cyber report file

Upload: dheeraj-jha

Post on 03-Jun-2018

230 views

Category:

Documents


0 download

TRANSCRIPT

  • 8/12/2019 Cyber Report File

    1/35

    Index

    Introduction

    Programming concept

    Language introduction Data flow diagram.

    Header file.

    User defined function.

    Codes.

    Hardware requirement.

    User interface.

    Data storing method.

    Advantages & disadvantages.

    Conclusion. i!liograph".

  • 8/12/2019 Cyber Report File

    2/35

    Introduction

    Our pro#ect is !ased on a small data management topic. Cyber cafmanagement$ this is protot"pe model of data storing technique andmanagement. In this pro#ect we include a small part of customer detail

    information of a c"!er cafe. %hich !ased on following quer"

    %hat information a!out customer required

    How each customer identified

    %hat are !asic requirement of c"!er caf'

    %hat initial process performed to maintain information

    %hich is most difficult tas( to maintain data information )tc.

    *or a!ove solving a!ove pro!lem we decide to create a simple program withour initial (nowledge of computer programming.*or solving a!ove pro!lem we follow the software engineering+s concept of

    modeling technique.

    %e use water fall model.%ater fall model provide following pro!lem solving technique.

    Anal"sis.

    Design

    Coding.

    ,esting

    Implementation.

    All a!ove technique we discuss in ne-t part of our documentation.

  • 8/12/2019 Cyber Report File

    3/35

    Programming concept

    Analysis: -in this technique we consider the pro!lem. %hat is pro!lem %henwe defined the pro!lem then it is eas" to find the solution.

    As in previous session we define following pro!lem.

    %hat information a!out customer required

    How each customer identified

    %hat are !asic requirement of c"!er caf'

    %hat initial process performed to maintain information

    %hich is most difficult tas( to maintain data information )tc.

    *or each pro!lem we consider following solution.

    %hat information a!out customer required

    *or this we define that at initial name$ address$ contact$ login and

    logout time is enough information a!out an" customer.

    How each customer identified

    *or this pro!lem we consider ID of customer which provided !" an"authorit" as government of India for each person. And that will

    provide for relia!le management for managing data.

    %hat initial process performed to maintain information

    ,he following initial process required to maintain data storage.

    Add new entr".

    aintaining master record.

    /earch record.

    Log management 0per hour surfing cost1.

    %hich is most difficult tas( to maintain data information

    ,he most difficult tas( of marinating data information is displa"ingdata. Hear we use a searching option which search through man"option and displa" record list a!out that option. And also displa" list

    of all record.

    Design: -in this technique we draw a data flow diagram which provides !asicstructure to draw pro#ect.

    Coding: -in this technique we use c language to implement pro#ect on thedesigned structure.

    Testing: -in this session we test our pro#ect in different environment$ access

    man" data. 2n each entr" it gave appropriate result.Implementation: -in this session we consider the future modification on our

    pro#ect. ecause in this initial stage we done man" mista(e. /o in

    future we tr" to overcome the disadvantages.

  • 8/12/2019 Cyber Report File

    4/35

    Language introduction

    The language use to construct the emplo"ee s"stem is C. %e have use C !ecause

    we all are quite familiar with it. It is relia!le$ simple and eas" to use out of the

    do3en of languages Availa!le. C is a high level language that provides high level

    programming with efficienc" !ecause it has the power of the machine language.

    C is general4purpose structured programming language. Its instructions consists of

    )nglish terms that resem!le alge!raic )-pressions of augmented !" certain

    )nglish 5e"words such as if$ )lse$ for do & while.

    C !ridges the gap !etween conventional high level languages and machine

    language. ,his allows C to !e used for /"stem programming as well as the

    application programming. C is characteri3e !" the a!ilit" to write ver" concise

    /ource program due in the part of the large no. of operator within the language it

    has relativel" small instruction set$ though actual implementation includes

    e-tensive li!rar" functions$ which enhances the !asic functions. *urther more$

    the language encourages the

    user to write additional li!rar" functions of their own. ,hus$ the user can easil"

    e-tent the features and capa!ilities of the language. Another important

    characteristics of C is that its program are highl" porta!le$ even more so then with

    the other langue the reason for this is that C relegates most computer dependentfeatures to its li!rar". ,hus$ C accompanied !" its own sets of li!rar" functions$

    which are written for the particular characteristics of the host computer. ,hese

    li!rar" functions are relativel" standardi3ed$ however$ and each individual li!rar"

    function it generall" accessed in the same manner from one version of C to

    another. ,herefore$ ost C program can !e processed on different computers with

    little or no alteration.

  • 8/12/2019 Cyber Report File

    5/35

    Data flo diagram

  • 8/12/2019 Cyber Report File

    6/35

  • 8/12/2019 Cyber Report File

    7/35

    &ser defined function

    In this pro#ect we use following function.

    'ain(): -it recogni3e !" operating s"stem$ for e-ecution of program.

    'ain*indo(): -it provide the main user interface window.

    searc#():- ,his function use to search an" information a!out

    customer.

    status*sub*sub():- ,his function provide status for an" login (e".

    status*sub():- It also Provide status a!out user information (e".

    status():- It provide main window (e" status in status !ar.

    sub*sub*fn():- It function to provide save entr" & displa" in main

    widow.

    sub*fn():- ,his function use we see su!9su!9fn & use it.

    logout():- ,his function should have delete information from main

    window.

    cloc+*sys():- ,his function provide us simple cloc( to see current

    time & date.

    #istory():- It provide us to see Histor" A!out All Customer.

    int ascii(c#ar arr,):- ,his function Convert character from in ascii

    from.

    int asci(c#ar asc):- ,his function also Convert in ascii.

    int tmdiff(c#ar tm.,/c#ar tm0,):- ,his function find difference

    !etween two different time.

    log():- ,his function provide us to change timing rate our self.

  • 8/12/2019 Cyber Report File

    8/35

    Codes:- main()

    void main01

    :

    int gd;D),)C,$gmtc>>!gi=1rectangle0J$$getma--014J$?1

    rectangle0F?$B$J@?$EJ1

  • 8/12/2019 Cyber Report File

    14/35

    Codes:- sub*sub*fn()

    setcolor0@J1

    !ar0@EE$@?$@B$1tOs>tOs>tOs>tOs>t

    Os>n=$s"s$name$add$contect$id9t"pe$id9no$lt$lot$ld1;)2*1countNNtOs>tOs>tOs>tOs>tOs>t

    Os>n=$s"s$name$add$contect$id9t"pe$id9no$lt$lot$ld1;)2*1

    :

    if0strcmp0nameE$name1;;?strcmp0nameE$add1;;?

    strcmp0nameE$contect1;;?strcmp0nameE$id9t"pe1;;?strcmp0nameE$id9no1;;?1

    :

    outte-t-"0@E$"$s"s1

    !ar0@RE$@E$BB$@JB1

    printf0=Os=$ans1