Escolar Documentos
Profissional Documentos
Cultura Documentos
SUBMITTED TO
1
2. PROFORMA FOR APPROVAL OF MCA MINI PROJECT (NMCA452)
1. Roll No.
3. E-mail: - pradeepbaberu@gmail.com
Date:
2
INDEX
1. Title page 1
2. Approval Format. 2
3. Index ... 3
4. Acknowledgement. 5
5. Certificate of originality.. 6
6. Introduction/Objective.. 7
(iv) Conclusion .. 12
(v) Objective 12
7. System Analysis. 12
8. Feasibility Study 15
9. Analysis 18
11. SRS 25
13. Screenshots... 36
14. Coding. 42
3
17. Testing 63
21. Bibliography... 69
4
ACKNOWLEDGEMENT
I am very grateful to my Mini Project (452) Mentor Dr. Ashish Avasthi for
giving his valuable time and constructive guidance in preparing the Mini
Project (452). It would not have been possible to complete this Mini Project
(452) in short period of time without his kind encouragement and valuable
guidance.
Date:
Signature
Pradeep Kumar
5
CERTIFICATE OF ORIGINALITY
Professional Colleges , Lucknow has not previously formed the basis for the award of
Place: Lucknow
Date:
Signature
Pradeep Kumar
6
INTRODUCTION-
E-Learningis the computer and network enabled transfer of skills and knowledge. It includes out-
of classroom & in-classroom educational experiences via technology. E-Learning is naturally
suited to distance learning and flexible learning. It is available anywhere, anytime. It is a self
paced interactive instructive presented over the Internet to browser equipped learners. The E-
Learning solution is empowering, engaging, effective and economical.
Early E-Learning systems, based on computer based learning (CBL) & training often attempted
to replicate autocratic teaching styles whereby the role of the e-Learning systems was to transfer
knowledge, as opposed to the systems developed later which were based on computer supportive
collaborative learning (CSCL) which ncouraged the shared development of knowledge.
Nowadays, it is an increasing trend to create virtual learning environment (VLE).The courses
offered by the environment is interactive.
process expensive & disruptive. E-Learning is revolutionizing the learning world by eradicating
the geographical boundaries. The resources are available 24*7 a week, and any computer
7
Information technology refers to the collection of tools that make it easier to use, create, manage
and exchange information. The Internet is the latest of a long series of information technologies,
which includes printing, mail, radio, television and the telephone.
Information technology (IT) as define by information technology association of America
(ITAA) is the study, design, development, implementation, support or management of computer
based information system, particularly S/W applications and computer hardware. IT deals with
the use of the electronics computers and computers software to convert, store, protect, process,
transmit and securely retrieve information.
Today, the term information technology has ballooned to encompass many aspects of
computing and technology, and the term has become very recognizable. The information
technology umbrella can be quite large, covering many fields. IT professionals perform a variety
of duties that range from installing applications to designing complex computer networks and
information databases. A few of the duties that IT professionals perform may include data
management, networking, engineering computer hardware, database and software design, as well
as the management and administration of entire systems.
When computer and communications technologies are combined, the result is
information technology, or "InfoTech". Information Technology (IT) is a general term that
describes any technology that helps to produce, manipulate, store, communicate, and/or
disseminate information. Presumably, when speaking of Information Technology (IT) as a
whole, it is noted that the use of computers and information are associated.
8
5. User centered design and deployment, including need assessment, human computer
interaction, technology transfer, and on going support.
New values:- In the old days, corporate value and value creation were defined principally
through material and financial assets. Nowadays a premium is put on intellectual capital. To
retain their competitive edge, organizations have started to investigate which training
techniques and delivery methods enhance motivation, performance, collaboration,
innovation, and a commitment to life-long learning.
New technologies:- The life of knowledge and human skills today is shorter than ever,
mounting the pressure to remain up to date with ones education and training throughout a
career. In the age of globalization and technological revolution, four-year degrees are just the
start of a forty-year continuing education. Life-long learning is quickly becoming an
imperative in todays world.
9
performance, which in turn requires top-quality training. Corporate executives now
understand that developing employee skills is the key to creating a sustainable competitive
lead.
Cost Effective:- In the run to remain competitive in todays labor-tight market, companies
are exploiting advances in technology to train employees rapidly, effectively, and at less
expense.
Types of e- learning
There are fundamentally two types of e-learning: synchronous training and asynchronous
training.
1. Synchronous, means "at the same time," involves interaction of participants with an
instructor via the Web in real time.
Synchronous Methods
Virtual classroom:- Virtual classroom duplicates the features of a real classroom online.
Participants interact with each other and instructors online .instant messaging, chat, audio and
video conferencing etc.
Blended Method:- Most companies prefer to use a mix of both synchronous and asynchronous
e-learning methods according to their requirement.
2. Asynchronous, which means "not at the same time," allows the participant to
complete the WBT at his own pace, without live interaction with the instructor. A new form of
learning known as blended learning is emerging. As the name suggests it is an amalgamation of
synchronous and asynchronous learning methods.
Asynchronous Methods
10
Embedded learning:- Embedded learning is information that is accessible on a self-help basis,
24/7. It can be delivered to the place of work, or to mobile learners. Electronic performance
support system (EPSS) is a type of embedded learning. The advantage is that embedded learning
offers learners the information they need whenever they need it.
Courses:- The clear advantage of a self-paced course is convenience. Participants can get the
training they need at any time. This can include just-in-time training where a participant gets
exactly the training he or she needs to perform a task.
Discussion groups:- A discussion group is a gathering of conversations that occur over time.
They are also called message boards, bulletin boards and discussion forums. Discussion groups
can be used to support a group of participants taking the same class or can be used to support
participants performing related tasks. A discussion group is a very competent way to supply
expert answers to a large group people. A single answer to a common question can help many.
Benefits of E-learning
Simple, Flexible Logistics:- After location, time is the greatest limitation on learning.
That goes for both the instructors and the students, each of whom has to be both
available and in alignment with the other for face-to-face instruction. By removing that
requirement, everyone involved can participate at a time, and for a duration, that suits
his or her schedules.
Immediate Results and Feedback:- Anyone who has graded papers knows it can get
tedious, and its time-consuming. Many of the most popular standardized tests, in fact,
still rely on evaluation techniques that slow results. Most online learning technologies
integrate online quizzes and other tools to more rapidly evaluate the pace of learning.
Better Retention:- With clever design, user experience, and multimedia, online
instruction can prove to be a richer and more effective learning experience than
traditional methods and channels.
Greater Access to Expertise:- In any country, there are only a handful of cities that can
claim among their residents the experts in every field of study. Take away the
limitations of geography, and expertise is free to travel almost anywhere. This
transformation allows information on highly specialized subjects to reach more people,
paving the way for advances in fields from telemedicine to non-profit charities.
The Most Up-to-Date Content at Much Lower Cost:- The sticker shock associated
with the textbook market is not news to anyone who has enrolled in even a single
college course. And yet, despite the cost, our knowledge of most subjects continues to
grow and evolve, making $200 textbooks unreliable with a few years, and eventually of
no use at all. The remote delivery of curriculum allows instructors to keep materials up-
to-date, and the lower costs over time remove what for some are insurmountable
obstacles to furthering their education.
A Better Fit for 21st-Century Businesses:- As companies become more globally
focused, co-workers are more likely to work in different places, if not on different
continents. Online learning can help prepare employees to excel in todays scattered,
11
virtual office. For those already working up the career ladder, online learning makes use
of resources and technologies already at their fingertips.
Conclusion
All in all e- learning is here to stay and only you can decide the degree of involvement in e-
learning your company may require and the best methods applicable to you and your
employees.
OBJECTIVE-
Basic objectives are to extend their reach to geographically scattered students, E-Learning
system reducing time in activities, centralized data handling and paperless online exam, books
with reduced manpower. Cost cutting, operational efficiency, consist view of data and
integration with other institutions are other factors. Main challenges are effectively sync internal
and external operations in such a manner that job can be finished within time limit and
integration with different agencies on an agreed upon common data format.
SYSTEM ANALYSIS
IDENTIFICATION OF NEED
development effort. The requirements analysis task is a process of discovery, refinement modeling and
specification. The software scope initially established by the system engineer and refined during
software project planning is refined in detail. Modular of the required data, information and control
flow, and operational behavior are created. Alternative solution are analyzed and allocated to various
software elements.
Both developer and customer take an active role in requirements analysis and specification. The
performance into concrete detail. The developer acts as interrogator consultant and problem solver.
12
Requirements analysis is a software engineering task that bridges the gap between system level
Requirement analysis enabler the system engineer to specify software function and
performance indicate softwares interface with other system elements and establish constraints that
(c) Modeling
(d) Specification
(e) Review
Initially, the analyst studies the system specification and the software project plan. Problem
evaluation and solution synthesis is the next major area of effort for analysis. Upon evaluating current
problems and desired information (input and output) the analyst begins to synthesize one or more
solutions.
During the evaluation and solution synthesis activity, the analyst creates models of the system in
an effort to better understand data and control flow, functional processing and behavioral operation,
and information content. The model serves as a foundation for software design and as the basis for the
PRELIMINARY INVESTIGATION
Present system is manual. The working of the organization May be described as:
13
All details of customer, product, sale, purchase, registration etc are maintained in registers. All
registrations are also maintained in registers. All Bills are manually created, and send at desired place for
Preliminary investigation took me to the Accounts room of Agency, where I came across the
current working process. Although the process of maintaining data is not a recorded one as such there
were no documents to be reviewed in order to determine efficacy of the current working process. So I
had to emphasize on the observation I made while in the office. In order to complement my onsite
observations I undertook a simple interview of office bearers. The results of which are broadly
catalogued below.
In concurrence with onsite observation I conducted some interviews. To get a closer look at
the present working culture and identify the problem domain I talked to some of office bearers. I
Questionnaire:
4.Can you show me the environment in which the software will be used?
Ans. The slow working process of the work due to high number of calculations.
14
2. What effect does it have on your work?
Ans. Usually it delays our work. As such we have to prepare ourselves 3 to 4 days beforehand to say the
least.
Ans. No because it hardly leads to a conclusive result rather generating further queries. Also the bulk of
work sometimes forces us to limit our capabilities and skip through some material and information since
The preliminary investigation gave me clear information about the ills plaguing
the present system.
FEASIBILITY STUDY
Before getting started on the new system it was important to determine the feasibility involved
in the developed system so that the new system development could be develops. Feasibility is the
determination of whether or not a project is not worth doing. The project followed in making this
determination is called a feasibility study. This type of study determines if a project can and should Be
Taken. Once it has been determined that project is feasible, the analyst can go ahead and the prepare
Generally, feasibility studies are undertaken within tight time constraints and normally
The developed system is started after considering the main three types of feasibilities which are
discussed below: -
1)-Technical feasibility
2)-Operational feasibility
15
3)-Economic feasibility
TECHNICAL FEASIBILITY
As we know the technical feasibility is concerned with specifying equipment and software that
will successfully satisfy the user requirement. The technical needs of the system may vary considerably,
In examination technical feasibility, configuration of the system is given more importance than
the actual make of hardware. The configuration should give the complete picture about the systems
requirements: How many workstations are required, how these units are interconnected so that they
ECONOMIC FEASIBILITY
Economic analysis is the most frequently used technique for evaluating the effectiveness of a
proposed system. More commonly known as cost/benefits analysis the procedure is to determine the
benefits and savings that are expected from a purposed system and compare with costs.
If benefits outweigh cost, a decision is taken to design and implement the system otherwise
further justification or alternative in the proposed system will have to be made if it is to have a chance
of being approved. This is an ongoing effort that improves in accuracy at each phase of the system life
cycle.
16
The analysis part also clears the doubt of economic problems could be possible in developing
the system. As already mentioned that the company has to just pay the developed software cost and
not other investment is needed at the time of implementation of the new system as the preliminary
Since the cost difference between the present system and the new proposed computerized system will
be large. Considering the fact that new system will require only one time monetary investment whereas
the present system keeps on adding to the cost in a daily basis. We can conclude that the breakeven
within a year, making this proposed computerized news management system economically feasible.
OPERATIONAL FEASIBILITY
Proposed projects are beneficial only if they can be turned into information system that will meet
the operating requirements of the organization. This test of feasibility asks if the system will work when
it developed and installed. Are there major barriers to implementation? Some of the important
questions that are useful to test the operational feasibility of a project are given below:
Is there sufficient support for the project from the implementation? From user? If the present
system is well liked and used to the extent that persons will not be able to see reasons for
Are current business methods acceptable to the user? If they are not, user may welcome a
change that will bring about a more operational and useful system.
Have the user been involved in the planning and development of the project? If they are
involved at the earliest stage of project development, the chances of resistance can be possibly
reduced.
Will the proposed system cause harm? Will it produce poorer result in any case or area? Will
17
Issue that appears to be quite minor at the early stage can grow into major problem after
implementation. Therefore, it is always advisable to consider operational aspects carefully. The
system is developed in keeping mind that it should be user friendly and easy to operate hence
the system is operational feasible.
ANALYSIS-
DFD-
A Data Flow Diagram (DFD) is a graphical representation of the "flow" of data through an Information
System. A data flow diagram can also be used for the visualization of Data Processing. It is common
practice for a designer to draw a context-level DFD first which shows the interaction between the system
and outside entities. This context-level DFD is then "exploded" to show more detail of the system being
modeled.
A DFD represents flow of data through a system. Data flow diagrams are commonly used during problem
analysis. It views a system as a function that transforms the input into desired output. A DFD shows
movement of data through the different transformations or processes in the system.
Dataflow diagrams can be used to provide the end user with a physical idea of where the data they input
ultimately has an effect upon the structure of the whole system from order to dispatch to restock how any
system is developed can be determined through a dataflow diagram. The appropriate register saved in
database and maintained by appropriate authorities.
Function
File/Database
18
Input/output
Flow
DFD OF E-LEARNING
Level 0-
19
Level 1-
20
Entity Relationship Diagrams (ER-Diagrams):
between entities in a database. ER diagrams often use symbols to represent three different types
of information. Boxes are commonly used to represent entities. Diamonds are normally used to
modeling method, used to produce a type of conceptual schema or semantic data model of a
object with a physical existence such as person, car or employee. Entity symbol is as follows
Attribute: Attribute is a particular property that describes the entity. Attribute symbol is
Relationship: Relationship will be several implicit relationships among various entity types
whenever an attribute of one entity refers to another entity type some relationship exits.
Relationship symbol is:
21
Key attributes: An entity type usually has an attribute whose values are distinct for each
individual entity in the collection. Such an attribute is called key attribute. Key attribute symbol
is as follows:
-Table
- Primary Key
-Link
-Fields
-Relationship
-Data Flow
22
FUNCTIONAL DECOMPOSITION DIAGRAM
Table structure-
Column Name Data Type Allow Nulls
Username Varechar(10) Yes
Password Varechare(10) yes
23
SOFTWARE ENGINEERING MODEL
After getting detail of each section, whole process was re-evaluated and a proper design for the system
3. Negotiation of the stakeholders win conditions to reconcile them into a set of win-win conditions for
all concerned.
24
SYSTEM REQUIREMENTS SPECIFICATIONS-
SOFTWARE REQUIREMENT SPECIFICATION
The software requirements specification is produced at the culmination of the analysis task. The
function and performance allocated to software as part of system engineering are refined by
establishing a complete information description a detailed functional and behavioral description, a
indications of performance requirements and design constraints, appropriate validation criteria and
other data pertinent to requirements.
1. Introduction
a. Purpose
b. Scope
c. Definition, Acronyms, Abbreviations
d. References
e. Developers Responsibilities Overview
2. General Description
a. Product Functions Overview
b. User Characteristics
c. General Constraints
d. General Assumptions and Dependencies
3. Specific Requirements
a. Inputs and Outputs
b. Functional Requirements
c. External Interface Requirements
d. Performance Constraints
e. Design Constraints
(i) Software Constraints
(ii) Hardware Constraints
4. Validation and Criteria
a. Performance bounds
b. Classes of tests
c. Expected Software response
d. Special Considerations
5. Acceptance Criteria
25
1. INTRODUCTION: -
This is the requirements document for the project that will be used throughout the work. The system to
be developed is for front office and financial work of agency, based on the inputs given. This document
follows the IEEE standard for a requirement specification document, with some variations.
a). Purpose:
The purpose of this document is to describe the requirements of agency. It also
describes the interfaces for the system.
b). Scope:
This document is the only one that describes the requirements of the system. It is meant
for use by the developers and will be the basis for validating the final delivered system. Any
changes made to the requirements in the future have to go through a formal change approval
process. The developer is responsible for asking for clarifications, where necessary, and will not
make any alterations without the permission of the client.
2. GENERAL DESCRIPTION: -
a). Product Functions Overview:
In agency there is a counter for booking and various queries of the customers can
be solved with ease on one table. As the software provide all information customer,
registration etc provided by the agency.
26
b). User Characteristics:
The main users of this system will be the registration department and accounts
department, who are somewhat literate with computers and can use programs efficiently.
Not applicable.
3. Specific Requirements:
The system has all the details regarding the sale, customer, employee, product, purchaseetc. The
system has several inputs in form of data entry and several outputs in form of bills, reports etc.
The forms under the heading General Entries are sale, salary, leave etc are maintained.
From one the bill is generated and the other helps in report generation. Here also, the customer gets the
desired registration and accordingly the bills and report are generated.
b). Functional Requirements:
It present description of each function required to solve the problem. A processing narrative is
provided for each function, design constraints are stated and justified, performance characteristics are
stated, and one or more diagrams are included to graphically represent the overall structure of the
software and interplay among software functions and other system elements under this topic, the
functional working of the various modules where give the complete picture for the data flow from one
location to other.
27
4.Validation Criteria:
Probably the most important section of a software requirements specification is validation
Criteria. The specification of validation criteria acts as an implicit review of all other requirements. The
tests must be conducted to validate function, performance and constraints.
In this project I have try the various steps in testing the links and connectivity of the data
Directorate of public grievances takes up a grievances where it is satisfied that eh matter has not been
dealt with by the concerned SSA in a fair, just or objective manner or has been unduly delayed. It may
take up such a care for investigation, call for a report and or file from the concerned SSA and ask them
to reconsider the matter and to arrive at a fair decision in a time bound manner.
5. Acceptance Criteria:
Before accepting the system, the developer must demonstrate that the system works on the course data
for the last 4 semesters. The developer will have to show through test cases that all conditions are
satisfied.
SOFTWARE REQUIREMENT
SERVER REQUIREMENTS:-
Hardware Requirement:
HARDWARE RECOMMENDED SUFFICIENT
Processor Pentium 4 Pentium 3,Celeron
RAM 1 G.B. 512 MB
Hard disk Space 2.5 GB 2 GB
Monitor 17 15
Mouse and keyboard Multimedia Normal
Software Requirement:
USE OF THE SOFTWARE NAME OF THE SOFTWARE
For client side scripting Java Script
For Styles HTML,XML,CSS
For Creating database SQL Server 2008
Web Browser Netscape, IE 5.0/6.0,Mozilla
U I Design ASP .Net4.0
28
CLIENT REQUIREMENT:-
Web Browser :-IIS
Operating System :-Windows XP
Processor and RAM : - P3 or above and 126 M.B. RAM
SYSTEM DESIGN
1. Input Design:
When designing input, the objective is to ensure that the data that will be processed by the system
is collected and entered into the system efficiently, according to the specified requirements, and with the
minimum of errors. In description with the client, the designer will choose a method of input, which is
cost effective and acceptable to the end users. The process of input design, like output design, which was
described earlier, consists of four stages.
Firstly, identifying the inputs into the system, by listing the data flows on the required logical
data flow diagram which cross the system boundary on their way in
Then determining the content of these inputs by inspecting the data dictionary
Next choosing an appropriate input device to change the user's data into a form which can be
read and processed by the computer system
And finally completing the detailed design work involved in specifying forms, input screens and
other data collection documents.
Project development required complete analysis of system right from the scratch Analysis of
the system required great attention on big as well as minute transactions This required exhaustive study
of Manual management system. Manual system was divided in various sections, which were dealt
individually. Getting detail of each section was a tedious and a time consuming task. This involved
various meetings with head of each individual section. After getting detail of each section whole process
was re-evaluated and a proper design for the system was brought into existence. Design was discussed
with the Workshops Manager and was further improved by eliminating some loopholes. Designing
process is carried on very carefully as this serves as backbone for development of any software. Thus
synopsis of the package was prepared.
After Design phase attention was laid upon source code of the package.
29
Whole project was divided into small modules. Source code for each module was individually prepared
and tested both syntactically and logically (Modular Testing). In cases modules were further divided into
units and tested (Unit Testing). These units were merged to get modules and these modules were
further available for integration. This sort of testing comes under Integration Testing. Various tests were
conducted on the package to demonstrate that the system satisfies all the requirements stated in
requirements documentation. This is Acceptance Testing.
Phase 1 of the package has been prepared and is running successfully (Implementation).
Maintenance of the package would require further enhancement of the package as per
30
Relational database are the most common type of database management systems in use today.
Relational database includes Oracle, DB2, Ingress, Informix, Sybase, and SQL Server.
Another important concept in relational databases is that relationships between tables are not
hard-coded in the structure of the data that is there are no pointers in the data to relate one
table to another. This means that you can specify the relationships between two sets of data at
development time rather than when the tables are first created. This greatly improves the
flexibility of the database management system.
Relational Database Properties- A relational database management system (RDBMS) has the
following properties:
Represents data in the form of tables
Does not hard-code relationships between tables
Doesn't require the user to understand its physical implementation
Provides information about its contents and structure in system tables
Can be manipulated through SQL commands
3. Tables of Information:
31
SQL stores information in tables. These tables have one or more columns. The columns
heading describe the kind of information kept in the column. The information is stored row
after row. Each unique set of data gets is own row.
Even though the tables are independent, we can easily see that they are related. A column in one table
is related to a column in the other table. This relationship is the basis for the name relational database.
This is the basic idea of a relational (sometimes called a relational model). Data is stored in tables. Tables
have columns, rows, and names. Tables can be related to each other if each has a column with a
common type of information.
The retrieval of data from a database can be faster with primary key. A primary key is a field that
uniquely identifies each record in a table is called a foreign key.
To cascade updating and deletion of related fields, we enforce the referential integrity. Whenever a
change is made to primary key.
When two tables have single common field, they are said to be 'related'. The types of relationships,
which the tables in SQL can have, are:
One to One
One to many
Many to One
Many to many
SQL server, objects can be defined as reusable software codes which are location independent
and perform a specific task on any application environment with little or no change to the code. SQL
products are based on a concept known as the Client/Server Technology. This concept involves
segregating the processing of an application between two systems. A client or front-end database
application also interacts with the database by requesting and receiving information from the
database server. It acts as an interface between the user and the database. Further, it also checks
for validation against the data entered by the user. The database server or backend is used to
manage the database tables optimally among multiple clients who concurrently request the server
for the same data. It also enforces data integrity across all client applications and controls database
access and controls database access and other security requirements.
SQL is a RDBMS and consists of a comprehensive set of application building and end-user
products, aimed at providing complete solutions. SQL applications are potable across a variety of
platforms and operating systems. It provides a flexible DBMS called SQL server for storage and
management of information used by all applications.
32
An object relational database management system (ORDBMS) extends the capabilities of the
RDBMS to support object-oriented concepts. We can use Oracle as an RDBMS or take advantage of
its object-oriented features. The information stored in SQL is kept in tables. The three major
characteristics of most tables are columns, rows and a name.
Tables can be related to each other if each has a column with a common type of information.
SQL avoids specialized, academic terminology in order to make the product more approachable.
A column may be called an attribute, a row may be called a tuple, and a table may be called an
entity.
SQL was the first company to release a product that used the English-based Structured Query
Language or SQL. This language allows end users to extract information themselves, without using a
systems group for every little report. Oracles query language has rules of grammar and syntax. SQL is an
astonishingly capable tool.
Some benefits of using SQL are:
Large Databases
Many Users (multiple user can work)
Portable
Backup & Recovery features
Security
Client/Server Support
Data entities & Key Fields
Entity & Attributes
Entity-
An entity is an object, place, person, concept, or activity about which an enterprises record
data.
Attribute-
An attribute is the characteristic property of an existing entity. The difference
between attribute type and attribute instance has to be understood.
4.Relationship Diagrams
A relationship is defined as "an association among entities". A relationship type is an association
33
One-to-One
If in an entity there is a one field, which is not repeated, and another entity it is related and also
entered once is called One-to-One relationship.
Many-to-Many
In many to many relations ship both table can have repetitive data.
5. Screen Designs
The quality of screen design can have a direct impact on the performance of the users of the
system, and the designer needs to consider the format as well as the content of the screens on which
the dialogue, or interaction, between the user and the system is based. A number of features of screen
design are worth discussing here:
Text Must be easily readable. In addition to choosing an appropriate font and size for the
characters, readability can be improve by using lower and upper case letters, rather than the
approach some times adapted in screen design of using all upper case evenly
Space text, with an unjustified right margin is easier to read than right justified text, which has spaces of
varying sizes between the words. The use of concise phrase, familiar vocabulary and appropriate
abbreviations make it easier for the reader to understand the text. The most visible section of the screen
is the upper left-hand corner
And it is a good idea to locate important messages in this area. Again it is important that
The designers understand the characteristics of the in user in order to deliver quality products.
Beginners, who are usually looking at their fingers, will noticed error messages
Which appear on the button line on the screen, where as the top right corner of the screen is a more
appropriate location for experienced keyboard operators.
Color- another set of the design option is possible, in addition to those described above, if the
display is in color. Being in a different color to be rest or being enclosed in a colored box can highlight
text. Background colors can be changed or a design convention can be used in which different types of
information are displayed in different colors. The consistent use of colors on screens within the same
34
system is important, and the designer must be wary of using to many colors or creating lurid
combination as these will work against the effectiveness of the screen design.
Graphics can be used to good effect for displaying information, especially trends in numerical
data. They can be colored, solid, three-dimensional or animated, and the designer must decided on
what is appropriate to the purpose. Another use of graphics is as an integral part of the structure of the
dialogue-known as a graphical user interface (GUI).
Animation- although this is little used in screen design, it can be a powerful technique for attracting the
attention of the user, because the eye is always drawn to a moving object; to mark the position of an
object, for example, a blinking cursor can be used; or to communicate a message, a clock with a moving
hand , or an hourglass with moving sand, indicate to the user that they have to wait while some
35
Screenshots:-
Home Page
36
AboutUs
37
Login
38
Register
39
Forget Password
Uploads
40
Services
Books
41
CODING
Source Code
style.css
body {
margin: 0;
padding: 0;
color: #252525;
font-family: Tahoma, Geneva, sans-serif;
font-size: 12px;
line-height: 1.7em;
background-color: #ffffff;
background-image: url(images/generalbody.jpg);
background-repeat: repeat-x;
background-position: top
}
a, a:link, a:visited { color: #0099CC; font-weight: normal; text-decoration: none; }
a:hover { color: #009900; text-decoration: underline; }
p { margin: 0 0 10px 0; padding: 0; }
img { border: none; }
em { color: #000; font-weight: bold; font-style: normal }
h1, h2, h3, h4, h5, h6 { color: #2c93a6; font-weight: normal; }
h1 { font-size: 28px; margin: 0 0 20px 0; padding: 5px 0 }
h2 { font-size: 25px; margin: 0 0 15px 0; padding: 5px 0; }
h3 { font-size: 22px; margin: 0 0 15px; padding: 0; position:relative:-35px; }
h4 { font-size: 18px; margin: 0 0 15px; padding: 0; }
h5 { font-size: 16px; margin: 0 0 10px; padding: 0; }
h6 { font-size: 14px; margin: 0 0 5px; padding: 0; }
.cleaner { clear: both }
.h10 { height: 10px }
.h20 { height: 20px }
.h30 { height: 30px }
.h40 { height: 40px }
.h50 { height: 50px }
.h60 { height: 60px }
a.more { clear: both; display: block; width: 123px; height: 39px; line-height: 39px; font-size: 11px;
text-align: center; color: #333; font-weight: 700; background: url(images/generalmore.png) }
a.more:hover { text-decoration: none; color: #000; }
.float_l { float: left }
.float_r { float: right }
.image_wrapper { position: relative; display: block; width: 144px; height: 121px; }
.image_wrapper img { width: 130px; height: 107px; margin: 7px }
.image_wrapper span { position: absolute; top: 0; left: 0; width: 144px; height: 121px; background:
url(images/generalimage_frame.png) no-repeat }
.image_fl { float: left; margin: 3px 15px 0 0 }
.image_fr { float: right; margin: 3px 0 0 15px }
.tmo_list { margin: 20px 0 20px 20px; padding: 0; list-style: none }
.tmo_list li { margin: 0; padding: 0 0 0 30px; background: url(images/generallist.png) no-repeat scroll 0
7px }
#generaltop_wrapper {
width: 100%;
}
#generaltop {
width: 964px;
height: 361px;
margin: 0 auto;
background: url(images/generalwrapper.jpg) no-repeat top
}
#generalheader {
width: 964px;
height: 27px;
padding: 30px 0
}
#generalmiddle {
clear: both;
width: 964px;
42
height: 300px;
background: url(images/Master.png) no-repeat
}
#generalmenu {
width: 860px;
height: 33px;
padding: 8px 5px;
}
#generalmenu ul {
display: block;
float: left;
margin: 2px 0 0;
padding: 0;
list-style: none;
}
#generalmenu ul li {
padding: 0;
margin: 0;
display: inline;
}
#generalmenu ul li a {
float: left;
display: block;
width: 170px;
height: 27px;
padding: 3px 0 0;
margin-left: 1px;
font-size: 12px;
text-align: center;
text-decoration: none;
color: #333;
font-weight: 700;
outline: none;
}
#generalmenu ul li a:hover {
color: #000;
background-color:#E5E5E5;
}
#generalmain {
clear: both;
width: 960px;
padding: 30px 0;
margin: 0 auto
}
.col_w960 {clear: both; width: 960px; padding-bottom: 50px; margin-bottom: 30px; border-bottom: 1px solid
#ccc }
.col_w960_last { margin: 0; border: 0 }
.col_w600 { width: 600px; margin-top:-30px; }
.col_w450 { width: 450px }
.col_w300 { width: 300px; margin-right:-25px; margin-bottom:1px; margin-top:-55px; }
.col_w260_r { float: right; width: 280px; text-align:justify; }
.col_w260_l { float: left; width: 250px; padding-right:35px; border-right: 1px solid #ccc ; text-
align:justify;}
.col_allw300 { width: 300px; float: left; margin-right: 30px }
.col_w225 { float: left; width: 225px; margin-right: 20px; }
.col_w225_content { padding: 0 20px;
font-weight: 700;
}
.col_last { margin: 0 }
.content_box { padding-bottom: 30px; margin-bottom: 30px; border-bottom: 1px solid #ccc }
#generalfooter_wrapper_01 {
width: 100%;
background: #1c668b url(images/generalfooter_wrapper.jpg) repeat-x bottom;
}
#generalfooter_wrapper_02 {
width: 100%;
background: url(images/generalfooter.jpg) no-repeat bottom center;
}
#generalfooter {
width: 960px;
43
padding: 30px 0 50px;
margin: 0 auto;
color: #fff;
background: url(images/generalfooter.jpg) no-repeat bottom center
}
#generalfooter a { color: #fff; text-decoration: underline }
#generalfooter a:hover { color: #33FFFF; }
.tmo_footer_list { margin: 0; padding: 0; list-style: none }
.tmo_footer_list li { margin: 0; padding: 0 0 0 30px; background: url(images/generalfooter_list.png) no-
repeat scroll 0 7px }
.tmo_footer_list li a { color: #fff; text-decoration: underline }
#generalfooter h5 { display: block; width: 205px; height: 35px; line-height: 35px; padding-left: 20px;
color: #fff; background: url(images/generalfooter_header.png) no-repeat }
Home .aspx
44
• Demo Online Examination <br /><br />
• Medium-High Capacity Range<br /><br />
• Ultra-High Capacity upload books<br /><br />
• Project Devloper System
</marquee>
</div>
<div class="cleaner"></div>
</div>
</asp:Content>
About Us.aspx
<%@ Page Title="" Language="C#" MasterPageFile="~/generalzone.master"
AutoEventWireup="true" CodeFile="aboutus.aspx.cs" Inherits="aboutus" %>
Services.aspx
<%@ Page Title="" Language="C#" MasterPageFile="~/generalzone.master" AutoEventWireup="true"
CodeFile="index.aspx.cs" Inherits="index" %>
<asp:Content ID="Content1" ContentPlaceHolderID="head" Runat="Server">
<style type="text/css">
.style1
{
text-align: justify;
}
</style>
45
</asp:Content>
<asp:Content ID="Content2" ContentPlaceHolderID="ContentPlaceHolder1" Runat="Server">
<div id="generalmain">
<div class="col_w600 float_l">
<div class="content_box">
<br/> <h2 > Home </h2><div class="cleaner"></div></div>
<div class="col_w260_l"> <p class="style1"> <span lang="EN-US"
style="mso-bidi-font-size:13.0pt; font-family: "Tahoma","sans-
serif"; mso-fareast-font-family: "Times New Roman"">
E-Learningis the computer and network enabled transfer of skills and knowledge.
It includes out-of classroom & in-classroom educational experiences via
technology.</span></p>
<p class="style1"> <span lang="EN-US" style="mso-bidi-font-size: 13.0pt; font-family:
"Tahoma","sans-serif"; mso-fareast-font-family: "Times New Roman""> E-
Learning
is naturally suited to distance learning and flexible learning. It is available
anywhere, anytime. It is a self paced interactive instructive presented over the
Internet to browser equipped learners. The E-Learning solution is empowering,
engaging, effective and economical.<o:p></o:p></span></p>
<p class="style1"> <span lang="EN-US" style="mso-bidi-font-size: 13.0pt; font-family:
"Tahoma","sans-serif"; mso-fareast-font-family: "Times New Roman"">
Early E-Learning systems, based on computer based learning (CBL) & training
often attempted to replicate autocratic teaching styles whereby the role of the
e-Learning systems was to transfer knowledge, as opposed to the systems
developed later which were based on computer supportive collaborative learning
(CSCL) which ncouraged the shared development of knowledge. Nowadays, it is an
increasing trend to create virtual learning environment (VLE).The courses
offered by the environment is interactive</span><span lang="EN-US"
style="mso-bidi-font-size: 13.0pt; font-family: "Arial","sans-
serif"; mso-fareast-font-family: "Times New Roman"">.<o:p></o:p></span></p>
</div> <div class="col_w260_r">
<marquee direction="up" style="height:270px" onmouseover="this.stop()"
onmouseout="this.start()"><img src="images/marqueegeneralmaster.gif" />
Super-High Video Lecture <br /><br />
• Demo Online Examination <br /><br />
• Medium-High Capacity Range<br /><br />
• Ultra-High Capacity upload books<br /><br />
• Project Devloper System
</marquee>
</div><div class="cleaner"></div>
</div>
</asp:Content>
Services Overview.aspx
46
<span class="style2">
&nbs
p; &n
bsp;
&nbs
p;
&nbs
p;
</span>
<asp:HyperLink ID="HyperLink2" runat="server" CssClass="style2"
NavigateUrl="~/Customer Learning Solution.aspx">Next</asp:HyperLink>
</div></div>
<div class="col_w260_l" style="width:520px">
<img src="images/e-Services.gif" align="right"
style="margin-left:25px; height: 212px; width: 268px;"/>
<div class="col_w225_content"><p>
<a href="#"><strong><span class="style2">Services
Overview</span></strong></a></p>
<p class="style1">
<span style="font-size:8.5pt;line-height:115%;font-
family:"Tahoma","sans-serif";
color:#252525">A global eLearning service provider with domain specific expertise in custom eLearning
solutions, enterprise learning, blended learning solutions, eLearning technology
& learning support. In this world of fast-changing high-end technology,
learning
and training requirements have been evolving, blending across the organizations,
and undergoing minor & major transformations overtime. Traditional approaches
have taken a back seat because eLearning offers complete flexibility by
providing the targeted learners with the freedom to choose the time, place, and
pace of study.<span style="mso-spacerun:yes"> </span></span> </p>
<p class="style1">
<span style="font-size:8.5pt;line-height:115%;font-
family:"Tahoma","sans-serif";
color:#252525"><span style="mso-spacerun:yes">W</span>e develop custom content for the eLearning
courses, hosts content on companion Websites, and employ latest technologies to
repurpose content to various formats. In addition, we also offer media
development and integration facilities. The approach employed in each phase of
content development is highly focused & tailored to the individual &
organizational needs.<o:p></o:p></span></p>
<p class="style1">
<span style="font-size:8.5pt;line-height:115%;font-
family:"Tahoma","sans-serif";
color:#252525"><span style="mso-spacerun:yes"> </span></span></p></div>
<div class="cleaner">
<br /><br /><br /><br />
</div></div>
</asp:Content>
47
<div class="cleaner"><br />
<span class="style2"> </span>
<asp:HyperLink ID="HyperLink1" runat="server" NavigateUrl="~/Services Overview.aspx"
CssClass="style2">Previous</asp:HyperLink>
<span class="style2">
&nbs
p; &n
bsp;
&nbs
p; &n
bsp;
</span>
<asp:HyperLink ID="HyperLink2" runat="server" CssClass="style2"
NavigateUrl="~/Learning Technology.aspx">Next</asp:HyperLink>
</div></div>
<div class="col_w260_l" style="width:520px">
<img src="images/e-Services.gif" align="right"
style="margin-left:25px; height: 212px; width: 268px;"/><div class="col_w225_content">
<p class="style2"> <a href="#"><strong><span class="style2">Customer Learning
Solution</span></strong></a></p>
<p class="style1">
<span style="font-size:8.5pt;line-height:115%;font-
family:"Tahoma","sans-serif";
color:#252525">The team of instructional designers, graphic artists, and developers service the
content needs of some of the largest companies in the world. We have extensive
experience in developing course material for instructor-led training, web-based
training, and blended learning solutions, covering a wide variety of subject
matter, including technical and non-technical topics. </span></p>
<p class="style1">
<span style="font-size:8.5pt;line-height:115%;font-
family:"Tahoma","sans-serif";
color:#252525">We understand that
eLearning is not just about publishing content online; it is more about
presenting the content in an innovative, interesting and easier-to-grasp
format.<o:p></o:p></span></p>
</div>
<div class="cleaner"></div></div></asp:Content>
Learning Technology.aspx
<%@ Page Title="" Language="C#" MasterPageFile="~/generalzone.master" AutoEventWireup="true"
CodeFile="Learning Technology.aspx.cs" Inherits="products" %>
<asp:Content ID="Content1" ContentPlaceHolderID="head" Runat="Server">
<style type="text/css">
.style2
{
font-size: small;
}
.style3
{
font-weight: normal;
}
</style>
</asp:Content>
<asp:Content ID="Content2" ContentPlaceHolderID="ContentPlaceHolder1" Runat="Server">
<div id="generalmain">
<div class="col_w600 float_l">
<div class="content_box"><br/>
<h3>Our Services.....</h3>
<div class="cleaner"><br />
<span class="style2"> </span>
<asp:HyperLink ID="HyperLink1" runat="server" NavigateUrl="~/Customer Learning
Solution.aspx"
CssClass="style2">Previous</asp:HyperLink><span class="style2">
&nbs
p; &n
bsp;
48
&nbs
p; &n
bsp;
</span>
<asp:HyperLink ID="HyperLink2" runat="server" CssClass="style2"
NavigateUrl="~/Learning Supports.aspx">Next</asp:HyperLink>
</div></div>
<div class="col_w260_l" style="width:520px">
<img src="images/e-Services.gif" align="right"
style="margin-left:25px; height: 212px; width: 238px;"/><div class="col_w225_content">
<p> <a href="#"><strong><span class="style2">Learning
Technology</span></strong></a></p>
<ul style="height: 184px; width: 434px; margin-left: 4px">
<li><span class="style3">Technical Programming Services (Custom Tools)</span></li>
<li><span class="style3">Simulation Design and Development</span> </li>
<li><span class="style3">SharePoint SitesDesign and Development</span></li>
<li><span class="style3">Managed Learning Environment </span></li>
<li><span class="style3">Content/Asset Management Systems </span></li>
<li><span class="style3">Assessment Management Systems </span></li>
<li><span class="style3">Online Collaboration Tools </span></li>
<li><span class="style3">Learning Management Systems</span> </li>
<li><span class="style3">Content Syndication Systems</span></li>
</ul><br /><br /><br />
The underlying philosophy of these tools is scalability, ease of use, richness in
features/functionality, configurability, and customizability.<br /> </div>
<div class="cleaner"></div></div></asp:Content>
login.aspx
<%@ Page Title="" Language="C#" MasterPageFile="~/generalzone.master" AutoEventWireup="true"
CodeFile="login.aspx.cs" Inherits="login" %>
<asp:Content ID="Content1" ContentPlaceHolderID="head" Runat="Server">
<style type="text/css">
.style1
{
font-size: x-large;
}
.style2
{
color: #3333FF;
}
</style>
</asp:Content>
<asp:Content ID="Content2" ContentPlaceHolderID="ContentPlaceHolder1" Runat="Server">
<div id="generalmain">
49
</td>
</tr>
<tr>
<td>
</td>
<td>
</td>
</tr>
<tr>
<td>
Password</td>
<td>
<asp:TextBox ID="TextBox2" runat="server" Width="170px"
placeholder="enter your password"></asp:TextBox>
</td>
<td>
<asp:RequiredFieldValidator ID="RequiredFieldValidator2" runat="server"
ControlToValidate="TextBox2" ErrorMessage="*"
ForeColor="Red"></asp:RequiredFieldValidator>
</td> </tr> <tr>
<td>
</td>
<td>
</td>
</tr>
<tr>
<td>
</td>
<td>
<asp:Button ID="Button1" runat="server" Text="Submit" />
<asp:Button ID="Button2" runat="server" Text="Cancel" />
</td> </tr> <tr>
<td> </td> <td>
&nbs
p;
<asp:HyperLink ID="HyperLink2" runat="server"
NavigateUrl="~/forgetpswrd.aspx">Forgot Password</asp:HyperLink>
</td> </tr> <tr>
<td> </td> <td>
</td>
</tr>
<tr>
<td>
</td>
<td>
</td>
</tr>
<tr>
<td colspan="2">
<span class="style1"><strong><em class="style2">
<asp:HyperLink ID="HyperLink1" runat="server"
NavigateUrl="~/customerregistration.aspx" Width="275px" Font-Bold="True"
Font-Size="Large" ForeColor="#003366"> New Registration</asp:HyperLink>
</em></strong></span>
</td>
</tr>
<tr>
<td>
</td>
<td>
</td>
</tr>
</table>
<br />
50
&nbs
p;
</div>
<div class="cleaner"></div>
</div>
</asp:Content>
registration.aspx
<%@ Page Title="" Language="C#" MasterPageFile="~/generalzone.master" AutoEventWireup="true"
CodeFile="customerregistration.aspx.cs" Inherits="customerregistration" %>
<div class="cleaner"></div>
</div>
<div class="col_w260">
<center>
<table style="width:500px; height: 186px;">
<tr>
<td>
User id</td>
<td>
<asp:TextBox ID="TextBox1" runat="server" Width="170px"
placeholder="enter customer id" BackColor="White"></asp:TextBox>
</td>
<td>
<asp:RequiredFieldValidator ID="RequiredFieldValidator1" runat="server"
ControlToValidate="TextBox1" ErrorMessage="*"
ForeColor="Red"></asp:RequiredFieldValidator>
</td>
</tr>
<tr>
<td>
Name</td>
<td>
<asp:TextBox ID="TextBox2" runat="server" Width="170px"
placeholder="enter your name"/></asp:TextBox>
</td>
<td>
<asp:RequiredFieldValidator ID="RequiredFieldValidator2" runat="server"
ControlToValidate="TextBox2" ErrorMessage="*"
ForeColor="Red"></asp:RequiredFieldValidator>
</td>
</tr>
<tr>
<td>
Password</td>
<td>
<asp:TextBox ID="TextBox3" runat="server" Width="170px"
51
placeholder="enter your password"></asp:TextBox>
<td>
<asp:CompareValidator ID="CompareValidator1" runat="server"
ControlToCompare="TextBox3" ControlToValidate="TextBox4"
ErrorMessage="*Password not match" ForeColor="Red"></asp:CompareValidator>
</td>
</tr>
<tr>
<td>
Confirm Password</td>
<td>
<asp:TextBox ID="TextBox4" runat="server" Width="170px"
placeholder="re-enter password"></asp:TextBox>
</td>
<td></td>
</tr>
<tr>
<td>
Sex</td>
<td>
<asp:RadioButton ID="RadioButton1" runat="server" Text="Male" />
<asp:RadioButton ID="RadioButton2" runat="server" Text="Female" />
</td>
<td></td>
</tr>
<tr>
<td class="style1">
Category</td>
<td class="style1">
<asp:DropDownList ID="DropDownList1" runat="server">
<asp:ListItem>General</asp:ListItem>
<asp:ListItem>OBC</asp:ListItem>
<asp:ListItem>SC/ST</asp:ListItem>
</asp:DropDownList>
</td>
</tr>
<tr>
<td>
Date of birth</td>
<td>
<input placeholder="dd/mm/yyyy"></asp:TextBox> </td>
</tr>
<tr>
<td>
Email Id</td>
<td>
<asp:TextBox ID="TextBox5" placeholder="enter mail id"
runat="server"></asp:TextBox>
</td>
<td>
<asp:RequiredFieldValidator ID="RequiredFieldValidator3" runat="server"
ControlToValidate="TextBox5" ErrorMessage="*"
ForeColor="Red"></asp:RequiredFieldValidator>
<asp:RegularExpressionValidator ID="RegularExpressionValidator1" runat="server"
ControlToValidate="TextBox5" ErrorMessage="Invalid Email Id" ForeColor="Red"
ValidationExpression="\w+([-+.']\w+)*@\w+([-.]\w+)*\.\w+([-
.]\w+)*"></asp:RegularExpressionValidator>
</td>
</tr>
<tr>
<td>
Contact No.</td>
<td>
<asp:TextBox ID="TextBox6" placeholder="enter contact number"
runat="server"></asp:TextBox>
</td>
<td>
<asp:RequiredFieldValidator ID="RequiredFieldValidator4" runat="server"
52
ControlToValidate="TextBox6" ErrorMessage="*"
ForeColor="Red"></asp:RequiredFieldValidator>
</td>
</tr>
<tr>
<td>
Address</td>
<td>
<asp:TextBox ID="TextBox7" placeholder="enter address" runat="server"
TextMode="MultiLine"></asp:TextBox>
</td>
<td>
<asp:RequiredFieldValidator ID="RequiredFieldValidator9" runat="server"
ControlToValidate="TextBox7" ErrorMessage="*"
ForeColor="Red"></asp:RequiredFieldValidator>
</td>
</tr>
<tr>
<td>
City</td>
<td>
<asp:TextBox ID="TextBox8" placeholder="enter name of city"
runat="server"></asp:TextBox>
</td>
<td>
<asp:RequiredFieldValidator ID="RequiredFieldValidator5" runat="server"
ControlToValidate="TextBox8" ErrorMessage="*"
ForeColor="Red"></asp:RequiredFieldValidator>
</td>
</tr>
<tr>
<td>
Pincode</td>
<td>
<asp:TextBox ID="TextBox9" placeholder="pincode of your city"
runat="server"></asp:TextBox>
</td>
<td>
<asp:RequiredFieldValidator ID="RequiredFieldValidator6" runat="server"
ControlToValidate="TextBox9" ErrorMessage="*"
ForeColor="Red"></asp:RequiredFieldValidator>
</td>
</tr>
<tr>
<td>
State</td>
<td>
<asp:TextBox ID="TextBox10" placeholder="enter name of state"
runat="server"></asp:TextBox>
</td>
<td>
<asp:RequiredFieldValidator ID="RequiredFieldValidator7" runat="server"
ControlToValidate="TextBox10" ErrorMessage="*"
ForeColor="Red"></asp:RequiredFieldValidator>
</td>
</tr>
<tr>
<td>
Country</td>
<td>
<asp:TextBox ID="TextBox11" placeholder="enter country name"
runat="server"></asp:TextBox>
</td>
<td>
<asp:RequiredFieldValidator ID="RequiredFieldValidator8" runat="server"
ControlToValidate="TextBox11" ErrorMessage="*"
ForeColor="Red"></asp:RequiredFieldValidator>
</td>
</tr>
<tr>
53
<td>
Religion</td>
<td>
<asp:DropDownList ID="DropDownList2" runat="server">
<asp:ListItem>--Select--</asp:ListItem>
<asp:ListItem>Hindu</asp:ListItem>
<asp:ListItem>Muslim</asp:ListItem>
<asp:ListItem>Sikh</asp:ListItem>
<asp:ListItem>Christan</asp:ListItem>
</asp:DropDownList>
</td>
</tr>
<tr>
<td>
</td>
<td>
</td>
</tr>
<tr>
<td>
<asp:Button ID="Button1" runat="server" Text="Submit" />
</td>
<td>
<asp:Button ID="Button2" runat="server" onclick="Button2_Click" Text="Clear" />
</td>
<td>
<asp:Button ID="Button3" runat="server" Text="Back" />
</td>
</tr>
</table>
</center>
<br />
&nbs
p;
</div>
<div class="cleaner"></div>
</div>
</asp:Content>
forgetpswrd.aspx
<%@ Page Title="" Language="C#" MasterPageFile="~/generalzone.master" AutoEventWireup="true"
CodeFile="forgetpswrd.aspx.cs" Inherits="forgetpswrd" %>
54
</td>
<td>
<asp:RequiredFieldValidator
ID="RequiredFieldValidator1" runat="server" ControlToValidate="TextBox1"
ErrorMessage="*" Font-Bold="True" ForeColor="Red"></asp:RequiredFieldValidator>
</td>
</tr> <tr>
<td> </td>
<td> </td>
<td> </td>
</tr> <tr>
<td>Email id</td>
<td>
<asp:TextBox ID="TextBox2" runat="server" placeholder="enter email id"></asp:TextBox>
</td>
<td>
<asp:RequiredFieldValidator ID="RequiredFieldValidator2" runat="server"
ControlToValidate="TextBox2" ErrorMessage="*" Font-Bold="True"
ForeColor="Red"></asp:RequiredFieldValidator>
<asp:RegularExpressionValidator ID="RegularExpressionValidator1" runat="server"
ControlToValidate="TextBox2" ErrorMessage="Invalid Email"
ValidationExpression="\w+([-+.']\w+)*@\w+([-.]\w+)*\.\w+([-
.]\w+)*"></asp:RegularExpressionValidator>
</td>
</tr>
<tr>
<td> </td>
<td> </td>
<td> </td>
</tr> <tr>
<td></td>
<td>
<asp:Button ID="Button1" runat="server" Text="Submit" />
</td>
<td></td>
</tr>
</table>
</div>
<div class="cleaner"></div>
</div>
</asp:Content>
Upload Data.aspx
<%@ Page Title="" Language="C#" MasterPageFile="~/generalzone.master" AutoEventWireup="true"
CodeFile="Upload.aspx.cs" Inherits="career" %>
55
<br/> <h2 > Upload</h2>
<div class="cleaner"></div>
</div>
<div class="style1">
Upload Files ( Books, Project, Presentation,<br />
Rearch Paper, Video lectures..... )</div>
<div class="col_w260_r">
56
<asp:FileUpload ID="FileUpload1" runat="server" Width="199px" />
</td>
<td>
<asp:RequiredFieldValidator ID="RequiredFieldValidator5" runat="server"
ControlToValidate="FileUpload1" ErrorMessage="*"
ForeColor="Red"></asp:RequiredFieldValidator>
</td>
</tr>
<tr>
<td>
</td>
<td>
</td>
</tr>
<tr>
<td>
</td>
<td>
<asp:Button ID="Button1" runat="server" Text="Submit" />
</td>
</tr>
</table>
<br />
&nbs
p;
</div>
<div class="cleaner"></div>
</div>
</asp:Content>
Books.aspx
<%@ Page Title="" Language="C#" MasterPageFile="~/generalzone.master" AutoEventWireup="true"
CodeFile="Books.aspx.cs" Inherits="products" %>
<div class="cleaner">
<br />
</div>
</div>
57
<br />
.
</div>
<div class="cleaner"></div>
</div>
</asp:Content>
VALIDATION CHECKS
Validation checks
Validation refers to a set of activities that ensure that software that has been built is traceable to
customer requirements. Validation can be defined in many ways, but a simple definition is that
validation succeeds when software functions in a manner that can be reasonably expected by the
customer. Validation checks specify the limit of the software up to which software is valid also
validation checks controls the security of the software. In this application I have used ASP.Net
Custom validation
Compare validator
Range validator
1. If user does not give any value in password field or username field it will show
58
2. Login form is case sensitive if user enters their name or password in wrong
3. If user enter primary key attribute that exist already in database then application
Id.
4. When user use Edit Command Button, if he/she not enter primary key attribute
IMPLEMENTATION
Introduction: -
A crucial phase in then systems life cycle is the successful implementation of the new system design.
Implementation means converting a new system design into operation. This creating computer-compatible files,
training the operating staff before the system is up and running. A major factor in conversion is not disrupting the
functioning of the organization.
The implementation phase of software development is also concerned with translating design
specification into source code. It is necessary to write source code and internal and documentation so
that conformance of the code to its specification can be easily verified, and so that debugging, testing
and modification are eased. This can be achieved by making the source code as clear and straight
forward as possible. The implementation team should therefore be provided with-defined set of
software requirements, an architectural design specification and a detailed design description.
User training is another important area, which is responsible for minimizing resistance to change and
giving the new system a chance to provide its worth. Training aids, such as user-friendly manuals, data
dictionary, and jobs performance aids that communication information about the new system; help-
screens provide the user with a good start on the new system.
59
Following conversion, it is desirable to review the performance of the system and to evaluate it
against established criteria. Software maintenance follows conversion, which includes minor
enhancements or corrections to problems that surface late in the system's operating.
Conversion:
The objective of conversion is to put the system into operation while holding costs, risks and
personal problems to a minimum. It involves three major steps:
Creating computer-compatible files
Training the operating staff
Installing hardware/software
Procedure and documents are unique to the conversion phase. These are shown below:
Conversion begins with a review of the project plan, the system test documentation, and the
implementation plan. The parties involved are the user, the project team, programmers, and operators.
The conversion portion of the implementation plan is finalized and approved.
Files are converted.
Parallel processing between the existing and the new systems is initiated.
Results of computer runs and operators for the new system are logged on a special form.
Assuming no problems, parallel processing is discounted. Implementation results are
documented for reference.
Conversion is completed. Plans for the post-implementation review are prepared. Following
the review, the new subsystem is officially operational.
60
MAINTENANCE
Software maintenance is used to describe the software engineering activities that occur
following delivery of a software product to the customer
Activities involved in maintenance of a software product include:
Analysis activities
Standards and guidelines
Design activities
Implementation activities
Supporting documents
Configuration management is concerned with tracking and controlling of the work product
that constitute a software product
Configuration management tools include
Configuration management data bases
Version control libraries
Automated tools to support software maintenance include technical support tools and
managerial support tools
Other automated tools include
Text editor
Debugging aids
Linkage editor
Computer Maintenance covers a wide range of activities. Many activities performed during
development of Airlines Reservation System for Global Airways to enhance the maintainability of it are
as follows---
o Analysis Activities The analysis phase of software development is concerned with determining
customer requirements and constraints, and establishing feasibility of the product. From
maintenance view point, the most important activities that occur during analysis are
establishing standards and guidelines for the project and the work products to ensure
uniformity of the products; setting of milestones to ensured that the work products are produce
on schedule; specifying quality assurance procedures to ensure development of high quality
documents; identifying product enhancements that will most likely occur following initial
61
delivery of the system; and estimating the resources( personnel, equipment, floor space)
required to perform the maintenance activities.
o Standards and Guidelines various types of standards and guidelines we developed to enhance
the maintainability of our software.
o Design Activities Design is concerned with developing the functional components, conceptual
data structures and interconnection in a software system. The most important activity for
enhancing maintainability during the design.
Text editor permits rapid, efficient modification of source programs, test data and supporting
documents. Text editors can be used to insert and replace segments of source code, internal comments,
test data and supporting documents; to systematically change all occurrences of an identifier or other
textual strings to locate all references to a given identifier or other string of text; and to save both old
and new versions of a routine, test file or document. A syntax-directed text editor can ensure that all
cross-references in text editor can ensure that all cross-references in the supporting documents are
correctly updated.
Debugging aids provide traps, dumps, and traces assertion checking and history file
aid in locating the causes of known errors. System-level-cross-reference generators provide
cross-reference listings for procedure calls, statements usage and data references. Cross-
references directories provide the calling structures of who calls whom and from where,
and procedures names and statement numbers where formal parameters local variables
and global variables are defined, set and used.
62
As we already know maintenance of the software is an important part of using it. Thus various
maintenance procedures have to be followed.
Software testing is a critical element of software quality assurance and represents the ultimate review of
specification, design and coding testing requires that the developer discard preconceived notions of the
correctness of software just developed and overcome a conflict of interest that occurs when errors are
uncovered.
Testing is a process of executing a program care is one that have a high probability of finding an
as yet undiscovered error. A successful test is one that uncovers an as-yet undiscovered error.
Testing is the necessary part of the project the various methods are used for testing the
software. The new look to the project is giving by the perfect testing. I prefer the black box testing
method. Black - box testing , focuses on the functional requirements of the software. That is black - box
testing enables the software engineer to derive sets of input conditions that will fully exercise all
functional requirements for a program. Black - box testing is not an alternative to white - box techniques
Rather, it is a complementary approach that is likely to uncover a different class of errors than white -
box methods.
Firstly, test the incorrect or missing function in the project design, testing all modules and their
dependent modules such as for new care, detail of old care, forwarding of case reminder of case and
disposal of case.
63
Secondly, test the interface of the software. The input and output of the project also depends
upon the interface use, so that all links should be display accordingly.
Thirdly, testing on the data that are use, it should be properly fitted. The connectivity should
be proper.
Fourthly, the performance error, testing is also done on the performance error, checking the
Finally, testing on the idealization and termination error, test the proper loading of the input
Unlike white - box testing, which is performed early in the testing process, black- box testing
tender to be applied during later stages of testing. Because black - box testing purposely disregards
By applying black box techniques, we derive a set of test cares that satisfy the following criteria
(1) Test cares that reduce, by a count that is greater that one, the number of additional test cares
(2) Test cares that tell use something about the presence or absence of classes of errors rather then
64
System Security measures
(Implementation of security for the projects developed)
Database/data security
Security Mechanisms
Security is very much required to prevent unauthorized access and malicious
practices. In this proposed Website I have created the Security system using ASP .NET
65
Role Management
to specify which resources various users in your application are allowed to access.
A PERT chart is a graph-based chart. It can be used to determine the activities that from the critical
path, which if delayed will cause the overall project to delay. The PERT chart for the project is:
PERT Chart
Fact finding 15 5 10 3
Analysis 25 3 15 5
Designing 20 5 20 5
Testing 20 5 20 5
Maintenance 10 2 10 2
Coding 35 10 32 10
66
A GANTT chart uses a calendar-oriented chart to represent the project schedule. Each activity is
represented as a bar in the calendar, starting from the start date of the activity and ending at the
ending date for that activity. The start and end of each activity becomes milestone=s for the
GANTT Chart
35
30
25
20 Old Project
15 New Project
10
0
Fact finding Analysis Designing Testing Maintenance Coding
67
FUTURE SCOPE
As the technology is developing at a fast pace, Internet has been seen providing to be most
helpful infrastructure for cooperate the staff and customer.
This project can be use on Internet. In future this project can be totally implemented on the Internet
Back bone.
Further we can add payment by credit card. Further it can also be helpful in various Ares such as salary
E-commerces, Online exam, E-books & Project.
Different security measures can be implemented to secure use of services.
By accessing many more services provided by different service providers, this E-Learning project can be
enriched by adding more features.
68
BIBLIOGRAPHY
Programming ASP.NET 3.5 by Jesse Liberty, Dan Maharry, Dan Hurwitz
Beginning ASP.NET 3.5 in C# 2008: From Novice to Professional, Second Edition by Matthew
MacDonald
Microsoft .NET: Architecting Applications for the Enterprise by Dino Esposito, Andrea Saltarello
69
A
PROJECT SYNOPISIS
Session 2015-2016
70
2. PROFORMA FOR APPROVAL OF SYNOPSIS REPORT (NMCA452)
1. Roll No
3. E-mail: - pradeepbaberu@gmail.com
Date:
71
ACKNOWLEDGEMENT
I am very grateful to my Mini Project (452) Mentor Dr. Ashish Avasthi for
Synopsis. It would not have been possible to complete this Mini Project
(452) in short period of time without his kind encouragement and valuable
guidance.
Date:
Signature
Pradeep Kumar
72
INDEX
Sl. No.
(1) Introduction
(7) Applications
(10) Conclusion
(11) References
INTRODUCTION
73
E-Learningis the computer and network enabled transfer of skills and knowledge.
It includes out-of classroom & in-classroom educational experiences via
technology. E-
Learning is naturally suited to distance learning and flexible learning. It is
available anywhere, anytime. It is a self paced interactive instructive presented
over the Internet to browser equipped learners. The E-Learning solution is
empowering, engaging, effective and economical.
Early E-Learning systems, based on computer based learning (CBL) & training
often attempted to replicate autocratic teaching styles whereby the role of the e-
Learning systems was to transfer knowledge, as opposed to the systems
developed later which were based on computer supportive collaborative learning
(CSCL) which ncouraged the shared development of knowledge. Nowadays, it is
an increasing trend to create virtual learning environment (VLE).The courses
offered by the environment is interactive.
Many employers and learners cannot afford time to a class. Travelling itself
makes the learning process expensive & disruptive. E-Learning is revolutionizing
the learning world by eradicating the geographical boundaries. The resources are
available 24*7 a week, and any computer enabled with Internet facility can use
the system.
E-Learning ranges over a number of subjects & has a number of features
74
Justification of language and platform used
2) Hardware:
Pentium 4
256 MB RAM
1 GB HDD
DFD Level 1 :
76
ADMINISTRATOR
77
Teacher
78
79
Database Tables
Table name:-Regs
80
Table Name:- Upload Files
Applications
81
Limitation of the Project
While designing this project, all the required services are created and then
implemented in the main E-Learning project. But in reality, while a project is
designed using SOA then all the required services are provided by service
providers and the company designing the project uses those services according to
some kind of deals with those service providers.
There is no service directory which contains all available services, in this project
and it is assumed that all the available services are known in advance.
Service securities are not implemented and thats why anybody can use all
services, whichis not the case in real SOA implementation.
82
Future scope and improvements
A dealing technique (online payment etc.) i.e., how a company can deal
with the service providers can be designed and then the designed services
can be used by service providers.
83
Conclusion
Implementing the services for the building of the system provides a cleaner
approach.
Each service is associated with one or more functions and the WebPages utilizes
these function. The services allows the most important aspect of coding i.e.
Reuse.
For a developing country like India, this online learning process is a new aspect.
India is now progressing towards E-Governance and education is one of those
important fields that will come under E-Governance. Proper steps like this ensure
a brighter future.
84
References
[4 Introduction to ADO.NET,
http://en.wikipedia.org/wiki/ADO.NET
85