Você está na página 1de 85

A

MINI PROJECT REPORT ON


( NMCA452)

E-LEARNING RESOURCE LOCATOR

SUBMITTED TO

DR. A.P.J. ABDUL KALAM TECHNICAL UNIVERSITY, LUCKNOW (U.P.)

FOR THE PARTIAL FULFILLMENT OF THE DEGREE OF MASTER

IN COMPUTER APPLICATION SESSION 2015-2016

Under the Guidance of: Submitted by:


Dr. Ashish Awasthi Pradeep Kumar
Asstt. Professor

1
2. PROFORMA FOR APPROVAL OF MCA MINI PROJECT (NMCA452)

1. Roll No.

2. Name of the student - Pradeep Kumar

3. E-mail: - pradeepbaberu@gmail.com

4. Mob. No. - 9795033518

5. Title of the Mini Project (NMCA 452) - E-LEARNING RESOURCE LOCATOR

6. Name of the Mentor - Dr. Ashish Avasthi

For Office Use Only:

Signature of the Mentor

Approved Not Approved

Date:

Suggestions (if any) :-

2
INDEX
1. Title page 1

2. Approval Format. 2

3. Index ... 3

4. Acknowledgement. 5

5. Certificate of originality.. 6

6. Introduction/Objective.. 7

(i). IT Technology ..... 7

(ii) Need for E-learning 9

(iv) Types of e- learning 10

(iii) Benefits of E-learning 11

(iv) Conclusion .. 12

(v) Objective 12

7. System Analysis. 12

8. Feasibility Study 15

9. Analysis 18

10. FDD/Software Engineering Model. 23

11. SRS 25

12. System Design. 29

13. Screenshots... 36

14. Coding. 42

15. Validation Checks 58

16. Implementation and Maintenance. 59

3
17. Testing 63

18. System Security 65

19. Pert and Gantt Chart.66

20. Future Scope 68

21. Bibliography... 69

22. Approved synopsis 70-85

4
ACKNOWLEDGEMENT

I am very grateful to my Mini Project (452) Mentor Dr. Ashish Avasthi for

giving his valuable time and constructive guidance in preparing the Mini

Project (452). It would not have been possible to complete this Mini Project

(452) in short period of time without his kind encouragement and valuable

guidance.

Date:

Signature

Name of the Student

Pradeep Kumar

5
CERTIFICATE OF ORIGINALITY

I hereby declare that my Mini Project (452) titled E-LEARNING RESOURCE

LOCATOR submitted to DR. A.P.J. KALAM TECHNICAL

UNIVERSITY,LUCKNOW(U.P.) for the partial fulfillment of the degree of Master In

Computer Application Session 2015-2016 from Shri Ramswaroop Memorial Group of

Professional Colleges , Lucknow has not previously formed the basis for the award of

any other degree, diploma or other title.

Place: Lucknow

Date:

Signature

Name of the Student

Pradeep Kumar

6
INTRODUCTION-

E-Learningis the computer and network enabled transfer of skills and knowledge. It includes out-
of classroom & in-classroom educational experiences via technology. E-Learning is naturally
suited to distance learning and flexible learning. It is available anywhere, anytime. It is a self
paced interactive instructive presented over the Internet to browser equipped learners. The E-
Learning solution is empowering, engaging, effective and economical.

Early E-Learning systems, based on computer based learning (CBL) & training often attempted
to replicate autocratic teaching styles whereby the role of the e-Learning systems was to transfer
knowledge, as opposed to the systems developed later which were based on computer supportive
collaborative learning (CSCL) which ncouraged the shared development of knowledge.
Nowadays, it is an increasing trend to create virtual learning environment (VLE).The courses
offered by the environment is interactive.

Why e-learning is the most effective solution?


Many employers and learners cannot afford time to a class. Travelling itself makes the learning

process expensive & disruptive. E-Learning is revolutionizing the learning world by eradicating

the geographical boundaries. The resources are available 24*7 a week, and any computer

enabled with Internet facility can use the system.

Information Technology (IT):-


Look where we are heading. Technology is everywhere it is important to stay on top of
it. It gives us good head start. IT is really looking closely at whats out there now and makes sure
that we get exposed to it.
Heather Smith

7
Information technology refers to the collection of tools that make it easier to use, create, manage
and exchange information. The Internet is the latest of a long series of information technologies,
which includes printing, mail, radio, television and the telephone.
Information technology (IT) as define by information technology association of America
(ITAA) is the study, design, development, implementation, support or management of computer
based information system, particularly S/W applications and computer hardware. IT deals with
the use of the electronics computers and computers software to convert, store, protect, process,
transmit and securely retrieve information.
Today, the term information technology has ballooned to encompass many aspects of
computing and technology, and the term has become very recognizable. The information
technology umbrella can be quite large, covering many fields. IT professionals perform a variety
of duties that range from installing applications to designing complex computer networks and
information databases. A few of the duties that IT professionals perform may include data
management, networking, engineering computer hardware, database and software design, as well
as the management and administration of entire systems.
When computer and communications technologies are combined, the result is
information technology, or "InfoTech". Information Technology (IT) is a general term that
describes any technology that helps to produce, manipulate, store, communicate, and/or
disseminate information. Presumably, when speaking of Information Technology (IT) as a
whole, it is noted that the use of computers and information are associated.

Five pillar of IT:-


This role of users advocate is diverse and multifaceted. In order to make things work for
people in todays (and tomorrows) sophisticated computing environment, information
technologies need core competencies in five essential areas , which have emerged in the IT
model curriculum from SIGITE as pillars of it:
1. Programming and application development.
2. Web and multimedia contained development, which we refer to as interactive media.
3. Database management system and enterprise application development.
4. Networking and system administration, which include the design, deployment and
security of computing infrastructure.

8
5. User centered design and deployment, including need assessment, human computer
interaction, technology transfer, and on going support.

Information Technology and its Components


Induction of IT as a strategic tool for agricultural development and welfare of rural India
requires that the necessary IT infrastructure is in place. The rapid changes and downward trend
in prices in various components of IT makes it feasible to target at a large scale IT penetration
into rural India. Some of the broad factors to be noted with respect to various components of IT
are listed below:
Radical improvements are witnessed with respect to the means of Communication by human
beings with computers such as key boards, mouse devices, and scanners. The advent of touch
screen monitors that allow users to give input to computers by touching on the appropriate
location of the monitor has made it possible to develop user-friendly interface for farmers which
is easy, intuitive, circumvents language barrier and at the same time provides a relaxed
environment to the users. The present day digital cameras make it possible to capture and store
good quality graphics and large video clips. The small size and low weight of these digital
cameras, which are increasingly becoming affordable, open up the possibilities of providing
computer based demonstration clips to educate the farmers. The digital cameras can also be used
to upload plant stress related images, movie.

Need for E-learning

New values:- In the old days, corporate value and value creation were defined principally
through material and financial assets. Nowadays a premium is put on intellectual capital. To
retain their competitive edge, organizations have started to investigate which training
techniques and delivery methods enhance motivation, performance, collaboration,
innovation, and a commitment to life-long learning.

New technologies:- The life of knowledge and human skills today is shorter than ever,
mounting the pressure to remain up to date with ones education and training throughout a
career. In the age of globalization and technological revolution, four-year degrees are just the
start of a forty-year continuing education. Life-long learning is quickly becoming an
imperative in todays world.

Competitive Edge:- Corporations view learning as a competitive weapon rather than a


bothersome cost factor. Business success depends increasingly on top-quality employee

9
performance, which in turn requires top-quality training. Corporate executives now
understand that developing employee skills is the key to creating a sustainable competitive
lead.

Cost Effective:- In the run to remain competitive in todays labor-tight market, companies
are exploiting advances in technology to train employees rapidly, effectively, and at less
expense.

Globalization:- As trade borders become less significant, global competition intensifies.


International expansion has led to larger and more complex corporations. Todays businesses
have more locations in different countries and employ larger numbers of workers with
diverse backgrounds and educational levels.

Abundance of information:- More information has to be delivered in increasingly bigger


organizations, testing internal planning, logistics, and distribution. Corporations worldwide
are now in search of more innovative and competent ways to deliver training to their
geographically dispersed workforce.

Types of e- learning

There are fundamentally two types of e-learning: synchronous training and asynchronous
training.

1. Synchronous, means "at the same time," involves interaction of participants with an
instructor via the Web in real time.

Synchronous Methods

Virtual classroom:- Virtual classroom duplicates the features of a real classroom online.
Participants interact with each other and instructors online .instant messaging, chat, audio and
video conferencing etc.

Blended Method:- Most companies prefer to use a mix of both synchronous and asynchronous
e-learning methods according to their requirement.

2. Asynchronous, which means "not at the same time," allows the participant to
complete the WBT at his own pace, without live interaction with the instructor. A new form of
learning known as blended learning is emerging. As the name suggests it is an amalgamation of
synchronous and asynchronous learning methods.

Asynchronous Methods

10
Embedded learning:- Embedded learning is information that is accessible on a self-help basis,
24/7. It can be delivered to the place of work, or to mobile learners. Electronic performance
support system (EPSS) is a type of embedded learning. The advantage is that embedded learning
offers learners the information they need whenever they need it.

Courses:- The clear advantage of a self-paced course is convenience. Participants can get the
training they need at any time. This can include just-in-time training where a participant gets
exactly the training he or she needs to perform a task.

Discussion groups:- A discussion group is a gathering of conversations that occur over time.
They are also called message boards, bulletin boards and discussion forums. Discussion groups
can be used to support a group of participants taking the same class or can be used to support
participants performing related tasks. A discussion group is a very competent way to supply
expert answers to a large group people. A single answer to a common question can help many.

Benefits of E-learning

Simple, Flexible Logistics:- After location, time is the greatest limitation on learning.
That goes for both the instructors and the students, each of whom has to be both
available and in alignment with the other for face-to-face instruction. By removing that
requirement, everyone involved can participate at a time, and for a duration, that suits
his or her schedules.
Immediate Results and Feedback:- Anyone who has graded papers knows it can get
tedious, and its time-consuming. Many of the most popular standardized tests, in fact,
still rely on evaluation techniques that slow results. Most online learning technologies
integrate online quizzes and other tools to more rapidly evaluate the pace of learning.
Better Retention:- With clever design, user experience, and multimedia, online
instruction can prove to be a richer and more effective learning experience than
traditional methods and channels.
Greater Access to Expertise:- In any country, there are only a handful of cities that can
claim among their residents the experts in every field of study. Take away the
limitations of geography, and expertise is free to travel almost anywhere. This
transformation allows information on highly specialized subjects to reach more people,
paving the way for advances in fields from telemedicine to non-profit charities.
The Most Up-to-Date Content at Much Lower Cost:- The sticker shock associated
with the textbook market is not news to anyone who has enrolled in even a single
college course. And yet, despite the cost, our knowledge of most subjects continues to
grow and evolve, making $200 textbooks unreliable with a few years, and eventually of
no use at all. The remote delivery of curriculum allows instructors to keep materials up-
to-date, and the lower costs over time remove what for some are insurmountable
obstacles to furthering their education.
A Better Fit for 21st-Century Businesses:- As companies become more globally
focused, co-workers are more likely to work in different places, if not on different
continents. Online learning can help prepare employees to excel in todays scattered,

11
virtual office. For those already working up the career ladder, online learning makes use
of resources and technologies already at their fingertips.

Conclusion
All in all e- learning is here to stay and only you can decide the degree of involvement in e-
learning your company may require and the best methods applicable to you and your
employees.

OBJECTIVE-

Basic objectives are to extend their reach to geographically scattered students, E-Learning
system reducing time in activities, centralized data handling and paperless online exam, books
with reduced manpower. Cost cutting, operational efficiency, consist view of data and
integration with other institutions are other factors. Main challenges are effectively sync internal
and external operations in such a manner that job can be finished within time limit and
integration with different agencies on an agreed upon common data format.

SYSTEM ANALYSIS
IDENTIFICATION OF NEED

The complete understanding of software requirements is essential to the success of a software

development effort. The requirements analysis task is a process of discovery, refinement modeling and

specification. The software scope initially established by the system engineer and refined during

software project planning is refined in detail. Modular of the required data, information and control

flow, and operational behavior are created. Alternative solution are analyzed and allocated to various

software elements.

Both developer and customer take an active role in requirements analysis and specification. The

customer attempts to reformulate a sometimes-nebulous concept of software function and

performance into concrete detail. The developer acts as interrogator consultant and problem solver.

12
Requirements analysis is a software engineering task that bridges the gap between system level

software allocation and software design.

Requirement analysis enabler the system engineer to specify software function and

performance indicate softwares interface with other system elements and establish constraints that

software must meet.

Software requirements analysis may be divided into five areas of effort:

(a) Problem recognition.

(b) Evaluation and synthesis

(c) Modeling

(d) Specification

(e) Review

Initially, the analyst studies the system specification and the software project plan. Problem

evaluation and solution synthesis is the next major area of effort for analysis. Upon evaluating current

problems and desired information (input and output) the analyst begins to synthesize one or more

solutions.

During the evaluation and solution synthesis activity, the analyst creates models of the system in

an effort to better understand data and control flow, functional processing and behavioral operation,

and information content. The model serves as a foundation for software design and as the basis for the

creation of a specification for the software.

PRELIMINARY INVESTIGATION
Present system is manual. The working of the organization May be described as:

13
All details of customer, product, sale, purchase, registration etc are maintained in registers. All

registrations are also maintained in registers. All Bills are manually created, and send at desired place for

further use. The daily-to-daily entries are also being manually.

Preliminary investigation took me to the Accounts room of Agency, where I came across the

current working process. Although the process of maintaining data is not a recorded one as such there

were no documents to be reviewed in order to determine efficacy of the current working process. So I

had to emphasize on the observation I made while in the office. In order to complement my onsite

observations I undertook a simple interview of office bearers. The results of which are broadly

catalogued below.

In concurrence with onsite observation I conducted some interviews. To get a closer look at

the present working culture and identify the problem domain I talked to some of office bearers. I

presented them with the following set of questions.

Questionnaire:

Some general questions-

1.Who is behind the request for this work?

2.Who will use the software?

3.Why do you want this software?

4.Can you show me the environment in which the software will be used?

5.What is your requirement?

6.What will be the economic benefit of a successful solution?

Other question about software-

1.What do you feel is the biggest bottleneck in your work?

Ans. The slow working process of the work due to high number of calculations.

14
2. What effect does it have on your work?

Ans. Usually it delays our work. As such we have to prepare ourselves 3 to 4 days beforehand to say the

least.

3. Are you always satisfied with your results?

Ans. No because it hardly leads to a conclusive result rather generating further queries. Also the bulk of

work sometimes forces us to limit our capabilities and skip through some material and information since

they may not be available.

The preliminary investigation gave me clear information about the ills plaguing
the present system.

FEASIBILITY STUDY
Before getting started on the new system it was important to determine the feasibility involved

in the developed system so that the new system development could be develops. Feasibility is the

determination of whether or not a project is not worth doing. The project followed in making this

determination is called a feasibility study. This type of study determines if a project can and should Be

Taken. Once it has been determined that project is feasible, the analyst can go ahead and the prepare

the project specification which finalizes project requirements.

Generally, feasibility studies are undertaken within tight time constraints and normally

culminate in a written and feasibility report.

The developed system is started after considering the main three types of feasibilities which are

discussed below: -

1)-Technical feasibility

2)-Operational feasibility

15
3)-Economic feasibility

TECHNICAL FEASIBILITY

As we know the technical feasibility is concerned with specifying equipment and software that

will successfully satisfy the user requirement. The technical needs of the system may vary considerably,

but might include:

The facility to produce outputs in a given time.

Response time under certain conditions.

Ability to process a certain volume of transaction at a particular speed.

Facility to communicate data to distinct location.

In examination technical feasibility, configuration of the system is given more importance than

the actual make of hardware. The configuration should give the complete picture about the systems

requirements: How many workstations are required, how these units are interconnected so that they

could operate and communicate smoothly.

ECONOMIC FEASIBILITY

Economic analysis is the most frequently used technique for evaluating the effectiveness of a

proposed system. More commonly known as cost/benefits analysis the procedure is to determine the

benefits and savings that are expected from a purposed system and compare with costs.

If benefits outweigh cost, a decision is taken to design and implement the system otherwise

further justification or alternative in the proposed system will have to be made if it is to have a chance

of being approved. This is an ongoing effort that improves in accuracy at each phase of the system life

cycle.

16
The analysis part also clears the doubt of economic problems could be possible in developing

the system. As already mentioned that the company has to just pay the developed software cost and

not other investment is needed at the time of implementation of the new system as the preliminary

requirement are already exist in the company.

Since the cost difference between the present system and the new proposed computerized system will

be large. Considering the fact that new system will require only one time monetary investment whereas

the present system keeps on adding to the cost in a daily basis. We can conclude that the breakeven

point will be reached

within a year, making this proposed computerized news management system economically feasible.

OPERATIONAL FEASIBILITY

Proposed projects are beneficial only if they can be turned into information system that will meet

the operating requirements of the organization. This test of feasibility asks if the system will work when

it developed and installed. Are there major barriers to implementation? Some of the important

questions that are useful to test the operational feasibility of a project are given below:

Is there sufficient support for the project from the implementation? From user? If the present

system is well liked and used to the extent that persons will not be able to see reasons for

change, there may be resistance.

Are current business methods acceptable to the user? If they are not, user may welcome a

change that will bring about a more operational and useful system.

Have the user been involved in the planning and development of the project? If they are

involved at the earliest stage of project development, the chances of resistance can be possibly

reduced.

Will the proposed system cause harm? Will it produce poorer result in any case or area? Will

the performance of staff member fall down after implementation?

17
Issue that appears to be quite minor at the early stage can grow into major problem after
implementation. Therefore, it is always advisable to consider operational aspects carefully. The
system is developed in keeping mind that it should be user friendly and easy to operate hence
the system is operational feasible.
ANALYSIS-

DFD-

A Data Flow Diagram (DFD) is a graphical representation of the "flow" of data through an Information
System. A data flow diagram can also be used for the visualization of Data Processing. It is common
practice for a designer to draw a context-level DFD first which shows the interaction between the system
and outside entities. This context-level DFD is then "exploded" to show more detail of the system being
modeled.

A DFD represents flow of data through a system. Data flow diagrams are commonly used during problem
analysis. It views a system as a function that transforms the input into desired output. A DFD shows
movement of data through the different transformations or processes in the system.

Dataflow diagrams can be used to provide the end user with a physical idea of where the data they input
ultimately has an effect upon the structure of the whole system from order to dispatch to restock how any
system is developed can be determined through a dataflow diagram. The appropriate register saved in
database and maintained by appropriate authorities.

Data Flow Diagram Notation

Function

File/Database

18
Input/output

Flow

DFD OF E-LEARNING

Level 0-

19
Level 1-

20
Entity Relationship Diagrams (ER-Diagrams):

An entity-relationship (ER) diagram is a specialized graphic that illustrates the interrelationships

between entities in a database. ER diagrams often use symbols to represent three different types

of information. Boxes are commonly used to represent entities. Diamonds are normally used to

represent relationships and ovals are used to represent attributes

An entity-relationship model (ERM) in software engineering is an abstract and

conceptual representation of data. Entity-relationship modeling is a relational schema database

modeling method, used to produce a type of conceptual schema or semantic data model of a

system, often a relational database, and its requirements in a top-down fashion.

Symbols used in this E-R Diagram:


Entity: Entity is a thing in the real world with an independent existence. An entity may be an

object with a physical existence such as person, car or employee. Entity symbol is as follows

Attribute: Attribute is a particular property that describes the entity. Attribute symbol is

Relationship: Relationship will be several implicit relationships among various entity types
whenever an attribute of one entity refers to another entity type some relationship exits.
Relationship symbol is:

21
Key attributes: An entity type usually has an attribute whose values are distinct for each
individual entity in the collection. Such an attribute is called key attribute. Key attribute symbol
is as follows:

-Table

- Primary Key

-Link

-Fields

-Relationship

-Data Flow

22
FUNCTIONAL DECOMPOSITION DIAGRAM

Table structure-
Column Name Data Type Allow Nulls
Username Varechar(10) Yes
Password Varechare(10) yes

23
SOFTWARE ENGINEERING MODEL

After getting detail of each section, whole process was re-evaluated and a proper design for the system

was brought into existence.

The activates are defined as follows:

1. Identification of the system or subsystems key Stakeholders

2.Determination of the stakeholders Win conditions

3. Negotiation of the stakeholders win conditions to reconcile them into a set of win-win conditions for

all concerned.

24
SYSTEM REQUIREMENTS SPECIFICATIONS-
SOFTWARE REQUIREMENT SPECIFICATION
The software requirements specification is produced at the culmination of the analysis task. The
function and performance allocated to software as part of system engineering are refined by
establishing a complete information description a detailed functional and behavioral description, a
indications of performance requirements and design constraints, appropriate validation criteria and
other data pertinent to requirements.
1. Introduction
a. Purpose
b. Scope
c. Definition, Acronyms, Abbreviations
d. References
e. Developers Responsibilities Overview
2. General Description
a. Product Functions Overview
b. User Characteristics
c. General Constraints
d. General Assumptions and Dependencies
3. Specific Requirements
a. Inputs and Outputs
b. Functional Requirements
c. External Interface Requirements
d. Performance Constraints
e. Design Constraints
(i) Software Constraints
(ii) Hardware Constraints
4. Validation and Criteria
a. Performance bounds
b. Classes of tests
c. Expected Software response
d. Special Considerations
5. Acceptance Criteria

25
1. INTRODUCTION: -
This is the requirements document for the project that will be used throughout the work. The system to
be developed is for front office and financial work of agency, based on the inputs given. This document
follows the IEEE standard for a requirement specification document, with some variations.
a). Purpose:
The purpose of this document is to describe the requirements of agency. It also
describes the interfaces for the system.
b). Scope:
This document is the only one that describes the requirements of the system. It is meant
for use by the developers and will be the basis for validating the final delivered system. Any
changes made to the requirements in the future have to go through a formal change approval
process. The developer is responsible for asking for clarifications, where necessary, and will not
make any alterations without the permission of the client.

c). Definitions, Acronyms, Abbreviations:


Not applicable.
d). References:
Not applicable.

e). Developers Responsibilities Overview:

The developer is responsible for

(i) developing the system,


(ii) installing the software on the clients hardware,
(iii) conducting any user training that might be needed for using the system, and
(iv) maintaining the system for a period of one year after installation.

2. GENERAL DESCRIPTION: -
a). Product Functions Overview:

In agency there is a counter for booking and various queries of the customers can
be solved with ease on one table. As the software provide all information customer,
registration etc provided by the agency.

26
b). User Characteristics:

The main users of this system will be the registration department and accounts
department, who are somewhat literate with computers and can use programs efficiently.

c). General Constraints:

The system should run on win 95 /98/2000 or above.

d). General Assumptions and Dependencies:

Not applicable.

3. Specific Requirements:

a). Inputs and Outputs:

The system has all the details regarding the sale, customer, employee, product, purchaseetc. The
system has several inputs in form of data entry and several outputs in form of bills, reports etc.
The forms under the heading General Entries are sale, salary, leave etc are maintained.
From one the bill is generated and the other helps in report generation. Here also, the customer gets the
desired registration and accordingly the bills and report are generated.
b). Functional Requirements:
It present description of each function required to solve the problem. A processing narrative is
provided for each function, design constraints are stated and justified, performance characteristics are
stated, and one or more diagrams are included to graphically represent the overall structure of the
software and interplay among software functions and other system elements under this topic, the
functional working of the various modules where give the complete picture for the data flow from one
location to other.

c). External Interface Requirements:


Only one user command is required. The file name must be prompted by the system in status
bar.
d). Performance Constraints:
The reports and bills should be printed in less than 1 minute.
e). Design Constraints:
The system is to run under the WINDOWS operating system.

27
4.Validation Criteria:
Probably the most important section of a software requirements specification is validation
Criteria. The specification of validation criteria acts as an implicit review of all other requirements. The
tests must be conducted to validate function, performance and constraints.
In this project I have try the various steps in testing the links and connectivity of the data
Directorate of public grievances takes up a grievances where it is satisfied that eh matter has not been
dealt with by the concerned SSA in a fair, just or objective manner or has been unduly delayed. It may
take up such a care for investigation, call for a report and or file from the concerned SSA and ask them
to reconsider the matter and to arrive at a fair decision in a time bound manner.

5. Acceptance Criteria:
Before accepting the system, the developer must demonstrate that the system works on the course data
for the last 4 semesters. The developer will have to show through test cases that all conditions are
satisfied.

SOFTWARE REQUIREMENT
SERVER REQUIREMENTS:-
Hardware Requirement:
HARDWARE RECOMMENDED SUFFICIENT
Processor Pentium 4 Pentium 3,Celeron
RAM 1 G.B. 512 MB
Hard disk Space 2.5 GB 2 GB
Monitor 17 15
Mouse and keyboard Multimedia Normal
Software Requirement:
USE OF THE SOFTWARE NAME OF THE SOFTWARE
For client side scripting Java Script
For Styles HTML,XML,CSS
For Creating database SQL Server 2008
Web Browser Netscape, IE 5.0/6.0,Mozilla
U I Design ASP .Net4.0

28
CLIENT REQUIREMENT:-
Web Browser :-IIS
Operating System :-Windows XP
Processor and RAM : - P3 or above and 126 M.B. RAM

SYSTEM DESIGN

1. Input Design:

When designing input, the objective is to ensure that the data that will be processed by the system
is collected and entered into the system efficiently, according to the specified requirements, and with the
minimum of errors. In description with the client, the designer will choose a method of input, which is
cost effective and acceptable to the end users. The process of input design, like output design, which was
described earlier, consists of four stages.
Firstly, identifying the inputs into the system, by listing the data flows on the required logical
data flow diagram which cross the system boundary on their way in
Then determining the content of these inputs by inspecting the data dictionary
Next choosing an appropriate input device to change the user's data into a form which can be
read and processed by the computer system
And finally completing the detailed design work involved in specifying forms, input screens and
other data collection documents.
Project development required complete analysis of system right from the scratch Analysis of
the system required great attention on big as well as minute transactions This required exhaustive study
of Manual management system. Manual system was divided in various sections, which were dealt
individually. Getting detail of each section was a tedious and a time consuming task. This involved
various meetings with head of each individual section. After getting detail of each section whole process
was re-evaluated and a proper design for the system was brought into existence. Design was discussed
with the Workshops Manager and was further improved by eliminating some loopholes. Designing
process is carried on very carefully as this serves as backbone for development of any software. Thus
synopsis of the package was prepared.
After Design phase attention was laid upon source code of the package.

29
Whole project was divided into small modules. Source code for each module was individually prepared
and tested both syntactically and logically (Modular Testing). In cases modules were further divided into
units and tested (Unit Testing). These units were merged to get modules and these modules were
further available for integration. This sort of testing comes under Integration Testing. Various tests were
conducted on the package to demonstrate that the system satisfies all the requirements stated in
requirements documentation. This is Acceptance Testing.
Phase 1 of the package has been prepared and is running successfully (Implementation).
Maintenance of the package would require further enhancement of the package as per

requirements of the company.

2. Data Base Modal Apply:


The data in a database is organized according to the data structure 'imposed' upon it by the
physical data model. The physical data model is normally produced during the physical data design stage
in the development life cycle and tailored specifically to the selected, or imposed, database type.
The rules regarding this implementation and its subsequent optimization will vary widely
according to the type of DBMS.
The Database Management Systems available today can be grouped into four types.
These are:
File Management Systems (FMS)
Hierarchical Databases (HDS)
Network Databases (NDS)
Relational Databases (RDBMS)- The relational database model resulted from an IBM-sponsored
research project by Dr. E.F.Codd. The relation model attempts to overcome some the failings of
the hierarchical and network database model, and provides easy-to-use and flexible data
structure.
The relational model includes data structure (table), operators that can be used to manage the
data in data structure, and some integrity rules that ensure that the data obeys the business
rules defined for the system.
The relational model is based on relational algebra concepts and theory and, in the early days,
used some of the same technology to describe the processing that could be performed on the
data structures For example, relational theory uses the words "relations" to mean tables,
"tuples" to mean rows, and "attributes" to mean columns in table

30
Relational database are the most common type of database management systems in use today.
Relational database includes Oracle, DB2, Ingress, Informix, Sybase, and SQL Server.
Another important concept in relational databases is that relationships between tables are not
hard-coded in the structure of the data that is there are no pointers in the data to relate one
table to another. This means that you can specify the relationships between two sets of data at
development time rather than when the tables are first created. This greatly improves the
flexibility of the database management system.
Relational Database Properties- A relational database management system (RDBMS) has the
following properties:
Represents data in the form of tables
Does not hard-code relationships between tables
Doesn't require the user to understand its physical implementation
Provides information about its contents and structure in system tables
Can be manipulated through SQL commands

Supports the concept of NULL values


In this project the database used is SQL.
Overview of SQL:
A relational database is an extremely simple way of thinking about and managing the data used in a
business. It is nothing more than a collection of tables of data.
A relational database management system such as SQL server gives you a way of doing
things in an understandable and reasonably uncompelled way. SQL server basically does three
things:

1. Lets you put data into it.


2. Keeps the data.
3. Lets you get the data out and work with it.
The information stored in SQL server is kept in tables. There are three major characteristics of the
tables.
Columns
Rows
Name

3. Tables of Information:

31
SQL stores information in tables. These tables have one or more columns. The columns
heading describe the kind of information kept in the column. The information is stored row
after row. Each unique set of data gets is own row.

Even though the tables are independent, we can easily see that they are related. A column in one table
is related to a column in the other table. This relationship is the basis for the name relational database.
This is the basic idea of a relational (sometimes called a relational model). Data is stored in tables. Tables
have columns, rows, and names. Tables can be related to each other if each has a column with a
common type of information.
The retrieval of data from a database can be faster with primary key. A primary key is a field that
uniquely identifies each record in a table is called a foreign key.
To cascade updating and deletion of related fields, we enforce the referential integrity. Whenever a
change is made to primary key.

When two tables have single common field, they are said to be 'related'. The types of relationships,
which the tables in SQL can have, are:
One to One
One to many
Many to One
Many to many
SQL server, objects can be defined as reusable software codes which are location independent
and perform a specific task on any application environment with little or no change to the code. SQL
products are based on a concept known as the Client/Server Technology. This concept involves
segregating the processing of an application between two systems. A client or front-end database
application also interacts with the database by requesting and receiving information from the
database server. It acts as an interface between the user and the database. Further, it also checks
for validation against the data entered by the user. The database server or backend is used to
manage the database tables optimally among multiple clients who concurrently request the server
for the same data. It also enforces data integrity across all client applications and controls database
access and controls database access and other security requirements.
SQL is a RDBMS and consists of a comprehensive set of application building and end-user
products, aimed at providing complete solutions. SQL applications are potable across a variety of
platforms and operating systems. It provides a flexible DBMS called SQL server for storage and
management of information used by all applications.

32
An object relational database management system (ORDBMS) extends the capabilities of the
RDBMS to support object-oriented concepts. We can use Oracle as an RDBMS or take advantage of
its object-oriented features. The information stored in SQL is kept in tables. The three major
characteristics of most tables are columns, rows and a name.
Tables can be related to each other if each has a column with a common type of information.
SQL avoids specialized, academic terminology in order to make the product more approachable.
A column may be called an attribute, a row may be called a tuple, and a table may be called an
entity.
SQL was the first company to release a product that used the English-based Structured Query
Language or SQL. This language allows end users to extract information themselves, without using a
systems group for every little report. Oracles query language has rules of grammar and syntax. SQL is an
astonishingly capable tool.
Some benefits of using SQL are:

Large Databases
Many Users (multiple user can work)
Portable
Backup & Recovery features
Security
Client/Server Support
Data entities & Key Fields
Entity & Attributes
Entity-
An entity is an object, place, person, concept, or activity about which an enterprises record
data.

Attribute-
An attribute is the characteristic property of an existing entity. The difference
between attribute type and attribute instance has to be understood.
4.Relationship Diagrams
A relationship is defined as "an association among entities". A relationship type is an association

of entity, while a relationship instance is an association of entity instances.

33
One-to-One
If in an entity there is a one field, which is not repeated, and another entity it is related and also
entered once is called One-to-One relationship.

One-to-Many (or Many-to-One)


In One-to-Many relationship in one table field is not repeated and in another table which is related to the first
table the field has to be repeated like in the current project in consumer master file consumer number is not
repeated and booking file there is repetitions of consumer number whenever consumer booked the refill.

Many-to-Many

In many to many relations ship both table can have repetitive data.

5. Screen Designs
The quality of screen design can have a direct impact on the performance of the users of the
system, and the designer needs to consider the format as well as the content of the screens on which
the dialogue, or interaction, between the user and the system is based. A number of features of screen
design are worth discussing here:
Text Must be easily readable. In addition to choosing an appropriate font and size for the
characters, readability can be improve by using lower and upper case letters, rather than the
approach some times adapted in screen design of using all upper case evenly
Space text, with an unjustified right margin is easier to read than right justified text, which has spaces of
varying sizes between the words. The use of concise phrase, familiar vocabulary and appropriate
abbreviations make it easier for the reader to understand the text. The most visible section of the screen
is the upper left-hand corner

And it is a good idea to locate important messages in this area. Again it is important that
The designers understand the characteristics of the in user in order to deliver quality products.
Beginners, who are usually looking at their fingers, will noticed error messages
Which appear on the button line on the screen, where as the top right corner of the screen is a more
appropriate location for experienced keyboard operators.
Color- another set of the design option is possible, in addition to those described above, if the
display is in color. Being in a different color to be rest or being enclosed in a colored box can highlight
text. Background colors can be changed or a design convention can be used in which different types of
information are displayed in different colors. The consistent use of colors on screens within the same

34
system is important, and the designer must be wary of using to many colors or creating lurid
combination as these will work against the effectiveness of the screen design.
Graphics can be used to good effect for displaying information, especially trends in numerical
data. They can be colored, solid, three-dimensional or animated, and the designer must decided on
what is appropriate to the purpose. Another use of graphics is as an integral part of the structure of the
dialogue-known as a graphical user interface (GUI).
Animation- although this is little used in screen design, it can be a powerful technique for attracting the
attention of the user, because the eye is always drawn to a moving object; to mark the position of an
object, for example, a blinking cursor can be used; or to communicate a message, a clock with a moving
hand , or an hourglass with moving sand, indicate to the user that they have to wait while some

processing is carried out by the machine.

35
Screenshots:-
Home Page

36
AboutUs

37
Login

38
Register

39
Forget Password

Uploads

40
Services

Books

41
CODING
Source Code
style.css
body {
margin: 0;
padding: 0;
color: #252525;
font-family: Tahoma, Geneva, sans-serif;
font-size: 12px;
line-height: 1.7em;
background-color: #ffffff;
background-image: url(images/generalbody.jpg);
background-repeat: repeat-x;
background-position: top
}
a, a:link, a:visited { color: #0099CC; font-weight: normal; text-decoration: none; }
a:hover { color: #009900; text-decoration: underline; }
p { margin: 0 0 10px 0; padding: 0; }
img { border: none; }
em { color: #000; font-weight: bold; font-style: normal }
h1, h2, h3, h4, h5, h6 { color: #2c93a6; font-weight: normal; }
h1 { font-size: 28px; margin: 0 0 20px 0; padding: 5px 0 }
h2 { font-size: 25px; margin: 0 0 15px 0; padding: 5px 0; }
h3 { font-size: 22px; margin: 0 0 15px; padding: 0; position:relative:-35px; }
h4 { font-size: 18px; margin: 0 0 15px; padding: 0; }
h5 { font-size: 16px; margin: 0 0 10px; padding: 0; }
h6 { font-size: 14px; margin: 0 0 5px; padding: 0; }
.cleaner { clear: both }
.h10 { height: 10px }
.h20 { height: 20px }
.h30 { height: 30px }
.h40 { height: 40px }
.h50 { height: 50px }
.h60 { height: 60px }
a.more { clear: both; display: block; width: 123px; height: 39px; line-height: 39px; font-size: 11px;
text-align: center; color: #333; font-weight: 700; background: url(images/generalmore.png) }
a.more:hover { text-decoration: none; color: #000; }
.float_l { float: left }
.float_r { float: right }
.image_wrapper { position: relative; display: block; width: 144px; height: 121px; }
.image_wrapper img { width: 130px; height: 107px; margin: 7px }
.image_wrapper span { position: absolute; top: 0; left: 0; width: 144px; height: 121px; background:
url(images/generalimage_frame.png) no-repeat }
.image_fl { float: left; margin: 3px 15px 0 0 }
.image_fr { float: right; margin: 3px 0 0 15px }
.tmo_list { margin: 20px 0 20px 20px; padding: 0; list-style: none }
.tmo_list li { margin: 0; padding: 0 0 0 30px; background: url(images/generallist.png) no-repeat scroll 0
7px }
#generaltop_wrapper {
width: 100%;
}
#generaltop {
width: 964px;
height: 361px;
margin: 0 auto;
background: url(images/generalwrapper.jpg) no-repeat top
}
#generalheader {
width: 964px;
height: 27px;
padding: 30px 0
}
#generalmiddle {
clear: both;
width: 964px;

42
height: 300px;
background: url(images/Master.png) no-repeat
}
#generalmenu {
width: 860px;
height: 33px;
padding: 8px 5px;
}
#generalmenu ul {
display: block;
float: left;
margin: 2px 0 0;
padding: 0;
list-style: none;
}
#generalmenu ul li {
padding: 0;
margin: 0;
display: inline;
}
#generalmenu ul li a {
float: left;
display: block;
width: 170px;
height: 27px;
padding: 3px 0 0;
margin-left: 1px;
font-size: 12px;
text-align: center;
text-decoration: none;
color: #333;
font-weight: 700;
outline: none;
}
#generalmenu ul li a:hover {
color: #000;
background-color:#E5E5E5;
}
#generalmain {
clear: both;
width: 960px;
padding: 30px 0;
margin: 0 auto
}
.col_w960 {clear: both; width: 960px; padding-bottom: 50px; margin-bottom: 30px; border-bottom: 1px solid
#ccc }
.col_w960_last { margin: 0; border: 0 }
.col_w600 { width: 600px; margin-top:-30px; }
.col_w450 { width: 450px }
.col_w300 { width: 300px; margin-right:-25px; margin-bottom:1px; margin-top:-55px; }
.col_w260_r { float: right; width: 280px; text-align:justify; }
.col_w260_l { float: left; width: 250px; padding-right:35px; border-right: 1px solid #ccc ; text-
align:justify;}
.col_allw300 { width: 300px; float: left; margin-right: 30px }
.col_w225 { float: left; width: 225px; margin-right: 20px; }
.col_w225_content { padding: 0 20px;
font-weight: 700;
}
.col_last { margin: 0 }
.content_box { padding-bottom: 30px; margin-bottom: 30px; border-bottom: 1px solid #ccc }
#generalfooter_wrapper_01 {
width: 100%;
background: #1c668b url(images/generalfooter_wrapper.jpg) repeat-x bottom;
}
#generalfooter_wrapper_02 {
width: 100%;
background: url(images/generalfooter.jpg) no-repeat bottom center;
}
#generalfooter {
width: 960px;

43
padding: 30px 0 50px;
margin: 0 auto;
color: #fff;
background: url(images/generalfooter.jpg) no-repeat bottom center
}
#generalfooter a { color: #fff; text-decoration: underline }
#generalfooter a:hover { color: #33FFFF; }
.tmo_footer_list { margin: 0; padding: 0; list-style: none }
.tmo_footer_list li { margin: 0; padding: 0 0 0 30px; background: url(images/generalfooter_list.png) no-
repeat scroll 0 7px }
.tmo_footer_list li a { color: #fff; text-decoration: underline }
#generalfooter h5 { display: block; width: 205px; height: 35px; line-height: 35px; padding-left: 20px;
color: #fff; background: url(images/generalfooter_header.png) no-repeat }

Home .aspx

<%@ Page Title="" Language="C#" MasterPageFile="~/generalzone.master" AutoEventWireup="true"


CodeFile="index.aspx.cs" Inherits="index" %>
<asp:Content ID="Content1" ContentPlaceHolderID="head" Runat="Server">
<style type="text/css">
.style1
{
text-align: justify;
}
</style>
</asp:Content>
<asp:Content ID="Content2" ContentPlaceHolderID="ContentPlaceHolder1" Runat="Server">
<div id="generalmain">
<div class="col_w600 float_l">
<div class="content_box">
<br/> <h2 > Home </h2>
<div class="cleaner"></div>
</div>
<div class="col_w260_l">
<p class="style1">
<span lang="EN-US"
style="mso-bidi-font-size: 13.0pt; font-family: &quot;Tahoma&quot;,&quot;sans-
serif&quot;; mso-fareast-font-family: &quot;Times New Roman&quot;">
E-Learningis the computer and network enabled transfer of skills and knowledge.
It includes out-of classroom &amp; in-classroom educational experiences via
technology.</span></p>
<p class="style1">
<span lang="EN-US"
style="mso-bidi-font-size: 13.0pt; font-family: &quot;Tahoma&quot;,&quot;sans-
serif&quot;; mso-fareast-font-family: &quot;Times New Roman&quot;">&nbsp;E-Learning
is naturally suited to distance learning and flexible learning. It is available
anywhere, anytime. It is a self paced interactive instructive presented over the
Internet to browser equipped learners. The E-Learning solution is empowering,
engaging, effective and economical.<o:p></o:p></span></p>
<p class="style1">
<span lang="EN-US"
style="mso-bidi-font-size: 13.0pt; font-family: &quot;Tahoma&quot;,&quot;sans-
serif&quot;; mso-fareast-font-family: &quot;Times New Roman&quot;">
Early E-Learning systems, based on computer based learning (CBL) &amp; training
often attempted to replicate autocratic teaching styles whereby the role of the
e-Learning systems was to transfer knowledge, as opposed to the systems
developed later which were based on computer supportive collaborative learning
(CSCL) which ncouraged the shared development of knowledge. Nowadays, it is an
increasing trend to create virtual learning environment (VLE).The courses
offered by the environment is interactive</span><span lang="EN-US"
style="mso-bidi-font-size: 13.0pt; font-family: &quot;Arial&quot;,&quot;sans-
serif&quot;; mso-fareast-font-family: &quot;Times New Roman&quot;">.<o:p></o:p></span></p>
</div>
<div class="col_w260_r">
<marquee direction="up" style="height:270px" onmouseover="this.stop()"
onmouseout="this.start()"><img src="images/marqueegeneralmaster.gif" />
Super-High Video Lecture <br /><br />

44
&bull; Demo Online Examination <br /><br />
&bull; Medium-High Capacity Range<br /><br />
&bull; Ultra-High Capacity upload books<br /><br />
&bull; Project Devloper System
</marquee>
</div>
<div class="cleaner"></div>
</div>
</asp:Content>

About Us.aspx
<%@ Page Title="" Language="C#" MasterPageFile="~/generalzone.master"
AutoEventWireup="true" CodeFile="aboutus.aspx.cs" Inherits="aboutus" %>

<asp:Content ID="Content1" ContentPlaceHolderID="head" Runat="Server">


</asp:Content>
<asp:Content ID="Content2" ContentPlaceHolderID="ContentPlaceHolder1" Runat="Server">
<div id="generalmain">

<div class="col_w600 float_l">


<div class="content_box">
<br/> <h2 > About us </h2>
<div class="cleaner"></div>
</div>
<div class="col_w260_l" style="width:520px">
<img src="images/genabt.jpg"align="right"/>
PRESENT e-Learning Systems has emerged as the leader in the&nbsp;&nbsp;&nbsp;
dynamic field of multimedia online medical education and social networking.
&nbsp;As
more and more continuing medical education moves from live venues to the
online
realm, PRESENT e-Learning Systems has developed many of the enabling
technologies to create high quality
<br />
effective educational programming.<br />
&nbsp;&nbsp;&nbsp; PRESENT e-Learning Systems has brought leaders in the field of
clinical
medicine together to create the worlds most comprehensive repository of
cutting
edge information and research for all those who care for patients.
&nbsp;These world
renowned clinicians and researchers have sought out PRESENT e-Learning
Systems
to provide professional teaching materials designed to improve the skills of
those professionals tasked with the care of patients.&nbsp;<br />
&nbsp;</div>
<div class="cleaner"></div>
</div>
</asp:Content>

Services.aspx
<%@ Page Title="" Language="C#" MasterPageFile="~/generalzone.master" AutoEventWireup="true"
CodeFile="index.aspx.cs" Inherits="index" %>
<asp:Content ID="Content1" ContentPlaceHolderID="head" Runat="Server">
<style type="text/css">
.style1
{
text-align: justify;
}
</style>

45
</asp:Content>
<asp:Content ID="Content2" ContentPlaceHolderID="ContentPlaceHolder1" Runat="Server">
<div id="generalmain">
<div class="col_w600 float_l">
<div class="content_box">
<br/> <h2 > Home </h2><div class="cleaner"></div></div>
<div class="col_w260_l"> <p class="style1"> <span lang="EN-US"
style="mso-bidi-font-size:13.0pt; font-family: &quot;Tahoma&quot;,&quot;sans-
serif&quot;; mso-fareast-font-family: &quot;Times New Roman&quot;">
E-Learningis the computer and network enabled transfer of skills and knowledge.
It includes out-of classroom &amp; in-classroom educational experiences via
technology.</span></p>
<p class="style1"> <span lang="EN-US" style="mso-bidi-font-size: 13.0pt; font-family:
&quot;Tahoma&quot;,&quot;sans-serif&quot;; mso-fareast-font-family: &quot;Times New Roman&quot;">&nbsp;E-
Learning
is naturally suited to distance learning and flexible learning. It is available
anywhere, anytime. It is a self paced interactive instructive presented over the
Internet to browser equipped learners. The E-Learning solution is empowering,
engaging, effective and economical.<o:p></o:p></span></p>
<p class="style1"> <span lang="EN-US" style="mso-bidi-font-size: 13.0pt; font-family:
&quot;Tahoma&quot;,&quot;sans-serif&quot;; mso-fareast-font-family: &quot;Times New Roman&quot;">
Early E-Learning systems, based on computer based learning (CBL) &amp; training
often attempted to replicate autocratic teaching styles whereby the role of the
e-Learning systems was to transfer knowledge, as opposed to the systems
developed later which were based on computer supportive collaborative learning
(CSCL) which ncouraged the shared development of knowledge. Nowadays, it is an
increasing trend to create virtual learning environment (VLE).The courses
offered by the environment is interactive</span><span lang="EN-US"
style="mso-bidi-font-size: 13.0pt; font-family: &quot;Arial&quot;,&quot;sans-
serif&quot;; mso-fareast-font-family: &quot;Times New Roman&quot;">.<o:p></o:p></span></p>
</div> <div class="col_w260_r">
<marquee direction="up" style="height:270px" onmouseover="this.stop()"
onmouseout="this.start()"><img src="images/marqueegeneralmaster.gif" />
Super-High Video Lecture <br /><br />
&bull; Demo Online Examination <br /><br />
&bull; Medium-High Capacity Range<br /><br />
&bull; Ultra-High Capacity upload books<br /><br />
&bull; Project Devloper System
</marquee>
</div><div class="cleaner"></div>
</div>
</asp:Content>

Services Overview.aspx

<%@ Page Title="" Language="C#" MasterPageFile="~/generalzone.master" AutoEventWireup="true"


CodeFile="Services Overview.aspx.cs" Inherits="products" %>
<asp:Content ID="Content1" ContentPlaceHolderID="head" Runat="Server">
<style type="text/css">
.style1
{
font-weight: normal;
}
.style2
{
font-size: small;
}
</style>
</asp:Content>
<asp:Content ID="Content2" ContentPlaceHolderID="ContentPlaceHolder1" Runat="Server">
<div id="generalmain">
<div class="col_w600 float_l">
<div class="content_box"><br/>
<h3>Our Services.....</h3>
<div class="cleaner"><br />
<span class="style2">&nbsp;&nbsp;&nbsp;</span>
<asp:HyperLink ID="HyperLink1" runat="server" NavigateUrl="~/Services.aspx"
CssClass="style2">Previous</asp:HyperLink>

46
<span class="style2">

&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbs
p;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&n
bsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbs
p;&nbsp;&nbsp;&nbsp;
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbs
p;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
&nbsp;&nbsp;&nbsp; </span>
<asp:HyperLink ID="HyperLink2" runat="server" CssClass="style2"
NavigateUrl="~/Customer Learning Solution.aspx">Next</asp:HyperLink>
</div></div>
<div class="col_w260_l" style="width:520px">
<img src="images/e-Services.gif" align="right"
style="margin-left:25px; height: 212px; width: 268px;"/>
<div class="col_w225_content"><p>
&nbsp;<a href="#"><strong><span class="style2">Services
Overview</span></strong></a></p>
<p class="style1">
<span style="font-size:8.5pt;line-height:115%;font-
family:&quot;Tahoma&quot;,&quot;sans-serif&quot;;
color:#252525">A global eLearning service provider with domain specific expertise in custom eLearning
solutions, enterprise learning, blended learning solutions, eLearning technology
&amp; learning support. In this world of fast-changing high-end technology,
learning
and training requirements have been evolving, blending across the organizations,
and undergoing minor &amp; major transformations overtime. Traditional approaches
have taken a back seat because eLearning offers complete flexibility by
providing the targeted learners with the freedom to choose the time, place, and
pace of study.<span style="mso-spacerun:yes">&nbsp; </span></span> </p>
<p class="style1">
<span style="font-size:8.5pt;line-height:115%;font-
family:&quot;Tahoma&quot;,&quot;sans-serif&quot;;
color:#252525"><span style="mso-spacerun:yes">W</span>e develop custom content for the eLearning
courses, hosts content on companion Websites, and employ latest technologies to
repurpose content to various formats. In addition, we also offer media
development and integration facilities. The approach employed in each phase of
content development is highly focused &amp; tailored to the individual &amp;
organizational needs.<o:p></o:p></span></p>
<p class="style1">
&nbsp;&nbsp;&nbsp;&nbsp; <span style="font-size:8.5pt;line-height:115%;font-
family:&quot;Tahoma&quot;,&quot;sans-serif&quot;;
color:#252525"><span style="mso-spacerun:yes">&nbsp;</span></span></p></div>
<div class="cleaner">
<br /><br /><br /><br />
</div></div>
</asp:Content>

Customer Learning Solution.aspx

<%@ Page Title="" Language="C#" MasterPageFile="~/generalzone.master" AutoEventWireup="true"


CodeFile="Learning Supports.aspx.cs" Inherits="products" %>
<asp:Content ID="Content1" ContentPlaceHolderID="head" Runat="Server">
<style type="text/css">
.style1
{
font-weight: normal;
}
.style2
{
font-size: small;
height: 38px;
width: 530px;
} </style></asp:Content>
<asp:Content ID="Content2" ContentPlaceHolderID="ContentPlaceHolder1" Runat="Server">
<div id="generalmain"><div class="col_w600 float_l"><div class="content_box"><br/>
<h3>Our Services.....</h3>

47
<div class="cleaner"><br />
<span class="style2">&nbsp;&nbsp;&nbsp; </span>
<asp:HyperLink ID="HyperLink1" runat="server" NavigateUrl="~/Services Overview.aspx"
CssClass="style2">Previous</asp:HyperLink>
<span class="style2">

&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbs
p;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&n
bsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbs
p;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&n
bsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; </span>
<asp:HyperLink ID="HyperLink2" runat="server" CssClass="style2"
NavigateUrl="~/Learning Technology.aspx">Next</asp:HyperLink>
</div></div>
<div class="col_w260_l" style="width:520px">
<img src="images/e-Services.gif" align="right"
style="margin-left:25px; height: 212px; width: 268px;"/><div class="col_w225_content">
<p class="style2"> &nbsp;<a href="#"><strong><span class="style2">Customer Learning
Solution</span></strong></a></p>
<p class="style1">
<span style="font-size:8.5pt;line-height:115%;font-
family:&quot;Tahoma&quot;,&quot;sans-serif&quot;;
color:#252525">The team of instructional designers, graphic artists, and developers service the
content needs of some of the largest companies in the world. We have extensive
experience in developing course material for instructor-led training, web-based
training, and blended learning solutions, covering a wide variety of subject
matter, including technical and non-technical topics. </span></p>
<p class="style1">
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
<span style="font-size:8.5pt;line-height:115%;font-
family:&quot;Tahoma&quot;,&quot;sans-serif&quot;;
color:#252525">We understand that
eLearning is not just about publishing content online; it is more about
presenting the content in an innovative, interesting and easier-to-grasp
format.<o:p></o:p></span></p>
</div>
<div class="cleaner"></div></div></asp:Content>

Learning Technology.aspx
<%@ Page Title="" Language="C#" MasterPageFile="~/generalzone.master" AutoEventWireup="true"
CodeFile="Learning Technology.aspx.cs" Inherits="products" %>
<asp:Content ID="Content1" ContentPlaceHolderID="head" Runat="Server">
<style type="text/css">
.style2
{
font-size: small;
}
.style3
{
font-weight: normal;
}
</style>
</asp:Content>
<asp:Content ID="Content2" ContentPlaceHolderID="ContentPlaceHolder1" Runat="Server">
<div id="generalmain">
<div class="col_w600 float_l">
<div class="content_box"><br/>
<h3>Our Services.....</h3>
<div class="cleaner"><br />
<span class="style2">&nbsp;&nbsp;&nbsp;</span>
<asp:HyperLink ID="HyperLink1" runat="server" NavigateUrl="~/Customer Learning
Solution.aspx"
CssClass="style2">Previous</asp:HyperLink><span class="style2">

&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbs
p;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&n
bsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;

48
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbs
p;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&n
bsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; </span>
<asp:HyperLink ID="HyperLink2" runat="server" CssClass="style2"
NavigateUrl="~/Learning Supports.aspx">Next</asp:HyperLink>
</div></div>
<div class="col_w260_l" style="width:520px">
<img src="images/e-Services.gif" align="right"
style="margin-left:25px; height: 212px; width: 238px;"/><div class="col_w225_content">
<p> &nbsp;<a href="#"><strong><span class="style2">Learning
Technology</span></strong></a></p>
<ul style="height: 184px; width: 434px; margin-left: 4px">
<li><span class="style3">Technical Programming Services (Custom Tools)</span></li>
<li><span class="style3">Simulation Design and Development</span> </li>
<li><span class="style3">SharePoint SitesDesign and Development</span></li>
<li><span class="style3">Managed Learning Environment </span></li>
<li><span class="style3">Content/Asset Management Systems </span></li>
<li><span class="style3">Assessment Management Systems </span></li>
<li><span class="style3">Online Collaboration Tools </span></li>
<li><span class="style3">Learning Management Systems</span> </li>
<li><span class="style3">Content Syndication Systems</span></li>
</ul><br /><br /><br /> &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
The underlying philosophy of these tools is scalability, ease of use, richness in
features/functionality, configurability, and customizability.<br /> </div>
<div class="cleaner"></div></div></asp:Content>

login.aspx
<%@ Page Title="" Language="C#" MasterPageFile="~/generalzone.master" AutoEventWireup="true"
CodeFile="login.aspx.cs" Inherits="login" %>
<asp:Content ID="Content1" ContentPlaceHolderID="head" Runat="Server">
<style type="text/css">
.style1
{
font-size: x-large;
}
.style2
{
color: #3333FF;
}
</style>
</asp:Content>
<asp:Content ID="Content2" ContentPlaceHolderID="ContentPlaceHolder1" Runat="Server">
<div id="generalmain">

<div class="col_w600 float_l">


<div class="content_box">
<br/> <h2 > Login</h2>
<div class="cleaner"></div>
</div>
<div class="col_w260_l">
<img src="images/loginpic.jpg" />
</div>
<div class="col_w260_r">

<table style="width:300px; height: 186px;">


<tr>
<td>
Login</td>
<td>
<asp:TextBox ID="TextBox1" runat="server" Width="170px"
placeholder="enter your login id" BackColor="White"></asp:TextBox>
</td>
<td>
<asp:RequiredFieldValidator ID="RequiredFieldValidator1" runat="server"
ControlToValidate="TextBox1" ErrorMessage="*"
ForeColor="Red"></asp:RequiredFieldValidator>

49
</td>
</tr>
<tr>
<td>
&nbsp;</td>
<td>
&nbsp;</td>
</tr>
<tr>
<td>
Password</td>
<td>
<asp:TextBox ID="TextBox2" runat="server" Width="170px"
placeholder="enter your password"></asp:TextBox>
</td>
<td>
<asp:RequiredFieldValidator ID="RequiredFieldValidator2" runat="server"
ControlToValidate="TextBox2" ErrorMessage="*"
ForeColor="Red"></asp:RequiredFieldValidator>
</td> </tr> <tr>
<td>
&nbsp;</td>
<td>
&nbsp;</td>
</tr>
<tr>
<td>
&nbsp;</td>
<td>
<asp:Button ID="Button1" runat="server" Text="Submit" />
&nbsp;&nbsp;&nbsp;
<asp:Button ID="Button2" runat="server" Text="Cancel" />
</td> </tr> <tr>
<td> &nbsp;</td> <td>
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbs
p;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
<asp:HyperLink ID="HyperLink2" runat="server"
NavigateUrl="~/forgetpswrd.aspx">Forgot Password</asp:HyperLink>
&nbsp;</td> </tr> <tr>
<td> &nbsp;</td> <td>
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; </td>
</tr>
<tr>
<td>
&nbsp;</td>
<td>
&nbsp;</td>
</tr>
<tr>
<td colspan="2">
<span class="style1"><strong><em class="style2">
<asp:HyperLink ID="HyperLink1" runat="server"
NavigateUrl="~/customerregistration.aspx" Width="275px" Font-Bold="True"
Font-Size="Large" ForeColor="#003366"> New Registration</asp:HyperLink>
</em></strong></span>
</td>
</tr>
<tr>
<td>
&nbsp;</td>
<td>
&nbsp;</td>
</tr>
</table>

<br />
&nbsp;&nbsp;

50
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbs
p;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;

</div>
<div class="cleaner"></div>
</div>
</asp:Content>

registration.aspx
<%@ Page Title="" Language="C#" MasterPageFile="~/generalzone.master" AutoEventWireup="true"
CodeFile="customerregistration.aspx.cs" Inherits="customerregistration" %>

<asp:Content ID="Content1" ContentPlaceHolderID="head" Runat="Server">


<style type="text/css">
.style1
{
height: 26px;
}
</style>
</asp:Content>
<asp:Content ID="Content2" ContentPlaceHolderID="ContentPlaceHolder1" Runat="Server">
<div id="generalmain">

<div class="col_w600 float_l">


<div class="content_box">
<br/> <h2 > &nbsp;Registration</h2>

<div class="cleaner"></div>
</div>
<div class="col_w260">
<center>
<table style="width:500px; height: 186px;">
<tr>
<td>
User id</td>
<td>
<asp:TextBox ID="TextBox1" runat="server" Width="170px"
placeholder="enter customer id" BackColor="White"></asp:TextBox>
</td>
<td>
<asp:RequiredFieldValidator ID="RequiredFieldValidator1" runat="server"
ControlToValidate="TextBox1" ErrorMessage="*"
ForeColor="Red"></asp:RequiredFieldValidator>
</td>
</tr>
<tr>
<td>
Name</td>
<td>
<asp:TextBox ID="TextBox2" runat="server" Width="170px"
placeholder="enter your name"/></asp:TextBox>
</td>
<td>
<asp:RequiredFieldValidator ID="RequiredFieldValidator2" runat="server"
ControlToValidate="TextBox2" ErrorMessage="*"
ForeColor="Red"></asp:RequiredFieldValidator>
</td>
</tr>
<tr>
<td>
Password</td>
<td>
<asp:TextBox ID="TextBox3" runat="server" Width="170px"

51
placeholder="enter your password"></asp:TextBox>
<td>
<asp:CompareValidator ID="CompareValidator1" runat="server"
ControlToCompare="TextBox3" ControlToValidate="TextBox4"
ErrorMessage="*Password not match" ForeColor="Red"></asp:CompareValidator>
</td>

</tr>
<tr>
<td>
Confirm Password</td>
<td>
<asp:TextBox ID="TextBox4" runat="server" Width="170px"
placeholder="re-enter password"></asp:TextBox>
</td>
<td></td>
</tr>
<tr>
<td>
Sex</td>
<td>
<asp:RadioButton ID="RadioButton1" runat="server" Text="Male" />
&nbsp;<asp:RadioButton ID="RadioButton2" runat="server" Text="Female" />
</td>
<td></td>
</tr>
<tr>
<td class="style1">
Category</td>
<td class="style1">
<asp:DropDownList ID="DropDownList1" runat="server">
<asp:ListItem>General</asp:ListItem>
<asp:ListItem>OBC</asp:ListItem>
<asp:ListItem>SC/ST</asp:ListItem>
</asp:DropDownList>
</td>
</tr>
<tr>
<td>
Date of birth</td>
<td>
<input placeholder="dd/mm/yyyy"></asp:TextBox>&nbsp;</td>
</tr>
<tr>
<td>
Email Id</td>
<td>
<asp:TextBox ID="TextBox5" placeholder="enter mail id"
runat="server"></asp:TextBox>
</td>
<td>
<asp:RequiredFieldValidator ID="RequiredFieldValidator3" runat="server"
ControlToValidate="TextBox5" ErrorMessage="*"
ForeColor="Red"></asp:RequiredFieldValidator>
<asp:RegularExpressionValidator ID="RegularExpressionValidator1" runat="server"
ControlToValidate="TextBox5" ErrorMessage="Invalid Email Id" ForeColor="Red"
ValidationExpression="\w+([-+.']\w+)*@\w+([-.]\w+)*\.\w+([-
.]\w+)*"></asp:RegularExpressionValidator>
</td>
</tr>
<tr>
<td>
Contact No.</td>
<td>
<asp:TextBox ID="TextBox6" placeholder="enter contact number"
runat="server"></asp:TextBox>
</td>
<td>
<asp:RequiredFieldValidator ID="RequiredFieldValidator4" runat="server"

52
ControlToValidate="TextBox6" ErrorMessage="*"
ForeColor="Red"></asp:RequiredFieldValidator>
</td>
</tr>
<tr>
<td>
Address</td>
<td>
<asp:TextBox ID="TextBox7" placeholder="enter address" runat="server"
TextMode="MultiLine"></asp:TextBox>
</td>
<td>
<asp:RequiredFieldValidator ID="RequiredFieldValidator9" runat="server"
ControlToValidate="TextBox7" ErrorMessage="*"
ForeColor="Red"></asp:RequiredFieldValidator>
</td>
</tr>
<tr>
<td>
City</td>
<td>
<asp:TextBox ID="TextBox8" placeholder="enter name of city"
runat="server"></asp:TextBox>
</td>
<td>
<asp:RequiredFieldValidator ID="RequiredFieldValidator5" runat="server"
ControlToValidate="TextBox8" ErrorMessage="*"
ForeColor="Red"></asp:RequiredFieldValidator>
</td>
</tr>
<tr>
<td>
Pincode</td>
<td>
<asp:TextBox ID="TextBox9" placeholder="pincode of your city"
runat="server"></asp:TextBox>
</td>
<td>
<asp:RequiredFieldValidator ID="RequiredFieldValidator6" runat="server"
ControlToValidate="TextBox9" ErrorMessage="*"
ForeColor="Red"></asp:RequiredFieldValidator>
</td>
</tr>
<tr>
<td>
State</td>
<td>
<asp:TextBox ID="TextBox10" placeholder="enter name of state"
runat="server"></asp:TextBox>
</td>
<td>
<asp:RequiredFieldValidator ID="RequiredFieldValidator7" runat="server"
ControlToValidate="TextBox10" ErrorMessage="*"
ForeColor="Red"></asp:RequiredFieldValidator>
</td>
</tr>
<tr>
<td>
Country</td>
<td>
<asp:TextBox ID="TextBox11" placeholder="enter country name"
runat="server"></asp:TextBox>
</td>
<td>
<asp:RequiredFieldValidator ID="RequiredFieldValidator8" runat="server"
ControlToValidate="TextBox11" ErrorMessage="*"
ForeColor="Red"></asp:RequiredFieldValidator>
</td>
</tr>
<tr>

53
<td>
Religion</td>
<td>
<asp:DropDownList ID="DropDownList2" runat="server">
<asp:ListItem>--Select--</asp:ListItem>
<asp:ListItem>Hindu</asp:ListItem>
<asp:ListItem>Muslim</asp:ListItem>
<asp:ListItem>Sikh</asp:ListItem>
<asp:ListItem>Christan</asp:ListItem>
</asp:DropDownList>
</td>
</tr>
<tr>
<td>
&nbsp;</td>
<td>
&nbsp;</td>
</tr>
<tr>
<td>
<asp:Button ID="Button1" runat="server" Text="Submit" />
</td>
<td>
<asp:Button ID="Button2" runat="server" onclick="Button2_Click" Text="Clear" />
</td>
<td>
<asp:Button ID="Button3" runat="server" Text="Back" />
</td>
</tr>
</table>
</center>

<br />
&nbsp;&nbsp;

&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbs
p;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;

</div>
<div class="cleaner"></div>
</div>
</asp:Content>

forgetpswrd.aspx
<%@ Page Title="" Language="C#" MasterPageFile="~/generalzone.master" AutoEventWireup="true"
CodeFile="forgetpswrd.aspx.cs" Inherits="forgetpswrd" %>

<asp:Content ID="Content1" ContentPlaceHolderID="head" Runat="Server">


</asp:Content>
<asp:Content ID="Content2" ContentPlaceHolderID="ContentPlaceHolder1" Runat="Server">
<div id="generalmain">

<div class="col_w600 float_l">


<div class="content_box">
<br/> <h2 > Forget Password </h2>
<div class="cleaner"></div>
</div>
<div class="col_w260_l">
<img src="images/generalforgetpassword.gif" />
</div>
<div class="col_w260_r">
<table width="100%">
<tr>
<td style="width: 75px">Customer id</td>
<td>
<asp:TextBox ID="TextBox1" runat="server" placeholder="enter customer id"></asp:TextBox>

54
</td>
<td>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
&nbsp;<asp:RequiredFieldValidator
ID="RequiredFieldValidator1" runat="server" ControlToValidate="TextBox1"
ErrorMessage="*" Font-Bold="True" ForeColor="Red"></asp:RequiredFieldValidator>
</td>
</tr> <tr>
<td>&nbsp;</td>
<td>&nbsp;</td>
<td>&nbsp;</td>
</tr> <tr>
<td>Email id</td>
<td>
<asp:TextBox ID="TextBox2" runat="server" placeholder="enter email id"></asp:TextBox>
</td>
<td>
<asp:RequiredFieldValidator ID="RequiredFieldValidator2" runat="server"
ControlToValidate="TextBox2" ErrorMessage="*" Font-Bold="True"
ForeColor="Red"></asp:RequiredFieldValidator>
<asp:RegularExpressionValidator ID="RegularExpressionValidator1" runat="server"
ControlToValidate="TextBox2" ErrorMessage="Invalid Email"
ValidationExpression="\w+([-+.']\w+)*@\w+([-.]\w+)*\.\w+([-
.]\w+)*"></asp:RegularExpressionValidator>
</td>
</tr>
<tr>
<td>&nbsp;</td>
<td>&nbsp;</td>
<td>&nbsp;</td>
</tr> <tr>
<td></td>
<td>
<asp:Button ID="Button1" runat="server" Text="Submit" />
</td>
<td></td>
</tr>
</table>

</div>
<div class="cleaner"></div>
</div>

</asp:Content>

Upload Data.aspx
<%@ Page Title="" Language="C#" MasterPageFile="~/generalzone.master" AutoEventWireup="true"
CodeFile="Upload.aspx.cs" Inherits="career" %>

<asp:Content ID="Content1" ContentPlaceHolderID="head" Runat="Server">


<style type="text/css">
.style1
{
float: left;
width: 250px;
padding-right: 35px;
border-right: 1px solid #ccc;
}
</style>
</asp:Content>
<asp:Content ID="Content2" ContentPlaceHolderID="ContentPlaceHolder1" Runat="Server">
<div id="generalmain">

<div class="col_w600 float_l">


<div class="content_box">

55
<br/> <h2 > Upload</h2>
<div class="cleaner"></div>
</div>

<div class="style1">
&nbsp;&nbsp; Upload Files ( Books, Project, Presentation,<br />
&nbsp; Rearch Paper, Video lectures..... )</div>
<div class="col_w260_r">

<table style="width:300px; height: 186px;">


<tr>
<td>
Name</td>
<td>
<asp:TextBox ID="TextBox1" runat="server" Width="170px"
placeholder="enter your name" BackColor="White"></asp:TextBox>
</td>
<td>
<asp:RequiredFieldValidator ID="RequiredFieldValidator1" runat="server"
ControlToValidate="TextBox1" ErrorMessage="*"
ForeColor="Red"></asp:RequiredFieldValidator>
</td>
</tr>
<tr>
<td>
Email ID</td>
<td>
<asp:TextBox ID="TextBox2" runat="server" Width="170px"
placeholder="enter your email"></asp:TextBox>
</td>
<td style="width:90px">
<asp:RegularExpressionValidator ID="RegularExpressionValidator1" runat="server"
ControlToValidate="TextBox2" ErrorMessage="Invalid Email ID" ForeColor="Red"
ValidationExpression="\w+([-+.']\w+)*@\w+([-.]\w+)*\.\w+([-
.]\w+)*"></asp:RegularExpressionValidator>
<asp:RequiredFieldValidator ID="RequiredFieldValidator2" runat="server"
ControlToValidate="TextBox2" ErrorMessage="*"
ForeColor="Red"></asp:RequiredFieldValidator>
</td>
</tr>
<tr>
<td>
Qualification</td>
<td>
<asp:TextBox ID="TextBox3" runat="server" Width="170px"
placeholder="enter your qualification"></asp:TextBox>
</td>
<td>
<asp:RequiredFieldValidator ID="RequiredFieldValidator3" runat="server"
ControlToValidate="TextBox3" ErrorMessage="*"
ForeColor="Red"></asp:RequiredFieldValidator>
</td>
</tr>
<tr>
<td>
Title Name</td>
<td>
<asp:TextBox ID="TextBox4" runat="server" Width="170px"
placeholder="enter your area of inetrest"></asp:TextBox>
</td>
<td>
<asp:RequiredFieldValidator ID="RequiredFieldValidator4" runat="server"
ControlToValidate="TextBox4" ErrorMessage="*"
ForeColor="Red"></asp:RequiredFieldValidator>
</td>
</tr>
<tr>
<td>
Upload File</td>
<td>

56
<asp:FileUpload ID="FileUpload1" runat="server" Width="199px" />
</td>
<td>
<asp:RequiredFieldValidator ID="RequiredFieldValidator5" runat="server"
ControlToValidate="FileUpload1" ErrorMessage="*"
ForeColor="Red"></asp:RequiredFieldValidator>
</td>
</tr>
<tr>
<td>
&nbsp;</td>
<td>
&nbsp;</td>
</tr>
<tr>
<td>
&nbsp;</td>
<td>
<asp:Button ID="Button1" runat="server" Text="Submit" />
</td>
</tr>
</table>
<br />
&nbsp;&nbsp;

&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbs
p;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;

</div>
<div class="cleaner"></div>
</div>
</asp:Content>

Books.aspx
<%@ Page Title="" Language="C#" MasterPageFile="~/generalzone.master" AutoEventWireup="true"
CodeFile="Books.aspx.cs" Inherits="products" %>

<asp:Content ID="Content1" ContentPlaceHolderID="head" Runat="Server">


</asp:Content>
<asp:Content ID="Content2" ContentPlaceHolderID="ContentPlaceHolder1" Runat="Server">
<div id="generalmain">

<div class="col_w600 float_l">


<div class="content_box">
<br/>
<h3>Books..</h3>
<li>&nbsp;<a href="Books/ASP.NET">asp.net</a></li>
<li>&nbsp;<a href="Books/ASP.NET">binarey number system</a></li>
<li>&nbsp;<a href="Books/ASP.NET">C Languages</a></li>
<li>&nbsp;<a href="Books/ASP.NET">C++ Languages</a></li>
<li>&nbsp;<a href="Books/ASP.NET">client server architecture</a></li>
<li>&nbsp;<a href="Books/ASP.NET">Html</a></li>
<li>&nbsp;<a href="Books/ASP.NET">Java</a></li>
<li>&nbsp;<a href="Books/ASP.NET">Linux</a></li>
<li>&nbsp;<a href="Books/ASP.NET">Networking</a></li>
<li>&nbsp;<a href="Books/ASP.NET">Oracel</a></li>
<li>&nbsp;<a href="Books/ASP.NET">Tourism Marketing</a></li>

<div class="cleaner">
<br />
</div>
</div>

<div class="col_w260_l" style="width:520px">

57
&nbsp;<br />
.
</div>

<div class="cleaner"></div>
</div>
</asp:Content>

VALIDATION CHECKS

Validation checks

Validation refers to a set of activities that ensure that software that has been built is traceable to

customer requirements. Validation can be defined in many ways, but a simple definition is that

validation succeeds when software functions in a manner that can be reasonably expected by the

customer. Validation checks specify the limit of the software up to which software is valid also

validation checks controls the security of the software. In this application I have used ASP.Net

validation controls and java script both , the controls are:

Regular Expression Validator

Required Field Validator

Common Regular Expression validator

Custom validation

Compare validator

Range validator

Some validation checks in the project are

1. If user does not give any value in password field or username field it will show

error message Please enter your password .

58
2. Login form is case sensitive if user enters their name or password in wrong

format then it will display the message.

3. If user enter primary key attribute that exist already in database then application

displayed a message make sure to id already exist in record, enter a unique

Id.

4. When user use Edit Command Button, if he/she not enter primary key attribute

values then application displayed a message corresponding to each entry form.

5. All primary key attribute corresponding to each entry form

Textbox requires specific entry.

IMPLEMENTATION

Introduction: -
A crucial phase in then systems life cycle is the successful implementation of the new system design.
Implementation means converting a new system design into operation. This creating computer-compatible files,
training the operating staff before the system is up and running. A major factor in conversion is not disrupting the
functioning of the organization.

The implementation phase of software development is also concerned with translating design
specification into source code. It is necessary to write source code and internal and documentation so
that conformance of the code to its specification can be easily verified, and so that debugging, testing
and modification are eased. This can be achieved by making the source code as clear and straight
forward as possible. The implementation team should therefore be provided with-defined set of
software requirements, an architectural design specification and a detailed design description.
User training is another important area, which is responsible for minimizing resistance to change and
giving the new system a chance to provide its worth. Training aids, such as user-friendly manuals, data
dictionary, and jobs performance aids that communication information about the new system; help-
screens provide the user with a good start on the new system.

59
Following conversion, it is desirable to review the performance of the system and to evaluate it
against established criteria. Software maintenance follows conversion, which includes minor
enhancements or corrections to problems that surface late in the system's operating.
Conversion:

The objective of conversion is to put the system into operation while holding costs, risks and
personal problems to a minimum. It involves three major steps:
Creating computer-compatible files
Training the operating staff
Installing hardware/software
Procedure and documents are unique to the conversion phase. These are shown below:
Conversion begins with a review of the project plan, the system test documentation, and the
implementation plan. The parties involved are the user, the project team, programmers, and operators.
The conversion portion of the implementation plan is finalized and approved.
Files are converted.
Parallel processing between the existing and the new systems is initiated.
Results of computer runs and operators for the new system are logged on a special form.
Assuming no problems, parallel processing is discounted. Implementation results are
documented for reference.

Conversion is completed. Plans for the post-implementation review are prepared. Following
the review, the new subsystem is officially operational.

60
MAINTENANCE
Software maintenance is used to describe the software engineering activities that occur
following delivery of a software product to the customer
Activities involved in maintenance of a software product include:
Analysis activities
Standards and guidelines
Design activities
Implementation activities
Supporting documents
Configuration management is concerned with tracking and controlling of the work product
that constitute a software product
Configuration management tools include
Configuration management data bases
Version control libraries

Automated tools to support software maintenance include technical support tools and
managerial support tools
Other automated tools include
Text editor
Debugging aids
Linkage editor
Computer Maintenance covers a wide range of activities. Many activities performed during
development of Airlines Reservation System for Global Airways to enhance the maintainability of it are
as follows---
o Analysis Activities The analysis phase of software development is concerned with determining
customer requirements and constraints, and establishing feasibility of the product. From
maintenance view point, the most important activities that occur during analysis are
establishing standards and guidelines for the project and the work products to ensure
uniformity of the products; setting of milestones to ensured that the work products are produce
on schedule; specifying quality assurance procedures to ensure development of high quality
documents; identifying product enhancements that will most likely occur following initial

61
delivery of the system; and estimating the resources( personnel, equipment, floor space)
required to perform the maintenance activities.

o Standards and Guidelines various types of standards and guidelines we developed to enhance
the maintainability of our software.

o Design Activities Design is concerned with developing the functional components, conceptual
data structures and interconnection in a software system. The most important activity for
enhancing maintainability during the design.

Automated tools to support software maintenance include technical support tools


and managerial support tools. Tolls to support the technical aspects of software
maintenance span the spectrum from analysis and design tolls to implementation to
debugging and testing tools. Automated tolls include text editors debugging aids, cross-
reference generators, linkage editors, comparators, complexity metric calculators, and
version control system and configuration management databases.

Text editor permits rapid, efficient modification of source programs, test data and supporting
documents. Text editors can be used to insert and replace segments of source code, internal comments,
test data and supporting documents; to systematically change all occurrences of an identifier or other
textual strings to locate all references to a given identifier or other string of text; and to save both old
and new versions of a routine, test file or document. A syntax-directed text editor can ensure that all
cross-references in text editor can ensure that all cross-references in the supporting documents are
correctly updated.

Debugging aids provide traps, dumps, and traces assertion checking and history file
aid in locating the causes of known errors. System-level-cross-reference generators provide
cross-reference listings for procedure calls, statements usage and data references. Cross-
references directories provide the calling structures of who calls whom and from where,
and procedures names and statement numbers where formal parameters local variables
and global variables are defined, set and used.

62
As we already know maintenance of the software is an important part of using it. Thus various
maintenance procedures have to be followed.

TESTING TECHNIQUES AND STRATEGIES

Software testing is a critical element of software quality assurance and represents the ultimate review of
specification, design and coding testing requires that the developer discard preconceived notions of the
correctness of software just developed and overcome a conflict of interest that occurs when errors are
uncovered.

Testing is a process of executing a program care is one that have a high probability of finding an
as yet undiscovered error. A successful test is one that uncovers an as-yet undiscovered error.
Testing is the necessary part of the project the various methods are used for testing the
software. The new look to the project is giving by the perfect testing. I prefer the black box testing
method. Black - box testing , focuses on the functional requirements of the software. That is black - box
testing enables the software engineer to derive sets of input conditions that will fully exercise all
functional requirements for a program. Black - box testing is not an alternative to white - box techniques
Rather, it is a complementary approach that is likely to uncover a different class of errors than white -
box methods.

Black - box testing attempts to find errors in following categories :-

(1) In correct or missing functions.

(2) Interface errors.

(3) Errors in data structures or external data base access.

(4) Performance errors.

(5) Initialization and termination errors.

Firstly, test the incorrect or missing function in the project design, testing all modules and their

dependent modules such as for new care, detail of old care, forwarding of case reminder of case and

disposal of case.

63
Secondly, test the interface of the software. The input and output of the project also depends

upon the interface use, so that all links should be display accordingly.

Thirdly, testing on the data that are use, it should be properly fitted. The connectivity should

be proper.

Fourthly, the performance error, testing is also done on the performance error, checking the

display time, loading time, clear picture and message.

Finally, testing on the idealization and termination error, test the proper loading of the input

data easily connection of the data and display of cases.

Unlike white - box testing, which is performed early in the testing process, black- box testing

tender to be applied during later stages of testing. Because black - box testing purposely disregards

control structure, alteration is focused on the information domain.

By applying black box techniques, we derive a set of test cares that satisfy the following criteria

(1) Test cares that reduce, by a count that is greater that one, the number of additional test cares

that must be designed to achieve reasonable testing.

(2) Test cares that tell use something about the presence or absence of classes of errors rather then

errors associated only with specify test at hand.

64
System Security measures
(Implementation of security for the projects developed)
Database/data security
Security Mechanisms
Security is very much required to prevent unauthorized access and malicious

practices. In this proposed Website I have created the Security system using ASP .NET

Forms Authentication and Role Management technique.

65
Role Management

ASP.NET role management helps you to manage authorization, allowing you

to specify which resources various users in your application are allowed to access.

Role management lets you group users by assigning them to roles.

PERT AND GANT CHART

A PERT chart is a graph-based chart. It can be used to determine the activities that from the critical

path, which if delayed will cause the overall project to delay. The PERT chart for the project is:

PERT Chart

Phases Old Project New Project

No. of Days Extra Days No. of Days Extra Days

Fact finding 15 5 10 3

Analysis 25 3 15 5

Designing 20 5 20 5

Testing 20 5 20 5

Maintenance 10 2 10 2

Coding 35 10 32 10

66
A GANTT chart uses a calendar-oriented chart to represent the project schedule. Each activity is

represented as a bar in the calendar, starting from the start date of the activity and ending at the

ending date for that activity. The start and end of each activity becomes milestone=s for the

project. The GANTT chart for this project is:

GANTT Chart

35

30

25

20 Old Project
15 New Project

10

0
Fact finding Analysis Designing Testing Maintenance Coding

67
FUTURE SCOPE
As the technology is developing at a fast pace, Internet has been seen providing to be most
helpful infrastructure for cooperate the staff and customer.
This project can be use on Internet. In future this project can be totally implemented on the Internet
Back bone.
Further we can add payment by credit card. Further it can also be helpful in various Ares such as salary
E-commerces, Online exam, E-books & Project.
Different security measures can be implemented to secure use of services.

By accessing many more services provided by different service providers, this E-Learning project can be
enriched by adding more features.

68
BIBLIOGRAPHY
Programming ASP.NET 3.5 by Jesse Liberty, Dan Maharry, Dan Hurwitz

Beginning ASP.NET 3.5 in C# 2008: From Novice to Professional, Second Edition by Matthew

MacDonald

ASP.NET 3.5: A Beginner's Guide by William Sanders

Microsoft .NET: Architecting Applications for the Enterprise by Dino Esposito, Andrea Saltarello

69
A

PROJECT SYNOPISIS

E-LEARNING RESOURCE LOCATOR

Session 2015-2016

Under the Guidance of: Submitted by:


Dr. Ashish Avasthi Pradeep Kumar
Astt. Proffesor MCA

70
2. PROFORMA FOR APPROVAL OF SYNOPSIS REPORT (NMCA452)
1. Roll No

2. Name of the student Pradeep Kumar

3. E-mail: - pradeepbaberu@gmail.com

4. Mob. No. 9795033518

5. Title of the Mini Project (NMCA 452) E-LEARNING RESOURCE LOCATOR

6. Name of the Mentor Dr. Ashish Avasthi

For Office Use Only:

Signature of the Mentor

Approved Not Approved

Date:

Suggestions (if any) :-

71
ACKNOWLEDGEMENT

I am very grateful to my Mini Project (452) Mentor Dr. Ashish Avasthi for

giving his valuable time and constructive guidance in preparing the

Synopsis. It would not have been possible to complete this Mini Project

(452) in short period of time without his kind encouragement and valuable

guidance.

Date:

Signature

Name of the Student

Pradeep Kumar

72
INDEX
Sl. No.

(1) Introduction

(2) Justification of language and platform used

(3) Data Flow Diagram (DFD)

(4) E-R diagram ( or any other data model used)

(5) Functional decomposition diagram

(6) Database Tables

(7) Applications

(8) Limitation of the Project

(9) Future scope and improvements

(10) Conclusion

(11) References

INTRODUCTION
73
E-Learningis the computer and network enabled transfer of skills and knowledge.
It includes out-of classroom & in-classroom educational experiences via
technology. E-
Learning is naturally suited to distance learning and flexible learning. It is
available anywhere, anytime. It is a self paced interactive instructive presented
over the Internet to browser equipped learners. The E-Learning solution is
empowering, engaging, effective and economical.

Early E-Learning systems, based on computer based learning (CBL) & training
often attempted to replicate autocratic teaching styles whereby the role of the e-
Learning systems was to transfer knowledge, as opposed to the systems
developed later which were based on computer supportive collaborative learning
(CSCL) which ncouraged the shared development of knowledge. Nowadays, it is
an increasing trend to create virtual learning environment (VLE).The courses
offered by the environment is interactive.

Why e-learning is the most effective solution?

Many employers and learners cannot afford time to a class. Travelling itself
makes the learning process expensive & disruptive. E-Learning is revolutionizing
the learning world by eradicating the geographical boundaries. The resources are
available 24*7 a week, and any computer enabled with Internet facility can use
the system.
E-Learning ranges over a number of subjects & has a number of features

74
Justification of language and platform used

1) Software Requirement specifications:

Microsoft Visual Studio 2010


ASP.Net
C#
Microsoft SQL server 2010
Html & Java Script etc
Internet explorer 6.0, chrome or any Supported browser.

2) Hardware:

a) For client site:

Pentium 4
256 MB RAM
1 GB HDD

b) For server site:

Xeon based or higher end server


4GB RAM
200 GB disk space

Data Flow Diagram (DFD)


75
DFD Level 0 :

DFD Level 1 :

76
ADMINISTRATOR

77
Teacher

System logic diagrams

78
79
Database Tables
Table name:-Regs

Primary key- Regs._id


Column name datatype Size Allow null

User_id Nvarchar 20 not


Name Nvarchar 80 Not
Password Nvarchar 50 Not
Conform password Nvarchar 50 Not
Sex Int 10 Not
Category Nvarchar 50 Not
DOB Nvarchar 20 Not
Email id Nvarchar 50 Not
ContactNo Nvarchar 20 Not
Address Nvarchar 30 Not
City Nvarchar 30 Not
Pin code Int 06 Not
State Nvarchar 50 Not
Country Nvarchar 50 Not
Religion Nvarchar 50 Not

Table Name:- Login

Primary key User_id


Column Name Data Type Size Allow Null
User_id Nvarchar 20 Not
Pass Nvarchar 100 Not

80
Table Name:- Upload Files

Primary key Data base


Column Name Data Type Size Allow Null
Name Nvarchar 50 Not
Email id Nvarchar 50 Not
Qualification Nvarchar 20 Not
Title Name Nvarchar 50 Not
Upload Files 100 Not

Applications

We used a combination of surveys, focus groups, and one-on-one interviews to


gather information from faculty, and from key personnel at other institute. After gathering
requirements we have decided the following aims and objectives of Digital HR System:
To ease the functioning of the company.
To avoid delays as postal delays.
To increase the existing systems efficiency and reliability as a whole by
many times
To reduce effort involved in processing the data.
Its developed for smooth functioning.
To ease the interaction between candidate and company.
To provide transparent system to all the employees of the company.
Improved Productivity of the HR Department of the Company
Optimal Utilization of Resources.
Reduction in time taken in execution of activities.
Better Information sharing among different department.
Cost cutting in maintaining employees data.

81
Limitation of the Project

While designing this project, all the required services are created and then
implemented in the main E-Learning project. But in reality, while a project is
designed using SOA then all the required services are provided by service
providers and the company designing the project uses those services according to
some kind of deals with those service providers.

There is no service directory which contains all available services, in this project
and it is assumed that all the available services are known in advance.

Service securities are not implemented and thats why anybody can use all
services, whichis not the case in real SOA implementation.

82
Future scope and improvements

A dealing technique (online payment etc.) i.e., how a company can deal
with the service providers can be designed and then the designed services
can be used by service providers.

Different security measures can be implemented to secure use of


services.

By accessing many more services provided by different service providers,


this E-Learning project can be enriched by adding more features.

83
Conclusion

TheE-Learning System provides a platform for online learning procedure. It can


be used by the students of different schools, colleges, universities in the various
part of the world. E-Learning is boundary barrier independent & also lacks time
constraint. The system facility is available 24*7 a week.Even the facility is helpful
for the professionals who cannot afford the time for in-classroom teaching due to
their busy schedule.

Implementing the services for the building of the system provides a cleaner
approach.
Each service is associated with one or more functions and the WebPages utilizes
these function. The services allows the most important aspect of coding i.e.
Reuse.

For a developing country like India, this online learning process is a new aspect.
India is now progressing towards E-Governance and education is one of those
important fields that will come under E-Governance. Proper steps like this ensure
a brighter future.

84
References

[1] ASP.NET and Web Development Overview,


http://msdn.microsoft.com/en-us/library/4w3ex9c2.aspx

[2] Microsoft Visual Studio Overview,


http://en.wikipedia.org/wiki/Microsoft_Visual_Studio#Visual_Studio_2005

[3] Microsoft SQL Server 2008,


http://en.wikipedia.org/wiki/Microsoft_SQL_Server

[4 Introduction to ADO.NET,
http://en.wikipedia.org/wiki/ADO.NET

[5] Introduction to .NET Architecture,


http://www.devtopics.com/what-is-net/

[6] AJAX Bridging the Thin-Client Performance Gap,


http://www.ironspeed.com/articles/ajax-bridging%20the%20thinclient%
20performance%20gap/article.aspx

85

Você também pode gostar