Академический Документы
Профессиональный Документы
Культура Документы
Main Report
Project objective
Theoretical Background of project
Definition of Problem
System analysis & Design
System implementation & Detail or Hardware & Software
Used
Detailed Life cycle of the project
1. Entity Relationship Diagram
2. Data Flow Diagram
3. Data Dictionary
4. Input Output Screen Design
5. Methodology used for testing
6. Printout of the code Sheet
System Security measures
Conclusion
Bibliography/Reference
Soft copy of the project on CD
1
OBJECTIVE ACHIEVED SUCCESSFULLY
2
FRONT END (VB 6.0)
3
BACK END (MS ACCESS 2003-O7)
4
DEFINITION OF PROBLEM
5
SYSTEM ANALYSIS
FEASIBILITY STUDY
6
* It has computerized paper works and also is reduced to large
extent* With the help of this project single person is now available
to do the tasks of 5 to 7 persons.
* Due to processing speed of then Computer, we can
extract desired information’s in a fraction of second.
SYSTEM IMPLEMENTATION
The final phase of the process is the implementation of the new
system. This phase is the fulmination of the previous phase and will
be performed only after each of the phases has been successfully
completed to the satisfaction of both the users and quality assurance.
The task which comprises the implementation phase includes the
installation of the hardware, proper scheduling of the resource
needed to production of a complete structure that supports both the
user and the environment and the necessary documentation to move
the program and the file in to production.
1. Hardware installation
2. Scheduling / Resources requirement
3. User instruction / Procedure
4. Turnover documentation / certification reviews
The reviews will cover all the documentation that has been
generated for the product. In particular the review will examine the
certification checklist to ensure it has completed and will compare
this checklist to project documentation to ensure that all necessary
items have been developed in addition to the certificates checklist
item, the reviewed to determine they are correct.
7
HARDWARE AND SOFTWARE USED
HARDWARE USED
SOFTWARE USED
8
Detailed Life Cycle of The Project
9
E-R DIGRAM
10
F_name S_add
S_name S_phn
S_enrolno S_email
C_name
C_id
Student
study
ing
C_id C_name
Yr/sem
Course
Playi
ng
TOOLS
date
S_enrol
T_QUY
S_name
T_name
T_id
11
DATA FLOW
DIAGRAM
12
1.O lavel :-
SPORTS FESSDATA
USER
MANAGEMENT
BASE
2. 1lavel :-
Admin
Log in Log In table
Student
details
Tools Sports
details details
Report
13
DATA DICTIONARY
14
1.STUDENT DETAILS
15
2. TOOLS DETAIL.
16
3.SPORTS DETAILS.
17
LIST OF FORMS
18
1.LOGIN FORM
19
2. SPALSH SCREEN FORM
20
3.MAIN MENU FORM
21
4. STUDENT DETAIL FORM
22
5. ISSUE DETAIL FORM
23
6.TOOLS DETAIL FORM
24
7. REPORT FORM
25
1. STUDENT REPORT.
26
2. ISSUE REPORT
27
3. TOOLS REPORT.
28
TESTING(TECHNIQUES & STRATEGIES)
29
TESTING FUNDAMENTALS AND OBJECTIVES
Testing Techniques
White Box testing
30
Executes all loops at their boundaries and within their
operational bounds.
Exercise internal data structure to issue their validity.
31
TESTING STRATEGIES
Unit Testing
System Testing
System testing is a series of different tests whose primary
purpose is to fully exercise the computer-based system. It
verifies that system elements have been properly integrated
and Performa allocated functions.
The different types of system test are applied are as
follows.
Recovery testing.
Security testing.
Stress testing.
Performance testing.
32
Alpha & beta testing
33
SOURCE CODE
34
LOG IN FORM
Private Sub Command1_Click()
Dim uname, password As String
uname = UCase(TXTNAME.Text)
password = UCase(TXTPASS.Text)
If uname = "DHANAU" And password = "69304" Then
MsgBox "CORRECT PASSWORD", vbInformation,
"SPORTS MANAGEMENT"
Unload Me
Form2.Show
Else
If uname = "" And password = "" Then
MsgBox "PLEASE SPECIFY A USER ID AND A
PASSWORD TO CONNECT", vbCritical, "SPORTS
MANAGEMENT"
Else
MsgBox "Invalid User Name and Password ,Try Again",
vbExclamation, "SPORTS MANAGEMENT"
TXTNAME = ""
TXTPASS = ""
End If
End If
End Sub
35
SPLASH SCREEN
36
MDI FORM
37
STUDENT FORM
38
Text1.Text = rs.RecordCount + 1
Text3.Text = Date
End Sub
End Sub
39
Private Sub Form_Load()
Call list_fill
End Sub
40
ISSUE DETAIL FORM
42
sql = "update RS_SPORTS_DETAIL set STUD_ID=" &
Combo1.Text & ",STUD_NAME='" & Text2.Text &
"',SPORT_ID=" & Combo2.Text & ",SPORT_NAME='" &
Text3.Text & "',TOOL_ID=" & Combo3.Text &
",TOOL_NAME='" & Text4.Text & "' where SID1=" & Text1.Text
& ""
rs.Open sql, con, adOpenKeyset, adLockPessimistic
MsgBox "Record Updated", vbInformation
Call txtclear
End Sub
43
TOOLS DETAIL FORM
Private Sub txtclear()
Text1.Text = ""
Text2.Text = ""
Text3.Text = ""
End Sub
44
Private Sub List1_Click()
If rs.State = 1 Then rs.CLOSE
sql = "select * from RS1_SPORTS_TOOLS where TID=" &
List1.Text & ""
rs.Open sql, con, adOpenKeyset, adLockPessimistic
If rs.RecordCount > 0 Then
Text1.Text = rs(0)
Text2.Text = rs(1)
Text3.Text = rs(2)
End If
End Sub
45
REPORT FORM
46
Private Sub Command1_Click()
If DataEnvironment1.rsSTUDENT.State = 1 Then
DataEnvironment1.rsSTUDENT.CLOSE
DataEnvironment1.rsSTUDENT.Open
DataEnvironment1.rsSTUDENT.Requery (0)
DataEnvironment1.rsSTUDENT.Filter = "STUDENT_ID<>0"
DataReport1.Show
DataReport1.Refresh
End Sub
47
rs.Open sql, con, adOpenKeyset, adLockPessimistic
For i = 1 To rs.RecordCount
Combo1.AddItem rs(0)
rs.MoveNext
Next
48
MODULE
Public con As New ADODB.Connection
Public rs As New ADODB.Recordset
Public sql As String
Public i As Integer
49
SYSTEM SECURITY MEASURES
50
SYSTEM SECURITY MEASURES
Any system that interacts with the environment exchanges
information in lieu of data required for its operation. The data
received has to be provided sufficient security normally called
databases security. It is only possible when the system is secure
from the impurities of the environment, which is normally called
system security.
Application Security
The database forms the basic for running a system to obtain the
required output hence the database security major factor which
considering the user should keep in mind which considering
system/database security. The integrity of the system in terms of
system requirement and user requirement is of greater importance
for any system developer. The database once stored may not be
accessed by any user hence database should be permanently stored
in the system.
Physical Security
51
CONCLUSION
52
CONCLUSION
53
BIBLIOGRAPHY
54
BIBLIOGRAPHY
URL’s:-
www.freecomputerbooks.com
www.bigbanyantree.com
www.forumempire.com
55