Virtual Class Room System
Virtual Class Room System
ON
“VIRTUAL CLASSROOM SYSTEM”
Submitted in partial fulfillment of
THE REQUIREMENT FOR THE AWARD OF DEGREE OF
BACHELOR OF TECHNOLOGY
Submitted By:
Ranjeet Singh 0505410075 Fourth Year
Rishabh Kapoor 0505410079 Fourth Year
Rohit Dung 0505410082 Fourth Year
Sandeep Srivastava 0505410086 Fourth Year
Tejaswa Kumar 0505410109 Fourth Year
CERTIFICATE
2
ABSTRACT
3
ACKNOWLEDGEMENT
4
5
TABLE OF CONTENTS
Certificate
Abstract
Acknowledgement
List Of Tables
Project Description
Feasibility Study
Requirement Analysis
Project- Modules
Language & Platform
Designing ( DFD, modular design, ER diagram, )
Algorithm
Coding
Testing
Maintenance & Implementation
Applications
Future Enhancement
Appendices
References
6
7
Database Tables
DEPARTMENT
LOGIN
8
RESULT:
STUDENT PAYMENT
9
STUDENT
10
STUDENT EDUCATION
11
RELATIONSHIP
12
13
Project Description
Virtual University provides the platform to the students for less expensive
education, so that it can be accessed directly by the user any time, any
where .We have visiting option on internet,. The latest inclusion in this
online list is that of on line exams or tests.
The proposed system falls under second category, the system will provide
the users with option to test them selves in different subjects free of
cost .The software will be user friendly so that any novice can easily
accessed it. The proposed system will be based on Client/ Serer
architecture with new functionality, the first layer will be user layer (the
web based part where user will operate), the second layer will be business
layer and the last layer will be database layer which will be used to store
the data.
1. Students can choose courses, attend lectures, take exams, view their
attendance records, progress reports etc as per their convenience.
2. Registration for multiple courses.
3. Attend lectures either at the scheduled time or on request view lecture at a
later time.
14
5. Upload and Download of various assignments, college notices, student's
notices, journals, videos.
6. There can be forums, blogs etc to discuss various queries and to put up
suggestions posted both by students and teachers.
7. Administrator can generate reports, log files, backup/recovery of data at
any time.
8. Shared documents and media library that can help in active learning of a
student.
9. Images library.
15
16
Feasibility Study
The feasibility study is carried out by a small group of people (some times
even one or two) who are familiar with information system techniques,
understand the part of the business or organization that will be involved or
affected by the project, and are skilled in the systems analysis and design
process. People typically responsible for feasibility assessment are experienced
analysts or managers.
17
Economic and financial Feasibility
Costs:
The costs can be viewed as being both – One time costs and Recurring costs.
One-time Costs:
Are the development costs that will not occur after the project has been
completed? These costs typically encompass activities such as Salary of
Personal, Hardware and Software costs, User Training, Site Preparation, and
Data or System Conversion.
Recurring Costs: Are the annual operating costs that tend to recur throughout the
lifetime of the System. For e.g. Maintenance costs, Incremental data storage
expense etc. Both one time and recurring costs can be classified as:
18
costs can not be easily measured in term of dollars and with certainty e.g.
operational inefficiency, employee morale, or customer goodwill.
Technical Feasibility
19
Operational Feasibility
Operational Feasibility is a measure of how well the solution will work in the
organization. It is also a measure of how people feel about the system/project.
Will the system be used if it is developed and implemented? Will there be
resistance from users that will undermine the possible application benefits?
Systems that have substantial and widespread impact on an organization’s
structure or procedures are typically riskier projects to undertake. Thus it is
important to have a clear understanding of how an IS will fit into current day-to-
day operations of the organization.
Operational Feasibility is the willingness and ability of the management,
employees, customers, suppliers, and others to operate, use, and support a
proposed system. For examples, if the software for new systems is too difficult
to use, employees may make too many error sand avoid using it. Thus, it would
fail to show operational feasibly.
To be judged feasible, a project proposal must be pass all the tests. Otherwise, it
is not a feasible project. For example, a personal record system that is financially
feasible and operationally attractive is not feasible if the necessary technology
does not exist. A medical system that can be developed at reasonable costs but
that nurses will avoid using cannot be judged operationally feasible. Apart from
technical, operational and financial feasibility, numerous other issues can
influence the success of the project. They are : Schedule feasibility, Legal &
Contractual feasibility, Political feasibility and Organizational feasibility.
20
21
Requirement Analysis
Identification of need –
The most important step in the life cycle of any software is to identify the basic
needs of the system. This step requires the study of the fact that, why the
software is required and also if it is required what are the features required by
the system, because of this information is not gathered correctly, the ultimate
result will certainly be a defective one.
All the above given information can be extracted by using following
options –
• Observation
• Interview with target clients
• Questionnaires
I have used all the above given methods to gain the basic requirement of the
system / I have talked to the responsible person of many educational
organization about what they think of the existing exam system , how and what
data they manage , what are the expectations with the system and the problems
facing with the existing system .
I have also talked to the students about the examination system they currently
have. I have asked them about the best things they like about there system and
also what are the changes they expected there system to have.
After all these information searching I have found the basic requirements, which
are listed here after. The proposed software is to be designed for a network based
examination system. The need for the system is obvious. Any educational
organization will easily be agreed to buy the system. Each and every
organization requires a system to evaluate its student. Most of them uses the
manual system of examination, but due to increase use of computer these days, it
is clear that computer based system will be the main mode of examination in the
future.
Another point which should be mentioned here that if an organization uses the
on line examination system, the management will have full control over which
student can opt for which paper or subject. If the system under consideration is a
22
server based system the questions, answers or other details will have to be only
manage at central server.
Another expectation from the software is that student and management can stay
in their room and still carry out their work. To make such features work some
existing, wide spread network should be use d, which will obviously be internet.
Another point which comes out of the requirement analysis is that, the proposed
system must be very scalable, secure and must be able to handle large number of
users simultaneously. From management point of view, the most important
requirement, which is not available in the existing system, is the generation of
reports. The management wants reports about every aspect of the data; they want
reports about student, exams, etc.
SYSTEM REQUIREMENTS
SOFTWARE REQUIREMENTS
PLATFORM Windows 9X\NT onwards
TECHNOLOGY ASP.NET
LANGUAGE C#
RDBMS SQL Server 2005
IDE .NET Framework & IIS
GRAPHICS SOFTWARE Visual Studio 8.0
BROWSER Internet Explorer 6.0
HARDWARE REQUIREMENTS
PROCESSOR Celeron or Pentium onwards
COMPUTER with 600Mhz or faster
MEMORY 512MB onwards
HARD DISK 20 GB
RESOLUTION 800*600 or higher
KEYBOARD & MOUSE
23
24
Project- Modules
Admin part
The admin part will let the admin manage the Question bank, client’s records
and also the options for backup the database and also to restore in case of any
problem.
Client part
Another part, which is client part, will be web based to provide every time
functionality. it will let the client create his / her id which can be used to
participate in test available , it will let the client login to the site , select the
subject go thru test get the result printed in graphical format . Client can also
compare his / her marks with the other user.
DESCRYPTION OF MODULES:
The website “Lucknow City Portal ” is very informative for the users, as
the job seekers search the jobs and apply for them as well as for the
various companies, as the companies registered them at this web site and
registered the vacant jobs. The key benefit of this web site is that the
companies maintain their account.
1) Registered User,
2) New Users registration,
3) Admin Authentication,
4) Modification of User
5) Deletion of User
25
Descriptions of the modules: -
Registered User
This module is mean to authenticate the user of the site. It uses the database for
authentication. Only Registered user can give test of selected subject.
In this module the new user who wants to get registration in this web side to
give test or to check his/her skill, can get registration in this web side. And
after getting registration it will get the user’s account name and password..
Admin Authentication
This module is mean to check the admin authentication of the site. It
uses the database for check the authentication. The administrators of the
site handle this module. In this module there are two fields
Admin_id
Password
Modification of User
Deletion of User
In this module the administration of the site can delete account of that
user who has not given test for many times or which user is not eligible
for test.
26
27
Language & Platform
ASP
ASPNET IS NOT ONLY the latest version of Microsoft's Active Server Pages
(ASP), it is a whole new programming concept altogether. This incredibly
popular server-side scripting language is based on the .NET Framework, and it
combines unrivalled developer productivity with performance and reliability.
Dreamweaver MX 2004 is the newest version of the popular integrated web site
design tool. It enables quick and efficient web site design and programming and
comes with built-in support for A!3P.NET and XML web services. Whether you
are an experienced ASENET developer and Dreamweaver user or a beginner,
this book guides you through the web-development process at the right level. It
shows you how to rapidly develop ASPNET web applications with a minimum
of effort. You learn about the .NET Framework, how ASENET fits in and
interacts with other components, and how to master the ASENET controls via
Dreamweaver MX 2004. The .NET Framework Using and extending the
Drearnweaver MX 2004 interface ASENET programming in VB .NET Using
and expanding ASENET controls Interacting with databases Using server
behaviors in Drearnweaver MX 2004 Creating data-driven ASENET
applications Incorporating XML web services
Backing up a Database:
28
(undo) uncompleted transaction. Backing up a transaction log was last backed
up.
A transaction log backup records the state of the transaction log at the
time the backup operation starts.
Restoring a Database:
Restoring a database backup returns the database to the same state it has in
when the backup was created. Any incomplete transactions in the database
backup,(transaction that were not complete when the backup operation
completed originally), are rolled back to ensure the database remains
consistent.
29
30
DATA FLOW DIAGRAM OF THE SYSTEM
Level 1 DFD:
31
Level 2 DFD:
Login
32
Student Information Management
(ii) ER Diagrams:
33
34
Project Output Screen
ABOUT US
35
STUDY CENTERS
36
ENROLLMENT FORM
LOGIN
37
38
POWERPOINT PRESENTAION
39
VIDEO CLASSROOMS
LIBRARY
40
41
ASSIGNMENT UPLOAD
42
EMAIL
43
44
45
46
47
48
We have used Security socket layer protocol for security of
transition in our site.
Description of SSL is given below:-
Security of data in transit over the Internet becomes increasingly necessary because
of steadily growing data volume and importance. Nowadays, every user of a public
network sends various types of data, from email to credit card details daily, and he
would therefore like them to be protected when in transit over a public network. To
this end, a practical SSL protocol has been adopted for protection of data in transit
that encompasses all network services that use TCP/IP to support typical application
tasks of communication between servers and clients.
The SSL protocol was originally developed by Netscape, to ensure security of data
transported and routed through HTTP, LDAP or POP3 application layers. SSL is
designed to make use of TCP as a communication layer to provide a reliable end-to-
end secure and authenticated connection between two points over a network (for
example between the service client and the server). Notwithstanding this SSL can be
used for protection of data in transit in situations related to any network service, it is
used mostly in HTTP server and client applications. Today, almost each available
HTTP server can support an SSL session, whilst IE or Netscape Navigator browsers
are provided with SSL-enabled client software.
49
SSL objectives and architecture
Which problems does SSL target? The main objectives for SSL are:
Authenticating the client and server to each other: the SSL protocol supports
the use of standard key cryptographic techniques (public key encryption) to
authenticate the communicating parties to each other. Though the most
frequent application consists in authenticating the service client on the basis of
a certificate, SSL may also use the same methods to authenticate the client.
Ensuring data integrity: during a session, data cannot be either intentionally or
unintentionally tampered with.
Securing data privacy: data in transport between the client and the server must
be protected from interception and be readable only by the intended recipient.
This prerequisite is necessary for both the data associated with the protocol
itself (securing traffic during negotiations) and the application data that is sent
during the session itself. SSL is in fact not a single protocol but rather a set of
protocols that can additionally be further divided in two layers:
1. the protocol to ensure data security and integrity: this layer is composed of the
SSL Record Protocol,
2. the protocols that are designed to establish an SSL connection: three
protocols are used in this layer: the SSL Handshake Protocol, the SSL
ChangeCipher SpecPprotocol and the SSL Alert Protocol.
SSL uses these protocols to address the tasks as described above. The SSL record
protocol is responsible for data encryption and integrity. As can be seen in Figure 2,
it is also used to encapsulate data sent by other SSL protocols, and therefore, it is
also involved in the tasks associated with the SSL check data. The other three
50
protocols cover the areas of session management, cryptographic parameter
management and transfer of SSL messages between the client and the server. Prior
to going into a more detailed discussion of the role of individual protocols and their
functions let us describe two fundamental concepts related to the use of SSL .
51
According to the specification, the SSL connection state is defined by the
following parameters:
Server and client random: random data generated by both the client and server
for each connection,
Server write MAC secret: the secret key used for data written by the server,
Client write MAC secret: the secret used for data written by the client,
Server write key: the bulk cipher key for data encrypted by the server and
decrypted by the client,
Client write key: the bulk cipher key for data encrypted by the client and
decrypted by the server,
Sequence number: sequence numbers maintained separately by the server for
messages transmitted and received during the data session.
The abbreviation MAC used in the above definitions means Message Authentication
Code that is used for transmission of data during the SSL session. The role of MAC
will be explained further when discussing the record protocols. A brief description
of the terms was necessary to be able to explain the next issues connected with the
functioning of the SSL protocol, namely the SSL record protocol.
52
primary data,
some padding to complete the datagram as required,
MAC value.
MAC is responsible for the verification of integrity of the message included in the
transmitted record. It is the result of a hash function that follows a specific hash
algorithm, for example MD5 or SHA-1. MAC is determined as a result of a hash
function that receives the following data:
MAC = Hash function [secret key, primary data, padding, sequence number].
A secret key in creation of MAC is either a client write MAC secret or a server write
MAC secret respectively, it depends on which party prepares the packet. After
receiving the packet, the receiving party computes its own value of the MAC and
compares it with that received. If the two values match, this means that data has not
been modified during the transmission over the network. The length of the MAC
obtained in this way depends on the method uses for its computing. Next, the data
plus the MAC are encrypted using a preset symmetric encryption algorithm, for
example DES or triple DES. Both data and MAC are encrypted. This prepared data
is attached with the following header fields:
53
Figure 3:. Creating a packet under SSL record protocol
The SSL record protocol is used to transfer any data within a session - both
messages and other SSL protocols (for example the handshake protocol), as well as
for any application data.
54
55
CODING
Coding transforms the design of the system produced during the design phase into
code in a given programming language, which can be executed by a computer and
then performs the computation specified by the design.
The coding phase affects both testing and maintenance to great extent. Thus the goal
of a programmer is to simplify the job of tester and the maintainer. The time spent
in coding is a small percentage of the of the total software cost but as stated
optimized code makes the job of tester and maintainer easier so coding should be
done very carefully taking these factors into account.
There are many factors for judging a program. Some of them are:
* Readability
* Program Size
* Execution Time
* Memory Required
Weinberg Experiment:
In this experiment each team were given the same program for which they had to
develop a program. However each of them was given a different objective. It was
found in most cases that each team did the best for the given objective.
Some of the objectives were: Minimized Effort, Minimized Number of Statement,
Minimized Memory Required, Maximized Program Clarity and Maximized Output
clarity. The experiment clearly shows that if objectives are clear, programmer tend
to achieve that objective. For our purposes ease of understanding and modification
should be the basic goals of the programming activity.
56
CODE OPTIMIZATION:
It has been said that good programming practice is very essential for making testing
and maintenance easier. There are a number of ways to optimize a code in a given
programming language. The coding should always be done using standard
programming practices. Some of the programming practices are:
In Top-Down style implementation starts from the top of the hierarchy and proceeds
to the lower level. First the main module is implemented and then its subordinates
are implemented, and their subordinates and so on.
In Bottom-Up Style the implementation starts with implementation of the modules at
the bottom of the hierarchy and proceeds through the higher levels until it reaches
the top.
Structured Programming:
The goal of structured programming is to ensure that the static structure and the
dynamic structure are the same. That is the objective of structured programming
is to write programs so that the sequence of statements executed during program
execution is same as the sequence of statement in the text of the program. The
main emphasis on structured programming is the minimum use of 'Go To'.
Information Hiding:
Information hiding prevents open manipulation of data and disallows the functions
of other modules from accessing data of a different module. That is the information
captured in a data structure should be hidden from the rest of the system. It reduces
the coupling between modules and makes the system more maintainable.
Programming Style:
The general rules that are used in programming are given below:-
57
User-Defined Types: Modern languages allow users to define types like the
enumerated type.
Nesting: The different control constructs, particularly the if-then-else can
be nested.E.g: -
if C1 then S1
else if C2 then S2
else if C3 then S3
else if C4 then S4
Module size: It should be taken into consideration i.e. large modules are
not functionally cohesive and too small modules incur unnecessary overhead.
Module Interface: Modules with complex interface should not be used.
Internal Documentation:
Internal documentation of program is done by the use of comments. Comments are
textual statements that are meant for the program reader and are not executed.
Comments, if properly written and kept consistent with the code, can be invaluable
during maintenance. Comments should be provided for blocks of code, particularly
those parts of code that is hard to follow. Comments for a module are called
Prologue for the module. Providing comments for a module is most useful.
58
Admin
<br />
<img alt="" src="header1_01.gif" style="width: 6px; height: 16px" />
<asp:Label ID="Label1" runat="server" Font-Size="Larger"
Text="ADMINISTRATOR"></asp:Label>
59
NavigateUrl="~/EmployeeDetail.aspx">MAINTAIN EMPLOYEES
DETAIL</asp:HyperLink>
</li></p>
<li>
<p><asp:HyperLink ID="HyperLink5" runat="server">MAINTAIN
LOG</asp:HyperLink>
</p>
<li>
<p><asp:HyperLink ID="HyperLink6" runat="server"
NavigateUrl="~/AdminSend.aspx">SEND USERID AND
PASSWORD</asp:HyperLink>
</p>
</ol><tr>
<td colspan="2" valign="top" align="center"><table width="780"
border="0" cellpadding="0" cellspacing="0">
<tbody><tr>
<td align="left" bgcolor="#2f97cf"><img src="lower_c_bg.gif"
height="16"
style="width: 126px"> </td>
<td align="left" bgcolor="#2f97cf"><div align="left"></div></td>
<td width="100%" align="left" bgcolor="#2f97cf"><marquee
onmouseover="this.stop();"
onmouseout="this.start();" scrollamount="3" scrolldelay="50"
style="font-weight: bold; font-size: 12px; width: 860px; height:
15px;">
<font
color="#ffffff">Celebrating
the excellence
in education since 1999 | Looking for legal, accredited, total online
education,
Check us out | Educating our world one person at a time
|
No
set dates of enrollment and graduation.
Self-paced,
60
self-tailored, student-centered and competency based education.
Large
combination of courses and flexible choices.
Partial
tuition free education in deserving cases. </font></marquee></td>
</tr>
</tbody></table>
</td>
</tr>
</tbody>
</table>
</body>
</html>
</asp:Content>
Admin Allocate
61
<asp:HyperLink ID="HyperLink1" runat="server"
NavigateUrl="~/login.aspx">LOGOUT</asp:HyperLink>
<br />
<br /> <asp:GridView
ID="GridView1" runat="server" AutoGenerateColumns="False"
CellPadding="4"
DataKeyNames="username" DataSourceID="SqlDataSource1"
EmptyDataText="There are no data records to display."
ForeColor="#333333"
GridLines="None">
<FooterStyle BackColor="#1C5E55" Font-Bold="True"
ForeColor="White" />
<RowStyle BackColor="#E3EAEB" />
<Columns>
<asp:CommandField ShowDeleteButton="True"
ShowSelectButton="True" />
<asp:BoundField DataField="username" HeaderText="username"
ReadOnly="True"
SortExpression="username" />
<asp:BoundField DataField="category" HeaderText="category"
SortExpression="category" />
<asp:BoundField DataField="password" HeaderText="password"
SortExpression="password" />
</Columns>
<PagerStyle BackColor="#666666" ForeColor="White"
HorizontalAlign="Center" />
<SelectedRowStyle BackColor="#C5BBAF" Font-Bold="True"
ForeColor="#333333" />
<HeaderStyle BackColor="#1C5E55" Font-Bold="True"
ForeColor="White" />
<EditRowStyle BackColor="#7C6F57" />
<AlternatingRowStyle BackColor="White" />
</asp:GridView>
<asp:SqlDataSource ID="SqlDataSource1" runat="server"
ConnectionString="<%$ ConnectionStrings:masterConnectionString1
%>"
62
DeleteCommand="DELETE FROM [Login] WHERE [username] =
@username"
InsertCommand="INSERT INTO [Login] ([username], [category],
[password]) VALUES (@username, @category, @password)"
ProviderName="<%$
ConnectionStrings:masterConnectionString1.ProviderName %>"
SelectCommand="SELECT [username], [category], [password] FROM
[Login]"
UpdateCommand="UPDATE [Login] SET [category] = @category,
[password] = @password WHERE [username] = @username">
<DeleteParameters>
<asp:Parameter Name="username" Type="String" />
</DeleteParameters>
<InsertParameters>
<asp:Parameter Name="username" Type="String" />
<asp:Parameter Name="category" Type="String" />
<asp:Parameter Name="password" Type="String" />
</InsertParameters>
<UpdateParameters>
<asp:Parameter Name="category" Type="String" />
<asp:Parameter Name="password" Type="String" />
<asp:Parameter Name="username" Type="String" />
</UpdateParameters>
</asp:SqlDataSource>
<br />
<asp:Label ID="Label2" runat="server" Font-Bold="True" Font-Size="X-
Large"
Font-Underline="True" Text="INSERT"></asp:Label>
<br />
<br />
<asp:DetailsView ID="DetailsView1" runat="server"
AutoGenerateRows="False"
BackColor="LightGoldenrodYellow" BorderColor="Tan"
BorderWidth="1px"
CellPadding="2" DataKeyNames="username"
DataSourceID="SqlDataSource1"
63
DefaultMode="Insert" ForeColor="Black" GridLines="None"
Height="50px"
Width="125px">
<FooterStyle BackColor="Tan" />
<PagerStyle BackColor="PaleGoldenrod" ForeColor="DarkSlateBlue"
HorizontalAlign="Center" />
<Fields>
<asp:BoundField DataField="username" HeaderText="username"
ReadOnly="True"
SortExpression="username" />
<asp:BoundField DataField="category" HeaderText="category"
SortExpression="category" />
<asp:BoundField DataField="password" HeaderText="password"
SortExpression="password" />
<asp:CommandField ShowInsertButton="True" />
</Fields>
<HeaderStyle BackColor="Tan" Font-Bold="True" />
<EditRowStyle BackColor="DarkSlateBlue" ForeColor="GhostWhite" />
<AlternatingRowStyle BackColor="PaleGoldenrod" />
</asp:DetailsView>
<br /
>
<br />
<br /><tr>
<td colspan="2" valign="top" align="center">
<table width="780" border="0" cellpadding="0" cellspacing="0">
<tbody><tr>
<td align="left" bgcolor="#2f97cf"><img src="lower_c_bg.gif"
height="16"
style="width: 126px"> </td>
<td align="left" bgcolor="#2f97cf"><div align="left"></div></td>
<td width="100%" align="left" bgcolor="#2f97cf"><marquee
onmouseover="this.stop();"
onmouseout="this.start();" scrollamount="3" scrolldelay="50"
64
style="font-weight: bold; font-size: 12px; width: 860px; height:
15px;">
<font
color="#ffffff">Celebrating
the excellence
in education since 1999 | Looking for legal, accredited, total online
education,
Check us out | Educating our world one person at a time
|
No
set dates of enrollment and graduation.
|
Self-paced,
self-tailored, student-centered and competency based education.
|
Large
combination of courses and flexible choices.
|
Partial
tuition free education in deserving cases. </font></marquee></td>
</tr>
</tbody></table>
</td>
</tr>
</tbody>
</table>
</body>
</html>
</asp:Content>
65
Clerk
<br />
&nbs
p;
<img alt="" src="header1_01.gif" style="width: 6px; height: 16px" />
<asp:Label ID="Label1" runat="server" Font-Size="Larger"
Text="DATA ENTRY CLERK"></asp:Label>
66
<asp:HyperLink ID="HyperLink2" runat="server"
NavigateUrl="~/clerkupdate.aspx">EDIT
STUDENT DETAIL</asp:HyperLink>
</p>
<p>
<asp:HyperLink ID="HyperLink3" runat="server"
NavigateUrl="~/ClerkDD.aspx">
STUDENT DD/CHEQUE DETAIL</asp:HyperLink>
</p>
<p>
<asp:HyperLink
ID="HyperLink4" runat="server"
NavigateUrl="~/Clerkstu Education.aspx">STUDENT
EDUCATIONAL DETAIL</asp:HyperLink>
</p>
<p>
<asp:HyperLink
ID="HyperLink6" runat="server"
NavigateUrl="~/Clerkstudentid.aspx">VIEW USERID AND
PASSWORD OF STUDENT</asp:HyperLink>
</p>
<p>
<asp:HyperLink ID="HyperLink7"
runat="server" NavigateUrl="~/Clerkstudentid allocate.aspx">SEND
AND
MAINTAIN USERID AND PASSWORD OF
STUDENTS</asp:HyperLink>
</p>
<tr>
<td colspan="2" valign="top" align="center"><table width="780"
border="0" cellpadding="0" cellspacing="0">
<tbody><tr>
67
<td align="left" bgcolor="#2f97cf"><img src="lower_c_bg.gif"
height="16"
style="width: 126px"> </td>
<td align="left" bgcolor="#2f97cf"><div align="left"></div></td>
<td width="100%" align="left" bgcolor="#2f97cf"><marquee
onmouseover="this.stop();"
onmouseout="this.start();" scrollamount="3" scrolldelay="50"
style="font-weight: bold; font-size: 12px; width: 860px; height:
15px;">
<font
color="#ffffff">Celebrating
the excellence
in education since 1999 | Looking for legal, accredited, total online
education,
Check us out | Educating our world one person at a time
|
No
set dates of enrollment and graduation.
|
Self-paced,
self-tailored, student-centered and competency based education.
|
Large
combination of courses and flexible choices.
sp;
Partial
tuition free education in deserving cases. </font></marquee></td>
</tr>
</tbody></table>
</td>
</tr>
</tbody>
</table>
68
</body>
</html>
</asp:Content>
Clerk Check
69
<FooterStyle BackColor="#1C5E55" Font-Bold="True"
ForeColor="White" />
<RowStyle BackColor="#E3EAEB" />
<Columns>
<asp:CommandField
ShowSelectButton="True" />
<asp:BoundField DataField="StudentID" HeaderText="StudentID"
ReadOnly="True"
SortExpression="StudentID" />
<asp:BoundField DataField="FName" HeaderText="FName"
SortExpression="FName" />
<asp:BoundField DataField="LName" HeaderText="LName"
SortExpression="LName" />
<asp:BoundField DataField="Address" HeaderText="Address"
SortExpression="Address" />
<asp:BoundField DataField="City" HeaderText="City"
SortExpression="City" />
<asp:BoundField DataField="State" HeaderText="State"
SortExpression="State" />
<asp:BoundField DataField="Country" HeaderText="Country"
SortExpression="Country" />
<asp:BoundField DataField="MobileNo" HeaderText="MobileNo"
SortExpression="MobileNo" />
<asp:BoundField DataField="Email" HeaderText="Email"
SortExpression="Email" />
<asp:BoundField DataField="DOB" HeaderText="DOB"
SortExpression="DOB" />
<asp:BoundField DataField="Gender" HeaderText="Gender"
SortExpression="Gender" />
<asp:BoundField DataField="Course" HeaderText="Course"
SortExpression="Course" />
</Columns>
<PagerStyle BackColor="#666666" ForeColor="White"
HorizontalAlign="Center" />
<SelectedRowStyle BackColor="#C5BBAF" Font-Bold="True"
ForeColor="#333333" />
70
<HeaderStyle BackColor="#1C5E55" Font-Bold="True"
ForeColor="White" />
<EditRowStyle BackColor="#7C6F57" />
<AlternatingRowStyle BackColor="White" />
</asp:GridView>
<asp:SqlDataSource ID="SqlDataSource1" runat="server"
ConnectionString="<%$ ConnectionStrings:masterConnectionString1
%>"
DeleteCommand="DELETE FROM [Student] WHERE [StudentID] =
@StudentID"
InsertCommand="INSERT INTO [Student] ([FName], [LName],
[Address], [City], [State], [Country], [MobileNo], [Email], [DOB], [Gender],
[Course]) VALUES (@FName, @LName, @Address, @City, @State,
@Country, @MobileNo, @Email, @DOB, @Gender, @Course)"
ProviderName="<%$
ConnectionStrings:masterConnectionString1.ProviderName %>"
SelectCommand="SELECT [StudentID], [FName], [LName],
[Address], [City], [State], [Country], [MobileNo], [Email], [DOB], [Gender],
[Course] FROM [Student]"
UpdateCommand="UPDATE [Student] SET [FName] = @FName,
[LName] = @LName, [Address] = @Address, [City] = @City, [State] =
@State, [Country] = @Country, [MobileNo] = @MobileNo, [Email] =
@Email, [DOB] = @DOB, [Gender] = @Gender, [Course] = @Course
WHERE [StudentID] = @StudentID">
<DeleteParameters>
<asp:Parameter Name="StudentID" Type="Decimal" />
</DeleteParameters>
<InsertParameters>
<asp:Parameter Name="FName" Type="String" />
<asp:Parameter Name="LName" Type="String" />
<asp:Parameter Name="Address" Type="String" />
<asp:Parameter Name="City" Type="String" />
<asp:Parameter Name="State" Type="String" />
<asp:Parameter Name="Country" Type="String" />
<asp:Parameter Name="MobileNo" Type="Decimal" />
<asp:Parameter Name="Email" Type="String" />
<asp:Parameter Name="DOB" Type="DateTime" />
71
<asp:Parameter Name="Gender" Type="String" />
<asp:Parameter Name="Course" Type="String" />
</InsertParameters>
<UpdateParameters>
<asp:Parameter Name="FName" Type="String" />
<asp:Parameter Name="LName" Type="String" />
<asp:Parameter Name="Address" Type="String" />
<asp:Parameter Name="City" Type="String" />
<asp:Parameter Name="State" Type="String" />
<asp:Parameter Name="Country" Type="String" />
<asp:Parameter Name="MobileNo" Type="Decimal" />
<asp:Parameter Name="Email" Type="String" />
<asp:Parameter Name="DOB" Type="DateTime" />
<asp:Parameter Name="Gender" Type="String" />
<asp:Parameter Name="Course" Type="String" />
<asp:Parameter Name="StudentID" Type="Decimal" />
</UpdateParameters>
</asp:SqlDataSource>
<tr>
<td colspan="2" valign="top" align="center"><table width="780"
border="0" cellpadding="0" cellspacing="0">
<tbody><tr>
<td align="left" bgcolor="#2f97cf"><img src="lower_c_bg.gif"
height="16"
style="width: 126px"> </td>
<td align="left" bgcolor="#2f97cf"><div align="left"></div></td>
<td width="100%" align="left" bgcolor="#2f97cf"><marquee
onmouseover="this.stop();"
onmouseout="this.start();" scrollamount="3" scrolldelay="50"
style="font-weight: bold; font-size: 12px; width: 860px; height:
15px;">
<font
color="#ffffff">Celebrating
the excellence
in education since 1999 | Looking for legal, accredited, total online
72
education,
Check us out | Educating our world one person at a time
No
set dates of enrollment and graduation.
Self-paced,
self-tailored, student-centered and competency based education.;
Large
combination of courses and flexible choices.
Partial
tuition free education in deserving cases. </font></marquee></td>
</tr>
</tbody></table>
</td>
</tr>
</tbody>
</table>
</body>
</html>
</asp:Content>
Student
73
<asp:Label ID="Label1" runat="server" Font-Size="Larger"
Text="STUDENT'S PORTAL"></asp:Label>
<img alt="" src="header_03.gif" style="width: 439px; height: 18px" /><br />
<asp:HyperLink ID="HyperLink16" runat="server"
NavigateUrl="~/login.aspx">Logout</asp:HyperLink>
<p><ol >
<asp:HyperLink ID="HyperLink1" runat="server"
NavigateUrl="~/powerpoint.aspx">POWER POINT PRESENTATION ON
VARIOUS TOPICS</asp:HyperLink>
<br />
<br />
74
<asp:HyperLink ID="HyperLink14" runat="server"
NavigateUrl="~/Exam0.aspx">ONLINE EXAM</asp:HyperLink>
<br />
<br />
<asp:HyperLink ID="HyperLink15" runat="server"
NavigateUrl="~/rol_login.aspx">RESULT</asp:HyperLink>
</ol><tr>
<td colspan="2" valign="top" align="center"><table width="780" border="0"
cellpadding="0" cellspacing="0">
<tbody><tr>
<td align="left" bgcolor="#2f97cf"><img src="lower_c_bg.gif" height="16"
style="width: 126px"> </td>
<td align="left" bgcolor="#2f97cf"><div align="left"></div></td>
<td width="100%" align="left" bgcolor="#2f97cf"><marquee
onmouseover="this.stop();"
onmouseout="this.start();" scrollamount="3" scrolldelay="50"
style="font-weight: bold; font-size: 12px; width: 860px; height: 15px;">
<font
color="#ffffff">Celebrating
the excellence
in education since 1999 | Looking for legal, accredited, total online
education,
Check us out | Educating our world one person at a time
;
No
set dates of enrollment and graduation.
|
Self-paced,
self-tailored, student-centered and competency based education.
|
Large
combination of courses and flexible choices.
|
Partial
tuition free education in deserving cases. </font></marquee></td>
75
</tr>
</tbody></table>
</td>
</tr>
</tbody>
</table>
</body>
</html>
</asp:Content>
76
<asp:Label ID="Label2" runat="server" Text="TO :"></asp:Label>
<asp:TextBox ID="TextBox6" runat="server"
Width="608px"></asp:TextBox>
<asp:RegularExpressionValidator
ID="RegularExpressionValidator2"
runat="server" ErrorMessage="This email is missing the @ symbol
or ."
ValidationExpression=".+@.+"
ControlToValidate="TextBox6"></asp:RegularExpressionValidator>
<asp:RequiredFieldValidator ID="RequiredFieldValidator6"
runat="server"
ControlToValidate="TextBox6"
ErrorMessage="RequiredFieldValidator"></asp:RequiredFieldValidator>
</p>
<p>
<asp:Label ID="Label3" runat="server" Text="FROM :"></asp:Label>
<asp:TextBox ID="TextBox2" runat="server"
Width="608px"></asp:TextBox>
<asp:RegularExpressionValidator
ID="RegularExpressionValidator1" runat="server"
ErrorMessage="This email is missing the @ symbol or."
ValidationExpression=".+@.+"
ControlToValidate="TextBox2"></asp:RegularExpressionValidator>
<asp:RequiredFieldValidator ID="RequiredFieldValidator7"
runat="server"
ControlToValidate="TextBox2"
ErrorMessage="RequiredFieldValidator"></asp:RequiredFieldValidator>
</p>
<p>
<asp:Label ID="Label4" runat="server" Text="CC :"></asp:Label>
&nbs
p;
77
<asp:TextBox ID="TextBox3" runat="server"
Width="606px"></asp:TextBox>
<asp:RegularExpressionValidator ID="RegularExpressionValidator3"
runat="server"
ErrorMessage="This email is missing the @ symbol or ."
ValidationExpression=".+@.+"
ControlToValidate="TextBox3"></asp:RegularExpressionValidator>
</p>
<p>
<asp:Label ID="Label5" runat="server" Text="SUBJECT
:"></asp:Label>
<asp:TextBox ID="TextBox4" runat="server"
Width="606px"></asp:TextBox>
</p>
<p>
<asp:TextBox ID="TextBox5" runat="server" Height="230px"
Width="678px"></asp:TextBox>
<asp:RequiredFieldValidator ID="RequiredFieldValidator5"
runat="server"
ControlToValidate="TextBox5" ErrorMessage="required field can't be
empty"></asp:RequiredFieldValidator>
</p>
<p>
<asp:Button ID="Button1" runat="server" onclick="Button1_Click1"
Text="SEND" />
</p>
<tr>
<td colspan="2" valign="top" align="center"><table width="780"
border="0" cellpadding="0" cellspacing="0">
<tbody><tr>
<td align="left" bgcolor="#2f97cf"><img src="lower_c_bg.gif"
height="16"
style="width: 126px"> </td>
<td align="left" bgcolor="#2f97cf"><div align="left"></div></td>
78
<td width="100%" align="left" bgcolor="#2f97cf"><marquee
onmouseover="this.stop();"
onmouseout="this.start();" scrollamount="3" scrolldelay="50"
style="font-weight: bold; font-size: 12px; width: 860px; height:
15px;">
<font
color="#ffffff">Celebrating
the excellence
in education since 1999 | Looking for legal, accredited, total online
education,
Check us out | Educating our world one person at a time
|
No
set dates of enrollment and graduation.
|
Self-paced,
self-tailored, student-centered and competency based education.
Large
combination of courses and flexible choices.
Partial
tuition free education in deserving cases. </font></marquee></td>
</tr>
</tbody></table>
</td>
</tr>
</tbody>
</table>
</body>
</html>
</asp:Content>
79
Database Connectivity using classes
using System;
using System.Data;
using System.Configuration;
using System.Linq;
using System.Web;
using System.Web.Security;
using System.Web.UI;
using System.Web.UI.HtmlControls;
using System.Web.UI.WebControls;
using System.Web.UI.WebControls.WebParts;
using System.Xml.Linq;
using System.Data.SqlClient;
/// <summary>
/// Summary description for Class1
/// </summary>
public class Class1
{
static System.Data.OleDb.OleDbCommand db1;
static System.Data.OleDb.OleDbConnection dbc1;
public static System.Data.DataSet getinfo()
{
80
return d;
}
public static System.Data.DataSet getinfo2()
{
string conn1 = "Provider=SQLOLEDB.1;Integrated
Security=SSPI;Persist Security Info=False;Data Source=VISHAL-9537C989\\
SQLEXPRESS;Initial Catalog=master";
dbc1 = new System.Data.OleDb.OleDbConnection(conn1);
dbc1.Open();
db1 = new System.Data.OleDb.OleDbCommand("Select * from
Student");
db1.Connection = dbc1;
System.Data.OleDb.OleDbDataAdapter da = new
System.Data.OleDb.OleDbDataAdapter();
da.SelectCommand = db1;
System.Data.DataSet d = new System.Data.DataSet();
da.Fill(d);
return d;
}
dbc1.Close();
}
81
public static void getinfo4(int a,string b,int c,string d,string e,int f,int g,int
h,string i,int j,string k,string l,int m,int n,int o,string p,int q,string r,string s,int
t,int u,int v,string z)
{
string conn1 = "Provider=SQLOLEDB.1;Integrated
Security=SSPI;Persist Security Info=False;Data Source=VISHAL-9537C989\\
SQLEXPRESS;Initial Catalog=master";
dbc1 = new System.Data.OleDb.OleDbConnection(conn1);
dbc1.Open();
db1 = new System.Data.OleDb.OleDbCommand("Insert into
StudentEducation values (" + a + ",'" + b + "'," + c + ",'" + d + "','" + e + "'," + f
+ "," + g + "," + h + ",'" + i + "'," + j + ",'" + k + "','" + l + "'," + m + "," + n +
"," + o + ",'" + p + "'," + q + ",'" + r + "','" + s + "'," + t + "," + u + "," + v + ",'"
+ z + "')", dbc1);
db1.ExecuteNonQuery();
dbc1.Close();
}
public static void getinfo5(int a,string b,string c,int d,DateTime da)
{
string conn1 = "Provider=SQLOLEDB.1;Integrated
Security=SSPI;Persist Security Info=False;Data Source=VISHAL-9537C989\\
SQLEXPRESS;Initial Catalog=master";
dbc1 = new System.Data.OleDb.OleDbConnection(conn1);
dbc1.Open();
db1 = new System.Data.OleDb.OleDbCommand("Insert into
StudentPayment values (" + a + ",'" + b + "','" + c + "'," + d + ",'" + da + "')",
dbc1);
db1.ExecuteNonQuery();
dbc1.Close();
}
public static System.Data.DataSet getinfo6()
{
string conn1 = "Provider=SQLOLEDB.1;Integrated
Security=SSPI;Persist Security Info=False;Data Source=VISHAL-9537C989\\
SQLEXPRESS;Initial Catalog=master";
82
dbc1 = new System.Data.OleDb.OleDbConnection(conn1);
dbc1.Open();
db1 = new System.Data.OleDb.OleDbCommand("Select * from Marks");
db1.Connection = dbc1;
System.Data.OleDb.OleDbDataAdapter da = new
System.Data.OleDb.OleDbDataAdapter();
da.SelectCommand = db1;
System.Data.DataSet d = new System.Data.DataSet();
da.Fill(d);
return d;
}
Vedio Classes
83
<p> *
<asp:HyperLink ID="HyperLink1" runat="server"
NavigateUrl="~/vedio1.aspx" Font-Bold="True" Font-
Underline="True"> AMAZING
PHYSICS</asp:HyperLink></p>
<p> *
<asp:HyperLink ID="HyperLink2" runat="server"
NavigateUrl="~/Vedio2.aspx"
Font-Bold="True" Font-Underline="True">ROBOT MOVEMENT OF
ARM </asp:HyperLink>
</p>
<p> *
<asp:HyperLink ID="HyperLink3" runat="server"
NavigateUrl="~/Vedio3.aspx"
Font-Bold="True" Font-Underline="True">CREATING WEB
SERVICE</asp:HyperLink>
</p>
<p> * <asp:HyperLink
ID="HyperLink4" runat="server"
NavigateUrl="~/video4.aspx" Font-Bold="True" Font-
Underline="True">ENGINEERING
MECHANICS</asp:HyperLink>
</p>
<p> </p>
<table>
<tr>
<td colspan="2" valign="top" align="center"><table width="780"
border="0" cellpadding="0" cellspacing="0">
<tbody><tr>
<td align="left" bgcolor="#2f97cf"><img src="lower_c_bg.gif"
height="16"
style="width: 126px"> </td>
<td align="left" bgcolor="#2f97cf"><div align="left"></div></td>
<td width="100%" align="left" bgcolor="#2f97cf"><marquee
onmouseover="this.stop();"
84
onmouseout="this.start();" scrollamount="3" scrolldelay="50"
style="font-weight: bold; font-size: 12px; width: 860px; height:
15px;">
<font
color="#ffffff">Celebrating
the excellence
in education since 1999 | Looking for legal, accredited, total online
education,
Check us out | Educating our world one person at a time
|
No
set dates of enrollment and graduation.
nbsp;
Self-paced,
self-tailored, student-centered and competency based education.
sp;
Large
combination of courses and flexible choices.
nbsp;
Partial
tuition free education in deserving cases. </font></marquee></td>
</tr>
</tbody></table>
</td>
</tr>
</tbody>
</table>
</body>
</html>
</asp:Content>
85
86
Testing plays a critical role in quality assurance for software .Due to the limitation
of the verification methods in the previous phases ,design and requirement
modifications become necessary in the code .Testing is used to detect these error ,in
addition to the error introduced during coding phase .Testing is a dynamic method
for verification and validation, where the system is to be tested and it is executed to
observe the behavior of the system .Due to this testing the presence of fault can be
deduced.There are two method of testing: functional and structural. In functional
testing the internal logic of the system under testing is not considered and the test
cases are decided from the specification or the requirement, it is often called “Black
Box Testing”. Equivalence class partitioning , boundary analysis , and cause effect
graphic are example of the methods for selecting test cases for functional testing .in
the structural testing ,the test cases are decided entirely on the internal logic of the
programmed or module being tested .
As the goal of the testing is to detect any errors in the programme, different flavor of
the testing are often used. Unit testing are used to test a module or a small collection
of modules and the focus is on detecting coding error in module during integration
testing modules are combined into sub-system , which are then tested the goal here
is to test the system design .In the project Parcel Management and Tracking System
application we used the unit testing and functional testing.
The object oriented model should be tested for correctness, completeness and
consistency with in the context of the model syntax, semantic, and pragmatics.
The objective of object oriented testing to find the maximum number of error with a
minimum amount of effort is identical to the objective of conventional software
testing.
87
System testing is a critical phase in system implementation .testing of a system
involves hardware device testing, debugging of computer programs and testing
information processing procedure .testing can be done with test data, which attempts
to simulate all possible condition that may arise during processing.The testing
methods adopted in the testing of the system were independent unit testing and
system testing.
System Testing
One of the main requirements of the software development is to develop bug free,
reliable system. During the process of development of any application there is
always a possibility of some errors being developed. And also the software may not
be as user asked for. Thus, it becomes imperative that, the software should be
checked at every step. This helps in a bug free reliable system. If there is any bug or
alterations that have to be made that can be done at the preliminarily level as the
application gets more complicated after every step.
Testing Approaches:
Black box testing relates to tests that are performed at the software interface.
Although they are designed to identify errors, black box tests are used to
88
demonstrate that software functions are operational; that inputs are correctly
accepted and the output is correctly produced.
White box testing is test case design approach that employs the control architecture
of the procedural design to produce test cases. Test case can be derived such that
they:
Guarantee that all independent paths within a module have been exercised at
least once,
Exercise all logical decisions on their true and false sides,
Execute all loops at their boundaries and within their operational bounds and
Exercise internal data structures to ensure their validity.
Unit Testing:
This test focuses verification effort on the small unit of design module. Here using
test plans prepared in design descriptions as guide, important control paths are tested
to uncover errors within boundary of the module.
Boundary condition are tested to ensure module operate properly at boundaries
established to limit or restrict processing. All paths in the control structure are
exercised to ensure all statements in a module are executed at least once and finally
all errors handling paths are tested to see message are intelligent. Corresponds to
errors, encountered and provide enough description for the cause of error.
Integration Testing:
The focus of the test here is on, the design and construction of software architecture.
This is a systematic technique for construction the program structure and conducting
tests to uncover errors associated with interfacing. The objective here is to take unit-
tested module and build a program that is dictated by signs. All fractions are
integrated successfully after successful completion of development and unit testing.
89
Validation Testing:
Validation succeeds when the software functions in manner that can be reasonably
expected by the customer. Software validation is achieved through a series of black
box tests that demonstrates the conformity of the requirements.
After validation testing have been conducted one of the two possibility exits.
Deviation or errors discovered at the step in this system with the help of the user by
negotiating to establish a meeting for resolving differences.
Output Testing:
After performing the validation testing, the next step is output testing of the
proposed system, since system be useful if it does not produce the required output in
the required format. Hence the output format is considered in two ways: one is on
the screen and another is the printed format. Both need to be shown to the user for
his comments.
User acceptance of a system is the key factor for the success of any system. This is
done with regard to following points:
90
Implementation and Maintenance
91
Software maintenance is the last phase in the software Engineering process
that eliminates errors in the working system during its work span and to tune the
system to any variation in its working environment .the system requires maintenance
as there may be changes and requirements in the organizational needs , government
policies ,hardware and software environment etc. often small system deficiencies are
found as a system is brought into operation and changes are made to remove
them .System requirements may be revised as a result of system usage or changing
operational needs . perhaps oversight that occurred during the development process
need to be corrected .Often the maintenance need arises to capture additional data
for storage in a database or in transaction files or perhaps it may be necessary to add
error detection features to prevent system users from in adversely taking an
unwanted action.
Maintainable Design
APPLICATIONS
92
The project has been developed for online skill test for students.
The main application of project is for conducting examination online. It can be
93
Future Scope
The system can have collaboration with certain other similar sites, to get
question bank from their databases.
94
APPENDICES
INTRODUCTION TO HTML
create and format a web documents. A user need not be an expert programmer
to make used of HTML to create hypertext documents that can be put on the
Internet.
original HTML document type in 1990. In 1992, Dan Connolly wrote the
HTML Document Type and a brief HTML specification. Since 1993, cross-
specification and in 1994, Dan Connolly and Karen Olson Muldrow rewrote the
HTML specification, which is now written by Dave Raggett and can be obtained
from :: http:/www.UK.hpl.hp.co.UK/peoples.dsr/
95
EVOLUTION OF HTML
# Level 2 - introduced the World Wide Web as an interactive medium and the
IMPORTANCE OF HTML
the interpreter. This can be done be a set of HTML element, which markup
the document and inform the browser like the Internet Explorer above the action
The appearance of the Web page is important, and HTML provides stage
to make a document look attractive. Using graphics, fonts, different sizes, color
96
etc, can enhance a presentation of the document. This language allows the
disseminated through the web pages by using this versatile language. For
example, many companies to publicize their products are using web pages using
HTML language.
# Client-server architecture
97
ELEMENT OF THE WEB
URLs in HTML
when a user clicks on a "Hypertext Link. URL is similar to file name except that
in this case, the file can be on the same machine or on a different in the network.
The file retrieval method varies, depending on the type of the document
to be retrieved. The URL need not always point to a document that can also point
to a query, image are the result of the command. It is the reference address of the
98
INTRODUCTION TO HTML ELEMENTS
There are various HTML tags or HTML elements used to construct an
HTML file. Each HTML document corresponds to a single page. An HTML tag
comprises left angular bracket (<), a less than symbol followed by the name of
elements. Container elements are paired and have a starting and ending tag. The
end tag is identical to the start tag except that it has a slash that precedes the text
within the angular brackets. The parameters of the elements are placed between
Empty elements do not have the end tag but only the start tag. An empty
element takes attributes that are given within angular brackets along with the tag
name.
documents from clients (browsers) over the Internet. Web Servers perform a
# Logging activities.
99
# Authenticating Users.
Recording the Internet address, the time and the details of request made from
each connection.
Accepting and forwarding request for data Web Servers transfers hypertext
documents i.e. there is no continuation connection between the server and the
client. The server simply receives the request from the browser at which
connection is served.
one transaction and out delivery mechanism. Hence, every time a browser
requests data and a new session are established between the browser and the
server.
documents graphics, video, sounds and so on. The files being sent by the server
are identified by the browser from the MIME (Multimedia Internet Mail
Extension Head)
# Gropher
100
# Terminal Emulation (Telnet)
TELNET:
Internet, Many companies provide Guest Login, which can be accessed through
1. Command Mode :
This mode can be used to open, close and quit the remote host Computer.
2. Input Mode :
INTRODUCTION TO .NET
The .NET Framework is an integral Windows component that-supports
building and running the next generation of applications and XML Web
101
• To provide a code-execution environment that promotes safe
Web-based applications.
language runtime and the .NET Framework class library. The common language
runtime is the foundation of the .NET Framework. You can think of the runtime
as an agent that manages code at execution time, providing core services such as
strict type safety and other forms of code accuracy that promote security and
robustness.
102
In fact, the concept of code management is a fundamental principle of
the runtime. Code that targets the runtime is known as managed code, while code
that does not target the runtime is known as unmanaged code. The class library,
oriented collection of reusable types that you can use to develop applications
load the common language runtime into their processes and initiate the execution
of managed code, thereby creating a software environment that can exploit both
managed and unmanaged features. The .NET Framework not only provides
several runtime hosts, but also supports the development of third-party runtime
hosts.
103
FEATURES OF .NET
• Rich Functionality out of the box
use in your applications. This means that as a developer you need not to go
into low level details of many operation such as file I/O, network
interface.
• OOPs Support
104
• Multi Language Support
languages. This meaning that if you have skills in C++, you need not throw
them but just mould them to suit .NET environment. Currently four
languages are available right out of the box namely- Visual Basic.NET, C#,
Jscript.NET and managed C++. The beauty of multi language support lies in
the fact that even though the syntax of each language is different, the basic
system resources like memory. Memory leaks were major reason in failure
memory on its own. The garbage collector takes care of freeing unused
Before the introduction of .NET, COM was the de-facrto standard for
money and efforts in developing COM components and controls. The good
news is you can still use COM components and ActiveX controls
under .NET.
105
• No More DLL Hell
If you have worked with COM components, you are aware of "DLL
hell". DLL conflicts are common fact in COM world. COM components
require registrations in the system registry. .NET ends this DLL hell by
allowing applications to use their own copy of dependents DLLs. Also .NET
Currently .NET is the only platform that has build with XML rights
into the core framework. .NET tries to harness power of XML in every
transforming XML documents, .NET provides XML web services that are
were always tedious task. Since .NET doesn't require any registration as
106
• Security
Microsoft has taken great effort to make .NET platform safe and secure
for enterprise applications. Features such as type safety, code access security
and role based authentication make over all application more robust and
secure.
INTRODUCTION TO ASP.NET
ASP.NET is a unified Web development model that includes the
minimum of coding. ASP.NET is part of the .NET Framework, and when coding
ASP.NET applications you have access to classes in the .NET Framework. You
can code your applications in any language compatible with the common
language runtime (CLR), including Microsoft Visual Basic, C#, JScript .NET,
and J#. These languages enable you to develop ASP.NET applications that
benefit from the common language runtime, type safety, inheritance, and so on.
ASP.NET includes:
• Security infrastructure
107
• State-management facilities
• Application configuration
• Debugging support
management
INTRODUCTION TO C#
applications that run on the .NET Framework. C#, which is an evolution of C and
C++, is type safe and object oriented. Because it is compiled as managed code, it
benefits from the services of the common language runtime, such as language
recognizable to anyone familiar with C, C++ or Java. Developers who know any
108
within a very short time. C# syntax simplifies many of the complexities of C++
delegates, anonymous methods and direct memory access, which are not found
in Java. C# also supports generic methods and types, which provide increased
collection classes to define custom iteration behaviors that are simple to use by
client code.
109
Reference
Websites:
www.google.com
www.asp.net
www.apress.com
www.ineta.org
Books:
ASP.Net Bible
Beginning ASP.NET 2.0 with C# - Wrox
Pro Asp.net with c# second edition
110