Documente Academic
Documente Profesional
Documente Cultură
OPERATING SYSTEM
WINDOWS-XP
FRONT END
ASP.Net
BACK END
SQL-Server
PACKAGE
MS-Word
LANGUAGE
.NET
DATABASE
ACKNOWLEDGEMENT
We also acknowledge other professor and friends for their satisfactory completion
of this project principle Mr. Rupesh Jaishwal
SupriyaTiwari,KshamaChaubey has always been a source of inspiration. We
will also thanks to Mr.Chandra Shekhar Gautam for his valuable suggestion
and their extended in every respect to see the project for its completion. We would
like to express my heartfelt thanks to Mr. Anant Soni, managing director, Rajiv
Gandhi computer college for having given us an opportunity to undertake this
project in this highly reputed organization.
Finally we thank our parents and deer ones who are the anchor
of our lives for their supports and understanding.
Supriya Tiwari
Kshama Chaubey
TABLE OF CONTENTS
Chapter 1
Introduction
Purpose of project
Project of Goal
Project of Scope
Chapter 2
Software Background
Study of window xp
About VB
Why SQL server
Chapter 3
Problem Analysis
Software requirement
System planning
Project estimation
Project Risk Analysis
Chapter 4
System Designing
E-R Diagram
Data flow diagram
Input / Output
Chapter 5
Implementation
Source code
Testing
Installation
Chapter 6
System Analysis
Feasibility study
Methodology Adopted
Detail Hardware and software
Chapter 7
Security of the System
Database security
Application security
Transaction security
System security
Conclusion
Biobliography
INTRODUCTION
The movie portal has benefited KVR many ways out of which a few
have been outlaid below:-
This online ticket reservation system provides a website for a cinema hall
where any user of information can access it. This cinema hall is multiplex
with 3 screen three different types of classes\seats. Only 50% of seats can be
reserved online. User is regular to login to the system and needs a credit card
for booking the tickets. Tickets can be collected at the counter.
Watching movies with and friends in theater is one of the best medium
of entertainment after having a hectic schedule. But all this excitement
vanishes after standing in his in long queue get ticket booked.
Our online ticket reservation system is one of the best opportunities for
those who cannot afford in a time to get their ticket reserved standing in long
queue. People can booked ticket online at any time of day or night .
10
Chapter 1
Introduction
Purpose of project
Goal of project
Project of Scope
Project of objective
11
Purpose of project:-The main purpose of online ticket booking is to provide another way for the
Customer to buy cinema ticket .The ticket reservation system is an internet
Based application that can be access throughout the net and can accessed by
Anyone who has a net connection. It is an automatic systems where we will be
Automate the reservation of ticket enquiries about availability of tickets.
Goal of Project:-
To provide refund .
Scope of Project
The scope of this project is to provide an easy option for the customer who is
willing to book ticket online for a movie. It saves his\her time and labor .On the
other hand half of the ticket of the cinema hall are been provide for booking online
such that labor of staff is reduce.
This system can be accessed anywhere to help net connection at any
time of day or night. Thus providing customer comfort and also plays a major role in
promoting the multiplex and the movies.
12
Objective of Project
Some important goals of online movie ticket booking system are as follows:
Online movie ticket booking system project is aimed to provide facility to
book cinema ticket anytime and from anywhere.
One objective of this project is to minimize the number of staff at the ticketbox window.
Promote new movie over the internet and gain maximum profit.
Provide a 24*7 service to the customers.
13
Chapter 2
Software Background
Study of window xp
Why ASP .Net
Why SQL Server
14
15
Study of window xp
Windows XP is an operating system, that provides the high level of security because
security in windows XP is assigned on a per user rather than per recourse basis, a
user need to remember only single windows XP user account name and password
log on and use local and network resources. With windows XP security, all resources
and actions are protected by discretionary access control, means that some users can
be permitted access to resources or perform an action while other user can be
prevented form accessing the same resource or action security is very flexible for
example-different permission for different users. User can be set on different files in
a directory. Windows XP security applies both to users working at the computer
where the resource is located and to user accessing the resource over the network.
For windows XP, the basic unit of security and administration is realized in
the domain name. A domain name is a collection of computer that recognized a
common security account database. Four types of computers participate in domain
security:
Servers.
Workstations.
16
Each domain has one PDC, which maintains the security account database
for the
Domain. A domain can have any number of BDCs. Each BDCs receives a copy of
domain security accounts database and assists the PDC by sharing the load of
authentication.
17
WHY ASP.NET
Taken directly from ASP .NET 2.0's home, ASP .NET 2.0,
"ASP
.NET
2.0
is
an
HTML-embedded
scripting
18
19
1. To store our data create one table for each type of information we track. To
bring the from multiple tables together I a query, form or report, we define the
relationship between the tables.
2. To find the retrieve just the data that meets conditions we specify, including
data from multiple tables create a query. A query can also update or delete
single records at the one time, and perform built-in or custom calculations on
the our data.
20
Chapter 3
Problem Analysis: Software requirement
System planning
Project estimation
Project Risk Analysis
specification
During our analysis of the project, we referred various books and
manuals and conduct
Questionnaire with various administrators. The job of system
administrator involves the
21
Maintains the new entry broker who are wanted to do testing, getting
detail knowledge of
the testing own Bikes, searching Bike Information who was tested,
searching about
Testing, and also done the modify any test and bike or staff information
and so on . This
Task is usually entrusted to a single person, the system administrator,
also known as the
super user. He has vest powers, having access to practically everything.
22
System planning
Scheduling of a software project does not differ greatly from System
administrator in window xp is not quite demanding and requires form the
administrator an in depth knowledge of the different components. The above stated
task of a system administration is considered as routine duties of an administrator.
But system problem can be quite grave and unexpected By identify the system
responsibilities of a administrator to be quite demanding requiring a through
knowledge of the system, which makes it a cumbersome job. We identified a need of
graphical tool for the task of system administration as its menu and screens will
guide him through the whole process.scheduling of any multitask engineering
effort. Therefore, generalized project scheduling tool and techniques can be applied
with little modification to software projects. Program evaluation and review
Technique (PERT) and critical path method (CPM) are two project scheduling
method that can be applied to software development. Both techniques are driven by
information already development in project planning activities:
Estimates of Effort
A decomposition of the product function
The selection of the appropriate process model and task set
Decomposition of tasks
23
Project Estimation:The project size is another important factor for the project estimation that can affect
accuracy and efficacy of estimations. As size increase, the interdependency among
various elements of the software grown rapidly.
Risk Analysis:Risk analysis and management are a series of steps that help a software team to
understand and manage uncertainty. Many problems can infected a software project.
A
risk is a potential problem-it might happen it might not. But regardless of the
outcome,
its a really good idea of identify it, assess its probability of occurrence, estimate its
impact, and establish a possibility plan should the problem actually occur.
For Risk analysis firstly recognizing what can go wrong that is called risk
Identification
.Next, each risk is analyzed to determine the probability that it will occur and the
damage that will do if it does occur. Once this information is established, risks are
ranked, by probability and impact. Finally a plan is developed to manage those risks
with
high probability and high impact.
24
Chapter 4
System Designing
E-R DIAGRAM
DATA FLOW DAIGRAM
INPUT /OUTPUT
25
26
REG
ISTR
ATI
ON
SIGN UP
LOGIN
E_MAIL
ID
USER NAME
USER
ADMIN
ADDRESS
PASSWORDD
ENTR
Y
MOBILE NO
THEATER ENTRY
SHOW
ADDRESS
THEATER NAME
ENT
RY
ENT
RY
RATE ENTRY
AMOUNT
THEATER NAME
MOVIES ENTRY
THEATER NAME
DISCRIPTION
MOVIE NAME
SHOW
SEAT TYPE
END DATE
START DATE
TICKET DETAIL
TICKET NO.
AMOUNT
SEAT
27
USE R
REGISTRATION
SIGN UP
USER NAME
E MIAL
PASSWORD
MOBILE NO.
PIN CODE
ADDRESS
OUTPUT
PROCESS
28
DATABASE
USER
LOGIN
ADMIN
29
THEATER NAME
THEATER
ENTRY
SHOW
THEATER
ENTRY
ADDRESS
THEATER NAME
MOVIE NAME
MOVIE
ENTRY
START DATE
MOVIES
ENTRY
END DATE
DISCRIPTION
THEATER NAME
RATE
ENTRY
SHOW
RATE ENTRY
SEAT TYPE
AMOUNT
TICKET NO.
TICKET
DETAIL
SEAT NO.
AMOUNT
TICKET
DETAIL
30
SDLC Model
FROM ANALYSIS
OUTPUT
DESIGN
INPUT
DESIGN
FILE
DESIGN
DETAILED SYSTEM
DOCUMENTATION
DESIGN
SUBMITTED TO
MANAMENT FOR
APPROVAL
COST JUSTIFICATION
& SYSTEM DESIGN
31
PROCESSING
DESIGN
DESIGN ACCEPT
NO
TEST
PROGRAM
GO TO
IMPLEMENTATION
2
ABANDON
PROJECT
32
LOGIN FORM
33
34
35
36
37
DATABASE TABLE
Login form
38
SIGN UP
39
THEATER ENTRY
40
RATE ENTRY
41
MOVIES ENTRY
42
TICKET DETAIL
43
44
CODING
LOGIN FORM
Partial Class Default3
Inherits System.Web.UI.Page
Dim con As System.Data.SqlClient.SqlConnection
Dim cmd As System.Data.SqlClient.SqlCommand
Dim dtr As System.Data.SqlClient.SqlDataReader
Protected Sub Page_Load(ByVal sender As Object, ByVal e As
System.EventArgs) Handles Me.Load
con = New System.Data.SqlClient.SqlConnection("Data
Source=.\SQLEXPRESS;AttachDbFilename=C:\Users\anant\Documents\movie.
mdf;Integrated Security=True;Connect Timeout=30;User Instance=True")
con.Open()
End Sub
45
Protected Sub Button1_Click(ByVal sender As Object, ByVal e As
System.EventArgs) Handles Button1.Click
If (RadioButton1.Checked = True) Then
If (TextBox1.Text = "movie") Then
If (TextBox2.Text = "satna") Then
Response.Redirect("theater entry.aspx")
End If
End If
End If
cmd = New System.Data.SqlClient.SqlCommand("select * from
signup", con)
dtr = cmd.ExecuteReader()
If (RadioButton2.Checked = True) Then
dtr.Read()
If (TextBox1.Text = dtr("username").ToString()) Then
If (TextBox2.Text = dtr("password").ToString()) Then
Response.Redirect("after user login.aspx")
End If
End If
End If
dtr.Close()
End Sub
SIGN UP
Partial Class Default2
Inherits System.Web.UI.Page
Dim con As New System.Data.SqlClient.SqlConnection
Dim cmd As New System.Data.SqlClient.SqlCommand
Dim dtr As System.Data.SqlClient.SqlDataReader
Protected Sub Page_Load(ByVal sender As Object, ByVal e As
System.EventArgs) Handles Me.Load
con = New System.Data.SqlClient.SqlConnection("Data
Source=.\SQLEXPRESS;AttachDbFilename=C:\Users\anant\Documents\movie.
mdf;Integrated Security=True;Connect Timeout=30;User Instance=True")
con.Open()
End Sub
Protected Sub Button3_Click(ByVal sender As Object, ByVal e As
System.EventArgs) Handles Button3.Click
cmd = New System.Data.SqlClient.SqlCommand("insert into
signup values('" & TextBox1.Text & "','" & TextBox2.Text & "','" &
TextBox3.Text & "','" & TextBox4.Text & "','" & TextBox5.Text &
"','" & TextBox6.Text & "')", con)
cmd.ExecuteNonQuery()
TextBox1.Text = ""
TextBox2.Text = ""
TextBox3.Text = ""
TextBox4.Text = ""
TextBox5.Text = ""
TextBox6.Text = ""
End Sub
End Class
46
THEATER ENTRY
Partial Class Default4
Inherits System.Web.UI.Page
Dim con As New System.Data.SqlClient.SqlConnection
Dim cmd As New System.Data.SqlClient.SqlCommand
Dim dtr As System.Data.SqlClient.SqlDataReader
Protected Sub Page_Load(ByVal sender As Object, ByVal e As
System.EventArgs) Handles Me.Load
con = New System.Data.SqlClient.SqlConnection("Data
Source=.\SQLEXPRESS;AttachDbFilename=C:\Users\anant\Documents\movie.
mdf;Integrated Security=True;Connect Timeout=30;User Instance=True")
con.Open()
End Sub
Protected Sub Button1_Click(ByVal sender As Object, ByVal e As
System.EventArgs) Handles Button1.Click
cmd = New System.Data.SqlClient.SqlCommand("insert into
theaterentry values('" & TextBox1.Text & "','" & TextBox2.Text &
"','" & TextBox3.Text & "','" & Label9.Text & "','" & Label10.Text &
"','" & Label11.Text & "')", con)
cmd.ExecuteNonQuery()
Label13.Text = MsgBox("record save")
TextBox1.Text = ""
TextBox2.Text = ""
TextBox3.Text = ""
End Sub
Protected Sub Button2_Click(ByVal sender As Object, ByVal e As
System.EventArgs) Handles Button2.Click
cmd = New System.Data.SqlClient.SqlCommand("update
theaterentry set address='" & TextBox2.Text & "',movie='" &
TextBox3.Text & "',show1= '" & Label9.Text & "',show2='" &
Label10.Text & "',show3='" & Label11.Text & "' where theatername='"
& TextBox1.Text & "'", con)
cmd.ExecuteNonQuery()
Label14.Text = MsgBox("update record")
TextBox1.Text = ""
TextBox2.Text = ""
TextBox3.Text = ""
End Sub
Protected Sub Button3_Click(ByVal sender As Object, ByVal e As
System.EventArgs) Handles Button3.Click
cmd = New System.Data.SqlClient.SqlCommand("delete from
theaterentry where theatername='" & TextBox1.Text & "'", con)
cmd.ExecuteNonQuery()
Label15.Text = MsgBox("Delete record")
TextBox1.Text = ""
47
TextBox2.Text = ""
TextBox3.Text = ""
End Sub
Protected Sub Button4_Click(ByVal sender As Object, ByVal e As
System.EventArgs) Handles Button4.Click
Response.Redirect("rate entry.aspx")
End Sub
End Class
RATE ENTRY
Partial Class Default5
Inherits System.Web.UI.Page
Dim con As New System.Data.SqlClient.SqlConnection
Dim cmd As System.Data.SqlClient.SqlCommand
Dim dtr As System.Data.SqlClient.SqlDataReader
Dim s As String
48
End Sub
Protected Sub Button3_Click(ByVal sender As Object, ByVal e As
System.EventArgs) Handles Button3.Click
Response.Redirect("movies entry.aspx")
End Sub
End Class
TICKET DETAILS
Partial Class Default8
Inherits System.Web.UI.Page
Dim
Dim
Dim
Dim
Dim
End Sub
49
MOVIES ENTRY
Partial Class Default6
Inherits System.Web.UI.Page
Dim con As New System.Data.SqlClient.SqlConnection
Dim cmd As New System.Data.SqlClient.SqlCommand
Dim dtr As System.Data.SqlClient.SqlDataReader
Dim adt As System.Data.SqlClient.SqlDataAdapter
Dim ds As System.Data.DataSet
Protected Sub Page_Load(ByVal sender As Object, ByVal e As
System.EventArgs) Handles Me.Load
con = New System.Data.SqlClient.SqlConnection("Data
Source=.\SQLEXPRESS;AttachDbFilename=C:\Users\anant\Documents\movie.
mdf;Integrated Security=True;Connect Timeout=30;User Instance=True")
con.Open()
If IsPostBack = False Then
adt = New System.Data.SqlClient.SqlDataAdapter("select *
from moviesentry", con)
ds = New System.Data.DataSet()
adt.Fill(ds, "moviesentry")
DropDownList1.DataSource = ds
DropDownList1.DataTextField = "theater_name"
DropDownList1.DataBind()
End If
End Sub
Protected Sub Button1_Click(ByVal sender As Object, ByVal e As
System.EventArgs) Handles Button1.Click
cmd = New System.Data.SqlClient.SqlCommand("insert into
moviesentry values('" & DropDownList1.SelectedItem.Text & "','" &
TextBox2.Text & "','" & TextBox3.Text & "','" & TextBox4.Text &
"','" & TextBox5.Text & "')", con)
cmd.ExecuteNonQuery()
MsgBox("record save")
TextBox2.Text
TextBox3.Text
TextBox4.Text
TextBox5.Text
=
=
=
=
""
""
""
""
End Sub
Protected Sub DropDownList1_SelectedIndexChanged(ByVal sender As
Object, ByVal e As System.EventArgs) Handles
DropDownList1.SelectedIndexChanged
cmd = New System.Data.SqlClient.SqlCommand("select * from
moviesentry ", con)
dtr = cmd.ExecuteReader()
While (dtr.Read())
50
TextBox2.Text
TextBox3.Text
TextBox4.Text
TextBox5.Text
End While
=
=
=
=
dtr.Item("movie_name")
dtr.Item("start_date")
dtr.Item("end_date")
dtr.Item("Discription")
End Sub
Protected Sub Button4_Click(ByVal sender As Object, ByVal e As
System.EventArgs) Handles Button4.Click
Response.Redirect("rate entry.aspx")
End Sub
Protected Sub Button5_Click(ByVal sender As Object, ByVal e As
System.EventArgs) Handles Button5.Click
Response.Redirect("ticket detail.aspx")
End Sub
End Class
51
End Sub
Protected Sub Button2_Click(ByVal sender As Object, ByVal e As
System.EventArgs) Handles Button2.Click
Response.Redirect("home.aspx")
End Sub
End class
PAYMENT DETAIL
Partial Class Default10
Inherits System.Web.UI.Page
Dim con As New System.Data.SqlClient.SqlConnection
Dim cmd As New System.Data.SqlClient.SqlCommand
Dim dtr As System.Data.SqlClient.SqlDataReader
Protected Sub Page_Load(ByVal sender As Object, ByVal e As
System.EventArgs) Handles Me.Load
con = New System.Data.SqlClient.SqlConnection("Data
Source=.\SQLEXPRESS;AttachDbFilename=C:\Users\anant\Documents\movie.
mdf;Integrated Security=True;Connect Timeout=30;User Instance=True")
con.Open()
cmd = New System.Data.SqlClient.SqlCommand("select * from
rate_entry", con)
dtr = cmd.ExecuteReader()
dtr.Read()
DropDownList1.DataSource = dtr
DropDownList1.DataTextField = "amount"
DropDownList1.DataBind()
dtr.Close()
End Sub
Protected Sub Button2_Click(ByVal sender As Object, ByVal e As
System.EventArgs) Handles Button2.Click
52
cmd = New System.Data.SqlClient.SqlCommand("insert into
paymentdetail values('" & TextBox1.Text & "','" & TextBox2.Text &
"','" & DropDownList1.SelectedItem.Text & "')", con)
cmd.ExecuteNonQuery()
MsgBox("record save")
TextBox1.Text = ""
TextBox2.Text = ""
End Sub
Protected Sub Button4_Click(ByVal sender As Object, ByVal e As
System.EventArgs) Handles Button4.Click
Response.Redirect("home.aspx")
End Sub
Protected Sub Button3_Click(ByVal sender As Object, ByVal e As
System.EventArgs) Handles Button3.Click
Response.Redirect("after user login.aspx")
End Sub
End Class
Testing
Testing Techniques:The time dependent asynchronous nature of many real-time application adds anew
and potential difficult element of mix time. Not only does the test case designer have
to consider white-box testing black-box testing cases but also event handling (i.e.
interrupt processing) the timing of the data, and the parallelism of the tasks
(process) that handle the data.
53
Comprehensive test case design methods for real-time system have yet to
evolve. However an overall four step strategy can be proposed:
Task Testing
Behavioral Testing
System Testing
Task Testing:The first step in the testing of real time software is to test each task
independently. That is white box testing and black box testing are designed and
executed for each task. Each task is executed independently during these tests.
Task testing uncovers error in logic and function but not timing or behavioral.
Behavioral Testing:Using system models created with CASE tools, it is possible to simulate the
behavioral of a real-time system and examine its behavioral as a consequence of
external events. These analysis activities can serve as the basic for the design of
test case that is conducted when the real time software has been built. Using a
technique that is similar to equivalent partitioning, events (e.g. interrupts,
control signals) are categorized for testing. For example, events for the
photocopier might be user interrupts (e.g. reset counter), mechanical interrupts
54
(e.g., paper jammed), system interrupts (e.g., toner low), and failure mode (e.g.,
roller overhead). Each of these events tested individually and the behavioral of
the executable system is examined to detect errors that occur as a consequence
of processing associated with these events. The behavior of system model and
as the executable software can be compared for performance.
System Testing:Software and hardware are integrated and a full range of the system test are
conducted in an attempt to attempts to uncover error at the software / hardware
interface. Most real-time system process interrupts. The tester develops a list of
all possible interrupts and the processing that occurs as a consequence of the
interrupts. Tests are then designed to asses the following system characteristics:
Are interrupts priorities properly assigned and properly handle?
Is processing for each interrupts handled correctly?
Does the performance of each interrupts-handling procedure conform to
requirements?
Does a high volume of interrupts arriving at critical times create problem in
Function of performance?
55
logical conditions have been exercised. Using white box testing methods ,
software engineer can derive test cases that
Guarantee that all independent paths within a module have been exercised at
least once.
Exercise all loops at their boundaries and within their operational bounds.
Exercise all logical decision on their true and false sides.
Exercise internal data structure to assure their validity.
Basic path testing, a white box technique, makes use of program graphs to drive
the set of linearly independent tests that will insure coverage. Conditional and
data flow testing further exercise program logic, and loop testing complements
other white box technique by providing a procedure for exercising loops of
varying degrees of complexity.
It focuses on the functional requirements of the software i.e. black box testing
enables the software engineer to derive sets of input condition that will fully
exercise all functional requirements for a program. Black box Testing is not
alternative to white box testing. Rather, it is a complementary approach that is
likely to uncover different class errors than white box testing.
. Black box Testing attempts to find errors in the following categories:I. Incorrect or missing function.
II. Interface error.
III. Errors in the data structure or external database.
56
IV. Performance error.
V. Initialization and termination errors.
The testing process which we have followed for our software is black box
testing. In this type of testing we test the software looking it as a black box
testing without considering the internal details. A required set of inputs are to
be supplied depending upon the software and we get our desired outputs.
In the testing phase of our software we have followed the approach where testing is
done in step:First we have tested all the function individually by executing then with the
required inputs. If these functions are called by some other functions then it is
checked that the functions returning the correct value, then it is checked that
these objects are created in the desired format. We had to test the functions by
making changes in the code itself so that their returning value can be printed,
giving us the idea about their being correct. This is approach is time consuming
but the functionality of each and every function can be best tested using it. The
function is also tested for its syntax and if some syntactical errors was present
then it was also removed and the function was made correct this is called
testing.
57
Installation:To install the network management software on your computer network. Some
follows the instructions of step to step: Insert the setup CD in CD-Drive of a computer and double click the setup.
Install the software by setup.
Follow the step to install the software.
Technical Feasibility:Our project is technically feasible, as we have taken visual basic as our front end.
Advantages of language are achieved as: Good interface for user.
Allow changes as when required.
It is rapid action development tool, which makes processing fast.
Coding make technical processing easy.
VB is event driven which means use is in control of application.
VB is infinitely extensible through the use of Active-X control.
Dynamically linked libraries and add-ins.
Economical Feasibility:1. Before creation of this project all the database and function were
managed
58
manually by persons but after creation there is a need of just a single
operator
for complete management, which makes it economically feasible.
2. Our project is quite affordable in term of using of any level and provides
complete functionality as desired.
3. Project can be also being called feasible economically in terms of
convenience.
As booking can be phone dialing.
Methodology Adopted
To solve the actual problem in an agency setting, software engineer or a team of
engineers must incorporate a development strategy encompasses the process
method and tool and generic phase. This strategy is often referred to as a
process model or a software engineering paradigm. A process model for
software engineering is chosen base on the nature of the project and application,
the methods and tools to used, and the controls and deliverables that are required.
All software development can be categorized as a problem solving loop in
which four distinct stages are encounters. Status quo represents the current
states of affairs; problem definition identifies the specific problem to be solve;
technical development solve the problem through the application of some
technology, and the solution integration delivers the result those who requested
the solution in the place.
Problem definition
Status
Quo
Technical
Developments
59
Solution
Integration
There is a verity of different process model for software engineering. Each
represents attempts to bring order to an inherently chaotic activity it is
important to remember that each of model of the models has been categories.
Linear sequential model:Some linear sequential some time called classic life cycle waterfall model. The
linear sequential model suggests a systemic sequential approach to software
development that begins system at the level and progresses through analysis,
design, coding, testing and support. Below figure illustrate the linear sequential
model for the software engineering the linear sequential model encompasses
following activities:-
60
The requirements gathering process is intensified and focused specifically on
software. To understand the nature of program to be built, The software
engineer must understand the information domain for the software as well as
require function, behavior, performance, and interface.
Design
Software design is actually multi step process that focuses on four distinct
attribute of program; data structure, software architecture, interface representation
and procedural detail. The design process translates requirements into a
representation of the software that can be accessed for quality before coding
begins.
Coding:
The design must be translate in to a machine-readable form. The code
generation step performs this task. If design is perform in a detailed manner, code
generation can accomplished mechanistically
Testing:Once code has been generated program testing being. The testing process
focuses on the logical internals of the software, ensuring that all statements
have been tested and on functional externals; that is conducting tests to uncover
error and ensure that the defined input will produce the actual results that agree
with required results.
Supports :-
61
Software will under go change after it is delivered to the customer, change will
occur because error have been encountered, because the software must to
adopted to accommodate changes in its external environments. Because the
customer requirements functional and performance enhancements.
System / in
Analysis
Design
Coding
Testing
SECURITY OF THE SYSTEM:Computer is a versatile instruction with almost enormous capacity computation at
an unimaginable speed. The end user is concerned about security along with
increased dependence on the computer. In system development, the project
manager must consider measures for marinating data and controlling secret at
all time. This involves built in hardware feature, programs procedures to protect
Candidate system from unauthorized access. The level of protection depends on
the sensitivity of the data, the reliability of the user, & the complexity of the
system. A well designed system includes control procedure to provide physical
Protection (hardware security) and restrict system access (database security).
62
Application security:
In our project, going password an application security. In our project, if the user
type wrong password and user name then he/she cannot enter inside the project,
If the users want to users want to use or run the project then he/she must enter
The correct user name and password. If the user type three times wrong
Password and click three times enter then our project will close and he/she not
enter any type.
Transaction Security:In this project, several kinds of transaction securities have been provided such as: A. We cannot enter the wrong value/data
B. We can change the login and password code if we know user name and
password.
C. We can take modified/deleted records
Database security:The database security is most essential to avoid theft or leakage of confidential
data. A control must be kept over the issue of data file, so that possibilities of
Destruction are minimized. Any person not open database. If he/she know
Password then he/she open database.
The security arrangement should be provided by computer installation initially
At time it is being established rather then being added later on. Security is like
Sheet belt it does not guarantee there will be not accident. However, when
Accident does occur it may be found too much cheaper, it may records. The
System security problem can be divided into following related issues.
System security:-
63
Hardware security
Hardware security includes arrangement for detection of fire fighting
equipment, alternative arrangement to meet emergency requirement
alternatively and uninterrupted power arrangement and hardware insurance in
case of own hardware equipment.
Software security:Software security may need striker control on person an access to the
processing center, the data file storage and the programs file. A copy of all
program May be file stored away from the computer installation as a security
measure.
In this system the customer will not select seat number .The authorized
people in this process will be employee who works at the cinema.
In this system the customer can book the tickets only for the present day.
Advanced booking upcoming movies is not be included but can be included
later.
Also, a printing system will not be in this project. In future ,a ticket printing.
The customer who has booked the ticket must reach the multiplex 30 minutes
prior to the show time or else ticket will get cancelled.
CONCLUSION
64
BIBLIOGRAPHY
Visual Basic .net
JEFFREY R.SHAPISO
Steven holzner
Introduction to VB.net
Robert j. oberge
Application Development
Using VB.vet
Robert j. oberge
College notes