

2.2 REQUIREMENT ANALYSIS


Requirement analysis is the process of analyzing the requirements with the potential goal of improving or modifying it .Requirement analysis is an important phase during any application development .Mainly it contains the analyzing phase of the existing system and its features and the proposed system. Analyzing its advantages and disadvantages the proposed system can be designed which can avoid all the complexities, inabilities and the disadvantages of the existing system. The new systems requirements are defined during this phase .The requirements of the desired software product are extracted. To design a new system, we need the requirements of the system and the description of the system .Based the business scenario the software requirement specification document is prepared in this phase .The purpose of this document is to specify the functional requirement of the software that is to be build. The specification is intended to guide the group through the development process. It explains all the process, activities, relationships and all other organizational objectives. Requirement analysis is done in order to understand the problem with which the software system to solve. For example, the problem could be automating an existing manual process or developing a completely new automated system or the combination of two. For large systems that have large number of features and need to perform many different tasks, understanding the requirements of the system is a major task. The emphasis in requirement analysis is on identifying what is needed from the system and not how the system will achieve its goal .This task is complicated by the fact that there are often at least two parties involved in software development, a client and a developer.

M.M.N.S.S College, Konni

Dept Of Computer Science

RTO Management

Project Report

The goal of this activity is to understand the requirements of the new system to be developed. Requirement analysis understands the user requirements within the framework of the organizations objectives and the environment in which the system is being installed. Users requirements have been identified as follows:

Pre-defined Questions
o

It allows analyst to collect information about the various aspects of the system from large number of persons the use of standardized question format can yield more reliable data than other technique.

Questionnaire
o

Analysts use questionnaire to collect information from individuals or from groups .The respondents are generally current users of the existing system.

2.3 FEASIBILITY STUDY


Feasibility study is a test of system proposed regarding its workability, impact on the organization, ability to meet the needs and effective use of resources. Thus, when a new project is proposed, it normally goes through a feasibility study before it is approved for development. A feasibility study is made to see if the project on completion will serve the purpose of the organization for the amount of work, effort and the time that is spend on it. Feasibility study lets the developer foresee the future of the project and its usefulness. All the projects are feasible given unlimited resources and infinite time. Unfortunately, the development of the computer-based system is more likely to be played by a security of resources and difficulty delivery dates. Feasibility and risk analysis are related in many ways. If project risk is great, the feasibility of producing the quality software is reduced.

Steps in Feasibility Study


Feasibility Study involves eight steps:

Form a project team and appoint a project leader. Prepare a system flow chart. Enumerate potential candidate systems.

M.M.N.S.S College, Konni

Dept Of Computer Science

RTO Management

Project Report

Describe and identify characteristics of candidate systems. Describe and evaluate performance and cost effectiveness of each candidate systems. Weight system performance and cost data. Select the best candidate system. Prepare and report final project directive and management. Mainly three key considerations are involved in the feasibility analysis. Economic Feasibility

Economical Feasibility Technical Feasibility Operational Feasibility

2.3.1 Economical Feasibility


The study is carried out to check the economic impact that the system will have on the organization. The amount of fund that the company can pour into the research and development of the system is limited, the expenditures must be justified. Thus the developed system was well within the budget and this was achieved because most of the technologies used are freely available .Only customized had to be purchased.

2.3.2 Technical Feasibility


Technical Feasibility centers on the existing computer system (hardware, software, etc) and to what extend it can support the proposed addition. For example, if the current computer is operating at 80 percent capacity, an arbitrary ceiling, then running another application could over load the system or require additional hardware. judged not feasible. This involves financial considerations to accommodate technical enhancements. If the budget is a serious constraint, then the project is

M.M.N.S.S College, Konni

Dept Of Computer Science

RTO Management

Project Report

2.3.3 Operational Feasibility


The main problem faced during development of a new system is getting acceptance from the user. People are inherently resistant to changes and computers have been known to facilitate change. It is mainly related to human organizational and political aspects.

The points to be considered are:


What changes will be brought with the system? What new skills will be required? Do the existing staff members have these skills? If not, can they be trained due course of time? Generally, project will not be rejected simply because of operational feasibility but

such considerations are likely to critically affect the nature and scope of the eventual recommendations. This feasibility study is carried out by a small group of people who are familiar with information system techniques, who understand the parts of the business that are relevant to the project and are skilled in skilled analysis and design process.

2.4 EXISTING SYSTEM


This phase of the study deals with the efforts to study the existing system that is more used in the organization, for which the new system is proposed. It involves the use of various methods for data acquiring of the existing system. The methods that we used for this purpose are:

Observation Using the existing system Review of documents Interviews Discussion

M.M.N.S.S College, Konni

Dept Of Computer Science

RTO Management

Project Report

It is found that the existing system was developed manually. All the day-today activities are kept in separate files. It is difficult to handle all these files simultaneously. To get even a single detail, users have to search through multiple files. It is difficult to manage the details for large volume. To make reports about the transaction and to search details of a particular employee is highly time consuming. Making correction or updating a single record is very tedious and time consuming. Updating a single record requires synchronous updating all the related files, which is time consuming. Hence it is more efficient to have a database system where all details are kept in and helps to manipulate data easily.

Drawbacks of the existing system:


A large amount of paper work is involved.

Redundancy of data. Since it was manual it is less secure Getting information is tedious and time-consuming. To get information, a number of files must be searched. Updating of files is difficult. Overall efficiency is less. Need for large storage area

2.5 PROPOSED SYSTEM


The main objective of the system is to make more sufficient and highly user friendly automated system, which will produce and provide the information that will support the management in fulfilling it tasks. There is a security feature built in to the system since all information in the database is confidential and is therefore accessed only by the authorized users the access is given only to a correct password entry. Error handling has been done efficiently. Errors that could happen during data entries are informed to user. It is ensured that only valid data can be entered.

M.M.N.S.S College, Konni

Dept Of Computer Science

RTO Management

Project Report

The system is designed to work environment. Input screens are properly designed using forms. It is easy for end user to work with. Screen designing is done efficiently. This makes it more user-friendly. Data field are normalized. Benefits

Provide password security for administrator, staff to prevent unauthorized access Content referencing is a faster process. Simple and user friendly. Above all managing a document manually requires a lot of time and effort. If

of data.

the process is computerized time and human effort can be reduced considerably. Computerization can make the management of documents easier as it would be easy to add a new document, view all the documents. Searching can also be done effectively by specifying either the beginning letter of the document or a keyword in it. This is the ultimate aim of the project.

M.M.N.S.S College, Konni

Dept Of Computer Science

RTO Management

Project Report

SYSTEM DESIGN AND DEVELOPMENT

3.1 INTRODUCTION

M.M.N.S.S College, Konni

10

Dept Of Computer Science

RTO Management

Project Report

Design is the first step in the development phase of any system. It may be defined as the process of applying various techniques and principles for the purpose of defining a device, a process or a system in sufficient detail to permit its physical realization. The design steps are:

3.2 SYSTEM DESIGN


Design has been described as a multistep process in which representation of data structures, program structure, interface characteristics and procedural details are synthesized from information requirements .This important phase compared of several recommended in the study. Emphasis is given on translating performance into the design specifications. Design goes through the logical and physical stages of development. Logical design reviews present physical system prepares input and output specification, makes edit, security and control specifications, and detailed plan and prepares logical design walkthrough. The physical design plans the system implementation devices a test implementation and specifies any new hardware and software.

3.3 INPUT DESIGN


The user interface design is very important for any application. The interface design defines how the software communicates with in itself, to system that interpreted with it and with human who use it. The interface design is very good; the user will fall into an interactive software application. The term describes a final system and the processes by which it is developed. It refers to the technical specifications that will be applied in implementing the candidate system. It also includes the construction of programs and the program testing. Input design is the process of converting user-oriented inputs to a computer based format. The data is fed into the system using simple interactive forms. The forms have been supplied with messages so that user can enter data without facing any difficulty. The data is validated wherever it requires in the project. This ensures that only the correct data have been incorporated into the system. Inaccurate processing of data is the most common cause of errors in data processing. Errors entered by data entry operators can be controlled by correct input design. This type of input design allows user to input only the required data into the processing units and also these input from check for validation of the input values, thus preventing errors. The general input forms also check for or even
M.M.N.S.S College, Konni

11

Dept Of Computer Science

RTO Management

Project Report

prevent data duplication as well as even deletion of important data.

The goal of

designing input interface is to make data entry as easy, logical and error free as possible, inputs are made using dialogues and data validations are done at the time of data input. The input design is made into user-friendly atmosphere where the user can perform the daily routine work without any ones help. The user friendly environment created by the input design helps the end user to use the software in a more flexible way and even the wrong entries by the user is correctly pointed out to the user. The goal of designing input data is to make the automation easy and free from errors as possible. For providing a good input design for the application, easy data input and selection features are adopted.

3.4 OUTPUT DESIGN


A quality output is one, which meets the requirements of the end user and presents the information clearly. In any systems, results of processing are communicated to the user and to their systems through outputs. In the output design, it is determined how the information is to be displayed for immediate need and also the hard copy output. Computer output is the most important source of information to the user. Output design follows the principles of form design. The major idea of output is to convey information so its layout and design need careful consideration. Efficient, intelligible output design improves the system relationship with the users and help in making decisions. The output designs decide how well the implementation of the system has been useful to the user. The output design should be understandable to the user and it must offer great convenience. The one who look into the reports or output will get the impression of how well the system performs. The objective of the output design is to convey the information of all the past activities, current status and emphasize important events. The output generally refers to the results and information that is generated from the system. Outputs from the computers are required primarily to communicate the result of processing to the users. They are also used to provide a permanent copy of these results for later consideration.

M.M.N.S.S College, Konni

12

Dept Of Computer Science

RTO Management

Project Report

3.5 DATABASE DESIGN


The most important aspect of building an application is the design of database. The data they store must be according to the user requirement. A well designed database is essential for the good performance of the system. A database table known as a relation provides information related to specify entity. The basic functions involved in a database system related to the information required by the user.

3.5.1 Data Normalization


The most important aspect of building an application is the design of database. The data they store must be according to the user requirement. A well designed database is essential for the good performance of the system. A database table known as a relation provides information related to specify entity. The basic functions involved in a database system related to the information required by the user. The data to eliminate redundancy and make sure that the data is associated with the correct table or relationship It helps in,

Minimization of duplication of data

Enabling the model to be translated to database design All relations in a relational database are required to satisfy the following conditions

Data in First Normal Form


Remove repeating data from table From the removed data ,create one or more tables and relationships

Data in Second Normal Form


Identify tables and relationships with one or more than one key Remove data that depends on only one part of the key From the removed data, create one or more tables and relationships

M.M.N.S.S College, Konni

13

Dept Of Computer Science

RTO Management

Project Report

Data in Third Normal Form

Remove that depends on other hand in the table or relationships

From the removed data , create one or more tables and relationships

Advantages of normalization are


Helps in the complexity of maintaining data relationships It reduces inconsistency of data Eliminate the repeating fields Create a row for each occurrence of a repeated field Allows exploitation of column function

The second normal form has the characteristics of the first normal form and all the attributes must fully be depend on the primary key .the proposed system is using second normal form as it is found most suitable

3.5.2 Table Design

This is one of the major tasks in designing the database. It is important to realize that the design of the system is totally interrelated and so table design cannot really be considered in isolation from inputs, outputs, procedures, codes and security requirements

M.M.N.S.S College, Konni

14

Dept Of Computer Science

RTO Management

Project Report

DATA BASE NAME: PRTO TABLE DESIGN *Primary key **Foreign key

TABLE:-Login
FIELD NAME *username Pass DATA TYPE Varchar() Varchar() SIZE 20 20 FIELD DESCRIPTION Username Password CONSTRAINTS Primary Key Not Null

TABLE:-Registration Table
FIELD NAME *regno Rdate Name Swdof Address Phno Bg Gender Dob Nat Sta DATA TYPE Varchar() Date Varchar() Varchar() Varchar() Varchar() Varchar() Varchar() Date Varchar() Varchar() SIZE 20 25 25 50 20 10 10 20 20 FIELD DESCRIPTION Register Number Registration Date Name Son/Wife/Daughter of Address Phone Number Blood Group Gender Date Of Birth Nationality State CONSTRAI NTS Primary Key Not Null Not Null Not Null Not Null Not Null Not Null Not Null Not Null Not Null Not Null

M.M.N.S.S College, Konni

15

Dept Of Computer Science

RTO Management

Project Report

Dist Id idno Vt Moi1 Moi2 Phh

Varchar() Varchar() Varchar() Varchar() Varchar() Varchar() Varchar()

20 25 20 30 50 50 10

District Id Proof Identity Number Vehicle Type Mark of identification Mark of identification Physically Handicapped

Not Null Not Null Not Null Not Null Not Null Not Null Not Null

TABLE:-Image Details
FIELD NAME **Regno Photo DATA TYPE Varchar() Varchar() SIZE 20 100 FIELD DESCRIPTION Register Number photo CONSTRAINTS Foreign Key Not null

TABLE:-Medical Fitness (Eye) Details


FIELD NAME **Regno Dr Date Name Ph Nb Sq Fh DATA TYPE Varchar() Varchar() Date Varchar() Varchar() Varchar() Varchar() Varchar() SIZE 20 20 20 50 10 10 10 FIELD DESCRIPTION Register Number Doctor Name Date Tested Name Photograph Of The Candidate Night Blindness Squint Field Horizontal CONSTRAINTS Foreign Key Not Null Not null Not null Not null Not null Not null Not null

M.M.N.S.S College, Konni

16

Dept Of Computer Science

RTO Management

Project Report

Fv Fre Fle Cdfl

Varchar() Varchar() Varchar() Varchar()

10 30 30 10

Field Vertical Funds Right Eye Funds Left Eye Candidate Fit Or Unfit

Not null Not null Not null Not null

TABLE:-Medical Fitness (Physical) Details


FIELD NAME **Regno Dr Date Name A B C D E DATA TYPE Varchar() Varchar() Date Varchar() Varchar() Varchar() Varchar() Varchar() Varchar() SIZE 20 20 -25 10 10 10 10 10 FIELD DESCRIPTION Register Number Doctor Name Tested date Name Corrected By Spectacle Loss Of Consciousness Pigmentary Color Dafness Quantity CONSTRAINTS Foreign Key Not null Not null Not null Not null Not null Not null Not null Not null

TABLE:-Learners Licence Details


FIELD NAME **Regno Name Date Pass Tmpadd Vfm Vto M.M.N.S.S College, Konni DATA TYPE Varchar() Varchar() Date Varchar() Varchar() Date Date SIZE 20 30 -10 20 --FIELD DESCRIPTION Register Number Name Learners Date Test Pass Or Fail Temporary Address Validity From Validity To CONSTRAINTS Foreign Key Not null Not null Not null Not null Not null Not null

17

Dept Of Computer Science

RTO Management

Project Report

*licno

Varchar()

20

Licence Number

Primary Key

TABLE:-Permanent Licence Details


FIELD NAME **Regno **Licno Name Date Vfm Vto Vtyp Isd DATA TYPE Varchar() Varchar() Int Date Varchar() Bigint Date Varchar() SIZE 20 20 30 ---30 -FIELD DESCRIPTION Register number Licence Number Name Licence Date Validity From Validity To Vehicle Type Date Of First Issue CONSTRAINTS Foreign Key Foreign Key Not null Not null Not null Not null Not null Not null

3.6 DATA FLOW DIAGRAM


A data flow diagram is a graphical technique that depicts information flow and transforms that are applied as data move from input to output. The DFD is also known as Data Flow Graph or Bubble Chart. The DFD is used to represent increasing information flow and functional details. Also DFD can be stated as the starting point of the design phase that functionally decomposes the requirements specifications down to the lowest level of detail. A Level 0 also called a fundamental system model or a context level DFD that represent the entire software elements as a single bubble with input and output data indicated by incoming and outgoing arrows, respectively. Additional process and information flow parts are represented in the next level, i.e., level 1 DFD. Each of the processes represented at level 1 are sub functions of overall system depicted in the context model. Any processes that are complex in level 1 will be further represented into sub functions in the next level, i.e., level 2.

M.M.N.S.S College, Konni

18

Dept Of Computer Science

RTO Management

Project Report

Data flow diagram is a means of representing a system at any level of detail with a graphic network of symbols showing data flows, data stores, data processes and data sources. The purpose of data flow diagram is to provide a semantic bridge between users and system developers. The diagram is the basis of structured system analysis. A DFD describes what data flows rather than how they are processed, so it does not depend on hardware, software, data structure or file organization. Components of Data Flow Diagram There are four symbols that are used in the drawing of Data Flow Diagrams: Entities

External entities represent the sources of data that enter the system or the recipients of data that leave the system. Process

Processes represent activities in which data is manipulated by being stored or retrieved or transformed in some way. A circle represents it. The process will show the data transformation or change.

Databases

Databases represent storage of data within the system Data flow

M.M.N.S.S College, Konni

19

Dept Of Computer Science

RTO Management

Project Report

A data flow shows the flow of information from its source to its destination. A line represents a data flow, with arrowheads showing the direction of flow.

RTO MANAGEMENT DFD

LEVEL - 0

M.M.N.S.S College, Konni

20

Dept Of Computer Science

RTO Management

Project Report

LEVEL -1

LEVEL -1.1

M.M.N.S.S College, Konni

21

Dept Of Computer Science

RTO Management

Project Report

SYSTEM IMPLEMENTATION

4.1 INTRODUCTION
The implementation is the final stage and its an important phase. It involves the individual programming, system testing, user training and the operational running of developed proposed system that constitute the application subsystems. One major task of preparing for

M.M.N.S.S College, Konni

22

Dept Of Computer Science

RTO Management

Project Report

implementation is education of users, which should really have been taken place much earlier in the project when they were being involved in the investigation and design work. During this implementation phase system actually takes physical shape.

4.2 SYSTEM SPECIFICATIONS


4.2.1 Hardware Specification
1. Machine 2. Processor 3. Clock Speed 4. Hard disk drive 5. RAM IBM PC Compatible Intel Pentium 120 MHz/Higher 10 GB or more 256MB or above RAM

4.2.2 Software Specifications


The importance of software selection lies in the fact that the selected software should be able to handle the objectives and features of the proposed system 1. Operating System 2. Front End 3. Back End Windows XP or above (java) Net Beans 5.5 Microsoft SQL server

4.3 SOFTWARE REQUIREMENTS


4.3.1 JAVA
Java is a programming language introduced by Sun Micro Systems and is based on the concepts of C and C++. The syntax for the Java language is similar to C language. This

M.M.N.S.S College, Konni

23

Dept Of Computer Science

RTO Management

Project Report

language introduced in 1995 by James Gosling and is initially called OAK. Java is sequence and portable language. Java is popularly used to build programs that can work on the internet. Java is not only used for stand-alone applications and internet based programs, but it is also used to create consumer devices and programs form accessories. Features of Java: Simple Object-oriented Compiler and interpreter Platform independence Robust Secure Distributed Multithreaded

4.3.2 Microsoft SQL server


Microsoft SQL Server is an application used to create computer databases for the Microsoft Windows family of server operating systems. Microsoft SQL Server provides an environment used to generate databases that can be accessed from workstations, the Internet, or other media such as a personal digital assistant (PDA). SQL Server 2005 SQL Server 2005(codename Yukon), released in October 2005, is the successor to SQL Server 2000. It included native support for managing XML data, in addition to relational data. For this purpose, it defined an XML data type that could be used either as a data type in database columns or as literals in queries. XML columns can be associated with XSD schemas; XML data being stored in the database. Specialized indexing methods were made available for XML data. XML data is queried using Query; Common Language Runtime (CLR) integration was a main feature with this edition, enabling one to write SQL code as Managed Code by the CLR. SQL Server 2005 added some extensions to the T-SQL language to allow embedding Query queries in T-SQL. In addition, it also defines a new extension to Query, called XML DML that allows query-based modifications to XML data. SQL Server 2005 also allows a database server to be exposed over web services using TDS packets encapsulated within SOAP (protocol) requests. When the data is accessed web services, results are returned as XML.

M.M.N.S.S College, Konni

24

Dept Of Computer Science

RTO Management

Project Report

For relational data, T_SQL has been augmented with error handling features (try/catch) and support for recursive queries with CTEs (Common Table Expressions). SQL Server 2005 has also been enhanced with new indexing algorithms, syntax and better recovery systems. Data pages are checked summed for better error resiliency, and optimistic concurrency support has been added for better performance. Permissions and access control have been made more granular and the query processor handles concurrent execution of queries in a more efficient way. Partitions on tables and indexes are supported natively, so scaling out a database onto a cluster is easier. SQL CLR was introduced with SQL Server 2005 to let it integrate with .NET Framework. SQL Server 2005 introduced DMVs (Dynamic Management Views), which are specialized views and functions that return server state information that can be used to monitor the health of a server instance, diagnose problems, and tune performance. SQL Server 2005 introduced Database Mirroring, but it was not fully supported until the first Service Pack release (SPI). In the initial release (RTM) of SQL Server 2005, database mirroring was available, but unsupported. In order to implement database mirroring in the RTM version, you had apply trace flag 1400 at startup. Database mirroring is a high availability option that provides redundancy and failover capabilities at the database level. Failover can be performed manually or can be configured for automatic failover. Automatic failover requires a witness partner and an operating mode of synchronous (also known as high-safety or full safety).

4.3.3 Net Beans IDE 5.5


Net Beans IDE is a modular, standards-based integrated development environment (IDE), written in the java programming language. The Net Beans project consists of an open source IDE written in the Java programming language and an application platform, which can be used as a generic framework to build any kind of application. Net Beans IDE runs on operating systems that support the Java VM (Virtual Machine).

SWING COMPONENTS
Swing components facilitate efficient Graphical User Interface development. These components are collection of light weight component. Swing components contain a replacement for the heavyweight AWT components, as well as complex user interface components such as

M.M.N.S.S College, Konni

25

Dept Of Computer Science

RTO Management

Project Report

trees and tables. Swing is a pure java, that is, Swing components contain a pluggable look and feel. Swing components allow mixing of AWT heavyweight and Swing lightweight components in an application. The root of a majority of the Swing components is the J-component class. This class is an extension of AWT Container class. Advantages: Wide variety of components: Pluggable look and feel MVC architecture Action Object Nested Containers Customized Dialogs Structured Tables and Tree Components Powerful text manipulations Accessibility Support Drag and Drop Java 2D

4.3.4 Microsoft Windows


Windows XP is an operating system that was produced by Microsoft for use on personal computers, including home and business desktops, laptops, and media centers. It was first released to computer manufacturers on August 24 2001, and is the most popular version of Windows, based on installed user base. The name XP is short for experience. Windows XP was the successor to both Windows 2000 and Windows Me, and was the first consumer-oriented operating system produced by Microsoft to be built on the Windows NT kernel and architecture. Windows XP was released for retail sale on October 25, 2001, and over 400 million copies were in use in January 2006, according to an estimate in that month by an IDC analyst. It was succeeded by Windows Vista, which was released to volume license customers on November 8.2006 and worldwide to the general public on January 30, 2007.Direct OEM and retail sales of Windows XP ceased on June 30, 2008. Microsoft continued to sell Windows XP through their System Builders program until January 31, 2009. XP may continue to be available as these sources run through their inventory or by purchasing Windows 7 Ultimate,

M.M.N.S.S College, Konni

26

Dept Of Computer Science

RTO Management

Project Report

Windows 7 Pro, Windows Vista Ultimate or Windows Vista Business, and then downgrading to Windows XP. The most common editions of the operating system were Windows XP Home Edition, which was targeted at home users and Windows XP Professional ,which offered additional features such as support for Windows Server domains and two physical processors , and was targeted at power users , business and enterprise clients . Windows XP Media Center Edition has additional multimedia features enhancing the ability to record and watch TV shows, view DVD movies and listen to music. Windows XP Tablet PC Edition was designed to stylus applications built using the Tablet PC platform. The NT based versions of Windows, which are programmed in C, C++ and assembly, are known for their improved stability and efficiency over the 9x versions of Microsoft Windows. Windows XP presented a significantly redesigned graphical user interface, a change Microsoft promoted as more user-friendly than previous versions of Windows. A new software management facility called Side-by-side Assembly was introduced to ameliorate the DLL hell that plagues 9x version of Windows .It is also the first version of Windows to use product activation to compact illegal copying .Windows XP had also been criticized by some users for security vulnerabilities, tight integration of applications such as Internet Explorer 6 and Windows Media Player, and for aspects of its default user interface. Later versions with Service Pack 2, Service Pack 3, and Internet Explorer 8 addressed some of these concerns.

M.M.N.S.S College, Konni

27

Dept Of Computer Science

RTO Management

Project Report

SYSTEM TESTING

5.1 INTRODUCTION

M.M.N.S.S College, Konni

28

Dept Of Computer Science

RTO Management

Project Report

Software testing is a critical element of quality assurance and represents the ultimate previews of specifications, design and coding. The testing phase involves the testing of the developed system using various test data. After preparing the test data, the system under study is tested using those test data. While testing the system by using test data, errors were found and corrected. Thus a series of tests were performed for the proposed system. After a program has been coded, it is tested. The testing process is a part of the design and implementation phase. The primary goal of testing process is to make sure that the application performs as described in the requirements and specification in the documents. Before the system was ready for implementation various types of testing are done on the system. They are.

2.

Unit testing Integration testing Validation testing User acceptance testing Black box testing White box testing.

UNIT TESTING
A unit testing focuses verification effort on the smallest limit of software design.

Using the unit test plan prepares in the design phase of the system, important control paths are tested to uncover the errors within the module. This testing was carried out during the coding itself. In the testing step, each module is going to be working satisfactory as the expected output from module.

3.

INTEGRATION TESTING

M.M.N.S.S College, Konni

29

Dept Of Computer Science

RTO Management

Project Report

Integration testing is the systematic technique for constructing the program structure while at the same time conducting test to uncover errors associated with. The objective is to take unit tested modules and build the program structure that has been dictated by design. All modules are combined in this testing step. Then the entire program is tested as a whole. If a set of errors is encountered, correction is difficult because the isolation of causes is complicated of vastness of entire program. Using integrated test plans prepared in the design phase of the system developed as guide, the integration was carried out. All errors found in the system were corrected for the next validation testing.
4.

VALIDATION TESTING
At the end of program testing, software is completely assembled as a package,

interfacing errors have been uncovered and corrected and final series of software validation testing begins. Validation testing can be defined in many ways, but a simple definition is that validation succeeds when the software functions in a manner that can be reasonably accepted by the user/customer. Software validation is achieved through a series of black box tests that demonstrate conformity with requirements.
5.

USER ACCEPTANCE TESTING


User acceptance of a system is a key factor to success of any system. The system

under consideration was tested for user acceptance by constantly keeping in touch with the prospective system user at the time of developing and making changes wherever required. This is done with regard to the following points.

Input screen design. Output screen design. Format of the reports and other output.

6.

BLACK BOX TESTING


30
Dept Of Computer Science

M.M.N.S.S College, Konni

RTO Management

Project Report

Knowing the specified function that a product has been designed to perform, test can be conducted that each function is fully operational. Black box test are carried out to test that input to a function is properly accepted and output is correctly produced. White box testing White box testing of software is predicted on a close examination of procedural details. The status of the program may test at various points to determine whether the expected or asserted status is corresponding to the actual status.

TEST DATA AND RESULTS


The primary goal of software implementation is the production of source code that is easy to read and understand. Clarification of source code helps in easier debugging, testing and modification. Source code clarification is enhanced by structural coding techniques, by good coding style, by appropriate supporting documents, by good internal comments and by the features provided in the modern programming language. In our implementation phase, source code contains both global and formal variables. It contains predefined functions as well as the user defined functions. The result of the new system is compared with old system and supposes if the result is wrong the error must be debugged. After the acceptance of the system by the user, the existing system should be replaced by this system. Any user handles this package very easily. It does not require any intensive training for the user. Procedures and functions involved in this system are very simple that anyone can understand and correspondingly act to the system with no difficulty.

M.M.N.S.S College, Konni

31

Dept Of Computer Science

RTO Management

Project Report

SYSTEM MAINTENANCE

6.1 INTRODUCTION
M.M.N.S.S College, Konni

32

Dept Of Computer Science

RTO Management

Project Report

The term maintenance is used to describe the software engineering activities that occur following the delivery of a software product to the user. The maintenance phase of the software lifecycle is the time period in which software performs useful work. We may define maintenance by describing four activities that are undertaken after a program is released for use. During the use of any large program, error will occur and be reported to the developer. The process that includes the diagnosis and correction of one or more error is called corrective maintenance. Thus problem correction involves modification and revalidation of software to corrective maintenance. The second activity that contributes to a definition of maintenance occurs because of rapid change that is encountered in every aspect of computing. An activity that modifies software to properly interface with changing environment is adaptive maintenance. The third activity occurs when a software package is successful. As software is used recommendations for new capabilities, modification to existing function and general enhancement are received from users. To satisfy request in this category, perfective maintenance is performed. The fourth and last maintenance activity occurs when software is changed to improve future maintainability or reliability or to provide activities including correcting, coding and design, updating, documentation and test data and upgrading user support. Maintenance means restoring something to its original conditions. In contrast, enhancement means adding or modifying or re execution.

M.M.N.S.S College, Konni

33

Dept Of Computer Science

RTO Management

Project Report

SCREEN LAYOUT

M.M.N.S.S College, Konni

34

Dept Of Computer Science

RTO Management

Project Report

Login Page

M.M.N.S.S College, Konni

35

Dept Of Computer Science

RTO Management

Project Report

Home Page.1

M.M.N.S.S College, Konni

36

Dept Of Computer Science

RTO Management

Project Report

Home page.1.1

M.M.N.S.S College, Konni

37

Dept Of Computer Science

RTO Management

Project Report

Registration

M.M.N.S.S College, Konni

38

Dept Of Computer Science

RTO Management

Project Report

Medical Certificate (Physical)

M.M.N.S.S College, Konni

39

Dept Of Computer Science

RTO Management

Project Report

Medical Certificate (Eye)

M.M.N.S.S College, Konni

40

Dept Of Computer Science

RTO Management

Project Report

M.M.N.S.S College, Konni

41

Dept Of Computer Science

RTO Management

Project Report

Registration Updation

M.M.N.S.S College, Konni

42

Dept Of Computer Science

RTO Management

Project Report

Registration Search

M.M.N.S.S College, Konni

43

Dept Of Computer Science

RTO Management

Project Report

M.M.N.S.S College, Konni

44

Dept Of Computer Science

RTO Management

Project Report

Learners Licence

M.M.N.S.S College, Konni

45

Dept Of Computer Science

RTO Management

Project Report

M.M.N.S.S College, Konni

46

Dept Of Computer Science

RTO Management

Project Report

Learners Licence Report

M.M.N.S.S College, Konni

47

Dept Of Computer Science

RTO Management

Project Report

Permanent.1

M.M.N.S.S College, Konni

48

Dept Of Computer Science

RTO Management

Project Report

M.M.N.S.S College, Konni

49

Dept Of Computer Science

RTO Management

Project Report

Permanent.1.1

M.M.N.S.S College, Konni

50

Dept Of Computer Science

RTO Management

Project Report

Licence Report

M.M.N.S.S College, Konni

51

Dept Of Computer Science

RTO Management

Project Report

Duplicate Licence.1

M.M.N.S.S College, Konni

52

Dept Of Computer Science

RTO Management

Project Report

M.M.N.S.S College, Konni

53

Dept Of Computer Science

RTO Management

Project Report

Duplicate Licence.1.1

M.M.N.S.S College, Konni

54

Dept Of Computer Science

RTO Management

Project Report

Renewal.1

M.M.N.S.S College, Konni

55

Dept Of Computer Science

RTO Management

Project Report

M.M.N.S.S College, Konni

56

Dept Of Computer Science

RTO Management

Project Report

Renewal.1.1

M.M.N.S.S College, Konni

57

Dept Of Computer Science

RTO Management

Project Report

CONCLUSION

M.M.N.S.S College, Konni

58

Dept Of Computer Science

RTO Management

Project Report

The software has been developed for the present requirements and is tested and accepted. It is verified with valid data. The developed system has to a good extended succeeded in rectifying the hurdles and headaches that are present in the existing system and provides reliable and comprehensive information. Reports generated with live data have proved to be informative. The calendar developed system consumes less processing time and productivity is increased.

M.M.N.S.S College, Konni

59

Dept Of Computer Science

RTO Management

Project Report

BIBLIOGRAPHY

M.M.N.S.S College, Konni

60

Dept Of Computer Science

RTO Management

Project Report

1. K. K. Aggarwal & Yogesh Singh, Software Engineering, New Age International Publishers
2. Roger S. Pressman, :Software Engineering, McGraw-Hill International Editions,

Sixth Edition
3. Elias M Award, System Analysis and Design, Galotia Publications, Second Edition 4. Herbert Schildt, JAVA2: The Complete Reference. Fifth Edition: McGraw-Hill,1991

Websites:

www.google.com www.wikipedia.com www.codebox.com

M.M.N.S.S College, Konni

61

Dept Of Computer Science

Вам также может понравиться