Download - Bookworm 2
-
8/3/2019 Bookworm 2
1/48
1
ABSTRACT
The main aim of the project is to make the working of Online Book Store very
simple and easily achievable.The major objective of the project is to make the process of Online Book Store
easy and user friendly
Also, an utmost care has been taken to make this project totally system efficient.
This project intends to introduce more user friendliness in the various activities
such as- book updating, maintenance, and searching.
The process of book maintenance and updation can also be
accomplished by the admin. The entire information is maintained in the database
or files and has been secured with security measures.
Online Book Store has been designed to computerize the following functions -
y Creating new accounty Providing a specific Booksy Show the Categoryy Modification to existingCategoryy Modification to existing Detailsy Updation of Booksy Deletion of existing Books, Author andPublishery Administrative Loginy Change Passwordy Addition of New Usery Feedbacky Help Section
-
8/3/2019 Bookworm 2
2/48
2
COMPANY PROFILE
Linux Soft Technologies Pvt. Ltd., Jaipur is theRedhat Authorized training
partner, exam centre & Registered with Govt. of India. We are the leadingTrainingSolution-Development organization ofRedhat Linux, Oracle, Cisco,
Microsoft, Sun Microsystems, VHDL / VLSI & ROBOMAKING-
EMBEDDED SYSTEMS. We have been providing services in imparting training
and solution in Networking domain & Programming covering LAN, MAN, WAN
with the complete offerings in Internet Security.
Based on our extensive support experience with a variety of customers,
Linux Soft Technologies Pvt. Ltd.has developed a unique approach for technical
support. We offer consulting and planning, integration and maintenance servicesfor many open source projects, allowing you to deploy them across your network
with complete peace of mind. With growing popularity and acceptance of Linux,
RoboMaking, VLSI, Oracle, and Routers in the govt. sector we started a company,
TheLinux Soft Technologies Pvt. Ltd.to provide all Computer based solutions
under one roof.
Linux Soft Technologies Pvt. Ltd. is
1) An Authorized Redhat Training partner & Exam Centre from
USA, Microsoft Certified Solution Provider (MCSP) & Cisco
Solution Provider.
2) Training, Solution & Development Company Registered
by Govt. of INDIA.
-
8/3/2019 Bookworm 2
3/48
3
Background
Linux Soft TECHNOLOGIES Pvt. Ltd. is providing fullservice security and data networking solutions provider & Training centre for all
major I.TCertifications. We provide complete, reliable, and dynamic network
solutions, Web Solution & Security Solution to our clients. We design, develop,
train, and deploy state - of - the - art information and communication system that
are best suited to the needs of our customers.
Philosophy
Linux Soft TECHNOLOGIES Pvt. Ltd.is committed to addressing each and
every customer opportunity with a partnering approach. Based upon the
customer's requirements, we design a solution that meets their business objectives.
We ensure that our solution will provide growth and migration plans for the future.
Linux Soft TECHNOLOGIES Pvt. Ltd. incorporates only the highest qualityproducts and services in its solutions.
This approach guarantees that all of our solutions meet the following criteria:
overall quality, cost effectiveness, reliability, availability, maintainability, and arestandards based.
People
The Linux Soft TECHNOLOGIES Pvt. Ltd.family is a team ofqualified, skilled, highly trained and highly motivated professionals.
We believe in the adage that a company is best defined by its people- dedicated,
enthusiastic and innovative.
There are no "Sales people" atLinux Soft TECHNOLOGIES Pvt. Ltd.Each
employee is responsible for creating new business opportunities through a creative
approach which combines cutting edge technology skills with expertise in thedomain of networks.
-
8/3/2019 Bookworm 2
4/48
4
Network Security Solution
The number of intrusions/hacking into private computer
networks from the Internet is growing rapidly, in parallel with the explosivegrowth of the Internet; the extent of criminal activities within the Internet is
expected to grow at an alarming rate. As businesses make increasing use of the
Internet, this has also led to a spurt in deliberate abuse and criminal activities inthis new medium.
To protect your network from internal and external threats, Linux Soft
Technologies Pvt. Ltd.Provides the most complete and comprehensive security
solution from start to finish. If your company houses proprietary data and you have
not addressed security, contact Linux Soft Technologies Pvt. Ltd. immediately.
Security is not just a firewall.
Network Security
Linux Soft Technologies Pvt. Ltd.prides itself on its ability to offer scalable,turnkey security solutions, which includes the following process.
*Define Security Plan
*Create network security design
*Provide hardware and software
*Implementation of security Architecture
*Configuration of hardware and software
*Ongoing security consulting services
Linux / Windows Server-Setup Solution
Linux Soft Technologies have implemented many Linux WindowsSolution. In Linux & Windows we provide Solution for DNS, DHCP, WEB,MAIL,
FIREWALL, PROXY, NETWORK INSTALLATION, ADS, BACKUP-RESTORE &Troubleshooting.
-
8/3/2019 Bookworm 2
5/48
5
Security Services
Linux Soft Technologies Pvt. Ltd.security audit looks at the current state
of your information security and evaluates it against a benchmark - as directed by
your internal policies, industry standards or applicable legislation. At the end of
this audit, Linux Soft Technologies Pvt. Ltd. will prepare a paper and discuss the"GAPANALYSIS" along with options to "plug" the gaps. Linux Soft Technologies
Pvt. Ltd. will then work with your team to come to a level of risk and cost ofsecurity which you feel happy with.
Firewall Services
A firewall is protective fence around your network. Linux Soft
Technologies Pvt. Ltd. range of firewall services is one of the most comprehensive
in the market today. Our firewall solutions are not simply of the shelf, but are
designed and implemented after a complete security audit of the organization's
network. Linux Soft Technologies Pvt. Ltd.firewall suite has products from all
leading vendors.
Anti-Virus Services
Wemonitor your gateway to the Internet for viruses, worms and Trojan
horse programs, which continue to cause significant losses to organizations. Our
continuous monitoring allows us to update patches remotely and immediately fromour 24x7 secure lab- thus ensuring you are protected to highest level at all times.
VPN Services
We create a secure VPN tunnel from your corporate networks to your
clients. We achieve confidentiality, integrity and authenticity for your network
users by implementing IPSec with IKE options and using AES or 3DES or IDEAalgorithms.
-
8/3/2019 Bookworm 2
6/48
6
WAN Services
Linux Soft Technologies Pvt. Ltd. range of WAN solutions runs the
entire gamut from leased lines, ISDN, Broadband & Frame Relay. From large
corporations to small home offices to mobile users we have the WAN Technology
to suite every need. Our WAN Solutions are a byword for efficiency, robustness,flexibility and maintainability. .
Linux Soft Technologies Pvt. Ltd. undertakes total consultancy for
WAN's including the supply and configuration ofModems, CSU/DSU, RemoteAccess Servers, Routers, Firewalls, etc.
We coordinate installation of all necessary cabling and ancillary support
infrastructure to insure all elements necessary for a robust network are in place.
LeasedLines
Linux Soft Technologies Pvt. Ltd. has setup many Leased lines with speedsranging from 64Kbps to 512kbps, to provide dedicated connectivity to customers.
ISDN
Linux Soft Technologies Pvt. Ltd. is a virtual powerhouse of ISDN solutions, with
unsurpassed proficiency in ISDN BRI, ISDN Leased Lines to ISDN Backups toTelecommuter ISDN DialUps.
-
8/3/2019 Bookworm 2
7/48
7
We configure ISDN BRI routers, NT Boxes and TA's.
Linux Soft Technologies Pvt. Ltd.Is providing Training program on following
Technologies
Red HatLinux RHCT, RHCE
Cisco System CCNA, CCNP, CSPFA
Microsoft MCP, MCSA, MCSE 2003, VB.Net, ASP.Net, C#.Net
CompTia A+, Network+
Sun Microsystems Java, J2EE
Oracle Oracle DBA/Developer
VHDL/VLSI, Robomaking / Embedded Systems
Security CEH, CCSA
Linux Soft Technologies Pvt. Ltd.Is providing Solution on followingTechnologies
1)RedhatLinux2) Cisco Router Switch Implementation3) Windows Server Installation & Configuration4) Cisco Pix Firewall Implementation5) Web Hosting, Domain Registration6) Web Site Development, Web Solution7)Software Development8)Electronic Projects9)Database Solution
-
8/3/2019 Bookworm 2
8/48
8
Software Development Life Cycle
Software Development Life Cycle (SDLC) is a structured sequence of phases for
implementing an information system.
A System/Software development life cycle (SDLC) is a logical process by
which systems analysts, software engineers, programmers and end-users build
information systems and computer application to solve business problems and
needs.
The System/Software development life cycle (SDLC) is a conceptual model
used in project management that describes the stages involved in an information
system development project, from an initial feasibility study through maintenance
of the completed application.
In the software development process we focus on the activities directly related
to the production of the software, for example, design, coding, and testing. A
development process is a sequence of steps. Each step performs a well-defined
activity leading towards the satisfaction of the project goals, with the output of one
step forming the input of the next one.
We have followed the concept of SDLC in the following way:
Survey Analysis Preliminary Design System Design Implementation Acceptance Test GenerationQuality Assurance
-
8/3/2019 Bookworm 2
9/48
9
REQUIREMENT ANALYSIS
Requirement Analysis is the first phase of the SDLC. First, we need to figure out
what the problem is (analysis)? We must know exactly what we want to do before
we can begin to do it. A clear understanding of exactly what is needed is necessary
for creating a solution.
In this phase Business Analysts (BA), find out what is the problem and what
are requirements and so on.It begins with a request from the user for a new system.
It involves the following: Identify the requirement for the system. Clarify deficiencies in the current system. Identify deficiencies in the current system. Establish goals and objectives for the new system. Determine the feasibility for the new system.
Prepare a project charter that will be used to guide the reminder of the project.
ANALYSIS
Analysis is a detailed study of the various operations performed by a system andtheir relationships within and outside of the system. This activity is also used to
study the system in details. The objective of this step is to develop structured
system specifications for the proposed system. The structured system specification
will be called the Essential Model.
It involves:
Detailed study of the system.
Understand the procedure of the system.
Determine the scope of the system.
Define the goals of the proposed system.
-
8/3/2019 Bookworm 2
10/48
10
PRELIMINARY DESIGN
The most creative and challenging phase of the system life cycle is System Design.
The term design describes the final system and the process by which it is
developed. This activity deals with certain design issues that are to be finalized in
consultation with the user. The two most important issues of relevance to the user
are the automation boundary & the human machine interface. The output of this
activity is the user implementation model. This model, in addition to the essential
model defines the following for the system:
Automation Boundary Report Layout Workable plan for implementing the candidate system. Screen layouts for the data entry forms Menus Information on personnel, money, hardware, facilities, and their
estimated cost must also be available.
DESIGN
System Design involves the transformation of the user implementation model into
software design. The first step is to determine how the output is to be produced and
in what format. Second, input data and master files (database) have to be designed
to meet the requirements of the proposed output.
The design specification of the proposed system consists of thefollowing:
Database schema & Pseudo code for all the modules.
-
8/3/2019 Bookworm 2
11/48
11
CODING
After designing the new system/software, the whole system/software is required
to be converted into computer language. Coding the new system/software into
computer programming language does this. It is an important stage where the
defined procedures are transformed into control specifications by the help of a
computer language. This is also called the Programming Phase in which the
programmer converts the program specifications into computer instructions,
which we refer as programs. The programs coordinate the data movement as and
control the entire process in a system/software.
TESTING
Before actually implementing the new system/software into operations, a test run
of the system/software is done removing all the bugs, if any. It an important
phase of a successful system. After codifying the whole programs of the system,a test plan should be developed and run on a given set of test data.
In the system/software testing stage, we check the overall
behavior of the system/software against the functional and the performance
requirements. There are two type of testing:
White-Box: Internal part (code) of the project is testing. Black-Box: System behavior (input/output) is checked.
-
8/3/2019 Bookworm 2
12/48
12
IMPLEMENTATION
After having the user acceptance of the new system/software developed, the
Implementation phase begins.
Implementation is the stage of a project during which theory is turned into
practice. In this phase, user can know how to execute the package, how to enter
data and so on.
y The implementation phase is less creative then system design. Thisactivity includes programming, testing & integration of modules
into progressively more complete system.
y It is primarily concerned with user training, site preparation, and fileconversion. During the final testing user acceptance is tested,followed by user training.
y System testing checks the readiness and accuracy of the system toaccess, update, and retrieve data from new files. The output of this
activity is the complete integrated system.
y Major sub activities Coding Integration Testing Debugging
y Inputs Project character Design specification
y Outputs Integrated Systems
-
8/3/2019 Bookworm 2
13/48
13
MAINTENANCE
When the implementation report is submitted, an Maintenance should be made to
determine whether the system/software meets the objectives stated in the general
design report.
In this phase, users may be able to suggest the easy-to-implement
improvements.
ACCEPTANCE TEST GENERATION
This activity generated a set of test data that can be used to test the new
system before accepting it. If successful, the program(s) is then run with live
data. Otherwise a diagnostic procedure is used to locate and correct errors in the
program.
y Input Project Character
y Output Quality Assurance test set
PROCEDURE DESCRIPTION
The objective of this step is to produce a manual, which may be used as a
guide for operating the system.
Inputs
Project Character
User implementation modelOutputs
User manual (guide for end user)
-
8/3/2019 Bookworm 2
14/48
14
TOOLS AND TECHNOLOGY
ASP.NET
ASP.net is the latest version of Microsofts Active Server pages Technology
(ASP). ASP.NET is a unified Web development model that includes the services
necessary for you to build enterprise class web application with a minimum of
coding. ASP.net is part of .net framework, and when coding ASP.net you have
access to classes in the .net framework. You can code your applications in any
language compatible with the common language runtime (CLR), including
Microsoft Visual Basic, C#, and Jscript, .Net and J #. These languages enable you
to develop ASP.Net applications that benefit from the common language runtime,
type safety and inheritance and so on.
ASP.NET Includes
A page and control framework. The ASP.NET compiler. Security Infrastructure. State-management facilities. Application configuration. Health monitoring and performance features. Debugging support. An XML web service framework. Extensible hosting environment and application life cycle management. An extensible designer environment.
ASP is a server side scripting technology that enables scripts (embedded in webpages) to be executed by an Internet Server.
-
8/3/2019 Bookworm 2
15/48
15
ASP is a Microsoft technology. ASP stands for Active Server Pages. ASP is a program that runs inside IIS. IIS stands for Internet Information Services. IIS comes a free component with Windows 2000. IIS is also a part of the Windows NT 4.0 Option pack. PWS is a smaller but fully functional version of IIS. PWS can be found on your windows 95/98 CD.
ASP file
An ASP file is just the same as an HTML file. An ASP file can contain text, HTML, XML and scripts. Scripts in an ASP file are executed on the server. An ASP file has the file extension .asp.
ABOUT ASP.NET
ASP 3.0 is the latest version of ASP, but there will never be an ASP 4.0 version .
ASP.NET is the next generation ASP, but its not an upgraded version of
ASP.ASP.NET Framework. Microsoft spent three years rewriting ASP.NET fromthe ground up, and ASP.NET is not fully backward compatible with ASP 3.0.
-
8/3/2019 Bookworm 2
16/48
16
.NET FRAMEWORK
The .NET framework is the infrastructure for the Microsoft .NET platform. The
.NET Framework is an environment for building, deploying and running web
applications and the .NET framework contains a common language runtime and
common class libraries like ADO.NET, ASP.NET and Windows Forms to
provide advanced standard services that can be integrated into a variety of
computer systems.
The.NET framework provides a feature-rich application environment, simplified
development and easy integration between a numbers of different development
languages.
The .NET framework is language neutral. Currently it supports C++, C#, VisualBasic and Jscript.Microsoft Visual Studio .Net is a common development for the.net framework.
Differences between ASP and ASP.NET
ASP .NET has a better language support, a large set of new controls andXML based components and better user authentication.
ASP.NET provides increased performance by running compiled code. ASP.NET is not fully backward compatible with ASP.
New in ASP.NET
Better language support Programmable controls. Event Driven programming. XML-Based components. User authentication, with accounts and roles. Higher scalability. Increased performance compiled code . Easier configuration and deployment.Not fully ASP compatible.
-
8/3/2019 Bookworm 2
17/48
17
Language Support
ASP.NET uses the new ADO.NET. ASP.NET supports full Visual Basic , not VB script. ASP.NET supports C# and C++. ASP.NET supports Jscript as before.
ASP.NET Controls
ASP.NET contains a large set ofHTML controls. Almost all HTML controls on a
page can be defined as ASP.NET control objects that can be controlled by scripts
.ASP.NET also contains a new set of object oriented input controls , like
programmable list boxes and validation controls. A new data grid control supports
sorting, data paging and everything you expect from a dataset control.
-
8/3/2019 Bookworm 2
18/48
18
Software & Hardware Specification
Hardware Specification:
Processor:
Minimum: 600 megahertz (MHz) Pentium processor.
Recommended: 1 gigahertz (GHz) Pentium processor or higher.
Random Access Memory
Minimum: 256 megabytes (MB).
Recommended: 512 MB or higher.
Hard Disk:
Without MSDN: 2 GB of available space required on installation drive. 1 GB of available space required on system drive.
With MSDN: 3.8 GB of available space required on installation drive with a
full MSDN install or2.8 GB of available space required on installation drive
with a default MSD N install. 1 GB of available space required on system
drive.
Display:
Minimum: 800 X 600 256 colors.
Recommended: 1024 X 768High Color - 16-bit.
-
8/3/2019 Bookworm 2
19/48
19
Software Specification:
OperatingSystem:Minimum:-
Microsoft Windows 2000 SP4.
Recommended:-
Microsoft Windows XP SP2 (All Edition).
Microsoft Windows Server2003 SP1 (All Edition).
WebBrowsers:Minimum: Internet Explorer5, Mozilla 5, Firefox 2, Netscape 7.
DATABASE:
Microsoft SQL Server2005.
SOFTWARE TOOLS:
Language: ASP.NET 2008 or Visual Studio 2008
Server Language: C#
-
8/3/2019 Bookworm 2
20/48
20
SYSTEM ANALYSIS AND DESIGN
DATA FLOW DIAGRAM:-
Graphical description of a systems data and how the processes transform the data
is known as Data Flow Diagram (DFD). A DFD shows the flow of data through a
system. It views a system as a function that transforms the inputs into desired
outputs. Any complex system will not perform this transformation in a Single
Stop, and the data will typically undergo a series of transformations before it
becomes the output. The DFD aims to capture the transformations that take place
within a system to the input data so that eventually the output data is produces.
The agent that performs the transformation of data form one state to another is
called processes. So the DFD show the movement of data through the different
transformations of processes in the system.
Control information such as record counts, passwords and validation requirements
is not pertinent to a data flow diagram. Meaning full names for data flows,
processes and data stores must be chosen.To construct the data flow diagrams, we
use
Arrows: An arrow identifies the data flow- data in motion. It is a pipeline through
which information flows. All data flow are identified by unique names. These
names are chosen so that they convey some meaning about what the data is.
Circles: Circles stands for processes that convert data into information. Open ended boxe
An open-ended box represents a data store or a temporary repository of data.
Squares: A square defines a source (originator) or destination of system data.
-
8/3/2019 Bookworm 2
21/48
21
1 Level DATA FLOW DIAGRAM
At this level ofD.F.D. all the process together with all the data stores (tables). It
shows the true data flow i.e. how data is actually flowing in the system .Data is
coming from which table and going into which table is clearly shown by this DFD.This DFD is the main reference for the development of the system. After
understanding the whole system, The application developer will fall back upon
this DFD during the development phase.
-
8/3/2019 Bookworm 2
22/48
22
Executive Summary : -
BookWorm is Book providing company site. User can see different BOOKS
available , by different Authors and Publisher etc. User can select his book of
interest and can order online and pay online.
This Web Application is developed for make easiest communication and share
the information between Book company & User Of The Web Site. Having
studied the various requirements of the customer, Our Team concluded the
following requirements of the Application:
y BookWorm Website is the Book Search Engine.y It share the informations related to most famous books, new books, Books of
particular category.
y The user of the site:a. Administrator: Administrator will access all the page of site. Admin
can modify any information about the Books, Category , Author,
Pubisher etc any time.
b. Guest User : Guest user has interaction with all the information ofsite related to any Book, Author, Publisher etc. He can store his
feedback on the website
-
8/3/2019 Bookworm 2
23/48
23
Web Page Description
ADMIN LOGIN PAGE
Web Page Description
Name Details
Admin
User-ID
Control: Text Field
Function Description: Administrator will enter there Id. It will
accept nvarchar type value. It should not be blank otherwise an error
message will be displayed i.e. Enter :Login Id
Password Control: Text Field
Function Description: User will enter their password and it should
be masked.
Login Function Description: If Login Id and Password is correct, Index
page of Administrator section Open.
-
8/3/2019 Bookworm 2
24/48
24
y Validation in Login Process: When Administrator wants to Login, thefollowing checks are carried out.
y Administrator have to fill LoginId otherwise an error message should bedisplayed i.e. Enter Login Id.
y Administrator must have to enter Password otherwise an error messageshould be displayed i.e. Enter Password.
y LoginId and Password should be correct otherwise an error message willbe displayed i.e. Either Login Id or Password is incorrect.
ADMIN PANEL
-
8/3/2019 Bookworm 2
25/48
25
Web Page Description
Name Details
Main Page Options:
y ADMIN HOMEy Category Managementy Author Managementy Publisher Managementy Book Managementy Account Managery Helpy Contact Usy About Usy FAQ
ADMIN HOME Control: HyperLink
Function Description: This option displays new page that
have the options to manage the available Contents.
Category
Management
Control: Hyper Link
Function Description: This option displays new page that
have the options to manage the Category.
Author
Management
Control: Hyper Link
Function Description: This option display new page that
have the options to manage the Author.
Publisher Control: Hyper Link
-
8/3/2019 Bookworm 2
26/48
26
Management Function Description: This option display new page that
have the options to manage the Publisher.
Book Management Control: Hyper Link
Function Description: This option display new page that
have the options to manage the Books.
Account Manager Control: Hyper Link
Function Description: This option display new page that
have the options to manage the Admin Accounts.
Help Control: Hyper Link
Function Description: This option display new page that
have the options to manage the States in which Tours are
available.
Contact Us Control: Hyper Link
Function Description: This option display new page that
have the Contact Details
About Us Control: Hyper Link
Function Description: This option display new page that
have the About us Details.
FAQ Control: Hyper Link
Function Description: This option display new page that
have the options to manage the Frequently Asked
Questions.
-
8/3/2019 Bookworm 2
27/48
27
BOOK MANAGEMENT
Web Page Description
Name Details
Select Category Control: Drop Down List
Function Description: This control the Category
Selection.
Book Display Control: Grid View
Function Description: This Grid View control the Books
of selected Category
Add Book Function Description: This Opens a a new view which is
use to Add New Books
-
8/3/2019 Bookworm 2
28/48
28
ADD BOOK
Web Page Description
Name Details
Select
Category
Control: DropDownList
Function Description: This field enables us to enter the category
name from the list.
Book Name Control: Text Box
Default: Blank
Function Description: This field accepts nvarchar type value.
Author Control: DropDownList
Function Description This field enables us to enter the Author
name from the list.
-
8/3/2019 Bookworm 2
29/48
29
Publisher Control: DropDownList
Default: Blank
Function Description: This field enables us to enter the Publisher
name from the list.
Edition Control: Text Box
Default: Select City
Function Description: This field accepts nvarchar type value.
Price Control: Text Box
Default: Blank
Function Description: This field accepts nvarchar type value..
Image Control: File Upload
Default: Blank
Function Description: This field accepts the image Url.
Submit Control: Button
Default: Enable
Function Description: This button have the functionality to enter
all the values into the database.
Reset Control: Button
Default: Enable
Function Description: Reset all the controls.
Finish Control: Link Button
Default: Back
Function Description: This have the functionality to go one step
back from the current page.
-
8/3/2019 Bookworm 2
30/48
30
CATEGORY MANAGEMENT
Web Page Description
Name Details
Add
Category
Control: Link Button
Default: Enable
Function Description: This button navigate to new page that
have the options to add the new Category
Delete Control: Button of GridView
Default: Enable
Function Description: This button have the functionality to
delete the particular schedule.
-
8/3/2019 Bookworm 2
31/48
31
Edit Control: Button of GridView
Default: Enable
Function Description: This button have the functionality to
navigate on new page that have the functionality to edit selected
schedule.
ADD CATEGORY
Web Page Description
Category
Name
Control: Text Box
Function Description: This field accepts nvarchar type value.
Submit Control: Button
Function Description: This button have the functionality to enter
-
8/3/2019 Bookworm 2
32/48
32
all the values into the database.
Reset Control: Button
Function Description: Reset all the controls.
Finish Control: Button
Function Description: This have the functionality to go one step
back from the current page
AUTHOR MANAGEMENT
-
8/3/2019 Bookworm 2
33/48
33
Web Page Description
Name Details
Author
Management
Control: Grid View
Function Description: The gridview shows the Author .
Delete Control: Button of GridView
Function Description: This button has the functionality to delete.
Edit Control: Button of GridView
Function Description: This button have the functionality to
navigate on new page that have the functionality to edit
ADD AUTHOR
-
8/3/2019 Bookworm 2
34/48
34
Web Page Description
Author
Name
Control: Text Box
Function Description: This field accepts nvarchar type value.
Author
Details
Control: Text Box
Function Description: This field accepts nvarchar type value.
E-Mail Control: Text Box
Function Description:. This field accepts nvarchar type value.
Website Control: Text Box
Function Description: This field accepts nvarchar type value.
Submit Control: Button
Function Description: This button have the functionality to enter
all the values into the database.
PUBLISHER MANAGEMENT
-
8/3/2019 Bookworm 2
35/48
35
Web Page Description
Name Details
Publisher
Management
Control: Grid View
Function Description: The gridview shows the Publisher
Delete Control: Button of GridView
Default: Enable
Function Description: This button has the functionality to delete.
Edit Control: Button of GridView
Function Description: This button have the functionality to
navigate on new page that have the functionality to edit.
ADD PUBLISHER
-
8/3/2019 Bookworm 2
36/48
36
Web Page Description
Publisher
Name
Control: Text Box
Function Description: This field accepts nvarchar type value.
Publisher
Address
Control: Text Box
Function Description: This field accepts nvarchar type value.
Contact No. Control: Text Box
Function Description: This field accepts nvarchar type value.
E-MAIL Control: Text Box
Function Description: This field accepts nvarchar type value.
Website Control: Text Box
Function Description: This field accepts nvarchar type value.
Reset Control: Button
Default: Enable
Function Description: Reset all the controls.
Submit Control: Button
Function Description: This button have the functionality to enter
all the values into the database.
Finish Control: Button
Default: Back
Function Description: This have the functionality to go one step
back from the current page.
-
8/3/2019 Bookworm 2
37/48
37
ACCOUNT MANAGER
Web Page Description
Name Details
Change
Password
Control: Button
Function Description: This button navigate to new page that
have the options to Change Password
Add New
Admin
Control: Button
Function Description: This button navigate to new page that
have the options to Add New Admin
-
8/3/2019 Bookworm 2
38/48
38
CHANGE PASSWORD
Web Page Description
Name Details
User Name Control: Text Box
Function Description: This field accepts nvarchar type value.
Enter
Password
Control: Text Box
Function Description: This field accepts nvarchar type value.
New
Password
Control: Text Box
Function Description: This field accepts nvarchar type value.
Confirm
Password
Control: Text Box
Function Description : This field accepts nvarchar type value.
-
8/3/2019 Bookworm 2
39/48
39
ADMIN HELP SECTION
USER HOMEPAGE
-
8/3/2019 Bookworm 2
40/48
40
ABOUT US
CONTACT US
-
8/3/2019 Bookworm 2
41/48
41
BOOKS PAGE
Web Page Description
Name Details
Select
Category
Control: Drop Down List
Function Description: helps to select the desired Category of
books
Books Control: Datalist
Function Description: Helps to Show the books of the selected
category
Buy Control: Button
Function Description: this button navigates you to the buy
section of the website
-
8/3/2019 Bookworm 2
42/48
42
AUTHOR PAGE
Web Page Description
Name Details
Authors Control: Datalist
Function Description: Helps to Show the various Authors stored
in the database
-
8/3/2019 Bookworm 2
43/48
43
DATABASE DESIGN
Once the input data is captured in the system, these may have to be
preserved either for a short or long period. These data will generally be stored infiles or databases in logical manner. The designer will have to advise the
techniques of sorting and retrieving data from these files. The system uses
database, which is described as follows.
1. Table Name :author
2.Table Name :category
-
8/3/2019 Bookworm 2
44/48
44
3.Table Name :book
4.Table Name :login
5.Table Name :publisher
-
8/3/2019 Bookworm 2
45/48
45
DATABASE SNAPSHOTS
Category Table :-
Author Table :-
Publisher Table :-
Book Table :-
-
8/3/2019 Bookworm 2
46/48
-
8/3/2019 Bookworm 2
47/48
47
CONCLUSION
The main objective of this package is to assist an online Book Management Systemor Search Engine in dealing with the customer of the Books for Ordering and
Searching of the books with just a very less span of time..The chance of making
mistake is negligible as with every transaction the database is updated.
It also reduces service time.
With this Website the workload is reduced and hence the efficiency is increased
due to the User Friendliness of this website, the chance of error is Negligible. The
accuracy of this Website is optimum.
We have completed the study about ASP.NET and project on BOOKWORM.
Now we conclude that:
ASP.NET is more beneficial then Asp not only because it supports many
languages one need not to study a particular language to work on this , but also
the coding part is very limited.
ASP.NET 3.5 framework is highly secured platform for building and
modifying website and other web application.
-
8/3/2019 Bookworm 2
48/48
BIBLIOGRAPHY
[1 ] ASP.NET in 21 days
[2] Programming in C#
[3] Essential Asp.Net with examples in C#
[4] Professional ASP.NET 3.5
[5] A First Look At Sql Server 2005