109
MAJOR PROJECT REPORT (E-EDUCATION) Submitted in the partial fulfillment of B.Tech in Information Technology under Punjab Technical University , Jalandhar Submitted by Jaskaran 1149400 Submitted To: Er. Neeraj Mohan Er. Manpreet Kaur Basra (Associate Prof. and HOD CSE/IT) (Asst. Prof CSE/IT)

Training Report Spic

  • Upload
    manan

  • View
    13

  • Download
    0

Embed Size (px)

DESCRIPTION

CCNA FINAL TRAINING REPORT

Citation preview

MAJOR PROJECT REPORT

(E-EDUCATION)

Submitted in the partial fulfillment of B.Tech in Information Technology under Punjab Technical University , Jalandhar

Submitted by Jaskaran1149400

Submitted To:Er. Neeraj Mohan Er. Manpreet Kaur Basra(Associate Prof. and HOD CSE/IT) (Asst. Prof CSE/IT)

Department Of Computer Science Engineering/ Information TechnologyRBIEBT, SAHAURAN, KHARAR

2015

DECLARATION

I hereby declare that the project work entitled (E-EDUCATION) is an authentic record of my own work carried out at SPIC under the guidance of Mr. Ashok Kashav as requirement of six months training for the award of degree of B.TECH INFORMATION TECHNOLOGY, RBIEBT, during Jan to Jun 2015.

Jaskaran 1149400Date: ___________________

ABSTRACT

The purpose of this report is to give a brief idea what has been done in the training project. This report comprises of various activities orientations, programs. Our project was initiated to reduce anxiety for both students and parent as choosing a right career and a best guidance is not an easy task . So our project provides career counselling guidance for the students who wish to search their career . It has user friendly menu environment to ease the use of the system. Overall project is combination of two technologies namely JAVA and SQL server. During this session, we also define the objectives of our project, goals, scopes and problems treatment so that we can complete the project easily referring to it.During the making of the project we found out that this will not only revolutionize the management of various tasks in the package but also will deliver the required information in a very easy to use and ease to access manner.

Name:

ACKNOWLEDGEMENT

First of all I would like to thank the Almighty, who has always guided me to work on the right path of the life. I acknowledge with deep sense of gratitude and most sincere appreciation, the valuable guidance and unfailing encouragement rendered to me by Mr. Ashok Kashav for their proficient and enthusiastic guidance, useful encouragement and immense help. I have been deep sense of admiration for them inmate goodness and inexhaustible enthusiasm.

I wish to extend my sincere gratitude to Er. Neeraj Mohan Associate. Prof. and HOD of CSE/ IT and Er. Manpreet Kaur Asst. Prof. of CSE Department for their guidance, encouragement and valuable suggestions which proved extremely useful and helpful in completion of this industrial training.

My heartfelt gratitude and indebtedness goes to all teachers and guidance group who with their encouraging, caring words, constructive criticism and segmentation have contributed directly or indirectly in a significant way towards completion of this training. My special thanks go to my friends whose support and encouragement have been a constant source of assurance, guidance, strength, and inspection to me.

I am immensely grateful to my parents, my family. They have always supported me and taught me the things that matter most in life. I am proudly grateful to all of them.

Date: Jaskaran 1149400TABLE OF CONTENTS

CHAPTERCONTENTSPAGENO.SIGNATURE

1.COMPANY PROFILE1.1: Spic1.2: Introduction To Java9-17

2.SDLC2.1: SDLC 2.2: Brief Explanation Of Each Phase2.3:Feasibility Study18-24

3.WORKUNDERTAKEN3.1:NETBEANS 3.2:JDBC3.3:HTML3.4:CSS3.5:JAVASCRIPT3.6:JQUERY3.7:SQL3.8:CLIENT SIDE SCRIPTING AND SERVER SIDE SCRIPTING

25-37

4.PROJECT UNDERTAKEN4.1:Project defination4.2: Project description4.3: Drawbacks of Project 4.4: Stages Of Development4.5:System analysis & design4.6:Future enhancement4.7:Advantages of project4.8: Requirements38-40

5.STRUCTURE DESIGN5.1: Introduction5.2:DFDs5.3: E-R diagram5.4:Flow Chart41-50

6.SQL TABLES51-56

7.SNAPSHOTS57-73

8.TESTING STRATERGY8.1 Unit Testing8.2 Integration Testing8.3 System Testing8.4 Testing Techniques Used8.5 Debugging74-78

9.EXPERIENCE THROUGHOUT TRAINING79

10.FUTURE SCOPE AND APPLICATIONS80

CONCLUSIONBIBLIOGRAPHYREFERENCES8182

INDEX OF FIGURE

CHAPTER.NOFIGUREPAGE.NOSIGNATURE

2 Figure 118

3 Figure 225

5 Figure 3 Figure 4 Figure 535

6 Table 1 Table 2 Table 3 Table 4 Table 5 Table 6 Table 7

51-53

7 Figure 7 Figure 8 Figure 9 Figure 10 Figure 11 Figure 12 Figure 13 Figure 14 Figure 15 Figure 16 Figure 17 Figure 18 Figure 19 Figure 20 Figure 21 Figure 22 Figure 23 Figure 24 Figure 25 Figure 26 Figure 27 Figure 28 Figure 29 Figure 30 Figure 31 Figure 32 Figure 33 Figure 34 Figure 35 Figure 36 Figure 37 Figure 38 Figure 39

57-71

72

1. INTRODUCTION

COMPANY PROFILE

1.1 Society for Promotion of IT in Chandigarh(SPIC) The Society for Promotion of IT in Chandigarh (SPIC) has been set up under the ages of the Department of Information Technology, Chandigarh Administration for implementing the various plans of the Administration to promote the IT industry in Chandigarh. The Chairperson of the Society is the Adviser to the Administrator. The Department of Information Technology was setup in March 2000. Information Technology is an important and extremely effective tool through which development and progress can take place with the co-operation of all strata of society including government and the public. Chandigarh Administration is committed to provide responsive and effective administration for the welfare of the public keeping in view of the national objectives. Now a days SPIC is one of the most trustable institutes for industrial training in various fields of engineering like IT, Computer Science, Electronics, Electrical, etc. both in 6 weeks and 6 months. In IT, SPIC provides training in languages such as Java, .NET, PHP, C, C++ and in Networking. Most of the Hospitality Management Projects in Chandigarh are handled by SPIC.

Corporate Training in SPIC-SPIC provides training which helps the organization/department build the right skill levels amongst workforce to support various IT projects. SPIC training programs cover a range of domains to take care of organizations/departments total training requirements. SPIC provides customized corporate training programs under which SPIC specialize in assessing training needs, designing, developing, delivering, administrating and even evaluating corporate training solutions. SPIC has developed customized courses in IT and Soft Skills. SPIC has been in the training field since the last 7 years. SPIC has an in-depth understanding of what the learner desires. The synergy from SPIC training and software development field gives SPIC edge to develop and deliver training.Centre of ExcellenceSPIC and Microsoft Technologies have jointly setup a Centre of Excellence at Punjab Engineering College, Chandigarh (PEC). Under the aegis of Department of IT. The Centre is state-of-the-art Complex spread over an area of 3500 sq. ft. It consists of Spacious Conference Room, Hi-Tech classrooms, 30 workstations, a Meeting Room and all the latest technological equipment for Training, Software Development and Presentation. Under this understanding the partnership will work towards computerizing organizations in Chandigarh U.T., building skilled technical resources, develop expertise in providing technical consultancy, developing custom applications. Microsoft, in return will provide access to training and skills transfer on Microsoft Corporation Technology. The centre is offering various courses like MCSE, MCSD, MCDBA, VB and SQL. Microsoft is carrying out training for the faculty, the students and employees of Chandigarh Administration on its new technologies/products for bench marking and demonstrating an array of Microsoft products, solutions and inter-operability with other platforms at this Centre. The Centre of Excellence being used as for the development os skills for the emerging software industry in Chandigarh U.T. The Centre also provides organized short-term courses for corporate executive companies.

1.1.1 The major objectives of SPIC are as follows:1. To promote application of Information Technology in the Union Territory of Chandigarh in accordance with the IT Policy of Chandigarh Administration. 2. To carry out all such activities that are commensurate with the IT vision of the Chandigarh Administration as outlined in IT Policy. 3. To promote e-Governance, Software Exports, create IT Infrastructure, generate jobs in IT as outlined in the IT Mission of the Chandigarh Administration. 4. To facilitate the establishment and functioning of data processing computer centers. 5. To provide consultancy services and impart training in various disciplines of Information Technology. 6. To facilitate the development of software packages as well as related items and undertake turnkey project / assignments in India and abroad in Information Technology by public and private sector companies in the Union Territory of Chandigarh in order to promote the application of Information Technology for the benefit of citizens of Chandigarh.

Information TechnologySPIC approach, which blends management and IT expertise with domain knowledge, is unique in its ability to provide customized consulting solutions spanning the policy and planning levels to enablement at the operational level through people, processes and technology.

Having experience of business and technology expertise and an in-depth understanding of the government sector, SPIC has carried out studies for government entities at all levels, developed entire automated systems, and worked with diverse hardware and software technologies. SPIC thus accumulated a rich fund of experience in areas ranging from perspective planning, restructuring and institutional strengthening to development of information systems and technology plans (ISTPs), and application development and implementation.Our business proposition is all about depth. Our collaboration framework guiding execution of that business proposition, and the way clients respond, makes it quite unique. We provide the compulsory qualities of Cost effectiveness, Technical expertise, offshore delivery, and Quality. From concept to finish - SPIC goes all the extra miles needed to enable clients to reach their goals.

1.1.2 Advantages of SPICSPIC places a great deal of emphasis on value creation which has led us to strive to be in step with clients, build trust-based relationships and continuously anticipate their business needs. This had led SPIC to create a knowledge capital culminating meaningful experiences, understanding of pertinent industry issues and challenges, providing us with better levers to guide client pursuits in solving real business problems. SPIC enjoys exceptional client satisfaction and very high levels of repeat business, resulting in trust-based partnerships. Our collaboration model and flexible ways of doing business, helps us accommodate rapidly changing business needs of our clients. It's why clients that start with us usually stay with us for the long term. 1.1.3 ServicesSPIC offers the following services:

Business services:1. IT strategy formulation.1. IT architecture and planning. 1. IT process review and planning. 1. Application design and development. 1. Application maintenance and support. 1. Leveraging IT for e-governance. 1. Portal development. 1. Institutional development strategy study. 1. Feasibility study.

We also offer special services that aid governments to be more transparent and responsive in their functioning. Among them are: 1. Prime architect (strategy formulation, IT blueprint, IT architecture, implementation of roadmaps, and information systems and technology planning) 1. Advisory services (Organizational restructuring, business process re-engineering, marketing strategy and planning, human resource development, institutional strengthening) 1. Systems and application development (back-end computerization, web-enablement of legacy systems, development of portals and web sites, knowledge management, collaborative groupware applications) 1. System integration (We assist in the vertical and horizontal integration of governments, delivering solutions that are required by our clients, identifying the entire architecture 1.2 INTRODUCTION TO JAVAJava is the entire component has been developed using java technology. It is the product of oracle. Java has been chosen as the platform because of its feature rich nature. The java platform provides robust end to end solution for networked applications as well as a trusted standard for embedded applications. So java was a natural choice for development process.There were five primary goals in the creation of the java language:1. It should be "simple, object-oriented and familiar"1. It should be "robust and secure"1. It should be "architecture-neutral and portable"1. It should execute with "high performance"1. It should be "interpreted, threaded, and dynamic"1.2.1 LIBRARIES 1.2.1.1 java.lang: Provides classes that are fundamental to the design of the Java programming language. The most important classes are Object, which is the root of the class hierarchy, and Class, instances of which represent classes at run time. Frequently it is necessary to represent a value of primitive type as if it were an object. The wrapper classes Boolean, Character, Integer, Long, Float, and Double serve this purpose. An object of type Double, for example, contains a field whose type is double, representing that value in such a way that a reference to it can be stored in a variable of reference type. The class Math provides commonly used mathematical functions such as sine, cosine, and square root. The classes String, StringBuffer similarly provide commonly used operations on character strings. Class Throwable encompasses objects that may be thrown by the throw statement. Subclasses of Throwable represent errors and exceptions. 1.1.2.2 java.io: Provides for system input and output through data streams, serialization and the file system. Unless otherwise noted, passing a null argument to a constructor or method in any class or interface in this package will cause a NullPointerException to be thrown. 1.1.2.3 java.applet: Provides the classes necessary to create an applet and the classes an applet uses to communicate with its applet context. The applet framework involves two entities: the applet and the applet context. An applet is an embeddable window (see the Panel class) with a few extra methods that the applet context can use to initialize, start, and stop the applet. The applet context is an application that is responsible for loading and running applets. For example, the applet context could be a Web browser or an applet development environment. 1.1.2.4 java.sql: Provides the API for accessing and processing data stored in a data source (usually a relational database) using the Java programming language. This API includes a framework whereby different drivers can be installed dynamically to access different data sources. Although the JDBC API is mainly geared to passing SQL statements to a database, it provides for reading and writing data from any data source with a tabular format. The reader/writer facility, available through the javax.sql.RowSet group of interfaces, can be customized to use and update data from a spread sheet, flat file, or any other tabular data source.

1.1.2.5 java.awt: Contains all of the classes for creating user interfaces and for painting graphics and images. A user interface object such as a button or a scrollbar is called, in AWT terminology, a component. The Component class is the root of all AWT components. See Component for a detailed description of properties that all AWT components share. Some components fire events when a user interacts with the components. The AWT Event class and its subclasses are used to represent the events that AWT components can fire. See AWT Event for a description of the AWT event model. A container is a component that can contain components and other containers. A con trainer can also have a layout manager that controls the visual placement of components in the container. The AWT package contains several layout manager classes and an interface for building your own layout manager. See Container and LayoutManager for more information. 1.1.2.6 javax.swing: Provides a set of "lightweight" (all-Java language) components that, to the maximum degree possible, work the same on all platforms.

1.2.3: The basic features that make Java a powerful and popular programming language:1. Platform Independence0. The Write-Once-Run-Anywhere ideal has not been achieved (tuning for different platforms usually required), but closer than with other languages.1. Object Oriented 1. Object oriented throughout - no coding outside of class definitions, including main().1. An extensive class library available in the core language packages.1. Compiler/Interpreter Combo2. Code is compiled to bytecodes that are interpreted by a Java virtual machines (JVM) .2. This provides portability to any machine for which a virtual machine has been written. 2. The two steps of compilation and interpretation allow for extensive code checking and improved security.1. Robust3. Exception handling built-in, strong type checking (that is, all data must be declared an explicit type), local variables must be initialized. 1. Several dangerous features of C & C++ eliminated:4. No memory pointers4. No preprocessor4. Array index limit checking 1. Automatic Memory Management5. Automatic garbage collection - memory management handled by JVM.1. Security6. No memory pointers6. A program runs inside the virtual machine sandbox. 6. Array index limit checking 6. Code pathologies reduced by 3. bytecode verifier - checks classes after loading3. class loader - confines objects to unique namespaces. Prevents loading a hacked "java.lang.SecurityManager" class, for example. 3. security manager - determines what resources a class can access such as reading and writing to the local disk.1. Dynamic Binding7. The linking of data and methods to where they are located, is done at run-time. 7. New classes can be loaded while a program is running. Linking is done on the fly.7. Even if libraries are recompiled, there is no need to recompile code that uses classes in those libraries.

This differs from C++, which uses static binding. This can result in fragile classes for cases where linked code is changed and memory pointers then point to the wrong addresses.1. Good Performance8. Interpretation of byte codes slowed performance in early versions, but advanced virtual machines with adaptive and just-in-time compilation and other techniques now typically provide performance up to 50% to 100% the speed of C++ programs. 1. Threading9. Lightweight processes, called threads, can easily be spun off to perform multiprocessing. 9. Can take advantage of multiprocessors where available9. Great for multimedia displays.

2. SDLC PHASES2.1 SOFTWARE DEVELOPMENT LIFE CYCLE(SDLC)

Figure 1

S/W DEVELOPMENT LIFE CYCLE:Every software development consists several phases, have certain predefined works and at the end of each phase document is prepared. This phase is based on certain Software Development Model.Software Development Model:Software engineering is a discipline that integrates process, methods, and tools for the development of computer software. To solve actual problems in an industry setting, software engineer or a team of software engineers must incorporate a development strategy that encompasses, methods, and tools. This strategy is often referred to as a process model or a software-engineering paradigm.A number of different process models for the software engineering have been proposed, each exhibiting strengths and weaknesses, but all having a series of generic phases in common. Some of the commonly used software process models are: The linear sequential model The prototyping model The RAD model The incremental model The spiral modelA particular process model for software engineering is chosen on the nature of the project and the application at hand, the methods and the tools to be used, and the controls are required.All software development can be characterized as a problem-solving loop in which four distinct stages are encountered: Status Quo Problem Definition Technical Development Solution Integration2.2 BRIEF EXPLANATION OF EACH PHASE1. FEASIBILITY STUDYIn this phase the system feasibility is checked that the system is feasible for handling operations of the project or not.2. REQUIREMENT ANALYSISIn this phase all the information is gathered which is required for developing the software. This should be done in detailed so that there is no problem in future regarding the requirement. The requirements gathering process is intensified and focused specifically on software. To understand the nature of the program(s) to be built, the software engineer (analyst) must understand the information domain for the software, as well as required function, behavior, performance, and interfacing. Requirements for the both the system and the software are documented and reviewed with the customer.3. DESIGNDesigning of actual software is done in this phase. It includes physical as well as external designing. Designing can be done using top down or by using bottom up approach.Software design is actually a multi-step process that focuses on four distinct attributes of a program: data structures, software architecture, interface representations, and procedural (algorithm) detail. The design process translates requirement into a representation of the software that can be assessed for quality before code generation begins. 4. CODINGCoding of the software is done in this phase. Designed software is coded into machine understandable form using different languages. The design must be translated in to a machine-readable form. The testing process focuses on the logical internals of the software, assuring that all statements have been tested and on the functional externals that is, conducting tests to uncover errors and ensure that defined inputs will produce actual results that agree with required results.5. TESTINGThe software developed is tested in case there is some error in the actual software, than what was required. This testing can be done by programmer itself or by some in-house department or by third party testers. This phase is very important and is done in different steps. Effective testing contributes to delivery of higher quality software product, more satisfied users, lower maintenance cost and more accurate and reliable results. 6. IMPLEMENTATIONThe software is now ready to run. The software and other applications required by the software are loaded in the computer. The users that are going to use the software are given the necessary training for the better use of software. Once code has been generated, program testing begins. The testing process focuses on the logical internals of the software, assuring that all statements have been tested and on the functional externals that is, conducting tests to uncover errors and ensure that defined inputs will produce actual results that agree with required results

7. MAINTENANCEThe software should be checked timely for this better performance in future. Its maintenance should be done timely. In case the user wants some modifications, it should be done with minimum time and cost. Software will undoubtedly undergo change after it is delivered to the customer (A possible exception is embedded software).Change will occur because errors have been encountered, because the software must be adapted to accommodate change in its external environment (e.g. A change required because of a new operating system or peripheral device), or because the customer requires functional or performance enhancements.

2.3 FEASIBILITY STUDY:- INTRODUCTION:- Feasibility is the measure of how beneficial or practical the development of the system will be to the organization. It is a preliminary survey for the systems investigation. It aims to provide information to facilitate a later in-depth investigation. The report produced at the end of the feasibility study contains suggestions and reasoned arguments to help management decide whether to commit further resources to the proposed project. Within the scheduled duration we were assigned to study both the positive and negative aspects of the current manual system, in which we have come up with a number of drawbacks that prevent the progress of the clinic if it is continued to function manually. Having gone through all measures of feasibility we report to the management to figure out if the objectives of the new system are met. For e.g.: Is the system within the budget allowed for it? Will the organizations needs, be met by the new proposed system as originally envisaged? TYPES OF FEASIBILITY:There are various measures of feasibility that helps to decide whether a particular project is feasible or not. These measures include: Technical Feasibility Operational Feasibility Economical FeasibilityEach of these types will be explained in detail throughout the project report.1. Technical FeasibilityBased on the outline design of system requirements in terms of inputs, outputs, files, procedures and staff, the technical issues raised during technical feasibility include: Does the necessary technology exist to do what is proposed? Does the proposed equipment have the technical capacity to hold the data required to use in the new system? Adequate responses provided by the proposed system? Is the system flexible enough to facilitate expansion? Is there any technical guarantee of accuracy, reliability, ease of access and data security?

2. OPERATIONAL FEASIBILITY:-A system often fails if it does not fit within existing operations and if users resist the change.Important issues a systems developer must look into are: Will the new system be used if implemented in an organization? Are there major barriers to implementation or is proposed system accepted without destructive resistance?If we are considering the performance and response time for each task, it is very much faster since there is less paper work to be completed. When entering data into the system to relieve the user from additional work and typing incorrect data, the system provides options such as combo boxes, check boxes, option buttons and etc. if the users type in incorrect data they would be informed immediately about the error by the error detection control. The new system is more user-friendly, which enables the end-user to complete his/her work efficiently and accurately with interest. After taking the above fact into consideration we can state the operating of the proposed system within the organization is feasible.

3. ECONOMICAL FEASIBILITY:-The proposed system must be justifiable in terms of cost and benefit, to ensure that the investment in a new/changed system provide a reasonable return. Even though finding out the costs of the proposed project is difficult we assume and estimate the costs and benefits as follows.According to the computerized system we propose, the costs can be broken down to two categories:1. Costs associated with the development of the system.1. Costs associated with operating the system.

The Prototyping Model is a systems development method (SDM) in which a prototype (an early approximation of a final system or product) is built, tested, and then reworked as necessary until an acceptable prototype is finally achieved from which the complete system or product can now be developed. This model works best in scenarios where not all of the project requirements are known in detail ahead of time. It is an iterative, trial-and-error process that takes place between the developers and the users. There are several steps in the Prototyping Model: 1. The new system requirements are defined in as much detail as possible. This usually involves interviewing a number of users representing all the departments or aspects of the existing system.1. A preliminary design is created for the new system.1. A first prototype of the new system is constructed from the preliminary design. This is usually a scaled-down system, and represents an approximation of the characteristics of the final product.1. The users thoroughly evaluate the first prototype, noting its strengths and weaknesses, what needs to be added, and what should to be removed. The developer collects and analyzes the remarks from the users.1. The first prototype is modified, based on the comments supplied by the users, and a second prototype of the new system is constructed.1. The second prototype is evaluated in the same manner as was the first prototype.1. The preceding steps are iterated as many times as necessary, until the users are satisfied that the prototype represents the final product desired.1. The final system is constructed, based on the final prototype.1. The final system is thoroughly evaluated and tested. Routine maintenance is carried out on a continuing basis to prevent large-scale failures and to minimize downtime.

3. WORK UNDERTAKEN3.1 NETBEANSThe NetBeans Platform is a reusable framework for simplifying the development of Java Swing desktop applications. The NetBeans IDE bundle for Java SE contains what is needed to start developing NetBeans plugins and NetBeans Platform based applications.Applications can install modules dynamically. Any application can include the Update Center module to allow users of the application to download digitally-signed upgrades and new features directly into the running application. Reinstalling an upgrade or a new release does not force users to download the entire application again.

Figure 2

The platform offers reusable services common to desktop applications, allowing developers to focus on the logic specific to their application. Among the features of the platform are:1. User interface management (e.g. menus and toolbars)1. User settings management1. Storage management (saving and loading any kind of data)1. Window management1. Wizard framework (supports step-by-step dialogs)1. NetBeans Visual Library1. Integrated development toolsNetBeans IDE is a free, open-source, cross-platform IDE with built-in-support for Java Programming Language. 3.2 JDBCThe JDBC is a set of the database access classes. The very term JDBC stands for "Java database Connectivity" it was developed by Javasoft. JDBC technology is an API (application program interface) that allows visual access to any tabular data source from java programming languages by mean of some connecting software called drives. it provide cross-DBMS connectivity to wide range of SQL database JDBC allows java applets, servlets and applications to access data in famous database management system.It also provides access to other tabular data source such as spread sheets or flat files. The JDBC API allows developer to take advantage of the java platforms write once, run anywhere" capabilities for industrial strings cross platforms applications that require access to enterprise data. The JDBC API is the industry standard for data base-independent connectivitys between the java programming language and a wide range of the database. The JDBC API makes it possible to do three things - Establish a connection with a database or access tabular data source. -Send SQL statements and process the results.

3.3 HTMLHyper Text Markup Language (HTML) is a language for describing how pages of text, graphics and other information are organized, formatted and linked together. It is not really a programming language in the sense of COBOL or Visual Basic, but it does provide powerful capabilities for text formatting and output display. The original purpose of HTML was primarily as a tool for making text documents readily available on the Internet. HTML provides the necessary nuts and bolts for building web pages. It was developed specifically for the use on the system of links, which can be non-sequential in order. It is not a programming language. It is a markup language used for linking one piece of information to another. Using a markup language means that tags can be added to the words in the document and web enable them. A tag is a set of descriptive formatting codes used in HTML document that instructs a web browser how to display text and graphics on a web page. HTML 2.0 is the first standard of HTML specification, released in 1996. HTML 3.6 was the next specification to be developed. It was a joint effort of many software companies like Microsoft, IBM, Sun Microsystems, Novell and others. HTML 4.0 is the latest version of HTML, which includes CSS and dynamic HTML features.There are three general categories of electronic markup:

1. Presentational markup: It is used by traditional word-processing systems, binary codes embedded in document text that produced the WYSIWYG (What You See Is What You Get) effect.1. Procedural markup: It is embedded in text and provides instructions for programs that are to process the text. Well-known examples include troff, LaTeX and PostScript.1. Descriptive markup: It is used to label parts of the document rather than t provide specific instructions as to how they should be processed. The objective is to decouple the inhernt structure of the document from any particular treatment or rendition of it. Such a markup is often described as semantic.

Hyper Text Markup Language (HTML) is the main markup language for creating web pages and other information that can be displayed in a web browser.HTML is written in the form of HTML elements consisting of tags enclosed in angle brackets (like ), within the web page content. HTML tags most commonly come in pairs like and , although some tags represent empty elements and so are unpaired, for example . The first tag in a pair is the start tag, and the second tag is the end tag (they are also called opening tags and closing tags). In between these tags web designers can add text, further tags, comments and other types of text-based content.The purpose of a web browser is to read HTML documents and compose them into visible or audible web pages. The following is an example of the classic Hello world program, a common test employed for comparing programming languages, scripting languages and markup languages. This example is made using 9 lines of code:

This is a title

Hello world!

ElementsHTML documents are composed entirely of HTML elements that, in their most general form have three components: a pair of tags, a "start tag" and "end tag"; some attributes within the start tag; and finally, any textual and graphical content between the start and end tags, perhaps including other nested elements. The HTML element is everything between and including the start and end tags. Each tag is enclosed in angle brackets.The general form of an HTML element is therefore: content. Some HTML elements are defined as empty elements and take the form . tag.

3.4 CSS (Cascade Style Sheet) CSS is used to control the style and layout of multiple Web pages all at once. With CSS, all formatting can be removed from the HTML document and stored in a separate file. CSS gives you total control of the layout, without messing up the document content.Using Styles: When a browser reads a style sheet, it will format the document according to it. There are three ways of inserting a style sheet:

3.4.1 External Style Sheet: An external style sheet is ideal when the style is applied to many pages. With an external style sheet, you can change the look of an entire Web site by changing one file. Each page must link to the style sheet using the tag. The tag goes inside the head section.

3.4.2 Internal Style Sheet : An internal style sheet should be used when a single document has a unique style. You define internal styles in the head section with the tag.

body {background-color: red}

p {margin-left: 20px}

3.4.3 Inline Styles : An inline style should be used when a unique style is to be applied to a single occurrence of an element.To use inline styles you use the style attribute in the relevant tag. The style attribute can contain any CSS property. The example shows how to change the color and the left margin of a paragraph :This is a paragraph

To learn more about styles, visit our CSS tutorial.Style TagsTagDescriptionDefines a style definitionDefines a resource referenceDefines a section in a documentDefines a section in a documentDeprecated. Use styles insteadDeprecated. Use styles insteadDeprecated. Use styles instead

LIST OF MARKUP LANGUAGES:There are more than 98 markup languages. All of them are listed below:0. Application Markup Language (AML)0. Architecture Description Markup Language (ADML)0. Artificial Intelligence Markup Language (AIML)0. ASN.1 Markup Language (AML)0. Astronomical Instrument Markup Language (AIML)0. Automatic Site Markup Language (ASML)0. Bean Markup Language (BML)0. Better Markup Language (BML)0. Bibliography Markup Language (BibML)0. Bioinformatics Sequence Markup Language (BSML)0. BIOpolymer Markup Language (BIOML)0. Board Game Markup Language (BGML)0. Business Rules Markup Language (BRML)0. Comics Markup Language (ComicsML)0. Chemical Markup Language (CML)0. Claris Dynamic Markup Language (CDML)0. DARPA Agent Markup Language (DAML)0. Description Logic Markup Language (DLML)0. Directory Services Markup Language (DSML)0. Document Template Markup Language (DTML)

3.5 JAVASCRIPTJavaScript is used in Web pages to add functionality, validate forms, communicate with theserver, and much more. A scripting language is a lightweight programming language. JavaScript is programming code that can be inserted into HTML pages.

Tag:To insert a JavaScript into an HTML page, use the tag. The and tells where the JavaScript starts and ends. The lines between the and contain the JavaScript.Example:

document.write (Hello World);

Location For Javascript Code:There are three general areas that JavaScript can be placed for use in a webpage.1. Inside the head tag.1. Within the body tag of the document.1. In an External file.

3.5.1 EXTERNAL JAVASCRIPTS: Scripts can also be placed in external files. External files often contain code to be used by several different web pages. External JavaScript files have the file extension .js. To use an external script, point to the .js file in the "src" attribute of the tag.Example:< script src =script1.js >

Manipulating JavaScript Elements:To access an HTML element from JavaScript, you can use the document.getElementById(id)method. Use the "id" attribute to identify the HTML element:

Comments in JavaScript: Comments will not be executed by JavaScript. Comments can be added to explain theJavaScript, or to make the code more readable. Single line comments start with //..3.5.2 EVENTS IN JAVASCRIPT: Events are signals generated when specific actions occur. JavaScript is aware of these signals, and scripts can be built to react to these events.There are several events in JavaScript like:1. Page Events1. Form Events1. Keyboard Events1. Mouse Events

3.6 SQL SQL Structured Query Language is a special-purpose programming language designed for managing data held in a relational database management system (RDBMS).Originally based upon relational algebra and tuple relational calculus, SQL consists of a data definition language and a data manipulation language. The scope of SQL includes data insert, query, update and delete, schema creation and modification, and data access control. Although SQL is often described as, and to a great extent is, a declarative language (4GL), it also includes procedural elements.SQL was one of the first commercial languages for Edgar F. Codd's relational model, as described in his influential 1970 paper "A Relational Model of Data for Large Shared Data Banks".Despite not entirely adhering to the relational model as described by Codd, it became the most widely used database language. SQL became a standard of the American National Standards Institute (ANSI) in 1986, and of the International Organization for Standards (ISO) in 1987. Since then, the standard has been enhanced several times with added features. Despite these standards, code is not completely portable among different database systems, which can lead to vendor lock-in. The different makers do not perfectly adhere to the standard, for instance by adding extensions, and the standard itself is sometimes ambiguous.SQL stands for structured query language, better known as "sequel". It is used for:1) Querying a database by editing the SQL statement2) Querying a database with a program.3) Defining the data organization.4) Administrating data.5) Accessing multiple data server.6) Managing transaction. 3.6.1 QUERIES: These are used to retrieve the data based on specific criteria. This is the most important element of sql.CREATE: create creates an object (a table) in the database.Syntax: create table tablename (column1 datatype1 (size), column2 datatype2 (size),.);

INSERT: insert adds rows (formally tuples) to an existing table, e.g.:Syntax: insert into tablename (column1, column2,.) values(value1,value2,.);DELETE: delete removes existing rows from a table.Syntax: delete tablename where condition;

SELECT: Select retrieves data from one or more tables, or expressions.Syntax: select * from tablename;3.7 SERVER-SIDE VS CLIENT-SIDE SCRIPTINGSimply put there are two distinct operations involved in displaying any web page to the visitor the first being server side operations and the second client side operations.Server Side OperationsServer side operations are concerned with the sending of the web page data from the server to the web page visitors browser. In the case of Static Web Pages the data is simply served immediately upon request for the data from the visitors browser. If the requested page is a Dynamic Web Page then any pre processing of the page is carried out and the output is then served to the visitor.PHP and ASP(vbscript) are server side scripting languages that are used to pre process pages and output HTML before the page is sent to the visitor. HTML is the language that the browser understands that tells it how to display the page.Client Side OperationsClient side operations are performed on the visitors computer by the users Internet browser to display the web page as the data is received from the server.HTML is interpreted as it is read by the browser resulting in the display of the web page within the browser. Once the page has loaded HTML cannot be reprocessed without refreshing the page.The visitors experience on the web page can however be enhanced by means of a client side scripting language, typically Javascript used in conjunction with dynamic html and cascading style sheets, which enable interactive menu systems, hi-lighting effects, image effects, data manipulation and many other actions to be performed on the page without reloading or refreshing the page.Suppose you wanted to display the current time on a web page. You have a number of options, you have the choice of displaying the current time according to the web server or the current time according to the visitors computer.If you want to use the server time then server side pre processing will be required to determine the current time on the server and write it to the output in html format before the page is sent to the visitor.To use the visitors local time, the current time on the visitors computer is used to determine the time and display it on the page. Since Javascript is running on the client side the time can be updated and displayed in real time on the page without having to reload or refresh the page.This is not possible with server side scripting as the page needs to be re processed on the server to determine and output the new time and re send to the visitor in order for the new time to be displayed.The server time could of course be written to the page as a Javascript variable which Javascript could then use to set a local page time variable which could then be used to keep time. However one must bear in mind that time would elapse between the server creating and writing output for the Javascript time variable and Javascript actually reading in the variable upon page loading. Also one must remember that the updating of the clock would still be performed as a client side Javascript operation.Whether you choose to display the local time on the server side or client side or any of the standard times such as GMT, PST, EST is irrelevant as both server and client operations use the respective local time and the time zone where the server or client is located to determine the time in the aforementioned standard times.Although primarily a client side scripting language, Javascript does offer some server side functionality however server side scripting languages such as PHP and ASP are generally far better suited to performing server side operations.

3.8 CLIENT-SIDE SCRIPTING VS SERVER-SIDE SCRIPTINGClient-side scripting generally refers to the class of computer programs on the web that are executedclient-side, by the user's web browser, instead of server-side (on the web server). This type of computer programming is an important part of the Dynamic HTML (DHTML) concept, enabling web pages to be scripted; that is, to have different and changing content depending on user input, environmental conditions (such as the time of day), or other variables.Client-side scripts are often embedded within an HTML or XHTML document (hence known as an "embedded script"), but they may also be contained in a separate file, to which the document (or documents) that use it make reference (hence known as an "external script"). Upon request, the necessary files are sent to the user's computer by the web server (or servers) on which they reside. The user's web browserexecutes the script, then displays the document, including any visible output from the script. Client-side scripts may also contain instructions for the browser to follow in response to certain user actions, (e.g., clicking a button). Often, these instructions can be followed without further communication with the server.By viewing the file that contains the script, users may be able to see its source code. Many web authors learn how to write client-side scripts partly by examining the source code for other authors' scripts.In contrast, server-side scripts, written in languages such as Perl, PHP, ASP.NET, Java, and server-side VBScript, are executed by the web server when the user requests a document. They produce output in a format understandable by web browsers (usually HTML), which is then sent to the user's computer. The user cannot see the script's source code (unless the author publishes the code separately), and may not even be aware that a script was executed. Documents produced by server-side scripts may, in turn, contain client-side scripts.Server-side scripts require that their language's interpreter be installed on the server, and produce the same output regardless of the client's browser, operating system, or other system details. Client-side scripts do not require additional software on the server (making them popular with authors who lack administrative access to their servers); however, they do require that the user's web browser understands the scripting language in which they are written. It is therefore impractical for an author to write scripts in a language that is not supported by popular web browsers.Due to security restrictions, client-side scripts may not be allowed to access the user's computer beyond the web browser application. Techniques like ActiveX controls can be used to sidestep this restriction.Client-side scripting is not inherently unsafe. Users are encouraged to always keep their web browsers up-to-date to avoid exposing their computer and data to vulnerabilities that are discovered.The latest group of web browsers and web pages tend to employ a heavy amount of client-side scripting, accounting for an improved user interface in which the user does not experience the unfriendly "refreshing" of the web page, but instead sees perhaps an animated GIF file indicating that the request occurred and the page will be updated shortly. Ajax is an important addition to the JavaScript language, allowing web developers to communicate with the web server in the background without requiring a completely new version of the page to be requested and rendered. This leads to a much improved user experience in general.Unfortunately, even languages that are supported by a wide variety of browsers may not be implemented in precisely the same way across all browsers and operating systems. Authors are well-advised to review the behavior of their client-side scripts on a variety of platforms before they put them into use. 4. PROJECT UNDERTAKEN

4.1 PROBLEM DEFINITION Our project is initiated to reduce anxiety for both students and parent as choosing a right career and a best guidance is not an easy task .Our project provides career counselling guidance for the students who wish to search their career.4.2 PROJECT DESCRIPTION Every student is unique, and so are their college planning needs. College planning can be stressful at times, and that it should strive to reduce anxiety for both students and parent.Today, education is very much compulsory to build a good career. Students are used to wandering here and there for right career and best guidance. Here we provide career counselling guidance for the students who wish to search their career .Modules:1. Administrator module1. User module4.3 DRAWBACKS OF EXISTING SYSTEM:-1. Data redundancy and formatting: The various files are likely to have different formats and therefore lead to redundancy and inconsistency.a) Maintaining registers is costly: Traditionally documents have been stored in batches and they field in file cabinets and boxes. A numerical system is they assigned. Specifically a consumer number assigned to organize the files.b) Error prone: Existing systems are error prone, since manual work is required. More time is consumed and errors may propagate due to human mistakes.c) Low security feature: Due to maintenance's of records manually and shared and could view easily by anyone. Also these could be possible lose of data and confidential information due to some disaster in the form of fire, theft etc.

4.4 VARIOUS MENUS & STAGES OF DEVELOPMENT:- 1. PROBLEM DEFINITION1 SYSTEM REQUIREMENTS2 FEASIBILITY STUDY3 ANALYSIS4 DESIGN5 IMPLEMENTATION6 POST IMPLEMENTATION7 MAINTAINANCE

4.5 SYSTEM ANALYSIS & DESIGN:-System development, a process consisting of the two major steps of systems analysis and design, starts when management or sometimes system development personnel feel that a new system or an improvement in the existing system is required. The systems development life cycle is classically, thought of as the set of activities that analysts, designers and users carry out to develop and implement an information system.

4.6 FUTURE ENHANCEMENTS:-In the software development process the implementation stage is not the last stage and the development process. As the time progresses user requirements increases and at one time the current software seems unable to cope up with them. Hence regular updating of the software is needed.4.7 ADVANTAGES OF PROJECT:1. It facilitates paper free work.1. It provides instant information.1. It opens an account very easily.1. It replaces all required files and registers.1. It is very easy to run.1. It is free of cost after installation.1. It can store records of thousands of files as long as we want to store.1. It can easily update.1. It is time saving project.

4.8 REQUIREMENTS 4.8.1 SOFTWARE REQUIREMENTS1. The platform used for this project is Windows 7.1. NetBeans 7.3 is used to run JAVA code and execute database queries.1. Database used in the project is SQL server.1. Technologies used are JAVA, CSS, HTML, JAVASCRIPT.1. JDBS,JDK Required.1. Browser.4.8.2 HARDWARE REQUIREMENTS1. PC with Core2 Duo Processor1. Window 7/XP1. 1GB RAM1. Minimum 80GB hard disk space.4.8.3 ENVIRONMENT TO BE USED1. JAVA (As Front End)1. SQL (As Back End)1. Connectivity ( SQL Connection)

5. STRUCTURE DESIGNING5.1 Introduction:Software design sits at the technical kernel of the software engineering process and is applied regardless of the development paradigm and area of application. Design is the first step in the development phase for any engineered product or system. The designers goal is to produce a model or representation of an entity that will later be built. Beginning, once system requirement have been specified and analyzed, system design is the first of the three technical activities -design, code and test that is required to build and verify software. The importance can be stated with a single word Quality. Design is the place where quality is fostered in software development. Design provides us with representations of software that can assess for quality. Design is the only way that we can accurately translate a customers view into a finished software product or system. Software design serves as a foundation for all the software engineering steps that follow. Without a strong design we risk building an unstable system one that will be difficult to test, one whose quality cannot be assessed until the last stage.During design, progressive refinement of data structure, program structure, and procedural details are developed reviewed and documented. System design can be viewed from either technical or project management perspective. From the technical point of view, design is comprised of four activities architectural design, data structure design, interface design and procedural design.

NormalizationIt is a process of converting a relation to a standard form. The process is used to handle the problems that can arise due to data redundancy i.e. repetition of data in the database, maintain data integrity as well as handling problems that can arise due to insertion, updation, deletion anomalies. Decomposing is the process of splitting relations into multiple relations to eliminate anomalies and maintain anomalies and maintain data integrity. To do this we use normal forms or rules for structuring relation.

Insertion anomaly: Inability to add data to the database due to absence of other data.Deletion anomaly: Unintended loss of data due to deletion of other data.Update anomaly: Data inconsistency resulting from data redundancy and partial updateNormal Forms: These are the rules for structuring relations that eliminate anomalies.

FIRST NORMAL FORM:A relation is said to be in first normal form if the values in the relation are atomic for every attribute in the relation. By this we mean simply that no attribute value can be a set of values or, as it is sometimes expressed, a repeating group.SECOND NORMAL FORM:A relation is said to be in second Normal form is it is in first normal form and it should satisfy any one of the following rules.1. Primary key is a not a composite primary key1. No non key attributes are present1. Every non key attribute is fully functionally dependent on full set of primary key.

THIRD NORMAL FORM:A relation is said to be in third normal form if their exits no transitive dependencies.

5.2 DATA FLOW DIAGRAMA data flow diagram is graphical tool used to describe and analyze movement of data through a system. These are the central tool and the basis from which the other components are developed. The transformation of data from input to output, through processed, may be described logically and independently of physical components associated with the system. These are known as the logical data flow diagrams. The physical data flow diagrams show the actual implements and movement of data between people, departments and workstations. A full description of a system actually consists of a set of data flow diagrams. Using two familiar notations Yourdon, Gane and Sarson notation develops the data flow diagrams. Each component in a DFD is labeled with a descriptive name. Process is further identified with a number that will be used for identification purpose. The development of DFDS is done in several levels. Each process in lower level diagrams can be broken down into a more detailed DFD in the next level. The lop-level diagram is often called context diagram. It consists a single process bit, which plays vital role in studying the current system. The process in the context level diagram is exploded into other process at the first level DFD.The idea behind the explosion of a process into more process is that understanding at one level of detail is exploded into greater detail at the next level. This is done until further explosion is necessary and an adequate amount of detail is described for analyst to understand the process.Larry Constantine first developed the DFD as a way of expressing system requirements in a graphical from, this lead to the modular design. A DFD is also known as a bubble Chart has the purpose of clarifying system requirements and identifying major transformations that will become programs in system design. So it is the starting point of the design to the lowest level of detail. A DFD consists of a series of bubbles joined by data flows in the system.DFD SYMBOLS:In the DFD, there are four symbols1. A square defines a source(originator) or destination of system data1. An arrow identifies data flow. It is the pipeline through which the information flows1. A circle or a bubble represents a process that transforms incoming data flow into outgoing data flows.1. An open rectangle is a data store, data at rest or a temporary repository of data

CONSTRUCTING A DFD:Several rules of thumb are used in drawing DFDS: 1. Process should be named and numbered for an easy reference. Each name should be representative of the process.1. The direction of flow is from top to bottom and from left to right. Data traditionally flow from source to the destination although they may flow back to the source. One way to indicate this is to draw long flow line back to a source. An alternative way is to repeat the source symbol as a destination. Since it is used more than once in the DFD it is marked with a short diagonal.1. When a process is exploded into lower level details, they are numbered.1. The names of data stores and destinations are written in capital letters. Process and dataflow names have the first letter of each work capitalized.A DFD typically shows the minimum contents of data store. Each data store should contain all the data elements that flow in and out.Questionnaires should contain all the data elements that flow in and out. Missing interfaces redundancies and like is then accounted for often through interviews.SAILENT FEATURES OF DFDS1. The DFD shows flow of data, not of control loops and decision are controlled considerations do not appear on a DFD.1. The DFD does not indicate the time factor involved in any process whether the dataflow take place daily, weekly, monthly or yearly.1. The sequence of events is not brought out on the DFD.

TYPES OF DATA FLOW DIAGRAMS1. Current Physical1. Current Logical1. New Logical1. New Physical

DFD LEVEL 1

User Admin Login

I/P O/P

DFD LEVEL 2

Login Reg I/P (User)

O/P (Logout)

DFD LEVEL 3

University EntryCollege EntrySchool Entry I/P (Admin)

University Type Master

Admin Pages

Login

Course Master Logout

Board Master State Master City Master

5.3 ENTITY RELATIONSHIP DIAGRAM An E-R model is an abstract way of describing a database. In the case of a relational database which stores data in tables, some of the data in these tables point to data in other tables - for instance, your entry in the database could point to several entries for each of the phone numbers that are yours. The ER model would say that you are an entity, and each phone number is an entity, and the relationship between you and the phone numbers is 'has a phone number'. Diagrams created to design these entities and relationships are called entityrelationship diagrams or ER diagrams.The building blocks: entities, relationships, and attributes An entity is a fundamental thing of an organization about which data may be maintained. An entity has its own identity, which distinguish it from other entity. An entity type is the description of all entities to which a common definition and common relationship and attributes apply. For example, in our application user is in entity, whose information is to be maintained by the user. It is denoted by rectangle, name of the entity is written within them.

User

A relationship is a reason for associating two entity types. These relationships are sometimes called a binary relationship because they involve two entity types. For example, in my application an entity can have groups. It is denoted by a diamond symbol, the relationship is written within diamond symbol.

GroupsUserhas

Each entity type has an attribute associated with it. An attribute is a property or characteristics of an entity that is of interest to the organisation. Following are example of entity types and their attributes:USER: User_ID, name, type, MailID, mobileNo, Alternate_MailId.GROUP: Group_ID, name, addresses.

Database

Login Manage(User/Admin) ID & Password

Enter details Database

Enter data into respective tables

ER-Diagram 1

Contact us About us

Website

LanLan

Search University Search School

State nameUniversity TypeState nameSchool TypeBoard Type

Lan

Search College

University TypeCollege TypeState name

5.4 Flow chart: Aflowchartis a type ofdiagramthat represents analgorithmorprocess, showing the steps as boxes of various kinds, and their order by connecting them with arrows. This diagrammaticrepresentationsolution to a givenproblem. Process operations are represented in these boxes, and arrows; rather, they are implied by the sequencing of operations. Flowcharts are used in analyzing, designing, documenting or managing a process or program in various fields. Flowcharts are used in designing and documenting complex processes or programs. Like other types of diagrams, they help visualize what is going on and thereby help the viewer to understand a process, and perhaps also find flaws, bottlenecks, and other less-obvious features within it. There are many different types of flowcharts, and each type has its own repertoire of boxes and notational conventions. The two most common types of boxes in a flowchart are:1. a processing step, usually calledactivity, and denoted as a rectangular box1. a decision, usually denoted as a diamond. A flowchart is described as "cross-functional" when the page is divided into differentswim lanesdescribing the control of different organizational units. A symbol appearing in a particular "lane" is within the control of that organizational unit. This technique allows the author to locate the responsibility for performing an action or making a decision correctly, showing the responsibility of each organizational unit for different parts of a single process. Flowcharts depict certain aspects of processes and they are usually complemented by other types of diagram. For instance,Kaoru Ishikawadefined the flowchart as one of the seven basic tools of quality control, next to thehistogram,Pareto chart,check sheet,control chart,cause-and-effect diagram, and thescatter diagram. Similarly, inUML, a standard concept-modeling notation used in software development, theactivity diagram, which is a type of flowchart, is just one of many different diagram.

6. SQL TABLESTables:1. User Registration :Sr. No. :Coloum Name :Data Type :

1.Sname Varchar(50)

2.EmailVarchar(40)

3.UsernameVarchar(50)

4.PwdVarchar(50)

5.SaddressVarchar(50)

6.NumVarchar(50)

Table 12. Login :Sr. No. :Columns Name :Data Type :Constraints :

1.UseridIntPrimary key

2.UsernameVarchar(40)

3.PwdVarchar(50)

Table 2

3.Board_master :Sr. No. :Coloum Name :Data Type :Constraints :

1.Board_idintPrimary key

2.Board_nameVarchar(20)

Table 3

4.City_master:Sr. No. :Columns Name :Data Type :Constraints :

1.City_idintPrimary key

2.City_nameVarchar(40)

3.State_idint

Table 4

5.College_main :Sr. No. :Coloum Name :Data Type :Constraints :

1.cidintPrimary key

2.College_nameVarchar(30)

3.Un_idInt

4.U_typeInt

5.Course_idint

6.St_idVarchar(max)

7.Ct_idInt

8.College_addressVarchar(50)

9.PhoneBigint

10.Email_idVarchar(30)

Table 56.College type master :Sr. No. :Columns Name :Data Type :Constraints :

1.cidintPrimary key

2.TypenameVarchar(30)

Table 6

7.Course master :Sr. No. :Coloum Name :Data Type :Constraints :

1.Course_idintPrimary key

2.Course_nameVarchar(30)

Table 7

8. School_main:Sr. No. :Coloum Name :Data Type :Constraints :

1.School_idIntPrimary key

2.School_nameVarchar(50)

3.bidInt

4.Stype_idInt

5.St_idInt

6.Ct_idInt

7.School_addressVarchar(50)

8.Phone_noBigint

9.emailVarchar(30)

9. Schooltype_master:Sr. No. :Coloum Name :Data Type :Constraints :

1.Stype_idIntPrimary key

2.Stype_nameVarchar(30)

10. State_master:Sr. No. :Coloum Name :Data Type :Constraints :

1.State_idIntPrimary key

2.State_nameVarchar(40)

11. tblblog:Sr. No. :Coloum Name :Data Type :

1.BlogidInt

2.blognameVarchar(200)

3.detailsVarchar(200)

4.useridInt

12. tblblogdetail:Sr. No. :Coloum Name :Data Type :

1.AnsidInt

2.Blog_idint

3.ansVarchar(50)

4.auseridInt

13. university_main:Sr. No. :Coloum Name :Data Type :Constraints :

1.Univ_idIntPrimary key

2.Univ_nameVarchar(50)

3.U_typeInt

4.St_idInt

5.Ct_idInt

6.Univ_addressVarchar(50)

7.PhoneBigint

8.Email_idVarchar(30)

14. universitytype_master:Sr. No. :Coloum Name :Data Type :Constraints :

1.UidIntPrimary key

2.typenameVarchar(30)

7. SNAPSHOTSHome page

Figure 3-4

Registration form:

Figure 8

College search

Figure 9

Figure 10College details:

Figure 11

University Search:-Search university by-

Figure 12University type:Figure 13

Uniiversity name:

Figure 14University details:

Figure 15

School Search:Search school by:

Figure 16

School name:

Figure 17

Figure 18School details:

Figure 19

About Us:

Figure 20Admin Login:

Figure 21

Figure 22

Figure 23

Engineering:

Figure 24Medical:

Figure 25

Commerce:

Figure 26Arts:

Figure 27

Blogs:

Figure 28

Figure 29

Terms and Conditions:

Figure 30

Privacy Policy:

Figure 31Why us:

Figure 32FAQs:

Figure 33

Contact us:

Figure 34Gallery:

Figure 35

Database Snapshot:State master:

Figure 36School main:

Figure 37

City master:

Figure 38

Diagram:

Figure 39

8. Testing StrategyTo uncover the errors of the modules of my project I used the testing strategies such as UnitTesting, Integration Testing, Validation Testing, System Testing, Alpha Testing and Beta Testing.8.1 Unit TestingUnit testing focuses verification efforts on the smallest unit of software design- the software component or module. Using the component-level design description as a guide, important control paths are tested to uncover errors within the boundary of the module.The unit testing is White Box oriented and the step can be conducted in parallel for multiple components.

Unit Test ConsiderationsThe module interface is tested to ensure that information properly flows into and out of the program unit under test. The local data structure is examined to ensure that data stored temporarily maintain its integrity during all steps in an algorithms execution. Boundary conditions are tested to ensure that the module operates properly at boundaries established to limit or restrict processing. All independent paths through the control structure are exercised to ensure that all statements in a module have been executed at least once. And finally, all error handling paths are tested.

Unit Test ProceduresUnit testing is normally considered an adjunct to the coding step. After source level code has been developed, reviewed and verified for correspondence to component level design, unit testing case design begins. Because a component is not a stand-alone program, driver or stub software must be developed for each unit test. Driver is nothing but a main program that accepts test case data, passes such data to the component and prints relevant results. Stubs serve to replace module that are subordinate the component to be tested. Drivers and Stubs represent overhead. That is, both are software that must be written but that is not delivered with the final software product. If drivers and stubs are dept simple, actual overhead is relatively low.

8.2 Integration Testing:The integration testing for the software is very important if it contains number of module. As stated above, my software contains four modules. The errors may occur after integration of each module. It is the testing of the interface among system modules. I faced lots of problem during this testing. I used bottom-up approach to integrate the modules. 8.3 System TestingAfter completion of Integration testing, I used system testing to test my system. The purpose of unit testing is to determine that each independent module is correctly implemented. This gives little chance to determine that the interface between modules is also correct, and for this reason system testing must be performed. System testing aims at evaluating a product in terms of the expectation of the client; not with respect to a specifications or a standard.Alpha TestingThe alpha test is conducted at the developer site (i.e. me) in the presence of the customer. The software is used in a natural setting by all errors and me and usage problems are recorded for maintenance. This test is conducted in a controlled environment to uncover errors.Beta TestingThe beta test is conducted by the end-users of the software. Therefore the beta test is a live application of the software in an environment that cannot control by the developer. They recorded all the problems that are encountered during their testing and reported these problems to me. As a result of problems reported during beta tests, I made modifications leading to completion of my software project.

0. Testing Techniques Used:

White Box TestingThe supporting arguments that help me to decide, to choose this testing technique are as:0. My project contains lots of paths in every module. This testing guarantee that all independent paths within a module have been executed al least once.0. My project contains lots of logical decisions. This testing exercises all logical decisions on their true and false side.0. My project also contains loops. The testing is done to execute all loops at their boundaries and their operational bounds.0. At last I tested internal data structures to ensure their validity.

Black Box TestingThis testing focuses on the functional requirements of the software. Black-Box testing enables me to drive sets of input conditions that will fully exercise all functional requirements for software. The reasons that force me to do this test are given bellow:0. In this software there are lots of functions. I had checked incorrect or missing functions.0. The software contains four modules and each interface with each other. To check the interface errors, I had used this technique.0. The software is developed for the intranet. The data are stored on the remote machine and one should have to access the external database.0. The software totally based on the intranet, the performance errors must be test. To test this I had used this technique.

8.5 Debugging:Debugging occurs as a sequence of successful testing. That is, when a test case uncovers error, debugging can and should be orderly process; it is still much an art.The debugging process will always have one of the two outcomes:0. The cause will be found, corrected, removed or0. The cause will be found.The software was tested vigorously before implementation and when error was found they were corrected and removed.

1. Experience throughout TrainingTraining is given on four basic grounds:1. New candidates who join an organization are given training. This training familiarize them with the organizational mission, vision, rules and regulations and the working conditions. 1. The existing employees are trained to refresh and enhance their knowledge. 1. If any updations and amendments take place in technology, training is given to cope up with those changes. For instance, purchasing new equipment, changes in technique of production, computer implantment. The employees are trained about use of new equipments and work methods. 1. When promotion and career growth becomes important. Training is given so that employees are prepared to share the responsibilities of the higher level job. The benefits of training can be summed up as:1. Improves morale of employees- Training helps the employee to get job security and job satisfaction. The more satisfied the employee is and the greater is his morale, the more he will contribute to organizational success and the lesser will be employee absenteeism and turnover. 1. Less supervision- A well trained employee will be well acquainted with the job and will need less of supervision. Thus, there will be less wastage of time and efforts. 1. Fewer accidents- Errors are likely to occur if the employees lack knowledge and skills required for doing a particular job. The more trained an employee is, the less are the chances of committing accidents and any kind of data loss in job and the more proficient the employee becomes. 1. Chances of promotion- Employees acquire skills and efficiency during training. They become more eligible for promotion. They become an asset for the organization.

10. Future scope and Applications Education seekers get a personalised experience on our site, based on educational background and career interest, enabling them to make well informed course and college decisions. The decision making is empowered with easy access to detailed information on career choices, courses and colleges. Taking students further : All the way to the course & college of their choice.

11. CONCLUSIONWhat value I have added to my knowledge?Domain experienceSPIC Microsoft center is the company who had increased my knowledge and made me capable oftaking responsibilities individually. I have learnt a lot in SPIC.Exposure to entirely different technologyWorking on java was an enriching experience. I had never worked on this platform earlier. So, itadded to my list of knowledge.Database implementationI have made database earlier but worked on sqlsever for the first time. I have learnt many newconcepts about database creation, stored procedure etc. I have learnt many things theoretically as apart of our curriculum but here i got a chance to apply my knowledge practically and enhance italso at the same time.

12. BIBLIOGRAPHY

The following books are being used to fulfill the requirements of proposed project and are helpful in understanding, development and the maintenance of the project.1. Software Engineering Roger S. Pressman1. Java K.A Mugal1. Database Concepts Sumita Arora, Henry F.korth 1. Structured Query Language Ivas Bayros1. Java Complete Reference Tata McGrawHill 1. Fundamentals of database systems Elmasri Navathe

REFERENCES1. www.java.sun.com1. www.wikipedia.com1. www.stackoverflow.com1. http://www.tutorialspoint.com/java