SUNSHINE WORLDWIDE SCHOOL
ACADEMIC YEAR : 2021-22
PROJECT REPORT ON
“HOTEL MANAGEMENT”
NAME: Nehal Dashottar
CLASS: XII Humanities
SUBJECT: COMPUTER SCIENCE SUB CODE: 083
1
SUNSHINE WORLDWIDE SECONDARY
SCHOOL, OLD GOA
CERTIFICATE
This is to certify that _______Computer science________ project
titled “_Hotel Management___” has been successfully completed by
____Nehal Dashottar____ of class XII in partial fulfilment of
curriculum of CBSE leading to the award of All India Senior School
Certificate Examination for the year 2020-21.
__________________ _______________
Internal Examiner Student
Signature
__________________ _______________
Principal Signature School Stamp
2
TABLE OF CONTENTS [T O C]
SER DESCRIPTION PAGE NO
01 ACKNOWLEDGEMENT 04
02 DESCRIPTION OF THE 05
PROJECT
03 SOURCE CODE 07
04 INPUT SCREEN 09
05 OUTPUT SCREEN 10
06 BIBLIOGRAPHY 11
ACKNOWLEDGEMENT
3
Apart from the efforts of me, the success of any project depends
largely on the encouragement and guidelines of many others. I take this
opportunity to express my gratitude to the people who have been
instrumental in the successful completion of this project.
I express my heartfelt gratitude to my parents for constant
encouragement while carrying out this project.
I gratefully acknowledge the contribution of the individuals who
contributed in bringing this project up to this level, who continues to
look after me despite my flaws,
I express my deep sense of gratitude to the luminary The
Principal, Ms. Sindhu Hemant who has been continuously motivating
and extending their helping hand to us.
I express my sincere thanks to the academician The Vice
Principal, Ms. Martha Veronica Pinto, for constant encouragement and
the guidance provided during this project
I am overwhelmed to express my thanks to Sunshine Worldwide
School for providing me an infrastructure and moral support while
carrying out this project in the school.
My sincere thanks to Mr. Roshan Kumar, Educator In-charge, A
guide and mentor, who critically reviewed my project and helped in
solving each and every problem, occurred during implementation of the
project
The guidance and support received from all the members who
contributed and who are contributing to this project, was vital for the
success of the project. I am grateful for their constant support and help.
PROJECT ON HOTEL MANAGEMENT
4
INTRODUCTION
This project is based on management of hotels, such as
information about the guests such as their personal detail, name, address,
country etc. This information can be stored in the data and can be
verified whenever we want. This computer programme can be used for
multiple hotels, lodges etc
OBJECTIVES OF THE PROJECT
The objective of this project is to let the students apply the
programming knowledge into a real- world situation/problem and
exposed the students how programming skills helps in developing a
good software.
1. Write programs utilizing modern software tools.
2. Apply object oriented programming principles effectively when
developing small to medium sized projects.
3. Write effective procedural code to solve small to medium sized
problems.
5
4. Students will demonstrate a breadth of knowledge in computer
science, as exemplified in the areas of systems, theory and
software development.
5. Students will demonstrate ability to conduct a research or applied
Computer Science project, requiring writing and presentation skills
which exemplify scholarly style in computer science.
PROPOSED SYSTEM
Today one cannot afford to rely on the fallible human beings of be
really wants to stand against today’s merciless competition where not to
wise saying “to err is human” no longer valid, it’s out-dated to
rationalize your mistake. So, to keep pace with time, to bring about the
best result without malfunctioning and greater efficiency so to replace
the unending heaps of flies with a muchsophisticated hard disk of the
computer.
One has to use the data management software. Software has been
an ascent in atomization various organisations. Many software products
working are now in markets, which have helped in making the
6
organizations work easier and efficiently. Data management initially
hadto maintain a lot of ledgers and a lot of paperwork has to be done but
now software producton this organization has made their work fasterand
easier. Now only this software has to beloaded on the computer and
work can be done.
This prevents a lot of time and money. The work becomes fully
automated and any information regarding the organization can
beobtained by clicking the button. Moreover, nowit’s an age of
computers of and automatingsuch an organization gives the better look.
SYSTEM DEVELOPMENT LIFE CYCLE (SDLC)
The systems development life cycle is a project management
technique that divides complex projects into smaller, more easily
managed segments or phases. Segmenting projects allows managers to
7
verify the successful completion of project phases before allocating
resources to subsequent phases.
Software development projects typically include initiation,
planning, design, development, testing, implementation, and
maintenance phases. However, the phases may be divided differently
depending on the organization involved.
For example, initial project activities might be designated as
request, requirements-definition, and planning phases, or initiation,
concept-development, and planning phases. End users of the system
under development should be involved in reviewing the output of each
phase to ensure the system is being built to deliver the needed
functionality.
PHASES OF SYSTEM DEVELOPMENT LIFE CYCLE
INITIATION PHASE
The Initiation Phase begins when a business sponsor identifies a need or
an opportunity.
The purpose of the Initiation Phase is to:
Identify and validate an opportunity to improve business
accomplishments of the organization or a deficiency related to a
business need.
Identify significant assumptions and constraints on solutions to
that need.
Recommend the exploration of alternative concepts and methods
to satisfy the need including questioning the need for technology,
i.e., will a change in the business process offer a solution?
Assure executive business and executive technical sponsorship.
The Sponsor designates a Project Manager and the business need is
8
documented in a Concept Proposal. The Concept Proposal includes
information about the business process and the relationship to the
Agency/Organization.
Infrastructure and the Strategic Plan. A successful Concept
Proposal results in a Project Management Charter which outlines
the authority of the project manager to begin
the project.
Careful oversight is required to ensure projects support strategic
business objectives and resources are effectively implemented into an
organization's enterprise architecture. The initiation phase begins when
an opportunity to add, improve, or correct a system is identified and
formally requested through the presentation of a business case. The
business case should, at a minimum, describe a proposal’s purpose,
identify expected benefits, and explain how the proposed system
supports one of the organization’s business strategies. The business case
should also identify alternative solutions and detail as many
informational, functional, and network requirements as possible.
SYSTEM CONCEPT DEVELOPMENT PHASE
The System Concept Development Phase begins after a business need or
opportunity is validated by the Agency/Organization Program
Leadership and the Agency/Organization CIO.
The purpose of the System Concept Development Phase is to:
Determine the feasibility and appropriateness of the alternatives.
Identify system interfaces.
Identify basic functional and data requirements to satisfy the
business need.
Establish system boundaries; identify goals, objectives, critical
success factors, and performance measures.
9
Evaluate costs and benefits of alternative approaches to satisfy the
basic functional requirements
Assess project risks
Identify and initiate risk mitigation actions, and Develop high-
level technical architecture, process models, data models, and a
concept of operations. This phase explores potential technical
solutions within the context of the business need.
It may include several trade-off decisions such as the decision to
use COTS software products as opposed to developing custom
software or reusing software components, or the decision to use an
incremental delivery versus a complete, onetime deployment.
Construction of executable prototypes is encouraged to evaluate
technology to support the business process. The System Boundary
Document serves as an important reference document to support
the Information Technology Project Request (ITPR) process.
The ITPR must be approved by the State CIO before the project
can move forward.
PICTORIAL REPRESENTATION OF SDLC:
10
IMPLEMENTATION PHASE
This phase is initiated after the system has been tested and
accepted by the user. In this phase, the system is installed to support the
intended business functions. System performance is compared to
performance objectives established during the planning phase.
Implementation includes user notification, user training, installation of
hardware, installation of software onto production computers, and
integration of the system into daily work processes. This phase
continues until the system is operating in production in accordance with
the defined user requirements.
PLANNING PHASE
The planning phase is the most critical step in completing development,
acquisition, and maintenance projects. Careful planning, particularly in
the early stages of a project, is necessary to coordinate activities and
manage project risks effectively. The depth and formality of project
plans should be commensurate with the characteristics and risks of a
given project. Project plans refine the information gathered during the
initiation phase by further identifying the specific activities and
resources required to complete a project.
A critical part of a project manager’s job is to coordinate
discussions between user, audit, security, design, development, and
network personnel to identify and document as many functional,
security, and network requirements as possible. During this phase, a plan
is developed that documents the approach to be used and includes a
discussion of methods, tools, tasks, resources, project schedules, and
user input. Personnel assignments, costs, project schedule, and target
dates are established.
11
A Project Management Plan is created with components related to
acquisition planning, configuration management planning, quality
assurance planning, concept of operations, system security, verification
and validation, and systems engineering management planning.
REQUIREMENTS ANALYSIS PHASE
This phase formally defines the detailed functional user
requirements using high-level requirements identified in the Initiation,
System Concept, and Planning phases. It also delineates the
requirements in terms of data, system performance, security, and
maintainability requirements for the system. The requirements are
defined in this phase to a level of detail sufficient for systems design to
proceed. They need to be measurable, testable, and relate to the business
need or opportunity identified in the Initiation Phase. The requirements
that will be used to determine acceptance of the system are captured in
the Test and Evaluation Master Plan.
The purposes of this phase are to:
Further define and refine the functional and data requirements and
document them in the Requirements Document,
Complete business process reengineering of the functions to be
supported (i.e., verify what information drives the business
process, what information is generated, who generates it, where
does the information go, and who processes it),
Develop detailed data and process models (system inputs, outputs,
and the process.
Develop the test and evaluation requirements that will be used to
determine acceptable system performance.
DESIGN PHASE
12
The design phase involves converting the informational,
functional, and network requirements identified during the initiation and
planning phases into unified design specifications that developers use to
script programs during the development phase. Program designs
areconstructed in various ways. Using a top-down approach, designers
first identify and link major program components and interfaces, then
expand design layouts as they identify and link smaller subsystems and
connections. Using a bottom-up approach, designers first identify and
link minor program components and interfaces, then expand design
layouts as they identify and link larger systems and connections.
Contemporary design techniques often use prototyping tools that build
mock-up designs of items such as application screens, database layouts,
and system architectures. End users, designers, developers, database
managers, and network administrators should review and refine the
prototyped designs in an iterative process until they agree on an
acceptable design. Audit, security, and quality assurance personnel
should be involved in the review and approval process. During this
phase, the system is designed to satisfy the functional requirements
identified in the previous phase. Since problems in the design phase
could be very expensive to solve in the later stage of the software
development, a variety of elements are considered in the design to
mitigate risk. These include:
Identifying potential risks and defining mitigating design features.
Performing a security risk assessment.
Developing a conversion plan to migrate current data to the new
system.
Determining the operating environment.
Defining major subsystems and their inputs and outputs.
Allocating processes to resources.
13
Preparing detailed logic specifications for each software module.
The result is a draft System Design Document which captures the
preliminary design for the system.
Everything requiring user input or approval is documented and
reviewed by the user. Once these documents have been approved
by the Agency CIO and Business Sponsor, the final System Design
Document is created to serve as the Critical/Detailed Design for
the system.
This document receives a rigorous review by Agency technical and
functional representatives to ensure that it satisfies the business
requirements. Concurrent with the development of the system
design, the Agency Project Manager begins development of the
Implementation Plan, Operations and Maintenance Manual, and
the Training Plan.
DEVELOPMENT PHASE
The development phase involves converting design
specifications into executable programs. Effective development
standards include requirements that programmers and other project
participants discuss design specifications before programming begins.
The procedures help ensure programmers clearly understand program
designs and functional requirements. Programmers use various
techniques to develop computer programs. The large transaction
oriented programs associated with financial institutions have
traditionally been developed using procedural programming
techniques. Procedural programming involves the line-by-line
scripting of logical instructions that are combined to form a program.
Effective completion of the previous stages is a key factor in the
success of the Development phase. The Development phase consists
of:
Translating the detailed requirements and design into system
components.
14
Testing individual elements (units) for usability.
Preparing for integration and testing of the IT system.
INTEGRATION AND TEST PHASE
Subsystem integration, system, security, and user acceptance
testing is conducted during the integration and test phase. The user,
with those responsible for quality assurance, validates that the
functional requirements, as defined in the functional requirements
document, are satisfied by the developed or modified system. OIT
Security staff assesses the system security and issue a security
certification and accreditation prior to installation/implementation.
Multiple levels of testing are performed, including:
Testing at the development facility by the contractor and possibly
supported by end users
Testing as a deployed system with end users working together with
contract personnel
Operational testing by the end user alone performing all functions.
Requirements are traced throughout testing, a final Independent
Verification & Validation evaluation is performed and all
documentation is reviewed and accepted prior to acceptance of the
system.
IMPLEMENTATION PHASE
15
This phase is initiated after the system has been tested and
accepted by the user. In this phase, the system is installed to support the
intended business functions. System performance is compared to
performance objectives established during the planning phase.
Implementation includes user notification, user training, installation of
hardware, installation of software onto production computers, and
integration of the system into daily work processes. This phase
continues until the system is operating in production in accordance with
the defined user requirements.
OPERATIONS AND MAINTENANCE PHASE
The system operation is on-going. The system is monitored for
continued performance in accordance with user requirements and
needed system modifications are incorporated. Operations continue as
long as the system can be effectively adapted to respond to the
organization’s needs. When modifications or changes are identified, the
system may re-enter the planning phase.
The purpose of this phase is to:
Operate, maintain, and enhance the system.
Certify that the system can process sensitive information.
Conduct periodic assessments of the system to ensure the
functional requirements continue to be satisfied.
Determine when the system needs to be modernized, replaced, or
retired.
16
SOURCE CODE
class hotelfarecal:
def
__init__(self,rt='',s=0,p=0,r=0,t=0,a=1800,name='',address='',cindate='',c
outdate='',rno=101):
print ("\n\n*****WELCOME TO HOTEL*****\n")
self.rt=rt
self.r=r
self.t=t
self.p=p
self.s=s
self.a=a
self.name=name
self.address=address
self.cindate=cindate
self.coutdate=coutdate
17
self.rno=rno
def inputdata(self):
self.name=input("\nEnter your name:")
self.address=input("\nEnter your address:")
self.cindate=input("\nEnter your check in date:")
self.coutdate=input("\nEnter your checkout date:")
print("Your room no.:",self.rno,"\n")
def roomrent(self):#sel1353
print ("We have the following rooms for you:-")
print ("1. type A---->rs 6000 PN\-")
print ("2. type B---->rs 5000 PN\-")
print ("3. type C---->rs 4000 PN\-")
print ("4. type D---->rs 3000 PN\-")
x=int(input("Enter Your Choice Please->"))
n=int(input("For How Many Nights Did You Stay:"))
18
if(x==1):
print ("you have opted room type A")
self.s=6000*n
elif (x==2):
print ("you have opted room type B")
self.s=5000*n
elif (x==3):
print ("you have opted room type C")
self.s=4000*n
elif (x==4):
print ("you have opted room type D")
self.s=3000*n
19
else:
print ("please choose a room")
print ("your room rent is =",self.s,"\n")
def restaurentbill(self):
print("*****RESTAURANT MENU*****")
print("1.water----->Rs20","2.tea----->Rs10","3.breakfast combo---
>Rs90","4.lunch---->Rs110","5.dinner--->Rs150","6.Exit")
while (1):
c=int(input("Enter your choice:"))
if (c==1):
d=int(input("Enter the quantity:"))
self.r=self.r+20*d
20
elif (c==2):
d=int(input("Enter the quantity:"))
self.r=self.r+10*d
elif (c==3):
d=int(input("Enter the quantity:"))
self.r=self.r+90*d
elif (c==4):
d=int(input("Enter the quantity:"))
self.r=self.r+110*d
elif (c==5):
d=int(input("Enter the quantity:"))
self.r=self.r+150*d
elif (c==6):
break;
else:
print("Invalid option")
print ("Total food Cost=Rs",self.r,"\n")
21
def laundrybill(self):
print ("******LAUNDRY MENU*******")
print ("1.Shorts----->Rs3","2.Trousers----->Rs4","3.Shirt---
>Rs5","4.Jeans---->Rs6","5.Girlsuit--->Rs8","6.Exit")
while (1):
e=int(input("Enter your choice:"))
if (e==1):
f=int(input("Enter the quantity:"))
self.t=self.t+3*f
elif (e==2):
f=int(input("Enter the quantity:"))
self.t=self.t+4*f
elif (e==3):
f=int(input("Enter the quantity:"))
self.t=self.t+5*f
22
elif (e==4):
f=int(input("Enter the quantity:"))
self.t=self.t+6*f
elif (e==5):
f=int(input("Enter the quantity:"))
self.t=self.t+8*f
elif (e==6):
break;
else:
print ("Invalid option")
print ("Total Laundary Cost=Rs",self.t,"\n")
def gamebill(self):
print ("******GAME MENU*******")
print ("1.Table tennis----->Rs60","2.Bowling-----
>Rs80","3.Snooker--->Rs70","4.Video games---->Rs90","5.Pool---
>Rs50==6","6.Exit")
23
while (1):
g=int(input("Enter your choice:"))
if (g==1):
h=int(input("No. of hours:"))
self.p=self.p+60*h
elif (g==2):
h=int(input("No. of hours:"))
self.p=self.p+80*h
elif (g==3):
h=int(input("No. of hours:"))
self.p=self.p+70*h
elif (g==4):
h=int(input("No. of hours:"))
self.p=self.p+90*h
24
elif (g==5):
h=int(input("No. of hours:"))
self.p=self.p+50*h
elif (g==6):
break;
else:
print ("Invalid option")
print ("Total Game Bill=Rs",self.p,"\n")
def display(self):
print ("******HOTEL BILL******")
print ("Customer details:")
print ("Customer name:",self.name)
print ("Customer address:",self.address)
print ("Check in date:",self.cindate)
print ("Check out date",self.coutdate)
print ("Room no.",self.rno)
print ("Your Room rent is:",self.s)
print ("Your Food bill is:",self.r)
print ("Your laundary bill is:",self.t)
25
print ("Your Game bill is:",self.p)
self.rt=self.s+self.t+self.p+self.r
print ("Your sub total bill is:",self.rt)
print ("Additional Service Charges is",self.a)
print ("Your grandtotal bill is:",self.rt+self.a,"\n")
self.rno+=
def main():
a=hotelfarecal()
while (1):
print("1.Enter Customer Data")
print("2.Calculate roomrent")
print("3.Calculate restaurant bill")
print("4.Calculate laundry bill")
print("5.Calculate gamebill")
26
print("6.Show total cost")
print("7.EXIT")
b=int(input("\nEnter your choice:"))
if (b==1):
a.inputdata()
if (b==2):
a.roomrent()
if (b==3):
a.restaurentbill()
if (b==4):
a.laundrybill()
if (b==5):
a.gamebill()
27
if (b==6):
a.display()
if (b==7):
quit()
28
INPUT SCREEN
29
30
31
32
OUTPUT SCREEN
33
BIBLIOGRAPHY
▫ XI/XII CS & IP Project List – Computer Application | IT | AI |
Web Application| CS | IP (pythonworld.in)
▫ 6081.hostel management.docx - Google Docs
▫ Computer Science Projects Collection - CBSE Today
▫ Computer science With Python - Class XI By : Sumita Arora
34
THANK YOU!
35