Book Borrowing System Documation

Only available on StudyMode
  • Download(s) : 1031
  • Published : October 31, 2012
Open Document
Text Preview
BOOK BORROWING SYSTEM IN NORTHERN MINDANAO COLLEGES LIBRARY

APPROVAL SHEET

DEDICATION

ACKNOWLEDGMENT

EXECUTIVE SUMMARY

In our generation today, computer is very relevant to make our daily transaction more fast and accurate so that most company or any agencies use computers. That is the reason why we propose an automation program in northern Mindanao library to make it automated library in terms of book borrowing transaction. The book borrowing system in northern Mindanao colleges library program has many benefits to come up. In the librarian they are easy to them to find books, search and even the penalty of the borrower that have overdue books is easy to search. and for the borrower the program has a features that the students will search the available books and they can view their borrowed books so that they can warn when they need to return the books. And for the management it is easy to them to view the hardcopy the library book borrowing transaction.

The librarian or the library in charge can use this program by logging-in to their account. And the program automatically record the specific account of particular user who log in that specific date and time for the purpose of tracing the records if have problem arise. For the library assistant they have some restriction of this program, they can only search, view borrowed books, and view borrower’s transaction but they cannot delete books and delete borrower’s record. For the librarian or Admin they have full access to this program they can add user/s delete user/s add books, delete borrower’s record. And for the borrower/s they have borrower’s card. Inside that card the transaction is printed and this is the format “Full name of the borrower, Title of the book/s borrowed, Accession, date and time borrowed, specific date and time must be returned, penalties.” That transaction is automatically saved to the safe and secure database. The librarian or library in charge will print the records of borrowed books, unreturned books, lost books and also the available books. Additionally the program used the dynamic procedure to adjust the number of books that the borrower can borrow and for the date and time must be return for the issuance of penalty.

TABLE OF CONTENTS

LIST OF FIGURES

LIST OF TABLES

CHAPTER 1
INTRODUCTION

PROJECT CONTEXT

STATEMENT OF THE PROBLEM

OBJECTIVES OF THE STUDY

SCOPE AND LIMITATION

CHAPTER II
TECHNICAL BACKGROUND

TECHNICALITY OF THE PROJECT

DETAILS OF THE TECHNOLOGY TO BE USED

HOW THE PROJECT WILL WORK

CHAPTER-III
METHODOLOGY

TECHNICAL FEASIBILITY

COMPATIBILITY CHECKING (HARDWARE/SOFTWARE AND OTHER TECHNOLOGY)

RELEVANCE OF THE TECHNOLOGY

SCHEDULE FEASIBILITY
GANTT CHART

ECONOMIC FEASIBILITY
COST AND BENEFIT ANALYSIS
COST RECOVERY SCHEME

REQUIREMENTS MODELING
DATA AND PROCESS MODELING
* CONTEXT DIAGRAM
* DATA FLOW DIAGRAM
* SYSTEM FLOW CHART
* PROGRAM FLOW CHART

OBJECT MODELING
* USE CASE DIAGRAM
* CLASS DIAGRAM
* SEQUENCE DIAGRAM
* ACTIVITY DIAGRAM

DESIGN
* OUTPUT AND USER-INTERFACE DESIGN
(FORMS, REPORTS)

DATA DESIGN
* ENTITY RELATION DIAGRAM
* SYSTEM ARCHITECHTURE
(NETWORK MODEL; NETWORK TOPOLOGY, SECURITY)

DEVELOPMENT
* SOFTWARE SPECIFICATION
* HARDWARE SPECIFICATION
* PROGRAM SPECIFICATION
* PROGRAMMING ENVIRONMENT
FRONT END
BACK END
* DEPLOYMENT DIAGRAM
* TEST PLAN

TESTING
* UNIT TESTING
* INTEGRATION TESTING
COMPATIBILITY TESTING
PERFORMANCE TESTING
STRESS TESTING
LOAD TESTING

* SYSTEM TESTING
* ACCEPTANCE TESTING

CONCLUSION

RECOMMENDATION

IMPLEMENTATION PLAN

* PROJECT IMPLEMENTATION CHECKLIST
* IMPLEMENTATION CONTINGENCY
* INSFRASTRUCTURE/ DEPLOYMENT

BIBLIOGRAPHY/ WEBLIOGRAPHY

APPENDICES
* RELIVANCE SOURCE CODE
* SAMPLE INPUT/OUTPUT/REPORTS
* OTHER RELEVANT DOCUMENTS
* WORKING TITLE FORM
*...
tracking img