Child Information Tracker
Transcript of Child Information Tracker
-
7/30/2019 Child Information Tracker
1/51
A
Project Proposal
Presented to:
SIKKIM MANIPAL
UNIVERSITY - GHANA
Version 1.0
Prepared by:
ROBERT FIIFI SEI TURKSON
ROLL NUMBER: 540811103
COURSE: Bsc-IT
Date: September 7, 2012
CONTENTS
TABLE OF CONTENTS PAGES
CERTIFICATE 3
-
7/30/2019 Child Information Tracker
2/51
DECLARATION 4
ABSTRACT 4
PROBLEM STATEMENT 5
INTRODUCTION 5
OBJECTIVES 5
STUDY OF EXISTING SYSTEM ANDSOLUTION 6
SYSTEM SPECIFICATION 6
REQUIREMENT ANALYSIS, SRS 7 - 11
(Logical DFD, Data dictionary, Decision Tables & Trees)
ANALYSIS AND DESIGN (Structure Charts, data flows) 12 - 25
CODING 26 - 53
TESTING PROCEDURES 53
TESTING REPORTS 54
DOCUMENTATION 55
FUTURE APPLICATION 56
CONCLUSION 56
BIBLIOGRAPHY 57
CERTIFICATE
I certified that the software application project report titled CHILD INFORMATION
TRACKER SOFTWARE developed forCOMPASSION INTERNATIONAL - GHANA is
the exclusive work ofROBERT FIIFI SEI TURKSONwith the supervision of the Academic
Head.
2
-
7/30/2019 Child Information Tracker
3/51
GAJENDRAN SINGH
ACADEMIC HEAD M/S KNOWLEDGE
WORKZ LTD
AUTHORIZED LEARNING CENTRE
ROBERT FIIFI SEI TURKSON
P.O. BOX 807 ADU
P.O. BOX 807
ADABRAKA
ACCRA
..
-
7/30/2019 Child Information Tracker
4/51
SIKKIM MANIPAL UNIVERSITY
276/3, RING ROAD CENTRAL
P.O.BOX AD 421, ADABRAKA
ACCRA-GHANA
DECLARATION
I hereby declare that the project report entitled CHILD INFORMATION TRACKER
SOFTWARE submitted in partial fulfillment of the requirement for the degree ofBachelor of
Science in Information Technology of Sikkim Manipal University.
ABSTRACT
Information Technology has introduced devise ways in organizations, such as in Non
Governmental Organizations. It has become an important tool in managing daily activities in
peoples lives in all disciplines you find yourself.
CHILD INFORMATION TRACKER SOFTWARE is also one of the technologies which are
getting recognition around the globe in terms database management. CITS deals with all
child details, child details report, guardian details and sponsor details. It tracks all the details
of a child from the day one to the end of his/her program which can be used for all reporting
purpose, tracking of child details, tracking of guardian details.
The program uses the database of information at the project center which include: child
details, sponsor details and guardian details. This program can facilitate us to explore all the
2
-
7/30/2019 Child Information Tracker
5/51
activities happening in the child development centers such as getting to know which child has
a sponsor letter recently and whether it has been responded to.
PROBLEM DEFINITION
System study aims at establishing requests for the system to be acquired, developed and
installed. It involves studying and analyzing the ways of an organization currently processing
the data to produce information. Analyzing the problem thoroughly forms the vital part of the
system study.
The system analysis, prevailing situation of problem carefully examined by breaking them
into sub problems. Problematic areas are identified and information is collected. Data
gathering is essential to any analysis of requests. It is necessary that this analysis
familiarizes the designer with objectives, activities and the function of the organization in
which the system is to be implemented.
INTRODUCTION
CHILD INFORMATION TRACKER SOFTWARE 1.0 is a client / Server - based application
developed to be used on a Local Area Network.
The child information tracker software will help in simplifying the management of children in
relation to their center. It will handle all details about children. The details include Child
details, sponsor details, guardian details among others.
OBJECTIVES
The CITS will improve the management of children throughout the centers of children which
will simplify and enhance productivity. The application program will ensure accuracy is
maintained, child data backup made easy. The application will have two types of accessing
modes, administrator and user. Child management system is managed by an administrator. It
is the job of the administrator to insert, update and monitor the whole process.
STUDY OF EXISTING SYSTEM ANDSOLUTION
-
7/30/2019 Child Information Tracker
6/51
Children managed by the child development workers in separate records are tedious task.
Referring to the new program will handle records and updating which will enhance simplicity
and efficiency.
PROPOSED SYSTEM
By developing the system we can attain the following facilities.
* Easy to handle and feasible.
* Cost reduction.
* Fast and convenient.
PROGRAMMING LANGUAGE AND PLATFORM
Microsoft .NET platform is used in CITS for programming platform. It has very good frame of
windows application programming as an object oriented programming language. CITS has
used framework 2.0, 3.5.
Visual Basic.Net will be used by using Visual Basic as the programming language to develop
the CITS which forms part of Microsoft .NET (Microsoft Visual Studio 2008).
The .NET Framework is a development and execution environment that allows different
programming languages & libraries to work together seamlessly to create Windows-based
applications that are easier to build, manage, deploy, and integrate with other networked
systems.
Microsoft .NET is a company-wide initiative. It includes a new way of delivering software and
services to businesses and consumers. A part of Microsoft.NET is the .NET Frameworks.
2
-
7/30/2019 Child Information Tracker
7/51
SYSTEM SPECIFICATION
Hardware specification of machine used
Pentium 4, Intel Micro Processor or higher
RAM 512 MB or higher
HDD 80 GB or higher
Software used along With the version
Database: - Microsoft SQL Server 2005
Microsoft Visual Studio 2008
Microsoft Word 2007
OS - Windows XP or higher. IT
REQUIREMENT ANALYSIS, SRS
CHILD INFORMATION TRACKER SOFTWARE
The Child Information Tracker Software is a simply. It can handle all details about children, sponsors
and guardians. The details include child details, sponsor details, guardian details among others.
Maintaining backup will be made easy since it will take few minutes in doing so. The system has two
type of accessing modes, administrator and user. Child information Tracker software is managed by
an administrator. It is the job of the administrator to insert update and monitor the whole process
when a user log in to the system. User will only be able to view details of the child and assigned
areas of the program. He or She can't perform any changes .The system has four modules. They are
Login
Child Details
Sponsor Details
Guardian Details
-
7/30/2019 Child Information Tracker
8/51
The Software Requirements Specification (srs) describes the requirement specifications for
the implementation of CITS information control and monitoring of user levels from two
different categories; namely, Administrators, and Users.
The purposes of this document are to serve as:
A basis of communication between all users;
Input to the design team;
Input to software testing and quality assurance;
A development managers reference;
PRODUCT FEATURES
The windows application will serve as an information tool providing client\server data
processing in relation the university database. The software will also process the user access
and archive them, with the database providing information to Tables and Forms such as user
account, child details, guardian details, sponsor details and reports.
USER CHARACTERISTICS
A user can only login into the program with an assigned privilege such as username and
password so if he wants to access the CITS. This prevents misuse, unauthorized access and
hacking of the program.
USER CLASSES AND CHARACTERISTICS
A user class defines the end users of the Child Information Tracker Software.
The user classes are differentiated based on the frequency of use, technical expertise and
security or privilege levels.
The following represent the user classes:
Users These users require information for child, sponsor and guardian details
System Administrators Uses the system to archive transaction data.
2
-
7/30/2019 Child Information Tracker
9/51
GENERAL CONSTRAINTS
Server capacity is how many users can access information at once. More is the number ofusers more will be the network traffic and hence the server comes in a down state. Personalfirewall and updating is a tough task, it should be such that it should not block the network
traffic, making the system slower. Firewall of the CITS should not collide with the firewall ofthe user system.
OPERATING ENVIRONMENT
The external hardware interface used for accessing the CITS is the personal computers of
the child development centers and others. The PCs may be laptops with wireless LAN as the
internet connections provided will be wireless.
USER INTERFACES:
The external users are child development workers who can access the child details.
SOFTWARE INTERFACE:
The workstation requires Windows XP, Vista or better. The Corporate server should
have mssql server 2005 or higher to hold on to all the archives which supports TCP/IP
protocols.
HARDWARE INTERFACES:
The external hardware interface used for accessing the CITS the personal computersof users. The PCs may be laptops with wireless LAN as the internet connectionsprovided will be wireless.
COMMUNICATION INTERFACES The communication interface is a local areanetwork through wireless network routers.
PERFORMANCE REQUIREMENTS
The PCs used must be at least Pentium 4 machines so that they can give optimumperformance of the program.
USER DOCUMENTATION:
Manual of the CITS.
DESIGN CONSTRAINTS
The constraints at the designing time are that the needs of the Child Development Centersand the Centers may keep on changing so the designers must keep this in view and designthe product in this way that it is easily updatable.
ATTRIBUTES
Attributes of the product CITS:
It should be equipped with current and archive database.
-
7/30/2019 Child Information Tracker
10/51
All records can easily be updated.
It should have its personal firewall.
It should facilitate Faculty members with updating his/her account, accessinginformation from anywhere on the LAN.
Child Development Workers and other users can also have child details, sponsor
details and guardian details dates synchronized automatically via the backend on theLAN.
DATA FLOW DIAGRAM FOR CITS
2
Transaction
Transaction DB
Administrator
User Client DB
Report Processing
Reports
-
7/30/2019 Child Information Tracker
11/51
ANALYSIS AND DESIGN (Structure Charts, data flows)
The primary goal of the system analysis is to improve the efficiency of the existing system.
The study of specification of the requirements is very essential. For the development of the
new system, a preliminary survey of the existing system will be conducted.
Depending on the results of the initial investigation the survey is now expanded to a moredetailed feasibility study. FEASIBILITY STUDY is a test of system proposal according to itsworkability, impact of the organization, ability to meet needs and effective use of theresources. It focuses on these major questions:1. What are the users demonstrable needs and how does a candidate systemmeet them?2. What resources are available for given candidate system?3. What are the likely impacts of the candidate system on the organization?4. Whether it is worth to solve the problem?During feasibility analysis for this project, following primary areas of interest are to be
considered. Investigation and generating ideas about a new system does this.
STEPS IN FEASIBILITY ANALYSISEight steps involved in the feasibility analysis are:
_ Form a project team and appoint a project leader._ Prepare system flowcharts._ Enumerate potential proposed system._ Define and identify characteristics of proposed system.
-
7/30/2019 Child Information Tracker
12/51
_ Determine and evaluate performance and cost effective of each proposed system._ Weigh system performance and cost data._ Select the best-proposed system._ Prepare and report final project directive to management.
TECHNICAL FEASIBILITYA study of resource availability that may affect the ability to achieve an acceptable system.This evaluation determines whether the technology needed for the proposed system isavailable or not. Can the work for the project be done with current equipment existing softwareTechnology & available personal? Can the system be upgraded if developed? If new technology is needed then what can be developed?This is concerned with specifying equipment and software that will successfully satisfy theuser requirement. The technical needs of the system may include:
FRONT-END AND BACK-END SELECTIONAn important issue for the development of a project is the selection of suitable front-end andback-end. When we decided to develop the project we went through an extensive study todetermine the most suitable platform that suits the needs of the organization as well as helpsin development of the project.
The aspects of our study included the following factors.FRONT-END SELECTION:
It must have a graphical user interface that assists employees that are not from IT
background.
Scalability and extensibility. Flexibility.
Robustness.
According to the organization requirement and the culture.
Must provide excellent reporting features with good printing support.
Platform independent.
Easy to debug and maintain.
Event driven programming facility.
Front end must support some popular back end like Mssql server 2005.
According to the above stated features we selected VB.Net 2008 as the front-end for
developing our project.
BACK-END SELECTION:1. Multiple user support.2. Efficient data handling.3. Provide inherent features for security.4. Efficient data retrieval and maintenance.5. Stored procedures.6. Popularity.
2
-
7/30/2019 Child Information Tracker
13/51
7. Operating System compatible.8. Easy to install.9. Various drivers must be available.10. Easy to implant with the Front-end.
According to above stated features we selected Mssql server 2005 as the backend. The
technical feasibility is frequently the most difficult area encountered at this stage. It isessential that the process of analysis and definition be conducted in parallel with anassessment to technical feasibility. It centers on the existing computer system (hardware,software etc.) and to what extent it can support the proposed system.
ECONOMICAL FEASIBILITYEconomic justification is generally the Bottom Line consideration for most systems.Economic justification includes a broad range of concerns that includes cost benefit analysis.In this we weight the cost and the benefits associated with the candidate system and if it suitsthe basic purpose of the organization i.e. profit making, the project is making to the analysisand design phase.
The financial and the economic questions during the preliminary investigation areverified to estimate the following: The cost to conduct a full system investigation. The cost of hardware and software for the class of application being considered. The benefits in the form of reduced cost. The proposed system will give the minute information, as a result theperformance is improved which in turn may be expected to provide increasedprofits. This feasibility checks whether the system can be developed with the available
funds. The CHILD INFORMATION TRACKER SOFTWARE does not require
enormous amount of money to be developed. This can be done economically if planned
judicially, so it is economically feasible. The cost of project depends upon the number of manhours required.
OPERATIONAL FEASIBILITYIt is mainly related to human organizations and political aspects. The points to beconsidered are: What changes will be brought with the system? What organization structures are disturbed? What new skills will be required? Do the existing staff members have theseskills? If not, can they be trained in due course of time?The system is operationally feasible as it very easy for the End users to operate it. It only
needs basic information about Windows platform.
SCHEDULE FEASIBILITYTime evaluation is the most important consideration in the development of project. The timeschedule required for the developed of this project is very important since more developmenttime effect machine time, cost and cause delay in the development of other systems.
A reliable CHILD INFORMATION TRACKER SOFTWARE can be developed
in the considerable amount of time.
-
7/30/2019 Child Information Tracker
14/51
2
Report
View
U date
Add
View
U date
Add
View
U date
Add
View
U date
Add
View
U date
Add
View
U date
Add
User
SMAS
DB
ParentBooksClassCourseStudent
Main Form
Splash Screen
Login Screen
Main Form
Child UserSponsor Guardian Report Exit
New
U date
New
ExitU date
OK
Exit
New
-
7/30/2019 Child Information Tracker
15/51
SYSTEM DESIGN
System design is the solution to the creation of a new and existing system. This phase is composed
of several systems. It emphasis on translating design specifications to performance specification. Two
phases were used for design development logical and physical design.
During logical design phase the analyst describes inputs (sources), out puts (destinations), databases(data sources) and procedures (data flows) all in a format that meats the uses requirements.
Physical design produces the working system by defining the design specifications, which tells the
programmer exactly what the candidate system must do.
LOGICAL DESIGN
Logical design of an information system shows the major features and also how they are related to
one another. The first step of the system design is to design logical design elements. This is the most
creative and challenging phase and important too. Design of proposed system produces the details of
the state how the system will meet the requirements identified during the system analysis that is, in
the design phase we have to find how to solve the difficulties faced by the existing system. The logical
design of the proposed system should include the details that contain how the solutions can be
implemented. It also specifies how the database is to be built for storing and retrieving data, what kind
CITS
DBU date
Exit Exit
-
7/30/2019 Child Information Tracker
16/51
of reports are to be created and what are the inputs to be given to the system. The logical design
includes input design, output design, and database design and physical design
INPUT DESIGN
The input design is the link between the information system and the user. It comprises the developing
specification and procedures for data preparation and those steps are necessary to put transaction
data into a usable form for processing data entry. The activity of putting data into the computer for
processing can be achieved by inspecting the computer to read data from a written or printed
document or it can occur by having people keying the data directly into the system. The design of
input focuses on controlling the amount of input required, controlling errors, avoiding delay, avoiding
extra steps and keeping the process simple.
The system needs the data regarding the asset items, depreciation rates, asset transfer, physicalverification for various validation, checking, calculation and report generation. The error raising
method is also included in the software, which helps to raise error message while wrong entry of input
is done.
What data should be given as input?
* How the data should be arranged or coded?
* The dialogue to guide the operating personnel in providing input.
* Methods for preparing input validations and steps to follow when error occur
OUTPUT DESIGN
Computer output is the most important and direct information source to the user. Output design is a
process that involves designing necessary outputs in the form of reports that should be given to the
users according to the requirements. Efficient, intelligible output design should improve the system's
relationship with the user and help in decision making. Since the reports are directing referred by the
management for taking decisions and to draw conclusions they must be designed with almost care
and the details in the reports must be simple, descriptive and clear to the user.
Determine what information to present
* Arrange the presentation of information in an acceptable format
* Decide how to distribute the output to intended receipts
2
-
7/30/2019 Child Information Tracker
17/51
Depending on the nature and future use of output required, they can be displayed on the monitor for
immediate need and for obtaining the hardcopy. The options for the output reports are given in the
appendix.
PHYSICAL DESIGN
The process of developing the program software is referred to as physical design. We have to design
the process by identifying reports and the other outputs the system will produce. Coding the program
for each module with its logic is performed in this step. Proper software specification is also done in
this step.
MODULAR DESIGN
A software system is always divided into several sub systems that makes it easier for the
development. A software system that is structured into several subsystems makes it easy for the
development and testing. The different subsystems are known as the modules and the process of
dividing an entire system into subsystems is known as modularization or decomposition.
DATABASE DESIGN
The overall objective in the development of database technology has been to treat data as an
organizational resource and as an integrated whole. DBMS allow data to be protected and organized
separately from other resources. Database is an integrated collection of data.
Database files are the key source of information into the system. It is the process of designing
database files, which are the key source of information to the system. The files should be properly
designed and planned for collection, accumulation, editing and retrieving the required information.
The organization of data in database aims to achieve three major objectives: -
* Data integration.
* Data integrity.
* Data independence.The proposed system stores the information relevant for processing in the MS SQL SERVER
database. This database contains tables, where each table corresponds to one particular type of
information. Each piece of information in table is called a field or column. A table also contains
records, which is a set of fields. All records in a table have the same set of fields with different
-
7/30/2019 Child Information Tracker
18/51
information. There are primary key fields that uniquely identify a record in a table. There are also
fields that contain primary key from another table called foreign keys.
ER-DIAGRAM
2
-
7/30/2019 Child Information Tracker
19/51
-
7/30/2019 Child Information Tracker
20/51
The following shows the Design of Tables in the CITS Database:
Authentication Table
2
-
7/30/2019 Child Information Tracker
21/51
Child Details Table
Sponsor Details Table
-
7/30/2019 Child Information Tracker
22/51
Guardians Details Table
2
-
7/30/2019 Child Information Tracker
23/51
NORMALIZATION
Normalization is a technique of separating redundant fields and braking up a large table in to asmaller one. It is also used to avoid insertion, deletion and updating anomalies. All the tables have
been normalized up to the third normal form. In short the rules for each of the three normal forms are
as below.
First normal form
A relation is said to be in 1NF if all the under lying domain of attributes contain simple individual
values.
Second normal form
The 2NF is based on the concept of full functional dependency. A relation said to be in 2NF if and onlyif it is in 1NF and every non-key attribute is fully functionally dependent on candidate key of the table.
Third normal form
The 3NF is based on the concept of transitive dependency. A relation in 2NF is said to be in 3NF if
every non-key attribute is non-transitively.
-
7/30/2019 Child Information Tracker
24/51
CODING
SCREEN SHOTS AND CODES
Login Form
Imports System.Data.SqIClient
Imports System. Data
Public Class FrmuserLogin
'User Login
Dim con As New SqlConnection
Dim cmd As New SqlCommand
Dim dr As SqlDataReaderDim ctr As Integer = 0
Private Sub Frmuserlogin_Load(ByVal sender As System. Object, ByVal e As
System.EventArgs) Handles MyBase.Load
End Sub
Private Sub cmdOK_Click(ByVal sender As Object, ByVal e As System.EventArgs)
Handles cmdOK.Click
Dim sql As Stringsql = "SELECT Username, Password from Authentication where Username = "' &
txtUsername.Text & "' and Password = '" & txtPassword.Text & 1111'
con = New SqIConnection("Data Source=.\SQLEXPRESS;lnitial Catalog=CIT;lntegrated
Security=True")
Try
con.OpenO
cmd = New SqlCommand(sql, con)
dr= cmd.ExecuteReader
2
-
7/30/2019 Child Information Tracker
25/51
ctr+= 1
cmd = New SqICommand(sql, con)
IfNot dr.HasRows And ctr= 1 ThenMsgBox("Wrong Username orpassword,2 Trials Remining!",
Msg BoxStyle.1 nformation)
txtUsername. Text = ""txtPassword. Text = ""txtUsername. Focust)
Eiself Not dr.HasRows And ctr= 2 ThenMsgBox("Wrong Username orpassword, 1 Trials Remining!",
MsgBoxStyle.lnformation)
txtUsername.Text = ""
txtPassword.Text = ""
txtUsername.FocusO
EiselfNot dr.HasRows And ctr= 3 ThenMsgBox("Wrong Username or password." & vbCrLf& "Please restart the
program!", MsgBoxStyle.lnformation)
Ifctr = 3 Then
Me.CloseO
End If
Else
While dr.Read
MsgBox("Welcome To CIT ")
FrmMain.ShowOMe.HideO
End While
End If
Catch ex As SqlException
If ex. Message Then
End If
End Try
con.Closer)
End Sub
Private Sub cmdCanceLClick(ByVal sender As System.Object, ByVal eAs
System.EventArgs) Handles cmdcancel.Olick
Me.CloseO
End Sub
End Class
Guardian Details
-
7/30/2019 Child Information Tracker
26/51
Imports System.Data.SqIClient
Imports System.Data
Public Class FrmGuardiandetaiis
Private Sub CmdUpdate_Click(ByVal sender As System. Object, ByVal e As
System.EventArgs) Handles CmdUpdate.Click
Dim conn As SqlConnection
Dim cmd As New SqlCommand
Dim updatecommand As String
updatecommand = "UPDATE Guardiandetails SET Childserialnumber = "' &
TxtChildSerial.Text & "',Guardianname ="' & TxtGuardian.Text & "',Address =", &
TxtAddress.Text & "',Phonenumber ='" & TxtPhone.Text & "',Occupation ='" &
TxtOccupation.Text & "',Siblingsdetails ="' & TxtSiblings.Text & 1111'
, Initialize the SqlCommand with the new SOL string.
Dim sql As String
sql = ("SELECT * FROM Guardiandetails ")
conn = New SqIConnection("Data Source=.\SOLEXPRESS;lnitial
Catalog=CIT;lntegrated Security=True")
cmd = New SqICommand(updatecommand, conn)
Try
conn.O
penO
cmd. ExecuteNonOueryO
2
-
7/30/2019 Child Information Tracker
27/51
MsgBox("Database has been updated")
Catch ex As SqlException
If ex.Number = 2627 Then
MsgBox("Database not updated")
End If
End Tryconn.CloseO
'Clear fields
TxtChildSerial.ClearO
TxtGuardian.ClearO
TxtAddress.ClearO
TxtPhone.ClearO
TxtOccupation.ClearO
TxtSiblings. ClearO
TxtChildSerial.FocusO
End Sub
Private Sub cmdNew_Click(ByVal sender As System.Object, ByVal e As
System.EventArgs) Handles cmdNew.Click
Dim conn As SqlConnection
Dim cmd As New SqlCommand
Dim InsertCommand As String
InsertCommand = "insert into Guardiandetails values
(@Childserialnumber,@Guardianname,@Address,@Phonenumber,@Occupation,@Siblings
details)" ., Initialize the SqlCommand with the new SOL string.
Dim sql As String
sql = ("SELECT Childserialnumber, Guardianname,Address, Phonenumber,
Occupation, Siblingsdetails FROM dbo.Guardiandetails ")
conn = New SqIConnection("Data Source=.\SOLEXPRESS;lnitial
Cata 10g=C IT; I nteg rated Secu rity= True")
cmd = New SqICommand(lnsertCommand, conn)
, initialize them to the input-form field values.
cmd.Parameters.Add(New SqIParameter("@Childserialnumber", _
SqlDbTypeVarChar, 10))
cmd.Parameters("@Childserialnumber").Value = TxtChildSerial.Textcmd.Parameters.Add(New SqIParameter("@Guardianname", _
SqIDbType.Text))
cmd. Parameters("@Guardianname").Value = TxtGuard ian. Textcmd.Parameters.Add(New SqIParameter("@Address",_
-
7/30/2019 Child Information Tracker
28/51
SqlDbTypeVarChar, 30))
cmd.Parameters("@Address")Value = TxtAddress.Textcmd.Parameters.Add(New SqIParameter("@Phonenumber", _
SqIDbType.Char, 15))
cmd. Parameters("@Phonenumber")Value = TxtPhone. Text
cmd.Parameters.Add(New SqIParameter("@Occupation",_SqIDbType.Text))
cmd.Parameters("@Occupation")Value = TxtOccupation.Text
cmd. Parameters.Add(New SqIParameter("@Siblingsdetails", _
SqlDbTypeVarChar, 30))
cmd.Parameters("@Siblingsdetails")Value = TxtSiblings.Text
Try
conn.OpenO
cmd. ExecuteNonQueryO
MsgBox("A user has been added to the Database")
Catch ex As SqlException
If ex.Number= 2627 ThenMsgBox("A record already exists ")
End If
End Try
conn.Closet)
'Clear fields
TxtChildSerial.ClearO
TxtGuardian.ClearOTxtAddress.ClearO
TxtPhone.ClearO
T xtOccu pation. C learO
TxtSiblings. Clean)
TxtChildSerial.FocusO
End SubPrivate Sub CmdExit_Click(ByVal sender As System.Object, ByVal e As
System.EventArgs) Handles CmdExit.Click
2
-
7/30/2019 Child Information Tracker
29/51
Sponsor Details
Imports System.Data.SqIClientImports System. Data
Public Class FrmSponsordetails
Private Sub Sponsor_Details_Load(ByVal sender As System.Object, ByVal eAs
System.EventArgs) Handles MyBase.Load
End Sub
Private Sub cmdNew_Click(ByVal senderAs System.Object, ByVal e As
System.EventArgs) Handles cmdNew.Click
Dim connAs SqlConnection
Dim cmd As New SqlCommand
Dim InsertCommand As String
If (CboSponsorstatus.Selectedltem = 1111)Then
-
7/30/2019 Child Information Tracker
30/51
MsgBox("ERROR: Null values not allowed")
End IfInsertCommand = "Insert into Sponsor values
(@Sponsornumber,@Sponsorname,@Sponsordate,@Sponsorstatus,@Sponsordetails)"
, Initialize the SqlCommand with the new SQL string.
Dim sql As Stringsql = ("SELECT * FROM Sponsor")
conn = New SqIConnection("Data Source=.\SQLEXPRESS;lnitial
Catalog=CIT; Integrated Security=True")
cmd = New SqICommand(lnsertCommand, conn)
, initialize them to the input-form field values.
cmd.Parameters.Add(New SqIParameter("@Sponsornumber", _
SqlDbTypeVarChar, 10))
cmd.Parameters("@Sponsornumber")Value = TxtSponsornumber.Text
cmd.Parameters.Add(New SqIParameter("@Sponsorname",_
SqIDbType.Text))cmd. Parameters("@Sponsorname").Value = TxtSponsornsme. Text
cmd. Parameters.Add (New SqIParameter("@Sponsordate", _
SqIDbType.DateTime))
cmd.Parameters("@Sponsordate")Value = TxtDstesincesponsorship.Text
cmd. Parameters.Add(New SqIParameter("@Sponsorstatus", _
SqIDbType.Text))
cmd. Parameters("@Sponsorstatus")Value = CboSponsorstatus. Selected Item
cmd.Parameters.Add(New SqIParameter("@Sponsordetails",_
SqIDbType.VarChar, 30))
cmd. Parameters("@Sponsordetails").Value = TxtSponsordetailsquestions. Text
Try
conn.OpenO
cmd. ExecuteNonQueryO
MsgBox("New Record added to the Database")
Catch ex As SqlException
Ifex.Number = 2627 Then
MsgBox("A record already exists ")End If
End Try
'Clear fields
TxtSponsornumber. ClearOTxtSponsornsme.ClearO
TxtDstesincesponsorship.ClearO
CboSponsorstatus.Selectedlndex = 0
TxtSponsordetailsquestions.ClearO
TxtSponsornumber.FocusOconn.Closet)
2
-
7/30/2019 Child Information Tracker
31/51
End Sub
Private Sub CmdUpdate_Click(ByVal sender As System.Object, ByVal e As
System.EventArgs) Handles CmdUpdate.Click
Dim conn As SqlConnectionDim cmd As New SqlCommandDim updatecommand As String
updatecommand = "UPDATE Sponsor SET Sponsorname ="' & TxtSponsornsme.Text
& "',Sponsordate ='" & TxtDstesincesponsorship.Text & "',Sponsorstatus ="' &
CboSponsorstatus.Selectedltem & "',Sponsordetails ="' & TxtSponsordetailsquestions.Text &
"' WHERE Sponsornumber= "' & TxtSponsornumber.Text & 1111'
, Initialize the SqlCommand with the new SOL string.
Dim sql As String
sql = ("SELECT * FROM Sponsor ")
conn = New SqIConnection("Data Source=.\SOLEXPRESS;lnitialCatalog=CIT;lntegrated Security=True")cmd = New SqICommand(updatecommand, conn)
Try
conn.O
peru)
cmd. ExecuteNonOueryO
MsgBox("Database has been updated")
Catch ex As SqlException
If ex.Number = 2627 Then
MsgBox("Database not updated")End If
End Tryconn.Closet)
'Clear fields
TxtSponsornumber.ClearO
TxtSponsornsme. ClearO
T xtDstesi ncesponsorsh ip. C leart)
CboSponsorstatus.Selectedlndex = 0
TxtSponsordetailsquestions.ClearOTxtSponsornumber. FocusO
End Sub
Private Sub CmdExit_Click(ByVal sender As System.Object, ByVal e As
-
7/30/2019 Child Information Tracker
32/51
System. EventArgs) Hand les Cmd Exit. Click
Me.ClaseOEnd Sub
End Class
Main Form
2
-
7/30/2019 Child Information Tracker
33/51
Public Class FrmMain
Private Sub CITTooIStripMenultem_Click(ByVal sender As System.Object, ByVal e As
System.EventArgs) Handles CITToolStripMenultem.Click
End Sub
Private Sub L TTTooIStripMenultem_Click(ByVal sender As System.Object, ByVal e As
System. EventArgs)
End Sub
Private Sub EXITTooIStripMenultem_Click(ByVal sender As System.Object, ByVal e As
System. EventArgs) Handles EXITT oolStripMenu Item. Click
Me.CloseO
End Sub
Private Sub ReportsTooIStripMenultem_Click(ByVal sender As System.Object, ByVal e As
System.EventArgs) Handles ReportsToolStripMenultem.Click
End Sub
-
7/30/2019 Child Information Tracker
34/51
Private Sub GuardiandetailsReportTooIStripMenultem_Click(ByVal sender As
System.Object, ByVal e As System.EventArgs) Handles
Guard iandeta i IsReportT oolStripMenu Item. Click
Guardiandetails.ShowO
End Sub
Private Sub ChilddetailsReportTooIStripMenultem_Click(ByVal sender As System.Object,
ByVal e As System. EventArgs) Handles ChilddetailsReportToolStripMenultem.Click
Childdetails_Report.ShowO
End Sub
Private Sub SponsorReportTooIStripMenultem_Click(ByVal sender As System.Object,
ByVal e As System.EventArgs) Handles SponsorReportToolStripMenultem.Click
Sponsor_Report.ShowO
End Sub
Private Sub AuthenticationTooIStripMenultem_Click(ByVal sender As System.Object,
ByVal e As System.EventArgs) Handles AuthenticationToolStripMenultem.Click
Frmuserdetails.ShowOEnd Sub
Private Sub ChildDetailsTooIStripMenultem_Click(ByVal sender As System.Object, ByVal
e As System.EventArgs) Handles ChildDetailsToolStripMenultem.Click
FrmChilddetailstracker.ShowOEnd Sub
Private Sub GuardianDetailsTooIStripMenultem_Click(ByVal sender As System.Object,
ByVal e As System. EventArgs) Handles GuardianDetailsToolStripMenultem.Click
FrmGuardiandetails.ShowOEnd Sub
Private Sub SponsorDetailsTooIStripMenultem_Click(ByVal sender As System.Object,
ByVal e As System.EventArgs) Handles SponsorDetailsToolStripMenultem.Click
F rmSponsordetails. ShowOEnd Sub
End Class
2
-
7/30/2019 Child Information Tracker
35/51
User Details
Imports System.Data.SqIClient
Imports System. Data
Public Class Frmuserdetails
Private Sub Cmdoksigninlog_Click(ByVal sender As System.Object, ByVal e AsSystem.EventArgs) Handles Cmdoksigninlog.Click
Dim cmd As New SqlCommand
Dim conn As New SqlConnection
Dim insertCommand As String
If (Txtnamesigninlog.Text = 1111Or Txtdepartmentsigninlog.Text = '"' Or
Txtusernamesigninlog.Text= 1111Or Txtpasswordsigninlog.Text = 1111Or
Txtconfirmpasswordsigninlog.Text = 1111) Then
MsgBox("ERROR: Null values not allowed")
Exit Sub
End If
Dim sql As String
sql = ("SELECT * FROM Authentication "), initialize them to the input-form field values.
insertCommand = "insert into Authentication values
-
7/30/2019 Child Information Tracker
36/51
(@AutnenID,@Name,@Department,@Username,@Password,@Comfirmpassword)", Initialize the SqlCommand with the new SQL string.
conn = New SqIConnection("Data Source=.\SQLEXPRESS;lnitial
Catalog=CIT;lntegrated Security=True")
cmd = New SqICommand(insertCommand, conn)
, initialize them to the input-form field values.cmd.Parameters.Add(New SqIParameter("@AutnenID", _
SqIDbType.lnt))
cmd.Parameters("@AutnenID").value = TxtAuthenlD.Text
cmd.Parameters.Add(New SqIParameter("@Name", _
SqIDbType.Text))
cmd.Parameters("@Name").value = Txtnamesigninlog.Text
cmd.Parameters.Add(New SqIParameter("@Department",_
SqIDbType.Text))
cmd. Parameters("@Department").value = Txtdepartmentsigninlog. Text
cmd.Parameters.Add(New SqIParameter("@Username", _
SqIDbType.varChar, 15))cmd. Parameters("@Username").value = Txtusernamesigninlog. Text
cmd.Parameters.Add(New SqIParameter("@Password", _
SqIDbType.varChar, 15))
cmd.Parameters("@Password").value = Txtpasswordsigninlog.Text
cmd. Parameters.Add(New SqIParameter("@Comfirmpassword",_
SqIDbType.varChar, 15))
cmd.Parameters("@Comfirmpassword").Value = Txtconfirmpasswordsigninlog.Text
Try
conn.Open
O
cmd. ExecuteNonQueryO
MsgBox("A user has been added to the Database")
Catch ex As SqlException
Ifex.Number = 2627 Then
MsgBox("A record already
exists")End If ~
End Try
'Clear fields
TxtAuthen I D. Clean)
Txtnamesigninlog.ClearOTxtdepartmentsigninlog.ClearO
Txtusernamesigninlog.ClearO
Txtpasswordsigninlog.ClearO
Txtconfirmpasswordsigninlog.ClearO
TxtAuthenlD.FocusOEnd Sub
2
-
7/30/2019 Child Information Tracker
37/51
Private Sub btnUpdate_Click(ByVal sender As System.Object, ByVal e As
System.EventArgs) Handles btnUpdate.Click
Dim conn As SqlConnection
Dim cmd As New SqlCommand
Dim updatecommand As String
updatecommand = "UPDATE Authentication SET AutnenlD ='" & TxtAuthenlD.Text & III,
Name ='" & Txtnamesigninlog.Text & "', Department ='" & Txtdepartmentsigninlog.Text & "',
Username ='" & Txtusernamesigninlog.Text & "', Password ='" & Txtpasswordsigninlog.Text
& "', Comfirmpassword ='" & Txtconfirmpasswordsigninlog.Text & "'"
, Initialize the SqlCommand with the new SOL string.
Dim sqlAs String
sql = ("SELECT * FROM Authentication ")
conn = New SqIConnection("Data Source=.\SOLEXPRESS;lnitial
Catalog=CIT; Integrated Security=True")
cmd = New SqICommand(updatecommand, conn)
Try
conn.O
penO
cmd. ExecuteNonOueryO
MsgBox("Database has been updated")
Catch ex As SqlException
Ifex.Number = 2627 Then
MsgBox("Database not updated")
End IfEnd Try
conn.CloseO
'Clear fields
TxtAuthenlD.ClearO
Txtnamesigninlog.ClearO
Txtdepartmentsigninlog.ClearO
Txtusernamesigninlog.ClearO
Txtpasswordsigninlog.ClearO
Txtconfirmpasswordsigninlog.ClearO
TxtAuthenlD.FocusO
End
Sub
End ClassEnd SubPrivate Sub btnUpdate_Click(ByVal sender As System.Object, ByVal e
As
-
7/30/2019 Child Information Tracker
38/51
System.EventArgs) Handles btnUpdate.Click
Dim conn As SqlConnection
Dim cmd As New SqlCommand
Dim updatecommand As String
updatecommand = "UPDATE Authentication SET AutnenlD ='" & TxtAuthenlD.Text & III,
Name ='" & Txtnamesigninlog.Text & "', Department ='" & Txtdepartmentsigninlog.Text & "',
Username ='" & Txtusernamesigninlog.Text & "', Password ='" & Txtpasswordsigninlog.Text
& "', Comfirmpassword ='" & Txtconfirmpasswordsigninlog.Text & "'"
, Initialize the SqlCommand with the new SOL string.
Dim sqlAs String
sql = ("SELECT * FROM Authentication ")
conn = New SqIConnection("Data Source=.\SOLEXPRESS;lnitial
Catalog=CIT; Integrated Security=True")
cmd = New SqICommand(updatecommand, conn)
Try
conn.O
penO
cmd. ExecuteNonOueryO
MsgBox("Database has been updated")
Catch ex As SqlException
Ifex.Number = 2627 Then
MsgBox("Database not updated")
End If
End Tryconn.CloseO
'Clear fields
TxtAuthenlD.ClearO
Txtnamesigninlog.ClearO
Txtdepartmentsigninlog.ClearO
Txtusernamesigninlog.ClearO
Txtpasswordsigninlog.ClearO
Txtconfirmpasswordsigninlog.ClearO
TxtAuthenlD.FocusO
End SubEnd Class
2
-
7/30/2019 Child Information Tracker
39/51
Child Details
Imports System.Data.SqIClient
Imports System. Data
Public Class FrmChilddetails
Private Sub cmdNew_Click(ByVal sender As System.Object, ByVal e As
System.EventArgs) Handles cmdNew.Click
Dim ms As MemoryStream
Dim arrlmageOAs Byte
Dim strSqlAs String
If Tag = "Insert" ThenstrSql = ("Insert into
Childdetails(Childnumber,Childname,Dayofbirth,Monthofbirth,Yearofbirth,Age,Gender,Addres
sResidence, Phonenumber, Emailadd ress, Schoolattend, Class, Datereg istered, Dateupdated,C
hildstatus,Childlmage) values
(@Childnumber,@Childname,@Dayofbirth,@Monthofbirth,@Yearofbirth,@Age,@Gender,@
AddressResidence,@Phonenumber,@Emailaddress,@Schoolattend,@Class,@Dateregister
ed,@Dateupdated,@Childstatus,@Childlmage),,)
End If
-
7/30/2019 Child Information Tracker
40/51
cmd = Createcommand("lnsert into
Childdetails(Childnumber,Childname,Dayofbirth,Monthofbirth,Yearofbirth,Age,Gender,Addres
sResidence,Phonenumber,Emailaddress,Schoolattend,Class,Dateregistered,Dateupdated,C
hildstatus,Childlmage) values
(@Childnumber,@Childname,@Dayofbirth,@Monthofbirth,@Yearofbirth,@Age,@Gender,@
AddressResidence,@Phonenumber,@Emailaddress,@Schoolattend,@Class,@Dateregistered,@Dateupdated,@Childstatus,@Childlmage)")
cmd.Parameters.Add(New SqIParameter(I@Childlmage", SqIDbType.lmage))
cmd.Parameters.Add(New SqIParameter(I@Childnumber", Me.TxtChildnumber.Text))
cmd.Parameters.Add(New SqIParameter(I@Childname", Me.TxtChildname.Text))
cmd.Parameters.Add(New SqIParameter(I@Dayofbirth", Me.TxtDay.Text))
cmd.Parameters.Add(New SqIParameter(I@Monthofbirth",
Me.CboMonth.Selectedltem))
cmd.Parameters.Add(New SqIParameter(I@Yearofbirth", Me.TxtYear.Text))
cmd.Parameters.Add(New SqIParameter(I@Age", Me.CboAge.Selectedltem))
cmd. Parameters.Add (New SqIParameter(I@Gender", Me. CboGender. Selected Item))
cmd.Parameters.Add(New SqIParameter(I@AddressResidence", Me.TxtAddress.Text))
cmd.Parameters.Add(New SqIParameter(I@Phonenumber",
Me. TxtPhonenumber. Text))
cmd.Parameters.Add(New SqIParameter(I@Emailaddress", Me.TxtEmail.Text))
cmd.Parameters.Add(New SqIParameter(I@Schoolattend",
Me. TxtSchoolattended. Text))
cmd.Parameters.Add(New SqIParameter(I@Class", Me.CboClass.Selectedltem))
cmd.Parameters.Add(New SqIParameter(I@Dateregistered",
Me.TxtDateregistered.Text))
cmd.Parameters.Add(New SqIParameter(I@Dateupdated", Me.TxtDateupdated.Text))
cmd.Parameters.Add(New SqIParameter(I@Childstatus",
Me.CboChildStatus.Selectedltem))r--
IfNot PicChildimage.lmage Is Nothing Then
ms = New MemoryStreamOPicChildimage.lmage.Save(ms, PicChildimage.lmage.RawFormat)
arrlmage = mS.GetBufferrns.Closei)
cmd.Parameters(I@Childlmage")Value = arrlmageElse
cmd.Parameters(I@Childlmage")Value = DBNuliValueEnd If
Ifcmd.ExecuteNonQuery = 1 Thenclosecon nection 0
PicChildimage.lmage = Nothing
PicChildimage.lnvalidateO
TxtChildnumber.ClearO
TxtChildname.ClearO
TxtDay.ClearO
2
-
7/30/2019 Child Information Tracker
41/51
CboMonth.Selectedlndex = 0
TxtYear.ClearO
CboAge.Selectedlndex = 0
CboGender.Selectedlndex = 0TxtAddress.ClearO
TxtPhonenumber. ClearOTxtEmail.ClearO
TxtSchoolattended. ClearO
CboClass.Selectedlndex = 0TxtDateregistered.ClearO
TxtDateupdated. Clean)
CboChildStatus.Selectedlndex = 0
TxtChildnumber. FocusO
Tag = "Insert"
End If
r= arrlmage = Nothing
ms = NothingstrSql = Nothing
End Sub
Private Sub btnBrowse_Click(ByVal sender As System.Object, ByVal e As
System.EventArgs) Handles BtnBrowse.Click
With dig
.Filter = "All Filesl*.*IBitmapl*.bmpIGIFI*.gifllconl*.icoIJPEGI*jpgIPNGI*png".Filterlndex = 5
-
7/30/2019 Child Information Tracker
42/51
MsgBox("A record already exists ")
End If
End Try
End Sub
Public Sub closeconnectionO
con.Closet)
End Sub
Public Function Createcommand(ByVal query As String) As SqlCommand
setconnectionO
Dim command As New SqICommand(query, con)
Return command
End Function
Public Function CreateReader(ByVal query As String) As SqlDataReaderDim reader As SqlDataReader
setconnectionO
cmd = Createcommand(query)
reader= cmd.ExecuteReaderO
Return reader
End Function
Private Sub CmdClose:Click(ByVal sender As Object, ByVal e As System.EventArgs)
Handles CmdClose.ClickMe.CloseO
End SubEnd Class
2
-
7/30/2019 Child Information Tracker
43/51
Reports forClTs
Reports were generated forthe following modules:
* Child Details Report
* Sponsor Details Report
* Guardian Details Report
-
7/30/2019 Child Information Tracker
44/51
Child details Report
PublicClass Child_Report
PrivateSub Child_Report_Load(ByVal senderAs System.Object, ByVal eAsSystem.EventArgs) HandlesMyBase.Load 'TODO: This line of code loads data into the 'CITDataSet.Childdetails' table. You canmove, or remove it, as needed.
Me.ChilddetailsTableAdapter.Fill(Me.CITDataSet.Childdetails)
Me.ReportViewer1.RefreshReport() EndSubEndClass
2
-
7/30/2019 Child Information Tracker
45/51
Sponsor Report
PublicClass Sponsor_Report
PrivateSub Sponsor_Report_Load(ByVal senderAs System.Object, ByVal eAsSystem.EventArgs) HandlesMyBase.Load 'TODO: This line of code loads data into the 'CITDataSet.Sponsor' table. You can move,or remove it, as needed.
Me.SponsorTableAdapter.Fill(Me.CITDataSet.Sponsor)
Me.ReportViewer1.RefreshReport() EndSubEndClass
-
7/30/2019 Child Information Tracker
46/51
Guardian details Report
PublicClass Guardiandetails
PrivateSub Guardiandetails_Load(ByVal senderAs System.Object, ByVal eAsSystem.EventArgs) HandlesMyBase.Load 'TODO: This line of code loads data into the 'CITDataSet.Guardiandetails' table. Youcan move, or remove it, as needed. Me.GuardiandetailsTableAdapter.Fill(Me.CITDataSet.Guardiandetails) 'TODO: This line of code loads data into the 'CITDataSet.Childdetails' table. You canmove, or remove it, as needed. Me.ChilddetailsTableAdapter.Fill(Me.CITDataSet.Childdetails) 'TODO: This line of code loads data into the 'CITDataSet.Sponsor' table. You can move,or remove it, as needed. Me.SponsorTableAdapter.Fill(Me.CITDataSet.Sponsor)
Me.ReportViewer1.RefreshReport() EndSub
PrivateSub ReportViewer1_Load(ByVal senderAs System.Object, ByVal eAsSystem.EventArgs) Handles ReportViewer1.Load
2
-
7/30/2019 Child Information Tracker
47/51
EndSubEndClass
SYSTEM TESTING AND IMPLEMENTATION
SYSTEM TESTING
System testing is a critical aspect of Software Quality Assurance and represents the ultimate
review of specification, design and coding. Testing is a process of executing a program with
the intent of finding an error. A good test is one that has a probability of finding an as yet
undiscovered error. The purpose of testing is to identify and correct bugs in the developed
system. Nothing is complete without testing. Testing is the vital to the success of the system.
In the code testing the logic of the developed system is tested. For this every module of the
program is executed to find an error. To perform specification test, the examination of the
specifications stating what the program should do and how it should perform under various
conditions.
Unit testing focuses first on the modules in the proposed system to locate errors. This
enables to detect errors in the coding and logic that are contained within that module alone.
Those resulting from the interaction between modules are initially avoided. In unit testing
step each module has to be checked separately.
System testing does not test the software as a whole, but rather than integration of each
module in the system. The primary concern is the compatibility of individual modules. One
has to find areas where modules have been designed with different specifications of data
lengths, type and data element name.
Testing and validation are the most important steps after the implementation of the
developed system. The system testing is performed to ensure that there are no errors in the
-
7/30/2019 Child Information Tracker
48/51
implemented system. The software must be executed several times in order to find out the
errors in the different modules of the system.
Validation refers to the process of using the new software for the developed system in a live
environment i.e., new software inside the organization, in order to find out the errors. The
validation phase reveals the failures and the bugs in the developed system. It will be come to
know about the practical difficulties the system faces when operated in the true environment.
By testing the code of the implemented software, the logic of the program can be examined.
A specification test is conducted to check whether the specifications stating the program are
performing under various conditions. Apart from these tests, there are some special tests
conducted which are given below:
Peak Load Tests: This determines whether the new system will handle the volume of
activities when the system is at the peak of its processing demand. The test has revealed
that the new software for the agency is capable of handling the demands at the peak time.
Storage Testing: This determines the capacity of the new system to store transaction data on
a disk or on other files. The proposed software has the required storage space available,
because of the use of a number of hard disks.
Performance Time Testing: This test determines the length of the time used by the system to
process transaction data.
In this phase the software developed Testing is exercising the software to uncover errors and
ensure the system meets defined requirements. Testing may be done at 4 levels
* Unit Level
* Module Level
* Integration & System
* Regression
UNIT TESTING
2
-
7/30/2019 Child Information Tracker
49/51
A Unit corresponds to a screen /form in the package. Unit testing focuses on verification of
the corresponding class or Screen. This testing includes testing of control paths, interfaces,
local data structures, logical decisions, boundary conditions, and error handling. Unit testing
may use Test Drivers, which are control programs to co-ordinate test case inputs and
outputs, and Test stubs, which replace low-level modules. A stub is a dummy subprogram.
MODULE LEVEL TESTING
Module Testing is done using the test cases prepared earlier. Module is defined during the
time of design.
INTEGRATION & SYSTEM TESTING
Integration testing is used to verify the combining of the software modules. Integration
testing addresses the issues associated with the dual problems of verification and program
construction. System testing is used to verify, whether the developed system meets the
requirements. 8.1.4 REGRESSION TESTING
Each modification in software impacts unmodified areas, which results serious injuries to that
software. So the process of re-testing for rectification of errors due to modification is known
as regression testing.
Installation and Delivery:
Installation and Delivery is the process of delivering the developed and tested software to the
customer. Refer the support procedures. Acceptance and Project Closure:
Acceptance is the part of the project by which the customer accepts the product. This will be
done as per the Project Closure, once the customer accepts the product; closure of the
project is started.
SYSTEM IMPLEMENTATION
Implementation includes all those activities that take place to convert from the old system to
the new. The old system consists of manual operations, which is operated in a very different
manner from the proposed new system. A proper implementation is essential to provide a
-
7/30/2019 Child Information Tracker
50/51
reliable system to meet the requirements of the organizations. An improper installation may
affect the success of the computerized system.
IMPLEMENTATION METHODS
There are several methods for handling the implementation and the consequent conversion
from the old to the new computerized system.
The most secure method for conversion from the old system to the new system is to run the
old and new system in parallel. In this approach, a person may operate in the manual older
processing system as well as start operating the new computerized system. This method
offers high security, because even if there is a flaw in the computerized system, we can
depend upon the manual system. However, the cost for maintaining two systems in parallel isvery high. This outweighs its benefits.
A working version of the system can also be implemented in one part of the organization and
the personnel will be piloting the system and changes can be made as and when required.
But this method is less preferable due to the loss of entirety of the system.
FUTURE APPLICATION
The current application developed is in accordance with the request that has been provided
by the organization. Regarding the future enhancement, the application can be further
expanded in accordance with changing scenarios. Since the change in testing and user
needs arises frequently in certain short intervals of time, the application can be further
upgraded to meet the requirements that may arise in the far or near future. With regards to
the needs that arise, more and more features can be included by adding them as separate
modules and integrate them with the existing system.
The .NET today is based on the OOP concept, whose main advantage is modularity, which
helps us in adding the future needs as add-on modules to work with the main system which
can be done effortlessly instead of rewriting or modifying the entire application. So the scope
of future enhancement is absolutely clear with the concept that is incorporated and that was
used to build the application.
2
-
7/30/2019 Child Information Tracker
51/51
CONCLUSION
The system has been developed with much care that it is free of errors and at the same time
it is efficient and less time consuming. The important thing is that the system is robust. Avoid
malfunction from outsiders .It goes through all phases of software development cycle. So
product is accurate. Also provision is provided for future developments in the system.
BIBLIOGRAPHY
Requirement Paper (http://www.cis.ksu.edu/~sdeloach/748/homework/case-study.htm)IEEE Recommended Practice For Software Requirement Specifications(http://www.cis.ksu.edu/~sdeloach/748/papers/IEEE%20recommended%20practice%20for%20software%20requirements%20specifications.pdf)Software Project Management: a unified framework.Walker Royce. 5th edition, 1997.www.raycomm.com
http://www.cis.ksu.edu/~sdeloach/748/homework/case-study.htmhttp://www.cis.ksu.edu/~sdeloach/748/papers/IEEE%20recommended%20practice%20for%20software%20requirements%20specifications.pdfhttp://www.cis.ksu.edu/~sdeloach/748/papers/IEEE%20recommended%20practice%20for%20software%20requirements%20specifications.pdfhttp://www.raycomm.com/http://www.cis.ksu.edu/~sdeloach/748/papers/IEEE%20recommended%20practice%20for%20software%20requirements%20specifications.pdfhttp://www.cis.ksu.edu/~sdeloach/748/papers/IEEE%20recommended%20practice%20for%20software%20requirements%20specifications.pdfhttp://www.raycomm.com/http://www.cis.ksu.edu/~sdeloach/748/homework/case-study.htm