Download - Eazy Chapter 1_5

Transcript
  • 8/6/2019 Eazy Chapter 1_5

    1/54

    CHAPTER 1

    INTRODUCTION

    In this age and time, the use of computers have come to facilitate business processes so as toincrease productivity and efficiency.

    However some business organisations still use manual processes to run their activities which in factis putting them out of the market.

    The fear is that the use of the computer may cause redundancies. Others also think that without thecomputers they can effectively manage their companies so they tend to reject the idea.

    However, they forget that the implementation of the computer will facilitate their work process andimprove efficiency.

    This project seeks to implement a system that will facilitate business processes with respect to hotelmanagement.

    Easy Hotel Management System (EHMaS) is a system that is to be implemented to help curb theproblems with the manual work process in hotels.

    STATEMENT OF THE PROBLEM

    In Ghana, most hotels do not have any management system that help them to manage their

    reservations any other processes that are handled.

    This makes a reservation process take quite some time. This is because one has to go through awhole list of rooms to check which rooms are available and which are not.

    Tracking of old records is also a problem since there are chunks of customer records to always gothrough.

    The generation of reports on sales made and customer reservations as well as other reportsbecome difficult and take days.

    The EHMaS helps solve this problem and many others through a variety of functionalities it providefor its users.

    Easy hotel is a three star hotel which seeks to upgrade its self to a four star hotel and this was usedas the case study for this project.

    RESEARCH QUESTIONS

    1

  • 8/6/2019 Eazy Chapter 1_5

    2/54

    22

    These are a few of the questions used for the research.

    1. How rooms do the hotel have?

    2. Into which categories have they been grouped?

    3. How many reservations are made in a day?

    4. What is the age range for an eligible customer?5. What details are taken from customers?

    6. Can foreigners also make reservations?

    7. What is the procedure for a check in?

    8. What is the procedure for a check out?

    9. What charges are available?

    10. What payment terms are available?

    11. Do you issue invoices?

    12. Do you issue receipts?

    13. What is the maximum time for which a room can be booked?

    14. Do you get reservations from customer such individuals and institutions?

    15. What room services are available?

    16. How many staff members does the hotel have?

    17. How many staff members can make a reservation?

    18. What types of reports are normally generated?

    19. Do you allow cars be packed here?

    20. Is your packing space free?

    21. How many hours does the hotel open per day?

    22. What problems are normally faced with reservations?

    PROJECT OBJECTIVES

    The objective of this project is to design and develop a system/software that will;

    Record the daily entries of reservations

    Provide a search engine for searching for customer as well as reservation details.

    Print and save details of reservations and customers

    Print and save receipts

    Keep customer records

    Manage sales assistants details Provide reports on the reservations made

  • 8/6/2019 Eazy Chapter 1_5

    3/54

    22

    SIGNIFICANCE OF THE PROJECT

    The are many like systems already in market however this will be different in that it will becustomised to the preferences of the user.

    It will also help facilitate the reservation process at the hotel. Searching for details of aparticular reservation wont be as difficult as previously.

    More customers can be served faster.

    Manager can easily have access to sales records

    Reports can easily be generated by just the click of a few buttons

    SCOPE OF THE PROJECT

    The system is to be developed using VB.Net. Certain required skills like establishing a

    database connection needs to be acquired.

    The system will not include an online reservation, however if the hotel prove to appreciate

    the effectiveness of the new system, then an online reservation could be integrated.

    Employees will have to be convinced in order to understand and accept the system to be

    implemented so that they give out any information needed for the project

    The organisation may have never implemented a computer system in its activities therefore

    this will be a real steep learning curve. Employees will have to be trained to use the system

    effectively.

    Time constraint for the project is not enough therefore certain additional features like staff

    management may not be included. However it may be integrated later after the current

    specified requirements have been implemented.

  • 8/6/2019 Eazy Chapter 1_5

    4/54

    22

    Chapter 2

    Literature Review

    The problem of Hotels not being able to manage their activities well enough to maximize

    efficiency because of the use of manual processes (no computer automation) has been in

    existence for long. Therefore not trying to re invent the wheel, there are other relevant

    studies which have been made in this same area. This, I review in the following lines.

    KingSmart hotel software

    KingSmart hotel software was developed by ComPower Technology

    (sourcecodeonline.com, 2010). It is specially made for the hospitality industry. The software

    supports hotel, motel, resort, villas, services apartments or rental business by offering tools

    for marketing and daily operations as well as management and planning. KingSmart is a fully

    integrated suite allowing effective and easy deployment from a smaller operation to a global,

    multi-branded hotel chain environment. KingSmart Suite's important modules in the Hotel

    Property Management Software Suite include, Hotel Management Software, Hotel

    Reservation Software (Billing Software), Hotel Reception Software, Hotel Point of Sale, Call

    Accounting, Hotel Accounting software and Hotel Back Office Software.

    Free Hotel Software

    Free Hotel Software is a general purpose hotel & motel software which is can be used as a

    hotel maintenance software, hotel reservations software, hotel management software, hotel

    billing software, general purpose hospitality software, hotel accounting software, hotel

    accommodation software, hotel property management software (PMS, PM Software) and as

    hotel booking software and as software for online hotel reservation. It has the following

    features: Walk-In Guest Reservation Multiple Rate, Multiple Currencies Credit Card

    Transactions, Invoicing, Backup and Restore Night Audit Reservation block dates Guest

    Ledger & Database Advance Guest Search Business Source, Address Book, Out of order

    room, 80+ Reports , etc. (FreeHotelSoftware.com,2010)

    BPHotels

    BPHotels was developed by Ruby On Rails (sourcecodeonline.com, 2010).

    it has the following features: Search for rooms and booking available rooms, Payment

    module, Administrator can create new rooms and rates, Administrator can view and manage

    orders, Search history and Power reports with graphs

  • 8/6/2019 Eazy Chapter 1_5

    5/54

  • 8/6/2019 Eazy Chapter 1_5

    6/54

    22

    CHAPTER 3 : METHODOLOGY

    ARCHITECTURE AND ENVIRONMENT

    DESCRIPTION OF THE CURRENT SYSTEM

    The Hotel is a three star hotel which seeks to upgrade its self to a four star hotel. Currently ithas different types of rooms of different sizes and prices. The rooms range from singlebedroom to deluxe which is the highest room type available. Each room type has a differentprice.

    Customers can book rooms for as long as they can but the shortest bookable time is thirty(30) minutes termed the fast track. Customers can also call the hotel telephone line andreserve rooms. When a room is reserved or booked, the customers details are recorded androom number given to him or her is also recorded.

    The customer is required to pay for the time he/she wishes to stay at the hotel before keysare handed over to him if the booking is between fast track and one day. However for moredays booking the customer will have to pay part of the amount before he is given his/herroom. After stay, the customer pays the rest of the amount owed.

    The hotel has two sales assistants who serve the customers. One works in the morning andthe other in the evening.

    Currently the hotel runs hotel reservations manually (no computer system is used) whichmakes a reservation process take quite some time. Tracking of old records is also a problemsince there are chunks of customer records to always go through. The hotel manager wishesthat a system built for the hotel so that it will be used to make the hotel reservations.

    LIMITATIONS OF THE CURRENT SYSTEM

    Records easily wear out. (they get torn or managed by cockroaches)

    Difficult to get booked and non booked rooms

    Improper accounts is kept on sales made

    No records are kept on customers vehicles and children

    Searching for customer records is tedious

    Improper records are kept on sales personels and sales made

    It does not employ a modern way of management

  • 8/6/2019 Eazy Chapter 1_5

    7/54

    22

    FACT-FINDING

    This section of the project presents the outcome of the fact finding exercise that

    was used to investigate the current system. This establishes what the existingsystem does and tries to bring out what the problems are after which a bettersystem is proposed for modelling from a number of options (Yeates andWakefield 2004, p.157).

    Fact finding techniques that can be employed include (Ravindran n.d.):

    Interviews Analysts can use interviews to collect information about thecurrent system form the potential users. Here the analysts discover the areas ofmisunderstanding, unrealistic exception and descriptions of activities andproblems along with resistance to the new proposed system. Interviews are timeconsuming.

    Questionnaires Here the analysts can collect data from large groups.Questionnaires could be Open-ended or Close questionnaires. Open-endedquestionnaires are used to learn feelings, opinions, general experiences onprocess detail or problem. In it, questions are answered in their own words.Where as in closed questionnaires a set of prescribed answers are used andspecific response have to be selected.

    Record inspections or reviews Basic records like the reports, bills, policymanuals, regulations, standard operation procedures etc can be used for betterunderstanding the system.

    Observation This is a skill which the analysts have to develop. The analystshave to identify the right information and choose the right person and look at theright place to achieve his objective. He should have a clear vision of how eachdepartments work and work flow between them and for this he should be a goodobserver.

    The techniques employed in executing this project were interview andobservations.

    PROBLEMS FACED DURING FACT-FINDING

    Some problems that were faced during the fact-finding period are:

    Interviewees were sometimes not available or not ready for the interview on theappointed date and time. A new time or date would then have to be set for theinterview.

    Some of the interviewees were not so forth-coming in divulging information thatcould help in the final design of the system. There is a feeling from some of themof being rendered jobless when the new system is implemented.

    Some users could not fluently describe into details what they expect theirsystem to do.

  • 8/6/2019 Eazy Chapter 1_5

    8/54

    22

    FACT-FINDING REPORT

    Record keeping on the interview was done by writing down findings. The mainfocal point of the interviews was to get the understanding of how the currentsystem worked and also to get the requirements for the new system. In theManager and the Employees were interviewed.

    INTERVIEW RECORDS

    Table 2.1: Managers interview report

    Interview Record

    SystemEHMaS

    Name

    Interview Manager

    Sheet

    1

    Participants

    Mr. Fred Gyamfi

    Date

    15/09/2010

    Objective/AgendaTo confirm Term of ReferenceTo establish the problems of the current system.To determine the requirements for the new systemfrom the manager.

    Location

    Managers office

    Duration

    30 minutes

    Results

    Mr Fred is the main project sponsor.

    Confirmed Terms of Reference:

    Objective to develop a system that will increase the efficiency of workdone help manage the company in a more organised wayScope to cover the reservation of rooms and salesTimescales project to be developed and implemented within 19weeks.

    Problem 1 bad record keeping of salesProblem 2 bad record of checked in and out statusProblem 3 bad record on customer detailsProblem 4 Lack of useful management record.Problem 5 no proper account on cash in flow

    Requirement 1 Accurate records should be kept on all check in/outsRequirement 2 proper management system should be implemented onaccounts.

    CrossReference

  • 8/6/2019 Eazy Chapter 1_5

    9/54

    22

    Table 2.1: Employees interview report

    Interview Record

    SystemEHMas

    Name

    Interview Employees

    Sheet

    1

    Participants

    Mr. Peter James and Miss Cynthia Afum

    Date

    16/09/2010

    Objective/AgendaTo investigate the data entry and storage processTo get the problems facedTo get more user requirementsTo understand the check in/out system.

    Location

    Workshop

    Duration

    1 hour

    Results

    Mr. Peter James and Miss Cynthia Afum have been employees for quitesome time now. They are senior workers at easy hotel

    Problem 1 sometimes it becomes difficult to track which rooms areavailable and which are not.Problem 2 customer details easily get mixed up.Problem 3 track is always lost on records which have been kept in theoffice for longer periods.Problem 4 when sales is very high, it becomes difficult to serve them allvery quicklyProblem 5 office is being occupied by company copies of customerdetails and bookingsProblem 6 calculating sales made is very tediousProblem 7 there is sometimes confusion identifying who served whichcustomer

    Requirement 1 it must be insisted that customer details must be createdon each saleRequirement 2 record keeping must be converted to an electronic formRequirement 3 other options must be provided for locating customerdetailsRequirement 4 employees must be insisted to make records on thecustomers they serve

  • 8/6/2019 Eazy Chapter 1_5

    10/54

    22

    CURRENT PHYSICAL DATA FLOW DIAGRAM / BUSINESS ACTIVITY MODELLING

    CURRENT PHYSICAL DFD-LEVEL

    Room Reservation:

    Check in:

    Check Out:

    Customer

    Room Reservation

    Receptionist1

    Customer dataD1 Rooms dataD2

    Customersenquiry

    Customers

    details

    Room details

    Enquiry

    response

    Customer

    Room check in

    Receptionist2

    Customer dataD1 Rooms dataD2

    Customers

    details /

    room

    specification

    Customers

    details

    Room detailsRoom number and

    key

    Sales DataD2

    Sales details

    Customer

    Room check Out

    Receptionist3

    Customer dataD1 Rooms dataD2

    Final

    payment

    /return of keys

    Checkout

    details

    Room detailsReciept

    SalesD2

    Sales details

  • 8/6/2019 Eazy Chapter 1_5

    11/54

  • 8/6/2019 Eazy Chapter 1_5

    12/54

    22

    Data

    Dictionary

    ID: TYPE:

    Data

    flow

    SYSTEM:

    EHMas

    NAME:

    Room Details

    Alias:

    Definition:

    Room details = room_type + price + availability

    Occurrence:

    About 300 per day

    Notes:

    Source: Room data

    Destination: 1 Room reservation

    Author:

    Easy

    Date:

    20/09/10

    Data

    Dictionary

    ID: TYPE:

    Data

    flow

    SYSTEM:

    EHMas

    NAME:

    Customers Enquiry

    Alias:

    Definition:

    Customers enquiry = room_type + price + availability

    Occurrence:

    About 200 per day

    Notes:

    Source: Customer

    Destination: 1 Room reservation

    Author:

    Easy

    Date:

    20/09/10

  • 8/6/2019 Eazy Chapter 1_5

    13/54

    22

    Data

    Dictionary

    ID: TYPE:

    Dataflow

    SYSTEM:

    EHMas

    NAME:

    Sales details

    Alias:

    Definition:

    Sales Details = amount_received + date + room_number

    Occurrence:

    About 50 per day

    Notes:

    Source: Room Check in

    Destination: sales Data

    Author:

    Easy

    Date:

    20/09/10

    Data

    Dictionary

    ID: TYPE:

    Data

    flow

    SYSTEM:

    EHMas

    NAME:

    Final payment

    Alias:

    Definition:

    Check out details = date + time + paymentStatus + roomNo+receipt no

    Occurrence:

    About 300 per day

    Notes:

    Source: Customer

    Destination: 1 Room reservation

    Author:

    Easy

    Date:

    20/09/10

  • 8/6/2019 Eazy Chapter 1_5

    14/54

    22

    ENTITY RELATIONSHIP DIAGRAM (ERD) FOR CURRENT SYSTEM

    ENTITY DESCRIPTIONS FOR CURRENT SYSTEM

    Data

    Dictionary

    TYPE:

    Entity

    SYSTEM:

    EHMas

    NAME:

    Customer

    DEFINITIONS

    Attributes:

    Customer = Customer ID + Customer Name + Customer Address+ Customer

    Telephone number+ Customer Email address +

    OCCURRENCE: 5,000

    MANAGER

    SALESALES

    PERSONEL

    ROOMCUSTOMER

  • 8/6/2019 Eazy Chapter 1_5

    15/54

    22

    Data

    Dictionary

    TYPE:

    Entity

    SYSTEM:

    EHMas

    NAME:

    Manager

    DEFINITIONS

    Attributes:

    Manager = Manager ID + Manager Name + Manager Address+ Manager Telephone

    number+ Manager Email address

    OCCURRENCE: 1

    Data

    Dictionary

    TYPE:

    Entity

    SYSTEM:

    EHMas

    NAME:

    Sales Personel

    DEFINITIONS

    Attributes:

    Sales Personel = Sales Personel ID + Sales Personel Name + Sales Personel

    Address+ Sales Personel Telephone number+ Sales Personel Email address

    OCCURRENCE: 2

    Data

    Dictionary

    TYPE:

    Entity

    SYSTEM:

    EHMas

    NAME:

    Sale

    DEFINITIONS

    Attributes:

    Sale = date + amount received + personel number+customers number +actual

    amount + room service

    OCCURRENCE: 5000

    Data

    Dictionary

    TYPE:

    Entity

    SYSTEM:

    EHMas

    NAME:

    Reservation

    DEFINITIONS

    Attributes:

    Reservation = date + customer ID + room type + room number

  • 8/6/2019 Eazy Chapter 1_5

    16/54

    22

    OCCURRENCE: 5000

    DataDictionary

    TYPE:Entity

    SYSTEM:EHMas

    NAME:Room

    DEFINITIONS

    Attributes:

    Room = room number + type + price + location + description

    OCCURRENCE: 30

  • 8/6/2019 Eazy Chapter 1_5

    17/54

    22

    ANALYSIS AND DESIGN IF THE NEW SYSTEM

    DELIVERABLES

    REQUIREMENT SPECIFICATION OF NEW SYSTEM

    The system will have two logins; One with administrative permissions and another with

    Limited permissions.

    Modules of the system will include;

    I. Job Entry module

    a. Add job entry

    b. Edit job entry

    c. Search/view job entry

    d. Print job cardII. Customer Entry module

    a. Add customer details

    b. Edit customer details

    c. Search/view customer details

    d. Print customer details

    III. Employee Entry module

    a. Add Employee details

    b. Edit Employee details

    c. Search/view Employee details

    d. Print Employee detailsIV. Apprentist Entry module

    a. Add Apprentist details

    b. Edit Apprentist details

    c. Search/view Apprentist details

    d. Print Apprentist details

    V. Accounts Entry module

    a. Add cost

    b. Edit cost

    c. Search/view accounts

    d. Print invoices and receiptsVI. User accounts Entry module

    a. Add users

    b. Edit user accounts

    c. Search/view accounts

    d. Delete user accounts

    Logins with limited accounts will not be able to;

    Create or delete user accounts

    Enter or view employee and apprentist details

    Alter account detailsBut administrative logins will have access to all functions of the system.

  • 8/6/2019 Eazy Chapter 1_5

    18/54

  • 8/6/2019 Eazy Chapter 1_5

    19/54

    22

    DATA FLOW DIAGRAM OF THE NEW SYSTEM

    Room Reservation:

    Check in:

    Check Out:

    Customer

    Room check Out

    Receptionist3

    Customer dataD1 Rooms dataD2

    Final

    payment

    /return of keys

    Checkout

    details

    Room details

    Reciept

    SalesD2

    Sales details

    Customer

    Room Reservation

    Receptionist1

    Customer dataD1 Rooms dataD2

    Customers

    enquiry

    Customers

    details

    Room details

    Enquiry

    response

    ReservationsD3

    Reservation

    details

    ReservationsD3

    Customer

    Room check in

    Receptionist2

    Customer dataD1 Rooms dataD2

    Customers

    details /

    room

    specification/

    payment

    deposit

    Customers

    details

    Room detailsRoom number and

    key

    Sales DataD2

    Sales details

    Reservation

    details

  • 8/6/2019 Eazy Chapter 1_5

    20/54

    22

    DATA DICTIONARY

    PROCESS DESCRIPTIONS

    PROCESS ID DESCRIPTION NOTES

    Room

    reservation

    1 When a customer wants to make a

    reservation he/she contacts the

    receptionist. The receptionist takes the

    customers details and then gives the

    customer details of the rooms available.

    Here details of the rooms are stored on

    the system, therefore it will be easier to

    get the information

    INPUT FLOW OUTPUT FLOW

    Customers enquiry

    Room details

    Customers details

    Enquiry response

    Customers

    details

    Reservation

    details

    Room Check

    In

    2 When a customer wants to check in,

    he/she contact the receptionist and

    provides his details about reservation

    made or room wanted. The sales

    personnel will then query the system to

    check if there is an available room for the

    type of room requested. If rooms are

    available, his details are taken, a down

    payment is made and then the customer

    is assigned a room. Any amount received

    is entered into the system as well as thebooking details. Hence sales made are

    automatically generated.

    Customer details

    room specification

    payment deposit

    Room details

    Reservation

    details

    Customer details

    Sales details

    Room details

    Room number

    Room key

    Room Check

    Out

    3 On check out, the customers details are

    entered into the system then

    automatically, the days/ time spent as well

    as the amount to be received will be

    generated. The Payment is made by the

    customer and the keys are returned.

    Final payment

    Room keys

    Booking Details

    Customer details

    Device details

    Job card

    Sales details

    Checkout details

    Receipt

  • 8/6/2019 Eazy Chapter 1_5

    21/54

    22

    DATA FLOW DESCRIPTIONS FOR THE NEW SYSTEM

    Data

    Dictionary

    ID: TYPE:

    Data

    flow

    SYSTEM:

    EHMas

    NAME:

    Customers details

    Alias:

    Definition:

    Customers details = customer_ID + Name + Telephone + Address + Email +

    Chldren+ car_number + company_details

    Occurrence:

    About 200 per day

    Notes:

    Source: Customer

    Destination: 1 Room reservation

    Author:

    Easy

    Date:

    15/10/10

    Data

    Dictionary

    ID: TYPE:

    Data

    flow

    SYSTEM:

    EHMas

    NAME:

    Room Details

    Alias:

    Definition:

    Room details = room_type + price + availability+room_number

    Occurrence:About 300 per day

    Notes:

    Source: Room data

    Destination: 1 Room reservation

    Author:

    Easy

    Date:

    15/10/10

  • 8/6/2019 Eazy Chapter 1_5

    22/54

    22

    Data

    Dictionary

    ID: TYPE:

    Data

    flow

    SYSTEM:

    EHMas

    NAME:

    Customers Enquiry

    Alias:

    Definition:

    Customers enquiry = enquiry_no + room_type + price + availability +

    customers_name + telephone + description

    Occurrence:

    About 200 per day

    Notes:

    Source: Customer

    Destination: 1 Room reservation

    Author:Easy

    Date:15/10/10

    Data

    Dictionary

    ID: TYPE:

    Data

    flow

    SYSTEM:

    EHMas

    NAME:

    Sales details

    Alias:

    Definition:

    Sales Details = sale_number + amount_received + check_in_date + room_number +

    check_out_date + reservation_number + customer_number

    Occurrence:

    About 50 per day

    Notes:

    Source: Room Check in

    Destination: sales DataAuthor:

    Easy

    Date:

    15/10/10

  • 8/6/2019 Eazy Chapter 1_5

    23/54

    22

    Data

    Dictionary

    ID: TYPE:

    Data

    flow

    SYSTEM:

    EHMas

    NAME:

    Final payment

    Alias:

    Definition:

    Check out details = date + time + paymentStatus + roomNo+receipt no +

    sales_number

    Occurrence:

    About 300 per day

    Notes:

    Source: Customer

    Destination: 1 Room reservation

    Author:Easy

    Date:15/10/10

    ENTITY ANALYSIS OF THE NEW SYSTEM

  • 8/6/2019 Eazy Chapter 1_5

    24/54

    22

    ENTITY RELATIONSHIP DIAGRAM (ERD)

    An Entity Relationship Diagram (ERD) is the diagram produced as a result ofvisually representing entities, attributes and relationships of a system under

    study (Oppel 2004, p. 180). Oppel (2004, p.180) goes on to say that ERD isiterative in nature because entities are discovered throughout the designprocess and it has the principal advantage of being understood by non-technical people while still providing great value to technical people. The entity-relationship data model sees the world as made up of entities and relationshipsamong these entities (Silberschatz et al. 2001, p. 27).

    An entity is anything which an organisation identifies as being capable of anindependent existence and can be uniquely identified. This could be a physicalobject such as house or care, an event such as car service or house sale, or aconcept such as an order orcustomer transaction. A relationship on the otherhand, is some association between entities (Beynon-Davies 2004, p.p. 220-221).

    ENTITY RELATIONSHIP DIAGRAM (ERD) FOR CURRENT SYSTEM

    MANAGER

    SALESALES

    PERSONEL

    ROOM

    RESERVATION

    CUSTOMER

  • 8/6/2019 Eazy Chapter 1_5

    25/54

    22

    DESIGN AND CODING OF THE NEW SYSTEM

    POPULATION:

    DATA STRUCTURE OF ENTITIES SHOWING ATTRIBUTES AND KEYS

    In a relational model, tables are the primary unit for data storage which aremade up of rows and columns with each row representing once occurrence ofthe entity while each column represent one attribute for the entity (Oppel 2004,p.33).

    There are constraints that govern the behaviour of the relational model to ensurethat only valid data is entered into the database. This project will examine two ofsuch constraints: Entity integrity constraint This is a primary key constraint. Itensures that all relations (tables) in the database must have a primary key. Aprimary key is an attribute or group of attributes used to uniquely identify the

    rows of a table (Benyon-Davies 2004, p.p. 92, 107).

    Referential integrity constraint This is a foreign key constraint. It ensures thatevery foreign key value in the database must either refer to a primary key valuewithin the database or be a null value. A foreign key is an attribute of a relationwhich references the primary key of some other relation (Benyon-Davies 2004,p.p. 93, 107).

    Customerfield Description Data

    typeNull key

    customerIDNameAddressEmail

    TelephoneChildrenCar_numberCompany_details

    Uniquely identifies eachcustomername of customerpostal address of customeremail of customertelephone number ofcustomerdetails of children broughtalong

    car number of customerwork place of customer

    IntegerVarcharVarcharVarcharVarcharVarcharVarcharvarchar

    NoNoNo

    YesNo

    YesYesyes

    PK

    Managerfield Description Data type Null keycustomerIDNameAddressEmail

    Telephone

    Uniquely identifies managername of managerpostal address of manageremail of managertelephone number of manager

    NumberVarcharVarcharVarcharvarchar

    NoNoNo

    YesNo

    PK

  • 8/6/2019 Eazy Chapter 1_5

    26/54

    22

    Sales Pesonnelfield Description Data

    typeNull key

    customerIDNameAddressEmail

    Telephone

    Uniquely identifies each salespersonnelname of sales personnelpostal address of sales personnelemail of sales personneltelephone number of sales personnel

    numberVarcharVarcharVarcharvarchar

    NoNoNo

    YesNo

    PK

    Salefield Description Data

    typeNull key

    Sale_numberAmount_recievedCheck_in_dateRm_numberCheck_out_dateRsv_numberCus_numberSa_number

    Uniquely identifies each saleAmount received paymentDate customer checked inRoom number given to customerDate customer checked outNumber of the referencedreservationCustomers idId if the sales personnel whomade the sale

    numbernumberdatenumberdatenumbernumbernumber

    NoNoNoNoNoNoNoNo

    PK

    FKFKFK

    Roomfield Description Data

    typeNull key

    room_numbertypechargeavailabilitydescription

    Uniquely identifies each roomThe type of roomThe amount to be charged for theroomWhether the room is booked or not

    The characteristic of the room

    numbervarcharnumberBooleanvarchar

    NoNoNoNoNo

    PK

    Reservationsfield Description Data

    typeNull key

    Rsv_numberDateCus_nameCus_telepho

    nedescription

    Uniquely identifies each reservationDate of reservationName of customer who made thereservation

    The telephone number of the customerDetails of the reservation

    numberdatevarcha

    rvarcha

    NoNoNoNo

    No

    PK

  • 8/6/2019 Eazy Chapter 1_5

    27/54

    22

    rvarchar

    SAMPLING PROCEDURES

    PROCESS DIAGRAMS FLOWCHARTS

    Analysing the whole system, almost all the processes that would go on in thesystem falls under one of the underlisted heading:

    Logging into the system

    Entering new record

    Searching for a recordA flow chart will be used to implement the design of these processes.

    SAMPLE LOGIN FLOW CHART

  • 8/6/2019 Eazy Chapter 1_5

    28/54

    22

    SAMPLE DATA ENTER FLOW CHART

    For entering record into the system, the design for the flowchart is assuming theuser did enter the correct credentials. The flowchart below shows the process ofentering data into the system starting from the switchboard.

    It must however be noted that depending on the users group, he/she may beable to enter data into the system or not.

  • 8/6/2019 Eazy Chapter 1_5

    29/54

    22

    SAMPLE SEARCH FLOW CHART

    Searching for record from the system, the design for the flowchart is assumingthe user did enter the correct credentials. The flowchart below shows the processof searching for data from the system.

  • 8/6/2019 Eazy Chapter 1_5

    30/54

    22

    SEQUENCE DIAGRAMS FOR SYSTEM COMPONENTS

    According to Ambler (2004), sequence diagrams model the flow of logic withinyour system in a visual manner, enabling you both to document and validateyour logic, and are commonly used for both analysis and design purposes. Most

    programmers prefer to use sequence diagrams when using a CASE tool toreverse engineer source code into interaction diagram (Larman 2002, p.199).

  • 8/6/2019 Eazy Chapter 1_5

    31/54

    22

    Sequence diagrams are typically used to model:

    Usage scenarios. A usage scenario is a description of a potential way yoursystem is used.

    The logic of methods. Sequence diagrams can be used to explore the logic

    of a complex operation, function, or procedure. One way to think ofsequence diagrams, particularly highly detailed diagrams, is as visualobject code.

    The logic of services. A service is effectively a high-level method, oftenone that can be invoked by a wide variety of clients.

    This document will use sequence diagram to model the interaction that goes onin using the system for the following operations:

    Logging into the system

    Entering new record

    Searching for a record

    SEQUENCE DIAGRAM FOR LOGIN

    SEQUENCE DIAGRAM FOR ENTERING A NEW RECORD

  • 8/6/2019 Eazy Chapter 1_5

    32/54

    22

    SEQUENCE DIAGRAM FOR SEARCHING FOR A NEW RECORD

  • 8/6/2019 Eazy Chapter 1_5

    33/54

  • 8/6/2019 Eazy Chapter 1_5

    34/54

    22

    Software coding standards are language-specific programming rules that greatlyreduce probability of introducing errors into ones application. Without agreedcoding standards, it is easier for a team working on a project to waste a lot oftime and resources having to reformat each others code or read and makemeaning to another mans codes (Henderson 2003, p.64).

    The coding standards used in this project does not follow any specific format orstandard. It is used at my own discretion and flexibility as a guide owing to thefact that this is not a team project. With the possibility of another programmerworking on this project some time unknown, the codes were written with muchsemblance to the thumb rule of coding standards used in most programmingbooks.

    The coding standards used include:

    VARIABLES

    Variable names must be kept as short as possible and be meaningful.

    Variable names must not begin with special characters (e.g. &, $ ),underscore ( _ ) or a figure.

    Variable names must not be a keyword e.g. date, for, do.

    Camel casing must be used in naming all variables, e.g. TotalSales. Nospacing between compound names.

    Each variable must be declared on a separate line.

    NAMING CONVENTION

    Controls must have the appropriate prefix to their names to describethem. For example, btnButton1, txtTexbox1, lblLabel1, frmForm1.

    Control names must in a way be descriptive of their function in the project,

    e.g. btnTotalSales. Other objects used in the project - pictures, charts, etc. must follow the

    naming convention for variables.

    COMMENTING

    Comment as much as possible without commenting the obvious.

    Comments must as much as possible try to explain what they are doing

    Comments must be above block of codes describing.

    In-line commenting must be used sparingly unless very necessary

    Comment each logical step51

    ERROR HANDLING Block of codes performing very vital operations must be placed in a Try

    Catch construct.

    Logical block of codes must be placed in a Try Catch construct.

    The use of the Finally keyword in a TryCatch construct must be lookedover very well before employing it.

    Turn On compiler warnings.

    Exception throwing properties of controls that possess it must be enabledor used.

    DECLARATIONS

    Application-wide variables must be declared in a module Application-wide constants must be declared in a module

  • 8/6/2019 Eazy Chapter 1_5

    35/54

    22

    Write an application-level procedure for operations that are oftenperformed

    WHITE SPACE

    Indentations would follow one specified by the IDE.

    Leave at least one line spacing between logical structures. White spacing must be used at ones own discretion but must ensure

    codes look well aligned.

    CODE SNIPPETS

    Snippet for database connection

    Module modAdo PublicConst cnString AsString =

    "Provider=Microsoft.Jet.OLEDB.4.0;Persist Security Info=False;DataSource=../data/data.mdb;Jet OLEDB:Database Password=jaypee"EndModule

    Snippet for retrieving data from the database

    Imports SystemImports System.DataImports System.Data.OleDb

    Module modFunction

    PublicFunction GetFieldValue(ByVal srcSQL AsString, ByVal strField AsString) 'create connection Dim cnHotel As OleDbConnection

    cnHotel = New OleDbConnection

    With cnHotel If .State = ConnectionState.Open Then .Close()

    .ConnectionString = cnString

    .Open() EndWith

    Try Dim cmd As OleDbCommand = New OleDbCommand(srcSQL, cnHotel) 'create data reader Dim rdr As OleDbDataReader = cmd.ExecuteReader

    'loop through result set While (rdr.Read)

    GetFieldValue = rdr(strField).ToString() EndWhile

    'close data readerrdr.Close()

    Catch e As ExceptionConsole.WriteLine("Error Occurred:" & e.ToString)

  • 8/6/2019 Eazy Chapter 1_5

    36/54

    22

    Finally ' Close connection

    cnHotel.Close() EndTry EndFunction

    PublicFunction GetIndex(ByVal srcTable AsString) AsLong Dim cnHotel As OleDbConnection 'create connection

    cnHotel = New OleDbConnection

    With cnHotel If .State = ConnectionState.Open Then .Close()

    .ConnectionString = cnString

    .Open() EndWith

    Dim sqlQRY AsString = "SELECT * FROM [KEY_GENERATOR] WHERE

    TableName = '" & srcTable & "'"

    'create commands Dim cmd As OleDbCommand = New OleDbCommand(sqlQRY, cnHotel)

    Try 'create data reader Dim rdr As OleDbDataReader = cmd.ExecuteReader Dim intNextNo AsInteger

    'loop through result set While (rdr.Read)

    intNextNo = rdr("NextNo").ToString()

    EndWhile

    intNextNo = intNextNo + 1 'define update statement Dim sqlUpdate AsString = "UPDATE [Key_Generator] SET[Key_Generator].NextNo = " & intNextNo & " WHERE TableName='" & srcTable &"'"

    Dim cmdUpdate As OleDbCommand = New OleDbCommand(sqlUpdate,cnHotel)

    'execute nonquery to update an indexcmdUpdate.ExecuteNonQuery()

    GetIndex = intNextNo Catch ex As OleDbException

    Console.WriteLine(ex) Finally ' Close connection

    cnHotel.Close()Console.WriteLine("Connection closed.")

    EndTry EndFunction

    'Function that will format return a generated id PublicFunction GenerateID(ByVal srcNo AsString, ByVal src1stStr AsString, ByVal src2ndStr AsString) AsString If Len(src2ndStr)

  • 8/6/2019 Eazy Chapter 1_5

    37/54

    22

    ElseGenerateID = src1stStr & Left(src2ndStr, Len(src2ndStr) -

    Len(srcNo)) & srcNo EndIf EndFunction

    'Function that will return a currency format PublicFunction toMoney(ByVal srcCurr AsString) AsStringtoMoney = Format(IIf(Trim(srcCurr) = "", 0, CSng(srcCurr)),

    "#,##0.00") EndFunction

    PublicFunction toNumber(ByVal srcCurrency AsString, OptionalByRefRetZeroIfNegative AsBoolean = False) AsDouble Dim retValue AsDouble If srcCurrency = ""Then

    toNumber = 0 Else If InStr(1, srcCurrency, ",") > 0 Then

    retValue = Val(Replace(srcCurrency, ",", "", , ,CompareMethod.Text)) Else

    retValue = Val(srcCurrency) EndIf If RetZeroIfNegative = TrueThen If retValue < 1 Then retValue = 0 EndIf

    toNumber = retValueretValue = 0

    EndIf EndFunction

    PublicFunction CountRows(ByVal sSQL AsString) Dim cnHotel As OleDbConnectioncnHotel = New OleDbConnection

    With cnHotel If .State = ConnectionState.Open Then .Close()

    .ConnectionString = cnString

    .Open() EndWith

    Dim cmdCount As OleDbCommand = New OleDbCommand(sSQL, cnHotel)

    CountRows = cmdCount.ExecuteScalar() EndFunction

    PublicFunction GetData(ByVal sSQL AsString) Dim CN As OleDbConnection Dim sqlCmd As OleDbCommand = New OleDbCommand(sSQL) Dim myData As OleDbDataReader

    CN = New OleDbConnection(cnString)

    TryCN.Open()

    sqlCmd.Connection = CN

    myData = sqlCmd.ExecuteReader

  • 8/6/2019 Eazy Chapter 1_5

    38/54

    22

    Return myData Catch ex As Exception Return ex EndTry EndFunction

    'Execute Non Query PublicFunction ExecNonQuery(ByVal strSQL AsString) Dim cnHotel As OleDbConnection

    cnHotel = New OleDbConnection

    Try With cnHotel If .State = ConnectionState.Open Then .Close()

    .ConnectionString = cnString

    .Open() EndWith

    Dim cmd As OleDbCommand = New OleDbCommand(strSQL, cnHotel)

    cmd.ExecuteNonQuery()

    ReturnTrue Catch ex As OleDbException Return ex Finally

    cnHotel.Close() EndTry EndFunction

    'Function used to change the yes/no value PublicFunction changeYNValue(ByVal srcStr AsString) AsString SelectCase srcStr Case"Y" : changeYNValue = "1" Case"N" : changeYNValue = "0" Case"1" : changeYNValue = "Y" Case"0" : changeYNValue = "N" EndSelect EndFunctionEndModule

    Snippet for Login

    PublicClass frmLogin

    PrivateSub frmLogin_Load(ByVal sender As System.Object, ByVal e AsSystem.EventArgs) HandlesMyBase.Load

    FillCombobox(cboUser, "SELECT * FROM Users", "Users", "UserID","PK") EndSub

    PrivateSub btnCancel_Click(ByVal sender As System.Object, ByVal e AsSystem.EventArgs) Handles btnCancel.Click Me.Close()

    EndSub

  • 8/6/2019 Eazy Chapter 1_5

    39/54

    22

    PrivateSub btnLogin_Click(ByVal sender As System.Object, ByVal e AsSystem.EventArgs) Handles btnLogin.Click If cboUser.Text = ""Then cboUser.Focus() : ExitSub

    If txtPass.Text = ""Then txtPass.Focus() : ExitSub

    Dim strPass AsString

    strPass = GetFieldValue("SELECT PK,Password FROM Users WHERE PK=" &cboUser.SelectedValue, "Password") 'strPass = Enc.DecryptString(strPass)

    If LCase(txtPass.Text) = LCase(strPass) Then With CurrUser

    .USER_NAME = cboUser.Text

    .USER_PK = CInt(cboUser.SelectedValue)

    .USER_ISADMIN = CBool(changeYNValue(GetFieldValue("SELECTPK,Admin FROM Users WHERE PK=" & cboUser.SelectedValue, "Admin"))) EndWith

    Dim MainForm AsNew mdiMain

    MainForm.Show() Else

    MsgBox("Invalid password.Please try again!",MsgBoxStyle.Exclamation)

    txtPass.Focus() EndIf

    strPass = vbNullString EndSub

    PrivateSub txtPass_Enter(ByVal sender AsObject, ByVal e AsSystem.EventArgs) Handles txtPass.EnterHLText(txtPass)

    EndSub

    PrivateSub txtPass_TextChanged(ByVal sender As System.Object, ByVal eAs System.EventArgs) Handles txtPass.TextChanged

    txtPass.SelectionStart = Len(txtPass.Text) EndSubEndClass

  • 8/6/2019 Eazy Chapter 1_5

    40/54

    22

    CHAPTER 4: IMPLEMENTATION

    DESIGN OF THE USER INTERFACE

    A key goal of interface design is to maximize the usability of the system by ensuring thatusers can carry out their tasks effectively, efficiently, safely and enjoyably, and in order to dothis a designer has to be aware of the available technology and the needs, tasks andcharacteristics of the eventual users of the system (Yeates and Wakefield (2008).

    Some screen shots of the program will be displayed here to illustrate how some of the pages

    look like.

    Screen shot of main interface

    The Login:

  • 8/6/2019 Eazy Chapter 1_5

    41/54

    22

    The Main Interface

    Making a check in

  • 8/6/2019 Eazy Chapter 1_5

    42/54

    22

    Checking a room status

    Printing Reports

  • 8/6/2019 Eazy Chapter 1_5

    43/54

    22

    OVERVIEW OF SOFTWARE TESTING

    Software Testing is an empirical investigation conducted to provide stakeholderswith information about the quality of the product or service under test, withrespect to the context in which it is intended to operate (Kaner, 2006). Software

    Testing also provides an objective, independent view of the software to allow thebusiness to appreciate and understand the risks at implementation of thesoftware. Test techniques include, but are not limited to, the process ofexecuting a program or application with the intent of finding software bugs.

    Software Testing can also be stated as the process of validating and verifyingthat a software program/application/product:

    meets the business and technical requirements that guided its design anddevelopment;

    works as expected; and

    can be implemented with the same characteristics.

    Software Testing, depending on the testing method employed, can beimplemented at any time in the development process. However, most of the testeffort occurs after the requirements have been defined and the coding processhas been completed.

    Software testing is used in association with verification and validation (Eushiuan,

    1999). Verification: Have we built the software right? (i.e., does it match the

    specification)

    Validation: Have we built the right software? (i.e., is this what thecustomer wants)

    Verification is the process of evaluating a system or component to determinewhether the products of a given development phase satisfy the conditionsimposed at the start of that phase.

    Validation is the process of evaluating a system or component during or at theend of the

    development process to determine whether it satisfies specified requirements.

    TESTING METHODSSoftware testing methods are traditionally divided into black box testing andwhite box testing. These two approaches are used to describe the point of viewthat a test engineer takes when designing test cases.

    Black box testing treats the software as a "black box"without any knowledgeof internal implementation. Black box testing methods include: equivalencepartitioning, boundary value analysis, all-pairs testing, fuzz testing, model-basedtesting, traceability matrix, exploratory testing and specification-based testing.

    Specification-based testing aims to test the functionality of software according tothe applicable requirements (Laycock, 1993). Thus, the tester inputs data into,and only sees the output from, the test object. This level of testing usually

  • 8/6/2019 Eazy Chapter 1_5

    44/54

    22

    requires thorough test cases to be provided to the tester, who then can simplyverify that for a given input, the output value (or behavior), either "is" or "is not"the same as the expected value specified in the test case.

    Specification-based testing is necessary, but it is insufficient to guard against

    certain risks(James, 1999)

    White box testing is when the tester has access to the internal data structuresand algorithms including the code that implement these.

    White box testing methods can also be used to evaluate the completeness of atest suite that was created with black box testing methods. This allows thesoftware team to examine parts of a system that are rarely tested and ensuresthat the most important function points have been tested (Cornett, n.d).

    TESTING LEVELS

    Tests are frequently grouped by where they are added in the softwaredevelopment process, or by the level of specificity of the test. These include:

    Unit testing - refers to tests that verify the functionality of a specific section ofcode, usually at the function level. In an object-oriented environment, this isusually at the class level, and the minimal unit tests include the constructors anddestructors (Binder 1999, p.45). These type of tests are usually written bydevelopers as they work on code (white-box style), to ensure that the specificfunction is working as expected. One function might have multiple tests, to catchcorner cases or other branches in the code. Unit testing alone cannot verify thefunctionality of a piece of software, but rather is used to assure that the buildingblocks the software uses work independently of each other.

    Integration testing - any type of software testing that seeks to verify theinterfaces between components against a software design. Software componentsmay be integrated in an iterative way or all together ("big bang"). Normally theformer is considered a better practice since it allows interface issues to belocalised more quickly and fixed. Integration testing works to expose defects inthe interfaces and interaction between integrated components (modules).Progressively larger groups of tested software components corresponding toelements of the architectural design are integrated and tested until the software

    works as a system (Beizer 1999, p.21).

    System testing - verifies that a system is integrated to any external or thirdparty systems defined in the system requirements.

    Regression testing - focuses on finding defects after a major code change hasoccurred.Specifically, it seeks to uncover software regressions, or old bugs that have comeback.Such regressions occur whenever software functionality that was previouslyworking correctly stops working as intended. Typically, regressions occur as anunintended consequence of program changes, when the newly developed part of

    the software collides with the previously existing code. Common methods ofregression testing include re-running previously run tests and checking whether

  • 8/6/2019 Eazy Chapter 1_5

    45/54

    22

    previously fixed faults have re-emerged. The depth of testing depends on thephase in the release process and the risk of the added features. They can eitherbe complete, for changes added late in the release or deemed to be risky, tovery shallow, consisting of positive tests on each feature, if the changes areearly in the release or deemed to be of low risk.

    There are other testing approaching used in software development to testvarious components and ability of the system. Amongst them are:

    Performance testing - checks to see if the software can handle large quantitiesof data or users. This is generally referred to as software scalability. This activityof Non FunctionalSoftware Testing is often referred to as Endurance Testing.

    Stability testing - checks to see if the software can continuously function wellin or above an acceptable period. This activity of Non Functional Software

    Testing is oftentimes referred to as load (or endurance) testing.

    Usability testing - is needed to check if the user interface is easy to use andunderstand.

    Security testing - is essential for software that processes confidential data toprevent system intrusion by hackers.

    Destructive testing - Destructive testing attempts to cause the software or asub-system to fail, in order to test its robustness.

    TESTING APPROACH

    The testing approach that is employed for this project is

    A unit testing of the various components of the system. For instance, thelog in component will be tested to check for authentication. Various formswill be tempted to ensure domain, entity and referential integrity of thesystem is intact.

    There will be an integration testing to test how the various componentswork together.

    TEST PLAN

    Test Purpose The purpose of this test id to check the program has been built

    free of errors to be able to handle errors. Just to make sure that

    the system will work according to the system specification

    Test Data Wrong entries as well as right entries will be input to the system.

    Example wrong passwords or incorrect data.

    Test Condition When testing fails; the development of the system should be

    halted until all bugs have been removed.

    Expected Outcome Upon supply a correct input, the system should work as expected

    otherwise it should prompt a message to alert the user

    Actual Outcome When correct inputs were supplied the system worked perfectly.

    However when ever a wrong entry was made it prompted amessage to alert the user.

  • 8/6/2019 Eazy Chapter 1_5

    46/54

    22

    All modules worked as expected therefore the system has been

    built right.

    TEST SCENARIOS

    Testing the Login module:

    Supplying a wrong password at login

    Giving wrong inputs or not entering data where needed when entering data

  • 8/6/2019 Eazy Chapter 1_5

    47/54

    22

    DETAILS OF SITE PREPARATION FOR INSTALLATION:

    According to NCC Education (2007), in the preparation of a site for installation one mustconsider the power supply, heat dissipation, office alterations, office layouts and officefurniture.

    Power SupplySince about eight (8) workstations and a server are going to be installed, it will be ensuredthat enough outlets are available at the time of installation. It will also be ensured that thereare more than one circuit (for switching sake, in case one fails) with sufficient capacity tosupport all the machines to be installed. Locations for machines installation will also be

    separated from other electrical equipments to prevent power surges. UPS will also beprovided to ensure uninterrupted power supply to the machines.

    Heat DissipationTo control heat dissipation in the store, the machines will be positioned at places away fromdirect sunlight. However for better performance of machines as well the users, airconditioners will be recommended to help cool down temperatures when its becoming toomuch.

    Office AlterationsBecause of the machines to be installed, it will be ensured that the store will be able toaccommodate the all of them with ease. Hence a careful alteration of the store will be carried

    out forehand installation to ensure readiness at the time of the installation and also to avoiddisturbance to machines installation interruptions.

  • 8/6/2019 Eazy Chapter 1_5

    48/54

    22

    Office layoutForehand installation, the layout of the store will be made in such a way to be able toaccommodate the machines as well as any manual activities that will be carried out by thestaff.

    Office FurnitureSince keyboard entries will be a major part of the entries to the computer system, furnituresuitable for the activity will be recommended. It will also be recommended that the furnitureshould have enough space for the workstations as well as some office documents and otherperipherals.

    EXIT STRATEGY

    CHANGE OVER

    A documentation backing up complete changeover procedure would clearly

    define the responsibilities of the various sections of the changeover. Changeoverentails when the system will go live and phasing off the old system. Thechangeover date and procedure will clearly be agreed on and the variouschangeover procedures available clearly explained.

    The new system will run side by side with the old system at least for 2 monthsbefore completely phasing off the old system. All conditions necessary for theuse of the system must have been in place before then.

    The changeover will cover the following aspects:

    The installation of new system

    Staff training

    Special changeover instructionsINPUT OF CURRENT DATA HELD IN PAPER RECORDS INTO THE NEWSYSTEM

    Input of data held on paper will be entered by trained staff. It will be done inphases; this will allow for enough room for the normal work and day to dayactivities to go on.

    Part of the entry will be done during normal office work. Most of it which willrequire a lot of paper work will be done during the weekend and after work.

    Sensitive entries will be checked by the development team before saving to thedatabase in order to minimise or possibly eliminate any errors being introducedinto the system.

    PRE-PRENTED STATIONERY AND OTHER MEDIA

    Identified pre-printed stationery which needs to be printed will be sourced out toa printing firm. It will be agreed that sample pre-printed stationery for the newsystem be supplied for the first time. This sample stationery will be used to runthe testing of the system to ensure that it is in correct order and can be used aworking document by the system. The final order will be made for the supply ofthe pre-printed stationery if it satisfies all conditions of the newly installedsystem. This will require the old systems pre-printed documents andmodifications made to suit the new system requirements.

  • 8/6/2019 Eazy Chapter 1_5

    49/54

    22

    The following requirement will be needed.

    A definition of the stationery content

    The format in which is should be. Example is what various colours of printis needed

    The estimated quantity needed and rate of use Who is responsible for the stationery

    Who uses the pre- printed stationery

    At what section of the developed system is the stationery needed.

    SYSTEM TESTING

    Though various testing will have been carried out during the creation and thedevelopment of the new system, it is appropriate for the system to be subjectedto system testing.

    System testing should be carried after all have completely installed to determinethe systems accuracy. The scope of the system includes clerical and computeroperations. The data entered by the entry clerks should be used as the test data.Using such data will subject the entire system to real world data as it will run onsuch data when it goes live. The testing results should be matched up to therequirement of the system. This will enable us to sign off the contract as thesystem testing will be the final stage.

    Hardware and communication channels such the networking cables should betested.Air-conditions installed and the UPS should be checked and tested.System must be tested to ensure that it works with available printers.

    STAFF TRAINING

    Yeates and Wakefield (2004, p. 314) indicates that it must not be forgotten,when designing a computer system, that users are part of this system, and canbe considered almost as an extension of the computer. Their role must bedefined and designed like any other component of the system, and thought mustbe given early on as to how they can best be supported in carrying out this role.Provision of the requisite training for those who will be interacting with thecomputer system is as important as any other activity in the design andimplementation timeline of the system.

    Training Plan (1997) states that a training plan provides direction to the training

    program and explicitly states the program's aims. The purpose of a trainingplan is to outline, in written form, the training goals to give user staff the specific

  • 8/6/2019 Eazy Chapter 1_5

    50/54

    22

    skills required in their new jobs and should ideally contain as much as practicalwork

    It continues to explain that there are two types of training plan which are:Office Training Plan this plan covers the training needs of the entire office and

    has separate plans for each job function within the office. The areas covered bythis plan are fairly broad in scope, not concentrating on the specific needs ofonly a few of the staff.

    Individual Training Plan this reflects office goals as well as any additionaltraining needs that an individual may need.

    The training program must be well-defined and have specific goals andobjectives. TrainingPlans are an important part of a good training program.One question that readily comes to mind is the mode of delivery of the trainingto have maximum impact on the trainees. There are several different methodsfor delivering training, and you may want to use a combination of these,

    especially in a large organization (Shinder 2006).

    Some better training methods include:

    Individual hands-on instructor - an instructor walks each user individuallythrough the process of performing common tasks and answers questions.

    Hands-on classroom style instructor-led training - an instructor showsusers how the software works and how to perform common tasks, withusers performing the tasks themselves in a classroom/lab setting.

    Seminar style group demonstration - an instructor shows users how thesoftware works and how to perform common tasks in a live demonstration.

    Computer Based Training (CBT) - CD-based or online (Web-based) self-paced training which allows end-users to complete interactive lessons thatwalk them through the processes of performing common tasks, and thesoftware tests them on their performance and understanding.

    Book-based self-paced training - end-users complete workbook lessons inhow to perform common tasks, often illustrated with screenshots.

    The training program to train users of the Mendocino Rugby Club System putstogether a number of the above-listed training delivery mode. This is done withan eye for excellently equipping users with the requisite skills needed tomaximise the fullest benefit to be derived from usage of the system.

    TRAINING PLAN FOR THE IMPLEMENTATION OF THE NEW SYSTEM

    DURATION TARGET USERS CORE ACTIVITIES COMMENTS

  • 8/6/2019 Eazy Chapter 1_5

    51/54

    22

    4 days

    Sales personels

    Users will be taken through

    the general purpose for

    developing this system as well

    how to implement it effectively.

    Users will learn all the various

    aspects of the using the

    system and how to use each

    module with the system.

    User will also be trained on

    how the new procedures of

    executing work will be done.

    Users are expected

    to corporate but

    some resistance is

    expected.

    2 days manager Manager will be given anintensive 2day training on how

    to use the system properly

    with all the administrative

    rights so as to be able to help

    employees when they have a

    problem

    CHAPTER 5: CONCLUSION AND RECOMMENDATION

    In reviewing of my work, I would like to further explain some of the designconcepts used in this project:

  • 8/6/2019 Eazy Chapter 1_5

    52/54

    22

    Full Screen Application

    I decided my application should run in a full screen mode owing to the followingreasons:

    I believe by making the application to fun in full screen mode, it will discouragesome staff from losing concentration on their job owing to a cluttered screen. Astaff may even be watching movie as he/she works. This is unacceptable.

    Full screen mode means the data entry staff has nothing else to see than whathe/she is doing. This I believe will maximise concentration leading to less errors.

    Notify IconI decided to employ a notify icon for the simple reason that sometimes when oneexits from the application, there comes a situation when it needs to be launchagain in very hasty manner. If the application is running in the background, it isonly a matter of double clicking the icon to restart the application without any

    time wasted.

    Recommendations

    After carefully reviewing the work, some of the major improvements I believewould enhance the project further are that;

    A query component could be incorporated into the system to enable users toquery the database as the need be. This I believe is in conformity with standardpractise and far better than the creation of standard reports.

    This system does not include an online reservation. More efficiency could beachieved if an online system was included.

    REFERENCES

  • 8/6/2019 Eazy Chapter 1_5

    53/54

    22

    Books

    Ambler, S. W. 2004, The Object Primer: Agile Model-Driven Development WithUML 2.0, 3rd

    edn, Cambridge University Press, New York.

    Beizer, B. 1990, Software Testing Techniques, 2ndedn., Van Nostrand Reinhold,New York

    Beynon-Davis, P. 2004, Database Systems, 3rdedn, Palgrave Macmillan

    Binder, R. V. 1999. Testing Object-Oriented Systems: Objects, Patterns, andTools. Addison-Wesley Professional, New York

    Business System Analysis, 2004, NCC Education Limited, Manchester.

    Chonoles, M. J. and Schardt, J. A. 2003, UML 2 For Dummies, John Wiley & Sons,New

    Jersey.

    Eushiuan, T. 1999, Verification/Validation/Certification - Topics in DependableEmbeddedSystems. Carnegie Mellon University.

    Gane, C. and Sarson, T. 1977, Structured System Analysis and Design, ImprovedTechnologies, Inc., New York.

    Henderson, C. 2003, Building Scalable Web Sites, OReilly Media, Inc., California.

    Kaner, C. 2006, Quality Assurance Institute Worldwide Annual Software TestingConference, Institute of Technology Orlando

    Larman, C. 2002,Applying UML and Patterns An Introduction to Object-Oriented Analysisand Design and the Unified Process, 2ndedn., Prentice Hall, Inc., New York.

    Oppel, A. J. 2004, Databases Demystified, McGraw-Hill Professional, New York.Silberschatz, A., Korth, H. F., and Sudarshan, S. 2001, Database SystemConcepts, 4th edn,

    McGraw-Hill Professional, New York.

    Yeates, D. and Wakefield, T. 2004, System Analysis and Design, 2ndedn., PrenticeHall, New

    York.

  • 8/6/2019 Eazy Chapter 1_5

    54/54