INVENTORY MANAGEMENT SYSTEM

Master of Computer Applications

PROJECT REPORT

ON

“INVENTORY MANAGEMENT SYSTEM”
SUBMITTED IN PARTIAL FULFILLMENT OF THE REQUIREMENT FOR THE AWARD OF THE DEGREE OF

MASTER OF COMPUTER APPLICATIONS

SUBMITTED BY

YATENDRA SOLANKI (UNIVERSITY ROLL NO: 0909414117)

DEPARTMENT OF COMPUTER SCIENCE GALGOTIAS INSTITUTE OF MANAGEMENT AND TECHNOLOGY 1, KNOWLEDGE PARK 2 GREATER NOIDA (U.P) – 201 306 MAY,2012

Galgotias Institute Of Management & Technology, Gr. Noida | Project Report

1

INVENTORY MANAGEMENT SYSTEM

Master of Computer Applications

CANDIDATE'S DECLARATION
I, hereby certify that the work which is being presented in the project entitled ―INVENTORY MANAGEMENT SYSTEM‖ is carried out at ―Drishtee Development & Communication LTD‖ in partial fulfillment of the requirement for the award of degree of MASTER OF COMPUTER APPLICATION submitted in the Department of Computer Science at GALGOTIAS INSTITUTE OF MANAGEMENT AND TECHNOLOGY, GREATER NOIDA under GAUTAM BUDDH TECHNICAL UNIVERSITY, LUCKNOW is an authentic record of my own work carried out during a period from January to May,2012 under the guidance of ―Mr. SUSHIL PANDEY‖.

Name: YATENDRA SOLANKI University Roll No: 0909414117
This is to certify that the above statement made by the candidate is correct to the best of my knowledge.

Industrial coordinator:

H.O.D (Computer Science)

Galgotias Institute Of Management & Technology, Gr. Noida | Project Report

2

INVENTORY MANAGEMENT SYSTEM

Master of Computer Applications

CONTENTS

ABOUT THE ORGANIZATION

1. INTRODUCTION 1.1 1.1.1 1.1.2 1.2 Abstract Of Project Title Of The Project Objective Problem Specification

2. Feasibility Study 3. Software Requirement Specification 3.1 Introduction 3.2 Selection Of Technology/Specific Requirement 4 Design 4.1 ER Diagram 4.2 Data Flow Diagram 4.3 Modules 4.4 Database 4.5 Input-Output Form 5. Implementation 6. Testing & Result 7. Enhancement 8. Limitation 9. Conclusion 10. Bibliography 11. Snap Shots & Description

Galgotias Institute Of Management & Technology, Gr. Noida | Project Report

3

Mr. I would definitely like to pay my thanks for his constant interest and support for this venture. there may still someone hiding the veils of unknown. Gr. Gaurav Choudhary and Mr. Utkarsh Choudhary for helping me in completing my project. I acknowledge the role of my Project Head. whom I may not be able to recognize. Sushil Panday. support and help of the teachers that I was able to overcome my initial hiccups during my early days in the institute. My profound thanks to Ms Blassy. YATENDRA SOLANKI Galgotias Institute Of Management & Technology. Mr. I would like to express my deep sense of gratitude to Drishtee Development and Communication Ltd. Sushil Panday who guided me frequently during my training period. Noida | Project Report 4 . Mr. Noida for extending me the opportunity for the project training and improving all the necessary resources and expertise for this purpose.C. It was only because of care. Head of MCA Department. Although I have tried to express my gratitude to every person who contributed to my project.INVENTORY MANAGEMENT SYSTEM Master of Computer Applications ACKNOWLEDGEMENT I convey my gratitude to all those who helped me reach a stage where I have immense confidence to launch my career in the competitive world of Information & Technology.Mr. Deependra Singh Solanky. Galgotias College. I am very grateful to Mr. who has been a source of perpetual inspiration to me and for gently guiding and paving my way towards a bright career. throughout my M. . He was always willing to give all kind of support and encouragement. Greater Noida. I would like to say thanks to all of them who helped me throughout my training.A Course.

who owns the village node to operate a self-sustaining. Gr. The kiosk provides access to information like government records. With a vision to reach out to every village in the country and beyond. commodity product rates in different markets. business and health services. The entrepreneur earns by charging the community a nominal fee for the services provided. Information and Communication Technologies (ICTs) can play a significant role in making information and services available at a reasonable cost. Noida | Project Report 5 . and health insurance. Drishtee has set for itself an ambitious target of reaching out to 10. Drishtee is geared up to become a rural supply chain for last mile deliveries. agricultural data. The Social Return on Investment Analysis shows that for every US$1 of social cost incurred. compensations. In this context. Drishtee has successfully demonstrated this concept across various geographic regions. Through a tiered franchise and partnership model. Galgotias Institute Of Management & Technology. government.000 Villages in the next 2 years. majority of which have an aggregated income of less than $ 2 a day. certificates. help in filing of applications for licenses. US$20 of social benefit is generated. Drishtee facilitates the establishment of ICT nodes enabling access to information as well as local services to the rural community at nominal value. villagers live without easy access to trade. This makes them easy prey for intermediaries who control the supply chain of products and services and can demand high payments to allow villagers access to it. education like computer courses. Each Kiosk caters to approximately 1200 households. there is a high opportunity cost for availing these services as any transaction involves long travel and loss of daily wage. and benefits. The business model is driven by the village entrepreneur.INVENTORY MANAGEMENT SYSTEM Master of Computer Applications In rural India. In addition to this. profitable kiosk. Over a longer a period. and Spoken English Programs. Drishtee has a fixed sharing with the Kiosk operator and a variable revenue sharing with the service providers.

INVENTORY MANAGEMENT SYSTEM Master of Computer Applications Galgotias Institute Of Management & Technology. Noida | Project Report 6 . Gr.

To overcome this problem INVENTORY MANAGEMENT SYSTEM software isrequired. Noida | Project Report 7 . Gr. The annual cost of each product is obtained to determine the best deal for the invoices received for the product.INVENTORY MANAGEMENT SYSTEM Master of Computer Applications Abstract of Project In times of economic slow -down. The Project INVENTORY MANAGEMENT SYSTEM is for maintaining the IT Assets of Drishtee. Galgotias Institute Of Management & Technology. There is a need to track the performance of each product in terms of demand to determine how much to order and when to order. This will help the decision makers to initiate accurate re-order and make forecast and demand of the product at any point of time. Till now the assets of company maintained manually. This project implemented a inventory management system and tracks the performance of each product using a web application. cutting costs is the major strategy used by the companies. this is very much time consuming and have lots of errors. The parameters that are required to answer these questions are economic order quantity (EOQ) and the re-order point.

Gr. Noida | Project Report 8 . This project implemented a inventory management system and tracks the performance of each product using a web application.INVENTORY MANAGEMENT SYSTEM Master of Computer Applications Title of the Project The Project INVENTORY MANAGEMENT SYSTEM is for maintaining the IT Assets of Drishtee. Galgotias Institute Of Management & Technology. To overcome this problem INVENTORY MANAGEMENT SYSTEM software isrequired. This will help the decision makers to initiate accurate re-order and make forecast and demand of the product at any point of time. Till now the assets of company maintained manually. this is very much time consuming and have lots of errors.

Galgotias Institute Of Management & Technology. coordinate internal activities. effectively utilize people and equipment. they provide the information to managers who make more accurate and timely decisions to manage their operations. global sourcing of materials and new manufacturing technology means many companies need to change their Inventory Management approach and change the process for Inventory Control. and communicate with customers. effectively utilize people and equipment. they provide the information to Managers who make more accurate and timely decisions to manage their operations. coordinate internal activities and communicate with customers . Inventory Management does not make decisions or manage operations.INVENTORY MANAGEMENT SYSTEM Master of Computer Applications Objectives  Inventory Management system provides information to efficiently manage the flow of materials. Inventory Management and the activities of Inventory Control do not make decisions or manage operations. The many changes in the market demand . Gr. new opportunities due to worldwide marketing .  Inventory Management must be designed to meet the dictates of market place and support the company‘s Strategic Plan . Noida | Project Report 9 .  The Inventory Management system and the Inventory Control Process provides information to efficiently manage the flow of materials.

Galgotias Institute Of Management & Technology. comprehensiveness on people with average  Cost: It is desirable to aim for the system with a minimum cost that it must satisfy the entire requirement. fallback procedures and physical security of data.  Security: This is very important aspect requiring rigorous designing of database including hardware reliability. It should also be portable to different computer systems.  Efficiency: There should be balance amongst various factors like accuracy. one hand and response timeliness of the system on the other hand.  Flexibility: The system should be modifiable depending on the changing needs of the user.INVENTORY MANAGEMENT SYSTEM Master of Computer Applications  Practicality: The system should be stable and can be operated by the intelligence. Such subject to the condition modifications should entail extensive reconstructing or recreation of software. Gr. Noida | Project Report 10 .

Gr.The Project INVENTORY MANAGEMENT SYSTEM is for maintaining the IT Assets of Drishtee. To overcome this problem INVENTORY MANAGEMENT SYSTEM software is required. Galgotias Institute Of Management & Technology. Noida | Project Report 11 . this is very much time consuming and have lots of errors.INVENTORY MANAGEMENT SYSTEM Master of Computer Applications DESCRIPTION OF SOFTWARE DEVELOPMENT LIFE CYCLE Problem Specification The first step of Inventory Management System is identifying the problem. Till now the assets of company maintained manually on exel.

Gr. Noida | Project Report 12 .INVENTORY MANAGEMENT SYSTEM Master of Computer Applications Galgotias Institute Of Management & Technology.

INVENTORY MANAGEMENT SYSTEM Master of Computer Applications Feasibility Study A feasibility study is a formal study used to decide what type of system can be developed which meets the needs of the organization. Testing The primary purpose of this phase is to determine whether the software developed and unit tested in Phases 3 and 4 is ready for implementation. who will define the work plan. Designing in a proper sequenced way to facilitate cross-checking. Gr. The objectives of the new system:   To ease data management and storage of information. Systems Investigation Techniques used in gathering information to investigate the present system include:  Observation and inspection of records Systems Analysis Systems analysis is a detailed look at a current system and what a new system will be required to do. Each testing stage will have a unique testing team. Galgotias Institute Of Management & Technology. To reduce the number of errors creeping with the current system. approach. Noida | Project Report 13 . scope and entry and exit criteria for each stage. Each testing stage should be completed Maintenance Phase Any change to any component of the product (including documentation) after it has passed the acceptance test.

Noida | Project Report 14 .INVENTORY MANAGEMENT SYSTEM Master of Computer Applications Galgotias Institute Of Management & Technology. Gr.

Gr.INVENTORY MANAGEMENT SYSTEM Master of Computer Applications General Architecture Of Inventory Management System Galgotias Institute Of Management & Technology. Noida | Project Report 15 .

ability to meet user needs. followed by coverage of the objective and procedures of the candidate system. It also includes output reports. Recommendations and conclusions Galgotias Institute Of Management & Technology. and effective use of resources. Gr. Details of findings An outline of the methods & procedures undertaken by the existing system. Statement of the problem A carefully worded statement of the problem that led to analysis. Conclusions are stated. 4. 3. What resources are available for given candidate systems? Is the problem worth solving? 3. costs and benefits are estimated with greater accuracy at this stage. followed by a list of the recommendation justification for them. 2. Consequently. Noida | Project Report 16 . file structures& cost and benefits of candidate system. The result of the feasibility is a formal proposal. It consists of the following: 1.INVENTORY MANAGEMENT SYSTEM Master of Computer Applications FEASIBILITY STUDY Feasibility study is a test of a system proposal according to its workability. the problem definition is crystallized and aspects of the problem to be included in the system are determined. What are the likely impacts of the candidate system on the organization? How well does it fit within the organization‘s? The objective of a feasibility study is not to solve the problem but to acquire a sense of its scope. It focuses on 3 major questions: 1. During the study. Summary of findings& recommendations It is ideal for user who requires quick access to the results of the analysis of the system under study. impact on the organization. What are the user‘s demonstrable needs &how does a candidate system meet them? 2.

then the project is judged not feasible. project schedule. the procedure is to determine the benefits and savings that are expected from a candidate system and compare them with costs. It is common knowledge that computer installations have something to do with turnover. An estimate should be made of how strong a reaction the user stay is likely to have toward the development of a computerized system.INVENTORY MANAGEMENT SYSTEM Master of Computer Applications Specific Recommendations regarding the candidate system. it is understandable that the introduction of a candidate system requires special effort to educate. More commonly known as cost/benefit analysis. Galgotias Institute Of Management & Technology. Technical feasibility :It centers around the existing computer system and to what extent it can support the roposed addition. Technical feasibility 3. Behavioral feasibility:People are inherently resistant to change & computers have been known to facilitate change. costs. FEASIBILITY CONSIDERATION Three key considerations are involved in the feasibility analysis: 1. Noida | Project Report 17 . transfers & changes in employee job status. If the budget is a serious constraint. and target dates. Gr. including personnel assignments. Behavioral feasibility Economicalfeasibility :It is used for evaluating the effectiveness of a candidate system. Economical feasibility 2. sell & train the staff on new ways of conducting business. Therefore.

if the pieces just won‘t fit together smoothly. increased patient satisfaction pre analyzed sales data).e. What new materials. methods. 1. while at the same time collecting additional information about performance. In addition many benefits derived from computer-based systems are intangible (e. algorithm. Cost – benefit analysis delineates costs for project development and weighs them against tangible (i. Galgotias Institute Of Management & Technology.g. if models indicates that desired function cannot be achieved.INVENTORY MANAGEMENT SYSTEM ECONOMICAL ANALYSIS Master of Computer Applications Among the most important information contained in a feasible study in cost benefit analysis and assessment of the economic justification for a computer based system project. Gr. Noida | Project Report 18 . Cost –benefit analysis is complicated by criteria that vary with the characteristics of system to be developed the relative size of the project & the expected returns on investment desired as part of company‘s strategic plan. How will these technology issues affect cost? The result obtained from technical analysis from basis for another go/no-go decision on the test system If technical risk severe. analyst evaluates the technical merits of system concept. maintainability and predictability. The project that has to be completed must have minimum data entry and consistency of record. Costs associated with development of a computer-based system are: TECHNICAL ANALYSIS During technical analysis. or processes are required and what is their development risk? 3. What technologies are required to accomplish system function and performance? 2. Direct quantitative comparisons may be difficult to achieve.it‘s back to the drawing board! data and information generated were firstly retrieved. measurable directly in dollars) & intangible benefits of a system. reliability. better design quality through interactive optimization. Technical analysis begins with an assessment of the technical viability of the proposed system.

During this process of analysis. One of the major problems during analysis is how to organize the information obtained so the information can be effectively evaluated for completeness and consistency. Noida | Project Report 19 . advances in logical and physical access methods. a massive amount of information is collected in forms of answers to questions. Analysis involves interviewing the clients and end users. Widespread and easy access to data from computer‘s. matched by step increased in the density and volumes of disk storage devices. Galgotias Institute Of Management & Technology. led gradually to a reassessment of the role of data management decision making. Gr.INVENTORY MANAGEMENT SYSTEM PROBLEM ANALYSIS Master of Computer Applications The application of computers speeds up data processing activities and adds some flexibility to the management of data and the information generated from it. Here the recognition of need is done.

INVENTORY MANAGEMENT SYSTEM Master of Computer Applications Galgotias Institute Of Management & Technology. Gr. Noida | Project Report 20 .

To overcome this problem INVENTORY MANAGEMENT SYSTEM software is required. The Project INVENTORY MANAGEMENT SYSTEM is for maintaining the IT Assets of Drishtee.INVENTORY MANAGEMENT SYSTEM Master of Computer Applications SYSTEM REQUIREMENT SPECIFICATION Requirement specification document:1. Abstract:This is the requirements specification document There is a need to track the performance of each product in terms of demand to determine how much to order and when to order. Abstract 2. Noida | Project Report 21 . 2. Gr. Galgotias Institute Of Management & Technology. Till now the assets of company maintained manually on exel. Purpose 3. The annual cost of each product is obtained to determine the best deal for the invoices received for the product.this is very much time consuming and have lots of errors. Scope 1. Purpose:The Project INVENTORY MANAGEMENT SYSTEM is for maintaining the IT Assets of Drishtee. The parameters that are required to answer these questions are economic order quantity (EOQ) and the re-order point.

 Compilers. client/server applications. the client part of the program is often called the front end and the server part is called the back end.. Scope:The software will be ONLINE. Noida | Project Report 22 . whereas the back end performs the actual translation into object code.A DESCRIPTION   For software In applications. Developer’s responsibility over view The developer is responsible for: (a) Developing the system. are often composed of two parts: a front end and a back end. web based software to manage the IT assets of Drishtee. front end is the same as user interface. The front end is responsible for checking syntax and detecting errors. the programs that translate source code into object code. Gr.INVENTORY MANAGEMENT SYSTEM Master of Computer Applications 3. (f) Monitoring system for period of one year. (e) Designing course and assignments. FRONT END . (d) For conducting any user training that might be needed for using system. Galgotias Institute Of Management & Technology. The proposed software will run from an Internet browser and Internet connectivity is compulsory for the functioning of this software. (b) Performing test cases (c) Installing the software on client‘s hardware.

NET term for classes.INVENTORY MANAGEMENT SYSTEM Master of Computer Applications WHY FRONT END . the . 2: ASP. it‘s impossible to execute C# or Visual Basic code without it being compiled first.NET Is integrated with the . Different namespaces provide different features. hierarchical container called a namespace.NET? 1: ASP.NET Framework is divided into an almost painstaking collection of functional parts.NET Framework is grouped into a logical.ASP. interfaces. line by line. and other core programming ingredients).NET.NET and executes inside the managed environment of the CLR.) In a sense. a scripting host on the web server needs to interpret the script code and translate it to lower-level machine code. Taken together. structures.NET Is Multilanguage IL is a stepping stone for every managed application. (A managedapplicationis any application that‘s written for .000 types(the . Gr. This massive toolkit is called the class library. Each one of the thousands of classes in the .NET applications are always compiled—in fact. The massive collection of functionality that the . with a staggering total of more than 10. Not Interpreted One of the major reasons for performance degradation in classic ASP pages is its use of interpreted script code. 3: ASP. Galgotias Institute Of Management & Technology.NET Framework provides is organized in a way that traditional Windows programmers will see as a happy improvement. Noida | Project Report 23 . IL is thelanguage of .NET namespaces offer functionality for nearly every aspect of distributed development from message queuing to security. Every time an ASP page is executed. and it‘s the only language that the CLR recognizes. ASP.NET Is Compiled.NET Framework The .

Its benefits are :- A: Automatic memory management and garbage collection: Every time your application instantiates a reference-type object. and so on. This model saves you from the low-level complexities of C++ memory handling and from the quirkiness of COM reference counting. this metadata might tell a debugger how to trace your code.NET engine is that it runs inside the runtime environment of the CLR. automatically reclaiming unused memory for inaccessible objects.NET Is Hosted by the Common Language Runtime The most important aspect of the ASP. their members. C: Extensible metadata: The information about classes and members is only one of the types of metadata that .NET adds information to your assembly that indicates details such as the available classes.INVENTORY MANAGEMENT SYSTEM Master of Computer Applications 4: ASP. Noida | Project Report 24 . other applications can use them without requiring additional support files. However. . their data types. or it might tell Visual Studio how to display a custom Galgotias Institute Of Management & Technology. For example.NET stores in a compiled assembly. The garbage collector runs periodically inside the CLR. Gr. This extra layer of safety completely obliterates whole categories of low-level errors. Metadatadescribes your code and allows you to provide additional information to the runtime or other services. B: Type safety: When you compile an application. the CLR allocates space on the managed heapfor that object. and the compiler can verify that every call is valid at runtime. As a result. you never need to clear this memory manually.

we can call methods. such as transactions or object pooling. HTML 4. or communicate with web services asynchronously. Different browsers. You could also use metadata to enable other runtime services. which allows you to organize your errorhandling code logically and concisely. 5: ASP. NET languages offer structured exception handling. compiled component. You can create separate blocks to deal with different types of errors. but you can also exploit all the conventions of an OOP (objectoriented programming) environment.0 or even WML (Wireless Markup Language) for mobile devices.0. For example. extend existing classes with inheritance. you can create reusable classes. standardize code with interfaces. versions. and configurations differ in their support of HTML. fueled by the various browser companies.NET Framework. ASP.2.NET Is Multiservice and Multibrowser: One of the greatest challenges web developers face is the wide variety of browsers they need to support. For example. 6 : ASP. or something else entirely—such as XHTML 1. E: Multithreading: The CLR provides a pool of threads that various classes can use. You can also nest exception handlers multiple layers deep. It provides a small set of objects. On the other hand. read files. without needing to explicitly create new threads. D: Structured error handling: . and bundle useful functionality in a distributable. has plagued developers since the World Wide Web Consortium (W3C) proposed Galgotias Institute Of Management & Technology. This problem.NET Is Object-Oriented: ASP provides a relatively feeble object model. Not only does your code have full access to all objects in the . Gr.INVENTORY MANAGEMENT SYSTEM Master of Computer Applications control at design time. Noida | Project Report 25 .NET is truly object-oriented. these objects are really just a thin layer over the raw details of HTTP and HTML. Web developers need to choose whether they should render their content according to HTML 3.

Distributing the components your application uses is just as easy.NET application is relatively simple. Configuration is another challenge with application deployment. most ASP. particularly if you need to transfer security information such as user accounts and user privileges. there‘s no need to launch a registration program or modify the Windows registry. deploying an ASP.NET settings are stored in a dedicated web. Instead. The web. As a result.INVENTORY MANAGEMENT SYSTEM Master of Computer Applications the first version of HTML. 7 : ASP.config file is placed in the same directory as your web pages. Noida | Project Report 26 . Galgotias Institute Of Management & Technology. Life gets even more complicated if you want to use an HTML extension such as JavaScript to create a more dynamic page or provide validation. Gr.NET Framework provides the same core classes.NET makes this deployment process easier by minimizing the dependence on settings in IIS (Internet Information Services). It contains a hierarchical grouping of application settings stored in an easily readable XML format that you can edit using nothing more than a text editor such as Notepad. ASP.NET Is Easy to Deploy and Configure : Every installation of the . Because all the information about your component is stored directly in the assembly file metadata.config file. All you need to do is copy the component assemblies along with your website files when you deploy your web application.

INVENTORY MANAGEMENT SYSTEM

Master of Computer Applications

.NET Framework in context

Galgotias Institute Of Management & Technology, Gr. Noida | Project Report

27

INVENTORY MANAGEMENT SYSTEM

Master of Computer Applications

Galgotias Institute Of Management & Technology, Gr. Noida | Project Report

28

INVENTORY MANAGEMENT SYSTEM

Master of Computer Applications

BACK END – A DESCRIPTION

The back-end comprises the components that process the output from the front-end.Back-

end is hidden from the user.

A back-end database is a

database

that is accessed by users indirectly through an

external

application rather than by application programming stored within the database

itself or by low level manipulation of the data (e.g. through SQL commands).

A back-end database stores data but does not include

end-user application elements

such as stored queries, forms, macros or reports.

SQL SERVER:SQL Server is an SQL-compliant RDBMS. SQL-compliant means it use the ANSI (American National Standard Institute) version of Structured Query Language or ‗SQL‘. Structured Query Language is a command that allow us to modify or retrieve information from the database. Client server means that SQL Server is designed to store data in the central location (the server) and deliver it on demand to numerous other locations (the client). SQL Server is also a Relational Database Management System (RDBMS).

Galgotias Institute Of Management & Technology, Gr. Noida | Project Report

29

Net (version 3.5)  . Noida | Project Report 30 . Gr.5 Operating System : Windows 7 Professional. Language : ASP.NET 3.5) SQL Server 2008 Galgotias Institute Of Management & Technology.INVENTORY MANAGEMENT SYSTEM Master of Computer Applications SOFTWARE AND HARDWARE REQUIREMENT Processing Environment :    PLATFORM : .NET using C# Back End : SQL Server 2000 R2 Hardware Requirements :    Pentium Dual-Core Processors 1GB of RAM 160GB of Hard Disk Server/Client Machine Software Requirements : Visual Studio.Net Framework (version 3.

Gr.INVENTORY MANAGEMENT SYSTEM Master of Computer Applications Galgotias Institute Of Management & Technology. Noida | Project Report 31 .

The files have been created and indexes have been created on the tables in which number of records is very large. To make the system completely menu driven & user friendly. The existing system contains all information in manual files. Designing the system has reduced all the time consuming efforts. Noida | Project Report in 32 . Gr. To reduce errors inherently manually making the output inconsistent & incorrect. 6 To provide the facility to modify any record whenever required. As a result it may take more processing time. Design objective:Goals in mind while designing the system: 1 2 3 4 To reduce the manual work required to be done. programs will occupy extra memory. 5 To improve the management of permanent information of the company by keeping it properly structured tables. As a result. which requires a mindful and sensible planning.INVENTORY MANAGEMENT SYSTEM Master of Computer Applications SYSTEM DESIGN System layout is the first step of the software development.programmer can use the system effectively and system could act catalyst in achieving objectives. design of reports. Chances of errors are minimized and if done then corrected. containing the design of database. It is to be done carefully because if this phase contains any error then that is going to effect the performance of the system. the system search for a value has been direct and fast in comparison to the sequential searching. the concept of database must be known for the quality designing. design of forms. What is system design? As S/W is to be designed in Microsoft Visual Studio 2008 with Microsoft SqlServer 2005. Galgotias Institute Of Management & Technology. manual work and handling of history cards. To design the system so that even non.e. response time and extra coding i. The aim of S/W designing is to achieve the desired goal by planning how various parts are to be coded properly.

Gr. checked and can be solicited.  Fast path table mapping: Table was created for the system using fast path table mapping. Noida | Project Report 33 . Normalization The entities were normalized first. Galgotias Institute Of Management & Technology. Identification of relationship: The relationship between the entities. The system design is carried in two phases:   The architectural design (high level design) The detail design (low level design) LOW LEVEL DESIGN The low level design maps the business system described in the program specification data structure. The name of entity is taken as the table name. columns and key cons traits definition screen to make amendments. given the technical environment and previous decision on the required level of automation. The database design can be refined according to your application to your regarding using the tables. involving:      Identification of entities: All the entities related to the module were identified. This has provision to map the entities and attributes into the tables. within and outside the system was identified.INVENTORY MANAGEMENT SYSTEM Master of Computer Applications DESIGN OVERVIEW The design stage takes the final specification of the system from analysis stages and finds the best way of fulfilling them. requirement‘s HIGH LEVEL DESIGN The high-level design maps the logical model of the physical databases design.  Default database design: This utility creates columns and cons traits definition from the entity modeland the table entity mapping entered in the case of dictionary.

INVENTORY MANAGEMENT SYSTEM Master of Computer Applications The steps involved were: Generation of table script. Gr. reports and printer.  Program specification: The program specifications are written for the transaction.  Generate the program: The program was generated based on the relationship specified and according to the preferences. The logic for each field. Check the constraint. Field validation and friendly messages were written as a part of program specification Galgotias Institute Of Management & Technology. modification. Keys. block and form were written so that anyone who does not know system will be able to code logic. queries. Noida | Project Report 34 .

Gr. Noida | Project Report 35 .INVENTORY MANAGEMENT SYSTEM Master of Computer Applications Galgotias Institute Of Management & Technology.

Product Brand 2. Product 4. Product Category 3. Noida | Project Report 36 . Product Transaction List Galgotias Institute Of Management & Technology. A table is two-dimensional grids with rows and columns. The tables are the basic building materials of data.INVENTORY MANAGEMENT SYSTEM Master of Computer Applications DATA BASE DESIGN: One of the most important factors is building a well executing application and the design of the database tables. The packages is made keeping in mind that job mustn‘t be time consuming and less manpower and efforts are required so that the user is satisfied. Product Transaction 5. Table design:The tables of the project designed on the behalf of following pages :- 1. The tables have been so created that duplicity of the items and optimizing the database prevents redundancy. Gr. good understanding of the normalization concept is needed. The column indicates fields of the table while rows indicate records of the table. For a good databases design.

Gr. Noida | Project Report 37 .INVENTORY MANAGEMENT SYSTEM Master of Computer Applications TABLE FOR PRODUCT BRAND PAGE The Application Page table is used to contain all the details of Product Category that newly added :- Table design:- Field name Brand_code Datatype Varchar Size 6 Key Primary key Allow nulls ___ Brand_name Created_on Created_by Varchar Datetime Char 250 10 Checked Checked Checked Modified_on Modified_by Ip_address Datetime Char Varchar 10 15 Checked Checked Checked Galgotias Institute Of Management & Technology.

Noida | Project Report 38 .INVENTORY MANAGEMENT SYSTEM Master of Computer Applications TABLE FOR PRODUCT CATEGORY PAGE The Application Page table is used to contain all the details of Product Category that newly added :- Table design:- Field name Category_code Datatype Int Size - Key Primary key Allow nulls ___ Category_sub_code Category_name Category_parent_code Varchar Varchar Int 6 250 - Checked Checked Checked Created_on Created_by Modified_on Modified_by Ip_address Datetime Char Datetime Char Varchar 10 50 10 15 Checked Checked Checked Checked Checked Galgotias Institute Of Management & Technology. Gr.

Noida | Project Report 39 .INVENTORY MANAGEMENT SYSTEM Master of Computer Applications TABLE FOR PRODUCT PAGE The Product table is used to contain all the details of Product that has been existed :- Table design:- Field name Datatype Size Key Allow nulls Category_code Int - Primary key ---- Brand_code Varchar 6 Checked Product_fixed_ asset_no Product_id Int ---- Int - Product_name Varchar 250 ---- Product_detail Varchar 1000 ---- Serial_no Varchar 100 Checked Purchase_date Datetime - Checked Search_option1 Varchar 100 Checked Galgotias Institute Of Management & Technology. Gr.

Gr. Noida | Project Report 40 .INVENTORY MANAGEMENT SYSTEM Search_option2 Varchar 100 Master of Computer Applications Checked Office_id Int - ---- Current_status Char 1 Checked Current_status_on Datetime Checked Created_by Char 10 ---- Created_on Datetime - ---- Modified_on Datetime - Checked Modified_by Char 10 Checked Ip_address Varchar 15 Checked Galgotias Institute Of Management & Technology.

INVENTORY MANAGEMENT SYSTEM Master of Computer Applications TABLE FOR TRANSACTION PAGE The table is used to contain all the details of Transactions :- Table design:Field name Serial_no Product_id Transaction_type _ code Transaction_date Remarks Datetime Varchar 1000 ------- Datatype Int Int Int Size - Key Primary key Allow nulls ---------- Office_id Int - ---- Holder_emp_cod e Transaction_ history_no Int Char 10 ---- - ---- Galgotias Institute Of Management & Technology. Gr. Noida | Project Report 41 .

INVENTORY MANAGEMENT SYSTEM Created_on Datetime - Master of Computer Applications ---- Created_by Char 10 ---- Ip_address Varchar 15 Checked Galgotias Institute Of Management & Technology. Noida | Project Report 42 . Gr.

INVENTORY MANAGEMENT SYSTEM Master of Computer Applications TABLE FOR TRANSACTION LIST PAGE The table is used to contain all the details of Transactions List :- Field name Datatype Int Size - Key Primary key Allow nulls ---- Transaction_type_ code Transaction_type_ name Varchar 250 ---- Active_status Created_on Created_by Char Datetime Char 1 10 ---------- Ip_address Varchar 15 Checked Holder_emp_code Char 10 ---- Transaction_ history_no Int - ---- Galgotias Institute Of Management & Technology. Noida | Project Report 43 . Gr.

Gr.INVENTORY MANAGEMENT SYSTEM Master of Computer Applications Galgotias Institute Of Management & Technology. Noida | Project Report 44 .

e. identification & description of function. Gr. interact with system but are outside its boundary. External Entities 4. External Entities:External sources or destination of data. It can be symbolized by a circle. Noida | Project Report 45 . Data Flow Processes:A process transforms incoming data flows into outgoing data flow. Data stores Data flows:Data flow is. It is used to describe and analyze the movement of data through system. Data flow elements: A data flow diagram is composed of 4 elements:1. Galgotias Institute Of Management & Technology. Processes 3. They focus on the data flowing into system. with an arrowhead showing the direction of flow. organization or outer entities. Data flows 2. A solid square defines a source or sink of data. which may be people.INVENTORY MANAGEMENT SYSTEM Master of Computer Applications DATA FLOW DIAGRAM External entities Data flow diagrams are a graphic tool . Data stores:An open-ended rectangle is a data store data at rest or temporary storage of data.It is a model of system. The area of the circle is divided into two parts i. Between process and Out of data stores .a DFD also knew as a ―bubble chart‖.

INVENTORY MANAGEMENT SYSTEM Master of Computer Applications Developing data flow diagrams:1. Physical diagram 2. Gr.First Check the users authentication before Inventory Management system Login if login authentication is true then he/she will be Login for Inventory Management system Home else not Login for desired Login Users. DATA FLOW DIAGRAM There are following types of DFD's has been created: DFD( Data flow Diagram) for Login Page :Following Data Flow Diagram shows the user Login Authentication to protect unwanted users. Exploded diagram:To understand the system better we required to get a clear idea of the system in that case we draw a lower level of DFD i. The physical context diagram describes the payroll monitoring system at very top level. Noida | Project Report 46 . Galgotias Institute Of Management & Technology.e. Exploded diagram Physical diagram:The DFD showing the general that is the top layer of the system is called the ―context diagram‖. exploded.

Noida | Project Report 47 .INVENTORY MANAGEMENT SYSTEM Master of Computer Applications Data Flow Diagaram0 Level Galgotias Institute Of Management & Technology. Gr.

Gr. The DFD shows Login. Data Flow Diagaram1 Level Galgotias Institute Of Management & Technology. Transaction. Noida | Project Report 48 . Report and user output. Assets Master.INVENTORY MANAGEMENT SYSTEM Master of Computer Applications DFD( Data flow Diagram) for 1 level:After you login following Data Flow Diagram shows the user interaction with the login.

Product Category Master and then only move to the Product Master. The entry details save on Assets Master Database Data Flow Diagaram2Level Galgotias Institute Of Management & Technology.INVENTORY MANAGEMENT SYSTEM Master of Computer Applications DFD( Data flow Diagram) for 2 level:In 2 level DFD the user enter the Product Brand Master. Noida | Project Report 49 . Gr.

INVENTORY MANAGEMENT SYSTEM Master of Computer Applications DFD( Data flow Diagram) for 3 level:In 3 level DFD the user enter the Product Brand Master. The entry details save on Assets Master Database Data Flow Diagaram3Level Galgotias Institute Of Management & Technology. Product Category Master and directly on Product Master. Gr. Noida | Project Report 50 .

Gr. Noida | Project Report 51 .INVENTORY MANAGEMENT SYSTEM Master of Computer Applications DFD( Data flow Diagram) for 4 level:- Data Flow Diagaram3Level Galgotias Institute Of Management & Technology.

and rework loops. People may have differing ideas about how a process works. Once you break down the process steps and diagram them. One good flowchart can replace pages of words. problem areas become more visible. and the flow of the process is indicated with arrows connecting the symbols. redundant steps. Galgotias Institute Of Management & Technology.INVENTORY MANAGEMENT SYSTEM Master of Computer Applications FLOWCHARTS Flowcharts are maps or graphical representations of a process.  Identify problem areas and opportunities for process improvement . and sometimes as customers in relation to other people. Flowcharts promote understanding in a way that written procedures cannot do. It is easy to spot opportunities for simplifying and refining your process by analyzing decision points. and how they may sometimes act as suppliers. flowcharts can be very helpful in training employees to perform the process according to standardized procedures.  Depict customer-supplier relationship. Because of the way they visually lay out the sequence of steps in a process. Gr. Benefits of using flowcharts are that they:  Promote process understanding by explaining the steps pictorially. Steps in a process are shown with symbolic shapes. Noida | Project Report 52 .  Provide a tool for training employees. A flowchart can help you gain agreement about the sequence of steps. helping the process workers understand who their customers are.

Noida | Project Report 53 . Gr.INVENTORY MANAGEMENT SYSTEM Master of Computer Applications Galgotias Institute Of Management & Technology.

I got them acquainted with the various screens and the various terms and the various interrelationships between them. USER`S TRAINING In the Inventory Management System all the separate modules were put into a menu and after that this menu was attached with a master page.After a thorough testing of the different aspects of the system as described above are to be put to actual use by using live data by user staff after sufficient training for the use of the software has been provided to the all drishtee staff members of Territery Division Office.There are many implementation strategies. What is system implement:System Implementation is the process of having system personnel check out and put new software in to use. The first few days. Gr. install the new application and construct any files of data needed to use it. I was physically present with the staff of the training department and made them understand the new system. say in one department or with only one or two persons. Galgotias Institute Of Management & Technology. as they were unfamiliar with it. sometimes system developers may choose to pilot (test) the operation in only one area of the firm. Sometimes they run old and new system together to compare the results. Noida | Project Report 54 . The result indicated a considerable time saving with the candidate system and comes out with fast and efficient development. The result indicated a considerable time saving with the candidate system and comes out with fast and efficient development.INVENTORY MANAGEMENT SYSTEM Master of Computer Applications SYSTEM IMPLEMENTATION After a thorough testing of the different aspects of the system described above are to be put to actual use by use by using live data by user staff after sufficient training for the use of the software has been provided to the department members. train users.

Noida | Project Report 55 . Pointing device such as mouse Windows –XP/7 Minimum Software environment required: ● ● ● Platform used: Windows 7 Front end (GUI): Visual Studio .Net 2010 Back end (Data base): SQL Server 2008 R-2 Minimum Hardware required: ● ● ● ● ● ● ● ● Processor speed-133MHz Memory-2GB and more RAM-64MB Monitor Keyboard Floppy Drive Mouse CD-ROM. the following s/w and h/w specification are needed as: Operating environment: ● ● ● ● ● Pentium processor 20MB hard disk memory space. Galgotias Institute Of Management & Technology.INVENTORY MANAGEMENT SYSTEM Master of Computer Applications IMPLEMENTATION MECHANISMS To implement this software. 128-256MB RAM and more for fast and efficient execution. Gr.

Noida | Project Report 56 . Gr.INVENTORY MANAGEMENT SYSTEM Master of Computer Applications Galgotias Institute Of Management & Technology.

Galgotias Institute Of Management & Technology. or save it to a back-end database or a file on the web server. Once the web server receives the posted file data. ASP. In addition. Noida | Project Report 57 . it‘s up to your application to examine it. ignore it.INVENTORY MANAGEMENT SYSTEM Master of Computer Applications FILE UPLOAD CONTROL Making Use of the File Upload Control The FileUpload control lets users upload a file to your Web site. It displays a text box in which the user can enter a filename and path.NET includes two controls that allow website users to upload files to the web server. Gr. a Browse button displays a dialog box the user can access to browse to the file.

● The ASP.EventArgs e) {_ String path = @‖C:\temp\‖ + FileUpload1. Gr. Declaring the FileUpload control is easy. It doesn‘t expose any new properties or events that you can use through the control tag. Noida | Project Report 58 . This lets you put a size limit on uploads. The only real difference is that the FileUpload control takes care of automatically setting the encoding of the form to multipart/form data. Galgotias Institute Of Management & Technology. <asp:FileUpload ID="Uploader" runat="server" /> C# example :protected void btnUpload_Click(Object sender.FileName. FileUpload1. the HtmlInputFile control won‘t work. } Some few other quirks of the FileUpload control that are good to know: ● You can check the size of the uploaded file using the PostedFile. System.SaveAs(path). ContentLength property.INVENTORY MANAGEMENT SYSTEM Master of Computer Applications The controls that allow file uploading are HtmlInputFile (an HTML server control) and FileUpload (an ASP.PostedFile. Just don‘t call the SaveAs method if the file exceeds the maximum length.NET web control). it‘s up to you to make this change using the enctype attribute of the <form> tag—if you don‘t.NET user account must have access rights to the location to which you save the file. Both represent the <input type="file"> HTML tag. If you use the HtmlInputFile control.

INVENTORY MANAGEMENT SYSTEM Master of Computer Applications ● The SaveAs method isn‘t what copies the file from the user‘s computer to the server. Noida | Project Report 59 . The SaveAs method merely directs the FileUpload control to save the file that has been copied to the server. Gr. the file is copied to the server when the user posts the page by clicking the Upload button. If you don‘t call the SaveAs method. Instead. the uploaded file is discarded. Galgotias Institute Of Management & Technology.

Noida | Project Report 60 . Gr.INVENTORY MANAGEMENT SYSTEM Master of Computer Applications Galgotias Institute Of Management & Technology.

Master pages are an ASP. and navigation controls.INVENTORY MANAGEMENT SYSTEM Master of Computer Applications MASTER PAGE A Master Pageis simply a template — a page that provides elements that appear consistently on each page. The ContentPlaceHolder is a portion of the page where the content page can insert content. as well as contentplaceholdersthat specify where the variable content for each page should appear.NET feature that‘s designed specifically for standardizing web-page layout. footer. A page that actually holds the content that a Master Page displays in its content area is called acontent page. Gr. Noida | Project Report 61 . We can use a master page to ensure that every web page in your application has the same header. Master Page Basics Galgotias Institute Of Management & Technology.

The ability to bind a page to a page template declaratively (with no code) or to bind to a page dynamically at runtime. which isn‘t allowed in ordinary pages. the master page can include HTML. as shown here: <%@ Master Language="C#" AutoEventWireup="true" CodeFile="SiteTemplate. and code (either in an inline script block or in a separate file). give it a filename (such as SiteTemplate. Master pages meet all of these requirements. Creating a content pages Galgotias Institute Of Management & Technology. Pages that reuse this template are then constrained to adding or modifying content in the allowed regions. Add New Item from the menu. Select Master Page. and click Add. select Website. a number of requirements must be met: The ability to define a portion of a page separately and reuse it on multiple pages. The ability to allow some customization of the elements you reuse on each page. web controls. The ability to create a locked-in layout that defines editable regions.master). Like a web form. ● ● ● ● ● How to create a Master Page ? To create a master page in Visual Studio. a master page starts with a Master directive that specifies the same information. The ContentPlaceHolder is a portion of the page where the content page can insert content. Gr. flexible solution for page templating.cs" Inherits="SiteTemplate" %> Another difference between master pages and ordinary web forms is that master pages can use the ContentPlaceHolder control. Noida | Project Report 62 . One difference is that while web forms start with the Page directive.INVENTORY MANAGEMENT SYSTEM ● Master of Computer Applications To provide a practical.master. The ability to design a page that uses a page template with a tool such as Visual Studio.NET web form. A master page is similar to an ordinary ASP.

Gr.INVENTORY MANAGEMENT SYSTEM There are two ways to create a content page: Master of Computer Applications ● Use the Website➪Add New Item command.master‖ AutoEventWireup=‖true Title=‖Untitled Page‖ %> <asp:Content ID=‖Content1‖ ContentPlaceHolderID=‖ContentPlaceholder1‖ Runat=‖Server‖> </asp:Content> CodeFile=‖Default. When we create a content page in this manner. select Web Page as the template. Noida | Project Report 63 .aspx. and then choose the Master Page you want the content page applied to.cs‖Inherits=‖_Default‖ Galgotias Institute Of Management & Technology. initially the page contains just the following markup: <%@ Page Language=‖C#‖ MasterPageFile=‖~/MasterPage. check the Select Master Page option. then choose the Website➪Add Content Page command. ● Select a Master Page either in the Solution Explorer or the Web Designer window.

Gr. Noida | Project Report 64 .INVENTORY MANAGEMENT SYSTEM Master of Computer Applications Galgotias Institute Of Management & Technology.

NET and ASP as there could be a possibility of project having ASP and ASP.pwd=. An Asp . <configuration> <appSettings> <add key="ConnectionString" value="server=localhost.net web application.config acts as a central location for storing the information to be accessed by web pages.INVENTORY MANAGEMENT SYSTEM Master of Computer Applications WEB CONFIG Web. Gr. If the connection string changes it‘s just a matter of changing it at one place. What is Web. Web. as it sounds like is a configuration file for the Asp .ConfigFile ? Web.database=DBPerson" /> </appSettings> </configuration> Galgotias Institute Of Management & Technology.uid=sa. In the sample we'll read the information from web.config using ASP. Noida | Project Report 65 .net application has one web.config file. In classic ASP such global information was typically stored as an application variable.config file which keeps the configurations required for the corresponding application. This information could be a Connection String stored at a centralized location so that it can be accessed in a data-driven page.NET pages.config file is written in XML with specific tags having specific meanings.

● Session States : Galgotias Institute Of Management & Technology.INVENTORY MANAGEMENT SYSTEM Master of Computer Applications What is Machine. 3. configuration done in machine.config file is used to configure one asp. Noida | Project Report 66 ..config file is used to configure the application according to a particular machine. this file is not altered and only web.config file ? There are number of important settings that can be stored in the configuration file.config file is affected on any application that runs on a particular machine. 4.configFile ? As web. That is. Here are some of the most frequently used configurations. What can be stored in Web.config file. Gr. 1.config file makes sense. ● Database connections Session States Error Handling Security Database Connections : The most important configuration data that can be stored inside the web. stored conveniently inside Web. But it this is stored in the Web.config file is the database connection string.config file. As otherwise we'll have to keep it either as a class level variable in all the associated source files or probably keep it in another class as a public static variable. 2. Storing the connection string in the web. This will certainly save us a lot of alteration in different files where we used the old connection. Usually. it can be read and used anywhere in the program. same way Machine. since any modifications to the database configurations can be maintained at a single location.config is used which configuring applications.net web application.

net application we can use: User. 3. If we like to see that what windows user is using the Asp.) Passport Authentication: Passport Authentication provider uses Microsoft's Passport service to authenticate users. By default the session is stored in the asp . As we know that HTTP is a stateless protocol and we need session to keep the state alive. 2.net web. Noida | Project Report 67 . You need to purchase this service in order to use it.Name. 1.net offers many different types of security method which can be used depending upon the condition and type of security you need.net web application is very important.net process.Identity. Asp. Asp. Each error has to be caught and suitable action has to be taken to resolve that problem. This returns theDOMAIN\UserNameof the current user of the local machine. and then passes the authenticated identity to your code. Gr. ● Error Handling : Error handling is one of the most important part of any web application.net will not implement any type of security.) No Authentication: No Authentication means "No Authentication" :) .INVENTORY MANAGEMENT SYSTEM Master of Computer Applications Session in Asp . Asp .config file lets us configure. ● Security : The most critical aspect of any application is the security. meaning that Asp.) Windows Authentication: The Windows authentication allows us to use the windows user accounts. Galgotias Institute Of Management & Technology. what to do when an error occurs in our application.net stores the sessions in different ways. This provider uses IIS to perform the actual authentication.

INVENTORY MANAGEMENT SYSTEM Master of Computer Applications 4.0"encoding="utf-8"?> <configuration> <appSettings> <add key="ConnectionString1"value="server=localhost. web. database=northwind"/> <add key="ConnectionString2"value=" server=localhost. database=pubs"/> </appSettings> </configuration> Galgotias Institute Of Management & Technology. uid=sa. uid=sa.config <? xmlversion="1. pwd=. Gr. Noida | Project Report 68 .) Forms Authentication: Forms Authentication uses HTML forms to collect the user information and than it takes required actions on those HTML collected values.config: Contains a key-value pair. web. pwd=.

Noida | Project Report 69 . Gr.INVENTORY MANAGEMENT SYSTEM Master of Computer Applications Galgotias Institute Of Management & Technology.

such as Connection. Noida | Project Report 70 . forward-only access to the data retrieved from a query.NET applications to connect to data sources (usually relational databases).INVENTORY MANAGEMENT SYSTEM Master of Computer Applications ADO. and retrieve data. you can use it to fill a DataSet (a disconnected collection of tables and relationships) with information extracted from a datasource. ● DataAdapter: This object performs two tasks.NET classes that allows you to access a specific database. The classes that make up a data provider include the following : ● ● ● Connection: You use this object to establish a connection to a data source. Command. ADO. and manage disconnected data. Gr. execute commands. Command: You use this object to execute SQL commands and stored procedures. you can use it to apply changes to a data source. Essentially.NET Data Providers A data provideris a set of ADO. DataReader: This object provides fast read-only.NET Architecture ADO.NET uses a multilayered architecture that revolves around a few key concepts.NET ADO.Second. a data provider is a bridge between your application and a data source. The ADO. 1. according to the modifications Galgotias Institute Of Management & Technology. execute SQL commands.NET consists of managed classes that allow . First. and DataSet objects.

OleDbDataReader and OleDbDataAdapter. datasets.NET Namespaces 1. ● Oracle provider: Provides optimized access to an Oracle database (version 8i or later). views. rows. System.Data. 3. mostly abstract classes that implement some of the interfaces from System.OleDb :Contains the classes used to connect to an OLE DB provider.Common: Contains base.Data.0 or later). DbCommand. This includes SQL Server databases prior to version 7. System. and so on) to create their own Specialized versions.Data : Contains the key data container classes that model columns.NET Framework is bundled with a small set of four providers: ● SQL Server provider: Provides optimized access to a SQL Server database (version 7.5 interfaces.0. relations. 2. tables. In addition. The ADO. Data providers inherit from these classes (such as DbConnection. Noida | Project Report 71 . ● ODBC provider: Provides access to any data source that has an ODBC driver.but not those that require OLE DB version 2. Including OleDbCommand. Gr.Data and define the core ADO.NET functionality.INVENTORY MANAGEMENT SYSTEM Master of Computer Applications The . Galgotias Institute Of Management & Technology. and constraints.contains the key interfaces that are implemented by the connection based data objects. OleDbConnection. System. These classes support most OLE DB providers. ● OLE DB provider: Provides access to any data source that has an OLE DB driver.

System. we need to supply a connection string. 6. including SqlDbCommand.The provider-specific Command classes Galgotias Institute Of Management & Technology.These classes include OdbcCommand. Noida | Project Report 72 . SqlDataReader. The Command and DataReader Classes The Command class allow us to execute any type of SQL statement.INVENTORY MANAGEMENT SYSTEM Master of Computer Applications 4. The connection string is a series of name/value settings separated by semicolons (. you need to establish a connection. OracleDataReader. or updating data).NET data types. we‘re much more likely to perform data manipulationtasks (such as retrieving and updating the records in a table). tables. OdbcConnection. 7. System.Data. Before you can do anything else (including retrieving. System. and OdbcDataAdapter.Data. 5.Data. inserting.Odbc: Contains the classes required to connect to most ODBC drivers.SqlTypes : Contains structures that match the native data types in SQL Server. Although we can use a Command class to perform data definitiontasks (such as creating and altering databases. OdbcDataReader. and SqlDBDataAdapter. deleting. Gr. SqlDbConnection. and OracleCommand. The Connection Class The Connection class allow us to establish a connection to the data source that you want to interact with.SqlClient : Contains the classes you use to connect to a Microsoft SQL Server database. System.and indexes). When we create a Connection object. ODBC drivers are included for all kinds of data sources and are configured through the Data Sources icon in the Control Panel.Data.These classes aren‘t required but provide an alternative to using standard .OracleClient : database including Contains the classes required to connect to an Oracle OracleConnection. These classes are Optimized to use the TDS interface to SQL Server. These classes are using the optimized Oracle Call Interface (OCI). OracleDataAdapter.). which require automatic conversion.

alter. Command Basics Before we can use a command. ExecuteNonQuery() Executes non-SELECT commands. and so on). or update records. Galgotias Institute Of Management & Technology. we need to choose the command type. just like the Connection classes. 3. or we can pass the information we need as constructor arguments. ExecuteScalar() Executes a SELECT query and returns the value of the first field of the first row from the rowset generated by the command. Method Description 1. Noida | Project Report 73 . CommandText. the IDbCommand interface defines a few key properties and the core set of methods that are used to execute a command over an open connection. You can also use ExecuteNonQuery() to execute data-definition commands that create.INVENTORY MANAGEMENT SYSTEM Master of Computer Applications implement standard functionality. 2. forward-only cursor. Gr. delete. set the command text. such as SQL commands that insert. or delete database objects (such as tables. The returned value indicates the number of rows affected by the command. and bind the command to a connection. In this case. indexes. We can perform this work by setting the corresponding properties (CommandType. This method is usually used when executing an aggregate SELECT command that uses functions such as COUNT() or SUM() to calculate a single value. constraints. ExecuteReader() Executes a SELECT query and returns a DataReader object that wraps a read-only. and Connection).

FieldCount property to determine the number of fields in a row. Noida | Project Report 74 . You can use the DataReader. The number of fields that are saved depends on the size of the array you pass to this method.INVENTORY MANAGEMENT SYSTEM Master of Computer Applications The DataReader Class A DataReader allow us to read the data returned by a SELECT command one record at a time. 2. within the currently selected row. read-only stream. Using a DataReader is the simplest way to get to your data. (When the DataReader is first created. Method Description 1. If you access the field by index and inadvertently pass an invalid index that refers to a nonexistent field. 3. in a forward-only. Galgotias Institute Of Management & Technology. NextResult() If the command that generated the DataReader returned more than one rowset.NET match to the native value stored in the data source. Read() Advances the row cursor to the next row in the stream. 4. you will get an IndexOutOfRangeException exception. Gr. GetValue() Returns the value stored in the field with the specified index. or false if it‘s on the last row. GetValues() Saves the values of the current row into an array. This method must also be called before reading the first row of data. the row cursor is positioned just before the first row. This is sometimes called a firehose cursor. and you can use that information to create an array of the right size if you want to save all the fields.) The Read() method returns true if there‘s another row to be read. The type of the returned value is the closest . but it lacks the sorting and relational abilities of the disconnected DataSet. this method moves the pointer to the next rowset (just before the first row).

To use the DataAdapter to fill a DataSet. To enable the DataAdapter to edit. that value can be read only from the respective parameter after the reader has been closed. you must set the SelectCommand. . 2. Gr.NET object : a DataAdapter. Fill() Adds a DataTable to a DataSet by executing the query in the SelectCommand. Noida | Project Report 75 . primary keys.INVENTORY MANAGEMENT SYSTEM Master of Computer Applications 5. This method doesn‘t add any data to the DataTable. you need to specify Command objects for the UpdateCommand. The DataAdapter serves as a bridge between a single DataTable in the DataSet and the data source. Instead. FillSchema() Adds a DataTable to a DataSet by executing the query in the SelectCommand and retrieving schema information only. so there is a separate DataAdapter class for each provider (such as SqlDataAdapter. and InsertCommand properties of the DataAdapter. DeleteCommand. You can also use this method to add data to an existing DataTable. Close() Closes the reader. If our query returns multiple result sets. this method will add multiple DataTable objects at once. data types. we need to use another ADO. delete. If the originator command ran a stored procedure that returned an output value. Galgotias Institute Of Management & Technology. and so on). It contains all the available commands for querying and updating the data source. OracleDataAdapter. and unique constraints. Method Description 1. The DataAdapter Class To extract records from a database and use them to fill a table in a DataSet. it simply preconfigures the DataTable with detailed information about column names. and add rows. The DataAdapter comes in a provider-specific object.

Gr. Noida | Project Report 76 . Update() Examines all the changes in a single DataTable and applies this batch of changes to the data source by executing the appropriate InsertCommand. Galgotias Institute Of Management & Technology. UpdateCommand.INVENTORY MANAGEMENT SYSTEM Master of Computer Applications 3. and DeleteCommand operations.

Noida | Project Report 77 . Gr.INVENTORY MANAGEMENT SYSTEM Master of Computer Applications Galgotias Institute Of Management & Technology.

The move counter to the commonly held view than a successful test is one in which no errors are found.   Testing as a process of executing a program with the intent of finding errors. Gr. A test case is a particular made up of artificial situation upon which a program is exposed so as to find errors. Its basic function is to detect errors in the software. but also errors introduced during previous phase. Thus the goal of testing is to uncover the requirements. After the coding phase. The above objective implies a dramatic change in viewpoint . Noida | Project Report 78 . So a good test case is one that finds undiscovered errors. our objective is to design tests that a systematically uncover different classes of errors and do so with a minimum amount of time and effort.  If testing is done properly. During requirement analysis and design. the output is a document that is usually textual and no executable. In fact. test cases are designed. To perform testing. it uncovers errors and after fixing those errors we have software that is being developed according to specifications. This implies that testing not only has to uncover errors introduced during coding. Galgotias Institute Of Management & Technology. computer programs are available that can be executed for testing purpose.INVENTORY MANAGEMENT SYSTEM Master of Computer Applications Testing Testing is the major control measure used during software development. Objectives of testing First of all objectives should be clear. design and coding errors in the programs.

As testing progresses. Test planning can begin as soon as the requirement model is complete. all tests can be planned and designed before any code can be generated. Tests should be planned long before the testing begins. The problem of course. Gr. The first tests planned and executed generally focus on individual modules. testing shifts focus in an attempt to find errors in integrated clusters of modules and ultimately in the entire system. is to isolate these suspects‘ modules and to thoroughly test them. Noida | Project Report 79 . To be most effective. Therefore. software engineer must understand the basic principles that guide the software testing process. Some of the most commonly followed principles are: All test should be traceable to user requirements as the objective of testing is to uncover errors. Exhaustive testing is not possible. Testing should begin ―in the small‖ and progress towards testing ―in large‖. It is possible however to adequately cover program logic and to ensure that all conditions in the procedural design have been exercised. an independent third party should conduct testing. we mean testing that has the highest probability of finding errors (the primary objective of testing). Detailed definition of test cases can begin as soon as the design model has been solidated. The Pareto principle applies to software testing stated simply the Pareto principle implies that 80 percent of all errors uncovered during testing will likely be traceable to 20 percent of all program modules. Galgotias Institute Of Management & Technology. it follows that the most severe defects (from the users point of view) are those that causes the program to fail to meet its requirements. By ―most effective‖. The number of paths permutations for impossible to execute every combination of paths during testing.INVENTORY MANAGEMENT SYSTEM Master of Computer Applications Testing principles Before applying methods to design effective test cases.

Software configuration is required so that testers know what is to be expected and tested. When tests are evaluated. It also specifies if any tools for testing are to be used. design specification and source code of program. Noida | Project Report 80 . Error rate that is the occurrence of errors is evaluated. Test cases are required to know what specific situations need to be tested. the way how the testing will be conducted on the system. ● Test configuration It is basically test plan and procedure. The other approach is called white box testing. This data can be used to predict the occurrence of errors in future. Gr. then debugging is done to correct the error. A software product can be tested in two ways :- In first approach. Each procedure is tested for its accuracy. It is more intensive than black box testing. Here the internal functioning of the product is tested. test results are compared with actual results and if there is some error. For testing we need two types of inputs: ● Software configuration It includes software requirement specification. Galgotias Institute Of Management & Technology. It does not care about the internal functioning of the product. Test configuration is testing plan that is. Inputs are given and outputs are checked. only overall functioning of the product is tested. But for the overall product both these techniques are crucial.INVENTORY MANAGEMENT SYSTEM Master of Computer Applications Test information flow Testing is a complete process. It specifies the test cases and their expected value. Testing is a way to know about quality and reliability. There should be sufficient number of tests in both categories to test the overall product. This approach is called black box testing.

A fundamental strength that all white box strategies share is that the entire software implementation is taken into account during testing. This requires the tester to have detailed knowledge of the internal structure.INVENTORY MANAGEMENT SYSTEM Master of Computer Applications Basic methods of Testing White box testing White box testing is performed to reveal problems with the internal structure of a program. The effectiveness or thoroughness of white box testing is commonly expressed in terms of test or code coverage metrics. A common goal of white box testing is to ensure a test case exercises every path through a program. throughput. Stress tests push the system to or beyond its specified limits to evaluate its Galgotias Institute Of Management & Technology. Basic set is the set of all execution paths of a procedure. Gr. It was proposed by Tom McCabe. These tests guarantee to execute every statement in the program at least one time during testing. device utilization and execution time. Performance tests evaluate response time. Functional tests typically exercise code with valid or nearly valid input for which the expected output is known. looking for incorrect or missing functionality. This includes concepts such as ‗boundary values‘. memory usage. Noida | Project Report 81 . Basic Path Testing It is a white box technique. Black Box Testing Black box tests are performed to access how well a program meets its requirements. which measure the fraction of code exercised by test cases. which facilitates error detection even when software specification is vague or incomplete.

Noida | Project Report 82 . it instead is a testing strategy. counting failures over time to measure or certify reliability. As the name "black box" suggests. should know. Initialization and termination errors What is a Black Box Testing Strategy? Black Box Testing is not a type of testing. External database access 7. which makes it unfit to test the application by the developer. Black box testing uncovers the following types of errors 4. The types of testing under this strategy are totally based/focused on the testing for requirements and functionality of the work product/software application. how the system should behave in response to the particular action. Now a days. In order to implement Black Box Testing Strategy. "Functional/Behavioral Testing" and "Closed Box Testing". which does not need any knowledge of internal design or code etc. no knowledge of internal logic or code structure is required. the tester is needed to be thorough with the requirement specifications of the system and as a user. Galgotias Institute Of Management & Technology. Performance errors 8.INVENTORY MANAGEMENT SYSTEM Master of Computer Applications robustness and error handling capabilities. Gr. Reliability tests monitor system response to representative user input. Black box testing is sometimes also called as "Opaque Testing". it is becoming common to route the Testing work to a third party as the developer of the system knows too much of the internal logic and coding of the system. Interface errors 6. Incorrect or missing functions 5. The base of the Black box testing strategy lies in the selection of appropriate data as per functionality and testing it against the functional specifications in order to check for normal and abnormal behavior of the system.

INVENTORY MANAGEMENT SYSTEM Master of Computer Applications Various testing types that fall under the Black Box Testing strategy are: functional testing. system testing. Load Testing :The application is tested against heavy loads or inputs such as testing of web sites in order to find out at what point the web-site/application fails or at what point its performance degrades. stress testing. alpha testing. Stress Testing :The application is tested against heavy load such as complex numerical values. volume testing. The tests are written in order to check if the application behaves as expected. These testing types are again divided in two groups: a) Testing in which user plays a role of tester b) User is not required. ad-hoc testing. which checks for the stress/load the applications can withstand. Testing method where user is not required:- Functional Testing :In this type of testing. Exploratory testing. large number of inputs. recovery testing. Usability testing. Galgotias Institute Of Management & Technology. load testing. User Acceptance Testing (also known as UAT). Noida | Project Report 83 . Gr. beta testing etc. the software is tested for the functional requirements. large number of queries etc. Sanity or Smoke testing.

Noida | Project Report 84 . Volume Testing :Volume testing is done against the efficiency of the application. This testing is done if User Interface of the application stands an important consideration and needs to be specific for the specific type of user. Recovery Testing :Recovery testing is basically done in order to check how fast and better the application can recover against any type of crash or hardware failure etc. Usability Testing :This testing is also called as ‗Testing for User-Friendliness‘. Smoke Testing :This type of testing is also called sanity testing and is done in order to check if the application is ready for further major testing and is working properly without failing up to least expected level. Type or extent of recovery is specified in the requirement specifications. Gr. Exploratory Testing :This testing is similar to the ad-hoc testing and is done in order to learn/explore the application. Huge amount of data is processed through the application (which is being tested) in order to check the extreme limitations of the system. Galgotias Institute Of Management & Technology.INVENTORY MANAGEMENT SYSTEM Ad-hoc Testing :- Master of Computer Applications This type of testing is done without any formal Test Plan or Test Case creation. Ad-hoc testing helps in deciding the scope and duration of the various other testing and it also helps testers in learning the application prior starting with any other testing.

Advantages of Black Box Testing ● ● ● ● ● ● More effective on larger units of code than glass box testing Tester needs no knowledge of implementation.INVENTORY MANAGEMENT SYSTEM Testing where user plays a role/user is required: Master of Computer Applications User Acceptance Testing :In this type of testing. Noida | Project Report 85 . Beta Testing :In this type of testing. Alpha Testing :In this type of testing. the users are invited at the development center where they use the application and the developers note every particular input or action carried out by the user. the software is distributed as a beta version to the users and users test the application at their sites. in case if any exception/defect occurs that is reported to the developers. As the users explore the software. Any type of abnormal behavior of the system is noted and rectified by the developers. Gr. the software is handed over to the user in order to find out if the software meets the user expectations and works as it is expected to. including specific programming languages Tester and programmer are independent of each other tests are done from a user's point of view will help to expose any ambiguities or inconsistencies in the specifications test cases can be designed as soon as the specifications are complete Galgotias Institute Of Management & Technology.

Test Case for Block Brand – Open Product Brand Master from Left Menu under Forms Test case Test Objective Test Procedure ID Brand_1 To Check all Mandatory Fields Click Submit Button without entering data.INVENTORY MANAGEMENT SYSTEM Master of Computer Applications Disadvantages of Black Box Testing  Only a small number of possible inputs can actually be tested. Without enter any brand name. 1. #$$$$ “Date Inserted Successfully. The most desired or obvious expectation from the test cases is that it should be able to find most errors with the least amount of time and effort. to test every possible input stream would take nearly forever  Without clear and concise specifications. Message “Enter brand Passed name” and “enter brand code” Brand_2 To Submit Block Enter character values in Brand Category code and submit.” “Must insert character value Passed Change duplicate category message “Already exist” Galgotias Institute Of Management & Technology. HCL 2. test cases are hard to design  There may be unnecessary repetition of test inputs if the tester is not informed of test cases the programmer has already tried  May leave many program paths untested  Cannot be directed toward specific segments of code which may be very complex (and therefore more error prone) Test cases We know. test cases are integral part of testing. Noida | Project Report 86 . Gr. 2.Without enter any brand code. So we need to know more about test cases and how these test cases are designed. Test Data Expected Results Passed/ Failed Comment s 1.

and Parent Category Name. submit button Product Category Name : Laptop “Date Inserted Successfully. Noida | Project Report 87 .Without enter Product Category code.INVENTORY MANAGEMENT SYSTEM Test case Test Objective Test Procedure ID Test Data Master of Computer Applications Expected Results Passed/ Failed Comment s Brand_3 To check Block Submitted or not Click on View/Modify in Block link All data will be Visible.” Passed Galgotias Institute Of Management & Technology. Product Category Name. Category To Submit _2 Category Enter mandatory Product Category Fields and press Code : LPT. Gr. Test Data Expected Results Passed/ Failed Passed Comment s 1. Product Category Name. Message “Please enter Product Category Code. All records are visible Passed in below window Test Case for Product Category Master Village– Open Village from Left Menu under Masters Test case Test Objective Test Procedure ID Category To Check all Click Submit _1 Mandatory Button without Fields entering data.

Gr. Noida | Project Report 88 .INVENTORY MANAGEMENT SYSTEM Master of Computer Applications Galgotias Institute Of Management & Technology.

Duplicate As data is entered in different modules so consideration is made so No duplicate entry exists in the system. the system is fast enough. Noida | Project Report 89 . Galgotias Institute Of Management & Technology. Query To see all the information regarding a single Report.INVENTORY MANAGEMENT SYSTEM Master of Computer Applications CONCLUSION The goals accomplished in designing/developing of this system: User Friendliness The system has totally user-friendly in sense as user only has to interact with GUI pages and almost everywhere whenever any kind of task is going to perform. thus. Fast As far as possible slow responses are avoided and. Future Plans The development of modules are made such that user can trace back and update the error entry. a Report view page has been provided. Security A high level security at different levels has been incorporated into the system on the basis of user requirements. Menu Driven The system is made totally menu driven for the best results. Gr.

 From every part of the project the user is provided with the links through framing so that he can go from one option of the project to other one as per as desire and requirement. data Galgotias Institute Of Management & Technology. Noida | Project Report 90 . whatever he is entering. Moreover there is restriction for him that he cannot change the primary field.  The user is mainly more concerned about the validity of the data.  Through these features it will increase the efficiency. we can say that the project is user friendly which is one of the primary concerns of any good project. So that the user cannot enter the invalid data. This is bound to be simple and very friendly as per the user is concerned. That is. which can cause problems further?  Sometimes the user find in the later stages of using the project that he need to update some of those information that he entered earlier.  Data storage and Retrieval will become faster and easier to maintain because data is stored in a systematic manner and in a single database. There are options for him by which he can update the records. Gr.INVENTORY MANAGEMENT SYSTEM Master of Computer Applications MERITS OF THE PROJECT The project is identified by the merits of the system offered to the user. data entry or updating. There are checks in every stage of any new creation. This keeps the validity of the data to longer extent. The merits of this project are as follows:  This project offers user to enter the data through simple & interactive web-page.  User is provided the option of monitoring the records he entered earlier He can see the desired records with the variety of options provided for him.  Decision making process would be greatly enhanced because of faster processing of information since data collection from information available on computer takes much less time then manual system. This is very helpful for the client to enter the desired information through so much simplicity. accuracy and transparency.

  Since this is the On-Line Project. our project also has some limitations. can be further modified according to requirement. To overcome this problem. Those limitations are as follows –  Due to the requirements of the user of the data of not only of current year but also of last few years. Due to which the processing speed of any request from the client becomes a little bit slow. SCOPE OF FUTURE APPLICATION The objective of this application is to present the secure graphical user interface much friendly to the authorized user only. we also not claim that our software is perfect. the report will be submitted through soft copies (Floppies.It is aimed at making department affairs getting rid off all the bottlenecks that are there in the manual system and enabling them to focus on the core activities of the administration. performing all the working of above mentioned procedure efficiently. then report will not be submitted or accepted. CD etc.INVENTORY MANAGEMENT SYSTEM Master of Computer Applications LIMITATION OF THE PROJECT As nothing is perfect in this world. Noida | Project Report 91 . if needed. Further Enhancement This is the pilot project. Galgotias Institute Of Management & Technology. Gr. thus helping them strengthen the overall quality standards.) or written documents. As all other. Working properly. if the network will be down or not. the size of the database becomes too bulky.

Gr. Noida | Project Report 92 .INVENTORY MANAGEMENT SYSTEM Master of Computer Applications Galgotias Institute Of Management & Technology.

w3schools. 3. Pro ASP. http://msdn.Edition. Addison Wesley .asp.aspx 6.sql-server-performance. Second Edition by Matthew MacDonald and Mario Szpuszta. www.SQL.com 9.and.dotnetspider.httpcontext. http://www.Professional.com/Flowchart-tutorial.INVENTORY MANAGEMENT SYSTEM Master of Computer Applications REFERENCES TEXT REFERENCES 1.Oracle. Oreilly.2005.with. 5.Design.Dec. http://www.3rd. Sams Asp Net 3.com/MS_SQL-data-bindingd4UHaJPz.Programming.net/QuickStartv20/aspnet/doc/pages/pages.Web. http://www.The Gurus Guide to Transact SQL WEB REFERENCES 1.com/KB/database/DatabaseAcessWithAd oNet1.microsoft.2005.aspx 3.Jun.web.2. http://www.ADO.edrawsoft.dot.com/enus/library/system.MySQ L. http://www.NET. 2. Gr.bigresource.Server.NET 3.eBook.session.codeproject. Wrox. aspx 7.com 2.Apress. http://quickstarts.Learning. www.in Galgotias Institute Of Management & Technology.html 8.5 in C# 2008. Noida | Project Report 93 .com 4.5 Unleashed Jun 2006 4.2007.sgsy.php 5.

Noida | Project Report 94 . Gr.INVENTORY MANAGEMENT SYSTEM Master of Computer Applications Galgotias Institute Of Management & Technology.

Gr. Noida | Project Report 95 .INVENTORY MANAGEMENT SYSTEM Master of Computer Applications Galgotias Institute Of Management & Technology.

Login is failed when the user credentials are not entered correctly. Snapshot View This shows the login page view for authorised users of Inventory Management System. Noida | Project Report 96 . Here you can login to your account if you are already registered. password and Organisation etc. This registration process requires your basic knowledge such as Login Name. This will provide you with a username and password.INVENTORY MANAGEMENT SYSTEM Master of Computer Applications Purpose If you wants to avail all the facilities of Inventory Management System properly. Gr. you need to be registered through this Login Page and then you will be authorised user of this site Innventory Management System. Galgotias Institute Of Management & Technology.

and user-creation wizards.  When we open the project the first page opened will be login page where we enter the login credentials of user name and password.net:  This control support forms authentication. customizable login pages. Gr. Galgotias Institute Of Management & Technology. password recovery.NET model for authenticating users against a database and tracking their status. When the entries are entered correctly the page will be redirected to default.INVENTORY MANAGEMENT SYSTEM Master of Computer Applications DESCRIPTION OF LOGIN PAGE Login control of asp. Rather than writing your own interfaces to work with forms authentication. Noida | Project Report 97 .aspx page. Otherwise error will be displayed on the login screen. an ASP. you can use these controls to get pre built.

INVENTORY MANAGEMENT SYSTEM Master of Computer Applications Galgotias Institute Of Management & Technology. Noida | Project Report 98 . Gr.

 For submitting the input values.INVENTORY MANAGEMENT SYSTEM PRODUCT BRAND :- Master of Computer Applications This is the first page of Inventory Management System (product Brand master).  Brand Category Code (For entering the brand code). The page is concerned with the following functionalities :(1) There are two input values on the on the form. Gr. Noida | Project Report 99 . (2) There is a Submit Button on the form. Galgotias Institute Of Management & Technology.  The Grid view show all input values on the form randomly after pressing the Submit Button. (3) There is a Grid view on the form.  Brand Category Name (For entering the name of the brand).

INVENTORY MANAGEMENT SYSTEM Master of Computer Applications Galgotias Institute Of Management & Technology. Noida | Project Report 100 . Gr.

INVENTORY MANAGEMENT SYSTEM PRODUCT CATEGORY :- Master of Computer Applications The second page of Inventory Management System (Add product Category). Gr.  Product Category Name (For entering the name of the product category). Noida | Project Report 101 .  Submit Button ( For submitting the input value) (3) There is a Grid view on the form.  Grid view (For showing all input values on the form randomly after pressing the Submit Button) Galgotias Institute Of Management & Technology. (2) There is dropdown list on the form : Parent Category Name (For selecting the parent category of the product) (4) There is a Submit Button on the form.The page is concerned with the following functionalities :(1) There are two textboxes on the form : Product Category Code (For entering the product category code).

INVENTORY MANAGEMENT SYSTEM Master of Computer Applications Galgotias Institute Of Management & Technology. Gr. Noida | Project Report 102 .

INVENTORY MANAGEMENT SYSTEM

Master of Computer Applications

PRODUCT :The third page of Inventory Management System (Add product).The page is concerned with the following functionalities :(1) There are three textboxes on the form : Product Name (For entering the product name)  Product Detail (For entering the product detail)  Purchase date (For entering the purchase date of product)  Serial Number (For entering the serial number of product)  Search 1,2 (For searching the product) (2) There are three dropdown lists on the form : Brand Name (For selecting the brand of the product)  Category Name(For selecting the category of the product)  Office (For selecting the particular where to transfer the product) (3) There is a search textbox on the form There is a Submit Button on the form : Submit Button ( For submitting the input value) (4) There is a Grid view on the form : Grid view (For showing all input values on the form randomly after pressing the Submit Button)

Continue….

Galgotias Institute Of Management & Technology, Gr. Noida | Project Report

103

INVENTORY MANAGEMENT SYSTEM

Master of Computer Applications

Galgotias Institute Of Management & Technology, Gr. Noida | Project Report

104

INVENTORY MANAGEMENT SYSTEM

Master of Computer Applications

Galgotias Institute Of Management & Technology, Gr. Noida | Project Report

105

The page is concerned with the following functionalities :(1) There is a Grid view on the form : Grid view (Grid view showing all the active products of company) (2) There are Check Boxes on the Grid View of the form : Check Boxes (Check Boxes for selecting the ready to use products from the list of the products. after selecting the particular row the product is transfer to Product Form) (3) There is a Submit Button on the form : Submit Button ( For submitting selecting check box values to Product Form) Galgotias Institute Of Management & Technology.INVENTORY MANAGEMENT SYSTEM Product Issue & Receive Panel:- Master of Computer Applications The third page of Inventory Management System (Active product in stock). Gr. Noida | Project Report 106 .

Gr.INVENTORY MANAGEMENT SYSTEM Master of Computer Applications Galgotias Institute Of Management & Technology. Noida | Project Report 107 .

Noida | Project Report 108 . Gr.INVENTORY MANAGEMENT SYSTEM Master of Computer Applications Purpose This module provides you the facility to View all data entries :- Galgotias Institute Of Management & Technology.

Master your semester with Scribd & The New York Times

Special offer for students: Only $4.99/month.

Master your semester with Scribd & The New York Times

Cancel anytime.