Project Report
Project Report
Project Report
COM
2011
A
PROJECT REPORT
ON
CS-76
BACHELOR IN COMPUTER APPLICATIONS
SUBMITED BY
ENROLMENT NO: 084731470
STUDY CENTRE: 0740 D
SHIVSHANKAR KUMAR SHAH
S/O SHRI VISHAWNATH SHAH
R/O A-2/1340,
MADANPUR KHADAR, J.J. COLONY
NEW DELHI-110076.
INDEX
S.NO
TOPIC
CERTIFICATE OF ORIGINALITY
ACKNOWLEDGEMENT
SYNOPSIS
6-45
Pg.no
46
SYSTEM ANALYSIS
50
PROJECT PLANNING
4
53
55
FUNCTIONAL REQUIREMENT
57
NON-FUNCTIONAL REQUIREMENT
59
60
61
64
WATERFALL MODEL
66
68
COCOMO MODEL
69
CLASS DIAGRAM
70
USE CASE DIAGRAM
FLOW CHART
75
PERT CHART
83
RISK MANAGEMENT
SYSTEM DESIGN
PROGRAM STRUCTURE
DATA INTEGRITY AND CONSTRAINTS
USER INTERFACE DESIGN
6
TESTING
TEST PLAN
Test flow information
TESTING USED
7
72
89
91
94
100
102
105
106
111
115
117
121
125
126
128
131
132
SECURITY
DATABASE SECURITY
DATA SECURITY
153
Validation Controls
Exception Handling
USER AND ACESS RIGHTS
9
BIBLIOGRAPHY
INPUT AND OUTPUT SCREENS
11
12
13
SOURCE CODING
15
CERTIFICATE OF ORIGINALITY
This
is
to
certify
that
the
project
report
entitled_____________________________________________________
Submitted to Indira Gandhi National Open University in partial fulfillment of
therequirement
APPLICATIONS
is
an
original
work
carried
out
by
Mr./Ms._______________________________________________________________________________
___________
Enrolment
No.:_________________________under
the
guidance
of
Mr./Ms.______________________________________
------------------------------
---------------------------------------
of the student:
Enrolment No.:
ACKNOWLEDGEMENT
When I had selected this project it seems very difficult for me to complete it, just
like achieving a dream. But recently I got success after completing the project as per
requirements.
SYNOPSIS
INDEX
S.NO.
1.
TOPIC
PAGE NO
TITLE OF THE
PROJECT.. 3
2.
INTRODUCTION 4
3.
OBJECTIVES. 8
4.
SYSTEM
ANALYSIS.. 13
FACT
FINDING
16
FEASIBILITY
STUDY.............. 16
5.
REQUIREMENT 19
6.
MODULAR
DISCRIPTION 21
.. 25
7.
.. 26
8.
DATA
DICTIONARY. 36
9.
SECURITY
FEATURES 40
10.
APPLICATION. 42
NGO PARTNERSHIP
SYSTEM
INTRODUCTION
10
its
non-governmental
status
by
excluding
government
11
12
13
OBJECTIVE
14
Audited
Statements
etc)
required
by
government
Ministries
schemes.
15
software.
Better
Understandability-With
NGOs,
there
is
better
16
details
of
the
schemes
of
the
above
SYSTEM ANALYSIS
17
The
(i.e.
systems
systems
analysts
are
responsible
analysis)
and
producing
for
a
identifying
design.
The
18
FACT FINDING
19
Questionnaires :Questionnaires are a good survey technique, because the cost (printing,
distribution, collection, analysis) is low relative to that of other methods such
as personal interviews, because participants can respond at their own
convenience, because no interviewer bias is introduced, and because
responses can be kept completely confidential. Questionnaires are an
inexpensive way to gather data from a potentially large number of
respondents.
Interviews:A conversation in which one person (the interviewer)elicits information from
another person (the subject or interviewee). A transcript or account of such a
conversation is also called an interview In this phase we conduct interviews
20
Onsite Observation: On-site observations are one of the most effective tools with the analyst
where the analyst personally goes to the site and discovers the functioning of
the system. As an observer, the analyst can gain first-hand knowledge of the
activities, operations, processes of the system on-site; hence here the role of
an analyst is of an information seeker.
21
22
FEASIBILITY STUDY
23
and
compare
them
with
the
cost.
Technical Feasibility:Technical feasibility is concerned with the availability of hardware and software
required for the development of the system, to see compatibility and maturity
of the technology proposed to be used and to see the availability of the
required technical manpower to develop the system.
Because this program is web based application we required windows class
processor with any good internet browser. In technical feasibility the following
issues are taken into consideration.
Whether the required technology is available or not
Resources are available -Manpower- programmers, testers & debuggers
-Software and hardware.
Once the technical feasibility is established, it is important to consider the
monetary factors also.
Operational Feasibility:-
24
25
Hardware Requirements
26
CPU
RAM
1 GB
Motherboard
Intel Original/Chipset
HDD
80 GB
CD/DVD ROM
Monitor
Software Requirements
Operating Systems :
27
Front End
Back End
28
MODULAR DESIGN
NGO Partnership System has categorized into four sub points i.e. Scheme-wise
Listing, NGO Grants, Scheme Directory and VOs/NGOs Directory.
Schemewise
Listing
NGO
Grants
NGO
PARTNERSH
IP
SYSTEM
VOs/NG
Os
Director
y
Scheme
s
Director
y
29
MODULAR DESCRIPATION
+
from Non-Governmental
are
available
for
the
NGOs.
Contact
Details
of
participating
ministries/Departments,
and
documents
and
apply
online
to
specified
Ministries/Governments/Organization.
VOs/NGOs DirectoryIn this module you can search various NGOs in
India who has been registered with this NGO partnership system under
this website. It has contained Name, Address and various particulars
related to NGOs. It has also features of State-wise list of VOs/NGOs
signed up on the NGO-PS, Sector-wise list of VOs/Ngo signed up on the
NGO-PS, Search VOs/NGOs and Blacklisted VOs/NGOs.
30
31
Manage Payments
Manage Schemes
Manage Grants
Admin
Manage Status
Sign Up / Register
Login
Applying
Applications
Apply Schemes
Make/Receive Payments
NGOs/VOs
32
Address
Issue-date
Closing date
Telephone
Sch-Name
NGO_Name
Amount
Registration No
Eligibility
Sch-Id
NGO_id
SCHEMES
NGOs
Apply for
Scheme_id
Receive
Handles
Announces
Sch- Name
Amount
User-name
Installment
Password
GRANTS
Ministry Name
ADMIN
Admin-id
Address
Name
Address
State
Ministry
Telephone
33
NGOs
Grants
NGO
PARTNERSHIP
SYSTEM
Admin
Ministries
Schemes
Announcement
34
VOs/NGOS
Withdraw
payment
Generate
transaction ID
Receive
payment
Applying for
Schemes
process
Registration process
Request for
withdrawl
Project
Payment_Details
Make record
history
Ministry_master
Fillup NGOs
details
Scheme_master
Fillup Schme
forms
YES
VerifyScheme_master
Available
flats
Verify
registration
details
Payment_Details
NGO_master
NGO_history Select any one
available
schemes
Cancel
Registration
P
Payment_Details
YES
Make
Payment
Generate
transaction ID
NO
Error message
YES
Verifying
registration details
Issue scheme
forms
NGO_master
Verify
registration
Cust_master
details
Charge
processing amt
Scheme_master
NO
Payment_details
Do Payment
YES
Cancel Sch
Ministry_master
Payment_details
Ministry_master
NO
SCHEME_master
Error message
No Approved
process
Approval
Generate
TransactionID
Scheme
Process
General transaction
ID
Announcement_master
Make announcement
Admin
35
Verify registration
details
Cancel Registration
YES
Admin
NO
Error message
NGO_MASTER
NGO_HISTORY
Make record
history
Generate
transaction ID
NGO
36
Registration process
NGO
NGO_master
Payment _details
Make Payment
Select any one
available
scheme
Scheme filling
process
Generate
DETAILS
SCHEME_DETAILS
Fill up
Scheme
forms
transaction ID
NGO
2nd
level
Do Payment
SCHEME_MASTER
Payment_details
NGO_DETAILS
Fill up personnel
details
Payment_details
Make Generate
payment
Transaction ID
PAYMENT_DETAILS
DETAILS
MASTER
NGO _MASTER
Generate
transaction ID
DETAILS
Issue Scheme
forms
Admin
P AYMENT_DETAILS
Scheme
process
Admin
37
Approve
Verify Available
Schemes YES
Verifying registration
NGO_details
details
NO
NO
Ministry_master
Error message
YES
Approve
scheme
Scheme_master
Make payment
Payment_Details
NGO
38
2nd
level
Withdraw payment
NGO
Request for
withdrawal
Verify registration
details
NGO_detail
Ministry_master
YES
Charge processing
amt
Payment_Details
Cancel approval
Scheme Master
NGO
Master
General transaction
ID
Admin
2nd
level
Admin
Make
Announcement_details
Announcement
Announcement_Master
39
VOs/NGOs Registration
Inputs
NGO Name
Registration No.
Address
Office Address
PAN No
Contact No.
Outputs
VOs/NGOs ID
Application ID
Scheme Search
Inputs
Scheme Id
Scheme Name
Ministry Name
Category
Outputs
Scheme ID
Ministry Name
40
Outputs
Reference IDS
Scheme ID
NGO Name
Upload files
Date
Office Address
Contact No.
PAYMENT ONLINE
Inputs
Draft No
Amount
Outputs
Transaction id
Scheme ID
Bank Name
Date
Scheme Id
Scheme Name
NGO Id
NGO Name
Date
41
DATA STRUCTURE
Data Type
Key Constraint
Description
Username
Char
Primary key
Password
Bigint
Schemes_Master
Fields
Data Type
Key Constraint
Description
Scheme Id
BIgInt
Primary key
Scheme name
Char
Issue Date
Date
Amount
BIgInt
Eligibility
Varchar
Ministry Name
Char
42
Payment Details
Fields
Data Type
Key Constraint
Description
Ack_no
Bigint
Primary key
It store receipt no
NGO_Id
Bigint
Foreign key
Scheme Id
Bigint
Foreign key
Application Id
Bigint
Foreign key
Pay_Date
Date
DraftNo
Int
Drawn On
Date
Foreign key
Branch No
Int
Foreign key
Amount
Bigint
check
NGO Master
Fields
Data Type
Key Constraint
Description
NGO_ID
Bigint
Primary key
NGO_name
Char
Date of
Registartion
Date
43
Varchar
Address
Varchar
NGO History
Fields
Data Type
Key Constraint
Description
NGO_ID
Bigint
Foreign key
NGO_name
Char
Office
Varchar
Address
Varchar
Amt_Withdr
aw
Draft_no
Int
Int
Bank_name
Char
Announcement Master
Fields
Data Type
Key Constraint
Description
App No
Int
Foreign key
Date
App Date
44
Varchar
NgoID
Bigint
Foreign key
SchemeID
Int
Foreign key
FORM MASTER
Fields
Data Type
Key Constraint
Description
Form_no.
Bigint
Primary key
It store form no
NGO_name
Char
Office
Varchar
Deposite_date
date
Not null
NGO_type
Char
Amount
Bigint
It store amount
BRANCH MASTER
Fields
Data Type
Key Constraint
Description
Branch_no
Int
Primary key
It store Branch no
Branch _name
Char
B_manager
Char
MINISTRY MASTER
Fields
Data Type
Key Constraint
Description
Ministry Id.
Bigint
Primary key
45
Char
Address
Varchar
State
Char
Telephone
Number
SYSTEM SECURITIES
Security is very important process which is doing for secure your data from
the
Unauthorized person because data and information is a strategic resources.
Securing your data goes beyond paranoiait is often vital, although paranoia
does drive much of data security. Physical files and folders can be locked away
without your having to give much thought to it.
Username and password protection- Assign username and password
at the startup of the software for security. The purpose behind it that if
an unauthorized user want to open this software if he/she has username
and password then he/she is authorize to open the software else this
software is give a error message, the message is YOU ARE NOT
AUTHORIZED USER SORRY THEN PROGRAM IS TERMINATED.
46
FUTURE SCOPE
47
INTRODUCTION OF THE
PROJECT
A non-governmental organization (NGO) and (Voluntary Organization)
VOs is a legally constituted organization created by natural or legal persons
that operates independently from any government. The term is usually used
by government to refer to entities that have no government status. In the
cases in which NGOs are funded totally or partially by governments, the NGO
maintains
its
non-governmental
status
by
excluding
government
48
49
50
51
OBJECTIVES OF THE
PROJECT
The main objective behind developing this software is to make the process of
The NGO-PS to provide information about all signed up VOs / NGOs,
information about schemes of the participating Government Ministries /
Departments / Government Bodies open for partnership and funding with the
voluntary sector. It will also have the facility to apply for NGO grants online,
upload all common documents (like Registration Certificate, Annual Reports,
52
Audited
Statements
etc)
required
by
government
Ministries
schemes.
Queues- With the help of NGO partnership System, the long queues
will reduced and we can easily get any information regarding any
doubt/query.
Automate the work- It will transform NGOs with the power of
computer, the operations is automated. It is capable to done its work
more quickly in the comparison of human beings.
53
software.
Better
Understandability-With
NGOs,
there
is
better
of
the
above
54
PROJECT PLANNING
Identifying deliverables
55
the
project
are
determined.
The durations
for
the
various tasks necessary to complete the work are listed and grouped into
a work breakdown structure. The logical dependencies between tasks are
defined using an activity network diagram that enables identification of
the critical path. Float or slack time in the schedule can be calculated
using project management software. Then the necessary resources can
be estimated and costs for each activity can be allocated to each
resource, giving the total project cost. At this stage, the project plan may
be optimized to achieve the appropriate balance between resource
usage and project duration to comply with the project objectives. Once
established and agreed, the plan becomes what is known as the
baseline. Progress will be measured against the baseline throughout the
56
SOFTWARE REQUIREMENT
SPEIFICATIONS(SRS)
57
requirements. Non-functional
requirements are
58
59
information-gathering
stage
can
include
onsite
visits,
FUNCTIONAL REQUIREMENT
60
(see
also software).
Functional
requirements
may
be
requirements
requirements (also
known
are
supported
as quality
by non-functional
requirements),
which
impose
is
detailed
in
the
Functional
a
system,
requirements
while
drive
non-functional
the application
requirements drive
61
62
NON-FUNCTIONAL REQUIREMENT
63
measure."
64
WATERFALL MODEL
The waterfall
model is
often
used
Construction, Testing,
65
66
stages
of
"The
Waterfall
Model"
are:
&
Unit
Testing:
On
receiving
system
design
67
CONSTRUCTIVE COST
MODEL(COCOMO)
68
69
CLASS DIAGRAM
70
Class Diagram
NGO
71
2011
Check Date
Payment
Logout
Stop
Grants
APPLICATION ( )
UPDATE( )
DELETE( )
REMOVE( )
PAYMENT
SCHEME
SCHE- ID:NUMBER
SCH-NAME: CHAR
CUST ID: NUMBER
ISSUE DATE: DATE
CLOSING DATE: DATE
NGO NAME :CHAR
AMOUNT: NUMBER
FORM ID: NUMBER
ELIGIBILITY: VARCHAR
MINISTRY NAME:CHAR
PAY DATE: DATE
DRAFT NO. : NUMBER
ADD SCHEME( )
GRANTS
UPDATE SCHEME ( )
BRANCH NO.: NUMBER
SCH-ID: NUMBER
SCH-NAME: CHAR
AMOUNT : NUMBER
AMOUNT: NUMBER
INSTALLMENT: VARCHAR
PAYMENT ( )
MINISTRY NAME: CHAR
FLOW CHART
WITHDRAW ( )
APRROVE ( )
DISAPPROVE ( )
CHECK BALANCE()
PROJECT
PROJECT ID.: NUMBER
PROJECT NAME.: VARCHAR
LOCATION: CHAR
SCHEME ID:NUMBER
Download Schemes
Make Payment
Apply Online
ADD PROJECT ( )
REMOVE PROJECT
( )
UPDATE PROJECT( )
Search schemes
72
Start
NGO Registration
NGO Directory
Enter Details
SCHEDULING
TECHNIQUES
Scheduling is the process of deciding how to commit resources between
a variety of possible tasks. Time can be specified or floating as part of a
sequence of events.
In packet-switched computer networks and other statistical multiplexing,
the notion of a scheduling algorithm is used as an alternative to firstcome first-served queuing of data packets.
The simplest best-effort scheduling algorithms are round-robin, fair
queuing (a max-min
fair scheduling
fair scheduling
and maximum
throughput.
algorithm), proportionally
If
differentiated
or
73
Packet
Access
) 3.5G cellular
system, channel-dependent
GANTT CHART
74
Initial
Investigation
Analysis&
Design
75
Testing
Maintenance3050
70
90
110
Days
Implementationtime
Actualscheduling
PERT CHART
76
A chart that displays the sequence of tasks that form the project
schedule. PERT charts are particularly useful for highlighting a
project's critical path.
77
78
Analysis
20
20
Initial
investigat
3020 ion
Coding
20 Testing
Implementation
20
20
Design
79
RISK MANAGEMENT
of
project
management,
security, engineering,
industrial
80
create value
be tailored
81
82
Identification
After establishing the context, the next step in the process of managing
risk is to identify potential risks.
83
Scenario-based
risk
identification In scenario
analysis different
Taxonomy-based risk identification The taxonomy in taxonomybased risk identification is a breakdown of possible risk sources. Based
on the taxonomy and knowledge of best practices, a questionnaire is
compiled. The answers to the questions reveal risks.
84
85
Schedule Risk:
Project schedule get slip when project tasks and schedule release risks
are not addressed properly.
Schedule risks mainly affect on project and finally on company economy
and may lead to project failure.
Schedules often slip due to following reasons:
Wrong time estimation
Budget Risk:
86
Cost overruns
Operational Risks:
Risks of loss due to improper process implementation, failed system or
some external events risks.
Causes of Operational risks:
Insufficient resources
No resource planning
No communication in team.
Technical risks:
Technical risks generally leads to failure of functionality and
performance.
Causes of technical risks are:
87
Programmatic Risks:
These are the external risks beyond the operational limits. These are all
uncertain risks are outside the control of the program.
These external events can be:
Market development
88
SYSTEM DESIGN
interfaces,
a system to
satisfy
development.
ofsystems
There
is
analysis, systems
some
overlap
with
the
89
3. Files
4. Process
Types of Systems
90
91
92
Probabilistic systems
It is on in which the occurrence of events of cannot be perfectly
predicted.
Man-made systems:
These systems are designed for interaction between the users and the
system . Some of the main made systems are:
a. Transaction Processing System (TPS)
b. Management Information System (MIS)
c. Decision Support System (DSS)
d. Office Automation System (OAS)
93
94
PROGRAM STRUCTURE
95
Apply scheme
Make Payments
apply
for that.
3). If a NGO dont know any scheme then he can go to the site and apply
for the Schemes then
96
97
Entity Integrity
Domain Integrity
Referential integrity
User-Defined Integrity
Referential integrity ensures that rows cannot be deleted, which are used
by other records (for example, corresponding data values between tables
will be vital).
98
PRIMARY KEY
UNIQUE
FOREIGN KEY
CHECK
NOT NULL
99
A FOREIGN KEY constraint prevents any actions that would destroy link
between tables with the corresponding data values. A foreign key in one
table points to a primary key in another table. Foreign keys prevent
actions that would leave rows with foreign key values when there are no
primary keys with that value. The foreign key constraints are used to
enforce referential integrity.
A NOT NULL constraint enforces that the column will not accept null
values. The not null constraints are used to enforce domain integrity, as
the check constraints.
100
101
USER INTERFACE
DESIGN
User
interface
design or user
of computers, appliances,
interface
engineering is
machines, mobile
the
design
communication
its usability.
The
design
process
must
balance
technical
102
that
be software
design,
user
research, web
design,
or
industrial.
The following tips and techniques:
1. Consistency, consistency, consistency. I believe the most
important thing you can possibly do is ensure your user interface
works consistently. If you can double-click on items in one list and
have something happen, then you should be able to double-click on
items in any other list and have the same sort of thing happen. Put
your buttons in consistent places on all your windows, use the same
wording in labels and messages, and use a consistent color scheme
throughout. Consistency in your user interface enables your users
to build an accurate mental model of the way it works, and accurate
mental models lead to lower training and support costs.
2. Set standards and stick to them. The only way you can ensure
consistency within your application is to set user interface design
standards, and then stick to them. You should follow Agile Modeling
(AM)s Apply Modeling Standards practice in all aspects of software
development, including user interface design.
3. Be prepared to hold the line. When you are developing the user
interface for your system you will discover that your stakeholders
103
104
input
are
separately
worded
well,
together
they
are
105
your applications and, if you do use it, you must also use a
secondary indicator. The problem is that some of your users may be
color blind and if you are using color to highlight something on a
screen, then you need to do something else to make it stand out if
you want these people to notice it. You also want to use colors in
106
your application, you need to ensure that your screens are still
readable. The best way to do this is to follow the contrast rule: Use
dark text on light backgrounds and light text on dark backgrounds.
Reading blue text on a white background is easy, but reading blue
text on a red background is difficult. The problem is not enough
contrast exists between blue and red to make it easy to read,
whereas there is a lot of contrast between blue and white.
12.
editing field, you want to organize the fields in a way that is both
visually appealing and efficient. I have always found the best way to
do so is to left-justify edit fields: in other words, make the left-hand
side of each edit field line up in a straight line, one over the other.
The corresponding labels should be right-justified and placed
immediately beside the field. This is a clean and efficient way to
organize the fields on a screen.
13.
107
users dont know how to use your software, they should be able to
determine how to use it by makingeducated guesses. Even when
the guesses are wrong, your system should provide reasonable
results from which your users can readily understand and ideally
learn.
16.
108
interface
Model
Driven
Development
TESTING
109
Need
For any company developing software, at some point pressure to reach
the deadline in order to release the product on time will come into play.
Additional pressure from project stakeholders, Quite often, planned time
to test the software (e.g. ascertain its quality - QA) will become reduced
so as not to impact the release date. From a pure business perspective,
this can be seen as a positive step as the product is reaching the
110
to
test.
TEST PLAN
A test plan documents the strategy that will be used to verify and ensure
that a product or system meets its design specifications and other
requirements. A test plan is usually prepared by or with significant input
from Test Engineers.
111
Manufacturing
or
Production
test -
to
be
performed
during
112
113
114
TEST FLOW
INFORMATION
115
TESTING USED
Unit Test.
System Test
Integration Test
Functional Test
Performance Test
116
Unit Test
The first test in the development process is the unit test. The source
code is normally divided into modules, which in turn are divided into
smaller units called units. These units have specific behavior. The test
done on these units of code is called unit test. Unit test depends upon
the language on which the project is developed. Unit tests ensure that
each unique path of the project performs accurately to the documented
specifications and contains clearly defined inputs and expected results.
System Test
117
System testing ensures that the entire integrated software system meets
requirements. It tests a configuration to ensure known and predictable
results. System testing is based on process descriptions and flows,
emphasizing pre-driven process links and integration points.
118
119
Functional Test
Functional test can be defined as testing two or more modules together
with the intent of finding defects, demonstrating that defects are not
present, verifying that the module performs its intended functions as
stated in the specification and establishing confidence that a program
does what it is supposed to do.
Acceptance Testing
Testing the system with the intent of confirming readiness of the product
and customer acceptance.
Ad Hoc Testing
Testing without a formal test plan or outside of a test plan. With some
projects this type of testing is carried out as an adjunct to formal testing.
If carried out by a skilled tester, it can often find problems that are not
120
Alpha Testing
Testing after code is mostly complete or contains most of the
functionality and prior to users being involved. Sometimes a select group
of users are involved. More often this testing will be performed in-house
or by an outside testing firm in close cooperation with the software
engineering department.
Regression Testing
If a piece of Software is modified for any reason testing needs to be done
to ensure that it works as specified and that it has not negatively
impacted any functionality that it offered previously. This is known as
Regression Testing.
VERIFICATION AND
VALIDATION
121
122
Validation
Am I building the right
product
Determining if the system
complies
with
the
requirements and performs
functions for which it is
intended and meets the
organizations goals and user
needs. It is traditional and is
performed at the end of the
project.
Am I accessing the right data
(in terms of the data required
to satisfy the requirement)
High level activity
Performed after a work
product is produced against
established criteria ensuring
that the product integrates
correctly
into
the
environment
Determination of correctness
of the final software product
by a development project
with respect to the user
needs and requirements
Verification
Am I building the product right
The review of interim work steps
and interim deliverables during a
project to ensure they are
acceptable. To determine if the
system is consistent, adheres to
standards,
uses
reliable
techniques and prudent practices,
and
performs
the
selected
functions in the correct manner.
Am I accessing the data right (in
the right place; in the right way).
Low level activity
Performed during development on
key artifacts, like walkthroughs,
reviews and inspections, mentor
feedback, training, checklists and
standards
Demonstration of consistency,
completeness, and correctness of
the software at each stage and
between each stage of the
development life cycle.
123
124
125
Test
Id
Objective
TEST CASES
DESIGNExpected
Descricpti
on
Result
Actual
Result
Stat
us
126
To check the
functionality of
link buttons
TC-002
TC-003
TC-004
TC-005
TC-006
TC-007
TC-008
To Check
caption of label
password
To check
whether text is
password
To check the
functionality of
sign in button
To check the
functionality of
sign up button
To check the
functionality of
home menu
To check the
back button
TC-009
TC-010
Check the
functionality of
post submit
button
Check the print
button function
TC-011
TC-012
To Check
txtuser whether
it accepts char
and numeric
both
To check the
functionality of
Discard Button
Txt passwd
should display
Pass
Password
Pass
Password<=8
chars
Pass
Password
Password<=8
chars
Move to sig in
page
Pass
Move to sig in
page
Pass
Move to new
user page
Home Page
Home Page
Back Word
page
Next page
Next page
Print the
current page
Accepted
Accepted
Type both
char and
numeric in
txtuser
Discard the
functioning
Type in the txt
passwd
Pass
Pass
Pass
Pass
Pass
Pass
Error Msg
Error Msg
Only Astric(*)
Only Astric(*)
Pass
127
128
TEST REPORTS
andthe
customer
to
know the
129
BUG REPORTS
BUG REPORT
Tester Name: Shivshankar Kumar Shah
Module: Login.aspx
Test Date:28/9/2011
130
Module:Search .aspx
Test Date : 28/3/2011
Objective: To check the functionality of Search Button
Description: 1. Run the Search NGO .aspx page
2.Type Valid NGO ID.
3.Type Invalid Id
Bug Report
Tester ID:Shivshankar shah
Module:ForgetPasswd.aspx
Test Date : 28/3/2011
Objective: To check the functionality of Send Button
Description: 1. Run the forget passwd .aspx page
2.Type Valid User name
3.Type Invalid email Id
Expected Result:-Error Msg
Actual Result:-Redirect to the Change Password page
Bug Report
Tester ID: shivshankar shah
Module:Feedback.aspx
Test Date : 28/3/2011
Objective: To check the functionality of Send Button
Description: 1. Run the feedback.aspx page
2.Type Subject
131
132
DEBUGGING
monitoring
flow, integration
(application, system),memory
more
methods
to
detect
anomalies,
assess
impact,
and
133
Tools
Debugging ranges, in complexity, from fixing simple errors to performing
lengthy and tiresome tasks of data collection, analysis, and scheduling
updates. The debugging skill of the programmer can be a major factor in
the ability to debug a problem, but the difficulty of software debugging
varies greatly with the complexity of the system, and also depends, to
some extent, on the programming language(s) used and the available
tools, such as debuggers. Debuggers are software tools which enable
the programmer to monitor the execution of a program, stop it, re-start
it,
set breakpoints,
and
change
values
in
memory.
The
term debugger can also refer to the person who is doing the debugging.
Generally, high-level
programming
languages,
such
as Java,
make
the
initial
problem
happened.
In
those
cases, memory
134
Techniques
135
136
CODE IMPROVEMENTS
INDENTATION
Code Indentation:
Variable `wave-block-indent' specifies relative indent for
block statements(begin...end),
variable `wave-continuation-indent' specifies relative indent for
continuation lines.
Continuation lines inside [], (), {} (structures) are indented by
`wave-continuation-indent' chars after opening parenthesis.
Continuation lines in PRO, FUNCTION declarations are indented
just after the procedure/function name followed by comma.
Labels not followed by code are left justified to the beginning
of the line.
Include files introduced by '@' are left justified to the beginning
of the line.
COMMENT INDENTATION
137
138
SECURITY
Computer
security is
branch
of
computer
technology
known
139
DATABASE
SECURITY
unintended
activity.
Unintended
activity
can
be
made
by
authorized
individuals
or
processes. Database
and
alert
on
malicious
database
protocol
traffic
include
140
Access control
Auditing
Authentication
Encryption
Integrity controls
Database security can begin with the process of creation and publishing
of appropriate security standards for the database environment. The
standards may include specific controls for the various relevant database
platforms; a set of best practices that cross over the platforms; and
linkages of the standards to higher level polices and governmental
regulations.
IT provides a formidable defense against SQL Injection, Script Injection
(Cross Site Scripting), Input Tampering, and Brute Force attacks on your
ASP.NET web sites.
141
Security Analysis Report - An audit of all the page's inputs and their
security settings
Log And Respond Engine - Log and email attacks, exceptions, and
errors on your site
142
SQL Server 2005 supports DDL Triggers. DDL Triggers are triggers that
fire in response to data definition language (DDL) statements such as
CREATE TABLE or UPDATE STATISTICS. They're similar to the data
manipulation language (DML) triggers that we've been using for years,
except that they're tied to a database or server instead of a table or
view. With DDL Triggers we can write code that runs in response to
changes made to server and database objects. This can be a very
powerful tool. (It becomes even more powerful when used with SQL
Server's CLR Integration feature, which allows SQL Server objects to be
created with our choice of .NET language.) DDL Triggers can be used for
many purposes, but most commonly for change tracking and prevention.
This article introduces DDL Triggers and shows how to use them to track
and prevent changes to database objects. We'll discuss trigger creation,
trigger deletion, and trigger security. We'll also walk through some
examples of typical DDL Trigger use. Along the way, we'll see how we
can use XQuery to retrieve specific information about the event that
143
DATA SECURITY
Data
security is
the
means
of
ensuring
that data is
kept
safe
ENCRYPTION
Encryption has become a critical security feature for thriving networks
and
active
home
users
alike.
This
security
mechanism
uses
144
Authentication
Authentication is another part of data security that we encounter with
everyday computer usage. Just think about when you log into your email
or blog account. That single sign-on process is a form authentication that
allows you to log into applications, files, folders and even an entire
computer system. Once logged in, you have various given privileges until
logging out. Some systems will cancel a session if your machine has
been idle for a certain amount of time, requiring that you prove
authentication once again to re-enter.
The single sign-on scheme is also implemented into strong user
authentication systems. However, it requires individuals to login using
145
Backup Solutions
Data security wouldn't be complete without a solution to backup your
critical information. Though it may appear secure while confined away in
a machine, there is always a chance that your data can be compromised.
You could suddenly be hit with a malware infection where a virus
destroys all of your files. Someone could enter your computer and thieve
data by sliding through a security hole in the operating system. Perhaps
it was an inside job that caused your business to lose those sensitive
reports. If all else fails, a reliable backup solution will allow you to restore
your data instead of starting completely from scratch.
VALIDATION CONTROLS
Set of server controls bundled with ASP.NET which verifies user input.
After coming from HTML server controls and Web server controls, input is
checked against requirements defined by the developer. Validation
146
validate
using
client-side
scripting
if
the
user's
browser
supports DHTML.
While any application can be designed with sound logic and good
technology and can deliver high performance with accuracy, some errors
could still creep into it. This could be due to wrong inputs by users. While
the programmer may have taken care of all the exceptions it could cause
a loss of business goodwill if a customer is confronted with an error
message after he has input data into a number of fields. All of us are
familiar with warnings like Please enter a valid ZIP or Please Enter
Your First Name! and so on!
Thus some client side validations ensure that correct data is sent to the
application. We can ensure such validations using validation controls.
.NET Framework provides several controls for different types of
validations.
147
The validation Controls that are available in .Net Framework are given
below:
Control
Description
Ensures that the user enters data in the
RequiredFieldValidator associated data-entry control
Uses comparison operators to compare userentered data to a constant value or the value in
CompareValidator
another data-entry control
Ensures that the user-entered data is in a range
RangeValidator
between given lower and upper bounds
RegularExpressionValid Ensures that the user entered data matches a
ator
regular expression pattern
Ensures that the user-entered data passes
CustomValidator
validation criteria that you set yourself
This is one of the simplest controls to use. This validating control makes
sure that the users have entered data into a data-entry control. For
example, you may want to make sure that users enter their mail id or
their credit card number before they proceed to submit the form. The
RequireFieldValidator control will ensure that the user will not be able to
148
The other controls do not perform validation if the data entry field is
empty and make it appear that the validation succeeded when no
validation check has been performed. Therefore, it is imperative that a
validation check be performed before other checks are activated.
Comparison Validators
This control is used to validate the value entered in to one data entry
control by comparing it with the data entered in to another control. The
ControlToValidate property sets the field to be validated. The
ControlToCompare property specifies the control to compare with. You
can also validate the data from constant value by setting the property
149
Value
Equal
NotEqual
GreaterThan
GreaterThanEq
ual
LessThan
LessThanEqual
Description
Checks if the comared values are equal
Checks if the compared values are not equal
Checks for greater than relationship
1. String
150
Integer
3.
Double
4.
Date
5.
Currency
Range Validators
A range validator test is used to check if the value entered in the dataentry control is within a specified range of values. The property
ControlToValidate is set to the control that contains the data which is to
be validated. The property MinimumValue sets the minimum value of the
range. The property MaximumValue sets the maximum value of the
range. The property Type sets the date type of the values to be
compared. All the types of comparisons discussed above are still valid for
this also.
151
Custom Validators
This control allows the developer freedom to define his own validations.
The property ClientValidationFunction property sets the name of function
or script that will do the validation. This function takes two parameters.
The first argument source identifies the source control to validate. The
second argument arguments hold the data to validate.
152
Exception Handling
if application do
not
provide
mechanism
to
handle
these anomalies then there might be cases the application may crash.
153
run
default
mechanism,
which
Try
Catch
Finally block.
All the three are ASP.NET keywords and are used do exception handling.
The try block encloses the statements that might throw an exception
whereas catch block handles any exception if one exists. The finally
block can be used for doing any clean up process. Any general ASP.NET
exception forces the application to terminate without allowing the code
to continue executing, resulting in an error page.
try
{
// Statements that are can cause exception
}
154
155
156
157
only
shrink-wrapped
commercial
software
on
your
computers.
Pay
attention
to
passwords. One
bad
password
can
158
Restrict access to the admin log pruning and viewing to the administrator only,
and do not allow anybody else to have access to do that (including other admins)
Keep the amount of admins and super mods very very low. I.e. only have
yourself as an administrator if possible and if someone else needs admin control
panel
access,
they
can
be
set
to
the
super
mod
usergroup.
Turn off HTML in signatures, private messages and posting - this way old &
new
Turn
exploits
off
the
way
can
to
link
not
images
dynamic
be
with
abused.
[
img
tags.
159
Keep an eye on your crew and if someone gets mad, track his steps more
carefully
and
you
can
prevent
someone
to
mass
destruct
your
site.
You can set the main administrator as 'invisible' and post on your site with a
different username/pass - this way they can't 'guess' the username of the main
admin
that
easy.
You should frequently cycle through your passwords and make new ones, this
way if one of your passes get out in the open, good chance that when they try it, it
doesn't
work.
Suggest
your
members
and
staff
to
do
the
SAME.
Use hard to guess passwords to avoid brute force attacks - in case someone has
the hashed (encrypted) password. Use upper and lower case letter, numbers and
extra
moo
!M0_o!
characters
is
like
@$%
easy
to
is
etc.
(and
brute
at
least
force
bit
and
characters)
guess
harder
160
MAINTENANCE OF THE
PROJECT
161
migration
process
(platform
migration,
for
example)
is
162
Modification Request and Problem Report Help Desk: a problemhandling process used by maintainers to prioritize, documents and
route the requests they receive;
163
problem
reports
that
in
reality
are
functionality
and
that
maintenance
decisions
are
aided
by
are:
limited
understanding, impact
analysis,
testing,
maintainability measurement.
Corrective
164
software
maintenance
involves
computer
programmers
interfaces.
Sometimes
programmers
need
to
conduct
165
computer
programmers
engage
in
preventative
software
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
Login User.aspx
using
using
using
using
using
using
using
using
using
using
using
System;
System.Data;
System.Configuration;
System.Collections;
System.Web;
System.Web.Security;
System.Web.UI;
System.Web.UI.WebControls;
System.Web.UI.WebControls.WebParts;
System.Web.UI.HtmlControls;
System.Data.SqlClient;
182
SqlDataAdapter da = new
SqlDataAdapter(strsql, con);
DataSet ds = new DataSet();
da.Fill(ds);
if (ds.Tables[0].Rows.Count == 0)
{
lblmsg.Text = "Login Are Not Match";
}
else
{
Session["uname"] = txtuid;
Response.Redirect("Service.aspx");
}
con.Close();
con.Dispose();
}
protected void Menu1_MenuItemClick(object sender,
MenuEventArgs e)
{
}
protected void LinkButton1_Click(object sender,
EventArgs e)
{
Response.Redirect("FPwd.aspx");
}
}
183
Sign Up.aspx
using
using
using
using
using
using
using
using
using
using
using
System;
System.Data;
System.Configuration;
System.Collections;
System.Web;
System.Web.Security;
System.Web.UI;
System.Web.UI.WebControls;
System.Web.UI.WebControls.WebParts;
System.Web.UI.HtmlControls;
System.Data.SqlClient;
{
}
184
185
Feed Back.aspx
using
using
using
using
using
using
using
using
using
using
using
System;
System.Data;
System.Configuration;
System.Collections;
System.Web;
System.Web.Security;
System.Web.UI;
System.Web.UI.WebControls;
System.Web.UI.WebControls.WebParts;
System.Web.UI.HtmlControls;
System.Data.SqlClient;
186
187
Forgot Password.aspx
using
using
using
using
using
using
using
using
using
using
using
System;
System.Data;
System.Configuration;
System.Collections;
System.Web;
System.Web.Security;
System.Web.UI;
System.Web.UI.WebControls;
System.Web.UI.WebControls.WebParts;
System.Web.UI.HtmlControls;
System.Data.SqlClient;
188
else
{
lblmsg.Text = ds.Tables[0].ToString();
}
con.Close();
con.Dispose();
}
protected void Menu1_MenuItemClick(object sender,
MenuEventArgs e)
{
}
protected void LinkButton1_Click(object sender,
EventArgs e)
{
Response.Redirect("Admin.aspx");
}
}
189
Change Password.aspx
using
using
using
using
using
using
using
using
using
using
using
System;
System.Data;
System.Configuration;
System.Collections;
System.Web;
System.Web.Security;
System.Web.UI;
System.Web.UI.WebControls;
System.Web.UI.WebControls.WebParts;
System.Web.UI.HtmlControls;
System.Data.SqlClient;
190
}
else
{
Panel2.Visible = true;
Panel1.Visible = false;
lblmsg.Text = " ";
}
con.Close();
con.Dispose();
}
protected void ImageButton1_Click(object sender,
ImageClickEventArgs e)
{
con = new
SqlConnection("Server=localhost\\sqlexpress;database=
hotel;" + "Integrated Security=True");
con.Open();
string strsql = "update signup set
pwd="+"'"+txtnpwd.Text+"'";
SqlDataAdapter da = new
SqlDataAdapter(strsql, con);
DataSet ds = new DataSet();
da.Fill(ds);
lblmsg.Text = "Password Change Successfully";
Panel2.Visible = false;
con.Close();
con.Dispose();
}
}
using
using
using
using
using
using
using
using
Administrator Login
System;
System.Data;
System.Configuration;
System.Collections;
System.Web;
System.Web.Security;
System.Web.UI;
System.Web.UI.WebControls;
191
using System.Web.UI.WebControls.WebParts;
using System.Web.UI.HtmlControls;
using System.Data.SqlClient;
public partial class Default2 : System.Web.UI.Page
{
public SqlConnection con;
public SqlCommand com;
protected void Page_Load(object sender, EventArgs
e)
{
}
protected void LinkButton2_Click(object sender,
EventArgs e)
{
Response.Redirect("Signup.aspx");
}
protected void ImageButton1_Click(object sender,
ImageClickEventArgs e)
{
if (txtuid.Text == "Admin" && txtpwd.Text
=="Track")
{
Response.Redirect("Admin.aspx");
}
else
{
lblmsg.Text = "You Not Authorize To Use
This Service";
}
}
protected void Menu1_MenuItemClick(object sender,
MenuEventArgs e)
{
}
192
Admin Page
using
using
using
using
using
using
using
using
using
using
System;
System.Data;
System.Configuration;
System.Collections;
System.Web;
System.Web.Security;
System.Web.UI;
System.Web.UI.WebControls;
System.Web.UI.WebControls.WebParts;
System.Web.UI.HtmlControls;
sender,
sender,
sender,
sender,
193
Response.Redirect("CRAva.aspx");
}
protected void LinkButton5_Click(object sender,
EventArgs e)
{
Response.Redirect("ViewAll.aspx");
}
protected void LinkButton6_Click(object sender,
EventArgs e)
{
Response.Redirect("ViewAllChkOut");
}
protected void LinkButton7_Click(object sender,
EventArgs e)
{
Response.Redirect("SBook.aspx");
}
protected void LinkButton8_Click(object sender,
EventArgs e)
{
Response.Redirect("SCust.aspx");
}
protected void LinkButton9_Click(object sender,
EventArgs e)
{
Response.Redirect("Bill.aspx");
}
protected void LinkButton10_Click(object sender,
EventArgs e)
{
Response.Redirect("VCFB.aspx");
}
protected void LinkButton11_Click(object sender,
EventArgs e)
{
Response.Redirect("Services.aspx");
}
194
195
DETAILS.aspx
using System;
using System.Data;
using System.Configuration;
using System.Collections;
using System.Web;
using System.Web.Security;
using System.Web.UI;
using System.Web.UI.WebControls;
using System.Web.UI.WebControls.WebParts;
using System.Web.UI.HtmlControls;
using System.Data.SqlClient;
public partial class _Default : System.Web.UI.Page
{
public SqlConnection con;
public SqlCommand com;
protected void Page_Load(object sender, EventArgs
e)
{
}
protected void
DropDownList2_SelectedIndexChanged(object sender,
EventArgs e)
{
}
protected void Button2_Click(object sender,
EventArgs e)
{
con = new
SqlConnection("Server=localhost\\sqlexpress;database=
hotel;" + "Integrated Security=True");
con.Open();
string strsql = "select *from chkin where
roomno="+txtroomno.Text;
SqlDataAdapter da = new
SqlDataAdapter(strsql, con);
196
197
da.Fill(ds);
con.Close();
con.Dispose();
lblmsg.Text = "Data
Inserted Successfully";
}
protected void Button3_Click(object sender,
EventArgs e)
{
Response.Redirect("Payment.aspx");
}
protected void Menu1_MenuItemClick(object sender,
MenuEventArgs e)
{
}
protected void LinkButton1_Click(object sender,
EventArgs e)
{
Response.Redirect("Admin.aspx");
}
}
VIEW PAGE.aspx
using
using
using
using
System;
System.Data;
System.Configuration;
System.Collections;
Web;
System.Web.Security;
System.Web.UI;
System.Web.UI.WebControls;
System.Web.UI.WebControls.WebParts;
System.Web.UI.HtmlControls;
System.Data.SqlClient;
using System.
using
using
using
using
using
using
198
199
200
BIBLOGRAPHY
****************************************************
201
202