0% found this document useful (0 votes)
449 views110 pages

Virtual Class Room System

This document summarizes a project report for developing a virtual classroom system. It was submitted by five students - Ranjeet Singh, Rishabh Kapoor, Rohit Dung, Sandeep Srivastava, and Tejaswa Kumar - to fulfill the requirements for a Bachelor of Technology degree from Uttar Pradesh Technical University, under the supervision of lecturer Ms. Hemlata Pant. The report includes sections on feasibility study, requirements analysis, system modules, technologies used, design, algorithms, coding, testing, and future enhancements of the virtual classroom system.

Uploaded by

Abhimanyu mishra
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
449 views110 pages

Virtual Class Room System

This document summarizes a project report for developing a virtual classroom system. It was submitted by five students - Ranjeet Singh, Rishabh Kapoor, Rohit Dung, Sandeep Srivastava, and Tejaswa Kumar - to fulfill the requirements for a Bachelor of Technology degree from Uttar Pradesh Technical University, under the supervision of lecturer Ms. Hemlata Pant. The report includes sections on feasibility study, requirements analysis, system modules, technologies used, design, algorithms, coding, testing, and future enhancements of the virtual classroom system.

Uploaded by

Abhimanyu mishra
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
You are on page 1/ 110

A PROJECT REPORT

ON
“VIRTUAL CLASSROOM SYSTEM”
Submitted in partial fulfillment of
THE REQUIREMENT FOR THE AWARD OF DEGREE OF

BACHELOR OF TECHNOLOGY

UNDER THE SUPERVISION OF


Ms. Hemlata Pant
Lecturer
Dept. Of Computer Science

UTTAR PRADESH TECHNICAL UNIVERSITY, LUCKNOW, INDIA


2005-2009

Submitted By:
Ranjeet Singh 0505410075 Fourth Year
Rishabh Kapoor 0505410079 Fourth Year
Rohit Dung 0505410082 Fourth Year
Sandeep Srivastava 0505410086 Fourth Year
Tejaswa Kumar 0505410109 Fourth Year
CERTIFICATE

Certified that “Ranjeet Singh, Rishabh Kapoor, Rohit


Dung, Sandeep Srivastava, Tejaswa Kumar” have
carried out the research work presented in this thesis
entitled “VIRTUAL CLASSROOOM SYSTEM” for
the award of Bachelor of Techlogy, in Computer
Science & Engineering (Fourth Year) from Uttar
Pradesh Technical University, Lucknow under my
supervision. The thesis embodies result of original work
and studies carried out by Students themselves and the
contents of the thesis do not form the basis for the award
of any other degree to the candidate or to anybody else.

( Ms. Hemlata Pant )


DESIGNATION: LECTURER
Address: Akhileash Das Nagar,
BBDNITM, Lucknow

2
ABSTRACT

Developing a virtual classroom system to promote a greater


count of students to splurge into the field of Education. It
integrates the benefits of a physical classroom with the
convenience of a ‘no-physical-bar’ virtual learning
environment, minus the commuting hazards and expenses. It
will usher in the immense flexibility and sophistication in the
existing learning platform structures, with the perfect blend of
synchronous and asynchronous interaction. It provides a
means of collaborative learning for the students.

3
ACKNOWLEDGEMENT

We take opportunity to express our deep sense of obligation


and gratitude of tireless help given by our guide
“Ms. Richa Sharma” who gave valuable guidance of this
project “VIRTUAL CLASSROOM SYSTEM”. In this very
real sense, this work would not have been possible without his
shaping ideas.
We would like to thanks” Mr. V.K.Singh, H.O.D Information
Technology”;

Through count down of this list which have been constant


source of inspiration is an undertaking one. Keeping them
anonymous, we offer our sincere thanks to all of them.

4
5
TABLE OF CONTENTS

 Certificate
 Abstract
 Acknowledgement
 List Of Tables
 Project Description
 Feasibility Study
 Requirement Analysis
 Project- Modules
 Language & Platform
 Designing ( DFD, modular design, ER diagram, )
 Algorithm
 Coding
 Testing
 Maintenance & Implementation
 Applications
 Future Enhancement
 Appendices
 References

6
7
Database Tables

DEPARTMENT

LOGIN

8
RESULT:

STUDENT PAYMENT

9
STUDENT

10
STUDENT EDUCATION

11
RELATIONSHIP

12
13
Project Description

Virtual University provides the platform to the students for less expensive
education, so that it can be accessed directly by the user any time, any
where .We have visiting option on internet,. The latest inclusion in this
online list is that of on line exams or tests.

The proposed system falls under second category, the system will provide
the users with option to test them selves in different subjects free of
cost .The software will be user friendly so that any novice can easily
accessed it. The proposed system will be based on Client/ Serer
architecture with new functionality, the first layer will be user layer (the
web based part where user will operate), the second layer will be business
layer and the last layer will be database layer which will be used to store
the data.

Functions of the System :

The basic objectives of the proposed system are as follows –

1. Students can choose courses, attend lectures, take exams, view their
attendance records, progress reports etc as per their convenience.
2. Registration for multiple courses.
3. Attend lectures either at the scheduled time or on request view lecture at a
later time.

4. Faculties can take lectures, upload assignments, announcements, evaluate


answer sheets and also can upload lectures and other discussions in
various formats as in videos, power point presentation etc.

14
5. Upload and Download of various assignments, college notices, student's
notices, journals, videos.
6. There can be forums, blogs etc to discuss various queries and to put up
suggestions posted both by students and teachers.
7. Administrator can generate reports, log files, backup/recovery of data at
any time.
8. Shared documents and media library that can help in active learning of a
student.
9. Images library.

10.Availability of voice mail box to allow faculties to get the descriptive


messages left by the students.
11. Perday attendance submission system.
12. Users must have valid User ID and password to login thus creating their
individual profiles.

15
16
Feasibility Study

An important outcome of the Preliminary Investigation is the determination that


the system requested is feasible. Creeping commitment approach to feasibility
proposes that feasibility should be measured throughout the life cycle.
Feasibility is the likelihood that the system will be useful to the organization.
There are many aspects in the feasibility study portion of the preliminary
investigation. Although the specifics of a given project will dictate which factors
are most feasible factors are represented by the following category:

 Economic and financial


 Technical
 Operational
 Schedule
 Organizational

The feasibility study is carried out by a small group of people (some times
even one or two) who are familiar with information system techniques,
understand the part of the business or organization that will be involved or
affected by the project, and are skilled in the systems analysis and design
process. People typically responsible for feasibility assessment are experienced
analysts or managers.

17
Economic and financial Feasibility

Economic feasibility is a measure of the cost-effectiveness of a project or


solution underline. Are there sufficient benefits in creating the system to make
the costs acceptable? Or, are the costs of not creating the system so great that the
project must be undertaken?

Costs:
The costs can be viewed as being both – One time costs and Recurring costs.
One-time Costs:
Are the development costs that will not occur after the project has been
completed? These costs typically encompass activities such as Salary of
Personal, Hardware and Software costs, User Training, Site Preparation, and
Data or System Conversion.
Recurring Costs: Are the annual operating costs that tend to recur throughout the
lifetime of the System. For e.g. Maintenance costs, Incremental data storage
expense etc. Both one time and recurring costs can be classified as:

 Fixed Costs: occur at regular interval but at relatively fixed


rates (e.g. a lease payment).

 Variable costs: occur in proportion to some usage factor.


(e.g. long distance phone charges)

Besides one-time and recurring costs, IS related costs can be classified as


either tangible or intangible costs. Tangible costs can be measured in dollars and
with certainty e.g. Hardware costs, labor costs, employee training etc. Intangible

18
costs can not be easily measured in term of dollars and with certainty e.g.
operational inefficiency, employee morale, or customer goodwill.

Technical Feasibility

The purpose of assessing technical feasibility is to gain an understanding of the


organization’s ability to construct the proposed system. Can the work for the
project be done with current equipment, existing software, technology, and
available personal? If new technology is required, what is the likelihood that it
can be developed?
For example, if the proposal includes a printer that prints at the rate of 15,000
lines per minute, a brief search shows that this specification is technically
feasible. (Whether it should be included in the continuation is an economic
decision). On the other hand, if a user is requesting voice input to write, read,
and change stored data, the proposal may not be technically feasible.
Because organizations typically expect a return on their investment for riskier
projects, understanding the sources & types of technical risks prove to be a
valuable tool when assessing a project. Also, risks need to be managed in order
to be minimized; therefore, it is necessary to identified potential risks as early as
possible in a project.
Assessing political feasibility is the process of evaluating how key stakeholders
within the organization view proposed system. Those stakeholders not
supporting the project may take steps to block, disrupt, or change the intended
focus of the project.

19
Operational Feasibility

Operational Feasibility is a measure of how well the solution will work in the
organization. It is also a measure of how people feel about the system/project.
Will the system be used if it is developed and implemented? Will there be
resistance from users that will undermine the possible application benefits?
Systems that have substantial and widespread impact on an organization’s
structure or procedures are typically riskier projects to undertake. Thus it is
important to have a clear understanding of how an IS will fit into current day-to-
day operations of the organization.
Operational Feasibility is the willingness and ability of the management,
employees, customers, suppliers, and others to operate, use, and support a
proposed system. For examples, if the software for new systems is too difficult
to use, employees may make too many error sand avoid using it. Thus, it would
fail to show operational feasibly.
To be judged feasible, a project proposal must be pass all the tests. Otherwise, it
is not a feasible project. For example, a personal record system that is financially
feasible and operationally attractive is not feasible if the necessary technology
does not exist. A medical system that can be developed at reasonable costs but
that nurses will avoid using cannot be judged operationally feasible. Apart from
technical, operational and financial feasibility, numerous other issues can
influence the success of the project. They are : Schedule feasibility, Legal &
Contractual feasibility, Political feasibility and Organizational feasibility.

20
21
Requirement Analysis

Identification of need –

The most important step in the life cycle of any software is to identify the basic
needs of the system. This step requires the study of the fact that, why the
software is required and also if it is required what are the features required by
the system, because of this information is not gathered correctly, the ultimate
result will certainly be a defective one.
All the above given information can be extracted by using following
options –
• Observation
• Interview with target clients
• Questionnaires

I have used all the above given methods to gain the basic requirement of the
system / I have talked to the responsible person of many educational
organization about what they think of the existing exam system , how and what
data they manage , what are the expectations with the system and the problems
facing with the existing system .
I have also talked to the students about the examination system they currently
have. I have asked them about the best things they like about there system and
also what are the changes they expected there system to have.
After all these information searching I have found the basic requirements, which
are listed here after. The proposed software is to be designed for a network based
examination system. The need for the system is obvious. Any educational
organization will easily be agreed to buy the system. Each and every
organization requires a system to evaluate its student. Most of them uses the
manual system of examination, but due to increase use of computer these days, it
is clear that computer based system will be the main mode of examination in the
future.
Another point which should be mentioned here that if an organization uses the
on line examination system, the management will have full control over which
student can opt for which paper or subject. If the system under consideration is a

22
server based system the questions, answers or other details will have to be only
manage at central server.
Another expectation from the software is that student and management can stay
in their room and still carry out their work. To make such features work some
existing, wide spread network should be use d, which will obviously be internet.
Another point which comes out of the requirement analysis is that, the proposed
system must be very scalable, secure and must be able to handle large number of
users simultaneously. From management point of view, the most important
requirement, which is not available in the existing system, is the generation of
reports. The management wants reports about every aspect of the data; they want
reports about student, exams, etc.

SYSTEM REQUIREMENTS

The system requirements are basically described in the form of hardware


and software requirements:-

SOFTWARE REQUIREMENTS
PLATFORM Windows 9X\NT onwards
TECHNOLOGY ASP.NET
LANGUAGE C#
RDBMS SQL Server 2005
IDE .NET Framework & IIS
GRAPHICS SOFTWARE Visual Studio 8.0
BROWSER Internet Explorer 6.0

HARDWARE REQUIREMENTS
PROCESSOR Celeron or Pentium onwards
COMPUTER with 600Mhz or faster
MEMORY 512MB onwards
HARD DISK 20 GB
RESOLUTION 800*600 or higher
KEYBOARD & MOUSE

23
24
Project- Modules

The proposed software will have two parts, viz.


 Admin part
 Client part.

Admin part

The admin part will let the admin manage the Question bank, client’s records
and also the options for backup the database and also to restore in case of any
problem.

Client part

Another part, which is client part, will be web based to provide every time
functionality. it will let the client create his / her id which can be used to
participate in test available , it will let the client login to the site , select the
subject go thru test get the result printed in graphical format . Client can also
compare his / her marks with the other user.

DESCRYPTION OF MODULES:

The website “Lucknow City Portal ” is very informative for the users, as
the job seekers search the jobs and apply for them as well as for the
various companies, as the companies registered them at this web site and
registered the vacant jobs. The key benefit of this web site is that the
companies maintain their account.

There are some modules as follows:-

1) Registered User,
2) New Users registration,
3) Admin Authentication,
4) Modification of User
5) Deletion of User

25
Descriptions of the modules: -

Registered User
This module is mean to authenticate the user of the site. It uses the database for
authentication. Only Registered user can give test of selected subject.

New user registration

In this module the new user who wants to get registration in this web side to
give test or to check his/her skill, can get registration in this web side. And
after getting registration it will get the user’s account name and password..

Admin Authentication
This module is mean to check the admin authentication of the site. It
uses the database for check the authentication. The administrators of the
site handle this module. In this module there are two fields
 Admin_id
 Password

Modification of User

In this module the administrator can modify user account according to


need and qualification of the user. Administrator can update information
according to need of the time.

Deletion of User
In this module the administration of the site can delete account of that
user who has not given test for many times or which user is not eligible
for test.

26
27
Language & Platform

Front End: - ASP.Net Framework.

Back-End: - SQLExpress 2005

ASP

ASPNET IS NOT ONLY the latest version of Microsoft's Active Server Pages
(ASP), it is a whole new programming concept altogether. This incredibly
popular server-side scripting language is based on the .NET Framework, and it
combines unrivalled developer productivity with performance and reliability.
Dreamweaver MX 2004 is the newest version of the popular integrated web site
design tool. It enables quick and efficient web site design and programming and
comes with built-in support for A!3P.NET and XML web services. Whether you
are an experienced ASENET developer and Dreamweaver user or a beginner,
this book guides you through the web-development process at the right level. It
shows you how to rapidly develop ASPNET web applications with a minimum
of effort. You learn about the .NET Framework, how ASENET fits in and
interacts with other components, and how to master the ASENET controls via
Dreamweaver MX 2004. The .NET Framework Using and extending the
Drearnweaver MX 2004 interface ASENET programming in VB .NET Using
and expanding ASENET controls Interacting with databases Using server
behaviors in Drearnweaver MX 2004 Creating data-driven ASENET
applications Incorporating XML web services

Backing up a Database:

Backing up a database makes a copy of a database, which can be used to


restore the database if it is lost. Backing up database copies everything in the
database, including any needed portions of transaction log.The transaction log
is a serial record of all the modification that have occurred in a database, and
which transaction performed each modification. The transaction log is used
during recovery operations to roll forward completed transactions and rollback

28
(undo) uncompleted transaction. Backing up a transaction log was last backed
up.

A backup operates like a fuzzy snapshot taken of a database or transaction log.

 A database backup records the complete state of the data in the


database at the time the backup operation completes.

 A transaction log backup records the state of the transaction log at the
time the backup operation starts.

Restoring a Database:

Restoring a database backup returns the database to the same state it has in
when the backup was created. Any incomplete transactions in the database
backup,(transaction that were not complete when the backup operation
completed originally), are rolled back to ensure the database remains
consistent.

29
30
DATA FLOW DIAGRAM OF THE SYSTEM

Level 1 DFD:

31
Level 2 DFD:

User Account Maintenance

Login

32
Student Information Management

(ii) ER Diagrams:

33
34
Project Output Screen

ABOUT US

35
STUDY CENTERS

36
ENROLLMENT FORM

LOGIN

37
38
POWERPOINT PRESENTAION

39
VIDEO CLASSROOMS

LIBRARY

40
41
ASSIGNMENT UPLOAD

42
EMAIL

43
44
45
46
47
48
We have used Security socket layer protocol for security of
transition in our site.
Description of SSL is given below:-

Security Socket Layer:-

Security of data in transit over the Internet becomes increasingly necessary because
of steadily growing data volume and importance. Nowadays, every user of a public
network sends various types of data, from email to credit card details daily, and he
would therefore like them to be protected when in transit over a public network. To
this end, a practical SSL protocol has been adopted for protection of data in transit
that encompasses all network services that use TCP/IP to support typical application
tasks of communication between servers and clients.

The SSL protocol was originally developed by Netscape, to ensure security of data
transported and routed through HTTP, LDAP or POP3 application layers. SSL is
designed to make use of TCP as a communication layer to provide a reliable end-to-
end secure and authenticated connection between two points over a network (for
example between the service client and the server). Notwithstanding this SSL can be
used for protection of data in transit in situations related to any network service, it is
used mostly in HTTP server and client applications. Today, almost each available
HTTP server can support an SSL session, whilst IE or Netscape Navigator browsers
are provided with SSL-enabled client software.

Figure 1: SSL between application protocols and TCP/IP

49
SSL objectives and architecture
Which problems does SSL target? The main objectives for SSL are:

 Authenticating the client and server to each other: the SSL protocol supports
the use of standard key cryptographic techniques (public key encryption) to
authenticate the communicating parties to each other. Though the most
frequent application consists in authenticating the service client on the basis of
a certificate, SSL may also use the same methods to authenticate the client.
 Ensuring data integrity: during a session, data cannot be either intentionally or
unintentionally tampered with.
 Securing data privacy: data in transport between the client and the server must
be protected from interception and be readable only by the intended recipient.
This prerequisite is necessary for both the data associated with the protocol
itself (securing traffic during negotiations) and the application data that is sent
during the session itself. SSL is in fact not a single protocol but rather a set of
protocols that can additionally be further divided in two layers:

1. the protocol to ensure data security and integrity: this layer is composed of the
SSL Record Protocol,
2. the protocols that are designed to establish an SSL connection: three
protocols are used in this layer: the SSL Handshake Protocol, the SSL
ChangeCipher SpecPprotocol and the SSL Alert Protocol.

The SSL protocol stack is illustrated in Figure 2.

Figure 2: The SSL protocol stack

SSL uses these protocols to address the tasks as described above. The SSL record
protocol is responsible for data encryption and integrity. As can be seen in Figure 2,
it is also used to encapsulate data sent by other SSL protocols, and therefore, it is
also involved in the tasks associated with the SSL check data. The other three

50
protocols cover the areas of session management, cryptographic parameter
management and transfer of SSL messages between the client and the server. Prior
to going into a more detailed discussion of the role of individual protocols and their
functions let us describe two fundamental concepts related to the use of SSL .

SSL session and connection


The concepts as mentioned above are fundamental for a connection between the
client and the server, and they also encompass a series of attributes. Let’s try to give
some more details:

 connection: this is a logical client/server link, associated with the provision of


a suitable type of service. In SSL terms, it must be a peer-to-peer connection
with two network nodes.
 session: this is an association between a client and a server that defines a set
of parameters such as algorithms used, session number etc. An SSL session is
created by the Handshake Protocol that allows parameters to be shared among
the connections made between the server and the client, and sessions are used
to avoid negotiation of new parameters for each connection.
This means that a single session is shared among multiple SSL connections
between the client and the server. In theory, it may also be possible that
multiple sessions are shared by a single connection, but this feature is not used
in practice. The concepts of a SSL session and connection involve several
parameters that are used for SSL-enabled communication between the client
and the server. During the negotiations of the handshake protocol, the
encryption methods are established and a series of parameters of the Session
State are subsequently used within the session. A session state is defined by
the following parameters:
 session identifier: this is an identifier generated by the server to identify a
session with a chosen client,
 Peer certificate: X.509 certificate of the peer,
 compression method: a method used to compress data prior to encryption,
 Algorithm specification termed CipherSpec: specifies the bulk data encryption
algorithm (for example DES) and the hash algorithm (for example MD5) used
during the session,
 Master secret: 48-byte data being a secret shared between the client and
server,
 “is resumable”: this is a flag indicating whether the session can be used to
initiate new connections.

51
According to the specification, the SSL connection state is defined by the
following parameters:
 Server and client random: random data generated by both the client and server
for each connection,
 Server write MAC secret: the secret key used for data written by the server,
 Client write MAC secret: the secret used for data written by the client,
 Server write key: the bulk cipher key for data encrypted by the server and
decrypted by the client,
 Client write key: the bulk cipher key for data encrypted by the client and
decrypted by the server,
 Sequence number: sequence numbers maintained separately by the server for
messages transmitted and received during the data session.

The abbreviation MAC used in the above definitions means Message Authentication
Code that is used for transmission of data during the SSL session. The role of MAC
will be explained further when discussing the record protocols. A brief description
of the terms was necessary to be able to explain the next issues connected with the
functioning of the SSL protocol, namely the SSL record protocol.

The SSL Record Protocol:-


The SSL record protocol involves using SSL in a secure manner and with message
integrity ensured. To this end it is used by upper layer SSL protocols. The purpose
of the SSL record protocol is to take an application message to be transmitted,
fragment the data which needs to be sent, encapsulate it with appropriate headers
and create an object just called a record, which is encrypted and can be forwarded
for sending under the TCP protocol. The first step in the preparation of transmission
of the application data consists in its fragmentation i.e. breaking up the data stream
to be transmitted into 16Kb (or smaller) data fragments followed by the process of
their conversion in a record. These data fragments may be further compressed,
although the SSL 3.0 protocol specification includes no compression protocol, thus
at present, no data compression is used.
At this moment, creation of the record is started for each data portion by adding a
header to it, possible information to complete the required data size and the MAC.
The record header that is added to each data portion contains two elementary pieces
of information, namely the length of the record and the length of the data block
added to the original data.
In the next step, the record data constructed consists of the following elements:

52
 primary data,
 some padding to complete the datagram as required,
 MAC value.

MAC is responsible for the verification of integrity of the message included in the
transmitted record. It is the result of a hash function that follows a specific hash
algorithm, for example MD5 or SHA-1. MAC is determined as a result of a hash
function that receives the following data:
MAC = Hash function [secret key, primary data, padding, sequence number].
A secret key in creation of MAC is either a client write MAC secret or a server write
MAC secret respectively, it depends on which party prepares the packet. After
receiving the packet, the receiving party computes its own value of the MAC and
compares it with that received. If the two values match, this means that data has not
been modified during the transmission over the network. The length of the MAC
obtained in this way depends on the method uses for its computing. Next, the data
plus the MAC are encrypted using a preset symmetric encryption algorithm, for
example DES or triple DES. Both data and MAC are encrypted. This prepared data
is attached with the following header fields:

 Content type: identifies what payload is delivered by the packet to determine


which higher protocols are to be used for processing of data included in the
packet. The possible values are change_cipher_spec, alert, handshake, and
application_data that refer to the appropriate protocols.
 Major version : establishes the main portion of the protocol version to be
used. For SSL 3.0, the value is 3,
 Minor version : establishes the additional portion of the used version of the
protocol. For SSL 3.0 the value is 0.

With the addition of fields, the process of record preparation is completed.


Afterwards, the record is sent to the targeted point. The entire process of preparation
of the packet to be sent is illustrated in Figure 3.

53
Figure 3:. Creating a packet under SSL record protocol

The SSL Record protocol

The SSL record protocol is used to transfer any data within a session - both
messages and other SSL protocols (for example the handshake protocol), as well as
for any application data.

54
55
CODING
Coding transforms the design of the system produced during the design phase into
code in a given programming language, which can be executed by a computer and
then performs the computation specified by the design.

The coding phase affects both testing and maintenance to great extent. Thus the goal
of a programmer is to simplify the job of tester and the maintainer. The time spent
in coding is a small percentage of the of the total software cost but as stated
optimized code makes the job of tester and maintainer easier so coding should be
done very carefully taking these factors into account.

There are many factors for judging a program. Some of them are:

* Readability
* Program Size
* Execution Time
* Memory Required

Factors like readability and understandability makes software that is more


maintainable.

Weinberg Experiment:

In this experiment each team were given the same program for which they had to
develop a program. However each of them was given a different objective. It was
found in most cases that each team did the best for the given objective.
Some of the objectives were: Minimized Effort, Minimized Number of Statement,
Minimized Memory Required, Maximized Program Clarity and Maximized Output
clarity. The experiment clearly shows that if objectives are clear, programmer tend
to achieve that objective. For our purposes ease of understanding and modification
should be the basic goals of the programming activity.

56
CODE OPTIMIZATION:

It has been said that good programming practice is very essential for making testing
and maintenance easier. There are a number of ways to optimize a code in a given
programming language. The coding should always be done using standard
programming practices. Some of the programming practices are:

Top-Down and Bottom-Up:

In Top-Down style implementation starts from the top of the hierarchy and proceeds
to the lower level. First the main module is implemented and then its subordinates
are implemented, and their subordinates and so on.
In Bottom-Up Style the implementation starts with implementation of the modules at
the bottom of the hierarchy and proceeds through the higher levels until it reaches
the top.

Structured Programming:

The goal of structured programming is to ensure that the static structure and the
dynamic structure are the same. That is the objective of structured programming
is to write programs so that the sequence of statements executed during program
execution is same as the sequence of statement in the text of the program. The
main emphasis on structured programming is the minimum use of 'Go To'.
Information Hiding:

Information hiding prevents open manipulation of data and disallows the functions
of other modules from accessing data of a different module. That is the information
captured in a data structure should be hidden from the rest of the system. It reduces
the coupling between modules and makes the system more maintainable.

Programming Style:

The general rules that are used in programming are given below:-

 Names: Variable names used in a program should be closely related to the


entity they represent, and module names should reflect their activity.
 Control Constructs
 Gotos: Used for exiting a loop or for invoking error handlers.
 Information Hiding

57
 User-Defined Types: Modern languages allow users to define types like the
enumerated type.
 Nesting: The different control constructs, particularly the if-then-else can
be nested.E.g: -
 if C1 then S1
else if C2 then S2
else if C3 then S3
else if C4 then S4

 Module size: It should be taken into consideration i.e. large modules are
not functionally cohesive and too small modules incur unnecessary overhead.
 Module Interface: Modules with complex interface should not be used.

 Program Layout: Proper indentation, blank spaces and parenthesis should


be used to enhance the readability of programs.
 * Robustness: A program is robust if it does something planned
even for exceptional conditions, check for validity of inputs and
check for possible overflow of data structures.

Internal Documentation:
Internal documentation of program is done by the use of comments. Comments are
textual statements that are meant for the program reader and are not executed.
Comments, if properly written and kept consistent with the code, can be invaluable
during maintenance. Comments should be provided for blocks of code, particularly
those parts of code that is hard to follow. Comments for a module are called
Prologue for the module. Providing comments for a module is most useful.

58
Admin

<%@ Page Language="C#" MasterPageFile="~/MasterPage.master"


AutoEventWireup="true" CodeFile="admin.aspx.cs" Inherits="admin"
Title="Untitled Page" %>

<asp:Content ID="Content1" ContentPlaceHolderID="head" Runat="Server">


</asp:Content>
<asp:Content ID="Content2" ContentPlaceHolderID="ContentPlaceHolder1"
Runat="Server">

<br />
<img alt="" src="header1_01.gif" style="width: 6px; height: 16px" />
<asp:Label ID="Label1" runat="server" Font-Size="Larger"
Text="ADMINISTRATOR"></asp:Label>

<img alt="" src="header_03.gif"


style="width: 441px; height: 21px; margin-bottom: 0px"
/>&nbsp;&nbsp;<br />
<asp:LoginName ID="LoginName1" runat="server" />
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
<asp:HyperLink ID="HyperLink4" runat="server"
NavigateUrl="~/login.aspx">Logout</asp:HyperLink>
<ol type=1><li>
<p> <asp:HyperLink ID="HyperLink1" runat="server"
NavigateUrl="~/adminuser.aspx">VIEW USER ID AND
PASSWORD</asp:HyperLink>
</li></p>
<li><p>
<asp:HyperLink ID="HyperLink2" runat="server"
NavigateUrl="~/adminallocate.aspx">ALLOCATE/UPDATE USER ID AND
PASSWORD</asp:HyperLink>
</li></p><li>
<p><asp:HyperLink ID="HyperLink3" runat="server"

59
NavigateUrl="~/EmployeeDetail.aspx">MAINTAIN EMPLOYEES
DETAIL</asp:HyperLink>
</li></p>
<li>
<p><asp:HyperLink ID="HyperLink5" runat="server">MAINTAIN
LOG</asp:HyperLink>
</p>
<li>
<p><asp:HyperLink ID="HyperLink6" runat="server"
NavigateUrl="~/AdminSend.aspx">SEND USERID AND
PASSWORD</asp:HyperLink>
</p>
</ol><tr>
<td colspan="2" valign="top" align="center"><table width="780"
border="0" cellpadding="0" cellspacing="0">

<tbody><tr>
<td align="left" bgcolor="#2f97cf"><img src="lower_c_bg.gif"
height="16"
style="width: 126px"> </td>
<td align="left" bgcolor="#2f97cf"><div align="left"></div></td>
<td width="100%" align="left" bgcolor="#2f97cf"><marquee
onmouseover="this.stop();"
onmouseout="this.start();" scrollamount="3" scrolldelay="50"
style="font-weight: bold; font-size: 12px; width: 860px; height:
15px;">
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<font
color="#ffffff">Celebrating
the excellence
in education since 1999 | Looking for legal, accredited, total online
education,
Check us out | Educating our world one person at a time
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;|
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
No
set dates of enrollment and graduation.
Self-paced,

60
self-tailored, student-centered and competency based education.

Large
combination of courses and flexible choices.
Partial
tuition free education in deserving cases. </font></marquee></td>
</tr>
</tbody></table>

</td>
</tr>
</tbody>
</table>
</body>
</html>
</asp:Content>

Admin Allocate

<%@ Page Language="C#" MasterPageFile="~/MasterPage.master"


AutoEventWireup="true" CodeFile="adminallocate.aspx.cs"
Inherits="adminallocate" Title="Untitled Page" %>

<asp:Content ID="Content1" ContentPlaceHolderID="head" Runat="Server">


</asp:Content>
<asp:Content ID="Content2" ContentPlaceHolderID="ContentPlaceHolder1"
Runat="Server">
<img alt="" src="header1_01.gif" style="width: 6px; height: 18px" />
<asp:Label ID="Label1" runat="server" Font-Size="Larger"
Text="ALLOCATE USER ID AND PASSWORD"></asp:Label>
<img alt="" src="header_03.gif"
style="width: 313px; height: 18px; margin-bottom: 0px" /><br />

61
<asp:HyperLink ID="HyperLink1" runat="server"
NavigateUrl="~/login.aspx">LOGOUT</asp:HyperLink>
<br />
<br /> <asp:GridView
ID="GridView1" runat="server" AutoGenerateColumns="False"
CellPadding="4"
DataKeyNames="username" DataSourceID="SqlDataSource1"
EmptyDataText="There are no data records to display."
ForeColor="#333333"
GridLines="None">
<FooterStyle BackColor="#1C5E55" Font-Bold="True"
ForeColor="White" />
<RowStyle BackColor="#E3EAEB" />
<Columns>
<asp:CommandField ShowDeleteButton="True"
ShowSelectButton="True" />
<asp:BoundField DataField="username" HeaderText="username"
ReadOnly="True"
SortExpression="username" />
<asp:BoundField DataField="category" HeaderText="category"
SortExpression="category" />
<asp:BoundField DataField="password" HeaderText="password"
SortExpression="password" />
</Columns>
<PagerStyle BackColor="#666666" ForeColor="White"
HorizontalAlign="Center" />
<SelectedRowStyle BackColor="#C5BBAF" Font-Bold="True"
ForeColor="#333333" />
<HeaderStyle BackColor="#1C5E55" Font-Bold="True"
ForeColor="White" />
<EditRowStyle BackColor="#7C6F57" />
<AlternatingRowStyle BackColor="White" />
</asp:GridView>
<asp:SqlDataSource ID="SqlDataSource1" runat="server"
ConnectionString="<%$ ConnectionStrings:masterConnectionString1
%>"

62
DeleteCommand="DELETE FROM [Login] WHERE [username] =
@username"
InsertCommand="INSERT INTO [Login] ([username], [category],
[password]) VALUES (@username, @category, @password)"
ProviderName="<%$
ConnectionStrings:masterConnectionString1.ProviderName %>"
SelectCommand="SELECT [username], [category], [password] FROM
[Login]"
UpdateCommand="UPDATE [Login] SET [category] = @category,
[password] = @password WHERE [username] = @username">
<DeleteParameters>
<asp:Parameter Name="username" Type="String" />
</DeleteParameters>
<InsertParameters>
<asp:Parameter Name="username" Type="String" />
<asp:Parameter Name="category" Type="String" />
<asp:Parameter Name="password" Type="String" />
</InsertParameters>
<UpdateParameters>
<asp:Parameter Name="category" Type="String" />
<asp:Parameter Name="password" Type="String" />
<asp:Parameter Name="username" Type="String" />
</UpdateParameters>
</asp:SqlDataSource>
<br />
<asp:Label ID="Label2" runat="server" Font-Bold="True" Font-Size="X-
Large"
Font-Underline="True" Text="INSERT"></asp:Label>
<br />
<br />
<asp:DetailsView ID="DetailsView1" runat="server"
AutoGenerateRows="False"
BackColor="LightGoldenrodYellow" BorderColor="Tan"
BorderWidth="1px"
CellPadding="2" DataKeyNames="username"
DataSourceID="SqlDataSource1"

63
DefaultMode="Insert" ForeColor="Black" GridLines="None"
Height="50px"
Width="125px">
<FooterStyle BackColor="Tan" />
<PagerStyle BackColor="PaleGoldenrod" ForeColor="DarkSlateBlue"
HorizontalAlign="Center" />
<Fields>
<asp:BoundField DataField="username" HeaderText="username"
ReadOnly="True"
SortExpression="username" />
<asp:BoundField DataField="category" HeaderText="category"
SortExpression="category" />
<asp:BoundField DataField="password" HeaderText="password"
SortExpression="password" />
<asp:CommandField ShowInsertButton="True" />
</Fields>
<HeaderStyle BackColor="Tan" Font-Bold="True" />
<EditRowStyle BackColor="DarkSlateBlue" ForeColor="GhostWhite" />
<AlternatingRowStyle BackColor="PaleGoldenrod" />
</asp:DetailsView>

&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<br /
>
<br />
&nbsp;<br /><tr>
<td colspan="2" valign="top" align="center">
<table width="780" border="0" cellpadding="0" cellspacing="0">

<tbody><tr>
<td align="left" bgcolor="#2f97cf"><img src="lower_c_bg.gif"
height="16"
style="width: 126px"> </td>
<td align="left" bgcolor="#2f97cf"><div align="left"></div></td>
<td width="100%" align="left" bgcolor="#2f97cf"><marquee
onmouseover="this.stop();"
onmouseout="this.start();" scrollamount="3" scrolldelay="50"

64
style="font-weight: bold; font-size: 12px; width: 860px; height:
15px;">
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<font
color="#ffffff">Celebrating
the excellence
in education since 1999 | Looking for legal, accredited, total online
education,
Check us out | Educating our world one person at a time
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;|
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
No
set dates of enrollment and graduation.
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;|
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
Self-paced,
self-tailored, student-centered and competency based education.
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;|
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;

Large
combination of courses and flexible choices.
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;|
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
Partial
tuition free education in deserving cases. </font></marquee></td>
</tr>
</tbody></table>

</td>
</tr>
</tbody>
</table>
</body>
</html>
</asp:Content>

65
Clerk

<%@ Page Language="C#" MasterPageFile="~/MasterPage.master"


AutoEventWireup="true" CodeFile="clerk.aspx.cs" Inherits="clerk"
Title="Untitled Page" %>

<asp:Content ID="Content1" ContentPlaceHolderID="head" Runat="Server">


</asp:Content>
<asp:Content ID="Content2" ContentPlaceHolderID="ContentPlaceHolder1"
Runat="Server">

&nbsp;<br />

&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbs
p;&nbsp;&nbsp;
<img alt="" src="header1_01.gif" style="width: 6px; height: 16px" />
<asp:Label ID="Label1" runat="server" Font-Size="Larger"
Text="DATA ENTRY CLERK"></asp:Label>

<img alt="" src="header_03.gif"


style="width: 441px; height: 21px; margin-bottom: 0px"
/>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
<p>
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&
<asp:HyperLink ID="HyperLink5" runat="server"
NavigateUrl="~/login.aspx">Logout</asp:HyperLink>
</p>
<p>
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
<asp:HyperLink ID="HyperLink1" runat="server"
NavigateUrl="~/clerkcheck.aspx">STUDENT
DETAIL</asp:HyperLink>
&nbsp;</p>
<p>

66
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
<asp:HyperLink ID="HyperLink2" runat="server"
NavigateUrl="~/clerkupdate.aspx">EDIT
STUDENT DETAIL</asp:HyperLink>
&nbsp;</p>
<p>
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
<asp:HyperLink ID="HyperLink3" runat="server"
NavigateUrl="~/ClerkDD.aspx">
STUDENT DD/CHEQUE DETAIL</asp:HyperLink>
</p>
<p>
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; &nbsp;<asp:HyperLink
ID="HyperLink4" runat="server"
NavigateUrl="~/Clerkstu Education.aspx">STUDENT
EDUCATIONAL DETAIL</asp:HyperLink>
</p>
<p>
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; &nbsp;<asp:HyperLink
ID="HyperLink6" runat="server"
NavigateUrl="~/Clerkstudentid.aspx">VIEW USERID AND
PASSWORD OF STUDENT</asp:HyperLink>
</p>
<p>
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
&nbsp;<asp:HyperLink ID="HyperLink7"
runat="server" NavigateUrl="~/Clerkstudentid allocate.aspx">SEND
AND
MAINTAIN USERID AND PASSWORD OF
STUDENTS</asp:HyperLink>
</p>
<tr>
<td colspan="2" valign="top" align="center"><table width="780"
border="0" cellpadding="0" cellspacing="0">

<tbody><tr>

67
<td align="left" bgcolor="#2f97cf"><img src="lower_c_bg.gif"
height="16"
style="width: 126px"> </td>
<td align="left" bgcolor="#2f97cf"><div align="left"></div></td>
<td width="100%" align="left" bgcolor="#2f97cf"><marquee
onmouseover="this.stop();"
onmouseout="this.start();" scrollamount="3" scrolldelay="50"
style="font-weight: bold; font-size: 12px; width: 860px; height:
15px;">
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<font
color="#ffffff">Celebrating
the excellence
in education since 1999 | Looking for legal, accredited, total online
education,
Check us out | Educating our world one person at a time
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;|
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
No
set dates of enrollment and graduation.
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;|
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
Self-paced,
self-tailored, student-centered and competency based education.
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;|
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;

Large
combination of courses and flexible choices.
sp;&nbsp;
Partial
tuition free education in deserving cases. </font></marquee></td>
</tr>
</tbody></table>
</td>
</tr>
</tbody>
</table>

68
</body>
</html>
</asp:Content>

Clerk Check

<%@ Page Language="C#" MasterPageFile="~/MasterPage.master"


AutoEventWireup="true" CodeFile="clerkcheck.aspx.cs"
Inherits="clerkcheck" Title="Untitled Page" %>

<asp:Content ID="Content1" ContentPlaceHolderID="head" Runat="Server">


</asp:Content>
<asp:Content ID="Content2" ContentPlaceHolderID="ContentPlaceHolder1"
Runat="Server">
<p>
<img alt="" src="header1_01.gif" style="width: 6px; height:
18px" />
<asp:Label ID="Label1" runat="server" Font-Size="Larger"
Text="CHECK FORM ENTRIES"></asp:Label>
<img alt="" src="header_03.gif"
style="width: 313px; height: 18px; margin-bottom: 0px" /><br />
</p>
<p>

<asp:HyperLink ID="HyperLink7" runat="server"


NavigateUrl="~/login.aspx">Logout</asp:HyperLink>
</p>
<p>
<asp:GridView ID="GridView1" runat="server" AllowPaging="True"
AllowSorting="True" AutoGenerateColumns="False" CellPadding="4"
DataKeyNames="StudentID" DataSourceID="SqlDataSource1"
EmptyDataText="There are no data records to display."
ForeColor="#333333"
GridLines="None">

69
<FooterStyle BackColor="#1C5E55" Font-Bold="True"
ForeColor="White" />
<RowStyle BackColor="#E3EAEB" />
<Columns>
<asp:CommandField
ShowSelectButton="True" />
<asp:BoundField DataField="StudentID" HeaderText="StudentID"
ReadOnly="True"
SortExpression="StudentID" />
<asp:BoundField DataField="FName" HeaderText="FName"
SortExpression="FName" />
<asp:BoundField DataField="LName" HeaderText="LName"
SortExpression="LName" />
<asp:BoundField DataField="Address" HeaderText="Address"
SortExpression="Address" />
<asp:BoundField DataField="City" HeaderText="City"
SortExpression="City" />
<asp:BoundField DataField="State" HeaderText="State"
SortExpression="State" />
<asp:BoundField DataField="Country" HeaderText="Country"
SortExpression="Country" />
<asp:BoundField DataField="MobileNo" HeaderText="MobileNo"
SortExpression="MobileNo" />
<asp:BoundField DataField="Email" HeaderText="Email"
SortExpression="Email" />
<asp:BoundField DataField="DOB" HeaderText="DOB"
SortExpression="DOB" />
<asp:BoundField DataField="Gender" HeaderText="Gender"
SortExpression="Gender" />
<asp:BoundField DataField="Course" HeaderText="Course"
SortExpression="Course" />
</Columns>
<PagerStyle BackColor="#666666" ForeColor="White"
HorizontalAlign="Center" />
<SelectedRowStyle BackColor="#C5BBAF" Font-Bold="True"
ForeColor="#333333" />

70
<HeaderStyle BackColor="#1C5E55" Font-Bold="True"
ForeColor="White" />
<EditRowStyle BackColor="#7C6F57" />
<AlternatingRowStyle BackColor="White" />
</asp:GridView>
<asp:SqlDataSource ID="SqlDataSource1" runat="server"
ConnectionString="<%$ ConnectionStrings:masterConnectionString1
%>"
DeleteCommand="DELETE FROM [Student] WHERE [StudentID] =
@StudentID"
InsertCommand="INSERT INTO [Student] ([FName], [LName],
[Address], [City], [State], [Country], [MobileNo], [Email], [DOB], [Gender],
[Course]) VALUES (@FName, @LName, @Address, @City, @State,
@Country, @MobileNo, @Email, @DOB, @Gender, @Course)"
ProviderName="<%$
ConnectionStrings:masterConnectionString1.ProviderName %>"
SelectCommand="SELECT [StudentID], [FName], [LName],
[Address], [City], [State], [Country], [MobileNo], [Email], [DOB], [Gender],
[Course] FROM [Student]"
UpdateCommand="UPDATE [Student] SET [FName] = @FName,
[LName] = @LName, [Address] = @Address, [City] = @City, [State] =
@State, [Country] = @Country, [MobileNo] = @MobileNo, [Email] =
@Email, [DOB] = @DOB, [Gender] = @Gender, [Course] = @Course
WHERE [StudentID] = @StudentID">
<DeleteParameters>
<asp:Parameter Name="StudentID" Type="Decimal" />
</DeleteParameters>
<InsertParameters>
<asp:Parameter Name="FName" Type="String" />
<asp:Parameter Name="LName" Type="String" />
<asp:Parameter Name="Address" Type="String" />
<asp:Parameter Name="City" Type="String" />
<asp:Parameter Name="State" Type="String" />
<asp:Parameter Name="Country" Type="String" />
<asp:Parameter Name="MobileNo" Type="Decimal" />
<asp:Parameter Name="Email" Type="String" />
<asp:Parameter Name="DOB" Type="DateTime" />

71
<asp:Parameter Name="Gender" Type="String" />
<asp:Parameter Name="Course" Type="String" />
</InsertParameters>
<UpdateParameters>
<asp:Parameter Name="FName" Type="String" />
<asp:Parameter Name="LName" Type="String" />
<asp:Parameter Name="Address" Type="String" />
<asp:Parameter Name="City" Type="String" />
<asp:Parameter Name="State" Type="String" />
<asp:Parameter Name="Country" Type="String" />
<asp:Parameter Name="MobileNo" Type="Decimal" />
<asp:Parameter Name="Email" Type="String" />
<asp:Parameter Name="DOB" Type="DateTime" />
<asp:Parameter Name="Gender" Type="String" />
<asp:Parameter Name="Course" Type="String" />
<asp:Parameter Name="StudentID" Type="Decimal" />
</UpdateParameters>
</asp:SqlDataSource>

<tr>
<td colspan="2" valign="top" align="center"><table width="780"
border="0" cellpadding="0" cellspacing="0">

<tbody><tr>
<td align="left" bgcolor="#2f97cf"><img src="lower_c_bg.gif"
height="16"
style="width: 126px"> </td>
<td align="left" bgcolor="#2f97cf"><div align="left"></div></td>
<td width="100%" align="left" bgcolor="#2f97cf"><marquee
onmouseover="this.stop();"
onmouseout="this.start();" scrollamount="3" scrolldelay="50"
style="font-weight: bold; font-size: 12px; width: 860px; height:
15px;">
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<font
color="#ffffff">Celebrating
the excellence
in education since 1999 | Looking for legal, accredited, total online

72
education,
Check us out | Educating our world one person at a time

No
set dates of enrollment and graduation.
Self-paced,
self-tailored, student-centered and competency based education.;
Large
combination of courses and flexible choices.
Partial
tuition free education in deserving cases. </font></marquee></td>
</tr>
</tbody></table>

</td>
</tr>
</tbody>
</table>
</body>
</html>
</asp:Content>

Student

<%@ Page Language="C#" MasterPageFile="~/MasterPage.master"


AutoEventWireup="true" CodeFile="Student.aspx.cs" Inherits="Student"
Title="Untitled Page" %>

<asp:Content ID="Content1" ContentPlaceHolderID="head" Runat="Server">


</asp:Content>
<asp:Content ID="Content2" ContentPlaceHolderID="ContentPlaceHolder1"
Runat="Server">
<p>
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
<img alt="" src="header1_01.gif" style="width: 6px; height: 18px" />

73
<asp:Label ID="Label1" runat="server" Font-Size="Larger"
Text="STUDENT'S PORTAL"></asp:Label>
<img alt="" src="header_03.gif" style="width: 439px; height: 18px" /><br />
&nbsp;<asp:HyperLink ID="HyperLink16" runat="server"
NavigateUrl="~/login.aspx">Logout</asp:HyperLink>
<p><ol >
<asp:HyperLink ID="HyperLink1" runat="server"
NavigateUrl="~/powerpoint.aspx">POWER POINT PRESENTATION ON
VARIOUS TOPICS</asp:HyperLink>

<br />

<br />

<asp:HyperLink ID="HyperLink7" runat="server"


NavigateUrl="~/video.aspx">VEDIO
LECTURES</asp:HyperLink>
<br />
<br />
<asp:HyperLink ID="HyperLink8" runat="server"
NavigateUrl="~/library.aspx">LIBRARY</asp:HyperLink>
<br />
<br />
<asp:HyperLink ID="HyperLink9" runat="server"
NavigateUrl="~/assignment.aspx">VIEW/UPLOAD/DOWNLOAD
ASSIGNMENT</asp:HyperLink>
<br />
<br />
<asp:HyperLink ID="HyperLink11" runat="server"
NavigateUrl="~/Blank1.aspx">VIEW SCHEDULE</asp:HyperLink>
<br />
<br />
<asp:HyperLink ID="HyperLink12" runat="server"
NavigateUrl="~/Blank1.aspx">TODAY&#39;S LECTURES</asp:HyperLink>
<br />
<br />
<asp:HyperLink ID="HyperLink13" runat="server"
NavigateUrl="~/Blank1.aspx">VIEW ATTENDENCE</asp:HyperLink>
<br />
<br />

74
<asp:HyperLink ID="HyperLink14" runat="server"
NavigateUrl="~/Exam0.aspx">ONLINE EXAM</asp:HyperLink>
<br />
<br />
<asp:HyperLink ID="HyperLink15" runat="server"
NavigateUrl="~/rol_login.aspx">RESULT</asp:HyperLink>
</ol><tr>
<td colspan="2" valign="top" align="center"><table width="780" border="0"
cellpadding="0" cellspacing="0">

<tbody><tr>
<td align="left" bgcolor="#2f97cf"><img src="lower_c_bg.gif" height="16"
style="width: 126px"> </td>
<td align="left" bgcolor="#2f97cf"><div align="left"></div></td>
<td width="100%" align="left" bgcolor="#2f97cf"><marquee
onmouseover="this.stop();"
onmouseout="this.start();" scrollamount="3" scrolldelay="50"
style="font-weight: bold; font-size: 12px; width: 860px; height: 15px;">
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<font
color="#ffffff">Celebrating
the excellence
in education since 1999 | Looking for legal, accredited, total online
education,
Check us out | Educating our world one person at a time
;
No
set dates of enrollment and graduation.
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;|
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
Self-paced,
self-tailored, student-centered and competency based education.
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;|
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;

Large
combination of courses and flexible choices.
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;|
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
Partial
tuition free education in deserving cases. </font></marquee></td>

75
</tr>
</tbody></table>

</td>
</tr>
</tbody>
</table>
</body>
</html>
</asp:Content>

Email

<%@ Page Language="C#" MasterPageFile="~/MasterPage.master"


AutoEventWireup="true" CodeFile="email.aspx.cs" Inherits="email"
Title="Untitled Page" %>

<%@ Register assembly="FlashControl"


namespace="Bewise.Web.UI.WebControls" tagprefix="Bewise" %>

<asp:Content ID="Content1" ContentPlaceHolderID="head" Runat="Server">


</asp:Content>
<asp:Content ID="Content2" ContentPlaceHolderID="ContentPlaceHolder1"
Runat="Server">
<p>

<img alt="" src="header1_01.gif" style="width: 6px; height: 18px" />


<asp:Label ID="Label1" runat="server" Font-Size="Larger"
Text="EMAIL"></asp:Label>
<img alt="" src="header_03.gif"
style="width: 496px; height: 18px; margin-bottom: 0px" /><br />
</p>
<p>

76
&nbsp;
<asp:Label ID="Label2" runat="server" Text="TO :"></asp:Label>
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
<asp:TextBox ID="TextBox6" runat="server"
Width="608px"></asp:TextBox>
&nbsp;&nbsp;&nbsp;<asp:RegularExpressionValidator
ID="RegularExpressionValidator2"
runat="server" ErrorMessage="This email is missing the @ symbol
or ."
ValidationExpression=".+@.+"
ControlToValidate="TextBox6"></asp:RegularExpressionValidator>
&nbsp;<asp:RequiredFieldValidator ID="RequiredFieldValidator6"
runat="server"
ControlToValidate="TextBox6"
ErrorMessage="RequiredFieldValidator"></asp:RequiredFieldValidator>
</p>
<p>
<asp:Label ID="Label3" runat="server" Text="FROM :"></asp:Label>
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
<asp:TextBox ID="TextBox2" runat="server"
Width="608px"></asp:TextBox>
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<asp:RegularExpressionValidator
ID="RegularExpressionValidator1" runat="server"
ErrorMessage="This email is missing the @ symbol or."
ValidationExpression=".+@.+"
ControlToValidate="TextBox2"></asp:RegularExpressionValidator>
&nbsp;
<asp:RequiredFieldValidator ID="RequiredFieldValidator7"
runat="server"
ControlToValidate="TextBox2"
ErrorMessage="RequiredFieldValidator"></asp:RequiredFieldValidator>
</p>
<p>
<asp:Label ID="Label4" runat="server" Text="CC :"></asp:Label>
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbs
p;&nbsp;

77
<asp:TextBox ID="TextBox3" runat="server"
Width="606px"></asp:TextBox>
<asp:RegularExpressionValidator ID="RegularExpressionValidator3"
runat="server"
ErrorMessage="This email is missing the @ symbol or ."
ValidationExpression=".+@.+"
ControlToValidate="TextBox3"></asp:RegularExpressionValidator>
</p>
<p>
<asp:Label ID="Label5" runat="server" Text="SUBJECT
:"></asp:Label>
&nbsp;
<asp:TextBox ID="TextBox4" runat="server"
Width="606px"></asp:TextBox>
</p>
<p>
&nbsp;<asp:TextBox ID="TextBox5" runat="server" Height="230px"
Width="678px"></asp:TextBox>
<asp:RequiredFieldValidator ID="RequiredFieldValidator5"
runat="server"
ControlToValidate="TextBox5" ErrorMessage="required field can't be
empty"></asp:RequiredFieldValidator>
&nbsp;</p>
<p>
<asp:Button ID="Button1" runat="server" onclick="Button1_Click1"
Text="SEND" />
</p>
<tr>
<td colspan="2" valign="top" align="center"><table width="780"
border="0" cellpadding="0" cellspacing="0">

<tbody><tr>
<td align="left" bgcolor="#2f97cf"><img src="lower_c_bg.gif"
height="16"
style="width: 126px"> </td>
<td align="left" bgcolor="#2f97cf"><div align="left"></div></td>

78
<td width="100%" align="left" bgcolor="#2f97cf"><marquee
onmouseover="this.stop();"
onmouseout="this.start();" scrollamount="3" scrolldelay="50"
style="font-weight: bold; font-size: 12px; width: 860px; height:
15px;">
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<font
color="#ffffff">Celebrating
the excellence
in education since 1999 | Looking for legal, accredited, total online
education,
Check us out | Educating our world one person at a time
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;|
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
No
set dates of enrollment and graduation.
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;|
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
Self-paced,
self-tailored, student-centered and competency based education.
Large
combination of courses and flexible choices.
Partial
tuition free education in deserving cases. </font></marquee></td>
</tr>
</tbody></table>

</td>
</tr>
</tbody>
</table>
</body>
</html>
</asp:Content>

79
Database Connectivity using classes

using System;
using System.Data;
using System.Configuration;
using System.Linq;
using System.Web;
using System.Web.Security;
using System.Web.UI;
using System.Web.UI.HtmlControls;
using System.Web.UI.WebControls;
using System.Web.UI.WebControls.WebParts;
using System.Xml.Linq;
using System.Data.SqlClient;
/// <summary>
/// Summary description for Class1
/// </summary>
public class Class1
{
static System.Data.OleDb.OleDbCommand db1;
static System.Data.OleDb.OleDbConnection dbc1;
public static System.Data.DataSet getinfo()
{

string conn1 = "Provider=SQLOLEDB.1;Integrated


Security=SSPI;Persist Security Info=False;Data Source=VISHAL-9537C989\\
SQLEXPRESS;Initial Catalog=master";
dbc1 = new System.Data.OleDb.OleDbConnection(conn1);
dbc1.Open();
db1 = new System.Data.OleDb.OleDbCommand("Select * from Login");
db1.Connection = dbc1;
System.Data.OleDb.OleDbDataAdapter da = new
System.Data.OleDb.OleDbDataAdapter();
da.SelectCommand = db1;
System.Data.DataSet d = new System.Data.DataSet();
da.Fill(d);

80
return d;
}
public static System.Data.DataSet getinfo2()
{
string conn1 = "Provider=SQLOLEDB.1;Integrated
Security=SSPI;Persist Security Info=False;Data Source=VISHAL-9537C989\\
SQLEXPRESS;Initial Catalog=master";
dbc1 = new System.Data.OleDb.OleDbConnection(conn1);
dbc1.Open();
db1 = new System.Data.OleDb.OleDbCommand("Select * from
Student");
db1.Connection = dbc1;
System.Data.OleDb.OleDbDataAdapter da = new
System.Data.OleDb.OleDbDataAdapter();
da.SelectCommand = db1;
System.Data.DataSet d = new System.Data.DataSet();
da.Fill(d);
return d;
}

public static void getinfo3(string b, string c, string d, string e, string f, string


sd,int g, string h, DateTime dt, string i, string j)
{
string conn1 = "Provider=SQLOLEDB.1;Integrated
Security=SSPI;Persist Security Info=False;Data Source=VISHAL-9537C989\\
SQLEXPRESS;Initial Catalog=master";
dbc1 = new System.Data.OleDb.OleDbConnection(conn1);
dbc1.Open();
db1 = new System.Data.OleDb.OleDbCommand("Insert into Student
values ('" + b + "','" + c + "','" + d + "','" + e + "','" + f + "','" + sd + "'," + g +
",'" + h + "','" + dt + "','" + i + "','" + j + "')", dbc1);
db1.ExecuteNonQuery();

dbc1.Close();
}

81
public static void getinfo4(int a,string b,int c,string d,string e,int f,int g,int
h,string i,int j,string k,string l,int m,int n,int o,string p,int q,string r,string s,int
t,int u,int v,string z)
{
string conn1 = "Provider=SQLOLEDB.1;Integrated
Security=SSPI;Persist Security Info=False;Data Source=VISHAL-9537C989\\
SQLEXPRESS;Initial Catalog=master";
dbc1 = new System.Data.OleDb.OleDbConnection(conn1);
dbc1.Open();
db1 = new System.Data.OleDb.OleDbCommand("Insert into
StudentEducation values (" + a + ",'" + b + "'," + c + ",'" + d + "','" + e + "'," + f
+ "," + g + "," + h + ",'" + i + "'," + j + ",'" + k + "','" + l + "'," + m + "," + n +
"," + o + ",'" + p + "'," + q + ",'" + r + "','" + s + "'," + t + "," + u + "," + v + ",'"
+ z + "')", dbc1);
db1.ExecuteNonQuery();

dbc1.Close();
}
public static void getinfo5(int a,string b,string c,int d,DateTime da)
{
string conn1 = "Provider=SQLOLEDB.1;Integrated
Security=SSPI;Persist Security Info=False;Data Source=VISHAL-9537C989\\
SQLEXPRESS;Initial Catalog=master";
dbc1 = new System.Data.OleDb.OleDbConnection(conn1);
dbc1.Open();
db1 = new System.Data.OleDb.OleDbCommand("Insert into
StudentPayment values (" + a + ",'" + b + "','" + c + "'," + d + ",'" + da + "')",
dbc1);
db1.ExecuteNonQuery();

dbc1.Close();
}
public static System.Data.DataSet getinfo6()
{
string conn1 = "Provider=SQLOLEDB.1;Integrated
Security=SSPI;Persist Security Info=False;Data Source=VISHAL-9537C989\\
SQLEXPRESS;Initial Catalog=master";

82
dbc1 = new System.Data.OleDb.OleDbConnection(conn1);
dbc1.Open();
db1 = new System.Data.OleDb.OleDbCommand("Select * from Marks");
db1.Connection = dbc1;
System.Data.OleDb.OleDbDataAdapter da = new
System.Data.OleDb.OleDbDataAdapter();
da.SelectCommand = db1;
System.Data.DataSet d = new System.Data.DataSet();
da.Fill(d);
return d;
}

Vedio Classes

<%@ Page Language="C#" MasterPageFile="~/MasterPage.master"


AutoEventWireup="true" CodeFile="video.aspx.cs" Inherits="video"
Title="Untitled Page" %>

<%@ Register assembly="FlashControl"


namespace="Bewise.Web.UI.WebControls" tagprefix="Bewise" %>

<asp:Content ID="Content1" ContentPlaceHolderID="head" Runat="Server">


</asp:Content>
<asp:Content ID="Content2" ContentPlaceHolderID="ContentPlaceHolder1"
Runat="Server"><p><img alt="" src="header1_01.gif" style="width: 6px;
height: 18px" />
<asp:Label ID="Label1" runat="server" Font-Size="Larger"
Text="VIDEO CLASSROOMS"></asp:Label>
<img alt="" src="header_03.gif" style="width: 552px; height: 18px"
/></p>

83
<p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; *
<asp:HyperLink ID="HyperLink1" runat="server"
NavigateUrl="~/vedio1.aspx" Font-Bold="True" Font-
Underline="True"> AMAZING
PHYSICS</asp:HyperLink></p>
<p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; *
<asp:HyperLink ID="HyperLink2" runat="server"
NavigateUrl="~/Vedio2.aspx"
Font-Bold="True" Font-Underline="True">ROBOT MOVEMENT OF
ARM </asp:HyperLink>
</p>
<p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; *
<asp:HyperLink ID="HyperLink3" runat="server"
NavigateUrl="~/Vedio3.aspx"
Font-Bold="True" Font-Underline="True">CREATING WEB
SERVICE</asp:HyperLink>
&nbsp;</p>
<p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; *&nbsp;<asp:HyperLink
ID="HyperLink4" runat="server"
NavigateUrl="~/video4.aspx" Font-Bold="True" Font-
Underline="True">ENGINEERING
MECHANICS</asp:HyperLink>
</p>
<p>&nbsp;</p>
<table>

<tr>
<td colspan="2" valign="top" align="center"><table width="780"
border="0" cellpadding="0" cellspacing="0">

<tbody><tr>
<td align="left" bgcolor="#2f97cf"><img src="lower_c_bg.gif"
height="16"
style="width: 126px"> </td>
<td align="left" bgcolor="#2f97cf"><div align="left"></div></td>
<td width="100%" align="left" bgcolor="#2f97cf"><marquee
onmouseover="this.stop();"

84
onmouseout="this.start();" scrollamount="3" scrolldelay="50"
style="font-weight: bold; font-size: 12px; width: 860px; height:
15px;">
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<font
color="#ffffff">Celebrating
the excellence
in education since 1999 | Looking for legal, accredited, total online
education,
Check us out | Educating our world one person at a time
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;|
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
No
set dates of enrollment and graduation.
nbsp;&nbsp;
Self-paced,
self-tailored, student-centered and competency based education.
sp;&nbsp;

Large
combination of courses and flexible choices.
nbsp;&nbsp;
Partial
tuition free education in deserving cases. </font></marquee></td>
</tr>
</tbody></table>

</td>
</tr>
</tbody>
</table>
</body>
</html>
</asp:Content>

85
86
Testing plays a critical role in quality assurance for software .Due to the limitation
of the verification methods in the previous phases ,design and requirement
modifications become necessary in the code .Testing is used to detect these error ,in
addition to the error introduced during coding phase .Testing is a dynamic method
for verification and validation, where the system is to be tested and it is executed to
observe the behavior of the system .Due to this testing the presence of fault can be
deduced.There are two method of testing: functional and structural. In functional
testing the internal logic of the system under testing is not considered and the test
cases are decided from the specification or the requirement, it is often called “Black
Box Testing”. Equivalence class partitioning , boundary analysis , and cause effect
graphic are example of the methods for selecting test cases for functional testing .in
the structural testing ,the test cases are decided entirely on the internal logic of the
programmed or module being tested .

As the goal of the testing is to detect any errors in the programme, different flavor of
the testing are often used. Unit testing are used to test a module or a small collection
of modules and the focus is on detecting coding error in module during integration
testing modules are combined into sub-system , which are then tested the goal here
is to test the system design .In the project Parcel Management and Tracking System
application we used the unit testing and functional testing.
The object oriented model should be tested for correctness, completeness and
consistency with in the context of the model syntax, semantic, and pragmatics.
The objective of object oriented testing to find the maximum number of error with a
minimum amount of effort is identical to the objective of conventional software
testing.

87
System testing is a critical phase in system implementation .testing of a system
involves hardware device testing, debugging of computer programs and testing
information processing procedure .testing can be done with test data, which attempts
to simulate all possible condition that may arise during processing.The testing
methods adopted in the testing of the system were independent unit testing and
system testing.

System Testing

One of the main requirements of the software development is to develop bug free,
reliable system. During the process of development of any application there is
always a possibility of some errors being developed. And also the software may not
be as user asked for. Thus, it becomes imperative that, the software should be
checked at every step. This helps in a bug free reliable system. If there is any bug or
alterations that have to be made that can be done at the preliminarily level as the
application gets more complicated after every step.

The objective of the testing is to discover bugs and malfunctioning of the


application. To fulfill the objective, a series of test steps such as Unit testing,
Validation testing, system testing were planned and executed. Testing objective
include:

 Testing is a process of executing a program with the intent of finding an error.


 A good test case is one that has a high probability of finding an undiscovered
error.
 A successful test is one that uncovers an undiscovered error.

Testing Approaches:

Following are main types of tests software undergoes:

Black Box Testing:

Black box testing relates to tests that are performed at the software interface.
Although they are designed to identify errors, black box tests are used to

88
demonstrate that software functions are operational; that inputs are correctly
accepted and the output is correctly produced.

White Box Testing:

White box testing is test case design approach that employs the control architecture
of the procedural design to produce test cases. Test case can be derived such that
they:

 Guarantee that all independent paths within a module have been exercised at
least once,
 Exercise all logical decisions on their true and false sides,
 Execute all loops at their boundaries and within their operational bounds and
 Exercise internal data structures to ensure their validity.

Unit Testing:

This test focuses verification effort on the small unit of design module. Here using
test plans prepared in design descriptions as guide, important control paths are tested
to uncover errors within boundary of the module.
Boundary condition are tested to ensure module operate properly at boundaries
established to limit or restrict processing. All paths in the control structure are
exercised to ensure all statements in a module are executed at least once and finally
all errors handling paths are tested to see message are intelligent. Corresponds to
errors, encountered and provide enough description for the cause of error.

Integration Testing:

The focus of the test here is on, the design and construction of software architecture.
This is a systematic technique for construction the program structure and conducting
tests to uncover errors associated with interfacing. The objective here is to take unit-
tested module and build a program that is dictated by signs. All fractions are
integrated successfully after successful completion of development and unit testing.

89
Validation Testing:

At the culmination of integration testing, software is completed assembled as a


package, interfacing errors have been uncovered and corrected and a final series of
software testing, validation test begins.

Validation succeeds when the software functions in manner that can be reasonably
expected by the customer. Software validation is achieved through a series of black
box tests that demonstrates the conformity of the requirements.

After validation testing have been conducted one of the two possibility exits.

 The performance characteristic confers to specification and acceptance.


 A deviation from specification is uncovered and deficiency list is created.

Deviation or errors discovered at the step in this system with the help of the user by
negotiating to establish a meeting for resolving differences.

Output Testing:

After performing the validation testing, the next step is output testing of the
proposed system, since system be useful if it does not produce the required output in
the required format. Hence the output format is considered in two ways: one is on
the screen and another is the printed format. Both need to be shown to the user for
his comments.

User Acceptance Testing:

User acceptance of a system is the key factor for the success of any system. This is
done with regard to following points:

 Input screen design.


 Output screen design.
 On-line guide to the user.
 Menu driven system.
 Format of output, both on the screen and on the hard copy.

90
Implementation and Maintenance

91
Software maintenance is the last phase in the software Engineering process
that eliminates errors in the working system during its work span and to tune the
system to any variation in its working environment .the system requires maintenance
as there may be changes and requirements in the organizational needs , government
policies ,hardware and software environment etc. often small system deficiencies are
found as a system is brought into operation and changes are made to remove
them .System requirements may be revised as a result of system usage or changing
operational needs . perhaps oversight that occurred during the development process
need to be corrected .Often the maintenance need arises to capture additional data
for storage in a database or in transaction files or perhaps it may be necessary to add
error detection features to prevent system users from in adversely taking an
unwanted action.

Maintainable Design

The points to reduce the needs for maintenance are :


 More accurately defining the users requirements during the system
development.
 Assembling better system documentation.
 Using more effective methods for designing process logic and
communicating it to project team member.
 Making better use of existing tools and techniques.
 Managing the system engineering process effectively.

APPLICATIONS

92
The project has been developed for online skill test for students.
The main application of project is for conducting examination online. It can be

 Used to conduct Online mid semester test for students

 Used to conduct online certification by applying e-commerce application

 Used to conduct online mock test for students

 Used to conduct online aptitude test for companies

These are various applications in what way project can be implemented.


To use this project for many purposes only requirement is to change database
according to need and slight change in coding.

93
Future Scope

 The admin part should also be converted to net based, to provide


accessibility from any where.

 Some extra reporting can be added to the projects.

 The system can have collaboration with certain other similar sites, to get
question bank from their databases.

 There is possibility that a group of sites can be created so that user of


one site can be authenticated in all the sites of the group.

 The data transfer should be done in encrypted form.

94
APPENDICES

INTRODUCTION TO HTML

Hyper Text Markup Language (HTML) is the encoding scheme used to

create and format a web documents. A user need not be an expert programmer

to make used of HTML to create hypertext documents that can be put on the

Internet.

ORIGIN OF THE HTML

HTML is not an invention but is an improved version of Standard

Generalized Markup Language (SGML), Tim Berners-Lee at cem designed the

original HTML document type in 1990. In 1992, Dan Connolly wrote the

HTML Document Type and a brief HTML specification. Since 1993, cross-

sections of the people have contributed to the evolution of the HTML

specification and in 1994, Dan Connolly and Karen Olson Muldrow rewrote the

HTML specification, which is now written by Dave Raggett and can be obtained

from :: http:/www.UK.hpl.hp.co.UK/peoples.dsr/

95
EVOLUTION OF HTML

HTML evolved in the following four stages:

# Level 0 - included only basic structural elements.

# Level 1 - advanced features included highlighted text and

graphics that were supported depending on the browser capability.

# Level 2 - introduced the World Wide Web as an interactive medium and the

feature of fill out forms on the Internet.

# Level 3 - introduced frames inline, videos, sound etc.

IMPORTANCE OF HTML

HTML can be used to display any type of document on the host

computer, which can be geographically at a different location. It is a versatile

language and can be used on any platform or desktop. Being platform

independent, HTML indicates the manner in which the document is to be read by

the interpreter. This can be done be a set of HTML element, which markup

the document and inform the browser like the Internet Explorer above the action

to be taken when a certain element is specified.

The appearance of the Web page is important, and HTML provides stage

to make a document look attractive. Using graphics, fonts, different sizes, color

96
etc, can enhance a presentation of the document. This language allows the

creation of Hypertext Links, also known as hyperlinks, to other documents are

some portions of the same documents.

There is no limit to the time and -type of information that can be

disseminated through the web pages by using this versatile language. For

example, many companies to publicize their products are using web pages using

HTML language.

HTML AND THE WORLD WIDE WEB

Wide-area Hypermedia information retrieval initiative aiming to give a

universal access to a universe of documents.

# Created in 1991-1992 by Tim Bernersa-Lee, CERN, Geneva

# Hypertext based multimedia browser

# Client-server architecture

# Provides a virtual cohesive view of all information sources. It provides an

easy-to use GUI and hook into many services.

97
ELEMENT OF THE WEB

Hyper Text Transfer Protocol - HTTP

Hyper Text Markup Language - HTML

1. The HTTP Server (httpd winhttpd)

2. The HTTP client (mosaic, Netscape)

3. Display Utilities (helper applications)

4. Uniform Resource Locators (URLS)

URLs in HTML

Uniform Resource Locator (URL) locates the document to be retrieved

when a user clicks on a "Hypertext Link. URL is similar to file name except that

in this case, the file can be on the same machine or on a different in the network.

Here are some conventions to be followed while writing URL's.

The file retrieval method varies, depending on the type of the document

to be retrieved. The URL need not always point to a document that can also point

to a query, image are the result of the command. It is the reference address of the

document used on the Internet. The format of a URL is very important.

98
INTRODUCTION TO HTML ELEMENTS
There are various HTML tags or HTML elements used to construct an

HTML file. Each HTML document corresponds to a single page. An HTML tag

comprises left angular bracket (<), a less than symbol followed by the name of

the tag and closed by a right angular bracket (>).

HTML elements can be categorized as container elements and empty

elements. Container elements are paired and have a starting and ending tag. The

end tag is identical to the start tag except that it has a slash that precedes the text

within the angular brackets. The parameters of the elements are placed between

the start and the end tag.

Empty elements do not have the end tag but only the start tag. An empty

element takes attributes that are given within angular brackets along with the tag

name.

WEB SERVERS AND HTTP

A World Wide Web server is a program that answers request for

documents from clients (browsers) over the Internet. Web Servers perform a

number of tasks such as:-

# Logging activities.

99
# Authenticating Users.

Recording the Internet address, the time and the details of request made from

each connection.

# Protecting the files from non-authenticating users.

Accepting and forwarding request for data Web Servers transfers hypertext

documents i.e. there is no continuation connection between the server and the

client. The server simply receives the request from the browser at which

connection is served.

If the browser wants more data, a new connection is established. This is

one transaction and out delivery mechanism. Hence, every time a browser

requests data and a new session are established between the browser and the

server.

Using HTTP it is possible to exchange various kinds of data files -HTML

documents graphics, video, sounds and so on. The files being sent by the server

are identified by the browser from the MIME (Multimedia Internet Mail

Extension Head)

Http provides access to other Internet Protocols,

# File Transfer Protocols (FTP)

# Gropher

100
# Terminal Emulation (Telnet)

TELNET:

Telnet Internet tool enables us to login to another host computer on the

Internet, Many companies provide Guest Login, which can be accessed through

Telnet, It has two operating modes.

1. Command Mode :

This mode can be used to open, close and quit the remote host Computer.

2. Input Mode :

This mode can be used for inputting different forms.

INTRODUCTION TO .NET
The .NET Framework is an integral Windows component that-supports

building and running the next generation of applications and XML Web

services. The .NET Framework is designed to fulfill the following objectives:

• To provide a consistent object-oriented programming environment

whether object code is stored and executed locally, executed

locally but Internet-distributed, or executed remotely.

• To provide a code-execution environment that minimizes software

deployment and versioning conflicts.

101
• To provide a code-execution environment that promotes safe

execution of code, including code created by an unknown or semi-

trusted third party.

• To provide a code-execution environment that eliminates the

performance problems of scripted or interpreted environments.

• To make the developer experience consistent across widely varying

types of applications, such as Windows-based applications and

Web-based applications.

• To build all communication on industry standards to ensure that code based on

the .NET Framework can integrate with any other code.

The .NET Framework has two main components: the common

language runtime and the .NET Framework class library. The common language

runtime is the foundation of the .NET Framework. You can think of the runtime

as an agent that manages code at execution time, providing core services such as

memory management, thread management, and remoting, while also enforcing

strict type safety and other forms of code accuracy that promote security and

robustness.

102
In fact, the concept of code management is a fundamental principle of

the runtime. Code that targets the runtime is known as managed code, while code

that does not target the runtime is known as unmanaged code. The class library,

the other main component of the .NET Framework, is a comprehensive, object-

oriented collection of reusable types that you can use to develop applications

ranging from traditional command-line or graphical user interface (GUI)

applications to applications based on the latest innovations provided by

ASP.NET, such as Web Forms and XML Web services.

The .NET Framework can be hosted by unmanaged components that

load the common language runtime into their processes and initiate the execution

of managed code, thereby creating a software environment that can exploit both

managed and unmanaged features. The .NET Framework not only provides

several runtime hosts, but also supports the development of third-party runtime

hosts.

103
FEATURES OF .NET
• Rich Functionality out of the box

.NET framework provides a rich set of functionality out of the box.

It contains 100 of classes that provide the verity of functionality ready to

use in your applications. This means that as a developer you need not to go

into low level details of many operation such as file I/O, network

communication and, so on.

• Easy development of web Application

ASP.Net is a technology available on .Net platform for developing

dynamic and data driven web applications. ASP.NET provides an event

driven programming model with complex user

interface.

• OOPs Support

.NET provides a fully object oriented environment. The philosophy

of .NET is "object is mother of all". A language like Visual Basic.NET now

supports many of the 00 features that was lacking traditionally.

104
• Multi Language Support

.NET provides something attractive in this area. It support multiple

languages. This meaning that if you have skills in C++, you need not throw

them but just mould them to suit .NET environment. Currently four

languages are available right out of the box namely- Visual Basic.NET, C#,

Jscript.NET and managed C++. The beauty of multi language support lies in

the fact that even though the syntax of each language is different, the basic

capabilities of each language remain at par with one another.

• Automatic Memory Management

While developing applications developers had to developed an eye on

system resources like memory. Memory leaks were major reason in failure

of applications. .NET takes this worry away from developer by handling

memory on its own. The garbage collector takes care of freeing unused

objects at appropriate intervals.

• Compatibility With COM And COM+

Before the introduction of .NET, COM was the de-facrto standard for

componentized software development. Companies hava invested lot of

money and efforts in developing COM components and controls. The good

news is you can still use COM components and ActiveX controls

under .NET.

105
• No More DLL Hell
If you have worked with COM components, you are aware of "DLL

hell". DLL conflicts are common fact in COM world. COM components

require registrations in the system registry. .NET ends this DLL hell by

allowing applications to use their own copy of dependents DLLs. Also .NET

components do not require any kind of registration in system registry.

• Strong XML Support

Currently .NET is the only platform that has build with XML rights

into the core framework. .NET tries to harness power of XML in every

possible way. In addition to provide support for manipulating and

transforming XML documents, .NET provides XML web services that are

based on standards like HTTP, XML and SOAP.

• Easy Of Deployment And Configuration

Deploying windows applications especially that used COM components

were always tedious task. Since .NET doesn't require any registration as

such, much of the deployment is simplified. This makes XCOPY

deployment viable. Configuration is another area where .NET- especially

ASP.NET- shines over traditional languages. The configuration is done via

special file having special XML vocabulary.

106
• Security

Microsoft has taken great effort to make .NET platform safe and secure

for enterprise applications. Features such as type safety, code access security

and role based authentication make over all application more robust and

secure.

INTRODUCTION TO ASP.NET
ASP.NET is a unified Web development model that includes the

services necessary for you to build enterprise-class Web) applications with a

minimum of coding. ASP.NET is part of the .NET Framework, and when coding

ASP.NET applications you have access to classes in the .NET Framework. You

can code your applications in any language compatible with the common

language runtime (CLR), including Microsoft Visual Basic, C#, JScript .NET,

and J#. These languages enable you to develop ASP.NET applications that

benefit from the common language runtime, type safety, inheritance, and so on.

ASP.NET includes:

• A page and controls framework

• The ASP.NET compiler

• Security infrastructure

107
• State-management facilities

• Application configuration

• Health monitoring and performance features

• Debugging support

• An XML Web services framework

• Extensible hosting environment and application life cycle

management

• An extensible designer environment

INTRODUCTION TO C#

A programming language designed for building enterprise

applications that run on the .NET Framework. C#, which is an evolution of C and

C++, is type safe and object oriented. Because it is compiled as managed code, it

benefits from the services of the common language runtime, such as language

interoperability, security, and garbage collection.

C# syntax is highly expressive, yet with less than 90 keywords, it is also

simple and easy to learn. The curly-brace syntax of C# will be instantly

recognizable to anyone familiar with C, C++ or Java. Developers who know any

of these languages are typically able to begin working productively in C#

108
within a very short time. C# syntax simplifies many of the complexities of C++

while providing powerful features such as nullable value types, enumerations,

delegates, anonymous methods and direct memory access, which are not found

in Java. C# also supports generic methods and types, which provide increased

type safety and performance, and iterators, which enable implementers of

collection classes to define custom iteration behaviors that are simple to use by

client code.

109
Reference

Websites:

 www.google.com
 www.asp.net
 www.apress.com
 www.ineta.org

Books:

 ASP.Net Bible
 Beginning ASP.NET 2.0 with C# - Wrox
 Pro Asp.net with c# second edition

110

You might also like