






















































Study with the several resources on Docsity
Earn points by helping other students or get them with a premium plan
Prepare for your exams
Study with the several resources on Docsity
Earn points to download
Earn points by helping other students or get them with a premium plan
Community
Ask the community for help and clear up your study doubts
Discover the best universities in your country according to Docsity users
Free resources
Download our free guides on studying techniques, anxiety management strategies, and thesis advice from Docsity tutors
mini project for final year bca students of tiruvalluvar universitty
Typology: Study Guides, Projects, Research
1 / 62
This page cannot be seen from the preview
Don't miss anything!
Budget analysis is a useful web application that helps all sorts of business firms. The main strategy of the project is to automate the excel data and calculations into RDBMS to make data retrieval and manipulations easier. The application is done using ASP.Net and we have used SQL Server as the back end to make it more powerful. The main features of budget analysis are:
The selection of hardware is very important in the existence and proper working of any software. When selecting hardware, the size and requirements are also important.
Processor : Pentium II class, 450MHz RAM : 128MB Hard Disk Drive : 3GB Video : 800X600, 256 colors CD-ROM : Required
Processor : INTEL Pentium 4 RAM : 512MB Hard Disk Drive : 40GB Key Board : Standard 101/102 or Digi Sync Family Monitor : Display Panel (1024 X 764) Display Adapter : Trident Super VGA Network Adapter : SMC Ethernet Card Elite 16 Ultra Mouse : Logitech Serial Mouse
Operating System : Windows XP Front- End : C#. NET with ASP. NET Back- End : MS SQL SERVER 2005 EXPRESS
Sristhi Systems is a Software and Web Development Company which provides technology solutions and professional software for clients worldwide. Srishti focus on quality, innovations and leverage deep industry and functional expertise to help customers to transform their highest value business processes. Our in-depth technical knowledge coupled with industry experience and the unique methodology enables us to successfully deliver the services to the clients worldwide. We are driven to attain our customer’s highest satisfaction by providing business experts with underlying delivery expertise in Enterprise Technology, Methodologies and Implementations. Our core competencies are designed to effectively deliver results to our customers. Sristhi Training Center provides premier instructor-led IT training through a carefully balanced blend of hands-on lab exercises and lecture. Training is conducted in the comfortable classrooms at our training facility and client locations. Experienced instructors make training productive and enjoyable. Customizable courses and computer lab offer additional options fro your training needs. We also provide project guidance for all academic students which help them to build a successful portfolio and start their IT journey successfully.
Microsoft Visual Studio is Microsoft’s flagship software development product for computer programmers. It centers on an integrated distribution environment which has programmers create stand alone, and web services that run on any platforms supported by Microsoft’s .Net Framework (for all versions after 6). Supported platforms include Microsoft windows, servers and workstations, Pocket PC, Smart Phones and World Wide Web browsers not the Java Virtual Machine that all other java tools target.
The most important language added in this version was the introduction of generics, which are similar in many aspects to C++ templates. This potentially increases the number of bugs caught at compile- time instead of run- time by encouraging the use of strict type checking in areas where it was not possible before, C++ also got a similar upgrade with the addition of C+ +/CLI which is slated to replace the use of Managed C++. Other new features of Visual Studio 2005 include the “Development Designer” which allows application designs to be validated before deployments, an improved environment for web publishing when combined with ASP.NET 2.0 and load testing to see application performance under various sorts of user loads. Visual Studio 2005 also added extensive 64- bit support. While the development environment itself only available as a 32- bit application, visual C++ 2005 supports compiling for (x64AMD64 and EM64T) as well as IA- 64 (Itanium). The platforms SDK include 64- bit and 64-bit versions of the libraries.
The .NET framework is an integral windows component that supports building and running the next generation of applications and XML web services. The key component of the .NET frame work are the common language run time and the. NET frame work class library,
The .NET framework has two main components: the common language runtime and the .Net framework class library. The common language runtime is the foundation of the .NET framework. You can think of the runtime as an agent that manages code at execution time, and remoting while also enforcing strict type safely and other forms of code accuracy that ensure security and robustness in fact the concept of code management is a fundamental principle of the runtime. Code that targets the runtime is known as managed code, while code that does not target the runtime is known as unmanaged code. The class library, the other main component of the .NET frameworks is a comprehensive, object-oriented collection reusable types that you can use to develop applications ranging from traditional command line or graphical user interface (FGUI) applications to application base d on the latest innovations provided by ASP.NET, such as web forms and XML web services. The .NET framework can be hosted by unmanaged component that load the common language runtime into their processes and initiate the execution of managed code. ASP.NET works directly with the runtime to enable ASP.NET application and XML web services, both of which are discussed later in this topic, Internet explorer is an example of unmanaged application that hosts the runtime (in the form of a MIME type extension). Using internet explorer to the host runtime enables you to embed managed components or windows forms controls in HTML documents. Hosting the runtime in this way makes mobile code 9similar to Microsoft Active Xr controls) possible, but with significant improvement that only managed code can offer, such as semi-trusted execution and secure isolated file storage. The following illustration shows the relationship of the common language runtime and the class library to your application and to the over all system. The illustration also shows how managed code operated with in a larger architecture. We can use the .NET framework to develop the following types of application and services: Console applications Window GUI application (Windows Forms) ASP.NET applications
XML Web services Windows services
The common language runtime (CLR) is responsible for runt-time services such as language integration; security enforcement; and memory, process and thread management. In addition, it has a roll at development time when features such as life cycle management strong type naming, cross-language exception handling, dynamic binding and so on, reduce the amount of code that a developer must write to turn the business logic the reusable component. The runtime can be hosted by high performance, server-side applications, such a s Microsoft Internet Information Services (IIS) for building web applications with ASP.NE and the next release of Microsoft SQL Server. This infrastructure enables you to use code “managed “ by the .NET framework to write your business logic, while still enjoying the superior performance of the industry’s best enterprises servers that support runtime hosting.
ASP.NET is a set of Microsoft.NET framework technologies used for building web applications and XML Web services. ASP.NET page execute on the server and generate mark up such as HTML, WML or XML that is sent to a desktop or mobile browser. ASP.NET pages use a compiled, event-driven programming model that improves performance and enables the separation of application logic and user interface. Both ASP.NET pages and ASP.NET web services files contain server-side (as opposed to client side logic) written in Visual basic .NET, C#.NET or any .NET compatible language, Web applications and XML Web Services take advantage of the features of the common language runtime, such as type safety, inheritance, language, interoperability, versioning, and integrated security.
There are two components of ADO.NET that you can use to access and manipulate data: .NET Framework data providers. The DataSet
The .NET Framework Data providers are components that have been explicitly designed for data manipulation and fast, forward-only, read-only access to data. The connection object provides connectivity to a data source. The command object enables access to database commands to return data, modify data, run stored procedures and send or retrieve parameter information. The Data Adapter provides a high-performance stream of data from the data source. Finally, the Data Adapter provides the bridge between the DataSet object and the data source. The Data Adapter uses command object to execute SQL commands at the data source to both load the DataSet with data and reconcile changes made to the data in the DataSet back to the data source.
The ADO.NET DataSet is explicitly designed for data access independent of any data source. As a result, it can be used with multiple and differing data sources used with XML data or used to manage data local to the application. The DataSet contains a collection n of one or more DataTable objects made up to rows and columns of data as well as primary key, foreign key, constraint and relation information about the data in the DataTable objects.
ADO.NET offers several advantages over previous versions of ADO and over other data access components. These benefits fall into the following categories:
Microsoft Data Access Components (MDAC) is a collection of core files provided to help applications by providing a means of accessing data. MDAC includes core files for Open Database Connectivity (ODBC), ActiveX Data Objects (ADO), OLEDB, Network libraries and client configuration tool for SQL Server. Depending on your data access strategy, you may need to ensure that MDAC is installed on the client computers, the business servers, the Web servers or the database servers. MDAC 2.6 or later is required by the .NET Framework and at least MDAC 2.7 SP1 is recommended.
made to identify whether the user needs may be satisfied using the current software and hardware technologies, whether the system will be cost effective from a business point of view and whether it can be developed with the given budgetary constraints. A feasibility study should be relatively cheap and done at the earliest possible time. Depending on the study, the decision is made whether to go ahead with a more detailed analysis. When a new project is proposed, it normally goes through feasibility assessment. Feasibility study is carried out to determine whether the proposed system is possible to develop with available resources and what should be the cost consideration. Facts considered in the feasibility analysis were. Technical Feasibility Economic Feasibility Behavioral Feasibility
Technical feasibility includes whether the technology is available in the market for development and its availability. The assessment of technical feasibility must be based on an outline design of system requirements in terms of input, output, files, programs and procedures. This can be qualified in terms of volumes of data, trends, frequency of updating, cycles of activity etc, in order to give an introduction of technical system. Considering our project if is technically feasible. Internal Management System with its emphasis on a more strategic decision making is fast gaining ground as a popular outsourced function.
This feasibility study present tangible and intangible benefits from the prefect by comparing the development and operational cost. The technique of cost benefit analysis is often used as a basis for assessing economic feasibility. This system needs some more initial
investment than the existing system, but it can be justifiable that it will improve quality of service. Thus feasibility study should center along the following points: Improvement resulting over the existing method in terms of accuracy, timeliness. Cost comparison Estimate on the life expectancy of the hardware Overall objective Our project is economically feasible. It does not require much cost to be involved in the overall process. The overall objectives are in easing out the requirement processes.
This analysis involves how it will work when it is installed and the assessment of political and managerial environment in which it is implemented. People are inherently resistant to change and computers have been known to facilitate change. The new proposed system is very much useful to the useful to the users and there for it will accept broad audience from around the world.
The most creative and challenging face of the system development is System Design. It provides the understanding and procedural details necessary for implementing the system
In the input design, user-oriented inputs are converted into a computer based system format. It also includes determining the record media, method of input, speed of capture and entry on to the screen. Online data entry accepts commands and data through a keyboard. The major approach to input design is the menu and the prompt design. In each alternative, the user’s options are predefined. The data flow diagram indicates logical data flow, data stores, source and destination. Input data are collected and organized into a group of similar data. Once identified input media are selected for processing. In this software, importance is given to develop Graphical User Interface (GUI), which is an important factor in developing efficient and user-friendly software. For inputting user data, attractive forms are designed. User can also select desired options from the menu, which provides all possible facilities. Also the important input format is designed in such a way that accidental errors are avoided. The user has to input only just the minimum data required, which also helps in avoiding the errors that the users may make. Accurate designing of the input format is very important in developing efficient software. The goal or input design is to make entry as easy, logical and free from errors.
Logical data design is about the logically implied data. Each and every data in the form can be designed in such a manner to understand the meaning. Logical data designing should give a clear understanding and idea about the related data used to construct a form.
A Data Flow Diagram (DFD) is a diagram that describes the flow of data and the processes that change data throughout a system. It’s a structured analysis and design tool that can be used for flowcharting in place of or in association with information. Oriented and process oriented system flowcharts. When analysts prepare the Data Flow Diagram, they specify the user needs at a level of detail that virtually determines the information flow into and out of the system and the required data resources. This network is constructed by using a set of symbols that do not imply physical implementations. The Data Flow Diagram reviews the current physical system, prepares input and output specification, specifies the implementation plan etc. Four basic symbols are used to construct data flow diagrams. They are symbols that represent data source, data flows, and data transformations and data storage. The points at which data are transformed are represented by enclosed figures, usually circles, which are called nodes.
Process should be named and numbered for easy reference. Each name should be representative of the process. The destination of flow is from top to bottom and from left to right. When a process is exploded in to lower level details they are numbered. The names of data stores, sources and destinations are written in capital letters.
Arrows should not cross each other. Squares, circles and files must bear names. Decomposed data flow squares and circles can have same names. Draw all data flow around the outside of the diagram.
Level 1 DFDAdministrator User details Excel file Various reports
Administrator User Login User details User details Login details User management