0% found this document useful (1 vote)
659 views

E Shopping Website Project Report

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (1 vote)
659 views

E Shopping Website Project Report

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 115

AKS UNIVERSITY SATNA DEPARTMENT OF COMPUTER SCIENCE

A Project Report

ON

E-Shopping Website

Submitted by

Lovkush Pandey(B1855R10106009)

Ashutosh Pandey(B1855R10106043)

B.Tech(CSE)—6th Semester

Project Supervisor

Mr. Virendra Tiwari

(Assistant Professor)

Department of Computer Science and

Engineering

AKS UNIVERSITY SATNA (M.P.)

1
AKS UNIVERSITY SATNA DEPARTMENT OF COMPUTER SCIENCE

AKS University Satna (M.P.)

CERTIFICATE
This is to certify that the project as “STUDENTS INFORMATION
SYSTEN” Which has been completed & submitted by “Ashutosh Pandey” and
“Lovkush Pandey” in partial fulfillment of the requirement for the award of the
B.Tech. in computer science &engineering for the session 2020-2021 is a benefited

Work by them and has been completed under my guidance and supervision. It
has not been submitted eileehere for for any other degree.

H.O.D. Under the Guidance


Prof. Akhilesh A Waoo Mr. Viredra Tiwari
Head of Department (Assistant Professor)

2
AKS UNIVERSITY SATNA DEPARTMENT OF COMPUTER SCIENCE

AKS University Satna (M.P.)

CERTIFICATE
This is certify that the project as “Students
Information System” which has been completed
& submitted by “Ashutosh Pandey” and “Lovkush
Pandey” in partial fulfilment of the requirement for the
award of the
B.Tech. engineering science of computer science for the
session 2018-2022.

(External Examiner) (Internal Examiner)

3
AKS UNIVERSITY SATNA DEPARTMENT OF COMPUTER SCIENCE

ACKNOWLEDGEMENT

A Project like one involves many people and would be incomplete


without the mention of all those people whose guidance and encouragement
helped in the successful completion oh this project .Our heartly thanks to all
faculty member of department of computer science,AKS University
Satna(M.P.) for their effort toward our project . we would like to thanks our
H.O.D. Prof. Akhilesh A Waoo who has been a great source of inspiration for
us and without whose humble guidance of project was never to shape.

We are also thankful to people whose timely help paucity of space


is restricting us from mentioning their name . and finally we also thank to all
my colleagues who were constant support during the whole project.

ASSOCIATED BY:

LOVKUSH PANDEY (B1855R10106009)


ASHUTOSH PANDEY (B1855R10106043)

4
Department of Computer Science Aks University Satna

DECLARATION
We here by declare that the work is
being presented in the project report
entitled”E SHOPPING WEBSITE” IN Partial
fulfillment of the requirement of the B.Tech
record of “Computer Science & engineering”
branch is an authentic record of our work
carried out under the able guidance of
“Assistanr Prof. Mr. Virendra Tiwari”. The
work has been carried out at AKS University
Satna (M.P.).

PROJECT ASSOCIATED:-

LOVKUSH PANDEY (B1855R10106009)


ASHUTOSH PANDEY (B1855R10106043)

5
Department of Computer Science Aks University Satna

ABSTRACT

The Shopping cart is mainly useful for who haven’t time to go to shopping, those are
just entered into this website and bought what ever they want.
Even it is night or morning they entered into this site, and chosen different items like
fruits, books, toys etc..

‘Customer is our god’ mainly this website is based on this formula.


After chosen items he bought into Pay pal process like VISA or MASTER credit cards or
any Debit cards are accepted in this website. Customer is happily shopping at his rest
place.

Once customer entered with his own username and password, at that time
automatically one shopping cart will be created, once user select an item it will add to
cart. In case user thinks the selected item is not useful for me, then deleted that item
from shopping cart.

Customer selected some items, but in his credit or debit cart haven’t that much
balance, then he was logout from the website, the selected items are stored at cart with
specific users with his allotted carts, after some days he bought those items then
automatically deleted from the cart.

6
Department of Computer Science Aks University Satna

INDEX

S. N CONTENTS

1. INTRODUCTION

2. ANALYSIS

2.1 SYSTEM ANALYSIS

2.2 SYSTEM SPECIFICATIONS

3. DESIGN APPROACH

3.1 INTRODUCTION TO DESIGN

3.2 FLOW CHART DIAGRAMS

3.3 DATA FLOW DIAGRAMS

3.4 E-R DIAGRAMS

4. PROJECT MODULES

5. IMPLEMENTATION

4.2 TESTING

4.2.1 TEST CASES

6. OUTPUT SCREENS

7. CONCLUSION

8. FUTURE ENHANCEMENTS

9. BIBILIOGRAPHY

7
Department of Computer Science Aks University Satna

INTRODUCTION:

OBJECTIVE:

The Shopping cart is mainly useful for who haven’t time to go to shopping, those
are just entered into this website and bought what ever they want.

Even it is night or morning they entered into this site, and chosen different items like fruits,
books, toys etc..

‘Customer is our god’ mainly this website is based on this formula. After
chosen items he bought into Pay pal process like VISA or MASTER credit cards or any Debit
cards are accepted in this website. Customer is happily shopping at his rest place.

PROJECT OVERVIEW:

Once customer entered with his own username and password, at that time
automatically one shopping cart will be created, once user select an item it will add to cart. In
case user thinks the selected item is not useful for me, then deleted that item from shopping cart.

Customer selected some items, but in his credit or debit cart haven’t that much
balance, then he was logout from the website, the selected items are stored at cart with specific
users with his allotted carts, after some days he bought those items then automatically deleted
from the cart.

8
Department of Computer Science Aks University Satna

SYSTEM ANALYSIS:

1. Existing System
. Existing system is a manual one in which users are maintaining books to store the
information like product details, Distributors details, purchases, sales details and accounts for
every month. It is very difficult to maintain historical data.

DISADVANTAGES:

The following are the disadvantages of the existing system


• It is difficult to maintain important information in books.
• More manual hours need to generate required reports.
• It is tedious to manage historical data which needs much space to keep all the previous
years’ ledgers, books etc.
• Daily sales and purchases details must be entered into books are very difficult to
maintain.
2. Proposed System

The DISTRIBUTORS MANAGEMENT TOOL is a software application which avoids


more manual hours that need to spend in record keeping and generating reports. This application
keeps the data in a centralized way which is available to all the users simultaneously. It is very
easy to manage historical data in database. No specific training is required for the distributors to
use this application. They can easily use the tool that decreases manual hours spending for
normal things and hence increases the performance. It is very easy to record the information of
online sales and purchases in the databases.

9
Department of Computer Science Aks University Satna

3. Objective of the System


The objective of the Distributors Management Tool is to provide better information for
the users of this system for better results for their maintainence in the product details that is sales,
purchases and stock.

System Specifications

Hardware Requirements:-

• Pentium-IV(Processor).
• 256 MB Ram
• 512 KB Cache Memory
• Hard disk 10 GB
• Microsoft Compatible 101 or more Key Board

Software Requirements: -

Web Technologies : ASP.NET 2.0

Language : C#

Database : SQL SERVER 2000,05

10
Department of Computer Science Aks University Satna

Web Server : IIS

Operating System : WINDOWS XP

INTRODUCTION:

Design is the first step in the development phase for any techniques and
principles for the purpose of defining a device, a process or system in sufficient detail to permit
its physical realization.

Once the software requirements have been analyzed and specified the
software design involves three technical activities - design, coding, implementation and testing
that are required to build and verify the software.

The design activities are of main importance in this phase, because in


this activity, decisions ultimately affecting the success of the software implementation and its
ease of maintenance are made. These decisions have the final bearing upon reliability and
maintainability of the system. Design is the only way to accurately translate the customer’s
requirements into finished software or a system.

Design is the place where quality is fostered in development.

11
Department of Computer Science Aks University Satna

Software design is a process through which requirements are translated into a representation of
software. Software design is conducted in two steps. Preliminary design is concerned with the
transformation of requirements into data.

System Flow Diagram for Online Shopping System


System flow chart for online shopping website
The system flow diagram is a visual representation of all processed in sequential order.
The System flow chart diagram is a graphical representation of the relation between all the
major parts or step of the system. Flow chart diagram can not include minor parts of the system.

Flow Chart diagram symbols


Symbol Description

Start / End : Represents the start or end point of a flowchart.

Data Flow : Data flow are pipelines through the packets of information flow.

Process : A Process or task performed by the system.

Decision : Decision decides the next step will be proceed or not. Yes/No,
True/False

Input / Output : Represents input and output data.

12
Department of Computer Science Aks University Satna

Use Case Diagram for Online Shopping Website


Use Case Diagram – Online Shopping Website.
The use case diagram are usually referred to as behavior diagram used to describe the actions of
all user in a system.
All user describe in use case are actors and the functionality as action of system.

Use case for online shoes shopping website

13
Department of Computer Science Aks University Satna

use case
diagram for online shopping website

14
Department of Computer Science Aks University Satna

Activity diagram for online shopping website


Activity diagram for online shopping system
The activity diagram used to describe flow of activity through a series of actions. Activity
diagram is a important diagram to describe the system.
The activity described as a action or operation of the system.

Activity Diagram for User Side


In User side activity diagram describe all the functionality or operation of users can do on our
website.

15
Department of Computer Science Aks University Satna

Activity diagram for online shopping website – user side

16
Department of Computer Science Aks University Satna

Activity diagram for Admin side

Activity diagram for online shopping website – admin side

17
Department of Computer Science Aks University Satna

DATA FLOW DIAGRAMS:

The DFD takes an input-process-output view of a system i.e. data objects flow into the
software, are transformed by processing elements, and resultant data objects flow out of the
software.

Data objects represented by labeled arrows and transformation are represented


by circles also called as bubbles. DFD is presented in a hierarchical fashion i.e. the first data flow
model represents the system as a whole. Subsequent DFD refine the context diagram (level 0
DFD), providing increasing details with each subsequent level.

The DFD enables the software engineer to develop models of the information
domain & functional domain at the same time. As the DFD is refined into greater levels of
details, the analyst perform an implicit functional decomposition of the system. At the same
time, the DFD refinement results in a corresponding refinement of the data as it moves through
the process that embody the applications.

A context-level DFD for the system the primary external entities produce
information for use by the system and consume information generated by the system. The
labeled arrow represents data objects or object hierarchy.

18
Department of Computer Science Aks University Satna

RULES FOR DFD:

• Fix the scope of the system by means of context diagrams.

• Organize the DFD so that the main sequence of the actions

• Reads left to right and top to bottom.

• Identify all inputs and outputs.

• Identify and label each process internal to the system with Rounded circles.

• A process is required for all the data transformation and Transfers. Therefore, never
connect a data store to a data Source or the destinations or another data store with just
a Data flow arrow.

• Do not indicate hardware and ignore control information.

• Make sure the names of the processes accurately convey everything the process is
done.

• There must not be unnamed process.

• Indicate external sources and destinations of the data, with Squares.

• Number each occurrence of repeated external entities.

• Identify all data flows for each process step, except simple Record retrievals.

• Label data flow on each arrow.

• Use details flow on each arrow.

• Use the details flow arrow to indicate data movements.

19
Department of Computer Science Aks University Satna

20
Department of Computer Science Aks University Satna

Data flow diagram(DFD) for Online shopping website


A data flow diagram is a graphical view of how data is processed in a system in terms of input
and output.
The Data flow diagram (DFD) contains some symbol for drawing the data flow diagram.
Data flow diagram symbol
Symbol Description

Data Flow – Data flow are pipelines through the packets of


information flow.

Process : A Process or task performed by the system.

Entity : Entity are object of the system. A source or destination


data of a system.

Data Store : A place where data to be stored.

Context level DFD – 0 level


The context level data flow diagram (dfd) is describe the whole system. The (o) level dfd
describe the all user module who operate the system. Below data flow diagram of online
shopping site shows the two user can operate the system Admin and Member user.

o – Level DFD for Online shopping website project

1st Level Admin Side DFD


The Admin side DFD describe the functionality of Admin, Admin is a owner of the website.
Admin can first add category of item and then add items by category wise. and admin can
manage order and payment detail.

21
Department of Computer Science Aks University Satna

22
Department of Computer Science Aks University Satna

DFD for online shopping website project

2nd Level – Admin side DFD (4.0)

DFD for online shopping website project

2nd Level – Admin side DFD (4.0)

23
Department of Computer Science Aks University Satna

24
Department of Computer Science Aks University Satna

E R Diagram for Online Shopping System


The Entity-Relationship (ER) model was originally proposed by Peter in 1976 [Chen76] as a way to
unify the network and relational database views. Simply stated the ER model is a conceptual data model
that views the real world as entities and relationships. A basic component of the model is the Entity-
Relationship diagram which is used to visually represents data objects. Since Chen wrote his paper the
model has been extended and today it is commonly used for database design For the database designer,
the utility of the ER model is:

• it maps well to the relational model. The constructs used in the ER model can easily be
transformed into relational tables.
• it is simple and easy to understand with a minimum of training. Therefore, the model can be used
by the database designer to communicate the design to the end user.
• In addition, the model can be used as a design plan by the database developer to implement a data
model in a specific database management software.

Connectivity and Cardinality

The basic types of connectivity for relations are: one-to-one, one-to-many, and many-to-many. A
one-to-one (1:1) relationship is when at most one instance of a entity A is associated with one instance of
entity B. For example, "employees in the company are each assigned their own office. For each employee
there exists a unique office and for each office there exists a unique employee.

A one-to-many (1:N) relationships is when for one instance of entity A, there are zero, one, or many
instances of entity B, but for one instance of entity B, there is only one instance of entity A. An example
of a 1:N relationships is

a department has many employees

each employee is assigned to one department

A many-to-many (M:N) relationship, sometimes called non-specific, is when for one instance of entity A,
there are zero, one, or many instances of entity B and for one instance of entity B there are zero, one, or
many instances of entity A. The connectivity of a relationship describes the mapping of associated

25
Department of Computer Science Aks University Satna

ER Notation

There is no standard for representing data objects in ER diagrams. Each modeling methodology
uses its own notation. The original notation used by Chen is widely used in academics texts and journals
but rarely seen in either CASE tools or publications by non-academics. Today, there are a number of
notations used, among the more common are Bachman, crow's foot, and IDEFIX.

All notational styles represent entities as rectangular boxes and relationships as lines connecting
boxes. Each style uses a special set of symbols to represent the cardinality of a connection. The notation
used in this document is from Martin. The symbols used for the basic ER constructs are:

▪ entities are represented by labeled rectangles. The label is the name of the entity. Entity names

should be singular nouns.

▪ relationships are represented by a solid line connecting two entities. The name of the relationship

is written above the line. Relationship names should be verbs

▪ attributes, when included, are listed inside the entity rectangle. Attributes which are identifiers

are underlined. Attribute names should be singular nouns.

26
Department of Computer Science Aks University Satna

Online Shopping system E-R Diagram

E-R Diagram for online shopping system project


We also represent E-R diagram for online shopping system like

27
Department of Computer Science Aks University Satna

System flow chart for online shopping website

28
Department of Computer Science Aks University Satna

PROJECT MODULES

MODULES : This project contains 3 modules, those are

• Admin
• Products
• User

MODULES DESCRIPTION:

Admin:-
When admin login, he saw the customer’s database, means how many users are
authenticated to this website and how many users are transact everyday, and newly items are
inserting into products.

Products:-
This module contains product name, and related image, and cost of its. Like toys,
books, furniture, gold items, etc.. Whatever customer wants from the shopping cart.

User:-
User entered into with his username and password, when he entered into this, he saw
what items are available today, this facility is available for this site. Chosen different items from
website get those through door delivery.

29
Department of Computer Science Aks University Satna

Database Tables:

Admin Table:

Column
Name Type Computed Length
uname varchar no 20
password varchar no 20

Products Table:
Column
Name Type Computed Length

Pid int no 4
ProductName varchar no 100
ProductType varchar no 50
image varchar no 100
price int no 4

30
Department of Computer Science Aks University Satna

ABOUT INTERNET AND INTRANET

Technologically, the Internet is network of computers. Not just a few special


Computers, but over nine million of all kinds of computers. Similarly it is not just a
network, but a network of networks hence the name and using TCP/IP
(transmission control protocol and internet protocol).

Internet is the name for a vast, worldwide system consisting of people,


information and computers. Internet is global communication system of diverse,
INTER connected computer NETWORK for the exchange of information of
virtually every conceivable topic known to man.
Internet is not just one thing. It is a lot of things to lot of people. In
today’s world it is one of the most important commodity of life. The Internet is
more important in what it enables than what it is, more of a phenomenon than fact.
Intranet

The classical definition of Intranet is the application of the Internet technologies


to the internal business applications media most refer to the Intranet in terms of
applying web technologies to information systems in the organization

31
Department of Computer Science Aks University Satna

OVERVIEW OF TECHNOLOGIES USED

JavaScript
JavaScript:

JavaScript is a new scripting language for WebPages. Scripts written with java script can
be embedded into your HTML pages. With java script you have many possibilities for
enhancing your HTML page with interesting elements. For example you are able to respond to
user-initiated events quite easily. Some effects that are now possible with java script were some
time ago only possible with CGI. So you can create really sophisticated pages with the helps of
java script on the Internet.

Difference between java and Java Script

Although the names are almost the same Java is not the same as Java Script. These are
two different techniques for Internet programming. Java is programming language. JavaScript is
a scripting language as the name implies. The difference is that we can create real programs with
java. But java script in not real programming. Java Script is meant to be easy to understand and
easy to use. JavaScript authors should not have to care too much about programming. We could
say that Java Script is rather an extension to HTML than a separate computer language. Of
course this is not the official definition but it makes it easier to understand the difference
between java and java script.

How can Java Script scripts run?

The first browser to support java script was the Netscape Navigator 2.0 of course the
higher versions do have java script as well. You might know that java does not run on all

32
Department of Computer Science Aks University Satna

Netscape Navigators 2.0 (or higher versions) versions. But this is not true for java script -
although there are some problems with the different versions.
The Mac version for example seems to have many bugs. In the near future there are
going to be some other browsers, which support java script. The Microsoft Internet explorer 3.0
is going to support java script. JavaScript enabled browsers are going to spread soon - it is worth
learning this new technique now. You might realize that is really easy to write Java Script
scripts. We have to know is some basic techniques and some work-around for problems you
might encounter. Of course we need a basic. Understanding HTML before reading this tutorial
you can find many really good online resources about HTML. Best you make an online search
about ‘html’ at yahoo if you want to get informed about HTML. Now I want to show some
small scripts so you can learn how they are implemented into HTML-documents and to show
which possibilities you have with the new scripting language. The following is a very small
script, which will only print a text into an HTML document.

<html>
<head>
My first JavaScript
</head>
<body><br>
This is a normal HTML document
<br>
<script language=”JavaScript”>
Document.write (“this is a java script”)
</script><b r>
Backing HTML again
</body>
</html>

If you are using a java script enabled-browser at the moment then you will have the possibility to
see this script working. If your browser doesn’t support Java Script then this output might be
some kind of strange…

33
Department of Computer Science Aks University Satna

This is a normal HTML document


This is java script!
Back in HTML again.

Functions

Functions are bet declared between the <Head> tag of HTML page. Functions are
called by user-initiated events. Seems reasonable to keep the functions between
the <Head> tags. They are loaded first before a user can do anything that might
call a function. Scripts can be placed between inside comment fields to ensure that
older browser do not display the script itself.

<html>
<head>
<script language=”JavaScript”>
function pushbutton (){
alert (“Hello!”);
}
</script>
</head>
<body>
<form>
<input type=”button” name=”Button1” value=”push me” onclick=”pushbutton ()”>
</form>
</body>
</html>

If we want to test this one immediately and you are using a Java Script enabled browser then
please go ahead and push the button.

34
Department of Computer Science Aks University Satna

This script will create a button and when you press it a window will pop up saying “hello!”.
In fact we have a lot of possibilities just by adding functions to our scripts.
The common browsers transmit the form information by either method: here’s the complete
tag including the GET transmission method attribute for the previous form

Example

<Form method =GET action=http://www.mycompany.com/cgi-bin/upfdate.pl>


………
</form>

Input elements.

Use the <input> tag to define any one of a number of common form elements including text
fields multiple choice lists click able images and submission buttons. There are many attributers
for this tag only that types and name attributes are required for each element, each type of input
element uses only a subset of the followed attributes. Additional <input> attributes may be
required based upon which type of the form element you specify.

Submit button:

The submit button (<input type=submit> ) does what its name implies, settings in motion the
form’s submission to the server from the browser. We many have more than submit buttons will
be added to the parameter list the browser sends along to the server.

Example
< Input type =”submit”>
<Input type=”submit” value=”submit” name=”name”>

Reset button:

35
Department of Computer Science Aks University Satna

The reset button if firm <input> button is nearly self- explanatory; it lets the user reset erase or
set to some default value all elements in the form. By default the browser displays a reset button
worth the label “reset”. We can change that by specifying a value attribute with tour own button
label.

Microsoft .NET Framework

The .NET Framework is a new computing platform that simplifies application


development in the highly distributed environment of the Internet. The .NET
Framework is designed to fulfill the following objectives:

• To provide a consistent object-oriented programming environment whether object


code is stored and executed locally, executed locally but Internet-distributed, or
executed remotely.
• To provide a code-execution environment that minimizes software deployment and
versioning conflicts.
• To provide a code-execution environment that guarantees safe execution of code,
including code created by an unknown or semi-trusted third party.
• To provide a code-execution environment that eliminates the performance problems
of scripted or interpreted environments.
• To make the developer experience consistent across widely varying types of
applications, such as Windows-based applications and Web-based applications.
• To build all communication on industry standards to ensure that code based on the
.NET Framework can integrate with any other code.

The .NET Framework has two main components: the common language runtime and
the .NET Framework class library. The common language runtime is the foundation
of the .NET Framework. You can think of the runtime as an agent that manages
code at execution time, providing core services such as memory management,
thread management, and remoting, while also enforcing strict type safety and other
forms of code accuracy that ensure security and robustness. In fact, the concept of
code management is a fundamental principle of the runtime. Code that targets the
runtime is known as managed code, while code that does not target the runtime is

36
Department of Computer Science Aks University Satna

known as unmanaged code. The class library, the other main component of the
.NET Framework, is a comprehensive, object-oriented collection of reusable types
that you can use to develop applications ranging from traditional command-line or
graphical user interface (GUI) applications to applications based on the latest
innovations provided by ASP.NET, such as Web Forms and XML Web services.

The .NET Framework can be hosted by unmanaged components that load


the common language runtime into their processes and initiate the execution of
managed code, thereby creating a software environment that can exploit both
managed and unmanaged features. The .NET Framework not only provides several
runtime hosts, but also supports the development of third-party runtime hosts.

For example, ASP.NET hosts the runtime to provide a scalable, server-side


environment for managed code. ASP.NET works directly with the runtime to enable
Web Forms applications and XML Web services, both of which are discussed later in
this topic.

Internet Explorer is an example of an unmanaged application that hosts the


runtime (in the form of a MIME type extension). Using Internet Explorer to host the
runtime enables you to embed managed components or Windows Forms controls in
HTML documents. Hosting the runtime in this way makes managed mobile code
(similar to Microsoft® ActiveX® controls) possible, but with significant improvements
that only managed code can offer, such as semi-trusted execution and secure
isolated file storage.

The following illustration shows the relationship of the common language


runtime and the class library to your applications and to the overall system. The
illustration also shows how managed code operates within a larger architecture.

Features of the Common Language Runtime

The common language runtime manages memory, thread execution, code


execution, code safety verification, compilation, and other system services. These

37
Department of Computer Science Aks University Satna

features are intrinsic to the managed code that runs on the common language
runtime.

With regards to security, managed components are awarded varying degrees of


trust, depending on a number of factors that include their origin (such as the Internet,
enterprise network, or local computer). This means that a managed component
might or might not be able to perform file-access operations, registry-access
operations, or other sensitive functions, even if it is being used in the same active
application.

The runtime enforces code access security. For example, users can trust that an
executable embedded in a Web page can play an animation on screen or sing a
song, but cannot access their personal data, file system, or network. The security
features of the runtime thus enable legitimate Internet-deployed software to be
exceptionally featuring rich.

The runtime also enforces code robustness by implementing a strict type- and
code-verification infrastructure called the common type system (CTS). The CTS
ensures that all managed code is self-describing. The various Microsoft and third-
party language compilers generate managed code that conforms to the CTS. This
means that managed code can consume other managed types and instances, while
strictly enforcing type fidelity and type safety.

In addition, the managed environment of the runtime eliminates many


common software issues. For example, the runtime automatically handles object
layout and manages references to objects, releasing them when they are no longer
being used. This automatic memory management resolves the two most common
application errors, memory leaks and invalid memory references.

The runtime also accelerates developer productivity. For example,


programmers can write applications in their development language of choice, yet
take full advantage of the runtime, the class library, and components written in other
languages by other developers. Any compiler vendor who chooses to target the

38
Department of Computer Science Aks University Satna

runtime can do so. Language compilers that target the .NET Framework make the
features of the .NET Framework available to existing code written in that language,
greatly easing the migration process for existing applications.

While the runtime is designed for the software of the future, it also supports
software of today and yesterday. Interoperability between managed and unmanaged
code enables developers to continue to use necessary COM components and DLLs.

The runtime is designed to enhance performance. Although the common language


runtime provides many standard runtime services, managed code is never
interpreted. A feature called just-in-time (JIT) compiling enables all managed code to
run in the native machine language of the system on which it is executing.
Meanwhile, the memory manager removes the possibilities of fragmented memory
and increases memory locality-of-reference to further increase performance.

Finally, the runtime can be hosted by high-performance, server-side


applications, such as Microsoft® SQL Server™ and Internet Information Services
(IIS). This infrastructure enables you to use managed code to write your business
logic, while still enjoying the superior performance of the industry's best enterprise
servers that support runtime hosting.

.NET Framework Class Library

The .NET Framework class library is a collection of reusable types that tightly
integrate with the common language runtime. The class library is object oriented,
providing types from which your own managed code can derive functionality. This
not only makes the .NET Framework types easy to use, but also reduces the time
associated with learning new features of the .NET Framework. In addition, third-
party components can integrate seamlessly with classes in the .NET Framework.

39
Department of Computer Science Aks University Satna

Active Server Pages.NET

ASP.NET is a programming framework built on the common language runtime


that can be used on a server to build powerful Web applications. ASP.NET
offers several important advantages over previous Web development models:

• Enhanced Performance. ASP.NET is compiled common language runtime code


running on the server. Unlike its interpreted predecessors, ASP.NET can take
advantage of early binding, just-in-time compilation, native optimization, and caching
services right out of the box. This amounts to dramatically better performance before
you ever write a line of code.

• World-Class Tool Support. The ASP.NET framework is complemented by a rich


toolbox and designer in the Visual Studio integrated development environment.
WYSIWYG editing, drag-and-drop server controls, and automatic deployment are
just a few of the features this powerful tool provides.

• Power and Flexibility. Because ASP.NET is based on the common language


runtime, the power and flexibility of that entire platform is available to Web
application developers. The .NET Framework class library, Messaging, and Data
Access solutions are all seamlessly accessible from the Web. ASP.NET is also
language-independent, so you can choose the language that best applies to your
application or partition your application across many languages. Further, common
language runtime interoperability guarantees that your existing investment in COM-
based development is preserved when migrating to ASP.NET.

• Simplicity. ASP.NET makes it easy to perform common tasks, from simple form
submission and client authentication to deployment and site configuration. For

40
Department of Computer Science Aks University Satna

example, the ASP.NET page framework allows you to build user interfaces that
cleanly separate application logic from presentation code and to handle events in a
simple, Visual Basic - like forms processing model. Additionally, the common
language runtime simplifies development, with managed code services such as
automatic reference counting and garbage collection.

• Manageability. ASP.NET employs a text-based, hierarchical configuration system,


which simplifies applying settings to your server environment and Web applications.
Because configuration information is stored as plain text, new settings may be
applied without the aid of local administration tools. This "zero local administration"
philosophy extends to deploying ASP.NET Framework applications as well. An
ASP.NET Framework application is deployed to a server simply by copying the
necessary files to the server. No server restart is required, even to deploy or replace
running compiled code.

• Scalability and Availability. ASP.NET has been designed with scalability in mind,
with features specifically tailored to improve performance in clustered and
multiprocessor environments. Further, processes are closely monitored and
managed

by the ASP.NET runtime, so that if one misbehaves (leaks, deadlocks), a new


process can be created in its place, which helps keep your application constantly
available to handle requests.

• Customizability and Extensibility. ASP.NET delivers a well-factored architecture


that allows developers to "plug-in" their code at the appropriate level. In fact, it is
possible to extend or replace any subcomponent of the ASP.NET runtime with your
own custom-written component. Implementing custom authentication or state
services has never been easier.

• Security. With built in Windows authentication and per-application configuration, you


can be assured that your applications are secure.

41
Department of Computer Science Aks University Satna

Language Support

The Microsoft .NET Platform currently offers built-in support for three languages: C#,
Visual Basic, and JScript.

ASP.NET Server Controls

In addition to (or instead of) using <% %> code blocks to program
dynamic content, ASP.NET page developers can use ASP.NET server controls
to program Web pages. Server controls are declared within an .aspx file using
custom tags or intrinsic HTML tags that contain a runat="server" attributes
value. Intrinsic HTML tags are handled by one of the controls in the
System.Web.UI.HtmlControls namespace. Any tag that doesn't explicitly map to
one of the controls is assigned the type of
System.Web.UI.HtmlControls.HtmlGenericControl.

Server controls automatically maintain any client-entered values between


round trips to the server. This control state is not stored on the server (it is
instead stored within an <input type="hidden"> form field that is round-tripped
between requests). Note also that no client-side script is required.

In addition to supporting standard HTML input controls, ASP.NET enables


developers to utilize richer custom controls on their pages. For example, the
following sample demonstrates how the <asp:adrotator> control can be used to
dynamically display rotating ads on a page.

1. ASP.NET Web Forms provide an easy and powerful way to build dynamic Web UI.
2. ASP.NET Web Forms pages can target any browser client (there are no script library
or cookie requirements).
3. ASP.NET Web Forms pages provide syntax compatibility with existing ASP pages.
4. ASP.NET server controls provide an easy way to encapsulate common functionality.
5. ASP.NET ships with 45 built-in server controls. Developers can also use controls
built by third parties.

42
Department of Computer Science Aks University Satna

6. ASP.NET server controls can automatically project both up level and down level
HTML.
7. ASP.NET templates provide an easy way to customize the look and feel of list server
controls.
8. ASP.NET validation controls provide an easy way to do declarative client or server
data validation.

HTML
The hypertext markup language (HTML) is a simple markup language. Used to create a
hypertext documents that are portable from one platform to another HTML documents are
SGML (Standard generalized mark up language) documents with generic semantics that are
appropriate for representing information from a wide range of applications. This specification
defines HTML version 3.2. HTML 3.2 aims to capture recommended practice as of early ’96 and
as such a replacement for HTML2.0 (RFC 1866).
A set of instructions embedded in a document is called mark up language. These
instructions describe what the document text means and how it should look like in a display.
Hyper Text Mark Up language (HTML) is the language used to encode World Wide Web
documents.

WHY TO USE HTML?

Website is a collection of pages, publications, and documents that reside on web server.
While these pages publications and a document as a formatted in a single format, you should
use HTML for home page and all primary pages in the site. This will enable the millions of web
users can easily access and to take advantage of your website.
HTML is considered first for formatting any new material you plan to publish on the web.
HTML documents are platform independent, meaning that they don’t confirm to any standard. If
they are created properly you can move home page to any server platform or you can access
them with any complaint www browser.
STRUCTURE OF HTML
HTML elements perform a defined task. HTML uses two types of elements

. Empty Tags
. Container Tags

43
Department of Computer Science Aks University Satna

These tags differ because of what they represent. Empty tags represent formatting
constricts such as line breaks and horizontal rules. Container tags define a section of text,
formats and dot all of the selected text. A container tag has both a beginning and an ending.

HTML LAYOUT:
An HTML document consists of text, which comprises the content of the
document and tags, which, defines the structure, and appearance of the document. The
structure of an HTML document is simple, consists of outer.
<HTML>tag enclosing the document header and body
<HTML>
<HEAD>
<TITLE>the title of HTML document</TITLE>
</HEAD>
<BODY>
This is where the actual HTML documents
Text lies, which is displayed in the browser
</BODY>
</HTML>

Each document has a head and body delimited by the <HEAD> and <BODY> tag. The
head is where you give your HTML document a title and where you indicate other
parameters the browser may use when displaying the document. This includes the text
for displaying the text. Tag also references special and indicates the hot spots that link
your document to other documents.

HTML FORMS:

Creating a form usually involves two independent steps: Creating the layout for
the form itself and then writing a script program on the server side to process the
formation you get back from a form.

44
Department of Computer Science Aks University Satna

To create a form, You use the <FORM> tag. Inside the opening and closing
FORM tags are each of the individual form elements plus any other HTML content to
create a layout for that form.

The opening tag of the FORM element usually includes the attributes: METHOD
and ACTION. The METHOD attributes can be either GET or POST which determines
how your form data is sent to the script to process it.

The ACTION attribute is a pointer to the script that processes the form on the server
side. The ACTION can be included by a relative path or by a full URL to a script on your server
or somewhere else. For example, the following <FORM> tag would call a script called form-
name in cgi-bin directory on server www.myservser.com

<FORM Method= post action=http://www.mytservser.com/cgi-bin/form-name.pl>


……………….
</FORM>

METHOD ATTRIBUTE:

The other required attribute for the <form> tag sets the methods by
which the browser form’s data to the server for processing. There are two
ways: the POST method and GET method. With POST method, the browser
sends the data in two steps: the browser first contacts the form-processing
server specified in the action attributes, and once contact is made, sends the
data

45
Department of Computer Science Aks University Satna

Microsoft SQL Server 2000

Microsoft SQL Server is a Structured Query Language (SQL) based,


client/server relational database. Each of these terms describes a fundamental
part of the architecture of SQL Server.

Database
A database is similar to a data file in that it is a storage place for data. Like a data file, a
database does not present information directly to a user; the user runs an application that
accesses data from the database and presents it to the user in an understandable format.

A database typically has two components: the files holding the physical
database and the database management system (DBMS) software that
applications use to access data. The DBMS is responsible for enforcing the
database structure, including:

• Maintaining the relationships between data in the database.


• Ensuring that data is stored correctly and that the rules defining data relationships
are not violated.
• Recovering all data to a point of known consistency in case of system failures.

Relational Database
There are different ways to organize data in a database but relational databases are
one of the most effective. Relational database systems are an application of mathematical
set theory to the problem of effectively organizing data. In a relational database, data is
collected into tables (called relations in relational theory).

46
Department of Computer Science Aks University Satna

When organizing data into tables, you can usually find many different ways to define
tables. Relational database theory defines a process, normalization, which ensures that the
set of tables you define will organize your data effectively.

Client/Server:-
In a client/server system, the server is a relatively large computer in a central
location that manages a resource used by many people. When individuals need to use the
resource, they connect over the network from their computers, or clients, to the server.
Examples of servers are: In a client/server database architecture, the database files
and DBMS software reside on a server. A communications component is provided so
applications can run on separate clients and communicate to the database server over a
network. The SQL Server communication component also allows communication between
an application running on the server and SQL Server.

Server applications are usually capable of working with several clients


at the same time. SQL Server can work with thousands of client applications
simultaneously. The server has features to prevent the logical problems that
occur if a user tries to read or modify data currently being used by others.

While SQL Server is designed to work as a server in a client/server


network, it is also capable of working as a stand-alone database directly on
the client. The scalability and ease-of-use features of SQL Server allow it to
work efficiently on a client without consuming too many resources.

Structured Query Language (SQL)


To work with data in a database, you must use a set of commands and statements
(language) defined by the DBMS software. There are several different languages that can
be used with relational databases; the most common is SQL. Both the American National
Standards Institute (ANSI) and the International Standards Organization (ISO) have defined
standards for SQL. Most modern DBMS products support the Entry Level of SQL-92, the
latest SQL standard (published in 1992).

47
Department of Computer Science Aks University Satna

SQL Server Features


Microsoft SQL Server supports a set of features that result in the following benefits:

Ease of installation, deployment, and use


SQL Server includes a set of administrative and development tools that improve your ability
to install, deploy, manage, and use SQL Server across several sites.

Scalability
The same database engine can be used across platforms ranging from laptop computers
running Microsoft Windows® 95/98 to large, multiprocessor servers running Microsoft
Windows NT®, Enterprise Edition.

Data warehousing
SQL Server includes tools for extracting and analyzing summary data for online analytical
processing (OLAP). SQL Server also includes tools for visually designing databases and
analyzing data using English-based questions.

System integration with other server software


SQL Server integrates with e-mail, the Internet, and Windows.

Databases
A database in Microsoft SQL Server consists of a collection of tables that contain
data, and other objects, such as views, indexes, stored procedures, and triggers,
defined to support activities performed with the data. The data stored in a database
is usually related to a particular subject or process, such as inventory information for
a manufacturing warehouse.

SQL Server can support many databases, and each database can store either interrelated
data or data unrelated to that in the other databases. For example, a server can have one
database that stores personnel data and another that stores product-related data.
Alternatively, one database can store current customer order data, and another; related
database can store historical customer orders that are used for yearly reporting. Before you
create a database, it is

48
Department of Computer Science Aks University Satna

important to understand the parts of a database and how to design these parts to ensure
that the database performs well after it is implemented.

Normalization theory:
Relations are to be normalized to avoid anomalies. In insert, update and delete operations.
Normalization theory is built around the concept of normal forms. A relation is said to be in a
particular form if it satisfies a certain specified set if constraints. To decide a suitable logical
structure for given database design the concept of normalization, which are briefly described
below.

1. 1 st Normal Form (1 N.F): A relation is said to be in 1 NF is and only if all unaligned


domains contain values only. That is the fields of an n-set should have no group
items and no repeating groups.
2. 2 nd Normal Form (2 N.F) : A relation is said to be in 2 NF is and only if it is in 1 NF
and every non key attribute is fully dependent on primary key. This normal takes care
of functional dependencies on non-key attributes.
3. 3 rd Normal Form (3 N.F) : A relation is said to be in 3 NF is and only if it is in 2 NF
and every non key attribute is non transitively dependent on the primary key. This
normal form avoids the transitive dependencies on the primary key.
4. Boyce code Normal Form (BCNF) : This is a stronger definition than that of
NF. A relation is said to be in BCNF if and only if every determinant is a
Candidate key.
5. 4 th Normal Form (4 NF) : A relation is said to be in 4 NF if and only if whenever there
exists a multi valued dependency in a relation say A->->B then all of the relation are
also functionally dependent on A(i.e. A->X for all attributes x of the relation.).
6. 5 th Normal Form (5 NF) OR Projection Join Normal Form (PJNF): A relation
R is in 5 NF .if and only if every join dependency in R is implied by the
candidate key on R . A relation can’t be non-loss split into two tables but can
be split into three tables. This is called Join Dependency.

49
Department of Computer Science Aks University Satna

C# Language

C# (pronounced C Sharp) is a multi-paradigm programming language that encompasses


functional, imperative, generic, object-oriented (class-based), and component-oriented
programming disciplines. It was developed by Microsoft as part of the .NET initiative and later
approved as a standard by ECMA (ECMA-334) and ISO (ISO/IEC 23270). C# is one of the 44
programming languages supported by the .NET Framework's Common Language Runtime.

C# is intended to be a simple, modern, general-purpose, object-oriented programming


language. Anders Hejlsberg, the designer of Delphi, leads the team which is developing C#. It
has an object-oriented syntax based on C++ and is heavily influenced by other programming
languages such as Delphi and Java. It was initially named Cool, which stood for "C like Object
Oriented Language". However, in July 2000, when Microsoft made the project public, the name
of the programming language was given as C#. The most recent version of the language is C#
3.0 which was released in conjunction with the .NET Framework 3.5 in 2007. The next proposed
version, C# 4.0, is in development.

History:-

In 1996, Sun Microsystems released the Java programming language with Microsoft soon
purchasing a license to implement it in their operating system. Java was originally meant to be a
platform independent language, but Microsoft, in their implementation, broke their license
agreement and made a few changes that would essentially inhibit Java's platform-independent
capabilities. Sun filed a lawsuit and Microsoft settled, deciding to create their own version of a
partially compiled, partially interpreted object-oriented programming language with syntax
closely related to that of C++.

During the development of .NET, the class libraries were originally written in a
language/compiler called Simple Managed C (SMC). In January 1999, Anders Hejlsberg formed
a team to build a new language at the time called Cool, which stood for "C like Object Oriented
Language".Microsoft had considered keeping the name "Cool" as the final name of the
language, but chose not to do so for trademark reasons. By the time the .NET project was
publicly announced at the July 2000 Professional Developers Conference, the language had

50
Department of Computer Science Aks University Satna

been renamed C#, and the class libraries and ASP.NET runtime had been ported to C#.

C#'s principal designer and lead architect at Microsoft is Anders Hejlsberg, who was previously
involved with the design of Visual J++, Borland Delphi, and Turbo Pascal. In interviews and
technical papers he has stated that flaws in most major programming languages (e.g. C++,
Java, Delphi, and Smalltalk) drove the fundamentals of the Common Language Runtime (CLR),
which, in turn, drove the design of the C# programming language itself. Some argue that C#
shares roots in other languages.

Features of C#:-

By design, C# is the programming language that most directly reflects the


underlying Common Language Infrastructure (CLI). Most of C#'s intrinsic types
correspond to value-types implemented by the CLI framework. However, the C#
language specification does not state the code generation requirements of the
compiler: that is, it does not state that a C# compiler must target a Common
Language Runtime (CLR), or generate Common Intermediate Language (CIL), or
generate any other specific format. Theoretically, a C# compiler could generate
machine code like traditional compilers of C++ or FORTRAN; in practice, all
existing C# implementations target CIL.

Some notable C# distinguishing features are:

• There are no global variables or functions. All methods and members must be declared
within classes. It is possible, however, to use static methods/variables within public
classes instead of global variables/functions.
• Local variables cannot shadow variables of the enclosing block, unlike C and C++.
Variable shadowing is often considered confusing by C++ texts.
• C# supports a strict Boolean data type, bool. Statements that take conditions, such as
while and if, require an expression of a boolean type. While C++ also has a boolean
type, it can be freely converted to and from integers, and expressions such as if(a)
require only that a is convertible to bool, allowing a to be an int, or a pointer. C#
disallows this "integer meaning true or false" approach on the grounds that forcing
programmers to use expressions that return exactly bool can prevent certain types of
programming mistakes such as if (a = b) (use of = instead of ==).
• In C#, memory address pointers can only be used within blocks specifically marked as
unsafe, and programs with unsafe code need appropriate permissions to run. Most
object access is done through safe object references, which are always either pointing to
a valid, existing object, or have the well-defined null value; a reference to a garbage-
collected object, or to random block of memory, is impossible to obtain. An unsafe
pointer can point to an instance of a value-type, array, string, or a block of memory
allocated on a stack. Code that is not marked as unsafe can still store and manipulate
pointers through the System.IntPtr type, but cannot dereference them.

51
Department of Computer Science Aks University Satna

• Managed memory cannot be explicitly freed, but is automatically garbage collected.


Garbage collection addresses memory leaks. C# also provides direct support for
deterministic finalization with the using statement (supporting the Resource Acquisition
Is Initialization idiom).
• Multiple inheritance is not supported, although a class can implement any number of
interfaces. This was a design decision by the language's lead architect to avoid
complication, avoid dependency hell and simplify architectural requirements throughout
CLI.
• C# is more type safe than C++. The only implicit conversions by default are those which
are considered safe, such as widening of integers and conversion from a derived type to
a base type. This is enforced at compile-time, during JIT, and, in some cases, at
runtime. There are no implicit conversions between booleans and integers, nor between
enumeration members and integers (except for literal 0, which can be implicitly
converted to any enumerated type). Any user-defined conversion must be explicitly
marked as explicit or implicit, unlike C++ copy constructors (which are implicit by default)
and conversion operators (which are always implicit).
• Enumeration members are placed in their own scope.
• C# provides syntactic sugar for a common pattern of a pair of methods, accessor (getter)
and mutator (setter) encapsulating operations on a single attribute of a class, in form of
properties.
• Full type reflection and discovery is available.
• C# currently (as of 3 June 2008) has 77 reserved words.

Common Type system (CTS)

C# has a unified type system. This unified type system is called Common Type
System (CTS).

A unified type system implies that all types, including primitives such as integers,
are subclasses of the System.Object class. For example, every type inherits a
ToString() method. For performance reasons, primitive types (and value types in
general) are internally allocated on the stack.

Categories of datatypes

CTS separates datatypes into two categories:

• Value types
• Reference types

Value types are plain aggregations of data. Instances of value types do not have
referential identity nor a referential comparison semantics - equality and
inequality comparisons for value types compare the actual data values within the
instances, unless the corresponding operators are overloaded. Value types are
derived from System.ValueType, always have a default value, and can always be
created and copied. Some other limitations on value types are that they cannot
derive from each other (but can implement interfaces) and cannot have a default
(parameterless) constructor. Examples of value types are some primitive types,

52
Department of Computer Science Aks University Satna

such as int (a signed 32-bit integer), float (a 32-bit IEEE floating-point number),
char (a 16-bit Unicode codepoint), and System.DateTime (identifies a specific point
in time with millisecond precision).

In contrast, reference types have the notion of referential identity - each instance
of reference type is inherently distinct from every other instance, even if the data
within both instances is the same. This is reflected in default equality and
inequality comparisons for reference types, which test for referential rather than
structural equality, unless the corresponding operators are overloaded (such as
the case for System.String). In general, it is not always possible to create an
instance of a reference type, nor to copy an existing instance, or perform a value
comparison on two existing instances, though specific reference types can
provide such services by exposing a public constructor or implementing a
corresponding interface (such as ICloneable or IComparable). Examples of
reference types are object (the ultimate base class for all other C# classes),
System.String (a string of Unicode characters), and System.Array (a base class for
all C# arrays).

Both type categories are extensible with user-defined types.

Boxing and unboxing

Boxing is the operation of converting a value of a value type into a value of a


corresponding reference type.

Example:

int foo = 42; // Value type...


object bar = foo; // foo is boxed to bar.

Unboxing is the operation of converting a value of a reference type (previously


boxed) into a value of a value type.

Example:

int foo = 42; // Value type.


object bar = foo; // foo is boxed to bar.
int foo2 = (int)bar; // Unboxed back to value type.

53
Department of Computer Science Aks University Satna

Coding Of Project
Some Java script coding

(function (global, factory) {


typeof exports === 'object' && typeof module !== 'undefined' ? factory(exports,
require('jquery')) :
typeof define === 'function' && define.amd ? define(['exports', 'jquery'], factory) :
(global = global || self, factory(global.bootstrap = {}, global.jQuery));
}(this, (function (exports, $) { 'use strict';

$ = $ && Object.prototype.hasOwnProperty.call($, 'default') ? $['default'] : $;

function _defineProperties(target, props) {


for (var i = 0; i < props.length; i++) {
var descriptor = props[i];
descriptor.enumerable = descriptor.enumerable || false;
descriptor.configurable = true;
if ("value" in descriptor) descriptor.writable = true;
Object.defineProperty(target, descriptor.key, descriptor);
}
}

function _createClass(Constructor, protoProps, staticProps) {


if (protoProps) _defineProperties(Constructor.prototype, protoProps);
if (staticProps) _defineProperties(Constructor, staticProps);
return Constructor;
}

function _defineProperty(obj, key, value) {


if (key in obj) {
Object.defineProperty(obj, key, {
value: value,
enumerable: true,
configurable: true,
writable: true
});
} else {
obj[key] = value;
}

return obj;

54
Department of Computer Science Aks University Satna

function ownKeys(object, enumerableOnly) {


var keys = Object.keys(object);

if (Object.getOwnPropertySymbols) {
var symbols = Object.getOwnPropertySymbols(object);
if (enumerableOnly) symbols = symbols.filter(function (sym) {
return Object.getOwnPropertyDescriptor(object, sym).enumerable;
});
keys.push.apply(keys, symbols);
}

return keys;
}

function _objectSpread2(target) {
for (var i = 1; i < arguments.length; i++) {
var source = arguments[i] != null ? arguments[i] : {};

if (i % 2) {
ownKeys(Object(source), true).forEach(function (key) {
_defineProperty(target, key, source[key]);
});
} else if (Object.getOwnPropertyDescriptors) {
Object.defineProperties(target, Object.getOwnPropertyDescriptors(source));
} else {
ownKeys(Object(source)).forEach(function (key) {
Object.defineProperty(target, key, Object.getOwnPropertyDescriptor(source,
key));
});
}
}

return target;
}

function _inheritsLoose(subClass, superClass) {


subClass.prototype = Object.create(superClass.prototype);
subClass.prototype.constructor = subClass;
subClass.__proto__ = superClass;
}

/**
* --------------------------------------------------------------------------
* Bootstrap (v4.5.0): util.js
* Licensed under MIT (https://github.com/twbs/bootstrap/blob/master/LICENSE)
* --------------------------------------------------------------------------
*/
/**
* ------------------------------------------------------------------------
* Private TransitionEnd Helpers
* ------------------------------------------------------------------------
*/

var TRANSITION_END = 'transitionend';


var MAX_UID = 1000000;
var MILLISECONDS_MULTIPLIER = 1000; // Shoutout AngusCroll (https://goo.gl/pxwQGp)

55
Department of Computer Science Aks University Satna

function toType(obj) {
if (obj === null || typeof obj === 'undefined') {
return "" + obj;
}

return {}.toString.call(obj).match(/\s([a-z]+)/i)[1].toLowerCase();
}

function getSpecialTransitionEndEvent() {
return {
bindType: TRANSITION_END,
delegateType: TRANSITION_END,
handle: function handle(event) {
if ($(event.target).is(this)) {
return event.handleObj.handler.apply(this, arguments); // eslint-disable-line
prefer-rest-params
}

return undefined;
}
};
}

function transitionEndEmulator(duration) {
var _this = this;

var called = false;


$(this).one(Util.TRANSITION_END, function () {
called = true;
});
setTimeout(function () {
if (!called) {
Util.triggerTransitionEnd(_this);
}
}, duration);
return this;
}

function setTransitionEndSupport() {
$.fn.emulateTransitionEnd = transitionEndEmulator;
$.event.special[Util.TRANSITION_END] = getSpecialTransitionEndEvent();
}
/**
* --------------------------------------------------------------------------
* Public Util Api
* --------------------------------------------------------------------------
*/

var Util = {
TRANSITION_END: 'bsTransitionEnd',
getUID: function getUID(prefix) {
do {
// eslint-disable-next-line no-bitwise
prefix += ~~(Math.random() * MAX_UID); // "~~" acts like a faster Math.floor()
here
} while (document.getElementById(prefix));

56
Department of Computer Science Aks University Satna

return prefix;
},
getSelectorFromElement: function getSelectorFromElement(element) {
var selector = element.getAttribute('data-target');

if (!selector || selector === '#') {


var hrefAttr = element.getAttribute('href');
selector = hrefAttr && hrefAttr !== '#' ? hrefAttr.trim() : '';
}

try {
return document.querySelector(selector) ? selector : null;
} catch (err) {
return null;
}
},
getTransitionDurationFromElement: function getTransitionDurationFromElement(element)
{
if (!element) {
return 0;
} // Get transition-duration of the element

var transitionDuration = $(element).css('transition-duration');


var transitionDelay = $(element).css('transition-delay');
var floatTransitionDuration = parseFloat(transitionDuration);
var floatTransitionDelay = parseFloat(transitionDelay); // Return 0 if element or
transition duration is not found

if (!floatTransitionDuration && !floatTransitionDelay) {


return 0;
} // If multiple durations are defined, take the first

transitionDuration = transitionDuration.split(',')[0];
transitionDelay = transitionDelay.split(',')[0];
return (parseFloat(transitionDuration) + parseFloat(transitionDelay)) *
MILLISECONDS_MULTIPLIER;
},
reflow: function reflow(element) {
return element.offsetHeight;
},
triggerTransitionEnd: function triggerTransitionEnd(element) {
$(element).trigger(TRANSITION_END);
},
// TODO: Remove in v5
supportsTransitionEnd: function supportsTransitionEnd() {
return Boolean(TRANSITION_END);
},
isElement: function isElement(obj) {
return (obj[0] || obj).nodeType;
},
typeCheckConfig: function typeCheckConfig(componentName, config, configTypes) {
for (var property in configTypes) {
if (Object.prototype.hasOwnProperty.call(configTypes, property)) {
var expectedTypes = configTypes[property];
var value = config[property];

57
Department of Computer Science Aks University Satna

var valueType = value && Util.isElement(value) ? 'element' : toType(value);

if (!new RegExp(expectedTypes).test(valueType)) {
throw new Error(componentName.toUpperCase() + ": " + ("Option \"" + property
+ "\" provided type \"" + valueType + "\" ") + ("but expected type \"" + expectedTypes +
"\"."));
}
}
}
},
findShadowRoot: function findShadowRoot(element) {
if (!document.documentElement.attachShadow) {
return null;
} // Can find the shadow root otherwise it'll return the document

if (typeof element.getRootNode === 'function') {


var root = element.getRootNode();
return root instanceof ShadowRoot ? root : null;
}

if (element instanceof ShadowRoot) {


return element;
} // when we don't find a shadow root

if (!element.parentNode) {
return null;
}

return Util.findShadowRoot(element.parentNode);
},
jQueryDetection: function jQueryDetection() {
if (typeof $ === 'undefined') {
throw new TypeError('Bootstrap\'s JavaScript requires jQuery. jQuery must be
included before Bootstrap\'s JavaScript.');
}

var version = $.fn.jquery.split(' ')[0].split('.');


var minMajor = 1;
var ltMajor = 2;
var minMinor = 9;
var minPatch = 1;
var maxMajor = 4;

if (version[0] < ltMajor && version[1] < minMinor || version[0] === minMajor &&
version[1] === minMinor && version[2] < minPatch || version[0] >= maxMajor) {
throw new Error('Bootstrap\'s JavaScript requires at least jQuery v1.9.1 but less
than v4.0.0');
}
}
};
Util.jQueryDetection();
setTransitionEndSupport();

/**
* ------------------------------------------------------------------------
* Constants

58
Department of Computer Science Aks University Satna

* ------------------------------------------------------------------------
*/

var NAME = 'alert';


var VERSION = '4.5.0';
var DATA_KEY = 'bs.alert';
var EVENT_KEY = "." + DATA_KEY;
var DATA_API_KEY = '.data-api';
var JQUERY_NO_CONFLICT = $.fn[NAME];
var SELECTOR_DISMISS = '[data-dismiss="alert"]';
var EVENT_CLOSE = "close" + EVENT_KEY;
var EVENT_CLOSED = "closed" + EVENT_KEY;
var EVENT_CLICK_DATA_API = "click" + EVENT_KEY + DATA_API_KEY;
var CLASS_NAME_ALERT = 'alert';
var CLASS_NAME_FADE = 'fade';
var CLASS_NAME_SHOW = 'show';
/**
* ------------------------------------------------------------------------
* Class Definition
* ------------------------------------------------------------------------
*/

var Alert = /*#__PURE__*/function () {


function Alert(element) {
this._element = element;
} // Getters

var _proto = Alert.prototype;

// Public
_proto.close = function close(element) {
var rootElement = this._element;

if (element) {
rootElement = this._getRootElement(element);
}

var customEvent = this._triggerCloseEvent(rootElement);

if (customEvent.isDefaultPrevented()) {
return;
}

this._removeElement(rootElement);
};

_proto.dispose = function dispose() {


$.removeData(this._element, DATA_KEY);
this._element = null;
} // Private
;

_proto._getRootElement = function _getRootElement(element) {


var selector = Util.getSelectorFromElement(element);
var parent = false;

if (selector) {

59
Department of Computer Science Aks University Satna

parent = document.querySelector(selector);
}

if (!parent) {
parent = $(element).closest("." + CLASS_NAME_ALERT)[0];
}

return parent;
};

_proto._triggerCloseEvent = function _triggerCloseEvent(element) {


var closeEvent = $.Event(EVENT_CLOSE);
$(element).trigger(closeEvent);
return closeEvent;
};

_proto._removeElement = function _removeElement(element) {


var _this = this;

$(element).removeClass(CLASS_NAME_SHOW);

if (!$(element).hasClass(CLASS_NAME_FADE)) {
this._destroyElement(element);

return;
}

var transitionDuration = Util.getTransitionDurationFromElement(element);


$(element).one(Util.TRANSITION_END, function (event) {
return _this._destroyElement(element, event);
}).emulateTransitionEnd(transitionDuration);
};

_proto._destroyElement = function _destroyElement(element) {


$(element).detach().trigger(EVENT_CLOSED).remove();
} // Static
;

Alert._jQueryInterface = function _jQueryInterface(config) {


return this.each(function () {
var $element = $(this);
var data = $element.data(DATA_KEY);

if (!data) {
data = new Alert(this);
$element.data(DATA_KEY, data);
}

if (config === 'close') {


data[config](this);
}
});
};

Alert._handleDismiss = function _handleDismiss(alertInstance) {


return function (event) {
if (event) {
event.preventDefault();

60
Department of Computer Science Aks University Satna

alertInstance.close(this);
};
};

_createClass(Alert, null, [{
key: "VERSION",
get: function get() {
return VERSION;
}
}]);

return Alert;
}();
/**
* ------------------------------------------------------------------------
* Data Api implementation
* ------------------------------------------------------------------------
*/

$(document).on(EVENT_CLICK_DATA_API, SELECTOR_DISMISS, Alert._handleDismiss(new


Alert()));
/**
* ------------------------------------------------------------------------
* jQuery
* ------------------------------------------------------------------------
*/

$.fn[NAME] = Alert._jQueryInterface;
$.fn[NAME].Constructor = Alert;

$.fn[NAME].noConflict = function () {
$.fn[NAME] = JQUERY_NO_CONFLICT;
return Alert._jQueryInterface;
};

/**
* ------------------------------------------------------------------------
* Constants
* ------------------------------------------------------------------------
*/

var NAME$1 = 'button';


var VERSION$1 = '4.5.0';
var DATA_KEY$1 = 'bs.button';
var EVENT_KEY$1 = "." + DATA_KEY$1;
var DATA_API_KEY$1 = '.data-api';
var JQUERY_NO_CONFLICT$1 = $.fn[NAME$1];
var CLASS_NAME_ACTIVE = 'active';
var CLASS_NAME_BUTTON = 'btn';
var CLASS_NAME_FOCUS = 'focus';
var SELECTOR_DATA_TOGGLE_CARROT = '[data-toggle^="button"]';
var SELECTOR_DATA_TOGGLES = '[data-toggle="buttons"]';
var SELECTOR_DATA_TOGGLE = '[data-toggle="button"]';
var SELECTOR_DATA_TOGGLES_BUTTONS = '[data-toggle="buttons"] .btn';
var SELECTOR_INPUT = 'input:not([type="hidden"])';

61
Department of Computer Science Aks University Satna

var SELECTOR_ACTIVE = '.active';


var SELECTOR_BUTTON = '.btn';
var EVENT_CLICK_DATA_API$1 = "click" + EVENT_KEY$1 + DATA_API_KEY$1;
var EVENT_FOCUS_BLUR_DATA_API = "focus" + EVENT_KEY$1 + DATA_API_KEY$1 + " " + ("blur"
+ EVENT_KEY$1 + DATA_API_KEY$1);
var EVENT_LOAD_DATA_API = "load" + EVENT_KEY$1 + DATA_API_KEY$1;
/**
* ------------------------------------------------------------------------
* Class Definition
* ------------------------------------------------------------------------
*/

var Button = /*#__PURE__*/function () {


function Button(element) {
this._element = element;
} // Getters

var _proto = Button.prototype;

// Public
_proto.toggle = function toggle() {
var triggerChangeEvent = true;
var addAriaPressed = true;
var rootElement = $(this._element).closest(SELECTOR_DATA_TOGGLES)[0];

if (rootElement) {
var input = this._element.querySelector(SELECTOR_INPUT);

if (input) {
if (input.type === 'radio') {
if (input.checked && this._element.classList.contains(CLASS_NAME_ACTIVE)) {
triggerChangeEvent = false;
} else {
var activeElement = rootElement.querySelector(SELECTOR_ACTIVE);

if (activeElement) {
$(activeElement).removeClass(CLASS_NAME_ACTIVE);
}
}
}

if (triggerChangeEvent) {
// if it's not a radio button or checkbox don't add a pointless/invalid
checked property to the input
if (input.type === 'checkbox' || input.type === 'radio') {
input.checked = !this._element.classList.contains(CLASS_NAME_ACTIVE);
}

$(input).trigger('change');
}

input.focus();
addAriaPressed = false;
}
}

62
Department of Computer Science Aks University Satna

if (!(this._element.hasAttribute('disabled') ||
this._element.classList.contains('disabled'))) {
if (addAriaPressed) {
this._element.setAttribute('aria-pressed',
!this._element.classList.contains(CLASS_NAME_ACTIVE));
}

if (triggerChangeEvent) {
$(this._element).toggleClass(CLASS_NAME_ACTIVE);
}
}
};

_proto.dispose = function dispose() {


$.removeData(this._element, DATA_KEY$1);
this._element = null;
} // Static
;

Button._jQueryInterface = function _jQueryInterface(config) {


return this.each(function () {
var data = $(this).data(DATA_KEY$1);

if (!data) {
data = new Button(this);
$(this).data(DATA_KEY$1, data);
}

if (config === 'toggle') {


data[config]();
}
});
};

_createClass(Button, null, [{
key: "VERSION",
get: function get() {
return VERSION$1;
}
}]);

return Button;
}();
/**
* ------------------------------------------------------------------------
* Data Api implementation
* ------------------------------------------------------------------------
*/

$(document).on(EVENT_CLICK_DATA_API$1, SELECTOR_DATA_TOGGLE_CARROT, function (event) {


var button = event.target;
var initialButton = button;

if (!$(button).hasClass(CLASS_NAME_BUTTON)) {
button = $(button).closest(SELECTOR_BUTTON)[0];
}

63
Department of Computer Science Aks University Satna

if (!button || button.hasAttribute('disabled') ||
button.classList.contains('disabled')) {
event.preventDefault(); // work around Firefox bug #1540995
} else {
var inputBtn = button.querySelector(SELECTOR_INPUT);

if (inputBtn && (inputBtn.hasAttribute('disabled') ||


inputBtn.classList.contains('disabled'))) {
event.preventDefault(); // work around Firefox bug #1540995

return;
}

if (initialButton.tagName === 'LABEL' && inputBtn && inputBtn.type === 'checkbox')


{
event.preventDefault(); // work around event sent to label and input
}

Button._jQueryInterface.call($(button), 'toggle');
}
}).on(EVENT_FOCUS_BLUR_DATA_API, SELECTOR_DATA_TOGGLE_CARROT, function (event) {
var button = $(event.target).closest(SELECTOR_BUTTON)[0];
$(button).toggleClass(CLASS_NAME_FOCUS, /^focus(in)?$/.test(event.type));
});
$(window).on(EVENT_LOAD_DATA_API, function () {
// ensure correct active class is set to match the controls' actual values/states
// find all checkboxes/readio buttons inside data-toggle groups
var buttons =
[].slice.call(document.querySelectorAll(SELECTOR_DATA_TOGGLES_BUTTONS));

for (var i = 0, len = buttons.length; i < len; i++) {


var button = buttons[i];
var input = button.querySelector(SELECTOR_INPUT);

if (input.checked || input.hasAttribute('checked')) {
button.classList.add(CLASS_NAME_ACTIVE);
} else {
button.classList.remove(CLASS_NAME_ACTIVE);
}
} // find all button toggles

buttons = [].slice.call(document.querySelectorAll(SELECTOR_DATA_TOGGLE));

for (var _i = 0, _len = buttons.length; _i < _len; _i++) {


var _button = buttons[_i];

if (_button.getAttribute('aria-pressed') === 'true') {


_button.classList.add(CLASS_NAME_ACTIVE);
} else {
_button.classList.remove(CLASS_NAME_ACTIVE);
}
}
});
/**
* ------------------------------------------------------------------------
* jQuery
* ------------------------------------------------------------------------

64
Department of Computer Science Aks University Satna

*/

$.fn[NAME$1] = Button._jQueryInterface;
$.fn[NAME$1].Constructor = Button;

$.fn[NAME$1].noConflict = function () {
$.fn[NAME$1] = JQUERY_NO_CONFLICT$1;
return Button._jQueryInterface;
};

/**
* ------------------------------------------------------------------------
* Constants
* ------------------------------------------------------------------------
*/

var NAME$2 = 'carousel';


var VERSION$2 = '4.5.0';
var DATA_KEY$2 = 'bs.carousel';
var EVENT_KEY$2 = "." + DATA_KEY$2;
var DATA_API_KEY$2 = '.data-api';
var JQUERY_NO_CONFLICT$2 = $.fn[NAME$2];
var ARROW_LEFT_KEYCODE = 37; // KeyboardEvent.which value for left arrow key

var ARROW_RIGHT_KEYCODE = 39; // KeyboardEvent.which value for right arrow key

var TOUCHEVENT_COMPAT_WAIT = 500; // Time for mouse compat events to fire after touch

var SWIPE_THRESHOLD = 40;


var Default = {
interval: 5000,
keyboard: true,
slide: false,
pause: 'hover',
wrap: true,
touch: true
};
var DefaultType = {
interval: '(number|boolean)',
keyboard: 'boolean',
slide: '(boolean|string)',
pause: '(string|boolean)',
wrap: 'boolean',
touch: 'boolean'
};
var DIRECTION_NEXT = 'next';
var DIRECTION_PREV = 'prev';
var DIRECTION_LEFT = 'left';
var DIRECTION_RIGHT = 'right';
var EVENT_SLIDE = "slide" + EVENT_KEY$2;
var EVENT_SLID = "slid" + EVENT_KEY$2;
var EVENT_KEYDOWN = "keydown" + EVENT_KEY$2;
var EVENT_MOUSEENTER = "mouseenter" + EVENT_KEY$2;
var EVENT_MOUSELEAVE = "mouseleave" + EVENT_KEY$2;
var EVENT_TOUCHSTART = "touchstart" + EVENT_KEY$2;
var EVENT_TOUCHMOVE = "touchmove" + EVENT_KEY$2;
var EVENT_TOUCHEND = "touchend" + EVENT_KEY$2;
var EVENT_POINTERDOWN = "pointerdown" + EVENT_KEY$2;

65
Department of Computer Science Aks University Satna

var EVENT_POINTERUP = "pointerup" + EVENT_KEY$2;


var EVENT_DRAG_START = "dragstart" + EVENT_KEY$2;
var EVENT_LOAD_DATA_API$1 = "load" + EVENT_KEY$2 + DATA_API_KEY$2;
var EVENT_CLICK_DATA_API$2 = "click" + EVENT_KEY$2 + DATA_API_KEY$2;
var CLASS_NAME_CAROUSEL = 'carousel';
var CLASS_NAME_ACTIVE$1 = 'active';
var CLASS_NAME_SLIDE = 'slide';
var CLASS_NAME_RIGHT = 'carousel-item-right';
var CLASS_NAME_LEFT = 'carousel-item-left';
var CLASS_NAME_NEXT = 'carousel-item-next';
var CLASS_NAME_PREV = 'carousel-item-prev';
var CLASS_NAME_POINTER_EVENT = 'pointer-event';
var SELECTOR_ACTIVE$1 = '.active';
var SELECTOR_ACTIVE_ITEM = '.active.carousel-item';
var SELECTOR_ITEM = '.carousel-item';
var SELECTOR_ITEM_IMG = '.carousel-item img';
var SELECTOR_NEXT_PREV = '.carousel-item-next, .carousel-item-prev';
var SELECTOR_INDICATORS = '.carousel-indicators';
var SELECTOR_DATA_SLIDE = '[data-slide], [data-slide-to]';
var SELECTOR_DATA_RIDE = '[data-ride="carousel"]';
var PointerType = {
TOUCH: 'touch',
PEN: 'pen'
};
/**
* ------------------------------------------------------------------------
* Class Definition
* ------------------------------------------------------------------------
*/

var Carousel = /*#__PURE__*/function () {


function Carousel(element, config) {
this._items = null;
this._interval = null;
this._activeElement = null;
this._isPaused = false;
this._isSliding = false;
this.touchTimeout = null;
this.touchStartX = 0;
this.touchDeltaX = 0;
this._config = this._getConfig(config);
this._element = element;
this._indicatorsElement = this._element.querySelector(SELECTOR_INDICATORS);
this._touchSupported = 'ontouchstart' in document.documentElement ||
navigator.maxTouchPoints > 0;
this._pointerEvent = Boolean(window.PointerEvent || window.MSPointerEvent);

this._addEventListeners();
} // Getters

var _proto = Carousel.prototype;

// Public
_proto.next = function next() {
if (!this._isSliding) {
this._slide(DIRECTION_NEXT);
}

66
Department of Computer Science Aks University Satna

};

_proto.nextWhenVisible = function nextWhenVisible() {


// Don't call next when the page isn't visible
// or the carousel or its parent isn't visible
if (!document.hidden && $(this._element).is(':visible') &&
$(this._element).css('visibility') !== 'hidden') {
this.next();
}
};

_proto.prev = function prev() {


if (!this._isSliding) {
this._slide(DIRECTION_PREV);
}
};

_proto.pause = function pause(event) {


if (!event) {
this._isPaused = true;
}

if (this._element.querySelector(SELECTOR_NEXT_PREV)) {
Util.triggerTransitionEnd(this._element);
this.cycle(true);
}

clearInterval(this._interval);
this._interval = null;
};

_proto.cycle = function cycle(event) {


if (!event) {
this._isPaused = false;
}

if (this._interval) {
clearInterval(this._interval);
this._interval = null;
}

if (this._config.interval && !this._isPaused) {


this._interval = setInterval((document.visibilityState ? this.nextWhenVisible :
this.next).bind(this), this._config.interval);
}
};

_proto.to = function to(index) {


var _this = this;

this._activeElement = this._element.querySelector(SELECTOR_ACTIVE_ITEM);

var activeIndex = this._getItemIndex(this._activeElement);

if (index > this._items.length - 1 || index < 0) {


return;
}

67
Department of Computer Science Aks University Satna

if (this._isSliding) {
$(this._element).one(EVENT_SLID, function () {
return _this.to(index);
});
return;
}

if (activeIndex === index) {


this.pause();
this.cycle();
return;
}

var direction = index > activeIndex ? DIRECTION_NEXT : DIRECTION_PREV;

this._slide(direction, this._items[index]);
};

_proto.dispose = function dispose() {


$(this._element).off(EVENT_KEY$2);
$.removeData(this._element, DATA_KEY$2);
this._items = null;
this._config = null;
this._element = null;
this._interval = null;
this._isPaused = null;
this._isSliding = null;
this._activeElement = null;
this._indicatorsElement = null;
} // Private
;

_proto._getConfig = function _getConfig(config) {


config = _objectSpread2(_objectSpread2({}, Default), config);
Util.typeCheckConfig(NAME$2, config, DefaultType);
return config;
};

_proto._handleSwipe = function _handleSwipe() {


var absDeltax = Math.abs(this.touchDeltaX);

if (absDeltax <= SWIPE_THRESHOLD) {


return;
}

var direction = absDeltax / this.touchDeltaX;


this.touchDeltaX = 0; // swipe left

if (direction > 0) {
this.prev();
} // swipe right

if (direction < 0) {
this.next();
}
};

68
Department of Computer Science Aks University Satna

_proto._addEventListeners = function _addEventListeners() {


var _this2 = this;

if (this._config.keyboard) {
$(this._element).on(EVENT_KEYDOWN, function (event) {
return _this2._keydown(event);
});
}

if (this._config.pause === 'hover') {


$(this._element).on(EVENT_MOUSEENTER, function (event) {
return _this2.pause(event);
}).on(EVENT_MOUSELEAVE, function (event) {
return _this2.cycle(event);
});
}

if (this._config.touch) {
this._addTouchEventListeners();
}
};

_proto._addTouchEventListeners = function _addTouchEventListeners() {


var _this3 = this;

if (!this._touchSupported) {
return;
}

var start = function start(event) {


if (_this3._pointerEvent &&
PointerType[event.originalEvent.pointerType.toUpperCase()]) {
_this3.touchStartX = event.originalEvent.clientX;
} else if (!_this3._pointerEvent) {
_this3.touchStartX = event.originalEvent.touches[0].clientX;
}
};

var move = function move(event) {


// ensure swiping with one touch and not pinching
if (event.originalEvent.touches && event.originalEvent.touches.length > 1) {
_this3.touchDeltaX = 0;
} else {
_this3.touchDeltaX = event.originalEvent.touches[0].clientX -
_this3.touchStartX;
}
};

var end = function end(event) {


if (_this3._pointerEvent &&
PointerType[event.originalEvent.pointerType.toUpperCase()]) {
_this3.touchDeltaX = event.originalEvent.clientX - _this3.touchStartX;
}

_this3._handleSwipe();

if (_this3._config.pause === 'hover') {


// If it's a touch-enabled device, mouseenter/leave are fired as

69
Department of Computer Science Aks University Satna

// part of the mouse compatibility events on first tap - the carousel


// would stop cycling until user tapped out of it;
// here, we listen for touchend, explicitly pause the carousel
// (as if it's the second time we tap on it, mouseenter compat event
// is NOT fired) and after a timeout (to allow for mouse compatibility
// events to fire) we explicitly restart cycling
_this3.pause();

if (_this3.touchTimeout) {
clearTimeout(_this3.touchTimeout);
}

_this3.touchTimeout = setTimeout(function (event) {


return _this3.cycle(event);
}, TOUCHEVENT_COMPAT_WAIT + _this3._config.interval);
}
};

$(this._element.querySelectorAll(SELECTOR_ITEM_IMG)).on(EVENT_DRAG_START, function
(e) {
return e.preventDefault();
});

if (this._pointerEvent) {
$(this._element).on(EVENT_POINTERDOWN, function (event) {
return start(event);
});
$(this._element).on(EVENT_POINTERUP, function (event) {
return end(event);
});

this._element.classList.add(CLASS_NAME_POINTER_EVENT);
} else {
$(this._element).on(EVENT_TOUCHSTART, function (event) {
return start(event);
});
$(this._element).on(EVENT_TOUCHMOVE, function (event) {
return move(event);
});
$(this._element).on(EVENT_TOUCHEND, function (event) {
return end(event);
});
}
};

_proto._keydown = function _keydown(event) {


if (/input|textarea/i.test(event.target.tagName)) {
return;
}

switch (event.which) {
case ARROW_LEFT_KEYCODE:
event.preventDefault();
this.prev();
break;

case ARROW_RIGHT_KEYCODE:
event.preventDefault();

70
Department of Computer Science Aks University Satna

this.next();
break;
}
};

_proto._getItemIndex = function _getItemIndex(element) {


this._items = element && element.parentNode ?
[].slice.call(element.parentNode.querySelectorAll(SELECTOR_ITEM)) : [];
return this._items.indexOf(element);
};

_proto._getItemByDirection = function _getItemByDirection(direction, activeElement) {


var isNextDirection = direction === DIRECTION_NEXT;
var isPrevDirection = direction === DIRECTION_PREV;

var activeIndex = this._getItemIndex(activeElement);

var lastItemIndex = this._items.length - 1;


var isGoingToWrap = isPrevDirection && activeIndex === 0 || isNextDirection &&
activeIndex === lastItemIndex;

if (isGoingToWrap && !this._config.wrap) {


return activeElement;
}

var delta = direction === DIRECTION_PREV ? -1 : 1;


var itemIndex = (activeIndex + delta) % this._items.length;
return itemIndex === -1 ? this._items[this._items.length - 1] :
this._items[itemIndex];
};

_proto._triggerSlideEvent = function _triggerSlideEvent(relatedTarget,


eventDirectionName) {
var targetIndex = this._getItemIndex(relatedTarget);

var fromIndex =
this._getItemIndex(this._element.querySelector(SELECTOR_ACTIVE_ITEM));

var slideEvent = $.Event(EVENT_SLIDE, {


relatedTarget: relatedTarget,
direction: eventDirectionName,
from: fromIndex,
to: targetIndex
});
$(this._element).trigger(slideEvent);
return slideEvent;
};

_proto._setActiveIndicatorElement = function _setActiveIndicatorElement(element) {


if (this._indicatorsElement) {
var indicators =
[].slice.call(this._indicatorsElement.querySelectorAll(SELECTOR_ACTIVE$1));
$(indicators).removeClass(CLASS_NAME_ACTIVE$1);

var nextIndicator =
this._indicatorsElement.children[this._getItemIndex(element)];

if (nextIndicator) {

71
Department of Computer Science Aks University Satna

$(nextIndicator).addClass(CLASS_NAME_ACTIVE$1);
}
}
};

_proto._slide = function _slide(direction, element) {


var _this4 = this;

var activeElement = this._element.querySelector(SELECTOR_ACTIVE_ITEM);

var activeElementIndex = this._getItemIndex(activeElement);

var nextElement = element || activeElement && this._getItemByDirection(direction,


activeElement);

var nextElementIndex = this._getItemIndex(nextElement);

var isCycling = Boolean(this._interval);


var directionalClassName;
var orderClassName;
var eventDirectionName;

if (direction === DIRECTION_NEXT) {


directionalClassName = CLASS_NAME_LEFT;
orderClassName = CLASS_NAME_NEXT;
eventDirectionName = DIRECTION_LEFT;
} else {
directionalClassName = CLASS_NAME_RIGHT;
orderClassName = CLASS_NAME_PREV;
eventDirectionName = DIRECTION_RIGHT;
}

if (nextElement && $(nextElement).hasClass(CLASS_NAME_ACTIVE$1)) {


this._isSliding = false;
return;
}

var slideEvent = this._triggerSlideEvent(nextElement, eventDirectionName);

if (slideEvent.isDefaultPrevented()) {
return;
}

if (!activeElement || !nextElement) {
// Some weirdness is happening, so we bail
return;
}

this._isSliding = true;

if (isCycling) {
this.pause();
}

this._setActiveIndicatorElement(nextElement);

var slidEvent = $.Event(EVENT_SLID, {


relatedTarget: nextElement,

72
Department of Computer Science Aks University Satna

direction: eventDirectionName,
from: activeElementIndex,
to: nextElementIndex
});

if ($(this._element).hasClass(CLASS_NAME_SLIDE)) {
$(nextElement).addClass(orderClassName);
Util.reflow(nextElement);
$(activeElement).addClass(directionalClassName);
$(nextElement).addClass(directionalClassName);
var nextElementInterval = parseInt(nextElement.getAttribute('data-interval'),
10);

if (nextElementInterval) {
this._config.defaultInterval = this._config.defaultInterval ||
this._config.interval;
this._config.interval = nextElementInterval;
} else {
this._config.interval = this._config.defaultInterval || this._config.interval;
}

var transitionDuration = Util.getTransitionDurationFromElement(activeElement);


$(activeElement).one(Util.TRANSITION_END, function () {
$(nextElement).removeClass(directionalClassName + " " +
orderClassName).addClass(CLASS_NAME_ACTIVE$1);
$(activeElement).removeClass(CLASS_NAME_ACTIVE$1 + " " + orderClassName + " " +
directionalClassName);
_this4._isSliding = false;
setTimeout(function () {
return $(_this4._element).trigger(slidEvent);
}, 0);
}).emulateTransitionEnd(transitionDuration);
} else {
$(activeElement).removeClass(CLASS_NAME_ACTIVE$1);
$(nextElement).addClass(CLASS_NAME_ACTIVE$1);
this._isSliding = false;
$(this._element).trigger(slidEvent);
}

if (isCycling) {
this.cycle();
}
} // Static
;

Carousel._jQueryInterface = function _jQueryInterface(config) {


return this.each(function () {
var data = $(this).data(DATA_KEY$2);

var _config = _objectSpread2(_objectSpread2({}, Default), $(this).data());

if (typeof config === 'object') {


_config = _objectSpread2(_objectSpread2({}, _config), config);
}

var action = typeof config === 'string' ? config : _config.slide;

if (!data) {

73
Department of Computer Science Aks University Satna

data = new Carousel(this, _config);


$(this).data(DATA_KEY$2, data);
}

if (typeof config === 'number') {


data.to(config);
} else if (typeof action === 'string') {
if (typeof data[action] === 'undefined') {
throw new TypeError("No method named \"" + action + "\"");
}

data[action]();
} else if (_config.interval && _config.ride) {
data.pause();
data.cycle();
}
});
};

Carousel._dataApiClickHandler = function _dataApiClickHandler(event) {


var selector = Util.getSelectorFromElement(this);

if (!selector) {
return;
}

var target = $(selector)[0];

if (!target || !$(target).hasClass(CLASS_NAME_CAROUSEL)) {
return;
}

var config = _objectSpread2(_objectSpread2({}, $(target).data()), $(this).data());

var slideIndex = this.getAttribute('data-slide-to');

if (slideIndex) {
config.interval = false;
}

Carousel._jQueryInterface.call($(target), config);

if (slideIndex) {
$(target).data(DATA_KEY$2).to(slideIndex);
}

event.preventDefault();
};

_createClass(Carousel, null, [{
key: "VERSION",
get: function get() {
return VERSION$2;
}
}, {
key: "Default",
get: function get() {
return Default;

74
Department of Computer Science Aks University Satna

}
}]);

return Carousel;
}();
/**

Some Coding Of CSS


html {
box-sizing: border-box;
-ms-overflow-style: scrollbar;
}

*,
*::before,
*::after {
box-sizing: inherit;
}

.container {
width: 100%;
padding-right: 15px;
padding-left: 15px;
margin-right: auto;
margin-left: auto;
}

@media (min-width: 576px) {


.container {
max-width: 540px;
}
}

@media (min-width: 768px) {


.container {
max-width: 720px;
}
}

@media (min-width: 992px) {


.container {
max-width: 960px;
}
}

@media (min-width: 1200px) {


.container {
max-width: 1140px;
}
}

75
Department of Computer Science Aks University Satna

.container-fluid, .container-sm, .container-md, .container-lg, .container-xl {


width: 100%;
padding-right: 15px;
padding-left: 15px;
margin-right: auto;
margin-left: auto;
}

@media (min-width: 576px) {


.container, .container-sm {
max-width: 540px;
}
}

@media (min-width: 768px) {


.container, .container-sm, .container-md {
max-width: 720px;
}
}

@media (min-width: 992px) {


.container, .container-sm, .container-md, .container-lg {
max-width: 960px;
}
}

@media (min-width: 1200px) {


.container, .container-sm, .container-md, .container-lg, .container-xl {
max-width: 1140px;
}
}

.row {
display: -ms-flexbox;
display: flex;
-ms-flex-wrap: wrap;
flex-wrap: wrap;
margin-right: -15px;
margin-left: -15px;
}

.no-gutters {
margin-right: 0;
margin-left: 0;
}

.no-gutters > .col,


.no-gutters > [class*="col-"] {
padding-right: 0;
padding-left: 0;
}

.col-1, .col-2, .col-3, .col-4, .col-5, .col-6, .col-7, .col-8, .col-9, .col-10, .col-11,
.col-12, .col,
.col-auto, .col-sm-1, .col-sm-2, .col-sm-3, .col-sm-4, .col-sm-5, .col-sm-6, .col-sm-7,
.col-sm-8, .col-sm-9, .col-sm-10, .col-sm-11, .col-sm-12, .col-sm,
.col-sm-auto, .col-md-1, .col-md-2, .col-md-3, .col-md-4, .col-md-5, .col-md-6, .col-md-
7, .col-md-8, .col-md-9, .col-md-10, .col-md-11, .col-md-12, .col-md,

76
Department of Computer Science Aks University Satna

.col-md-auto, .col-lg-1, .col-lg-2, .col-lg-3, .col-lg-4, .col-lg-5, .col-lg-6, .col-lg-


7, .col-lg-8, .col-lg-9, .col-lg-10, .col-lg-11, .col-lg-12, .col-lg,
.col-lg-auto, .col-xl-1, .col-xl-2, .col-xl-3, .col-xl-4, .col-xl-5, .col-xl-6, .col-xl-
7, .col-xl-8, .col-xl-9, .col-xl-10, .col-xl-11, .col-xl-12, .col-xl,
.col-xl-auto {
position: relative;
width: 100%;
padding-right: 15px;
padding-left: 15px;
}

.col {
-ms-flex-preferred-size: 0;
flex-basis: 0;
-ms-flex-positive: 1;
flex-grow: 1;
min-width: 0;
max-width: 100%;
}

.row-cols-1 > * {
-ms-flex: 0 0 100%;
flex: 0 0 100%;
max-width: 100%;
}

.row-cols-2 > * {
-ms-flex: 0 0 50%;
flex: 0 0 50%;
max-width: 50%;
}

.row-cols-3 > * {
-ms-flex: 0 0 33.333333%;
flex: 0 0 33.333333%;
max-width: 33.333333%;
}

.row-cols-4 > * {
-ms-flex: 0 0 25%;
flex: 0 0 25%;
max-width: 25%;
}

.row-cols-5 > * {
-ms-flex: 0 0 20%;
flex: 0 0 20%;
max-width: 20%;
}

.row-cols-6 > * {
-ms-flex: 0 0 16.666667%;
flex: 0 0 16.666667%;
max-width: 16.666667%;
}

.col-auto {
-ms-flex: 0 0 auto;

77
Department of Computer Science Aks University Satna

flex: 0 0 auto;
width: auto;
max-width: 100%;
}

.col-1 {
-ms-flex: 0 0 8.333333%;
flex: 0 0 8.333333%;
max-width: 8.333333%;
}

.col-2 {
-ms-flex: 0 0 16.666667%;
flex: 0 0 16.666667%;
max-width: 16.666667%;
}

.col-3 {
-ms-flex: 0 0 25%;
flex: 0 0 25%;
max-width: 25%;
}

.col-4 {
-ms-flex: 0 0 33.333333%;
flex: 0 0 33.333333%;
max-width: 33.333333%;
}

.col-5 {
-ms-flex: 0 0 41.666667%;
flex: 0 0 41.666667%;
max-width: 41.666667%;
}

.col-6 {
-ms-flex: 0 0 50%;
flex: 0 0 50%;
max-width: 50%;
}

.col-7 {
-ms-flex: 0 0 58.333333%;
flex: 0 0 58.333333%;
max-width: 58.333333%;
}

.col-8 {
-ms-flex: 0 0 66.666667%;
flex: 0 0 66.666667%;
max-width: 66.666667%;
}

.col-9 {
-ms-flex: 0 0 75%;
flex: 0 0 75%;
max-width: 75%;
}

78
Department of Computer Science Aks University Satna

.col-10 {
-ms-flex: 0 0 83.333333%;
flex: 0 0 83.333333%;
max-width: 83.333333%;
}

.col-11 {
-ms-flex: 0 0 91.666667%;
flex: 0 0 91.666667%;
max-width: 91.666667%;
}

.col-12 {
-ms-flex: 0 0 100%;
flex: 0 0 100%;
max-width: 100%;
}

.order-first {
-ms-flex-order: -1;
order: -1;
}

.order-last {
-ms-flex-order: 13;
order: 13;
}

Some Coding Of ASP.NET


<title>About me Page</title>
<meta charset="utf-8">
<meta name="viewport" content="width=device-width, initial-scale=1">
<link rel="stylesheet"
href="https://maxcdn.bootstrapcdn.com/bootstrap/3.4.1/css/bootstrap.min.css">
<%-- <script
src="https://ajax.googleapis.com/ajax/libs/jquery/3.5.1/jquery.min.js"></script>
<script
src="https://maxcdn.bootstrapcdn.com/bootstrap/3.4.1/js/bootstrap.min.js"></script>--%>
<style>
.jumbotron {
background-color: #f4511e;
color: #fff;
padding: 100px 25px;
}
.container-fluid {
padding: 60px 50px;
}
.bg-grey {
background-color: #f6f6f6;

79
Department of Computer Science Aks University Satna

}
.logo-small {
color: #f4511e;
font-size: 50px;
}
.logo {
color: #f4511e;
font-size: 200px;
}
@media screen and (max-width: 768px) {
.col-sm-4 {
text-align: center;
margin: 25px 0;
}
}
</style>
<script language="javascript" type="text/javascript">
// <![CDATA[

// ]]>
</script>
</asp:Content>
<asp:Content ID="Content2" ContentPlaceHolderID="ContentPlaceHolder1" Runat="Server">

<br />

<div class="jumbotron text-center">


<h1>My Shopping Website</h1>
<p></p>
<form class="form-inline">
<div class="input-group">

</div>
</form>
</div>

<!-- Container (About Section) -->


<div class="container-fluid">
<div class="row">
<div class="col-sm-8">
<h2>About Company Page</h2>
<h4>Developer..</h4>
<p>I am geek at heart that loves to learn and play with new technologies. I am
grounded with solid object oriented programming principles, but spread my wings across
most of the Microsoft product stack: from ASP.NET MVC, WCF, Windows forms, Silverlight,
Business Intelligence, PerformancePoint Services, VSTO to SharePoint.</p>
<%--<button id="btn11" runat="server" onclick="btn11_onclick()">Get in
Touch</button>--%>
<asp:Button class="btn btn-default btn-lg" ID="Button1" runat="server"
Text="Get in Touch" onclick="Button1_Click" />

</div>
<div class="col-sm-4">
<span class="glyphicon glyphicon-signal logo"></span>
</div>
</div>

80
Department of Computer Science Aks University Satna

</div>

<div class="container-fluid bg-grey">


<div class="row">
<div class="col-sm-4">
<span class="glyphicon glyphicon-globe logo"></span>
</div>
<div class="col-sm-8">
<h2>Our Values</h2>
<h4><strong>MISSION:</strong> Our mission lorem ipsum..</h4>
<p><strong>VISION:</strong> Our vision Lorem ipsum..</p>
</div>
</div>
</div>

<!-- Container (Services Section) -->


<div class="container-fluid text-center">
<h2>SERVICES</h2>
<h4>What we offer</h4>
<br>
<div class="row">
<div class="col-sm-4">
<span class="glyphicon glyphicon-off logo-small"></span>
<h4>POWER</h4>
<p>Lorem ipsum dolor sit amet..</p>
</div>
<div class="col-sm-4">
<span class="glyphicon glyphicon-heart logo-small"></span>
<h4>LOVE</h4>
<p>Lorem ipsum dolor sit amet..</p>
</div>
<div class="col-sm-4">
<span class="glyphicon glyphicon-lock logo-small"></span>
<h4>JOB DONE</h4>
<p>Lorem ipsum dolor sit amet..</p>
</div>
</div>
<br><br>
<div class="row">
<div class="col-sm-4">
<span class="glyphicon glyphicon-leaf logo-small"></span>
<h4>GREEN</h4>
<p>Lorem ipsum dolor sit amet..</p>
</div>
<div class="col-sm-4">
<span class="glyphicon glyphicon-certificate logo-small"></span>
<h4>CERTIFIED</h4>
<p>Lorem ipsum dolor sit amet..</p>
</div>
<div class="col-sm-4">
<span class="glyphicon glyphicon-wrench logo-small"></span>
<h4 style="color:#303030;">HARD WORK</h4>
<p>Lorem ipsum dolor sit amet..</p>
</div>
</div>
</div>
<footer class="container-fluid text-center">
<a href="#myPage" title="To Top">

81
Department of Computer Science Aks University Satna

<span class="glyphicon glyphicon-chevron-up"></span>


</a>
<p> Made By <a href="https://www.youtube.com/coderbaba" title="Visit
MyWebsite">MyShoppingWebsite</a></p>
</footer>

</asp:Content>

<asp:Content ID="Content1" ContentPlaceHolderID="ContentPlaceHolder1" Runat="Server">

<div class ="container">


<div class ="form-horizontal">

<br />
<br />
<h2>Add Product</h2>
<hr />

<div class ="form-group">


<asp:Label ID="Label1" runat="server" CssClass ="col-md-2 control-label"
Text="Proudct Name"></asp:Label>
<div class ="col-md-3">
<asp:TextBox ID="txtProductName" CssClass ="form-control"
runat="server"></asp:TextBox>

</div>
</div>

<div class ="form-group">


<asp:Label ID="Label2" runat="server" CssClass ="col-md-2 control-label"
Text="Price"></asp:Label>
<div class ="col-md-3">
<asp:TextBox ID="txtPrice" CssClass ="form-control"
runat="server"></asp:TextBox>
</div>
</div>

<div class ="form-group">


<asp:Label ID="Label3" runat="server" CssClass ="col-md-2 control-label"
Text="SellingPrice"></asp:Label>
<div class ="col-md-3">
<asp:TextBox ID="txtsellPrice" CssClass ="form-control"
runat="server"></asp:TextBox>
</div>
</div>

<div class ="form-group">


<asp:Label ID="Label4" runat="server" CssClass ="col-md-2 control-label"
Text="Brand"></asp:Label>
<div class ="col-md-3">
<asp:DropDownList ID="ddlBrand" CssClass ="form-control"
runat="server"></asp:DropDownList>

82
Department of Computer Science Aks University Satna

</div>
</div>

<div class ="form-group">


<asp:Label ID="Label5" runat="server" CssClass ="col-md-2 control-label"
Text="Category"></asp:Label>
<div class ="col-md-3">
<asp:DropDownList ID="ddlCategory" CssClass ="form-control"
AutoPostBack ="true" runat="server"
OnSelectedIndexChanged="ddlCategory_SelectedIndexChanged"></asp:DropDownList>
</div>
</div>

<div class ="form-group">


<asp:Label ID="Label6" runat="server" CssClass ="col-md-2 control-label"
Text="SubCategory"></asp:Label>
<div class ="col-md-3">
<asp:DropDownList ID="ddlSubCategory" CssClass ="form-control"
runat="server" AutoPostBack="True"
OnSelectedIndexChanged="ddlSubCategory_SelectedIndexChanged"></asp:DropDownList>
</div>
</div>

<div class ="form-group">


<asp:Label ID="Label19" runat="server" CssClass ="col-md-2 control-label"
Text="Gender"></asp:Label>
<div class ="col-md-3">
<asp:DropDownList ID="ddlGender" CssClass ="form-control"
runat="server" AutoPostBack="True"
OnSelectedIndexChanged="ddlGender_SelectedIndexChanged"></asp:DropDownList>
</div>
</div>

<div class ="form-group">


<asp:Label ID="Label7" runat="server" CssClass ="col-md-2 control-label"
Text="Size"></asp:Label>
<div class ="col-md-3">
<asp:CheckBoxList ID="cblSize" CssClass ="form-control"
RepeatDirection="Horizontal" runat="server"></asp:CheckBoxList>
</div>
</div>

<div class ="form-group">


<asp:Label ID="Label20" runat="server" CssClass ="col-md-2 control-label"
Text="Quantity"></asp:Label>
<div class ="col-md-3">
<asp:TextBox ID="txtQuantity" CssClass ="form-control"
runat="server"></asp:TextBox>
</div>
</div>

<div class ="form-group">


<asp:Label ID="Label8" runat="server" CssClass ="col-md-2 control-label"
Text="Description"></asp:Label>
<div class ="col-md-3">

83
Department of Computer Science Aks University Satna

<asp:TextBox ID="txtDescription" TextMode ="MultiLine" CssClass


="form-control" runat="server"></asp:TextBox>
</div>
</div>

<div class ="form-group">


<asp:Label ID="Label9" runat="server" CssClass ="col-md-2 control-label"
Text="Product Details"></asp:Label>
<div class ="col-md-3">
<asp:TextBox ID="txtPDetail" TextMode ="MultiLine" CssClass ="form-
control" runat="server"></asp:TextBox>
</div>
</div>

<div class ="form-group">


<asp:Label ID="Label10" runat="server" CssClass ="col-md-2 control-label"
Text="Materials and Care"></asp:Label>
<div class ="col-md-3">
<asp:TextBox ID="txtMatCare" TextMode ="MultiLine" CssClass ="form-
control" runat="server"></asp:TextBox>
</div>
</div>

<div class ="form-group">


<asp:Label ID="Label11" runat="server" CssClass ="col-md-2 control-label"
Text="Upload Image"></asp:Label>
<div class ="col-md-3">
<asp:FileUpload ID="fuImg01" CssClass ="form-control" runat="server"
/>
</div>
</div>

<div class ="form-group">


<asp:Label ID="Label12" runat="server" CssClass ="col-md-2 control-label"
Text="Upload Image"></asp:Label>
<div class ="col-md-3">
<asp:FileUpload ID="fuImg02" CssClass ="form-control" runat="server"
/>
</div>
</div>

<div class ="form-group">


<asp:Label ID="Label13" runat="server" CssClass ="col-md-2 control-label"
Text="Upload Image"></asp:Label>
<div class ="col-md-3">
<asp:FileUpload ID="fuImg03" CssClass ="form-control" runat="server"
/>
</div>
</div>

<div class ="form-group">


<asp:Label ID="Label14" runat="server" CssClass ="col-md-2 control-label"
Text="Upload Image"></asp:Label>
<div class ="col-md-3">
<asp:FileUpload ID="fuImg04" CssClass ="form-control" runat="server"
/>

84
Department of Computer Science Aks University Satna

</div>
</div>

<div class ="form-group">


<asp:Label ID="Label15" runat="server" CssClass ="col-md-2 control-label"
Text="Upload Image"></asp:Label>
<div class ="col-md-3">
<asp:FileUpload ID="fuImg05" CssClass ="form-control" runat="server"
/>
</div>
</div>

<div class ="form-group">


<asp:Label ID="Label16" runat="server" CssClass ="col-md-2 control-label"
Text="Free Delivery"></asp:Label>
<div class ="col-md-3">
<asp:CheckBox ID="chFD" runat="server" />
</div>
</div>

<div class ="form-group">


<asp:Label ID="Label17" runat="server" CssClass ="col-md-2 control-label"
Text="30 Days Return"></asp:Label>
<div class ="col-md-3">
<asp:CheckBox ID="ch30Ret" runat="server" />
</div>
</div>

<div class ="form-group">


<asp:Label ID="Label18" runat="server" CssClass ="col-md-2 control-label"
Text="COD"></asp:Label>
<div class ="col-md-3">
<asp:CheckBox ID="cbCOD" runat="server" />
</div>
</div>

<div class ="form-group">


<div class ="col-md-2 "> </div>
<div class ="col-md-6 ">

<asp:Button ID="btnAdd" CssClass ="btn btn-success "


runat="server" Text="ADD Product" OnClick="btnAdd_Click" />

</div>
</div>

</div>

</div>

<div class="container">

<hr />

85
Department of Computer Science Aks University Satna

<div class="panel panel-primary">


<div class="panel-heading"><h2>Product Report</h2> </div>
<div class="panel-body">
<div class="col-md-12">
<div class="form-group">
<div class="table table-responsive">
<asp:GridView ID="GridView1" runat="server" CssClass="table"
AutoGenerateColumns="false">
<Columns>
<asp:BoundField DataField="PID" HeaderText="S.No." />
<asp:BoundField DataField="PName" HeaderText="PName" />
<asp:BoundField DataField="PPrice" HeaderText="Price" />
<asp:BoundField DataField="PSelPrice" HeaderText="SellPrice" />
<asp:BoundField DataField="Brand" HeaderText="Brand" />
<asp:BoundField DataField="CatName" HeaderText="Category" />
<asp:BoundField DataField="SubCatName" HeaderText="SubCategory"
/>

<asp:BoundField DataField="gender" HeaderText="gender" />


<asp:BoundField DataField="SizeName" HeaderText="SizeName" />
<asp:BoundField DataField="Quantity" HeaderText="Quantity" />

<asp:TemplateField HeaderText="Photo">
<ItemTemplate>
<%-- <img src="Images/ProductImages/<%# Eval("PID") %>/<%#
Eval("ImageName") %><%# Eval("Extention") %>" alt="<%# Eval("ImageName") %>" style="
height:150px; width:150px;"/> --%>
</ItemTemplate>
</asp:TemplateField>

<%-- <asp:CommandField ShowEditButton="true" />


<asp:CommandField ShowDeleteButton="true" />--%>

</Columns>
</asp:GridView>
</div>

</div>

</div>

</div>
<div class="panel-footer">Panel Footer</div>
</div>

</div>
</asp:Content>

Some Coding Of C#
using System;
using System.Collections.Generic;

86
Department of Computer Science Aks University Satna

using System.Linq;
using System.Web;
using System.Web.UI;
using System.Web.UI.WebControls;

public partial class About : System.Web.UI.Page


{
protected void Page_Load(object sender, EventArgs e)
{

}
protected void Button1_Click(object sender, EventArgs e)
{
Response.Redirect("SignIn.aspx");
}
}

using System;
using System.Collections.Generic;
using System.Linq;
using System.Web;
using System.Web.UI;
using System.Web.UI.WebControls;
using System.Data;
using System.Data.SqlClient;
using System.Configuration;

public partial class AddBrand : System.Web.UI.Page


{
protected void Page_Load(object sender, EventArgs e)
{
if(!IsPostBack)
{
BindBrandRepeater();
}
}

private void BindBrandRepeater()


{
using (SqlConnection con = new
SqlConnection(ConfigurationManager.ConnectionStrings["MyShoppingDB"].ConnectionString))
{
using (SqlCommand cmd = new SqlCommand("select * from tblBrands", con))
{
using (SqlDataAdapter sda = new SqlDataAdapter(cmd))
{
DataTable dt = new DataTable();
sda.Fill(dt);
rptrBrands.DataSource = dt;
rptrBrands.DataBind();
}
}
}
}

87
Department of Computer Science Aks University Satna

protected void btnAddBrand_Click(object sender, EventArgs e)


{
if(txtBrand.Text!=null && txtBrand.Text!="" && txtBrand.Text!=string.Empty)
{
using (SqlConnection con = new
SqlConnection(ConfigurationManager.ConnectionStrings["MyShoppingDB"].ConnectionString))
{
con.Open();
SqlCommand cmd = new SqlCommand("Insert into tblBrands(Name) Values('" +
txtBrand.Text + "')", con);
cmd.ExecuteNonQuery();

Response.Write("<script> alert('Brand Added Successfully ');


</script>");
txtBrand.Text = string.Empty;

con.Close();
//lblMsg.Text = "Registration Successfully done";
//lblMsg.ForeColor = System.Drawing.Color.Green;
txtBrand.Focus();

}
}
}
protected void txtID_TextChanged(object sender, EventArgs e)
{
//SqlConnection con = new
SqlConnection(ConfigurationManager.ConnectionStrings["MyShoppingDB"].ConnectionString);
//if (con.State == ConnectionState.Closed) { con.Open(); }
//SqlCommand cmd = new SqlCommand("select Name from tblBrands where
BrandID=@ID",con);
//cmd.Parameters.AddWithValue("@ID",Convert.ToInt32(txtID.Text));
//SqlDataAdapter da = new SqlDataAdapter(cmd);
//DataSet ds = new DataSet();
//DataTable dt = new DataTable();
//da.Fill(ds, "dt");
//con.Close();
//if (ds.Tables[0].Rows.Count > 0)
//{
// btnUpdateBrand.Enabled = true;
// txtUpdateBrandName.Text = ds.Tables[0].Rows[0]["Name"].ToString();

//}
//else
//{
// btnUpdateBrand.Enabled = false;
// txtUpdateBrandName.Text = string.Empty;
//}
//con.Close();
}
protected void btnUpdateBrand_Click(object sender, EventArgs e)
{
//txtBrand.Text = "0";
//txtBrand.Visible = false;
//SqlConnection con = new
SqlConnection(ConfigurationManager.ConnectionStrings["MyShoppingDB"].ConnectionString);
//if (con.State == ConnectionState.Closed) { con.Open(); }

88
Department of Computer Science Aks University Satna

//SqlCommand cmd = new SqlCommand("insert into tblBrands (BrandID,Name)


values(@ID,@Name)", con);
//cmd.Parameters.AddWithValue("@ID", Convert.ToInt32(txtID.Text));
//cmd.Parameters.AddWithValue("@Name", txtUpdateBrandName.Text);
//cmd.ExecuteNonQuery();
//Response.Write("<script>alert('Update successfully')</script>");
//txtID.Text = string.Empty;
//txtUpdateBrandName.Text = string.Empty;
//txtBrand.Text = string.Empty;
//txtBrand.Visible = true;
//txtBrand.Focus();

}
}
using System;
using System.Collections.Generic;
using System.Linq;
using System.Web;
using System.Web.UI;
using System.Web.UI.WebControls;
using System.Data;
using System.Data.SqlClient;
using System.Configuration;

public partial class AddCategory : System.Web.UI.Page


{
protected void Page_Load(object sender, EventArgs e)
{
BindCategoryReapter();

private void BindCategoryReapter()


{
using (SqlConnection con = new
SqlConnection(ConfigurationManager.ConnectionStrings["MyShoppingDB"].ConnectionString))
{
using (SqlCommand cmd = new SqlCommand("select * from tblCategory", con))
{
using (SqlDataAdapter sda = new SqlDataAdapter(cmd))
{
DataTable dt = new DataTable();
sda.Fill(dt);
rptrCategory .DataSource = dt;
rptrCategory.DataBind();
}
}
}
}

protected void btnAddtxtCategory_Click(object sender, EventArgs e)


{
using (SqlConnection con = new
SqlConnection(ConfigurationManager.ConnectionStrings["MyShoppingDB"].ConnectionString))
{
con.Open();
SqlCommand cmd = new SqlCommand("Insert into tblCategory(CatName) Values('" +
txtCategory .Text + "')", con);

89
Department of Computer Science Aks University Satna

cmd.ExecuteNonQuery();

Response.Write("<script> alert('Category Added Successfully '); </script>");


txtCategory.Text = string.Empty;

con.Close();
//lblMsg.Text = "Registration Successfully done";
//lblMsg.ForeColor = System.Drawing.Color.Green;
txtCategory.Focus();
}
}
}
Some My SQL Server Query

CREATE TABLE tblBrands(


[BrandID] [int] IDENTITY(1,1) NOT NULL primary key,
[Name] [nvarchar](500) NULL,
)
--2
CREATE TABLE tblCart(
[CartID] [int] IDENTITY(1,1) NOT NULL,
[UID] [int] NULL,
[PID] [int] NULL,
[PName] [nvarchar](max) NULL,
[PPrice] [money] NULL,
[PSelPrice] [money] NULL,
[SubPAmount] AS ([PPrice]*[Qty]),
[SubSAmount] AS ([PSelPrice]*[Qty]),
[Qty] [int] NULL,
)

--3

CREATE TABLE tblCategory(


[CatID] [int] IDENTITY(1,1) NOT NULL primary key,
[CatName] [nvarchar](max) NULL,
)

---4
CREATE TABLE tblSubCategory(
[SubCatID] [int] IDENTITY(1,1) NOT NULL primary key,
[SubCatName] [nvarchar](max) NULL,
[MainCatID] [int] NULL,
CONSTRAINT [FK_tblSubCategory_tblCategory] FOREIGN KEY([MainCatID]) REFERENCES
tblCategory ([CatID])
)
---------5

create table tblUsers


(
Uid int identity(1,1) primary key not null,
Username nvarchar(100)Null,
Password nvarchar(100)Null,
Email nvarchar(100)Null,
Name nvarchar(100)Null,

90
Department of Computer Science Aks University Satna

Usertype nvarchar(50) default 'User'


)
insert into tblUsers Values('coderbaba','123','[email protected]','Coder baba','Admin')
insert into tblUsers Values('user','123','[email protected]','Userbabu','User')

select * from tblUsers

---------6
CREATE TABLE tblOrderProducts(
[OrderProID] [int] IDENTITY(1,1) NOT NULL primary key,
[OrderID] [nvarchar](50) NULL,
[UserID] [int] NULL,
[PID] [int] NULL,
[Products] [nvarchar](max) NULL,
[Quantity] [int] NULL,
[OrderDate] [datetime] NULL,
[Status] [nvarchar](100) NULL,
Constraint [FK_tblOrderProducts_ToTable] FOREIGN KEY ([UserID]) REFERENCES [tblUsers]
([uid])
)

---7
create table ForgotPass
(
Id nvarchar (500) not null,
Uid int null,
RequestDateTime DATETIME null,
Constraint [FK_ForgotPass_tblUsers] FOREIGN KEY ([Uid]) REFERENCES [tblUsers] ([Uid])

---8
create table tblGender
(
GenderID int identity(1,1) primary key,
GenderName nvarchar(MAX)

--9
CREATE TABLE tblOrders(
[OrderID] [int] IDENTITY(1,1) NOT NULL primary key,
[UserID] [int] NULL,
[EMail] [nvarchar](max) NULL,
[CartAmount] [money] NULL,
[CartDiscount] [money] NULL,
[TotalPaid] [money] NULL,
[PaymentType] [nvarchar](50) NULL,
[PaymentStatus] [nvarchar](50) NULL,
[DateOfPurchase] [datetime] NULL,
[Name] [nvarchar](200) NULL,
[Address] [nvarchar](max) NULL,
[MobileNumber] [nvarchar](50) NULL,
[OrderStatus] [nvarchar](50) NULL,
[OrderNumber] [nvarchar](50) NULL,

91
Department of Computer Science Aks University Satna

Constraint [FK_tblOrders_ToTable] FOREIGN KEY ([UserID]) REFERENCES [tblUsers]


([uid])
)

--10

--CREATE TABLE tblProducts(


-- [PID] [int] IDENTITY(1,1) NOT NULL primary key,
-- [PName] [nvarchar](max) NULL,
-- [PPrice] [money] NULL,
-- [PSelPrice] [money] NULL,
-- [PBrandID] [int] NULL,
-- [PCategoryID] [int] NULL,
-- [PSubCatID] [int] NULL,
-- [PDescription] [nvarchar](max) NULL,
-- [FreeDelivery] [int] NULL,
-- [7DayRTN] [int] NULL,
-- [COD] [int] NULL
--)

select * from tblProducts


create table tblProducts
(
PID int identity(1,1) primary key ,
PName nvarchar(MAX),
PPrice money,
PSelPrice money,
PBrandID int,
PCategoryID int,
PSubCatID int,
PGender int,

PDescription nvarchar(MAX),
PProductDetails nvarchar(MAX),
PMaterialCare nvarchar(MAX),
FreeDelivery int,
[30DayRet] int,
COD int,
Constraint [FK_tblProducts_ToTable] FOREIGN KEY ([PBrandID]) REFERENCES [tblBrands]
([BrandID]),
Constraint [FK_tblProducts_ToTable1] FOREIGN KEY ([PCategoryID]) REFERENCES [tblCategory]
([CatID]),
Constraint [FK_tblProducts_ToTable2] FOREIGN KEY ([PSubCatID]) REFERENCES
[tblSubCategory] ([SubCatID]),
Constraint [FK_tblProducts_ToTable3] FOREIGN KEY ([PGender]) REFERENCES [tblGender]
([GenderID])

---11
select * from tblProductImages
CREATE TABLE tblProductImages(
[PIMGID] [int] IDENTITY(1,1) NOT NULL,
[PID] [int] NULL,
[Name] [nvarchar](max) NULL,
[Extention] [nvarchar](500) NULL,

92
Department of Computer Science Aks University Satna

Constraint [FK_tblProductImages_ToTable] FOREIGN KEY ([PID]) REFERENCES


[tblProducts] ([PID])
)

---12

create table tblSizes


(
SizeID int identity(1,1) primary key,
SizeName nvarchar(500),
BrandID int,
CategoryID int,
SubCategoryID int,
GenderID int,
Constraint [FK_tblSizes_ToBrand] FOREIGN KEY ([BrandID]) REFERENCES [tblBrands]
([BrandID]),
Constraint [FK_tblSizes_ToCat] FOREIGN KEY ([CategoryID]) REFERENCES [tblCategory]
([CatID]),
Constraint [FK_tblSizes_SubCat] FOREIGN KEY ([SubCategoryID]) REFERENCES [tblSubCategory]
([SubCatID]),
Constraint [FK_tblSizes_Gender] FOREIGN KEY ([GenderID]) REFERENCES [tblGender]
([GenderID])

93
Department of Computer Science Aks University Satna

Testing is a process of executing a program with the indent of finding an


error. Testing is a crucial element of software quality assurance and presents ultimate review of
specification, design and coding.

System Testing is an important phase. Testing represents an interesting anomaly for the software.
Thus a series of testing are performed for the proposed system before the system is ready for user
acceptance testing.

A good test case is one that has a high probability of finding an as undiscovered error. A
successful test is one that uncovers an as undiscovered error.

Testing Objectives:

1. Testing is a process of executing a program with the intent of finding an error


2. A good test case is one that has a probability of finding an as yet undiscovered error
3. A successful test is one that uncovers an undiscovered error

Testing Principles:

94
Department of Computer Science Aks University Satna

• All tests should be traceable to end user requirements


• Tests should be planned long before testing begins
• Testing should begin on a small scale and progress towards testing in large
• Exhaustive testing is not possible
• To be most effective testing should be conducted by a independent third party

The primary objective for test case design is to derive a set of tests that has the highest
livelihood for uncovering defects in software. To accomplish this objective two different
categories of test case design techniques are used. They are

▪ White box testing.

▪ Black box testing.

White-box testing:

White box testing focus on the program control structure. Test cases are derived to ensure
that all statements in the program have been executed at least once during testing and that all
logical conditions have been executed.

Block-box testing:

Black box testing is designed to validate functional requirements without regard to the internal
workings of a program. Black box testing mainly focuses on the information domain of the
software, deriving test cases by partitioning input and output in a manner that provides through
test coverage. Incorrect and missing functions, interface errors, errors in data structures, error in
functional logic are the errors falling in this category.

Testing strategies:

A strategy for software testing must accommodate low-level tests that are necessary to
verify that all small source code segment has been correctly implemented as well as high-level
tests that validate major system functions against customer requirements.

Testing fundamentals:

95
Department of Computer Science Aks University Satna

Testing is a process of executing program with the intent of finding error. A good test case is one
that has high probability of finding an undiscovered error. If testing is conducted successfully it uncovers
the errors in the software. Testing cannot show the absence of defects, it can only show that software
defects present.

Testing Information flow:

Information flow for testing flows the pattern. Two class of input provided to test the process.
The software configuration includes a software requirements specification, a design specification and
source code.

Test configuration includes test plan and test cases and test tools. Tests are conducted and all the
results are evaluated. That is test results are compared with expected results. When erroneous data are
uncovered, an error is implied and debugging commences.

Unit testing:

Unit testing is essential for the verification of the code produced during the coding phase and
hence the goal is to test the internal logic of the modules. Using the detailed design description as a
guide, important paths are tested to uncover errors with in the boundary of the modules. These tests were
carried out during the programming stage itself. All units of ViennaSQL were successfully tested.

Integration testing :
Integration testing focuses on unit tested modules and build the program structure that is dictated
by the design phase.

System testing:
System testing tests the integration of each module in the system. It also tests to find
discrepancies between the system and it’s original objective, current specification and system
documentation. The primary concern is the compatibility of individual modules. Entire system is working
properly or not will be tested here, and specified path ODBC connection will correct or not, and giving
output or not are tested here these verifications and validations are done by giving input values to the
system and by comparing with expected output. Top-down testing implementing here.

96
Department of Computer Science Aks University Satna

Acceptance Testing:

This testing is done to verify the readiness of the system for the implementation. Acceptance
testing begins when the system is complete. Its purpose is to provide the end user with the
confidence that the system is ready for use. It involves planning and execution of functional
tests, performance tests and stress tests in order to demonstrate that the implemented system
satisfies its requirements.

Tools to special importance during acceptance testing include:

Test coverage Analyzer – records the control paths followed for each test case.

Timing Analyzer – also called a profiler, reports the time spent in various regions of the code are areas to
concentrate on to improve system performance.

Coding standards – static analyzers and standard checkers are used to inspect code for deviations from
standards and guidelines.

Test Cases:

Test cases are derived to ensure that all statements in the program have been executed at
least once during testing and that all logical conditions have been executed.
Using White-Box testing methods, the software engineer can drive test cases that
• Guarantee that logical decisions on their true and false sides.
• Exercise all logical decisions on their true and false sides.
• Execute all loops at their boundaries and with in their operational bounds.
• Exercise internal data structure to assure their validity.
The test case specification for system testing has to be submitted for review before system
testing commences.

97
Department of Computer Science Aks University Satna

OUTPUT SCREEN OF PROJECT

98
Department of Computer Science Aks University Satna

99
Department of Computer Science Aks University Satna

ADMIN PORTAL:-

100
Department of Computer Science Aks University Satna

101
Department of Computer Science Aks University Satna

102
Department of Computer Science Aks University Satna

103
Department of Computer Science Aks University Satna

104
Department of Computer Science Aks University Satna

105
Department of Computer Science Aks University Satna

USER PORTAL:-

106
Department of Computer Science Aks University Satna

107
Department of Computer Science Aks University Satna

108
Department of Computer Science Aks University Satna

109
Department of Computer Science Aks University Satna

110
Department of Computer Science Aks University Satna

111
Department of Computer Science Aks University Satna

112
Department of Computer Science Aks University Satna

CONCLUSION:

The package was designed in such a way that future modifications can be
done easily. The following conclusions can be deduced from the development of the
project.

➢ Automation of the entire system improves the efficiency


➢ It provides a friendly graphical user interface which proves to be better when
compared to the existing system.
➢ It gives appropriate access to the authorized users depending on their permissions.
➢ It effectively overcomes the delay in communications.
➢ Updating of information becomes so easier.
➢ System security, data security and reliability are the striking features.
➢ The System has adequate scope for modification in future if it is necessary.

113
Department of Computer Science Aks University Satna

FUTURE ENHANCEMENTS:

This application avoids the manual work and the problems concern with it. It is an
easy way to obtain the information regarding the various products information that are present in
the Super markets.
Well I and my team members have worked hard in order to present an
improved website better than the existing one’s regarding the information about the various
activities. Still ,we found out that the project can be done in a better way. Primarily, when we
request information about a particular product it just shows the company, product id, product
name and no. of quantities available. So, after getting the information we can get access to the
product company website just by a click on the product name .
The next enhancement that we can add the searching option. We can
directly search to the particular product company from this site .These are the two enhancements
that we could think of at present.

114
Department of Computer Science Aks University Satna

Bibliography

References and Bibliography:


• Google for problem solving
• http://www.javaworld.com/javaworld/jw-01-1998/jw-01-
Credentialreview.html
• Database Programming with JDBC and Java by O'Reilly
• Head First Java 2nd Edition
• http://www.jdbc-tutorial.com/
• Java and Software Design Concepts by Apress
• https://www.tutorialspoint.com/java/
• http://www.javatpoint.com/java-tutorial
• https://docs.oracle.com/javase/tutorial/
• http://www.JSP.net/
• http://www.tutorialspoint.com/sql query/
• Taken Help from Some youtube Videos.

115

You might also like