0% found this document useful (0 votes)
228 views29 pages

Cyber Cafe Management System Project

This document appears to be a project report for developing a cyber cafe management system by two students, Surandyam M and Ayesha Banu S, under the guidance of their professor Mrs. Josephine Prapulla. The report includes sections on system analysis, hardware and software requirements, overviews of the development tools Visual Basic and Microsoft Access, database design, system testing, screenshots of the design, and coding details. The project aims to automate the management of a cyber cafe using a computerized system.

Uploaded by

Surandya
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
228 views29 pages

Cyber Cafe Management System Project

This document appears to be a project report for developing a cyber cafe management system by two students, Surandyam M and Ayesha Banu S, under the guidance of their professor Mrs. Josephine Prapulla. The report includes sections on system analysis, hardware and software requirements, overviews of the development tools Visual Basic and Microsoft Access, database design, system testing, screenshots of the design, and coding details. The project aims to automate the management of a cyber cafe using a computerized system.

Uploaded by

Surandya
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd

GOODWILL CHRISTIAN COLLEGE FOR WOMEN

#10, Promenade Road, Bangalore-560005

Department of Computer Application


Project on:

CYBER CAFE MANAGEMENT SYSTEM

By

SURANDYA.M and AYEESHA BANU.S


Reg no: 17XXSB7033, 17XXSB7004

Under the guidance of

Mrs. Josephine Prapulla


Cyber
CAFE
MANAGEMENT
SYSTEM
CERTIFICATE

This is to certify that SURANDYA. M AND AYEESHA BANU.S


has satisfactorily completed course task in Mini Project CYBER CAFE
MANAGEMENT SYSTEM in partial fulfilment of the requirement for
the award of degree in BACHELOR’s OF COMPUTER
APPLICATION prescribed by the BANGALORE UNIVERSITY for
the year 2017-2018. Under the guidance of Mrs. Josephine Prapulla
Head of the Department: Mrs. Josephine Prapulla

Principal: Mrs. Renuka Paul

Examiner: Date:
ACKNOWLEDGEMENT

On the occasion of presenting this project report, we wish to


express our deep and profound feelings of gratitude to a number of
persons who have contributed to the completion of this project.

First of all we express our deep gratitude to Almighty, the


supreme guide, for bestowing his blessings upon us in our entire
endeavour.

We are grateful to our respected Principal Mrs. Renuka


Paul for providing all facilities for the development of our project.

We also express our heartfelt gratitude to Mrs.


Josephine Prapulla our Head of the Department for rendering all
possible help and support during the development and implementation
and presentation of the project.
Table of Content
 Introduction
 System Analysis
 Hardware & Software Requirement
 Overview of Front-end tool(VB)
 Overview of Back-end tool(MS access)
 Database Design
 Data Dictionary
 DFD
 System Testing
 Design Screenshots
 Coding
 System Implementation
 Conclusion
 Bibliography
SYSTEM ANALYSIS
System development can generally be thought of as having two
major components: System Analysis and System Design.
System Design is a process of planning a new system or replace or
complement an existing system. But before the planning can be done, we
.must thoroughly understand the existing system and determine how
computer can be best used to make its operation more effective.
System Analysis is, then, the process of gathering and interpreting
facts, diagnosing problems and using the information to recommend
improvements to the system. In brief we can say that analysis specifies that
what the system should do. Design states how to accomplish the objective.

Identification of Need
Identification of the needs is the first step in the analysis phase.
Before developing the actual software firstly we need to analysis all the
need of the user.

Preliminary Investigation
In this phase we collect all the necessary information related to the
requirement of the client. We investigate the overall process ranging form.

Feasibility study
A feasibility study is designed to provide an overview of the
primary issue related to a business idea. A feasibility study looks at three
major areas:
 Organizational issue
 Market issue
 Financial issue d4
Three major considerations are involved in the feasibility analysis

 Economic Feasibility:
Economic feasibility of the project is very
important feasibility study that has to done. Cost – Benefit analysis is done
for this purpose. Economic feasibility for the Project should be
determined before any project under taking as this is important. If the
project is not feasible there is no point in carrying on with the project is
within the budget of the organization. After this analysis it was found that
this project is economically feasible.

 Technical Feasibility:
Technical feasibility centers on the existing
computer system (hardware, software etc) and to what extends it can
support the proposed addition. Under this consideration, it is examined
that the organization is well equipped with all the required hardware and
the software resources like Pentium 4 processor, greater than 512 Mb
RAM, Windows XP Professional. Having considered all there aspect can
the system be developed and implemented.

 Behavioural Feasibility:
By Behavioural Feasibility we find that
whether user will accept the change and whether our project is
behavioural feasible or not. Automating the Hotel Management system
will help in computerizing the whole manual system of service and
maintaining the information related to the Customer. Feasibility can be
done when the system is to be implementing at a particular site.

CONCLUSION
After all the feasibility studies it is found that Hotel Management software
is both economically, technically and behaviourally feasible.

HARDWARE REQUIREMENTS:
This section describes what is needed to use the resultant system on
to the stand-alone computers. To run the proposed system in Windows
Environment following components are needed:
 A Pentium computer certified for use with Microsoft Windows
 A Mouse or pointing device
 At least 16 Mb of RAM(32 MB suggested for smooth
performance
 A minimum of 25 MB of available disk space to install all the
features of the proposed system
 200 MB of available disk space for storage of program database
and ODBC
 A minimum of 50 MB swap space in the hard disk
 A printer(Laser Jet or Ink Jet) to get the report on hard copy

SOFTWARE REQUIREMENTS
 Microsoft Windows XP or higher version
 The Visual Basic Enterprise Edition 6.0 software
 The Microsoft Access
 Crystal Reports 6.7(Reporting Tool)

OVERVIWEW OF VISUAL BASIC


Platform overview

Visual Basic and Windows Environment


Visual Basic is a Windows Programming environment language and is
superior to any other GUI programming as it provides the efficiency of
both GUI and Basic.
The windows environment has a user interface with objects
(Visual Basic Program Unit) consisting of forms, dialog boxes, message
box, list boxes, command buttons, radio, and check buttons etc. To get
the interface programming hours and give more comfort to the user, then
the simple text interface provided by the DOS.

Advantages of Windows Environment


1. Windows lets the programmers to write device independent
7programs. This means the programmer is not bounded about the
type of peripherals like keyboard, mouse, monitor, or printer while
writing programs. The appropriate device drivers for auto detection
and installation are pre-installed.
2. Windows provide multi-tasking facilities. Different programs can
simultaneously be worked upon in different windows and we can
easily switch from one window to another window.
3. Windows environment forces the user to divide a complex program
into smaller independent modular segments. This makes debugging
and maintenance easier.
4. Windows provide a standard user interface. There is a standard
menu bar for all types of programs, which the user uses for editing,
compiling, executing and printing of program.
5. Windows screen is a graphical one and so text and graphical images
can be combined together and edited appropriately. This enables
the facility WYSIWYG i.e. What You See Is What You Get.
Visual Basic 6.0
Visual Basic has its origin in Basic which was developed round
about the year 1960, when high level languages were just being introduced
to the computer community. Microsoft has made it extremely powerful by
gearing all its good features to the Windows environment. Starting with
the version of 3 and 4, and then with 6, Visual Basic is now at version 6.
Visual Basic is an Event Driven Language intended to
implement Projects or Applications containing multiple tasks in Windows
Environment.
What can Visual Basic do for us?
Visual Basic can serve as an ideal front-end tool for the client
to interact. It has got connectivity mechanism for all types of databases
situated far and wide in a network and so it can cater to the needs of a
large body of clients. Using the latest ActiveX technologies, it can integrate
the functionally provided by other application like Word, Excel and other
Windows. Its Internet capabilities provide easy access to documents and
applications across the Internet. Above all it embodies the Object
Oriented Technology, which is the cutting edge technology for all present
day development in the Software World. The final application is a true
EXE file and so can be freely distributed.

Why Visual Basic?


Visual Basic has emerged as one of the standard Windows
Programming Language and it sis become a must for all software people
for developing Applications in Visual Environment. In the years since its
introduction, Visual Basic has revolutionized windows programming and
familiarized us with an object based event-driven approach to software
designing, Visual Basic 5.0 brings Visual Basic to the forefront of the
modern programming language by providing an array of sophisticated
features that make the language truly Object Oriented and interface it with
the latest in the database technology. Over the past years it has become
the fastest and easiest way to make robust applications. The Visual part
refers to the method used to create the Graphical User Interface (GUI).
Rather than writing numerous lines of code to describe the appearance
and location of elements, we simply drag and drop pre build objects into
place on screen. The Basic part refers to the BASIC language. Visual
Basic has evolved from the original BASIC language and now contains
several hundred statements, functions and keywords, many of which
relates directly to the windows GUI. Visual Basic revolutionized the
development of the windows program by allowing easy access to what was
once the daunting task of maintaining the maintaining the many controls
and messages of the windows environment.
Visual Basic has also provided the first example of a successful
component object model for programming in which the party reusable
components could be dropped into your programs by providing extra
functionality.
Since its introduction Visual Basic has made it easier to ignore
more productive by integrating development, compiling and debugging
features into one environment. In a traditional programming environment
the code editors, which are used to code program, do not have any code-
checking intelligence, if there is any error in source code we do not find it
until we compile it. At that point editor performs a syntax check and a
logic check. Where as in Visual Basic environment these components are
put into one Integrated Development Environment (IDE). As we type the
code for the program the editor performs the syntax check immediately to
ensure that we had entered the correct code. When we compile the code
the IDE performs a logic test and if an error arises, an error flag will notify
and the cursor placed in the position in the code where there is an error.
Essentially we can code, test and debug in a single environment. Visual
Basic has the following features:
 Data access features allow us to create databases and front-end
applications for most popular database formats.
 ActiveX technologies allow one to use the functionality provided
by the other applications, such as Microsoft word, Microsoft Excel
and other windows applications.
 Internet capabilities makes it easy to provide access to documents
and applications across the Internet from within the applications.
Finished application is a true .EXE file that uses a runtime Dynamic
Link Library (DLL) that we can freely distributed

ABOUT MS ACCESS
Microsoft Access is a computer application used to create and manage
computer-based databases on desktop computers and/or on
connected computers (a network). Microsoft Access can be used for
personal information management (PIM), in a small business to
organize and manage data, or in an enterprise to communicate with
servers.
Microsoft Access is a powerful program to create and manage your
databases. It has many built in features to assist you in constructing
and viewing your information. Access is much more involved and is a
more genuine database application than any other programs such as
Microsoft Works.
This tutorial will help you get started with Microsoft Access and may
solve some of your problems, but it is a very good idea to use help
files that come with Microsoft Access, or to go to Microsoft’s web site
located at for further assistance.
First of all you need to understand how Microsoft Access breaks
down a database. Some keywords involved in this process are:
Database File, Table, Record, Field, Data-type. Here is the
hierarchy that Microsoft Access uses in breaking down a database.

Database File: This is your main file that encompasses the file that
encompasses the entire database and that is saved that is saved to your
hand-drive or floppy disk.
Example) [Link]
Table: A table is a collection of data about as a specific topic.
There can be multiple tables in a database.
Example #1) Students
Example #2) Teachers
Field: Fields are the different categories within a table.
Tables usually contain multiple fields.
Example #1) Student Last Name
Example #2) Student First Name
Data types: Data types are the properties of each field. A field only has
one data type
Field Name) Student Last Name
Data type) Text
 This tutorial will help you get started with Microsoft Access and may
solve some of your problems, but it is very good idea to use the
Help files that come with Microsoft Access (or any program you use
for that matter).

DATABASE DESIGN
USERS: TABLE
Field Name Data type
User Name Text
User Id Text
Password Text
Creation Data Date/Time
TRAN: TABLE
Field Name Data type
Customer Name Na Text
Start Time Date/Time
Machine No Text
Total Time Text
Amount Currency
Bill No Auto Number
Date Date/Time
Month Number
Year Number
End Time Date/Time
Hour Number
Minute Number
Dt Text

RATESETTING: TABLE

Field Name Data type


One Hour Number
Starting Date Date/Time
Ending Date Date/Time
Comment Text

NEW MACHINE RECORD: TABLE


Field Name Data Type
Machine No Number
Machine Name Text
MEntry Date Date/Time

MACHINE RECORDS: TABLES


Field Name Data Type
Machine No Text
Machine Name Text
Current Status Yes/No

MACHINE DETAILS: TABLES

Field Name Data type


Machine No Text
Processor Text
Ram Text
Motherboard Text
Casting Text
Monitor Text
SoundCard Text
AgpCard Text
KeyBoard Text
Mouse Text
CdromDrive Text
Floppy Drive Text
Speaker Text
Amount Text

DAILY REPORTS: TABLE


Field Name Data type
Last date Date/Time
Current date Date/Time
Hours consumed Date/Time

DATA FLOW DIAGRAM


A data flow diagram is a bubble chart is a graphical tool for
future analysis. DFD modules a system by using external entities from
which data flows to a process, which transforms the data and creates
output data flows which go to other process or external entities or files.
Data in files may also flow to processes as inputs.
DFD can be hierarchically organised, which can help in
partitioning and analyzing large systems. As a first step one data flow
diagram can depict an entire system which gives the system overview.
There are various symbols used in DFD namely:
“ Arrow”:

A data flow is a route, which enables packets of data to travel from a


source to a processor or from a data store or process. An “Arrow Line”
depicts a flow with the arrowhead pointing in the direction of the flow.

“Process”:
A process represents transformations where incoming data flows are
changed into outgoing data flows.

“Data Store”:
A data store represents a repository of data that is to be stored for use
by one more processes may be as simple as buffer or queue or
sophisticated as relational database. They should have clear names.

“A Source or Sink”:
A source or sink is a person or part of an organisation, which enter or
receives information from the system, but is considered to be outside
the contest of data flowmodel.

DATA DICTIONARY
Data dictionary consists of description of all the data used in
the system. It consists of logical characteristics of current systems data
stores including name, description, aliases, contents and organization.
Data dictionary serves as the basis for identifying database
requirements during system design. Data dictionary is a catalog, a
depository of the elements in the system.
The data dictionary is used to manage the details in the large
system, to communicate a common meaning for all system elements, to
document the future of the system, to locate errors and omission in the
system. Data dictionary contains two types of descriptions for the data
flowing through the system attributes and tables. Attributes are grouped
together to make up the tables. The most fundamental data level is
attributes tables are a set of data items, data related to one another and
that collectively describes a component in a system. The description of
the attributes consists of data names, data descriptions, aliases, and
length and data values. The descriptions of the data structures consists
sequence relationship, selection relationship, iteration relationship and
operational relationship.
SYSTEM TESTING
SYSTEM INTEGRATION AND TESTING
The proposed system is tested parallel with the software
effort that consists of its own phases of analysis, implementation, testing
and maintenance.

UNIT TESTING
Unit testing comprises the set of tests performed by an
individual programmer prior to integration of the unit into a large system.
Coding and debugging -> Unit testing -> Integration testing
There are four categories of tests should be performed.
 Functional testing
 Performance testing
 Stress testing
 Structure testing
Function test cases involve exercising the code with the nominal input
values for which the expected results are known, as well as boundary
values maximum.
Performance testing determines the amount of execution spent in
various parts of the unit program throughput, response time and device
utilization by the program unit.
Stress tests are those tests designing to initially break the unit.
Structure tests are concerned with exercising the internal logic of a
program and traversing particular execution path.
Establishing a test completion criterion is another difficulty encountered
in the unit testing of real problems. Unit testing includes:
 Statement converge
 Branch converge
 Logical path converge
Using statement converge programmer attempts to find a set of test
cases that will execute each statement in a program at least once
Using Branch Coverage as the test completion criterion the
programmer attempts to find a set of cases that will execute each
branching statement in each direction at least once.
Logical Path Coverage acknowledge that the order in which the
branches are executed during a test is an important factor in
determining the test outcome.

INTEGRATION TESTING
Integration testing is of three types:
 Bottom up Integration
 Top down Integration
 Sandwich Integration
Bottom up integration testing consists of unit testing followed by
system testing. Unit testing has the goal of testing individual modules
in the system. Subsystem testing is concerned with verifying the
operation of the interfaces between modules in the sub systems.
System testing is concerned with subtitles in the interfaces, decision
logic and control flow recovery procedure, throughput, capacity, and
timing characteristics.
Top down integration starts with the main routine and one or two
immediately subordinate routines in the system structure. Top down
integration requires the use of program stubs to stimulate the effect of
lower level routines that are called by those being tested.
Top down method has the following advantages:
 System integration is distributed through the implementation
phase. Modules are integrated as they are developed.
 Top level interfaces are tested first and mist often.
 The top level routine provides a natural test harness for low
level routines.
 Errors are localized to the new modules and interfaces that are
being added.
Sandwich integration is predominately top down, bottom up
techniques are used on some modules and sub system. This
mix alleviates many of the problems encountered in pure top
down and retains the advantages of the top down integration at
the subsystem and system level.

INTRODUCTION
In this project an attempt is made to design a computer system for
the CYBER CAFE that makes the management of recording user
details, internet usage and billing much easier. The objective of this
software is to maintain the details of users, cabins and login history.
Through this system we provide facility to prepaid and postpaid
accounts respectively for Account Users and Walkthrough Users. It
has the features like adding, viewing, editing, of user details, cabin
details, recharge option for prepaid users, billing, tariff settings, etc.
The software powered by JAVA assures clear and efficient services to
the agency. This easy-to-operate system helps to access and modify user
details, provides efficient billing facility. The software is designed to
provide reliable and error free information. The database is driven by My
SQL thus providing portability. Anyone having an account with the system
can have access to internet by logging into the client machine using a given
username and password. Account users can login only if they have
sufficient balance in the account. Otherwise they will have to recharge
their account using the recharging facility at the administrator side. To
ensure enhanced security user account creation, editing etc are available
only at the administrator side.
On the successful login the user can load browser and can have
access to internet. The login time displayed on the login screen may
help the users manage their usage. On logout the internet usage
charges and available balance in the account (in case of account
users) will be displayed.

SYSTEM IMPLEMENTATION
The ultimate goal of the implementation is to write the source code
and internal documentation so that it can be verified easily. The code
and documentation should be written in a manner that eases
debugging, testing and modifications.
During the implementation phase coding, debugging, documentation
and testing of the systems were carried out module by module.
During coding design specifications were translated into the source
code. Implementation of the system was done using Visual Basic
6.0/Ms Access 2003 and Windows XP platform.
An effort has been made to satisfy the following goals:
 Accuracy of results
 Minimizations of response time
 Clarity and simplicity of code
 Minimizations of hard coding
 Minimization of memory used
Various types of errors were discovered while debugging the
modules. Proper documentation of each module was done. Each module
was separately tested and errors were debugged as per the needs.
Testing of reports was carried out to find the response time.
Modifications were made in the reports as per the requirements of the
persons for whom the system is designed.

SECURITY MEASURES
TAKEN IN THE SYSTEM
It is already mentioned in that security means protecting the data and
programs against accidental or intentional modification or disclosure to
unauthorized persons. Our primary goal is always that data entering to a
system and program processing the data must be kept secure. In the
present system, I have taken the following security measures:
 Only authorized persons are allowed to access the system.
Password system is used to present unauthorized access.
 Charges in data files are files are recorded along with date and
time. This will help the system manager to find out when the file
last modified.
 Software development is an integrated module and only
executable file of the software is available to the user. Source code
of the program are kept in a safe place.

CONCLUSION
 This new software will work on all platforms
 Under trial and testing, the project is running very effectively and
seems to be bug free under standard usage. The test data used
simulated the actual data to be used. We have included a lot of error
validation code which provides interactive message to the user and
guides them to make proper entries if some entries are made in
invalid format.

You might also like