Rizwan Khan

107
A PROJECT REPORT ON HOTEL MANAGEMENT Submitted in Partial Fulfilment of Requirement For the Degree of “Bachelor of computer application” M.J.P ROHILKHAND UNIVERSITY, BAREILLY SESSION 2014-15 PROJECT GUIDE:- SUBMITTED BY:- MR. ASIF MUSTAFA RIZWAN MUSTAFA (LECTUReR) BCA 6 TH SEM (COMPUTER APPLICATION DEPtt.) ROLL NO. 131110012 1

description

Rizwan Khan

Transcript of Rizwan Khan

APROJECT REPORT ONHOTEL MANAGEMENTSubmitted in Partial Fulflment of RequirementFor the Degree ofBachelor of computer applicationM.J.P ROHILKHAND UNIVERSITY, BAREILLYSESSION 2014-15PROJECT GUIDE:- SUBMITTED BY:-MR. ASIF MUSTAFA RIZWAN MUSTAFA(LECTUReR)BCA 6TH SEM(COMPUTER APPLICATION DEPtt.) ROLL NO. 131110012KHUSRO MEMORIAL DEGREE COLLEGEC.B GANJ BAREILLY 1Certifcate This is to certify that the project reportentitled HOTEL MANAGEMENT SYSTEMhas been completed byRIZWANMUSTAFA.Whoisthestudentof BCA(BachelorofComputerApplication)session2014201! at department of Computer"cience of #husro $emorial %e&ree Colle&ec'b' (anj Bareilly' Thisistocertifythat theabo)estatements are correct to the best ofmy*no+led&eandbelief'2 Project Guide-MR. ASIF MUSTAFA

ACKNOWLEDGEMENTComputers are magnifcent tools for the realization of ourdreams, but no machine can replace the human spark of spirit,compassion, love, and understanding. Thanks God, themerciful and the passionate, for providing us the opportunityto step in the excellent world of computer science.Thanks goes to our project guide MR.ASIF MUSTAFAMR. VEER PAL SAHU (H.O.D of BCA department), MR.SYED MUSHARRAF ALI Lecturer, Department ofComputer Science, Her valuable guidance, advice, motivationand patience helped us all the time of writing and coding ofthis project. We also wish to Thanks to DR. ASIF KHAN(CONVENER) Department of Computer Science, for hissincere and timely cooperation during this period. His kindsupport and guidance have been of great value in this project.This work would not be possible without his help.We also convey our sincere thanks to MR. VEER PAL SAHU(H.O.D of BCA department), for all the facilities provided to usin carrying out this project and motivation. They had given asduring the progress of this project.3We are also grateful to our entire group members for theirvaluable suggestions and words for inspiration for our projectwork i.e. HOTEL MANAGEMENT SYSTEM remainthankful to the entire staf of department of Computer Science.Lastly, I ofer my regards and blessing to all of those whosupported me in any respect during the completion of thisproject work.4Thank You(RIZWAN MUSTAFA)

PREFACE The main objective of this project is to computerizethe check in and checkout of customers. As the work is donemanually there is a lot of paperwork and the data are scatteredin various fles so there is a lot of chances for the loss ofinformation. For decreasing the paper work so that it may savetime we need to make the system computerize. Due to this thework will be done much faster in comparision to manual work,which will be done much faster in comparison to manual work,which will be error free. Computerization is done for thefollwing main purpose:Computerization the sales and fnance accounts systemReducing the paper workTime ManagementAccuracy and portabilitySpeed up decision-makingTo control the operationError free operation

TABLE OF CONTENTS1. INTRODUCTION 7 OPERATION ENVIRONMENT 8 OBJECTIVE92.VISUAL BASIC103. PROBLEM DEFINITION 114. SOFTWARE DESIGN 125. FEASIBILITY STUDY 126. SOFTWARE REQUIREMENTS SPECIFICATION14-157. DEFICIENCY OF CURRENT SYSTEM 16-188. SOFTWARE ENGINEERING PROCESS MODEL USED19-219. VALIDATION CHECKS 22-2310.DATA FLOW DIAGRAM24-3211. TABLE33-3712. SNAP SHOT38-5113. CODING52-8514. SYSTEM TESTING 86-8915. EVALUATION 90-9216. CONCLUSION 93617. REFERENCES 94INTRODUCTION OF HOTEL A hotel is an establishment that provides lodging paid ona short term basis. Facilities provided may range from a basic bed andstorage for clothing , to luxury features like en-suite bathrooms .Largerhotels may provided additional guest facilities such as a swimming pool,business centre, childcare , conference facilities and social functionservices.Hotel rooms are usually numbered (or named in some smaller hotelsand B&Bs) to allow guests to identify their room. Some hotels ofermeals as part of a room and board arrangement. In the UnitedKingdom , a hotel is required by law to serve food and drinks to allguests within certain stated hours. In Japan, capsule hotels provided aminimized amount of room space and shared facilities.An upscale full service hotel facilities that ofers luxury amenities , fullservice accommodation ,on-site full service restaurant(s),and the highestlevel of personalized and professional service. Luxury Hotels arenormally classifedwith at least a four Diamond or fve Diamond statusor a four or Five Star rating depending on the country and localclassifcation standards . Examples may include : Waldorf Astoria , FourSeasons, Conrad ,Fairmont ,and Ritz Carlton.Full service hotels often contain upscale full-service facilities with a largevolume of full service accommodation, on-site full servicerestaurant(s) ,and a variety of on-site amenities such as swimmingpools , a health club, childrens activities ,ballrooms ,on-site conferencefacilities ,and other amenities .Examples may include: InterContinental ,Starwood-Westin, Hilton,Marriott, and Hyatt hotels!OPERATION ENVIRONMENTPROCESSOR DUAL CORE CORE,2OPERATING SYSTEM WINDOW98, WINDOW XP, &WINDOW 7, MEMORY 1GB RAM OR ROMEHARD DISK SPACE MINIMUM 60GB DATABASE USAGE FOR FUTUREDATABASE MS ACCESS, SQL SERVER 2005"OBJECTIVEOur team has decided to work on a PROJECT on a veryinteresting topic HOTEL MANGEMENT SYSTEM that keepsall the maintenance records of entry data. The system will bevery much prevalent in coming times to help the users in theiroperations in connection with security.Our objectives here is to automate all above activities used insoftware in user friendly manner to entertain user and givenrise to their knowledge and also to eliminate the difculties.It was very encouraging, motivating and of all purpose an entirely new experience for us to do better infuture.#INTRODUCTION TO VISUAL BASICVISUAL BASIC is a high level programming language which evolved from the earlier DOS version called BASIC. BASIC means Beginners'All-purpose Symbolic Instruction Code. It is a veryeasy programminglanguage to learn. The code look a lotlike English Language. Diferentsoftware companies produced diferent versions of BASIC, such as MicrosoftQBASIC, QUICKBASIC, GW BASIC ,IBM BASICA and so on. However, peopleprefer to use Microsoft Visual Basic today, as it is a well developedprogramming language and supporting resources are available everywhere.Now, there are many versions of VB exist in the market, the most popular oneand still widely used by many VB programmers is none other than VisualBasic 6. We also have VB.net, VB2005, VB2008 and the latest VB2010. BothVb2008 and VB2010 are fully object oriented programming (OOP) language. History of visual basic:-Alan cooper is considered the father of visual basic. In 1987, then director of application of software for coactive computingcorporation wrote a program called Rubythat delivered visual programming to the average programmer/user. VB 1.0 was introduced in 1991. The Drag and drop design for creating the user interface is derived form developedby Alan cooperand his company called tripod. Microsoft contracted with cooper and his associates to develop tripodin to a program able form system for window 3.0 under the code Ruby. Tripod did not include a programming language at all. Microsoft decided to combine ruby with the basic language to create visual basic.10 Visual basic can used in a number of diferent areas, for Example: education, Engineering, Research, Medicine, Business, Commerce Marketing and sales, Accounting, Consulting, Law, Science.PROBLEM DEFINITIONOur project attempts to replace the tedious and time spaceconsuming paper and pen work with the easy to use, time, spacesaving computerized system.When we start to work on this project we thought to giveemphasis only on Hotel Management System. When we want tocollect data from companies/colleges. We notice numbers ofshortcomings in the existing system. After passing all the phase of a software development, wewere able to fulfl the shortcoming of the Hotel ManagementSystem. Simple interface of the system let one to work easily. All theauthority and security of the software let one to work easily. All theauthority and security if the software highly checked.According to the working condition and requirements we haveof Hotel Management System. 11SOFTWARE DESIGNOBJECTIVE OF DESIGN: It provides better and efcient service to members. Reduce the workload of employee. Faster retrieval of information about the desired book. Provide facility for proper monitoring reduces paper workand provide data security. All details will be available on a click. Fast access to database (Quick transaction) less error. More storage capacity. Search facility. Look and Feel Environment. FEASIBILITY STUDYA procedure that identifes, describes and evaluatescandidate systems and selects the best system for the job iscalled as Feasibility Study.Three key considerations are involved in the feasibility analysis:1.Technical Feasibility2.Economic Feasibility3.Behavioural Feasibility121. TECHNICAL FEASIBILITY The use of Microsoft Visual Studio .NET makes form designeasy and convenient. The project can be run on any system withminimum requirements. It reduces data entry errors because of dataentry validation, it can be easily handled by any user, and it also helps infaster form design. Also the project database though developed in SQLSERVER 2005, it is very easy to operate. Hence the project is technicallyfeasible.2. ECONOMIC FEASIBILITYCost beneft analysis is very important in deciding whether the project iseconomically feasible or not. It is alone sufcient to save our time andmoney. It is one time investment and does not require regularmaintenance. Through cost beneft analysis it was concluded that thebenefts outweigh costs and thus the project is economically feasible.3.BEHAVIOURAL FEASIBILITY Behavioural feasibility determines how much efort will go intoeducating, selling and training the user staf on a candidate system. Theproject was also evaluated to be behaviourally feasible as it is very user-friendly and hardly needs any extra eforts to educate user for its utilityand functioning.13SOFTWARE REQUIREMENT SPECIFICATION The SRS is often referred to as the parent documentbecause all subsequent project management documents, such as designspecifcations, statements of work, software architecture specifcations,testing and validation plans, and documentation plans, are related to it.The SRS document itself states in precise and explicit language thosefunction and capabilities software. Its important to note that an SRScontains functional and non functional requirement only; it doesnt oferdesign suggestion, possible solutions to technology or business issues, orany other information other than what the development teamunderstands the customers system requirements to be.A well-designed, well-written SRS accomplish four major goals:It provides feedback to the customer. An SRS is the customers assurancethat the development organization understands the issues or problemsto be solved and the behaviour necessary to address those problems. It decomposes the problem into component parts. The simpleact of writing down software requirement in a well-designed formatorganizes information places border surround the problem, solidifesideas, and helps break down the problem into its component part in anorderly fashion. It serves as a product validation check. The SRS also serves asthe parent document for testing and validation strategies that will beapplied to the requirements for verifcation.

14NEED FOR SRS The basic purpose of software requirements is to bridge thecommunication gap between the customer and a user. SRS is a mediumthrough which the client and the user need i.e. actually defned. A SRSestablishes the basic of agreement between the user & the supplier onwhat product will do? The basic foe the agreement is frequently obligedinto a legal contact between the user and developer. Through the SRS theclientclearly describes. What is the expected from the developer and the developer clearlyunderstand?What capability to build in software?A SRS provides a reference or validation of the fnal product i.e.SRS helps the user to determine of the software needs the clientsrequirements. Without a proper SRS there is no way a user candetermine if the software being delivered is what cost ordered and thereis no way requirements have been fulflled.SRS will most likely manifesto. As an error in the fnal systemimplements SRS. After all the SRS document specifes a long systemthe even a correct not satisfy the user. Yearly , if we want qualitysoftware that has few errors we must begin with high quality software.High quality SRS reduces the development cost. A quality ofSRS has impact on the product. We have already seen that errorincreases almost exponentially as the time progresses. A requirementerror is dedicated and removed after the system has been developed cancost up to 100times. More than removing, it during the requirement1phase. Clearly, we can have a tremendous reduction in the project byreducing errors in the SRS.Requirement specifcation is an attempt to develop. USER FEINDLLLY SOFTWAR to help users. First of all we need to determine exact requirements of the users so that the software thus we are going to develop would them in the best possible manner as it can users would not face the problems that they were facing with the previous system.Requirements specifcation document clearly andaccurately list all the needs and requirement of the users andalso the problems that users were facing in previous systemDEFICIENCY OF CURRENT SYSTEMLack of quick information:In the current system there is lack of quick information. Ifsomeone wants information about any particular topic then it takes lotsof time to give him/her that information. For getting that informationhe/she will to wait for long time which can also be the disadvantage.Lack of security:In the current system all the transaction are handledmanually so it is not very much safe on account of keeping records ofkeeping record secured so that anyone cannot make any wrongmanipulation with that and also cannot spoil the record. The fles inwhich information is stored can be stolen or destroyed by the third party.They may also be damaged due to the natural problems such they may16caught fre or rates may also bite them. It is also very easy for oneinformation stored in the fle.Increasing the cost of stationary: In current system all the details are kept manually so it isincreases the cost of stationary.Information overload: In current system there is information overload because all theprocessing of transaction and records keeping system is manual. Incurrent system all the details of regarding retailers, inventory, billing andorders are kept manually, so it increases the number of fles for keepingall these records.Data redundancy:It means that same data felds appear in many fles and oftenin diferent formats. In manual system. It poses quit a big problembecause the data has to be maintained in large volumes but in oursystem. This problem can be overcome by providing the condition if thedata entered is duplicate. It will not be entered otherwise updating willtake place.Difculty in accessing the data:1!In manual system, searching information is timeconsuming but in our system any information can be accessed byproviding the primary key.SOFTWARE REQUIREMENTS Operating system- Windows 98 is used as the operatingsystem as it is stable and supports more features and ismore users friendly. .NET Framework 2.0 / 3.5. Database SQL Server 2005- SQL Server 2005 is used asdatabase as it easy to maintain and retrieve records bysimple queries which are in English language which areeasy to understand and easy to write.HARDWAREREQUIREMENTS Inteldual core is used as a processor because it is fastthan other processors to provide reliable and stable andwe can run our pc for long time. By using this processor we can keep on developing ourproject without any worries. Ram 1 GB is used as it will provide fast reading andwriting capabilities and will in turn support inprocessing.1"SOFTWARE ENGINEERING PROCESS MODELUSEDThe waterfall model shows a process, where developers are tofollow these phases in order:I.Requirements specifcation (Requirements analysis)II.Software DesignIII.IntegrationIV.Testing (or Validation)V.Deployment (or Installation)VI.Implementation & MaintenanceI. Requirements Specifcation:A Software Requirements Specifcation is a complete description of the behaviour of a system to be developed. It includes a set of use cases that describe all the interactions the users will have with the software. We studied the requirement and specifcation provided byclient & list out all the functional requirement of project thatwould be implemented from our side. We also suggest clientsome good functionality like contact import. 1#II. Software design:Software design is a process of problem solving andplanning for a software solution. After the purpose andspecifcations of software are determined, software developerswill design or employ designers to develop a plan for asolution.We have divided the project into small modules and plan howwe can design and implement the module as per the clientexpectation. First we have plan a database scheme of project,which would help us to go in correct fow, we have also designthe DFD (Data Flow Design) to implement the website.III. System integration: System integration is the bringing together of thecomponent subsystems into one system and ensuring that thesubsystems function together as a system. In informationtechnology, systems integration is the process of linkingtogether diferent computing systems and software applicationsphysically or functionally, to act as a coordinated whole. Wehave complete knowledge of all interfaces that would includeon our project. It includes interfaces between Modules,Database, Server, and between the other system API(Application program interface), which would work with. For asystem to be successfully implemented and used, the elementslike DB, fles/function must be in place and functioningcorrectly.20IV. Software testing:Software testing is an investigation conducted toprovide stakeholders with information about the quality of theproduct or service under test. Software testing also provides anobjective, independent view of the software to allow thebusiness to appreciate and understand the risks of softwareimplementation. Test techniques include, but are not limited to,the process of executing a program or application with theintent of fnding software bugs (errors or other defects).We have checked the accuracy, completeness, consistency,spelling and accessibility of project. These areas are the frstthings judged by the user. Users must have the best possibleexperience with our project. V. Software deployment:Software deployment is all of the activities that make asoftware system available for use. The general deploymentprocess consists of several interrelated activities with possibletransitions between them. These activities can occur at theproducer site or at the consumer site or both. Because everysoftware system is unique, the precise processes or procedureswithin each activity can hardly be defned. Therefore,"deployment" should be interpreted as a general process that hasto be customized according to specifc requirements orcharacteristics.21VII.Implementation & Maintenance: The Maintenance phase is the longest phase of theSDLC. In this phase the software is updated to:-Fulfl the changing customer need.-Adapt to accommodate change in the external environment.-Correct errors and oversights previously undetected in thetesting phase.-Enhance the efciency of the software.VALIDATION CHECKSUnder validation we have provided certain constraintsand primary keys to few felds of the tables of the databaseused in application. This validation made at database level islisted below:Required Field Validation:we use require feld for fll the information compulsoryin the project without this validation the data will not besubmitted in the project.Not null: 22 Not null constraint is used restrict feld to have nullvalues. Few felds in our database are mandatory to fll.Numeric only: Numeric only constraints restrict feld to have numericvalues only. Otherwise it violates the rule.Character only: It restricts the feld to accept only character value.Date: The valid date with valid format should be enter in thegiven textbox. Email: The @ Symbol is required in this feld otherwise it willnot work properly23

DATA FLOW DIAGRAM24DATA FLOW DIAGRAM2CONTEXT LEVEL DFD HOTEL MANAGEMENTSYSTEM26DATA FLOW DIAGRAM OPENING A ROOM2!DATA FLOW DIAGRAM CHECK-IN OF A NEWCUSTOMER2"DATA FLOW DIAGRAM CHECK-OUT OF CUSTOMER U$%&te T&'(e$)*+e,,2#DATA FLOW DIAGRAM LISTING OF CUSTOMERS30DATA FLOW DIAGRAM BILL OF CUSTOMER P)*+e,,-./ C&,0314C(*,eD&t&'&,e3C*1$2te) B-((,CUSTOMERDATA FLOW DIAGRAM LIST OF ALL RECORDS32

TABLES33CHANGE PASSWORD34NEW CUSTOMER DETAIL3CUSTOMER DETAIL36PARKING DETAIL TABLE3!FORM & IMAGE3"SPLASH FORM IMAGE3#LOGIN IMAGE40FORGET PASSWORDIMAGE41CHANGE PASSWORD IMAGE42MAIN FORM IMAGE43ADD CUSTOMER DETAIL IMAGE44CHECKIN DETAIL IMAGE4ROOM DETAIL IMAGE46PARKING IMAGE4!FOOD MENU IMAGE4"CHECKOUT DETAILS IMAGE4#CHECKOUTIMAGE0CHECKOUT BILL IMAGE1CODING2SPLASH CODING2,-./ S3,te142,-./ S3,te1.C*((e+t-*.,.5e.e)-+42,-./ S3,te1.C*1$*.e.tM*%e(42,-./ S3,te1.D&t&42,-./ S3,te1.D)&6-./42,-./ S3,te1.L-.742,-./ S3,te1.Te8t42,-./ S3,te1.W-.%*6,.F*)1,4.&1e,$&+e W-.%*6,F*)1,A$$(-+&t-*.19$2'(-+ $&)t-&( +(&,, F*)112 : F*)19$2'(-+ F*)112()9I.-t-&(-;eC*1$*.e.t()4T-+?(*'@e+t ,e.%e)A E=e.tA)/, e)9$)*/)e,,B&)1.B&(2e C $)*/)e,,B&)1.B&(2eD14-E ($)*/)e,,B&)1.B&(2e CC 100)9t-1e)1.E.&'(e% C E&(,e4F*)11 E1 C .e6 F*)11()4E1.S0*6()4t0-,.H-%e()4

C(-+?(*'@e+t ,e.%e)A E=e.tA)/, e)9-E (te8tB*81.Te8t CC FF)9Me,,&/eB*8.S0*6(FP(e&,e e.te) 2,e) .&1eFA FI.$2t E))*)FAMe,,&/eB*8B2tt*.,.OGA Me,,&/eB*8I+*..E8+(&1&t-*.)4te8tB*81.F*+2,()4)et2).4%et&-( =&(2e,(IF D te8tB*81.Te8t D FIAIF D te8tB*82.Te8t D FIAIF D te8tB*83.Te8t D FIAIF D +*1'*B*81.Te8t D FIAIF D %&teT-1eP-+?e)1.Te8t D FIAIF D te8tB*84.Te8t D FIAIF D te8tB*8.Te8t D FIAIF D te8tB*86.Te8t D FIAIF D te8tB*8!.Te8t D FIAIF D te8tB*8".Te8t D FIAIF D te8tB*8#.Te8t D FIAIF D te8tB*810.Te8t D FI)F4+1% C .e6 S7(C*11&.%(,t)A +*.)4+1%.E8e+2teN*.N2e)3()4

Me,,&/eB*8.S0*6(FRe+*)% S2'1-tte%F)4

C(-+?(*'@e+t ,e.%e)A E=e.tA)/, e)9

-.F4+1% C .e6 S7(C*11&.%(,7(A +*.)4S7(D&t&Re&%e) %) C +1%.E8e+2teRe&%e)()4-E (%).Re&%())9,1 C %)J10K.T*St)-./()4,2 C %)J0K.T*St)-./()4 C(-+?(*'@e+t ,e.%e)A E=e.tA)/, e)9.e6 F*)113().S0*6D-&(*/()4

-%A+2,t*1e)>.&1eA/e.%e)A&%2(t,A+0-(%)e.,A+*.t&+t>.*A%&teA%&3,A)**1>.*A&+AS**)A$)-+eA&1*2.t E)*1 +0e+?>-. F4+1% C .e6 S7(C*11&.%(,tA +*.)4S7(D&t&A%&$te) %& C .e6 S7(D&t&A%&$te)(+1%)4D&t&Set %, C .e6 D&t&Set()4-.t T C %&.F-(((%,A F+0e+?>-.F)4-E (T U 0)9%&t&5)-%B-e61.D&t&S*2)+e C %,4%&t&5)-%B-e61.D&t&Me1'e) C F+0e+?>-.F4C(-+?(*'@e+t ,e.%e)A E=e.tA)/, e)9t0-,.H-%e()4F*)13 E3C.e6 F*)13()4E3.S0*6()4C(-+?(*'@e+t ,e.%e)A E=e.tA)/, e)9 -E (te8tB*84.Te8t.Le./t0 CC 0)9Me,,&/eB*8.S0*6(FF-),t I.,e)t '*))*6e) IDF)4)et2).4-. 60e)e +2,t*1e)>-%C IF D te8tB*84.Te8t D FI F4+1% C .e6 S7(C*11&.%(,7(A +*.)4%) C +1%.E8e+2teRe&%e)()4-E (%).Re&%())9Me,,&/eB*8.S0*6(FRe+*)% E*2.%F)4te8tB*8.Te8t C %)J1K.T*St)-./()4

te8tB*86.Te8t C %)J10K.T*St)-./()4IDFA FI.$2t E))*)FA Me,,&/eB*8B2tt*.,.OGA Me,,&/eB*8I+*..W&).-./)4-. 60e)e +2,t*1e)>-%C IF D te8tB*81.Te8t D FI F4+1% C .e6 S7(C*11&.%(,7(A +*.)4%) C +1%.E8e+2teRe&%e)()4-E (%).Re&%())9Me,,&/eB*8.S0*6(FRe+*)% E*2.%F)4te8tB*82.Te8t C %)J1K.T*St)-./()4+*1'*B*81.Te8t C %)J2K.T*St)-./()4te8tB*83.Te8t C %)J3K.T*St)-./()4!"te8tB*84.Te8t C %)J4K.T*St)-./()4%&teT-1eP-+?e)1.Te8t C %)J"K.T*St)-./()4te8tB*8.Te8t C %)J#K.T*St)-./()4te8tB*86.Te8t C %)J10K.T*St)-./()4te8tB*8!.Te8t C %)J11K.T*St)-./()4te8tB*8".Te8t C %)J12K.T*St)-./()4te8tB*8#.Te8t C %)J13K.T*St)-./()4te8tB*812.Te8t C %)J14K.T*St)-./()4& C C*.=e)t.T*I.t32(te8tB*8.Te8t)4' C C*.=e)t.T*I.t32(te8tB*8#.Te8t)4+ C & H '4te8tB*810.Te8t C C*.=e)t.T*St)-./(+)4+*. C .e6 S7(C*..e+t-*.(+,)4+*..O$e.()4,t)-./ ,7(1 C F,e(e+t H E)*1 $&)?-./>%et&-( 60e)e +2,t*1e)>-%C IF D te8tB*81.Te8t D FI F4+1% C .e6 S7(C*11&.%(,7(1A +*.)4%) C +1%.E8e+2teRe&%e)()4-E (%).Re&%())9

te8tB*811.Te8t C %)J3K.T*St)-./()4-%C IF D te8tB*81.Te8t D FI F4+1% C .e6 S7(C*11&.%(,7(2A +*.)4%) C +1%.E8e+2teRe&%e)()4-E (%).Re&%())9

te8tB*814.Te8t C %)J0K.T*St)-./()4C(-+?(*'@e+t ,e.%e)A E=e.tA)/, e)9.e6 F*)11().S0*6D-&(*/()4

*2tF4