Sie sind auf Seite 1von 94

INDEX

TABLE OF CONTENTS
1. Acknowledgement 2. Certificate 3. Objectives and scope of the Project. 4. Theoretical Background 5. Definition of the problem. 6. System Analysis & Design. 7. User Requirements 8. System Planning 9. Methodology adopted/System Implementation 10. Hardware and Software Requirements. 11. System Maintenance & Evaluation. 12. Cost and benefit analysis. 13. Detailed DFD, Life cycle of project 14. Input Output Screens design 15. Methodology used for System Testing. 16. Test Report, Printout of the report, Printout of the code sheet

Page No.
1 2 3 4 5 6 14 17 19 31 34 36 40 44 50 56

17. User/operational Manual including security aspects, rights & Backup 68 18. ANNEXURE a. About DOEACC Society Chandigarh 71 76 82

b. Data Dictionary & tables used in project c. Bibliography

Acknowledgement

I take this opportunity to express my deepest gratitude to those who have generously helped me in providing the valuable knowledge and expertise during my project development process.

I am thankful to Mrs. Anju Janeja for her thorough guidance right from day 1st till the end of the training by giving me the required guidance and removing any difficulties faced by me during the project.

I have tried my level best to see all aspects of the software used, i.e. (Asp.net framework 3.5).The illustrations of screens are accurate, clear, concise and lucid. Throughout the preparation of this documentation, the guiding objective has been to make it more useful for the readers

I thank them whole-heartedly for their expert guidance, Valuable suggestions, encouragement, and supervision. My sincere thanks also go to my parents and my friends for their ever- following love, care and timely guidance and encouragement.

Name: - Sunil Sharma Reg, No. 652179

DOEACC Society, Chandigarh Centre (A Unit of DOEACC Society) S.C.O 114-116, Sector 17B, Chandigarh.

CERTIFICATE
This is certified that the project entitled Education Portal is submitted in partial fulfillment of the requirement of A-LEVEL in DOEACC CENTRE, CHANDIGARH. Sunil Sharma, a bonafide student of the DOEACC Society, Chandigarh Centre under my supervision, has done this work. This work is fit for consideration of the said diploma (ALEVEL) to him.

Project Guide

Objectives & Scope of the Project

The website Project is developed to make ONLINE information available to all the students and Faculties of a College. The current project provides Necessary information to the users, students or administrative staff. It has information about the college, facilities available there, faculty details, different courses available in college, latest news about the college etc. Registered students can easily download their syllabus also can find their friends or can play quiz contests. Anonymous users can see the courses with their fees, find the job opportunities available in the college and can be member of website. Faculty members can find different information like information of students, course etc. After thoroughly analyzing the existing system the following objectives have been set:

Provide details of college. Student can download their syllabus easily. Student can play online Quiz contest. Students can see the news about college, exams. Information about holidays. Adequate security of the database Admin will see the information of students. Anonymous users can register on this site as a member of the site. Students can find their friends who are member of this college. Information about Courses and course fees. Users can see job opportunities.

Scope

This project will help students, academic staff and other concerned persons to easily get their queries .With online registration they can easily take admission. In future further modules can be attached with existing code without modifying or changing existing platforms This website is simple and easy to use and understandable for the users. This is a secure website from the prospective of security and privacy. All teachers can maintain their own profile separately. The benefits of the proposed system must also be evaluated. Benefits may be categorized as tangible or intangible.

Tangible benefits which are measured in money terms consist of the saving of

- Time and. certain operating costs.

Intangible benefits are more difficult to estimate and justify. They are often impossible to give a money value to.

These may include

-Satisfaction of the professionals and students Efficiency.

Theoretical Background
Everybody wants to be on the top, Information plays very crucial role. As fast as information is accessed and processed, it can give good results. Today internet is the fast way of transferring data and information over wide area, hence I have used internet as a way for exchanging information. Computerized system helps to fulfill these goals. Computerization of the official works will help in doing lot of manual work quickly. It will help in easy storage and access of all information, in short period of time.

Definition of Problem
Existing System: In existing system there was no benefit for students to online register, in previous system students have to fill the forms to get their name in merit list after that selected students have to visit college again to get admission. They have to align in long quae to register them; its very slow process which takes many days and wastage of time. Existing system had so many problems and is static method.

PROPOSED SYSTEM:
The proposed system handles all the faults of the existing system. In the proposed system everything is done dynamically. Students can get admission fast on the bases of online registration. They will download their syllabus from the website. Student and professional have also judged them self giving online test for our website. It will helpful for the job seekers because now they will see the job opportunity in our college also. Proposed system is very easy to handle for administration.

CONCLUSION:
From the initial study we concluded that the students and the teachers were facing various kinds of problems to get information and updating. So the proposed system is helpful in solving their problems.

System Analysis and Design


INTRODUCTION:
System analysis is the process of studying the business processors and procedures, generally referred to as business systems, to see how they can operate and whether improvement is needed. This may involve examining data movement and storage, machines and technology used in the system, programs that control the machines, people providing inputs, doing the processing and receiving the outputs.

SOFTWARE DEVELOPMENT LIFE CYCLE


The first step in the Software Development Life Cycle (SDLC) is the preliminary investigation to determine the feasibility of the system. The purpose of the preliminary investigation is to evaluate project requests. It is not a design study nor does it include the collection of details to describe the business system in all aspect. Rather it is the collection of the information that helps committee members to evaluate the merits of the project request and make an informed judgment about the feasibility of the proposed project.

FEASIBILILTY ANALYSIS Feasibility study is done so that an ill-conceived system is recognized early in definition phase. During system engineering, however, we concentrate our attention on four primary areas of interest. This phase is really important as before starting with the real work of building the system it was very important to find out whether the idea thought is possible or not. Economic Feasibility: An evaluation of development cost weighted against the ultimate income or benefit derived from the developed system. Technical Feasibility: A study of function, performance and constraints that may affect the ability to achieve an acceptable system. Operational Feasibility: A study about the operational aspects of the system.

ECONOMIC ANALYSIS

Among the most important information contained in feasibility study is Cost Benefit Analysis and assessment of the economic justification for a computer based system project. Cost Benefit Analysis delineates costs for the project development and weighs them against tangible and intangible benefits of a system. Cost Benefits Analysis is complicated by the criteria that vary with the characteristics of the system to be developed, the relative size of the project and the expected return on investment desired as part of companys strategic plan. In addition, many benefits derived from a computer-based system are intangible (e.g. better design quality through iterative optimization, increased customer satisfaction through programmable control etc.)As this is an in-house project for the company, to be used for its own convenience and also it is not that big a project. So neither it requires a huge amount of money nor any costly tools or infrastructure need to be set up for it.

TECHNICAL ANALYSIS During technical analysis, the technical merits of the system are studied and at the same time collecting additional information about performance, reliability, maintainability and predictability. Technical analysis begins with an assessment of the technical viability of the proposed system. What

technologies

are

required

to

accomplished

system

function

and

performance? What new materials, methods, algorithms or processes are required and what is their development risk? How will these obtained from technical analysis form the basis for another go/nogo decision on the test system? If the technical risk is severe, if models indicate that the desired function cannot be achieved, if the pieces just wont fit together smoothly-its back to the drawing board. As the software is very much economically feasible, then it is really important for it to be technically sound. The software will be build among: MS SQL SERVER as Back End ASP.NET as Front End 8

INVESTIGATION PHASE

The investigation phase is also known as the fact-finding stage or the analysis of the current system. This is a detailed study conducted with the purpose of wanting to fully understand the existing system and to identify the basic information requirements. Various techniques may be used in fact-finding and all fact obtained must be recorded.

A thorough investigation was done in every effected aspect when determining whether the purposed system is feasible enough to be implemented.

The preliminary investigation should accomplish the following objectives. Clarify and understand the project request. Determine the size of the project. Assess costs and benefits of alternative approaches. Determine the technical and operational feasibility of alternative approaches.

As it was essential for us to find out more about the present system, we used the following methods to gather the information: -

Conducting the investigation


The data that the analysts collect during preliminary investigations are gathered through three primary methods: Reviewing organization documents Onsite observation Conducting interviews

On-site observations
Another important technique to collect data is on-site observation. The purpose of the on-site observation is to get as close as possible to the real system being studied. During on-site observation, office environment can be seen, work load, method of work and facilities provided by the organization to the users can be studied. 9

Conducting interviews
Interviews allows learning more about the nature of the project request and reasons for submitting it. Interviews should provide details that further explain the project and show whether assistance in merited economically, operationally and technically.

1. On site observation: - Necessary to see the way the system works first hand. It brings out the actual picture of working system.

2 Document sampling: - These are all the documents that are used in the

system.

They are necessary to check all the data that enters and leaves the system.

3 Questionnaires: - These were conducted to get views of the other employees who are currently employed in the system.

10

ANALYSIS OF THE INVESTIGATION


Strengths of the System 1. No complex equipment: - The equipment that is used is very simple and no special skills have to be mastered to be able to operate the system. Therefore no training is required for the employees. 2. Low cost: There is little money spent in maintaining the present system other than 0buying the necessary office equipment and the ledgers.

CONSTRAINTS AND LIMITATIONS

The constraints and limitation within a system are the drawbacks that occur during the implementation of the system. These limitations and constraints can crop up in almost every system; the most important fact is to find a way to overcome these problems. Software design is the first of three technical activities design, code generation, and test that are required to build and verify the software. Each activity transforms information in manner that ultimately results in validated computer software. The design task produces a data design, an architectural design, an interface design and component design. The design of an information system produces the details that clearly describe how a system will meet the requirements identified during system analysis. The system design process is not a step by step adherence of clear procedures and guidelines. When I started working on system design, I face different types of problems; many of these are due to constraints imposed by the user or limitations of hardware and software available. Sometimes it was quite difficult to enumerate that complexity of the problems and solutions thereof since the variety of likely problems is so great and no solutions are exactly similar however the following consideration I kept in mind during design phased.

11

SYSTEM DESIGN
INTRODUCTION: System design is the process of developing specifications for a candidate system that meet the criteria established in the system analysis. The plan of the project provides a review of the different modules in which the project is divided. The modules are designed and tested individually and then merged together to form an integrated project. Major step in system design is the preparation of the input forms and the output reports in a form applicable to the user. The main objective of the system design is to make

the system user friendly. System design involves various stages as: Data Entry
Data Correction Data Deletion Processing Sorting and Indexing Report Generation

System design is the creative act of invention, developing new inputs, a database, offline files, procedures and output for processing business to meet an organization objective. System design builds information gathered during the system analysis.

The characteristics associated with effective system operations are:


Accessibility Decision Making Ability Economy Flexibility Reliability Simplicity

Success is a new system pivots on its acceptance or non-acceptance by the organization.

12

Personnel:
If the operating system is convinced that the new system will not benefit them, it appears one, and the system is in serious trouble. To overcome this resistance participation by operating personal during all phases of the changeover is necessary because they constitute the organization, which must use alive in with newly design system. An effective system produces not only information at the lowest cost pertinent and timely for making decision.

The different types of tables being used are: tbclass tbcat tblogin tbjob_opr tbsession tbsyllabus tbnews tbquiz tbadm tbcnt tbst tbct tbadm tbregn tbtemp tbmem tbl_coursedtl tbcurse_fees tbcourse_clg

Table Database The various roles through which the data flows used in the project are: 1) Administrator(Principal) 2) Teachers 3) Students (Simple User)

13

DATABASE DESIGN: The overall objective in the development of the database technology has been to treat data as an organizational resource and as an integrated whole. Database management system allows data to be protected and organize separately from other resources. Database is an integrated collection of data. The most significant of data as seen by the programs and data as stored on the direct storage access storage devices. This is the difference between logical and physical data. The organization of data in the database aims to achieve free major objectives: Data Integration Data Integrity Data Independence

The databases are implemented using a DBMS package. Each particular DBMS has unique characteristics and general techniques for Database Design. The proposed Management Information System stores the information relevant for processing in the Microsoft SQL Server Database. This MS SQL Server contains tables; where each table is containing fields or column. A table also contains records which is a set of fields. All records, in a table the same set of fields with different information. Each table contains key fields that establish relationships in a MS SQL server database and how the records are stored. There are primary key fields that uniquely identify a record in a table. There are also fields that contain the primary key from another table called foreign keys. It is a known fact that the program cannot be written until the data are defined, so the database must be defined. The starting point for this process is data dictionary. The records data structures and elements to be stored in each database are identified and extracted. Next the analyst codes the source statements library. Eventually, the programmer will incorporate the source code into the various programs, thus assuring consistency and simplifying the coding process. The databases have been designed in such a way that there is no duplication of information and loss of information.

14

Design objectives:The primary objective of the design is to deliver the requirements as specified in the feasibility report. These are the some of the objectives, which I kept in mind.

Practicality: The system is quite stable and can be operated by the people with average intelligence.

Efficiency: I tried to involve accuracy, timeliness and comprehensiveness of the system output.

Cost: It is desirable to aim for the system with a minimum cost subject to the condition that it must satisfy the entire requirement.

Flexibility: I have tried that the system should be modifiable depending on the changing needs of the user. Such modifications should entail extensive reconstructing or recreation of software. It should also be portable to different computer systems.

Security: This is very important aspect which I followed in this designing


phase and tried to covers the areas of hardware reliability, fallback procedures, and physical security of data.

15

User Requirement Analysis


1. Functional Requirements:
1.1 The portal will ask for the details of the user to be entered, to know the category user belongs to, he will be needed to enter his/her details then user name and password will be allotted by the administrator after checking the details entered.

1.2 The administrator gives you username and password with the help of this you can log in

1.3 The user can search articles, post article and other important information.

1.4 The user can also post your question & and see the reply of the other question.

1.5 The administrator of the system will be responsible to post the latest information on the web page.

1.6 The concept of Master Pages and Content Pages is used.

1.7 User can also judge himself by giving online text.

16

2. Non-functional Requirements: 2.1.


Portability:

The system will be designed to be portable across popular Windows OS.

2.2.

Extensibility:

The system should be extensible to add universities and users for more expansion.

2.3.

Re-Usability:

The systems code could be reused to add further new features if need to be added in future.

2.4.

Reliability and Availability:

System shall be able to deliver the required in reliable manner.

2.5.

Software Upgradeability:

System is to be developed in phases, so it shall be easily upgradeable to include the new items in the database.

3. User Interface Requirements:


3.1 Log in screen: Every user whether member, admin or any other will have to first log in to the site. 3.2 Home page: After logging in, the users will be in their respective home pages.

17

SYSTEM SECURITY
System security is a vital aspect when it comes to developing a system. The system should ensure the facility of preventing unauthorized personnel from accessing the information and the data within the system. The system should provide total protection for each users information so that the integrity of data is sustained and also prevent hackers from hacking the system. Proposed system ensures the security and the integrity of data. Providing a password login system for each authorized users does this. For example the System Administrator has access to all kinds of information. By providing this facility information is properly managed and information is protected. For example the system administrators day-to-day tasks are lessened and easier because he doesnt have to have a constant eye on the system and worry about hackers hacking the system.

18

SOFTWARE REQUIREMENT SPECIFICATION

The software requirement specification is produced at the culmination of the analysis task. The introduction to software requirements specification states the goals and objectives of the software, describing it in the context of the computer based system. The Information Description provides a detailed description of the problem that the software must solve. Information content, flow and structure are documented. A description of each function required to solve the problem is presented in the Functional Description. Validation criteria are probably the most important and ironically the most often neglected section of the software requirement specification. Software requirement specification can be used for different purpose. Here are the major uses.

Statement of user needs: A main purpose of the product specification is to define the need of the products user. Sometimes, the specification may be a part of a contract sign between the producer and the user. It could also form part of the user manuals. A users needs are sometimes not clearly understood by the developer. If this is the case, a careful analysis involving much interaction with the user should be devoted to reaching a clear statement of requirements, in order to avoid possible misunderstandings. Sometimes, at the beginning of a project, even the user has no clear idea of what exactly the desired product is. Think for instance of user interface , a user with no previous experience with computer products may not appreciate the difference between , say menu driven interaction and a command line interface. Even an exact formation of system functions and performance may be missing an initial description produced by an inexperienced user.

19

System Planning
Knowledge of colleges management
Knowledge of colleges management helps the Professionals and the Students to fulfill their needs. Online admission knowledge is a computerized, online solution to the various problems faced by Students or may be or professionals wishing to Increase their Knowledge Base, and regime in their respective field. There two type of user in the online tutorial system one is the register user (Member, Admin) and another is the nonregister user (Students. Professionals) .

What the register user have to do?


First of all the user will register themselves as members. As a member they can place the information regarding them and also they can specify their particular field of specialization or interest. Then our member of the site can post news. Administrator the other register user has performed some important task. He can validate the member and assign them their user name and password. He can add some new category and new class with the help of dynamic class form and dynamic category from. He can post question and their answer for online test. He can administrate the whole system as a super user. He can also upload some files.

What the un-register have to do?


The un-register users are students and everyone who want to get admission online. They can play online quiz and check their correct answers. They can view the updates syllabus and download it from website. They can view the updated news about college. They can get some knowledge about college. Main advantage of this website is online admission.

20

(PERT- CHART)
Activity No. Activity Name

Caption Time (Hrs.)

0 0
Analysis 50 Hrs.

1 50
Designing 50 Hrs. Coding 100 Hrs.

2 100

5 350
Implementation 50 Hrs. Maintenance

4 300
Testing 100 Hrs.

3 200

6
On going

21

Methodology Adopted
Why .NET? 1. Interoperability between languages and execution environments 2. Uniformity in schema or formats for Data Exchange using XML, XSLT. 3. Extend or use existing code that is valid 4. Programming complexity of environment is reduced

The .NET Framework is 1. A component model for the internet 2. The new approach to building large scale distributed systems for the Internet 3. Provides the capability to integrate multiple devices
4.

Built around the tools and protocols (XML, WSDL, SOAP, HTTP) that are

becoming standard on the Internet The .NET in ASP.NET stands for the .NET Framework, a set of objects and blueprints from Microsoft for building applications. All applications developed under the .NET Framework; including ASP.NET applications, have certain key features that ensure compatibility, security, and stability. Common Language Runtime (CLR) is an environment that manages the execution of code. With the .NET Framework and CLR, we write code and compile it. However, instead of compiling it into the computer understands, we compile it into a language called Microsoft Intermediate Language (MSIL). When we compile to MSIL, your application produce something called metadata. This is descriptive information about your application. It tells what the application can do, where it belongs, and so on. When you want to run your program, the CLR takes over and compile the code once more into the computers native language. This way MSIL can go on any type of computer. The CLR can speak many different computer languages and does all the compiling for you. Once you compile your application, you can bring it to any other computer. CLR also provides services such as error handling, security features, versioning and deployment support, as well as cross-language integration. That means 22

we can choose any language we want to write our .NET applications, including ASP.NET applications.

Fig: - .NET Framework Architecture

The .NET Framework Design Goals 1. 2. 3. 4. 5. 6. Component Development for the Internet "Cross-Language Development Inheritance, Debugging, Exception handling Reliability and Security Simple Development and Deployment Device-agnostic

23

ASP.NET:

ASP.NET is a technology that allows us to build and control dynamic Web pages easily. It also provides many enhancements to take advantage of new technology as we can interact with databases, personalize Web pages for visitors, display page on mobile devices (such as cell phones), and even build an entire e-commerce site from scratch. Previously Internet works on request/response model that is an integral part of client/server model. Although this is a marvelous way of communicate and distribute information, it's rather simple and static. When the process is over, once client receives the requesting page from the server the server has no idea what the client is doing unless it makes another request. There is another model for communicating between server and clients, known as event-driven model.ASP.NET work on this model, it detects action and responds to them i.e. the server waits around for something to happen on the client. Once it does, the server takes action and performs some piece of functionality. Of course, a Web, server cannot know what you are thinking, but it can respond to your actions. If you type some text on Web page, the server responds to it. If you click an image, the server responds.

24

COMPARISON OF ASP AND ASP.NET:


Classic ASP was built on the top of the Windows operating system and IIS

(Internet Information Server). It was always a separate entity, and therefore its functionality was limited. ASP.NET, on the other hand, is an integral part of the system under the .NET Framework. It shares many 9f the same objects that traditional applications would use and all .NET objects available for ASP. NETs consumption.

Instead of being limited to six inherent objects in ASP, ASP.NET has a

plethora of useful components it can build form.

ASP also made it abundantly clear that client and server were two

separate entities, Whereas ASP. NET ties together the client and the server through clever use of server-side and client-side code, all invisible to the developer.

ASP.NET code is compiled, whereas classic ASP used interpreted

scripting languages. Using compiled code means an automatic boost in performance over ASP applications.

In classic ASP, nearly all of the code was executed in code render blocks

(that is, inside <%...%> tags). In ASP.NET, this type of code isnt compiled and isnt recommended for frequent use. Instead, you use the code declaration blocks, which are compiled and provide better performance.

25

Following are some of the significant new features of ASP.NET:

ASP.NET uses compiled code written in Common Language Runtime languages such as Visual Basic and C#. Unlike previous versions of Active Server Pages, this version does not use interpreted scripting languages such as VBScript.

ASP.NET pages are built out of server-side controls. Web server controls enable you to represent and program against Hypertext Markup Language (HTML) elements using an intuitive object model.

ASP.NET includes a new technology called Web Services. You can use Web Services to access methods and properties and transfer database data across the Internet.

ASP.NET is part of Microsoft's .NET Framework. You can access thousands of .NET classes in your code that enable you to perform such wondrously diverse tasks as generating images on-the-fly and saving an array to a file.

ASP.NET includes page and data caching mechanisms that enable you to easily and dramatically improve the performance of your Web site.

26

DBMS (Data Base Management System)

SQL SERVER:
SQL Server is an SQL-compliant RDBMS. SQL-compliant means it use the ANSI (American National Standard Institute) version of Structured Query Language or SQL. Structured Query Language is a command that allow us to modify or retrieve information from the database. Client server means that SQL Server is designed to store data in the central location (the server) and deliver it on demand to numerous other locations (the client). SQL Server is also a Relational Database Management System (RDBMS).

FEATURES OF SQL SERVER 2000:


Information representation Unique definition of rows Systematic treatment of Null values Guaranteed access High level Update, Insert, and Delete Retrieving information from the database. Accepting query language statements. Enforcing security specifications. Enforcing data integrity specifications Enforcing transaction consistency Managing data sharing Optimizing queries Managing System catalogs

27

Enterprise Manager:
SQL Server Enterprise Manager is a graphical tool that allows easy configuration and management of Microsoft SQL Server and SQL 2000 program group. SQL Server Enterprise Manager can also be used to: Manage logins, permission and users. Create a database Take back up of database and transaction logs. Manage tables

Query Analyzer:

The SQL Server Query Analyzer allows us to create adhoc queries and run them interactively. We may also execute Transact-SQL statements stored in text file and view the result in result plane or result grid. The Query Analyzer also has a color-coded editor to assist the user with checking of syntax. It also has context sensitive help.

Queries are processed in two steps:

Interpret- First the Queries are checked for syntax. Execute- Then the processing take place.

28

System Implementation
INTRODUCTION:
Implementation is the stage in the project where the theoretical design is turned into the working system and is giving confidence to the new system for the users i.e. will work efficiently and effectively. It involves careful planning, investigation of the current system and its constraints on implementation, design of method to achieve the change over, an evaluation, of change over methods. A part from planning major task of preparing the implementation is education of users. The more complex system is implemented, the more involved will be the system analysis and design effort required just for implementation. An implementation coordinating committee based on policies of individual organization has been appointed. The implementation process begins with preparing a plan for the implementation for the system. According to this plan, the activities are to be carried out; discussions may regarding the equipment have to be acquired to implement the new system. Implementation is the final and important phase. The most critical stage is in achieving a successful new system and in giving the users confidence that the new system will work and be effective. The system can be implemented only after thorough testing is done and if it found to working according to the specification. This method also offers the greatest security since the old system can take over if the errors are found or inability to handle certain types of transaction while using the new system. At the beginning of the development phase a preliminary implementation plan is created to schedule and manage the many different activities that must be integrated into plan. The implementation plan is updated throughout the development phase, culminating in a change over plan for the operation phase. The major elements of implementation plan are test plan, training plan, equipment installation plan, and a conversion plan.

29

There are three types of implementation: o A manual System will be replaced into computerized system. o An existing system will be replaced by a new Computer System. o An existing application modifies and uses on same machine (Computer).

Successful implementation may not guarantee improvement in the organization using the new system, but improper installation will prevent it. It has been observed that even the best system cannot show good result if the analysts managing the implementation do not attend to every important detail. This is an area where the systems analysts need to work with utmost care.

IMPLEMENTATION TOOLS: Training personnel Conversion Procedures Post-implementation review

Training of Personnel involved with system

Even well designed system can succeed or fail because of the way they are operated and used. Therefore, the quality of training received by the personal involved with the system in various capacities helps or hinders and may even prevent the successful implementation of management information system.

Those who are directly or indirectly related with the system development work must know in detail what must know in detail what their roles will be, how they can make efficient use of the system and what the system will or will not do for them. Both system operators and users need training.

30

System Operators Training Running of the system successfully depend on the personnel working in the Computer Centre. They are Responsible for providing the necessary support. Their training must ensure that they are able to handle all possible operations, both routine and extra-ordinary in nature. If the system calls for the installation of new equipment, such as new computer system, special terminals or different data entry machines, the operators training should include such fundamentals as how to turn the equipment on and use it, how to power off and a knowledge of what constitutes normal operations. The operators should also be trained on different type of malfunctioning, how to recognize them and what steps should also be taken whenever they arise.

User Training
User may be trained on use equipment, particularly in the case where, e.g. a micro computer is in use and individual involved is both operator and user. In such cases, user must be given training on how to operate and user. In such cases, user must be given training on how to operator the system also. Questions that may be trivial to the analyst, such as how to turn on a terminal, how to insert a diskette into a micro-computer or when it is safe to turn off equipment without danger of data loss are significant problems to new users who are not familiar. In most of the cases user training deals with the operation of the system itself, with proper attention given to data handling techniques. It is imperative that users be properly trained in methods of entering transaction, editing data, formulating inquiries, deleting and inserting of records. No training is complete without familiarizing users with simple systems maintenance activities. Weakness in any aspect of training may lead of awkward situation that creates user frustration and error. Conversion Methods A conversion is the process of changing from the old system to the new one. It must be properly planned and executed. Four methods are common in use. They are Parallel Systems, Direct Conversion, Pilot System and Phase In method. Each method should be considered in the light of the opportunities that it offers and problems that it may create. In general, system conversion should be accomplished in shortest possible time. Long conversion periods create problems for all persons involved including both analysts and users. 31

Parallel systems: The most secure method of converting from an old to new system is to run both systems in parallel. This method is safest one because it ensures that in case of any problem in using new system, the organization can still fall back to the old system without the loss of time and money. The disadvantages of parallel systems approach are: It doubles operating costs The new system may not get fair trial.

Direct conversion: This method converts from the old system to new system abruptly, sometimes over a weekend or even overnight. The old system is used until a planned conversion day, when it is replaced by the new system. Pilot system:

Pilot approach is often preferred in the case of the new system which involves new techniques or some drastic changes in organization performance. In this method, a working version of the system is implemented in one part of the organization, such as a single work area or department. Phase IN- method:

This method is used when it is not possible to install a new system throughout an organization all at once. The conversion of files, training of personnel or arrival of equipment may force the staging of the implementation over a period of time, ranging from weeks to months.

32

CONCLUSION
The system has been developed for the given condition and is found working effectively. The developed system is flexible and changes whenever can be made easy. Using the facilities and functionalities of .Net, the software has been developed in a neat and simple manner, thereby reducing the operators work. The speed and accuracy are maintained in proper way. The user friendly nature of this software developed in .Net framework is very easy to work with both for the higher management as well as other employees with little knowledge of computer. The results obtained were fully satisfactory from the user point of view. The system was verified with valid as well as invalid data in each manner. the system is run with an insight into the necessary modifications that may require in the future. Hence the system can be maintained successfully without much network.

33

Details of Hardware and Software Used


.NET Framework System Requirements
To ensure adequate performance, .NET Framework has the following minimum and recommended system requirements for client and server applications:

Operating System Requirements:

The .NET Framework is supported on the following platforms:


----------------------------------------------------------------------------------------------------Scenario Client Operating System MS Windows 98 MS Windows 98 Second Edition MS Windows Millennium Edition MS Windows NT 4.0 Workstation with service pack 6.0a or later MS Windows NT 4.0 Server with service pack 6.0a or later MS Windows 2000 Professional MS Windows 2000 Server MS Windows 2000 Advanced Server MS Windows 2000 Datacenter Server MS Windows XP Home Edition Professional MS Windows Server 2003 Family Note: On all these systems, MS Internet Explorer 5.01 or later and MS Windows Installer 2.0 or later are also required. ----------------------------------------------------------------------------------------------------

Server

MS Windows 2000 Professional 34

MS Windows 2000 Server with service pack 2.0 MS Windows 2000 Advanced Server with service pack 2.0 MS Windows 2000 Datacenter Server with service pack 2.0 MS Windows XP Professional MS Windows Server 2003 Family

Additional Software Requirements:

To use additional features such as ASP.Net, COM+ services and SQL Server .NET Data Provider, you will need the following additional softwares: ----------------------------------------------------------------------------------------------------Scenario Client Provider Access to system management Feature SQL Server .Net Data Required Software MS Data Access Components (MDAC) 2.6 or later Windows Management Instrumentation (WMI) (installed with OS on Windows 2000, Windows Millennium Edition and Windows XP) COM+ Services Windows 2000 with service Pack 2.0 Server Provider ASP.Net SQL Server .Net Data MS Data Access Components (MDAC) 2.7 MS Internet Information Services (IIS) 5.0 35 ----------------------------------------------------------------------------------------------------

Hardware Requirements
----------------------------------------------------------------------------------------------------Scenario Required Client Processor Recommended Required RAM Recommended 64 MB* 128 MB or higher

---------------------------------------------------------------------------------------------------Pentium 500 MHz* Pentium 1 GHz

Server Pentium 667 MHz* Pentium 1 GHz

128 MB* 256 MB or higher

* Or the minimum required by the operating system, whichever is higher.

36

System Maintenance & Evaluation


MAINTAINENCE

Software system maintenance covers a wide range of activities, including correcting coding and design errors, updating documentation and test data and upgrading user support. It is the process of changing the system to maintain its ability to survive. The system design can adopt any of the under given system maintenance strategies. Corrective Maintenance The design software can be maintained by corrective maintenance that is concerned with fixing reported errors in the software. Coding errors are relatively cheap to fix as compared to design errors and requirement errors. The requirement errors are more expensive, as redesigning of the entire system is to fix them. Adaptive Maintenance The design software can be maintained by adaptive maintenance if case there is a need to change the system environment such as a different hardware platform or for using it with different operating system. Predictive Maintenance The design system can be maintained by predictive maintenance if there is need to implement new functional requirements. They are generated due to the changing requirements of the software customers as their organization or business changes.

Maintenance of the system follows the following steps System Documentation System documentation is a process that emphasizes on documentation the requirement, design, plan, code implementation and testing of the system as whole. In a product life cycle, there will be a number of documents like requirements specification design, documents, user manuals, release documents etc. that will be generated. The types of documentation that are covered under system documentation also include training material, user manuals, operations manual, and release document. The documentation will be reviewed and approved by concerned users of the documentation. The purpose of the system documentation process is to develop and maintain the documentation that will be used to install and operate the product. This process also ensures that the documentation developed is synchronized with latest product release. 37

Our product document typically consists of the following:


Deliverable (file name size etc.): It includes the code after making changes in the original code. Test Summary Report: It includes the result generated by executing the test cases designed by us and the test cases given to us by the customer and transporter. List of all the corresponding changes made in the existing code and reason why the changes are necessary.

These documents not only ensures that the system is well designed and is fully complaint with the needs of the user but also helps in further maintenance programmers of the software system. A well-documented system helps the maintenance of the software by providing the maintenance programmers and insight. Evaluation part involves the detailed study of the purposed system and its working and performance report or description. This evaluation report can help to update the system more specific and efficient for the better performance and lees time requirements to complete the process. The detailed study also helps to make data more accurate and integrated also. The evaluation of purposed system measures the system performance against the predefined requirements and help to review whether the system is meeting expectations and requirements POST IMPLEMENTATION REVIEW After the system is implemented and conversion is complete, a review should be conducted to determine whether the system is meeting expectations and where improvements are needed. A post implementation review measures the systems performance against predefined requirement. It determines how well the system continues to meet the performance specifications.

38

Cost and Benefit Analysis:


The various costs evaluated include: Equipment Costs. This includes capital and leasing costs of Computer and peripherals. The initial systems supplies. (E.g. disks, tapes, etc.) Additional hardware. UPS and Voltage Regulators. The purchasing of software. (Programming, DB and OSs) 2Consulting work. System analysis and programming.

Development Costs. -

Installation Costs. Preparation of the computer room. (E.g. wiring, air-conditioning, etc.) Accommodation (e.g. new building or building alteration, Etc.)

Personal Costs. Staff training. (Assumption: we will be incurring the cost to train the employees in the Proposed Hospital System) Staff recruitment or relocations. Staff salaries. Redundancy payments.

Operating Costs. Consumable (e.g.- tapes, disks, stationery) Accommodation costs. Power. Insurance. Telecommunications. Standby arrangements.

39

OPERATIONAL FEASIBILITY A proposed system is beneficial only if it can be turned into an information system that will meet the operational requirements of an organization. A system often fails if it does not fit within existing operations and if users resist the change.

Important issues a systems developer must look into are: Will the new system be used if implemented in an organization? Are there major barriers to implementation or is proposed system accepted without destructive resistance? The whole purpose of computerizing the Placement System is to handle the work much more accurately and efficiently with less time consumption. There will be additional work to be completed, because now the students and the companies can update their resumes and profiles online. Their database is maintained separately.

Compared to the semi-computerized system the chances of avoiding errors in a computerized system is much higher because the user need not stress himself unnecessarily resulting in recklessness. Unlike the semi-computerized system There would be backup data for all the information concerning the daily transactions occurred within the organization. If we are considering the performance and response time for each task, it is very much faster since there is less paper work to be completed. When entering data into the system to relieve the user from additional work and typing incorrect data, the system provides options such as combo boxes, check boxes, option buttons and etc. if the users type in incorrect data they would be informed immediately about the error by the error detection control. Another important fact to be regarded is the security control, which is handled by the system. Since data regarding each student and the company is confidential, security is a key issue. Information falling into the wrong hands could jeopardize the entire organization. Unlike in semi-computerized systems the proposed system offers adequate control to protect the organization against fraud and embezzlement and guarantees the accuracy and security of data and information. This is handled by the system providing each department and individuals with separate login names and passwords.

40

The new system is user-friendlier, which enables the end-user to complete his/her work efficiently and accurately with interest. After taking the above fact into consideration we can state the operating of the proposed system within the organization is feasible. In this phase of the feasibility study the following two main topics Technical Performance Aspect Acceptance within the organization

Technical performance aspect is explained in the technical feasibility report and there is no new information is needed in this to explain it again, but as for the acceptance within the organization the following points are important and those are explained according to the topics 1. Whether the system provides right information to the right place.

In the current system, which is the semi, computerized system the information may be lost in the process of sending from one place to another. This is mainly due to human interaction in the process of the transferring information from one place to another. 2. Whether the new system affect the current users in the system The new proposed system will affect the users in the following areas Accuracy Efficiency Productivity Robustness Lesser time consuming

3. Skill and attitude This system is developed according to the experience of the current employees and the management structure, so for this system to function within the current employee community. The employees do not need to have new skills other than the skills, which are gained in the current system.

4. Job restructuring and training For the new system to have an effect in the organization the employees should be give a proper training in operating the software and computer systems. If the employee does not have the minimal experience should be given the proper training If the organization is reluctant to give a full training to the employees who require the full knowledge organization can restructure the structure of the departments. 41

TECHNICAL FEASIBILITY Based on the outline design of system requirements in terms of inputs, outputs, files, procedures and staff, the technical issues raised during technical feasibility include: Does the necessary technology exist to do what is proposed? Does the proposed equipment have the technical capacity to hold the data required to use in the new system? Adequate responses provided by the proposed system? Is the system flexible enough to facilitate expansion? Is there any technical guarantee of accuracy, reliability, ease of access and data security? The system developers task is to view needed capabilities in light of currently available technology. Since the existing system is semi-computerized it is clear to us that there is no efficiency in the use of technology within the organization. The solution is the implementing the new computerized system, which works hand in hand with high technology. A database has to be maintained in order to update and backup data whenever a transaction occurs. To create databases we use SQL server.

After taking the above facts into consideration we can state that the new proposed system is technically feasible.

42

Detailed DFD Lifecycle


DATA FLOW DIAGRAMS
It is a way of expressing system requirement in a graphical form; this leads to a modular design. It is also known as bubble chart, has the purpose of clarifying system requirements and identifying major transformations that will become program in system design. So it is the starting point of the design phase that functionally decomposes the requirement specifications down to the lowest level of details. A DFD consist of a series of bubbles joined by lines. The bubbles represent data transformation and the lines represent data flows in the system.

43

Context Diagram

Member Playing quiz, Find Friend, Notice board and Job opportunities

Admin

Database Authentication

Information

Access

EDUCATION PORTAL WEBSITE


Job opportuni ties, Notice Boar, Our Patrons

Access Identifier

Edit and updates

Teacher

Request
For registration

Quiz Unregistered users Course detail

Job Opportunities

Notice Board

44

DEFINITION
Diagram which shows the working of the College Management

Unregistered
Request for registration Job Opportunities

Registration

Course & fees detail College patron

Record Update

Access identifier

Register user record Edit and updating Information

Inform ation
Notice Board News updates

WEBSITE
Job updates

ADMIN Request for Registration

JOB Opportunities

Approval

Access Identification Registered User

TEACHERS

Registered

45

Diagram which shows the working of the College Management

Un-Registered USER

Registrati on Job Opportunities

WEB SITE

News Events on Notice Board

Login Page

College Patrons Registration with the site

Registered Users Administrator

Verifies and Assigns ID and Password

46

Input /Output Screen Design


Screen no. 1: This is the home page of current website user will see the
information about our college. And user will also some rules and regulation of college. User will see different types of links on home page. These links are:1. Home 2. Login 3. Registration 4. Course Detail 5. Special Offers 6. Placements 7. Careers 8. Membership 9. Contact us

47

Screen No.2: This is Login Page. Users will login from this page with their ID. On this page
users will see the extra buttons from Home Page. There are three buttons LOGIN, FROGET PASSWORD, and SIGNUP button. In this website there are three types of users ADMIN (PRINCIPAL), TEACHERS, STUDENTS/MEMBERS. In this website role base security is implemented for different users. STUDENTS/MEMBERS cannot see the login detail of teachers. And teachers cannot see the Login detail of principal. Forget password button is used for recover the password and sign up button is used for create the new account for students or members.

48

Screen no 3: This page is used for downloading. But this page is under security
only students or members of our website can download their syllabus from this page.

49

Screen no.4:

This screen used for online quiz contest and gives online test and

checks their correct answer also.

50

Screen no. 5:- On this page user can see the detail of Job opportunity in college. This page
will open from careers link button. Only valid records will show on this page. Valid records means in between the date which will be seen on this page. This page is dynamic. Admin will update this page according to the time of vacancies in college.

51

Screen no 6: This is online registration page. Students will take online


registration with the help of this registration page.

52

Screen no.7: If students forget their password they can recover their password by
giving the answer of following question

53

Screen no.8: Users can also see the previous patrons of college with the help of
this page.

54

METHODOLOGY USED FOR TESTING


INTRODUCTION:

The purpose of system testing is to identify and correct errors in the candidate system. Testing is and important element of software quality assurance ad represents the ultimate review of specification, design and coding. The increasing visibility of the software as a system element and the cost associated with a software failure are motivated forces for well planned, through testing System testing was conducted in order to detect errors and for comparing then the final system with the requirement specification reports, i.e. whether the system meets requirements. During testing the software was executed with the set of test cases and the output of programs for the test cases was evaluated to determine if the program is performing as it was expected to.

Testing presents an interesting challenge for the software engineers attempt to build software from an abstract concept to an acceptable implementation. In testing engineer create a series of test cases that occurs when errors are uncovered. Testing is the process of executing a program for finding errors. A good test is one that has the high probability of finding an uncovered error. A successful error is one that uncovers undiscovered errors.

The term error is used to refer the difference between actual output of the software and the current output. Fault is a condition that causes the software to fail to perform its required function. Software reliability is defined as a required function. Software reliability is defined as the probability that the software will not undergoes failures for a specified times under specified condition. Failure is the inability of a system or a component to perform a required function according to its specification. Different levels of testing were employed for software to make it error free, fault free and reliable.

55

System Testing:
Then system testing was conducted. Here the entire software system was tested. The reference document used for this process was requirement document and the goal was to see if the software meets its requirements. System testing includes the thorough testing of the product. System testing is actually a series of different tests whose primary purpose is to fully exercise the computer based system. The tests are recovery testing: this checks the recovery of the system when failure occurs. This is to ensure that there are recovery procedures for error occurrences. System testing involves unit testing, integration testing, acceptance testing. Careful planning and scheduling are required to ensure that modules will be available for integration into the evolving software product when needed. A test plan has the following steps: Prepare test plan Specify conditions for user acceptance testing Prepare test data for program testing Prepare test data for transaction path testing Plan user testing Compile/Assemble program Prepare job performance aids Prepare operational documents

56

Objectives of testing
First of all objectives should be clear. Testing as a process of executing a program with the intent of finding errors. To perform testing, test cases are designed. A test case is a particular made up of artificial situation upon which a program is exposed so as to find errors. So a good test case is one that finds undiscovered errors. If testing is done properly, it uncovers errors and after fixing those errors we have software that is being developed according to specifications.

The above objective implies a dramatic change in viewpoint .The move counter to the commonly held view than a successful test is one in which no errors are found. In fact, our objective is to design tests that a systematically uncover different classes of errors and do so with a minimum amount of time and effort.

Testing Methods
White Box Testing
White box testing of software is predicted on close examination of procedural details. This test is providing cases that exercise specific sets of conditions and/or loop tests logical paths through the software. White box testing, sometime called glass box testing is a test case design method that uses the control structure of the procedural design to derive test cases.

Black Box Testing


Black Box testing is carried out to check the functionality of the various modules. Although they are designed to uncover error, black box testing use to demonstrate that software functions are optional, that input is corrected accepted and output is corrected produced and that the integrity of the external information is maintained. A black box test examines some fundamental aspects of the system with little regard for the internal logical structure of the software. Black box testing focuses on the functional requirements of the software. 57

Levels of Testing
A Strategy for software testing integrates software test case designs methods in well-planned series of steps that results in the successful construction software. An important software testing planned in advance and conducted systematically. Verification is performed on the output of each phase, but some faults are likely to remain undetected by these methods. These faults will be eventually reflected in the code. Testing is usually relied on to detect these faults, in addition to the faults introduced during the coding phase it self. Due to this, different levels of testing are used in the testing process; each level of testing aims to test different aspects of the system.

The basic levels of testing are Unit testing Integration testing System testing System acceptances

CLIENT NEEDS

ACCEPTANCE TESTING

REQUIREMENT S

SYSTEM TESTING

DESIGN

INTEGRATION TESTING

CODE 58

UNIT TESTING

Level of Testing
The basic levels are unit testing, integration testing, and system & acceptance testing. These different levels of testing attempt to detect different types of faults. The relation of the faults introduced in different phases, and the different levels of testing are shown in above figures. Unit Testing: This is the first level of testing. In this, different modules are tested against the specifications produced during design for the modules. Unit testing is essential for verification of the code produced during the coding phase, and hence the goal is to test the internal logic of the modules. Due to its close association with coding, the coding phase is frequently called "coding & unit testing". As the focus of this testing level is on testing the code, structural testing is best suited for this level. In fact, as structural testing is not very suitable for large programs, it is used mostly at the unit testing level. Structural testing: It is an approach to testing where the tests are derived from knowledge of the software's structure and implementation this approach is can analyze the code and use knowledge about the structure of a component to derive test data. The analysis of the code can be used to find how many test cases are needed to guarantee that all of the statements in the program or component are executed at lust once during the testing process.

Integration Testing:
Integration Testing is the next level of testing. In this, many unit-tested modules are combined into subsystems, which are then tested. The goal here is to see if the modules can be integrated properly. Hence, the emphasis is on testing interfaces between modules. This testing activity can be considered testing the design. Once a 59

system has been completely integrated it is possible to test the system for emergent properties such as performance and reliability. Performance tests have to be designed to ensure that the system can process its intended load. This usually involves planning a series of tests where the load is steadily increased until the system performance becomes unacceptable. This type of testing is called Stress testing.

System and Acceptance Testing:


The next levels are system testing & acceptance testing. Here the entire software system is tested. The reference document for this purpose is the requirements document and the goal is to see if the software meets its requirements. This is essentially a validation exercise, and in many situations it is the only validation activity. Acceptance testing is sometimes performed with realistic data of the client to determine that the software is working satisfactorily. Testing here focuses on the external behavior of the system; the internal logic of the program is not emphasized. Consequently, mostly functional testing is performed at these levels.

Testing of Forms:

Forms are the interface between the user and database system. Testing of forms was extensive task. All data entry and query formats are designed using forms. Forms were tested to ensure that they are performing the tasks well they are designed for and correction and modifications were made found to be necessary. System testing is designed to uncover weaknesses that were not found in the earlier tests. This includes forced system failure and its users in the operational environment will implement validation of the total system as it. The total system is tested for recovery and fallback after various major failures to ensure that data are lost during the emergency. All this is done with the old system still in operation. After a successful testing of the individual programs and forms, the whole system was through a series of' test to ensure the proper working of the system as a whole. The system as a whole unit put to the all-possible inputs. The consistency and validity is then checked by the outputs. 60

Test objectives

Testing is a process of execution a program with the intent of finding error. A good test case is one that has a high portability of finding an undiscovered error. A successful test is one that uncovers an as-yet-discovered error.

Testing principles All tests should be traceable to customer requirements. Test should be planned long before testing begins. Testing should begin "in small" and progress towards testing "in the large. To be most effective, an independent third party should conduct testing.

Test Plan The first step in the System Testing is to prepare a plan that will test all aspects of the system in a way that promotes its credibility among potential users. There is a psychology in testing: Programmers usually do a better job in unit testing because they are expected to document and report on the method and extent of their testing.

Programmers are involved when they become aware of the user problems and expectations.

61

Printout of Reports

This report is used for show the data of registered students. Students can take the print out of their registration detail. And they will take this printout with themselves when they will come for admission. 62

Printout of Coding sheet


CODE FOR LOGIN PAGE
using using using using using using using using using using using using using System; System.Collections; System.Configuration; System.Data; System.Linq; System.Web; System.Web.Security; System.Web.UI; System.Web.UI.HtmlControls; System.Web.UI.WebControls; System.Web.UI.WebControls.WebParts; System.Xml.Linq; System.Data.SqlClient;

public partial class login : System.Web.UI.Page { protected void Page_Load(object sender, EventArgs e) { Application["login_id"] = 0; }

protected void Button1_Click(object sender, EventArgs e) { SqlConnection con = new SqlConnection(); con.ConnectionString = ConfigurationManager.ConnectionStrings["cn"].ConnectionString; SqlCommand cmd = new SqlCommand(); cmd.CommandText = "Select * from tblogin where email=@email and pwd=@pwd"; cmd.Parameters.Add("@email", SqlDbType.VarChar).Value = TextBox1.Text; cmd.Parameters.Add("@pwd", SqlDbType.VarChar).Value = TextBox2.Text; cmd.Connection = con; con.Open(); SqlDataReader dr = cmd.ExecuteReader(); if (dr.HasRows) { dr.Read(); FormsAuthenticationTicket tk = new FormsAuthenticationTicket(1, TextBox1.Text, DateTime.Now, DateTime.Now.AddHours(1), false, dr[3].ToString(), FormsAuthentication.FormsCookiePath); string st = FormsAuthentication.Encrypt(tk); HttpCookie ck = new HttpCookie(FormsAuthentication.FormsCookieName, st); Response.Cookies.Add(ck); string ur; ur = dr["urole"].ToString(); Application["login_id"] = TextBox1.Text; Application["user_id"] = dr["user_id"].ToString();

63

if (ur == "Principal") { Response.Redirect("Admin_login.aspx"); } else if (ur == "Teacher") { Response.Redirect("teacherlogin.aspx"); } else { Response.Redirect("studentlogin.aspx"); } } else { Label3.Text = "Wrong Username } Label3.Visible = true; Or Password";

protected void Button2_Click(object sender, EventArgs e) { Response.Redirect("registration.aspx"); } }

64

For registrestion page


using using using using using using using using using using using System; System.Collections; System.Configuration; System.Data; System.Web; System.Web.Security; System.Web.UI; System.Web.UI.HtmlControls; System.Web.UI.WebControls; System.Web.UI.WebControls.WebParts; System.Data.SqlClient;

public partial class regn : System.Web.UI.Page { protected void Page_Load(object sender, EventArgs e) { if (Page.IsPostBack == false) { drop1(); drop2(); sesion_drop(); } } public void drop2() { SqlDataAdapter adp = new SqlDataAdapter("select * from tbcat", ConfigurationManager.ConnectionStrings["cn"].ConnectionString); DataSet ds = new DataSet(); adp.Fill(ds); DropDownList2.DataSource = ds; DropDownList2.DataValueField = "catid"; DropDownList2.DataTextField = "catnm"; DropDownList2.DataBind(); } protected void Button1_Click(object sender, EventArgs e) { SqlConnection con = new SqlConnection(); con.ConnectionString = ConfigurationManager.ConnectionStrings["cn"].ConnectionString; SqlCommand cmd = new SqlCommand(); cmd.CommandType = CommandType.StoredProcedure; cmd.CommandText = "regnins"; cmd.Connection = con; if (con.State == ConnectionState.Closed) { con.Open(); }

65

cmd.Parameters.Add("@course_id",SqlDbType.Int).Value=Convert.ToInt32(cls.Selec tedValue); cmd.Parameters.Add("@catagory", SqlDbType.VarChar, 10).Value = Convert.ToString(DropDownList2.SelectedItem.Text); cmd.Parameters.Add("@lastcourse", SqlDbType.VarChar, 10).Value = Convert.ToString(ltExmPs.SelectedItem.Text); cmd.Parameters.Add("@lastcollege", SqlDbType.VarChar, 30).Value =Convert.ToString(ltcllg.Text); cmd.Parameters.Add("@session", SqlDbType.Int).Value = Convert.ToInt32(session.SelectedValue); cmd.Parameters.Add("@lastuniversity", SqlDbType.VarChar, 20).Value = Convert.ToString(Uni_nm.Text); cmd.Parameters.Add("@university_regn", SqlDbType.Int).Value = Convert.ToInt32(uregn.Text); cmd.Parameters.Add("@stu_nm", SqlDbType.VarChar, 20).Value = Convert.ToString(stnm.Text); cmd.Parameters.Add("@father_nm", SqlDbType.VarChar, 20).Value = Convert.ToString(fnm.Text); cmd.Parameters.Add("@mother_nm", SqlDbType.VarChar, 20).Value = Convert.ToString(mnm.Text); cmd.Parameters.Add("@address", SqlDbType.VarChar, 50).Value =Convert.ToString(add.Text); cmd.Parameters.Add("@gender", SqlDbType.VarChar, 10).Value = Convert.ToString(RadioButtonList1.SelectedValue); cmd.Parameters.Add("@mob_no", SqlDbType.NVarChar,10).Value = Convert.ToString(mob.Text); cmd.Parameters.Add("@dob", SqlDbType.VarChar,20).Value = Convert.ToString((dd.SelectedValue) + " / " + Convert.ToString(mm.SelectedValue) + " / " + Convert.ToString(yy.SelectedValue)); cmd.Parameters.Add("@email_id", SqlDbType.VarChar, 30).Value = Convert.ToString(eid.Text); cmd.Parameters.Add("@blood_group", SqlDbType.VarChar, 10).Value = Convert.ToString(DropDownList1.SelectedItem.Text); cmd.ExecuteNonQuery(); SqlCommand cmd2 = new SqlCommand(); cmd2.Connection = con; cmd2.CommandText = "select max(stu_id) from tbregn"; SqlDataReader dr = cmd2.ExecuteReader(); int stu_id=0; if (dr.HasRows == true) { dr.Read(); //dr["admid"].ToString(); stu_id = Convert.ToInt32(dr[0]); } cmd2.Dispose(); dr.Dispose(); for (int i = 0; i <= GridView1.Rows.Count - 1; i++) { SqlCommand cmd1 = new SqlCommand(); cmd1.CommandType = CommandType.StoredProcedure; cmd1.CommandText = "course_ins"; cmd1.Connection = con;

66

cmd1.Parameters.AddWithValue("@stu_id",stu_id); Label lbl_course = (Label)(GridView1.Rows[i].FindControl("course")); cmd1.Parameters.AddWithValue("@course_name", Convert.ToString(lbl_course.Text)); TextBox txt_year=(TextBox)(GridView1.Rows[i].FindControl("txt_year")); cmd1.Parameters.AddWithValue("@course_year", Convert.ToString(txt_year.Text)); TextBox roll_no = (TextBox)(GridView1.Rows[i].FindControl("txt_rollno")); cmd1.Parameters.AddWithValue("@roll_no", Convert.ToString(roll_no.Text)); TextBox obt_mrks = (TextBox)(GridView1.Rows[i].FindControl("txt_objmrks")); cmd1.Parameters.Add("@obt_mrks", SqlDbType.Int).Value = Convert.ToInt32(obt_mrks.Text); TextBox txt_Per = (TextBox)(GridView1.Rows[i].FindControl("txt_percentage")); cmd1.Parameters.Add("@percentage", SqlDbType.Int).Value = Convert.ToInt32(txt_Per.Text); TextBox uni_nm = (TextBox)(GridView1.Rows[i].FindControl("txt_univ")); cmd1.Parameters.AddWithValue("@University", Convert.ToString(uni_nm.Text)); TextBox subject = (TextBox)(GridView1.Rows[i].FindControl("txt_subject")); cmd1.Parameters.AddWithValue("@subject", Convert.ToString(subject.Text)); cmd1.ExecuteNonQuery(); cmd1.Dispose(); } cmd.Dispose(); con.Close(); Response.Redirect("print.aspx?stu_id=" + stu_id); } public void drop1() { SqlDataAdapter adp = new SqlDataAdapter("select * from tbcls where clsid <> 1", ConfigurationManager.ConnectionStrings["cn"].ConnectionString); DataSet ds = new DataSet(); adp.Fill(ds); cls.DataSource = ds; cls.DataTextField = "clsnm"; cls.DataValueField = "clsid"; cls.DataBind(); }

67

public void gridview() { SqlDataAdapter adp = new SqlDataAdapter("select * from tbcls where clsid<@course_Id", ConfigurationManager.ConnectionStrings["cn"].ConnectionString); adp.SelectCommand.Parameters.Add("@course_Id", SqlDbType.Int).Value = Convert.ToInt32 (cls.SelectedValue); DataSet ds = new DataSet(); adp.Fill(ds); GridView1.DataSource = ds; GridView1.DataBind(); } protected void cls_SelectedIndexChanged1(object sender, EventArgs e) { int clsitm = Convert.ToInt32(cls.SelectedValue); gridview(); } protected void RadioButtonList1_SelectedIndexChanged(object sender, EventArgs e) { } public void sesion_drop() { SqlDataAdapter adp = new SqlDataAdapter("select * from tbsession", ConfigurationManager.ConnectionStrings["cn"].ConnectionString); DataSet ds = new DataSet(); adp.Fill(ds); session.DataSource = ds; session.DataTextField = "session"; session.DataValueField = "session_id"; session.DataBind(); } }

68

For Quiz Contest


using using using using using using using using using using using using using System; System.Collections; System.Configuration; System.Data; System.Linq; System.Web; System.Web.Security; System.Web.UI; System.Web.UI.HtmlControls; System.Web.UI.WebControls; System.Web.UI.WebControls.WebParts; System.Xml.Linq; System.Data.SqlClient;

public partial class quzcnt : System.Web.UI.Page { static string ans, ans1; static int c = 0; static int i = 1;

protected void Page_Load(object sender, EventArgs e) { if (Page.IsPostBack == false) { prev_result(); drop1(); Label4.Text = "0"; tl_ques.Text = "0"; } login_id.Text = Convert.ToString(Application["login_id"]); } public void prev_result() { SqlConnection con = new SqlConnection(); con.ConnectionString = ConfigurationManager.ConnectionStrings["cn"].ConnectionString; if (con.State == ConnectionState.Closed) { con.Open(); } SqlCommand cmd = new SqlCommand(); cmd.Connection = con; cmd.CommandText = "select result from tbquiz_result where quizid=(select max(quizid) from tbquiz_result where memid=@memid)"; cmd.Parameters.Add("@memid", SqlDbType.Int).Value = Convert.ToInt32(Application["user_id"]); SqlDataReader rdr = cmd.ExecuteReader(); if (rdr.HasRows == true) { rdr.Read();

69

prev_res.Text = " Your Previous score : " + rdr["result"].ToString(); } rdr.Dispose(); con.Close(); }

public DataSet getds() { SqlDataAdapter adp = new SqlDataAdapter("select quesno from tbquiz where catid=@catid", ConfigurationManager.ConnectionStrings["cn"].ConnectionString); adp.SelectCommand.Parameters.Add("@catid", SqlDbType.Int).Value = Convert.ToInt32(ddl_catagory.SelectedValue); DataSet ds = new DataSet(); adp.Fill(ds); return ds; } protected void start_Click(object sender, EventArgs e) { SqlConnection con = new SqlConnection(); con.ConnectionString = ConfigurationManager.ConnectionStrings["cn"].ConnectionString; con.Open(); DataSet ds = getds(); SqlCommand cmd = new SqlCommand(); cmd.Connection = con; cmd.CommandText = "select * from tbquiz where quesno=@quesno"; cmd.Parameters.Add("@catid", SqlDbType.Int).Value = Convert.ToInt32(ddl_catagory.SelectedValue); cmd.Parameters.Add("@quesno", SqlDbType.Int).Value = Convert.ToInt32(ds.Tables[0].Rows[Convert.ToInt32(tl_ques.Text)][0]); SqlDataReader rdr = cmd.ExecuteReader(); if (rdr.HasRows == true) { rdr.Read(); Label1.Text = "Q:-" + rdr["ques"].ToString(); RadioButtonList1.Items.Add(rdr["a"].ToString()); RadioButtonList1.Items.Add(rdr["b"].ToString()); RadioButtonList1.Items.Add(rdr["c"].ToString()); RadioButtonList1.Items.Add(rdr["d"].ToString()); Label3.Text = Convert.ToString(rdr["ans"]); } rdr.Dispose(); con.Close(); Label1.Visible = true; RadioButtonList1.Visible = true; chk.Visible = true;

70

ddl_catagory.Visible = false; start.Visible = false; Label6.Visible = false; } public void drop1() { SqlDataAdapter adp = new SqlDataAdapter("select * from tbquiz_catagory", ConfigurationManager.ConnectionStrings["cn"].ConnectionString); DataSet ds = new DataSet(); adp.Fill(ds); ddl_catagory.DataSource = ds; ddl_catagory.DataValueField = "catid"; ddl_catagory.DataTextField = "cat_name"; ddl_catagory.DataBind(); } protected void chk_Click(object sender, EventArgs e) { RadioButtonList1.Enabled = false; Label3.Visible = false; int cnt = Convert.ToInt32(tl_ques.Text); tl_ques.Text = Convert.ToString(cnt + 1); Button4.Visible = true; if (RadioButtonList1.Items[0].Selected == true) ans = "a"; else if (RadioButtonList1.Items[1].Selected == true) ans = "b"; else if (RadioButtonList1.Items[2].Selected == true) ans = "c"; else if (RadioButtonList1.Items[3].Selected == true) ans = "d"; Label2.Visible = true; if (Label3.Text == ans) { Label2.Text = "Correct Answer"; int count = Convert.ToInt32(Label4.Text); Label4.Text = Convert.ToString(count + 1); } else Label2.Text = "Wrong Answer"; } protected void Button4_Click(object sender, EventArgs e) { DataSet ds = getds(); int lenth; lenth = ds.Tables[0].Rows.Count; int len = lenth - 1;

71

Button4.Visible = false; Label2.Visible = false; RadioButtonList1.Items.Clear(); RadioButtonList1.Enabled = true; i++; Label2.Visible = false; SqlConnection con = new SqlConnection(); con.ConnectionString = ConfigurationManager.ConnectionStrings["cn"].ConnectionString; con.Open(); int tl = 0; tl = Convert.ToInt32(tl_ques.Text); if (tl <= len) { SqlCommand cmd = new SqlCommand(); cmd.Connection = con; cmd.CommandText = "select * from tbquiz where quesno=@quesno "; cmd.Parameters.Add("quesno", SqlDbType.Int).Value = Convert.ToInt32(ds.Tables[0].Rows[Convert.ToInt32(tl_ques.Text)][0]); SqlDataReader rdr = cmd.ExecuteReader(); if (rdr.HasRows == true) { rdr.Read(); Label1.Text = "Q:-" + rdr["ques"].ToString(); RadioButtonList1.Items.Add(rdr["a"].ToString()); RadioButtonList1.Items.Add(rdr["b"].ToString()); RadioButtonList1.Items.Add(rdr["c"].ToString()); RadioButtonList1.Items.Add(rdr["d"].ToString()); Label3.Text = Convert.ToString(rdr["ans"]); } rdr.Dispose(); con.Close(); } else { Ins_Result(); Response.Redirect("resultquiz.aspx?totans=" + Label4.Text + "&tl_at=" + tl_ques.Text); }

Label1.Visible = true; RadioButtonList1.Visible = true; chk.Visible = true;

} protected void Button5_Click(object sender, EventArgs e) { Ins_Result();

72

Response.Redirect("resultquiz.aspx?totans=" + Label4.Text + "&tl_at=" + tl_ques.Text); } public void Ins_Result() { SqlConnection con = new SqlConnection(); con.ConnectionString = ConfigurationManager.ConnectionStrings["cn"].ConnectionString; SqlCommand cmd = new SqlCommand(); cmd.CommandText = "insert into tbquiz_result(memid,result,tl_ques)values(@memid,@result,@tl_ques)"; cmd.Connection = con; if (con.State == ConnectionState.Closed) { con.Open(); } cmd.Parameters.Add("@memid", SqlDbType.Int).Value = Convert.ToInt32(Application["user_id"]); cmd.Parameters.Add("@result", SqlDbType.Int).Value = Convert.ToInt32(Label4.Text); cmd.Parameters.Add("@tl_ques", SqlDbType.Int).Value = Convert.ToInt32(tl_ques.Text); cmd.ExecuteNonQuery(); con.Dispose(); con.Close(); } }

73

For Notice Board


using System.Data.SqlClient; public partial class MasterPage : System.Web.UI.MasterPage { protected void Page_Load(object sender, EventArgs e) { rptr(); } public void rptr() { DateTime dat; dat = Convert.ToDateTime(DateTime.Now); SqlDataAdapter adp = new SqlDataAdapter("Select * from tbnotice_board where end_date>=@dat", ConfigurationManager.ConnectionStrings["cn"].ConnectionString); adp.SelectCommand.Parameters.Add("@dat", SqlDbType.DateTime).Value = dat; DataSet ds = new DataSet(); adp.Fill(ds); Repeater1.DataSource = ds; Repeater1.DataBind(); } }

74

For Job Opportunity


public partial class jobopr_detail : System.Web.UI.Page { protected void Page_Load(object sender, EventArgs e) { gridview(); } public void gridview() { DateTime dat; dat = Convert.ToDateTime(DateTime.Now); int job_id = Convert.ToInt32(Request.QueryString["job_id"]); SqlDataAdapter adp = new SqlDataAdapter("select job_code,job_desing,job_description.eligibilty,salary,jobend_date from tbjob_opr where job_id = " + job_id + "and jobend_date <= dat", ConfigurationManager.ConnectionStrings["cn"].ConnectionString); adp.SelectCommand.Parameters.Add("@dat", SqlDbType.DateTime).Value = dat; DataSet ds = new DataSet(); adp.Fill(ds); GridView1.DataSource = ds; GridView1.DataBind(); } }

75

For Show our colleges Patron


public partial class outpattern : System.Web.UI.Page { protected void Page_Load(object sender, EventArgs e) { if (IsPostBack == false) { gridview(); } } public void gridview() { SqlDataAdapter adp = new SqlDataAdapter("select * from tbpatorn", ConfigurationManager.ConnectionStrings["cn"].ConnectionString); DataSet ds = new DataSet(); adp.Fill(ds); GridView1.DataSource = ds; GridView1.DataBind(); } protected void GridView1_PageIndexChanging(object sender, GridViewPageEventArgs e) { GridView1.PageIndex = e.NewPageIndex; gridview(); } }

76

USER /OPERATIONAL MANUAL

1.

INSTALLATION PROCESS Insert the CD containing software into CD ROM. Look for the folder KNOWLEDGEBABK. Copy the folder to C:\ of the system. Now look for database file & attach the database with Sql server. Go to Microsoft visual studio: file > open > C:\KNOWLEDGEBANK\ Website. Click on open button. Now click on Run button or press F5 to run the project.

2. MENUS DRIVEN Project consist of various menus through which we can choose required options menus are self explanatory 3. VALIDATIONS There are proper validations for the information to be filled in the relative text box to avoid the chance of wrong data entry 4. GENERATION OF AUTOMATIC VALUES According to the requirement in the project some values are automatically generated the system so that the user doesnt have to enter them. 5. SECURITY ASPECTS In the project login form pops up every time end user opens the system and only authenticated person is allowed to use the system all the authorized users are provided user name and password. 6. END USERES This project provides many facilities to end-users. The end users can be any person who is aware to the window environment and has the knowledge of surfing web sites.

SECURITY ASPECTS AND ACCESS RIGHTS


77

Authentication: - authentication can be defined as to check the users existence and validation. Authorization: - can be defined as the access rights and authorities that a user is given to access. Types of Authentication (in asp.net): Window authentication, Form authentication Passport authentication None. In the project form authentication is used. In Form authentication user is assigned to access the specific numbers of forms. In the following picture security is implemented from web-config file.

Administrator is login in by entering username and password. As we click login button username and password is checked by the code written on button click. If

78

username and password entered by user is correct the login will be successful else it will display message Username/Password is incorrect.

79

BACKUP AND RECOVERY


Sometimes data is damaged because of user ignorance and recovery of data will not be possible in that case. The only way out is copy of the data. So there should be backup of data .it is duty of administrator to take backup and updating of data at regular interval of time. So web career provides back and restore facility. Administrator can choose the drive and the folder where he wants to take backup and from where he wants to restore data. This window will allow the admin to take backup of his data.

80

ANNEXURE
About DOEACC Centre ,Chandigarh DOEACC Centre, Chandigarh, a unit of DOEACC Society under Ministry of Information Technology, Govt. Of India, was established in the year 1978 to promote the use of computers and to bring about computerization in Government Organizations, Public Sector Undertakings and Autonomous Bodies. DOEACC Centre, a pioneer Computer Centre of North India country. is one of the largest in the

DOEACC Centre has a team of 225 employees including 110 highly qualified, well-trained, dedicated and experienced computer professionals. All of them have undergone extensive training within the organization. It believes that developing and enhancing professional skills is a continuous process through out ones career.

Services

DOEACC Centre offers the following services: Feasibility and System Studies Application Software Development and its maintenance Consultancy in selection of Hardware and System Software Development of On-line Systems using Database approach Turnkey Data Processing Projects Computer Education and Training Corporate Training Programs CAD and Graphics

81

The Centre has been extending its services in the field of Information Technology to a number of organizations in Punjab, Delhi, Haryana, Himachal Pradesh, Uttar Pradesh, Jammu and Kashmir and Chandigarh. It has to its credit successful

completion of a number of projects for various organizations.

Software Development and Consultancy

DOEACC Centre has built up its image as a premier software development agency. It has undertaken software development projects, under Client Server environment using front end tools like POWERBUIDER, VB etc. with ORACLE as back end for many reputed organizations like the Institute of Company Secretaries of India (ICSI), New Delhi Municipal Corporation (NDMC), Himachal Pradesh State Electricity Board (HPSEB), Punjab State Electricity Board (PSEB), GB Pant Hospital, CAPART, and CIPL etc. Presently DOEACC Centre, Chandigarh is also working in the areas of web-enabled applications.

IT consultancy is a major activity of this Centre. With a team of well-qualified and experienced professionals, the Centre has provided consultancy support to a large number of government departments, public sector undertakings and nationalized banks. The consultancy services offered by DOEACC Centre include preparing specifications of the computer system & networking, tendering activities, hardware and software selection, syllabus (curriculum) design for Universities/Technical

Institutes, selection of software professionals, mode of conducting training programmer for Corporate sector, holding aptitude/professional tests, feasibility studies, instructional material development and bench marking, etc. DOEACC Centre carried out the feasibility studies of Bhakra Beas Management Board (BBMB), Archaeological Survey Of India (ASI), and the Slum & JJ Department of the Municipal Corporation of Delhi, etc.

82

Data Processing

The Centre is renowned for its expertise in bulk data processing jobs. Meeting deadlines and facing emergencies is a unique feature of the Centre. The electricity billing of Punjab, Chandigarh and Haryana and the water billing of Chandigarh is also being processed and printed by the Centre. The evaluation, compilation and the selection examinations of various prestigious organizations like CBSE, PGI Chandigarh, CSIR New Delhi, MDU Rohtak, Kurukshetra University, Punjab and Haryana School Education Boards have been carried out by DOEACC Centre.

To help the organizations that do not have their own expertise and facilities for system development and data preparation, the Centre accepts scientific, educational and other data processing work on turn-key-basis. The underlying objective of

accepting such work is to demonstrate the capabilities and benefits of computers and to encourage these departments and organizations to train their man power for taking up the processing of data electronically on their own.

Training

The centre has been ISO 9001:2000 certified for conducting training activities. The Training curriculum of the Centre is regularly updated with the latest hardware and software available in the market. The DOEACC Society, New Delhi, to conduct O/A/B/C level courses, accredits the Centre. The Centre also offers various short and long terms computer courses for all categories of students and professionals. Short-term courses are available for beginners, and professionals from other fields, who need only hands-on experience on computers. Long-term courses are available for students desirous of taking computers as a profession. Advanced courses are also available for computer professionals.

83

The Centre also offers customized courses for Organizational Training. The curriculum for these programmers is designed keeping in view the specific need of the industry.

Great emphasis is laid on both the theoretical and practical aspects of training. The Centre, over the years, has developed a number of print materials such as textbooks, laboratory manuals, and other material, which is given to the participants attending the training courses. The classrooms are equipped with the latest colored multimedia projection systems.

The Centre has a modern and comprehensive library.

Many publications on

different topics of relevance are regularly added to the library.

Infrastructure

In order to keep pace with the advances in the I T Industry, DOEACC Centre has been constantly upgrading its infrastructure, adding new software and hardware and exposing its manpower to the latest Information Technology.

The Centre is well equipped with the latest hardware, which includes seven powerful servers (Compaq, Digital, HCL) and more than 140 PCs (COMPAQ, Digital, Siemens, HCL etc). All the PCs are networked using CAT 5 structured cabling with the facility to connect to any of the three Operating Systems i.e. NT, UNIX or Netware.

DOEACC Centre has got its own Radio frequency link at 2Mbps and is connected to Internet through NICNET. This provides a facility to connect all nodes (about 100 in DOEACC Centre, Chandigarh) to use Internet simultaneously.

84

Branches In its continuous endeavor to spread computer awareness and provide consultancy DOEACC Centre has opened its branches in Simla, Lucknow and New Delhi. On the recommendations of the Training Advisory Committee, the Executive Council approved opening of first Branch of this Centre at Shimla. The Branch office started functioning in March 1995. It was formally inaugurated on 10th April 1995 by His Excellency Shri Virbhadra Singh, Chief Minister of Himachal Pradesh and has been functioning extremely well. The Branch office exhibited results much beyond the target initially laid down and had established its credibility in first year of its functioning. Under its diversification and expansion programmer, the Centre opened its second Branch at Lucknow. His Excellency Shri Romesh Bhandari, Governor of Uttar Pradesh, inaugurated it on 23rd October 1996. The Branch Office has made a major break-through in the field of Corporate Training Programmes, which included training to senior officers, and staff of UPTT.

85

DATA DICTIONARY:
In our DFD, we give names to data flows, processes, and data stores. Although the names are descriptive of the data, they do not give details. So the following the DFD, our interest is to build some structured place to keep details of the contents of data flow, processes, and data store. A data dictionary is a structured repository of data about data. It is a set of rigorous definition of all DFD data element and data structure. A data dictionary has many advantages. The most obvious is documentation; it is valuable reference in any organization. Another advantage is improving analyst/user communication by establishing consistent definition of various elements, terms and procedures. During implementation, it serves as a common base against which programmers who are working on the system compare data description. Also control information maintained for each data element is cross referenced in the data dictionary. E.g. program that use a given data element are cross referenced in a data dictionary, which makes it easy to identify them and make any necessary changes. Finally, a data dictionary is an important step in building a database. Most database management system has a data dictionary as a standard feature.

86

Table used in the project


Database Name is Dbclg:1. tbregn : - This table is used for student registration. You can store the different type of information about student in this table. This table is made for simple user (student).

Field Name Stu_id Course_id Category LastCourse LastCollege Session LastUniversity University_regn Stu_nm Father_nm Mother_nm Address Gender Mob_no DOB Email_id

Data Type Int Int Varchar Varchar Varchar Int Varchar Int Varchar Varchar Varchar Varchar Varchar Varchar Varchar Varchar

Size

10 10 30 20 20 20 20 50 10 10 10 30

Key PK FK ------FK ------------------------

Description Student_id Course _Id Category of student (BC,SC,GEN) Last course of student Last College Name Session ID Last University Name University Registration No. Student Name Father Name Mother Name Address Gender Mobile Number Date of birth Email_Id

2. tbsession:- this table is used for store the information about registration session.

Field Name Session_id Session

Data Type Int Varchar

Size 50

Key Pk ---

Description Session Id Session Name

87

3. tbl_coursedtl:- This table is used for previous courses detail of students. In this table..

Field Name Stu_id Course_id Course_name Course_year Roll_no Obt_mks Percentage University_nm Subject

Data Type Int Int Varchar Varchar Varchar Int Int Varchar Varchar

Size

Key Description Fk PK ------------------Student_id Course _Id Course Name Course Year Universitys Rollno. Obtain Marks Percentage of previous Class University Name of previous classes Subjects of previous class

20 4 6

50 50

4.tblogin:- In this table you will store the information about users and Administrator. Field_Name User_id Email_Id Pwd Urole Ques Ans Data Type Int Varchar Varchar Varchar Varchar Varchar Size 50 8 20 50 50 Key Pk ---------------Description User Id Email detail of User. Password of user User Role Qusetion detail. Answer

5.tbquiz:- This table is used for store the information of quizs questions and answers.

Field_Name Ques_no Ques A B C D Ans Catid

Data Type Int Varchar Varchar Varchar Varchar Varchar Varchar Int

Size 50 50 50 50 50 2

Key Pk -----------------FK

Description Question Number Question detail. Option detail for question Option detail for question Option detail for question Option detail for question ANSWER Category Id

88

6.tbquiz_result:- In this table we will store the result of quiz according to member_id.

Field_Name Quiz_id Mem_id Result Tl_ques

Data Type Int Int Int Int

Size

Key Pk FK -------

Description Quiz_id Member id Score Total Attempted Questions

7. tbmem:- In this table we will store the information of members of our site. Fieldname Mem_id Email_Id Pwd Name Address Gender Mob_no Country_nm State_nm City_nm Pic Data Type Int Varchar Varchar Varchar Varchar Varchar Varchar Varchar Varchar Varchar Varchar Size 20 8 20 50 6 8 20 20 20 20 Key Pk -----------------------------Description Member Id Email detail of Member Password of user Name of Member Address Gender Mobile Number. CountryName State Name City Name Pictures name

8. tbjob_opr:- this table is used for the detail of Job opportunity in the college.

Field_Name Job_id Job_code Job_desing Job_description Eligibility Salary Jobend_date

Data Type Int Int Varchar Varchar Varchar Numeric Date time

Size

50 50 50 (7,2) --

Key Pk ----------------

Description Job_id Job Code Job designation Job Description Job Eligibility Salary Last date of Job recruitment

89

9. tbNotice_board:- You will use this table for daily update the Notice Board information.

Field_Name Id Teacher_name Notice_title Notice_des Start_date End_date

Data Type Int Varchar Varchar Varchar Datetime Datetime

Size 50 50 50

Key Pk -------

Description News_ID Teacher name who will update the Notice board Notice Tiltle Notice Description. Start date of notice Last date of notice.

10. tbcourse_clg:- This table is used for store the information of course detail of the college.

Field_Name Course_id Course_name Duration Eligibility

Data Type Int Varchar Varchar Varchar

Size 5 50 100

Key Pk -----

Description Course Id Course Name Duration Eligibility

11. tbCourse_fees:- In this you will store course fees detail.

Field_Name Clsid Course_fees

Data Type Int Numeric

Size 6,2

Key Fk ---

Description Class id Course Fees detail

90

12. tbsyllabus:- In this table you will store the information of download syllabus file. Field_Name File_id Clsid File_name Fiel_des Data Type Int Int Varchar Varchar Size Key PK FK -----Description File_Id Class ID File Name File Description

20 10

13. tbcat :-In this table we will store the information about the category of student. Field_Name Catid Catnm Data Type Int Varchar Size Key Pk --Description Category Category name

10

14. tbcls :- In this table we will store the information about the class of student. Field_Name Clsid Clsnm Data Type Int Varchar Size 10 Key Pk --Description Class Id Class name

15. tbcnt :- we will use this table for the information of countries names. Field_Name Cntid Cntname Data Type Int Varchar Size 50 Key Pk --Description Country_Id Country Name

91

16. tbst :- we will use this table for the information of states name.

Field_Name Stid Stname Ctstid

Data Type Int Varchar Varchar

Size 50 Int

Key Pk --FK

Description State_id State name Country state Id

17. tbct:- -This table is used for information the city . Field_Name Ctid Ctname Stctid Data Type Int Varchar Int Size 50 Key Pk --FK Description City Id City Name State City ID

18. tbPatorn:- This table is used for store information about college patron Field_Name Data Type Size Key Description Int Pk Serial Number Sr_no Principal_name Period Varchar Varchar 30 50 ----Principal Name Period time in college

92

BIBLIOGRAPHY
CATALOGUES BOOKS
Database management system System Analysis and Design SQL Server ASP.NET Vipin C. Desai Elias M. Awad Microsoft Press Wrox publications

WEBSITES

www.gotdotnet.com www.onlinetemplates.org www.webopedia.com www.msdn.microsoft.com www.tech-faq.com

93

Das könnte Ihnen auch gefallen