Post on 03-Jun-2018
transcript
8/12/2019 Cyber Report File
1/35
Index
Introduction
Programming concept
Language introduction Data flow diagram.
Header file.
User defined function.
Codes.
Hardware requirement.
User interface.
Data storing method.
Advantages & disadvantages.
Conclusion. i!liograph".
8/12/2019 Cyber Report File
2/35
Introduction
Our pro#ect is !ased on a small data management topic. Cyber cafmanagement$ this is protot"pe model of data storing technique andmanagement. In this pro#ect we include a small part of customer detail
information of a c"!er cafe. %hich !ased on following quer"
%hat information a!out customer required
How each customer identified
%hat are !asic requirement of c"!er caf'
%hat initial process performed to maintain information
%hich is most difficult tas( to maintain data information )tc.
*or a!ove solving a!ove pro!lem we decide to create a simple program withour initial (nowledge of computer programming.*or solving a!ove pro!lem we follow the software engineering+s concept of
modeling technique.
%e use water fall model.%ater fall model provide following pro!lem solving technique.
Anal"sis.
Design
Coding.
,esting
Implementation.
All a!ove technique we discuss in ne-t part of our documentation.
8/12/2019 Cyber Report File
3/35
Programming concept
Analysis: -in this technique we consider the pro!lem. %hat is pro!lem %henwe defined the pro!lem then it is eas" to find the solution.
As in previous session we define following pro!lem.
%hat information a!out customer required
How each customer identified
%hat are !asic requirement of c"!er caf'
%hat initial process performed to maintain information
%hich is most difficult tas( to maintain data information )tc.
*or each pro!lem we consider following solution.
%hat information a!out customer required
*or this we define that at initial name$ address$ contact$ login and
logout time is enough information a!out an" customer.
How each customer identified
*or this pro!lem we consider ID of customer which provided !" an"authorit" as government of India for each person. And that will
provide for relia!le management for managing data.
%hat initial process performed to maintain information
,he following initial process required to maintain data storage.
Add new entr".
aintaining master record.
/earch record.
Log management 0per hour surfing cost1.
%hich is most difficult tas( to maintain data information
,he most difficult tas( of marinating data information is displa"ingdata. Hear we use a searching option which search through man"option and displa" record list a!out that option. And also displa" list
of all record.
Design: -in this technique we draw a data flow diagram which provides !asicstructure to draw pro#ect.
Coding: -in this technique we use c language to implement pro#ect on thedesigned structure.
Testing: -in this session we test our pro#ect in different environment$ access
man" data. 2n each entr" it gave appropriate result.Implementation: -in this session we consider the future modification on our
pro#ect. ecause in this initial stage we done man" mista(e. /o in
future we tr" to overcome the disadvantages.
8/12/2019 Cyber Report File
4/35
Language introduction
The language use to construct the emplo"ee s"stem is C. %e have use C !ecause
we all are quite familiar with it. It is relia!le$ simple and eas" to use out of the
do3en of languages Availa!le. C is a high level language that provides high level
programming with efficienc" !ecause it has the power of the machine language.
C is general4purpose structured programming language. Its instructions consists of
)nglish terms that resem!le alge!raic )-pressions of augmented !" certain
)nglish 5e"words such as if$ )lse$ for do & while.
C !ridges the gap !etween conventional high level languages and machine
language. ,his allows C to !e used for /"stem programming as well as the
application programming. C is characteri3e !" the a!ilit" to write ver" concise
/ource program due in the part of the large no. of operator within the language it
has relativel" small instruction set$ though actual implementation includes
e-tensive li!rar" functions$ which enhances the !asic functions. *urther more$
the language encourages the
user to write additional li!rar" functions of their own. ,hus$ the user can easil"
e-tent the features and capa!ilities of the language. Another important
characteristics of C is that its program are highl" porta!le$ even more so then with
the other langue the reason for this is that C relegates most computer dependentfeatures to its li!rar". ,hus$ C accompanied !" its own sets of li!rar" functions$
which are written for the particular characteristics of the host computer. ,hese
li!rar" functions are relativel" standardi3ed$ however$ and each individual li!rar"
function it generall" accessed in the same manner from one version of C to
another. ,herefore$ ost C program can !e processed on different computers with
little or no alteration.
8/12/2019 Cyber Report File
5/35
Data flo diagram
8/12/2019 Cyber Report File
6/35
8/12/2019 Cyber Report File
7/35
&ser defined function
In this pro#ect we use following function.
'ain(): -it recogni3e !" operating s"stem$ for e-ecution of program.
'ain*indo(): -it provide the main user interface window.
searc#():- ,his function use to search an" information a!out
customer.
status*sub*sub():- ,his function provide status for an" login (e".
status*sub():- It also Provide status a!out user information (e".
status():- It provide main window (e" status in status !ar.
sub*sub*fn():- It function to provide save entr" & displa" in main
widow.
sub*fn():- ,his function use we see su!9su!9fn & use it.
logout():- ,his function should have delete information from main
window.
cloc+*sys():- ,his function provide us simple cloc( to see current
time & date.
#istory():- It provide us to see Histor" A!out All Customer.
int ascii(c#ar arr,):- ,his function Convert character from in ascii
from.
int asci(c#ar asc):- ,his function also Convert in ascii.
int tmdiff(c#ar tm.,/c#ar tm0,):- ,his function find difference
!etween two different time.
log():- ,his function provide us to change timing rate our self.
8/12/2019 Cyber Report File
8/35
Codes:- main()
void main01
:
int gd;D),)C,$gmtc>>!gi=1rectangle0J$$getma--014J$?1
rectangle0F?$B$J@?$EJ1
8/12/2019 Cyber Report File
14/35
Codes:- sub*sub*fn()
setcolor0@J1
!ar0@EE$@?$@B$1tOs>tOs>tOs>tOs>t
Os>n=$s"s$name$add$contect$id9t"pe$id9no$lt$lot$ld1;)2*1countNNtOs>tOs>tOs>tOs>tOs>t
Os>n=$s"s$name$add$contect$id9t"pe$id9no$lt$lot$ld1;)2*1
:
if0strcmp0nameE$name1;;?strcmp0nameE$add1;;?
strcmp0nameE$contect1;;?strcmp0nameE$id9t"pe1;;?strcmp0nameE$id9no1;;?1
:
outte-t-"0@E$"$s"s1
!ar0@RE$@E$BB$@JB1
printf0=Os=$ans1