online film ticket booking
TRANSCRIPT
Online film ticket booking
INTRODUCTION
1. Introduction
1.1 Project Profile
Online film ticket booking system provides user a platform to enquire about the current movies in their
city and provides them the facility to book their movie ticket. This application is one of the widely used
web portal in present generation for booking tickets through online which had created scope for
introducing new features in existing system. This efficiently reduces the effort of film ticket buying at
the theatre in direct.No need of queue maintenance and rush, one can book the ticket of a movie from his
or her home itself if she or he has got an internet connection.Through this user can easily know about the
movies released and then make a choice.
OBJECTIVE OF THE PROJECT
The main purpose of our online ticket booking system is to provide another way for the
customer to buy cinema ticket. It is an automatic system.
After inserting the data to database, staff need not to due withthe order receive through the
system. In fact, there is similar system on the internet, but there is no refund method found inthe
existing system.
This system is basically aimed to provide the customer the complete information of the
movie, according to which the customer can book the tickets and the refund facility provides
more flexibility to the system.
The goals of our system are:
1. To provide a anytime anyplace service for the customer
2 .To minimize the number of staff at the ticket box3 To promote the film on the
Internet
1.2 Organization Overview
SAFE SOFTWARE AND INTEGRATED SOLUTION Pvt Ltd, Palakkad, has been in the Co-operative
Banking Computerization field for the past 18 years. Now they are one of the leading Private Limited
companies providing Total Solution (Banking Software, system software, computer hardware,
networking, training & Consultancy) for computerization in Co-operative Banking Sector in Kerala.
They expertise in Software, Hardware & Networking Maintenance reach many satisfied customer Banks
in all over Kerala and Andaman Nicobar. Most of their customer- Banks are looking for single point
maintenance for their Software, Hardware and Networking related problems. They confidently took up
this responsibility and satisfactorily provided Total Computer Solution to all their Customers. They have
full-fledged and well-equipped computer software, hardware and network training and maintenance
facility in Palakkad town. Safe’s training and maintenance centre has a group of highly qualified and
experienced personnel.
AN ISO 9001:2008 CERTIFIED COMPANY
ISO 9001:2008 is the standard that provides a set of standardized requirements for a quality
management system, regardless of what the user organization does, its size, or whether it is in the
private, or public sector. It is the only standard in the family against which organizations can be
certified – although certification is not a compulsory requirement of the standard.
2. About the Developing Tools
2.1 Introduction to .NET The .Net Framework is made up of four parts,
The Common Language Runtime
A Set of Class Libraries
A Set of Programming Languages
ASP.NET Environment
The .NET Framework was intended to make Windows application much more reliable, while also
providing an application with greater degree of security. It was intended to simplify the development of
web application and services. The framework was designed to provide a single set of libraries that would
work with multiple languages. The .NET Framework is a common environment for running Web
applications and Web libraries-like ADO.NET, ASP.NET and Windows forms- to provide advanced
standard services that can be integrated onto a variety of computer systems. The Framework provides-
rich application environment, simplified development and easy integration between a numbers of
different languages. Currently it supports Visual Basic, C++, C# and Jscript (The Microsoft version of
Java Script).
2.2. Features Of The Language
The .NET Framework is the infrastructure for the Microsoft .NET platform. It is an environment
for building, deploying, and running Web applications and Web Services. The .NET Framework
contains a common language runtime and common class libraries - like ADO.NET, ASP.NET and
Windows Forms –to provide advanced standard services that can be integrated into a variety of
computer systems.
The.NET Framework is designed for cross-language compatibility. Cross-language compatibility
means .NET components can interact with each other irrespective of the language they can write in.
An application written in VB .NET can reference a DDL file written in C# or a C# application can
refer to a resource written in VC++, etc. This language interoperability extends to Object-Oriented
inheritance.
This cross-language compatibility is possible due to common language runtime. When the .NET
program is compiled, the output of the compiler is not an executable file but a file that contains a
special type of code called the Microsoft Intermediate Language (MSIL).
This MSIL low-level language which is designed to be read and understood by the common language
runtime. Because all .NET executables exist as IL, they can freely operate. The common language
Specification defines the minimum standards that .NET language compilers must confirm to. Thus,
any code compiled by a .NET compiler can interoperate with the .NET Framework.
Since all .NET applications are converted to IL before execution all primitive data types are
represented as .NET types. This means that, a VB Integer and a C both the languages use # int are both
represented in IL code as System.Int32. Because both the languages use a common and interconvert
able type system, it is possible to transfer data between components and avoid time-consuming
conversions.
2.3 ASP.NET
ASP.NET stands for Active Server Pages .NET. This is used to create web pages and web
technologies and is an integral part of Microsoft's .NET framework vision. As a member of the .NET
framework, ASP.NET is a very valuable tool for programmers and developers as it allows them to
build dynamic, rich web sites and web applications using compiled languages like VB and C#.
ASP.NET is not limited to script languages, it allows you to make use of .NET languages like C#, J#,
VB, etc. It allows developers to build very compelling applications by making use of Visual Studio,
the development tool provided by Microsoft. ASP.NET is purely server-side technology. It is built on
a common language runtime that can be used on any Windows server to host powerful ASP.NET web
sites and technologies.
Advantages of using asp.net
ASP.NET drastically reduces the amount of code required to build large applications.
ASP.NET makes development simpler and easier to maintain with an event-driven, server side
programming model.
ASP.NET pages are easy to write and maintain because the source code and HTML are together.
The source code is executed on the server. The pages have lots of power and flexibility by this
approach.
The source code is compiled the first time the page is requested. Execution is fast as the Web
Server compiles the page the first time it is requested. The server saves the compiled version of
the page for use next time the page is requested.
The HTML produced by the ASP.NET page is sent back to the browser. The application source
code you write is not sent and is not easily stolen.
ASP.NET validates information entered by the user without writing a single line of code.
2.4 About C# C# represent the next step in the ongoing evolution of programming languages. Its creation
was deeply rooted in the process of refinement and adaptation that has characterized computer
language development for the past several years. Like all successful languages that came before c#
builds upon the past while advancing the art of programming created by Microsoft to support
development for its Dot net framework ,C# leverages time tested features with the cutting edge
innovations. It provides a highly usable efficient way to write programs for the modern enterprise
computing environment. Which includes windows ,the internet components and so on.
2.5 SQL Server 2005
Microsoft SQL Server is a relational model database server produced by Microsoft. Its primary
query languages are T-SQL and ANSI SQL.SQL Server 2005 (codenamed Yukon), released in October
2005, is the successor to SQL Server 2000. It included native support for managing XML data, in
addition to relational data. For this purpose, it defined an xml data type that could be used either as a
data type in database columns or as literals in queries. XML columns can be associated with XSD
schemas; XML data being stored is verified against the schema. XML is converted to an internal binary
data type before being stored in the database. Specialized indexing methods were made available for
XML data. XML data is queried using XQuery; Common Language Runtime (CLR) integration was a
main features with this edition, enabling one to write SQL code as Managed Code by the CLR. SQL
Server 2005 added some extensions to the T-SQL language to allow embedding XQuery queries in T-
SQL. In addition, it also defines a new extension to XQuery, called XML DML, that allows query-based
modifications to XML data. SQL Server 2005 also allows a database server to be exposed over web
services using TDS packets encapsulated within SOAP (protocol) requests. When the data is accessed
over web services, results are returned as XML.
For relational data, T-SQL has been augmented with error handling features (try/catch) and support for
recursive queries with CTEs (Common Table Expressions). SQL Server 2005 has also been enhanced
with new indexing algorithms, syntax and better error recovery systems. Data pages are check summed
for better error resiliency, and optimistic concurrency support has been added for better performance.
Permissions and access control have been made more granular and the query processor handles
concurrent execution of queries in a more efficient way. Partitions on tables and indexes are supported
natively, so scaling out a database onto a cluster is easier.
2.6 Operating System
WINDOWS 7
Windows 7 is an operating system released by Microsoft on October 22, 2009. It follows the
previous (sixth) version of Windows, called Windows Vista. Like previous versions of Windows,
Windows 7 has a graphical user interface (GUI) that allows you to interact with items on the screen
using a keyboard and mouse. However, Windows 7 is also includes a feature called "Windows
Touch" that supports touchscreen input and multitouch functionality. For example, you can right-
click a file by touching it with one finger and tapping it with another. You can also zoom in on an
image by touching it with two fingers, then spreading your fingers apart. Windows 7 is bundled with
several touch-ready programs that are designed for touchscreen use.
Windows 7 is available in the following editions:
Windows 7 Home Premium - the standard version installed with most home PCs and includes all of
the features listed above.
Windows 7 Professional - typically installed on business computers and includes all the Home
Premium features as well as additional features such as Windows XP mode (XPM) and Domain
Join.
Windows 7 Ultimate - the most complete version, which has all of the Professional features as well
as BitLocker data protection and additional language support.
System Analysis
3. System Analysis
EXISTING SYSTEM
The existing system is a tedious work due to manual data handling of records . Manual data handling leads to the wastage of money and time .The speed and accuracy is less in the existing system . There is a chance of occurring manual errors while handling the transactions at the agency.
Limitations of existing system
•Existing System consumes more time
•Possibility of occurring human errors
•No data security and inconsistency
3.3 Feasibility Study
Feasibility study is a procedure that identifies, describes and evaluates candidate system and selects
the best system for the job. An estimate is made of whether the identified user needs may be satisfied
using current software and hardware technologies. The study will decide if the proposed system will be
cost effective from a business point of view and if it can be developed given existing budgetary
constraints. The key considerations involved in the feasibility analysis are economic, technical,
behavioral and operational.
Technical Feasibility
The assessments of technical feasibility centers on the existing system and to what extent it can
support the proposed addition. This was based on an outline design of candidate system requirements in
turns of inputs, files, programs, procedures and staff. It involves financial considerations to
accommodate technical enhancements.
Economic Feasibility
Economic analysis is the most frequently used method for evaluating the effectiveness of a
candidate system. It is more commonly known as cost benefit analysis, the procedure to determine the
benefits and savings that are expected from a candidate system and compare them with costs. If the
benefits outweigh costs then a decision is made to design and implement the system. Otherwise make
alteration in the proposed system.
Operational Feasibility
People are inherently resistant to change, and computers have been known to facilitate change.
An estimate should be made about the reaction of the user stag towards the development of a
computerized system. Computer installations have something to do with turn over, transfers and
changes in job status. The introduction of a candidate system requires special effort to educate, sell and
train the staff for conducting the business.
The Candidate system was found to be technically, economically and behaviorally feasible. The system
was developed user friendly, needless training and improves the working environment. Justification of
any capital outlay is that it will increase profit, reduce expenditures or improve the quality of service or
goods, which in turn may be expected to provide increased profits. Disregarding the initial expenses,
the candidate system was assessed to be feasible in all ways to implement.
3.4 Fact finding techniques
Requirements analysis encompasses all of the tasks that go into the investigation, scoping and
definition of a new or altered system. The first activity in analysis phase is to do the preliminary
investigation. During the preliminary investigation data collecting is a very important and for this we can
use the fact finding techniques.
The following fact finding techniques can be used for collecting the data:
Observation – This is a skill which the analysts have to develop. The analysts have to
identify the right information and choose the right person and look at the right place to achieve his
objective. He should have a clear vision of how each departments work and work flow between them and
for this should be a good observer.
Requirements analysis is an important part of the system design process, whereby requirements
engineers and business analysts, along with systems engineers or software developers, identify the needs
or requirements of a client. Once the client’s requirements have been identified and facts collected, the
system designers are then in a design a solution.
3.5 Proposed System
The main objective of the proposed system is to overcome the drawbacks in the manual system. Also some modification have to make it a simple and user friendly. Redendency and inconsistency problems are completely solved in the proposed system . High speed and accuracy are the main features of the proposed system over the manual system.
Advantages
Heavily reduces the human workload
It is user friendly and simple
Fast information flow.
3.3 Proposed SystemThe main aim of the project is any user they can access the system through website at
any time without going to the company. As a new user also he can collect all
information like as a movies Available ,list of theatres
This project contains three modules
1 .Admin
2. Booking tickets
3. Users
3.4 Feasibility Study
Feasibility study is a procedure that identifies, describes and evaluates Online film ticket booking
and selects the particular movie ,then user ensure the particular seat availability. An estimate is made of
whether the identified user needs may be satisfied using current software and hardware technologies.
The study will decide if the proposed system will be cost effective from a business point of view and if it
can be developed given existing budgetary constraints. The key considerations involved in the feasibility
analysis are economic, technical, behavioral and operational.
Technical Feasibility
The assessments of technical feasibility centers on the existing system and to what extent it can support
the proposed addition. This was based on an outline design of conline film ticket booking system
requirements in turns of inputs, It involves financial considerations to accommodate technical
enhancements.
ENTITY-RELATIONSHIP Diagrams
E-R (Entity-Relationship) Diagram is used to represents the relationship between entities in the
table.
The symbols used in E-R diagrams are:
SYMBOL PURPOSE
Represents Entity sets.
Represent attributes.
Represent Relationship Sets.
Line represents flow
Structured analysis is a set of tools and techniques that the analyst.
To develop a new kind of a system:
The traditional approach focuses on the cost benefit and feasibility analysis, Project
management, and hardware and software selection an personal considerations.
ER DIAGRAM
Admin
User name
Age
Password Address
EmailID
gender
New User Details
Theatre
name
Add movie, Theatre,tickets
User Name
User phno
Seat Nos
Movie Name
Tickets
CostUser name Show time
No of tickets
4.DATABASE DIAGRAM
System Specification
4. System Specification
4.1 Software Specification
Operating System : Windows XP/7
Front end : ASP with C#
Back end : SQL server 2005
Documentation : Microsoft Word
Hardware Requirements
Processor : Pentium IV
RAM : 512MB
Hard disk : 20GB
Memory : 64MB
Monitor : SVGA color
Keyboard :Standard 106 key
Mouse : Mouse suitable for windows operating System.
System Design
5. System Design 5.1 Introduction to System Design
System design deals with planning and designing of the system. It is a solution that is the
translation of requirements into ways of meeting them. The design will determine the success of
the system.
The goal of the design process is to produce a model or a representation of a system,
which can be used later to build that system. The produced system is called the design of the
system.
The design process for software systems often has two levels.
System design: - At the first level the focus is on deciding which modules are needed for the
system, the specifications of these modules, how the modules should be interconnected. This is
what we call the top level design or system design.
Detailed design: - In the second level, the internal design of the modules or how the
specifications of the module can be decided upon. The design is called detailed design. Detailed
design essentially expands the system design to contain a more detailed description of the
processing logic and the data structures such that the design is sufficiently complete for coding.
The system design describes the characteristics of the system.
Modularization is the process of partitioning the system into modular units of limited
size to simplify maintenance when necessary. Each and every module is selected according to
the function. Modularization makes system development simpler. It is an attempt to minimize the
complexity of the problem. Modular design increases the flexibility of the system. The system is
partitioned into different segments. The program code is also divided into different subroutines
according to the options.
5.2 Input Design
Input design is the process of converting user-oriented inputs to a computer-based format. The
quality of system determines the quality of system outputs. All the data entry screens should be of
interactive nature so that the user can directly input data according to prompt messages. The input
design determines whether the user can interact directly with the computer. Interactive input screens
ensure the reliability and accuracy of the system.
5.3 Output Design
Output design generally refers to the results and information that are generated by the system.
For many end-users, output is the main reason for developing the system and the basis on which they
evaluate the usefulness of application.
The objective of a system finds its shape in terms of the output. The analysis of the objective of a system
leads to determination of outputs. Outputs of a system can take various forms. The most common are
reports, screen displays, printed form, graphical drawing etc. The output also varies in terms of their
contents, frequency, timing and format.
The users of the output, its purpose and sequence of details to be printed are all considered. The output
from a system is the justification for its existence. If the outputs are inadequate in anyway, the system
itself is inadequate. The basic requirements of output are that it should be accurate, timely and
appropriate, in terms of content, medium and layout for its intended purpose. Hence it is necessary to
design output so that the objectives of the system are met in the best possible manner. The outputs are
in the form of reports.
When designing output, the system analyst must accomplish things like, to determine what information
to be present, to decide whether to display or print the information and select the output medium to
distribute the output to intended recipients.
5.4 Database Design
The database design procedure transforms the information domain model created during
the analysis into tables that will be required to implement the software or system. A database is a
collection of data. Some of the major task in computer system is to store and manage data. To
handle these tasks a specialized computer program known as DBMS is needed. A DBMS stores,
process and retrieves data efficiently. The database design is made-up of two levels.
1. Conceptual Level 2. Normalization
Conceptual Level
This level represents the major data objects and relationship between them. Conceptual
level describes the essential feature of the system data.
Normalization
After the conceptual level, the next level of process of database design to organize the
data structure into a good shape is called Normalization.
The normalization simplifies the entries, removing the redundancies from the system data and
finally builds a data structure, which is both flexible and adaptable to the system.
There are six rules associated with normalization and are the key factors for a good database
design. The six rules are:
1NF (First Normal Form) – Each row and column must have a single value with no
repeating values.
2NF (Second Normal Form) – Each non-key column must depend on the primary key
column.
3NF (Third Normal Form) – No non-key column can depend on another non-key column.
BCNF (Boyce Code Normal Form – No attribute of a composite key can depend on the
attribute of another composite key.
4NF (Fourth Normal Form) – An entity cannot have a 1:1 relationship between primary
key columns and non-key columns.
5NF (Fifth Normal Form) - Break all tables into the smallest possible pieces to eliminate
all redundancy within a table.
5.5 System Module
Admin module
It deals with the entire master forms.
Hotel module
This module deals with the various hotel details.
Itinerary module
It deals with the fixed touring packages , it schedule and custom itineraries in this reserving of hotels and vehicles etc has been handled.
Vehicle module
It deals with various types of vehicle details.
Report module
In this module we can generate the various tourism portal reports.
5.6 Data Flow Diagram
5.6.1 Introduction to DFD
A Data flow diagram (DFD) is a diagram that describes the flow of data and the
processes that change or transform data throughout a system. Four basic symbols are used to
construct data flow diagram. They are symbols that represent data sources, data flows, data
transformation, and data storage.
Basic data flow diagram symbols are:-
A “square” defines a sources (originator) or destination of a system data.
An “arrow” identifies data flow. It is a pipe line through which information flows.
A “Circles” represents a process that transforms incoming data flow(s) into
outgoing data flow(s).
An “open rectangle” is data storage.
Login Enter Login Details Manage Vehicle Module
Manage Hotel Module
Manage Admin Module
Generate itineraryItinerary Generate reports
Reports
Verification
5.6.2 Data Flow Diagrams
DFD
Hotel Db
Vehicle db
user master
ER DIAGRAM
TABLE DESIGN
CUSTOMER DETAILS
ENQUIRY
FEEDBACK
HOTEL
ITENARY
PACKAGE
PAYMENT
REGISTER
ROOM TARIFF
STAFF
VEHICLE
VEHICLE DETAILS
VEHICLE TARIFF
System Testing
6.System Testing
System testing is the stage of implementation, which is aimed at ensuring that the system works
accurately and efficiently before live operations commands. The logical design and physical design
should be thoroughly and continually examined on paper to ensure that they would work after
implementation. Thus the system testing is a confirmation of accuracy.
6.1.1.TESTING METHODOLOGIES
Integration Testing
The integration is the next important concept that highlights in the testing scenario.
Integration testing can be performed in different strategies. One of them is the Big Bang testing
in which one could first test all of a system’s modules separately and then whole systems at once.
But here we proceed abruptly from the module testing and the integration testing disappears.
Another alternative is the Incremental Testing With the Incremental testing there are many
advantages. We can start the integration as soon as reasonable subsets of modules have been
developed. It is easier to localize errors incrementally. The partial aggressions of modules often
constitute important subsystems that can have autonomy with these testing. The need for stubs
and drivers can be reduced.
UNIT TESTING
Unit testing focuses on the verification efforts in the module. The unit testing is always a white
box oriented one and this step can be conducted in parallel for modules.
The module interface is tested to ensure that information flows in and out appropriately. The
local data structures are examined to ensure that data stored temporarily. Boundary conditions are
tested to ensure that the module is operating properly at the boundaries established. All independent
paths through the control structures are implemented to ensure that all statements in a module are
executed at least once.
REQUIREMENT TESTING
The main aim of this test plan is to see whether the outputs generated and inputs given
according to the user requirements and specifications. This is done in the security department by the
developer with the project team who conducted the actual test. The suggestions arise in the testing
should be incorporated in the project.
USER TESTING
During the testing the tester plays the role of the individual who desires to penetrate into the
system. The tester may attempt to acquire passwords through external clerical means and may attack
the system. The tester may also overwhelm the system thereby denying service to others and purposely
generate system errors and also browse through data.
VALIDATION TESTING
At the end of user testing, software is completely assembled as a package, interfacing errors
have now been uncovered and correcting testing begins. Software testing and validation are achieved
through a serious black box tests that demonstrate conformity with the requirement.
A plan outlines the classes of tests to be conducted and test procedure defines specific cases
that will be used to demonstrate conformity with requirements. Both the plan and the procedure are
designed to ensure that all functional requirements are achieved, documentation is correct and other
requirements are met. After the validation test, one of the two possible conditions exists.
They are:
1. The function or performance characteristics confirm to specification and are accepted.
2. A deviation from the specification is uncovered and a deficiency list is created.
The deviation or error discovered at this stage in a project can rarely be corrected prior to scheduled
completion. It is necessary to negotiate with the customer to establish methods.
OUTPUT TESTING
The output testing is one of the most important tests in system testing. The outputs generated should
be according to the customer requirement. The output should be an acceptable one to the user.
SYSTEM IMPLEMENTATION
7. IMPLEMENTATION
The first step to do before implementation is to install .Net and SQL server with
windows. The first part of installing all the require software and hardware with proper
networking has been done in the first phase. And in the second phase the software installed and
shows the user how it runs. The successful implementation of the new system depends upon the
involvement of staff working in the department. The stage consists of testing the developed
program with sample data, Detection & correction of errors, Testing whether the system meets
user requirements, Creating files of the system with the actual data, Making necessary changes
are desired by the user, Training user personnel, An implementation design of method is to
achieve the changes over method. After that the user should check all hardware configurations.
After installing the required application software the user has to check and verify all installed
component. The module are implemented and tested one by one Includes Project Information,
Client Information, Technical Analysis, Technical Advice, Verification System
The main aim of this Implementation plan is to see whether the outputs created and inputs were
given according to the user requirements and specifications that have been established. This was
done in the security department by having the developer as a secondary person and another
employee who conducted the actual test. Some Suggestion was made while requirement testing
was done that has been incorporated. The implementation means the conversion of a newly
developed system into action.
The three types of implementation are
Implementation of new computer system to replace the existing system.
Implementation of modified application to replace an existing system.
Implementation of a computer system to replace the manual system.
The implementation phase involves mainly three steps:
7.1.1 Planning
The implementation of the system involves people from different sections and it involves
many problems. Co-operation from different staff members was sought for successful
implementation.
7.1.2 Training
Good training is to be provided to the user of the system. An operation manual provided
with the system makes the process easier
7.1.3 Changeover
It is the process of converting the existing system. The new system was found easier to use and
the staff were satisfied with reports generated by the new system
8. System Maintenance
EFFECTIVE MAINTAINENCE
Proposes that the improvement of an existing quality management system (QMS) through
flexibility and innovation will increase product and service quality, which will in turn enhance
and advance the organization’s business objective. Explores the “segmentalist” and “integrative”
concepts within the context of construction firms. Findings from a research project suggest that
these should be removed from or implemented into the organization where necessary. Believes
that organizations must adopt the “integrative” approach which looks ahead into the challenges
of the future rather than the “segmentalist” approach which is contented with past
accomplishments. Suggests that a corporate renaissance must be created within the organization
to take on these challenges and to implement change and innovation. It is therefore necessary to
develop the humanistic factors and a “participatory management” environment. However, in so
doing, the technical aspects are also of importance and should not be totally ignored. These are
collectively the key elements to maintaining a quality management system effectively.
PREVENTIVE MAINTAINENCE
Preventive maintenance can be defined as follows: Actions performed on a time- or machine-
run-based schedule that detect, preclude, or mitigate degradation of a component or system with
the aim of sustaining or extending its useful life through controlling degradation to an
acceptable level.
9. CONCLUSION
The scope of the project has been described and can be extended to give flexibility of performing
the maintenance of the tour details and calculating the bill after choosing tour packages. Customer
can register and book tour packages as per their requirements. Customer can view various tour
packages ,hotel details etc.Its very user friendly.
FUTURE ENHANCEMENT
BIBILIOGRAPHY
1. Visual Studio 2005 Black Book - Rob Thayer
5. Mastering Database Programming with Visual Basic 6 - Evangelos Petroutsos
6. Software Engineering - Pressman
7. System Analysis and Design - James A.Senn
8. An Introduction to Database Management System - C.J.Date
APPENDIX