67
Six week summer Training CSE REPORT ON ALUMNI ASSOCIATION OF SUSCET Tangori (MOHALI) (FRONT-END=ASP.NET USING C# LANGUAGE, BACK-END=SQL 2005) Six Months Industrial Training Report At Royal Institute,Patiala Submitted in partial fulfillment of the requirements for the award of degree of BACHELOR OF TECHNOLOGY IN COMPUTER SCIENCE & ENGINEERING 100690309847 1 Deepanshu Kehar

Training Report (Alumni project

Embed Size (px)

DESCRIPTION

project report

Citation preview

Page 1: Training Report (Alumni project

Six week summer Training CSE

REPORT ON ALUMNI ASSOCIATION OF SUSCET

Tangori (MOHALI)

(FRONT-END=ASP.NET USING C# LANGUAGE, BACK-END=SQL 2005)

Six Months Industrial Training ReportAt

Royal Institute,Patiala

Submitted in partial fulfillment of the requirements for the award of degree of

BACHELOR OF TECHNOLOGYIN

COMPUTER SCIENCE & ENGINEERING

SUBMITTED TO: SUBMITTED BY:

Dr. Dheerendra Singh Deepanshu KeharHOD CSE 100690309847

100690309847 1 Deepanshu Kehar

Page 2: Training Report (Alumni project

Six week summer Training CSE

ACKNOWLEDGEMENT

It gives me immense pleasure to express my deep sense of gratitude to Er. Pertik Garg who

gave me the opportunity to undertake training in his institute. I have appreciation and regards for

his constant encouragement, constructive criticism and sympathetic understanding through out

the course of this training.

I would like give my special thanks to Dr. Dheerendra Singh for guiding me through out the

course of training and providing the crucial knowledge and help required for completion of my

project.

I also extent my warm thanks to my parents, my college staff and institute faculty, who always

encouraged me to work earnestly during the project work.

Deepanshu Kehar

100690309847 2 Deepanshu Kehar

Page 3: Training Report (Alumni project

Six week summer Training CSE

INDEX

Sr.No PARTICULARS PAGE NO.

1.Abstract of the project 6,7

2.Project Plan 8

2.1 System 8

3.Product Definition

9

3.1 Problem Statement 93.2 Acceptance Criterion 10

4.Programming Language And Tools 11

4.1 Overview of the .NET Framework 114.2 Features of CLR 114.3 Introduction to ASP.NET 124.4 ASP.NET Compatibilty 13-154.5 Introduction to C# 16-184.6 Microsoft SQL server 18-23

5.Introduction to project

24

5.1 Tables for all the modules 25-275.2 Database Design 28

5.3Hardware & Software Requirements

29

6 Flowchart of the project 307. Application of work 318. Output Screen 32-469. Bibliography 47

OBJECTIVE AND SCOPE OF THE TRAINING

100690309847 3 Deepanshu Kehar

Page 4: Training Report (Alumni project

Six week summer Training CSE

OBJECTIVES

It is a community site developed for pass out students.

This website works an interface or bridge among the students.

Through this website, students upload their complete information.

This site helps the students (friends) to share their views by sending scraps.

This site works as an informative site for the pass out students who want updated information

from their college.

This online project working as an entertainment site as student uploads the photograph to

remember their beautiful memories.

This site helpful to the college to collect complete information about the students who are

working in different locations at different companies.

This project helpful for junior students to provide guidance regarding placement, training

from their seniors who have already passed out.

SCOPES

Communities or departments can also be added in this web application.

100690309847 4 Deepanshu Kehar

Page 5: Training Report (Alumni project

Six week summer Training CSE

One can send the scraps in groups to which there are some no. of students are added.

The student can even change his/her photos by selecting image in this web application.

For the security purpose of the password, administrator sends the password of his choice to

the student through email to his /her main account that is going to be registered on the site

means it requires validation also. If he/she is present in the bgiet institute, then only the

student will be registered otherwise not.

100690309847 5 Deepanshu Kehar

Page 6: Training Report (Alumni project

Six week summer Training CSE

1. ABSTRACT OF THE PROJECT

For the last few years, the Internet has become increasingly commercialized into a worldwide

information super network. Internet is a business and marketing tool having the competitive

advantage in providing better customer service. It is a communication network that bridges the

entire small computer networks world wide as a whole.

Intranet is based on Internet technology, in particular World Wide Web (WWW) to build

information systems within organization or enterprise to accomplish standardization and

automation. It allows a certain organization to build a GroupWare within web environment at low

cost on top of existing network infrastructure.

Intranet Mail Server provides a very effective user interface through which the user can control

and configure the working of the server. It provides authorized access with password, changing

the existing password, configuring the server, displaying the status of mail reception and local

delivery of the server.

100690309847 6 Deepanshu Kehar

Page 7: Training Report (Alumni project

Six week summer Training CSE

HARDWARE REQUIREMENTS: The lists of the hardware used currently for the

project are:

Processor : Pentium III

RAM: 128 MB

HARD DISK DRIVE: 20 GB

CD ROM: 42X

Floppy Disk Drive: 1.44”

Monitor: 15” color

Keyboard: Standard 110 keys

Mouse: Scroll

Network Adapter: Internal Ethernet Card

SOFTWARE REQUIREMENTS: The lists of the software used currently for the project

are:

Platform: Microsoft Windows XP

Front End:

Development:

Environment: Microsoft .Net Framework

Application: ASP.Net C#

100690309847 7 Deepanshu Kehar

Page 8: Training Report (Alumni project

Six week summer Training CSE

2. PROJECT PLAN

2.1. SYSTEM

The term system is derived from the Greek word ‘Systema’ which means an organized

relationship among functioning units or components. A system exists because it is designed to

achieve one or more objectives.

A system is an orderly grouping of interdependent components linked together according to a

plan to achieve a specific objective.

The study of system concepts has three implications:

1. A system must be designed to achieve a predetermined objective

2. Interrelationships and interdependence must exist among the components

3. The objectives of the organization as the whole have a higher priority than the objective of its

subsystem.

SYSTEM DEVELOPMENT is a process which consists of two major steps:

- SYSTEM ANALYSIS

- SYSTEM DESIGN

100690309847 8 Deepanshu Kehar

Page 9: Training Report (Alumni project

Six week summer Training CSE

3. PRODUCT DEFINITION

3.1. PROBLEM STATEMENT

Problem statement was to design a module:

Which will be user friendly?

Which will restrict the user from accessing other user’s data?

Which will help the client in viewing his data and privileges?

Which will help the administrator to change the data of any Student?

In which further additions can be made without changing its design drastically.

Another problem was that the data should be accessed from the administrator and accordingly

changes should be made on the data by the administrator only.

FUNCTIONS TO BE PROVIDED

The various features that the proposed system possesses will be:

The system will be user friendly and completely menu-driven so that users shall have no

problem in using all the options .The system will be efficient and fast in response by

careful programming.

The system will be customized according to the needs of the organization.

It will provide overall security to database both from user as well as administrator side.

100690309847 9 Deepanshu Kehar

Page 10: Training Report (Alumni project

Six week summer Training CSE

3.2. ACCEPTANCE CRITERIA

Before designing/developing a new system, it is important to establish the acceptance criteria so

that it can be evaluated according to this criterion.

The performance requirements are:

User Friendly: The designed system should be user friendly, understandable and easy to use so

that even the novice user can easily learn to use the system.

Flexibility: It should be flexible in nature to allow likely changes and alteration in the near

future.

Error handling: The system must give response to errors in clear and precise manner as soon as

an error has occurred.

Integrity: The results produced by the system should be accurate and reliable.

Functional and performance specifications: The performance of the required system should be

good and should fulfill the required functional specifications.

100690309847 10 Deepanshu Kehar

Page 11: Training Report (Alumni project

Six week summer Training CSE

4. PROGRAMMING LANGUAGE & TOOLS

4.1. OVERVIEW OF THE .NET FRAMEWORK

The .NET Framework is a new computing platform that simplifies application development in the

highly distributed environment of the Internet. The .NET Framework is designed to fulfill the

following objectives:

To provide a consistent object-oriented programming environment whether object code is

stored and executed locally, executed locally but Internet-distributed, or executed

remotely.

To provide a code-execution environment that minimizes software deployment and

versioning conflicts.

To provide a code-execution environment that guarantees safe execution of code,

including code created by an unknown or semi-trusted third party.

To provide a code-execution environment that eliminates the performance problems of

scripted or interpreted environments.

To make the developer experience consistent across widely varying types of applications,

such as Windows-based applications and Web-based applications.

To build all communication on industry standards to ensure that code based on the .NET

Framework can integrate with any other code.

4.2 . FEATURES OF CLR

.NET Framework has two main components: the Common Language Runtime and the .NET

Framework class library. The common language runtime is the foundation of the .NET

Framework. You can think of the runtime as an agent that manages code at execution time,

providing core services such as memory management, thread management, and remoting, while

also enforcing strict type safety and other forms of code accuracy that ensure security and

robustness.

100690309847 11 Deepanshu Kehar

Page 12: Training Report (Alumni project

Six week summer Training CSE

4.3. INTODUCTION TO ASP.NET

ASP.NET is Microsoft’s latest Web development platform. Although ASP.NET has some similarities with the previous version, named ASP (Active Server Pages), ASP.NET has been completely redesigned based on the .NET Framework. Web Forms is the design component of ASP.NET that allows you to create and manage Internet user interfaces, commonly called Web pages or (in a more comprehensive sense) Web applications. By using Web Forms, you can create a Web application that displays a user interface, processes data, and provides many of the commands and features that a standard application for Microsoft Windows might offer.

To create a Web application in Visual Basic .NET, you create a new ASP.NET Web Application project in the Visual Studio development environment, and then use the Web Forms Designer to build one or more Web Forms that will collectively represent your program. Each Web form consists of two pieces—a Web Forms page and a code-behind file. The Web Forms page contains HTML and controls to create the user interface. The code-behind file is a code module that contains program code that “stands behind” the Web Forms page. This division is conceptually much like Windows Forms you’ve been creating in Visual Basic—there’s a user interface component and a code module component. The code for both of these components can be stored in a single .aspx file, but typically the Web Forms page code is stored in an .aspx file and the code-behind file is stored in an .aspx.vb file.

Web Forms is a new programming model for Internet user interfaces based on ASP.NET, the Microsoft Visual Studio .NET Framework component designed to provide state-of-the-art Internet functionality. Web Forms is a replacement for Web Classes and the DHTML Page Designer in Visual Basic 6, and it’s distinct from the Windows Forms components that you’ve used for most of the projects. There’s enough in common between Web Forms and Windows ASP.NET provides a programming model and infrastructure that offers the necessary services for programmers to develop web-based applications. Because ASP.NET is part of the .NET Framework, programmers can use the managed Common Language Runtime (CLR) environment, type safety, inheritance etc. to create web-based applications. Visual C#, or JScript.NET. ASP.NET code is compiled rather than interpreted, which permits early binding, strong typing, and just-in-time (JIT) compiling to native code.

In ASP.NET, deplopment is as simple as copying a component assembly to its desired location. ASP.NET configuration settings are stored in XML-based files, which are human-readable and -writable. ASP.NET automatically applies new configuration settings to web resources whenever it finds any changes to configuration files, without rebooting the server.

There are two core programming models when developing an ASP.NET application:

Web forms Web Services

4.4. ASP.NET Compatibility

ASP is a Microsoft Technology

100690309847 12 Deepanshu Kehar

Page 13: Training Report (Alumni project

Six week summer Training CSE

To run IIS you must have Windows NT 4.0 or later To run PWS you must have Windows 95 or later Chili ASP is a technology that runs ASP without Windows OS Instant ASP is another technology that runs ASP without Windows

The Properties Window Use the Properties window to change the characteristics, or property settings, of the user interface elements on a form. A property setting is a quality of one of the objects in your user interface (With Visual Studio .NET, you can display text in any font installed on your system, just as you would in Excel or Word.). You can add program code via the Code Editor to change one or more property settings while your program is running.

Moving and Resizing the Programming Tools

With numerous programming tools to contend with on the screen, the Visual Studio development environment can become a pretty busy place. To give you complete control over the shape and size of the elements in the development environment, Visual Studio lets you move, resize, dock, and auto hide most of the interface elements that you use to build programs.

If you ever want to completely close a window, click the Close button in the upper right corner of the window. You can always open the window again later by clicking the appropriate command on the View menu. If you want an option somewhere between docking and closing a window, you might try auto hiding a tool window to the side of the Visual Studio development environment by clicking the tiny Auto Hide pushpin button on the right side of the tool’s title bar. This action places the title of the tool at the edge of the development environment in a tab that is quite unobtrusive. When you perform the auto hide action, you’ll notice that the tool window will still be visible as long as you keep the mouse in the area of the window. When you move the mouse to another part of the development environment, the window will slide out of view.

ASP.NET File Types

.aspx .ascx

.asmx

.cs

.resx

Global.asax

Web.config

100690309847 13 Deepanshu Kehar

Page 14: Training Report (Alumni project

Six week summer Training CSE

.NET

.NET is the Microsoft Web services strategy to connect information, people, systems, and devices through software. Integrated across the Microsoft platform, .NET technology provides the ability to quickly build, deploy, manage, and use connected, security-enhanced solutions with Web services. .NET-connected solutions enable businesses to integrate their systems more rapidly and in a more agile manner and help them to realize the promise of information anytime, anywhere, on any device. The Microsoft platform includes everything a business needs to develop and deploy a Web service-connected IT architecture: servers to host Web services, development tools to create them, applications to use them, and a worldwide network of more than 35,000 Microsoft Certified Partner organizations to provide any help you need. 

What’s New in .NET?

If you’re experienced with Visual Basic 6, you’ll notice some new features in .NET, including the following:

A new Internet programming model called Web Forms, which is part of ASP.NET. Web Forms and the Web Forms Designer are a replacement for the Visual Basic 6 Web Classes and DHTML Page Designer, which are no longer supported in Visual Basic .NET.

Although the Web Forms Designer is distinct from the Windows Forms Designer, both user interface tools offer similar controls and support drag-and-drop programming techniques. Because the Web Forms Designer is part of Visual Studio .NET, it’s available to Visual Basic .NET, Microsoft Visual C# .NET, and Microsoft Visual J# .NET.

Web Forms applications are designed to be displayed by Web browsers such as Internet Explorer. The controls on Web Forms are visible in the client’s Web browser (in other words, on the end-user’s computer), but the functionality for the controls resides on the Web server that hosts the actual Web application.

Although many of the Web Forms controls have the same names as the Windows Forms controls, the controls aren’t identical. For example, Web Forms controls have an ID property, rather than a Name property.

Web forms Server controls Web services Caching Configuration improvements State management improvements Security Mobile web application support

100690309847 14 Deepanshu Kehar

Page 15: Training Report (Alumni project

Six week summer Training CSE

4.5. INTRODUCTION TO C#

A new member of visual studio family, c# is a descendent of the c language. It’s much like c++, but designed with greater simplicity and ease of use in mind. It’s far easier than c++ and provides nearly all of the power available to c++ developers. It also doesn’t require you to manage the allocation and deallocation of memory, as c++ does. All of the m/m management is taken care of the CLR. This is an important advantage because memory management is one of the troublesome areas of c++ development and is responsible for many application crashes.

VISUAL SUDIO .NET IDE

The Visual Studio.NET environment includes a wide array of tool windows, toolbars and menus to provide developers with a great deal of flexibility in performing development tasks.

IDE Enhancements

The new enhancements we‘ll find in Visual Studio.NET include the following:

Start page: The start page is the default page that displayed each time you start visual studio.NET.

Multilanguage IDE: Unlike visual studio 6, which used diff. IDE’s for each programming language (although Microsoft visual Interdev and Microsoft visual J++ shared an IDE).

Command Window: Lets you execute visual studio command or code statements, depending on the mode of window.

Tabbed documents: Designed to specify the management of multiple file being edited simultaneously. It allow u to see all of the files you r editing at once.

Auto hide: my personal favorite, auto hide works much like the features of the same name in the windows toolbars.

NEW FEATURES

XML editor Dynamic help Support for window installer

IDE Windows

Designer/source editor Solution explorer Class view Server explorer

100690309847 15 Deepanshu Kehar

Page 16: Training Report (Alumni project

Six week summer Training CSE

Properties The visual studio.Net toolbox Task list Output

HTML Controls

The HTML controls are a set of older user interface controls that are supported by most Web browsers and conform closely to the early HTML standards developed for managing user interface elements on a typical Web page. They include Button, Text Field, and Checkbox—useful base controls for managing information on a Web page that can be represented entirely with HTML code. Indeed, you might recognize these controls if you’ve coded in HTML before or if you’ve had some experience with the Visual Basic 6 DHTML Page Designer.

Web Forms Controls

Web Forms controls offer more features and capabilities than HTML controls. Web Forms controls are more capable than HTML controls and function in many ways like the Windows Forms controls. Indeed, many of the Web Forms controls have the same names as the Windows Forms controls and offer many of the same properties, methods, and events. In addition to simple controls such as Button, Textbox, and Label, more sophisticated controls such as Data Grid, Calendar, and RequiredFieldValidator are also provided.

Using the Web Forms Designer

Unlike a Windows Form, a Web Forms page can have text added directly to it when it’s in flow layout mode in the Web Forms Designer. In flow layout mode, text appears in top-to-bottom fashion as it does in a word processor such as Microsoft Word. You can type text in flow layout mode, edit it, and then make formatting changes by using the Formatting toolbar. Manipulating text in this way is usually much faster than adding a Web Forms Label control to the Web page to contain the text.

Writing Event Procedures for Web Forms Controls

You write event procedures (or event handlers) for controls on a Web Forms page by double-clicking the objects on the Web Forms page and typing the necessary program code in the Code Editor. Although the user will see the controls on the Web Forms page in his or her own Web browser, the actual code that’s executed is located on the Web server and is run by the Web server. When the user clicks a button, for example, the browser typically sends the button click event back to the server, which processes the event and sends a new Web page back to the browser.

Creating a Link to another Web Page\

If your Web application will feature more than one Web page, you might want to use the Hyperlink control on the Web Forms tab of the Toolbox to let your users jump from the current Web page to a new one. The Hyperlink control places a hyperlink, which the user can click to

100690309847 16 Deepanshu Kehar

Page 17: Training Report (Alumni project

Six week summer Training CSE

display another Web page, on the current Web page. When you use a Hyperlink control, you specify the text that will be hyperlinked, and you specify the desired resource to display (either a URL or a local path) by using the Navigate Url property.

DATABASE

Databases are designed to offer an organized mechanism for storing, managing and retrieving information. They do so through the use of tables. If you’re familiar with spreadsheets like Microsoft Excel, you’re probably already accustomed to storing data in tabular form. It’s not much of a stretch to make the leap from spreadsheets to databases. Let’s take a look.

Database Tables

Just like Excel tables, database tables consist of columns and rows. Each column contains a different type of attribute and each row corresponds to a single record.

Databases and Spreadsheets

At this point, you’re probably asking yourself an obvious question – if a database is so much like a spreadsheet, why can’t I just use a spreadsheet? Databases are actually much more powerful than spreadsheets in the way you’re able to manipulate data. Here are just a few of the actions that you can perform on a database that would be difficult if not impossible to perform on a spreadsheet:

Retrieve all records that match certain criteria. Update records in bulk. Cross-reference records in different tables. Perform complex aggregate calculations.

4.6. Microsoft SQL Server

Microsoft SQL Server is a powerful relational database management system catering to high-end users with advanced needs. Along with Oracle, Microsoft SQL Server is widely regarded as one of the two main full-featured database systems on the market today. The structured query language is an industry-standard language used for manipulation of data in a relational database. The major SQL commands of interest to database users are SELECT, INSERT, JOIN and UPDATE.

SQL

Most large-scale databases use the structured query language (SQL) to facilitate user and administrator interactions. This language offers a flexible interface for databases of all shapes and sizes. The first important point to make is that database transactions are made in SQL, whether you realize it or not.

100690309847 17 Deepanshu Kehar

Page 18: Training Report (Alumni project

Six week summer Training CSE

There are also quite a few third-party applications that interact with different databases. The front-end translates your mouse clicks and text entries into SQL and then “speaks” to the database in the universal language of SQL.

DDL and DML

SQL commands can be divided into two main sub languages. The Data Definition Language (DDL) contains the commands used to create and destroy databases and database objects. After the database structure is defined with DDL, database administrators and users can use the Data Manipulation Language (DML) to insert, retrieve and modify the data contained within it.

Data Definition Language

The Data Definition Language (DDL) is used to create & destroy databases and database objects. These commands will primarily be used by database administrators during the setup and removal phases of a database project. Let's take a look at the structure and usage of four basic DDL commands:

CREATE

Installing a database management system (DBMS) on a computer allows you to create and manage many independent databases. For example, you may want to maintain a database of customer contacts for your sales department and a personnel database for your HR department.The CREATE command can be used to establish each of these databases on your platform .For example, the command:

CREATE DATABASE employees

creates an empty database named "employees" on your DBMS. After creating the database, your next step is to create tables.

CREATE TABLE personal_info (first_name char (20) not null, last_name char (20) not null, employee_id int not null)

establishes a table titled "personal_info" in the current database. In our example, the table contains three attributes: first_name, last_name and employee_id.

USE

The USE command allows you to specify the database you wish to work within your DBMS. For example, if we're currently working in the sales database and want to issue some commands that

100690309847 18 Deepanshu Kehar

Page 19: Training Report (Alumni project

Six week summer Training CSE

will affect the employee’s database; we would preface them with the following SQL command:

USE employees

ALTER

Once you've created a table within a database, you may wish to modify the definition of it. The ALTER command allows you to make changes to the structure of a table without deleting and recreating it. For Example:

ALTER TABLE personal_infoADD salary money null

This example adds new attribute to personal_info table -- an employee's salary. The "money" argument specifies that an employee's salary will be stored using a dollars & cents format &"null" keyword tells the database that it's OK for this field to contain no value for given employee.

DROP

The final command of the Data Definition Language, DROP, allows us to remove entire database objects from our DBMS. For example, if we want to permanently remove the personal_info table that we created, we'd use the following command:

DROP TABLE personal_info

similarly, the command below would be used to remove the entire employees database:

DROP DATABASE employees

Use this command with care. Remember that the DROP command removes entire data structures from your database. If you want to remove individual records, use the DELETE command.

Data Manipulation Language

The Data Manipulation Language (DML) is used to retrieve, insert and modify the database information. These commands will be used by all database users during the routine operation of database.INSERT

The INSERT command in SQL is used to add records to an existing table. Returning to the personal_info example from the previous section, let's imagine that our HR department needs to add a new employee to their database. They could use a command similar to the one shown below:

100690309847 19 Deepanshu Kehar

Page 20: Training Report (Alumni project

Six week summer Training CSE

INSERT INTO personal_infovalues ('bart','simpson', 12345, $45000)

Note that there are four values specified for the record. These correspond to the table attributes in the order they were defined: first_name, last_name, employee_id, and salary.

SELECT

The SELECT command is the most commonly used command in SQL. It allows database users to retrieve the specific information they desire from an operational database. Let's take a look at a few examples, again using the personal_info table from our employees database.

The command shown below retrieves all of the information contained within personal_info table. The asterisk is used as a wildcard. This means "Select everything from the personal_info table."

SELECT * FROM personal_info

Finally, the WHERE clause can be used to limit the records that are retrieved to those that meet specified criteria. The CEO might be interested in reviewing the personnel records of all highly paid employees. The following command retrieves all of the data contained within personal_info for records that have a salary value greater than $50,000:

SELECT *FROM personal_info WHERE salary > $50000

UPDATE

The UPDATE command can be used to modify information contained within a table. Each year, our company gives all employees a 3% cost-of-living increase in their salary. The following SQL command could be used to quickly apply this to all of the employees stored in the database:

UPDATE personal_info SET salary = salary * 1.03

DELETE

Finally, let's take a look at the DELETE command. You'll find that the syntax of this command is similar to that of the other DML commands. Unfortunately, our latest corporate earnings report didn't quite meet expectations and poor Bart has been laid off. The DELETE command with a WHERE clause can be used to remove his record from the personal_info table:

DELETE FROM personal_info WHERE employee_id = 12345

100690309847 20 Deepanshu Kehar

Page 21: Training Report (Alumni project

Six week summer Training CSE

Primary Keys

The first type of key we’ll discuss is the primary key. Every database table should have one or more columns designated as the primary key. The value this key holds should be unique for each record in the database. For Eg, assume we have a table called Employees that contains personnel information for every employee in our firm. We’d need to select an appropriate primary key that would uniquely identify each employee. Your first thought might be to use the employee’s name.

This wouldn’t work out very well because it’s conceivable that you’d hire two employees with the same name. A better choice might be to use a unique employee ID number that you assign to each employee when they’re hired. Some organizations choose to use Social Security Numbers for this task because each employee already has one and they’re guaranteed to be unique. However, use of Social Security Numbers for this purpose is highly controversial due to privacy concerns once you decide upon a primary key and set it up in the database, the database management system will enforce the uniqueness of the key. If you try to insert a record into a table with a primary key that duplicates an existing record, the insert will fail.

Foreign Keys

The other type of key that we’ll discuss is the foreign key .These keys are used to create relationships between tables. Natural relationships exist between tables in most database structures. Returning to our employees database, let’s imagine that we wanted to add a table containing departmental information to the database. This new table might be called Departments and would contain a large amount of information about the department as a whole. We’d also want to include information about the employees in the department, but it would be redundant to have the same information in two tables (Employees and Departments). Instead, we can create a relationship between the two tables.

Let’s assume that the Departments table uses the Department Name column as the primary key. To create a relationship between the two tables, we add a new column to the Employees table called Department. We then fill in the name of the department to which each employee belongs. We also inform the database management system that the Department column in the Employees table is a foreign key that references the Departments table. The database will then enforce referential integrity by ensuring that all of the values in the Departments column of the Employees table have corresponding entries in the Departments table.

STORED PROCEDURE

100690309847 21 Deepanshu Kehar

Page 22: Training Report (Alumni project

Six week summer Training CSE

Definition: Stored procedures are precompiled database queries that improve the security, efficiency and usability of database client/server applications. Developers specify a stored procedure in terms of input and output variables. They then compile the code on the database platform and make it available to application developers for use in other environments, such as web applications. All of the major database platforms, including Oracle, SQL Server and My SQL support stored procedures. The major benefits of this technology are the substantial performance gains from precompiled execution, the reduction of client/server traffic, development efficiency gains from code reuse and abstraction and the security controls inherent in granting users permissions on specific stored procedures instead of the underlying database tables.

Benefits

Precompiled execution . Reduced client/server traffic . Efficient reuse of code and programming abstraction . Enhanced security controls .

Structure

Stored procedures are extremely similar to the constructs seen in other programming languages.   They accept data in the form of input parameters that are specified at execution time.  These input parameters (if implemented) are utilized in the execution of a series of statements that produce some result.  This result is returned to the calling environment through the use of a record set, output parameters and a return code. That may sound like a mouthful, but you'll find that stored procedures are actually quite simple.

Example Here’s the SQL code:

CREATE PROCEDURE sp_GetInventory@location varchar (10) ASSELECT Product, QuantityFROM InventoryWHERE Warehouse = @location

100690309847 22 Deepanshu Kehar

Page 23: Training Report (Alumni project

Six week summer Training CSE

5. INTRODUCTION TO PROJECT

ALUMNI ASSOCIATION OF SUSCET:

Process involved in “ALUMNI ASSOCIATION OF SUSCET” is as follows:

Signing up to the site by the student.

After signing up, sign in to the website of SUSCET by the student.

Framing of the websites is also done.

Adding a friend to the login student account is also there.

Viewing the added friends by the login student.

Deleting the added friends (one or several) by the login student.

Sending scraps to all the added friends by the login student.

Viewing the scraps by the sender student (or friend) on the login student account.

At last, logout from the login student account.

100690309847 23 Deepanshu Kehar

Page 24: Training Report (Alumni project

Six week summer Training CSE

5.1. Tables for all the modules

TABLE 1: signup

It stores the personal information about the student for signing up.

100690309847 24 Deepanshu Kehar

Page 25: Training Report (Alumni project

Six week summer Training CSE

TABLE 2: administrator

It stores the Login Information of Administrator.

COLUMN SIZE TYPE SIZE

Username varchar 50

Password varchar 50

TABLE3: addfriend

It basically stores the student which is added by another login student in his or

her account.

COLUMN NAME TYPE SIZE

ReqSendBy varchar 50

ReqSendTo varchar 50

Status varchar 50

DateTime varchar 50

100690309847 25 Deepanshu Kehar

Page 26: Training Report (Alumni project

Six week summer Training CSE

TABLE4:chat

It stores the information about Conference chat done b/w all the students of SUSCET who

are Authorized by Admin.

COLUMN NAME TYPE SIZE

id int

comment varchar 50

person varchar 50

photo varchar 50

time varchar 50

TABLE 5: scrap

It stores the information about the scrap which is send by the login student to

another student.

COLUMN NAME TYPE SIZE

scrapid varchar 50

100690309847 26 Deepanshu Kehar

Page 27: Training Report (Alumni project

Six week summer Training CSE

ScrapSendTo varchar 50

ScrapSendBy varchar 50

scrap varchar 50

time varchar 50

5.2. DATABASE DESIGN

Objectives in establishing a database are as follows

Eliminate redundant data as much as possible

Integrate existing data files

Share data among all users

Incorporate changes easily and quickly

Simplify the use of data files

Lower the cost of storing and retrieving data

Improve accuracy and consistency

Provide data security from unauthorized user

Table files are permanent files containing reference data used in processing transactions,

Updating master file or producing output. Table files conserve memory space and make

the program maintenance easier by storing data in a file. The various tables are designed

for the project.

100690309847 27 Deepanshu Kehar

Page 28: Training Report (Alumni project

Six week summer Training CSE

5.3.HARDWARE & SOFTWARE REQUIREMENTS

HARDWARE REQUIREMENTS

The lists of the hardware used currently for the project are:

Processor : Intel Pentium dual core CPU

RAM: 512 MB

HARD DISK DRIVE: 20 GB

CD ROM: 42X

Floppy Disk Drive: 1.44”

Monitor: 17” color

Keyboard: Standard 110 keys

Mouse: Scroll

Network Adapter: Internal Ethernet Card

SOFTWARE REQUIREMENTS

The lists of the software used currently for the project are:

Platform: Microsoft Windows XP

Front End:

Development:

Environment: Microsoft Visual Studio 2008

Application: ASP.Net

Back End

Database

SQL 2005

100690309847 28 Deepanshu Kehar

Page 29: Training Report (Alumni project

Six week summer Training CSE

Connection

SqlConnection

6. FLOW CHART OF THE PROJECT

100690309847 29 Deepanshu Kehar

Page 30: Training Report (Alumni project

Six week summer Training CSE

7.APPLICATIONS OF THE WORK

100690309847 30 Deepanshu Kehar

Login Form Administrator

1 REGISTRATION

ENTER PERSONAL INFO

ENTER BATCH,BRANCH

UPLOAD IMAGE

Primary Key: Roll No

T1 SIGN UP

REGISTRATION

2 SEND SCRAP

SEND SCRAP

VIEW SCRAP

DELETE SCRAP

Primary Key: Scrap ID

T3 SCRAP

3 ADD FRIEND

SEND FRIEND REQUEST

ACCEPT REQUEST

ADD FRIEND

DELETE FRIEND

Primary Key: Friend ID

T4 ADD FRIEND

T2 CHAT

4 CHAT

CONFERENCE CHAT

Primary Key: Chat ID

Page 31: Training Report (Alumni project

Six week summer Training CSE

It is a community site developed for pass out students.

This website works an interface or bridge among the students.

Through this website, students upload their complete information.

This site helps the students (friends) to share their views by sending scraps.

This site works as an informative site for the pass out students who want updated

information from their college.

This online project working as an entertainment site as student uploads the photograph to

remember their beautiful memories.

This site helpful to the college to collect complete information about the students who are

working in different locations at different companies.

This project helpful for junior students to provide guidance regarding placement, training

from their seniors who have already passed out.

Home Page-1

100690309847 31 Deepanshu Kehar

Page 32: Training Report (Alumni project

Six week summer Training CSE

Home Page-2

100690309847 32 Deepanshu Kehar

Page 33: Training Report (Alumni project

Six week summer Training CSE

Signup Form

100690309847 33 Deepanshu Kehar

Page 34: Training Report (Alumni project

Six week summer Training CSE

Password Generate

100690309847 34 Deepanshu Kehar

Page 35: Training Report (Alumni project

Six week summer Training CSE

Login Form

100690309847 35 Deepanshu Kehar

Page 36: Training Report (Alumni project

Six week summer Training CSE

100690309847 36 Deepanshu Kehar

Page 37: Training Report (Alumni project

Six week summer Training CSE

Home Page Of Unauthorized Member

Home Page Of Administrator

100690309847 37 Deepanshu Kehar

Page 38: Training Report (Alumni project

Six week summer Training CSE

Registration Of Pending Members

100690309847 38 Deepanshu Kehar

Page 39: Training Report (Alumni project

Six week summer Training CSE

Registered Members

100690309847 39 Deepanshu Kehar

Page 40: Training Report (Alumni project

Six week summer Training CSE

Delete Members

100690309847 40 Deepanshu Kehar

Page 41: Training Report (Alumni project

Six week summer Training CSE

Change Password

100690309847 41 Deepanshu Kehar

Page 42: Training Report (Alumni project

Six week summer Training CSE

After Login User Main Page

100690309847 42 Deepanshu Kehar

Page 43: Training Report (Alumni project

Six week summer Training CSE

100690309847 43 Deepanshu Kehar

Page 44: Training Report (Alumni project

Six week summer Training CSE

Accept/Reject Friend Requests

100690309847 44 Deepanshu Kehar

Page 45: Training Report (Alumni project

Six week summer Training CSE

Add a New Friend

100690309847 45 Deepanshu Kehar

Page 46: Training Report (Alumni project

Six week summer Training CSE

View/Delete Friends

100690309847 46 Deepanshu Kehar

Page 47: Training Report (Alumni project

Six week summer Training CSE

Send Message

100690309847 47 Deepanshu Kehar

Page 48: Training Report (Alumni project

Six week summer Training CSE

View/Delete Messages

100690309847 48 Deepanshu Kehar

Page 49: Training Report (Alumni project

Six week summer Training CSE

Conference Chat

100690309847 49 Deepanshu Kehar

Page 50: Training Report (Alumni project

Six week summer Training CSE

9. BIBLIOGRAPHY

1. System Analysis and Design by Elias M.Awad, Galgotia Publications.

2. Software Engineering by Roger S. Pressman, McGraw- Hill Publications.

3. ASP.Net Unleashed.

Developing Web Applications with Microsoft Visual C# .NET

100690309847 50 Deepanshu Kehar

Page 51: Training Report (Alumni project

Six week summer Training CSE

Code Efficiency

The library determines the efficiency of code. In this project, I was exposed to C#. That is, C# is

acting as interface between ASP.Net windows Application and backend RDBMS. This ASP.Net

interface used as the underlying data provider. This improves efficiency in terms of fetching

records from the database. With VBScript, the ASP.Net Application sees three objects

a) Connection Object, establishes a connection to the database.

b) Command Object, executes commands against the database.

c) Data reader Object, holds records retrieved from the database or the records to be updated

on the database.

Properties:

Connection String - Allows connecting to the database.

Command Text - Property holds the actual data request query

Open - It is used to open the connection to the database.

Close - It is used to close the connection to the database.

VALIDATION CHECKS

Validation is the process of evaluating software at the end of the software development process to

determine compliance with the requirements. The main objective of validation checks is to

ensure the factors contributing quality of the system

Login table

User id allowed by alphabets only.

Password is allowed by alphabets only.

Testing

For making the software reliable and error free , the complete software must be tested in a

systematic and organized way. It is a vital phase to the success of the candidate system.

The purpose of testing differs somewhat from inspection. The purpose of testing is to verify that

the software works the way it is expected to.

100690309847 51 Deepanshu Kehar

Page 52: Training Report (Alumni project

Six week summer Training CSE

Testing Objectives

1. Testing is process of executing a program with the intent of find an error.

2. A good test case is one that has a high probability of founding an as-yet-undiscovered error.

3. A successful test is one that uncovers an as-yet-undiscovered error.

Testing Principles

All tests should be traceable to customer requirements.

Tests should be planned long before testing begins.

Testing should be “in the small” and progress toward testing “in the large.”

Exhaustive testing is not possible.

To be most effective, an independent third party should conduct testing.

Software testing is a process of executing the program with a intent of finding error.

User authentication

The primary goal of authentication is to allow access to legitimate system users and to deny

access to unauthorized persons. The two primary measures of authentication effectiveness are (1)

the false acceptance ratio, that is, the percentage of illegitimate users erroneously admitted, and

(2) the false rejection ratio, that is, the percentage of legitimate users who are denied access due

to failure of the authentication mechanism. The objective is to minimize both the false acceptance

and the false rejection ratios.

In this system the authentication is based on Password. The user, during the time of registration

will specify username and password which will be stored in the USERS table of the Oracle

database. No user having the access to enter into the database.

Restricted privileges

The user restricted to the following privileges.

User cannot change other user’s password or authenticate another user.

User can never look into the Oracle Database.

100690309847 52 Deepanshu Kehar

Page 53: Training Report (Alumni project

Six week summer Training CSE

User can never delete a record related to other user.for instance the user cannot delete mails in

some other user’s account.

100690309847 53 Deepanshu Kehar