MAJOR PROJECT REPORT ON PIZZA MANAGEMENT SYSTEM WITH “VISUAL BASIC”
SUBMITED AS PROJECT OF BACHELOR OF COMPUTER APPLICATION
Study center at
Computer Career Institute Brahmanand Nagar Colony Durgakund,Varanasi STUDY CENTER CODE (S195)
SUBMITED BY: GUIDED BY:-
Shashank Singh Mr. Satish Tiwari
Enroll NO. 721951050064 Session :- 2007-2010
ROLL NO: 18044
ANALYSIS AND DESIGN The design of the information system produces the details that state how a system will meet requirements identified during system analysis. System specialists often refer to this stage as logical design, in contrast to the process of developing program software, which is referred to as physical design. System System analys analysis is begins begins the proces processs by identi identifyi fying ng reports, the requirements and output needed by the system. Then the specific data on each are pinpointed. Usually, designers’ sketch the form of display as they expect from the system. This can also be done on paper of on the computer display with the help of the automated system tools available. The system design also describes the data to be input, calc alculat ulated ed of stored ored.. Ind ndiividu vidual al data ata items ems and cal calcul culatio ations ns procedures are written in detail. The procedures tell bow to process the the data data and and prod produc ucee the the ou outp tput ut.. Desi Design gner erss are are resp respon onsi sibl blee for for providing programmers with complete and clearly outlined software specifications. As programming starts, designers are able to answer questions, clarify fuzzy areas and handle problems that comfort the programmers when using the design specifications. As the software is to be designed in Access DBMS; the concept of the database is must must of qu qual alit ity y desi design gnin ing. g. It will will be desi design gnin ing g of the the data databa base se,, designing, designing the forms. Designing of reports, designing of data loader.
DESIGN OBJECTIVES:The following goals were dept in mind while designing the new system; •
To reduce the mutual word required to be done in
the existing system. •
To avoid errors inherent works and hence make
the outputs consistent and correct. •
To improv provee the the manag anagem emen entt of per permane anent
inform informati ation on to the compan company y be keepin keeping g it in proper properly ly struct structure ured d tabl tables es and and to prov provid idee faci facili liti ties es to up upda date te this this info inform rmat atio ion n as efficiently ad possible. •
To make the system completely menu-driven and
hence ence user user –fri friend endly. ly. Th This is was was nece necesssary so that hat even even non on- programmers could use the system effectively and system could act as catalyst in achieving objectives. •
To make the system compatible i.e. it should “fit
in” the total, integrated system. •
To make the system in such a way that reduced
future maintenance and enhancement times and efforts. •
cost effective.
To make the system reliable, understandable and
DESIGN OVERVIEW The design stage takes the final specification of the system from analysis stages and finds the best way of fulfilling them, given the technical environment and pervious decisions on required level of automation. The system design is carried out in two phases:
1. Arch Archit itec ectu tura rall desig design n (High (High lev level el desi design gn)) 2. Deta Detail iled ed desi design gn (Low (Low Leve Levell Des Desig ign) n)
HIGH LEVEL DESIGN Thee high Th high-l -lev evel el desi design gn maps maps the the bu busi sine ness ss syst system em described in the program requirement specification to logical data structure. It involves:Identify Identifying ing the entities: entities: All the entities entities related to module were identified, checked and consolidated. Identi Identifyi fying ng the relati relations ons:: The relati relations onship hip betwee between n entities, within and outside the system was identified. Attributes definition: The pertaining to the entities was designed and their field characteristics were specified. Normalization: The entities were normalized. After firs firstt and and seco second nd no norm rmal aliz izat atio ion n was was achi achiev eved ed for for all all enti entiti ties es of system. Interface: interfacing with other system was done and attributes related to external entities were identified. Once the entities and their attributes were defined, ENTITY REALTIONSHIP DIAGRAM was drawn.
LOW LEVEL DESIGN The low-level design maps the logical model of the system to a physical
Database design.
Defaul Defaultt databa database se design design::
this this utilit utility y create createss column column and constr constrain aints ts
definitions from the design stage of business system development. the application system, fautions, tables and column must already exit in CASE * Dictionary before being referenced. User preference: based on user preferences like block name, validation of primary keys, layouts of blocks, layout of fields, creating titles of blocks, mandatory input field prompts etc. were incorporated here.
BACK END
BENEFITS OF COMPUTERIZATION There are lot of difficulties difficulties and bottlenecks in the current manual system. After the computerization of registration of the student. The problem can be removed to a great extent, for example:1.
Response time will be reduced i.e. time taken to
complete any inquiry will be reduced resulting in reduced waiting time. 2.
The workload of the staff is currently more, it will be
reduced. 3.
Improved user satisfaction.
4.
Easy access of record.
5.
Security and secrecy of records.
Objectives of the proposed system The function of student record management system is an essential part of any college. The objective of this system is to keep track, records & maintain strict control over proper maintenance and security of students’ records. This system is designed with the purpose, that it should be useful to the keeping student’s records management system of a college.
BIBLIOGRAPHY 1.
“DATABASE PROGRAMMING WITH VISUAL BASIC 6.0”. By TECHAMEDIA
2. “MASTERING IN VISUAL BASIC.” By AVANGELOUS AVANGELOUS PETROUSOS 3. “VISUAL BASIC 6” By GARY CORNELL 4. “MICROSOFT ACCESS 2003” By BPB PUBLICATIONS PUBLICATIONS 5. “SYSTEM ANALYSIS AND DESIGN Vol. (I & II)” By LEE 6. “SYSTEM ANALYSIS AND DESIGN” By ELIAS M. AWAD 7. “SOFTWARE “SOFTWARE ENGINEERING” ENGINEERING” By PRESSMAN
CONCLUSION Based upon the above analysis of present project we can work out through three major conclusions regards to: 1.
Merits of of Student record management sy system.
2.
Limi imitatio ations ns of stud uden entt recor ecord d manage nagem ment ent syst ystem. em.
3.
Scope of further study.
MERITS: The following are few positive points in favor of proposed student record management system in contrast with the existing traditional system of working: (A)
Less ti time co consumed.
(B)
Less paper work is involved.
(C)
Increase in in ov overall ef efficiency.
(D)
Lesser costs are involved.
(E) (E)
Thee ove Th overa rall ll word wordin ing g bec becom omes es Easy Easy & Eco Econo nomi mica cal. l.
LIMITATIONS: (A) (A)
Comp Comput uter er cannot cannot replac replacee hu huma man n judg judgme ment nt & Deci Decisi sion on--
making. (B) (B)
High Higheer cos costs are are ass associ ociate ated wit with com compu pute terr rela relate ted d
applications. (C) Any, even even a minor, mistak mistakee or flow in computer computer operation operational al process might cost human life.
SCOPE: As the requirements of speedy processing of daily transaction is becoming the basic need for every area business. Therefore every body is adapting computer technology for his or her business.
CONTENTS
1. INTRODUCTION
2. PROJECT PROFILE
3. VARIOUS DEVELOPMENTS DEVELOPMENTS
A.SYSTEM ANALYSIS. B.FEASIBILETY STUDY C.DESIGN D.IMPLEMENTATION E. TESTIN TESTING G F. MAINTA MAINTAINE INENCE NCE
4. FORMS AND TABLES A. Main Form B. MAIN MENU FORM D Bill Managment Managment E. Pizza detail 5. ER DIAGRAM 6. DATA FLOW DIAGRAM 7. BIBLIOGRAPHY
Cost Benefit Analysis Risk Management
Risk Risk mana manage geme ment nt is an emer emergi ging ng area area that that aims aims to addr addres esss the the problem of identifying and managing the risk associated with the software project. The basic motivation of having this is to avoid heavy losses or disasters. It is very important particularly of large project. The project has no major hazards associated with is. The only risk has are the cost band schedule risks. Although analysis can easily is done regarding the schedule risk involved. Risk management is the area that tries to ensure that the impact of risk on cost quality and schedule. Like in booking system cost and quality is major risk prone area. it minimizes the impact of risk. Project management generally does it, risk assessment is and activity that must be undertaken during project planning, and this involves identifying the risk occurs in system, analyzing them and prioritizing them on the analysis due to the nature of the software uncertainties are most near the beginning of the project and remain throughout the project so risk assessment should be done throughout the project. At the high software level, risk is divided into three categories these are:-
•
Cost risk is the risk that is associated with the budgeted outlays
for the project and its impact on the project the system should be economical. if the cost is going beyond the limit expected then project is nit good. •
Performance risk is the possibility that the system is not giving
all the benefits expected form it or will not perform according to the requirement here performance includes quality. Schedule risk associated with the project schedule or the ability of the the proj projec ectt to achi achiev evee the the spec specif ifie ied d mile milest ston one. e. Th Thee go goal al of risk risk assessment is to prioritizing so that risk management easily focuses attention and resources on the more risk items. The main aim of risk paining is to enumerate the risk items and specify how to handle it. Otherwise it creates the problem in the last in term of cost, quality and schedule.
DESIGN DECISION
The system bas been decided to be developed on visual basic 6.0 using various products like FORMS. REPORTS. MICROSOFT ACCESS 2003 RDBMS has been chosen since the system has the following requirements and it caters all:
1. Large databases databases and space manageme management nt control control
ACCESS supports the largest of database, potentially. Hundreds of gigabytes in size. It stores the data in the form of tables making optimal use of the available storage. To make efficient use of expensive hardware devices, it allows full control of space usages.
2. Many concurrent concurrent database database users
ACCESS supports large number concurrent users executing a verity of database application operating on the data.
3. High transa transactio ction n processing processing perfo performan rmance ce
ACCESS maintains the preceding feature with a high degree of overall system performance database users do not suffer from slow processing performance.
4. Contro Controlle lled d availa availabil bility ity
ACCE ACCESS SS RXBM RXBMS S can can sele select ctiv ivel ely y cont contro roll the the availability of data, at the databases level and sub-databases level. E.g. an administrator can disallow use of specific applications so that hat app applica lican nt’s t’s data ata can can reloa eload, d, wit witho hout ut affe affect ctiing othe otherrs applications.
DETAILED SYSTEM INVESTIGATION
At the heart of the system analysis does a detailed understand of all-important facets of the business area under investigation? For this reason the process of acquainting this information is often called called as detail detailed ed invest investiga igati tion on analys analysis is wardin warding g close closely ly with with empl employ oyee ees, s, mana manage gerr and and prop propri riet etor or must must stud study y the the bu busi sine ness ss process to answer these questions:
1. What What is is bein being g done done?? 2. How How is bei being ng don done? e? 3. How frequ frequentl ently y does it occur? occur? 4. How is is the volu volume me of work work?? 5. Hoe well well is the the task task being being performe performed? d? 6. Does Does any any probl problem em exit? exit? 7. If a problem problem exits, exits, what is the underl underlying ying cause? cause? 8. If a problem problem exits, exits, what is the underl underlying ying cause? cause? 9. And what what is the the soluti solution on of the the problem? problem?
To answ answer er thes thesee qu ques esti tion ons, s, syst system em anal analys ysts ts talk talk to vari variet ety y of pers person onss toge togeth ther er deta detail ilss abou aboutt the the business and their opinions of why things happens as they do and their ideas for changing the process. Questionnaires are used to collect this information. information.
Deta Detail iled ed inve invest stig igat atio ions ns also also requ requir iree the the stud study y of manu manual al and and repo report rtss actu actual al ob obse serv rvat atio ion n of work work acti activa vate tes, s, and and some someti time me,, collection of sample forms and documents to fully understand the process.
As a detailed are gathered, the analysts study the requirements data to identify features the new system should have, including both the information the system shou should ld prod produc ucee and and op oper erat atio iona nall feat featur ures es such such as proc proces essi sing ng controls, response times and input and out methods.
HARDWARE CONFIGURATION
The hardware used for the development of software was Pentium IV based are as follows:-
C P U Chip :
Intel Pentium
Main Memory:
128 MB
Cache Memory:
256 KB
Hard Disk:
40 GB
Floppy Disk:
1.44 MB
SOFTWARE CONFIGURATION
Operating System:
Windows 98/ME/XP
Database:
MS Access 2002
Application Development Development Tools:
Visual Basic 6.0
IMPLEMENTATION After the user has certified the system, it comes to the stage of implementation. it involves many issues like preparation for the changeover to the new system and then the actual change over. Preparation of site and installation and facilities, training of staff, preparation of data file etc. are the various steps involved which might require the involvement of the system analyst, the user as well as operational staff.
Afte Afterr all all the the prep prepar arat atio ion n of the the syst system em impl implem emen enta tati tion on is comp comple lete ted, d, come comess the the stag stagee of actu actual al chan change ge this this invo involv lves es the the usages of the system, which has been developed and thoroughly tested. There are different approaches, which might be followed in this change over.
Direct over
Parallel running
Pilot running
Direct changeover in this method old system is scrapped of with drawn the moment new one is put into user like in creditor lead leader er of chan change geov over er woul would d man man manu manual al reco record rd keep keepin ing g like like maintaining ledger and day book is stopped and converted into the data file which is them stored and is directly handled through the new computerized system this could lead to some problem if the new system does not behave as expected. This may be the result of
some unforeseen situation which had not been taken care of during the system analyses and design phase, in such situation there is no manual system remain to get back upon, the user may be put to serious problem in such, we may follow a procedure of running both system for some times as parallel running.
Parallel running is the method of submitting a new system to final acceptance test, in which data is processed using both the old and and new new syst system em simu simult ltan aneo eous usly ly.. in whic which h manu manual al syst system em like like ledger cashbook, daybook and the related data files of computer system are running parallel. The result of two system are compared and any discrepancies examined to see whether the system is at fault fault this is a better method method but is has some some drawbacks drawbacks like like extra cost, because the user staff will have to work with to system i.e. old and new.
They will have to do extra work also in cross the result when they are busy in learning new procedures.
Pilot running is an alternative to parallel running and consist of the allocation of the certain amount of work to be performed by the computer while the remainder is done by the old method. The amount of work performed on the computer is gradually increased until the changeover is complete and old system is discontinued.
From the entire above pilot running is better than all because it provides the facilities of both fast accesses processing affecting the cost. In which half of the work is done manually and half is done with computerized and then compared the two. Then convert them them slow slowly ly to new new syst system em.. Th This is will will save save cost cost,, time time and and the the problem arises during direct changeover.
INTRODUCTION
Thee proj Th projec ectt deve develo lopm pmen entt is no nott an easy easy job. job. Every aspect of the ‘software design’ project should b bee well ell anal analy yzed zed and and dat data shou should ld be in a ver very structured manner. Duplicity of the data should be avoided, to the point and descriptive fields should be taken. I have put my best efforts to computerize the pro proce cess ss of Acad Academ emic ic Syst System em and and othe otherr rele releva vant nt details for ready reference to the best of my information about this. It is a very comprehensive and complicated job, which involves many persons; whatever I have analyzed is detailed portion of record entries.
The main outcome is shown through the help of different reports. Various reports that are made in the project are:
List of products
List of Pizza detail
MAINTENANCE The goal of the system development project is to produce software which is easy to maintain because during the life of software the maintenance cost generally exceed the development cost one possible reason of exceeding cost is that the developer frequently develop the software, install it, and than hand it over to different set of people called maintainers. But the maintainer usua usuall lly y do don’ n’tt even even belo belong ng to the the orga organi niza zati tion on that that deve develo lop p software so first of all we have to give proper training to staff about the system and teach them how to handle it, operate it and what to do in saturation when it is not performing well or the delivery of the system.
once the system has been settled down and been running for some ome yea years then hen respo espons nsiibil bility ity hand anded to the the traine ained d maintainer during maintenance the system analyst has to check that weather system performed according to the started objective or not during maintenance we have to keep eyes on the function functioning ing of new system like addition addition of record, record, showing showing and payment entry etc, and check whether it is performing well according to required specified.
This Th is is on going oing exer exerci cisse aft after the syst ystem has been been impl implem emen ente ted. d. Th Thee read read life life is no nott stat static ic its its requ requir irem emen ents ts or obje ob ject ctiv ives es are are keep keep chan changi ging ng.. so the the syst system em has has to keep keep on carrying out changing and modification into the system this is a stage normally called system maintenance. The maintenance the testing depend on the design and coding to make testing and maintenance easier.
But But the the main mainta tain iner er usua usuall lly y do don’ n’tt even even belo belong ng to the the organization that develop software so first of all we have to give proper training to staff about the system and teach them how to handle it, operate it and what to do in saturation when it is not performing performing well or the delivery of the system.
MS ACCESS Using Microsoft Access, you can manage all your information from a single datable file. Within the file divide your data into separate storage container called tables, view, add and update table data using online forms, find and retrieve the data you want using queries, and analyze or print data in a specific layout using reports. To store ore you ourr data ata, crea creatte on onee tabl able for each each type type of information you that you specify, including data from multiple tables, create a query. A query can also update or elate multiple reco recorrds at the same ame time ime and and per perform orm bu buil iltt-in -in or cus custom tom calculation on your data. To easily view and change directly in a table, create a form when you a form Microsoft Access retrieve the data from one or more tables. And displays it on screen using the layout you choose in the form wizard or using a layout that you created from scratch. To analyze your data or present it a certain way in print, create report. For example, you might print one report that grou group’ p’ss data data and and calc calcul ulat ates es tota total, l, and and anot anothe herr repo report rt with with different data formatted for printing mailing tables.
ABOUT MS ACCESS 2002: A relational database .The Access as a database is the easiest and simplest.
Some of its features are as follows:-
FEATURES:-
First Access is obviously a database application. Database allows you to collect any type of information for storage and later searching and retrieval. Access excels at being able to collect information. Through the the use of eith either er a data datassheet eet view iew or a cus custom form orm. The data datash shee eett view view prov provid ides es a spre spread adsh shee eett simi simila larr to Micr Micros osof oftt Excel. You can create custom forms that can look like all other Wind Window owss appl applic icat atio ions ns and and use use thes thesee toge togeth ther er and and retr retrie ieve ve information. You You can can als also creat reatee cus custom repor eportts for pri printin nting g and and exporting the information stored in the database.
Second Access is desktop database. This means Access is designed to be used on a desktop computer. You can place an Access file on a network server and share the database with other user on the network. It is not however a true client server database the Access is a fire stored on hard drive, not a running application.
Client / server are term describe two different computers, which communicate with one another in a short master slave relationship. One computer the server provides data and other services for multiple other computers, the clients. The fact that Acce Access ss is no nott a clie client nt / serv server er data databa base se migh mightt seem seem like like a disadvantage, but it realty is not When Access is used in proper Envi En viro ronm nmen ent, t, it has has dist distin inct ct adva advant ntag ages es ov over er clie client nt / serv server er database. First and Foremost, it is very easy to administer.
There are not a lot of complications settings or network security issue to muddy the waters. You also do not need a very powerful system to run Access 2002. So if you need a database which only few people can access at a time then Access 2002 is the perfect choice.
Finally the Access 2002 is a relational database. Relational database is one of the most versatile types of database ever developed. In relational data, you can define relationships can then then be used used to perf perfor orm m comp comple lex x sear search ches es and and to prod produc ucee detailed reports.
OBJECTIVES
Thee Proj Th Projec ectt mana manage geme ment nt is the the appl applic icat atio ion n of plan planni ning ng orga organi nizi zing ng and and cont contro roll conc concep epts ts to crit critic ical al on onee-of of-a -a kind kind pr projec ojectts.
Manag anagem emen entt
projec ojectts
requ equire ire
top
manag anagem emen entt
commitment, active- Participation and long –range plan. The fundamental objective of a project work is to demonstrate how tedious tedious manual manual work using the computer capabilities capabilities can easily easily do.
The main objective of my project is that it shows the critical jobs in the object schedule, explains the relationships between jobs,
and
generates
reports
and
schedules
as
Specifically, it does the following:-
1.
Determine the jobs that require quick and secure Process to compile the computerized booking.
2. Determines the jobs, which save time that can be Delayed without it..
3. Maintains a schedule in sequence is preferred.
needed.
4. Maintains requirements and information.
5. Keeps track of important deadlines and significant aspects throughout the project.
6. Investigates trade offs between work cost and time.
7. Changes the aspects of a job and immediately shows the impact performance on the overall project.
8. Allows sorting and rearranging jobs in the schedule and rep
E - R DIAGRAM PHONE ADDRESS NAME
Customer
Order no
Order
Delivary
Pizza
Cost
NAME
RECIPIT NO
(The E-R Diagram of Pizza managment System)
C
ontext Diagram
CUSTOMER
REQUEST
RESPONSE
PIZZA MANAGEMENT SYSTEM
UPDATION
QUERIES SOLVED
DATABASE
(Context Diagram)
D EBUGGING Once errors are identified, it is necessary to first identify the precise the location of the error and then to fix them, in this section, we will summarize the important approaches that are available to identify the error locations.
DEBUGGING APPROACHES APPROACHES
BRUTE FORCE METHOD:-
In this approach, the program is loaded with print statements to print the intermediate values with the hope that some of the printed values will help to identify the statement in error.
BACKTRACKING:-
This is also a fairly common approach. In this approach, beginning from the statement at which an error symptom has been observed, the source is traced backwards until the error is discovered.
CAUSE ELIMINATION METHOD:-
In this approach, a list of causes which could possible have contributed to the error symptom is developed and tests are conducted to eliminated to the error symptom is developed and tests are conducted to each cause. A related technique of identification of the error from the error symptom is the software fault tree analysis.
IMPLEMENTATION:-
After completion of about test plan successfully the system is ready to implement for which it has been made. Implementation is a thing to convert any system design into operational form using several implementation implementation tools. Implementation of that system acquire compatible environment for this system as defines above. Successful implementation implementation needs to teach the user how to operate the system by user manual.
Preliminary Investigation The first step in the system development life cycle is the preli prelimin minary ary invest investiga igatio tion n to determ determine ine the feasib feasibili ility ty of the syst system em.. Th Thee pu purp rpos osee of the the prel prelim imin inar ary y inve invest stig igat atio ion n is to evaluate project requests. it is not a design study nor does it include the collection of details to describe to business system in all respect. Rather, it is the collecting of information that helps committee members to evaluate the merits of project request and make one informed.
Analys Analysis is workin working g on the preli prelimin minary ary invest investiga igatio tion n should should accomplish the following objectives.
o
Clarify and understand the project request
o
Determine the size of the project.
o
Assess
costs
Report
the
and
benefits
of
alternative
approaches.
o
findings
to
management
with
recommendations recommendations outlining the acceptance or rejection of the proposal.
Conducting the Investigation Thee data Th data that that the the anal analys ysis is coll collec ectt du duri ring ng prel prelim imin inar ary y investigations are gathered through three preliminary methods: review reviewing ing organi organizat zation ion docume documents nts,, on-si on-site te observ observati ations ons and conducting interviews.
Reviewing Organization Documents
The analysis conducting the investigation first learnt about the organi organizat zation ion involv involved ed in or affect affected ed by the projec project. t. For exam exampl ple, e, to revi review ew an inve invent ntor ory y syst system emss prop propos osal al mean meanss knowing first how.
Conducing Interviews Writ Writte ten n do docu cume ment ntss and and the the on on-s -sit itee ob obse serv rvat atio ion n tell tell the the analysis how system should operate, but they may not include enough details to allow a decision to be made about the merits of a details to allow a decision to be made about the merits of a system proposal, nor do they present user views about current oper op erat atio ions ns.. Anal Analys ysis is use use inte interv rvie iews ws to lear learn n thes thesee deta detail ils. s. Interviews allow analysis to learn more about the nature of the project and the reason of submitting it. Interview view should p pro rovi vide de deta detail ilss that that furt furthe herr expl explai ain n the the proj projec ectt and and show show
whet whethe herr assi assist stan ance ce is meri merite ted d econ econom omic ical ally ly,, op oper erat atio iona nall lly y technically.
PRESENT SYSTEM
The existing system depends upon manual operations that are all records were kept in simple files and thus the data is maintained, but, any small mistake may lead to a big problem.
For example:For For exam exampl plee ,for ,for the the prop proper er maint ainten enan ance ce of the the registration information , several reports i.e. List of Names Addr Addres esss dept dept wise wise and and read ready y refe refere renc ncee of func functi tion onss a constant check on this data is required , because of the reason that without this , proper and lengthy record can’t be maintained . This may also lead to some accuracy problems in various data files.
Project Monitoring Plan Cost schedule milestone graph
A cost cost sche schedu dule le grap graph h repr repres esen ents ts the the plan planne ned d cost cost of different milestones. It also shows the actual of achieving the milestone gained by so far. By having the planned cost verses milestone and actual cost verses milestone on the same graph the progress of the project easily.
In the following the x-axis of the graph is time, where the month in the project schedule are marked the y-axis represent the cost in dollars or PMs. The two carves are drawn one curves is the panned cist and planned schedule in which the project plan is completed. The second curve represents the actual cost and actual actual schedu schedule le and the actual actual achiev achieveme ement nt of miles mileston tonee are marked. Thus for each milestone the point representing the time when the milestone are actually achieved and the actual cost of achieving are marked for example milestone graph of creditor are given below.
In this this proj projec ectt cost cost is esti estima mate ted d to be $1 $100 00k k diff differ eren entt mile milest ston ones es are are iden identi tifi fied ed and and curv curves es are are draw drawn n with with this this milestone.
Thee miles Th ilestton onee in this his grap graph h is PDR, PDR, CDR, CDR, mod odul ulee 1 comp comple leti tion on,, modu module le 2 comp comple leti tion on,, inte integr grat atio ion n test testin ing g and and acceptance testing. For each of these milestones some budgets are allocated based on the estimates the planned budget is shown by dotted line and the actual expenditure are shown by bold line. This chart shows that only two milestones are achieved, PDR, SDR, and through the project are in budget when PDR was completed, it is now slightly over budget.
This type of graph helps system designer had programmer in risk management in cost and benefit plan. It tells us clearly that whether the proposed system are in budget of going out budget this this also also help helpss us in chec checki king ng econ econom omic ical al feas feasib ibil ilit ity y if the the project is going beyond the going beyond the expected budget and not giving enough benefited as expected than is not good.
The two carves are drawn one curves is the panned cist and planned schedule in which the project plan is completed. The second curve represents the actual cost and actual schedule and the actual achievement of milestone are marked.
PROJECT PROFILE
Name of the Institute
Computer Career Institute, Varanasi
Address of of the Institute: Institute: B-34/130-12-1, B-34/130-12-1, Bramhanand Bramhanand (Kabeer Nagar), Durgakund Varanasi (U.P)-221005 (U.P)-221005
Name of Software:
Pizza Management Management System
Platform Used:
Win 98/Win 2000/XP
Language Used:
Visual Basic 6.0
Database Used:
MS ACCESS 2002
Project Guide:
Mr. Satish Tiwari
PROJECT SELECTION
Software selection is a critical aspect of system devel developm opmen entt .Altho .Althoug ugh, h, reliab reliable le softwa software re is a desira desirable ble goal; limited progress has been made towards improving it in the last decades. Software is classified for controlling computer operations and application software for solving user user orie orient nted ed prob proble lems ms.. In gene genera ral, l, soft softwa ware re allo allows ws conc concur urre renc ncee of op oper erat atio ion, n, reso resour urce ce and and info inform rmat atio ion n sharing, multiplexed operation. It has grown by leaps and bounds, especially, since the birth of microcomputers.
In the world of HI-TECH, where everything is moving arou around nd info inform rmat atio ion n Tech Techno nolo logy gy,, this this whol wholee worl world d has has become a global village. I would certainly not like to be left behind in this competitive world. So keeping this in view , I have joined this course , and as a part of our curriculum , I have prepared this project . To select a project is not an easy task . As nightly said-“Good start is a half way to success “. So I discussed many projects to work on. Then, I came across this project.
Encouraged by the demand of computers in this competitive world, I am promoted to take up this project .After getting permission; I started working on this project. After discussing every feature of this project with the concerned guide and teacher. I am quite confident to work on this project.
Although, reliable software is a desirable goal;
limited
progress
has
been
made
towards
improving it in the last decades. Software is classified for for cont contro roll llin ing g comp comput uter er op oper erat atio ions ns and and appl applic icat atio ion n software for solving user oriented problems. In general, software allows concurrence of operation, resource and information sharing, multiplexed operation.
PROPOSED SYSTEM After going through the through study. it is found that given project is feasible with respect to technical, social economical, operational and legal aspects. A system is technically feasible, if it can be designed and implemented within the limitations of the available resources like funds, manpower, hardware, software etc. The proposed system is technically feasible as the existing staff can be trained to operate the computerized system and costs invo involv lved ed are are reas reason onab able le cons consid ider erin ing g the the bene benefi fits ts and and futu future re aspects.
The proposed system is economically feasible if the benefits obtained in the long run compensate, rather than overdo the costs incurred in designing and implementing. in this case benefits outw ou twei eigh gh the the cost costs. s. whic which h make make the the syst system emss econ econom omic ical ally ly feasible.
The system will be socially feasible the workload of staff wil will reduc educee and and same ame staf taff can can wor work on high highlly effi fficien cientt computerized system after getting training. The system must be socially feasible from the public point of view, as the system will offer better services to them.
The availability of the required hardware, system software and and tech techni nica call manp manpow ower er make makess the the syst system em op oper erat atio iona nall lly y feasible.
The computerized system will offer high level of record, which makes the system legally feasible.
A system is technically feasible, if it can be designed and implemented within the limitations of the available resources like like funds, funds, manpow manpower, er, hardwa hardware, re, softwa software re etc. etc. The propo proposed sed system is technically feasible as the existing staff can be trained to op oper erat atee the the comp comput uter eriz ized ed syst system em and and cost costss invo involv lved ed are are reasonable considering the benefits and future aspects.
RESEARCH DESIGN Research design is the plain for the study that will lead to the most economica economicall method method for collection collection of required and their their analysis analysis.. If the pro propo posa sall is prop proper erty ty desi design gned ed most most of the the un unne nece cess ssar ary y labo laborr in collecting non-essential data will be saves. •
Exploratory
•
descriptive
•
experimental
The present system is exploratory in nature for it seeds to discover the ideas.
SAMPLE DESIGN
In most of research studies, the amount of the word is always limited by shortage of time and resources. Within these these limita limitatio tions, ns, the sample sampless size size of past past eight eight months months (i.e.(i.e.MAY) is taken for present study.
DATA COLLECTION METHOD
In fact, the data collection is basic step and of vital importance on which success of failure study depends.
ANALYSIS AND INTERPRETATION OF DATA
The data collection in the aforesaid manner bas been tabulated in condensed form to draw meaning results. The different techniques are adopted to analyze the data. An attempt has also been made to prepare report on the basis of test data.
All the data and material is arranged through internal resources and last pare of the project consist of conclusions draw from the report, a brief summary and recommendations and giving final touch to the report by starting annexes and bibliography.
SOFTWARE SOFTWA RE QUALITY QUALI TY ASSURANC ASSURANCE E PLAN To ensure that the new system provides high quality final product, some some qu qual alit ity y cont contro roll acti activi viti ties es must must be perf perfor orme med d thro throug ugho hout ut development this is because correcting errors in final stages are very costly. Especially when they originated in early stage the purpose of soft softwa ware re qu qual alit ity y assu assura ranc ncee plan plan spec specif ify y all all the the acti activi vity ty that that are are needed to check the quality of each product it takes the board new of quality, it is not only interested in the quality of out put but also of the intermediate intermediate product. Because Because if the requirement requirement and design are of good quality then the software propose also of good quality. To check the correctness of the product quality assurance plan use two processes called verification and validation.
•
Verification it is the process of determining whether or not the
product phase of the software development fulfill the specification established during the previous phase this activity include testing review and proving.
•
Validation is the process of evaluating software at the end of the
soft softwa ware re to ensu ensure re comp compli lian ance ce with with the the soft softwa ware re requ requir irem emen ent. t. Testing is the common example of validation.
For this we have to make a software quality assurance table. The purpose of this document is to decide the quality assurance for the maintaining the creditor’s ledger. For this purpose all the validation are check with fake data so that user get the desired output quality assured certificate is given to this software on the basis of factors i.e. product operation, transition and revision. These factors include the foll follow owin ing g
acti activi vity ty i.e. i.e. main mainta tain inabi abili lity ty corr correc ectn tnes ess, s, reli reliab abil ilit ity, y,
testability etc this software assure the software cannot be transfer from from on onee hard hardwa ware re conf config igur urat atio ion n to anot anothe herr syst system em.. Cann Cannot ot be coupled with other system these factors are easily explained with the help of quality assurance table.
System Development Life Cycle
Stage
1.
key Question
Result
Recogn Recognit ition ion of need need Preli Prelimin minary ary survey survey /initi /initial al
investigation
2.
.Feasi .Feasibil bility ity study study Evalua Evaluatio tion n of exist existing ing system system and
pro proce cedu dure ress anal analys ysis is alte altern rnat ativ ivee cand candid idat atee syst system em cost cost estimates.
3.
Analysis evaluation of present system data collection.
4.
Desi Design gn gene genera rall desi design gn spec specif ific icat atio ion n deta detail iled ed desi design gn
specification output input fields procedures system?
Program Program construc construction tion testing testing unit testing testing combined combined module testing user acceptance testing.
5.
Implementation user training file/system conversion is
there delays in lading? Files?
6.
Post Post-i -imp mple leme ment ntat atio ion n
and and
Main Mainte tena nanc ncee
Maintenance Enhancement. What is the problem and or opportunity?
eval evalua uati tion on
What are the user’s demonstrable needs is the problem worth solving? How can the problem be redefined?
What must be done to solve the problem? What are the facts?
In general how the problem must be soled? Specifically, how must the problem is solved? What is the system (processing) (processing) flow?
Does the user approve the Approval of system by user Programs?
How well do individual programs/modules programs/modules test out? How ready are programs for acceptance test? What is that actual operation? Are user manuals ready?
Is the key system running should the system be modified? Statement of scope Objectives Performance criteria.
Techni Technical cal/be /behav havior ioral al Feasi Feasibil bility ity cost/b cost/bene enefi fitt analys analysis is syste system m scope and objectives statement of new scope and objectives.
Logical model of system e.g. data dictionary. data Flow diagram pertinent data.
Design
of
alternative
solutions
Final
Implementation Implementation specification.
Implementation? Implementation? Schedule.
Security, audit and Operating procedures. Actual hardware use Formal system test.
Training Program User-friendly User-friendly documentation. documentation.
User requirements met? User standards met satisfied user.
cost
Estimates?
SYSTEM STUDY
SYSTEM TESTING
This is phase, which comes after coding in which we are resting the overall system. First it test the module separately and finally the system as whole. Each module and program is tested first and than through the interface to the other subsystems the complete system is tested this is the most important face as the system analyst has to get user certification for the accuracy of the system of the acceptance testing by the user. The user representative, the system analyst, the standards groups, the external system auditor or any other comb combin inat atio ion n shou should ld carr carry y ou outt such such a test testin ing g test test data data is no norm rmal ally ly prepared by the user to check for all possible combinations of correct data as well as the wrong data which should be trapped by the system and reported as an error. The various level used in testing are unit testing, integration testing and system testing.
•
In unit nit te test stiing: dif differen erentt mod odu ules les are test ested agai agains nstt the the
specification produced during design for the module like testing Add, Show module whether these modules adding and then show the record correctly or not. This phase is essentially for verification of code produced during the coding phase and to test the internal logic of the modules.
•
Integrati Integration on testing: testing: in this his many un unit it test esting ing mod odul ules es are are
combined into subsystem, which are then tested the goal here is to see if the modules are integrated properly or not like after adding records show perfectly showing the added record and perform the other task like transaction and installment payment etc. on the record added.
•
In system and acceptance testing: the entire system is tested the
reference document for this process is the requirement document and the goal is to see if the software meets its requirement. The following format given below is dummy data. In which total amount are 15129, this this is the the corr correc ectt form format at.. In case case if we add add reco record rd of the the same same company again, it will give an error message that company is already present would like to add for the same company or not.
Test case specification for the system testing
Here we specify all test cases that are used for system testing first the different that are needed to be tested, along with the test cases used for testing those conditions and the expected output are given. The goal is to test the different functional requirement, as specified in the requirement document. Test cases are selected form both valid and invalid inputs.
At last testing plays a very critical role in quality assurance for soft softwa ware re.. Due Due to limi limita tati tion on of the the veri verifi fica cati tion on meth method odss for for the the previ previous ous phases phases,, design design and requir requireme ements nts faults faults and errors errors this this is specifies the level of testing and unit that need to tested as done above during testing we are checking the reliability of the software.
TO WHOM SO EVER IT MAY CONCERN
This is to certify that Mr. Shashank Singh from computer career institute – Varanasi has successfully comp comple lete ted d proj projec ectt un unde derr the the gu guid idan ance ce of Mr.S Mr.Sat atis ish h Tiwari Tiwari.. Th Thee proje project ct was und undert ertake aken n toward towardss partia partiall fulfillment of their BCA in Computer Science. The Proj Projec ectt enti entitl tled ed “Pizz “Pizzaa Mana Manage geme ment nt Syst System em”. ”. Th Thee Project was satisfactorily tested and implemented as per the requirements. requirements.
Mr. Satish Tiwari Computer Career Institute Durgakund,Varanasi
VISUAL BASIC Visual Basic is an ideal programming language for deve develo lopi ping ng supp suppli lica cate ted d appl applic icat atio ions ns for for Micr Micros osof oftt windows. It makes use of graphical user interface for creating robust and powerful applications. Visual Basic was developed from the Basic Programming Language in the 1970s, Visual Basic 6.0 for windows require at leas leastt Micr Micros osof oftt Wind Window owss 95 95/W /Win indo dows ws NT 3.51 3.51,4 ,486 86 processor and minimum of 16 MB of hand disk space.
Visu Visual al Basi Basicc is init initia iate ted d by usin using g the the prog progra rams ms options-> Microsoft Visual Basic 6.0-> Visual Basic 6.0, clicking the Visual Basic 6.0 Icon, we can copyright screen listing the details of license holder of the copy of the Visual Basic 6.0 then it opens into a screen with the interface elements such as Menu Bar, Tool Bar, the new project dialog Box. One of the most significant changes in VB 6.0 is integrated development environment (IDE).
The VB IDE is made up of a number of components:-
1.
Menu Bar
2.
Tool Bar
3.
Project Explorer
4.
Properties Window
5.
Form Layout Window
6.
Tool Box
7.
Form Designer
8.
Object Browser
Visu Visual al Basi Basicc 6.0 has has sev several ral diff ifferen erentt typ types of objects. The form is one of the most objects in which the application is developed.
A form is a window that contains application code and has other objects placed on it to create the user interface. Programming in Visual Basic 6.0 consists of a visu visual al Prog Progra ramm mmin ing g step step that that invo involv lves es desig designi ning ng the the application and a code programming step that involves
designing the application and a code programming step that involves coding. We can create an Executable file menu .Visual Basic uses building Blocks such as variables, data and types pr procedu cedurres fun functio ction ns and and con control trol str structu ctures res in its its programming environment. Visual Basic 6.0 controls are broadly classified as standard controls ActiveX control & insati insatiabl ablee ob objec jects. ts. Stand Standard ard contro controll such such as comma command nd button, label and frame are contained inside EXE File. ActiveX control exists as a separate file with other. VBX of > OCX extension. Visual Basic 6.0 uses the tab index property to determine the control and who will receive the focus next when a tab key is pressed. Adding menus can can enh nhan ancce Visu Visuaal Basi Basicc 6.0 app applica licati tion on.. A menu interface consists of Menu Title, Menu Item, Separator Bar, Menu Bar and Title Bar. It provides various various methods and controls to create and use graphics in an application.
Private Sub Command2_Click() Command2_Click() Command2.Visible Command2.Visible = False On Error GoTo HAND Form1.PrintForm MsgBox ("Send to Printer") Unload Me Exit Sub HAND: MsgBox "Printer not connected or switched off", vbCritical, "VENKY'S PIZZA HOUSE" Command2.Visible Command2.Visible = True End Sub
Private Sub Form_Load() Label10.Caption Label10.Caption = Date End Sub
Private Sub Command2_Click() Command2.Visible Command2.Visible = False On Error GoTo HAND
Form2.PrintForm MsgBox ("Send to Printer") Unload Me Exit Sub HAND: MsgBox "Printer not connected or switched off", vbCritical, "VENKY'S PIZZA HOUSE" Command2.Visible Command2.Visible = True End Sub
Private Sub Form_Load() Label3.Caption = Date End Sub
Private Sub Timer1_Timer() Timer1_Timer() 'marquee of text Label1.Left = Label1.Left + 50 If Label1.Left >= 9930 Then Label1.Left = 0 - Label1.Width End If End Sub
Private Sub Timer2_Timer() Timer2_Timer() 'procress bar Timer1.Enabled Timer1.Enabled = True pb1.Value = pb1.Value + 1
Label2.Caption = pb1.Value & "%" If pb1.Value = 100 Then frmindex.Show Unload Me End If End Sub
Dim DB As New ADODB.Connection Dim RS As New ADODB.Recordset
Private Sub Combo1_Click() Text1.Text = Combo1.Text Combo1.Visible Combo1.Visible = False RS.MoveFirst A = Text1.Text RS.Find ("PH='" & A & " ' ") Text1.Text = RS.Fields("PH") Text2.Text = RS.Fields("CNAME") RS.Fields("CNAME") Text3.Text = RS.Fields("ARD") RS.Fields("ARD") End Sub
Private Sub Command1_Click() On Error GoTo HAND Text1.Text = "" Text2.Text = "" Text3.Text = "" RS.AddNew Exit Sub HAND: MsgBox Err.Description, vbCritical, " EXCUSE ME" End Sub
Private Sub Command2_Click() On Error GoTo HAND If Text1.Text = "" Then Text1.SetFocus ElseIf Text2.Text = "" Then Text2.SetFocus ElseIf Text3.Text = "" Then Text3.SetFocus Else X% = MsgBox("CONFORM SAVE", vbInformation + vbYesNo, "CONFORM SAVE") If (X% = vbYes) Then RS.Fields("ph") RS.Fields("ph") = Text1.Text RS.Fields("cname") RS.Fields("cname") = Text2.Text RS.Fields("ard") RS.Fields("ard") = Text3.Text
RS.Update MsgBox " RECORD SAVED", vbInformation, "RECORD SAVED" Else MsgBox " SAVE ABORTED", vbInformation, "RECORD NOT SAVED" End If End If Exit Sub HAND: MsgBox Err.Description, vbCritical, " EXCUSE ME" End Sub
Private Sub Command3_Click() On Error GoTo HAND Combo1.Visible Combo1.Visible = True Combo1.Clear RS.MoveFirst While (RS.EOF = False) Combo1.AddItem Combo1.AddItem RS.Fields("PH") RS.Fields("PH") RS.MoveNext Wend Exit Sub HAND: MsgBox Err.Description, vbCritical, " EXCUSE ME" End Sub
Private Sub Command4_Click() On Error GoTo HAND X% = MsgBox("CONFORM DELETE", vbInformation + vbYesNo, "CONFORM SAVE") If (X% = vbYes) Then RS.Delete MsgBox " RECORS DELETED", vbInformation, "EXCUSE ME" RS.MoveFirst Text1.Text = RS.Fields("PH") Text2.Text = RS.Fields("CNAME") RS.Fields("CNAME") Text3.Text = RS.Fields("ARD") RS.Fields("ARD") Else MsgBox " DELETE ABORTED", vbCritical, "EXSCUSE ME" End If Exit Sub HAND: MsgBox Err.Description, vbCritical, " EXCUSE ME" End Sub
Private Sub Command5_Click() Unload Me End Sub
Private Sub Form_Load() DB.Open "Provider=Microsoft.J "Provider=Microsoft.Jet.OLEDB.4.0;Dat et.OLEDB.4.0;Dataa Source=" & App.Path & "\pizza.mdb;Persist Security Info=False" RS.Open "CUS", DB, 1, 3 Combo1.Visible Combo1.Visible = False End Sub
Private Sub Form_Unload(Cancel As Integer) 'If RS.State = 1 Then 'RS.Close 'End If DB.Close frmindex.Show End Sub
Private Sub Text1_GotFocus() Text1_GotFocus() Text1.BackColor = &HC0FFC0 End Sub
Private Sub Text1_LostFocus() Text1_LostFocus() Text1.BackColor = &H80000005 End Sub
Private Sub Text2_GotFocus() Text2_GotFocus() Text2.BackColor = &HC0FFC0 End Sub
Private Sub Text2_LostFocus() Text2_LostFocus() Text2.BackColor = &H80000005 End Sub
Private Sub Text3_GotFocus() Text3_GotFocus() Text3.BackColor = &HC0FFC0 End Sub
Private Sub Text3_LostFocus() Text3_LostFocus() Text3.BackColor = &H80000005 End Sub
Private Sub Combo1_GotFocus() Combo1_GotFocus() Combo1.BackColor = &HFFFFC0 End Sub
Private Sub Combo1_LostFocus() Combo1_LostFocus() Combo1.BackColor = &H80000005 End Sub
Private Sub CMDBILL_Click() CMDBILL_Click() FRMBILL.Show Unload Me End Sub
Private Sub CMDCDETAILS_Click() CMDCDETAILS_Click() FRMCUS.Show Unload Me End Sub
Private Sub CMDEXIT_Click() CMDEXIT_Click() X% = MsgBox(" CONFORM EXIT", vbInformation + vbYesNo, "VENKY'S PIZZA HOUSE-EXIT CONFORM") If (X% = vbYes) Then End Else frmindex.Show End If End Sub
Private Sub CMDONLINE_Click() CMDONLINE_Click() frmonline.Show Unload Me End Sub
Private Sub CMDPIZZA_Click() CMDPIZZA_Click() FRMPIZZA.Show Unload Me End Sub
Private Sub CMDSEARCH_Click() CMDSEARCH_Click() FRMSEARCH.Show Unload Me End Sub
Public KEY As Integer Dim DB As New ADODB.Connection Dim RS As New ADODB.Recordset
Private Sub cmdfind_Click() cmdfind_Click() On Error GoTo HAND sqlst = "select * from CUS where (PH)=" + TXTPH.Text RS.Open sqlst, DB, 1, 3 If (RS.RecordCount = 0) Then MsgBox " RECORD NOT FOUND " TXTNAME.Locked = False TXTADD.Locked = False MsgBox "ENTER THE NAME AND ARDDRESS", vbCritical, "VENKY'S PIZZA HOUSE" TXTNAME.SetFocus
Command2.Enabled Command2.Enabled = True Else TXTPH.Text = RS.Fields("PH") TXTNAME.Text = RS.Fields("CNAME") TXTADD.Text = RS.Fields("ARD") Command1.Enabled Command1.Enabled = True End If RS.Close Exit Sub HAND: MsgBox " CHECK IF YOU HAVE ENTERED A NUMBER ", vbCritical, "VENKY'S PIZZA HOUSE" End Sub
Private Sub Combo1_Click() TXTPIZZA.Text = Combo1.Text RS.Open "PIZZA", DB, 1, 3 A = TXTPIZZA.Text RS.Find ("PNAME='" & A & " ' ") TXTUP.Text = RS.Fields("PRICE") RS.Close TXTQTY.SetFocus End Sub
Private Sub Command2_Click() On Error GoTo HAND If TXTNAME.Text = "" Or TXTADD.Text = "" Then GoTo HAND End If RS.Open "CUS", DB, 1, 3 RS.AddNew RS.Fields("PH") RS.Fields("PH") = TXTPH.Text RS.Fields("CNAME") = TXTNAME.Text RS.Fields("ARD") RS.Fields("ARD") = TXTADD.Text RS.Update RS.Close Command2.Enabled Command2.Enabled = False Command1.Enabled Command1.Enabled = True Exit Sub HAND: MsgBox " CHECK IF YOU HAVE ENTERED A NAME AND YOUR ADDRESS", vbCritical, "VENKY'S PIZZA HOUSE" End Sub
Private Sub Command5_Click() 'On Error GoTo HAND X% = MsgBox("CONFORM SAVE", vbYesNo + vbInformation, "EXCUSE ME") If (X% = vbYes) Then RS.Open "ord", DB, 1, 3
For i = 1 To KEY RS.AddNew RS.Fields("ONO") RS.Fields("ONO") = Label4.Caption Label4.Caption RS.Fields("PNAME") RS.Fields("PNAME") = fg1.TextMatrix(i, fg1.TextMatrix(i, 1) RS.Fields("qty") RS.Fields("qty") = fg1.TextMatrix(i, fg1.TextMatrix(i, 2) RS.Fields("PRICE") RS.Fields("PRICE") = fg1.TextMatrix(i, fg1.TextMatrix(i, 3) RS.Fields("TOTPRICE") RS.Fields("TOTPRICE") = fg1.TextMatrix(i, fg1.TextMatrix(i, 4) RS.Update Next i RS.Close RS.Open "ORDERMAIN", DB, 1, 3 RS.AddNew RS.Fields("ONO") RS.Fields("ONO") = Label4.Caption Label4.Caption RS.Fields("DATE") RS.Fields("DATE") = Label12.Caption RS.Fields("NP") RS.Fields("NP") = txtnp.Text RS.Fields("PH") RS.Fields("PH") = Text3.Text RS.Fields("CNAME") RS.Fields("CNAME") = Text1.Text RS.Fields("ARD") RS.Fields("ARD") = Text2.Text RS.Update RS.Close
Form1.LONO.Caption Form1.LONO.Caption = Label4.Caption Form1.LPH.Caption Form1.LPH.Caption = Text3.Text Form1.LARD.Caption Form1.LARD.Caption = Text2.Text Form1.LCUS.Caption Form1.LCUS.Caption = Text1.Text Form1.LNP.Caption Form1.LNP.Caption = txtnp.Text For i = 1 To KEY
Form1.LPIZZA(Form1.LPIZZA.UBound).Caption = fg1.TextMatrix(i, fg1.TextMatrix(i, 1) Form1.LUP(Form1.LUP. Form1.LUP(Form1.LUP.UBound).Caption UBound).Caption = fg1.TextMatrix(i, fg1.TextMatrix(i, 3) Form1.LQTY(Form1.LQTY.UBound).Caption = fg1.TextMatrix(i, fg1.TextMatrix(i, 2) Form1.LTOT(Form1.LTOT.UBound).Caption = fg1.TextMatrix(i, fg1.TextMatrix(i, 4) If (Form1.LPIZZA.UBound (Form1.LPIZZA.UBound = 0) Then ' Load Form1.LPIZZA(Form1.LPIZZA.UBound + 1) ' Load Form1.LUP(Form1.LUP. Form1.LUP(Form1.LUP.UBound UBound + 1) ' Load Form1.LQTY(Form1.LQTY.UBound + 1) ' Load Form1.LTOT(Form1.LTOT.UBound + 1) ' Form1.Line3.Y2 = Form1.Line3.Y2 + 500 ' Form1.Line4.Y2 = Form1.Line4.Y2 + 500 ' Form1.Line5.Y2 = Form1.Line5.Y2 + 500 ' Form1.Line6.Y2 = Form1.Line6.Y2 + 500 ' Form1.Line7.Y2 = Form1.Line7.Y2 + 500 ' Form1.Frame1.Top = Form1.Frame1.Top + 300 GoTo SA End If ' PIZZA NAME Form1.LPIZZA(Form1.LPIZZA.UBound).Left = Form1.LPIZZA(Form1.LPIZZA.UBound - 1).Left Form1.LPIZZA(Form1.LPIZZA.UBound).Top = Form1.LPIZZA(Form1.LPIZZA.UBound - 1).Top + 250
Form1.LPIZZA(Form1.LPIZZA.UBound).Visible = True 'UNIT PRICE Form1.LUP(Form1.LUP.UBound).Left = Form1.LUP(Form1.LUP.UBound - 1).Left Form1.LUP(Form1.LUP.UBound).Top = Form1.LUP(Form1.LUP. Form1.LUP(Form1.LUP.UBound UBound - 1).Top + 250 Form1.LUP(Form1.LUP.UBound).Visible = True 'QUANTITY Form1.LQTY(Form1.LQTY.UBound).Left = Form1.LQTY(Form1.LQTY.UBound - 1).Left Form1.LQTY(Form1.LQTY.UBound).Top = Form1.LQTY(Form1.LQTY.UBound - 1).Top + 250 Form1.LQTY(Form1.LQTY.UBound).Visible = True 'TOTAL PRICE Form1.LTOT(Form1.LTOT.UBound).Left = Form1.LTOT(Form1.LTOT.UBound - 1).Left Form1.LTOT(Form1.LTOT.UBound).Top = Form1.LTOT(Form1.LTOT.UBound - 1).Top + 250 Form1.LTOT(Form1.LTOT.UBound).Visible = True
SA: Load Form1.LPIZZA(Form1.LPIZZA.UBound + 1) Load Form1.LUP(Form1.LUP.UBound + 1) Load Form1.LQTY(Form1.LQTY.UBound Form1.LQTY(Form1.LQTY.UBound + 1) Load Form1.LTOT(Form1.LTOT.UBound + 1) Form1.Line3.Y2 Form1.Line3.Y2 = Form1.Line3.Y2 Form1.Line3.Y2 + 500
Form1.Line4.Y2 Form1.Line4.Y2 = Form1.Line4.Y2 Form1.Line4.Y2 + 500 Form1.Line5.Y2 Form1.Line5.Y2 = Form1.Line5.Y2 Form1.Line5.Y2 + 500 Form1.Line6.Y2 Form1.Line6.Y2 = Form1.Line6.Y2 Form1.Line6.Y2 + 500 Form1.Line7.Y2 Form1.Line7.Y2 = Form1.Line7.Y2 Form1.Line7.Y2 + 500 Form1.Frame1.Top Form1.Frame1.Top = Form1.Frame1.Top Form1.Frame1.Top + 300 Next i Form1.Show MsgBox "RECORDE SAVED", vbInformation, "VENKY'S PIZZA HOUSE" Else MsgBox "SAVE ABORTED", vbCritical, "VENKY'S PIZZA HOUSE" End If 'Exit Sub 'HAND: 'MsgBox Err.Description End Sub
Private Sub Command6_Click() Unload Me End Sub
Private Sub Command7_Click() Label4.Caption = "BILL" TXTPH.Text = "" Text3.Text = "" Text1.Text = ""
Text2.Text = "" txtnp.Text = "" TXTPIZZA.Text = "" TXTQTY.Text = "" TXTUP.Text = "" TXTPRICE = "" TXTNAME.Text = "" TXTADD.Text = "" TXTTP.Text TXTTP.Text = "" Combo1.Text = "" fg1.Clear Frame4.Enabled Frame4.Enabled = True Command1.Enabled Command1.Enabled = False End Sub
Private Sub Form_Unload(Cancel As Integer)
DB.Close frmindex.Show End Sub Private Sub Command1_Click() 'COMMAND BUTTON ORDER frbill.Enabled frbill.Enabled = True FRFG.Enabled = True Text3.Text = TXTPH.Text Text1.Text = TXTNAME.Text TXTNAME.Text Text2.Text = TXTADD.Text
RS.Open "ORDERMAIN", DB, 1, 3 If (RS.RecordCount = 0) Then Label4.Caption = 1 Else RS.MoveLast Label4.Caption = RS.Fields("ONO") RS.Fields("ONO") + 1 End If RS.Close Frame4.Enabled Frame4.Enabled = False End Sub
Private Sub Command3_Click() If TXTPIZZA.Text = "" Then MsgBox "enter the pizza type", vbInformation Combo1.SetFocus Else If TXTQTY.Text = "" Then MsgBox "enter the number of quantity", vbInformation vbInformation TXTQTY.SetFocus Else If (KEY = 0) Then KEY = 1 Else KEY = KEY + 1 End If fg1.Rows = KEY + 1 fg1.TextMatrix(KEY, 1) = TXTPIZZA.Text
fg1.TextMatrix(KEY, 2) = TXTQTY.Text fg1.TextMatrix(KEY, 3) = TXTUP.Text fg1.TextMatrix(KEY, 4) = TXTTP.Text TXTPIZZA.Text = "" TXTQTY.Text = "" TXTUP.Text = "" TXTTP.Text TXTTP.Text = "" Combo1.Text = "" End If End If End Sub
Private Sub Command4_Click() Dim TOT As Integer For i = 1 To KEY TOT = TOT + Val(fg1.TextMatrix(i, 4)) Next i txtnp.Text = TOT Command5.Enabled Command5.Enabled = True End Sub
Private Sub Form_Load()
DB.Open "Provider=Microsoft.J "Provider=Microsoft.Jet.OLEDB.4.0;Dat et.OLEDB.4.0;Dataa Source=" & App.Path & "\pizza.mdb;Persist Security Info=False" RS.Open "PIZZA", DB, 1, 3
While (RS.EOF = False) Combo1.AddItem Combo1.AddItem RS.Fields("PNAME") RS.Fields("PNAME") RS.MoveNext Wend RS.Close Label12.Caption Label12.Caption = Date End Sub
Private Sub TXTNAME_LostFocus() If IsNumeric(TXTNAME.Text) = True Then MsgBox "ENTER NAME IN TEXT ONLY", vbCritical, "VENKY'S PIZZA HOUSE" End If End Sub
Private Sub TXTPH_LostFocus() TXTPH_LostFocus() If TXTPH.Text = "" Or IsNumeric(TXTPH.Text) IsNumeric(TXTPH.Text) = False Then MsgBox " ENTER A PHONE NUMBER" TXTPH.SetFocus End If
End Sub
Private Sub TXTQTY_LostFocus() If TXTQTY.Text = "" Or IsNumeric(TXTQTY.Text) = False Or Val(TXTQTY.Text) <= 0 Then MsgBox " QUANTITY CANNOT BE EMPTY OR ENTER A NUMERIC TEXT or SHOULD NOT BE LESS THAN ZERO OR EQUAL TO ZERO ", vbCritical, "VENKY'S PIZZA HOUSE" TXTQTY.SetFocus Else TXTTP.Text = Val(TXTQTY.Text) * Val(TXTUP.Text) End If End Sub
Private Sub txtpassword_KeyPress(KeyAs txtpassword_KeyPress(KeyAscii cii As Integer) If KeyAscii = 13 Then txtpassword txtpassword = LCase(txtpassword.Text) LCase(txtpassword.Text) If (txtpassword.Text = "admin") Then MsgBox "login into " & txtusername.Text, vbInformation, vbInformation, "login in" frmain.Show Unload Me Else MsgBox "login failes", vbCritical, "login failed" txtusername.Text txtusername.Text = ""
txtpassword.Text txtpassword.Text = "" txtusername.SetFocus End If End If End Sub
Private Sub txtusername_KeyPress(KeyAsc txtusername_KeyPress(KeyAscii ii As Integer) If KeyAscii = 13 Then txtpassword.SetFocus End If End Sub
Dim DB As New ADODB.Connection Dim RS As New ADODB.Recordset
Private Sub Combo1_Click() Text1.Text = Combo1.Text Combo1.Visible Combo1.Visible = False RS.MoveFirst A = Text1.Text RS.Find ("PID='" & A & " ' ") Text1.Text = RS.Fields("PID") Text2.Text = RS.Fields("PNAME") Text3.Text = RS.Fields("PRICE") RS.Fields("PRICE") End Sub
Private Sub Command1_Click() On Error GoTo HAND Text1.Text = "" Text2.Text = "" Text3.Text = "" If (RS.RecordCount = 0) Then Text1.Text = 1 Else RS.MoveLast Text1.Text = RS.Fields("PID") RS.Fields("PID") + 1 End If RS.AddNew Exit Sub HAND: MsgBox Err.Description, vbCritical, " EXCUSE ME" End Sub
Private Sub Command2_Click() On Error GoTo HAND If Text1.Text = "" Then Text1.SetFocus ElseIf Text2.Text = "" Then Text2.SetFocus ElseIf Text3.Text = "" Then Text3.SetFocus Else
X% = MsgBox("CONFORM SAVE", vbInformation + vbYesNo, "CONFORM SAVE") If (X% = vbYes) Then RS.Fields("PID") RS.Fields("PID") = Text1.Text RS.Fields("PNAME") RS.Fields("PNAME") = Text2.Text RS.Fields("PRICE") RS.Fields("PRICE") = Text3.Text RS.Update MsgBox " RECORD SAVED", vbInformation, "RECORD SAVED" Else MsgBox " SAVE ABORTED", vbInformation, "RECORD NOT SAVED" End If End If Exit Sub HAND: MsgBox Err.Description, vbCritical, " EXCUSE ME" End Sub
Private Sub Command3_Click() On Error GoTo HAND Combo1.Visible Combo1.Visible = True Combo1.Clear RS.MoveFirst While (RS.EOF = False) Combo1.AddItem Combo1.AddItem RS.Fields("PID") RS.Fields("PID") RS.MoveNext
Wend Exit Sub HAND: MsgBox Err.Description, vbCritical, " EXCUSE ME" End Sub
Private Sub Command4_Click() On Error GoTo HAND X% = MsgBox("CONFORM DELETE", vbInformation + vbYesNo, "CONFORM SAVE") If (X% = vbYes) Then RS.Delete MsgBox " RECORS DELETED", vbInformation, "EXCUSE ME" If (RS.RecordCount = 0) Then MsgBox " NO RECORS AVALABLE ALL DELETED", vbCritical, "VENKY'S PIZZA HOUSE" Else RS.MoveFirst Text1.Text = RS.Fields("PID") Text2.Text = RS.Fields("PNAME") Text3.Text = RS.Fields("PRICE") RS.Fields("PRICE") End If Else MsgBox " DELETE ABORTED", vbCritical, "EXSCUSE ME" End If
Exit Sub HAND: MsgBox Err.Description, vbCritical, " EXCUSE ME" End Sub
Private Sub Command5_Click() Unload Me End Sub
Private Sub Form_Load() DB.Open "Provider=Microsoft.J "Provider=Microsoft.Jet.OLEDB.4.0;Dat et.OLEDB.4.0;Dataa Source=" & App.Path & "\pizza.mdb;Persist Security Info=False" RS.Open "PIZZA", DB, 1, 3 Combo1.Visible Combo1.Visible = False End Sub
Private Sub Form_Unload(Cancel As Integer) 'If RS.State = 1 Then 'RS.Close 'End If DB.Close frmindex.Show End Sub
Private Sub Frame1_DragDrop(Source As Control, X As Single, Y As Single)
End Sub
Private Sub Text1_GotFocus() Text1_GotFocus() Text1.BackColor = &HC0FFC0 End Sub
Private Sub Text1_LostFocus() Text1_LostFocus() Text1.BackColor = &H80000005 End Sub Private Sub Text2_GotFocus() Text2_GotFocus() Text2.BackColor = &HC0FFC0 End Sub
Private Sub Text2_LostFocus() Text2_LostFocus() Text2.BackColor = &H80000005 End Sub Private Sub Text3_GotFocus() Text3_GotFocus() Text3.BackColor = &HC0FFC0 End Sub
Private Sub Text3_LostFocus() Text3_LostFocus() Text3.BackColor = &H80000005 End Sub Private Sub Combo1_GotFocus() Combo1_GotFocus()
Combo1.BackColor = &HFFFFC0 End Sub
Private Sub Combo1_LostFocus() Combo1_LostFocus() Combo1.BackColor = &H80000005 End Sub
Private Sub Command1_Click() DataReport1.Show End Sub
Private Sub Command2_Click() DataReport3.Show End Sub
Private Sub Command3_Click() DataReport2.Show End Sub
Private Sub Command4_Click() DataReport4.Show End Sub
Private Sub Form_Unload(Cancel As Integer) Unload Me frmindex.Show End Sub
S
TUDY
CENTERE
CERTIFICATE
THE IS TO CERTIFY THAT PROJECT ENTITLED COMPUTER CAREER INSTITUTE EMBODIES THE ORIGINAL WORK DONE BY SHASHANK SINGH IN PARTIAL FULFILLMENT OF THEIR COURSE THEIR COURSE REQUIREMENT AT THE COMPUTER CAREER INSTITUTE , BRAHMANAND NAGAR COLONY DUGAKUND, VARANASI.
…………………… MR . HEMANT K UMAR UMAR CHAUDHARY (EXECUTIVE DIRECTOR )
..……..………... MR . R AJKUMAR AJKUMAR PAL (H.O.D)
C
ONCLUSION
This project has been a rewarding experience in more ways than one. Firstly we have gained an insight into working of the Computer Centre Automation System. This represents a typical real-word situation. Secondly, in order to generate the final reports, all the steps of database designing had to be meticulously following, this has strengthen our understanding of database design, which we have used in back-end. This project has been of tremendous help in improving our knowledge of Visual Basic, which is one of the most efficient tools for designing user interfaces. The project also introduced us to the concept of database connectivity. Initially, there were problems with validations, but with the guidance of our teachers, we were able to important the validations. Finally, we can appreciate the power of a dbms like MS Access in managing data and that of Visual Basic in developing easy to handle yet very efficient user interface. We are now confident of handing such real-life situations concerning data management.