Escolar Documentos
Profissional Documentos
Cultura Documentos
Different type of feasibility study done are : A proposed solution to the problems including alternate solutions considered. Rough estimate on the cost / benefits analysis if the solution is implemented. Approximate time, effort and cost estimates for completion of the project. There are three aspects in the feasibility study.
Facility to communicate data to distant location. In examining technical feasibility, configuration of the system is given more importance than the actual make of hardware. The configuration should give a complete picture about the system requirements. What speed of input and output should be achieved at particular quality of printing. This can be used as a basis for the tender document against which dealers
and manufacturers can later make their equipment bids. Specific hardware and software can then be evaluated keeping in view with the logical needs. At the feasibility stage, it is desirable that two or three different configuration will be pursued that satisfy the key technical requirements but which present different levels of ambition and cost. Investigation of these technical alternatives can be aided by approaching a range of suppliers for preliminary discussion. Out of all type of feasibility, technical feasibility generally is the most difficult to determine.
What new skills will be required? Do the existing staff members have these skills? If not, can they be trained in due course of time? Generally project will not be rejected simply because of operational infeasibility but such considerations are likely to critically affect the nature and scope of the eventual recommendations. A small group who are familiar with information system techniques which understand the part of the business that are relevant to the project and are skilled in system and design process carries out this feasibility study.
Economic feasibility concerns returns from investments in a project. It determines whether it is worthwhile to invest the money in the proposed project or whether something else should be done with it. It is not worthwhile spending a lot of money on a project for no returns, especially if there are many other things, which could be done with that money. To ensure that the new project will certainly lead to benefits outweighing the cost, Cost Benefit Analysis is carried out. In cost benefit analysis, various benefits and the cost involved are considered, calculated and compared. If benefits outweigh cost, the project is considered economically feasible otherwise not. TYPES OF BENEFITS: Cost-Saving benefits lead to reductions in administrative and operational costs. Cost-avoidance benefits are those, which eliminate future
administrative and operational cost. Improved-service-level benefits are those where the performance of a system is improved by a new computer-based method. Improved-information benefits are where computer based methods lead to better information for decision making.
Technical Feasibility
Operational Feasibility
Repo rt
No
Yes
To system Analysis
CHAPTER-2
The .NET Framework 3.5, used for building and running all kinds of software, including Web-based applications, smart client applications, and XML Web servicescomponents that facilitate integration by sharing data and functionality over a network through standard, platform-independent protocols such as XML (Extensible Markup Language), SOAP, and HTTP.
display the data on a data grid. The VB 6.0 and VC++ example mentioned in the first paragraph explains that there is more than one way to do a particular task within the same language. The .NET example explains that there's a unified means of accomplishing the same task by using the .NET Class Library, a key component of the .NET Framework. The functionality that the .NET Class Library provides is available to all .NET languages resulting in a consistent object model regardless of the programming language the developer uses.
ASP.NET and the .NET Framework simplify development by separating the application logic and presentation logic making it easier to maintain the code. You write the design code (presentation logic) and the actual code (application logic) separately eliminating the need to mix HTML code with ASP code. ASP.NET can also handle the details of maintaining the state of the controls, such as contents in a textbox, between calls to the same ASP.NET page.
Another advantage of creating applications is debugging. Visual Studio .NET and other third party providers provide several debugging tools that simplify application development. The .NET Framework simplifies debugging with support for Runtime diagnostics. Runtime diagnostics helps you to track down bugs and also helps you to determine how well an application performs. The .NET Framework provides three types of Runtime diagnostics: Event Logging, Performance Counters and tracing.
The pre-coded solutions that form the framework's class library cover a large range of programming needs in areas including: user interface, data access, database connectivity, cryptography, web application development, numeric algorithms, and network
communications. The functions of the class library are used by programmers who combine them with their own code to produce applications. Programs written for the .NET Framework execute in a software environment that manages the program's runtime requirements. This runtime environment, which is also a part of the .NET Framework, is known as the Common Language Runtime (CLR). The CLR provides the appearance of an application virtual machine, so that programmers need not consider the capabilities of the specific CPU that will execute the program. The CLR also provides other important services such as security mechanisms, memory management, and exception handling. The class library and the CLR together compose the .NET Framework. The framework is intended to make it easier to develop computer applications and to reduce the vulnerability of applications and computers to security threats. First released in 2002, it is included with Windows XP SP2, Windows Server 2003 and Windows Vista, and can be installed on most older versions of Windows. Microsoft .NET Framework was designed with several intentions: Interoperability - Because interaction between new and older applications is commonly required, the .NET Framework provides means to access functionality that is implemented in programs that execute outside the .NET environment. Access to COM components is provided in the System.Runtime.InteropServices and
System.EnterpriseServices namespaces of the framework, and access to other functionality is provided using the P/Invoke feature.
11
compile into an intermediate language known as the Common Intermediate Language, or CIL (formerly known as Microsoft Intermediate Language, or MSIL). In Microsoft's implementation, this intermediate language is not interpreted, but rather compiled in a manner known as just-in-time compilation (JIT) into native code. The combination of these concepts is called the Common Language Infrastructure (CLI), a specification; Microsoft's implementation of the CLI is known as the Common Language Runtime (CLR). Language Independence - The .NET Framework introduces a Common Type
System, or CTS. The CTS specification defines all possible data types and programming constructs supported by the CLR and how they may or may not interact with each other. Because of this feature, the .NET Framework supports development in multiple programming languages. This is discussed in more detail in the .NET languages section below. Base Class Library - The Base Class Library (BCL), sometimes referred to as
the Framework Class Library (FCL), is a library of types available to all languages using the .NET Framework. The BCL provides classes which encapsulate a number of common functions, including file reading and writing, graphic rendering, database interaction and XML document manipulation. Simplified Deployment - Installation of computer software must be carefully
managed to ensure that it does not interfere with previously installed software, and that it conforms to increasingly stringent security requirements. The .NET framework includes design features and tools that help address these requirements. Security - .NET allows for code to be run with different trust levels without
12
A design goal of the .NET Framework was to support platform independence[citation needed]. That is, a program written to use the framework should run without change on any type of computer for which the framework is implemented. However, Microsoft has only implemented the full .NET framework on the Windows operating system. Microsoft and others have implemented portions of the framework on non-Windows systems, but to date these implementations are neither complete nor widely used, so full cross-platform support has not been achieved.
1. SQL Server is more secure than Oracle. Since July 2003 more than 100 critical Oracle database
security vulnerabilities have been identified, compared to ZERO for SQL Server for that period.
2. SQL Server is a benchmark leader, with the best price/performance for TPC-H 1TB & 3TB (nonclustered) as well as best performance for TPC-H 1TB Gartner 2006 worldwide RDBMS market share reports highest growth rate in market share for Microsoft SQL Server. With 28% growth in market share, growth is almost twice the nearest competitor at 14.8% growth.
Visual C# .Net is designed to be a fast and easy way to create .NET applications, including Web services and ASP.NET Web applications. Applications written in Visual C# are built on the services of the common language runtime and take full advantage of the .NET Framework.It is a simple, elegant, type-safe, object-oriented language recently developed by Microsoft for building a wide range of applications. Anyone familiar with C and similar languages will find few problems in adapting to C#. C# is designed to bring rapid development to the C++ programmer without sacrificing the power and control that are a hallmark of C and C++. Because of this heritage, C# has a high degree of fidelity with C and C++, and developers familiar with these languages can quickly become productive in C#. C# provides intrinsic code trust mechanisms for a high level of security, garbage collection, and type safety. C# supports single inheritance and creates Microsoft intermediate language (MSIL) as input to native code compilers.It is fully integrated with the .NET Framework and
the common language runtime, which together provide language interoperability, garbage collection, enhanced security, and improved versioning support. C# simplifies and modernizes some of the more complex aspects of C and C++, notably namespaces, classes,enumerations, overloading, and structured exception handling. C# also eliminates C and C++ features such as macros, multiple inheritance, and virtual base classes. For current C++ developers, C# provides a powerful, high-productivity language alternative. Visual C# provides prototypes of some common project types, including:
14
2.7.2 HTML
HTML (Hyper Text Mark up Language) is the language that is used to prepare documents for online publications. HTML documents are also called Web documents, and each HTML document is known as Web page. A page is what is seen in the browser at any time. Each Web site, whether on the Internet or Intranet, is composed of multiple pages. And it is possible to switch among them by following hyperlinks. The collection of HTML pages makes up the World Wide Web. A web pages is basically a text file that contains the text to be displayed and references of elements such as images, sounds and of course hyperlinks to other documents. HTML pages can be created using simple text editor such as Notepad or a WYSIWYG application such as Microsoft FrontPage.In either case the result is a plain text file that computers can easily exchange. The browser displays this text file on the client computer. "Hypertext" is the jumping frog portion. A hyperlink can jump to any place within your own page(s) or literally to anyplace in the world with a 'net address (URL, or Uniform Resource Locator.) It's a small part of the html language.
15
16
understands how to treat most common windows file format, such as text (TXT) files, appl2.ication initialization (INI) files, executable (EXE) files and many others 2.8.1.3 IIS PROVIDES AN INTERFACE FOR COM You can control many parts of IIS using COM>IIS exposes many of the servers configuration settings via the IIS Admin objects. These objects are accessible from ASP and other languages. That means you can adjust server configuration and create virtual directories and webs programmatically. IIS 4 and higher store settings and web information in a spoil database called the Metaphase. You can use the IIS Admin objects to create new sites and virtual directories be alter the properties of existing sites and virtual directories 2.8.2 IIS ARCHITECTURES OVERVIEW: IIS is a core product, which means that it is designed to work closely with many other products, including all products in the Windows NT Server 4.0 Option pack. The following figure shows the relationship between IIS and other products installed as part of the Windows NT Server 4.0 Option pack. 2.8.3 SECURITY FOR IIS APPLICATION IIS provides three authentication schemes to control access to ITS resources: Anonymous, Basic and Windows NT challenge/Response. Each of these schemes had different effect on the security context of an application launched by ITS. This includes ISAPI extension agents, COT applications, IDC scripts and future scripting capabilities. 2.8.4 ACCESS PRIVIEGES IIS provides several new access levels. The following values can set the type of access allowed to specific directories: Read Write Script 17
2.8.5 IIS WEBSITE ADMINISTRATION Administering websites can be time consuming and costly, especially for people who manage large internet Service Provider (ISP) Installations. To save time and money Sips support only large company web siesta the expense of personal websites. But is there a costeffective way to support both? The answer is yes; if you can automate administrative tasks and let users administer their own sites from remote computers. This solution reduces the amount of time and money it takes to manually administer a large installation, without reducing the number of web sites supported. Microsoft Internet Information server (IIS) version 4.0 offers technologies to do this: 1. Windows scripting Host (WSH) 2. IIS Admin objects built on top of Active Directory service Interface(ADS))
With these technologies working together behind the scenes, the person can administers sites from the command line of central computer and can group frequently used commands in batch files.Then all user need to do is run batch files to add new accounts, change permissions, add a virtual server to a site and many other tasks.
18
CHAPTER-3
19
3.1 LOGIN
Login module handle the securty featurs related to access the informantion of department. The whole website is devided into two parts. 1. General Employee Part. 2. Administrator Part
3.3 ADMINISTRATORS
The module will be protected by user ID and password. Ordinary users of the website will not be permitted to enter into this area of the website. The module will be focusing on the maintenance like Master Data Maintenance, Removal of old and outdated data from the website etc. Those operations only done by administrator1. Administrator can issue the Password first time. 2. Administrator can change the detail of Employee after entering data first time.
3.4 EMPLOYEE
The module also protected by user ID and password. Ordinary users of the website will not be permitted to enter into this area of the website. The module will be focusing on the maintenance like Master Data Maintenance website etc. There are following opration that performed by employee20
1. Employee can enter the detail of employee & issue the Emplyee ID. 2. .Employee issue the PAN Card, if all the detail is right of applicant. 3. .Employee can enter the detail of income tax of PAN Card Holder.
21
3.7 INVESTMENT
In this module handle the detail of investment of PAN Card Holder .Investment information direct access from the Bank & L.I.C. etc. There following information is added in this part. BANK BALANCE LIC INVESTMENT SHARE MARKET INVESTMENT MUTUAL FUND INVESTMENT
3.8 CONTACT
This Module manage the query of person related to department .Any person can ask question related to income tax, PAN Card etc.asnwer of your query is send to the E.mail that you enter in contact.
CHAPTER-4
22
The programmers write the necessary programs that accept input from the user, perform necessary processing on accepted data through call and produce the required report on a hard copy or display it on the screen.
should include the details that contain how the solutions can be implemented. It also specifies how the database is to be built for storing and retrieving data, what kind of reports are to be created and what are the inputs to be given to the system. The logical design includes input design, output design, and database design and physical design
How the data should be arranged or coded? The dialogue to guide the operating personnel in providing input. Methods for preparing input validations and steps to follow when error occur The samples of screen layout are given in the appendix .
24
Computer output is the most important and direct information source to the user. Output design is a process that involves designing necessary outputs in the form of reports that should be given to the users according to the requirements. Efficient, intelligible output design should improve the system's relationship with the user and help in decision making. Since the reports are directing referred by the management for taking decisions and to draw conclusions they must be designed with almost care and the details in the reports must be simple, descriptive and clear to the user. So while designing output the following things are to be considered. Determine what information to present Arrange the presentation of information in an acceptable format Decide how to distribute the output to intended receipts
Depending on the nature and future use of output required, they can be displayed on the monitor for immediate need and for obtaining the hardcopy. The options for the output reports are given in the appendix.
25
A software system is always divided into several sub systems that makes it easier for the development. A software system that is structured into several subsystems makes it easy for the development and testing. The different subsystems are known as the modules and the process of dividing an entire system into subsystems is known as modularization or decomposition.
A system cannot be decomposed into several subsystems in any way. There must some logical barrier, which facilitates the separation of each module. The separation must be simple but yet must be effective so that the development is not affected. The system under consideration has been divided into several modules taking in consideration the above-mentioned criteria. The different modules are ADMINISTRATOR EMPLOYEE PAN CARD EMPLOYEE DETAIL INCOME TAX
protected and organized separately from other resources. Database is an integrated collection of data. The most significant form of data as seen by the programmers is data as stored on the direct access storage devices. This is the difference between logical and physical data. Database files are the key source of information into the system. It is the process of designing database files, which are the key source of information to the system. The files should be properly designed and planned for collection, accumulation, editing and retrieving the required information. The organization of data in database aims to achieve three major objectives: Data integration. Data integrity. Data independence.
The proposed system stores the information relevant for processing in the MS SQL SERVER database. This database contains tables, where each table corresponds to one particular type of information. Each piece of information in table is called a field or column. A table also contains records, which is a set of fields. All records in a table have the same set of fields with different information.
There are primary key fields that uniquely identify a record in a table. There are also fields that contain primary key from another table called foreign keys.
4.1.6.1 NORMALIZATION
Normalization is a technique of separating redundant fields and braking up a large table in to a smaller one. It is also used to avoid insertion, deletion and updating anomalies. All the 27
tables have been normalized up to the third normal form. In short the rules for each of the three normal forms are as below. FIRST NORMAL FORM A relation is said to be in 1NF if all the under lying domain of attributes contain simple individual values. SECOND NORMAL FORM The 2NF is based on the concept of full functional dependency. A relation said to be in 2NF if and only if it is in 1NF and every non-key attribute is fully functionally dependent on candidate key of the table. THIRD NORMAL FORM The 3NF is based on the concept of transitive dependency. A relation in 2NF is said to be in 3NF if every non-key attribute is non-transitively
Employeedetailinsertedby
nvarchar(10)
LOGIN TABLE Field EmployeeId Password Category PAN CARD DETAIL TABLE Field Name FatherName MotherName DOB PancardNumber Permanentaddress Postaladdress PancardissuedBy mobileno EmailId Form No TAX DETAIL TABLE Field Pancardno Taxyear BankBalence LIC shareMarket Mutualfund total tax pay Tax Type nvarchar(50) nvarchar(10) nvarchar(50) nvarchar(50) nvarchar(50) nvarchar(50) nvarchar(50) nvarchar(50) 29 Type varchar(50) varchar(50) varchar(50) varchar(15) varchar(20) varchar(max) varchar(max) nvarchar(10) varchar(15) varchar(50) varchar(10) Type varchar(25) varchar(25) varchar(10)
30
Circle or bubble process:- It represent a process that transforms incoming dataflow (s) into outgoing dataflow (s) e.g.
Boxes or data store: - The destination where the processed input data is to be stored is known as the data store e.g.
Square or external entities: - The entities which are not the part of the system organization e.g.
31
Physical dataflow diagram: - Based on currently existing system or it is a graphical model of current system. Comprises of the following Content diagram. First level dataflow diagram. Second level dataflow diagram.
Logical dataflow diagram: - this is based on the requirement of the currently existing system or it represents the newly proposed system. There are seven rules govern construction data flow diagram: Arrows should not cross each other. Squares, circles and file must bear names. Decomposed data flow must be balance. Squares and circle can have the same name. Draw all data flows around the outside of the diagram. Choose the meaningful names of data flows, processes and data store. Use strong verb followed by nouns. Control information such as record counts, password and validation requirements are not pertinent to a data flow diagram.
32
DATAFLOW DAIGRAM (DFD) OF ITDMS AS AN OVERVIEW Edit Employee Detail Employee Detail Entry Employee
Employee Account
ITDMS
Adminstrator
Processing
0 LEVEL DFD
Figure (4.1)
33 Custome r
Admin:
Login
35
Figure (4.2)
Employee:
Loginl
Isseue PAN Card Edit PAN Card Detail By Name Employee Edit PAN Card Detail By PAN No.
36
Figure (4.3)
CHAPTER-5
TESTING
Software testing is one element of a broader topic that is often referred to as verification and validation (V&V). Verification refers to the set of activities that ensure that software correctly implements a specific function. Validation refers to a different set of activities that ensures that the software that has been built is traceable to customer requirements.
Testing within the context of software engineering is actually a series of four steps that are implemented sequentially. Initially, test focus on each module individually, assuring that it functions properly as a unit. Hence, the name Unit testing. Unit testing makes heavy use of white-box testing techniques, exercising specific path in a modules control structure to ensure complete coverage and maximum error detection. Next, modules must be assembled or integrated to from the complete software package. Integration testing addresses the issues associated with the dual problems of verification and program construction. Black-box test case design techniques are the most prevalent during integration, although a limited amount of white-box testing may be used to ensure coverage of major control paths. After the software has been integrated, a set of high-order tests is conducted. Validation testing provides final assurance that the software meets all functional, behavioral, and performance requirements. Black-box testing techniques are used exclusively during validation. The last high-order testing step falls outside the boundary of software engineering and into the broader contest of computer system engineering. Software, once validated, must be combined with other system elements (e.g., hardware, people, and database). System testing verifies that all elements mesh properly and that overall system function/performance is achieved.
38
5.2.3 USER INTERFACE TESTING 5.2.4 USE SCENARIO TESTING 5.2.5 SECURITY TESTING 5.2.1 BLACK BOX TESTING
The test was based on checking the requirements stated on the system request in the first milestone of the project. The team crosschecked the fully developed product with functionality stated in the system request document and is proud to announce that it has completed all the promised features (except the few mentioned and discussed with the client by the members of the team).The products developed include the four different bank accounts equipped with update and add features for each one of them. The team has also ensured a secure login with user name and password features .The tests conducted by the team members on the functionality of the products were successful.
3.3 Loading time testing 3.4 Query time testing 3.5 Query results testing 3.6 Product Headings 3.7 Aesthetics /consistency testing 3.8 Format Testing 3.9 User experience testing
40
CHAPTER-6
The automated system saves times and gives you accurate results and helps to serve the operators in a much better way. It is also desired to add a few modifications to a income tax department. Taking into consideration the security point of view we would like the website to provide more strong security. In future version we would like to add this feature also. a. This website can also support the online payment. b. It would provide online income tax calculation c. User will apply online for PAN Card from any system. d. It can be made more user friendly Website than current Website e. This website can provide facility of backup of Data. f. This website can provide facility of Online Updating. g. It would provide stronger password security then current Website
HOME PAGE
LOGIN PAGE
43
EMPLOYEE
44
REFERENCES
1. MATTHEW MACDONALD BEGINNIBG ASP.NET 3.5 IN C# 2008 -APRESS 2. STEVE HARRIS AND ROBMACDONALD, WEB DEVELOPMENT WITH VB.NET -APRESS
3.
CHRIS GOODE, JOHN KAUFFMAN BEGINNING ASP.NET 1.0 WITH VISUAL BASIC.NET -WROX PROGRAMMER TO PROGRAMMER
4.
Douglas O.Reilly, DESIGNING MICROSOFT ASP.NET APPLICATIONS -TATA McGraw HILL EDITION
BIBLIOGRAPHY
45
www.msdn.microsoft.com www.csharpcorner.com www.getdotnet.com www.w3schools.com http://www.incometaxindia.gov.in/home.asp http://asp.net-tutorials.com/ http://stackoverflow.com/questions/1831072/c-sharp-extension-method-to returnrandom-alphabet http://asp.net.bigresource.com/c-18-Digit-Unique-ID-Code-reliability-qSYY6Dnmm.html http://msdn.microsoft.com/enus/library/system.web.security.formsauthentication.sig nout.aspx http://www.developerfusion.com/code/4673/programatically-loaduser-controls/ http://www.developerfusion.com/code/4596/how-to-access-amysql-database-with-net/ http://www.developerfusion.com/code/3826/adding-controls-toplaceholders-dynamically/ http://aspalliance.com/1125_Dynamically_Templated_GridView_wit h_Edit_Delete_and_Insert_Options
46