1. 1
A
PROJECT REPORT
ON
Online Hostel Booking
Submitted in Partial Fulfillment of the Requirements
for the award of the degree of
MASTER OF COMPUTER APPLICATIONS (MCA)
By
Vijay kumar
(Enrollment No.152491451805)
Roll No. 1524914027
Under the supervision of
External Guide: Internal Guide:
Priyank Kakran Mrs. Neetu Singh
Dream India Solutions (Project Guider)
Noida
To The
Dep’t. Of Computer Application
Shri Ram College of Management
Muzaffarnagar A K T UNIVERSITY MEERUT
BATCH (2017-2018)
2. 2
Declaration
I Vijay Kumar, declare that the project report title “Online Hostel Booking” is an original
work carried out by me under the supervision of Mr. Priyank Kakran. I further declare that
this work has not been submitted to any other Institute/University for the award of the degree
of Master of Computer Application.
3. 3
Acknowledgement
The satisfaction that accompanies the successful completion of any task would be incomplete
without the mention of people whose ceaseless cooperation made it possible, whose constant
guidance and encouragement crown all efforts with success. We are grateful to our project guide
‘Ms. Neetu Singh for the guidance, inspiration and constructive suggestions that helpful us in the
preparation and execution of this project. We would also express our thanks to our friend and
people who have helped in successful completion of the project.
Since performance feedback is essential for effective communication, mistakes and creative
feedback of the report may be unhesitatingly communicated to us, who will be as far as possible
duly acknowledged and most welcome. In this report, whatever is beneficial comes from
almighty, and whatever is faulty is ours.
4. 4
INDEX
Ch. 1. Introduction
1.1 Scope of the system
1.2 Project Description
1.2.1 About Existing System
1.2.2 Implemantation of Proposed system
1.3 Advantage of Project
Ch. 2. Project Category Tools & Environment
2.1 Project Category
2.2 Front end coverage
2.3 Back end coverage
2.4 Software and Hardware requirements
Ch. 3. Project development stages
3.1 Recognition of needs
3.2 Feasibility study
3.3 System Analysis (DFD’s E-R Diagram, PERT Chart etc.)
3.4 System Analysis (Structure Charts, Structure of Data Table, etc.)
3.5 System Development
3.6 Testing, Implementation & Maintenance
Ch. 4. Project Forms (Details)
Ch. 5. Conclusion
Ch.6. Future Enhancement
Appendix
(A) Bibliography
5. 5
INTRODUCTION
The hostel booking system is developed in favor of the hostel management team which helps
then to save the records of the students about their rooms and other things it helps them for the
manual work from which it is very difficult to find the record of the students and the information
about those ones who had left the hostel years before.
This solution is developed on the plight of the hostel management team Through this they cannot
require so efficient person to handle and manage the affairs of the students in the hostel all you
need to do is to login as admission of all the students who have obtained and registered their
hostel from click verify to ascertain their eligibility and allocate them to the available hostel
identification of the problems of the existing hostel management leads to the development of
computerized solution.
That will be compatible to the existing hostel management with the solution which is more users
friendly and more GUI oriented we can improve the efficiency of the hostel management thus
overcome the drawbacks of the existing managements.
6. 6
1.2 Project Description
1.2.1 About existing system
Almost 60% of today’s information is still paper based.
30% of all office time is spent finding documents.
The average time to manage a single document is 12 minutes, 9 minutes to re-file
and 3 minutes to process.
Hence the requirement is to develop a system that minimizes all these overheads included
while giving the maximum output for the organization.
1.2.2 Present System
The developed system is an innovation in the area of travel agency. In the existing system the no.
of customer required for completing the work is more, while the new system requires lesser
staffs generally. The data entry process requires the data on the paper, which is then feed into the
application by the operator while doing so; the data entry operator has to look into the paper
again & again and thus the chances of inaccuracies in the typed contents increases. Also the
process includes higher transportation cost, increased handling cost, more time delays, low
accuracy, more usage of resources like registers, books, papers, etc.
1.2.3 Benefits of the system
Quick, authenticated access to Customer Information via the desktop.
Easily scalable to grow with changing system requirement.
Enterprise wide access to information.
Improved information security, restricting unauthorized access.
Minimize Storage Space: Space and stores information efficiently. It ends the burden of
having large manual filing storage system.
8. 8
2.1 Project Category
The project is entitled as “Online Hostel Booking” which is based on saved or increases of the
money. This is project stores the information about the Customer, or e can say that traveller that
should be hostel etc. It works on Micosoft Visual Studio 2010 and databases are stored in SQL
server Management.
Dot Net used as Front End
NET is a free, cross-platform, open source developer platform for building many different
types of applications.With .NET , you can use multiple languages, editors, and libraries to
build for web, mobile, desktop, gaming, and IoT.
Features of Dot Net
• Interoperability
• Common Language Runtime engine (CLR)
• Language independence
• Base Class Library
• Simplified deployment
• Security
• Portability
Visual Studio uses front end programming because Visual Studio use back end as like SQL
Sever management Like that Serve Explorer .
In Visual Studio we can use easy database connectivity and design the Form, Report, and other
MDI application with the help of Database.
9. 9
2.3. SQL Server Management as Back end
SQL Server Management is a database. In Access we can easily create Database design and give the
validations. Access allows the many types of relations between the tables.
SQL used as Backend with the Visual Studio. SQL allows creating the Primary Key, Foreign
Key and Unique Key. In Access we can store the data in to the table for using the wizard options.
2.4 Hardware and Software Requirement
Hardware Requirement
Processor : Intel Core Duo 2.0 GHz or more
RAM : 1 GB or More
Hard disk : 80 GB or more
Monitor : 15” CRT , or LCD monitor
Keyboard : Normal or Multimedia
Software Requirement
Operation System : Windows XP,7 or more
Database : SQL Server Management studio
Coding : .Dot Net (C#)
Software : Microsoft Visual Studio 2010
11. 11
3.1 Recognition of need:
The Online hostel booking is undertaken as a project based on data flow . The main objective of the
project is to develop software for Online hostel booking. This project is developed to carry out the
process quickly and easily which is process is not possible with the manual system. This project is
developed using Dot Net (Framework) Visual Studio and SQL server or Serve Explorer.
The current Online hostel booking is manual time consuming and more manpower are required to
handle this system with this project we replace manual system to computerized system which is faster,
less time consuming and manpower.
3.2. Feasibility study
It is feasible to automate the system. The three major areas to determine the feasibility of
project:
Technical Feasibility:
The current level of technology can support the proposed system. The proposed software is
enabling to meet all the objective of the system and output received is more efficient. So the
project is technical feasible.
Economic Feasibility:
The proposed system needs to get hardware and software installed. The short-term costs are
over shadowed by the long-term gains. The profits of the business is raised as this visual
drafting system help in establishing the better relationship between Customer and also satisfy
their query’s and so the cost of the development of the software and hardware is over
shadowed. Thus, project is economically feasible.
Operational Feasibility:
The current system faces a lot of problems that are removed in the proposed system. The
Customer of the system will be free from the burden and a lot of confusion. The clients are
themselves interested in getting the manual system replace by the automated one. The
proposal system is user friendly, so even a layman can use it. Thus it is operationally
feasible.
18. 18
7. Contact
Entity Data type Size
Id integer (50)
Name Nvarchar (50)
Phone Nvarchar (50)
Gender Nvarchar (50)
EmilAddress Nvarchar (50)
Messege Nvarchar (50)
8. User details
Entity Data type size
UserName Nvarchar (50)
Password Nvarchar (50)
Email Nvarchar (50)
Phone Nvarchar (50)
19. 19
9. Packege
3.5 System Development
System Development is actually concerned with the development strategies of system. It is
related mainly to design phase of system which is an important element of System
Development. Good design leads to successful run of software while bad design leads to
destroy sometimes failure of software.
System Design
System design is a solution, "How to approach” to the creation of a new system. This important
phase is composed of several steps. It provides the understanding and procedural feasibility
study. Design goes through a logical and physical stage of development. Logical design reviews
the present physical system, prepares input - output specification, makes edit, security and
control specification, detail implementation plans and prepares a logical design walkthrough.
The physical design maps out the details of the physical system, plans the system
implementation and specifies any new hardware and software.
System design is a highly created process that can be greatly facilitated by the following:
Entity Data type size
PackageId Integer (50)
Name Nvarchar (50)
RoomCategory Nvarchar (50)
PersonalCharge Nvarchar (50)
SharingCharge Nvarchar (50)
BedType Nvarchar (50)
AllowMember Nvarchar (50)
Ac Nvarchar (50)
Wifi Nvarchar (50)
Cab Nvarchar (50)
MonthlyCharge Nvarchar (50)
FoodService Nvarchar (50)
20. 20
1. Strong problem definition,
2. Pictorial description of the existing system, and
3. Set of requirements of the new system.
Input Design
The most common cause of errors in data processing is inaccurate input data errors
entered by the data entry operator. It can be controlled by the input design. Input design is the
process of converting user oriented inputs to the computer based formats. The goal of the
input design is to make data entry as easy, logical and free from as many errors as possible.
Output Design
Computers are the most important sources of information to the users are fed into the
computers to acquire the necessary outputs. The computers can provide the well enough
output in the form of information regarding various items to the users. The major form of
output is a hard copy from the printer. Printouts are designed around the output requirements
of the user(s).
Interface Design
Forms are designed to control the redundancy, increased operator accuracy maximum
readability, easy data entry and elimination of unnecessary data to provide easier checking and
correction of data.
Keeping in view the user's requirements, the input/output forms have been designed and
developed for easy data entry and query handling.
Based on the various types of inputs to be fed into the computer in using this system, several
inputs forms have been designed to make data entry easier and accurate.
Database Design
The collection of data is usually referred to as the database. The database contains
information about the particular enterprise. Database systems are designed to manage larger
bodies of information. The management of data involves both the definition of the structures
21. 21
for the storage of the information and the provision for the mechanism to manipulate the
information. In addition the database system must provide the safety of the information stored
in the database, despite system crashes or attempts at unauthorized access.
3.6 Testing, Implementation & Maintenance
Software Testing
Software testing is a critical element of software quality assurance and represents the ultimate
review of specification, design and coding. Software testing is the process of testing the
software product. Effective software testing will contribute to the delivery of higher quality
software products, more satisfied users, lower maintenance costs, more accurate, and reliable
results,
However, ineffective testing will lead to the opposite results; low quality products,
unhappy users, increased maintenance costs, unreliable and inaccurate results. Hence,
software testing is necessary and important activity of software development process.
Software Testing has three main purposes:
1. Verification: Verification Process confirms that the software meets its technical
specifications. A “Specification” is a description of function in terms of measurable output value
given a specific input value under specific preconditions.
2. Validation: Validation confirms that the software meets the business requirements. Acc. To
IEEE, “it is process of evaluating a system or component during or at the end of development
process to determine whether it satisfies the specified requirements.
3. A defect is a variance between the expected and actual result. The defects ultimate source
may be traced to fault introduced in specification, design or development phases.
Testing Objectives: -
1. Testing is a process of executing a program with the intent of finding an error.
22. 22
2. A good test case is one that has a high probability of finding an undiscovered error.
3. A successful test is one that uncovers an undiscovered error.
4. Software testing is designed to establish that the software is working satisfactorily as per the
requirements.
5. It is process designed to prove that the program is error free.
6. To understand essential characteristics of tool used for test automation.
Testing Principles:-
• All tests should be traceable to customer's requirements.
• Test should be planned long before the testing begins.
• Testing should begin "in the small" & progress towards "in the large".
• Exhaustive Testing is not possible.
• To be most effective, an independent third party should conduct.
• Initiate actions for correction, corrective actions and prevention actions
Types of Testing:
1. Acceptance Testing:
This testing is used when the software is developed for a specific customer. A series of tests are
conducted to enable the customer to validate all requirements. The acceptance Test phase is
the phase used by the customer to determine whether to accept the system or not.
2. Alpha Testing:
23. 23
This Testing is used when software is developed as a product for anonymous customers. Hence
acceptance Testing is not possible in such a cases. Alpha Testing is performed at the developers
site by the customer. These tests are conducted in controlled environment.
3. Beta Testing:
This Testing is used when software is developed as a product for anonymous customers. Hence
acceptance Testing is not possible in such a cases. Beta Testing is conducted by the
customers/end users at their sites. In this, developer is not present while performing testing.
These tests are conducted in real environment that cannot be controlled by the developer.
4. Development Testing:
This Testing involves constructing a test plan that describes how should we test the software
and then, designing and running suite of that cases that satisfy the requirement of test plan.
5. Regression Testing:
Regression testing is the process of retesting the modified parts of the software and ensuring
that no new errors have been introduced previously tested code.
It serves many purposes such as to:
Increase confidence in the correctness of the modified program.
Locate errors in modified program.
Preserve the quality and reliability of software.
Ensure the software’s continued operation.
Levels of Testing
There are three levels of Testing i.e., individual module to the entire software system.
Unit Testing, Integration Testing, System Testing.
Unit Testing
Unit testing is the process of taking a module and running it in isolation from the rest of the the
Software product by using prepared test cases and comparing the actual results with the results
24. 24
predicted by the specifications and design of the module. One purpose of testing is to find (and
remove) as many errors in the software as practical.
Integration Testing
In Integration Testing, the seperate modules will be tested together to expose faults in the
interfaces and in the interaction between integrated components. Testing is usually black box
as the code is not directly checked for errors.
System Testing
System testing will compare the system specifications against the actual system. After the
integration test is completed, the next test level is the System test. System testing checks if the
integrated product meets the specified requirements.
Debugging
The process of testing generates symptoms, and a program's failure is a clear symptom of
the presence of an error. After getting a symptom, we begin to investigate the cause and place
of that error. After identification of place, we examine that portion to identify the cause of the
problem. This process is called debugging.
Hence, debugging is the activity of locating and correcting errors. It can start once a failure
has been detected. Unfortunately, going from the detection of a failure to correcting the error
that is responsible, is far from trivial. It is one of the least understood activities in software
development and is practiced with the least amount of discipline. It is often approached with
much hope and little planning.
The debugging of microprocessor programs is generally quite difficult because of the
inability to observe register contents directly, the primitive debugging aids, the close
interaction between hardware & software, the frequent dependence of programs on precise
timing, and the difficulty of obtaining adequate data for real-time applications, The tools that
can be used by programs with brief description are given below: -
25. 25
Simulators: -
It is a computer program that simulates the execution of programs on another computer.
Logical Analyzers:
It is a test instrument that is the digital bus-oriented version of the oscilloscope. It detects the
states of digital signals during each clock cycle & stores them in the memory. It then displays
the information on a CRT, much as an oscilloscope doc.
Breakpoints: -
It is place in a program at which execution can be halted, in order to examine the current
contents of registers, memory locations & I/O ports.
Trace Routines: -
A trace is a program that prints information concerning the status of the processor at specified
intervals. Most simulator program & some microcomputer development system have trace
facilities.
Memory Dumps: -
A memory dump is a listing of the Current contents of a section of the memory. Most simulator
programs, microcomputer development systems & monitors can produce memory dumps.
Software Interrupts:-
The software interrupts or trap instruction is frequently used for debugging purposes. The
instruction usually saves the current value of the program counter & then branches to a
specified memory location. That information location can be the starting point of a debugging
program that lists or displays status information - breakpoint may be inserted with trap
instructions
26. 26
System Implementation
Implementation, literally, means to put into effects or to carry out. The system implementation
phase of software engineering deals with all activities that take place to convert from the old
system to the new. Proper implementation is essential to provide system to meet
organization's requirements.
During the implementation phase debugging, documentation of the system was created out,
module in the project for
• Accuracy of Results,
• Minimization of response Time,
• Clarity and Simplicity of the code,
• Minimization of hard - Coding i.e. (a generic approach was followed)
• Minimization of amount of memory used.
Various types of errors were discovered while debugging the modules. These ranged from
errors to failure to account for various processing cases. Proper documentation of each module
was done by embedding comments in the executable portion of the code. To enhance the
readability, comments, indentation, parenthesis, block spaces, blank lines and borders were
around the blocks of comments. Care was taken to use descriptive names for table, field
modules, forms etc. The proper use of indentation, parenthesis and blank lines was also
ensured during coding.
Some aspects of implementation that are particularly important to software engineering that
are often not covered in programming texts. These are:
1. Reuse: Most modern software is constructed by reusing existing components or systems.
When we are developing software, we should make as much use as possible of existing code.
2. Configuration management: During the development process, many different versions of
each software component are created. If we don’t keep track of these versions in a
27. 27
configuration management system, we are liable to include the wrong versions of these
components in our system.
3. Host-target development: Production software does not usually execute on the same
computer as the software development environment. Rather, we develop it on one computer
(the host system) and execute it on a separate computer (the target system). The host and
target systems are sometimes of the same type but, often they are completely different.
28. 28
Software Maintenance
Software maintenance is a task that every development group has to face when the software is
delivered to the customer’s site, installed and is operational. Therefore, delivery or release of
software inaugurates the maintenance phase of the life cycle. Software maintenance is a very
broad activity that includes error correction, enhancement of capabilities, deletion of obsolete
capabilities, and optimization. The purpose is to preserve the value of software over time. The
value can be enhanced by expanding the customer base, meeting additional requirements,
becoming easier to use, more efficient and employing newer technology.
Fundamental objective of system maintenance:-
1. To complete the system tasks as quickly as possible without compromising the system
reliability and quality.
2. To preserve those aspects of programs that were correct and to avoid the possibility that
fixes applications and causes other aspects of those applications to behave differently.
3. To react proactively to affect changes to existing applications, to correct errors that were
made during system design or implementation.
4. To avoid as much as possible degradation of system performance.
Categories of Maintenance:
There are four major categories of software maintenance, which are discussed below:
Corrective maintenance:
This refers to modifications initiated by defects in the software. A defect can result from
design errors and coding errors. Design errors occur when changes made to the software are
incorrect, incomplete, wrongly communicated or the change request is misunderstood. Logic
errors result from invalid tests and conclusions, incorrect implementation of design
specifications, faulty Logic flow or incomplete test data. Coding errors are caused by incorrect
29. 29
implementation of detailed logic design and incorrect use of the source code logic. Defects are
also caused by data processing errors and system performance errors.
Adaptive maintenance:
It includes modifying the software to match changes in the ever-change in environment.
The term environment in this context refers to the totality of all conditions and influences
which act from outside upon the software, for example, business rules, government policies,
work patterns, software and hardware operating platforms. A change to the whole or part of
this environment will require a corresponding modification of the software.
Perfective maintenance:
It means improving processing efficiency or performance, or restructuring the software to
improve changeability. Perfective maintenance refers to enhancements: making the product
better, faster, smaller, better documented, cleaner structured, with more functions or reports.
Preventive maintenance:
There are long term effects of corrective, adaptive and perfective changes. This leads to
increase in the complexity of software, which reflects deteriorating structure. The work is
required to be done to maintain it or reduce it, is called Preventive maintenance. This term is
often used with hardware systems and implies such things as lubrication of parts before need
occur.
50. 50
<span class="cbp-ig-icon
w3_cube"></span>
<h4 class="cbp-ig-title">SEA VIEW
BALCONY</h4>
<span class="cbp-ig-category">Hostel
Inn</span>
</div>
</li>
<li>
<div class="w3_grid_effect">
<span class="cbp-ig-icon
w3_users"></span>
<h4 class="cbp-ig-title">LARGE
CAFE</h4>
<span class="cbp-ig-category">Hostel
Inn</span>
</div>
</li>
<li>
<div class="w3_grid_effect">
<span class="cbp-ig-icon
w3_ticket"></span>
<h4 class="cbp-ig-title">WIFI
COVERAGE</h4>
<span class="cbp-ig-category">Hostel
Inn</span>
</div>
</li>
</ul>
</div>
</div>
</div>
<!-- //banner-bottom -->
<!-- /about -->
<div class="about-wthree" id="about">
<div class="container">
<div class="ab-w3l-spa">
<h3 class="title-w3-agileits title-black-wthree">About Our Shree Ram
Hostel</h3>
<p class="about-para-w3ls">Since the arrival of
the hippies in the sixties, india has been a major destination on the itinerary of international and
domestic tourists. The tourist season in india begins in late September and carries on through
early March. The weather in these months is usually dry and pleasantly cool. </p>
<img src="images/b1.jpg" class="img-
responsive" alt="Hair Salon">
51. 51
<div class="w3l-
slider-img">
<img
src="images/b2.jpg" class="img-responsive" alt="Hair Salon">
</div>
<div class="w3ls-info-about">
<h4>Welcome in
Shree Ram Hostel </h4>
<p>You'll
love all the amenities we offer!. </p>
</div>
</div>
<div class="clearfix"> </div>
</div>
</div>
<!-- //about -->
<!--sevices-->
<div class="advantages">
<div class="container">
<div class="advantages-main">
<h3 class="title-w3-agileits">Our Services</h3>
<div class="advantage-bottom">
<div class="col-md-6 advantage-grid left-w3ls wow bounceInLeft" data-
wow-delay="0.3s">
<div class="advantage-block ">
<i class="fa fa-credit-card" aria-hidden="true"></i>
<h4>Stay First, Pay After! </h4>
<p>What makes our hotel so special is that unlike other
Bhutan’s most famous hotels, we do not withdraw the money from your account during
reservations. Despite the flexible payment system there might be exceptions for some discount
rates. All details are systematically provided at the moment of reservation and at the check
out.</p>
</div>
</div>
<div class="col-md-6 advantage-grid right-w3ls wow zoomIn" data-wow-
delay="0.3s">
<div class="advantage-block">
<i class="fa fa-clock-o" aria-hidden="true"></i>
<h4>24 Hour Services</h4>
<p>All details are systematically provided at the moment
of reservation and at the check out.</p>
<p><i class="fa fa-check" aria-hidden="true"></i>24 hours
room service</p>
<p><i class="fa fa-check" aria-hidden="true"></i>24-hour
Concierge service</p>
52. 52
</div>
</div>
<div class="clearfix"> </div>
</div>
</div>
</div>
</div>
<!--//sevices-->
<!-- team -->
<div class="team" id="team">
<div class="container">
<h3 class="title-w3-agileits title-black-wthree">Meet Our Team</h3>
<div id="horizontalTab">
<ul class="resp-tabs-list">
<li>
<img src="images/teams1.jpg" alt=" " class="img-
responsive" />
</li>
<li>
<img src="images/teams2.jpg" alt=" " class="img-
responsive" />
</li>
<li>
<img src="images/teams3.jpg" alt=" " class="img-
responsive" />
</li>
<li>
<img src="images/teams4.jpg" alt=" " class="img-
responsive" />
</li>
</ul>
<div class="resp-tabs-container">
<div class="tab1">
<div class="col-md-6 team-img-w3-agile">
</div>
<div class="col-md-6 team-Info-agileits">
<h4>Parveen Rana</h4>
<span>Manager</span>
<p>Younger managers leading older
employees can be awkward for everyone. Grayer heads can view youthful bosses as
inexperienced, insensitive to the complications of later life, or entitled by a golden child
upbringing. Meanwhile, newbie managers can feel unfairly judged for their lack of experience or
struggle with imposter syndrome despite their skills.</p>
<div class="social-bnr-agileits footer-icons-
agileinfo">
<ul class="social-icons3">
53. 53
<li><a href="#" class="fa fa-
facebook icon-border facebook"> </a></li>
<li><a href="#" class="fa fa-twitter
icon-border twitter"> </a></li>
<li><a href="#" class="fa fa-google-
plus icon-border googleplus"> </a></li>
<li><a href="#" class="fa fa-rss
icon-border rss"> </a></li>
</ul>
</div>
</div>
<div class="clearfix"> </div>
</div>
<div class="tab2">
<div class="col-md-6 team-img-w3-agile">
</div>
<div class="col-md-6 team-Info-agileits">
<h4>Kanak Connor</h4>
<span>Receptionist</span>
<p>Do you know the percentage of people
that get frustrated with automated menus and impersonal machine greetings? We are sure it’s
around 100%. Using them might be convenient for you, but bad for your business. Customers
would much rather interact with a person, especially one that they can understand. We employ
the most professional, empathetic, and knowledgeable agents in the industry, so your customers
will always be in good hands and satisfied that their needs are being addressed.
There are many more benefits to a virtual receptionist service, but these five are definitely the
most important. In the end, a virtual receptionist service brings an unmatched level of flexibility
and professionalism to your business – all while saving you money.</p>
<div class="social-bnr-agileits footer-icons-
agileinfo">
<ul class="social-icons3">
<li><a href="#" class="fa fa-
facebook icon-border facebook"> </a></li>
<li><a href="#" class="fa fa-twitter
icon-border twitter"> </a></li>
<li><a href="#" class="fa fa-google-
plus icon-border googleplus"> </a></li>
<li><a href="#" class="fa fa-rss
icon-border rss"> </a></li>
</ul>
</div>
</div>
<div class="clearfix"> </div>
</div>
<div class="tab3">
<div class="col-md-6 team-img-w3-agile">
54. 54
</div>
<div class="col-md-6 team-Info-agileits">
<h4>Ruchi Singh</h4>
<span>Manager</span>
<p>Most large organizations today are
complex system. One of commonly used approaches of making sense of complex systems is
decomposition, or splitting larger system into smaller and simpler parts - divisions, both
permanent and temporary, like projects. For top management in organization these parts can be
represented by a single person each, which makes the whole picture much easier to manage. This
person, a manager of such a division, is reponsible for the work of his subordinates and
achievment of goals, solves their problems, deals with issues etc.</p>
<div class="social-bnr-agileits footer-icons-
agileinfo">
<ul class="social-icons3">
<li><a href="#" class="fa fa-
facebook icon-border facebook"> </a></li>
<li><a href="#" class="fa fa-twitter
icon-border twitter"> </a></li>
<li><a href="#" class="fa fa-google-
plus icon-border googleplus"> </a></li>
<li><a href="#" class="fa fa-rss
icon-border rss"> </a></li>
</ul>
</div>
</div>
<div class="clearfix"> </div>
</div>
<div class="tab4">
<div class="col-md-6 team-img-w3-agile">
</div>
<div class="col-md-6 team-Info-agileits">
<h4>Neeraj</h4>
<span>Receptionist</span>
<p>“Receptionist” is one who is engaged
with an organization to receive or greet any visitors or clients and answer telephone calls.
It is utmost role of the receptionist to ensure that all callers, clients & customers are taken care of
& a good business image is given to the public creating a goodwill which is the most essential
element of success of any business in today’s world.
If a client or customer is treated poorly by the front-desk staff which is a receptionist, it is most
likely that they will have a negative image of that company in their mind.</p>
<div class="social-bnr-agileits footer-icons-
agileinfo">
<ul class="social-icons3">
<li><a href="#" class="fa fa-
facebook icon-border facebook"> </a></li>