And While We Were Here Movie Download

Posted on  by admin


Watch And While We Were Here Online Or Download And While We Were Here Online: Instead we’ve a attraction that includes a girl yearning for fun United Nations agency finds it by having a fling with with a bored school child. Granted, he’s handsome however she might have picked concerning the other child off the road considering however. So, you can download and watch any latest movie for mobile using this website. We Were Enjoying these Songs While Studying,(Discreetly in the Class. We Were Soldiers (2002) - Download Movie for mobile in best quality 3gp and mp4 format. And while the movie highly succeeds in conveying the horror. 'The Last Duel' is a co-production between the United Kingdom and United States from 2021, so still a very recent movie. And while we are revisiting. While working on a writing project on the island of Ischia, a married woman (Bosworth) enters into an affair with a younger man.


1. Certificate
2. Preface
3. Acknowledgement
4. Organization Profile
5. Introduction to ASP.NET using C#
7. Planning Phase
8. Analysis Phase
9. Design & Implementation
10. Screen Shots & their Description
11. Testing
12. Bibliography

Effective management of projects is vital for the developmentof economy because development itself is the effect of series of successfulmanaged projects. This makes project management extremely important problemarea for developing economy such as ours. Unfortunately many projectsexperience schedule slippage and cost overruns due to variety of reasons. Toremedy the situation, a project has to be meticulously planned, effectivelyimplemented and professionally managed to achieve the objective of the time,cost and performance. Computerization of the project management can play amajor role in streamlining the management of project. Thus we see the computerbecoming necessity in the day to day life. The use of computer also involvesthe feeling of healthy competition with the organization receiving muchattention these days. Almost everyday uses of paper carry advertisements askingfor project managers. The scenario was not so bright a few years back. For thatmatter even today though lots of seminars are held on project management, nameof the universities in India offer any course to students to formallyqualify as project managers. Thus, while there is very little supply. This hascreated all sorts of problems. Project management, unfortunately, is not butproject manager practice, our attempts to demonstrate how project management,as it is concerned, can be put into practice.

Online Cinema Ticket Booking Description

Welcome to newly designed website cinema ticket booking is a faster, cleaner and a tad more personal website, specially designed to make your booking experience better. Log on, navigate and find out for yourselves and if time permits leave your valuable feedback.

Customers may view the contents of any movie show at any time and may book any movie ticket as needed. The program automatically calculates the subtotal and grand total. When a visitor decides to finally book the ticket, the order information including the buyer's name, address and billing instruction is stored in the database securely and payment has been made.
The combo booking is also provided at the time of booking the ticket and there’s a wonderful facility of delivering the combos at your seat when you are watching the movie.
You need to register a new user whenever you have first visited or site then for future it will be stored in our database permanently and you can book you movie ticket at any time you want with this username and password.

Online Cinema Ticket Booking Features

  • Database Search Feature
  • Supports credit card transactions
  • Supports SQL database for movie database for speedy movie info lookups.
  • Can save customer contact information for their next visit, so they do not have to re-type it.
  • Using the SQL module the cart can handle very large product databases.
  • Ability to store order information in a secure file
  • Ability to order more than one ticket and combo at a time
  • Ability to assign the different seat numbers to different users.

Online Cinema Ticket Booking Working

The booking information is kept in a text database, which consists of: combo cost, username, seat type, no of seats booked, ticket cost and net payable amount to be paid by the customer. This database is modified when the user books the ticket.
The customer can be presented with a booking page, which allows them to add more of the same items or remove items from the combo items. The booking page also shows the seat type to be booked, no of seats to be booked, service charges to be applied, ticketing cost and net payable amount to the customer.

When the customers have done their booking they will checkout using the payment information page. This page collects data about the customer, his bank name, his credit card number, credit card type, address, telephone number, mobile number, and CVV information.


Feasibility study is done so that an ill-conceivedsystem is recognized early in definition phase. During system engineering,however, we concentrate our attention on four primary areas of interest. Thisphase is really important as before starting with the real work of building thesystem it was very important to find out whether the idea thought is possibleor not.
ØEconomic Feasibility: An evaluation ofdevelopment cost weighted against the ultimate income or benefit derived fromthe developed system.
ØTechnical Feasibility: A study of function,performance and constraints that may affect the ability to achieve anacceptable system.
ØOperational Feasibility: A study about theoperational aspects of the system.

Economic Analysis

Among the most important informationcontained in feasibility study is Cost Benefit Analysis and assessment of theeconomic justification for a computer based system project. Cost BenefitAnalysis delineates costs for the project development and weighs them againsttangible and intangible benefits of a system. Cost Benefits Analysis iscomplicated by the criteria that vary with the characteristics of the system tobe developed, the relative size of the project and the expected return oninvestment desired as part of company’s strategic plan. In addition, manybenefits derived from a computer-based system are intangible (e.g. betterdesign quality through iterative optimization, increased customer satisfactionthrough programmable control etc.)As this is an in-house project for thecompany, to be used for its own convenience and also it is not that big aproject. So neither it requires a huge amount of money nor any costly tools or infrastructureneed to be set up for it.


During technical analysis, the technicalmerits of the system are studied and at the same time collecting additionalinformation about performance, reliability, maintainability and predictability.
Technical analysis begins with anassessment of the technical viability of the proposed system.
ØWhat technologies are required to accomplishedsystem function and performance?
ØWhat new materials, methods, algorithms orprocesses are required and what is their development risk?
ØHow will these obtained from technical analysisform the basis for another go/no-go decision on the test system? If thetechnical risk is severe, if models indicate that the desired function can notbe achieved, if the pieces just won’t fit together smoothly-it’s back to thedrawing board.
As the software is vary much economically feasible, then it isreally important for it to be technically sound. The software will be buildamong:
ØASP.NET as Front End

Operational Feasibility

The project is operationally feasible.This project is being made for the convenience of the patients and doctorsonly. This system will greatly reduce a huge burden of doctors. So because ofthe above stated advantages the users of the system will not be reluctant atall.


System analysis is the process of studying the business processorsand procedures, generally referred to as business systems, to see how they canoperate and whether improvement is needed.
This may involve examining data movement and storage, machines andtechnology used in the system, programs that control the machines, peopleproviding inputs, doing the processing and receiving the outputs.
The investigation phase is also known as the fact-finding stage orthe analysis of the current system. This is a detailed study conducted with thepurpose of wanting to fully understand the existing system and to identify thebasic information requirements. Various techniques may be used in fact-findingand all fact obtained must be recorded.
A thorough investigation was done in every effected aspect whendetermining whether the purposed system is feasible enough to be implemented.


Asit was essential for us to find out more about the present system, we used thefollowing methods to gather the information: -
1.Observation: - Necessary to seethe way the system works first hand.
2 Documentsampling: - These are all the documents that are used in the system. They are necessary to check all thedata that enters and leaves the system.
3 Questionnaires: - These were conductedto get views of the other employees who are currently employed in the system.

Strengths of the System

1.No complex equipment: - Theequipment that is used is very simple and no special skills have to be masteredto be able to operate the system. Therefore no training is required for theemployees.
2.Low cost: - There is little money spent inmaintaining the present system other than buying the necessary office equipmentand the ledgers.


The constraints and limitation within a system are the drawbacksthat occur during the implementation of the system. These limitations andconstraints can crop up in almost every system; the most important fact is tofind a way to overcome these problems.
Software design is the first of three technical activities – design,code generation, and test that are required to build and verify the software.Each activity transforms information in manner that ultimately results invalidated computer software.
The design task produces a data design, an architectural design, aninterface design and component design.
The design of an information system produces the details thatclearly describe how a system will meet the requirements identified duringsystem analysis. The system design process is not a step by step adherence ofclear procedures and guidelines. When I started working on system design, Iface different types of problems; many of these are due to constraints imposedby the user or limitations of hardware and software available. Some times itwas quite difficult to enumerate that complexity of the problems and solutionsthereof since the variety of likely problems is so great and no solutions areexactly similar however the following consideration I kept in mind duringdesign phased.


The primary objective of the design is to deliver the requirementsas specified in the feasibility report. These are the some of the objectives,which I kept in mind.
ØPracticality: The system is quite stable andcan be operated by the people with average intelligence.
ØEfficiency: I tried to involve accuracy, timeliness and comprehensiveness of thesystem output.
ØCost: It is desirable to aim for the systemwith a minimum cost subject to the condition that it must satisfy the entirerequirement.
ØFlexibility: I have tried that the systemshould be modifiable depending on the changing needs of the user. Suchmodifications should entail extensive reconstructing or recreation of software.It should also be portable to different computer systems.
ØSecurity: This is very important aspect which Ifollowed in this designing phase and tried to covers the areas of hardwarereliability, fallback procedures, and physical security of data.


The first step in the Software Development Life Cycle (SDLC) is thepreliminary investigation to determine the feasibility of the system. Thepurpose of the preliminary investigation is to evaluate project requests. It isnot a design study nor does it include the collection of details to describethe business system in all aspect. Rather it is the collection of the informationthat helps committee members to evaluate the merits of the project request andmake an informed judgment about the feasibility of the proposed project.
Thepreliminary investigation should accomplish the following objectives.
ØClarify and understand the project request.
ØAssess costs and benefits of alternativeapproaches.
ØDetermine the technical and operationalfeasibility of alternative approaches.
ØReport the findings to management; withrecommendations outlining the acceptance or rejection of the proposal.

Requirement And FeasibilityAnalysis - MOVIE TICKET BOOKING SYSTEM PROJECT

Prior to stating whether the system we have to develop is feasibleor not we believe that we should emphasize on what is implied by the word“Feasibility”. Feasibility is the measure of how beneficial or practical thedevelopment of the system will be to the organization. It is a preliminarysurvey for the systems investigation. It aims to provide information tofacilitate a later in-depth investigation.
The report produced at the end of the feasibility study containssuggestions and reasoned arguments to help management decide whether to commitfurther resources to the proposed project.
Within the scheduled duration we were assigned to study both thepositive and negative aspects of the current manual system, in which we havecome up with a number of drawbacks that prevent the progress of the clinic ifit is continued to function manually.
Having gone through all measures of feasibility we report to themanagement to figure out if the objectives of the new system are met.
For e.g. - Is the system within the budget allowed for it?
Will theorganizations needs, be met by the new proposed system as
If and when the objectives of the system are met and the newsystem is approved, then the more specific details in the proposal should beconsidered and approved.

Types Of Feasibility
There are various measures of feasibility that helps to decidewhether a particular project is feasible or not. These measures include-
Each of these types will be explained in detail throughout theproject report.

Operational Feasibility

A proposed system is beneficial only if it can be turned into aninformation system that will meet the operational requirements of anorganization. A system often fails if it does not fit within existingoperations and if users resist the change.
Important issues a systems developer must look into are:
·Will thenew system be used if implemented in an organization?
·Are theremajor barriers to implementation or is proposed system accepted withoutdestructive resistance?
The whole purpose of computerizing the Placement System is to handlethe work much more accurately and efficiently with less time consumption. Therewill be additional work to be completed, because now the students and thecompanies can update their resumes and profiles online. Their database ismaintained separately.
Compared to the semi-computerized system the chances of avoidingerrors in a computerized system is much higher because the user need not stresshimself unnecessarily resulting in recklessness. Unlike the semi-computerizedsystem there would be backup data for all the information concerning the dailytransactions occurred within the organization.
If we are considering the performance and response time for eachtask, it is very much faster since there is less paper work to be completed.When entering data into the system to relieve the user from additional work andtyping incorrect data, the system provides options such as combo boxes, checkboxes, option buttons and etc. if the users type in incorrect data they wouldbe informed immediately about the error by the error detection control.
Another important fact to be regarded is the security control, whichis handled by the system. Since data regarding each student and the company isconfidential, security is a key issue. Information falling into the wrong handscould jeopardize the entire organization. Unlike in semi-computerized systemsthe proposed system offers adequate control to protect the organization againstfraud and embezzlement and guarantees the accuracy and security of data andinformation. This is handled by the system providing each department andindividuals with separate login names and passwords.
The new system is more user-friendly, which enables the end-user tocomplete his/her work efficiently and accurately with interest. After takingthe above fact into consideration we can state the operating of the proposedsystem within the organization is feasible.
In this phase of the feasibility study the following two main topics
·Acceptancewithin the organization
Technical performance aspect is explained in the technicalfeasibility report and there is no new information is needed in this to explainit again, but as for the acceptance within the organization the followingpoints are important and those are explained according to the topics
1.Whetherthe system provides right information to the right place.
In the current system which is the semi computerized system theinformation may be lost in the process of sending from one place to another.This is mainly due to human interaction in the process of the transferringinformation from one place to another.
2.Whetherthe new system affect the current users in the system
The new proposed system will affect the users in the following areas


System security is a vital aspectwhen it comes to developing a system. The system should ensure the facility ofpreventing unauthorized personnel from accessing the information and the datawithin the system. The system should provide total protection for each user’sinformation so that the integrity of data is sustained and also prevent hackersfrom hacking the system.
The proposed system ensures the security and the integrity of data.This is done by providing a password login system for each authorized users.And for example the System Administrator has access to all kinds ofinformation.
By providing this facility information is properly managed andinformation is protected. For example the system administrator’s day to daytasks are lessened and easier because he doesn’t have to have a constant eye onthe system and worry about hackers hacking the system.

Economical And Financial Feasibility

In making recommendations a study ofthe economics of the proposed system should be made. The proposed system mustbe justifiable in terms of cost and benefit, to ensure that the investment in anew/changed system provide a reasonable return.
Cost-benefit analysis of information is complicated by the fact thatmany of the systems cost elements are poorly defined and that benefit can oftenbe highly qualitative and subjective in nature.
In our proposed system various costs are evaluated. Even thoughfinding out the costs of the proposed project is difficult we and assume andestimate the costs and benefits as follows.
According to the computerized system we propose, the costs can bebroken down to two categories.
1.Costs associated with the development of thesystem.

SoftwareRequirement Specification

The software requirement specification is produced at theculmination of the analysis task. The function and performance allocated tosoftware as part of system engineering are refined by establishing a completeinformation description, a detailed functional description, a representation ofsystem behavior, an indication of performance requirement and designconstraints appropriate validation criteria, and other information pertinent torequirement.
The introduction to software requirements specification states thegoals and objectives of the software, describing it in the context of thecomputer based system.
The Information Description provides a detailed description of theproblem that the software must solve. Information content, flow and structureare documented.
A description of each function required to solve the problem ispresented in the Functional Description.
Validation Criteria is probably the most important and ironicallythe most often neglected section of the software requirement specification.
Software requirement specification can be used for differentpurpose. Here are the major uses.
not clearly understood by the developer. If this is the case, acareful analysis – involving much interaction with the user should be devotedto reaching a clear statement of requirements, in order to avoid possiblemisunderstandings.
Sometimes, at the beginning of a project, even the user has no clearidea of what exactly the desired product is. Think for instance of userinterface , a user with no previous experience with computer products may notappreciate the difference between , saymenu driven interaction and a command line interface. Even an exact formationof system functions and performance may be missing an initial descriptionproduced by an inexperienced user.
Astatement of the requirements for the implementation:
Specifications are also used as a reference point during productimplementation. In fact, the ultimate goal of the implementation is to build aproduct that needs specification. Thus the implementers use specificationsduring design to make design decisions and during the verification activity tocheck that the implementation compiles with specifications.


Let’s look at the key building blocks of .NET and some related technologies.
·C#, a new language
C# is the first component oriented language in the C and C++ family of languages. It is a simple, modern, object oriented and type- safe programming language derived from C and C++. C# combines the high productivity of Microsoft Visual Basic and the raw power of C++.
  • Common language runtime

The high performance common language runtime includes as execution engine, a garbage collector, post in time compilation, a security system, and a rich class framework (the .NET Framework). The runtime was designed from the ground up to support multiple languages.
·Common language Specification
The Common Language Specification (CLS) describes a common level of language functionality. The relatively high minimum bar of the CLS enables the creation of a club of CLS compliant languages. Each member of the club enjoys dual benefit: complete access to .NET functionality and rich interoperability with other compliant languages. For e.g. a Visual Basic class can inherit from a C# class and override its virtual methods.
·A Rich Set Of Languages That Target The Runtime
Microsoft provided languages that target the runtime include Visual Basic, Visual C++ with Managed Extensions,
Visual C# and J Script. Third parties are providing many other languages- too many to list he


1.Interoperability between languages and execution environments
2.Uniformity in schema or formats for Data Exchange using XML, XSL
4.Programming complexity of environment is reduced

2.The new approach to building large scale distributed systems for the Internet
3.Provides the capability to integrate multiple devices
4.Built around the tools and protocols (XML, WSDL, SOAP, HTTP) that are becoming standard on the Internet
The .NET in ASP.NET stands for the .NET Framework, a set of objects and blueprints from Microsoft for building applications. All applications developed under the .NET Framework; including ASP.NET applications, have certain key features that ensure compatibility, security, and stability.
Common Language Runtime (CLR) is an environment that manages the execution of code. With the .NET Framework and CLR, we write code and compile it. However, instead of compiling it into the computer understands, we compile it into a language called Microsoft Intermediate Language (MSIL). When we compile to MSIL, your application produce something called metadata. This is descriptive information about your application. It tells what the application can do, where it belongs, and so on. When you want to run your program, the CLR takes over and compile the code once more into the computer’s native language. This way MSIL can go on any type of computer. The CLR can speak many different computer languages and does all the compiling for you. Once you compile your application, you can bring it to any other computer. CLR also provides services such as error handling, security features, versioning and deployment support, as well as cross-language integration. That means we can choose any language we want to write our .NET applications, including ASP.NET applications.
The .NET Framework Design Goals
2. 'Cross-Language Development”
4. Reliability and Security
6. Device-agnostic


ASP.NET is a technology that allows us to build and control dynamic Web pages easily. It also provides many enhancements to take advantage of new technology as we can interact with databases, personalize Web pages for visitors, display page on mobile devices (such as cell phones), and even build an entire e-commerce site from scratch.
Previously internet works on request/response model that is an integral part of client/server model. Although this is a marvelous way of communicate and distribute information, it's rather simple and static. When the process is over, once client receives the requesting page from the server the server has no idea what the client is doing unless it makes another request.
There is another model for communicating between server and clients, known as event-driven model.ASP.NET work on this model, it detects action and responds to them i.e. the server waits around for something to happen on the client. Once it does, the server takes action and performs some piece of functionality. Of course, a Web, server can not know what you are thinking, but it can respond to your actions. If you type some text on Web page, the server responds to it. If you click an image, the server responds.


SQL Server is an SQL-compliant RDBMS. SQL-compliant means it use the ANSI (American National Standard Institute) version of Structured Query Language or ‘SQL’. Structured Query Language is a command that allow us to modify or retrieve information from the database.

Client server means that SQL Server is designed to store data in the central location (the server) and deliver it on demand to numerous other locations (the client). SQL Server is also a Relational Database Management System (RDBMS).


ØInformation representation
ØSystematic treatment of Null values
ØHigh level Update, Insert, and Delete
ØAccepting query language statements.
ØEnforcing data integrity specifications
ØManaging data sharing
ØOptimizing queries


Theoverall objective in the development of the database technology has been totreat data as an organizational resource and as an integrated whole. Databasemanagement system allows data to be protected and organize separately fromother resources. Database is an integrated collection of data. The mostsignificant of data as seen by the programs and data as stored on the directstorage access storage devices. This is the difference between logical andphysical data. The organization of data in the database aims to achieve freemajor objectives:

ØData Integration

ØData Integrity

ØData Independence

The databases are implemented using a DBMS package. Each particularDBMS has unique characteristics and general techniques for Database Design.

Theproposed Management Information System stores the information relevant forprocessing in the Microsoft SQL Server Database. This MS SQL Server containstables, where each table is called a field or column. A table also containsrecords which is a set of fields. All records, in a table the same set offields with different information. Each table contains key fields thatestablish relationships in a MS SQL server database and how the records arestored. There are primary key fields that uniquely identify a record in atable. There are also fields that contain the primary key from another tablecalled foreign keys.
Itis a known fact that the program cannot be written until the data are defined,so the database must be defined. The starting point for this process is datadictionary. The records data structures and elements to be stored in eachdatabase are identified and extracted.


The basic system requirements for running this projectare listed below:
·Microsoft Windows 2000professional, Microsoft Windows XP Home editions, Microsoft Windows XPProfessional edition
·Sql Server 2005
·Microsoft .net Framework 2.0
·Pentium or equivalentmicroprocessor(400 MHz or faster)
·At least 256 MB of RAM
·At least 10MB of free harddisk space
·Video graphics and monitorwith at least 800 X 600 resolution


In database design, several views of data must beconsidered along with the persons who use them. In addition to datastructuring, where relationships are reflected between and within entities, weneed to identify the application program’s logical views of data within anoverall logical data structure. The logical view is what the data look like,regardless of how they are stored. The physical view is the way data exist inphysical storage. It deals with hoe data are stored, accessed, or related toother data in storage.

The schema is the view that helps the DBMS decidein storage act upon as requested by the application program.

Certain rules followed in creating and relatingdatabases in the relational databases. This governs how to relate data andprevent redundancy of the data in the databases. The first set of rules calledrelational rules ensures that the database is a relational database. The secondset called the normalization rules simplifies the database and reduce theredundancy of the data.


When large volumes of data are being handled, it isimportant that the item be identified, stored or selected easily and quickly.To accomplish this, each data item must have unique identification and must berelated to other items of the same type. Codes can provide brief identificationof each item, which replace longer description that would be more awkward tostore and manipulate.

The ability to interruptcodes, evaluate coding schemes and devices new or improved codes are importantskills for a system analyst. Common types of codes are:


A sequence code has no relation to thecharacteristics of an item. Here a dictionary is required. The data is arrangedalphabetically and numbered sequentially. When a new data item is added it isgiven the next sequence number. The advantage of this code is that it has theability touched with an unlimited number of digits.


It is a codein which the number describes measurable physical characteristics of the item.

Here, the item are specified by the user of letterand number combinations,


It uses acheck digit to check the validity of codes. These types of codes are animportant means of controlling the validity of data that are being processed.


A commonproblem with computer system is that it is very easy to put incorrect data intothem. So the input data is validated to minimize errors and data entry. Forcertain data specific code has been given and validations are done which enablethe user to enter the required data and correct them if they have entered wrongcodes, e.g. you could mistype a link name or a URL in a database resulting inreports being occurred in the wrong link name. if you put incorrect data intothe computer system then you will get incorrect results out of it. Processingincorrect inputs will produce incorrect outputs. This lead to the acronym: GIGO(Garbage In Garbage Out).

Sometimes incorrect data can actually cause acomputer system to stop work temporarily. This is a particular problem in batchprocessing systems when data may be processed overnights. If incorrect datastops a batch processing systems for working then a whole night processing timemay be lost.

People who develop computer systems go to a lot oftrouble to make it difficult for incorrect data to be entered. The two maintechniques used for this purpose are:



A verification check ensures that data i9s correctlytransferred into a computer from the medium that it was originally stored on.Verification checks are usually used to check that a data entry worker hascorrectly typed information written on a data collection form into a computer.

Methods of Verification:

ØOn-Screen prompts: After auser has entered some data it is redisplayed on the screen. The user isprompted to read the data and confirm that it has been entered correctly. Ifthe user has entered any data incorrectly he should response that the data isinaccurate and retypes the incorrect parts.

ØDualInputs: This method is used when data is entered through the keyboard. The datato be entered is typed in twice by two different operations. The two copies ofdata are been compared, any difference are detected, the operators will beprompted to retype the sections that differ until both copies agree.

A validation check is anautomatic check made by computer to ensure that any data entered into thecomputer is sensible. A validation check does not make sure that data has beenentered correctly. It only ensures that data is sensible. For this reasonvalidation checks are not usually as effective as verification checks. They canhowever be carried out automatically by the computer and therefore require lesswork by the computer operators making them cheaper to use.

Methods of validation:

There are manydifferent methods of validations. The most appropriate method to use willdepend upon what data is being entered. The most common methods are listedhere.

ØPresence Checks: checks that data has been entered into the field andthat it has not been left blank, e.g. checks that Project ID is always enteredinto each record in a database of project details.

ØType Checks: checks that an entered value is ofparticular type. E.g. checks that a field is varchar, a number, etc.

ØLength Checks: checks that an entered value, e.g. Project ID is nolonger than a particular number of characters.

ØFormat Checks: Checks that an entered value hasa particular format. E.g. a date must be consist of “mm-dd-yy” format.
Validation checks can beperformed by any piece of software. If the user tries to do unauthorizedoperations the appropriate error messages are produced by the systems.


In our DFD, we give names to data flows, processes,and data stores. Although the names are descriptive of the data, they do notgive details. So the following the DFD, our interest is to build somestructured place to keep details of the contents of data flow, processes, anddata store. A data dictionary is a structured repository of data about data. Itis a set of rigorous definition of all DFD data element and data structure.

A data dictionary has many advantages. The mostobvious is documentation; it is valuable reference in any organization. Anotheradvantage is improving analyst/user communication by establishing consistentdefinition of various elements, terms and procedures. During implementation, itserves as a common base against which programmers who are working on the systemcompare data description. Also control information maintained for each dataelement is cross referenced in the data dictionary. E.g. program that use agiven data element are cross referenced in a data dictionary, which makes iteasy to identify them and make any necessary changes. Finally, a datadictionary is an important step in building a database. Most databasemanagement system has a data dictionary as a standard feature.


The input design is the link between theinformation system and the user. It comprises developing specification andprocedure for data preparation and those steps that are necessary to puttransaction data into a usable form for processing data entry. The activity ofputting data into the computer for processing can be achieved by instructingthe computer to read data from a written or printed document or it can occur byhaving people key data directly into the system. The design of inputs focuseson controlling the amount of inputs required, controlling errors, avoidingdelay, avoiding extra steps and keeping the process simple.



Thepurpose of system testing is to identify and correct errors in the candidatesystem. Testing is and important element of software quality assurance adrepresents the ultimate review of specification, design and coding. Theincreasing visibility of the software as a system element and the costassociated with a software failure are motivated forces for well planned,through testing.

System testing was conducted in order to detect errors and forcomparing then the final system with the requirement specification reports,i.e. whether the system meets requirements. During testing the software wasexecuted with the set of test cases and the output of programs for the testcases was evaluated to determine if the program is performing as it wasexpected to.

Testing presents an interesting challenge for the software engineersattempt to build software from an abstract concept to an acceptableimplementation. In testing engineer create a series of test cases that occurswhen errors are uncovered. Testing is the process of executing a program forfinding errors. A good test is one that has the high probability of finding anuncovered error. A successful error is one that uncovers undiscovered errors.

The term error is used to refer the difference between actual output ofthe software and the current output. Fault is a condition that causes thesoftware to fail to perform its required function. Software reliability isdefined as a required function. Software reliability is defined as theprobability that the software will not undergoes failures for a specified timesunder specified condition. Failure is the inability of a system or a componentto perform a required function according to its specification. Different levelsof testing were employed for software to make it error free, fault free andreliable.

And While We Were Here Movie Download

Unit Testing:

Unit testing was conducted first. Different modules of the softwarewere tested against the specifications produced during design of the modules.Verification of the code produced during the coding phase was done. Each modulewas tested separately.

Unit testing focuses verification effort on the smallest unit ofsoftware design module. This uncovers errors within the boundary of a module.Unit testing is actually White box testing both the external things as well asthe internal codes are tested. In testing, the interfaces are tested in orderto ensure the proper flow of data in and out of the module. The boundarytesting is done to ensure that the module keeps the limit of it. Allindependent paths are tested to ensure that all statements are tested at leastonce. At last the error path is also tested.

Unit testing comprises the set of tests performed by an individualprogrammer prior to integration of the unit into a larger system. There arefour categories of test that can be performed on a program unit

ØFunctional Unit

ØStress Unit

ØStructure Unit


Then system testing was conducted. Here the entire software system wastested.

Thereference document used for this process was requirement document and the goalwas to see if the software meets its requirements.

System testing includes the thorough testing of the product. Systemtesting is actually a series of different tests whose primary purpose is tofully exercise the computer based system. The tests are recovery testing: thischecks the recovery of the system when failure occurs. This is to ensure thatthere are recovery procedures for error occurrences.

Systemtesting involves unit testing, integration testing, acceptance testing. Carefulplanning and scheduling are required to ensure that modules will be availablefor integration into the evolving software product when needed. A test plan hasthe following steps:

ØPrepare test plan

ØPrepare test data forprogram testing

And While We Were Here Movie Download Full

ØPrepare test data for transaction path testing

ØPlan user testing

ØPrepare job performance aids

ØPrepare operationaldocuments


Objectivesof testing.

First of all objectives should be clear.

And While We Were Here Movie Download Full

ØTesting as a process of executing a programwith the intent of finding errors.
ØTo perform testing, test cases are designed. Atest case is a particular made up of artificial situation upon which a programis exposed so as to find errors. So a good test case is one that findsundiscovered errors.
ØIf testing is done properly, it uncovers errorsand after fixing those errors we have software that is being developedaccording to specifications.


The project has been developed successfully and theperformance of the system has been found satisfactory. The security has beenincorporated as required by any placement firm. Use of computer helps the userin reducing the time wasted in non-productive work. It further helps the userin having immediate access to the information as well as to share the limitedresources effectively.

User friendly menu driven interfacehas been provided to the user to interact with the system. Users can traversethrough the website provided the users have the access right set. The users canregister themselves through a registration form and then can use the servicesof the website.
The system provides an integratedenvironment for the customers who are willing to watch movies currently runningin the audi and can also enjoy combo packs while watching movie.


The following are the limitations ofthe project:

At a time only one user can use thesoftware. In same companies, the computers are interconnected to form anetwork. But this software will work on only one computer at a time.

The username and password providedto us is not encrypted properly. Any person that gets to know the username andpassword of a user can access his account. So keep your password safe.

In these times of uncertainties,incorporation of the facilities of backup and restoration of last details isnecessary. Any computer can crash or become affected by a virus at any time. Soit is imperative to take the backup of the data, but this software does notprovide this utility.