Académique Documents
Professionnel Documents
Culture Documents
to take the orders from its distributors who are geographically distributed.
This new system not only takes the orders from distributors for Aurobindo
generation for the firm. The basic structure of the system as follows.
password along with some Information for our report generation, and
administration. Later the user id will be used for his identification. The
products under each category, discount, and payment modes such as DD,
Cheque, and online payment mode Credit Card. This system also
maintains the order details, to provide the valuable reports regarding sales
Each user’s details are kept private and no other body can tinker with
them.
Some people express their view that where is the actual need for
PC’s are not accessible from anywhere. Where as these kind of web
1
Virtually from any part of the world with out any difficulty. As our
distributors, not only that with this kind of design they can Go for
send the results as part is responsible for providing user friendly and
HTML, JAVA SCRIPT, JAVA SERVLETS and JDBC. Server side part has
been done with SERVLETS and JDBC where JDBC responsible for
2
The Pharmacy System is a web-based application some of its
The proposed system can be accessed from any part of the world,
its clients private and no body is allowed to tinker with the details.
It provides easy to use and user friendly interface for the user.
various screens and status of the system returned, as it was when he left
the screen.
The user can access the system at any time, because it’s 24-hour
availability.
any problem.
The organization can save the time and money as they own the web
3
2.ii. PRELIMINARY INVESTIGATION
modules.
1. ADMINISTRATION
2. FINANCE
1) User Interaction
SIGNUP
LOGIN
ORDER DIRECTLY
UPDATE CUSTOMER
PRODUCTS INFORAMTION
VENDOR INFORMATION
ORDER DETAILS
4
The validations for the screen login are:
Login name: The login name should be entered in text format; there
should be no spaces.
i. Administration
ii. Finance
Product
Vendor
Customer
Category
Discount
Product Administration
Customer Administration
option.
Vendor Administration
5
Add, Delete, Update
Category Administration
Discount Administration
User Interface:
b) Client commands.
6
3. FEASIBILITY STUDY
Technical Feasibility
7
platform) Technology. One major advantage in application is platform
application. So many objects such as button, text fields, and text area
We can use this application in any OS. They can have their
application.
Economical Feasibility
8
to spend that much of time. In such case needs to pay some
bill from any where in the world. No need to travel to pay the bills. For
Operational Feasibility:
9
4. SOFTWARE ENGINEERING PARADIGM
APPLIED
DESIGN SPECIFICATION
DATA DESIGN
DESIGN METHODOLOGY
are
2. Bottom Up Design
10
Top Down Design is basically a decomposition process, which
the code production. The first step is to study the overall aspects of
important feature is that at each level the details of the design at the
lower level are hidden. Only the necessary data and control that
must be called back and forth over the interface are defined.
of design that are most difficult and necessary designed decision are
made the reminder of the design is tailored to fit around the design
details of the decision until the last stage of the decision. It allows
making small design changes when the design is half way through.
11
the bottom-up strategy first focuses on the crucial part so that
we start in the middle of the problem and work our way both up and
design. Similarly one can start with the required outputs and work
both the top down and bottom up approach in our design approach.
DATABASE DESIGN
Databases are normally implemented by using a package
techniques for the design of database are limited. One of the most
useful methods of analyzing the data required by the system for the
12
normalized data by three stages. Each stage has a procedure to
follow.
NORMALIZATION
records but including in them the key fields of the original record.
check that the record, which one is first normal form, all the items in
data item is not dependent on the key of the record, but on the other
data item, then it is removed with its key to form another record. This
is done until each record contains data items, which are entirely
form to see whether any items are mutually dependent. If there are
any item there are removed to a separate record leaving one of the
items behind in the original record and using that as the key in the
13
BUSINESS MODELING:
way that answers the following questions: what information drives the
DATA MODELING:
The information flow defined as a process of the business
defined.
PROCESS MODELING:
The data objects defined in the data-modeling phase are
times called the “classic model” or the “water fall model,” the linear
14
The linear sequential model is the oldest and the most widely
databases.
15
both the system and the software are documented and reviewed
3) DESIGN:
4) CODE GENERATION:
mechanistically.
5) TESTING:
input will produce actual results that agree with required results.
16
6) MAINTENANCE:
new one
17
5. SOFTWARE AND HARDWARE SPECIFICATIONS
(Client).
18
INTERNET TERMINOLOGY
What is Internet?
Internet Currently there are more than 30 million people use the
Internet and the number is growing at a rate of one million new user
per month.
What is Intranet?
organization uses the same kinds of software that you would use to
explore the Internet, but only for internal use. An Internet enables a
19
servers that can be accessed on the Internet by using HTTP, FTP,
What is TCP-IP?
Internet that is part of the World Wide Web (WWW). A URL looks
like this:
Although the names are almost the same Java is not the same
can create real programs with Java. But often we just want to make
20
JavaScript authors should not have to care too much about
programming.
Advantages of Java:
Creation of Java:
version. This language was initially called “OAK” in 1992 and public
Java is Portable:
Any computer with a Java based browser can run the applications
21
another to run on a Unix machine and so on. In other words, with
them into the language that is understood by the machine running it.
Java, a programmer writing Java code can access all the major
machine.
what you are dealing with rather than on how you are going to do
sophisticated projects because one can break the things down into
22
understandable components. A big benefit is that these
simplest term, a class includes both the data and the functions to
called an object, which will have all the data members and
specific data values are those using the data cannot see function
improve it.
inherits all the data and the function of the existing class, referred
23
concerned, the subclass can reuse the inherited methods, as it is,
writing Java code and a lot less time debugging it. In fact,
as two thirds.
Java enforces strong type checking, many errors are caught when
useful, but static binding with strict type checking is used when
possible.
24
Java keeps code simple by having just one way to do
when you create a subclass that inherits from two or more classes.
Java is Extensible:
A big plus for Java is the fact it can be extended. It was
of classes.
Java is Secure:
It is important that a programmer not be able to write
with the Internet being used more and more extensively for
25
The way memory is allocated and laid out. In java an object’s
definition and figure out how it might be laid out in memory. Also
to memory.
The Java byte code loader, another part of the JVM, checks
Java applets so that they cannot access the local network, local
26
Java Performs Well:
Java performance is better than one might expect. Java’s
However, various optimizations have been built, in, and the byte
code interpreter can run very fast the cost it doesn’t to do any
Java is Robust:
27
reliability, Java restricts you in a few key areas to force you to find
Java frees you from having to worry about many of the most
also checks your code at run time. In fact, many hard to track
Java is Multithreaded:
running a movie, running a audio track and display in text all at the
same time.
28
machines. The virtual machine takes a small footprint and Java
accommodates the need for low storage and for low bandwidth
Platform API. This makes Java ideal for low cost network
closed to half the entities that now live there. Java addresses
29
these concerns and doing so, has opened the door to an exiting a
client/server systems.
30
server with a hitherto unknown degree of portability, flexibility and
ease.
31
ORACLE 8i SERVER
Introduction to Oracle:
Any programing environment used to create containers, to
These containers are called ‘cells’. The minimum information that has
32
purpose. A database stores data that is useful to us. This data is only
Identify what specific objects in that part of the world’s data are
of interest to us.
them that are of interest to us are still owed in the database that is
33
Relational Database Management:
Information Representation:
only by data item values, which are stored in the tables that make up
represented in any other way, such as the use of pointers from one
Logical accessibility:
Every data item value stored in relational database is
accessible by stating the nature of the table it is stored in, the name
of the column under which it is stored and the value of the primary
for representing null values. For example, null values for numeric
data must be distinct from zero or any other numeric and for the
character value.
34
Catalogue facilities:
The logical description of the relation database is represented
Data Language:
The relational database management system may support
recovery of units.
View Updatability:
Any view that can be defined using combination of basic tables,
operation as well.
35
Physical data independence:
Changes made to physical storage representation or access
programmers.
programmers.
Integrity Constraints:
application program.
Database Distribution:
databases.
36
Non- Subversion:
If the relational database management system supports
37
6.i. DATABASE DESIGN
In developing this software we have used eight tables to store
Customer Table:
maintained.
Vendor Table:
Category Table:
Products Table:
Discount Table:
In this table all product codes are their discount structures are
stored.
Order Table:
In this table all the orders information put by the customers are
maintained.
Amount Table:
38
Admin Login Table:
are stored.
TABLE: REGISTRATION
TABLE: CATEGORY
39
TABLE: PRODUCT
TABLE: LOGIN
FIELD NAME DATA TYPE CONSTRAINTS
USER_NAME VARCHAR2 PRIMARY KEY
PASSWORD VARCHAR2
TABLE: ORDER
FIELD NAME DATA TYPE CONSTRAINTS
CUSTOMER_ID VARCHAR2 PRIMARY KEY
PRODUCT_CODE VARCHAR2
QUANTITY_ORDERED NUMBER
UNIT_COST NUMBER
NET_COST NUMBER
ORDER_DATE DATE
PAYMENT_MODE VARCHAR2
40
TABLE: DISCOUNT
TABLE: VENDOR
TABLE: AMOUNT
41
6.ii. DATA FLOW DIAGRAMS
CONTEXT LEVEL
Request
Request
Response Pharmacy
CUSTOMER System
Request
Response Pharmacy
ADMINISTRATION system
42
LEVEL –1 DATA FLOW DIAGRAM
Signup
Vendor User Id
Pharmacy
Informatio Password System
n User Id
Products Password
Informatio User Id User Id
n Password Password
Order Direct
Details Orderin
g
43
LEVEL 2 DATA FLOW DIAGRAM
YES Display
Validation Total
Signup
Process Informatio
Error
Customer n
ID
User
Message
Information Customer Table
User
Information
Registratio Message
n USER
Process
44
LEVEL 2 DFD FOR PRODUCTS INFORMATION
User Id
Password
Product Ordering Qty, tax, Order
Information Category Products Processing
discount
Name
Amount
Payment Mode
Amount table
Payment
Process
USER
45
6.iii. FLOW CHARTS
START
ACCEPT USER_ID
AND PASSWORD
NO
Is the input
DATABASE information
valid?
YES
START
46
FLOW CHART FOR ADDING NEW PRODUCT
START
Generate The
DATABASE
Product Code
NO Valid
information?
YES
Submit The
Information
STOP
47
FLOW CHART FOR PRODUCT SELECTION
START
VALID
INFORMATION
?
Database
STOP
48
7. CODING
Changepass.java
import java.sql.*;
import java.io.*;
import javax.servlet.*;
import javax.servlet.http.*;
public class ChangePass extends HttpServlet
{
Connection con;
PreparedStatement prst;
int Rec;
49
System.out.println(" After getparameter");
prst.setString(1,str3);
prst.setString(2,str1);
prst.setString(3,str2);
System.out.println(" After setString");
Rec = prst.executeUpdate();
if(Rec==1)
hresp.sendRedirect("http://localhost:8080/pass_change.html");
else
resp.sendRedirect("http://localhost:8080/Pass_not_change.html");
}catch(Exception exc){exc.printStackTrace();}
}
}
Createtab_endusers.java
import java.sql.*;
public class CreatTab_endusers
{
public static void main(String[] args)
{
try{
Class.forName("sun.jdbc.odbc.JdbcOdbcDriver");
Connection con = DriverManager.getConnection("jdbc:odbc:web","scott","tiger");
Statement stmt = con.createStatement();
boolean val = stmt.execute("create table endusers(login_name
varchar2(30),passwd1 varchar2(25),passwd2 varchar2(25),distr_name
varchar2(25),address varchar2(30),city varchar2(20),state varchar2(25),country
varchar2(20),region varchar2(20),email varchar2(40),phone number(15),Fax
number(15))");
if(!val)
System.out.println(" \n\n\n endusers Table Created successfully");
else
System.out.println(" \n\n\n endusers Table not Created ");
50
}catch(Exception exc) { exc.printStackTrace();}
}
}
createTab_pass.java
import java.sql.*;
public class CreatTab_pass
{
public static void main(String[] args)
{
try{
Class.forName("sun.jdbc.odbc.JdbcOdbcDriver");
Connection con = DriverManager.getConnection("jdbc:odbc:web","scott","tiger");
Statement stmt = con.createStatement();
boolean val = stmt.execute("create table ValidUsers(usernames varchar2(25),
passwords varchar2(20) )");
if(!val)
System.out.println(" ValidUsers Table Created Successfully");
else
System.out.println(" ValidUsers Table not Created ");
}catch(Exception exc) { exc.printStackTrace();}
}
}
EndUser_login.java
import java.sql.*;
import java.io.*;
import javax.servlet.*;
import javax.servlet.http.*;
public class Enduser_login extends HttpServlet
{
Connection con;
PreparedStatement prst;
51
ResultSet rs;
public void init(ServletConfig sc) throws ServletException
{
try{
super.init(sc);
Class.forName("sun.jdbc.odbc.JdbcOdbcDriver");
con = DriverManager.getConnection("jdbc:odbc:web","scott","tiger");
}catch(Exception exc){exc.printStackTrace();}
}
public void service(HttpServletRequest hreq , HttpServletResponse hresp)
throws ServletException,IOException
{
try{
System.out.println(" before getParameter ");
prst = con.prepareStatement("select login_name,passwd1 from endusers where
login_name=? and passwd1=?");
String str1 = hreq.getParameter("login");
String str2 = hreq.getParameter("pass");
System.out.println(" before setString() ");
prst.setString(1,str1);
prst.setString(2,str2);
rs = prst.executeQuery();
System.out.println();
System.out.println();
System.out.println(" After setString() ");
if(rs.next())
{
hresp.sendRedirect("http://localhost:8080/Val_login.html");
}
else
{
hresp.sendRedirect("http://localhost:8080/Inval_login.html");
52
}catch(Exception exc){exc.printStackTrace();}
}
}
Ins_Enduser_db.java
import java.sql.*;
import java.io.*;
import javax.servlet.*;
import javax.servlet.http.*;
public class Ins_enduser_db extends HttpServlet
{
Connection con;
PreparedStatement prst;
int Rec;
53
String str4 = hreq.getParameter("t4");
String str5 = hreq.getParameter("t5");
String str6 = hreq.getParameter("t6");
String str7 = hreq.getParameter("t7");
String str8 = hreq.getParameter("t8");
String str9 = hreq.getParameter("t9");
String str10 = hreq.getParameter("t10");
String str11 = hreq.getParameter("t11");
String str12 = hreq.getParameter("t12");
prst.setString(1,str1);
prst.setString(2,str2);
prst.setString(3,str3);
prst.setString(4,str4);
prst.setString(5,str5);
prst.setString(6,str6);
prst.setString(7,str7);
prst.setString(8,str8);
prst.setString(9,str9);
prst.setString(10,str10);
prst.setString(11,str11);
prst.setString(12,str12);
Rec = prst.executeUpdate();
if(Rec==1)
{
hresp.sendRedirect("http://localhost:8080/Rec_inserted.html");
}
else
{
hresp.sendRedirect("http://localhost:8080/Ins_error.html");
}
}catch(Exception exc){exc.printStackTrace();}}}
54
ins_pn_db_srv.java
import java.sql.*;
import java.io.*;
import javax.servlet.*;
import javax.servlet.http.*;
public class Ins_prd_db_srv extends HttpServlet
{
Connection con;
PreparedStatement prst;
int Rec;
prst = con.prepareStatement("select
usernames,passwords from ValidUsers where usernames=? and
passwords=?");
String str1 = hreq.getParameter("loging");
String str2 = hreq.getParameter("passwd");
55
prst.setString(1,str1);
prst.setString(2,str2);
Rec = prst.executeUpdate();
if(Rec>=1)
{
hresp.sendRedirect("http://localhost:8080/Rec_inserted.html");
}
else
{
hresp.sendRedirect("http://localhost:8080/Ins_error.html");
}
}catch(Exception exc){exc.printStackTrace();}
}
}
ins_vend_db_srv.java
import java.sql.*;
import java.io.*;
import javax.servlet.*;
import javax.servlet.http.*;
public class Ins_vend_db_srv extends HttpServlet
{
Connection con;
PreparedStatement prst;
int Rec;
56
super.init(sc);
Class.forName("sun.jdbc.odbc.JdbcOdbcDriver");
con =
DriverManager.getConnection("jdbc:odbc:web","scott","tiger");
}catch(Exception exc){exc.printStackTrace();}
}
prst.setString(1,str1);
prst.setString(2,str2);
prst.setString(3,str3);
Rec = prst.executeUpdate();
if(Rec>=1)
{
hresp.sendRedirect("http://localhost:8080/Rec_inserted.html");
}
else
{
hresp.sendRedirect("http://localhost:8080/Ins_error.html");
}
}catch(Exception exc){exc.printStackTrace();}
57
}
}
passCheck.java
import java.sql.*;
import java.io.*;
import javax.servlet.*;
import javax.servlet.http.*;
public class PassCheck extends HttpServlet
{
Connection con;
PreparedStatement prst;
ResultSet rs;
prst.setString(1,str1);
58
prst.setString(2,str2);
rs = prst.executeQuery();
if(rs.next())
{
hresp.sendRedirect("http://localhost:8080/Val_login.html");
}
else
{
hresp.sendRedirect("http://localhost:8080/Inval_login.html");
}
}catch(Exception exc){exc.printStackTrace();}
}
}
order.html
<HTML>
<head>
<SCRIPT LANGUAGE="JavaScript">
</SCRIPT>
</head>
<BODY BGCOLOR="ccccc">
<CENTER> <I> <FONT SIZE="6" COLOR="green"> <U></U>Order form for
Product u Selected is......</FONT> </I><BR><BR><BR><BR>
<FORM name=f1 onSubmit="return validate()">
<TABLE>
<TR>
<TD> Product Code : </TD> <TD> <SELECT NAME="ProdCode">
<option
value=APLG0001> APLG0001
<option value=APLG0002> APLG0002
59
<option value=APLG0003> APLG0003
<option value=a1> APLG0004
<option value=a1> APLG0005
60
<TD> Discount : </TD> <TD> <INPUT TYPE="text" NAME="T1"> </TD>
<TD> Net Cost : </TD> <TD> <INPUT TYPE="text" NAME="T1"> </TD>
</TR>
<TR>
<TD> Amount : </TD> <TD> <INPUT TYPE="text" NAME="T1"> </TD>
</TR>
<TR>
<TD> Mode of Payment : </TD>
<TD> Credit Card <INPUT TYPE="radio" NAME="r1"
VALUE="CREDIT"> </TD>
<TD> D.D <INPUT TYPE="radio" NAME="r2"
VALUE="DD"> </TD>
</TR>
</TABLE><BR>
<CENTER> <INPUT TYPE="submit" VALUE="Place Order"> </CENTER>
</FORM><BR>
<A HREF="">back</A></PRE>
</BODY>
</HTML>
registration.html
<HTML>
<BODY BGCOLOR="#FFFF66"> <center>
<h2> REGISTRATION FORM </H2> </center>
<BR><BR>
<FONT SIZE="2" COLOR="#3333FF"> </FONT> How you are on tour to
register your self for our profitable dealing.....<BR>
<center>
<FORM METHOD=POST
ACTION="http://localhost:8080/servlets/Ins_enduser_db">
<TABLE>
<TR>
61
<TD> Enter your Login Name :</TD> <TD> <INPUT TYPE="text"
NAME="t1"> </TD>
</TR>
<TR>
<TD> Enter your password :</TD> <TD> <INPUT TYPE="password"
NAME="t2"> </TD>
</TR>
<TR>
<TD> Retype your password :</TD> <TD> <INPUT TYPE="password"
NAME="t3"> </TD>
</TR>
<TR>
<TD> Distributor Name :</TD> <TD> <INPUT TYPE="text" NAME="t4">
</TD>
</TR>
<TR>
<TD> Address :</TD> <TD> <TEXTAREA type=text
NAME="t5" ROWS="3" COLS="16"> </TEXTAREA> </TD>
</TR>
<TR>
<TD> City Name :</TD> <TD> <INPUT TYPE="text" NAME="t6"> </TD>
</TR>
<TR>
<TD> State :</TD> <TD> <INPUT TYPE="text" NAME="t7"> </TD>
</TR>
<TR>
<TD> Country Name :</TD> <TD> <SELECT NAME="t8">
<option value=America> America
<option value=Bangladesh> Bangladesh
<option value=China> China
<option value=Canada> Canada
<option value=Germany > Germany
<option value=Holland> Holland
<option value=India> India
62
<option value=Malasia> Malasia
<option value=Polland> Polland
<option value=Russia> Russia
<option value=u> UK </TD>
</SELECT>
</TR>
<TR>
<TD> Region :</TD> <TD> <SELECT NAME="t9">
<option value=Africa> Africa
<option value=Antarcitica> Antarcitica
<option value=Astralia> Astralia
<option value=Asia> Asia
<option value=Europe> Europe
<option value=NorthAmerica> NorthAmerica
<option value=SouthAmerica> South America
</SELECT> </TD>
</TR>
<TR>
<TD> Email :</TD> <TD> <INPUT TYPE="text" NAME="t10">
</TD>
</TR>
<TR>
<TD> Phone :</TD> <TD> <INPUT TYPE="text" NAME="t11">
</TD>
</TR>
<TR>
<TD> Fax :</TD> <TD> <INPUT TYPE="text" NAME="t12">
</TD>
</TR>
</TABLE><BR>
<INPUT TYPE="submit" value=Submit>
<INPUT TYPE="reset" value=Clear> </TD>
</FORM></BODY></HTML>
63
8. CODE EFFICIENCY
MEASURES OF CODE EFFICIENCY
1. Uniqueness: The code structure must ensure that only one value of
the code with a single meaning are correctly applied to a give entity
or attribute.
providing sufficient space for the entry of new items with in each
classification.
64
7. Sortability: Reports are most valuable for user efficiency when
data must be sorted and collaged, the representative code for the
data processing both for machine and human use. Care is taken to
65
9. CODE OPTIMIZATION
Quick: In the old system there is time taken process to do any sort of
process, by the proposed system the user can have any kind of
process done at a very fast rate
66
10. VALIDATION CHECKS
the text
format.
67
The validations for the update customer screen:
Login name :
Remarks :
Quantity :
Add to my list :
68
Category Code : The category code should be selected
69
11. SYSTEM TESTING & IMPLEMENTATION
TESTING OBJECTIVES:
70
conducted that demonstrates each function is fully operation
71
The steps involved in black box test case design are:
for software testing a set of steps into which we can place specific
characteristics:
72
Unit Testing: Unit testing focuses verification efforts in smallest
unit of software design (module).
73
VALIDATION TESTING:
At the culmination of integration testing, software is completely
74
After each validation test case has been conducted, one of two
resolving deficiencies.
CONFIGURATION REVIEW:
An important element of the validation process is a
the customer will really use a program. Instructions for use may be
75
When custom software is built for one customer, a series of
each one. Most software product builders use a process called alpha
and beta testing to uncover errors that only the end user seems able
to find.
the shoulder” of the user and recording errors and usage problems.
the end user of the software. Unlike alpha testing, the developer is
76
during beta testing and reports these to the developer at regular
IMPLEMENTATION:
check out and put new equipment into use, train users, install the
involved in using the application and the risk associated with its use,
area of the firm, say in one department or with only one or two
persons. Sometimes they will run the old and new systems together
using the old system one-day and begin using the new one the next.
However, both the organization and the users will change, and the
77
changes will be made to the software, files, or procedures to meet
process.
and weakness. The actual evaluation can occur along any of the
following dimensions.
users.
78
project management criteria. Includes assessment of development
79
12. SYSTEM SECURITY MEASURES
world, might deceive us into believing that our jobs as secure system
80
secure in practice. Furthermore, systems are increasingly complex;
GOOD PRACTICE
used, who will be using the application, etc. With that knowledge, one
81
Naming is typically handled by rendezvous: a principal exporting a
problems if the names are not stable. Names can allow principals to
82
13. COST ESTIMATION OF THE PROJECT
contract.
project. Otherwise, even simple questions like “is the project late”,
“are there cost overruns” and “when is the project likely to complete”
can be safely said that cost and schedule estimates are fundamental
a project.
83
Cost in a project is due to the requirements for software,
things as the computer time, terminal time, and memory required for
besides including the direct cost of the person-month, most costs for
user of models.
life circle. As the cost of the project depends on the nature and
84
estimate will depend on the among or reliable information we have
about the final product. Clearly, when the product is delivered, the
cost can be accurately determined, as all the data about the project
On the other extreme is the point when the project is being initiated
85
14. FORMS & REPORTS
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
15. PERT CHART
PERT CHART:
Program Evaluation Review Technique, PERT can be both a
and activities or tasks. PERT has several advantages over bar charts
tasks, which must be completed. PERT controls time and cost during
the project and also facilitates finding the right balance between
PERT CHART
25 JUN 2003
10 JUL 2003
START
I/O DESIGN 10 AUG 2003
INTEGRATION
AND TESTING
10 JUL 2003
ANALYSIS
01 JUL 2003
CODING
FINISH
10 JUL 2003
15 AUG 2003
WRITE
109MANUAL
Gantt Chart ( Bar Chart ):
Gantt Charts are a project control technique that can be used for
activity. The bars are drawn against a time line. The length of each
GANTT CHART
STA
ANALYS
I /O DESIGN
CODING
WRITE
INTEGRAT
ION
AND
SLACK TIME, ie., the LATEST TIME by which a task must be finished
incorporated in the system as it does not fall under the scope of this
struggle to operate it and would not be able to know all the features
in it.
achieved.
111
17.BIBLIOGRAPHY
112