Mca 6th Ist Synopsis ASR Website

Download as doc, pdf, or txt
Download as doc, pdf, or txt
You are on page 1of 32

SCHOOL OF COMPUTER AND INFORMATION SCIENCES

IGNOU, MAIDAN GARHI, NEW DELHI – 110 068

II. PROFORMA FOR THE APPROVAL OF MCA PROJECT PROPOSAL (MCSP-060)


(Note: All entries of the proforma of approval should be filled up with appropriate and complete
information. Incomplete proforma of approval in any respect will be summarily rejected.)

Enrolment No.: ………………………


Project Proposal No :…………………..
Study Centre: ……………….……….
(for office use only)
Regional Centre:…… RC Code:……
E-mail: ………….………..…………...
Mobile/Tel No.: …..………………….
1. Name and Address of the Student ………………………..…………………………………….

………………………………………………………………

2. Title of the Project .………..…………………………………………………….

3. Name and Address of the Guide …..………………………………………………………….

………………………………………………………………

Ph.D* M.Tech.* B.E*/B.Tech.* MCA M.Sc.*


4. Educational Qualification of the Guide
(Attach bio-data also)
(*in Computer Science / IT only)
5. Working / Teaching experience of the Guide** ……………………………………………………………

…………………………………………………………………………………………………………….
(**Note: At any given point of time, a guide should not provide guidance for more than 5 MCA students
of IGNOU)
6. Software used in the Project ……………………………………………………………..
7. If already pursued BCA/BIT from IGNOU, mention the title of the project (CS-76) and the s/w
used……………………………………………………
8. Project title of the Mini Project (MCS-044) and the s/w used………………………………………………

9. Is this your first submission? Yes No

Signature of the Student Signature of the Guide


Date: ………………… Date: …………………….

For Office Use Only Name:……………………………..............


…………………………………………….
Signature, Designation, Stamp of the
Project Proposal Evaluator
Approved Not Approved Date: …………………….
Suggestions for reformulating the Project:
CURRICULUM VITAE
 
Rohit Sharma Mobile no: +91-8146456500
#39, Gali No 7 Jawahar +91-9915741927
Nagar, Chheharta email_id:- [email protected]
AMRITSAR-141005
______________________________________________________________
EDUCATIONAL QUALIFICATIONS:
 M.Phill in Computer Science from Singhania University.
 Master of technology (M.Tech -IT) from Karnataka State Open University.
 Master of Computer Application (MCA) from IGNOU.
 Bachelor of Arts(BA) from Guru Nanak Dev University
 Senior Secondary (commerce) from P.S.E.B.
 Matriculation from P.S.E.B board.
 Certificate in Computer from IGNOU Delhi.
 Two year Diploma in Draughts Man Civil from Dayanand Institute of Industrial Train-
ing Amritsar.
 Three Year Diploma in Computer Application and Software Engineering (GNIIT) from
NIIT Amritsar.
Teaching Experience
Name of college/School Date of joining-leaving Designation

Govt Sen Sec School Ajnala Amritsar 01-April-2001 to 31-March-2003 Senior Faculty
Govt Sen Sec School Gaggobua
01-April-2003 to 31-March-2004 Senior Faculty
Amritsar
K.V.No.3 New Cantt Amritsar 21-June-2004 to 31-March-2005 Senior Faculty

K.V.No.3 New Cantt Amritsar 20-April-2005 to 30-June-2005 Senior Faculty

KHALSA COLLEGE AMRITSAR 01-SEP-2008 TO 28 -FEB-2009 Lecturer

SEVA DEVI S.D COLLEGE


18-Aug-2009 TO 28 –FEB-2010 Lecturer
TARN-TARAN
DAV College Amritsar 06-July-2010 to 28-feb-2011 Lecturer

DAV College Amritsar 06-July-2011 to 29-feb-2012 Lecturer

DAV College Amritsar 04-July-2012 to till Date Lecturer

Publication
I have published Solved Question Papers and Practical Copy on my subject namely
 BCA 3rd Year Computer Graphics (Kalyani Publishers)
 PGDCA Programming in Visual Basic (Kalyani Publishers)
 Practical Copy of B.Com 1st Year.
Seminar
 Attended one day seminar on “Parallel and Distributed Computing” at Khalsa College Amritsar.
 Participated in two day Workshop on Astrophysics on 6-7 August 2013 collaboration with Vigyan
Prasar, Department of Science and Technology, Government of India.
Research Papers:-
 National conference on “LATEST TRENDS IN INFORMATION TECHNOLOGY” Organized by
Himalayan Institute of Computer Science (H.I.C.S) at Kala-Amb (H.P).
 Attended two days international conference on TECHNOLOGY AND INFORMATION SYSTEM at
DAV COLLEGE, AMRITSAR.
 Published research Paper titled “Saving Cache memory using a locking Cache in real time
system” in Zenith international journal.
 Published Research Paper titled “Agile Web Engineering quality metrics” in Galaxy international
journal.
 Published Research Paper titled “Role of Computer in Visual Art” in Galaxy international
journal.
Social services:-
 Awarded a certificate for working in Eradication of polio sponsored by UNISEF and WHO.
 Attended the seven day special camp sponsored by the “ Ministry of Youth Affairs and
Sports, Govt. of India” held under the auspices of the NSS department of DAV College
Amritsar at Govt. Elementary School, Tirthpur (Amritsar) from 25-12-2010 to 31-12-2010.
Technical Skills
 Numerical Methods. Data Structure, C, C++, Oracle, FoxPro, Visual Basic 6.0, VB.Net,
Operating System, Database Management System, MS- Office etc.
Personal details

Father’s Name: Sh. Kamal Krishan Sharma

Date of Birth : 02 March, 1979

Marital Status : Married

Languages : English, Hindi, & Punjabi

Nationality : Indian

Date:
Place: ………… (Rohit Sharma)
INDIRA GANDHI NATIONAL OPEN
UNIVERSITY

MCSP-060

WEBSITE OF AMRITSAR

PROJECT PROPOSAL
By

Name: Shiwani Sharma

Enrollment No.: 141261187

Under the Guidance


Of
Rohit Sharma
Submitted to IGNOU, Regional Center, Khanna
In Partial fulfillment of the requirements
For the award of the Degree
Master of Computer Applications (MCA)
Introduction to Website

We live in century of information and technology, where every step of live we need information
to do anything. In real world there are many ways to get the required information. In the world
there are many ways to get the required information and data like we can get information from
newspaper ,books and from television and data from government and private inquiry offices
and documents, but these all ways needs so much time ,money and efforts to spend. Our
website will provide required information to the tourists.
AMRITSAR Website is one of the searching website. It’s basically the guide site and attractive
destination for tourists. The website is divided into different modules that give glance at “HOLY
CITY”.
Its covers information related to different colleges, hospitals, hotels, malls, temples and
schools. My website will provide all information that may a user required. Important key
feature of our website is that we covered all the developments in the city like metro, new malls
and guest rooms.
As everybody cannot afford expensive rooms in hotels so there we provide list of all the guest
rooms available in the Amritsar by which tourists can easily book their rooms
Here I also add the facilities to book the guest rooms for the tourists.
Amritsar, literally a pool of nectar, derives its name from “AMRIT SAROVAR”, the holy tank that
surrounds the fabulous golden temple .First time visitors to Amritsar could be forgiven for the
impression that Amritsar is like any other small town in northern India.
The project is divided into several modules and there are two types of users: Administrators
and Guest the various modules of this website is defined by following descriptions:-
Admin section:-the administrator is provided with password and username with which he/she
can access the system. Administrator has the right of maintaining the database and users
deletion process:-
 login
 edit
 view
 change password
 logout
User modules: As users are the main visitors of site, the following facilities are available
through this module. From this modules user can get all types of facilities he/she can gather
information related to various sectors like heath, education, historical places and tourism etc.
User modules includes:-
 Home
 Cultures
 List of religious places
 Educational institutes
 Hotels
 List of malls
 List of restaurant
 List of hospitals
 Cab Booking
 Hotel booking
 Guide booking
Objectives
The objective of this website is to implement the detail of the Holy city Amritsar, various places to visit
in Amritsar, list of the colleges, hotels, hospitals, weather about the city, important persons of the
Amritsar and there contact numbers, various malls, and historical places. I would like to use databases to
facilitate this process of smooth adding, deleting, modification, the important detail at admin level such as
list of hotels and there contact numbers; room rent season wise and activities of city and part of both the
operators and the administrators involved
The various objectives of the website can be presented in views of the different people involved with it.
The main people involved in the website are
1. Administrator
2. Public
Administrator’s view:-
The administrator needs to know and control the following information at all times
1) Add remove Hotels.
2) Different Educational institutes.
3) Various places to visit.
4) Important dates of the various festivals in the City.
5) List of Hospitals.
6) Add Cab info.
7) Add Guide Info.
8) Add Hospitals
Users view:-
A user needs to know the following information:
1) Log in and Logout Process.
2) Book hotels online.
3) Book Cabs and Guide
4) About city.
5) About Historical Places in City
Hardware and software requirements

 Hardware requirements server

1. Inter i3/i5/i7 processor


2. 2 GB Ram
3. 500 GB+ Hard disk space
4. Optical drive
5. Keyboard mouse
6. Internet Connection

 Hardware requirements Client

1. Any PC processor
2. 512 MB Ram
3. Keyboard mouse
4. Internet Connection

 Software Requirements Clients

1. Any operating system


2. Visual studio 2008,
3. Sql server 2005
4. Gif Animator
5. Photoshop
6. Ajax Support
REQUIREMENT SPECIFICATION

As we have decided to develop a new system now it is time to determine the new requirements
for the new system. As the user is the most important part of any system it is required to find the
users requirements to develop a user-friendly system rather than having to develop a developer
friendly system.
The outputs required by the user that must be included into the proposed system are as follows:
1. The work for the particular user must be personalized.
2. Billing and invoice should be automated.
3. The user must be provided easy if he wants to switch from one application to other at a
time.
Project Planning:-

Project planning is part of project management, which relates to the use of schedules such as
Gantt charts to plan and subsequently report progress within the project environment. Initially,
the project scope is defined and the appropriate methods for completing the project are
determined. Following this step, the durations for the various tasks necessary to complete the
work are listed and grouped into a work breakdown structure. Project planning is often used to
organize different areas of a project, including project plans, workloads and the management of
teams and individuals. The logical dependencies between tasks are defined using an activity
network diagram that enables identification of the critical path. Project planning is inherently
uncertain as it must be done before the project is actually started. Therefore the duration of the
tasks is often estimated through a weighted average of optimistic, normal, and pessimistic cases.
The critical chain method adds "buffers" in the planning to anticipate potential delays in project
execution. Float or slack time in the schedule can be calculated using project management
software. Then the necessary resources can be estimated and costs for each activity can be
allocated to each resource, giving the total project cost. At this stage, the project schedule may be
optimized to achieve the appropriate balance between resource usage and project duration to
comply with the project objectives. Once established and agreed, the project schedule becomes
what is known as the baseline schedule. Progress will be measured against the baseline schedule
throughout the life of the project. Analyzing progress compared to the baseline schedule is
known as earned value management. The inputs of the project planning phase 2 include the
project charter and the concept proposal. The outputs of the project planning phase include the
project requirements, the project schedule, and the project management plan.
The Project Planning can be done manually. However, when managing several projects, it is
usually easier and faster to use project management software.
PERT CHART

Pert stands for program evolution and review technique. A pert chart is a network of boxes and
arrows. The boxes in the pert chart can be decorated with starting and ending dates for activities.

Days 25-70
Days 1-25
Days 35-60
SRS Low Level
Requirement
Creation Design
s Gathering

Days 50-85

High Level Design


(Interface, Data design)

Days 50-95

Procedural Design

Days 75-100

coding
Coding

Implementation Testing (Module and


Integrated)
Days 55-110
Days -110-150
Gantt Chart

April May June July Aug Sep OCT


Pert Chart

Search View
hotels hotels

Select
Hotel

Book
Hotel

View
Detail

Booking
Complet
ed
Confirma Add
tion details
Scope of the Solution
DFD AND ER DIAGRAMS
State Diagram

The state diagram in the Unified Modeling Language is essentially a Harel state chart with
standardized notation which can describe many systems, from computer programs to business
processes. In UML 2 the name has been changed to State Machine Diagram. The following are
the basic notational elements that can be used to make up a diagram:

 Filled circle, representing to the initial state


 Hollow circle containing a smaller filled circle, indicating the final state (if any)
 Rounded rectangle, denoting a state. Top of the rectangle contains a name of the state.
Can contain a horizontal line in the middle, below which the activities that are done in
that state are indicated
 Arrow, denoting transition. The name of the event (if any) causing this transition labels
the arrow body. A guard expression may be added before a "/" and enclosed in square-
brackets (eventName ), denoting that this expression must be true for the transition to
take place. If an action is performed during this transition, it is added to the label
following a "/" ( eventName/action ).

Add Cab, Guide Info,


Colleges shopping Malls

Add Hotels
& Guide Info Proceed
Book Hotels Book Guide

Revise
Initial Stage
Quit Pay

Payment Info

Paid
Final State
DATABASE TABLES

Table Name: - Admin_Table

Column Name Data Type Use For


Adminname Varchar(50) Admin Username
Password Varchar(50) Admin password

Primary Kay constraint: - Admin name

Table Name: - Add_Hotel

Column Name Data Type Constraint


Hotel_id varchar(20) Primary Key
Name varchar(20)
Loaction varchar(100)
Type varchar(20)
Contact_no varchar(20)
Email varchar(20)
Website varchar(40)

Primary Kay constraint: - Hotel_id


Table Name: feedback

Column Name Data Type Constraint


ID varchar(20) Primary Key
Name varchar(20)
Address varchar(20)
Age varchar(10)
Gender varchar(20)
Nationality varchar(20)
Contactno varchar(20)
Feedback varchar(200)

Primary Kay constraint: - id


Table Name: - guideinfo

Column Name Data Type Constraint


Guide_id varchar(20) Primary Key
Name varchar(20)
Mobile_no varchar(20)

Primary Kay constraint Product_id

Table Name: - guide_Booking

Column Name Data Type Constraint


Guide_id varchar(20) Foreign Key
Booking_id varchar(20) Primary Key
Name varchar(20)
Address varchar(20)
Mobile_no varchar(20)
Email varchar(20)
Date_of_booking varchar(20) Auto Generated
Nationality

Primary Kay constraint Booking_id

Foreign Key Guide_id


Table Name: - guide_info

Column Name Data Type Constraint


Name nchar(20)
Language nchar(20)
Gender nchar(20)
Mobile_no nchar(20)

Table Name: - cab_booking

Column Name Data Type Constraint


Booking_id Varchar2(20) Primary Key
Name Varchar2(20)
Address Varchar2(20)
Contact_no Varchar2(20)
Nationality Varchar2(20)
Source Varchar2(20)
Destination Varchar2(20)
Date_of_booking Varchar2(20)

Primary Kay constraint booking_id


Table Name: - college_master

Column Name Data Type Constraint


College_name Varchar2(20) Primary Key
Location Varchar2(20)
Contact_no Varchar2(20)
Website Varchar2(100)

Primary Kay constraint college_name

Module Details
 Admin login

This module is used for admin login which provide the facility to the admin for add the
hospitals, colleges, car info, guide info, view feedback etc.
 Add Hospitals

This module is used for the admin for add the Hospitals.

 User Registration.

This module is used for the registration of the user.


 Add Car info

This module is used for the admin for add car information.
 Add Guide Details
 Feedback form
 Guide booking
 Cab Booking
 Return Policies
 Add colleges
 Add Hotels
 Customer information
 Add guest Room
 About Amritsar
 Visitor Registration
REPORTS

 List of Colleges
 List of Guide
 List of customers.
 List of Cabs.
 List of Hospitals.
 Important dates
Implementation of Security at various level
System security Measures

Threats

Threats can be divided into the following categories:

 Attacks
 Technical failures and defects
 Human errors
 Organizational weaknesses
 Force majeure

Since the beginning of computerization, there have always been threats to information systems
and IT solutions in general but in recent years, the nature of cyberspace threats has changed. The
widespread popularity of information technology has promoted the growth of network/cyber-
attacks.

Security measures

In order to protect critical information infrastructure, it is reasonable to take measures that shall
guarantee sufficient security for information systems providing vital services.

Data security means protecting data, such as a database, from destructive forces and from the
unwanted actions of unauthorized users

Data security technologies

Disk encryption

Disk encryption refers to encryption technology that encrypts data on a hard disk drive. Disk
encryption typically takes form in either software (see disk encryption software) or hardware
(see disk encryption hardware). Disk encryption is often referred to as on-the-fly encryption
(OTFE) or transparent encryption.

Software versus hardware-based mechanisms for protecting data

Software-based security solutions encrypt the data to protect it from theft. However, a malicious
program or a hacker could corrupt the data in order to make it unrecoverable, making the system
unusable. Hardware-based security solutions can prevent read and write access to data and hence
offer very strong protection against tampering and unauthorized access.

Hardware based security or assisted computer security offers an alternative to software-only


computer security. Security tokens such as those using PKCS#11 may be more secure due to the
physical access required in order to be compromised. Access is enabled only when the token is
connected and correct PIN is entered (see two-factor authentication). However, dongles can be
used by anyone who can gain physical access to it. Newer technologies in hardware-based
security solve this problem offering fool proof security for data.

Working of hardware-based security: A hardware device allows a user to log in, log out and set
different privilege levels by doing manual actions. The device uses biometric technology to
prevent malicious users from logging in, logging out, and changing privilege levels. The current
state of a user of the device is read by controllers in peripheral devices such as hard disks. Illegal
access by a malicious user or a malicious program is interrupted based on the current state of a
user by hard disk and DVD controllers making illegal access to data impossible. Hardware-based
access control is more secure than protection provided by the operating systems as operating
systems are vulnerable to malicious attacks by viruses and hackers. The data on hard disks can
be corrupted after a malicious access is obtained. With hardware-based protection, software
cannot manipulate the user privilege levels. It is impossible for a hacker or malicious programs
to gain access to secure data protected by hardware or perform unauthorized privileged
operations. This assumption is broken only if the hardware itself is malicious or contains a
backdoor. The hardware protects the operating system image and file system privileges from
being tampered. Therefore, a completely secure system can be created using a combination of
hardware-based security and secure system administration policies.

Backups :- Backups are used to ensure data which is lost can be recovered from another
source. It is considered essential to keep a backup of any data in most industries and the process
is recommended for any files of importance to a user.
Future Enhancement

Future Scope

Orphanage management system is one the modifications that were carried out in the orphanage
Service System so that the working and availability of Service area can be broadened. This is
basically an interface of Global distribution System to carry out by the orphanage system such as
adding the child, adopting the child, donor information, child activity etc. Website of orphanage
management system makes the life of user very easy as they don’t need to go to the orphanage
for knowing the details of the orphanage and working of the orphanage. On the other hand, it
also removed an extra burden from the staff of the orphanage. With the help of this system
employee can view all the detail of the particular child and they can view each and every report
of child, donor date wise. The only problem with the system is that it doesn’t allow the online
users to change the information of the children online.
BIBLIOGRAPHY

1. ASP.Net 3.5 and 4.0 by Wrox.


2. Crystal Reports 9 (Complete Reference).
1. Understanding of SQL SERVER MARTIN GRUBER.
2. SQL Server 2008 by Wrox.

Website

1. www.searchvb.com

2. www.vbguru.com

3. www.google.com

You might also like