1.1 Project Overview
1.1 Project Overview
1.1 Project Overview
INTRODUCTION
1.1 Project Overview
The scope of this project is to avoid manual errors and to generate
reports at any point of time for the management to make right decisions.
This system is fully GUI oriented application taking the full advantage
of windows environment. Users are more comfortable with the GUI
interface and event-driven programming.
Many validation checks have been carried out for various types of
transformations. The report produced by package includes day-to-day
verification of the details maintained.
Record securities are such that there is no possibility of record being
damage due to pests and climate. Manpower is saved.
The system and development of the software cost will be reasonable
for the organization, since there wont be any purchase of registers and
maintaining it, which consumes a lot of manpower.
2. SYSTEM ENVIRONMENT
2.1 HARDWARE SPECIFICATION
CPU
DUAL CORE
PROCESSOR SPEED
2.5 GHz
RAM
2GB MB
HARD DISK
250 GB
KEYBOARD
105 KEYS
MOUSE
LOGITECH MOUSE
DISPLAY
PRINTER
HP DESK JET
ASP.NET
BACK END
MS ACCESS
OPERATING SYSTEM
WINDOWS XP / WINDOWS7
vements that only managed code can offer, such as semi-trusted execution
and secure isolated file storage.
The following illustration shows the relationship of the common
language runtime and the class library to your applications and to the overall
system. The illustration also shows how managed code operates within a
larger architecture.
Features of the Common Language Runtime:
The common language runtime manages memory, thread execution,
code execution, code safety verification, compilation, and other system
services. These features are intrinsic to the managed code that runs on the
common language runtime.
With regards to security, managed components are awarded varying
degrees of trust, depending on a number of factors that include their origin
(such as the Internet, enterprise network, or local computer). This means that
a managed component might or might not be able to perform file-access
operations, registry-access operations, or other sensitive functions, even if it
is being used in the same active application.
The runtime enforces code access security. For example, users can
trust that an executable embedded in a Web page can play an animation on
screen or sing a song, but cannot access their personal data, file system, or
network. The security features of the runtime thus enable legitimate Internetdeployed software to be exceptionally feature rich.
The runtime also enforces code robustness by implementing a strict
type- and code-verification infrastructure called the common type system
(CTS). The CTS ensures that all managed code is self-describing. The
various Microsoft and third-party language compilers
Generate managed code that conforms to the CTS. This means that
managed code can consume other managed types and instances, while
strictly enforcing type fidelity and type safety.
In addition, the managed environment of the runtime eliminates many
common software issues. For example, the runtime automatically handles
object layout and manages references to objects, releasing them when they
are no longer being used. This automatic memory management resolves the
two most common application errors, memory leaks and invalid memory
references.
The
OLE
DB
and
SQL
Server
.NET
Data
Providers
we'll walk through each part of the DataSet and the OLE DB/SQL Server
.NET Data Providers explaining what they are, and how to program against
them.
The following sections will introduce you to some objects that have
evolved, and some that are new. These objects are:
Connections. For connection to and managing transactions against
a database.
Commands. For issuing SQL commands against a database.
DataReaders. For reading a forward-only stream of data records
from a SQL Server data source.
DataSets. For storing, remoting and programming against flat data,
XML data and relational data.
DataAdapters. For pushing data into a DataSet, and reconciling
data against a database.
When dealing with connections to a database, there are two different
options: SQL Server .NET Data Provider (System.Data.SqlClient) and OLE
DB .NET Data Provider (System.Data.OleDb). In these samples we will use
13
the SQL Server .NET Data Provider. These are written to talk directly to
Microsoft SQL Server. The OLE DB .NET Data Provider is used to talk to
any OLE DB provider (as it uses OLE DB underneath).
Connections:
Connections are used to 'talk to' databases, and are represented by
provider-specific classes such as SQLConnection. Commands travel over
connections and result sets are returned in the form of streams which can be
read by a DataReader object, or pushed into a DataSet object.
Commands :l
Commands contain the information that is submitted to a database,
and are represented by provider-specific classes such as SQLCommand. A
command can be a stored procedure call, an UPDATE statement, or a
statement that returns results. You can also use input and output parameters,
and return values as part of your command syntax. The example below
shows how to issue an INSERT statement against the Northwind database.
DataReaders :
14
The DataReader object is somewhat synonymous with a readonly/forward-only cursor over data. The DataReader API supports flat as
well as hierarchical data. A DataReader object is returned after executing a
command against a database. The format of the returned DataReader object
is different from a recordset. For example, you might use the DataReader to
show the results of a search list in a web page.
DataSets and DataAdapters :
DataSets:
The DataSet object is similar to the ADO Recordset object, but more
powerful, and with one other important distinction: the DataSet is always
disconnected. The DataSet object represents a cache of data, with databaselike structures such as tables, columns, relationships, and constraints.
However, though a DataSet can and does behave much like a database, it is
important to remember that DataSet objects do not interact directly with
databases, or other source data. This allows the developer to work with a
programming model that is always consistent, regardless of where the source
data resides. Data coming from a database, an XML file, from code, or user
input can all be placed into DataSet objects. Then, as changes are made to
the DataSet they can be tracked and verified before updating the source data.
15
SqlCommand
and
SqlConnection)
can
increase
overall
16
the INSERT, UPDATE or DELETE command for each changed row. You
can explicitly set these commands in order to control the statements used at
runtime to resolve changes, including the use of stored procedures. For adhoc scenarios, a CommandBuilder object can generate these at run-time
based upon a select statement. However, this run-time generation requires an
extra round-trip to the server in order to gather required metadata, so
explicitly providing the INSERT, UPDATE, and DELETE commands at
design time will result in better run-time performance.
1. ADO.NET is the next evolution of ADO for the .Net Framework.
2. ADO.NET was created with n-Tier, statelessness and XML in the
forefront. Two new objects, the DataSet and DataAdapter, are
provided for these scenarios.
3. ADO.NET can be used to get data from a stream, or to store data in
a cache for updates.
4. There is a lot more information about ADO.NET in the
documentation.
17
18
19
20
way data is accessed. However, it does not replicate the data itself nor does it
change the sequence in which data is stored in the table
Features of access:
MS-Access is windows based application and therefore has no
interface a similar to Windows NT. You can cut, copy and paste data from
any windows application to and from access. Since Microsoft Corporation
has developed both windows ands Access; the two products can work well
together. You need to have either Windows 98 Windows NT on your
machine before you can install Access.
It is user friendly
Accuracy of data is providing by proper validation of input.
Retrieval of necessary information is very easy and fast.
Manual operations are reduced to the maximum possible extent.
Maintenance of data is effective.
Backup of data are taken periodically.
Latest tool and techniques are used.
Errors and exceptional situation are handle frequently
Economical Feasibility
Technical Feasibility
23
Operational Feasibility
24
MAIN
CASTE IFORMATION
KARAIKUDI
CITY DETAILS
RELIGION STATUS
DEVAKOTTAI
THIRUPATTUR
REPORT
SIVAGANGAI
This database has been mainly used for only security purpose. We use
two objects are username, password. We correctly enter these objects we go
to the main form
SNO
FIELDNAME
DATATYPE
SIZE
DESCRIPTION
UserName
Text
10
PassWord
Text
10
KARAIKUDI
This database is used to update the cities information. It has city
area id number, area name, gender data, and religion status, number of the
area id these fields are used easy way to identify the area updates
SN
O
FIELDNAME
DATATYPE
SIZE
DESCRIPTION
Area id
Number
10
Area name
Text
30
Ward number
Number
20
Males
Text
30
Females
Text
30
Total
Text
30
School
Number
20
Graduate
Number
20
27
number of graduate
DEVAKOTTAI
This database is used to update the cities information. It has city area id
number, area name, gender data, and religion status, number of the area id
these fields are used easy way to identify the area updates
SN
O
FIELDNAME
DATATYPE
SIZE
DESCRIPTION
Area id
Number
10
Area name
Text
30
Ward number
Number
20
Males
Text
30
Females
Text
30
Total
Text
30
School
Number
20
Graduate
Number
20
THIRUPATTHUR
This database is used to update the cities information. It has city area
id number, area name, gender data, and religion status, number of the area id
these fields are used easy way to identify the area updates.
28
SN
O
FIELDNAME
DATATYPE
SIZE
DESCRIPTION
Area id
Number
10
Area name
Text
30
Ward number
Number
20
Males
Text
30
Females
Text
30
Total
Text
30
School
Number
20
Graduate
Number
20
SIVAGANGAI
This database is used to update the cities information. It has city
area id number, area name, gender data, and religion status, number of the
area id these fields are used easy way to identify the area updates
29
SN
O
FIELDNAME
DATATYPE
SIZE
DESCRIPTION
Area id
Number
10
Area name
Text
30
Ward number
Number
20
Males
Text
30
Females
Text
30
Total
Text
30
School
Number
20
Graduate
Number
20
RELIGION STATUS
This database is used to update the religion status. It has area id
number area name religion types and caste types these fields are used easy
way to update the data.
30
SNO
FIELDNAME
DATATYPE
SIZE
DESCRIPTION
Area id
Number
10
Area name
Text
20
Christian
Number
30
Hindu
Number
30
Muslim
Number
30
MBC
Number
30
BC
Number
30
OC
Number
30
SC/ST
Number
30
CASTE INFORMATION
This database is used to update the caste status. It has area id
number religion types and caste types these fields are used easy way to
update the data.
SNO
FIELDNAME
DATATYPE
31
SIZE
DESCRIPTION
Area id
number
10
Christian
Number
30
Hindu
Number
30
Muslim
Number
30
MBC
Number
30
BC
Number
30
OC
Number
30
SC/ST
Number
30
32
4.1 Modules
This project contains the following modules:
Login Form
33
City Details
Caste Information
Religion Status
Report
34
This module is used to update the religion status. It has area id number
area name religion types and caste types these fields are used easy way to
update the data.
4.1.5 Report
This module is used to see the updates in data. It has view option
these fields are used easy way to see the number of updates to entire in data.
any side effect. This type of testing is called regression testing. Software
testing can be looked upon as among the many processes, a software
development organization performs to provide the lost opportunity to correct
any flaws in the development system, system testing is a series of different
tests whose primary purpose is to fully exercise the computer based system.
System testing constitutes the largest percentage of technical effort in
the software development process. Testing begins at the module level and
work towards the integration of the entire system. No testing process can be
completed without the verification and the validation part, which helps to
access and improve the quality of the work products generated during the
development and modification of the software.
The system has been thoroughly checked in the local intranet
environment. Testing is done to remove the residual bugs and improve the
reliability of the program. All the basic levels of testing were carried out.
36
The unit testing was done for each module in the in the software. For
various other inputs such that each line should be executed at least once.
After all the modules were coded, integration testing was carried out. Some
minor errors were found in the earlier stage and each of them was corrected.
In the implementation of user interface phase no major errors were noted.
37
After the software was completely developed, the testing was done. The
outputs were correct at the time of documentation. After that no errors were
reported.
5.2 IMPLEMENTATION
38
Once the system has been designed, the next step is to convert the
designed one in to actual code, so as to satisfy the user requirements as
expected. If the system is approved to be error free it can be implemented.
When the initial design was done for the system, the department was
consulted for acceptance of the design so that further proceedings of the
system development can be carried on. After the development of the system
a demonstration was given to them about working of the system. The aim of
the system illustration was to identify any malfunctioning of the system.
Implementation
includes
proper
training
to
end-users.
The
39
6. CONCLUSION
The development process of this has been splited as estimation of the
system study, planning and design. The system uses standard software
development methodology.
Standardization plays a vital role in the life cycle of the development.
This software involves the usage of similar meaningful functions names,
variables names, table names.
40
41