97
A Project Report on e-learning Submitted in Partial fulfillment for the award of Bachelor of Engineering in Information Technology Submitted to RAJIV GANDHI PROUDYOGIKI VISHWAVIDYALAYA BHOPAL (M.P) MAJOR PROJECT REPORT Submitted by Nandnee Jain[0157IT061023] Pamela Roy[0157IT061027] Shikha Chaturvedi[0157IT061044] Shweta Gupta[0157IT061047] Under the supervision of Mr. Vivek Richharia Sir Designation 1

Major Report New 3

Embed Size (px)

Citation preview

Page 1: Major Report New 3

A Project Report

on

e-learningSubmitted in Partial fulfillment for the award of

Bachelor of Engineering in Information Technology

Submitted toRAJIV GANDHI PROUDYOGIKI VISHWAVIDYALAYA

BHOPAL (M.P)

MAJOR PROJECT REPORTSubmitted by

Nandnee Jain[0157IT061023] Pamela Roy[0157IT061027]

Shikha Chaturvedi[0157IT061044] Shweta Gupta[0157IT061047]

Under the supervision ofMr. Vivek Richharia Sir

Designation

DEPARTMENT OF INFORMATION TECHNOLOGYLAKSHMI NARAIN COLLEGE OF TECHNOLOGY & SCIENCE,

BHOPALSESSION 2009-10

1

Page 2: Major Report New 3

LAKSHMI NARAIN COLLEGE OF TECHNOLOGY & SCIENCE, BHOPAL

DEPARTMENT OF INFORMATION TECHNOLOGY

CERTIFICATE

This is to certify that the work embodied in this project work entitled “e-learning” has been satisfactorily completed by Nandnee Jain(0157IT061023), Pamela Roy (0157IT061027), Shikha Chaturvedi(0157IT061044) and Shweta Gupta (0157IT061047). It is a bonafide piece of work, carried out under the guidance in Department of Information Technology ,Lakshmi Narain College of Technology,Bhopal for the partial fulfillment of the Bachelor of Engineering during the academic year 2009-10.

Designation (GUIDE)

Approved By

Vivek RichhariaAsst. Prof. & Head

Department of Information Technology

Forwarded by

PrincipalLakshmi Narain College of Technology &,Science, Bhopal

2

2

Page 3: Major Report New 3

CERTIFICATE OF APPROVAL

This foregoing project work is hereby approved as a creditable study of Engineering carried out and presented in a manner satisfactory to warranty its acceptance as a prerequisite to the degree for which it has been submitted. It is understood that by this approval the undersigned do not necessarily endorse or approve any statement made, opinion expressed or conclusion drawn therein, but approve the project only for the purpose for which it has been submitted.

(Internal Examiner) (External Examiner)

3

Page 4: Major Report New 3

DECLARATION

We, Nandnee Jain (0157IT061023), Pamela Roy (0157IT061027), Shikha

Chaturvedi (0157IT061044), Shweta Gupta (0157IT061047) are students of Bachelor of Engineering, Information Technology, Lakshmi Narain College of Technology, Bhopal do hereby declare that the work presented in this Major project is outcome of our own work, is bonafide, correct to the best of our knowledge and this work has been carried out taking care of Engineering Ethics. The work presented does not infringe any patented work and has not been submitted to any University for the award of any degree or professional diploma.

Nandnee Jain(0157IT061023) Pamela Roy(0157IT061027)

4

Page 5: Major Report New 3

Shikha Chaturvedi(0157IT061044) Shweta Gupta (0157IT061047)

Acadmic Session2009-10

ACKNOWLEDGEMENT

Every work started and carried out with systematic approach turns out to be successful. Any accomplished outcome requires the effort of many people and this work is no different. This project was a struggle that was made much more difficult due to numerous reasons; some of error correction was beyond our control. It was then the timely guidance of our respected project guide and faculties that has seen us through all these odds. We would be very grateful to them for their inspiration, encouragement and guidance in all phases of the endeavor.

5

Page 6: Major Report New 3

It is our great pleasure to thank Vivek Richharia Sir, HOD, Information Technology, for his constant encouragement and valuable advice during the course of our project. We would also want to extend our thanks for his valuable guidance and help during development of the project. We also wish to express our gratitude towards all other staff members for their kind help.

Finally, we would thank Vivek Richharia Sir who was tremendously contributed to this project directly as well as indirectly, gratitude from the depths of our hearts is due to him. Regardless of source we wish to express our gratitude to those who may contributed to this work, even though anonymously.

Table of Contents

1. Introduction …..……… 8-11 1.1 Aim …………………………………………………… 81.2 Objective …………………………………………………… 91.3 Introduction to Project …………………………………… 91.4 Features …………………………………………………….. 11

6

Page 7: Major Report New 3

1.5 Technology used ……………………………………………. 11

2. Analysis ………….. .. …..12-17 2.1 Identification of Need ……………………………………… 122.2 Preliminary Investigation & Feasibility Study ………….. 13

2.2.1 Technical Feasibility ………………………… 132.2.2 Operational Feasibility ………………………. 142.2.3 Economical Feasibility ………………………. 142.2.4 Social Feasibility …………………………….. 152.2.5 1Management Feasibility ……………………... 152.2.6 Time Feasibility ……………………………… 15

2.3 Functional Requirements ……………………………………. 162.3.1 Software Specification ………………………. 162.3.2 Hardware Specification …………………….... 16

2.4 Non-functional Requirements …………...…………………. 17

3. Design …………………..18-27 3.1 Software Engineering Paradigm …………………………… 193.2 Design diagrams ………………………………………………. 19

3.2.1 ER-Diagram …………………………………… .. 233.2.2 DFDs ……………………………………………… 243.2.3 Use-Case Diagram ……………………………... 26

3.3 Technology used ………………………………………………. 27

4. Implementation ………33-57 4.1 architecture 4.2 module4.3 sample source code4.4 snapshot

5. Testing and Validation …....... 58-73 5.1 Testing Introduction …………………………………………… 59

7

Page 8: Major Report New 3

5.2 Testing Applied ………………………………………………… 605.3 Testing Results …………………………………………………. 615.4 Validation Criteria ………………………………………………. 735.5 Validation Results ………………………………………………. 73

6. Conclusion ..................................747. References ……………………………. 75

8

Page 9: Major Report New 3

1. INTRODUCTION

9

Page 10: Major Report New 3

1.1 Aim:-

10

Page 11: Major Report New 3

In the today’s world of hurry, worry and curry….Everyone wants to grasp success and that to in a very short span of time. By keeping this in mind we have decided to develop a website named as “E-Learning”.

We have taken into consideration to those people who don’t have enough time to go for coaching institutes to grasp knowledge. So this website helps them in any manner it can…

LCMS is a vital part of e-learning and training program. We encourage our users to make talent and skills management an important part of their work/career or educational journey.

It is the system to use if user want to quickly create, deploy and manage online courses.

1.2 Objective:- Our objective is to provide full automation of learning content management system.

11

Page 12: Major Report New 3

1.3 Introduction to project:-

E-LEARNING is an aggregate of powerful learning tools. It is a fully functional e-learning system with innovative training / testing options (self-assessments) and advanced conferencing applications.

E-Learning is a complete, secure, web-based training and e-learning solution that employs a simple user interface. This way both technical and non-technical training managers can easily create, manage, and track interactive training courses and learning programs for all levels of users.

E- Learning is designed to fit any organization size.

It is available and delivered online. Therefore you do not have to install complex programs, invest huge amounts in hardware or software or hire or maintain an expensive IT department. You can begin creating and deploying training and e-learning immediately at a fraction of the cost of traditional training methods.

1.4 Features:-

Training/ Learning Delivered Anywhere, Anytime, Anyhow. Advanced User Management. Self-registration and enrollment options. FAQ module: - Ask query with many advanced options. Track the query

result. SMS Facility: - Schedules of tests and results will be displayed on users cell

phone. Flexible Course Management. Import and export your courses; Publish

Courses for any period. Configure tools for each Course. Courses Like:-

12

Page 13: Major Report New 3

Technical Subjects – c/c++/ .Net /Java /PHP/LINUX

(eBooks /test series/Papers) Campus Guidance – Aptitude / Reasoning / Puzzles / Papers of

different companies. Online help and tutorials. Perm Report:-It will contain all type of reports like User Report, Courses Report

and many more. Permanently updated help and video tutorials that will save your time &

effort. Glossary:- Helpful Dictionary.

1.5 Technology Used :-

FRONT END :-

ASP.NET to develop web applications.

BACK END :-

SQL Server 2005 for maintaining our database.

2. ANALYSIS

2.1 Identification of need:-

There are lots of good reasons to consider an online training program:

13

Page 14: Major Report New 3

provided the base for e-learning's development. E-learning can be "on

demand". It overcomes timing, attendance and travel difficulties.Distance education .

it is the use of technology to enable people to learn anytime and anywhere. e-Learning can include training, the delivery of just-in-time information and guidance from experts.

Online training is more affordable than traditional classroom training, with savings of 60% or more.

Online courses can be taken in multiple sittings and are available 24 hours a day, 7 days a week — to better accommodate your busy schedule.

Online training is as mobile as you are! Your training can take place on the road, in the café, or any other place you have an internet-accessible computer.

Elearning is good for the environment.  Britain’s Open University’s “study found that producing and providing distance learning courses consumes an average

E-learning Supports the Learner’s Development.

14

Page 15: Major Report New 3

Elearning is cost effective and can produce great results.  It’s all a

matter of how you use it. 

2.2 Preliminary Investigation & Feasibility Study :-

2.2.1 Technical Feasibility:-

The assessment is based on an outline design of system requirements in terms of Input, Processes, Output, Fields, Programs, and Procedures. This can be quantified in terms of volumes of data, trends, frequency of updating, etc. in order to estimate whether the new system will perform adequately or not. Technological feasibility is carried out to determine whether the technology has the capability, in terms of software, hardware, personnel and expertise, to handle the completion of the project.

2.2.2 Operational Feasibility:- Is a measure of how well a proposed project solves the problems, and

takes advantages of the opportunities identified during scope definition and

15

Page 16: Major Report New 3

how it satisfies the requirements identified in the requirements analysis phase of project development.

2.2.3 Economical Feasibilty:-

Economic analysis is the most frequently used method for evaluating the effectiveness of a new system. More commonly known as cost/benefit analysis, the procedure is to determine the benefits and savings that are expected from a candidate system and compare them with costs. If benefits outweigh costs, then the decision is made to design and implement the system. An entrepreneur must accurately weigh the cost versus benefits before taking an action.

Cost Based Study: It is important to identify cost and benefit factors, which can be categorized as follows: Development costs; and 2. Operating costs. This is an analysis of the costs to be incurred in the system and the benefits derivable out of the system.

Time Based Study: This is an analysis of the time required to achieve a return on investments. The benefits derived from the system. The future value of a project is also a factor.

2.2.4Social Feasibility :- People want opportunities to grow.  A cafeteria with high fat foods is one way.  Another is a catalog with all sorts of elearning courses.  This allows them to explore other opportunities in the organization.  During downtime, it would be great to spend fifteen minutes learning to better manage meeting improve working with peers.  Offering these opportunities to learn makes you a place people want to stay.It encourages exploration and testing of ideas.  With the right feedback you create a great learning environment.  Worst case, you can always start over. .

2.2.5 Time Feasibility:-

16

Page 17: Major Report New 3

This means estimating how long the system will take to develop, and if it can

be completed in a given time period using some methods like payback period. Schedule feasibility is a measure of how reasonable the project timetable is. Some projects are initiated with specific deadlines. You need to determine whether the deadlines are mandatory or desirable...

2.3 Functional Requirement :-

2.3.1 Hardware Requirement :- A Computer with minimum following requirements :-

Minimum Recommended

Processor 233 MHz 300 MHz or Higher

Memory 64 Mb RAM 123 Mb RAM or Higher

Video Adapter and Monitor

Super VGA(800*600) Super VGA(800*600) or Higher Resolution

HardDrive Disk FreeSpace

1.5 &GB 1.5 GB or Higher

Devices Keyboard & Mouse Keyboard & Mouse

2.3.2 Software Requirement :-

Operating System : Windows XP Platform Used :

FRONT END - ASP.Net BACK END - SQl SERVER-2005

Tools Used : AJAX

17

Page 18: Major Report New 3

2.3 Non-Functional Requirement :-

i. Secure access of confidential data.ii. 24 X 7 availability. 99.9% Uptime during business hours. It should mitigate system failure risks. iii. Better component design to get better performance at peak timeiv. Flexible service based architecture will be highly desirable for future extensionv. Reliable and manageable

ASSUMPTIONS:i. Roles and tasks are predefined.ii. All the requirements are fulfilled.iii. Users possess facility to access internet.iv. Access and linkage to server is available 24.

18

Page 19: Major Report New 3

19

Page 20: Major Report New 3

3.Design

3.1 Software Engineering Paradigm :

To solve actual problems in a software project setting, a software engineer or a team of engineers must incorporate a development strategy that includes methods, tools and procedures. This strategy is referred to as a process model or a software engineering paradigm.There are several such paradigms available. Which software paradigm is more suitable depends on lot of factors such as:1. Nature of the Project2. Type of Applications3. Tools proposed to be used 4. Kind of controls and documentation required

The different software engineering paradigms are:- 1. Waterfall model 2. Prototyping model

20

Page 21: Major Report New 3

3.Object oriented model 4.Spiral model 5.WINWIN spiral model 6.Incremental model 7. Evolutionary model

 The Waterfall Model/Linear Sequential Life Cycle Model

Waterfall model is the most well known software lifecycle development model. It is very simple to understand and use. Each next phase in this model must beginning only after the previous phase is over. Waterfall software development model may be applicable to projects where: Software requirements clearly defined and known Software development technologies and tools is well known New version of the existing software system is createdThe simplest, oldest and most widely used process model for software designing is the waterfall model. It was proposed by Royce in 1970.The essence of this software paradigm is that the process of software designing consists of linear set of distinct phases.These phases are:

Stage1: Feasibility Study The goal of feasibility study is to evaluate alternative systems and to purpose

21

Page 22: Major Report New 3

the most feasible and desirable system for designing. Five types of feasibility are addressed in this study.

1.Technical Feasibility2. Economic Feasibility3. Functional Feasibility4. Schedule Feasibility5. Operational Feasibility Stage2: Requirement Analysis and Specification

The goal of this phase is to understand the exact requirements of the customers and to document them properly. This activity is usually executed together with the customers, as the goal is to document all functions, performance and interfacing requirements for the software designing and management. The requirements describe “what” of a system. This phase produces a large document containing a description of what the system will do without describing how it will be done. This document is known as software requirement specification (SRS) document.

Stage3: Design

The goal of this phase is to transform the requirement specification produced in the requirement analysis phase into a structure that is suitable for implementation in some programming language, Here, overall software architecture is defined, and the product design and detailed design work is performed. This work is documented and is known as software design description (SDD document).

Stage4: Coding and Unit Testing

22

Page 23: Major Report New 3

The information contained in SDD is sufficient to begin the coding Phase. The coding Phase of software designing involves translation of design specification into a machine readable form. If design is performed in a detailed manner, code generation can be accomplished easily. This phase is also known as the implementation phase. Here, each component of the design is implemented as a program module, and each of these program modules is unit tested. The purpose of unit testing is to determine the correct working of individual modules.

Stage5: Integration and System Testing:

During this phase the different program modules are integrated in a planned way and then tested as a completed system to ensure that the designed system functions according to its requirements as specified in the SRS document. After testing, the software is delivered to the customer.

Stage6: Software Maintenance

This is the last phase of software designing which includes a broad set of activities such as error correction, enhancement of capabilities, deletion of obsolete capabilities and optimization.

Advantages1. Simple and easy to use2. Easily manageable.3. The phase of the model are processed and completed one at a time.4. Works very well for smaller software projects.

Disadvantages1. It is often difficult for the customer to state all the requirements explicitly.2. Real projects rarely follow the sequential flow that the software model

23

Page 24: Major Report New 3

proposes.3. The customer must have patience, as the product is delivered very late in this software Process .

4. The model is not suitable for long time software projects.

Dia. The Waterfall Software Life Cycle Model

24

Page 25: Major Report New 3

3.2 Design diagrams :-

3.2.1 E-R Diagram :-

25

Page 26: Major Report New 3

26

Page 27: Major Report New 3

3.2.2 DFDs :-Level 0 DFD :-

27

Page 28: Major Report New 3

Second Level DFD :-

28

E-LEARNING

COURSES

LOGINA

FAQ

FORUMGLOSSARY

STUDENT

ADMIN

.LOGIN

ADMINDetails

STUDENT GET

FACULTY GIVE

STUDENT GET

STUDENT GET

ADMIN GET

STUDENT GET

FACULTY GIVE

STUDENT GET

ADD/DELETEFACULTY/STUDENT

ADD/DELETEFACULTY/STUDENT

VIEWSTUDENTS/FACULT

INTERACT WITH FACULTY

RECEIVE FORUM

VIEW COURSES

GIVE TEST

GET RESULT

GLOSSARY

INTERACT WITH FACULTY

FACULTY

QUIZ CRTEATER

FACULTY GIVE

View courses/FAQ

Give Quiz

GIVE TEST

Page 29: Major Report New 3

3.2.3 Use-Case Diagram :-

29

Admin

Interaction Courses

FAQ

View Lecture

Faculty

Interaction

Student

Add/Remove Facultie

View Quiz

View Results

View FAQ

Page 30: Major Report New 3

3.3 Technology Used :-

3.3.1 DOT NET:- Microsoft .NET (pronounced “dot net”) is a software component that runs on the Windows operating system. .NET provides tools and libraries that enable developers to create Windows software much faster and easier. .NET benefits end-users by providing applications of higher capability, quality and security. The .NET Framework must be installed on a user’s PC to run .NET applications.

This is how Microsoft describes it: “.NET is the Microsoft Web services strategy to connect information, people, systems, and devices through software. Integrated across the Microsoft platform, .NET technology provides the ability to quickly build, deploy, manage, and use connected, security-enhanced solutions with Web services. .NET-connected solutions enable businesses to integrate their systems more rapidly and in a more agile manner and help them realize the promise of information anytime, anywhere, on any device.

.NET architecture :- Microsoft .NET consists of four major components:

Common Language Specification (CLS) – blue in the diagram below Framework Class Library (FCL) – red Common Language Runtime (CLR) – green .NET Tools – yellow

30

Page 31: Major Report New 3

At the base of the diagram in gray is the operating system, which technically can be any platform but typically is Microsoft Windows 2000 or greater, accessed through the Win32 API (Application Programming Interface).

Advantages of DOT net:-

To address the limitations of COM and DNA, Microsoft designed the .NET platform for Internet-based applications.

.NET manages the scripting limitations of COM and DCOM and makes component development an easy task. .NET provides the core technologies for developing Web services. Therefore, it not only benefits individual users but also organizations and developers.

Two major benefits of .NET include side-by-side execution of code and decentralized registration of components.

Benefits of .NET: Side-by-Side Code Execution

.NET supports side-by-side execution of the code that helps resolve versioning problems. This feature solves the problem of overwriting of a shared component by allowing multiple

versions of a component to be installed and run simultaneously on the same computer. Therefore, .NET developers are not required to maintain

31

Page 32: Major Report New 3

backward compatibility because different applications can use different versions of a shared component.

.NET developers can also specify the version and dependencies between different software components. The dependencies are stored with the components in an assembly and this information helps maintain application integrity. Each application can request to use a specific version of the component. At runtime, the stored information is used to load the correct version of the dependency.

.NET generates errors if components are not loaded, missing dependencies are found, or tampered.

Benefits of .NET: Decentralized Registration of Components

.NET also reduces problems that occur because of centralized registration of components in the Registry. It does not use the Registry for component registration. Instead, it stores information about the components with the code and retrieves this information directly from the files at runtime.

When an application instantiates a new component, the application directory and other predefined locations for the component are scanned. When the component is located, information about the component is cached for future use. This decentralized registration of components minimizes the chances of applications interfering with each other. You also do not need to register and unregister components. Therefore, deployment of applications becomes easy and can be done by simply copying files into a directory.

Benefits of .NET to Individual Users

.NET provides an integrated, mobile computing experience to individual users. Data can be integrated from a range of computing hardware, such

32

Page 33: Major Report New 3

as laptops, Pocket PCs, Smartphone’s, and other devices. This enables users to access information easily regardless of their location.

In addition, .NET applications can be installed using XCOPY. Users can easily install desktop applications on the client computers by simply copying the files on their computers from a remote Web server or from a disk. Further, .NET applications are not dependent on the Registry. Therefore, it is easy to remove or replicate them. To remove or replicate the applications, users simply need to delete the files or copy over them.

Benefits of .NET to Developers

.NET provides developers with an integrated set of tools for building Web services quickly and cost-effectively. Developers can use these tools to create scalable solutions that can work across different computing devices.

SQL :-

The only interface available between end users and an RDBMS is Structured Query Language (SQL). All other applications and tools that users utilize to interact with the RDBMS act as translators/interpreters. These tools generate SQL commands based on a user's request and pass the generated SQL commands on to the RDBMS.

SQL functions Data definition or DDL operations, such as creating, altering, and dropping database objects. Data query to select or retrieve the stored data. Data manipulation or the DML operations to insert, update, and delete data. Access and transfer data between the databases.

33

Page 34: Major Report New 3

DBA functions or the database administrative tasks such as managing users. (Creating, altering, and dropping users), managing space (creating, altering, and dropping table spaces), and backup and recovery. Allow user to enter data interactively.

Why SQL Server?

Space management: It provides flexibility to the system. Open Connectivity: It provides uninterrupted access to the database. It is possible to work with the information that resides in other data repositories as well as it allows storage of data in Oracle’s database and access through other software like VB, SQL windows. Development Tools: Oracle server supports a wide range of development tools such as end user query tools of the shelf application’s and office wide information management tools. Security Mechanism: These mechanism control access to sensitive data by an assortment of privileges. Backup and Recovery: Oracle provides excellent Backup and Recovery Routines. Backup creates secondary copy of data. Recovery restores a copy of data from that Backup.

Limitations :- Since every system has some limitations, so the proposed system is also not untouchable in this regard. Although it includes many features but still it would not be sufficient as the user requirements are not always same. The change in the requirements will need some changes in the system to fulfill the requirements. The security of the system will be one of the prime concerns once it will be made online.

1. The barcode facility is not available .

2. Database used is SQL Server and every database have a stack limit.

3. Manual Errors at the time of entering the data can’t be check, only the validation required w.r.t proposed system is checked.

34

Page 35: Major Report New 3

35

Page 36: Major Report New 3

4.IMPLEMENTATION

Once the system was tested, the implementation phase started. A crucial phase in the system development life cycle is successful implementation of new system design. Implementations simply mean converting new system design into operation. This is the moment of truth the first question that strikes in every one’s mind that whether the system will be able to give all the desires results as expected from system. The implementation phase is concerned with user training and file conversion.

36

Page 37: Major Report New 3

The term implementation has different meanings, ranging from the conversion of a basic application to a complete replacement of computer system Implementation is used here to mean the process of converting a new or revised system design into an operational one. Conversion is one aspect of implementation. The other aspects are the post implementation review and software maintainence. There are three types of implementation:

Implementation of a computer system to replace a manual system Implementation of a new computer system to replace an existing one. Implementation of a modified application to replace an existing one.

Conversion:

Conversion means changing from one system to another. The objective is to put the tested system into operation while holding costs, risks and personnel irritation to a minimum. It involves creating computer compatible files; training the operational staff; installing terminals and hardware. A critical aspect of conversion is not disrupting the functioning of organization.

Direct Implementation:

In direct implementation; the previous system is stopped and new system is started up coincidentally. Here there is a direct change over from manual system to computer-based system. In direct change over implementation; employees can face the problems. Suppose our software is not working much efficiently as manual one then we can’t find the defects in our software. It will not be beneficial in finding errors.

The proposed system “E-Learning” is fully implemented using Direct Implementation.

This project is successfully implemented in C# (ASP.NET) and SQL Server and was seen in all respect of specification. Any number of records can be maintained according to given schedule of company. Till now it is successfully working. As far

37

Page 38: Major Report New 3

as the modification in the Project is considered, the all facilities are built in this project.

It is granted that this project will work as it is at Present and also in future as all specifications are along the time and frame of the department. Also this project can be successfully implemented in any organization.

4.2 Modules:-

Our project provides full content for online learning . It contains entities like Administrator, Faculty, Student . We have provided students with several facilities like glossary, FAQ, quiz, quiz results, interaction with faculty…

Administrator is the person who have full control over student and faculties. He can schedule lectures . faculty can create quiz .

Explanation of modules:- Courses:-In this module faculty can add/remove the courses and student can view the courses. Courses are divided into three categories--Category.-Contenttype.-content.

Quiz:-Quiz is created by faculty student can give and view the quiz and get the result by knowing their test –id.

Glossary:-It is a sort of dictionary. Students can type the difficult words and get the meaning

38

Page 39: Major Report New 3

4.3 Sample Source Code:-

Login Page:-using System.Data.SqlClient;

public partial class login : System.Web.UI.Page{ SqlConnection cn = new SqlConnection(ConfigurationManager.ConnectionStrings["c"].ConnectionString);

protected void Page_Load(object sender, EventArgs e) {

} protected void Button1_Click(object sender, EventArgs e) { try { // SqlConnection cn = new SqlConnection("database=Database.mdf"); //cn.Open(); string sql = "select * from login where email = '" + TextBox1.Text + "'and Password='" + TextBox2.Text + "'"; SqlDataAdapter da = new SqlDataAdapter(sql, cn); //SqlCommand cmd = new SqlCommand(sql, cn); //cmd.ExecuteNonQuery(); //cn.Close(); DataSet ds = new DataSet(); int i=da.Fill(ds, "temp");

if (i > 0) { Session["all"] = ds; Response.Redirect("student.aspx"); } else { Label1.Text = "invalid username/password"; }

39

Page 40: Major Report New 3

Category :-

using System.Data.SqlClient;

public partial class facultyaa : System.Web.UI.Page{ SqlConnection cn = new SqlConnection(ConfigurationManager.ConnectionStrings["c"].ConnectionString); protected void Page_Load(object sender, EventArgs e) {

} protected void Button1_Click(object sender, EventArgs e) { if (CheckCategory(TextBox1.Text,Convert.ToInt32(DropDownList1.SelectedValue)) == true) { Label1.Text = "Sorry!! This category already exists"; } else { SqlCommand cmd = new SqlCommand("INSERT INTO Category (CategoryName,CID, preference, show) VALUES ('" + TextBox1.Text + "','" + DropDownList1.SelectedValue + "','"+DropDownList2.SelectedValue+"','" + CheckBox1.Checked + "')", cn); cn.Open(); cmd.ExecuteNonQuery(); cn.Close(); Label1.Text = "This category has been saved"; GridView1.DataBind(); } } protected Boolean CheckCategory(string str,int con) { bool b = false; SqlDataAdapter da = new SqlDataAdapter("Select * from Category Where CategoryName='" + str + "' and CID='"+con+"'", cn); DataSet ds = new DataSet(); int i = da.Fill(ds, "T"); if (i > 0)

40

Page 41: Major Report New 3

{ b = true; } else { b = false; } return b;

}

protected void Button2_Click(object sender, EventArgs e) { Response.Redirect("content.aspx"); }}

Content Type :-

using System.Data.SqlClient;

public partial class content_type : System.Web.UI.Page{

SqlConnection cn = new SqlConnection(ConfigurationManager.ConnectionStrings["ConnectionString"].ConnectionString); protected void Page_Load(object sender, EventArgs e) { string sql = "SELECT Contenttype FROM Contenttype"; SqlDataAdapter da = new SqlDataAdapter(sql, cn); DataSet ds = new DataSet(); da.Fill(ds, "h"); GridView1.DataSource = ds; GridView1.DataBind();

} protected void GridView1_SelectedIndexChanged(object sender, EventArgs e) {

}}

41

Page 42: Major Report New 3

4.4 Snapshots :-

1. Home Page :-This is the basic page of website.

About Us:- This provides all the information about the virtual learning home.

Contact Us:- This link provides all the information regarding faculty,courses,contact no.,address of particular faculty .

42

Page 43: Major Report New 3

About Us :-

43

Page 44: Major Report New 3

Contact Us :-

44

Page 45: Major Report New 3

Administrator :- As soon as we click on administrator link admin will be redirected to admin login page. Where admin will enter his email id and password .

45

Page 46: Major Report New 3

As soon as admin will submit correct id and password he will be directed to this page where he can perform following things like –

Can view no. of students logged into the website for attending the class. Can view no. of faculty currently working, there email add. And also there

contact no. Admin maintains the database,modify database and will recruit faculty.

46

Page 47: Major Report New 3

47

Page 48: Major Report New 3

1.Admin Viewing Student List :-

48

Page 49: Major Report New 3

2.Admin Viewing Faculty List :-Can view no. of faculty currently working, there email add. And also there contact no.

49

Page 50: Major Report New 3

Faculty :-

1.Can see no.courses to teach.

2.Can answer to queries posted by students.3.Can make list of frequently asked questions and can answer them for the benefit of students.4.Faculties can see the lecture timing which is to be taken by them.

As soon as we click on link faculty on home Page we will redirect on faculty login page if faculty is already having account otherwise faculty must signin first.

50

Page 51: Major Report New 3

1.Courses :- As soon as faculty click on courses link he will directed to content type page, where he can enter new content for students and can save it if already not present.

51

Page 52: Major Report New 3

2.Category Page :-

As soon as faculty will click on next button he will redirected to Category page.Where fields like category name,conent type are present.

52

Page 53: Major Report New 3

3.Content Page :- Under content page faculty can add full document for any topic so that students can learn it or read it as per there need.

53

Page 54: Major Report New 3

Here in this page FCK editor is used for formatting data.

Students:-

1.Quiz Page :- 54

Page 55: Major Report New 3

Here students can give test . Students can choose the category for which they want to appear, Here timer is used to limit the timing of paper.

2.Registration page :-

55

Page 56: Major Report New 3

For making account registration is necessary for faculty and student.

3.Lecture Timing :- Students can view lecture timing as per the faculty they want to study.

56

Page 57: Major Report New 3

57

Page 58: Major Report New 3

4.FAQ :-

In this Faculty Can insert new question along with there answers in any particular field and students can view and study those FAQS .

58

Page 59: Major Report New 3

5.Interaction :-

We have added features like online chating and E-mail facility for interaction with Faculty.So that students can interact with faculties and clear there doubts.

59

Page 60: Major Report New 3

6.Quiz Results :-

Students can view there results of quiz test . Student have to enter his/her email id , password & testid which is provided at the time of quiz.

60

Page 61: Major Report New 3

7.Forum :-

Forum is the facility provided to the students so thst they can directly interacted with the administrator of the website and can post comment or can give feed back for faculties .

This page includes fields like Full name, email id,phone no. and comment for any faculty.

61

Page 62: Major Report New 3

Glossary :-

A glossary is a list of terms and definitions. Traditionally, a glossary appears at the end a book and includes terms within that book .

It is very similar like a dictionary,as soon as we click on go button we will get connected to google and can find the meaning of the word we want to know.

62

Page 63: Major Report New 3

5. SOFTWARE TESTING

 

5.1 Testing :-

Software testing is an investigation conducted to provide stakeholders with information about the quality of the product or service under test. Software testing also provides an objective, independent view of the software to allow the business to appreciate and understand the risks at implementation of the software. Test

63

Page 64: Major Report New 3

techniques include, but are not limited to, the process of executing a program or application with the intent of finding software bugs.Software testing can also be stated as the process of validating and verifying that a software program/application/product:

1. meets the business and technical requirements that guided its design and development;

2. works as expected; and3. can be implemented with the same characteristics.

Software testing, depending on the testing method employed, can be implemented at any time in the development process. However, most of the test effort occurs after the requirements have been defined and the coding process has been completed. As such, the methodology of the test is governed by the software development methodology adopted.

Different software development models will focus the test effort at different points in the development process. Newer development models, such as Agile, often employ test driven development and place an increased portion of the testing in the hands of the developer, before it reaches a formal team of testers. In a more traditional model, most of the test execution occurs after the requirements have been defined and the coding process has been completed. 

5.2 Testing And Validation:-

Overview:The aim of testing process is to identify all defects in a software product.

Testing is any activity aimed at evaluating the software for quality results it produces and the quality of results it can handle. Testing is an operation to detect the differences between the expected (required) result and the actual result.

Testing a program consists of subjecting the program to a test inputs or test cases and observing if the program behaves as expected. If the program fails to

64

Page 65: Major Report New 3

behave as expected, then the condition under which failures occurs are noted for later debugging and correction. There are many stages of testing depending on the complexity of the software.

Levels of Testing: The basic levels of testing are:-

1. Unit Testing. 2. Integration Testing. 3. System Testing 4. Acceptance Testing.

The levels of resting attempt to detect different types of faults. The relation of faults introduces in different phases and the different levels of testing are shown.

Employee Needs Acceptance Testing

Requirements System Testing

Design Integration Testing

Code Unit Testing

65

Page 66: Major Report New 3

5.3 Need Of Testing And Testing Applied :-

Software testing is a critical element of the ultimate review of specification design and coding. Testing of software leads to the uncovering of errors in the software functional and performance requirements are met .Testing also provides a good indication of software reliability and software quality as a whole. The result of different phases of testing are evaluated and then compared with the expected results. If the errors are uncovered they are debugged and corrected. A strategy approach to software testing has the generic characteristics:

Testing begins at the module level and works “outwards” towards the integration of the entire computer based system.

Different testing techniques are appropriate at different points of time.

Goals and Objectives :-“Testing is a process of executing a program with the intent of finding an

error”. A good test case is one that has a probability of finding an as yet undiscovered error. A successful test is one that uncovers an as yet undiscovered error. Our Objective is to design test processes that systematically uncover different classes of errors and do so with minimum amount of time and effort.

Testing implementation

Executes Test plans (generates test reports) after preparation of test cases and after making appropriate changes in the code we execute the test cases. Execution of test plans is done in accordance with project management plan. Test acceptance criteria for the functional tests in measurable terms are specified in customer requirement specification. Say not more than x number of problem of severity code A and y problems of severity code B for acceptance of the product under test.

After running our test cases we run the test cases given by the company for the validation of the product.

66

Page 67: Major Report New 3

Test Cases

Testing a program consists of providing the program with a set of test input (or test case) and observing if the program behaves as expected. If the program fails to behave as expected, then the conditions under which a failure occurs are noted for debugging and correction. The following are some commonly used terms associated with testing.

A failure is a manifestation of an error (or defect or bug.). But, the mere presence of an error may not necessarily lead to a failure. A fault is an incorrect intermediate state that may have been entered during program execution, e.g. a variable value is different from what it should be. A fault may or may not lead to a failure. A test case is the triplet [I, S, O] where I is the data input to the system, S is the state of the system at which the data is input, and O is the expected output of the system. A test suite is the set of all test cases with which a given software product is to be tested.

Verification and Validation

Verification is the process of determining whether one phase of a software product conforms to its previous phase, whereas validation is the process of determining whether a fully developed system conforms to its requirements specification. Thus while verification is concerned with phase containment of error, the aim of validation is to make the final product error free.

Test Dataset

Any product can be tested in one of the following two ways:

67

Page 68: Major Report New 3

1. Knowing the specified function to be performed by the design product, tests can be executed,demonstrating each function to be fully operational while at the same time finding errors in each functions.

2. Knowing the product’s internal working, tests can be conducted to ensure that internal operations are performed according to the specifications and that all internal components have adequately been exercised.

The following issues must be addressed if a successful software testing strategy must be implemented:

1. Specify product requirements in a quantifiable manner long before testing commences.

2. State testing objectives explicitly3. Understand the users of the software and develop a profile for each user

category.4. Develop a testing plan that emphasizes “rapid cycle testing”5. Build robust software that is designed to test itself6. Use effective formal techniques reviews as a filter prior to testing.7. Conduct formal techniques to assess the test strategy and test cases

themselves develop a continue improvement approach for the testing process.

A pictorial representation of this can be shown as follows.

68Result Of Testing

Comparator

Existing Test Case

New Test CaseSoftware

Under Testing

Output

Page 69: Major Report New 3

Testing Process:-

The testing process can be shown as:

69

Levels of testing Test Plan

Test Procedures

Test Case Specification

Page 70: Major Report New 3

Levels of Testing:

The basic levels of testing are:-1. Unit Testing. 2. Integration Testing. 3. System Testing

4. Acceptance Testing \

UNIT TESTING:-Unit testing has been under taken when a module has been coded and

successfully reviewed. Unit testing is the testing of different units or modules

70

Test Report

Test Case Execution

Test Case Analysis

Is Error Uncovered

?

No

Yes

Page 71: Major Report New 3

of system in isolation. It is programmer’s responsibility to think of the advantage of doing unit testing before integration testing is that it makes debugging easier. If an error is detected when a module is being tested along with several modules, it would be difficult to determine which module exactly has an error.

In the current system “Stock Management System”, unit testing has been exclusively done after finishing every module.

INTEGRATION TESTING: - Once a program or module has been unit tested, the programmer can then work with integration it with other programs.

The primary objective of integration testing is to test the module interfaces in order to ensure that there are no errors in the parameter passing, when one module involves another modules. During integration testing, different, different modules of the system are integrated in a planned manner i.e. the order in which they are combined to realize the full system.

The various approaches of integration testing are:

1. Big Bang Approach. 2. Top-Down Approach. 3. Bottom-Up Approach.4. Mixed Approach.

Out of the above four approaches Mixed Approach has been used for the proposed system. A mixed approach integration testing follows a combination of top down and bottom up testing approach. In the top-down approach, testing can start only after the top level modules have been coded and unit tested. Similarly, bottom up approach can start only after the bottom level modules are ready. The mixed approach overcomes these shortcomings of the top-down a bottom-up

71

Page 72: Major Report New 3

approaches. In the mixed testing approach, testing can start as a when modules become available.

For the proposed system we have also extensively used regression testing. Regression testing is the practice of running an old test suite after change to the system or after each bug fix ensure that no new bug has been introduced as a result of the change made or bug fixed.

SYSTEM TESTING:-

System testing is actually a series of different test whose primary purpose is to exercise the computer based system, all work to verify that system elements have been properly integrated and performed allocated function.

Its focus is to prove that the completed system does what it should. This test is conducted in a formal manner. The testers use scenario-based system test scripts that have predicted outputs. The test results are recorded in structured test logs. The structured test logs and scripts drive the system testing process.

System testing activities are intended to prove that the system meets its objectives. Testing proves that the system meets its requirements. This is not entirely true unless one considers acceptance testing as a type of a system testing because the purpose of acceptance testing is to demonstrate that the system meets the user requirement. Acceptance testing is validation process. System testing in the strictest sense is a verification process. Regardless of whether it represents verification or validation. System testing represents an external view of the system.

This is true because requirements represent the eventual system user’s of the system (an external view). Users do not understand nor do they care about how the system works as long as it is usable. System testing should be approached from this perspective.

72

Page 73: Major Report New 3

As far as the proposed “Stock Management System” is concerned it meets

this requirement.

PERFORMANCE TESTING:-Some of the performance testing done for the proposed system are:-

1. Stress Testing :- Stress testing is done to evaluate system performance when it is stressed for short periods of tome. Providing a range of abnormal and even illegal input condition so as to stress the capability of the software. Input data volume, input data rate, processing time, utilization of memory etc are tested beyond the designed capacity.

2. Volume Testing :- This testing is done to check whether the data structures have been designed successfully for extraordinary situation.

Testing includes

Verification and Validation Verification:-is a process of confirming that software meets its

specification. Validation:- is the process of confirming that software meets the

customer’s requirements.

Validation TestingValidation succeeds when software functions in a manner that can be reasonably expected by the customer. It covers the following :-

Validation test criteria 73

Page 74: Major Report New 3

Performance, functional characteristics and uncovered deviation from specification.

Configuration Review:Ensures that all the elements of software configuration have been properly developed cataloged and have support for the maintenance phase of software life cycle.

Alpha Beta Testing: Alpha test is conducted by developer’s site by customer. Beta test is conducted at one or more customer site by software end user

Modular Integration Testing:Modular integration testing is done to ensure that the module is working independently. The inputs as required by the module are given as required and the output is tested as per the specifications

Test Plan ,Test Cases and Result:

The component which are developed are –1. The login process (for authentication).2. Approval of the login application.3. Tasks (Data entry/ updation) after approved applications.4. Report Generation.5. Print the reports.6. Password recovery/change7. New login8. Search facility for customer.

74

Page 75: Major Report New 3

9. Successful saving of work.

Since the whole project is developed so unit testing and integration testing of the developed component are carried out. The unit testing was carried out by separately operating the component. The testing of login process part was carried out by checking the all form validation and checking the database after the form submission. The approval part was carried out by testing with the data which are inserted in the database. The tasks and Report portion is also tested by the same data which were processed in the testing of approval of application portion. Then the whole system is tested by the System testing.

5.4 Testing applied :-

Unit testing refers to tests that verify the functionality of a specific section of code, usually at the function level. In an object-oriented environment, this is usually at the class level, and the minimal unit tests include the constructors and destructors. These type of tests are usually written by developers as they work on code (white-box style), to ensure that the specific function is working as expected. One function might have multiple tests, to catch corner cases or other branches in the code. Unit testing alone cannot verify the functionality of a piece of software, but rather is used to assure that the building blocks the software uses work independently of each other.Unit testing is also called component testing.

Dependencies :-

There may be some dependencies in regarding to this project. So some of the dependencies may be considered as:Purchase dependency:- ‘Purchase dependency’ refers to the dependency of purchase or non-purchase of one item or item set on the purchase or non-purchase of another item or item set.

75

Page 76: Major Report New 3

In the context of data mining, various aspects of purchase dependencies which may be useful for the purpose of retail inventory management have been discussed as given below:Demand Interdependency: The problem of multi-item inventory is more challenging when there is association in the demand or usage pattern amongst the items or item-sets (Item-set refers to a set of one or more items, hence if we sayitem-set, it may refer to one item or a number of items.). The correlation in the demand amongst the items can be one to one, one to many, many to one or many to many. In many situations, a customer buys an item or item-set only when another item or item-set is also in stock.Sequence of Purchase: Many a times, a sequence of purchase gets repeated most of the times with a time gap between two purchases. A sequence may be of with two or more events of purchases. In each event of purchase, certain itemset is purchased. Once a repetitive sequence rule is identified, it can be used as an input for inventory modeling.Time-Dependent Purchase Pattern: On different days of the week, there may be different purchase pattern of the customers. Purchase patterns on the weekdays and the weekends are generally different. Similarly, in different months or seasons, different patterns may be observed. Time-dependent purchase pattern may also be

observed at different hours of the day. Purchase pattern in the evening hours happens to be different from the day hours. Segregated data with respect to time can be used to learn time-dependent purchase patterns. For example, data of weekend and weekdays can be segregated for this purpose.

Location-Dependent Purchase Pattern: There may be an impact of culture, climatic condition and other factors on the purchase pattern. Segregated data with respect to location or space can be used to learn location-dependent purchase patterns.Negative Dependency: Sometimes, purchase of one item or item set results in non-purchase of another item or item set. Similarly, non-purchase of one item or

76

Page 77: Major Report New 3

item set may result in purchase of another item or item set. This kind of purchase dependency may be observed within a transaction made by a customer or in successive transactions made by the customer with a time gap.

Performance Characteristics :-The following performance characteristics should be taken care of while developing the system:

User friendliness: The system should be easy to learn and understand so that new user can also use the system effectively, without any difficulty.

User satisfaction: The system should meet user expectations.

Response time: The response time of all the operations should be low. This can be made possible by careful programming.

Error handling: Response to user errors and the undesired situations should be taken care of to ensure that the system operates without halting.

Safety: The system should be able to avoid or tackle catastrophic behavior.

Robustness: The system should recover from undesired events without human intervention.

5.5 Validation Criteria :-

77

Page 78: Major Report New 3

The following validation criteria were established for the evaluation of the new system:

User friendliness:- The system should meet user needs and should be easy to learn and use.

Modularity:- The system should have relatively independent and single function parts.

Maintainability:- The system should be such that future maintenance and enhancements times and efforts are reduced.

Timeliness:- The system should operate well under normal, peak and recovery conditions.

The system developed should be accurate and hence reliable i.e. the error rate should be minimized and the outputs should be consistent and correct.

Both the execution time and response time should be negligibly low. The system should be efficient i.e. the resources utilization should be

optimal. The system should have scope to foreseen modifications and enhancements

i.e. it should be able to cope with the changes in future technology.

78

Page 79: Major Report New 3

6.CONCLUSION

Testing is an essential stage of the software development life cycle. If is performed properly by following an organization’s standards the end result will be more robust programs going to the system integration testing and finally a system with low maintenance. Proper coding and unit testing are basic steps to ensure that the system being built will work once it is put together.The objective of this project was to build a program for maintaining the details of all available stock and sales .The system developed is able to meet all the basic requirements. It will provide the facility to the user so that they can keep tracks of all the products being sold. The management of the Inventory will be also benefited by the proposed system, as it will automate the whole sales procedure, which will reduce the workload. The security of the system is also one of the prime concerns.

There is always a room for improvement in any software, however efficient the system may be. The important thing is that the system should be flexible enough for future modifications. The system has been factored into different modules to make system adapt to the further changes. Every effort has been made to cover all user requirements and make it user friendly.

Goal achieved: The System is able to provide the interface to the user so that he can replicate his desired data. .

User friendliness: Though the most part of the system is supposed to act in the background, efforts have been made to make the foreground interaction with user as smooth as possible. Also the integration of the system with

79

Page 80: Major Report New 3

Inventory Management project has been kept in mind throughout the development phase.

7.REFERENCES

C#.net

Professional C#.NET (Wrox Publication) C#.NET Black Book (For Beginning) Windows Application with VB.NET or C#((PHI + Microsoft)

ASP.NET

Professional ASP.NET(Wrox Publication) Beginning ASP.NET with VB or C# Web Based Application with VB.NET or C#

MISCELLANEOUS

Pure C# Script Professional ADO.NET Hand Book on Deployment (Wrox) Mastering SQL Server 2000—Mike Gunderly, Joseph L Jordan.

Some urls used in the development of the project are:1. http://www.google.co.in

80

Page 81: Major Report New 3

2. www.dotnetspider.com3. http://javascript.internet.com/4. http://www.mysql.com/tutor.htm5. www.ebooks.com6. www.planetpdf.com

81