Ashbel Govore O Level Project (Library Managemnet System VB - Net)
Ashbel Govore O Level Project (Library Managemnet System VB - Net)
BACKGROUND
Chibi High School is located in Chivi, Masvingo Province in Zimbabwe. Chibi High has a
school library. The school has a total population of one thousand (1000) students and forty (40)
teachers. The library was officially opened on the 26th of October 2013 by the honorable minister
of Psychomotor in Education, Mr. J.D Hungwe .The library has many departments which
consists of a research center, study rooms, the open shelves and short loan section. In the
research centre there is a Wireless Fidelity (WIFI) router. Students can go on the internet and do
some research. There are thirty three (33) desktop computers. Some of the students have their
own laptops. There is a very strong search engine in the computers because it uses the TP-LINK
router .In the study rooms there are fans and many desks which can accommodate all the A’ level
learners at Chibi High School. The library is managed by its Head Of Department, Mrs Magudu
and the librarian, Mrs Makumbe .In the reception open shelves are many books of every subject
that is done at Chibi High school .Some of the books in the library were donated by the Chibi
High Old Student Association (CHOSA), Book Aid International and some were bought by the
school which makes all the books available for every student’s requirements. Students also do E-
learning at the library research centre.
ORGANOGRAM
THE REVEREND
THE SCHOOL
HEADMASTER
THE DEPUTY
HEADMASTER
LIBRARY H.O.D
THE LIBRARY
2
File lost
File damaged
Difficult to search record
Space consuming
Cost consuming
PROBLEM DEFINITION / IDENTIFICATION
File lost
When computerized system is not implemented file is always lost because of human
environment. Sometimes due to some human error there may be a loss of records.
File damaged
When a computerized system is not there file is always lost due to some accident like
spilling of water by some member on file accidentally. Besides some natural disaster like
floods or fires may also damage the files.
Difficult to search record
When there is no computerized system there is always a difficulty in searching of records if
the records are large in number.
Space consuming
After the number of records become large the space for physical storage of file and records
also increases if no computerized system is implemented.
Cost consuming
As there is no computerized system the to add each record paper will be needed which will
increase the cost for the management of library.
INVESTIGATION OF THE CURRENT SYSTEM
RESEARCH INSTRUMENTS
A. Questionnaires
B. Interview guides
C. Record inspection
D. Observation
A. Questionnaires
3
This is a document with a series of questions designed to collect statistical information by filling
on the spaces provided .Questionnaires are used when collecting information from a widely
spread population sample and when collecting information from many people .A questionnaire
has open ended and closed questions .Open ended questions are questions that need to filled on
the gaps provided with his /her own views .Closed questions is where the respondent has to
choose Yes or No ,True or False or by ticking on the given options .Questionnaires can be
distributed personally or by posting .
ADVANTAGES OF QUESTIONNAIRES
They are not time consuming because are distributed and collected later
Questions are very simple to answer
They are cheap because they are less travel expenses
Respondents may fill correct information
DISADVANTAGES OF QUESTIONNAIRES
B. Interview guides
This refers to the face to face communication between two or more people in order to obtain
information .Interviews can also be done over the phone but the most common ones are face to
face .Interviews are done when you want to collect information from a very small population
sample.
ADVANTAGES OF INTERVIEWS
The researcher can ask for clarification on some points that may not be clear
Encourages good rapport between the researcher and the respondent
First hand information is collected
The researcher can probe to get more information
DISADVANTAGES OF INTERVIEWS
Biased information can be given since the respondent may not tell the truth
Good interview techniques are required
C. Record inspection
This refers to the fact finding method which involves scrutinizing system documents in order to
solicit information .Record inspection has some advantages too.
D. Observation
This refers to the fact finding method that involves viewing actual system in operation by the
researcher .The researcher can even take part in operating the system .It is when the
researcher wants to see for himself how the system operates.
ADVANTAGES OF OBSERVATION
DISADVANTAGES OF OBSERVATION
People work differently if they feel that they are being observed
Inaccurate information can be collected
The researcher may not understand some activities observed
It is time consuming to collect the information
5
Member Updates
Creates
Membership
membership
Details
Records
Updates book transaction in
Stock-book stock the lending book
Clears the
lending
Key
transaction
Predefined process
Strengths
Weaknesses
REQUIREMENTS SPECIFICATION
Software requirements
My SQL database
Hardware requirements
Compact Disk – Read Only Memory (CD-ROM) for storage of learning materials and
encyclopedia
Aims
Objectives
SECTION B
Cards are portable hence it can be easy during stock taking since you can easily walk with
the Stock cards
Cards Systems do not use electricity so eliminates electric costs or maintenance costs. It is
faster to compile lost book records in Fine and Replacement card tray therefore quickening
Lost Book Report.
Since it is faster to record and retrieve book records on the stock cards there is faster Book
Stock Level Report production
Has lack of security on book and borrower records since cards can easily be lost or
misplaced.
Borrower cards and stock cards become bulky with time as more Borrowers join and more
books are bought.
Inconsistence to records in the Lending Book and Fine and Replacement Book due to human
error and fatigue.
Reduction in process like looking for member’s record cards and files when member
borrows or returns and the file needs updating.
More working space is needed because of more terminals and this result in some space that
could be used for book shelves being consumed.
More furniture is needed and this makes the system expensive to run.
The system makes report production easy and fast since it allows direct access
Input Design
Data will be fed into the system through input forms. These input forms will be designed using
VB net. The forms are to pass data to the correct and appropriate tables and fields database.
9
Account type
User Name
Password
The form will be used to enter passwords in the corresponding database table so that the user will
be granted permission to use the system.
Account Type
User Name
Password
10
Book-Lending Form
Screen layout
Book Details
Book Code
Book Title
Lending Date
Book status
Save
Department
Delete
Borrower ID Update
Borrower Surname
Type of Borrower
It is used to enter details of the borrower and books being lend. Some of the details include Book
Code, Book Title, Borrower Name, Lending Date etc.In the corresponding database table.
Book Code
Book Title
Lending Date
Due Date
Book Status
Department
Borrower ID
Borrower Name
Borrower Surname
Type of borrower
Book-Entry Form
Screen layout
Book(s) Details
Book Code
New
Book Title
Author(s) Save
Department Delete
No. Of Books
Update
Supplier’s Name
Close
Price for Each
Date of Issue
12
It is used to enter details of a new book(s) that is being brought into the Library System. Some of
the details entered include Book Code, Book Title, Price etc. Into the corresponding table in the
database.
Book Code
Book Entry
Author(s)
Department
No. Of Books
Supplier’s Name
Price of Each
Date of issue
13
Book-Return Form
Screen layout
Book Details
Book Code
Book Title
Lost
Due Date
Save
Borrower ID Close
Borrower Name
Borrower Surname
Fine $
14
It is used to enter details of the borrower and the book they borrowed when they return it. Some
of the details entered include Book Code, Book Title, Return Date etc.into the corresponding
table in the database.
Book Code
Book title
Lost
Return Date
Due Date
Book Status
Type of Borrower
Borrower ID
Borrower Name
Borrower Surname
Supplier’s-Entry Form
Screen layout
Supplier’s Details
Supplies Save
Address
Clear
Phone no.
Close
Email
15
It is used to enter details of frequent and trusted suppliers into the database of the system. Some
of the details entered include Supplier’s Name, Address etc.into the corresponding table in the
database.
Suppliers Name
Supplies
Address
Phone No.
Output Design
TEST PLAN
Types of system testing
Alpha testing
Beta testing
ALPHA TESTING
It is carried out by the software developers’ in –house testing team
16
Testing by the programming team Testing by the programming team is ongoing as the
system is developed, but it is still very important to undertake tests at the end, after the
programming team believe that the system is finished. This formal testing at the end of
development is known as alpha-testing.
This is the formal testing at the end of development. It: • is undertaken by the
programming team; • uses data that the programmers perceive to be realistic; • is
designed to ensure that the requirements/objectives have been met.
This phase of testing is necessary because software developers will probably not anticipate
all the combinations of conditions that will occur when the software is in use in its ‘real’
environment. This is the stage of testing where problems with different hardware
combinations are usually discovered, as are problems with ‘clashing’ software. During beta
testing, users generally agree to report problems and bugs to the developers. These will then
be corrected and the software may then undergo a second round of beta testing before the
package is eventually released.
These end-users who test the system during beta-testing: • use the system with realistic
volumes of real data; • use the system with a variety of different hardware and
configurations; • report faults/errors back to analyst; • check that there is a reasonable
response time; • ensure that the user interface is clear; • ensure that the output as expected.
ACCEPTANCE TESTING
Acceptance testing is where the customer specifies tests to check that the supplied system
meets his/her requirements as specified at the analysis stage and that the system works in
their own environment.
Note that the tests and data are specified by the customer, but the testing itself may be carried
out by the customer or by the developer under the scrutiny of the customer
17
SECTION C
SOFTWARE DEVELOPMENT
1. TECHNICAL DOCUMENTATION
PSEUDOCODES
LOG IN FORM
LOG I N BUTTONMODULE
START
Private Sub Button1_Click(ByVal sender As System.Object, ByVal e As
System.EventArgs) Handles Button1.Click
If combobox1.Text = "Admin" And textbox1.Text = "ashbel" And
textbox2.Text = "ashy g" Then
MsgBox("WELCOME", MsgBoxStyle.OkOnly)
Me.Hide()
Form3.Show()
ElseIf combobox1.Text = "" And textbox1.Text = "" And textbox2.Text = ""
Then
MsgBox("INSET ALL INFORMATION", MsgBoxStyle.Information)
ElseIf combobox1.Text = "User" And textbox1.Text = "ashbel" And
textbox2.Text = "ashy g" Then
Me.Hide()
Form3.Show()
ElseIf combobox1.Text = "Admin" And textbox1.Text = "sam" And
textbox2.Text = "sammy" Then
MsgBox("WELCOME")
Me.Hide()
Form3.Show()
ElseIf MsgBox("enter correct information please!") Then
STOP
18
START
IF option =QUIT
THEN
Dim peace out = MsgBox ("PLEASE CONFIRM LEAVING THIS SYSTEM",
MsgBoxStyle.Exclamation + MsgBoxStyle.YesNo, "ALL system OUT")
If peace out = vbYes Then
MsgBox ("system quiting.CALL AGAIN", MsgBoxStyle.Information)
Application. Exit ()
Else If peace out = vbNo Then
MsgBox ("All systems standby for next instruction", MsgBoxStyle.Information)
End If
STOP
FLOWCHART
LIBRARY MODULE
19
CODES/PROGRAM LISTINGS
Imports System.Data.OleDb
Imports System.Security.Cryptography
Imports System.Text
Public Class FrmBkReturn
End Sub
Me.Book_ReturnTableAdapter.Fill(Me._ChibiLMS_DBDataSet.Book_Return)
End Sub
End Sub
End Try
End Sub
23
End Sub
End Sub
End Sub
End Sub
End Class
INSTALLING PROCEDURES
Insert the CD in the CD Drive and click on the setup icon and the system will
automatically install but the user would be accepting the changes which would be
done by the system
CLICK
As shown above click the icon named setup and follow the given instructions
After starting the system a splash screen appears welcoming you to the system as
shown below
On clicking the OK button the MAIN MENU form appears and there is a variety of
buttons which are used for the working ground and these include
• BOOK STOCK
• BOOK LENDING
27
• BOOK RETURN
• CREATE ACCOUNT
BOOK STOCK reveals the details of the stock that is still in and the on e waiting
to be dumped.
SECTION D :
SYSTEM TESTING AND EVALUATION
After a program has been coded, it must be tested with different data types to
determine if intended results are produced. The types of test data that can be used
include:
Extreme Data: Refers to the minimum and the maximum values in a given range.
For example, a computer program requires the user to enter any number from
(between) 1 to 20. 1 and 20 are extreme data and the computer must accept these.
Thus extreme data is accepted by the computer.
Standard (normal) Data: This refers to data that lies within (in-between) a
given range. In our example above, the numbers from 2 to 19 are standard data and
are accepted by the computer.
Abnormal Data: This refers to data outside a given range. As to our example
above, the number 0, -1, -50 and all number from 21 and above are abnormal data.
Valid data: refers to data of the correct data type. Invalid data is data of the wrong
data type. Thus if the user enter the value “Ashbel” instead of a number, this is
referred to as a wrong (invalid)
data type. Only numbers are needed, not text.
30
User testing
TEST DESIGN
In this part I am going to look at how the testing is to be carried out under the testing
phase. I am to look at stages of testing in the running system. Testing is to be done to
ensure that the system is smooth running and efficient. I am to test the performance and
functionality of the system. In this case I am to look at the following modules of testing,
system testing recovery testing and performance testing.
Module testing
Modules will be tested individually for any error in respect to validation, length format
of input and presence. The bottom up testing is to be used at the design section.
SUBSYSTEM TESTING
It involves testing collections of modules which have been integrated into sub system
.Subsystem are often independently designed and programmed and problems can arise
owing to interface mismatches .Interface need to be thoroughly tested
31
SYSTEM TESTING
This is subsystem are integrated to make up the entire system .This testing reveal errors
Test Test Field Reason for Testing Test Data Type Of Expected Actual
No. Test Outcome Outcome
resulting from the interaction between different subsystem .This system is also concerned
with ensuring that the system meets all the requirements of the original system
RECOVERY TESTING
It deals with how the system reacts after some forms of errors. Here testing is done by,
many users and mistakes are done deliberately by the users. This deals with the reaction
from sounds and message boxes that pop out in the system.
PERFORMANCE TESTING
It tests the time it takes the system to access some files in the database and also tests if
the system is handling the amount of data it is supposed to process and storing under the
user environment the average access time, it tests if the system is performing well as
expected.
32
Abnormal data
Data will be invalid either Wrong password or no password inserted at all
Extreme data
Data on either the upper or the lower boundaries of the given field
33
System testing
Ease of use
When the system is running, the splash form is the first form which will show out. Then
company information form will then pop out, then one will press Ok. After clicking it the
login form will appear, so that you will be able to use the system. Entering the correct
password on the textbox of password this will lead one to the main menu form with only
commands to view other forms. Every form provides commands to a certain task. For
example the check in form will show certain command like ADD NEW MARKS,
ABOUT US and LOGOUT so children information is entered when grading using the
MARK GRADING SYSTEM and the use any command is easy. If one enters ADD
34
NEW STUDENT and insert the required student details then a message will be popped
showing the details have been saved.
This system is easy to use because each command leads to another command until the
destination is reached.
Reliability
The system is reliable it produces reliable results after entering the student details to
mark grading form which will show reports entered results after clicking the OK button
to save to database as reflected above. It obviously show that the system has no bugs
because it shows information is saved with being disrupted
Effectiveness
On the effectiveness part, as soon as you enter the student marks details and click any
command button the system will eventually ADD the client in the database; since the
system is a real time system the message box will show as soon as the information is
added in a minimum time of 5 seconds as shown in the form above. If one opens the
database of Thorn Hill database the user will be already in there with his\her ID number.
However to a lesser extends l was not able to overcome the following stated objectives
Achievements
Since the system is real time it is efficient.
Can be retrieved and edited
Details in the database can be printed as reports
Security of data increased by use of passwords and this is done to maintain
security of files ,that is, when old password are known by unauthorized personnel
the user is able to change
Better degree of accuracy
Backing of files to cater for accidents that may occur
The data stored in the database stays in there even for years without being lost
There are error messages to help the user
Limitations
The system is affected by power cuts since it entirely depends on power. It cannot
function when there is no power.
When there is power cut the unsaved data is lost and there is no way for retrieving
it.
The system cannot make facility for client signatures to show agreement
APPENDICES
No Yes
1. Do you feel satisfied with the current system?
No Yes
4. How many files do you have for the whole mark grading system
5. Do you think the ways you are using for backups are safe No Yes
6. What is the rough estimate of people who book for a place daily
7. Is there any day when there are errors in the mark schedules No Yes
10. Are you comfortable with changing the system to a computerized one No Yes
………………………………………………………………………………………………………
…………………………………………………
12. What do you think is affecting the marks termly
………………………………………………………………………………………………………
………………………………………………………………………………………………………
………………………………………………………………………………………………………
…………………………………………………
13. What backup files are used in the
system………………………………………………………………………………………………
………………………………………………………………………………………………………
………………………………………………………………………………………………………
…………………………………………………………
14. Explain how you file your documents
………………………………………………………………………………………………………
………………………………………………………………………………………………………
………………………………………………………………………………………………………
………………………………………………....
.SIGNATURE…………………………………………………………
THANK YOU!!!!!!!!