Vous êtes sur la page 1sur 43

Cyber Cafe

Acknowledgement

We sincerely feel the credit of the project work could not be narrowed
down to only on individual. The development of this project involves many
valuable contributions.

We are thankful to Mr.K.H.Wandra sir to introduce this mini project and


inspiring us all time. We would like to thank Ms. Madhu Shukla and Mr. Dhaval
Nimavat to being very co-operative and helpful while project was being
processed. The project could not have completed without help of them.
Finally, we would be thankful to our parents, friends & almighty that have
inspired and gave us strength while making this project.

Dipesh Sompura (43)


Divyarajsinh Vaghela (47)

Cyber Cafe

Abstract
This is era of information technology. Science has taken and is taking
great strides in this field, which has result in making mans life more comfortable
and easier. Today computers have become necessity of everyones life like food
Water and air.
More efficient computers are invented and more advanced software are
developed in order to make many complex processes fast and easy.

Our project is on Cyber Caf Management for cyber cafe owner. We have
made our best attempt to make software for all Customers information store in
database safely. This software is used for reliability and efficiency.

Cyber Cafe

Content
Abstract
1. Introduction
1.1 Project purpose
1.2 Purpose
1.3 Scope
1.4 Technology and Literature Reviews
2. Project Management
2.1 Project planning and scheduling
2.1.1 Project Development Approach
2.1.2 Project Plan
2.1.3 Schedule Representation
3. System Requirement Study
3.1 User Characteristics
3.2 Hardware and Software Requirements
3.3 Constraints
4. System Analysis
4.1 Study of Current Study
4.2 Feasibility Study
4.3 Requirements Validation
4.4 Functions of System
4.5 Data Modeling
4.5.1 Use Case Diagram
4.5.2 Class Diagram/ER Diagram
4.5.3 System Activity or Object Interaction Diagram
4.5.4 Data Dictionary
4.6 Functional and Behavioral Modeling
4.6.1 Context Diagram
4.6.2 Data Flow Diagram (including leveling)
4.6.3 Process Specification and Decision table
4.7 Selection of Hardware and Software (Justification)
5. System Design
5.1 Database Design/Data structure design
5.1.1 Table and Relationship
6. Implementation Planning and Detail
6.1 Implementation Environment
6.2 Program/module specification
6.3 Security features
6.4 Coding Standard

Cyber Cafe
6.5 Sample Coding
7. Testing
7.1 Testing Plan
7.2 Testing Strategy
7.3 Testing Methods
7.4 Test Cases
8. Screen shots and User Manual
9. Limitation and Future Enhancement
10. Conclusion

Cyber Cafe

PROJECT PROFILE

Project Title

: Cyber Cafe

Project Definition

to manage customers information & space in caf is


available or not

Project Members

1) Dipesh Sompura (43)


2) Divyarajsinh Vaghela (47)

Hardware Requirements :

1) Pentium a microprocessor
2) 256 MB RAM
3) 40 GB HARD DISK

Software requirements

1) Microsoft Windows XP Professional


2) Microsoft Windows
3) Visual Studio 2008

Platform

1) .Net Technology

Cyber Cafe

1. INTRODUCTION:
1.1 Project Summary:
We have made the project on Cyber Caf System. We are sure that this
is going to be useful to cyber cafe owner.. In which we have used C# and .Net
Technology. All the processes, which are included in making this project
successful in technical terms, will be described in this report. The basic idea of
how the software will work is described in this document.
In our project, we have provided the way that if the space is not available
then it can automatically not enter the user. It will make the time duration of
customer automatically and also the payment as well.
1.2 Purpose
Earlier the customer had to give time of surfing in cyber caf. But we have
made our project that customer will come out of this headache. Because this
software does all that things automatically. On the other hand, the payment is
displayed itself. So,caf owner has no more migraine of that.
If customers information is needed then it can be easily available from the
database. So, it reduces paperwork or manual work as well. In short, we have
tried to make a project that can be useful to the people in future. We are sure that
it is also going to be helpful to us to learn about what is helpful for our future.
System should also maintain reports properly, which are generated by
different computers. Payment information should be also properly stored which
will help while performing calculations related to expense on particular customer.
1.3 Scope
Speed and faster access to data
Easy cafe process
Better availability of day to day schedules
Easily available information
Reduced paperwork
It cant store customers data long time

Cyber Cafe
1.4 Technology & Literature View:
We are being familiar with .Net technology in this 6 th -Sem. So, we thought
to make software that is relied on it. On the other hand, it gives us more idea in
our studies also. This technology is well known and widely used in the market.
Therefore, it would be helpful to us in future also.
We will have to keep pace with this technology in future. So, it is good for
us also. This technology can work with all the languages of software. So, we get
on well with this as well. This technology is widely used in market and not so
expensive at all. Its features are very effective for making software.
We have made an attempt to give our best in this project by using recent
technologies. As we knew the requirements of Cyber Caf Management, we
made our mind to make project on this. We have tried to carry all needs of
particular system. In short, we can say that this project has used .Net technology
very frequently.

Cyber Cafe

2. PROJECT MANAGEMENT
2.1 Project planning & scheduling
2.1.1 Project development Approach:
First, we just gathered the information needed to cyber cafe process. We
just decided to give an easy approach to the user and customer.
We have reached the brief description about requirements of cyber cafe
management. So, we made software that is useful to cyber caf.
It makes an easy and simple way to the customer as well as user. We
have
Used easy technology to reach at our goal.
2.1.2 Project plan
Project Name

Cyber cafe system


To develop a system that facilitates maintenance &

Project Objectives

monitoring of different processes followed by cyber cafe

Duration
Guided by
Team size
Technology

system
Two months
Ms. Madhu Shukla
2
C#,.Net tech
Easy process of

Advantages
Limitation

cyber cafe, fast find customer

information, efficient, Flexibility, less paperwork


It cant store customers data long time

2.1.3. Schedule Representation


A project schedule provides a road map for us to achieve our milestones. If
it has been properly developed, the project schedule defines the tasks and
milestones that must be tracked and controlled as the project proceeds. Tracking
can be accomplished in number of different ways:

Conducting periodic project status meeting in which each team member


report progress and problems.

Cyber Cafe

Evaluating the result of all reviews conducted throughout the software


engineering process.

Determining whether formal project milestones have been accomplished


by the scheduled rate.

Comparing actual start date for each project task listed in the resource
table.

Meeting informally with practitioners to be obtained their subjective


assessment of progress to date and problems on the horizon.

Using earned value analysis to assess progress quantitatively.


Control is employed by a software project manager to administer project

recourse, cope with problems, and direct project staff. If things are going well,
control is light. But when problems occur, the project manager must exercises
control to reconcile them as quickly as possible.
RESPONSIBILITIES
Analysis
Analysis Review
Design
Design Review
Coding
Front-site Design
Design Review
Testing
Documentation

DIPESH

DIVYARAJ

Cyber Cafe

3. SYSTEM REQUIREMENT STUDY


System requirement specification contains the requirement for the system
and its functional operations.
3.1 User Characteristic:
User:

User can enter the data about customers.

User can proceed to provide space

User can edit / search the customers data.

User can get the information of time & payment

User can be free with migraine of paperwork.

User can store large no of data & retrieve easily.

3.2 Hardware and Software Requirements:


Hardware Requirement:
We have required the devices as we have mentioned below while making
our airways reservation software.

Computer : Intel P4 Processor with 2.0 GHz

RAM 256MB

HDD - 40GB
CD Drive 150kbps

Software Requirement:
As we are learning .net technology, so we had decided to keep our pace
with this technology. Therefore, we used which is familiar to us. We also used
some other softwares to achieve our goal as below.

Cyber Cafe
Windows XP with higher version
Visual studio 2008
C# with .Net
.Net technology
MS office for documentation
3.3 Constraints:
This topic includes hardware requirements for installing the various Visual
Studio editions, the Express editions available for Visual Studio programming
languages. The computer on which you install your Visual Studio edition should
meet minimum the following system requirements
Pentium IV Processor or above.
40GB hard-disk.
256 MB of RAM.
These constraints are needed while making project. It includes some
symbols and photographs as well from the particular program to add into
the project. It makes our software simply graceful.

Cyber Cafe

4. SYSTEM ANALYSIS
4.1 Study Of Current System
In the current system no monthly report generation is specified by just
clicking generate report.
1.

If the user is unauthorized then he or she can break the password


because password is stored in the same application in which the

2.

application is running so the security is poor.


The user will be in the confusion because of some difficult task.

The current system is manual writing system. If the space in cyber caf is
not found then it will inform the user about that there is no space available. It will
display that Space is not available now.

4.2 Feasibility
Objectives of System Feasibility Analysis

Identify the users need

Evaluate the system concept for feasibility

Perform economic and technical analysis

Allocate functions to H/W, S/W, people, database and other System


analysis

Establish cost and schedule constraints

Create system definition forming the foundation for all subsequent work.

Three specific tests were carried out on the system to test its feasibility namely,
Operational, Technical and Economical.
4.2.1 Technical Feasibility
This system is technically feasible because all required technologies are
available today in market. Visual studio 2008 is available in market now which
includes all requirements to complete this software. On the whole, this is very
interesting technology. This provides every tool to make this project. Even this

Cyber Cafe
technology is concerned with many languages like C, C++, C#, Oracle and many.
The technical issues and their answers are as follows:
Is the proposed technology or solution practical?
Accuracy:

The system here is accurate and it provides accurate and correct

result.
Reliability: The system is trustworthy and gives perfect return on investment.
Easy of access: Any technical and non technical user can use the system and
easily get response or get solution of their queries from the system.
Security: User has to enter valid password and id for accessing the system.
So, we can say that the proposed technology or solution is practical.
Do we currently have necessary technology?
Yes, this project needs .Net Technology. Here, we have used this
technology in making of this project.
Do we possess necessary expertise?
Yes, that is possible because this technology is frequently used in market
and we can possess them if needed.
4.2.2 Economical Feasibility
This project requires no more requirements rather than computer.
Because, its all about making software. Even the softwares it needs are very
easily available in market at very cheaper cost. So this is economically feasible at
all.
Cost Benefits Analysis: Cost Analysis:

The initial cost of the System will include PCs & software.
The basic cost of the System will be the Software, which will be
required for

the System. It also includes the purchasing of that

Software.

The operator by entering the id or name of the field can easily access
the information

Cyber Cafe

The billing and searching of the system is quiet accurate and quick that
it will save the time consumption.

Benefit Analysis:
Tangible benefits: The system is directly saving cost as there is no requirement of direct
training to the users, no wastage of extra recourses like time, human power etc.
Intangible benefits:The system provides better services to the users. It also provides the
users with accurate, reliable and up-to-date information about the system.
4.2.3 Operational Feasibility
Any project proposed can be beneficial only if it satisfies the customers
requirements. If project is included with everything which is in old project in
addition with new features then this system is operationally feasible if all Users
are satisfied with system. The following points have been probed to declare the
proposed system as operationally feasible.
The newer system will accommodate all the requirements.
The new system can greatly help by reducing all paper work and availing all
needed information of the customer with just a click of the mouse button.
The newer system will fit to its existing system and perform more function
than manual system.
The user of the system will get the information at the time when they need it,
and also speed up the transaction processing.
The system will work when it is developed and installed and there are no
major barriers to its implementation. This accounts for the operational
feasibility of the proposed system.
4.2.4 Schedule feasibility:

Cyber Cafe
The project was assigned on starting of the semester and we have enough
time of 2 month to complete our project. The project completion is 31-Mar-2009.
So the project is schedule feasible. Here, we have given milestones to achieve
the task.

Milestones and Deliverables


A milestone is a subproject that you should have completed at the given
point in time, if you want to keep on track then.
A deliverable is a documentation of a part of a project that you are required
to hand in. The given deadlines are firm.
Deliverables are usually milestones but milestones need not to be
deliverables.
SR

ACTION

START DATE

END DATE

NO
1

Analysis

27/01/2009

05/02/2009

Design

10/02/2008

25/02/2008

Development

03/03/2009

08/04/2009

4.3 Requirements Validation


Requirement validation is concerned with showing that the requirement
actually defines the system which customer wants. It has much common with
analysis as it is concerned with finding problems with the requirement. However
they are distinct processes since validation should be concerned with a complete
draft of the requirement document whereas analysis involves working it
incomplete Requirement.
During requirement validation process different types of check should be
carried out on the requirement in the requirement document. This check includes:

Cyber Cafe
The Name of the Users should be character oriented.
The Password should contain only characters and numbers. It should not
include special character.
The format of the date should be DD-MON-YYYY
In the Find and Search models, we have to enter the Name of the Customer
or id of the customer in order to find the all information of customer.

4.4 Function of System


Our system for cyber caf management system specifies how the
information held by the cyber caf about, booking and availability is maintained.
Hence following functions are carried out:
1. Registration Of Surfing:
Description: This functionality is used to register the operator. It is
compulsory for the operator to fill the Register then only they get the information
related to the System.
Inputs: Username and Password
Source: Username and Password provided by operator, password from
database.
Output: Authentication to operator to access the ticket, passenger and bill related
information.
2. Search and Viewing:
Description: This functionality is used to find zip codes of various state,
city and country. It also includes a functionality, which is used to find zip codes of
state, city or country by just providing the address (that is name of state, city or
country).
Input: Take the various zip codes from the user.
Sources: Username and Password provided by user.
Outputs: The zip code from the given information of the user.

Cyber Cafe
Input: Request the user for the any services.
Sources: Username and Password by user.
Outputs: The request services will be provided and desirable output will be
provided.

4.5 Data Modeling


4.5.1 Use-case Diagram:

Cyber Cafe

4.5.2 CLASS DIAGRAM :

Cyber Cafe

4.5.3 Activity Diagram:

Cyber Cafe

Cyber Cafe

Start
Login
Login
Customer
Customer
Information
Information
Valid

Menu
Menu

Available
Available

space
space space
space

entry
entry

Invalid

Relogin
Relogin

Cyber Cafe

End
4.5.4 DATA DICTIONARY:

Login:

Field

Sr.No

Data
Description

Name

Types

1.

Admin_id

Text

Describes the administrators


identification

2.

Password

Varchar(50)

Describes the administrators


password

Table name: cust_info

Sr.No

Field

Data
Name

Types

1.

id

Int

2.

name

varchar(50)

3.

addresh

varchar(50)

age

int

gender

int

Ph_no

varchar(MAX)

In_date_time

bit

Pc_no

float

Cyber Cafe
Table name :- bill_info

Cyber Cafe

Sr.No

Field

Data
Name

Types

1.

id

Int

2.

name

varchar(50)

3.

Pc_np

varchar(50)

In_date_time

int

Out_date_time

int

Total_duration

varchar(MAX)

Total_amount

bit

4.6.1 context diagram

Cyber Cafe
Surfing
information

Time
Information

customer
Details

Payment

Customer

Time Details

Customer Information

Cyber Cafe
Management

Customer
Information

Receptionist

Payment
Information

Surfing Information
time Information

Manager

Cyber Cafe
4.6.2 Data Flow Diagram

Password

Process
for login
system

User

Conformation
Inquiry about
customer

User
Customer
info.

Process for
Cyber Cafe
system

Customer

Payment

Customer
data

Time
info

4.6.3 Process Specification & Decision Table


Login Process

Manager
Info. about
availability
of space

Surfing
info

Cyber Cafe

IF user enters username & password


THEN

enter into the system.

ELSE
Invalid user.
END IF.
Process For Surfing
WHILE customer make request
IF space is available
THEN provide pc to customer
ELSE
Not available
ENDIF
ENDWHILE
Process For Payment:
WHILE customer log off pc
IF customer doing payment
THEN receive & confirmation
ELSE
Not receive & not confirmation
ENDIF
ENDWHILE

Cyber Cafe
4.7 Selection Of Hardware & Software
Hardware Technology Used:
To run the application software of the system in the computer the
minimum configuration required is as below:
768 MHz Pentium processor or other compatible.
Intel Chipset Motherboard.
256 MB-RAM.
10 GB Hard-Disk.
52X Compact Disc drive or faster.
Monitor. [640 * 600 Display]
Software Technology Used:
.Net Platform

Cyber Cafe

5.

SYSTEM DESIGN
5.1 Database Design / Data Structure Design
5.1.1. Table and Relationship

Table name: cust_info

Sr.No

Field

Data
Name

Types

1.

id

Int

2.

name

varchar(50)

3.

addresh

varchar(50)

age

int

gender

int

Ph_no

varchar(MAX)

In_date_time

bit

Pc_no

float

Table name :- bill_info

Cyber Cafe

Sr.No

Field

Data
Name

Types

1.

id

Int

2.

name

varchar(50)

3.

Pc_np

varchar(50)

In_date_time

int

Out_date_time

int

Total_duration

varchar(MAX)

Total_amount

bit

Cyber Cafe

6. IMPLEMENTATION PLANNING AND DETAILS


6.1. Implementation Environment
Single vs. Multiuser
As the cyber cafe management system is going to be
developed id desktop application,at the time of the
implementation it should be kept in mind that system will be
used con currently.So the development approach would remain
for the concurrent use.
GUI vs. Non GUI
The system is completely GUI. This is because today
customer
feels comfortable while working with images or
pictures.The user should feel convient while wporking with the
system
6.2 Program/Module specification
Single Layer
This module of the project deals with the categorized
the different themes of the map like point,line and polygon into
their respective types after distinguishing them differently from
the database. It displays the map single layer that can be of any
feature like point, line or polygon theme.Displaying map of
single layer explorers the entire details of the selected layer.
Multi Layer
Seconly, comes the module for the multilayer.Here the
individual themes that were selected in the above module are
overlaid on the other type of the theme.Doing this makes the
decision making process eaiser about which place is related to
other like if there is no way near very good polygon feature then
it would show that would be profitable to dig well at that place.
Query Builder
In the above two modules we were just retrieving the data from
database which already store after converting from SHP to SQL
format in the form of map .Now we need to query that map.So
as per the type of query fired we could be able to get the result
using query builder.Thus ,in order to get the detail and display
of the desired location we make use of query builder.
6.3

Security Features
The editing of database and the result is all protected by the
password, which only administers can access. (In this case its
us.)
The admin side is password protected.Only authorized user can
access

Cyber Cafe
the admin side.
6.4 Coding Standard
We have followed the coding standards throughout this application
Each table name is given in such a manner that it indicates
its use
Each script is properly documented by comments to carify
its presence.
Variables names are related to the process and the behavior
of the entity.
We have used tab instead of space in our project.
Keywords are never used as variable name in our project
6.5 Sample Coding
using System;
using System.Collections.Generic;
using System.ComponentModel;
using System.Data;
using System.Drawing;
using System.Linq;
using System.Text;
using System.Windows.Forms;
using System.Data.SqlClient;
namespace WindowsFormsApplication1
{
public partial class Form4 : Form
{
SqlConnection cn;
SqlCommand cmd;
SqlDataAdapter da;
DataSet ds = new DataSet();
public Form4()
{
InitializeComponent();
}
private void label7_Click_1(object sender, EventArgs e)
{
textBox5.Text = DateTime.Now.ToString();
}
private void button1_Click(object sender, EventArgs e)
{
cmd = new SqlCommand("insert into cust_info values(@a,@b,@c,@d,@e,@f,@g,@h)",
cn);
cmd.Parameters.AddWithValue("@a", Convert.ToString(textBox1.Text));
cmd.Parameters.AddWithValue("@b",textBox2.Text);
cmd.Parameters.AddWithValue("@c", textBox3.Text);
cmd.Parameters.AddWithValue("@d", textBox4.Text);

Cyber Cafe

if (radioButton1.Checked == true)
{
cmd.Parameters.AddWithValue("@e",Convert.ToString(radioButton1.Text = "male") );
}
else
if (radioButton2.Checked == true)
{
cmd.Parameters.AddWithValue("@e",Convert.ToString(radioButton2.Text =
"female"));
}
cmd.Parameters.AddWithValue("@f", maskedTextBox1.Text);
if (maskedTextBox1.MaskFull)
{
MessageBox.Show("full space");
maskedTextBox1.Text = "";
maskedTextBox1.Focus();
return;
}
cmd.Parameters.AddWithValue("@g", textBox5.Text);
cmd.Parameters.AddWithValue("@h", textBox6.Text);
cn.Open();
cmd.ExecuteNonQuery();
cn.Close();
MessageBox.Show("done");
ds.Clear();
reload();
Form5 f5 = new Form5();
f5.Show();
this.Hide();
}
private void Form4_Load(object sender, EventArgs e)
{
cn = new SqlConnection(@"Data
Source=.\SQLEXPRESS;AttachDbFilename=C:\Documents and Settings\dipesh sompura\My
Documents\Visual Studio
2008\Projects\WindowsFormsApplication1\WindowsFormsApplication1\Database1.mdf;Integrated
Security=True;User Instance=True");
reload();
}
public void reload()
{
da = new SqlDataAdapter("select * from cust_info", cn);
da.Fill(ds);
}
private string remove(int p)
{
throw new NotImplementedException();
}
private void button2_Click(object sender, EventArgs e)
{
Form3 v = new Form3();
v.Show();
this.Hide();
}

Cyber Cafe
private void button3_Click(object sender, EventArgs e)
{
cmd = new SqlCommand("update cust_info set id ='" + textBox1.Text + "',address='" +
textBox3.Text + "',Age='" + textBox4.Text + "',gender='" + radioButton1.Text + "',ph_no = '" +
maskedTextBox1.Text + "',date_time = '" + textBox5.Text + "',pc_no = '" + textBox6.Text + "'where
name ='" + textBox2.Text + "'", cn);
cn.Open();
cmd.ExecuteNonQuery();
MessageBox.Show("Data Updated");
textBox1.Text = "";
textBox2.Text = "";
textBox3.Text = "";
textBox4.Text = "";
if (radioButton1.Checked == true)
{
radioButton1.Text = "male";
}
else
if (radioButton2.Checked == true)
{
radioButton2.Text = "female";
}
maskedTextBox1.Text = "";
textBox5.Text = "";
textBox6.Text = "";
cn.Close();
Form5 b = new Form5();
b.Show();
this.Hide();
}
private void button4_Click(object sender, EventArgs e)
{
cmd = new SqlCommand("delete from cust_info where name='" + textBox2.Text + "'", cn);
cn.Open();
cmd.ExecuteNonQuery();
MessageBox.Show("Data deleted");
textBox1.Text = "";
cn.Close();
Form5 a = new Form5();
a.Show();
this.Hide();
}
private void button5_Click(object sender, EventArgs e)
{
MDIParent1 W = new MDIParent1();
W.Show();
this.Hide();
}
private void button6_Click(object sender, EventArgs e)
{
Form5 h = new Form5();
h.Show();
this.Hide();
}
}}

Cyber Cafe

7. TESTING
The aim of testing process is to identify all defects existing in software
product. Testing a program consists of subjecting the program to as
test inputs and observing if the program behaves expectedly or not. If
the program fails by any means or gives unexpected results than the
failure occurred are noted for later debugging and corrections.
7.1 Testing Plan
The testing process is a process that to a greater extends
runs in parallel with other processes. As the same thing applied for the
whole system for testing and once the entire module works perfectly
as desired, at later stages test suite are made to test in integrated
environment to check for proper functioning. So the software is tested
at various levels by various testing techniques. A well rounded test
plan notes any risk factors that jeopardize and includes a testing
schedule. So we can say that Test planning details the activities,
dependencies and effort required to conducting the system test.
7.2 Testing Strategy
The test strategy is a formal description of how a software
product will be tested. A test strategy is developed for all levels of
testing as and when required. The testing team analysis the
requirements, writes the test strategy and reviews the plan with the
project team. The test plan may include test cases, conditions and the
test environment, a list of related tasks, pass/fail criteria and risk
assessment.
As we were working in a team it was a bit difficult to check the
work done as no individual was assigned for that particular task or
work. Moreover checking the work done was very important to reduce
risk factor. Right from the starting we planned to adopt one technique
called Assessment by rotation. Thus the work done by one member
was assessed by the other for some time and again revolved for other
level check reduced the errors.
7.3 Testing Methods
Testing methods are mainly divided into two parts:
1) Black Box Testing
2) While Box Testing
1) Black box testing: It is the testing without the knowledge of the
internal working of the item being tested. For this testing test
groups are often used. Due to the nature of this testing the test
planning can begin as soon as the specifications are written. This
testing has some advantages like it is more effective on larger units
of code than glass box testing, tester needs no knowledge of
implementation, including specific programming languages, tester
and programmer are independent of each other, tests are done
from a users point of view, will help to expose any ambiguities or

Cyber Cafe
inconsistencies in the specifications, test cases can be designed as
soon as the specifications are complete.
2) White box testing: It is the testing strategy that deals with the
internal logic and structure of the code. White box texting is also
called as the glass testing, structural testing, open testing or the
clear box testing. The advantages of the white box testing are that
as the knowledge of internal coding structure is needed, it becomes
easy to find out which type of input data can help min testing the
application effectively. It helps in optimizing the code helping in
removing the extra code which may cause hidden defects in the
system.
The other sub testing techniques are as follows:
Unit Testing
Unit testing focuses on verification effort on the smallest unit of
the project that is the module. Unit testing exercises specific
paths in a modules control structure to ensure complete
coverage and maximum error detection. This test focuses on
each module individually, ensuring that it functions properly as a
unit. Hence, the naming is Unit testing.
Integration Testing
Integration testing addresses the issues associated with the
dual problems of verification and program construction. After the
software has been integrated a set of high order tests are
conducted. The main objective in this testing process is to take
unit tested modules and builds a program structure that has
been dictated by design.
Task Testing
Task testing helps the system to test whether all the tasks are
carried out properly or not. It also solves logical errors. By
carrying this test we were assured that all processes in our
project are appropriate.
Behavioral Testing
This testing is used to check the behavior of the system. This
test helped us to develop the test case for the particular system.
This testing thus helps to test the different events associated
with the system.
Inter Task Testing
There are several processes or tasks which are carried
simultaneously. Moreover this testing also helps to test the
errors associated with the data storage activities. This testing
helped our project to solve the error while data designing which
is very much important for a successful project.
Final Testing

Cyber Cafe
After the integration of all the modules we deploy whole
application. One of the member of the development team will do
the testing of the whole project and create the excel sheet of the
bugs. After the completion of the solving of these errors the
project would be ready to use.
Alpha Testing
Alpha testing is done by the person not involved in the project.
In our case it would be done by out concerned faculty members
itself.
7.4 Test Cases
In software engineering the most common definition of a test case is
set of conditions or variables under which a tester will determine if a
requirement or use case upon an application is partially or fully
satisfied. In the situation each sub requirement must have at least one
test case. A good test should neither be too simple nor too complex.

Cyber Cafe

8. SCREEN SHOTS AND USER MANUAL

LOGIN FORM: This form is used by administrator to login and access


Menu form :(mdi form)

Cyber Cafe

Available space

Customer entry

Cyber Cafe

Customer & system detail

Customer bill paid

Cyber Cafe

Cyber Cafe

9. LIMITATION AND FUTURE ENHANCEMENT


IQ test is developed to serve the very basic purpose to check the users IQ level.
The limitation of the project can be considered it to be a windows
application and so no online test can be conducted.
The project being developed in Oracle and Microsoft Visual Studio .Net
which are extensively used tools today so can be easily converted to
other system structure according to the requirement in near future.

10.

CONCLUSION

The project CYBER CAFE helps the user to keep record. Moreover the
system also provided with the option to begin with any subject of choice. This

Cyber Cafe
project deals management of cyber caf The project aids an additional
feature like bill generation, number of user display, data of each user, efficient
management .

Vous aimerez peut-être aussi