Mca 6th Ist Synopsis ASR Website
Mca 6th Ist Synopsis ASR Website
Mca 6th Ist Synopsis ASR Website
………………………………………………………………
………………………………………………………………
…………………………………………………………………………………………………………….
(**Note: At any given point of time, a guide should not provide guidance for more than 5 MCA students
of IGNOU)
6. Software used in the Project ……………………………………………………………..
7. If already pursued BCA/BIT from IGNOU, mention the title of the project (CS-76) and the s/w
used……………………………………………………
8. Project title of the Mini Project (MCS-044) and the s/w used………………………………………………
Govt Sen Sec School Ajnala Amritsar 01-April-2001 to 31-March-2003 Senior Faculty
Govt Sen Sec School Gaggobua
01-April-2003 to 31-March-2004 Senior Faculty
Amritsar
K.V.No.3 New Cantt Amritsar 21-June-2004 to 31-March-2005 Senior Faculty
Publication
I have published Solved Question Papers and Practical Copy on my subject namely
BCA 3rd Year Computer Graphics (Kalyani Publishers)
PGDCA Programming in Visual Basic (Kalyani Publishers)
Practical Copy of B.Com 1st Year.
Seminar
Attended one day seminar on “Parallel and Distributed Computing” at Khalsa College Amritsar.
Participated in two day Workshop on Astrophysics on 6-7 August 2013 collaboration with Vigyan
Prasar, Department of Science and Technology, Government of India.
Research Papers:-
National conference on “LATEST TRENDS IN INFORMATION TECHNOLOGY” Organized by
Himalayan Institute of Computer Science (H.I.C.S) at Kala-Amb (H.P).
Attended two days international conference on TECHNOLOGY AND INFORMATION SYSTEM at
DAV COLLEGE, AMRITSAR.
Published research Paper titled “Saving Cache memory using a locking Cache in real time
system” in Zenith international journal.
Published Research Paper titled “Agile Web Engineering quality metrics” in Galaxy international
journal.
Published Research Paper titled “Role of Computer in Visual Art” in Galaxy international
journal.
Social services:-
Awarded a certificate for working in Eradication of polio sponsored by UNISEF and WHO.
Attended the seven day special camp sponsored by the “ Ministry of Youth Affairs and
Sports, Govt. of India” held under the auspices of the NSS department of DAV College
Amritsar at Govt. Elementary School, Tirthpur (Amritsar) from 25-12-2010 to 31-12-2010.
Technical Skills
Numerical Methods. Data Structure, C, C++, Oracle, FoxPro, Visual Basic 6.0, VB.Net,
Operating System, Database Management System, MS- Office etc.
Personal details
Nationality : Indian
Date:
Place: ………… (Rohit Sharma)
INDIRA GANDHI NATIONAL OPEN
UNIVERSITY
MCSP-060
WEBSITE OF AMRITSAR
PROJECT PROPOSAL
By
We live in century of information and technology, where every step of live we need information
to do anything. In real world there are many ways to get the required information. In the world
there are many ways to get the required information and data like we can get information from
newspaper ,books and from television and data from government and private inquiry offices
and documents, but these all ways needs so much time ,money and efforts to spend. Our
website will provide required information to the tourists.
AMRITSAR Website is one of the searching website. It’s basically the guide site and attractive
destination for tourists. The website is divided into different modules that give glance at “HOLY
CITY”.
Its covers information related to different colleges, hospitals, hotels, malls, temples and
schools. My website will provide all information that may a user required. Important key
feature of our website is that we covered all the developments in the city like metro, new malls
and guest rooms.
As everybody cannot afford expensive rooms in hotels so there we provide list of all the guest
rooms available in the Amritsar by which tourists can easily book their rooms
Here I also add the facilities to book the guest rooms for the tourists.
Amritsar, literally a pool of nectar, derives its name from “AMRIT SAROVAR”, the holy tank that
surrounds the fabulous golden temple .First time visitors to Amritsar could be forgiven for the
impression that Amritsar is like any other small town in northern India.
The project is divided into several modules and there are two types of users: Administrators
and Guest the various modules of this website is defined by following descriptions:-
Admin section:-the administrator is provided with password and username with which he/she
can access the system. Administrator has the right of maintaining the database and users
deletion process:-
login
edit
view
change password
logout
User modules: As users are the main visitors of site, the following facilities are available
through this module. From this modules user can get all types of facilities he/she can gather
information related to various sectors like heath, education, historical places and tourism etc.
User modules includes:-
Home
Cultures
List of religious places
Educational institutes
Hotels
List of malls
List of restaurant
List of hospitals
Cab Booking
Hotel booking
Guide booking
Objectives
The objective of this website is to implement the detail of the Holy city Amritsar, various places to visit
in Amritsar, list of the colleges, hotels, hospitals, weather about the city, important persons of the
Amritsar and there contact numbers, various malls, and historical places. I would like to use databases to
facilitate this process of smooth adding, deleting, modification, the important detail at admin level such as
list of hotels and there contact numbers; room rent season wise and activities of city and part of both the
operators and the administrators involved
The various objectives of the website can be presented in views of the different people involved with it.
The main people involved in the website are
1. Administrator
2. Public
Administrator’s view:-
The administrator needs to know and control the following information at all times
1) Add remove Hotels.
2) Different Educational institutes.
3) Various places to visit.
4) Important dates of the various festivals in the City.
5) List of Hospitals.
6) Add Cab info.
7) Add Guide Info.
8) Add Hospitals
Users view:-
A user needs to know the following information:
1) Log in and Logout Process.
2) Book hotels online.
3) Book Cabs and Guide
4) About city.
5) About Historical Places in City
Hardware and software requirements
1. Any PC processor
2. 512 MB Ram
3. Keyboard mouse
4. Internet Connection
As we have decided to develop a new system now it is time to determine the new requirements
for the new system. As the user is the most important part of any system it is required to find the
users requirements to develop a user-friendly system rather than having to develop a developer
friendly system.
The outputs required by the user that must be included into the proposed system are as follows:
1. The work for the particular user must be personalized.
2. Billing and invoice should be automated.
3. The user must be provided easy if he wants to switch from one application to other at a
time.
Project Planning:-
Project planning is part of project management, which relates to the use of schedules such as
Gantt charts to plan and subsequently report progress within the project environment. Initially,
the project scope is defined and the appropriate methods for completing the project are
determined. Following this step, the durations for the various tasks necessary to complete the
work are listed and grouped into a work breakdown structure. Project planning is often used to
organize different areas of a project, including project plans, workloads and the management of
teams and individuals. The logical dependencies between tasks are defined using an activity
network diagram that enables identification of the critical path. Project planning is inherently
uncertain as it must be done before the project is actually started. Therefore the duration of the
tasks is often estimated through a weighted average of optimistic, normal, and pessimistic cases.
The critical chain method adds "buffers" in the planning to anticipate potential delays in project
execution. Float or slack time in the schedule can be calculated using project management
software. Then the necessary resources can be estimated and costs for each activity can be
allocated to each resource, giving the total project cost. At this stage, the project schedule may be
optimized to achieve the appropriate balance between resource usage and project duration to
comply with the project objectives. Once established and agreed, the project schedule becomes
what is known as the baseline schedule. Progress will be measured against the baseline schedule
throughout the life of the project. Analyzing progress compared to the baseline schedule is
known as earned value management. The inputs of the project planning phase 2 include the
project charter and the concept proposal. The outputs of the project planning phase include the
project requirements, the project schedule, and the project management plan.
The Project Planning can be done manually. However, when managing several projects, it is
usually easier and faster to use project management software.
PERT CHART
Pert stands for program evolution and review technique. A pert chart is a network of boxes and
arrows. The boxes in the pert chart can be decorated with starting and ending dates for activities.
Days 25-70
Days 1-25
Days 35-60
SRS Low Level
Requirement
Creation Design
s Gathering
Days 50-85
Days 50-95
Procedural Design
Days 75-100
coding
Coding
Search View
hotels hotels
Select
Hotel
Book
Hotel
View
Detail
Booking
Complet
ed
Confirma Add
tion details
Scope of the Solution
DFD AND ER DIAGRAMS
State Diagram
The state diagram in the Unified Modeling Language is essentially a Harel state chart with
standardized notation which can describe many systems, from computer programs to business
processes. In UML 2 the name has been changed to State Machine Diagram. The following are
the basic notational elements that can be used to make up a diagram:
Add Hotels
& Guide Info Proceed
Book Hotels Book Guide
Revise
Initial Stage
Quit Pay
Payment Info
Paid
Final State
DATABASE TABLES
Module Details
Admin login
This module is used for admin login which provide the facility to the admin for add the
hospitals, colleges, car info, guide info, view feedback etc.
Add Hospitals
This module is used for the admin for add the Hospitals.
User Registration.
This module is used for the admin for add car information.
Add Guide Details
Feedback form
Guide booking
Cab Booking
Return Policies
Add colleges
Add Hotels
Customer information
Add guest Room
About Amritsar
Visitor Registration
REPORTS
List of Colleges
List of Guide
List of customers.
List of Cabs.
List of Hospitals.
Important dates
Implementation of Security at various level
System security Measures
Threats
Attacks
Technical failures and defects
Human errors
Organizational weaknesses
Force majeure
Since the beginning of computerization, there have always been threats to information systems
and IT solutions in general but in recent years, the nature of cyberspace threats has changed. The
widespread popularity of information technology has promoted the growth of network/cyber-
attacks.
Security measures
In order to protect critical information infrastructure, it is reasonable to take measures that shall
guarantee sufficient security for information systems providing vital services.
Data security means protecting data, such as a database, from destructive forces and from the
unwanted actions of unauthorized users
Disk encryption
Disk encryption refers to encryption technology that encrypts data on a hard disk drive. Disk
encryption typically takes form in either software (see disk encryption software) or hardware
(see disk encryption hardware). Disk encryption is often referred to as on-the-fly encryption
(OTFE) or transparent encryption.
Software-based security solutions encrypt the data to protect it from theft. However, a malicious
program or a hacker could corrupt the data in order to make it unrecoverable, making the system
unusable. Hardware-based security solutions can prevent read and write access to data and hence
offer very strong protection against tampering and unauthorized access.
Working of hardware-based security: A hardware device allows a user to log in, log out and set
different privilege levels by doing manual actions. The device uses biometric technology to
prevent malicious users from logging in, logging out, and changing privilege levels. The current
state of a user of the device is read by controllers in peripheral devices such as hard disks. Illegal
access by a malicious user or a malicious program is interrupted based on the current state of a
user by hard disk and DVD controllers making illegal access to data impossible. Hardware-based
access control is more secure than protection provided by the operating systems as operating
systems are vulnerable to malicious attacks by viruses and hackers. The data on hard disks can
be corrupted after a malicious access is obtained. With hardware-based protection, software
cannot manipulate the user privilege levels. It is impossible for a hacker or malicious programs
to gain access to secure data protected by hardware or perform unauthorized privileged
operations. This assumption is broken only if the hardware itself is malicious or contains a
backdoor. The hardware protects the operating system image and file system privileges from
being tampered. Therefore, a completely secure system can be created using a combination of
hardware-based security and secure system administration policies.
Backups :- Backups are used to ensure data which is lost can be recovered from another
source. It is considered essential to keep a backup of any data in most industries and the process
is recommended for any files of importance to a user.
Future Enhancement
Future Scope
Orphanage management system is one the modifications that were carried out in the orphanage
Service System so that the working and availability of Service area can be broadened. This is
basically an interface of Global distribution System to carry out by the orphanage system such as
adding the child, adopting the child, donor information, child activity etc. Website of orphanage
management system makes the life of user very easy as they don’t need to go to the orphanage
for knowing the details of the orphanage and working of the orphanage. On the other hand, it
also removed an extra burden from the staff of the orphanage. With the help of this system
employee can view all the detail of the particular child and they can view each and every report
of child, donor date wise. The only problem with the system is that it doesn’t allow the online
users to change the information of the children online.
BIBLIOGRAPHY
Website
1. www.searchvb.com
2. www.vbguru.com
3. www.google.com