Академический Документы
Профессиональный Документы
Культура Документы
MANAGEMENT
SYSTEM
Date-
Signature
Km Minakshi
BCA Vth Sem
5. During the room booking and check-in the room available screen show
the status of the room whether rooms are booked or vacant or out of
order. Using the screen we can check the available of the room of the
particular date.
10)email facility
11)feedbacks
System connectivity
No data duplication
No paper work required
Time efficient
Cost efficient
Automatic data validation
User friendly environment
Fast data insertion and retrieval
Easy performance check
Problem Recognition
Feasibility Study
Requirement Analysis
Problem Recognition:
It is the phase in which the Current need for the System is to be defined. This
site of Computer Peripherals & Consumables has all the up to date
information.
Feasibility Study
Feasibility study is a test of a system to its work ability, ability to meet user
needs and effective use of resources. In this section we consider the economic,
technical and behavioral factors as per the proposed system
Economic Feasibility:-.
In this section we determine the cost analysis. How our system can effected to
the user, how it can be helpful for organization. By this we increase the overall
speed of software installation & maintenance cost is very low. Our proposed
system can on normal computer system configuration. We can use further
according to the needs; this feature saves the human resources and their
efforts.
BCA- 0900318 IIHST2019BCA318 Page 8
Technical feasibility :-
Behaviors feasibility ;-
Our project will be fully GUI application . user can easily understand the
meaning of particular tools. User required just setting the properties
according to need.
Reusable ;-
It is reusable for every user. They can implement & set the property according
to own choice.
Interaction between new system and exiting will be very easy a demo will
be needed for existing users.
System development has a life cycle has various activities. These activities are
highly interrelated . One must know what the problem is before it can be
solved.
A process consisting of the tow major steps of system analysis and design start
when management in or sometimes system development feel that a new
system or an improvement in the existing system is required.
This is the first phase in the SDLC. In this phase, someone identifies the need
for a new system or information needs. The organization information system
needs may result from request to deal with problem in current, from the desire
to problem in current , from the desire to problem perform addition task , or
information technology could be used to an existing .
When the request is mode, the first process that takes place dividing it
three
Request clarification
Feasibility study
Request approval
Technical feasibility
Economic feasibility
Operation feasibility
Request approval- It is not necessary that all requested are feasible. After a
project request is approval , its cost, priorities, completion time and
personal requirements used for initiation of development.
2 .Project planning
This is the second phase of SDLC. The two major activities in this phase are
the formal of the system problem and the presentation of reasons why the
system should or should not be developed by the organization.
The project leader and initial team of system analysis also produce a specific
plan, which the term will follow along with the SDLC steps. This baseline
project plan customizes the standardized SDLC and specifies the time and
resources needs for its execution.
Before the requirement analysis, one must know what the problem is before it
can be solved. The bases for a candidate system are recognition of a need for
improving an information system. After the definition of problem, an initial
investigation in conducted for various operations performed by a system and
their relationships within and outside the system. Depending on the results of
the initial investigation, the survey is expended to a more detailed feasibility
study. A feasibility study is a test of a system proposal according to its
workability, impact on the organization, ability to meet user needs and
effective use of resources. The objective of a feasibility study is not to solve the
problem but to acquire a sense of its scope.
4.Design of system
The most creative and challenging phase of the system development life cycle
is system design. The term design describes a final logical system. Design phase
of software development deals with transforming the customer requirement
into a logical system. A good software design is seldom arrived through a
single step procedure but goes through series of steps. We can broadly classify
various design activities into two important parts-
Preliminary design
5 .Coding
The input to the coding is the design document. During the coding phase,
different modules identified in the design document are coded according to
the module specification. After a module has been coded, code walk through
are carried out to ensure as possible during code inspection.
6. Software Testing
The testing of newly developed software, prior to its actual use, is commonly
followed practice.
7. Implementation
8.Maintenance
e.g.
1.Database-
Login Page:
Owner or Manager need to log in using login id and password.
Customer Page:
Can view their details as well as Booking details.
Receptionist Page:
He can Offline Book the available room at the hotel.
Payment Page:
This interface helps in paying the money via several modes.
There are mainly Seven Entities Owner, Manager, Employee, client, hotel,
Payment, book. These five entities would manage the whole
system. There are mainly Seven Entities Owner, Manager, Employee,
client, hotel, Payment, book.
Owner:
The owner is a super user of the system. The owner is just like admin. The
owner has all right to view and modify the data in the system. The owner
has followings attributes.
Owner ID:
Name:
This attribute would hold the name of the owner. The name is varchar
type variable which holds the data length up to 250 characters.
Email:
This is an essential attribute of the table. Every owner must have a
working email id to keep in contact with employees. This field has
validation only email formatted values will be stored.
Contact.:
This is multi valued attributes which mean every owner can have more
the one mobile number in database.
Address:
This attribute would hold the address of the owner. Each employee must
provide the address.
Manager:
The manager is a secondary user of the system. The manager can view
hotel details, manage employee, booking, solve client’s problem. The
manager has followings attributes.
ManagerID:
This is numeric 14 digits number which is unique to every Manager.
ManagerID is the primary key to Manager table in the database.
Name:
This attribute would hold the name of the manager. The name is varchar
type variable which holds the data length up to 50 characters.
Email:
Contact.:
This is multi valued attributes which mean every manager can have more
the one mobile number in database.
Address:
This attribute would hold the address of admin. Each employee must
provide the address. Admin address is verified via Human resource team.
Employee:
The employee is another user of the system. An employee can view hotel
details, verify the online booking room availability for clients. The
employee has followings attributes.
EmpID:
This is numeric 14 digits number which is unique to every Employee.
EmpID is the primary key to Employee table in the database.
Name:
This attribute would hold the name of Employee. The name is varchar
type variable which holds the data length up to 50 characters.
Email:
This is an essential attribute of the table. Every employee must have a
working email id to keep in contact with employees. This field has
validation only email formatted values will be stored.
Contact.:
This is multi valued attributes which mean every employee can have more
the one mobile number in database.
BCA- 0900318 IIHST2019BCA318 Page 20
Address:
This attribute would hold the address of the employee. Each employee
must provide the address.
Client:
The client is the basic end user of our system most of the business is done
through them. Clients would book the desired hotel room. The client
would provide the feedback. The client has following attributes.
ClientID:
This is numeric 14 digits number which is unique to every Client. ClientID
is the primary key to client table in the database.
Name:
This attribute would hold the name of clients. The name is varchar type
variable which holds the data length up to 50 characters.
Email.:
This is an essential attribute of the table. Every client must have a
working email id. This field has validation only email formatted values
will be stored.
Address:
This attribute would hold the address of clients. Address of clients would
help us to connect with them and visit the location. This would provide
better services.
Hotel:
Every hotel registered with the system has the information in this entity.
Hotel is the main concern of system.
HotelID:
Name:
For customer point of view, every hotel does have its name. The name is
very important.
No Of Rooms:
Every hotel has many rooms. To make it easy for the customer. And check
availability no. of rooms should be in the database.
Address:
This attribute would hold the address of the hotel. Address of Hotel
would help the client to find it easy and visit the location. This would
provide better services.
Book:
Before going to book any room. The client should check the availability. If
the desired room is available. They can book it.
BookID:
This is numeric 14 digits number which is unique to every Booking.
BookID is the primary key to case table in the database. Each Payment is
uniquely identified using this id.
RoomNO:
With reference to hotel booking must have room no.
Date:
This would hold the date of the transaction.
Payment:
Payment ID:
This is numeric 14 digits number which is unique to every Payment.
PaymentID is the primary key to payment table in the database. Each
Payment is uniquely identified using this id.
BookingID:
This is a reference to a booking. This would help the admin to find this
payment is against booking.
Date:
This would hold the date of the transaction.
Transaction No.:
The transaction number is reference no given by the bank.
Status:
Status of every transaction either it would be pending or confirm is being
updated in this field.
5.
Address Varchar
Table Name: ManagerMaster
Primary Key: ManagerID
Description: To store the details of General Manager
Serial
No. Fields Datatype Description
1. ManagerID Integer Primary key
2. Name varchar
3. Email varchar
Multiple contacts can
4. Contact. Integer exist for single admin
5. Address varchar
Serial
No. Fields Datatype Description
2. Name varchar
3. Email varchar
5. Address varchar
Serial
No. Fields Datatype Description
2. Name Varchar
4. Address Varchar
Serial
No. Fields Datatype Description
Serial
No. Fields Datatype Description
3. Date Date
Serial
No. Fields Datatype Description
1. PaymentID Integer Primary key
2. BookID Integer Foreign key to BookMaster
3. Date Date
Transaction
4. No. Varchar
5. Status Varchar
The phase of system design comes after the analysis. It is to schedule or plan a
new system i.e. the analyst plans the input and output of the new system, its
logic and physical devices to receive data generate information and store the
result. In this phase, it is specified how to meet requirement of the user as
pointed out during the system analysis phase. Since system design involves all
the aspects of the system, it is needed a very exhaustive design for all kind of
the system. Consequently, the designing needs to be done module wise. When
the design involves the inputs, output, files and procedures used to achieve the
objective of the system, it is called the logical design. When the design involves
the actual implementation of the system programs to actual implementation of
the system programs to accomplish the task, it is called the physical design.
It consists of data preparation, data capture and data entry. Care is taken to
minimize the data to be captured. No redundant data is to be captured. The
layout of the input document should be such that it is easily understandable by
the operator.
Output design
The objective of the output design is to produce timely, accurate and relevant
information in a user understandable manner. It is the most direct method of
communicating the result of the system to the user.
We have also designed some forms for the interaction of the user with the
system these forms are shone on the following pages with small description
and coding of each form.
Login module
Home module
Front office module
Banquet module
House- keeping module
LOGIN MODULE
1. login
2. new user
3. change password
a) LOGIN- registered users can login into the application by using
their username and password.
b) NEW USER- user can create new user by giving the details.
i.e. name, permission, password etc
(c) CHANGE PASSWORD- registered users can change their
password(permission granted only for admin)
HOME MODULE
Rooms layout
FRONT OFFICE MODULE
a) Masters
b) Transactions
c) Reports
HOTEL PROFILE
This is to enter the details of our hotel (i.e.hotel name address, phone
no,email,etc)
Tax master- this is to enter the tax details of our hotel (i.e. tax name,
percentage)
Charges master- this is to enter the charges details of our hotel(i.e. charge
type and amount
Room type master- this is to enter the room type details of our hotel.
2. transaction-
Booking
Check-in
Check-out
Availability
Night audit
Booking
This is to enter the personal information, check-in information, and
billing information details of our customers. Customers can book the
rooms through phone or directly coming to hotel for future. Cancellation
option used to cancel the booked rooms after the customer confirmation
to cancel the booked rooms.
Check-in
Check-in details will be entered while the customers arrival to the hotel.
Customer invoice will be generated when the customer check-in to hotel.
Room availability-
During the room booking and check-in the room availability screen
shows the status of the rooms whether rooms are booked or vacant or
out of order using this screen we can check the availability of the rooms
on the particular data range
3.Report
Master report
Hotel profile report
Transaction reports
Reservation report
Customer room stay view report
House keeping
a) Masters
b) Transaction
c) Reports
Master –
House keeping status
Stock entry
BCA- 0900318 IIHST2019BCA318 Page 34
Stock entry-this is to enter the stock details of the house keeping things. By
using this we are well informed number of stocks availability and make
purchase for future needs.
2. Transactions-
Stock issuep
Room servicing
Room servicing history
Complaints
Room servicing- this is to assign the work and rooms to employees to clean or
service the rooms
Room servicing history- by using the particular date range we can check the
complete history of the house keeping words by employees.
ADMIN
Car application
To work
Detecting tag
Yes
no yes
Customized triggered to guide the next tap Lane controller is rising and let the car passing
Customer
First name
address id
surname
Creditcar dno
guests
postcode
Telephon eno
eenono eno
reques book
t
rooms reservation
reserved
Price/night
Satalite tv
fullmeal
checkout
Payment Creditcar
internet
Room type method dno
Room no Booking id
But, regardless of the outcome, it's a really good idea to identify it, assess its
probability of occurrence, and estimate its impact.
Risk management aims at dealing with all kinds of risks that might affect a
project.
Type of risk
Risk identification is a systematic attempt to specify threats to the project plan.
By identifying known and predictable risks the project manager takes step
toward avoiding them when possible and controlling them when necessary.
One method for identifying risks is to create a risk item checklist.
The checklist can be used for risks identification and focuses on some
subset of known and predictable risks in the following generic subcategories:
Product size - risks associated with the overall size of the software to be
built or modified.
Process definition -risks associated with the degree to which the software
process has been define and is following by the development organization.
Staff size and experience -risks associated with the overall technical and
project experience of the software engineers who do the work.
Product size - risks associated with the overall size of the software to be
built or modified.
Process definition -risks associated with the degree to which the software
process has been define and is following by the development organization.
Staff size and experience -risks associated with the overall technical and
project experience of the software engineers who do the work.
So the control flow is drawn from one operation to another. This flow can be
sequential, branched or concurrent. Activity diagrams deals with all types of
flow control by using different element like fork, join etc.
Project start
Planning of project
Detail study of project
Designing of system
Detail description of system
Module design
System flow
Data base design
Implementation in document
Final presentation
Entity
Primary key
Relationship set
Attribute set
The maintenance phase is the last phase of the system development life
cycle. Yet a life cycle is circular in that the last activity leads back to the
first. This means that the process of maintaining an information system is
the process of returning to the change implemented.
Corrective Maintenance
Adaptive Maintenance
Testing methodology :
While Box Testing : In order to test loops, we used the loop testing
technique. Most of the loops used in this project belong to the category of
Black Box Testing : when we know the specified function that a product has
designed to perform, tests can be conducted that demonstrate each function is
fully operational while at the same time searching for errors in each function.
A black box test examines some fundamental aspect of a system with little
regard for the internal logical structure of the software. Black box testing also
called behavioral testing, focuses on the functional requirements of the
software. Black box testing attempts to find errors in the following categories:
This System will Help them to properly Manage their Hotel and help in
growth without creating and hassle. This System is completely secure
since every user is provided with user ID and Password so there is no
chance of any unauthorised access.
Online Payment, Booking and cancellation make it easier to use. So, using
this system will help in reducing the labour and provide more facility for
Customer to like Hotel and visit again and again.