Professional Documents
Culture Documents
RESEARCH PROJECT
PROJECT TITLE:
Acknowledgement...................................................................vii
Declaration. ............................................................................viii
Chapter 1..........................................................................................................1
1.0 introduction..........................................................................................1
1.7 Conclusion..................................................................................................7
Chapter 2........................................................................................................10
ii
2.0 SSADM......................................................................................................10
Chapter 3........................................................................................................12
iii
Chapter 4........................................................................................................20
4.2.1DFD symbols............................................................................................21
4.6decision tables............................................................................................26
Chapter 5........................................................................................................27
Chapter 6........................................................................................................30
6.1 testing.......................................................................................................30
iv
6.1.2 Integration testing..................................................................................31
Chapter 7........................................................................................................33
7.2 training......................................................................................................33
Chapter 8........................................................................................................35
8.3.1 Security..................................................................................................37
8.3.2ergonomics..............................................................................................37
Chapter 9........................................................................................................38
Chapter 10.......................................................................................................39
Interface design...............................................................................................39
Introduction....................................................................................................39
10.0.1login form..............................................................................................40
10.2MDI form..................................................................................................42
v
10.3 photo gallery...........................................................................................46
Chapter 11.......................................................................................................73
11.1achievements...........................................................................................73
11.3conclusion................................................................................................73
11.4 recommendations...................................................................................74
ACKNOWLEDGEMENT
I would like to acknowledge everyone who contributed in one way or another to the
completion of this project. Special thanks go to my family for their moral and financial
vi
support. I also thank all my friends, my lecturer Mr. PEREZ KIHATO for his guidance
and advice and classmates for their support and encouragement. Above all I thank my
Almighty Lord for the protection that He has showered upon my life, good health and
wisdom.
I pray that God will bless you for the wonderful support you accorded to me during the
entire time we spent together
DECLARATION
vii
I JOHNPAUL MANYUANDA ONGANYI do swear that this is my project research
work being presented to Moil University for examination purposes. It has never been
presented to any other University or college for any award. The work is private and any
copying or unauthorized use is prohibited unless with my permission.
Signature:………………………..Date:...........................
Presented to:
Supervisor……………………….
Signature………………………. Date…………………..
viii
CHAPTER ONE
1.0 INTRODUCTION
The current system used in the hotel is manual. This has made the operations to be very
inefficient. A system is therefore required to make the booking process faster especially
during the peak season. The system will increase the hotel’s productivity and
profitability. The system will produce guests’ details, reservations details, payments
details, rooms’ details and conference details.
The aim of this system is to enhance reliability, quality of service and correctness of
information. Information will also be stored in the database hence ensuring safety and
ease in retrieval.
Woodlands hotel is located in the heart of Nakuru, some 2 hours drive from Nairobi.
The raised lobby within the hotel and the panoramic glass lifts allow the visitor a view
of the swimming pool while the lofty atrium splashes the whole reception with sunlight.
Woodlands offers several conference rooms which are fully equipped with the latest
technology and secretarial services.Accomodation within the hotel boasts of 89 luxury
rooms, 4 junior suites and an executive suite all spacious and tastefully furnished. The
hotel offers 5 conference rooms fully equipped with the fastest technology including
secretarial services. This accommodates 100-300 people respectively. Visitors are
served international cuisine and African dishes and the charges are the most attractive
for a hotel of Woodland’s status.
1
It has already made a remarkable stride and shows that its not only famous for it’s tasty
food, but also boasts of having the best alcoholic and non alcoholic cocktails and rich
tasty hot beverages like cappuccino, espresso, milk, coffee, tea or soft drink. The
choices are unique, ranging from deep body wraps, Andean hot stone massages to salt,
ginger and lemon body rubs, modern exercise machines what is more, all the treatments
will make use of all-natural essential oils. Woodlands Hotel is both an arena for the
promotion of total bodily health, and a place of holistic relaxation where both body and
spirit can be rejuvenated. With all these facilities it faces so many drawbacks due to
their manual system. This has proved to be unproductive and unprofitable hence the
need to develop a reliable and efficient system to make the booking process faster for
competitive advantage.
Guest details
Reservation details
Conference details
Accommodation details
Payments details
Upon arrival, guests register their personal information with the receptionist. The guest
is required to pay for the accommodation on arrival. After payment the guest is issued
with a receipt written manually and the duplicates stored in receipt books for future
reference.
Records containing guests’ information are kept in files and stored in cabinets.
2
1.2.1 BENEFITS OF THE CURRENT SYSTEM
1. There is no need for trained personnel to work with i.e. the staff must not be
computer literate.
2. It’s cheaper to operate since there is no extra expense incurred on purchase of
hardware and software.
3. No extra cost is incurred on maintenance of the system.
3
1.3 THE PROPOSED SYSTEM
The proposed system is meant to be implemented and utilized by the hotel. The
database should contain all information and should always be up to date hence
enhancing consistency. The proposed system will also carter for all the limitations of
the current system
To provide an automated system that enables staff members to work faster hence
improved services and guest satisfaction.
To provide security measures for the stored information.
To come up with a computerized system which is more reliable than a manual
system and flexible to the environmental changes.
To maintain integrity in the stored information.
4
1.3.3 BENEFITS OF THE PROPOSED SYSTEM
1. Speed: The proposed system reduces time required to do the work and to come
up with the required documents.
2. Security: The proposed system provides more security to data and information
stored unlike where records are stored manually.
3. Reliability: The system is more reliable than the manual system in terms of
updating, storage and retrieval of information.
4. Portability: It will be easy to transfer information to various hardware and
software environments.
5. Accuracy: The proposed system will be more accurate as compared to the
current system.
6. Integrity: Information will be protected against unauthorized access and
modification.
7. Staff efficiency: There will be high efficiency since much of the jobs will be
automated.
8. Guest satisfaction: There will be no queuing for long waiting to be served.
9. Back-up: Backup copies of information can be made to be used incase of loss.
10.Reduce redundancy: Guests details are stored once in the database.
5
1.4 METHODS OF SYSTEM INVESTIGATION
INTERVIEWS
This is a method of data collection which involves face to face talk with the hotel staff.
I interviewed the Reservation officer who gave me most of the details on the operations
of the hotel which has helped in the development of this project.
Guests’ details
Reservation details
Rooms details
Conference details
Payments details
SYSTEM PROCESSES
6
SYSTEM OUTPUTS
Receipts
Reports
SOFTWARE
When the system is successfully completed in the set duration, it’s my hope that it
would be able to improve the performance and efficiency of Woodlands Hotel. This
will boost the hotel’s profits since much work will be carried out within a short time
and the information will be highly accurate and secure.
7
1.8 PROJECT DURATION
FEASIBILITY 2 WEEKS
ANALYSIS 3 WEEKS
DESIGN 3 WEEKS
CODING 4 WEEKS
TESTING 2 WEEKS
Weeks 1 2 3 4 5 6 7 8 9 10 11 12 13 14
FEASIBILITY
ANALYSIS
8
DESIGN
CODING
TESTING
CHAPTER TWO
9
2.1 SSADM CONCEPTS
The users of the system must be involved.
Functionality or Processing: The way in which data is passed around the system
i.e. the process or activities that transforms it.
The data: Data forms the backbone of SSADM i.e. SSADM belongs to the
family of structured methods referred to ‘data driven’.
Effect of time and world events on the data held within the system e.g. data is
subject to change everyday i.e. (dynamic)
Top down approach: It provides where a high level picture is drawn up and
subsequently refined into lower levels of details.
Separation of physical and logical models: The logical and the physical view of
SSADM must be distinguished.
10
VII. Learning and Methodology.
CHAPTER THREE
The first reason would arise from the nature of the current systems (S0) and the second
could arise from the nature of the desired system (S1).
11
This phase involves: -
This phase takes into consideration all the activities that deal with creating a new
system. The main objective of implementing a new system is mainly to cope with the
current workload, because work schedules are done manually.
Soft properties deal with the identification of the system with the people or the users.
The system approach to organizational problems usually considers the soft issues. Soft
properties are usually imprecise and are matters of individual values and tastes.
12
III. They are messy
IV. Information needs not known
V. Many people are involved
The soft issues include the following:
Job Redundancy: The workforce especially clerical staff will think that the
computerized system will reduce their workload and this will make them
reluctant because they will have very little to apply in the new implemented
system.
Job Insecurity: Many employees in the organization feel that the current system
(So) is suitable and efficient. Majority of them feel that the new system is
designed to perform most of the work, hence a threat to their jobs.
Favors: Some employees feel that it is only a few individuals who will get
relevant knowledge on the system. Many in return feel neglected because the
implemented system will not admit them.
The management should make sure the staff is aware of the changes in the
system. They should also reassure the staff that they will easily get used to the
new system through training.
Negotiation: Management must try to talk with their employees in order to come
to an agreement and settle arguments.
Job security: Management should assure the workers of their job security and for
those who might lose their jobs; management should give them attractive benefit
packages.
13
Creation of user friendly program: The designer should ensure that the program
designed is interactive (easy to learn and use).
Time consuming: The current system consumes a lot of time in keeping the
current information.
Improper filing system: The documents and all records are usually kept in
cabinets; there is no good reference due to improper knowledge of filing and
cumbersome work that is involved.
Slow retrieval of data: Retrieval of data is sometimes tiresome especially if
there is a lot of data.
A lot of paper work.: The current system involves too much paperwork i.e.
order list put on papers are likely to be easily tattered, torn, error prone,
misplaced or lost. All this will require rework.
3.1.4 SOLUTIONS TO HARD ISSUES
14
Security: The proposed system improves the security of the data by preventing
unauthorized access to the database.
Reduced redundancy: The system will maximize the use of the resources e.g.
storage resources by eliminating the problem of redundancy.
Reduce time wastage: The proposed system will reduce the time taken in
retrieving data or information from the database.
Accuracy: Proposed system will provide accuracy of the stored data.
The receptionist has to search a record for the guest by going through the files in the
cabinet, which is a very slow process and not an accurate method at times.
I. Job redundancy
II. Too much paperwork
III. Improper filing system
IV. Too much space occupied by the filing cabinets
V. Time consuming
VI. Slow retrieval of data.
15
It should have the ability to allow a Network administrator to track down the
work from his office
It should enable the Network administrator to enter personal details into the
database and store it for future reference.
The new system will reduce costs that the hotel undertakes such as storage
costs.
Records will be done accurately and in time.
The correct and accurate information on the hotel’s conference and rooms
available, guest’s details and payments details will be made available.
The management will offer training to the users to enable them to work with
the new system.
CATWOE has been applied to the root definition for the conflict resolution system of
Hotel Africana.
Customers: The root definition needs to identify who the beneficiaries of the
system are. These are the immediate clients of the system.
16
Transformation: Makes members of the institution understand the
importance of a computerized system.
Owners: This describes who owns the system. It is the management and it is
acting on this because it has potential control of the relevant system.
7. Establish solution
8. Resolve conflicts 17
3.7 COMPARISON AND AGENDA
Agenda for discussion and debate is produced. The relevant system, (S1) is conceived a
possible and a comparison with a particular theme, (S0) is made to help in clarifying the
nature of the problem and point out possible ways of moving forward.
The agenda will solve the problems that come up in the database.
The workforce will be assured gradual change in work to prevent redundancy,
monotony and rework.
The management will assure the users the benefits the new system has to them.
18
CHAPTER FOUR
Current system
problems
19
4.1 STUCTURED SYSTEM ANALYSIS
This is a technique used in definition and analysis stage. It is a set of techniques and
graphical tools that allow the system analyst to develop a new kind of system
specifications that are easily understandable to the user.
External Entities
20
Data Store
Information Flow
Process
Procedures
21
Decision
Storage
Connector
Input/output
22
4.3 DATA DICTIONARY
It is a repository that is used to store the details and entities of the database. It defines
names, relations and field details. It describes the structure of data store or moving as a
data flow or how it is accessed. It provides information on the definition and use of data
elements on organization uses. They are used in conjunction with data flow diagrams to
explain information flows, processes, data stores and external entities depicted.
Entity Description
Person People who require accommodation in the hotel.
Management The management of the hotel responsible for
running it.
23
4.4 STRUCTURED ENGLISH
This is a system-designed tool that describes the logic procession in a highly detailed
form. It uses English language and severely limits the available vocabulary and tries to
follow the lay out and logic operations of a computer program.
It’s more spoken than normal programming language and easier for
programmers and non-programmers to understand.
There are a variety of conventions to write it.
It’s more limited than normal speed, as it has to follow strict orders.
It uses key words e.g., if, and, or which by some convection are written in
capital and has a precise meaning in the context of narrative.
Consequences. The concept of decision tree is basically simple when the alternative is
known.
The options are broken down showing all the possible outcomes as the decision-making
process progress. The result is a tree like structure that illustrated the related decision.
24
4.6 DECISION TABLES
This is a table of contents for defining problems and actions to be taken. A decision
table is a single representation of actions and conditions. Its major drawback is that it
lacks information in its format to tell us what other combinations to test. This is where
a decision tree is useful.
25
CHAPTER FIVE
Design is important since it governs how well the characteristics works for the end
users, in the key are performance, usability and security. The design specification will
include the architecture of the system, how security will be implemented and methods
for entry, storage, retrieval and display of data.
In this phase, we are concerned with producing an appropriate design, which results in a
good quality information system, which is:
1. Flexible: To design a system that will enable future requirements of the hotel to
be incorporated easily. After the system becomes operational, further needs
may emerge since during analysis phase, users may not have been clear about
the entirety of their needs.
2. Portable: To design a system that will be capable of being transferred from one
machine environment to another with the minimum amount of effort.
3. Easy to use: To design a user friendly GUI.
4. Reliable: To design a system that will be secure against human error, deliberate
misuse of system controls and functions.
5. Secure: To design a system that will provide confidentiality of data and
information.
26
To produce the system, the following tools should be used to meet the definition.
Table of attributes
Flow charts
Data flow diagrams
Pseudo codes
Entity relationship diagrams
Records
User System Authentication
27
5.3 FLOW CHARTS, TEST DATA AND PSEUDOCODE
Test data: This gives a rough idea of the entities that can be made in various
procedures in the application to be developed. They are inputs, which have been
devised to test the system. They verify that the design represents a correct
solution to a problem
Pseudo code: A pseudo code refers to the step-by-step process of going through
a program before it is actually developed in the application. It provides a means
of designing a computer program independently whichever computer language.
Pseudo code statements clearly state what each state to a program should be.
Flowcharts: These are structured design codes used in creating procedures. Each
procedure has a flow chart explaining what the procedure carries out in simple
steps. They are composed of symbols that represent specific activities
This is mainly what promotes the interaction between the user and the computer system.
The screen should be designed in such a way that the user can interact with the
computer using objects to describe the real world. GUI reduces mistakes, frustrations
and fatigue experienced by the user. It is a representation of what the system will look
like. The aspects that are to be included in the application are incorporated here. E.g.
Passwords enhance security in the system.
28
CHAPTER SIX
This is where the working system is ready for testing and acceptance by the clients. The
problems that could arise related to the software, hardware and other implements are
discovered and sorted out so as to end up with the required output that is acceptable to
users.
6.1 TESTING
The purpose of System Testing is to identify and correct errors in the candidate system.
It does so by demonstrating that the software is operationally useful and by checking
non-functional characteristics such as performance and reliability
The purpose of unit testing is to ensure that each program is fully tested since it
addresses the testing of functional units within a system as the main building blocks. To
29
do this the analyst wrote a test plan. The plan consists of a number of test runs, such as
the valid paths through the code, and the exception and error handling paths. For each
test run there is a list of conditions tested, the test data used and results expected
It has the objective of selling to the user the system. It verifies that the system
procedures operate to system specifications and that the integrity of vital data is
monitored. The bulk of acceptance testing involves the following tasks:
30
6.2 HUMAN COMPUTER INTERFACE (HCI)
The interaction between the users and the computer takes place at the HCI, which is the
process of computerizing an organization. The effectiveness of the information system
will depend on how the organization is able to adopt the system of working with the
new system. The factor to be evaluated includes lighting, air conditioning and
hardware/software design to match the human comfort.
31
CHAPTER SEVEN
7.2 TRAINING
Enables the staff to operate the newly introduced system; it also helps to reduce some of
the soft issues e.g. reluctance to change experienced by some users.
With training, benefits of computerization are then realized with proper use of the
system. With this comes analysis, which is a detailed study of the various operations
32
performed by a system and their relationship within and outside. The employees,
management included must understand the workings of the new system.
33
CHAPTER EIGHT
Updating is essential; it’s embarrassing to have someone type a search for the
information that they need only to discover the information is out of date, or
plainly inaccurate.
To ensure that the system is able to cope with the changing requirements of
the reservations system.
To confirm that the planned objectives are being met and to take action if they
are not.
To deal with unforeseen problems arising as a result of the database being in
operation
34
2. Adaptive maintenance: This takes care of the anticipated changes in the
processing environment.
3. Perfective maintenance: This is undertaken to perfect the software or
improve its processing routines so that processing efficiencies and
performances may be met.
4. Preventive maintenance: Carried out on systems so that it could enhance
prevention from errors that would occur.
1. Security
2. Ergonomics
8.3.1 SECURITY
Possible risk to the system must be highlighted, discussed and agreed by the occupant
and then defined. Security risks can be:
Accidental damages: these are caused by smoke, fire and natural causes that
cause data to get lost. It’s therefore advisable to keep backups and tapes. The
staff should not take tapes for the systems out of the work place and no foreign
tapes should be brought in the work environment.
Deliberate breaches: These are brought about by unauthorized access to
configuration information, tapping computer information along the lines and
damage the magnetic storage area.
Security Measures include:
Passwords
35
These are the codes that are used by people to protect their information against
unauthorized access.
Anti-Virus Toolkit
These are gadgets that reduce the transmission of viruses as well as repair files that may
be damaged by the viruses. These gadgets also run scans on documents to know if they
are virus infected. They include anti-viral software like Norton anti-virus, AVG,
MacAfee, jaspers etc.
8.3.2 ERGONOMICS
This is the relationship between the user of the computer and the computer itself. The
users should have a good working environment in terms of lighting, sitting posture and
the type of software being used should be user friendly.
36
CHAPTER NINE
It is important that a system user is trained to familiarize themselves with hardware and
system before the actual change over.
At this point, S1 has become the new S0 and the system development has to run around
once again. This leads into the final phase of debriefing on the experiences of creating
and running the system and considering the lessons learnt from the use of a particular
system development method. It is therefore necessary to maintain control of the
implementation of the modification to ensure no unnecessary delay.
Learning and training should be carried out to ensure that the personnel expected to use
the new system acquires the knowledge on how to operate it. This is done to ensure that
the users of the new system don’t mess with the programs. Learning helps to work as
desired for present and future operations.
37
CHAPTER TEN
Interface Design
Introduction
This section outlines the various means by which user can interact with the system. That
is development of the forms that are to be used to input the data to be processed and the
various output methods to display the processed data (information). Usually the latter will
basically be through the various reports generated. The following are the graphical user
interfaces forms and their codes
38
10.1 LOGIN FORM
LogginSucceeded = False
Me.Hide
Unload Me
Unload MDIReservations
End Sub
'Logging in
Load MDIReservations
39
MDIReservations.Show
Unload FrmLogin
TxtUser.SetFocus
TxtUser = ""
TxtPword.Text = ""
End If
End Sub
40
10.2 MDI FORM
FrmAbout.Show
End Sub
frmPayments.Show
End Sub
41
FrmConference.Show
End Sub
Unload Me
End Sub
FrmGuests.Show
End Sub
FrmAbout.Show
End Sub
Dim i As Double
i = Shell("c:\windows\system32\calc.exe", vbNormalFocus)
Exit Sub
errHandle:
Resume Next
End Sub
42
FrmCalender.Show
End Sub
RptConference.Show
End Sub
FrmHelp.Show
End Sub
RptGuests.Show
End Sub
FrmGuests.Hide
FrmReservations.Hide
FrmConference.Hide
FrmRooms.Hide
frmPayments.Hide
FrmLogout.Show
End Sub
43
RptPayments.Show
End Sub
FrmPhotoGallery.Show
End Sub
RptReservations.Show
End Sub
RptRooms.Show
End Sub
frmPayments.Show
End Sub
FrmReservations.Show
End Sub
FrmRooms.Show
End Sub
44
On Error GoTo Errhandler
Dim y As Double
y = Shell("c:\windows\notepad.exe", vbNormalFocus)
Exit Sub
Errhandler:
Resume Next
End Sub
Dim x As Integer
45
x = MsgBox("Are you sure you want to close?", vbYesNo, "Close")
If x = vbYes Then
Unload Me
End If
End Sub
addnew = MsgBox("Do you want to add a new record?", vbYesNo, "Add Record")
AdoGuests.Recordset.addnew
46
End If
End Sub
Dim x As Integer
If x = vbYes Then
Unload Me
End If
End Sub
FrmRooms.Hide
FrmReservations.Hide
frmPayments.Hide
FrmGuests.Hide
FrmConference.Show
End Sub
AdoGuests.Recordset.Delete
47
End If
End Sub
With AdoGuests.Recordset
If .EditMode Then
.Update
Else
End If
End With
End Sub
AdoGuests.Recordset.MoveFirst
End Sub
AdoGuests.Recordset.MoveLast
End Sub
48
AdoGuests.Recordset.MoveLast
Else
AdoGuests.Recordset.MoveNext
End If
End Sub
frmPayments.Show
End Sub
FrmRooms.Hide
FrmConference.Hide
FrmReservations.Hide
FrmGuests.Hide
frmPayments.Show
End Sub
AdoGuests.Recordset.MoveFirst
Else
49
AdoGuests.Recordset.MovePrevious
End If
End Sub
FrmReservations.Show
End Sub
FrmConference.Hide
frmPayments.Hide
FrmGuests.Hide
FrmReservations.Hide
FrmRooms.Show
End Sub
AdoGuests.Recordset.Update
End Sub
Dim R As Integer
50
R = InputBox("Enter the Guest ID Number")
With AdoGuests.Recordset
searchResult = .Bookmark
If .EOF Then
MsgBox " Records " & R & " Not Found!", vbInformation, "Guests"
AdoGuests.Recordset.MoveFirst
End If
End With
End Sub
51
Dim addnew As Integer
addnew = MsgBox("Do you want to add a new record?", vbYesNo, "Add Record")
AdoReserv.Recordset.addnew
End If
End Sub
FrmGuests.Hide
FrmRooms.Hide
frmPayments.Hide
FrmReservations.Hide
FrmConference.Show
End Sub
Dim x As Integer
If x = vbYes Then
Unload Me
End If
End Sub
52
Private Sub CmdDelete_Click(Index As Integer)
AdoReserv.Recordset.Delete
End If
End Sub
With AdoReserv.Recordset
If .EditMode Then
.Update
Else
End If
End With
End Sub
AdoReserv.Recordset.MoveFirst
End Sub
53
Private Sub CmdG_Click(Index As Integer)
FrmReservations.Hide
frmPayments.Hide
FrmRooms.Hide
FrmConference.Hide
FrmGuests.Show
End Sub
AdoReserv.Recordset.MoveLast
End Sub
AdoReserv.Recordset.MoveLast
Else
AdoReserv.Recordset.MoveNext
End If
End Sub
FrmGuests.Hide
FrmRooms.Hide
54
FrmReservations.Hide
FrmConference.Hide
frmPayments.Show
End Sub
AdoReserv.Recordset.MoveFirst
Else
AdoReserv.Recordset.MovePrevious
End If
End Sub
FrmConference.Hide
frmPayments.Hide
FrmReservations.Hide
FrmGuests.Hide
FrmRooms.Show
End Sub
AdoReserv.Recordset.Update
55
End Sub
Dim R As Integer
With AdoReserv.Recordset
searchResult = .Bookmark
If .EOF Then
MsgBox " Records " & R & " Not Found!", vbInformation, "Reservations"
AdoReserv.Recordset.MoveFirst
End If
End With
End Sub
56
10.6 Conference Detail Form
addnew = MsgBox("Do you want to add a new record?", vbYesNo, "Add Record")
AdoCon.Recordset.addnew
End If
End Sub
Dim x As Integer
57
x = MsgBox("Are you sure you want to close?", vbYesNo, "Close")
If x = vbYes Then
Unload Me
End If
End Sub
AdoCon.Recordset.Delete
End If
End Sub
With AdoCon.Recordset
If .EditMode Then
.Update
Else
End If
End With
58
End Sub
AdoCon.Recordset.MoveFirst
End Sub
FrmReservations.Hide
frmPayments.Hide
FrmRooms.Hide
FrmConference.Hide
FrmGuests.Show
End Sub
AdoCon.Recordset.MoveLast
End Sub
AdoCon.Recordset.MoveLast
Else
AdoCon.Recordset.MoveNext
End If
59
End Sub
FrmRooms.Hide
FrmConference.Hide
FrmReservations.Hide
FrmGuests.Hide
frmPayments.Show
End Sub
AdoCon.Recordset.MoveFirst
Else
AdoCon.Recordset.MovePrevious
End If
End Sub
FrmGuests.Hide
FrmRooms.Hide
frmPayments.Hide
60
FrmConference.Hide
FrmReservations.Show
End Sub
AdoCon.Recordset.Update
End Sub
Dim R As Integer
With AdoCon.Recordset
searchResult = .Bookmark
If .EOF Then
MsgBox " Records " & R & " Not Found!", vbInformation, "Conference"
AdoCon.Recordset.MoveFirst
End If
End With
End Sub
61
Me.TxtTime.Text = Time
End Sub
Me.TxtTime.Text = Time
End Sub
addnew = MsgBox("Do you want to add a new record?", vbYesNo, "Add Record")
62
AdoRooms.Recordset.addnew
End If
End Sub
Dim x As Integer
If x = vbYes Then
Unload Me
End If
End Sub
AdoRooms.Recordset.Delete
End If
End Sub
With AdoRooms.Recordset
If .EditMode Then
.Update
63
MsgBox "Edit Completed!", vbInformation
Else
End If
End With
End Sub
AdoRooms.Recordset.MoveFirst
End Sub
AdoRooms.Recordset.MoveLast
End Sub
AdoRooms.Recordset.MoveLast
Else
AdoRooms.Recordset.MoveNext
End If
End Sub
64
Private Sub CmdP_Click()
FrmGuests.Hide
FrmConference.Hide
FrmRooms.Hide
FrmReservations.Hide
frmPayments.Show
End Sub
AdoRooms.Recordset.MoveFirst
Else
AdoRooms.Recordset.MovePrevious
End If
End Sub
FrmGuests.Hide
FrmRooms.Hide
frmPayments.Hide
FrmConference.Hide
FrmReservations.Show
65
End Sub
AdoRooms.Recordset.Update
End Sub
Dim R As Integer
With AdoRooms.Recordset
searchResult = .Bookmark
If .EOF Then
MsgBox " Records " & R & " Not Found!", vbInformation, "Rooms"
AdoRooms.Recordset.MoveFirst
End If
End With
End Sub
66
10.8 Payment Detail Form
addnew = MsgBox("Do you want to add a new record?", vbYesNo, "Add Record")
AdoPay.Recordset.addnew
End If
End Sub
Dim x As Integer
67
x = MsgBox("Are you sure you want to close?", vbYesNo, "Close")
If x = vbYes Then
Unload Me
End If
End Sub
AdoPay.Recordset.Delete
End If
End Sub
With AdoPay.Recordset
If .EditMode Then
.Update
Else
End If
End With
68
End Sub
AdoPay.Recordset.MoveFirst
End Sub
FrmConference.Hide
FrmRooms.Hide
frmPayments.Hide
FrmReservations.Hide
FrmGuests.Show
End Sub
AdoPay.Recordset.MoveLast
End Sub
AdoPay.Recordset.MoveLast
Else
AdoPay.Recordset.MoveNext
69
End If
End Sub
AdoPay.Recordset.MoveFirst
Else
AdoPay.Recordset.MovePrevious
End If
End Sub
FrmGuests.Hide
FrmRooms.Hide
FrmConference.Hide
frmPayments.Hide
FrmReservations.Show
End Sub
AdoPay.Recordset.Update
70
End Sub
Dim R As Integer
With AdoPay.Recordset
searchResult = .Bookmark
If .EOF Then
MsgBox " Records " & R & " Not Found!", vbInformation, "Payments"
AdoPay.Recordset.MoveFirst
End If
End With
End Sub
71
CHAPTER ELEVEN
11.1 ACHIEVEMENTS
Evaluation of the current system in terms of its weaknesses and strengths.
This new system produces the required documents
Increased security of all records by use of authorization and authentication
techniques.
Increased speed of storage and retrieval of records.
Production of a centralized Database Management System.
11.2 SHORTCOMINGS
Initial cost of implementing the system would be high. This will include cost of
hardware, software, integration with other systems and user training.
Resistance by end users.
Time was a major difficulty encountered when performing tasks on the project.
11.3 CONCLUSION
By introducing an automated reservations system, the hotel will provide timely and
efficient services to its guests. The system will give the hotel a cutting edge over other
hotels. The system provides an easy to manage approach in the storage and retrieval of
records; it provides confidentiality of records and also ensuring quality of work.
This will boost the hotel’s profits since much work will be carried out within a short
time and the information will be highly accurate and secure.
72
11.4 RECOMMENDATIONS
The implementation of the system will ensure that Woodlands hotel is able to meet its
strategic goals.
Further modifications of the system can be done to increase the functionality of the
system. This should be done in sync with changes that occur in the hotel’s internal and
external environment.
73