Professional Documents
Culture Documents
ent
Abstra
ct
Contelligent is a component-based Web Content Management
solution. This system is based on the convenience of the
students to communicate with the resources provided by the
distance learning section of the university.
Previous Exam Question Papers, This section gives a list of all the
previous question papers to give an idea to the student of how a
question paper will be. This section is also placed at the end of the
system like all the sections.
Manual Register
check for the
Administration
Physically required task
Department
Visits the
Examination
Branch
Manual
Registration of
examination
information
Student The course
coordinator
Manual Register
check for the
required task
1. T h e s t u d e n t , f a c u l t y o r t h e a d m i n i s t r a t o r s c a n v i e w o f
access the information virtually from anywhere of the
College promises.
5. T h e s t u d e n t s n e e d n o t s h u t t l e t h e m s e l v e s a r o u n d t h e
administrative office for the sake of examination.
7. T h e s t u d e n t s c a n v i e w t h e m a t e r i a l f o r h i s s e m e s t e r
subjects and download them.
Just three or four years ago the Web community was getting used to the
idea that the way we would work in future would be radically different from
the way we work now. The world of coalface flat file html markup would
begin to disappear in favour of collaborative working, managed workflow,
document versioning, on the fly pages constructed out of application
independent xml chunks, site management tools and push-button
publishing via multiple formats - html, xml, pdf, print, etc. Text appearing
in more than one context would be stored in a central repository and
repurposed according to particular requirements.
This halfway house position isn't a place where Web Managers and Editors
want to be. So it is quite odd that this is where we are, among a
community, which has been so intimately involved in the early development
of the Web.
The students can just get on to the contelligent to know any such
information that is of importance to their academics. The students can also
have referential information related to the normal structure of their courses,
semesters and time tables of the examination .The contelligent also
provides the accessibility towards the provision of old question paper and
their answers along with the academic material that is given by the
lecturers.
The contelligent also maintains the specifications of the library catalog of all
the books that are available in the college, making the students and the
much easier to check for the existing titles in the library before hand.
Overview
Over the last few years the debate over protection, or lack thereof, of
copyrighted works has flourished. Proposals on how to reimburse the
creators of these works range from strict proprietary encryption locks to
new business models that rely on revenue streams from ancillary products.
Each new proposal points out the shortcomings of previous.
Ideas and information captured in physical media traditionally fall into some
middle ground. While the information itself certainly has the characteristics
of a public good, the physical media that it is tied to is rival and excludable.
This gives rise to business models involving the sale of physical artifacts
whose only value is the embedded information such as books, CDs and
DVDs. These business models have taken a serious blow with the
introduction of information in digital form combined with communications
media such as the Internet. The question at hand is whether or not it is
possible to devise a scheme under which money can be transferred from
those consuming information goods to the providers of the same.
Discussion
All of the attacks that traditional CMS systems are vulnerable to also apply
to the CMS extension proposals. While the CMS extension proposals aim to
provide better support for fair use, they acknowledge that it is impossible to
create a CMS system that will allow all fair uses. A fundamental technical
challenge is how to create exceptions that are flexible enough to allow
legitimate fair uses, but not so flexible that they can be exploited as
loopholes by infringes. The centralized key escrow scheme proposed by
Burk & Cohen would be an enormous technical undertaking. Many of the
technical criticisms of key escrow systems in general also apply to this
proposal .For example, a centralized key repository creates a very high
value target and introduces many new vulnerabilities and threats regarding
the improper disclosure of keys. Due to the large number of users and
copyrighted works, such a system would be extraordinarily complex to
administer and extremely costly to implement. Sobel’s monitoring and
charging scheme is also infeasible to implement securely. It is simply too
easy for users to alter digital fingerprints and watermarks, especially given
that they have a strong incentive to do so. For example, users may easily
be able to remove the mark, or to place a watermark from one work into
another. Another simple attack is for users to encrypt their files to prevent
detection of the watermark. It would be difficult (or impossible) for the ISP
to differentiate between legitimately encrypted content and encrypted
copyrighted content without banning encryption entirely. The main technical
challenge in the compulsory licensing schemes is how to track digital copies
of content. Fisher suggests two approaches to tackle this problem. The first
is for the creators to imbed digital watermarks into copies of their work,
which could then be tracked and replicated in each copy of the original
work. Unfortunately, as discussed above, the watermarking approach is
subject to a number of attacks that may make such a plan infeasible.
Fisher’s second approach relies upon the existence of a centralized
registration system, which would require artists to register their work in
exchange for a unique serial number for that work. Again, Fisher does not
provide any details for how the serial number would be tracked. One
possibility is to embed the serial number as a watermark, but this is subject
to the problems discussed above. Any centralized registration service of this
type will be an enormous technical undertaking. Even if watermarking
systems were impossible to defeat, both the monitor-and-charge schemes
and the compulsory licensing schemes are subject to “distributed” cheating
attacks, where the consumption of a good is artificially in-flated across a
large number of (real or illegitimate) users. These types of attacks are
challenging to detect, and any usage monitoring or sampling scheme must
be designed with this in mind.
Chapt
er 3
Feasibil
ity
Report
Technical Descriptions:
Database:
Number of Modules
Pentium IV Processor.
256 MB RAM.
Required Software
MySQL Server.
Java/J2EE.
Feasibility
Cost Based:
If the physical system is established through a manual
process. There is much need of stationary that has to be
managed and maintained as files, the overall system once
implemented as a intranet based web application not only
saves the time but also eliminates the latency that can exist
within the system, and saves the cost of stationary that is
an unforeseen overhead within the system.
2. T h e f a c u l t i e s n e e d n o t p r e p a r e t h e m a t e r i a l o f
the semester subjects. Once they are uploaded
onto the site.
Chapt
3. T h e f a c u l t i e s n e e d n o t p r e p a r e t h e a s s i g n m e n t s
manually and distribute it to all the students.
er 4
activities within no time.
Analysis
Report
SRS Document:
Document Conventions:
1. It is a unified language.
3. It is a non-procedural language.
What is a Relational Database Management System?
MySQL is modular system that consists of the SQL database and several
functional programs. MySQL tools have four kinds of works:
Database management
Data access and manipulations
Programming
Connectivity
Database Management Tools
MYSQL has with limitation. The Single-user does not include all of the tools
available on the hardware platforms. Also. MYSQL is relatively
expensive and more complex than more single user, PC-basis
database managers. MYSQL delivers a comprehensive package
that allows for unlimited growth.
MySQL Gives You Security and Control MYSQL has several features that
ensure the integrity of user database. I f an interruption occurs in
processing, a rollback can rest the database to a point before the
disaster. If a restore is necessary, MYSQL has a roll forward
command for creating a database to its most recent save point.
MySQL provides users with several functions for serving data.
Grant and Revoke commands limited access to information down
to the row and column levels. Views are valuable future for
limiting access to the primary tables in the database.
All these make the end users solve their own problems and pit computers to
work.
Characteristics of Fourth Generation Languages
Simple Query facilities/ language
Report generators
Graphic languages
Application generations
Specification language
Application language
With the varied topic in existence in the fields of computers, Client Server is
one, which has generated more heat than light, and also more hype than
reality. This technology has acquired a certain critical mass attention with
its dedication conferences and magazines. Major computer vendors such as
IBM and DEC; have declared that Client Servers is their main future market.
A survey of DBMS magazine reveled that 76% of its readers were actively
looking at the client server solution. The growth in the client server
development tools from $200 million in 1992 to more than $1.2 billion in
1996.
The key client server idea is that client as user is essentially insulated from
the physical location and formats of the data needs for their application.
With the proper middleware, a client input from or report can transparently
access and manipulate both local database on the client machine and
remote databases on one or more servers. An added bonus is the client
server opens the door to multi-vendor database access indulging
heterogeneous table joins.
What is a Client Server
Two prominent systems in existence are client server and file server
systems. It is essential to distinguish between client servers and file server
systems. Both provide shared network access to data but the comparison
dens there! The file server simply provides a remote disk drive that can be
accessed by LAN applications on a file-by-file basis. The client server offers
full relational database services such as SQL-Access, Record modifying,
Insert, Delete with full relational integrity backup/ restore performance for
high volume of transactions, etc. the client server middleware provides a
flexible interface between client and server, who does what, when and to
whom.
Client server has evolved to solve a problem that has been around since the
earliest days of computing: how best to distribute your computing, data
generation and data storage resources in order to obtain efficient, cost
effective departmental an enterprise wide data processing. During
mainframe era choices were quite limited. A central machine housed both
the CPU and DATA (cards, tapes, drums and later disks). Access to these
resources was initially confined to batched runs that produced departmental
reports at the appropriate intervals. A strong central information service
department ruled the corporation. The role of the rest of the corporation
limited to requesting new or more frequent reports and to provide hand
written forms from which the central data banks were created and updated.
The earliest client server solutions therefore could best be characterized as
“SLAVE-MASTER”.
Time-sharing changed the picture. Remote terminal could view and even
change the central data, subject to access permissions. And, as the central
data banks evolved in to sophisticated relational database with non-
programmer query languages, online users could formulate adhoc queries
and produce local reports with out adding to the MIS applications software
backlog. However remote access was through dumb terminals, and the
client server remained subordinate to the Slave\Master.
Front end or User Interface Design
About Java
Initially the language was called as “oak” but it was renamed as “Java” in
1995. The primary motivation of this language was the need for a platform-
independent (i.e., architecture neutral) language that could be used to
create software to be embedded in various consumer electronic devices.
Java is a programmer’s language.
Java is cohesive and consistent.
Except for those constraints imposed by the Internet
environment, Java gives the programmer, full control.
Finally, Java is to Internet programming where C was to system
programming.
Importance of Java to the Internet
Java has had a profound effect on the Internet. This is because; Java
expands the Universe of objects that can move about freely in Cyberspace.
In a network, two categories of objects are transmitted between the Server
and the Personal computer. They are: Passive information and Dynamic
active programs. The Dynamic, Self-executing programs cause serious
problems in the areas of Security and probability. But, Java addresses those
concerns and by doing so, has opened the door to an exciting new form of
program called the Applet.
Every time you that you download a “normal” program, you are risking a
viral infection. Prior to Java, most users did not download executable
programs frequently, and those who did scanned them for viruses prior to
execution. Most users still worried about the possibility of infecting their
systems with a virus. In addition, another type of malicious program exists
that must be guarded against. This type of program can gather private
information, such as credit card numbers, bank account balances, and
passwords. Java answers both these concerns by providing a “firewall”
between a network application and your computer.
When you use a Java-compatible Web browser, you can safely download
Java applets without fear of virus infection or malicious intent.
Portability
The key that allows the Java to solve the security and portability problems
is that the output of Java compiler is Byte code. Byte code is a highly
optimized set of instructions designed to be executed by the Java run-time
system, which is called the Java Virtual Machine (JVM). That is, in its
standard form, the JVM is an interpreter for byte code.
Translating a Java program into byte code helps makes it much easier to
run a program in a wide variety of environments. The reason is, once the
run-time package exists for a given system, any Java program can run on
it.
Beyond the language, there is the Java virtual machine. The Java virtual
machine is an important element of the Java technology. The virtual
machine can be embedded within a web browser or an operating system.
Once a piece of Java code is loaded onto a machine, it is verified. As part of
the loading process, a class loader is invoked and does byte code
verification makes sure that the code that’s has been generated by the
compiler will not corrupt the machine that it’s loaded on. Byte code
verification takes place at the end of the compilation process to make sure
that is all accurate and correct. So byte code verification is integral to the
compiling and executing of Java code.
Overall Description
Java . Class
Picture showing the development process of JAVA Program
Java programming uses to produce byte codes and executes them. The first
box indicates that the Java source code is located in a. Java file that is
processed with a Java compiler called javac. The Java compiler produces a
file called a. class file, which contains the byte code. The. Class file is then
loaded across the network or loaded locally on your machine into the
execution environment is the Java virtual machine, which interprets and
executes the byte code.
Java Architecture
When you compile the code, the Java compiler creates machine code (called
byte code) for a hypothetical machine called Java Virtual Machine (JVM).
The JVM is supposed to execute the byte code. The JVM is created for
overcoming the issue of portability. The code is written and compiled for
one machine and interpreted on all machines. This machine is called Java
Virtual Machine.
Compiling and interpreting Java Source Code
Java
Source PC Compiler Interpreter
Code (PC)
……….. Java
………..
Byte code
Macintosh Java
……….. Compiler Interpreter
(Macintosh
Java
(Platform
)Interpreter
Indepen
………… SPARC dent) ( Spare )
Compiler
During run-time the Java interpreter tricks the byte code file into thinking
that it is running on a Java Virtual Machine. In reality this could be a Intel
Pentium Windows 95 or SunSARC station running Solaris or Apple
Macintosh running system and all could receive code from any computer
through Internet and run the Applets.
Simple
Java was designed to be easy for the Professional programmer to learn and
to use effectively. If you are an experienced C++ programmer, learning
Java will be even easier. Because Java inherits the C/C++ syntax and many
of the object oriented features of C++. Most of the confusing concepts from
C++ are either left out of Java or implemented in a cleaner, more
approachable manner. In Java there are a small number of clearly defined
ways to accomplish a given task.
Object-Oriented
Robust
Introduction
The Java web server is JavaSoft's own web Server. The Java web server is
just a part of a larger framework, intended to provide you not just with a
web server, but also with tools. To build customized network servers for any
Internet or Intranet client/server system. Servlets are to a web server, how
applets are to the browser.
About Servlets
There are many features of Servlets that make them easy and attractive to
use. These include:
Easily configured using the GUI-based Admin tool
Can be loaded and invoked from a local disk or remotely across
the network.
Can be linked together, or chained, so that one Servlets can
call another Servlets, or several Servlets in sequence.
Can be called dynamically from within HTML pages, using
server-side include tags.
Are secure - even when downloading across the network, the
Servlets security model and Servlets sandbox protect your
system from unfriendly behavior.
Advantages of the Servlet API
Servlets are persistent. Servlet are loaded only by the web server
and can maintain services between requests.
Servlets are fast. Since Servlets only need to be loaded once,
they offer much better performance over their CGI
counterparts.
Servlets are platform independent.
Servlets are extensible. Java is a robust, object-oriented
programming language, which easily can be extended to suit
your needs
Servlets are secure.
Servlets can be used with a variety of clients.
Loading Servlets
From a remote location. For this a code base like http: // nine.eng /
classes / foo / is required in addition to the Servlets class name. Refer to
the admin GUI docs on Servlet section to see how to set this up.
JavaScript
Even though JavaScript supports both client and server Web programming,
we prefer JavaScript at Client side programming since most of the browsers
supports it. JavaScript is almost as easy to learn as HTML, and JavaScript
statements can be included in HTML documents by enclosing the statements
between a pair of scripting tags
<SCRIPTS>.. </SCRIPT>.
JavaScript statements
</SCRIPT>
Here are a few things we can do with JavaScript:
Validate the contents of a form and make calculations.
Add scrolling or changing messages to the Browser’s status
line.
Animate images or rotate images that change when we move
the mouse over them.
Detect the browser in use and display different content for
different browsers.
Detect installed plug-ins and notify the user if a plug-in is
required.
We can do much more with JavaScript, including creating entire application.
JavaScript Vs Java
JavaScript and Java are entirely different languages. A few of the most
glaring differences are:
Hypertext Markup Language (HTML), the languages of the World Wide Web
(WWW), allows users to produces Web pages that include text, graphics and
pointer to other Web pages (Hyperlinks).
ADVANTAGES
What Is JDBC?
JDBC is a Java API for executing SQL statements. (As a point of interest,
JDBC is a trademarked name and is not an acronym; nevertheless, JDBC is
often thought of as standing for Java Database Connectivity. It consists of a
set of classes and interfaces written in the Java programming language.
JDBC provides a standard API for tool/database developers and makes it
possible to write database applications using a pure Java API.
Using JDBC, it is easy to send SQL statements to virtually any relational
database. One can write a single program using the JDBC API, and the
program will be able to send SQL statements to the appropriate database.
The combinations of Java and JDBC lets a programmer write it once and run
it anywhere.
So why not just use ODBC from Java? The answer is that you
can use ODBC from Java, but this is best done with the help
of JDBC in the form of the JDBC-ODBC Bridge, which we will
cover shortly. The question now becomes "Why do you need
JDBC?" There are several answers to this question:
1. ODBC is not appropriate for direct use from Java because it uses a C
interface. Calls from Java to native C code have a number of
drawbacks in the security, implementation, robustness, and
automatic portability of applications.
2. A literal translation of the ODBC C API into a Java API would not be
desirable. For example, Java has no pointers, and ODBC makes
copious use of them, including the notoriously error-prone generic
pointer "void *". You can think of JDBC as ODBC translated into an
object-oriented interface that is natural for Java programmers.
3. ODBC is hard to learn. It mixes simple and advanced features
together, and it has complex options even for simple queries. JDBC,
on the other hand, was designed to keep simple things simple while
allowing more advanced capabilities where required.
4. A Java API like JDBC is needed in order to enable a "pure Java"
solution. When ODBC is used, the ODBC driver manager and drivers
must be manually installed on every client machine. When the JDBC
driver is written completely in Java, however, JDBC code is
automatically installable, portable, and secure on all Java platforms
from network computers to mainframes.
The JDBC API supports both two-tier and three-tier models for
database access.
In the two-tier model, a Java applet or application talks directly to the
database. This requires a JDBC driver that can communicate with the
particular database management system being accessed. A user's SQL
statements are delivered to the database, and the results of those
statements are sent back to the user. The database may be located on
another machine to which the user is connected via a network. This is
referred to as a client/server configuration, with the user's machine as the
client, and the machine housing the database as the server. The network
can be an Intranet, which, for example, connects employees within a
corporation, or it can be the Internet.
JAVA
Application Client machine
JDBC DBMS-proprietary
protocol
Database
DBMS server
Another advantage is that when there is a middle tier, the user can employ
an easy-to-use higher-level API which is translated by the middle tier into
the appropriate low-level calls. Finally, in many cases the three-tier
architecture can provide performance advantages.
Application
Server (Java)
D BSM
e rSv- pe r ompar icehtianrey
JDBC (bup s irnoet s
osc oLlo g i c )
Database
server
DBMS
Until now the middle tier has typically been written in languages such as
C or C++, which offer fast performance. However, with the introduction of
optimizing compilers that translate Java byte code into efficient machine-
specific code, it is becoming practical to implement the middle tier in Java.
This is a big plus, making it possible to take advantage of Java's
robustness, multithreading, and security features. JDBC is important to
allow database access from a Java middle tier.
JDBC Driver Types
The JDBC drivers that we are aware of at this time fit into one of four
categories:
JDBC-ODBC bridge plus ODBC driver
Native-API partly-Java driver
JDBC-Net pure Java driver
Native-protocol pure Java driver
JDBC-ODBC Bridge
If possible, use a Pure Java JDBC driver instead of the Bridge and an
ODBC driver. This completely eliminates the client configuration required by
ODBC. It also eliminates the potential that the Java VM could be corrupted
by an error in the native code brought in by the Bridge (that is, the Bridge
native library, the ODBC driver manager library, the ODBC driver library,
and the database client library).
Features of JSP
Portability:
Java Server Pages files can be run on any web server or web-enabled
application server that provides support for them. Dubbed the JSP engine,
this support involves recognition, translation, and management of the Java
Server Page lifecycle and its interaction components.
Components
It was mentioned earlier that the Java Server Pages architecture can include
reusable Java components. The architecture also allows for the embedding
of a scripting language directly into the Java Server Pages file. The
components current supported include Java Beans, and Servlets.
Processing
A Java Server Pages file is essentially an HTML document with JSP scripting
or tags. The Java Server Pages file has a JSP extension to the server as a
Java Server Pages file. Before the page is served, the Java Server Pages
syntax is parsed and processed into a Servlet on the server side. The
Servlet that is generated outputs real content in straight HTML for
responding to the client.
Access Models:
A Java Server Pages file may be accessed in at least two different ways. A
client’s request comes directly into a Java Server Page. In this scenario,
suppose the page accesses reusable Java Bean components that perform
particular well-defined computations like accessing a database. The result of
the Beans computations, called result sets is stored within the Bean as
properties. The page uses such Beans to generate dynamic content and
present it back to the client.
In both of the above cases, the page could also contain any valid Java code.
Java Server Pages architecture encourages separation of content from
presentation.
JDBC connectivity
The JDBC provides database-independent connectivity
between the J2EE platform and a wide range of tabular data
sources. JDBC technology allows an Application Component
Provider to:
Manager transactions
The generated application is the first version upon the system. The overall
system is planned to be in the formal of distributed architecture with
homogeneous database platform. The major objective of the overall system
is to keep the following components intact.
Overall Description
Product Perspective
Project Plan
Product Functions
The major function that product executes are divided into two
categories.
Administrative Functions
8. Corporate Registration
The general function that are taken care of at the user level area are,
the students can cross check their information regarding the academic
and examination fee payments. The students can access the faculties
material and the generic information that is necessary for them with
respect to their assignments. The faculties can cross verify the
information related to the courses for which they are incharge and the
subject that are taken care of as the responsibility withing that
semesters.
Project Plan
The total project consists of seven modules, which are practically as follows:
Assignments module
The description for all the above modules has been provided in detail in the
previous sections.
ER-Diagrams:
Stud
ent
No
Student
Student
Course
Master
Master
Ca
n
St
ud
y
Students
Wil
Ca
l
n
St
Ha
ud
Sem. ve
y
ID
Student Ca
Course n
Course
Master Ha Master
ve
Stud
ent Sem.
ID ID
Wor
Faculty Department
ks
Master For
Student
Master
Designation
Master
Work
Course
s
For Master
ER-Diagram
3)
Can
Faculty Master Can Subject Master hav
teach
e
Will
prepar Can
e Assign
have
Master
Belon
Belon gs
gs To
To
Can
hav Notes Master
e
Unified Modeling Language Diagrams
Use cases model the system from the end users point of view, with the
following objectives
Faculties
Administration
Login
Assigments
Student Exam
Details
Materials
Access
Configure
Validate
student,
Fee <<Uses>> payment
payments type ID,
Date
<<U
ses>
Student Apply for
>
exam Validate Exam
ID, Subject ID,
Fee payment
status, exam
result
Check exam <<Uses>>
results
Login
Access <<Uses>>
status, valid
materials student
Course &
subject
Faculty Subject
Materials
Examination
&
Assignments
Configure
<<Uses>>
Enquire for
the course
incharge
Query
<<U
s es>>
Analyzer
Post <<Uses>>
student
material
Send to
proper
storage
Post <<Uses>>
question
papers
Post the
Display the
exam and <<Uses>> information
assignments
on console
information
New Course
implementatio
n
New subject
Administrator
implementatio
n
Designing a
plan for a
semester
Conduct
examination
&
assignments
<<Uses>>
Raise a new
student
registration
Query
course
s es>>
Administrator registration
<<Uses>>
Raise a
new
Subject
registration
Send to
proper
storage
Raise a
semester <<Uses>>
plan for
the course
Faculty Information
- Insert ()
- Delete ()
- Update ()
- Search ()
- Validate_Dept_ID ()
- Validate_Desig_ID()
Designation-Master
- Desig-ID: Number
- Desig-Name: Varchar2
- Desig-Descr: Varchar2
- Insert ()
- Update ()
- Delete ()
- Search ()
Department Master
- Dept-ID : Number
- Dept-Name : Varchar2
- Dept-desc : Varchar2
- H-Desig-ID :Number
- Insert ()
- Update ()
- Delete ()
- Search ()
- validate-Desig()
Course Subject Information
This collaboration specifies the integrity among the courses and subjects
that are provided by the university, course subjects are relationally
associated through course master and subject master. The subject master
is relationally associated through subject select master
Course_sub_Master
-Course_ID : Number
-Subject_ID : Number
-Validate_Course ()
-Validate_Subject()
Course Master
-Course-ID: Number
-Course-Name: Varchar2
-Course-Descr: Varchar2
-Course-Sh-Name:Varchar2
-Course-Fees:Naumber
-Insert ()
-Update ()
-Delete ()
-Search ()
3) Semester Examination Information
Examination_Master
-Exam-ID : Number
-Exam-Name : Varchar2
-Exam-Type : Varchar2
-Exam-Start-Date : Number
-Exam-End-Date : Varchar2
-Exam-Fee : Date
-Semester-Id : Number
-Course-Id : Number
-Insert ()
-Delete ()
-Update ()
-Search ()
-Validate- Semester ()
-Validate_Course ()
Course Master
Semester_Master
-Course-ID: Number
-Semester-ID : Number -Course-Name: Varchar2
-Semester-Typ : Varchar2 -Course-Descr: Varchar2
-Semester-Start-Date : Date -Course-Sh-Name:Varchar2
-Semester-End-Date : Date -Course-Fees:Naumber
-Insert () -Insert ()
-Delete () -Update ()
-Update () -Delete ()
-Search () -Search ()
4) Exam Time Table Information
-Exam-ID : Number
-Sub-ID : Number
-Exam-Date : Date
-Exam-Time : Number
-Validate- Exam-ID ()
-Validate_sub-Id ()
Subject Master
Examination_Master
-Insert ()
-Update ()
-Delete ()
-Search ()
-Validate-Dept-Id ()
-Validate-Login-Name ()
-Faculty-ID : Number
-Course-ID :Number
-Validate-Faculty ()
-Validate-Course ()
Subject Master
-Subject-ID: Number
-Subject-Name: Varchar2
-Sub-Long-Name: Varchar2 Faculty Subject Master
-Subj-Desc: Varchar2
-Sub-sele-ID:Number
-Insert () -Faculty-ID : Number
-Update () -Subject-Id : Number
-Delete ()
-Search () -Validate-Faculty ()
-Validate-sub-select-Id() -Validate-Subject()
The basic collaboration depicts the interrelations among the faculty
master, course master, subject master, faculty course master, faculty
subject master, the collaboration show the generic relationships
among the faculties and their respective responsible subjects, the
courses and the facilities who act as course in charger.
Object and Package Diagram:
Subject Course
Selection Subject
Subject Faculty
Object Assignments
Faculty
Notes Exam
Timetable
Faculty
Subjects Students
Question Exam
Paper
Faculty Faculty
Object Assignments
Faculty
Notes
Faculty Faculty
Subjects Course
Sequence diagram of Lecture Notes
s etXXX
inc lude
getXXX
Sequence diagram of Assignments
forward
getXXX( )
Sequence diagram of Examination Time table
: : ExamBean ExamJSP :
: Student
ExamTimeTable NewClass
setXXX( )
include( )
getXXX( )
Sequence diagram of Library
setXXX
forward( )
getXXX
Sequence diagram of Book Search by Name
setXXX( )
forward( )
getXXX( )
Sequence diagram of Book search by Category
setXXX( )
forward( )
getXXX( )
Sequence diagram of Book borrow
setXXX( )
forward( )
getXXX( )
Activity Diagrams:
1. Activity diagram of an Admin Login.
Log-in
Invalid User
Authetication
Valid User
Administration
Log-Out
2.Activity diagram for Different transactions in the
library
Log-in
Invalid Student
Authentication
Search by
B ooks Category Search by Name Barrow
Log-Out
3. Activity diagram for Different options for a
student
User Form
Options
Log-Out
Database Description
Student Master
-Stud-No : Number
-Stud-Name : Varchar2
-Stud-addr : Varchar2
-Stud-DOB : Date
-Stud-Phone : Number
-Stud-Email-ID: Varchar2
-Stud-Admin-Date: Date
-Stud-Login-Name: Varchar2
-Stud-Login-Name-States: Char
-Insert ()
-Update ()
-Delete ()
-Search ()
Faculty Master
-Faculty-No : Number
-Faculty-Name : Number
- Faculty -Address: Number
- Faculty -DOB : Date
- Faculty -Phone : Number
- Faculty -Email-ID: Varchar2
- Faculty -Join-Date: Date
- Faculty-Dept-Id: Number
- Faculty-Desig-ID: Number
-Faculty-Login-Name: Varchar2
-Insert ()
-Update ()
-Delete ()
-Search ()
-Validate-Dept-Id ()
-Validate-Login-Name ()
3) Course Master: This entity illustrates all the unique courses that
have been identified by the university.
Course Master
-Course-Id : Number
- Course -Name : Number
- Course-Sht-Name: Varchar2
- Course -Description: Long
- Course-Fees: Number
-Insert ()
-Update ()
-Delete ()
-Search ()
Department Master
-Dept-Id : Number
- Dept-Name : Varchar2
- Dept-Desc : Long
- Dept-Id : Number
-Insert ()
-Update ()
-Delete ()
-Search ()
-Validate-Desig-Id ()
5) Designation Master: This entity specifies all the unique
designation that are existing in the
organization, and all the employees are
referenced through the designation that
are included in this table only.
Designation Master
-Designation-Id : Number
- Designation-Name : Varchar2
- Designation-Desc : Long
-Insert ()
-Update ()
-Delete ()
-Search ()
6) Subject Master: The entity includes all the information about the
subjects that have been accepted by the
academic control. Declaring the subject-Id as
primary key uniquely identifies each subject.
Subject Master
-Subject-Id : Number
- Subject-Name : Varchar2
- Subject-Long-Name : varchar2
- subject-descr :Long
- Subject-Select-Id : Name
-Insert ()
-Update ()
-Delete ()
-Search ()
-Validate- Subject -select-Id ()
7) Subject select Master: The entity includes the subject selection
criteria for any subject that exists and
being selected under the university
scheme.
-Subject-sel-Id : Number
- Subject-sel-desc : Varchar2
-Insert ()
-Update ()
-Delete ()
-Search ()
- Subject-Id: Name
-Validate-course-Id ()
-Validate- Student -Id ()
9) Student Course Master: The entity practically manages all that
information related to the students who
got registered into specific courses.
-Insert ()
-validate-course-Id()
-Validate- Subject -Id ()
-Validate- Semester -Id ()
Semester Master
-Insert ()
-validate-course-Id()
-Validate- Subject -Id ()
-Validate- Semester -Id ()
11) Examination Master: This entity manages the unique information
related to the all examinations that are
declared within the university as per the
almanac schedule.
Examination Master
- Exam-Id : Number
-Exam-Name: Varchar2
- Exam –Type-Id : Number
Sem-ID: Number
-Course-Id: Number
-Exam-start-Date:Date
-Exam-End-Date:Date
-Exam-Fee:Number
Insert ()
Update ()
Delete ()
Search ()
Validate-Exam-Id()
Validate- sem -Id ()
Validate- Course -Id ()
12) Exam Time Table Master: The entity basically manages the
information related to the
examination timetable along with
the subject date and time.
Student Exam Master
- Student-No : Number
-Exam-ID :Number
-Subject-ID :Number
-Exam-Result :Char
-Exam-Marks :Number
Insert ()
Update ()
Delete ()
Search ()
Validate-Exam-Id ()
13) Student Validate- subj-Id ()
Validate- stud-Id ()
Examination Master
- Exam-Id : Number
-Subject-ID :Number
-Date-of-Ex :Date
-Time-of-Ex :Date
Insert ()
Update ()
Delete ()
Search ()
Validate-Exam-Id()
Validate- subj-Id ()
14) Fee
Payment Master: The module stores the
information related to the fee payment
details of the student.
Fee Payment Master Details
Insert ()
Validate-fee-payment-type-Id ()
Validate- payment-Id ()
15) Fee Payment Master Details: The entity practically manages all
the at data related to the fee
payment particulars of the
Insert ()
Update ()
Delete ()
Search ()
Validate- stud-Id ()
- Faculty-Id: Number
-Course-Id: Number
- Validate-faculty-Id ()
- Validate- course-Id ()
- question-Paper-no: Number
-exam-ID:Number
-subject-Id: Number
-question paper date:Date
-question paper ans:Varchar2
Insert()
Update()
Delete()
Search()
Validate-faculty-Id ()
Validate- subject-Id ()
20) Faculty Assignments Master: The entity basically responds to
the data related to the
assignments that have been
allocated nu the faculties.
Faculty Assignments
- Assignment-no: Number
-Faculty-Id: Number
-Subject-Id: Number
-Assignment date: Date
-Last-date: date
-Question -desc:long
Insert()
Update()
Delete()
Search()
Validate-faculty-Id ()
Validate- subject-Id ()
- Notes-Id: Number
-Faculty-Id: Number
-Subject-Id: Number
-Description: Long
Insert ()
Update ()
Delete ()
Search ()
Validate-faculty-Id ()
Validate- subject-Id ()
23) Faculty Security Master: The entity manages the login standards
of the faculties.
-Faculty-Id: Number
-Pw-old: varchar2
-Pw-new: varchar2
-Pw-chang-date-time:Date
Insert ()
Update ()
Delete ()
Search ()
Validate-faculty-Id ()
Validate- subject-Id ()
24) Student Security Master: The entity manages the login standards
of the faculties.
-Student-Id: Number
-Pw-old: varchar2
-Pw-new: varchar2
-Pw-chang-date-time: Date
Insert ()
Update ()
Delete ()
Search ()
Validate- stud-Id ()
Databas
e Scripts
create table student_master
student_name varchar(30),
student_add_dno varchar(30),
student_add_street varchar(30),
student_add_city varchar(30),
student_dob date,
student_phone int(15),
student_email_id varchar(30),
student_admt_date date,
student_login_name varchar(30),
studnet_login_name_status varchar(30),
);
create table designation_master
desigantion_name varchar(30),
desigantion_description varchar(30)
);
create table course_master
course_name varchar(30),
course_short_name varchar(30),
course_description varchar(30),
course_fee decimal
);
subject_name varchar(30),
subject_long_name varchar(30),
subject_description varchar(30),
subject_select_id varchar(30)
);
create table admin
usid varchar(20),
pwd varchar(20)
);
create table faculty_master(
faculty_name varchar(30),
faculty_add_dno varchar(30),
faculty_add_street varchar(30),
faculty_add_city varchar(30),
faculty_dob date,
faculty_phone int,
faculty_mailid varchar(30),
faculty_join_date date,
cascade,
faculty_designation_id varchar(15)references
designation_master(designation_id)on
delete cascade
faculty_login_name varchar(30),
faculty_login_name_state varchar(30));
create table department_master(
department_name varchar2(30),
department_description varchar2(30));
create table course_subject_master(
cascade,
3 semister_type varchar(10),
4 sem_start_date date,
5 sem_end_date date); create table semister_master(
NOTI_DATE DATE,
NOTI_LDATE DATE,
NOTIFICATION LONG);
create table stu_notifi_master(notification_id varcha create
table stu_notifi_master(notification_id varchar2(15) references
notification_master( notification_id),
NOTI_DATE DATE,
NOTI_LDATE DATE,
NOTIFICATION LONG,
indended_for varchar(20),
student_id varchar(15) ,
certificates varchar(40),
apply_date date,
apply_status char(3),
3 corporate_name varchar2(20),
4 corporate_desc varchar2(30),
5 corporate_website varchar2(30),
6 corporate_add varchar2(40));
create table corporate_login(cid varchar2(15) references create
table corporate_login(cid varchar2(15) references
2 cuser varchar2(10),
3 PW_OLD VARCHAR(10),
4 PW_NEW VARCHAR(10));
create table notification_master(notification_id varchar2(15)
primary key,
2 NOTI_DATE DATE,
3 NOTI_LDATE DATE,
4 NOTIFICATION LONG,
5 indended_for varchar(20),
6 status char(3));
create table student_Login(
Login_name varchar(20),
pw_old varchar(30),
pw_new varchar(30),
pw_changed_date date))
Login_name varchar(20),
pw_old varchar(30),
pw_new varchar(30),
pw_changed_date date))
create table catalog(
book_name varchar(20),
book_author varchar(20),
book_edition varchar(10))
Chapt
er 6
Coding
Program Design Language
Psychology of Testing
Testing Objectives
The main objective of testing is to uncover a host of errors, systematically
and with minimum effort and time. Stating formally, we can say,
Testing is a process of executing a program with the intent
of finding an error.
undiscovered error.
error, if it exists.
reliable standards.
Levels of Testing
In order to uncover the errors present in different phases we have
the concept of levels of testing. The basic levels of testing are as
shown below…
Client Needs
Acceptance
Testing
Requirements
System Testing
Design
Integration Testing
Unit Testing
Code
System Testing
The philosophy behind testing is to find errors. Test cases are devised with
this in mind. A strategy employed for system testing is code testing.
Code Testing:
This strategy examines the logic of the program. To follow this method we
developed some test data that resulted in executing every instruction in the
program and module i.e. every path is tested. Systems are not designed as
entire nor are they tested as single systems. To ensure that the coding is
perfect two types of testing is performed or for that matter is performed or
that matter is performed or for that matter is performed on all systems.
Types Of Testing
Unit Testing
Link Testing
Unit Testing
Link Testing
Link testing does not test software but rather the integration of each
module in system. The primary concern is the compatibility of each
module. The Programmer tests where modules are designed with
different parameters, length, type etc.
Integration Testing
After the unit testing we have to perform integration testing. The goal
here is to see if modules can be integrated proprerly, the emphasis
being on testing interfaces between modules. This testing activity can
be considered as testing the design and hence the emphasis on
testing module interactions.
In this project integrating all the modules forms the main system.
When integrating all the modules I have checked whether the
integration effects working of any of the services by giving different
combinations of inputs with which the two services run perfectly
before Integration.
System Testing
Acceptance Testing
This is a unit testing method where a unit will be taken at a time and tested
tested step wise every piece of code, taking care that every statement in
the code is executed at least once. The white box testing is also called Glass
Box Testing.
I have generated a list of test cases, sample data. which is used to check
all possible combinations of execution paths through the code at every
module level.
The entire application has been designed using MySQL as back end and
using the graphical features of HTML and dynamism through the JSP
provides the front end user interface.
developed in near future. The system at present does not take care off the
constructs need SSL standards and are critically to be initiated in the first
JAVA Technologies
HTML
JDBC