Académique Documents
Professionnel Documents
Culture Documents
INDORE STADIUM
MANAGEMENT
SYSTEM
An Overview
Account Auditing in India is known as an examination of financial
statements i.e. balance sheet and profit & loss a/c, books of account and
related vouchers so as to help the auditor to form an option as to whether
the financial statements show true and fair view of the business affairs or
not, and if not, then in what respect it is not showing the true picture of
the business activities.
Auditing is done by the auditor to find out whether the financial
statements are prepared by business concerns to know the result of the
business activity undertaken by them throughout the year.
The financial statements would show true and fair view regarding the
business activities when all the following features are present:
1. All the transactions in the course of business are recorded in the
books of account and accurately.
2. Transactions are recorded according of the accepted accounting
principles.
3. The financial statements are drawn in conformity with the books of
account.
4. Financial statements are prepared as per accepted rules and
regulation of the companies act, 1956 and other legal provisions.
5. When there are no errors and frauds presents in the books of
accounts.
System Specification
HARDWARE SPECIFICATION
Processor
Pentium IV or above
Speed
RAM capacity
Key Board
Mouse
Monitor
17 Samsung
Operating System
Database
Language
C#.Net
IDE
Version3.5
Reports
SOFTWARE SPECIFICATION
A set of building block services that are a user centric set of XML Web
services that move control of user data from applications to users. For
example, Microsoft passport is a core component of the .NET initiative
that makes it easier integrates various applications.
Tools, such as Visual Studio .NET, which can be used to develop XML
Web services and Windows and Web applications for an enriched user
experience.
The .NET Framework provides the foundation upon which applications
and XML Web services are built and executed. The Unified nature of the
.NET Framework means that all applications, Web applications, or XML Web
services, are developed by using a common set of tools and code, and are
easily integrated with one another.
Class libraries.
.NET.
The .NET Framework provides the necessary compile-time and runtime foundation to build and run .NET based applications.
The .Net Framework
The .NET Framework consists of different components that help to
build and run .NET-based applications:
Platform Substrate
The .NET Framework must run on an operating system. Currently,
the .NET Framework is built to run on the Microsoft Win32 operating
systems, such as Windows 2000, Windows XP, and Windows 98. In the
future, the .NET framework will be extended to run on other platforms,
such as Windows CE.
technology.
ADO.NET
provides
improved
support
for
the
Web Forms, which work through ASP.NET and the Hypertext Transfer
Protocol (HTTP).
Languages
Any Language that conforms to the Common Language Specification
(CLS) can run with the common language runtime. In the .NET Framework,
Microsoft provides support for Microsoft Visual Basic .NET, Microsoft
Visual C++ .NET, C#, and Microsoft J Script .NET. Third Parties
can provide additional languages.
OOPs Support
Multi-Language Support
Multi-Device Support
Security
The server locates the page in the disk Submitting Data in the
Augmented URL: Get Method
The ASP.NET Engine compiles the page and generates the page
class. If the class had already been loaded, it simply provides a
thread to the running class instead of regenerating the class.
During compilation, it may require other code classes, such as
code-behind classes and component classes. These are assembled
during this step.
The Web server then sends the Response object to the client.
ADVANTAGES OF ASP.NET
ASP. Net has many advantages - both for the programmers and for the
end users.
DATABASE DESIGN
A collection of data designed to be used by different people is called
a database. It is collection interrelated data stored together with controlled
redundancy to serve one or more applications in an optional fashion.
The data is stored in such a fashion that it is independent of the
programs of people using the data. A common and controlled approach is
used in adding new data and modifying and retrieving existing data with in
the database.
It is the product of
Microsoft. The version of SQL used by SQL SERVER 2005 is called Transact
SQL.
It receives requests
from the clients for data and returns the result of the processed query. All
the SQL statements are submitted to the Transact-SQL, which on receiving
them passes the result and displays it for the user.
SQL solved the ad hoc needs of users; the need for data access by
computer programs did not go away. In fact, most database access still
was (and is) programmatic, in the form of regularly scheduled reports and
statistical analyses, data entry programs such as those used for order
SQL SERVER
MS Access
Sybase
Oracle
Ingress
Informix
Features of SQL
SYSTEM ANALYSIS
Existing System
At present the stadium is not using any software for automation. The
entire process of record maintenance is done manually. Manual system
does not mean that they are working with pen and paper alone. It also
includes working on Tally and other simple software's. This method has
many limitations. The manual system is relatively slow compared to
automated systems. Updating information becomes a tedious task since
various ledgers will have to be updated. Moreover there is no traceability.
In case a need arises to find the details of a particular client, one has to
search through all the records. This is time consuming and ineffective.
Frequent handling of registers and files tend to damage them. Stocking of
these reports is another aspect that has to be looked into. As years go by,
these registers will take up a major portion of office space. Also there is
almost no method to generate report. Above all, there is no security for the
data. The registers are handled by various personals and informations are
open to all.
High reliability.
Tight security, the person who has authority can only enter into the
Application
Accurate Calculation
More secure.
Administrator Module
users Module
Payments Module
Module
Module
Administrator Module
This module maintains the services related to system administrator
who is authenticated upon the system. This module fairly maintains the
integration between the modules related to backend database and the
functionalities
carried
out
in
the
whole
organization.
Administrator
provides/denies reg: for the users. The administrator also verifies the
Queries, if any, from the users and sends response to them
Reports Module
This module can generate various reports based on the requirements.
Various reports that can be generated are:
Clients list
Employee Details
Audit Schedules
Audit Reports
During
DESIGN NOTATIONS
DATA FLOW
DATA STORE/DATABASE
PROCESS
SOURSE/SINK
DFD Level 0
Local visitors
Enter
services,
allocate tasks
Admin
View task
status
Stadium
Management
System
Enter Task
Status
Registered
users
View Tasks
Allocated
Create
Company
Details
Users
Login
Admin User
Create
Auditing
services
Company
Create new
Employees
Change
Password
Audit
Services
Employee
Book
Company
Services
Services
Booked
Create
Auditing
Service
Activities
Create audit
schedule
Service
Activity
Assign
Services
Booked
Assigned
Tasks
Track
Assigned
Status
Audit
Schedule
Enter
Payments
Payments
Login
Employee
Assigned
View
Activity
Assigned
Update Task
Completed
Tasks
View Audit
Schedule
Audit
Schedule
Users
Change
Password
Tasks
Has
Has
1
Assigned
1
N
Employee
Has
1
1
1
Has
1
Has
Service Activity
N
has
Audit services
Audit Schedule
Has
Has
Services booked
N
1
Has
N
Payments
Company
Has
Control redundancy
Easy to use
Data independence
Performance
details
design
is
the
process
of
converting
the
user-oriented
description of the computer based business information into programoriented specification. The goal of designing input data is to make the
automation as easy and free from errors as possible.
It includes identification of software components, decoupling and
decomposing them into processing modules, conceptual data structures
and specifying relationship among the components. It is concerned with
the
methods
involved
implementation
of
in
packaging
processing
of
processing
algorithms,
data
modules
structure
and
and
capture the data and then select the media used to enter them into the
computer. The input forms are developed in a user-friendly way so that a
layman also can easily understand everything. Menus are provided to users
and different icons are designed so the proposed system design looks
decorative. Input design is the part of the overall system design.
Output Design
Output design is very important concept in the computerized system,
without reliable output the user may feel the entire system is unnecessary
and avoids using it. The proper output design is important in any system
and facilitates effective decision-making. The output design of this system
includes various reports.
Computer output is the most important and direct source of
information the user. Efficient, intelligible output design should improve the
systems relationships with the user and help in decision making. A major
form of output is the hardcopy from the printer.
Output requirements are designed during system analysis. A good
starting point for the output design is the data flow diagram. Human
factors reduce issues for design involved addressing internal controls to
ensure readability.
An application is successful only when it can provide efficient and
effective reports. Reports are actually presentable form of the data. The
report generation should be useful to the management for future reference.
The report is the main source of information for users operators and
management. Report generated are a permanent record of the transaction
occurred. After any valid transactions; have commenced the report of the
same are generations and: filed for future reference. Great care has been
taken when designation the report as it plays an important role in decisionmarking.
is
process
used
to
help
identify
the
correctness,
all
logical
decisions
on
their
true
and
false
sides,
and
Quality Assurance
Generic risks
Security Technologies & Policies
A computer-base system is a combination of many assets or resources
designed to perform some function or to provide some services. Each of
these assets is threatened by one or more of the following unacceptable
events:
Interruption
Disclosure
Removal
Destruction
Security Issues
Security
Integrity
Privacy
Confidentiality
Authentication
In the system brief log on procedure for the customer was provided in
order to enter and access the system. This process is done in order to
identify the valid user.
These attributes are stored in a table that cannot be easily trapped by
unauthorized persons.
File protection
The various files and database tables are also highly secured in this
system. The necessity for securing the files and the table evolves because
some persons who were not given authorization for access may hacker files
and corrupt the tables with wrong data which will response tremendous
hazards to the operations of the system. So in order to avoid these things,
the data encryption standards engine is attached to all files and database
tables associated with the system, which will facilitate encryption and
decryption of files. Backup of the system are also taken as a preventive
measure.
Careful planning
Implementation Procedure
Implementation of software refers to the final installation of the
package in its real environment, to the satisfaction of the intended users
and the operation of the system. The people are not sure that the software
is meant to make their job easier. In the initial stage they doubt about the
software but we have to ensure that the resistance does not build up as
one has to make sure that.
The active user must be aware of the benefits of using the system
Before going ahead and viewing the system, the user must know that
for viewing the result, the server program should be running in the server.
If the server object is not running on the server, the actual processes will
not take place.
User Training
To achieve the objectives and benefits expected from the proposed
system it is essential for the people who will be involved to be confident of
their role in the new system. As system becomes more complex, the need
for education and training is more and more important.
Education is complementary to training. It brings life to formal
training by explaining the background to the resources for them. Education
system,
the
developed
system
should
provide
room
for
Edition: 2003
www.asp.net/
msdn.microsoft.com/asp.net/
en.wikipedia.org/wiki/ASP.NET
www.w3schools.com/aspnet/default.asp