Nyasha Mutonhodza (R156049N) First Draft PDF
Nyasha Mutonhodza (R156049N) First Draft PDF
Nyasha Mutonhodza (R156049N) First Draft PDF
By
Nyasha Mutonhodza (R156049N)
Supervisor: Mr T. Gotora
ABSTRACT
The challenges which are being faced by wedding planners and couples in Zimbabwe on planning
a wedding event enhanced the decision to come up with this system. The planners and their clients
have had to meet in order to plan weddings and arrange about the special day. As a way to curb
time and cost mismanagement the researcher came with solutions or ideas such as, presenting an
online site that enables to do all this in the comfort of their home as well as managing guests. In
order to gather data that made to the development of this system interviews were conducted as
well as distribution of questionnaires and observations. Having done information gathering I went
on to develop the system guided by the objective that were obtained from the information gathering
tools. To come up with the system, this web-based platform, Php programming language was used
with Xampp which provided Apache for running as a testing server and MySQL as the database
platform. After completion of designing I went on to test the system on various levels including
modules and units. The system offers wedding products online and again it also enables planning
and managing of guests’ seating plans and venue notification online.
i
DECLARATION
I Nyasha Mutonhodza solemnly declare that I am the sole author of this thesis and I authorize the
Midlands State University to lend the thesis to other institutions or individuals for the purpose of
scholarly research.
Signature: ……………………………………...........
Date: …………/………………/………………19
ii
APPROVAL FORM
This dissertation or thesis is entitled to “Wedding Event Planner” by Nyasha Mutonhodza meets
the regulations governing the award of the degree BSc Information Systems Honours of the
Midlands State University and it is approved for its contribution to knowledge and literal
presentation.
Supervisor ………………………………………………………
Date ……………….../………………….../……………….19
iii
ACKNOWLEDGEMENT
The success of this project is a result of great and amazing support. The greatest appreciation goes
to the Lord he gave the strength. I would also want to appreciate my supervisor Mr. Gotora for the
consistence guidance and tolerance, the experience was amazing. He was a source of many ideas
and information that lead to the success of this thesis. I also would appreciate the department of
Information Systems for enriching me with information since the beginning of this program, I am
grateful. Then I would also want to recognize my family, respect to my mother for funding the
project, my little brother for conducting researches, my friends, Michael ‘Brad Pars’ Parewa,
Slyvester ‘Rambo’ Karumazondo and Elder Chico Bean for helping shaping up objectives.
iv
DEDICATION
This project is dedicated to my mother Mrs. M Singende and my little brother, they have
participated from the beginning until now, in short, they made this project possible.
v
Table of Contents
ABSTRACT....................................................................................................................................................... i
DECLARATION ............................................................................................................................................... ii
APPROVAL FORM ......................................................................................................................................... iii
ACKNOWLEDGEMENT .................................................................................................................................. iv
DEDICATION .................................................................................................................................................. v
LIST OF ACRONYMS ....................................................................................................................................... x
LIST OF FIGURES ........................................................................................................................................... xi
LIST OF TABLES ............................................................................................................................................ xii
LIST OF APPENDICES ...................................................................................................................................xiii
Chapter 1: Introduction ................................................................................................................................ 1
1.1 Introduction ....................................................................................................................................... 1
1.2 Background of the study................................................................................................................... 1
1.3 Aim of the study ................................................................................................................................ 1
1.4 System Objectives ............................................................................................................................. 2
1.5 Limitations ......................................................................................................................................... 2
1.6 Methods and instruments ................................................................................................................. 2
1.7 Justification ....................................................................................................................................... 3
1.8 Conclusion ......................................................................................................................................... 3
Chapter 2: Planning phase ............................................................................................................................ 4
2.1 Introduction ....................................................................................................................................... 4
2.2 Why developing the system .............................................................................................................. 4
2.3 Business Value ................................................................................................................................... 4
2.4 Feasibility Study ................................................................................................................................ 5
2.4.1 Economic feasibility ................................................................................................................... 5
Cost benefit analysis ....................................................................................................................... 5
Return on investment...................................................................................................................... 6
Payback Period................................................................................................................................ 7
2.4.2 Social feasibility .......................................................................................................................... 7
2.4.3 Operational feasibility ............................................................................................................... 7
2.5 Risk analysis ...................................................................................................................................... 8
2.5.1 Economic risk ............................................................................................................................. 8
2.5.2 Technical risk ............................................................................................................................. 8
vi
2.6 Work plan .......................................................................................................................................... 8
2.7 Conclusion ......................................................................................................................................... 9
Chapter 3: Analysis phase ........................................................................................................................... 10
3.1 Introduction ..................................................................................................................................... 10
3.2 Data Collection and Methodologies ............................................................................................... 10
3.2.1 Observations ............................................................................................................................. 10
3.2.2 Interviews.................................................................................................................................. 11
3.2.3 Questionnaires .......................................................................................................................... 11
3.3 Current system’s analysis............................................................................................................... 12
3.4 Process Analysis .............................................................................................................................. 13
3.5 Data Analysis ................................................................................................................................... 14
Existing system’s Context diagram................................................................................................. 15
Current system’s Data flow diagram .............................................................................................. 16
3.6 Current system’s weaknesses ......................................................................................................... 17
3.7 Alternatives Evaluation .................................................................................................................. 17
3.7.1 Improvement ............................................................................................................................ 17
3.8 Requirements Analysis ................................................................................................................... 17
3.8.1 Functional requirements ......................................................................................................... 18
3.8.1.1 Use case diagram ............................................................................................................... 19
3.8.2 Non-functional requirements .................................................................................................. 19
3.9 Conclusion ....................................................................................................................................... 20
Chapter 4: Design Phase ............................................................................................................................. 21
4.1 Introduction ..................................................................................................................................... 21
4.2 System design .................................................................................................................................. 21
4.2.1 Proposed system context diagram .......................................................................................... 22
4.2.2 Proposed system data flow diagram ....................................................................................... 22
4.3 Architectural design........................................................................................................................ 24
4.5 Database designs ............................................................................................................................. 27
Schema description; ........................................................................................................................ 28
4.6 Program design ............................................................................................................................... 30
4.6.1 Package diagram ...................................................................................................................... 30
4.6.2 Class diagram ........................................................................................................................... 31
4.7 Interface design ............................................................................................................................... 32
vii
4.7.2 Input designs............................................................................................................................. 32
Log in platform ............................................................................................................................. 33
Client registration form ................................................................................................................ 33
Site’s Home Page ........................................................................................................................... 34
4.8 Output design .................................................................................................................................. 35
4.9 Pseudo code...................................................................................................................................... 35
Registration ....................................................................................................................................... 35
User Login.......................................................................................................................................... 36
Sending Enquiry................................................................................................................................ 36
4.10 Security Design .............................................................................................................................. 36
4.10.1 Physical security ..................................................................................................................... 37
4.10.2 Network security .................................................................................................................... 37
4.10.3 Operational security .............................................................................................................. 37
4.11 Conclusion ..................................................................................................................................... 37
Chapter 5: Implementation phase .............................................................................................................. 39
5.1 Introduction ..................................................................................................................................... 39
5.2 Coding .............................................................................................................................................. 39
Login................................................................................................................................................... 39
Add product....................................................................................................................................... 40
5.3 Testing .............................................................................................................................................. 41
5.3.1 Unit testing ................................................................................................................................ 41
5.3.2 Module testing .......................................................................................................................... 42
5.3.3 Subsystem testing ..................................................................................................................... 42
5.3.4 System testing ........................................................................................................................... 43
Black box testing ........................................................................................................................... 43
White box testing........................................................................................................................... 44
5.3.5 Acceptance testing .................................................................................................................... 44
Beta testing .................................................................................................................................... 44
Alpha testing .................................................................................................................................. 44
5.3.6 Verification ............................................................................................................................... 45
5.3.7 Defects testing ........................................................................................................................... 45
5.3.8 Validation testing ..................................................................................................................... 47
5.4 Installation ....................................................................................................................................... 49
viii
5.4.1 User training ............................................................................................................................. 49
5.4.2 System changeover ................................................................................................................... 49
Direct changeover ......................................................................................................................... 49
Pilot changeover ............................................................................................................................ 49
Phased changeover ........................................................................................................................ 49
Parallel changeover (recommended) ........................................................................................... 50
5.4.3 Data Migration ......................................................................................................................... 50
Bing bang migration ..................................................................................................................... 50
Trickle migration (recommended) .............................................................................................. 50
5.5 Maintenance .................................................................................................................................... 50
5.5.1 Corrective maintenance ........................................................................................................... 51
5.5.2 Adaptive maintenance ............................................................................................................. 51
5.5.3 Perfective maintenance (recommended) ................................................................................ 51
5.6 Recommendations for future developments ................................................................................. 51
5.7 Conclusion ....................................................................................................................................... 51
APPENDIX A1: USER MANUAL..................................................................................................................... 54
Client Registration page ....................................................................................................................... 54
A2: Client Login Page ........................................................................................................................... 55
A3: Client portal ................................................................................................................................... 55
A4: Planner/admin login page ............................................................................................................. 56
A5: Planner’s portal ............................................................................................................................. 56
APPENDIX B: QUESTIONNAIRES .................................................................................................................. 57
APPENDIX C: INTERVIEW CHECKLIST .......................................................................................................... 59
APPENDIX D: OBSERVATION SCORE SHEET ................................................................................... 60
APPENDIX E: SOURCE CODE ........................................................................................................................ 61
ix
LIST OF ACRONYMS
ZB ZIMBABWE BANK
x
LIST OF FIGURES
Figure 2.1 Gannt Chart .............................................................................................................................. 9
Figure 3.1 Activity Diagram ..................................................................................................................... 14
Figure 3.2 Context Diagram for the current system .............................................................................. 15
Figure 3.3 Context Diagram for the current system .............................................................................. 16
Figure 3.4 Current system’s use case diagram ....................................................................................... 19
Figure 4.1 Context diagram ..................................................................................................................... 22
Figure 4.2 Proposed system Data Flow Diagram ................................................................................... 23
Figure 4.3 Client Server Model (Architecture design) .......................................................................... 25
Figure 4.4 Proposed system's Physical design ........................................................................................ 26
Figure 4.5 Database Architectural Designs ............................................................................................ 27
Figure 4.6 Proposed system’s entity relationship diagram ................................................................... 28
Figure 4.7 Enhanced Relationship Diagram for the proposed system ................................................. 30
Figure 4.8 Package Diagram .................................................................................................................... 31
Figure 4.9 Class diagram .......................................................................................................................... 32
Figure 4.10 Registration interface ........................................................................................................... 34
Figure 4.11 Site's Home Page ................................................................................................................... 35
Figure 5.1 Testing stages .......................................................................................................................... 41
Figure 5.2 Update quantity function ....................................................................................................... 41
Figure 5.3 Successful order panel ............................................................................................................ 42
Figure 5.4 User’s orders panel ................................................................................................................. 43
Figure 5.5 Planner / Admin panel............................................................................................................ 43
Figure 5.6 Client orders ............................................................................................................................ 44
Figure 5.7 Defect Testing .......................................................................................................................... 45
Figure 5.8 Login test ................................................................................................................................. 46
Figure 5.9 Registering test ........................................................................................................................ 46
Figure 5.10 Change of password test ....................................................................................................... 47
Figure 5.11 Email address validation ..................................................................................................... 47
Figure 5.12 Password and Confirmed password mismatch .................................................................. 48
Figure 5.13 Adding product without an image....................................................................................... 48
xi
LIST OF TABLES
xii
LIST OF APPENDICES
APPENDIX B: QUESTIONNAIRES 57
xiii
Chapter 1: Introduction
1.1 Introduction
The Wedding Event Planner system is a system that is design to help wedding planners to make
it easy to plan wedding events. It’s a system that will remove the manual way of planning
weddings events. This chapter will give an outline the background of the problem that this
system will solve. A set of objectives also that guides the development of this system is also is
also discussed so as to understand what the system aims at attaining. Then to close off the
chapter will also mention briefly about methods and instruments that will be used in coming
up with the system and finally the reason for coming up with the system or justification of the
system.
1.2 Background of the study
The system is built after identifying the problems that were associated with planning weddings.
Wedding planners plan their weddings using manual means that is they run their activities on
a manual script or a diary with list of activities and a pen. To track on progress of the precious
day much time is lost since there is too much to work on and at a limited time. Planners need
to find and suggest venues, determine capacity and determine the sitting arrangements among
other tasks to consider. All these tasks when done manually there is lost of track of time and
might end up consuming more time on a simple task or might be late on start time or it could
be a disorganized event because people will also be confused. Also, another problem is also
that wedding planners find it difficult to stay within budget when planning weddings and they
usually end up ver-spending. The Wedding Event Planner system will also address the issue
of guests. The Wedding Event Planner aims at tackling all the challenges and to minimize
whatever negative implications brought by each and every one of them.
1
1.4 System Objectives
a) System allows users/clients to send requests of their wedding event specifying what they
want, online.
b) The system provides wedding products that clients can choose from according to their
budget plans.
c) The system will compute a customized seating plan for the guests invited depending on the
family they belong to.
d) The system sends mails to the invited guests about location and the procedure of the day.
e) The system notifies guests when the event is about to begin.
1.5 Limitations
Coming up with the system had its own problems though not major. Sourcing out information
about the various tasks that are carried out, the experience of the planners and their
preferences. The main issue was the differences in planners’ preferences as well as their
different perspectives on different clients made it complicated to come up with the general
idea of what the system could be like. However, the system addresses the fundamentals that
are required for a successful wedding event and it also can be upgraded to suit the ever-
changing technology community.
In the stages of analysis, it is also important to put in the logic model of the system. The
system model will also be shown so as to get an insight of the project. Then in the stage of
design will also include various techniques such as architectural design to show how the
system will be outlined. The system will be programmed also with a programming language
PHP, using the Dreamweaver software and XAMPP apache as well as MySQL for database
which are scalable open source software.
2
1.7 Justification
Having identified the problem, outline it, the system puts the problems that come with time,
task and cost management for a wedding planner to rest. It will minimize the misuse of time
as much as possible. Instead of the wedding planner having to maybe right down on a note
pad the system avails all the functionality on the.
Having a big event as a wedding requires one to be uptight with every detail and time
management is also of utmost importance. The system helps in managing the big event in
terms of the budget, the catering the guest list and as well as a to do list to help the planner.
The Planner get to keep track of every task and progress of every event without missing out
on anything. This in turn the system will bring about time management. However, the system
will depend on the availability of smartphone or a computer that can be connected to the
internet.
1.8 Conclusion
The introductory chapter gives an outline of the problem that the wedding planners have or
experience when executing their work. The problems of time, task and cost management is
identified and the solutions to be put forward are also proposed. To come up with a solution
to the defined problem a set of objectives have been listed down. They will help to have a
guideline of how the system will be developed and what should be worked on. The next
chapter will bring out the plan involved.
3
Chapter 2: Planning phase
2.1 Introduction
In this stage of the project, the project planning is outlined. The processes on how the project is
going to be done is explained. An analysis on the various costs and benefits that the project will
bring is also taken. A feasibility study to check on whether the project is economical, technical
and operational feasible is also explained and outlined. Then also in this chapter writer will explain
on the risk analysis of the project taking into consideration all the risks that may be faced in
developing the system. Then a work plan is also drafted.
a. To come up with a system that contains a modernized way of guest management. An online
panel confirmation of guest makes planning easier for wedding planners.
b. The system also enables clients to have the flexibility of finding a wedding planner and be
updated on progress of events in the comfort of their location. Physical interaction won’t
be necessary with this system.
c. The system also aims at computing a seating plan for guests. After having a number of
guests who would have confirmed a proper seating plan, depending on the numbers is also
suggested by the system so as to maintain order.
4
2.4 Feasibility Study
The feasibility aims at checking the viability of the project. It addresses the question of how viable
or feasible is the system. On the this study the system is analysed for technical, economic and
social feasibility. Analysis of the factors helps in having an understanding of the project.
5
Benefits
Benefits are realised in 2 forms. They can be tangible or intangible benefits. Tangible benefits have
a value that can be given to them, whereas intangible benefits are difficult to give a monetary value
to them but they contribute to the advantage of the project.
Examples of tangible benefits include, reduction of workload, time saved, reduced stationery cost
and elimination of timeous tasks, whereas for intangible benefits we have, customer satisfaction
by delivering accurate and appropriate services, easy handling of a complex event, reduced
mistakes and time management and ease of access to clients and customers.
= 10%
Comment
A positive return on investment is good enough to ensure that the project progresses though it may
be small, other factor are also to be considered such as the payback and the cost benefit analysis.
6
Payback Period
This technique now looks at the time it takes for cash inflows to reach the initial investment. It
used also in making decisions when we have different projects to compare from. The payback
period of this project is calculated below,
The payback method is essential as it shows the investor how long it will take to get the initial
investment and it aligns the cash inflows to the years in which the were generated. However, the
technique tends to ignore the cash inflows that come after the payback period and also it doesn’t
put into account the time value of money.
The planner should be well informed about the system through training
The system is developed with the existing aims that the users want
To add on the system works on different platforms and devices from different locations
7
2.5 Risk analysis
To develop a successful system, we ought to have a risk assessment. It helps us understand the
dangers that may arise and we can identify how to curb them. Risks may be posed to different
Stakeholders of the system and they may be of any kind.
8
To have a better visual of the work plan a Gannt chart can also be used as shown below,
ACTIVITIES/WEEKS 1 2 3 4 5 6 7 8 9 10 11 12
Project Proposal
Planning
Analysis
Design
Implementation
Maintenance
Documentation
KEY
WEEKS
2.7 Conclusion
The planning phase has had the aim of analysing the project and developing workplan of the
project. The project has shown to be feasible in all aspects, economic, social and technical. The
projected benefits seem to be more than the costs associated with developing the system as
well. The project will be analysed in the next chapter.
9
Chapter 3: Analysis phase
3.1 Introduction
The Analysis phase explains the logical model of the system. It consists of data collection
methodologies explained in their detailed manner and the analysis of data. The phase also explains
the cons of the current system and then alternatives are considered, as well as coming up with the
requirements.
3.2.1 Observations
Researcher used observation to carry information gathering in real time. There was direct
extraction of information from various wedding events that the researcher attended as he was
seeking more knowledge about weddings. Various observations from several wedding events
enabled the researcher to come up with system’s functionalities which he drafted down.
Observations had advantages and disadvantages that they brought to the researcher and they are
going to be explained below.
Advantages
There was less likely to be bias unlike interviews because it was information extraction in
real time.
Observations enabled researcher to get information in its raw form without it being
suggested by anyone else to him
Disadvantages
10
Observations were time consuming to carry out since researcher had to sometimes spend
the whole day attending events that start in the morning only to end towards the evening.
The researcher also feels that observations may be interpreted in a misleading way or an
inappropriate way
3.2.2 Interviews
Interviews are situations whereby researcher has a conversation kind of talk with the people in
order to obtain useful information to develop the system. To develop a functional system, users
needed to be consulted and get information on objectives of the system. While interviews were
being carried out responds were being documented. The documentation was done during and after
the interview.
Advantages
Disadvantages
Interviews were time consuming; they require proper timing as well and the need to
interview as many people as possible
Interviews were costly as there was the need to gather as much information as possible
Interviews seemed to have a selected type of questions as some were considered to be more
sensitive to business hence could not be answered
3.2.3 Questionnaires
In order to come up with better analysis a questionnaire that is a document with a set of questions
was used. Questionnaires were designed to make an analysis of the current system stating the
weaknesses associated with it as well as the possible improvement to be done to the system. They
provided information about the need to come up with a web-based system which would counter
11
the manual way of obtaining the information. It was so difficulty to manage time and task among
other issues. It was very hand in identifying the areas needed for improvement.
Advantages
They could be analysed quickly and easily since the information was specific
Researcher gave respondents quite ample time to respond hence the quality of feedback is
anticipated to be better than interviews
It was a quick way of extracting information, as the questions are structured and they
required a yes or no answering criteria.
Recommendation were also obtained as individuals would express their perceptions and
requirements
Disadvantages
Some sections of the questionnaires were not answered maybe due to lack of time
Also, some chose not to participate as they felt no need to express their views
Contradicting views made it so difficult to interpret the information
There were high chances of the information emerging to be so biased since it wasn’t direct
observation
This technique gave a small room for individual expression as compared to interviews
- It’s a useful system to planner since they are used to it and nothing else
12
- It does not require much electrical devices and internet connection
- It ensures more personal interaction between planner and his/her clients
Cons
13
Figure 3.1 Activity Diagram
3.5 Data Analysis
In data analysis the purpose is to structure data in a manner that can aid decision making. In this
stage data collected is presented in a logical manner that makes it easier to interpret it so as to
come up with a better understanding of the system. 2 techniques were used to show the logical
ordering of data which consist of the Context and the Data flow diagram.
14
Existing system’s Context diagram
A context diagram of a system shows the top-level view of the system. It shows the system’s
entities and their relationships. The wedding event planner has the planner and client entity. The
planner responds to requests made by clients by sending quotes of prices of their services and then
the give feedback on the progress as well.
15
Current system’s Data flow diagram
16
3.6 Current system’s weaknesses
It’s a manual system hence its time consuming to use
It has no secured facilities to keep clients’ confidential information
It exposes the process to lots of risk as the system doesn’t provide a well tracked platform
3.7.1 Improvement
Improvement is when the developed system is coming in with additional functionalities that aids
the already existing system. The wedding event system is to be developed from a manual system
into a computerised system with automated functionalities. The is need to completely remove the
manual system and then put up a full computerised system.
Advantages
It’s easier for users to learn since it’s it is a modified version of what they already know
Information on how to develop the system can be easy to extract
Improvement is a solution to the existing weaknesses of the system
Disadvantage
17
3.8.1 Functional requirements
These are those functions that comprise of the objectives of the project. These come from
requirements gathering that the researcher would have gathered. The system should have these
functionalities as well as integrity aspects of the information. For this system the functional
requirements include,
It has also a platform for clients to create accounts and log into them
The system captures the requests made by clients
it recommends budgetary plan for the client
computes a customised seating plan
system sends messages to invited guests about the event
To have a diagrammatic view of functional requirements a use case can be used. The current
system’s use case is shown in the next page.
18
3.8.1.1 Use case diagram
Hardware – there is need to have a hardware system which can support the system smooth
operation of the system. A server for databases and backup facilities. The personal machine
with minimum specs such as 4Gig RAM and a disk space of at least 150Gig will ensure
smooth running of the system.
Security – it is important to have a security system for the client’s information. The system
has also access levels for different users. Each individual accesses the system using a
unique name and a passcode
19
Backup facility – the system needs to have a real time backup facility so that in case of a
failure the is a restore point
3.9 Conclusion
The project has had extraction of information using various techniques, and the information
obtained enabled to have an analysis of the current system. The gathered information also enabled
to have process analysis and to assess weakness of system as well as to identify areas of
improvement. Requirements analysis identifies the functionalities of the system. The analysis has
enhanced the project to be taken to the next stage which is the design phase.
20
Chapter 4: Design Phase
4.1 Introduction
The design phase resembles the form of the actual system. It comprises of various designs such as
the architectural, physical and database design among others such as interfaces. This stage
addresses the set objectives and it explains how the system components will be like. It’s also the
stage where we get to know how the system is developed, designed and deployed.
Reliability
The system is supposed to be functional whenever it has to, the property is to ensure that
the system can be relied upon whenever.
Maintainability
The system should be easy and quick to fix when there is a problem, also, the system ought
to be flexible to allow modifications
Security
The system has to be free of bugs. Bugs can be defined as interruptions that affect the
smooth operation of a system
Usability
The system is supposed to be user friendly. User should be able to use the system easily so
that they can quickly accept it and also it will be useful to them
Functionality
The property states that the system should work according to the set objectives. It should
address specified requirements of users
Performance
The system should execute the set functionalities in respect of all the integrities.
21
4.2.1 Proposed system context diagram
The context diagram will show the top-level view of the system. It comprises of the entities
and their environment.
22
Figure 4.2 Proposed system Data Flow Diagram
23
4.3 Architectural design
The architectural design at coming up with solutions to software and hardware issues. The
components a computer system is defined and so as to have an understanding of how the system
will work and all the security mechanisms available. Security mechanisms such as cloud backup
are of great significance to the system. The architectural design comprises explained below.
Server
The server will have a database of for example, a database of client details. In this project
the Apache HTTP server will be used as our server as it is an open software.
Network cables
Network cables will be used to connect computer components unto client server. The usual
type of cables to be used are the RJ45 cables.
Printers
Printers are there to print out reports of feedback, budgets and quotations among other
things.
Client machines
These are devices that will provide interfaces for users to interact with system. These
devices are used to send mails to the system, to access the client requests among other
functionalities.
An architectural design diagram to show the setup of the system will be diagrammatically shown
in the next page.
24
Figure 4.3 Client Server Model (Architecture design)
25
Software requirements
- Windows 7,8 or 10
- ESET endpoint antivirus
- Microsoft office 2013 or 2016
- Linux server edition
- Apache web serve MySQL
- Google chrome browser
Hardware requirements
26
4.5 Database designs
A database is a storage place for data where is can be manipulated by different queries. The data
in a database can be accessed by different users depending on their privileges or access levels. The
database should also observe different integrities. Access to the database should be by authorized
users who should access information relevant to them. The database has 2 levels, the first one
being the user level and the physical design. The user level specifies user requirements and then
the design is then done. The physical design is the transformation of a user level into a database
management system (dbms).
27
Schema description;
Physical level
It is the lowest level of abstraction of the database. It also gives a description of the data in
the database and how it is organized.
Conceptual schema
Is also known as the community’s view of data. The relationship of the data in the database
is described in this level.
External level
It’s the level which users view of the database is considered. It allows users to access data
from the database in accordance to their access levels. Users ought to manipulate data
which they are supposed to and not to overlap to others.
28
Table
Database tables will be structure differently according to functionalities they have and also
according to the data they are supposed to store. The database tables will be shown as illustrated
below.
29
Figure 4.7 Enhanced Relationship Diagram for the proposed system
30
Figure 4.8 Package Diagram
4.6.2 Class diagram
A class is a logical view of the system’s entities and their attributes and how they are interrelated
to each other. It has a set of entities attributes and processes. Class diagram for proposed system
is shown below.
31
Figure 4.9 Class diagram
4.7 Interface design
Interface design involves the design of platforms that the users of the system will be interacting
with n order to manipulate the system in any way. The users do not have access to the actual code
as it may not be understandable to them even if they did. The interface designs make it easier and
understandable for users to navigate into the system. Interfaces such as input designs and menus
are some of the examples among others.
32
Log in platform
In this system users are supposed to login first in order to have access to functionalities of the
system. Login platform ensures that no unauthorized users get access to the system and play around
with it. It ensures integrity. For this system the interface for the login platform will be designed as
shown below.
33
Figure 4.10 Registration interface
Site’s Home Page
It’s the platform that the user will first see before they can do anything else. It is like a dashboard
which guides the users of where and how to navigate. It will be informative to the user and has
clearly marked buttons and links that are easy to understand.
34
Figure 4.11 Site's Home Page
4.8 Output design
Output designs are sets of responses that are given by the system to the user. For example,
extraction of reports among other things. The come up after user has manipulated a certain
functionality and once, they do that output is expected and that output may come in different
dimensions either text, videos or images depending on what the output is expected to be.
Registration
Enter user details
35
Add user credentials to the database
} Else {
User Login
Enter Login details
Sending Enquiry
Select preferred wedding stage
Send Enquiry
} ELSE {
not available}
36
4.10.1 Physical security
This is safeguarding the hardware components of the system that are prone to threats like theft,
moisture, electricity and lightening among other physical threats. These components are to be
placed on cabins and desks, they should not be directly placed on the flow to prevent moisture
from coming in. also there is need to ensure that the premises that resides these machines is guarded
and has fire or smoke detectors. To enforce on physical security also there is need to have rules
and regulations to prevent trespassers.
4.11 Conclusion
The design phase has shown the logical view of the database in different dimensions which include
text and diagrams. It has also shown the structure of the database that is going to be used and has
taken into account various integrities that should be considered when coming up with these
databases. An outline of the architectural and physical design has also been done and the required
hardware and software components have been identified. In this phase the outlook of the system
37
has been shown and how the user will execute the various functionalities of the system has been
shown. The implementation chapter will close off the document.
38
Chapter 5: Implementation phase
5.1 Introduction
The implementation phase of the project involves taking different implementation process into
effect. The project is analysed and tested to check on whether it has address user requirements and
expectations. Also, the validity issues are also checked and bugs that may also arise are identified.
The system will undergo a testing session to identify any errors that may be available. And also,
there is need to address issues of installation and maintenance.
5.2 Coding
The coding stage is where the designed system is put in the form of an executable program. These
are line of codes that make the actual system. This system was developed using Adobe
Dreamweaver 8 software. The software has a PHP (php hypertext program) language that was
used to come up with the system. The Xampp software which has MySQL and Apache was also
used in order to create databases and to run the system for testing during development. The code
snippets of this system are shown below.
Login
<?php
include 'includes/header.php';
if(isset($_SESSION['suname']))
{
header("Location: http://localhost/happy-wedding/index.php");
}
include 'includes/left-bar.php';
?>
<div class="col-md-10" style="background: url('images/7.jpg') no-repeat;background-
size: 100%;min-height:570px;">
<br/><br/><br/><br/><br/><br/><br/><br/><br/>
<center>
<form action="user/loginHandler.php" name="reg" onSubmit="return validate()">
<p><input type="text" required name="uname" style="color:black;font-
weight:bold;" placeholder="Username or Email"></p>
<p><input type="password" required name="pass"
style="color:black;font-weight:bold;" placeholder="Password"></p>
<p class="remember_me">
<a href="register.php">
<label>
don't have an account
</label>
</a>
39
</p>
<p class="submit"><input class="btn btn1" type="submit"
name="commit" style="color:black;font-weight:bold;" value="Login"></p>
</form>
</center>
</div>
</div>
<?php
Add product
<?php
include '../config/database.php';
$pname=$_POST['pname'];
$price=$_POST['price'];
$type=$_POST['type'];
if($type==1)
$category="stage_decoration";
else if($type==2)
$category="car";
else if($type==3)
$category="gate";
else if($type==4)
$category="reception";
else if($type==5)
$category="card";
else if($type==6)
$category="dress";
else if($type==7)
$category="parlour";
$image="images/".$category."/".basename($_FILES['image']['name']);
$target="../".$image;
if(move_uploaded_file($_FILES['image']['tmp_name'],$target)){
$res=mysqli_query($link,"insert into product
values('','$type','$image','$price','$pname')")or die(mysql_error());
echo "<meta http-equiv='refresh' content='0;URL=../index.php'>";
}
else
{
echo "File could not be uploaded successfully.";
}
?>
40
5.3 Testing
In the testing phase the system is checked to ensure that it is consistent with the set objectives. It’s
also a stage where the system bugs and errors are identified. Upon identifying these bugs and errors
corrective measures are applied hence maintenance. The testing stage also ensures that the set
objectives have been achieved through the functionalities of the system. Testing has 5 methods
that will be explained below.
Unit Testing
Module Testing
Subsystem testing
System testing
Figure 5.1 Testing stages
Acceptance testing
A test on the functionality of a source code that had an SQL statement was done. As shown in the
image a text box for quantity was availed to allow input and the button add quantity ‘add quantity’
upon clicked updated the database and the unit test was a success.
41
5.3.2 Module testing
After completion of unit testing, then module testing is what follows. Modules are combined units
that are formed and these are tested to check on the functionality. For this system the clients form
functionality related to the planner’s records. The client can successful order products that are
provided by the planner. By successful adding products to the cart and then clicking the order
button a panel shown below appears thus indicating that a order was successful.
42
The screenshot below shows the user’s panel of the orders the would’ve made. On the other hand,
the plan/admin will also be able to view client’s order in the same manner the are sent as illustrated
below. Subsystem testing was successful.
43
testing. Black box testing was successful when the ordered items where the same as that received
by the planner on his side when the client ordered.
Beta testing
It is testing the system with the correct data and stipulated ways of using it. Once there are errors
identified corrections are undertaken there and then before the system can be deployed.
Alpha testing
With alpha testing now, we have users working on the different functionalities that the system has.
When the users will be using this system, developers will be taking note of errors and
improvements that may be necessary. After the process the, developers will work on the identified
errors and improvements and then deploy it.
The Wedding event planner was tested and errors identified were corrected as well as
improvements we also done. The system passed very well all stages of testing.
44
5.3.6 Verification
The verification stage aims at checking the compliance of the system to user requirements. It aims
at verifying if the functionalities that are provided by the system do meet the user requirements
including implementation of objectives. Code review was used to correct the system’s syntax
errors.
Test cases - are explained as expected results given that the system function according to
expectations
Test Data - they are inputs that are used to test the system
45
Different Tests were conducted for the wedding planner system as illustrated in the next page.
46
Changing user password
o Condition – inserting a wrong old password
47
A test to check on the correctness of the passwords that is the password and confirmed password
was done and if these where not matching the system captured it.
When the button Ad product was clicked this was the response of the system.
48
5.4 Installation
When installing the system now, processes of changeover are involved. The manual system will
be replaced by a new computerized system which will require a translation of the old system to a
new one. In the wedding event planner now, there isn’t much work in terms of changeover strategy
but the planner and clients may need to be trained on this initiative since they are the major users
of the system. There is also need for planner to have hardware component that will allow
installation of the software.
Direct changeover
This is when the new developed system is fully deployed into the organization at once. The system
fully replaces the old system and starts functioning. It’s a quick and cheap method but a very
dangerous one as changes of fail of the new system cannot be ruled out.
Pilot changeover
Pilot changeover is when a system is directly deployed at a single site of an organization with
different branches. A single branch is chosen and the system is deployed and once the system
functions well for some time then it can be deployed in all other branches. This is a more careful
way of deploying a system, it reduces total risk of system failure.
Phased changeover
Is when the system different functionalities are deployed one after the other until the whole system
is fully implemented. Different modules and functionalities are introduced in stages and there is
49
checking of errors before a new functionality can be deployed. The process goes for every
functionality until the whole system is fully deployed. This method tends to take much time for
system implementation but it’s less expensive.
5.5 Maintenance
The maintenance stage aims at checking and observing the system at work to have an analysis of
whether the system has addressed objectives set. Errors and bugs are also checked among other
50
things that ensure proper functionality of the system. There are different maintenance methods that
are explained below.
Developer recommends that the system should include a payment platform for clients for
example Ecocash, Zimswith etc.
The system should also give GPRS locations of clients’ events for easy navigation
Clear description of how the system works for the client is of great importance
A recommendations tab from the planner is also important
The system should be upgraded regularly to be in touch with the technological
developments
5.7 Conclusion
This chapter marks the end to the research of the Wedding Event Planner. The research had
introductory chapter that explained the problem definition. A set of objectives was set which
51
included to enable the clients to order online among other objectives. the These objectives had a
plan drawn for them on how they are going to be tackled as well as identification of resources
necessary. An analysis of the past system which were used by planners was also assessed and its
weakness where identified such as its absence on the internet among other weaknesses. Several
techniques such as questionnaires and observations were used to conduct data gathering that was
used to develop this proposed system. Having gathered data and having a draft of the system
requirements the design followed. Several tools were used to come up with the logical view of the
system. Database tables and entity relationship models were used as well as interface designs were
also drawn to resemble how the system will be arranged. Among these architectural and physical
designs, were drawn to show the networking of the system. Implementation stage explains the
various coding designs of the system and testing processes. The stage also explains further the
installation mechanisms as well as the maintenance of the system, outlining how the system has
come be successful.
52
Reference List
Rosalind. E and Hollard. J, (2013) What is qualitative interviewing, Bloomsbury: New York
Bentley and Whitten, (2007), System Analysis and Design, McGraw-Hill company
Kendall and Kendall. Systems Analysis and Design for the Global Enterprise.7 th ed.
53
APPENDIX A1: USER MANUAL
Client Registration page
the registration page enables all new clients to create accounts for the to access or contact the
planner of the system. The client should provide the credentials (such as name, surname, and a
picture that will be used for their profile) required for them to be able to log into the system. Once
they are registered, they will be directed to the log in that will be shown in the next appendix.
54
A2: Client Login Page
Having successfully registered the client is directed to the log in page where they are required to
input their username or email and password. The registered credentials will be verified against
what would have been inputted and if correct user is granted access to the system.
55
A4: Planner/admin login page
The planner portal is separate from the client’s portal. The planner logs in with their provided
credentials of password and email/username. Once they login they are taken to their portal where
they can view their tasks.
56
APPENDIX B: QUESTIONNAIRES
This questionnaire is written to help in the research of how the wedding event is held and how it
can be improved.
Information provided in this questionnaire is private and confidential henceforth you are free to
express your views.
………………………………………………………………………………………………………
………………………………………………………………………………………………………
………………………………………………………………
3. Do you think there is need for improving the current system process?
………………………………………………………………………………………………………
………………………………………………………………………………………………………
………………………………………………………………
4. What are the challenges associated with using the existing system?
………………………………………………………………………………………………………
………………………………………………………………………………………………………
………………………………………………………………
5. What security implications have been associated with the current system in place, if any, how
have these been countered for?
57
………………………………………………………………………………………………………
……………………………………………………………………………………………………
6. Are you satisfied with how inconveniences are handled……….....................................................
7. What can you say about the process of conducting a wedding, in terms of complexity and all the
work. What would you recommend for coming up with a better wedding event planner for either
client or planner?
………………………………………………………………………………………………………
………………………………………………………………………………………………………
…………………………………………………………………
8. Do you think an online Wedding Event Planner will assist in countering challenges you have
identified before? …
………………………………………………………………………………………………………
………………………………………………………………………………………………………
………………………………………………………………
………………………………………………………………………………………………………
………………………………………………………………………………………………………
58
APPENDIX C: INTERVIEW CHECKLIST
59
APPENDIX D: OBSERVATION SCORE SHEET
Observation guiding schedule
Date………………………………. Observer………………………………...
Time……………………………….
Observation
………………………………………………………………………………………………………
………………………………………………………………………………………………………
………………………………………………………………………………………………………
………………………………………………………………………………………………………
……………………………………………………………………………
………………………………………………………………………………………………………
………………………………………………………………………………………………………
………………………………………………………………………………………………………
…………………………………………………..
Conclusion
………………………………………………………………………………………………………
…………………………………………………………………………………………….
STAMP
60
APPENDIX E: SOURCE CODE
Logging in
<?php
include 'includes/header.php';
if(isset($_SESSION['suname'])) {
header("Location: http://localhost/happy-wedding/index.php");
<p class="remember_me">
<a href="register.php">
<label>
Add Product
<?php
include 'includes/header.php';
include 'includes/left-bar.php';
include 'config/database.php';
?>
61
<?php
echo "<center><table>";
echo "</select></td></tr>";
echo "</table>";
echo "<br/>";
echo "</form></center>";
?>
Contact planner
<?php
include 'includes/header.php';
62
include 'includes/left-bar.php';
?>
<br/>
<br/><br/><br/><br/><br/>
<center>
<div class="row">
</div>
<div class="row">
</div>
<div class="row">
</div>
63
<input id="submit_button" style="color:black;font-weight:bold;"
type="submit" value="Send email" />
</form>
</center>
</div>
</div>
64