Workflow System for Businesses
Workflow System for Businesses
ABSTRACT Objective:
A Work Flow Management System is a depiction of a sequence of operations, declared as work of a person, work of a simple or complex mechanism, work of a group of persons, work of an organization of staff, or machines. Workflow may be seen as any abstraction of real work, segregated in work share, work split or whatever types of ordering. or control purposes, workflow may be a view on real work under a chosen aspect, thus serving as a virtual representation of actual work. A workflow system for distributing work items to employees so that the employees may perform an activity within a defined workflow process. A server interprets the workflow process and facilitates the scheduling and routing of work items in the system to an employee. !ach work item has a set of work item contents data. "orphing logic determines which data is needed by an employee to which a work item has been scheduled and morphs a work item so that the actor receives only the data from the work item contents that the employee needs. #articular implementations are described for clients and agents employees
Project Overview:
Work flow management system concepts are closely related to other concepts used to describe organizational structure, such as functions, teams, pro$ects, policies and hierarchies. Workflows may be viewed as one primitive building block of organizations. %he relationships among these concepts are described later in this entry. Work flow management system deals with everything about the employee, his role, his work, leave details, clients, pro$ect status, pro$ect history, assign person etc.
&
Mo !les:
%his pro$ect involves mainly three modules. Administrator !mployee "anager
Mo !les "escri#tion:
A ministrator Mo !le:
%his module has to maintain the 'ser, registering the Administrators, changing the passwords. "aintains the (nformation about Administrator and maintains the records of all the employees
$m#loyee Mo !le:
%his opens an A)c for the employee, allows user to change the password, allows user to view work assign to him, check the time sheet and also he can apply for leave
Manager Mo !le:
%his opens an A)c for the manager, allows user to change the password, allows user to view work assign to him, check the leaves of employees, pro$ect details, pro$ect history and information about the clients
+(
"esign A##roac,
3.1 Introduction to Design 3.2 UML Diagrams 3.3 Dataflow Diagrams 3.4 !" Diagrams
-( .(
/( 0( 1( 2(
%ntro !c tion
%&TRO"3CT%O&
A Work Flow Management System is a depiction of a sequence of operations, declared as work of a person, work of a simple or complex mechanism, work of a group of persons, work of an organization of staff, or machines. Workflow may be seen as any abstraction of real work, segregated in work share, work split or whatever types of ordering. or control purposes, workflow may be a view on real work under a chosen aspect, thus serving as a virtual representation of actual work. A workflow system for distributing work items to employees so that the employees may perform an activity within a defined workflow process. A server interprets the workflow process and facilitates the scheduling and routing of work items in the system to an employee. !ach work item has a set of work item contents data. "orphing logic determines which data is needed by an employee to which a work item has been scheduled and morphs a work item so that the actor receives only the data from the work item contents that the employee needs. #articular implementations are described for clients and agents employees Work flow management system concepts are closely related to other concepts used to describe organizational structure, such as functions, teams, pro$ects, policies and hierarchies. Workflows may be viewed as one primitive building block of organizations. %he relationships among these concepts are described later in this entry. Work flow management system deals with everything about the employee, his role, his work, leave details, clients, pro$ect status, pro$ect history, assign person etc.
Analysis
"isa vantages:
(t will not get freely.
Pro#ose
System
Work flow management system concepts are closely related to other concepts used to describe organizational structure, such as functions, teams, pro$ects, policies and hierarchies. Workflows may be viewed as one primitive building block of organizations. %he relationships among these concepts are described later in this entry. Work flow management system deals with everything about the employee, his role, his work, leave details, clients, pro$ect status, pro$ect history, assign person etc.
Workflow system for distributing work items to employees so that the employees may perform an activity within a defined workflow process. A server interprets the workflow process and facilitates the scheduling and routing of work items in the system to an employee. !ach work item has a set of work item contents data. "orphing logic determines which data is needed by an employee to which a work item has been scheduled and morphs a work item so that the actor receives only the data from the work item contents that the employee needs. #articular implementations are described for clients and agents employees
System S#eci7ications:
8ar ware Re9!irements
#entium0(1 2#rocessor3. &,- "4 or ,1& "4 5am ,1& 64 7ache "emory 8ard disk 19 :4 "icrosoft 7ompatible 191 or more 6ey 4oard
So7tware Re9!irements
Web Technologies : ASP.NET 2.0 ang!age $atabase Web Ser)er : "# : S% SE&'E& 200( : **S
Design
19
11
3se case:
A description of sequence of actions, including variants, that a system performs that yields an observable result of value of an actor.
'"A stands for 'nified "odeling Aanguage. '"A is a language for specifying, visualizing and documenting the system. %his is the step while developing any product after analysis. %he goal from this is to produce a model of the entities involved in the pro$ect which later need to be built. %he representation of the entities that are to be used in the product being developed need to be designed. %here are various kinds of methods in software designB %hey are as followsB
1&
1*
1+
5egistration
Admin
%ime ?heet
#ro$ect <etails
Se9!ence "iagram
?equence diagram and collaboration diagram are called (D%!5A7%(=D
<(A:5A"?. An interaction diagram shows an interaction, consisting of set of ob$ects and their relationship including the messages that may be dispatched among them. A sequence diagram is an introduction that empathizes the time ordering of messages. :raphically a sequence diagram is a table that shows ob$ects arranged along the E0axis and messages ordered in increasing time along the F0axis.
1,
Admin
!mployee "anager
5egister
!mployee <etails
Aogin
"aintance
Aogin
"aintance
Aogin
"aintance
Acti'ity Diagram
1-
5egister
Aogin
Admin
"anager
!mployee
!mployee <etails
%ime ?heet
#ro$ect <etails
Aogout
1.
1/
1;
$;R "iagrams:
%he !ntity05elationship 2!53 model was originally proposed by #eter in 1;.H7hen.-I as a way to unify the network and relational database views. ?imply stated the !5 model is a conceptual data model that views the real world as entities and relationships. A basic component of the model is the !ntity05elationship diagram which is used to visually represent data ob$ects. ?ince 7hen wrote his paper the model has been extended and today it is commonly used for database design or the database designer, the utility of the !5 model isB (t maps well to the relational model. %he constructs used in the !5 model can easily be transformed into relational tables. (t is simple and easy to understand with a minimum of training. %herefore, the model can be used by the database designer to communicate the design to the end user. (n addition, the model can be used as a design plan by the database developer to implement a data model in specific database management software.
Connectivity an
Car inality
&9
%he basic types of connectivity for relations areB one0to0one, one0to0many, and many0 to0many. A one-to-one 21B13 relationship is when at most one instance of a entity A is associated with one instance of entity 4. or example, Jemployees in the company are each assigned their own office. or each employee there exists a unique office and for each office there exists a unique employee. A one-to-many 21BD3 relationships is when for one instance of entity A, there are zero, one, or many instances of entity 4, but for one instance of entity 4, there is only one instance of entity A. An example of a 1BD relationships is a department has many employees !ach employee is assigned to one department A many-to-many 2"BD3 relationship, sometimes called non0specific, is when for one instance of entity A, there are zero, one, or many instances of entity 4 and for one instance of entity 4 there are zero, one, or many instances of entity A. %he connectivity of a relationship describes the mapping of associated
$R &otation
&1
&&
Mo !les
PRO<$CT MO"34$S
&*
MO"34$ "$SCR%PT%O&
&ame o7 t,e mo !le = ): A.ministrator "escri#tion:
Administrator should be able to block fraudulent users from using the system. Admin should be able to add more categories and merge categories. %his module has to maintain the 'ser, registering the Administrators, changing the passwords. "aintains the (nformation about Administrator and maintains the records of all the employees
S!b mo !les: "egistration (age Login page )orgot password $&ange password mployee Details
&+
Registration Page:
(n this sub module we add the details of the user like user name, contact no, email id, password and report by taking the primary constraint user id. And it also adds these details in database.
4ogin Page:
(n this sub module the user gives his login and password to enter. (f he is valid he enters into resume wizard. (f he is not valid he it wants valid.
Forgot Passwor :
(f the user forgot his password, he enter into forget password page there by giving details he get his password.
C,ange Passwor :
(f the user wants to change his password he can change his password by giving some details
Employee Details:
"aintains all the details of the employees like in which block he was working, his pro$ect manager etc.
&,
Time S,eet:
8e maintains %ime sheet like at what time in, time out and how many hours he work and what the work assign to him
S!b mo !les:
(ro*ect Details Lea'e Apply )orm $lient Details
&-
Project "etails:
8e maintains #ro$ect <etails like how many #ro$ects are running, how many number working on that.
Client "etails:
8e maintains client details like whose are the clients to their pro$ects.
&.
%m#lement ation
&/
Conce#ts an Tec,ni9!es
&;
*9
ramework, is a
comprehensive, ob$ect0oriented collection of reusable types that you can use to develop applications ranging from traditional command0line or graphical user interface 2:'(3 applications to applications based on the latest innovations provided by A?#.D!%, such as Web orms and E"A Web services. %he .D!% ramework can be hosted by unmanaged components that load the common language runtime into their processes and initiate the execution of managed code, thereby creating a software environment that can exploit both managed and unmanaged features. %he .D!% ramework not only provides several runtime hosts, but also supports the development of third0party runtime hosts. or example, A?#.D!% hosts the runtime to provide a scalable, server0side environment for managed code. A?#.D!% works directly with the runtime to enable Web orms applications and E"A Web services, both of which are discussed later in this topic. (nternet !xplorer is an example of an unmanaged application that hosts the runtime 2in the form of a "("! type extension3. 'sing (nternet !xplorer to host the runtime enables you to embed managed components or Windows orms controls in 8%"A documents. 8osting the runtime in this way makes managed mobile code 2similar to "icrosoftM ActiveEM controls3 possible, but with significant improvements that only managed code can offer, such as semi0trusted execution and secure isolated file storage. %he following illustration shows the relationship of the common language runtime and the class library to your applications and to the overall system. %he illustration also shows how managed code operates within a larger architecture.
*1
*&
%he runtime also accelerates developer productivity. or example, programmers can write applications in their development language of choice, yet take full advantage of the runtime, the class library, and components written in other languages by other developers. Any compiler vendor who chooses to target the runtime can do so. Aanguage compilers that target the .D!% ramework make the features of the .D!% ramework available to existing code written in that language, greatly easing the migration process for existing applications. While the runtime is designed for the software of the future, it also supports software of today and yesterday. (nteroperability between managed and unmanaged code enables developers to continue to use necessary 7=" components and <AAs. %he runtime is designed to enhance performance. Although the common language runtime provides many standard runtime services, managed code is never interpreted. A feature called $ust0in0time 2N(%3 compiling enables all managed code to run in the native machine language of the system on which it is executing. "eanwhile, the memory manager removes the possibilities of fragmented memory and increases memory locality0of0reference to further increase performance. inally, the runtime can be hosted by high0performance, server0side applications, such as "icrosoftM ?OA ?erverP and (nternet (nformation ?ervices 2((?3. %his infrastructure enables you to use managed code to write your business logic, while still en$oying the superior performance of the industryLs best enterprise servers that support runtime hosting.
**
integrate with the common language runtime. %he class library is ob$ect oriented, providing types from which your own managed code can derive functionality. %his not only makes the .D!% ramework types easy to use, but also reduces the time associated with learning new features of the .D!% ramework. (n addition, third0party components can integrate seamlessly with classes in the .D!% ramework. or example, the .D!% ramework collection classes implement a set of interfaces that you can use to develop your own collection classes. Four collection classes will blend seamlessly with the classes in the .D!% ramework. As you would expect from an ob$ect0oriented class library, the .D!% ramework types enable you to accomplish a range of common programming tasks, including tasks such as string management, data collection, database connectivity, and file access. (n addition to these common tasks, the class library includes types that support a variety of specialized development scenarios. or example, you can use the .D!% ramework to develop the following types of applications and servicesB
7onsole applications. ?cripted or hosted applications. Windows :'( applications 2Windows orms3. A?#.D!% applications. E"A Web services. Windows services.
or example, the Windows orms classes are a comprehensive set of reusable types that vastly simplify Windows :'( development. (f you write an A?#.D!% Web orm application, you can use the Web orms classes.
*+
attributes associated with forms. (n some cases the underlying operating system does not support changing these attributes directly, and in these cases the .D!% ramework automatically recreates the forms.
*,
%his is one of many ways in which the .D!% ramework integrates the developer interface, making coding simpler and more consistent. 'nlike ActiveE controls, Windows orms controls have semi0trusted access to a userLs computer. %his means that binary or natively executing code can access some of the resources on the userLs system 2such as :'( elements and limited file access3 without being able to access or compromise other resources. 4ecause of code access security, many applications that once needed to be installed on a userLs system can now be safely deployed through the Web. Four applications can implement the features of a local application while being deployed like a Web page.
Server;si e manage
co e
A?#.D!% is the hosting environment that enables developers to use the .D!% ramework to target Web0based applications. 8owever, A?#.D!% is more than $ust a runtime hostK it is a complete architecture for developing Web sites and (nternet0 distributed ob$ects using managed code. 4oth Web orms and E"A Web services use ((? and A?#.D!% as the publishing mechanism for applications, and both have a collection of supporting classes in the .D!% ramework.
*-
E"A Web services, an important evolution in Web0based technology, are distributed, server0side application components similar to common Web sites. 8owever, unlike Web0based applications, E"A Web services components have no '( and are not targeted for browsers such as (nternet !xplorer and Detscape Davigator. (nstead, E"A Web services consist of reusable software components designed to be consumed by other applications, such as traditional client applications, Web0based applications, or even other E"A Web services. As a result, E"A Web services technology is rapidly moving application development and deployment into the highly distributed environment of the (nternet. (f you have used earlier versions of A?# technology, you will immediately notice the improvements that A?#.D!% and Web orms offers. or example, you can develop Web orms pages in any language that supports the .D!% ramework. (n addition, your code no longer needs to share the same file with your 8%%# text 2although it can continue to do so if you prefer3. Web orms pages execute in native machine language because, like any other managed application, they take full advantage of the runtime. (n contrast, unmanaged A?# pages are always scripted and interpreted. A?#.D!% pages are faster, more functional, and easier to develop than unmanaged A?# pages because they interact with the runtime like any managed application. %he .D!% ramework also provides a collection of classes and tools to aid in
development and consumption of E"A Web services applications. E"A Web services are built on standards such as ?=A# 2a remote procedure0call protocol3, E"A 2an extensible data format3, and W?<A 2the Web ?ervices <escription Aanguage3. %he .D!% ramework is built on these standards to promote interoperability with non0 "icrosoft solutions. or example, the Web ?ervices <escription Aanguage tool included with the .D!% ramework ?<6 can query an E"A Web service published on the Web, parse its W?<A description, and produce 7R or 1isual 4asic source code that your application can use to become a client of the E"A Web service.
*.
%he source code can create classes derived from classes in the class library that handle all the underlying communication using ?=A# and E"A parsing. Although you can use the class library to consume E"A Web services directly, the Web ?ervices <escription Aanguage tool and the other tools contained in the ?<6 facilitate your development efforts with the .D!% ramework. (f you develop and publish your own E"A Web service, the .D!% ramework
provides a set of classes that conform to all the underlying communication standards, such as ?=A#, W?<A, and E"A. 'sing those classes enables you to focus on the logic of your service, without concerning yourself with the communications infrastructure required by distributed software development. inally, like Web orms pages in the managed environment, your E"A Web service will run with the speed of native machine language using the scalable communication of ((?.
*/
Simplicity. A?#.D!% makes it easy to perform common tasks, from simple form
submission and client authentication to deployment and site configuration. or example, the A?#.D!% page framework allows you to build user interfaces that cleanly separate application logic from presentation code and to handle events in a simple, 1isual 4asic 0 like forms processing model. Additionally, the common language runtime simplifies development, with managed code services such as automatic reference counting and garbage collection.
*;
$ustomi/a.ility and
architecture that allows developers to Jplug0inJ their code at the appropriate level. (n fact, it is possible to extend or replace any subcomponent of the A?#.D!% runtime with your own custom0written component. (mplementing custom authentication or state services has never been easier.
4ang!age S!##ort
%he "icrosoft .D!% #latform currently offers built0in support for three languagesB 7R, 1isual 4asic, and N?cript.
+9
+1
Crystal Re#orts
+&
Re#ort $6#erts
'sing the 7rystal 5eport !xperts, you can quickly create reports based on your development needsB 7hoose from report layout options ranging from standard reports to form letters, or build your own report from scratch. <isplay charts that users can drill down on to view detailed report data. 7alculate summaries, subtotals, and percentages on grouped data. ?how %opD or 4ottomD results of data. 7onditionally format text and rotate text ob$ects.
+*
"atabase
A database is similar to a data file in that it is a storage place for data. Aike a data file, a database does not present information directly to a userK the user runs an application that accesses data from the database and presents it to the user in an understandable format. A database typically has two componentsB the files holding the physical database and the database management system 2<4"?3 software that applications use to access data. %he <4"? is responsible for enforcing the database structure, includingB "aintaining the relationships between data in the database. !nsuring that data is stored correctly and that the rules defining data relationships are not violated. 5ecovering all data to a point of known consistency in case of system failures.
Relational "atabase
%here are different ways to organize data in a database but relational databases are one of the most effective. 5elational database systems are an application of mathematical set theory to the problem of effectively organizing data. (n a relational database, data is collected into tables 2called relations in relational theory3.
++
ClientBServer:;
(n a client)server system, the server is a relatively large computer in a central location that manages a resource used by many people. When individuals need to use the resource, they connect over the network from their computers, or clients, to the server. !xamples of servers areB (n client)server database architecture, the database files and <4"? software reside on a server. A communications component is provided so applications can run on separate clients and communicate to the database server over a network. %he ?OA ?erver communication component also allows communication between an application running on the server and ?OA ?erver. ?erver applications are usually capable of working with several clients at the same time. ?OA ?erver can work with thousands of client applications simultaneously. %he server has features to prevent the logical problems that occur if a user tries to read or modify data currently being used by others. While ?OA ?erver is designed to work as a server in a client)server network, it is also capable of working as a stand0alone database directly on the client. %he scalability and ease0of0use features of ?OA ?erver allow it to work efficiently on a client without consuming too many resources.
+,
%o work with data in a database, you must use a set of commands and statements 2language3 defined by the <4"? software. %here are several different languages that can be used with relational databasesK the most common is ?OA. 4oth the American Dational ?tandards (nstitute 2AD?(3 and the (nternational ?tandards =rganization 2(?=3 have defined standards for ?OA. "ost modern <4"? products support the !ntry Aevel of ?OA0;&, the latest ?OA standard 2published in 1;;&3.
$ase o7 installationE
e#loymentE an
!se
?OA ?erver includes a set of administrative and development tools that improve your ability to install, deploy, manage, and use ?OA ?erver across several sites.
Scala.ility
%he same database engine can be used across platforms ranging from laptop computers running "icrosoft WindowsM ;,);/ to large, multiprocessor servers running "icrosoft Windows D%M, !nterprise !dition.
Data ware&ousing
?OA ?erver includes tools for extracting and analyzing summary data for online analytical processing 2=AA#3. ?OA ?erver also includes tools for visually designing databases and analyzing data using !nglish0based questions.
+-
"atabases
A database in "icrosoft ?OA ?erver consists of a collection of tables that contain data, and other ob$ects, such as views, indexes, stored procedures, and triggers, defined to support activities performed with the data. %he data stored in a database is usually related to a particular sub$ect or process, such as inventory information for a manufacturing warehouse. ?OA ?erver can support many databases, and each database can store either interrelated data or data unrelated to that in the other databases. or example, a server can have one database that stores personnel data and another that stores product0related data. Alternatively, one database can store current customer order data, and anotherK related database can store historical customer orders that are used for yearly reporting. 4efore you create a database, it is (mportant to understand the parts of a database and how to design these parts to ensure that the database performs well after it is implemented.
&ormaliFation t,eory:
5elations are to be normalized to avoid anomalies. (n insert, update and delete operations. Dormalization theory is built around the concept of normal forms. A relation is said to be in a particular form if it satisfies a certain specified set if constraints. %o decide a suitable logical structure for given database design the concept of normalization, which are briefly described below. 1. 1 st Dormal orm 21 D. 3B A relation is said to be in 1 D is and only if all unaligned domains contain values only. %hat is the fields of an n0set should have no group items and no repeating groups. &. & nd Dormal orm 2& D. 3 B A relation is said to be in & D is and only if it is in 1 D and every non key attribute is fully dependent on primary key. %his normal takes care of functional dependencies on non0key attributes.
+.
*.
* rd Dormal orm 2* D. 3 B A relation is said to be in * D is and only if it is in & D and every non key attribute is non transitively dependent on the primary key. %his normal form avoids the transitive dependencies on the primary key.
+.
4oyce code Dormal orm 247D 3 B %his is a stronger definition than that of D . A relation is said to be in 47D if and only if every determinant is a 7andidate key.
,.
+ th Dormal orm 2+ D 3 B A relation is said to be in + D if and only if whenever there exists a multi valued dependency in a relation say A0U0U4 then all of the relation are also functionally dependent on A2i.e. A0UE for all attributes x of the relation.3.
-.
, th Dormal orm 2, D 3 =5
relation 5 is in , D .if and only if every $oin dependency in 5 is implied by the candidate key on 5. A relation can>t be non0loss split into two tables but can be split into three tables. %his is called Noin <ependency.
Mi
leware Tec,nology
+/
+;
%hese ob$ects areB 7onnections. or connection to and managing transactions against a database. 7ommands. or issuing ?OA commands against a database. <ata 5eaders. or reading a forward0only stream of data records from a ?OA
?erver data source. <atasets. or storing, removing and programming against flat data, E"A data and relational data. <ata Adapters. database. When dealing with connections to a database, there are two different optionsB ?OA ?erver .D!% <ata #rovider 2?ystem.<ata.?ql7lient3 and =A! <4 .D!% <ata #rovider 2?ystem.<ata.=le<b3. (n these samples we will use the ?OA ?erver .D!% <ata #rovider. %hese are written to talk directly to "icrosoft ?OA ?erver. %he =A! <4 .D!% <ata #rovider is used to talk to any =A! <4 provider 2as it uses =A! <4 underneath3. or pushing data into a <ataset, and reconciling data against a
$onnections
7onnections are used to Ltalk toL databases, and are represented by provider0specific classes such as ?OA7onnection. 7ommands travel over connections and result sets are returned in the form of streams which can be read by a <ata 5eader ob$ect, or pushed into a <ataset ob$ect.
$ommands
7ommands contain the information that is submitted to a database, and are represented by provider0specific classes such as ?OA7ommand. A command can be a stored procedure call, an '#<A%! statement, or a statement that returns results. Fou can also use input and output parameters, and return values as part of your command syntax.
,9
Data "eaders
%he <ata 5eader ob$ect is somewhat synonymous with a read0only)forward0only cursor over data. %he <ata 5eader A#( supports flat as well as hierarchical data. A <ata 5eader ob$ect is returned after executing a command against a database. %he format of the returned <ata 5eader ob$ect is different from a record set. or example, you might use the <ata 5eader to show the results of a search list in a web page.
Datasets
%he <ataset ob$ect is similar to the A<= 5ecord set ob$ect, but more powerful, and with one other important distinctionB the <ataset is always disconnected. %he <ataset ob$ect represents a cache of data, with database0like structures such as tables, columns, relationships, and constraints. 8owever, though a <ataset can and does behave much like a database, it is important to remember that <ataset ob$ects do not interact directly with databases, or other source data. %his allows the developer to work with a programming model that is always consistent, regardless of where the source data resides. <ata coming from a database, an E"A file, from code, or user input can all be placed into <ataset ob$ects. %hen, as changes are made to the <ataset they can be tracked and verified before updating the source data. %he :et 7hanges method of the <ataset ob$ect actually creates a second <ataset that contains only the changes to the data. %his <ataset is then used by a <ata Adapter 2or other ob$ects3 to update the original data source. %he <ataset has many E"A characteristics, including the ability to produce and consume E"A data and E"A schemas. E"A schemas can be used to describe schemas interchanged via Web ?ervices. (n fact, a <ataset with a schema can actually be compiled for type safety and statement completion.
,1
or other =A! <40supported databases, you would use the =le<b<ataAdapter ob$ect and its associated =le<b7ommand and =le<b7onnection ob$ects. %he <ata Adapter ob$ect uses commands to update the data source after changes have been made to the <ataset. 'sing the ill method of the <ata Adapter calls the ?!A!7% commandK using the 'pdate method calls the (D?!5%, '#<A%! or <!A!%! command for each changed row. Fou can explicitly set these commands in order to control the statements used at runtime to resolve changes, including the use of stored procedures. or ad0hoc scenarios, a 7ommand 4uilder ob$ect can generate these at run0time based upon a select statement. 8owever, this run0time generation requires an extra round0trip to the server in order to gather required metadata, so explicitly providing the (D?!5%, '#<A%!, and <!A!%! commands at design time will result in better run0time performance. 1. A<=.D!% is the next evolution of A<= for the .Det ramework. &. A<=.D!% was created with n0%ier, statelessness and E"A in the forefront. %wo new ob$ects, the <ataset and <ata Adapter, are provided for these scenarios. A<=.D!% can be used to get data from a stream, or to store data in a cache for updates. *. %here is a lot more information about A<=.D!% in the documentation. +. 5emember, you can execute a command directly against the database in order to do inserts, updates, and deletes. Fou donLt need to first put data into a <ataset in order to insert, update, or delete it.
,&
you are able to respond to user0initiated events quite easily. ?ome effects that are now possible with $ava script were some time ago only possible with 7:(. ?o you can create really sophisticated pages with the helps of $ava script on the (nternet.
,*
ShtmlU SheadU "y first Nava?cript S)headU SbodyUSbrU %his is a normal 8%"A document SbrU Sscript languageXYNava?criptYU <ocument.write 2Zthis is a $ava scriptY3 S)scriptUSb rU 4acking 8%"A again S)bodyU S)htmlU (f you are using a $ava script enabled0browser at the moment then you will have the possibility to see this script working. (f your browser doesn>t support Nava ?cript then this output might be some kind of strange[ %his is a normal 8%"A document %his is $ava script\ 4ack in 8%"A again.
,+
F!nctions
unctions are bet declared between the S8eadU tag of 8%"A page. unctions are
called by user0initiated events. ?eems reasonable to keep the functions between the S8eadU tags. %hey are loaded first before a user can do anything that might call a function. ?cripts can be placed between inside comment fields to ensure that older browser do not display the script itself. ShtmlU SheadU Sscript languageXYNava?criptYU function pushbutton 23 ] alert 2Z8ello\Y3K ^ S)scriptU S)headU SbodyU SformU Sinput typeXYbuttonY nameXY4utton1Y valueXYpush meY onclickXYpushbutton 23YU S)formU S)bodyU S)htmlU
,,
-ample
S orm method X:!% actionXhttpB))www.mycompany.com)cgi0bin)upfdate.plU [[[ S)formU
%n#!t elements(
'se the SinputU tag to define any one of a number of common form elements including text fields multiple choice lists click able images and submission buttons. %here are many attributers for this tag only that types and name attributes are required for each element, each type of input element uses only a subset of the followed attributes. Additional SinputU attributes may be required based upon which type of the form element you specify.
Su.mit .utton+
%he submit button 2Sinput typeXsubmitU3 does what its name implies, settings in motion the form>s submission to the server from the browser. We many have more than submit buttons will be added to the parameter list the browser sends along to the server. -ample S (nput type XYsubmitYU
,-
"eset .utton+
%he reset button if firm SinputU button is nearly self0 explanatoryK it lets the user reset erase or set to some default value all elements in the form. 4y default the browser displays a reset button worth the label ZresetY. We can change that by specifying a value attribute with tour own button label.
"ATABAS$ MO"$4S
A<=.D!% and accessing the database through applets and A<=.D!% A#( via an intermediate server resulted server resulted in a new type of database model which is different from the client0server model. 4ased on number of intermediate server through the request should go it is named as single tire, two tire and multi tire architecture
Single %ier
(n a single tier the server and client are the same in the sense that a client program that needs information 2client3 and the source of this type of architecture is also possible in $ava, in case flat files are used to store the data. 8owever this is useful only in case of small applications. %he advantage with this is the simplicity and portability of the application developed.
<atabase
,.
?erver
7lient
<atabase 7lient
,/
CH 4ang!age
"# 2pronounced 7 ?harp3 is a multi0paradigm programming language that encompasses functional, imperative, generic, ob$ect0oriented 2class0based3, and component0oriented programming disciplines. (t was developed by "icrosoft as part of the .D!% initiative and later approved as a standard by !7"A 2E"MA099:3 and (?= 2*S+;*E" 292<03. 7R is one of the ++ programming languages supported by the .D!% rameworkLs 7ommon Aanguage 5untime. 7R is intended to be a simple, modern, general0purpose, ob$ect0oriented programming language. Anders 8e$lsberg, the designer of <elphi, leads the team which is developing 7R. (t has an ob$ect0oriented syntax based on 7QQ and is heavily influenced by other programming languages such as <elphi and Nava. (t was initially named 7ool, which stood for J7 like =b$ect =riented AanguageJ. 8owever, in Nuly &999, when "icrosoft made the pro$ect public, the name of the programming language was given as 7R. %he most recent version of the language is 7R *.9 which was released in con$unction with the .D!% ramework *., in &99.. %he next proposed version, 7R +.9, is in development.
8istory
,;
(n 1;;-, ?un "icrosystems released the Nava programming language with "icrosoft soon purchasing a license to implement it in their operating system. Nava was originally meant to be a platform independent language, but "icrosoft, in their implementation, broke their license agreement and made a few changes that would essentially inhibit NavaLs platform0independent capabilities. ?un filed a lawsuit and "icrosoft settled, deciding to create their own version of a partially compiled, partially interpreted ob$ect0oriented programming language with syntax closely related to that of 7QQ.
<uring the development of .D!%, the class libraries were originally written in a language)compiler called ?imple "anaged 7 2?"73. (n Nanuary 1;;;, Anders 8e$lsberg formed a team to build a new language at the time called 7ool, which stood for J7 like =b$ect =riented AanguageY. "icrosoft had considered keeping the name J7oolJ as the final name of the language, but chose not to do so for trademark reasons. 4y the time the .D!% pro$ect was publicly announced at the Nuly &999 #rofessional <evelopers 7onference, the language had been renamed 7R, and the class libraries and A?#.D!% runtime had been ported to 7R. 7RLs principal designer and lead architect at "icrosoft is Anders 8e$lsberg, who was previously involved with the design of 1isual NQQ, 4orland <elphi, and %urbo #ascal. (n interviews and technical papers he has stated that flaws in most ma$or programming languages 2e.g. 7QQ, Nava, <elphi, and ?malltalk3 drove the fundamentals of the 7ommon Aanguage 5untime 27A53, which, in turn, drove the design of the 7R programming language itself. ?ome argue that 7R shares roots in other languages.
Feat!res o7 CH:;
-9
Aocal variables cannot shadow variables of the enclosing block, unlike 7 and 7QQ. 1ariable shadowing is often considered confusing by 7QQ texts. 7R supports a strict 4oolean data type, bool. ?tatements that take conditions, such as
while
and if, require an expression of a 4oolean type. While 7QQ also has a
4oolean type, it can be freely converted to and from integers, and expressions such as if (a) require only that a is convertible to bool, allowing a to be an int, or a pointer. 7R disallows this Jinteger meaning true or falseJ approach on the grounds that forcing programmers to use expressions that return exactly bool can prevent certain types of programming mistakes such as if (a = b) 2use of = instead of ==3. (n 7R, memory address pointers can only be used within blocks specifically marked as unsafe, and programs with unsafe code need appropriate permissions to run. "ost ob$ect access is done through safe ob$ect references, which are always either pointing to a valid, existing ob$ect, or have the well0defined null valueK a reference to a garbage0collected ob$ect, or to random block of memory, is impossible to obtain. An unsafe pointer can point to an instance of a value0type, array, string, or a block of memory allocated on a stack. 7ode that is not marked as unsafe can still store and manipulate pointers through the ?ystem.(nt#tr type, but cannot dereference them.
-1
7R is more type safe than 7QQ. %he only implicit conversions by default are those which are considered safe, such as widening of integers and conversion from a derived type to a base type. %his is enforced at compile0time, during N(%, and, in some cases, at runtime. %here are no implicit conversions between 4ooleans and integers, nor between enumeration members and integers 2except for literal 9, which can be implicitly converted to any enumerated type3. Any user0defined conversion must be explicitly marked as explicit or implicit, unlike 7QQ copy constructors 2which are implicit by default3 and conversion operators 2which are always implicit3.
!numeration members are placed in their own scope. 7R provides syntactic sugar for a common pattern of a pair of methods, accessor 2getter3 and mutator 2setter3 encapsulating operations on a single attribute of a class, in form of properties.
ull type reflection and discovery is available. 7R currently 2as of * Nune &99/3 has .. reserved words.
-&
Categories o7
ata ty#es
7%? separate data types into two categoriesB 1alue types 5eference types
1alue types are plain aggregations of data. (nstances of value types do not have referential identity nor referential comparison semantics 0 equality and inequality comparisons for value types compare the actual data values within the instances, unless the corresponding operators are overloaded. 1alue types are derived from ?ystem.1alue%ype, always have a default value, and can always be created and copied. ?ome other limitations on value types are that they cannot derive from each other 2but can implement interfaces3 and cannot have a default 2parameter less3 constructor. !xamples of value types are some primitive types, such as int 2a signed *&0bit integer3, float 2a *&0bit (!!! floating0point number3, char 2a 1-0bit 'nicode code point3, and ?ystem.<ate%ime 2identifies a specific point in time with millisecond precision3. (n contrast, reference types have the notion of referential identity 0 each instance of reference type is inherently distinct from every other instance, even if the data within both instances is the same. %his is reflected in default equality and inequality comparisons for reference types, which test for referential rather than structural equality, unless the corresponding operators are overloaded 2such as the case for ?ystem.?tring3. (n general, it is not always possible to create an instance of a reference type, nor to copy an existing instance, or perform a value comparison on two existing instances, though specific reference types can provide such services by exposing a
-*
Bo6ing an
!nbo6ing
Boxing is the operation of converting a value of a value type into a value of a corresponding reference type.
-ample+ int foo X +&K ob$ect bar X fooK )) 1alue type... )) foo is boxed to bar.
Unboxing is the operation of converting a value of a reference type 2previously boxed3 into a value of a value type. -ample+ int foo X +&K ob$ect bar X fooK )) 1alue type. )) foo is boxed to bar.
Feat!res o7 CH *(A
Dew features in 7R for the .D!% ?<6 &.9 2corresponding to the *rd edition of the !7"A0**+ standard3 isB
Partial class
-+
:enerics
:enerics, or parameterized types, or parametric polymorphism is a .D!% &.9 feature supported by 7R. 'nlike 7QQ templates, .D!% parameterized types are instantiated at runtime rather than by the compilerK hence they can be cross0language whereas 7QQ templates cannot. %hey support some features not supported directly by 7QQ templates such as type constraints on generic parameters by use of interfaces. =n the other hand, 7R does not support non0type generic parameters. 'nlike generics in Nava, .D!% generics use reification to make parameterized types first0class ob$ects in the 7A(
-,
Static classes
?tatic classes are classes that cannot be instantiated or inherited from, and that only allow static members. %heir purpose is similar to that of modules in many procedural languages.
o7
iterator
#rovi ing
generator
A new form of iterator that provides generator functionality, using a yield return construct similar to yield in #ython. )) "ethod that takes an iterable input 2possibly an array3 )) and returns all even numbers. public static (!numerableSintU :et!ven2(!numerableSintU numbers3 ] foreach 2int i in numbers3 ] if 2i T & XX 93 yield return iK ^ ^
Anonymo!s
elegates
Anonymous delegates provide closure functionality in 7R. 7ode inside the body of an anonymous delegate has full read)write access to local variables, method parameters,
--
"elegate covariance an
return and parameter types, respectively.
contravariance
7onversions from method groups to delegate types are covariant and contravariant in
&!llable ty#es
-.
to the set of allowed values for any value type. %his provides improved
interaction with ?OA databases, which can have nullable columns of types corresponding to 7R primitive typesB an ?OA INTEGER N !! column type directly translates to the 7R int?. Dullable types received an eleventh0hour improvement at the end of August &99,, mere weeks before the official launch, to improve their boxing characteristicsB a nullable variable which is assigned null is not actually a null reference, but rather an instance of struct Nullable"T# with property $as%alue equal to false. When boxed, the Nullable instance itself is boxed, and not the value stored in it, so the resulting reference would always be non0null, even for null values. %he following code illustrates the corrected flawB
int_ i X nullK ob$ect o X iK if 2o XX null3 7onsole.WriteAine2J7orrect behaviour 0 runtime version from ?eptember &99, or laterJ3K else 7onsole.WriteAine2J(ncorrect behaviour 0 pre0release runtime 2from before ?eptember &99,3J3K When copied into ob$ects, the official release boxes values from Dullable instances, so null values and null references are considered equal. %he late nature of this fix caused some controversy, since it required core07A5 changes affecting not only .D!%&, but all dependent technologies 2including 7R, 14, ?OA ?erver &99, and 1isual ?tudio &99,3.
-/
"ATABAS$ TAB4$S:
3ser 4ogin Table
Name empid password N!ll;Not N!ll Dot Dull Dull Ty,e varchar2&93 varchar2&93 ?ey #rimary 6ey
-;
.9
Project "etails
Name id1 pro$ectname assigneddate deliverydate client N!ll;Not N!ll Dull Dull Dull Dull Dull Ty,e varchar2&93 varchar2&93 datetime datetime varchar2&93 ?ey
F$AS%B%4%T5 ST3"5:
easibility study is conducted once the problem is clearly understood. easibility study is a high level capsule version of the entire system analysis and design process. %he ob$ective is to determine quickly at a minimum expense how to solve a problem. %he purpose of feasibility is not to solve the problem but to determine if the problem is worth solving. %he system has been tested for feasibility in the following points. 1. %echnical easibility &. !conomical easibility *. =perational easibility.
Tec,nical Feasibility
.1
$conomical Feasibility
%he computerized system will help in automate the selection leading the profits and details of the organization. With this software, the machine and manpower utilization are expected to go up by /90;9T approximately. %he costs incurred of not creating the system are set to be great, because precious time can be wanted by manually.
O#erational Feasibility
(n this pro$ect, the management will know the details of each pro$ect where he may be presented and the data will be maintained as decentralized and if any inquires for that particular contract can be known as per their requirements and necessaries.
%m#lementation:
(mplementation is the stage where the theoretical design is turned into a working system. %he most crucial stage in achieving a new successful system and in giving confidence on the new system for the users that it will work efficiently and effectively. %he system can be implemented only after thorough testing is done and if it is found to work according to the specification.
.&
(t involves careful planning, investigation of the current system and its constraints on implementation, design of methods to achieve the change over and an evaluation of change over methods a part from planning. %wo ma$or tasks of preparing the implementation are education and training of the users and testing of the system. %he more complex the system being implemented, the more involved will be the systems analysis and design effort required $ust for implementation. %he implementation phase comprises of several activities. %he required hardware and software acquisition is carried out. %he system may require some software to be developed. or this, programs are written and tested. %he user then changes over to his new fully tested system and the old system is discontinued.
T$ST%&::
%he testing phase is an important part of software development. (t is the computerized system will help in automate process of finding errors and missing operations and also a complete verification to determine whether the ob$ectives are met and the user requirements are satisfied. ?oftware testing is carried out in three stepsB 1. %he first includes unit testing, where in each module is tested to provide
its correctness, validity and also determine any missing operations and to verify whether the ob$ectives have been met. !rrors are noted down and corrected immediately. 'nit testing is the important and ma$or part of the pro$ect. ?o errors are rectified easily in particular module and program clarity is increased. (n this pro$ect
.*
the software whose modules when run individually and showing perfect results, will also show perfect results when run as a whole. %he individual modules are clipped under this ma$or module and tested again and verified the results. %his is due to poor interfacing, which may results in data being lost across an interface. A module can have inadvertent, adverse effect on any other or on the global data structures, causing serious problems. *. %he final step involves validation and testing which determines which
the software functions as the user expected. 8ere also some modifications were. (n the completion of the pro$ect it is satisfied fully by the end user.
Maintenance an
environment:
A? the number of computer based systems, grieve libraries of computer software began to expand. (n house developed pro$ects produced tones of thousand soft program source statements. ?oftware products purchased from the outside added hundreds of thousands of new statements. A dark cloud appeared on the horizon. All of these programs, all of those source statements0had to be corrected when false were detected, modified as user requirements changed, or adapted to new hardware that was purchased. %hese activities were collectively called software "aintenance. %he maintenance phase focuses on change that is associated with error correction, adaptations required as the softwareLs environment evolves, and changes due to enhancements brought about by changing customer requirements. changes are encountered during the maintenance phase. 7orrection Adaptation our types of
.+
Correction:
!ven with the best quality assurance activities is lightly that the customer will uncover defects in the software. 7orrective maintenance changes the software to correct defects. "aintenance is a set of software !ngineering activities that occur after software has been delivered to the customer and put into operation. ?oftware configuration management is a set of tracking and control activities that began when a software pro$ect begins and terminates only when the software is taken out of the operation.
We may define maintenance by describing four activities that are undertaken after a program is released for useB 7orrective "aintenance Adaptive "aintenance #erfective "aintenance or !nhancement #reventive "aintenance or reengineering =nly about &9 percent of all maintenance work are spent Jfixing mistakesJ. %he remaining /9 percent are spent adapting existing systems to changes in their external environment, making enhancements requested by users, and reengineering an application for use.
ADA(%A%I19+
.,
97A9$ M 9%+
As software is used, the customer)user will recognize additional functions that will provide benefit. #erceptive maintenance extends the software beyond its original function requirements.
(" : 9%I19+
7omputer software deteriorates due to change, and because of this, preventive maintenance, often called software re engineering, must be conducted to enable the software to serve the needs of its end users. (n essence, preventive maintenance makes changes to computer programs so that they can be more easily corrected, adapted, and enhanced. ?oftware configuration management 2?7"3 is an umbrella activity that is applied throughout the software process.
SOFTWAR$ M$T8O"O4O:5
%he software methodology followed in this pro$ect includes the ob$ect0oriented methodology and the application system development methodologies. %he description of these methodologies is given below.
.-
%he phases in the life cycle for information system development are described differently by different writers, but the differences are primarily in the amount of necessity and manner of categorization. %here is a general agreement on the flow of development steps and the necessity for control procedures at each stage. %he information system development cycle for an application consists of three ma$or stages. <efinition. <evelopment. (nstallation and operation. %he first stage of the process, which defines the information requirements for a feasible cost effective system. %he requirements are then translated into a physical
..
"e7inition
#roposed definition B preparation of request for proposed applications.
easibility assessmentB evaluation of feasibility and cost benefit of proposed system. (nformation requirement analysisB determination of information needed.
Design
7onceptual design #hysical system designB B 'ser0oriented design of application development. <etailed design of flows and processes in applications
De'elopment
#rogram development #rocedure development B coding and testing of computer programs. B design of procedures and preparation of user instructions.
and results of use at the completion of the each phase, formal approval sign0off is required from the users as well as from the manager of the pro$ect development.
./
8TM4 CO"$:
ST` #age AanguageXJ7RJ "aster#age ileXJa)login.masterJ (nheritsXJ!mployeesJ
7ode ileXJ!mployee.aspx.csJ
Stable styleXJz0indexB 19,K leftB *&9pxK positionB absoluteK topB 1&9pxJU StrU Std styleXJwidthB ,1pxK heightB &-pxKJU
.;
Std styleXJwidthB 199pxJU SaspB%ext4ox (<XJ%ext4ox*J runatXJserverJUS)aspB%ext4oxUS)tdU S)trU StrU Std styleXJwidthB ,1pxJU SaspBAabel (<XJAabel+J runatXJserverJ %extXJ?kill?etBJUS)aspBAabelU S)tdU Std styleXJwidthB 199pxJU SaspB%ext4ox (<XJ%ext4ox+J runatXJserverJUS)aspB%ext4oxUS)tdU S)trU StrU
/9
Std styleXJwidthB 199pxJU SaspB%ext4ox (<XJ%ext4ox.J runatXJserverJUS)aspB%ext4oxUS)tdU S)trU StrU Std styleXJwidthB ,1pxJU SaspBAabel %extXJWorking loorBJUS)aspBAabelU S)tdU Std styleXJwidthB 199pxJU SaspB%ext4ox (<XJ%ext4ox/J runatXJserverJUS)aspB%ext4oxUS)tdU (<XJAabel/J runatXJserverJ
/1
Std styleXJwidthB ,1pxJU SaspBAabel %extXJ7ontactDumBJUS)aspBAabelU S)tdU Std styleXJwidthB 199pxJU SaspB%ext4ox (<XJ%ext4ox11J runatXJserverJUS)aspB%ext4oxUS)tdU S)trU StrU Std styleXJwidthB ,1pxJU (<XJAabel11J runatXJserverJ
/&
/*
SaspB4utton (<XJ4utton,J runatXJserverJ =n7lickXJ4utton,b7lickJ %extXJUJ )U S)tdU S)trU S)tableU GnbspKSbr )U Sbr )U Sbr )U GnbspK GnbspKGnbspKGnbspKGnbspK
/+
CH CO"$
using ?ystemK using ?ystem.<ataK using ?ystem.7onfigurationK using ?ystem.7ollectionsK using ?ystem.WebK using ?ystem.Web.?ecurityK using ?ystem.Web.'(K
/,
protected void 4utton1b7lick2ob$ect sender, !ventArgs e3 ] cnn.=pen23K string str X Jinsert into ttbwfmb!mployee values2LJ Q %ext4ox1.%ext Q JL,LJ Q %ext4ox&.%ext Q JL,LJ Q %ext4ox*.%ext Q JL,LJ Q %ext4ox+.%ext Q JL,LJ Q %ext4ox,.%ext Q JL,LJ Q %ext4ox-.%ext Q JL,LJ Q %ext4ox..%ext Q JL,LJ Q %ext4ox/.%ext Q JL,LJ Q %ext4ox;.%ext Q JL,LJ Q %ext4ox19.%ext Q JL,LJ Q
/-
/.
//
/;
Testing
Testing
%esting is a process of executing a program with the indent of finding an error. %esting is a crucial element of software quality assurance and presents ultimate review of specification, design and coding.
;9
Testing Objectives:
1. %esting is a process of executing a program with the intent of finding an error &. A good test case is one that has a probability of finding an as yet undiscovered error *. A successful test is one that uncovers an undiscovered error
Testing Princi#les:
All tests should be traceable to end user requirements %ests should be planned long before testing begins %esting should begin on a small scale and progress towards testing in large !xhaustive testing is not possible %o be most effective testing should be conducted by a independent third party
%he primary ob$ective for test case design is to derive a set of tests that has the highest livelihood for uncovering defects in software. %o accomplish this ob$ective two different categories of test case design techniques are used. %hey are
W,ite;bo6 testing:
;1
White box testing focus on the program control structure. %est cases are derived to ensure that all statements in the program have been executed at least once during testing and that all logical conditions have been executed.
Block;bo6 testing:
4lack box testing is designed to validate functional requirements without regard to the internal workings of a program. 4lack box testing mainly focuses on the information domain of the software, deriving test cases by partitioning input and output in a manner that provides through test coverage. (ncorrect and missing functions, interface errors, errors in data structures, error in functional logic are the errors falling in this category.
Testing strategies:
A strategy for software testing must accommodate low0level tests that are necessary to verify that all small source code segments has been correctly implemented as well as high0level tests that validate ma$or system functions against customer requirements.
;&
3nit testing:
'nit testing is essential for the verification of the code produced during the coding phase and hence the goal is to test the internal logic of the modules. 'sing the detailed design description as a guide, important paths are tested to uncover errors with in the boundary of the modules. %hese tests were carried out during the programming stage itself. All units of 1ienna ?OA were successfully tested.
%ntegration testing:
(ntegration testing focuses on unit tested modules and build the program structure that is dictated by the design phase.
System testing:
?ystem testing tests the integration of each module in the system. (t also tests to find discrepancies between the system and it>s original ob$ective, current specification and system documentation. %he primary concern is the compatibility of individual modules. !ntire system is working properly or not will be tested here, and specified path =<47 connection will correct or not, and giving output or not are tested here these verifications and validations are done by giving input values to the system and by comparing with expected output. %op0down testing implementing here.
Acceptance Testing:
;*
Test Cases:
%est cases are derived to ensure that all statements in the program have been executed at least once during testing and that all logical conditions have been executed. 'sing White04ox testing methods, the software engineer can drive test cases that :uarantee that logical decisions on their true and false sides. !xercise all logical decisions on their true and false sides. !xecute all loops at their boundaries and with in their operational bounds. !xercise internal data structure to assure their validity.
%he test case specification for system testing has to be submitted for review before system testing commences.
;+
O!t#!t Screens
;,
;-
;.
)orgot (assword
;/
%ime S&eet
;;
,or;s&eet
199
Admin Login
191
19&
mployee Details
19*
19+
Manager Login
19,
19-
(ro*ect Assigning
19.
(ro*ect 7istory
19/
$lients (ro*ects
19;
(ro*ect Status
119
Logout
111
Concl!s ion
11&
Concl!sion
%he package was designed in such a way that future modifications can be done easily. %he following conclusions can be deduced from the development of the pro$ect. Automation of the entire system improves the efficiency (t provides a friendly graphical user interface which proves to be better when compared to the existing system. (t gives appropriate access to the authorized users depending on their permissions. (t effectively overcomes the delay in communications. 'pdating of information becomes so easier. ?ystem security, data security and reliability are the striking features. %he ?ystem has adequate scope for modification in future if it is necessary.
11*
F!t!re $n,ancements
11+
F!t!re $n,ancements:
%his application avoids the manual work and the problems concern with it. (t is an easy way to obtain the information regarding the various products information that are present in the company. Well ( and my team members have worked hard in order to present an improved website better than the existing one>s regarding the information about the various activities. ?till, we found out that the pro$ect can be done in a better way. #rimarily, when we request information about a particular #ro$ect it $ust shows the employee, pro$ect and no. of quantities available.
11,
B%B4%O:RAP 85
11-
B%B4%O:RAP85
%he following books were referred during the analysis and execution phase of the pro$ect M*"&+S+FT .NET W*T5 "# "icrosoft .net series ASP .NET 2.0 P&+FESS*+NA Wrox #ublishers ASP .NET W*T5 "# 200( Apress #ublications "# "++? 1++? = reilly #ublications P&+6&AMM*N6 M*"&+S+FT ASP .NET 2.0 APP *"AT*+N Wrox #rofessional :uide
11.
11/