Sie sind auf Seite 1von 68

INTERNAL MARK REGISTER

Project report submitted to the Karpagam Academy of Higher Education in

Partial fulfillment of the requirements for the Degree of

BACHELOR OF SCIENCE IN INFORMATION TECHNOLOGY

Submitted By

PRADEEP.L

16ITU066

Under the Guidance of

Mrs.B.BRINDHA M.sc.(M.phil).,

Department of CS, CA, IT

KARPAGAM ACADEMY OF HIGHER EDUCATION

(Deemed to be University)
(Established Under Section 3 of UGC Act, 1956)
Coimbatore-641 021
March-2019
1
KARPAGAM ACADEMY OF HIGHER EDUCATION
(Deemed to be University)
(Established Under Section 3 of UGC Act, 1956)
Coimbatore-641 021
March-2019

BACHELOR OF SCIENCE IN INFORMATION TECHNOLOGY

BONAFIDE CERTIFICATE

This is to certify that the project work entitled “INTERNAL MARK REGISTER” done by

PRADEEP.L(16ITU066), during the period Dec. 2018 to Apr. 2019 in partial fulfillment the

degree of B.Sc. Information Technologysubmitted for the viva voice held on 27.3.2019

Project Guide Head of Department

Internal Examiner External Examiner


2
CERTIFICATE

This is to certify that the project entitled “INTERNET MARK REGISTER” is the bonafide
project work carried out by PRADEEP.L (16ITU066)student of B.sc, IT submittedto the
Karpagam Academy of Higher Education ,Coimbatore in the year 2019, inpartial
fulfillment of the requirements for the award of the Degree of BACHELOR OF
SCIENCE IN INFORMATION TECHNOLOGY, is the record of student’s own workedcarried

out by him under my supervision .The matter embodied in this project has not
formed the basis for the award previously of any degree, diploma ,associate ship
,fellowship or any other similar title .

Place : Signature of guide

Date : (B.BRINDHA)

3
DECLARATION

I hereby declare that the project entitled “INTERNAL MARK REGISTER”submitted for
the B.SC INFORMATION TECHNOLOGY Degree original work.

Place : Signature of the student

Date : (PRADEEP.L)

4
ACKNOWLEDGEMENT

If words are considered as symbols of approval and tokens of acknowledgement,


then the words play the heralding role of expressing my gratitude to all who have
helped me directly and indirectly during my project work.

I express my sincere gratitude to the esteemed President, Karpagam


Academy of Higher Education Coimbatore, Dr.R.Vasantha Kumar (Hons), for
allowing me to do my project with his moral support.

I will be ever graceful and thankful to Shri.K.Murugaiah. B.E., Chief


ExecutiveOfficer of Karpagam Educational Institutions, for allowing me to do my
project with his moral support.

I will be ever graceful and thankful to Dr.S.Sudalaimuthu, Vice Chancellor


of Karpagam Academy of Higher Education for allowing me to do my project with
his moral support.

I take this opportunity to express my sincere gratitude and thanks to our


beloved, Dr.R.Sundararajan, Registrar of Karpagam Academy of Higher Education
for allowing me to do my project with his moral support.

I will be ever graceful and thankful to Dr.M.Palaniswamy, Dean Faculty of


Arts, Science and Humanities of Karpagam Academy of Higher Education for
allowing me to do my project with his moral support.

I will be ever graceful and thankful to Dr.R.Gunasundari, Associate


Professorn and Co-ordinator, Information Technology for providing me this
opportunity and extending a constant monitoring throughout the course of the
project.

I will be ever graceful and thankful to Mrs.A.Jeevarathinam, Assistant


Professor and my Internal Guide for his valuable guidance and constant
monitoring throughout the course of the project.

5
Finally my heart full of thanks all other faculty members,my parents,my friends
for their support without which I would not been able to complete this project.

6
7
ABSTRACT
The project is entitled as “Web Based Internal Mark Register” created by using
ASP.Net with C#.Net as front end and Microsoft SQL server as backend.

The main aim of designing System is to develop a web based user friendly application for
college to view and maintain student internal mark. Proposed system helps to the college
management, student, staff they can view mark system efficient way. This project consists of
administrator and staff and student role. Here administrator can add new student and staff details
under specific category The admin will be provided with the separate username & password to
staff and as well as student .

The staff can log on this application and they can put internal mark based on student Roll
no and this application will convert automatically over all mark based on internal mark. Staff can
view efficiently student grade information like poor and good based on overall mark information

Student can log on this system student can see the marks based on their student roll no
and they can change their password details

This System provides one attractive environment manipulate data and information about
student details. Here almost all work is computerized. So the accuracy is maintained.
Maintaining all student mark the system can be used to manage the data of all type of
educational institutes. It will support web application environment.

8
CONTENT

S.NO TITLE PG.NO


1. INTRODUCTION
1.1.QUALITY ASSURANCE
1.2.SYSTEM SPECFICATION
1.2.1.HARDWARE REQUIREMENT
1.2.2.SOFTWARE REQUIREMENT
2. SYSTEM STUDY
2.1.EXISTING SYSTEM
2.2.DISADVANTAGES
2.3PROPOSED SYSTEM
2.4.ADVANTAGES

3. FEASIBILITY STUDY
3.1.TECHNICAL FEASIBILITY
3.2.BEHAVIORAL FEASBILITY
3.3.ECONOMICAL FEASBILITY
3.4.OPERATIONAL FEASIBILITY

4. SYSTEM DESIGN AND DEVELOPMENT


4.1.FILE DESIGN
4.2.INPUT DESIGN
4.3.OUTPUT DESIGN
4.4.DATABASE DESIGN
4.5.CODE DESIGN

5. MODULE
5.1.MODULE DESCRIPTION
6. DATAFLOW DIAGRAM.

9
7. ER DIAGRAM
8. SYSTEM TESTING AND MAINTENANCE
8.1.UNIT TESTING
8.2.INTEGRATION TESTING
8.3.VALIDATION TESTING
8.4.OUTPUT TESTING
8.5.WHITEBOX TESTING
8.6.BLACKBOX TESTING
8.7.USER ACCEPTANCE TESTING

9. SYSTEM IMPLEMENTATION
10. SCOPE OF FUTURE DEVELOPEMENT
11. CONCLUSION
12. BIBLIOGRAPHY
13. WEBSITES
14. TABLE DESIGN
15. SAMPLE INPUT/OUTPUT REPORTS
16. SAMPLE CODING

10
INTRODUCTION

The project is to create a system that will capture IA marks, calculate final marks .HoD and
Principal also like to see these marks hence a multi user system that will allow each faculty to
enter marks from her/his room and others to view should be of value to college. A faculty
typically keeps records of marks of each internal exam in an Excel file so it will be easyto
manage with help of system. Most of the colleges conduct internal exams generally three times
in a semester for each subject. A faculty typically keeps records of marks of each internal exam
in an Excel file. The Internal marks assessment system helps teacher to reduce the overhead of
marks calculation and to manage them The most significant feature of the website is the online
exam in which student can log into the system, and give his external examination.

1.1 QUALITY ASSURANCE


1.2 Quality assurance managers play a crucial role in business by ensuring that products meet
certain thresholds of acceptability. They plan, direct or coordinate quality assurance
programs and formulate quality control policies. They also work to improve an
organization's efficiency and profitability by reducing waste.

1.2 SYSTEM SPECIFICATION

A System Requirements Specification (SRS) (also known as a Software Requirements


Specification) is a document or set of documentation that describes the features and behavior of a
system or software application.

1.2.1 HARDWARE REQUIREMENT

 Processor : Intel Duel core


 RAM : 2 GB
 Hard Disk : 90GB
 Printer : HP Ink Jet
 Keyboard : Samsung
 Mouse : Logi Tech (Optical)
11
1.2.2 SOFTWARE REQUIREMENT

 Operating System : Windows XP,7,8


 Domain Name : Dot Net
 Front End : ASP.Net
 Coding language : C#.Net
 Back End : SQL Server 2008

12
2. SYSTEM STUDY

It involves studying a procedure or business in order to identify its goals and purposes
and create systems and procedures that will achieve them in an efficient way. Use cases are a
widely used systems analysis modeling tool for identifying and expressing the functional
requirements of a system.

2.1 EXISTING SYSTEM

The existing system is manual, doesn’t have the flexibility to maintain and send the
students internal mark details. The Existing system is a manual entry for the students mark and
converts into overall mark. The existing system is tedious and time consuming. It also requires
handling knowledge and skilled manpower. The maintenance cost with this system is periodical
and unavoidable. If you want to update some details it is very difficult in existing system. Storing
and retrieving process it is very difficult. Redundant data also occurred so existing system needs
more memory size. The existing system is a manual system, and calculating internal mark into
overall mark is manual process so Time consuming task.

2.2 DISADVANTAGES

 Manual work
 Storing and retrieving not easy
 Security of information is low.
 Time consumption is more for converting mark process.

2.3 PROPOSED SYSTEM

To simplify the current application will provide seamless integration across all student
internal mark information. The drawbacks, which are faced during existing system, can be
eradicated by using the proposed system. The main objective of the proposed system is to
provide a user-friendly interface to college view and maintain student internal mark and
efficiently convert automatically over all mark based on internal mark.
13
This application system is designed in the favor of the college, which helps them to save
the records of the all students and staff details. Which helps of this application the management
to know the students, internal mark and personal information details and also view staff details
information?

2.4 ADVANTAGES

 Easy storing and retrieving


 easy report generation
 Efficient Student internal mark Record Maintain.

14
3. FEASIBILITY STUDY

A system is a feasible system only if it is feasible within limited recourse and time. In this
system each and every process can be feasible for the user and also developer. It proved user
friendly input such as device independent inputs and getting proper solution for the problem.

The different types of feasible system that have to analyze are,

 Technical Feasibility
 Behavioral Feasibility
 Economical Feasibility
 Operational Feasibility

3.1 Technical Feasibility

Technical Feasibility is the assessment of the technical view of the system. The system is
developed for Dot net environment; a platform independent tool is used to develop the system.

The consideration those are normally associated with the technical feasibility include the
following
 Development risk
 Resource availability
 Technology

The development risk concerns the probability, the function of all elements and its
performance should be same in all platforms and in the system that is being developed. This
system is developed according to the standards and the development software tools are selected
in such a way to avoid the problems cited above.

The software used to develop this system is Windows XP, visual studio Dot net is done
efficiently, and the concept of SQL helps to create the application backend. These components
are also helpful in providing interactivity to Java applications.

15
3.2 Behavioral Feasibility

It is common knowledge that computers illustrations have something to do with turnover


transfers, retraining and changes in user or developer status. The main emphasis is customer
service, personal contacts with customers.

Feasibility report is directed towards management. It evaluates the impact of the


proposed changes on the area in question. The report is a formal document for management use,
brief enough and sufficiently non-technical to be understood.

3.3 Economical Feasibility

Economic feasibility or cost benefit is an assessment of the economic justification for a


computer based system project. Though this system the administrator can use the tool from
anywhere within their concern. The system is developed using the existing resources. So the
project is economically feasible.

This is the most frequently used method for evaluating the effectiveness of a user system.
More commonly, know as cost analysis the procedure is to determine the benefits and savings
that are expected from a candidate system and compare them with costs.

This system getting hundreds present economical feasibility. It will be achieved goal very
efficiently. And evolution of development cost (hardware and software needed) is weighted
against the ultimate income or benefit derived from the system. Finally, it is assured that this
project is economically feasible

3.4 Operational Feasibility:

Operational Feasibility deals with the study of prospects of the system. This system
operationally eliminates all the tensions of the administrator and helps in effectively tracking the
project progress. This kind of automation will surely reduce the time and energy, which
previously consumed in manual work. Based on the study, the system proved to be operationally
feasible.

16
4. SYSTEM DESIGN AND DEVELOPMENT

Systems design is the process of defining the architecture, modules, interfaces, and data
for a system to satisfy specified requirements. Systems design could be seen as the application of
systems theory to product development.

4.1 FILE DESIGN

The file system is used to control how data is stored and retrieved. Without a file system,
information placed in a storage area would be one large body of data with no way to tell where
one piece of information stops and the next begins. By separating the data into individual pieces,
and giving each piece a name, the information is easily separated and identified. Taking its name
from the way paper-based information systems are named, each group of data is called a file. The
structure and logic rules used to manage the groups of information and their names are called a
"file system”. There are many different kinds of file systems. Each one has different structure
and logic, properties of speed, flexibility, security, size and more. Some file systems have been
designed to be used for specific applications

4.2 INPUT DESIGN

Input Design converts the user-oriented inputs to computer-based formats. Inaccurate


input data are the most common cause of errors in data processing. Error data entered by the data
operator can be controlled by the input design. The goal of designing input is to make the data
entry easy, logical and as free from errors as much as possible.
The proposed system is completely menu-driven. It is a powerful tool for interactive
design. It helps the user comprehend the range of alternatives available and also prevents them
from making an invalid selection. All entry screens are interactive in nature. It has been designed
taking into account all the constraints of the end-user.
Some other features included are:
 The form title clearly states the purpose of the form
 Adequate space is given for data entry
17
Data Validation is done for eliminating duplicate entries

4.3 OUTPUT DESIGN

Outputs are the most important and direct source of information to the customer and
management. Intelligent output design will improve the system's relationship with the user and
help in decision making. Outputs are used to make permanent hard copy of the results for later
consultation. The output generated by the system is often regarded as the criteria for evaluating
the performance of the system. The output design was based on the following factors.
 Usefulness determining the various outputs to be printed to the system user.
 Differentiating between the outputs to be displayed and those to be printed.
 The format for the presentation of the output.

For the proposed system, it is necessary that the output should be compatible with the
existing manual reports. The outputs have been formatted with this consideration in mind. The
outputs are obtained after all the phase, from the system can be displayed or can be produced in
the hard copy. The hard copy is highly preferred since it can be used by the controller section for
future reference and it can be used for maintaining the record.

4.4 DATABASE DESIGN

 Performance
Steps for Table Design
 State what kind of information we need to handle to get the desired output.
 Find out what information is needed for fields (i.e.) field type, size etc.
 Remove any data items, which is redundant.
 Table have one to one relationship needs a primary key field.
 Tables have one to many relationship needs to add a foreign key field to the table to
match the primary key field table.

18
4.5 CODE DESIGN

The general theme behind a database is to handle information in an integrated manner.


There is none of the artificiality that is normally embedded in separate files or applications. A
database is collection of interrelated data stored with minimum redundancy to serve many users
quickly and efficiently. The general objective is to make information access easy, quick,
inexpensive and flexible for the user.

In a database environment, common data are available which several authorized users can
use. The concept behind a database is an integrated collection of data and provides a centralized
access to the data from the program. It makes possible to treat data as a separate resource.
While designing database, several objectives must be considered:
 Controlled redundancy
 Data Independence
 More information at low cost
 Accuracy and Integrity
 Recovery from failure
 Privacy and security

Code is an ordered collection of symbols designed to provide unique identification of an


attribute. Codes can be used for various purposes. They can specify object’s physical or
performance characteristics and they can be used to give operational instructions. They also can
show inter relationships and may sometimes used to achieve secrecy or confidentiality. Codes
are designed for optimum human-oriented use and machine efficiency. Codes posses uniqueness,
expandability, conciseness, uniform nets, simplicity, versatility, sort ability, meaningfulness and
operability.
Sufficient effort and time is spent in the preliminary study of the problem to design an
efficient code. Activate serve scripting is object oriented. The source code is designed so that it
can do transaction efficiently. It is the code that dose all the updating, modifications, etc. for all

19
object used in the project there exist an associated source code, which explains the work of that
object. It also describes the flow of the project.
Source code is enhanced by structured coding techniques by good internal comments and
features provided by the language.
The code design in this project is made modular. The modular behavior enables easy
debugging and testing. Inserting comment statement wherever enhances the coding. This is done
during the documentation process coding is done in such a way that errors can be trapped easily.
Also modifications can easily be appended due to the codes modular behavior.

20
5. MODULES

Authentication module

Student Enrollment Details

Staff Enrollment Details

Mark Entry process Module

Grade Entry and report process

5.1MODULES DESCRIPTION

Authentication module

The first module is the authentication module. Using this module the student, admin and
staff can get login into the website. Based on the role, the page will be navigated

Student Enrollment Details

This module fully based on admin controladmin can register the students in the
registration form admin has to fill with student personal details such as name, address, DOB,
class, department and the mobile number and mail Id . And also These Student details will
maintain in a separate table. This module deals with the student academic details and personnel
details.

Staff Enrollment Details

Admin can register the staff details in the registration form this module maintain the all
staff information such as staff id, staff name , department , experience, subject handling, hours
details , contact no, email id , current address, previous work history, salary details and all. In
this module staff id set as primary key. After register password send to staff mail id using this
staff can login in this application

21
Mark Entry process Module

After successful authentication of staff can put internal mark based on student Roll no
and this application will convert automatically over all mark based on internal mark in this
module maintain the all student’s internal mark details based on their roll no and department.
And staff can able to view mark information

Grade Entry and report process

This module fully based on staff control this module check the user name and password
for staff for authentication. After the verification for authorization staff can set grade information
based on mark limit system automatically find student grade information like poor, good,
average based on overall mark information so that Staff can view efficiently mark report based
on grade wise

22
6. DATA FLOW DIAGRAM

DFD depict hoe data interact with the system. DFD are extremely useful in modeling
many aspects of a business function because they systematically subdivide a task into basic parts,
helping the analyst understand the system that they trying to model data flow diagram models a
system by using external entities from which data flow to a process which transmission the data
and creates output data which goes to other processes on external entities of files. Data may also
flow to process as inputs.

The symbols appearing in the DFD has been explained below:

- Represents a process

- Which shows data flow

- Designation of the data

- Shows Data source


23
Level-0:

Store student, staff info, mark details


Mark
Internal details
Admin Student
Mark
Register

Mark entry and


grade entry

Staff

24
Level1

25
Username and password
Store login details
Admin
Login Login Table
Process

Admin

Home

Admnistudent details Store student


Student Details
Entry Student table

Store staff details


Staff details Entry
Staff Details
Staff table
Entry

View report

Admin Report Database

26
Level 2:

Username and password


Store login details
Staff
Login Login Table
Process

Staff

Home

Staff enters mark details Store mark details

Mark Details
Entry Mark table

Staff enters gradedetails Store grade details

Grade Details
Grade table
Entry

View report

Staff Report Database

27
7. ER DIAGRAM

Reg Depart
Courses
name

Stu id

Students

Mark
Staff id
Grade
Stu
id Stu
Reg

Stu id

Staff Staff Mark


id

Stu id
expe

Staff id
Mail
id
Dep
Nam

28
8. SYSTEM TESTING AND MAINTENANCE

Objectives of Testing

Software testing is a critical element of software quality assurance that represents the
ultimate review of specifications, design and coding. The user tests the developed system and
changes are made according to their needs. The testing phase involves the testing of developed
system using various kinds of data. It involves user training, system testing and successful
running of the developed system.

The changes are made according to their needs. The testing phase involves the testing of
the developed system using various kinds of data. While testing, errors are noted and corrections
are made system testing is the stage of implementation, which is aimed at ensuring that the
system works accurately and efficiently before live operation commences. The candidate system
is subject to a variety of test: stress recovery, and security and usability tests.

Test Plan

Testing is the process of executing a program with the intent of finding any errors. A
good test of course has the high probability of finding a yet undiscovered error. A successful
testing is the one that uncovers a yet undiscovered error.

A test is vital to the success of the system; system test makes a logical assumption that if
all parts of the system are correct, then goal will be successfully achieved. The candidate system
is subjected to a verity of tests online like responsiveness, its value, stress and security. A series
of tests are performed before the system is ready for user acceptance testing.

29
Testing Methods

The different types of testing are:-

 Unit Testing
 Integration Testing
 Validation Testing
 Output Testing
 User Acceptance Testing

8.1 UNIT TESTING

Unit testing focuses verification efforts on the smallest unit of software design, the
module. This is also known as “Module Testing” The modules are tested separately this testing is
carried out during programming stage itself. In this step each module is found to be working
satisfaction as regard to the expected output from the module.

8.2 INTEGRATION TESTING

Integration testing focuses on the design and construction of the software architecture.
Data can be lost across an interface, one module can have adverse effect on another sub
functions and show on. Thus integration testing is a systematic technique for constructing test to
uncover errors associated with in the interface. In this project, all the modules are companied and
then the entire program is tested as a whole.

8.3 VALIDATION TESTING

30
Validation testing is the requirement established as a part of software requirement
analysis is validated against the software that has been constructed. This test provides the final
assurance whether the software needs all functional, behavioral and performance requirements

Thus the proposed system under consideration has been tested by using validation testing
and found to be working satisfactory.

8.4 OUTPUT TESTING

After performing the validation testing, the next step is the output testing of the proposed
system, since no system could be useful if it does not produce required output in the specific
format. Tested asking the users about the format required by them, the output is considered into
two ways: one is on the screen and the other is printed format.

The output format on the screen is found to be correct as the format designed according
to the user needs, for the hard copy also, the output comes as specified by the user. Hence output
testing does not result in correction in the system.

8.5 WHITEBOX TESTING

White box Testing is done with the project which drive test cases that do the following

 Guarantee that all the independent paths with in modules have been exercise at
least once.
 Exercise all logical decision on the true and false side.
 Execute all loops at the boundaries and within their operation bounds.
 Exercise internal data structures to ensure the validity
It is aimed at ensuring that the system works accurately and efficiently before live
operation command.

8.6 BLACKBOX TESTING

Black box System methods focus on the functional requirement of the software. Using
the black box testing method the following errors are identified and rectified in the package.
31
 Incorrect or Missing functions
 Interface Errors
 Errors in data Structures or external database access.

8.7 USER ACCEPTANCE TESTING

User acceptance testing of a system is the key factor for the success of any system. The
system under consideration is tested for user acceptance by constantly keep in touch with the
prospective system user at time of developing and making changes wherever required.

32
9. SYSTEM IMPLEMENTATION

In this project, propose virtualizing Harvard architecture on top of the existing memory
architecture of modern computers, including those without non-executable memory page
support, so as to prevent the injection of malicious code entirely. Harvard architecture is simply
one wherein code and data are stored separately. Data cannot be loaded as code and vice-versa.
In essence, we create an environment where in any code injected by an attacker into a process’
address space cannot even be addressed by the processor for execution.

In this way, we are attacking the code injection problem at its root by regarding the
injected malicious code as data and making it unaddressable to the processor during an
instruction fetch. Split memory architecture produces an address space where data cannot be
fetched by the processor for execution. For an attacker attempting a code injection, this will
prevent him from fetching and executing any injected code.

System Maintenance:

The maintenance plan specifies the scheduled servicing tasks and intervals (preventive
maintenance) and the unscheduled servicing tasks (adaptive orcorrective maintenance). Tasks in
the maintenance plan are allocated to the various maintenance agencies. A maintenance
allocation chart is developed to tag the maintenance tasks to the appropriate maintenance
agencies. These include: in-service or in-house work centers, approved contractors, affiliated
maintenance or repair facilities, original equipment manufacturer, etc. The maintenance plan also
establishes the requirements for the support resources.

Related activities such as resource planning, budgeting, performance monitoring,


upgrades, longer term supportability, and sustenance also need to be managed. These activities
are being planned, managed, and executed over a longer time horizon and they concern the well
being of the system over the entire life cycle. Proper maintenance of the system (including
maintenance-free system designs) relies very much on the availability of support resources, such

33
as support and test equipment, technical data and documentation, personnel, spares, and
facilities. These have to be factored in during the acquisition agreement process.

10. SCOPE OF FUTURE DEVELOPMENT

Every application has its own merits and demerits. The project has covered almost all the
requirements. Further requirements and improvements can easily be done since the coding is
mainly structured or modular in nature. Changing the existing modules or adding new modules
can append improvements. The project has a very vast scope in future. The project can be
implemented on intranet in future. Project can be updated in near future as and when requirement
for the same arises, as it is very flexible in terms of expansion. With the proposed software of
database Space Manager ready and fully functional the client is now able to manage and hence
run the entire work in a much better, accurate and error free manner. The following are the future
scope for the project.

34
11. CONCLUSION

This internal mark register application was successfully created and stored all the student , staff,
mark, and grade details into the database using this application. The application was tested very
well and the errors were properly debugged. Testing also concluded that the performance of the
system is satisfactory. All the necessary output is generated. This system thus provides an easy
way to automate all the functionalities of consumption. If this application is implemented in few
consumption, it will be helpful. Further enhancements can be made to the project, so that the
website functions in a very attractive and useful manner than the present one. It is concluded that
the application works well and satisfy the needs. The application is tested very well and errors
are properly debugged. It also acts as the sharing of files to the valuable resources.

35
14. BIBLIOGRAPHY

Books Referred:
 Alex Homer , ‘Professional VB.NET 1.1’, 2004 Edition, Wrox Publications
 Clayton crooks II ‘Learning Visual Basic .Net Through Applications’
 Roger S Pressman, ‘Software Engineering’, 2000 Edition, Dreamtech Publications
 Steven Holzner, ‘Visual Basic.NET Black Book’, 2003 Edition, Dreamtech Publications
 A.KeytonWeissinger ,“ASP IN A NUTSHELL”,Shroff Publishers and distributors
Pvt.Ltd, February 1999
 A.Russel Jones, ”ASP.NET Complete Reference”, Sybex Publications, February
18,2002
 DATABASE SYSTEM CONCEPTS, Henry F.Korth, Megraw-Hill, Third Edition, 1997.
 Steven Holzner, ‘C#.NET Black Book’, 2003 Edition, Dreamtech Publications
 SQL SERVER HIGH AVAILABILITY, Paul Bertucci, Sams publishing, First Edition, 2004. [5].
SOFTWARE ENGINEERING ONCEPT,RicharedE.Fairly Tata Megraw-Hill Publications, Third
Edition, 1997.
13.1 WEBSITES
 http://www.C#corner.net
 http://www.w3schools.com/asp.net
 http://asp.net-tutorial.com
 http://en.wikipedia.org/wiki/asp.net
 www.msdn.microsoft.com
 www.vbcity.com
 www.vbdotnetheaven.com
 www.codeproject.com
 www.dotnetjohn.com
36
13. TABLE DESIGN

Student table

Primary Key: Student Id

Field Name Data Type Description Constraints


Student ID Varchar(25) This field contains Student Not Null
ID
Student Name Varchar(30) This field contains Student Not Null
Name
DOB date time This field contains DOB Not Null
Gender Varchar(20) This field contains Gender Not Null
Address Varchar(40) This field contains Address Not Null
DOA Datetime This field contains DOA Not Null
Department Varchar(30) This field contains Not Null
Department
Photo Image This field contains Photo Not Null
Phone Int(20) This field contains Phone Not Null
Father Name Varchar(50) This field contains Father Not Null
Name
Father Occupation Varchar(40) This field contains Father Null
Occupation
Mother Name Varchar(40) This field contains Mother Not Null
Name
Mother Occupation Varchar(50) This field contains Mother Null
Occupation

37
Staff table

Foreign key:Student Id

Field Name Data Type Description Constraints


Staffid Int(25) This field contains Not Null
Staffid
Staffname Varchar(50) This field contains Not Null
Staffname
DOB Datetime This field contains Not Null
DOB
Gender Varchar(20) This field contains Not Null
Gender
Address Varchar(50) This field contains Not Null
Address
DOJ Datetime This field contains Not Null
DOJ
Designation Varchar(50) This field contains Not Null
Designation
Photo Image This field contains Not Null
Photo
Phone Int(20) This field contains Not Null
Phone
Qualification Varchar(50) This field contains Not Null
Qualification
Annual CTC Varchar(50) This field contains Not Null
Annual CTC
Marital Status Varchar(30) This field contains Not Null
Marital Status

38
Login table

Primary key :Username

Field Name Data Type Description Constraints


Username Varchar(50) This field contains User Not Null
Name
Password Varchar(25) This field contains Password Not Null

Mark table:

Foreign key:Student Id

Field Name Data Type Description Constraints


Student ID Varchar(30) This field contains Student Not Null
ID
Department Varchar(35) This field contains Not Null
Department
Year Varchar(20) This field contains Year Not Null
Sudent Name Varchar(25) This field contains Sudent Not Null
Name
Subject1 Int(11) This field contains Subject1 Not Null
Subject2 Int(11) This field contains Subject2 Not Null
Subject3 Int(11) This field contains Subject3 Not Null
Subject4 Int(11) This field contains Subject4 Not Null
Subject 5 Int(11) This field contains Subject 5 Not Null
Subject6 Int(11) This field contains Subject6 Not Null
Assignment Int(11) This field contains Not Null

39
Assignment
Mark Int(11) This field contains Mark Not Null
Percentage Int(11) This field contains Not Null
Percentage
Results Varchar(30) This field contains Results Not Null

40
41
15. SAMPLE INPUT/OUTPUT REPORT

42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
16. SAMPLE CODING

using System;
using System.Collections;
using System.Configuration;
using System.Data;
using System.Linq;
using System.Web;
using System.Web.Security;
using System.Web.UI;
using System.Web.UI.HtmlControls;
using System.Web.UI.WebControls;
using System.Web.UI.WebControls.WebParts;
using System.Xml.Linq;
using System.Data.SqlClient;
using System.Drawing.Imaging;
using System.IO;
using System.Net;
using System.Net.Mail;

public partial class newuser : System.Web.UI.Page


{
SqlConnection con = new SqlConnection("server=.;database=webattendance;integrated
security=true;");
SqlCommand cmd;

protected void Page_Load(object sender, EventArgs e)


{

}
public void mail(string emailid, string msge)
{
string email = emailid;
string pwd;

Random rp = new Random();


MailMessage msg = new MailMessage();
msg.To.Add(email);
msg.From = new MailAddress("hasidata@gmail.com");
msg.Subject = "Greetings from Digitized Student Attendance Application System..";
pwd = rp.Next(11111, 99999).ToString();
msg.Body = msge;

SmtpClient cli = new SmtpClient("smtp.gmail.com", 587);


cli.EnableSsl = true;
NetworkCredential nc = new NetworkCredential("hasidata@gmail.com", "hasi@12345");
cli.Credentials = nc;
try
{

61
cli.Send(msg);
}
catch (Exception ex)
{ }

}
protected void btnSubmit_Click(object sender, EventArgs e)
{
string gender = "";

con.Open();
if (rbmale.Checked == true)
{
gender = "Male";
}
else
{
gender = "Female";
}

string s = "insert into student values('" + txtName.Text + "','" + txtuid.Text +


"','" + txtPassword.Text + "','" + txtPassword0.Text + "','" + txtdob.Text + "','" +
gender + "','" + txtEmail.Text + "','" + txtph.Text + "','" + txtaddress.Text + "','" +
txtdep.Text + "','"+txtpemail.Text +"','" + ddlmode.SelectedItem.ToString() + "')";
cmd = new SqlCommand(s, con);
try
{
cmd.ExecuteNonQuery();
Response.Write("<script language='javascript'>alert('Student details inserted
successfully')</script>");
}
catch (Exception ex)
{
}
con.Close();
string mssg = "Dear: " + txtName.Text + ", Your details are registered in
Digitized Student Attendance Application System.. Now you can login into the website
using the following details. Userid : " + txtPassword.Text + " and Password : " +
txtPassword0.Text;
mail(txtEmail.Text, mssg);
adddata();

}
SqlConnection connection;

public void adddata()


{
con.Close();
con.Open();
string s = "insert into login values('" + txtPassword.Text + "','" +
txtPassword0.Text + "','Student')";
cmd = new SqlCommand(s, con);
62
cmd.ExecuteNonQuery();
con.Close();

protected void Button1_Click(object sender, EventArgs e)


{
txtaddress.Text = "";
txtdep.Text = "";
txtEmail.Text = "";
txtPassword.Text = "";
txtPassword0.Text = "";
txtuid.Text = "";
txtpemail.Text = "";
}
}

using System;
using System.Collections;
using System.Configuration;
using System.Data;
using System.Linq;
using System.Web;
using System.Web.Security;
using System.Web.UI;
using System.Web.UI.HtmlControls;
using System.Web.UI.WebControls;
using System.Web.UI.WebControls.WebParts;
using System.Xml.Linq;
using System.Data.SqlClient;
using System.IO;
using System.Net;
using System.Net.Mail;
using System.Data.SqlClient;

public partial class Login : System.Web.UI.Page


{
SqlConnection con = new SqlConnection("server=.;database=webattendance;integrated
security=true;");
SqlCommand cmd;
protected void Page_Load(object sender, EventArgs e)
{

}
private void sms(string msg, string phone)
{
try
{
//string strUrl =
"http://api.mVaayoo.com/mvaayooapi/MessageCompose?user=selva.tamil84@gmail.com:smsdump&se
nderID=TEST SMS&receipientno=" + phone + "&msgtxt= " + msg + "&state=4";
//WebRequest request = HttpWebRequest.Create(strUrl);
//HttpWebResponse response = (HttpWebResponse)request.GetResponse();
//Stream s = (Stream)response.GetResponseStream();
//StreamReader readStream = new StreamReader(s);
//string dataString = readStream.ReadToEnd();
63
//response.Close();
//s.Close();
//readStream.Close();
}
catch (Exception ex)
{
}
}
public void mail(string emailid, string msge)
{
string email = emailid;
string pwd;

Random rp = new Random();


MailMessage msg = new MailMessage();
msg.To.Add(email);
msg.From = new MailAddress("hasidata@gmail.com");
msg.Subject = "Notification from E-Diary..";
pwd = rp.Next(11111, 99999).ToString();
msg.Body = msge;

SmtpClient cli = new SmtpClient("smtp.gmail.com", 587);


cli.EnableSsl = true;
NetworkCredential nc = new NetworkCredential("hasidata@gmail.com", "hasi@12345");
cli.Credentials = nc;
try
{
cli.Send(msg);
}
catch (Exception ex)
{ }
// Label1.Text = ("QRcode sent to user through Mail!!!!");

}
protected void btnSubmit_Click(object sender, EventArgs e)
{

if (txtPassword.Text == "Admin" && txtUsername.Text == "Admin" &&


DropDownList1.Text=="Admin")
{
Session["username"] = txtUsername.Text;
Server.Transfer("Adminhome.aspx");
// Response.TransmitFile("Adminhome.aspx");
}

//else if (txtPassword.Text == "Principal" && txtUsername.Text == "Principal"


&& DropDownList1.Text == "Principal")
//{
// Session["username"] = txtUsername.Text;
// Server.Transfer("Adminhome.aspx");
// // Response.TransmitFile("Adminhome.aspx");
//}
64
else
{

con.Open();
string sel = "select * from login where userid='" + txtUsername.Text + "' and
password='" + txtPassword.Text + "'";
cmd = new SqlCommand(sel, con);
SqlDataReader dr = cmd.ExecuteReader();
if (dr.Read())
{
Session["username"] = txtUsername.Text;
if (dr[2].ToString() == "Staff")
{
Session["uname"] = txtUsername.Text;
Server.Transfer("staffhome.aspx");

}
else if (dr[2].ToString() == "Student")
{
//send OTP
DataAccess da = new DataAccess();
// da.DBCmdOpen("insert into diary values ('" + DropDownList1.Text +
"','" + TextBox1.Text + "','" + ddlmode.Text + "','" + DropDownList2.Text + "','" +
TextBox4.Text + "','" + DateTime.Now.ToShortDateString() + "','" + Label1.Text + "')");
SqlDataReader drr = da.DBReaderOpen("select user_id,password from
student where user_id='" + txtUsername.Text + "' and password='"+txtPassword.Text +"'");
if (drr.Read())
{
Session["uname"] = txtUsername.Text;
Server.Transfer("student.aspx");
}
Panel1.Visible = true;

}
}
else
{
Response.Write("<script language='javascript'>alert('invalid
username,password')</script>");
}
con.Close();

}
protected void Button1_Click(object sender, EventArgs e)
{
if (TextBox1.Text == Label5.Text)
{
Server.Transfer("student.aspx");
}
}
protected void Button1_Click1(object sender, EventArgs e)
{
if (TextBox1.Text == Label5.Text)
65
{
Server.Transfer("student.aspx");
}
}
}

using System;
using System.Collections;
using System.Configuration;
using System.Data;
using System.Linq;
using System.Web;
using System.Web.Security;
using System.Web.UI;
using System.Web.UI.HtmlControls;
using System.Web.UI.WebControls;
using System.Web.UI.WebControls.WebParts;
using System.Xml.Linq;
using System.Data.SqlClient;
using System.Drawing.Imaging;
using System.IO;
using System.Net;
using System.Net.Mail;

public partial class leaveapply : System.Web.UI.Page


{
int count;
SqlConnection con = new SqlConnection("server=.;database=webattendance;integrated
security=true;");
SqlCommand cmd;

protected void Page_Load(object sender, EventArgs e)


{
lid();
txtuid.Text = System.DateTime.Now.ToShortDateString();
}
public void mail(string emailid, string msge)
{

}
protected void btnSubmit_Click(object sender, EventArgs e)
{
string gender = "";

con.Open();
if (rbmale.Checked == true)
{
gender = "Normal Leave";
}
else
{
gender = "Medical Leave";
66
}

string s = "insert into leaveapply values('" + TextBox1.Text + "','" +


txtName.Text + "','" + txtuid.Text + "','" + txtPassword.Text + "','" + txtPassword0.Text
+ "','" + txtdob.Text + "','" + gender + "')";
cmd = new SqlCommand(s, con);
try
{
cmd.ExecuteNonQuery();
Response.Write("<script language='javascript'>alert('Leave Application
Request sent successfully')</script>");
}
catch (Exception ex)
{ }

}
SqlConnection connection;
private void sms(string msg, string phone)
{

protected void DropDownList2_SelectedIndexChanged(object sender, EventArgs e)


{

}
protected void DropDownList1_SelectedIndexChanged(object sender, EventArgs e)
{

}
private void lid()
{
//con.Open();
//SqlCommand cmd1 = new SqlCommand("select max(lno) from leaveapply", con);
//TextBox1.Text = Convert.ToString(Convert.ToUInt32(cmd1.ExecuteScalar()) + 1);
//con.Close();
con.Close();
con.Open();
SqlCommand cmd = new SqlCommand("select count (*) from leaveapply", con);
cmd.ExecuteNonQuery();
count = Convert.ToInt16(cmd.ExecuteScalar()) + 1;
TextBox1.Text = count.ToString();
con.Close();
}
}

67
68

Das könnte Ihnen auch gefallen