Book Shop Management System SYNOPSIS
Book Shop Management System SYNOPSIS
Book Shop Management System SYNOPSIS
Introduction:
In todays era computers have become a vital component of any enterprise for
giving it proper directions and extensive control of the various activities to attain
business objectives. Computer applications have affected scientific &
commercial knowledge.
The information System of the old times totally differs from the todays. It is
automation system of a book shop or any information system. In the previous
ages the process of maintaining data and record seemed very difficult. Now days,
computer is very essential component. The implementation of computer based
Information System can be depicted as the ease in handling and maintaining the
data bank of any size.
Our project is on Book Shop Management System whichdeals with almost all
the information of Book Shop .It keeps the database of customer records and
publishing records. It also keeps the author list, charges and Book-title list.
The business of Book Shop is spread all over the world. A large record should be
maintained in a proper manner for running of Book Shop.The proposed system is
a window based menu driven system. It reduces the paper works, time needed for
doing various tasks etc. Our project upholds the accuracy of data.
Project Objective:
The main objective of this work is to reduce the difficulties that are found in the
present system. The present system requires a lot of paper works, manual works
etc. The accuracy is less in the present system. The details must have to be stored
manually in the present system. In the present system, the details of a particular
book/transaction are stored in different registers by different persons; this often
leads to data isolation and inconsistency.
There is always an objective behind every innovation and behind every work. We
did have many objectives for our project which are described as follows:
I.
II.
III.
IV.
V.
In such a huge project where the amount of data to handle was tremendous,
there was strong demand for greater accuracy and consistency.
VI.
Since the system is subjected to be accessed by number users, the system must
safeguard sensitive and important data in a form that is accessible only to the
authorized personal.
VII.
Input validation features to make sure that only correct information has been
provided.
VIII.
IX.
X.
It Helps to Keep the entire information of the book shop in a systematic way
so that it becomes easier to know about the books and sale/purchase.
XI.
ER-DIAGRAM:
EnameEmpid
Pay
Job
P_addres
s
Publishi
d
Supplier
B_title
Bid
Publisher
Purchas
e
Publishid
Order
No.
ha
s
Book
D_id
Order No
Price
ISBN
NO
Bill
Distributor
Sell
Price
C_id
Bid
D_id
ha
s
Price
Cid
Emp_i
d
D_addres
s
Customer
Book-catalog
C_id
BookType
Cname
Caddress
BookType
D_name
eee
User
Create
User
Customer
User
Type
Save
User
View
Supplier
Details
View
Product
View
Change
Password
Subject
View
Purchase
Order
Sales
Invoice
Splash
View
Number of modules and their descriptions: 1. User: It is used to create a user along with its profile. It is also used to filter
an authorized user, in order to access the system.
2. Customer: - This module of the system gathers customers information and inserts it into
the database.
3. Supplier: - This module gathers suppliers information and inserts into the database.
4. BOOK: - This module manages the insertion of product specific information into the
system.
Data Type
Width
Constraint
Book_ID
Book_Name
Number
Varchar2
Varchar2
Varchar2
Varchar2
Varchar2
Number
Varchar2
10
50
50
50
50
50
10,2
100
Primary Key
Category_Name
Author
ISBN
No of Pages
UnitPrice
Description
Data Type
Width
Constraint
Supplier_ID
Number
10
Primary Key
CompanyName
Contact Person
Address
Phone
Fax
Email
Varchar2
Varchar2
Varchar2
Varchar2
Varchar2
Varchar2
50
50
100
15
15
30
Data Type
Width
Constraint
CustomerID
Number
10
Primary Key
ContactFirstName
ContactLastName
BillingAddress
PhoneNumber
D_O_J
Email_id
Fax-Number
Varchar2
Varchar2
Varchar2
Varchar2
Number
Varchar2
Varchar2
50
50
100
15
5
15
30
Data Type
Width
Constraint
Number
10
Primary Key
Number
Date
10
Foreign Key
Data Type
Width
Constraint
PurchaseOrder ID
Number
10
Primary Key
PurchaseOrderID
PurchaseProductID
PurchaseQuantity
PurchaseUnitPrice
PurchaseDiscount
NetValue
Number
Number
Number
Number
Number
Number
10
10
10
10
10
10
Foreign Key
Data Type
Width
Constraint
Invoice_No
Number
10
Primary Key
Order_ID
Payment
Dues
Date of Payment
Discount
Status
Number
Date
Varchar2
Number
Number
Number
10
Foreign Key
50
5
10,2
50
Data Type
Width
Constraint
Book_ID
Number
10
Primary Key
Number
Number
10
20
Foreign Key
Terms Used
Data Type
Width
Constraint
Supplay_ID
Number
10
Primary Key
Book_ID
Number
10
Foreign Key
Data Type
Width
Constraint
Supplier_ID
Number
10
Book_ID
Quantity
Cost
Date _Of_ Payment
Number
Number
Number
Date
10
20
10
10
Reports Generation: -
follows: i.
ii.
iii.
iv.
RAM
: - 1 GB RAM
Hard Disk: - 5 GB
Support
SOFTWARE REQUIREMENT
Operating
System
: - WINDOWS 98/ME/XP/7/8
Front End
Language
: - Visual Basic.NET
Back End
Language : - SQL/PLSQL
RDBMS
Software : - Oracle 10G
Security Mechanisms:
Security mechanisms mean different things to different people. The term
"security" is somewhat vague unless it is discussed in some context. Here are
some points that could clarify what actually Security Mechanisms means: i.
ii.
iii.
Authenticated.
iv.
Encrypted.
v.
Audited.
vi.
Well-defined.
vii.
Verified.
viii.
Well-behaved.
ix.
C2 or B1 certified
Based on the above definition, the security mechanisms provided in our project
are as follows: -
I. Use of Net9-compliant firewall on the server (both Web and Database): it basically separates a protected network from an unprotected one, on the
Internet/Intranet. It screens and filters all connections coming from the
Internet/Intranet to the protected (corporate) network, and vice versa,
through a single, concentrated security checkpoint.
II. Use of user id and password before entering highly secured areas on
the site i.e. Administrative Entry.
III. Use of ORACLE: - ORACLE provides extensive features to safeguard
our information from both unauthorized viewing intentional or inadvertent
damage. This security is provided by granting or revoking privileges on a
person-by-person and privileges-by-privileges basis, and is in addition to
any security our computer system already has.
The use of oracle lets us to implement the following security mechanisms: i.
ii.
iii.
IV. Use of JAVA technology: -It provides simple mechanisms for protecting
our computer (i.e. database and files) from evil programs like viruses. We
have used policytool utility to create a policy file that contains the
appropriate permission.
Further Enhancement: - The project can be extended to make it WAPEnabled so that it can be accessed using a Micro-Browser build within a Mobile.
The client of the project: - This System is capable enough to customize it as
per need of the specific organization.
real world. Because, when the project is running it may produce some errors.
And the database is restricted because the Supplier cant add the records more
than hundred records. This project can use more memory and more CPU. Finally,
we can say that this project is made for the supplier but they cant use in real.
Guidelines in writing the scope and delimitation. The scope
and delimitation should include the
following: