Professional Documents
Culture Documents
Abhinav Singh J L N P
Abhinav Singh J L N P
On
INFORMATION TECHNOLOGY
Submitted By
Abhinav Singh
Submitted to
-------------------
JawharLal Nehru Polytechnic, Mahmoodabad
1
ACKNOWLEDGEMENT
HimanshuKashyap(PNP Intech Learning & Research Centre)who gave me his full support
and encouraged me to work in an innovative and challenging project for Educational field.
His wide knowledge and logical thinking gave me right direction all the time.
I am deeply grateful my project coordinator for his help and support provided at every step
of the project.
Last but not the least, I thank to all employees of PNP Intech Learning & Research Centre
Abhinav Singh
2
PNP/VT17-…..……....
COMPLETION CERTIFICATE
This is to certify that Abhinav Singh of DIPLOMA (Information Technology) from JawharLal
Nehru Polytechnic Mahmoodabad(Institute) was working on the project entitled “Online Study
Material” in PNP Intech Learning & Research Centre. He was engaged with us during 1st June
2017to 15thJuly 2017for a period of 45 days.
He has done an excellent job during his engagement with the Software Development & Testing
Division of the company. He has completed his project during the training tenure. His performance
has been good and satisfactory.
I would like to take this opportunity to express my appreciation to Abhinav Singh for his work and
wish him all the very best for his future endeavours.
Regards,
……………………..
___________________
HR-Manager
PNP Intech Learning & Research Center
Lucknow(U.P.)
3
DECLARATION
This is to certify that the project report entitled “Online Study Material” is done by me is
an authentic work carried out for the partial fulfillment of the requirements for the award
HimanshuKashyap. The matter embodied in this project work has not been submitted
earlier for award of any degree or diploma to the best of my knowledge and belief.
`
Abhinav Singh
4
TABLE OF CONTENT
I. Declaration
II. Certificate
III. Acknowledgement
1. Introduction…………………………………………………………………………..…........7-12
1.1 Overview of Organization
1.2 Objectives
1.3 Existing System Description
1.4 Proposed System
1.5 Tools Used
2. System Analysis…………………………………………………………………...............13-24
2.1 Idenification of need
2.2 SDLC Phases
2.2.1 Feasibility Study
2.2.2 Report Approval
2.2.3 System Analysis
2.2.4 System Design
2.2.5 Coding
2.2.6 Testing
2.2.7 Implementation
2.2.8 Maintenance
2.3 Process Description
2.4 Project Model Used
2.5 Data Flow Diagram
3. Software Requirement
Specification………….…………………………………………………………….………..25-26
3.1 Hardware Requirement
3.2 Software Requirement
3.3 Support Maintenance
4. System Design Approach…………………………………………………………………27-28
4.1 Top-Down Designing
4.2 Bottom –Up Designing
4.3 Following Approach
5
5. Low Level Design………………………………………………………………………………………29
6. Data Modeling………………………………………………………………………..25-27
6.1 List of Tables
6.2 Structure of Tables
7. Testing…………………………………………………………………………… 28-31
8. Input-Output Forms………………………………………………………………………….…32-54
8.1 Modularization Details
8.2 User Screenshots
8.3 Admin Screenshots
9. Future Scope……………………………………………………………………………….…55
10. Conclusion……………………………………………..……………………………..60
6
INTRODUCTION
Firstly,Online study is education that takes place over the Internet. It is often referred to as
“elearning”among other terms. However, online learning is just one type of “distance
learning” -the umbrella term for any learning that takes place across distance and not in a
traditionalclassroom. Distance learning has a long history and there are several types
available today,
Including:
• CD-ROM Courses: where the student interacts with static computer content.
• Mobile Learning: by means of devices such as cellular phones, PDAs and digital audio
Player (iPods, MP3 players).
Online study is catalyzing a pedagogical shift in how we teach and learn. There is a
shiftaway from top-down lecturing and passive students to a more interactive,
collaborativeapproach in which students and instructor co-create the learning process.
This point of view maintains that people actively construct new knowledge as they
interactwiththeir environment. This is a student-centered approach in which students “co-
create” their. Introduction to Online Teaching and Learning Joshua Stern, Ph.D. 3 learning
experience. This approach empowers students as active learners instead of justpassive
recipients absorbing information and reproducing it for standardized tests.
Constructionism:
7
posting, tomore complex things like a painting or a presentation. For example, you might
read this pageseveral times and still forget it by tomorrow - but if you were asked to
explain these ideas tosomeone else in your own words, or produce a slideshow that
explained these concepts, youwould gain a deeper understanding that is more integrated
into your own ideas.
Collaboration:
As an instructor, you focus on the experiences that would best generate learning from
thelearner's point of view, rather than just publishing and assessing the information you
think theyneed to know. Each participant in a course can and should be a teacher as well as
a learner.Your job changes from being the sole source of knowledge, to being a guide and
role model.You connect with students in ways that address their own learning needs by
moderatingdiscussions and activities in a way that collectively leads students towards the
larger learning goals of the class.
Overview of Organization
8
going to promote your business as well as company. We provide the latest technology and
most innovative solutions, allowing us to give our customers the best service possible.
We develop web-sites and web based applications, our area of expertise includes Web
Design & Maintenance, Flash based Websites, Web application development, E-commerce,
2D-3D animation, Search Engine Optimization(SEO), Content Writing.
PROBLEM DEFINITION
In this section we shall discuss the limitation and drawback of the existing system that
forced us to take up this project. Really that work was very typical to manage the daily
errors free records and adding or removing any node from server. This problem produces a
need to change the existing system. Some of these shortcomings are being discussed below:
Low Functionality
With the existing system, the biggest problem was the low functionality. The
problem faced hampered the work. For small task like adding any new node to
server or deleting a node or keeping daily record we have to appoint minimum two
or three employee.
In the existing system, humans performed all the tasks. As in the human tendency,
error is also a possibility. Therefore, the inputs entered by the person who is
working in the Company, in the registers may not be absolutely foolproof and may
be erroneous. As a result of wrong input, the output reports etc.will also be wrong
which would in turn affect the performance.
Portability Problem
System that existed previously was manual. As a result, the system was less
portable. One has to carry the loads of many registers to take the data from one
place to another. A big problem was that the system was less flexible and if we
9
wanted to calculate yearly or monthly maintenance report or efficiency report, then
it was a big headache
Security-
Security concerns were also one of the motives of the Company for the need of
software. In the registers, the data is not secure as anybody can tamper with the
data written in the registers. While in this software, just a password makes it
absolutely secure from the reach of unauthorized persons.
Data Redundancy
In the case of manual system, the registers are maintained in which, a lot of data is
written.
Processing Speed
Manual Errors
When a number of tough tasks are prepared by the humans like preparation of
reports, performing long calculation then some human error are obvious due to a
number of factors like mental strain, tiredness etc. But as we all know that computer
never get tired irrespective of the amount of work it has to do. So this software can
nullify the probability of manual error that improve the performance.
Complexity in Work
10
In manual system whenever a record is to be updated or to be deleted a lot of
cutting and overwriting needs to be done on the registers that are concerned that
are deleted or updated record, which makes the work very complex.
PROPOSED SYSTEM
The development of this new system contains the following activities, which try to develop
on-line application by keeping the entire process in the view of database integration
approach.
Secure registration and profile management facilities for Customers.
Browsing through the e-Mall to see the items that are there in each category of
products like Apparel, Kitchen accessories, Bath accessories, Food items etc.
Creating a Shopping cart so that customer can Shoppe ‘n’ no. of items and checkout
finally with the entire shopping cart
Customers should be able to mail the Shop about the items they would like to see in
the Shop
Secured mechanism for checking out from the Shop( Credit card verification
mechanism)
Uploading ‘Most Purchased’ Items in each category of products in the Shop like
Apparel, Kitchen accessories, Bath accessories, Food items etc.
11
SYSTEM ANALYSIS
Identification of needs:-
Social and economic factor: a wave of social and economic changes often follows in the
wake of the new technology. New opportunities may arise to improve on a production
process or to do something that was not previously possible. Changes in the ways
individuals are organized into groups may then be necessary, and the new groups may
complete for economic resources with established units.
Technological factor: people have never before in a time when the scope of scientific
inquiry was so broad, so when the speed of applying the new technology accounts for many
changes in the organization.
High level decisions and operating processes: in response to technological, socio-
economical factors, top level managers may decide to recognize operations and introduce
new products. To deal with these needs, people commonly seek new modified information
to support the decision. When that happens, then they obtain turn to a computer system for
help the information users and data processing specialist then work together to complete a
series of steps in a system study to produce output results to satisfy information needs.
Feasibility Study: -
2. Technical Feasibility:
The current system is built on user interface environment using SQL SERVER 2005 and
ASP.Net which will provide a good and enhanced working environment.
Provides a user friendly environment.
Windows OS and ASP.NET software are easily available and easyto Interact.
3. BehaviouralFeasibilty:
During the onsite review of the current system the client showed a positive approach
towards the change over. Any further change in the current system will be accepted
smoothly, as this new developing system is based on GUI interface.
13
4. Alternate Solution:
Right now we are implementing this system using MS SQL SERVER2005 as backend. It can
be structured using MS access or ORACLE8 or above.
5. Risk Analysis :
Risk identification:
Technical risk: - In this project, the only risk can arise if some change occurs in the
technical requirements of the management. As per the requirement, we have taken
ASP.NET as technology for system development.
Software Tools:-
Platform:-
Software Requirement:-
14
Browser : Internet Explorer
For Documentation : Microsoft Word 2007/10/13
Hardware Tools:-
RAM : 2 GB RAM
HDD : 160 GB
Request Approval:-
Request approval is the third phaseofsystem development lifecycle. Request approval is
the phase in whichalltherequirementswhichwouldbeprovide in the system arestated. The
request approval is a sort of agreement between theclient and the companywhich is
buildingthis software. Both the parties should be mutuallyagreed on the stated
requirements.
SystemAnalysis:-
System analysisisthephasefollowingthephaseoftherequestapproval.In this phasewetend to
analyzetheoverallsystemwhichwehavetobuild.Systemanalysisis the crucial part in SDLC.
SystemDesign:-
System design means thedesigningofthesystem. TheSystemcanbedone in eitherof the
following twoways:-
15
Physical System Design
Coding:-
Codingisthephasein which
adevelopercodesusinganyprogramminglanguages.Codingconstitutes only20 %of
thewholeproject and which is easiertowrite.Thecodingwork is also done in the
teams;development of thesystem is usuallydoneunderthemmodularprogrammingstyle,
which can beeither top-down approachor bottom-up approach.
Testing:-
Implementation:-
Parallel Conversion
Direct Conversion Approach
Pilot Conversion Approach
PhaseIn Conversion Approach
Maintenance: -
Merelydevelopingthesystemisnotimportantbutalsomaintenanceis
important.Thecompanythat has
builtthesystemprovidesforsometimefreeofcostmaintenancetotheclient and after that
period it is usuallyapaid service.
16
Process Description:-
Gantt charts mainly used to allocate resources to activities. The resources allocated to
activities include staff, hardware, and software. Gantt charts (named after its developer
Henry Gantt) are useful for resource planning. A Gantt chart is special type of bar chart
where each bar represents an activity. The bars are drawn along a timeline. The length of
each bar is proportional to the duration of the time planned for the corresponding activity.
Gantt chart is a project scheduling technique. Progress can be represented easily in a Gantt
chart, by coloring each milestone when completed. The project will start in the month of
January and end after 4 months at the beginning of April.
17
PROJECT MODEL USED
Iterative Enhancement Model:-
This model has the same phases as the waterfall model, but with fewer restrictions.
Generally the phases occur in the same order as in the waterfall model, but they may be
conducted in several cycles.
Useable product is released at the end of the each cycle, with each release providing
additional functionality. Customers and developers specify as many requirements as
possible and prepare a SRS document. Developers and customers then prioritize these
requirements. Developers implement the specified requirements in one or more cycles
of design, implementation and test based on the defined priorities.
18
The procedure itself consists of the initialization step, the iteration step, and the
Project Control List. The initialization step creates a base version of the system. The
goal for this initial implementation is to create a product to which the user can react. It
should offer a sampling of the key aspects of the problem and provide a solution that is
simple enough to understand and implement easily. To guide the iteration process, a
project control list is created that contains a record of all tasks that need to be
performed. It includes such items as new features to be implemented and areas of
redesign of the existing solution. The control list is constantly being revised as a result
of the analysis phase.
The iteration involves the redesign and implementation of iteration is to be simple,
straightforward, and modular, supporting redesign at that stage or as a task added to
the project control list. The level of design detail is not dictated by the iterative
approach. In a light-weight iterative project the code may represent the major source
of documentation of the system; however, in a critical iterative project a
formal Software Design Document may be used. The analysis of iteration is based upon
user feedback, and the program analysis facilities available.
PHASES:-
Introduction:-
DFD is anacronym for thewordDataFlowDiagram. DFD is pictorial representation of
thesystem. DFD is agraphical representation ofthe―flow‖of data through the information
system. DFD arealso used forthe visualization ofdata processing (structured design). ADFD
provides no information about thetimings of theprocess,orabout whetherprocess will
operate in parallel or sequence. DFD is an important technique for modeling system’s high-
level detailbyshowing how input dataistransformedtooutput results
throughasequenceoffunctionaltransformations. DFD revealrelationships among between
the various components in aprogram or system.Thestrength of DFD lies in the fact that
usingfewsymbolswe are able to express program design in an easiermanner. ADFD can
beusedstorepresentthe following:-
External Entitysendingandreceivingdata.
20
Process that changethedata.
Flow ofdatawithin the system.
Data Storagelocations.
UsesofDFD:-
DFDs can
provideahighlevelsystemoverview,completewithboundariesandconnections to
othersystem.
DFDs can provideadetailedrepresentation of system components.
0-Level DFD:-
Reg./login Reg./login
Online
Customer Matrimoni Admin
Accept/ Accept/
Reject al Portal reject
SOFTWAREREQUIREMENT SPECIFICATION
21
interactions the users will have with the software. In addition to use cases, the SRS also
contains non-functional requirements.
The software requirement specification document enlists all necessary requirements for
project development. To derive the requirements we need to have clear and thorough
understanding of the products to be developed. This is prepared after detailed
communications with project team and the customer.
SUPPORTANDMAINTENANCE:-
One year free support for rectifying system bugs including front end and beck end will be
provided. During warranty period Software Engineers will be responsible for removing
bugs and improving it. After one year support can be extended @ 20% of the total product
deployment cost.
The top - down designing approach started with major components of the system. It is a
stepwise refinement which starts from an abstract design, in each steps the design is
22
refined two or more concrete levels until we reach a level where no – more refinement is
possible or not needed.
Bottom – Up designing:
In bottom – up designing the most basic and primitive components are designed first, and
we proceed to higher level components. We work with layers of abstractions and
abstraction are implemented until the stage is reached where the operations supported by
the layer is complete.
23
In this project we are following Mixed Approach i.e. A combination of top – down and
bottom – up. We are developing some of the components using top – down designing
approach (e.g. the WebPages) and the some components in bottom – up designing
approach (e.g. the middle tier classes).
Description: Low Level Design creation is one of the most important activities in the
development of any software product. The low level design document gives the design of
the actual software application. Low level design document is based on High Level Design
document. It defines internal logic of every sub module. A good low level design document
will make the application very easy to develop by the developer. An effective design
document results in very low efforts in developing a Software product.
Each project's low level design document should provide a complete and
detailed specification of the design for the software that will be developed in the project,
including the classes, member and non-member functions, and associations between
classes that are involved.
The low level design document should contain a listing of the declarations of all the classes,
non-member-functions, and class member functions that will be defined during the
subsequent implementation stage, along with the associations between those classes and
any other details of those classes (such as member variables) that are firmly determined by
the low level design stage. The low level design document should also describe the classes,
function signatures, associations, and any other appropriate details, which will be involved
in testing and evaluating the project according to the evaluation plan defined in the
project's requirements document.
24
TESTING
Testing is the integral part of any System Development Life Cycle insufficient and
interested application tends to crash and result in loss of economic and manpower
investment besides user’s dissatisfaction and downfall of reputation.
“Software Testing can be looked upon as one among much process, an organization
performs, and that provides the last opportunity to correct any flaws in the developed
system. Software Testing includes selecting test data that have more probability of giving
errors.” The first step in System testing is to develop the plan that all aspect of system
.Complements, Correctness, Reliability and Maintainability.
Software is to be tested for the best quality assurance, an assurance that system meets the
specification and requirement for its intended use and performance.
System Testing is the most useful practical process of executing the program with the
implicit intention of finding errors that makes the program fail.
Types of Testing:
Testing against specification of system or component. Study it by examining its inputs and
related outputs. Key is to devise inputs that have a higher likelihood of causing outputs that
reveal the presence of defects. Use experience and knowledge of domain to identify such
test cases. Failing this a systematic approach may be necessary. Equivalence partitioning is
where the input to a program falls into a number of classes, e.g. positive numbers vs.
negative numbers. Programs normally behave the same way for each member of a class.
25
Partitions exist for both input and output. Partitions may be discrete or overlap. Invalid
data (i.e. outside the normal partitions) is one or more partitions that should be tested.
Internal System design is not considered in this type of testing. Tests are based on
requirements and functionality.
This type of test case design method focuses on the functional requirements of the
software, ignoring the control structure of the program. Black box testing attempts to find
errors in the following categories:
Interface errors.
Performance errors.
26
times each statement is executed. At end print out report showing which statements have
and have not been executed. Problems with flow graph derived testing:
Data complexity could not take into account.
We cannot test all paths in combination.
In really only possible at unit and module testing stages because beyond that
complexity is too high.
This testing is based on knowledge of the internal logic of an application’s code. Also
known as a Glass Box Testing .Internal software and code working should be known for
this type of testing. Tests are based on coverage of code statements, branches, paths,
conditions.
Unit Testing:
Unit testing concentrates on each unit of the software as implemented in the code. This is
done to check syntax and logical errors in programs. At this stage, the test focuses on each
module individually, assuring that it functions properly as a unit. In our case, we used
extensive white-box testing at the unit testing stage.
A developer and his team typically do the unit testing do the unit testing is done in parallel
with coding; it includes testing each function and procedure.
Integration Testing:
27
Testing of integration modules to verify combined functionality after integration .Modules
are typically code modules, individual applications, client and server and distributed
systems.
Functional Testing:
This type of testing ignores the internal parts and focus on the output is as per
requirement or not .Black box type testing geared to functionality requirements of an
application.
System Testing:
Entire system is tested as per the requirements. Black box type test that is based on overall
requirement specifications covers all combined parts of a system.
End-to-End Testing:
Regression Testing:
28
Acceptance Testing:
Normally this type of testing is done to verify if system meets the customer specified
requirements. User or customers do this testing to determine whether to accept
application.
Performance Testing:
Term often used interchangeably with “stress” and “load” testing, To check whether system
meets performance requirements, Used different performance and load tools to do this.
Alpha Testing:
In house virtual user environment can be created for this type of testing. Testing is done at
the end of development .Still minor design changes may be made as a result of such testing.
Beta Testing:
Testing typically done by end-users or others. This is final testing before releasing
application for commercial purpose.
using System;
usingSystem.Collections.Generic;
usingSystem.Linq;
usingSystem.Web;
usingSystem.Data.SqlClient;
usingSystem.Configuration;
usingSystem.Data;
/// <summary>
/// Summary description for dbmanager
29
/// </summary>
public class dbmanager
{
publicdbmanager()
{
//
// TODO: Add constructor logic here
//
}
SqlConnection con = new
SqlConnection(ConfigurationManager.ConnectionStrings["bandhan"].ToString());
publicbooliud(string query)
{
SqlCommandcmd = new SqlCommand(query, con);
try
{
con.Open();
cmd.ExecuteNonQuery();
return true;
}
catch (Exception)
{
return false;
}
finally
{
con.Close();
}
publicDataTableselectcmd(string query)
{
DataTabledt = new DataTable();
SqlDataAdapter da = new SqlDataAdapter(query, con);
da.Fill(dt);
returndt;
}
EmailSender.cs
using System;
usingSystem.Collections.Generic;
usingSystem.Linq;
usingSystem.Web;
30
using System.Net; // for network
usingSystem.Net.Mail; //for mail
/// <summary>
/// Summary description for EmailSender
/// </summary>
public class EmailSender
{
publicEmailSender()
{
//
// TODO: Add constructor logic here
//
}
public string SendTO { get; set; }
public string Subject { get; set; }
public string MessageBody { get; set; }
public string SendToCC { get; set; }
public string UserName { get; set; }
public string Password { get; set; }
publicboolSendMyEmail()
{
SmtpClient client = new SmtpClient();
MailMessagemsg = new MailMessage();
MailAddress from = new MailAddress(UserName);
MailAddress to = new MailAddress(SendTO);
client.EnableSsl = true;
client.Host = "Smtp.gmail.com";
client.UseDefaultCredentials = false;
client.Port = 587;
client.Credentials = nc;
msg.From = from;
msg.Subject = Subject;
msg.To.Add(to);
msg.Body = MessageBody;
msg.IsBodyHtml = true;
31
if (SendToCC != null)
{
MailAddresstocc = new MailAddress(SendToCC);
msg.CC.Add(tocc);
}
client.Send(msg);
return true;
}
}
32
User Screenshots:
HomePage:
About Us:
33
Study Zone:
Registration:
34
Trainer:
35
Latest Study Material:
36
Contact Us:
37
Admin Screenshots:
Senssms.aspx:
38
Sendemail.aspx:
39
Changepassword.aspx:
40
Forget Password.aspx:
41
42
CODINGS:-
AboutUs.aspx:
</div>
<div id="two">
43
</div>
<div id="three">
<b id="app"><center> WEB & APPLICATION DEVELOPMENT</center></b>
<center><h5>Best-in-class digital projects require</h5></center>
<center><h5> technology that perfectly supports</h5></center>
<center><h5>the design.We rely on the right tools</h5></center>
<center><h5> for the job,not a one-size-fits-all tech</h5></center>
</div>
</div>
<div id="con2">
</div>
</div>
</div>
</b>
</asp:Content>
Student Zone
Registration.aspx
<%@ Page Title="" Language="C#" MasterPageFile="~/MasterPage.master"
AutoEventWireup="true" CodeFile="registration.aspx.cs" Inherits="Default2" %>
44
<asp:Content ID="Content1" ContentPlaceHolderID="head" Runat="Server">
<style type="text/css">
.auto-style5 {
height: 26px;
}
.auto-style6 {
width: 237px;
}
.auto-style7 {
height: 26px;
width: 237px;
}
</style>
</asp:Content>
<asp:Content ID="Content2" ContentPlaceHolderID="ContentPlaceHolder1"
Runat="Server">
46
<asp:RequiredFieldValidator ID="RequiredFieldValidator4" runat="server"
ControlToValidate="RadioButtonList1" ErrorMessage="Gender is Required!"
ForeColor="Red"></asp:RequiredFieldValidator>
</td>
</tr>
<tr>
<td class="auto-style7">Qualification</td>
<td class="auto-style5">
<asp:TextBox ID="TextBox4" runat="server" Height="51px"
Width="185px"></asp:TextBox>
<asp:RequiredFieldValidator ID="RequiredFieldValidator5" runat="server"
ControlToValidate="TextBox4" ErrorMessage="Qualification is Required!"
ForeColor="Red"></asp:RequiredFieldValidator>
</td>
</tr>
<tr>
<td class="auto-style6">Mobile Number</td>
<td>
<asp:TextBox ID="TextBox5" runat="server" TextMode="Number" Height="46px"
Width="185px"></asp:TextBox>
<asp:RequiredFieldValidator ID="RequiredFieldValidator6" runat="server"
ControlToValidate="TextBox5" ErrorMessage="Mobile No. is Required!"
ForeColor="Red"></asp:RequiredFieldValidator>
</td>
</tr>
<tr>
<td class="auto-style6">Email </td>
<td>
<asp:TextBox ID="TextBox6" runat="server" TextMode="Email" Height="50px"
Width="186px"></asp:TextBox>
47
<asp:RegularExpressionValidator ID="RegularExpressionValidator1" runat="server"
ControlToValidate="TextBox6" ErrorMessage="Email is not valid!" ForeColor="Red"
ValidationExpression="\w+([-+.']\w+)*@\w+([-.]\w+)*\.\w+([-
.]\w+)*"></asp:RegularExpressionValidator>
</td>
</tr>
<tr>
<td class="auto-style6">Password</td>
<td>
<asp:TextBox ID="TextBox7" runat="server" TextMode="Password" Height="44px"
Width="186px"></asp:TextBox>
<asp:RequiredFieldValidator ID="RequiredFieldValidator7" runat="server"
ControlToValidate="TextBox7" ErrorMessage="Password is Required!"
ForeColor="Red"></asp:RequiredFieldValidator>
</td>
</tr>
<tr>
<td class="auto-style6">Address</td>
<td>
<asp:TextBox ID="TextBox8" runat="server" TextMode="MultiLine" Height="86px"
Width="193px"></asp:TextBox>
<asp:RequiredFieldValidator ID="RequiredFieldValidator8" runat="server"
ControlToValidate="TextBox8" ErrorMessage="Address is Required!"
ForeColor="Red"></asp:RequiredFieldValidator>
<br />
<br />
<br />
</td>
</tr>
<tr>
<td class="auto-style6"> </td>
48
<td>
<ContentTemplate>
</ContentTemplate>
</asp:UpdatePanel>
<asp:UpdateProgress ID="UpdateProgress1" AssociatedUpdatePanelID="UpdatePanel1"
runat="server">
<ProgressTemplate>
Please Wait.....
</ProgressTemplate>
</asp:UpdateProgress>
<br />
<br />
49
<br />
<asp:TextBox ID="TextBox9" runat="server" Height="35px"
Width="140px"></asp:TextBox>
</td>
</tr>
<tr>
<td class="auto-style6"> </td>
<td> </td>
</tr>
<tr>
<td class="auto-style6"> </td>
<td>
<asp:Button ID="Button1" runat="server" OnClick="Button1_Click" Text="Button"
Height="35px" Width="103px" />
</td>
</tr>
</table>
</h1>
</asp:Content>
Login.aspx
50
<h1 style="text-align:center; font-size:45px; background-color:#FFCCCC; color:
#0099FF;">Login</h1>
</asp:Content>
TrainerLogin.aspx
52
<h1 style="background-color:
#3333FF">
&nbs
p; Trainer Login</h1>
LatestStudyMaterial.aspx
54
<div id="heading">
<b
id="h9"> &n
bsp; Latest Study Meterials</b>
</div>
<div id="news">
<b id="h11"> NEWS</b>
</div>
<div id="im"></div>
</div>
</asp:Content>
Contact.aspx:
55
<div id="outer">
<div id="heading">
</asp:Content>
Admincoding:
Sendsms.aspx:
<%@ Page Title="" Language="C#" MasterPageFile="~/Admin/AdminMaster.master"
AutoEventWireup="true" CodeFile="sendSMS.aspx.cs" Inherits="Admin_sendSMS" %>
58
</style>
</asp:Content>
<asp:Content ID="Content2" ContentPlaceHolderID="ContentPlaceHolder1"
Runat="Server">
<table class="auto-style1">
<tr>
<td>Enter Mobile No.</td>
<td>
<asp:TextBox ID="TextBox1" runat="server"></asp:TextBox>
</td>
</tr>
<tr>
<td>Enter Message</td>
<td>
<asp:TextBox ID="TextBox2" runat="server" Height="209px" TextMode="MultiLine"
Width="210px"></asp:TextBox>
</td>
</tr>
<tr>
<td> </td>
<td>
<asp:Button ID="Button1" runat="server" Height="31px" Text="Sens SMS" />
</td>
</tr>
<tr>
<td> </td>
<td> </td>
</tr>
</table>
59
</asp:Content>
Sendemail.aspx:
60
<tr>
<td>Message</td>
<td>
<asp:TextBox ID="TextBox3" runat="server" Height="140px" TextMode="MultiLine"
Width="199px"></asp:TextBox>
</td>
</tr>
<tr>
<td> </td>
<td>
<asp:Button ID="Button1" runat="server" Height="32px" OnClick="Button1_Click"
Text="Send Email" />
</td>
</tr>
<tr>
<td> </td>
<td> </td>
</tr>
</table>
</asp:Content>
Changepassword.aspx:
61
width: 100%;
}
</style>
</asp:Content>
<asp:Content ID="Content2" ContentPlaceHolderID="ContentPlaceHolder1"
Runat="Server">
</asp:Content>
Forgetpassword.aspx:
<!DOCTYPE html>
<html xmlns="http://www.w3.org/1999/xhtml">
<head runat="server">
<title></title>
<style type="text/css">
.auto-style1 {
width: 100%;
}
.auto-style2 {
63
height: 23px;
}
</style>
</head>
<body>
<form id="form1" runat="server">
<div>
<table class="auto-style1">
<tr>
<td>Enter Your Email</td>
<td>
<asp:TextBox ID="TextBox1" runat="server" Height="34px" TextMode="Email"
Width="153px"></asp:TextBox>
</td>
</tr>
<tr>
<td class="auto-style2"> </td>
<td class="auto-style2">
<asp:Button ID="Button1" runat="server" Height="35px" OnClick="Button1_Click"
Text="Find My Account" Width="166px" />
</td>
</tr>
<tr>
<td> </td>
<td> </td>
</tr>
<tr>
<td> </td>
<td> </td>
</tr>
64
</table>
</div>
</form>
</body>
</html>
FUTURE SCOPE
65
Provision of discounts and offers
Generation of reports
Provision of print-out(s) to buyer
Refund of the money if the order is cancelled within a specific time period
Larger collection of products
CONCLUSION:
ACHIEVEMENTS:
The program achieved the main requirement which was to develop a website meant
forBandhan shopping. Given the amount of time on hand, and given the basic knowledge of
the front end & back end used, the site satisfies most of the basic requirements that it was
supposed and planned to fulfill, like, providing facilities for authentication, registration,
searching for products, using a shopping cart, placing orders, cancellation of orders,
calculation of total payable amount, providing options for means of payment, addition of
new products to the site, managing the delivery of products, a very basic view of account
details, and extraction of information from the database using queries, where the database
is created in MS SQL & is connected to the design of site using SqlDataSource, and the web
site has been designed using ASP.NET with all the coding done in Visual C#.
During the development of the project, not only did we learn the basic concept
behindBandhan shopping, but we also learnt many basic features and concepts of
ASP.NET& SQL and how the ASP.NET technology can enable one to develop web sites
and applications with very little hassle. The development period did give me some
confidence to put together some sites in my spare time!
66
The entire project was like a challenge to me. The concept itself was interesting, and it was
aggravated by the fact that it was my first-ever experience with Practical Training. Most of
the time was consumed by the development of logic and its application in the correct
manner. There were matters of concerns, and numerous new ideas coming up, time and
again, but at the end of it all, the problems, their solutions & the new ideas played a major
role in helping me develop a broad outlook towards how things work in the real world, and
everything I gained in the 30-day period, will certainly help me with the projects in the real
software world in the time to come.
LIMITATIONS:
The major limitation of the project is that the site is not connected to any financial
institution which almost all such sites are (unless they don’t provide for ‘credit card’ as a
means of payment) because credit card is undoubtedly the dominant method of payment
used to shopBandhan. However, in the project, the credit card is taken as a mode of
payment just to show how the credit card information is entered whenBandhan shopping
is carried out. Once the user enters his credit card details on shopping bazaar, a message is
displayed, that the details have been verified and his order has been registered if the details
are entered in the correct format (an arbitrary format is used with shopping bazaar). The
actual sites are connected to a financial institution and follow the code format used by
different credit card companies like, MasterCard, Visa etc. When a user enters a valid credit
card type and corresponding number & CVV, then, a modem sends out these details to the
institution. If funds are available, the transaction is approved almost instantaneously and
the ordered goods are delivered within a specified time frame.
APPENDICS:-
67
c++.NET all use the same integrated development environment (IDE), which allows
them to share tools facilitates in the creation of mixed – language solutions. In addition,
these languages leverage the functionality of the .NET Framework, which provides access
to key technologies that simplify the development of ASP Web applications and XML Web
services.
Architecture is explained form bottom to the top in the following discussion:
VB C++ C# Jscript
68
The .NET Framework
The .NET Framework is a multi-language environment for building, deploying, and running
XML Web services and applications . It consists of three main parts:
Common Language Runtime Despite its name , the runtime actually has a role in both
component is running , the runtime is responsible for managing memory , allocation ,
starting up and stopping threads and processes , and enforcing security policy , as well as
satisfying any dependencies that the component might have on other components .
The Common Language Runtime is the execution engine for .NET Framework applications.
It provides a number of services, including the following:
ADO.NET
ADO.NET is a set of libraries included with the Microsoft .NET Framework that help you
69
communicate with various data stores from .NET applications. The ADO.NET libraries
include classes for connecting to a data source, submitting queries, and processing results.
You can also use ADO.NET as a robust, hierarchical, disconnected data cache to work with
data off line. The central disconnected object, the DataSet, allows you to sort, search, filter,
store pending changes, and navigates through hierarchical data. The Dataset also includes a
number of features that bridge the gap between traditional data access and XML
development. Developers can now work with XML data through traditional data access
interfaces and vice-versa.
Microsoft Visual Studio .NET includes a number of data access features you can use to build
data access applications. Many of these features can save you time during the development
process by generating large amounts of tedious code for you. Other features improve the
performance of the applications you build by storing metadata and updating logic in your
code rather than fetching this information at run time. Believe it or not, many of Visual
Studio .NET’s data access features accomplish both tasks.
70
Microsoft SQL SERVER
71
Advantages of Server Database System
Having data stored and managed in a central location offers several advantages:
Each data item is stored in a central location where all users can work with it.
Business and security rules can be defined one time on the server and enforced equally
among all users.
A relational database server optimizes network traffic by returning only the data an
application needs.
Hardware costs can be minimized.
Maintenance tasks such as backing up and restoring data are simplified because they can
focus on the central server.
72
Advantages of Server Database System
Having data stored and managed in a central location offers several advantages:
Each data item is stored in a central location where all users can work with it.
Business and security rules can be defined one time on the server and enforced
equally among all users.
A relational database server optimizes network traffic by returning only the data an
application needs.
Hardware costs can be minimized.
Maintenance tasks such as backing up and restoring data are simplified because
they can focus on the central server.
73
BIBLIOGRAPHY
74