Академический Документы
Профессиональный Документы
Культура Документы
INTRODUCTION
1.1 OVERVIEW OF THE PROJECT
The proposed project is developed to manage the automobile in the automobile dealer
company. The main module in this project is login, automobile management, customer
management, sales, complaints and reports. The first module is the login. The automobile
showroom owner should login to the project for usage. The username and password are
verified and if it is correct, next form opens. If the username and password are not correct, it
shows the error message.
When a customer search for a automobile, if the automobile is available, they will be
taken to a page that shows the details of the automobile including automobile name,
automobile ID, quantity, price etc. Automobile Management System is useful for
maintaining automobiles, customers effectively and hence helps for establishing good relation
between customer and automobile organization. It contains various customized modules for
effectively maintaining automobiles and stock information accurately and safely.
When the automobile is sold to the customer, stock will be reduced automatically.
When a new purchase is made, stock will be increased automatically. While selecting
automobiles for sale, the proposed software will automatically check for total number of
available stock of that particular item, if the total stock of that particular item is less than 5,
software will notify the user to purchase the particular item.
Also when the user tries to sale items which are not in stock, the system will prompt
the user that the stock is not enough. Customers of this system can search for a automobile;
can purchase a automobile easily by selecting fast. On the other hand the stock of
automobiles can be maintained perfectly by the automobile shop manager overcoming the
drawbacks of existing system.
Login module
Registration module
Customer module
Automobile module
Sales module
Delivery module
Supplier module
Reports module
Login Module
It is used for logging in the automobile showroom management. It is used for
verifying the user. Once the user is authenticated, they can access the system.
Registration Module
New user can register in order to use the full features of this system. Normal users can
also access the proposed system but with limited features. Only the registered users can get
more priorities than the unregistered guest user. Once the guest users register to this system,
they can also get full access to this system.
Customer Module
It is used for adding new customers and for updating existing customers. It is used for
storing new customers as well as for updating the customers details. The module is very
useful to find the number of customers who paid bill. Some customers might not pay the bills
on time.
Customer details can be easily searched, so it will be easy to find bill payment details.
It has a primary key field named customerno. The file is very useful for maintaining
customers.
Automobile Module
2
It is used for adding new automobiles and for viewing, editing and deleting existing
automobiles. It is used for searching items in this system. Here the admin have the privileges
to search items in this system. Automobile details are stored with their brand name. When a
particular brand is being liked by people, that particular brand will be purchased and kept in
stock with large quantity.
Sales Module
It is used for adding sales details to proposed system. Here the admin have privileges
to add details in automobile showroom management. Sales reports can be viewed overall as
well as date wise, month wise and year wise.
Delivery Module
It is used for storing details of new deliveries in the automobile showroom
management. Admin can perform operations like monitoring automobile stock details,
customer order details and delivery details. Delivery reports can be viewed overall as well as
date wise, month wise and year wise.
Supplier Module
It is used for maintaining supplier details like supplier ID, name, contact person and
address and phone number. Supplier or dealer can be cancelled when their items are not being
sold out. It is very essential in order to get good stock items for a company.
Reports Module
It is used for generating various reports like cash order report, credit order reports and
payment reports. Sales and delivery reports can be viewed date wise, month wise and year
wise. Reports can be viewed based on the users choice.
: Intel Core i3
RAM
: 32MB
Hard Disk
: 5 GB
Monitor
: 16 LG
Mouse
: Logitech mouse
Keyboard
: 104 Keys
Mother Board
: Intel
Speed
: 3.3 GHZ
: Windows 2007
Front End
: Visual Basic
Back End
: MS Access
Reports
: Data Report
Multitasking
Message driven architecture
Dynamic linking
CPU time slicing
Easier comprehension
User-friendliness
Faster application development
Introduction to Active-X technology
Internet features
Support OLE, which is a means of communication and gives application the
In visual basic 6.0 IDE is a Multiple Document Interface (MDI) format. In Multiple
Document Interface format, the windows associated with the project will stay within a single
container known as the parent. Code and form based windows will stay within the main
container form.
Visual basic can be used to create the following types of applications.
Standard EXE
Active EXE
ActiveX DLL
ActiveX Control
VB application wizard
disconnected record sets and hierarchical record sets. The ADO object model provides an
easy-to-use set of objects, properties, and methods for creating script that access data in
databases.
ADO consists of seven objects, three of which are independent and four are dependent
objects. Independent objects can exist by themselves; dependent objects must exist in
connection with an independent object.
Parameter
Connection
Command
Record set
Error
Property
Field
applications.
It uses illustration for text, which enables users to interact with an application.
In GUI the options open to the user is much greater allowing more freedom to the
MS-ACCESS
Microsoft Access is a powerful database management system and the user can create
entire application that requires little or no programming. It supports GUI features and an
entire programming language, VBA (Visual Basic 6.0 for application). Access is easy enough
to use that in a short time beginners can manage their own data. In MS Access, the database
means a collection of tables that hold data. It collectively stores all other object such as
queries, forms and reports that are used to implement the database management function
effectively.
The MS-Access database can act as a back-end database for Visual Basic 6.0 as
affront end tool. MA Access supports the user with its powerful management functions.
Beginners can create their own database very simply with some mouse clicks. MS-Access
database supports so many data types when a user can incorporate data from other
applications. A database created in MS-Access can be accessed through Visual Basic 6.0
using data control.
Here database means a collection of related tables and a table means a collection of
number of records where a record means a collection of inter-related fields. It should be noted
that a field in an entity is used to describe straight. A single table can have any number of
indexed fields that can be used to locate records using an expression. This helps in filtering
out information according to specific criteria. A user can move inside a table very easily using
the navigator tools supported by the MS-Access database. A table can be accessed in a
number of ways like as a snapshot, dynast, etc.
2. SYSTEM STUDY
2.1 EXISTING SYSTEM
All automobile details like available in the company are entered and managed in this
and managed. Price details and stock details of the automobiles are managed separately. The
customer details are entered to call the customer for further purchase of automobile. The
8
customer name, address and phone number details are managed separately. The details are
entered and edited by the administrator.
But everything is done manually. Most of the existing system is manual, so data
manipulations are not accurate and also processing time is slow. When the stock and
automobile count increases, manual manipulation of data becomes very difficult.
2.1.1 DRAWBACKS
Even though computerized system exists, there are various drawbacks. They are as
follows.
User cannot search automobiles fast when the number of automobiles increases.
Primary key fields should be used wherever necessary while designing in order to
The proposed project will allow the customers to perform certain activities like login
and searching for automobiles. Customers may open an account with the store if they wish
including a username and password. In login form users will be authenticated and it is also
possible to find whether they are customer or admin through their login information which
was entered. A customer must be logged in before searching for automobiles for purchase.
If a user attempts to login with incorrect details, they will be not be redirected to
access the application. When a customer search for a automobile, if the stock of the
automobile is available, they will be taken to a page that shows the details of the automobile
including automobile title, automobile ID, quantity, price etc in order for sale.
2.2.1 ADVANTAGES OF PROPOSED SYSTEM
Features of the proposed project are as follows.
items from automobile, software will automatically give them discount offers.
Prepares and produces accurate outputs
Reduces the time needed and expenses
Makes the information flow efficient
Easy report generation is possible
Provides attractive user interface.
Efficient searching of automobile details by just entering automobile code is
possible.
10
data between two flat files have to be merged, it is needed to copy and PSMte relevant
information from one file to the other. There is no automation between flat files.
If two or more flat files that contain client addresses, it is required to manually modify
the address parameters in each file that contains that clients information. Changing
information in one file has no bearing on other files. Flat files offer the functionality to store
information, manipulate fields, print or display formatted information and exchange
information with others, through email and over the Internet. Some flat files may be attached
to external files, such as text editors, to extend functionality and manage related information.
Relational File Database
A relational database, on the other hand, incorporates multiple tables with methods for
the tables to work together. The relationships between table data can be collated, merged and
displayed in database forms. Most relational databases offer functionality to share data:
Across networks
Over the Internet
With laptops and other electronic devices, such as palm pilots
With other software systems
Designing flat file databases is simple and requires little design knowledge. Flat files
can be developed using just about any database engine. Flat files can be created in relational
database engines by not taking advantage of relational design concepts. Designing a
relational database takes more planning than flat file databases. With flat files, it is possible to
add information, as you deem necessary.
With relational databases, it is required to be careful to store data in tables such that
the relationships make sense. Building a relational database is dependent upon the ability to
establish a relational model. The model must fully describe how the data is organized, in
terms of data structure, integrity, querying, manipulation and storage. Relational databases
allow defining certain record fields, as keys or indexes, to perform search queries, join table
records and establish integrity constraints.
Search queries are faster and more accurate when based on indexed values. Table
records can be easily joined by the indexed values. Integrity constraints can be established to
11
ensure that table relationships are valid. If the project is able to establish a one-to-many
relationship in the data tables, relational database should be used because a flat file is not
sufficient to handle the data processing needs. Relational databases offer more robust
reporting with report generators that filter and display selected fields.
Relational databases offer the capability to building own reporting modules. Most
relational databases also offer the capability to import and export data from other software.
There are three primary relational database systems, proprietary, open source and embedded.
Proprietary relational databases require the use of proprietary development languages, often
times, to complement SQL. Microsoft Access, for example, combines Visual Basic with SQL.
Open source databases, such as MySQL, are distributed freely to encourage user
development.
Embedded, relational databases are packaged as part of other software packages, such
as with tax-preparation software packages. The vendor supplies the database, and all
manipulation tools, to control the database structure. These databases are, often times,
accompanied with tools to provide audit trails of transactions. Proposed project uses
relational database files implementing SQL queries in MS Access. So 1 to many relationships
can be established between tables and the table data can be accessed soon even in the nonindexed locations.
12
A program is a series of instructions that tells a computer how to perform the tasks
necessary to process data into information. A command is an instruction given to a computer
program. A user response is an instruction you issue to the computer by responding to a
question posed by a computer program. Any hardware component that allows entering data,
programs, commands, and user responses into a computer is an input device. Inputs of
Automobile Management System are eid, ename, qualification, automobileid, brand, cusid,
cusname and salary.
13
Ease of use
Control of data integrity
Control of redundancy
Control of security
Data independence (logical & physical)
Data storage protection
System performance
System functions
System compatibility
For achieving the abovementioned criterias we have to make use of various features
that are available with the RDBMS by enforcing integrity constrains, it is possible to ensure
data integrity and reduce data inconsistency to a great extent.
14
Data Flow
Process
Storage
When analysts prepare the Data Flow Diagram, they specify the user needs at a level
of detail that virtually determines the information flow into and out of the system and the
required data resources.
The network is constructed by using a set of symbols that do not imply physical
implementations. The Data Flow Diagram reviews the current physical system, prepares input
and output specification, and specifies the implementation plan.
Steps to Construct Data Flow Diagrams
Four steps are commonly used to construct a DFD
Process should be named and numbered for easy reference. Each name should be
Level 0
Login process
Admin
Login
Automobile
management access
Level 1
Admin
Customer
Customers
Supplier
Product
16
Login
Supplier
Product
Level 2
Admin
Customer
Login
Supplier
Supplier
Order
17
Product
Customers
Product
Order
Sales and
payment
Payment
Sales
Order
Delivery
reports
reports
and
Payment
reports
: user
Field name
Data type
Description
username
Text
Username
password
Text
Password
Table name
: cust_info
18
Field name
Data type
Description
Cid
Text
Customer ID
Cname
Text
Customer name
Caddress
Text
Cgender
Text
Ccity
Text
Cpincode
Number
Cphone
Number
Clandline
Number
Cemail
Text
Table name
: automobile
Field name
Data type
Description
Vid
Text
Automobile ID
Model
Text
Color
Text
Chassisno
Text
Chassis number
19
Engineno
Text
Engine number
Paymentoption
Text
Payment option
Srprice
number
Selling price
Table name
: booking
Field name
Data type
Description
cid
Text
Customer ID
Cname
Text
Customer name
Caddress
Text
Srid
Text
Showroom ID
Ino
Text
Insurance number
Eid
Text
Employee ID
Date
Date/time
Date of booking
Time
Text
Time of booking
Model
Text
Color
Text
Srprice
Number
Showroom price
Aprice
Number
Advance price
Bamount
Number
Balance amount
Table name
: insurance
Field name
Data type
Description
Cid
Text
Customer ID
Cname
Text
Customer name
Caddress
Text
Cphone
Number
Vid
Text
Automobile ID
Model
Text
Color
Text
Chassisno
Text
Eid
Text
Employee number
Nname
Text
Nominee name
Iname
Text
Address
Text
Insurer address
Relationship
Text
City
Text
Pincode
Number
Text
Premium
Number
Premium amount
Vfrom
Date/time
Insurance from
Vto
Date/time
Srid
Text
Showroom ID
Policyno
Text
Policy number
21
Table name
: emp
Field name
Data type
Description
eid
Text
Employee ID
Ename
Text
Employee name
Designation
Text
Fname
Text
Father name
Paddress
Text
Address
City
Text
City of employee
Pincode
Number
Pincode of employee
Mno
Number
Mobile number
Lno
Number
Landline number
Picture
Text
Picture of an employee
Dob
Date/time
Date of birth
Gender
Text
Gender of employee
Age
Number
Age of an employee
22
Table name
: loan
Field name
Data type
Description
Cid
Text
Customer ID
Cname
Text
Customer name
Vid
Text
Automobile ID
Model
Text
Chassisno
Text
Chassis number
Engineno
Text
Engine number
Srprice
Number
Showroom price
Loanamount
Text
Loan amount
Downpayment
Text
Down payment
Instaa
Number
Installation amount
Loanduration
Text
Loan duration
Loanno
Number
Loan number
Eid
Text
Employee ID
Date
Date/time
Date
Time
Text
Time
23
Planning
Project and process control
Risk management
Inspections
Measurement tools
Organization and professionalism
24
Test Plan
Before going for testing, first we have to decide upon the type of testing to be carried
out. The following factors are taken into consideration:
in an algorithm execution
To ensure that the module operate properly at boundaries established to limit or
restrict processing
To find out whether error - handling paths are working correctly or not
To find out whether the values are correctly updated or not
Check for validations
The test is unbiased because the designer and the tester is independent of each
other
The tester needs no specific knowledge on any programming language
The test is done from the point of view of the user, not the designer.
The test can be designed as soon as the specifications are complete
The test can be redundant if the software designer has already run a test case.
The test can be difficult to design
Testing every possible input stream is unrealistic.
Unit Testing
25
26
delivered and deployed, it enters the maintenance phase. The system need to be maintained
not because of some of its components wear out and need to be replaced, but because there
are some residual errors remaining in the system that must be removed as they are
discovered. It includes activities related to debugging the software after it goes live, changes
are required to address evolving software and enhancement to meet changing customer
requirements. So maintenance phase involves
These changes have to be designed by the user before the change can be carried out.
Since requirement change request involves cost, user will be cautious while requesting the
software changes. The software will require continued support. The system maintenance
means the maintenance activities after and during the system development processes. It
include activities related to debugging the software after it goes live, changes acquired to
meet changes in user requirement.
Maintenance phase identifies if there are any changes required in the current system.
If the changes are identified, then an analysis is made to identify if the changes are really
required. Cost benefit analysis is away to find out if the change is really essential.
System Analysis
The term system is derived from the Greek word systema, which means of
organized relationship among functioning units of components. And the study of system
concepts has three basic implications:
Preliminary Analysis
27
Analysis is the detailed study of the various operations performed by a system and
their relationships within and outside the system. For the efficient and effective utilization of
the available resources, timing availability of accurate information is very important.
Information is the back bone of any organization. There for, it has to be made available all
time to ensure proper decision-making.
Information also has to be accurate, current, timely, relevant and usable. In other
words, an effective information system should be able to provide information to those in need
of it, at the time they need of it, at the time they need it and in the way they need it. The need
for managing data and retrieving information efficiently, lead to an extensive use of
computers in the business world.
The computers have convinced the management that computerized system is
preferable to the existing system; most organization has computerized their application areas
using traditional file processing concepts. The computerized system, by itself does not
guarantee of efficient information retrieval. The effectiveness of the system, to great deal,
depends on the way in which data is organized and managed. Way in which data is organized
in the existing system is not integrated, since there is no connection or integration between
one module and another on accomplishing the task.
Analysis is detailed study of various operations performed by a system and their
relationships within and outside the system. A key question is what must be done to solve
the problem? One aspect of analysis is determining the boundaries of the system and
determining whether or not a new proposed system should consider other related items. It is
the process of gathering and interpreting facts; diagnosing the problems and using the
information recommend improvements to the system.
Threats to System Security
The lists of potential threats are as follows
System Security
Security is a critical stage in system development. Even candidate system must
provide built-in features for security and integrity of data. Without safe guards against
unauthorized access, fraud, embezzlement, fire and natural disaster, a system could be so
vulnerable as to threaten the survival of the organizations.
To do an adequate job on security, the risk, exposure, cost and specific measures such
as password should be analyzed to provide protection. In addition, back up of copies of
software and recovery restart procedures must be available when needed.
The amount of protection depends on the sensitivity of data, the reliability of the user
and the complexity of the system. The motive behind security is to keep the organization
running, protect data as an asset and seek management support for more installations.
System Security Measures
After system security risk has been evaluated, the next step is to select security
measures. The measures are
Identification
Access Control
Audit Control
System Integrity
Identification
It is the scheme of identifying person to the system based on Something you know
such as a password or a picture badge, Something you are such as finger print or voice print
or Something you have such as credit card, key or special terminal.
Access Control
Controlling the access to the computer facility is secured through encoded cards or
similar devices. Encryption prevents intruders from accessing data by scrambling messages
across telephones to the destination.
Audit Control
29
Planning
Training
System testing and
Changeover planning
Planning is the first task in the system implementation. Planning is deciding on the
method and the time scale to be adapted. At the time of implementation of any system people
from different departments and system analysis involve. They are confirmed to practical
problem of controlling various activities of people outside their own data processing
departments. The line manager controlled through an implementation co-ordinate committee.
The committee consists of ideas, Problems and complaints of user department. It must also
consider,
30
5. CONCLUSION
The system is completely menu driven and extremely user friendly since it is
developed in an efficient front end tool VB. Appropriate error messages are also provided too
guide the user in a proper and user friendly manner.
The software Automobile Management System has been developed in windows
2007 environment using PHP as front end and MS Access as back end. Time consumptions
reduced to a great extent and user as less complexity in handling it database.
The project is fully fledged and user friendly, End users will be lightened in using it
software because it is easy to have bills and reports and mostly all contents to be entered are
to selected from combo box. It reduces the calculating efforts to be carried out by the staff.
31
BIBLIOGRAPHY
32
REFERENCE BOOKS
REFERENCE WEBSITES
www.programmingworld.com
www.vbnetcode.com
www.w3schools.com
www.vbcode.com
www.vbdevelopplus.com
www.codepark.com
APPENDIX
A. SAMPLE INPUT
Login form
33
Admin login
34
User login
35
Insurance form
36
Service form
37
Customer details
40
Booking form
43
Loan details
44
B.SAMPLE OUTPUT
47
Splash form
On successful login
48
Facilities
50
Available facilities
51
Bikes
52
Specific bike
53
Showroom details
55
56
C.SAMPLE CODING
Private Sub Command1_Click()
Me.Hide
MDIenter1.Show
End Sub
57
Adodc1.Recordset.MovePrevious
Exit Sub
errmsg:
MsgBox "You Are in First Record"
End Sub
58
Text2.Text = ""
Text3.Text = ""
Text4.Text = ""
Text5.Text = ""
Text6.Text = ""
Text7.Text = ""
End Sub
59
End Sub
60
61
End Sub
Call disable
End Sub
End Sub
End Sub
End Sub
63
64
65
66
67
Text16.Enabled = False
Option1.Enabled = False
Option2.Enabled = False
End Sub
MsgBox " Please Enter date in format: 12.4.1990 ", vbCritical + vbOKOnly, "Warning"
KeyAscii = 0
End If
End Sub
Employee form
Dim file1 As String
69
MDIenter1.Show
End Sub
70
Image1.Picture = LoadPicture(Adodc1.Recordset.Fields(10))
Exit Sub
errmsg:
MsgBox "You Are in First Record"
End Sub
71
72
Text16.Text = ""
Image1.Picture = ""
End Sub
73
74
75
'sal = Val(Text4.Text)
'Select Case sal
'Case Is < 5000
'Text8.Text = sal * 5 / 100
'Text7.Text = sal * 4 / 100
'Case Is < 10000
'Text8.Text = sal * 6 / 100
'Text7.Text = sal * 5 / 100
'Case Is < 15000
'Text8.Text = sal * 8 / 100
'Text7.Text = sal * 9 / 100
'End Select
'Text9.Text = Val(Text3.Text) + Val(Text5.Text) + Val(Text6.Text) + Val(Text4.Text) Val(Text8.Text) - Val(Text7.Text)
'End Sub
76