Anda di halaman 1dari 66

import java.util.Scanner; public class TicTacToe { public static void main(String[] args) { Scanner input = new Scanner(System.

in); String[] array; array = new String [ ]; int u!nput; int p"ounter=#; w$ile ( u!nput %= ) { System.out.println(&'nter ( coordinate)&); u!nput = input.ne*t!nt(); array[u!nput] = (&*&); System.out.println(&'nter ( coordinate)&); u!nput = input.ne*t!nt(); array[u!nput] = (&o&); +or (int y"ounter = ,; y"ounter % -; y"ounter..) { System.out.print(&//&); 0 System.out.println(); +or (int +"ounter=,; +"ounter%(1); +"ounter..) { +or (int *"ounter=,; *"ounter%#; *"ounter..) { +or (p"ounter=#; p"ounter%2; p"ounter..) { System.out.print+(& 3d4 &5 array[p"ounter]); 0 0 0 System.out.println(); +or (int 6"ounter=,; 6"ounter%2; 6"ounter..) System.out.print(&///&); 0 System.out.println(); # 78n1 2 98n: ;8n&); {

0 System.out.print(&, 0 0

CONTENTS 1. INTRODUCTION
1.1 About the project Page NO

2. SYSTEM REQUIREMENT SPECIFICATION 2.1 Hardware specification 2.2 Software specification

2.3 Features of operating system 2.4 O er iew of the project 3. SYSTEM STUDY AND ANALYSIS 3.1 !"isting system 3.2 #roposed system 3.3 Feasibi$ity study 4. SYSTEM DESIGN 4.1 %nput design 4.2 Output design 4.3 &atabase design
5. SYSTEM DEVELOPMENT 6. SYSTEM TESTING 7. SYSTEM IMPLEMENTATION . SYSTEM MAINTENANCE AND SECURITY MEASURES !. CONCLUSION 1". SCOPE FOR FURT#ER EN#ANCEMENT APPENDI$ a. &ata f$ow diagrams b. 'ab$es c. Screen $ayouts d. (eports %I%LIOGRAP#Y

INTRODUCTION

1. INTRODUCTION
1.1 A%OUT T#E PRO&ECT Air$ine reser ation systems were first introduced in the $ate 1)*+s as re$ati e$y simp$e standa$one systems to contro$ f$ight in entory, maintain

f$ight schedu$es, seat assignments and aircraft $oading. 'he modern air$ine reser ation system is comprehensi e suite of products to pro ide a system that assists with a ariety of air$ine management tas-s and ser ice customer needs from the time of initia$ reser ation through comp$etion of the f$ight. One of the most common modes of tra e$ is tra e$ing by air. .ustomers who wish to tra e$ by air nowadays ha e a wide ariety of air$ines and a range of timings to choose from. /owadays competition is so fierce between air$ines that there are $ot of discounts and a $ot of $u"uries gi en to customers that wi$$ gi e an edge to that particu$ar air$ine. 'he 0or$d 0ide 0eb has become tremendous$y popu$ar o er the $ast four years, and current$y most of the air$ines ha e made pro ision for on$ine reser ation of their f$ights. 'he %nternet has become a major resource for peop$e $oo-ing for ma-ing reser ations on$ine without the hass$e of meeting tra e$ agents. 1y #roject intends to ser e these purposes. %t intends to chec- a$$ the a ai$ab$e air$ine databases and return a string of resu$ts, which can he$p them in their tra e$ p$ans. 'he objecti e of this project is to create an air$ine reser ation system where a tra e$er can re2uest a$$ f$ight information as per their journey dates. 'hey can get information regarding time, cost, etc a$$ at the same time and p$ace. 0hen the customer ca$$s the .ounter Assistant for his3her tra e$ needs, the counter assistant wi$$ enter the customer4s detai$s 5f$ight re2uirements6 in the system. 'he system disp$ays a$$ the a ai$ab$e air$ines, schedu$es and prices. 'his

system wou$d he$p the air$ine to better ser e its customers by catering to their needs. 'he site wou$d use a &atabase to ho$d this information as we$$ as the $atest pricing and a ai$abi$ity information for the air$ines.

7ey Features8 9 0eb:based reser ation engine with a user friend$y graphica$ interface 9 %ndi idua$ and group $e e$ authori;ation access 9 (eser ation super isor o erriding 9 %ntegrated departure contro$ system 9 #assenger communication features 9 .omprehensi e management reporting capabi$ities

SYSTEM REQUIREMENT SPECIFICATION

2. SYSTEM REQUIREMENT SPECIFICATION 'o de e$op a new system certain hardware and software specifications are needed. 2.1 #ARD'ARE SPECIFICATION System #rocessor 8 %<1:.ompatib$e #. 8 #entium %=

Speed 1emory Hard &is- &ri e

8 2.+ >H? 8 2*@ 1< (A1 8 2+ ><

2.2 SOFT'ARE SPECIFICATION Operating System &e e$opment en ironment Banguage used Front end <ac- end 'oo$s Dsed 8 0indows A# and abo e 8 ec$ips 8 Ca a 8 ja a 8 1yS2$ 8

2.3 FEATURES OF T#E OPERATING SYSTEM 'INDO'S $P

'he 0indows operating system started with the introduction of 0indows OS and 0indows for wor- group for networ-ing. Since then it has come a $ong way and windows )*,)E,2+++ fami$y of operating systems were introduced. %t is succeeded by windows =ista. 0indows A# pro ided the computer user with the most integrated and easy to use operating system with a$$ the faci$ities in bui$t. 'he 0indows A# is the newborn baby in the windows fami$y. %t is bui$t on the 0indows 2+++ concept ands framewor- .%t has more features to pro ide the user with greater stabi$ity, security and enhanced performance. 0indows A# is the most popu$ar Operating system present$y and has many features which ma-e it the best. Some of its best features are8 <ui$t on the 0indows engine8 0indows A# #rofessiona$ is bui$t on the pro en code base of 0indows /' and 0indows 2+++,which features a 32:bit computing architecture and a fu$$y protected memory mode$. !nhanced de ice dri er erifier8 <ui$ding on the de ice dri er erifier found in windows 2+++,the 0indows A# professiona$ wi$$ pro ide e en greater stress tests for de ice dri ers. 0indows Fi$e #rotection8 #rotects core system fi$es from being o erwritten by app$ication insta$$ations. %f a fi$e is o erwritten ,0indows Fi$e protection wi$$ restore the correct ersion.

0indows %nsta$$er8 A system ser ice that he$ps users insta$$, configure, trac-, upgrade, and remo e software programs correct$y. Sca$ab$e memory and processor support8 Supports up to 4 gigabytes5><6of (A1 and up to two symmetric mu$tiprocessors. %nternet !"p$orer Add:on 1anager8 !asi$y manage and enforce a $ist of %nternet !"p$orer add:ons that are either permitted or disab$ed to enhance security.

0indows Firewa$$8 'urned on by defau$t, the bui$t:in windows Firewa$$ he$ps increase computer security from startup to shutdown. 0indows Security center8 !asi$y manage security resources with this sing$e, unified iew of -ey settings, too$s, and access to resources.

!asy to use. 'roub$eshooters8 He$ps users and administrators configure, optimi;e, and troub$eshoot numerous 0indows A# #rofessiona$ functions.

S()*+a,e Te-./(0(g1e2 3F,(/4 e/45 1. 2. 3. 4. *. @. Ca a Ser er #ages 5CS#6 Ca a Ser $ets A1B H'1B Ca aScript H''# Sessions

Java Server Pages (JSP) (egu$ar H'1B, of course, cannot contain dynamic information. CS# is so easy and con enient that it is 2uite feasib$e to augment H'1B pages that on$y benefit margina$$y by the insertion of sma$$ amounts of dynamic data.

CS# was designed to wor- with Ca a Ser $ets and Ca a<eans in a seam$ess fashion, it pro ides app$ications de e$opers with the capabi$ity to c$ean$y separate content generation from content presentation. 'his means that 0eb page designers can wor- independent$y from business $ogic de e$opers, and the end resu$t wi$$ wor- in a distributed, heterogeneous computing en ironment.

Java Servlets Ca a Ser $ets are ser er:side techno$ogies that pro ide a component:based, p$atform:independent method for bui$ding web:based app$ications. 'hey provide web de e$opers with a simp$e, consistent mechanism for e"tending the functiona$ity of a web ser er and for accessing e"isting databases. Since our website was more database:centric we found ser $ets as more appropriate choice. Ser $ets ha e access to the entire fami$y of Ca a A#%s, inc$uding the C&<. A#% to access databases. Ser $ets can a$so access a $ibrary of H''#:specific ca$$s and recei e a$$ the benefits of the mature Ca a $anguage, inc$uding portabi$ity, performance, reusabi$ity, and crash protection. Our other a$ternati e for Ca a ser $ets was .>%. <ut we continued with Ca a ser $ets main$y because of the fo$$owing reasons i6 E))1-1e/*6 0ith traditiona$ .>%, a new process is started for each H''# re2uest. 0ith ser $ets, the Ca a =irtua$ 1achine stays up, and each re2uest is hand$ed by a $ightweight Ca a thread, not a hea yweight operating system process. ii6 C(/7e/1e/*6 Each one of us was more comfortab$e with Ca a <esides the con enience of being ab$e to use a fami$iar $anguage, ser $ets they ha e this added ad antage of automatica$$y parsing and decoding H'1B form data, trac-ing sessions, and many other such tas-s.

As these operations were ery much needed for our website we found our decision to be right. iii6 P(+e,)806 Ca a ser $ets $et us do se era$ things easi$y, which are either difficu$t or impossib$e by traditiona$ .>%. One thing is ser $ets can ta$- direct$y to the 0eb ser er 5regu$ar .>% programs can4t6. 'his simp$ified operations that needed us to $oo- up data stored in standard p$aces. 0e found them ery usefu$ in maintaining information from re2uest to re2uest, simp$ifying things $i-e session trac-ing and caching of pre ious computations. XML A1B was main$y used because of its e"tensibi$ity feature. %t had this added ad antage of presenting the same content in different formats to different c$ients. JavaScript Ca aScript was basica$$y used for c$ient:side a$idation. Ca aScript is compatib$e with a$$ ersions of 1icrosoft %nternet !"p$orer and /etscape /a igator. 0e ha e sma$$ ja a scripts, which are $ightweight and wi$$ not hinder the down$oad time of the H'1B document significant$y.

HTTP Sessions& Java Beans: ! ery user who $ogs in to our system is gi en a new session. 0e imp$emented this feature using the Http Session A#% pro ided by the Ser $ets and Ca a <eans.

3.2 M9S:0 3%AC; END5

Bibraries for accessing 1yS2$ databases are a ai$ab$e in a$$ major programming $anguages with $anguage:specific A#%s. 'he 1yS2$ database has become the wor$dFs most pop$ar open source database because of its consistent fast performance, high re$iabi$ity and ease of use. 1yS2$ runs on more than 2+ p$atforms inc$uding Binu",0indows,OS3A,H#DA,A%A, /etware, gi ing you the -ind of f$e"ibi$ity that puts you in contro$. &D%C<OD%C DRIVER 'he C&<. type 1 dri er,a$so -nown as the C&<.:O&<. bridge, is a database dri er imp$ementation that emp$oys the O&<. dri er to connect to the database. 'he dri er con erts C&<. method ca$$s into O&<. function ca$$s. 'he bridge is usua$$y used when there is no pure:ja a dri er for a particu$ar database.

Functions i. ii. 'rans$ates 2uery obtained by C&<. into corresponding O&<. 2uery,which is then hande$d by the O&<. dri er. Sun pro ides a C&<.:O&<. <ridge dri er.Sun.jdbc.odbc.CdbcOdbc&ri er.'his dri er is nati e code and not ja a,and is c$osed source. .$ient :GC&<. &ri er:GO&<. &ri er:G&atabase. 'here is some o erhead associated with the transation wor- to go from C&<. to O&<..

iii. i .

3.3 TOMCAT SERVER Apache 'omcat is an imp$ementation of the ja a ser $et and the ja a ser er page techno$ogies. Apache 'omcat is de e$oped in an open and participatory en ironment and re$eased under the Apache Software Bicense. Apache 'omcat is intended to be co$$aboration of the best:of:breed de e$opers from around the wor$d. Apache 'omcat powers numerous $arge: sca$e,mission:critica$ web app$ications across a di erse range of industries and organi;ations.

'omcat is free, open:source imp$ementation of Ca a Ser $et and Ca a Ser er pages techno$ogies de e$oped under the Ca-arta project at the Apache Software Foundation. 'he ser $et wi$$ dynamica$$y generate a web page based on the resu$ts of the database 2uery and wi$$ pro ide these resu$ts to Apache which wi$$ de$i er the web content bac- to the re2uesting browser. %nstead of using .3.HH or #!(B for a .>% bac-:end web ser er process, one may use CA=A ser $ets processed by the Ca-arta projectFs, I'omcatI. Apache wi$$ be configured to use the modu$e modJj- to communicate with Ca-artaJtomcat and its C=15CA=A irtua$ machine6. Ser $et programs are written as CA=A c$asses which inherit from Khttpser $etIto pro ide much of their principa$ function.

SPECIAL FEATURES OF LANGUAGE CA=A F!A'D(!S Ca a programming $anguage is usua$$y associated with the 0or$d 0ide 0ebL its origin predates the 0eb. Ca a began $ife as the programming $anguage OAK. 'he members of the green project, which inc$ude #atric/aughton, 1i-e Sheridan, and Cames >os$ing, a group formed in 1))1 to create products for the smart e$ectronics mar-et, de e$oped OA7. Ca a software wor-s just about e erywhere, from the sma$$est de ices to super computers. Ca a techno$ogy components5programs6 do not depend on the -ind of computer, te$ephone, te$e ision, or operating system they run on. 'hey wor- on any -ind compatib$e de ices that support the ja a p$atform. Ca a is pure$y object oriented and pro ides abstraction, encapsu$ation, inheritance and po$ymorphism. 'he in entors of ja a wanted to design a $anguage, which cou$d offer so$ution to some of the prob$ems encountered in modern programming. 'hey wanted the $anguage to be re$iab$e, portab$e and distributed but a$so simp$e, compact and interacti e. Sun 1icrosystems officia$$y describes ja a with the fo$$owing attributes. i. ii. .ompi$ed and interpreted #$atform:independent and portab$e

iii. i . . i. ii. iii. i".

Object:Oriented (obust and secure &istributed Simp$e, sma$$ and fami$iar 1u$tithreaded and interacti e High performance &ynamic and e"tensib$e .O1#%B!& A/& %/'!(#(!'!&

Dsua$$y a computer $anguage is either compi$ed or interpreted. Ca a combines both these approaches thus ma-ing ja a a two:stage system. First, ja a compi$er trans$ate source code into byte code instructions. <yte codes are not machine code that can be direct$y e"ecuted by the machine that is running the ja a program. #BA'FO(1 %/&!#!/&!/' A/& #O('A<B! 'he most significant contribution of ja a o er other $anguage is its portabi$ity. Ca a programs can be easi$y mo ed from one computer system to other, anywhere any time. .hanges and upgrades in operating systems, processors and system resources wi$$ not force any changes in ja a programs. O<C!.' O(%!/'!& Ca a is a true object:oriented $anguage. A$most e erything in ja a is an object. A$$ program code and data reside within objects and c$asses. (O<DS' A/& S!.D(! Ca a is a robust $anguage. %t pro ides many safeguards to ensure re$iab$e code. %t has strict compi$e time and run time chec-ing for data types. Ca a a$so incorporates the concept of e"ception hand$ing, which captures series errors and e$iminates any ris- of crashing the system.

&%S'(%<D'!& Ca a is designed as a distributed $anguage for creating app$ications on networ-s. %t has the abi$ity to store both data and programs. Ca a app$ications can open and access remote objects on internet as easi$y as they can do in a $oca$ system. 'his enab$es mu$tip$e programmers at mu$tip$e remote $ocations to co$$aborate and wor- together on a sing$e project. S%1#B!, S1ABB A/& FA1%B%A( Ca a is a sma$$ and simp$e $anguage. 1any features of . and .HH that are either redundant or sources of unre$iab$e code are not part of ja a. 1DB'%'H(!A&!& A/& %/'!(A.'%=! 1u$tithreaded means hand$ing mu$tip$e tas-s simu$taneous$y. Ca a supports mu$tithreaded programs. 'his means that we need not wait for the app$ication to finish one tas- before beginning another. H%>H #!(FO1A/.! Ca a performance is impressi e for an interpreted $anguage, main$y due to the use of intermediate byte code. &M/A1%. A/& !A'!/S%<B! Ca a is dynamic $anguage. Ca a is capab$e of dynamica$$y $in-ing in new c$ass $ibraries, methods and objects. Ca a programs support functions written in other $anguages such as . and .HH. H'1B Hyperte"t 1ar-up Banguage5H'1B6 is a method where ordinary te"t can be con erted in to hyperte"t. %t is a specia$ code inc$uded to contro$ the $ayout and appearance of the te"t. 'echnica$$y, H'1B is not a programming $anguage. %t combines instructions within data to te$$ a disp$ay program ca$$ed browser, how to render the data that the documents contains. i. ii. H'1B is the character:based method for describing and e"pressing the content. 'he content is picture, te"t, sound and ideo c$ips. %t de$i er the contents to mu$tip$e p$atforms.

iii.

%t $in-s document components or documents together to compose compound documents.

'im burners:Bee de e$oped H'1B in ear$y 1))+ at .!(/ 5.onsei$ !uropean de$a (echerache /uc$eaire6, the !uropean #artic$e #hysics Baboratory in >ene a, Swit;er$and. H'1B is a pub$ic domain and not owned by anybody. 'he 03.50or$d 0ide 0eb .onsortium www.w3.org6 is the body, which contro$s the H'1B standards. 'he H'1B 0or-ing >roup comprises of industry $eaders, content pro iders and other $eading e"perts who pro ide input on web accessibi$ity and internationa$i;ation. 'im <urners:$ee origina$$y de e$oped H'1B , and was popu$ari;ed by the mosaic browser . &uring 1))+s it has b$ossomed with the e"p$osi e growth of the web. &uring this time, H'1B has been e"tended in a number of ways. H'1B 2.+ specifications was de e$oped under the protection of the internet !ngineering 'as- Force5%!'F6 to codify common practice in $ate 1))4. H'1B 3.+ proposed much richer ersion of H'1B. &espite ne er recei ing consensus in standards discussions, these drafts $ed to the

adoption of a range of new features. 'he efforts of the 0or$d 0ide 0eb .onsortiumFs H'1B 0or-ing >roup to codify common practice in 1))@ resu$ted in H'1B 3.2. H'1B 4.+ e"tends H'1B with mechanisms for sty$e sheets, direction te"t, richer tab$es and enhancements to forms, offering impro ed accessibi$ity for peop$e with disabi$ities.

2.4 OVERVIE' OF T#E PRO&ECT


'he main purpose of this software is to reduce the manua$ errors in o$ ed in the air$ine reser ation process and ma-e it con enient for the customers to boo- the f$ights as when they re2uire such that they can uti$i;e this software to ma-e reser ations, modify reser ations or cance$ a particu$ar reser ation 'he name of the software is KA%(B%/! (!S!(=A'%O/ SMS'!1I. 'his software pro ides options for iewing different f$ights a ai$ab$e with

different timings for a particu$ar date and pro ides customers with the faci$ity to boo- a tic-et, modify or cance$ a particu$ar reser ation but it does not pro ide the customers with detai$s of cost of the tic-et and it does not a$$ow the customer to modify a particu$ar part of his reser ation and he3she can modify a$$ his detai$s. 'here are * modu$es in this project. 1. Administrator 1odu$e. !nab$es the air$ine administrator to perform a$$ administrati e functions and manage in entory o er BA/ or the %nternet. 'he administrator can define or modify routes, fares, schedu$es and assign or deny access rights for 2ua$ified tra e$ agents and other authori;ed users. 2. (eser ation Agent 1odu$e. A$$ows the air$ines reser ation agents to ma-e and modify reser ations on the BA/ or o er the internet. 'he reser ation agents cou$d be stationed at any air$ine office $ocation. 3. #assenger 1odu$e. 'his modu$e enab$es on$ine customers to ma-e reser ations, iew their boo-ings, ma-e specia$ ser ice re2uests and define their preferences o er the web.

4.#ayment. #ro ides the air$ine with the abi$ity to set up arious tra e$ agents and gi e them reser ations capabi$ities o er the %nternet. 'he tra e$ agents are ab$e to disp$ay and offer discounted fares to passengers. *..ance$$ation. 'he system shou$d a$$ow the user to cance$ the e"isting boo-ing. %n this cance$$ation ery he$pfu$ in a$$ the tra e$$ers.

SYSTEM STUDY AND ANALYSIS

3.SYSTEM STUDY AND ANALYSIS 3.1 E$ISTING SYSTEM

'he effecti eness of the system depends on the way in which the data is organi;ed. %n the e"isting system, much of the data is entered manua$$y and it can be ery time consuming. 0hen records are accessed fre2uent$y, managing such records becomes difficu$t. 'herefore organi;ing data becomes difficu$t. 'he major $imitations are8 1odifications are comp$icated 1uch time consuming !rror prone Dnauthori;ed access of data

3.2 PROPOSED SYSTEM


'he proposed system is designed to meet a$$ the disad antages of the e"isting one. 'he proposed system is better and more efficient than e"isting system. %t is designed -eeping in mind a$$ the drawbac-s of the present system to pro ide a permanent so$ution to them 'he primary aim of the new system is to speed up the transactions. Dser friend$iness is another pecu$iarity of the proposed system. 1essages are disp$ayed in message bo"es to ma-e the system user friend$y. 'he main ad antage of the proposed system is the reduction in $abor as it wi$$ be possib$e so search the detai$s of arious p$aces. ! ery record is chec-ed for comp$eteness and accuracy and then it is entered into the &atabase. 'he comments and a$id messages are pro ided to get away with redundant data Another important feature of the proposed system is the data security pro ided by the system. 'he system is password protected and can on$y be accessed by authori;ed users. 'he main objecti e of the new system is to pro ide accurate data processing. 'he main ad antages of the proposed system are8 .omp$e" functions are done automatica$$y #rocessing time can be minimi;ed Simp$e and easy to manage #ossib$e to obtain accurate resu$ts

.hances of errors reduced Faster and more accurate than the e"isting system !asy for hand$ing reports 'he proposed system is comp$ete software for Air$ine (eser ation System, which is more efficient, re$iab$e, faster and accurate for processing.

3.3 FEASI%ILITY STUDY Feasibi$ity study is a process which defines e"act$y what a project is and what strategic issues need to be considered to assess its feasibi$ity, or $i-e$ihood of succeeding. Feasibi$ity studies are usefu$ both when starting a new business, and identifying a new opportunity for an e"isting business. %dea$$y, the feasibi$ity study process in o$ es ma-ing rationa$ decisions about a number of enduring characteristics of a project, inc$uding8 'echnica$ feasibi$ity: do weF ha e the techno$ogyFN %f not, can we get itN Operationa$ feasibi$ity: do we ha e the resources to bui$d the systemN 0i$$ the system be acceptab$e N wi$$ peop$e use itN !conomic feasibi$ity, technica$ feasibi$ity, schedu$e feasibi$ity, and operationa$ feasibi$ity: are the benefits greater than the costsN TEC#NICAL FEASI%ILTY6 'echnica$ feasibi$ity is concerned with the e"isting computer system 5Hardware, Software etc.6 and to what e"tend it can support the proposed addition. For e"amp$e, if particu$ar software wi$$ wor- on$y in a computer with a higher configuration, an additiona$ hardware is re2uired. 'his in o$ es financia$ considerations and if the budget is a serious constraint, then the proposa$ wi$$ be considered not feasib$e. OPERATIONAL FEASI%ILITY6 Operationa$ feasibi$ity is a measure of how we$$ a proposed system so$ es the prob$ems, and ta-es ad antages of the opportunities identified during scope definition and how it satisfies the re2uirements

identified in the re2uirements identified in the re2uirements ana$ysis phase of system de e$opment. ECONOMIC FEASI%ILITY6 !conomic ana$ysis is the most fre2uent$y used method for e a$uating the effecti eness of a candidate system. 1ore common$y -nown as cost3 benefit ana$ysis, the procedure is to determine the benefits and sa ings that are e"pected from a candidate system and compare them with costs. %f benefits outweigh costs, then the decision is made to design and imp$ement the system.

SYSTEM DESIGN

4.SYSTEM DESIGN
System design is the process or art of defining the architecture, components, modu$es, interfaces, and data for a system to satisfy specified re2uirements. One cou$d see it as the app$ication of systems theory to product

de e$opment. &esign is the first phase in de e$opment phase for any engineerFs product system. &esign is the creati e process. %t dea$s with the creating abi$ity of the programmer. A good design is the -ey to effecti e system. 'he term K&esignI is defined as K'he process of app$ying arious techni2ues and princip$es for the purpose of defining a process or a system in sufficient detai$s to permit its physica$ rea$i;ationI. 4.1 INPUT DESIGN 'he user interface design is ery important for any app$ication. 'he interface design describes how the software communicated within itse$f, to system that interpreted with it and with humans who use it. 'he interface is a pac-ing for computer software if the interface is easy to $earn, simp$e to use. %f the interface design is ery good, the user wi$$ fa$$ into an interacti e software app$ication. 'he input design is the process of con erting the user: oriented inputs into the computer:based format. !rrors entered by data entry operations can be contro$$ed by input design. 'he data is fed into the system using simp$e interacti e forms. 'he forms ha e been supp$ied with messages so that user can enter data without facing any difficu$ty. 'he data is a$idated where er it re2uires in the project. 'his ensures that on$y the correct data ha e been incorporated into the system. 'he goa$ for designing input data is to ma-e data entry as easy, $ogica$ and free from errors. 'he objecti es of input design are8 'o produce a cost effecti e method of input

'o ma-e the input forms understandab$e to the user 'o ensure the a$idation of data input 'o achie e the highest position $e e$ of accuracy 'he arious acti ities to be performed for the o er a$$ input processors are8 &ata recording at its source. &ata transfer to input form. &ata con ersation to computer acceptab$e mode. &ata a$idation. &ata f$ow contro$. &ata correction if necessary. %n the proposed system, the user is pro ided with respecti e forms to input the re2uired data. 'he input screens in this project are8 Bogin form (egistration form (eser ation form .ance$$ation form 4.2 OUTPUT DESIGN 'he system output is the most important and direct source of information to the user. So inte$$igib$e output design impro es the re$ationship with the user and he$ps in decision:ma-ing. Outputs from

the computer systems are re2uired primari$y to communicate the resu$ts of processing to users. 'hey are a$so used to pro ide a permanent copy of these resu$ts for $ater consu$tation. A major form of output is a hard copy obtained from the printer. 'hese printouts are designed to inc$ude the e"act re2uirements of the user. 'he outputs re2uired by the end:user are defined during the $ogica$ design stages. 'wo phases of the output design are8 Output definition. Output specification Output definition ta-es into account the type of output contents, its fre2uency and its o$ume. 'he appropriate output media is determined for outputs. Once the output media is chosen, the detai$ specification of output documents are carried out. 'he nature of output re2uired from the proposed system is determined during the $ogica$ design stage itse$f. #hysica$ design stage ta-es the out$ine of the output from the $ogica$ design and produces the output as specified during the $ogica$ design phase. 'he necessary reports are generated which pro ide the comp$ete information re2uired by the user8 'he objecti es of output design are8 &esign output to ser e the indented purpose. #ro ide output on time.

Assume that output is where it is needed. &esign output to fit the user 'he output screens in this project are8 Homepage F$ight detai$s form #assenger detai$s form (eser ation detai$s form .ance$$ation detai$s form

4.3 DATA %ASE DESIGN A database is a co$$ection of information. A primary objecti e of a database management system is to pro ide a con enient en ironment to retrie e and store database information. 'he most

popu$ar and f$e"ib$e database system is the re$ationa$ database management system. 'he (&<1S organi;es data in the form of tab$es. !ach tab$e organi;es data in the form of raw and co$umns. !ach row in a tab$e represents a re$ationship. 'here is a c$ose connection between a tab$e and the mathematica$ concept of re$ation. 'he design of the database is of great importance as bad design scheme can destroy the who$e purpose of the projects. 'ab$e design describes the tab$e structure and records that ma-eup the tab$e. 'ab$e in the database usua$$y show how strong the system is. 'o design an efficient database, a$$ the tab$es in the database shou$d be norma$i;ed. /orma$i;ation is process, which e$iminates the data redundancy and u$timate$y pro ide a more efficient and f$e"ib$e structure. %t a$so ta-es into account the re$ationship between arious tab$es in the database. 'he primary -ey is uni2ue that is used in the information processes to reduce data redundancy. !ach tab$e contains primary -ey, foreign -ey, and constraint -ey to ensure data integrity. 'he database tab$es used are the fo$$owing8 Administrator .ompose mai$ %nbo"

Outbo" Add c$ass Account Add f$ight F$ight detai$s (eser ation Bogin

SYSTEM DEVELOPMENT

5. SYSTEM DEVELOPMENT

SYSTEM TESTING

6. SYSTEM TESTING

'esting is the penu$timate step of software de e$opment. An e$aborate testing of data is preferred and the system is using test data. 0hi$e doing testing, errors are noted and corrections is needed. 'he users are trained to operate the de e$oped system. <oth hardware and software securities are made to run the de e$oped system successfu$$y. System testing ma-es a $ogica$ assumption that if a$$ parts of the system are correct, the goa$ wi$$ be successfu$$y achie ed. 'he candidate system is subjected to a ariety of test8 On$ine (esponse, =o$ume, Stress (eco ery and Security ODsab$e tests. /othing is comp$ete without testing, as it is ita$ success of the system. 'esting process is di ided in to three phases8 Dnit testing, %ntegration 'esting and System 'esting. UNIT TESTING Dnit testing focuses erification effort on the sma$$est unit of software designs. 'o chec- whether each modu$e in the software wor-s proper$y so that it gi es desired output to the gi en input. A$$ a$idation and condition are tested in the modu$e $e e$ in the unit test. .ontro$ paths are tested to ensure the information proper$y into, and out of the program unit under test. <oundary condition is tested to ensure that the modu$es operate at boundaries. A$$ independent paths through the contro$ structure ensure that a$$ statements in a modu$e ha e been e"ecuted at $east once. INTEGRATION TESTING 'he major concern of integration testing are de e$oping an incrementa$ strategy that wi$$ $imit the comp$e"ity of entire actions among components as they are added to the systems. &e e$oping an imp$ementation and integration schedu$e that wi$$ ma-e the modu$es a ai$ab$e when needed, and designing test cases that wi$$ demonstrate the iabi$ity of the e o$ ing system. %ntegration testing is the comp$ete testing of the set of modu$es, which ma-es up the product. 'he objecti es are to ta-e untested modu$es and bui$d

a program structure that has been dictated by design as integration testing conducted, the tester shou$d identify the critica$ modu$es. One approach is to wait a$$ the units ha e passed the testing, and then combine them and then tested. Another strategy is to constructed the product is increments of tested units. A sma$$ set of modu$es are integrated together and tested , to which another modu$e is added and tested in combination and so on. 'he ad antage of this approach is that interface dispenses can be easi$y found and corrected. VALIDATION TESTING After the integration testing, software is comp$ete$y assemb$ed as a pac-age, interfacing errors ha e been unco ered and corrected, and a$idation test may begin. =a$idation succeeds when the software function as per the e"pectation of the customer. Software a$idation is achie ed through a series of b$ac- bo" tests that demonstrate conformity with re2uirements. <oth the p$an and procedure designed to ensure that a$$ functiona$ re2uirements are achie ed, documentation is correct and human: engineered and other re2uirements are met. =a$idation testing is done by inputting dummy data to ensure that software de e$oped satisfied a$$ the re2uirements of the user. SYSTEM TESTING System testing actua$$y a series of different tests, whose primary purpose is to fu$$y e"ercise the computer:based system a$though each test purpose a$$ shou$d erify that a$$ the system ha e been proper$y integrated and perform a$$ocated functions. System test are test designed to erify that the finished system meets its re2uirements. 'he purpose of this steps is to test the system under rea$istic condition, but with understanding and forgi ing users. &uring system testing e"ists reco ery testing, security testing, performance testing and stress testing. Any engineered process can be tested in one or two ways. 0hite bo" testing and b$ac- bo" testing. 0hite bo" testing is a test can design method that used the contro$ structure of the procedura$ design to de$i er the test cases. <$ac- bo" testing was conducted for each of the modu$es and a$$ of them were estab$ished to wor- proper$y.

OUTPUT TESTING After performing the a$idation testing, the ne"t step is the output testing of the software. Since no system cou$d be usefu$, if it does not produce the re2uired output in the specified format. As-ing about the format re2uired by them tests the output generated or disp$ayed by the system under consideration.

SYSTEM IMPLEMENTATION

7. SYSTEM IMPLEMENTATION

After the system has been designed physica$$y in

detai$, the stage is to transfer the system into a wor-ing one. %mp$ementation is the stage of a project during which the design of a system is tested, debugged and made operationa$. So it is the most crucia$ stage in achie ing a successfu$ new system and in gi ing the users confidence that the new system wi$$ wor- and be effecti e. 'he fo$$owing are the major acti ities that comprise the imp$ementation stage8 &e e$op detai$ed programming specifications %n this acti ity the interna$ $ogic of the arious modu$es such as a$gorithms, specia$ techni2ues etc. are de e$oped. &e e$op test specification and test data 'he ana$yst decides how program testing shou$d be done, for instance, which modu$e shou$d be tested first. 0rite computer programs An appropriate programming $anguage is se$ected for writing programs according to the type of processing in o$ ed. 'est computer programs 'his acti ity determines whether the system is producing the resu$ts it was designed to produce. !rrors in design and $ogic wi$$ be shown here. #rograms are indi idua$$y tested using the test data produced in the pre ious acti ity. Dser training 0hi$e computer programs are being de e$oped and tested, the ana$yst

wi$$ start fami$iari;ing the users with the producers to be used in the new system. System testing After the computer program ha e been written and tested, and users ha e been trained to use the system, a fu$$ system test can ta-e p$ace.

0hen a new system has been tested thorough$y by the programmers then it is ready is be imp$emented in to the wor-ing en ironment, rep$acing the origina$ system. 0e used direct change o er strategy to do this. D1,e-* 1=>0e=e/*a*1(/6 0ith this strategy the changeo er is done in one operation, comp$ete$y rep$acing the o$d system in one go. 'his usua$$y ta-es p$ace on a set date, often after a brea- in production or a ho$iday period so that time can be used to get the hardware and software for the new system insta$$ed without causing too much disruption. Ad antages8 'he most rapid of a$$ the strategies, pro ided it wor-sP Bess ris- of confusion between o$d and new systems.

. SYSTEM MAINTENANCE AND SECURITY MEASURES

SYSTEM MAINTENANCE

1aintenance is a necessary component of any business computer system or wor-. !ach indi idua$ des-top computer and ser er has needs that must be met to -eep them running optima$$y. %tFs easy to o er$oo- this maintenance and as a resu$t, systemFs can perform s$ow$y or ha e issues that seem to come out of now here. <y regu$ar$y addressing the many items that need attention on e ery computer, performance and re$iabi$ity can be counted on o er the $ife of each system. 0e can create a schedu$e of maintenance tas-s and imp$ement them to -eep you as efficient with your computer system as possib$e. 1aintenance inc$udes a$$ the acti ity after the insta$$ation of software that is performed to -eep the system operationa$. 'he two major forms of maintenance acti ities are adapti e maintenance and correcti e maintenance. %t is genera$$y agreed that for $arge systems, remo ing a$$ the fau$ts before de$i ery is e"treme$y difficu$t and fau$ts wi$$ be disco ered $ong after the system is insta$$ed. As these resu$ts are detected, they ha e to be remo ed. 1aintenance acti ities re$ated to fi"ing of errors fa$$ under correcti e maintenance. (emo ing errors is one of the acti ities of maintenance. 1aintenance a$so needed due to change in the en ironment or the re2uirements of the system. 'he introduction of a software system affects the wor-. 'his change in en ironment often changes what is desired from the system. Furthermore, often after the system is insta$$ed and the users ha e had a chance to wor- with it for sometime, re2uirements that are not identified during re2uirement ana$ysis phase wi$$ be unco ered. 'his occurs, since the e"perience with the software he$ps the user to define the needs more precise$y. 'hese might a$so changes in the input data, the system

en ironment and output formats. A$$ these re2uire modification of the software. 'he maintenance acti ities re$ated to such modification fa$$ under adapti e maintenance. 1aintenance wor- is based on e"isting software, as compared to de e$opment wor-, which creates new software. .onse2uent$y maintenance reso$ es around understanding the e"citing software and spares most of their time trying to understand the software that they ha e to modify. Dnderstanding the software in o$ es not on$y understanding the code, but a$so the re$ated documents. &uring the modification of the software, the effects of the change ha e to be c$ear$y understood by the maintainer since introducing undesired side effects in the system during modification is easier. 'o test whether those aspects in the system that are not supposed to be modified are operating as they were before modification, regression testing is done. (egression testing in o$ es e"ecuting o$d tests cases to test that no new errors ha e been introduced. 'hus maintenance in o$ es understanding the e"isting software, understanding the effects of change, ma-ing the changes: both the code and documents, testing the new parts5changes6, and resetting of the o$d parts that were not changed. Since often during de e$opment, needs of the maintainers are not -ept in mind, $itt$e support documents are produced during de e$opment aid the maintainer. 'he comp$e"ity of the maintenance tas- is coup$ed with the neg$ect of maintenance concerns during de e$opment which ma-es maintenance the most cost effecti e acti ity in the $ife of a software product. SYSTEM SECURITY

System security refers to the technica$ inno ations are producers app$ied to the hardware and operating systems to protect against de$iberate or accidenta$ damage from defined threat. &ata pri acy and security are issues that go beyond the scope of system de e$opment. 'hey are actua$$y a societa$ concern. An organi;ation that depends hea i$y on the use of databases re2uires specia$ contro$s to maintain iab$e information. %nformation security means protecting information and information systems from unauthori;ed access, use, disc$osure, disruption, modification, destruction. 'he terms information security, computer security and information assurance are fre2uent$y incorrect$y used interchangeab$y. 'hese fie$ds are interre$ated often and share the common goa$s of protecting the confidentia$ity, integrity and a ai$abi$ity of informationL howe er there are some subt$e differences between them. I/*eg,1*9 %n information security, integrity means that data cannot be modified without authori;ation. 'his is not the same thing as referentia$ integrity in databases. %ntegrity is io$ated when an emp$oyee accidenta$$y or with ma$icious intent de$etes important data fi$es, when a computer irus infects a computer, when an emp$oyee is ab$e to modify his own sa$ary in a payro$$ database, when an unauthori;ed user anda$i;es a web site, when someone is ab$e to cast a ery $arge number of otes in an on$ine po$$, and so on. 'here are many ways in which integrity cou$d be io$ated without ma$icious intent. %n the simp$est case, a user on a system cou$d miss:type someoneFs address. On a $arger sca$e, if an automated

process is not written and tested correct$y, bu$- updates to a database cou$d after data in an incorrect way, $ea ing the integrity of the data compromised. %nformation security professiona$s are tas-ed with finding ways to imp$ement contro$s that pre ent errors of integrity. A7a10a?101*9 For any information system to ser e its purpose, the information must be a ai$ab$e when it is needed. 'his means that the computing systems used to store and process the information , the security contro$s used to protect it, and the communication channe$s used to access it must be functioning correct$y. High a ai$abi$ity systems to remain a ai$ab$e at a$$ times, pre enting ser ice disruptions due to power outages, hardware fai$ures, and system upgrades. !nsuring a ai$abi$ity a$so in o$ es pre enting denia$:of ser ice attac-s. A--e22 -(/*,(0 Access to protected information must be restricted to peop$e who are authori;ed to access the information. 'he computer be authori;ed. 'his re2uires that mechanisms be in p$ace to contro$ the access to protected information. 'he sophistication of the access contro$ mechanisms shou$d be in parity with the a$ue of the information being protected:the more sensiti e or a$uab$e the information the stronger the contro$ mechanisms need to be. %dentification is an assertion of whose someone is or what something is. Authentication is the act of erifying a c$aim of identity.

CONCLUSION

!.CONCLUSION

'o arious processes to fu$fi$$ the re2uirements proposed during the ana$ysis phase in the de e$opment of this project ha e been comp$eted.'he pac-age was a$idated for accuracy and the resu$ts were found to be satisfactory. An instruction can imp$ement the project and e en modify it according to its changing need and necessities. 'op down programming techni2ues has been adapted whi$e de e$oping the system. !ach tas- is di ided into modu$es. 'he modu$es de e$oped can be easi$y $in-ed to the system. Hence the new system is more re$iab$e, accurate, efficient, and effecti e.

SCOPE FOR FURT#ER EN#ANCEMENT

1". SCOPE FOR FURT#ER EN#ANCEMENT

&e e$opments in software techno$ogy are continuing dynamica$$y. 'his has forced software de e$opers to $oo- for new approaches to software design and de e$opment. %n order to face this situation, the modu$es in a pac-age shou$d be to$erant to change in any time. 'he modu$es in this pac-age can be subjected to further enhancements. 0e can send information to customers regarding new schemes. 1ore other reports can be produced and new ariations can be drawn up. 'his is a$so meant to be the foundation stone for something that sca$es the $argest pinnac$es of e"ce$$ence and the de e$opers sincere$y be$ie e that, this project has been rea$i;ed.

APPENDI$

DATA FLO' DIAGRAM

TA%LE DESIGN
1..ance$$ation. 'his tab$e is used to store the cance$ detai$s.

Fie$d name cance$id

reser ationid
cance$ationdate refundmoney

&ata type int51+6 int51+6 date decima$51+,+6

.onstraints #(%1A(M 7!M FO(!%>/ 7!M /O' /DBB /O' /DBB

2..$asses 'his tab$e is used to store the c$ass detai$s. Fie$d name c$assid f$ightcode c$asscode c$assname fare tota$c$assseat 3. F$ight days 'his tab$e is used to store the f$ight days detai$s Fie$d name datecode f$ightcode date departure &ata type int51+6 int51+6 date time constraints #(%1A(M 7!M FO(!%>/ 7! /O' /DBB /O' /DBB &ata type int51+6 int51+6 archar5*+6 archar5*+6 decima$51+,+ int51+6 constraints #(%1A(M 7!M FO(!%>/ 7!M /O' /DBB /O' /DBB /O' /DBB /O' /DBB

4. F$ight detai$s 'his tab$e is used to store the f$ight detai$s. Fie$d name f$ightcode &ata type int51+6 constraints #(%1A(M 7!M

air$inecode f$ightname source destination tota$capacity

archar51++6 archar51++6 archar51++6 archar51++6 int51+6

/O' /DBB /O' /DBB /O' /DBB /O' /DBB /O' /DBB

*. $ogin 'his tab$e is used to store the $ogin detai$s Fie$d name username password &ata type archar5*+ archar5*+ constraints #(%1A(M 7!M /O' /DBB

@.mai$ 'his tab$e is used to store the mai$ detai$s Fie$d name mai$id touser fromuse subject message &ata type int51+6 archar52*+6 archar52*+6 archar52*+6 te"t constraints #(%1A(M 7!M FO(!%>/ 7!M FO(!%>/ 7!M /O' /DBB /O' /DBB

Q./ew user 'his tab$e is used to store the new user detai$s. Fie$d name userid &ata type int51+6 constraints #(%1A(M 7!M

firstname $astname mobi$eno $and$ineno dob address city state country emai$id password usertype username

archar52*+6 archar52*+6 int51+6 int51+6 date archar52*+6 archar52*+6 archar52*+6 archar52*+6 archar52*+6 archar52*+6 archar52*+6 archar52*+6

/O' /DBB /O' /DBB /O' /DBB /O' /DBB /O' /DBB /O' /DBB /O' /DBB /O' /DBB /O' /DBB /O' /DBB /O' /DBB /O' /DBB D/%RD! 7!M

E. Outbo" 'his tab$e is used to store the outbo" detai$s Fie$d name oid touser fromuser subject 1essage &ata type int51+6 archar52*+6 archar52*+6 archar52*+6 te"t constraints #(%1A(M 7!M FO(!%>/ 7!M /O' /DBB /O' /DBB /O' /DBB

).#assenger 'his tab$e is used to store passenger detai$s.

Fie$d name

&ata type

constraints

passengerno f$ightcode dob address nationa$ity name gender phoneno emai$id passportno reser ationid

int51+6 int51+6 date archar52*+6 archar52*+6 archar52*+6 archar52*+6 archar52*+6 archar52*+6 int51+6 int51+6

#(%1A(M 7!M FO(!%>/ 7!M /O' /DBB /O' /DBB /O' /DBB /O' /DBB /O' /DBB /O' /DBB /O' /DBB /O' /DBB FO(!%>/ 7!M

1+.#ayment 'his tab$e is used to store payment detai$s Fie$d name paymentid chec-no creditcardno paidamount paymentdate passengerno &ata type int51+6 int51+6 int51+6 decima$51+,+6 date int51+6 constraints #(%1A(M 7!M /O' /DBB /O' /DBB /O' /DBB /O' /DBB /O' /DBB

11.(eser ation 'his tab$e is used to store reser ation detai$s. Fie$d name reser ationid &ata type int51+6 constraints #(%1A(M 7!M

f$ightcode journeydate c$asscode source destination status journeytime

int51+6 date archar5*+6 archar5*+6 archar5*+6 int51+6 time

FO(!%>/ 7!M /O' /DBB FO(!%>/ 7!M /O' /DBB /O' /DBB /O' /DBB /O' /DBB

12.(eser e chec'his tab$e is used to store reser e chec- detai$s Fie$d name reser ationid username password &ata type int51+6 archar52*+6 archar52*+6 constraints #(%1A(M 7!M

S.(!!/ BAMOD'S

REPORTS

%I%LIOGRAP#Y

%I%LIOGRAP#Y

'E% REFERENCES %OO; REFERENCES

Anda mungkin juga menyukai