Вы находитесь на странице: 1из 8

1

Cyber Management
System
2

INDEX

Sr. No Topic Page no


1 Introduction

1.1 Project Scope

1.2 Objective

1.3 Project Functions

1.4 Software & Hardware


Specification

2 Specific Requirements

2.1 External Interface


Requirements

2.1.1 User Interfaces

2.1.2 Hardware Interfaces

2.1.3 Software Interfaces

2.1.4 Communication
Interfaces

2.2 Functional Requirements

3 Detailed Design

3.1 Detail architecture

3.2 Analysis

3.2.1 Functions Analysis

4. Testing

5. Conclusion:
3

1. Introduction

1.1 Project Scope

Presently, most of the functions in the Cyber cafés are done manually. The owner
records the details of the users; login and logout time and has to calculate the amount.
All these details are written in book. The owner also has to calculate the total income
of a day. The present system has following limitations:

 Manual recording consumes excess time


 Chances of error
 The retrieval of information is time consuming
 Lack of billing system and manual calculation of daily income.

Focusing on the drawbacks and inadequacies of the existing system, the new
system is designed which could well replace the existing system.

The current system is an application program that provides a better way of


management of internet cafes. Users those who have an account with the system are
entertained. Creation of account is however very easy, thereby enhances the
reliability of the system. The new system provides the following features:-

 Eliminate the limitations of existing system.


 Efficient storing of user details.
 Automate generation of bill by calculating time.
 The system can provide the report including customer details, login time,
logout time and amount.

1.2 Objective of project

The purpose of the project is to automate cyber cafes. The software must include
provisions to keep user details and login history. It should help the café owners to
retrieve user details when needed from the system. It should help the café owner in
calculating daily usage of the systems and income.

In this project an attempt is made to design a system for the CYBER CAFÉ that
makes the management of recording user details, internet usage and billing much
easier. The objective of this software is to maintain the details of users and login
history. It has the features like adding, viewing, editing of user details, billing etc
4

1.3 Project Functions:

Cyber Management system provides service for both user and admin. So following
are the features divided according to the role of a person.

Owner/Admin Functions:

 Registration: Owner supposes to register himself into the system to access the
software.

 Login: If Owner has registered previously then he can login into the system.

 Features : Once Admin is logged in, he has several features as follows :

a. User-List: Owner can check user's list on the system.

b. Delete User: Admin can delete user as well.

c. Generate Bill: Admin able to generate bill of a user according to his time
duration.

d. Logout: Once owner has done with his work, then he can logout from the
system.

Users Function:

 Registration: Customer supposes to register himself to access the system .

 Login: If Customer has registered previously then he can login into the
system.

 Change Password : Customer can change password

 Logout: Once customer has done with his work, he can logout from the
system.
5

1.4 Software and Hardware Specification:

Software Specification

Operating System - Windows 7 or Higher


Front End - C++
Back End - File Handling.

Hardware Specification

Processor - Pentium IV or Higher.


Memory - 4 GB RAM

2. Specific Requirement
6

2.1 External Interface Requirement

External interface requirements specify hardware, software, or database elements with


which a system or component must interface. This section provides information to
ensure that the system will communicate properly with external components.

2.1.1 User interfaces

In this, User interacts with the system through console. After the successful
registration, user can log in into the system with his/her Username & Password which
can be entered through console. Once he has completed his work, he can logout by
entering input through console.

2.1.2 Hardware interfaces

As in our project, user interacts with the system through console. So hardware
interface can be “keyboard” and “Mouse” through which we can enter the input in
order to interact with the system.

2.1.3 Software interfaces

Software interfaces (programming interfaces) are the languages, codes and messages


that programs use to communicate with each other and to the hardware. Examples are
the Windows, Mac and Linux operating systems. Our system is build on the basis of
C++ language in Dev-C++ environment.

2.1.4 Communication interfaces

This project uses “File Handling” concept to store the data. Here File handling acts as
a database and through the files communication between Admin and other users takes
place. Data is shared through files.

2.2 Functional Requirements


7

Registration: Owner/user supposes to register himself into the system to access the
software. Only after the registration, admin/user can access the system so registration
is must.

Login: If Owner/User has registered previously then only he can login into the
system. During login, user/admin needs to enter the valid username & password
which was entered at the time of registration.

Generate Bill: Bill will be generated automatically based on the time acquired by
user during the login. According to that, total amount will be calculated & display.

Logout: Once owner/user has done with his work, then he can logout from the system
which will lead to the home screen.

Change Password: In order to change the password, User needs to enter his/her Old
password first. Once the match found, user can enter new password and it will be
saved in the file. It will replace the old one.

3. Detailed Design

Cyber Management System comprises of two modules which are Admin and User.
Admin can register & login to the system. Admin can remove the user if necessary.
Admin is also responsible to generate the bill according to the login time of the user.

Where user can register and login to the system and change his/her password.
Once he/she has completed his/her work, then he/she can logout.

3.1 Detail architecture

Cyber
8

Admin User

Registration Registration
Login Login
View User list a Book
1. Add Change Password
Delete2.User
Add a B Logout
Logout

User
User
Admin Registration
Registration
No match
Registrat Check
Check
ion old
old
passwor
passwor
dd
No
IfIf
Registered
Registered
NO Match
If
If
Registered
Registered Change
Change
Yes
Password
Password
Yes
User
User Login
Login
Admin
Login

View
View User
User Delete
Delete
info
info from
from User
User
DB
DB from
from DB
DB

3.2 Analysis

3.2.1. Functions Analysis

4. Testing

5. Conclusion:

Вам также может понравиться