Professional Documents
Culture Documents
Linux Report Neha
Linux Report Neha
Linux Report Neha
ON
SUPPLIER INFORMATION SYSTEM
Submitted to PANJAB UNIVERSITY, CHANDIGARH
in partial fulfillment of the requirements for the degree of
MASTER OF SCIENCE IN INFORMATION TECHNOLOGY
(M.Sc.(IT)-3rd Semester )
BY
Rupinder Kaur
Kamalpreet Kaur
PROJECT REPORT
ON
SUPPLIER INFORMATION SYSTEM
Submitted to PANJAB UNIVERSITY, CHANDIGARH
in partial fulfillment of the requirements for the degree of
MASTER OF SCIENCE IN INFORMATION TECHNOLOGY
(M.Sc.(IT)-3rd Semester )
BY
Rupinder Kaur
Kamalpreet Kaur
ACKNOWLEDGEMENT
We are very thankful to everyone who all supported us for completing our
project effectively and moreover on time.
We are thankful to our Principal Dr.(Mrs.) Charanjit Mahal for the constant
support and motivation also for providing us best facility available.
Moreover giving us the best environment for study.
We equally grateful to our Project Guide, Ms. Neha Narula. She gave us
moral support and guided us in different matters regarding the topic. She had
been very kind and patient while suggesting us the outlines of this project
and correcting our doubts. We thank her for her overall support.
Last but not the least, we would like to thank our parents and co-mates who
helped us a lot gathering information, collection data and guiding us from
time to time in making this project, despite of their busy schedules, they
gave us different ideas in making this project unique.
Rupinder Kaur
Kamalpreet Kaur
Date
CERTIFICATE
This is to certify that the project entitled SUPPLIER INFORMATION
SYSTEM submitted to Panjab University, Chandigarh in the partial
fulfillment of the requirements for the degree of Masters Of Science in
Information Technology (M.Sc.(IT) 3rd Semester) is a bonafide work carried
out by Rupinder Kaur and Kamalpreet Kaur under our supervision and no
part of this work is submitted for any other degree.
The assistance and help received during the course of work has been fully
acknowledged.
Project Guide
Miss Neha Narula
STUDENT DECLARATION
We hereby declare that the project entitled SUPPLIER INFORMATION
SYSTEM submitted by Rupinder kaur and Kamalpreet Kaur in the partial
fulfillment of the requirments for the degree of Master of Science in
Information Technology (M.Sc.(IT) 3rd Semester) to Panjab University,
Chandigarh is an original work and has not been submitted for the reward of
any other degree/diploma/scholarship or any other similar title or prize.
Place: Ludhiana
Date:
Rupinder Kaur
Kamalpreet Kaur
Project Guide
Miss Neha Narula
List of contents
Introduction of project
Objective of project
Feasibility study
Design of project
Implementation
Hardware and software requirements
Testing
Coding
Output
Future scope
Bibliography
Webliography
Introduction of project
This project is about maintaining only the record of supplier that supply
the product . The project involves the functionality of insertion, deletion,
searching, displaying and modifying the records. Insertion involves
various fields such as supplier name, supplier phone no, supplier address,
supplier nationality, and supplier gender. Deletion is performed by
inserting the supplier name and supplier id. Searching is performed by
supplier name and supplier id. Modified is performed on all fields.
Displaying operation displays all the records present in the database.
Objective of project
The project has the following objectives:
The objective of this project is to provide a comprehensive
approach towards the management of Supplier information.
A user friendly front-end for the user to interact with the system.
Well-designed database to store Supplier information.
Supplier will have access to their personal profiles and will be
able to edit their details.
Applications of project
The project can be used for the number of purposes which are given
below:
1. To maintain the database of an Supplier.
2. To search the record very easily.
3. To change the information of Supplier.
4. Delete the information of the Supplier very easily.
System Feasibility
The feasibility study is an evaluation and analysis of the potential of a
proposed project which is based on extensive investigation and research to
support the process of decision making.
Feasibility studies aim to objectively and rationally uncover the strengths
and weaknesses of an existing business or proposed venture, opportunities
and threats present in the environment, the resources required to carry
through, and ultimately the prospects for success. In its simplest terms, the
two criteria to judge feasibility are cost required and value to be attained.
A well-designed feasibility study should provide a historical background of
the business or project, a description of the product or service, accounting
statements, details of the operations and management, marketing research
and policies, financial data, legal requirements and tax obligations.
Generally, feasibility studies precede technical development and project
implementation.
Technology and system feasibility
The assessment is based on an outline design of system requirements, to
determine whether the company has the technical expertise to handle
completion of the project. When writing a feasibility report, the following
should be taken to consideration:
Types of System Feasibility:A brief description of the business to assess more possible factors which
could affect the study
has the technical expertise to handle completion of the project. When writing
a feasibility report, the following should be taken to consideration:
A brief description of the business to assess more possible factors which
could affect the study
The part of the business being examined
The human and economic factor
The possible solutions to the problem
Design of project
The first step is to determine how the output is to be produced and in
what format.
Second, input data and master files have to be designed to meet the
requirement of the proposed output.
Finally the details related to justification of the system and the
organization are documented and evaluated by management.
SYSTEM DESIGN
START
FRONT PAGE
LOGIN PAGE
Insert
Record
Delete
Record
Search
Record
Update
Record
Display
Record
Exit
Database
Enter
New
Record
Through
Id
Through
Id
Through
Id
Return
Home
Return
Home
Return
Home
Through
Name
Through
Name
Implementation
Through
Name
This project was concerned with the development and implementation the
employee management system. We began with analysis of the current and
proposed systems, the design of the system to be developed,
The developed system encompasses various activities associated with
managing employee information. The main functionalities available in this
system are:
Maintaining employee profiles
Leave management
ESS
Task management
Employee Trainings
Project Management
All these features include the ability to add user, update (edit), and
retrieve through search results.
Various companies and organizations may have different employee
structures and hierarchy. Being generic, the developed System has four main
access levels which are:
Employee
Head of Department (HOD)
Human Resource Manager (HR)
Administrator
In the implementation, the whole application is broken down into a series of
top-level components which may be referred to as tasks, actions, functions,
operations or transactions (that's user transactions, not database transactions
each of which is may be related to a Use Case. Each transaction component
references a single controller, one or more models, and usually a single view.
Some components do not have a view as they are called from other
components in order to perform a service, and once this service has been
completed they return control to the calling component. Each component is
self-executing in that it deals with both the HTTP GET and POST requests.
An IT system implementation usually starts with negotiating a contract with
a vendor a usually meticulous process that defines set guidelines, deadlines
and a payment schedule for the entire implementation process. Contract
requirements could include the outline of system performance criteria,
penalties related to issues and documentation, training support after the
system goes live in case of problems. Having detailed requirements agreed
to in writing is a benefit to companies since it gives managers and users
clear requirements to be met at different points throughout the process and
holds the vendor accountable for the product.
Shell
The shell is a program used to interface between the user and Linux Kernel.
Every command you type at a prompt on your screen is interpreted by the
shell and the passed to the Linux kernel.
LINUX
LINUX SHELL
LINUX KERNAL
The shell is a command language interpreter. It has its own set of in the
shell commands. The shell can also make use of all Linux utilities and
application programs that are available on the system. Some of the
commands such as print working directory (PWD) command are into the
Linux Bash Shell. Other commands are a separate executable program exists
in one the directories in the file system.
Types of shell
SH
The Bourne shell, called "SH," is one of the original shells, developed for
Unix computers by Stephen Bourne at AT&T's Bell Labs in 1977. Its long
history of use means many software developers are familiar with it. It offers
features such as input and output redirection, shell scripting with string and
integer variables, and condition testing and looping.
BASH
It is written by S. R. Bourne. The popularity of SH motivated programmers
to develop a shell that was compatible with it, but with several
enhancements. Linux systems still offer the SH shell, but "bash" -- the
"Bourne-again Shell," based on SH -- has become the new default standard.
One attractive feature of bash is its ability to run SH shell scripts unchanged.
Shell scripts are complex sets of commands that automate programming and
maintenance chores; being able to reuse these scripts saves programmers
time. Conveniences not present with the original Bourne shell include
command completion and a command history.
C shell
The C shell was developed by Bill Joy for the Berkeley Software
Distribution (BSD), a line of Unix operating systems derived from Unix and
developed at the University of California, Berkeley. It was originally derived
from the 6th Edition Unix shell (Thompson shell), with its syntax modeled
after the C programming language. The C shell is used primarily for
interactive terminal use, and less frequently for scripting and operating
KSH
David Koran developed the Koran shell, or KSH, about the time TCSH was
introduced. KSH is compatible with SH and bash. KSH improves on the
Bourne shell by adding floating-point arithmetic, job control and command
aliasing and command completion. AT&T held proprietary rights to KSH
until 2000, when it became open source.
2. Syntax:
$cut f<field1><field2><filename>
3. GREP: this command searches the specified input fully for match
with the specified pattern and displays it.
4. Syntax:
$grep [-options] <pattern><filename
5. CONTROL INSTRUCTION:
a. If-then-else-fi
b. Case-esac
c. While-do-done
4. VALIDATIONS: a validation code has been added to the project
allows you to check your program for wrong inputs entered by the user and
show a message allowing you to rectify the wrong input accordingly.
Validation can be of two types:
Character validation
Number validation
5. VI EDITOR: visual editor is the first screen editor available in the almost
all versions of the UNIX and LINUX. It allows the user to edit the entire
document at the same time. It operates in the modes:
Command mode
Insert mode
Executable mode
AWK
AWK is an interpreted programming language designed for text processing
and typically used as a data extraction and reporting tool. It is a standard
feature of most Unix like operating systems
The AWK language is a data-driven scripting language consisting of a set of
actions to be taken against streams of textual data either run directly on
files or used as part of a pipeline for purposes of extracting or transforming
text, such as producing formatted reports. The language extensively uses the
string data type, associative arrays (that is, arrays indexed by key strings),
and regular expressions. While AWK has a limited intended application
domain and was especially designed to support one-liner programs, the
language is Turing-complete, and even the early Bell Labs users of AWK
often wrote well-structured large AWK programs.
Syntax:
Awk BEGIN {Start_action} {action} END {stop_action}
multiplication,
and
division,
respectively.
For
string
concatenation, simply place two variables (or string constants) next to each
other. It is optional to use a space in between if string constants are involved,
but two variable names placed adjacent to each other require a space in
between. Double quotes delimit string constants. Statements need not end
with semicolons. Finally, comments can be added to programs by using # as
the first character on a line.
Under system requirement, two types of requirement are needed. These are:
Hardware requirements
Some of the recommended hardware needed throughout the project is as
follows:
Micro processor Intel Pentium
Ram 2GB or more
Operating system LINUX
Software requirements
LINUX
System requirements are minimum requirements that are needed to run this
system. The user may have more than the above requirements.
CODING
"
echo"*********************************************************
***************"
echo " "
echo " "
echo " "
echo " "
echo " "
echo " "
echo "Submitted To:
echo "Miss Neha Narula
echo " "
echo " "
echo " "
echo " "
echo "Enter any key to Continue "
read a
if [ "$a" = y -o "$a" = Y ]
then
sh loginf.sh
else
sh homep.sh
fi
Submitted By:"
Rupinder kaur,Kamalpreetkaur"
LOGIN FORM
"
echo"*****************************************************"
echo "Enter Name"
read name
echo "Enter Password"
read password
if [ $name = "mscit" -a $password = "123456" ]
then
sh menuf.sh
else
echo "your username or password is incorrect"
echo " "
sh loginf.sh
fi
sh searchm.sh;;
5)
sh viewf.sh;;
6)
sh exitf.sh;;
*)
echo "invalid choice";;
esac
*)
a=2
;;
esac
if [ $a = '2' ]
then
echo "enter naming chracter only"
read name
fi
done
echo "enter gender"
read gen
if [ $gen = m -o $gen = M ]
then
echo "gender is male"
elif [ $gen = f -o $gen = F ]
then
echo "gender is female"
else
echo "Wrong choice"
fi
echo "enter Nationality"
read nationality
while [ -z "$nationality" ]
do
echo "Don't leave it blank"
echo "enter Nationality"
read nationality
done
echo "enter Address "
read address
while [ -z "$address" ]
do
echo " Don't leave it Blank "
echo "enter the address"
read address
done
echo "enter mobile in ten digit only "
read phone
a=${#phone}
echo $a
if [ $a -lt 10 -o $a -gt 10 ]
then
echo "enter number again"
read phone
fi
while [ -z "$phone" ]
do
echo "Don't leave it Blank"
echo "enter mobile number"
read phone
done
flag1=0
while [ "$flag1" = 0 ]
do
case "$phone" in
*[!/a-z]*)
a=1
flag1=1
;;
*)
a=2
;;
esac
if [ $a = '2' ]
then
echo "enter mobile number in digits"
read phone
fi
done
echo $id: $name: $gen: $nationality: $address :$phone|dd
conv=ucase>>supplyinfo1.dbf
echo "Do You Want To /insert Another Record(Y/N)?"
read ans
if [ "$ans" = n -o "$ans" = N ]
then
sh menuf.sh
fi
done
"***********************DELETE
RECORD
BY
NAME*********************"
echo
"************************************************************
*****"
echo
"************************************************************
*****"
echo " "
echo " "
echo " "
echo "Delete By Name"
ans=y
while [ "$ans" = y -o "$ans" = Y ]
do
echo "Existing names are"
echo " "
cut -f1-6 -d ":" supplyinfo1.dbf|sort -n
echo " enter name whose record you want to delete "
read name
flag=0
while [ "$flag" = 0 ]
do
case "$name" in
*[!/0-9]*)
a=1
flag=1
;;
*)
a=2
;;
esac
if [ $a = '2' ]
then
echo "enter name in chracter only"
read name
flag=0
fi
done
if [ -z "$name" ]
then
echo "please enter the name"
read name
fi
grep -i -w "$name" supplyinfo1.dbf
if [ "$?" -eq 0 ]
then
grep -i -w -v "$name" supplyinfo1.dbf>krzz.sh
mv krzz.sh supplyinfo1.dbf
echo " Name is deleted "
echo " "
else
echo " Name does not exist "
echo " "
fi
echo " Do you want to delete another record(Y/N)?"
read ans
if [ "$ans" = n -o "$ans" = N ]
then
sh menuf.sh
fi
done
"*************************DELETE
BY
ID**************************"
echo
"************************************************************
***"
echo
"************************************************************
***"
echo " "
echo " "
echo "Delete id"
ans=y
while [ "$ans" = y ]
do
echo "existing id no are"
echo " "
cut -f1-6 -d ':' supplyinfo1.dbf|sort -n
echo " "
echo " enter id whose records to delete "
read idno
flag=0
while [ "$flag" = 0 ]
do
case "$idno" in
*[!/a-z]*)
a=1
flag=1
;;
*)
a=2;;
esac
if [ $a = '2' ]
then
echo " "
echo "enter idno in digits only"
read idno
flag=0
echo " "
fi
done
if [ -z "$idno" ]
then
echo " please enter idno "
read idno
fi
grep -i -w "$idno" supplyinfo1.dbf
if [ "$? " -eq 0 ]
then
do
echo "Don't leave it blank"
echo "enter idno"
read id
done
flag1=0
while [ "$flag1" = 0 ]
do
case $idno in
*[!/a-z]*)
a=1
flag1=1
;;
*)
a=2;;
esac
if [ $a = '2' ]
then
echo "Enter digits only"
echo "Enter id"
read id
fi
done
#name
echo "Enter Name"
read name
while [ -z "$name" ]
do
echo "Don't leave it blank"
echo "Enter Name"
read name
done
flag1=0
while [ "$flag1" = 0 ]
do
case "$name" in
*[!/0-9]*)
a=1
flag1=1
;;
*)
a=2;;
esac
if [ $a = '2' ]
then
echo "Enter charchters only"
echo "Enter name"
read name
fi
done
echo "enter gender"
read gen
if [ $gen = m -o $gen = M ]
then
read phone
a=${#phone}
echo "$a"
if [ "$a" -lt 10 -o "$a" -gt 10 ]
then
echo "enter number again"
read phone
fi
while [ -z "$phone" ]
do
echo "dont leave it blank"
echo "enter mobile number"
read phone
done
flag1=0
while [ "$flag1" = 0 ]
do
case "$phone" in
*[!/a-z]*)
a=1
flag1=1
;;
*)
a=2
;;
esac
if [ $a = '2' ]
then
echo "enter mobile number in digit"
read phone
flag1=0
fi
done
grep -i -w -v $idno supplyinfo1.dbf>supplyinfo2.dbf
mv supplyinfo2.dbf supplyinfo1.dbf
echo $idno :$name :$gen :$nationality :$address :$phone|dd
conv=ucase>>supplyinfo1.dbf
echo "do you want to continue(y/n)?"
read ans
if [ "$ans" = n -o "$ans" = N ]
then
sh menuf.sh
fi
done
"***************************SEARCH
RECORD*********************"
echo " "
echo " "
echo " "
echo "1.SEARCH BY SUPPLIER NAME"
echo "2.SEARCH BY SUPPLIER ID"
echo "3.RETURN TO MAIN FILE"
echo "Enter choice"
read choice
case "$choice" in
1)
sh searchf.sh;;
2)
sh searchi.sh;;
3)
sh menuf.sh;;
*)
echo" enter correct choice"
sh searchm.sh;;
esac
while [ "$flag" = 0 ]
do
case "$name" in
*[!/0-9]*)
a=1
flag=1;;
*)
a=2;;
esac
if [ $a = '2' ]
then
echo " "
echo "enter name in character only"
read name
flag=0
echo " "
fi
done
echo " "
if [ -z "$name" ]
then
echo "enter name"
read name
fi
echo "id name gen nationality address phone"
grep -i -w "$name" supplyinfo1.dbf
if [ "$?" -eq 0 ]
then
echo " "
else
echo "name does not exist"
echo " "
fi
echo "Do you want to continue"
read ans
if [ "$ans" = n -o "$ans" = N ]
then
sh menuf.sh
fi
done
flag=0
while [ "$flag" = 0 ]
do
case "$idno" in
*[!/a-z]*)
a=1
flag=1;;
*)
a=2;;
esac
if [ $a = '2' ]
then
echo " "
echo "enter idno in digits only"
read idno
flag=0
echo " "
fi
done
echo " "
if [ -z "$idno" ]
then
echo "enter idno"
read idno
fi
echo "id name gen nationality address phone"
grep -i -w "$idno" supplyinfo1.dbf
if [ "$?" -eq 0 ]
then
echo " "
else
echo "id not exist"
echo " "
fi
echo "Do you want to continue"
read ans
if [ "$ans" = n -o "$ans" = N ]
then
sh menuf.sh
fi
done
"*****************************DISPLAY
RECORD**************************"
echo
"************************************************************
*********"
echo
"************************************************************
*********"
echo " "
echo " "
ans=y
while [ "$ans" = y -o "$ans" = Y ]
do
echo "id name gender nationality address phone"
cut -f1-6 supplyinfo1.dbf|sort -n
echo "do you want to continue...(y/n?)"
read ans
if [ "$ans" = n -o "$ans" = N ]
then
sh menuf.sh
fi
done
"
echo
"************************************************************
*******************************"
echo
"************************************************************
*******************************"
OUTPUT
Future Scope
This project has a very bright scope. This project basically reduces the paper
work. This project also provides the supplier database to check the records
of a person easily and efficiently. Supplier database also saves the time of
supplier and they can fetch the information very easily.
BIBLIOGRAPHY
WEBLIOGRAPHY
www.google.com
www.linuxforum.org/forum
www.linux.org/tutorial
www.fortystones.com