0% found this document useful (0 votes)
4 views

RMS .

The document is a project report for a Restaurant Management System submitted by Lavanya V as part of her Bachelor of Computer Applications degree at Kristu Jayanti College. It outlines the project's objectives, including the transition from a manual to a computerized system for billing and customer management, and details the feasibility study, system design, and advantages of the proposed system. The report includes acknowledgments, a table of contents, and various design diagrams to support the development of the system.

Uploaded by

Lavanya V
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
4 views

RMS .

The document is a project report for a Restaurant Management System submitted by Lavanya V as part of her Bachelor of Computer Applications degree at Kristu Jayanti College. It outlines the project's objectives, including the transition from a manual to a computerized system for billing and customer management, and details the feasibility study, system design, and advantages of the proposed system. The report includes acknowledgments, a table of contents, and various design diagrams to support the development of the system.

Uploaded by

Lavanya V
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 97

RESTAURANT MANAGEMENT SYSTEM

Project Report submitted in partial fulfilment of the requirements for the award of the degree of

BACHELOR OF COMPUTER APPLICATION (BCA)

Submitted By

LAVANYA V
19CS2K1053

Under the guidance of

Prof. KARTHIKEYAN

DEPARTMENT OF COMPUTER SCIENCE (UG)


BCA PROGRAMME
KRISTU JAYANTI COLLEGE (Autonomous) K. Narayanapura, Kothanur
P.O., Bangalore – 560077
DEPARTMENT OF COMPUTER SCIENCE (UG)

CERTIFICATE OF COMPLETION

This is to certify that the project entitled “(RESTAURANT MANAGEMENT


SYSTEM)” has been satisfactorily completed by LAVANYA V, 19CS2K1053 in partial
fulfilment of the award of the Bachelor of Computer Applications degree requirements
prescribed by Kristu Jayanti College (Autonomous) Bengaluru (Affiliated to Bangalore
North University) during the academic year 2022 – 2023.

Internal Guide Head of the Department

Valued by Examiners

1: Centre: Kristu Jayanti College

2: Date:
DECLARATION

I, LAVANYA V, 19CS2K1053 hereby declare that the project work entitled


(RESTAURANT MANAGEMENT SYSTEM) is an original project work carried out
by me, under the guidance of Prof. KARTHIKEYAN Department of Computer science.

This project work has not been submitted earlier either to any University / Institution or
any other body for the fulfilment of the requirement of a course of study.

Signature
(LAVANYA V

19CS2K1053)

Bengaluru
Date:
ACKNOWLEDGEMENT

The success of the project depends upon the efforts invested. It’s my duty to acknowledge and
thank the individuals who has contributed in the successful completion of the project.

I take this opportunity to express my profound and whole hearted thanks to Rev.Dr.Fr.
AUGUSTINE GEORGE, PRINCIPAL, KRISTU JAYANTI COLLEGE, BENGALURU for
providing ample facilities made to undergo our project successfully.

I express my deep sense of gratitude and sincere thanks to Rev.Dr.Fr. LIJO P.THOMAS
Financial Administrator, his valuable support

I express my deep sense of gratitude and sincere thanks to our Dr. CALISTUS JUDE,
Deanof Science for his valuable support

I express my deep sense of gratitude and sincere thanks PROF.SEVUGA PANDIAN


A, HeadDepartment of Computer Science for his valuable support.

I express my sincere thanks and gratitude to Prof. Karthikeya for her guidance and valuable
support for the successful completion of this project

It is my duty to express my thanks to all Teaching and Non-Teaching Staff members of


computer science department those who offered me help directly or indirectly by their suggestions.

The successful completion of my project would not have been possible without my parent’s
sacrifice, guidance and prayers. I take this opportunity to thank very much for their continuous
encouragement. I convey my thankfulness to all my friends who were with me to share my
happiness and agony. They gave valuable suggestion which was the solution that helped me to a great
extent to complete the project successfully.
TABLE OF CONTENTS

S.No Topic Page No


1. Introduction
1.1 Problem Definition 1
1.2 Scope of the Project 1
2 System Study 2–4
2.1 Existing System 2
2.2 Feasibility Study 2-3
2.3 Proposed System 4
3 System Design 5 – 63
3.1 ER Diagram 5 – 10
3.2 DFD [lev0, lev1] 11 – 15
3.3 Activity Diagram 16 - 17
3.4 Gantt Chart 18 – 21
3.5 Architectural Design 22
3.6 Input / Output Design 23 – 63
4 System Configuration 64
4.1 Hardware Requirements 64
4.2 Software Requirements 64
5. Details of Software 65 – 74
5.1 Overview of Frontend 65 - 69
5.2 Overview of Backend 70 - 73
5.3 About the Platform 74
Testing
6 75 – 76
Conclusion and Future Enhancement
7 77
Bibliography
8 78
APPENDICES A - Table Structure
9 79 – 80
APPENDICES B – Test Cases
10 81 – 82
APPENDICES C – Screenshots
11 83 - 90
APPENDICES D - Source Code
12 91 – 104
RESTAURARANT MANAGEMNET SYSTEM Kristu Jayanti College(Autonomous)

1. INTRODUCTION

1.1 PROBLEM DEFINITION

The project entitled RESTAURANT MANAGEMENT SYSTEM is done to make the manual process
easier by making it a computerized system for billing and also helps the admin of the software to store the
details of the customer and the items. The automated system provides provision to add a delete update and
view the details of the item and also for purchasing the food items. Thus, it is the virtual store on the internet
where customers can book a table browse the menu select item of interest. The selected items are collected in
ordering cart and proceeds to payment, billing and followed by feedback report.

1.2 SCOPE OF THE PROJECT

The software can also be used for larger organization for marketing all types of items. The necessary
information about each item should be manually entered by the admins.
 Items can be added to the system and could be updated or edited by the admin.
 The registration of the customer or booking a table is done by the customer itself along the respective
details.
 It gives the complete information of the items, its name, price and category. Provides ability to view
any item of different category available in the system.

19CS2K1053 1
RESTAURARANT MANAGEMNET SYSTEM Kristu Jayanti College(Autonomous)

2. SYSTEM STUDY

2.1 EXISTING SYSTEM

This process is done manually. The existing system consuming and it is very costly, because it involves
a lot of paper work. To manually handle such a system was very difficult task. But nowadays because of
computerization this job is becoming easier. The following are the reasons why the existing system should
be computerized.
 To increase efficiency with reduced cost.
 To reduce burden of paper work.
 To save time of management for recording details of each and every transaction.
 To check particular product requested is available.

2.2 FEASIBILITY STUDY

A feasibility study is an analysis of how successfully a project can be completed, accounting for factors
thataffect it such as economic, technological, and scheduling factors. Project managers use feasibility studies
to determine potential positive and negative outcomes of a project before investing a considerable amount of
time and money into it. A feasibility study tests the viability of an idea, a project or even a new business.
The goal of a feasibility study is to place emphasis on potential problems that could occur if a project is
pursued and determines if, after all significant factors are considered, the project should be pursued.
Feasibility studies also allow a business to address where and how it will operate, potential obstacles,
competition and the Funding needed to get the business up and running.
This project "Restaurant Managemnet System” has undergone the following Feasibility study:
● Economic Feasibility
● Technical Feasibility
● Behavioural Feasibility
● Schedule Feasibility

Every project is feasible for given unlimited resources and infinitive time. Feasibility study is an
evaluation ofthe proposed system regarding its workability, impact on the organization, ability to meet the
user needs and effective use of resources. Thus, when a new application is proposed it normally goes through
a feasibility studybefore it is approved for development. Feasibility and risk analysis are related in many
ways.

19CS2K1053 2
RESTAURARANT MANAGEMNET SYSTEM Kristu Jayanti College(Autonomous)

1. Technical feasibility:
Technical feasibility focusses on the technology used. It means the computerized system is technically
feasible i.e., it doesn’t have any technical fault and work properly in the given environment. The system is
technically feasible if it provides the required output.

2. Economic feasibility:
Economic analysis is the most frequently used method for evaluating the effectiveness of the
computerizedsystem. We analyse the computerized system is feasible as than the manual system because it
saves the money, time and manpower. It is also feasible according to cost benefit analysis.

3. Behavioural feasibility:
Behavioural feasibility is the analysis of behaviour of the computerized system. In this we analysis that
thecomputerized system is working properly or not. If working then it is communicating properly with the
environment or not. All the matters are analysed and a good computerized system is prepared.

4. Schedule feasibility:
Time evaluation is the most important consideration in the development of project. The time schedule
required for the development of the project is very important since more development time affect machine
time, cost and cause delay in the development of other systems.

SCHEDULE:
a. Time duration of this project requires 42 days covering 9 days for require gathering, 20 days for
design, 15 days for developing, 5 days for testing and 5 days for implementation, 6 days for
documentation.
b. Resource persons are LAVANYA V and SPOORTHY HS.
.

OPERATIONAL:
c. Reduction of paperwork.
d. Human effort or Manual Labor can be decreased.
e. It cuts down the time delay of the existing manual system.
f. Operations that are done manually can be done within a matter of seconds.
g. Data storing is easier and backup is available

19CS2K1053 3
RESTAURARANT MANAGEMNET SYSTEM Kristu Jayanti College(Autonomous)

2.3 PROPOSED SYSTEM

The aim of this project is to create restaurant management system that incorporate the benefits of all
existing solutions but without any of the drawbacks as well as including many new features.
Many of the existing solutions to POS(Point-To-Sale) system are soled with the required expensive hardware
so far, any business looking to work to a budget, the more enriched software solutions are just out of their
range.

Creating a database for containing the information present with them on the paper in the existing system. The
developed system will be a time saving application for the user. User or the visitor can get a broad view about
the handset which they require.

Advantages of proposed system:


Time saving since all the details information is stored in this system, it enables in significance reduction in
number of man – hours taken up for the storage and retrieval of the information, as it removes the large
registers from the scene.
• Accuracy and reliability.
• User friendly, robust.
• Security of data and integration of all functions into one system.
• Remove redundancy and inconsistency.
• Through paper validation, data inconsistency is reduced.
• The proposed system reduce the man power, because a single trained person(Administrator) can
handle whole database.

19CS2K1053 4
RESTAURARANT MANAGEMNET SYSTEM Kristu Jayanti College(Autonomous)

3. SYSTEM DESIGN

In the design phase the architecture is established. This phase starts with the requirement document
delivered by the requirement phase and maps the requirements into architecture. The architecture defines
the components, their interfaces and behaviours. The deliverable design document is the architecture.
The design document describes a plan to implement the requirements. This phase represents the ``how''
phase. Details on computer programming languages and environments, machines, packages, application
architecture, distributed architecture layering, memory size, platform, algorithms, data structures, global
type definitions, interfaces, and many other engineering details are established. The design may include the
usage ofexisting components. Analysing the trade-offs of necessary complexity allows for many things to
remain simplewhich, in turn, will eventually lead to a higher quality product. The architecture team also
converts the typical scenarios into a test plan.
In our approach, the team, given a complete requirement document, must also indicate critical priorities
for the implementation team. A critical implementation priority leads to a task that has to be done right. If
it fails, the product fails. If it succeeds, the product might succeed. At the very least, the confidence level
of the team producing a successful product will increase. This will keep the implementation team focused.
Exactly how this information is conveyed is a skill based on experience more than a science based on
fundamental foundations.
System design is the process of defining the architecture components, modules, interfaces, and data for
a system to satisfy specified requirements. Systems design could be seen as the application of systems theory
toproduct development. There is some overlap with the disciplines of systems analysis, systems architecture
and systems engineering.
If the broader topic of product development “blends the perspective of marketing, design, and
manufacturing into a single approach to product development," then design is the act of taking the marketing
information and creating the design of the product to be manufactured. Systems design is therefore the
Processof defining and developing systems to satisfy specified requirements of the user.
Until the 1990s, systems design had a crucial and respected role in the data processing industry. In the
1990s, standardization of hardware and software resulted in the ability to build modular systems.
Object-oriented analysis and design methods are becoming the most widely used methods for computer
systems design. The UML has become the standard language in object-oriented analysis and design. It is
widely used for modelling software systems and is increasingly used for high designing non-software
systems and organizations.

19CS2K1053 5
RESTAURARANT MANAGEMNET SYSTEM Kristu Jayanti College(Autonomous)

LOGICAL DESIGN:

The logical design of a system pertains to an abstract representation of the data flows, inputs and
outputs of the system. This is often conducted via modelling, using an over-abstract (and sometimes
graphical) model of the actual system. In the context of systems, designs are included.
Logical design includes entity-relationship diagrams (ER diagrams).

PHYSICAL DESIGN:

The physical design relates to the actual input and output processes of the system. This is explained in
terms of how data is input into a system, how it is verified /authenticated, how it is processed, and how it is
displayed.
In physical design, the following requirements about the system are decided.

1. Input requirement,
2. Output requirements,
3. Storage requirements,
4. Processing requirements,
5. System control and backup or recovery.

Put another way, the physical portion of system design can generally be broken down into three subtasks:
1. User Interface Design
2. Data Design
3. Process Design

User Interface Design is concerned with how users add information to the system and with how the
systempresents information back to them. It is concerned with how the data is represented and stored within
the system. Finally, Process Design is concerned with how data moves through the system, and with how
and where it is validated, secured and/or transformed as it flows into, through and out of the system.

At the end of the system design phase, documentation describing the three sub-tasks is produced and
made available for use in the next phase. Physical design, in this context, does not refer to the tangible
physical designof an information system.

19CS2K1053 6
RESTAURARANT MANAGEMNET SYSTEM Kristu Jayanti College(Autonomous)

To use an analogy, a personal computer's physical design involves input via a keyboard, processing
withinthe CPU, and output via a monitor, printer, etc. It would not concern the actual layout of the tangible
hardware, which for a PC would be a monitor, CPU, motherboard, hard drive, modems, video/graphics cards,
USB slots, etc. It involves a detailed design of a user and a product database structure processor and control
processor. TheH/S personal specification is developed for the proposed system.

3.1 E-R DIAGRAM

An entity relationship diagram (ERD) shows the relationships of entity sets stored in a database. An
entityin this context is a component of data. In other words, ER diagrams illustrate the logical structure of
databases. Structure of an Entity Relationship Diagram with Common ERD Notations
An entity relationship diagram is a means of visualizing how the information a system produces is related.
There are five main components of an ERD:

• Entities, which are represented by rectangles. An entity is an object or concept about which you want to
store information.

• Weak entity is an entity that must defined by a foreign key relationship with another entity as it cannot
be uniquely identified by its own attributes alone.

• Actions, which are represented by diamond shapes, show how two entities share information in the
database. In some cases, entities can be self-linked. For example, employees can supervise other
employees.

19CS2K1053 7
RESTAURARANT MANAGEMNET SYSTEM Kristu Jayanti College(Autonomous)

• Relationship: The degree of a relationship is the number of entity types that participate in the
relationship.

• Attributes, which are represented by ovals. A key attribute is the unique, distinguishing characteristic
of the entity. For example, an employee's social security number might be the employee's key attribute.

• Multi-valued attribute can have more than one value. For example, an employee entity can have
multiple skill values.

• Derived attribute is based on another attribute. For example, an employee's monthly salary is based on
the employee's annual salary.

• Connecting lines, solid lines that connect attributes to show the relationships of entities in the diagram.

19CS2K1053 8
RESTAURARANT MANAGEMNET SYSTEM Kristu Jayanti College(Autonomous)

• Cardinality specifies how many instances of an entity relate to one instance of another entity. Ordinarily
is also closely linked to cardinality. While cardinality specifies the occurrences of a relationship,
ordinarily describes the relationship as either mandatory or optional. In other words, cardinality specifies
the maximum number of relationships and cordiality specifies the absolute minimum number of
relationships.
• One to One
• One to Many
• Many to One
• Many to Many

19CS2K1053 9
RESTAURARANT MANAGEMNET SYSTEM Kristu Jayanti College(Autonomous)

E-R DIAGRAM FOR RESTAURANT MANAGEMNT SYSTEM:

19CS2K1053 10
RESTAURARANT MANAGEMNET SYSTEM Kristu Jayanti College(Autonomous)

3.2 DATA FLOW DIAGRAM (level 0 and level 1)

The Data Flow Diagrams (DFDs) are used for structure analysis and design. DFDs show the flow of
data from external entities into the system. DFDs also show how the data moves and are transformed from one
processto another, as well as its logical storage. The following symbols are used within DFDs.
A data flow diagram (DFD) is a graphical representation of the "flow" of data through an information
system, modelling its process aspects. A DFD is often used as a preliminary step to create an overview of
the system, which can later be elaborated. DFDs can also be used for the visualization of data processing
(structureddesign).
A DFD shows what kind of information will be input to and output from the system, where the data
will come from and go to, and where the data will be stored. It does not show information about the timing
of processor information about whether processes will operate in sequence or in parallel.

PHYSICAL VS LOGICAL DFD

A logical DFD captures the data flows that are necessary for a system to operate. It describes the
processesthat are undertaken, the data required and produced by each process, and the stores needed to hold
the data. Onthe other hand, a physical DFD shows how the system is actually implemented, either at the
moment (Current Physical DFD), or how the designer intends it to be in the future (Required Physical DFD).
Thus, a Physical DFD may be used to describe the set of data items that appear on each piece of paper
thatmove around an office, and the fact that a particular set of pieces of paper are stored together in a filing
cabinet. It is quite possible that a Physical DFD will include references to data that are duplicated, or
redundant, and that the data stores, if implemented as a set of database tables, would constitute an un-
normalized (or de-normalized) relational database. In contrast, a Logical DFD attempts to capture the data
flow aspects of a system in a form that has neither redundancy nor duplication.

DATA FLOW SYMBOLS AND THEIR MEANINGS: -

An entity: A source of data or a destination for data.

19CS2K1053 11
RESTAURARANT MANAGEMNET SYSTEM Kristu Jayanti College(Autonomous)

Source/Sink: Represented by rectangles in the diagram. Sources and Sinks are external entities which
are sourcesor destinations of data, respectively.

Process: Represented by circles in the diagram. Processes are responsible for


manipulating the data.They take data as input and output an altered version of the data.

Data Store: Represented by a segmented rectangle with an open end on the right. Data Stores are both
electronic and physical locations of data. Examples include databases, directories, files, and even filing
cabinets and stacksof paper.

Data Flow: Represented by a unidirectional arrow. Data Flows show how data is moved through the
System. Data Flows are labelled with a description of the data that is being passed through it.

Level 0 DFD:
A level-0 DFD is the most basic form of DFD. It aims to show how the entire system works at a glance.
There isonly one process in the system and all the data flows either into or out of this process. Level-0 DFD’s
demonstratesthe interactions between the process and external entities. They do not contain Data Stores.
When drawing Level-0 DFD’s, we must first identify the process, all the external entities and all
the data flows.

19CS2K1053 12
RESTAURARANT MANAGEMNET SYSTEM Kristu Jayanti College(Autonomous)

Level 0 DFD/Context Diagram:

Level 1 DFD:

Level 1 DFD’s aim is to give an overview of the full system. They look at the system in more detail.
Major processes are broken down into sub-processes. Level 1 DFD’s also identifies data stores that are
used by the major processes. When constructing a Level 1 DFD we must start by examining the Context
Level DFD. We must break up the single process into its subprocesses. We must then pick out the data
stores fromthe text we are given and include them in our DFD. Like the Context Level DFD’s, all entities,
data stores and processes must be labelled. We must also state any assumptions made from the text.
ADMIN

19CS2K1053 13
RESTAURARANT MANAGEMNET SYSTEM Kristu Jayanti College(Autonomous)

19CS2K1053 14
RESTAURARANT MANAGEMNET SYSTEM Kristu Jayanti College(Autonomous)

3.2 GANTT CHART

A Gantt chart is a type of bar chart, devised by Henry Gantt in the 1910s, that illustrates a project
schedule. Gantt charts illustrate the start and finish dates of the terminal elements and summary elements
of aproject. Terminal elements and summary elements comprise the work breakdown structure of the
project. Modern Gantt charts also show the dependency (i.e., precedence network) relationships between
activities.
GANTT CHART BENEFITS:

Clarity:
One of the biggest benefits of a Gantt chart is the tool's ability to boil down multiple tasks and
timelines into a single document. Stakeholders throughout an organization can easily understand
where teams are in a process while grasping the ways in which independent elements come together
toward project completion.
Communication:
Teams can use Gantt charts to replace meetings and enhance other status updates. Simply
clarifying chart positions offers an easy, visual method to help team members understand task
progress.
Coordination:
For project managers and resource schedulers, the benefits of a Gantt chart include the ability to
sequence events and reduce the potential for overburdening team members. Some project managers
even use combinations of charts to break down projects into more manageable sets of tasks.

Creativity:
Sometimes, a lack of time or resources forces project managers and teams to find creative
solutions. Seeing how individual tasks intertwine on Gantt charts often encourages new partnerships
and collaborations that might not have evolved under traditional task assignment systems.

Time Management:
Most managers regard scheduling as one of the major benefits of Gantt charts in a creative
environment. Helping teams understand the overall impact of project delays can foster stronger
collaboration while encouraging better task organization.

19CS2K1053 15
RESTAURARANT MANAGEMNET SYSTEM Kristu Jayanti College(Autonomous)

Flexibility:
Whether you use Excel to generate Gantt charts or you load tasks into a more precise chart
generator, the ability to issue new charts as your project evolves lets you react to unexpected changes
in project scope or timeline. While revising your project schedule too frequently can eliminate some
of the other benefits of Gantt charts, offering a realistic view of a project can help team members
recover from setbacks or adjust to other changes.

Manageability:
For project managers handling complex assignments, like software publishing or event planning, the
benefits of Gantt charts include externalizing assignments. By visualizing all of the pieces of a project
puzzle, managers can make more focused, effective decisions about resources and timetables.

Accountability:
When project teams face major organizational change, documenting effort and outcomes becomes
crucial to career success. Using Gantt charts during critical projects allows both project managers and
participants to track team progress, highlighting both big wins and major failures during professional
review periods; team members who frequently exceed expectations can leverage this documentation
into larger raises or bonuses.

Gantt chart Importance:

The project's summary and terminal elements, which combine to form the project's internal structure,
are shown on the Gantt chart. Many charts will also depict the precedence rankings and dependencies of
various tasks within the project. The charts can illustrate the start and finish project terminal elements in
project management. It can also show summary elements and terminal dependencies. The smallest task
trackedas part of the project effort is known as a terminal element. Gantt chart represents the tasks in
most modern project scheduling packages. However other management applications use simpler
communication tools suchas message boards, to-do lists and simple scheduling etc., therefore, they do
not use Gantt charts as heavily.

19CS2K1053 16
RESTAURARANT MANAGEMNET SYSTEM Kristu Jayanti College(Autonomous)

The way to create this chart begins by determining and listing the necessary activities. Next, sketch
out how you expect the chart to look. List which items depend on others and what activities take place
when. For each activity, list how many man-hours it will require, and who is responsible.
Lastly, determine the throughput time.
This technique's primary advantage is its good graphical overview that is easy to understand for nearly
all project participants and stakeholders. Its primary disadvantage is its limited applicability for many
projects, since projects are often more complex than can be effectively communicated with this chart.

19CS2K1053 17
RESTAURARANT MANAGEMNET SYSTEM Kristu Jayanti College(Autonomous)

3.2ARCHITECTURAL DESIGN

The current application is being developed by taking the 3-tier architecture as a prototype. In a three-tier
architecture (also known as a multi-tier architecture), there are three or more interacting tiers, each with its
ownspecific responsibilities:
Three-Tier Architecture
Tier 3: The data server provides the business data. MS-SQL server acts as Tier-3, which is the
database layer. These are some of the advantages of three-tier architecture:
• It is easier to modify or replace any tier without affecting the other tiers.
• Separating the application and database functionality means better load balancing.
• Adequate security policies can be enforced within the server tiers without hindering the clients.
The proposed system can be designed perfectly with the three tier model, as all layers are perfectly
getting set aspart of the project. In the future, while expanding the system, in order to implement integration
touch points andto provide enhanced user interfaces, the n-tier architecture can be used.

19CS2K1053 18
RESTAURARANT MANAGEMNET SYSTEM Kristu Jayanti College(Autonomous)

3.2INPUT/OUTPUT

DESIGNINPUT DESIGN

Login Page:

<%@ page language=“vb” autoeventwireup=“true” codebehind=“login.aspx.vb”


inherits=“Restaurant_Management_System” %>
<!doctype html>
<html xmlns=“<a href=“http://www.w3.org/1999/xhtml”>http://www.w3.org/1999/xhtml</a>“>
<head runat=“server”>
<title></title>
<link href=“stylesheet_login_reg/css/stylesheet1.css” rel=“stylesheet” />
<link href=“stylesheet_login_reg/css/test.css” rel=“stylesheet” />
<link href=“models/bootstrap.min.css” rel=“stylesheet” />
</head>
<body>
<form id=“form1″ runat=“server”>
<div>
<div class=“container”>
<div class=“left”>
<div>
<img src=“final_homepage/images/logo_final.png” style=“margin: auto;display: blo ck;” alt=“” height=“70”
width=“70″ />
<center>
<h2 style=“color:white;“> </h2>
</center>
</div>
<br />
<br />
<div class=“header”>
<h2 class=“animation a1″>welcome !!</h2>
<h4 class=“animation a2”>log in to your account using email and password</h4>
</div>
<div class=“form”>
<div class=“page”>
<label class=“field field_v3″>
<asp:textbox id=“textbox1” class=“field input” placeholder=“xyz@****.com” runat t=“server”></asp:textbox>
<span class=“field label-wrap”>

19CS2K1053 19
RESTAURARANT MANAGEMNET SYSTEM Kristu Jayanti College(Autonomous)

<span class=“field label”>e-mail</span>


</span>
</label>
<label class=“field field_v3”>
<asp:textbox id=“textbox2″ class=“field input” placeholder=“*******” runat=“se rver”
textmode=“password”></asp:textbox>
<span class=“field label-wrap”>
<span class=“field label”>password</span>
</span>
</label>
</div>
<p class=“animation a5”>
<a href=“#demomodel” data-toggle=“modal” data- target=“#modal-encrypt” style=“color:white;“>forgot
password</a>
</p>
<asp:button id=“button1” class=“xq” runat=“server” text=“login” />
<br />
<center>
<p class=“animation a5”>
<a href=“signup.aspx” style=“color:white;“>don ’t have an account? sign up</a>
</p>
</center>
</div>
</div>
<div class=“right”></div>
</div>
</div>
<main>
<div class=“modal fade” id=“modal-encrypt” tabindex=“-1″ aria-labelledby=“examplemodallabel” aria-
hidden=“true”>
<div class=“modal-dialog modal-dialog-centered border-warning”>
<div class=“modal-content” style=“border: 5px solid #6c757d;“>
<div class=“modal-body”>
<img src=“stylesheet_login_reg/mail.gif” alt=“email” class=“mx-auto d-block” height=“100” />
<br>
<div class=“model-form”>
<label class=“label”>enter your mail id</label>
<br>

19CS2K1053 20
RESTAURARANT MANAGEMNET SYSTEM Kristu Jayanti College(Autonomous)

</div>
<div class=“model-form”>
<br />
<asp:textbox id=“emailid” class=“field input” placeholder=“enter your mail id” runat=“server”
bordercolor=“#0066ff” borderstyle=“inset”></asp:textbox>
</div>
<br>
<div class=“d-grid gap-2”>
<asp:button id=“button4″ cssclass=“yq” runat=“server” text=“send mail!” data- toggle=“modal” data-
target=“#modal- otp” usesubmitbehavior=“false” onclick=“return getdata();“></asp:button>
</div>
</div>
</main>
<main claas=“s1”>
<div class=“modal fade” id=“modal-otp” tabindex=“-1″ aria-labelledby=“examplemodallabel” aria-
hidden=“true”>
<div class=“modal-dialog modal-dialog-centered border-warning”>
<div class=“modal-content” style=“border: 5px solid #6c757d;“>
<div class=“modal-body”>
<img src=“stylesheet_login_reg/mail.gif” alt=“otp” class=“mx-auto d-block” height=“100” />
<br>
<div class=“model-form”>
<label class=“label”>enter your otp</label>
<br />
</div>
<div class=“model-form”>
<br />
<div class=“digit-group”>
<asp:textbox id=“textbox4″ class=“single” data- next=“textbox5″ maxlength=“1” runat=“server”></asp:textbox>
<asp:textbox id=“textbox5” class=“single” data-next=“textbox6” data- previous=“textbox4″ maxlength=“1”
runat=“server”></asp:textbox>
<asp:textbox id=“textbox6” class=“single” data-next=“textbox7” data- previous=“textbox5″ maxlength=“1”
runat=“server”></asp:textbox>
<span class=“splitter”>&ndash;</span>
<asp:textbox id=“textbox7″ class=“single” data-next=“textbox8″ data- previous=“textbox6” maxlength=“1″
runat=“server”></asp:textbox>
<asp:textbox id=“textbox8″ class=“single” data-next=“textbox9″ data- previous=“textbox7” maxlength=“1″
runat=“server”></asp:textbox>

19CS2K1053 21
RESTAURARANT MANAGEMNET SYSTEM Kristu Jayanti College(Autonomous)

<asp:textbox id=“textbox9″class=“single”data-previous=“textbox8″maxlength=“1”
runat=“server”></asp:textbox>
</div>
<br>
<div class=“d-grid gap-2”>
<asp:button id=“button3″ cssclass=“yq” runat=“server” text=“confirm” usesubmitbeh
avior=“false”></asp:button>
</div>
</div>
</main>
</form>
<script src=“stylesheet_login_reg/jss/javascript1.js”></script>
<script src=“<a
href=“https://code.jquery.com/jquery3.2.1.slim.min.js”>https://code.jquery.com/jquery3.2.1.slim.min.js</a>”
integrity=“sha384 -kj3o2dktikvyik3uenzmm7kckrr/re9/qpg6aazgjwfdmvna/gpgff93hxpg5kkn”
crossorigin=“anonymous”></script>
<script src=“<a
href=“https://cdnjs.cloudflare.com/ajax/libs/popper.js/1.12.9/umd/p”>https://cdnjs.cloudflare.com/ajax/libs/popp
er.js/1.12.9/umd/p</a> in.js”
integrity=“sha38apnbgh9b+y1qktv3rn7w3mgpxhu9k/scqsap7huibx39j7fakfpskvxusv fa0b4q”
crossorigin=“anonymous”></script>
<script src=<a
href=“https://maxcdn.bootstrapcdn.com/bootstrap/4.0.0/js/bootstrap.min.js”>https://maxcdn.bootstrapcdn.com/b
ootstrap/4.0.0/js/bootstrap.min.js</a>
integrity=“sha384jzr6spejh4u02d8jot6vlehfe/jqgirrsqqxsffwpi1mquvdayjuar5+76pvcm”
crossorigin=“anonymous”></script>
</body>
</html>

Forgot Password:

<%@ page language=“vb” autoeventwireup=“false” codebehind=“reset_passwordaspx.aspx.vb”


inherits=“reset_passwordaspx” %>
<!doctype html>
<html xmlns=“<a href=“http://www.w3.org/1999/xhtml”>http://www.w3.org/1999/xhtml</a>“>
<head runat=“server”>
<title></title>
<link href=“stylesheet_login_reg/css/stylesheet1.css” rel=“stylesheet” />
<link href=“stylesheet_login_reg/css/test.css” rel=“stylesheet” />

19CS2K1053 22
RESTAURARANT MANAGEMNET SYSTEM Kristu Jayanti College(Autonomous)

</head>
<body>
<form id=“form1″ runat=“server”>
<div>
<div class=“container”>
<div class=“left”>
<div class=“header”>
<h2 class=“animation a1”>forgot password?</h2>
<h4 class=“animation a2″>reset your password here!!</h4>
</div>
<div class=“form”>
<div class=“pg123″>
<label>password </label>
<asp:textbox id=“textbox1” class=“i123″ placeholder=“enter new password” runat=“ser ver”
textmode=“password” bordercolor=“#3399ff”></asp:textbox>
<label>confirm password </label>
<asp:textbox id=“textbox2” class=“i123″ placeholder=“confirm password ” runat=“serv er”
textmode=“password” bordercolor=“#3399ff”></asp:textbox>
</div>
<asp:button id=“button1” class=“xq” runat=“server” text=“reset password” />
</div>
</div>
<div class=“right”></div>
</div>
</div>
</form>
</body>
</html>
Signup
<%@ page language=“vb” autoeventwireup=“false” codebehind=“signup.aspx.vb” inherits=“spytech.signup”
%>

19CS2K1053 23
RESTAURARANT MANAGEMNET SYSTEM Kristu Jayanti College(Autonomous)

<!doctype html>
<html xmlns=“<a href=“http://www.w3.org/1999/xhtml”>http://www.w3.org/1999/xhtml</a>“>
<head runat=“server”>
<title></title>
<link href=“stylesheet_login_reg/css/stylesheet2.css” rel=“stylesheet” />
<link href=“stylesheet_login_reg/css/test.css” rel=“stylesheet” />
</head>
<body>
<form id=“form1″ runat=“server”>
<div>
<div class=“container”>
<div class=“left”>
<div>
<img src=“final_homepage/images/logo_final.png” style=“margin: auto;display: bl ock;” alt=“” height=“70”
width=“70″ />
<center><h2 style=“color: white;“> spytech</h2></center>
</div>
<br />
<br />
<br />
<div class=“header”>
<h2 class=“animation a1″>sign up</h2>
</div>
<div class=“form”>
<div class=“page”>
<label class=“field field_v2”>
<asp:textbox id=“textbox1″ class=“field input” placeholder=“pradeep jonathan s” ru
nat=“server”></asp:textbox>
<span class=“field label-wrap”>
<span class=“field label”>full name</span>

19CS2K1053 24
RESTAURARANT MANAGEMNET SYSTEM Kristu Jayanti College(Autonomous)

</span>
</label>
<label class=“field field_v2″>
<asp:textbox id=“textbox2” class=“field input” placeholder=“xyz@****.com” runat=“s erver”></asp:textbox>
<span class=“field label-wrap”>
<span class=“field label”>email-id</span>
</span>
</label>
<label class=“field field_v2”>
<asp:textbox id=“textbox3″ class=“field input” type=“password” placehol der=” ”
runat=“server”></asp:textbox>
<span class=“field label-wrap”>
<span class=“field label”>password</span>
</span>
</label>
<label class=“field field_v2″>
<asp:textbox id=“textbox4” class=“field input” type=“password” placehol der=” ”
runat=“server”></asp:textbox>
<span class=“field label-wrap”>
<span class=“field label”>confirm password</span>
</span>
</label>
</div>
<asp:button id=“button1″ class=“xq” runat=“server” text=“sign up” />
</div>
</div>
<div class=“right”></div>
</div>
</div>
</form></body></html>

19CS2K1053 25
RESTAURARANT MANAGEMNET SYSTEM Kristu Jayanti College(Autonomous)

HOME PAGE
<%@ page language=“vb” autoeventwireup=“false” codebehind=“homepage_.aspx.vb”
inherits=“Restaurant Managemnt System_homeppage” %>
<!doctype html>
<<!doctype html>
<html lang=“en”>
<head>
<meta charset=“utf-8″>
<meta name=“viewport” content=“width=device-width, initial-scale=1, shrink-to- fit=no”>
<meta name=“description” content=“your description”>
<meta name=“author” content=“your name”>
<meta property=“og:site_name” content=“” />
<meta property=“og:site” content=“” />
<meta property=“og:title” content=“”/>
<meta property=“og:description” content=“” />
<meta property=“og:image” content=“” />
<meta property=“og:url” content=“” /> >
<meta name=“twitter:card” content=“summary_large_image”>
<title>spytech</title>
<link href=“<a
href=“https://fonts.googleapis.com/css2?family=poppins:wght@400″>https://fonts.googleapis.com/css2?family=
poppins:wght@400</a>;500;700&dis play=swap” rel=“stylesheet”>
<link rel=“stylesheet” href=“<a
href=“https://use.fontawesome.com/releases/v5.5.0/css/all”>https://use.fontawesome.com/releases/v5.5.0/css/all
</a>. css” integrity=“sha384b4diyhknbt8bc12p+wxckhzcico0wtjaou8yzty5qe0id1gssetk6s+l3bl xeviu”
crossorigin=“anonymous”>
<link href=“final_homepage/css/aos.min.css” rel=“stylesheet” />
<link href=“final_homepage/css/bootstrap.min.css” rel=“stylesheet” />
<link href=“final_homepage/css/fontawesome-all.min.css” rel=“stylesheet” />
<link href=“final_homepage/css/style.css” rel=“stylesheet” />
<link href=“final_homepage/css/swiper.css” rel=“stylesheet” />
<link href=“final_homepage/css/stylesheet.css” rel=“stylesheet” />

19CS2K1053 26
RESTAURARANT MANAGEMNET SYSTEM Kristu Jayanti College(Autonomous)

<link rel=“icon” href=“final_homepage/images/favicon.png”>


</head>
<body>
<form runat=“server”>
<nav id=“navbar” class=“navbar navbar-expand-lg fixed-top navbar-dark” aria- label=“main navigation”>
<div class=“container”>
<div class=“action”>
<div class=“profile” onclick=“menutoggle();“>
<img src= “spytech_home/images/1.jpg”″ >
</div>
<div class=“menu”>
<h3>Restaurant_Managemnet_System<br><span>security</span></h3>
<ul> <li><img src=“ _home/images/profile.png” ><asp:hyperlink id=“hyperlink1” hr ef=“user_profile.aspx”
runat=“server”>my profile</asp:hyperlink></li> <li><img src=“ _home/images/edit.png” ><asp:hyperlink
id=“hyperlink2” href= “user_profile.aspx”runat=“server”>edit profile</asp:hyperlink></li>
</ul>
</div>
</div>
</nav>
<section class=“home py-5 d-flex align-items-center” id=“header”>
<div class=“container text-light py-5″ data-aos=“fade-right”>
<h1 class=“headline”>secure your <span class=“home_text”>data</span><br />secure your future</h1>
<p class=“para paralight py3″>cyber attacks are like natural disasters. theres n o way to prevent a hurricane from
hitting your city, but you can certainly prepar e for it</p>
<div class=“d-flex align-items-center”>
</div>
<div class=“d-flex align-items-center”>
</div>
<div class=“my-3”>
<a class=“btn” href=“#plans”>view plans</a>

19CS2K1053 27
RESTAURARANT MANAGEMNET SYSTEM Kristu Jayanti College(Autonomous)

</div>
</div>
</section>
<section class=“services d-flex align-items-center py-5″ id=“services”>
<div class=“container text-light”>
<div class=“text-center pb-4” >
<p>our services</p>
<h2 class=“py-2″>our practice areas</h2>
<p class=“para-light”></p>
</div>
<div class=“row gy-4 py-2″ data-aos=“zoom-in”>
<div class=“col-lg-4″>
<div class=“card bg-transparent”>
<i class=“fas fa-comments fa-2x”></i>
<h4 class=“py-2”>social media offence</h4 <p class=“paralight”> attackers often use social media accounts
during the recon aissance phase of a social engineering or phishing attack..</p>
</div>
</div>
<div class=“col-lg-4”>
<div class=“card bg-transparent”>
<i class=“fas fa-user-secret fa2x”></i>
<h4 class=“py-2″>identity theft</h4>
<p class=“para-light”>identity theft is the crime of obtaining the personal or financial information of another
person to use their identity to commit fraud</p>
</div>
</div>
<div class=“col-lg-4″>
<div class=“card bg-transparent”>
<i class=“fas fa-laptop fa-2x”></i>
<h4 class=“py-2”>hacking</h4> <p class=“paralight”>hacking is an attempt to exploit a computer system or a
priv ate network with unauthorised access for some illicit purpose.</p>

19CS2K1053 28
RESTAURARANT MANAGEMNET SYSTEM Kristu Jayanti College(Autonomous)

</div>
</div>
<div class=“col-lg-4”>
<div class=“card bg-transparent”>
<i class=“fas fa-university fa-2x”></i>
<h4 class=“py-2″>banking fraud</h4>
<p class=“paralight”>attackers might sell the confidential information they steal from the banking institution. the
stolen data is later used for malicious purposes</p>
</div>
</div>
<div class=“col-lg-4″>
<div class=“card bg-transparent”>
<i class=“fas fa-compass fa-2x”></i>
<h4 class=“py-2”>software piracy</h4>
<p class=“paralight”>software piracy is the illegal copying, installation, use, distribution, or sale of software in
any way other than that is expressed in the license agreement</p>
</div>
</div>
<div class=“col-lg-4”>
<div class=“card bg-transparent”>
<i class=“fas fa-bug fa-2x”></i>
<h4 class=“py-2″>web attacks</h4> <p class=“paralight”>ransomware is a type of malware that limits users
from accessing their system, either by locking the system’s screen or by locking the users’ files until a ransom is
paid.</p>
</div>
</div>
</div>
</div>
</section>
<div class=“slider-1 testimonial text-light d-flex align-items-center”>
<div class=“container”>

19CS2K1053 29
RESTAURARANT MANAGEMNET SYSTEM Kristu Jayanti College(Autonomous)

<div class=“row”>
<div class=“text-center w-lg-75 m-auto pb-4”>
<p>testimonials</p>
<h2 class=“py-2″>what our clients says</h2 <p class=“paralight”>lorem ipsum dolor sit, amet consectetur
adipisicing elit. ad ipisci esse facilis vel, neque ipsa mollitia impedit, commodi ab illo dignissimos , voluptatum
quae amet sed tenetur dolores reprehenderit laudantium quo sint.</p>
</div>
</div> <!-- end of row -->
<div class=“row p-2″ data-aos=“zoom-in”>
<div class=“col-lg-12″>
<div class=“slider-container”>
<div class=“swiper-container cardslider”>
<div class=“swiper-wrapper”>
<div class=“swiperslide”> <div class=“testimonialcard p4”>
<p>lorem ipsum dolor, sit amet consectetur adipisicing elit. laboriosam commodi officia laborum qui iste
quidem!</p>
<section class=“location text-light py-5″>
<div class=“container” data-aos=“zoom-in”>
<div class=“row”>
<div class=“col-lg-3 d-flex align-items-center”>
<div class=“p-2”><i class=“far fa-map fa- 3x”></i></div>
<div class=“ms-2”>
<h6>address</h6>
<p>221b, baker street</p>
</div>
</div>
<div class=“col-lg-3 d-flex align-items-center” >
<div class=“p-2”><i class=“fas fa-mobile- alt fa-3x”></i></div>
<div class=“ms-2”>
<h6>call for query</h6>
<p>9380518856</p>

19CS2K1053 30
RESTAURARANT MANAGEMNET SYSTEM Kristu Jayanti College(Autonomous)

</div>
</div>
<div class=“col-lg-3 d-flex align-items-center” >
<div class=“p-2”><i class=“far fa-envelope fa- 3x”></i></div>
<div class=“ms-2”>
<h6>send us mail</h6>
<p></p>
</div>
</div>
<div class=“col-lg-3 d-flex align-items-center” >
<div class=“p-2”><i class=“far fa-clock fa- 3x bbbbbb”></i></div>
<div class=“ms-2”>
<h6>opening hours</h6>
<p>09:00 am - 18:00 pm</p>
</div>
</div>
</div>
</div>
<script src=“./js/bootstrap.min.js”></script>
<script src=“./js/purecounter.min.js”></script>
<script src=“./js/swiper.min.js”></script
<script src=“./js/aos.js”></script>
<script src=“./js/script.js”></script>
<script>
function menutoggle(){
const togglemenu = document.queryselector(‘.menu’);
togglemenu.classlist.toggle(‘active’)
}
</script>
</form></body></html>

19CS2K1053 31
RESTAURARANT MANAGEMNET SYSTEM Kristu Jayanti College(Autonomous)

RESERVATION
<%@ page language=“vb” autoeventwireup=“false” codebehind=“user_profile.aspx.vb”
inherits=“Restaurant.user_profile” %>
<!doctype html>
<html xmlns=“<a href=“http://www.w3.org/1999/xhtml”>http://www.w3.org/1999/xhtml</a>“>
<head runat=“server”>
<title></title>
<link href=“<a
href=“https://maxcdn.bootstrapcdn.com/bootstrap/4.1.1/css/bootstrap.min.css”>https://maxcdn.bootstrapcdn.com
/bootstrap/4.1.1/css/bootstrap.min.css</a>” re l=“stylesheet”/>
<script src=“<a
href=“https://maxcdn.bootstrapcdn.com/boottrap/4.1.1/js/bootstrap.min.js”>https://maxcdn.bootstrapcdn.com/bo
ottrap/4.1.1/js/bootstrap.min.js</a>“></script>
<script src=“<a
href=“https://cdnjs.cloudflare.com/ajax/libs/jquery/3.2.1/jquery.min.js”>https://cdnjs.cloudflare.com/ajax/libs/jq
uery/3.2.1/jquery.min.js</a>“></script>
<link rel=“stylesheet” href=“<a href=“https://cdnjs.cloudflare.com/ajax/libs/font-awesome/4.7.0/css/font-
awesome.min.css”>https://cdnjs.cloudflare.com/ajax/libs/font-awesome/4.7.0/css/font-awesome.min.css</a>“>
<script src=“profile/js/javascript1.js”></script>
<link href=“profile/css/stylesheet1.css” rel=“stylesheet”>
</head>
<body>
<div>
<div class=“container emp-profile”>
<form id=“form1” runat=“server” method =“post”>
<div class=“row”>
<div class=“col-md-4”>
<div class=“profile-img”>
<asp:image id=“imgprev” runat=“server” imageurl =“<a href=“https://exam”>https://exam</a>
ples.unclecoder.com/images/noimagefound360x250.png” height=“200” width=“220″ />
<div class=“file btn btn-lg btn-primary”>
change photo

19CS2K1053 32
RESTAURARANT MANAGEMNET SYSTEM Kristu Jayanti College(Autonomous)

<asp:fileupload id=“imgupload” accept=“image/x- png,image/gif,image/jpeg” onchange =“readurl(this);”


runat=“server” />
</div>
</div>
</div>
<div class=“col-md-6″>
<div class=“profile-head”>
<h5>
kshiti ghelani
</h5>
<h6>
web developer and designer
</h6>
<p class=“proile-rating”>
<asp:label id=“label1” runat=“server” text=“user id : “></asp:label><asp:label id=“user_id” runat=“server”
text=“4”></asp:label></p>
<ul class=“nav nav-tabs” id=“mytab” role=“tablist”>
<li class=“nav-item”>
<a class=“nav-link active” id=“home-tab” data-toggle=“tab” href=“#home” role=“tab” aria-controls=“home”
aria-selected=“true”>about</a>
</li>
</ul>
</div>
</div>
<div class=“col-md-2”>
<asp:textbox id=“search” runat=“server” cssclass=“ttt123″ textmode=“search” placeholder=“search...”
width=“250px” autocompletetype=“firstname”> </asp:textbox><asp:button id=“button2” runat=“server”
text=“button” />
<br />
<br />
<asp:button id=“button1″ class=“profile-edit- btn” runat=“server” text=“edit profile” />

19CS2K1053 33
RESTAURARANT MANAGEMNET SYSTEM Kristu Jayanti College(Autonomous)

</div>
</div>
<div class=“row”>
<div class=“col-md-4”>
<div class=“profile-work”>
<p>work link</p>
<a href=“”>website link</a><br/>
<a href=“”>bootsnipp profile</a><br/>
<a href=“”>bootply profile</a>
<p>skills</p>
<a href=“”>web designer</a><br/>
<a href=“”>web developer</a><br/>
<a href=“”>wordpress</a><br/>
<a href=“”>woocommerce</a><br/>
<a href=“”>php, .net</a><br/>
</div>
</div>
<div class=“col-md-8”>
<div class=“tab-content profile-tab” id=“mytabcontent”>
<div class=“tabpane fade show active” id=“home” role=“tabpane l” aria-labelledby=“home-tab”>
<div class=“row”>
<div class=“col-md-6”>
<label>name</label>
</div>
<div class=“col-md-6″>
<asp:textbox id=“textbox2” cssclass=“ttt123″ runat =“server”></asp:textbox>
<br />
</div>
</div>
<div class=“row”>

19CS2K1053 34
RESTAURARANT MANAGEMNET SYSTEM Kristu Jayanti College(Autonomous)

<div class=“col-md-6”>
<label>gender</label>
</div>
<div class=“col-md-6″>
<asp:dropdownlist id=“dropdownlist1” cssc lass=“ttt123″ runat=“server” width=“198px”>
<asp:listitem>male</asp:listitem>
<asp:listitem>female</asp:listitem>
</asp:dropdownlist>
<br />
</div>
</div>
<div class=“row”>
<div class=“col-md-6″>
<label> dob</label>
</div>
<div class=“col-md-6”>
<asp:textbox id=“textbox4″ cssclass=“ttt123″ runat=” server” textmode=“date”
width=“217px”></asp:textbox>
<br />
</div>
</div>
<div class=“row”>
<div class=“col-md-6″>
<label>phone no</label>
</div>
<div class=“col-md-6”>
<asp:textbox id=“textbox5″ cssclass=“ttt123” runat= “server”></asp:textbox>
<br />
</div>
</div>

19CS2K1053 35
RESTAURARANT MANAGEMNET SYSTEM Kristu Jayanti College(Autonomous)

<div class=“row”>
<div class=“col-md-6″>
<label>email</label>
</div>
<div class=“col-md-6”>
<asp:textbox id=“textbox7″ cssclass=“ttt123” runat= “server” readonly=“true”></asp:textbox>
<br />
</div>
</div>
<div class=“row”>
<div class=“col-md-6”>
<label>state</label>
</div>
<div class=“colmd6″>
<asp:textbox id=“textbox1” cssclass=“ttt123″ runat=“server”></asp:text box>
<br />
</div>
</div>
<div class=“row”>
<div class=“col-md-6”>
<label>city</label>
</div>
<div class=“col-md-6″>
<asp:textbox id=“textbox6” cssclass=“ttt123″ r unat=“server”></asp:textbox>
<br />
</div>
</div>
</div>
<div class=“tab-pane fade” id=“profile” role=“tabpanel” aria- labelledby=“profile-tab”>
<div class=“row”>

19CS2K1053 36
RESTAURARANT MANAGEMNET SYSTEM Kristu Jayanti College(Autonomous)

<div class=“col-md-6”>
<label>experience</label>
</div>
<div class=“col-md-6″>
<p>expert</p>
</div>
</div>
<div class=“row”>
<div class=“col-md-6″>
<label>hourly rate</label>
</div>
<div class=“col-md-6”>
<p>10$/hr</p>
</div>
</div>
<div class=“row”>
<div class=“col-md-6”>
<label>total projects</label>
</div>
<div class=“col-md-6″>
<p>230</p>
</div>
</div>
<div class=“row”>
<div class=“col-md-6″>
<label>english level</label>
</div>
<div class=“col-md-6”>
<p>expert</p>
</div>

19CS2K1053 37
RESTAURARANT MANAGEMNET SYSTEM Kristu Jayanti College(Autonomous)

</div>
<div class=“row”>
<div class=“col-md-6”>
<label>availability</label>
</div>
<div class=“col-md-6″>
<p>6 months</p>
</div>
</div>
<div class=“row”>
<div class=“col-md-12″>
<label>your bio</label><br/>
<p>your detail description</p>
</div>
</div>
</div>
</div>
</div>
</div>
</form>
</div>
</div>
<script>
function readurl(input)
{
if (input.files && input.files[0])
{
var reader = new filereader();
reader.onload = function (e)
{

19CS2K1053 38
RESTAURARANT MANAGEMNET SYSTEM Kristu Jayanti College(Autonomous)

$(‘#<%= imgprev.clientid%>’)
.attr(‘src’, e.target.result);
};
reader.readasdataurl(input.files[0]);
}
}
</script>
</body>
</html>
report
<!doctype html>
<html xmlns=“<a href=“http://www.w3.org/1999/xhtml”>http://www.w3.org/1999/xhtml</a>“>
<head runat=“server”>
<link href=“<a
href=“https://fonts.googleapis.com/css2?family=poppins:wght@400″>https://fonts.googleapis.com/css2?family=
poppins:wght@400</a>;500;70 &display=swap” rel=“stylesheet”>
<link rel=“stylesheet” href=“<a
href=“https://use.fontawesome.com/releases/v5.5.0/css”>https://use.fontawesome.com/releases/v5.5.0/css</a>
/all.css” integrity=“sha384b4diyhknbt8bc12p+wxckhzcico0wtjaou8yzty5qe0id1gss etk6s+l3blxeviu”
crossorigin=“anonymous”>
<link href=“final_homepage/css/bootstrap.min.css” rel=“stylesheet” />
<link href=“final_homepage/css/style.css” rel=“stylesheet” />
<link rel=“stylesheet” href=“<a
href=“https://stackpath.bootstrapcdn.com/bootstrap/4″>https://stackpath.bootstrapcdn.com/bootstrap/4</a>.
3.1/css/bootstrap.min.css” integrity=“sha384ggoyr0ixcbmqv3xipma34md+dh/1fq78
4/j6cy/ijtquohcwr7x9jvorxt2mzw1t” crossorigin=“anonymous”>
</head>
<body>
<form runat=“server”>
<nav id=“navbar” class=“navbar navbar-expand-lg fixed- top navbardark” style=“background-
color:#2a3f54;height:82px;” aria- label=“main navigation”>
<div class=“container”> <a class=“navbarbrand logotext” style=“float:left;position:absolute;left:15px;”
href=“#”>spytech</a>

19CS2K1053 39
RESTAURARANT MANAGEMNET SYSTEM Kristu Jayanti College(Autonomous)

<button class=“navbar-toggler p-0 border-0″ type=“button” id=“navbarsidecollapse” aria-label=“toggle


navigation”>
<span class=“navbar-toggler-icon”></span>
</button>
<div class=“navbar-collapse offcanvas- collapse” id=“navbarsexampledefault” >
<ul class=“navbar-nav ms-auto navbar-nav-scroll”>
</ul>
</div>
</div>
</nav>
<br />
<div class=“bg-success” style=“background-color:white!important;background- color:white!important”>
<div class=“col-8 offset-2 my-5″ style=“background-color:white;“>
<div class=“card”>
<div class=“card-body> <h2><asp:label id=“label6” runat=“server” text=“chart”></asp:label></h2>
<hr /> <div> <asp:textbox id=“from” runat=“server” style=“margin: 0 97px” textmod
e=“date”></asp:textbox> <asp:textbox id=“todate” runat=“server” textmode=“date”></asp:textbox></div>
<br />
<br > <asp:chart id=“chart1” runat=“server” height=“616px” width=“700px” backcolor=“42, 63, 84”
backgradientstyle=“verticalcenter” backhatchstyle=“zigzag” backimagetransparentcolor=“white”
backsecondarycolor=“white”>
<series>
<asp:series name=“series1″></asp:series>
</series>
<chartareas>
<asp:chartarea name=“chartarea1”></asp:chartarea>
</chartareas>
</asp:chart>
<canvas id=“dynamic” style=“margin:-30px;“></canvas>
<div style=“left:776px;top:118px;position:absolute;“>
<h3>legends</h3><br />

19CS2K1053 40
RESTAURARANT MANAGEMNET SYSTEM Kristu Jayanti College(Autonomous)

<asp:label id=“label1” runat=“server” text=“label”></asp:label><br />


<asp:label id=“label2″ runat=“server” text=“label”></asp:label><br />
<asp:label id=“label3” runat=“server” text=“label”></asp:label><br />
<asp:label id=“label4″ runat=“server” text=“label”></asp:label><br /> <asp:label id=“label5” runat=“server”
text=“label”></asp:label><br />
</div>
<div>
<br /><asp:button id=“button1″ runat=“server” class=“yq” style=“margin: 10p 524px;” text=“button” />
<asp:button id=“button2” runat=“server” class=“yq” text=“button” />
</div>
</div>
</div>
</div>
</div>
</form>
<script src=“<a href=“https://code.jquery.com/jquery”>https://code.jquery.com/jquery</a>- 3.3.1.slim.min.js”
integrity=“sha384-q8i/x+965dzo0rt7abk41jstqiaqvgrvzpbzo5smxkp4yfrvh+8abtte1pi6jizo”
crossorigin=“anonymous”></script>
<script src=“<a
href=“https://cdnjs.cloudflare.com/ajax/libs/popper.js/1.14.7/umd/popper.min.js”>https://cdnjs.cloudflare.com/aj
ax/libs/popper.js/1.14.7/umd/popper.min.js</a>” integrity=“sha384-
uo2et0cphqdsjq6hjty5kvphtphzwj9wo1clhtmga3jdzwrnqq4sf86dihndz0w1” crossorigin=“anonymous”></script>
<script src=“<a
href=“https://stackpath.bootstrapcdn.com/bootstrap/4.3.1/js/bootstrap.min.js”>https://stackpath.bootstrapcdn.com
/bootstrap/4.3.1/js/bootstrap.min.js</a>” integrity=“sha384-
jjsmvgyd0p3pxb1rribzuayoiiy6orq6vrjieaff/njgzixfdsf4x0xim+b07jrm” crossorigin=“anonymous”></script>
</body>
</html>

19CS2K1053 41
RESTAURARANT MANAGEMNET SYSTEM Kristu Jayanti College(Autonomous)

CUSTOMER DETAILS
<%@ page language=“vb” autoeventwireup=“false” codebehind=“file_enc_dec.aspx.vb”
inherits=“Restaurant.file_enc_dec” %>
<!doctype html>
<html xmlns=“<a href=“http://www.w3.org/1999/xhtml”>http://www.w3.org/1999/xhtml</a>“>
<head runat=“server”>
<meta charset=“utf-8″>
<meta charset=“utf-8”>
<meta name=“viewport” content=“width=device-width, initial-scale=1.0”>
<meta http-equiv=“x-ua-compatible” content=“ie=edge”>
<link rel=“stylesheet” href=“<a
href=“https://maxcdn.bootstrapcdn.com/bootstrap/4.0.0/css/bootstrap.min.css”>https://maxcdn.bootstrapcdn.com
/bootstrap/4.0.0/css/bootstrap.min.css</a>” integrity=“sha384-
gn5384xqq1aowxa+058rxpxpg6fy4iwvtnh0e263xmfcjlsawiggfaw/dais6jxm”
crossorigin=“anonymous”>
<link rel=“shortcut icon” type=“image/png” href=“encryption_style/file_encryption/images/lock-2.png”/>
<link href=“encryption_style/file_encryption/css/bootstrap.min.css” rel=“stylesheet” />
<title> spytech file encryptor </title>
</head>
<body>
<form id=“form1″ runat=“server”>
<main>
<div class=“modal fade” id=“modal-encrypt” tabindex=“-1″ aria-labelledby=“examplemodallabel” aria-
hidden=“true”>
<div class=“modal-dialog modal-dialog-centered border-warning”>
<div class=“modal-content” style=“border: 5px solid #6c757d;“>
<div class=“modal-body”>
<button type=“button” class=“btn-close” data-bs-dismiss=“modal” aria-label=“close”></button>
<img src=“encryption_style/file_encryption/images/locked.png” alt=“lock” class=“mx-auto d-block”
height=“100”/><br>
<div class=“model-form”>

19CS2K1053 42
RESTAURARANT MANAGEMNET SYSTEM Kristu Jayanti College(Autonomous)

<h5 class=“text-center pb-4”>encrypt file</h5>


<label class=“form-label”>password (keep somewhere safe!):</label>
<div class=“input-group mb-3”>
<asp:textbox id=“secretkey” class=“form-control” placeholder=“enter the secret key” aria-label=“recipient’s
username” aria-describedby=“button-addon2″ runat=“server”></asp:textbox>
<asp:button id=“button1″ class=“btn btn-outline-warning” data-bs-container=“body” runat=“server”
text=“generate” usesubmitbehavior=“false”></asp:button>
</div>
<div>
<label for=“formfile-key-encrypt” class=“form-label”>file</label>
<asp:fileupload id=“fileupload1″ class=“form-control form-control” runat=“server”></asp:fileupload>
</div>
<br>
<div class=“d-grid gap-2”>
<asp:button id=“button2″ cssclass=“btn btn-warning btn-lg” runat=“server” text=“encrypt your file!” data-
toggle=“modal” data-target=“#down-dec” usesubmitbehavior=“false”></asp:button>
</div>
</div>
<div class=“loading” id=“123″ style=“display: none”>
<h5 class=“text-center pb-4″>encrypting your file...</h5>
<div class=“progress”>
<div class=“progress-bar progress-bar-striped bg-info progress-bar-animated encrypt-bar” role=“progressbar”
aria-valuenow=“75″ aria-valuemin=“0” aria-valuemax=“100″ style=“width: 10%“></div>
</div>
</div>
<div class=“downloading” style=“display: none”>
<h5 class=“text-center pb-4”>your file is done encrypting!</h5>
<div class=“text-center row”>
<div class=“col-lg d-grid gap-2 pb-3”>
<asp:button id=“button5″ class=“btn btn-warning btn-lg” runat=“server” text=“downlaod ...”
onclientclick=“button5.click” usesubmitbehavior=“false”></asp:button>

19CS2K1053 43
RESTAURARANT MANAGEMNET SYSTEM Kristu Jayanti College(Autonomous)

</div>
<div class=“col-lg d-grid gap-2 pb-3″>
<button type=“button” class=“btn btn-secondary btn-lg reload” id=“reload-encrypt”>encrypt new file</button>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
<div class=“modal fade” id=“modal-decrypt” tabindex=“-1″ aria-labelledby=“examplemodallabel” aria-
hidden=“true”>
<div class=“modal-dialog modal-dialog-centered”>
<div class=“modal-content” style=“border: 5px solid #6c757d”>
<div class=“modal-body”>
<button type=“button” class=“btn-close” data-bs-dismiss=“modal” aria-label=“close”></button>
<img src=“encryption_style/file_encryption/images/unlock.png” alt=“unlocked lock” class=“mx-auto d-block
mb-3” height=“100″><br>
<div class=“model-form”>
<h5 class=“text-center”>decrypt file</h5>
<label class=“form-label”>password:</label>
<div class=“input-group mb-3″>
<asp:textbox id=“textbox2” class=“form-control” placeholder=“enter password here” aria-label=“recipient’s
username” aria-describedby=“button-addon2” required=“” runat=“server”></asp:textbox>
</div>
<div>
<label for=“formfile-key-decrypt” class=“form-label”>file:</label>
<asp:fileupload id=“fileupload3″ class=“form-control form-control” required=“” runat=“server” />
</div>
<br>
<div class=“d-grid gap-2″>

19CS2K1053 44
RESTAURARANT MANAGEMNET SYSTEM Kristu Jayanti College(Autonomous)

<asp:button id=“button7” cssclass=“btn btn-secondary btn-lg” runat=“server” text=“decrypt your file!”


usesubmitbehavior=“false” ></asp:button>
</div>
</div>
<div class=“loading” style=“display: none”>
<h5 class=“text-center pb-4″>decrypting your file...</h5>
<div class=“progress”>
<div class=“progress-bar progress-bar-striped bg-info progress-bar-animated encrypt-bar” role=“progressbar”
aria-valuenow=“75″ aria-valuemin=“0” aria-valuemax=“100″ style=“width: 10%“></div>
</div>
</div>
<div class=“downloading” id=“down-dec” style=“display: none”>
<h5 class=“text-center pb-4″>your file is done decrypting!</h5>
<div class=“text-center row”>
<div class=“col-lg d-grid gap-2 pb-3″>
<a type=“button” id=“download-decrypt” class=“btn btn-warning btn-lg”>download file</a>
</div>
<div class=“col-lg d-grid gap-2 pb-3″>
<button type=“button” class=“btn btn-secondary btn-lg reload” id=“reload-decrypt”>encrypt new file</button>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
<form >
<div class=“offcanvas offcanvas-top” tabindex=“-1” id=“offcanvastop” aria-labelledby=“offcanvastoplabel”>
<div class=“offcanvas-header alert-danger”>
<button type=“button” class=“btn-close text-reset” data-bs-dismiss=“offcanvas” aria-label=“close”
style=“margin-top: -17rem”></button>

19CS2K1053 45
RESTAURARANT MANAGEMNET SYSTEM Kristu Jayanti College(Autonomous)

</div>
</div>
<nav class=“navbar navbar-expand-lg sticky-top navbar-light bg-light px-4″>
<a class=“navbar-brand” href=“#”>
file encrypt
<img src=“encryption_style/file_encryption/images/key.png” alt=“key” class=“d-inline-block align-top”
width=“30″ height=“30”>
</a>
<button class=“navbar-toggler” type=“button” data-bs-toggle=“collapse” data-bs-target=“#navbarnav” aria-
controls=“navbarnav” aria-expanded=“false” aria-label=“toggle navigation”>
<span class=“navbar-toggler-icon”></span>
</button>
<div class=“collapse navbar-collapse” id=“navbarnav”>
<ul class=“navbar-nav ms-auto mb-2 mb-lg-0″>
<li class=“nav-item”>
<a class=“nav-link” href=“#features”>features</a>
</li>
<li class=“nav-item”>
<a class=“nav-link” href=“#cipher-text”>cipher text</a>
</li>
</ul>
</div>
</nav>
<div class=“b-example-divider”></div>
<div class=“px-4 py-5 my-5 text-center” id=“w1”>
<img class=“d-block mx-auto mb-4″ id=“main_img” src=“encryption_style/file_encryption/images/lock.png”
alt=“lock” width=“100″ height=“100”/>
<h1 class=“display-5 fw-bold “>spytech file encryptor</h1>
<div class=“col-lg-6 mx-auto”>
<p class=“lead mb-4″> aes has never been cracked yet <b>aes-256</b> </p>
<div class=“d-grid gap-2 d-sm-flex justify-content-sm-center”>

19CS2K1053 46
RESTAURARANT MANAGEMNET SYSTEM Kristu Jayanti College(Autonomous)

<button type=“button” class=“btn btn-warning btn-lg px-4 gap-3” data-toggle=“modal” data-target=“#modal-


encrypt”>encrypt a file</button>
<button type=“button” class=“btn btn-outline-secondary btn-lg px-4” data-toggle=“modal” data-target=“#modal-
decrypt”>decrypt a file</button>
</div>
</div>
</div>
<div class=“b-example-divider”></div>
<div class=“container px-4 py-5” id=“features”>
<h2 class=“pb-2 border-bottom”>features</h2>
<div class=“row row-cols-1 row-cols-lg-3 g-4 py-5″>
<div class=“col d-flex align-items-start”>
<img src=“encryption_style/file_encryption/images/encripted-file.png” alt=“encripted-file” class=“bi text-muted
flex-shrink-0 me-3″ width=“50” height=“50″>
<div>
<h4 class=“fw-bold mb-0 “>aes-256</h4>
<p>aes stands for advanced encryption standard. aes-256′s uses a encryption key that is 256 bits long! in sort a
supercomputer would take billions of years to crack a aes-256 encryption with a strong key.</p>
</div>
</div>
<div class=“col d-flex align-items-start”>
<img src=“encryption_style/file_encryption/images/private-detective.png” alt=“private-detective” class=“bi text-
muted flex-shrink-0 me-3″ width=“50” height=“50″>
<div>
<h4 class=“fw-bold mb-0 “>privacy</h4>
<p>no information about your files are sent to me or linked to you in anyway! we are blind to how you use the
site. to see what is collected see the privacy policy</p>
</div>
</div>
<div class=“col d-flex align-items-start”>
<img src=“encryption_style/file_encryption/images/document.png” alt=“document” class=“bi text-muted flex-
shrink-0 me-3″ width=“50” height=“50″>

19CS2K1053 47
RESTAURARANT MANAGEMNET SYSTEM Kristu Jayanti College(Autonomous)

<div>
<h4 class=“fw-bold mb-0 “>any file type</h4>
<p>you can encrypt any type of file you want. tip: want to encrypt many files at ones? why not compress them
into a zip file!</p>
</div>
</div>
</div>
</div>
<div class=“b-example-divider”></div>
</form>
</form>
<script src=“<a href=“https://code.jquery.com/jquery”>https://code.jquery.com/jquery</a>- 3.2.1.slim.min.js”
integrity=“sha384- kj3o2dktikvyik3uenzmm7kckrr/re9/qpg6aazgjwfdmvna/gpgff93hxpg5kkn”
crossorigin=“anonymous”></script>
<script src=“<a
href=“https://cdnjs.cloudflare.com/ajax/libs/popper.js/1.12.9/umd/popper.m”>https://cdnjs.cloudflare.com/ajax/li
bs/popper.js/1.12.9/umd/popper.m</a> in.js” integrity=“sha384-
apnbgh9b+y1qktv3rn7w3mgpxhu9k/scqsap7huibx39j7fakfpskvxusvfa0b4q”
crossorigin=“anonymous”></script>
<script src=“<a
href=“https://maxcdn.bootstrapcdn.com/bootstrap/4.0.0/js/bootstrap.min.js”>https://maxcdn.bootstrapcdn.com/b
ootstrap/4.0.0/js/bootstrap.min.js</a>” integrity=“sha384-
jzr6spejh4u02d8jot6vlehfe/jqgirrsqqxsffwpi1mquvdayjuar5+76pvcmyl”
crossorigin=“anonymous”></script>
</body
</html>
REPORT

<%@ page language=“vb” autoeventwireup=“false” codebehind=“user_profile.aspx.vb”


inherits=“spytech.user_profile” %>
<!doctype html>
<html xmlns=“<a href=“http://www.w3.org/1999/xhtml”>http://www.w3.org/1999/xhtml</a>“>
<head runat=“server”>
<title></title>

19CS2K1053 48
RESTAURARANT MANAGEMNET SYSTEM Kristu Jayanti College(Autonomous)

<link href=“<a
href=“https://maxcdn.bootstrapcdn.com/bootstrap/4.1.1/css/bootstrap.min.css”>https://maxcdn.bootstrapcdn.com
/bootstrap/4.1.1/css/bootstrap.min.css</a>” rel=“stylesheet”/>
<script src=“<a
href=“https://maxcdn.bootstrapcdn.com/bootstrap/4.1.1/js/bootstrap.min.js”>https://maxcdn.bootstrapcdn.com/b
ootstrap/4.1.1/js/bootstrap.min.js</a>“></script>
<script src=“<a
href=“https://cdnjs.cloudflare.com/ajax/libs/jquery/3.2.1/jquery.min.js”>https://cdnjs.cloudflare.com/ajax/libs/jq
uery/3.2.1/jquery.min.js</a>“></script>
<link rel=“stylesheet” href=“<a href=“https://cdnjs.cloudflare.com/ajax/libs/font-awesome/4.7.0/css/font-
awesome.min.css”>https://cdnjs.cloudflare.com/ajax/libs/font-awesome/4.7.0/css/font-awesome.min.css</a>“>
<script src=“profile/js/javascript1.js”></script>
<link href=“profile/css/stylesheet1.css” rel=“stylesheet” />
</head>
<body>
<div>
<div class=“container emp-profile”>
<form id=“form1” runat=“server” method =“post”>
<div class=“row”>
<div class=“col-md-4”>
<div class=“profile-img”>
<asp:image id=“imgprev” runat=“server” imageurl =“<a href=“https://examples.unclecoder.com/images/no-
image-found360x250.png”>https://examples.unclecoder.com/images/no-image-found360x250.png</a>”
height=“200” width=“220″ />
<div class=“file btn btn-lg btn-primary”>
change photo
<asp:fileupload id=“imgupload” accept=“image/xpng,image/gif,image/jpeg” onchange =“readurl(this);”
runat=“server” />
</div>
</div>
</div>
<div class=“col-md-6″>
<div class=“profile-head”>

19CS2K1053 49
RESTAURARANT MANAGEMNET SYSTEM Kristu Jayanti College(Autonomous)

<h5>
kshiti ghelani
</h5>
<h6>
web developer and designer
</h6>
<p class=“proile-rating”>
<asp:label id=“label1” runat=“server” text=“user id : “></asp:label><asp:label id=“user_id” runat=“server”
text=“4”></asp:label></p>
<ul class=“nav nav-tabs” id=“mytab” role=“tablist”>
<li class=“nav-item”>
<a class=“nav-link active” id=“home-tab” data-toggle=“tab” href=“#home” role=“tab” aria-controls=“home”
aria-selected=“true”>about</a>
</li>
</ul>
</div>
</div>
<div class=“col-md-2”>
<asp:textbox id=“search” runat=“server” cssclass=“ttt123″ textmode=“search” placeholder=“search...”
width=“250px” autocompletetype=“firstname”> </asp:textbox><asp:button id=“button2” runat=“server”
text=“button” />
<br />
<br />
<asp:button id=“button1″ class=“profile-edit-btn” runat=“server” text=“edit profile” />
</div>
</div>
<div class=“row”>
<div class=“col-md-4”>
<div class=“profile-work”>
<p>work link</p>
<a href=“”>website link</a><br/>

19CS2K1053 50
RESTAURARANT MANAGEMNET SYSTEM Kristu Jayanti College(Autonomous)

<a href=“”>bootsnipp profile</a><br/>


<a href=“”>bootply profile</a>
<p>skills</p>
<a href=“”>web designer</a><br/>
<a href=“”>web developer</a><br/>
<a href=“”>wordpress</a><br/>
<a href=“”>woocommerce</a><br/>
<a href=“”>php, .net</a><br/>
</div>
</div>
<div class=“col-md-8”>
<div class=“tab-content profile-tab” id=“mytabcontent”>
<div class=“tab-pane fade show active” id=“home” role=“tabpanel” aria-labelledby=“home-tab”>
<div class=“row”>
<div class=“col-md-6”>
<label>name</label>
</div>
<div class=“col-md-6″>
<asp:textbox id=“textbox2” cssclass=“ttt123″ runat=“server”></asp:textbox>
<br />
</div>
</div>
<div class=“row”>
<div class=“col-md-6”>
<label>gender</label>
</div>
<div class=“col-md-6″>
<div class=“col-md-6”>
<asp:textbox id=“textbox5″ cssclass=“ttt123” runat=“server”></asp:textbox>
<br />

19CS2K1053 51
RESTAURARANT MANAGEMNET SYSTEM Kristu Jayanti College(Autonomous)

</div>
</div>
<div class=“row”>
<div class=“col-md-6″>
<label>email</label>
</div>
<div class=“col-md-6”>
<asp:textbox id=“textbox7″ cssclass=“ttt123” runat=“server” readonly=“true”></asp:textbox>
<br />
</div>
</div>
<div class=“row”>
<div class=“col-md-6”>
<label>state</label>
</div>
<div class=“col-md-6″>
<asp:textbox id=“textbox1” cssclass=“ttt123″ runat=“server”></asp:textbox>
<br />
</div>
</div>
<div class=“row”>
<div class=“col-md-6”>
<label>city</label>
</div>
<div class=“col-md-6″>
<asp:textbox id=“textbox6” cssclass=“ttt123″ runat=“server”></asp:textbox>
<br />
</div>
</div>
</div>

19CS2K1053 52
RESTAURARANT MANAGEMNET SYSTEM Kristu Jayanti College(Autonomous)

<div class=“tab-pane fade” id=“profile” role=“tabpanel” aria-labelledby=“profile-tab”>


<div class=“row”>
<div class=“col-md-6”>
<label>experience</label>
</div>
<div class=“col-md-6″>
<p>expert</p>
</div>
</div>
<div class=“row”>
<div class=“col-md-6″>
<label>hourly rate</label>
</div>
<div class=“col-md-6”>
<p>10$/hr</p>
</div>
</div>
<div class=“row”>
<div class=“col-md-6”>
<label>total projects</label>
</div>
<div class=“col-md-6″>
<p>230</p>
</div>
</div>
<div class=“row”>
<div class=“col-md-6″>
<label>english level</label>
</div>
<div class=“col-md-6”>

19CS2K1053 53
RESTAURARANT MANAGEMNET SYSTEM Kristu Jayanti College(Autonomous)

<p>expert</p>
</div>
</div>
<div class=“row”>
<div class=“col-md-6”>
<label>availability</label>
</div>
<div class=“col-md-6″>
<p>6 months</p>
</div>
</div>
<div class=“row”>
<div class=“col-md-12″>
<label>your bio</label><br/>
<p>your detail description</p>
function readurl(input)
{
if (input.files && input.files[0])
{
var reader = new filereader();

reader.onload = function (e)


{
$(‘#<%= imgprev.clientid%>’)
<br/.
<br/>
<br/>
</div>
</form>
</body>
</html>

19CS2K1053 54
RESTAURARANT MANAGEMNET SYSTEM Kristu Jayanti College(Autonomous)

OUTPUT DESIGN

Login Page: ADMIN

LOGIN PAGE: CUSTOMER

19CS2K1053 55
RESTAURARANT MANAGEMNET SYSTEM Kristu Jayanti College(Autonomous)

ADMIN DASHBOARD:

19CS2K1053 56
RESTAURARANT MANAGEMNET SYSTEM Kristu Jayanti College(Autonomous)

Homepage:

REGISTRATION:

19CS2K1053 57
RESTAURARANT MANAGEMNET SYSTEM Kristu Jayanti College(Autonomous)

UPDATE ITEM DETAILS:

PAYMENT:

19CS2K1053 58
RESTAURARANT MANAGEMNET SYSTEM Kristu Jayanti College(Autonomous)

FEEDBACK:

MENU:

19CS2K1053 59
RESTAURARANT MANAGEMNET SYSTEM Kristu Jayanti College(Autonomous)

4. SYSTEM CONFIGURATION

4.1 Hardware requirements

RAM Recommended 4.00 GB

Hard disk 20 GB

Processor Intel(R) Core (TM) i3-1005G1

Processing speed CPU @ 1.8 GHz, 1190 MHz

4.2 Software Requirements:

Front end VB.NET, ASP.NET

Back end SQL

Tools Visual Studio

Operating System Windows 8 or later

19CS2K1053 60
RESTAURARANT MANAGEMNET SYSTEM Kristu Jayanti College(Autonomous)

5.DETAILS OF SOFTWARE

A development process consists of various phases, each phase ending with a defined output. The phases
are performed in an order specified by the process model being followed. The main reason for having a phased
process is that it breaks the problem of developing software into successfully performing a set of phases, each
handling a different concern of software development.
This ensures that the cost of development is lower than what it would have been if the whole problem
were tackled together. A phased development process is central to the software engineering approach for
solving the software crisis.
5.1 Overview of Front end
ASP.NET Frame Work
ASP.NET is a web development platform, which provides a programming model, a comprehensive
software infrastructure and various services required to build up robust web applications for PC, as well as
mobile devices.

ASP.NET works on top of the HTTP protocol, and uses the HTTP commands and policies to set a
browser-to-server bilateral communication and cooperation. The ASP.net application code is written in C3
language for the development of “RESTAURANT MANAGEMENT SYSTEM”.

PASSWORD HASHING

Hashing is a form of computer security that enables data integrity and authentication. Hashing, in most
cases, is mistaken with encryption. Hashing is different from encryption.

Hashing is a mathematical algorithm that converts plaintext to a unique text string or a ciphertext. Hashing
is a one-way function to scramble data — it takes readable text and transforms it into a completely different
string of characters with a set length

If passwords are kept in plain text, anyone with internal access can see them. Not to mention that if the
database gets breached, hackers would also see the credentials in plain view. So any company that follows
at least basic security practices will never actually keep your passwords in its database.

Instead, when you're logging into your account, your password is converted into a complicated string of
characters using password hashing algorithms. Then, the hashed password is compared to other hashes in
the company's database. If the password hash matches, you're granted access to your account.

19CS2K1053 61
RESTAURARANT MANAGEMNET SYSTEM Kristu Jayanti College(Autonomous)

5.2 MICROSOFT VISUAL STUDIO 2022

Microsoft Visual Studio 2022 is an integrated development environment (IDE) from Microsoft. It is used
to develop computer programs for Microsoft Windows, as well as web sites, web apps, web services and mobile
apps.Visual Studio uses Microsoft software development platforms such as Windows API, Windows Forms,
WindowsPresentation Foundation, Windows Store and Microsoft Silver light. It can produce both native code
and managedVisual Studio supports different programming languages and allows the code editor and debugger
to support nearlyany programming language, provided a language-specific service exists. Built-in languages
include C, C++, VisualC++ and VB.NET. Support for other languages such as Python, Ruby, Node.js, and M
among others is available via language services installed separately. It also supports XML/XSLT,
HTML/XHTML, JavaScript and CSS. Java (and J#) was supported in the past.
Microsoft provides a free version of Visual Studio called the Community edition that supports plug-in and
is available at no cost for all users. Support for programming languages is added by using a specific VSPackage
called a LanguageService. A language service defines various interfaces which the VSPackage implementation
can implement to add support for various functionalities. Functionalities that can be added this way include
syntaxcoloring, statement completion; brace matching, parameter information tooltips, member lists and error
markers for background compilation. If the interface is implemented, the functionality will be available for the
language. Language services are implemented on a per-language basis. The implementations can reuse code
from the parseror the compiler for the language. Language services can be implemented either in native code
or managed code. For native code, either the native COM interfaces or the Babel Framework can be used. For
managed code, the MPF includes wrappers for writing managed language services.
FEATURES
• Boolean Conditions
• Automatic Garbage Collection
• Standard Library
• Assembly Versioning
• Properties and Events
• Delegates and Events Management
• Easy-to-use Generics
• Indexers
• Conditional Compilation

19CS2K1053 62
RESTAURARANT MANAGEMNET SYSTEM Kristu Jayanti College(Autonomous)

ADVANTAGES
The structure of the Basic programming language is very simple, particularly as to the executable code.
• VB is not only a language but primarily an integrated, interactive development environment (“IDE“).
• The VB-IDE has been highly optimized to support rapid application development (“RAD”). It is
particularly easy to develop graphical user interfaces and to connect them to handler functions provided by
the application.
• The graphical user interface of the VB-IDE provides intuitively appealing views for the management of
the program structure in the large and the various types of entities (classes, modules, procedures, forms,
…)
• VB provides a comprehensive interactive and context-sensitive online help system.
• When editing program texts the “IntelliSense” technology informs you in a little popup window about the
types of constructs that may be entered at the current cursor location.
• VB is a component integration language which is attuned to Microsoft’s Component Object Model
(“COM”).
• COM components can be written in different languages and then integrated using VB.
• Interfaces of COM components can be easily called remotely via Distributed COM (“DCOM”), which
makes it easy to construct distributed applications.
• COM components can be embedded in / linked to your application’s user interface and also in/to stored
documents (Object Linking and Embedding “OLE”, “Compound Documents”).
• There is a wealth of readily available COM components for many different purposes.
• Visual Basic is built around the .NET environment used by all Microsoft Visual languages, so there is very
little that can’t be done in Visual Basic that can be done in other languages (such as C#).
DISADVANTAGES
• Visual basic is a proprietary programming language written by Microsoft, so programs written in Visual
basic cannot, easily, be transferred to other operating systems.
• There are some, fairly minor disadvantages compared with C. C has better declaration of arrays – it’s
possible to initialize an array of structures in C at declaration time; this is impossible in VB.
5.3 Overview of Back-End
MICROSOFT SQL SERVER 2012:

Microsoft SQL Server is a relational database management system developed by Microsoft. As a


database server, it is a software product with the primary function of storing and retrieving data as
requested by other software
19CS2K1053 63
RESTAURARANT MANAGEMNET SYSTEM Kristu Jayanti College(Autonomous)

Microsoft markets at least a dozen different editions of Microsoft SQL Server, aimed at different audiences
and for workloads ranging from small single-machine applications to large Internet-facing applications with
many concurrent users. The protocol layer implements the external interface to SQL Server. All operations that
can be invoked on SQL Server are communicated to it via a Microsoft-defined format, called Tabular Data
Stream (TDS).TDS is an application layer protocol, used to transfer data between a database server and a client.

Initially designed and developed by Sybase Inc. for their Sybase SQL Server relational database engine
in 1984, and later by Microsoft in Microsoft SQL Server, TDS packets can be encased in other physical transport
dependent protocols, including TCP/IP, named pipes, and shared memory. Consequently, access to SQL Server
is available over these protocols. In addition, the SQL Server API is also exposed over web services.

A Relational Data base Management System (RDBMS) is software that:

• Enables you to implement a database with tables, columns and indexes.

• Guarantees the Referential Integrity between rows of various tables.

• Updates the indexes automatically.

• Interprets an SQL query and combines information from various tables.

MySQL is a leading open source database management system. It is a multiuser, multithreaded database
management system. MySQL is especially popular on the web. It is one of the parts of the very popular LAMP
platform. Linux, Apache, MySQL and PHP. MySQL database is available on most important OS platforms. It
runson BSD Unix, Linux, Windows or Mac. Wikipedia, YouTube, Facebook use MySQL. These sites manage
millionsof queries each day. MySQL comes in two versions: MySQL server system and MySQL embedded
system. The MySQL server software and the client libraries are dual• licensed: GPL version 2 and proprietary
license. MySQL is a fast, easy-to-use RDBMS being used for many small and big businesses. MySQL is
developed, marketed, andsupported by MySQL AB, which is a Swedish company.

19CS2K1053 64
RESTAURARANT MANAGEMNET SYSTEM Kristu Jayanti College(Autonomous)

ADVANTAGES

• MySQL is becoming so popular because of many these reasons:

• MySQL is released under an open-source license. So you have nothing to pay to use it.

• MySQL is a very powerful program in its own right. It handles a large subset of the functionality of the
most expensive and powerful database packages.

• MySQL uses a standard form of the well-known SQL data language.

• MySQL works on many operating systems and with many languages including PHP, PERL, C, C++,
JAVA, etc.

• MySQL works very quickly and works well even with large data sets.

• MySQL is very friendly to PHP, the most appreciated language for web development.

• MySQL supports large databases, up to 50 million rows or more in a table.

• The default file size limit for a table is 4GB, but you can increase this (if your operating system can handle
it) to a theoretical limit of 8 million terabytes (TB).

• Features

• Internals and Portability

• Written in C and C++.

• Tested with a broad range of different compilers.

• Works on many different platforms..

• For portability,uses CMake in MySQL 5.5 and up. Previous series use GNU Automake, Autoconf, and
Libtool.

• Tested with Purify (a commercial memory leakage detector) as well as with Valgrind, a GPL tool.

• Uses multi-layered server design with independent modules.

• Designed to be fully multi-threaded using kernel threads, to easily use multiple CPUs if they are available.

• Provides transactional and non transactional storage engines.

19CS2K1053 65
RESTAURARANT MANAGEMNET SYSTEM Kristu Jayanti College(Autonomous)

Security

• A privilege and password system that is very flexible and secure, and that enables host-based verification.

• Password security by encryption of all password traffic when you connect to a server.

• Scalability and Limits

• Support for large databases. We use MySQL Server with databases that contain 50 million records. We
also know of users who use MySQL Server with 200,000 tables and about 5,000,000,000 rows.

• Support for up to 64 indexes per table. Each index may consist of 1 to 16 columns or parts of columns. The
maximum index width for in no DB tables is either 767 bytes or 3072 bytes. The maximum index width
for My ISAM tables is 1000 bytes. An index may use a prefix of a column for CHAR, VARCHAR, BLOB,
or TEXT column types.

• Connectivity

• Clients can connect to MySQL Server using several protocols:

• Clients can connect using TCP/IP sockets on any platform.

• On Windows systems, clients can connect using named pipes if the server is started with the --enable-
named-pipe option. Windows servers also support shared-memory connections if started with the --shared-
memory option. Clients can connect through shared memory by using the--protocol=memoryoption.

• On Unix systems, clients can connect using Unix domain socket files.

Localization

The server can provide error messages to clients in many languages.

• Full support for several different character sets, including latin l (cpl252), german, big5, ujis, several
Unicode character sets, and more. For example, the Scandinavian characters "a", "a" and "6" are permitted
in table and column names.

• All data is saved in the chosen character set.

19CS2K1053 66
RESTAURARANT MANAGEMNET SYSTEM Kristu Jayanti College(Autonomous)

• Sorting and comparisons are done according to the chosen character set and collation (using latin l and
Swedish collation by default). It is possible to change this when the MySQL server is started. To see an
example of very advanced sorting,

• look at the Czech sorting code. MySQL Server supports many different character sets that can be specified
at compile time and runtime.

• The server time zone can be changed dynamically, and individual clients can specify their own time zone.

• Clients and Tools

• MySQL includes several client and utility programs. These include both command-line programs and
graphical programs.

• MySQL Server has built-in support for SQL statements to check, optimize, and repair tables. These
statements are available from the command line through the mysqlcheck client.

• MySQL also includes myisamch, a very fast command-line utility for performing these ope rations on My
ISAM tables.

• MySQL programs can be invoked with the --help or -? option to obtain online assistance.

19CS2K1053 67
RESTAURARANT MANAGEMNET SYSTEM Kristu Jayanti College(Autonomous)

5.3 ABOUT THE PLATFORM

Windows is a series of Operating Systems developed by Microsoft. Each version of Windows includes
a Graphical User Interface, with a desktop that allows users to view files and folders in Windows. For the
past twodecades, Windows has been the most widely used operating system for personal computers PCs.

Microsoft Windows is designed for both home computing and professional purposes. Past versions of
Windowshome editions include Windows 3.0 (1990), Windows 3.1 (1992), Windows 95 (1995), Windows
98 (1998), Windows Me (2000), Windows XP (2001), and Windows Vista (2006). The current version,
Windows 7, was released in 2009.

The first business-oriented version of Windows, called Windows NT 3.1, was in 1993. This was
followed by Windows 3.5, 4.0, and Windows 2000. When Microsoft released Windows XP in 2001, the
company simply created different editions of the operating system for personal and business purposes.
Windows Vista and Windows 7 have followed the same release strategy. Windows is designed to run on
standard x86 hardware, suchas Intel and AMD processors. Therefore, it can be installed on multiple brands
of hardware, such as Dell, HP, and Sony computers, as well as home-built PCs. Windows 7 also includes
several touchscreen features, that allow the operating system to run on certain tablets and computers with
touchscreen display

19CS2K1053 68
RESTAURARANT MANAGEMNET SYSTEM Kristu Jayanti College(Autonomous)

6.TESTING

Testing is a vital part of software development, and it is important to start it as early as possible, and to
make testing a part of the process of deciding requirements. To get the most useful perspective on your
development project, it is worthwhile devoting some thought to the entire lifecycle including how feedback
fromusers will influence the future of the application. The tools and techniques we've discussed in this book
should help your team to be more responsive to changes without extra cost, despite the necessarily wide
variety of different development processes. Nevertheless, new tools and process improvements should be
adopted gradually, assessing the results after each step.
Testing is part of a lifecycle. The software development lifecycle is one in which you hear of a need, you
write some code to fulfil it, and then you check to see whether you have pleased the stakeholders—the users,
owners, and other people who have an interest in what the software does. Hopefully they like it, but would
also like some additions or changes, so you update or augment your code; and so the cycle continues, or
every few years.

SOFTWARE TESTING TYPES:

Functional Testing: This type of testing ignores the internal parts and focus on the output is as per requirement or not.
Black box testing – Internal system design is not considered in this type of testing. Tests are based on
requirements and functionality.
White box testing – This testing is based on knowledge of the internal logic of an application’s code. Also known
as Glass box Testing. Internal software and code working should be known for this type of testing. Tests are
based on coverage of code statements, branches, paths, conditions.
Unit testing – Testing of individual software components or modules. Typically done by the programmer and
not by testers, as it requires detailed knowledge of the internal program design and code. May require developing
test drive modules or test harnesses.
System testing – Entire system is tested as per the requirements. Black-box type testing that is based on overall
requirements specifications, covers all combined parts of a system.

19CS2K1053 69
RESTAURARANT MANAGEMNET SYSTEM Kristu Jayanti College(Autonomous)

Acceptance testing -Normally this type of testing is done to verify if system meets the customer specified
requirements. User or customers do this testing to determine whether to accept application.
Alpha testing – In house virtual user environment can be created for this type of testing. Testing is done at the
end of development. Still minor design changes may be made as a result of such testing.

Security testing – Can system be penetrated by any hacking way. Testing how well the system protects against
unauthorized internal or external access. Checked if system, database is safe from external attacks.
Usability testing – User-friendliness check. Application flow is tested, Can new user understand the
applicationeasily, Proper help documented whenever user stuck at any point, basically system navigation is
checked in thistesting.

19CS2K1053 70
RESTAURARANT MANAGEMNET SYSTEM Kristu Jayanti College(Autonomous)

7. CONCLUSION AND FUTURE ENHANCEMENT

CONCLUSION
The Restaurant Management System’s objective is to provide the platform which manages the activity of the
customer and the products. It can update or delete the product details according to further information provided. The
admin will consume less amount of time when compared to manual work through the application system. The system
will take care of all servicing activity in quick manner.
Some existing system does not have this facility to handle this marketing and purchasing system in a smoot
manner. There is a lot more to be done in order to provide a 100% secure platform for the products which wants to be
taken with more description and also to make it more flexible.

FUTURE ENHANCEMENT
A website application can be created because it is helpful in different ways such as it reduces the travel
expenses of the customer as well as the products to be delivered to the customer location. The customer can order from
his own location.
Above discussion clearly indicate the online purchasing and managing system is so convenient instead of manual work.
We can do it in a better way by providing our software and the customer can purchase the product anywhere anytime.
This also provides high level of convenience

19CS2K1053 71
RESTAURARANT MANAGEMNET SYSTEM Kristu Jayanti College(Autonomous)

8. BIBILIOGRAPHY

Web References:
1. https://www.freecodecamp.org/news/what-is-hashing/
2. https://www.c-sharpcorner.com/blogs/encrypt-and-decrypt-a-string-in-asp-net1
3. https://www.kaspersky.com/resource-center/definitions/what-is-cryptography
4. https://www.youtube.com
5. https://dotnet.microsoft.com/apps/aspnet
6. https://www.w3schools.com/w3css/w3css_templates.asp
7. https://www.freecodecamp.org/news/what-is-hashing/
8. https://www.c-sharpcorner.com/blogs/encrypt-and-decrypt-a-string-in-asp-net1
9. https://www.kaspersky.com/resource-center/definitions/what-is-cryptography
10. https://www.asptutor.net/
11. https://dotnet.microsoft.com/apps/aspnet
12. https://www.w3schools.com/w3css/w3css_templates.asp

Books.
• Visual Basic .Net Black Book by Steven Holzner
• Microsoft Visual Basic 2022 for windows, Web and Database Applications: Comprehensive (Shelly
Cashman)
• Visual Basic 2015 in 24 hours, Sams Teach Yourself
• Murach’s Visual Basic 2015
• Visual Basic and Databases: a Step-by-Step database Programming Tutorial

19CS2K1053 72
RESTAURARANT MANAGEMNET SYSTEM Kristu Jayanti College(Autonomous)

9. APPENDICES A – Table Structure


Table Name: Register
Description: Contains user details along with login details
Name Data type Constraints
Id Int Primary key
Name Varchar (50) Not null
Gender Varchar (10) Not null
Phone Numeric (10) Not null
Email Varchar (50) Not null
Password Varchar (50) Not null
Salt Varchar (MAX) Not null
DOB Varchar (20) Not null
City Varchar (50) Not null
State Varchar (50) Not null
User type Varchar (50) Not null
Status Varchar (50) Not null
Image image Not null

Table Name: Complaint


Description: Details of Complaints
Name Data type Constraints
C_no Int Primary key
U_id int Foreign Key
Name Varchar (50) Not null
Phone Numeric (10) Not null
Email Varchar (50) Not null
State Varchar (50) Not null
Complain Against Varchar (50) Not null
Complaint details Varchar (MAX) Not null
Complain status Varchar (50) Not null

19CS2K1053 73
RESTAURARANT MANAGEMNET SYSTEM Kristu Jayanti College(Autonomous)

Table Name: RESTAURANT MANAGEMENT


Description: Details of criminals Criminal Records – Details of criminals

Name Data type Constraints


C_id Int Primary Key
u-id Int Foreign Key
Name Varchar (50) Not null
Gender Varchar (10) Not null
Phone Numeric (10) Not null
DOB Varchar (20) Not null
Complexion Varchar (50) Not null
height Varchar (50) Not null
Type of Crime Varchar (50) Not null
Address Varchar (MAX) Not null
photo Image Not Null
Identification Mark Varchar (MAX) Not Null
Status Varchar (50) Not null

19CS2K1053 74
RESTAURARANT MANAGEMNET SYSTEM Kristu Jayanti College(Autonomous)

11. APPENDICES B– TEST CASES

SL. TESTCASE TEST STEPS TO TEST EXECUTED ACTUAL STAT


NO ID DESCRIPT EXECUTE DATA RESULTS RESULTS US
ION

1 TC_01 Valid username Enter valid Username System should Informatio Pass
and Password : Lavanya specify warning n message
with blank fields username and message has been
click OK displayed
button

2 TC_02 Valid username Enter valid Username System should Informatio Pass
and invalid : Spoorthy specify warning n message
password username and message has been
invalid displayed
password and Password:
click OK button
963206

3 TC_03 Invalid Enter Invalid Username System should Informatio Pass


username and username and : specify warning n message
valid password valid password message has been
and click OK user displayed
button Password:
963206

19CS2K1053 75
RESTAURARANT MANAGEMNET SYSTEM Kristu Jayanti College(Autonomous)

4 TC_04 Invalid Enter Invalid Username System should Informatio Pass


username and username and : 9523 specify warning n message
Invalid Invalid message has been
password password and Password: displayed
click OK 4654
button

5 TC_05 Valid username Enter Valid Username System should username Pass
username and authenticate the and
:
username and
Hacker_boi
password
Password:
963206
6 TC_06 Register form Enter valid Username System should Informatio n Pass
username and specify warning message has
usesrnam : Password:
click OK button message been
e and displayed
password empty
7 TC_07 Register Enter same Password System should Informatio n Pass
password password specify warning message has
: skm123
confirm message been
confirm passw
password o Confirm displayed
mismatch
Password:

Skm456
8 TC_08 Register form Enter a valid Email System should Informatio n Pass
email format specify warning message has
email : lava456@
incorrect message been
.com displayed

9 TC_09 username and Null Username System should Informatio n Pass


Password with specify warning message has
:
blank fields message been
displayed
Password:
10 TC_10 Valid ph Enter the valid Phone System should Informatio Pass
number phone number authenticate the
Number: n message
password
0222 has been
displayed

19CS2K1053 76
RESTAURARANT MANAGEMNET SYSTEM Kristu Jayanti College(Autonomous)

10. APPENDICES B – SCREENSHOTS


LOGIN PAGE:

HOMEPAGE

19CS2K1053 77
RESTAURARANT MANAGEMNET SYSTEM Kristu Jayanti College(Autonomous)

Menu Page:

Cart Page:

19CS2K1053 78
RESTAURARANT MANAGEMNET SYSTEM Kristu Jayanti College(Autonomous)

Signup page:

ADMIN DASHBOARD:

19CS2K1053 79
RESTAURARANT MANAGEMNET SYSTEM Kristu Jayanti College(Autonomous)

REGISTRATION:

UPDATE ITEM DETAILS:

19CS2K1053 80
RESTAURARANT MANAGEMNET SYSTEM Kristu Jayanti College(Autonomous)

PAYMENT:

FEEDBACK:

19CS2K1053 81
RESTAURARANT MANAGEMNET SYSTEM Kristu Jayanti College(Autonomous)

12.APPENDICES D – SOURCE CODE

Login Page:

Imports System.Data.SqlClient
Imports System.IO
Imports System.Drawing.Imaging
Imports System.Text.RegularExpressions
Imports System.Data.DataTable
Imports System.Net
Imports System.Net.Mail
Public Class Login
Inherits System.Web.UI.Page
Dim cmd2 As New SqlCommand
Dim dr As SqlDataReader
Dim con As New SqlConnection
Dim cmd As New SqlCommand
Dim password_confirm As String
Dim email As String
Dim randomnumber As String
Dim user_type As String
Dim salt As String
Public Sub Connect()
If con.State = ConnectionState.Closed Then
con.ConnectionString = “Data Source=(LocalDB)\v11.0;AttachDbFilename=C:\Users\Lava\Documents\Visual
Studio 2013\Projects\SpyTech\SpyTech\App_Data\Spytech.mdf;Integrated Security=True”
con.Open()
Else
con.Dispose()
Connect()
End If
End Sub
Protected Sub Page_Load(ByVal sender As Object, ByVal e As System.EventArgs) Handles Me.Load
End Sub
Protected Sub Button1_Click(sender As Object, e As EventArgs) Handles Button1.Click
Try
Connect()
Dim stmt As String = “Select * from Register where Email=@email”
cmd = New SqlCommand(stmt, con)
cmd.Parameters.AddWithValue(“@email”, TextBox1.Text)
Dim dr As SqlDataReader
dr = cmd.ExecuteReader()
While dr.Read

19CS2K1053 82
RESTAURARANT MANAGEMNET SYSTEM Kristu Jayanti College(Autonomous)

salt = dr(“salt”)
password_confirm = dr(“Password”)
email = dr(“Email”)
user_type = dr(“User_type”)
End While
dr.Close()
Dim password = Hashing.hashsha512(TextBox2.Text)
Dim hashedandsalted = Hashing.hashstring(String.Format(“{0}{1}“, password, salt))
If email = TextBox1.Text And password_confirm = hashedandsalted And user_type = “Admin” Then
Session(“email”) = TextBox1.Text
MsgBox(“Logged in as Admin”)
Response.Redirect(“homepage_spytech.aspx”)
ElseIf email = TextBox1.Text And password_confirm = hashedandsalted And user_type = “User” Then
Session(“email”) = TextBox1.Text
Response.Write(“<script LANGUAGE=‘JavaScript’ >alert(‘Logged in as User ’)</script>“)
MsgBox(“Logged in as User”)
Response.Redirect(“user_homepage.aspx”)
Else
MsgBox(“Login failed”)
Exit Sub
End If
Catch ex As Exception
Response.Write(“An Error Occurred: ” & ex.ToString())
End Try
End Sub
Protected Sub Button4_Click(sender As Object, e As EventArgs) Handles Button4.Click
Try
Dim smtp_server As New SmtpClient
Dim e_mail As New MailMessage
smtp_server.UseDefaultCredentials = False
smtp_server.Credentials = New Net.NetworkCredential(“”, “Password@1326″)
smtp_server.Port = 587
smtp_server.EnableSsl = True
smtp_server.Host = “smtp.gmail.com”
e_mail = New MailMessage()
e_mail.From = New MailAddress(“”)
e_mail.To.Add(emailid.Text)
e_mail.IsBodyHtml = True
e_mail.Subject = “Verification OTP - Password Reset”
Dim rn As New Random
randomnumber = (rn.Next(100000, 999999)).ToString
e_mail.Body = “<html> <h4> Dear User, <h4><body> <p><strong> ” + randomnumber + “</strong> is your
SpyTech Verification Code for Resetting the Password </p> <p><b><u> Note </u>:</b><i>Please do not share

19CS2K1053 83
RESTAURARANT MANAGEMNET SYSTEM Kristu Jayanti College(Autonomous)

this OTP to anyone <br> This OTP is valid for 2 minutes</i> </p></body><h4>Thank You,<br>Restaurant
Management System
</h4></html>”
smtp_server.Send(e_mail)
Session(“otp”) = randomnumber
Session(“mail_for_reset_pass”) = emailid.Text
Response.Redirect(“forgot_password.aspx”)
Catch ex As Exception
MsgBox(ex.Message)
End Try
End Sub
Protected Sub Button3_Click(sender As Object, e As EventArgs) Handles Button3.Click
Dim otp_verif As String = TextBox4.Text + TextBox5.Text + TextBox6.Text + TextBox7.Text +
TextBox8.Text + TextBox9.Text
If otp_verif = 123456 Then
Session(“mail_for_reset_pass”) = emailid.Text
Response.Redirect(“Reset_Passwordaspx.aspx”)
Else
MsgBox(“Wrong OTP”)
Exit Sub
End If
End Sub
End Class

FORGOT PASSWORD

Public Class
Reset_Passwordaspx
Inherits
System.Web.UI.Page Dim
cmd2 As New
SqlCommand Dim con As
New SqlConnection Dim
cmd As New SqlCommand
Dim email As String
Protected Sub Page_Load(ByVal sender As Object, ByVal e As System.EventArgs)
Handles Me.Load email = Session(“mail_for_reset_pass”)
End Sub
Protected Sub Button1_Click(sender As Object, e As EventArgs) Handles
Button1.Click Try
If TextBox1.Text =
TextBox2.Text Then Connect()
Dim salt = Hashing.generatesalt()
Dim password = Hashing.hashsha512(TextBox2.Text)
Dim hashedandsalted = Hashing.hashstring(String.Format(“{0}{1}“, password ,

19CS2K1053 84
RESTAURARANT MANAGEMNET SYSTEM Kristu Jayanti College(Autonomous)

salt)) cmd.Connection = con


cmd.CommandText = “Update Register Set Password = @hashedpass,salt = @sal t where
Email = @email_id” cmd.Parameters.Add(“@hashedpass”, SqlDbType.VarChar).Value =
hashedandsal ted cmd.Parameters.Add(“@salt”, SqlDbType.VarChar).Value = salt
cmd.Parameters.Add(“@email_id”, SqlDbType.VarChar).Value =
email cmd.ExecuteNonQuery()
MsgBox(“Password Changed”)

Else
MsgBox(“Plz Enter Correct
Password”) End IF
Catch ex As Exception
Response.Write(“An Error Occurred: ” &
ex.ToString()) End Try
End
Sub
End
Class

SIGN UP :

Public Class Signup


Inherits
System.Web.UI.Page Dim
cmd2 As New
SqlCommand Dim dr As
SqlDataReader
Dim con As New
SqlConnection Dim adapter
As SqlDataAdapter
Protected Sub Page_Load(ByVal sender As Object, ByVal e As System.EventArgs)
Handles Me.Load End Sub
Public Sub Connect()
If con.State = ConnectionState.Closed Then
con.ConnectionString = “Data
Source=(LocalDB)\v11.0;AttachDbFilename=C:\Users\dhanu\Documents\Visual Studio
2013\Projects\SpyTech\SpyTech\App_Data\Spytech.mdf;Integrated Security=True”
con.Open()
Else
con.Dispos
e()
Connect()
End If
End Sub
Protected Sub Button1_Click(sender As Object, e As EventArgs) Handles Button1.Click
If TextBox1.Text = Nothing And TextBox2.Text = Nothing And TextBox3.Text = Nothing And TextBox4.Text
19CS2K1053 85
RESTAURARANT MANAGEMNET SYSTEM Kristu Jayanti College(Autonomous)

= Nothing Then MsgBox(“Enter proper Details”)


Exit
Sub
End If
Dim hash_pass =
Hashing.hashsha512(TextBox3.Text) Dim salt
= Hashing.generatesalt()

Dim hashedandsalted = Hashing.hashstring(String.Format(“{0}{1}“, hash_pass, salt))

Try
If con.State = ConnectionState.Closed Then
Dim cmd As New SqlCommand(“insert into
Register(Name,Email,Password,User_type,Status,salt)
values(@Name,@Email,@Password,@User_type,@status,@salt)“, con)
cmd.Parameters.Add(“@Name”, SqlDbType.VarChar).Value = TextBox1.Text
cmd.Parameters.Add(“@Email”, SqlDbType.VarChar).Value = TextBox2.Text
cmd.Parameters.Add(“@Password”, SqlDbType.VarChar).Value = hashedandsalted
cmd.Parameters.Add(“@User_type”, SqlDbType.VarChar).Value = “User”
cmd.Parameters.Add(“@status”, SqlDbType.VarChar).Value = “Active”
cmd.Parameters.Add(“@salt”, SqlDbType.VarChar).Value = salt
Connect()
If cmd.ExecuteNonQuery() =
1 Then MsgBox(“User Signed
Up”)
’Response.Write(“<script LANGUAGE=‘JavaScript’ >alert(‘Insertion Successful’)</script>“)

STAFF PROFILE

Imports
System.Data.SqlClient
Imports System.IO
Imports System.Drawing.Imaging
Imports
System.Text.RegularExpressions
Imports System.Data.DataTable
Public Class
user_profile Inherits
System.Web.UI.Page

19CS2K1053 86
RESTAURARANT MANAGEMNET SYSTEM Kristu Jayanti College(Autonomous)

Dim cmd2 As New


SqlCommand Dim dr As
SqlDataReader
Dim dr2 As SqlDataReader
Dim con As New
SqlConnectionDim cmd As
New SqlCommand Public
Sub Connect()
If con.State = ConnectionState.Closed Then
con.ConnectionString = “Data
Source=(LocalDB)\v11.0;AttachDbFilename=C:\Users\dhanu\Documents\Visual Studio
2013\Projects\SpyTech\SpyTech\App_Data\Spytech.mdf;Integrated Security=True”
con.Open()
Else
con.Dispos
e()
Connect()
End If
End Sub
Protected Sub Page_Load(ByVal sender As Object, ByVal e As System.EventArgs)
Handles Me.Load End Sub
Protected Sub Button1_Click(sender As Object, e As EventArgs) Handles Button1.Click

Try
Connect
()
cmd2.Connection = con
cmd2.CommandText = “Update Register Set Name = ‘” & TextBox2.Text & “’ , Gender = ‘” &
DropDownList1.Text & “’ ,DOB = ‘” & TextBox4.Text & “’ , Phone = ‘” & TextBox5.Text & “’ ,State = ‘” &
TextBox1.Text & “‘, image=@img where u_id = ” & User_id.Text & “”
Dim imagefilelenth As Integer =
ImgUpload.PostedFile.ContentLength Dim imgarray As
19CS2K1053 87
RESTAURARANT MANAGEMNET SYSTEM Kristu Jayanti College(Autonomous)

Byte() = New Byte(imagefilelenth - 1) {}


Dim image As HttpPostedFile = ImgUpload.PostedFile
image.InputStream.Read(imgarray, 0, imagefilelenth)
cmd2.Parameters.AddWithValue(“@img”, SqlDbType.Image).Value
= imgarraydr2 = cmd2.ExecuteReader
MsgBox(“Updated
”) Catch ex As
Exception
MsgBox(ex.Messa
ge)
cmd2.CommandText = “Update Register Set Name = ‘” & TextBox2.Text & “’ , Gender = ‘” &
DropDownList1.Text & “’ ,DOB = ‘” & TextBox4.Text & “’ , Phone = ‘” & TextBox5.Text & “’ ,State = ‘” &
TextBox1.Text & “’ where u_id = ” & User_id.Text & “”
End Try
image-found- 360x250.png”>https://examples.unclecoder.com/images/no-
image-found-360x250.png</a>”
End Sub
Public Sub search_data(valuetosearch
As String) Connect()
Dim dt As New DataTable
cmd = New SqlCommand(“Select * from Register where concat(Name,u_id) like ‘%” &
search.Text & “%‘“, con) dr = cmd.ExecuteReader
While dr.Read

User_id.Text =
dr(“u_id”)
TextBox2.Text
=dr(“Name”) Try
DropDownList1.Text =
dr(“Gender”) TextBox4.Text =
dr(“DOB”) TextBox5.Text =

19CS2K1053 88
RESTAURARANT MANAGEMNET SYSTEM Kristu Jayanti College(Autonomous)

dr(“Phone”) TextBox1.Text =
dr(“State”) TextBox6.Text =
dr(“City”) TextBox7.Text =
dr(“Email”)
Catch ex As Exception
TextBox7.Text =
dr(“Email”) End Try
End
While
dr.Close
() Try
Dim Data As New DataTable
Dim adapter As New SqlDataAdapter
adapter = New SqlDataAdapter(“select image from Register where u_id = ‘” &
User_id.Text & “’”, con) Dim commandbuild As New SqlCommandBuilder(adapter)
adapter.Fill(Data)
Dim picbyte() As Byte = Data.Rows(0).Item(“Image”)
Dim base64String As String = Convert.ToBase64String(picbyte)
imgPrev.ImageUrl = String.Format(“data:image/jpg;base64,{0}“,
base64String) Catch ex As Exception
MsgBox(“erro
r”) End Try
End Sub
Protected Sub search_TextChanged(sender As Object, e As EventArgs) Handles
search.TextChanged End Sub
Protected Sub DropDownList1_SelectedIndexChanged(sender As Object, e As EventArgs) Handles
DropDownList1.SelectedIndexChanged
End Sub
End Class
REPORT

19CS2K1053 89
RESTAURARANT MANAGEMNET SYSTEM Kristu Jayanti College(Autonomous)

Public Class report


Inherits System.Web.UI.Page
Dim j1, j2, j3, j4, j5 As New
SqlCommand Dim dt As New
DataTable
Dim dv As New
DataView Dim da As
SqlDataAdapter
Dim con As New SqlConnection
Dim cmd, cmd2, cmd3, cmd4, cmd5 As New
SqlCommand Public Sub Connect()
If con.State = ConnectionState.Closed Then con.ConnectionString = “Data
Source=(LocalDB)\v11.0;AttachDbFilename=C:\User s\dhanu\Documents\Visual Studio
2013\Projects\SpyTech\SpyTech\App_Data\Spytech.mdf;Integrated Security=True”
con.Open()
Else
con.Dispos
e()
Connect()
End If
End Sub
Sub
King()
Label6.Text = “Bar
Chart” Dim b1, b2, b3,
b4 As String b1 =
“Karnataka”
b2 = “Andhra
Pradesh” b3 =
“Kerla”
b4 = “Tamil
Nadu” Try
Connect()
Chart1.Series(“Series1”).ChartType = SeriesChartType.Column
j1.CommandText = “select count(*) from Complaints where state_1 = ’” & b1 & “‘and complaint_date
between’” & from.Text & “′ and ‘” & todate.Text & “‘”
19CS2K1053 90
RESTAURARANT MANAGEMNET SYSTEM Kristu Jayanti College(Autonomous)

j2.CommandText = “select count(*) from Complaints where state_1 = ’” & b2 & “‘and complaint_date
between’” & from.Text & “′ and ‘” & todate.Text & “‘”
j3.CommandText = “select count(*) from Complaints where state_1 = ’” & b3 & “‘and complaint_date
between’” & from.Text & “′ and ‘” & todate.Text & “‘”
j4.CommandText = “select count(*) from Complaints where state_1 = ’” & b4 & “‘and complaint_date
between’” & from.Text & “′ and ‘” & todate.Text & “‘”
FEEDBACK

Public Class enc_dec


Inherits System.Web.UI.Page
Private IV As Byte() = {234, 12, 52, 44, 214, 222, 200, 109, 2, 98, 45, 76, 88, 53, 2 3, 78}
Private keydate As String = DateTime.Now.ToString(“yyyy/MM/dd HH:mm:ss.fff”)
Dim aes As AesCryptoServiceProvider = New AesCryptoServiceProvider()
Public Shared Function hashmd5(str As String) As String
Dim md5 As New MD5CryptoServiceProvider
Dim bytes() As Byte = md5.ComputeHash(System.Text.Encoding.ASCII.GetBytes(str))
Dim s As String
For Each i As Byte In bytes
s = s & i.ToString(“x2″)
Next
Return s
End Function
Public Function Encrypt(ByVal inputString As String) As String
Dim hash As String = hashmd5(keydate)
Dim key_byte As Byte() = Encoding.UTF8.GetBytes(hash)
secret_key.Text = hash
Dim buffer As Byte() = Encoding.ASCII.GetBytes(inputString)
aes.Mode = CipherMode.CBC
Dim ITransform As ICryptoTransform = aes.CreateEncryptor(key_byte, IV)
Return Convert.ToBase64String(ITransform.TransformFinalBlock(buffer, 0, buffer.Le ngth))
hash = Nothing
key_byte = Nothing
End Function
Public Function Decrypt(ByVal inputString As String) As String
Try
If secret_key.Text = Nothing Then
Response.Write(“<script LANGUAGE=‘JavaScript’ >alert(‘Please Enter the se cret Key’)</script>“)
19CS2K1053 91
RESTAURARANT MANAGEMNET SYSTEM Kristu Jayanti College(Autonomous)

Exit Function
End If
Dim buffer As Byte() = Convert.FromBase64String(inputString)
Dim hashed_key As String = secret_key.Text
Dim key As Byte() = Encoding.UTF8.GetBytes(hashed_key)
Dim ITransform As ICryptoTransform = aes.CreateDecryptor(key, IV)
Return Encoding.ASCII.GetString(ITransform.TransformFinalBlock(buffer, 0, buf fer.Length))
Catch ex As Exception
Response.Write(“<script LANGUAGE=‘JavaScript’ >alert(ex.Exception)</script>“)
End Try
End Function
Protected Sub Button1_Click(sender As Object, e As EventArgs) Handles Button1.Click
Dim msg As String = Encrypt(input.Text)
output.Text = msg
End Sub

19CS2K1053 92

You might also like