Académique Documents
Professionnel Documents
Culture Documents
A
PROJECT REPORT
(MCA 3rd Semester)
MASTER OF COMPUTER APPLICATIONS
Submitted to
P.G. DEPARTMENT OF COMPUTER SCIENCE & APPLICATIONS
0807CA101079
0807CA101087
Ritu Malviya
Under Guidance of
Professor Kamlesh Malpani
Professor Gopal Phoolkar
Page
1
Page
2
ACKNOWLEDGEMENT
The project entitled Jewelry shop Management System cannot be completed without a
word of thanks to those people whose invaluable support & guidance led to its
successful completion. I extend my sincere through & grateful to Prof. S. R. Gupta
(HOD).
The project entitled Jewelry shop Management System cannot be completed without a
word of thanks to those people whose invaluable support & guidance led to its
successful completion. Prof. Kamlesh Malpani, Prof. Gopal Phoolkar and Computer
center that have been continuous source of inspiration & guided the development of the
whole project. His guidance not only helped us technically, but also kept our morale
high during the development of the project.
I also avail this opportunity to express our heartiest thanks to all Professors of SVIM,
Indore & my classmates for providing me invaluable support & inspiration all through
MCA course.
Page
3
CERTIFICATE
This is to certify that the work embodied in this dissertation entitled Jewelry shop
Management System has been satisfactorily completed by Prem Kumar Patel
(0807CA101075), Rajendra Kumar Yadav (0807CA101079), and Ritu Malviya
(0807CA101087). It is a bonafide piece of work, carried out under my guidance in the
Master of Computer Application, Shri Vaishnav of Institute Management, Indore
for the partial fulfillment of the Master of Computer of Applications degree during the
academic Session July-Dec, 2011.
Approved By
Prof. S. R. Gupta
Head, MCA
Page
4
CERTIFICATE
This is to certify that the work embodied in this dissertation entitled Jewelry shop
Management System has been satisfactorily completed by Prem Kumar Patel
(0807CA101075), Rajendra Kumar Yadav (0807CA101079), and Ritu Malviya
(0807CA101087). It is a bonafide piece of work, carried out under the guidance of
Project mentor in the Master of Computer Application, Shri Vaishnav of Institute
Management, Indore for the partial fulfillment of the Master of Computer of
Applications degree during the academic Session July-Dec, 2011.
External
Examiner
.
Internal
Examiner
Index
Page
5
1. Introduction of client/organization
07
2. Problem Investigation
08
Objective
Solution suggested
3. System analysis
12
Information Gathering
Online Observation
Interviews
Questionnaires
Record Review
4. Project Planning
18
Project resources
1.) Required documents
2.) Hardware & software requirements
3.) Time
Team organization
Specify the role in team.
Schedule
5. Feasibility study
20
Page
6
6. System Design
23
DFD
ERD
29
Front end
Back end
8. Implementation
31
Screen layouts
Forms Layouts
Reports Layouts
9. Testing
42
Testing
Objectives of testing methods
Testing methods (Test cases used)
10. Maintenance
46
11. Conclusion
47
48
Page
7
CHAPTER-1
1. INTRODUCTION
PUNJAB JWELLERS E-biller is a client based billing system. This system deals with shops, it
provides a complete solution to all problems that arise in conventional client based billing software.
E-biller is customizable software; this enables it to be used anywhere in the shopping system. Ebiller has one Component; the windows form application for the branch. It can be easily used to any
system where we want to put the billing system. It is an offline system so we dont need any internet
facility to run the program. It can replace the manual billing entry of book keeping.
The client uses MS Excel, and maintains their product list, customer list, and prints the invoice,
however it is not possible them to share the data from multiple system in multi user environment, there
is lot of duplicate work, and chance of mistake. When the product price are changed they need to
update each and every excel file. There is no option to find and print previous saved invoice. There is
no security; anybody can access any report and sensitive data, also no reports to find out the sales
volume, stock list, and summary report. This e-billing and invoicing system is used to overcome the
entire problem which they are facing currently, and making complete atomization of manual billing and
invoicing system.
It is far faster than the conventional billing system and saves so much of time to increase the efficiency
of billing work for the shop. This is the system which will provide easy entry, viewing products and
keeping the billing records safe in the database. The owner of shop can easily view all the transactions
of billing from the system without any problem. He can keep the track of the billing of the shop without
any error.
Page
8
CHAPTER-2
2. PROBLEM INVESTIGATION
2.1 The Future Digital Jewelry Shop
The digital Jewelry Shop of the future will provide electronic access to information in many different
forms. Recent Technological advances make the storage and transmission of digital Jewelry
information possible. This paper will describe the design of a Jewelry Shop Management System
(DJSMS) suitable for storing, indexing, searching, and retrieving video and audio information and
providing that information across the internet or the evolving National Information Infrastructure. To
be an effective Jewelry Shop, users need to be able to find the Jewelry items they want.
Realizing this goal will require ground breaking research into automatic content-based indexing of
Jewelries that will significantly improve the users ability to access specific segments of interest with
Jewelries.
In our approach, Jewelries items and transcripts will be digitized, this will allow users to quickly search
indices for multiple Jewelries to locate the segments of interest, and to view and manipulate these
segments on their remote computer. While this technology would be applicable to any collection of
Jewelries, we will target educational users, providing teachers with the ability to select segments of
nature and/or current events videos which complement their lessons.
Page
9
Drawbacks:
Page
10
2.4 Objectives
3
4
5
6
7
8
9
10
11
1.
2.
3.
4.
5.
6.
CHAPTER-3
3
SYSTEM ANALYSIS
Information gathering refers to requirements gathering for the System. It includes study of the Project
scenario and searching for the data that needs to be stored and retrieved, and also how the system will
interact with the users.
1. Online Observation
This technique refers to gathering requirements for the system by searching for the resources available
online, so that facts about already existing similar systems could be studied. This forms the layout for
the system that is to be built.
2. Interviews
This technique refers to gathering requirements for the system by interviewing the clients. Here, the
clients show how they want the system to be and how will the system interact with the users, what data
will be stored, what data will be retrieved and how.
3. Questionnaires
This technique refers to gathering requirements for the system by asking questions. These questions
can be asked by team members themselves, or else Users of the already existing similar systems.
4. Record Review
After requirements gathering phase, the facts gathered about the system are reviewed, so that the
overall layout and working of the system could be analyzed and studied.
1. Select Model
Water fall model
One such approach used in software development is the waterfall model ,waterfall model approach was
first a process model to be introduced and fallowed widely in software engineering to ensure success of
the project .
In waterfall approach the whole process of software development is divided in to separate phases
.these phases in waterfall model are
A: Requirement specification phase
B: software design
C: implementation
D: testing and maintenance
Diagram
Requirement gathering
and analysis
Page
System design
14
Implementation
testing
Deployment of
system
Maintenance
in each and every register name and year. These serial numbers are unique in nature for a particular
register. The serial numbers are used for searching the records of various sites. There are total of 8-10
registers, which are used to maintain details about various works of the firm. These registers contain
information like customer information, Items information and stock information, Customers transaction
data, etc.
The following points describe the problem domain faced by the current users:
1. Non-Integration of all the records of the Jewellery Shop Management System.
2. Most of the bills are written on a paper and are sent to accounts department for final billing,
which gives scope of human error.
3. All the information in the system is also maintained on papers. This results in wastage of
4.
5.
6.
7.
6. The system will provide backup plans to avoid data loss that is high priority.
7. It will be scalable so that in near future the system can be expanded and customized to the
firms needs.
8. The system will be reliable enough to perform in adverse conditions.
9. The system will provide a detailed help and user manual to assist the end user.
10. The system will fulfil all necessary requirements of the end user as much as possible.
11. The system will provide a user friendly interface with realistic view.
12. The system will provide an error free environment.
13. The system will be capable enough to reduce the number of registers i.e. system will update the
data from one register to another by a single click.
14. The system will provide search facilities to find a specific entry from the database.
6. Should arrive at and obtain a complete automation of all the registers as well as the registers,
which are used for smooth working of the firm.
7. Should produce reusable and extensible model/code.
8. Should develop a foolproof system that simulates and replaces the present manual system.
CHAPTER-4
4 PROJECT PLANNING
4.1 Project Resources
1. Required Documents
1.1
Project Report
Project report provides an introduction to current system and system to be built. It gives the brief
knowledge of current system.
1.2
Project Documentation
A complete documentation will be given in the form of SRS. Software requirement specification (SRS)
will provide an introduction an introduction of current system and the system to be built. This overview
Page
18
includes the purpose of SRS and a brief knowledge of current system. The overview also provides an
introduction of the proposed system.
1.3Pre- Installation
The installation of prior softwares like visual studio 6.0 and MS Office. This software is essential for
the smooth and proper running project.
4.3 Time
Successful information system projects are those that have been successfully managed. Poorly planned
systems project to meet the schedule and disappoint the enthusiastic users. Those projects that are
developed on time have these characteristics in common1.
2.
3.
4.
One of the most aspects of project management is the formulation of estimates of the time required to
develop a system. Estimates and time scheduling is an approximation of the hours, days, or months.
Page
19
The time includes collection requirements for the system from the current users of the similar system
available, then actually implementing the system with the help of development tools like visual basic
6.0(for front end) and MS Access(for back end).
CHAPTER-5
5. FEASIBILITY STUDY
One of the many stages in the system development life cycle is determining the feasibility of a project.
A measure of how beneficial or practical the development of a software system will be to an
organization. This analysis recurs, and how that technology can be of benefit. These studies can include
policy recommendations for imaging systems, document management, and workflow applications for
an interactive process of collecting and analyzing through the life cycle. Feasibility studies examine the
organization data with the client and searching for cost-effective, viable technical and non technical
solutions.
feasibility is generally the bottom-line consideration for most of the systems. Economic justifications
includes a broad range on concerns that include cost-benefit analysis, long term corporate incomes
strategies, impact on other profit centres or products, cost of resources needed for the development etc.
Economic feasibility is measured under the following heads:
1. The project fits in the proposed budget.
2. The project satisfies the economic constraints.
3. Weather the existing hardware will meet the budget proposed.
4. Weather new software is required for its working.
Page
22
CHAPTER-6
6. SYSTEM DESIGN
6.1 DFD (Data Flow Diagram)
Username
Login
Password
6.2 ERD
System use
Servi
ce to
user
User
valid
ation
System
responsible
User
Process
Check
database
Search
guest
Check
Processstatus
out
Database
Database
Page
23
Administer
Check
out
Enquiry
Enquiry
authority
Authority
Page
24
Login Id
Login Name
Item Id
Item Name
Item
Item Weight
Jewelry Type
Present Item Id
Purchase
Price/Quantity
Have
Item Quantity
C. Mobile No.
Bill
Bill No.
C. Phone No.
C. Name
Login
user
C. Id
A
password
C.aAddress
Naresh
prem
PANJAB JWELERS
PANJAB JWELERS
Page
25
C. Id
Item Id
Item
Item_Id
Item_Name
Item_Type
Item_W
1 RING
Gold
10
2 EARRING
Gold
11
3 PENDANT
Gold
12
4 NECKLACE
Gold
13
5 DIAMONDRING
Gold
15
6 BROOCH
Gold
14
7 BRACELET
Gold
16
8 BANGEL
Gold
17
9 GOLD RING
Gold
18
10 BELT
Silver
20
11 RING
Silver
10
12 CHAIN
Gold
13 CLIP
Silver
100
3
Stock
S_Id
Item_Id
1
2
3
5
6
7
8
9
10
11
17
U_Q
1
2
3
4
5
6
6
7
8
8
9
Page
26
4
2
6
2
2
1
0
1
1
0
2
18
19
20
21
22
9
10
11
12
12
0
5
4
9
0
Customer
C_Id
1
2
3
4
5
6
7
8
9
10
13
14
15
16
17
18
19
C_Name
ABC
a
b
cc
dd
nm
mm
abc
ww
q
v
nnnn
gh
asas
vb
q
a
C_P_No
C_M_No
11
11
C_Add
ABC
a
b
cc
dd
nm
mm
abc
ww
q
v
nnnn
gh
asas
vb
q
a
Bill
B_Id
1
3
4
5
C_Id
1
2
3
3
Item_Id
1
2
1
4
S_POI
$1,000.00
$3,000.00
$1,000.00
$5,000.00
6
7
8
9
10
11
12
3
4
4
5
5
6
7
6
1
2
1
2
1
1
$2,000.00
$2,000.00
$2,000.00
$3,000.00
$4,000.00
$2,000.00
$4,000.00
Page
27
T_POI
$2,000.00
$6,000.00
$3,000.00
$10,000.0
0
$4,000.00
$4,000.00
$4,000.00
$6,000.00
$8,000.00
$2,000.00
$4,000.00
P_AOI
2
2
3
2
2
2
2
2
2
1
1
13
14
15
18
19
21
23
25
27
28
29
30
31
8
9
10
11
14
15
16
17
18
18
18
19
19
1
1
1
2
10
2
2
1
3
6
8
1
2
$1,500.00
$1,000.00
$1,800.00
$2,222.00
$1,111.00
$2,222.00
$3,333.00
$1,000.00
$444.00
$666.00
$88.00
$1,200.00
$6,000.00
$1,500.00
$2,000.00
$3,600.00
$4,444.00
$1,111.00
$2,222.00
$3,333.00
$1,000.00
$444.00
$666.00
$88.00
$2,400.00
$6,000.00
CHAPTER-7
7. TOOLS USED AND DESCRIPTIONS
7.1 Front End
The Front end, i.e., the User Interfaces is implemented in:
Microsoft Visual Basic 6.0
1
2
2
2
1
1
1
1
1
1
1
2
1
Page
29
CHAPTER-8
8. Implementation
8.1 Programming approach followed
The programming approach followed while development of the system is Bottom-up approach. This
approach is implemented by developing the sub-modules, then integrating those sub-modules into the
wholly integrated, fully functional jewellery shop management system.
A crucial phase in the system life cycle is the successful implementation of the new system design.
Implementation simply means converting a new system design in to operation.
Bottom-up Approach
Page
30
A bottomup approach is the piecing together of systems to give rise to grander systems, thus making the
original systems sub-systems of the emergent system. Bottom-up processing is a type of information
processing based on incoming data from the environment to form a perception. Information enters the eyes in
one direction (input), and is then turned into an image by the brain that can be interpreted and recognized as a
perception (output). In a bottomup approach the individual base elements of the system are first specified in
great detail. These elements are then linked together to form larger subsystems, which then in turn are linked,
sometimes in many levels, until a complete top-level system is formed. This strategy often resembles a "seed"
model, whereby the beginnings are small but eventually grow in complexity and completeness. However,
"organic strategies" may result in a tangle of elements and subsystems, developed in isolation and subject to
local optimization as opposed to meeting a global purpose.
Advantages:
User and business awareness of the product. Benefits are realized in the early phases.
Your organization broadens identity management skills and understanding during the first
phase.
Tivoli Identity Manager is introduced to your business with less intrusion to your operations.
Disadvantages:
The organizational structure you establish might have to be changed in a later roll-out phase.
Because of the immediate changes to repository owners and the user population, the roll-out
will have a higher impact earlier and require greater cooperation.
This strategy is driven by the existing infrastructure instead of the business processes.
Page
31
Conversion
Conversion means changing from one system to another. The objective is to put the tested system into
operation while holding costs, risks and personnel irritation to minimum. It involves:
Page
32
Welcome Screen
Page
33
Login Screen
Page
34
Change Password
Page
35
Page
36
Page
37
Page
38
Sales
Page
39
Bill
Page
40
2 Reports Layouts
Report
Page
41
CHAPTER-9
9. TESTING
Testing
Testing is an important step in software development life cycle. The process of testing takes place at
various stages of development in programming. This is vital step in development life cycle because the
process of testing helps to identify the mistakes and sends the program for correction.
A good test case is one that has high probability of finding an as-yet-undiscovered error.
The objective is to design tests that systematically uncover different classes of errors and to do so with
a minimum amount of time and effort.
Test Planning
Test planning is concerned with setting out standards for the testing process. The test plans are
intended for both management and software developers. The preparation of test plans usually starts at
the end of the requirements analysis stage and developed throughout the design stage. Plans should be
made for both development testing (done by software developers) and independent testing (done by an
independent team of testers). We will look at techniques for testing in the small (i.e. testing
individual components) first. Later we will discuss techniques of testing in the large i.e. testing
clusters of components and testing the complete system. We will discuss black box and white box
techniques. In black box testing, the tester does not know the internal structure to design test cases.
These techniques are applicable to both traditional and object oriented systems. In object oriented
Page
42
systems, test techniques would be applied to the operations within a class. It is impossible to test
exhaustively (i.e. test every possible situation that might occur). The goal is to select a set of test cases,
which provides good coverage and can be completed with a reasonable amount of effort.
1. Unit Testing In unit testing, individual components are tested individually. This can be
done throughout the coding process, as each unit is completed. White box methods are typically
used for unit testing.
Top Down Integration Top down integration is appropriate for testing systems built using the
traditional view. The structure chart created during the design stage shows the control hierarchy
of the program. We start with the main control module and add other modules in either a depthfirst or breadth-first manner. Breadth-first integration allows us to test all the high-level
modules before the low-level ones. Depth-first integration allows us to test certain major
control paths of the structure early in the testing stage.
called builds and these clusters are tested together with another driver. Drivers are removed and
larger clusters are combined, as we move upward in the program structure.
Regression Testing It is the process of checking whether changes made to the system has
introduced unintended behavior or additional errors. It generally involves re-executing a small
subset of the test cases that have already been executed. There should also be additional tests
that focus on the components that have changed and the components most likely to have been
affected by the change.
3. Validation Testing It refers to the process of checking that all reasonable expectations
for the software are met. These expectations are usually defined in the requirements specifications
developed during the analysis stage. Usually, black-box testing techniques are used for validation
testing and tests are done by independent testers (customers or members of an independent test
team from the developers organization). It includes acceptance testing done by the customer or
potential customers. Acceptance testing involves both alpha testing and beta testing. A customer
conducts alpha testing at the developers site. The testing is done in a controlled setting with the
developer presence. Beta testing is conducted at one or more customer sites. The developer is
usually not present during beta testing and thus cannot control the environment. The customer
must report the errors to the developer as beta testing takes place.
4. SYSTEM TESTING When a software system is part of a larger system containing many
other elements as hardware, people, etc. additional tests are necessary once the whole system is put
together. Tests should be designed so that it is possible to answer the questions listed below:
Recovery: How well does the system recover from faults and how quickly does it resume
processing?
Security: How secure is the system? How easy it is for unauthorized users to break into the
system?
Stress: How well does the system stand up to abnormal situations in which there are unusual
demands for resources?
Page
44
Debugging It is the process of locating and fixing an error, after testing has determined that
the error exists. Usually locating the error rather than fixing it, takes the majority of the effort
required for debugging. After fixing an error, it is important to do regression testing to make
sure that the correction did not introduce new errors into the program.
CHAPTER-10
10. MAINTENANCE
Maintenance is the enigma of the system development. It holds the software industry captive, trying up
programming resources. Maintenance can be classified as corrective, adaptive or perceptive
Corrective maintenance means repairing process or performance failures or making changes because of
previously unconnected problem or false assumption.
Page
45
Perceptive maintenance means enhancing the performance or modifying the programs to respond to the
users additional or changing needs.
For providing maintenance and security to databases the users have been classified in two types the
administrator and general user. Administrator handles the maintenance part and other system design.
CHAPTER-11
11. CONCLUSION
11.1 Conclusion and Discussion
Following are the conclusions and lessons learnt throughout the project lifecycle:
1. Coordination among team member.
2. Communication with end user.
Page
46
11.2 Limitations
As we are also student according to our views we have tried our best of fulfill the
Requirement about the project inspire other awareness may be left some important things.
As we have realized later after discussion in our friends.
CHAPTER-12
12. BIBLIOGRAPHY
1.Complete reference: Visual Basic 6.0, Tata McGraw-Hill Publication by jerky
2.Complete reference: Visual Basic 6.0, Tata McGraw-Hill Publication by Bradley
Page
47
Page
48