E Shopping Website Project Report
E Shopping Website Project Report
A Project Report
ON
E-Shopping Website
Submitted by
Lovkush Pandey(B1855R10106009)
Ashutosh Pandey(B1855R10106043)
B.Tech(CSE)—6th Semester
Project Supervisor
(Assistant Professor)
Engineering
1
AKS UNIVERSITY SATNA DEPARTMENT OF COMPUTER SCIENCE
CERTIFICATE
This is to certify that the project as “STUDENTS INFORMATION
SYSTEN” Which has been completed & submitted by “Ashutosh Pandey” and
“Lovkush Pandey” in partial fulfillment of the requirement for the award of the
B.Tech. in computer science &engineering for the session 2020-2021 is a benefited
Work by them and has been completed under my guidance and supervision. It
has not been submitted eileehere for for any other degree.
2
AKS UNIVERSITY SATNA DEPARTMENT OF COMPUTER SCIENCE
CERTIFICATE
This is certify that the project as “Students
Information System” which has been completed
& submitted by “Ashutosh Pandey” and “Lovkush
Pandey” in partial fulfilment of the requirement for the
award of the
B.Tech. engineering science of computer science for the
session 2018-2022.
3
AKS UNIVERSITY SATNA DEPARTMENT OF COMPUTER SCIENCE
ACKNOWLEDGEMENT
ASSOCIATED BY:
4
Department of Computer Science Aks University Satna
DECLARATION
We here by declare that the work is
being presented in the project report
entitled”E SHOPPING WEBSITE” IN Partial
fulfillment of the requirement of the B.Tech
record of “Computer Science & engineering”
branch is an authentic record of our work
carried out under the able guidance of
“Assistanr Prof. Mr. Virendra Tiwari”. The
work has been carried out at AKS University
Satna (M.P.).
PROJECT ASSOCIATED:-
5
Department of Computer Science Aks University Satna
ABSTRACT
The Shopping cart is mainly useful for who haven’t time to go to shopping, those are
just entered into this website and bought what ever they want.
Even it is night or morning they entered into this site, and chosen different items like
fruits, books, toys etc..
Once customer entered with his own username and password, at that time
automatically one shopping cart will be created, once user select an item it will add to
cart. In case user thinks the selected item is not useful for me, then deleted that item
from shopping cart.
Customer selected some items, but in his credit or debit cart haven’t that much
balance, then he was logout from the website, the selected items are stored at cart with
specific users with his allotted carts, after some days he bought those items then
automatically deleted from the cart.
6
Department of Computer Science Aks University Satna
INDEX
S. N CONTENTS
1. INTRODUCTION
2. ANALYSIS
3. DESIGN APPROACH
4. PROJECT MODULES
5. IMPLEMENTATION
4.2 TESTING
6. OUTPUT SCREENS
7. CONCLUSION
8. FUTURE ENHANCEMENTS
9. BIBILIOGRAPHY
7
Department of Computer Science Aks University Satna
INTRODUCTION:
OBJECTIVE:
The Shopping cart is mainly useful for who haven’t time to go to shopping, those
are just entered into this website and bought what ever they want.
Even it is night or morning they entered into this site, and chosen different items like fruits,
books, toys etc..
‘Customer is our god’ mainly this website is based on this formula. After
chosen items he bought into Pay pal process like VISA or MASTER credit cards or any Debit
cards are accepted in this website. Customer is happily shopping at his rest place.
PROJECT OVERVIEW:
Once customer entered with his own username and password, at that time
automatically one shopping cart will be created, once user select an item it will add to cart. In
case user thinks the selected item is not useful for me, then deleted that item from shopping cart.
Customer selected some items, but in his credit or debit cart haven’t that much
balance, then he was logout from the website, the selected items are stored at cart with specific
users with his allotted carts, after some days he bought those items then automatically deleted
from the cart.
8
Department of Computer Science Aks University Satna
SYSTEM ANALYSIS:
1. Existing System
. Existing system is a manual one in which users are maintaining books to store the
information like product details, Distributors details, purchases, sales details and accounts for
every month. It is very difficult to maintain historical data.
DISADVANTAGES:
9
Department of Computer Science Aks University Satna
System Specifications
Hardware Requirements:-
• Pentium-IV(Processor).
• 256 MB Ram
• 512 KB Cache Memory
• Hard disk 10 GB
• Microsoft Compatible 101 or more Key Board
Software Requirements: -
Language : C#
10
Department of Computer Science Aks University Satna
INTRODUCTION:
Design is the first step in the development phase for any techniques and
principles for the purpose of defining a device, a process or system in sufficient detail to permit
its physical realization.
Once the software requirements have been analyzed and specified the
software design involves three technical activities - design, coding, implementation and testing
that are required to build and verify the software.
11
Department of Computer Science Aks University Satna
Software design is a process through which requirements are translated into a representation of
software. Software design is conducted in two steps. Preliminary design is concerned with the
transformation of requirements into data.
Data Flow : Data flow are pipelines through the packets of information flow.
Decision : Decision decides the next step will be proceed or not. Yes/No,
True/False
12
Department of Computer Science Aks University Satna
13
Department of Computer Science Aks University Satna
use case
diagram for online shopping website
14
Department of Computer Science Aks University Satna
15
Department of Computer Science Aks University Satna
16
Department of Computer Science Aks University Satna
17
Department of Computer Science Aks University Satna
The DFD takes an input-process-output view of a system i.e. data objects flow into the
software, are transformed by processing elements, and resultant data objects flow out of the
software.
The DFD enables the software engineer to develop models of the information
domain & functional domain at the same time. As the DFD is refined into greater levels of
details, the analyst perform an implicit functional decomposition of the system. At the same
time, the DFD refinement results in a corresponding refinement of the data as it moves through
the process that embody the applications.
A context-level DFD for the system the primary external entities produce
information for use by the system and consume information generated by the system. The
labeled arrow represents data objects or object hierarchy.
18
Department of Computer Science Aks University Satna
• Identify and label each process internal to the system with Rounded circles.
• A process is required for all the data transformation and Transfers. Therefore, never
connect a data store to a data Source or the destinations or another data store with just
a Data flow arrow.
• Make sure the names of the processes accurately convey everything the process is
done.
• Identify all data flows for each process step, except simple Record retrievals.
19
Department of Computer Science Aks University Satna
20
Department of Computer Science Aks University Satna
21
Department of Computer Science Aks University Satna
22
Department of Computer Science Aks University Satna
23
Department of Computer Science Aks University Satna
24
Department of Computer Science Aks University Satna
• it maps well to the relational model. The constructs used in the ER model can easily be
transformed into relational tables.
• it is simple and easy to understand with a minimum of training. Therefore, the model can be used
by the database designer to communicate the design to the end user.
• In addition, the model can be used as a design plan by the database developer to implement a data
model in a specific database management software.
The basic types of connectivity for relations are: one-to-one, one-to-many, and many-to-many. A
one-to-one (1:1) relationship is when at most one instance of a entity A is associated with one instance of
entity B. For example, "employees in the company are each assigned their own office. For each employee
there exists a unique office and for each office there exists a unique employee.
A one-to-many (1:N) relationships is when for one instance of entity A, there are zero, one, or many
instances of entity B, but for one instance of entity B, there is only one instance of entity A. An example
of a 1:N relationships is
A many-to-many (M:N) relationship, sometimes called non-specific, is when for one instance of entity A,
there are zero, one, or many instances of entity B and for one instance of entity B there are zero, one, or
many instances of entity A. The connectivity of a relationship describes the mapping of associated
25
Department of Computer Science Aks University Satna
ER Notation
There is no standard for representing data objects in ER diagrams. Each modeling methodology
uses its own notation. The original notation used by Chen is widely used in academics texts and journals
but rarely seen in either CASE tools or publications by non-academics. Today, there are a number of
notations used, among the more common are Bachman, crow's foot, and IDEFIX.
All notational styles represent entities as rectangular boxes and relationships as lines connecting
boxes. Each style uses a special set of symbols to represent the cardinality of a connection. The notation
used in this document is from Martin. The symbols used for the basic ER constructs are:
▪ entities are represented by labeled rectangles. The label is the name of the entity. Entity names
▪ relationships are represented by a solid line connecting two entities. The name of the relationship
▪ attributes, when included, are listed inside the entity rectangle. Attributes which are identifiers
26
Department of Computer Science Aks University Satna
27
Department of Computer Science Aks University Satna
28
Department of Computer Science Aks University Satna
PROJECT MODULES
• Admin
• Products
• User
MODULES DESCRIPTION:
Admin:-
When admin login, he saw the customer’s database, means how many users are
authenticated to this website and how many users are transact everyday, and newly items are
inserting into products.
Products:-
This module contains product name, and related image, and cost of its. Like toys,
books, furniture, gold items, etc.. Whatever customer wants from the shopping cart.
User:-
User entered into with his username and password, when he entered into this, he saw
what items are available today, this facility is available for this site. Chosen different items from
website get those through door delivery.
29
Department of Computer Science Aks University Satna
Database Tables:
Admin Table:
Column
Name Type Computed Length
uname varchar no 20
password varchar no 20
Products Table:
Column
Name Type Computed Length
Pid int no 4
ProductName varchar no 100
ProductType varchar no 50
image varchar no 100
price int no 4
30
Department of Computer Science Aks University Satna
31
Department of Computer Science Aks University Satna
JavaScript
JavaScript:
JavaScript is a new scripting language for WebPages. Scripts written with java script can
be embedded into your HTML pages. With java script you have many possibilities for
enhancing your HTML page with interesting elements. For example you are able to respond to
user-initiated events quite easily. Some effects that are now possible with java script were some
time ago only possible with CGI. So you can create really sophisticated pages with the helps of
java script on the Internet.
Although the names are almost the same Java is not the same as Java Script. These are
two different techniques for Internet programming. Java is programming language. JavaScript is
a scripting language as the name implies. The difference is that we can create real programs with
java. But java script in not real programming. Java Script is meant to be easy to understand and
easy to use. JavaScript authors should not have to care too much about programming. We could
say that Java Script is rather an extension to HTML than a separate computer language. Of
course this is not the official definition but it makes it easier to understand the difference
between java and java script.
The first browser to support java script was the Netscape Navigator 2.0 of course the
higher versions do have java script as well. You might know that java does not run on all
32
Department of Computer Science Aks University Satna
Netscape Navigators 2.0 (or higher versions) versions. But this is not true for java script -
although there are some problems with the different versions.
The Mac version for example seems to have many bugs. In the near future there are
going to be some other browsers, which support java script. The Microsoft Internet explorer 3.0
is going to support java script. JavaScript enabled browsers are going to spread soon - it is worth
learning this new technique now. You might realize that is really easy to write Java Script
scripts. We have to know is some basic techniques and some work-around for problems you
might encounter. Of course we need a basic. Understanding HTML before reading this tutorial
you can find many really good online resources about HTML. Best you make an online search
about ‘html’ at yahoo if you want to get informed about HTML. Now I want to show some
small scripts so you can learn how they are implemented into HTML-documents and to show
which possibilities you have with the new scripting language. The following is a very small
script, which will only print a text into an HTML document.
<html>
<head>
My first JavaScript
</head>
<body><br>
This is a normal HTML document
<br>
<script language=”JavaScript”>
Document.write (“this is a java script”)
</script><b r>
Backing HTML again
</body>
</html>
If you are using a java script enabled-browser at the moment then you will have the possibility to
see this script working. If your browser doesn’t support Java Script then this output might be
some kind of strange…
33
Department of Computer Science Aks University Satna
Functions
Functions are bet declared between the <Head> tag of HTML page. Functions are
called by user-initiated events. Seems reasonable to keep the functions between
the <Head> tags. They are loaded first before a user can do anything that might
call a function. Scripts can be placed between inside comment fields to ensure that
older browser do not display the script itself.
<html>
<head>
<script language=”JavaScript”>
function pushbutton (){
alert (“Hello!”);
}
</script>
</head>
<body>
<form>
<input type=”button” name=”Button1” value=”push me” onclick=”pushbutton ()”>
</form>
</body>
</html>
If we want to test this one immediately and you are using a Java Script enabled browser then
please go ahead and push the button.
34
Department of Computer Science Aks University Satna
This script will create a button and when you press it a window will pop up saying “hello!”.
In fact we have a lot of possibilities just by adding functions to our scripts.
The common browsers transmit the form information by either method: here’s the complete
tag including the GET transmission method attribute for the previous form
Example
Input elements.
Use the <input> tag to define any one of a number of common form elements including text
fields multiple choice lists click able images and submission buttons. There are many attributers
for this tag only that types and name attributes are required for each element, each type of input
element uses only a subset of the followed attributes. Additional <input> attributes may be
required based upon which type of the form element you specify.
Submit button:
The submit button (<input type=submit> ) does what its name implies, settings in motion the
form’s submission to the server from the browser. We many have more than submit buttons will
be added to the parameter list the browser sends along to the server.
Example
< Input type =”submit”>
<Input type=”submit” value=”submit” name=”name”>
Reset button:
35
Department of Computer Science Aks University Satna
The reset button if firm <input> button is nearly self- explanatory; it lets the user reset erase or
set to some default value all elements in the form. By default the browser displays a reset button
worth the label “reset”. We can change that by specifying a value attribute with tour own button
label.
The .NET Framework has two main components: the common language runtime and
the .NET Framework class library. The common language runtime is the foundation
of the .NET Framework. You can think of the runtime as an agent that manages
code at execution time, providing core services such as memory management,
thread management, and remoting, while also enforcing strict type safety and other
forms of code accuracy that ensure security and robustness. In fact, the concept of
code management is a fundamental principle of the runtime. Code that targets the
runtime is known as managed code, while code that does not target the runtime is
36
Department of Computer Science Aks University Satna
known as unmanaged code. The class library, the other main component of the
.NET Framework, is a comprehensive, object-oriented collection of reusable types
that you can use to develop applications ranging from traditional command-line or
graphical user interface (GUI) applications to applications based on the latest
innovations provided by ASP.NET, such as Web Forms and XML Web services.
37
Department of Computer Science Aks University Satna
features are intrinsic to the managed code that runs on the common language
runtime.
The runtime enforces code access security. For example, users can trust that an
executable embedded in a Web page can play an animation on screen or sing a
song, but cannot access their personal data, file system, or network. The security
features of the runtime thus enable legitimate Internet-deployed software to be
exceptionally featuring rich.
The runtime also enforces code robustness by implementing a strict type- and
code-verification infrastructure called the common type system (CTS). The CTS
ensures that all managed code is self-describing. The various Microsoft and third-
party language compilers generate managed code that conforms to the CTS. This
means that managed code can consume other managed types and instances, while
strictly enforcing type fidelity and type safety.
38
Department of Computer Science Aks University Satna
runtime can do so. Language compilers that target the .NET Framework make the
features of the .NET Framework available to existing code written in that language,
greatly easing the migration process for existing applications.
While the runtime is designed for the software of the future, it also supports
software of today and yesterday. Interoperability between managed and unmanaged
code enables developers to continue to use necessary COM components and DLLs.
The .NET Framework class library is a collection of reusable types that tightly
integrate with the common language runtime. The class library is object oriented,
providing types from which your own managed code can derive functionality. This
not only makes the .NET Framework types easy to use, but also reduces the time
associated with learning new features of the .NET Framework. In addition, third-
party components can integrate seamlessly with classes in the .NET Framework.
39
Department of Computer Science Aks University Satna
• Simplicity. ASP.NET makes it easy to perform common tasks, from simple form
submission and client authentication to deployment and site configuration. For
40
Department of Computer Science Aks University Satna
example, the ASP.NET page framework allows you to build user interfaces that
cleanly separate application logic from presentation code and to handle events in a
simple, Visual Basic - like forms processing model. Additionally, the common
language runtime simplifies development, with managed code services such as
automatic reference counting and garbage collection.
• Scalability and Availability. ASP.NET has been designed with scalability in mind,
with features specifically tailored to improve performance in clustered and
multiprocessor environments. Further, processes are closely monitored and
managed
41
Department of Computer Science Aks University Satna
Language Support
The Microsoft .NET Platform currently offers built-in support for three languages: C#,
Visual Basic, and JScript.
In addition to (or instead of) using <% %> code blocks to program
dynamic content, ASP.NET page developers can use ASP.NET server controls
to program Web pages. Server controls are declared within an .aspx file using
custom tags or intrinsic HTML tags that contain a runat="server" attributes
value. Intrinsic HTML tags are handled by one of the controls in the
System.Web.UI.HtmlControls namespace. Any tag that doesn't explicitly map to
one of the controls is assigned the type of
System.Web.UI.HtmlControls.HtmlGenericControl.
1. ASP.NET Web Forms provide an easy and powerful way to build dynamic Web UI.
2. ASP.NET Web Forms pages can target any browser client (there are no script library
or cookie requirements).
3. ASP.NET Web Forms pages provide syntax compatibility with existing ASP pages.
4. ASP.NET server controls provide an easy way to encapsulate common functionality.
5. ASP.NET ships with 45 built-in server controls. Developers can also use controls
built by third parties.
42
Department of Computer Science Aks University Satna
6. ASP.NET server controls can automatically project both up level and down level
HTML.
7. ASP.NET templates provide an easy way to customize the look and feel of list server
controls.
8. ASP.NET validation controls provide an easy way to do declarative client or server
data validation.
HTML
The hypertext markup language (HTML) is a simple markup language. Used to create a
hypertext documents that are portable from one platform to another HTML documents are
SGML (Standard generalized mark up language) documents with generic semantics that are
appropriate for representing information from a wide range of applications. This specification
defines HTML version 3.2. HTML 3.2 aims to capture recommended practice as of early ’96 and
as such a replacement for HTML2.0 (RFC 1866).
A set of instructions embedded in a document is called mark up language. These
instructions describe what the document text means and how it should look like in a display.
Hyper Text Mark Up language (HTML) is the language used to encode World Wide Web
documents.
Website is a collection of pages, publications, and documents that reside on web server.
While these pages publications and a document as a formatted in a single format, you should
use HTML for home page and all primary pages in the site. This will enable the millions of web
users can easily access and to take advantage of your website.
HTML is considered first for formatting any new material you plan to publish on the web.
HTML documents are platform independent, meaning that they don’t confirm to any standard. If
they are created properly you can move home page to any server platform or you can access
them with any complaint www browser.
STRUCTURE OF HTML
HTML elements perform a defined task. HTML uses two types of elements
. Empty Tags
. Container Tags
43
Department of Computer Science Aks University Satna
These tags differ because of what they represent. Empty tags represent formatting
constricts such as line breaks and horizontal rules. Container tags define a section of text,
formats and dot all of the selected text. A container tag has both a beginning and an ending.
HTML LAYOUT:
An HTML document consists of text, which comprises the content of the
document and tags, which, defines the structure, and appearance of the document. The
structure of an HTML document is simple, consists of outer.
<HTML>tag enclosing the document header and body
<HTML>
<HEAD>
<TITLE>the title of HTML document</TITLE>
</HEAD>
<BODY>
This is where the actual HTML documents
Text lies, which is displayed in the browser
</BODY>
</HTML>
Each document has a head and body delimited by the <HEAD> and <BODY> tag. The
head is where you give your HTML document a title and where you indicate other
parameters the browser may use when displaying the document. This includes the text
for displaying the text. Tag also references special and indicates the hot spots that link
your document to other documents.
HTML FORMS:
Creating a form usually involves two independent steps: Creating the layout for
the form itself and then writing a script program on the server side to process the
formation you get back from a form.
44
Department of Computer Science Aks University Satna
To create a form, You use the <FORM> tag. Inside the opening and closing
FORM tags are each of the individual form elements plus any other HTML content to
create a layout for that form.
The opening tag of the FORM element usually includes the attributes: METHOD
and ACTION. The METHOD attributes can be either GET or POST which determines
how your form data is sent to the script to process it.
The ACTION attribute is a pointer to the script that processes the form on the server
side. The ACTION can be included by a relative path or by a full URL to a script on your server
or somewhere else. For example, the following <FORM> tag would call a script called form-
name in cgi-bin directory on server www.myservser.com
METHOD ATTRIBUTE:
The other required attribute for the <form> tag sets the methods by
which the browser form’s data to the server for processing. There are two
ways: the POST method and GET method. With POST method, the browser
sends the data in two steps: the browser first contacts the form-processing
server specified in the action attributes, and once contact is made, sends the
data
45
Department of Computer Science Aks University Satna
Database
A database is similar to a data file in that it is a storage place for data. Like a data file, a
database does not present information directly to a user; the user runs an application that
accesses data from the database and presents it to the user in an understandable format.
A database typically has two components: the files holding the physical
database and the database management system (DBMS) software that
applications use to access data. The DBMS is responsible for enforcing the
database structure, including:
Relational Database
There are different ways to organize data in a database but relational databases are
one of the most effective. Relational database systems are an application of mathematical
set theory to the problem of effectively organizing data. In a relational database, data is
collected into tables (called relations in relational theory).
46
Department of Computer Science Aks University Satna
When organizing data into tables, you can usually find many different ways to define
tables. Relational database theory defines a process, normalization, which ensures that the
set of tables you define will organize your data effectively.
Client/Server:-
In a client/server system, the server is a relatively large computer in a central
location that manages a resource used by many people. When individuals need to use the
resource, they connect over the network from their computers, or clients, to the server.
Examples of servers are: In a client/server database architecture, the database files
and DBMS software reside on a server. A communications component is provided so
applications can run on separate clients and communicate to the database server over a
network. The SQL Server communication component also allows communication between
an application running on the server and SQL Server.
47
Department of Computer Science Aks University Satna
Scalability
The same database engine can be used across platforms ranging from laptop computers
running Microsoft Windows® 95/98 to large, multiprocessor servers running Microsoft
Windows NT®, Enterprise Edition.
Data warehousing
SQL Server includes tools for extracting and analyzing summary data for online analytical
processing (OLAP). SQL Server also includes tools for visually designing databases and
analyzing data using English-based questions.
Databases
A database in Microsoft SQL Server consists of a collection of tables that contain
data, and other objects, such as views, indexes, stored procedures, and triggers,
defined to support activities performed with the data. The data stored in a database
is usually related to a particular subject or process, such as inventory information for
a manufacturing warehouse.
SQL Server can support many databases, and each database can store either interrelated
data or data unrelated to that in the other databases. For example, a server can have one
database that stores personnel data and another that stores product-related data.
Alternatively, one database can store current customer order data, and another; related
database can store historical customer orders that are used for yearly reporting. Before you
create a database, it is
48
Department of Computer Science Aks University Satna
important to understand the parts of a database and how to design these parts to ensure
that the database performs well after it is implemented.
Normalization theory:
Relations are to be normalized to avoid anomalies. In insert, update and delete operations.
Normalization theory is built around the concept of normal forms. A relation is said to be in a
particular form if it satisfies a certain specified set if constraints. To decide a suitable logical
structure for given database design the concept of normalization, which are briefly described
below.
49
Department of Computer Science Aks University Satna
C# Language
History:-
In 1996, Sun Microsystems released the Java programming language with Microsoft soon
purchasing a license to implement it in their operating system. Java was originally meant to be a
platform independent language, but Microsoft, in their implementation, broke their license
agreement and made a few changes that would essentially inhibit Java's platform-independent
capabilities. Sun filed a lawsuit and Microsoft settled, deciding to create their own version of a
partially compiled, partially interpreted object-oriented programming language with syntax
closely related to that of C++.
During the development of .NET, the class libraries were originally written in a
language/compiler called Simple Managed C (SMC). In January 1999, Anders Hejlsberg formed
a team to build a new language at the time called Cool, which stood for "C like Object Oriented
Language".Microsoft had considered keeping the name "Cool" as the final name of the
language, but chose not to do so for trademark reasons. By the time the .NET project was
publicly announced at the July 2000 Professional Developers Conference, the language had
50
Department of Computer Science Aks University Satna
been renamed C#, and the class libraries and ASP.NET runtime had been ported to C#.
C#'s principal designer and lead architect at Microsoft is Anders Hejlsberg, who was previously
involved with the design of Visual J++, Borland Delphi, and Turbo Pascal. In interviews and
technical papers he has stated that flaws in most major programming languages (e.g. C++,
Java, Delphi, and Smalltalk) drove the fundamentals of the Common Language Runtime (CLR),
which, in turn, drove the design of the C# programming language itself. Some argue that C#
shares roots in other languages.
Features of C#:-
• There are no global variables or functions. All methods and members must be declared
within classes. It is possible, however, to use static methods/variables within public
classes instead of global variables/functions.
• Local variables cannot shadow variables of the enclosing block, unlike C and C++.
Variable shadowing is often considered confusing by C++ texts.
• C# supports a strict Boolean data type, bool. Statements that take conditions, such as
while and if, require an expression of a boolean type. While C++ also has a boolean
type, it can be freely converted to and from integers, and expressions such as if(a)
require only that a is convertible to bool, allowing a to be an int, or a pointer. C#
disallows this "integer meaning true or false" approach on the grounds that forcing
programmers to use expressions that return exactly bool can prevent certain types of
programming mistakes such as if (a = b) (use of = instead of ==).
• In C#, memory address pointers can only be used within blocks specifically marked as
unsafe, and programs with unsafe code need appropriate permissions to run. Most
object access is done through safe object references, which are always either pointing to
a valid, existing object, or have the well-defined null value; a reference to a garbage-
collected object, or to random block of memory, is impossible to obtain. An unsafe
pointer can point to an instance of a value-type, array, string, or a block of memory
allocated on a stack. Code that is not marked as unsafe can still store and manipulate
pointers through the System.IntPtr type, but cannot dereference them.
51
Department of Computer Science Aks University Satna
C# has a unified type system. This unified type system is called Common Type
System (CTS).
A unified type system implies that all types, including primitives such as integers,
are subclasses of the System.Object class. For example, every type inherits a
ToString() method. For performance reasons, primitive types (and value types in
general) are internally allocated on the stack.
Categories of datatypes
• Value types
• Reference types
Value types are plain aggregations of data. Instances of value types do not have
referential identity nor a referential comparison semantics - equality and
inequality comparisons for value types compare the actual data values within the
instances, unless the corresponding operators are overloaded. Value types are
derived from System.ValueType, always have a default value, and can always be
created and copied. Some other limitations on value types are that they cannot
derive from each other (but can implement interfaces) and cannot have a default
(parameterless) constructor. Examples of value types are some primitive types,
52
Department of Computer Science Aks University Satna
such as int (a signed 32-bit integer), float (a 32-bit IEEE floating-point number),
char (a 16-bit Unicode codepoint), and System.DateTime (identifies a specific point
in time with millisecond precision).
In contrast, reference types have the notion of referential identity - each instance
of reference type is inherently distinct from every other instance, even if the data
within both instances is the same. This is reflected in default equality and
inequality comparisons for reference types, which test for referential rather than
structural equality, unless the corresponding operators are overloaded (such as
the case for System.String). In general, it is not always possible to create an
instance of a reference type, nor to copy an existing instance, or perform a value
comparison on two existing instances, though specific reference types can
provide such services by exposing a public constructor or implementing a
corresponding interface (such as ICloneable or IComparable). Examples of
reference types are object (the ultimate base class for all other C# classes),
System.String (a string of Unicode characters), and System.Array (a base class for
all C# arrays).
Example:
Example:
53
Department of Computer Science Aks University Satna
Coding Of Project
Some Java script coding
return obj;
54
Department of Computer Science Aks University Satna
if (Object.getOwnPropertySymbols) {
var symbols = Object.getOwnPropertySymbols(object);
if (enumerableOnly) symbols = symbols.filter(function (sym) {
return Object.getOwnPropertyDescriptor(object, sym).enumerable;
});
keys.push.apply(keys, symbols);
}
return keys;
}
function _objectSpread2(target) {
for (var i = 1; i < arguments.length; i++) {
var source = arguments[i] != null ? arguments[i] : {};
if (i % 2) {
ownKeys(Object(source), true).forEach(function (key) {
_defineProperty(target, key, source[key]);
});
} else if (Object.getOwnPropertyDescriptors) {
Object.defineProperties(target, Object.getOwnPropertyDescriptors(source));
} else {
ownKeys(Object(source)).forEach(function (key) {
Object.defineProperty(target, key, Object.getOwnPropertyDescriptor(source,
key));
});
}
}
return target;
}
/**
* --------------------------------------------------------------------------
* Bootstrap (v4.5.0): util.js
* Licensed under MIT (https://github.com/twbs/bootstrap/blob/master/LICENSE)
* --------------------------------------------------------------------------
*/
/**
* ------------------------------------------------------------------------
* Private TransitionEnd Helpers
* ------------------------------------------------------------------------
*/
55
Department of Computer Science Aks University Satna
function toType(obj) {
if (obj === null || typeof obj === 'undefined') {
return "" + obj;
}
return {}.toString.call(obj).match(/\s([a-z]+)/i)[1].toLowerCase();
}
function getSpecialTransitionEndEvent() {
return {
bindType: TRANSITION_END,
delegateType: TRANSITION_END,
handle: function handle(event) {
if ($(event.target).is(this)) {
return event.handleObj.handler.apply(this, arguments); // eslint-disable-line
prefer-rest-params
}
return undefined;
}
};
}
function transitionEndEmulator(duration) {
var _this = this;
function setTransitionEndSupport() {
$.fn.emulateTransitionEnd = transitionEndEmulator;
$.event.special[Util.TRANSITION_END] = getSpecialTransitionEndEvent();
}
/**
* --------------------------------------------------------------------------
* Public Util Api
* --------------------------------------------------------------------------
*/
var Util = {
TRANSITION_END: 'bsTransitionEnd',
getUID: function getUID(prefix) {
do {
// eslint-disable-next-line no-bitwise
prefix += ~~(Math.random() * MAX_UID); // "~~" acts like a faster Math.floor()
here
} while (document.getElementById(prefix));
56
Department of Computer Science Aks University Satna
return prefix;
},
getSelectorFromElement: function getSelectorFromElement(element) {
var selector = element.getAttribute('data-target');
try {
return document.querySelector(selector) ? selector : null;
} catch (err) {
return null;
}
},
getTransitionDurationFromElement: function getTransitionDurationFromElement(element)
{
if (!element) {
return 0;
} // Get transition-duration of the element
transitionDuration = transitionDuration.split(',')[0];
transitionDelay = transitionDelay.split(',')[0];
return (parseFloat(transitionDuration) + parseFloat(transitionDelay)) *
MILLISECONDS_MULTIPLIER;
},
reflow: function reflow(element) {
return element.offsetHeight;
},
triggerTransitionEnd: function triggerTransitionEnd(element) {
$(element).trigger(TRANSITION_END);
},
// TODO: Remove in v5
supportsTransitionEnd: function supportsTransitionEnd() {
return Boolean(TRANSITION_END);
},
isElement: function isElement(obj) {
return (obj[0] || obj).nodeType;
},
typeCheckConfig: function typeCheckConfig(componentName, config, configTypes) {
for (var property in configTypes) {
if (Object.prototype.hasOwnProperty.call(configTypes, property)) {
var expectedTypes = configTypes[property];
var value = config[property];
57
Department of Computer Science Aks University Satna
if (!new RegExp(expectedTypes).test(valueType)) {
throw new Error(componentName.toUpperCase() + ": " + ("Option \"" + property
+ "\" provided type \"" + valueType + "\" ") + ("but expected type \"" + expectedTypes +
"\"."));
}
}
}
},
findShadowRoot: function findShadowRoot(element) {
if (!document.documentElement.attachShadow) {
return null;
} // Can find the shadow root otherwise it'll return the document
if (!element.parentNode) {
return null;
}
return Util.findShadowRoot(element.parentNode);
},
jQueryDetection: function jQueryDetection() {
if (typeof $ === 'undefined') {
throw new TypeError('Bootstrap\'s JavaScript requires jQuery. jQuery must be
included before Bootstrap\'s JavaScript.');
}
if (version[0] < ltMajor && version[1] < minMinor || version[0] === minMajor &&
version[1] === minMinor && version[2] < minPatch || version[0] >= maxMajor) {
throw new Error('Bootstrap\'s JavaScript requires at least jQuery v1.9.1 but less
than v4.0.0');
}
}
};
Util.jQueryDetection();
setTransitionEndSupport();
/**
* ------------------------------------------------------------------------
* Constants
58
Department of Computer Science Aks University Satna
* ------------------------------------------------------------------------
*/
// Public
_proto.close = function close(element) {
var rootElement = this._element;
if (element) {
rootElement = this._getRootElement(element);
}
if (customEvent.isDefaultPrevented()) {
return;
}
this._removeElement(rootElement);
};
if (selector) {
59
Department of Computer Science Aks University Satna
parent = document.querySelector(selector);
}
if (!parent) {
parent = $(element).closest("." + CLASS_NAME_ALERT)[0];
}
return parent;
};
$(element).removeClass(CLASS_NAME_SHOW);
if (!$(element).hasClass(CLASS_NAME_FADE)) {
this._destroyElement(element);
return;
}
if (!data) {
data = new Alert(this);
$element.data(DATA_KEY, data);
}
60
Department of Computer Science Aks University Satna
alertInstance.close(this);
};
};
_createClass(Alert, null, [{
key: "VERSION",
get: function get() {
return VERSION;
}
}]);
return Alert;
}();
/**
* ------------------------------------------------------------------------
* Data Api implementation
* ------------------------------------------------------------------------
*/
$.fn[NAME] = Alert._jQueryInterface;
$.fn[NAME].Constructor = Alert;
$.fn[NAME].noConflict = function () {
$.fn[NAME] = JQUERY_NO_CONFLICT;
return Alert._jQueryInterface;
};
/**
* ------------------------------------------------------------------------
* Constants
* ------------------------------------------------------------------------
*/
61
Department of Computer Science Aks University Satna
// Public
_proto.toggle = function toggle() {
var triggerChangeEvent = true;
var addAriaPressed = true;
var rootElement = $(this._element).closest(SELECTOR_DATA_TOGGLES)[0];
if (rootElement) {
var input = this._element.querySelector(SELECTOR_INPUT);
if (input) {
if (input.type === 'radio') {
if (input.checked && this._element.classList.contains(CLASS_NAME_ACTIVE)) {
triggerChangeEvent = false;
} else {
var activeElement = rootElement.querySelector(SELECTOR_ACTIVE);
if (activeElement) {
$(activeElement).removeClass(CLASS_NAME_ACTIVE);
}
}
}
if (triggerChangeEvent) {
// if it's not a radio button or checkbox don't add a pointless/invalid
checked property to the input
if (input.type === 'checkbox' || input.type === 'radio') {
input.checked = !this._element.classList.contains(CLASS_NAME_ACTIVE);
}
$(input).trigger('change');
}
input.focus();
addAriaPressed = false;
}
}
62
Department of Computer Science Aks University Satna
if (!(this._element.hasAttribute('disabled') ||
this._element.classList.contains('disabled'))) {
if (addAriaPressed) {
this._element.setAttribute('aria-pressed',
!this._element.classList.contains(CLASS_NAME_ACTIVE));
}
if (triggerChangeEvent) {
$(this._element).toggleClass(CLASS_NAME_ACTIVE);
}
}
};
if (!data) {
data = new Button(this);
$(this).data(DATA_KEY$1, data);
}
_createClass(Button, null, [{
key: "VERSION",
get: function get() {
return VERSION$1;
}
}]);
return Button;
}();
/**
* ------------------------------------------------------------------------
* Data Api implementation
* ------------------------------------------------------------------------
*/
if (!$(button).hasClass(CLASS_NAME_BUTTON)) {
button = $(button).closest(SELECTOR_BUTTON)[0];
}
63
Department of Computer Science Aks University Satna
if (!button || button.hasAttribute('disabled') ||
button.classList.contains('disabled')) {
event.preventDefault(); // work around Firefox bug #1540995
} else {
var inputBtn = button.querySelector(SELECTOR_INPUT);
return;
}
Button._jQueryInterface.call($(button), 'toggle');
}
}).on(EVENT_FOCUS_BLUR_DATA_API, SELECTOR_DATA_TOGGLE_CARROT, function (event) {
var button = $(event.target).closest(SELECTOR_BUTTON)[0];
$(button).toggleClass(CLASS_NAME_FOCUS, /^focus(in)?$/.test(event.type));
});
$(window).on(EVENT_LOAD_DATA_API, function () {
// ensure correct active class is set to match the controls' actual values/states
// find all checkboxes/readio buttons inside data-toggle groups
var buttons =
[].slice.call(document.querySelectorAll(SELECTOR_DATA_TOGGLES_BUTTONS));
if (input.checked || input.hasAttribute('checked')) {
button.classList.add(CLASS_NAME_ACTIVE);
} else {
button.classList.remove(CLASS_NAME_ACTIVE);
}
} // find all button toggles
buttons = [].slice.call(document.querySelectorAll(SELECTOR_DATA_TOGGLE));
64
Department of Computer Science Aks University Satna
*/
$.fn[NAME$1] = Button._jQueryInterface;
$.fn[NAME$1].Constructor = Button;
$.fn[NAME$1].noConflict = function () {
$.fn[NAME$1] = JQUERY_NO_CONFLICT$1;
return Button._jQueryInterface;
};
/**
* ------------------------------------------------------------------------
* Constants
* ------------------------------------------------------------------------
*/
var TOUCHEVENT_COMPAT_WAIT = 500; // Time for mouse compat events to fire after touch
65
Department of Computer Science Aks University Satna
this._addEventListeners();
} // Getters
// Public
_proto.next = function next() {
if (!this._isSliding) {
this._slide(DIRECTION_NEXT);
}
66
Department of Computer Science Aks University Satna
};
if (this._element.querySelector(SELECTOR_NEXT_PREV)) {
Util.triggerTransitionEnd(this._element);
this.cycle(true);
}
clearInterval(this._interval);
this._interval = null;
};
if (this._interval) {
clearInterval(this._interval);
this._interval = null;
}
this._activeElement = this._element.querySelector(SELECTOR_ACTIVE_ITEM);
67
Department of Computer Science Aks University Satna
if (this._isSliding) {
$(this._element).one(EVENT_SLID, function () {
return _this.to(index);
});
return;
}
this._slide(direction, this._items[index]);
};
if (direction > 0) {
this.prev();
} // swipe right
if (direction < 0) {
this.next();
}
};
68
Department of Computer Science Aks University Satna
if (this._config.keyboard) {
$(this._element).on(EVENT_KEYDOWN, function (event) {
return _this2._keydown(event);
});
}
if (this._config.touch) {
this._addTouchEventListeners();
}
};
if (!this._touchSupported) {
return;
}
_this3._handleSwipe();
69
Department of Computer Science Aks University Satna
if (_this3.touchTimeout) {
clearTimeout(_this3.touchTimeout);
}
$(this._element.querySelectorAll(SELECTOR_ITEM_IMG)).on(EVENT_DRAG_START, function
(e) {
return e.preventDefault();
});
if (this._pointerEvent) {
$(this._element).on(EVENT_POINTERDOWN, function (event) {
return start(event);
});
$(this._element).on(EVENT_POINTERUP, function (event) {
return end(event);
});
this._element.classList.add(CLASS_NAME_POINTER_EVENT);
} else {
$(this._element).on(EVENT_TOUCHSTART, function (event) {
return start(event);
});
$(this._element).on(EVENT_TOUCHMOVE, function (event) {
return move(event);
});
$(this._element).on(EVENT_TOUCHEND, function (event) {
return end(event);
});
}
};
switch (event.which) {
case ARROW_LEFT_KEYCODE:
event.preventDefault();
this.prev();
break;
case ARROW_RIGHT_KEYCODE:
event.preventDefault();
70
Department of Computer Science Aks University Satna
this.next();
break;
}
};
var fromIndex =
this._getItemIndex(this._element.querySelector(SELECTOR_ACTIVE_ITEM));
var nextIndicator =
this._indicatorsElement.children[this._getItemIndex(element)];
if (nextIndicator) {
71
Department of Computer Science Aks University Satna
$(nextIndicator).addClass(CLASS_NAME_ACTIVE$1);
}
}
};
if (slideEvent.isDefaultPrevented()) {
return;
}
if (!activeElement || !nextElement) {
// Some weirdness is happening, so we bail
return;
}
this._isSliding = true;
if (isCycling) {
this.pause();
}
this._setActiveIndicatorElement(nextElement);
72
Department of Computer Science Aks University Satna
direction: eventDirectionName,
from: activeElementIndex,
to: nextElementIndex
});
if ($(this._element).hasClass(CLASS_NAME_SLIDE)) {
$(nextElement).addClass(orderClassName);
Util.reflow(nextElement);
$(activeElement).addClass(directionalClassName);
$(nextElement).addClass(directionalClassName);
var nextElementInterval = parseInt(nextElement.getAttribute('data-interval'),
10);
if (nextElementInterval) {
this._config.defaultInterval = this._config.defaultInterval ||
this._config.interval;
this._config.interval = nextElementInterval;
} else {
this._config.interval = this._config.defaultInterval || this._config.interval;
}
if (isCycling) {
this.cycle();
}
} // Static
;
if (!data) {
73
Department of Computer Science Aks University Satna
data[action]();
} else if (_config.interval && _config.ride) {
data.pause();
data.cycle();
}
});
};
if (!selector) {
return;
}
if (!target || !$(target).hasClass(CLASS_NAME_CAROUSEL)) {
return;
}
if (slideIndex) {
config.interval = false;
}
Carousel._jQueryInterface.call($(target), config);
if (slideIndex) {
$(target).data(DATA_KEY$2).to(slideIndex);
}
event.preventDefault();
};
_createClass(Carousel, null, [{
key: "VERSION",
get: function get() {
return VERSION$2;
}
}, {
key: "Default",
get: function get() {
return Default;
74
Department of Computer Science Aks University Satna
}
}]);
return Carousel;
}();
/**
*,
*::before,
*::after {
box-sizing: inherit;
}
.container {
width: 100%;
padding-right: 15px;
padding-left: 15px;
margin-right: auto;
margin-left: auto;
}
75
Department of Computer Science Aks University Satna
.row {
display: -ms-flexbox;
display: flex;
-ms-flex-wrap: wrap;
flex-wrap: wrap;
margin-right: -15px;
margin-left: -15px;
}
.no-gutters {
margin-right: 0;
margin-left: 0;
}
.col-1, .col-2, .col-3, .col-4, .col-5, .col-6, .col-7, .col-8, .col-9, .col-10, .col-11,
.col-12, .col,
.col-auto, .col-sm-1, .col-sm-2, .col-sm-3, .col-sm-4, .col-sm-5, .col-sm-6, .col-sm-7,
.col-sm-8, .col-sm-9, .col-sm-10, .col-sm-11, .col-sm-12, .col-sm,
.col-sm-auto, .col-md-1, .col-md-2, .col-md-3, .col-md-4, .col-md-5, .col-md-6, .col-md-
7, .col-md-8, .col-md-9, .col-md-10, .col-md-11, .col-md-12, .col-md,
76
Department of Computer Science Aks University Satna
.col {
-ms-flex-preferred-size: 0;
flex-basis: 0;
-ms-flex-positive: 1;
flex-grow: 1;
min-width: 0;
max-width: 100%;
}
.row-cols-1 > * {
-ms-flex: 0 0 100%;
flex: 0 0 100%;
max-width: 100%;
}
.row-cols-2 > * {
-ms-flex: 0 0 50%;
flex: 0 0 50%;
max-width: 50%;
}
.row-cols-3 > * {
-ms-flex: 0 0 33.333333%;
flex: 0 0 33.333333%;
max-width: 33.333333%;
}
.row-cols-4 > * {
-ms-flex: 0 0 25%;
flex: 0 0 25%;
max-width: 25%;
}
.row-cols-5 > * {
-ms-flex: 0 0 20%;
flex: 0 0 20%;
max-width: 20%;
}
.row-cols-6 > * {
-ms-flex: 0 0 16.666667%;
flex: 0 0 16.666667%;
max-width: 16.666667%;
}
.col-auto {
-ms-flex: 0 0 auto;
77
Department of Computer Science Aks University Satna
flex: 0 0 auto;
width: auto;
max-width: 100%;
}
.col-1 {
-ms-flex: 0 0 8.333333%;
flex: 0 0 8.333333%;
max-width: 8.333333%;
}
.col-2 {
-ms-flex: 0 0 16.666667%;
flex: 0 0 16.666667%;
max-width: 16.666667%;
}
.col-3 {
-ms-flex: 0 0 25%;
flex: 0 0 25%;
max-width: 25%;
}
.col-4 {
-ms-flex: 0 0 33.333333%;
flex: 0 0 33.333333%;
max-width: 33.333333%;
}
.col-5 {
-ms-flex: 0 0 41.666667%;
flex: 0 0 41.666667%;
max-width: 41.666667%;
}
.col-6 {
-ms-flex: 0 0 50%;
flex: 0 0 50%;
max-width: 50%;
}
.col-7 {
-ms-flex: 0 0 58.333333%;
flex: 0 0 58.333333%;
max-width: 58.333333%;
}
.col-8 {
-ms-flex: 0 0 66.666667%;
flex: 0 0 66.666667%;
max-width: 66.666667%;
}
.col-9 {
-ms-flex: 0 0 75%;
flex: 0 0 75%;
max-width: 75%;
}
78
Department of Computer Science Aks University Satna
.col-10 {
-ms-flex: 0 0 83.333333%;
flex: 0 0 83.333333%;
max-width: 83.333333%;
}
.col-11 {
-ms-flex: 0 0 91.666667%;
flex: 0 0 91.666667%;
max-width: 91.666667%;
}
.col-12 {
-ms-flex: 0 0 100%;
flex: 0 0 100%;
max-width: 100%;
}
.order-first {
-ms-flex-order: -1;
order: -1;
}
.order-last {
-ms-flex-order: 13;
order: 13;
}
79
Department of Computer Science Aks University Satna
}
.logo-small {
color: #f4511e;
font-size: 50px;
}
.logo {
color: #f4511e;
font-size: 200px;
}
@media screen and (max-width: 768px) {
.col-sm-4 {
text-align: center;
margin: 25px 0;
}
}
</style>
<script language="javascript" type="text/javascript">
// <![CDATA[
// ]]>
</script>
</asp:Content>
<asp:Content ID="Content2" ContentPlaceHolderID="ContentPlaceHolder1" Runat="Server">
<br />
</div>
</form>
</div>
</div>
<div class="col-sm-4">
<span class="glyphicon glyphicon-signal logo"></span>
</div>
</div>
80
Department of Computer Science Aks University Satna
</div>
81
Department of Computer Science Aks University Satna
</asp:Content>
<br />
<br />
<h2>Add Product</h2>
<hr />
</div>
</div>
82
Department of Computer Science Aks University Satna
</div>
</div>
83
Department of Computer Science Aks University Satna
84
Department of Computer Science Aks University Satna
</div>
</div>
</div>
</div>
</div>
</div>
<div class="container">
<hr />
85
Department of Computer Science Aks University Satna
<asp:TemplateField HeaderText="Photo">
<ItemTemplate>
<%-- <img src="Images/ProductImages/<%# Eval("PID") %>/<%#
Eval("ImageName") %><%# Eval("Extention") %>" alt="<%# Eval("ImageName") %>" style="
height:150px; width:150px;"/> --%>
</ItemTemplate>
</asp:TemplateField>
</Columns>
</asp:GridView>
</div>
</div>
</div>
</div>
<div class="panel-footer">Panel Footer</div>
</div>
</div>
</asp:Content>
Some Coding Of C#
using System;
using System.Collections.Generic;
86
Department of Computer Science Aks University Satna
using System.Linq;
using System.Web;
using System.Web.UI;
using System.Web.UI.WebControls;
}
protected void Button1_Click(object sender, EventArgs e)
{
Response.Redirect("SignIn.aspx");
}
}
using System;
using System.Collections.Generic;
using System.Linq;
using System.Web;
using System.Web.UI;
using System.Web.UI.WebControls;
using System.Data;
using System.Data.SqlClient;
using System.Configuration;
87
Department of Computer Science Aks University Satna
con.Close();
//lblMsg.Text = "Registration Successfully done";
//lblMsg.ForeColor = System.Drawing.Color.Green;
txtBrand.Focus();
}
}
}
protected void txtID_TextChanged(object sender, EventArgs e)
{
//SqlConnection con = new
SqlConnection(ConfigurationManager.ConnectionStrings["MyShoppingDB"].ConnectionString);
//if (con.State == ConnectionState.Closed) { con.Open(); }
//SqlCommand cmd = new SqlCommand("select Name from tblBrands where
BrandID=@ID",con);
//cmd.Parameters.AddWithValue("@ID",Convert.ToInt32(txtID.Text));
//SqlDataAdapter da = new SqlDataAdapter(cmd);
//DataSet ds = new DataSet();
//DataTable dt = new DataTable();
//da.Fill(ds, "dt");
//con.Close();
//if (ds.Tables[0].Rows.Count > 0)
//{
// btnUpdateBrand.Enabled = true;
// txtUpdateBrandName.Text = ds.Tables[0].Rows[0]["Name"].ToString();
//}
//else
//{
// btnUpdateBrand.Enabled = false;
// txtUpdateBrandName.Text = string.Empty;
//}
//con.Close();
}
protected void btnUpdateBrand_Click(object sender, EventArgs e)
{
//txtBrand.Text = "0";
//txtBrand.Visible = false;
//SqlConnection con = new
SqlConnection(ConfigurationManager.ConnectionStrings["MyShoppingDB"].ConnectionString);
//if (con.State == ConnectionState.Closed) { con.Open(); }
88
Department of Computer Science Aks University Satna
}
}
using System;
using System.Collections.Generic;
using System.Linq;
using System.Web;
using System.Web.UI;
using System.Web.UI.WebControls;
using System.Data;
using System.Data.SqlClient;
using System.Configuration;
89
Department of Computer Science Aks University Satna
cmd.ExecuteNonQuery();
con.Close();
//lblMsg.Text = "Registration Successfully done";
//lblMsg.ForeColor = System.Drawing.Color.Green;
txtCategory.Focus();
}
}
}
Some My SQL Server Query
--3
---4
CREATE TABLE tblSubCategory(
[SubCatID] [int] IDENTITY(1,1) NOT NULL primary key,
[SubCatName] [nvarchar](max) NULL,
[MainCatID] [int] NULL,
CONSTRAINT [FK_tblSubCategory_tblCategory] FOREIGN KEY([MainCatID]) REFERENCES
tblCategory ([CatID])
)
---------5
90
Department of Computer Science Aks University Satna
---------6
CREATE TABLE tblOrderProducts(
[OrderProID] [int] IDENTITY(1,1) NOT NULL primary key,
[OrderID] [nvarchar](50) NULL,
[UserID] [int] NULL,
[PID] [int] NULL,
[Products] [nvarchar](max) NULL,
[Quantity] [int] NULL,
[OrderDate] [datetime] NULL,
[Status] [nvarchar](100) NULL,
Constraint [FK_tblOrderProducts_ToTable] FOREIGN KEY ([UserID]) REFERENCES [tblUsers]
([uid])
)
---7
create table ForgotPass
(
Id nvarchar (500) not null,
Uid int null,
RequestDateTime DATETIME null,
Constraint [FK_ForgotPass_tblUsers] FOREIGN KEY ([Uid]) REFERENCES [tblUsers] ([Uid])
---8
create table tblGender
(
GenderID int identity(1,1) primary key,
GenderName nvarchar(MAX)
--9
CREATE TABLE tblOrders(
[OrderID] [int] IDENTITY(1,1) NOT NULL primary key,
[UserID] [int] NULL,
[EMail] [nvarchar](max) NULL,
[CartAmount] [money] NULL,
[CartDiscount] [money] NULL,
[TotalPaid] [money] NULL,
[PaymentType] [nvarchar](50) NULL,
[PaymentStatus] [nvarchar](50) NULL,
[DateOfPurchase] [datetime] NULL,
[Name] [nvarchar](200) NULL,
[Address] [nvarchar](max) NULL,
[MobileNumber] [nvarchar](50) NULL,
[OrderStatus] [nvarchar](50) NULL,
[OrderNumber] [nvarchar](50) NULL,
91
Department of Computer Science Aks University Satna
--10
PDescription nvarchar(MAX),
PProductDetails nvarchar(MAX),
PMaterialCare nvarchar(MAX),
FreeDelivery int,
[30DayRet] int,
COD int,
Constraint [FK_tblProducts_ToTable] FOREIGN KEY ([PBrandID]) REFERENCES [tblBrands]
([BrandID]),
Constraint [FK_tblProducts_ToTable1] FOREIGN KEY ([PCategoryID]) REFERENCES [tblCategory]
([CatID]),
Constraint [FK_tblProducts_ToTable2] FOREIGN KEY ([PSubCatID]) REFERENCES
[tblSubCategory] ([SubCatID]),
Constraint [FK_tblProducts_ToTable3] FOREIGN KEY ([PGender]) REFERENCES [tblGender]
([GenderID])
---11
select * from tblProductImages
CREATE TABLE tblProductImages(
[PIMGID] [int] IDENTITY(1,1) NOT NULL,
[PID] [int] NULL,
[Name] [nvarchar](max) NULL,
[Extention] [nvarchar](500) NULL,
92
Department of Computer Science Aks University Satna
---12
93
Department of Computer Science Aks University Satna
System Testing is an important phase. Testing represents an interesting anomaly for the software.
Thus a series of testing are performed for the proposed system before the system is ready for user
acceptance testing.
A good test case is one that has a high probability of finding an as undiscovered error. A
successful test is one that uncovers an as undiscovered error.
Testing Objectives:
Testing Principles:
94
Department of Computer Science Aks University Satna
The primary objective for test case design is to derive a set of tests that has the highest
livelihood for uncovering defects in software. To accomplish this objective two different
categories of test case design techniques are used. They are
White-box testing:
White box testing focus on the program control structure. Test cases are derived to ensure
that all statements in the program have been executed at least once during testing and that all
logical conditions have been executed.
Block-box testing:
Black box testing is designed to validate functional requirements without regard to the internal
workings of a program. Black box testing mainly focuses on the information domain of the
software, deriving test cases by partitioning input and output in a manner that provides through
test coverage. Incorrect and missing functions, interface errors, errors in data structures, error in
functional logic are the errors falling in this category.
Testing strategies:
A strategy for software testing must accommodate low-level tests that are necessary to
verify that all small source code segment has been correctly implemented as well as high-level
tests that validate major system functions against customer requirements.
Testing fundamentals:
95
Department of Computer Science Aks University Satna
Testing is a process of executing program with the intent of finding error. A good test case is one
that has high probability of finding an undiscovered error. If testing is conducted successfully it uncovers
the errors in the software. Testing cannot show the absence of defects, it can only show that software
defects present.
Information flow for testing flows the pattern. Two class of input provided to test the process.
The software configuration includes a software requirements specification, a design specification and
source code.
Test configuration includes test plan and test cases and test tools. Tests are conducted and all the
results are evaluated. That is test results are compared with expected results. When erroneous data are
uncovered, an error is implied and debugging commences.
Unit testing:
Unit testing is essential for the verification of the code produced during the coding phase and
hence the goal is to test the internal logic of the modules. Using the detailed design description as a
guide, important paths are tested to uncover errors with in the boundary of the modules. These tests were
carried out during the programming stage itself. All units of ViennaSQL were successfully tested.
Integration testing :
Integration testing focuses on unit tested modules and build the program structure that is dictated
by the design phase.
System testing:
System testing tests the integration of each module in the system. It also tests to find
discrepancies between the system and it’s original objective, current specification and system
documentation. The primary concern is the compatibility of individual modules. Entire system is working
properly or not will be tested here, and specified path ODBC connection will correct or not, and giving
output or not are tested here these verifications and validations are done by giving input values to the
system and by comparing with expected output. Top-down testing implementing here.
96
Department of Computer Science Aks University Satna
Acceptance Testing:
This testing is done to verify the readiness of the system for the implementation. Acceptance
testing begins when the system is complete. Its purpose is to provide the end user with the
confidence that the system is ready for use. It involves planning and execution of functional
tests, performance tests and stress tests in order to demonstrate that the implemented system
satisfies its requirements.
Test coverage Analyzer – records the control paths followed for each test case.
Timing Analyzer – also called a profiler, reports the time spent in various regions of the code are areas to
concentrate on to improve system performance.
Coding standards – static analyzers and standard checkers are used to inspect code for deviations from
standards and guidelines.
Test Cases:
Test cases are derived to ensure that all statements in the program have been executed at
least once during testing and that all logical conditions have been executed.
Using White-Box testing methods, the software engineer can drive test cases that
• Guarantee that logical decisions on their true and false sides.
• Exercise all logical decisions on their true and false sides.
• Execute all loops at their boundaries and with in their operational bounds.
• Exercise internal data structure to assure their validity.
The test case specification for system testing has to be submitted for review before system
testing commences.
97
Department of Computer Science Aks University Satna
98
Department of Computer Science Aks University Satna
99
Department of Computer Science Aks University Satna
ADMIN PORTAL:-
100
Department of Computer Science Aks University Satna
101
Department of Computer Science Aks University Satna
102
Department of Computer Science Aks University Satna
103
Department of Computer Science Aks University Satna
104
Department of Computer Science Aks University Satna
105
Department of Computer Science Aks University Satna
USER PORTAL:-
106
Department of Computer Science Aks University Satna
107
Department of Computer Science Aks University Satna
108
Department of Computer Science Aks University Satna
109
Department of Computer Science Aks University Satna
110
Department of Computer Science Aks University Satna
111
Department of Computer Science Aks University Satna
112
Department of Computer Science Aks University Satna
CONCLUSION:
The package was designed in such a way that future modifications can be
done easily. The following conclusions can be deduced from the development of the
project.
113
Department of Computer Science Aks University Satna
FUTURE ENHANCEMENTS:
This application avoids the manual work and the problems concern with it. It is an
easy way to obtain the information regarding the various products information that are present in
the Super markets.
Well I and my team members have worked hard in order to present an
improved website better than the existing one’s regarding the information about the various
activities. Still ,we found out that the project can be done in a better way. Primarily, when we
request information about a particular product it just shows the company, product id, product
name and no. of quantities available. So, after getting the information we can get access to the
product company website just by a click on the product name .
The next enhancement that we can add the searching option. We can
directly search to the particular product company from this site .These are the two enhancements
that we could think of at present.
114
Department of Computer Science Aks University Satna
Bibliography
115