Professional Documents
Culture Documents
1
Declaration from the student
Date: xyz
2
CERTIFICATE
It is certified that XYZ, a student of Master of Computer
supervision.
Guide Name:
Mr. Kumar
3
ACKONWLEDGEMENT
During the entire project I encounter many new experience and problem with
several difficulties. As any project work, this one wouldn’t have been possible without
the contribution of many people behind the scenes .It is not always easy to make and
I extend my sincerest thanks to our respected trainer Mr. Kumar under whose
management and direction this project has been undertaken. He guiding force and prime
motivation to lift me from the initialization state to the successful completion of the
project.
His friendly guidance and discussion over the complexities of a real time project
invoked a deep though in me. Undertaking a project such as this place an equal if not
Thanks to although who helped me in one-way or, other to all whose name
unmentioned. The website is developed using Front End C# ASP.NET and MSSQL
Server.
4
INDEX
1. Introduction 6-7
2. Current System 6
4. Proposed System 7
5. ER-Diagram 10
6. DFDs 11
7. System Flowchart 17
8. Structured Chart 18
9. Gantt Chart 19
14. References 25
15. Conclusion 26
5
1. Introduction
It has a serene ambiance though the modern development has made its
inroads here in terms of infrastructural developments. The town is an
important commercial hub of the state. It is a major transit route to Kullu-
Manali and other adjoining places from both NH-21 (Chandigarh-Manali
highway) and NH-20 (Pathankot-Mandi highway). Sundarnagar is one of the
emerging towns of the district. Mandi has an educated middle class and people
converse in Mandyali, one of the Pahari languages of Himachal. This web site
contains information about Distt. Mandi, including geography, health studies,
science, history, news, and preparation.
This we site also contains links District Blog, Forum, News & Events,
Industries, Hotels, Tour & Travels, Bank & ATM, Hospitals, Govt. Offices,
Internet & Computers, Bakers &Resturant, Malls & Shops, Studio & Printing,
Jewelers.
6
challenge and style. We are here with the opportunity that gives you continual
career growth and knowledge.
IT Training
Training is often your opportunity to proactively move your IT career
forward.This hunger is driven by the rapid rate of change in all spheres of life that
are now affected by information technology.Cramming for tests and reading text
materials alone are not enough to establish your IT career.If you want to build a
career in IT and you have a degree or certification without practical skills, training
is essential for you. You need to acquire these skills and knowledge to advance
your IT career. SwarnimInfosoft Pvt. Ltd. is specialized in imparting different
types of training according to the needs of the IT Global Market.
SwarnimInfosoft Pvt. Ltd. offers high end industrial training under the brand
Tech Mentro. Tech Mentro is a renowned name in IT training in Noida, Delhi
(NCR).
7
System Analysis and Design:
Systems are created to solve problems. One can think of the systems approach as an
organized way of dealing with a problem. In this dynamic world, the subject System
Analysis and Design (SAD), mainly deals with the software development activities.
OBJECTIVES
After going through this lesson, you should be able to
- define a system
- explain the different phases of system development life cycle
- enumerate the components of system analysis
- explain the components of system designing
DEFINING A SYSTEM
A collection of components that work together to realize some objectives forms a system.
Basically there are three major components in every system, namely input, processing and
output.
Computer Applications
In a system the different components are connected with each otherand they are
interdependent. For example, human body representsa complete natural system. We are
also bound by many nationalsystems such as political system, economic system,
educational systemand so forth. The objective of the system demands that someoutput is
produced as a result of processing the suitable inputs. Awell-designed system also
includes an additional element referredto as ‘control’ that provides a feedback to achieve
desired objectivesof the system.
8
System life cycle is an organizational process of developing and maintainingsystems. It
helps in establishing a system project plan, becauseit gives overall list of processes and
sub-processes required fordeveloping a system.System development life cycle means
combination of various activities.In other words we can say that various activities put
togetherare referred as system development life cycle. In the System Analysisand Design
terminology, the system development life cycle alsomeans software development life
cycle.
Following are the different phases of system development life cycle:
Preliminary study
Feasibility study
Detailed system study
System analysis
System design
Coding
Testing
Implementation
Maintenance
System Analysis
Systems analysis is a process of collecting factual data, understandthe processes involved,
identifying problems and recommending feasiblesuggestions for improving the system
functioning. This involve studying the business processes, gathering operational data,
understandthe information flow, finding out bottlenecks and evolvingsolutions for
overcoming the weaknesses of the system so as toachieve the organizational goals.
System Analysis also includes subdividingof complex process involving the entire
system, identificationof data store and manual processes.
System Design
Based on the user requirements and the detailed analysis of theexisting system, the new
system must be designed. This is the phaseof system designing. It is the most crucial
phase in the developmentsof a system. The logical system design arrived at as a result of
systems analysis is converted into physical system design. Normally,the design proceeds
in two stages:
Preliminary or General Design
Structured or Detailed Design
Preliminary or General Design: In the preliminary or general design,the features of the
new system are specified. The costs of implementingthese features and the benefits to be
derived are estimated.If the project is still considered to be feasible, we move to the
detaileddesign stage.
Structured or Detailed Design: In the detailed design stage, computeroriented work
begins in earnest. At this stage, the design ofthe system becomes more structured.
11
Structure design is a blueprint of a computer system solution to a given problem having
the Computer Applicationssame components and inter-relationships among the same
componentsas the original problem. Input, output, databases, forms, codificationschemes
and processing specifications are drawn up in detail.
There are several tools and techniques used for describing the system
design of the system. These tools and techniques are:
Flowchart
Data flow diagram (DFD)
Data dictionary
Structured English
Decision table
Decision tree
Each of the above tools for designing will be discussed in detailed in
the next lesson.
The system design involves:
i. Defining precisely the required system output
ii. Determining the data requirement for producing the output
iii. Determining the medium and format of files and databases
iv. Devising processing methods and use of software to produce
output
v. Determine the methods of data capture and data input
vi. Designing Input forms
vii. Designing Codification Schemes
viii. Detailed manual procedures
ix. Documenting the Design
Coding
The system design needs to be implemented to make it a workablesystem. This demands
the coding of design into computer understandablelanguage, i.e., programming language.
This is also calledthe programming phase in which the programmer converts the
proIntroductionto System Analysis and Design gram specifications into computer
instructions, which we refer to asprograms. It is an important stage where the defined
procedures aretransformed into control specifications by the help of a computerlanguage.
The programs coordinate the data movements and controlthe entire process in a system.It
12
is generally felt that the programs must be modular in nature.This helps in fast
development, maintenance and future changes, if required.
Testing
Before actually implementing the new system into operation, a testrun of the system is
done for removing the bugs, if any. It is animportant phase of a successful system. After
codifying the wholeprograms of the system, a test plan should be developed and run ona
given set of test data. The output of the test run should match theexpected results.
Sometimes, system testing is considered a part ofimplementation process.Using the test
data following test run are carried out:
Program test
System test
Program test: When the programs have been coded, compiled andbrought to working
conditions, they must be individually tested withthe prepared test data. Any undesirable
happening must be notedand debugged (error corrections)System Test: After carrying out
the program test for each of theprograms of the system and errors removed, then system
test isdone. At this stage the test is done on actual data. The completesystem is executed
on the actual data. At each stage of the execution,the results or output of the system is
analysed. During theresult analysis, it may be found that the outputs are not matchingthe
expected output of the system. In such case, the errors in theparticular programs are
identified and are fixed and further testedfor the expected output.When it is ensured that
the system is running error-free, the usersare called with their own actual data so that the
system could beshown running as per their requirements.
Implementation
After having the user acceptance of the new system developed, theimplementation phase
begins. Implementation is the stage of a projectduring which theory is turned into
practice. The major steps involvedin this phase are:
l Acquisition and Installation of Hardware and Software
l Conversion
l User Training
l Documentation
The hardware and the relevant software required for running the
system must be made fully operational before implementation. The
13
conversion is also one of the most critical and expensive activities in
the system development life cycle. The data from the old system
needs to be converted to operate in the new format of the new system.
The database needs to be setup with security and recovery procedures
fully defined.
During this phase, all the programs of the system are loaded onto
the user’s computer. After loading the system, training of the user
starts. Main topics of such type of training are:
How to execute the package
How to enter the data
How to process the data (processing details)
How to take out the reports
After the users are trained about the computerized system, workinghas to shift from
manual to computerized working. The process iscalled ‘Changeover’. The following
strategies are followed forchangeover of the system.
(i) Direct Changeover: This is the complete replacement of the oldsystem by the new
system. It is a risky approach and requirescomprehensive system testing and training.
(ii) Parallel run: In parallel run both the systems, i.e., computerizedand manual, are
executed simultaneously for certain definedperiod. The same data is processed by both
the systems. Thisstrategy is less risky but more expensive because of the following:
Manual results can be compared with the results of the computerizedsystem.
Overview:-
It is the complete Online medical shop management software is so designed as to ease the
work load of medical shop professionals. The main feature includes invoicing, inventory
and stock control, accounting, client and vendor management.
This software helps you to track all the profits, loss, profitable clients and
products of medical shop moreover it’s a medical shop accounting software. Flexible and
adaptive software suited to medical shops or stores or pharmacies of any size.
14
Menu driven, Key board and mouse navigation
Paperless practice
Not maintain all financial report and financial statements such as day
book, profit and loss amount and balance sheet
Not have a better search option for finding available product of company
Proposed system:-
It is the complete medical shop management software is so designed as to ease the work
load of medical shop professionals. The main feature includes invoicing, inventory and
stock control, accounting, client and vendor management.
This software helps you to track all the profits, loss, profitable clients and
products of medical shop moreover it’s a medical shop accounting software. Flexible and
adaptive software suited to medical shops or stores or pharmacies of any size.
This System will store the information of medicines & customers in the system. It will
also store the information about stock details. This system provides security by granting
access rights for changing the sensitive data to administrator only. Customized search
15
options are also available in this system. This system can generate all kinds of reports as
per the user’s requirements.
Creating different users with different privilege level for providing high security
System Requirements:-
• Required processor :Pentium 90 MHz or faster
16
Software Specification:-
• Operating system: .Net framework 2.0 version compactable software
platform
INTRODUCTION
C# Language
Welcome to this C# tutorial. With the introduction of the .NET framework, Microsoft
C# could theoretically be compiled to machine code, but in real life, it's always used in
combination with the .NET framework. Therefore, applications written in C#, requires the
17
.NET framework to be installed on the computer running the application. While the .NET
to as THE .NET language, perhaps because it was designed together with the framework.
C# is an Object Oriented language and does not offer global variables or functions.
Everything is wrapped in classes, even simple types like int and string, which inherits
C# can be written with any text editor, like Windows Notepad, and then compiled with
the C# Command line compiler, csc.exe, which comes with the .NET framework.
However, most people prefer to use an IDE (Integrated Development Environment), and
Microsoft offers several options for this. Their flagship is Visual Studio, which can be
used to work on every possible aspect of the .NET framework. This product is very
advanced, and comes in several editions. Visual Studio is not exactly cheap, and might
With .NET framework 2.0, Microsoft introduced the so-called Express versions, targeted
at hobby programmers and people wanting to try .NET, and they continued this tradition
with the later release of .NET 3.0 and 3.5. The Express versions only work for one
language, like C# or VB.NET, and miss some of the really advanced features of Visual
Studio. However, they are free and will work just fine for learning the languages, which is
18
1. C# is a simple, modern, object oriented language derived from C++ and Java.
2. It aims to combine the high productivity of Visual Basic and the raw power of C++.
4. Visual studio supports Vb, VC++, C++, Vbscript, Jscript. All of these languages
6. Microsoft's
7. CLR accommodates more than one languages such as C#, VB.NET, Jscript, ASP.NET,
C++.
8. Source code --->Intermediate Language code (IL) ---> (JIT Compiler) Native code.
9.The classes and data types are common to all of the .NET languages.
10. We may develop Console application, Windows application, and Web application
using C#.
11. In C# Microsoft has taken care of C++ problems such as Memory management,
pointers etc.
4. Since it`s on .NET, it inherits the features of automatic memory management and
garbage collection.
19
6. Integer values of 0 and 1 are no longer accepted as Boolean values. Boolean values are
pure true or false values in C# so no more errors of "="operator and "=="operator. "==" is
CHAPTER 9
.NET FRAMEWORK
20
Microsoft introduced the .NET Framework with the intention of enhancing
security, deployment and administration. It consists of all the technologies that help in
creating and running robust, scalable and distributed applications. .NET offer complete
suit for developing and deploying applications. This suite consist of .NET Products, .NET
.NET Product:
developing .NET applications, by using programing language with Visual Basic, Visual
This product allows developer to create applications that are capable of interacting
.NET Service:
protocol such as HTTP (Hyper Text Transfer Protocol) and Simple object Access
Protocol (SOAP). We can identify the service by a Uniform Resource Locator (URL).
21
the web service are described by using XML. Users can subscribe to such a service and
use it as long as they need it, regardless of their hardware and software platforms.
.NET Framework:
consistent and simplified programming model that helps you to easily build robust
applications. It is the core of the .NET infrastructure because it exists as a layer between
.NET applications and the underlying operating system. In other words , the .NET
Framework encapsulates most of the basic functionality, such as debugging and security
services, which were earlier built into various programming languages in the form of a
The CLR is one of the essential components of the .NET framework. CLR is the
environment in which all programs that use .NET technologies are executed. It provides
services such as code compilation, memory allocation, and garbage collection. The CLR
allows the execution of code across Different platforms by translating code into
Intermediate Language (IL). IL is a low –level language that the CLR understands.
IL is converted into machine language during execution by the JIT compiler. During JIT
compilation, code is also checked for type safety. Type safety ensures that objects are
always accessed in a compatible way. If you try to assign an 8-byte value to a variable of
22
CLR consists of a set of common rules followed by all the languages of the .NET
framework. This set of rules is known as CLS. CLS enables an objects or application to
interact with objects or applications of other languages. The classes that follow the rules
One of the specifications defined in CLS is common Type System (CLS), which provides
a type system that is common across all languages. CTS defines how data types, how data
types are declared, used, and managed in the code during run time.
The CTS also defines the rules that ensure that the data types of objects written in various
The source code needs to be compiled before execution.CLR plays an important role in
pRO IL Metadata
Program code
Loading assemblies and identifying namespaces: Assemblies are loaded into the
organize its classes in a hierarchy.Namespace implicitly have public access and this
cannot be changed.
23
JIT compilation: Before execution, IL is converted into machine language by JIT
compiler. Next, during the verification process, the IL code is examined to confirm
Garbage collection:
The garbage collection process begins after JIT compilation and manages the allocation
and deallocation of memory for an application. Whenever you create an object, the CLR
allocates memory for the object from the managed heap. A managed heap is of the
memory that is available for program execution. If sufficient memory is not available on
language. This model can be used to perform severl, and retrieving data.
Multi-platform applications:
There are several versions of Windows most of which run on x86 CPUs. Some
versions, such as Windows CE and the 64-bit Windows, run on non-x86 CPUs as
well. A .NET application can execute on any architecture that is supported by the
CLR. In future, a CLR version could even be built for non-Windows platforms.
24
Multi-language integration:
a class in VC# that is derived from a class implemented in VB.NET. To enable objects to
interact with each other regardless of the language used to develop them, a set of
resources.
Ease of develop:
.NET application can be deployed simply by copying files to the target computer.
Component Object Model(COM) has been used for creating components. However,
COM sffers from various problems related to deployment. For example, every COM
development in the highly distributed environment of the internet. The .NET Framework
25
is designed to fulfill the following objectives: the .NET Framework is an integral
Windows component that supports building and running the next generation of
applications and XML Web services. The key components of the .NET Framework are
the common language runtime and the .NET Framework class library, which include
VB.NET, ADO.NET and Windows Forms. The .NET Framework provides a managed
object code is stored and executed locally, executed locally but internet-
To build all communication on industry standards to ensure that code based on the
26
The common language runtime and
Microsoft Active Server Pages (ASP) was developed by Microsoft on July 16,
1996. It is a powerful and easy technology to create dynamic web pages. The main
purpose of ASP is to decrease the load on the browser by performing many of the tasks
done earlier by the Browser, which increases the response time for each request.
With the help of ASP, you can combine HTML pages, script commands and Active X
Server-Side Scripting
Scripts are processed on the Web Server. The Web Server then generates the Web pages
that are sent to the browser. The benefit of ASP is that users cannot view document,
Working of ASP
27
ASP is process on the web server. So it requires web server application to be executed.
You can use Internet Information Server (IIS) or Personal Web Server (PWS) to process
ASP files.
1. The browser sends a request for an ASP page to the web server by form or URL.
2. The web server receives the request and finds the ASP file from the storage unit.
3. The web server forwards the ASP file to the ASP script engine i.e. ASP.DLL for
processing.
4. ASP engine reads the ASP file to generate an HTML file and sends HTML page
to the server.
In this way the ASP file is processed and output is displayed in the browser.
ASP File
An ASP file is a text file with the extension .asp, which contains
HTML tags
Client-Side Scripts
ASP Scripts
ASP scripts are written simply in the HTML file. It also includes scripting language,
whether it is VB Script or Java Script or other. You can write ASP Scripts in two ways:
28
The <Script> and </Script> tags are normally used in client side scripting to enclose VB
Script or Java Script. Using the attribute RUNAT within the tags can also use these tags
…………………..
………………….
</Script>
You can enclose the ASP scripts between the <% and %> delimiters. These delimiters are
a) If you want to enclose general ASP script, you can use <% and %> delimiters.
ASP files are stored on the web server. So to host the asp files on the web server, you
have to create a virtual directory in the server application. To create virtual directory in
2. Click the right button of mouse on the Default Web Site icon and from the context
menu select New option to click Virtual Directory option. This will display New
29
3. Type the name of the Virtual Directory and Click Next button.
4. Now, type the path of the directory where ASP files are located on the disk (or
you can used Browse button to select the path) and click Next button.
5. Now make sure that read and script permissions are selected for this directory and
This will set the virtual directory to host the asp files on the server.
You can browser the asp file in the Internet Explorer, using the following format:
http://<servername>/<virtual_directory_name>/asp_filename
e.g. http://server/neha/ttt.asp
Scripting Engine
Scripting Engine is a special program that processes the scripting statement in a web
page. A browser can execute a client-side script if the proper runtime script engine is built
into it. To execute server – side script the script engine must b e available with the web
server. ASP scripts are processed by script engine “ASP.DLL” installed in the IIS
ASP Objects
ASP provides some built in objects, which have methods, properties and collections.
Methods of an object are used to perform some tasks with an object. A property of an
value to specify the state of object. The collections of an object consist of different sets
of key and value pairs related to the object. The asp objects are:
30
Request: This object is used to specify information about a client request send using http
Response: This object is used to control the response sent from the server to the client.
Server: This object is used to provide access to the methods and properties of web server.
Session: This object is used for storing user information that is needed for a particular
user session.
ASP Error: This Object can be used to trap ASP Error and provide information to the
users.
Object Context:This object is used to link ASP and the Microsoft Transaction Server
ASP.NET
Visual Basic developers have long enjoyed the ease of programming with forms and
onto a form and writing some event-handling functions. This is one of the reasons VB has
ASP.NET, these forms are called Web Formsand are analogous to VB forms, replacing
ASP pages. Similar to VB, Web Forms programming is also event based. We don't have
to write in-line ASP scripts and rely on the top-down parsing interpretation as in ASP
31
ActiveX controls that VB programmers love in their toolset, ASP.NET equips ASP
ASP. Net’s Web Forms also allow for the separation of the application logic and the
presentation layer.
ASP.NET evolves from the ASP programming model with the following
additional benefits:
Clean separation between the application logic (server-side code) and the
A rich set of server controls that automatically render HTML suitable for any
An event-based programming model on the server side, which is simpler and more
intuitive
Application logic that can be written in any Microsoft .NET language (VB, C#
Web Forms
32
ASP.NET Architecture
applications through IIS. IIS deciphers and optionally authenticates the request. If Allow
Anonymous is turned
on, no authentication occurs. IIS also finds the requested resource (such as an
ASP.NET application), and, if the client is authorized, returns the appropriate resource.
Internet Information Services (IIS) is the Windows component that makes it easy to
publish information and bring business applications to the Web. IIS makes it easy for you
Internet Information Services 5.1 has many features to help Web administrators to create
Security
33
Administration
Programmability
Internet Standards
Microsoft Internet Information Services 5.0 and 5.1 comply with the HTTP 1.1 standard,
including features such as PUT and DELETE, the ability to customize HTTP error
IIS 5.1 offers greater protection and increased reliability for your Web
applications. By default, IIS runs all of your applications in a common or pooled process
In IIS 5.1, administrators and application developers have the ability to add custom
information on the Internet or your intranet. IIS includes a broad range of administrative
CHAPTER 10
34
databases.SOLserver stores data at a central location known as server and delivers it on
demand to others locations known as clients. The server is responsible to manage the
databases and memory for multiple requests. The clients are responsible for presenting
data and business logic to the end users. Clients programming interfaces provides the
means for applications to run on separate clients computers and communicate to the
Query Analyzer
The query analyzer is the interface for passing SQL statements to the SQL servers, view
results or analyze the results or analyze a query plan. The query analyzer can be started
Once a server name and login name is authenticated by the SQL server, the query
analyzer screen is displayed .once the query analyzer is opened the SQL statements can
35
be typed in it. The SQL statements then need to be submitted to SQL server by using the
ARE:
Service Manager
Client Network
Utility Server
Network Utility
System Analysis
The basic aim of System Analysis is to obtain a clear understanding of the needs of the
clients and the users, what exactly is desired from the software and what the constraints
Analysis involves interviewing the clients and the actual users. These people and the
existing documents about the current mode of operation are the basic source of
Informal Approach
Structured Approach
36
The informal approach to analysis is one where no defined methodology is used.
The information about the system is obtained by interaction with the client, end, users,
problem. It focuses on the function performed in the problem domain and the data
consumed and produced by these functions. This method helps the analyst decide what
Table: -
MS-Sql 2005 table makes data that should be organized in a table structure. With
the help of tables we can present data organized in raw and columns. The rules of which
elements occurs in a table is called a table model. After we have decided upon the tables
that we will have in our database, we can define the various field and their properties. For
o Field Name
o Field Type
o Field size
Queries:-
group of records that fulfill a certain condition. An example of query is when we want to
see the list of books published Name Publishing. The query feature of access creates a
search based on the criteria that the publisher’s name is “Name Publishing” and displays
37
the selected records in a datasheet format. Most access databases contain more then one
table. We can combine specific fields from multiple tables into one datasheet.
Reports:-
enables us to display information to the required level or detail. The information can be
viewed or printed in any format. Subtotals, statistical evaluations, pictures and graphs can
Database:-
for e.g. a customer file, Bank A/C in a Bank, Employee Details etc. According to Oxford
can be said as a collection of files containing records of similar nature. Each record
contains all the data relating to one subject in the file. The grouping of such files is called
Components of database
2. Fields: A field is an item, which distinguishes one record, from another. A field can
field name.
38
3. Key Fields: a key field is a field that is unique to a particular record and is used to
4. Entity: A person, place, thing or event about which information must be kept.
Database models are broadly classified into two categories, They are:
Object based logical models are used in describing data at the logical and view levels.
They are characterized by the fact that they provide fairly flexible structuring capabilities
and allow data constraints to be specified explicitly. There are many different models, and
39
Record-Based Logical Model
Record-based logical models are used in describing data at the logical and view level. In
contrast to object-based data models, they are used both to specify the overall logical
Record-based models are so named because the database is structured in fixed format
record of several types. Each records type defines a fixed number of fields, or attributes,
and each field is usually of a fixed length. The three most widely accepted record-based
models are
Data storage is in form of child parent relationship. The origin of data tree is root. Data
located at different levels among a particular branch is called node. The last node in tree
Network Model
Data in network model is represented by collection of records (in Pascal sense), and
relationships among data are represented by links, which can be viewed as pointers. The
40
The main idea behind the Network Database System model is to bring about Many-to-
Many relationship. The relationship between the different data items is called as sets. This
The Relation Database System came into existence to overcome all the drawbacks of
these models. Now, let us consider an example of the network model. The network
model differs from the relational model in that data are represented by collections of
Relational Model
Dr E.F Codd first introduced the relational Database model in 1970. The relational model
As the name implies the object relational model supports both object-oriented and
once created can be reused-this in the fundamental property of the OOP’s concept. By
combining the object oriented and relational concepts Oracle now offers the best of both
worlds.
Components of DBMS
41
Let us now examine the components and structure of a database management system. A
DBMS is a complex software system that is used to manage, store and manipulate data
and the metadata used to describe the data. It is utilized by a large variety of users from
the very naïve user to most sophisticated to retrieve and to manipulate data under its
control. The users could be utilizing the database concurrently from online terminals
and/or in a batch environment via application programs written in a high level language.
Before looking at various components of the DBMS, let us examine its facilities and
information from and storing new information into the database. There are four different
type of database system users differentiated by the way that they expect to interact with
the system.
Naive Users
42
Naïve users are unsophisticated users who interact with the system by invoking one of the
application programs that have been written previously. These are users who are not
aware of the presence of database system or any other system supporting their usage.
Online Users
Online users are the users who may communicate with the database directly. These users
are aware of presence of the database system. The more sophisticated of these users may
also use a data manipulation language (which will dealt in later chapters) to manipulate
the database.
Application Programmers
Application programmers are computer professionals who interact with the system
through Data Manipulation Language calls, which are embedded in a program written in a
host language (for example, COBOL, PL/I, PASCAL, C). These programs are commonly
Example:In banking system include a program that generate payroll checks, that debit
Database Administrator
43
Centralized control of the database –in exerted by a person or group of persons under the
supervision of a high level administrator, this person is referred to as the Data Base
Administrator (D.B.A). He is the user who is most familiar with the database and is
responsible for creating, modifying and maintaining it. He is custodian of the data and
Advantages of a RDBMS
One of the main advantages of using a database system is that the organization
can exert, via the DBA, centralized management and control over the data. The database
administrator is the focus of the centralized control. Any application requiring a change in
the structure of a data record requires an arrangement with the DBA, who makes the
necessary modifications.
Reduction in Redundancies
Centralized control of the data by the DBA avoids unnecessary duplication of the data
and effectively reduces the total amount of data storage is required. It also eliminates the
extra processing necessary to trace the required data in large mass of data. Another
present in redundant data files. Any redundancies that exist in the DBMS are controlled
and the system ensures that these multiple copies are consistent.
Shared Data
44
A database allows the sharing of data under its control by any number of applications
programmers or users.
For the sake of an example, let’s consider a situation in the office of a publishing
company, where a data file is shared or worked upon by many users, for instance, the data
Integrity
Centralized control can also ensure that adequate checks are incorporated in the DBMS to
provide data integrity. Data integrity means that the data contained in the database is both
accurate and consistent. Therefore, data values being entered for storage could be checked
to ensure that they fall within a specified range and are of the correct format. Another
data integrity check that should be incorporated in the database is to ensure that if there is
In case of Automatic Teller Machine, for example, a user is not allowed to transfer funds
Security
persons must not access such confidential data. The DBA who has the ultimate
responsibility for the data in the DBMS can ensure that proper access to the RDBMS and
additional checks before permitting access to sensitive data. Different levels of security
Conflict Resolutions
45
Since the database is under the control of the DBA, she or he should resolve the
conflicting requirements of various users and applications. In essence, the DBA chooses
the best file structure and access method to get optimal performance for the response-
critical applications, while permitting less critical applications to continue to use the
Disadvantages of RDBMS
purchasing or developing the software, the hardware has to be upgraded to allow for the
extensive programs and the workspaces required for their execution and storage. The
sharing of the data causes a degradation of the response and through-put times. An
additional cost is that of the migration from traditionally separate application environment
requires that the database be adequately backed up so that in case of failure the data can
be recovered. Backup and recovery operations are fairly complex in DBMS environment,
Advantages are:-
Centralized control
46
Security enforcement possible
Disadvantages are:-
ER-diagram:-
47
Context level diagram:-
48
Context analysis diagram:-
49
LOGICAL DFD:-
50
DFD FRAGMENTATION:-
First level DFD:-
51
1.3
View Specification
specifn
52
53
Third level DFD:-
54
STRUCTURE CHART:-
55
56
57
58
59
60
61
Table layout:-
62
Product:- Column name data type
P_idint
P_namevarchar (50)
P_gen_namevarchar (50)
P_quality float
P_priceint
Pharmacist:-
Phar_name Varchar(50)
Phar_id int
Phar_cont_no int
timing int
Company:-
63
Column name Data type
Comp_id int
Comp_name Varchar(50)
Customer:-
Cust_name Varchar(30)
Cust_ID int
Reference:-
64
www.projectguidance.com
http://e-library.net/
www.sourcecodeonline.com
www.developers.net
www.codeproject.com
Conclusion:-
65
feature includes invoicing, inventory and stock
control, accounting, client and vendor
management.
66