Main Report Online Tour Travels

Download as doc, pdf, or txt
Download as doc, pdf, or txt
You are on page 1of 49

Self Certificate

I hereby declared that the all project works entitled

LIC MANAGEMENT SYSTEM


Has been successfully completed by Us
in partial fulfillment for the BACHLOR OF COMMERCE &COMPUTER APPLICATION (BCOM(CA))

Awarded By

APSU ,REWA (M.P.)


During the academic session 2012-2013 under guidance of Mr. PARAS SEN This project has not been submitted for the award of any examination. Candidate Mr. Omprakash Pandey Mr.Niraj kumar mishra

CONTENTS
1. 2. Preface Package used : ..Visual Basic 6.0(VB) ..MS Access 2003 3. 4. 5. 6. 7. 8. 9. 10. Layout 11. How to use the system 12. Limitation 13. Conclusion Introduction Problem Study H/W & S/W requirements About The System Development Life Cycle Data Flow diagram of the project E-R Diagram of the project Structure of database

14. Bibliography

PREFACE

A database is a control repository information of i.e. database is physical grouping of a collection of individual but in a predictable and structured way it cuts redundancy data access.

RELATIONAL DATABASE A relational database is one in which data is around in the form of a matrix with the row of the matrix forming each individual record in the database and columns of the matrix formatting the individual fields of information across all records. Database Management System (D.B.M.S.) A database management system is an integrated software system that has facilities for defining the physical structure of the data in a database and for accessing entering and deleting data. The item data within the database are primary liked in unit usually refine data as records. The process of pacifying the values of some data item retrieves data and capsizing the system to retrieve he values of some or all of the data item of a records or records attaching the specification.

PACKAGE USED
Visual Studio 6.0(VB) :Microsofts 6.0 initiative is broad-based and very ambitious. It includes the VisualBasic Framework,which encompasses the language and execution plateform, plus extensive classs libraries providing rich built-in functionality. Besides the core VB Framework, the VB initiative includs protocols to provide anew level of software integration over the internet, via a standard known as web services Although Web services are important, the foundation of all VB-based system is the Framework. This chapter will look at the VB 6.0 Framework from the viewpoint of a Visual Basic developer. Unless you are quite familiar with the Framework already, you should consider this itroduction an essential first step in assimilating the information about Visual Basic 6.0 that will be presenting in the rest of this book. The first released product based on the VB Framework was Visual Basic, which was publicaly launched in February of 2002, and included version 1.0 of the VB Framework. The current version is Visual Basic 6.0, but almost all of the examples will work transparently with Visul Basic 6.0 because the different in the two versions are minor.

Why use Visual Basic 6.0:Visual Basic 6.0 was easily the most popular language for developing application with the DNA model. as noted above, it can be used in two major roles-forms-based VB clients and COM components. despite its popularity, VB6 suffered from a number of limitations in the COM/DNA environment. Some of the most serious limitations include: No capability for multithreading Lack of implementation inheritence and other object-oriented feachers Poor error handling ability Poor integration with other languages such as C++ No effictive user interface for Internet-based application VB6s limited object-Oriented feathers, in particular the lack of inheritence, made it unsuitable for developement of object-based frameworks, and denied design option to VB6 developers that were avilable to C++ or java developer.

About the Database window


The Database window in Microsoft Access 2000 provides a variety of options for viewing and manipulating database objects.

Use the Database window toolbar Quickly find commands for creating, opening, or managing database objects.

Use the Objects bar View database objects in the Objects bar its vertical orientation makes it easier to use.

Organize database objects into groups Click the Groups bar to view your groups, which can contain shortcuts to database objects of different types.

Use new object shortcuts In the Database window, quickly create a new database object by using a wizard, or open a new database object in design view.

Customize how you select and open objects in the Database window If you choose, change the default behavior so that you select a database object by resting the pointer over it, and open an object by single-clicking it.

Select an object by typing its name

For example, select the

Shippers table while viewing the list of table objects by typing .

What's new about working with data and database design?


Microsoft Access 2000 provides many new features that make working with data and designing a database even easier.

Use record-level locking

A Microsoft Access database now

supports record-level locking, in addition to page-level locking (which locks all records on a 4K page). You enable the locking level with the new database option, Open databases using record level locking (Tools menu, Options command, Advanced Tab). The actual level that is used depends on how the Access database is programmed.

Find and replace You can now move freely between the Find and Replace dialog boxes and the data in the view or window.

View related data in a sub datasheet Use a sub datasheet to view and edit related or joined data in a table, query, or form datasheet, or in a sub form all from the same view. For example, in the North wind sample database the Suppliers table has a one-to-many relationship with the Products table; so for each row of the Suppliers table in Datasheet view, you can view and edit the related rows of the Products table in a sub datasheet.

Automatically fix errors caused by renaming fields

Name

AutoCorrect automatically corrects common side effects that occur when you rename forms, reports, tables, queries, fields, text boxes or other controls.

Take advantage of Unicode support Use the characters of any language that Unicode supports in your data. Use Unicode compression to offset the effect of Unicode's increased storage space requirements. Take advantage of dual-font support specify a substitute font that you can use in addition to your default font to properly display all of the characters in your data.

Use Microsoft ActiveX Data Objects (ADO) database server through any OLE DB provider.

Use Microsoft

ActiveX Data Objects (ADO) to access and manipulate data in a

INTRODUCTION

Now a days in the field of competition we have required accurate and sufficient information at very fast. In manual system it is not possible and also very lengthy work. If we are using manual then we have to face inaccuracy, insufficiency and more invaluable time is being consumed. LIC MANAGEMENT SYSTEM is provide LIC WORKS services.

LIC MANAGEMENT SYSTEM is provides the information needed for Staff Appointment, Products Making,Manufacturing and decision support. LIC MANAGEMENT SYSTEM is a LIC Works & Services information system intended to making products,supplying products and other relational services to people etc. Computer have help automation of many industrial and business system. They are used extensively in manufacturing and processing. Industries, Power-distribution system, Banking system and other finance company. Computer aided design and computer aided memory are becoming very popular among large industrial and an establishment. The areas of computer application literally to numerous to mention. Computers have become an integral part of mans every daily life. There are many table, which is used for the storage of others data. This projects the facilities of adding, showing about clients information and his status.

Objective of Project
The objective of LIC MANAGEMENT SYSTEM journey with best journey with Online Reservation. is to provide the

In the existing system the entire cycle of activities done manually, requiring lots of paper work. Thus managing papers becomes difficult. It was hectic tasks a lot of time and manpower. So they decided to do reservation of their service. The application developed provides the following facilities to management: Computerize the information about registration, reservation, places, temples, wiches etc. Enhance the efficiency of day-to-day operation. Provide all the necessary & required security required by the system. features

A solution, which is requires least amount of maintenance from the user point of the view. Generate various outputs required of the system. The design accommodates any future requirements.

Problem Study

In existing system, Online Tour & Travels manages data related to various entities and activities manually. Problem in existing system: 1. Time consuming: As the system is not computerized and a lot of work are done manually it consumes a significant amount of time. It is required to prepare the result as early as possible ,which not possible in the existing system. 2.Accuracy: Accuracy is statistically necessarily for result preparation, which is not possible in the existing system. There may be changes of making mistakes while considering such a complex problem manually. 3.Detailed report: The existing system is unable to give the detailed report due to non-availability of information in database. 4.Paper work: As the existing system is manual, lots of paper work has to be done. 5.Sequrity: There is a lack of security and privacy checks in existing system. Any body can be access and modify the information in to registers. 6.Static: The existing system is not dynamic and cant changes at advanced stage . accept the

HARDWARE REQUIREMENT

Type of CPU MEMORY (RAM) Disk VDU KEYBOARD

PC-AT 256 MB (MINIMUM) HARD DISK 40 GB minimum MONO MONITOR ANY OF THE CURRENTLY BEING USED KEYBOARD

PRINTER

ANY PRINTER (L&T, WINPRO, PANASONIC)

SOFTWARE REQUIREMENT

This project has been developed with the help of fourth generation language on ASP

OPERATING SYSTEM:

Windows XP

SOFTWARE USED:

VISUAL BASIC 6.0

SYSTEM DEVELOPMENT LIFE CYCLE


System development life cycle include following phases:..Recognition of Needs .....Feasibility Study ..Analysis ..System Design ..Development ..System Testing ..Implementation ..Maintenance

RECOGNITION OF NEEDS
The terms System Analysis and System design are often encountered; System Investigation includes these as well as other activities. A system investigation is a project undertaken to improve a specific aspect of the information system; its essence is working with people to devise systems that help people work better. A systems investigation some times called Systems development project, relies on an extensive body of methodology and a well define set of tools and techniques in order to analyze, design, and implement an information system or a portion of an information system.

FEASIBILTY STUDY
A feasibility study is undertaken to determine the possibility of either improving the existing system or developing a totally new system. The feasibility study is a test of a system proposal according to its workability, impact of the organization of the preliminary investigation is the determination that the system required is feasible. Economic Feasibility: A system that can be developed technically and that will be used if installed must be a good investment for the organization. Economic analysis is the most frequently used method for evaluating the effectiveness of the system. More commonly known as cost/benefit analysis, the procedure is to determine the benefit and saving that are expected from the system and compare them with cost. As far as the economic feasibility is concerned, this project is economic feasible. Because neither it requires a costly hardware support nor it requires a costly software support. Technical Feasibility: This means that the work for the project should be done with current equipment existing software technology and available personnel. New system Vs todays environment and state of art purchase of equipment Vs capital budgets. Thus management as a tool to evaluate the practicability of developing a new system uses feasibility study.

ANALYSIS
The analysis procedures which have been used in our project are:(1) Requirement analysis (2) System analysis

(1)Requirement Analysis: Requirement analysis involves studying the current system to find out how it works and where improvement should be made. System studies results in an evolution of how current method is working and whether adjustment is necessary or possible. A requirement is feature that must be including in a system. It may be include a way of capturing or processing data, producing information control business activity, or supporting

(2)System Analysis: System analysis is the process of gathering and interpreting facts diagnosing problems and using the information to recommend improvement to the system. System analysis for business is the process of studying a business situation to see how it operates and whether improvement of needed tasks, carried out by system analyst. One of the main functions of the system analyst is to convert an existing manual system to computerized system. The system analyst does so by defining in board outline how the problem in the outside world is to be related to a computer system.

SYSTEM DESIGN
During this phase the system to be developed is designed. Design Goals:The system design lies at the heart of the system development cycle. System design specific exactly how the objective set during the system analysis phase laid the foundation of the development of the end product. Before developing the new system it is important to establish the design goals, these are the standards that the developers follow during the entire process of development so that the end product fulfills the requirements of the user. The developed software product must be able to fulfill the required functional and performance test performed in the testing stage such as exercise of code with minimal input values, execution time, response time etc. in all combinations. The system must fulfill the criteria specified in the functional requirements and performance requirements. Output of system should meet the required standards of reliability, efficiency and correctness. If the new system meets these specifications, then the application are fit to be distributed for installation else it must be probed again and redesigned in such a manner that it lends itself to any modification that might be needed in due course of use. The software must satisfy the de facto of good software, some of which are User Friendly The software should be user friendly so that user can easily understand the controls without any particular guidance by the developers of the application. The FAS system was designed keeping this requirement

in mind and the final User Interface was quite user friendly and all complexity will be hidden from the user. Integrity The results of the system were very crucial as they represented the data, which would affect quite a lot no of people and financial part needs accuracy. So special emphasis was given to the accuracy and consistency of the system. Modularity As the system was quite large so the system was designed in such a way so that the entire software was divided into several modules, which made the system more maintainable and easy to develop. PROCESS AND STAGE OF SYSTEM DESIGN The design phase focuses on the detail implementation of the System recommended in the feasibility study. Emphasis is on translating from a user-oriented document to a document oriented to the Programmers or database personal . LOGICAL & PHYSICAL DESIGN System design goes through two phases of development . Logical and physical design . A data flow diagram shows the logical flow of the system and defines the boundaries of the system for a candidate system , it describes input (source) .

FROM DESIGN The data people and in the the forms carry information of the that comes from the goes to the It can

informational carriers for

output of

system

people , the constitute

physical

the data of

information .

authority

action . operations .

It provides information for making

decision and

improving

REQUIRE OF FORM DESIGN 1. 2. 3. 4. 5. 6. 7. Identification and working . Physical factors . Order of data items . Ease of data items . Size of arrangement. Use of instruction. Efficiency consideration.

FILE ORGANISATION & DATABASE DESIGN

After designing the input and output , the designer begins to concentrate on file design or how data should be organized around the requirements . How data are organized depends on the data and response requirement that determine hardware and configurations . File organization may be

sequential, indexed , inverted list of random . An integrated approach to the file design is the database . The general theme is to handle the information as an integrated whole with minimum redundancy and improve performance .

INPUT/OUTPUT & FORM DESIGN INPUT DESIGN

Inaccurate input data are the most common cause of error in data processing . Error entered by the data entry operation can be control by the input design .Input design is the processing of converting user-oriented inputs to computer base format .
OUTPUT DESIGN

Computer outputs are most important and direct sources of information to user . Efficient , intelligible output design improves the system relation with the user help in decision-making. A major from output is a hard copy from the printer. Printout should be design around the output requirement of the user .

The design covers the following :1. Reviews the current , volumes , frequencies . physical system-its data flows, file content

2. Prepare out specification-That is determine the format, content and frequency of report including terminal specification and location . 3. Prepare input specification-Format , content and most of the input function . This includes determining the flow of document from the input stores to the actual input locations.

4. Preparing edit and security & control specification-This specifying the rules for edit , correction , back procedure and the controls that ensure processing and file integrity . 5. Specifies the implementation plan . implementation flow ,

6. Prepare a logical design , walkthrough of out input controls and implementation plan . 7. Reviews benefits , cost , target dates and

system constraints.

SECURITY OF THE SYSTEM


PHYSICAL SECURITY : The breakdown in electronic computers can be in circuits or chips ,capacitors , transistors etc . Failures in these components occur due to power supply problems aging. Performance of a computer system is influenced by excessive temperature , high humidity , dust build-up , noise Interference & magnetic fields . Therefore we recommend the management to follow some tips as : 1.There should be appropriate electrical environment. 2. There should be controlled temperature. 3. Have a power line conditioner feeding the computer system . OPERATING SYSTEM LEVEL SECURITY: Windows 98 is the current operating system on the user side .Oracle as a backend also

ensures operating system security so that when some more recent version of windows or on increase of transaction if the user shifts to even Unix also the backend need not to be changed . DATABASE SECURITY: Client has been given the facility of backup and restoring of database so that at the end of each day after taking the various day to day reports a backup is taken and during any loss of data can be restored by the client itself .

APPLICATION SECURITY: The current GUI (Graphical User Interface) application developed is Visual Basic 6 enables the user to work as friendly as in windows environment. Application security is taken care by installing all the respective dynamic link libraries into windows system folder ,which is again hidden from end user .These all are taken care internally by visual studio tool of package and development tool. The security measures that are being given to the Client are listed below: 1.Valid User (Unauthorized access): The person who knows in and out of the system will only be authorized to make data entry. 2.Proper atmosphere: An environment completely isolated from other departments is given .A separate IT infrastructure is developed on the client side. TRANSACTION SECURITY:

Unless the user is a valid user or the data is valid no transaction will be updated in the database. Also all the RDBMS rules have been followed while updating a transaction.

SOFTWARE ENGINEERING PARADIGM


For creating our project we use Linear sequential paradigm also called Waterfall model or Classic life cycle model. This model suggests a systematic sequential approach to software development that begins at the system level and progress through analysis, design, coding, testing and support. For developing our project we use all these approaches sequentially. System/Information Engineering: System engineering and analysis contains requirement gathering at the system level such as h/w configuration and the h/w requirement for the s/w development. In this stage we establish requirements for the s/w. Software Requirement Analysis: In this process we understand the nature of the programs to be built, the required functions, behavior, performances interfaces. Design: After requirement analysis we focus on the four distinct attributes such as data structure, s/w architecture, Interface representation, and procedural detail.

Code Generation: When we complete our design we translate design into a machine-readable form. Testing: Finally, when we complete our coding then we start testing. Using several techniques and check with all desired Input for project.

TESTING & DEBUGGING


Testing is the process of finding errors from a program, rather then extracting them. Most error are the result of incorrect control functions in programs rather then incorrect computation or data manipulation . Errors due to incorrect data manipulation are usually easiest to delete and correct. The formers often go undetected and remain in programs after they have been approved to run in production environment. Control functions are those which regulate the sequence in which tasks are performed, the number of times a loop is executed, etc. Program testing is a continuous procedure. Testing can be done in following steps ; ERROR FAULT & RELIABILITY: Once the algorithm has been expressed in pseudo-code, it is subjected to desk check . This is a process which should be applied to each procedure within a program and involves selecting sample value of test data for input to the procedure and processing them precisely as directed by the program coding to determine whether or not they will produce a correct result .

We have checked this S/W using both simulate and live data . Each algorithm now produces exactly the O/P , what we want ? FUNCTIONAL TESTING : After checking the algorithms validity or correctness, the next stage of testing occurs when the coding has been freed from syntax errors . Functional testing is referred to check the functions of procedures procedure-by-procedure . We check each procedure/module for its functionality and reliability . Many logical error were found in different modules, then they are corrected for their proper function . Some programs may require to perform calculations on the basic of data or input given by the user . This calculation has been tested to give accurate results to the user . STRUCTURAL TESTING : Structural testing means testing of programs in structure. This testing refers to the testing of cohesion and coupling of different program modules. It also checks whether a program modules produces correct output when it receives data from another module. For best result degree of cohesion must be high and degree of coupling must below. In this S/W there are a number of programs with voluminous modules. We check each programs with different set of test data and corrected mistakes as desired .

IMPLEMENTATION
Introduction is the process of the having systems personnel check out the and put new equipment into use, trained users, installed the new application and construct any files of data needed to use it. This phase is less creative than system design. Depending on the size of the organization that will be involved in using the application and risk involved in its use, system developers may chose to test the operation in only one area of the firm with only one or two person. There are three types of implementation: Implementation of a computer system to replace a manual system. Implementation of a new computer system to replace an existing one. Implementation of a modified application to replace an existing one, using the same computer.

In my perspective implementation is the process of converting a new system design into an operational one. Conversion is one aspect of implementation, the other aspects are post implementation review and software maintenance.

DOCUMENTATION
Documentation is a process that will be used for developing and maintaining documentation for installing and maintaining products developed in the system life cycle. Documentation typically includes training material, user document, user manual, and operations manual and relies document. The documentation will be reviewed and approved by concerned user of the documentation. The purpose of documentation process is to develop and maintain the documentation that will be used to install and operate the product. This process also ensures that the documentation developed is synchronized with latest product releases. Our product document typically consist of the following: Deliverables (file name, size etc): It includes the codes. Test summary report.

MAINTENANCE
The maintenance of existing software can account over 30 percent of all effort expended by a development organization, and the percentage continues to rise of more software is produced. Uninitiated readers may ask why so much maintenance is required and why so much effort is expended. Much of the software we depend on today is on average 10 to 15 years old. Even when these programs ware created using the best design and coding techniques known at the time and most were not, they were created when program size and storage space were principle concerns. They were then migrated to new platforms, adjusted for changes in machine and operating system technology and enhanced to meet new user needs all without enough regard to overall architecture. The ubiquitous nature of change underlines all software work. Change is inevitable when computer-based system are built.

Software maintenance is, of course, for more then fixing mistakes. We may defined maintenance by describing four activities that are undertaken after a program is released for use. There are four different maintenance activities: collective maintenance, adoptive maintenance, perfectly maintenance or enhancement maintenance, and preventive maintenance or reengineering. Only about 20 percent of all maintenance work is spent fixed mistake. The remaining 80 percent is spent adapting existing systems to changes in their external environment, making enhance required by users, and reengineering an application for future use.

Data Flow Diagrams

1. 0-Level DFD for LIC.

Input

System

Output

LIC MANAGEMENT SYSTEM ARCHITECTURE


Two Tire Architecture of this Application:

Response User Interface Database (Back-End ) Request

Here is the given figure, one can see the two-tire architecture of the application. The two-tires are namely. User Interface Back-End Through the user interface, user can interact with the application, using different forms . The Back-End, only response to the request given by the business logic.

GANTT CHART
When creating a software project schedule planner being with a set of tasks. If automated tools are used, the work break down is input as a task network. Effort, duration, and start date are then input for each task. In addition, task may be assigned to specific individuals. As a sequence of this input, timeline chart also called a gantt chart, is generated. Basic planning use bar chart sows project activation and amount of time they will take. The gantt chart uses horizontal bars to show duration of action and takes.

Activity
1. 2. 3. 4. 5.

Task
Design synopsis. Design Database. Design Front-End Link Program With Form Test Program And Form Prepare Documentation

HOW TO USE THE SYSTEM


1. About us: This module provides facility to more information about online travels. THE BEGINNING

LIC . was established in 2006 by the Chairman & Managing Director- Abhinav & Dharamnath . It was them vision to provide the Indian traveler with SUPERIOR quality package tour facilities. He ensured that the services of LIC would be totally customer focused and would maintain their exclusivity. The objective was to make family holidays tours more comfortable, more exciting, and most memorable. His passion was to CHANGE the entire scenario that existed in the Indian Market. An array of NEW Services were introduced by LIC that were welcomed by customers with open arms. Within a short span of time LIC revolutionized the entire travel industry. The CHANGE had taken place and LIC began its journey to become the Number 1 Outbound Tour Operator in the country. LIC was the first Outbound Tour Company to introduce Indian Meals on its Globe Tour Packages. LIC was the first tour operator to start package tours to India & Nepal. Way back in 2006 when LIC Launched Caravan Kitchens and started serving "Indian Cuisine- Hot Meals" in Delhi, the customer response was so dynamic that it changed the face of "Indian Tours" forever. The biggest players in the industry were compelled to follow suit and it was do or die situation for many. LIC has been renowned for PIONEERING some of the most admired "Customer Services" in tourism. Today, we proudly continue to enjoy the Number 1 position in the outbound tours industry with 54 operational offices Spread over India . The list in endless, but we would like to mention a few of the laurels that we have received in 2006. They include the Best Performing Agency by reputed Tour Operators such as Raj

Travels and Ashoka Travels. City Link Travels, the Asians largest Operators Association has declared LIC as the number I reservations agent in India. World wide has also rated LIC as India's premier outbound tour operator Welcome to the world of LIC 2. Registration: This module provide facilities to registration of user. 1)New user:In this module administrator has permission to registration new user to do journey. 2)Old user:In this module administrator has permission to registration new user To do journey. 3. Tickets: Confirmation: To confirm your ticket enter your registration number and click go button. Cancellation: To cancellation your ticket enter your registration number and click go button . 4. Packages: We offer special packages which helps passengers to decide their tours.

Wild life packages: As we neared the end of the park, I noticed a jeep by the side of the road and around ten to twelve people near it. Bream thought they were having car trouble and they signaled us when we reached them. It was then that I realized that they were park rangers and watchers and they were wielding guns and sticks. They inquired as to what we were up to and after listening to our story warned us, albeit humorously, that they were notified of a vehicle that had jumped a check post and were hoping we were poachers. It was probably disappointing for them to find two harmless idiots who were chased away by elephants. We reached the hotel without any further incident and had a thrilling story to tell our friends the next day. As we neared the end of the park, I noticed a jeep by the side of the road and around ten to twelve people near it. Bream thought they were having car trouble and they signaled us when we reached them. It was then that I realized that they were park rangers and watchers and they were wielding guns and sticks. They inquired as to what we were up to and after listening to our story warned us, albeit humorously, that they were notified of a vehicle that had jumped a check post and were hoping we were poachers. It was probably disappointing for them to find two harmless idiots who were chased away by elephants. We reached the hotel without any further incident and had a thrilling story to tell our friends the next day. An Introduction to the Bandhavgarh Park The Bandhavgarh National Park is located within the district of Sahdol in the central Indian state of Madhya Pradesh. This forest nestled among the Vindhya hills came into existence in 1968 when the Maharaja of Rewa handed over the area to the government for it's formation. At the time when it was handed over to the government, the fauna was not faring too well due to the difficulty in the control of poaching. Once this became a protected area, the animal population took a drastic turn and began to flourish. At this time, the entire park covered an area of 106 square kilometers whereas it presently consists of an area of 448 square kilometers.

These much required extensions, to the northern and southern areas, of the park were done in 1982. These areas consisted primarily of Sal forests, which is the main tree-cover found in the entire park along with Bamboo. It was finally declared a tiger reserve under Project Tiger in 1993. Since, every system has some limitation so our proposed system is also not untouchable in this regard. Although it includes every kind of features but it cant be used in a huge organization where number of networks are very large, because the database used in this system is an average one. Also doesnt have different kind of access feature for different users. The limitation of our project are :(1) We have tried to develop our system as best as possible, but it is developed on account of knowledge based collected from the responsible authorities of Online Tour & Travels, any missing of information may lead to the limitation of our project . We cant provide any help facility in this project due to time limitation . We can use this project on stand alone system

(2)

(3)

Scope For Future Work:


There are every changes of reusability of the codes in other environment even in deferent platforms. Also its present features can be enhanced by some simple modification in the codes so as to reuse it in the changing scenario. This system is very flexible and can be changed at any point of time.

CONCLUSION
This is an era of Information Technology where getting information is the base of each and every thing. The would help in effective and systematic record keeping that is storing and retrieving of useful data. Project will be able to give the report so that management can make decision on the basis of these reports. The most admirable feature founded was its simplicity in term of application to the user but its highly beneficial outputs cant be ignored. The user will be highly benefited after using the system. Input screen have been designed in such a way that the user will have practically no problems in entering the information. Appropriate message have been provided where necessary. Also from the maintenance point of the view we have provided the detail documentation so that a layman can even understand the procedure and the system. By doing the Online Tour & Travels, I have gained knowledge about the various functions of the system organization. I also gained a considerable knowledge about the development environment and the SDLC (Software Development Life Cycle) and also the various department functionalities. An part of Online Tour & Travels System development, I learnt a lot about the reports that are useful to the various departments and also the frequency of generation of them. In a nutshell we say that we have developed a relatively flexible and user-friendly system.

BIBLIOGRAPHY
VB.NET Programming Black Book By Steven Holzner dreamtech publications. Mastering VB.NET By Evangelos petroutsos BPB publications. Introduction to .NET Framework By Worx publication Msdn.microsoft.com/net/ www.gotdotnet.com

You might also like