Professional Documents
Culture Documents
Our project entitled Seating arrangement system for college is to develop and setup
an application, which helps universities and college to reduce their human and manage the
examination seating arrangement for the students and also students can know their allotted room
at the time of examination. No of students allocated in a room, staff allocated for the exam
details and much more related information is maintained in an efficient manner in the database
and a user friendly graphical interface is created, so that the information about any room
allotment and staff allotment at the time of examination in colleges with their respective room
can be found in quick time and in less effort.
The overall project is designed and developed in regard to the need of the universities and
colleges where they can do seating arrangement for examination in computerized manner.
This project is meant for maintaining the examination details, student details who are all
attending the exams, Absentees details, Staff allotment for respective room are available in the
database. So we can retrieve the information from database to system at the time of examination.
Visual Basic 6:
VISUAL BASIC is a high level programming language which evolved from the earlier
DOS version called BASIC. BASIC means Beginners' All-purpose Symbolic Instruction Code. It
is a very easy programming language to learn. The code looks a lot like English Language.
Different software companies produced different versions of BASIC, such as Microsoft
QBASIC, QUICKBASIC, GWBASIC, IBM BASICA and so on. However, people prefer to use
Microsoft Visual Basic today, as it is a well-developed programming language and supporting
resources are available everywhere.
Now, there are many versions of VB exist in the market, the most popular one and still
widely used by many VB programmers is none other than Visual Basic 6. We also have VB.net,
VB2005, VB2008 and the latest VB2010. Both Vb2008 and VB2010 are fully object oriented
programming (OOP) language.
VISUAL BASIC is a VISUAL and events driven Programming Language. These are the
main divergence from the old BASIC. In BASIC, programming is done in a text-only
environment and the program is executed sequentially. In VB, programming is done in a
graphical environment. In the old BASIC, you have to write program code for each graphical
object you wish to display it on screen, including its position and its color. However, In VB , you
just need to drag and drop any graphical object anywhere on the form, and you can change its
color any time using the properties windows.
On the other hand, because the user may click on certain object randomly, so each object
has to be programmed independently to be able to response to those actions (events). Therefore,
a VB Program is made up of many subprograms, each has its own program code, and each can
be executed independently and at the same time each can be linked together in one way or
another.
picture from the selected folder. You can also load the picture at runtime using the LoadPicture
method. For example, the statement will load the picture grape.gif into the picture box.
The Image Box
The Image Box is another control that handles images and pictures. It functions almost
identically to the picture box. However, there is one major difference, the image in an Image Box
is stretchable, which means it can be resized. This feature is not available in the Picture Box.
Similar to the Picture Box, it can also use the LoadPicture method to load the picture. For
example, the statement loads the picture grape.gif into the image box.
The List Box
The function of the List Box is to present a list of items where the user can click and
select the items from the list. In order to add items to the list, we can use the AddItem method.
For example, if you wish to add a number of items to list box 1, you can key in the following
statements
The Combo Box
The function of the Combo Box is also to present a list of items where the user can click
and select the items from the list. However, the user needs to click on the small arrowhead on the
right of the combo box to see the items which are presented in a drop-down list. In order to add
items to the list, you can also use the AddItem method. For example, if you wish to add a
number of items to Combo box 1, you can key in the following statements
The Check Box
The Check Box control lets the user selects or unselects an option. When the Check Box
is checked, its value is set to 1 and when it is unchecked, the value is set to 0. You can include
the statements Check1.Value=1 to mark the Check Box and Check1.Value=0 to unmark the
Check Box, as well as use them to initiate certain actions. For example, the program will change
the background color of the form to red when the check box is unchecked and it will change to
blue when the check box is checked. You will learn about the conditional statement
If.Then.Elesif in later lesson. VbRed and vbBlue are color constants and BackColor is the
background color property of the form.
You can coordinate the Drive List Box, the Directory List Box and the File List Box to search for
the files you want. The procedure will be discussed in later lessons.
MICROSOFT ACCESS
MS Access is a powerful multi-user DBMS developed by Microsoft Corp. It can be used to store
and manipulate large amounts of information and automate repetitive tasks, such as maintaining
an inventory and generating invoices. By using Access, we can develop easy-to-use data input
forms and create meaningful reports.
FEATURES OF ACCESS
Windows-Based Application
Access is a Windows-based application and therefore has an interface similar to Windows.
We can cut copy and paste data from any Windows application to and from Access.
Wizards and Builders
A wizard is a utility that helps us to perform complex tasks by guiding us through the
process. Wizards ask questions about the content style and format of the object that we want
to create, such as a report or data-entry screen, and then generate them automatically
Built-in Function
Access includes small programs known as functions that perform simple calculations or data
formatting. Access includes mathematical, financial, date, time and string functions.
Macros
For those users who dont want to write programs, access provides macros. Macros let us
perform common tasks without user intervention. Macros let us manipulate data, open forms
and reports and automate any task that is repetitive or complex.
Context-Sensitive Help and Answer Wizard
Like Windows NT, Access provides online, context-sensitive help. Access also includes a
unique Answer Wizards that answer questions written in simple English.
Built-in Security
Since Access is a multi-user database, security features are built into the DBMS. We can
enable database security at various levels. We can assign a password for loading Access so
that only authorized users can use it
Database Objects
Access stores all the data tables and other objects in a single database. These database objects
are queries, Forms, Reports and Macros.
Queries
A query is used to extract information from a database. A query can select a group of records
that fulfill a certain condition. Most Access databases contain more than one table. We can
combine specific fields from multiple tables into one datasheet
Forms
Forms display and print data from a table or a query. Forms enable us view, edit and print
data in a custom format.
.
reports
Reports present our data in a printed format. We can create different types of reports with a
DBMS. Our reports can combine multiple tables to present complex relationships among
different sets of data.
SYSTEM STUDY
2.1 EXISTING SYSTEM
The existing system is carried out manually. The existing system includes the data entries in
unclear package and most complicated packages. It contains of policies that simply makes the
job more complicated and confusable storages in the system.
Demerits
The processing time is very high.
There is a chance for committing many mistakes.
Retrieval of information is very difficult.
Error detection and correction may take long time.
Wastages of physical efforts.
Although few businesses would not benefit from a computerized system at all, the process of
carrying out this feasibility study makes the purchaser/client think carefully about how it is going
to be used.
After request clarification, analyst proposes some solutions. After that for each solution it is
checked whether it is practical to implement that solution.
This is done through feasibility study. In this various aspects like whether it is technically or
economically feasible or not. So depending upon the aspect on which feasibility is being done it
can be categorized into four classes:
Technical Feasibility
Economic Feasibility
Operational Feasibility
Legal Feasibility
The outcome of the feasibility study should be very clear. It should answer the following issues.
What is recommended?
Technical Feasibility
In technical feasibility the following issues are taken into consideration.
Once the technical feasibility is established, it is important to consider the monetary factors also.
Since it might happen that developing a particular system may be technically possible but it may
require huge investments and benefits may be less. For evaluating this, economic feasibility of
the proposed system is carried out.
Economic Feasibility
For any system if the expected benefits equal or exceed the expected costs, the system can be
judged to be economically feasible. In economic feasibility, cost benefit analysis is done in
which expected costs and benefits are evaluated. Economic analysis is used for evaluating the
effectiveness of the proposed system.
In economic feasibility, the most important is cost-benefit analysis. As the name suggests, it is an
analysis of the costs to be incurred in the system and benefits derivable out of the system. Click
on the link below which will get you to the page that explains what cost benefit analysis is and
how you can perform a cost benefit analysis.
Operational Feasibility
Operational feasibility is mainly concerned with issues like whether the system will be used if it
is developed and implemented. Whether there will be resistance from users that will affect the
possible application benefits? The essential questions that help in testing the operational
feasibility of a system are following.
Are the users not happy with current business practices? Will it reduce the time
(operation) considerably? If yes, then they will welcome the change and the new system.
Have the users been involved in the planning and development of the project? Early
involvement reduces the probability of resistance towards the new system.
Will the proposed system really benefit the organization? Does the overall response
increase? Will accessibility of information be lost? Will the system affect the customers
in considerable way?
Legal Feasibility
It includes study concerning contracts, liability, violations, and legal other traps frequently
unknown to the technical staff.
3. SYSTEM DESIGN
3.1 INPUT DESIGN
Input Design is the process of converting user-originated data to a computer based
format. Errors are controlled in the input design screen.
The goal of designing the Input Design is to make data entry as easy as possible.
Timely messages are given for every transaction and samples are shown in table
views. So objectives of Input Design are:
Uniqueness
Meaningfulness
Stability
The objective of the system is generation of reports for the queries posed. The output gives the
direct source of information to the user. The output design should be well formed so that it
contains all the required information and should be well formed to avoid any complexity in
getting information.
Well-designed output increases the efficiency and it should provide clarity to the user. The
output from the system communicates the results of process to the user. A brief description
should be given at end of each page. The output from the computer system communicates the
results of processing to the user
Decision points
Interface errors
Performance errors
Module interface test: here it is checked if the information is properly flowing into the
program unit and properly coming out of it.
Local data structures: these are tested to see if the local data within unit(module) is
stored properly by them.
Independent paths: All independent paths are tested to see that they are properly
executing their task and terminating at the end of the program.
Error handling paths: These are tested to check if errors are handled properly by them.
Integration testing is a systematic technique for constructing the program structure while
conducting tests to uncover errors associated with interfacing. The objective is to take unit tested
modules, integrate them, find errors, remove them and build the overall program structure as
specified by design.
4.1.5 Recovery Testing
Many computer-based systems must recover from faults and resume operation within a prespecified time. In some cases, a system may be fault tolerant; that is, processing faults must not
cause overall system function to cease. In other cases, a system failure must be corrected within a
specified period or severe economic damage will occur.
Recovery testing is a system test that forces the software to fail in a variety of ways and verifies
that recovery is properly performed. It the recovery is automated (performed by system itself),
re-initialization mechanisms, data recovery, and restart are each evaluated for correctness. If the
recovery requires human intervention, the mean time to repair is evaluated to determine whether
it is within acceptable limits.
4.1.6 Stress Testing
Stress tests are designed to confront program functions with abnormal situations. Stress testing
executes a system in a manner that demands resources in abnormal quantity, frequency, or
volume.
4.1.7 Security Testing
Any computer-based system that manages sensitive information or causes actions that can harm
or benefit individuals is a target for improper or illegal penetration.
Security testing attempts to verify that protection mechanism built into a system will protect it
from unauthorized penetration. During security testing, the tester plays the role of the individual
who desires to penetrate the system. The tester may attack the system with custom software
designed to break down any defenses that have been constructed; may overwhelm the system,
thereby denying service to others; may purposely cause system errors, hoping to find the key to
system entry; and so on.
Given enough time and resources, good security testing will ultimately penetrate a system. The
role of the system designer is to make penetration cost greater than the value of the information
that will be obtained in order to deter potential threats.
Training was given to the user of the system both theoretically as well practically.
They were briefed on the lines on the objectives of the system how to operate if and
the benefits that would reaped from the system.
The system as test in the users environment and the user was prompted to give his
suggestions.
Existing data was converted into file structures compatible to the system.
The strategy user changeover of the system was parallel along with the automated
system to test the validity of the system.
user and customer needs. The system's environment will change as new hardware is
introduced. Error, undiscovered during system validation, may merge and require repair.
The process of changing of a system after it has been delivered and is in use is called Software
maintenance. The changes may involve simple changes to correct coding errors, more extensive
changes to correct design errors or significant enhancement to correct specification errors or
accommodate new requirements. Maintenance therefore, in this context, really means evolution.
It is the process of changing a system to maintain its ability to survive.
There are three types of software maintenance with very blurred distinction between them.
4.2.1 Corrective Maintenance
Corrective Maintenance is concerned with fixing reported errors in the software. Coding errors
are usually relatively cheap to correct; design errors are more expensive as they may involves the
rewriting of several programs components. Requirements errors are the most expensive to repair
because of the extensive system redesign with may be necessary.
4.2.2 Adaptive maintenance
Adaptive maintenance means changing the software to new environment such as different
hardware platform or for use with a different operating systems. The software functionality does
not radically change.
4.2.3 Perfective maintenance
Perfective maintenance involves implementing new functional or non-functional system
requirements. These are generated by software customers as their organizations are business
changes.