0% found this document useful (0 votes)
60 views22 pages

Ilaiyavan Project

This document provides an overview and synopsis of an Online Crime Reporting System project. The system aims to automate an existing manual crime reporting process using computer software and hardware. It is intended to store data longer term, make data easily accessible and manipulable, and lead to a more reliable, secure and fast management system. The document outlines the system specifications, software features including a front-end using PHP and back-end using MySQL, and provides an introduction to the project.

Uploaded by

Indhumathi
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
60 views22 pages

Ilaiyavan Project

This document provides an overview and synopsis of an Online Crime Reporting System project. The system aims to automate an existing manual crime reporting process using computer software and hardware. It is intended to store data longer term, make data easily accessible and manipulable, and lead to a more reliable, secure and fast management system. The document outlines the system specifications, software features including a front-end using PHP and back-end using MySQL, and provides an introduction to the project.

Uploaded by

Indhumathi
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 22

Synopsis

The purpose of “Online Crime Reporting System” is to automate the


existing manual system by the help of computerized equipment and full-fledged
computer software, fulfilling their requirements, so that their valuable
data/information can be stored for a longer period with easy accessing and
manipulation of the same. The required software and hardware are easily
available and easy to work with.

Online Crime Reporting System, as described above, can lead to error


free, secure, reliable and fast management system. It can assist the user in
concentrating on their other activities rather than concentrate on record keeping.
Thus, it will help the organization in better utilization of resources. The
organization can maintain computerized records without redundant entries. That
means that one need not be distracted by information that is not relevant, while
being able to reach the information.

The aim is to automate its existing manual system by the help of


computerized equipment's and full-fledged computer software, fulfilling their
requirements, so that their valuable data/information can be stored for a longer
period with easy accessing and manipulation of the same. Basically, the project
describes how to manage for good performance and better services for the
clients.

It may help collecting perfect management in detail. In a very short time,


the collection will be obvious, simple and sensible. It will help a person to know
the management of the past year perfectly and vividly. It also reduced the cost
of collecting the management &collection procedure will go on smoothly.

The project is developed using PHP as front end and MYSQL as back
end under the Windows11 environment.

CHAPTER-1
1.INTRODUCTION
1.1 ABOUT THE PROJECT
The “Online Crime Report System ” has been developed to override the
problems prevailing in the practicing manual system. This software is supported
to eliminate and in some cases reduce the hardship faced by this existing system
.Moreover this system is designed for the particular need of the company to
carry out operations in a smooth and effective manner.

The application is reduced as much as possible to avoid errors while entering


the data. It also provides errors message while entering invalid data. No formal
knowledge is needed for the user to use this system. Thus by this all it proves it
is user-friendly Online Crime Reporting System ,as described above , can lead
to error free, secure, reliable and fast management system. It can assist the user
to concentrate on their other activities rather to concentrate on the record
keeping. Thus it will help organization in better utilization of resources.

Every organization, whether big or small, has challenges to overcome and


managing the information of Users, Crime, Police, Police Station , complain.
Every Online Crime Reporting System has different Crime needs , therefore we
design exclusive employee management system that are adapted to your
managerial requirements. This is designed to assist in strategic planning, and
will help you ensure that your organization is equipped with the right level of
information and details for your future goals . Also for those busy executive
who are always on the go, our system come with remote access features, which
will allow you to manage your workforce anytime , at all times. These systems
will ultimately allow you to better manage resources.

1.2 SYSTEM SPECIFICATION


1.2.1 HARDWARE CONFIGURATION
Processor :
Hard Disk :
keyboard :
Monitor :
Ram :
Mouse :
Printer :

1.2.2 SOFTWARE SPECIFICATION


Front-End : php
Back-End : mysql
Operating system : Windows11

SOFTWARE FEATURES
An Overview of Front-End Tool
Php
PHP is a general-purpose scripting language geared toward web development.[7]
It was originally created by Danish-Canadian programmer Rasmus Lerdorf in
1993 and released in 1995.[8][9] The PHP reference implementation is now
produced by The PHP Group.[10] PHP was originally an abbreviation of
Personal Home Page,[11][12] but it now stands for the recursive initialism PHP:
Hypertext Preprocessor.[13]

PHP code is usually processed on a web server by a PHP interpreter


implemented as a module, a daemon or as a Common Gateway Interface (CGI)
executable. On a web server, the result of the interpreted and executed PHP
code – which may be any type of data, such as generated HTML or binary
image data – would form the whole or part of an HTTP response. Various web
template systems, web content management systems, and web frameworks exist
which can be employed to orchestrate or facilitate the generation of that
response. Additionally, PHP can be used for many programming tasks outside
the web context, such as standalone graphical applications[14] and robotic drone
control.[15] PHP code can also be directly executed from the command line.

The standard PHP interpreter, powered by the Zend Engine, is free


software released under the PHP License. PHP has been widely ported and can
be deployed on most web servers on a variety of operating systems and
platforms.

The PHP language evolved without a written formal specification or


standard until 2014, with the original implementation acting as the de facto
standard which other implementations aimed to follow. Since 2014, work has
gone on to create a formal PHP specification.[17]
The only complete PHP implementation is the original, known simply as
PHP. It is the most widely used and is powered by the Zend Engine. To
disambiguate it from other implementations, it is sometimes unofficially called
"Zend PHP". The Zend Engine compiles PHP source code on-the-fly into an
internal format that it can execute, thus it works as an interpreter.[219][220] It is also
the "reference implementation" of PHP, as PHP has no formal specification, and
so the semantics of Zend PHP define the semantics of PHP. Due to the complex
and nuanced semantics of PHP, defined by how Zend works, it is difficult for
competing implementations to offer complete compatibility.

PHP's single-request-per-script-execution model, and the fact that the Zend


Engine is an interpreter, leads to inefficiency; as a result, various products have
been developed to help improve PHP performance. In order to speed up
execution time and not have to compile the PHP source code every time the web
page is accessed, PHP scripts can also be deployed in the PHP engine's internal
format by using an opcode cache, which works by caching the compiled form of
a PHP script (opcodes) in shared memory to avoid the overhead of parsing and
compiling the code every time the script runs. An opcode cache, Zend Opcache,
is built into PHP since version 5.5.[221] Another example of a widely used
opcode cache is the Alternative PHP Cache (APC), which is available as a
PECL extension.[222]

An Overview of Back-End Tool

MySQL

MySQL is an open-source relational database management system (RDBMS).


Its name is a combination of "My", the name of co-founder Michael Widenius's
daughter My,[and "SQL", the acronym for Str ctured Query Language u. A
relational database organizes data into one or more data tables in which data
may be related to each other; these relations help structure the data. SQL is a
language programmers use to create, modify and extract data from the relational
database, as well as control user access to the database. In addition to relational
databases and SQL, an RDBMS like MySQL works with an operating system to
implement a relational database in a computer's storage system, manages users,
allows for network access and facilitates testing database integrity and creation
of backups.

MySQL has stand-alone clients that allow users to interact directly with a
MySQL database using SQL, but more often, MySQL is used with other
programs to implement applications that need relational database capability.
MySQL is a component of the LAMP web application software stack (and
others), which is an acronym for Linux, Apache, MySQL, Perl/PHP/Python.
MySQL is used by many database-driven web applications, including Drupal,
Joomla, phpBB, and WordPress. MySQL is also used by many popular
websites, including Facebook,Flickr,,,and YouTube.

Features
MySQL is offered under two different editions: the open source MySQL
Community Server[77] and the proprietary Enterprise Server.[78] MySQL
Enterprise Server is differentiated by a series of proprietary extensions which
install as server plugins, but otherwise shares the version numbering system and
is built from the same code base.
Major features as available in MySQL 5.6:
 A broad subset of ANSI SQL 99, as well as extensions
 Cross-platform support
 Stored procedures, using a procedural language that closely adheres to
SQL/PSM
 Triggers
 Cursors
 Online Data Definition Language (DDL) when using the InnoDB Storage
Engine.
 Information schema
 Performance Schema that collects and aggregates statistics about server
execution and query performance for monitoring purposes.[80]
 A set of SQL Mode options to control runtime behavior, including a strict
mode to better adhere to SQL standards.
 X/Open XA distributed transaction processing (DTP) support; two phase
commit as part of this, using the default InnoDB storage engine
 Transactions with savepoints when using the default InnoDB Storage
Engine. The NDB Cluster Storage Engine also supports transactions.
 ACID compliance when using InnoDB and NDB Cluster Storage
Engines[81]
 SSL support
 Query caching
 Sub-SELECTs

An Overview of Operating System


Windows11
After Microsoft first announced Windows 11, it released some major
Windows 11 previews, including Build 22000.51 and 22000.100, to Windows
Insiders a good look at all the new features. And today, Microsoft has finally
released the first stable build of Windows 11 to all eligible users. If you are
excited to try the next-gen Windows OS update, we have written a tutorial on
how to upgrade to Windows 11 from Windows 10. We have been testing
Windows 11 for weeks now and have come across some of the best new
Windows 11 features that you should know about. From hidden features to the
major ones, we have covered all the new features of Windows 11 in great detail
here.

Yes, you read that right. With Windows 11, you will have a much faster
Windows update process, thanks to the background installation mechanism.
Microsoft has promised that Windows updates will now be 40% smaller,
making the process even more efficient.

Features of Windows11
 Enjoy New features in Windows 11. Windows 11 includes a host of new
features that can help to boost your productivity. ...
 Windows 11 has Better performance. ...
 Windows 11 has Enhanced security. ...
 Windows 11 has Improved stability. ...
 Get a New look and feel in Windows
CHAPTER-II
2.SYSTM STUDY
Feasibility
Whenever we design a new system, normally the management will ask
for a feasibility report of the new system. The management wants to know the
technicalities and cost involved in creation of new system. - Technical
feasibility - Economic feasibility - Physical feasibility Technical feasibility:
Technical feasibility involves study to establish the technical capability of the
system being created to accomplish all requirements to the user. The system
should be capable of handling the proposed volume of data and provide users
and operating environment to increase their efficiency. For example, system
should be capable of handling the proposed volume of data and provide users.
Economic feasibility: Economic feasibility involves study to establish the cost
benefit analysis. Money spent on the system must be recorded in the form of
benefit from the system.

The benefits are of two types:


Tangible benefits: - Saving man labor to do tedious tasks saves time.
Intangible benefits: - Improves the quality of organization

Physical feasibility: It involves study to establish the time responses of


the new system being created. For e.g., if the new system takes more than one
day to prepare crucial finance statement for the management, wherever it was
required in an hour, the system fails to provide the same. It should be clearly
establish that the new system requirements in the form of time responses would
be completely met with. It may call for increase in cost. If the required cost is
sacrificed then the purpose of the new system may not be achieved even if it
was found to be technically feasible

2.1 EXISTING SYSTEM


In the existing system the exams are done only manually but in proposed
system we have to computerize the exams using this applications.
•Lack of security of data
•More man power
•Time consuming
•Consumes large volume of pare work
•Needs manual calculations
•No direct role for the higher officials

2.2 PROPOSED SYSTEM


The aim of proposed system is to develop a system of improved facilities. The
proposed system can overcome all the limitation of the existing system. The
system provides proper security and reduces the manual work.
•Security of data
•Ensure data accuracy’s
•proper control of the higher officials
•Minimum time needed for the various processing
•Greater efficiency
•Better service
•User friendliness and interactive
•Minimum time required

2.2.1 FEATURES
 Product and component based
 Creating &changing issues at ease
 Query issue list to any depth
 Reporting &charting in more comprehensive way
 User accounts to control the access and maintain security
 Simple status &resolutions
 Multi-level priorities& severities

CHAPTER-III
3.SYSTEM DESIGN AND DEVELOPMENT
3.1 FILE DESIGN
Design in the process of applying various techniques and principles for
the purpose of designing a device. A process on a system is sufficient detail to
permit its physical realization. It is a process through which requirements are
translated in representation of the software. From a project management point of
view, software design is conducted in two steps. First one preliminary design
that is concerned with the transformation of requirements into data and second
step is software architecture detail design focused on refinement to architectural
representation that lead to detailed data structure and algorithmic representation
of the software.

The detailed discussion with the user, the objectives requirements of data
involved was identified. After performing necessary details of the document,
output format and the frequency of reports are finalized with the user. After
analyzing the system flow, the file structure and logic of the programs are
arrived at and then modification is verified. Design is concerned with
identifying software component that specifying relationship among
Components. It specifies the software structure and provides the model for the
implementation phase.

1.DESIGN INPUT
Design input is typically the initial requirements that describe the medical
device to be produced.
2. DESIGN OUTPUT
Design outputs are the results of the design and engineering efforts.
These are normally the final specifications for the device. Including the
manufacturing process and the in-coming, in process and finished device
inspection. Measurement or test methods and criteria. The outputs are normally
documented in models, drawings, engineering analysis and other documents.
The output needs to be directly traceable to the input requirements. Design
verification and validation should demonstrate that the final output
specifications conform to the input requirements and meet user needs and
intended uses

3.DESIGN REVIEW
The design review is a formal review of the medical device design by
representatives of each design function participating in the design efforts as well
as other interested parties (e.g. marketing, sales, manufacturing engineering,
etc.). The design review must be documented in the DHP and include review
date, participants, design version/revision reviewed and review results.

4.DESIGN VERIFICATION
Design verification is the process that confirms that the design output
conforms to the design input. Design verification should demonstrate that the
specifications are the correct specifications for the design. Design verification
must be documented in the DHF and include the verification date, participants,
design version/revision verified, verification method and verification results.

3.2 INPUT DESIGN


Input design is the part of overall system design which requires very
careful attention. Often the collection of input data is the most expensive part of
the system, in terms of both the equipment used and the number of people
involved; it is the point of most contact for the users 14 with the computer
system; and it is prone to error. If data going into the system is incorrect, then
the processing and output will magnify this error.
In this system inputs are given in two ways, the existing users can
directly enter into the system using a login form, and new users have to register
all their details in the registration form provided. Input design is the very
important part in the project and should be concentrated well as it is prone to
error.

3.3 OUTPUT DESIGN


Output design plays a very important role in a system. Getting a correct output
is a task that has to be concentrated, as a system is validated as a correct one
only if it gives the correct output according to the input. Here in this project in
all the three days of inductions if the employee has completed all his/ her input,
then the output shows the status as completed or his status will be pending.
Outputs are the most important and direct source of information to the
customer and management. Intelligent output design will improve the system's
relationship with the user and help in decision making. Outputs are used to
make permanent hard copies of the results for later consultation. The output
generated by the system is often regarded as the criteria for evaluating the
performance of the system. The output design was based on the following
factors.

 Usefulness determining the various outputs to be printed to the system


user.
 Differentiating between the outputs to be displayed and those to be
printed.
 The format for the presentation of the output. For the proposed system,
it is necessary that the output should be compatible with the existing
manual reports.
 The output has been formatted with this consideration in mind
 The outputs are obtained after all the phases from the system can be
displayed or can be produced in the hard copy.
 The hard copy is highly preferred since it can be used by the controller
section for future reference and it can be used for maintaining the record.
 The outputs are obtained after all the phases from the system can be
displayed or can be produced in the hard copy .The hard copy is highly
preferred since it can be used by the controller section for future reference
and it can be used for maintaining the record
3.4 DATABASE DESIGN
NORMALIZATION
Normalization ensures that database structures eliminate the potential for
anomalies during the four data operations: reads, writes, updates and deletions.
Normalization is critical process for understanding potential data anomalies. A
non- normalized database is vulnerable to data anomalies if it stores data
redundancy. If data is stored in two locations, but later updated in only one of
the locations, then the data is inconsistent, this is referred to as an "updated
anomaly".
A normalized database stores non-primary key data in only one location.
Normalized database have a design that reflects the true dependencies between
tracked quantities, allowing quick updates to data with little risk of introducing
consistencies. The goal of database normalization is to ensure that every non-
key column in every table is directly dependent on the key, the whole key and
nothing but the key and with this goal come benefits in the form of reduced
redundancies, fewer anomalies, and improved efficiencies. While normalization
is not the be-all and end-all of good design, a normalized schema provides a
good starting point for further development.

FIRST NORMAL FORM


In "1NF", every attribute in a relation must be atomic, that is to say that
there can be no composite attribute in the relation data that has a single value is
inherently in first normal form. Such data can be stored in a single table with a
simple key value combination. Data that has multiple values, however, must be
stored differently.
The Normalization process involves getting our data to confirm to
progressive normal forms, and a higher level of normalization cannot be
achieved unless the previous levels have been satisfied. The first normal form
(or 1NF) requires that the values in each column of table are atomic. By atomic
we mean that there are no sets of values within a column.

SECOND NORMAL FORM


Second Normal Form (2NF) describes full functional dependency on the
primary key. It most commonly applies to tables that have composite primary
keys, where two or more attributes comprise the primary key. It requires that
there are non-trivial functional dependencies of a non key attribute on a part of a
candidate key. A table is said to be in the second normal form if and only if it is
in first normal form and every non-key attribute is irreducibly dependent on the
primary key. Thus, if all keys are singleton keys, the relation is guaranteed to be
in at last Second normal form.
The first normal form deals with atomicity of data, the second normal (or
2NF) deals with relationships between composite key columns and non-key
columns. As stated earlier, the normal forms are progressive, so to achieve
second normal form, your table must already be in first normal form. The
second normal form (or 2NF) any non-key column must depend on the entire
primary key. In the case of a composite primary key, this means that a non-key
column cannot depend on only part of composite key.

THIRD NORMAL FORM


Third Normal form (3NF) requires that the table is in second normal form
(2NF), and that there are no non-trivial functional dependencies of non-key
attributes on something other than a superset of a candidate key. A table is in
third normal form if none of the non-primary key attributes is a fact about any
other non-primary are mutually independent.
Thus, any reflection in which all the attributes are prime attributes is
guaranteed to be in at least third normal form. Third Normal Form (3NF)
requires that all columns depend directly on the primary key. Tables violate the
Third Normal Form when one column depends on another column, which in
turn depends on the primary key (a transitive dependency).
The general theme behind a database is to handle information in an
integrated manner. There is none of the artificiality that is normally embedded
in separate files or applications. A databaseis a collection of interrelated data
stored with minimum redundancy to serve many users quickly and efficiently.
The general objective is to make information access easy, quick,
inexpensive and flexible 17 for the user. In a database environment, common
data is available which several authorized users can use.
The concept behind a database is an integrated collection of data and
provides acentralized access to the data while designing database, several
objectives must be considered:
● Controlled redundancy
● Data independence
● More information at low cost
● Accuracy and integrity
● Recovery from failure
● Privacy and security
● Performance

STEPS FOR DATABASE DESIGN


● State what kind of information we need to handle to get the desired
output.
● Find out what information is needed for fields (i.e.) field type, size etc.
● Remove any data items, which is redundant.
● Tables that have a one to one relationship need a primary key field.
● Tables have one to many relationship needs to add a foreign key field
to the table to match the primary key field table.
● Tables have many to many relationships, split the table in turn and what
each record signifies.

3.5 SYSTEM DEVELOPMENT


System Development is the process of defining the architecture,
components, modules, interfaces, and data for a system to satisfy specified
requirements. There is some overlap with the disciplines of systems analysis,
systems architecture and systems engineering.
The physical design relates to the actual input and output processes of the
system. This is laid down in terms of how data is input into a system, how it is
verified/authenticated, how it is processed, and how it is displayed as output.
In Physical design, following requirements about the system are decided.
1. Input requirements
2. Output requirements
3. Storage requirements
4. Processing Requirements
5. System control and backup or recovery.
Put another way, the physical portion of systems design can generally be broken
down into three sub-tasks:
1. User Interface Design
2. Data Design
3. Process Design

User Interface Design is concerned with how users add information to the
system and with how the system presents information back to them. Data
Design is concerned with how the data is represented and stored within the
system. Finally, Process Design is concerned with how data moves through the
system, and with how and where it is validated, secured and/or transformed as it
flows into, through and out of the system. At the end of the systems design
phase, documentation.
Physical design, in this context, does not refer to the tangible physical
design of an information system. To use an analogy, a personal computer's
physical design involves input via a keyboard, processing within the CPU, and
output via a monitor, printer, etc. It would not concern the actual layout of the
tangible hardware, which for a PC would be a monitor, CPU, motherboard, hard
drive, modems, video/graphics cards, USB slots, etc. It involves a detailed
design of a user and a product database structure processor and a control
processor.

FEASIBILITY STUDY
The development of Online Crime Reporting System is done by
following the system development life cycle method and structured analysis
method. The system development deals with analysis and design of the system.
The system development lifecycle method is mainly used for the development
and implementation of the system.
 The software to be developed is aimed to satisfy the requirements of the
user.
 The project will be flexible and easily adaptable to the future changes.
Three keyconsideration involved in the feasibility analysis are
operational, technical and economical.

OPERATIONAL FEASIBILITY
Operational feasibility is looked at in view of the proposed solution
fitting with current operations. This test of feasibility asks.
 Is the system will work when it's developed and installed.
This project online crime report feedback information being developed
will certainly work as all the precautions required are taken and that it is
compatible with the requirements of the user to access the website.
 Is their sufficient support for the project from management
It is the management that has proposed to build this software in an
entirely different approach, So that it is based on graphical user interface whole
functionality of an information system and so they are extending their full
support and cooperation to the software under development
 Are current business methods acceptable to the users
As the software it is giving a lot of consideration to this software being
built with a cause and purpose to facilitate the work of an user and help him
exploit the rapidly expanding capabilities.

TECHNICAL FEASIBILITY
This test of feasibility asks technical feasibility analysis whether the
required technology and manpower is available or not.
 Is the technology needed for the proposed system available
The answer to this question is an authoritative “yes”. We are thinking to
launch the software with the help of python application for the coding of the
software, the technology is certainly available regarding this project, the
Oracle9i feature extends the functionality helping the user to make an efficient
manipulation.
 Are the guarantees of accuracy, reliability, ease of access and data
security
The project being made using PYTHON, we have features like security
manager, which puts a lot of emphasis on the security over the internet and the
intranet we have all those features of accuracy, reliability and data security.

ECONOMIC FEASIBILITY
The issues to be considered in age economic feasibility is financial
benefit must equal or exceed the costs.
 Is the solution cost-effective
The software being made should definitely yield benefits greater than the
cost of the expenditure in creating the software. This software as for its
objective is concerned will certainly yield better fruits, as it are designed for the
purpose of managing money and it is cost effective.
 Is it worthwhile to pursue the project
It is absolutely worthy to pursue the project, because the forecast done in
the earlier stages of this project had projected a profit that is promising and
apart from that it has shown that this project on being released will certainly
help the organization to achieve greater heights by gaining better reputation.

3.5.1 DESCRIPTION OF MODULES


The project entitled, “INTER COLLEGE FUNCTION MONITORING
SYSTEM” is classified into seven modules.
Reports of Online Crime Reporting System:
 It generates the report on crime, users station
 Provide filter reports on crime-report, police, complain
 You can easily export PDF for the crime, police station, police
 Application also export the report into csv format for crime, users,
complain
 You can also export the report into csv format for crime, users, complain

Modules of Online Crime Reporting System:


 Crime management modules:
used for managing the crime details.
 Complain module :
Used for managing the details of complain
 Police station module:
Used for managing the details of polic station
 Users management module:
Used for managing the information and details of the users
 Crime-report module:
Used for managing the crime-report details
 Police module:
Used for managing the police information
 Login module:
Used for managing the login details
 Usres module:
Used for managing the users of the system
CHAPTER-IV
4. SYSTEM TESTING AND IMPLEMENTATION
4.1 SYSTEM TESTING
Testing is vital to the success of the system. System testing makes logical
assumptions that test all parts of the system are correct. The goal will be
successfully achieved. There are six levels of testing are as follows:
● Unit Testing
● Integration Testing.
● Validation testing
● Output Testing
● White Box Testing.
● Black Box Testin

UNIT TESTING
In this testing, the smaller part of the project is tested first tat is modules
and the sub functions present in the project. It seems to be working satisfactorily
without the errors and that shows the unit testing is successful.
INTEGRATION TESTING
The integration testing is a part that the software makes all function
behaviors and process required. The collection of the functions are tested and
found with errors are rectified. So that the result can be easily obtained in a
successful manner.
VALIDATION TESTING
The validation part is very much essential for each and every application
projects so that each data can be validated in a good manner. In some cases the
records are created according to the key of the corresponding table to which it
has been referenced for data constraint for good secured database.

OUTPUT TESTING
The output is a major required part of the development of the project. The
output is tested for required format, if it does not acquire such format then the
testing is done or any screen 24 modification alone is done for the future
operations. The output testing is mainly for they are
● On screen format
● Print format
The screen is found to be correct as the format designed according to the
user ds for the hard copy also. The output comes out as specified by the user.
Hence output testing does not result in any correction in the system.

WHITE BOX TESTING


White box testing is a test case design method that uses the control
structure of the procedural design and derives the test case. In the method of
testing tests are made with the computer knowledge about the internal working
of the product.
BLACK BOX TESTING
Black box tests are used to demonstrate the software functions that are
optional, the inputs are properly accepted and outputs are correctly produced
and the integrity of the external information is maintained. In the black box
testing, a test case is prepared with the knowledge about the unadon that the
product is designed to perform.

4.2 SYSTEM IMPLEMENTATION


System implementation mainly concentrates on.
● Training the operating staff
● Installing hardware
● Installing terminals
In the implementation phase, the project reached its fruition. After the
development phase of the SDLC (Software Development Life Cycle) is
completed the system is implemented. The software, which was designed in
design phase and programmed in development phase of the SDLC, was installed
on the entire computers that require it. The person using the program was
trained during this phase of the SDLC. Moreover, both the hardware and
software are tested. Although end user found and fixed many problems, almost
invariably, the user's helped us to uncover problems that end user were unable
to simulate.

CHAPTER –V
5. CONCLUSION
The system is developed by keeping in mind that it should adapt to the
future requirements to a greater extent. The newly developed system is found to
be working efficiently and effectively. Computerization of the system is carried
out to overcome the problems that are faced in the local area network. The
designed system is aimed at eliminating wastage of manpower, time, space and
paper. When a transaction takes place there is no need to record it in many
places on the local area network. The reports can be taken easily. The system is
developed in such a way that distinctive modules can be used by a single source
itself.
SUGGESTIONS
● This system can be further enhanced even if the new method in the
system is implemented.
● Further the system can be enhanced to support large networks.
● Further security can be improved

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy