You are on page 1of 17

c

Hotel Management Systemc


c
c
c
c
c
c
c
c
c
c
c
c
c
c
c
c
• •

à cc c 
cc  c  cc   ccc cà c c c c
  c ccc  c c
c

cc
 cà c
c c
  c   c c   c c
cc
 c c c c c  cà c
 c  c  c
  c
cc c  c !c 
c c c c  c

cÃc"  c c  c c
  c c c c c
  c  c
  c  c c 
c#c  c
 c c
c c c   c


  c
c
à c c c c  c cc c  c  
cc c   c  c
 cc
  c c c c  cc
 c c   c c 
 cc
 c  c



c
c

c
c
c
c
c
c
c
c
c

c
c

 



$%c 
 c
$$c !
c# c
$&c ! c
$'c #
 cc
$(c )
 c
c
&%c !
c  c
c
&$c !
c!   c
&$$c !
c*   c
c cc
 cc
&$&c !
c!  c
&$'c   c c*   ccc
&$(c " c c"    c
&$+c ,c*  
 c
&&c !
c#
  c
&'c "c  c
&'$c "c  
 c-cc

 c c
  c cc
c c
.c
&'&c "c  - 
c  ccc
   c c c cc
 c  cc c c c c  cc c
.c
&''c "c!   c-  c  cc   c c.c
&(c /  c
&($c /c/  c
&(&c 0c  c-Ã c
cc c
c
 cc c c
1c
c  c c c c c c cc  c
  c c
 
 c c   c c
  c   c   c  c  c

 c c
  cc
c  cc2)Ãcc
  ccc   .cccccccccccc
c
'%cccc# c" 3 c#c
c
cccccccccccc'$cccc4 c0 
 
c-Ã cc c cc   c c c .c
'&cccc c c# c" 3 c-    c 3 cc cc
 .c
cccccccccccc''cccc0  c
''$ccc"  c! 
 c
''&ccc c1  c
'''ccc  
cc) c 
 c
''(ccc! c)  c
''+ccc c) c1  c" 3 c
''5ccc"  c" 3 c
''6ccc0
 cc c 
 c
''7ccc# c c#
c0   c
'(ccccc  c c*  
 c
c
(%c# c  c

c
c

c
($cccccc#cc0 c# c
(&cccccc! c c8   cc0 c# c
('ccccc" 3 cc2 c# c
('$cccc4 c" 3 c
('&cccc# c" 3 c
c((ccccccc9  c#cc
(($cccc* c c c
  cc c  c
 cc c
 : ;cc
((&c 0 c c c c   c c c
 c
 c c
  c c c
c c
 c
  ;cc
(('c 0 c c c c   c c c c 
cc  c c
 
;c
(+c " 3 c  c
(5ccccccc
<!
c c2 c# -4 c  c .c
(6ccccccc9  c)c2 c# c
(7ccccccc0 c* c
(=ccccccc# c
-4 c
 c <c
c .c
($%c )
c  
 c
($$c # 3
c c0  c* c
c
c
+%ccccccc# c*  c
c
c
+$cc# c 
 c*  c
+$$c   c! c
 c
+&ccc* c*  <*c#
 c*  c
+&$c à c c"   c
+&&c 1
 c* 
 c)c*c
+'c <)c c  
c*  c
+'$c # cà <41c* c
+'&c #  c)c9 c" c c  
cc

+(cc* c*  c
+($c  c)c/"c* c cà c
+(&c 2  : c
+('c à c"   c* c8 c 
 cc c> c
++c <c*  c
+5c  
c*  c
+5$c 

c0  c c#


c
+5&c # Ã  c* c
+6c# c#
 c*  c
+7c
c!  c
c
5%ccc   c!   c
5$cc   c/  c
5&cc! < c#

 c
5'cc#
c9  c
5(cc0 c# c

c
c

c
6%ccà  c
6$ccà  c!  cc
6&ccà  c# c
6'ccà  c  c
6(ccà c0 c
6($c ! c
6(&c " 3 c c
6('c /
 c"  c
7%c1  c c9 c/ 
c
c
=%c0
 c c*
 c
=$c# c  cc!
c  c
=&c! c/
   c c! c#  c
='c# cc!
cc
c

c
c
c
c
c
c
c
c
c
c
c
c
c
c
c
c
c
c
c
c
c
c
c
c
c
c
c
c
c
c
c
c
c

c
c

ë c ½ntroduction
c

ë ëcÔroject Summary
à cc cc   c c  c
 ccc  c  c cc c
  c 
c
c
à c  c c c 
 c cc

c  : c c   c    c c c
  c c c  c   c# cc c
 c  c c
  c  c c
 c   c c c c c c c  c c ccà c  cc c
 c  c   c # c   c   c c  c   c  c  c  
 c  c
 c

 c

ë cÔurpose
c
à c cc cc
  c c c

 c c c   ccc


 c c c c c  cc c   c c c c  c cc c
 cc
 c c c cc cc cc 
c
c
ë cScope
c c c c  c   c
 cc c
 c c   c c
 c
   c "  c   c
 c c   c  c  c  c
 c  c à c
 c c c  c  c  c
 c c c  c   c c
 c  c  c c

  : c c
   c   c
ccc

ë c^ jective
à c
 cc c  c ccc  cc
c 
c   c
 cc c c   c

 ccc  c ccc c c 


 cc
 c   c cc

 c Ôroject management

 ëcÔroject Ôlanning
à c  c
 cc

 c 3 c
  c c
cc c c
 
 c c
c c  
c  c c 3
c c

  c c
c c c   c

&$$c Ôroject Development Approach and Justificationc


à c
cc cc ?c*  c  cà c c"  c

c
&$&c Ôroject Ôlanc

c
c

c
c
&$'c Milestones and Delivera lesc
8 c ccc  c c
   c@ccc  c
  cc   cà c
 c  cc c cc
 c   c
c
&$(c Úoles and Úesponsi ilitiesc
à c c cc  c c c 
ccc ccc  ?c
  c c4 c
c
&$+c £roup Dependenciesc
à cc cc  c c  c  
cc c c 
c c c  cc

 c c
 c 
c
c
c
 cÔroject Scheduling
cc
c c c c  c c

c  cc cc 
 cc
 cc c
c  c 
 c
c
  c

 cÚisk Management

  ëc Úisk ½dentification
#
c
c c  c c  c  c  cc c c cc c
 c c c c  c c c c cc
  c c c

  c Úisk Analysis
à ccc   cc c c c c  ccc  c c

  c Úisk Ôlanning
! cc  c  c c  c cc
  cc
  c c c
 c  c
c  c c
   cc c  c

c
c

 cèstimation

  ëc èffort èstimation
à cc
 c cc cc   cc c
c

  c ñost Analysis

à c
cc c
c
 cc c c1c
c  c c c c
 c c cc  c  c c
 
 c c   c c
  c   c   c  c  c 
 c c

  cc
c  cc2)Ãcc  ccc   c

 c System Úequirements Study

 ëHardware and Software Úequirements


)  c# ?ccA!c8 c6c
"?c+$&Bcc  c

  ñonstraints

  ë Úegulatory Ôolicies
 c 
 c  cc"   c c c c cc  c  c

   Hardware Limitations
8 c  c
 c
 cc  c   cc cc c cc
c

   ½nterfaces to ^ther Applications


à  cc c  
c c c 
 c
c
   Ôarallel ^perations
! c  cc  c   ccc
  c c c 
 c c
c
   Higher ^rder Language Úequirements
c c cc c cc  c c c  cc
c c
cc

c

   Úelia ility Úequirements


à c ccc c ccc  @c c  c

c
c

c
   ñriticality of the Application
  c c ccc c

c c cc  c c c c cccc c
  c
c
   Safety and Security ñonsideration
à c c  c c
 c cccc

  Assumptions and Dependencies


  c  ?c
$c à c c  cc c  c  c c
&ccà  c  c c c
c

 c System Analysis

 ë Study of ñurrent System


0 c cc  c   cc c c c cc c  c
cc   c c
cc
 c c c c c

  Ôro lem and Weaknesses of ñurrent System


! cc ccà  cc c c c cc   c c c  c
 c c c 


  Úequirements of New System

  ë User Úequirements
à  c  c c c 
c 
 c c 
 c c   c
cc

 c c  c c 
 cc
 c

 System Úequirements

à  c  c c c


cc  c   c cà  c  c cc
 c cc c c)  c c  c c8 cA!cc  c
  cc8 

c   Feasi ility Study

ë * c c c


  cc c  c
 cc c : ;
c
c

(((c 0 c c c c   c c c


 c
 c c  c c c

c c
 c
  ;cc

c
c

((+c 0 c c c c   c c c c 


cc  c c 
;c

 c Úequirements Validation
cc

 c c  c c c 3 ccc
 c  c c c 
c
 c
 c c

 c Activity/Ôrocess ½n New System


c  c c('c

 c Features ^f New System

/c   cc

 cC c c c
 c
# c c
0 c c

 c   cc  c c 3 c


B  c
 c c
0 c   cc
" 
c cc
c
 c ñlass Diagram

c
c

 c System Activity

 ë c ^ ject ½nteraction

à c  c c ccc  c


c 
  cc  c c c

 ëëc Sequence and colla oration diagram

c
c

c
c

 c System Design

 ë System Application Design


9 cc cc  cc  cc
   c c c

 ë ë Method Ôseudo code


  cc 
cc  c

 cc cc c ccc c  c

  Data ase Design


"   c* cc   cc c c cc 3 cc c cc c

  ë Ta le and Úelationship

à  c c'c c   c c#c

?c
c
$c " ?c  c cc c cc c  c
&c 0 ?c   cc
 c
'c   ?c  c  c
c

c
c

 c½nput/output and ½nterface Design


<c c c
 cc  c
 cc  
cc cc

 c

  ëc Samples of Forms, Úeports and ½nterface

Login Form:

Main Window:

c
c

ñheck ½n and ñheck out Form:

£uest ½nformation window:

c
c

Úoom ½nformation Window:

 c½nterface Design

  ëc Access ñontrol and Security


à c
c c

c
  cc ccc  c c c

c c cc
 ccc c c

 c ½mplementation Ôlanning

 ë ½mplementation ènvironment
  c  cc cc c cc  c c2   c */c2 B  c
 cc c  c  cc
c   c
c
  Ôrogram/Modules Specification
à c  c   c  c c  c c  c  c  c  c c
  : c
 c   c c cc   c c cc  c
c 9
 ?c
1 cc : c c
/ cc
 c  c
 c cc
 c c c
 ccc  cc c
  c c  c
 c cc c 
cc c  c
Ã
cc c
 cc c  c c c
c
c
  Security Features

c
c

à cc c  cc  c  c9cc c  c cc  cc
 c c < c c cc
c
 cñoding Standards
à c cc   c cc 
cc c)
)  c   c! c  c
c c ccc c ccc c c0 c c c cc
 c   cc c
 c

 c Testing

 ë Testing Ôlan
9c 
 cc  c  cc  cc  c 
cc  cc c
 c

  Testing Strategy
ccc  cc  c c c c c

 c  c c c 
 c


c

 cTesting Methods
Ãc  c c ?cB c  c

 c/3
c
c  c

 cTest ñases

Test ñase ë: Testing login module


c
è 
 
/c  c  c c  cc   c4#/" *c <ccc c c
 c cc  c

 
D/?c2c 
cc4#/" *c <cEc
c
Test ñase : Testing ñheck in module ³ñHèñ ½N´
c
è 
 
/c  c  c c  cc cc c  cc 3  c c

 
DÃ c  c c  c ?c
" cc c  cc 3  c Ec
c

  ëc Ôurpose
0
 c  c c  
cccc c cc c  c

  c Úequired ½nput

c
c

9c
  cc

ccc c c c 
c  c c cc

  c èpected Úesult
à  c 
 c  c c c
 c

c  c ccc

c

c
 c Limitation and Future ènhancement
1  ?cà c   ccc  c cc c cc c c c
 c c
 c   c c c
cc
 Ã 
c
 @c c cc  c
 c  c
c
c
9 c/ 
?c8 c c cc  c  c c c 
 cc c c
c
 c
 c 
 c c c c   c c c c
c

 c ñonclusion and Discussion

=$cSelf Analysis of Ôroject Via ilities


"  c c c cc

c c@c c

  Ôro lem èncountered and Ôossi le Solutions


c c c

c c  cc

  Summary of Ôroject work


!   c c  cc
 cc c  c  c  c  c c

You might also like