Вы находитесь на странице: 1из 43

Cyber Cafe

Acknowledgement

We sincerely feel the credit of the project work could not be narrowed
down to only on individual. The development of this project involves many
valuable contributions.

We are thankful to Mr.K.H.Wandra sir to introduce this mini project and


inspiring us all time. We would like to thank Ms. Madhu Shukla and Mr. Dhaval
Nimavat to being very co-operative and helpful while project was being
processed. The project could not have completed without help of them.

Finally, we would be thankful to our parents, friends & almighty that have
inspired and gave us strength while making this project.

Dipesh Sompura (43)


Divyarajsinh Vaghela (47)
Cyber Cafe

Abstract

This is era of information technology. Science has taken and is taking


great strides in this field, which has result in making man’s life more comfortable
and easier. Today computers have become necessity of everyone’s life like food
Water and air.

More efficient computers are invented and more advanced software are
developed in order to make many complex processes fast and easy.

Our project is on ‘Cyber Café Management’ for cyber cafe owner. We have
made our best attempt to make software for all Customers’ information store in
database safely. This software is used for reliability and efficiency.
Cyber Cafe

Content
Abstract

1. Introduction
1.1 Project purpose
1.2 Purpose
1.3 Scope
1.4 Technology and Literature Reviews

2. Project Management
2.1 Project planning and scheduling
2.1.1 Project Development Approach
2.1.2 Project Plan
2.1.3 Schedule Representation

3. System Requirement Study


3.1 User Characteristics
3.2 Hardware and Software Requirements
3.3 Constraints

4. System Analysis
4.1 Study of Current Study
4.2 Feasibility Study
4.3 Requirements Validation
4.4 Functions of System
4.5 Data Modeling
4.5.1 Use Case Diagram
4.5.2 Class Diagram/ER Diagram
4.5.3 System Activity or Object Interaction Diagram
4.5.4 Data Dictionary
4.6 Functional and Behavioral Modeling
4.6.1 Context Diagram
4.6.2 Data Flow Diagram (including leveling)
4.6.3 Process Specification and Decision table
4.7 Selection of Hardware and Software (Justification)

5. System Design
5.1 Database Design/Data structure design
5.1.1 Table and Relationship

6. Implementation Planning and Detail


6.1 Implementation Environment
6.2 Program/module specification
6.3 Security features
6.4 Coding Standard
Cyber Cafe

6.5 Sample Coding

7. Testing
7.1 Testing Plan
7.2 Testing Strategy
7.3 Testing Methods
7.4 Test Cases

8. Screen shots and User Manual


9. Limitation and Future Enhancement
10. Conclusion
Cyber Cafe

PROJECT PROFILE

 Project Title : Cyber Cafe

 Project Definition : to manage customer’s information & space in café is


available or not

 Project Members : 1) Dipesh Sompura (43)

2) Divyarajsinh Vaghela (47)

 Hardware Requirements : 1) Pentium a microprocessor

2) 256 MB RAM

3) 40 GB HARD DISK

 Software requirements : 1) Microsoft Windows XP Professional

2) Microsoft Windows

3) Visual Studio 2008

 Platform : 1) .Net Technology


Cyber Cafe

1. INTRODUCTION:

1.1 Project Summary:

We have made the project on “Cyber Café System”. We are sure that this
is going to be useful to cyber cafe owner.. In which we have used C# and .Net
Technology. All the processes, which are included in making this project
successful in technical terms, will be described in this report. The basic idea of
how the software will work is described in this document.
In our project, we have provided the way that if the space is not available
then it can automatically not enter the user. It will make the time duration of
customer automatically and also the payment as well.
1.2 Purpose

Earlier the customer had to give time of surfing in cyber café. But we have
made our project that customer will come out of this headache. Because this
software does all that things automatically. On the other hand, the payment is
displayed itself. So,café owner has no more migraine of that.
If customer’s information is needed then it can be easily available from the
database. So, it reduces paperwork or manual work as well. In short, we have
tried to make a project that can be useful to the people in future. We are sure that
it is also going to be helpful to us to learn about what is helpful for our future.
System should also maintain reports properly, which are generated by
different computers. Payment information should be also properly stored which
will help while performing calculations related to expense on particular customer.

1.3 Scope
 Speed and faster access to data
 Easy cafe process
 Better availability of day to day schedules
 Easily available information
 Reduced paperwork
 It can’t store customer’s data long time
Cyber Cafe

1.4 Technology & Literature View:


We are being familiar with .Net technology in this 6th -Sem. So, we thought
to make software that is relied on it. On the other hand, it gives us more idea in
our studies also. This technology is well known and widely used in the market.
Therefore, it would be helpful to us in future also.
We will have to keep pace with this technology in future. So, it is good for
us also. This technology can work with all the languages of software. So, we get
on well with this as well. This technology is widely used in market and not so
expensive at all. Its features are very effective for making software.
We have made an attempt to give our best in this project by using recent
technologies. As we knew the requirements of “Cyber Café Management”, we
made our mind to make project on this. We have tried to carry all needs of
particular system. In short, we can say that this project has used .Net technology
very frequently.
Cyber Cafe

2. PROJECT MANAGEMENT

2.1 Project planning & scheduling


2.1.1 Project development Approach:
First, we just gathered the information needed to cyber cafe process. We
just decided to give an easy approach to the user and customer.
We have reached the brief description about requirements of cyber cafe
management. So, we made software that is useful to cyber café.
It makes an easy and simple way to the customer as well as user. We
have
Used easy technology to reach at our goal.

2.1.2 Project plan

Project Name Cyber cafe system


To develop a system that facilitates maintenance &
Project Objectives monitoring of different processes followed by cyber cafe
system
Duration Two months
Guided by Ms. Madhu Shukla
Team size 2
Technology C#,.Net tech
Easy process of cyber cafe, fast find customer
Advantages
information, efficient, Flexibility, less paperwork
Limitation It can’t store customer’s data long time

2.1.3. Schedule Representation


A project schedule provides a road map for us to achieve our milestones.
If it has been properly developed, the project schedule defines the tasks and
milestones that must be tracked and controlled as the project proceeds. Tracking
can be accomplished in number of different ways:

 Conducting periodic project status meeting in which each team member


report progress and problems.
Cyber Cafe

 Evaluating the result of all reviews conducted throughout the software


engineering process.
 Determining whether formal project milestones have been accomplished
by the scheduled rate.
 Comparing actual start date for each project task listed in the resource
table.
 Meeting informally with practitioners to be obtained their subjective
assessment of progress to date and problems on the horizon.
 Using earned value analysis to assess progress quantitatively.

Control is employed by a software project manager to administer project


recourse, cope with problems, and direct project staff. If things are going well,
control is light. But when problems occur, the project manager must exercises
control to reconcile them as quickly as possible.

RESPONSIBILITIES DIPESH DIVYARAJ


Analysis
Analysis Review
Design
Design Review
Coding
Front-site Design
Design Review
Testing

Documentation
Cyber Cafe

3. SYSTEM REQUIREMENT STUDY

System requirement specification contains the requirement for the system


and its functional operations.

3.1 User Characteristic:


User:
 User can enter the data about customers.

 User can proceed to provide space

 User can edit / search the customer’s data.

 User can get the information of time & payment

 User can be free with migraine of paperwork.

 User can store large no of data & retrieve easily.

3.2 Hardware and Software Requirements:

Hardware Requirement:

We have required the devices as we have mentioned below while making


our airways reservation software.

 Computer : Intel P4 Processor with 2.0 GHz

 RAM – 256MB

 HDD - 40GB

 CD Drive – 150kbps

Software Requirement:
Cyber Cafe

As we are learning .net technology, so we had decided to keep our pace


with this technology. Therefore, we used which is familiar to us. We also used
some other softwares to achieve our goal as below.

 Windows XP with higher version

 Visual studio 2008

C# with .Net

 .Net technology

 MS office for documentation

3.3 Constraints:
This topic includes hardware requirements for installing the various Visual
Studio editions, the Express editions available for Visual Studio programming
languages. The computer on which you install your Visual Studio edition should
meet minimum the following system requirements
 Pentium IV Processor or above.

 40GB hard-disk.

 256 MB of RAM.

These constraints are needed while making project. It includes some


symbols and photographs as well from the particular program to add into
the project. It makes our software simply graceful.
Cyber Cafe

4. SYSTEM ANALYSIS

4.1 Study Of Current System

In the current system no monthly report generation is specified by just


clicking generate report.

1. If the user is unauthorized then he or she can break the password


because password is stored in the same application in which the
application is running so the security is poor.

2. The user will be in the confusion because of some difficult task.

The current system is manual writing system. If the space in cyber café is
not found then it will inform the user about that there is no space available. It will
display that “ Space is not available now”.

4.2 Feasibility
Objectives of System Feasibility Analysis
 Identify the user’s need
 Evaluate the system concept for feasibility
 Perform economic and technical analysis
 Allocate functions to H/W, S/W, people, database and other System
analysis
 Establish cost and schedule constraints
 Create system definition forming the foundation for all subsequent
work.

Three specific tests were carried out on the system to test its feasibility namely,
Operational, Technical and Economical.

4.2.1 Technical Feasibility


Cyber Cafe

This system is technically feasible because all required technologies are


available today in market. Visual studio 2008 is available in market now which
includes all requirements to complete this software. On the whole, this is very
interesting technology. This provides every tool to make this project. Even this
technology is concerned with many languages like C, C++, C#, Oracle and many.
The technical issues and their answers are as follows:

Is the proposed technology or solution practical?


Accuracy: The system here is accurate and it provides accurate and correct
result.
Reliability: The system is trustworthy and gives perfect return on investment.
Easy of access: Any technical and non technical user can use the system and
easily get response or get solution of their queries from the system.
Security: User has to enter valid password and id for accessing the system.
So, we can say that the proposed technology or solution is practical.

Do we currently have necessary technology?


Yes, this project needs .Net Technology. Here, we have used this
technology in making of this project.

Do we possess necessary expertise?


Yes, that is possible because this technology is frequently used in market
and we can possess them if needed.

4.2.2 Economical Feasibility


This project requires no more requirements rather than computer.
Because, it’s all about making software. Even the softwares it needs are very
easily available in market at very cheaper cost. So this is economically feasible at
all.
Cost – Benefits Analysis: -
Cost Analysis:
 The initial cost of the System will include PCs & software.
Cyber Cafe

 The basic cost of the System will be the Software, which will be
required for the System. It also includes the purchasing of that
Software.
 The operator by entering the id or name of the field can easily access
the information
 The billing and searching of the system is quiet accurate and quick that
it will save the time consumption.

Benefit Analysis:
Tangible benefits: -
The system is directly saving cost as there is no requirement of direct
training to the users, no wastage of extra recourses like time, human power etc.
Intangible benefits:-
The system provides better services to the users. It also provides the
users with accurate, reliable and up-to-date information about the system.

4.2.3 Operational Feasibility


Any project proposed can be beneficial only if it satisfies the customer’s
requirements. If project is included with everything which is in old project in
addition with new features then this system is operationally feasible if all Users
are satisfied with system. The following points have been probed to declare the
proposed system as operationally feasible.

 The newer system will accommodate all the requirements.


 The new system can greatly help by reducing all paper work and availing all
needed information of the customer with just a click of the mouse button.
 The newer system will fit to its existing system and perform more function
than manual system.
 The user of the system will get the information at the time when they need it,
and also speed up the transaction processing.
Cyber Cafe

 The system will work when it is developed and installed and there are no
major barriers to its implementation. This accounts for the operational
feasibility of the proposed system.

4.2.4 Schedule feasibility:


The project was assigned on starting of the semester and we have enough
time of 2 month to complete our project. The project completion is 31-Mar-2009.
So the project is schedule feasible. Here, we have given milestones to achieve
the task.

Milestones and Deliverables


A milestone is a subproject that you should have completed at the given
point in time, if you want to keep on track then.
A deliverable is a documentation of a part of a project that you are
required to hand in. The given deadlines are firm.
Deliverables are usually milestones but milestones need not to be
deliverables.

SR ACTION START DATE END DATE


NO

1 Analysis 27/01/2009 05/02/2009

2 Design 10/02/2008 25/02/2008

3 Development 03/03/2009 08/04/2009

4.3 Requirements Validation


Requirement validation is concerned with showing that the requirement
actually defines the system which customer wants. It has much common with
analysis as it is concerned with finding problems with the requirement. However
they are distinct processes since validation should be concerned with a complete
Cyber Cafe

draft of the requirement document whereas analysis involves working it


incomplete Requirement.

During requirement validation process different types of check should be


carried out on the requirement in the requirement document. This check includes:

 The Name of the Users should be character oriented.


 The Password should contain only characters and numbers. It should not
include special character.
 The format of the date should be DD-MON-YYYY
 In the Find and Search models, we have to enter the Name of the Customer
or id of the customer in order to find the all information of customer.

4.4 Function of System


Our system for cyber café management system specifies how the
information held by the cyber café about, booking and availability is maintained.
Hence following functions are carried out:

1. Registration Of Surfing:
Description: This functionality is used to register the operator. It is
compulsory for the operator to fill the Register then only they get the information
related to the System.
Inputs: Username and Password
Source: Username and Password provided by operator, password from
database.
Output: Authentication to operator to access the ticket, passenger and bill related
information.

2. Search and Viewing:


Description: This functionality is used to find zip codes of various state,
city and country. It also includes a functionality, which is used to find zip codes of
Cyber Cafe

state, city or country by just providing the address (that is name of state, city or
country).

Input: Take the various zip codes from the user.


Sources: Username and Password provided by user.
Outputs: The zip code from the given information of the user.

Input: Request the user for the any services.


Sources: Username and Password by user.
Outputs: The request services will be provided and desirable output will be
provided.

4.5 Data Modeling

4.5.1 Use-case Diagram:


Cyber Cafe

4.5.2 CLASS DIAGRAM:


Cyber Cafe

4.5.3 Activity Diagram:


Cyber Cafe
Cyber Cafe

Relogin

Start

Login
Customer
Information
Invalid
Valid

Menu

Available
space space

entry
Cyber Cafe Relogin

Start

Login

Invalid
Valid

Menu

Available
space space

entry

Payment

End

4.5.4 DATA DICTIONARY:


Cyber Cafe

Login:

Field Data
Sr.No Nam Type Description
e s

1. Admin_id Text Describes the administrator’s


identification

2. Password Varchar(50) Describes the administrator’s


password

Table name: cust_info

Field Data
Sr.No Name Types

1. id Int

2. name varchar(50)

3. addresh varchar(50)

4 age int

5 gender int

6 Ph_no varchar(MAX)

7 In_date_time bit

8 Pc_no float

Table name :- bill_info


Cyber Cafe

Field Data
Sr.No Name Types

1. id Int

2. name varchar(50)

3. Pc_np varchar(50)

4 In_date_time int

5 Out_date_time int

6 Total_duration varchar(MAX)

7 Total_amount bit
Cyber Cafe

4.6.1 context diagram

Surfing
information

Time customer
Information Details

Payment Customer Information

Surfing Information
Cyber Cafe
Customer Time Details Manager
Management time Information

Customer Payment
Information Information

Receptionist
Cyber Cafe

4.6.2 Data Flow Diagram

Password

Process
User for login
system

Conformation
User
Inquiry about
customer
Customer
info.
Process for
Customer Cyber Cafe Manager
system Info. about
availability
of space
Payment
Surfing
Customer info
data Time
info
Cyber Cafe

4.6.3 Process Specification & Decision Table


Login Process

IF user enters username & password


THEN enter into the system.
ELSE
Invalid user.
END IF.

Process For Surfing

WHILE customer make request

IF space is available

THEN provide pc to customer

ELSE
Not available

ENDIF

ENDWHILE

Process For Payment:

WHILE customer log off pc

IF customer doing payment

THEN receive & confirmation

ELSE
Not receive & not confirmation

ENDIF

ENDWHILE
Cyber Cafe

4.7 Selection Of Hardware & Software


Hardware Technology Used:
To run the application software of the system in the computer the
minimum configuration required is as below:

 768 MHz Pentium processor or other compatible.

 Intel Chipset Motherboard.

 256 MB-RAM.

 10 GB Hard-Disk.

 52X Compact Disc drive or faster.

 Monitor. [640 * 600 Display]

Software Technology Used:

 .Net Platform
Cyber Cafe

5. SYSTEM DESIGN
5.1 Database Design / Data Structure Design
5.1.1. Table and Relationship

Table name: cust_info

Field Data
Sr.No Name Types

1. id Int

2. name varchar(50)

3. addresh varchar(50)

4 age int

5 gender int

6 Ph_no varchar(MAX)

7 In_date_time bit

8 Pc_no float
Cyber Cafe

Table name :- bill_info

Field Data
Sr.No Name Types

1. id Int

2. name varchar(50)

3. Pc_np varchar(50)

4 In_date_time int

5 Out_date_time int

6 Total_duration varchar(MAX)

7 Total_amount bit
Cyber Cafe

6. IMPLEMENTATION PLANNING AND DETAILS


6.1. Implementation Environment
 Single vs. Multiuser
As the cyber cafe management system is going to be
developed id desktop application,at the time of the
implementation it should be kept in mind that system will be
used con currently.So the development approach would remain
for the concurrent use.
 GUI vs. Non GUI
The system is completely GUI. This is because today
customer feels comfortable while working with images or
pictures.The user should feel convient while wporking with the
system

6.2 Program/Module specification

 Single Layer
This module of the project deals with the categorized
the different themes of the map like point,line and polygon into
their respective types after distinguishing them differently from
the database. It displays the map single layer that can be of any
feature like point, line or polygon theme.Displaying map of
single layer explorers the entire details of the selected layer.

 Multi Layer
Seconly, comes the module for the multilayer.Here the
individual themes that were selected in the above module are
overlaid on the other type of the theme.Doing this makes the
decision making process eaiser about which place is related to
other like if there is no way near very good polygon feature then
it would show that would be profitable to dig well at that place.

 Query Builder
In the above two modules we were just retrieving the data from
database which already store after converting from SHP to SQL
format in the form of map .Now we need to query that map.So
as per the type of query fired we could be able to get the result
using query builder.Thus ,in order to get the detail and display
of the desired location we make use of query builder.

6.3 Security Features

 The editing of database and the result is all protected by the password,
which only administers can access. (In this case it’s us.)

 The admin side is password protected.Only authorized user can


access
the admin side.
Cyber Cafe

6.4 Coding Standard

We have followed the coding standards throughout this application

 Each table name is given in such a manner that it indicates its use
 Each script is properly documented by comments to carify its
presence.
 Variables names are related to the process and the behavior of the
entity.
 We have used tab instead of space in our project.
 Keywords are never used as variable name in our project

6.5 Sample Coding

using System;
using System.Collections.Generic;
using System.ComponentModel;
using System.Data;
using System.Drawing;
using System.Linq;
using System.Text;
using System.Windows.Forms;
using System.Data.SqlClient;

namespace WindowsFormsApplication1
{
public partial class Form4 : Form
{
SqlConnection cn;
SqlCommand cmd;
SqlDataAdapter da;
DataSet ds = new DataSet();
public Form4()
{
InitializeComponent();
}

private void label7_Click_1(object sender, EventArgs e)


{

textBox5.Text = DateTime.Now.ToString();
}

private void button1_Click(object sender, EventArgs e)


{
cmd = new SqlCommand("insert into cust_info values(@a,@b,@c,@d,@e,@f,@g,@h)",
cn);
cmd.Parameters.AddWithValue("@a", Convert.ToString(textBox1.Text));
cmd.Parameters.AddWithValue("@b",textBox2.Text);
cmd.Parameters.AddWithValue("@c", textBox3.Text);
cmd.Parameters.AddWithValue("@d", textBox4.Text);

if (radioButton1.Checked == true)
{
Cyber Cafe

cmd.Parameters.AddWithValue("@e",Convert.ToString(radioButton1.Text = "male") );
}
else
if (radioButton2.Checked == true)
{
cmd.Parameters.AddWithValue("@e",Convert.ToString(radioButton2.Text = "female"));
}
cmd.Parameters.AddWithValue("@f", maskedTextBox1.Text);
if (maskedTextBox1.MaskFull)
{
MessageBox.Show("full space");
maskedTextBox1.Text = "";
maskedTextBox1.Focus();
return;
}
cmd.Parameters.AddWithValue("@g", textBox5.Text);
cmd.Parameters.AddWithValue("@h", textBox6.Text);

cn.Open();
cmd.ExecuteNonQuery();
cn.Close();
MessageBox.Show("done");
ds.Clear();
reload();
Form5 f5 = new Form5();
f5.Show();
this.Hide();
}

private void Form4_Load(object sender, EventArgs e)


{
cn = new SqlConnection(@"Data
Source=.\SQLEXPRESS;AttachDbFilename=C:\Documents and Settings\dipesh sompura\My
Documents\Visual Studio
2008\Projects\WindowsFormsApplication1\WindowsFormsApplication1\Database1.mdf;Integrated
Security=True;User Instance=True");
reload();
}
public void reload()
{
da = new SqlDataAdapter("select * from cust_info", cn);
da.Fill(ds);
}

private string remove(int p)


{
throw new NotImplementedException();
}

private void button2_Click(object sender, EventArgs e)


{
Form3 v = new Form3();
v.Show();
this.Hide();
}

private void button3_Click(object sender, EventArgs e)


{
cmd = new SqlCommand("update cust_info set id ='" + textBox1.Text + "',address='" +
textBox3.Text + "',Age='" + textBox4.Text + "',gender='" + radioButton1.Text + "',ph_no = '" +
Cyber Cafe

maskedTextBox1.Text + "',date_time = '" + textBox5.Text + "',pc_no = '" + textBox6.Text + "'where


name ='" + textBox2.Text + "'", cn);
cn.Open();
cmd.ExecuteNonQuery();
MessageBox.Show("Data Updated");
textBox1.Text = "";
textBox2.Text = "";
textBox3.Text = "";
textBox4.Text = "";
if (radioButton1.Checked == true)
{
radioButton1.Text = "male";
}
else
if (radioButton2.Checked == true)
{
radioButton2.Text = "female";
}

maskedTextBox1.Text = "";
textBox5.Text = "";
textBox6.Text = "";
cn.Close();
Form5 b = new Form5();
b.Show();
this.Hide();
}

private void button4_Click(object sender, EventArgs e)


{
cmd = new SqlCommand("delete from cust_info where name='" + textBox2.Text + "'", cn);
cn.Open();
cmd.ExecuteNonQuery();
MessageBox.Show("Data deleted");
textBox1.Text = "";
cn.Close();
Form5 a = new Form5();
a.Show();
this.Hide();
}

private void button5_Click(object sender, EventArgs e)


{
MDIParent1 W = new MDIParent1();
W.Show();
this.Hide();
}

private void button6_Click(object sender, EventArgs e)


{
Form5 h = new Form5();
h.Show();
this.Hide();
}
}}

7. TESTING
Cyber Cafe

The aim of testing process is to identify all defects existing in software


product. Testing a program consists of subjecting the program to as
test inputs and observing if the program behaves expectedly or not. If
the program fails by any means or gives unexpected results than the
failure occurred are noted for later debugging and corrections.

7.1 Testing Plan


The testing process is a process that to a greater extends
runs in parallel with other processes. As the same thing applied for the
whole system for testing and once the entire module works perfectly
as desired, at later stages test suite are made to test in integrated
environment to check for proper functioning. So the software is tested
at various levels by various testing techniques. A well rounded test
plan notes any risk factors that jeopardize and includes a testing
schedule. So we can say that Test planning details the activities,
dependencies and effort required to conducting the system test.

7.2 Testing Strategy


The test strategy is a formal description of how a software
product will be tested. A test strategy is developed for all levels of
testing as and when required. The testing team analysis the
requirements, writes the test strategy and reviews the plan with the
project team. The test plan may include test cases, conditions and the
test environment, a list of related tasks, pass/fail criteria and risk
assessment.
As we were working in a team it was a bit difficult to check the
work done as no individual was assigned for that particular task or
work. Moreover checking the work done was very important to reduce
risk factor. Right from the starting we planned to adopt one technique
called Assessment by rotation. Thus the work done by one member
was assessed by the other for some time and again revolved for other
level check reduced the errors.

7.3 Testing Methods


Testing methods are mainly divided into two parts:
1) Black Box Testing
2) While Box Testing

1) Black box testing: It is the testing without the knowledge of the


internal working of the item being tested. For this testing test groups are often
used. Due to the nature of this testing the test planning can begin as soon as
the specifications are written. This testing has some advantages like it is
more effective on larger units of code than glass box testing, tester needs no
knowledge of implementation, including specific programming languages,
tester and programmer are independent of each other, tests are done from a
user’s point of view, will help to expose any ambiguities or inconsistencies in
the specifications, test cases can be designed as soon as the specifications
are complete.
Cyber Cafe

2) White box testing: It is the testing strategy that deals with the internal
logic and structure of the code. White box texting is also called as the glass
testing, structural testing, open testing or the clear box testing. The
advantages of the white box testing are that as the knowledge of internal
coding structure is needed, it becomes easy to find out which type of input
data can help min testing the application effectively. It helps in optimizing the
code helping in removing the extra code which may cause hidden defects in
the system.

The other sub testing techniques are as follows:


 Unit Testing
Unit testing focuses on verification effort on the smallest unit of
the project that is the module. Unit testing exercises specific
paths in a module’s control structure to ensure complete
coverage and maximum error detection. This test focuses on
each module individually, ensuring that it functions properly as a
unit. Hence, the naming is Unit testing.

 Integration Testing
Integration testing addresses the issues associated with the
dual problems of verification and program construction. After
the software has been integrated a set of high order tests are
conducted. The main objective in this testing process is to take
unit tested modules and builds a program structure that has
been dictated by design.

 Task Testing
Task testing helps the system to test whether all the tasks are
carried out properly or not. It also solves logical errors. By
carrying this test we were assured that all processes in our
project are appropriate.

 Behavioral Testing
This testing is used to check the behavior of the system. This
test helped us to develop the test case for the particular system.
This testing thus helps to test the different events associated
with the system.

 Inter Task Testing


There are several processes or tasks which are carried
simultaneously. Moreover this testing also helps to test the
errors associated with the data storage activities. This testing
helped our project to solve the error while data designing which
is very much important for a successful project.

 Final Testing
After the integration of all the modules we deploy whole
application. One of the member of the development team will do
the testing of the whole project and create the excel sheet of the
Cyber Cafe

bugs. After the completion of the solving of these errors the


project would be ready to use.

 Alpha Testing
Alpha testing is done by the person not involved in the project.
In our case it would be done by out concerned faculty members
itself.

7.4 Test Cases


In software engineering the most common definition of a test case is
set of conditions or variables under which a tester will determine if a
requirement or use case upon an application is partially or fully
satisfied. In the situation each sub requirement must have at least one
test case. A good test should neither be too simple nor too complex.
Cyber Cafe

8. SCREEN SHOTS AND USER MANUAL

LOGIN FORM: This form is used by administrator to login and access


Menu form :(mdi form)
Cyber Cafe

Available space

Customer entry
Cyber Cafe

Customer & system detail

Customer bill paid


Cyber Cafe

9. LIMITATION AND FUTURE ENHANCEMENT

IQ test is developed to serve the very basic purpose to check the user’s IQ level.

 The limitation of the project can be considered it to be a windows


application and so no online test can be conducted.
 The project being developed in Oracle and Microsoft Visual Studio .Net
which are extensively used tools today so can be easily converted to
other system structure according to the requirement in near future.
Cyber Cafe
Cyber Cafe

10. CONCLUSION

The project ‘CYBER CAFE helps the user to keep record. Moreover the
system also provided with the option to begin with any subject of choice. This
project deals management of cyber café The project aids an additional
feature like bill generation, number of user display, data of each user, efficient
management .

Вам также может понравиться