Professional Documents
Culture Documents
Cover i
DECLARATION A ii
DECLARATION B iii
APROVAL SHEET iv
DEDICTION v
ACNOWLADGEMENT vi
ABSTRACT vii
LIST OF TAPLE xi
CHAPTER I: Introduction
1.0 Introduction 1
i
1.6 Significance Of The Project 5
2.1 Introduction 7
3.0 Introduction 14
ii
3.5.1 Interview 21
3.5.2 Observation 22
3.6.2 UML 25
iii
4.0 Introduction 36
CHAPTER V: SYSTEM
IMPLEMENTATION AND OPERATION
5.0 Introduction 47
iv
5.3 Test system implementation 49
6.0 Introduction 53
References 56
Appendices A 57
Appendices B 58
Appendices C 59
v
LIST OF TABLES
Table 1 22
vi
LIST OF FIGURES
FIGURE NO DESCRIPTION PAGE
Figure 10 Payroll 37
Figure 12 Payment 38
Figure 18 Detergent 46
vii
CHAPTER ONE
INTRODUCTION
1.0 INTRODUCTION
The Point-of-Sale system is designed to control all areas of activity within Parts,
Service and Bodyshop environments. It monitors all aspects of Work-in-Progress
and records all sales transactions for parts and labour.
There is also a full customer backorder system that controls all orders for parts all
the way through from time of request, to ordering on your supplier, to eventually
clearing your customer backorder when the goods are received.
The system allows the printing of various documents such as:
1
Manual sales and inventory process was prone to errors that required time to
rectify discrepancies (“Inventory”, nd.). Since manual inventory consumes a lot
of time and is susceptible to errors, it would be helpful to build a system that will
automate the transactions from acquisition of the product description to updating
the inventory database. Work efficiency of employees is defined as how
productive they are in their work (“Inventory”, nd.). The causes of the
discrepancies in the records are many, and some of the commonly observed ones
are: stock loss; transaction error, inaccessible inventory, and incorrect product
identification. Stock loss, also known as shrinkage in industry, includes all forms
of loss of the products available for sale. One common example is theft, which
can be committed by both shoppers (external theft) and employees (internal theft).
With these problems of manual inventory system, businesses emerged with
computerized Point of Sales and Inventory System. It tracks purchases and sale
transactions thought an organization. Point of Sale and Inventory System is a tool
used by retail businesses such as stores, supermarkets, and restaurants. It can
register the purchase and keep track of inventory. It also records information on
the purchase including time and store location. It also manages the sales of retail
goods. It makes a business much more efficient, lowering the costs of running the
business while improving customer service and making the business more
pleasant to work in (Smith & Harris, 2011) According to Hendeson (2011), that
effective tracking of inventory is an imperative component to a small business
successful operation. By having up-to-date data regarding all needed stocks for
sale, the organization will drastically increase its bottom line. The amount of time
that can be saved by the company is the biggest benefits of using a computerized
point of sale and inventory system. Another benefit of a computerized point of
sale and inventory system is the accuracy it ensures. The companies operation will
be more effectively. The business owner or the manager can ensure that the
reports, purchased order and other documents related to sales and inventory are
uniform regardless of two created the reports (What are the benefits of
Computerized Sales and Inventory, n.d.). According to ruffling (2009), senior
director of retail services for BBK Ltd., the trends in Sales and Inventory System
are not just inventory accuracy but the use of pricing models to allow for
markdown management. Based from the problems encountered in a manual point
of sales and inventory system, developers come up with this computerized point
2
of sales and inventory system. Developers have chosen Thirsty Teddy Refilling
Station and The Sierra Spa started its operations in the year 2012 by Mr. Randy
S. Quiniones. It is located at Sierra Heights Place, Sierra Madre St. Highway Hills,
Mandaluyong City. The company is currently using a manual inventory system
but aims for improvement to be competitive. In small businesses, inventory
system is still applicable because of the advantages it provides the management.
.1.2 PROBLEM STATEMENT
Point of sale systems, commonly found in retail establishments and known as
POS, often feature a complex arrangement of hardware, software and network
connections. POS systems rely on predictable operation, and any number of
problems can appear when hardware, software or users do not perform as
expected.So, I'm doing a project book point of sale management System and
information system that solves all of that needs.
3
1.3 PURPOSE OF THE PROJECT
A purpose of point of sale is, the place where the sales-transaction (the exchange
of goods/services for money, etc) occurs. can be virtually anywhere but depends
on goods/services being offered. here a some good point of sale software in market
like hdpos and many more they provide.
Like any other project this project has both geographical scope and time scope the
geographical scope of this project will be around the capital city of Somalia
Mogadishu particularly this project will take place in pos which is the case study for
my project so that I am going to develop this project for them the time scope for this
project will be between 3 november (as a start date) and may 2020(as an end date).
Points of sale (POSs) are an important focus for marketers because consumers tend
to make purchasing decisions on high-margin products or services at these strategic
locations. Traditionally, businesses set up POSs near store exits to increase the rate
of impulse purchases as customers leave.
The organization of this thesis of point of sale management Information System will
Contain 6 chapters. The following paragraphs will show
Chapter Four: Proposes the design of the online project for based Design and Develop
of a Web-based parent record keeping information System in details using Entity
Relationship Diagram (ERD), Database design, table design and form design. Chapter
Five: is the last phase of the project and describes the implementation of this project
and testing it to produce complete functioning system.
Chapter Six: Finally, this chapter provides conclusion and recommendations by
describing the strengths and achievements of the projects. This chapter also gives the
weaknesses of the based Design and Develop of a Web-based parent record keeping
information System and its future enhancements.
5
CHAPTER TWO
L ITERATURE REWIEW
2.0 INTRODUCTION
6
2.1 THEORETICAL ANDCONCEPTUAL DEVELOPMENT
This section will discuss the concepts of Design and Implementation point of sale
management system.
The point of sale (POS) or point of purchase (POP) is the time and place where a
retail transaction is completed. At the point of sale, the merchant calculates the amount
owed by the customer, indicates that amount, may prepare an invoice for the customer
(which may be a cash register printout), and indicates the options for the customer to
make payment. It is also the point at which a customer makes a payment to the
merchant in exchange for goods or after provision of a service. After receiving
payment, the merchant may issue a receipt for the transaction, which is usually printed
but can also be dispensed with or sent electronically.
To calculate the amount owed by a customer, the merchant may use various devices
such as weighing scales, barcode scanners, and cash registers (or the more advanced
"POS cash registers", which are sometimes also called "POS systems"). To make a
payment, payment terminals, touch screens, and other hardware and software options
are available.
The point of sale is often referred to as the point of service because it is not just a point
of sale but also a point of return or customer order. POS terminal software may also
include features for additional functionality, such as point of sale management.
Businesses are increasingly adopting POS systems, and one of the most obvious and
compelling reasons is that a POS system does away with the need for price tags.
Selling prices are linked to the product code of an item when adding stock, so the
cashier merely needs to scan this code to process a sale. If there is a price change, this
can also be easily done through the inventory window. Other advantages include the
ability to implement various types of discounts, a loyalty scheme for customers, and
more efficient stock control, and these features are typical of almost all modern ePOS
systems
7
SYSTEM
The “System” concept is a collection of elements or components that are organized
for a common purpose. The word sometimes describes the organization or plan itself
(and is similar in meaning to method, as in "I have my own little system") and
sometimes describes the parts in the system (as in "computer system")(yolex, 2010).
System is a set of things working together as parts of a mechanism or an
interconnecting network; a complex whole. System is group of related hardware units
or programs or both, especially when dedicated to a single application. System is a set
of organs in the body with a common structure or function. System is a set of
principles or procedures according to which something is done; an organized scheme
or method.(liolerin, 2014)
A set of detailed methods, procedures and routines created to carry out a specific
activity, perform a duty, or solve a problem.
INFORMATION SYSTEM
Information system, an integrated set of components for collecting, storing, and
processing data and for providing information, knowledge, and digital products.
Business firms and other organizations rely on information systems to carry out and
manage their operations, interact with their customers and suppliers, and compete in
the marketplace. Information systems are used to run inter organizational supply
chains and electronic markets. For instance, corporations use information systems to
process financial accounts, to manage their human resources, and to reach their
potential customers with online promotions. Many major companies are built entirely
around information systems. These include eBay, a largely auction marketplace;
Amazon, an expanding electronic mall and provider of cloud computing services;
Alibaba, a business-to-business e-marketplace; and Google, a search engine company
that derives most of its revenue from keyword advertising on Internet searches.
Governments deploy information systems to provide services cost-effectively to
citizens. Digital goods—such as electronic books, video products, and software—and
online services, such as gaming and social networking, are delivered with information
systems. Individuals rely on information systems, generally Internet-based, for
conducting much of their personal lives: for socializing, study, shopping, banking, and
entertainment (Vladimir Zwass, 2016).
8
As information systems enabled more diverse human activities, they exerted a
profound influence over society. These systems quickened the pace of daily activities,
enabled people to develop and maintain new and often more-rewarding relationships,
affected the structure and mix of organizations, changed the type of products bought,
and influenced the nature of work. Information and knowledge became vital economic
resources. Yet, along with new opportunities, the dependence on information systems
brought new threats. Intensive industry innovation and academic research continually
develop new opportunities while aiming to contain the threats (Vladimir Zwass,
2016).
The level of complexity of the system will depend on each organization’s specific
context. For some organizations, especially smaller ones, it may simply mean having
strong leadership from the business owner, providing a clear definition of what is
expected from each individual employee and how they contribute to the organization’s
overall objectives, without the need for extensive documentation. More complex
businesses operating, for example, in highly regulated sectors, may need extensive
documentation and controls in order to fulfill their legal obligations and meet their
organizational objectives.(soxil, 2016).
proprietary licenses. As of May 2007, in compliance with the specifications of the php
Community Process, Sun had relicensed most of its php technologies under the GNU
MySQL
9
objectoriented scripting language. (Sometimes Perl or Python is used instead of PHP.)
MySQL, which was originally conceived by the Swedish company MySQL AB, was
acquired by Sun Microsystems in 2008 and then by Oracle when it bought Sun in
2010. Developers can still use MySQL under the GNU General Public License (GPL),
but enterprises must obtain a commercial license from Oracle. (Margaret , MySQL,
2013)
2.2 CASE STUDY OF THE RESEARCH
Retail Point of Sale Software Case Study: Harold’s Lighting - Wasp Barcode. Wasp
QuickStore™ Point-of-Sale lights the way to a Brighter Future Harold’s Fine Home
Lighting is a company based on tradition. Harvey Hanson started the business during
the depression when he used his artistic skills to create lamps and then sell them
doorto-door..
MISSION –
VISION – Welcome to DataMax Services Let us help you find your next point of sale
system, pos product or bar code scanner! Many companies supply point of sale
systems and POS products to support today's retailer.
There are a lot of systems that are similar to (pos Parent Record keeping
Information System) so they have some differences when compared with this system.
LEGAL pos
10
of each inventory item, department, or supplier; and creating reports for use in making
purchases, reorders, etc. Basic point-of-sale systems currently in use include stand
alone electronic cash registers, also known as ECRs; ECR-based network systems;
and controller-based systems. All of these function essentially as sales and cash
management tools, but each has unique features.
11
2.5 CHAPTER SUMMARY
This chapter has discussed many topics starting with the definition of book point of
sale and its history: also it has explained the conceptual and the theoretical
development of appointment management system and the future of this chapter also
included the comparison of the current existing pos record keeping information
systems finally the chapter has concluded with mentioning the features and
advantages of the new system over the system.
12
CHAPTER THREE
SOFTWARE PLANNING AND ANALYZING
3.0 Introduction
This chapter will talk about the software development methodology which
Illustrates more points like the operational framework preliminary system study,
system requirements, problem analysis identification, requirement gathering
techniques, use case analysis, process modeling, data modeling, new proposed system,
solution strategy and system feasibility and affordability, finally the chapter will be
concluded with summary.
Planning: A basic management function involving formulation of one or more
detailed plans to achieve optimum balance of needs or demands with the available
resources. (definition/planning.html, n.d.)
Software Analyses is Software analysis patterns or analysis patterns in software
engineering are conceptual models, which capture an abstraction of a situation that
can often be encountered in modelling.(Software_analysis_pattern, n.d.) This chapter
will include the following sections: Introduction, Operational Framework, Work
Break down structure (WBS), System Requirement, Problem
Analysis Identification, Requirements Gathering Techniques, Process Modeling, Data
Modeling, Suitable solution Strategies of the proposed system, System Feasibility and
Chapter Summary.
13
3.1 Operational Framework
14
3.2 Work Break down structure (WBS)
Work break down structure (WBS) is a vehicle for breaking an engineering project
down into subproject, tasks, subtasks, work packages, and so on. It is an important
planning tool which links objectives with resources and activities in a logical
framework. It becomes an important status monitor during the actual implementation
as the completions of subtasks are measured against the project plan.(Tausworthe,
1984)
A) WBS product
15
B) WBS process
a) User Interfaces: The keyboard, mouse, menus of a computer system. The user
interface allows the user to communicate with the operating system.
b) Software Interfaces: The languages and codes that the applications use to
communicate with each other and with the hardware.
c) Hardware Interfaces: The wires, plugs and sockets that hardware devices use to
communicate with each other, computer systems, or any other medium of
16
communication. A physical interface is the interconnection between two items of
hardware or machinery.
One of the critical success factors in the development of high quality software product
or website is the deep understanding of the user’s real requirement as opposite to their
perceived requirements. This will make the product very easy to develop, maintain,
and to use the software properly by the end users.
User requirement is the process by which user desires, needs, and expectations are
gathered in order to establish what the users will actually use the software for, and
recorded in a way that will be meaningful both to the users and developments.
17
Software Requirements
2 Corei3 or Corei5
A customer cannot demand features not in the user requirement document (URD)
while the software developer cannot claim the product is complete and ready if it does
not meet even one item of the user requirement document (URD).
Although the current system is no sufficient to fulfill the needs of the family head or
family administrator, it will become very hard to apply after the development of this
system because the new System will be expected to handle all tasks automatically in
18
registering customers appointments and experts the new Online point of sale
management system will offer user friendly flexibility, efficient environment, user
respondent, error tolerant, ready for and some security features.
Researcher is going to develop this project for Parent the system is very important to
keep the records of the activities of all family members, now the head of the family
uses manual system to record of the family, The key problem involved with the current
system so now it is very difficult to estimate the expenses of the family daily, monthly
or even yearly after. Investigated working system process carefully, it has been
discovered that the current system has the following limitations such as:
• . {Update search, delete edit} these types of methods are not accessible
Not carry with the manual method.
• Correction data or information is difficult
19
the research. Data can be divided in to two categories: primary data and secondary
data. In this research, the primary data comes from observation to the respondents.
First, the observation will be carefully evaluated and to ensure its validity and
reliability by pilot test. There are various methodologies for gathering data as the
following:
Interviews Observations
3.5.1 Interview
Advantages of interview
The main advantage of interviews is that the researcher (interviewer) can adapt the
questions as necessary, clarify doubt and ensure that the responses are properly
understood, by repeating or rephrasing the questions. The researcher/interviewer can
also pick up nonverbal cues from the respondent.
Any discomfort, stress and problems that the respondent experiences can be detected through
frowns, nervous taping and other body language, unconsciously exhibited by person.
20
whom they are interviewing. By reading the facial expression of the respondent the
interviewer can easily understand what the respondent want to tell them about
anything (answers-yahoo, 2017)
Disadvantages of interview
B: Observer’s document program activity takes time and cost gathering providing
documentation, rather than relying on recollections of the events.
Disadvantages of observations:
A. Observer bias may occur. (Observer may only notice what interests him or her).
With participant’s observation, a skilled facilitator is needed to help participants
present a critical evaluation.
3.6 Process Modeling
A process model is a formal way of representing how a computer system operates. It
illustrates the processes or activities that are per-formed and how data move among
them. A process model can be used to document the current system (i.e. as-is system)
21
or the new system being developed (i.e. to-be system). Whether computerized.
Process modeling is the process and analysis of data and objects that are used in
business or other context and identification of the relationship among these data
objects. Data modeling is a first step in doing object oriented Programming and
involves professional data modelers working closely with business stakeholders, as
well as potential users of information system
3.6.1 Data flow Diagram (DFD)
Data Flow Diagrams show information transfers and process steps of a system. The
general concept is an approach of a depicting how occurs input in a The aim of DFD
is in accomplishing of understanding between developers and users. Data flow
diagrams are maintained with other methods of structured systems analysis. A data
flow diagram (DFD) illustrates how data is processed by a system in terms of inputs
and outputs. As its name indicates its focus is on the flow of information, where data
comes from, where it goes and how it gets stored.
The Data Flow Diagrams solution from the Software Development area of Concept
Draw Solution Park provides three vector stencils libraries for drawing DFD using the
Concept Draw PRO diagramming and vector drawing software.The design elements
library Data flow diagram (DFD) contains 15 data flow diagram symbols for drawing
both context-level data flow diagram and Level 1 DFD.
22
The design elements library DFD, Gane-
Sarson notation
Process
Figure 3. 4 UCD
UML stands for Unified Modeling Language, UML is a way of visualizing a software
program using a collection of diagrams. The notation has evolved from the work of
Grady Booch, James Rumbaugh, Ivar Jacobson, and the Rational Software
Corporation to be used for object-oriented design, but it has since been extended to
cover a wider variety of software engineering projects. Today, UML is accepted by
the Object Management Group (OMG) as the standard for modeling software
development(smartdraw, 2017)
The key to making a UML diagram is connecting shapes that represent an object or
class with other shapes to illustrate relationships and the flow of information and data.
To learn more about creating UML diagrams:
23
Types of UML Diagrams
The current UML standards call for 13 different types of diagrams: class,
activity, object, use case, sequence, package, state, component, communication,
composite structure, interaction overview, timing, and deployment.
These diagrams are organized into two distinct groups: structural diagrams and
behavioral or interaction diagrams.
• Class diagram
• Package diagram
• Object diagram
• Component diagram
• Composite structure diagram
• Deployment diagram
Behavioral UML diagrams
• Activity diagram
• Sequence diagram
• Use case diagram
• State diagram
• Communication diagram
• Interaction overview diagram
• Timing diagram
3.6.2.1 Use Case Diagram (UCD)
A use case is a methodology used in system analysis to identify, clarify, and organize
system requirements. The use case is made up of a set of possible sequences of
interactions between systems and users in a particular environment and related to a
particular goal. It consists of a group of elements (for example, classes and interfaces)
that can be used together in a way that will have an effect larger than the sum of the
separate elements combined(techtarget, 2017).
A use case diagram shows you some of the use cases in your system, some of the
actors in your system, and the relationships between them. A use case is a high – level
24
piece of functionality that the system will provide. An actor is anyone or anything that
interacts with the system being built.
Use case diagram is done in an early phase of a software development project. The
use case diagram describes the use case (functions of the system), Actors (users) and
the relationship between the actors and the use case is connective
Figure 3. 5 UCD
25
Figure 3. 6 Use Case Diagram
26
3.7 Data Modeling
Data modeling is the analysis of data objects and their relationships to other data
objects. Data modeling is often the first step in database design and object-oriented
programming as the designers first create a conceptual model of how data items relate
to each other. Data modeling involves a progression from conceptual model to logical
model to physical schema(webo, 2017).
Data modeling is the process and analysis of data and objects that are used in business
or other context and identification of the relationship among these data objects. Data
modeling is a first step in doing object oriented Programming and involves
professional data modelers working closely with business stakeholders, as well as
potential users of information 3.7.1 EntityRelationship Diagram
An entity-relationship (ER) diagram is a specialized graphic that illustrates the
interrelationships between entities in a database. ERD show entities in a database and
relationships between tables within that database. It is essential to have one of these
if you want to create a good database design. The patterns help focus on how the
database actually works with all of the interactions and data flows, although another
useful tool is a Data Flow Diagram (DFD) which more directly describes this.ERD is
a detailed, logical representation of the entities, associations and data elements for an
organization or business. ERD is a graphical modeling tool to standardize ER
modeling; the modeling can be carried out with the help of pictorial representation of
entities, attributes and relationships(lucidchart, 2017). The basic building blocks of
ERD are Entity, Attributes, Relationship and lines entity is an object that exists and is
distinguishable from other object in other words Entity types or Entity set is a
collection of similar entities; an entity may belong to more than one entity type. A
relationship is an association of entities where the association includes one entity from
other particular types is meaningful association before entity types. Attributes are
properties of entity types in other words; entities are described in a data base by a set
of attributes(Peter Pin-Shan Chen, 1976)
3.7.1.1ERD SYMBOLS
The ERD is used to represent database schema, here are some symbols used to
represent ERD Symbols:
A rectangle represents an Entity.
An Ellipse represents an attribute.
27
A diamond represents a relationship
Lines represent linking of attributes to entity sets & of entity sets to relationship
sets.
Figure 3. 7 ERD
28
Many to One Relationship Type: Abbreviated M: 1, the relationship between
MPLOYEE and DEPARTMENT is an example of many to one relationship,
Three may be EMPLOYEE working in one DEPARTMENT hence relationship
And DEPARTMENT is many to one relationship. (s.sumathi.2007)
Table 3. 3 ERD
Relation Type Representation
One-to-one
One-to-many
Many-to-many
Many-to-one
29
3.8 Suitable Solution Strategies of The Proposed System
As we are reaching the development phase, this section would contemplate on other
ways project’s objectives can be achieved. As you may know, the system will be
developed in Android. programming language and it is the most used or popular.
A feasibility study could be used to test a new working system, which could be used
because the Feasibility study is an analysis of possible alternative solutions to a
problem and a recommendation on the best alternative. It can decide whether a process
be carried out by a new system more efficiently than the existing one.
1. Technical Feasibility.
2. Operational Feasibility.
3. Economic Feasibility.
4. Schedule Feasibility.
Total $400.00
Table 3. 5 Items
Total Free
31
3.9.2 Operational Feasibility
Total $900.00
The benefit analysis is to determine benefits and saving which are expected from
candidate system and compare them with cost. If the benefits are more than the cost,
the decision is made to design and implement the system. The cost and benefits may
be direct or indirect and tangible or intangible.
32
Total $1300.00
Typically this means estimating how long the system will take to develop, and if it
can be completed in a given time period using some methods like payback period.
Schedule feasibility is a measure of how reasonable the project timetable is.
This involves questions such as how much time is available to build the new system,
when it can be built , whether it interferes with normal business operation, number of
resources required, dependencies, can the system be developed in time etc. The project
duration schedule is explained in the following.
3 Coding 6 week
Total 28 week
SOFTWARE DESIGN
4.0 Introduction
This chapter will discuss about the software design of the Design & Develop of web-based
cash receipt generation system for notary. Designing is the most significant phase of software
development it requires a careful planning and philosophy on the part of the system designer.
The design phase involves converting the System Requirement Specification (SRS) identified
during the initiation and planning phases in to a logical Design and then into Physical Design
that the technical programmer can follow to develop the project during the development
phase. Design will play a bigger role in every project, therefore; developing a good design is
needed and related to have enough information.
34
4.2 User Interface Design
Interface design is the process of defining how the web will interact with the external entities
“web apps or other web browsers”. It describes the layout of the pages and the flow of events
and is also concerned with where and how data are represented on the pages. However, in a
User Interface Design, the needs, experience, and capabilities of the web users must be taken
into account. In addition, the designers should be aware of users‟ physical and mental
limitations. The user of this digital system doesn’t need any software to install, but only
requires a browser interface to access it. To access the web, users will be required to have
login through the web login page, which can be accessed via homepage.
Normalization is the process of organizing data in a database. This includes creating tables
and establishing relationships between those tables according to rules designed both to
protect the data and to make the database more flexible by eliminating two factors:
redundancy and inconsistent dependency. Redundant data wastes disk space and creates
maintenance problems. Most popular Normalization stages include.
First Normal Form(1NF), Second Normal Form(2NF) and Third Normal Form(3NF)
36
4.4.3 Second Normal Form (2NF)
A relation is in second normal form (2NF) if it is in first normal form and contains no
partial functional dependencies. A partial functional dependency exists when a
nonkey attribute is functionally dependent on part (but not all) of the primary key. To
convert a relation with partial dependencies to second normal form, the following
steps are required: Create a new relation for each primary key attribute (or
combination of attributes) that is a determinant in a partial dependency. That attribute
is the primary key in the new relation. Move the non-key attributes that are dependent
on this primary key attribute (or attributes) from the old relation to the new relation.
A database is in second normal form if it satisfies the following conditions:
• It is in first normal form
• All non-key attributes are fully functional dependent on the primary key
37
new relation. 3) Leave the attribute that serves as a primary key in the new relation in the
old relation to serve as a foreign key that allows you to associate the two relations. table
and stays as foreign key in the old table.
A database is in third normal form if it satisfies the following conditions:
• It is in second normal form
• There is no transitive functional dependency
38
2 Suldan xusen shangaani 2021-05-2020
39
4.4.6 Transforming E-R Diagrams into Relations
Documents, and organize specific facts about system include the data flows, data stores,
external entities, and processes. The data dictionary also defines and describes all data
elements and meaningful combinations of relations.
40
1Children Table
Column Type
ID (Primary) int(11)
Name varchar(50)
MotherName varchar(50)
Gender varchar(20)
Age varchar(10)
ClassID int(11)
RegDate
ID (Primary) int(11)
ClassName varchar(100)
SchoolID
41
3Discipline Table
Column Type
ID (Primary) int(11)
int(11)
StudentID
varchar(100)
Description
date
Date
ID (Primary) int(11)
varchar(100)
LocationName
42
ID (Primary) int(11)
SchoolName varchar(100)
LocationID int(11)
Phone1 varchar(20)
Phone2 varchar(20)
6 Users Table
Column Type
ID (Primary) int(11)
varchar(50)
Username
varchar(50)
Password
varchar(20)
RecoveryPin
43
bars, toolbars, dialog boxes, text boxes, command buttons, list boxes, scrollbars, drop-down,
group boxes, check boxes, and more others. The design of data entry screens shall consist of
the following forms is used to o register the locations or addresses of the users of the system.
44
This Login form is used to check other users
Above form design is used to register and modify users of the system, a system without
user management isn’t a good.
Figure 4. 3 develper
45
CHAPTER FIVE
SYSTEM IMPLEMENTATION
5.0 INTRODUCTION
System implementation is a process of ensuring that the information system is
operational. Implementation allows the users to take over its operation for use and
evaluation. It involves training the users to handle the system and plan for a smooth
conversion.(implementation, 2018)
This chapter will include Coding phase, Test system implementation, development
testing, release testing, user testing, developing user manuals and chapter summary.
The coding phase of the software life-cycle is concerned with the development of
code that will implement the design. This code is written is a formal language called
a programming language. Programming languages have evolved over time from
sequences of ones and zeros directly interpretable by a computer, through symbolic
machine code, assembly languages, and finally to higher-level languages that are
more understandable to humans. (INN, 2009)
This Phase is devoted to providing access to most of the computer programs that the
researcher used to prepare the data and apply the programming is techniques,
instructions on how to construct this application project using the software available
on the attached compact disk (CD).
46
5.2 Sample Code
<?php
/**
* CodeIgniter
/*
*---------------------------------------------------------------
* APPLICATION ENVIRONMENT
*---------------------------------------------------------------
*
/*
*---------------------------------------------------------------
* ERROR REPORTING
*---------------------------------------------------------------
*
* Different environments will require different levels of error reporting.
* By default development will show errors but testing and live will hide them.
*/
switch (ENVIRONMENT)
{
case 'development':
error_reporting(-1);
ini_set('display_errors', 1);
break;
case 'testing':
case 'production':
ini_set('display_errors', 0);
if (version_compare(PHP_VERSION, '5.3', '>='))
{
}
47
5.3 Test system implementation
The testing phase involves some modification to the pervious design phase and system
testing has been done to minimize the programming errors.
Testing the system is a very important stage to ensure that all system requirements
have been developed without errors. System testing can be done through some stages.
These include.
1. Developing test
2. Release test
3. User test
This testing shows as if wrong username and password is entered can’t allowed to
access the system.
Prior to making a software system available for public consumption, a series of tests
should be conducted to ensure the software runs as intended. Flaws are fixed and
48
inefficiencies removed to come up with a program that runs seamlessly. A battery of
tests is conducted with a view towards identifying and fixing bugs, which are a
precursor for system failure. It is an essential part of the Software Development Life
Cycle (SDLC), and may perhaps be considered the most important aspect, aside from
design and coding. Indeed, the quality of the product plays a huge part in setting the
stage for the acceptance and success of subsequent ones in the market. With this in
mind testing hitherto release of software should not be taken for granted. (Brown,
2016)
The ability to evaluate and ensure the quality of in-process and/or final product based
on process data, which typically include a valid combination of measured material
attributes and process controls. A release is the distribution of the final version of an
application. A software release may be either public or private and generally
constitutes the initial generation of a new or upgraded application.
User testing refers to a technique used in the design process to evaluate a product,
feature or prototype with real users. There are several reasons why you might want
to undergo usability testing, the most common is that it allows the design team to
identify friction in a user experience they are designing, so that it can be addressed
49
before being built or deployed. Identifying any issues early reduces the long-term
cost. (user-testing, 2018)
This system has been tested by the user (alpha testing), the developer and the user
(beta testing), and the user only in his work location (Acceptance testing).
Alpha Test: An alpha test is a preliminary software field test carried out by a team of
users in order to find bugs that were not found previously through other tests. The
main purpose of alpha testing is to refine the software product by finding (and fixing)
the bugs that were not discovered through previous tests.(alpha-test, 2017)
Beta Test: Beta testing is also sometimes referred to as user acceptance testing (UAT)
or end user testing. In this phase of software development, applications are subjected
to real world testing by the intended audience for the software. The experiences of
the early users are forwarded back to the developers who make final changes before
releasing the software commercially.(Rouse, 2015)
Figure 5. 3Dashboard
50
online information (including online versions of the technical manuals and help
facility descriptions).
The term is also sometimes used to mean the source information about the product
contained in design documents, detailed code comments, white papers, and
blackboard session notes. The term is derived from the idea that engineers and
programmers.
Also, is a general term for a multiplicity of documents in a chosen mix of media and
with a certain collection. Purpose of documentation is the use to support a tool or a
process. Classical documentation is a set of documents printed on paper
51
CHAPTER SIX
6.0 INTRODUCTION
This chapter covers the achieved objectives of the project and demonstrates how the works
of this project is implemented. Also, it debates the experiences that have been gained during
development of this project and it also includes the future recommendation which will
facilitate how to improve the functionality and features of this system in the future.
The key objective for developing this project is to develop point of sale management
information system; the project will be applicable to the other universities. Furthermore,
here are the details of the project objectives that have been accomplished.
1. The researcher designed the point of sale management system using modeling
tools such as unified modeling language (UML) diagrams including use cases diagram
and class diagram.
2. The research coded the proposed system and tested it; during implementation
phase of the project using with JSP for end and MYSQL for back end, and eventually
achieve this objective properly.
Generally, all the objectives above mentioned have been attained and the constraint
of the users has been met through the project.
Through the process of developing this project, I have faced some complications
and constraints. Some of these difficulties related to the study of the project and its
related topics and others are related to the implementation and design of the
project. The most important challenges faced are underlined as follows:
• Designing of the project was the difficult challenge that I have faced since
more alternatives are considered.
• Challenges to learn how php server page function, and their technologies
52
• Difficulties were faced during design the project of the project, such as
normalization processes and etc.
• Following and keeping malaria app thesis format and guidelines was one of
the most difficult tasks to encounter during the certification of the report.
• Other challenges include lack of time which also was one of the challenges
confronted during the implementation of the system.
A lot of experiences have been gained during this project such that the literature
review provided knowledge of existing system of php systems for universities, and
also it helps in identifying the weaknesses and the strengths of the developing
system by comparing the features of the system that is going to be developed with
three existing systems which are related to it.
2. To add helpdesk for the sake of solving the problems may be faced by the new user
of the system.
3. To extend scope of the project and include extra modules and functions.
53
REFERENCE
Point of sale (POS) systems are electronic systems that provide businesses with the capability to
retain and analyze a wide variety of inventory and transaction data on a continuous basis. POS
systems have been touted as valuable tools for a wide variety of business purposes, including
refining target marketing strategies; tracking supplier purchases; determining customer purchasing
patterns; analyzing sales (on a daily, monthly, or annual basis) of each inventory item, department, or
supplier; and creating reports for use in making purchases, reorders, etc. Basic point of sale systems
currently in use include standalone electronic cash registers, also known as ECRs; ECR-based
network systems; and controller-based systems. All function essentially as sales and cash
management tools, but each has features that are unique.
Standalone ECRs. These electronic registers operate independently of one another, and are thus the
most limited of the three POS system types. They cannot provide their owners with storewide
reporting or file sharing; they can merely report the business activity at that particular register. Given
its limitations, ECRs are usually used by small independent retailers that feature a limited number of
register sites. Indeed, these systems are often well suited for small businesses because they are the
least expensive of the POS system options, they nonetheless provide many helpful features,
including automatic sales and tax calculation ability; calculation of change owed to the customer;
sales report generation capability; capacity to sort food stamps and trading stamps (through
programming of function keys); and scanning.
Network Systems . Network or ECR-based point-of-sale systems feature multiple terminals arranged
into a primary/secondary configuration. One ECR in the store, equipped with extra memory capacity,
serves as the primary terminal and receives data from the secondary terminals. These systems give
businesses the added capacity to manage storewide data and transmit data to mainframe systems.
Controller-Based POS Systems . The top POS systems are controller-based systems in which each
terminal is connected to a computer—the "controller" of the system— which receives and stores all
sales, merchandise, and credit data. "The controller checks all data from the terminals for
transmission errors and reformats the data for use by the headquarters computer," explained Chain
Store Age Executive. "It may also perform sales analysis and price look-up. By having a dual-
controller arrangement in which the computers back each other up, the chance for a total system
failure can be reduced. Because of the importance of accurate data capture in sophisticated point-of-
sale systems, retailers are increasingly turning to scanning as an alternative to error-prone keypunch
entry." Indeed, scanning became a ubiquitous feature in many of the nation's most modestly-sized
retail outlets during the 1990s.
Point of sale systems, like many other computer based innovations, continue to change and develop
at a rapid pace. In addition, the demand for POS systems has spawned many new manufacturers,
each of which offer a dizzying array of standard and optional POS features to their customers. For
example, some electronic POS systems now cover hand-held scanning devices, customer
73
promotions, credit-card confirmations, counterfeit money checks, and staff scheduling. Given the
expense involved and the proliferating number of POS software packages, small business owners
should make sure that they adequately research both their current and future needs before making a
purchase, so that they are able to acquire a customized POS system that best fills their current
operating requirements and can accommodate future changes in the business. "Consider value—don't
make your decision on price alone," counseled National Petroleum News. "Look for a high level of
connectivity and compatibility with a multitude of peripherals. Demand customization capabilities.
Don't accept a system that's almost what you want when today's technology makes it possible to
customize one to exactly what you need."
Blair, Adam. "POS Data to Power Efficient Distribution." Supermarket News. March 22, 1999.
Durocher, Joseph. "Point of Departure: Don't Think of Your POS System as Merely a Cashbox but
Rather as a Management Tool." Restaurant Business. September 1, 1994.
Field, Christopher. "POS Man Always Rings Twice." Computing. October 22, 1998.
Murphy, Patricia A. "Cash Management Issues Foster Electronic Payments at Point of Sale." Stores.
July 1999.
"Systems to Keep the Checkout Counter Humming." Chain Store Age Executive. October 1990.
APPENDICES
Appendix A – Budget
Items Unit Cost Units Total
Printing Costs
74
Appendix B – Time Frame of the Development of the proposed system
Nov Dec Jan Feb Marc April May
h
search Proposal
roduction
erature Review
ftware
nning
ftware Design
ftware Development
plementation &testing
nclusion
APPENDIX C