0% found this document useful (0 votes)
139 views164 pages

BHONE MYAT MIN 00186524 CP Assignment GA Summer 2022 1

The document proposes developing a reservation management system for Hotel Elysium using a web application. It currently uses a manual system that has issues with processing reservations efficiently. The proposed system aims to automate and streamline the reservation and booking process. It will have functions for managing rooms, bookings, and payments. A feasibility study was conducted considering technical aspects, programming languages, and databases to use. Requirements were gathered from target users and prioritized. The project will be developed in two time boxes, with the first focusing on room management and the second on booking and payment functions. Testing, deployment, training and evaluation activities are also outlined to implement the new system.

Uploaded by

Tin Yu
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
139 views164 pages

BHONE MYAT MIN 00186524 CP Assignment GA Summer 2022 1

The document proposes developing a reservation management system for Hotel Elysium using a web application. It currently uses a manual system that has issues with processing reservations efficiently. The proposed system aims to automate and streamline the reservation and booking process. It will have functions for managing rooms, bookings, and payments. A feasibility study was conducted considering technical aspects, programming languages, and databases to use. Requirements were gathered from target users and prioritized. The project will be developed in two time boxes, with the first focusing on room management and the second on booking and payment functions. Testing, deployment, training and evaluation activities are also outlined to implement the new system.

Uploaded by

Tin Yu
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 164

Reservation Management System of

Hotel Elysium using Web-Application

L5DC Sec (77-80)


Name : BHONE MYAT MIN
NCC NO : 00186524
Report Date : 30 April 2022

1 | Page
Table of Contet
1. Project Proposal ............................................................................................................... 8

1.1 Overview (200 to 400) words ........................................................................................ 8

1.2 Current Business History .............................................................................................. 8

1.3 Current Business Process ............................................................................................ 9

1.4 Current Business Issues (Manual System Issues) .......................................................10

1.5 Proposed System Scope .............................................................................................11

1.6 Aims and Objectives ....................................................................................................12

1.7 Estimate Cost and Duration .........................................................................................15

1.8 Project Plan (Gantt chart) ............................................................................................17

1. Chapter – 1 Introduction ..................................................................................................21

1.1 Background of the Current System ..............................................................................21

1.2 SWOT Analysis (Current System) ...............................................................................22

1.3 Proposed System Scope (Details Explain)...................................................................23

1.4 Aims & Objectives of the Project..................................................................................24

1.5 Short overview of the remaining chapters ....................................................................27

2. Chapter-2 Similar Product Comparison ...........................................................................29

2.1 Similar Product Introduction .........................................................................................29

2.2 Functional Comparison ................................................................................................31

2.3 Non-Functional Comparison ........................................................................................35

3. Chapter-3 Feasibility Study .............................................................................................51

3.1 Technical Feasibility ....................................................................................................51

3.1.1 Methodologies..........................................................................................................51

3.1.2 Programming Languages .........................................................................................56

3.1.3 Databases................................................................................................................60

3.2 DSDM Feasibility (DSDM eight principles) ...................................................................64

3.3 Possible LESPI (Legal, Ethical, Social and Professional) Issues .................................66

2 | Page
4.1 Target User...................................................................................................................69

4.2 Functional Requirement ................................................................................................70

4.3 MOSCOW Prioritization ................................................................................................72

4.4 Non-Functional Requirements (4) .................................................................................73

4.5 Time box Plan...............................................................................................................76

4.6 Risk Management .........................................................................................................78

4.6.1 Identification of Possible Risks (10-12) ...................................................................78

4.6.2 Risk Matrix (High-Medium-Low) .............................................................................80

4.6.3 Critical Success Factors for current project ............................................................81

5.1 Time-box 1: Manage Room Process Time-box Development .......................................85

5.1.1 Functional Requirements List .................................................................................85

5.1.2 Use Case Diagram .................................................................................................87

5.1.3 Screen Design........................................................................................................88

5.1.4 Class Diagram........................................................................................................93

5.1.6 Functional Testing ..................................................................................................95

5.1.7 Usability Testing ...................................................................................................108

5.2 Time-box 2: Manage Booking and Payment Time-box Development ..........................112

Project Plan for Time Box 2 ...........................................................................................112

5.2.1Functional Requirements List ................................................................................112

5.2.3 Screen Design......................................................................................................115

5.2.4 Class Diagram......................................................................................................122

5.2.6 Functional Testing ................................................................................................125

6.1 Deployment ................................................................................................................143

6.1.1 Deployment Diagram............................................................................................143

6.2 Data Migration ............................................................................................................144

6.2.1 Data to Migrate.....................................................................................................144

6.2.2 Plan ......................................................................................................................144

3 | Page
6.3 Training ......................................................................................................................145

6.3.1 Training plan ........................................................................................................145

6.3.2 User Manual .........................................................................................................145

7.1 Evaluation against Aim & Objectives...........................................................................147

7.2 Evaluation Against Similar System .............................................................................149

7.3 Evaluation against Justification Made .........................................................................151

7.4 Evaluation against Time Box Plan ..............................................................................152

7.5 Personal Evaluation ....................................................................................................153

7.6 Strength & Weakness of ABC POS ............................................................................153

7.7 Future Amendment .....................................................................................................153

4 | Page
Abstract
The "Hotel Elysium" is the project system for the computer project. This project has seven
tasks as well as a project proposal. The initial report for a project proposal covers the following
topics: an overview of the system, its history, present system challenges and procedures, the
newly proposed system scope, system development goals and objectives, and estimated cost
and time. The suggested system scope is contained in Task 1's introduction to the computing
project and SWOT analysis. Task 2 entails comparing functional and non-functional aspects of
similar systems. Task 3 is a feasibility study that includes explanations, comparisons, and
suggestions for methodology, programming languages, and databases. The fourth task is to
lay the groundwork with the target users, including a table, functional and non-functional
needs, and MOSCOW. Prioritizations, timeframe planning, risk management, and important
success aspects round out the list. Exploration and engineering of the system development
are included in Task 5, as is the creation of time-boxes. Task 6 deals with the system's
implementation, as well as data migration and training preparations. Job 7 is the project's final
task, and it involves the project's conclusion and evaluation, as well as an assessment of the
system's development and future operations.

5 | Page
Acknowledgement
I'd want to express my gratitude to everyone who helped make this endeavor a success. We
had learned a great deal of information as a result of our actions. PHP programming language
and PHPMyAdmin server are used in website development. All credit for this effort goes to all
of the instructors and supervisors who assisted. The scores were good because to the
teacher's outstanding teaching and patience. In all respect and gratitude, I am overcome to
express my gratitude to all those who have assisted me in putting these concepts, much
above the level of simplicity, into something concrete.

6 | Page
Project Proposal

7 | Page
1. Project Proposal

1.1 Overview (200 to 400) words


The availability of bandwidth and developments in mobile technology have made it easier
to find a hotel and book using an online reservation system. To obtain a competitive
advantage over their competitors and stay on top of developing trends, a good reservation
system must use the most up-to-date technology. The most crucial aspect of any hotel system
is reservations. This procedure must be efficient in order to meet the hotel's business
objectives. The rooms are the most significant component of the reservation process; booking
rooms in a hotel should be dynamic, and the entire process should be carried out efficiently to
optimize hotel earnings.

The Hotel Reservation System includes all of the dynamic, versatile features needed to
run a hotel, as well as operational integration between reservations, guest history, reception,
Sales Ledger, Accounting, and Reporting modules. It is the ideal fit for managing resources in
a simple yet effective manner with least work or time in order to enhance income. A hotel
booking system is intended to assist in the management of reservations and the analysis of
marketing and financial performance using the information acquired in reports. Hotel
reservation software is a comprehensive software package that includes integrated modules
for managing numerous areas of a hotel. Hotel Elysium is an online platform that allows users
to book a hotel room of their choice.

1.2 Current Business History


Hotel Elysium is centrally located in the posh Mayfair area, on the upscale Park Lane,
steps away from Hyde Park and Green Park. In addition, this 5-star hotel is within walking
distance to attractions such as Buckingham Palace, Harrods, and the Royal Albert Hall.
The 453 rooms of the Hotel Elysium are spread out across 28 floors. Each room has
high-speed internet access, a plasma television with a large selection of on-demand
programming, a luxurious marble bathroom, and spectacular views over London. On floors 5-
17, you'll find standard and deluxe rooms. On floors 18-26, the Executive Rooms are
improved with access to the Executive Lounge and complementary continental breakfasts.
The Top Floor Suites are larger, with features like walk-in closets and separate living rooms.
A well-equipped fitness center is available on-site at the Hotel Elysium, where guests can
get a good exercise. Purity Spa provides a luxurious and pampering experience. Hot Stone
and Sports massages are available in 30- or 55-minute sessions. Manicures, pedicures,
facials, and tanning are just a few of the beauty services available. Dining at the Hotel Elysium

8 | Page
is a really unique experience, with a wide menu of delectable cuisine and delectable
beverages.

1.3 Current Business Process

1.3.1 Payment security (Advance)


This procedure should be followed for the sake of security. Accepting a cash deposit or a
credit card is the most common method. Cash and checks are accepted as deposits. When it
comes to credit cards, check the credit limit and availability first, then get the card's imprint
and a guest signature.

1.3.2 Allocation of rooms


Prepare a key card for the associated room number by filling in the arrival and departure
dates, as well as the room price, and then hand it over to the visitor for signing. The room key
is then provided to one of the guests.

1.3.3 Registration of visitors


Verify the registration information against the reservation, verifying that the name, date,
and payment mechanism are correct, and do a final check of the registration card for guest
signature. Then, depending on availability, discuss room preferences with guests or choose
an available room that is ready to be assigned.

1.3.4 Completing the check-in procedures


After the visitor is assigned to a room, the arrival notification slip is used to notify other
departments and sections of the guest's arrival.

1.3.5 Service of Information


The receptionist is in charge of telling guests about the hotel's amenities and services.
The receptionist should inform the client about the hotel's activities, facilities, and services, as
well as their location.

9 | Page
1.4 Current Business Issues (Manual System Issues)

1.4.1 Manual Business Issues


The most significant disadvantage of manual document filing is the amount of space it
consumes. This can result in essential folders being misplaced. Physical damages, such as a
fire danger, eavesdropping, theft, and so on, can also cause harm.
Due to handwritten documentation, it will be difficult to make modifications if a mistake arises.
The amount of time it takes to access this is also one of the most significant difficulties in
manual issues. It also has a security flaw. It was also more expensive than computerized
systems. In the manual documentation, there are additional susceptible elements. These are
duplicated data, which is time consuming and wasteful of resources. Because there will be no
repeat check like with a computer, there will be duplication.

1.4.2 Time is running out


Manually filling out documents takes a long time. Not only will the employees have to
arrange and store the data, but they will also have to find the information when it is needed.
Clients and staff may be irritated, and their performance may be harmed as a result of having
to spend too much time dealing with a paper filling method.

1.4.3 System for keeping track of information


The present business process's first problem is its record-keeping system. The current
procedure uses cash counters to record visitor payments and memberships, thus there are no
records of visitors once they have paid their costs. The records can be computerized by the
personnel, but the system may be harmed.

10 | Page
1.5 Proposed System Scope

A central reservation system (CRS) is required for all hotels to manage all bookings in
one location. Whether the business is small or big, all internal teams and departments must
find a method to work together to provide the best possible experience for their visitors, which
may make manual data organizing activities time-consuming and inefficient.
(As an example-http://www.booking.com)

1.5.1 Acceptance of Reservations


Based on the availability of rooms, a reservation might be approved, rejected, or
turned away. An acceptance would send the receptionist to the confirmation phase, but a
rejection or turn away would send the receptionist to a list of alternative possibilities, such as
noting the reason for the turn away.
1.5.2 Computerized Documenting System
The documentation process is a key part of the new system, and it has been
automated. This technology provides a higher level of security. It reduces down on the time it
takes to complete the manual procedure, as well as data duplication and redundancy. It also
improves accuracy and reduces mistakes. It might also provide real-time data.
1.5.3 Communication between hotel and guest
A hotel can find out about a guest's request for available space in a variety of methods.
The hotel may be contacted via phone, email, web, and social media for possible guests.
Reservation requests are also received by the hotel via the sites mentioned above.

1.5.4 Pre-arrival and modification


Many adjustments to the reservation record can be made prior to the guest's arrival once
the reservation has been approved and verified. Changes in arrival and departure dates, the
number of rooms needed, adding pickup information, and outright cancellations are all regular
pre-arrival activity. To keep the reservation-related data up to current, the reservation record
must be fetched and changed according to the guest's request whenever a modification in the
reservation is necessary.

11 | Page
1.6 Aims and Objectives
1.6.1 Aims

The suggested system's major purpose is to put hotel reservation systems' processes
online. The goal of this system is to give customers looking for hotel rooms with reliable
information about available accommodations and to allow room bookings to be made without
mistakes or disputes.

The other is always open for bookings, meaning that the reception is open 24/7 a
week. In other words, clients may make a reservation anytime it is convenient for them,
without the need for workers to be there.

1.6.2 Objectives

Research and analysis (Total: 17days)

1) Research and analysis of current business system (8days)

● Research and analysis of the current business history and background (2days)
● Research and analysis of the current business processes (2days)
● Research and analysis of the current business issues (2days)
● Investigation about the current business issues (1day)
● SWOT analysis of the current system (1day)

2) Research and analysis of proposed system (4days)

● Research and analysis of the proposed system scope (2days)


● Research and analysis of the business processes of proposed system (2days)

3) Calculate the cost and timeframe (2days)

● Calculate the hardware, software, and development costs, as well as the total cost
of the proposed system (1day)
● Calculate the duration of the project plan (1day)

4) Comparison of related products (1day)

● Comparison of Functional and Non-Functional (1day)

5) Feasibility (2 days)

● Research about the most suitable methodology for system (1 day)


● Research and analysis of the suitable programming language and database
(1day)

12 | Page
Analysis Deliverable: Report on existing business processes, requirements, and difficulties,
as well as functional and non-functional reports for similar systems. Also included is the
feasibility study report.

Design (Total: 20days)


1. Analysis the business requirement (8days)

● Produce the business requirement (2days)


● Produce the functional requirement by using MoSCow Prioritization (2days)
● Produce the non-functional requirements (2days)
● Produce the time-box plans (2days)

2. Manage functional and non-functional requirement (5days)

● Manage registration process


● Manage usability and security
● Manage interface and operational
● Manage performance
● Manage safety and recovery
● Manage Resources
● Manage portability, reliability and maintainability

3. Time-box plan for functional requirements (2days)


● Time-box for room booking process
● Time-box for booking payment process

4. Review the project conformance (5days)


● Time management
● Quality management
● Cost management
● Issue management
● Procurement management
● Acceptance management

Design Deliverable: The report of business needs, time-box plan, risk matrix plan, functional
and non-functional requirements, and use case diagrams for the whole project, as well as the
structure diagram and sequence diagram, are all design deliverables.

13 | Page
Testing (Total: 70days)
1. Usability Testing (8days)
● System status visibility
● System and real-world compatibility
● Error reduction
● Minimalist and attractive design
● Consistency and regularity
● User friendly

2. Functional Testing for user interface (8days)


● check-in/out time form
● room detail and pricing form
● reservation conformation form
● accommodation payment form

3. Database and web-based creation (54days)

Testing Deliverable: The databases produced using SQL, the time-box plan for functional
and non-functional needs, and the construction of screen designs with design tools are all
examples of implementation deliverables. User friendliness, match with real-world system,
simple design, consistency, mistake prevention, and so on are some of the testing
deliverables.

Evaluation (Total: 21days)

1. Evaluation against aim and objectives (3days)

2. Evaluation against similar system (3days)

3. Evaluation (the whole project) (10days)

4. Evaluation against time-box plan (booking, payment, reservation) (5days)

Evaluation Deliverable: Whole project assessment, which improves the project, aims and
objectives evaluation, comparable system evaluation, and justification mode evaluation are
among the evaluation outputs.

14 | Page
1.7 Estimate Cost and Duration
1.7.1 Hardware Cost

No Item Description Unit Price Quantity Sub-Total


(MMK)
-MOTHERBOARD (MSI MAG B460M
MORTAR WIFI BOARD)
-RAM (XPG LANCER DDR5 RGB
Desktop 2,441,940 12,209,700
1 5200MHz 32GB (2X16GB) 5
Computer MMK MMK
-GPU (ASUS DUAL GeForce GTX
1650 Ti)
-CPU (AMD RYZEN 5 5600X)
-CYBER POWER UT650EG 348,780 1,743,900
2 UPS 5
MMK MMK
-MAXIFY GX7021 WIRELESS
1,498,000 2,996,000
3 Printer MEGA TANK SMALL OFFICE ALL- 2
MMK MMK
IN-ONE
-TP LINK AX6600 WIFI 6 ROUTER
Wi-Fi 452,120 1,356,360
4 (ARCHER AX90) TRI BAND 8 3
Router MMK MMK
STREAM GIGABIT ROUTER
-HPE ProLiant ML350 Gen10 Tower
Server with one Intel Xeon Silver
5,798,000 5,798,000
5 Server 4210R Processor, 16 GB Memory, 1
MMK MMK
Eight Small Form Factor Drive Bays,
and one 800W Power Supply
- ZYXEL USG Flex 500 (USG110 1,506,000 1,506,000
6 Firewall 1
v2), UTM Firewall Hardware MMK MMK
25,609,960
Total Hardware Cost
MMK

1.7.2 Software Cost

No Item Description Unit Price Quantity Sub-Total


Operating System -WINDOW 10 PRO 398,000 1,990,000
1 5
(OS) MMK MMK
-Microsoft Office Home &
499,980 2,499,900
2 Office Software Business 2021 | One-time 5
MMK MMK
purchase for 1 PC
-McAfee Total Protection
2022 Antivirus Internet
Security Software VPN,
199,980
Password Manager & Dark 199,980
3 Anti-virus MMK 1
Web Monitoring MMK
IncludedPC/Mac/Android/iOS
-5 devices
-1year subscription
4,689,880
Total Software Cost
MMK

15 | Page
1.7.3 Development Cost

No Item Description Unit Price Quantity Sub-Total


-PHP
Web 5,000,000 5,000,000
1 -mySQL -
Development MMK MMK
“.com” 19,980
19,980
2 Domain MMK per 1 -
MMK
Year
-CPU 8 CORES 2.8 GHz
PROCESSOR 98,000
98,000
3 Web Hosting -BANDWIDTH 50GB 51200MB MMK per -
MMK
-RAM 12GB+ DDR3 Year
-PREMIUM PACKAGE
5,117,980
Total Development Cost
MMK

1.7.4 Summary Cost

Category Cost
Software 4,689,880 MMK
Hardware 25,609,960 MMK
Development 5,117,980 MMK
Total 35,417,820 MKK

16 | Page
1.8 Project Plan (Gantt chart)

Fig (1) Project Proposal

Fig (2) Chapter 1 - Introduction

Fig (3) Chapter 2 – Similar Product Comparison

17 | Page
Fig (4) Chapter 3 – Feasibility study

Fig (5) Chapter 4 – Foundations

Fig (6) Chapter 5 – Exploration and Engineering

18 | Page
Fig (7) Chapter 6 – Deployment

Fig (8) Chapter 7 – Conclusion and Evaluation

19 | Page
Chapter-1
Introduction

20 | Page
1. Chapter – 1 Introduction

1.1 Background of the Current System

The Hotel Elysium is a luxury hotel in London's premium Mayfair area, located on Park Lane
and facing Hyde Park. It is 100 meters (328 feet) tall, with 28 stories and 453 rooms, including
56 suites, as well as a Michelin-starred restaurant on the top floor, Galvin at Windows. On
October 28, 1986, the Hotel Elysium officially opened its doors. Designed by William Jone, an
American architect who has worked on multiple Hilton hotels, the building is a concrete-
framed structure. A skyscraper hotel with more than 500 rooms was erected in London for the
first time in the city's history. The Pools Panel met every Saturday in a hotel conference room
starting in 1989. Hotel fire broke out on February 19, 2012. There were no deaths or injuries,
and just a few stories of the building sustained minor damage in the fire. This hotel hosted
members of the International Olympic Committee and other high-ranking officials who
attended the 2012 Summer Olympics in London. The current system processes are room
category display, design and facility displays, employee record keeping system process,
visitor registration and booking system. The current system has some issue. That are time
running out issue, record keeping system, lack of security, higher cost issue and information
changes issue.

21 | Page
1.2 SWOT Analysis (Current System)
Strengths

It is more trustworthy since it is a traditional mode of payment. People continue to trust and
utilize bank checks and drafts for payment. Payments made offline are direct and do not
depend on any other source. It's also simple to pay for, book, and rent a room. Many
visitors find it difficult to make payments online. The visitor may ask all of the detailed
questions at once and get immediate responses.

Weaknesses

The biggest weakness is lack of security in this project. Using paper document can be less
secure than computerize system. Visitor or customer wants to secure their information in
hotel’s hands. A file is much more accessible than a computer, which needs a password and
permissions to access.

Opportunities

Visitors/Customers' trust and convenience are improving as a result of the existing system. As
a result, the system will have a considerably larger number of branches in other cities. The
system must be capable of processing credit cards, debit cards, and other types of
transactions. There are many more chances available if expectations are raised and turned
into reality.

Threats

It's possible that prospective competitors may grow over time. If the system is not upgraded or
improved sufficiently to prevent the assaults, there will be further dangers. Even a little
influence may have a negative impact on the user's convenience, causing users to lose faith
in the system and refuse to pay the price. By continuing the threats, this degree of
seriousness may be decreased to non-serious. Daniel of services to the booking servers
presents a severe and risky danger, resulting in the loss of contactless payment users, identity
theft for client data, and income loss. As a result, such dangers must be dealt with in order to
lessen the possibility.

22 | Page
1.3 Proposed System Scope (Details Explain)
The suggested system allows customers to book rooms through the internet using a web-
based application. They will be able to see information about the lodgings, activities, and a
short history of the hotel, as well as book rooms online. The new technology will first
determine if the reservation is for a personal or professional trip, after which the normal
booking procedure will begin. A visitor or a group of guests may look at the room details and
hotel facilities before booking the room of their choice. The staff will evaluate the booking
request and see whether the selected accommodation is available throughout the booking
process. If it is, the reservation has been confirmed. The attendees will get a confirmation
email as part of the confirmation process. Customers may check the most up-to-date housing
fees and services using the suggested system. This new system also accepts a variety of
payment methods, allowing users to pay fees using cash, credit, or other payment cards.
Customers will save time and effort since they will be able to visit the hotel at any time and
from anywhere. The hotelier and the visitors will be more productive as a result of this
suggested system, and the hotel will face fewer dangers and expenses. This computerized
method is safe and secure, and the odds of mistakes such as cost miscalculation are quite
unlikely. Hotel Elysium may easily advertises their company via different social media
platforms, launch campaigns, offer packages and add-ons online, and so develop stronger
marketing plans, thanks to this technology, which is a big advantage of an online hotel
reservation system.

23 | Page
1.4 Aims & Objectives of the Project
The suggested system's major purpose is to put hotel reservation systems' processes
online. The goal of this system is to give customers looking for hotel rooms with reliable
information about available accommodations and to allow room bookings to be made without
mistakes or disputes.

The other is always open for bookings, meaning that the reception is open 24/7 a
week. In other words, clients may make a reservation anytime it is convenient for them,
without the need for workers to be there.

Objectives

Research and analysis (Total: 17days)

Research and analysis of current business system (8days)

● Research and analysis of the current business history and background (2days)
● Research and analysis of the current business processes (2days)
● Research and analysis of the current business issues (2days)
● Investigation about the current business issues (1day)
● SWOT analysis of the current system (1day)

Research and analysis of proposed system (4days)

● Research and analysis of the proposed system scope (2days)


● Research and analysis of the business processes of proposed system (2days)

Calculate the cost and timeframe (2days)

● Calculate the hardware, software, and development costs, as well as the total cost
of the proposed system (1day)
● Calculate the duration of the project plan (1day)

Comparison of related products (1day)

● Comparison of Functional and Non-Functional (1day)

Feasibility (2 days)

● Research about the most suitable methodology for system (1 day)


● Research and analysis of the suitable programming language and database
(1day)

Design (Total: 20days)

24 | Page
Analysis the business requirement (8days)

● Produce the business requirement (2days)


● Produce the functional requirement by using MoSCow Prioritization (2days)
● Produce the non-functional requirements (2days)
● Produce the time-box plans (2days)

Manage functional and non-functional requirement (5days)

● Manage registration process


● Manage usability and security
● Manage interface and operational
● Manage performance
● Manage safety and recovery
● Manage Resources
● Manage portability, reliability and maintainability

Time-box plan for functional requirements (2days)


● Time-box for room booking process
● Time-box for booking payment process

Review the project conformance (5days)


● Time management
● Quality management
● Cost management
● Issue management
● Procurement management
● Acceptance management

Testing (Total: 70days)


Usability Testing (8days)
● System status visibility
● System and real-world compatibility
● Error reduction
● Minimalist and attractive design
● Consistency and regularity
● User friendly

Functional Testing for user interface (8days)


● check-in/out time form
● room detail and pricing form
● reservation conformation form
● accommodation payment form

Database and web-based creation (54days)

Evaluation (Total: 21days)

25 | Page
Evaluation against aim and objectives (3days)

Evaluation against similar system (3days)

Evaluation (the whole project) (10days)

Evaluation against time-box plan (booking, payment, reservation) (5days)

26 | Page
1.5 Short overview of the remaining chapters
A summary of the next chapters is provided below; they are as follows: Chapter (2) is
concerned with the comparison of similar products, as well as the introductions and functions
of the products. A feasibility study is discussed in Chapter 3, which includes specifics on the
methodology, programming languages, and databases that will be utilized in the
implementation, as well as other pertinent information. Chapter 4 titled "Foundations"
discusses the types of users, functional and non-functional needs of the database, MOSCOW
prioritization, a time-box strategy, as well as risk management for the whole system, among
other things. Exploration and Engineering are covered in Chapter 5, and here is where the
design of the web-based application is put to the test. The deployment chapter, which includes
data migration and a deployment diagram, is covered in detail in Chapter 6. Chapter 7 is
concerned with the assessment of the results in relation to the goals set out in the preceding
chapters.

27 | Page
Chapter-2
Similar Product Comparison
(Investigation)

28 | Page
2. Chapter-2 Similar Product Comparison

2.1 Similar Product Introduction

chatrium.com

Chatrium Hotel Royal Lake Yangon is located in Kandawgyi Lake Area, a neighborhood in
Yangon, and is in the business district and on a lake. Karaweik Palace and Chaukhtatgyi
Pagoda are notable landmarks, and the area's natural beauty can be seen at Kandawgyi
Lake. Don't miss out on a visit to Yangon Zoological Gardens.

A body treatment, a facial, and a body scrub may all be enjoyed at Nemita Spa, which is
conveniently located on the facilities. Make a point of dining at one of the three on-site
restaurants, which serve Japanese cuisine and provide beautiful garden views. There are
yoga sessions available in the gym, and the resort also has a patio, on-site shopping, and a
coffee shop/café. In addition to a garden and a hair salon, visitors may take use of
complimentary WiFi in their rooms. Comforts like as 24-hour room service and pillow menus,
as well as conveniences such as laptop-friendly workplaces and air conditioning, are available
in each of the 300 tastefully equipped rooms. The comfy and large rooms at the resort have
received overwhelmingly positive feedback from guests.

Fig (1.1) Chatrium Hotel Royal Lake Yangon home page design

29 | Page
panpacific.com

Located in Yangon Downtown neighborhood, Pan Pacific Yangon is connected to a shopping


center. Junction City and Bogyoke Market are worth checking out if shopping is on the
agenda, while those wishing to experience the area's natural beauty can explore Kandawgyi
Lake and Inya Lake. See what's going on at Bogyoke Aung San Stadium, or consider a night
out at Myanmar Event Park. Guests love the hotel's central location.

Take use of the on-site spa's reflexology services as well as body treatments and massages
such as Thai massages. Make a reservation at one of the three on-site restaurants, which
provide international cuisine as well as breakfast on weekends. All guests have access to free
WiFi in their rooms, as well as a coffee shop/café and a garden at the property. Comforts like
as 24-hour room service and luxury linen are provided in all 336 rooms, as well as thoughtful
details such as pillow menus and laptop-compatible safes. The property's nice
accommodations have received overwhelmingly good feedback from guests.

Fig (1.2) Pan Pacific Yangon home page design

30 | Page
2.2 Functional Comparison
(1) Guest Registration

chatrium.com

Fig (1.1) Guest Signup Form from Chatrium Hotel

User or Guest registration system of Chatrium Hotel is clean and simple. There are two
options sign up and sign in for this registration form. In registration process guest can register
with google account, Email, face-book account and their registration method (Join now). And
then sign in with registered account or method. This user interface is very simple and esay-to-
understand.

31 | Page
panpacific.com

Fig (1.2) Guest Signup Form from Pan Pacific Yangon Hotel

This form design is more simple and clean than the Chatrium Hotel form design. If the visitors
do not already have a registered account with which to login (sign in), they may create one by
clicking on the register button on this page.

32 | Page
(2) Room Type and Room Detail

chatrium.com

Fig (1.3) Room type and Detail Form of Chatrium Hotel

Wake up to the wondrous vistas of Kandawgyi Lake and the iconic Shwedagon Pagoda,
mesmerising sights that can be enjoyed from the private balcony of your room at our hotel in
Yangon.

These luxurious living spaces combine stylish elegance with a diverse range of contemporary
conveniences; some of the special highlights include complimentary high-speed Wi-Fi
internet, the latest in-room entertainment and even a pillow menu to ensure blissful dreams
each night.

33 | Page
panpacific.com

Fig (1.4) Room type and Detail Form of Pan Pacific Hotel

Pan Pacific Hotel's rooms and suites offer modern accommodation with stunning views of
Yangon’s skyline and Shwedagon Pagoda. Featuring floor-to-ceiling windows, well-appointed
furnishings and premium amenities, a luxurious stay awaits at 5-star hotel in Yangon.

34 | Page
2.3 Non-Functional Comparison
● 10 Usability Heuristics

1. Visibility of System Status

The system should constantly keep users up to date on what is going on and provide detailed,
suitable feedback in a timely manner. The user has no means of knowing what's going on
behind the scenes without sufficient feedback. For example, if a user is browsing a web
application and does not identify the page they are on or is not getting a response from the
system, they won't know whether to wait, repeat the operation, or try something else.

chatrium.com

Chatrium Hotel shows its users which page they are seeing at the moment

Fig (1.1) Chatrium Hotel

35 | Page
panpacific.com

In Pan Pacific Hotel, there is no


visibility status to show where the
user is at the moment

Fig (1.2) Pan Pacific Hotel

36 | Page
0. Match between system and the real world

When making the design, it should include words that are friendly to the people who are
going to use it. Use words, phrases, and concepts that the person who is using the app
will understand not internal jargon. People in the real world do things in a certain way, so
they put information in a natural and logical way.

chatrium.com
This is the text in chatrium.com for
user help information. The service
is clear and realistic and gives
users comfort.

Fig (1.3) Chatrium Hotel


This is the text in panpacific.com
for user help information. The
service is clear and realistic and
panpacific.com gives users comfort.

Fig (1.4) Pan Pacific Hotel

37 | Page
0. User control and freedom

Users often want to see clearly throughout the page they are currently viewing and they don’t
want any other popups appearing on it.

chatrium.com
This is the pop-up ads on chatrium.com to tell
about the event for the visitors. It always
appears when user opens their web-site.

Fig (1.5) Chatrium Hotel


This is the pop-up ads on panpacific.com to tell
about the discount for the visitors. It always
appears when user opens their web-site.
panpacific.com

Fig (1.6) Pan Pacific Hotel

38 | Page
0. Consistency and standards

No one should wonder if two words or actions mean the same thing. Traditions and rules in
your field should be followed.

chatrium.com

Most hotel websites have standards which


are the booking and language icons are
always on the top of the page.

Fig (1.7) Chatrium Hotel

panpacific.com

Most hotel websites have standards which


are the booking and language icons are
always on the top right of the page.

Fig (1.8) Pan Pacific Hotel

39 | Page
0. Error prevention

While effective error messages are critical, the greatest designs meticulously avoid issues in
the first place. Either shows the problem in the message box, or check for them and prompt
users for confirmation before committing to the action.

chatrium.com

Chatrium Hotel lets us know that about the room discount within event.

Fig (1.9) Chatrium.com

40 | Page
panpacific.com

Pan Pacific Hotel always reminds the visitor to


fill the booking detail for booking.

Fig (2.1) Pan Pacific Hotel

41 | Page
0. Recognition rather than recall

Make objects, actions, and choices visible to reduce the user's memory load. The user should
not have to recall information from one conversation segment to the next. When possible,
instructions for using the system should be visible or readily accessible.

chatrium.com

Fig (2.2) Chatrium Hotel

Chatrium showing different navigation options all over the screen for hotel related events and
information.

Fig (2.3) Chatrium Hotel

42 | Page
panpacific.com

Fig (2.4) Pan Pacific Hotel

Fig (2.5) Pan Pacific Hotel

Pan Pacific showing different navigation options all over the top of the screen for room related
information.

43 | Page
0. Flexibility and efficiency of use

Shortcuts that are concealed from newbies may speed up interaction for experts, allowing the
design to appeal to both rookie and experienced users. Allow users to customize their routine
tasks.

chatrium.com

Show the different room types and room


details to the visitors

Fig (2.6) Chatrium Hotel

panpacific.com
Show the different room types and room
details to the visitors

Fig (2.7) Pan Pacific Hotel

44 | Page
0. Aesthetic and minimalist design

Information that is irrelevant or only sometimes required should not be included in dialogues.
In a discourse, each additional unit of information competes with the relevant pieces of
information, lowering their relative exposure.

chatrium.com

With important information and relative exposure, this is an attractive and basic design.

Fig (2.8) Chatrium Hotel

panpacific.com

With important information and relative exposure, this is an attractive and basic design.

Fig (2.9) Pan Pacific Hotel

45 | Page
0. Help users recognize, diagnose and recover from errors

Error messages should be expressed in plain language (no error codes), precisely indicate the
problem, and constructively suggest a solution.

chatrium.com

An error text box to assure the error


is recoverable and to avoid user with
the error message

Fig (3.1) Chatrium Hotel

46 | Page
panpacific.com

Pan Pacific Hotel uses an error text that states there are no available check-in/check-out
dates, ensuring that the issue is recoverable, and user-friendly verbiage to reduce user panic.

Fig (3.2) Pan Pacific Hotel

47 | Page
0. Help and documentation

Even though it is preferable if the system can be utilized without documentation, assistance
and documentation may be required. Any such material should be simple to find, concentrate
on the user's job, have a list of specific actions to follow, and not be too big.

chatrium.com

Chatrium Hotel has given the users a description page about them to get the help on the user
queries which is very well presented and organized.

Fig (3.3) melia.com

48 | Page
panpacific.com

Pan Pacific Hotel has given the users a description page about them to get the help on the
user queries which is very well presented and organized.

Fig (3.4) Pan Pacific Hotel

49 | Page
Chapter-3
Feasibility Study

50 | Page
3. Chapter-3 Feasibility Study

3.1 Technical Feasibility


A technical feasibility study is a great tool for troubleshooting as well as long-term planning. It
may be used as a flowchart to show how goods and services develop and travel through the
company to reach the market physically. Technical feasibility assesses the expert system's
technical difficulty and typically entails analyzing whether the expert system can be
implemented using cutting-edge methodologies and tools. In the case of expert systems,
defining the shell in which the system will be created is a key part of technological feasibility.
The shell used to create an expert system may have a significant impact on its quality, making
it essential to the system's success. Although the desired properties of an expert system shell
may vary depending on the task and domain requirements, the shell must be flexible enough
to successfully include expert reasoning. It also has to be simple to interface with current
computer systems. In addition, a shell with a user-friendly design encourages users to utilize
the system more often. (osarome, n.d.)

3.1.1 Methodologies

A. Definition
DSDM (Agile)
The Dynamic Systems Development Method (DSDM) is an agile methodology that covers the
whole project lifecycle and its business implications. DSDM is an iterative method to software
development, similar to the larger agile mindset, and its framework specifically specifies that
"each project must be linked to clearly defined strategic objectives and concentrate on early
delivery of actual benefits to the company." Feasibility and business research, functional
model and prototype iteration, design and build iteration, and implementation are the four
pillars of the framework. DSDM is an eight-principle framework with a lifecycle and products,
roles and responsibilities, and best practice practices. It's also a well-organized, common-
sense method for swiftly and effectively providing business solutions.

DSDM is a vendor-agnostic method that focuses on assisting individuals in collaborating more


effectively to accomplish business objectives. It may be utilized for every project in any
industry and in any technological environment. If an organization's top priorities include rapid
development, on-time and on-budget delivery, and reducing bureaucracy and boosting
communication among cross-functional teams, DSDM may be an agile framework worth
investigating. (Peek, n.d.)

51 | Page
Scrum
Scrum is an agile project management method that is often used in software development.
Scrum is generally thought of as a technique for agile software development, but instead of
thinking of it as a methodology, think of it as a framework for managing a process. Scrum's
basic knowledge includes the framework, values, various roles, meetings, backlogs, and
increasing efficiency and quality.

● Scrum teams are supported by two distinct responsibilities in agile development. The
first is a Scrum-Master, who acts as a team coach, guiding team members through the
Scrum process so they may perform at their best. The other position in Scrum software
development is the product owner (PO), who represents the company, customers, or
users and steers the team toward producing the correct product. (Peek, n.d.)

B. Strength and Weakness of each Methodology

Strength of DSDM
● Invites stakeholders to participate in the development process.
● Business value is recognized and anticipated to be the highest priority delivery, since it
is designed from the ground up by business people.
● Provides a method that is not reliant on any one approach
● Business value is recognized and anticipated to be the highest priority delivery, since it
is designed from the ground up by business people.
● Sets the expectation among stakeholders from the beginning of the project that not all
needs will be included in the final output. (CheckyKey, n.d.)

Weakness of DSDM
● Requires complete dedication to the DSDM process, extensive user participation, and
a highly experienced development team in both the business and technical sectors.
● Defines a number of artifacts and work deliverables for each project phase
● A consortium controls access to the content, and fees may be levied solely to access
the reference material.
● Requires a well-rounded development team with expertise in both business and
technology.

52 | Page
● A consortium controls access to the content, and fees may be levied solely to access
the reference material.
● Requires a highly experienced development team with expertise in both business and
technology. (CheckyKey, n.d.)

Strength of Scrum
● According to Scrum Alliance, reviewing each sprint before going on enables teams to
modify the scope or direction of the project at any time.
● The project criteria are not specified, but the timeline and budget are.
● As a result of the product owner's engagement in the project management process,
stakeholders and participants expect improvements.
● Scrum makes it simple to fix errors.
● Easy visibility of all phases of the process.
● Scrum guarantees greatest outcomes by including customers. (simpliaxis, n.d.)

Weakness of Scrum

● A project with no clear description is difficult for the Scrum master to plan, manage,
and organize.

● Scrum's constraints also include the fact that daily Scrum meetings and regular
reviews need a significant amount of time and effort.

● This technique necessitates the scrum master's faith in their team. Strict governance
may result in the project's failure.
● There is no predetermined time limit or cost valuations, which allows it to be expanded
to many sprints. (simpliaxis, n.d.)

C. Comparison of Methodology
Criteria DSDM Scrum

53 | Page
Project Scope The application scope Product vision, the release goal, and
encompasses the whole project the sprint goal
lifespan and development process.
User User emphasized more on the In Scrum, customers or end users
active user involvement during the are stakeholders of the product
project life cycle under developed.
Team Two teams, one group takes the The Scrum Teams are self-
responsibility to run the tests whilst organizing and cross-functional: Self-
the rest group is to deliver organizing teams choose how best
to accomplish their work, rather than
being directed by others outside
the team.
Features Users are significantly engaged in Scrum focuses on providing the
the development process of DSDM customer with high business value in
projects, which are concerned with the shortest amount of time feasible.
finishing on time and on budget. As
a result, it is necessary to keep a
watch on what consumers need the
most.

D. Recommendation for Methodology


For this project, DSDM is an outstanding option and suggested approach. Of course, DSDM
and Scrum have user interaction and frequent revision in common. In bigger and more
complicated systems, DSDM's winning advantages include its business fitness emphasis and
the reversibility requirement, which is a rather expensive feature that pays for itself by
reducing the detrimental impacts of unavoidable implementation failures and user
backtracking. Furthermore, several Scrum elements, such as pair programming, are made
obsolete by the DSDM testing methodology, which achieves the same result.

Feasibility, Foundations, Evolutionary Development, and Deployment are the four primary
steps of the DSDM process. These stages make up the lifetime of our projects, ensuring that
we don't go on to the next step unless we've achieved the desired results. Frequently, teams

54 | Page
rush into development without completely comprehending the scale and magnitude of
projects, thoroughly analyzing the risks, and, when feasible, performing the appropriate
feasibility measures to guarantee the unknowns are correctly comprehended.(Boog, n.d.)

55 | Page
3.1.2 Programming Languages

A. Definition
PHP
PHP is a free scripting language and interpreter that is widely used on Linux Web servers.
PHP (Hypertext Preprocessor), which is evolved from Personal Home Page Tools, is a widely
used open-source general-purpose scripting language that is particularly well-suited for most
well-known operating systems such as Linux, Unix, Solaris, Microsoft Windows, MAC OS, and
many more. It also works with a wide range of web servers, including Apache and IIS. Web
developers who use PHP have the option to use whichever operating system and web server
they choose. (php, n.d.)

Python
Python is a popular high-level programming language for general-purpose applications.
Guido van Rossum established it in 1991, and the Python Software Foundation continues to
develop it. Its syntax was created with code readability in mind, allowing programmers to
communicate their ideas in fewer lines of code.
Python is a dynamically semantic, interpreted, object-oriented high-level programming
language. Python's concise, easy-to-learn syntax prioritizes readability, which lowers software
maintenance costs. Modules and packages are supported by Python, which fosters program
modularity and code reuse. The Python interpreter and its substantial standard library are free
to download and distribute in source or binary form for all major platforms. (python, n.d.)

56 | Page
B. Strength and Weakness of each Programming Languages
Strength of PHP
● Managing the codes is a simple process.
● It is open source and free of charge, and it is often downloaded from anywhere and
easily accessible for use in the development of web-based applications.
● PHP-based programs may operate on any operating system, including UNIX, Linux,
and Windows, among others, and are referred to be platform agnostic.
● With the aid of providing continual maintenance to different versions, the stability will
improve after a few years. (technosophos, n.d.)

Weakness of PHP
● Client-side scripting is impossible since PHP is a server-side language. So, running
several PHP apps may slow down the server.
● Error Handling - PHP's error handling is rudimentary. Most issues can be solved via
coding.
● Don't share resources - PHP doesn't do that. Process framing helps PHP avoid
problems like memory leaks and system failures. But this has led to additional
constraints.
● Too flexible - This is both strength and a weakness of PHP. When a lack of experience
meets a language that is too flexible, poor code quality or too many technical debts
result. The PHP project maintenance is poor. (Phan, n.d.)

Strength of Python
● Python is a high-level programming language with an English-like syntax that makes
the code easy to read and comprehend.
● Python is a tremendously productive language, and its simplicity allows developers to
concentrate on the job at hand.
● Python is an interpreted language, which means that the code is executed line by line
by Python.
● Python is released under an open-source license that has been authorized by the OSI.
As a result, it is both free to use and share.
● Many languages, such as C/C++, need code modifications in order to operate on
multiple platforms. Programs written in Python may run on any platform.

57 | Page
Weakness of Python
● Python applications that are executed line by line are notoriously sluggish.
● Python must make a sacrifice in order to give developer simplicity. The Python
programming language consumes a lot of RAM.
● Python is often used in server-side programming since it is memory inefficient and has
slowdown processing power.
● Python programming is simple and stress-free. However, when communicating with
databases, it falls short. Python is seldom utilized in organizations since they need
seamless interaction of complicated legacy data.
● Because Python is a dynamically typed language, variable data types may change at
any moment. In the future, a variable holding an integer number may retain a string,
resulting in Runtime Errors. (kcpelearning, n.d.)

C. Comparison of Programming Languages

Criteria PHP Python


Key features Open source, Easy Deployment, Rapid development, Dynamic
Continual Improvements. typing and beautiful code.
Database It is possible to access more than Does not support database
connectivity 20 different databases. connectivity as broadly as PHP.
Frameworks PHP users have access to mature Python has a smaller number of
frameworks. frameworks.
Syntax The built-in library has a wide A very clear and concise, syntax
range of naming conventions. of codes.
(Patel, n.d.)

D. Recommendation for Programming Language


The fact that PHP is a free, open-source language with no license costs means that the cost
of utilizing it is quite low. There are several advantages to utilizing PHP. Some of these
include the ability to communicate with a variety of database languages, including MySQL.
Both php and MySQL may run on an Apache server, which is also available for free. PHP is
compatible with Windows, Linux, and Unix servers. It also has excellent online documentation
and a solid structure that makes learning the language a breeze. Online features are also well

58 | Page
supported. Furthermore, since it is more accessible and less expensive to set up, this is the
finest language for web development.

59 | Page
3.1.3 Databases

A. Definition
MYSQL

MySQL is a free database management system. However, if you want to utilize sophisticated
features, there are numerous premium versions available. In comparison to other database
software such as Microsoft SQL Server and Oracle database, MySQL is simple to use. It
works with any programming language, although it's most popular with PHP.

Because of its Web-optimized features like HTML data types and the fact that it's free, MySQL
is particularly popular for Web-hosting applications. It's part of the LAMP (Linux, Apache,
MySQL, PHP) architecture, which is a collection of platforms for delivering and supporting
complex Web applications. (Moore, n.d.)

Microsoft Access

In corporate IT contexts, this is a relational database management system (RDBMS) that


supports a broad range of transaction processing, business intelligence, and analytics
applications. This is a database system that is part of the Microsoft Office suite.

Using a graphical user interface (GUI), tasks may be completed. Furthermore, high-level
users may construct or change queries using SQL code. (Cooper, n.d.)

60 | Page
B. Strength and Weakness of each Databases

Strengths of MYSQL

● MySQL is simple to set up and operate, and since a variety of third-party tools
may be added to the database, the implementation process is also
straightforward.
● MySQL has always been a quick database, thanks to its simplicity. MySQL has
gained traction in the corporate industry in recent years as a result of additional
"enterprise" features.
● Any open-source database, MySQL has the most market share. MySQL
access is available from almost every web hosting business, and books and
articles regarding MySQL and PHP abound.
● Most other database alternatives on the market are much more costly than
MySQL.
● Despite the fact that MySQL's popularity has fallen in recent years, it remains
one of the most widely used database systems in the world. (learning, n.d.)

Weakness of MYSQL

● When you use a lot of stored procedures, the memory utilization of every
connection that uses those stored procedures will skyrocket.
● Stored procedures are difficult to debug, because mysql lacks the necessary
tools.
● It's not straightforward to create and maintain stored procedures. They often
demand a particular skill set that not all application developers possess, which
may cause issues during both the development and maintenance stages of the
program. (learning, n.d.)

61 | Page
Strengths of Microsoft Access

● In minutes, Access provides data administrators with a fully working relational


database management solution.
● Microsoft Access is one of the most widely used desktop database programs
worldwide.
● Microsoft Access is hundreds of dollars less expensive than other bigger systems
while providing the same features and functionality.
● An Access program may be used by up to 10 people in a network.
● Importing data is simple using Microsoft Access. (northgate, n.d.)

Weakness of Microsoft Access

● When it comes to inserting information into the database, it is a finite database system
with a wall that may be hit at some point.
● The data is stored in a single file that is closed to the maximum size allowed by the
database application. The one-file format slows down the program's speed.
● Multimedia data is challenging to integrate into Microsoft Access because of the one-
file saving limitations and the fact that multimedia data takes up a lot of space.
(northgate, n.d.)

62 | Page
C. Comparison of Databases

Criteria MYSQL Microsoft Access


Security MySQL is much more secured and In terms of user-name/ password
can be configured it with SSL on the database
support.
Usage Platform independent Works only on windows

Cost MySQL is open-source so no cost MS Access is 139.99 $ per one


involved. computer.

D. Recommendation for Programming Language


MySQL is the most widely used open-source database in the world, and it offers extensive
support for all application development needs. MySQL also has connectors and drivers that
make it possible for any kind of application to utilize MySQL as their data management server
of choice. MySQL provides application developers with everything they need to construct
database-driven information systems, regardless of whether they're using PHP, Java, Visual
Basic, or.NET. Because of its high-performance query engine, enormously quick data insert
capabilities, and excellent support for specific web operations including fast full-text searches,
MySQL is the industry standard for high-traffic online sites. MySQL has outstanding security
features that provide complete data security. In terms of database authentication, MySQL has
robust procedures in place to ensure that only authorized users have access to the database
server, with the ability to deny users all the way down to the client machine level. To provide
safe and secure communications, SSH and SSL support is also available. Finally, try utilizing
one of the free Apache Web server installations that includes php as the scripting language
and the MySQL database pre-configured. (Branson, n.d.)

63 | Page
3.2 DSDM Feasibility (DSDM eight principles)

Principle 1 – Focus on the business need

DSDM teams have a number of tools at their disposal to help them follow this philosophy. The
MoSCoW approach, for example, aids the team in identifying which business needs Must,
Should, Could, or Won't be achieved. The DSDM foundation phase also aids the team in
gaining concentration. Team roles are created during this phase. The team then develops an
overarching plan, deciding how risk and quality will be evaluated, as well as how technology
will be deployed and the project managed.

Principle 2 – Deliver on time

The best strategy to deliver items on time or in non-negotiable scenarios is to focus on


company goals and use time box and Moscow tactics. To meet the needs of the client,
developers must plan all timeframes ahead of time. The delivery of final items will meet the
deadline if the correct management is in place.

Principle 3 – Collaborate

For DSDM teams, team spirit and cooperation are critical. This is due to a dislike of having
several departments that only contact seldom. Instead, teams should function as a single unit
and interact to foster understanding, improved performance, and shared ownership. Instead of
having business and technical workers working independently, DSDM teams follow this idea.

Principle 4 – Never compromise quality

On DSDM projects, quality is always fixed and must be set from the start. The final product
should not be of a higher or lower quality than the one chosen. To follow this approach, DSDM
teams must test and evaluate continually to guarantee that quality does not become a
variable. This testing and evaluating takes place throughout the iterative development stages

64 | Page
of 'exploration' and 'engineering.' MoSCoW and time-boxing may be utilized to guarantee that
testing is acceptable and well-organized once again.

Principle 5 – Build incrementally from firm foundations

The greatest strategy to provide high-quality items on schedule is to complete each project
step by step or progressively. Developers must be able to offer business value as soon as
feasible, and reevaluate priorities with each increment.

Principle 6 – Develop iteratively

DSDM allows for change during a project and use iterative development to arrive at a precise
business answer. Stakeholder satisfaction rises as a result of incremental delivery, which
enables for such change to be accepted. Testing, demonstrations, and feedback are all part of
each iteration. This guarantees that each iteration improves on the previous one, resulting in a
satisfactory final product.

Principle 7 – Communicate continuously and clearly

Poor communication may have an impact on the project's success. Stakeholders must work
together to maintain the quality of project delivery via daily stand-ups and meetings.

Principle 8 – Demonstrate control

For the long-term benefit of all stakeholders. To keep track of development, one must be
proactive. Increase work flow by using the time-box approach and evaluating it on a regular
basis. It also assesses the project's long-term viability.

(Gisclard-Biondi, n.d.)

65 | Page
3.3 Possible LESPI (Legal, Ethical, Social and Professional) Issues
Legal Issues

When it comes to business, appearance is key. A consumer's impression of a company's


goods is influenced by the company's public perception. This, in turn, has an impact on the
company's public earnings and, ultimately, its reputation. When a company is engaged in a
lawsuit or a recall, it must assess the impact these difficulties will have on the firm's operations
as well as the expenses of rebuilding the company's image. Most papers prepared by
workers, according to the law, reflect the organization's viewpoint and obligations. When
producing a professional paper, there are always legal considerations to consider, and they
show themselves in the writing style. (lawsociety, n.d.)

Ethical Issues

An ethical issue in business is a circumstance in which a moral conflict develops and must be
resolved, implying that a moral norm is being questioned.

When a choice, situation, or behavior conflicts with a society's moral standards, ethical
dilemmas arise. Individuals and corporations alike may be entangled in these conflicts, since
any of their actions may be questioned on ethical grounds. Individuals, as well as
organizations, are affected by these challenges in their connections with one another and with
organizations. (myaccountingcourse, n.d.)

Social Issues

In today's corporate environment, there are several social responsibility challenges. Based on
the objectives of management and employees, as well as problems that worry the customer
base and the areas in which the firm's business works, each organization must determine the
concerns that are important to its operations. The first step in tackling social concerns in
company management is to be aware of these objectives. Many of these concerns have
previously been addressed, including discrimination in employment practices, labor unions,
charity giving, support for educational institutions, marketing of anti-social items, export of
products, and modernization politics. These concerns are driving management to reflect on
their duties, which have shifted from profit-generating operations to being responsive to
community demands. (academies, n.d.)

66 | Page
Professional Issues (BCS Code of Conduct)

The BCS Code of Conduct serves as a unique and powerful endorsement of the integrity and
as a code of ethics for IT professionals. The BCS code of conducts include

. Professional Competence and Integrity


● Upgrade professional knowledge.
● Do not claim competence that you do not possess.
● Observe relevant clauses from the BCS Code of practice and other standards.
● Accept professional responsibility.

a. Public Interest
● Regard for the public health, safety, and environment.
● Regard legitimate rights of third parties.
● Have knowledge of comply with relevant legislation, regulations, and standards.
● No active or passive bribery.

b. Duty to relevant authority


● Apply due care and diligence. If over-ruled, indicate likely risks
● Avoid conflicts of interest
● Do not disclose confidential information(exceptions)
● Do not withhold information on the performance of products

c. Duty to the profession


● Uphold the reputation of BCS
● Act with integrity
● Consider possible consequences of statements on others; make public statements
only if properly qualified.
● Notify BCS if convicted of a crime, becoming bankrupt.
(aicpa, n.d.)

67 | Page
Chapter-4
Foundations

68 | Page
4.1 Target User
As a company, determining the target audience may aid in the development of marketing
strategies and the identification of key consumers. Defining a target audience enables for
more focused and personal outreach to people most likely to buy the company's product or
service, rather than wasting money and resources attempting to cater to every customer.

Type of User Age Computer skill / IT Language skill


Literacy (especially English
skill)
Upper Intermediate/
Admin 30-45 Advanced
Mastery
Receptionist 23-35 Basic Intermediate
Manager 25-45 Advanced Upper Intermediate
Technician 23-40 Advanced Intermediate
Customer Support Staff 22-35 Basic Upper Intermediate
Guest - Basic/Advanced Basic/Advanced

69 | Page
4.2 Functional Requirement
1. Manage Room Process

1.1Manage Staff (HL)


● Register Staff (ML)
Email already exist check (LL)
Password Length check (LL)
● Update Staff
● Delete Staff
● Search Staff
● Staff Login
Email credentials check (LL)
Password length check (LL)
1.2Manage Room (HL)
● Register Room
● Update Room
● Delete Room
● Search Room
1.3Manage Room Category (HL)
● Register Room Category
● Update Room Category
● Delete Room Category
● Search Room Category

70 | Page
2. Manage Booking and Payment Process

2.1Manage Guest (HL)


● Register Guest (ML)
Email already exist check (LL)
Password Length check (LL)
● Update Guest
● Delete Guest
● Search Guest
● Guest Login
Email credentials check (LL)
Password length check (LL)

2.2Manage Booking (HL)


● Record Booking
● Update Booking
● Delete Booking
● Display Booking
● Record Payment
● Update Payment
● Delete Payment
● Display Payment

71 | Page
4.3 MOSCOW Prioritization
Must

Must Justification
Manage Booking Process A secured booking procedure is required to establish a safe
and secure connection between two persons. Information
such as start date, finish date, and client relevant
information for the user to choose is also vital for consumer
trust. From a technological standpoint, the booking system
should be able to help customers discover what they need
quickly, as well as provide availability throughout the day.

Should

Should Justification
Manage Payment Process Different payment mechanisms will be available in the app
when the organization uses it. Cash or online payment
options are available. Online payments, also known as digital
payments, have become an essential instrument for
improving financial inclusion in recent years, since they
reduce the cost of delivering financial services while also
increasing security and convenience.

72 | Page
4.4 Non-Functional Requirements (4)
1. Usability

Usability refers to features that cater to the demands of the user. It employs user-centric
design approaches to guarantee that features are effective and simple to use. The major
aspects are accessibility, which means that the program can be accessed from a variety of
devices, and clarity, which means that the program was created not to demonstrate design
talents but to meet the needs of the users. The major program functions of recognition are
identical to those of the others, including Credibility refers to the users' ability to trust the
company and its objectives. Relevance refers to whether or not the material that consumers
see on the show is interesting.

2. Security

Security features protect the program against espionage or sabotage. This is the most
significant and critical aspect of every website that has ever been on the internet. Vulnerability
testing must be done on a regular basis to ensure the security of the user's information and
credentials. The website also requires an SSL certificate (Secure Sockets Layer), which is a
required site protocol for security. Even for stand-alone systems, these qualities are required.

3. Performance

In non-functional criteria, system performance is the most essential quality, and it influences
practically all of the others. Under a certain workload, system performance refers to how
quickly a system can react to a specific user's activity. This is about making websites load
quickly, as well as making sluggish procedures seem to load quickly. For example, whether
the site loads fast or not, and whether or not the user is allowed to begin engaging with it right
away, as well as feedback if anything is taking too long to load (For example, A loading
spinner). Reduce total load time, make the site useful as quickly as feasible, smoothness and
activity, perceived performance, and performance metrics are the essentials. With the
website's poor performance and

4. Interface

The user interface is the means through which web users communicate with their computers.
It determines the user's experience while interacting with online applications, and
characteristics such as reaction speed, visual attractiveness, and responsiveness are some of
the trademarks that characterize web application design success.

73 | Page
5. Operational

The process of developing a web application may be roughly characterized as website


development operations. The website's compatibility and leanness are significant factors in its
functioning. The more efficiently a website functions, the greater its potential.

6. Resource

A resource page is a web page that contains useful information on a certain subject. Anything
that may be downloaded via the World Wide Web is referred to as a web resource. Online
pages, emails, database information, and web services are all well-known examples.

7. Portability

The portability, like in data portability, enables you to reuse the site's content across a variety
of apps. Data portability is a critical aspect in the website's success. Data portability makes it
simple to download information that may be required in the future, which is beneficial to the
website's prospective growth and user convenience.

8. Reliability

It is possible for software or hardware resources to fail. Make sure you have a backup plan in
place when dealing with key online apps. Multiple hosting, load balancing, and failovers
should all be part of your approach. It will assist you in ensuring that the web app and data are
not harmed in the event of a web server failure. Discuss what constitutes an appropriate
failure assistance.

9. Maintainability

Maintainability is a term that refers to the likelihood of conducting a successful repair activity in
a certain amount of time. The website's maintainability is also required for non-functional
criteria. If a failure occurs, the system's maintainability assesses the ease and speed with
which it can be returned to operating state.

10. Safety

The website's security ensures that the users have trust in the website. Knowing what
constitutes a secure website may go a long way toward protecting users' personal information
and is more demanding than hazardous ones.

74 | Page
11. Recovery

In the non-functional criteria, the ability to restore data from the website is a necessary.

75 | Page
4.5 Time box Plan

Time box 1: Manage Room Process Time box

Time box Name Manage Room Process Time-box


Start Date 6 March 2022
End Date 25 March 2022
Task Duration Start Date End Date
Functional Requirement 1 day March 6, 2022 March 6, 2022
Use Case Diagram 1 day March 7, 2022 March 7, 2022
Class Design 1 days March 8, 2022 March 8, 2022
Sequence Diagram 1 days March 9, 2022 March 9, 2022
High Level & Low-Level 3 days March 10, 2022 March 13, 2022
Prototype
Coding 9 days March 14, 2022 March 22, 2022
Functional Testing 1 days March 23, 2022 March 23, 2022
Usability Testing 1 days March 24, 2022 March 24, 2022
Time Box Summary 1 day March 25, 2022 March 25, 2022
Key Deliverables (Output)
Design
● Use Case Diagram for Booking Process
● Functional requirement of Booking process
● Sequence Diagram of Booking process
● High level and low-level prototype of Booking process
Coding
● Staff register, login, delete, update and search page
● Room register, update, delete and search page
● Room Category register, update, delete and search page
Testing
● Unit Test Document

76 | Page
Time box 2: Manage Booking and Payment Process Time box

Time box Name Manage Booking and Payment Time-box


Start Date 26 March 2022
End Date 16 April 2022
Task Duration Start Date End Date
Functional Requirement 1 day March 26, 2022 March 26, 2022
Use Case Diagram 1 day March 27, 2022 March 27, 2022
Class Design 1 days March 28, 2022 March 28, 2022
Sequence Diagram 1 days March 29, 2022 March 29, 2022
High Level & Low-Level 5 days March 30, 2022 April 3, 2022
Prototype
Coding 10 days April 4, 2022 April 13, 2022
Functional Testing 1 days April 14, 2022 April 14, 2022
Usability Testing 1 days April 15, 2022 April 15, 2022
Time Box Summary 1 day April 16, 2022 April 16, 2022
Key Deliverables (Output)
Design
● Use Case Diagram for Payment Process
● Functional requirement of Payment process
● Sequence Diagram of Payment process
● High level and low-level prototype of Payment process
Coding
● Guest register, login, delete, update and search page
● Booking register, update, delete and display page
● Payment register, update, delete and display page
Testing
● Unit Test Document

77 | Page
4.6 Risk Management
Risk
Future uncertain occurrences having a chance of occurring and the potential for loss are
referred to as risk. Every project's primary issue is risk identification and management.
Successful risk management analysis will aid in effective job planning and assignments.

Risk Management
The process of discovering, analyzing, and managing risks to an organization's capital and
profitability is known as risk management. Threats, often known as hazards, may arise from a
range of causes, including financial uncertainties, legal obligations, strategic management
mistakes, accidents, and natural catastrophes. The value of a risk management strategy
cannot be overstated in any manner. Implementing and executing the best feasible risk
prevention strategy is a critical component of risk management. (Tucci, n.d.)

4.6.1 Identification of Possible Risks (10-12)

Technical Risk
● Virus Detect
Some viruses are programmed to sabotage the workload and some are programmed to harm
the system and the computer by damaging programs and deleting files or reformatting the
hard-drive.

● Server Failure

Server failure is a prevalent problem that affects all sorts of businesses, and the cost of server
downtime may range from days without access to the loss of important corporate data,
resulting in operational challenges, service outages, and repair expenditures. A malfunctioning
server is indicated by frequent reboots and abrupt slowdown. Using server monitoring
software to maintain tabs on servers, carefully monitor vital systems, and get warnings for any
possible concerns may assist with the correct protocol and preventative maintenance.

● Data Duplication/Migration
Data duplication occurs when a data source has numerous records for the same item, but
with distinct syntaxes. The project's data becomes erroneous and outdated. The process of
transferring data from one place to another, from one format to another, or from one

78 | Page
application to another is known as data migration. During this procedure, the possibility of
data loss exists, posing a danger of losing critical project data.

● Broken Authentication
Broken authentication, it turns out, is the source of a lot of security concerns. This is mostly
due to a faulty implementation. Authentication and session management functionalities in
applications are often performed poorly. This enables attackers to steal passwords, keys, or
session tokens, or exploit other implementation weaknesses to temporarily or permanently
assume the identities of other users.

● Data Leakage
The unauthorized conveyance of data from inside an organization to an external destination
or receiver, which may be done physically or electronically, is known as data leakage. Data
leakage, also known as slow and low data theft, is a major concern for data security, and the
consequences for any company, regardless of size or sector, may be devastating. It's also
crucial to realize that this issue might originate from either an external or inside source. DLP
(Data Loss Prevention) is a method for ensuring that end users do not transfer private or
sensitive data outside of the company network. This system can quickly detect and regulate
any sensitive data, as well as identify the most dangerous people.

● Insufficient Logging and Monitoring


Attackers may further exploit systems with insufficient logging and monitoring, as well as
absent or poor integration with incident response. This might have far-reaching implications.
Data might be tampered with, extracted, or destroyed by attackers. They might also switch to
a different system.

● Lack of communication
Project failure may be caused by a lack of communication. It may also be used to swiftly
segregate team members who have lost touch with the project's goals. Work is conducted in
silos and disagreements rapidly occur as employees lose track of finished and impending
tasks due to the fact that it is not tied to the plan and is out of the project manager's control.

79 | Page
● Coding

A runtime coding error occurs when anything confuses the computer and causes it to crash,
sometimes referred to as an accident.

4.6.2 Risk Matrix (High-Medium-Low)

Risk Probability Impact Proactive Reactive Risk Owner


Action Action
Virus Detect Medium High Installing anti- Run a full Developer
virus and do scan and anti-
routine scans malware
procedures.

Server Failure Low Medium Avoid over- Call server Network


heating and experts for Engineer
keep power maintenance
consistent and conduct
routine
maintenance.
Data Low Medium Data integrity Find the point Programmer
Duplication/Mig check and Date where data and
ration backup restore was recorded database
point for more than analyst
one time, fix it
and run the
full integrity
check and for
the data
migration,
restore the
last data
backup point
Broken Medium High Implementing Limit or Programmer
Authentication multi-factor increasingly
authentication delay failed
login attempts.
Log all failures
and alert
administrators.

80 | Page
Data Leakage High High Make sure to Put together a Database
encrypt all response Analyst and
sensitive data at team, identify Network
rest. the source Engineer
and spread,
protect the
network from
another attack

Insufficient Medium Low Use the latest Establish or Programmer


Logging and network and adopt an and Network
Monitoring endpoint incident Engineer
monitoring response and
technology. recovery plan.
Lack of High High Try to Try to solve Manager
communication communicate as the conflicts
much as they and
can renegotiate
Coding Low Low Check the Finding the Programmer
coding and error as soon
make sure no as possible
crashes happen and fixing it
in the runtime

4.6.3 Critical Success Factors for current project

Top management support


A project manager should try to extract commitment from all stakeholders, including team
members, clients, and senior management. Because top-level management is in charge of
deciding on organizational and project strategy, as well as performing goal-setting duties
inside the company, executive sponsorship for the project is critical. Project objectives and
deliverables should be explicit, quantifiable, achievable, relevant, and time-bound, according
to the project management (SMART). There should be a procedure in place for quickly
identifying and resolving issues. Planning keeps us organized, and a strong project plan is the
first step toward a successful project execution. Every project also needs effective
communication. A good project manager must also be a good communicator. Communication
is the only means for tasks to be allocated and monitored, project difficulties to be escalated,
and objectives, performance, and feedback to be communicated. (Martins, n.d.)

81 | Page
The Whole System Use Case

Fig- Use-case Diagram of the whole system

82 | Page
The whole system detailed class diagram

Fig-The whole system Detailed Class Diagram

Explanation

The staffs record the registration of visitors, booking and booking detail, and room category
and room detail. Visitor can register and book the room that he/she wants to book. Booking
system will record the visitors detail, book detail, paymenttype, checkin and checkout date.

83 | Page
Chapter-5
Exploration & Engineering

84 | Page
5.1 Time-box 1: Manage Room Process Time-box Development
Project Plan for Time Box 1

5.1.1 Functional Requirements List

1.1Manage Staff (High level)


● Register Staff (Middle Level)
● Register StaffID (Low level)
● Register StaffName (Low level)
● Register StaffAddress (Low level)
● Register StaffEmail (Low Level)
● Register StaffPhone (Low Level)
● Register StaffPassword (Low Level)
● Register StaffRole (Low Level)

● Update Staff (Middle Level)


● Check StaffID and Update (Low level)
● Check StaffName and Update(Low level)
● Check StaffAddress and Update (Low level)
● Check StaffEmail and Update (Low Level)
● Check StaffPhone and Update (Low Level)
● Check StaffPassword and Update (Low Level)
● Check StaffRole and Update (Low Level)

● Delete Staff(Middle Level)


● Check Staff account and delete (Low level)

● Staff Login (Middle Level)


● Check StaffEmail addresss exist or not (Low level)
● Check StaffPassword exist or not (Low level)

1.2Manage Room (High level)

85 | Page
● Register Room (Middle Level)
● Register RoomID (Low level)
● Register RoomName (Low level)
● Register RoomQuantity (Low level)
● Register RoomDescription (Low Level)
● Register RoomCategoryImage (Low Level)
● Register RoomPrice (Low Level)

● Update Room (Middle Level)


● Register RoomID and Update (Low level)
● Register RoomName and Update (Low level)
● Register RoomQuant and Update ity (Low level)
● Register RoomDescription and Update (Low Level)
● Register RoomCategoryImage and Update (Low Level)
● Register RoomPrice and Update (Low Level)

● Delete Room (Middle Level)


● Check Room and delete (Low level)

● Display Room (Middle Level)


● Display Room for the Guest (Low level)

1.3Manage Room Category (High level)


● Register RoomCategory (Middle Level)
● Register RoomCategoryID(Low level)
● Register RoomCategoryName (Low level)
● Register RoomCategoryStatus(Low level)

● Update RoomCategory (Middle Level)


● Check RoomCategoryID and Update (Low level)
● Check RoomCategoryName and Update (Low level)
● Check RoomCategoryStatus and Update (Low Level)

● Delete RoomCategory (Middle Level)


● Check RoomCategory and delete (Low level)

● Display RoomCategory (Middle Level)


● Display RoomCategory for the Client (Low level)

86 | Page
5.1.2 Use Case Diagram

Use Case Description

Use Case Name Record Staff


Actor Receptionist

Flow of Event Fill the staff details in the staff register form. And click the “save” button
and the filled information is saved in the database

87 | Page
5.1.3 Screen Design

1) Staff Register Form

Fig (1) Low Level Prototype for Staff Registration

Fig (2) High Level Prototype for Staff Registration

88 | Page
2) Staff Login Form

Fig (1) Low Level Prototype for Staff Login

Fig (2) High Level Prototype for Staff Login

89 | Page
3) Staff Update Form

Fig (1) Low Level Prototype for Staff Update

Fig (2) High Level Prototype for Staff Update

90 | Page
4) Room Register Form

Fig (1) Low Level Prototype for Room Register

Fig (2) High Level Prototype for Room Register

91 | Page
5) Room Display Form

Fig (1) Low Level Prototype for Room Display

Fig (2) High Level Prototype for Room Display

92 | Page
5.1.4 Class Diagram

Initial Class Diagram

Detailed Class Diagram

Detail Class Definitions

Class Name Staff

Attributes StaffID, StaffName, StaffEmail, StaffPassword, StaffPhone, StaffAddress

Operation RegisterStaff (), UpdateStaff(), DeleteStaff()

Description << The staff class is used to do registeration for staff records, room records
and category records >>

93 | Page
5.1.5 Sequence Diagram for Managing Room Process

Sequence Diagram Description

The Room management procedure is shown in this flowchart. During this procedure, the
employee logs in using his or her winning registered email and password. It will display a login
successful message after the login procedure is completed. He may verify staff details in the
staff login table after the login procedure is complete. When it's finished, the personnel may
register the room and its many classifications. He can also make changes to these tables. He
can also keep track of visitor information.

94 | Page
5.1.6 Functional Testing

Test Plan
Module 1: Staff Register

Test Script Description Date Tester


1.1 Null check in the Register 15- April- 2022 Bhone Myat
form
1.2 Test Account registered 15- April- 2022 Bhone Myat
successfully button

Module 2: Staff Login

Test Script Description Date Tester


2.1 NULL check in the Login form 15- April- 2022 Bhone Myat

2.2 Test Staff Account has been 15- April- 2022 Bhone Myat
logged in successfully

Module 3: Staff Update

Test Script Description Date Tester


3.1 Test that Staff account has 15- April- 2022 Bhone Myat
successfully updated

Module 4: Staff Delete

Test Script Description Date Tester


4.1 Test that staff account has 15- April- 2022 Bhone Myat
successfully deleted

Module 5: Room Register

Test Script Description Date Tester

95 | Page
5.1 Null check in the 15- April- 2022 Bhone Myat
room register form

5.2 Test Register Button 15- April- 2022 Bhone Myat

96 | Page
Test Script (1): Staff Register

Unit Test 1 Test Case: Register by data entry Staff Designed by: Bhone Myat

Data Source: Staff Table Objective: To test the Register of data Tester: Bhone Myat
entry Staff
Test Case Description Test Procedure Expected Actual
Result Results
1.1 NULL check Clicking the “Save” button without filling Show See Fig.1.2
in the the textboxes in the form which makes ‘Please
register form it blank. enter the
data’
message.
Before Testing

Fig.1.1

After Testing

97 | Page
Fig.1.2

98 | Page
Test Case Description Test Procedure Expected Actual
Result Results
1.2 Test that Fill all the text boxes with valid data Show the See
Staff and click “Save” button. message Fig.1.1
Account has that account and 1.2
been has been
created successfully
created

Before Testing

Fig.1.1

After Testing

99 | Page
Fig.1.2

Test Script (2): Staff Login

Unit Test 2 Test Case: Sign-in by data entry Staff Designed by: Bhone Myat

Data Source: Staff Table Objective: To test the Sign-in of data Tester: Bhone Myat
entry Staff
Test Case Description Test Procedure Expected Actual
Result Results
2.1 NULL check All the textboxes in this form are placed Show See Fig.1.2
in the Login as blank and click “Login” button ‘Please
form enter the
data’
message.

Before Testing

100 | Page
Fig.1.1

After Testing

Fig.1.2

101 | Page
Test Case Description Test Procedure Expected Actual
Result Results
2.2 Test that Fill all the text boxes with registered data and See
Staff data and click” Login” button. click” Login” Fig.1.2
account button.
have been Show the
logged in message
successfully that Staff
login is
successfully
and to the
home page

Before Testing

Fig.1.1

After Testing

Fig.1.2

Test Script (3): Staff Update

Unit Test 3 Test Case: Updating by data Staff Designed by: Bhone Myat

102 | Page
Data Source: Staff Table Objective: To test if the staff account Tester: Bhone Myat
information is updated
Test Case Description Test Procedure Expected Actual
Result Results
3.1 Test that Click” Edit” link in the staff detail table. Show “Staff See Fig.1.3
staff Then update staff name from the form account has AND 1.4
account has by clicking “Update “button. successfully
been
successfully
updated
Before Testing

Fig.1.1

Fig 1.2

After Testing

103 | Page
Fig 1.3

Fig 1.4

104 | Page
Test Script (4): Staff Delete

Unit Test 4 Test Case: Deletign by data Staff Designed by: Bhone Myat

Data Source: Staff Table Objective: To test if the staff account is Tester: Bhone Myat
deleted
Test Case Description Test Procedure Expected Actual
Result Results
4.1 Test Staff Click “Delete” link in the staff detail Show the See Fig.1.2
account has table. message and Fig 1.3
been that the staff
successfully account is
deleted deleted.
Before Testing

Fig.1.1

After Testing

Fig 1.2

Fig 1.3

Test Script (5): Room Register

105 | Page
Unit Test 5 Test Case: Room Register by Staff Designed by: Bhone Myat

Data Source: Staff Table Objective: To test if room information Tester: Bhone Myat
is registered
Test Case Description Test Procedure Expected Actual
Result Results
5.1 NULL check Clicking the “Save” button without filling Show See Fig.1.2
In the form the textboxes in the form which makes ‘please fill
it blank. out this
filed’

Before Testing

Fig.1.1

After testing

Fig.1.2

Test Case Description Test Procedure Expected Actual


Result Results

106 | Page
5.2 Test that Fill all the text boxes with valid data Show the See
room has and click ”Save” button. message Fig.1.2
been that room
successfully has been
Registered. successfully
registered

Before Testing

Fig.1.1

After Testing

Fig.1.2

107 | Page
5.1.7 Usability Testing

Visibility of System Status

Can see text box


with different color

Explain Staff can understand what data to complete in the Staff Register form by reading at
the placeholder words in the textboxes.

Aesthetic and Minimalist Design

The design of this home page is developed attractively to attract more people.

108 | Page
Consistency and standard

The Room Registration form is used to register rooms, and proper room data is entered into
the form, allowing users to be more consistent.

109 | Page
Error Prevention

Staffs may see that he left the textboxes unfilled on this Staff Registration form and can try to
fill them up again. Staffs may also see whether incorrect data is entered in the login form,
allowing them to fix it.

110 | Page
5.1.8 Time box Summary

Wok Done

The purpose of Time-box 1 is to specify how all tables are registered, updated, deleted, and
displayed. Then there are three degrees of functional requirements: Low-Level, Mid-Level,
and High-Level. The administration and display procedure, as well as its explanations, are
shown in the use case diagram. The basic and thorough class diagrams are then created.
After these class diagrams, the sequence diagram appears, and its procedures are outlined.
The system design is started initially, followed by the functional requirements. Because this is
a huge system that takes a long time to complete, it will take 19 days to complete. After the
implementation is finished, all of the functional and non-functional requirements are tested.
Finally, the system's display process is presented to users for comments and requirements.

Problems (Issues)

Some coding and difficulties are produced throughout the construction of the management
and presentation procedure. Some of the pages in the registration section lead to unrelated
pages. Updated data is not shown correctly in the update area. Only errors were shown when
the data was entered into the tables. The tester then made some modifications to the system,
which now displays no problems or success signals.

Solutions

The needed variables, methods, and actions are extensively examined for displays that did
not display correctly. The room data allocated to the room table is not shown as intended in
the solution because the insert statement is used in the category, causing the insertion of
room data to an unrelated table. This is solved by properly applying the codes and syntaxes.

Remaining Time-boxes

The booking and payment procedure takes up the last timeframe of this project. The
registration, login, update, and storage of the guest's booking data will all be included in this
timeframe.

111 | Page
5.2 Time-box 2: Manage Booking and Payment Time-box
Development
Project Plan for Time Box 2

5.2.1Functional Requirements List

1.1 Manage Guest (High level)


● Register Guest (Middle Level)
● Register GuestID (Low level)
● Register GuestName (Low level)
● Register GuestEmail (Low level)
● Register GuestPassword (Low Level)
● Register GuestPhone (Low Level)
● Register GuestAddress (Low Level)

● Update Guest (Middle Level)


● Check GuestID and Update (Low level)
● Check GuestName and Update(Low level)
● Check GuestEmail and Update (Low level)
● Check GuestPassword and Update (Low Level)
● Check GuestPhone and Update (Low Level)
● Check GuestPassword and Update (Low Level)

● Delete Guest (Middle Level)


● Check Guest account and delete (Low level)

● Guest Login (Middle Level)


● Check GuestEmail addresss exist or not (Low level)
● Check GuestPassword exist or not (Low level)

112 | Page
1.2 Manage Booking (High level)
● Record Booking (Middle Level)
● Record BookingID (Low level)
● Record BookingDate (Low level)
● Record TotalOccupancy (Low level)
● Record CheckinDate (Low Level)
● Record CheckoutDate (Low Level)
● Record PaymentType (Low Level)
● Record CardNo (Low Level)
● Record SecurityNo (Low Level)
● Record Month (Low Level)
● Record Year (Low Level)

● Update Booking (Middle Level)


● Record BookingID and Update (Low level)
● Record BookingDate and Update (Low level)
● Record TotalOccupancy and Update (Low level)
● Record CheckinDate and Update (Low Level)
● Record CheckoutDate and Update (Low Level)
● Record PaymentType and Update (Low Level)
● Record CardNo and Update (Low Level)
● Record SecurityNo and Update (Low Level)
● Record Month and Update (Low Level)
● Record Year and Update (Low Level)

● Delete Booking (Middle Level)


● Check Booking and delete (Low level)

● Display Booking (Middle Level)


● Display Booking for the Guest (Low level)

113 | Page
5.2.2 Use Case Diagram

Use Case Description

Use Case Name Booking


Actor Visitor or Guest

Flow of Event Fill out the guest information, choose a room, and complete the
booking

114 | Page
5.2.3 Screen Design

1) Visitor Register Form

Fig (1) Low Level Prototype for Visitor Registration

Fig (2) High Level Prototype for Visitor Registration

115 | Page
2) Guest Login Form

Fig (1) Low level prototype for guest/visitor login

Fig (2) High level prototype for guest/visitor login

116 | Page
3) Guest Update Form

Fig (1) Low level prototype for guest update

Fig (2) High level prototype for guest update

117 | Page
4) Room Display

Fig (1) Low level prototype for room display

Fig (2) High level prototype for room display

118 | Page
5) Room Details

Fig (1) Low level prototype for room details

Fig (2) High level prototype for room details

119 | Page
5. Room Cart

Fig (1) Low level prototype for room cart

Fig (2) High level prototype for room cart

120 | Page
6. Booking and Payment

Fig (1) Low level prototype for room booking and payment

Fig (2) High level prototype for room booking and payment

121 | Page
5.2.4 Class Diagram

Initial Class Diagram

Detailed Class Diagram

122 | Page
Detail Class Definitions

Class Name Visitor

Attributes VisitorID, VisitorName, VisitorEmail, VisitorPassword, VisitorPhone, Visitor


Address
Operation Register(), Cancel(), CheckDate()

Description << The Guest class is used to do register for guests who book rooms>>

123 | Page
5.2.5 Sequence Diagram for Booking and Payment Process

Sequence Diagram Description

This is a flow chart for the booking and payment procedure. During this procedure, the visitor
uses his own registered email and password to log in. Alternatively, the visitor may create his
own account and get a login success message after the procedure is completed. He may see
the rooms on the display page after the login is complete. He may reserve and pay for the
room he wants. When it is successful, the information is saved in the "Booking" table, and the
message "Booking Successful" is shown.

124 | Page
5.2.6 Functional Testing

Test Plan
Module 1: Visitor Register

Test Script Description Date Tester


1.1 Null check in the form 20- April- 2022 Bhone Myat

1.2 Test email address already 20- April- 2022 Bhone Myat
exists

1.3 Test Register Button 20- April- 2022 Bhone Myat

Module 2: Visitor Login

Test Script Description Date Tester


2.1 NULL check in the form 20- April- 2022 Bhone Myat
2.2 Test Visitor Account has been 20- April- 2022 Bhone Myat
logged in successfully
2.3 Test Login error 20- April- 2022 Bhone Myat

Module 3: Visitor Update

Test Script Description Date Tester


3.1 Test that Guest account has 20- April- 2022 Bhone Myat
successfully updated

Module 4: Booking Form

Test Script Description Date Tester


4.1 Test the booking form is 20- April- 2022 Bhone Myat
successfully registered

Test Script (1): Visitor Register

125 | Page
Unit Test 1 Test Case: Register by data entry Designed by: Bhone Myat
Visitor
Data Source: Visitor Objective: To test the Register of data Tester: Bhone Myat
Table entry Visitor
Test Case Description Test Procedure Expected Actual
Result Results
1.1 Test null 'Register' button is clicked and Show See Fig.1.2
check in the textboxes are blanked. ‘Please fill
form out this
field’
message.

Before Testing

Fig.1.1

After Testing

126 | Page
Fig.1.2

127 | Page
Test Case Description Test Procedure Expected Actual
Result Results
1.2 Test email Type the email address which is Show See
address is already existed and click save. “Email Fig.1.2
already address is
exists. already
existed”
message.

Before Testing

Fig.1.1

After Testing

128 | Page
Fig.1.2

Test Case Description Test Procedure Expected Actual


Result Results
1.3 Test that Fill all the text boxes with valid data Show the See
Visitor and click “save” button. message Fig.1.2
account has that the
Visitor
been
account has
created been
successfully created
successfully.

Before Testing

129 | Page
Fig.1.1

After Testing

Fig.1.2

Test Script (2): Visitor Login

130 | Page
Unit Test 2 Test Case: Sign-in by data entry Designed by: Bhone Myat
Visitor
Data Source: Visitor Objective: To test the Sign-in of data Tester: Bhone Myat
Table entry Visitor
Test Case Description Test Procedure Expected Actual
Result Results
2.1 NULL check All the textboxes in this form are also Show See Fig.1.2
in the form placed as blank. And Click the “Login” ‘Please fill
button. out this
field’
message.

Before Testing

Fig.1.1

After Testing

131 | Page
Fig.1.2

132 | Page
Test Case Description Test Procedure Expected Actual
Result Results
2.2 Test that All textboxes in the form are entered Show the See
Visitor with the registered data. Click the message Fig.1.2
Account has “Login” button. that “login is
successful”
been logged
and take the
in guest to the
successfully “Home”
Page.

Before Testing

Fig.1.1

After Testing

Fig.1.2

133 | Page
Test Case Description Test Procedure Expected Actual
Result Results
2.3 Test that All textboxes in the form are entered Show the See
Visitor with the invalid password or email. message Fig.1.2
Account Click the “Login” button. that Visitor
login is
login error
successful.

Before Testing

Fig.1.1

After Testing

Fig.1.2

Test Script (3): Booking Form

134 | Page
Unit Test 3 Test Case: Test the booking form Designed by: Bhone Myat

Data Source: Visitor Objective: To test the visitor booking is Tester: Bhone Myat
Table successful.
Test Case Description Test Procedure Expected Actual
Result Results
3.1 Test the Click the ‘Make Checkout’ button. Show See Fig.1.2
Visitor ‘Visitor
booking is Room
successful. Successfully
Reserved!
‘Message.
Before Testing

Fig.1.1

135 | Page
Fig1.2

After Testing

Fig.1.3

136 | Page
5.2.7 Usability Testing

Visibility of System Status

In the guest registration form, the guests can understand what to do and how to fill by
looking at the placeholder texts in the textboxes.

137 | Page
Aesthetic and Minimalist Design

In this guest registration page the design is made aesthetically to attract more users.

Consistency and standard

Guest login form is used for guests to login their accounts. Guests can fill the valid data in the
form and then click “Login” button which makes users more consistent.

138 | Page
Error Prevention

In the Guest Login form, guests can know that he has made the textboxes blank and can
enter data into them. Also, if he has entered the wrong email or password, an error message
will pop-up so that he can reenter correct data again.

139 | Page
Recognition rather than recall

Guests can enter the same data again they have entered before by selecting the texts
appearing below the textbox which reduces the chances of recalling what they have typed in
before.

140 | Page
5.2.8 Time box Summary

The planning in Time-box 2 is to specify the booking and payment. The amount of functional
requirements for the booking and payment process are then divided into three categories:
Low, Mid, and High Level. After that, a use case diagram for the booking and payment
process is created, along with descriptions. Following that, the system's first and thorough
class diagram is created. Following that, a sequence diagram for the booking and payment
processes is developed, as well as a description of the procedure. After that, the system's
design begins. The implementation of the functional need in the system has begun after the
system designation is complete. Because this is the system's last time-box, the
implementation takes a long time, and this work takes 22 days to complete. After the
implementation is finished, all of the functional and non-functional requirements are tested.
Finally, the system's whole booking process is presented to users for comments and needs.

Problems (Issues)

Some coding and difficulties are produced throughout the construction of the management
and presentation procedure. Guests might enter data that isn't secure enough in the
registration part, which leads to data loss and theft. Guests may enter any sort of data in the
textboxes on the booking form, resulting in a form that is riddled with mistakes.

Solutions

The password for the registration procedure is programmed to be a strong password so that
visitors do not have to provide simple and unsecure information. The total occupancy, check-
in, and check-out date fields are in combo boxes during the booking process, so there will be
no errors.

Remaining Time-boxes

The booking and payment procedure is the last time-box, however check the appendix for
extra processes.

141 | Page
CHAPTER – 6
Deployment

142 | Page
6.1 Deployment
6.1.1 Deployment Diagram

<<Apache>>

Explanation for diagram

The Visitors access to the internet via a router protected by a firewall, which they use from
different browsers. The internet then connects to a web server that hosts the web pages, and
the server is linked to a database server (MYSQL). The visitor requests web pages, and the
server responds with the requested pages. The visitor may then see the pages and continue
working.

143 | Page
6.2 Data Migration
6.2.1 Data to Migrate

Data migration is the process of transferring data from one place to another, one format to
another, or one application to another, as well as transferring old data from one system to
another. Staffs, guests, rooms, categories, and bookings must all be migrated in this project.

Time Box Master Data Transaction Data


Time Box 1: Manage Room Staff, Room, Room Category Display, Registration
Process
Time Box 2: Booking and Visitor, Booking Booking and Payment
Payment

6.2.2 Plan

Time Box Data To Migrate Duration Start End Date Responsible


Date person
Time Box 1: - Staff 4 days 14 April 17 April
Manage Room - Room 2022 2022 Receptionist,
Process - Category Manger

Time Box 2: - Visitor 2 days 18 April 19 April Financial


Booking and Booking 2022 2022 Staff, Office
Payment Staff

144 | Page
6.3 Training
6.3.1 Training plan

No Content Trainee Start End Date Venue Time


Date
1 - Staff HR Manager 20 April 20 April Hotel 2 pm - 4
2022 2022 Hallway pm
- Visitor HR Manager 21 April 21 April Hotel 8 am –
and Customer 2022 2022 Hallway 11am
service staff

6.3.2 User Manual

Enter the name

Enter the Phone

Enter the Email

Enter the Password

Enter the Address


Click the save button to register

145 | Page
CHAPTER – 7
CONCLUSION
&
EVALUATION

146 | Page
7.1 Evaluation against Aim & Objectives
Aim

The project's goal is to make bookings simple and secure for guests. To facilitate
visitor bookings, the team has created a user-friendly design and provided staff training
on how to utilize the website. Although some security is lacking, the majority of the
systems are more secure than the manual approach.

Objective 1

To get information from the employees, the team must conduct individual interviews
with each person to obtain information on the system they are using and the issues they
are encountering as a result of utilizing that system. The team then conducts a SWOT
analysis before proposing a new system. The team then compares the breadth of the
proposed system to that of comparable systems. The team compared the system both
functionally and non-functionally while evaluating it. The methodology, programming
language, and database management system (DBMS) that will be utilized to construct the
project are then determined. There are several techniques to choose from when deciding
methodologies, but the team has chosen DSDM since it is the most appropriate for the
project.

Objective 2

The team regulates the target users, prioritizes the tasks, and establishes the
functional and non-functional needs in this goal. Set a time limit for planning and identify
any hazards that might jeopardize the project's success. Because it is critical to prioritize
the guest's demands, the time-box plan takes much longer to develop than the other
processes.

Objective 3

The team creates ERD and Use Case Diagrams to aid in the creation of the plan and
each page; the transition pages take the most time and are one of the most critical parts
of the development. The team also consults with students on the implanted design and
makes several changes during the development process.

147 | Page
Objective 4

Students and testers evaluate the pages that have been inserted and provide
comments on the website. If the website has any problems or defects, the team must
build or modify it. After that, the testing is separated into functional and non-functional
categories. Functional testing evaluates how well the website's functions operate,
whereas non-functional testing evaluates the website's design and usability.

Objective 5

Staff members are given training. Because it is crucial for both visitors and staffs, the
majority of the training focuses on display, booking, and payment functions. As a result,
the team has created a user handbook for key features. There have been a number of
challenges in training the workforce. Lack of attention and skill are two of these issues.
These issues will be handled by keeping a watch on employees, studying again, and then
reading a lot of e-commerce literature.

148 | Page
7.2 Evaluation Against Similar System

No My System Melia.com
1 Visibility of System Status Visibility of System Status

The system status the selected tab in the specific


style so the status of the system is said to be
visible.

The system status the selected text box in the


specific color so the status of the system is said to be
visible.
2 Search booking of the systems Search booking of the systems

When the visitors search for the room, the result is


shown in the system. When the visitors search for the room, the result is
shown in the system.

3 Usability of the systems Usability of the systems

When the user points on the navigation bar, that


When the user points on the navigation bar, that page page navigation is underlined.
navigation is underlined.

4 Error handling of the systems Error handling of the systems

149 | Page
The error message shows to fill out this field.

The error message shows to fill out this field.

5 Mobile view of the systems Mobile view of the systems

If the website is into mobile view there is a


If the website is into mobile view there is a navigation navigation bar to go to other pages.
bar to go to other pages.

6 The consistency and standard The consistency and standard

The system has a standard place for the login page


The system has a standard place for the login page
for both the guests and staffs.
for both the guests and staffs.

150 | Page
7.3 Evaluation against Justification Made
Methodology
The method that the “Elysium Hotel” project mainly use is DSDM (Dynamic system
development method or Agile methodology. In Agile methodology, testing is an integrated part
of the project execution phase which means that the quality of the overall final product is
greater and the customer is always involved in the decision-making process which leads to
greater customer retention. This allows managers having better control over the project due to
its transparency, quality control features and feedback integration. But the Agile methodology
takes a lot of time than other methodology.

Language
The “Elysium Hotel” project uses HTML, CSS, PHP and Java script languages. All of the
languages that have been used is based on the web development. HTML part was easy but
the rest of the design which uses the latter languages have different types of difficulties.
Mainly for this website, I have to use a downloaded template from the google and add to my
website to perfect the web development. During this web development, I have learnt much
about PHP and a lot about design.

Database
The Database that is used for this project is MY SQL server. It is a stable and efficient
database management system for big social media organizations such as Facebook and
Twitter. MY SQL also provides a string layer of protection which keeps the confidential
information from unauthorized access which will enter. The rights involve SELECT, UPDATE,
INSERT and DELETE. My SQK is a common language of scripting which will assist us to
learn useful skills that are importing for many generations to come.

151 | Page
7.4 Evaluation against Time Box Plan
Time Box 1: Manage Room Process Time Box
With the manage room process (Time-box 1), there is a little issue with the minimum time for
the time box to run because of its many functions. The PHP codes for this time-box were
written at ease because of all the teaching by our supervisors. During the development of
time-box 1 I have known very well of the languages of PHP. This Time-box was started from
“March 6, 2022 “to March “25 2022”.

Time Box 2: Manage Booking and Payment Process Time Box


There are numerous problems in the Booking and payment process (Time-box 2) which are
mostly PHP codes problems that are difficult to solve. For this solution, we were helped in
solving these code problems by our supervisors and teachers. Boking and Payment process
time box was started from “March 26,2022” and ended in “March 25”.

152 | Page
7.5 Personal Evaluation

In this project, we faced many difficulties such as coding errors, planning time box and
designing the website. It was hard to find and solve the coding problems ourselves as for the
teachers have a little bit of time for us in the class to solve our problems. That is when the
supervisors which are assigned by our teacher to help with our problems and errors. There
was a little bit of problems with supervisors not having enough time because of the demands
of the students. By the help of supervisors and the teacher, the problems were solved easily
and the project was done on time.

7.6 Strength & Weakness of ABC POS


Strength

The website is user friendly page which is saving time of the users from a register page to
another page. It is designed aesthetically to attract the users. Also, on the room display page
the users can view the rooms clearly and a search bar is present so the Guests can find the
room they favor easily. The website is also responsive which can be viewed in all devices.

Weakness

The weakness of this website is that it doesn’t have detailed description of the room. So, the
visitors can’t know the room category without reaching the room details page. And the visitors
can’t update their account information.

7.7 Future Amendment


In the future, we will add detailed description about the rooms and also add more room
categories. We will review our weakness and will strengthen them. We will redo the design
colors and buttons to be more user-friendly. And an assist button for the visitors which are not
familiar with website. We will widen Not only the website design but also the system scope of
the project in the future.

153 | Page
APPENDIX

154 | Page
Section A: Use Case Descriptions
Time-box 1: Managing Room Process Time-box

Case 1
Use Case Record Staff
Name
Actor Manager
Flow of Event Fill out the registration form's staff information. The Save button has been
pressed.

Case 2
Use Case Record Visitor
Name
Actor Staff
Flow of Event In the registration form, fill in the Visitor information. The Save button has
been pressed.

Case 3
Use Case Record Room
Name
Actor Staff
Flow of Event In the registration form, fill out the room details. The button for saving has
been pressed.

Case 4
Use Case Record Booking
Name
Actor Staff
Flow of Event In the checkout form, fill in the booking information. The check-out button has
been pressed.

Case 5

155 | Page
Use Case Record Category
Name
Actor Staff
Flow of Event Fill out the registration form's category information. The Save button has
been pressed.

Time-box 2: Managing Room Booking and Payment Process Time-box

Case 1
Use Case Visitor Registration
Name
Actor Visitor
Flow of Event In the registration form, fill in the guest information. The Save button has
been pressed.

Case 2
Use Case Booking Registration
Name
Actor Visitor
Flow of Event Fill out the booking form with your information. The Register button has been
pressed.

156 | Page
Section B: Detailed Class Definitions
Time-box 1: Managing Room Process Time-box

Class 1
Class Staff
Name
Attributes StaffID, StaffName, StaffEmail, StaffPassword, StaffPhone, StaffAddress,
StaffRole
Operation Register (), Update (), Delete (), Login ()
Description The Staff class is used to register employees in order to determine which
employees are accountable for which aspects of the work.

Class 2
Class Room
Name
Attributes RoomID, RoomName, RoomQuantity, RoomDescription,
RoomCategoryImage, RoomPrice
Operation Register ()
Description The Room class is used to show information to visitors.

Class 3
Class Name Category
Attributes RoomCategoryID, RoomCategoryName, RoomCategoryStatus
Operation Register ()
Description The Category class is used to provide information to visitors.

157 | Page
Time-box 2: Managing Room Booking and Payment Process Time-box

Class 1
Class Visitor
Name
Attributes VisitorID, VisitorName, VisitorEmail, VisitorPassword, VisitorPhone,
VisitorAddress
Operation Register (), Update (), Delete (), Login ()
Description The Visitor class is used to establish Visitor accounts and make lodging
reservations.

Class 2
Class Booking
Name
Attributes BookingID, BookingDate, TotalOccupancy, CheckinDate, CheckoutDate,
PaymentType
Operation Register ()
Description The Booking class is used to save the visitor's booking form.

Section C: Coding

Form Function Purpose


Registration form of visitor, Register () Data from the Registration forms is saved
staff, room, category and to the database. The input values are
booking imported into variables and SQL
statements are used to enter the data into
the tables when the Register/OK/Save
button is pressed.
Login form of staff and visitor Login() To access an account that has been
stored in the database. The database
data is compared to the input data to see
whether the user account exists.
Update form of staff and Update() To update the database with data from
visitor the forms. When the Update button is
pressed, the input data is stored into
variables, and the data in the tables is
updated using SQL commands.
Delete form of staff and Delete() To remove data from the forms and save
visitor it in the database. When the delete button
is pressed, SQL queries are used to

158 | Page
remove the specified visitor and staff from
the table.
Room Search() To search the database for data from the
Login forms. When the Search button is
pressed, the input data is placed into
variables, and then data is chosen from
the tables using SQL commands.

159 | Page
Section D: Test Scripts
Test Case Description Test Procedure Expected Actual
Result Results
1.1 Login-Timer The log in timer starts when three Account is See
incorrect passwords are submitted locked for Fig.1.2
three-times. 10mins

Before Testing

Fig.1

After testing

160 | Page
Fig 2

Fig 3

Fig4

161 | Page
References

162 | Page
References List

https://osarome.blogspot.com/2011/10/1-technical-feasibility-2-operational.html

https://www.businessnewsdaily.com/4987-what-is-agile-scrum-methodology.html

https://checkykey.com/dsdm-strengths-and-weaknesses

https://www.simpliaxis.com/resources/scrum-master-strengths-and-weaknesses

https://theqalead.com/topics/dsdm-dynamic-systems-development-
method/#:~:text=Scrum%20vs%20DSDM&text=Some%20are%20merely%20terminology
%2Dbased,the%20%E2%80%9Cpotentially%20releasable%20increment.%E2%80%9D

https://www.php.net/docs.php

https://docs.python.org/3/

http://technosophos.com/2014/05/14/5-strengths-of-php.html

https://www.ryadel.com/en/php-programming-language-strengths-weaknesses/

https://kcpelearning.com/showcourse/python3/strengths-and-weaknesses

https://www.mindinventory.com/blog/php-vs-python/

https://www.techtarget.com/searchoracle/definition/MySQL

https://www.comparitech.com/net-admin/microsoft-access/

https://www.linkedin.com/learning/database-clinic-mysql/strengths-and-weaknesses-of-
mysql

http://northgate-reality.com/advantages-and-disadvantages-of-access-databases/

https://dataconomy.com/2017/04/5-reasons-challenges-mysql/

https://www.appvizer.com/magazine/operations/project-management/dsdm

https://www.lawsociety.org.uk/public/for-public-visitors/common-legal-issues

https://www.myaccountingcourse.com/accounting-dictionary/ethical-
issues#:~:text=What%20Does%20Ethical%20Issues%20Mean,question%20from%20an
%20ethical%20standpoint.

https://nap.nationalacademies.org/read/5803/chapter/9

https://www.aicpa.org/topic/ethics/professional-issues

163 | Page
https://searchcompliance.techtarget.com/definition/risk-
management#:~:text=Risk%20management%20is%20the%20process,errors%2C%20ac
cidents%20and%20natural%20disasters.

https://asana.com/resources/critical-success-factors

164 | Page

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy