Professional Documents
Culture Documents
A Project Report On " ": It Team Work Place
A Project Report On " ": It Team Work Place
A Project Report On " ": It Team Work Place
Project Report
On
“IT TEAM WORK PLACE”
Submitted under the partial fulfillment of requirement for the award of
degree for
: Submitted By:
Archana Tiwari
B.C.A.-III Year
Enroll. No.
: Under Guidance of:
Dr. Ajay Kumar Patel
--Submitted To--
Department of Computer Science
Govt. TRS College Rewa (M.P)
This is to certify that the project report entitled “IT TEAM WORK PLACE”
has been done by “Archana Tiwari” in the academic session 2012-13
under my guidance. This report has been submitted to the Department
of Computer Science, Govt. T.R.S. College, and Rewa in the partial
fulfillment of the requirements for the award of degree for Bachelor of
Computer Application in Department of Computer Science.
This matter embodied in this project work has not been submitted
earlier for the award of any degree or the diploma to the best of my
knowledge and belief. I wish for her bright future.
CEO
Acknowledgement
Many people have contributed for making this project. First of all
I would like to say thanks to our subject teachers “Mr. Sunil Mishra”
and “Mr. Pradeep Shukla” for giving us a golden for showing our skill
in front of all and their great support in guidance to us regarding this
project. I am thankful to my Teachers from my core of heart
I would also like to say thanks to my entire friend who gives me
their valuable idea for implementation in my project. Their idea was
little but very powerful. I thank to them.
At last I dedicate this project to my parents because their support
regarding this project was excellent. They give me patience, and a big
mental support to me for developing this project.
My Parents
&
3. Methodology 8-38
5. Testing
6. Sample Output
7. Conclusion
Chapter - I
Introduction:-
(A) System software: - System software provides the basic functions for
computer usage and helps run the computer hardware and system. It includes a
combination of the following:
Device drivers
Operating systems
Servers
Utilities
Window systems
Compilers
Debuggers
Interpreters
Linkers
Text editors
Business software
Databases
1.2 Benefit :- The Benefit of this software is that it convert your software to
computerized application from manual application. This Software has following
facilities
a. Offline Support
b. Single User & Multi User Support
c. High Security
d. Easy Database Changing Facility with New Version
e. Easy to Use
f. Search & AutoFill
g. Less Work For User
h. Easy Error Handing Set By Programmer
i. Report Printing Facility of all Module
j. Advance Searching facility Base On Various Criteria of That Field
1.3 Scope: - This application Software can be used in Different area as
As we know that there are following step for creation to any project
A. Analysis
B. Design
C. Implementation
D. Post-Implementation
But the most important thing is that to keep a record for manage a Hostel
record as like student record, Room record, Employee Record etc. This software
will help in a better way to manage all those record.
(i) http://www.1000projects.com
(ii) http://www.seminarprojects.com
(iii) http://www.google.com
(iv) http://www.findaprojects.com
(v) http://www.projects.com
(vi) http://www.123eng.com
System Analyst : A system analyst is the person who selects and configures
computer systems for an organization or business. His or her job typically begins
with determining the intended purpose of the computers. This means the analyst
must understand the general objectives of the business, as well as what each
individual user's job requires. Once the system analyst has determined the general
and specific needs of the business, he can choose appropriate systems that will help
accomplish the goals of the business.
Chapter - III
3. Methodology :- I have made use following straightedges for creation
to any project
Desktop computers offer more power for the money, are less fragile and are
easier to customize. Also keep in mind that desktop computers do fine if left
running 24/7. Laptops tend to run hotter and are less suitable for full-time
operation. We'll assume you use a computer in fairly routine ways. A lot of your
time is spent on the Web, you use email quite a bit, edit digital photos, write the
occasional letter or document for work, and keep track of family finances. So, for
the purposes of this column, we'll talk to this group and leave out heavy-duty game
players and those designing a nuclear submarine in their basement.
You'll see a link for budget computers and their prices. If you click on that
link, you'll find the list of machines in the budget category that are considered the
best. Create a list of three or four computers that seem to fit your criteria. Do that
based on the recommendations at that site, prices and how well each machine fits
your needs. At these price levels, all the machines have weak spots and strong
points. Now, take your list of candidates and spend time searching other sites. Use
Google or some other search engine and type in the name and model of each
computer. That way, you'll get some other opinions and some idea of price.
Now, spend time in local stores. Take along the list of the machines that
made your cut. Be sure to note the specifications for each machine: processor
speed, size of the hard disk, how many USB ports, whether it has a video card or
uses built-in video capability. Be as detailed as you can. Check out competing
models that match or exceed the specifications of the machines you selected while
online. Keep your credit card in your pocket; this is a looking trip, not a buying
expedition. You might have found new candidates for your list. If so, search the
Web again and read as many reviews as you can find for each PC you added to the
list. By now, you are in a good position to compare price and performance. Make
sure you've paid attention to nontechnical information such as warranties and how
they work. Award extra points if the company will send a technician to your home
to fix any major problem.
3.2 Project Requirements: We need following Hardware &
Software for making this project into a Reality
6. Language Interface: - The DBMS provides support languages used for the
definition and manipulating of the data in the database. The data structure is
created using the data definition language commands. The data manipulating
commands by providing the language support for data definition and manipulating
the DBMS creates an environment where the users can do their jobs without
worrying about the physical implementation.
provides a secure and survivable medium for the storage and retrieval of
data. If the user and application are not sharing data among themselves and if the
longevity of the data is only till the end of the process and application that crated it,
then there not must need for College Management System The DBMS provides
mechanism to achieve these objectives without compromising security and
integrity of the data. So if the data is shared, if it is persistent, if the users want it to
be secure and easy to access and manipulate then use of is the best available
alternative.
Database should show the simultaneous change with the change in real
(mini world).
Advantages of DBMS :-
Limitation of database:-
In 1974, Chamberlain and Boyce, also from IBM SAN JOSE, read a paper at
a database workshop at the university at Ann Arbor, Michigan. This paper
introduced the database language SEQUEL, which was implemented by IBM in
1974-75 as the prototype language SEQUELXRM. The first attempt at a large
scale implementation of CODD’s relational model was IBM’s System R. this
system used a revised version of the SEQUEL called SEQUEL/2. In 1977, System
R became operational and SEQUEL became SQL.
In relational data model all the data in database are represented by tables
with rows and columns.
Although each table has an independent identity, relations between them can
be defined such as “foreign key”.
Restrictions for data entry in table can be defined with the help of constraints
like Primary Key, Not Null, and Unique.
3.6 About Microsoft Visual Studio IDE : Visual Basic .NET (VB.NET)
is an object-oriented computer programming language that can be viewed as an
evolution of the classic Visual Basic (VB) which is implemented on the .NET
Framework. Microsoft currently supplies two major implementations of Visual
Basic: Microsoft Visual Studio, which is The Microsoft .NET Compact
Framework is a sub-Hostel of .NET framework. It simplifies the mobile
application development of smart devices. These are to a large extent limited by
the screen size, CPU performance or memory capacity. .NET compact framework
takes some of the controls and libraries from .NET framework. Moreover it
optimizes them to match the limited options of mobile devices in comparison with
PCs. There are certain criteria of user interface that mobile users demand. While
plenty of functions of standard PC or Mac applications add to the user experience,
they might decrease the mobile user experience. Mobile screen is usually small.
Therefore, the user may often miss click on mobile screen with many buttons. All
of the .NET compact framework controls are hence optimized to overcome the
possible limits of mobile devices. Since .NET CF controls only offer basic
functions for mobile developers, they are often using also third party controls
which help to speed up the development time.
Base Class Hostel : The Base Class Hostel (BCL), part of the Framework Class
Hostel (FCL), is a Hostel of functionality available to all languages using the .NET
Framework. The BCL provides classes which encapsulate a number of common
functions, including file reading and writing, graphic rendering, database
interaction, XML document manipulation and so on.
Security : .NET has its own security mechanism with two general features: Code
Access Security (CAS), and validation and verification. Code Access Security is
based on evidence that is associated with a specific assembly. Typically the
evidence is the source of the assembly (whether it is installed on the local machine
or has been downloaded from the intranet or Internet). Code Access Security uses
evidence to determine the permissions granted to the code. Other code can demand
that calling code is granted a specified permission. The demand causes the CLR to
perform a call stack walk: every assembly of each method in the call stack is
checked for the required permission; if any assembly is not granted the permission
a security exception is thrown. However, has to split the application into sub
domains; it is not done by the .NET Framework includes a set of standard class
libraries. The class Hostel is organized in a hierarchy of namespaces. Most of the
built in APIs are part of either System.* or Microsoft.* namespaces. These class
libraries implement a large number of common functions, such as file reading and
writing, graphic rendering, database interaction, and XML document manipulation,
among others. The .NET class libraries are available to all CLI compliant
languages. The .NET Framework class Hostel is divided into two parts: the Base
Class Hostel and the Framework Class Base Class Hostel (BCL) includes a small
subset of the entire class Hostel and is the core set of classes that serve as the basic
API of the Common Language Runtime. The classes in mscorlib.dll and some of
the classes in System.dll and System.core.dll are considered to be a part of the
BCL. The BCL classes are available in both .NET Framework as well as its
alternative implementations including .NET Compact Framework, Microsoft Silver
light and Mono.
Memory management : The .NET Framework CLR frees the developer from the
burden of managing memory (allocating and freeing up when done); instead it does
the memory management itself even though there are no actual guarantees as to
when the Garbage Collector will perform its work, unless an explicit double-call is
issued .To this end, the memory allocated to instantiations of .NET types (objects)
is done contiguously from the managed heap, a pool of memory managed by the
CLR. As long as there exist a reference to an object, which might be either a direct
reference to an object or via a graph of objects, the object is considered to be in use
by the CLR. When there is no reference to an object, and it cannot be reached or
used, it becomes garbage. However, it still holds on to the memory allocated to it.
.NET Framework includes a garbage collector which runs periodically, on a
separate thread from the application's thread, that enumerates all the unusable
objects and reclaims the memory allocated to them.
.NET features : .Net platform for resource-constrained devices with at least 256 K
Bytes of flash and 64 K Bytes of RAM. It includes a small version of the .NET
CLR and supports development in C# and debugging (in an emulator or on
hardware), both using Microsoft Visual Studio. It also features a subset of the
.NET base class libraries (about 70 classes with about 420 methods), a GUI
framework loosely based on Windows Presentation Foundation, and additional
libraries specific to embedded applications. The .NET Micro Framework aims to
make embedded development easier, faster, and less expensive by giving
embedded developers access to the modern technologies and tools used by desktop
application developers. Additionally, it allows desktop .NET developers to use
their skills in the embedded world, enlarging the pool of qualified embedded
developers. The unique features of the .NET Micro Framework (relative to other
.NET platforms) are:
A memory footprint of about 300 KB; for comparison, the next smallest .NET
implementation, the .NET Compact Framework running on Windows CE,
needs about 12 MB.
Can run directly "on the metal" without an operating system; running on an OS
is also possible.
Supports common embedded peripherals and interconnects, including flash
memory, EEPROM, GPIO, I2C, SPI, and U S B.
Optimized for energy-efficiency in battery-powered devices.
Does not require a memory management unit.
Provides multithreading support even when running on single-threaded
operating systems.
A hardware abstraction layer allows porting to additional architectures.
A managed device driver model allows drivers for many devices to be written
in C#.
Execution constraints to catch device lockups and crashes.
Transparent support for storing objects in non-volatile memory.
Due to the constraints under which it operates, the .NET Micro Framework
does have some limitations beyond those imposed by its slimmed-down libraries.
For example, the platform does not support symmetric multi-processing, multi-
dimensional arrays, machine-dependent types, or unsafe instructions. The CLR is
an interpreter rather than a just-in-time compiler, and uses a simpler mark-and-
sweep garbage collector rather than a generational approach. Interoperation
between managed and native code currently has a number of limitations. The .NET
Micro Framework does not support any .NET languages other than C# at this time.
Managed code : Managed code is code that is written to target the services of the
Common Language Runtime. In order to target these services, the code must
provide a minimum level of information (metadata) to the runtime. All C#, Visual
Basic .NET, and J Script .NET code is managed by default. Visual Studio .NET
C++ code is not managed by default, but the compiler can produce managed code
by specifying a command-line switch (/CLR).
3.7 About VB.Net : Visual basic .Net has many new and improved
language features – such as inheritance. Interface, and over loading – that
make it a powerful object oriented programming language. As a Visual
basic developer you can now create multithreaded, scalable applications
using explicit multithreading. Other new language features in Visual basic
.Net include structured exception handling. Custom attributes, and common
language specification (CLS) compliance.
The CLS is a set of rules that standardizes such things as data types and
how objects are exposed and interoperate. Visual basic .net adds several
features that take advantage of the CLS. Any CLS –compliant language can
use the classes, objects, and components you create in Visual basic .net. And
you, as Visual basic users, can access classes, components and objects from
other CLS - compliant programming language without worrying about
language – Specific differences such as data types . CLS features used by
Visual basic.Net programs include assemblies, namespaces, shared members,
and constructors. Also included are structured exception handling, delegates
and several new data types.
Menu bars Of VB.NET :- The menu bar is the line of net that lines across
the loop of the VB windows. It is very much like menus we may have been
in other window application. The menus give we access too many features
within the development environment.
3.1 Data binding : Data binding is a general technique that binds two
data/information sources together and maintains them in sync. This is usually done
with two data/information sources with different types as in XML data binding.
However, in UI data binding, data and information objects of the same type are
bound together (e.g. Java UI elements to Java objects). If the binding has been
made in the proper manner, then, each data change is reflected automatically by the
elements that are bound to the data. The term data binding is also used in case
where an outer representation of data in an element changes, and the underlying
data is automatically updated to reflect this change. As an example, a change in a
Textbox element could modify the underlying data value.
3.2 Data report : Data Report is the extraction of data from human readable
computer reports. Conventional data extraction requires a connection to a working
source system, suitable connectivity standards or an API, and usually complex
querying. By using the source system's standard reporting options, and directing
the output to a spool file instead of to a printer, static reports can be generated
suitable for offline analysis via report mining. This approach can avoid intensive
CPU usage during business hours, can minimize end-user lince costs for ERP
customers, and can offer very rapid prototyping and development of custom
reports
Advantages of Visual Basic .Net : There are quit numbers of reasons for the
enormous of visual basic:
Middle-tier testing and development tools : All areas of data access have
been improved to make it easier to perform your most common database actives.
From now on, that is, for the rest of the lessons, the expression "Microsoft
Access" means Microsoft Office Access 2010. If you have a Microsoft Access
database such as an E-Mail attachment, a file on a floppy disk, on the network, or
in any other means, once you see its icon, you can double-click it. Not only will
this action launch Microsoft Access, but also it will open the file. You can also
launch Microsoft Access from a shortcut. If you happen to use the software on a
regular basis, you can create a shortcut on your desktop or on the Quick Launch
area.
The following are some reasons why Microsoft Access may not be your best
choice for your company's database application development. In some cases
your computer systems may not be reliable enough to handle any database
management system safely.
The Microsoft Office suite of software products is not in your company's
approved technology set.
You need to capture time critical transactions - e.g., from a lab instrument
Any single table in your database could have more than 1 million large to
medium-width records, or 5 million small-width records (i.e. 3-4 numeric or
short text fields)
You would regularly have more than 15 people actively using the database
at the same time - for example quick data entry and/or queries and reports.
Your database servers experience periodic, unexpected crashes - e.g. more
than 1 per month (in this case you'll have problems with any database
system).
You require extensive database security because of the highly sensitive
nature of the data. (Although you can get around this issue by using SQL
Server as the database engine with an Access front-end.)
Your company needs to run multiple Access databases, some with Access
security enabled and some without.
You will be sharing the database with mixed operating systems (Windows
98, Windows ME, Windows 2000, Windows XP, etc). See an article by
Microsoft on
1. What are the user’s demonstrable needs and how does a candidate system
meet them?
2. What resources are available for given candidate system?
3. What are the likely impacts of the candidate system on the organization?
4. Whether it is worth to solve the problem?
During feasibility analysis for this project, following primary areas of interest
are to be considered. Investigation and generating ideas about a new system
does this.
Front-end selection :
1. It must have a graphical user interface that assists employees that are not
from IT background.
2. Scalability and extensibility.
3. Flexibility.
4. Robustness.
5. According to the organization requirement and the culture.
6. Must provide excellent reporting features with good printing support.
7. Platform independent.
8. Easy to debug and maintain.
9. Event driven programming facility.
10. Front end must support some popular back end like Ms Access.
Types of Testing :- There are following two types of testing which is used
by me