synopsis 14jan
TRANSCRIPT
-
8/3/2019 Synopsis 14JAN
1/94
CONNECTING M.B.S.C.E.T
ABSTRACT
As the world is ushering into the new era where prime focus is given to technology and
where time and speed are becoming important criteria to evaluate the performance of an
individual, in such a scenario it becomes prerequisite to equip the students with new
technology to solve common day to day problems.
Our project CONNECTING M.B.S.C.E.T acts as a technological tool aiming to bridge
the student teacher communication gap, instigating awareness and knowledge among
students through the most popular medium i.e. the Internet. The project provides a platform
to students to genuinely explore their potential and caliber. CONNECTING MBSCET is
an open discussion forum where each individual of college is free to put forward his genuine
opinions, clarify their doubts, know about the schedule of concerning teachers and have
firsthand knowledge about recent notices etc.
The project is designed to cover different aspects of students curriculum which not only
confine to the pages of his book but also put forward various opportunities that open up the
doors of technology to place him in a strong competent position in the demanding market of
the existing scenario.
DEPARTMENT OF COMPUTER SCIENCE ENGINEERING Page 1
-
8/3/2019 Synopsis 14JAN
2/94
CONNECTING M.B.S.C.E.T
CHAPTER 1
INTRODUCTION
"NECESSITY IS THE MOTHER OF INVENTION"
The foundation to every new project arises from a problem, which appears to be unsolved by
the available resources of the existing system. This leads either to the development of a new
technology or modification of the existing technology that could enhance the efficiency of
available resources in the system. Our project "CONNECTING M.B.S.C.E.T" is a
"NETWORKING FORUM" that provides a platform to the solution of various problems
encountered by students, faculty members and higher administrative personnels of the
college.
1.1 PROBLEM DEFINITION:
Some of the problems that laid a foundation stone to our project are mentioned as under:
TEACHER-STUDENT COMMUNICATION GAP:In the busy schedule of the college, students and teachers hardly find some space outside the
walls of the classroom with one lecture following another. It is very difficult for a student to
approach a teacher without sacrificing his lectures. This leads to a complete loss of his
precious lectures, ultimately affecting his attendance too. There exists no mechanism to
DEPARTMENT OF COMPUTER SCIENCE ENGINEERING Page 2
-
8/3/2019 Synopsis 14JAN
3/94
CONNECTING M.B.S.C.E.T
bridge this gap. This is the major problem which a student faces from the very first day of his
college life.
IMPROPER ANNNOUNCEMENT SYSTEM:
The announcement system of the college is inefficient to provide all the announcements to
each and every student in a short duration of time. These include announcements from
H.O.Ds of various departments, placement cell, faculty members, administration block etc.
The announcement system of college is not equipped with the latest technology and is still
following the traditional notice board system which is nowadays, generally being ignored by
students. In this technical scenario, students prefer faster and electronic way to receive latest
information.
IMPROPER CHANNEL FOR PROVIDING SUDDEN NOTICES:
There is no such mechanism available in the college to provide information to sudden notice,
which sometimes leads to the state of confusion not only among students but also among
teachers. The sudden notices include information regarding whether college is closed due to
some uncertain reasons, or whether the exam would be conducted on that day or not.
NO TECHNICAL INTERACTIONS
The teacher-student interaction is confined to class rooms only, where discussions are based
on the subjective topics. There is no such discussion regarding the latest technology in the
market, about the recent developments in technical world and in the social world too. Such
kind of discussions proves veryvaluable to explore the social cum technical knowledge of
student.
NO PROVISION TO EXPLORE THE CALIBRE OF STUDENT:There are basically two types of students: one logically sound and the other theoretically
strong. One who is theoretically strong can be judged by his results but the one who is
logically sound sometimes fail to come out with the desired results and is not treated as an
DEPARTMENT OF COMPUTER SCIENCE ENGINEERING Page 2
-
8/3/2019 Synopsis 14JAN
4/94
CONNECTING M.B.S.C.E.T
intelligent student. There is no such provision present to judge the actual caliber of the
student, which is very much important to be explored.
LACK OF FEEDBACK:
In the college there is absence of such a mechanism by which a student can give his opinion
on various ongoing activities. Sometimes college authorities wish to start some extra-activity
in the college and look forward for some feedback from students about its effectiveness and
know about the interest students possess towards that activity. But unfortunately at present
there is no such mechanism to get an appropriate feedback from students.
1.2 OBJECTIVES:
The above mentioned problems are very much important to be solved and our project
"CONNECTING M.B.S.C.E.T" proves to be very effective in solving some of these
problems. The main objectives of our project are as under:
BRIDGING THE TEACHER-STUDENT COMMUNICATION
GAP:
As explained in the problem section above, the gap the teacher and student have is very
important to be bridged. The project somehow helps to bridge this gap by providing a forum.
In the project both teacher and student have their individual profiles which are interlinked
with a communication mechanism. Here student can approach any of the faculty members,
put up his query and get his query answered whenever the teacher is available. This provides
a facility to student to approach his faculty after the college hours. Their interaction is not
confined to mere a short span of time they spend in college.
EFFECTIVE ANNOUNCEMENT SYSTEM:The announcement system that college presently follows is not that much effective (as
discussed in the problem section). The announcement system provided by this forum would
be very much effective and it possesses the ability to provide the student with each and every
notice issued by any of the department of the college at any point of time.
DEPARTMENT OF COMPUTER SCIENCE ENGINEERING Page 2
-
8/3/2019 Synopsis 14JAN
5/94
CONNECTING M.B.S.C.E.T
PROVIDING SUDDEN NOTICES:
Sudden notices are always important to reach students within a short interval of time and
providing these sudden notices manually by means of telephones and e-mails is very much
difficult, time consuming and costly too. And also there may be a chance where certain
student may not receive the notice. This forum will provide an effective mechanism of
providing students with sudden notices within a very short span of time. This will help in
eliminating the state of confusion among the teachers and students as well.
GROUND FOR TECHNICAL CUM SOCIAL DVELOPMENT OF
STUDENT:
In this networking forum, students can approach their teachers after college hours by means
of Internet. Here discussions like the latest technologies in the market, latest happenings in
the technical cum social world will be hosted. With these types of discussions, teacher would
come to know about the technical as well as social knowledge of the student and also come
to know about the approach of a student towards a topic i.e. whether he is with a optimistic
or pessimistic attitude, and can guide him accordingly. The forum proves to be a flourishing
ground for both social and technical development of a student.
EXPLORING CALIBER OF STUDENTS
There are many problems that can be solved in a number of ways. Out of all these solutions
there exist a solution which is called the best solution according to the given situations and
circumstances. Teacher or student can put up any kind of problem in the forum and get to
know the best possible way to solve it. By which teachers comes to know about the real
caliber of student which previously remained hidden from the eyes of teacher. This would be
very effective in judging the exact potential of student. PATH FOR FEEDBACK:
Sometimes college authorities wish to start some activities in the college and they find
themselves in the state of dilemma as to what will be response of students and whether they
like it or not. So with the said forum college could discuss this with the students, get their
DEPARTMENT OF COMPUTER SCIENCE ENGINEERING Page 1
-
8/3/2019 Synopsis 14JAN
6/94
CONNECTING M.B.S.C.E.T
feedback regarding concerned activity and can act accordingly. This feedback mechanism
would lead to various improvements in the ongoing as well as the upcoming activities in the
college.
USER CERTAINITY:
In our forum only students of the college are allowed to access it. Any other individual who
is not a part of the college cannot utilize the facilities provided by this forum. To make sure
the student accessing this forum is a college student we provide him with a Registration ID
and security code, which is very essential to be entered during his first time access.
NO CUSTOMIZATION:
In networking sites we are provided with a facility of customizing our friend lists, but here in
this forum we are not giving any kind of customization of lists. Every user here is a general
user and can interact to anyone.
PRIVACY:
Privacy is always a major question while accessing such kind of networking sites, here in our
networking forum we are not providing any kind of privacy to the users, because when
privacy occurs, misuse starts. To avoid any kind of misuse we eliminate privacy from the
forum. Any action a user performs will be made visible to all other users using the forum
including the faculty members as well as the higher administrative staff.
FULLY FLEDGED COLLEGE WEB STRUCTURE:
This networking forum acts as a cherry on the cake describing various aspects of college
infrastructure. It will provide an edge to the college among other colleges in the state because
it is first of its kind. And our college would be the only college that would have such kind of
networking forum in the entire northern region.
GENERATING A WILL AMONG STUDENTS TO USE IT:
This forum would be very much interactive and hence it would generate a will among
students to explore the resources and facilities provided by it. This would prove to be very
effective in creating a healthier technical cum social environment in the college.
DEPARTMENT OF COMPUTER SCIENCE ENGINEERING Page 2
-
8/3/2019 Synopsis 14JAN
7/94
CONNECTING M.B.S.C.E.T
CHAPTER 2
REQUIREMENT ANALYSIS
This chapter involves a complete study of the resources required in the development of our
project. The requirements of any project can be broadly classified into the hardware
requirements and the software requirements. These requirements can be best understood
when a further classification is made depending on whether these are used on the developers
side or they are being used on the client side.
2.1 HARDWARE AND SOFTWARE REQUIREMENTS:
The requirements for our project can be further classified into the Hardware requirements as
well as Software requirements.
2.1.1 SOFTWARE REQUIREMENTS:
Software Requirements can be broadly classified into Developer side software requirements
and Client side software requirements.
SOFTWARE
ENVIRONMENTSPECIFICATIONS
Operating System Microsofts Windows XP(with service pack 2 or
onwards)
IDE (Integrated development
environment)
Visual Studio 2008
(Professional Edition)
DEPARTMENT OF COMPUTER SCIENCE ENGINEERING Page 1
-
8/3/2019 Synopsis 14JAN
8/94
CONNECTING M.B.S.C.E.T
DEVELOPERS SIDE
SOFTWARE
REQUIREMENTS
Database server SQL SERVER 2005
(Standard Edition)
Web Server IIS 6.0 or onwards
UML Diagrams MS Visio 2003 or
onwards
MS Office 2003 or onwards
Acrobat Reader 8.0 Onwards
CLIENTS SIDE
SOFTWARE
REQUIREMENTS
SOFTWARE
ENVIRONMENT
SPECIFICATION
Operating system Microsofts Windows XP
(with service pack 2 or
onwards)
MS Office 2003 or onwards
Acrobat Reader 8.0 Onwards
Browser Internet Explorer 6.0 or
onwards, Mozilla Firefox
(with minimum 800600
resolution and ActiveX
Control Enabled)
2.1.2 HARDWARE REQUIREMENTS:
Hardware Requirements can be broadly classified into Developer side software requirements
as well Client side software requirements.
HARDWARE TYPE SPECIFICATION
DEPARTMENT OF COMPUTER SCIENCE ENGINEERING Page 1
-
8/3/2019 Synopsis 14JAN
9/94
CONNECTING M.B.S.C.E.T
DEVELOPERS SIDE
HARDWARE
REQUIREMENTS
Processor Pentium4-dual core or
onwards
RAM Minimum 1 GB
Hard Disk Minimum 20 GB
Monitor Monitor with a minimum
screen resolution of 800600
CLIENT SIDE
HARDWARE
REQUIREMENTS
HARDWARE TYPE SPECIFICATION
Processor Any specification of Processor
RAM Minimum 512 MB
Hard Disk Minimum 10 GB
Monitor Monitor with a minimum
screen resolution of 800600
CHAPTER 3
TECHNOLOGIES USED IN THE PROJECT:
3.1 INTRODUCTION TO ASP.NET (FRONT END)
ASP.NET is the new offering for Web developers from the Microsoft .It is not simply the
next-generation of ASP; in fact, it is a completely re-engineered and enhanced technology
that offers much more than traditional ASP and can increase productivity significantly.
Because it has evolved from ASP, ASP.NET looks very similar to its predecessor but only at
first sight. Some items look very familiar, and they remind us of ASP. But concepts like Web
DEPARTMENT OF COMPUTER SCIENCE ENGINEERING Page 1
-
8/3/2019 Synopsis 14JAN
10/94
CONNECTING M.B.S.C.E.T
Forms, Web Services, or Server Controls gives ASP.NET the power to build real Web
applications.
3.1.1 LOOKING BACK: ACTIVE SERVER PAGES (ASP)
Microsoft Active Server Pages (ASP) is a server-side scripting technology. ASP is a
technology that Microsoft created to ease the development of interactive Web applications.
With ASP one can use client-side scripts as well as server-side scripts. It can be to validate
user input or access a database. ASP provides solutions for transaction processing and
managing session state. ASP is one of the most successful languages used in web
development.
PROBLEMS WITH TRADITIONAL ASP
There are many problems with ASP when considering the need for today's powerful Web
applications.
INTERPRETED AND LOOSELY-TYPED CODE
ASP scripting code is usually written in languages such as JScript or VBScript. The script-
execution engine that Active Server Pages relies on interprets code line by line, every time
the page is called. In addition, although variables are supported, they are all loosely typed as
variants and bound to particular types only when the code is run. Both these factors impede
performance and late binding of types makes it harder to catch errors when you are writing
code.
MIXES LAYOUT (HTML) AND LOGIC (SCRIPTING CODE)
ASP files frequently combine script code with HTML. This results in ASP scripts that are
lengthy, difficult to read, and switch frequently between code and HTML. The interspersionof HTML with ASP code is particularly problematic for larger web applications, where
content must be kept separate from business logic.
LIMITED DEVELOPMENT AND DEBUGGING TOOLS
Microsoft Visual InterDev, Macromedia Visual UltraDev, and other tools have attempted to
increase the productivity of ASP programmers by providing graphical development
DEPARTMENT OF COMPUTER SCIENCE ENGINEERING Page 2
-
8/3/2019 Synopsis 14JAN
11/94
CONNECTING M.B.S.C.E.T
environments. However, these tools never achieved the ease of use or the level of acceptance
achieved by Microsoft Windows application development tools, such as Visual Basic or
Microsoft Access. ASP developers still rely heavily or exclusively on Notepad.
Debugging is an unavoidable part of any software development process, and the debugging
tools for ASP have been minimal. Most ASP programmers resort to embedding temporary
Response.Write statements in their code to trace the progress of its execution.
NO REAL STATE MANAGEMENT
Session state is only maintained if the client browser supports cookies. Session state
information can only be held by using the ASP Session object. And one has to implement
additional code if one, for example, wants to identify a user.
UPDATE FILES ONLY WHEN SERVER IS DOWN
If Web application makes use of components, copying new files to other application should
only be done when the Web server is stopped. Otherwise it is like pulling the rug from under
the application's feet, because the components may be in use (and locked) and must be
registered.
OBSCURE CONFIGURATION SETTINGS
The configuration information for an ASP web application (such as session state and server
timeouts) is stored in the IIS metabase. Because the metabase is stored in a proprietary
format, it can only be modified on the server machine with utilities such as the Internet
Service Manager. With limited support for programmatically manipulating or extracting
these settings, it is often an arduous task to port an ASP application from one server to
another.
3.1.2 INTRODUCING ASP.NET
ASP.NET was developed in direct response to the problems that developers had with
classic ASP. Since ASP is in such wide use, however, Microsoft ensured that ASP scripts
execute without modification on a machine with the .NET Framework (the ASP engine,
ASP.DLL, is not modified when installing the .NET Framework). Thus, IIS can house both
ASP and ASP.NET scripts on the same machine.
DEPARTMENT OF COMPUTER SCIENCE ENGINEERING Page 2
-
8/3/2019 Synopsis 14JAN
12/94
CONNECTING M.B.S.C.E.T
3.1.2.1 ADVANTAGES OF ASP.NET
SEPARATION OF CODE FROM HTML
In order to make a clean sweep; with ASP.NET we have the ability to completely separate
layout and business logic. This makes it much easier for teams of programmers and designers
to collaborate efficiently.
SUPPORT FOR COMPILED LANGUAGES
Developer can use VB.NET and access features such as strong typing and object-oriented
programming. Using compiled languages also means that ASP.NET pages do not suffer the
performance penalties associated with interpreted code. ASP.NET pages are precompiled to
byte-code and Just In Time (JIT) compiled when first requested. Subsequent requests are
directed to the fully compiled code, which is cached until the source changes.
USE SERVICES PROVIDED BY THE .NET FRAMEWORK
The .NET Framework provides class libraries that can be used by your application. Some of
the key classes help us with input/output, access to operating system services, data access, or
even debugging.
GRAPHICAL DEVELOPMENT ENVIRONMENT
Visual Studio .NET provides a very rich development environment for Web
developers. We can drag and drop controls and set properties. And we have full IntelliSense
support, not only for the code, but also for HTML and XML.
STATE MANAGEMENT
To refer to the problems mentioned before, ASP.NET provides solutions for session and
application state management. State information can, for example, be kept in memory or can
be stored in a database. It can be shared across Web forms, and state information can be
recovered, even if the server fails or the connection breaks down.
UPDATE FILES WHILE THE SERVER IS RUNNING
Components of the application can be updated while the server is online and clients are
connected. The Framework will use the new files as soon as they are copied to the
DEPARTMENT OF COMPUTER SCIENCE ENGINEERING Page 2
-
8/3/2019 Synopsis 14JAN
13/94
CONNECTING M.B.S.C.E.T
application. Removed or old files that are still in use are kept in memory until the clients
have finished.
XML-BASED CONFIGURATION FILES
Configuration settings in ASP.NET are stored in XML files that can easily be read and
edited. We can also easily copy these to another server, along with the other files that
comprise the application.
3.1.2.2 ASP.NET OVERVIEW
Here are some points that give a quick overview ofASP.NET.
ASP.NET provides services to allow the creation, deployment, and execution of Web
Applications and Web Services
Like ASP, ASP.NET is a server-side technology
Web Applications are built using Web Forms. ASP.NET comes with built-in Web Forms
controls, which are responsible for generating the user interface. They mirror typical HTML
widgets like text boxes or buttons. If these controls do not fit needs, it is free to create our
own user controls.
Web Forms are designed to make building web-based applications as easy as building Visual
Basic applications.
3.1.3 ASP.NET ARCHITECTURE
ASP.NET is based on the fundamental architecture of .NET Framework. Visual Studio
provides a uniform way to combine the various features of this Architecture.
DEPARTMENT OF COMPUTER SCIENCE ENGINEERING Page 2
-
8/3/2019 Synopsis 14JAN
14/94
CONNECTING M.B.S.C.E.T
Fig: ASP.NET Architecture
Architecture is explained form bottom to top in the following discussion.
At the bottom of the Architecture is Common Language Runtime. NET Framework
common language runtime resides on top of the operating system services. The common
language runtime loads and executes code that targets the runtime. This code is therefore
called Managed code. The runtime provides, for example, the ability for cross-languageintegration.
.NET Framework provides a rich set of class libraries. These include base classes, like
networking and input/output classes, a data class library for data access, and classes for use
by programming tools, such as debugging services. All of them are brought together by the
Services Framework, which sits on top of the common language runtime.
ADO.NET is Microsofts ActiveX Data Object (ADO) model for the .NET Framework.
ADO.NET is not simply the migration of the popular ADO model to the managed
environment but a completely new paradigm for data access and manipulation.
ADO.NET is intended specifically for developing web applications. This is evident from its
two major design principles:
Disconnected Datasets: In ADO.NET, almost all data manipulation is done outside
the context of an open database connection.
DEPARTMENT OF COMPUTER SCIENCE ENGINEERING Page 2
-
8/3/2019 Synopsis 14JAN
15/94
CONNECTING M.B.S.C.E.T
Effortless Data Exchange with XML Datasets can converse in the universal data
format of the Web, namely XML.
The 4th layer of the framework consists of the Windows application model and, in parallel,
the Web application model. The Web application model-in the slide presented as ASP.NET-
includes Web Forms and Web Services. ASP.NET comes with built-in Web Forms controls,
which are responsible for generating the user interface. They mirror typical HTML widgets
like text boxes or buttons. If these controls do not fit your needs, you are free to create your
own user controls.
Web Services brings a model to bind different applications over the Internet. This model is
based on existing infrastructure and applications and is therefore standard-based, simple and
adaptable. Web Services are software solutions delivered via Internet to any device.
One of the obvious themes of .NET is unification and interoperability between various
programming languages. In order to achieve this; certain rules must be laid and all the
languages must follow these rules. In other words we cannot have languages running around
creating their own extensions and their own fancy new data types. CLS is the collection of
the rules and constraints that every language (that seeks to achieve .NET compatibility) must
follow.
The CLR and the .NET Frameworks in general, however, are designed in such a way that
code written in one language can not only seamlessly be used by another language. Hence
ASP.NET can be programmed in any of the .NET compatible language whether it is
VB.NET, C#, Managed C++ or JScript.NET.
3.1.3.1 EXECUTION PROCESS
We need to have a look at whats happening to the code in ASP.NET.
DEPARTMENT OF COMPUTER SCIENCE ENGINEERING Page 1
-
8/3/2019 Synopsis 14JAN
16/94
CONNECTING M.B.S.C.E.T
COMPILATION, WHEN PAGE IS REQUESTED THE FIRST TIME
The first time a page is requested, the code is compiled. Compiling code in .NET means that
a compiler in a first step emits Microsoft intermediate language (MSIL) and produces
metadata if you compile your source code to managed code. In a following step MSIL has to
be converted to native code.
MICROSOFT INTERMEDIATE LANGUAGE (MSIL)
Microsoft intermediate language is code in an assembly language like style. It is CPU
independent and therefore can be efficiently converted to native code. The conversion in turn
can be CPU-specific and optimized. The intermediate language provides a hardware
abstraction layer. MSIL is executed by the common language runtime.
COMMON LANGUAGE RUNTIME
The common language runtime contains just-in-time (JIT) compilers to convert the MSIL
into native code. This is done on the same computer architecture that the code should run on.
The runtime manages the code when it is compiled into MSIL the code is therefore called
managed code.
3.1.4 VERSIONS
DEPARTMENT OF COMPUTER SCIENCE ENGINEERING Page 1
-
8/3/2019 Synopsis 14JAN
17/94
CONNECTING M.B.S.C.E.T
The ASP.NET releases history tightly correlates with the .NET Frameworkreleases:
3.1.5 ADDITIONAL FEATURES IN ASP.NET 2.0
New data controls (GridView, FormView, DetailsView)
New technique for declarative data access (SqlDataSource, ObjectDataSource,
XmlDataSource controls)
Navigation controls
Master pages
Login controls
Themes
Web parts
Personalization services
Full pre-compilation
Support for 64-bit processors
DEPARTMENT OF COMPUTER SCIENCE ENGINEERING Page 2
Date Version
January 16, 2002 1.0
April 24, 2003 1.1
November 7, 2005 2.0
November 21, 2006 3.0
November 19, 2007 3.5
August 11, 2008 3.5 Service Pack 1
April 12, 2010 4.0
http://en.wikipedia.org/wiki/.NET_Frameworkhttp://en.wikipedia.org/wiki/ASP_master_pageshttp://en.wikipedia.org/wiki/ASP_master_pageshttp://en.wikipedia.org/wiki/.NET_Framework -
8/3/2019 Synopsis 14JAN
18/94
CONNECTING M.B.S.C.E.T
Provider class model
3.2 INTRODUCTION TO C# (PROGRAMMING LANGUAGE)
C# (pronounced C sharp) is intended to be a simple, modern, general-purpose, object-
oriented programming language. C# is a multi-paradigm programming language
encompassing strong typing, imperative, declarative, functional, generic, object-oriented
(class-based), and component-oriented programming disciplines. It was developed by
Microsoft within its .NET initiative and later approved as a standard by ECMA (ECMA-334)
and ISO (ISO/IEC 23270). C# is one of the programming languages designed for the
Common Language Infrastructure
3.2.1 DESIGN GOALS IN C#
Following is the Standard list of design goals implemented in C#:
C# language is intended to be a simple, modern, general-purpose, object-oriented
programming language.
The language, and implementations thereof, should provide support for software engineering
principles such as strong type checking, array bounds checking, detection of attempts to use
uninitialized variables, and automatic garbage collection. Software robustness,
durability, and programmer productivity are important.
The language is intended for use in developing software components suitable for
deployment in distributed environments.
Source code portability is very important, as is programmer portability, especially for those
programmers already familiar with C and C++.
Support forinternationalization is very important.
DEPARTMENT OF COMPUTER SCIENCE ENGINEERING Page 1
-
8/3/2019 Synopsis 14JAN
19/94
CONNECTING M.B.S.C.E.T
C# is intended to be suitable for writing applications for both hosted and embedded systems,
ranging from the very large that use sophisticated operating systems, down to the very small
having dedicated functions.
Although C# applications are intended to be economical with regard to memory and
processing power requirements, the language was not intended to compete directly on
performance and size with C, C++ or assembly language
3.2.2 WHY USE C# FOR .NET DEVELOPMENT
There are many reasons for making use of C# in ASP.NET. Some of them are listed below
OPERATIONAL PERSPECTIVE
VB .NET is significantly different from Java in terms of syntax and structure. C# is based
on the Java/C++ syntax. VB .NET developers will have a steeper learning curve when
adopting Java than C# developers. For this reason C# lends itself better to being a secondary
language in a Java based organization.
The .NET CLR (Common Language Infrastructure) has been submitted to ECMA and
accepted. C# has the same status. C# is better protected than VB .NET to changes in
strategic direction.
C# is used within the companies to develop live applications.
Visual Studio 2005 comes with JLCA (Java Language Conversion Assistant) allowing Java
code to be ported to C#. There is no comparable tool for VB .NET.
C# provides the ability to work with C/C++ style pointers. This is rarely required and
should be avoided. The exception to this rule is some forms of interoperability with legacy
Microsoft code. VB .NET does not have this capability.
DEPARTMENT OF COMPUTER SCIENCE ENGINEERING Page 1
-
8/3/2019 Synopsis 14JAN
20/94
CONNECTING M.B.S.C.E.T
C# supports Java style code documentation where definitions of properties and methods
are commented in such a way as to make the component interfaces self documenting. VB
.NET does not support this.
Visual Studio .NET itself was written using C#. Community support for C# is wider than
for VB both inside and outside Microsoft.
FINANCIAL PERSPECTIVE
In terms of the cost of multi-skilled developers, the "C# & Java" SkillSet should be cheaper
than "VB & Java" due to the languages similarities. Not only does this relate to less training
but also a higher quality of code/output as the developer is more likely to be highly
competent in both languages.
The lack of case sensitivity in VB means that there can be no common coding standards
across Java/VB as there could be across Java/C#. This further increases the cost of cross
training and maintaining those skills.
The Internet is the first stop when a development problem is encountered, and here the
significantly larger online C# community reduces time required to resolve problems.
The greater industry-wide take up of C# (compared to VB) means that more developers are
available to recruit.
Most C# developers were previously Java or C/C++ developers, and most VB developers
come from a VB5/6 background. As a result the average C# developer will have more
background in object oriented design (and is more likely to be to be competent in Java also).
3.2.3 FEATURES OF C# THAT DISTINGUISHES IT FROM C AND C++
(AND JAVA)
It has no global variables or functions. All methods and members must be declared within
classes. Static members of public classes can substitute for global variables and functions.
DEPARTMENT OF COMPUTER SCIENCE ENGINEERING Page 1
-
8/3/2019 Synopsis 14JAN
21/94
CONNECTING M.B.S.C.E.T
Local variables cannot shadow variables of the enclosing block, unlike C and C++. Variable
shadowing is often considered confusing by C++ texts.
C# supports a strict Boolean data type, bool. Statements that take conditions, such as
while and if, require an expression of a type that implements the true operator, such as the
Boolean type. While C++ also has a Boolean type, it can be freely converted to and from
integers, and expressions such as if (a) require only that a is convertible to bool, allowing a
to be an int, or a pointer. C# disallows this "integer meaning true or false" approach, on the
grounds that forcing programmers to use expressions that return exactly bool can prevent
certain types of common programming mistakes in C or C++ such as if (a = b) (use of
assignment = instead of equality ==).
In C#, memory address pointers can only be used within blocks specifically marked as
unsafe, and programs with unsafe code need appropriate permissions to run. Most object
access is done through safe object references, which always either point to a "live" object or
have the well-defined null value; it is impossible to obtain a reference to a "dead" object
(one that has been garbage collected), or to a random block of memory. An unsafe pointer
can point to an instance of a value-type, array, string, or a block of memory allocated on a
stack. Code that is not marked as unsafe can still store and manipulate pointers through the
System.IntPtr type, but it cannot dereference them.
Managed memory cannot be explicitly freed; instead, it is automatically garbage collected.
Garbage collection addresses the problem ofmemory leaks by freeing the programmer
of responsibility for releasing memory that is no longer needed.
In addition to the try...catch construct to handle exceptions, C# has a try...finally construct
to guarantee execution of the code in the finally block.
Multiple inheritance is not supported, although a class can implement any number of
interfaces. This was a design decision by the language's lead architect to avoid complication
and simplify architectural requirements throughout CLI.
C#, like C++, but unlike Java, supports operator overloading.
DEPARTMENT OF COMPUTER SCIENCE ENGINEERING Page 1
-
8/3/2019 Synopsis 14JAN
22/94
CONNECTING M.B.S.C.E.T
C# is more type safe than C++. The only implicit conversions by default are those that
are considered safe, such as widening of integers. This is enforced at compile-time, during
JIT, and, in some cases, at runtime. No implicit conversions occur between Booleans and
integers, or between enumeration members and integers (except for literal 0, which can be
implicitly converted to any enumerated type). Any user-defined conversion must be
explicitly marked as explicit or implicit, unlike C++ copy constructors and conversion
operators, which are both implicit by default. Starting with version 4.0, C# supports a
"dynamic" data type that enforces type checking at runtime only.
Enumeration members are placed in their own scope.
C# provides properties as syntactic sugar for a common pattern in which a pair of
methods, accessor (getter) and mutator (setter) encapsulate operations on a single
attribute of a class.
Full type reflection and discovery is available.
Checked exceptions are not present in C# (in contrast to Java). This has been a
conscious decision based on the issues of scalability.
3.2.4 CONCLUSION
The differences between VB. NET and C#, as standalone languages, are fairly minimal. C#
can do very few things that VB.NET cannot, and VB.NET provides a slightly easier
migration path for existing Microsoft VB developers.
However, in the context of Java being the primary language in the organization, C# is a
considerably better fit as a preferred .NET language.
3.3 INTRODUCTION TO SQL (BACK END)
DEPARTMENT OF COMPUTER SCIENCE ENGINEERING Page 1
-
8/3/2019 Synopsis 14JAN
23/94
CONNECTING M.B.S.C.E.T
A database management, or DBMS, gives the user access to their data and helps them
transform the data into information. Such database management systems include dBase,
paradox, IMS, SQL Server and SQL Server. These systems allow users to create, update and
extract information from their database.
A database is a structured collection of data. Data refers to the characteristics of people,
things and events. SQL Server stores each data item in its own fields. In SQL Server, the
fields relating to a particular person, thing or event are bundled together to form a single
complete unit of data, called a record (it can also be referred to as raw or an occurrence).
Each record is made up of a number of fields. No two fields in a record can have the same
field name.
3.3.1 SQL SERVER TABLES
SQL Server stores records relating to each other in a table. Different tables are created for
the various groups of information. Related tables are grouped together to form a database.
PRIMARY KEY
Every table in SQL Server has a field or a combination of fields that uniquely identifies each
record in the table. The Unique identifier is called the Primary Key, or simply the Key. The
primary key provides the means to distinguish one record from all other in a table. It allows
the user and the database system to identify, locate and refer to one particular record in the
database.
RELATIONAL DATABASE
SQL Server makes it very easy to link the data in multiple tables. Matching an employee to
the department in which they work is one example. This is what makes SQL Server a
relational database management system, or RDBMS. It stores data in two or more tables and
DEPARTMENT OF COMPUTER SCIENCE ENGINEERING Page 1
-
8/3/2019 Synopsis 14JAN
24/94
CONNECTING M.B.S.C.E.T
enables you to define relationships between the tables and enables you to define relationships
between the tables.
FOREIGN KEY
When a field in one table matches the primary key of another field is referred to as a foreign
key. A foreign key is a field or a group of fields in one table whose values match those of
the primary key of another table
3.3.2 REFERENTIAL INTEGRITY
Not only does SQL Server allow us to link multiple tables, it also maintains consistency
between them. Ensuring that the data among related tables is correctly matched is referred to
as maintaining referential integrity.
DATA ABSTRACTION:
A major purpose of a database system is to provide users with an abstract view of the data.
This system hides certain details of how the data is stored and maintained. Data abstraction is
divided into three levels.
PHYSICAL LEVEL:
This is the lowest level of abstraction at which one describes how the data are actually
stored.
CONCEPTUAL LEVEL:
At this level of database abstraction all the attributed and what data are actually stored is
described and entries and relationship among them.
VIEW LEVEL:
This is the highest level of abstraction at which one describes only part of the database.
DEPARTMENT OF COMPUTER SCIENCE ENGINEERING Page 2
-
8/3/2019 Synopsis 14JAN
25/94
CONNECTING M.B.S.C.E.T
3.3.3 ADVANTAGES OF RDBMS
Redundancy can be avoided
Inconsistency can be eliminated
Data can be Shared
Standards can be enforced
Security restrictions can be applied
Integrity can be maintained
Conflicting requirements can be balanced
Data independence can be achieved.
3.3.4 DISADVANTAGES OF DBMS
A significant disadvantage of the DBMS system is cost. In addition to the cost of purchasing
of developing the software, the hardware has to be upgraded to allow for the extensive
programs and the workspace required for their execution and storage. While centralization
reduces duplication, the lack of duplication requires that the database be adequately backed
up so that in case of failure the data can be recovered.
3.3.5 FEATURES OF SQL SERVER (RDBMS)
SQL SERVER is one of the leading database management systems (DBMS) because it is the
only Database that meets the uncompromising requirements of todays most demanding
information systems. From complex decision support systems to the most rigorous online
transaction processing application, SQL Server leads the industry in both performance and
capability. SQL SERVER is a truly portable, distributed, and open DBMS that delivers
unmatched performance, continuous operation and support for every database.
SQL SERVER RDBMS is high performance fault tolerant DBMS which is specially
designed for online transactions processing and for handling large database application. SQL
DEPARTMENT OF COMPUTER SCIENCE ENGINEERING Page 2
-
8/3/2019 Synopsis 14JAN
26/94
CONNECTING M.B.S.C.E.T
SERVER with transactions processing option offers features which contribute to very high
level of transaction processing throughput.
ENTERPRISE WIDE DATA SHARING
The unrivaled portability and connectivity of the SQL SERVER DBMS enables all the
systems in the organization to be linked into a singular, integrated computing resource
PORTABILITY
SQL SERVER is fully portable to more than 80 distinct hardware and operating systems
platforms, including UNIX, MSDOS, OS/2, Macintosh and dozens of proprietary platforms.
This portability gives complete freedom to choose the database server platform that meets
the system requirements.
OPEN SYSTEMS
SQL SERVER offers a leading implementation of industry standard SQL. SQL Servers
open architecture integrates SQL SERVER and NONSQL SERVER DBMS with industrys
most comprehensive collection of tools, application, and third party software products SQL
Servers Open architecture provides transparent access to data from other relational database
and even non-relational database.
DISTRIBUTED DATA SHARING
SQL Servers networking and distributed database capabilities to access data stored on
remote server with the same ease as if the information was stored on a single local computer.A single SQL statement can access data at multiple sites. We can store data where system
requirements such as performance, security or availability dictate.
UNMATCHED PERFORMANCE
DEPARTMENT OF COMPUTER SCIENCE ENGINEERING Page 2
-
8/3/2019 Synopsis 14JAN
27/94
CONNECTING M.B.S.C.E.T
The most advanced architecture in the industry allows the SQL SERVER DBMS to deliver
unmatched performance.
CHAPTER 4
FEASIBILITY STUDY
4.1 INTRODUCTION:
DEPARTMENT OF COMPUTER SCIENCE ENGINEERING Page 1
-
8/3/2019 Synopsis 14JAN
28/94
CONNECTING M.B.S.C.E.T
The initial investigation in the development of the project points to the question whether the
project is feasible. Feasibility is conducted to identify the best system that meets all the
requirements. This includes an identification description, and evaluation of the proposed
systems and selection of the best system for the job.The feasibility study is carried out to test
if the proposed system is worth being implemented. Given unlimited and infinite time, all
projects are feasible. Unfortunately such resources and time are not possible in real life
situations. Hence it becomes both necessary and prudent to evaluate the feasibility of the
project at the earliest possible time in order to avoid unnecessarily wastage of time, effort
and professional embarrassment over an ill conceived system. Feasibility study is a test of
system proposed regarding its work ability, impact on the organization ability to meet the
user needs and effective use of resources.
The main objective of feasibility study is to test the technical, operational and economical
feasibility of developing a computer system application. The following feasibility studies
were carried out for the proposed system:
ECONOMIC FEASIBILITY:
An evaluation of development cost weighed against the income of benefit derived from the
developed system. Here the development cost is evaluated by weighing it against the
ultimate benefits derived from the new system. The proposed system is economically
feasible if the benefits obtained in the long run compensate rather than overdo the cost
incurred in designing and implementing. In this case the benefits outweigh the cost that
makes the system economically feasible.
TECHNICAL FEASIBILITY:
Technical feasibility involves the study of function performance and constraints that may
affect the ability to achieve the acceptable system. A system is technically feasible, if it can
be designed and implemented within the limitations of available resources like funds,
hardware, software etc. The considerations that are normally associated with technical
DEPARTMENT OF COMPUTER SCIENCE ENGINEERING Page 2
-
8/3/2019 Synopsis 14JAN
29/94
CONNECTING M.B.S.C.E.T
feasibility include development risk, resources availability and technology. Management
provides latest hardware and software facilities for successful completion of the project.
The proposed system is technically feasible as the Technology we are using to implement the
Project (i.e. ASP.NET) is fully capable to implement our projects requirement analysis that
was performed in the analysis section.
OPERATIONAL FEASIBILITY:
The Project is Operationally Feasible as it can be implemented easily on to a web server. Its
operation will make it more popular as a complete discussion forum.
SCHEDULE FEASIBILITY:
It evaluates the time taken in the development of the project. This program has schedule
feasibility.
DEPARTMENT OF COMPUTER SCIENCE ENGINEERING Page 2
-
8/3/2019 Synopsis 14JAN
30/94
CONNECTING M.B.S.C.E.T
CHAPTER 5
INTERFACE OF THE PROJECT:
5.1 HOME PAGE
CONNECTING MBSCET
DEPARTMENT OF COMPUTER SCIENCE ENGINEERING Page 3
-
8/3/2019 Synopsis 14JAN
31/94
CONNECTING M.B.S.C.E.T
GENERAL
ANNOUNCEMENTS
DATESHEET OF B.E
7TH SEMESTER.
PARTICIPANTS INVITED
FOR DEBATE IN JAMMU
UNIVERSITY ON 15-12-
2011
OTHER
ANNOUNCEMENTS
ABOUT
MBSCET
PHOTOG
ALLERY
ACHIEVE
MENTS
PLACEME
NTS
STREAM
S
AVAILABLE
DEPARTMENT OF COMPUTER SCIENCE ENGINEERING Page 1
LOGIN
REGISTER
-
8/3/2019 Synopsis 14JAN
32/94
CONNECTING M.B.S.C.E.T
5.2 REGISTER
REGISTRATION FORM
REGISTRATION I.D
SECURITY CODE
5.3 LOGIN
DEPARTMENT OF COMPUTER SCIENCE ENGINEERING Page 1
MBS-CON-T00001/MBS-CON-
KE HOI7893 U
OK
-
8/3/2019 Synopsis 14JAN
33/94
CONNECTING M.B.S.C.E.T
LOGIN
USER NAME
PASSWORD
5.4 TEACHER REGISTRATION FORM
TEACHER REGISTRATION FORM
DEPARTMENT OF COMPUTER SCIENCE ENGINEERING Page 1
ROHIT8794
*******************
OK
-
8/3/2019 Synopsis 14JAN
34/94
CONNECTING M.B.S.C.E.T
REGISTRATION NO:
NAME:
DATE OF BIRTH:
DEPARTMENT:
QUALIFICATION:
GENDER
*PERSONAL PH. NO:
*ALTERNATIVE PH. NO:
DEPARTMENT OF COMPUTER SCIENCE ENGINEERING Page 2
MBS-CON-T00001
DHEERA SHARMA
11 AUG 1985
C.S.E
M.TECH
MALE FEMAL
9999999999
9999999991
SUBMIBUZZOWHAT IS THE NAME OF YOUR FIRST**********************
DHEERA 07SHARMA
-
8/3/2019 Synopsis 14JAN
35/94
CONNECTING M.B.S.C.E.T
5.5 IMAGE UPLOAD
DEPARTMENT OF COMPUTER SCIENCE ENGINEERING Page 3
CONNECTINGMBSCET
UPLOAD YOUR PICTURE:BROW
SUBMIT CANCE
-
8/3/2019 Synopsis 14JAN
36/94
CONNECTING M.B.S.C.E.T
5.6 CHECKING DETAILSCHECK YOUR DETAILS
DEPARTMENT OF COMPUTER SCIENCE ENGINEERING Page 4
-
8/3/2019 Synopsis 14JAN
37/94
CONNECTING M.B.S.C.E.T
NAME: DHEERAJ SHARMA
DATE OF BIRTH: 11 AUG 1985
DEPARTMENT: CSE
QUALIFICATION: M TECH.
GENDER: MALE
PERSONAL PH. NO: 9999999999
ALTERNATIVE PH. NO: 9999999991
DEPARTMENT OF COMPUTER SCIENCE ENGINEERING Page 5
-
8/3/2019 Synopsis 14JAN
38/94
CONNECTING M.B.S.C.E.T
EMAIL ADDRESS: [email protected]
USER ID: DHEERAJ07SHARMA
NOTE: PRESS OK TO FINALLY SUBMIT & CANCEL TO GO BACK ANDCORRECT THE DETAILS. ONCE SUBMITTED CHANGES WILL NOT BE
ENTERTAINED
DEPARTMENT OF COMPUTER SCIENCE ENGINEERING Page 3
OK CANCE
-
8/3/2019 Synopsis 14JAN
39/94
CONNECTING M.B.S.C.E.T
5.7 WELCOME MESSAGE
CONNECTING MBSCET
YOUR USER ID
IS..
&PASSWORD
DEPARTMENT OF COMPUTER SCIENCE ENGINEERING Page 5
-
8/3/2019 Synopsis 14JAN
40/94
CONNECTING M.B.S.C.E.T
IS
NOTE DOWN DETAILS FOR FURTHER
ACCESS TO YOUR ACCOUNT.
5.8 STUDENT REGISTRATION
STUDENT REGISTRATION FORM
DEPARTMENT OF COMPUTER SCIENCE ENGINEERING Page 1
O
-
8/3/2019 Synopsis 14JAN
41/94
CONNECTING M.B.S.C.E.T
REGISTRATION NO:
NAME:
DATE OF BIRTH:
DEPARTMENT:
SEMESTER
GENDER
*PERSONAL PH. NO:
*PARENTS PH. NO:
DEPARTMENT OF COMPUTER SCIENCE ENGINEERING Page 2
MBS-CON-S00001
ROHIT GUPTA
11 AUG 1990
C.S.E
7TH
MALE FEMAL
9999999999
9999999991
SUBMIBUZZOWHAT IS THE NAME OF YOUR FIRST**********************ROHIT0945
-
8/3/2019 Synopsis 14JAN
42/94
CONNECTING M.B.S.C.E.T
5.9 IMAGE UPLOAD
DEPARTMENT OF COMPUTER SCIENCE ENGINEERING Page 2
UPLOAD YOUR PICTURE:
BROW
SUBMIT CANC
-
8/3/2019 Synopsis 14JAN
43/94
CONNECTING M.B.S.C.E.T
5.10 CHECKING DETAILS
PLEASE CHECK THE DETAILS:
DEPARTMENT OF COMPUTER SCIENCE ENGINEERING Page 3
-
8/3/2019 Synopsis 14JAN
44/94
CONNECTING M.B.S.C.E.T
NAME: ROHIT GUPTA
DATE OF BIRTH: 11 AUG 1990
DEPARTMENT: CSE
SEMESTER: 7TH
GENDER: MALE
PERSONAL PH. NO: 9999999999
DEPARTMENT OF COMPUTER SCIENCE ENGINEERING Page 4
OK CANCEL
-
8/3/2019 Synopsis 14JAN
45/94
CONNECTING M.B.S.C.E.T
5.11 WELCOME MESSAGE
CONNECTING MBSCET
YOUR USERID
IS..
&PASSWORD
IS
NOTE DOWN DETAILS FOR FURTHER
DEPARTMENT OF COMPUTER SCIENCE ENGINEERING Page 3
-
8/3/2019 Synopsis 14JAN
46/94
CONNECTING M.B.S.C.E.T
ACCESS TO YOUR ACCOUNT.
5.12 STUDENT PROFILE
DEPARTMENT OF COMPUTER SCIENCE ENGINEERING Page 1
O
-
8/3/2019 Synopsis 14JAN
47/94
CONNECTING M.B.S.C.E.T
CONNECTING MBSCET
DEPARTMENT OF COMPUTER SCIENCE ENGINEERING Page 2
-
8/3/2019 Synopsis 14JAN
48/94
CONNECTING M.B.S.C.E.T
STATUS
OF
COMMON
WALL
WELCOME ROHIT GUPTA
ABOUT
MBSCET
PHOTOGAL
LERY
ACHIEVEME
NTS
PLACEMENT
S
STREAMS
AVAILABLE
BRANCH
SPECIFICANNOUNCEME
NTS
DEPARTMENT OF COMPUTER SCIENCE ENGINEERING Page 3
VISIT COMMON WALL
TECH TALK
SYLLABUS
TIMETABLE
DATESHEET
WATCH LECTURES
-
8/3/2019 Synopsis 14JAN
49/94
CONNECTING M.B.S.C.E.T
5.13 TEACHER PROFILE
CONNECTING MBSCET
DEPARTMENT OF COMPUTER SCIENCE ENGINEERING Page 3
-
8/3/2019 Synopsis 14JAN
50/94
CONNECTING M.B.S.C.E.T
STATUS
OF
COMMON
WALL
WELCOME DHEERAJ
SHARMA ABOUTMBCET
PHOTOGALL
ERY
ACHIEVEME
NTS
PLACEMENT
S
STREAMS
AVAILABLE
TEACHER
S PECIFICANNOUNCEME
NTS
DEPARTMENT OF COMPUTER SCIENCE ENGINEERING Page 2
VISIT COMMON WALL
TECH TALK
SYLLABUS
SCHEDULE
-
8/3/2019 Synopsis 14JAN
51/94
CONNECTING M.B.S.C.E.T
5.14 COMMON WALL
CONNECTING
MBSCET HOME
DEPARTMENT OF COMPUTER SCIENCE ENGINEERING Page 2
SEARC
-
8/3/2019 Synopsis 14JAN
52/94
CONNECTING M.B.S.C.E.T
USER: RAKESH
QUERY: IS THERE A COMPANY
PLACEMENT
DRIVE
TOMORROW??????
DATE: 6-12-2011.
TIME:4.45 P.M
ANSWERED BY: ROHIT
YES,ALSO BRING ORIGINAL MARKSHEETS FOR
ALL SEMESTERS
DATE:6-12-2011 TIME:5PM
COMMENT
VIEW OLD STORIES
BRANC
H
ANNO
UNCE
METS
PLACEM
ENT
CELL
ANNOU
NCEME
NTS
AVAILA
BLE
LECTU
RES
ACADE
MIC
SECTION
DEPARTMENT OF COMPUTER SCIENCE ENGINEERING Page 1
-
8/3/2019 Synopsis 14JAN
53/94
CONNECTING M.B.S.C.E.T
5.15 ADMINISTRATOR PAGES
DEPARTMENT OF COMPUTER SCIENCE ENGINEERING Page 2
-
8/3/2019 Synopsis 14JAN
54/94
CONNECTING M.B.S.C.E.T
DEPARTMENT OF COMPUTER SCIENCE ENGINEERING Page 3
CONNECTING MBSCET
ADMINISTRATOR
ACTIONS:
DATESHEET Add | Remove
SYLLABUS Add | Remove
TIME TABLE Add | Remove
LATEST ANNOUNCEMENTS
-
8/3/2019 Synopsis 14JAN
55/94
CONNECTING M.B.S.C.E.T
5.15.1 ADDING DATESHEET/TIMETABLE /SYLLABUS
HOME CONNECTING MBSCET
DEPARTMENT OF COMPUTER SCIENCE ENGINEERING Page 4
-
8/3/2019 Synopsis 14JAN
56/94
CONNECTING M.B.S.C.E.T
ADMINISTATOR
ACTION: ADD
DATESHEET/SYLLABUS/TIMETABLE
BRANCH
SEMESTER
FILEPATH
DEPARTMENT OF COMPUTER SCIENCE ENGINEERING Page 5
SUBM
BROWSE
-
8/3/2019 Synopsis 14JAN
57/94
CONNECTING M.B.S.C.E.T
5.15.2 ADDING COLLEGE ANNOUNCEMENTS
CONNECTING MBSCET
ADMINISTRATOR
ACTION: ADD COLLEGE ANNOUNCEMENTS
EVENT
DESCRIPTION
DEPARTMENT OF COMPUTER SCIENCE ENGINEERING Page 2
-
8/3/2019 Synopsis 14JAN
58/94
CONNECTING M.B.S.C.E.T
FILEPATH
DEPARTMENT OF COMPUTER SCIENCE ENGINEERING Page 2
BROWSE
SUBM
-
8/3/2019 Synopsis 14JAN
59/94
CONNECTING M.B.S.C.E.T
DEPARTMENT OF COMPUTER SCIENCE ENGINEERING Page 3
HOME
CONNECTING MBSCET
ADMINISTRATOR
ACTION: ADD BRANCH ANNOUNCEMENTS
BRANCH
COMMON FOR ALL SEMESTER
YES NO
SEMESTER
BROWSE SUBM
-
8/3/2019 Synopsis 14JAN
60/94
CONNECTING M.B.S.C.E.T
5.15.3 ADDING BRANCH SPECIFIC ANNOUNCEMENTS
5.15.4 ADDING TEACHER SPECIFIC ANNOUNCEMENTS
HOME
CONNECTING MBSCET
ADMINISTRATOR
ACTION: ADD TEACHER ANNOUNCEMENTS
COMMON FOR ALL TEACHERS
YES NO
DEPARTMENT
DEPARTMENT OF COMPUTER SCIENCE ENGINEERING Page 5
-
8/3/2019 Synopsis 14JAN
61/94
CONNECTING M.B.S.C.E.T
EVENT
DESCRIPTION
FILE PATH
5.15.5 ADDING LECTURES
HOME
CONNECTING MBSCET
DEPARTMENT OF COMPUTER SCIENCE ENGINEERING Page 1
SUBM
BROWSE
-
8/3/2019 Synopsis 14JAN
62/94
CONNECTING M.B.S.C.E.T
ADMINISTRATOR
ACTION: ADD LECTURES
BRANCH
SEMESTER
SUBJECT
TOPIC
FILE
PRESENTED BY
DEPARTMENT OF COMPUTER SCIENCE ENGINEERING Page 2
BROWSE
SUBM
-
8/3/2019 Synopsis 14JAN
63/94
CONNECTING M.B.S.C.E.T
CHAPTER 6
WORKING OF THE PROJECT
This chapter deals with the actual working of our project. The project deals with the
following type of process:
REGISTRATION PROCESS:
When a user logs into the website, he can perform a variety of tasks which ranges fromcreating his own profile to accessing the entire information of the college. Suppose, the user
logs into the website for the first time, the pre-requisite for him is to possess a registration ID
and the Security code which is provided to him by the College authorities. Once a user has
these pre-requisites fulfilled his job is just to get himself registered in the forum. The
registration process starts with the conformation that the registration ID and the security code
entered by the user is valid or not that is in other words, it is the same registration ID and the
Security Code that the college authority has provided to him. Once this conformation is
made, the registration process can follow in. This registration process involves filling up all
the information related to the user in the registration form. The user is also asked to select a
user ID which should be unique. The uniqueness of the user Id is verified by checking the
entered user Id with that already present in the Database. Once this process is accomplished a
DEPARTMENT OF COMPUTER SCIENCE ENGINEERING Page 2
-
8/3/2019 Synopsis 14JAN
64/94
CONNECTING M.B.S.C.E.T
unique user id and password (which are selected by the user itself) are given to the user for
further login process.
LOGIN PROCESS:
Now the user can login by making use of his User_id and Password provided to him through
the Registration process. This process would direct the user to his individual profile.
In his profile he can perform a variety of operations, depending upon his role (teacher or
student).
FORGOT PASSWORD:
This process would enable the user to change his password, in case he has forgotten the
existing one. This process involves verifying user authentication by querying his User_id,
security question and Security answer. After this verification process, a new valid password
is allotted to the user.
The detailed working of our project which includes the flow of data, is illustrated in the data
flow Diagrams below:
DEPARTMENT OF COMPUTER SCIENCE ENGINEERING Page 2
-
8/3/2019 Synopsis 14JAN
65/94
CONNECTING M.B.S.C.E.T
DEPARTMENT OF COMPUTER SCIENCE ENGINEERING Page 1
-
8/3/2019 Synopsis 14JAN
66/94
CONNECTING M.B.S.C.E.T
DEPARTMENT OF COMPUTER SCIENCE ENGINEERING Page 1
-
8/3/2019 Synopsis 14JAN
67/94
CONNECTING M.B.S.C.E.T
DEPARTMENT OF COMPUTER SCIENCE ENGINEERING Page 2
-
8/3/2019 Synopsis 14JAN
68/94
CONNECTING M.B.S.C.E.T
DEPARTMENT OF COMPUTER SCIENCE ENGINEERING Page 1
-
8/3/2019 Synopsis 14JAN
69/94
CONNECTING M.B.S.C.E.T
DEPARTMENT OF COMPUTER SCIENCE ENGINEERING Page 1
-
8/3/2019 Synopsis 14JAN
70/94
CONNECTING M.B.S.C.E.T
DEPARTMENT OF COMPUTER SCIENCE ENGINEERING Page 2
-
8/3/2019 Synopsis 14JAN
71/94
CONNECTING M.B.S.C.E.T
DEPARTMENT OF COMPUTER SCIENCE ENGINEERING Page 3
-
8/3/2019 Synopsis 14JAN
72/94
CONNECTING M.B.S.C.E.T
DEPARTMENT OF COMPUTER SCIENCE ENGINEERING Page 5
-
8/3/2019 Synopsis 14JAN
73/94
CONNECTING M.B.S.C.E.T
DEPARTMENT OF COMPUTER SCIENCE ENGINEERING Page 1
-
8/3/2019 Synopsis 14JAN
74/94
CONNECTING M.B.S.C.E.T
CHAPTER 7
DATABASE INVOLVED IN THE PROJECT
7.1 INTRODUCTION
DATABASE:
The term "database" may be narrowed to specify particular aspects of
organized collection of data in computer data storage. Following are the
types of database available in the present scenario:
ACTIVE DATABASE:
An active database is a database that includes an event-driven
architecture which can respond to conditions both inside and outside the
database. Possible uses include security monitoring, alerting, statistics
gathering and authorization.
DATA WAREHOUSE:
Data warehouses archive data from operational databases and often from
external sources such as market research firms. Often operational data
undergoes transformation on its way into the warehouse, getting
summarized, anonymized, reclassified, etc. The warehouse becomes the
central source of data for use by managers and other end-users who may
not have access to operational data. Operations in a data warehouse are
typically concerned with bulk data manipulation, and as such, it is
DEPARTMENT OF COMPUTER SCIENCE ENGINEERING Page 2
-
8/3/2019 Synopsis 14JAN
75/94
CONNECTING M.B.S.C.E.T
unusual and inefficient to target individual rows for update, insert or
delete. Bulk native loaders for input data and bulk SQL passes for
aggregation are the norm.
DISTRIBUTED DATABASE:
The definition of a distributed database is broad, and may be utilized in
different meanings. In general it typically refers to a modular DBMS
architecture that allows distinct DBMS instances to cooperate as a single
DBMS over processes, computers, and sites, while managing a single
database distributed itself over multiple computers, and different sites.
Examples are databases of local work-groups and departments at
regional offices, branch offices, manufacturing plants and other work
sites. These databases can include both segments shared by multiple
sites, and segments specific to one site and used only locally in that site.
EMBEDDED DATABASE:
An embedded database system is a DBMS which is tightly integrated with
application software that requires access to stored data in a way that the
DBMS is hidden from the applications end-user and requires little or no
ongoing maintenance. The "embedded database is used in real-time
embedded systems such as telecommunications switches and consumer
electronics devices.
END-USER DATABASE:
These databases consist of data developed by individual end-users.Examples of these are collections of documents, spreadsheets,
presentations, multimedia, and other files. Several products exist to
support such databases. Some of them are much simpler than full fledged
DBMSs, with more elementary DBMS functionality (e.g., not supporting
DEPARTMENT OF COMPUTER SCIENCE ENGINEERING Page 2
-
8/3/2019 Synopsis 14JAN
76/94
CONNECTING M.B.S.C.E.T
multiple concurrent end-users on a same database), with basic
programming interfaces, and a relatively small "foot-print" (not much
code to run as in "regular" general-purpose databases).
However, also available general-purpose DBMSs can often be used for
such purpose, if they provide basic user-interfaces for straightforward
data. Three types of people are involved with a general-purpose DBMS:
1. DBMS DEVELOPERS - These are the people that design and build the
DBMS product, and the only ones who touch its code. They are typically
the employees of a DBMS vendor (e.g., Oracle, IBM, Microsoft, Sybase),
or, in the case of Open source DBMSs (e.g., MySQL), volunteers or people
supported by interested companies and organizations. They are typically
skilled systems programmers.
2. APPLICATION DEVELOPERS- These are the people that design and
build a database-based application that uses the DBMS. The group
members write the needed application programs which the application
comprises of.
3. DATABASE ADMINISTRATORS These group members design the
needed database and maintain it. Both are well familiar with the DBMS
product and use its user interfaces (as well as usually other tools) for their
work. Sometimes the application itself is packaged and sold as a separate
product, which may include the DBMS inside (see Embedded database;
subject to proper DBMS licensing), or sold separately as an add-on to the
DBMS.
Every database transaction obeys the following rules:
DEPARTMENT OF COMPUTER SCIENCE ENGINEERING Page 2
-
8/3/2019 Synopsis 14JAN
77/94
CONNECTING M.B.S.C.E.T
ATOMICITY - Either the effects of all or none of its operations remain ("all or nothing"
semantics) when a transaction is completed (committed or aborted respectively). In other
words, to the outside world a committed transaction appears (by its effects on the database)
to be indivisible, atomic, and an aborted transaction does not leave effects on the database at
all, as if never existed.
CONSISTENCY - Every transaction must leave the database in a consistent (correct) state,
i.e., maintain the predetermined integrity rules of the database (constraints upon and among
the database's objects). A transaction must transform a database from one consistent state to
another consistent state (however, it is the responsibility of the transaction's programmer to
make sure that the transaction itself is correct, i.e., performs correctly what it intends to
perform (from the application's point of view) while the predefined integrity rules are
enforced by the DBMS). Thus since a database can be normally changed only by
transactions, all the database's states are consistent. An aborted transaction does not change
the database state it has started from, as if it never existed (atomicity above).
ISOLATION - Transactions cannot interfere with each other (as an end result of their
executions). Moreover, usually (depending on concurrency control method) the effects of an
incomplete transaction are not even visible to another transaction. Providing isolation is the
main goal of concurrency control.
DURABILITY - Effects of successful (committed) transactions must persist through crashes
(typically by recording the transaction's effects and its commit event in a non-volatile
memory).
DEPARTMENT OF COMPUTER SCIENCE ENGINEERING Page 1
-
8/3/2019 Synopsis 14JAN
78/94
CONNECTING M.B.S.C.E.T
7.2 DATA DICTIONARY:
The name of the database involved in the project is MBS_DB.
7.2.1 TABLES INVOLVED:
The various tables involved in the database are:
AUTH
REG
ST_REG
TE_REG
FORUM
DATESHEET
TIMETABLE
SYLLABUS
CLG_ANC
BRN_ANC
TE_ANC
AV_LEC
7.2.2 TABLE DESCRIPTION:
The description of the Tables is as under:
AUTH:
FIELD DATA TYPE CONSTRAINT
U_ID VAR CHAR(20) PRIMARY KEY
DEPARTMENT OF COMPUTER SCIENCE ENGINEERING Page 1
-
8/3/2019 Synopsis 14JAN
79/94
CONNECTING M.B.S.C.E.T
PASSWORD VAR CHAR(10)
ROLE VAR CHAR(10)
SEC_ QUES VAR CHAR(50)
SEC_ANS VAR CHAR(50)
AVAL CHAR(1) CHECK
REG:
FIELD DATA TYPE CONSTRAINT
REG_ID VARCHAR(15) PRIMARY KEY
SEC_CODE VARCHAR(20)
CREATED CHAR(1) CHECK
ROLE VARCHAR(10)
ST_REG:
FIELD DATA TYPE CONSTRAINT
REG_ID VARCHAR(15) FOREIGN KEY,UNIQUE
ST_NAME VARCHAR(50)
BRANCH VARCHAR(20)
DOB CHAR(10)
SEM INTEGER(1)
DEPARTMENT OF COMPUTER SCIENCE ENGINEERING Page 1
-
8/3/2019 Synopsis 14JAN
80/94
CONNECTING M.B.S.C.E.T
GENDER VARCHAR(6)
ST_PHNO VARCHAR(10)
ST_PARPHNO VARCHAR(10)
ST_EMAIL VARCHAR(60)
ST_PIC VARCHAR(60)
U_ID VARCHAR(20) FOREIGN KEY
TE_REG:
FIELD DATA TYPE CONSTRAINT
REG_ID VARCHAR(15)
TE_NAME VARCHAR(50)
DEPT VARCHAR(20)
QUAL VARCHAR(50)
DEPARTMENT OF COMPUTER SCIENCE ENGINEERING Page 1
-
8/3/2019 Synopsis 14JAN
81/94
CONNECTING M.B.S.C.E.T
GENDER VARCHAR(6)
TE_PHNO VARCHAR(10)
TE_EMAIL VARCHAR(60)
PIC VARCHAR(60)
U_ID VARCHAR(20) FOREIGN KEY
FORUM
FIELD DATA TYPE CONSTRAINT
U_ID VARCHAR(20) FOREIGN KEY
TOPIC VARCHAR(60)
QUERY VARCHAR(200)
ANS VARCHAR(500)
ANS_BY VARCHAR(50) FOREIGN KEY
DATE DATE
DATESHEET:
FIELD DATA TYPE CONSTRAINT
D_ID VARCHAR(10) PRIMARY KEY
FILE VARCHAR(100)
DATE DATE
SEM INTEGER(1)
BRANCH VARCHAR(20)
DEPARTMENT OF COMPUTER SCIENCE ENGINEERING Page 1
-
8/3/2019 Synopsis 14JAN
82/94
CONNECTING M.B.S.C.E.T
TIMETABLE:
FIELD DATA TYPE CONSTRAINT
T_ID VARCHAR(10) PRIMARY KEY
FILE VARCHAR(100)
DATE DATE
SEM INTEGER(1)
BRANCH VARCHAR(20)
SYLLABUS:
FIELD DATA TYPE CONSTRAINT
S_ID VARCHAR(10) PRIMARY KEY
FILE VARCHAR(100)
DATE DATE
SEM INTEGER(1)
BRANCH VARCHAR(20)
CLG_ANC:
FIELD DATA TYPE CONSTRAINT
A_ID VARCHAR(10) PRIMARY KEY
EVENT VARCHAR(50)
DESCP CHAR(100)
POST_BY CHAR(50) FOREIGN KEY
DATE DATE
DEPARTMENT OF COMPUTER SCIENCE ENGINEERING Page 1
-
8/3/2019 Synopsis 14JAN
83/94
CONNECTING M.B.S.C.E.T
BRN_ANC:
FIELD DATA TYPE CONSTRAINT
B_ID VARCHAR(10) PRIMARY KEY
EVENT VARCHAR(50)
DESCP CHAR(100)
POST_BY CHAR(50) FOREIGN KEY
BRANCH VARCHAR(20)
SEM INTEGER(1)
DATE DATE
TE_ANC:
FIELD DATA TYPE CONSTRAINT
TE_ID VARCHAR(10) PRIMARY KEY
EVENT VARCHAR(50)
DESCP CHAR(100)
-DEPTT VARCHAR(20)
DEPARTMENT OF COMPUTER SCIENCE ENGINEERING Page 1
-
8/3/2019 Synopsis 14JAN
84/94
CONNECTING M.B.S.C.E.T
DATE DATE
AV_LEC:
FIELD DATA TYPE CONSTRAINT
AV_ID VARCHAR(10) PRIMARY KEY
BRANCH VARCHAR(20)
SUB VARCHAR(50)
TOPIC VARCHAR(50)
PRESENT_BY VARCHAR(50) FOREIGN KEY
FILE VARCHAR(100)
DATE DATE
SEM INT(1) FOREIGN KEY
7.2.3 RELATION BETWEEN TABLES:
U_ID
PASSWORD
ROLE
SEC_ QUES
DEPARTMENT OF COMPUTER SCIENCE ENGINEERING Page 1
-
8/3/2019 Synopsis 14JAN
85/94
CONNECTING M.B.S.C.E.T
SEC_ANS
AVAL
DEPARTMENT OF COMPUTER SCIENCE ENGINEERING Page 1
ST_REG
REG_ID
ST_NAME
BRANCH
DOB
SEM
GENDER
ST_PHNO
ST_PARPHNO
ST_EMAIL
ST_PIC
U_ID
REG
REG_ID
SEC_CODE
CREATEDROLE
TE_REG
REG_ID
TE_NAME
DEPT
QUAL
GENDER
TE_PHNO
TE_EMAIL
PIC
U_ID
FORUM
U_ID
TOPIC
QUERY
ANS
ANS_BY
DATE
-
8/3/2019 Synopsis 14JAN
86/94
CONNECTING M.B.S.C.E.T
CHAPTER 8
CONNECTIVITY
8.1 ADO .NET
8.1.1 INTRODUCTION:
Most applications need data access at one point of time making it a crucial component when
working with applications. Data access is making the application interact with a database,
where all the data is stored. Different applications have different requirements for database
access. VB .NET uses ADO .NET (Active X Data Object) as its data access and
manipulation protocol which also enables us to work with data on the Internet.
8.1.2 EVOLUTION OF ADO.NET
The first data access model, DAO (data access model) was created for local databases with
the built-in Jet engine which had performance and functionality issues. Next came RDO
(Remote Data Object) and ADO (Active Data Object) which were designed for Client Server
architectures but, soon ADO took over RDO. ADO was a good architecture but as the
language changes so is the technology. With ADO, all the data is contained in a RecordSet
object which had problems when implemented on the network and penetrating firewalls.
ADO was a connected data access, which means that when a connection to the database is
established the connection remains open until the application is closed. Leaving the
connection open, for the lifetime of the application, raises concerns about database security
and network traffic. Also, as databases are becoming increasingly important and as they are
serving more people, a connected data access model makes us think about its productivity.
For example, an application with connected data access may do well when connected to two
clients, the same may do poorly when connected to 10 and might be unusable when
connected to 100 or more. Also, open database connections use system resources to a
maximum extent making the system performance less effective.
DEPARTMENT OF COMPUTER SCIENCE ENGINEERING Page 3
http://www.webhostingsearch.com/dedicated-server.phphttp://www.webhostingsearch.com/dedicated-server.php -
8/3/2019 Synopsis 14JAN
87/94
CONNECTING M.B.S.C.E.T
8.1.3 WHY ADO.NET?
To cope up with some of the problems mentioned above, ADO .NET came into existence.
ADO .NET addresses the above mentioned problems by maintaining a disconnected
database access model which means, when an application interacts with the database, the
connection is opened to serve the request of the application and is closed as soon as the
request is completed. Likewise, if a database is updated, the connection is opened long
enough to complete the Update operation and is closed. By keeping connections open for
only a minimum period of time, ADO.NET conserves system resources and provides
maximum security for databases and also has less impact on system performance. Also,
ADO.NET when interacting with the database uses XML and converts all the data into XML
format for database related operations making them more efficient.
8.1.4 DESIGN GOALS FOR ADO.NET
Visual Studio 2005
As application development has evolved, new applications have become loosely coupled
based on the Web application model. More and more of today's applications use XML to
encode data to be passed over network connections. Web applications use HTTP as the fabric
for communication between tiers, and therefore must explicitly handle maintaining state
between requests. This new model is very different from the connected, tightly coupled style
of programming that characterized the client/server era, where a connection was held open
for the duration of the program's lifetime and no special handling of state was required.
In designing tools and technologies to meet the needs of today's developer, Microsoft
recognized that an entirely new programming model for data access was needed, one that is
built upon the .NET Framework. Building on the .NET Framework ensures that the data
DEPARTMENT OF COMPUTER SCIENCE ENGINEERING Page 3
http://msdn.microsoft.com/en-us/library/7b13c12s(v=VS.80).aspxhttp://msdn.microsoft.com/en-us/library/7b13c12s(v=VS.80).aspx -
8/3/2019 Synopsis 14JAN
88/94
CONNECTING M.B.S.C.E.T
access technology would be uniform components would share a common type system,
design patterns, and naming conventions.
ADO.NET was designed to meet the needs of this new programming model: disconnected
data architecture, tight integration with XML, common data representation with the ability to
combine data from multiple and varied data sources, and optimized facilities for interacting
with a database, all native to the .NET Framework.
In creating ADO.NET, Microsoft embraced the following design goals.
LEVERAGE CURRENT ADO KNOWLEDGE
The design for ADO.NET addresses many of the requirements of today's application
development model. At the same time, the programming model stays as similar as possible to
ADO, so current ADO developers do not have to start from the beginning in learning a brand
new data access technology. ADO.NET is an intrinsic part of the .NET Framework without
seeming completely foreign to the ADO programmer.
ADO.NET coexists with ADO. While most new .NET-based applications will be written
using ADO.NET, ADO remains available to the .NET programmer through .NET COM
interoperability services.
THE N-TIER PROGRAMMING MODEL
ADO.NET provides first-class support for the disconnected, n-tier programming
environment for which many new applications are written. The concept of working with a
disconnected set of data has become a focal point in the programming model. The ADO.NET
solution for n-tier programming is the DataSet.
INTEGRATE XML SUPPORT
XML and data access are intimately tied XML is all about encoding data, and data access
is increasingly becoming all about XML. The .NET Framework does not just support Web
standards it is built entirely on top of them.
DEPARTMENT OF COMPUTER SCIENCE ENGINEERING Page 2
-
8/3/2019 Synopsis 14JAN
89/94
CONNECTING M.B.S.C.E.T
XML support is built into ADO.NET at a very fundamental level. The XML classes in the
.NET Framework and ADO.NET are part of the same architecture they integrate at many
different levels. We no longer have to choose between the data access set of services and
their XML counterparts; the ability to cross over from one to the other is inherent in the
design of both.
8.1.5THE ADO.NET DATA ARCHITECTURE
Data Access in ADO.NET relies on two components: DataSet and Data Provider.
DATASET
The dataset is a disconnected, in-memory representation of data. It can be considered as a
local copy of the relevant portions of the database. The DataSet is persisted in memory and
the data in it can be manipulated and updated independent of the database. When the use of
this DataSet is finished, changes can be made back to the central database for updating. The
data in DataSet can be loaded from any valid data source like Microsoft SQL server
database, an Oracle database or from a Microsoft Access database.
DATA PROVIDER
The Data Provider is responsible for providing and maintaining the connection to the
database. A DataProvider is a set of related components that work together to provide data in
an efficient and performance driven manner. The .NET Framework currently comes with two
DataProviders: the SQL Data Provider which is designed only to work with Microsoft's
SQL Server 7.0 or later and the OLEDB DataProvider which allows us to connect to other
types of databases like Access and Oracle. Each DataProvider consists of the following
component classes:
DEPARTMENT OF COMPUTER SCIENCE ENGINEERING Page 2
-
8/3/2019 Synopsis 14JAN
90/94
CONNECTING M.B.S.C.E.T
The Connection object which provides a connection to the database
The Command object which is used to execute a command
The DataReader object which provides a forward-only, read only, connected recordset
The DataAdapter object which populates a disconnected DataSet with data and performs
update.
Data access with ADO.NET can be summarized as follows:
A connection object establishes the connection for the application with the database. The
command object provides direct execution of the command to the database. If the command
returns more than a single value, the command object returns a DataReader to provide the
data. Alternatively, the DataAdapter can be used to fill the Dataset object. The database can
be updated using the command object or the DataAdapter.
DEPARTMENT OF COMPUTER SCIENCE ENGINEERING Page 1
-
8/3/2019 Synopsis 14JAN
91/94
CONNECTING M.B.S.C.E.T
Fig: ADO.NET Architecture
COMPONENT CLASSES THAT MAKE UP THE DATA PROVIDERS
THE CONNECTION OBJECT
The Connection object creates the connection to the database. Microsoft Visual Studio .NET
provides two types of Connection classes: the SqlConnection object, which is designed
specifically to connect to Microsoft SQL Server 7.0 or later, and the OleDbConnection
object, which can provide connections to a wide range of database types like Microsoft
DEPARTMENT OF COMPUTER SCIENCE ENGINEERING Page 2
-
8/3/2019 Synopsis 14JAN
92/94
CONNECTING M.B.S.C.E.T
Access and Oracle. The Connection object contains all of the information required to open a
connection to the database.
THE COMMAND OBJECT
The Command object is represented by two corresponding classes: SqlCommand and
OleDbCommand. Command objects are used to execute commands to a database across a
data connection. The Command objects can be used to execute stored procedures on the
database, SQL commands, or return complete tables directly.
THE DATAREADER OBJECT
The DataReader object provides a forward-only, read-only, connected stream recordset from
a database. Unlike other components of the Data Provider, DataReader objects cannot be
directly instantiated. Rather, the DataReader is returned as the result of the Command
object's ExecuteReader method. The SqlCommand.ExecuteReader method returns a
SqlDataReader object, and the OleDbCommand.ExecuteReader method returns an
OleDbDataReader object. The DataReader can provide rows of data directly to application
logic when you do not need to keep the data cached in memory. Because only one row is in
memory at a time, the DataReader provides the lowest overhead in terms of system
performance but requires the exclusive use of an open Connection object for the lifetime of
the DataReader.
THE DATAADAPTER OBJECT
The DataAdapter is the class at the core of ADO .NET's disconnected data access. It is
essentially the middleman facilitating all communication between the database and a
DataSet. The DataAdapter is used either to fill a DataTable or DataSet with data from the
database with it's Fill method. After the memory-resident data has been manipulated, the
DataAdapter can commit the changes to the database by calling the Update method. The
DataAdapter provides four properties that represent database commands:
DEPARTMENT OF COMPUTER SCIENCE ENGINEERING Page 3
-
8/3/2019 Synopsis 14JAN
93/94
CONNECTING M.B.S.C.E.T
SelectCommand
InsertCommand
DeleteCommand
UpdateCommand
When the Update method is called, changes in the DataSet are copied back to the database
and the appropriate InsertCommand, DeleteCommand, or UpdateCommand is executed.
CHAPTER 9
CONCLUSION AND FUTURE SCOPE
Our project CONNECTING M.B.S.C.E.T is a dynamic open forum which has unlimited
scope that explores the full potential of available resources .It promises to provide a feasible
solution to instigate general awareness among college students, faculty and administration
block about recent activities. It will provide a connecting link between teacher and students
to have communication outside the bondages of classroom. The future scope of the project
lies in the fact that the project is very much open to all aspects of scalability and different
features can be added to enhance the functionality of the existing system. The various
features that can be added to make it more effective, viable and powerful tool are features
like video conferencing/chat, which can be used to sort the queries of students. Other
features include accessing the schedule of faculty and getting latest notices via SMS services
of mobile phones.
DEPARTMENT OF COMPUTER SCIENCE ENGINEERING Page 1
-
8/3/2019 Synopsis 14JAN
94/94
CONNECTING M.B.S.C.E.T
REFERENCES
1. http://en.wikipedia.org/wiki/ASP.NET
2. http://asp.net-tutorials.com/
3. http://en.wikipedia.org/wiki/C_Sharp_(programming_language)
4. http://www.csharp-station.com/Tutorial.aspx
5. http://en.wikipedia.org/wiki/SQL
6. http://en.wikipedia.org/wiki/ADO.NET
7. http://msdn.microsoft.com/en-us/library/h43ks021(v=vs.71).aspx
8. Asp.net, tips ,tutorial and code by Adam Nathan.
9. Asp.net web developers guide by Mesbah Ahmed.
http://en.wikipedia.org/wiki/ASP.NEThttp://asp.net-tutorials.com/http://en.wikipedia.org/wiki/C_Sharp_(programming_language)http://www.csharp-station.com/Tutorial.aspxhttp://en.wikipedia.org/wiki/SQLhttp://en.wikipedia.org/wiki/ADO.NEThttp://msdn.microsoft.com/en-us/library/h43ks021(v=vs.71).aspxhttp://en.wikipedia.org/wiki/ASP.NEThttp://asp.net-tutorials.com/http://en.wikipedia.org/wiki/C_Sharp_(programming_language)http://www.csharp-station.com/Tutorial.aspxhttp://en.wikipedia.org/wiki/SQLhttp://en.wikipedia.org/wiki/ADO.NEThttp://msdn.microsoft.com/en-us/library/h43ks021(v=vs.71).aspx