Hotel Aditi (m)[1]

Embed Size (px)

Citation preview

  • 8/2/2019 Hotel Aditi (m)[1]

    1/57

    HOTEL MANAGEMENT SYSTEM

    A Minor Project Report

    Submitted in partial fulfilment of the requirements for the

    Award of degree of Master of Computer Application

    Submitted by: Guided by

    Manik Kukreja Ms. Aparna Marwah

    BHARATI VIDYAPEETH DEEMED UNIVERSITY SCHOOL OFDISTANCE EDUCATION

    Academic Study Centre - BVIMR, New Delhi

    An ISO 9001:2008 Certified Institute

    NAAC Accredited Grade A University

  • 8/2/2019 Hotel Aditi (m)[1]

    2/57

    Student Undertaking

    This is to certify that I Manik Kukreja has completed the Project titledImplementation of Hotel Management System using C Language under the

    guidance of Ms. Aparna Marwah in the partial fulfilment of the requirement for

    the award of degree of Masters of Computer Applications (MCA) from Bharati

    Vidyapeeth Deemed University, SDE, Academic Study Centre - BVIMR, New

    Delhi. This is an original piece of work and I have neither copied nor

    submitted it earlier elsewhere.

    Manik kukreja

    Course: MCA

    Semester1st

    (First)

    Dated -

  • 8/2/2019 Hotel Aditi (m)[1]

    3/57

    Acknowledgement

    I take this opportunity to express my sincere gratitude to Ms. Aparna Marwah,Assistant Professor, Bharati Vidyapeeth Deemed University, SDE, Academic

    Study Centre BVIMR, New Delhi for allowing me to carry out the projectunder her guidance.

    I further thank her, for giving me the necessary instructive and administrative

    support required for the completion of the project.

    I therefore pay my great regards to madam who enriched me with valuable

    guidance and all his technical support.

    Manik kukreja

  • 8/2/2019 Hotel Aditi (m)[1]

    4/57

    Preface

    Manik kukreja

  • 8/2/2019 Hotel Aditi (m)[1]

    5/57

    CHAPTER 1 INTRODUCTION

    1.1 Introduction about Project

    1.2 Present state of the art

    1.3 Need of Computerization of System1.4 Proposed Software (What would s/w accomplish)1.5 Importance of the Work

  • 8/2/2019 Hotel Aditi (m)[1]

    6/57

    1.1 INTRODUCTION ABOUT THE PROJECT

    Our project Implementation of Hotel management System using C includes registration of

    new customers, storing their details into the system, and also computerized billing of each

    and every customer. Our software has the facility to give a unique code for every customer

    and stores the details of every customer automatically. It includes a facility to know the

    current status of hotel -stay i.e., to know about all the customers staying in their hotel their

    respective bills. Administration can delete or modify any details with respect to the

    customers, hotel rooms using the privileges provided to them.

  • 8/2/2019 Hotel Aditi (m)[1]

    7/57

    1.2 PRESENT STATE OF THE ART (PROBLEM DESCRIPTION)

    The purpose of the project entitled as Implementation of HOTEL MANAGEMENT

    SYSTEM using C is to computerize / automate the front office operations of Hotel i.e.,

    customer details management, room booking and bill generation etc. to develop software

    which is user friendly, simple, fast, and cost effective. It deals with the collection of

    customers information, room details, bills, etc. Traditionally, it was done manually through

    conventional record keeping.

    The main function of the system is to register and store customer details and retrieve

    these details as and when required, and also to manipulate these details meaningfully to aid in

    the front office operations.

  • 8/2/2019 Hotel Aditi (m)[1]

    8/57

    1.3 NEED OF COMPUTERIZATION OF SYSTEM

    ConvenienceConvenience includes the overall ease of finding information through various

    searches thus minimizing time spent on searching in documents for any information.

    It also enables administrator to get details of the customers by simply searching for a

    given criteria. The application is required to have some amendment just in master

    code and entire application could be changed.

    TimesavingIt is much easier to just run a search and get a result than to search all the documents

    and it also saves a lot of time corresponding to time involved in searching

    information one customers detail at a time. But all the records could be arranged in

    such manner that on a finger tips any record searching, updating, deleting and other

    features could be maintained by the application user.

    Secure Storage

    Data security is maintained to relatively high level by implementing it at Databaselevel, so as to ensure that only authorized application users have access to mobile

    customers confidential information. But the whole information is being stored by

    using the file operation concept. The entire record is being stored in a file called

    customer_rec. So the whole information could be only accessed by the file holder.

  • 8/2/2019 Hotel Aditi (m)[1]

    9/57

    1.4 PROPOSED SOFTWARE

    GOAL AND OBJECTIVES

    The hotel has decided to make a computerized system for supporting various tasks done by

    the staff members. The proposed system will perform many other functions along with the

    functions performed by the current manual system. The system will help the hotel staff a lot

    as well as supporting the management in various ways. The objective of the proposed system

    is to computerized all the activities of the HOTEL MANAGEMENT SYSTEM:

    This project provides complete Analysis of customer and their activities in thehotel and also keeps the record of all the clients of the hotel.

    It gives the details of particular customer and their respective bills. Provides complete reporting of your customers. Provides very much user friendly input forms on which most of the work is done

    at the click of the mouse, enter and tab key.

    Generate various reports to support the management in taking fast and betterdecisions.

    Minimizes the paper work, which is very time consuming. Make Each And Every Transaction Computerized.

    The software is proposed to provide the following advantages:

    The software is a highly efficient GUI based component and developed in C (a 4GL). This component can be easily plugged in many other systems. Also the component is user friendly. Generally the Hotel monitoring system has to

    face a lot of problems in management of the customers details, bills details. This all

    information has to be managed manually. So, there is a need to develop a system that

    can solve the mentioned problem.

  • 8/2/2019 Hotel Aditi (m)[1]

    10/57

    This software comes with an appropriate solution as per the situation faced by thehotel staff.

    It also saves the amount of storage required to keep the customer and bill records. It also provides security as data security is maintained to relatively high level by

    implementing it at database level, so as to ensure that only authorized users have

    access to confidential client information.

  • 8/2/2019 Hotel Aditi (m)[1]

    11/57

    CHAPTER 2 SYSTEM ANALYSIS

    2.1 Feasibility Study of s/w includes its types

    2.2 Analysis Methodology (Types)

    2.3 Choice of Platforms s/w & l/w2.3.1 Software used2.3.2 Hardware used

  • 8/2/2019 Hotel Aditi (m)[1]

    12/57

    2.1 FEASIBILITY STUDY

    Depending on the results of the initial investigation, the survey is expanded to a

    more detailed feasibility study. Feasibility study is a test of system proposal according

    to its workability, impact on the organization, ability to meet user needs, and

    effective use of resources. The objective of the feasibility study is not to solve the

    problem but to acquire a sense of its scope . During the study, the problem definition

    is crystallized and aspects of the problem to be included in the system are

    determined. Consequently, costs and benefits are described with greater accuracy at

    this stage. It consists of the following:

    1.Statement of the problem: A carefully worded statement of the problem that

    led to analysis.

    2.Summary of finding and recommendations: A list of the major findings and

    recommendations of the study. It is ideal for the user who requires quick access to

    the results of the analysis of the system under study. Conclusion are stated ,

    followed by a list of the recommendation and a justification for them .

    3. Details of findings : An outline of the methods and procedures under-taken by the

    existing system, followed by coverage of the objectives and procedures of the

    candidate system. Included are also discussions of output reports, file structures, and

    costs and benefits of the candidate system.

    4. Recommendations and conclusions: Specific recommendations regarding the

    candidate system, including personnel assignments, costs, project schedules, and target

    dates.

  • 8/2/2019 Hotel Aditi (m)[1]

    13/57

    Thus, Feasibility Study has to be done to check whether the project is worth doing i.e., it is

    practicable or not. Since the project under consideration is for a specific purpose (hotel

    management). Therefore, depending upon the user (hotel staff) needs, it will be necessary to

    conduct the feasibility study in detail. This study results in feasibility analysis report that will

    be used for deciding whether to proceed, postpone or cancel the project. Care should be taken

    to accurately judge the user requirements since feasibility study may lead to commitment of

    large resources Mainly, three issues/ aspects are to be addressed during this study.

    OPERATIONAL FEASIBILITYThere is sufficient support for the proposed project from the management and users as it will

    enhance their productivity and also reduce the amount of time required to view and access

    any set of data. The new proposal system goes as per the business methods acceptable to the

    users, thus there will be very less order of resistance from the users of the system.Although

    the current technical staff is comfortable with the manual working regarding to the database

    maintenance, management will find working with it very easy, simple and much cheaper at

    cost. Once implemented, the staff will also find it very comfortable to work with it, and will

    get addicted to working with such convenient and user friendly software.

    TECHNICAL FEASIBILITYA numbers of technical issues were raised and examined during the stage of

    investigation. These are: -

    Does the necessary technology (Hardware, Software, Skill etc.) exist in thepremises (i.e., hotel)?

    Does the proposed system can have the technical capacity to hold the enormousvolume of data processed?

  • 8/2/2019 Hotel Aditi (m)[1]

    14/57

    Can the proposed system be upgraded in future as per increase in demand forfurther enhancement of the system?

    Whats the technical guarantee of accuracy, reliability, ease of access and aboveall data security, once the system is installed?

    ECONOMIC FEASIBILITYUnder the study of the Economic Feasibility, we found that the proposed software is

    economical from the study done so far. In this respect, Cost Benefit Analysis has been do

    so far.

    TIME FEASIBILITYGiven our technical expertise, the proposed system will be well implemented into the Hotel

    Management System with a period of 4 to 5 months. All the technical staff members and

    management will be able to access the system within this stipulated period after the

    successful implementation.

  • 8/2/2019 Hotel Aditi (m)[1]

    15/57

    2.3 CHOICE OF PLATFORM :

    Programming Language C

    C Language is the fourth-generation programming language and integrated development

    environment (IDE) is considered a relatively easy to learn and use programming language,

    because of its easy and compatibility of development features

    C language was derived from procedural system and enables the rapid application

    development (RAD) of applications, access to databases using file opening and randonand

    serial access of file system that, Data of controls and objects could be accessed.

    Because C is known as parent of most of 4GL and their after its further development is

    taken as class, object, method based system in C++ , so once this application has

    implemented, it must be used for further optimization.

  • 8/2/2019 Hotel Aditi (m)[1]

    16/57

    2.3.1 SOFTWARE USED

    Operating System

    A standard Windows PC running WINDOW XP C Language and Compiler as Turbo C

  • 8/2/2019 Hotel Aditi (m)[1]

    17/57

    2.3.2 HARDWARE USED

    Processor : Window 7

    RAM : 2 GB

    HDD : 250 GB

  • 8/2/2019 Hotel Aditi (m)[1]

    18/57

    CHAPTER 3 SYSTEM DESIGN

    3.1 Design methodology

    3.2 Database Design

    3.3 Screen Design

    3.4 Report Design (Include DFD/ERD/OOAD/Screen Shots/ Reports & Data Base Design)

  • 8/2/2019 Hotel Aditi (m)[1]

    19/57

    3.1 Design methodology

    The Hotel Management System will provide the following types of easy-to-use, interactive,

    and telephonic interfaces.

    The HMS will provide an easy-to-use,Command User Interface (CUI) as part of the

    Clerk/Administrators working desktop environment.

    The above Hotel Management System interfaces shall help provide the following

    functionalities to the users - access to the Hotel Management System to check the schedule,

    availability of seats, ticket price and to block, reserve, cancel, and reschedule tickets.

    This interface shall provide access, only to the following functionalities, namely,schedule

    and check status including any change in the flight timings. The functionality available

    through this telephonic interface is limited because of security constraints.The closed

    boundary above clearly delineates the system and the environment. The project shows the

    interactions between the HMS software and the databases inside the system. There are two

    databases internal to the system and which the system maintains. DB-user is the database

    containing all the personal information of the registered users of the Hotel Mangement

    System . This can be updated by the user by logging in to the system. DB-schedule is a copy

    of the database. The latter exists independently and is updated by a rooms scheduler system

    which is out of scope of the Hotel Mangement System. DB-schedule is updated with the

    latest status of the database whenever there is any change in the latter.DB-schedule gets

    updated with this change through a process with which we are not concerned. It is external to

    the system and is out of the scope of this SRS. DB-schedule also contains the base prices of

    for various rooms numbers. DB-reservations are a database containing information regarding

    the number of seats available on each class on different rooms. It has provision for marking

    how many of the reserved seats have been blocked but not yet bought.There are three

    interfaces, one for the administrator, one for the customer via web and another for the

    customer via phone. The administrator can update DB-schedule with any changes in the base

    prices of rooms tickets. The system uses a pricing algorithm and dynamically determines the

    actual price from this base price depending on the date of reservation vis--vis date of

    departure

  • 8/2/2019 Hotel Aditi (m)[1]

    20/57

    Waterfall development

    The Waterfall model is a sequential development approach, in which development is seen as

    flowing steadily downwards (like a waterfall) through the phases of requirements analysis,

    design, implementation, testing (validation), integration, and maintenance.

    The basic principles are:

    Project is divided into sequential phases, with some overlap and splashback acceptable

    between phases.

    Emphasis is on planning, time schedules, target dates, budgets and implementation ofan entire system at one time.

    Tight control is maintained over the life of the project via extensive writtendocumentation, formal reviews, and approval/signoff by the user and information

    technology management occurring at the end of most phases before beginning the next

    phase.

    The Waterfall model is a traditional engineering approach applied to software engineering. In

    the traditional waterfall model of system development, each phase must be completed

    before a subsequent phase can commence. Although development of software is not generally

    as straightforward as this diagram makes it look, we still need to understand each phase

    individually before we can understand how they fit together for a software design project.

    http://en.wikipedia.org/wiki/Waterfall_modelhttp://en.wikipedia.org/wiki/Waterfall_model
  • 8/2/2019 Hotel Aditi (m)[1]

    21/57

    Since I have implemented the hotel management system using C Language which is a

    procedural language. Therefore, the choice of software development methodology is

    Waterfall Model.

  • 8/2/2019 Hotel Aditi (m)[1]

    22/57

    3.3 SYSTEM DESIGN

    Software design is both a process and a model. The design process is a sequence of steps that

    enable the designer to describe all aspects of the software to be built. Designing software is

    not an easy task; it requires creative skill, past experience, a general sense of what makes a

    good software and undying

    Commitment to quality.

    The design model begins by representing the totality of the thing to be built and slowly each

    detail is constructed. Following points should be kept in mind before designing software:

    The design process should not suffer from tunnel vision. Alternate approachesshould also be considered, judging each based on the requirements of the

    problem.

    The design should be traceable to the analysis model. Time is short and resources are limited. Design time should be utilized in

    representing new ideas and integrating those patterns that already exist.

    The structure of the software design should imitate the structure of the problemdomain.

    The design should exhibit uniformity and integration. The design should be structures to accommodate changes. Design is not coding and coding is not design. The design should be assessed for quality, as it is being created, not after the

    fact.

    The design should be reviewed to minimize semantic errors

  • 8/2/2019 Hotel Aditi (m)[1]

    23/57

    Modularity (both in program and data) and the concept of abstraction enable the designer to

    simplify and reuse software components. Refinement provides a mechanism for representing

    for representing successive layers of functional details. Procedure provides the detail

    necessary for algorithm implementation. Information hiding and functional independence

    provide heuristics for achieving effective modularity.

    Database models are broadly classified into two categories. They are:

    Object-based logical models - can be defined as a collection of ideal tools fordescribing data, data relationships, and data constraints.

    Record-based logical modelsdescribes the data structures and accesstechniques of a DBMS. There are four types of record-based logical models.

    They are the file management system, the hierarchical database system, the

    network database system and the relational database system.

  • 8/2/2019 Hotel Aditi (m)[1]

    24/57

    3.4SCREEN DESIGN

    SCREEN DESIGN REFERS TO THE SELECTION AND PLACEMENT OF OBJECTS on a screen.The two elements of screen design that viewers are most attuned to be organization and visual

    interest. Organization involves deciding how many objects to use, what types of objects to use (text,

    images, windows, buttons, video, etc.), and where to place the various objects. Objects should be

    placed in logical positions on the screen, for example, the NEXT button should always appear to the

    right of the BACK button. Generally we assume that larger items are more significant, items "above"

    have primacy over items "below", and "more to come" signals will appear at the bottom

    centre or right.

  • 8/2/2019 Hotel Aditi (m)[1]

    25/57

    3.4DATA FLOW DIAGRAM

    A data-flow diagram (DFD) is a graphical representation of the "flow" of data through an

    information system. DFDs can also be used for the visualization of data processing

    (structured design).

    On a DFD, data items flow from an external data source or an internal data store to an

    internal data store or an external data sink, via an internal process.

    A DFD provides no information about the timing or ordering of processes, or about whether

    processes will operate in sequence or in parallel. It is therefore quite different from a

    flowchart, which shows the flow of control through an algorithm, allowing a reader to

    determine what operations will be performed, in what order, and under what circumstances,

    but not what kinds of data will be input to and output from the system, nor where the data

    will come from and go to, nor where the data will be stored (all of which are shown on a

    DFD).

  • 8/2/2019 Hotel Aditi (m)[1]

    26/57

    FIRST LEVEL DATA FLOW DIAGRAM

    Registration

    Daily Register

    Search customer

    Updation Details

    HotelDatabaseMonitoringSystem

    Customer Details

    Modifying

    Billing details

    Deletion Details

  • 8/2/2019 Hotel Aditi (m)[1]

    27/57

    SCREEN SHOTS

    MAIN SCREEN

  • 8/2/2019 Hotel Aditi (m)[1]

    28/57

    We Enter The Choice As 1

    Registration Of A New Customer In The Hotel

  • 8/2/2019 Hotel Aditi (m)[1]

    29/57

    We Enter The Choici As 2

    View Of Daily Entry Register Of The Hotel

  • 8/2/2019 Hotel Aditi (m)[1]

    30/57

    We Enter The Choice As 3

    Deletion Of Existing Record

  • 8/2/2019 Hotel Aditi (m)[1]

    31/57

    We Enter The Choice As 4

    Searching Of A Record

  • 8/2/2019 Hotel Aditi (m)[1]

    32/57

  • 8/2/2019 Hotel Aditi (m)[1]

    33/57

    We Enter The Choice As 5

    Modifying A Customers Record

  • 8/2/2019 Hotel Aditi (m)[1]

    34/57

  • 8/2/2019 Hotel Aditi (m)[1]

    35/57

    We Enter Tha Choice As 6

    Resturant Billing Of The Customer

  • 8/2/2019 Hotel Aditi (m)[1]

    36/57

  • 8/2/2019 Hotel Aditi (m)[1]

    37/57

  • 8/2/2019 Hotel Aditi (m)[1]

    38/57

    We Enter The Choice As 7

    Total Bill Of A Customer

  • 8/2/2019 Hotel Aditi (m)[1]

    39/57

  • 8/2/2019 Hotel Aditi (m)[1]

    40/57

    CHAPTER 4 TESTING AND IMPLEMENTATION

    4.1 Testing Methodology (Types)

    4.2 Unit Testing4.3 Module Testing

    4.4 System Testing

    4.5 Alpha/ Beta Testing

    4.6 White Box Black Box Testing

    4.7 Implementation4.8 Post Implementation

  • 8/2/2019 Hotel Aditi (m)[1]

    41/57

    4.1TESTING AND IMPLEMENTATION

    VALIDATION AND VERIFICATION

    Validation and verification is a important aspect of software engineering. Verification

    refers to the set of activity that ensures that software correctly implemented a specific

    function. Validation refers to a different set of activity that ensures that the software that hasbeen built is traceable to customer requirement.

    Verification Are we building the project right?

    Validation Are we building the right product?

    The definition of validation and verification encompasses many of the activity that we

    have referred to as software quality assurance (SQA) .

    Verification and validation encompasses a wide array of SQA activity that include

    formal technical review, quality and configuration audit, performance monitoring, simulation,

    feasibility study, documentation review, algorithm analysis, development testing,

    qualification testing and installation testing.

  • 8/2/2019 Hotel Aditi (m)[1]

    42/57

    TESTING OBJECTIVES:

    Testing is a process of executing a program with the intent of finding an error. A goal test case is one that has a probability of finding an as-yet undiscovered error. A successful test is one that uncovers an asyet undiscovered error.

    A systematic and wholly procedural plan for testing was adopted. The procedure while

    implementing testing went in hand with preparing a Unit Test plan.

    Test the modules thoroughlycover all the access paths. Generate enough data to coverall the access paths arising from conditions.

    Test the modules by passing wrong type and number of data items. To test the different access pathslook at the conditional statements (IFs & LOOPs etc).

    Enter some data in the test file which would satisfy the condition and again test the

    script. Repeat this process many times.

    After each test -- analyze the log file to ensure proper, understandable and usefulmessages are present in the log file.

    Test for locking by invoking multiple concurrent processes.

  • 8/2/2019 Hotel Aditi (m)[1]

    43/57

    TESTING PRINCIPLE:

    All tests should be traceable to customer requirements. Test should be planned long before testing begins. The testing should begin in the small and progress towards testing in the large. Exhaustive testing is not possible. To be most effective, testing should be conducted by an independent third party.

  • 8/2/2019 Hotel Aditi (m)[1]

    44/57

    CHARACTERISTICS OF A GOOD TEST:

    A good test has a high probability of finding an error. A good test is not redundant. A good test should be best of breed. A good test should be neither too simple nor too complex.

  • 8/2/2019 Hotel Aditi (m)[1]

    45/57

    TYPES OF TESTING:

    4.2UNIT TESTING:

    This test involves into the testing of individual module/program, And all programs are

    successfully running and giving output according to it requirements.

    4.4SYSTEM TESTING:

    After success of unit test the complete system is tested. At this stage end user and operators

    becomes actively involved in testing. While testing operators also tested discrepancies

    between the system and its original objective, current specification and system

    documentation.

    PERFORMANCE TESTING:

    This test referred to the response time of the system being installed. This testing has been

    conducted before the implementation to determine how long it takes to receive a response to

    an inquiry.

    RECOVERY TESTING:

    Under this testing Modules / Procedures are written and that are able to store data so that user

    can recover their data even after crashing of system.

    PROCEDURE TESTING:

    This test contains complete instruction to handle to software by the user. i.e. Steps to be taken

    to load the program into the memory, and whatever data they require to perform those tasks.

  • 8/2/2019 Hotel Aditi (m)[1]

    46/57

    4.5ALPHA TESTING

    Alpha testing is simulated or actual operational testing by potential users/customers or an

    independent test team at the developers' site. Alpha testing is often employed for off-the-shelf

    software as a form of internal acceptance testing, before the software goes to beta testing.

    BETA TESTING:

    Beta testing comes after alpha testing. Versions of the software, known as beta versions, are

    released to a limited audience outside of the programming team. The software is released to

    groups of people so that further testing can ensure the product has few faults or bugs.

    Sometimes, beta versions are made available to the open public to increase the feedback field

    to a maximal number of future users.

    4.6 WHITE BOX TESTING:

    White box testing is performed early in the testing process. White box testing is also called

    glass-box testing. Using white box testing, the s/w engineer can derive test cases that-----

    Guarantee that all independent paths within a module have been exercised at least once. Exercise all logical decisions on their true and false sides. Execute all loops at their boundaries and within their operational bounds. Exercise internal data structure to assure their validity.

  • 8/2/2019 Hotel Aditi (m)[1]

    47/57

    BLACK BOX TESTING:

    Black box testing is to be applied during later stages of testing. Black box testing focuses on

    the functional requirement of the s/w. The black box testing enables the s/w engineer to

    derive sets of input conditions that will fully exercise all functional requirements for a

    program. Black box testing attempts to find an error in the following categories.

    Incorrect or missing functions Interface errors Errors in data structures or external database access Performance errors Initialization and termination errors.

    By applying black box testing a set of test cases that satisfy the following criteria

    Test cases that reduce, by a count that is greater than one, the no. of additional testcase must be designed to achieve reasonable testing.

    Test cases that tell us something about the presence or absence of classes of errors,rather associated only with the specific test at hand.

  • 8/2/2019 Hotel Aditi (m)[1]

    48/57

    4.7IMPLEMENTATION

    A crucial phase in the software design is its implementation. It simply means converting a

    new system design into operation. The objective of conversion is to put the tested system into

    operation while holding costs, risks and personnel irritation to a minimum. It involves :

    Creating computer compatible files. Training the operating staff. Installing terminals and hardware.

    A critical aspect of the implementation is not disrupting the functioning of the

    organization. It should be exciting because it is the last step before the candidate system

    begins to show results. It should be carefully planned otherwise it can turn out to be chaotic

    and traumatic as the system breaks down, data files are damaged and tempers grow short.

  • 8/2/2019 Hotel Aditi (m)[1]

    49/57

    EVALUATION:

    Operational systems are quickly taken for granted. Every system requires periodic evaluation

    after implementation. A post-implementation review measures the system performance

    against predefined requirements. Unlike system testing, which determines where the system

    fails, an evaluation review determines how well the system continues to meet performance

    specifications. It is after the fact - after design and implementation are complete. It also

    provides information to determine whether major redesign is necessary.

    The evaluation team prepares a formal evaluation plan around the objective(s) of the review,

    the type of evaluation to be carried out, and the time schedule required. An overall plan

    covers the following areas:

    1. Administrative PlanEvaluates area objectives, operating costs, actual operatingperformance and benefits.

    2. Personnel Requirement PlanEvaluates performance objectives and trainingperformance to date.

    3. Hardware PlanEvaluates performance specification.4. Documentation Evaluation PlanReviews the system development effort.

  • 8/2/2019 Hotel Aditi (m)[1]

    50/57

    MAINTENANCE:

    Maintenance is the enigma of system development. It holds the software industry captive,

    tying up programming resources. Maintenance can be classified as corrective, adaptive or

    perceptive.

    Corrective Maintenancemeans repairing processing or performance failures or making

    changes because of previously uncorrected problems or false assumptions.

    Adaptive Maintenance means changing the program function.

    Perceptive Maintenancemeans enhancing the performance or modifying the program(s) to

    respond to the users additional or changing needs.

    Of these more time and money is spent on perceptive than on corrective and adaptive

    maintenance together.

    Maintenance is expensive. One way to reduce maintenance costs is through

    maintenance management and software modification audits. Software modification consist of

    program rewrites system level updates, and reaudits of low ranking programs to verify andcorrect the soft spots. The outcome should be more reliable software, a reduced maintenance

    backlog, higher satisfaction and morale among the maintenance staff.

  • 8/2/2019 Hotel Aditi (m)[1]

    51/57

    CHAPTER 5 CONCLUSION AND REFERENCES

    5.1 Conclusion

    5.2 Limitation of System

    5.3 Future Scope for Modification5.4.1 H/W Requirement

    5.4.2 S/W Requirement

    5.5 References/ Bibliography

  • 8/2/2019 Hotel Aditi (m)[1]

    52/57

    5.1CONCLUSION AND REFERENCE

    LIMITATIONS AND CONSTRAINTS

    Following could be the few possible barriers of Hotel Database Monitoring System:

    Apprehension that the technology could be too expensive The staff will have to undergo extensive training. Lack of support from the management, may be owing to budget constraintsA close examination each of the points is presented now.

    If we analyze the various jobs one can conclude that human interference is necessary at each

    and every step. The manpower is thus saved. Therefore, there will be no adverse impact on

    employment. There is an apprehension that the technology, both hardware and software

    would be expensive and unaffordable. The cost of hardware and software depends on the

    level of automation.

    The in-house training for handling the software is usually provided by the developers.

    The training of staff also depends on the level of automation. If one decides to go only for

    cataloguing a minimum training of one or two weeks duration will enable the department or

    new operators to develop a database and maintain it. With this basic training one can easily

    transfer the same data on a server/main machine in a network environment. The job becomes

    easy as most of the institutions have systems department with computer professionals

    maintaining the network.

  • 8/2/2019 Hotel Aditi (m)[1]

    53/57

    Lack of support from the management, may be owing to budget constraints, will be

    one of the barriers. Here the role of operators becomes crucial in convincing the management.

    Also, the skill and initiative play a major role in convincing the management.

  • 8/2/2019 Hotel Aditi (m)[1]

    54/57

    5.1CONCLUSION:

    The HOTEL MANAGEMENT SYSTEM is a great improvement over the manual system

    using case fields and paper. The computerization of the system has sped up the process. In the

    current system, the front office managing is very slow. The hospital managing system was

    thoroughly checked and tested with dummy data and thus is found to be very reliable.

    ADVANTAGES:

    It is fast, efficient and reliable Avoids data redundancy and inconsistency Very user-friendly Easy accessibility of data Number of personnel required is considerably less Provides more security and integrity to data

  • 8/2/2019 Hotel Aditi (m)[1]

    55/57

    5.3FUTURE SCOPE OF MODIFICATION

    This all information has to be managed manually. So, there is a need to develop a system that

    can solve the mentioned problem. This software comes with just that solution.

    Also, it provides freedom from the paper work involved in manual operation and thus

    from the amount of storage required to keep them. It also provides security as data security is

    maintained to relatively high level by implementing it at Database level, so as to ensure that

    only authorized users have access to confidential client information.

  • 8/2/2019 Hotel Aditi (m)[1]

    56/57

    5.4.2SOFTWARE REQUIREMENT:

    Operating System

    A standard Windows PC running WINDOW XP/ VISTA

    Front endC language

    Back endFile system

  • 8/2/2019 Hotel Aditi (m)[1]

    57/57

    5.5BIBLIOGRAPHY:

    To present the Hotel ManagementSystemwith a large number of interesting and useful

    features, I had gone thoroughly a number of books. These books proved helpful in adding

    special facilities and gave detailed help regarding c and its special features.

    System Analysis and Design by V.K JainANSI C (Bal guru swami)Let us C by Yashwant KanetkarC in depth for various theoretical concepts to be applied wherever

    needed, in the whole system.

    Dennis Ritchie.