Professional Documents
Culture Documents
INTRODUCTION
INTRODUCTION
1
1. INTRODUTION
This system is helps to store the major records of anganawadies and also through this
system a new user can easily register the jobs in anganawadies
Admin
Panchayath Officer
Anganawadi Worker
Applicant
2
ABOUT THE DEVELOPING TOOLS
3
2. ABOUT THE DEVELOPING TOOLS
2.1 INTRODUTION TO ASP.NET
It was first released in January 2002 with version 1.0 of the .NET Framework, and is the
successor to Microsoft's Active Server Pages (ASP) technology. ASP.NET is built on
the Common Language Runtime (CLR), allowing programmers to write ASP.NET code using
any supported .NET language. The ASP.NET SOAP extension framework allows ASP.NET
components to process SOAP messages.
Advantages of ASP.NET
Keep you Asp.net applications secured with the built-in Windows authentication
and per-application configuration.
Asp.Net has reduced the long lines of code required to develop large applications.
Asp.Net and Html together generate dynamic web pages smoothly.
Being an ideal server-side scripting technology, Asp.Net code first runs on Windows
server before displaying on the web browser.
Asp.Net framework is language independent, means you can choose any
programming language which best suited to you application.
With the built-in configuration information, Asp.Net is easy to deploy.
The windows web server thoroughly monitors the web pages, multiple components,
and applications running over it.
4
The Dot Net Framework quickly gives an alert for memory leaks, unbounded loops,
and other wrong behaviors, immediately killing them and restart them over again.
Asp.Net features like early binding, JIT compilation, caching services and native
optimization supports gives your application the high level of performance.
All the Asp.Net applications are highly monitored and managed to help application
available to handle requests.
The best part of Dot Net Framework is it has its own built-in caching features.
The content and the program logic are separated in the .Net Framework, thus
reducing the program inconveniences.
It is object oriented.
It is component oriented.
It is easy to learn.
It is a structured language.
5
2.3 SQL SERVER
2.4 ADO.NET
ADO.NET is a data access technology from the Microsoft .NET Framework that provides
communication between relational and non-relational systems through a common set of
components. ADO.NET is a set of computer software components that programmers can
use to access data and data services from a database. It is a part of the base class
library that is included with the Microsoft .NET Framework. It is commonly used by
programmers to access and modify data stored in relational database systems, though it
can also access data in non-relational data sources. ADO.NET is sometimes considered an
evolution of ActiveX Data Objects (ADO) technology, but was changed so extensively that it
can be considered an entirely new product.
Single Object-oriented API: ADO.NET provides a single object-oriented set of
classes. There are different data providers to work with different data sources but
the programming model for all these data providers work in the same way. You
6
should be aware of only one data provider. You just need to change class names and
connection strings.
Managed Code: The ADO.NET classes are managed classes. CLR takes care of
language independency and automatic resource management.
Deployment: Microsoft uses MDAC (Microsoft Data Access Component), which is
used as ActiveX component in .NET Framework (X is extensible component, when X
is written after a term means extensible). .NET components takes care of
deployment which was difficult previous technologies used in deployment.
XML Support: ADO.NET data is cached and transferred in XML (EXtensible Markup
Language) format. XML provide fast access of data for desktop and distributed
applications. XML is plain text designed to transport and store data and is self-
descriptive.
Visual Data Components:.NET offers ADO.NET components and data-bound
control to work in visual form. You can use these components without writing long
codes and can achieve result in no time.
Performance and scalability: Performance and scalability are two major factors
when developing web-based application and services. Disconnected cached data in
XML help in performance and scalability.
2.5 GIT
Git is a version-control system for tracking changes in computer files and coordinating
work on those files among multiple people. It is primarily used for source-code
management in software development, but it can be used to keep track of changes in any
set of files. As a distributed revision-control system, it is aimed at speed data integrity, and
support for distributed, non-linear workflows.
Git was created by Linus Torvalds in 2005 for development of the Linux kernel, with other
kernel developers contributing to its initial development. Its current maintainer since 2005
is Junio Hamano.
As with most other distributed version-control systems, and unlike most client–
server systems, every Git directory on every computer is a full-fledged repository with
7
complete history and full version-tracking abilities, independent of network access or a
central server.
Git is free and open-source software distributed under the terms of the GNU General Public
License version 2.
8
SYSTEM ANALYSIS
9
3. SYSTEM ANALYSIS
The term analysis and synthesis come from Greek where they mean respectively “to take
apart and to put together”. These terms are used in scientific disciplines from mathematics
and logic to economic and psychology to denote similar investigation procedures. Analysis
is defined as the procedure by which we break down an intellectual or substantial whole
into parts. Synthesis is defined as the procedure by which we combine separate elements
or components in order to form a coherent whole.
The system is followed at present, is not automated. In the existing system each and every
time reference should be manually. There are high possibilities to commit errors and
mistakes, which leads to produce wrongstatements.
10
3.2 EXISTING SYSTEM
The existing system is fully manual that means the record are maintained and keeped
manually by workers. An Anganawadi has mainly two workers. One is the main and
another one is the assistant .The main worker who maintains and controls the major
records of Anganawadi. The main disadvantage of the existing system is that it is very time
consuming process and also very difficult to handle the whole records. When the record
contain any type of failure then we cannot backup the record .It gives greater workload to
the workers. “ANGANAWADI MANAGEMENT SYSTEM“has mainly two workers. One is the
main and another one is the assistant .The main worker who maintains and controls the
major records of Anganawadi including child record, staff record and survey record etc.
A feasibility study is an analysis used in measuring the ability and likelihood to complete
a project successfully including all relevant factors. It must account for factors that affect it
such as economic, technological, legal and scheduling factors. Project managers use
feasibility studies to determine potential positive and negative outcomes of a project
before investing a considerable amount of time and money into it.
11
Feasibility analysis involves 8 steps:
Economic feasibility
Technical feasibility
Behavioral feasibility
Economic feasibility is the most frequently used method for evaluating the effectiveness
of the candidate system, more commonly known as cost/benefit analysis. The procedure
is to determine the benefit and saving that are accepted from a candidate system and
compare them with costs. If benefits and outweigh costs, then decision is made to design
and implements the system. Otherwise further justification or alternative in the proposed
system will have to be made if it is to have a chance of being approved.
The proposed system is cost effective because of its compatibility and effort saving
nature. The system reduces unnecessary expenses and waste of man hours in searching
12
and understanding the bulky leader reports. It benefits the user in getting hands on
experience.
Technical feasibility centers on the existing systems and to what extent it supports the
proposed system. This involves financial consideration to accommodate technical
enhancements. If the budget is a serious constraint, then the project is judged not
feasible. Minimum requirement of the proposed system is a printer, which will not add
additional expenses in implementing the system.
People are inherently resent to change and computers have been known to facilitate. An
estimate should be made of how strong a reaction the user staff is likely to have towards
the development of a computerized system. It is a common knowledge that computer
installations have something to do with turnovers, and changes in employee job status.
Therefore it is understandable that the introduction of a candidate system requires
special ways of conduct.
The success of any project depends upon the accuracy of available data. Accurate
information can be collected with the help of certain methods/techniques. These specific
methods for finding information of the system are termed as fact finding techniques.
Interview, Questionnaire, Record View and Observations are the different fact finding
techniques used in this project.
Interview:
Record View:
13
The information related to the system is available in the source like companies,
documents, websites and other records. This record review helped me to get valuable
information about the system.
Onsite Observation:
Unlike the other fact finding technique, in this method we visit the organization
and observe and understand the working of the existing system, flow of the system, the
users of the system etc.
Due to the above mentioned disadvantage in the existing system if has been proposed for
the new system, which will overcome these difficulties. So the new system is developed
with the help of the ASP.NET and SQL Server.
ADVANTAGES
The overall system is under the control of administrator hence the system is centralized
one.
14
SYSTEM SPECIFICATION
15
4. SYSTEM SPECIFICATION
This phase of the software development process deals with a brief study of different
hardware used in the computerized system. There is a list of hardware materials used
during the making and also during the use of the proposed system. As the new system to be
made into a computerized functional system, requirement of a computer is must. All the
hardware needed here are generally the basic configuration of a typical office computer.A
list of the hardware requirement used in the system given below:
Software configuration:
16
Asp.Net
Microsoft .NET technology you will have access to a new generation of advanced software
joining the best of computing and communications in a revolutionary new way. The effect
will be to totally transform the Web and every other aspect of the computing experience.
.NET enables developers, businesses, and consumers to harness technology on their terms.
.NET will allow the creation of truly distributed Web services that will integrate and
collaborate with a range of complementary services to help customers in ways that today’s
dotcoms can only dream of. The fundamental idea behind .NET is that the focus is shifting
from individual Web sites or devices connected to the Internet to constellations of
computers, devices, and services that work together to deliver broader, richer solutions.
People will have control over how, when, and what information is delivered to them.
Computers, devices and services will be able to collaborate with each other to provide rich
services, instead of being isolated islands where the user provides the only integration.
Businesses will be able to offer their products and services in a way that lets customers
seamlessly embed them in their own electronic fabric. Microsoft .NET will make computing
and communicating simpler and easier than ever. It will spawn a new generation of
Internet services, and enable tens of thousands of software developers to create
revolutionary online services and businesses. It will put you back in control, and enable
greater control of your privacy, digital identity, and data. And software is what makes it all
possible. However, Microsoft’s .NET technology will only succeed if others adopt this new
standard.
17
once a page is accessed for the first time (or any page within a particular directory is
accessed), subsequent rendering of that page is serviced by executing compiled
code. This eliminates all the inefficiencies of the scripting model of traditional ASP.
There is no longer any performance difference between compiled components and
server-side code embedded within a page they are now both compiled components.
There is also no performance difference between interspersing server-side code
blocks among static HTML elements, and writing large blocks of server-side code
and using Response .Write() for static HTML content. Also, because the .aspx file is
parsed into a single code file and compiled, it is not possible to use multiple server-
side languages within a single .aspx file.
But in ASP.NET In addition to improved performance over the interpreted model,
pages that are compiled into classes can be debugged using the same debugging
tools available to desktop applications or component developers. Errors with pages
are generated as compiler errors, and there is a good chance that most errors will be
found at compilation time instead of runtime, because VB.NET and C# are both
strongly typed languages. Plus, all the tools available to the .NET developer are
applicable to the .aspx developer
In ASP.NET it is no longer possible to include executable code outside the scope of a
function within a script block marked as runat=server, and conversely, it is no
longer possible to define a function within a pair of server-side script tags. 7) But in
ASP.NET, you are now required to place the Language directive with a Page
directive, as follows: You can have as many lines of directives as you need.
Directives may be located anywhere in your .apsx file but standard practice is to
place them at the beginning of the file. Several new directives have been added in
ASP.NET
SQL Server 2008
18
either on the same computer or on another computer across a network (including the
Internet).
Microsoft markets at least a dozen different editions of Microsoft SQL Server, aimed at
different audiences and for workloads ranging from small single-machine applications to
large Internet-facing applications with many concurrent users.
The main mode of retrieving data from a SQL Server database is querying for it. The query
is expressed using a variant of SQL called T-SQL, a dialect Microsoft SQL Server shares
with Sybase SQL Server due to its legacy. The query declaratively specifies what is to be
retrieved. It is processed by the query processor, which figures out the sequence of steps
that will be necessary to retrieve the requested data. The sequence of actions necessary to
execute a query is called a query plan. There might be multiple ways to process the same
query. For example, for a query that contains a join statement and a select statement,
executing join on both the tables and then executing select on the results would give the
same result as selecting from each table and then executing the join, but result in different
execution plans. In such case, SQL Server chooses the plan that is expected to yield the
results in the shortest possible time. This is called query optimization and is performed by
the query processor itself.
Windows 7
19
libraries, the new file sharing system HomeGroup, and support for multitouch input. A new
"Action Center" interface was also added to provide an overview of system security and
maintenance information, and tweaks were made to the User Account Control system to
make it less intrusive. Windows 7 also shipped with updated versions of several stock
applications, including Internet Explorer 8, Windows Media Player, and Windows Media
Center.
20
SYSTEM DESIGN
21
5. SYSTEM DESIGN
The system design is the most creative and challenging phase of system development life
cycle. It is an approach for the creation of proposed system, in which the logic and details
structure of the proposed system is designed, which will help the system coding. The most
creative and challenging phase of the system development process is design phase it is a
solution, a how to approach to the creation of the proposed system. Design is the first step
in the development of the engineered product is initiated only after a clear exposition of
expected product is available. System design is vital for efficient database management. It
provides the understanding of procedural detailnecessary for implementing the system.A
number of sub-system is to be identified which constitutes the whole system.
From a project management point of view, software design is conducted in two steps.
Preliminary design is concerned with the information of requirements into data and
software architecture. Details design focuses on refinement to the architectural
representation.Design starts with the system requirement specification and converts it to a
physical reliability, response time, throughput of the system, maintainability, expandability
should be taken into account.
The database tables are designed by using the entire necessary field in a compact and
correct manner. Care has been taken to be avoiding redundant and duplicated field. The
important of software design can be started with word quality .Design is place where
quality is fostered in software development. Designs are the only way where requirements
are actually translated in to a finished software product or system
Logical design
The logical design of a system pertains to an abstract representation of the data flows,
inputs and outputs of the system. This is often conducted via modeling, using an over-
abstract (and sometimes graphical) model of the actual system. In the context of systems
design are included. Logical design includes ER Diagrams i.e. Entity Relationship Diagrams.
22
Physical design
The physical design relates to the actual input and output processes of the system. This is
laid down in terms of how data is input into a system, how it is verified/authenticated, how
it is processed, and how it is displayed as In Physical design, following requirements about
the system are decided.
1. Input requirement.
2. Output requirements.
3. Storage requirements.
4. Processing Requirements.
System control and backup or recovery. Put another way, the physical portion of systems
design can generally be broken down into three sub-tasks:
2. Data Design
3. Process Design
User Interface Design is concerned with how users add information to the system and with
how the system presents information back to them. Data Design is concerned with how the
data is represented and stored within the system. Finally, Process Design is concerned with
how data moves through the system, and with how and where it is validated, secured
and/or transformed as it flows into, through and out of the system. At the end of the
systems design phase, documentation describing the three sub-tasks is produced and made
available for use in the next phase.
Physical design, in this context, does not refer to the tangible physical design of an
information system. To use an analogy, a personal computer's physical design involves
input via a keyboard, processing within the CPU, and output via a monitor, printer, etc. It
23
would not concern the actual layout of the tangible hardware, which for a PC would be a
monitor, CPU, motherboard, hard drive, modems, video/graphics cards, USB slots, etc. It
involves a detailed design of a user and a product database structure processor and a
control processor. The H/S personal specification is developed for the proposed system.
User interface design is very important for any application .The interface design describes
how the software communicates within itself, to system the interpreted with in andwith
humans who use it .The input design process is the process of converting the user –
oriented inputs into thecomputer based format.
Input facilities the entry of data into the computer system. Input design involves the
selection of the best strategy for getting data into the computer system at the right time
and as accurately as possible. Thus is because the most difficult aspect of input designs in
accuracy. The use of well-defined can encourage users to record data accurately without
confusion. In“Anganawadi Management System (AMS)” input is designed in such a way
that users of the system can easily enter the data without errors. Error correction is also
done us inputs such as phone number is validated while entering. The input is designed by
considering the following objectives.
Outputs from computer systems are required primarily to communicate the results of
processing to uses. They are also used to provide a permanent copy of the results for later
consultation. Intelligent output designs will improve systems relationships with the users
and help much in decision-making. Various reports in proposed software are temporary
and permanent purchase bill, sales bill etc… Various onscreen messages are also displayed
for effective communication with the user. The output design is simple and easy to
24
understand. The significant points that have to be considered for the output design are as
follows.
Controlled redundancy
Data independence
Performance
A database is an integrated collection of data and provides centralized access to the data.
Usually the centralized data managing the software is called RDBMS. The main significant
difference between RDBMS and other DBMS is the separation of data as seen by the
program and data has in direct access to stores device. This is the difference between
logical and physical data.
25
Design Consideration
The system is analyzed to the requirements and possible tables and fields are
identified.
Identifying Keys
Once we have drawn up the lists of possible tables and fields, the next step in there
logic database is to identify and foreign keys for each tables
1. Primary Keys
A primary key (pk) consist of a field or set of fields that uniquely identify each record
in that table. The “primary” field defines the primary key.
2. Foreign Keys
A foreign key (fk) comprises a field, or multiple field that to the primary key of
another table. For any database application data is stored in tables. So table designing is a
most important part of backend designing. Steps are taken to avoid unnecessary replication
of data and to achieve maximum data consistency and integrity. The appropriate data type
is chosen for the effective storage and manipulation of information. Another important
matter about table designing is the field width. Each field has enough rooms to
accommodate the data from domain, which has maximum width.
The process of designing forms involves clarifying the specific needs of your application,
identifying the information you want to work with, and then devising a design that best
meets your needs. This section briefly describes the process.
The goal of form design is to display and obtain the information you need in an accessible,
efficient manner. The form should encapsulate data so that it may be run without affecting
other forms that use the same data. dbase Plus makes this simple.
It’s important for your design to provide users with the information they need and clearly
tell them what they need to do to successfully complete a task. A well-designed form has
26
visual appeal that motivates users to use your application. In addition, it should use limited
screen space efficiently.
Architectural design of a computing system is the structure of the system, which comprises
software element, the externally visible properties of those elements, and the relationship
among them. Architectural design defines the relationship between major structural
elements of the program. Large system can be decomposed into subsystems that provide
some related set of services.
Architectural design is the process of identifying these subsystems and establishing a frame
work for the subsystem controls and communication. The primary objective is to develop a
modular program structure and represent the control relationship between modules. In
addition architectural design modules program structure and data flow through the
program. Architectural design is aimed at trying to refine the conceptual view of the
software product. It permits a system’s quality attributes such as performance or
reliability.
Architectural design is the back born for building successful software intensive system. A
good software structure design results in the development of a project working system. For
the development of the software, modules were identified .This software was developed
into separate named and addressable components that are integrated to satisfy the
problem requirements.
The modular design reduces the complexity, facilitates change and results in easier
implementation by encouraging parallel development of different part of the system. The
procedural design transforms structural elements of program architecture into a
procedural description of software components. The architectural design considers
architecture as the most important functional requirements. The system is based on three -
tier architecture. The first level is the user interface (presentation Logic), which displays
controls, and receives and validates user inputs .All the event handlers in the web form are
in the first level. The second level is the business layer (Business Logic) where the
27
application-specific logic takes place. The third level is the data layer where the application
information is stored in files or database. It contains logic about to retrieve and update
data. The important feature about three –tier design is that information only travels from
one level to an adjacent level.
System Modules (originally known as System Building Blocks; the name was changed
around 1961) are a DEC modular digital logic family which preceded the later FLIP
CHIPs They connect to the units they are plugged into via a set of 22 gold-plated discrete
pins along one edge. They use transistor inverter circuits, with the transistors operating
saturated, to avoid dependence on tight tolerances; they use -3V and 0V as logic levels.
Intended for prototyping as well as production, they include design features intended to
avoid damage. They are provided with design advice which includes loading rules and
wiring instructions. In this system we use 4 modules
1. Administration Module:-In the administration level the admin add the district,
panchayath offices details. The administration can see all the details of anganawadi
2. Panchayath level:-after the admin add the panchayath office the officer can enter the
to site using the username password. Thepanchayath officer is a person who handle the
job vacancies. The officer receive the application from the user and process it.
3. Anganawadi level:-In this level the anganawadi worker add all the details of the
anganawadi like senses details, kids details etc.
4. New applicant:-When the applicant see the job vacancy she can apply for the job.
28
UML
29
5.8 UML
The creation of UML was originally motivated by the desire to standardize the disparate
notational systems and approaches to software design. It was developed by Grady
Booch, Ivar Jacobson and James Rumbaugh at Rational Software in 1994–1995, with
further development led by them through 1996.
In 1997 UML was adopted as a standard by the Object Management Group (OMG), and has
been managed by this organization ever since. In 2005 UML was also published by
the International Organization for Standardization (ISO) as an approved ISO
standard. Since then the standard has been periodically revised to cover the latest revision
of UML.
30
UML FOR ADMINISTRATOR
31
UML FOR PANCHAYATH OFFICER
32
UML FOR TEACHER
33
UML FOR APPLICANT
A data flow diagram (DFD) is a graphical representation of the "flow" of data through an
information system. A data flow diagram can also be used for the visualization of data
processing .It is common practice for a designer to draw a context-level Data flow diagram
first which shows the interaction between the system and outside entities.
The DFD is designed to show how a system is divided into smaller portions and to highlight
the flow of data between those parts. This context-level Data flow diagram is then
"exploded" to show more detail of the system being modeled. Data flow diagrams were
invented by Larry Constantine, the original developer of structured design, based on Martin
and Estrin's "data flow graph" model of computation.
34
A Data Flow Diagram is a network that describes the flow of data and processes that
change, or transform, data throughout the system. This network is constructed by using a
set of symbols that do not imply a physical implementation. It is a graphical tool for
structured analysis of the system requirements. DFD models a system by using external
entities from which data flows to a process, which transforms the data and creates, output-
data-flows which go to other processes or external entities or files. Data in files may also
flow to processes as inputs.
There are various symbols used in a DFD. Bubbles represent the processes. Named arrows
indicate the data flow. External entities are represented by rectangles and are outside the
system such as venders or customers with whom the system interacts. They either supply
or consume data. Entities supplying data are known as sources and those that consume
data are called sinks. Data are stored in a data store by a process in the system. Each
component in a DFD is labeled with a descriptive name. Process names are further
identified with a number.
DFDs can be hierarchically organized, which help in partitioning and analyzing large
systems. As a first step, one Data Flow Diagram can depict an entire system, which gives the
system overview. It is called Context Diagram of level 0 DFD. The Context Diagram can be
further expanded.
Thus successive expansion of a DFD from the Context Diagram to those giving more details
is known as leveling of DFD. Thus a top down approach is used, starting with an overview
and then working out the details.
The Data Flow Diagram shows the logical flow of a system and defines the boundaries of
the system. For a candidate system, it describes the inputs (source), outputs (destination),
database (files) and procedures (data flow), all in a format that meet the user’s
requirements. The main merit of DFD is that it can provide an overview of system
requirements, what data a system would process, what transformations of data are done,
what files are used, and where the results flow.
35
Rules for constructing a Data Flow Diagram
3. Decomposed data flow squares and circles can have same name.
SYMBOLS DESCRIPTION
36
Content of store and does not alter it, the
arrowhead goes only from the store to the
process. If a process alters the details in the
store then a double headed arrow is used.
LEVEL 0 DFD
37
LEVEL 1 DFD FOR ADMIN
38
LEVEL 1 DFD FOR PANCHAYATH OFFICER
39
LEVEL 1 DFD FOR TEACHER
40
LEVEL 1 DFD APPLICANT
41
TABLES
42
1. Table Name: tbl_login
43
Field Data Type Constraints
anganawadi_id int Primary key
dist_id int Foreign Key
panch_id int Foreign Key
ward_id int
Email varchar
Phone varchar
username varchar
passwd varchar
cnfmpass varchar
security varchar
Ans varchar
44
Field Data Type Constraints
User_id int Primary Key
Fname varchar
Lname varchar
Hname varchar
Dis_id int Foreign Key
Panch_id int Foreign Key
Ward_id int
Phone varchar
Adhar varchar
Dob varchar
Email varchar
Quail varchar
Design varchar
Photo varcha
Docu varchar
Username varchar
Paswd varchar
Cnfrm varchar
Security varchar
Ans varchar
45
Field Data Type Constraints
kid_id int Primary Key
f_name varchar
l_name varchar
Gender varchar
h_name varchar
dist_id int Foreign Key
panch_id int Foreign Key
Ward int
gu_name varchar
gu_phn varchar
adhar_no varchar
Joinig varchar
passout varchar
46
Field Data Type Constraints
anganawadi_id int Foreign Key
panch_id int Foreign Key
child_id int Primary Key
first_name varchar Foreign Key
last_name varchar Foreign Key
weight_birth varchar
weight_status varchar
dpt1 varchar
dpt2 varchar
dpt3 varchar
opv1 varchar
opv2 varchar
opv3 varcha
h1 varchar
h2 varchar
h3 varchar
v1 varchar
v2 varchar
v3 varchar
v4 varch
v5 varchar
47
first_name int Foreign Key
last_name int Foreign Key
p_hus varchar
p_reg varchar
p_first int
p_second int
p_third int
p_forth int
p_fifth int
p_deliv varchar
p_child varchar
48
SYSTEM TESTING
49
6. SYSTEM TESTING
No program or system design is perfect; communication between the user and the
designer is not always complete or clear, and time is usually short. The result is errors and
more errors. The number and nature of errors in a new design depend on several factors,
2. The programmer’s ability to generate a code that reflects exactly the system
specifications.
Software testing is a critical element of software quality assurance and represents the
ultimate reviews of specification, design and coding. Testing presents an interesting
anomaly for the software. Testing is vital to the success of the system. Errors can be
injected at any stage during development. System testing makes a logical assumption that if
all the parts of the system are correct, the goal will be successfully achieved. During testing,
the program to be tested is executed with set of test data and the output of the program for
the test data is evaluated to determine if the program is performing as expected. A series of
testing are performed for the proposed system before the system is ready for user
acceptance testing. System testing is actually a series of different tests whose primary
purpose is to fully exercise the computer-based system. Although each test has a different
purpose, all work to verify that all system elements have been properly integrated and
performed allocated functions. During testing we tried make sure that the product does
exactly what is supposed to do.
Testing is the final verification and validation activity within the organization itself. In the
testing stage, we try to achieve the following goals; to affirm the quality of the product, to
find and eliminate any residual errors from previous stages, to validate the software as a
solution to the original problem, to demonstrate the presence of all specified functionality
in the product, to estimate the operational reliability of the system. During testing the
50
major activities are concentrated on the examination and modification of the source code.
The rules that are serve as well as testing objectives are,
A good test case is one that has a high probability of finding an as yet undiscovered
error.
Unit testing
Integration testing
Validation testing
Output testing
This is the first level of testing. Unit testing focuses verification effort on the smallest unit of
the software design, the module this is known as module testing. Since the proposed
51
system has modules the testing is individually performed on each module. Using the details
description as a guide, important control paths are tested to uncover errors within the
boundary of the modules. This testing was carried out during programming stage itself. In
this testing step each module is found to be working satisfactorily as regards to the
expected output from the module.
Data can be test across an interface; one module can have adverse effect on another, sub
function when combined may not produce the desired function. Integration testing is a
systematic technique for constructing the program structure while at the same time
conducting test to uncover errors associated within the interface. The objective is to take
unit tested modules and built a program structure that has been dictated by design. All
modules are combined in this testing step. The entire program is tested as whole.
Correction is difficult at this stage because the isolation of causes is complicated by the vast
expense of the program.
Validation testing can be defined in many ways, but a simple definition is that validation
succeeds when the software function in manner that is reasonably expected by the user.
Software validation is achieved through a series of tests that demonstrate conformity with
requirement. After validation test has been conducted, one of two conditions exists.
52
consideration has been tested by using validation testing and found to be working
satisfactorily
53
SYSTEM IMPLEMENTATION
54
7. SYSTEM IMPLEMENTATION
As the system is tested, it starts to move into the implementation phase. Ideally the system
should be completed and fully tested implementation gets under way but unless a package
is being installed this seldom happens. Normally what happens is that parts of the system
which are required for file set-up are completed first and this process gets under way.
Conversions program may also have to be available which allow data from another system
to be used in setting up the files. Once this data is set-up, it must keep up-to-date and thus
the first use is made of the new system. This may be followed by a period of parallel
running and then a decision is made to drop the old system.
As soon as the first phase pf implementation, file set-up starts, all system documentation
should be available, viz., user manuals and procedure manuals, computer operating
instructions and security procedures. The system then passes from the development staff
to the computer operations personnel and once the system is alive, strict procedures
should be enforced governing programmers access to programs and files. Procedures
should be established to control all requests for system and program changes, from the
request by the user to the implementation by the programmer.
Installation Procedure
Equipments vendors can provide the specific for equipment installation. They usually work
with the projects equipment installation team in planning for adequate space, power and
light and a suitable environment. After a suitable site has been completed the computer
equipment can be installed. Although equipment is normally installed by the manufacture,
the implementation team should advice and assist.
Implementation Plan
Implementation is the stage in the project where the theoretical design is turned into a
working system and is giving confidence on the new system for the users that it will work
efficiently and effectively. It involves careful planning, investigation of the current system
55
and it’s constraints on implementation, design of methods to achieve the change over an
evaluation, of change over methods.
Implementation is the final and important phase. The most critical stage in achieving a
successful new system and in giving the users confidence that the new system will work
and be effective. The system can be implemented only after thorough testing is done and if
it found to working according to the specification. This method also offers the greatest
security since the old system can take over if the errors are found or inability to handle
certain types of transactions while using the new system.
Implementation involves placing the completed and tested system of hardware and
software into the actual work environment of the users. There are both technical and
people-oriented activities during this stage. Examples of technical activities include
converting date files.
7.2 Training
The purpose of the training is to ensure that all the personnel who are to be associated
with the computer based business system possess the necessary knowledge skills.
Operating, programming and user personnel are trained using performance manuals as
training aids.
56
Programmer Training:-Programmers are assigned to the computer-based business
system project at the beginning of the development phase. The programmer’s reference
manual helps an experienced programmer, unfamiliar with the system, about all of the
aspects of the computer program. The manual should enable this person to,
User Training: After the system is implemented successfully, training of the users is the
one of the most important subtasks of the developer. Even well designed and technically
elegant systems can succeed or fail, because of the way they are operated and used. For this
purpose, user manuals are prepared and handled over to the user to operate the developed
system. Both the hardware and software securities are made to run the developed system
successfully in future.
In order to put new application systems in to use, the following activities were taken care
of:
Test run for some period to ensure smooth switching over the system.
57
The users are trained to use the newly developed functions. User manuals
describing the procedures for using the functions listed on menu and circulated to all the
users. It is confirmed that the system is implemented up to users need and expectations.
7.3 Conversion
Conversion is the process of preparing all of the operations that result directly in the
turnover of the new system to the user. Conversion has two parts: The creation of a
conversion plan at the start of the development phase and the implementation of this plan
throughout the development phase.
The creation of a system changeover plan at the end of the development phase and
the implementation of the plan at the beginning of the operation phase.
Conversion activities
A conversion plan is prepare at the start of the development phase. Its principal elements
concern procedures, program and file conversion.
Procedure conversion
Often a new system will incorporate many of the old systems forms and procedures, but
some of these may require modification to fit into the new system. The new system may
interface to the network of other system; too may cause some modification of procedures.
The procedure that requires change must be identified, and the change explained during
training of the personnel.
Program conversion
The new computer based system may include some computer program that is part of
existing system. A conversion problem may arise if new equipments are installed, if the
inputs and outputs of the existing programs change, or if the existing programs are not
efficient in their new environment. Re programming should be considered when programs
are documented, heavily patched, or not efficient enough. For instance, many small
programs might be replaced by a single program that performances a repetitive function
more efficiently.
File conversion
58
File conversion can be thus most time consuming and expensive step in the entire project.
The magnitude of this task is underestimated. Duplicate files must be consolidated and
errors corrected before changeover to the new system start. Otherwise a series of data
errors may plug users of the new system for considerable time after its implementation.
After the system is implemented and conversion is complete, a review of system is usually
conducted by users and analyst alike. Not only is this a normal practice, but it should be
formal process to determine how well the system is working, how it has been accepted, and
whether adjustments are needed. The review is also important to gather information for
maintains of the system. Since no system is really ever complete, it will be maintained as
changes are required because of internal developments, such as new users or business
activities, and externals developments, such as new legal requirements, industry standards,
or competition. The post implementation review provides the first source of information
for maintains requirements, Review questions The most fundamental concern during post
implementation review is determining whether the system has met its objective: that is,
analyst want to know if the performance level of users has improved and if the system is
producing the result intended. If neither is happening, one way question whether the
system can be considered successful. The system’s output quality merits special attention.
The concerns raise during analysis and design about the accuracy of information, the
timeliness of presentation, completeness, and the appropriateness of format continue to
indicate systems quality. Reports that are awkward to use or that do not contain sufficient
information to be useful may need redesign. Or the review may reveal that information
previously thought unnecessary must be provided after all. This issue may in turn affect
input requirements. Ease of use and tendency towards errors in input are fundamental
questions for all analysts to address during this review. Is the system easy to use? Are there
adequate safeguards to prevent errors in input and to detect, report, and correct them if
they occur?
If the answered to the questions are not favorable, the reliability and quality of the entire
system may be suspect. User confidence is a generally also an indicator of system quality.
The confidence that user’s, managers, and operators have in the system is sure to affect its
59
longevity and use. Can an analyst realistically expect users who are not confidence of the
system’s reliability to draw on it in reaching critical decisions? It is unlikely. But if
evaluators find that confidence levels are not adequate, they must also determine why. The
questions of an accuracy, completeness timeliness, and usability continue to be central to
the review. Ease of use and benefits of use balance each other. It is generally found that
systems that are easy to use and that provide distinct benefits are accepted and well
received by people. However, even when using a system provides better performance, if
the system itself is awkward to use, it is not common to find that use of the system will be
avoided. Thus, ease of use is as important an attribute as reliability.
In some case, unsuitable systems components may be found during post implementation
review. For example, that a system requires excessive throughput time can be traced to the
amount of time required to print out. Changing printers may eliminate the problem. Data
preparation bottlenecks can be traced to insufficient terminals or data entry stations.
2. How have information systems changed the way in which operations are
performed?
3. How have information systems changed the accuracy of information that users
receive?
4. How have information systems changed the timeliness of information and reports
users receive?
5. How has information systems brought about organization changes? Are these
changes for the better for the worse?
7. How have information systems changed control or centralization? What is the effect
of such changes?
8. How have information systems changed the attitude of systems users or persons
affected by the system?
60
9. How have information systems changed the number of users?
10. How have information systems changed the interactions between members of the
organization?
12. How have information systems changed the efforts that must be expended to
receive information for decision making?
Review methods
The impact of the system could also be compared with financial costs and benefits. Even if
greater productivity is achieved with a new system, management will to known whether
the changes produce the intended financial, service, or competitive advantage. During the
system is reviewed to compare the actual costs and benefits with the expectation.
61
How users and other persons do affected by new system, such as customers, suppliers, or
internal mangers, fell about the new system? This simple question reveals much about the
future usefulness of the system. Whether through questionnaires or personnel interviews,
attitude surveys reveal the people side of the system, pertinent questions probe individuals
feeling about the changes in the amount of work they perform, quality of their efforts,
quality of the service to customer or patients, ease of use, or acceptance of the system by
co-workers.
System maintenance is a set of software engineering activities that occur after software has
been delivered for the customer and put into operation. The success of the software and
project rely on the maintenance procedure performed. Maintenance was done after the
success implementation. Maintenance is continued till the product is reengineered or
deployed to another platform. System maintenance is actually the implementation of post-
implementation review plan. The maintenance can be classified as corrective, adoption or
perfective.
62
according to users additional or changing means are include in perfective maintenance. The
greatest amount of maintenance work is for user enhancement and improved
documentation of the system for better efficiency.
Maintenance covers a wide range of activities including correcting coding and design
errors, updating documentation and test data and upgrading user support.
The keys to reduce the need for maintenance while making it possible to carry on with
essential task more efficiently are as follows:
63
SYSTEM EVALUATION
64
8. SYSTEM EVALUATION
All of these steps form part of the trader’s method and are carried out routinely for any
system rules he wishes to review. Systems traders spend a proportion of their trading time
trying to improve their existing systems and looking for new and different ideas. This is
interesting work when you have the essential tools to carry it out.
65
CONCLUSION
66
9. CONCLUSION
The existing system is fully manual that means the record are maintained and keeped
manually by workers. An Anganawadi has mainly two workers. One is the main and
another one is the assistant .The main worker who maintains and controls the major
records of Anganawadi. The main disadvantage of the existing system is that it is very time
consuming process and also very difficult to handle the whole records. When the record
contain any type of failure then we cannot Backup the record .It gives greater workload to
the workers. “ANGANAWADI MANAGEMENT SYSTEM“overcomes tis disadvantages using
ASP.NET and SQL Server.
9.1FUTURE ENHANCEMENT
The application has the capability for easy integrating with other system. New modules can
be added to this system with less effort. Reusability is possible as and when required in this
application. There is flexible in all the modules .We can easily add modules to the system.
Now we are implemented only the registration, senses details, in future we can add stock
details of anganawadies and manage the attendance using face recognition.
67
APPENDIX
68
10.1APPENDIX A
Sample code
<%@PageLanguage="C#"AutoEventWireup="true"CodeFile="adlogin.aspx.cs"Inherits="adl
ogin"%>
<htmlxmlns="http://www.w3.org/1999/xhtml">
<headrunat="server">
<title></title>
<styletype="text/css">
.style1
{
}
.style2
{
height: 23px;
}
.style3
{
width: 779px;
}
.style4
{
text-align: center;
}
.style6
{
font-size: x-large;
}
.style7
{
height: 26px;
}
.style8
{
width: 779px;
height: 26px;
}
69
.style9
{
text-align: center;
width: 205px;
}
.style10
{
width: 205px;
}
.style11
{
height: 26px;
width: 205px;
}
.style12
{
height: 23px;
width: 205px;
}
.style13
{
height: 27px;
}
.style14
{
height: 27px;
}
.style15
{
width: 779px;
height: 27px;
}
.style16
{
width: 714px;
height: 27px;
}
.style17
{
width: 714px;
}
.style18
{
width: 714px;
height: 26px;
}
70
</style>
</head>
<body>
<formid="form1"runat="server">
<div>
<tablestyle="width: 87%;">
<tr>
<tdclass="style9">
</td>
<tdclass="style4"colspan="2">
<strong><spanclass="style6">LOGIN HERE...</span></strong></td>
<tdclass="style4">
</td>
</tr>
<tr>
<tdclass="style13"colspan="4">
<asp:RadioButtonID="rdb_admin"runat="server"Text="ADMIN"/>
<asp:RadioButtonID="rdb_officer"runat="server"Text="OFFICER"/>
<asp:RadioButtonID="rdb_anganawadi"runat="server"Text="ANGANAWADI"/>
<asp:RadioButtonID="rdb_applicant"runat="server"Text="APPLICANT"/>
</td>
</tr>
<tr>
<tdclass="style10">
</td>
<tdclass="style1">
Username</td>
<tdclass="style17">
<asp:TextBoxID="txt_uname"runat="server"></asp:TextBox>
<asp:RequiredFieldValidatorID="RequiredFieldValidator1"runat="server"
ControlToValidate="txt_uname"ErrorMessage="Enter
Username"></asp:RequiredFieldValidator>
</td>
<tdclass="style3">
</td>
</tr>
<tr>
<tdclass="style11">
</td>
<tdclass="style7">
Password</td>
<tdclass="style18">
<asp:TextBoxID="txt_pass"runat="server"style="height: 22px"
TextMode="Password"></asp:TextBox>
<asp:RequiredFieldValidatorID="RequiredFieldValidator2"runat="server"
71
ControlToValidate="txt_pass"ErrorMessage="Enter
Password"></asp:RequiredFieldValidator>
</td>
<tdclass="style8">
</td>
</tr>
<tr>
<tdclass="style10">
</td>
<tdclass="style1"colspan="2">
&nbs
p; &n
bsp; &
nbsp;
<asp:ButtonID="btn_login"runat="server"Text="LOGIN"Width="68px"
onclick="btn_login_Click"/>
<asp:ButtonID="btn_cancel"runat="server"Text="CANCEL"/>
</td>
<tdclass="style1">
</td>
</tr>
<tr>
<tdclass="style12">
</td>
<tdclass="style2"colspan="2">
<asp:HyperLinkID="HyperLink1"runat="server"ForeColor="#3333CC">Forgot
Password?</asp:HyperLink>
</td>
<tdclass="style2">
</td>
</tr>
</table>
</div>
</form>
</body>
</html>
using System;
usingSystem.Collections.Generic;
usingSystem.Linq;
usingSystem.Web;
usingSystem.Web.UI;
usingSystem.Web.UI.WebControls;
72
usingSystem.Configuration;
usingSystem.Data;
usingSystem.Data.SqlClient;
publicpartialclassadlogin : System.Web.UI.Page
{
protectedvoidPage_Load(object sender, EventArgs e)
{
}
protectedvoidbtn_login_Click(object sender, EventArgs e)
{
SqlConnection con =
newSqlConnection(ConfigurationManager.ConnectionStrings["str"].ConnectionString);
con.Open();
SqlCommandcmd = newSqlCommand("select * from tbl_login where uname ='" +
txt_uname.Text + "' and paswrd='" + txt_pass.Text + "'",con);
SqlDataAdaptersda = newSqlDataAdapter(cmd);
DataTabledt = newDataTable();
sda.Fill(dt);
if (dt.Rows.Count == 0)
{
Response.Write("<script>alert('Invalid login');</script>");
else
{
Session["userid"] = dt.Rows[0][0].ToString();
Response.Redirect("district.aspx");
}
SqlCommand cmd1 = newSqlCommand("select * from tbl_anganawadi where usrname ='" +
txt_uname.Text + "' and passwd='" + txt_pass.Text + "'", con);
73
Response.Write("<script>alert('Invalid login');</script>");
else
{
Session["anganawadi_id"] = dt1.Rows[0][0].ToString();
Response.Redirect("district.aspx");
}
SqlCommand cmd2 = newSqlCommand("select * from tbl_office where uname ='" +
txt_uname.Text + "' and paswd='" + txt_pass.Text + "'", con);
Response.Write("<script>alert('Invalid login');</script>");
else
{
Session["panch_id"] = dt2.Rows[0][1].ToString();
Response.Redirect("district.aspx");
}
SqlCommand cmd3 = newSqlCommand("select * from tbl_newuser where username ='" +
txt_uname.Text + "' and paswd='" + txt_pass.Text+ "'", con);
Response.Write("<script>alert('Invalid login');</script>");
else
{
74
Session["user_id"] = dt3.Rows[0][0].ToString();
Response.Redirect("district.aspx");
}
con.Close();
}
}
<html xmlns="http://www.w3.org/1999/xhtml">
<head runat="server">
<title></title>
<style type="text/css">
.style1
width: 226px;
.style2
width: 226px;
height: 30px;
.style3
height: 30px;
75
</style>
</head>
<body>
<div>
<table style="width:100%;">
<tr>
<td class="style1">
District</td>
<td>
DataTextField="dist_name" DataValueField="dist_id">
</asp:DropDownList>
ControlToValidate="ddl_dist" ErrorMessage="Select
district"></asp:RequiredFieldValidator>
</td>
</tr>
<tr>
<td class="style1">
Panchayath Name</td>
<td>
DataTextField="panch_name" DataValueField="panch_id">
76
</asp:DropDownList>
ControlToValidate="ddn_panch" ErrorMessage="Select
Panchayath"></asp:RequiredFieldValidator>
</td>
</tr>
<tr>
<td class="style1">
Ward Number</td>
<td>
</td>
</tr>
<tr>
<td class="style2">
Email</td>
<td class="style3">
ValidationExpression="\w+([-+.']\w+)*@\w+([-.]\w+)*\.\w+([-
.]\w+)*"></asp:RegularExpressionValidator>
</td>
</tr>
<tr>
77
<td class="style1">
Phone Number</td>
<td>
</td>
</tr>
<tr>
<td class="style1">
Username</td>
<td>
ControlToValidate="txt_uname" ErrorMessage="Enter
Username"></asp:RequiredFieldValidator>
</td>
</tr>
<tr>
<td class="style1">
Password</td>
<td>
ControlToValidate="txt_pass" ErrorMessage="Enter
password"></asp:RequiredFieldValidator>
</td>
78
</tr>
<tr>
<td class="style2">
Confirm Password</td>
<td class="style3">
ControlToCompare="txt_pass" ControlToValidate="txt_confirm"
ErrorMessage="Wrong password"></asp:CompareValidator>
</td>
</tr>
<tr>
<td class="style1">
Security Question</td>
<td>
<asp:ListItem>--Select--</asp:ListItem>
</asp:DropDownList>
79
ControlToValidate="ddl_question" ErrorMessage="Select security
question"></asp:RequiredFieldValidator>
</td>
</tr>
<tr>
<td class="style1">
Answer</td>
<td>
ControlToValidate="txt_ans" ErrorMessage="Enter
answer"></asp:RequiredFieldValidator>
</td>
</tr>
<tr>
<td class="style1">
</td>
<td>
</td>
</tr>
<tr>
<td class="style1">
80
ConnectionString="<%$ ConnectionStrings:str %>"
</td>
<td>
</td>
</tr>
</table>
</div>
SelectCommand="select
w.anganawadi_id,b.dist_name,p.panch_name,w.ward_id,w.email,w.phone from
tbl_disb,tbl_officep,tbl_anganawadi w where p.dis_id=w.dist_id and b.dist_id=p.dis_id and
p.panch_id=w.panch_id"
<DeleteParameters>
</DeleteParameters>
<UpdateParameters>
81
<asp:Parameter Name="email" />
</UpdateParameters>
</asp:SqlDataSource>
DataKeyNames="anganawadi_id" DataSourceID="SqlDataSource4">
<Columns>
<asp:BoundFieldDataField="anganawadi_id" HeaderText="anganawadi_id"
SortExpression="dist_name" />
SortExpression="panch_name" />
<asp:BoundFieldDataField="ward_id" HeaderText="ward_id"
SortExpression="ward_id" />
<asp:CommandFieldShowDeleteButton="True" />
<asp:CommandFieldShowEditButton="True" />
</Columns>
</asp:GridView>
</form>
</body>
</html>
82
using System;
usingSystem.Collections.Generic;
usingSystem.Linq;
usingSystem.Web;
usingSystem.Web.UI;
usingSystem.Web.UI.WebControls;
usingSystem.Configuration;
usingSystem.Data;
usingSystem.Data.SqlClient;
con.Open();
83
cmd.ExecuteNonQuery();
con.Close();
GridView1.DataBind();
Newuser code
using System;
usingSystem.Collections.Generic;
usingSystem.Linq;
usingSystem.Web;
usingSystem.Web.UI;
usingSystem.Web.UI.WebControls;
usingSystem.Configuration;
84
usingSystem.Data;
usingSystem.Data.SqlClient;
SqlConnectioncon=newSqlConnection(ConfigurationManager.ConnectionStrings["str"].Con
nectionString);
con.Open();
cmd.ExecuteNonQuery();
con.Close();
GridView1.DataBind();
85
}
txt_fname.Text = "";
txt_lname.Text = "";
txt_hname.Text = "";
ddl_dis.SelectedItem.Text = "";
ddl_panch.SelectedItem.Text="";
txt_ward.Text = "";
txt_ph.Text = "";
txt_adhar.Text = "";
txt_calender.Text = "";
txt_email.Text = "";
txt_quali.Text = "";
86
10.2 APPENDIX B
SCREEN SHOTS
1.Login Page
2.District
87
3.Panchayath Office
4.Anaganawadi
88
5. Senses
89
10.3 APPENDIX C
BIBLIOGRAPĤY
1. https://en.wikipedia.org/wiki/ASP.NET
2. https://www.w3schools.com/asp/
3.https://en.wikipedia.org/wiki/Anganwadi
90