block office project
TRANSCRIPT
-
8/12/2019 Block Office Project
1/101
Introduction
We are proposing an online software application which will be used for the
efficient management of projects as well as monitoring of the block offices works.
IBMS will consist of various modules for the Patals & Departments of Block
Office. Block office employees (General Users) will put the data in their software
modules as per the rights given to them by the System Administrator (System
Administrator will be a super user, who can create users and provides the rights of
software as per their responsibilities). General users can also check the entered
data in the form of various reports and they can take the printout of the reports
whenever required. ADOs / BDOs can monitor the progress of projects with the
help of various MIS reports and also they can approve or reject the projects from
their logins. An integrated approach of the software will provide the facility to
monitor the block office work from the CDO / DM logins. They can view the
various MIS reports of any block office. IBMS will be connected to the Integrated
Voice Response System (IVRS) & SMS gateway to connect the field level officers
and gram pradhan to get the required information related to the various projects.IBMS will be online software which will be available in English/Hindi as
requirement.
1
-
8/12/2019 Block Office Project
2/101
Problem Definition
The Existing System is Offline System ,In Block Office the all Daak Letters Entry
entered by manually,and information of apply candidate for make the new Rashan
Card data is entered in papers and Registers.Not any special type technology used
in existing system.
The many No. of letters are came in block office and many No.of candidate apply
for Rashan Card.The problem is arrise that to maintain the records is very critical
because some times papers and form can be lost or damaged so data or information
will be lost.
Some time the Bdo,Dm want to see the overview of all Information about coming
letters and send letters ,how many candidate applied for make mew Rashan Card if
The papers and Register or file has been damaged or lost is possible.
In Existing System Data keep managed and Secure data is lengthy and risky.
2
-
8/12/2019 Block Office Project
3/101
System Analysis & Feasibility Study
Study of existing systems/ Technologies
The Existing System is Offline System ,In Block Office the all Daak Letters Entry
entered by manually,and information of apply candidate for make the new Rashan
Card data is entered in papers and Registers.Not any special type technology used
in existing system.
The many No. of letters are came in block office and many No.of candidate apply
for Rashan Card.The problem is arrise that to maintain the records is very critical
because some times papers and form can be lost or damaged so data or information
will be lost.
Some time the Bdo,Dm want to see the overview of all Information about coming
letters and send letters ,how many candidate applied for make mew Rashan Card if
The papers and Register or file has been damaged or lost is possible.
In Existing System Data keep managed and Secure data is lengthy and risky.
Comparison of existing systems with proposed system
The Proposed System is online System/Application which store the data in
database and tables.This System is very fast from existing system and the maintain
and secure data is very easy.In praposed System the papers and file register have
not any type role.The proposed system is used by not all employee of Block Office
Only admin have Rights to use this System.
3
-
8/12/2019 Block Office Project
4/101
In Proposed System the report show all coming and receive letters information on
one click and also view the all applied candidate for Rashan Card by one click.
ADVANTAGE OF PROPOSED SYSTEM: Very fast and accurate.No need of any extra manual efforts. Doesnt require any hardware devices. At least very easy to find or view the Information of
individualy.
Any Type papers or file are not used in this system.
Feasibility Study
Once the problem is clearly understood, the next step is to conduct feasibility
study, which is high-level capsule version of the entered systems and design
process. The objectives is to determine whether or not the proposed system is
feasible. The three tests of feasibility have been carried out.
Operational Feasibility Technical Feasibility Economical Feasibility
4
-
8/12/2019 Block Office Project
5/101
Operational Feasibility:-It is a standard that ensures interoperability. Without stifling
competition and innovations among users, to the benefit of the public
both in terms of cost and services quality. The proposed system is
acceptable to employees. So the proposed system is operationally
feasible.
Technical FeasibilityIn Technical Feasibility study, one has to test whether the proposed
system can be developed using existing technology or not. It isplanned to implement the proposed system using ASP.NET
technology. It is evident that the necessary hardware and software are
for development and implementation of the proposed system. Hence,
the solution is technically feasible.
Economical Feasibility:-As part of this, the costs and benefits associated with the proposed
system compared and the project is economically feasible only if
tangible or intangible benefits outweigh costs. The system
development costs will be significant. So the proposed system is
economically feasible.
5
-
8/12/2019 Block Office Project
6/101
Scope of the Proposed System
The objective of this application is to present the secure graphical user
interface much friendly to the authorized user only, performing all the working of
above mentioned procedure efficiently. It is aimed at making department affairs
getting rid of all the bottlenecks that are there in the manual system and enabling
them to focus on the core activities of the administration, thus helping them
strengthen the overall quality standards and at the same time make the job of
preparing and maintaining the job of all records pleasurable and interesting job.
The project has covered almost all the requirements. Further requirements
and improvements can easily be done since the coding is mainly structured or
modular in nature. Changing the existing modules or adding new modules can
append improvements. Further enhancements can be made to the application, so
that the web site functions very attractive and useful manner than the present one.
6
-
8/12/2019 Block Office Project
7/101
System Requirements
a. Hardware Requirements
PROCESSOR : 568 MHz Pentium Processor
RAM : 64 MB RAM
HARD DISK : 80 GB HDD
b. Software Requirements
i. Front End
OPERATING SYSTEM : Windows 7
ENVIRONMENT : Visual Studio .NET 2010
.NET FRAMEWORK : Version 3.5
LANGUAGE : C#.NET
WEB TECHNOLOGY : ASP.NET
ii. Back End
BACKEND : SQL SERVER 2010R2
7
-
8/12/2019 Block Office Project
8/101
System Logical Design
Software requirement specification
Software Requirements Specification (SRS) is the starting point of the software
development activity. Little importance was given to this phases in the early days
of software development. The emphasis was first on coding and then shifted to
design.
As systems grew more complex, it become evident that the goal of the entire
system cannot be easily comprehended. Hence need for the requirements analysisphase arose. Now, for large software systems, requirements analysis is perhaps the
most difficult activity and also the most error prone.Some of the difficulty is due to
the scope of this phase.
The software project is imitated by the client needs. In the beginning these needs
are in the minds of various people in the client organization. The requirement
analyst has to identify the requirements by tacking to these people and
understanding their needs. In situations where the software is to automated a
currently manuals process, most of the needs can be understood by observing the
current practice.
The SRS is a means of translating the ideas in the minds of the clients (the output)
into formal document (the output of the requirements phase). Thus the output of
the phase is a set of formally specified requirements, which hopefully are complete
and consistent, while the input has none of these properties.
8
-
8/12/2019 Block Office Project
9/101
System Environment
9
-
8/12/2019 Block Office Project
10/101
System Overview
Acronyms and Abbreviations
Following is a list of the acronyms and abbreviations used in the due course of the
document:-
10
-
8/12/2019 Block Office Project
11/101
Acronyms/Abbreviations Meaning
IBMS Integrated Block Management System
BDO Block Development Office
CCL Cash credit limit
SHG Self-Help Groups
BLBC block level bankers committee
MSR Minimum Skill Requirement
MPR Monthly Progress Report
DRDA District Rural Development Agencies
11
-
8/12/2019 Block Office Project
12/101
Data Flow Diagram
The data flow diagram is one of the most improvement tools used by the system
analyst DeMacro (1978) NadGandSarson (1979) popularized the use if the data
flow diagram as modeling tools through their structured system analysis
methodologies.
A data flow diagram should be the first tool used by system analyst to model
system components. These components are the system processes; the data used by
this processes and external entities that interact with the system and the
information flows in the system.
There are four kinds of system components
ProcessProcess show what system does. Each process has one or more data inputs
and produce one or more data output, Circles in a data flow diagram represent
process. Each process has unique name and number. This name and number
appear inside the circle that represents the processes in a data flow diagram.
This process is represented as circle
12
-
8/12/2019 Block Office Project
13/101
Data Stores
File or data store is depositary of data. They contain data that is retained in the
system. Processes can enter the data into a data store or retrieve data from the data
store. Each data store is represented by thin line in the data flow diagram and each
data store has a unique name.
The data store is represented in form of a line
External EntitiesExternal entities are outside the system but they either supply input data into the
system or use the system output, they are entities which the designer has no
control. Square or rectangle may represent external entities that supply data into a
system or sometimes called sources. External entities that use the system data are
sometimes called sinks.
Data Flows Dataflow model the passage of data in the system and are represented
lines joining system components. An arrow indicates the direction of the flow and
the line labeled by the name of the data flow.
13
-
8/12/2019 Block Office Project
14/101
Module-Daak
Daak Flow Diagram
ADO/Clerk BDO
CDO/DM
14
Modify
Add
View Reports
Add
Departmrnt
Letter Send Entry
Form
Letter Receive
Entry Form
Approval
Rejection
View
Approval
Rejection
View
Block Master
GramPanchayat
Master
Villege Master
-
8/12/2019 Block Office Project
15/101
ModuleRashan Card
Rashan Card Flow Diagram
ADO/Clerk BDO
CDO/DM
15
Modify
Add
View Reports
Add Rashancard
Shop Name Master
Rashan Card Entry
Form
Approval
Rejection
View
Approval
Rejection
View
Block Master
GramPanchayat
Master
Villege Master
-
8/12/2019 Block Office Project
16/101
Data Dictionary
Table For Add Department Name
Field Name DataType Size PrimaryKey/ForeignKey
Allow Null
Department_id Int PK
Department_name Nvarchar 100 Checked
Block_id Int Checked
Created_by Varchar 50 Checked
Created_on Datetime Checked
Modify_by Varchar 50 Checked
Modify_on Datetime Checked
16
-
8/12/2019 Block Office Project
17/101
Table for Letter send EntryLetter_send_id Int PK
Block_id Int Checked
Letter_number Varchar 50 Checked
Letter_sender_office_id Int Checked
Letter_description Nvarchar 300 Checked
Letter_send_date Datetime Checked
Created_by Varchar 50 Checked
Creared_on Datetime Checked
Modify_by Varchar 50 Checked
Modify_on Datetime Checked
Any_other Nvarchar 300 Checked
Letter_sender_person_id Int Checked
17
-
8/12/2019 Block Office Project
18/101
Table For Letter Receive EntryLetter_receive_id Int PK
Block_id Int Checked
Letter_send_office_id Int Checked
Letter_number Varchar 100 Checked
Letter_receive_date Datetime Checked
Any_other Nvarchar 300 Checked
Created_by Varchar 50 Checked
Created_on Datetime Checked
Modify_by Varchar 50 Checked
Modify_on Datetime Checked
Status_type Char 1 Checked
18
-
8/12/2019 Block Office Project
19/101
Table For Letter StatusStatus_id Int PK Checked
Status_type Int Checked
Block_id Int Checked
Letter_sender_office_id Int Checked
Letter_receive_office_id Int Checked
Status_date Datetime Checked
Remark Nvarchar 300 Checked
Created_by Varchar 50 Checked
Created_on Datetime Checked
Modify_by Varchar 50 Checked
Modify_on Datetime Checked
Letter_receive_id Int FK Checked
Letter_sender_person_id Int FK Checked
19
-
8/12/2019 Block Office Project
20/101
Table for Rashan CardRashancardshop_id Int PK
Rashancardshop_name Nvarchar 100 Checked
Grampanchayat_id Int FK Checked
Created_by Varchar 50 Checked
Created_on Datetime Checked
Modify_by Varchar 50 Checked
Modify_on Datetime Checked
Rashancardshopregisternumber Varchar 20 Checked
20
-
8/12/2019 Block Office Project
21/101
Table For Rashan Card EntryRashancard_id Int PK Checked
Block_id Int FK Checked
Grampanchayat_id Int FK Checked
Villege_id Int FK Checked
Candidate_name Nvarchar 100 Checked
Father_name Nvarchar 100 Checked
Mother_name Nvarchar 100 Checked
Caste Char 1 Checked
Full_address Nvarchar 300 Checked
Pincode Int Checked
Mob_no Varchar 20 Checked
-
8/12/2019 Block Office Project
22/101
Unique_id Varchar 20 Checked
Voter_id Varchar 20 Checked
Electricity Nvarchar 300 Checked
Gas agency_name Nvarchar 100 Checked
Consumer_number Varchar 50 Checked
Permanent_address Nvarchar 300 Checked
Living_status Nvarchar 25 Checked
House_status Nvarchar 25 Checked
House_type Nvarchar 25 Checked
Candidate_photo Varchar 50 Checked
Letter_photo Varchar 50 Checked
22
-
8/12/2019 Block Office Project
23/101
Table For Rashancard Candidate family MemberFamily_id Int PK Checked
Candtdate_id Int FK Checked
Member_name Nvarchar 100 Checked
Mother_name Nvarchar 100 Checked
Gender Char 1 Checked
Relation Nvarchar 50 Checked
Age Int Checked
Bussiness Nvarchar 100 Checked
Monthly_income Int Checked
-
8/12/2019 Block Office Project
24/101
Office_address Nvarchar 100 Checked
Created_by Varchar 50 Checked
Created_on Datetime Checked
Modify_by Varchar 50 Checked
Modify_on Datetime Checked
24
-
8/12/2019 Block Office Project
25/101
Table for Rashancard StatusStatus_id Int PK
Status_type Char 1 Checked
Rashancard_id Int FK Checked
Status_date Datetime Checked
Remark Nvarchar 100 Checked
Created_by Varchar 50 Checked
Created_on Datetime Checked
Modify_by Varchar 50 Checked
Modify_on Datetime Checked
25
-
8/12/2019 Block Office Project
26/101
System Physical Design
Program Design
The programming process is similar in approach and creativity to writing a paper.
In composition, you are writing to express ideas; in programming you are
expressing a computation. Both the programmer and the writer must adhere to the
syntactic rules (grammar) of a particular language. In prose, the fundamental idea-
expressing unit is the sentence; in programming, two unitsstatements and
comments are available.Standing back, composition from technical prose to fiction
should be organized broadly, usually through an outline. The outline should be
expanded as the detail is elaborated, and the whole re-examined and re-organized
when structural or creative flaws arise. Once the outline settles, you begin the
actual composition process, using sentences to weave the fabric your outline
expresses. Clarity in writing occurs when your sentences, both internally and
globally, communicate the outline succinctly and clearly.We stress this approach
here, with the aim of developing a programming style that produces efficient
programs that humans can easily understand.
To a great degree, no matter which language you choose for your composition, the
idea can be expressedwith the same degree of clarity. Some subtleties can be better
expressed in one language thananother, but the fundamental reason for choosing
your language is your audience: People do not knowmany languages, and if you
want to address the American population, you had better choose Englishover
Swahili. Similar situations happen in programming languages, but they are not
nearly so complexor diverse. The number of languages is far fewer, and their
differences minor. FORTRAN is the oldest languageamong those in use today. C
26
-
8/12/2019 Block Office Project
27/101
and C++ differ from it somewhat, but there are more similaritiesthan not.
MATLABs language, written in C and FORTRAN, was created much later than
these two, and itsstructure is so similar to the others that it can be easily mastered.
The C++ language is an extension ofthe C language that places its emphasis on
object oriented programming (OOP) methods. FORTRAN addedobject oriented
capabilities with its F90 standard, and additional enhancements for parallel
machineswere issued with F95. The FORTRAN 2000 standard is planned to
contain more user-friendly constructs forpolymorphism and will, thus, enhance its
object-oriented capabilities. This creation of a new languageand its similarity to
more establish ones are this books main points: More computer programming
languageswill be created during your career, but these new languages will probably
not be much differentthan ones you already know. Why should new languages
evolve? In MATLABs case, it was the desire toexpress matrix-like expressions
easily that motivated its creation. The difference between MATLAB andFortran 90
is infinitesimally small compare to the gap between English and Swahili.
An important difference between programming and composition is that inprogramming you are writingfor two audiences: people and computers. As for the
computer audience, what you write is read byinterpreters and compilers specific
to the language you used. They are very rigid about syntactic rules,and perform
exactly the calculations you say. It is like a document you write being read by the
most detailed,picky person you know; every pronoun is questioned, and if the
antecedent is not perfectly clear,then they throw up their hands, rigidly declaring
that the entire document cannot be understood. Yourpicky friend might interpret
the sentence Pick you up at eight to mean that you will literally lift him orher off
27
-
8/12/2019 Block Office Project
28/101
the ground at precisely 8 oclock, and then demand to know whether the time is in
the morning orc2001 J.E. Akin 1afternoon and what the date is.
Humans demand even more from programs. This audience consists of two main
groups, whose goals can conflict. The larger of the two groups consists of users.
Users care about how the program presents itself, its user interface, and how
quickly the program runs, how efficient it is. To satisfy this audience, programmers
may use statements that are overly terse because they know how to make the
program more readable by the computers compiler, enabling the compiler to
produce faster, but less human-intelligible program. This approach causes the other
portion of the audience programmers to boo and hiss. The smaller audience, of
which you are also a member, must be able to read the program so that they can
enhance and/or change it. A characteristic of programs, which further distinguishes
it from prose, is that you and others will seek to modify your program in the future.
For example, in the 1960s when the first version of FORTRAN was created, useful
programs by todays standards (such as matrix inversion) were written. Back then,
the user interface possibilities were quite limited, and the use of visual displayswas limited. Thirty years later, you would (conceivably) want to take an old
program, and provide a modern user interface. If the program is structurally sound
(a good outline and organized well) and is well-written, re-using the good
portions is easy accomplished.
The three-audience situation has prompted most languages to support both
computer-oriented and human-oriented prose. The programs meaning isconveyed by statements, and is what the computer interprets. Humans read this
part, which in virtually all languages bears a strong relationship to mathematical
28
-
8/12/2019 Block Office Project
29/101
equations, and also read comments. Comments are not read by the computer at all,
but are there to help explain what might be expressed in a complicated way by
programming language syntax. The document or program you write today should
be understandable tomorrow, not only by you, but also by others. Sentences and
paragraphs should make sense after a day or so of gestation. Paragraphs and larger
conceptual units should not make assumptions or leaps that confuse the reader.
Otherwise, the document you write for yourself or others served no purpose. The
same is true with programming; the programs organization should be easy to
follow and the way you write the program, using both statements and comments,
should help you and others understand how the computation proceeds. The
existence of comments permits the writer to directly express the programs outline
in the program to help the reader comprehend the computation.
These similarities highlight the parallels between composition and
programming. Differences becomeevident because programming is, in many ways,
more demanding than prose writing. On one hand, thecomponents and structure of
programming languages are far simpler than the grammar and syntax of anyverbalor written language. When reading a document, you can figure out the misspelled
words, and notbe bothered about every little imprecision in interpreting what is
written. On the other, simple errors, akinto misspelled words or unclear
antecedents, can completely obviate a program, rendering it senseless orcausing it
to go wildly wrong during execution. For example, there is no real dictionary when
it comesto programming. You can define variable names containing virtually any
combination of letters (upperand lower case), underscores, and numbers. A
typographical error in a variables name can thereforelead to unpredictable
program behaviour. Furthermore, computer execution speeds are becoming
29
-
8/12/2019 Block Office Project
30/101
fasterand faster, meaning that increasingly complex programs can run very
quickly. For example, the program(actually groups of programs) that runs NASAs
space shuttle might be comparable in size to Hugos LesMiserables, but its
complexity and immediate importance to the user far exceeds that of the novel.
As a consequence, program design must be extremely structured, having the
ultimate intentions ofperforming a specific calculation efficiently with attractive,
understandable, efficient programs. Achievingthese general goals means breaking
the program into components, writing and testing them separately,then merging
them according to the outline. Toward this end, we stress modular programming.
Modulescan be on the scale of chapters or paragraphs, and share many of the same
features. They consist of a sequenceof statements that by themselves express a
meaningful computation. They can be merged to formlarger programs by
specifying what they do and how they interface to other packages of software.
Theanalogy in prose is agreeing on the characters names and what events are to
happen in each paragraphso that events happen to the right people in the right
sequence once the whole is formed. Modules can bere-used in two ways. As withour program from the 1960s, we would lift the matrix inversion routineand put a
different user interface around it. We can also re-use a routine within a program
several times.
For example, solving the equations of space flight involves the inversion of
many matrices. We wouldc2001 J.E. Akin 2want our program to use the matrix
inversion routine over and over, presenting it with a different matrixeach time.
30
-
8/12/2019 Block Office Project
31/101
The fundamental components of good program design are
1. Problem definition, leading to a program specification2. Modular program design, which refines the specification3. Module composition, which translates specification into executable program4. Module/program evaluation and testing, during which you refine the
program and find errors
5. Program documentation, which pervades all other phasesThe result of following these steps is an efficient, easy-to-use program that has a
users guide (how doessomeone else run your program) and internal
documentation so that other programmers can decipher thealgorithm.
Today it is common in a university education to be required to learn at least one
foreign language.Global interactions in business, engineering, and government
make such a skill valuable to ones career.So it is in programming. One often
needs to be able to read two or three programming languages evenif you compose
programs in only one language. It is common for different program modules, in
differentlanguages, to be compiled separately and then brought together by a
linker to form a single executable.
When something goes wrong in such a process it is usually helpful to have a
reading knowledge of theprogramming languages being used.
When composing to express ideas there are, at least, two different approaches
to consider: poetry andprose. Likewise, in employing programming languages to
create software there are distinctly differentapproaches available. The two most
common ones are procedural programming and object-orientedprogramming.
31
-
8/12/2019 Block Office Project
32/101
The two approaches are conceptually sketched. They differ in the way that
thesoftware development and maintenance are planned and implemented.
Procedures may use objects, andobjects usually use procedures, called methods.
Usually the object-oriented code takes more planningand is significantly larger, but
it is generally accepted to be easier to maintain. Today when one can haveliterally
millions of users active for years or decades, maintenance considerations are very
important.
Input / Output Form Design
Input design is the process of converting user-originated inputs to a computer-
based format. Input design is one of the most expensive phases of the operation of
computerized system and is often the major problem of a system.
In the project, the input design is made in various web forms with various
methods. Forexample, in the Admin form, the empty username and password is not
allowed. The username if exists in the database, the input is considered to be
invalid and is not accepted.
Output design generally refers to the results and information that are generated by
the system for many employees; output is the main reason for developing the
system and the basis on which they evaluate the usefulness of the application.
In the project, if the employee has to communicate with other employees they can
communicate through send and receive message and directly interact with HR
manager.
32
-
8/12/2019 Block Office Project
33/101
In this module, we discuss the physical design of output, input, and user
interface. Although in the textbook authors include input forms as part of interface
design, I separated them. In my view, the user interface is not just input screens but
is a communication between users and the system. It is a two-way communication.
Input data and instruction (what users want to do) go into the system in many
forms. System replies with outputs, error messages, feedback, warning, help
functions, etc. Also the interface includes how users navigate through the system.
It could be commands, menus, or links that lead users to the next screen. It is a
structure of the system from users view point (while DFDs and Flowcharts are the
structure of the system from programmers view points).
Typical Physical DFD with Input and Output Functions
Outputs are data going out from the system to the users. The users may be an
external entity, or maybe internal (boundary between computer-system and manual
system). You have to be careful when determining the output data flow. Notice that
dataflow inquiry form is a form that induces the input from the user
(Customer), that means although the dataflow goes out of the system boundary,
that form is an input form and not an output.
Output-design Objectives
Outputs present information to system users. Outputs, the most visible
component of a working information system, are the justification for the system.
During systems analysis, you defined output needs and requirements, but you
didn't design those outputs. In this section, you will learn how to design effective
outputs for system users.
33
-
8/12/2019 Block Office Project
34/101
Serve the intended purpose Deliver the right quantity of output Deliver it to the right place Provide output on time Choose the right method
Types of Outputs
Internal outputs stay inside the system to support the system's users andmanagers
External outputs leave the system to trigger actions on the part of theirrecipients or confirm actions to their recipients
Turnaround outputs are those which are typically implemented as a reporteventually re-enters the system as an input
Detailed Reports:o Present information with little or no filtering or restrictions.o Some detailed reports are historical in nature.o
Detailed reports confirm and document the successful processing oftransactions and serve as an audit trail for subsequent management
inquiry.
34
-
8/12/2019 Block Office Project
35/101
o An example detailed report is depicted in the figure above. Thisexample is a listing of all purchase orders that were generated on a
particular date. Other example detail reports would be a detailed
listing of all customer accounts, orders, or products in inventory.
Exception Reports:o Filter data before it is presented to the manager as information.o Exception reports only report exceptions to some condition or
standard.
o An example is depicted in the figure above where delinquent memberaccounts are identified for following-up. Another classic examples of
an exception report is a report that identifies items that are low in
stock (soon to run out).
Output Media
PaperAlthough the paperless office (and business) has been predicted for
several years, it has not yet become a reality. Perhaps there is an irreversible
psychological dependence on paper as a medium. In any case, paper output
will be with us for a long time.
35
-
8/12/2019 Block Office Project
36/101
ScreenTherefore, other than paper, the most common output medium is
screen (monitor).Although the screen medium provides the system user with
convenient access to information, the information is only temporary. When
the image leaves the screen, that information is lost unless it is redisplayed.
If a permanent copy of the information is required, paper and film are
superior media. Often times when system designers build systems that
include screen outputs, they also may provide the user with the ability to
obtain that output on paper.
Microfilm/MicroficheThe use of film does present its own problems - microfiche and
microfilm can only be produced and read by special equipment.
Output Formats
Tabular outputMost of the computer programs written probably generated tabular
reports.
36
-
8/12/2019 Block Office Project
37/101
-
8/12/2019 Block Office Project
38/101
User-type and the degree of user-friendliness have correlation. For example,casual users require the most user friendly interfaces. You cannot expect
them to handle command interfaces. On the other hand, dedicated users
want the performance of interfaces, meaning that minimizing key-strokes,
movement of mouth should be minimized. In such a case, user-friendliness
is not so important
Dedicated system user is one who will spend considerable time usingspecific programs. This user is likely to become more comfortable and
familiar with the terminal or PC's operation.
Casual system usermay only use a specific program on an occasional basis.This user may never become truly comfortable with the terminal or the
program.
Most of the time you design a part of the system (one report, or one inputscreen), you can see who are the users. Most probably you can tell the type
of the users. With a few exceptions, those users are either dedicated orcasual, not both. So you design that part of the system according to the
users preference of user friendliness.
Input Methods
Batch inputBatch input is the oldest and most traditional input method. Source
documents or forms are collected and then periodically forwarded to data
entry operators, who key the data using a data entry device that translates the
data into a machine-readable format.
38
-
8/12/2019 Block Office Project
39/101
The most common medium for batch input data are Key-to-disk
(KTD) and key-to-tape (KTT) workstations that transcribe data to magnetic
disks and magnetic tape, respectively.
On-line inputOn-line input is the capture of data at its point of origin in the business
and the direct inputting of that data to the computer, preferably as soon as
possible after the data originates.
The system user directly enters the data when or soon after that data
originates. No data entry clerks are needed! There is no need to record data
onto a medium (paper and such) that is later input to the computer; this input
is direct! If data is entered incorrectly, the computer's edit program detects
the error and immediately requests that the operator make a correction.
Trends in Automatic Data Collection Technology
Biometric ADCBiometric ADC technology is based on unique human characteristics
or traits. For example, it is known that every individual can be identified by
their own unique fingerprint, voice pattern, or pattern of certain veins (retina
or wrist). This technology is particularly popular for systems that require
security access.
39
-
8/12/2019 Block Office Project
40/101
Electromagnetic (radio)Electromagnetic identification technology is becoming very popular
in applications that involve tracking physical objects are out of sight and on
the move. For example, electromagnetic ADC is being used for public
transportation tracking and control, tracking manufactured products, and
tracking animals to name a few.
Magnetic (MICR)There are over one billion magnetic stripe cards in use today! They
have found their way into a number of business applications such as, credit
card transactions, building security access control, and employee attendance
tracking.
Optical (Bar coding )Point-of-sale terminals in retail and grocery stores frequently include
bar-code and optical-character readers. Bar codes eliminate the need for
keying data, either by data entry clerks or end-users.
Smart CardsSmart card applications are particularly promising in the area of health
records where a persons blood type, vaccinations, and other past medical
history can be made readily available. Other uses may include such
applications as passport, financial information for point-of-sale transactions,
pay-television, etc.
40
-
8/12/2019 Block Office Project
41/101
System User Issues for Input Design
Capture only variable data. Do not capture data that can be calculated or stored in computer programs. Use codes for appropriate attributes.
41
-
8/12/2019 Block Office Project
42/101
Input / Output Screen
User Login-
42
-
8/12/2019 Block Office Project
43/101
Figures Of Module Daak
Add Department Master Form
43
-
8/12/2019 Block Office Project
44/101
Letter Receive Entry Form
44
-
8/12/2019 Block Office Project
45/101
Letter Send Entry Form
45
-
8/12/2019 Block Office Project
46/101
Receive Letter Transaction
46
-
8/12/2019 Block Office Project
47/101
Report Of Send Letters
47
-
8/12/2019 Block Office Project
48/101
Report Of Receive Letters
48
-
8/12/2019 Block Office Project
49/101
Figures Of Module Rashan Card
Rashan card ShopOwner Entry Master
49
-
8/12/2019 Block Office Project
50/101
Rashan Card Entry Form
50
-
8/12/2019 Block Office Project
51/101
Report Of Applied Candidate for Rashan Card
51
-
8/12/2019 Block Office Project
52/101
Candidate Family Report
52
-
8/12/2019 Block Office Project
53/101
Figures Of Tables
Tables of Module Daak
Add Department Master
53
-
8/12/2019 Block Office Project
54/101
Letter Receive Table
54
-
8/12/2019 Block Office Project
55/101
Letter send Table
55
-
8/12/2019 Block Office Project
56/101
Letter Status Table
56
-
8/12/2019 Block Office Project
57/101
Tables of Module Rashan Card
Add Rashancard Shop Owner Table
57
-
8/12/2019 Block Office Project
58/101
Rashan Card Apllied Candidate Entry Table
58
-
8/12/2019 Block Office Project
59/101
Rashan card Candidate family Table
59
-
8/12/2019 Block Office Project
60/101
Rashan card Status Table
60
-
8/12/2019 Block Office Project
61/101
SYSTEM TESTING
Testing is the major control measure used during software development. Its basicfunction is to detect errors in the software. During requirement analysis and design,
the output is a document that is usually textual and no executable. After the coding
phase, computer programs are available that can be executed for testing purpose.
This implies that testing not only has to uncover errors introduced during coding,
but also errors introduced during previous phase. Thus the goal of testing is to
uncover the requirements, design and coding errors in the programs.
Objectives of testing
First of all objectives should be clear.
Testing as a process of executing a program with the intent of finding errors. To perform testing, test cases are designed. A test case is a particular made up
of artificial situation upon which a program is exposed so as to find errors. So
a good test case is one that finds undiscovered errors.
If testing is done properly, it uncovers errors and after fixing those errors wehave software that is being developed according to specifications.
The above objective implies a dramatic change in viewpoint .The move counter to
the commonly held view than a successful test is one in which no errors are found.
In fact, our objective is to design tests that a systematically uncover different
classes of errors and do so with a minimum amount of time and effort.
61
-
8/12/2019 Block Office Project
62/101
Testing principles
Before applying methods to design effective test cases, software engineer must
understand the basic principles that guide the software testing process. Some of the
most commonly followed principles are:
All test should be traceable to user requirements as the objective of testing is to
uncover errors, it follows that the most severe defects (from the users point of
view) are those that causes the program to fail to meet its requirements.
Tests should be planned long before the testing begins. Test planning can begin as
soon as the requirement model is complete. Detailed definition of test cases can
begin as soon as the design model has been solidated. Therefore, all tests can be
planned and designed before any code can be generated.
The Pareto principle applies to software testing stated simply the Pareto principle
implies that 80 percent of all errors uncovered during testing will likely be
traceable to 20 percent of all program modules. The problem of course, is to isolate
these suspects modules and to thoroughly test them.
Testing should begin in the small and progress towards testing in large. The
first tests planned and executed generally focus on individual modules. As testing
progresses, testing shifts focus in an attempt to find errors in integrated clusters of
modules and ultimately in the entire system.
62
-
8/12/2019 Block Office Project
63/101
Exhaustive testing is not possible. The number of paths permutations for
impossible to execute every combination of paths during testing. It is possible
however to adequately cover program logic and to ensure that all conditions in the
procedural design have been exercised.
To be most effective, an independent third party should conduct testing. By most
effective, we mean testing that has the highest probability of finding errors (the
primary objective of testing).
Test information flow
Testing is a complete process. For testing we need two types of inputs:
Software configurationIt includes software requirement specification, design specification and source
code of program. Software configuration is required so that testers know what is to
be expected and tested.
Test configurationIt is basically test plan and procedure. Test configuration is testing plan that is, the
way how the testing will be conducted on the system. It specifies the test cases and
their expected value. It also specifies if any tools for testing are to be used.
Test cases are required to know what specific situations need to be tested. When
tests are evaluated, test results are compared with actual results and if there is some
error, then debugging is done to correct the error. Testing is a way to know about
quality and reliability. Error rate that is the occurrence of errors is evaluated. This
data can be used to predict the occurrence of errors in future.
63
-
8/12/2019 Block Office Project
64/101
A software product can be tested in two ways:-
In first approach, only overall functioning of the product is tested. Inputs are given
and outputs are checked. This approach is called black box testing. It does not care
about the internal functioning of the product.
The other approach is called white box testing. Here the internal functioning of the
product is tested. Each procedure is tested for its accuracy. It is more intensive than
black box testing. But for the overall product both these techniques are crucial.
There should be sufficient number of tests in both categories to test the overall
product.
Basic methods of Testing
White box testing
White box testing is performed to reveal problems with the internal structure of aprogram. This requires the tester to have detailed knowledge of the internal
structure. A common goal of white box testing is to ensure a test case exercises
every path through a program. A fundamental strength that all white box strategies
share is that the entire software implementation is taken into account during
testing, which facilitates error detection even when software specification is vague
or incomplete. The effectiveness or thoroughness of white box testing is commonly
expressed in terms of test or code coverage metrics, which measure the fraction of
code exercised by test cases.
64
-
8/12/2019 Block Office Project
65/101
Basic Path Testing
It is a white box technique. It was proposed by Tom McCabe. These tests
guarantee to execute every statement in the program at least one time during
testing. Basic set is the set of all execution paths of a procedure.
Black Box Testing
Black box tests are performed to access how well a program meets its
requirements, looking for incorrect or missing functionality. Functional tests
typically exercise code with valid or nearly valid input for which the expected
output is known. This includes concepts such as boundary values.
Performance tests evaluate response time, memory usage, throughput, device
utilization and execution time. Stress tests push the system to or beyond its
specified limits to evaluate its robustness and error handling capabilities.
Reliability tests monitor system response to representative user input, counting
failures over time to measure or certify reliability.
Black box testing uncovers the following types of errors
1. Incorrect or missing functions
2. Interface errors
3. External database access
4. Performance errors
5. Initialization and termination errors
65
-
8/12/2019 Block Office Project
66/101
-
8/12/2019 Block Office Project
67/101
These testing types are again divided in two groups:
a) Testing in which user plays a role of tester
b) User is not required.
Testing method where user is not required:-
Functional Testing:-In this type of testing, the software is tested for the functional requirements. The
tests are written in order to check if the application behaves as expected.
Stress Testing:-The application is tested against heavy load such as complex numerical values,
large number of inputs, large number of queries etc. which checks for the
stress/load the applications can withstand.
Load Testing:-The application is tested against heavy loads or inputs such as testing of web sites
in order to find out at what point the web-site/application fails or at what point its
performance degrades.
Ad-hoc Testing:-This type of testing is done without any formal Test Plan or Test Case creation.
Ad-hoc testing helps in deciding the scope and duration of the various other testing
and it also helps testers in learning the application prior starting with any other
testing.
67
-
8/12/2019 Block Office Project
68/101
Exploratory Testing:-This testing is similar to the ad-hoc testing and is done in order to learn/explore the
application.
Usability Testing:-This testing is also called as Testing for User-Friendliness. This testing is done if
User Interface of the application stands an important consideration and needs to be
specific for the specific type of user.
Smoke Testing:-This type of testing is also called sanity testing and is done in order to check if the
application is ready for further major testing and is working properly without
failing up to least expected level.
Recovery Testing:-Recovery testing is basically done in order to check how fast and better the
application can recover against any type of crash or hardware failure etc. Type or
extent of recovery is specified in the requirement specifications.
Volume Testing:-Volume testing is done against the efficiency of the application. Huge amount of
data is processed through the application (which is being tested) in order to check
the extreme limitations of the system.
68
-
8/12/2019 Block Office Project
69/101
Testing where user plays a role/user is required:
User Acceptance Testing:-In this type of testing, the software is handed over to the user in order to find out if
the software meets the user expectations and works as it is expected to.
Alpha Testing:-In this type of testing, the users are invited at the development center where they
use the application and the developers note every particular input or action carried
out by the user. Any type of abnormal behavior of the system is noted and rectified
by the developers.
Beta Testing:-In this type of testing, the software is distributed as a beta version to the users and
users test the application at their sites. As the users explore the software, in case if
any exception/defect occurs that is reported to the developers.
Advantages of Black Box Testing
More effective on larger units of code than glass box testing. Tester needs no knowledge of implementation, including specific
programming languages.
Tester and programmer are independent of each other. Tests are done from a user's point of view. Will help to expose any ambiguities or inconsistencies in the specifications. Test cases can be designed as soon as the specifications are complete.
69
-
8/12/2019 Block Office Project
70/101
Disadvantages of Black Box Testing
Only a small number of possible inputs can actually be tested, to test everypossible
Input stream would take nearly forever
Without clear and concise specifications, test cases are hard to design There may be unnecessary repetition of test inputs if the tester is not
informed of test cases the programmer has already tried
May leave many program paths untested Cannot be directed toward specific segments of code which may be very
complex (and therefore more error prone)
Testing With Live Data
We know, test cases are integral part of testing. So we need to know more about
test cases and how these test cases are designed. The most desired or obvious
expectation from the test cases is that it should be able to find most errors with the
least amount of time and effort.
Testing With Dummy Data
In this phase access local server data tables and procedure to test the web forms.
70
-
8/12/2019 Block Office Project
71/101
SYSTEM IMPLEMENTATION
The following guideline is a listing of key components to be taken into
consideration when developing an implementation project that is comprehensive
and realistic.
Management Support Project Management/Leadership Decision Makers
Selection of Team Members Outside Consultants Location of Team The Project Plan Duration of Project Scope Creep On-Time, Within Budget Team Espirit de Corps Team Recognition Communication
71
-
8/12/2019 Block Office Project
72/101
-
8/12/2019 Block Office Project
73/101
estimate numbers of hours for task completion, track status, manage project funds,
and more. By selecting a leader from both the functional and technical side, the
two individuals are better equipped to effectively work together to cover all areas
which may have an impact on the project.
Decision MakersWho will be selected to be the decision-makers for your project? There will be
plenty of decisions that will need to be made, and often, these decisions may have
to be made within a 24 to 48 hour period. Will Project Managers be empowered
with the authority to make all decisions? This is probably unlikely, particularly if itinvolves changing company policies. Typically, a Steering Committee that is
comprised of key stakeholders will meet with Project Leaders on a regular basis to
assist in removing obstacles and make decisions which may have an impact not
only on implementation schedules and deliverables, but the entire organization.
Selection of Team MembersPutting together a quality team is essential. During the selection process, it is
important to try and obtain the appropriate resources from both the functional and
technical areas. The functional team members will know the organizations
processes and procedures by job function and can determine whether or not policy
or procedural changes need to take place. The Project Team members will work
directly with sub-team members as well as others to help define system
requirements; review proposed designs; and help build tables which will drive the
system.
73
-
8/12/2019 Block Office Project
74/101
Technical team members will be key in working with the functional members to
pull together and program system requirements. They will serve as valuable
resources in knowledge of the legacy system's programs and functions. They will
also be involved in overall infrastructures such as networking between locations,
setting up workstations, etc.
The blending of functional and technical resources will allow for a collaborative
approach in designing, constructing and implementing the system.
Since this will no doubt be a new role for team members selected, it is important to
understand that initially there might be a period of adjustment and settling in to
their new roles. For the most part, they are being asked not only to take on a new
job, but a job which they have never done before. This in itself can cause anxiety at
times.
Project Leaders will want to work with team members on accepting and enjoying
this new experience. The reporting relationships to the Project Leaders must be
clearly defined to prevent problems. If 100% of team members time is being to the
project, then they should probably report to Project Leaders instead of their
managers. The opportunity for one to gain and expand skill sets during a project of
this nature is often viewed as a valuable and rewarding endeavor.
74
-
8/12/2019 Block Office Project
75/101
Outside ConsultantsBefore embarking on a new system implementation, it should be established
whether or not the organization will require the assistance of outside consultants. If
the organization has never gone (or has not done so recently) through a major
software implementation, then strong consideration should be given to obtaining
outside help. If the skills sets necessary are not available in-house, then outside
consultants should be used to compliment your current team's skill sets. Again, this
decision should be made prior to commencing the implementation process, since
costs associated with utilizing outside consultants need to be included in the
project budget.
Prior to hiring an outside consultant, be sure to interview anyone who is being
considered as a member of the project team. Obtain their most recent job
assignments and details of their overall qualifications. Ask for references and
check them thoroughly. Spending the time up front to select the most appropriate
outside consultant will pay big dividends in the end. Act as if you are hiring the
consultant to be an employee of your organization. You will want someone who is
qualified, experienced and committed, and who can contribute the necessary
resources for a successful implementation. Accept no one who does not meet your
expectations.
If the decision is made to hire an outside consultant, then the company should
spend the time needed with them to ensure they have an understanding of how the
organization operates, makes decisions, handles changes, etc. It is also important
for the consultant to understand the culture of the organization. This will help them
75
-
8/12/2019 Block Office Project
76/101
gain a better understanding of what the expectations are, how they should approach
the project and how flexible they will need to be.
Location of TeamThe project may be better served if the entire project team is moved to an off-site
location. At a minimum, they should all be relocated to a common work area. By
not doing so, the company is running a risk that project team members will be
pulled back into their "old jobs". This can result in team members not having
sufficient time to work on project assignments. Providing team members with the
ability to focus solely on priorities and job assignments for the implementation
process is an absolute necessity.
The Project TeamEstablishing a comprehensive project plan which includes the objectives of the
implementation is key to meeting all required deliverables during the project.
There is usually quite a bit of time spent in the beginning stages of the project just
pulling together necessary components of the project plan. The project plan is a
living document in that it will change and get updated almost on a daily basis. The
project plan will become an everyday tool used by all team members. It will help
to clarify the who, what, when, where, and why's. Without a good project plan, the
team will not know what is expected of them and important deliverables may be
missed altogether.
76
-
8/12/2019 Block Office Project
77/101
Duration of ProjectProject size, complexity and resources available will be the beginning points for
determining a completion date for the project. Ensure the approach taken is one
that produces a manageable project. Having a project that is too long and drawn
out will have an adverse impact on everything from level of motivation amongst
team members, available funding, scope creep and more. Once you start down the
road of moving out your Go Live date, you will suffer from lack of team
motivation and sense an urgency to complete the assignment on time. Therefore,
be sure to set a realistic Go Live date and stick to that date. The only time where
you may wish to consider delaying your Go Live date is if testing results are not
favorable. Meeting a deadline is not worth the risk of an incomplete and faulty
system.
On-time, Within BudgetOne way to help ensure funding and support for future HRMS initiatives is to
deliver the implementation on time and within budget. With a project of this size
and nature, it is very easy to get side-tracked. Don't let scope creep happen to you.
The term scope creep is often used in large projects. Scope creep is typically
defined as allowing or agreeing to additional work requests that were not part of
the original project plan or objectives. Be careful - this can happen easily in any
size organization. When you recognize scope creep, be firm but fair when others
try to expand the project. Taking on additional work that was not part of the
original plan can and does cost additional time and money. Keep in mind the extra
effort needed to take on new work can quickly spiral out of control.
77
-
8/12/2019 Block Office Project
78/101
Team Espirit de CorpsUnlike other project teams, this will no doubt end up being a special team and will
espouse a need to have its own identity. You will want others who are not on the
project to know what it is you will be delivering to the organization. In order to
develop and keep alive the level of motivation and dedication required, different
ways to engage team building and comradery throughout the life of the project will
need to be thought up.
As the project begins, look into having team members' work together on designing
a team logo, team name, or work on creating a vision and/or mission statement. Be
sure to use the project logo with every communication that goes out to others
regarding the implementation.
Adequate marketing of your project will help to further identify what your key
deliverables and objectives are. Other ideas are to have t-shirts; sweatshirts, pens,
etc. made with the team logo and/or name.
Team RecognitionReward and recognize team members throughout the entire project. When major
milestones are met - celebrate! When the team has successfully overcome a
difficult assignment - recognize their efforts and contributions. Keep in mind that
recognition does not always need to be in the form of compensation. A good old
fashion pat on the back still works wonders. Get upper level management and/or
your Steering Committee to help provide recognition to the team. Sometimes it's
the little things that people appreciate like doughnuts, cookies, hats, a team picture
in a company newsletter, etc.
78
-
8/12/2019 Block Office Project
79/101
CommunicationCommunicate, communicate, communicate! Sure you and the other team members
may be fully aware of your goals and objectives, but what about all of the other
stakeholders, end users, internal and external customers? Do no underestimate the
need to know and the importance of sharing with others in the organization what
the implementation will mean for them and the company as a whole. You may
want to create a special newsletter that gets published on a regular basis letting
everyone know of the projects progress, etc. How about setting up a page on the
company's Intranet? There are many ways in which you can and should keep
constituents informed about this major project.
Communications inside the project team is another key element that can help to
facilitate a healthy team environment. With the amount of activity that occurs, it
will be important to establish early on a means for open and effective
communication between all team members.
79
-
8/12/2019 Block Office Project
80/101
Limitations & Future Scope
Once you have successfully reached your Go Live date and had an opportunity to
celebrate your implementation, your focus will begin to change from a tactical to a
more strategic effort. In order to help support and validate the value the new
system brings to the organization, it will be necessary to embark on forward
thinking. Typically an exercise in determining the lessons learned from your
implementation and sharing it with management is a valuable and rewarding task.
Perhaps you will go out and solicit feedback from your internal and external
customers who are involved and are using the new system.
Leverage the investment the organization has made by ensuring the system is used
correctly and that data integrity is validated. Expand the knowledge and skill sets
of your end users by providing on going training on the system. Developing and
implementing knowledge transfer strategy on how to effectively use the system
will be beneficial.
Take the time to develop power users of the system. Develop and maintain a
knowledge transfer between co-workers and across boundaries. Use the data
available in the system to create and produce meaningful data to others in the
organization. By providing information that can be used to help make key
decisions, you will be assisting in developing an increased Human Resources
strategic position within the organization.
As you gain more experience with the new system and gain a better understanding
of it's full potential; you will be better equipped and able to make significant
contributions to all areas of the organization.
80
-
8/12/2019 Block Office Project
81/101
Language Technology Use for ProjectFRONT END DESIGN
FEATURES OF ASP.NETASP.NET is the next version of Active Server Pages (ASP); it is a
unified Web development platform that provides the services necessary for
developers to build enterprise-class Web applications. While ASP.NET is largely
syntax compatible, it also provides a new programming model and infrastructure
for more secure, scalable, and stable applications.
ASP.NET is a compiled, NET-based environment, we can author applications in
any .NET compatible language, including Visual Basic .NET, C#, and JScript
.NET. Additionally, the entire .NET Framework is available to any ASP.NET
application. Developers can easily access the benefits of these technologies, which
include the managed common language runtime environment (CLR), type safety,
inheritance, and so on.
ASP.NET has been designed to work seamlessly with WYSIWYG HTML editors
and other programming tools, including Microsoft Visual Studio .NET. Not only
does this make Web development easier, but it also provides all the benefits that
these tools have to offer, including a GUI that developers can use to drop server
controls onto a Web page and fully integrated debugging support.
Developers can choose from the following two features when creating an
ASP.NET application.Web Forms and Web services, or combine these in any way
they see fit. Each is supported by the same infrastructure that allows you to use
81
-
8/12/2019 Block Office Project
82/101
-
8/12/2019 Block Office Project
83/101
ASP.NET provides a simple model that enables Web developers to write logic that
runs at the application level. Developers can write this code in the global.aspx text
file or in a compiled class deployed as an assembly. This logic can include
application-level events, but developers can easily extend this model to suit the
needs of their Web application.
ASP.NET provides easy-to-use application and session-state facilities that
are familiar to ASP developers and are readily compatible with all other .NET
Framework APIs.ASP.NET offers the IHttpHandler and IHttpModule interfaces.
Implementing the IHttpHandler interface gives you a means of interacting with the
low-level request and response services of the IIS Web server and provides
functionality much like ISAPI extensions, but with a simpler programming model.
Implementing the IHttpModule interface allows you to include custom events that
participate in every request made to your application.
ASP.NET takes advantage of performance enhancements found in the .NET
Framework and common language runtime. Additionally, it has been designed to
offer significant performance improvements over ASP and other Web development
platforms. All ASP.NET code is compiled, rather than interpreted, which allows
early binding, strong typing, and just-in-time (JIT) compilation to native code, to
name only a few of its benefits. ASP.NET is also easily factorable, meaning that
developers can remove modules (a session module, for instance) that are not
relevant to the application they are developing.
83
-
8/12/2019 Block Office Project
84/101
ASP.NET provides extensive caching services (both built-in services and
caching APIs). ASP.NET also ships with performance counters that developers and
system administrators can monitor to test new applications and gather metrics on
existing applications. Writing custom debug statements to your Web page can help
immensely in troubleshooting your application's code. However, it can cause
embarrassment if it is not removed. The problem is that removing the debug
statements from your pages when your application is ready to be ported to a
production server can require significant effort.
ASP.NET offers the TraceContext class, which allows us to write custom
debug statements to our pages as we develop them. They appear only when you
have enabled tracing for a page or entire application. Enabling tracing also appends
details about a request to the page, or, if you so specify, to a custom trace viewer
that is stored in the root directory of your application. The .NET Framework and
ASP.NET provide default authorization and authentication schemes for Web
applications. We can easily remove, add to, or replace these schemes, depending
upon the needs of ourapplication.
ASP.NET configuration settings are stored in XML-based files, which are
human readable and writable. Each of our applications can have a distinct
configuration file and we can extend the configuration scheme to suit our
requirements.
84
-
8/12/2019 Block Office Project
85/101
DATA ACCESS WITH ADO.NETAs you develop applications using ADO.NET, you will have different
requirements for working with data. You might never need to directly edit an
XML file containing data - but it is very useful to understand the data architecture
in ADO.NET.
ADO.NET offers several advantages over previous versions of ADO
Interoperability
Maintainability
Programmability
Performance Scalability
Interoperability
ADO.NET applications can take advantage of the flexibility and broad
acceptance of XML. Because XML is the format for transmitting datasets across
the network, any component that can read the XML format can process data. The
receiving component need not be an ADO.NET component.
The transmitting component can simply transmit the dataset to its destination
without regard to how the receiving component is implemented. The destination
component might be a Visual Studio application or any other application
implemented with any tool whatsoever.
85
-
8/12/2019 Block Office Project
86/101
The only requirement is that the receiving component be able to read XML. SO,
XML was designed with exactly this kind of interoperability in mind.
Maintainability
In the life of a deployed system, modest changes are possible, but
substantial, Architectural changes are rarely attempted because they are so
difficult. As the performance load on a deployed application server grows, system
resources can become scarce and response time or throughput can suffer. Faced
with this problem, software architects can choose to divide the server's business-
logic processing and user-interface processing onto separate tiers on separate
machines.
In effect, the application server tier is replaced with two tiers, alleviating the
shortage of system resources. If the original application is implemented in
ADO.NET using datasets, this transformation is made easier.
ADO.NET data components in Visual Studio encapsulate data access
functionality in various ways that help you program more quickly and with fewer
mistakes.
Performance
ADO.NET datasets offer performance advantages over ADO disconnected
record sets. In ADO.NET data-type conversion is not necessary.
86
-
8/12/2019 Block Office Project
87/101
Scalability
ADO.NET accommodates scalability by encouraging programmers toconserve limited resources. Any ADO.NET application employs disconnected
access to data; it does not retain database locks or active database connections for
long durations.
VISUAL STUDIO .NETVisual Studio .NET is a complete set of development tools for building ASP
Web applications, XML Web services, desktop applications, and mobile
applications In addition to building high-performing desktop applications, you can
use Visual Studio's powerful component-based development tools and other
technologies to simplify team-based design, development, and deployment of
Enterprise solutions.
Visual Basic .NET, Visual C++ .NET, and Visual C# .NET all use the same
integrated development environment (IDE), which allows them to share tools and
facilitates in the creation of mixed-language solutions.
In addition, these languages leverage the functionality of the .NET
Framework and simplify the development of ASP Web applications and XML
Web services. Visual Studio supports the .NET Framework, which provides a
common language runtime and unified programming classes; ASP.NET uses these
components to create ASP Web applications and XML Web services. Also it
includes MSDN Library, which contains all the documentation for these
development tools.
87
-
8/12/2019 Block Office Project
88/101
THE .NET FRAMEWORKThe .NET Framework is a new computing platform that simplifies
application development in the highly distributed environment of the Internet.
OBJECTIVES OF. NET FRAMEWORK1.To provide a consistent object-oriented programming environment whether
object codes is stored and executed locally on Internet-distributed, or executed
remotely.
2.To provide a code-execution environment to minimizes software deployment and
guarantees safe execution of code.
3. Eliminates the performance problems
There are different types of application, such as Windows-based applications and
Web-based applications.
To make communication on distributed environment to ensure that code be
accessed by the .NET Framework can integrate with any other code.
COMPONENTS OF .NET FRAMEWORK THE COMMON LANGUAGE RUNTIME (CLR)
The common language runtime is the foundation of the .NET Framework. It
manages code at execution time, providing important services such as memory
management, thread management, and remoting and also ensures more security
and robustness. The concept of code management is a fundamental principle of the
runtime. Code that targets the runtime is known as managed code, while code that
does not target the runtime is known as unmanaged code
88
-
8/12/2019 Block Office Project
89/101
-
8/12/2019 Block Office Project
90/101
SECURITYThe runtime enforces code access security. The security features of the
runtime thus enable legitimate Internet-deployed software to be exceptionally
feature rich. With regards to security, managed components are awarded varying
degrees of trust, depending on a number of factors that include their origin to
perform file-access operations, registry-access operations, or other sensitive
functions.
ROBUSTNESSThe runtime also enforces code robustness by implementing a strict type-
and code-verification infrastructure called the common type system(CTS). The
CTS ensures that all managed code is self-describing. The managed environment
of the runtime eliminates many common software issues
PRODUCTIVITYThe runtime also accelerates developer productivity. For example,
programmers can write applications in their development language of choice, yet
take full advantage of the runtime, the class library, and components written in
other languages by other developers.
90
-
8/12/2019 Block Office Project
91/101
PERFORMANCEThe runtime is designed to enhance performance. Although the common
language runtime provides many standard runtime services, managed code is never
interpreted. A feature called just-in-time (JIT) compiling enables all managed code
to run in the native machine language of the system on which it is executing.
Finally, the runtime can be hosted by high-performance, server-side applications,
such as Microsoft SQL Server and Internet Information Services (IIS).
ChangeoverAs name suggest it is the process of changing the old information system.
System changeover is the process of putting the new information system online
and retiring the old system. The four system changeover approaches description,
advantages, disadvantages and the implications of using each of these
approaches at Health Centres to change from the existing manual system to the
new CHIS are as follows-:
Direct Cutover:In simple words direct cutover approach is a direct approach where old
system is cut and over write by new system. The direct cutover approach causes
the changeover from the old system to the new system to occur immediately when
the new system becomes operational.
This is a least expensive method among all four but involves high risk of data
loss. With the direct cutover method, company cannot revert to the old system as a
backup option.
91
-
8/12/2019 Block Office Project
92/101
-
8/12/2019 Block Office Project
93/101
Pilot Operation:The pilot operation changeover method involves implementing the complete
new system at a selected location of the company. The group that uses the new
system first is called the pilot site. The old system continues to operate for the
entire organization including the pilot site. After the system proves successful at
the pilot site, it is implemented in the rest of the organization, usually using direct
cutover method. Pilot operation is combination of parallel operation and direct
cutover methods.
Pilot site assure the working of new system and reduces the risk of system
failure. This is also less expensive than the parallel operation as only at one section
both system works for limited period.
This is less expensive and safer approach as its combination of both direct
cutover and parallel operation. It will save money of health centre and also keep
their data safe with smooth working.
Phased Operation -:Phased operation works in different phases or stages. Implementation of new
system in modules or stages is phased operation. This is also a combination of
direct cutover and parallel similar to pilot operation. But in this approach the entire
system is provided to some users instead a part of system to all users.
In phase operation the risk of errors or failures is limited to the implemented
module only and also phased operation is less expensive than the full parallel
operation. But in some cases, phased operation can cost more than a pilot approach
where the system involves a large number of separate phases.
93
-
8/12/2019 Block Office Project
94/101
Health centre involves various phases such as registration, measuring weight,
treatment, vaccination, diagnosis and more. Because of the involvement of so
many phases it would be difficult and costly to apply phased operation approach.
RecommendationFrom the above discussion about all four possible approaches, it is very clear
that data cutover and parallel operation approach alone is not suitable for the CHIS
because of drawbacks like high risk or high cost but the combination of both
approaches namely pilot operation and phased operation approaches is more
fruitful.
Still phased operation is not most suitable approach as we know there are
lot of phases involve in our information system and also lack of fund is there. So
conclusion is pilot operation is the most recommended approach for the CHIS
because this method is cheaper and safer method. Any one of the health centre
can implement the new system and after the system proves successful, it will be
used by other health centres by using direct cutover. In this way it will beimplemented under budget and also there will be low risk of system failure.
94
-
8/12/2019 Block Office Project
95/101
Bibliography
1.
www.w3schools.com2. http://msdn.microsoft.com/en-
us/library/system.web.httpcontext.session.aspx
3. www.dotnetspider.com4. http://www.edrawsoft.com/Flowchart-tutorial.php5. http://www.codeproject.com/KB/database/DatabaseAcessWithAdoNet1.asp
x
6. http://quickstarts.asp.net/QuickStartv20/aspnet/doc/pages/pages.aspx7. http://www.bigresource.com/MS_SQL-data-binding-d4UHaJPz.html8. http://www.sql-server-performance.com9. http://www.mis-drishtee.in
95
http://www.w3schools.com/http://www.asp.com/http://www.asp.com/http://www.asp.com/http://www.asp.com/http://www.dotnetspider.com/http://www.csharpcorner.com/http://www.microsoft.com/http://www.microsoft.com/http://www.microsoft.com/http://www.microsoft.com/http://quickstarts.asp.net/QuickStartv20/aspnet/doc/pages/pages.aspxhttp://www.bigresource.com/MS_SQL-data-binding-d4UHaJPz.htmlhttp://www.sql-server-performance.com/http://www.sql-server-performance.com/http://www.bigresource.com/MS_SQL-data-binding-d4UHaJPz.htmlhttp://quickstarts.asp.net/QuickStartv20/aspnet/doc/pages/pages.aspxhttp://www.microsoft.com/http://www.microsoft.com/http://www.csharpcorner.com/http://www.dotnetspider.com/http://www.asp.com/http://www.asp.com/http://www.w3schools.com/ -
8/12/2019 Block Office Project
96/101
List of Abbreviations
Abbreviation Description
GUI Graphical User Interface
OS Operating System
DBMS Database Management System
GB Giga Bytes
DFD Data Flow Diagram
ER Entity Relationship
96
-
8/12/2019 Block Office Project
97/101
Index
1. Introduction..............1
2. Problem Definition.......2
3. System Analysis &Feasibility Study............3
4. Scope of a proposed System.............................6
5. System Requirements........7
o Hardware Requirementso Software Requirements
Front End
Back End
6. System Logical Design..................8
o Data flow diagram12o Data Dictionary16
7. System Physical Design26
8. Input / Output Screen42
9. Testing ..61
10.Implementation..71
11. Limitations & Future Scope .80
12. Bibliography..95
http://mrdavims.org/filesserve.php?file=n4beceec2b80cb#page=1 -
8/12/2019 Block Office Project
98/101
List of Tables
Table Page no.
1. Add Department Master 53
2. Letter Receive Table 54
3. Letter Send Table 55
4.Letter Status Table 56
5.Add RashanCard ShopOwner Master 576.Rashan Card Applied Candiadate 58
7.Rashan Card Candidate Family 59
8.Rashan Card Status Table 60
-
8/12/2019 Block Office Project
99/101
List of Figures
Figure name Page no.
1.Add Department Master Form 42
2.Letter Receive Form 43
3.Letter Send Form 45
4.Receive letter Transaction 46
5.Receive letter Report 47
6.Send letter Report 48
7.Add Rashan Card Shopowner Form 49
8.Rashan Card Candidate Form 50
9.Rashan Card Applied Candidate Report 51
10.Rashan Card Candidate family Report 52
-
8/12/2019 Block Office Project
100/101
A Project ReportOn
Integrated Block Of Management Sysytem
Submitted in Partial Fulfillment of the Requirement for
the Degree of Master of Computer Applications
Gautam Buddh Technical University, Lucknow
Project Guide: Submitted By:
Mr. Mahadev SACHIN VERMA
Associate Professor Roll no.1001514038
JUNE, 2013
Invertis Institute of Management Studies, Bareilly Lucknow Highway,
NH-24, Bareilly
-
8/12/2019 Block Office Project
101/101