Raghavcscfinal (1)
Raghavcscfinal (1)
INDIA
1
VELAMMAL
VIDYALAYA
PARUTHIPATTU
PROJECT REPORT ON
USING PYTHON
REGISTER NO. :
NAME : M.NIKITHA
CLASS : XII G
2
VELAMMAL VIDYALAYA
PARUTHIPATTU,AVADI
VELAMMAL VIDYALAYA
PARUTHIPATTU
CLASS–XII PROJECT
Register No.:
CERTIFICATE
This is to certify that M.NIKITHA of class XII-G,
3
INDEX
01 ACKNOWLEDGEMENT 05
02 INTRODUCTION 06
04 PROPOSED SYSTEM 07
07 FLOW CHART 17
08 SOURCE CODE 17
09 OUTPUT 20
10 TESTING 28
12 BIBLIOGRAPHY 32
ACKNOWLEDGEMENT
4
First and foremost my grateful thanks to the almighty for his divine
blessing and grace in making this project successful and I thank my parents
for giving me all this life and opportunity. I acknowledge my sincere thanks
to The Chairman and The Correspondent of Velammal Educational Trust for
providing me with this opportunity and the necessary facilities for
completing this study.
5
INTRODUCTION
development.
6
PROPOSED SYSTEM
wise saying
“to err is human” no longer valid, it’s outdated to rationalize your mistake.
So, to keep pace with time, to bring about the best result without
One has to use the data management software. Software has been an
are now in markets, which have helped in making the organizations work
ledgers and a lot of paper work has to be done but now software product on
this organization has made their work faster and easier. Now only this
This prevents a lot of time and money. The work becomes fully
7
SYSTEM DEVELOPMENT LIFE CYCLE (SDLC)
8
PHASES OF SYSTEM DEVELOPMENT LIFE CYCLE
INITIATION PHASE
9
SYSTEM CONCEPT DEVELOPMENT PHASE
10
PICTORIAL REPRESENTATION OF SDLC:
PLANNING PHASE
11
planning, concept of operations, system security, verification and validation,
and systems engineering management planning.
REQUIREMENTS ANALYSIS PHASE
Further define and refine the functional and data requirements and
document them in the Requirements Document,
Complete business process reengineering of the functions to be
supported (i.e., verify what information drives the business process,
what information is generated, who generates it, where does the
information go, and who processes it),
Develop detailed data and process models (system inputs, outputs,
and the process.
Develop the test and evaluation requirements that will be used to
determine acceptable system performance.
12
DESIGN PHASE
13
Everything requiring user input or approval is documented and
reviewed by the user. Once these documents have been approved by
the Agency CIO and Business Sponsor, the final System Design
Document is created to serve as the Critical/Detailed Design for the
system.
This document receives a rigorous review by Agency technical and
functional representatives to ensure that it satisfies the business
requirements. Concurrent with the development of the system design,
the Agency Project Manager begins development of the
Implementation Plan, Operations and Maintenance Manual, and the
Training Plan.
DEVELOPMENT PHASE
The development phase involves converting design specifications
into executable programs. Effective development standards include
requirements that programmers and other project participants discuss
design specifications before programming begins. The procedures help
ensure programmers clearly understand program designs and functional
requirements. Programmers use various techniques to develop computer
programs. The large transaction oriented programs associated with
financial institutions have traditionally been developed using procedural
programming techniques. Procedural programming involves the line-by-
line scripting of logical instructions that are combined to form a program.
Effective completion of the previous stages is a key factor in the success
of the Development phase. The Development phase consists of:
14
INTEGRATION AND TEST PHASE
This phase is initiated after the system has been tested and accepted
by the user. In this phase, the system is installed to support the intended
business functions. System performance is compared to performance
objectives established during the planning phase. Implementation includes
user notification, user training, installation of hardware, installation of
software onto production computers, and integration of the system into daily
15
work processes. This phase continues until the system is operating in
production in accordance with the defined user requirements.
================================================================
import mysql.connector
db1 = None
def connect():
global db1
db1=mysql.connector.connect(host="localhost",user="root",password="shreya060620
0 5",database="covid") def
showusers(): c1=db1.cursor()
c1.execute("select * from covid")
res=c1.fetchall()
#print(res) print("list of covid") for val in res:
print("username="+val[0]+"password="+val[1])
def login():
print("-"*50)
16
print("\t COVID VACCINATION RECORD") print("-"*50)
print("\t LOGIN") un=input("Enter User Name:")
pw=input("Enter Password:") q="select*from covid where
username=%s and pass=%s" val=(un,pw)
cursor2=db1.cursor() cursor2.execute(q,val)
result=cursor2.fetchall() print("-"*50) if
len(result)==0: print("invalid user name or
password") print("-"*50) return False else:
print("Access Granted!!!")
print("-"*50) return
True
def addmember():
ad=input("Enter character:")
name=input("Enter Name:")
address=input("Enter Address:")
phone=input("Enter phone number:")
email=input("Enter email:")
age=input("Enter age of member:")
aadhar=input("Enter Aadhar cardno:")
cursor1=db1.cursor()
q="insert into member values(%s,%s,%s,%s,%s,%s,%s)"
val=(ad,name,address,phone,email,age,aadhar)
cursor1.execute(q,val) db1.commit()
print("Member Added successfully")
def addvaccination():
ad=input("Enter Aadhar no:") name=input("Enter
vaccination Name:") d=input("Enter 1 for Dose 1: and ")
dt=input("Enter the date of vaccination:") c2=db1.cursor()
if d=="1": q="insert into vaccination values(%s,%s,
%s,NULL)" val=(ad,name,dt) c2.execute(q,val)
db1.commit() print("Vaccination Record Added
Successfully")
elif d=="2":
q="update vaccination set dose=%s where ad=%s"
val=(dt,ad)
c2.execute(q,val)
db1.commit()
print("Vaccination Record Updated Successfully
") else:
print("invalid input,please try again")
17
def showvaccine(): c1=db1.cursor()
c1.execute("select*from vaccination,member where
vaccination.ad=member.ad") res=c1.fetchall()
#print(res)
print("List of Vaccinated Members") print ("-"*40)
print("Name\tVaccine\tAadhar No\tDose1\tDose2") print
("-"*40) for val in res: print(val[5],"\t",val[1],"\t",val[0],"\
t",val[2],"\t",val[3]) def shownotvaccined():
c1=db1.cursor(); c1.execute("select*from member where ad
not in(select ad from vaccination)") res=c1.fetchall()
#print(res) print("List of Not Vaccinated Members")
print ("-"*40) print("Name\tAadhar\tphone\
tAddress\tEmail") print ("-"*40) for val in res:
print(val[1],"\t",val[0],"\t",val[3],"\t",val[2],"\t",val[4])
def showduevaccine(): c1=db1.cursor() c1.execute("select* from vaccination,member
where vaccination.ad=member.ad
and d is null") res=c1.fetchall()
#print(res) print("List of Members whose Dose2 is due")
print("-"*40) print("Name\tvaccine\tAadhar no\tDose1\
tDose 2") print ("-"*40) for val in res:
print(val[5],"t",val[1],"\t",val[0],"\t",val[2],"\t",val[3])
connect()
print("connected")
if login(): while
True: print("-"*50)
print("\t CHOOSE AN OPERATION")
print("-"*50) print("Press1-Add a New Society
Member")
18
OUTPUT
20
21
22
23
24
25
25
26
27
TESTING
TESTING METHODS
Software testing methods are traditionally divided into black box
testing and white box testing. These two approaches are used to describe
the point of view that a test engineer takes when designing test cases.
28
SPECIFICATION-BASED TESTING
The black box tester has no "bonds" with the code, and a tester's
perception is very simple: a code must have bugs. Using the principle, "Ask
and you shall receive," black box testers find bugs where programmers
don't. But, on the other hand, black box testing has been said to be "like a
walk in a dark labyrinth without a flashlight," because the tester doesn't
know how the software being tested was actually constructed.
That's why there are situations when (1) a black box tester writes
many test cases to check something that can be tested by only one test
case, and/or (2) some parts of the back end are not tested at all. Therefore,
black box testing has the advantage of "an unaffiliated opinion," on the one
hand, and the disadvantage of "blind exploring," on the other.
White box testing, by contrast to black box testing, is when the tester
has access to the internal data structures and algorithms (and the code that
implement these)
29
Types of white box testing:-
The following types of white box testing exist:
api testing - Testing of the application using Public and Private
APIs.
Code coverage - creating tests to satisfy some criteria of code
coverage.
For example, the test designer can create tests to cause all statements
in the program to be executed at least once.
fault injection methods. mutation testing methods. static
testing - White box testing includes all static testing.
30
HARDWARE AND SOFTWARE REQUIREMENTS
SOFTWARE REQUIREMENTS:
I. Windows OS
II. Python
III. MySqlClient
31
BIBLIOGRAPHY
1. NCERT Textbook
2. Computer science With Python - Class XI By : SumitaArora
3. A Project Report On Space Invader Game and Gold Loan
Shop
Management (GLSM)
By :M.Kalanithi
4. Website: https://www.youtube.com
32