Professional Documents
Culture Documents
Introduction
Objective
System Analysis
System analysis is a process of gathering and interpreting facts, diagnosing
problems and the information to recommend improvements on the system. It is a
problem solving activity that requires intensive communication between the
system users and system developers. System analysis or study is an important
phase of any system development process. The system is studied to the minutest
detail and analyzed. The system analyst plays the role of the interrogator and
dwells deep into the working of the present system. The system is viewed as a
whole and the input to the system are identified. The outputs from the
organizations are traced to the various processes. System analysis is concerned
with becoming aware of the problem, identifying the relevant and decisional
variables, analyzing and synthesizing the various factors and determining an
optimal or at least a satisfactory solution or program of action.
Identification of Need
The 1st step of the system analysis procedure involves the identification of
requirement. The analyst system engineer meets with the customer and the end
user if different from the customer. Customer may be a representative of an
outside organization the marketing department of the analyst's organization
when a product is being established or another technical department when an
internal system is to be established. Like information engineering the intent is to
understand the product's goal and to describe the target wants to meet the goal.
Once overall target are identified the analyst moves on to an evaluation of
supplementary information that are: Does the technology exist to build the
system? What special manufacturing and development resources will be needed?
What bounds have been placed on schedule and costs? If the new system is
really a product to be established for sale to various customers the following
questions are also asked that are how does this product compare with
competitive products? What is the potential market for the product? What
position does this product take in the overall product line of the organization?
new system needs less human efforts. The proposed project is beneficial to the
organizational and is user friendly..
PERT Chart
Start
Format Design
Meet end user
Meet manager
Visit Office
Coding of Project
Finish
Visit In
GANTT Chart
A Gantt chart is a horizontal bar chart developed as a production control tool in 1917
by Henry L. Gantt, an American engineer and social scientist. A Gantt chart provides a
graphical illustration of a schedule that helps to plan, coordinate and track specific
tasks in a project.
ACTIVITY
10/0517/05
18/0525/05
1/0610/06
11/0620/06
Project
Search
Finalization
&
Allocation
Investigation
of system
requirement
System
Design
Program
design
Program
coding
System
integration
Acceptance
test
01/0810/09
12/0918/09
19/0920/09
There are a large number of software models used for guiding the
software development process. Normally every software model contains
almost same life cycle except there are some difference process
techniques. In this software we have used the linear sequential model
because it is easiest one to implement and we have to follow the
straightforward techniques for developing the software. There are following
steps we have gone through in the complete process.
ANALYSIS:- In this step we have gathered the different requirement to
develop the software, to understand the nature of the program to be build
and all the requirement for both the system and the users has been
identified.
DESIGN:- Software design is actually a group of process that a group of
that focuses on four distinct attribute of a program- data structure,
software architecture, interface representation and procedural detail the
design process translates requirements into a representation of the software
that can be accessed for quality before coding begins. Like requirements
the design is documented becomes part of the software configuration
CODE GENERATION:- The design must be translated into a machine
readable from to develop the software. The code generation step performs
this task. If design is performed in a detail manner, this code generation
can accomplish EASILY.
TESTING:- Once code has been generated the program testing begins.
The testing begins. The testing process focuses on the logical internals of
the software, ensuring that all statement have been tested and on the
functional externals, that is conducting tests to uncover errors and ensure
that defined input will produce actual result that agree with required
result.
10
11
12
HARDWARE CONFIGURATION
1.
Processor
2.
RAM
512MB
3.
HDD
40GB
4.
Monitor
5.
Pointing device
6.
Keyboard
104 Keys
SOFTWARE CONFIGURATION
1.
2.
3.
4.
5.
13
code that does not target the runtime is known as unmanaged code. The class
library, the other main component of the .NET Framework, is a comprehensive,
object-oriented collection of reusable types that you can use to develop
applications ranging from traditional command-line or graphical user interface
(GUI) applications to applications based on the latest innovations provided by
ASP.NET, such as Web Forms and XML Web services.
The .NET Framework can be hosted by unmanaged components that load the
common language runtime into their processes and initiate the execution of
managed code, thereby creating a software environment that can exploit both
managed and unmanaged features. The .NET Framework not only provides
several runtime hosts, but also supports the development of third-party runtime
hosts.
For example, ASP.NET hosts the runtime to provide a scalable, serverside environment for managed code. ASP.NET works directly with the runtime
to enable Web Forms applications and XML Web services, both of which are
discussed later in this topic.
16
17
Console applications.
Scripted or hosted applications.
Windows GUI applications (Windows Forms).
ASP.NET applications.
XML Web services.
Windows services.
ASP.NET
Server Application Development
Server-side applications in the managed world are implemented through
runtime hosts. Unmanaged applications host the common language runtime,
which allows your custom managed code to control the behavior of the server.
This model provides you with all the features of the common language runtime
18
and class library while gaining the performance and scalability of the host
server.
The following illustration shows a basic network schema with managed
code running in different server environments. Servers such as IIS and SQL
Server can perform standard operations while your application logic executes
through the managed code.
Framework. In addition, your code no longer needs to share the same file with
your HTTP text (although it can continue to do so if you prefer). Web Forms
pages execute in native machine language because, like any other managed
application, they take full advantage of the runtime. In contrast, unmanaged ASP
pages are always scripted and interpreted. ASP.NET pages are faster, more
functional, and easier to develop than unmanaged ASP pages because they
interact with the runtime like any managed application.
The .NET Framework also provides a collection of classes and tools to aid
in development and consumption of XML Web services applications. XML Web
services are built on standards such as SOAP (a remote procedure-call protocol),
XML (an extensible data format), and WSDL ( the Web Services Description
Language). The .NET Framework is built on these standards to promote
interoperability with non-Microsoft solutions.
For example, the Web Services Description Language tool included with
the .NET Framework SDK can query an XML Web service published on the
Web, parse its WSDL description, and produce C# or Visual Basic source code
that your application can use to become a client of the XML Web service. The
source code can create classes derived from classes in the class library that
handle all the underlying communication using SOAP and XML parsing.
Although you can use the class library to consume XML Web services directly,
the Web Services Description Language tool and the other tools contained in the
SDK facilitate your development efforts with the .NET Framework.
If you develop and publish your own XML Web service, the .NET
Framework provides a set of classes that conform to all the underlying
communication standards, such as SOAP, WSDL, and XML. Using those classes
enables you to focus on the logic of your service, without concerning yourself
with the communications infrastructure required by distributed software
development.
Finally, like Web Forms pages in the managed environment, your XML Web
service will run with the speed of native machine language using the scalable
communication of IIS.
20
21
22
SQL SERVER
A database management, or DBMS, gives the user access to their data and
helps them transform the data into information. Such database management
systems include dBase, paradox, IMS, SQL Server and SQL Server. These
systems allow users to create, update and extract information from their
database.
A database is a structured collection of data. Data refers to the
characteristics of people, things and events. SQL Server stores each data item in
its own fields. In SQL Server, the fields relating to a particular person, thing or
event are bundled together to form a single complete unit of data, called a record
(it can also be referred to as raw or an occurrence). Each record is made up of a
number of fields. No two fields in a record can have the same field name.
During an SQL Server Database design project, the analysis of your
business needs identifies all the fields or attributes of interest. If your business
needs change over time, you define any additional fields or change the definition
of existing fields.
SQL SERVER TABLES
SQL Server stores records relating to each other in a table. Different
tables are created for the various groups of information. Related tables are
grouped together to form a database.
PRIMARY KEY
Every table in SQL Server has a field or a combination of fields that
uniquely identifies each record in the table. The Unique identifier is called the
Primary Key, or simply the Key. The primary key provides the means to
distinguish one record from all other in a table. It allows the user and the
database system to identify, locate and refer to one particular record in the
database.
23
RELATIONAL DATABASE
Sometimes all the information of interest to a business operation can be
stored in one table. SQL Server makes it very easy to link the data in multiple
tables. Matching an employee to the department in which they work is one
example. This is what makes SQL Server a relational database management
system, or RDBMS. It stores data in two or more tables and enables you to
define relationships between the table and enables you to define relationships
between the tables.
FOREIGN KEY
When a field is one table matches the primary key of another field is
referred to as a foreign key. A foreign key is a field or a group of fields in one
table whose values match those of the primary key of another table.
REFERENTIAL INTEGRITY
Not only does SQL Server allow you to link multiple tables, it also
maintains consistency between them. Ensuring that the data among related
tables is correctly matched is referred to as maintaining referential integrity.
24
DFD SYMBOLS:
In the DFD, there are four symbols
Data flow
26
Data Store
CONSTRUCTING A DFD:
1. Process should be named and numbered for an easy reference. Each name
should be representative of the process.
2. The direction of flow is from top to bottom and from left to right. Data
traditionally flow from source to the destination although they may flow back
to the source. One way to indicate this is to draw long flow line back to a
source. An alternative way is to repeat the source symbol as a destination.
Since it is used more than once in the DFD it is marked with a short diagonal.
3. When a process is exploded into lower level details, they are numbered.
4. The names of data stores and destinations are written in capital letters.
Process and dataflow names have the first letter of each work capitalized
27
Context Diagram
USER
28
Questionbank
Add Questions
LearningTbl
Administrator
Issue
PermanentTbl
RenewalTbl
View
Feedback
View
Test Result
FeedbackTbl
TestResult
29
userreg
Details
TestResult
Registration
Result
Apply
Questions
Apply
QuestionBank
Online Test
USER
Apply
Learning Licence
Details
LearningTbl
Apply
Permanent
Licence
Details
PermanentTbl
Feedback
Apply
Details
Vehicle Registration
FeedbackTbl
VehicleReg
30
ER Diagram
31
System Design
INPUT DESIGN
Input design is the process of converting a user-oriented description of the inputs
to a computer based business system into a programmer-oriented specification.
Inaccurate input data is the most common cause of processing errors. Effective
input design minimizes errors made by data entry operators. The input design is
the link that ties information system into the world of its users. Input design
consists of developing specific procedures for data preparations, steps necessary
to put the transaction data in the form that is usable for computer processing.
The data entry operator need to know the space allocated for each field, the field
sequence which must match with the source document and the format in which
the data is entered.
This project E-Road Transport Management System has got several inputs
taken from the user. They are:
Details of vehicles and license holders.
Complaints by the user.
The system is provided with C# pages for the user to input above details. Only
the administrator and registered user are able to upload data. So their details are
the major inputs to the system.
32
OUTPUT DESIGN
Outputs form computer systems are required primarily to communicate the
processing to the end users. The output of the system designed in such a way
that it provides, opportunities, problem or warnings, trigger an action and
confirm an action. The user-friendly interfaces provide a clear output to the
system.
The output of this software system is a website. This system consists of online
vehicle registration, fancy number selection, information about License and
complaint registration.
In this system the output that can be viewed by the end user is the website. It
provides an opportunity to get public awareness, online registration for vehicles,
selection of fancy number, license application form downloading and uploading,
and complaint registration, automatic e mail for the registered user about license
renewal etc.
Module design:
Software design sits at the technical kernel of the software engineering
process and is applied regardless of the development paradigm and area of
application. Design is the first step in the development phase for any engineered
product or system. The designers goal is to produce a model or representation
of an entity that will later be built. Beginning, once system requirement have
been specified and analyzed, system design is the first of the three technical
activities -design, code and test that is required to build and verify software.
The importance can be stated with a single word Quality. Design is the
place where quality is fostered in software development. Design provides us
with representations of software that can assess for quality. Design is the only
way that we can accurately translate a customers view into a finished software
product or system. Software design serves as a foundation for all the software
engineering steps that follow. Without a strong design we risk building an
33
unstable system one that will be difficult to test, one whose quality cannot be
assessed until the last stage.
During design, progressive refinement of data structure, program
structure, and procedural details are developed reviewed and documented.
System design can be viewed from either technical or project management
perspective. From the technical point of view, design is comprised of four
activities architectural design, data structure design, interface design and
procedural design.
MODULES
The main Modules of this system are:
1) Administrator
2) User
1)
35
DATABASE DESIGN
Tables structure
Table Name: UserLogin
Fieldname
Data Type
SIZE
Key
USERNAME
VARCHAR
25
PRIMARY
KEY
PASSWORD
VARCHAR
25
Field Name
Data Type
Size
USERNAM
E
FIRST
NAME
LAST
NAME
GENDER
VARCHAR2 25
Constraint
s
Primary
Key
NOT
NULL
NOT
NULL
NOT
NULL
VARCHAR2 50
VARCHAR2 25
VARCHAR2 10
MOBILENO VARCHAR2 10
SEC_QUES
VARCHAR2 100
SEC_ANS
VARCHAR2 50
NOT
NULL
NOT
NULL
36
Description
USER NAME
OF THE USER
FIRST NAME
OF THE USER
LAST NAME
OF USER
GENDER OF
USER
MOBILE NO
OF USER
SECURITY
QUESTION
SECURITY
ANSWER
Fieldname
Data Type
Length
USERNAME
VARCHAR
20
Key
PRIMARY
KEY
PASSWORD
VARCHAR
20
Column
Name
QID
Data
Type
INT
QUESTION
VARCH
AR
VARCH
AR
VARCH
AR
VARCH
AR
VARCH
AR
VARCH
AR
CHOICE1
CHOICE2
CHOICE3
RIGHT
IMAGE
37
Column
Name
ID
Data Type
Size
INT
32
USERNA
ME
CATEGOR
Y
FILENAM
E
DTE
VARCHAR
50
VARCHAR
50
VARCHAR
50
VARCHAR
50
Constrain
ts
PRIMAR
Y KEY
FOREIGN
KEY
NOT
NULL
NOT
NULL
NOT
NULL
Description
ID OF THE FILE
ID OF THE USER
CATEGORY OF FILE
NAME OF THE FILE
DATE
Data Type
Size
VARCHAR
30
VARCHAR
VARCHAR
VARCHAR
25
7
MAX
Constraint
s
PRIMARY
KEY
NOT NULL
NOT NULL
NOT NULL
CADDRES
S
DOB
EDU_QUA
L
MOBILEN
O
DTE
ID_MARK
VARCHAR
MAX
NOT NULL
DATE
VARCHAR
MAX
NOT NULL
NOT NULL
VARCHAR
15
NOT NULL
VARCHAR
VARCHAR
50
MAX
Description
USER NAME
NAME OF THE USER
SEX
PERMANENT
ADDRESS
COMMUNICATION
ADDRESS
DATE OF BIRTH
EDUCATIONAL
QUALIFICATION
CONTACT NO
BLOOD
EMAIL
STATUS
VARCHAR
VARCHAR
VARCHAR
8
50
50
MARK
NOT NULL BLOOD GROUP
NOT NULL E MAIL ADDRESS
NOT NULL STATUS
Data Type
Size
USERNAM VARCHA
E
R
TEMPNO
VARCHA
R
STATUS
VARCHA
R
DATE
DATE
30
AUTHORI
TY
50
VARCHA
R
50
50
Constrain
ts
FOREIGN
KEY
PRIMAR
Y KEY
NOT
NULL
NOT
NULL
NOT
NULL
Description
Constrain
ts
FOREIGN
KEY
PRIMAR
Y KEY
NOT
NULL
NOT
NULL
Description
ID OF LICENSE
HOLDER
TEMPORARY LICENSE
NUMBER
STATUS
LEARNING LICENCE
ISSUE DATE
NAME OF AUTHORITY
USERNAM
E
LICENCEN
O
DATE
VARCHA
R
VARCHA
R
DATE
30
AUTHORIT
Y
EXPIREDA
TE
STATUS
VARCHA
R
DATE
50
VARCHA
R
50
50
-
ID OF LICENSE
HOLDER
TEMPORARY LICENSE
NUMBER
PERMANENT LICENCE
ISSUE DATE
NAME OF AUTHORITY
LICENCE EXPIRE DATE
NOT
NULL
39
STATUS
Column Name
Data Type
Size
ID
INT
32
FANCYNUMB
ER
STATUS
VARCHA
R
INT
50
Constrain Description
ts
PRIMAR ID OF THE FANCY
Y KEY
NUMBER
FANCY NUMBER
32
STATUS
FIELD
NAME
SUBJECT
DATATYPE
SIZE
VARCHAR2
30
CONSTRAIN
TS
NOT NULL
NAME
VARCHAR2
20
NOT NULL
10
NOT NULL
VARCHAR2
30
NOT NULL
DETAILS
VARCHAR2
30
NOT NULL
DESCRIPTION
SUBJECT FOR
FEEDBACK
NAME OF
SENDER
PHONE. NO. OF
SENDER
E-MAIL OF
SENDER
DETAILS OF
QUERY
Column
Name
ID
Data Type
Size
Constraints Description
INT
32
PRIMARY
40
MAIL ID
FROM1
VARCHAR
20
TO1
VARCHAR
20
SUBJECT
VARCHAR
25
BODY
VARCHAR
MAX
DTE
STATUS
VARCHAR
VARCHAR
DATE
30
KEY
NOT NULL NAME OF
SENDER
NOT NULL NAME OF
RECIPIENT
NOT NULL SUBJECT OF
MAIL
NOT NULL CONTENTS OF
THE MAIL
NOT NULL DATE
NOT NULL STATUS OF MAIL
Description
Data Type
Size
Constraints
ID OF THE
VEHICLE
NAME OF
USER
AGE OF THE
USER
PERMANENT
ADDRESS
COMMUNICAT
ION ADDRESS
DEALER
CLASS OF THE
VEHICLE
TYPE OF
BODY
NAME OF
VEHICLE
NAME OF
MANUFACTUR
ER
DATE OF
INT
32
PRIMARY
KEY
VARCHAR
25
INT
32
VARCHAR
MAX
VARCHAR
MAX
VARCHAR
VARCHAR
50
50
VARCHAR
50
VARCHAR
50
VARCHAR
50
VARCHAR
50
41
NU
MANUFACTUR
ING
HP
HORSE
VARCHAR
POWER
CHASSISNO CHASSIS
VARCHAR
NUMBER
ENGNO
ENGINE
VARCHAR
NUMBER
CAPACITY
CAPACITY FLOAT
FUEL
FUEL TYPE
VARCHAR
COLOUR
COLOUR OF
VARCHAR
VEHICLE
LENGTH
LENGTH OF
FLOAT
VEHICLE
WIDTH
WIDTH OF
FLOAT
VEHICLE
HEIGHT
HEIGHT OF
FLOAT
VEHICLE
REGNO
REGISTRATIO VARCHAR
N NUMBER
42
50
50
50
50
50
50
DATATYPE
SIZE
DESCRIPTION
30
CONSTRAIN
TS
NOT NULL
VARCHAR2
DATE
NOT NULL
TEST DATE
NUMERIC
VARCHAR2
3
30
NOT NULL
NOT NULL
TEST MARKS
TEST RESULT
43
USER NAME
Coding
ProjectStartPage
<%@ Page Title="" Language="C#" MasterPageFile="~/admin/Main.master"
AutoEventWireup="true" CodeFile="ProjectStartpage.aspx.cs"
Inherits="admin_ProjectStartpage" %>
<asp:Content ID="Content1" ContentPlaceHolderID="head" Runat="Server">
<link href="../Styles/home1.css" rel="stylesheet" type="text/css" />
<style type="text/css">
#form1
{
height: 40px;
}
.style7
{
width: 99%;
border:thin ridge #A7A7A7;
}
.style8
{
height: 50px;
}
.style9
{
width: 99%;
border:thin ridge #A7A7A7;
}
.style10
{
height:50px;
}
.style11
{
width: 99%;
border:thin ridge #A7A7A7;
}
44
.style12
{
height:50px;
}
.style13
{
width: 99%;
border:thin ridge #A7A7A7;
}
.style14
{
height:50px;
}
.style15
{
width: 99%;
border:thin ridge #A7A7A7;
}
.style16
{
height:50px;}
</style>
</asp:Content>
<asp:Content ID="Content2" ContentPlaceHolderID=ContentPlaceHolder1
runat="server">
<table class="style1">
<tr>
<td align="center" class="style2">
<strong>Regional Transport Office</strong></td>
</tr>
</table>
<p class="MsoNormal">
<span class="style3"
style="line-height: 115%; font-family: "Times New
Roman","serif"">
</span></p>
<table align="center" cellpadding="2" class="style5">
<tr>
<td style="font-size: medium">
45
<p class="MsoNormal"
style="font-size: medium; line-height: 115%; font-family:
"Times New Roman","serif"">
The Regional Transport Office<span style="msospacerun:yes"> </span>is a
UP government bureau which<span style="msospacerun:yes"> </span>is
responsible for the registration of<span style="msospacerun:yes"> </span>
vehicles and the issue of the driving licence in
UP.<o:p></o:p></p>
</td>
</tr>
<tr>
<td>
<p class="MsoNormal">
<span class="style3"
style="line-height: 115%; font-family: "Times New
Roman","serif"">
E-Regional Transport Office Management System is a web
application that has
been designed to automate the process of registration of vehicle
and issuing
driving license process. System can make the daily activities
efficient and
providing the fast response to store and retrieve information.
</span>
<span style="color:black"><o:p></o:p></span>
</p>
</td>
</tr>
<tr>
<td>
</td>
</tr>
</table>
<table class="style6">
<tr>
46
conn();
string s = "select * from admin_login where username='" + username.Text
+ "' AND password='" + password.Text + "'";
try
{
cm = new SqlCommand(s, cn);
rd = cm.ExecuteReader();
if (rd.Read())
{
Session["username"] = username.Text;
Response.Redirect("~/admin/admin_inbox.aspx");
}
else
{
lbl_msg.Text="Invalid User Name";
}
}
catch (Exception ea)
{
Response.Write(ea.Message);
}
}
}
UserLogin
using System;
using System.Collections.Generic;
using System.Linq;
using System.Web;
using System.Web.UI;
using System.Web.UI.WebControls;
using System.Data;
using System.Data.SqlClient;
using System.Configuration;
public partial class login : System.Web.UI.Page
{
SqlConnection cn;
SqlCommand cm;
48
SqlDataReader rd;
protected void Page_Load(object sender, EventArgs e)
{
}
void conn()
{
string cs =
ConfigurationManager.ConnectionStrings["ConnectionString"].ConnectionStrin
g.ToString();
cn = new SqlConnection(cs);
try
{
cn.Open();
}
catch (Exception ea)
{
Response.Write(ea.Message);
}
}
protected void Button2_Click(object sender, EventArgs e)
{
conn();
string s="insert into user_register
values('"+txt_fnm.Text+"','"+txt_lnm.Text+"','"+txt_unm.Text+"','"+txt_passwor
d.Text+"','"+txt_date.Text+"')";
try
{
cm = new SqlCommand(s, cn);
cm.ExecuteNonQuery();
lbl_msg.Text = "Record is saved";
}
catch (Exception ea)
{
Response.Write(ea.Message);
}
}
protected void Button1_Click(object sender, EventArgs e)
{
conn();
49
{
SqlCommand cm;
SqlConnection cn;
SqlDataAdapter da;
protected void Page_Load(object sender, EventArgs e)
{
if (!Page.IsPostBack)
{
if (Session["username"] == null)
{
Response.Redirect("login.aspx");
}
shwgrid();
Session["qno"] = 0;
Session["ans"] = 0;
show_ques();
}
}
void conn()
{
string cs =
ConfigurationManager.ConnectionStrings["ConnectionString"].ConnectionStrin
g.ToString();
cn = new SqlConnection(cs);
try
{
cn.Open();
}
catch (Exception ea)
{
Response.Write(ea.Message);
}
}
void shwdtalist()
{
conn();
try
{
51
RadioButtonList1.Items.Add(GridView1.Rows[r].Cells[3].Text);
RadioButtonList1.Items.Add(GridView1.Rows[r].Cells[4].Text);
shwdtalist();
lbl_result.Text = GridView1.Rows[r].Cells[5].Text;
}
protected void Button1_Click(object sender, EventArgs e)
{
if (Convert.ToInt32(Session["qno"]) < 9)
{
if (RadioButtonList1.Text ==
GridView1.Rows[Convert.ToInt32(Session["qno"])].Cells[5].Text)
Session["ans"] = Convert.ToInt32(Session["ans"]) + 1;
Session["qno"] = Convert.ToInt32(Session["qno"]) + 1;
show_ques();
}
else
{
if (RadioButtonList1.Text ==
GridView1.Rows[Convert.ToInt32(Session["qno"])].Cells[5].Text)
Session["ans"] = Convert.ToInt32(Session["ans"]) + 1;
btn_fnsh.Visible = true;
Button1.Visible = false;
Response.Write("Result=" + Session["ans"].ToString());
}
}
protected void btn_fnsh_Click(object sender, EventArgs e)
{
Response.Redirect("~/user/test_result.aspx");
}
}
protected void GridView1_SelectedIndexChanged(object sender, EventArgs e)
{
}
}
53
try
{
cn.Open();
string s = "select * from lerng_licence where status='applied'";
da = new SqlDataAdapter(s, cn);
DataSet ds = new DataSet();
da.Fill(ds);
GridView1.DataSource = ds;
GridView1.DataBind();
}
catch (Exception ea)
{
Response.Write(ea.Message);
}
}
void cuntshw()
{
conn();
try
{
int regs_no = 0;
string s = "select Isnull(max(licence_no),0) as cut from lerng_licence";
cm = new SqlCommand(s, cn);
rd = cm.ExecuteReader();
if (rd.Read())
{
regs_no = Convert.ToInt32(rd["cut"].ToString());
if (regs_no == 0)
{
regs_no = 1;
}
else
{
regs_no++;
}
txt_licence.Text = regs_no.ToString();
} rd.Close();
}
catch (Exception ea)
55
{
Response.Write(ea.Message);
}
}
protected void Button1_Click(object sender, EventArgs e)
{
string msg_status = "applied";
conn();
try
{
string s = "update lerng_licence set licence_no='" + txt_licence.Text + "',
l_issue_date='" + lbl_issue_dt.Text + "', l_expry_dat='" + lbl_expir_dt.Text +
"',status='" + lbl_status.Text + "' where reg_no='" + txt_reg_no.Text + "'";
cm = new SqlCommand(s, cn);
cm.ExecuteNonQuery();
lbl_msg.Text = " Congratulation your learning licence no Requested is
accepted , your licence no is that.."+txt_licence.Text;
string p = "insert into inbox
values('"+lbl_issue_dt.Text+"','"+lbl_usrnm.Text+"','"+lbl_title.Text+
"','Learning Licence','" + lbl_msg.Text+"','"+msg_status+"')";
cm = new SqlCommand(p, cn);
cm.ExecuteNonQuery();
lbl_msg.Text = "Licence No Is Generated And Also Msg Send.......";
}
catch (Exception ea)
{
Response.Write(ea.Message);
}
}
protected void GridView1_SelectedIndexChanged1(object sender, EventArgs e)
{
txt_reg_no.Text = GridView1.SelectedRow.Cells[3].Text;
lbl_usrnm.Text=GridView1.SelectedRow.Cells[4].Text;
}
}
Permanent Licence
56
using System;
using System.Collections.Generic;
using System.Linq;
using System.Web;
using System.Web.UI;
using System.Web.UI.WebControls;
using System.Data;
using System.Data.SqlClient;
using System.Configuration;
public partial class admin_allow_permanent_licenc : System.Web.UI.Page
{
SqlConnection cn;
SqlCommand cm;
SqlDataAdapter da;
string status;
protected void Page_Load(object sender, EventArgs e)
{
if (!Page.IsPostBack)
{
conn();
int i = 20;
status = "approved";
lbl_p_status.Text = status;
DateTime dt = DateTime.Now;
lbl_curnt_date.Text = dt.ToString("dd/MM/yyyy");
dt = dt.AddMonths(i);
lbl_expry_date.Text = dt.ToString("dd/MM/yyyy");
}
}
void conn()
{
string cs =
ConfigurationManager.ConnectionStrings["ConnectionString"].ConnectionStrin
g.ToString();
cn = new SqlConnection(cs);
try
57
{
cn.Open();
string s = "select * from lerng_licence where p_status='applied'";
da = new SqlDataAdapter(s, cn);
DataSet ds = new DataSet();
da.Fill(ds);
GridView1.DataSource = ds;
GridView1.DataBind();
}
catch (Exception ea)
{
Response.Write(ea.Message);
}
}
protected void btn_alw_licence_Click(object sender, EventArgs e)
{
conn();
string msg_status = "applied";
try
{
string s = "update lerng_licence set p_issue_date='" +
lbl_curnt_date.Text + "', p_expiry_date='" + lbl_expry_date.Text + "',
p_status='" + lbl_p_status.Text + "' where licence_no='" + txt_lerng_licnc.Text +
"'";
cm = new SqlCommand(s, cn);
cm.ExecuteNonQuery();
lbl_msg.Text = " Congratulation your permanent licence no Requested
is accepted , your licence no is that.." + txt_lerng_licnc.Text;
string p = "insert into inbox values('" + lbl_curnt_date.Text + "','" +
lbl_usr_nm.Text + "','" + lbl_title.Text + "',Permanent Licence','" + lbl_msg.Text
+ "','" + msg_status + "')";
cm = new SqlCommand(p, cn);
cm.ExecuteNonQuery();
lbl_msg.Text = "Licence No Is Generated And Also Msg Send.......";
Response.Redirect("~/admin/msg.aspx");
}
catch (Exception ea)
{
58
Response.Write(ea.Message);
}
}
protected void GridView1_SelectedIndexChanged(object sender, EventArgs
e)
{
lbl_usr_nm.Text=GridView1.SelectedRow.Cells[2].Text;
txt_lerng_licnc.Text = GridView1.SelectedRow.Cells[11].Text;
}
}
Duplicate /Lost Licence
using System;
using System.Collections.Generic;
using System.Linq;
using System.Web;
using System.Web.UI;
using System.Web.UI.WebControls;
using System.Data;
using System.Data.SqlClient;
using System.Configuration;
public partial class admin_Allow_duplicate_l_licence : System.Web.UI.Page
{
SqlConnection cn;
SqlCommand cm;
SqlDataAdapter da;
string Dl_status;
string Pl_status;
int i = 6;
int j = 10;
protected void Page_Load(object sender, EventArgs e)
{
if (!Page.IsPostBack)
{
dd_dl.Items.Add("Learning duplicate licence");
59
60
{
Response.Write(ea.Message);
}
}
}
protected void dd_dl_SelectedIndexChanged(object sender, EventArgs e)
{
conn();
if (dd_dl.Text == "Learning duplicate licence")
{
string s = "select * from lerng_licence where dl_status='Applied'";
try
{
da = new SqlDataAdapter(s, cn);
DataSet ds = new DataSet();
da.Fill(ds);
GridView1.DataSource = ds;
GridView1.DataBind();
lbl_issue_date.Text = DateTime.Now.ToShortDateString();
lbl_expry.Text =
DateTime.Now.AddMonths(i).ToShortDateString();
}
catch (Exception ea)
{
Response.Write(ea.Message);
}
}
else if (dd_dl.Text == "Permanent duplicate licence")
{
string s = "select * from lerng_licence where dp_status='Applied'";
try
{
da = new SqlDataAdapter(s, cn);
DataSet ds = new DataSet();
da.Fill(ds);
GridView1.DataSource = ds;
GridView1.DataBind();
lbl_issue_date.Text = DateTime.Now.ToShortDateString();
62
lbl_expry.Text = DateTime.Now.AddYears(j).ToShortDateString();
}
catch (Exception ea)
{
Response.Write(ea.Message);
}
}
}
protected void GridView1_SelectedIndexChanged(object sender, EventArgs e)
{
txt_licnc_no.Text = GridView1.SelectedRow.Cells[2].Text;
lbl_usr_nm.Text=GridView1.SelectedRow.Cells[3].Text;
}
}
63
da.Fill(ds);
GridView1.DataSource = ds;
GridView1.DataBind();
}
else if (dd_categry.Text == "permanent")
{
string s = "select * from p_rto_test";
da = new SqlDataAdapter(s, cn);
DataSet ds = new DataSet();
da.Fill(ds);
GridView1.DataSource = ds;
}
}
catch (Exception ea)
{
Response.Write(ea.Message);
}
}
protected void Que_name_TextChanged(object sender, EventArgs e)
{
}
protected void Button1_Click(object sender, EventArgs e)
{
conn();
if (Image1.HasFile)
{
string fn = Image1.FileName;
Image1.SaveAs(Server.MapPath("~/Question_img/") + fn);
if (Button1.Text == "Insert")
{
if (dd_categry.Text == "Learning")
{
string s = "insert into l_rto_test values(" + Que_id.Text + ",'" +
Que_name.Text + "','" + Que_op1.Text + "','" + Que_op2.Text + "','" +
Que_op3.Text + "','" + fn + "','" + Que_ans.Text + "')";
cm = new SqlCommand(s, cn);
try
{
65
cm.ExecuteNonQuery();
Label2.Text = "Record Is Saved.....";
Label2.Text = " ";
}
catch (Exception ea)
{
Response.Write(ea.Message);
}
}
else if (dd_categry.Text == "permanent")
{
string s = "insert into p_rto_test values(" + Que_id.Text + ",'" +
Que_name.Text + "','" + Que_op1.Text + "','" + Que_op2.Text + "','" +
Que_op3.Text + "','" + fn + "','" + Que_ans.Text + "')";
cm = new SqlCommand(s, cn);
try
{
cm.ExecuteNonQuery();
Label2.Text = "Record Is Saved.....";
Label2.Text = " ";
}
catch (Exception ea)
{
Response.Write(ea.Message);
}
}
}
else if (Button1.Text == "Update")
{
if (dd_categry.Text == "Learning")
{
string s = "update test_entry set Que_name='" + Que_name.Text + "',
Que_opt1='" + Que_op1.Text + "', Que_opt2='" + Que_op2.Text + "',
Que_opt3='" + Que_op3.Text + "', Images='" + fn + "', Que_ans='" +
Que_ans.Text + "'where Que_id=" + Que_id.Text;
cm = new SqlCommand(s, cn);
try
66
{
cm.ExecuteNonQuery();
conn();
Label2.Text = "Record Is Updated.....";
Que_id.Text = " ";
Que_name.Text = " ";
Que_op1.Text = " ";
Que_op2.Text = " ";
Que_op3.Text = " ";
Que_ans.Text = " ";
Label2.Text = " ";
Button1.Text = "Insert";
}
catch (Exception ea)
{
Response.Write(ea.Message);
}
}
else if (dd_categry.Text == "permanent")
{
string s = "update test_entry set Que_name='" + Que_name.Text +
"', Que_opt1='" + Que_op1.Text + "', Que_opt2='" + Que_op2.Text + "',
Que_opt3='" + Que_op3.Text + "', Images='" + fn + "', Que_ans='" +
Que_ans.Text + "'where Que_id=" + Que_id.Text;
cm = new SqlCommand(s, cn);
try
{
cm.ExecuteNonQuery();
conn();
Label2.Text = "Record Is Updated.....";
Que_id.Text = " ";
Que_name.Text = " ";
Que_op1.Text = " ";
Que_op2.Text = " ";
Que_op3.Text = " ";
Que_ans.Text = " ";
Label2.Text = " ";
Button1.Text = "Insert";
}
67
Que_op2.Text = GridView1.SelectedRow.Cells[4].Text;
Que_op3.Text = GridView1.SelectedRow.Cells[5].Text;
Que_ans.Text = GridView1.SelectedRow.Cells[7].Text;
Button1.Text = "Update";
}
}
protected void Que_op1_TextChanged(object sender, EventArgs e)
{
}
}
69
Feedback
using System;
using System.Collections.Generic;
using System.Linq;
using System.Web;
using System.Web.UI;
using System.Web.UI.WebControls;
using System.Data.SqlClient;
using System.Configuration;
public partial class user_Feedback : System.Web.UI.Page
{
protected void Page_Load(object sender, EventArgs e)
{
}
protected void Button1_Click(object sender, EventArgs e)
{
string cs =
ConfigurationManager.ConnectionStrings["ConnectionString"].ConnectionStrin
g.ToString();
SqlConnection con = new SqlConnection(cs);
try
{
con.Open();
string s = "insert into
Feedback(Feed_Date,Name,Mobile,Email,Comments)values('" + TextBox2.Text
+ "','" + TextBox3.Text + "'," + TextBox4.Text + ",'" + TextBox5.Text + "','" +
TextBox6.Text + "')";
SqlCommand cmd = new SqlCommand(s, con);
int i = cmd.ExecuteNonQuery();
con.Close();
if (i > 0)
{
Label1.Text = "Record inserted...";
}
else
{
Label1.Text = "Record not inserted...";
}
70
}
catch (Exception ex)
{
}
}
protected void Button2_Click(object sender, EventArgs e)
{
TextBox2.Text = "";
TextBox3.Text = "";
TextBox4.Text = "";
TextBox5.Text = "";
TextBox6.Text = "";
}
}
Online Application
using System;
using System.Collections.Generic;
using System.Linq;
using System.Web;
using System.Web.UI;
using System.Web.UI.WebControls;
public partial class user_Licence_form : System.Web.UI.Page
{
protected void Page_Load(object sender, EventArgs e)
{
}
}
71
Licence Renew
using System;
using System.Collections.Generic;
using System.Linq;
using System.Web;
using System.Web.UI;
using System.Web.UI.WebControls;
using System.Data;
using System.Data.SqlClient;
using System.Configuration;
public partial class user_Renewl : System.Web.UI.Page
{
SqlConnection cn;
SqlCommand cm;
SqlDataReader rd;
protected void Page_Load(object sender, EventArgs e)
{
}
void conn()
{
string cs =
ConfigurationManager.ConnectionStrings["ConnectionString"].ConnectionStrin
g.ToString();
cn = new SqlConnection(cs);
try
{
cn.Open();
}
catch (Exception ea)
{
Response.Write(ea.Message);
}
}
protected void btn_duplict_Click(object sender, EventArgs e)
{
conn();
72
lbl_curnt_date.Text=DateTime.Now.ToShortDateString();
try
{
string s = "select * from lerng_licence where licence_no='" +
txt_lerning_licnc_no.Text + "' and dob='" + txt_dob.Text + "'";
cm = new SqlCommand(s, cn);
rd = cm.ExecuteReader();
if (rd.Read())
{
lbl_p_expiry.Text = rd["p_expiry_date"].ToString();
string expiry_date;
string currnt_date;
expiry_date = lbl_p_expiry.Text;
currnt_date = lbl_curnt_date.Text;
if (Convert.ToInt32(expiry_date) >= Convert.ToInt32(currnt_date))
{
lbl_msg.Text = "Your Licence Can Not Be Renewal Because Your
Permanent Licence Date Is Not Expired Now";
}
else
{
Session["licencno"] = txt_lerning_licnc_no.Text;
Response.Redirect("~/user/duplicate_lost_allow.aspx");
}
}
else
{
}
}
}
74
Output Screens
Home page
75
AdminLogin
76
UserLogin
77
RTO Test
78
79
Permanent Licence
80
81
Change Password
82
83
84
85
86
Feedback
87
Licence Renew
88
Scope
Reusability:
Reusability is possible as and when we require in this application.
We can update it next version. Reusable software reduces design, coding and
testing cost by amortizing effort over several designs. Reducing the amount of
code also simplifies understanding, which increases the likelihood that the code
is correct. We follow up both types of reusability: Sharing of newly written code
within a project and reuse of previously written code on new projects.
Extensibility:
This software is extended in ways that its original developers may
not expect. The following principles enhance extensibility like Hide data
structure, avoid traversing multiple links or methods, Avoid case statements on
object type and distinguish public and private operations.
Robustness:
Its method is robust if it does not fail even if it receives improper
parameters. There are some facilities like Protect against errors, Optimize after
the program runs, validating arguments and Avoid predefined limits.
Understandability:
A method is understandable if someone other than the creator of
the method can understand the code (as well as the creator after a time lapse).
We use the method, which small and coherent helps to accomplish this.
Cost-effectiveness:
Its cost is under the budget and make within given time
period. It is desirable to aim for a system with a minimum cost subject to the
condition that it must satisfy all the requirements.
Scope of this document is to put down the requirements, clearly identifying the
information needed by the user, the source of the information and outputs
expected from the system.
89
Testing
Software Testing is a critical element of software quality assurance and
represents the ultimate review of specification, design and code generation. The
increasing visibility of software as a system element and the attendant costs
associated with a software failure are motivating forces for well planned,
thorough testing.
Testing Objective:
The following are the testing objectives:
-Testing is a process of executing a program with the intent of finding an error.
-A good test case is one that has a high probability of finding an as-yetundiscovered error
-A successful test is one that uncovers an as yet undiscovered error.
Testability:
Software Testability is simply how easily (a computer program can be tested).
The Following characteristics are considered that lead to testable software.
-Operability: The better it works, the more efficiently it can be tested.
-Observability: What you see is what you test.
-Controllability: The better we can control the software, the more the Testing
can be automated and optimized.
-Decomposability: By controlling the scope of testing, we can more quickly
Isolate problems and perform smarter retesting.
90
-Simplicity: The less there is to test, the more quickly we can test it.
-Stability: The fewer the changes, the fewer the disruptions to testing.
-Understandability: the more information we have, the smarter we will test.
TEST CASE DESIGN:
The design of testing can be divided into two broad categories:
White Box Testing:
Black box testing:
WHITE BOX TESTING:
White box testing of software is predicated on close examination of procedural
detail. Logical paths through the software are tested by providing test cases that
exercise Specific sets of conditions and /or loops. The main disadvantage with
white box testing is even for smaller programs the number of possible logical
paths can be very very large.
BLACK BOX TESTING:
Black box testing methods focus on the functional requirements of the software.
That is, black box testing enables the software engineer to derive sets of input
conditions that will fully exercise all functional requirements for a program.
This approach is likely to uncover a different class of errors than white box
testing method.
Black box testing attempts to find errors in the following categories:
Incorrect or missing functions.
91
Interface errors
Errors in data structures or external database access.
Performance errors, and
Initialization and termination errors.
Unlike white box testing, which is performed early in the testing process, black
box
testing
tends
to
be
applied
during
later
design.
Tests are designed to answer the following questions:
How is functional validity tested?
What classes of input will make good test cases?
Is the system particularly sensitive to certain input values?
How are the boundaries of a data class isolated?
What data rates and data volume can the system tolerate?
What effect will specific combinations of data have on system operation?
Functional testing
Early data flow analyses often centered on a set of faults that are now known
as Define/reference anomalies:
A variable that is defined but never used (referenced)
A variable that is used but never defined
A variable that is defined twice before it is used
Each of these anomalies can be recognized from the concordance of a program.
Since the concordance information is compiler generated, these anomalies can
be discovered by what is known as static analysis: finding faults in source
code without executing it.
A)-UNIT TEST PROCEDURES:
Unit testing is normally considered as an adjunct to the coding step.
After source code is developed, reviewed and verified, test cases were
established.
92
Functional behavioral were tested for each module. In the present project the
following Unit test were conducted.
Validation of registered users data
Submission of Data in the data File.
Automatic retrieval of data from the File.
Automatic display of options in the front end depending on the option
selected by the user.
B)-INTEGRATION TESTING:
Integration testing is a systematic technique for constructing the program
structure while at the same time conducting tests to uncover errors associated
with interfacing.
C)-VALIDATION TESTING:
Software validation is achieved through a series of black box tests that
demonstrate Conformity with requirements.
Validation checks have been performed for all the units/functions described in
the Requirements specifications.
In the present project the following validations are checked.
-Whether the fields such as Number field include characters
-Whether the functions such as calculations is done properly or not.
-Whether valid and required data is send into the data Files
-Under Validation testing two types of test are described.
-ALPHA TESTING: The alpha test is conducted at the Administrator site by a
client.
D)-SYSTEM TESTING:
System testing fall outside the scope of the software process and are not
conducted solely by software engineers.
It includes the following:
-Recovery testing
-Security testing
-Stress testing
-Performance testing
Considering the fact that the present project is not much large to invite System
testing, this test has not been performed for the present project.
In E-Road Transport Management System Project Black box testing is used.
94
System Security
Introduction
The protection of computer based resources that includes hardware,
software, data, procedures and people against unauthorized use or natural
Disaster is known as System Security.
Security
Integrity
Privacy
Confidentiality
95
SECURITY IN SOFTWARE
Various client side validations are used to ensure on the client side that only
valid data is entered. Client side validation saves server time and load to handle
invalid data. Some checks imposed are:
ASP.NET Validation Controls are used to ensure those required fields are
filled with suitable data only. Maximum lengths of the fields of the forms are
appropriately defined.
Forms cannot be submitted without filling up the mandatory data so that
manual mistakes of submitting empty fields that are mandatory can be sorted
out at the client side to save the server time and load.
96
Tab-indexes are set according to the need and taking into account the ease of
user while working with the system.
SERVER SIDE VALIDATION
Some checks cannot be applied at client side. Server side checks are necessary
to save the system from failing and intimating the user that some invalid
operation has been performed or the performed operation is restricted. Some of
the server side checks imposed is:
Server side constraint has been imposed to check for the validity of primary
key and foreign key. A primary key value cannot be duplicated. Any attempt
to duplicate the primary value results into a message intimating the user
about those values through the forms using foreign key can be updated only
of the existing foreign key values.
User is intimating through appropriate messages about the successful
operations or exceptions occurring at server side.
Various Access Control Mechanisms have been built so that one user may not
agitate upon another. Access permissions to various types of users are
controlled according to the organizational structure. Only permitted users can
log on to the system and can have access according to their category. Username, passwords and permissions are controlled o the server side.
97
Implementation
System implementation is the stage when the user has thoroughly tested the
system and approves all the features provided by the system. The various tests
are performed and the system is approved only after all the requirements are
met and the user is satisfied.
The new system may be totally new; replacing an existing manual or
automated system, or it may a major modification to an existing system. In the
either case, proper implementation is essential to provide a reliable system to
meet organization requirements .successful implementation may not guarantee
improvement in the organization using the new system (that is a design
question) ,but improper will prevent it.
Implementation is the process of having systems personal cheek out and
put new equipment to use, train users, install the new application and
construct any files of data needed to use it. This phase is less creative than
system design. Depending on the size of the organization that will be involve
in using the application and the risk involved in its use, system developer may
choose to test the operation in only one area of the firm with only one or two
persons. Sometimes, they will run both old and new system in parallel way to
compare the results. In steel other situations, system developers stop using the
old systems one day and start using the new one the next.
The implementation of the web based or LAN base network project has
some extra steps at the time of implementation. We need to configure the
system according the requirement of the software.
For the project we need to install IIS Web Server, database server and
deployment directory for the project.
98
Aspects of implementation:-
Once the software is delivered and deployed, then maintenance phase starts.
Software requires maintenance because there are some residual errors remaining
in the system that must be removed as they discovered. Maintenance involves
understanding the existing software (code and related documents),
understanding the effect of change, making the changes, testing the new
changes, and retesting the old parts that were not changed. The complexity of
the maintenance task makes maintenance the most costly activity in the life of
software product.
It is believed that almost all software that is developed has
residual errors, or bugs, in them. These errors need to be removed when
discovered that leads to the software change. This is called Corrective
Maintenance. Corrective maintenance means repairing, processing or
performance failures or making alterations because of previously ill-defined
problems.
Software undergoes change frequently even without bugs because
the software must be upgraded and enhanced to include more features and
provide more services. This also requires modification of the software. The
99
Adaptive Maintenance
Perfective Maintenance
Preventive Maintenance
This modular design of the program will also help in pointing out and rectification
of faults within the programs.
Most important thing about the maintenance of these sites is that they must be
continuously updated so that all the time latest and correct information is made
available to the people visiting these sites. For that it is necessary that the trade
bodies should be contacted constantly and latest data all the companies belonging
to them should be taken and the database should be updated. Also the NITP units
must be requested continuously to update their data as soon as any change occurs
by using this website only so that latest information is always available to the
people.
102
Conclusion
In todays world with the increasing traffic and longer commuting
distances it is becoming very difficult for people to travel for their
particular licenses issue.
Also most of the people today work for longer hours and do not have the
flexibility to take a break from work to give the licenses tests. People
have not spent more time for licenses test.
The People want a facility where they can have easy to issue their
licenses.
The proposed System has the features for Vehicle registration, issuing of
Driving License, Giving online test, renewal of license etc thus making
the RTO operations to be performed easily and efficiently.
103
104
Bibliography
Books
SOFTWARE ENGINEERING
Roger.S. Pressman
Websites
www.w3schools.com
www.wrox.com
www.asp.net
105