Department of Computer Science & Applicationsckverma.com/Doc-Format/MCA M.Sc. Project.doc  · Web...

140
A Project Report on Online Education System Online Education System Submitted in the partial fulfillment of the requirement for the award of Degree of Master of Computer Application (Session: 2012-2015) Under Supervision of: Submitted By: Dr.Chander Kant Shakti Singh Assistant professor MCA-6 th Sem RollNo: 2070963 Page| 1

Transcript of Department of Computer Science & Applicationsckverma.com/Doc-Format/MCA M.Sc. Project.doc  · Web...

Page 1: Department of Computer Science & Applicationsckverma.com/Doc-Format/MCA M.Sc. Project.doc  · Web viewI, Shakti Singh, a student of Master of Computer Applications (MCA),VIth semester

A

Project Report on

Online Education SystemOnline Education System

Submitted in the partial fulfillment of the requirement for the award of Degree of

Master of Computer Application(Session: 2012-2015)

Under Supervision of: Submitted By:

Dr.Chander Kant Shakti SinghAssistant professor MCA-6th Sem

RollNo: 2070963

DEPARTEMENT OF COMPUTER SCIENCE & APPLICATIONKURUKSHETRA UNIVERSITY KURUKSHETRA

Page| 1

Page 2: Department of Computer Science & Applicationsckverma.com/Doc-Format/MCA M.Sc. Project.doc  · Web viewI, Shakti Singh, a student of Master of Computer Applications (MCA),VIth semester

Department of Computer Science & ApplicationsKurukshetra University, Kurukshetra

DECLARATION

I, Shakti Singh, a student of Master of Computer Applications (MCA),VIth semester in the

Department of Computer Science & Applications, Kurukshetra University, Kurukshetra, under

Roll No.2070963, session 2012-15, hereby declare that the project entitled “Online Education

System” has been completed by me at “Localhost Infotech” after the theory examination of Vth

semester.

The matter embodied in this project work has not been submitted earlier for award of any degree

or diploma to the best of my knowledge and belief.

Date: (Shakti Singh)

Page| 2

Page 3: Department of Computer Science & Applicationsckverma.com/Doc-Format/MCA M.Sc. Project.doc  · Web viewI, Shakti Singh, a student of Master of Computer Applications (MCA),VIth semester

Department of Computer Science & ApplicationsKurukshetra University, Kurukshetra

Dr. Chander Kant

(Assistant Professor)

CERTIFICATE

It is certified that Mr. Shakti Singh,a student of Master of Computer Applications (MCA), under

Roll No.2070963 for the session 2012-2015, has completed the project entitled “Online

Education System” undertaken at Localhost Infotech under my supervision. He has attended

the Department of Computer Science & Applications, Kurukshetra University, Kurukshetra and

Localhost Infotech for required number of days after the theory examination of Vth semester.

I wish him all success in his all endeavors.

(Dr. Chander Kant)

Page| 3

Page 4: Department of Computer Science & Applicationsckverma.com/Doc-Format/MCA M.Sc. Project.doc  · Web viewI, Shakti Singh, a student of Master of Computer Applications (MCA),VIth semester

Department of Computer Science & ApplicationsKurukshetra University, Kurukshetra

Dr. Rajender Nath

Professor & Chairman

CERTIFICATE

It is certified that Mr. Shakti Singh is a bona fide student of Master of Computer Applications

(MCA), under Roll No.2070963. He has undertaken the project entitled Online Education

System at Localhost Infotech under the supervision of Dr. Chander Kant.

I wish him all success in his all endeavors.

(Dr. Rajender Nath)

Page| 4

Page 5: Department of Computer Science & Applicationsckverma.com/Doc-Format/MCA M.Sc. Project.doc  · Web viewI, Shakti Singh, a student of Master of Computer Applications (MCA),VIth semester

AcknowledgementAcknowledgement is the perfect way to convey heartiest thanks to all outstanding personalities.

I consider myself fortunate to get the opportunity of doing a project, yet the opportunity could

not have been utilized without the guidance and support of many individuals.

First of all, I wish to express my gratitude to my guide Dr. Chander Kant, Assistant Professor,

Department of computer science & application, K.U. Kurukshetra for his cooperation and tell

me the right direction in preparing this project. I was fortunate to have him as my project guide.

He was ever willing to give me all kind of support and encouragement.

I also register my gratitude to project guide Mr. Sanjeev Rajput (Chief Instructor at Localhost

Infotech Pvt.Ltd, Chandigarh) for allowing me to undergo training at Localhost Infotech pvt.ltd,

chandigarh.

I am highly indebted to Localhost Infotech pvt.ltd, chandigarh especially Mr. Sanjeev Rajput,

for giving me a rare opportunity to undertake this project.

Finally, I would be failing to my duty if i did not put on record my deep sense of obligation to my

parents and friends, who provided me an environment conducive to hard work.

(Shakti Singh)

Page| 5

Page 6: Department of Computer Science & Applicationsckverma.com/Doc-Format/MCA M.Sc. Project.doc  · Web viewI, Shakti Singh, a student of Master of Computer Applications (MCA),VIth semester

INDEX

NAME OF TOPIC PAGE NO. 1. COMPANY PROFILE 6-7

2. INTRODUCTION TO PROJECT 8-9

3. SYSTEM ANALYSIS 10-12

4. INITIAL STUDY AND FEASIBILITY ANALYSIS 13-22

5. SOFTWARE REQUIREMENT SPECIFICATION 23-24

6. SYSTEM DESIGN 25-33

7. DATA FLOW DIAGRAMS 34-36

8. LANGUAGES USED 37-44

9. SYSTEM REQUIREMENTS 45 10. TABLES USED 46-50

11. PROJECT CODING AND SCREENSHOTS 51-81

12. SYSTEM TESTING AND IMPLEMENTATION 82-93 13. CONCLUSION 94

14. BIBLIOGRAPHY 95

Page| 6

Page 7: Department of Computer Science & Applicationsckverma.com/Doc-Format/MCA M.Sc. Project.doc  · Web viewI, Shakti Singh, a student of Master of Computer Applications (MCA),VIth semester

FIGURE INDEX

FIGURE PAGE NO.

1. Data Flow Diagram: Level 0 34

2. Data Flow Diagram: Level 1 35

3. Data Flow Diagram shows working of project 36

5. TABLES USED 46-50

Category Table

Sub-Category Table

Country Table

State Table

City Table

Member Table

User Table

Article Table

Posting Questions Table

Replies Table

Ratings Table

Question Table

Answers Table

Polling Table

Polling Answer Table

Polling Result Table

Page| 7

Page 8: Department of Computer Science & Applicationsckverma.com/Doc-Format/MCA M.Sc. Project.doc  · Web viewI, Shakti Singh, a student of Master of Computer Applications (MCA),VIth semester

COMPANY PROFILE

Localhost Infotech is a leading technology company with the global out reach specializing in

providing top solutions for all category users. Their strong commitment towards quality has

secured us a privileged position in a fast evolving market, the key advantage being a state of art

of product based on cutting edge technologies.

The company delivers a full service offerings that helps numerous customers achieve maximum

return on their investment through dedicated software experts, management tools and product

selection consultation on business critical soft wares, including desktop, storage, security

infrastructure and data management.

Company History:

Localhost Infotech was founded in 1999 and is private owned. Since its first day of Business,

Localhost InfoTech has required no financial Banking or assistance the company has been self

sufficient and profitable in all years of operation.

The directors of company are Mr. Mohanbir Singh Chawla and Mr. Harminder Singh Chawla,

who are highly educated and each having 5 to 7 years of experience in this industry. The

company mission and culture has reminded constant over the years.

Goal:

The goal of Localhost Infotech is to be responsive to its users and provide them with software

solution to assist them in being more efficient and productive in their work. The company plans

on continually improving software to help its clients take advantage new technology.

The Company:

Founded in 1999, Localhost Infotech, headquarter in Chandigarh, India. The activity is focused

on the following major activity axes:

Software Development

Networking consultancy

Page| 8

Page 9: Department of Computer Science & Applicationsckverma.com/Doc-Format/MCA M.Sc. Project.doc  · Web viewI, Shakti Singh, a student of Master of Computer Applications (MCA),VIth semester

Project Management

Software Export

The Company is

Producing, developing and internationally distributing high quality software products.

Providing integrated solutions for data security and reliable services in files like software

distribution, consultancy and technical support.

Providing solutions in banking, healthcare, insurance and publishing industry.

The People:The people are their key strength. They pick and nurture the best to create an awesome base of

expertise and talent. They are a team of young professionals, enthusiastic and talented people.

Software programmers, product managers or technical support people, the company is

committed to provide their clients with high quality products and flawless technical support. The

people working in sales, marketing and administration divisions are all client driven, closely co-

operating with the software developers, therefore making them as an unbeatable team.

The Capabilities: The reliability of the products, the flexible licensing program and the low prices show their

commitment towards their clients. LOCALHOST INFOTECH software strategic partnership

with reputable companies allover the world has created a global network with excellent results

and outstanding performance in the distribution of software products.

Page| 9

Page 10: Department of Computer Science & Applicationsckverma.com/Doc-Format/MCA M.Sc. Project.doc  · Web viewI, Shakti Singh, a student of Master of Computer Applications (MCA),VIth semester

Introduction and Overview of the ProjectOnline Education System:Online Education System is a computerized, online solution to the various problems faced by

Students or may be Employees or Professionals wishing to increase their Knowledge Base, and

regime in their respective field.

In spite of boasting of thousands of students/institutes from the Northern States of Haryana,

Punjab and Himachal Pradesh, it is seen that a number of students have only basic knowledge

about the subjects they are studying.

A Student (from some remote area where there are not so good institutions for higher studies)

who wishes to excel in his/her respective field may have to go to some distant place in search for

some good institute or he/she has to start studying through some correspondence. The basic

problem with the Correspondence courses is that despite of being provided with good material

student might not get their queries solved in time which may make them lose interest in that

particular query/subject. As has rightly been said that “A stitch in time may saves nine”, so does

this project is intended to do. It is not that no effort has been made towards this end. A lot of

people tried their best in this field but either they were confined to only one particular subject or

the tutorials were just one sided, like the teacher just passed on the text file to the server and

student downloaded it to his system. This shortcoming is glaringly evident.

Therefore, the solution lies in introducing an Online Education System that is equivalent to the

real life library system. The basic functioning of this computerized system remains the same as

the real-life library system only difference being that it is online. Online System implies the

understanding of the Information Technology in pervasive today’s world. Information

Technology is the implementation of technology in the manipulation of the information. When

this information is able to reach multiple people using the computerized environment then it

implies an online scenario.

Page| 10

Page 11: Department of Computer Science & Applicationsckverma.com/Doc-Format/MCA M.Sc. Project.doc  · Web viewI, Shakti Singh, a student of Master of Computer Applications (MCA),VIth semester

OBJECTIVES

Thus, the main objectives of the Online Education System can be enumerated as follows:

Smooth flow of data without any hurdles.

Adequate security of data.

Facility to update data from time to time.

Prompt and specific retrieval of data.

Flexibility in the system according to the changing environment.

Controlling redundancy in storing the same data multiple times.

Accuracy, timeliness and comprehensiveness of the system output.

Stability and operability by people having limited knowledge of working of online sys-

tem.

Page| 11

Page 12: Department of Computer Science & Applicationsckverma.com/Doc-Format/MCA M.Sc. Project.doc  · Web viewI, Shakti Singh, a student of Master of Computer Applications (MCA),VIth semester

SYSTEM ANALYSIS

System analysis is the process of studying the business processors and procedures, generally

referred to as business systems, to see how they can operate and whether improvement is needed.

This may involve examining data movement and storage, machines and technology used in the

system, programs that control the machines, people providing inputs, doing the processing and

receiving the outputs.

Investigation Phase:The investigation phase is also known as the fact-finding stage or the analysis of the current

system. This is a detailed study conducted with the purpose of wanting to fully understand the

existing system and to identify the basic information requirements. Various techniques may be

used in fact-finding and all fact obtained must be recorded.

A thorough investigation was done in every effected aspect when determining whether the

purposed system is feasible enough to be implemented.

Investigation:As it was essential for us to find out more about the present system, we used the following

methods to gather the information: -

1. Observation: - Necessary to see the way the system works first hand.

2. Document sampling: - These are all the documents that are used in the system. They

are necessary to check all the data that enters and leaves the system.

3. Questionnaires: - These were conducted to get views of the other employees who are

currently employed in the system.

Page| 12

Page 13: Department of Computer Science & Applicationsckverma.com/Doc-Format/MCA M.Sc. Project.doc  · Web viewI, Shakti Singh, a student of Master of Computer Applications (MCA),VIth semester

Analysis of the Investigation:

Strengths of the System

1. No complex equipment: - The equipment that is used is very simple and no special skills

have to be mastered to be able to operate the system. Therefore no training is

required for the employees.

2. Low cost: - There is little money spent in maintaining the present system other than buying

the necessary office equipment and the ledgers.

Constraints and Limitations:The constraints and limitation within a system are the drawbacks that occur during the

implementation of the system. These limitations and constraints can crop up in almost every

system; the most important fact is to find a way to overcome these problems.

Software design is the first of three technical activities – design, code generation, and test that

are required to build and verify the software. Each activity transforms information in manner that

ultimately results in validated computer software.

The design task produces a data design, an architectural design, an interface design and

component design.

Page| 13

Page 14: Department of Computer Science & Applicationsckverma.com/Doc-Format/MCA M.Sc. Project.doc  · Web viewI, Shakti Singh, a student of Master of Computer Applications (MCA),VIth semester

The design of an information system produces the details that clearly describe how a system will

meet the requirements identified during system analysis. The system design process is not a step

by step adherence of clear procedures and guidelines. When I started working on system design,

I face different types of problems; many of these are due to constraints imposed by the user or

limitations of hardware and software available. Sometimes it was quite difficult to enumerate

that complexity of the problems and solutions thereof since the variety of likely problems is so

great and no solutions are exactly similar however the following consideration I kept in mind

during design phased.

Design objectives:-

The primary objective of the design is to deliver the requirements as specified in the feasibility report. These are the some of the objectives, which I kept in mind.

Practicality: The system is quite stable and can be operated by the people with average intelligence.

Efficiency: I tried to involve accuracy, timeliness and comprehensiveness of the system output.

Cost: It is desirable to aim for the system with a minimum cost subject to the con-dition that it must satisfy the entire requirement.

Flexibility: I have tried that the system should be modifiable depending on the changing needs of the user. Such modifications should entail extensive recon-structing or recreation of software. It should also be portable to different computer systems.

Security: This is very important aspect which I followed in this designing phase and tried to covers the areas of hardware reliability, fallback procedures, and physical security of data.

Page| 14

Page 15: Department of Computer Science & Applicationsckverma.com/Doc-Format/MCA M.Sc. Project.doc  · Web viewI, Shakti Singh, a student of Master of Computer Applications (MCA),VIth semester

Initial Study and Feasibility Analysis

Initial Study

The first step in the Software Development Life Cycle (SDLC) is the preliminary investigation to

determine the feasibility of the system. The purpose of the preliminary investigation is to

evaluate project requests. It is not a design study nor does it include the collection of details to

describe the business system in all aspect. Rather it is the collection of the information that helps

committee members to evaluate the merits of the project request and make an informed judgment

about the feasibility of the proposed project.

The preliminary investigation should accomplish the following objectives.

Clarify and understand the project request.

Determine the size of the project.

Assess costs and benefits of alternative approaches.

Determine the technical and operational feasibility of alternative approaches.

Page| 15

Page 16: Department of Computer Science & Applicationsckverma.com/Doc-Format/MCA M.Sc. Project.doc  · Web viewI, Shakti Singh, a student of Master of Computer Applications (MCA),VIth semester

Report the findings to management; with recommendations outlining the acceptance

or rejection of the proposal.

Conducting the investigation:

The data that the analysts collect during preliminary investigations are gathered through three

primary methods:

Reviewing organization documents

Onsite observation

Conducting interviews

On-site observations:

Another important technique to collect data is on-site observation. The purpose of the on-site

observation is to get as close as possible to the real system being studied. During on-site

observation, office environment can be seen, work load, method of work and facilities provided

by the organization to the users can be studied.

Conducting interviews:

Interviews allows learning more about the nature of the project request and reasons for

submitting it. Interviews should provide details that further explain the project and show whether

assistance in merited economically, operationally and technically.

Existing System:

In the existing system, A Student (from some remote area where there are not so good

institutions for higher studies) who wishes to excel in his/her respective field may have to go to

some distant place in search for some good institute or he/she has to start studying through some

correspondence. The basic problem with the Correspondence courses is that despite of being

provided with good material student might not get their queries solved in time which may make

them lose interest in that particular query/subject. As has rightly been said that “A stitch in time

may saves nine”, so does this project is intended to do. It is not that no effort has been made

Page| 16

Page 17: Department of Computer Science & Applicationsckverma.com/Doc-Format/MCA M.Sc. Project.doc  · Web viewI, Shakti Singh, a student of Master of Computer Applications (MCA),VIth semester

towards this end. A lot of people tried their best in this field but either they were confined to only

one particular subject or the tutorials were just one sided, like the teacher just passed on the text

file to the server and student downloaded it to his system. This shortcoming is glaringly evident.

Proposed System:The proposed system handles all the faults of the existing system. In the proposed system

everything is done online. Students/Members can get the adequate knowledge and help without

visiting the institutions or colleges. Students can post their questions regarding any subjects on

the website. They can also check their proficiency and knowledge through online tests which are

posted in the website. Students can also view their test result after they have given the test.

In this system, there is a registration process for each of the user connected to this site anyhow.

The Administrator of the site verifies the User after his registration and if satisfied, assigns him

an ID and password.

Once the Users have registered themselves, they can post the Queries and problems they wish to

get solved. Different registered users can then view these problems and post their solutions in

response. The solution seeker may then choose among the number of solutions provided by the

other users of the site.

The concept of Master Pages and Content Pages is used.

Web User Controls are used to enhance Reusability.

Different People can post their Queries on different subjects and can view the Queries

posted by other users and the solutions to those queries..

The concept of Polling and Blogs is used to attract visitors and to make the site more fas-

cinating.

The following objectives have been set:

Smooth flow of data without any hurdles.

Adequate validation checks for data entry.

Adequate security of data.

Facility to update data from time to time.

Prompt and specific retrieval of data.

Flexibility in the system according to the changing environment.

Controlling redundancy in storing the same data multiple times.

Page| 17

Page 18: Department of Computer Science & Applicationsckverma.com/Doc-Format/MCA M.Sc. Project.doc  · Web viewI, Shakti Singh, a student of Master of Computer Applications (MCA),VIth semester

Accuracy, timeliness and comprehensiveness of the system output.

Stability and operability by people of average intelligence.

Enhancement in the completion of work within the constraints of time.

Proposed System Benefits:The benefits of the proposed system must also be evaluated. Benefits may be categorized as

tangible or intangible.

Tangible benefits which are measured in money terms consist of the saving of

Time.

Certain operating costs.

Intangible benefits are more difficult to estimate and justify. They are often impossible to give a

money value to.

These may include –

Satisfaction of the companies and students

Efficiency.

The scope of the system is quite wide. It can be implemented on a WAP-enabled mobile handset,

thus providing the Clients and the Providers, the ease of accessing the Solutions and their status

without any difficulty and within no time.

Methodology adopted for the proposed system:Because of object oriented support in .NET, various concepts (like reusability, polymorphism,

isolation etc.) are already there but for the efficient management of system components,

Component based Software Engineering will also be exercised which will help in a resultant

library of components, the benefit of which will be reusability and fast development.

Because of lack of hierarchical structure in object oriented approach, there is no meaning of

Bottom-up or Top-down testing. Testing will begin from the most rudimentary levels of the

system and will move towards higher level components which will be based on design phase

rather than coding phase. In little words, it can be said that ‘CLUSTER Testing’ will be

exercised to scrutinize all the parts and their associative functionality.

Page| 18

Page 19: Department of Computer Science & Applicationsckverma.com/Doc-Format/MCA M.Sc. Project.doc  · Web viewI, Shakti Singh, a student of Master of Computer Applications (MCA),VIth semester

Conclusion:

From the initial study we concluded that the companies and the students were facing various

kinds of problems and the proposed system was helpful in solving them.

FEASIBILITY STUDY

What Is A Feasibility Study?

Prior to stating whether the system we have to develop is feasible or not we believe that we

should emphasize on what is implied by the word “Feasibility”. Feasibility is the measure of how

beneficial or practical the development of the system will be to the organization. It is a

preliminary survey for the systems investigation. It aims to provide information to facilitate a

later in-depth investigation.

The report produced at the end of the feasibility study contains suggestions and reasoned argu-

ments to help management decide whether to commit further resources to the proposed project.

Page| 19

Page 20: Department of Computer Science & Applicationsckverma.com/Doc-Format/MCA M.Sc. Project.doc  · Web viewI, Shakti Singh, a student of Master of Computer Applications (MCA),VIth semester

Within the scheduled duration we were assigned to study both the positive and negative aspects

of the current manual system, in which we have come up with a number of drawbacks that pre-

vent the progress of the clinic if it is continued to function manually.

Having gone through all measures of feasibility we report to the management to figure out if the

objectives of the new system are met.

For e.g. - Is the system within the budget allowed for it?

Will the organizations needs, be met by the new proposed system as originally envisaged?

If and when the objectives of the system are met and the new system is approved, then the more

specific details in the proposal should be considered and approved.

Types of Feasibility:There are various measures of feasibility that helps to decide whether a particular project is

feasible or not. These measures include-

Operational Feasibility

Technical Feasibility

Economical and Financial Feasibility

Each of these types will be explained in detail throughout the project report.

Page| 20

Page 21: Department of Computer Science & Applicationsckverma.com/Doc-Format/MCA M.Sc. Project.doc  · Web viewI, Shakti Singh, a student of Master of Computer Applications (MCA),VIth semester

Operational Feasibility:

A proposed system is beneficial only if it can be turned into an information system that will meet

the operational requirements of an organization. A system often fails if it does not fit within

existing operations and if users resist the change.

Important issues a systems developer must look into are:

Will the new system be used if implemented in an organization?

Are there major barriers to implementation or is proposed system accepted without de-

structive resistance?

The whole purpose of computerizing the Placement System is to handle the work much more

accurately and efficiently with less time consumption. There will be additional work to be

completed, because now the students and the companies can update their resumes and profiles

online. Their database is maintained separately.

Compared to the semi-computerized system the chances of avoiding errors in a computerized

system is much higher because the user need not stress himself unnecessarily resulting in

recklessness. Unlike the semi-computerized system there would be backup data for all the

information concerning the daily transactions occurred within the organization.

If we are considering the performance and response time for each task, it is very much faster

since there is less paper work to be completed. When entering data into the system to relieve the

user from additional work and typing incorrect data, the system provides options such as combo

boxes, check boxes, option buttons and etc. if the users type in incorrect data they would be

informed immediately about the error by the error detection control.

Another important fact to be regarded is the security control, which is handled by the system.

Since data regarding each student and the company is confidential, security is a key issue.

Information falling into the wrong hands could jeopardize the entire organization. Unlike in

semi-computerized systems the proposed system offers adequate control to protect the

organization against fraud and embezzlement and guarantees the accuracy and security of data

and information. This is handled by the system providing each department and individuals with

separate login names and passwords.

Page| 21

Page 22: Department of Computer Science & Applicationsckverma.com/Doc-Format/MCA M.Sc. Project.doc  · Web viewI, Shakti Singh, a student of Master of Computer Applications (MCA),VIth semester

The new system is more user-friendly, which enables the end-user to complete his/her work

efficiently and accurately with interest. After taking the above fact into consideration we can

state the operating of the proposed system within the organization is feasible.

In this phase of the feasibility study the following two main topics

Technical Performance Aspect

Acceptance within the organization

Technical performance aspect is explained in the technical feasibility report and there is no new

information is needed in this to explain it again, but as for the acceptance within the organization

the following points are important and those are explained according to the topics

1. Whether the system provides right information to the right place.

In the current system which is the semi computerized system the information may be lost in the

process of sending from one place to another. This is mainly due to human interaction in the

process of the transferring information from one place to another.

2. Whether the new system affect the current users in the system. The new proposed system

will affect the users in the following areas

Accuracy

Efficiency

Productivity

Robustness

Lesser time consuming

3. Skill and attitude

This system is developed according to the experience of the current employees and the

management structure, so for this system to function within the current employee community.

Page| 22

Page 23: Department of Computer Science & Applicationsckverma.com/Doc-Format/MCA M.Sc. Project.doc  · Web viewI, Shakti Singh, a student of Master of Computer Applications (MCA),VIth semester

The employees do not need to have new skills other than the skills which are gained in the

current system.

4. Job restructuring and training

For the new system to have an effect in the organization the employees should be give a proper

training in operating the software and computer systems. If the employee does not have the

minimal experience should be given the proper training

If the organization is reluctant to give a full training to the employees who require the full

knowledge organization can restructure the structure of the departments.

Technical Feasibility:

Based on the outline design of system requirements in terms of inputs, outputs, files, procedures

and staff, the technical issues raised during technical feasibility include:

Does the necessary technology exist to do what is proposed?

Does the proposed equipment have the technical capacity to hold the data required to

use in the new system?

Adequate responses provided by the proposed system?

Is the system flexible enough to facilitate expansion?

Is there any technical guarantee of accuracy, reliability, ease of access and data secu-

rity?

The system developer’s task is to view needed capabilities in light of currently available

technology. Since the existing system is semi-computerized it is clear to us that there is no

efficiency in the use of technology within the organization. The solution is the implementing the

new computerized system, which works hand in hand with high technology.

A database has to be maintained in order to update and backup data whenever a transaction

occurs. To create databases we use SQL server.

After taking the above facts into consideration we can state that the new proposed system is

technically feasible.

Page| 23

Page 24: Department of Computer Science & Applicationsckverma.com/Doc-Format/MCA M.Sc. Project.doc  · Web viewI, Shakti Singh, a student of Master of Computer Applications (MCA),VIth semester

System Security:System security is a vital aspect when it comes to developing a system. The system should

ensure the facility of preventing unauthorized personnel from accessing the information and the

data within the system. The system should provide total protection for each user’s information so

that the integrity of data is sustained and also prevent hackers from hacking the system.

The proposed system ensures the security and the integrity of data. This is done by providing a

password login system for each authorized users. And for example the System Administrator has

access to all kinds of information.

By providing this facility information is properly managed and information is protected. For

example the system administrator’s day to day tasks are lessened and easier because he doesn’t

have to have a constant eye on the system and worry about hackers hacking the system.

Economical and Financial Feasibility:In making recommendations a study of the economics of the proposed system should be made.

The proposed system must be justifiable in terms of cost and benefit, to ensure that the

investment in a new/changed system provide a reasonable return.

Cost-benefit analysis of information is complicated by the fact that many of the systems cost

elements are poorly defined and that benefit can often be highly qualitative and subjective in

nature.

In our proposed system various costs are evaluated. Even though finding out the costs of the

proposed project is difficult we and assume and estimate the costs and benefits as follows.

According to the computerized system we propose, the costs can be broken down to two

categories.

1. Costs associated with the development of the system.

2. Costs associated with operating the system.

Page| 24

Page 25: Department of Computer Science & Applicationsckverma.com/Doc-Format/MCA M.Sc. Project.doc  · Web viewI, Shakti Singh, a student of Master of Computer Applications (MCA),VIth semester

Software Requirement Specification

The software requirement specification is produced at the culmination of the analysis task. The

function and performance allocated to software as part of system engineering are refined by

establishing a complete information description, a detailed functional description, a

representation of system behavior, an indication of performance requirement and design

constraints appropriate validation criteria, and other information pertinent to requirement.

The introduction to software requirements specification states the goals and objectives of the

software, describing it in the context of the computer based system.

Page| 25

Page 26: Department of Computer Science & Applicationsckverma.com/Doc-Format/MCA M.Sc. Project.doc  · Web viewI, Shakti Singh, a student of Master of Computer Applications (MCA),VIth semester

The Information Description provides a detailed description of the problem that the software

must solve. Information content, flow and structure are documented.

A description of each function required to solve the problem is presented in the Functional

Description.

Validation Criteria is probably the most important and ironically the most often neglected section

of the software requirement specification.

Software requirement specification can be used for different purpose. Here are the major uses.

Statement of user needs:

A main purpose of the product specification is to define the need of the product’s user.

Sometimes, the specification may be a part of a contract sign between the producer and the user.

It could also form part of the user manuals. A user‘s needs are sometimes not clearly

understood by the developer. If this is the case, a careful analysis – involving much interaction

with the user should be devoted to reaching a clear statement of requirements, in order to avoid

possible misunderstandings.

Sometimes, at the beginning of a project, even the user has no clear idea of what exactly the

desired product is. Think for instance of user interface , a user with no previous experience with

computer products may not appreciate the difference between , say menu driven interaction and

a command line interface. Even an exact formation of system functions and performance may be

missing an initial description produced by an inexperienced user.

Need for statement of the requirements:

Specifications are also used as a reference point during product implementation. In fact, the

ultimate goal of the implementation is to build a product that needs specification. Thus the

implementers use specifications during design to make design decisions and during the

verification activity to check that the implementation compiles with specifications.

Page| 26

Page 27: Department of Computer Science & Applicationsckverma.com/Doc-Format/MCA M.Sc. Project.doc  · Web viewI, Shakti Singh, a student of Master of Computer Applications (MCA),VIth semester

SYSTEM DESIGN

System design is the process of developing specifications for a candidate system that meet the

criteria established in the system analysis. Major step in system design is the preparation of the

input for ms and the output reports in a form applicable to the user. The main objective of the

system design is to make the system user friendly. System design involves various stages as:

Page| 27

Page 28: Department of Computer Science & Applicationsckverma.com/Doc-Format/MCA M.Sc. Project.doc  · Web viewI, Shakti Singh, a student of Master of Computer Applications (MCA),VIth semester

Data Entry

Data Correction

Data Deletion

Processing

Sorting and Indexing

Report Generation

System design is the creative act of invention, developing new inputs, a database, offline files,

procedures and output for processing business to meet an organization objective. System design

builds information gathered during the system analysis.

Characteristics of a Well Defined System:

In design an efficient and effective system is of great importance to consider the human factor

and equipment that these will require to use. System analyst must evaluate the capabilities and

limitations of the personal and corresponding factors of the equipment itself.

The characteristics associated with effective system operations are:

Accessibility

Decision Making Ability

Economy

Flexibility

Reliability

Simplicity

Success is a new system pivots on its acceptance or non-acceptance by the organization.

Personnel:

If the operating system is convinced that the new system will not benefit them, it appears one,

and the system is in serious trouble. To overcome this resistance participation by operating

personal during all phases of the changeover is necessary because they constitute the

organization, which must use alive in with newly design system. An effective system produces

not only information at the lowest cost pertinent and timely for making decision.

Page| 28

Page 29: Department of Computer Science & Applicationsckverma.com/Doc-Format/MCA M.Sc. Project.doc  · Web viewI, Shakti Singh, a student of Master of Computer Applications (MCA),VIth semester

Database Design:

The overall objective in the development of the database technology has been to treat data as an

organizational resource and as an integrated whole. Database management system allows data to

be protected and organize separately from other resources. Database is an integrated collection of

data. The most significant of data as seen by the programs and data as stored on the direct

storage access storage devices. This is the difference between logical and physical data. The

organization of data in the database aims to achieve free major objectives:

Data Integration

Data Integrity

Data Independence

The databases are implemented using a DBMS package. Each particular DBMS has unique char-

acteristics and general techniques for Database Design.

The proposed Management Information System stores the information relevant for processing in

the Microsoft SQL Server Database. This MS SQL Server contains tables, where each table is

called a field or column. A table also contains records which is a set of fields. All records, in a

table the same set of fields with different information. Each table contains key fields that

establish relationships in a MS SQL server database and how the records are stored. There are

primary key fields that uniquely identify a record in a table. There are also fields that contain the

primary key from another table called foreign keys.

It is a known fact that the program cannot be written until the data are defined, so the database

must be defined. The starting point for this process is data dictionary. The records data structures

and elements to be stored in each database are identified and extracted. Next the analyst codes

the source statements library. Eventually, the programmer will incorporate the source code into

the various programs, thus assuring consistency and simplifying the coding process. The

databases have been designed in such a way that there is no duplication of information and loss

of information.

Schema Design:

Page| 29

Page 30: Department of Computer Science & Applicationsckverma.com/Doc-Format/MCA M.Sc. Project.doc  · Web viewI, Shakti Singh, a student of Master of Computer Applications (MCA),VIth semester

In database design, several views of data must be considered along with the persons who use

them. In addition to data structuring, where relationships are reflected between and within enti-

ties, we need to identify the application program’s logical views of data within an overall logical

data structure. The logical view is what the data look like, regardless of how they are stored. The

physical view is the way data exist in physical storage. It deals with hoe data are stored, ac-

cessed, or related to other data in storage.

The schema is the view that helps the DBMS decide in storage act upon as requested by the ap-

plication program.

Relational Model:

Certain rules followed in creating and relating databases in the relational databases. This governs

how to relate data and prevent redundancy of the data in the databases. The first set of rules

called relational rules ensures that the database is a relational database. The second set called the

normalization rules simplifies the database and reduce the redundancy of the data.

Proposed system this relational database rules are applied to reduce the redundancy make future

changes to the table structure easier to and minimize the impact of these changes on users inter-

face to the database. This is done first determining what information is needed, how items are re-

lated, what constraints are established. Tables are created and linked by appropriate key fields.

The constraints on the data are used to guide the building of tables. The tables are created by

making use of the normalization principles. The proposed system has its own tables in the third

normal form.

Code Design:

When large volumes of data are being handled, it is important that the item be identified, stored

or selected easily and quickly. To accomplish this, each data item must have unique

identification and must be related to other items of the same type. Codes can provide brief

identification of each item, which replace longer description that would be more awkward to

store and manipulate.

Page| 30

Page 31: Department of Computer Science & Applicationsckverma.com/Doc-Format/MCA M.Sc. Project.doc  · Web viewI, Shakti Singh, a student of Master of Computer Applications (MCA),VIth semester

The ability to interrupt codes, evaluate coding schemes and devices new or improved codes are

important skills for a system analyst. Common types of codes are:

Sequence Codes:

A sequence code has no relation to the characteristics of an item. Here a dictionary is required.

The data is arranged alphabetically and numbered sequentially. When a new data item is added it

is given the next sequence number. The advantage of this code is that it has the ability touched

with an unlimited number of digits.

Significant Digit Code:

It is a code in which the number describes measurable physical characteristics of the item.

Alphabetic Code:

Here, the item are specified by the user of letter and number combinations,

Self Checking Code:

It uses a check digit to check the validity of codes. These types of codes are an important means

of controlling the validity of data that are being processed.

Validation Checks:

A common problem with computer system is that it is very easy to put incorrect data into them.

So the input data is validated to minimize errors and data entry. For certain data specific code has

been given and validations are done which enable the user to enter the required data and correct

them if they have entered wrong codes, e.g. you could mistype a link name or a URL in a

database resulting in reports being occurred in the wrong link name. if you put incorrect data into

Page| 31

Page 32: Department of Computer Science & Applicationsckverma.com/Doc-Format/MCA M.Sc. Project.doc  · Web viewI, Shakti Singh, a student of Master of Computer Applications (MCA),VIth semester

the computer system then you will get incorrect results out of it. Processing incorrect inputs will

produce incorrect outputs. This lead to the acronym: GIGO (Garbage In Garbage Out).

Sometimes incorrect data can actually cause a computer system to stop work temporarily. This is

a particular problem in batch processing systems when data may be processed overnights. If in-

correct data stops a batch processing systems for working then a whole night processing time

may be lost.

People who develop computer systems go to a lot of trouble to make it difficult for incorrect data

to be entered. The two main techniques used for this purpose are:

VERIFICATION

VALIDATION

Verification:

A verification check ensures that data i9s correctly transferred into a computer from the medium

that it was originally stored on. Verification checks are usually used to check that a data entry

worker has correctly typed information written on a data collection form into a computer.

Methods of Verification:

The two most common methods of verification are:

On-Screen prompts: After a user has entered some data it is redisplayed on the screen.

The user is prompted to read the data and confirm that it has been entered correctly. If the user

has entered any data incorrectly he should response that the data is inaccurate and retypes the in-

correct parts.

Dual Inputs: This method is used when data is entered through the keyboard. The

data to be entered is typed in twice by two different operations. The two copies of data are been

compared, any difference are detected, the operators will be prompted to retype the sections that

differ until both copies agree/. When the two copies agree the computer assumes that the data has

been entered correctly.

Validation:

Page| 32

Page 33: Department of Computer Science & Applicationsckverma.com/Doc-Format/MCA M.Sc. Project.doc  · Web viewI, Shakti Singh, a student of Master of Computer Applications (MCA),VIth semester

A validation check is an automatic check made by computer to ensure that any data entered into

the computer is sensible. A validation check does not make sure that data has been entered cor-

rectly. It only ensures that data is sensible. For this reason validation checks are not usually as ef-

fective as verification checks. They can however be carried out automatically by the computer

and therefore require less work by the computer operators making them cheaper to use.

Methods of validation:

There are many different methods of validations. The most appropriate method to use will

depend upon what data is being entered. The most common methods are listed here.

Presence Checks: checks that data has been entered into the field and that it has not been

left blank, e.g. checks that Project ID is always entered into each record in a database of

project details.

Type Checks: checks that an entered value is of particular type. E.g. checks that a field is

varchar , a number, etc.

Length Checks: checks that an entered value, e.g. Project ID is no longer than a particu-

lar number of characters.

Format Checks: Checks that an entered value has a particular format. E.g. a date must be

consist of “mm-dd-yy” format.

Validation checks can be performed by any piece of software. If the user tries to do unauthorized

operations the appropriate error messages are produced by the systems.

DATA DICTIONARY:

In our DFD, we give names to data flows, processes, and data stores. Although the names are

descriptive of the data, they do not give details. So the following the DFD, our interest is to build

some structured place to keep details of the contents of data flow, processes, and data store. A

data dictionary is a structured repository of data about data. It is a set of rigorous definition of all

DFD data element and data structure.

Page| 33

Page 34: Department of Computer Science & Applicationsckverma.com/Doc-Format/MCA M.Sc. Project.doc  · Web viewI, Shakti Singh, a student of Master of Computer Applications (MCA),VIth semester

A data dictionary has many advantages. The most obvious is documentation; it is valuable refer-

ence in any organization. Another advantage is improving analyst/user communication by estab-

lishing consistent definition of various elements, terms and procedures. During implementation,

it serves as a common base against which programmers who are working on the system compare

data description. Also control information maintained for each data element is cross referenced

in the data dictionary. E.g. program that use a given data element are cross referenced in a data

dictionary, which makes it easy to identify them and make any necessary changes. Finally, a data

dictionary is an important step in building a database. Most database management system has a

data dictionary as a standard feature.

INPUT DESIGN:

The input design is the link between the information system and the user. It comprises develop-

ing specification and procedure for data preparation and those steps that are necessary to put

transaction data into a usable form for processing data entry. The activity of putting data into the

computer for processing can be achieved by instructing the computer to read data from a written

or printed document or it can occur by having people key data directly into the system. The de-

sign of inputs focuses on controlling the amount of inputs required, controlling errors, avoiding

delay, avoiding extra steps and keeping the process simple.

The system needs the following information for processing:

Information regarding Project Details

Information regarding Project Design Details

Information regarding Category, Location Details

Information Employees Detail

OUTPUT DESIGN:

In output design, emphasis is given on producing a hard copy of the information required as the

output on the CRT screen in some predefined manner. Computer output is the most important

and direct source of information to the use. Output design is a process that involves designing

Page| 34

Page 35: Department of Computer Science & Applicationsckverma.com/Doc-Format/MCA M.Sc. Project.doc  · Web viewI, Shakti Singh, a student of Master of Computer Applications (MCA),VIth semester

necessary outputs that should be given to various users according to their requirements. Efficient,

intelligible output design should improve the system’s relationship with the user and help in

decision making. Since the reports are directly referred by the management for taking the

decisions and to draw conclusions, they must be designed with utmost care and the details in the

reports must be simple, descriptive and clear to the user. The options for the outputs and reports

are given the system menu.

DATA FLOW DIAGRAMS

DATA FLOW DIAGRAM

Page| 35

Page 36: Department of Computer Science & Applicationsckverma.com/Doc-Format/MCA M.Sc. Project.doc  · Web viewI, Shakti Singh, a student of Master of Computer Applications (MCA),VIth semester

In our DFD, we give names to data flows, processes, and data stores. Although the names are descriptive of the data, they do not give details. So the following the DFD, our interest is to build some structured place to keep details of the contents of data flow, processes, and data store. A data dictionary is a structured repository of data about data. It is a set of rigorous definition of all DFD data element and data structure

DFD Symbols

In the DFD, there are four symbols,1) A Square defines a source (originator) or destination of system data.2) An Arrow identifies data flow- data in motion .It is pipeline through which information

flows.3) A circle or a bubble (or a oval bubble) represents a process that transforms incoming

data flow(s) into outgoing data flow(s)4) An open rectangle is a data store-data at rest , or temporary repository of data.

Data Flow Diagram:

Level 0

Page| 36

Members

Users

WebsiteRegister & Add Knowledge Base

Acquire Data from Knowledge

Base

Page 37: Department of Computer Science & Applicationsckverma.com/Doc-Format/MCA M.Sc. Project.doc  · Web viewI, Shakti Singh, a student of Master of Computer Applications (MCA),VIth semester

Data Flow Diagram: Level 1

Page| 37

Admin Member

Website

Users

Verify article

s

Add Question

Bank

Verify Member

Add basic info

Post Articl

es

View Forums

Rate Articl

es

Post Questio

nsLogi

n

Register

View Articles

View Articl

esTest Skill

s

Emails username

& password

Reply to Questions

Page 38: Department of Computer Science & Applicationsckverma.com/Doc-Format/MCA M.Sc. Project.doc  · Web viewI, Shakti Singh, a student of Master of Computer Applications (MCA),VIth semester

Diagram which shows the working of the Online Education System

Page| 38

Un-Registered USER

Registration with the site

Administrator

Verifies and Assigns ID and Password

SITE

Post Query

View Contents of site, post

blogs and send E-mails

Registered Users

Read Contents

Post Solutions

Reply by E-mail

Page 39: Department of Computer Science & Applicationsckverma.com/Doc-Format/MCA M.Sc. Project.doc  · Web viewI, Shakti Singh, a student of Master of Computer Applications (MCA),VIth semester

Languages Used

Why .NET?

1. Interoperability between languages and execution environments

2. Uniformity in schema or formats for Data Exchange using XML, XSL

3. Extend or use existing code that is valid

4. Programming complexity of environment is reduced

The .NET Framework is…

1. A component model for the internet

2. The new approach to building large scale distributed systems for the Internet

3. Provides the capability to integrate multiple devices

4. Built around the tools and protocols (XML, WSDL, SOAP, HTTP) that are becoming

standard on the Internet

The .NET in ASP.NET stands for the .NET Framework, a set of objects and blueprints from

Microsoft for building applications. All applications developed under the .NET Framework;

including ASP.NET applications, have certain key features that ensure compatibility, security,

and stability.

Common Language Runtime (CLR) is an environment that manages the execution of code. With

the .NET Framework and CLR, we write code and compile it. However, instead of compiling it

into the computer understands, we compile it into a language called Microsoft Intermediate

Language (MSIL). When we compile to MSIL, your application produce something called

metadata. This is descriptive information about your application. It tells what the application can

do, where it belongs, and so on. When you want to run your program, the CLR takes over and

compile the code once more into the computer’s native language. This way MSIL can go on any

type of computer. The CLR can speak many different computer languages and does all the

Page| 39

Page 40: Department of Computer Science & Applicationsckverma.com/Doc-Format/MCA M.Sc. Project.doc  · Web viewI, Shakti Singh, a student of Master of Computer Applications (MCA),VIth semester

compiling for you. Once you compile your application, you can bring it to any other computer.

CLR also provides services such as error handling, security features, versioning and deployment

support, as well as cross-language integration. That means we can choose any language we want

to write our .NET applications, including ASP.NET applications.

Fig:- .NET Framework Architecture

Page| 40

Page 41: Department of Computer Science & Applicationsckverma.com/Doc-Format/MCA M.Sc. Project.doc  · Web viewI, Shakti Singh, a student of Master of Computer Applications (MCA),VIth semester

The .NET Framework Design Goals

1. Component Development for the Internet

2. "Cross-Language Development”

3. Inheritance, Debugging, Exception handling

4. Reliability and Security

5. Simple Development and Deployment

6. Device-agnostic

ASP.NET:

ASP.NET is a technology that allows us to build and control dynamic Web pages easily. It also

provides many enhancements to take advantage of new technology as we can interact with

databases, personalize Web pages for visitors, display page on mobile devices (such as cell

phones), and even build an entire e-commerce site from scratch.

Previously internet works on request/response model that is an integral part of client/server

model. Although this is a marvelous way of communicate and distribute information, it's rather

simple and static. When the process is over, once client receives the requesting page from the

server the server has no idea what the client is doing unless it makes another request.

There is another model for communicating between server and clients, known as event-driven

model.ASP.NET work on this model, it detects action and responds to them i.e. the server waits

around for something to happen on the client. Once it does, the server takes action and performs

some piece of functionality. Of course, a Web, server cannot know what you are thinking, but it

can respond to your actions. If you type some text on Web page, the server responds to it. If you

click an image, the server responds.

Page| 41

Page 42: Department of Computer Science & Applicationsckverma.com/Doc-Format/MCA M.Sc. Project.doc  · Web viewI, Shakti Singh, a student of Master of Computer Applications (MCA),VIth semester

COMPARISON OF ASP AND ASP.NET:

Classic ASP was built on the top of the Windows operating system and IIS (Internet In-

formation Server). It was always a separate entity, and therefore its functionality was limited.

ASP.NET, on the other hand, is an integral part of the system under the .NET Framework. It

shares many 9f the same objects that traditional applications would use and all .NET objects

available for ASP. NET’s consumption.

Instead of being limited to six inherent objects in ASP, ASP.NET has a plethora

of useful components it can build form.

ASP also made it abundantly clear that client and server were two separate enti-

ties, Whereas ASP. NET ties together the client and the server through clever use of server-side

and client-side code, all invisible to the developer.

ASP.NET code is compiled, whereas classic ASP used interpreted scripting lan-

guages. Using compiled code means an automatic boost in performance over ASP applications.

In classic ASP, nearly all of the code was executed in code render blocks (that is,

inside <%...%> tags). In ASP.NET, this type of code isn’t compiled and isn’t recommended for

frequent use. Instead, you use the code declaration blocks, which are compiled and provide better

performance.

Following are some of the significant new features of ASP.NET:

ASP.NET uses compiled code written in Common Language Runtime languages such as

Visual Basic and C#. Unlike previous versions of Active Server Pages, this version does

not use interpreted scripting languages such as VBScript.

ASP.NET pages are built out of server-side controls. Web server controls enable you to

represent and program against Hypertext Markup Language (HTML) elements using an

intuitive object model.

ASP.NET includes a new technology called Web Services. You can use Web Services to

access methods and properties and transfer database data across the Internet.

Page| 42

Page 43: Department of Computer Science & Applicationsckverma.com/Doc-Format/MCA M.Sc. Project.doc  · Web viewI, Shakti Singh, a student of Master of Computer Applications (MCA),VIth semester

ASP.NET is part of Microsoft's .NET Framework. You can access thousands of .NET

classes in your code that enable you to perform such wondrously diverse tasks as generat-

ing images on-the-fly and saving an array to a file.

ASP.NET includes page and data caching mechanisms that enable you to easily and dra-

matically improve the performance of your Web site.

Advantages of VB.NET and C#

VB.NET C#

Support for optional parameters - very handy for

some COM interoperability.

Support for late binding with Option Strict off - type

safety at compile time goes out of the window, but

legacy libraries which don't have strongly typed in-

terfaces become easier to use.

Support for named indexers.

Various legacy VB functions

(provided in the Microsoft Visual Basic namespace,

and can be used by other languages with a reference to

the Microsoft.Visual Basic.dll).Many of these can be

harmful to performance if used unwisely, however, and

many people believe they should be avoided for the

most part.

The with construct: it's a matter of debate as to

whether this is an advantage or not, but it's certainly

a difference.

XML documentation generated from source code

comments. (This is coming in VB.NET with

Whidbey (the code name for the next version of

Visual Studio and .NET), and there are tools

which will do it with existing VB.NET code al-

ready.)

Operator overloading -again, coming to VB.NET

in Whidbey.

Language support for unsigned types (you can

use them from VB.NET, but they aren't in the

language itself). Again, support for these is com-

ing to VB.NET in Whidbey.

Explicit interface implement where an interface

which is already implemented in a base class can

be re-implemented separately in a derived class.

Arguably this makes the class harder to under-

stand, in the same way that member hiding nor-

Page| 43

Page 44: Department of Computer Science & Applicationsckverma.com/Doc-Format/MCA M.Sc. Project.doc  · Web viewI, Shakti Singh, a student of Master of Computer Applications (MCA),VIth semester

Simpler (in expression - perhaps more complicated

in understanding) event handling, where a method

can declare that it handles an event, rather than the

handler having to be set up in code.

The VB.NET parts of Visual Studio .NET compiles

your code in the background. While this is consid-

ered as an advantage for small projects, people cre-

ating very large projects have found that the IDE

slows down considerably as the project gets larger.

mally does.

Unsafe code. This allows pointer arithmetic etc,

and can improve performance in some situations.

However, it is not to be used lightly, as a lot of

the normal safety of C# is lost (as the name im-

plies). Note that unsafe code is still managed

code, i.e., it is compiled to IL, JITted, and run

within the CLR.

Page| 44

Page 45: Department of Computer Science & Applicationsckverma.com/Doc-Format/MCA M.Sc. Project.doc  · Web viewI, Shakti Singh, a student of Master of Computer Applications (MCA),VIth semester

SQL SERVER:

SQL Server is an SQL-compliant RDBMS. SQL-compliant means it use the ANSI (American

National Standard Institute) version of Structured Query Language or ‘SQL’. Structured Query

Language is a command that allow us to modify or retrieve information from the database.

Client server means that SQL Server is designed to store data in the central location (the server)

and deliver it on demand to numerous other locations (the client). SQL Server is also a Rela-

tional Database Management System (RDBMS).

FEATURES OF SQL SERVER 2000:

Information representation

Unique definition of rows

Systematic treatment of Null values

Guaranteed access

High level Update, Insert, and Delete

Retrieving information from the database.

Accepting query language statements.

Enforcing security specifications.

Enforcing data integrity specifications

Enforcing transaction consistency

Managing data sharing

Optimizing queries

Managing System catalogs

Page| 45

Page 46: Department of Computer Science & Applicationsckverma.com/Doc-Format/MCA M.Sc. Project.doc  · Web viewI, Shakti Singh, a student of Master of Computer Applications (MCA),VIth semester

Enterprise Manager:

SQL Server Enterprise Manager is a graphical tool that allows easy configuration and

management of Microsoft SQL Server and SQL 2000 program group.

SQL Server Enterprise Manager can also be used to:

Manage logins, permission and users.

Create a database

Take back-up of database and transaction logs.

Manage tables

Query Analyzer:

The SQL Server Query Analyzer allows us to create adhoc queries and run them interactively.

We may also execute Transact-SQL statements stored in text file and view the result in result

plane or result grid. The Query Analyzer also has a color-coded editor to assist the user with

checking of syntax. It also has context sensitive help.

Queries are processed in two steps:

Interpret- First the Queries are checked for syntax.

Execute- Then the processing take place.

Page| 46

Page 47: Department of Computer Science & Applicationsckverma.com/Doc-Format/MCA M.Sc. Project.doc  · Web viewI, Shakti Singh, a student of Master of Computer Applications (MCA),VIth semester

System Requirements

The system must have the following Minimum Hardware Requirements:

Pentium IV Processors

256 MB of RAM

5GB of Hard Disk

One SQL based server

Client Machine

One domain name space to implement Web based services

The system must have the following Software Requirements:

Visual C# .Net (2.0)

Visual Studio .Net Framework (version 2.0)

SQL Server 2005

Page| 47

Page 48: Department of Computer Science & Applicationsckverma.com/Doc-Format/MCA M.Sc. Project.doc  · Web viewI, Shakti Singh, a student of Master of Computer Applications (MCA),VIth semester

DATABASE TABLES FOR THE PROJECT

TbCat (Category Table)

Field Name Data Type Size Key DescriptionCatCod Int 4 Primary Key Category CodeCatNam VarChar 45 Name of the Category

TbSubCat (Sub-Category Table)

Field Name Data Type Size Key DescriptionSubcatCod Int 4 Primary

KeySubcategory Code

SubcatNam VarChar 45 Name of the SubcategorySubcatCatCod Int 4 Category Code of the

Subcategory

TbCnt (Country Table)

Field Name Data Type Size Key DescriptionCntCod Int 4 Primary Key Country CodeCntNam VarChar 45 Name of the Country

TbSta (State Table)

Field Name Data Type Size Key DescriptionStaCod Int 4 Primary Key State CodeStaNam VarChar 45 Name of the State

Page| 48

Page 49: Department of Computer Science & Applicationsckverma.com/Doc-Format/MCA M.Sc. Project.doc  · Web viewI, Shakti Singh, a student of Master of Computer Applications (MCA),VIth semester

StaCntCod Int 4 Country Code of the State

TbCty (City Table)

Field Name Data Type Size Key DescriptionCtyCod Int 4 Primary Key City Code

CtyNam VarChar 45 Name of the City

CtyStaCod Int 4 State Code of the City

TbMem (Member Table)

Field Name Data Type Size Key DescriptionMemCod Int 4 Primary Key Member CodeMemNam VarChar 45 Name of the MemberMemDat DateTime 8 Registration DateMemadd VarChar 45 Member AddressMemCtyCod Int 4 Member CityMemphn VarChar 45 Member PhoneMememl VarChar 45 Member E-MailMempin VarChar 45 Member Pin CodeMempic VarChar 45 Member Picture PathMemprf VarChar 45 Member ProfileMemsts Char 1 Member StatusMemdsc VarChar 200 Member Description

TbUsr (User Table)

Field Name Data Type Size Key DescriptionUsrCod Int 4 Primary

KeyMember Code

UsrNam VarChar 45 Name of the Member

Page| 49

Page 50: Department of Computer Science & Applicationsckverma.com/Doc-Format/MCA M.Sc. Project.doc  · Web viewI, Shakti Singh, a student of Master of Computer Applications (MCA),VIth semester

UsrPwd DateTime 8 User PasswordUsrMemCod int 4 User Member Code

UsrRol VarChar 45 User Role

TbPosArt (Article Table)

Field Name Data Type Size Key DescriptionPosartCod Int 4 Primary

KeyPosted Article Code

PosArtMemCod Int 4 Member CodePosArtDat DateTime 8 Posted OnPosArtSubcatCod Int 4 Sub CategoryPosArtTit Int 4 Article TitlePosArtDsc VarChar 200 Article DescriptionPosArtCntfil VarChar 30 Content FilePosArtSrcFil VarChar 30 Source FilePosArtVew VarChar 45 Article ViewsPosArtsts Char 1 Article StatusPosArtRsn VarChar 200 In Case of Rejection,

Reason for Rejection

TbPosQst (Posting Questions)

Field Name Data Type Size Key DescriptionPosQstCod Int 4 Primary

KeyPosted Article Code

PosQstMemCod Int 4 Member CodePosQstDat DateTime 8 Posted OnPosQstSubcatCod int 4 SubcategoryPosQstDsc VarChar 200 Question Description

TbRep(Replies)

Page| 50

Page 51: Department of Computer Science & Applicationsckverma.com/Doc-Format/MCA M.Sc. Project.doc  · Web viewI, Shakti Singh, a student of Master of Computer Applications (MCA),VIth semester

Field Name Data Type Size Key DescriptionrepCod Int 4 Primary

KeyPosted Article Code

repDat DateTime 8 Replied OnrepMemCod int 4 Member ReplyingrepDsc int 4 DescriptionrepPosQstCod int 4 Related QuestionrepSrcFil VarChar 45 Source File

TbRat (Ratings!!!)

Field Name Data Type Size Key DescriptionRatPosArtCod Int 4 Posted Article CodeRatCod Int 4 Primary

KeyMember Code

RatVal VarChar RatingsRatCmt VarChar 200 Comments

TbQst (Question Table)

Field Name Data Type Size Key DescriptionQstCod Int 4 Primary

KeyQuestion Code

QstNam VarChar 45 Question NameQstDat DateTime 8 Date of the QuestionQstLev Char 1 Level of the questionQstSubcatCod SubcategoryQstPic VarChar 15 Path of the Question

Picture

TbAns (Answers Table)

Field Name Data Type Size Key DescriptionAnsCod Int 4 Primary Key Answer CodeAnsNam VarChar 45 Answer name

Page| 51

Page 52: Department of Computer Science & Applicationsckverma.com/Doc-Format/MCA M.Sc. Project.doc  · Web viewI, Shakti Singh, a student of Master of Computer Applications (MCA),VIth semester

AnsQstCod Int 4 Question codeAnsSts Char 1 Answer StatusAnsPic VarChar 15 Path of the Answer Picture

TbPol (Polling)

Field Name Data Type Size Key DescriptionPolCod Int 4 Primary Key Poll CodePolDat DateTime 8 Poll DatePolDsc Int 4 Poll DescriptionPolPrz Char 1 Poll PrizePolPrzPic VarChar 15 Prize Picture PathTbPolAns (Polling Answer)

Field Name Data Type Size Key DescriptionPolAnsCod Int 4 Primary

KeyPoll Answer Code

PolAnsDsc VarChar 45 Answer DescriptionPolAnsPolCod Int 4 Answer to PollPolAnsSts Char 1 Poll Answer Status

Tb.Res (Polling Result Table)

Field Name Data Type Size Key DescriptionResCod Int 4 Primary

KeyResult Code

ResPolCod Int 4ResPolAnsCod Int 4ResNam VarChar 45 Participant’s NameResMob VarChar 20 Participant’s Mobile NoResTim DateTime 8 Time

Page| 52

Page 53: Department of Computer Science & Applicationsckverma.com/Doc-Format/MCA M.Sc. Project.doc  · Web viewI, Shakti Singh, a student of Master of Computer Applications (MCA),VIth semester

Project Coding and Screenshots:In coding structured programming is a data flow based methodology. The approach begins with a

system specification that identifies inputs and outputs and describes the functional aspects of the

system. The system specifications then are used as a basis for the graphic representation data

flow diagram of the data flows and processes. The next step is the definition of modules and their

relationships to one another in a form called a structure chart, using a data dictionary and other

structured tools. Structured programming partitions a program into small, independent modules.

They are arranged in a hierarchy that approximates a model of the business area and is

organized in a top-down manner with the details in bottom-up manner. Thus structured

programming is an attempt to minimize complexities and make a problem manageable by

subdividing it into smaller segments, which is called modularization or decomposition. A design

is said to be top-down if it consists of a hierarchy of modules, with each module having a single

entry, and a single exit subroutine.

All designs, contents, hierarchies, as creating a hierarchy is a natural way to manage complexity.

Most design methodologies for software also produce hierarchies. In a top-down

implementation, the implementation starts from the top of the hierarchy and proceeds to the

lower level. First the main module is implemented, then its sub-ordinates are implemented, and

their sub-ordinates and so on. In a bottom-up implementation, the process is reversed. The

Page| 53

Page 54: Department of Computer Science & Applicationsckverma.com/Doc-Format/MCA M.Sc. Project.doc  · Web viewI, Shakti Singh, a student of Master of Computer Applications (MCA),VIth semester

development starts with implementing the modules at the bottom of the hierarchy and proceeds

through the higher levels until it reaches the top.

Here we require the three-tier architecture:

Three-Tier Architecture:

1. Data access layer

2. Business logic layer

3. Presentation layer

using System;

using System.Configuration;

using System.Collections.Generic;

using System.Text;

using System.Data ;

using System.Data.SqlClient;

using System.Data.SqlClient;

using System.Configuration;

namespace nstut

{

public interface intcat

{

Int32 catcod

{

get;

set;

}

Page| 54

Page 55: Department of Computer Science & Applicationsckverma.com/Doc-Format/MCA M.Sc. Project.doc  · Web viewI, Shakti Singh, a student of Master of Computer Applications (MCA),VIth semester

String catnam

{

get;

set;

}

}

Public interface intsubcat

{

Int32 subcatcod

{

get;

set;

}

String subcatnam

{

get;

set;

}

Int32 subcatcatcod

{

get;

set;

}

}

public interface intcnt

{

Int32 cntcod

{

get;

set;

}

Page| 55

Page 56: Department of Computer Science & Applicationsckverma.com/Doc-Format/MCA M.Sc. Project.doc  · Web viewI, Shakti Singh, a student of Master of Computer Applications (MCA),VIth semester

String cntnam

{

get;

set;

}

}

public class clsqstprp : intqst

{

private Int32 prvqstcod, prvqstsubcatcod;

private DateTime prvqstdat;

private String prvqstnam, prvqstlev, prvqstpic;

#region intqst Members

public int qstcod

{

get

{

return prvqstcod;

}

set

{

prvqstcod=value;

}

}

public DateTime qstdat

{

get

{

return prvqstdat;

Page| 56

Page 57: Department of Computer Science & Applicationsckverma.com/Doc-Format/MCA M.Sc. Project.doc  · Web viewI, Shakti Singh, a student of Master of Computer Applications (MCA),VIth semester

}

set

{

prvqstdat=value;

}

}

public string qstnam

{

get

{

return prvqstnam;

}

set

{

prvqstnam=value;

}

}

public string qstlev

{

get

{

return prvqstlev;

}

set

{

prvqstlev = value;

}

}

public int qstsubcatcod

Page| 57

Page 58: Department of Computer Science & Applicationsckverma.com/Doc-Format/MCA M.Sc. Project.doc  · Web viewI, Shakti Singh, a student of Master of Computer Applications (MCA),VIth semester

{

get

{

return prvqstsubcatcod;

}

set

{

prvqstsubcatcod = value;

}

}

public string qstpic

{

get

{

return prvqstpic;

}

set

{

prvqstpic = value;

}

}

#endregion

}

public class clsansprp : intans

{

private Int32 prvanscod, prvansqstcod;

private String prvansnam;

private Char prvanssts;

Page| 58

Page 59: Department of Computer Science & Applicationsckverma.com/Doc-Format/MCA M.Sc. Project.doc  · Web viewI, Shakti Singh, a student of Master of Computer Applications (MCA),VIth semester

#region intans Members

public int anscod

{

get

{

return prvanscod;

}

set

{

prvanscod = value;

}

}

public string ansnam

{

get

{

return prvansnam;

}

set

{

prvansnam = value;

}

}

public int ansqstcod

{

get

{

return prvansqstcod;

Page| 59

Page 60: Department of Computer Science & Applicationsckverma.com/Doc-Format/MCA M.Sc. Project.doc  · Web viewI, Shakti Singh, a student of Master of Computer Applications (MCA),VIth semester

}

set

{

prvansqstcod = value;

}

}

public char anssts

{

get

{

return prvanssts;

}

set

{

prvanssts = value;

}

}

#endregion

}

public class clspolprp : intpol

{

private Int32 prvpolcod;

private DateTime prvpoldat;

private String prvpoldsc, prvpolprz, prvpolprzpic, prvpolprzdsc;

#region intpol Members

public int polcod

{

Page| 60

Page 61: Department of Computer Science & Applicationsckverma.com/Doc-Format/MCA M.Sc. Project.doc  · Web viewI, Shakti Singh, a student of Master of Computer Applications (MCA),VIth semester

get

{

return prvpolcod;

}

set

{

prvpolcod = value;

}

}

public DateTime poldat

{

get

{

return prvpoldat;

}

set

{

prvpoldat = value;

}

}

public string poldsc

{

get

{

return prvpoldsc;

}

set

{

prvpoldsc = value;

Page| 61

Page 62: Department of Computer Science & Applicationsckverma.com/Doc-Format/MCA M.Sc. Project.doc  · Web viewI, Shakti Singh, a student of Master of Computer Applications (MCA),VIth semester

}

}

public string polprz

{

get

{

return prvpolprz;

}

set

{

prvpolprz = value;

}

}

public string polprzpic

{

get

{

return prvpolprzpic;

}

set

{

prvpolprzpic = value;

}

}

public string polprzdsc

{

get

{

Page| 62

Page 63: Department of Computer Science & Applicationsckverma.com/Doc-Format/MCA M.Sc. Project.doc  · Web viewI, Shakti Singh, a student of Master of Computer Applications (MCA),VIth semester

return prvpolprzdsc;

}

set

{

prvpolprzdsc = value;

}

}

#endregion

}

public class clspolansprp : intpolans

{

private Int32 prvpolanscod, prvpolanspolcod;

private String prvpolansdsc;

private Char prvpolanssts;

#region intpolans Members

public int polanscod

{

get

{

return prvpolanscod;

}

set

{

prvpolanscod = value;

}

}

public int polanspolcod

Page| 63

Page 64: Department of Computer Science & Applicationsckverma.com/Doc-Format/MCA M.Sc. Project.doc  · Web viewI, Shakti Singh, a student of Master of Computer Applications (MCA),VIth semester

{

get

{

return prvpolanspolcod;

}

set

{

prvpolanspolcod = value;

}

}

public string polansdsc

{

get

{

return prvpolansdsc;

}

set

{

prvpolansdsc = value;

}

}

public char polanssts

{

get

{

return prvpolanssts;

}

set

{

Page| 64

Page 65: Department of Computer Science & Applicationsckverma.com/Doc-Format/MCA M.Sc. Project.doc  · Web viewI, Shakti Singh, a student of Master of Computer Applications (MCA),VIth semester

prvpolanssts = value;

}

}

#endregion

}

public class clsresprp : intres

{

private Int32 prvrescod, prvrespolanscod;

private String prvresnam, prvresmob;

private DateTime prvrestim;

#region intres Members

public int rescod

{

get

{

return prvrescod;

}

set

{

prvrescod = value;

}

}

public int respolanscod

{

get

{

Page| 65

Page 66: Department of Computer Science & Applicationsckverma.com/Doc-Format/MCA M.Sc. Project.doc  · Web viewI, Shakti Singh, a student of Master of Computer Applications (MCA),VIth semester

return prvrespolanscod;

}

set

{

prvrespolanscod = value;

}

}

public string resnam

{

get

{

return prvresnam;

}

set

{

prvresnam = value;

}

}

public string resmob

{

get

{

return prvresmob;

}

set

{

prvresmob = value;

}

}

Page| 66

Page 67: Department of Computer Science & Applicationsckverma.com/Doc-Format/MCA M.Sc. Project.doc  · Web viewI, Shakti Singh, a student of Master of Computer Applications (MCA),VIth semester

public DateTime restim

{

get

{

return prvrestim;

}

set

{

prvrestim = value;

}

}

#endregion

}

public abstract class clscon

{

protected SqlConnection con = new SqlConnection();

public clscon()

{

con.ConnectionString=ConfigurationManager.ConnectionStrings["cn"].ConnectionString;

}

}

public class clscat : clscon

{

public void Save_Rec(clscatprp p)

{

if (con.State == ConnectionState.Closed)

{

Page| 67

Page 68: Department of Computer Science & Applicationsckverma.com/Doc-Format/MCA M.Sc. Project.doc  · Web viewI, Shakti Singh, a student of Master of Computer Applications (MCA),VIth semester

con.Open();

}

SqlCommand cmd = new SqlCommand("inscat", con);

cmd.CommandType = CommandType.StoredProcedure;

cmd.Parameters.Add("@catnam", SqlDbType.VarChar, 50).Value = p.catnam;

cmd.ExecuteNonQuery();

cmd.Dispose();

con.Close();

}

public void Update_Rec(clscatprp p)

{

if (con.State == ConnectionState.Closed)

{

con.Open();

}

SqlCommand cmd = new SqlCommand("updcat", con);

cmd.CommandType = CommandType.StoredProcedure;

cmd.Parameters.Add("@catcod", SqlDbType.Int).Value = p.catcod;

cmd.Parameters.Add("@catnam", SqlDbType.VarChar, 50).Value = p.catnam;

cmd.ExecuteNonQuery();

cmd.Dispose();

con.Close();

}

public void Delete_Rec(clscatprp p)

{

if (con.State == ConnectionState.Closed)

{

con.Open();

}

Page| 68

Page 69: Department of Computer Science & Applicationsckverma.com/Doc-Format/MCA M.Sc. Project.doc  · Web viewI, Shakti Singh, a student of Master of Computer Applications (MCA),VIth semester

SqlCommand cmd = new SqlCommand("delcat", con);

cmd.CommandType = CommandType.StoredProcedure;

cmd.Parameters.Add("@catcod", SqlDbType.Int).Value = p.catcod;

cmd.ExecuteNonQuery();

cmd.Dispose();

con.Close();

}

public List<clscatprp> Disp_Rec()

{

if (con.State == ConnectionState.Closed)

{

con.Open();

}

SqlCommand cmd = new SqlCommand("dspcat", con);

cmd.CommandType = CommandType.StoredProcedure;

SqlDataReader dr;

dr = cmd.ExecuteReader();

List<clscatprp> obj = new List<clscatprp>();

while (dr.Read())

{

clscatprp k = new clscatprp();

k.catcod = Convert.ToInt32(dr[0]);

k.catnam = dr[1].ToString();

obj.Add(k);

}

dr.Close();

cmd.Dispose();

con.Close();

return obj;

}

Page| 69

Page 70: Department of Computer Science & Applicationsckverma.com/Doc-Format/MCA M.Sc. Project.doc  · Web viewI, Shakti Singh, a student of Master of Computer Applications (MCA),VIth semester

public List<clscatprp> Find_Rec(Int32 catcod)

{

if (con.State == ConnectionState.Closed)

{

con.Open();

}

SqlCommand cmd = new SqlCommand("fndcat", con);

cmd.CommandType = CommandType.StoredProcedure;

cmd.Parameters.Add("@catcod", SqlDbType.Int).Value = catcod;

SqlDataReader dr;

dr = cmd.ExecuteReader();

List<clscatprp> obj = new List<clscatprp>();

if (dr.HasRows)

{

dr.Read();

clscatprp k = new clscatprp();

k.catcod = Convert.ToInt32(dr[0]);

k.catnam = dr[1].ToString();

obj.Add(k);

}

dr.Close();

cmd.Dispose();

con.Close();

return obj;

}

}

public class clssubcat : clscon

{

public void Save_Rec(clssubcatprp p)

Page| 70

Page 71: Department of Computer Science & Applicationsckverma.com/Doc-Format/MCA M.Sc. Project.doc  · Web viewI, Shakti Singh, a student of Master of Computer Applications (MCA),VIth semester

{

if (con.State == ConnectionState.Closed)

{

con.Open();

}

SqlCommand cmd = new SqlCommand("inssubcat", con);

cmd.CommandType = CommandType.StoredProcedure;

cmd.Parameters.Add("@subcatcatcod", SqlDbType.Int).Value = p.subcatcatcod;

cmd.Parameters.Add("@subcatnam", SqlDbType.VarChar, 50).Value =

p.subcatnam;

cmd.ExecuteNonQuery();

cmd.Dispose();

con.Close();

}

public void Update_Rec(clssubcatprp p)

{

if (con.State == ConnectionState.Closed)

{

con.Open();

}

SqlCommand cmd = new SqlCommand("updsubcat", con);

cmd.CommandType = CommandType.StoredProcedure;

cmd.Parameters.Add("@subcatcod", SqlDbType.Int).Value = p.subcatcod;

cmd.Parameters.Add("@subcatnam", SqlDbType.VarChar, 50).Value =

p.subcatnam;

cmd.Parameters.Add("@subcatcatcod", SqlDbType.Int).Value = p.subcatcatcod;

cmd.ExecuteNonQuery();

cmd.Dispose();

con.Close();

}

Page| 71

Page 72: Department of Computer Science & Applicationsckverma.com/Doc-Format/MCA M.Sc. Project.doc  · Web viewI, Shakti Singh, a student of Master of Computer Applications (MCA),VIth semester

public void Delete_Rec(clssubcatprp p)

{

if (con.State == ConnectionState.Closed)

{

con.Open();

}

SqlCommand cmd = new SqlCommand("delsubcat", con);

cmd.CommandType = CommandType.StoredProcedure;

cmd.Parameters.Add("@subcatcod", SqlDbType.Int).Value = p.subcatcod;

cmd.ExecuteNonQuery();

cmd.Dispose();

con.Close();

}

public List<clssubcatprp> Disp_Rec()

{

if (con.State == ConnectionState.Closed)

{

con.Open();

}

SqlCommand cmd = new SqlCommand("dspsubcat", con);

cmd.CommandType = CommandType.StoredProcedure;

SqlDataReader dr;

dr = cmd.ExecuteReader();

List<clssubcatprp> obj = new List<clssubcatprp>();

while (dr.Read())

{

clssubcatprp k = new clssubcatprp();

k.subcatcod = Convert.ToInt32(dr["subcatcod"]);

k.subcatnam = dr["subcatnam"].ToString();

k.subcatcatcod = Convert.ToInt32(dr["subcatcatcod"]);

Page| 72

Page 73: Department of Computer Science & Applicationsckverma.com/Doc-Format/MCA M.Sc. Project.doc  · Web viewI, Shakti Singh, a student of Master of Computer Applications (MCA),VIth semester

obj.Add(k);

}

dr.Close();

cmd.Dispose();

con.Close();

return obj;

}

public List<clssubcatprp> subcatbycat(Int32 cod)

{

if (con.State == ConnectionState.Closed)

{

con.Open();

}

SqlCommand cmd = new SqlCommand("subcatbycat", con);

cmd.CommandType = CommandType.StoredProcedure;

cmd.Parameters.Add("@subcatcatcod", SqlDbType.Int).Value = cod;

SqlDataReader dr;

dr = cmd.ExecuteReader();

List<clssubcatprp> obj = new List<clssubcatprp>();

while (dr.Read())

{

clssubcatprp k = new clssubcatprp();

k.subcatcod = Convert.ToInt32(dr[0]);

k.subcatnam = dr[1].ToString();

k.subcatcatcod = Convert.ToInt32(dr[2]);

obj.Add(k);

}

dr.Close();

cmd.Dispose();

con.Close();

return obj;

Page| 73

Page 74: Department of Computer Science & Applicationsckverma.com/Doc-Format/MCA M.Sc. Project.doc  · Web viewI, Shakti Singh, a student of Master of Computer Applications (MCA),VIth semester

}

public List<clssubcatprp> Find_Rec(Int32 subcatcod)

{

if (con.State == ConnectionState.Closed)

{

con.Open();

}

SqlCommand cmd = new SqlCommand("fndsubcat", con);

cmd.CommandType = CommandType.StoredProcedure;

cmd.Parameters.Add("@subcatcod", SqlDbType.Int).Value = subcatcod;

SqlDataReader dr;

dr = cmd.ExecuteReader();

List<clssubcatprp> obj = new List<clssubcatprp>();

if (dr.HasRows)

{

dr.Read();

clssubcatprp k = new clssubcatprp();

k.subcatcod = Convert.ToInt32(dr[0]);

k.subcatnam = dr[1].ToString();

k.subcatcatcod = Convert.ToInt32(dr[2]);

obj.Add(k);

}

dr.Close();

cmd.Dispose();

con.Close();

return obj;

}

}

Page| 74

Page 75: Department of Computer Science & Applicationsckverma.com/Doc-Format/MCA M.Sc. Project.doc  · Web viewI, Shakti Singh, a student of Master of Computer Applications (MCA),VIth semester

DESIGINING PART

Screen Shot of the Company Login Page

Screen Shot of the New Student Login Page

Page| 75

Page 76: Department of Computer Science & Applicationsckverma.com/Doc-Format/MCA M.Sc. Project.doc  · Web viewI, Shakti Singh, a student of Master of Computer Applications (MCA),VIth semester

Screen Shot of the Firm Category Form

Screen Shot of the Firm Verify Form

Page| 76

Page 77: Department of Computer Science & Applicationsckverma.com/Doc-Format/MCA M.Sc. Project.doc  · Web viewI, Shakti Singh, a student of Master of Computer Applications (MCA),VIth semester

Screen Shot of the Verify Member Form

Page| 77

Page 78: Department of Computer Science & Applicationsckverma.com/Doc-Format/MCA M.Sc. Project.doc  · Web viewI, Shakti Singh, a student of Master of Computer Applications (MCA),VIth semester

Screen Shot of the Firm Country Form

Screen Shot of the State Form

Page| 78

Page 79: Department of Computer Science & Applicationsckverma.com/Doc-Format/MCA M.Sc. Project.doc  · Web viewI, Shakti Singh, a student of Master of Computer Applications (MCA),VIth semester

Screen Shot of the Firm Article Form

Page| 79

Page 80: Department of Computer Science & Applicationsckverma.com/Doc-Format/MCA M.Sc. Project.doc  · Web viewI, Shakti Singh, a student of Master of Computer Applications (MCA),VIth semester

Screen Shot of the Firm Test Form

Screen Shot of the Firm Test Result Form

Page| 80

Page 81: Department of Computer Science & Applicationsckverma.com/Doc-Format/MCA M.Sc. Project.doc  · Web viewI, Shakti Singh, a student of Master of Computer Applications (MCA),VIth semester

Screen Shot of the City Form

Page| 81

Page 82: Department of Computer Science & Applicationsckverma.com/Doc-Format/MCA M.Sc. Project.doc  · Web viewI, Shakti Singh, a student of Master of Computer Applications (MCA),VIth semester

Screen Shot of the Firm Sub Category Form

Screen Shot of the Question Form

Page| 82

Page 83: Department of Computer Science & Applicationsckverma.com/Doc-Format/MCA M.Sc. Project.doc  · Web viewI, Shakti Singh, a student of Master of Computer Applications (MCA),VIth semester

Screen Shot of the Answer Form

Page| 83

Page 84: Department of Computer Science & Applicationsckverma.com/Doc-Format/MCA M.Sc. Project.doc  · Web viewI, Shakti Singh, a student of Master of Computer Applications (MCA),VIth semester

Screen Shot of the Option Polls Form

Page| 84

Page 85: Department of Computer Science & Applicationsckverma.com/Doc-Format/MCA M.Sc. Project.doc  · Web viewI, Shakti Singh, a student of Master of Computer Applications (MCA),VIth semester

Screen Shot of the Post Article Form

Screen Shot of the Change Password Form

Page| 85

Page 86: Department of Computer Science & Applicationsckverma.com/Doc-Format/MCA M.Sc. Project.doc  · Web viewI, Shakti Singh, a student of Master of Computer Applications (MCA),VIth semester

Page| 86

Page 87: Department of Computer Science & Applicationsckverma.com/Doc-Format/MCA M.Sc. Project.doc  · Web viewI, Shakti Singh, a student of Master of Computer Applications (MCA),VIth semester

Screen Shot of the Help Required Form

Page| 87

Page 88: Department of Computer Science & Applicationsckverma.com/Doc-Format/MCA M.Sc. Project.doc  · Web viewI, Shakti Singh, a student of Master of Computer Applications (MCA),VIth semester

Screen Shot of the Add Reply Form

Screen Shot of the Reply Form

Page| 88

Page 89: Department of Computer Science & Applicationsckverma.com/Doc-Format/MCA M.Sc. Project.doc  · Web viewI, Shakti Singh, a student of Master of Computer Applications (MCA),VIth semester

Screen Shot of the Edit Profile Form

Page| 89

Page 90: Department of Computer Science & Applicationsckverma.com/Doc-Format/MCA M.Sc. Project.doc  · Web viewI, Shakti Singh, a student of Master of Computer Applications (MCA),VIth semester

Screen Shot of the Advertise With Us Form

System Testing and Implementation

SYSTEM TESTING

The purpose of system testing is to identify and correct errors in the candidate system. Testing is

an important element of software quality assurance ad represents the ultimate review of

specification, design and coding. The increasing visibility of the software as a system element

and the cost associated with a software failure are motivated forces for well planned, through

testing. System testing was conducted in order to detect errors and for comparing then the final

system with the requirement specification reports, i.e. whether the system meets requirements.

During testing the software was executed with the set of test cases and the output of programs for

the test cases was evaluated to determine if the program is performing as it was expected to.

Page| 90

Page 91: Department of Computer Science & Applicationsckverma.com/Doc-Format/MCA M.Sc. Project.doc  · Web viewI, Shakti Singh, a student of Master of Computer Applications (MCA),VIth semester

Testing presents an interesting challenge for the software engineers attempt to build software

from an abstract concept to an acceptable implementation. In testing engineer create a series of

test cases that occurs when errors are uncovered. Testing is the process of executing a program

for finding errors. A good test is one that has the high probability of finding an uncovered error.

A successful error is one that uncovers undiscovered errors.

The term error is used to refer the difference between actual output of the software and the cur-

rent output. Fault is a condition that causes the software to fail to perform its required function.

Software reliability is defined as a required function. Software reliability is defined as the proba-

bility that the software will not undergoes failures for a specified times under specified condi-

tion. Failure is the inability of a system or a component to perform a required function according

to its specification. Different levels of testing were employed for software to make it error free,

fault free and reliable.

Unit Testing:

Unit testing was conducted first. Different modules of the software were tested against the speci-

fications produced during design of the modules. Verification of the code produced during the

coding phase was done. Each module was tested separately.

Unit testing focuses verification effort on the smallest unit of software design module. This un-

covers errors within the boundary of a module. Unit testing is actually White box testing both the

external things as well as the internal codes are tested. In testing, the interfaces are tested in order

to ensure the proper flow of data in and out of the module. The boundary testing is done to en-

sure that the module keeps the limit of it. All independent paths are tested to ensure that all state-

ments are tested at least once. At last the error path is also tested.

Unit testing comprises the set of tests performed by an individual programmer prior to integra-

tion of the unit into a larger system. There are four categories of test that can be performed on a

program unit

Functional Unit

Performance Unit

Page| 91

Page 92: Department of Computer Science & Applicationsckverma.com/Doc-Format/MCA M.Sc. Project.doc  · Web viewI, Shakti Singh, a student of Master of Computer Applications (MCA),VIth semester

Stress Unit

Structure Unit

System Testing:

Then system testing was conducted. Here the entire software system was tested. The reference

document used for this process was requirement document and the goal was to see if the software

meets its requirements.

System testing includes the thorough testing of the product. System testing is actually a series of

different tests whose primary purpose is to fully exercise the computer based system. The tests

are recovery testing: this checks the recovery of the system when failure occurs. This is to ensure

that there are recovery procedures for error occurrences.

System testing involves unit testing, integration testing, acceptance testing. Careful planning and

scheduling are required to ensure that modules will be available for integration into the evolving

software product when needed. A test plan has the following steps:

Prepare test plan

Specify conditions for user acceptance testing

Prepare test data for program testing

Prepare test data for transaction path testing

Plan user testing

Compile/Assemble program

Prepare job performance aids

Prepare operational documents

Objectives of Testing.

First of all objectives should be clear.

Testing as a process of executing a program with the intent of finding errors.

Page| 92

Page 93: Department of Computer Science & Applicationsckverma.com/Doc-Format/MCA M.Sc. Project.doc  · Web viewI, Shakti Singh, a student of Master of Computer Applications (MCA),VIth semester

To perform testing, test cases are designed. A test case is a particular made up of artificial

situation upon which a program is exposed so as to find errors. So a good test case is one

that finds undiscovered errors.

If testing is done properly, it uncovers errors and after fixing those errors we have soft -

ware that is being developed according to specifications.

The above objective implies a dramatic change in viewpoint .The move counter to the commonly

held view than a successful test is one in which no errors are found. In fact, our objective is to

design tests that a systematically uncover different classes of errors and do so with a minimum

amount of time and effort.

Testing principles

Before applying methods to design effective test cases, software engineer must understand the

basic principles that guide the software testing process. Some of the most commonly followed

principles are:

All test should be traceable to customer requirements as the objective of testing is to uncover

errors, it follows that the most severe defects (from the customers point of view) are those that

causes the program to fail to meet its requirements.

Tests should be planned long before the testing begins. Test planning can begin as soon as the

requirement model is complete. Detailed definition of test cases can begin as soon as the design

model has been solidated. Therefore, all tests can be planned and designed before any code can

be generated.

The Pareto principle applies to software testing stated simply the Pareto principle implies that 80

percent of all errors uncovered during testing will likely be traceable to 20 percent of all program

modules. The problem of course, is to isolate these suspects’ modules and to thoroughly test

them.

Testing should begin “in the small “and progress towards testing “in large”. The first tests

planned and executed generally focus on individual modules. As testing progresses, testing shifts

Page| 93

Page 94: Department of Computer Science & Applicationsckverma.com/Doc-Format/MCA M.Sc. Project.doc  · Web viewI, Shakti Singh, a student of Master of Computer Applications (MCA),VIth semester

focus in an attempt to find errors in integrated clusters of modules and ultimately in the entire

system.

Exhaustive testing is not possible. The number of paths permutations for impossible to execute

every combination of paths during testing. It is possible however to adequately cover program

logic and to ensure that all conditions in the procedural design have been exercised.

To be most effective, an independent third party should conduct testing. By “most effective”, we

mean testing that has the highest probability of finding errors (the primary objective of testing).

Software project management is an umbrella activity within software engineering. It begins

before any technical activity is intimated and continues throughout the definition, development,

and maintenance of computer software.

Three p’s 1 have a substantial influence on software project management –people, problem, and

process. People must be organized into effective teams, motivated to do high quality software

work, and coordinated to achieve effective communication. The problem communicated from

customer to developer, partitioned (decomposed) into its constitute parts, and positioned for

work by the software team. The process must be adapted to the people and the problem. A

common process framework is selected, an appropriate software engineering paradigm is

applied, and a set of work is chosen to get the job done.

The pivotal element in all software projects is people. Software engineers can be organized in a

number of different team structures that range from traditional control hierarchies to “Open

paradigm” team. A variety of coordination and communication techniques can be applied to

support the work of the team. In general, formal reviews and informal person-to-person

communication have the most value for the practitioners.

The project management activity encompasses measurement and metrics, estimation, risk

analysis, schedules, tracking and control, and control. Each of these steps was followed during

project also.

Page| 94

Page 95: Department of Computer Science & Applicationsckverma.com/Doc-Format/MCA M.Sc. Project.doc  · Web viewI, Shakti Singh, a student of Master of Computer Applications (MCA),VIth semester

Test information flow

Testing is a complete process. For testing we need two types of inputs:

Software configuration –it includes software requirement specification, design specification and

source code of program. Software configuration is required so that testers know what is to be

expected and tested.

Test configuration – it is basically test plan and procedure. Test configuration is testing plan that

is, the way how the testing will be conducted on the system. It specifies the test cases and their

expected value. It also specifies if any tools for testing are to be used.

Test cases are required to know what specific situations need to be tested. When tests are

evaluated, test results are compared with actual results and if there is some error, then debugging

is done to correct the error. Testing is a way to know about quality and reliability. Error rate that

is the occurrence of errors is evaluated. This data can be used to predict the occurrence of errors

in future.

Test case design

We know test cases are integral part of testing. So we need to know more about test cases and

how these test cases are designed. The most desired or obvious expectation from the test cases is

that it should be able to find most errors with the least amount of time and effort.

A software product can be tested in two ways. In first approach, only overall functioning of the

product is tested. Inputs are given and outputs ate checked. This approach is called black box

testing. It does not care about the internal functioning of the product.

The other approach is called white box testing. Here the internal functioning of he product is

tested. Each procedure is tested for its accuracy. It is more intensive than black box testing. But

for the overall product both these techniques are crucial. There should be sufficient number of

tests in both categories to test the overall product.

Basic methods of TestingWhite box testing

White box testing is performed to reveal problems with the internal structure of a program. This

requires the tester to have detailed knowledge of the internal structure. A common goal of white

Page| 95

Page 96: Department of Computer Science & Applicationsckverma.com/Doc-Format/MCA M.Sc. Project.doc  · Web viewI, Shakti Singh, a student of Master of Computer Applications (MCA),VIth semester

box testing is to ensure a test case exercises every path through a program. A fundamental

strength that all white box strategies share is that the entire software implementation is taken into

account during testing, which facilitates error detection even when software specification is

vague or incomplete. The effectiveness or thoroughness of white box testing is commonly

expressed in terms of test or code coverage metrics, which measure the fraction of code

exercised by test cases.

Basic Path Testing

It is a white box technique. It was proposed by Tom McCabe. These tests guarantee to execute

every statement in the program at least one time during testing. Basic set is the set of all

execution paths of a procedure.

Black Box Testing

Black box tests are performed to access how well a program meets its requirements, looking for

incorrect or missing functionality. Functional tests typically exercise code with valid or nearly

valid input for which the expected output is known. This includes concepts such as ‘boundary

values’.

Performance tests evaluate response time, memory usage, throughput, device utilization and

execution time. Stress tests push the system to or beyond its

specified limits to evaluate its robustness and error handling capabilities. Reliability tests

monitor system response to representative user input, counting failures over time to measure or

certify reliability.

Black box testing uncovers the following types of errors

Incorrect or missing functions

Interface errors

External database access

Performance errors

Initialization and termination errors

The following techniques are employed during black box testing

Page| 96

Page 97: Department of Computer Science & Applicationsckverma.com/Doc-Format/MCA M.Sc. Project.doc  · Web viewI, Shakti Singh, a student of Master of Computer Applications (MCA),VIth semester

Integration Testing

One of the most difficult aspects of software development is the integration and testing of large

untested subsystems. The integrated system frequently fails in significant and mysterious ways

and it’s difficult to fix it.

Integration testing exercises several units that have been combined to form a module, subsystem

or system. Integration testing focuses on the interfaces between units, to make sure the units

work together. The nature of this phase is certainly ‘white box’, as we must have knowledge of

the units to recognize if we have been successful in focusing them together in the module.

IMPLEMENTATION

Page| 97

Page 98: Department of Computer Science & Applicationsckverma.com/Doc-Format/MCA M.Sc. Project.doc  · Web viewI, Shakti Singh, a student of Master of Computer Applications (MCA),VIth semester

Implementation is the stage in the project where the theoretical design is turned into the working

system and is giving confidence to the new system for the users i.e. will work efficiently and ef-

fectively. It involves careful planning, investigation of the current system and its constraints on

implementation, design of method to achieve the change over, an evaluation, of change over

methods. A part from planning major task of preparing the implementation is education of users.

The more complex system is implemented, the more involved will be the system analysis and de-

sign effort required just for implementation. An implementation coordinating committee based

on policies of individual organization has been appointed. The implementation process begins

with preparing a plan for the implementation for the system. According to this plan, the activities

are to be carried out; discussions may regarding the equipment has to be acquired to implement

the new system.

Implementation is the final and important phase. The most critical stage is in achieving a suc-

cessful new system and in giving the users confidence that the new system will work and be ef-

fective. The system can be implemented only after thorough testing is done and if it found to

working according to the specification. This method also offers the greatest security since the old

system can take over if the errors are found or inability to handle certain types of transaction

while using the new system.

At the beginning of the development phase a preliminary implementation plan is created to

schedule and manage the many different activities that must be integrated into plan. The imple-

mentation plan is updated throughout the development phase, culminating in a change over plan

for the operation phase. The major elements of implementation plan are test plan, training plan,

equipment installation plan, and a conversion plan.

Page| 98

Page 99: Department of Computer Science & Applicationsckverma.com/Doc-Format/MCA M.Sc. Project.doc  · Web viewI, Shakti Singh, a student of Master of Computer Applications (MCA),VIth semester

There are three types of implementation:

o Implementation of a computer system to replace a manual system.

o Implementation of a new computer system to replace an existing system.

o Implementation of a modified application to replace an existing one, using the same com-

puter.

Successful implementation may not guarantee improvement in the organization using the new

system, but improper installation will prevent it. It has been observed that even the best system

cannot show good result if the analysts managing the implementation do not attend to every

important detail. This is an area where the systems analysts need to work with utmost care.

IMPLEMENTATION TOOLS:

Training personnel

Conversion Procedures

Post-implementation review

Training of Personnel involved with system:

Even well designed system can succeed or fail because of the way they are operated and used.

Therefore, the quality of training received by the personal involved with the system in various

capacities helps or hinders and may even prevent the successful implementation of management

information system.

Those who are directly or indirectly related with the system development work must know in

detail what must know in detail what their roles will be, how they can make efficient use of the

system and what the system will or will not do for them. Both system operators and users need

training.

Page| 99

Page 100: Department of Computer Science & Applicationsckverma.com/Doc-Format/MCA M.Sc. Project.doc  · Web viewI, Shakti Singh, a student of Master of Computer Applications (MCA),VIth semester

System Operators Training:

Running of the system successfully depend on the personnel working in the Computer Centre.

They are Responsible for providing the necessary support. Their training must ensure that they

are able to handle all possible operations, both routine and extra-ordinary in nature.

If the system calls for the installation of new equipment, such as new computer system, special

terminals or different data entry machines, the operators training should include such

fundamentals as how to turn the equipment on and use it, how to power off and a knowledge of

what constitutes normal operations. The operators should also be trained on different type of

malfunctioning, how to recognize them and what steps should also be taken whenever they arise.

User Training:

User may be trained on use equipment, particularly in the case where, e.g. a micro computer is in

use and individual involved is both operator and user. In such cases, user must be given training

on how to operate and user. In such cases, user must be given training on how to operator the

system also. Questions that may be trivial to the analyst, such as how to turn on a terminal, how

to insert a diskette into a micro-computer or when it is safe to turn off equipment with out danger

of data loss are significant problems to new users who are not familiar.

Inmost of the cases user training deals with the operation of the system itself, with proper atten-

tion given to data handling techniques. It is imperative that users be properly trained in methods

of entering transaction, editing data, formulating inquiries, deleting and inserting of records. No

training is complete without familiarizing users with simple systems maintenance activities.

Weakness in any aspect of training may lead of awkward situation that creates user frustration

and error.

Conversion Methods:

A conversion is the process of changing from the old system to the new one. It must be properly

planned and executed. Four methods are common in use. They are Parallel Systems, Direct Con-

version, Pilot System and Phase In method. Each method should be considered in the light of the

opportunities that it offers and problems that it may create. In general, system conversion should

be accomplished in shortest possible time. Long conversion periods create problems for all per-

sons involved including both analysts and users.

Page| 100

Page 101: Department of Computer Science & Applicationsckverma.com/Doc-Format/MCA M.Sc. Project.doc  · Web viewI, Shakti Singh, a student of Master of Computer Applications (MCA),VIth semester

Parallel systems:

The most secure method of converting from an old to new system is to run both systems in paral-

lel. This method is safest one because it ensures that in case of any problem in using new system,

the organization can still fall back to the old system without the loss of time and money.

The disadvantages of parallel systems approach are:

It doubles operating costs.

The new system may not get fair trial.

Direct conversion:

This method converts from the old system to new system abruptly, sometimes over a weekend or

even overnight. The old system is used until a planned conversion day, when it is replaced by the

new system.

Pilot system:

Pilot approach is often preferred in the case of the new system which involves new techniques or

some drastic changes in organization performance. In this method, a working version of the sys-

tem is implemented in one part of the organization, such as a single work area or department.

Phase –IN- method:

This method is used when it is not possible to install a new system throughout an organization

all at once. The conversion of files, training of personnel or arrival of equipment may force the

staging of the implementation over a period of time, ranging from weeks to months.

Post Implementation Review

Page| 101

Page 102: Department of Computer Science & Applicationsckverma.com/Doc-Format/MCA M.Sc. Project.doc  · Web viewI, Shakti Singh, a student of Master of Computer Applications (MCA),VIth semester

After the system is implemented and conversion is complete, a review should be conducted to

determine whether the system is meeting expectations and where improvements are needed. A

post implementation review measures the systems performance against predefined requirement.

It determines how well the system continues to meet the performance specifications.

Page| 102

Page 103: Department of Computer Science & Applicationsckverma.com/Doc-Format/MCA M.Sc. Project.doc  · Web viewI, Shakti Singh, a student of Master of Computer Applications (MCA),VIth semester

CONCLUSION

The system has been developed for the given condition and is found working effectively. The de-

veloped system is flexible and changes whenever can be made easy. Using the facilities and

functionalities of .Net, the software has been developed in a neat and simple manner, thereby re-

ducing the operators work.

The speed and accuracy are maintained in proper way. The user friendly nature of this software

developed in .Net framework is very easy to work with both for the higher management as well

as other employees with little knowledge of computer. The results obtained were fully satisfac-

tory from the user point of view.

The system was verified with valid as well as invalid data in each manner. the system is run with

an insight into the necessary modifications that may require in the future. Hence the system can

be maintained successfully without much network.

Page| 103

Page 104: Department of Computer Science & Applicationsckverma.com/Doc-Format/MCA M.Sc. Project.doc  · Web viewI, Shakti Singh, a student of Master of Computer Applications (MCA),VIth semester

BIBLIOGRAPHY

Database Management System Vipin C. Desai

System analysis and Design Elias M. Awad

SQL SERVER Microsoft Press

ASP.Net 3.5 Wrox Publications

JavaScript R. Allen Wyke, Jason D. Gilliam and Chariton

Page| 104