+ All Categories
Home > Documents > E Reporting

E Reporting

Date post: 07-Apr-2018
Category:
Upload: himanshu-vaja
View: 225 times
Download: 0 times
Share this document with a friend
23
1 System Procedural Design 
Transcript
Page 1: E Reporting

8/3/2019 E Reporting

http://slidepdf.com/reader/full/e-reporting 1/23

1  System Procedural Design 

Page 2: E Reporting

8/3/2019 E Reporting

http://slidepdf.com/reader/full/e-reporting 2/23

2 Input/Output and Interface Design

Page 3: E Reporting

8/3/2019 E Reporting

http://slidepdf.com/reader/full/e-reporting 3/23

3 System Architecture Design

Applied .NET Framework Programming

If you use the .NET Framework, your code targets the common language runtime (CLR), which

affects your decision about a programming language. The common language runtime is just what its name

says it is: A runtime that is usable by different and varied programming languages.

The features of the CLR are available to any and all programming languages that target it-period. If the

runtime uses exceptions to report errors, then all languages get errors reported via exceptions. If the

runtime allows you to create a thread, then any language can create a thread. In fact, at runtime, the CLR

has no idea which programming language the developer used for the source code.

You may develop your code in any programming language you desire as long as the compiler you use

to compile your code targets the CLR. Microsoft is creating several language compilers that target the

runtime: C++ with managed extensions, C# (pronounced ―C sharp‖), Visual Basic.NET, JScript, Java,

and an intermediate language (IL) Assembler. In addition to Microsoft, there are several other companies

creating compilers that produce code that targets the CLR. At this writing, I am aware of compilers for

Alice, APL, COBOL, Component Pascal, Eiffel, FORTRAN, Haskell, Mercury, ML, Mondrian, Oberon,

Perl, Python, RPG, Scheme, and Smalltalk.

Page 4: E Reporting

8/3/2019 E Reporting

http://slidepdf.com/reader/full/e-reporting 4/23

 

4  Implementation & Coding

Single Vs Multi-user, GUI Vs Non GUI

 In the single user environment, the whole system is used by only a single person of theorganization. The person who is using that system will have to look for all the procedures

which are held within the organization. And managing all the activities by a single hand is a

very-difficult task.

  While if Multi User environment is there then the user of the system will be more than one.

Different people can handle different task to perform .This kind of system will reduce work 

load and can give better results.

  In Property Listing India we have provided multi user environment. Any person can have

access to the system up to some extent which is decided by the administrator.

  Thus, in our project it is ideal to have multi user environment rater than to have single user

environment.

Page 5: E Reporting

8/3/2019 E Reporting

http://slidepdf.com/reader/full/e-reporting 5/23

Standards Used for Coding

We have used the serial number and group classification codes. Coding scheme must

have the following properties.

Concise

A coding scheme must be concise. In other words, the number of digits/characters used in

a code must be minimal to reduce storage space of the code and retrieval efficiency.

Expandable

It should be expandable, that is it must allow new items to be added easily.

Meaningful

It should be meaningful and convey to a user some information about the characteristics

of the item to enable quick recognition and identification of the item.

Comprehensive

It should be comprehensive. In other words, it should include the characteristics relevant

to all the related activities where the item will be involved.

Precise

It should be precise. I.e. the scheme should produce unique, unambiguous code.

Comments

The comments describe the function of every line, the significance of every datastructure, the input to every function, the output from the function and the data manipulation

within the function. Thus, the code is well documented.

Naming convention

The naming of the function, variables, etc. is done according to the convention mentioned

in the Naming Convention Section

Controls Examples

Form frmFormName

Textbox txtTextBoxName

Label lblLabelName

Combo Box cmbComboBoxName

Page 6: E Reporting

8/3/2019 E Reporting

http://slidepdf.com/reader/full/e-reporting 6/23

List Box lstListBoxName

Command Button cmdCommandButtonName

Radio Button radRadioButtonName

Check Box chkCheckBoxName

Picture Box picPictureBoxName

Data Grid dgrDataGridName

Menu mnuMenuName

Menu Item mnuMenuItemName

Tab Control tabTabControName

SECURITY FEATURES

  Login Pages Should Be Encrypted: 

The number of times i have seen web sites that only use ssl (with https: url schemes) after user

authentication is accomplished is really dismaying. encrypting the session after login may be useful —  

like locking the barn door so the horses don’t get out —  but failing to encrypt logins is a bit like

leaving the key in the lock when you’re done locking the barn door. Even if you’re login form posts to

an encrypted resource, in many cases this can be circumvented by a malicious security cracker who

crafts his own login form to access the same resource and give him access to sensitive data. 

  Data validation should be done server-side: 

Many web forms include some JavaScript data validation. if this validation includes anything meant to

provide improved security, that validation means almost nothing. a malicious security cracker can craft

a form of his own that accesses the resource at the other end of the web page’s form action that doesn’t

include any validation at all. worse yet, many cases of javascript form validation can be circumvented

simply by deactivating javascript in the browser or using a web browser that doesn’t support javascriptat all. in some cases, i’ve even seen login pages where the password validation is done client-side —  

which either exposes the passwords to the end user via the ability to view page source or, at best,

allows the end user to alter the form so that it always reports successful validation. don’t let your web

site security be a victim of client-side data validation. server-side validation does not fall prey to the

Page 7: E Reporting

8/3/2019 E Reporting

http://slidepdf.com/reader/full/e-reporting 7/23

shortcomings of client-side validation because a malicious security cracker must already have gained

access to the server to be able to compromise it.

  Manage your web site via encrypted connections:

Using unencrypted connections (or even connections using only weak encryption), such as

unencrypted ftp or http for web site or web server management, opens you up to man-in-the-middle

attacks and login/password sniffing. always use encrypted protocols such as ssh to access secure

resources, using verifiably secure tools such as openssh. once someone has intercepted your login and

password information, that person can do anything you could have done.

  Use strong, cross-platform compatible encryption:

Believe it or not, ssl is not the top-of-the-line technology for web site encryption any longer. Look into

tls, which stands for transport layer security — the successor to secure socket layer encryption. Make

sure any encryption solution you choose doesn’t unnecessarily limit your user base, the way

proprietary platform-specific technologies might, as this can lead to resistance to use of secure

encryption for web site access. The same principles also apply to back-end management, where cross-

platform-compatible strong encryption such as ssh is usually preferable to platform-specific, weaker

encryption tools such as windows remote desktop.

  Connect from a secured network:

Avoid connecting from networks with unknown or uncertain security characteristics or from those

with known poor security such as open wireless access points in coffee shops. this is especially

important whenever you must log in to the server or web site for administrative purposes or otherwise

access secure resources. if you must access the web site or web server when connected to an unsecured

network, use a secure proxy so that your connection to the secure resource comes from a proxy on a

secured network. in previous articles, i have addressed how to set up a quick and easy secure proxy

using either an openssh secure proxy or a putty secure proxy.

  Don’t share login credentials: 

Shared login credentials can cause a number of problems for security. This applies not only to you, the

webmaster or web server administrator, but to people with login credentials for the web site as well —  

clients should not share login credentials either. the more login credentials are shared, the more they

tend to get shared openly, even with people who shouldn’t have access to the system. the more they

are shared, the more difficult it is to establish an audit trail to help track down the source of a problem.

Page 8: E Reporting

8/3/2019 E Reporting

http://slidepdf.com/reader/full/e-reporting 8/23

the more they are shared, the greater the number of people affected when logins need to be changed

due to a security breach or threat.

  Prefer key-based authentication over password authentication:

Password authentication is more easily cracked than cryptographic key-based authentication. the

purpose of a password is to make it easier to remember the login credentials needed to access a secure

resource — but if you use key-based authentication and only copy the key to predefined, authorized

systems (or better yet, to separate media kept apart from the authorized system until it’s needed), you

will use a stronger authentication credential that’s more difficult to crack. 

  Maintain a secure workstation:

If you connect to a secure resource from a client system that you can’t guarantee with complete

confidence is secure, you cannot guarantee someone isn’t ―listening in‖ on everything you’re doing.

key loggers, compromised network encryption clients, and other tricks of the malicious security

cracker’s trade can all allow someone unauthorized access to sensitive data regardless of all the

secured networks, encrypted communications, and other networking protections you employ. integrity

auditing may be the only way to be sure, with any certainty, that your workstation has not been

compromised.

  Use redundancy to protect the web site:

Backups and server failover can help maintain maximum uptime. while failover systems can reduce

outages due to server crashes (perhaps because of ddos attacks) and server shutdowns (perhaps

because the server was hijacked by a malicious security cracker) to mere hiccups in service, that isn’t

the only value to redundancy. the duplicate servers used in failover plans also maintain an up-to-date

duplication of server configuration so you don’t have to rebuild your server from scratch in case of 

disaster. backups ensure that client data isn’t lost —  and that you won’t hesitate to wipe out sensitive

data on a compromised system if you fear that data may fall into the wrong hands. of course, failover

and backup solutions must be secured as well, and they should be tested regularly to ensure that if and

when they are needed, they won’t let you down. 

Page 9: E Reporting

8/3/2019 E Reporting

http://slidepdf.com/reader/full/e-reporting 9/23

CODING STANDARDS

protected void btnlogin_Click(object sender, EventArgs e)

{

 //string Enc = Encrypt(txtpass.Text.Trim());

 //dtper = daper.GetDataforLogIn(txtname.Text,Enc);

con.Open();

string p="select * from tblEmployeePersonalDetails";

cmd =new SqlCommand(p,con);

dr=cmd.ExecuteReader();

while(dr.Read())

{

if (txtname.Text==dr["strName"].ToString() && txtpass.Text==dr["strEmpPassword"].ToString())

{

 //drper = (dspersonal.tblEmployeePersonalDetailsRow)dtper.Rows[0];

 //dtcom = dacom.GetDataByPK(drper.intEmpId);

Session["intEmpId"] = dr["intEmpId"].ToString(); ;Session["strName"] = dr["strName"].ToString();

dtcom = dacom.GetDataByPK(Convert.ToInt32(Session["intEmpId"]));

if (dtcom != null && dtcom.Rows.Count > 0)

{drcom = (dscompany.tblEmployeeCompanyDetailsRow)dtcom.Rows[0];

Session["intRoleId"] = drcom.intRoleId;

Session["post"] = drcom.charEmpPost;

Session["department"] = drcom.intDeptId;

 //FormsAuthentication.RedirectFromLoginPage(txtname.Text.Trim(), false);

FormsAuthentication.SetAuthCookie(txtname.Text.Trim(), false);if (Convert.ToInt32(Session["intRoleId"]) == 5)

{

Response.Redirect("Admin/home.aspx");

}else

{

Response.Redirect("~/User/userhome.aspx");

} }

else

{

Label l1 = new Label();l1.Text = "You are not registered in company ";

}}

else

{

lblmsg.Text = "User Name And Password Doesn't Match";

}}

con.Close();

}

Page 10: E Reporting

8/3/2019 E Reporting

http://slidepdf.com/reader/full/e-reporting 10/23

 

5 Testing

  Test Strategy

As we were working with 2 team members it was very difficult to check the work done as no

individual was assigned for that particular work. Moreover checking the work done was very important to

reduce risk factor. Checking was being ultimately handled by Testing but interim checking was required.

Right from starting we planned to adopt one technique called Assessment by Rotation to adopt. Work that

is done by one member was assessed by other for some time and again revolved for other level check.

This technique proved to be very much helpful as it came out with innovative ideas reduces errors to very

low level. 

 Testing Methods

Stress Testing

Stress testing is to test the system for emergent properties such as performance and reliability.

Performance tests have to be designed to ensure that the system can process its intended load. Here, we

checked out the multi-user capability of our system.

Performance Testing

Performance testing is designed to test the runtime performance of the system within the context of 

the system. These tests were performed as module level as well as system level. Individual modules were

tested for required performance.

  In performance testing we counted the processing time and response from the server with respect

to request.

  We also checked out the total-execution time, which takes 10 to 15 minutes for 6 to 10 queries.

 Black-box Testing

We have tested our functions of component to check the specification of our

components. We selected input set to test the components like in query process we gave the differentkinds of inputs to examine there output. We test software with sequences that have only a single value.

Interface Testing

Interface testing is integral part of Integration testing. Therefore we checked for the

Page 11: E Reporting

8/3/2019 E Reporting

http://slidepdf.com/reader/full/e-reporting 11/23

  Interface misuse

  Interface misunderstanding

We examined the code to be tested and explicitly list each call to an external component. In the system,

standards tests for GUIs have been performed, which are as follows.

  Testing the screen control for its position and size.

  The position and related labels for all controls were checked.

  Name of the form in system is given appropriately.

  All menu functions and sub functions were verified for correctness.

  Validation for all inputs were done

  Each menu functions were tested, whether it invokes the corresponding functionality properly.

  Pull down controls was verified for proper functionality.

  Whether the non-editable text control is disabling and it was also verified that it doesn’t exceed

the maximum allowed length.

  Whether the system prompts the user with appropriate message as and when invalid information

is entered.

  All required fields aren’t left blank  

  Grouping information is displayed appropriately

Following testing principals which are used.

 All tests should be traceable to customer’s requirement. 

 Tests should planned long before testing begins.

 Testing should begin in small and progressed towards testing in the large.

 Exhausting testing is not possible.

 To be most effective testing should be conducted by an independent third party.

TEST PLAN

Any system, to be successful, must be thoroughly tested, and well managed test plan should be

 prepared before actual testing is being performed.‖ ― has been developed and need to be tested in

a manner that can reduce occurring of defects as low as possible. Following are the activities we

planned to test the system.

Page 12: E Reporting

8/3/2019 E Reporting

http://slidepdf.com/reader/full/e-reporting 12/23

  This system is indeed an evolutionary system so every unit of the system is continuously under testing

phase.

  One test activity ―Basis Path Testing‖ that will try to cover all paths in the system. This activity identifies

all paths who provides different functionality of the system, and also other paths to reach at that

functionality.

  Other testing activity is ‖Control Structure Testing‖, which will test each and every conditions withpositive and negative data combination.

  This testing activity will also perform ―Data Floe Testing‖ in which it will be tested how the data refollowing the system. And will also check whether the data entered from one procedure, is reflected

whenever it requires or not.

  All conditions will be tested with ―Boundary Value Analysis‖ where different input will be given to testwhether the system is functioning with boundary values or not.

  Along with the boundary value analysis, the system is also tested with ―Range Value Tested‖ where

editable values will be tested with ranges of values.

  The system is begin tested in ―Unit Testing‖ manner where at the completion of one unit that is testedthoroughly with above mentioned testing activities.

  The integration testing will also be performed to ensure that the integrated unit is working properly with

other units or not.

9.2 MODULE OF TESTING

Analyze and check system representation such as the requirement document, design

diagrams and the program source code. They may be applied at all stages of the process.

Unit Testing

Module Testing

Sub-system

Page 13: E Reporting

8/3/2019 E Reporting

http://slidepdf.com/reader/full/e-reporting 13/23

 

There are different Models of testing. On the basis of testing methods there are two types of 

testing :

1. White-box testing.

2. Black-box testing

1).WHITE-BOX TESTING

White-box testing some times called glass-box testing, is a test case design method that users the

control structure of the procedural design to drive the test case.

  Logical errors and incorrect assumption are inversely proportional to the probability that a

program will be executed. Errors tend to creep into our work we design and implement

function, condition or control that is out of the mainstream tends to be well understood.

  We often believe that a logical path is not likely to be executed when in fact it may be

executed on a regular basis. The logical flow of a program times counter intuitive.

2). BLACK-BOX TESTING:

For our project periodically we have tested our software using

black-box testing. Thinking as a client we have evaluated the software for its easy going and

convenience.

System Testing

Acceptance

Page 14: E Reporting

8/3/2019 E Reporting

http://slidepdf.com/reader/full/e-reporting 14/23

  Unit Testing:

During the programming stages each and every form, modules and class treated unit has

been put into the test data. Every modules is tested independently. The steps are follows:

1.  Manually code is tested like spelling checks, logic and errors. 2.  Once the manual checking is over the complication has been done. Syntactical

errors if any have to be corrected. 

3.  After the clean complication the program, some dummy data, as specification,has been used for testing of the module to see if it works as specified. 

Integration Testing

After our individual’s modules were tested out we go the integrated to create a complete

system. This integration process involves building the system and testing the resultant system for

problems that arise from component interaction.

  Performance Testing 

Performance testing is designed to test the runtime performance of the system within the

context of the system. These tests were performed as module level as well as system level. Individual

modules were tested for required performance. 

  Condition Testing 

Performance testing is a test case design method that exercise the logical conditions. 

  Interface Testing 

Interface sting is integral part of integration. We examined the code to be tested and explicitly

list each call to an external component. In the system standards tests for GUIs have been performed,which are as follows:

  The position and related labels for all controls were checked.

  Validation for all inputs were done.

  Pull down controls was verified for proper functionality.

  Whether the non-editable text controls disabling and it was also verified that it

doesn’t exceed the maximum allowed length.

Page 15: E Reporting

8/3/2019 E Reporting

http://slidepdf.com/reader/full/e-reporting 15/23

 

CONTENT TESTING:

Errors in WebApp content can be as trivial as minor typographical error as incorrectinformation, improper organization or validation of intellectual property laws. Content Testing attempt to

uncover this and many other problems before the user encounter them.

Content Testing Objectives:

There are three types of objectives.

  To uncover syntactic errors in text-based documents, graphical representation and othermedia.

  To uncover semantic errors in any content object represented as navigation occurs, and

  To find errors in organization or structure of content that is presented to the end-user

DATABASE TESTING:

Modern Web Application does much more than present static content objects. In many

application domains, WebApps interface with sophisticated database management system and build

dynamic content object that are created in real time using the data acquired from a database.

Database Testing for WebApps is complicated by a variety of factor.

1) The original client side request for information is rarely presented in form that can be input to

a database management system.

2) The may be remote to the server that houses the webApps. WebApps Server and

properly formatted for subsequent transmittal to the client.

3) RAW data acquired from the database must be transmitted to the

4) The dynamic content objects must be transmitted to the client in a form that can be displayed

to the end user.

Page 16: E Reporting

8/3/2019 E Reporting

http://slidepdf.com/reader/full/e-reporting 16/23

In figure testing should be ensure that

1.  valid information is passed between the client and server from the interface layer

[Layers of interaction]

2. The WebApps process script correctly and properly extract

or formats user data.

3. Queries are passed to a data management layer that

Communicates with database access routines.

4. User data are passed correctly to a server side data

transformation function that format appropriate queries

Client layer-user interface

Server layer- WebApp

Server layer-

Server layer - data

Database layer – data access

Page 17: E Reporting

8/3/2019 E Reporting

http://slidepdf.com/reader/full/e-reporting 17/23

INTERFACE TESTING

Interface design model is reviewed to ensure that generic quality criteria established for all

user interfaces have been achieved and that application specific interface design issue has been

properly addressed.

Interface testing strategy:

The overall strategy for interface testing is to (1) Uncover error related to specific

Interface mechanisms (2) uncover errors in the way the interface implements the semantics of 

navigation, WebApp functionality, or content display. to accomplish this strategy, a number of 

objectives must be achieved:

 Interface futures are tested to ensure that design rules, aesthetics,

and related visual content are available for the user without error.

 Individual interface mechanisms are tested in a manner that is alogous to unit testing Forexample, tests are designed to exercise all forms, client-side scripting, dynamic HTML.

Testing Interface Mechanisms:-

When a user interacts with a WebApp, the interaction occurs through one or more interface

mechanisms.

Links: - Each link is tested to ensure that the proper content object or

function is reached . The Web engineer builds a list of  all links

associated with interface layout.and then executes each

individually.

Forms: - At a microscopic level, tests are performed to ensure that 

(1)  Labels correctly identified fields within the form and that

mandatory fields are identified visually for the user.

(2)  The server receives all information content within the form

and their no data are lost in the transmission between client and server.

(3)  Appropriate defaults are used when the user does not selectfrom a pull down menu or set of buttons.

(4)  Browser function don’t corrupt data enter in a form.

(5)  Scripts that perform error checking on data entered work 

Properly and provide meaningful error message.

Page 18: E Reporting

8/3/2019 E Reporting

http://slidepdf.com/reader/full/e-reporting 18/23

Client side scripting:-

Black box tests are conducted to uncover any error in processing As the

script is executed.These tests are coupled with forms testing because script input is often derived

from data provided as part of forms processing

Dynamic HTML:-

Each Web page that contain dynamic HTML is executed to ensure that the dynamic displayis correct. In addition a compatibility test should be conducted to ensure that the dynamic HTML

is work properly in the environmental configuration that support the WebApps.

Application specific interface mechanisms:-Test conforms to a checklist of functionality and

features that are defined by the interface mechanism.

  Boundary test minimum and maximum number of item that can be placed in to shopping chart.  Test to determine persistence of shopping chart contents.

  Test to determine whether the WebApp can be record shopping chart content at some future date.

USABLITY TESTING:-

Usability test may be designed by Web engineering team.

(1)  Define a set of usability testing categories and identify goal for each.

(2)  Design test that will enable each goal to be evaluated.

(3)  Select participants who will conduct test.

(4)  Instrument participant’s interaction with WebApp while testing isconducted.

5)Develop a mechanism for assessing the usability of the WebApp.

The following test categories and objective illustrate establish testing:

Interactivity- Are interaction mechanism easy to understand and use?

Layout- Are navigation mechanism, content and function place in a manner

that allows the user to find them quickly?

Page 19: E Reporting

8/3/2019 E Reporting

http://slidepdf.com/reader/full/e-reporting 19/23

 

Readability- Is text well written and under stable?

Aesthetics- Do layout color, typeface, and related characteristics lead to ease of use ?

Display Characteristics- Does the WebApp make optimal use of screen size and resolution?

Time Sensitivity- Can important features, functions and content be used in a timely manner?

Accessibility- Is the WebApp accessible to people who have Disabilities?

COMPATIBILITY TESTING:-

WebApps must operate within environment that differs from one another. Different computer,

display device, OS, browser and network connection speed can have significant on WebApp operation.

Different browser some time produced slightly different results, regardless of the degree of HTML

standardization within the WebApps.

The Web Engineering team derives a series of compatibility, validation tests, derived from existing

interface tests, navigation tests, performance tests and security tests.

Test Cases:-

(1)  Invalid User

Test Case:-

If the username and password is not valid, means that the person who is trying to access the

website is not authenticated so system will give the message that unauthicated user.

Solution

Solution of this case is that user is not aware about the login criteria so the person needs to

create its account to the website and it may be there mistake in the typing so it needs to retype the

username and password.

Page 20: E Reporting

8/3/2019 E Reporting

http://slidepdf.com/reader/full/e-reporting 20/23

(2)  Invalid Inforamtion entered on search page.

Test Case:-

If the any user enters invalid information on the search page an message is generated or on

asking user to enter the corect type.

Solution

Solution of this case is that user is not aware about the Type of data to be search or it may

 be person’s mistake in the searching so it needs to research the information.

(3)  Invalid Inforamtion entered on seller page

Test Case:-

If the name enters invalid information an error message is generated on asking user to enter

the corect type.

Solution

Solution of this case is that user is not aware about the Type of data to be entered or it may

 be person’s mistake in the typing so it needs to retype the information.

(4)  Invalid Inforamtion entered on buyer page.

Test Case:-

If the name enters invalid information an error message is generated on asking user to enter

the correct type.

Solution

Solution of this case is that user is not aware about the Type of data to be entered or it

may be person’s mistake in the typing so it needs to retype the information.

Page 21: E Reporting

8/3/2019 E Reporting

http://slidepdf.com/reader/full/e-reporting 21/23

(5)  Error in data base connectivity

Test Case:-

If there is any problem connecting to the database user will be asked to browse and search for

the data base and establish the bridge .

Solution

Solution of this case is that user has to first establish the connectivity with the database and

then run the project.

(6)  Error loding the module

Test Case:-

This problem may arise if the browser does not have the write support .

Solution

Solution is to first check the browser supports for module

6 Screen shots and User manual

7 Limitation and Future Enhancement

Limitation

Following are the limitations of our project.

  We are using centralized approach to implement database. So an efficient database should be

provided to us necessarily.

  .Net platform is mandatory; we can not make it out without .Net.

  IE 9.0 or higher version of browser is compulsory. 

Page 22: E Reporting

8/3/2019 E Reporting

http://slidepdf.com/reader/full/e-reporting 22/23

Future Enhancement

The system is much flexible and extensible; hence further enhancements, if needed, can be

developed and it can be integrated with the existing one very easily.

Correctness:

Although we have included only little fundamental tools as an entry-level system, the system

is correct.

Reliability:

System is reliable to a greater extent.

Maintainability:

As the system is developed as a system of tool the system is maintainable.

Portability:

The system can be transformed from one hardware configuration to another.

Error tolerance:

The system can tolerate with errors that occurs.

8 Conclusion and Discussion:-

Conclusion

The main purpose as mentioned in the first chapter is to provide support to the student/faculty

member and to provide response to his/her interested features. We have included as many features as we

can to make the product viable and usable. According to personal viewpoint we are successful to a large

extent. Projects requirements are fulfilled up to satisfactory levels. This tells that we are very much

successful. And our proposed system is online and real time based on Internet, which is very much ahead

of the current existing system so, user of the system would like to use this application.

Page 23: E Reporting

8/3/2019 E Reporting

http://slidepdf.com/reader/full/e-reporting 23/23

We have followed all the rules and regulations and coding standards so that in future the

enhancement or maintenance will be easy for the management committee. Application is developed with

reusability so can be used with other systems without too many changes to this application.And the

beauty of this product is that at regular interval the reviews of the completed work was done and after

taking reviews the suggestions were given so accordingly we have changed our system and now we have

the perfect one. So we can say that our product is now on cloud 9 according to our own point of view.

Now we are at the end of the project. At the end, we want to mention that we have heartily

worked for it and hope that our system users would be satisfied to high levels. It would be our great

pleasure to distribute this product.

Discussion 

Below cited is the list of Enhancement that might take place in future.

  Mobile Interface: In future user may be able to perform all the operation through mobile

device.

  RFID: Radio Frequency Identifier is a one type of chip that is attached to the each

book will help the student in finding the exact location of the book in the library

  Help Resources: In future we can incorporate tutorial topics in our Online library management

System module from which user can get help.

  Alert mail: Member will get alert mail before 2 days of returning date of a particular book

which he gas issued

  Reservation:Member can reserve particular book in advance.


Recommended