You are on page 1of 77

1.

INTRODUCTION
1.1 OVERVIEW OF THE PROJECT
The proposed project is developed to manage the automobile in the automobile dealer
company. The main module in this project is login, automobile management, customer
management, sales, complaints and reports. The first module is the login. The automobile
showroom owner should login to the project for usage. The username and password are
verified and if it is correct, next form opens. If the username and password are not correct, it
shows the error message.
When a customer search for a automobile, if the automobile is available, they will be
taken to a page that shows the details of the automobile including automobile name,
automobile ID, quantity, price etc. Automobile Management System is useful for
maintaining automobiles, customers effectively and hence helps for establishing good relation
between customer and automobile organization. It contains various customized modules for
effectively maintaining automobiles and stock information accurately and safely.
When the automobile is sold to the customer, stock will be reduced automatically.
When a new purchase is made, stock will be increased automatically. While selecting
automobiles for sale, the proposed software will automatically check for total number of
available stock of that particular item, if the total stock of that particular item is less than 5,
software will notify the user to purchase the particular item.
Also when the user tries to sale items which are not in stock, the system will prompt
the user that the stock is not enough. Customers of this system can search for a automobile;
can purchase a automobile easily by selecting fast. On the other hand the stock of
automobiles can be maintained perfectly by the automobile shop manager overcoming the
drawbacks of existing system.

1.2 DESCRIPTION OF MODULES


Major modules of the automobile management system are

Login module
Registration module
Customer module
Automobile module
Sales module
Delivery module
Supplier module
Reports module

Login Module
It is used for logging in the automobile showroom management. It is used for
verifying the user. Once the user is authenticated, they can access the system.
Registration Module
New user can register in order to use the full features of this system. Normal users can
also access the proposed system but with limited features. Only the registered users can get
more priorities than the unregistered guest user. Once the guest users register to this system,
they can also get full access to this system.
Customer Module
It is used for adding new customers and for updating existing customers. It is used for
storing new customers as well as for updating the customers details. The module is very
useful to find the number of customers who paid bill. Some customers might not pay the bills
on time.
Customer details can be easily searched, so it will be easy to find bill payment details.
It has a primary key field named customerno. The file is very useful for maintaining
customers.
Automobile Module
2

It is used for adding new automobiles and for viewing, editing and deleting existing
automobiles. It is used for searching items in this system. Here the admin have the privileges
to search items in this system. Automobile details are stored with their brand name. When a
particular brand is being liked by people, that particular brand will be purchased and kept in
stock with large quantity.
Sales Module
It is used for adding sales details to proposed system. Here the admin have privileges
to add details in automobile showroom management. Sales reports can be viewed overall as
well as date wise, month wise and year wise.
Delivery Module
It is used for storing details of new deliveries in the automobile showroom
management. Admin can perform operations like monitoring automobile stock details,
customer order details and delivery details. Delivery reports can be viewed overall as well as
date wise, month wise and year wise.
Supplier Module
It is used for maintaining supplier details like supplier ID, name, contact person and
address and phone number. Supplier or dealer can be cancelled when their items are not being
sold out. It is very essential in order to get good stock items for a company.
Reports Module
It is used for generating various reports like cash order report, credit order reports and
payment reports. Sales and delivery reports can be viewed date wise, month wise and year
wise. Reports can be viewed based on the users choice.

1.3 SYSTEM SPECIFICATION

1.3.1 HARDWARE SPECIFICATION


CPU

: Intel Core i3

RAM

: 32MB

Hard Disk

: 5 GB

Monitor

: 16 LG

Mouse

: Logitech mouse

Keyboard

: 104 Keys

Mother Board

: Intel

Speed

: 3.3 GHZ

1.3.2 SOFTWARE SPECIFICATION


Operating System

: Windows 2007

Front End

: Visual Basic

Back End

: MS Access

Reports

: Data Report

1.4 SOFTWARE FEATURES


4

VISUAL BASIC 6.0


Visual basic is an ideal programming language for developing sophisticated
professional applications for Microsoft Windows. Visual basic programming introduces a
variety of features that make it easier to create powerful, flexible applications. It makes use of
Graphical User Interface for creating robust and powerful applications. The Graphical user
Interface uses illustration for text, which enables users to interact with an application.
Visual basic has evolved from the original BASIC language and now contains several
hundred statements, functions, and keywords, many of which relate directly to the Windows
Operating System includes,

Multitasking
Message driven architecture
Dynamic linking
CPU time slicing

Features of visual basic

Easier comprehension
User-friendliness
Faster application development
Introduction to Active-X technology
Internet features
Support OLE, which is a means of communication and gives application the

power to directly use and manipulate other windows application.


Data Environment Designer, which provides an interactive design time
environment for creating programs with runtime access to data.

Integrated Development Environment


Integrated Development Environment (IDE) is a term commonly used in the
programming world to describe the interface and environment that is used to create
applications.
IDE is commonly referred to as the design environment or the program. IDE is made
up of components such as menu bar, tool bar, object browser, form layout window, and form
designer.
5

In visual basic 6.0 IDE is a Multiple Document Interface (MDI) format. In Multiple
Document Interface format, the windows associated with the project will stay within a single
container known as the parent. Code and form based windows will stay within the main
container form.
Visual basic can be used to create the following types of applications.

Standard EXE
Active EXE
ActiveX DLL
ActiveX Control
VB application wizard

Event driven programming


Visual basic allows adopting more of a parallel approach, with independent sections
of code for each option that the user may select. This is known as Event Driven
Programming. Event Driven Programming is based on the Message Driven Architecture of
windows. Visual Basic programs are built around events. Events are various things that can
happen in program. In Event Driven application, the program statements are executed only
when a particular event calls specific parts of the code that is assigned to the event.
For example consider textbox control and some of its events,

Click event fires when text box control is clicked.


Mouse move event is fired when mouse is moved over the text box.

Data access options


Microsoft visual data tools allow the ability to view and manipulate tables, views,
stored procedures, and database schemas on SQL server and Oracle systems. Visual Basic
provides a variety of options to access Remote Client/Server databases.
ADO Object Model
Visual Basic supports ActiveX Data Objects Microsofts new, high level interface to
all kinds of data. ADO objects can be created at design- time using the updated Data
Environment Designer. ADO is an interface for both local and remote data access, remote and
6

disconnected record sets and hierarchical record sets. The ADO object model provides an
easy-to-use set of objects, properties, and methods for creating script that access data in
databases.
ADO consists of seven objects, three of which are independent and four are dependent
objects. Independent objects can exist by themselves; dependent objects must exist in
connection with an independent object.

Parameter
Connection
Command
Record set
Error
Property
Field

Purpose of choosing Visual Basic

It is an ideal programming language for developing sophisticated professional

application for Windows.


It makes use of Graphical User Interface for creating robust and powerful

applications.
It uses illustration for text, which enables users to interact with an application.
In GUI the options open to the user is much greater allowing more freedom to the

end user and developer.


Major features are easier comprehension, faster application development and other
aspects such as ActiveX, Internet features and VB script.

MS-ACCESS
Microsoft Access is a powerful database management system and the user can create
entire application that requires little or no programming. It supports GUI features and an
entire programming language, VBA (Visual Basic 6.0 for application). Access is easy enough
to use that in a short time beginners can manage their own data. In MS Access, the database
means a collection of tables that hold data. It collectively stores all other object such as

queries, forms and reports that are used to implement the database management function
effectively.
The MS-Access database can act as a back-end database for Visual Basic 6.0 as
affront end tool. MA Access supports the user with its powerful management functions.
Beginners can create their own database very simply with some mouse clicks. MS-Access
database supports so many data types when a user can incorporate data from other
applications. A database created in MS-Access can be accessed through Visual Basic 6.0
using data control.
Here database means a collection of related tables and a table means a collection of
number of records where a record means a collection of inter-related fields. It should be noted
that a field in an entity is used to describe straight. A single table can have any number of
indexed fields that can be used to locate records using an expression. This helps in filtering
out information according to specific criteria. A user can move inside a table very easily using
the navigator tools supported by the MS-Access database. A table can be accessed in a
number of ways like as a snapshot, dynast, etc.

2. SYSTEM STUDY
2.1 EXISTING SYSTEM
All automobile details like available in the company are entered and managed in this
and managed. Price details and stock details of the automobiles are managed separately. The
customer details are entered to call the customer for further purchase of automobile. The
8

customer name, address and phone number details are managed separately. The details are
entered and edited by the administrator.
But everything is done manually. Most of the existing system is manual, so data
manipulations are not accurate and also processing time is slow. When the stock and
automobile count increases, manual manipulation of data becomes very difficult.
2.1.1 DRAWBACKS
Even though computerized system exists, there are various drawbacks. They are as
follows.

User cannot search automobiles fast when the number of automobiles increases.
Primary key fields should be used wherever necessary while designing in order to

manage database efficiently and for accessing information soon.


Stock management is not efficiently done. User can only know when the stock is

empty. Prior information about stock is not possible.


Takes much time for searching particular automobile details.
Difficult to maintain automobile details and employee details
Existing system is not accurate.
Even though some existing systems are computerized, there occur redundancy

problems due to duplication of entries.


If the automobile entries have duplicate values, it cannot be maintained properly
and accurately

2.2 PROPOSED SYSTEM


The proposed system is very useful for the employee and customers. It avoids the
overheads for the employee. They can minimize the working stress and can keep essential
documents related to the automobile and the passengers as a softcopy. The advantage of the
proposed system is the reduction in the cost of the office equipments and the transaction is
done quickly. Any employee can answer if any delivery for a particular customer in a
particular day is available or not.

The proposed project will allow the customers to perform certain activities like login
and searching for automobiles. Customers may open an account with the store if they wish
including a username and password. In login form users will be authenticated and it is also
possible to find whether they are customer or admin through their login information which
was entered. A customer must be logged in before searching for automobiles for purchase.
If a user attempts to login with incorrect details, they will be not be redirected to
access the application. When a customer search for a automobile, if the stock of the
automobile is available, they will be taken to a page that shows the details of the automobile
including automobile title, automobile ID, quantity, price etc in order for sale.
2.2.1 ADVANTAGES OF PROPOSED SYSTEM
Features of the proposed project are as follows.

Stock management as well as automobile management is done very quickly as

well as efficiently in proposed project.


Another feature added in the project is, when the regular customers purchase

items from automobile, software will automatically give them discount offers.
Prepares and produces accurate outputs
Reduces the time needed and expenses
Makes the information flow efficient
Easy report generation is possible
Provides attractive user interface.
Efficient searching of automobile details by just entering automobile code is
possible.

3. SYSTEM DESIGN AND DEVELOPMENT


3.1 FILE DESIGN
Flat File Database
A flat file database is a database designed around a single table. The flat file design
puts all database information in one table, or list, with fields to represent all parameters. A flat
file may contain many fields, often, with duplicate data that are prone to data corruption. If

10

data between two flat files have to be merged, it is needed to copy and PSMte relevant
information from one file to the other. There is no automation between flat files.
If two or more flat files that contain client addresses, it is required to manually modify
the address parameters in each file that contains that clients information. Changing
information in one file has no bearing on other files. Flat files offer the functionality to store
information, manipulate fields, print or display formatted information and exchange
information with others, through email and over the Internet. Some flat files may be attached
to external files, such as text editors, to extend functionality and manage related information.
Relational File Database
A relational database, on the other hand, incorporates multiple tables with methods for
the tables to work together. The relationships between table data can be collated, merged and
displayed in database forms. Most relational databases offer functionality to share data:

Across networks
Over the Internet
With laptops and other electronic devices, such as palm pilots
With other software systems

Designing flat file databases is simple and requires little design knowledge. Flat files
can be developed using just about any database engine. Flat files can be created in relational
database engines by not taking advantage of relational design concepts. Designing a
relational database takes more planning than flat file databases. With flat files, it is possible to
add information, as you deem necessary.
With relational databases, it is required to be careful to store data in tables such that
the relationships make sense. Building a relational database is dependent upon the ability to
establish a relational model. The model must fully describe how the data is organized, in
terms of data structure, integrity, querying, manipulation and storage. Relational databases
allow defining certain record fields, as keys or indexes, to perform search queries, join table
records and establish integrity constraints.
Search queries are faster and more accurate when based on indexed values. Table
records can be easily joined by the indexed values. Integrity constraints can be established to
11

ensure that table relationships are valid. If the project is able to establish a one-to-many
relationship in the data tables, relational database should be used because a flat file is not
sufficient to handle the data processing needs. Relational databases offer more robust
reporting with report generators that filter and display selected fields.
Relational databases offer the capability to building own reporting modules. Most
relational databases also offer the capability to import and export data from other software.
There are three primary relational database systems, proprietary, open source and embedded.
Proprietary relational databases require the use of proprietary development languages, often
times, to complement SQL. Microsoft Access, for example, combines Visual Basic with SQL.
Open source databases, such as MySQL, are distributed freely to encourage user
development.
Embedded, relational databases are packaged as part of other software packages, such
as with tax-preparation software packages. The vendor supplies the database, and all
manipulation tools, to control the database structure. These databases are, often times,
accompanied with tools to provide audit trails of transactions. Proposed project uses
relational database files implementing SQL queries in MS Access. So 1 to many relationships
can be established between tables and the table data can be accessed soon even in the nonindexed locations.

3.2 INPUT DESIGN


Input is any data or instructions entered into the memory of a computer. Two types of
input are data and instructions. Data is a collection of unorganized items that can include
words, numbers, pictures, sounds, and video. A computer processes data into information,
which is organized, meaningful, and useful. Instructions can be in the form of programs,
commands, or user responses.

12

A program is a series of instructions that tells a computer how to perform the tasks
necessary to process data into information. A command is an instruction given to a computer
program. A user response is an instruction you issue to the computer by responding to a
question posed by a computer program. Any hardware component that allows entering data,
programs, commands, and user responses into a computer is an input device. Inputs of
Automobile Management System are eid, ename, qualification, automobileid, brand, cusid,
cusname and salary.

3.3 OUTPUT DESIGN


Output design involves specifying how production of on-screen reports and paper
based reports will occur. Output may occur to database or file for storing information entered
or also for use by other systems. Output is data that has been processed into a useful form
called information. Four types of output are text, graphics, audio, and video. Text consists of
characters (letters, numbers, punctuation marks, or any other symbol requiring one byte of
computer storage space) that are used to create words, sentences, and paragraphs.
Graphics are digital representations of non-text information such as drawings, charts,
photographs, and animation (a series of still images in rapid sequence that gives the illusion
of motion). Audio is music, speech, or any other sound. Video consists of images played back
at speeds to provide the appearance of full motion. An output device is any computer
component capable of conveying information to a user.

3.4 DATABASE DESIGN


Database is designed to manage large bodies of information. The management of data
involves both the definitions of structures for the storage of information. In addition the data
base system must provide for the safety of the information solved, despite system crashes or
due to attempts at unauthorized access. For developing an efficient database proposed project
have to fulfill certain conditions such as controlled redundancy.

13

Defining the data


Inputting the data
Locating the data
Accessing the data
Communicating the data
Revising the data

Objectives of Database design


In database design several objectives are designed such as:

Ease of use
Control of data integrity
Control of redundancy
Control of security
Data independence (logical & physical)
Data storage protection
System performance
System functions
System compatibility

For achieving the abovementioned criterias we have to make use of various features
that are available with the RDBMS by enforcing integrity constrains, it is possible to ensure
data integrity and reduce data inconsistency to a great extent.

3.4.1 DATAFLOW DIAGRAM


A Data Flow Diagram (DFD) is a diagram that describes the flow of data and the
processes that change data throughout a system. Its a structured analysis and design tool that
can be used for flowcharting in place of or in association with information. Oriented and
process oriented system flowcharts. Four basic symbols are used to construct data flow
diagrams. They are symbols that represent data source, data flows, and data transformations
and data storage. The points at which data are transformed are represented by enclosed
figures, usually circles, which are called nodes.
Data Flow Diagram Symbols

14

Source or Destination of data

Data Flow

Process

Storage

When analysts prepare the Data Flow Diagram, they specify the user needs at a level
of detail that virtually determines the information flow into and out of the system and the
required data resources.
The network is constructed by using a set of symbols that do not imply physical
implementations. The Data Flow Diagram reviews the current physical system, prepares input
and output specification, and specifies the implementation plan.
Steps to Construct Data Flow Diagrams
Four steps are commonly used to construct a DFD

Process should be named and numbered for easy reference. Each name should be

representative of the process.


The destination of flow is from top to bottom and from left to right.
When a process is exploded in to lower level details they are numbered.
The names of data stores, sources and destinations are written in capital letters.

Rules for constructing a Data Flow Diagram


15

Arrows should not cross each other.


Squares, circles and files must bear names.
Decomposed data flow squares and circles can have same names.
Draw all data flow around the outside of the diagram.

Level 0

Login process

Admin

Login

Automobile
management access

Level 1

Admin

Customer

Customers

Supplier

Product
16

Login

Supplier

Product

Level 2

Admin

Customer

Login

Supplier

Supplier

Order
17

Product

Customers

Product

Order

Sales and
payment

Payment

Sales

Order

Delivery

reports

reports

and
Payment
reports

3.4.2 DATABASE TABLES


Table name

: user

Primary key : username

Field name

Data type

Description

username

Text

Username

password

Text

Password

Table name

: cust_info

Primary key : cid

18

Field name

Data type

Description

Cid

Text

Customer ID

Cname

Text

Customer name

Caddress

Text

Address of the customer

Cgender

Text

Gender of the customer

Ccity

Text

City of the customer

Cpincode

Number

Pin code of the customer

Cphone

Number

Phone number of the customer

Clandline

Number

Landline number of the customer

Cemail

Text

Email ID of the customer

Table name

: automobile

Primary key : vid

Field name

Data type

Description

Vid

Text

Automobile ID

Model

Text

Model of the automobile

Color

Text

Color of the automobile

Chassisno

Text

Chassis number
19

Engineno

Text

Engine number

Paymentoption

Text

Payment option

Srprice

number

Selling price

Table name

: booking

Foreign key : cid, eid

Field name

Data type

Description

cid

Text

Customer ID

Cname

Text

Customer name

Caddress

Text

Address of the customer

Srid

Text

Showroom ID

Ino

Text

Insurance number

Eid

Text

Employee ID

Date

Date/time

Date of booking

Time

Text

Time of booking

Model

Text

Model of the automobile

Color

Text

Color of the automobile

Srprice

Number

Showroom price

Aprice

Number

Advance price

Bamount

Number

Balance amount

Table name

: insurance

Primary key : policyno

Foreign key : cid, eid


20

Field name

Data type

Description

Cid

Text

Customer ID

Cname

Text

Customer name

Caddress

Text

Address of the customer

Cphone

Number

Phone number of customer

Vid

Text

Automobile ID

Model

Text

Model of the automobile

Color

Text

Color of the automobile

Chassisno

Text

Chassi number of the automobile

Eid

Text

Employee number

Nname

Text

Nominee name

Iname

Text

Name of the insurance

Address

Text

Insurer address

Relationship

Text

Relationship with the nominee

City

Text

City of the insurer

Pincode

Number

Pin code of the insurer

Email

Text

Email ID of the insurer

Premium

Number

Premium amount

Vfrom

Date/time

Insurance from

Vto

Date/time

Insurance end date

Srid

Text

Showroom ID

Policyno

Text

Policy number

21

Table name

: emp

Primary key : eid

Field name

Data type

Description

eid

Text

Employee ID

Ename

Text

Employee name

Designation

Text

Designation of the employee

Fname

Text

Father name

Paddress

Text

Address

City

Text

City of employee

Pincode

Number

Pincode of employee

Mno

Number

Mobile number

Lno

Number

Landline number

Picture

Text

Picture of an employee

Dob

Date/time

Date of birth

Gender

Text

Gender of employee

Age

Number

Age of an employee

22

Table name

: loan

Primary key : loanno

Field name

Foreign key : cid, eid, vid

Data type

Description

Cid

Text

Customer ID

Cname

Text

Customer name

Vid

Text

Automobile ID

Model

Text

Model of the automobile

Chassisno

Text

Chassis number

Engineno

Text

Engine number

Srprice

Number

Showroom price

Loanamount

Text

Loan amount

Downpayment

Text

Down payment

Instaa

Number

Installation amount

Loanduration

Text

Loan duration

Loanno

Number

Loan number

Eid

Text

Employee ID

Date

Date/time

Date

Time

Text

Time
23

4. SYSTEM TESTING AND IMPLEMENTATION


4.1 SYSTEM TESTING
The common view of testing held by users is that it is performed to prove that there
are no errors in a program. It is extremely difficult since designer cannot prove to be one
hundred percent accurate. Therefore, the most useful and practical approach is with the
understanding that testing is the process of executing a program with explicit intention of
finding errors that make the program fail.
Testing has its own cycle. The testing process begins with the product requirements
phase and from there parallels the entire development process. In other words, for each phase
of the development process there is an important testing activity. Successful testing requires a
methodical approach. It requires focusing on basic critical factors:

Planning
Project and process control
Risk management
Inspections
Measurement tools
Organization and professionalism

24

Test Plan
Before going for testing, first we have to decide upon the type of testing to be carried
out. The following factors are taken into consideration:

To ensure that information properly flows into and out of program


To find out whether the local data structures maintains its integrity during all steps

in an algorithm execution
To ensure that the module operate properly at boundaries established to limit or

restrict processing
To find out whether error - handling paths are working correctly or not
To find out whether the values are correctly updated or not
Check for validations

Black Box Testing


It is a software testing approach in which the tester doesnt know the internal working
of the item being tested. For example in a Black box test, on software design the tester only
knows the input and the expected outputs. Tester doesnt know how the program derives the
output. Tester doesnt even imagine as to how, the coding is done. Tester need to know only
the specifications.
The advantages of black box testing approach are

The test is unbiased because the designer and the tester is independent of each

other
The tester needs no specific knowledge on any programming language
The test is done from the point of view of the user, not the designer.
The test can be designed as soon as the specifications are complete

The disadvantages of black box testing approach are

The test can be redundant if the software designer has already run a test case.
The test can be difficult to design
Testing every possible input stream is unrealistic.

Unit Testing

25

Unit or module testing is the process of testing the individual components


(subprograms or procedures) of a program. The purpose is to discover discrepancies between
the modules interface specification and its actual behavior. In our system each module must
be tested independently for validation.
Integration Testing
Integration testing is the process of combining and testing multiple components
together. The primary objective of integration testing is to discover errors in the interfaces
between the components. In our system each of the modules mentioned above, are tested for
checking the integration between them, after each of them are tested individually.
System Maintenance
All system is dynamic and subjects to constantly changing requirements. Effort must
be devoted to adapting them and design must be flexible specified so that such changes can
be easily implemented. It activity is called system maintains. It includes improvement of
system functions and correction of errors. Back up of the entire database files are taken and
stored in secondary storage devices like magnetic tapes and disks so that it is possible to
restore the system at the earliest. If there is a break down or collapse, then the system giver
provision to restore database files, storing data in a separate secondary device leads to an
effective and efficient maintains of the system.
The master file has flags for maintains after for maintains. After the mentioned period,
the rejection suppliers, unused data in the files will be deleted in the master file. It method is
the increasing the memory to store the data. Software maintenance is a set of software
engineering activities that occur after software has been delivered for the customer and put
into operation. The success of the software and the project relies on the maintenance
procedure adopted. As with the venture of human, not a single one is perfect. The further
modifications are left to the followers. It is because the opinion or vision or a thing differs
from individual to individual. The maintenance is performed at regular intervals to keep the
project safe and reliable.
Development is single activity maintenance is a continuous activity. Maintenance
involves activities like inspections, corrections and enhancements. Once the system is

26

delivered and deployed, it enters the maintenance phase. The system need to be maintained
not because of some of its components wear out and need to be replaced, but because there
are some residual errors remaining in the system that must be removed as they are
discovered. It includes activities related to debugging the software after it goes live, changes
are required to address evolving software and enhancement to meet changing customer
requirements. So maintenance phase involves

Understanding the effects of change.


Testing the new parts
Retesting the old parts that were not changed
Making changes to both the code and the documents.

These changes have to be designed by the user before the change can be carried out.
Since requirement change request involves cost, user will be cautious while requesting the
software changes. The software will require continued support. The system maintenance
means the maintenance activities after and during the system development processes. It
include activities related to debugging the software after it goes live, changes acquired to
meet changes in user requirement.
Maintenance phase identifies if there are any changes required in the current system.
If the changes are identified, then an analysis is made to identify if the changes are really
required. Cost benefit analysis is away to find out if the change is really essential.
System Analysis
The term system is derived from the Greek word systema, which means of
organized relationship among functioning units of components. And the study of system
concepts has three basic implications:

A system must be designed to achieve a predetermined objective


Interrelationships and interdependence must exist among the components
The objectives of the organizations as a whole have a high priority than the
objective of its subsystems.

Preliminary Analysis

27

Analysis is the detailed study of the various operations performed by a system and
their relationships within and outside the system. For the efficient and effective utilization of
the available resources, timing availability of accurate information is very important.
Information is the back bone of any organization. There for, it has to be made available all
time to ensure proper decision-making.
Information also has to be accurate, current, timely, relevant and usable. In other
words, an effective information system should be able to provide information to those in need
of it, at the time they need of it, at the time they need it and in the way they need it. The need
for managing data and retrieving information efficiently, lead to an extensive use of
computers in the business world.
The computers have convinced the management that computerized system is
preferable to the existing system; most organization has computerized their application areas
using traditional file processing concepts. The computerized system, by itself does not
guarantee of efficient information retrieval. The effectiveness of the system, to great deal,
depends on the way in which data is organized and managed. Way in which data is organized
in the existing system is not integrated, since there is no connection or integration between
one module and another on accomplishing the task.
Analysis is detailed study of various operations performed by a system and their
relationships within and outside the system. A key question is what must be done to solve
the problem? One aspect of analysis is determining the boundaries of the system and
determining whether or not a new proposed system should consider other related items. It is
the process of gathering and interpreting facts; diagnosing the problems and using the
information recommend improvements to the system.
Threats to System Security
The lists of potential threats are as follows

Errors and Omissions


Disgruntled and Dishonest Employees
Fire
Natural Disaster
External Attack
28

System Security
Security is a critical stage in system development. Even candidate system must
provide built-in features for security and integrity of data. Without safe guards against
unauthorized access, fraud, embezzlement, fire and natural disaster, a system could be so
vulnerable as to threaten the survival of the organizations.
To do an adequate job on security, the risk, exposure, cost and specific measures such
as password should be analyzed to provide protection. In addition, back up of copies of
software and recovery restart procedures must be available when needed.
The amount of protection depends on the sensitivity of data, the reliability of the user
and the complexity of the system. The motive behind security is to keep the organization
running, protect data as an asset and seek management support for more installations.
System Security Measures
After system security risk has been evaluated, the next step is to select security
measures. The measures are

Identification
Access Control
Audit Control
System Integrity

Identification
It is the scheme of identifying person to the system based on Something you know
such as a password or a picture badge, Something you are such as finger print or voice print
or Something you have such as credit card, key or special terminal.
Access Control
Controlling the access to the computer facility is secured through encoded cards or
similar devices. Encryption prevents intruders from accessing data by scrambling messages
across telephones to the destination.
Audit Control
29

Auditing must be supported at all levels of management. Audit control protects a


system from external security breaches and internal fraud or embezzlement. Various software
programs are available to help in audit function.
System Integrity
The line of different safeguards the functioning of hardware, software and physical
security and operating procedure. Proper back of hardware and software are extremely
important.

4.2 SYSTEM IMPLEMENTATION


System implementation is the important stage of project when the theoretical design is
tunes into practical system. The main stages in the implementation are as follows:

Planning
Training
System testing and
Changeover planning

Planning is the first task in the system implementation. Planning is deciding on the
method and the time scale to be adapted. At the time of implementation of any system people
from different departments and system analysis involve. They are confirmed to practical
problem of controlling various activities of people outside their own data processing
departments. The line manager controlled through an implementation co-ordinate committee.
The committee consists of ideas, Problems and complaints of user department. It must also
consider,

The implementation of system environment.


Self selection and allocation for implementation tasks.
Consultation with unions and resources available.
Standby facilities and channels of communication.

30

5. CONCLUSION
The system is completely menu driven and extremely user friendly since it is
developed in an efficient front end tool VB. Appropriate error messages are also provided too
guide the user in a proper and user friendly manner.
The software Automobile Management System has been developed in windows
2007 environment using PHP as front end and MS Access as back end. Time consumptions
reduced to a great extent and user as less complexity in handling it database.
The project is fully fledged and user friendly, End users will be lightened in using it
software because it is easy to have bills and reports and mostly all contents to be entered are
to selected from combo box. It reduces the calculating efforts to be carried out by the staff.

31

6. SCOPE FOR FURTHER ENHANCEMENT


Further expansion of the system also can be done in future if needed. The application
can be enhanced in the future with the needs of the organization. The database and the
information can be updated to the latest forthcoming versions.
There are also possibilities for enhancing and further developing the project with
customized reports according to the latest information and needs of the company. Thus the
system can be altered in accordance with the future requirements and advancements. System
performance evaluation must be monitored not only to determine whether or not they perform
as plan but also to determine if they should have to meet changes in the information needed
for the company.
The performance of the system will be evaluated to determine whether system
achieves the results that are expected and whether the predicted benefits of the system are
realized.

BIBLIOGRAPHY

32

REFERENCE BOOKS

James. A Senn, System Analysis and Design, 2005.


Pressman, Software Engineering, 2010, pp.200-230.
Elias Award, System Analysis and Design, 2006.
S.S. Ipress, VB, 2006, pp.1-180.
S. Parthasarathy, B. W. Khalakar, System Analysis, Design and Introduction to
Software Engineering, 2010, pp.39-80.

REFERENCE WEBSITES

www.programmingworld.com
www.vbnetcode.com
www.w3schools.com
www.vbcode.com
www.vbdevelopplus.com
www.codepark.com

APPENDIX
A. SAMPLE INPUT
Login form
33

Admin login

34

User login
35

Insurance form
36

Service form
37

Spare parts form


38

Employee details form


39

Customer details
40

Imported automobile details


41

Automobile import details


42

Booking form
43

Loan details
44

Loan payment details


45

Customer purchase form


46

B.SAMPLE OUTPUT
47

Splash form

On successful login

48

Admin welcome page


49

Facilities

50

Available facilities
51

Bikes
52

Specific bike
53

View bike color


54

Showroom details

55

56

C.SAMPLE CODING
Private Sub Command1_Click()
Me.Hide
MDIenter1.Show
End Sub

Private Sub Command10_Click()


On Error GoTo errmsg
Adodc1.Recordset.MoveFirst
Exit Sub
errmsg:
MsgBox Err.Description
End Sub

Private Sub Command11_Click()


Adodc1.Recordset.MoveLast
End Sub

Private Sub Command12_Click()


On Error GoTo errmsg

57

Adodc1.Recordset.MovePrevious
Exit Sub
errmsg:
MsgBox "You Are in First Record"
End Sub

Private Sub Command13_Click()


On Error GoTo errmsg
Adodc1.Recordset.MoveNext
Exit Sub
errmsg:
MsgBox "You Are in Last Record"
End Sub

Private Sub Command2_Click()


Unload Me
End Sub

Private Sub Command3_Click()


Text1.Text = ""

58

Text2.Text = ""
Text3.Text = ""
Text4.Text = ""
Text5.Text = ""
Text6.Text = ""
Text7.Text = ""
End Sub

Private Sub Command4_Click()


Call enable
Adodc1.Refresh
If Adodc1.Recordset.RecordCount = 0 Then
a=1
Else
Adodc1.Recordset.MoveLast
a = Adodc1.Recordset.Fields(0) + 1
End If
Adodc1.Recordset.AddNew
Text1.Text = a
Text2.SetFocus

59

End Sub

Private Sub Command5_Click()


Me.Hide
alldetails.Show
End Sub

Private Sub Command6_Click()


If Adodc1.Recordset.EOF = True Then
MsgBox "NO RECORDS"
Else
ans = MsgBox("DO you want to delete the record", vbOKCancel + vbExclamation +
vbDefaultButton2, "DELETE")
If ans = vbOK Then
Adodc1.Recordset.Delete
Adodc1.Refresh
MsgBox "Record Deleted", vbInformation, "Record Deleted"
End If
End If
End Sub

60

Private Sub Command7_Click()


'On Error GoTo err1
a = MsgBox("Do you want to save the record", vbOKCancel + vbDefaultButton1, "SAVE")
If a = vbOK Then
If Option1.Value = True Then
Adodc1.Recordset.Fields(3) = "MALE"
Else
Adodc1.Recordset.Fields(3) = "FEMALE"
End If
Adodc1.Recordset.Update
Adodc1.Refresh
Call disable
MsgBox "RECORD SAVED", vbOKCancel, "SAVED"
Else
MsgBox "Record NOT SAVED"
Adodc1.Recordset.CancelUpdate
End If
'err1:
'MsgBox Err.Description, vbQuestion, "Primary Key Error"
End Sub

61

Private Sub Command8_Click()

End Sub

Private Sub Command9_Click()


Call enable
End Sub

Private Sub DTPicker1_CallbackKeyDown(ByVal KeyCode As Integer, ByVal Shift As


Integer, ByVal CallbackField As String, CallbackDate As Date)
Dim DATE1 As Date
DATE1 = Date
Text6.Text = DateDiff("yyyy", Format(DTPicker1, "dd/mm/yyyy"), DATE1)
If Val(Text6.Text) < 0 Or Val(Text6.Text) < 24 Then
DTPicker1.SetFocus
MsgBox " Age limit not satisfied "
End If
End Sub

Private Sub Form_Load()


62

Call disable
End Sub

Private Sub Picture2_Click()

End Sub

Private Sub Picture3_Click()

End Sub

Private Sub Picture4_Click()

End Sub

Private Sub Text1_KeyPress(KeyAscii As Integer)


Call charvalid(KeyAscii)
End Sub

Private Sub text1_LostFocus()

63

If Text1.Text = "" Then


MsgBox "ENTER THE CUSTOMER ID ", vbCritical
End If
End Sub

Private Sub Text12_KeyPress(KeyAscii As Integer)


Call charvalid(KeyAscii)
End Sub

Private Sub Text12_LostFocus()


If Text12.Text = "" Then
MsgBox "ENTER THE LANDLINE NUMBER ", vbCritical
End If
End Sub

Private Sub Text13_KeyPress(KeyAscii As Integer)


Call emailvalid(KeyAscii)
End Sub

64

Private Sub Text13_LostFocus()


If Text13.Text = "" Then
MsgBox "ENTER THE EMAIL ID ", vbCritical
End If
End Sub
Private Sub Text2_KeyPress(KeyAscii As Integer)
Call alphavalid(KeyAscii)
End Sub

Private Sub text2_LostFocus()


If Text2.Text = "" Then
MsgBox "ENTER THE CUSTOMER NAME ", vbCritical
End If
End Sub
Private Sub Text3_KeyPress(KeyAscii As Integer)
Call charvalid(KeyAscii)
End Sub

Private Sub Text3_LostFocus()

65

If Text3.Text = "" Then


MsgBox "ENTER THE CUSTOMER MOBILE NUMBER ", vbCritical
End If
End Sub

Private Sub Text4_KeyPress(KeyAscii As Integer)


Call addressvalid(KeyAscii)
End Sub

Private Sub Text4_LostFocus()


If Text4.Text = "" Then
MsgBox "ENTER THE CUSTOMER ADDRESS ", vbCritical
End If
End Sub
Private Sub Text15_KeyPress(KeyAscii As Integer)
Call alphavalid(KeyAscii)
End Sub

Private Sub Text15_LostFocus()


If Text15.Text = "" Then

66

MsgBox "ENTER THE CITY ", vbCritical


End If
End Sub

Private Sub Text16_KeyPress(KeyAscii As Integer)


Call charvalid(KeyAscii)
End Sub

Private Sub Text16_LostFocus()


If Text16.Text = "" Then
MsgBox "ENTER THE PINCODE ", vbCritical
End If
End Sub
Public Sub disable()
Text2.Enabled = False
Text3.Enabled = False
Text4.Enabled = False
Text12.Enabled = False
Text13.Enabled = False
Text15.Enabled = False

67

Text16.Enabled = False
Option1.Enabled = False
Option2.Enabled = False
End Sub

Public Sub enable()


Text2.Enabled = True
Text3.Enabled = True
Text4.Enabled = True
Text12.Enabled = True
Text13.Enabled = True
Text15.Enabled = True
Text16.Enabled = True
Option1.Enabled = True
Option2.Enabled = True
End Sub

Private Sub Text6_Change()


If (KeyAscii >= 48 And KeyAscii <= 57) Or KeyAscii = 32 Or KeyAscii = 46 Or KeyAscii =
8 Then
Else
68

MsgBox " Please Enter date in format: 12.4.1990 ", vbCritical + vbOKOnly, "Warning"
KeyAscii = 0
End If
End Sub

Employee form
Dim file1 As String

Private Sub Combo1_KeyPress(KeyAscii As Integer)


Call charvalid(KeyAscii)
End Sub

Private Sub Combo1_LostFocus()


If Combo1.Text = "" Then
MsgBox "ENTER THE EMPLOYEE DESIGNATION ", vbCritical
End If
End Sub

Private Sub Command1_Click()


Me.Hide

69

MDIenter1.Show
End Sub

Private Sub Command10_Click()


On Error GoTo errmsg
Adodc1.Recordset.MoveFirst
Image1.Picture = LoadPicture(Adodc1.Recordset.Fields(10))
Exit Sub
errmsg:
MsgBox Err.Description
End Sub

Private Sub Command11_Click()


Adodc1.Recordset.MoveLast
Image1.Picture = LoadPicture(Adodc1.Recordset.Fields(10))
End Sub

Private Sub Command12_Click()


On Error GoTo errmsg
Adodc1.Recordset.MovePrevious

70

Image1.Picture = LoadPicture(Adodc1.Recordset.Fields(10))
Exit Sub
errmsg:
MsgBox "You Are in First Record"
End Sub

Private Sub Command13_Click()


On Error GoTo errmsg
Adodc1.Recordset.MoveNext
Image1.Picture = LoadPicture(Adodc1.Recordset.Fields(10))
Exit Sub
errmsg:
MsgBox "You Are in Last Record"
End Sub

Private Sub Command14_Click()


CommonDialog1.ShowOpen
file1 = CommonDialog1.FileName
Image1.Picture = LoadPicture(file1)
End Sub

71

Private Sub Command2_Click()


Text1.Text = ""
Text2.Text = ""
Combo1.Text = ""
'Text3.Text = ""
Text10.Text = ""
Text11.Text = ""
Text15.Text = ""
Text12.Text = ""
Text13.Text = ""
Text14.Text = ""
Option1.Value = False
Option2.Value = False
'Text5.Text = ""
'Text6.Text = ""
'Text4.Text = ""
'Text8.Text = ""
'Text7.Text = ""
'Text9.Text = ""

72

Text16.Text = ""
Image1.Picture = ""
End Sub

Private Sub Command3_Click()


'On Error GoTo err1
a = MsgBox("Do you want to save the record", vbOKCancel + vbDefaultButton1, "SAVE")
If a = vbOK Then
If Option1.Value = True Then
Adodc1.Recordset.Fields(12) = "MALE"
Else
Adodc1.Recordset.Fields(12) = "FEMALE"
End If
'smid = App.Path
'FILE2 = smid & "\PHOTOS\" & Text2.Text & ".JPG"
'FileCopy file1, FILE2
'Dim sql1 As String
'Dim sm As New ADODB.Recordset
'sql1 = "SELECT * FROM student_admission"
'sm.Open sql1, CON, adOpenDynamic, adLockOptimistic

73

'CON.Execute "INSERT INTO student_admission VALUES('" & file1 & "')"


Adodc1.Recordset.Fields(10) = file1
Adodc1.Recordset.Fields(2) = Combo1.Text
Adodc1.Recordset.Update
Adodc1.Refresh
Call disable
MsgBox "RECORD SAVED", vbOKCancel, "SAVED"
Else
MsgBox "Record NOT SAVED"
Adodc1.Recordset.CancelUpdate
End If
'err1:
'MsgBox err.Description, vbQuestion, "Primary Key Error"
End Sub

Private Sub Command4_Click()


End
End Sub

74

'Private Sub Command5_Click()


'sal = Val(Text3.Text)
'Select Case sal
'Case Is < 5000
'Text5.Text = sal * 10 / 100
'Text6.Text = sal * 15 / 100
'Text4.Text = sal * 18 / 100
'Case Is < 10000
'T ext5.Text = sal * 12 / 100
'Text6.Text = sal * 14 / 100
'Text4.Text = sal * 18 / 100
'Case Is < 15000
'Text5.Text = sal * 18 / 100
'Text6.Text = sal * 20 / 100
'Text4.Text = sal * 21 / 100
'Case Else
'Text5.Text = sal * 7 / 100
'Text6.Text = sal * 8 / 100
'Text4.Text = sal * 5 / 100
'End Select

75

'sal = Val(Text4.Text)
'Select Case sal
'Case Is < 5000
'Text8.Text = sal * 5 / 100
'Text7.Text = sal * 4 / 100
'Case Is < 10000
'Text8.Text = sal * 6 / 100
'Text7.Text = sal * 5 / 100
'Case Is < 15000
'Text8.Text = sal * 8 / 100
'Text7.Text = sal * 9 / 100
'End Select
'Text9.Text = Val(Text3.Text) + Val(Text5.Text) + Val(Text6.Text) + Val(Text4.Text) Val(Text8.Text) - Val(Text7.Text)
'End Sub

Private Sub Command6_Click()


If Adodc1.Recordset.EOF = True Then
MsgBox "NO RECORDS"
Else

76

ans = MsgBox("DO you want to delete the record", vbOKCancel + vbExclamation +


vbDefaultButton2, "DELETE")
If ans = vbOK Then
Adodc1.Recordset.Delete
Adodc1.Refresh
MsgBox "Record Deleted", vbInformation, "Record Deleted"
End If
End If
End Sub

Private Sub Command7_Click()


Call enable
Adodc1.Refresh
If Adodc1.Recordset.RecordCount = 0 Then
a=1
Else
Adodc1.Recordset.MoveLast
a = Adodc1.Recordset.Fields(0) + 1
End If
Text2.SetFocus
End Sub
77

You might also like