NITHIN KUMAR FINISH Cable TV MGT

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 31

CABLE TV MANAGEMENT SYTEM

PROJECT REPORT
Submitted by
NITHIN KUMAR.C
Reg.No.152AC1122

Under the guidance of


Dr. P. KANNAN. M.Com., M.Phil., Ph.D.
Assistant Professor
PG & RESEARCH DEPARTMENT OF COMMERCE
A project report submitted to Bharathiar University in partial fulfillment of
the requirements for the award of the degree of
BACHELOR OF COMMERCE
WITH COMPUTER APPLICATIONS
OF
BHARATHIAR UNIVERSITY
COIMBATORE- 641046

Submitted to
POST GRADUATE AND RESEARCH DEPARTMENT OF COMMERCE
SREE NARAYANA GURU COLLEGE
(Accredited by NAAC & an ISO 9001:2008 Certified Institution)
(Affiliated to Bharathiar University)
K.G Chavadi, Coimbatore – 641105

MARCH – 2018
DECLARATION
I hereby declare that this project report entitled

CABLE TV MANAGEMENT SYTEM


Submitted to

Sree Narayana Guru College

K.G.Chavadi, Coimbatore-641105

In partial fulfillment of the requirements for the award of the degree of

BACHELOR OF COMMERCE WITH COMPUTER APPLICATIONS


Is a record of original project report done by me during the period of my
study from 2017-2018 in

SREE NARAYANA GURU COLLEGE

(Accredited by NAAC & an ISO 9001:2008 Certified Institution)


(Affiliated to Bharathiar University)
K.G. Chavadi, Coimbatore – 641105

Under the supervision of

Dr. P. KANNAN. M.Com., M.Phil., Ph.D.


Assistant Professor

PG & RESEARCH DEPARTMENT OF COMMERCE


SREE NARAYANA GURU COLLEGE
K.G.CHAVADI, COIMBATORE-641105
Date:

Place: K.G Chavadi – Coimbatore Signature of the Candidate

NITHIN KUMAR.C
Reg.No.152AC1122
CERTIFICATE
This is to certify that this Project Report entitled

CABLE TV MANAGEMENT SYTEM


PROJECT REPORT
Submitted by
NITHIN KUMAR.C
( Reg.No.152AC1122)

Is a bonafide record of the project report done by him during the academic year
2017-2018 under my supervision and guidance in partial fulfillment of the
requirements for the award of the degree of

BACHELOR OF COMMERCE WITH COMPUTER APPLICATIONS

Place:
Date : _______________________
Signature of the Supervisor

________________ ______________________
Signature of the HOD Signature of the Principal

Submitted for Viva-Voce Examination held on________________.

_______________ _ ________________
Internal Examiner External Examiner
CHAPTER I

INTRODUCTION

1.1 OVERVIEW THE PROJECT

Cable TV Management System is a business management software—usually a suite of


integrated applications that a company can use to store and manage data from every stage of
business. Each module is focused on one area of business processes, such as product
development or marketing. We all know the importance of computerization. The world is
moving ahead at lightning speed and everyone is running short of time. One always wants to get
the information and perform a task he/she/they desire(s) within a short period of time and too
with amount of efficiency and accuracy. Cable TV Management System is process management
software that allows an organization to use a system of integrated applications to manage the
business and automate back functions.
Cable TV Management System is a system designed for keeping update record about the
cable tv customers and their connection details and the payment details.

1.2ESSENTIALS FOR COMPUTERIZED SYSTEM


Computer helps to work more efficiently and to accomplish many tasks. One will need a
variety of information in order to accurately assess the technology requirements for his small
business. Because of the advancements of technology increasing commercial complications,
business organizations opt for computer in solving various problems and to attain efficiency in
operation.
One develops computerized systems surely it will produce error free information
with less man works. Also the system will absolutely faster than manual system. The complaint
booking details is more users interactive and user friendly so that the user can easily enter the
data in appropriate forms without any errors.

The project consists of following modules:

 ADMIN
 CUSTOMER
1
 PAYMENT
 CONNECTION
 REPORT

1.3 SALIENT FEATURES OF THE NEW SYSTEM


 Security
The software used for this computer management system includes the password, in
order to provide security. When anyone opens the software it has the provision for entering
password. One has to enter the correct password; otherwise user cannot enter into the
system. Password is saved in system registry for more security.

 User Friendly
This package is very user friendly because it is easy to maintain and operate. All data
entry operations are simple. Administrator has to enter data only and all other operations
are performed by the computer.

 Speed and Accuracy


Computerization increases the speed of all the operations. The manpower is reduced.
Instead of doing all operations older version, computer will do it automatically. It also
increases the accuracy of all the operations performed.

 Efficiency and flexibility


The flexibility and the efficiency of all the operations in this computer management
system is increased due the computerization. No errors occurred compare to the old version.
Instead of searching lot of data, one can produce report in a few seconds.

 Formatted Output
Each output of the proposed system is formatted in such a way so as to allow easy
decision making. One can print the profile easily by using data reports.

2
2. COMPANY PROFILE
UNIQUE SOFTWARE SOLUTION
Unique Software solutions a software services and computer sales company focusing on
Software Development and Products. Software solutions has an office in palakkad (kerala). USS
has its full-fledged offshore development center in palakkad. USS Pvt. Ltd., India, is currently
pursuing the ISO 9001:2000 certification for Quality Management Systems & Processes.

SOFTWARE SERVICES:

Software co solutions specialize in providing the following services:

 Application Development
 sales
 Maintenance & Support
 Products
 Conversion and Migration

Unique Software solutions provides a complete suite of IT services in the business


applications domain, specializing in multiple verticals including financial services, healthcare
services, education and allied industries.

Unique Software solutions provide its software consultants to carry out onsite services.
These resources, as a part of the onsite project team would report to Project Manager responsible
for the project. The onsite model can be a component of the offsite model, where in, Software co
solutions will send its personnel to the client’s side for implementation, testing and support of
various projects.

3
CHAPTER II
SYSTEM ANALYSIS
2.1 EXISTING SYSTEM
Since the existing system is being old version. Security and maintainability is low.

2.2 LIMITATIONS OF THE EXISTING SYSTEM


 Information’s are recorded in the file based format
 The user or administrator has to take more risks.
 User may not be able to keep the information for future enhancement.
 It is time consuming and cost effective.

2.3 PROPOSED SYSTEM


Enterprise Resource Planning is an integrated real-time view of core business processes,
using common database maintained by a database management system

 Minimizing the manual records which kept at different locations.


 There will be more data integrity.
 Facilitates the desired information display very quickly and one can retrieve information
very easily.

2.4 OBJECTIVES OF THE PROPOSED SYSTEM


Business integration and Improved Data Accuracy: CMS system is composed of various
modules/ sub modules where a module represents a particular business component.
Flexibility and technology: Due to globalized environment, the production units, distribution
centres and corporate offices are located in different countries, so an organization needs multi-
currency, multi-language and multi accounting modes, in an integrated manner.
Improved Efficiency and Productivity: CMS system provides a tremendous boost to the
efficiency of day to day and routine transactions such as order fulfilment, on time shipment,
vendor performance, quality management, invoice reconciliation, sales realization, and cash
management.
4
2.5 SYSTEM SPECIFICATIONS
 Hardware Requirements
PROCESSOR :PENTIUM IV OR ABOVE

RAM :32 GB

MONITOR : 15” COLOR

HARD DISK : 320 GB

KEYBOARD : STANDARD 106 KEYS

MOUSE : 3 BUTTONS

NETWORK : LAN

INTERNET : 4G

 SOFTWARE REQUIREMENT

OPERATING SYSTEM : WINDOWS XP

FRONT END TOOL : MICROSOFT VISUAL BASIC 6.0

BACK END TOOL : MS ACCESS

5
SOFTWARE DESCRIPTION

VISUAL BASIC 6.0

Visual Basic is a third-generation event-driven programming language and integrated


development environment (IDE) from Microsoft for its COM programming model which was
released in 1991. Microsoft intends Visual Basic to be relatively easy to learn and use. It was
derived from BASIC and enables the rapid application development (RAD) of graphical user
interface (GUI) applications, using Data Access Objects, Remote Data Objects, or ActiveX Data
Objects, and creation of ActiveX controls and objects.

A programmer can create an application by using the components provided by the Visual
Basic program itself. Programs written in Visual Basic can also use the Windows API, but for
doing so requires external function declarations. Though the program has received criticism for
its perceived faults, version 3 of Visual Basic was a commercial success, and many companies
offered third party controls by extending its functionality.

The final release was version 6 in 1998. Microsoft's extended support ended in March 2008 and
the designated successor was Visual Basic Though Visual Basic 6.0 is no longer officially
available there remain a sizable number of developers who still prefer Visual Basic 6.0 over
.NET.

A dialect of Visual Basic, Visual Basic for Applications (VBA), is used as a macro or
scripting language within several Microsoft applications, including Microsoft Office.

6
Language Features

Like the BASIC programming language, Visual Basic was designed to accommodate
beginner programmers. Programmers can create both simple and complex GUI applications.
Programming in VB is a combination of visually arranging components or controls on a form,
specifying attributes and actions for those components, and writing additional lines of code for
more functionality. Since VB defines default attributes and actions for the components, a
programmer can develop a simple program without writing much code. Programs built with
earlier versions suffered performance problems, but faster computers and native code
compilation has made this less of an issue.

Though VB programs can be compiled into native code executable, they still require the
presence of around 1 MB of runtime libraries. Runtime libraries are included by default
in Windows 2000 and later. Earlier versions of Windows (95/98/NT) require that the runtime
libraries to be distributed with the examples.

Forms are created using drag-and-drop techniques. A tool is used to place controls (e.g.,
text boxes, buttons, etc.) on the form (window). Controls have attributes and event
handlers associated with them. Default values are provided when the control is created, but may
be changed by the programmer. Many attribute values can be modified during run time based on
user actions or changes in the environment, providing a dynamic application. For example, code
can be inserted into the form resize event handler to reposition a control so that it remains
centred on the form, expands to fill up the form, etc. By inserting code into the event handler for
a key press in a text box, the program can automatically translate the case of the text being
entered, or even prevent certain characters from being inserted.

Visual Basic can create executable (EXE files), ActiveX controls, or DLL files, but is
primarily used to develop Windows applications and to interface database systems. Dialog boxes
with less functionality can be used to provide pop-up capabilities. Controls provide the basic
functionality of the application, while programmers can insert additional logic within the
appropriate event handlers.

7
Alternatively, a Visual Basic component can have no user interface, and instead provide
ActiveX objects to other programs via Component Object Model (COM). This allows for server-
side processing or an add-in module.

At the time running recovers unused memory using reference counting, which depends
on variables passing out of scope or being set to null , avoiding the problem of memory
leaks common to other languages. There is a large library of utility objects, and the language
provides basic object oriented support. Unlike many other programming languages, Visual Basic
is generally not case sensitive—though it transforms keywords into a standard case configuration
and forces the case of variable names to conform to the case of the entry in the symbol table.
String comparisons are case sensitive by default.

The Visual Basic compiler is shared with other Visual Studio languages (C, C++), but
restrictions in the IDE do not allow creation of some targets (Windows model DLLs) and
threading models.

CHARACTERISTICS

The following Visual Basic traits differ from C-derived languages:

 Statements tend to terminate with keywords, such as "End If", instead of using "{}"s to
group statements.
 Multiple variable assignments are not possible. A = B = C does not imply that the values of
A, B and C are equal. The Boolean result of "Is B = C?" is stored in A. The result stored in A
would therefore be either false or true.
 Boolean constant True has numeric value −1. This is because the Boolean data type is stored
as a 16-bit signed integer. In this construct −1 evaluates to 16 binary 1(the Boolean
value True), and 0 as 16 0(the Boolean value False). This is apparent when performing
a Not operation on a 16 bit signed integer value 0, which returns the integer value −1, in
other words True = Not False. This inherent functionality becomes especially useful when
performing logical operations on the individual bits of an integer such
as And, Or, Xor and Not.

8
 Logical and bitwise operators are unified. This is unlike some C-derived languages (such
as Perl), which have separate logical and bitwise operators. This again is a traditional feature
of BASIC.
 Variable array base. Arrays are declared by specifying the upper and lower bounds in a way
similar to Pascal and FORTRAN. It is also possible to use the Option Base statement to set
the default lower bound. Use of the Option Base statement can lead to confusion when
reading Visual Basic code and is best avoided by always explicitly specifying the lower
bound of the array. This lower bound is not limited to 0 or 1, because it can also be set by
declaration. In this way, both the lower and upper bounds are programmable. In more
subscript-limited languages, the lower bound of the array is not variable. This uncommon
trait exists in Visual Basic .NET but not in VBScript

OPTION BASE was introduced by ANSI, with the standard for ANSI Minimal BASIC in
the late 1970s.

 Relatively strong integration with the Windows operating system and the Component
Object Model. The native types for strings and arrays are the dedicated COM types,
BSTR and SAFEARRAY.
 Banker's rounding as the default behaviour when converting real numbers to integers
with the Round function. ? Round (2.5, 0) gives 2, Round (3.5, 0) gives 4.
 Integers are automatically promoted to read in expressions that involve the normal
division operator (/) so that division of one integer by another produces the intuitively
correct result. VB provides a specific integer divide operator (\) that does truncate.
 By default, if a variable has not been declared or if no type declaration character is
specified, the variable is of type Variant. However this can be changed with Retype
statements Sucre as Defiant, DefBool, DefVar, DefObj, DefStr. There are
12 Deftype statements in total offered by Visual Basic 6.0. The default type may be
overridden for a specific declaration by using a special suffix character on the variable
name (# for Double, for Single, & for Long, % for Integer, $ for String, and @ for
Currency) or using the key phrase as (type).

9
MICROSOFT ACCESS
Microsoft Access, also known as Microsoft Office Access, is a database management
system from Microsoft that combines the relational Microsoft Jet Database Engine with
a graphical user interface and software-development tools. It is a member of the Microsoft
Office suite of applications, included in the Professional and higher editions or sold separately.

Microsoft Access stores data in its own format based on the Access Jet Database Engine. It
can import or link directly to data stored in other applications and databases

Software developers and data architects can use Microsoft Access to develop application
software, and "power users" can use it to build software applications. Like other Office
applications, Access is supported by Visual Basic for Applications, an oriented programming
language that can reference a variety of objects including DAO (Data Access
Objects), ActiveX Data Objects, and many other ActiveX components. Visual objects used in
forms and reports expose their methods and properties in the VBA programming environment,
and VBA code modules may declare and call Windows operating-system functions.

Split Database Architecture


Microsoft Access applications can adopt split-database architecture. The single database
can be divided into a separate "back-end" file that contains the data tables (shared on a file
server) and a "front-end" (containing the application's objects such as queries, forms, reports,
macros, and modules). The "front-end" Access application is distributed to each user's desktop
and linked to the shared database. This reduces network traffic since the application is not
retrieved for each use. The "front-end" database can still contain local tables for storing a user's
settings or temporary data. This split-database design also allows development of the application
independent of the data. One disadvantage is that users may make various changes to their own
local copy of the application and this makes it hard to manage version control. When a new
version is ready, the front-end database is replaced without impacting the data database.
Microsoft Access has two built-in utilities, Database Splitter.and Linked Table Manager, to
facilitate this architecture.

MICROSOFT ACCESS

Microsoft Access, also known as Microsoft Office Access, is a database management


system from Microsoft that combines the relational Microsoft Jet Database Engine with
a graphical user interface and software-development tools. It is a member of the Microsoft
Office suite of applications, included in the Professional and higher editions or sold separately.

10
Microsoft Access stores data in its own format based on the Access Jet Database Engine.
It can import or link directly to data stored in other applications and databases

Software developers and data architects can use Microsoft Access to develop application
software, and "power users" can use it to build software applications. Like other Office
applications, Access is supported by Visual Basic for Applications, an oriented programming
language that can reference a variety of objects including DAO (Data Access
Objects), ActiveX Data Objects, and many other ActiveX components. Visual objects used in
forms and reports expose their methods and properties in the VBA programming environment,
and VBA code modules may declare and call Windows operating-system functions.

Split Database Architecture


Microsoft Access applications can adopt split-database architecture. The single database
can be divided into a separate "back-end" file that contains the data tables (shared on a file
server) and a "front-end" (containing the application's objects such as queries, forms, reports,
macros, and modules). The "front-end" Access application is distributed to each user's desktop
and linked to the shared database. This reduces network traffic since the application is not
retrieved for each use. The "front-end" database can still contain local tables for storing a user's
settings or temporary data. This split-database design also allows development of the application
independent of the data. One disadvantage is that users may make various changes to their own
local copy of the application and this makes it hard to manage version control. When a new
version is ready, the front-end database is replaced without impacting the data database.
Microsoft Access has two built-in utilities, Database Splitter.and Linked Table Manager, to
facilitate this architecture.

Linked tables in Access use absolute paths rather than relative paths, so the development
environment either has to have the same path as the production environment or a "dynamic-
linker" routine can be written in VBA.

For very large Access databases, this may have performance issues and a SQL backend
should be considered in these circumstances. This is less of an issue if the entire database can fit
in the PC's RAM since Access cache data and indexes.

11
To scale Access applications to enterprise or web solutions, one possible technique is
migrating to Microsoft SQL Server or equivalent server database. A client–server design
significantly reduces maintenance and increases security, availability, stability, and transaction
logging.

Access 2010 included a feature called the Upsizing Wizard that allowed users
to upgrade their databases to Microsoft SQL Server, an ODBC client–server database. This
feature was removed from Access 2013. An additional solution, the SQL Server Migration
Assistant for Access (SSMA), continues to be available for free download from Microsoft.

A variety of upgrading options are available.[28] After migrating the data and queries to
SQL Server, the MDB/ACCDB Access database can be linked to the database. However, certain
data types are problematic, most notably "Yes/No". In MS Access there are three states for the
Yes/No (True/False) data type: empty, No/False (zero) and Yes/True (-1). The corresponding
SQL Server data type is binary, with only two states, permissible values, zero and 1. Regardless,
SQL Server is still the easiest migration, and most appropriate especially if the user does not
have rights to create objects such as stored procedures on SQL Server. Retrieving data from
linked tables is optimized to just the records needed, but this scenario may operate less
efficiently than what would otherwise be optimal for SQL Server. For example, in instances
where multi-table still require the copying the whole table across the network.

In previous versions of Access, including Access 2010, databases can also be converted
to Access Data Projects (ADP) which is tied directly to one SQL Server database. This feature
was removed from Access 2013. ADP's support the ability to directly create and modify SQL
Server objects such as tables, views, stored procedures, and SQL Server constraints. The views
and stored procedures can significantly reduce the network traffic for multi-table joins.
Fortunately, SQL Server supports temporary tables and links to other data sources beyond the
single SQL Server database.

Finally, some Access databases are completely replaced by another technology such as

ASP.NET or Java once the data is converted. However any migration may dictate major effort

since the Access SQL language is a more powerful superset of standard SQL.

12
In many cases, developers build direct web-to-data interfaces using ASP.NET, while
keeping major business automation processes, administrative and reporting functions that don't
need to be distributed to everyone in Access for information workers to maintain.

While almost Access data can migrate to SQL Server directly, some queries cannot
migrate successfully. In some situations, one may need to translate VBA functions and user
defined functions into T–SQL or .NET functions / procedures. Crosstab queries can be migrated
to SQL Server using the PIVOT command.

PROTECTION
Microsoft Access offers several ways to secure the application while allowing users to
remain productive.

The most basic is a database password. Once entered, the user has full control of all the
database objects. This is a relatively weak form of protection which can be easily cracked.

A higher level of protection is the use of workgroup security requiring a user


name and password. Users and groups can be specified along with their rights at the object
type or individual object level. This can be used to specify people with read-only or data entry
rights but may be challenging to specify. A separate workgroup security file contains the settings
which can be used to manage multiple databases. Workgroup security is not supported in the
Access 2007 and Access 2010 ACCDB database format, although Access 2007 and Access 2010
still support it for MDB databases.

Databases can also be encrypted. The ACCDB format offers significantly advanced
encryption from previous versions.

Additionally, if the database design needs to be secured to prevent changes, Access databases
can be locked/protected (and the source code compiled) by converting the database to an .MDE
file. All changes to the VBA project (modules, forms, or reports) need to be made to the original
MDB and then reconverted to MDE. In Access 2007 and Access 2010, the ACCDB database is
converted to an ACCDE file. although certain elements including original VBA comments and
formatting are normally irretrievable.

13
CHAPTER III
SYSTEM DESIGN AND DEVELOPMENT
Systems design is the process of defining the architecture, components, modules, interfaces,
and data for a system to satisfy specified requirements. Systems design could see as the
application of systems theory to product development. There is some overlap with the disciplines
of systems analysis, systems architecture and systems engineering Produced during the
Definition Phase of a project System Design Definition (SDDs) defines the system design for the
Project’s entire scope of supply and references other SDDs where necessary.

Purpose

To define the overall architecture, type, scope and number of systems that will be
developed, procured and/or modified to implement the Project. This may include systems that
are developed, modified or procured outside of the scope of the Project.

The System Design Definitions (SDDs) is to define the delivered systems, sub-systems and
equipment’s to be able to answer the following questions at each design review:

 Does the system meet the requirements?


 Can the system be implemented?
 Can the System be maintained and operated?
 Is the Implementation, planned, resourced and hosted?

To develop and agree the System Design Specification the following aspects must be considered:

 System’s scope,
 The Concept of Operations,
 The User’s requirements,
 Method used to develop and integrate.

14
System design involves first logical design and then physical construction of the system.
After logical design, the detailed specification of the system, which describes the inputs, outputs,
files and databases are developed.

In general, the proposed system satisfies the following design objectives:

Practicality: The system is stable and can be operated by people with average
intelligence.

Efficiency: The proposed system satisfies accuracy less time and comprehensive of the
system output.

Cost: The proposed system is able to satisfy all the requirements with minimum cost

Flexibility: The system is modifiable depending upon the changing need of the user

3.1 FACT FINDING


To study any system the analyst needs to do collect facts and all relevant information.
The facts when expressed in quantitative form are termed as data. The success of any project is
depending upon the accuracy of available data. Accurate information can be collected with help
of certain methods/ techniques. These specific methods for finding information of the system are
termed as fact finding techniques. Interview, Questionnaire, Record View and Observations are
the different fact finding techniques used by the analyst. The analyst may use more than one
technique for investigation.

Three key considerations are involved in the fact finding

1. Technical Fact Finding:

2. Behavioural Fact Finding:

3. Economic fact finding:

15
3.2. FEASIBILITY STUDY

Feasibility study is a test of a system proposed according to its workability, impact on the
organization ability to meet user needs, and effective use of resources.

Feasibility analysis involves five steps they are:

1. Form project term and appoint a project leader

2. Prepare system flow charts

3. Describe and identify characteristics of candidate system.

4. Determine and evaluate performance and cost effectives of each candidate system

5. Weight system performance and cost data

3.3. INPUT DESIGN

The input design is the link between the information system and the user. It
comprises of developing specification and procedures for data preparation and those steps are
necessary to put transaction data into a usable form for processing data entry. The activity of
putting data into the computer for processing can be achieved by inspecting the computer to read
data from a written or printed document or it can occur by having people keying the data directly
into the system.

The design of input focuses on controlling the amount of input required, controlling
errors, avoiding delay, avoiding extra steps and keeping the process simple. The system needs
the data regarding the asset items, depreciation rates, asset transfer, and physical verification for
various validations and checking. The error raising method is also included in the software,
which helps to raise error message while wrong entry of input is done. So in case of input design
the following things are considered.

16
 What data should be given as input?
 How the data should be arranged or coded?
 The dialogue to guide the operating personnel in providing input

3.4. OUTPUT DESIGN

One of the most important features of a system for users is the output it produces. Output
design should improve the system’s relationship with the user and help in decision making.
Considering the future use of output required, and depending on the nature, it is displayed on the
monitor for immediate need of obtaining the hard copy.

The objective of output design is to define the controls and format of all printed
documents and of screens that will be produced by the system. Computer output is the most
important and direct source of information to the user and the customer receives a corresponding
message according to the actions performed in their accounts.

In the proposed system the user can view the data of the authenticated users of the
proposed system, commands and from the appropriate database one can see the content related to
the system. He can also add, delete, and update the data.

The output will be a message.

3.5. MENU DESIGN


A menu is a selection list that simplifies computer data access or entry. Instead of
remembering what to enter, the user chooses from the list of forms and types the associated letter
associated with it. Menu limits a user’s choice of responses but it reduces the chance of errors.
The menus are:
 ADMIN
 CUSTOMER
 PAYMENT
 CONNECTION
 REPORT
17
3.6 CODING
After designing the input and output, the programme begins to communicate on code
design and the data is designed according to the user requirements. The code design depends on
the data and response requirements, which is based on input and output factors:
An integrated approach to code design is the database programming. The objective of code
design is accuracy and integrity, successful recovery from failure privacy and security of data.

3.7 DATABASE DESIGN


 ADMIN
 CUSTOMER
 PAYMENT
 CONNECTION
 REPORT

18
TABLE DESIGN

Customer Details

Sl No Field Name Type Size

1 Cust ID Long 4

2 Name Text 50

3 Address Text 50

4 Phone No Text 50

5 DOB Date/Time 8

6 Instal date Date/Time 8

Connection Details

Sl No Field Name Type Size

1 ID Integer 2

2 No of con integer 8

3 Amt number 4

4 Date Date 8

Bill details
FIELD NAME DATATYPE
Cust id NUMBER
Month TEXT
Date paid DATE
Amount CURRENCY
DUE NUMBER
Date due DATE
19
3.8 DFD

LEVEL 1:

Cable tv management system

ADMIN
USER

LEVEL 2:

CUSTOMER

ADMIN
PAYM
ENT
database
connection

SEARCH

Report

20
3.9 ER DIAGRAM

PASSWORD USERNAME

ADMIN HAS LOGIN

NAME ID

ADD
CUSTOMER DETAILS

ADDRESS CONTACT CODE BILL DATE


NUMBER

Connection DETAILS

RATE

NAME AMOUNT
CHAPTER 4
4. DEVELOPMENT OF SYSTEM AND TESTING
Another form of any system is the development process. Case would be given during the
whole process of testing. The performance of the system is measured in this phase. Testing is a
set of activity that can be planned and conducted systematically.

Testing begins at the module level and works towards the integration of entire computer
system.

Testing objectives:

 Testing is the process of executing a program


 A good test case is one that has high probability of finding undiscovered errors.
 A successful test is the one that uncovers an undiscovered error.

There are three ways to test a program:

 Correctness
 Implementation efficiency
 Computation complexity.

The test for correctness is supposed to verify that a program does exactly what it was
designed to do. This is much more tedious than it may at first appear, especially for large
program.

22
TEST PLAN
A test plan implies a series of desired course of action to be followed in accomplishing
various testing methods. The Test Plan acts as a blue print for the action that is to be followed.
The software engineers create a computer program, its documentation and related data structures.
The software developers is always responsible for testing the individual units of the programs,
ensuring that each performs the function for which it was designed. There is an independent test
group (ITG) which removes the inherent problems associated with letting the builder to test the
thing that has been built. The specific objectives of testing should be stated in measurable terms.
So that the mean time to failure, the cost the defects, the defect density or frequency of
occurrence and test work-hours per regression test should be stated within the test plan.

The levels of testing include:

 Unit testing
 Integration Testing
 Data validation Testing
 Output Testing

 Unit Testing
Unit testing focuses verification effort on the smallest unit of software design – the software
component or module. Using the component level design description as a guide, important
control paths are tested to uncover errors within the boundary of the module. The relative
complexity of tests and uncovered scope is established for unit testing. The unit testing is white-
box oriented, and step can be conducted in parallel for multiple components. The modular
interface is tested to ensure that the information properly flows into and out of the program under
unit test. The local data structure is examined to ensure the data stored temporarily and maintains
its integrity during all steps in an algorithm’s execution. Boundary conditions are tested to ensure
that all statements in a module have been executed at least once. Finally, all error handling paths
are tested.

23
Unit testing is done in Sell-Soft System by treating each module as separate entity and
testing each one of them with a wide spectrum of test inputs. Some flaws in the internal logic of
the modules are found and are rectified.

 Integration Testing

Integration testing is a systematic technique for constructing the program structure while at
the same time conducting tests to uncover errors associated with interfacing. The objective is to
take unit tested components and build a program structure that has been dictated by design. The
entire program is tested as a whole. Correction is difficult because isolation of causes is
complicated by vast expanse of entire program. Once these errors are corrected, new ones appear
and the process continues in a endless loop.

After unit testing in Sell-Soft System all the modules are integrated to test for any
inconsistencies appear in the interfaces. Moreover difference in program structures is removed
and a unique program structure is evolved.

 Validation Testing or System Testing


This is the final step in testing. In this the entire system is tested as a whole with all forms,
code, modules and class modules. This form of testing is popularly known as Black Box testing
or System tests.

Black Box testing method focuses on the functional requirements of the software. That is,
Black Box testing enables the software engineer to derive sets of input conditions that will fully
exercise all functional requirements for a program.

Black Box testing attempts to find errors in the following categories; Incorrect or missing
functions, interface errors, errors in data structures or external data access, performance errors
and initialization errors and termination errors.

24
.
 Output Testing or User Acceptance Testing

The system considered is tested for user acceptance; Here it should satisfy the firm’s need.
The software should keep in touch with the perspective system; At the time of developing the
user has to make the changes wherever required. This is done with respect of the following .

 Input Screen Designs.


 Output Screen Designs.
 Online message to guide the user and the like.

The above testing is done by taking various kinds of test data. Preparation of test data
plays a vital role in the system testing. After preparing the test data, the system under study is
tested using that test data. While testing the system test data errors are again uncovered and
corrected by using above testing steps and corrections are also noted for future use.

25
CHAPTER V
IMPLEMENTATION
Implementation is the stage of the project when the theoretical design is turned into a
working system. The implementation stage is a systems project in its own right. It includes
careful planning, Investigation of current system and its constraints on implementation, design of
methods to achieve the changeover, training of the staff in the changeover procedure and
evaluation of changeover method.

The implementation phase is also used to test the developed package with sample data,
correct the error identified, appearing the user of various special facilities and features of
computerized system.

The first task in implementation is planning, deciding on the methods and time scale to be
adopted. Once the planning has been completed, the major effort is to ensure that the program in
the system is working properly. At the same time concentrate on the training of the staff. When
the staffs have been trained, the complete system involving both computer and user can be
executed effectively.

Implementation is used to mean the process of converting a new or a reversed system


designed into an operational one. Conversion is one aspect of implementation.

26
CHAPTER VI
CONCLUSION
It has been a great pleasure for me to work on this exciting and challenging project. This
project proved good for me as it provided practical knowledge of not only programming in
VISUAL BASIC application and MS ACCESS, but also about all handling procedures related
with “Cable TV Management System”. The system was tested with all possible sample data and
performance proved to be very effective, efficiently and satisfactory. Although CMS provides
many advantage, its implementation is a strategic decision, which involves significant resources
(both financial and human), proper evaluation and business process re-engineering. There must
be commitment from all levels. A failed implementation may lead to bankruptcy of an
organization.

27

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy