project report123
TRANSCRIPT
INDEX
TABLE OF CONTENTS Page No.
1. Acknowledgement 1
2. Certificate 2
3. Objectives and scope of the Project. 3
4. Theoretical Background 4
5. Definition of the problem. 5
6. System Analysis & Design. 6
7. User Requirements 14
8. System Planning 17
9. Methodology adopted/System Implementation 19
10. Hardware and Software Requirements. 31
11. System Maintenance & Evaluation. 34
12. Cost and benefit analysis. 36
13. Detailed DFD, Life cycle of project 40
14. Input Output Screens design 44
15. Methodology used for System Testing. 50
16. Test Report, Printout of the report, Printout of the code sheet 56
17. User/operational Manual including security aspects, rights & Backup 68
18. ANNEXURE
a. About DOEACC Society Chandigarh 71
b. Data Dictionary & tables used in project 76
c. Bibliography 82
Acknowledgement
I take this opportunity to express my deepest gratitude to those who have
generously helped me in providing the valuable knowledge and expertise during my
project development process.
I am thankful to Mrs. Anju Janeja for her thorough guidance right from day
1st till the end of the training by giving me the required guidance and removing any
difficulties faced by me during the project.
I have tried my level best to see all aspects of the software used, i.e.
(Asp.net framework 3.5).The illustrations of screens are accurate, clear, concise and
lucid. Throughout the preparation of this documentation, the guiding objective has been
to make it more useful for the readers
I thank them whole-heartedly for their expert guidance, Valuable suggestions,
encouragement, and supervision. My sincere thanks also go to my parents and my
friends for their ever- following love, care and timely guidance and encouragement.
Name: - Sunil Sharma
Reg, No. 652179
1
DOEACC Society, Chandigarh Centre(A Unit of DOEACC Society)
S.C.O 114-116, Sector 17B, Chandigarh.
CERTIFICATE
This is certified that the project entitled “Education Portal” is submitted in partial fulfillment of the requirement of “A-LEVEL” in DOEACC CENTRE, CHANDIGARH. Sunil Sharma, a bonafide student of the DOEACC Society, Chandigarh Centre under my supervision, has done this work.
This work is fit for consideration of the said diploma (A-LEVEL) to him.
Project Guide
2
Objectives & Scope of the Project
The website Project is developed to make ONLINE information available to
all the students and Faculties of a College. The current project provides Necessary
information to the users, students or administrative staff. It has information about
the college, facilities available there, faculty details, different courses available in
college, latest news about the college etc. Registered students can easily download
their syllabus also can find their friends or can play quiz contests. Anonymous users
can see the courses with their fees, find the job opportunities available in the college
and can be member of website. Faculty members can find different information like
information of students, course etc.
After thoroughly analyzing the existing system the following objectives have
been set:
● Provide details of college.
● Student can download their syllabus easily.
● Student can play online Quiz contest.
● Students can see the news about college, exams.
● Information about holidays.
● Adequate security of the database
● Admin will see the information of students.
● Anonymous users can register on this site as a member of the site.
● Students can find their friends who are member of this college.
● Information about Courses and course fees.
● Users can see job opportunities.
3
Scope
This project will help students, academic staff and other concerned persons to
easily get their queries .With online registration they can easily take admission.
In future further modules can be attached with existing code without modifying or
changing existing platforms
This website is simple and easy to use and understandable for the users. This is a
secure website from the prospective of security and privacy. All teachers can maintain
their own profile separately. The benefits of the proposed system must also be
evaluated. Benefits may be categorized as tangible or intangible.
Tangible benefits which are measured in money terms consist of the saving of
- Time and. certain operating costs.
Intangible benefits are more difficult to estimate and justify. They are often
impossible to give a money value to.
These may include
-Satisfaction of the professionals and students Efficiency.
4
Theoretical Background
Everybody wants to be on the top, Information plays very crucial role. As fast as
information is accessed and processed, it can give good results. Today internet is the
fast way of transferring data and information over wide area, hence I have used internet
as a way for exchanging information.
Computerized system helps to fulfill these goals. Computerization of the official works
will help in doing lot of manual work quickly. It will help in easy storage and access of all
information, in short period of time.
5
Definition of Problem
Existing System:
In existing system there was no benefit for students to online register,
in previous system students have to fill the forms to get their name in merit list
after that selected students have to visit college again to get admission. They
have to align in long quae to register them; it’s very slow process which takes
many days and wastage of time. Existing system had so many problems and is
static method.
PROPOSED SYSTEM:
The proposed system handles all the faults of the existing system. In the
proposed system everything is done dynamically. Students can get admission fast on
the bases of online registration. They will download their syllabus from the website.
Student and professional have also judged them self giving online test for our website. It
will helpful for the job seekers because now they will see the job opportunity in our
college also. Proposed system is very easy to handle for administration.
CONCLUSION:
From the initial study we concluded that the students and the teachers were facing
various kinds of problems to get information and updating. So the proposed system is
helpful in solving their problems.
6
System Analysis and Design
INTRODUCTION:
System analysis is the process of studying the business processors and
procedures, generally referred to as business systems, to see how they can operate and
whether improvement is needed.
This may involve examining data movement and storage, machines and technology used
in the system, programs that control the machines, people providing inputs, doing the
processing and receiving the outputs.
SOFTWARE DEVELOPMENT LIFE CYCLE
The first step in the Software Development Life Cycle (SDLC) is the preliminary
investigation to determine the feasibility of the system. The purpose of the preliminary
investigation is to evaluate project requests. It is not a design study nor does it include the
collection of details to describe the business system in all aspect. Rather it is the
collection of the information that helps committee members to evaluate the merits of the
project request and make an informed judgment about the feasibility of the proposed
project.
FEASIBILILTY ANALYSIS
Feasibility study is done so that an ill-conceived system is recognized early in
definition phase. During system engineering, however, we concentrate our attention
on four primary areas of interest. This phase is really important as before starting with
the real work of building the system it was very important to find out whether the idea
thought is possible or not.
Economic Feasibility: An evaluation of development cost weighted against the
ultimate income or benefit derived from the developed system.
Technical Feasibility: A study of function, performance and constraints that may
affect the ability to achieve an acceptable system.
Operational Feasibility: A study about the operational aspects of the system.
7
ECONOMIC ANALYSIS
Among the most important information contained in feasibility study is Cost
Benefit Analysis and assessment of the economic justification for a computer based
system project. Cost Benefit Analysis delineates costs for the project development
and weighs them against tangible and intangible benefits of a system. Cost Benefits
Analysis is complicated by the criteria that vary with the characteristics of the system
to be developed, the relative size of the project and the expected return on
investment desired as part of company’s strategic plan. In addition, many benefits
derived from a computer-based system are intangible (e.g. better design quality
through iterative optimization, increased customer satisfaction through programmable
control etc.)As this is an in-house project for the company, to be used for its own
convenience and also it is not that big a project. So neither it requires a huge amount
of money nor any costly tools or infrastructure need to be set up for it.
TECHNICAL ANALYSIS
During technical analysis, the technical merits of the system are studied and at
the same time collecting additional information about performance, reliability,
maintainability and predictability.
Technical analysis begins with an assessment of the technical viability of the
proposed system.
What technologies are required to accomplished system function and
performance?
What new materials, methods, algorithms or processes are required and what is
their development risk?
How will these obtained from technical analysis form the basis for another go/no-
go decision on the test system? If the technical risk is severe, if models indicate
that the desired function cannot be achieved, if the pieces just won’t fit together
smoothly-it’s back to the drawing board.
As the software is very much economically feasible, then it is really important for it to be
technically sound. The software will be build among:
MS SQL SERVER as Back End
ASP.NET as Front End
8
INVESTIGATION PHASE
The investigation phase is also known as the fact-finding stage or the analysis of
the current system. This is a detailed study conducted with the purpose of wanting to
fully understand the existing system and to identify the basic information requirements.
Various techniques may be used in fact-finding and all fact obtained must be recorded.
A thorough investigation was done in every effected aspect when determining
whether the purposed system is feasible enough to be implemented.
The preliminary investigation should accomplish the following objectives.
Clarify and understand the project request.
Determine the size of the project.
Assess costs and benefits of alternative approaches.
Determine the technical and operational feasibility of alternative approaches.
As it was essential for us to find out more about the present system, we used the
following methods to gather the information: -
Conducting the investigation
The data that the analysts collect during preliminary investigations are gathered
through three primary methods:
Reviewing organization documents
Onsite observation
Conducting interviews
On-site observations
Another important technique to collect data is on-site observation. The purpose of
the on-site observation is to get as close as possible to the real system being studied.
During on-site observation, office environment can be seen, work load, method of work
and facilities provided by the organization to the users can be studied.
9
Conducting interviews
Interviews allows learning more about the nature of the project request and
reasons for submitting it. Interviews should provide details that further explain the project
and show whether assistance in merited economically, operationally and technically.
1. On site observation: - Necessary to see the way the system works first hand. It
brings out the actual picture of working system.
2 Document sampling: - These are all the documents that are used in the system.
They are necessary to check all the data that enters and leaves
the system.
3 Questionnaires: - These were conducted to get views of the other employees who are
currently employed in the system.
10
ANALYSIS OF THE INVESTIGATION
Strengths of the System
1. No complex equipment: - The equipment that is used is very simple and no special
skills have to be mastered to be able to operate the system.
Therefore no training is required for the employees.
2. Low cost: - There is little money spent in maintaining the present system
other than 0buying the necessary office equipment and the
ledgers.
CONSTRAINTS AND LIMITATIONS
The constraints and limitation within a system are the drawbacks that occur during
the implementation of the system. These limitations and constraints can crop up in
almost every system; the most important fact is to find a way to overcome these
problems.
Software design is the first of three technical activities – design, code generation,
and test that are required to build and verify the software. Each activity transforms
information in manner that ultimately results in validated computer software.
The design task produces a data design, an architectural design, an interface
design and component design.
The design of an information system produces the details that clearly describe how
a system will meet the requirements identified during system analysis. The system design
process is not a step by step adherence of clear procedures and guidelines. When I
started working on system design, I face different types of problems; many of these are
due to constraints imposed by the user or limitations of hardware and software available.
Sometimes it was quite difficult to enumerate that complexity of the problems and
solutions thereof since the variety of likely problems is so great and no solutions are
exactly similar however the following consideration I kept in mind during design phased.
11
SYSTEM DESIGN
INTRODUCTION :
System design is the process of developing specifications for a candidate system
that meet the criteria established in the system analysis. The plan of the project provides
a review of the different modules in which the project is divided. The modules are
designed and tested individually and then merged together to form an integrated project.
Major step in system design is the preparation of the input forms and the output reports
in a form applicable to the user. The main objective of the system design is to make
the system user friendly. System design involves various stages as: Data Entry
Data Correction
Data Deletion
Processing
Sorting and Indexing
Report Generation
System design is the creative act of invention, developing new inputs, a database,
offline files, procedures and output for processing business to meet an organization
objective. System design builds information gathered during the system analysis.
The characteristics associated with effective system operations are:
Accessibility
Decision Making Ability
Economy
Flexibility
Reliability
Simplicity
Success is a new system pivots on its acceptance or non-acceptance by the
organization.
12
Personnel :
If the operating system is convinced that the new system will not benefit them, it
appears one, and the system is in serious trouble. To overcome this resistance
participation by operating personal during all phases of the changeover is necessary
because they constitute the organization, which must use alive in with newly design
system. An effective system produces not only information at the lowest cost pertinent
and timely for making decision.
The different types of tables being used are:
tbclass
tbcat
tblogin
tbjob_opr
tbsession
tbsyllabus
tbnews
tbquiz
tbadm
tbcnt
tbst
tbct
tbadm
tbregn
tbtemp
tbmemtbl_coursedtl
tbcurse_fees
tbcourse_clg
Table Database
The various roles through which the data flows used in the project are:
1) Administrator(Principal)
2) Teachers
3) Students (Simple User)
13
DATABASE DESIGN:
The overall objective in the development of the database technology has been to
treat data as an organizational resource and as an integrated whole. Database
management system allows data to be protected and organize separately from other
resources. Database is an integrated collection of data. The most significant of data as
seen by the programs and data as stored on the direct storage access storage devices.
This is the difference between logical and physical data. The organization of data in the
database aims to achieve free major objectives:
Data Integration
Data Integrity
Data Independence
The databases are implemented using a DBMS package. Each particular DBMS
has unique characteristics and general techniques for Database Design.
The proposed Management Information System stores the information relevant
for processing in the Microsoft SQL Server Database. This MS SQL Server contains
tables; where each table is containing fields or column. A table also contains records
which is a set of fields. All records, in a table the same set of fields with different
information. Each table contains key fields that establish relationships in a MS SQL
server database and how the records are stored. There are primary key fields that
uniquely identify a record in a table. There are also fields that contain the primary key
from another table called foreign keys.
It is a known fact that the program cannot be written until the data are defined, so
the database must be defined. The starting point for this process is data dictionary. The
records data structures and elements to be stored in each database are identified and
extracted. Next the analyst codes the source statements library. Eventually, the
programmer will incorporate the source code into the various programs, thus assuring
consistency and simplifying the coding process. The databases have been designed in
such a way that there is no duplication of information and loss of information.
14
Design objectives:-
The primary objective of the design is to deliver the requirements as specified in
the feasibility report. These are the some of the objectives, which I kept in mind.
Practicality: The system is quite stable and can be operated by the people
with average intelligence.
Efficiency: I tried to involve accuracy, timeliness and comprehensiveness
of the system output.
Cost: It is desirable to aim for the system with a minimum cost subject to
the condition that it must satisfy the entire requirement.
Flexibility: I have tried that the system should be modifiable depending on
the changing needs of the user. Such modifications should entail extensive
reconstructing or recreation of software. It should also be portable to
different computer systems.
Security: This is very important aspect which I followed in this designing
phase and tried to covers the areas of hardware reliability, fallback
procedures, and physical security of data.
15
User Requirement Analysis
1. Functional Requirements:
1.1 The portal will ask for the details of the user to be entered, to know the category
user belongs to, he will be needed to enter his/her details then user name and
password will be allotted by the administrator after checking the details entered.
1.2 The administrator gives you username and password with the help of this you can
log in
1.3 The user can search articles, post article and other important information.
1.4 The user can also post your question & and see the reply of the other question.
1.5 The administrator of the system will be responsible to post the latest information
on the web page.
1.6 The concept of Master Pages and Content Pages is used.
1.7 User can also judge himself by giving online text.
16
2. Non-functional Requirements:
2.1. Portability:
The system will be designed to be portable across popular Windows OS.
2.2. Extensibility:
The system should be extensible to add universities and users for more expansion.
2.3. Re-Usability:
The system’s code could be reused to add further new features if need to be added in future.
2.4. Reliability and Availability:
System shall be able to deliver the required in reliable manner.
2.5. Software Upgradeability:
System is to be developed in phases, so it shall be easily upgradeable to include the new items in the database.
3. User Interface Requirements:
3.1 Log in screen:
Every user whether member, admin or any other will have to first log in to the site.
3.2 Home page:
After logging in, the users will be in their respective home pages.
17
SYSTEM SECURITY
System security is a vital aspect when it comes to developing a system. The
system should ensure the facility of preventing unauthorized personnel from accessing
the information and the data within the system. The system should provide total
protection for each user’s information so that the integrity of data is sustained and also
prevent hackers from hacking the system.
Proposed system ensures the security and the integrity of data. Providing a
password login system for each authorized users does this. For example the System
Administrator has access to all kinds of information.
By providing this facility information is properly managed and information is
protected. For example the system administrator’s day-to-day tasks are lessened and
easier because he doesn’t have to have a constant eye on the system and worry about
hackers hacking the system.
18
SOFTWARE REQUIREMENT SPECIFICATION
The software requirement specification is produced at the culmination of the
analysis task. The introduction to software requirements specification states the goals
and objectives of the software, describing it in the context of the computer based
system.
The Information Description provides a detailed description of the problem that
the software must solve. Information content, flow and structure are documented. A
description of each function required to solve the problem is presented in the Functional
Description. Validation criteria are probably the most important and ironically the most
often neglected section of the software requirement specification.
Software requirement specification can be used for different purpose. Here are the major
uses.
Statement of user needs:
A main purpose of the product specification is to define the need of the product’s
user. Sometimes, the specification may be a part of a contract sign between the
producer and the user. It could also form part of the user manuals. A user‘s needs are
sometimes not clearly understood by the developer. If this is the case, a careful analysis
– involving much interaction with the user should be devoted to reaching a clear
statement of requirements, in order to avoid possible misunderstandings.
Sometimes, at the beginning of a project, even the user has no clear idea of what
exactly the desired product is. Think for instance of user interface , a user with no
previous experience with computer products may not appreciate the difference between
, say menu driven interaction and a command line interface. Even an exact formation of
system functions and performance may be missing an initial description produced by an
inexperienced user.
19
System Planning
Knowledge of college’s management
Knowledge of college’s management helps the Professionals and the Students to fulfill
their needs. Online admission knowledge is a computerized, online solution to the
various problems faced by Students or may be or professionals wishing to Increase their
Knowledge Base, and regime in their respective field. There two type of user in the
online tutorial system one is the register user (Member, Admin) and another is the non-
register user (Students. Professionals)
.
What the register user have to do?
First of all the user will register themselves as members. As a member they can
place the information regarding them and also they can specify their particular field of
specialization or interest. Then our member of the site can post news. Administrator the
other register user has performed some important task. He can validate the member and
assign them their user name and password. He can add some new category and new
class with the help of dynamic class form and dynamic category from. He can post
question and their answer for online test. He can administrate the whole system as a
super user. He can also upload some files.
What the un-register have to do?
The un-register users are students and everyone who want to get admission
online. They can play online quiz and check their correct answers. They can view the
updates syllabus and download it from website. They can view the updated news about
college. They can get some knowledge about college. Main advantage of this website is
online admission.
20
Activity No.Activity Name
Caption Time (Hrs.)
0
0
5
350
4
300
3
200
1
50
2
100
6
On going
Analysis 50 Hrs.Designing 50 Hrs.
Coding 100 Hrs.
Testing 100 Hrs.Implementation 50 Hrs.
Maintenance
(PERT- CHART)
21
Methodology Adopted
Why .NET?
1. Interoperability between languages and execution environments
2. Uniformity in schema or formats for Data Exchange using XML, XSLT.
3. Extend or use existing code that is valid
4. Programming complexity of environment is reduced
The .NET Framework is…
1. A component model for the internet
2. The new approach to building large scale distributed systems for the Internet
3. Provides the capability to integrate multiple devices
4. Built around the tools and protocols (XML, WSDL, SOAP, HTTP) that are
becoming standard on the Internet
The .NET in ASP.NET stands for the .NET Framework, a set of objects and
blueprints from Microsoft for building applications. All applications developed under
the .NET Framework; including ASP.NET applications, have certain key features that
ensure compatibility, security, and stability.
Common Language Runtime (CLR) is an environment that manages the
execution of code. With the .NET Framework and CLR, we write code and compile it.
However, instead of compiling it into the computer understands, we compile it into a
language called Microsoft Intermediate Language (MSIL). When we compile to MSIL,
your application produce something called metadata. This is descriptive information
about your application. It tells what the application can do, where it belongs, and so on.
When you want to run your program, the CLR takes over and compile the code once
more into the computer’s native language. This way MSIL can go on any type of
computer. The CLR can speak many different computer languages and does all the
compiling for you. Once you compile your application, you can bring it to any other
computer. CLR also provides services such as error handling, security features,
versioning and deployment support, as well as cross-language integration. That means
22
we can choose any language we want to write our .NET applications, including
ASP.NET applications.
Fig: - .NET Framework Architecture
The .NET Framework Design Goals
1. Component Development for the Internet
2. "Cross-Language Development”
3. Inheritance, Debugging, Exception handling
4. Reliability and Security
5. Simple Development and Deployment
6. Device-agnostic
23
ASP.NET:
ASP.NET is a technology that allows us to build and control dynamic Web pages
easily. It also provides many enhancements to take advantage of new technology as we
can interact with databases, personalize Web pages for visitors, display page on mobile
devices (such as cell phones), and even build an entire e-commerce site from scratch.
Previously Internet works on request/response model that is an integral part of
client/server model. Although this is a marvelous way of communicate and distribute
information, it's rather simple and static. When the process is over, once client receives
the requesting page from the server the server has no idea what the client is doing
unless it makes another request.
There is another model for communicating between server and clients, known as
event-driven model.ASP.NET work on this model, it detects action and responds to them
i.e. the server waits around for something to happen on the client. Once it does, the
server takes action and performs some piece of functionality. Of course, a Web, server
cannot know what you are thinking, but it can respond to your actions. If you type some
text on Web page, the server responds to it. If you click an image, the server responds.
24
COMPARISON OF ASP AND ASP.NET:
Classic ASP was built on the top of the Windows operating system and IIS
(Internet Information Server). It was always a separate entity, and therefore its
functionality was limited. ASP.NET, on the other hand, is an integral part of the system
under the .NET Framework. It shares many 9f the same objects that traditional
applications would use and all .NET objects available for ASP. NET’s consumption.
Instead of being limited to six inherent objects in ASP, ASP.NET has a
plethora of useful components it can build form.
ASP also made it abundantly clear that client and server were two
separate entities, Whereas ASP. NET ties together the client and the server through
clever use of server-side and client-side code, all invisible to the developer.
ASP.NET code is compiled, whereas classic ASP used interpreted
scripting languages. Using compiled code means an automatic boost in performance
over ASP applications.
In classic ASP, nearly all of the code was executed in code render blocks
(that is, inside <%...%> tags). In ASP.NET, this type of code isn’t compiled and isn’t
recommended for frequent use. Instead, you use the code declaration blocks, which are
compiled and provide better performance.
25
Following are some of the significant new features of ASP.NET:
ASP.NET uses compiled code written in Common Language Runtime languages
such as Visual Basic and C#. Unlike previous versions of Active Server Pages,
this version does not use interpreted scripting languages such as VBScript.
ASP.NET pages are built out of server-side controls. Web server controls enable
you to represent and program against Hypertext Markup Language (HTML)
elements using an intuitive object model.
ASP.NET includes a new technology called Web Services. You can use Web
Services to access methods and properties and transfer database data across the
Internet.
ASP.NET is part of Microsoft's .NET Framework. You can access thousands
of .NET classes in your code that enable you to perform such wondrously diverse
tasks as generating images on-the-fly and saving an array to a file.
ASP.NET includes page and data caching mechanisms that enable you to easily
and dramatically improve the performance of your Web site.
26
DBMS (Data Base Management System)
SQL SERVER:
SQL Server is an SQL-compliant RDBMS. SQL-compliant means it use the ANSI
(American National Standard Institute) version of Structured Query Language or ‘SQL’.
Structured Query Language is a command that allow us to modify or retrieve information
from the database.
Client server means that SQL Server is designed to store data in the central
location (the server) and deliver it on demand to numerous other locations (the client).
SQL Server is also a Relational Database Management System (RDBMS).
FEATURES OF SQL SERVER 2000:
Information representation
Unique definition of rows
Systematic treatment of Null values
Guaranteed access
High level Update, Insert, and Delete
Retrieving information from the database.
Accepting query language statements.
Enforcing security specifications.
Enforcing data integrity specifications
Enforcing transaction consistency
Managing data sharing
Optimizing queries
Managing System catalogs
27
Enterprise Manager:
SQL Server Enterprise Manager is a graphical tool that allows easy configuration and
management of Microsoft SQL Server and SQL 2000 program group.
SQL Server Enterprise Manager can also be used to:
Manage logins, permission and users.
Create a database
Take back up of database and transaction logs.
Manage tables
Query Analyzer:
The SQL Server Query Analyzer allows us to create adhoc queries and run them
interactively. We may also execute Transact-SQL statements stored in text file and view
the result in result plane or result grid. The Query Analyzer also has a color-coded editor
to assist the user with checking of syntax. It also has context sensitive help.
Queries are processed in two steps:
Interpret - First the Queries are checked for syntax.
Execute - Then the processing take place.
28
System Implementation
INTRODUCTION:
Implementation is the stage in the project where the theoretical design is turned
into the working system and is giving confidence to the new system for the users i.e. will
work efficiently and effectively. It involves careful planning, investigation of the current
system and its constraints on implementation, design of method to achieve the change
over, an evaluation, of change over methods. A part from planning major task of
preparing the implementation is education of users. The more complex system is
implemented, the more involved will be the system analysis and design effort required
just for implementation. An implementation coordinating committee based on policies of
individual organization has been appointed. The implementation process begins with
preparing a plan for the implementation for the system. According to this plan, the
activities are to be carried out; discussions may regarding the equipment have to be
acquired to implement the new system.
Implementation is the final and important phase. The most critical stage is in
achieving a successful new system and in giving the users confidence that the new
system will work and be effective. The system can be implemented only after thorough
testing is done and if it found to working according to the specification. This method also
offers the greatest security since the old system can take over if the errors are found or
inability to handle certain types of transaction while using the new system.
At the beginning of the development phase a preliminary implementation plan is
created to schedule and manage the many different activities that must be integrated
into plan. The implementation plan is updated throughout the development phase,
culminating in a change over plan for the operation phase. The major elements of
implementation plan are test plan, training plan, equipment installation plan, and a
conversion plan.
29
There are three types of implementation:
o A manual System will be replaced into computerized system.
o An existing system will be replaced by a new Computer System.
o An existing application modifies and uses on same machine (Computer).
Successful implementation may not guarantee improvement in the organization using
the new system, but improper installation will prevent it. It has been observed that even
the best system cannot show good result if the analysts managing the implementation
do not attend to every important detail. This is an area where the systems analysts need
to work with utmost care.
IMPLEMENTATION TOOLS:
Training personnel
Conversion Procedures
Post-implementation review
Training of Personnel involved with system
Even well designed system can succeed or fail because of the way they are
operated and used. Therefore, the quality of training received by the personal involved
with the system in various capacities helps or hinders and may even prevent the
successful implementation of management information system.
Those who are directly or indirectly related with the system development work
must know in detail what must know in detail what their roles will be, how they can make
efficient use of the system and what the system will or will not do for them. Both system
operators and users need training.
30
System Operators Training
Running of the system successfully depend on the personnel working in the
Computer Centre. They are Responsible for providing the necessary support. Their
training must ensure that they are able to handle all possible operations, both routine
and extra-ordinary in nature.
If the system calls for the installation of new equipment, such as new computer
system, special terminals or different data entry machines, the operators training should
include such fundamentals as how to turn the equipment on and use it, how to power off
and a knowledge of what constitutes normal operations. The operators should also be
trained on different type of malfunctioning, how to recognize them and what steps should
also be taken whenever they arise.
User Training
User may be trained on use equipment, particularly in the case where, e.g. a
micro computer is in use and individual involved is both operator and user. In such
cases, user must be given training on how to operate and user. In such cases, user must
be given training on how to operator the system also. Questions that may be trivial to the
analyst, such as how to turn on a terminal, how to insert a diskette into a micro-computer
or when it is safe to turn off equipment without danger of data loss are significant
problems to new users who are not familiar.
In most of the cases user training deals with the operation of the system itself, with
proper attention given to data handling techniques. It is imperative that users be properly
trained in methods of entering transaction, editing data, formulating inquiries, deleting
and inserting of records. No training is complete without familiarizing users with simple
systems maintenance activities. Weakness in any aspect of training may lead of
awkward situation that creates user frustration and error.
Conversion Methods
A conversion is the process of changing from the old system to the new one. It
must be properly planned and executed. Four methods are common in use. They are
Parallel Systems, Direct Conversion, Pilot System and Phase In method. Each method
should be considered in the light of the opportunities that it offers and problems that it
may create. In general, system conversion should be accomplished in shortest possible
time. Long conversion periods create problems for all persons involved including both
analysts and users.
31
Parallel systems:
The most secure method of converting from an old to new system is to run both
systems in parallel. This method is safest one because it ensures that in case of any
problem in using new system, the organization can still fall back to the old system
without the loss of time and money.
The disadvantages of parallel systems approach are:
It doubles operating costs
The new system may not get fair trial.
Direct conversion:
This method converts from the old system to new system abruptly, sometimes
over a weekend or even overnight. The old system is used until a planned conversion
day, when it is replaced by the new system.
Pilot system:
Pilot approach is often preferred in the case of the new system which involves
new techniques or some drastic changes in organization performance. In this method, a
working version of the system is implemented in one part of the organization, such as a
single work area or department.
Phase –IN- method:
This method is used when it is not possible to install a new system throughout an
organization all at once. The conversion of files, training of personnel or arrival of
equipment may force the staging of the implementation over a period of time, ranging
from weeks to months.
32
CONCLUSION
The system has been developed for the given condition and is found working
effectively. The developed system is flexible and changes whenever can be made easy.
Using the facilities and functionalities of .Net, the software has been developed in a neat
and simple manner, thereby reducing the operators work.
The speed and accuracy are maintained in proper way. The user friendly nature
of this software developed in .Net framework is very easy to work with both for the higher
management as well as other employees with little knowledge of computer. The results
obtained were fully satisfactory from the user point of view.
The system was verified with valid as well as invalid data in each manner. the
system is run with an insight into the necessary modifications that may require in the
future. Hence the system can be maintained successfully without much network.
33
Details of Hardware and Software Used
.NET Framework System Requirements
To ensure adequate performance, .NET Framework has the following
minimum and recommended system requirements for client and server applications:
Operating System Requirements:
The .NET Framework is supported on the following platforms:
-----------------------------------------------------------------------------------------------------
Scenario Operating System
----------------------------------------------------------------------------------------------------
Client MS Windows 98
MS Windows 98 Second Edition
MS Windows Millennium Edition
MS Windows NT 4.0 Workstation with service pack
6.0a or later
MS Windows NT 4.0 Server with service pack 6.0a
or later
MS Windows 2000 Professional
MS Windows 2000 Server
MS Windows 2000 Advanced Server
MS Windows 2000 Datacenter Server
MS Windows XP Home Edition Professional
MS Windows Server 2003 Family
Note: On all these systems, MS Internet Explorer 5.01 or later and MS Windows
Installer 2.0 or later are also required.
34
Server MS Windows 2000 Professional
MS Windows 2000 Server with service pack 2.0
MS Windows 2000 Advanced Server with service
pack 2.0
MS Windows 2000 Datacenter Server with service
pack 2.0
MS Windows XP Professional
MS Windows Server 2003 Family
Additional Software Requirements:
To use additional features such as ASP.Net, COM+ services and SQL Server .NET
Data Provider, you will need the following additional software’s:
-----------------------------------------------------------------------------------------------------
Scenario Feature Required Software
----------------------------------------------------------------------------------------------------
Client SQL Server .Net Data MS Data Access Components
Provider (MDAC) 2.6 or later
Access to system management Windows Management
Instrumentation (WMI)
(installed with OS on
Windows 2000, Windows
Millennium Edition and
Windows XP)
COM+ Services Windows 2000 with service
Pack 2.0
Server SQL Server .Net Data MS Data Access Components
Provider (MDAC) 2.7
ASP.Net MS Internet Information
35
Services (IIS) 5.0
Hardware Requirements
-----------------------------------------------------------------------------------------------------
Scenario Processor RAM
Required Recommended Required Recommended
----------------------------------------------------------------------------------------------------
Client Pentium 500 MHz* Pentium 1 GHz 64 MB* 128 MB or higher
Server Pentium 667 MHz* Pentium 1 GHz 128 MB* 256 MB or higher
* Or the minimum required by the operating system, whichever is higher.
36
System Maintenance & Evaluation
MAINTAINENCE
Software system maintenance covers a wide range of activities, including correcting
coding and design errors, updating documentation and test data and upgrading user
support. It is the process of changing the system to maintain its ability to survive. The
system design can adopt any of the under given system maintenance strategies.
Corrective Maintenance
The design software can be maintained by corrective maintenance that is concerned with
fixing reported errors in the software. Coding errors are relatively cheap to fix as
compared to design errors and requirement errors. The requirement errors are more
expensive, as redesigning of the entire system is to fix them.
Adaptive Maintenance
The design software can be maintained by adaptive maintenance if case there is a need
to change the system environment such as a different hardware platform or for using it
with different operating system.
Predictive Maintenance
The design system can be maintained by predictive maintenance if there is need to
implement new functional requirements. They are generated due to the changing
requirements of the software customers as their organization or business changes.
Maintenance of the system follows the following steps
System Documentation
System documentation is a process that emphasizes on documentation the requirement,
design, plan, code implementation and testing of the system as whole.
In a product life cycle, there will be a number of documents like requirements
specification design, documents, user manuals, release documents etc. that will be
generated. The types of documentation that are covered under system documentation
also include training material, user manuals, operations manual, and release document.
The documentation will be reviewed and approved by concerned users of the
documentation. The purpose of the system documentation process is to develop and
maintain the documentation that will be used to install and operate the product. This
process also ensures that the documentation developed is synchronized with latest
product release.
37
Our product document typically consists of the following:
Deliverable (file name size etc.): It includes the code after making changes in the
original code.
Test Summary Report: It includes the result generated by executing the test cases
designed by us and the test cases given to us by the customer and transporter. List of all
the corresponding changes made in the existing code and reason why the changes are
necessary.
These documents not only ensures that the system is well designed and is fully
complaint with the needs of the user but also helps in further maintenance programmers
of the software system. A well-documented system helps the maintenance of the
software by providing the maintenance programmers and insight.
Evaluation part involves the detailed study of the purposed system and its working
and performance report or description. This evaluation report can help to update the
system more specific and efficient for the better performance and lees time requirements
to complete the process. The detailed study also helps to make data more accurate and
integrated also. The evaluation of purposed system measures the system performance
against the predefined requirements and help to review whether the system is meeting
expectations and requirements
POST IMPLEMENTATION REVIEW
After the system is implemented and conversion is complete, a review should be
conducted to determine whether the system is meeting expectations and where
improvements are needed. A post implementation review measures the systems
performance against predefined requirement. It determines how well the system
continues to meet the performance specifications.
38
Cost and Benefit Analysis:
The various costs evaluated include:
Equipment Costs.
This includes capital and leasing costs of
- Computer and peripherals.
- The initial systems supplies. (E.g. disks, tapes, etc.)
- Additional hardware.
- UPS and Voltage Regulators.
Development Costs.
- The purchasing of software. (Programming, DB and OS’s)
- 2Consulting work.
- System analysis and programming.
Installation Costs.
- Preparation of the computer room.
(E.g. wiring, air-conditioning, etc.)
- Accommodation
(e.g. new building or building alteration, Etc.)
Personal Costs.
- Staff training. (Assumption: we will be incurring the cost to train
the employees in the Proposed Hospital System)
- Staff recruitment or relocations.
- Staff salaries.
- Redundancy payments.
Operating Costs.
- Consumable (e.g.- tapes, disks, stationery)
- Accommodation costs.
- Power.
- Insurance.
- Telecommunications.
- Standby arrangements.
39
OPERATIONAL FEASIBILITY
A proposed system is beneficial only if it can be turned into an information system
that will meet the operational requirements of an organization. A system often fails if it
does not fit within existing operations and if users resist the change.
Important issues a systems developer must look into are:
Will the new system be used if implemented in an organization?
Are there major barriers to implementation or is proposed system
accepted without destructive resistance?
The whole purpose of computerizing the Placement System is to handle the work much
more accurately and efficiently with less time consumption. There will be additional work
to be completed, because now the students and the companies can update their
resumes and profiles online. Their database is maintained separately.
Compared to the semi-computerized system the chances of avoiding errors in a
computerized system is much higher because the user need not stress himself
unnecessarily resulting in recklessness. Unlike the semi-computerized system
There would be backup data for all the information concerning the daily transactions
occurred within the organization.
If we are considering the performance and response time for each task, it is very
much faster since there is less paper work to be completed. When entering data into the
system to relieve the user from additional work and typing incorrect data, the system
provides options such as combo boxes, check boxes, option buttons and etc. if the users
type in incorrect data they would be informed immediately about the error by the error
detection control.
Another important fact to be regarded is the security control, which is handled by
the system. Since data regarding each student and the company is confidential, security
is a key issue. Information falling into the wrong hands could jeopardize the entire
organization. Unlike in semi-computerized systems the proposed system offers adequate
control to protect the organization against fraud and embezzlement and guarantees the
accuracy and security of data and information. This is handled by the system providing
each department and individuals with separate login names and passwords.
40
The new system is user-friendlier, which enables the end-user to complete his/her
work efficiently and accurately with interest. After taking the above fact into consideration
we can state the operating of the proposed system within the organization is feasible.
In this phase of the feasibility study the following two main topics
Technical Performance Aspect
Acceptance within the organization
Technical performance aspect is explained in the technical feasibility report and there
is no new information is needed in this to explain it again, but as for the acceptance
within the organization the following points are important and those are explained
according to the topics
1. Whether the system provides right information to the right place.
In the current system, which is the semi, computerized system the information may
be lost in the process of sending from one place to another. This is mainly due to human
interaction in the process of the transferring information from one place to another.
2. Whether the new system affect the current users in the system
The new proposed system will affect the users in the following areas
Accuracy
Efficiency
Productivity
Robustness
Lesser time consuming
3. Skill and attitude
This system is developed according to the experience of the current employees and
the management structure, so for this system to function within the current employee
community. The employees do not need to have new skills other than the skills, which
are gained in the current system.
4. Job restructuring and training
For the new system to have an effect in the organization the employees should be
give a proper training in operating the software and computer systems. If the employee
does not have the minimal experience should be given the proper training
If the organization is reluctant to give a full training to the employees who require
the full knowledge organization can restructure the structure of the departments.
41
TECHNICAL FEASIBILITY
Based on the outline design of system requirements in terms of inputs, outputs,
files, procedures and staff, the technical issues raised during technical feasibility include:
Does the necessary technology exist to do what is proposed?
Does the proposed equipment have the technical capacity to hold
the data required to use in the new system?
Adequate responses provided by the proposed system?
Is the system flexible enough to facilitate expansion?
Is there any technical guarantee of accuracy, reliability, ease of
access and data security?
The system developer’s task is to view needed capabilities in light of currently
available technology. Since the existing system is semi-computerized it is clear to us that
there is no efficiency in the use of technology within the organization. The solution is the
implementing the new computerized system, which works hand in hand with high
technology.
A database has to be maintained in order to update and backup data whenever a
transaction occurs. To create databases we use SQL server.
After taking the above facts into consideration we can state that the new
proposed system is technically feasible.
42
Detailed DFD Lifecycle
DATA FLOW DIAGRAMS
It is a way of expressing system requirement in a graphical form; this leads to a
modular design. It is also known as bubble chart, has the purpose of clarifying system
requirements and identifying major transformations that will become program in system
design. So it is the starting point of the design phase that functionally decomposes the
requirement specifications down to the lowest level of details. A DFD consist of a series
of bubbles joined by lines. The bubbles represent data transformation and the lines
represent data flows in the system.
43
Member
Unregistered users
Job Opportunities Notice Board
Pla
ying
qui
z, F
ind
Fri
end,
Not
ice
boa
rd a
nd J
ob
oppo
rtun
itie
s
EDUCATION PORTALWEBSITE
RequestFor registration
Access Identifier
TeacherEdit and updates
Course detail
Quiz
Job opportunities, Notice Boar, Our Patrons
Admin Database Authentication
Access
Information
Context Diagram
44
DEFINITION
Diagram which shows the working of the College Management
45
WEBSITE
Request for Registration
TEACHERS
Register user
Unregistered
Registration
Registered User
Access Identification
Information
Access identifier
Record Update
ADMIN
Edit and updating
Information
Approval
Registered
JobOpportunities
Course & fees detail
College patron
JOBOpportunities
Jobupdates
Request for registration
Notice Board
News updates
Registration
Job Opportunities
Diagram which shows the working of the College Management
46
Un-Registered USER
Registration with the site
Administrator
Verifies and Assigns ID and Password
WEB SITE
News Eventson Notice
Board
Registered Users
Login Page
College Patrons
Un-Registered USER
Input /Output Screen Design
Screen no. 1: This is the home page of current website user will see the information about our college. And user will also some rules and regulation of college. User will see different types of links on home page. These links are:-1. Home2. Login3. Registration4. Course Detail5. Special Offers6. Placements7. Careers8. Membership9. Contact us
47
Screen No.2: This is Login Page. Users will login from this page with their ID. On this page users will see the extra buttons from Home Page. There are three buttons LOGIN, FROGET PASSWORD, and SIGNUP button. In this website there are three types of users ADMIN (PRINCIPAL), TEACHERS, STUDENTS/MEMBERS. In this website role base security is implemented for different users. STUDENTS/MEMBERS cannot see the login detail of teachers. And teachers cannot see the Login detail of principal.Forget password button is used for recover the password and sign up button is used for create the new account for students or members.
48
Screen no 3: This page is used for downloading. But this page is under security only students or members of our website can download their syllabus from this page.
49
Screen no.4: This screen used for online quiz contest and gives online test and checks their correct answer also.
50
Screen no. 5:- On this page user can see the detail of Job opportunity in college. This page will open from careers link button. Only valid records will show on this page. Valid records means in between the date which will be seen on this page. This page is dynamic. Admin will update this page according to the time of vacancies in college.
51
Screen no 6: This is online registration page. Students will take online registration with the help of this registration page.
52
Screen no.7: If students forget their password they can recover their password by giving the answer of following question…
53
Screen no.8: Users can also see the previous patrons of college with the help of this page.
54
METHODOLOGY USED FOR
TESTING
INTRODUCTION:
The purpose of system testing is to identify and correct errors in the candidate
system. Testing is and important element of software quality assurance ad represents
the ultimate review of specification, design and coding. The increasing visibility of the
software as a system element and the cost associated with a software failure are
motivated forces for well planned, through testing
System testing was conducted in order to detect errors and for comparing then
the final system with the requirement specification reports, i.e. whether the system
meets requirements. During testing the software was executed with the set of test cases
and the output of programs for the test cases was evaluated to determine if the program
is performing as it was expected to.
Testing presents an interesting challenge for the software engineers attempt to
build software from an abstract concept to an acceptable implementation. In testing
engineer create a series of test cases that occurs when errors are uncovered. Testing is
the process of executing a program for finding errors. A good test is one that has the
high probability of finding an uncovered error. A successful error is one that uncovers
undiscovered errors.
The term error is used to refer the difference between actual output of the
software and the current output. Fault is a condition that causes the software to fail to
perform its required function. Software reliability is defined as a required function.
Software reliability is defined as the probability that the software will not undergoes
failures for a specified times under specified condition. Failure is the inability of a system
or a component to perform a required function according to its specification. Different
levels of testing were employed for software to make it error free, fault free and reliable.
55
System Testing:
Then system testing was conducted. Here the entire software system was tested.
The reference document used for this process was requirement document and the goal
was to see if the software meets its requirements.
System testing includes the thorough testing of the product. System testing is
actually a series of different tests whose primary purpose is to fully exercise the
computer based system. The tests are recovery testing: this checks the recovery of the
system when failure occurs. This is to ensure that there are recovery procedures for
error occurrences.
System testing involves unit testing, integration testing, acceptance testing.
Careful planning and scheduling are required to ensure that modules will be available for
integration into the evolving software product when needed. A test plan has the following
steps:
Prepare test plan
Specify conditions for user acceptance testing
Prepare test data for program testing
Prepare test data for transaction path testing
Plan user testing
Compile/Assemble program
Prepare job performance aids
Prepare operational documents
56
Objectives of testing
First of all objectives should be clear.
Testing as a process of executing a program with the intent of finding errors.
To perform testing, test cases are designed. A test case is a particular made up of
artificial situation upon which a program is exposed so as to find errors. So a good
test case is one that finds undiscovered errors.
If testing is done properly, it uncovers errors and after fixing those errors we have
software that is being developed according to specifications.
The above objective implies a dramatic change in viewpoint .The move counter to the
commonly held view than a successful test is one in which no errors are found. In fact,
our objective is to design tests that a systematically uncover different classes of errors
and do so with a minimum amount of time and effort.
Testing Methods
White Box Testing
White box testing of software is predicted on close examination of procedural
details. This test is providing cases that exercise specific sets of conditions and/or
loop tests logical paths through the software. White box testing, sometime called
glass box testing is a test case design method that uses the control structure of
the procedural design to derive test cases.
Black Box Testing
Black Box testing is carried out to check the functionality of the various
modules. Although they are designed to uncover error, black box testing use to
demonstrate that software functions are optional, that input is corrected accepted
and output is corrected produced and that the integrity of the external information
is maintained. A black box test examines some fundamental aspects of the system
with little regard for the internal logical structure of the software. Black box testing
focuses on the functional requirements of the software.
57
CLIENT NEEDS ACCEPTANCE TESTING
REQUIREMENTS SYSTEM TESTING
DESIGN INTEGRATION TESTING
CODE UNIT TESTING
Levels of Testing
A Strategy for software testing integrates software test case designs methods in
well-planned series of steps that results in the successful construction software. An
important software testing planned in advance and conducted systematically.
Verification is performed on the output of each phase, but some faults are likely to
remain undetected by these methods. These faults will be eventually reflected in the
code. Testing is usually relied on to detect these faults, in addition to the faults
introduced during the coding phase it self. Due to this, different levels of testing are
used in the testing process; each level of testing aims to test different aspects of
the system.
The basic levels of testing are
Unit testing
Integration testing
System testing
System acceptances
58
Level of Testing
The basic levels are unit testing, integration testing, and system & acceptance
testing. These different levels of testing attempt to detect different types of faults. The
relation of the faults introduced in different phases, and the different levels of testing are
shown in above figures.
Unit Testing: This is the first level of testing. In this, different modules are
tested against the specifications produced during design for the modules. Unit testing is
essential for verification of the code produced during the coding phase, and hence the
goal is to test the internal logic of the modules. Due to its close association with
coding, the coding phase is frequently called "coding & unit testing". As the focus
of this testing level is on testing the code, structural testing is best suited for this level.
In fact, as structural testing is not very suitable for large programs, it is used mostly at
the unit testing level.
Structural testing: It is an approach to testing where the tests are derived from
knowledge of the software's structure and implementation this approach is can analyze
the code and use knowledge about the structure of a component to derive test data.
The analysis of the code can be used to find how many test cases are needed to
guarantee that all of the statements in the program or component are executed at lust
once during the testing process.
Integration Testing:
Integration Testing is the next level of testing. In this, many unit-tested modules
are combined into subsystems, which are then tested. The goal here is to see if the
modules can be integrated properly. Hence, the emphasis is on testing interfaces
between modules. This testing activity can be considered testing the design. Once a
59
system has been completely integrated it is possible to test the system for emergent
properties such as performance and reliability.
Performance tests have to be designed to ensure that the system can process its
intended load. This usually involves planning a series of tests where the load is
steadily increased until the system performance becomes unacceptable. This type of
testing is called Stress testing.
System and Acceptance Testing:
The next levels are system testing & acceptance testing. Here the entire
software system is tested. The reference document for this purpose is the
requirements document and the goal is to see if the software meets its
requirements. This is essentially a validation exercise, and in many situations it is the
only validation activity. Acceptance testing is sometimes performed with realistic data of
the client to determine that the software is working satisfactorily. Testing here focuses on
the external behavior of the system; the internal logic of the program is not emphasized.
Consequently, mostly functional testing is performed at these levels.
Testing of Forms:
Forms are the interface between the user and database system. Testing of forms
was extensive task. All data entry and query formats are designed using forms. Forms
were tested to ensure that they are performing the tasks well they are designed for and
correction and modifications were made found to be necessary. System testing is
designed to uncover weaknesses that were not found in the earlier tests. This includes
forced system failure and its users in the operational environment will implement
validation of the total system as it. The total system is tested for recovery and fallback
after various major failures to ensure that data are lost during the emergency. All this is
done with the old system still in operation. After a successful testing of the individual
programs and forms, the whole system was through a series of' test to ensure the proper
working of the system as a whole. The system as a whole unit put to the all-possible inputs.
The consistency and validity is then checked by the outputs.
60
Test objectives
Testing is a process of execution a program with the intent of finding error.
A good test case is one that has a high portability of finding an undiscovered
error.
A successful test is one that uncovers an as-yet-discovered error.
Testing principles
All tests should be traceable to customer requirements.
Test should be planned long before testing begins.
Testing should begin "in small" and progress towards testing "in the large”.
To be most effective, an independent third party should conduct testing.
Test Plan
The first step in the System Testing is to prepare a plan that will test all aspects
of the system in a way that promotes its credibility among potential users. There is a
psychology in testing: -
Programmers usually do a better job in unit testing because they are expected
to document and report on the method and extent of their testing.
Programmers are involved when they become aware of the user problems and
expectations.
61
Printout of Reports
This report is used for show the data of registered students. Students can take the print out of their registration detail. And they will take this printout with themselves when they will come for admission.
62
Printout of Coding sheet
CODE FOR LOGIN PAGE
using System;using System.Collections;using System.Configuration;using System.Data;using System.Linq;using System.Web;using System.Web.Security;using System.Web.UI;using System.Web.UI.HtmlControls;using System.Web.UI.WebControls;using System.Web.UI.WebControls.WebParts;using System.Xml.Linq;using System.Data.SqlClient;
public partial class login : System.Web.UI.Page{ protected void Page_Load(object sender, EventArgs e) {
Application["login_id"] = 0; }
protected void Button1_Click(object sender, EventArgs e) { SqlConnection con = new SqlConnection(); con.ConnectionString = ConfigurationManager.ConnectionStrings["cn"].ConnectionString; SqlCommand cmd = new SqlCommand(); cmd.CommandText = "Select * from tblogin where email=@email and pwd=@pwd"; cmd.Parameters.Add("@email", SqlDbType.VarChar).Value = TextBox1.Text; cmd.Parameters.Add("@pwd", SqlDbType.VarChar).Value = TextBox2.Text; cmd.Connection = con; con.Open(); SqlDataReader dr = cmd.ExecuteReader(); if (dr.HasRows) { dr.Read(); FormsAuthenticationTicket tk = new FormsAuthenticationTicket(1, TextBox1.Text, DateTime.Now, DateTime.Now.AddHours(1), false, dr[3].ToString(), FormsAuthentication.FormsCookiePath); string st = FormsAuthentication.Encrypt(tk); HttpCookie ck = new HttpCookie(FormsAuthentication.FormsCookieName, st); Response.Cookies.Add(ck); string ur; ur = dr["urole"].ToString(); Application["login_id"] = TextBox1.Text; Application["user_id"] = dr["user_id"].ToString();
63
if (ur == "Principal") { Response.Redirect("Admin_login.aspx");
} else if (ur == "Teacher") { Response.Redirect("teacherlogin.aspx");
} else { Response.Redirect("studentlogin.aspx");
} } else { Label3.Text = "Wrong Username Or Password"; }
Label3.Visible = true;
}
protected void Button2_Click(object sender, EventArgs e) { Response.Redirect("registration.aspx"); }}
64
For registrestion page
using System;using System.Collections;using System.Configuration;using System.Data;using System.Web;using System.Web.Security;using System.Web.UI;using System.Web.UI.HtmlControls;using System.Web.UI.WebControls;using System.Web.UI.WebControls.WebParts;using System.Data.SqlClient;
public partial class regn : System.Web.UI.Page{ protected void Page_Load(object sender, EventArgs e) { if (Page.IsPostBack == false) { drop1(); drop2(); sesion_drop();
}
}
public void drop2() { SqlDataAdapter adp = new SqlDataAdapter("select * from tbcat", ConfigurationManager.ConnectionStrings["cn"].ConnectionString); DataSet ds = new DataSet(); adp.Fill(ds); DropDownList2.DataSource = ds; DropDownList2.DataValueField = "catid"; DropDownList2.DataTextField = "catnm"; DropDownList2.DataBind();
}
protected void Button1_Click(object sender, EventArgs e) {
SqlConnection con = new SqlConnection(); con.ConnectionString = ConfigurationManager.ConnectionStrings["cn"].ConnectionString; SqlCommand cmd = new SqlCommand(); cmd.CommandType = CommandType.StoredProcedure; cmd.CommandText = "regnins"; cmd.Connection = con; if (con.State == ConnectionState.Closed) { con.Open(); }
65
cmd.Parameters.Add("@course_id",SqlDbType.Int).Value=Convert.ToInt32(cls.SelectedValue);
cmd.Parameters.Add("@catagory", SqlDbType.VarChar, 10).Value = Convert.ToString(DropDownList2.SelectedItem.Text); cmd.Parameters.Add("@lastcourse", SqlDbType.VarChar, 10).Value = Convert.ToString(ltExmPs.SelectedItem.Text); cmd.Parameters.Add("@lastcollege", SqlDbType.VarChar, 30).Value =Convert.ToString(ltcllg.Text); cmd.Parameters.Add("@session", SqlDbType.Int).Value = Convert.ToInt32(session.SelectedValue);
cmd.Parameters.Add("@lastuniversity", SqlDbType.VarChar, 20).Value = Convert.ToString(Uni_nm.Text); cmd.Parameters.Add("@university_regn", SqlDbType.Int).Value = Convert.ToInt32(uregn.Text); cmd.Parameters.Add("@stu_nm", SqlDbType.VarChar, 20).Value = Convert.ToString(stnm.Text); cmd.Parameters.Add("@father_nm", SqlDbType.VarChar, 20).Value = Convert.ToString(fnm.Text); cmd.Parameters.Add("@mother_nm", SqlDbType.VarChar, 20).Value = Convert.ToString(mnm.Text); cmd.Parameters.Add("@address", SqlDbType.VarChar, 50).Value =Convert.ToString(add.Text); cmd.Parameters.Add("@gender", SqlDbType.VarChar, 10).Value = Convert.ToString(RadioButtonList1.SelectedValue); cmd.Parameters.Add("@mob_no", SqlDbType.NVarChar,10).Value = Convert.ToString(mob.Text); cmd.Parameters.Add("@dob", SqlDbType.VarChar,20).Value = Convert.ToString((dd.SelectedValue) + " / " + Convert.ToString(mm.SelectedValue) + " / " + Convert.ToString(yy.SelectedValue)); cmd.Parameters.Add("@email_id", SqlDbType.VarChar, 30).Value = Convert.ToString(eid.Text); cmd.Parameters.Add("@blood_group", SqlDbType.VarChar, 10).Value = Convert.ToString(DropDownList1.SelectedItem.Text);
cmd.ExecuteNonQuery();
SqlCommand cmd2 = new SqlCommand(); cmd2.Connection = con; cmd2.CommandText = "select max(stu_id) from tbregn"; SqlDataReader dr = cmd2.ExecuteReader(); int stu_id=0; if (dr.HasRows == true) { dr.Read(); //dr["admid"].ToString(); stu_id = Convert.ToInt32(dr[0]);
} cmd2.Dispose(); dr.Dispose();
for (int i = 0; i <= GridView1.Rows.Count - 1; i++) { SqlCommand cmd1 = new SqlCommand(); cmd1.CommandType = CommandType.StoredProcedure; cmd1.CommandText = "course_ins"; cmd1.Connection = con;
66
cmd1.Parameters.AddWithValue("@stu_id",stu_id);
Label lbl_course = (Label)(GridView1.Rows[i].FindControl("course")); cmd1.Parameters.AddWithValue("@course_name", Convert.ToString(lbl_course.Text)); TextBox txt_year=(TextBox)(GridView1.Rows[i].FindControl("txt_year")); cmd1.Parameters.AddWithValue("@course_year", Convert.ToString(txt_year.Text)); TextBox roll_no = (TextBox)(GridView1.Rows[i].FindControl("txt_rollno")); cmd1.Parameters.AddWithValue("@roll_no", Convert.ToString(roll_no.Text)); TextBox obt_mrks = (TextBox)(GridView1.Rows[i].FindControl("txt_objmrks")); cmd1.Parameters.Add("@obt_mrks", SqlDbType.Int).Value = Convert.ToInt32(obt_mrks.Text); TextBox txt_Per = (TextBox)(GridView1.Rows[i].FindControl("txt_percentage")); cmd1.Parameters.Add("@percentage", SqlDbType.Int).Value = Convert.ToInt32(txt_Per.Text); TextBox uni_nm = (TextBox)(GridView1.Rows[i].FindControl("txt_univ")); cmd1.Parameters.AddWithValue("@University", Convert.ToString(uni_nm.Text)); TextBox subject = (TextBox)(GridView1.Rows[i].FindControl("txt_subject")); cmd1.Parameters.AddWithValue("@subject", Convert.ToString(subject.Text));
cmd1.ExecuteNonQuery(); cmd1.Dispose(); } cmd.Dispose(); con.Close();
Response.Redirect("print.aspx?stu_id=" + stu_id); } public void drop1() {
SqlDataAdapter adp = new SqlDataAdapter("select * from tbcls where clsid <> 1", ConfigurationManager.ConnectionStrings["cn"].ConnectionString);
DataSet ds = new DataSet(); adp.Fill(ds); cls.DataSource = ds; cls.DataTextField = "clsnm"; cls.DataValueField = "clsid"; cls.DataBind();
}
67
public void gridview() { SqlDataAdapter adp = new SqlDataAdapter("select * from tbcls where clsid<@course_Id", ConfigurationManager.ConnectionStrings["cn"].ConnectionString); adp.SelectCommand.Parameters.Add("@course_Id", SqlDbType.Int).Value = Convert.ToInt32 (cls.SelectedValue); DataSet ds = new DataSet(); adp.Fill(ds); GridView1.DataSource = ds; GridView1.DataBind(); } protected void cls_SelectedIndexChanged1(object sender, EventArgs e) {
int clsitm = Convert.ToInt32(cls.SelectedValue); gridview();
}
protected void RadioButtonList1_SelectedIndexChanged(object sender, EventArgs e) {
}
public void sesion_drop() { SqlDataAdapter adp = new SqlDataAdapter("select * from tbsession", ConfigurationManager.ConnectionStrings["cn"].ConnectionString); DataSet ds = new DataSet(); adp.Fill(ds); session.DataSource = ds; session.DataTextField = "session"; session.DataValueField = "session_id"; session.DataBind(); }
}
68
For Quiz Contest
using System;using System.Collections;using System.Configuration;using System.Data;using System.Linq;using System.Web;using System.Web.Security;using System.Web.UI;using System.Web.UI.HtmlControls;using System.Web.UI.WebControls;using System.Web.UI.WebControls.WebParts;using System.Xml.Linq;using System.Data.SqlClient;
public partial class quzcnt : System.Web.UI.Page{
static string ans, ans1; static int c = 0; static int i = 1;
protected void Page_Load(object sender, EventArgs e) { if (Page.IsPostBack == false) {
prev_result(); drop1(); Label4.Text = "0"; tl_ques.Text = "0";
} login_id.Text = Convert.ToString(Application["login_id"]); }
public void prev_result() { SqlConnection con = new SqlConnection(); con.ConnectionString = ConfigurationManager.ConnectionStrings["cn"].ConnectionString;
if (con.State == ConnectionState.Closed) { con.Open(); } SqlCommand cmd = new SqlCommand(); cmd.Connection = con;
cmd.CommandText = "select result from tbquiz_result where quizid=(select max(quizid) from tbquiz_result where memid=@memid)"; cmd.Parameters.Add("@memid", SqlDbType.Int).Value = Convert.ToInt32(Application["user_id"]); SqlDataReader rdr = cmd.ExecuteReader(); if (rdr.HasRows == true) { rdr.Read();
69
prev_res.Text = " Your Previous score : " + rdr["result"].ToString();
} rdr.Dispose(); con.Close(); }
public DataSet getds() {
SqlDataAdapter adp = new SqlDataAdapter("select quesno from tbquiz where catid=@catid", ConfigurationManager.ConnectionStrings["cn"].ConnectionString); adp.SelectCommand.Parameters.Add("@catid", SqlDbType.Int).Value = Convert.ToInt32(ddl_catagory.SelectedValue); DataSet ds = new DataSet(); adp.Fill(ds); return ds; }
protected void start_Click(object sender, EventArgs e) { SqlConnection con = new SqlConnection(); con.ConnectionString = ConfigurationManager.ConnectionStrings["cn"].ConnectionString; con.Open();
DataSet ds = getds();
SqlCommand cmd = new SqlCommand(); cmd.Connection = con; cmd.CommandText = "select * from tbquiz where quesno=@quesno"; cmd.Parameters.Add("@catid", SqlDbType.Int).Value = Convert.ToInt32(ddl_catagory.SelectedValue); cmd.Parameters.Add("@quesno", SqlDbType.Int).Value = Convert.ToInt32(ds.Tables[0].Rows[Convert.ToInt32(tl_ques.Text)][0]);
SqlDataReader rdr = cmd.ExecuteReader(); if (rdr.HasRows == true) { rdr.Read(); Label1.Text = "Q:-" + rdr["ques"].ToString(); RadioButtonList1.Items.Add(rdr["a"].ToString()); RadioButtonList1.Items.Add(rdr["b"].ToString()); RadioButtonList1.Items.Add(rdr["c"].ToString()); RadioButtonList1.Items.Add(rdr["d"].ToString());
Label3.Text = Convert.ToString(rdr["ans"]);
} rdr.Dispose(); con.Close();
Label1.Visible = true; RadioButtonList1.Visible = true; chk.Visible = true;
70
ddl_catagory.Visible = false; start.Visible = false; Label6.Visible = false;
}
public void drop1() { SqlDataAdapter adp = new SqlDataAdapter("select * from tbquiz_catagory", ConfigurationManager.ConnectionStrings["cn"].ConnectionString); DataSet ds = new DataSet(); adp.Fill(ds); ddl_catagory.DataSource = ds; ddl_catagory.DataValueField = "catid"; ddl_catagory.DataTextField = "cat_name"; ddl_catagory.DataBind(); } protected void chk_Click(object sender, EventArgs e) {
RadioButtonList1.Enabled = false; Label3.Visible = false; int cnt = Convert.ToInt32(tl_ques.Text); tl_ques.Text = Convert.ToString(cnt + 1);
Button4.Visible = true;
if (RadioButtonList1.Items[0].Selected == true) ans = "a"; else if (RadioButtonList1.Items[1].Selected == true) ans = "b"; else if (RadioButtonList1.Items[2].Selected == true) ans = "c"; else if (RadioButtonList1.Items[3].Selected == true) ans = "d";
Label2.Visible = true;
if (Label3.Text == ans) {
Label2.Text = "Correct Answer";
int count = Convert.ToInt32(Label4.Text); Label4.Text = Convert.ToString(count + 1);
} else Label2.Text = "Wrong Answer";
} protected void Button4_Click(object sender, EventArgs e) { DataSet ds = getds(); int lenth; lenth = ds.Tables[0].Rows.Count; int len = lenth - 1;
71
Button4.Visible = false; Label2.Visible = false; RadioButtonList1.Items.Clear(); RadioButtonList1.Enabled = true; i++; Label2.Visible = false; SqlConnection con = new SqlConnection(); con.ConnectionString = ConfigurationManager.ConnectionStrings["cn"].ConnectionString; con.Open();
int tl = 0; tl = Convert.ToInt32(tl_ques.Text);
if (tl <= len) { SqlCommand cmd = new SqlCommand(); cmd.Connection = con; cmd.CommandText = "select * from tbquiz where quesno=@quesno ";
cmd.Parameters.Add("quesno", SqlDbType.Int).Value = Convert.ToInt32(ds.Tables[0].Rows[Convert.ToInt32(tl_ques.Text)][0]);
SqlDataReader rdr = cmd.ExecuteReader(); if (rdr.HasRows == true) { rdr.Read(); Label1.Text = "Q:-" + rdr["ques"].ToString(); RadioButtonList1.Items.Add(rdr["a"].ToString()); RadioButtonList1.Items.Add(rdr["b"].ToString()); RadioButtonList1.Items.Add(rdr["c"].ToString()); RadioButtonList1.Items.Add(rdr["d"].ToString()); Label3.Text = Convert.ToString(rdr["ans"]); } rdr.Dispose(); con.Close();
} else { Ins_Result(); Response.Redirect("resultquiz.aspx?totans=" + Label4.Text + "&tl_at=" + tl_ques.Text);
}
Label1.Visible = true; RadioButtonList1.Visible = true; chk.Visible = true;
}
protected void Button5_Click(object sender, EventArgs e) { Ins_Result();
72
Response.Redirect("resultquiz.aspx?totans=" + Label4.Text + "&tl_at=" + tl_ques.Text);
} public void Ins_Result() {
SqlConnection con = new SqlConnection(); con.ConnectionString = ConfigurationManager.ConnectionStrings["cn"].ConnectionString;
SqlCommand cmd = new SqlCommand();
cmd.CommandText = "insert into tbquiz_result(memid,result,tl_ques)values(@memid,@result,@tl_ques)"; cmd.Connection = con; if (con.State == ConnectionState.Closed) { con.Open(); } cmd.Parameters.Add("@memid", SqlDbType.Int).Value = Convert.ToInt32(Application["user_id"]); cmd.Parameters.Add("@result", SqlDbType.Int).Value = Convert.ToInt32(Label4.Text); cmd.Parameters.Add("@tl_ques", SqlDbType.Int).Value = Convert.ToInt32(tl_ques.Text);
cmd.ExecuteNonQuery(); con.Dispose(); con.Close();
}}
73
For Notice Board
using System.Data.SqlClient;
public partial class MasterPage : System.Web.UI.MasterPage{ protected void Page_Load(object sender, EventArgs e) { rptr(); } public void rptr() { DateTime dat; dat = Convert.ToDateTime(DateTime.Now); SqlDataAdapter adp = new SqlDataAdapter("Select * from tbnotice_board where end_date>=@dat", ConfigurationManager.ConnectionStrings["cn"].ConnectionString); adp.SelectCommand.Parameters.Add("@dat", SqlDbType.DateTime).Value = dat; DataSet ds = new DataSet(); adp.Fill(ds); Repeater1.DataSource = ds; Repeater1.DataBind();
} }
74
For Job Opportunity
public partial class jobopr_detail : System.Web.UI.Page{ protected void Page_Load(object sender, EventArgs e) { gridview(); } public void gridview() { DateTime dat; dat = Convert.ToDateTime(DateTime.Now);
int job_id = Convert.ToInt32(Request.QueryString["job_id"]); SqlDataAdapter adp = new SqlDataAdapter("select job_code,job_desing,job_description.eligibilty,salary,jobend_date from tbjob_opr where job_id = " + job_id + "and jobend_date <= dat", ConfigurationManager.ConnectionStrings["cn"].ConnectionString); adp.SelectCommand.Parameters.Add("@dat", SqlDbType.DateTime).Value = dat; DataSet ds = new DataSet(); adp.Fill(ds); GridView1.DataSource = ds; GridView1.DataBind();
}}
75
For Show our college’s Patron
public partial class outpattern : System.Web.UI.Page{ protected void Page_Load(object sender, EventArgs e) { if (IsPostBack == false) {
gridview(); }
}
public void gridview() { SqlDataAdapter adp = new SqlDataAdapter("select * from tbpatorn", ConfigurationManager.ConnectionStrings["cn"].ConnectionString); DataSet ds = new DataSet(); adp.Fill(ds); GridView1.DataSource = ds; GridView1.DataBind();
} protected void GridView1_PageIndexChanging(object sender, GridViewPageEventArgs e) { GridView1.PageIndex = e.NewPageIndex; gridview();
}}
76
USER /OPERATIONAL MANUAL
1. INSTALLATION PROCESS Insert the CD containing software into CD ROM. Look for the folder KNOWLEDGEBABK. Copy the folder to C:\ of the system. Now look for database file & attach the database with Sql server. Go to Microsoft visual studio: file > open > C:\KNOWLEDGEBANK\ Website. Click on open button. Now click on Run button or press F5 to run the project.
2. MENUS DRIVEN Project consist of various menus through which we can choose required
options menus are self explanatory
3. VALIDATIONS There are proper validations for the information to be filled in the relative
text box to avoid the chance of wrong data entry
4. GENERATION OF AUTOMATIC VALUES According to the requirement in the project some values are automatically
generated the system so that the user doesn’t have to enter them.
5. SECURITY ASPECTS In the project login form pops up every time end user opens the system and
only authenticated person is allowed to use the system all the authorized users are provided user name and password.
6. END USERES This project provides many facilities to end-users. The end users can be any person who is aware to the window environment
and has the knowledge of surfing web sites.
SECURITY ASPECTS AND ACCESS RIGHTS
77
Authentication: - authentication can be defined as to check the user’s existence and validation.
Authorization: - can be defined as the access rights and authorities that a user is given to access.
Types of Authentication (in asp.net):-
Window authentication,
Form authentication
Passport authentication
None.
In the project form authentication is used. In Form authentication user is assigned to
access the specific numbers of forms.
In the following picture security is implemented from web-config file.
Administrator is login in by entering username and password. As we click login
button username and password is checked by the code written on button click. If
username and password entered by user is correct the login will be successful else it
will display message “Username/Password is incorrect”.
78
79
BACKUP AND RECOVERY
Sometimes data is damaged because of user ignorance and recovery of data
will not be possible in that case. The only way out is copy of the data. So there
should be backup of data .it is duty of administrator to take backup and updating of
data at regular interval of time.
So “web career “provides back and restore facility. Administrator can choose
the drive and the folder where he wants to take backup and from where he wants to
restore data. This window will allow the admin to take backup of his data.
80
ANNEXUREAbout DOEACC Centre ,Chandigarh
DOEACC Centre, Chandigarh, a unit of DOEACC Society under Ministry of
Information Technology, Govt. Of India, was established in the year 1978 to
promote the use of computers and to bring about computerization in Government
Organizations, Public Sector Undertakings and Autonomous Bodies. DOEACC
Centre, a pioneer Computer Centre of North India is one of the largest in the
country.
DOEACC Centre has a team of 225 employees including 110 highly qualified,
well-trained, dedicated and experienced computer professionals. All of them have
undergone extensive training within the organization. It believes that developing
and enhancing professional skills is a continuous process through out ones career.
Services
DOEACC Centre offers the following services:
Feasibility and System Studies
Application Software Development and its maintenance
Consultancy in selection of Hardware and System Software
Development of On-line Systems using Database approach
Turnkey Data Processing Projects
Computer Education and Training
Corporate Training Programs
CAD and Graphics
The Centre has been extending its services in the field of Information Technology
to a number of organizations in Punjab, Delhi, Haryana, Himachal Pradesh, Uttar
81
Pradesh, Jammu and Kashmir and Chandigarh. It has to its credit successful
completion of a number of projects for various organizations.
Software Development and Consultancy
DOEACC Centre has built up its image as a premier software development agency.
It has undertaken software development projects, under Client Server environment
using front end tools like POWERBUIDER, VB etc. with ORACLE as back end for
many reputed organizations like the Institute of Company Secretaries of India
(ICSI), New Delhi Municipal Corporation (NDMC), Himachal Pradesh State
Electricity Board (HPSEB), Punjab State Electricity Board (PSEB), GB Pant
Hospital, CAPART, and CIPL etc. Presently DOEACC Centre, Chandigarh is also
working in the areas of web-enabled applications.
IT consultancy is a major activity of this Centre. With a team of well-qualified and
experienced professionals, the Centre has provided consultancy support to a large
number of government departments, public sector undertakings and nationalized
banks. The consultancy services offered by DOEACC Centre include preparing
specifications of the computer system & networking, tendering activities, hardware
and software selection, syllabus (curriculum) design for Universities/Technical
Institutes, selection of software professionals, mode of conducting training
programmer for Corporate sector, holding aptitude/professional tests, feasibility
studies, instructional material development and bench marking, etc. DOEACC
Centre carried out the feasibility studies of Bhakra Beas Management Board
(BBMB), Archaeological Survey Of India (ASI), and the Slum & JJ Department of
the Municipal Corporation of Delhi, etc.
82
Data Processing
The Centre is renowned for its expertise in bulk data processing jobs. Meeting
deadlines and facing emergencies is a unique feature of the Centre. The electricity
billing of Punjab, Chandigarh and Haryana and the water billing of Chandigarh is
also being processed and printed by the Centre. The evaluation, compilation and the
selection examinations of various prestigious organizations like CBSE, PGI
Chandigarh, CSIR New Delhi, MDU Rohtak, Kurukshetra University, Punjab and
Haryana School Education Boards have been carried out by DOEACC Centre.
To help the organizations that do not have their own expertise and facilities for
system development and data preparation, the Centre accepts scientific, educational
and other data processing work on turn-key-basis. The underlying objective of
accepting such work is to demonstrate the capabilities and benefits of computers
and to encourage these departments and organizations to train their man power for
taking up the processing of data electronically on their own.
Training
The centre has been ISO 9001:2000 certified for conducting training activities. The
Training curriculum of the Centre is regularly updated with the latest hardware and
software available in the market. The DOEACC Society, New Delhi, to conduct
O/A/B/C level courses, accredits the Centre. The Centre also offers various short
and long terms computer courses for all categories of students and professionals.
Short-term courses are available for beginners, and professionals from other fields,
who need only hands-on experience on computers. Long-term courses are available
for students desirous of taking computers as a profession. Advanced courses are
also available for computer professionals.
83
The Centre also offers customized courses for Organizational Training. The
curriculum for these programmers is designed keeping in view the specific need of
the industry.
Great emphasis is laid on both the theoretical and practical aspects of training. The
Centre, over the years, has developed a number of print materials such as textbooks,
laboratory manuals, and other material, which is given to the participants attending
the training courses. The classrooms are equipped with the latest colored
multimedia projection systems.
The Centre has a modern and comprehensive library. Many publications on
different topics of relevance are regularly added to the library.
Infrastructure
In order to keep pace with the advances in the I T Industry, DOEACC Centre has
been constantly upgrading its infrastructure, adding new software and hardware and
exposing its manpower to the latest Information Technology.
The Centre is well equipped with the latest hardware, which includes seven
powerful servers (Compaq, Digital, HCL) and more than 140 PCs (COMPAQ,
Digital, Siemens, HCL etc). All the PCs are networked using CAT 5 structured
cabling with the facility to connect to any of the three Operating Systems i.e. NT,
UNIX or Netware.
DOEACC Centre has got its own Radio frequency link at 2Mbps and is connected
to Internet through NICNET. This provides a facility to connect all nodes (about
100 in DOEACC Centre, Chandigarh) to use Internet simultaneously.
84
Branches
In its continuous endeavor to spread computer awareness and provide
consultancy DOEACC Centre has opened its branches in Simla, Lucknow and New
Delhi.
On the recommendations of the Training Advisory Committee, the Executive
Council approved opening of first Branch of this Centre at Shimla. The Branch
office started functioning in March 1995. It was formally inaugurated on 10th April
1995 by His Excellency Shri Virbhadra Singh, Chief Minister of Himachal Pradesh
and has been functioning extremely well. The Branch office exhibited results much
beyond the target initially laid down and had established its credibility in first year
of its functioning.
Under its diversification and expansion programmer, the Centre opened its second
Branch at Lucknow. His Excellency Shri Romesh Bhandari, Governor of Uttar
Pradesh, inaugurated it on 23rd October 1996. The Branch Office has made a major
break-through in the field of Corporate Training Programmes, which included
training to senior officers, and staff of UPTT.
85
DATA DICTIONARY:
In our DFD, we give names to data flows, processes, and data stores.
Although the names are descriptive of the data, they do not give details. So the
following the DFD, our interest is to build some structured place to keep details of
the contents of data flow, processes, and data store. A data dictionary is a structured
repository of data about data. It is a set of rigorous definition of all DFD data
element and data structure. A data dictionary has many advantages. The most
obvious is documentation; it is valuable reference in any organization. Another
advantage is improving analyst/user communication by establishing consistent
definition of various elements, terms and procedures. During implementation, it
serves as a common base against which programmers who are working on the
system compare data description. Also control information maintained for each data
element is cross referenced in the data dictionary. E.g. program that use a given
data element are cross referenced in a data dictionary, which makes it easy to
identify them and make any necessary changes. Finally, a data dictionary is an
important step in building a database. Most database management system has a data
dictionary as a standard feature.
86
Table used in the project
Database Name is Dbclg:-
1. tbregn : - This table is used for student registration. You can store the different type of information about student in this table. This table is made for simple user (student).
Field Name Data Type Size Key DescriptionStu_id Int PK Student_idCourse_id Int FK Course _IdCategory Varchar 10 --- Category of student (BC,SC,GEN)LastCourse Varchar 10 --- Last course of studentLastCollege Varchar 30 --- Last College NameSession Int FK Session IDLastUniversity Varchar 20 --- Last University NameUniversity_regn Int -- University Registration No.Stu_nm Varchar 20 --- Student NameFather_nm Varchar 20 --- Father NameMother_nm Varchar 20 --- Mother NameAddress Varchar 50 --- AddressGender Varchar 10 --- GenderMob_no Varchar 10 ---- Mobile NumberDOB Varchar 10 ---- Date of birth
Email_id Varchar 30 ----- Email_Id
2. tbsession:- this table is used for store the information about registration session.
Field Name Data Type Size Key DescriptionSession_id Int Pk Session IdSession Varchar 50 --- Session Name
87
3. tbl_coursedtl:- This table is used for previous courses detail of students. In this table..
Field Name Data Type Size Key Description
Stu_id Int Fk Student_idCourse_id Int PK Course _IdCourse_name Varchar 20 --- Course NameCourse_year Varchar 4 --- Course YearRoll_no Varchar 6 --- University’s Rollno.Obt_mks Int --- Obtain MarksPercentage Int ---- Percentage of previous ClassUniversity_nm Varchar 50 ---- University Name of previous classesSubject Varchar 50 ----- Subjects of previous class
4.tblogin:- In this table you will store the information about users and Administrator.
Field_Name Data Type Size Key DescriptionUser_id Int Pk User IdEmail_Id Varchar 50 --- Email detail of User.Pwd Varchar 8 --- Password of userUrole Varchar 20 ----- User RoleQues Varchar 50 ---- Qusetion detail.Ans Varchar 50 ----- Answer
5.tbquiz:- This table is used for store the information of quiz’s questions and answers.
Field_Name Data Type Size Key DescriptionQues_no Int Pk Question NumberQues Varchar 50 --- Question detail.A Varchar 50 --- Option detail for questionB Varchar 50 ---- Option detail for questionC Varchar 50 ----- Option detail for questionD Varchar 50 ---- Option detail for questionAns Varchar 2 ---- ANSWERCatid Int FK Category Id
6.tbquiz_result:- In this table we will store the result of quiz according to member_id.
88
Field_Name Data Type Size Key DescriptionQuiz_id Int Pk Quiz_idMem_id Int FK Member idResult Int --- ScoreTl_ques Int ----- Total Attempted Questions
7. tbmem:- In this table we will store the information of members of our site.
Fieldname Data Type Size Key DescriptionMem_id Int Pk Member IdEmail_Id Varchar 20 --- Email detail of MemberPwd Varchar 8 --- Password of userName Varchar 20 ---- Name of MemberAddress Varchar 50 ----- AddressGender Varchar 6 ----- GenderMob_no Varchar 8 Mobile Number.Country_nm Varchar 20 ---- CountryNameState_nm Varchar 20 ----- State NameCity_nm Varchar 20 ----- City NamePic Varchar 20 ---- Picture’s name
8. tbjob_opr:- this table is used for the detail of Job opportunity in the college.
Field_Name Data Type Size Key DescriptionJob_id Int Pk Job_idJob_code Int --- Job CodeJob_desing Varchar 50 --- Job designationJob_description Varchar 50 --- Job DescriptionEligibility Varchar 50 ---- Job EligibilitySalary Numeric (7,2) ---- SalaryJobend_date Date time -- ---- Last date of Job recruitment
9. tbNotice_board:- You will use this table for daily update the Notice Board information.
89
Field_Name Data Type Size Key DescriptionId Int Pk News_IDTeacher_name Varchar 50 ----- Teacher name who will
update the Notice boardNotice_title Varchar 50 --- Notice TiltleNotice_des Varchar 50 Notice Description.Start_date Datetime Start date of noticeEnd_date Datetime Last date of notice.
10. tbcourse_clg:- This table is used for store the information of course detail of the college.
11. tbCourse_fees:- In this you will store course fees detail.
Field_Name Data Type Size Key DescriptionClsid Int Fk Class idCourse_fees Numeric 6,2 --- Course Fees detail
90
Field_Name Data Type Size Key DescriptionCourse_id Int Pk Course IdCourse_name Varchar 5 Course NameDuration Varchar 50 --- DurationEligibility Varchar 100 --- Eligibility
12. tbsyllabus:- In this table you will store the information of download syllabus file.
Field_Name Data Type Size Key DescriptionFile_id Int PK File_IdClsid Int FK Class IDFile_name Varchar 20 --- File NameFiel_des Varchar 10 ---- File Description
13. tbcat :-In this table we will store the information about the category of student.
Field_Name Data Type Size Key DescriptionCatid Int Pk Category
Catnm Varchar 10 --- Category name
14. tbcls :- In this table we will store the information about the class of student.
Field_Name Data Type Size Key DescriptionClsid Int Pk Class Id
Clsnm Varchar 10 --- Class name
15. tbcnt :- we will use this table for the information of countries names.
Field_Name Data Type Size Key DescriptionCntid Int Pk Country_IdCntname Varchar 50 --- Country Name
91
16. tbst :- we will use this table for the information of states name.
Field_Name Data Type Size Key DescriptionStid Int Pk State_id
Stname Varchar 50 --- State nameCtstid Varchar Int FK Country state Id
17. tbct:- -This table is used for information the city .
Field_Name Data Type Size Key DescriptionCtid Int Pk City Id
Ctname Varchar 50 --- City NameStctid Int FK State City ID
18. tbPatorn:- This table is used for store information about college patronField_Name Data Type Size Key DescriptionSr_no Int Pk Serial Number
Principal_name Varchar 30 --- Principal NamePeriod Varchar 50 --- Period time in college
92
BIBLIOGRAPHY
CATALOGUES
BOOKS
Database management system Vipin C. Desai
System Analysis and Design Elias M. Awad
SQL Server Microsoft Press
ASP.NET Wrox publications
WEBSITES
www.gotdotnet.com
www.onlinetemplates.org
www.webopedia.com
www.msdn.microsoft.com
www.tech-faq.com
93