Cyber Cafe
Acknowledgement
We sincerely feel the credit of the project work could not be narrowed down down to only only on indivi individua dual. l. The develop developmen mentt of this project project involv involves es many many valuable contributions.
We are thankful to Mr.K.H.Wandra sir to introduce this mini project and inspiring us all time. We would like to thank Ms. Madhu Shukla and Mr. Dhaval Nimavat to bein being g very very co-o co-ope perat rativ ive e and and helpf helpful ul while while proj projec ectt was was bein being g processed. The project could not have completed without help of them.
Finally, we would be thankful to our parents, friends & almighty that have inspired and gave us strength while making this project.
Dipesh Sompura (43) Divyarajsinh Vaghela (47)
Cyber Cafe
Abstract This is era of information technology. Science has taken and is taking great strides in this field, which has result in making man’s life more comfortable and easier. Today computers have become necessity of everyone’s life like food Water and air.
More efficient computers are invented and more advanced software are developed in order to make m ake many complex processes fast and easy.
Our project is on ‘Cyber Café Management’ for cyber cafe owner. We have made our best attempt to make software for all Customers’ information store in database safely. This software is used for reliability and efficiency.
Cyber Cafe
Abstract This is era of information technology. Science has taken and is taking great strides in this field, which has result in making man’s life more comfortable and easier. Today computers have become necessity of everyone’s life like food Water and air.
More efficient computers are invented and more advanced software are developed in order to make m ake many complex processes fast and easy.
Our project is on ‘Cyber Café Management’ for cyber cafe owner. We have made our best attempt to make software for all Customers’ information store in database safely. This software is used for reliability and efficiency.
Cyber Cafe
Content Abstract 1. Intr Introd oduc ucti tion on 1.1 Project purpose 1.2 Purpose 1.3 Scope 1.4 Technology and Literature Reviews 2. Proj Projec ectt Man Manag agem emen entt 2.1 Project planning and scheduling 2.1.1 Project Development Approach 2.1.2 Project Plan 2.1.3 Schedule Representation 3. System System Requir Requireme ement nt Study Study 3.1 User Characteristics 3.2 Hardware and Software Requirements 3.3 Constraints 4. Syst System em Ana Analy lysi sis s 4.1 Study of Current Study 4.2 Feasibility Study 4.3 Requirements Validation 4.4 Functions of System 4.5 Data Modeling 4.5.1 Use Case Diagram 4.5.2 Class Diagram/ER Diagram 4.5.3 System Activity or Object Interaction Diagram 4.5.4 Data Dictionary 4.6 Functional and Behavioral Modeling 4.6.1 Context Diagram 4.6.2 Data Flow Diagram (including leveling) 4.6.3 Process Specification and Decision table 4.7 Selection of Hardware and Software (Justification) 5. Syst System em Desi Design gn 5.1 Database Design/Data structure design 5.1.1 Table and Relationship 6. Implem Implement entati ation on Planni Planning ng and and Detail Detail 6.1 Implementation Environment 6.2 Program/module specification 6.3 Security features 6.4 Coding Standard
Cyber Cafe
6.5 Sample Coding 7. Testing 7.1 Testing Plan 7.2 Testing Strategy 7.3 Testing Methods 7.4 Test Cases 8. Scree Screen n shots shots and and User User Man Manual ual 9. Limita Limitatio tion n and Futur Future e Enhan Enhancem cement ent 10. Conclusion
Cyber Cafe
PROJECT PROFILE
Project Title
Project Definition
: Cyber Cafe :
to manage customer’s information & space in café is available or not
Project Members
:
1) Dipesh Sompura (43) 2) Divyarajsinh Vaghela (47)
Hardware Requirements :
1) Pentium a microprocessor 2) 256 MB RAM 3) 40 GB HARD DISK
Software requirements
:
1) Microsoft Windows XP Professional 2) Microsoft Windows 3) Visual Studio 2008
Platform
:
1) .Net Technology
Cyber Cafe
1. INTRODUCTION: 1.1 Project Summary: We have made the project on “Cyber Café System”. We are sure that this is going to be useful to cyber cafe owner.. In which we have used C# and .Net Technology. All the processes, which are included in making this project successful in technical terms, will be described in this report. The basic idea of how the software will work is described in this document. In our project, we have provided the way that if the space is not available then it can automatically not enter the user. It will make the time duration of customer automatically and also the payment as well. 1.2Purpose Earlier the customer had to give time of surfing in cyber café. But we have made our project that customer will come out of this headache. Because this software does all that things automatically. On the other hand, the payment is displayed itself. So,café owner has no more migraine of that. If customer’s information is needed then it can be easily available from the database. So, it reduces paperwork or manual work as well. In short, we have tried to make a project that can be useful to the people in future. We are sure that it is also going to be helpful to us to learn about what is helpful for our future. System should also maintain reports properly, which are generated by different computers. Payment information should be also properly stored which will help while performing calculations related to expense on particular customer.
1.3Scope
Speed and faster access to data
Easy cafe process
Better availability of day to day schedules
Easily available information
Reduced paperwork
It can’t store customer’s data long time
Cyber Cafe
1.4 Technology & Literature View: We are being familiar with .Net technology in this 6th -Sem. So, we thought to make software that is relied on it. On the other hand, it gives us more idea in our studies also. This technology is well known and widely used in the market. Therefore, it would be helpful to us in future also. We will have to keep pace with this technology in future. So, i t is good for us also. This technology can work with all the languages of software. So, we get on well with this as well. This technology is widely used in market and not so expensive at all. Its features are very effective for making software. We have made an attempt to give our best in this project by using recent technologies. As we knew the requirements of “Cyber Café Management”, we made our mind to make project on this. We have tried to carry all needs of particular system. In short, we can say that this project has used .Net technology very frequently.
Cyber Cafe
2. PROJECT MANAGEMENT 2.1 Project planning & scheduling
2.1.1 Project development Approach: First, we just gathered the information needed to cyber cafe process. We just decided to give an easy approach to the user and customer. We have reached the brief description about requirements of cyber cafe management. So, we made software that is useful to cyber café. It makes an easy and simple way to the customer as well as user. We have Used easy technology to reach at our goal.
2.1.2 Project plan
Project Name
Cyber cafe system To develop a system that facilitates maintenance &
Project Objectives
monitoring of different processes followed by cyber cafe system
Duration
Two months
Guided by
Ms. Madhu Shukla
Team size
2
Technology
C#,.Net tech
Advantages Limitation
Easy process of
cyber cafe, fast find customer
information, efficient, Flexibility, less paperwork It can’t store customer’s data long time
2.1.3. Schedule Representation A project schedule provides a road map for us to achieve our milestones. If it has been properly developed, the project schedule defines the tasks and milestones that must be tracked and controlled as the project proceeds. Tracking can be accomplished in number of different ways:
Conducting periodic project status meeting in which each team member report progress and problems.
Cyber Cafe
Evaluating the result of all reviews conducted throughout the software engineering process.
Determining whether formal project milestones have been accomplished by the scheduled rate.
Comparing actual start date for each project task listed in the resource table.
Meeting informally with practitioners to be obtained their subjective assessment of progress to date and problems on the horizon.
Using earned value analysis to assess progress quantitatively.
Control is employed by a software project manager to administer project recourse, cope with problems, and direct project staff. If things are going well, control is light. But when problems occur, the project manager must exercises control to reconcile them as quickly as possible. RESPONSIBILITIES Analysis Analysis Review Design Design Review Coding Front-site Design Design Review Testing Documentation
DIPESH
DIVYARAJ
Cyber Cafe
3. SYSTEM REQUIREMENT STUDY System requirement specification contains the requirement for the system and its functional operations.
3.1 User Characteristic: User:
User can enter the data about customers.
User can proceed to provide space
User can edit / search the customer’s data.
User can get the information of time & payment
User can be free with migraine of paperwork.
User can store large no of data & retrieve easily.
3.2 Hardware and Software Requirements:
Hardware Requirement:
We have required the devices as we have mentioned below while making our airways reservation software.
Computer : Intel P4 Processor with 2.0 GHz
RAM – 256MB
HDD - 40GB
CD Drive – 150kbps
Software Requirement:
Cyber Cafe
As we are learning .net technology, so we had decided to keep our pace with this technology. Therefore, we used which is familiar to us. We also used some other softwares to achieve our goal as below.
Windows XP with higher version
Visual studio 2008 C#
with .Net
.Net
technology
MS office for documentation
3.3 Constraints: This topic includes hardware requirements for installing the various Visual Studio editions, the Express editions available for Visual Studio programming languages. The computer on which you install your Visual Studio edition should meet minimum the following system requirements
Pentium IV Processor or above.
40GB hard-disk.
256 MB of RAM. These constraints are needed while making project. It includes some symbols and photographs as well from the particular program to add into the project. It makes our software simply graceful.
Cyber Cafe
4. SYSTEM ANALYSIS
4.1 Study Of Current System
In the current system no monthly report generation is specified by just clicking generate report.
1.
If the user is unauthorized then he or she can break the password because password is stored in the same application in which the application is running so the security is poor.
2.
The user will be in the confusion because of some difficult task.
The current system is manual writing system. If the space in cyber café is not found then it will inform the user about that there is no space available. It will display that “ Space is not available now”.
4.2 Feasibility Objectives of System Feasibility Analysis
Identify the user’s need
Evaluate the system concept for feasibility
Perform economic and technical analysis
Allocate functions to H/W, S/W, people, database and other System
analysis
Establish cost and schedule constraints
Create system definition forming the foundation for all subsequent
work.
Three specific tests were carried out on the system to test its feasibility namely, Operational, Technical and Economical.
4.2.1 Technical Feasibility
Cyber Cafe
This system is technically feasible because all required technologies are available today in market. Visual studio 2008 is available in market now which includes all requirements to complete this software. On the whole, this is very interesting technology. This provides every tool to make this project. Even this technology is concerned with many languages like C, C++, C#, Oracle and many. The technical issues and their answers are as follows:
Is the proposed technology or solution practical? Accuracy:
The system here is accurate and it provides accurate and correct
result. Reliability: The system is trustworthy and gives perfect return on investment. Easy of access: Any technical and non technical user can use the system and easily get response or get solution of their queries from the system. Security: User has to enter valid password and id for accessing the system. So, we can say that the proposed technology or solution is practical.
Do we currently have necessary technology? Yes, this project needs .Net Technology. Here, we have used this technology in making of this project.
Do we possess necessary expertise? Yes, that is possible because this technology is frequently used in market and we can possess them if needed.
4.2.2 Economical Feasibility This project requires no more requirements rather than computer. Because, it’s all about making software. Even the softwares it needs are very easily available in market at very cheaper cost. So this is economically feasible at all. Cost – Benefits Analysis: Cost Analysis:
The initial cost of the System will include PCs & software.
Cyber Cafe
The basic cost of the System will be the Software, which will be required for
the System. It also includes the purchasing of that
Software.
The operator by entering the id or name of the field can easily access the information
The billing and searching of the system is quiet accurate and quick that it will save the time consumption.
Benefit Analysis: Tangible benefits: The system is directly saving cost as there is no requirement of direct training to the users, no wastage of extra recourses like time, human power etc. Intangible benefits:The system provides better services to the users. It also provides the users with accurate, reliable and up-to-date information about the system.
4.2.3 Operational Feasibility Any project proposed can be beneficial only if it satisfies the customer’s requirements. If project is included with everything which is in old project in addition with new features then this system is operationally feasible if all Users are satisfied with system. The following points have been probed to declare the proposed system as operationally feasible.
The newer system will accommodate all the requirements.
The new system can greatly help by reducing all paper work and availing all needed information of the customer with just a click of the m ouse button.
The newer system will fit to its existing system and perform more function than manual system.
The user of the system will get the information at the time when they need it, and also speed up the transaction processing.
Cyber Cafe
The system will work when it is developed and installed and there are no major barriers to its implementation. This accounts for the operational feasibility of the proposed system.
4.2.4 Schedule feasibility: The project was assigned on starting of the semester and we have enough time of 2 month to complete our project. The project completion is 31-Mar-2009. So the project is schedule feasible. Here, we have given milestones to achieve the task.
Milestones and Deliverables A milestone is a subproject that you should have completed at the given point in time, if you want to keep on track then. A deliverable is a documentation of a part of a project that you are required to hand in. The given deadlines are firm. Deliverables are usually milestones but milestones need not to be deliverables.
SR
ACTION
START DATE
END DATE
NO 1
Analysis
27/01/2009
05/02/2009
2
Design
10/02/2008
25/02/2008
3
Development
03/03/2009
08/04/2009
4.3 Requirements Validation Requirement validation is concerned with showing that the requirement actually defines the system which customer wants. It has much common with analysis as it is concerned with finding problems with the requirement. However they are distinct processes since validation should be concerned with a complete
Cyber Cafe
draft of the requirement document whereas analysis involves working it incomplete Requirement.
During requirement validation process different types of check should be carried out on the requirement in the requirement document. This check includes:
The Name of the Users should be character oriented.
The Password should contain only characters and numbers. It should not include special character.
The format of the date should be DD-MON-YYYY
In the Find and Search models, we have to enter the Name of the Customer or id of the customer in order to find the all information of customer.
4.4 Function of System Our system for cyber café management system specifies how the information held by the cyber café about, booking and availability is maintained. Hence following functions are carried out:
1. Registration Of Surfing: Description: This functionality is used to register the operator. It is compulsory for the operator to fill the Register then only they get the information related to the System. Inputs: Username and Password Source: Username and Password provided by operator, password from database. Output: Authentication to operator to access the ticket, passenger and bill related information.
2. Search and Viewing: Description: This functionality is used to find zip codes of various state, city and country. It also includes a functionality, which is used to find zip codes of
Cyber Cafe
state, city or country by just providing the address (that is name of state, city or country).
Input: Take the various zip codes from the user. Sources: Username and Password provided by user. Outputs: The zip code from the given information of the user.
Input: Request the user for the any services. Sources: Username and Password by user. Outputs: The request services will be provided and desirable output will be provided.
4.5 Data Modeling 4.5.1 Use-case Diagram:
Cyber Cafe
4.5.2 CLASS DIAGRAM:
Cyber Cafe
4.5.3 Activity Diagram:
Cyber Cafe
Cyber Cafe
Relogin
Start Login Customer Information Valid
Menu
Available
space space
entry
Invalid
Relogin
Cyber Cafe
Start Login
Valid
Menu
Available
space space
entry
Payment
End
4.5.4 DATA DICTIONARY:
Invalid
Cyber Cafe
Login:
Field Sr.No
Data Nam
Type Description
e
s
1.
Admin_id
Text
Describes the administrator’s identification
2.
Password
Varchar(50)
Describes the administrator’s password
Table name: cust_info
Field Sr.No
Data Name
Types
1.
id
Int
2.
name
varchar(50)
3.
addresh
varchar(50)
4
age
int
5
gender
int
6
Ph_no
varchar(MAX)
7
In_date_time
bit
8
Pc_no
float
Table name :- bill_info
Cyber Cafe
Field Sr.No
Data Name
Types
1.
id
Int
2.
name
varchar(50)
3.
Pc_np
varchar(50)
4
In_date_time
int
5
Out_date_time
int
6
Total_duration
varchar(MAX)
7
Total_amount
bit
Cyber Cafe
4.6.1 context diagram Surfing information
Time Information
customer Details
Payment
Customer Information
Surfing Information
Customer
Time Details
Cyber Cafe Management
Customer Information
Receptionist
Payment Information
Manager time Information
Cyber Cafe
4.6.2 Data Flow Diagram
Password
Process for login system
User
Conformation Inquiry about customer
User Customer info.
Process for Cyber Cafe system
Customer
Manager Info. about availability of space
Payment
Customer data
Time info
Surfing info
Cyber Cafe
4.6.3 Process Specification & Decision Table Login Process IF user enters username & password THEN
enter into the system.
ELSE Invalid user. END IF.
Process For Surfing WHILE customer make request IF space is available THEN provide pc to customer ELSE Not available ENDIF ENDWHILE
Process For Payment: WHILE customer log off pc IF customer doing payment THEN receive & confirmation ELSE Not receive & not confirmation ENDIF ENDWHILE
Cyber Cafe
4.7 Selection Of Hardware & Software Hardware Technology Used: To run the application software of the system in the computer the minimum configuration required is as below:
768 MHz Pentium processor or other compatible.
Intel Chipset Motherboard.
256 MB-RAM.
10 GB Hard-Disk.
52X Compact Disc drive or faster.
Monitor. [640 * 600 Display]
Software Technology Used:
.Net Platform
Cyber Cafe
5.
SYSTEM DESIGN 5.1 Database Design / Data Structure Design 5.1.1. Table and Relationship
Table name: cust_info
Field Sr.No
Data Name
Types
1.
id
Int
2.
name
varchar(50)
3.
addresh
varchar(50)
4
age
int
5
gender
int
6
Ph_no
varchar(MAX)
7
In_date_time
bit
8
Pc_no
float
Cyber Cafe
Table name :- bill_info
Field Sr.No
Data Name
Types
1.
id
Int
2.
name
varchar(50)
3.
Pc_np
varchar(50)
4
In_date_time
int
5
Out_date_time
int
6
Total_duration
varchar(MAX)
7
Total_amount
bit
Cyber Cafe
6.
IMPLEMENTATION PLANNING AND DETAILS 6.1. Implementation Environment Single vs. Multiuser As the cyber cafe management system is going to be developed id desktop application,at the time of the implementation it should be kept in mind that system will be used con currently.So the development approach would remain for the concurrent use. GUI vs. Non GUI The system is completely GUI. This is because today customer feels comfortable while working with images or pictures.The user should feel convient while wporking with the system
6.2
Program/Module specification
Single Layer This module of the project deals with the categorized the different themes of the map like point,line and polygon into their respective types after distinguishing them differently from the database. It displays the map single layer that can be of any feature like point, line or polygon theme.Displaying map of single layer explorers the entire details of the selected layer.
Multi Layer Seconly, comes the module for the multilayer.Here the individual themes that were selected in the above module are overlaid on the other type of the theme.Doing this makes the decision making process eaiser about which place is related to other like if there is no way near very good polygon feature then it would show that would be profitable to dig well at that place.
6.3
Query Builder In the above two modules we were just retrieving the data from database which already store after converting from SHP to SQL format in the form of map .Now we need to query that map.So as per the type of query fired we could be able to get the result using query builder.Thus ,in order to get the detail and display of the desired location we make use of query builder. Security Features
The editing of database and the result is all protected by the password, which only administers can access. (In this case it’s us.)
The admin side is password protected.Only authorized user can access the admin side.
Cyber Cafe
6.4
Coding Standard We have followed the coding standards throughout this application
Each table name is given in such a manner that it indicates its use Each script is properly documented by comments to carify its presence. Variables names are related to the process and the behavior of the entity. We have used tab instead of space in our project. Keywords are never used as variable name in our project 6.5 Sample Coding using System; using System.Collections.Generic; using System.ComponentModel; using System.Data; using System.Drawing; using System.Linq; using System.Text; using System.Windows.Forms; using System.Data.SqlClient; namespace WindowsFormsApplication1 { public partial class Form4 : Form { SqlConnection cn; SqlCommand cmd; SqlDataAdapter da; DataSet ds = new DataSet(); public Form4() { InitializeComponent(); } private void label7_Click_1(object sender, EventArgs e) { textBox5.Text = DateTime.Now.ToString(); } private void button1_Click(object sender, EventArgs e) { cmd = new SqlCommand("insert into cust_info values(@a,@b,@c,@d,@e,@f,@g,@h)", cn); cmd.Parameters.AddWithValue("@a", Convert.ToString(textBox1.Text)); cmd.Parameters.AddWithValue("@b",textBox2.Text); cmd.Parameters.AddWithValue("@c", textBox3.Text); cmd.Parameters.AddWithValue("@d", textBox4.Text); if (radioButton1.Checked == true) {
Cyber Cafe cmd.Parameters.AddWithValue("@e",Convert.ToString(radioButton1.Text = "male") ); } else if (radioButton2.Checked == true) { cmd.Parameters.AddWithValue("@e",Convert.ToString(radioButton2.Text = "female")); } cmd.Parameters.AddWithValue("@f", maskedTextBox1.Text); if (maskedTextBox1.MaskFull) { MessageBox.Show("full space"); maskedTextBox1.Text = ""; maskedTextBox1.Focus(); return; } cmd.Parameters.AddWithValue("@g", textBox5.Text); cmd.Parameters.AddWithValue("@h", textBox6.Text); cn.Open(); cmd.ExecuteNonQuery(); cn.Close(); MessageBox.Show("done"); ds.Clear(); reload(); Form5 f5 = new Form5(); f5.Show(); this.Hide(); } private void Form4_Load(object sender, EventArgs e) { cn = new SqlConnection(@"Data Source=.\SQLEXPRESS;AttachDbFilename=C:\Documents and Settings\dipesh sompura\My Documents\Visual Studio 2008\Projects\WindowsFormsApplication1\WindowsFormsApplication1\Database1.mdf;Integrated Security=True;User Instance=True"); reload(); } public void reload() { da = new SqlDataAdapter ("select * from cust_info", cn); da.Fill(ds); } private string remove(int p) { throw new NotImplementedException(); } private void button2_Click(object sender, EventArgs e) { Form3 v = new Form3(); v.Show(); this.Hide(); } private void button3_Click(object sender, EventArgs e) { cmd = new SqlCommand("update cust_info set id ='" + textBox1.Text + "',address='" + textBox3.Text + "',Age='" + textBox4.Text + "',gender='" + radioButton1.Text + "',ph_no = '" +
Cyber Cafe maskedTextBox1.Text + "',date_time = '" + textBox5.Text + "',pc_no = '" + textBox6.Text + "'where name ='" + textBox2.Text + "'", cn); cn.Open(); cmd.ExecuteNonQuery(); MessageBox.Show("Data Updated"); textBox1.Text = ""; textBox2.Text = ""; textBox3.Text = ""; textBox4.Text = ""; if (radioButton1.Checked == true) { radioButton1.Text = "male"; } else if (radioButton2.Checked == true) { radioButton2.Text = "female"; } maskedTextBox1.Text = ""; textBox5.Text = ""; textBox6.Text = ""; cn.Close(); Form5 b = new Form5(); b.Show(); this.Hide(); } private void button4_Click(object sender, EventArgs e) { cmd = new SqlCommand("delete from cust_info where name='" + textBox2.Text + "'", cn); cn.Open(); cmd.ExecuteNonQuery(); MessageBox.Show("Data deleted"); textBox1.Text = ""; cn.Close(); Form5 a = new Form5(); a.Show(); this.Hide(); } private void button5_Click(object sender, EventArgs e) { MDIParent1 W = new MDIParent1(); W.Show(); this.Hide(); } private void button6_Click(object sender, EventArgs e) { Form5 h = new Form5(); h.Show(); this.Hide(); } }}
7.
TESTING
Cyber Cafe
The aim of testing process is to identify all defects existing in software product. Testing a program consists of subjecting the program to as test inputs and observing if the program behaves expectedly or not. If the program fails by any means or gives unexpected results than the failure occurred are noted for later debugging and corrections. 7.1 Testing Plan The testing process is a process that to a greater extends runs in parallel with other processes. As the same thing applied for the whole system for testing and once the entire module works perfectly as desired, at later stages test suite are made to test in integrated environment to check for proper functioning. So the software is tested at various levels by various testing techniques. A well rounded test plan notes any risk factors that jeopardize and includes a testing schedule. So we can say that Test planning details the activities, dependencies and effort required to conducting the system test. 7.2 Testing Strategy The test strategy is a formal description of how a software product will be tested. A test strategy is developed for all levels of testing as and when required. The testing team analysis the requirements, writes the test strategy and reviews the plan with the project team. The test plan may include test cases, conditions and the test environment, a list of related tasks, pass/fail criteria and risk assessment. As we were working in a team it was a bit difficult to check the work done as no individual was assigned for that particular task or work. Moreover checking the work done was very important to reduce risk factor. Right from the starting we planned to adopt one technique called Assessment by rotation. Thus the work done by one member was assessed by the other for some time and again revolved for other level check reduced the errors.
1) 2)
7.3 Testing Methods Testing methods are mainly divided into two parts: Black Box Testing While Box Testing
Black box testing: It is the testing without the knowledge of the 1) internal working of the item being tested. For this testing test groups are often used. Due to the nature of this testing the test planning can begin as soon as the specifications are written. This testing has some advantages like it is more effective on larger units of code than glass box testing, tester needs no knowledge of implementation, including specific programming languages, tester and programmer are independent of each other, tests are done from a user’s point of view, will help to expose any ambiguities or inconsistencies in the specifications, test cases can be designed as soon as the specifications are complete.
Cyber Cafe 2) White box testing: It is the testing strategy that deals with the internal logic and structure of the code. White box texting is also called as the glass testing, structural testing, open testing or the clear box testing. The advantages of the white box testing are that as the knowledge of internal coding structure is needed, it becomes easy to find out which type of input data can help min testing the application effectively. It helps in optimizing the code helping in removing the extra code which may cause hidden defects in the system.
The other sub testing techniques are as follows: Unit Testing Unit testing focuses on verification effort on the smallest unit of the project that is the module. Unit testing exercises specific paths in a module’s control structure to ensure complete coverage and maximum error detection. This test focuses on each module individually, ensuring that it functions properly as a unit. Hence, the naming is Unit testing.
Integration Testing Integration testing addresses the issues associated with the dual problems of verification and program construction. After the software has been integrated a set of high order tests are conducted. The main objective in this testing process is to take unit tested modules and builds a program structure that has been dictated by design.
Task Testing Task testing helps the system to test whether all the tasks are carried out properly or not. It also solves logical errors. By carrying this test we were assured that all processes in our project are appropriate.
Behavioral Testing This testing is used to check the behavior of the system. This test helped us to develop the test case for the particular system. This testing thus helps to test the different events associated with the system.
Inter Task Testing There are several processes or tasks which are carried simultaneously. Moreover this testing also helps to test the errors associated with the data storage activities. This testing helped our project to solve the error while data designing which is very much important for a successful project.
Final Testing After the integration of all the modules we deploy whole application. One of the member of the development team will do the testing of the whole project and create the excel sheet of the
Cyber Cafe
bugs. After the completion of the solving of these errors the project would be ready to use.
Alpha Testing Alpha testing is done by the person not involved in the project. In our case it would be done by out concerned faculty members itself. 7.4 Test Cases In software engineering the most common definition of a test case is set of conditions or variables under which a tester will determine if a requirement or use case upon an application is partially or fully satisfied. In the situation each sub requirement must have at least one test case. A good test should neither be too simple nor too complex.
Cyber Cafe
8.
SCREEN SHOTS AND USER MANUAL
LOGIN FORM: This form is used by administrator to login and access Menu form :(mdi form)
Cyber Cafe
Available space
Customer entry
Cyber Cafe
Customer & system detail
Customer bill paid
Cyber Cafe
9.
LIMITATION AND FUTURE ENHANCEMENT IQ test is developed to serve the very basic purpose to check the user’s IQ level.
The limitation of the project can be considered it to be a windows application and so no online test can be conducted. The project being developed in Oracle and Microsoft Visual Studio .Net which are extensively used tools today so can be easily converted to other system structure according to the requirement in near future.
Cyber Cafe