Motel Management System
1 ) INTRODUCTION
Lodge reservation program plays an excellent role and has a potential effect on day to day performance measures, this type of program have extremely evolved from years due to popular for their use, effective and efficiency in just about any given organizations. Due to the speedy change of technology the utilization of such system has become a necessity to any given high learning institution intended for better performance and become used with a large large number of users as well but it conserve time, solutions and produces awareness of the evolving technology. 1 . one particular PROBLEM AFFIRMATION
Although technology is quickly changing practically at the speed of light, some Accommodations are still employing manual reservation system to check in/out consumers, Hotel features, management, talk about ideas and passing of information, for instance Staff performance analysis, customers roomt are done personally hence rendering: * Rendering untimely evaluation information's.
* Consumes a lot of time,
* Waste and make use of lots of resource such as varieties.
The sub-objective are to recognize the requirement and design the Hotel reservation system that may resolve the above mentioned problem of manual reservation system, simply by designing and implementing the proposed system successfully it is going to benefit various parties; firstly by providing staff with gain access to of easy view kind.
1 . 2 . SYSTEM AIM AND TARGET
1 . several. GOALS
The primary goal is usually to develop a Resort reservation system to replace the paper based Hotel reservation.
1 . some. OBJECTIVES:
* To ease staff and admin with facilities for reservation process. * To allow sharing of ideas, harmonize and provide on time useful information on how best to boost performance. 2. To ease decision making, save some resources and utilize opportunities of new technology
1 . your five. SIGNIFICANCE IN THE SYSTEM
* Encourage adherence to internationally acknowledged Hotel performance standards. 2. Ease booking and administration process and much easier to administer. * For getting adherence to uniform rules of good functionality and actions. * Maintain confidence in the integrity from the corporation in high Accommodations. * Balance and provide timely useful info and responsibility. * To avoid and withstand the development of unwanted.
* To minimize the requirement necessary for reservation and save as well as resources.
1 ) 6. FOCUS ON USERS:
The computerized grading system can target,
5. Hotel ecuries
1 . several. SCOPE
The machine has seven major stages in total, login, search, Watch, modify customer information as well as system because shown under. Hotel Reservation system
1 ) 8. FACILITIES AND PC RESOURCES
1 ) 8. 1 ) HARDWARE STANDARDS
The following are laptop and components resources that is to be used for the introduction of the Motel Reservation program: Pentium three or more and over with minimal speed of just one. 8GHZ, 256 MB of memory and above, seventeen inch normal monitor, normal keyboard, mouse button and 40GB minimum hard disk space.
1 ) 8. 2 . SOFTWARE Requirements
Operating System: Microsoft company Windows XP Specialist
2. Database Machine: Microsoft gain access to
* Web Server: net information storage space
* Script Vocabulary: VB 6th. 0
1 . 9. GANTT CHART
installment payments on your RESEARCH METHOD
The chosen research methodology for this project is standard research technique which will enable better understanding of various elements that are associated with Hotel Reservation system that involves the next five measures; awareness of the condition, suggestions, creation, evaluation and conclusion as illustrated inside the diagram below and later each step of the process is described in detail.
[Vaishnavi, Sixth is v. and M. Kuechler, 2006]...
References: Wie A., & Greenidge C. (2003), The Spiral Unit, Adrian Als & Charles Greenidge[online], Available by: http://scitec.uwichill.edu.bb/cmp/online/cs22l/spiralmodel.htm [Accessed twenty January 2008]
Basu A., Muylle S. (2003). Authentication in E-Commerce. Interaction of the ACM [online], 46(12), 159-166. Available via: http://delivery.acm.org/10.1145/960000/953496/p159basu.pdf?key1=953496&key2= 5275191611& coll=portal& dl=ACM& CFID=2974689& CFTOKEN=61934647 [Accessed 27 Sept 2006]
Basu A., Muylle H. (2003). Authentication in Ecommerce. Communication in the ACM [online], 46(12), 159-166. Available from: http://delivery.acm.org/10.1145/960000/953496/p159basu.pdf?key1=953496&key2= 5275191611& coll=portal& dl=ACM& CFID=2974689& CFTOKEN=61934647 [Accessed 27 September 2006]
Bennet, D. (2000), Authorisation and Security Systems to get E-Commerce, Murdoch Research Centre [online], 1(3), 3-26. Available from: http://www.it.murdoch.edu.au/~smr/jour%/info/security/paper.html [Accessed 15 December 2004]
Boehm B, W. (1998). A Spiral Model of Software Creation and Enhancement. TRW Immune system Group [online], 61-72. Available coming from: http://www.sce.carleton.ca/faculty/ajila/4106-5006/Spiral%20Model%20Boehm.pdf [Accessed 15 November 2006]
Cambridge University (2003). University Cambridge Smart Card [online]. Offered by: http://www.admin.cam.ac.uk/offices/misd/univcard/ [Accessed 27 May 2005]
Carrigan R., Milton R. (2005). Education Security. 2005 Computerworld Honors Example [online], 1-4. Available from: http://delivery.acm.org/10.1185/960986/951226/p159basu.pdf?key1=998496&key2= 7775190311& coll=portal& dl=ACM& CFID=2449723& CFTOKEN=61286847 [Accessed 30 January 2006]