Font Size: a A A

The Development Of Hotel Management System Software Yutai Power Supply Company

Posted on:2013-01-02Degree:MasterType:Thesis
Country:ChinaCandidate:X D LiFull Text:PDF
GTID:2248330374486227Subject:Software engineering
Abstract/Summary:PDF Full Text Request
Along with the hotel services continue to expand the scale, involving a largenumber of data processing, rely on paper for recording information to make the jobbecomes complex, and to keep these information creates unnecessary work, reduce thework efficiency. In order to adapt to the modern management, the use of computerautomation management system to handle the guest room of the hotel business, thehotel service industry is the necessary way of management.In this paper, according to the domestic and international hotel industrydevelopment situation, in view of the computer room in the industry use, describes ahotel room management system implementation process, including: front deskmanagement as the core, check the room information, fill in the arrival of customerinformation, to complete the customer arrival and reservation, to the customerinformation inquiry function, for hotel management staff to provide fast, efficientservice creates a condition; real time reflecting the guest room information function,reduce the workload, convenient for the customer service personnel to provideappropriate rooms provide accurate information; to achieve financial inquiry, meet themanagers know the business demand; use SQL Server database to store data, convenientmanagement and preservation. The system can realize the guest room managementsystem is changed, standardization, automation, thereby improving hotel service quality,obtained better economic benefits.This system adopts B/S architecture, solves the following three key problemsmainly:The first is the security of the data,user can not use the form and the systeminteractive function thereby bypassing validation dievtly to a page,take special treatmentin the page of verification,the database will not be written into the program directly,thisavoid the stolen and lost for database name.Second is the consistency of the data,by the use of transaction processing of datasubmission,the submitted data will all be successed or all failed,without causing thephenomenon by the plurality of data when it’s submitting or updataing.Third is designed a modelar.First is divide the system into a plurality modules bythe methods of decomposition and coordination.Then, make all the function of eachmodule clear.They are readable and maintainable.Build the system on the bass of the module fuction.According to the character of users,build the system architecture.Thelast step,after the system E-R diagram is analysised,and then design the structure ofdatabase.
Keywords/Search Tags:data processing, data security, consistency of data
PDF Full Text Request
Related items