Professional Documents
Culture Documents
Online Polling System
Online Polling System
1.1 ABSTRACT
and other board members every interval of times, since the candidates are working
various part of the world it is difficult for them to vote and they need a web based
polling system with security measures This system provides them good solutions with
used to encrypt written material (printed text, handwritten notes, pictures, etc) in a
perfectly secure way. The decoding is done by the human visual system directly. For a
shares, where each participant in P receives one share. To retrieve the image back all
mails a FIRST share to voter well in advance and the second share is send during the
polling time, voter has to get the password from these two share to poll his vote.
This system is very useful and safe for remote voting. This system is web
based application so that it can be accessed by any authorized person anywhere in the
consulting and outsourcing firm Intersoft KK, which has head-quarters in Japan and
branch offices in the United States, Singapore, Taiwan and an offshore development
center in Bangalore, India. The company aims to give quality training on advanced IT
the JOB Training (OJT) at Intersoft KK development division and get them job at
training for college students at college premises itself and corporate training for
training program for overseas students from various countries like Japan, Australia,
Singapore, Malaysia, Taiwan etc. For Offshore training candidates, DHS Informatics
and Tours.
For overseas students those who are lacking in English language, DHS
bilingual trainers. For local students DHS Informatics provides coaching on Japanese
Some the other projects that DHS Informatics has undertaken are as follows:
and other board members every interval of times, since the candidates are working
various part of the world it is difficult for them to vote and they need a web based
polling system with security measures. This system provides them good solutions
written material (printed text, handwritten notes, pictures, etc) in a perfectly secure
way.
The decoding is done by the human visual system directly. For a set P of n
participants, a secret image S is encoded into n shadow images called shares, where
To retrieve the image back all the participants’ share to be place one over
another Implementation of above tasks in remote voting system, the election office
mails a FIRST share to voter well in advance and the second share is send during the
polling time, voter has to get the password from these two share to poll his vote. This
system is very useful and safe for remote voting. This system is web based application
so that it can be accessed by any authorized person anywhere in the world through
internet.
Modules:
Admin Session
Login module
Voters Details
Election Details
Nominees Details
Change Password
Voter Session
Login Module
2. LITERATURE SURVEY
.NET is a library, one that is just as extensive as the Windows API. We can
use it to call up all the same sorts of features that have traditionally been the role of
the Windows operating systems; displaying windows and dialog boxes, verifying
security credentials, calling on base operating systems services, creating threads and
so on, as well as newer areas such as accessing databases or connecting to the internet
.NET provides the environment in which our program is run. When .NET
aware code is executed, it will be .NET that starts up your code, manage the running
threads, provides various background services, and in real senses is the immediate
ADVANTAGES:
Good Design
Language Independence
Code Sharing
Improved Security
INTRODUCTION TO ASP.NET:
web sites.
ASP.NET is a unified web platform that provides all the services necessary for
to build enterprise-class applications. It hopes to do for the web what visual basic has
done for windows. ASP.NET expects to reduce and replace coding with components.
programming languages and operating systems for developing and deploying web
applications.
applications through IIS. IIS deciphers and optionally authenticates the request. If
Allow Anonymous is turned on, no authentication occurs. IIS also finds the requested
resource (such as an ASP.NET application), and, if the client is authorized, returns the
appropriate resource.
This release of ASP.NET uses IIS 5.0 as the primary host environment. When
considering ASP.NET authentication, you should understand the interaction with IIS
Windows NT account and uses them to authenticate a user. There are three different
kinds of authentication available in IIS 5.0: basic, digest, and Integrated Windows
Authentication (NTLM or Kerberos). You can select the type of authentication to use
ADVANTAGES:
Language-independence
Simplified development
Web services
Backward compatibility
ASP.NET ELEMENTS:
Web Forms:
Web forms give the developer the ability to drag and drop ASP.NET server
controls onto the form and easily program the events that are raised by the control.
User controls, mobile controls and other third-party controls can be added to extend
web forms.
Server Controls:
Server controls automatically maintain their state between calls to the server. Two
View State:
When a web form is rendered to the browser, a hidden HTML input tag is
dynamically created, called view state. This input contains base64-encoded data that
WEBSERVER CONTROLS:
Label:
Textbox:
It is used to assign a value to a text box or read a value that a user has entered
into it. Multiline property is assigned the value Multi Line, a text area is displayed.
Button control:
It renders the same form submit button as rendered by the normal HTML tag.
Image button:
either checked or unchecked. No more than one radio button in a group can be
exclusive options. Its options are displayed in a single-line pick list widget.
It enables a user to select only one option at a time, or create a multiselect list
box.
Hyperlink control:
VALIDATION CONTROLS:
Requiredfieldvalidator control:
It is used to check whether a control has a value. This control used in a textbox
control. Other input controls such as radiobuttonlist are also used this validator.
Regularexpressionvalidator control:
It is used to match the value entered into a form field to a regular expression.
This control to check whether a user has entered, for example, a valid e-mail address,
Comparevalidator control:
It performs comparisons between the data entered into a form field and
another value. The other value can be fixed value, such as a particular number, or a
Rangevalidator control:
It is used to check whether the value of a form field falls between a minimum
and maximum value. The minimum and maximum values can be dates, numbers,
Validationsummary control:
It is used to summarize the control with the validation controls. This control to
summarize all the errors all the top of a page or wherever else we wish.
ADVANCED CONTROLS:
Panel control:
Instead of setting the visible property for controls one by one, we can use the
AdRotator control:
this control that contains a list of the properties of banner advertisements to display.
Datagrid control:
It is used to display the records without using templates. We can simply bind a
data source to the data grid, and it automatically displays the records. We can create
columns to control how records are formatted or to display links for editing records.
ADO.NET:
SqlConnection
SqlCommand
SqlDataReader
SqlConnection:
the connection in different ways depending on the type of database that we want to
access.
SqlCommand:
statement to execute.
SqlDataReader:
data reader represents only a single record at a time. To fetch next record in the
stream we must call the read () method. To display all the records returned from a
query, we must call the read () method repeatedly until we reach the end of the
stream.
DATASET:
A dataset can contain one or more Data Tables that represent database tables.
DATAADAPTER:
It represents the bridge between a Dataset and the data source it represents.
also use a DataAdapter to update and existing database table with changes made to a
DataSet.
Open:
Microsoft SQL Server 2000 extends the performance, reliability, quality, and
ease-of-use of Microsoft SQL Server version 7.0. Microsoft SQL Server 2000
includes several new features that make it an excellent database platform for large-
applications.
The OLAP Services feature available in SQL Server version 7.0 is now called
SQL Server 2000 Analysis Services. The term OLAP Services has been replaced with
the term Analysis Services. Analysis Services also includes a new data-mining
component.
Internet Integration
The SQL Server 2000 database engine includes integrated XML support. It
also has the scalability, availability, and security features required to operate as the
data storage component of the largest Web sites. The SQL Server 2000 programming
model is integrated with the Windows DNA architecture for developing Web
applications, and SQL Server 2000 supports features such as English Query and the
The same database engine can be used across platforms ranging from laptop
running Microsoft Windows 2000 Data Center Edition. SQL Server 2000 Enterprise
Edition supports features such as federated servers, indexed views, and large memory
support that allow it to scale to the performance levels required by the largest Web
sites.
SQL Server 2000 includes a set of administrative and development tools that
improve upon the process of installing, deploying, managing, and using SQL Server
across several sites. SQL Server 2000 also supports a standards-based programming
model integrated with the Windows DNA, making the use of SQL Server databases
and data warehouses a seamless part of building powerful and scalable systems. These
features allow you to rapidly deliver SQL Server applications that customers can
Data warehousing.
SQL Server 2000 includes tools for extracting and analyzing summary data for
online analytical processing. SQL Server also includes tools for visually designing
Views:
Views are defined using a SELECT statement and are analogous to an object
The selection of hardware is very important for the proper working of the
proposed system. The technologies that we will be using for developing our project
depend on the hardware configuration. When selecting hardware, the size and
Hard Disk : 40 GB
Ram : 512 MB
whether a particular software package fits system requirements or not. This section
development activities. It is the medium through which the client and user needs are
designing a project. SRS means the requirements need for project designing and
developing. The entire information, which is needed for the project is specified in it.
communication gap between the client, the user and the developers. SRS goes as
input to the designing phase of the project, because to design a project, first we have
to know the detailed structure of the project, that is nothing but SRS, which tells
The SRS provides means for translating the ideas in the minds of the clients,
Correct
Complete
Unambiguous
Verifiable
Consistent
Stability
Modifiable
Traceable
Components of a SRS:
o Functionality
o Performance
o External interfaces
describes what the proposed software should do without describing how the software
will do it. The developers are responsible for asking clarification, where ever
necessary, and will not make changes without the permission of the client.
the final product. It establishes the basic agreement between the client and the
developer, what the software product will do. This is the requirement specification
document for Enhanced License Key Generator for software Protection that will be
developed.
4.1 Purpose
A new and novel way of Advertisement on Internet which will benefit both the
advertisement company and web site owner. Here the concept is WIN – WIN
advertisement also doesn’t work out. Now-a-days placing the advertisement in web
site becomes popular and getting more response than any other advertisement which
is practicing in earlier.
mails a FIRST share to voter well in advance and the second share is send
• Voter has to get the password from these two share to poll his vote.
• This system provides them good solutions with security using Visual
cryptography
process followed in making this determination is called feasibility Study. This type of
study if a project can and should be taken. In the conduct of the feasibility study, the
analyst will usually consider seven distinct, but inter-related types of feasibility.
Technical Feasibility
This is considered with specifying equipment and software that will successful satisfy
the user requirement the technical needs of the system may vary considerably but
might include
Economic Feasibility
Economic analysis is the most frequently used technique for evaluating the
The procedure is to determine the benefits and savings are expected form a proposed
system and a compare them with costs. It benefits outweigh costs; a decision is taken
to design and implement the system will have to be made if it is to have a chance of
being approved. There is an ongoing effort that improves in accuracy at each phase of
Operational Feasibility
To develop an application that enables the user to create his own webpage,
Each user will be provided a unique user id and password which he can use to
User can use his web page to advertise his own products and also place links for
Sense.
5. SYSTEM ANALYSIS
System
System Analysis
System analysis and design are the application of the system approach to
problem solving generally using computers. To reconstruct a system the analyst must
consider its elements output and inputs, processors, controls, feedback and
environment.
Analysis
and their relationships within and outside of the system. One aspect of analysis is
defining the boundaries of the system and determining whether or not a candidate
system should consider other related systems. During analysis data are collected on
the available files decision points and transactions handled by the present system.
This involves gathering information and using structured tools for analysis.
The above papers shows the use of visual cryptography schemes from the
basic method where cheating can be possible. Visual cryptography is only one such
technique, but it may be expanded further, as well as combined with other techniques
Demerits:
presence and it is not feasible when the voters are in other city or in other
country.
To overcome the above methodologies and schemes, the proposed system tries
Tasks1:
Task 2:
Task 3:
Implementation of above tasks in remote voting system, the election office mails a
FIRST share to voter well in advance and the second share is send during the polling
time, voter has to get the password from these two share to poll his vote.
MERITS:
• Proposed online voting system is very effective and it will useful for voters
and organization in many ways and it will reduce the cost and time.
• as to get the password from these two share to poll his vote
6. SYSTEM DESIGN
Login
Election
Details
Nominees
Voter Password
Image
Voter
Admin
Select
Set Pass image
Mail
VC
System
FTP
Download Share2
Login
Select Election
Voter
Polling
Counting
LogOut Increment
Request
Status
Image
Share1
Share2
Change
Password
Confirmation
Characteristic
Auto
Table Name: M_Admin Datatype NULL
Constraint Inc.
(Width) (Y/N)
(Y/N)
Primary
Admin_No Int N Y
Key
Column Name
Characteristic
Auto
Table Name: M_User Datatype NULL
Constraint Inc.
(Width) (Y/N)
(Y/N)
Primary
User_code int(10) N Y
Key
User_id char(15) N N
User_pwd char(50) N N
User_name char(50) N N
User_Designation char(100) N N
User_Emp_ID char(30) N N
User_EmailID char(100) N
User_email varchar(50) N N
User_sex char(20) N
User_Mobile char(50) N N
Column Name
User_PWDShare1 char(100) N N
User_PWDShare2 char(100) N N
User_Status Int N N
Logical Design
look and feel of content is developed as part of graphic design; the aesthetic layout of
the user interface is created as part of interface design; and the technical structure of
This argues that a Web engineer must design an interface so that it answers three
WebApp has been accessed and (2) inform the user of her location in the content.
2. What can I do now? – The interface should always help the user
understand his current options- what functions are available, what links are live,
navigation. Hence it must provide a “map” of where the user has been and what
Design goals – the following are the design goals that are applicable to virtually every
1. Simplicity
2. Consistency
3. Identity
4. Visual appeal
5. Compatibility.
content, and technology. The mix will vary depending upon the nature of the
WebApp, and as a consequence the design activities that are emphasized will also
vary.
interaction mechanism;
a. Navigation menus
b. Graphic icons
c. Graphic images
Interface Design work flow- the work flow begins with the identification of user,
task, and environmental requirements. Once user tasks have been identified, user
scenarios are created and analyzed to define a set of interface objects and actions.
2. Aesthetic design-also called graphic design, describes the “look and feel” of the
WebApp. Includes color schemes, geometric layout. Text size, font and
3. Content design-defines the layout, structure, and outline for all content that is
objects.
implemented.
TESTING
Definition
develop software. The tests are simple short tests that test functionally of a particular
Using open source libraries like cunit, oppunit and nun it (for C, C++ and C#) these
tests can be automatically run and any problems found quickly. As the tests are
developed in parallel with the source unit test demonstrates its correctness.
Validation testing is a concern which overlaps with integration testing. Ensuring that
the application fulfils its specification is a major criterion for the construction of an
integration test. Validation testing also overlaps to a large extent with System Testing,
where the application is tested with respect to its typical working environment.
Consequently for many processes no clear division between validation and system
testing can be made. Specific tests which can be performed in either or both stages
Regression Testing: Where this version of the software is tested with the
automated test harness used with previous versions to ensure that the required
features of the previous version are skill working in the new version.
of ways off, to ensure that the appropriate techniques for restoring any lost
parts of it, attempted it might also include attempts to obtain access the data,
or harm the software installation or even the system software. As with all
types of security determined will be able to obtain unauthorized access and the
Stress Testing: Where abnormal demands are made upon the software by
increasing the rate at which it is asked to accept, or the rate t which it is asked
to produce information. More complex tests may attempt to crate very large
data sets or cause the soft wares to make excessive demands on the operating
system.
checked. These may include the size of the software when installed, type
amount of main memory and/or secondary storage it requires and the demands
made of the operating when running with normal limits or the response time.
the previous chapter. Even if usability prototypes have been tested whilst the
always be required.
Alpha and beta testing: This is where the software is released to the actual
end users. An initial release, the alpha release, might be made to selected users
who be expected to report bugs and other detailed observations back to the
production team. Once the application changes necessitated by the alpha phase
can be made to larger more representative set users, before the final release is
The final process should be a Software audit where the complete software
requirements. This ensures that all required documentation has been produced,
is in the correct format and is of acceptable quality. The purpose of this review
is: firstly to assure the quality of the production process and by implication
team at the end of the audit will mark the transition between the two phases.
Integration Testing:
testing the high level control routines are tested first, possibly with the middle
more and more levels of detail with actual code rather than stubs.
the two techniques would be used. At the initial stages all the modules might
be only partly functional, possibly being implemented only to deal with non-
were closer to the full functionality. This allows depth-first testing of a module
Unit Testing:
Unit testing deals with testing a unit as a whole. This would test the
interaction of many functions but confine the test within one unit. The exact
also called black-box testing because only the details of the interface are
visible to the test. Limits that are global to a unit are tested here.
building. The construction workers first build the scaffolding and then the building.
software testing, one particular test may need some supporting software. This
software establishes can a correct evaluation of the test take place. The scaffolding
software may establish state and values for data structures as well as providing
dummy external functions for the test. Different scaffolding software may be needed
form one test to another test. Scaffolding software rarely is considered part of the
system.
Some times the scaffolding software becomes larger than the system software
being tested. Usually the scaffolding software is not of the same quality as the system
software and frequently is quite fragile. A small change in test may lead to much
Internal and unit testing can be automated with the help of coverage tools.
Analyzes the source code and generated a test that will execute every alternative
thread of execution. Typically, the coverage tool is used in a slightly different way.
First the coverage tool is used to augment the source by placing information
prints after each line of code. Then the testing suite is executed generating an audit
trail. This audit trail is analyzed and reports the percent of the total system code
executed during the test suite. If the coverage is high and the untested source lines are
of low impact to the system’s overall quality, then no more additional tests are
required.
SCREEN SHOTS
Admin Login:
Home Page:
Candidate detail:
User Details:
Candidate Information:
Election Details:
Candidate Information:
PassWord Generate:
Voter Login:
9. SYSTEM IMPLEMENTATION
The process of putting the developed software in actual use is called system
implementation. This includes all those activities that take place to convert from the
old system to the new system. The system can be implemented only after through
turned into a working system. The most crucial stage in achieving a new successful
system is that it will work efficiently and effectively. Implementation is the process
The goal of this phase is to produce simple and clear programs, so that they are
easy to understand and modify. It should aim in reducing the testing and maintenance
cost. Implementation includes all those activities that take place to convert an old
running.
I. Processing the current data by a single user at a time is called the pilot
running process. When one user is accessing the data at one system,
II. Processing the current data by more than a single user at a time is called
the parallel running process the same system can be viewed and
Assumptions:
windows directory.
2. License Key generator program creates a new license key every time you
Protection Software:
2. Check for Install.Key file and verify the product key and pin
number
Continue Installation;
Otherwise
Continue Installation;
Otherwise
Section A.
A.
1. Installation of Software:
Start the application by using the admin console which displays the
welcome file.
To achieve the objectives and benefits expected from computer based system,
it is essential for the people who will be involved to be confident of their role in the
new system. As systems become more complex, the need for education and training
The user of the system must be trained properly so that he/she can take
maximum benefits out of it. They must be made aware of all the features of the
software and the limitations or constraints in which the system may fail.
Admin Login:
using System;
using System.Data;
using System.Configuration;
using System.Collections;
using System.Web;
using System.Web.Security;
using System.Web.UI;
using System.Web.UI.WebControls;
using System.Web.UI.WebControls.WebParts;
using System.Web.UI.HtmlControls;
using System.Data.SqlClient;
}
protected void Button1_Click(object sender, EventArgs e)
{
}
}
}
Change PassWord:
using System;
using System.Data;
using System.Configuration;
using System.Collections;
using System.Web;
using System.Web.Security;
using System.Web.UI;
using System.Web.UI.WebControls;
using System.Web.UI.WebControls.WebParts;
using System.Web.UI.HtmlControls;
using System.Data.SqlClient;
}
protected void lblCreateUser_Click(object sender, EventArgs e)
{
Response.Redirect("CreateVoter.aspx");
}
protected void LinkButton2_Click(object sender, EventArgs e)
{
Response.Redirect("CreateEledet.aspx");
}
protected void LinkButton1_Click(object sender, EventArgs e)
{
Response.Redirect("ViewVoter.aspx");
}
protected void LinkButton3_Click(object sender, EventArgs e)
{
Response.Redirect("ViewEleDet.aspx");
}
protected void LinkButton4_Click(object sender, EventArgs e)
{
Response.Redirect("CreateElecandidate.aspx");
}
protected void LinkButton5_Click(object sender, EventArgs e)
{
Response.Redirect("ViewElecandidate.aspx");
}
protected void LinkButton6_Click(object sender, EventArgs e)
{
Response.Redirect("PasswordCreation.aspx");
}
protected void LinkButton7_Click(object sender, EventArgs e)
{
Response.Redirect("CreateAdmin.aspx");
}
protected void LinkButton8_Click(object sender, EventArgs e)
{
Response.Redirect("ChangePassword.aspx");
}
protected void LinkButton20_Click(object sender, EventArgs e)
{
Response.Redirect("Counting.aspx");
}
}
10.1 INTRODUCTION
Testing of any software consists of providing the software with a set of test
inputs and observing if the software behaves as expected. If the software fails to
behave as expected, then the conditions under which a failure occurs are noted for
debugging and correction. Finally, the system as a whole is tested to ensure that
errors in the previous phases are uncovered and the project works as specified.
planned testing identifies the difference between the expected results and the actual
results. This helps to make software more rugged and reliable. Testing is applied at
different levels in the software development life cycle, but the testing done is
Testing plays a very critical role in determining the reliability and efficiency
of the software and hence is very important stage in software development. Tests are
conditions. Ideally we should do so at the level of each module and also when all of
The white box testing focused on the structural requirements of the software.
Here the test cases are decided based on the logic of the modules to be tested. This
The black box testing focused on the functional requirements of the software.
That is for a designer the black box testing will give the desired results for what it is
meant for, it means that he has to exercise all functional requirements of a program.
Unit Testing:
the source code of a particular module, whether it is working properly or not. At the
lowest level, the function of the basic unit of software is tested in isolation. This is
where the most detailed investigation of the internal working of individual units is
carried out.
The purpose of unit testing is to find errors in the individuals units, which
could be logic-related errors. The procedure is to write test cases for all functions and
and fixed.
Ideally, each test case is separate from the others. The test case can be derived
from their program specification or design document. Units, which cannot be tested
in isolation, may require the creation of small test program, test program known as
harness. Constructs such as mock objects can assist in separating unit tests.
This type of testing is mostly done by the developers and not by end-users.
The goal of unit testing is to isolate each part of the program and show that the
individual parts are correct. Unit testing provides a strict, written contract that the
There are four categories of tests that the programmer typically performs on a
program unit:
Functional test
Performance test
Stress test
Structural test
Functional Test:
services that the system is expected to provide. These depend on the type of the
The users shall be able to use all the application, with the use of System
After starting server side application client side application will start
working.
Every user has unique user id and password, but all transmitted packet
Performance Test:
response time (under various loads), execution, throughput primary and secondary
memory utilization and traffic rates on data channels and communication links,
testing and tuning. The performance test plan should specify the machine
configuration assumptions concerning the system status for the test case, the
Stress Test:
Stress test was designate to overload the system in various ways, such as,
Structure Test:
System Testing:
Testing is vital to the success of the system. It helps to identify and correct
the errors of the system. In the system testing performance and acceptance standards
are developed. Testing is also done with the data that are not accepted by the system.
Performance monitoring of the system was also done with different ranges of inputs.
Following the unit testing a subsystem testing was carried out to see the
proper functioning of other function in that subsystem. The test was conducted to see
if the subsystem functioned without interfering with the functioning of the other
subsystem. Proper error handling methods were adopted to make the system
Inputs were given and the outputs were analyzed and found to be error free
and satisfied. Finally, the recovery procedure for the entire subsystem was written.
Integration Testing:
include the bottom-up strategy, the top-down strategy, and the sandwich strategy.
followed by the testing of the entire system. Modules are tested in isolation from one
Top-Down Integration: It starts with the main routine and one or two immediately
subordinate routines in the system structure, and then the top-level “skeleton” has
been tested.
Acceptance Testing:
tests and stress tests to verify that the implemented system satisfies its requirements.
In addition, functional, performance and stress tests are performed to determine the
Features to be tested:
The functions that have been specified in the SRS are considered and tested.
button..
Expected Output Should open the Home page having Admin, Employee,
Ok button..
password.
Result/Remarks
Expected Output Should open a new page with admin details, edit link and Add
Actual Opens a new page with admin details, edit link and Add new
Expected Output Should open a new employee details page, having modify link
Actual Opens a new employee details page, having modify link and
Expected Output Should open a new customer details page,having modify link
Expected Output Should open a new product details page, having edit link and
Actual Opens a new employee details page, having modify link and
11. CONCLUSION
President, Secretary and other board members every interval of times, since the
candidates are working various part of the world it is difficult for them to vote and
This system provides them good solutions with security using Visual
Cryptography.
mails a FIRST share to voter well in advance and the second share is send during the
polling time, voter has to get the password from these two share to poll his vote.
We designed this system for corporate companies and it may be converted for public
election also. This system is very useful and safe for remote voting. This system is web based
application so that it can be accessed by any authorized person anywhere in the world through
internet.
The project has been implemented in such a manner using different modules
that it provides security to the product at different levels like development level
(Admin _Module), distribution level (Voter Module) and also at the application level
(Using InstallKey).
mails a FIRST share to voter well in advance and the second share is send during the
polling time, voter has to get the password from these two share to poll his vote.
My project will definitely help us to provide security to software products but I can’t
assure that this is going to be a very full proof security mechanism and cannot be
As time passes new technologies come in the market and any software must
be flexible enough to accommodate these changes. New threats are always there
because its scope is not limited and also because software industry is very
competitive.
modules so, we can do the changes very easily and integrate new modules very
Eventhough most of the advanced security facilities has been added, some
of the other advanced security features like Biometrics passwords can also
We can also include a feature that will enable the customer to view the
newly launched products and place the orders online. In this project this
BIBLIOGRAPHY
REFERENCES
o By: Sussman
o By: Chaffin
RELATED LINKS
www.google.com
www.codesource.com
en.wikipedia.org/wiki/piracy protection
ACRONYMS