Download as pdf or txt
Download as pdf or txt
You are on page 1of 57

SNGCAS PAINGOTTOOR CHARITY MANAGER DEPT.

OF COMPUTER SCIENCE

TABLE OF CONTENTS
1.Introduction 4
1.1.Project Profile 4
1.2.Modules 4
1.3. overview of project 5
1.4. Organization Overview 5
2. System Specification 6
2.1. About The Hardware 6
2.2. About The Software 6

3.Languages 7
3.1.Java 7
3.1.1. Java Platforms 7
3.1.2Main Use Of Java 8

3.2. Java Script 9

3.3. Css 9

3.4. Html 9

4.Database 10

4.1 MySQL 10

4.1.1 Features of Mysql 10

5.Operating System 11

5.1.Windows 11

6.Webserve 12

6.1. Apache 12

7. Integrated Devolopment Enviorment 12

7.1. NetBeans 12
1
SNGCAS PAINGOTTOOR CHARITY MANAGER DEPT.OF COMPUTER SCIENCE

8.System Analysis 13

8.1. Existing System 13

8.2. Limitation Of Existing System 13

8.3. Feasibility Study 14

8.3.1 Economic Feasibility 14

8.3.2. Technical Feasibility 15

8.3.3. Operational Feasibility 15

8.4. Proposed System 16

8.4.1 Advantages Of Proposed System 17

9. System Design 18

9.1. Input Design 18

9.2 Output Design 19

10.Data Flow Diagram 20

10.1. Introduction To Dfd 20

10.2. Data Flow Diagram Structure 22

11.Table Structure 26

12. System Testing 30

12.1. Introduction To System Testing 30

12.2. Unit Testing 31

12.3. Integration Testing 31

12.4. Validation Testing 31

12.5. Output Testing 32

12.6. User Acceptance Testing 32

12.7. Alpha Testing 32

2
SNGCAS PAINGOTTOOR CHARITY MANAGER DEPT.OF COMPUTER SCIENCE

12.8. Beta Testing 32

12.9. Test Cases 33

13.System Security 34

14. System Implimentation And Maintanence 35

14.1. Implimentation Plan 35

14.2. System Maintanence 36

15. Scope For Future Enhancement 37

16. Conclusion 38

17. Bibliography 39

18. Appendix 40

18.1. Screen Shots 40

18.2. Code 46

3
SNGCAS PAINGOTTOOR CHARITY MANAGER DEPT.OF COMPUTER SCIENCE

1. INTRODUCTION
1 .1.Project Profile

Charity is an act of kindness, where a person who has financially more than enough
of what he or she needs contributes a part of his or her surplus income for the fullfilment of
the needs of those who are less capable. The majority of NGOs has experienced difficulties in
getting funds or other required things. Getting donor is a very hard task, and sometime dealing
with some donor‟s conditions can be a big challenge for NGOs to fullfil it. This E charity
manager will help NGOs to find donors easily. This system has three modules namely,
Admin, NGO and Donor. Admin can login using credentials and manage the request raised by
NGO by approving or rejecting it. Approval will be done after verifying the NGO documents
uploaded by NGO. Admin will get the report of NGOs who get donations. NGOs can register
and raise request by uploading NGO documents. Once admin gets the approval, they can login
using credentials. NGO can raise request in need to the various registered donor. They can
view the previous events list and donation report. Donor can simply register and login using
credentials. They will get the notification of the request raised by NGOs for donation. They
need to fill the details regarding donation on approval of request. Donor will get the date of
donation. They can also view Donation history

1.2 Modules

• Admin
• Charity Foundation
• User

4
SNGCAS PAINGOTTOOR CHARITY MANAGER DEPT.OF COMPUTER SCIENCE

1.3. Overview Of The Project


The “E CHARITY MANAGER” is an application developed Netbeans Using JAVA as
front end and MySQL 5.0 as back end. The proposed system consists of three modules such as Admin
,Charity foundation and User. Each of these modules perform several tasks.

1.4. Organization Overview

A charitable organization or charity is an organization whose primary objectives


are philanthropy and social well-being (e.g. educational, religious or other activities serving
the public interest or common good) The legal definition of a charitable organization (and of
charity) varies between countries and in some instances regions of the country.
The regulation, the tax treatment, and the way in which charity law affects charitable
organizations also vary. Charitable organizations may not use any of their funds to profit
individual persons or entities (However, some charitable organizations have come under
scrutiny for spending a disproportionate amount of their income to pay the salaries of their
leadership).

Financial figures (e.g. tax refund, revenue from fundraising, revenue from sale of
goods and services or revenue from investment) are indicators to assess the financial
sustainability of a charity, especially to charity evaluators. This information can impact a
charity's reputation with donors and societies, and thus the charity's financial gains.Charitable
organizations often depend partly on donations from businesses. Such donations to charitable
organizations represent a major form of corporate philanthropy.

In order to meet the exempt organizational test requirements, a charity has to be exclusively
organized and operated. In order to receive and pass the exemption test, a charitable
organization must follow the public interest and all exempt income should be for the public
interest. For example, in many countries of the Commonwealth, charitable organizations must
demonstrate that they provide a public benefit.

5
SNGCAS PAINGOTTOOR CHARITY MANAGER DEPT.OF COMPUTER SCIENCE

2. SYSTEM SPECIFICATION
2.1. About The Hardware

The project under consideration requires the following hardware.

Processor : Intel® Pentium®

Memory : 4GB

Keyboard : Any QWERTY key board

Mouse : Any Optical mouse

Display : Any display that supports 1024x768 resolution

USB : Any USB 2.0 or above supporting port

CD Driv : Any CD/DVD ROM Drive

2.2. About The Software

The software for the development of the proposed system is as follows.


Operating System : Windows 10

Web Server : Apache Tomcat 8

Web Browser : Google Chrome/Mozilla Firefox

Database : MySQL

Languages : JAVA, CSS, JavaScript, HTML

IDE : NetBeans

6
SNGCAS PAINGOTTOOR CHARITY MANAGER DEPT.OF COMPUTER SCIENCE

3. LANGUAGES
3.1.Java

Java is a widely used programming language expressly designed for use in the distributed
environment of the internet. ... Java can be used to create complete applications that may run
on a single computer or be distributed among servers and clients in a network.

Java was designed to have the look and feel of the c++ programming language, but is simpler
to use and enforces an oop model. Java can be used to create complete applications that may
run on a single computer or be distributed among servers and clients in a network. It can also
be used to build a small application module or applet for use as part of a webpage.

3.1.1Java platforms

 The three key platforms upon which programmers can develop Java applications are:

 Java SE- Simple, stand-alone applications are developed using Java Standard Edition.
Formerly known as J2SE, Java SE provides all of the APIs needed to develop
traditional desktop applications.

 Java EE- The Java Enterprise Edition, formerly known as J2EE, provides the ability to
create server-side components that can respond to a web-based request-response cycle.
This arrangement allows the creation of Java programs that can interact with Internet-
based clients, including web browsers, CORBA-based clients and even REST-
and SOAP-based web services.

 Java ME- Java also provides a lightweight platform for mobile development known as
Java Micro Edition, formerly known as J2ME. Java ME has proved a prevalent
platform for embedded device development, but it struggled to gain traction in the
smartphone development arena.

7
SNGCAS PAINGOTTOOR CHARITY MANAGER DEPT.OF COMPUTER SCIENCE

3.1.2 Main uses of Java

 It is easy for developers to write programs which employ popular software design
patterns and best practices using the various components found in Java EE. For
example, frameworks such as Struts and JavaServer Faces all use a Java servlet to
implement the front controller design pattern for centralizing requests.

 A big part of the Java ecosystem is the large variety of open source and community
built projects, software platforms and APIs. For example, the Apache
Foundation hosts a variety of projects written using Java, including simple logging
frameworks for Java (SLF4J), both Yarn and Hadoop processing
frameworks, Microservices development platforms and integration platforms.

 Java EE environments can be used in the cloud as well. Developers can build, deploy,
debug and monitor Java applications on Google Cloud at a scalable level.

 In terms of mobile development, Java is commonly used as the programming language


for Android applications. Java tends to be preferred by Android developers because of
Java‟s security, object-oriented paradigms, regularly updated and maintained feature
sets, use of JVM and frameworks for networking, IO and threading.

 Although Java is widely used, it still has fair criticisms. Java syntax is often criticized
for being too verbose. In response, several peripheral languages have emerged to
address these issues, including Groovy. Due to the way Java references objects
internally, complex and concurrent list-based operations slow the JVM.
The Scala language addresses many of the shortcomings of the Java language that
reduce its ability to scale

8
SNGCAS PAINGOTTOOR CHARITY MANAGER DEPT.OF COMPUTER SCIENCE

3.2. Java Script

JavaScript is a programming language that allows scripting of events, objects, and


actions to create Internet applications. It is a website development environment that will allow
the creation of Interactive Web Pages. The coding techniques are capable of accepting a
client's requests and processing these requests.The web site development environment should
also provide the facility for 'validating' user input. With JavaScript, forms are a consideration
in nearly every pages you design .Capturing user requests is traditionally done via a „form‟.
So the website need to have facilities to create forms. Text fields and text areas can
dynamically change in response to user responses.

3.3.CSS

Cascading style sheets (CSS) is a simple mechanism for adding style (e g: fonts ,
colors , spacing) to web documents. These pages contain information on how to learn and use
CSS and on available software. They also contain news from the CSS working group.

3.4.HTML

Web browsers receive HTML documents from a web server or from local storage and
render the documents into multimedia web pages. HTML describes the structure of a
webpage semantically and originally included cues for the appearance of the document.

HTML elements are the building blocks of HTML pages. With HTML constructs ,
images and other object such as interactive forms may be embedded into the rendered
page.HTML provides a means to create structured documents bye denoting structural
semantics for text such as headings , paragraphs, list, links , quotes and other items.

HTML can embed programs written in a scripting language such as java script , which
affects the behavior and content of webpages inclusion of CSS defines the look and layout of
content. The world wide web consortium, former maintainer of the CSS standards, has
encouraged the use of CSS over explicit presentational HTML since 1997.

9
SNGCAS PAINGOTTOOR CHARITY MANAGER DEPT.OF COMPUTER SCIENCE

4. DATABASE
4.1 .Mysql

MySQL, the most popular Open Source SQL database management system, is
developed, distributed, and supported by Oracle Corporation.If that is what you are looking
for, you should give it a try. MySQL Server can run comfortably on a desktop or laptop,
alongside your other applications, web servers, and so on, requiring little or no attention. If
you dedicate an entire machine to MySQL, you can adjust the settings to take advantage of all
the memory, CPU power, and I/O capacity available. MySQL can also scale up to clusters of
machines, networked together.MySQL Server was originally developed to handle large
databases much faster than existing solutions and has been successfully used in highly
demanding production environments for several years. Although under constant development,
MySQL Server today offers a rich and useful set of functions. Its connectivity, speed, and
security make MySQL Server highly suited for accessing databases on the Internet.

4.1.1 Features of MySQL

 MySQL is released under an open-source license. So you have nothing to pay to use
it.

 MySQL is a very powerful program in its own right. It handles a large subset of the
functionality of the most expensive and powerful database packages.

 MySQL uses a standard form of the well-known SQL data language.

 MySQL works on many operating systems and with many languages including PHP,
PERL, C, C++, JAVA, etc.

 MySQL works very quickly and works well even with large data sets.

 MySQL is very friendly to PHP, the most appreciated language for web
development.MySQL supports large databases, up to 50 million rows or more in a
table. The default file size limit for a table is 4GB, but you can increase this (if your
operating system can handle it) to a theoretical limit of 8 million terabytes (TB).

10
SNGCAS PAINGOTTOOR CHARITY MANAGER DEPT.OF COMPUTER SCIENCE

5. OPERATING SYSTEM

5.1. Windows
Windows 10 is a series of personal computer operating system produced by
Microsoft as part of its Windows NT family of operating systems. It is the successor to
Windows 8.1, and was released to s on July 15, 2015. Windows 10 receives new builds on an
ongoing basis, which are available at no additional cost to users, in addition to additional
test builds of windows 10 which are available to windows insiders. The latest stable build of
Windows 10 is version 1903(may 2019 update).Device in enterprise environments can receive
these updates at a slower pace ,or use long-term support milestones that only receive critical
updates ,such as security patches, over their ten-year.

Life span of extended support One of windows 10‟s most notable features is its support of
universal apps, an expansion of the Metro-style apps first introduced in windows 8 .
Universal apps can be designed to run across multiple Microsoft product families with nearly
identical code-including PCs , tablets , smartphones and Mixed Reality. The windows user
interface was revised to handle transitions between a mouse-oriented interface and a
touchscreen optimized interface based on available input devices-particularly on 2-in-1 PCs,
both interfaces include an updated start menu which incorporates elements of windows 7‟s
traditional start menu with tiles of windows 8.

11
SNGCAS PAINGOTTOOR CHARITY MANAGER DEPT.OF COMPUTER SCIENCE

6. WEB SERVER

6.1. Apache

The Apache HTTP Server, colloquially called Apache, is free and open-source
cross-platform web server software, released under the terms of Apache License 2.0. Apache
is developed and maintained by an open community of developers under the auspices of the
Apache Software Foundation.

The vast majority of Apache HTTP Server instances run on a Linux distribution, but current
versions also run on Microsoft Windows and a wide variety oUnixlike systems. Past versions
also ran on OpenVMS, NetWare, OS/2 and other operating systems, including ports to
mainframes.

7. INTEGRATED DEVELOPMENT ENVIORNMENT

7.1. NetBeans

NetBeans IDE lets you quickly and easily develop Java desktop, mobile, and web
applications, as well as HTML5 applications with HTML, JavaScript, and CSS.NetBeans IDE
8.2 provides out-of-the-box code analyzers and editors for working with the latest Java 8
technologies--Java SE 8, Java SE Embedded 8, and Java ME Embedded 8. The IDE also has a
range of new tools for HTML5/JavaScript, in particular for Node.js, KnockoutJS, and
AngularJS; enhancements that further improve its support for Maven and Java EE with
PrimeFaces; and improvements to PHP and C/C++ support. NetBeans IDE 8.2 is available in
English, Brazilian Portuguese, Japanese, Russian, and Simplified Chinese.

12
SNGCAS PAINGOTTOOR CHARITY MANAGER DEPT.OF COMPUTER SCIENCE

8. SYSTEM ANALYSIS
System analysis is concerned with studying the existing system, identifying
the problems and the creation of the requirement specification. To launch the system analysis,
we need a master plan detailing the steps to be taken. Major steps are defining requirements,
studying the present system to verify the problems, defining the performance expected by the
proposed system.

8.1 Existing System


The existing system describes the features of the previous working model and
their drawback. Existing system does all process manually. Placement officers register the
information of students. If any modifications or updates are required in the profile of any
student, it has to be done manually. This is tedious and time consuming, lack of security of
data, took more man power. This process is so difficult when number of user‟s increases.

8.2. Limitations Of Existing System

 All data and reports are recorded manually.


 Accuracy is less.
 The system lacks integrity and security.
 Highly time consuming.
 Data redundancy and inconsistency.
 Involves a lot of human efforts.
 Cannot Upload and Download the latest updates.
 No use of Web Services and Removing.
 Risk of mismanagement and of data when the project is under development.
 No proper coordination between different Applications and Users. Fewer Users -
Friendly.

13
SNGCAS PAINGOTTOOR CHARITY MANAGER DEPT.OF COMPUTER SCIENCE

8.3.Feasibility Study
A feasibility study is needed to determine if a project or end result of charity
management system is feasible and beneficial. The main objective of feasibility study is to test
the technical, social and economic feasibility of developing a new computer system. “Charity
Management System” had undergone the feasibility study so that the proposed system is
possible for development deployment in insurance company. Investigating the existing
system in the areas under investigation and generating ideas about a new system does this.
The key considerations involved in the feasibility analysis are the following:

 Economic feasibility
 Technical feasibility
 Operational feasibility.

8.3.1 Economic Feasibility


Economic feasibility is a method for evaluating the effectiveness of a candidate
system. This study is mainly concerned with cost-benefit analysis that is how much money the
user is investing in any system and how much he is getting as a benefit in output .charity
management system is Economical Feasible because anyone uses this software would need
only to buy the machine. Our hardware requirement is not too expensive. The money and
human effort needed for the existing system is high .In the new system benefits outweigh
costs. So as compare to cost the charity management system is economically feasible.

We conduct an economic feasibility study for this charity Management System


and it also uses minimum hardware requirements that are already used in the existing system
.In existing system manual records are used for storing details. The system is cost effective
because of its compatibility and effort saving nature. The cost benefit ratio is very small and
hence the proposed system is feasible.

14
SNGCAS PAINGOTTOOR CHARITY MANAGER DEPT.OF COMPUTER SCIENCE

8.3.2 Technical Feasibility


Technical feasibility includes whether the technology is available in the market for
the development and its availability. The assessment of technical feasibility must be based on
an outline design of the system requirements in terms of input, output, files, programs and
procedures. This study checks the technical aspects of system. Minimum requirements of the
proposed system are a computer and internet connectivity, which will not add any additional
expense in implementing the system. This software is simple to use and manage.

Charity Management System also uses the minimum technologies for the creation
of the web based application. The existing system has also required minimum technical
requirements. So the proposed system is said to be technically feasible.

8.3.3 Operational Feasibility


The new system is very much easier and user friendly than the existing system. It satisfies
the requirements identified in the requirements analysis phase of system development. It
reduces the operational time considerably. Operational cost is very less. The maintenance and
modification of the new system needs very less human effort. Using command buttons
throughout the application programs enhances the operational feasibility. The new system is
operationally feasible and makes the operations simpler and quite easier.

The proposed system Charity Management System does not produce any problem
to existing customers, organization etc. It reduces the drawback of existing system. All these
reasons make the new system operationally feasible.

15
SNGCAS PAINGOTTOOR CHARITY MANAGER DEPT.OF COMPUTER SCIENCE

8.4.Proposed System

The main objective of propose system is to meet the demands of the organization
and to overcome the drawbacks of the existing system. The major objectives of implementing
the system are the following

One main objective of the system is to decrease the cost. Due to the
implementation of the system the cost for maintaining the transaction section will be
decreased. Manual system keeps so many records for transaction. At the time we implement
the proposed system; all the files are appended automatically during the transaction tie. In
such a way we can decrease the cost.

By automating the system we can increase the speed of the overall system. Then
the speed increases the transaction is carried out quickly .Existing system is manual one and
because of the number of errors also increases. The proposed system can avoid the possibility
of errors. We have included a number of special features to our project for the proper
functioning of the system. We have designed the system as a user friendly system as even a
very little knowledge a user can operate by the system.

Security is an important feature of the system. The most important feature is data.
We have provided enough measures to prevent unauthorized data handling. Password
technique is used for the security of data. Searching technique has been enhanced a lot during
the proposed system.

To debug the existing system, remove procedures those cause data redundancy, make
navigational sequence proper. To provide information about audits on different level and also
to reflect the current work status depending on organization/auditor or date. Password
mechanism is used.

16
SNGCAS PAINGOTTOOR CHARITY MANAGER DEPT.OF COMPUTER SCIENCE

We all know the importance of computerization. The world is moving ahead at


lightning speed and everyone is running short of time. One always wants to get the
information and perform a task he/she/they desire(s) within a short period of time and too with
amount of efficiency and accuracy. The application areas for the computerization have been
selected on the basis of following factors:

8.4.1 Advantages of Proposed System

 Minimizing the manual records kept at different locations.


 There will be more data integrity.
 Facilitating desired information display, very quickly, by retrieving information from
users.
 Facilitating various statistical information which helps in decision-making
 To reduce manual efforts in activities that involved repetitive work.
 Updating and deletion of such a huge amount of data will become easier.
 Users can save their time and effort.
 There are security and some password facility for opening the system‟s work.
 Once student is registered to this system, student details like student‟s name, address and
exam details are stored in a database
 We can register staff and student to this system and store their details into database.

17
SNGCAS PAINGOTTOOR CHARITY MANAGER DEPT.OF COMPUTER SCIENCE

9. SYSTEM DESIGN

System design sits at the technical kernel of the software engineering and is applied regardless
of the software process model that is used. Beginning once software requirements have been
analyzed and specified, software design is design first technical activity that is used to build
and verify the software. Each activity (designing, coding and testing) transform information in
a manner that ultimately results in validated computer software.

9.1 Input Design

Input design is a part of overall system design, which requires very careful
attention. Generally, software is prone to error if the user operating on it is not aware of
constraints. Usual procedures for eliminating errors are carried out in the application program
itself. However, there are cases where the data redundancy and consistency are violated. The
goal of designing input data entry is easy, logical and free from errors as possible. In entering
data, operators need to know the following.

 The allocated space for each field.


 Field sequence, which must match that in the source document.
 The format in which data fields are entered.

When we approach input data design, we design the source documents that
capture the data and then select the media used to enter them into computer or the system.
While entering the data the application program checks for errors. All the input screens used
have strict validation for null checking and the data type wherever necessary.

The main input forms that are used in this system include:

Login

By using the username and password user can login into the system.

18
SNGCAS PAINGOTTOOR CHARITY MANAGER DEPT.OF COMPUTER SCIENCE

Charity Foundation Registration Details

This form is for adding details of various providers in to the system

User’s Registration Details

This form is for adding details of various users in to the system

9.2 OUTPUT DESIGN

Outputs from computer system are required primarily to communicate the result
of processing to users. Computer output is the most important and direct source of information
to the user. Efficient, intelligible output should improve the system‟s relationship with the
user and help in decision making. The output devices to consider depend on factors as
compatibility of the device with the system, response time requirements, expected print
quality, number of copies needed etc.

In the case of Insurance Management System the output is designed in such a way
that the user gets maximum benefit from the same. The user is displayed every single data in
the system.

The output of the system includes:-

Charity Foundation details

It displays the provider basic details.

user details

It displays the users basic details

19
SNGCAS PAINGOTTOOR CHARITY MANAGER DEPT.OF COMPUTER SCIENCE

10. DATA FLOW DIAGRAM

10.1 Introduction Data Flow Diagram

To start the system design, something analogue to the architecture blue print as a starting
point to design is required. It is a way to focus on functions rather than physical
implementation. One such tool is a DFD.

Structured analysis is a set of techniques and graphical tools that help the analyst
to develop a new kind of system specification that are easily understandable to the user.
DFD‟s show the major decompositions of the system functions and their interfaces. The DFD
is graphic and presents a picture of what is being specified and is conceptually easy to
understand presentation of the application.

One important feature of DFD‟s is that it is logical rather than physical. The
elements of the system do not depend on vendor or hardware. They specify in precise, concise
manner the working of the system and how it hangs together.

DFD is the graphic representation of data movement process, and files used in
support of an information system. There are several rules of thumb used in drawing DFDs.

 Process should be named and numbered for easy references.


 The direction of flow is from top to bottom and from left to right.
 When a process is imported in the lower levels details, they must be numbered.
 Process and data flow names have the first letter of each word must be a capital letter.

The four main symbols used for developing a DFD are shown below:

20
SNGCAS PAINGOTTOOR CHARITY MANAGER DEPT.OF COMPUTER SCIENCE

Double Square
The square represents the source and destination of the system.

Circle
A Circle represents a process that transforms incoming data flows into outgoing data flows.

Arrows
An arrow is used to represent data flows- data in motion

Open Rectangle
An open rectangle is a data store at rest, or a temporary repository of data.

21
SNGCAS PAINGOTTOOR CHARITY MANAGER DEPT.OF COMPUTER SCIENCE

10.2 Data Flow Diagram Structure

LEVEL 0 -CONTEXT LEVEL

22
SNGCAS PAINGOTTOOR CHARITY MANAGER DEPT.OF COMPUTER SCIENCE

LEVEL 1 ADMIN

23
SNGCAS PAINGOTTOOR CHARITY MANAGER DEPT.OF COMPUTER SCIENCE

LEVEL 1 CHARITY FOUNDATIONS

24
SNGCAS PAINGOTTOOR CHARITY MANAGER DEPT.OF COMPUTER SCIENCE

LEVEL 1 USER

25
SNGCAS PAINGOTTOOR CHARITY MANAGER DEPT.OF COMPUTER SCIENCE

11.TABLE STRUCTURE

1. Login Table

Primary key:Lid

NAME DATA TYPE CONSTRAINS DESCRIPTION

Lid Int(20) Primary key Store login details

Username Varchar(20) null Store username


Password Varchar(10) null Store password

2.User Table

Primary Key: uid

NAME DTATA TYPE CONSTRAINS DESCRIPTION


Uid Int(10) Primary key Store user details
Username Varchar(20) null Username of the user
Password Varchar(10) null Password
Email Varchar(20) null Store email
Phone number Int(120 null Contact number
Status Int(1) null Show active or not

26
SNGCAS PAINGOTTOOR CHARITY MANAGER DEPT.OF COMPUTER SCIENCE

3.Charity Table

Primary Key: cid

NAME DATA TYPE CONSTRAINS DESCRIPTION


cid Int(10) Primary key Store charity details
Username Varchar(20) null Store username
Password Varchar(10) null Store password
Phone Int(12) null Store contact
details
Address Varchar(100) null Store address
Email Varchar(20) null Store contact email
Status Int(1) null Active or not

4.Members Table

Primary Key: Mem_id

Name Data type Constrains Description


Mem_id Int(10) Primary key Member id
cid Int(10) Foriegn key Charity id
Name Varchar(20) null Store name
Dob Varchar(20) null Store dob of member
Gender Varchar(20) null Gender of member
Current status Varchar(100) null Status of member

27
SNGCAS PAINGOTTOOR CHARITY MANAGER DEPT.OF COMPUTER SCIENCE

5.Event Table
Primary Key: Ev_id
Name Data type Constrains Description
Ev_id Int(10) primarykey Id of the event
cid Int(10) Foreign key Charity id
Description Varchar(200) null Description about the
evnt
Time Time null time
Date Date null date
Image Varchar(100) null images

6.Donation Table
Primary Key: D_id

Name Data type Constrains Description


D_id Int(10) Primary key Donation id
Uid Int(10) Foreign key User id
Type Varchar(20) null Type of donation
Amount Int(255) null amount
Date Date null Date
Time Time null Time

28
SNGCAS PAINGOTTOOR CHARITY MANAGER DEPT.OF COMPUTER SCIENCE

7.Allocation Table

Primary Key: Aloc_id

Name Data type Constrains Description


Aloc_id Int(10) Primary key Allocation id
Uid Int(10) Foreign key User id
cid Int(10) null Charity id
Amount Varchar(255) null Cash amount
Date date null Date

29
SNGCAS PAINGOTTOOR CHARITY MANAGER DEPT.OF COMPUTER SCIENCE

11. SYSTEM TESTING

11.1 Introduction To System Testing

This section discusses about the business, technical or resource related constraint
that may keep us from performing all tests necessary. Time schedule is a major constraint
when we talk about testing at the site. Testing the security of the software is one major
constraint so we have to rely on our own knowledge and have to trust the software for the
security.

Software testing is the process used to measure the quality of developed


computer software. Usually, quality is constrained to certain topics such as correctness,
completeness, security, but can also include more technical requirements as described under
the ISO standard, such as capability, reliability, efficiency, portability, maintainability,
compatibility, and usability.

System testing is a critical aspect of Software Quality Assurance and represents


the ultimate review of specification, design and coding. Testing is a process of executing a
program with the intent of finding an error. A good test is one that has a probability of
finding a yet undiscovered error. The purpose of testing is to identify and correct bugs in the
developed system. Nothing is complete without testing. Testing is vital to the success of the
system. Following are the different types of testing.

 Unit Testing
 Integration Testing
 Validation Testing
 Output Testing
 User Acceptance Testing
 Alpha Testing
 Beta Testing

30
SNGCAS PAINGOTTOOR CHARITY MANAGER DEPT.OF COMPUTER SCIENCE

11.2 Unit Testing

Unit testing focuses verification efforts on the smallest unit of software design,
the module. This is also known as module testing. The modules are tested separately. These
testing are carried out during programming stage itself.

In our web based application Charity Management System we tested each forms
and corrected the errors. Registration forms of users forms are carefully tested for unique
providers email id, users email id .If user gives the already existing providers email id, users
email id proper message is provided by the application.

11.3 Integration Testing

Integration testing is a systematic technique for constructing tests to uncover


errors associated within the interface. In this testing, all the modules are combined, and then
the entire program is tested as a whole.
After the unit wise testing of forms of Charity Management System, we tested
after the forms are integrated, and no corrections are made. And some related forms needed
integration testing also.

11.4 Validation Testing

Validation testing is where requirements established as a part of software


requirements analysis is validated against the software that has been constructed. This test
provides the final assurance that the software meets all functional, behavioral and
performance requirements.

31
SNGCAS PAINGOTTOOR CHARITY MANAGER DEPT.OF COMPUTER SCIENCE

11.5 Output Testing


After performing the validation testing, the next step is output testing of the
proposed system, since no system could be useful if it does not produce the required output in
the specific format. The output generated by the system under considerations is tested asking
the users about the format required by them.

11.6 User Acceptance Testing


User acceptance of a system is the key factor for the success of any system. The
system under considerations is tested for user acceptance by constantly keeping in touch with
the prospective system users at the time of developing and making of hardware management
system software.

11.7 Alpha Testing

Alpha testing is simulated or actual operational testing by potential


users/customers or an independent test team at the developers' site. Alpha testing is often
employed for off-the-shelf software as a form of internal acceptance testing, before the
software goes to beta testing

11.8 Beta Testing

Beta testing comes after alpha testing and can be considered a form of
external user acceptance testing Versions of the software, known as beta versions, are released
to a limited audience outside of the programming team. The software is released to groups of
people so that further testing can ensure the product has few faults or bugs. Sometimes, beta
versions are made available to the open public to increase the feedback field to a maximal
number of future users.

32
SNGCAS PAINGOTTOOR CHARITY MANAGER DEPT.OF COMPUTER SCIENCE

11.9 Test Cases

A test case is a set of conditions or variables under which a tester will determine
whether a system under test satisfies requirements or works correctly. The process of
developing test cases can also help find problems in the requirements or design of an
applicate.

33
SNGCAS PAINGOTTOOR CHARITY MANAGER DEPT.OF COMPUTER SCIENCE

12. SYSTEM SECURITY


E Charity Manager that manages sensitive information or causes actions that can
improperly harm individuals is a target for improper or illegal penetration. Penetration spans a
broad range of activities hackers who attempt to penetrate systems for sport disgruntled
employees who attempt to penetrate for revenge dishonest individuals who attempt to
penetrate for illicit personal gain.

The proposed system, provide security technology attempts to verify that


protection mechanisms built into a system will, in fact, protect it from improper penetration.
The system„s security must, of course, be tested for invulnerability from frontal attack, but
must also be tested for invulnerability from rear attack.

The security and integrity of data is ensured in proposed system. The access
to data is restricted to those who register with the system. While registering with the system,
the users are provided with a username and password. Only the registered person can login
into to the system. The username and password determine which user is login.

34
SNGCAS PAINGOTTOOR CHARITY MANAGER DEPT.OF COMPUTER SCIENCE

13.SYSTEM IMPLEMENTATION AND MAINTENANCE

Implementation of E Charity Manager is the final stage and it‟s an important phase.
It involves the individual programming; system testing, user training and the operational
running of developed proposed system that constitutes the application subsystems. One major
task of preparing for implementation is education of users, which should really have been
taken place much earlier in the project when they were being involved in the investigation
and design work. During the implementation phase system actually takes physical shape. In
order to develop a system implemented, planning is very essential. The implementation phase
of the software development is concerned with translating design specifications in to source
code.

The implementation phase ends with an evaluation of the charity management


system after placing it into operation for a period of time. Implementation is the third phase
of the system process. In order to achieve the objectives and the expected performance the
system has been developed in a highly interactive and user-friendly manner.

13.1 Implementation plan

The following are the steps involved in the implementation plan:

 Test system with sample data

 Detection and correction of errors

 Make the necessary changes in the system

 Check with the existing system

 Installation of hardware and software utilities

 Training and involvement of user person

35
SNGCAS PAINGOTTOOR CHARITY MANAGER DEPT.OF COMPUTER SCIENCE

13.2. System Maintenance

Charity management system maintenance is actually the implementation of the


post implementation review plan. As important as it is, many programmers and analyst are
reluctant to perform or identify themselves with maintains effort. There are psychological,
personalities and professional reasons for this. In any case first class effort must be made to
ensure that the software changes are made properly and in time to keep the system intone with
user specification. Maintenance is expensive. One way to reduce Maintenance costs are
through maintenance management and software modifications audits. Software modifications
consists of program rewrites system level updates, re-audits of low ranking software, reduced
maintenance backlog and higher satisfaction and morale among the maintenance staff.

Even when the new system has gone live there may be need for some system
design activity. This will see from changes that are necessitated by the dynamic nature of the
system and its environment. Changes may be required to correct faults or to bring about
improvements, and may arise as part of normal running of the system or as a result of a
review of the system performance. Changes or amendments and documentations and perhaps
handled by specialist group of maintenance staff.

36
SNGCAS PAINGOTTOOR CHARITY MANAGER DEPT.OF COMPUTER SCIENCE

14. SCOPE FOR FUTURE ENHANCEMENTS

In future we can expect the modified version of „Charity Management System”.


The system is very flexible for further up gradation with additional requirement of the college,
the .net and SQL server makes this modifications very easily It is also possible to involve
more functions into the system. This flexibility makes this system widening its scope. All day
to day work can be done with much more ease and efficiency.

The database and the information can be updated to the latest coming versions.
There are also possibilities for enhancing and further developing the project with the latest
information and needs of the portal.

37
SNGCAS PAINGOTTOOR CHARITY MANAGER DEPT.OF COMPUTER SCIENCE

15. CONCLUSION

. The E Charity Manager project was successfully completed within the time span
allotted .The drawbacks of the existing system as listed before are fully evacuated. All the
existing inconsistencies are fully solved as this system is implemented. This reduced the
burden of the administration of the system. All the modules are tested separately and put
together to form the main system. Finally the system is tested with real data and it worked
successfully. Thus the system has fulfilled the entire objective defined.

The system has been developed in an interactive manner; the reports generated by
the system are clear. The system is flexible, user friendly and has its own full data security
and all data recovery facility. The developed system has mainly three modules admin ,charity
foundation and user.

38
SNGCAS PAINGOTTOOR CHARITY MANAGER DEPT.OF COMPUTER SCIENCE

16. BIBLIOGRAPHY
 System analysis and design – Marvin Gore & John Stub.
 Introduction to DataBase Management System – RamesElmasri & Shamkant
.B.Navathe.
 www.google.co.in

 Software Engineering by Roger S. Pressman


 Java 2Complete Reference (By Herbert Shildt)
 SQL Programming (By Ivan Bay Ross)

http://java.sun.com/docs/books/tutorial/getStarted/index.html

http://www.ibiblio.org/javafaq/javatutorial.html

http://www.tutorialized.com/tutorials/Java

http://www.google.com

http://www.wikipedia.org

http://www.microsoft.com//windows10

39
SNGCAS PAINGOTTOOR CHARITY MANAGER DEPT.OF COMPUTER SCIENCE

17.APPENDIX

17.1 Screenshots
1.Home Page

40
SNGCAS PAINGOTTOOR CHARITY MANAGER DEPT.OF COMPUTER SCIENCE

2. Organization Type Form

3. User Type Form

41
SNGCAS PAINGOTTOOR CHARITY MANAGER DEPT.OF COMPUTER SCIENCE

4. View Charity User Page

42
SNGCAS PAINGOTTOOR CHARITY MANAGER DEPT.OF COMPUTER SCIENCE

5 .View Donation Page

6. View Events Page

7. View Sponsers Page

43
SNGCAS PAINGOTTOOR CHARITY MANAGER DEPT.OF COMPUTER SCIENCE

8.View Students Page

44
SNGCAS PAINGOTTOOR CHARITY MANAGER DEPT.OF COMPUTER SCIENCE

9.Loginpage

10. Registraion Page

45
SNGCAS PAINGOTTOOR CHARITY MANAGER DEPT.OF COMPUTER SCIENCE

17.2.Coding

46
SNGCAS PAINGOTTOOR CHARITY MANAGER DEPT.OF COMPUTER SCIENCE

login

<!--

Author: W3layouts

Author URL: http://w3layouts.com

License: Creative Commons Attribution 3.0 Unported

License URL: http://creativecommons.org/licenses/by/3.0/

-->

<!DOCTYPE html>

<html>

<head>

<title>The Entrar-shadow Website form | w3layouts</title>

<meta charset="utf-8">

<link href="entrar_shadow-pack/entrar_shadow-pack/css/style.css" rel='stylesheet'


type='text/css' />

<meta name="viewport" content="width=device-width, initial-scale=1">

<script type="application/x-javascript"> addEventListener("load", function() {


setTimeout(hideURLbar, 0); }, false); function hideURLbar(){ window.scrollTo(0,1); }
</script>

<!--webfonts-->

<!--<link
href='http://fonts.googleapis.com/css?family=Open+Sans:600italic,400,300,600,700'
rel='stylesheet' type='text/css'>-->

<!--//webfonts-->

</head>

<body>

<!-----start-main---->

<div class="main">

47
SNGCAS PAINGOTTOOR CHARITY MANAGER DEPT.OF COMPUTER SCIENCE

<div class="login-form">

<h1>Member Login</h1>

<div class="head">

<img src="entrar_shadow-pack/entrar_shadow-
pack/images/user.png" alt=""/>

</div>

<form action="login_action.jsp">

<input type="text" class="text" name="email" value="USERNAME"


onfocus="this.value = '';" onblur="if (this.value == '') {this.value = 'USERNAME';}" >

<input type="password" name="pwd" value="Password"


onfocus="this.value = '';" onblur="if (this.value == '') {this.value = 'Password';}">

<div class="submit">

<input type="submit"
onclick="myFunction()" value="LOGIN" >

</div>

<p><a href="PUBLIC/registration.jsp" style="color:#21A957;">Public


Registration</a></p><br>

<p><a href="organization/organization.jsp"
style="color:#21A957;">Organization Registration</a></p><br>

<p><a href="SCHOOL/school_reg.jsp"
style="color:#21A957;">School Registration</a></p>

</form>

</div>

<!--//End-login-form-->

<!-----start-copyright---->

<div class="copy-right">

<p>Template by <a
href="http://w3layouts.com">w3layouts</a></p>

48
SNGCAS PAINGOTTOOR CHARITY MANAGER DEPT.OF COMPUTER SCIENCE

</div>

<!-----//end-copyright---->

</div>

<!-----//end-main---->

</body>

</html>

view users

<%@include file="header.jsp" %>

<jsp:useBean class="pack.Pack" id="cn"/>

<%@page import="java.sql.*" %>

<script type="text/javascript">

var request;

function getRequest()

if (window.XMLHttpRequest)

return new XMLHttpRequest();

else if (winodw.ActiveXObject)

return new ActiveXObject("Microsoft.XMLHTTP");

else

return null;

function doProcessing()

request = getRequest();

49
SNGCAS PAINGOTTOOR CHARITY MANAGER DEPT.OF COMPUTER SCIENCE

var url="user_ajax.jsp?id=" + document.searchForm.orgname.value;

request.open("GET", url, true);

request.onreadystatechange = function()

if (request.readyState == 4 || request.status == 200)

document.getElementById("tbl").innerHTML = request.responseText;

request.send(null);

</script>

<form name="searchForm">

<tr>

<td>Organization</td>

<td><select name="orgname" required="1" onchange="doProcessing();">

<option value="0">-----select----</option>

<%

String org="select * from tbl_org where status=1";

ResultSet res1=cn.select(org);

while(res1.next()){

%>

50
SNGCAS PAINGOTTOOR CHARITY MANAGER DEPT.OF COMPUTER SCIENCE

<option
value="<%=res1.getString("orgid")%>"><%=res1.getString("orgname")%></option>

<%

%>

</select></td>

</tr>

<div id="tbl">

<div style="overflow-x: auto;">

<table border="1" class="table-condensed" align="center">

<thead>

<tr>

<th>UserType</th>

<th>Organization</th>

<th>Name</th>

<th>age</th>

<th>gender</th>

<th>Qualification</th>

<th>Email</th>

<th>Photo</th>

<th>IFSC</th>

<th>Account Number</th>

</tr>

</thead>

<tbody>

51
SNGCAS PAINGOTTOOR CHARITY MANAGER DEPT.OF COMPUTER SCIENCE

<%

String qry="select distinct * from tbl_charityuser ch,tbl_usertype ut,tbl_org org where


ch.usertypeid=ut.usertypeid and ch.orgid=org.orgid";

ResultSet res=cn.select(qry);

while(res.next())

%>

<tr>

<td><%=res.getString("usertname")%></td>

<td><%=res.getString("orgname")%></td>

<td><%=res.getString("cuname")%></td>

<td><%=res.getString("age")%></td>

<td><%=res.getString("gender")%></td>

<td><%=res.getString("qual")%></td>

<td><%=res.getString("email")%></td>

<td><img src="../organization/photo/<%=res.getString("photo")%>" width="150px"


height="150px"/></td>

<td><%=res.getString("ifsc")%></td>

<td><%=res.getString("accountno")%></td>

</tr>

<% }%>

</tbody>

</table>

</div>

</form>
52
SNGCAS PAINGOTTOOR CHARITY MANAGER DEPT.OF COMPUTER SCIENCE

</div>

<%@include file="footer.jsp"

view councillor

<html lang="en">

<head>

<head>

<link href="https://cdnjs.cloudflare.com/ajax/libs/sweetalert/1.1.3/sweetalert.css"
rel="stylesheet" />

<script
src="https://cdnjs.cloudflare.com/ajax/libs/sweetalert/1.1.3/sweetalert.min.js"></script>

</head>

<body>

<%@include file="header.jsp" %>

<jsp:useBean class="pack.Pack" id="cn"/>

<%@page import="java.sql.*" %>

<div style="overflow-x: auto;">

<h2>Approve Counsellor</h2>

<table border="1" class="table-condensed" align="center">

<thead>

<tr>

<th>Counsellor Name</th>

<th>Address</th>

<th>Place</th>

<th>Contact No:</th>

<th>Email ID</th>
53
SNGCAS PAINGOTTOOR CHARITY MANAGER DEPT.OF COMPUTER SCIENCE

<th>Photo</th>

<th>Approve</th>

</tr>

</thead>

<tbody>

<%

String qry="select
cn.counsid,cn.counsname,cn.counsaddr,cn.plid,cn.counsphno,cn.email,cn.photo from
tbl_councellor cn where cn.status=0";

ResultSet res=cn.select(qry);

while(res.next())

%>

<tr>

<td><%=res.getString("counsname")%></td>

<td><%=res.getString("counsaddr")%></td>

<td><%=res.getString("plid")%></td>

<td><%=res.getString("counsphno")%></td>

<td><%=res.getString("email")%></td>

<td><img src="../COUNCELLOR/photo/<%=res.getString("photo")%>"
width="150px" height="150px"/></td>

<td><a
href="action/counsellor_action.jsp?id=<%=res.getString("counsid")%>&type=app">APPRO
VAL</a></td>

</tr>

<%

54
SNGCAS PAINGOTTOOR CHARITY MANAGER DEPT.OF COMPUTER SCIENCE

}%>

</tbody>

</table>

</div>

<br>

<br>

<div style="overflow-x: auto;">

<h2>Approved Counsellor</h2>

<table border="1" class="table-condensed" align="center">

<thead>

<tr>

<th>Counsellor Name</th>

<th>Address</th>

<th>Place</th>

<th>Contact No:</th>

<th>Email ID</th>

<th>Photo</th>

<th>Reject</th>

</tr>

</thead>

<tbody>

55
SNGCAS PAINGOTTOOR CHARITY MANAGER DEPT.OF COMPUTER SCIENCE

<%

String qry1="select
cn.counsid,cn.counsname,cn.counsaddr,cn.plid,cn.counsphno,cn.email,cn.photo from
tbl_councellor cn where cn.status=1";

ResultSet res1=cn.select(qry1);

while(res1.next())

%>

<tr>

<td><%=res1.getString("counsname")%></td>

<td><%=res1.getString("counsaddr")%></td>

<td><%=res1.getString("plid")%></td>

<td><%=res1.getString("counsphno")%></td>

<td><%=res1.getString("email")%></td>

<td><img src="../COUNCELLOR/photo/<%=res1.getString("photo")%>"
width="150px" height="150px"/></td>

<td><a href="javascript:void(0);"
onclick="myFunction('<%=res1.getString("counsid")%>','rej');">Reject</a></td>

</tr>

<%

}%>

</tbody>

</table>

</div>

<script>

56
SNGCAS PAINGOTTOOR CHARITY MANAGER DEPT.OF COMPUTER SCIENCE

function myFunction(id,typ){

swal({

title: "Reason!",

text: "Write something interesting:",

type: "input",

showCancelButton: true,

closeOnConfirm: false,

inputPlaceholder: "Write something"

}, function (inputValue) {

if (inputValue === false) return false;

if (inputValue === "") {

swal.showInputError("You need to write something!");

return false

window.location.href =
'action/counsellor_action.jsp?val='+inputValue+"&id="+id+"&type="+typ;

});}

</script>

<%@include file="footer.jsp" %>

57

You might also like