BHONE MYAT MIN 00186524 CP Assignment GA Summer 2022 1
BHONE MYAT MIN 00186524 CP Assignment GA Summer 2022 1
1 | Page
Table of Contet
1. Project Proposal ............................................................................................................... 8
3.1.1 Methodologies..........................................................................................................51
3.1.3 Databases................................................................................................................60
3.3 Possible LESPI (Legal, Ethical, Social and Professional) Issues .................................66
2 | Page
4.1 Target User...................................................................................................................69
3 | Page
6.3 Training ......................................................................................................................145
4 | Page
Abstract
The "Hotel Elysium" is the project system for the computer project. This project has seven
tasks as well as a project proposal. The initial report for a project proposal covers the following
topics: an overview of the system, its history, present system challenges and procedures, the
newly proposed system scope, system development goals and objectives, and estimated cost
and time. The suggested system scope is contained in Task 1's introduction to the computing
project and SWOT analysis. Task 2 entails comparing functional and non-functional aspects of
similar systems. Task 3 is a feasibility study that includes explanations, comparisons, and
suggestions for methodology, programming languages, and databases. The fourth task is to
lay the groundwork with the target users, including a table, functional and non-functional
needs, and MOSCOW. Prioritizations, timeframe planning, risk management, and important
success aspects round out the list. Exploration and engineering of the system development
are included in Task 5, as is the creation of time-boxes. Task 6 deals with the system's
implementation, as well as data migration and training preparations. Job 7 is the project's final
task, and it involves the project's conclusion and evaluation, as well as an assessment of the
system's development and future operations.
5 | Page
Acknowledgement
I'd want to express my gratitude to everyone who helped make this endeavor a success. We
had learned a great deal of information as a result of our actions. PHP programming language
and PHPMyAdmin server are used in website development. All credit for this effort goes to all
of the instructors and supervisors who assisted. The scores were good because to the
teacher's outstanding teaching and patience. In all respect and gratitude, I am overcome to
express my gratitude to all those who have assisted me in putting these concepts, much
above the level of simplicity, into something concrete.
6 | Page
Project Proposal
7 | Page
1. Project Proposal
The Hotel Reservation System includes all of the dynamic, versatile features needed to
run a hotel, as well as operational integration between reservations, guest history, reception,
Sales Ledger, Accounting, and Reporting modules. It is the ideal fit for managing resources in
a simple yet effective manner with least work or time in order to enhance income. A hotel
booking system is intended to assist in the management of reservations and the analysis of
marketing and financial performance using the information acquired in reports. Hotel
reservation software is a comprehensive software package that includes integrated modules
for managing numerous areas of a hotel. Hotel Elysium is an online platform that allows users
to book a hotel room of their choice.
8 | Page
is a really unique experience, with a wide menu of delectable cuisine and delectable
beverages.
9 | Page
1.4 Current Business Issues (Manual System Issues)
10 | Page
1.5 Proposed System Scope
A central reservation system (CRS) is required for all hotels to manage all bookings in
one location. Whether the business is small or big, all internal teams and departments must
find a method to work together to provide the best possible experience for their visitors, which
may make manual data organizing activities time-consuming and inefficient.
(As an example-http://www.booking.com)
11 | Page
1.6 Aims and Objectives
1.6.1 Aims
The suggested system's major purpose is to put hotel reservation systems' processes
online. The goal of this system is to give customers looking for hotel rooms with reliable
information about available accommodations and to allow room bookings to be made without
mistakes or disputes.
The other is always open for bookings, meaning that the reception is open 24/7 a
week. In other words, clients may make a reservation anytime it is convenient for them,
without the need for workers to be there.
1.6.2 Objectives
● Research and analysis of the current business history and background (2days)
● Research and analysis of the current business processes (2days)
● Research and analysis of the current business issues (2days)
● Investigation about the current business issues (1day)
● SWOT analysis of the current system (1day)
● Calculate the hardware, software, and development costs, as well as the total cost
of the proposed system (1day)
● Calculate the duration of the project plan (1day)
5) Feasibility (2 days)
12 | Page
Analysis Deliverable: Report on existing business processes, requirements, and difficulties,
as well as functional and non-functional reports for similar systems. Also included is the
feasibility study report.
Design Deliverable: The report of business needs, time-box plan, risk matrix plan, functional
and non-functional requirements, and use case diagrams for the whole project, as well as the
structure diagram and sequence diagram, are all design deliverables.
13 | Page
Testing (Total: 70days)
1. Usability Testing (8days)
● System status visibility
● System and real-world compatibility
● Error reduction
● Minimalist and attractive design
● Consistency and regularity
● User friendly
Testing Deliverable: The databases produced using SQL, the time-box plan for functional
and non-functional needs, and the construction of screen designs with design tools are all
examples of implementation deliverables. User friendliness, match with real-world system,
simple design, consistency, mistake prevention, and so on are some of the testing
deliverables.
Evaluation Deliverable: Whole project assessment, which improves the project, aims and
objectives evaluation, comparable system evaluation, and justification mode evaluation are
among the evaluation outputs.
14 | Page
1.7 Estimate Cost and Duration
1.7.1 Hardware Cost
15 | Page
1.7.3 Development Cost
Category Cost
Software 4,689,880 MMK
Hardware 25,609,960 MMK
Development 5,117,980 MMK
Total 35,417,820 MKK
16 | Page
1.8 Project Plan (Gantt chart)
17 | Page
Fig (4) Chapter 3 – Feasibility study
18 | Page
Fig (7) Chapter 6 – Deployment
19 | Page
Chapter-1
Introduction
20 | Page
1. Chapter – 1 Introduction
The Hotel Elysium is a luxury hotel in London's premium Mayfair area, located on Park Lane
and facing Hyde Park. It is 100 meters (328 feet) tall, with 28 stories and 453 rooms, including
56 suites, as well as a Michelin-starred restaurant on the top floor, Galvin at Windows. On
October 28, 1986, the Hotel Elysium officially opened its doors. Designed by William Jone, an
American architect who has worked on multiple Hilton hotels, the building is a concrete-
framed structure. A skyscraper hotel with more than 500 rooms was erected in London for the
first time in the city's history. The Pools Panel met every Saturday in a hotel conference room
starting in 1989. Hotel fire broke out on February 19, 2012. There were no deaths or injuries,
and just a few stories of the building sustained minor damage in the fire. This hotel hosted
members of the International Olympic Committee and other high-ranking officials who
attended the 2012 Summer Olympics in London. The current system processes are room
category display, design and facility displays, employee record keeping system process,
visitor registration and booking system. The current system has some issue. That are time
running out issue, record keeping system, lack of security, higher cost issue and information
changes issue.
21 | Page
1.2 SWOT Analysis (Current System)
Strengths
It is more trustworthy since it is a traditional mode of payment. People continue to trust and
utilize bank checks and drafts for payment. Payments made offline are direct and do not
depend on any other source. It's also simple to pay for, book, and rent a room. Many
visitors find it difficult to make payments online. The visitor may ask all of the detailed
questions at once and get immediate responses.
Weaknesses
The biggest weakness is lack of security in this project. Using paper document can be less
secure than computerize system. Visitor or customer wants to secure their information in
hotel’s hands. A file is much more accessible than a computer, which needs a password and
permissions to access.
Opportunities
Visitors/Customers' trust and convenience are improving as a result of the existing system. As
a result, the system will have a considerably larger number of branches in other cities. The
system must be capable of processing credit cards, debit cards, and other types of
transactions. There are many more chances available if expectations are raised and turned
into reality.
Threats
It's possible that prospective competitors may grow over time. If the system is not upgraded or
improved sufficiently to prevent the assaults, there will be further dangers. Even a little
influence may have a negative impact on the user's convenience, causing users to lose faith
in the system and refuse to pay the price. By continuing the threats, this degree of
seriousness may be decreased to non-serious. Daniel of services to the booking servers
presents a severe and risky danger, resulting in the loss of contactless payment users, identity
theft for client data, and income loss. As a result, such dangers must be dealt with in order to
lessen the possibility.
22 | Page
1.3 Proposed System Scope (Details Explain)
The suggested system allows customers to book rooms through the internet using a web-
based application. They will be able to see information about the lodgings, activities, and a
short history of the hotel, as well as book rooms online. The new technology will first
determine if the reservation is for a personal or professional trip, after which the normal
booking procedure will begin. A visitor or a group of guests may look at the room details and
hotel facilities before booking the room of their choice. The staff will evaluate the booking
request and see whether the selected accommodation is available throughout the booking
process. If it is, the reservation has been confirmed. The attendees will get a confirmation
email as part of the confirmation process. Customers may check the most up-to-date housing
fees and services using the suggested system. This new system also accepts a variety of
payment methods, allowing users to pay fees using cash, credit, or other payment cards.
Customers will save time and effort since they will be able to visit the hotel at any time and
from anywhere. The hotelier and the visitors will be more productive as a result of this
suggested system, and the hotel will face fewer dangers and expenses. This computerized
method is safe and secure, and the odds of mistakes such as cost miscalculation are quite
unlikely. Hotel Elysium may easily advertises their company via different social media
platforms, launch campaigns, offer packages and add-ons online, and so develop stronger
marketing plans, thanks to this technology, which is a big advantage of an online hotel
reservation system.
23 | Page
1.4 Aims & Objectives of the Project
The suggested system's major purpose is to put hotel reservation systems' processes
online. The goal of this system is to give customers looking for hotel rooms with reliable
information about available accommodations and to allow room bookings to be made without
mistakes or disputes.
The other is always open for bookings, meaning that the reception is open 24/7 a
week. In other words, clients may make a reservation anytime it is convenient for them,
without the need for workers to be there.
Objectives
● Research and analysis of the current business history and background (2days)
● Research and analysis of the current business processes (2days)
● Research and analysis of the current business issues (2days)
● Investigation about the current business issues (1day)
● SWOT analysis of the current system (1day)
● Calculate the hardware, software, and development costs, as well as the total cost
of the proposed system (1day)
● Calculate the duration of the project plan (1day)
Feasibility (2 days)
24 | Page
Analysis the business requirement (8days)
25 | Page
Evaluation against aim and objectives (3days)
26 | Page
1.5 Short overview of the remaining chapters
A summary of the next chapters is provided below; they are as follows: Chapter (2) is
concerned with the comparison of similar products, as well as the introductions and functions
of the products. A feasibility study is discussed in Chapter 3, which includes specifics on the
methodology, programming languages, and databases that will be utilized in the
implementation, as well as other pertinent information. Chapter 4 titled "Foundations"
discusses the types of users, functional and non-functional needs of the database, MOSCOW
prioritization, a time-box strategy, as well as risk management for the whole system, among
other things. Exploration and Engineering are covered in Chapter 5, and here is where the
design of the web-based application is put to the test. The deployment chapter, which includes
data migration and a deployment diagram, is covered in detail in Chapter 6. Chapter 7 is
concerned with the assessment of the results in relation to the goals set out in the preceding
chapters.
27 | Page
Chapter-2
Similar Product Comparison
(Investigation)
28 | Page
2. Chapter-2 Similar Product Comparison
chatrium.com
Chatrium Hotel Royal Lake Yangon is located in Kandawgyi Lake Area, a neighborhood in
Yangon, and is in the business district and on a lake. Karaweik Palace and Chaukhtatgyi
Pagoda are notable landmarks, and the area's natural beauty can be seen at Kandawgyi
Lake. Don't miss out on a visit to Yangon Zoological Gardens.
A body treatment, a facial, and a body scrub may all be enjoyed at Nemita Spa, which is
conveniently located on the facilities. Make a point of dining at one of the three on-site
restaurants, which serve Japanese cuisine and provide beautiful garden views. There are
yoga sessions available in the gym, and the resort also has a patio, on-site shopping, and a
coffee shop/café. In addition to a garden and a hair salon, visitors may take use of
complimentary WiFi in their rooms. Comforts like as 24-hour room service and pillow menus,
as well as conveniences such as laptop-friendly workplaces and air conditioning, are available
in each of the 300 tastefully equipped rooms. The comfy and large rooms at the resort have
received overwhelmingly positive feedback from guests.
Fig (1.1) Chatrium Hotel Royal Lake Yangon home page design
29 | Page
panpacific.com
Take use of the on-site spa's reflexology services as well as body treatments and massages
such as Thai massages. Make a reservation at one of the three on-site restaurants, which
provide international cuisine as well as breakfast on weekends. All guests have access to free
WiFi in their rooms, as well as a coffee shop/café and a garden at the property. Comforts like
as 24-hour room service and luxury linen are provided in all 336 rooms, as well as thoughtful
details such as pillow menus and laptop-compatible safes. The property's nice
accommodations have received overwhelmingly good feedback from guests.
30 | Page
2.2 Functional Comparison
(1) Guest Registration
chatrium.com
User or Guest registration system of Chatrium Hotel is clean and simple. There are two
options sign up and sign in for this registration form. In registration process guest can register
with google account, Email, face-book account and their registration method (Join now). And
then sign in with registered account or method. This user interface is very simple and esay-to-
understand.
31 | Page
panpacific.com
Fig (1.2) Guest Signup Form from Pan Pacific Yangon Hotel
This form design is more simple and clean than the Chatrium Hotel form design. If the visitors
do not already have a registered account with which to login (sign in), they may create one by
clicking on the register button on this page.
32 | Page
(2) Room Type and Room Detail
chatrium.com
Wake up to the wondrous vistas of Kandawgyi Lake and the iconic Shwedagon Pagoda,
mesmerising sights that can be enjoyed from the private balcony of your room at our hotel in
Yangon.
These luxurious living spaces combine stylish elegance with a diverse range of contemporary
conveniences; some of the special highlights include complimentary high-speed Wi-Fi
internet, the latest in-room entertainment and even a pillow menu to ensure blissful dreams
each night.
33 | Page
panpacific.com
Fig (1.4) Room type and Detail Form of Pan Pacific Hotel
Pan Pacific Hotel's rooms and suites offer modern accommodation with stunning views of
Yangon’s skyline and Shwedagon Pagoda. Featuring floor-to-ceiling windows, well-appointed
furnishings and premium amenities, a luxurious stay awaits at 5-star hotel in Yangon.
34 | Page
2.3 Non-Functional Comparison
● 10 Usability Heuristics
The system should constantly keep users up to date on what is going on and provide detailed,
suitable feedback in a timely manner. The user has no means of knowing what's going on
behind the scenes without sufficient feedback. For example, if a user is browsing a web
application and does not identify the page they are on or is not getting a response from the
system, they won't know whether to wait, repeat the operation, or try something else.
chatrium.com
Chatrium Hotel shows its users which page they are seeing at the moment
35 | Page
panpacific.com
36 | Page
0. Match between system and the real world
When making the design, it should include words that are friendly to the people who are
going to use it. Use words, phrases, and concepts that the person who is using the app
will understand not internal jargon. People in the real world do things in a certain way, so
they put information in a natural and logical way.
chatrium.com
This is the text in chatrium.com for
user help information. The service
is clear and realistic and gives
users comfort.
37 | Page
0. User control and freedom
Users often want to see clearly throughout the page they are currently viewing and they don’t
want any other popups appearing on it.
chatrium.com
This is the pop-up ads on chatrium.com to tell
about the event for the visitors. It always
appears when user opens their web-site.
38 | Page
0. Consistency and standards
No one should wonder if two words or actions mean the same thing. Traditions and rules in
your field should be followed.
chatrium.com
panpacific.com
39 | Page
0. Error prevention
While effective error messages are critical, the greatest designs meticulously avoid issues in
the first place. Either shows the problem in the message box, or check for them and prompt
users for confirmation before committing to the action.
chatrium.com
Chatrium Hotel lets us know that about the room discount within event.
40 | Page
panpacific.com
41 | Page
0. Recognition rather than recall
Make objects, actions, and choices visible to reduce the user's memory load. The user should
not have to recall information from one conversation segment to the next. When possible,
instructions for using the system should be visible or readily accessible.
chatrium.com
Chatrium showing different navigation options all over the screen for hotel related events and
information.
42 | Page
panpacific.com
Pan Pacific showing different navigation options all over the top of the screen for room related
information.
43 | Page
0. Flexibility and efficiency of use
Shortcuts that are concealed from newbies may speed up interaction for experts, allowing the
design to appeal to both rookie and experienced users. Allow users to customize their routine
tasks.
chatrium.com
panpacific.com
Show the different room types and room
details to the visitors
44 | Page
0. Aesthetic and minimalist design
Information that is irrelevant or only sometimes required should not be included in dialogues.
In a discourse, each additional unit of information competes with the relevant pieces of
information, lowering their relative exposure.
chatrium.com
With important information and relative exposure, this is an attractive and basic design.
panpacific.com
With important information and relative exposure, this is an attractive and basic design.
45 | Page
0. Help users recognize, diagnose and recover from errors
Error messages should be expressed in plain language (no error codes), precisely indicate the
problem, and constructively suggest a solution.
chatrium.com
46 | Page
panpacific.com
Pan Pacific Hotel uses an error text that states there are no available check-in/check-out
dates, ensuring that the issue is recoverable, and user-friendly verbiage to reduce user panic.
47 | Page
0. Help and documentation
Even though it is preferable if the system can be utilized without documentation, assistance
and documentation may be required. Any such material should be simple to find, concentrate
on the user's job, have a list of specific actions to follow, and not be too big.
chatrium.com
Chatrium Hotel has given the users a description page about them to get the help on the user
queries which is very well presented and organized.
48 | Page
panpacific.com
Pan Pacific Hotel has given the users a description page about them to get the help on the
user queries which is very well presented and organized.
49 | Page
Chapter-3
Feasibility Study
50 | Page
3. Chapter-3 Feasibility Study
3.1.1 Methodologies
A. Definition
DSDM (Agile)
The Dynamic Systems Development Method (DSDM) is an agile methodology that covers the
whole project lifecycle and its business implications. DSDM is an iterative method to software
development, similar to the larger agile mindset, and its framework specifically specifies that
"each project must be linked to clearly defined strategic objectives and concentrate on early
delivery of actual benefits to the company." Feasibility and business research, functional
model and prototype iteration, design and build iteration, and implementation are the four
pillars of the framework. DSDM is an eight-principle framework with a lifecycle and products,
roles and responsibilities, and best practice practices. It's also a well-organized, common-
sense method for swiftly and effectively providing business solutions.
51 | Page
Scrum
Scrum is an agile project management method that is often used in software development.
Scrum is generally thought of as a technique for agile software development, but instead of
thinking of it as a methodology, think of it as a framework for managing a process. Scrum's
basic knowledge includes the framework, values, various roles, meetings, backlogs, and
increasing efficiency and quality.
● Scrum teams are supported by two distinct responsibilities in agile development. The
first is a Scrum-Master, who acts as a team coach, guiding team members through the
Scrum process so they may perform at their best. The other position in Scrum software
development is the product owner (PO), who represents the company, customers, or
users and steers the team toward producing the correct product. (Peek, n.d.)
Strength of DSDM
● Invites stakeholders to participate in the development process.
● Business value is recognized and anticipated to be the highest priority delivery, since it
is designed from the ground up by business people.
● Provides a method that is not reliant on any one approach
● Business value is recognized and anticipated to be the highest priority delivery, since it
is designed from the ground up by business people.
● Sets the expectation among stakeholders from the beginning of the project that not all
needs will be included in the final output. (CheckyKey, n.d.)
Weakness of DSDM
● Requires complete dedication to the DSDM process, extensive user participation, and
a highly experienced development team in both the business and technical sectors.
● Defines a number of artifacts and work deliverables for each project phase
● A consortium controls access to the content, and fees may be levied solely to access
the reference material.
● Requires a well-rounded development team with expertise in both business and
technology.
52 | Page
● A consortium controls access to the content, and fees may be levied solely to access
the reference material.
● Requires a highly experienced development team with expertise in both business and
technology. (CheckyKey, n.d.)
Strength of Scrum
● According to Scrum Alliance, reviewing each sprint before going on enables teams to
modify the scope or direction of the project at any time.
● The project criteria are not specified, but the timeline and budget are.
● As a result of the product owner's engagement in the project management process,
stakeholders and participants expect improvements.
● Scrum makes it simple to fix errors.
● Easy visibility of all phases of the process.
● Scrum guarantees greatest outcomes by including customers. (simpliaxis, n.d.)
Weakness of Scrum
● A project with no clear description is difficult for the Scrum master to plan, manage,
and organize.
● Scrum's constraints also include the fact that daily Scrum meetings and regular
reviews need a significant amount of time and effort.
● This technique necessitates the scrum master's faith in their team. Strict governance
may result in the project's failure.
● There is no predetermined time limit or cost valuations, which allows it to be expanded
to many sprints. (simpliaxis, n.d.)
C. Comparison of Methodology
Criteria DSDM Scrum
53 | Page
Project Scope The application scope Product vision, the release goal, and
encompasses the whole project the sprint goal
lifespan and development process.
User User emphasized more on the In Scrum, customers or end users
active user involvement during the are stakeholders of the product
project life cycle under developed.
Team Two teams, one group takes the The Scrum Teams are self-
responsibility to run the tests whilst organizing and cross-functional: Self-
the rest group is to deliver organizing teams choose how best
to accomplish their work, rather than
being directed by others outside
the team.
Features Users are significantly engaged in Scrum focuses on providing the
the development process of DSDM customer with high business value in
projects, which are concerned with the shortest amount of time feasible.
finishing on time and on budget. As
a result, it is necessary to keep a
watch on what consumers need the
most.
Feasibility, Foundations, Evolutionary Development, and Deployment are the four primary
steps of the DSDM process. These stages make up the lifetime of our projects, ensuring that
we don't go on to the next step unless we've achieved the desired results. Frequently, teams
54 | Page
rush into development without completely comprehending the scale and magnitude of
projects, thoroughly analyzing the risks, and, when feasible, performing the appropriate
feasibility measures to guarantee the unknowns are correctly comprehended.(Boog, n.d.)
55 | Page
3.1.2 Programming Languages
A. Definition
PHP
PHP is a free scripting language and interpreter that is widely used on Linux Web servers.
PHP (Hypertext Preprocessor), which is evolved from Personal Home Page Tools, is a widely
used open-source general-purpose scripting language that is particularly well-suited for most
well-known operating systems such as Linux, Unix, Solaris, Microsoft Windows, MAC OS, and
many more. It also works with a wide range of web servers, including Apache and IIS. Web
developers who use PHP have the option to use whichever operating system and web server
they choose. (php, n.d.)
Python
Python is a popular high-level programming language for general-purpose applications.
Guido van Rossum established it in 1991, and the Python Software Foundation continues to
develop it. Its syntax was created with code readability in mind, allowing programmers to
communicate their ideas in fewer lines of code.
Python is a dynamically semantic, interpreted, object-oriented high-level programming
language. Python's concise, easy-to-learn syntax prioritizes readability, which lowers software
maintenance costs. Modules and packages are supported by Python, which fosters program
modularity and code reuse. The Python interpreter and its substantial standard library are free
to download and distribute in source or binary form for all major platforms. (python, n.d.)
56 | Page
B. Strength and Weakness of each Programming Languages
Strength of PHP
● Managing the codes is a simple process.
● It is open source and free of charge, and it is often downloaded from anywhere and
easily accessible for use in the development of web-based applications.
● PHP-based programs may operate on any operating system, including UNIX, Linux,
and Windows, among others, and are referred to be platform agnostic.
● With the aid of providing continual maintenance to different versions, the stability will
improve after a few years. (technosophos, n.d.)
Weakness of PHP
● Client-side scripting is impossible since PHP is a server-side language. So, running
several PHP apps may slow down the server.
● Error Handling - PHP's error handling is rudimentary. Most issues can be solved via
coding.
● Don't share resources - PHP doesn't do that. Process framing helps PHP avoid
problems like memory leaks and system failures. But this has led to additional
constraints.
● Too flexible - This is both strength and a weakness of PHP. When a lack of experience
meets a language that is too flexible, poor code quality or too many technical debts
result. The PHP project maintenance is poor. (Phan, n.d.)
Strength of Python
● Python is a high-level programming language with an English-like syntax that makes
the code easy to read and comprehend.
● Python is a tremendously productive language, and its simplicity allows developers to
concentrate on the job at hand.
● Python is an interpreted language, which means that the code is executed line by line
by Python.
● Python is released under an open-source license that has been authorized by the OSI.
As a result, it is both free to use and share.
● Many languages, such as C/C++, need code modifications in order to operate on
multiple platforms. Programs written in Python may run on any platform.
57 | Page
Weakness of Python
● Python applications that are executed line by line are notoriously sluggish.
● Python must make a sacrifice in order to give developer simplicity. The Python
programming language consumes a lot of RAM.
● Python is often used in server-side programming since it is memory inefficient and has
slowdown processing power.
● Python programming is simple and stress-free. However, when communicating with
databases, it falls short. Python is seldom utilized in organizations since they need
seamless interaction of complicated legacy data.
● Because Python is a dynamically typed language, variable data types may change at
any moment. In the future, a variable holding an integer number may retain a string,
resulting in Runtime Errors. (kcpelearning, n.d.)
58 | Page
supported. Furthermore, since it is more accessible and less expensive to set up, this is the
finest language for web development.
59 | Page
3.1.3 Databases
A. Definition
MYSQL
MySQL is a free database management system. However, if you want to utilize sophisticated
features, there are numerous premium versions available. In comparison to other database
software such as Microsoft SQL Server and Oracle database, MySQL is simple to use. It
works with any programming language, although it's most popular with PHP.
Because of its Web-optimized features like HTML data types and the fact that it's free, MySQL
is particularly popular for Web-hosting applications. It's part of the LAMP (Linux, Apache,
MySQL, PHP) architecture, which is a collection of platforms for delivering and supporting
complex Web applications. (Moore, n.d.)
Microsoft Access
Using a graphical user interface (GUI), tasks may be completed. Furthermore, high-level
users may construct or change queries using SQL code. (Cooper, n.d.)
60 | Page
B. Strength and Weakness of each Databases
Strengths of MYSQL
● MySQL is simple to set up and operate, and since a variety of third-party tools
may be added to the database, the implementation process is also
straightforward.
● MySQL has always been a quick database, thanks to its simplicity. MySQL has
gained traction in the corporate industry in recent years as a result of additional
"enterprise" features.
● Any open-source database, MySQL has the most market share. MySQL
access is available from almost every web hosting business, and books and
articles regarding MySQL and PHP abound.
● Most other database alternatives on the market are much more costly than
MySQL.
● Despite the fact that MySQL's popularity has fallen in recent years, it remains
one of the most widely used database systems in the world. (learning, n.d.)
Weakness of MYSQL
● When you use a lot of stored procedures, the memory utilization of every
connection that uses those stored procedures will skyrocket.
● Stored procedures are difficult to debug, because mysql lacks the necessary
tools.
● It's not straightforward to create and maintain stored procedures. They often
demand a particular skill set that not all application developers possess, which
may cause issues during both the development and maintenance stages of the
program. (learning, n.d.)
61 | Page
Strengths of Microsoft Access
● When it comes to inserting information into the database, it is a finite database system
with a wall that may be hit at some point.
● The data is stored in a single file that is closed to the maximum size allowed by the
database application. The one-file format slows down the program's speed.
● Multimedia data is challenging to integrate into Microsoft Access because of the one-
file saving limitations and the fact that multimedia data takes up a lot of space.
(northgate, n.d.)
62 | Page
C. Comparison of Databases
63 | Page
3.2 DSDM Feasibility (DSDM eight principles)
DSDM teams have a number of tools at their disposal to help them follow this philosophy. The
MoSCoW approach, for example, aids the team in identifying which business needs Must,
Should, Could, or Won't be achieved. The DSDM foundation phase also aids the team in
gaining concentration. Team roles are created during this phase. The team then develops an
overarching plan, deciding how risk and quality will be evaluated, as well as how technology
will be deployed and the project managed.
Principle 3 – Collaborate
For DSDM teams, team spirit and cooperation are critical. This is due to a dislike of having
several departments that only contact seldom. Instead, teams should function as a single unit
and interact to foster understanding, improved performance, and shared ownership. Instead of
having business and technical workers working independently, DSDM teams follow this idea.
On DSDM projects, quality is always fixed and must be set from the start. The final product
should not be of a higher or lower quality than the one chosen. To follow this approach, DSDM
teams must test and evaluate continually to guarantee that quality does not become a
variable. This testing and evaluating takes place throughout the iterative development stages
64 | Page
of 'exploration' and 'engineering.' MoSCoW and time-boxing may be utilized to guarantee that
testing is acceptable and well-organized once again.
The greatest strategy to provide high-quality items on schedule is to complete each project
step by step or progressively. Developers must be able to offer business value as soon as
feasible, and reevaluate priorities with each increment.
DSDM allows for change during a project and use iterative development to arrive at a precise
business answer. Stakeholder satisfaction rises as a result of incremental delivery, which
enables for such change to be accepted. Testing, demonstrations, and feedback are all part of
each iteration. This guarantees that each iteration improves on the previous one, resulting in a
satisfactory final product.
Poor communication may have an impact on the project's success. Stakeholders must work
together to maintain the quality of project delivery via daily stand-ups and meetings.
For the long-term benefit of all stakeholders. To keep track of development, one must be
proactive. Increase work flow by using the time-box approach and evaluating it on a regular
basis. It also assesses the project's long-term viability.
(Gisclard-Biondi, n.d.)
65 | Page
3.3 Possible LESPI (Legal, Ethical, Social and Professional) Issues
Legal Issues
Ethical Issues
An ethical issue in business is a circumstance in which a moral conflict develops and must be
resolved, implying that a moral norm is being questioned.
When a choice, situation, or behavior conflicts with a society's moral standards, ethical
dilemmas arise. Individuals and corporations alike may be entangled in these conflicts, since
any of their actions may be questioned on ethical grounds. Individuals, as well as
organizations, are affected by these challenges in their connections with one another and with
organizations. (myaccountingcourse, n.d.)
Social Issues
In today's corporate environment, there are several social responsibility challenges. Based on
the objectives of management and employees, as well as problems that worry the customer
base and the areas in which the firm's business works, each organization must determine the
concerns that are important to its operations. The first step in tackling social concerns in
company management is to be aware of these objectives. Many of these concerns have
previously been addressed, including discrimination in employment practices, labor unions,
charity giving, support for educational institutions, marketing of anti-social items, export of
products, and modernization politics. These concerns are driving management to reflect on
their duties, which have shifted from profit-generating operations to being responsive to
community demands. (academies, n.d.)
66 | Page
Professional Issues (BCS Code of Conduct)
The BCS Code of Conduct serves as a unique and powerful endorsement of the integrity and
as a code of ethics for IT professionals. The BCS code of conducts include
a. Public Interest
● Regard for the public health, safety, and environment.
● Regard legitimate rights of third parties.
● Have knowledge of comply with relevant legislation, regulations, and standards.
● No active or passive bribery.
67 | Page
Chapter-4
Foundations
68 | Page
4.1 Target User
As a company, determining the target audience may aid in the development of marketing
strategies and the identification of key consumers. Defining a target audience enables for
more focused and personal outreach to people most likely to buy the company's product or
service, rather than wasting money and resources attempting to cater to every customer.
69 | Page
4.2 Functional Requirement
1. Manage Room Process
70 | Page
2. Manage Booking and Payment Process
71 | Page
4.3 MOSCOW Prioritization
Must
Must Justification
Manage Booking Process A secured booking procedure is required to establish a safe
and secure connection between two persons. Information
such as start date, finish date, and client relevant
information for the user to choose is also vital for consumer
trust. From a technological standpoint, the booking system
should be able to help customers discover what they need
quickly, as well as provide availability throughout the day.
Should
Should Justification
Manage Payment Process Different payment mechanisms will be available in the app
when the organization uses it. Cash or online payment
options are available. Online payments, also known as digital
payments, have become an essential instrument for
improving financial inclusion in recent years, since they
reduce the cost of delivering financial services while also
increasing security and convenience.
72 | Page
4.4 Non-Functional Requirements (4)
1. Usability
Usability refers to features that cater to the demands of the user. It employs user-centric
design approaches to guarantee that features are effective and simple to use. The major
aspects are accessibility, which means that the program can be accessed from a variety of
devices, and clarity, which means that the program was created not to demonstrate design
talents but to meet the needs of the users. The major program functions of recognition are
identical to those of the others, including Credibility refers to the users' ability to trust the
company and its objectives. Relevance refers to whether or not the material that consumers
see on the show is interesting.
2. Security
Security features protect the program against espionage or sabotage. This is the most
significant and critical aspect of every website that has ever been on the internet. Vulnerability
testing must be done on a regular basis to ensure the security of the user's information and
credentials. The website also requires an SSL certificate (Secure Sockets Layer), which is a
required site protocol for security. Even for stand-alone systems, these qualities are required.
3. Performance
In non-functional criteria, system performance is the most essential quality, and it influences
practically all of the others. Under a certain workload, system performance refers to how
quickly a system can react to a specific user's activity. This is about making websites load
quickly, as well as making sluggish procedures seem to load quickly. For example, whether
the site loads fast or not, and whether or not the user is allowed to begin engaging with it right
away, as well as feedback if anything is taking too long to load (For example, A loading
spinner). Reduce total load time, make the site useful as quickly as feasible, smoothness and
activity, perceived performance, and performance metrics are the essentials. With the
website's poor performance and
4. Interface
The user interface is the means through which web users communicate with their computers.
It determines the user's experience while interacting with online applications, and
characteristics such as reaction speed, visual attractiveness, and responsiveness are some of
the trademarks that characterize web application design success.
73 | Page
5. Operational
6. Resource
A resource page is a web page that contains useful information on a certain subject. Anything
that may be downloaded via the World Wide Web is referred to as a web resource. Online
pages, emails, database information, and web services are all well-known examples.
7. Portability
The portability, like in data portability, enables you to reuse the site's content across a variety
of apps. Data portability is a critical aspect in the website's success. Data portability makes it
simple to download information that may be required in the future, which is beneficial to the
website's prospective growth and user convenience.
8. Reliability
It is possible for software or hardware resources to fail. Make sure you have a backup plan in
place when dealing with key online apps. Multiple hosting, load balancing, and failovers
should all be part of your approach. It will assist you in ensuring that the web app and data are
not harmed in the event of a web server failure. Discuss what constitutes an appropriate
failure assistance.
9. Maintainability
Maintainability is a term that refers to the likelihood of conducting a successful repair activity in
a certain amount of time. The website's maintainability is also required for non-functional
criteria. If a failure occurs, the system's maintainability assesses the ease and speed with
which it can be returned to operating state.
10. Safety
The website's security ensures that the users have trust in the website. Knowing what
constitutes a secure website may go a long way toward protecting users' personal information
and is more demanding than hazardous ones.
74 | Page
11. Recovery
In the non-functional criteria, the ability to restore data from the website is a necessary.
75 | Page
4.5 Time box Plan
76 | Page
Time box 2: Manage Booking and Payment Process Time box
77 | Page
4.6 Risk Management
Risk
Future uncertain occurrences having a chance of occurring and the potential for loss are
referred to as risk. Every project's primary issue is risk identification and management.
Successful risk management analysis will aid in effective job planning and assignments.
Risk Management
The process of discovering, analyzing, and managing risks to an organization's capital and
profitability is known as risk management. Threats, often known as hazards, may arise from a
range of causes, including financial uncertainties, legal obligations, strategic management
mistakes, accidents, and natural catastrophes. The value of a risk management strategy
cannot be overstated in any manner. Implementing and executing the best feasible risk
prevention strategy is a critical component of risk management. (Tucci, n.d.)
Technical Risk
● Virus Detect
Some viruses are programmed to sabotage the workload and some are programmed to harm
the system and the computer by damaging programs and deleting files or reformatting the
hard-drive.
● Server Failure
Server failure is a prevalent problem that affects all sorts of businesses, and the cost of server
downtime may range from days without access to the loss of important corporate data,
resulting in operational challenges, service outages, and repair expenditures. A malfunctioning
server is indicated by frequent reboots and abrupt slowdown. Using server monitoring
software to maintain tabs on servers, carefully monitor vital systems, and get warnings for any
possible concerns may assist with the correct protocol and preventative maintenance.
● Data Duplication/Migration
Data duplication occurs when a data source has numerous records for the same item, but
with distinct syntaxes. The project's data becomes erroneous and outdated. The process of
transferring data from one place to another, from one format to another, or from one
78 | Page
application to another is known as data migration. During this procedure, the possibility of
data loss exists, posing a danger of losing critical project data.
● Broken Authentication
Broken authentication, it turns out, is the source of a lot of security concerns. This is mostly
due to a faulty implementation. Authentication and session management functionalities in
applications are often performed poorly. This enables attackers to steal passwords, keys, or
session tokens, or exploit other implementation weaknesses to temporarily or permanently
assume the identities of other users.
● Data Leakage
The unauthorized conveyance of data from inside an organization to an external destination
or receiver, which may be done physically or electronically, is known as data leakage. Data
leakage, also known as slow and low data theft, is a major concern for data security, and the
consequences for any company, regardless of size or sector, may be devastating. It's also
crucial to realize that this issue might originate from either an external or inside source. DLP
(Data Loss Prevention) is a method for ensuring that end users do not transfer private or
sensitive data outside of the company network. This system can quickly detect and regulate
any sensitive data, as well as identify the most dangerous people.
● Lack of communication
Project failure may be caused by a lack of communication. It may also be used to swiftly
segregate team members who have lost touch with the project's goals. Work is conducted in
silos and disagreements rapidly occur as employees lose track of finished and impending
tasks due to the fact that it is not tied to the plan and is out of the project manager's control.
79 | Page
● Coding
A runtime coding error occurs when anything confuses the computer and causes it to crash,
sometimes referred to as an accident.
80 | Page
Data Leakage High High Make sure to Put together a Database
encrypt all response Analyst and
sensitive data at team, identify Network
rest. the source Engineer
and spread,
protect the
network from
another attack
81 | Page
The Whole System Use Case
82 | Page
The whole system detailed class diagram
Explanation
The staffs record the registration of visitors, booking and booking detail, and room category
and room detail. Visitor can register and book the room that he/she wants to book. Booking
system will record the visitors detail, book detail, paymenttype, checkin and checkout date.
83 | Page
Chapter-5
Exploration & Engineering
84 | Page
5.1 Time-box 1: Manage Room Process Time-box Development
Project Plan for Time Box 1
85 | Page
● Register Room (Middle Level)
● Register RoomID (Low level)
● Register RoomName (Low level)
● Register RoomQuantity (Low level)
● Register RoomDescription (Low Level)
● Register RoomCategoryImage (Low Level)
● Register RoomPrice (Low Level)
86 | Page
5.1.2 Use Case Diagram
Flow of Event Fill the staff details in the staff register form. And click the “save” button
and the filled information is saved in the database
87 | Page
5.1.3 Screen Design
88 | Page
2) Staff Login Form
89 | Page
3) Staff Update Form
90 | Page
4) Room Register Form
91 | Page
5) Room Display Form
92 | Page
5.1.4 Class Diagram
Description << The staff class is used to do registeration for staff records, room records
and category records >>
93 | Page
5.1.5 Sequence Diagram for Managing Room Process
The Room management procedure is shown in this flowchart. During this procedure, the
employee logs in using his or her winning registered email and password. It will display a login
successful message after the login procedure is completed. He may verify staff details in the
staff login table after the login procedure is complete. When it's finished, the personnel may
register the room and its many classifications. He can also make changes to these tables. He
can also keep track of visitor information.
94 | Page
5.1.6 Functional Testing
Test Plan
Module 1: Staff Register
2.2 Test Staff Account has been 15- April- 2022 Bhone Myat
logged in successfully
95 | Page
5.1 Null check in the 15- April- 2022 Bhone Myat
room register form
96 | Page
Test Script (1): Staff Register
Unit Test 1 Test Case: Register by data entry Staff Designed by: Bhone Myat
Data Source: Staff Table Objective: To test the Register of data Tester: Bhone Myat
entry Staff
Test Case Description Test Procedure Expected Actual
Result Results
1.1 NULL check Clicking the “Save” button without filling Show See Fig.1.2
in the the textboxes in the form which makes ‘Please
register form it blank. enter the
data’
message.
Before Testing
Fig.1.1
After Testing
97 | Page
Fig.1.2
98 | Page
Test Case Description Test Procedure Expected Actual
Result Results
1.2 Test that Fill all the text boxes with valid data Show the See
Staff and click “Save” button. message Fig.1.1
Account has that account and 1.2
been has been
created successfully
created
Before Testing
Fig.1.1
After Testing
99 | Page
Fig.1.2
Unit Test 2 Test Case: Sign-in by data entry Staff Designed by: Bhone Myat
Data Source: Staff Table Objective: To test the Sign-in of data Tester: Bhone Myat
entry Staff
Test Case Description Test Procedure Expected Actual
Result Results
2.1 NULL check All the textboxes in this form are placed Show See Fig.1.2
in the Login as blank and click “Login” button ‘Please
form enter the
data’
message.
Before Testing
100 | Page
Fig.1.1
After Testing
Fig.1.2
101 | Page
Test Case Description Test Procedure Expected Actual
Result Results
2.2 Test that Fill all the text boxes with registered data and See
Staff data and click” Login” button. click” Login” Fig.1.2
account button.
have been Show the
logged in message
successfully that Staff
login is
successfully
and to the
home page
Before Testing
Fig.1.1
After Testing
Fig.1.2
Unit Test 3 Test Case: Updating by data Staff Designed by: Bhone Myat
102 | Page
Data Source: Staff Table Objective: To test if the staff account Tester: Bhone Myat
information is updated
Test Case Description Test Procedure Expected Actual
Result Results
3.1 Test that Click” Edit” link in the staff detail table. Show “Staff See Fig.1.3
staff Then update staff name from the form account has AND 1.4
account has by clicking “Update “button. successfully
been
successfully
updated
Before Testing
Fig.1.1
Fig 1.2
After Testing
103 | Page
Fig 1.3
Fig 1.4
104 | Page
Test Script (4): Staff Delete
Unit Test 4 Test Case: Deletign by data Staff Designed by: Bhone Myat
Data Source: Staff Table Objective: To test if the staff account is Tester: Bhone Myat
deleted
Test Case Description Test Procedure Expected Actual
Result Results
4.1 Test Staff Click “Delete” link in the staff detail Show the See Fig.1.2
account has table. message and Fig 1.3
been that the staff
successfully account is
deleted deleted.
Before Testing
Fig.1.1
After Testing
Fig 1.2
Fig 1.3
105 | Page
Unit Test 5 Test Case: Room Register by Staff Designed by: Bhone Myat
Data Source: Staff Table Objective: To test if room information Tester: Bhone Myat
is registered
Test Case Description Test Procedure Expected Actual
Result Results
5.1 NULL check Clicking the “Save” button without filling Show See Fig.1.2
In the form the textboxes in the form which makes ‘please fill
it blank. out this
filed’
Before Testing
Fig.1.1
After testing
Fig.1.2
106 | Page
5.2 Test that Fill all the text boxes with valid data Show the See
room has and click ”Save” button. message Fig.1.2
been that room
successfully has been
Registered. successfully
registered
Before Testing
Fig.1.1
After Testing
Fig.1.2
107 | Page
5.1.7 Usability Testing
Explain Staff can understand what data to complete in the Staff Register form by reading at
the placeholder words in the textboxes.
The design of this home page is developed attractively to attract more people.
108 | Page
Consistency and standard
The Room Registration form is used to register rooms, and proper room data is entered into
the form, allowing users to be more consistent.
109 | Page
Error Prevention
Staffs may see that he left the textboxes unfilled on this Staff Registration form and can try to
fill them up again. Staffs may also see whether incorrect data is entered in the login form,
allowing them to fix it.
110 | Page
5.1.8 Time box Summary
Wok Done
The purpose of Time-box 1 is to specify how all tables are registered, updated, deleted, and
displayed. Then there are three degrees of functional requirements: Low-Level, Mid-Level,
and High-Level. The administration and display procedure, as well as its explanations, are
shown in the use case diagram. The basic and thorough class diagrams are then created.
After these class diagrams, the sequence diagram appears, and its procedures are outlined.
The system design is started initially, followed by the functional requirements. Because this is
a huge system that takes a long time to complete, it will take 19 days to complete. After the
implementation is finished, all of the functional and non-functional requirements are tested.
Finally, the system's display process is presented to users for comments and requirements.
Problems (Issues)
Some coding and difficulties are produced throughout the construction of the management
and presentation procedure. Some of the pages in the registration section lead to unrelated
pages. Updated data is not shown correctly in the update area. Only errors were shown when
the data was entered into the tables. The tester then made some modifications to the system,
which now displays no problems or success signals.
Solutions
The needed variables, methods, and actions are extensively examined for displays that did
not display correctly. The room data allocated to the room table is not shown as intended in
the solution because the insert statement is used in the category, causing the insertion of
room data to an unrelated table. This is solved by properly applying the codes and syntaxes.
Remaining Time-boxes
The booking and payment procedure takes up the last timeframe of this project. The
registration, login, update, and storage of the guest's booking data will all be included in this
timeframe.
111 | Page
5.2 Time-box 2: Manage Booking and Payment Time-box
Development
Project Plan for Time Box 2
112 | Page
1.2 Manage Booking (High level)
● Record Booking (Middle Level)
● Record BookingID (Low level)
● Record BookingDate (Low level)
● Record TotalOccupancy (Low level)
● Record CheckinDate (Low Level)
● Record CheckoutDate (Low Level)
● Record PaymentType (Low Level)
● Record CardNo (Low Level)
● Record SecurityNo (Low Level)
● Record Month (Low Level)
● Record Year (Low Level)
113 | Page
5.2.2 Use Case Diagram
Flow of Event Fill out the guest information, choose a room, and complete the
booking
114 | Page
5.2.3 Screen Design
115 | Page
2) Guest Login Form
116 | Page
3) Guest Update Form
117 | Page
4) Room Display
118 | Page
5) Room Details
119 | Page
5. Room Cart
120 | Page
6. Booking and Payment
Fig (1) Low level prototype for room booking and payment
Fig (2) High level prototype for room booking and payment
121 | Page
5.2.4 Class Diagram
122 | Page
Detail Class Definitions
Description << The Guest class is used to do register for guests who book rooms>>
123 | Page
5.2.5 Sequence Diagram for Booking and Payment Process
This is a flow chart for the booking and payment procedure. During this procedure, the visitor
uses his own registered email and password to log in. Alternatively, the visitor may create his
own account and get a login success message after the procedure is completed. He may see
the rooms on the display page after the login is complete. He may reserve and pay for the
room he wants. When it is successful, the information is saved in the "Booking" table, and the
message "Booking Successful" is shown.
124 | Page
5.2.6 Functional Testing
Test Plan
Module 1: Visitor Register
1.2 Test email address already 20- April- 2022 Bhone Myat
exists
125 | Page
Unit Test 1 Test Case: Register by data entry Designed by: Bhone Myat
Visitor
Data Source: Visitor Objective: To test the Register of data Tester: Bhone Myat
Table entry Visitor
Test Case Description Test Procedure Expected Actual
Result Results
1.1 Test null 'Register' button is clicked and Show See Fig.1.2
check in the textboxes are blanked. ‘Please fill
form out this
field’
message.
Before Testing
Fig.1.1
After Testing
126 | Page
Fig.1.2
127 | Page
Test Case Description Test Procedure Expected Actual
Result Results
1.2 Test email Type the email address which is Show See
address is already existed and click save. “Email Fig.1.2
already address is
exists. already
existed”
message.
Before Testing
Fig.1.1
After Testing
128 | Page
Fig.1.2
Before Testing
129 | Page
Fig.1.1
After Testing
Fig.1.2
130 | Page
Unit Test 2 Test Case: Sign-in by data entry Designed by: Bhone Myat
Visitor
Data Source: Visitor Objective: To test the Sign-in of data Tester: Bhone Myat
Table entry Visitor
Test Case Description Test Procedure Expected Actual
Result Results
2.1 NULL check All the textboxes in this form are also Show See Fig.1.2
in the form placed as blank. And Click the “Login” ‘Please fill
button. out this
field’
message.
Before Testing
Fig.1.1
After Testing
131 | Page
Fig.1.2
132 | Page
Test Case Description Test Procedure Expected Actual
Result Results
2.2 Test that All textboxes in the form are entered Show the See
Visitor with the registered data. Click the message Fig.1.2
Account has “Login” button. that “login is
successful”
been logged
and take the
in guest to the
successfully “Home”
Page.
Before Testing
Fig.1.1
After Testing
Fig.1.2
133 | Page
Test Case Description Test Procedure Expected Actual
Result Results
2.3 Test that All textboxes in the form are entered Show the See
Visitor with the invalid password or email. message Fig.1.2
Account Click the “Login” button. that Visitor
login is
login error
successful.
Before Testing
Fig.1.1
After Testing
Fig.1.2
134 | Page
Unit Test 3 Test Case: Test the booking form Designed by: Bhone Myat
Data Source: Visitor Objective: To test the visitor booking is Tester: Bhone Myat
Table successful.
Test Case Description Test Procedure Expected Actual
Result Results
3.1 Test the Click the ‘Make Checkout’ button. Show See Fig.1.2
Visitor ‘Visitor
booking is Room
successful. Successfully
Reserved!
‘Message.
Before Testing
Fig.1.1
135 | Page
Fig1.2
After Testing
Fig.1.3
136 | Page
5.2.7 Usability Testing
In the guest registration form, the guests can understand what to do and how to fill by
looking at the placeholder texts in the textboxes.
137 | Page
Aesthetic and Minimalist Design
In this guest registration page the design is made aesthetically to attract more users.
Guest login form is used for guests to login their accounts. Guests can fill the valid data in the
form and then click “Login” button which makes users more consistent.
138 | Page
Error Prevention
In the Guest Login form, guests can know that he has made the textboxes blank and can
enter data into them. Also, if he has entered the wrong email or password, an error message
will pop-up so that he can reenter correct data again.
139 | Page
Recognition rather than recall
Guests can enter the same data again they have entered before by selecting the texts
appearing below the textbox which reduces the chances of recalling what they have typed in
before.
140 | Page
5.2.8 Time box Summary
The planning in Time-box 2 is to specify the booking and payment. The amount of functional
requirements for the booking and payment process are then divided into three categories:
Low, Mid, and High Level. After that, a use case diagram for the booking and payment
process is created, along with descriptions. Following that, the system's first and thorough
class diagram is created. Following that, a sequence diagram for the booking and payment
processes is developed, as well as a description of the procedure. After that, the system's
design begins. The implementation of the functional need in the system has begun after the
system designation is complete. Because this is the system's last time-box, the
implementation takes a long time, and this work takes 22 days to complete. After the
implementation is finished, all of the functional and non-functional requirements are tested.
Finally, the system's whole booking process is presented to users for comments and needs.
Problems (Issues)
Some coding and difficulties are produced throughout the construction of the management
and presentation procedure. Guests might enter data that isn't secure enough in the
registration part, which leads to data loss and theft. Guests may enter any sort of data in the
textboxes on the booking form, resulting in a form that is riddled with mistakes.
Solutions
The password for the registration procedure is programmed to be a strong password so that
visitors do not have to provide simple and unsecure information. The total occupancy, check-
in, and check-out date fields are in combo boxes during the booking process, so there will be
no errors.
Remaining Time-boxes
The booking and payment procedure is the last time-box, however check the appendix for
extra processes.
141 | Page
CHAPTER – 6
Deployment
142 | Page
6.1 Deployment
6.1.1 Deployment Diagram
<<Apache>>
The Visitors access to the internet via a router protected by a firewall, which they use from
different browsers. The internet then connects to a web server that hosts the web pages, and
the server is linked to a database server (MYSQL). The visitor requests web pages, and the
server responds with the requested pages. The visitor may then see the pages and continue
working.
143 | Page
6.2 Data Migration
6.2.1 Data to Migrate
Data migration is the process of transferring data from one place to another, one format to
another, or one application to another, as well as transferring old data from one system to
another. Staffs, guests, rooms, categories, and bookings must all be migrated in this project.
6.2.2 Plan
144 | Page
6.3 Training
6.3.1 Training plan
145 | Page
CHAPTER – 7
CONCLUSION
&
EVALUATION
146 | Page
7.1 Evaluation against Aim & Objectives
Aim
The project's goal is to make bookings simple and secure for guests. To facilitate
visitor bookings, the team has created a user-friendly design and provided staff training
on how to utilize the website. Although some security is lacking, the majority of the
systems are more secure than the manual approach.
Objective 1
To get information from the employees, the team must conduct individual interviews
with each person to obtain information on the system they are using and the issues they
are encountering as a result of utilizing that system. The team then conducts a SWOT
analysis before proposing a new system. The team then compares the breadth of the
proposed system to that of comparable systems. The team compared the system both
functionally and non-functionally while evaluating it. The methodology, programming
language, and database management system (DBMS) that will be utilized to construct the
project are then determined. There are several techniques to choose from when deciding
methodologies, but the team has chosen DSDM since it is the most appropriate for the
project.
Objective 2
The team regulates the target users, prioritizes the tasks, and establishes the
functional and non-functional needs in this goal. Set a time limit for planning and identify
any hazards that might jeopardize the project's success. Because it is critical to prioritize
the guest's demands, the time-box plan takes much longer to develop than the other
processes.
Objective 3
The team creates ERD and Use Case Diagrams to aid in the creation of the plan and
each page; the transition pages take the most time and are one of the most critical parts
of the development. The team also consults with students on the implanted design and
makes several changes during the development process.
147 | Page
Objective 4
Students and testers evaluate the pages that have been inserted and provide
comments on the website. If the website has any problems or defects, the team must
build or modify it. After that, the testing is separated into functional and non-functional
categories. Functional testing evaluates how well the website's functions operate,
whereas non-functional testing evaluates the website's design and usability.
Objective 5
Staff members are given training. Because it is crucial for both visitors and staffs, the
majority of the training focuses on display, booking, and payment functions. As a result,
the team has created a user handbook for key features. There have been a number of
challenges in training the workforce. Lack of attention and skill are two of these issues.
These issues will be handled by keeping a watch on employees, studying again, and then
reading a lot of e-commerce literature.
148 | Page
7.2 Evaluation Against Similar System
No My System Melia.com
1 Visibility of System Status Visibility of System Status
149 | Page
The error message shows to fill out this field.
150 | Page
7.3 Evaluation against Justification Made
Methodology
The method that the “Elysium Hotel” project mainly use is DSDM (Dynamic system
development method or Agile methodology. In Agile methodology, testing is an integrated part
of the project execution phase which means that the quality of the overall final product is
greater and the customer is always involved in the decision-making process which leads to
greater customer retention. This allows managers having better control over the project due to
its transparency, quality control features and feedback integration. But the Agile methodology
takes a lot of time than other methodology.
Language
The “Elysium Hotel” project uses HTML, CSS, PHP and Java script languages. All of the
languages that have been used is based on the web development. HTML part was easy but
the rest of the design which uses the latter languages have different types of difficulties.
Mainly for this website, I have to use a downloaded template from the google and add to my
website to perfect the web development. During this web development, I have learnt much
about PHP and a lot about design.
Database
The Database that is used for this project is MY SQL server. It is a stable and efficient
database management system for big social media organizations such as Facebook and
Twitter. MY SQL also provides a string layer of protection which keeps the confidential
information from unauthorized access which will enter. The rights involve SELECT, UPDATE,
INSERT and DELETE. My SQK is a common language of scripting which will assist us to
learn useful skills that are importing for many generations to come.
151 | Page
7.4 Evaluation against Time Box Plan
Time Box 1: Manage Room Process Time Box
With the manage room process (Time-box 1), there is a little issue with the minimum time for
the time box to run because of its many functions. The PHP codes for this time-box were
written at ease because of all the teaching by our supervisors. During the development of
time-box 1 I have known very well of the languages of PHP. This Time-box was started from
“March 6, 2022 “to March “25 2022”.
152 | Page
7.5 Personal Evaluation
In this project, we faced many difficulties such as coding errors, planning time box and
designing the website. It was hard to find and solve the coding problems ourselves as for the
teachers have a little bit of time for us in the class to solve our problems. That is when the
supervisors which are assigned by our teacher to help with our problems and errors. There
was a little bit of problems with supervisors not having enough time because of the demands
of the students. By the help of supervisors and the teacher, the problems were solved easily
and the project was done on time.
The website is user friendly page which is saving time of the users from a register page to
another page. It is designed aesthetically to attract the users. Also, on the room display page
the users can view the rooms clearly and a search bar is present so the Guests can find the
room they favor easily. The website is also responsive which can be viewed in all devices.
Weakness
The weakness of this website is that it doesn’t have detailed description of the room. So, the
visitors can’t know the room category without reaching the room details page. And the visitors
can’t update their account information.
153 | Page
APPENDIX
154 | Page
Section A: Use Case Descriptions
Time-box 1: Managing Room Process Time-box
Case 1
Use Case Record Staff
Name
Actor Manager
Flow of Event Fill out the registration form's staff information. The Save button has been
pressed.
Case 2
Use Case Record Visitor
Name
Actor Staff
Flow of Event In the registration form, fill in the Visitor information. The Save button has
been pressed.
Case 3
Use Case Record Room
Name
Actor Staff
Flow of Event In the registration form, fill out the room details. The button for saving has
been pressed.
Case 4
Use Case Record Booking
Name
Actor Staff
Flow of Event In the checkout form, fill in the booking information. The check-out button has
been pressed.
Case 5
155 | Page
Use Case Record Category
Name
Actor Staff
Flow of Event Fill out the registration form's category information. The Save button has
been pressed.
Case 1
Use Case Visitor Registration
Name
Actor Visitor
Flow of Event In the registration form, fill in the guest information. The Save button has
been pressed.
Case 2
Use Case Booking Registration
Name
Actor Visitor
Flow of Event Fill out the booking form with your information. The Register button has been
pressed.
156 | Page
Section B: Detailed Class Definitions
Time-box 1: Managing Room Process Time-box
Class 1
Class Staff
Name
Attributes StaffID, StaffName, StaffEmail, StaffPassword, StaffPhone, StaffAddress,
StaffRole
Operation Register (), Update (), Delete (), Login ()
Description The Staff class is used to register employees in order to determine which
employees are accountable for which aspects of the work.
Class 2
Class Room
Name
Attributes RoomID, RoomName, RoomQuantity, RoomDescription,
RoomCategoryImage, RoomPrice
Operation Register ()
Description The Room class is used to show information to visitors.
Class 3
Class Name Category
Attributes RoomCategoryID, RoomCategoryName, RoomCategoryStatus
Operation Register ()
Description The Category class is used to provide information to visitors.
157 | Page
Time-box 2: Managing Room Booking and Payment Process Time-box
Class 1
Class Visitor
Name
Attributes VisitorID, VisitorName, VisitorEmail, VisitorPassword, VisitorPhone,
VisitorAddress
Operation Register (), Update (), Delete (), Login ()
Description The Visitor class is used to establish Visitor accounts and make lodging
reservations.
Class 2
Class Booking
Name
Attributes BookingID, BookingDate, TotalOccupancy, CheckinDate, CheckoutDate,
PaymentType
Operation Register ()
Description The Booking class is used to save the visitor's booking form.
Section C: Coding
158 | Page
remove the specified visitor and staff from
the table.
Room Search() To search the database for data from the
Login forms. When the Search button is
pressed, the input data is placed into
variables, and then data is chosen from
the tables using SQL commands.
159 | Page
Section D: Test Scripts
Test Case Description Test Procedure Expected Actual
Result Results
1.1 Login-Timer The log in timer starts when three Account is See
incorrect passwords are submitted locked for Fig.1.2
three-times. 10mins
Before Testing
Fig.1
After testing
160 | Page
Fig 2
Fig 3
Fig4
161 | Page
References
162 | Page
References List
https://osarome.blogspot.com/2011/10/1-technical-feasibility-2-operational.html
https://www.businessnewsdaily.com/4987-what-is-agile-scrum-methodology.html
https://checkykey.com/dsdm-strengths-and-weaknesses
https://www.simpliaxis.com/resources/scrum-master-strengths-and-weaknesses
https://theqalead.com/topics/dsdm-dynamic-systems-development-
method/#:~:text=Scrum%20vs%20DSDM&text=Some%20are%20merely%20terminology
%2Dbased,the%20%E2%80%9Cpotentially%20releasable%20increment.%E2%80%9D
https://www.php.net/docs.php
https://docs.python.org/3/
http://technosophos.com/2014/05/14/5-strengths-of-php.html
https://www.ryadel.com/en/php-programming-language-strengths-weaknesses/
https://kcpelearning.com/showcourse/python3/strengths-and-weaknesses
https://www.mindinventory.com/blog/php-vs-python/
https://www.techtarget.com/searchoracle/definition/MySQL
https://www.comparitech.com/net-admin/microsoft-access/
https://www.linkedin.com/learning/database-clinic-mysql/strengths-and-weaknesses-of-
mysql
http://northgate-reality.com/advantages-and-disadvantages-of-access-databases/
https://dataconomy.com/2017/04/5-reasons-challenges-mysql/
https://www.appvizer.com/magazine/operations/project-management/dsdm
https://www.lawsociety.org.uk/public/for-public-visitors/common-legal-issues
https://www.myaccountingcourse.com/accounting-dictionary/ethical-
issues#:~:text=What%20Does%20Ethical%20Issues%20Mean,question%20from%20an
%20ethical%20standpoint.
https://nap.nationalacademies.org/read/5803/chapter/9
https://www.aicpa.org/topic/ethics/professional-issues
163 | Page
https://searchcompliance.techtarget.com/definition/risk-
management#:~:text=Risk%20management%20is%20the%20process,errors%2C%20ac
cidents%20and%20natural%20disasters.
https://asana.com/resources/critical-success-factors
164 | Page