Event Scheduler Documetation
Event Scheduler Documetation
Event Scheduler Documetation
NARSEE MONJEE
COLLEGE OF COMMERCE
AND ECONOMICS
NAAC Accredited ‘A’ Grade
Event Scheduler
A Project Report
Submitted in partial fulfilment of the
Requirements for the award of the Degree of
CERTIFICATE
This is to certify that the project entitled, “Event Scheduler”, is bonafide work of
Deepu Gupta bearing Seat No: 45207190059 submitted in partial fulfilment of the
requirements for the award of degree of BACHELOR OF SCIENCE in INFORMATION
TECHNOLOGY from the University of Mumbai.
External Examiner
Date: _______________
ABSTRACT
In present scenario, people are busy in heavy work, as everyone is engaged with busy
schedules, and hectic tasks which make them depart from family life. If any event occur they
have to find an event manager for a specific event. There is the different managers for
different event and also they charged more and not time friendly. It is important to manage
both professional and family life. Thus, event scheduler come to help. The system allow user
to login and register. This project provides most of the basic functionality required for an
event. It allows to user to select a list of event types. Once the user enters the event like
marriage, Dance show and other event like any product launching, sport event like cricket
and hocky. The system then allows the user to select the date and time of event place and the
event equipment.
Online event scheduler is a best way to keep clients engaged with the service as they
are on the move. As technology is growing rapidly, we are also moving to a technical world
where everything we want is to be online. The main aim of this proposal is to develop an
online event management system. To gather requirements for designing an online event
management system. To design or model an online event management system and to test,
validate and implement the designed system.
ACKNOWLEDGEMENT
“The acknowledgment of a single possibility can change everything”
I have a great pleasure while keeping this thesis work in front of reputed personalities ,
in the research. I take this opportunity as a deep sense of gratitude to those people &
Firstly, I would like to express my heartfelt gratitude Dr. Parag Ajagaonkar, the
the research work and writing up of the thesis . Without her constant inspiration,
encouragement and constructive criticism, the present work would not have been possible.
I take this opportunity to express my profound gratitude and deep regards to my guide
Mr. Gufran Qureshi, for exemplary guidance at each step of this project, monitoring and
constant encouragement throughout the course of this project . She also helped me in
implementation smoother. A special mention to all the faculties, lab assistants and the non-
teaching staff of the department as well for their efforts and cooperation.
Lastly, I would like to thank the institute , SVKM NARSEE MONJEE COLLEGE
expand our horizons through this project and all our academic endeavors.
DECLARATION
I hereby declare that the project entitled, “Event Scheduler” done at MUMBAI, has
not been in any case duplicated to submit to any other university for the award of any
degree. To the best of my knowledge other than me , no one has submitted to any other
university.
The project is done in partial fulfilment of the requirements for the award of degree
of BACHELOR OF SCIENCE (INFORMATION TECHNOLOGY ) to be submitted
as final semester project as part of our curriculum.
Chapter 1: Introduction
1.1 Background 1
1.2 Objectives 2
1.3 Purpose, Scope and Applicability 3
1.3.1 Purpose 3
1.3.2 Scope 3
1.3.3 Existing system 3
1.4 Achievements 4
1.5 Organization of Report 5
Chapter 2: Survey of Technologies
2.1 PHP vsASP.NET 7
2.2 Description of Chosen Technology 9
Chapter 3: Requirements and Analysis
3.1 Problem Definition 13
3.2 Requirements Specification 14
3.2.1 Existing System 14
3.2.2 Proposed System 15
3.2.3 System Requirements 16
3.2.3.1 Functional Requirements 16
3.2.3.2 Non – Functional Requirements 17
3.3 Planning and Scheduling 18
3.4 Software and Hardware Requirements 21
3.4.1 Software Requirements 21
3.4.2 Hardware Requirements 21
3.5 Preliminary Product Design 22
3.6 Conceptual Design 23
3.6.1 ERD Diagram 23
3.6.2 Data Flow Diagram 24
3.6.3 Use Case Diagram 25
3.6.3.1 Admin Use Case Diagram 25
3.6.3.2 Service Provider Use Case Diagram 26
3.6.3.3 Customer Use Case Diagram 27
3.6.4 Sequence Diagram 28
3.6.4.1 Admin Sequence Diagram 28
3.6.4.2 Service Provider Sequence Diagram 29
3.6.4.3 Customer Sequence Diagram 30
3.6.5 Activity Diagram 31
Chapter 4: System Design
4.1 Basic Modules 32
4.2 Data Design 34
4.2.1 Schema Design 34
4.2.1.1 Admin Table 34
4.2.1.2 Service provider Table 35
List of Tables
Table 2.1 Comparison of frontend Technologies Table 7
Table 2.2 Comparison of backend Technologies Table 8
Table 4.2.1.1 Admin Table 34
Table 4.2.1.2 Service provider Table 35
Table 4.2.1.3 Customer Table 36
Table 4.2.1.4 Order Service Table 36
Table 4.2.1.5 Category Table 37
Table 4.2.1.6 Reply Detail Table 37
Table 4.2.1.7 Feedback Table 37
Table 4.6 Test Case Table 49
List of Figures
Figure 1.1 The special event 2
Figure 1.2 The process schedule an event 4
Figure 3.2.1 Services provided by Mechanics 14
Figure 3.3.1 Gantt chart for the first half of the project 19
Figure 3.3.2 Gantt chart for the second half of the project 20
Figure 3.4.2 Logo of Software Requirements 21
Figure 3.6.1 ERD Diagram 23
Figure 3.6.2 Data Flow Diagram 24
Figure 3.6.3.1 Admin Use Case Diagram of the project 25
Figure 3.6.3.2 Service Provider Use Case Diagram of the project 26
Figure 3.6.3.3 Customer Use Case Diagram of the project 27
Figure 3.6.4.1 Admin Sequence Diagram of the project 28
Figure 3.6.4.2 Service Provider Sequence Diagram of the project 29
Figure 3.6.4.3 Customer Sequence Diagram of the project 30
Figure 3.6.5 Activity Diagram of the Login and Registration 31
Figure 4.3.1 System Flow of the project 38
Figure 4.3.7 Algorithm Design 39
Figure 4.4.1 Home Page 42
Figure 4.4.2 Customer Login Page 43
Figure 4.4.3 Admin Login Page 44
Figure 4.4.4 Customer Registration Page 45
Figure 4.4.5 Service Provider Registration Page 46
Chapter 1
Introduction
1.1 Background
In today’s time everything is getting fast paced, and people want everything to be on
time. But managing and schedule an event become pain in head. Where people use today’s
technology in everything like booking snacks and mechanics but chose to manage event them
salve and take time like week .
The "Event Schedule" has been developed to override the problems prevailing in the
practicing manual system. we are going to make our website and mobile application where
the people get appropriate result. This software is supported to eliminate and, in some cases,
reduce the hardships faced by this existing system. The interface of the website is very easy,
and anybody can easily work on it. Moreover, this system is designed for the particular need
of the company to carry out operations in a smooth and effective manner.
The event schedule website is also very useful because the customer doesn’t have to
visit to service provider’s office and also need not to ask anyone whether they have any place
for event via this website and he/she can also pay the payment online in this website if
available. So, he/she can book hall, ground etc in advanced.
To make this application work successfully we have used some latest technology such
as PHP, HTML, CSS as the platform and My SQL as the database management environment.
I have also included UML diagram which is beneficial to display the flow of process
throughout the system so even an inexperienced people or newly people who recently settled
in city can easily get the idea of this system.
1|Page
The Special event
1.2 Objectives
The main objective of the Project on Event Management System is to manage the
details of Event, Activity. Organizers, Attendees, Conductors. It manages all the information
about Event, Payment, Conductors, Event. The project is totally built at administrative end
and thus only the administrator is guaranteed the access. The purpose is to maintain a
centralized database of all events related information and the project is to build an application
program to reduce the manual work for managing the Event, Activity, Payment, Organizers.
It tracks all the details about the Organizers, Attendees, Conductors.
1.3.1 Purpose
Traditionally we search and ask people if they know any event management and when
they have different event management like for party wedding and sport event. But now these
issues is going to be solved sitting at home and getting all your work done easily. Our
purpose is to solve the issues when the customer needs any kind of event.
1.3.2 Scope
The main scope of this project is to make event schedule very easy. In a very short time, the
puser can find and book hall ground in very , simple and sensible. It will help a person to
know the management of passed by perfectly and vividly. It also helps in current all works
2|Page
relative to Event Management System. It will be also reduced the cost of booking the
management & event will go on smoothly.
Our project aims at Business process automation, i.e. we have tried to computerize various
processes of Event Management System.
1.3.3 Existing system
This existing system is not providing secure registration and profile management of
all the users properly. This system is not providing on-line help. This system doesn’t
provide tracking of users activities and their progress. This manual system gives us very less
security for saving data and some data may be lost due to mismanagement. This system
is not providing event management through internet. This system is not providing proper
events information. The system is giving manual information through the event management
executer.
1.4 Achievements
Time Saving: Especially in metro cities, life has become so mechanical that people don’t
have time for his or her personal life. With the assistance of online home service, you'll easily
find the proper professional for your job. This is able to save lot of your time and therefore
the quality of the service would be great compared to the local service provider.
New People in Town: Online home service are considerably beneficial for working
professionals and also very beneficial for the people that are recently relocated to the town
because the people that are recently relocated to the town, they don’t know anyone therein
area so through this website they will easily get all kinds of help they have.
Quality Service: The simplest part of the web services is Quality they promise and
delivery. they are doing document verification of the partners and appearance at their past
experience within the field. Sometimes they also ask their few past customers to validate the
work provided by the service partner.
3|Page
Multi-Tasking: While online service provider takes care of all of your requirements,
you'll relax or resume your work without disturbing your planner.
Punctuality: The time slots you choose for your requirements are going to be placed on
high priority and therefore the service partners will reach the place on time and its best
interest of the web service provider to send the service partners on time.
This chapter has mainly focused on a brief description of the background and context
of the project and its relation to work . It has given a concise statement of the aims and
objectives of the project, answers questions on why this project is being done, how the
project could improve the system its significance and theoretical framework , what are the
main issues being covered in the project , what are the main functions of the project , and how
this project will serve the computer world and people. This chapter will also explain what
knowledge the student has achieved after the completion of the work , what contributions has
the project made to the chosen area. It will also state the goals achieved describing the degree
to which the findings support the original objectives laid out by the project.
and understanding of available technologies related to the topic of the project . I will also give
the detail of all the related technologies that are necessary to complete the project and are
4|Page
available in the chosen area. I will also present a comparative study of all those available
technologies and explain why selected the one technology for the completion of the
The 3rd chapter, Requirements and Analysis, will define the problem on which I am
working and will provide details of the overall problem in the project . In this phase I will
also define the requirements of the system, independent of how these requirements will be
accomplished, describe the things in the system and the actions that can be done on these
things, and identify the operation and problems of the existing system . The way I have
planned to complete the project will be shown by with the help of Gantt Chart. This will
describe how I have scheduled my whole project completion . It will also give the details of
all the software and hardware needed for the development and implementation of the project .
Lastly, I will explain the problem domain and produce a model of the system , which
describes operations that can be performed on the system, and the allowable sequences of
those operations.
The 4th chapter of the project will describe the desired features and operations in
detail, including screen layouts, business rules, process diagrams, and pseudocode. I will
divide the overall problem into more manageable parts and develop each part or module
separately. When all modules are ready, I will integrate all the modules into one system. In
this phase, I will briefly describe all the modules and the functionality of these modules . In
user interface, I will describe the external and internal components and the architecture of
user interface. I will also include real-time considerations and security issues related to the
project and explain how I intend avoiding those security problems . The test cases, will
provide easy detection of errors and mistakes with in a minimum period and with the least
effort.
The 5th chapter, Implementation and Testing, will define the plan of implementation,
and the standards that I would be using in the implementation . The code will include only the
important codes (algorithms, applets code, forms code etc). It will also include the testing
5|Page
approaches, modifications and improvements that I have done to my project over the course
of time.
The 6th chapter, Results and Discussion, will explain the test results and reports based
on the test cases, which should show that the project can face any problematic situation and
that it works fine in different conditions . The results will be discussed with different
scenarios which will in turn help to determine the success rate of the project.
The 7th chapter, Conclusions, brings together the limitations encountered during the
testing of the project and how they can be eliminated in the future . It also enlists the
criticisms accepted during the demonstrations of the project . It will also include the future
scope of the project describing two things: firstly, new areas of investigation prompted by
developments in this project, and secondly, parts of the current work that were not completed
Chapter 2
Survey of Technologies
PHP ASP.NET
PHP is a mix between a programming ASP.NET is an open-source server-side web
language and a web framework by the application framework designed for web
PHP Group. development to produce dynamic web pages
developed by Microsoft.
PHP is a server-side scripting language An object-oriented programming language in
designed for web development but also development from Microsoft, which is intended
used as a general- to combine the computing power of C++ with
Purpose programming language. the programming ease of Visual Basic.
6|Page
PHP is faster at the core level. ASP.NET was built to build apps quicker at the
expense of a loss in overall performance
PHP error handling is traditionally It informs developer if they made any mistake in
considered poor when compared to other coding before compile
programming languages.
Since it is language it does not get updated Since it is software so it gets updated or
or modify. SQL commands remains same modified frequently.
always.
SQL Server syntax is simple and easy to MySQL syntax is bit complex
use.
7|Page
Available in multiple languages. Available only in English languages
1. HTML
HTML stands for Hypertext Markup Language.HTML files are saved with
.html extensions. It creates and describes the structure of web pages. It consists of
series of elements. All elements instruct the browser of how to the web page should
look like. HTML elements are from start tag to end tag. The purpose of a web browser
is to read HTML documents and display them correctly and in correct order. HTML
elements can be building block of HTML pages.
HTML can be assisted by CSS (Cascading Style Sheet) and also scripting
language such as JavaScript. Web browsers receive HTML documents from a web
server or from local storage and render the documents into multimedia web pages.
HTML provides a means to create structured documents by denoting
structural semantics for text such as headings, paragraphs, lists, links, quotes and
other items. HTML elements are defined by tags which are used inside the angular
brackets.
Tags such <img>, <links>, etc. are directly directed to the next page. Other
tags such as <p> provide information about document text and may include other tags
as sub-elements. Browsers do not display the HTML tags, but use them to interpret
the content of the page.
2. CSS
CSS stands for Cascading Style Sheet. CSS files are saved with .css
extensions. CSS is used for describing the presentation of the document written on
8|Page
markup page which is HTML. It is technology of World Wide Web along with
HTML and JavaScript.
CSS is designed for the separation of design and content. It helps to design the
background of the page, layout, and font of the parting paragraph. This separation can
provide more flexibility and enable multiple web pages to share formatting by
specifying the relevant CSS in a separate .css file which reduces complexity and
repetition in the content as well as enabling the .css file to improve the page load
speed between the pages that share the file and its formatting.
3. PHP
PHP stands for Hypertext Preprocessor. PHP files are saved by .php extension. PHP is
a server scripting language, and a powerful tool for making dynamic and interactive
Web pages. PHP is a widely-used, free, and efficient alternative to competitors such
as Microsoft's ASP. It was originally created by Danish-
Canadian programmer Rasmus Lerdorf in 1994. PHP can be used for many
programming tasks outside of the web context, such as standalone graphical
applications.
On a web server, the result of the interpreted and executed PHP code – which
may be any type of data, such as generated HTML or binary image data – would form
the whole or part of a HTTP response. Various web template systems, web content
management systems, and web frameworks exist which can be employed to
orchestrate or facilitate the generation of that response.
1. Information Representation
9|Page
All information stored in a RDBMS is represented only by data item values , which are
2. Logical Accessibility
Every data item value stored in a relational database is accessible by stating the name
of the table it is stored in, the name of the column under which it is stored and the
value of the primary key that defines the row in which it is stored.
values. For example, null values for numeric data must be distinct from zero or any
other numeric value and for character data it must be different from a string of blanks
4. Catalog Facility
The logical description of the relational database management system is represented
in the same manner as ordinary data. This is done so that the facilities of the relational
5. Data Language
A relational database management system may support many types of languages for
description data and accessing the database . However, there must be at least one
language that uses ordinary character strings to support the definition of data , the
6. View Updating
10 | P a g e
Any view that can be defined using combinations of base tables , that are theoretically
system.
application programs.
11 | P a g e
Chapter 3
them having its peculiar problems. The manual booking system still appears prominent
among the developing nations. In traditional booking system, customers can choose or mark
their choices of mechanics and call them to resolve their issues, which are sealed and
officially opened under special conditions to warrant transparency . The calling mechanics
12 | P a g e
This method of booking has littered history with examples of mechanics being
inconvenience of manual system of booking services like , mechanic is not available at that
time, new people who came to stay and also town is new for them so they get difficulty in
finding the mechanics, if the mechanics charges high price and demand for the more, also
when the mechanics does not behaves properly with customers, also some mechanics charges
low and after doing their work they charge higher prices.
several reasons. To illustrate, sometimes people may not be in their own registration region
and due to this fact, they are not able to find mechanics or are not able to contact them . In the
present system there is no such application level system provisions in the country to find
mechanics and procedure as a whole. Also, in the present status, there is no such application
in use for online mechanics help and getting problems solved very easily and effectively
structure existing in the country. All the step by step procedures are carried out by the
registered mechanics and also when their details are provided with the correct information
and job that they do. The fact is all the procedures are carried out manually , starting from the
If this process is done manually it wastes a lot of time and money . Thus, the present
system proves itself to be an inefficient one. The existing system is not web based. The user
or person must register themselves and then book the mechanic as per their needs and use.
13 | P a g e
Figure 3.2.1: Services provided by Mechanics
mechanics is very difficult for new people to adjust with this if any problems occur . The new
implemented website protocol has two main players : The customer and the administrator
sections. The customer (which can be found at home, in a working station, or any other
device have the function of booking). The administrator performs the function of mechanics
time.
14 | P a g e
Furthermore, it is assumed that a trustworthy Administrator is available . Apart from
that, the accessibility to the customer in booking the procedure plays a special role , which
means that the booking result can be monitored and mechanics gets the work to go that to that
house and do his work. Accessibility to the customer is necessary for all booking stages.
The system is to cater for the following generic requirements:
1. Privacy: After customer login with username and password their login-info should
not get revealed or else there are chance of getting their account hacked.
2. Accuracy: Customer should book only what kind of service is been needed. They
shouldn’t book the services which is not in their use.
3. Security: Throughout the booking process, once the slot is booked they cannot
4. Democracy: All customers can book their particular services . One person can book
multiple services if needed.
15 | P a g e
The following represents a list of functional requirements for the online booking of
home services:
1. The system must provide customer with accurate details of the any type of event.
2. Ease of GUI use that can be accessed via web browser must be established.
3. The system must follow technical development standards supported on known
operating systems such as Windows, Linux, and UNIX, in addition to future operating
systems versions.
and updated.
the functionality of a system. They normally place restrictions on the product being
parameters of functionality in that they determine how quickly , how accurately, how
1. Response and net processing time must be acceptable by user and by application.
2. When checking the database for errors, a 100% scan of the data is required, rather
3. The system must be working at 100% peak efficiency during the booking process.
4. The system should be allow adding more customers to allow better services.
16 | P a g e
5. The system should provide friendly graphical Interface to ensure ease of use when
project in terms of its objectives , justification and how the objectives are to be achieved . It
describes how all the major activities under each project management function are to be
of stages and creating a sequence of activities to be performed . The entire project can be
viewed as several independent modules. These modules follow chronological sequence. They
are:
3. System analysis.
17 | P a g e
4. Synopsis.
Project scheduling is one of the critical management tasks as it dictates the time
frames in which the project will be completed , in terms of resource requirements and the
precedent activities. Schedule constraints specify when an activity should start or end, based
dates or other time constraints. Project scheduling is a complex and iterative task.
Scheduling refers to the time needed to conduct systems investigations, formulate the
logical design, code the software and prepare files, develop test data, test the software and
install it. In other words, each activity is associated with the project development requires an
amount of time that must be correctly estimated and incorporated in the project schedule.
A Gantt chart is a type of bar chart that illustrates a project schedule . This chart lists
the tasks to be performed on the vertical axis, and time intervals on the horizontal axis . The
Gantt Chart shows planned and actual progress for several tasks displayed against a
horizontal time scale. It is effective and easy-to-read method of indicating the expected and
actual status for each of set of tasks compared to planned progress for each activity of the set .
Gantt Charts provide a clear picture of the current state of the project.
The figure below shows the expected and actual durations of the first half of the
project timeframe.
18 | P a g e
Figure 3.3.1: Gantt Chart for first half of the project
The figure below gives the expected duration of the second half of the project
timeframe.
19 | P a g e
Figure 3.3.2: Gantt Chart for the second half of the project
20 | P a g e
Processor: Intel Pentium IV and above
RAM: 1GB or more
Hard disk 250 GB and more
Operating System:
o Microsoft Windows
o Smart Phone: 2 GB RAM and 8 GB and more ROM
Front End:
o PHP, CSS, HTML.
Back End:
o SQL Server 2008 R2
o Wamp Version 1.8.3-5
Others:
Documentation:
1. Admin
21 | P a g e
Administrator has maximum privileges to access the system. He maintains user login
details, can assign access rights to a user, can manipulate data and do all the transactions.
Administrator is the super-user of the system.
2. Service Provider:
In this android application service provider first do registration and then login after
this process the service provider can view the service which are ordered by user and send
acknowledgement to the user in positive reply. After that service provider get the QR code
which is matched with the QR code of customer.in this application we are providing the map
for the service provider to find his location. The then service provider comes at the place of
customer then he verifies the QR code with the customer and then do his work.
3. Customer:
In this application the customer first do registration and then do login, after the user
search for the particular service and receiver the list of service available on our android
application. The user then selects the service and request for the service after this process.
He/she can get acknowledgement as reply and get QR code which is unique for every user.
22 | P a g e
3.6.1 Entity-Relationship Diagram
23 | P a g e
Figure 4.3.5: Data Flow Diagram of the project
24 | P a g e
Figure 3.6.3.1: Admin Use Case Diagram of the project
25 | P a g e
Figure 3.6.3.2: Service Provider Use Case Diagram of the project
26 | P a g e
Figure 3.6.3.3: Customer Use Case Diagram of the project
27 | P a g e
Figure 3.6.4.1: Admin Sequence Diagram of the project
28 | P a g e
Figure 3.6.4.2: Voter Sequence Diagram of the project
29 | P a g e
Figure 3.6.4.3: Customer Sequence Diagram of the project
30 | P a g e
Figure 3.6.5: Activity Diagram of the Login and Registration
31 | P a g e
Chapter 4
System Design
1. Administrator
In this administrator module the service provider or admin having the authorization to
access this one. Admin is the super user of the system . In this module admin or service
provider will get the requests from the customers. In this module admin will receive the all
registration request from users. These requests will be scrutinized by admin that will be
details from the field mechanics, the admin will take decision like accept. Admin should give
the acceptance to the customer those who have send for booking the service register .
Customer’s acceptance will be finalized by the admin itself . Administrator can view the all
2. Registration Module
This is a module through which general user as well as customer’s will be registered
by admin. The user should provide the Entire information about him regarding name, contact
number, etc. User should upload his / her image at the time of registration. Also, the details
filled by customer’s and respective service provider should be accurate.
3. Customer Module
It will be providing interface to the customer . By this, customers can access the
system. Credentials will be provided by admin . By using these credentials customers can
enter home page. In this module service provider can manage his personal data . Service
32 | P a g e
provider will get the queries from admin of user registration request for further verification .
To the registration as Service provider, then the mechanics should be registered first.
The service provider registration request goes to admin . The acceptance will be given by
admin only. Customers can enter his home page by using his credentials that was accepted by
admin. In this module customers can view all the details about the service provider like
occupation, name, address, etc. this helps customer to book their mechanics as per their
requirements. Also, this benefits customer to know where the mechanics works and whether
the mechanics is in his area or is somewhere far away.
5. Reports
This module comes under admin module as sub module . By the admin can know
entire details about customer registration and different mechanics occupation wise . By this
admin can know who has booked which services
6. Authentication Module
This module contains all the information about the authenticated users . User without
his username and password can’t enter the login. If he / she is an authenticated user , only
then he / she can enter to his / her login and then he / she will have authorization based upon
their roles.
33 | P a g e
4.2 Data Design
A database design is a collection of stored data organized in such a way that the data
requirements are satisfied by the database. The general objective is to make information
access easy, quick, inexpensive and flexible for the user . There are also some specific
objectives like controlled redundancy from failure, privacy, security and performance. A
collection of relative records makes up a table. To design and store data to the needed forms
34 | P a g e
4.2.1.2 Service Registration Table
35 | P a g e
4.2.1.3 Customer Table
36 | P a g e
Column Data Type Indexes
Cat_Id Int (10) Primary Key
Category Varchar (50) Not null
Cat_Image Varchar (50) Not null
Table 4.2.1.7:
Feedback Table
37 | P a g e
Data integrity is used to maintain accuracy and consistency of data in a table. The
classification of data integrity is:
Pre-Defined Integrity: We can implement this using constraint. This is further divided
into three categories –
Entity Integrity: This integrity ensures that each row in a table is uniquely identified
entity. We can apply entity integrity by specifying primary key, unique key and not
null.
Referential Integrity: This integrity ensures the relationship between the tables. We
can apply this using foreign key constraints.
Domain Integrity: this integrity ensures the data values in a database follow defined
rules for values, range, and format. A database can be checked using these rules and
using Check and Default constraints.
Constraints are used for validating or restricting data. These are mainly used to restrict data
from table. Main three types of constraints in SQL Server are:
Default: Default constraints are used to assign the default value to the particular
column in the table. A table can contain any number of default constraints.
Unique: Unique constraints are used to avoid duplication of data in a column but
accepts null values in column. It also applies to any datatypes.
Not Null: These avoids null values from column-accepted duplicate values. It can also
apply on any datatype. A table can contain any number of null constraints.
Algorithm-
If root is NULL
then create root node
return
If root exists then
compare the data with node.data
while until insertion position is located
If data is greater than node.data
goto right subtree
else
goto left subtree
endwhile
39 | P a g e
insert data
end If
Stack: A stack is an Abstract Data Type (ADT), commonly used in most programming
languages. It is named stack as it behaves like a real-world stack, for example – a deck of
cards or a pile of plates, etc.
40 | P a g e
The below algorithm is implemented in the E –Booking System of Services.
Step 1: Start.
Step 2: Login into the system using the Credentials provided by the Admin in registered.
Step 4: After getting registered Login into the system using the credentials provided.
Step 5: After logging in into the system using correct credentials , book for your preferred
service provider.
Step 7: Once the booking is done you will able to see the various service providers.
Step 8: Book your services.
41 | P a g e
4.4.1 Home Page of the System
The Home Page of the system will consist of a Home Button, Login Button and
Registration Button on the upper right-hand corner . It will also display the various service
provider. After clicking on those service providers it will display the information of the
service providers.
42 | P a g e
Figure 4.4.2: Login Page of the System
After clicking on the login button, the user will be asked to login as an admin or a
voter and enter the credentials for the same. The login page will also consist of a Home
button, a Notifications button, a Sign In button and a Logout button to help the user logout of
the system.
43 | P a g e
4.4.3 Admin Login Page
When the Admin logs in into his / her account after entering correct credentials he /
she will be able to manage the customers as well as the service provider. The admin can
44 | P a g e
4.4.4 Customer Registration Page
When the customer registers into his account, he has to fill up all his details such as
name, city, email, password, re-type password, etc. out of these some of them have been
mentioned above. After registration his data will be stored in database along with all his
details.
45 | P a g e
4.4.5 Service Provider Registration Page
When the mechanics registers into his account, he has to fill up all his details such as
name, city, email, password, re-type password, occupation, etc. out of these some of them
have been mentioned above. After registration his data will be stored in database along with
all his details.
46 | P a g e
4.5 Security Issues
successful attack would be highly visible, and thus, motivating much of the related hacking
activity to date. Traditionally, security is incorporated in a software system after all the
functional requirements have been addressed. Due to its criticality , security should be
integrated in the software life cycle . Booking software security can be achieved if security is
merged into service booking software functional requirements during the early stages of
solutions to ensure accurate booking is done , secrecy of the accounts and security . As a
service booking method, any booking system needs confidence, without security there is no
confidence. When designing any security architecture of any service provider booking , they
There is a threat of introducing any malicious software onto the internet service
booking server, by any communication link or email and if huge number of PCs (personal
computers) connected to the internet service booking server, then any PC which is infected
with virus, there might be a greater number of chances to spread the viruses to the service
booking server. The insecurity of the browser setup or operating system , at the user end may
easily lead to install the malicious software, and which may change the confidentiality and
integrity of the getting services booked or even the customer may face number of issues and
47 | P a g e
2. Hacking
If the links of the service booking system is changed or hacked then the customer
may face difficulty in booking his/her services, which may create issues for them and not
getting issues solved immediately which may create problem for them later.
Data generated by unprotected gadgets and smart appliances provides cyber attackers
ample of targeted personal information that can lead to fraudulent transactions and identity
theft.
This is a threat when the customer books the services online and if the hacker
overloads the web server, then that may lead to prevent the customer from booking his/her
48 | P a g e
4.6 Test Cases
Testing is the process of executing a program with the intent of finding any errors .
Testing is vital to the success of the system . Without proper testing hidden errors will surface
after some time of use and perhaps irreversible damage has been done to valuable data . A
series of tests like responsiveness, its value, stress and security are performed before the
system is ready for user acceptance testing . System testing follows the logical conclusion that
is all part of the system are tested and found to be working properly under all kinds of
situations, and then the system is achieving its goal of processing the data perfectly ,
according to user rules and requirements. The different types of test cases are given below: -
49 | P a g e