JP INSTITUTE OF ENGINEERING & TECHNOLOGY

,
MEERUT

“E-MART.COM”
SUBMITTED IN PARTIAL FULFILLMENT OF THE
REQUIREMENTS
FOR THE AWARD OF THE DEGREE OF
BACHELOR OF TECHNOLOGY
IN
COMPUTER SCIENCE & ENGINEERING

SESSION: 2010-11
SUBMITTED BY
ROLL NO:0728210051
ROLL NO:0228210016
ROLL NO:0728210017
ROLL NO:0728210009

SUJEET KR. SINGH
ASHOK KUMAR
ASHWANI KR. DESHWAL
ANAND GUPTA

UNDER THE GUIDANCE OF “MR. SANJEEV KUMAR SHARMA”
PROJECT GUIDE “MR. MAYANK SINGH”

SUBMITTED TO
UTTAR PRADESH TECHNICAL UNIVERSITY, LUCKNOW

1

JP INSTITUTE OF ENGINEERING &
TECHNOLOGY, MEERUT

“E-MART.COM”

SUBMITTED BY –

ROLL NO:0728210051
ROLL NO:0228210016
ROLL NO:0728210017
ROLL NO:0728210009

SUJEET KR. SINGH
ASHOK KUMAR
ASHWANI KR. DESHWAL
ANAND GUPTA

SESSION: 2010-11

2

TABLE OF CONTENTS

CERTIFICATES….................................................................................................6
DECLARATION…………………………………………………………………10
ACKNOWLEDGEMENTS ...................................................................................11
ABSTRACT ............................................................................................................12
LIST OF TABLES...................................................................................................13

CHAPTER:1
PROBLEM DESCRIPTION……………………………………………………14
INTRODUCTION………………………………………………………………..15
1.1 BACKGROUND OF THE PROBLEM……………………………………...17
1.3 OBJECTIVES…………………………………………………………………18

CHAPTER:2
LITERATURE SURVEY………………………………………………………19
2.1 SYSTEM DEVELOPMENT METHODOLOGY……………………………28
2.2 REQUIREMENT ANALYSIS……………………………………………….30
2.3 PROJECT REQUIREMENT ………………………………………………...30
2.4 FEASIBILITY STUDY……………………………………………………... 30
2.5 BLOCK DIAGRAM ………………………………………………………...33
2.6 MODELLING………………………………………………………………..35

3

89 5...2 USE CASES…………………………………………………...44 3.29 2..47 4.98 4 .93 6...1 MODULE SPECIFICATION………………………………………………45 3.3 CODING………………………………………………………….3 INTERFACE TESTING…………………………………....33 CHAPTER:3 DESIGN…………………….68 CHAPTER:5 TESTING…………………………………………………………………….1 TOOLS.…………………………………………………..……..2 TABLES USED……………………………………………………………….2 WHITE-BOX TESTING………………………………….DIAGRAM ……….3 ER.....2 TECHNOLOGY OVERVIEW OF THE PROJECT 49 4...91 CHAPTER:6 SNAPSHOTS AND TABLES USED……………………………………………92 6........1 SNAPSHOTS………………………………………………………………….......30 2........2..4 TESTING PROCESS…………………………………….1 FLOWCHART……………………………………………………...2 FORMS NAME…………………………….6..………………………………………….88 5.……….. PLATFORM & LANGUAGE USED……………………………48 4.6.46 CHAPTER:4 CODING………………………………………………………………………..……….6.87 5...1 BLACK-BOX TESTING…………………………………88 5.

CHAPTER:7 MAINTENANCE & CONCLUSION…………………………………………...1 MAINTENANCE…………………………………………………………….2 LIMITATIONS……………………………………………………………….105 7..102 7..………...104 7.106 5 .103 7.3 CONCLUSION…………………………………………………………….4 REFERENCES………………………………………………………..…..

COM” which is submitted by SUJEET KR. Meerut. MAYANK SINGH SHARMA Project Guide (Asst.CERTIFICATE This is to certify that this Project Report entitled “E-MART. SANJEEV KUMAR (Head of the Department) Date: __/__/____ 6 . Prof. of JP INSTITUTE OF ENGINEERING & TECHNOLOGY. CSE) MR. having Roll No 0728210051 . affiliated to UTTAR PRADESH TECHNICAL UNIVERSITY. for the award of degree of Bachelor of Technology in Department of Computer Science & Engineering. is carried out by him under my supervision. The matter embodied in this Project Work has not been submitted earlier for award of any degree or diploma in any university/institution to the best of our knowledge and belief. MR. Lucknow. in the partial fulfillment. SINGH.

affiliated to UTTAR PRADESH TECHNICAL UNIVERSITY. MAYANK SINGH SHARMA Project Guide (Asst. CSE) MR. of JP INSTITUTE OF ENGINEERING & TECHNOLOGY.COM” which is submitted by ASHOK KUMAR . Lucknow. Prof. MR. is carried out by him under my supervision. having Roll No 0728210016. SANJEEV KUMAR (Head of the Department) Date: __/__/____ 7 . for the award of degree of Bachelor of Technology in Department of Computer Science & Engineering. in the partial fulfillment. Meerut. The matter embodied in this Project Work has not been submitted earlier for award of any degree or diploma in any university/institution to the best of our knowledge and belief.CERTIFICATE This is to certify that this Project Report entitled “E-MART.

Prof. CSE) MR. for the award of degree of Bachelor of Technology in Department of Computer Science & Engineering.CERTIFICATE This is to certify that this Project Report entitled “E-MART. Meerut. of JP INSTITUTE OF ENGINEERING & TECHNOLOGY. MR. is carried out by him under my supervision. Lucknow. SANJEEV KUMAR (Head of the Department) Date: __/__/____ 8 . having Roll No 0728210017. in the partial fulfillment. DESHWAL. affiliated to UTTAR PRADESH TECHNICAL UNIVERSITY. MAYANK SINGH SHARMA Project Guide (Asst.COM” which is submitted by ASHWANI KR. The matter embodied in this Project Work has not been submitted earlier for award of any degree or diploma in any university/institution to the best of our knowledge and belief.

MAYANK SINGH SHARMA Project Guide (Asst. is carried out by him under my supervision. The matter embodied in this Project Work has not been submitted earlier for award of any degree or diploma in any university/institution to the best of our knowledge and belief.COM” which is submitted by ANAND GUPTA . having Roll No 0728210009 . SANJEEV KUMAR (Head of the Department) Date: __/__/____ 9 . for the award of degree of Bachelor of Technology in Department of Computer Science & Engineering. of JP INSTITUTE OF ENGINEERING & TECHNOLOGY. Lucknow. CSE) MR. Meerut. Prof.CERTIFICATE This is to certify that this Project Report entitled “E-MART. MR. affiliated to UTTAR PRADESH TECHNICAL UNIVERSITY. in the partial fulfillment.

DECLARATION We hereby declare that this submission is our own work and that. it contains no material previously published or written by another person nor material which to a substantial extent has been accepted for the award of any other degree or diploma of the university or other institute of higher learning. 10 . to the best of my knowledge and belief. except where due acknowledgment has been made in the text.

Sanjeev Kumar Sharma. Meerut for his full support and assistance during the development of the project. Final Year. 11 . JP Institute of Engineering & Technology. Tech. JP Institute of Engineering & Technology. Mayank Singh Department of Computer Science & Engineering. Meerut for his constant support and guidance throughout the course of our work. We also do not like to miss the opportunity to acknowledge the contribution of all faculty members of the department for their kind assistance and cooperation during the development of our project. we acknowledge our friends for their contribution in the completion of the project. Associate Professor & Head. His sincerity. We owe special debt of gratitude to Mr. It is only his cognizant efforts that our endeavors have seen light of the day. Department of Computer Science & Engineering. We also take the opportunity to acknowledge the contribution of Mr.ACKNOWLEDGEMENT It gives us a great sense of pleasure to present the report of the Project Work. Last but not the least. undertaken during B. thoroughness and perseverance have been a constant source of inspiration for us.

5 with ASP. To full fill this requirement we have used robust technology launched by Microsoft which is . 12 .ABSTRACT E-MART is a website which cater the buyer visiting to the site a buy can search the catalogue he is willing to purchase can show case his product online . Style sheet and back end in SQL 2008 (express version) In this E-MART customer can visit with his user ID and he can search required products and add them in the shopping cart. after purchasing the required products he can pay online.net We have used frame 3. The seller can show case his product on the site in required category and he can add prices to the products which can be seen be customers.net .

USER TABLE 2. SHOPPING CART TABLE 5. REVIEW TABLE 13 . PRODUCT CATEGORY TABLE 3.LIST OF TABLES 1. ORDER TABLE 6. PRODUCT TABLE 4.

CHAPTER:1 PROBLEM PROBLEM DESCRIPTION DESCRIPTION 14 .

. Consider a Shop which have all of its business through INTERNET i. Retaining existing customers is also an important job of a company.e. The Shop has its offices in few states and nor Shop use courier facility to deliver the product .If possible home delivery is also possible. marketing. service. which in turn gives huge profits. WEBSITES.. The success of a company is mainly based on its satisfied customers. 15 . This E-MART Shop mainly has two sectors first one is sale which sale the product to the customer and second buying of product to see on the store. every customer makes with a company from 'all' access points whether they are phone. mail. E-MART Purchase of products. web or field.INTRODUCTION E-MART is a web-based application intended to provide automated solution and services to customer and shop owner. The Shop can them use this data for specific business purposes viz. E-MART concentrates on the retention of customers by collecting all data from every interaction. support or sales.

help up sell to existing customer. 16 .E-MART is basically the collection and distribution of "all" data to "all" areas of business. The data can then help market the company. understand customers better so that customers can be given better service and allows them to interact with the company by whatever means they wish.

which proved to be the tedious as well as time consuming job. Earlier customer has to go shop to shop to gather the information about the product he is searching for. today every individual wants to access most of the information from his own place and then do transaction. market has been expanded and you have to be a global player. Success of any business depends upon its popularity and goodwill. Today. Using web application this task reduced the time to gather information about the product and buying the product is being made a click away job. 17 .BACKGROUND OF THE PROBLEM This is an era of Information Technology where getting information is the base of each and every thing.

OBJECTIVES The main objectives of developing the E-MART are as given below: 1. Customer can pay online. so as to ensure that only authorized users have access to confidential client information 6. Customer can purchase Products Online. Data security is maintained to relatively high level by implementing it at Database level. 3. 4. 2. Seller can show case their product to t he Shop with the help of administrator 18 . To provide information about any Products in different category online. so security is must therefore E-MART provide secure transactions. Customer can login and get various information about product and can purchase the suitable product. 5.

CHAPTER: 2 LITERATURE LITERATURE SURVEY SURVEY 19 .

20 . To ensure the products and /or services provide the required capability on-time and within budget.SYSTEM CONCEPT DEVELOPMENT PHASE Once a business need is approved. activities. the approaches for accomplishing the concept are reviewed for feasibility and appropriateness. The Systems Boundary Document identifies the scope of the system and requires Senior Official approval and funding before beginning the Planning Phase. schedules.SYSTEM DEVELOPMENT METHODOLOGY 1.INITIATION PHASE The initiation of a system (or project) begins when a business need or opportunity is identified. 2. security certification and accreditation activities begin with the identification of system security requirements and the completion of a high level vulnerability assessment. 3.PLANNING PHASE The concept is further developed to describe how the business will operate once the approved system is implemented. After the Concept Proposal is approved. and reviews are defined. tools. the System Concept Development Phase begins. A Project Manager should be appointed to manage the project. and to assess how the system will impact employee and customer privacy. This business need is documented in a Concept Proposal. project resources. Additionally.

Subsystems identified during design are used to create a detailed structure of the system. 5. The physical characteristics of the system are specified and a detailed design is prepared. The operating environment is established. Software shall be unit tested. security.DEVELOPMENT PHASE hardware. and processes are allocated to resources. system performance. Each subsystem is partitioned into one or more design units or modules. Detailed logic specifications are prepared for each software module.REQUIREMENT ANALYSIS Phase Functional user requirements are for Shopy defined and delineate the requirements in terms of data. All requirements are defined to a level of detail sufficient for systems design to proceed. Hardware is assembled and tested. integrated. 6.DESIGN PHASE The physical characteristics of the system are designed during this phase. Everything requiring user input or approval must be documented and reviewed by the user. and executable software. The detailed specifications produced during the design phase are translated into communications. and maintainability requirements for the system.4. major subsystems and their inputs and outputs are defined. and retested in a systematic manner. All requirements need to be measurable and testable and relate to the business need or opportunity identified in the Initiation Phase. 21 .

The system is monitored for continued performance in accordance with user requirements. 10. Operations continue as long as the system can be effectively adapted to respond to an organization’s needs. and needed system modifications are incorporated.INTEGRATION AND TEST PHASE The various components of the system are integrated and systematically tested. the system must undergo certification and accreditation activities. When modifications or changes are identified as necessary. the system may reenter the planning phase. The user tests the system to ensure that the functional requirements. Particular emphasis is given to proper 22 . 8.DISPOSITION PHASE The disposition activities ensure the orderly termination of the system and preserve the vital information about the system so that some or all of the information may be reactivated in the future if necessary.7.IMPLEMENTATION PHASE The system or system modifications are installed and made operational in a production environment. as defined in the functional requirements document. Prior to installing and operating the system in a production environment. This phase continues until the system is operating in production in accordance with the defined user requirements. The operational system is periodically assessed through In-Process Reviews to determine how the system can be made more efficient and effective. 9.OPERATIONS AND MAINTENANCE PHASE The system operation is ongoing. The phase is initiated after the system has been tested and accepted by the user. are satisfied by the developed or modified system.

for potential future access. project managers. program/account analysts and system owners/users throughout the DOJ. • To identify technical and management issues early. so that the data is effectively migrated to another system or archived in accordance with applicable records management regulations and policies. • To encourage periodic evaluations to identify systems that are no longer effective. • To consider system and data requirements throughout the entire life of the system. • To measure progress and status for effective corrective action.preservation of the data processed by the system. 23 . technical. • To disclose all life cycle costs to guide business decisions. management. The specific objectives expected include the following: • To reduce the risk of project failure. SDLC OBJECTIVES This guide was developed to disseminate proven practices to system developers. • To provide information to better balance programmatic. and cost aspects of proposed system development or modification. • To foster realistic expectations of what the systems will and will not provide.

KEY PRINCIPLES This guidance document refines traditional information system life cycle management approaches to reflect the principles outlined in the following subsections. 1. program/account analysts. as appropriate. The manual provides a flexible framework for approaching a variety of systems projects. and products. and to select the tools and methodologies best suited to the unique needs of each project. project managers. and system owners/users to combine activities.• To support effective resource management and budget planning. AND OPERATION This SDLC describes an overall structured approach to information management. processes.SUPPORT THE USE OF AN INTEGRATED PRODUCT TEAM 24 . LIFE CYCLE MANAGEMENT SHOULD BE USED TO ENSURE A STRUCTURED APPROACH TO INFORMATION SYSTEMS DEVELOPMENT. • To consider meeting current and future business requirements. Primary emphasis is placed on the information and systems decisions to be made and the proper timing of decisions. These are the foundations for life cycle management. The framework enables system developers. MAINTENANCE.

annually during Operations and Maintenance Phase and six-months after the Disposition Phase. delivery and implementation of life cycle decisions for the project. and commitment to information systems. congressional interests or a combination of these.A SINGLE PROJECT MANAGER MUST BE SELECTED FOR EACH SYSTEM PROJECT 25 . An approval from senior management is required after the completion of the first seven of the SDLC phases. The IPT is composed of qualified empowered individuals from all appropriate functional disciplines that have a stake in the success of the project. open communication. from senior management. The program sponsor serves in a leadership role. An IPT is a multidisciplinary group of people who support the Project Manager in the planning. The program sponsor is responsible for identifying who will be responsible for Shopy accepting the delivered system at the end of the Implementation Phase. execution. 3. management. visibility level.EACH SYSTEM PROJECT MUST HAVE A PROGRAM SPONSOR To help ensure effective planning. providing guidance to the project team and securing. each project must have a clearly identified program sponsor. Senior management approval authority may be varied based on dollar value. team oriented environment can aid in building a successful project and providing decision makers with the necessary information to make the right decisions at the right time.The establishment of an Integrated Product Team (IPT) can aid in the success of a project. the required reviews and approvals at specific points in the life cycle. 2. Working together in a proactive.

to accomplish the objectives of the project. quality assurance. allocated resources. The project management plan is a vehicle for documenting the project scope. program sponsor. security. Assignments may be made on a full. (user/customer). Key roles include program/functional management. the Project Manager is accountable and responsible for ensuring that project activities and decisions consider the needs of all organizations that will be affected by the system. and interrelationships with other projects. schedule. and developer for purposes of management and oversight. The Project Manager develops a project charter to define and clearly identify the lines of authority between and within the agency’s executive management.A COMPREHENSIVE PROJECT MANAGEMENT PLAN IS REQUIRED FOR EACH SYSTEM PROJECT The project management plan is a pivotal element in the successful solution of an information management requirement. The project management plan must describe how each life cycle phase will be accomplished to suit the specific characteristics of the project. telecommunications 26 . tasks.or part-time basis as appropriate. 4. Regardless of organizational affiliation.The Project Manager has responsibility for the success of the project and works through a project team and other supporting organization structures. such as working groups or user groups. The plan is used to provide direction to the many activities of the life cycle and must be refined and expanded throughout the life cycle. SPECIFIC INDIVIDUALS MUST BE ASSINGNED TO PERFORM KEY ROLES THROUGHOUT THE LIFE CYCLE Certain roles are considered vital to a successful system project and at least one individual must be designated as responsible for each key role. 5.

management, data administration, database administration, logistics, financial,
systems engineering, test and evaluation, contracts management, and configuration
management. For most projects, more than one individual should represent the actual
or potential users of the system (that is, program staff) and should be designated by
the Program Manager of the program and organization.

MODEL USED

27

REQUIREMENT ANALYSIS
NEED
In current competitive scenario every business establishment needs quality
processes to increase their efficiency as well as improve their productivity. It is of
vital importance that manual, time consuming & monotonous operations are
automated so as to streamline the working of an organization. Since, the existing
system (manual work) takes more time and manpower for processing. It is keeping
in mind this business philosophy (mantra) that we propose an E-MART. Our system
will deal with all the aspects SALES of all Products and show case of all Goods for
sale or seller can add their products.

28

PROJECT REQUIREMENTS
I.) Software Requirements
Client on Internet: Web Browser, Operating System(any)
Web Server: inbuilt with Visual Studio
Data Base Server: SQL Server 2008, Operating System (any)
Development End: Visual Studio 2008, SQL Server 2008
II.)Hardware Requirements

Client Side
Internet
Explorer
6.0
Server Side
Visual Studio
2008

Processor
Core to duo

RAM
1 GB

Core to duo

As per server
requirement

Disk Space
40 GB

As per server
requirement

SYSTEM ANALYSIS
System Analysis is a management technique, which helps in designing a new system
or improving an existing system. System Analysis is the process of gathering and
interpreting facts, diagnosing problems (if any), using information to recommend
improvements to the system. There are four basic elements of system analysis: Output, Input, Files, processes. For computerization of any system, the existing
system must be thoroughly being understood to determine “how the computer can be
best used to make its operation most effective”. This is acquired by analyzing existing
system.

29

hardware combinations. software technology and available personnel.FEASIBILITY STUDY Feasibility study is the process of determination of whether or not a project is worth doing. Technical feasibility is concerned with specifying equipment and software that will satisfy the user requirement. The proposed system can run on any machines supporting Windows and Internet services and works on the best software and hardware that had been used while designing the system so it would be feasible in all technical terms of feasibility. etc. The contents and recommendations of this feasibility study helped us as a sound basis for deciding how to proceed the project. This project is feasible on technical remarks also. Operational Feasibility 1. It helped in taking decisions such as which software to use. Technical Feasibility Technical feasibility determines whether the work for the project can be done with the existing equipment. 30 . 1. Economical Feasibility 3. as the proposed system is more beneficiary in terms of having a sound proof system with new technical components installed on the system. Feasibility studies are undertaken within tight time constraints and forShopy culminate in a written and oral feasibility report. Technical Feasibility 2. I have taken two weeks in feasibility study with my co-developer.

retraining and changes in employee job status. it is understandable that the introduction of a candidate system requites special efforts to educate. and train the staff on new ways of conducting business. The system will be used if it is developed well then be resistance for users that undetermined • No major training and new skills are required as it is based on DBMS model. On the behalf of the cost-benefit analysis. 3. Economical Feasibility Economical feasibility determines whether there are sufficient benefits in creating to make the cost acceptable. 31 . the proposed system is feasible and is economical regarding its pre-assumed cost for making a system.2. We classified the costs of E-MART according to the phase in which they occur. Computer usage 3. Cost of any new computer equipments and software. transfers. sell. As this signifies costbenefit analysis and savings. Therefore. Personal costs 2. or is the cost of the system too high. As we know that the system development costs are usually one-time costs that will not recur after the project has been completed. Operational Feasibility It is common knowledge that computer installations have some thing to do with turnover. 1. For calculating the Development costs we evaluated certain cost categories viz.

etc. • User will have control over there own information. 32 . better management and collection of the reports.• It will help in the time saving and fast processing and dispersal of user request and applications • . • . allocation of IDs. payments.Improved information. • User involvement in the building of present system is sought to keep in mind the user specific requirement and needs. Important information such as pay-slip can be generated at the click of a button.New product will provide all the benefits of present system with better performance. • Faster and systematic processing of user application approval. used had greater chances of error due to wrong information entered by mistake.

BLOCK DIAGRAM 33 .

34 .

USE CASE 35 .MODELLING FLOWCHART 1.

A use case is an external view of the system that represents some action the user might perform in order to complete a task. Access The eSHOP Website Browse Catalog and Search Item CUSTOMER Get Product Information BUYING 36 . An actor is represents a user or another system that will interact with the system you are modeling. The two main components of a use case diagram are use cases and actors.A use case is a set of scenarios that describing an interaction between a user and a system. A use case diagram displays the relationship among actors and use cases.

e.. Received Product 37 . Slip) Get confirmed i.e.User Login Buy the Product Give Shipping Info CUSTOMER Give Payment Info Get Invoice (i.

SELL User Login Show case (Add Products) Give information of Products CUSTOMER Give Price Information Stock information Get conformed Context level dfd 38 .

39 .

ER-DIAGRAM CUSTOMER ENTITY 40 .

PRODUCT ENTITY SHOPPING SHOP 41 .

FORM RELATION 42 .

ACTIVITY DIAGRAM 43 .

CHAPTER:3 DESIGN DESIGN 44 .

The buyers are the one who want to get information about the different products or want to buy product of their choice at one place. 2. SHOPPING CART MODULE Shopping cart module is the module which maintains the selected products from the buyer and puts it in the buying list. The job of the sellers are to showcase their items on the website. He can also maintain the different item stocks. 3. He can also maintain the site and updates the information. 45 . ADMINISTRATOR MODULE The administrator is the one who has the power and authority to maintain the site and to secure the customers from frauds. USER MODULE Users are the customers.MODULE SPECIFICATION 1. He is liable to inform the customers about their orders and requirements. In this user maintain the list of items he may place order for and checks out for the things before placing the order. they may be buyer or sellers. Through this module user can select the products of their choice and can also delete the products they are not liking to place order for.

Main Page Users page 13. Login page 3. Contact page 4. Admin Add New Item page 5.FORMS NAME 1. Admin Maintain Items page 6. Description Purchase Anonymous 10. Description Purchase Page 9. Default page 2. Main Page Admin page 12. Register new user page 15. Shopping Cart page 17. Search Items page 16. Admin User Maintenance page 8. View My Reviews page 46 . Master User add items page 14. Admin Sales Maintenance page 7. Main Page 11.

View Reviews page 19. View Status Purchase page CHAPTER:4 CODING CODING 47 .18.

NET(With C#)  BACK-END : SQL 2008 PLATFORM:  Windows XP 48 . PLATFORM & LANGUAGE TO BE USED TOOLS:  FRONT-END : ASP.TOOLS.

For more information. For more information about compatibility and for a list of the public API modifications to the class library that might affect the compatibility of your application.NET 2008 FRAMEWORK. improvements to existing features.NET Framework version 1.0 extends the . New support for 64-bit applications enables users to build managed code libraries or easily use unmanaged code libraries on 64-bit computers.0 The Microsoft . SQL 2008 . and enhancements to the documentation.TECHNOLOGY OVERVIEW OF MY PROJECT . 64-BIT PLATFORM SUPPORT The new generation of 64-bit computers enables the creation of applications that can run faster and take advantage of more memory than is available to 32-bit applications.1 with new features.NET 2008 WITH C# 2. see 64-bit Applications.NET Framework version 2. This section provides information about some key additions and modifications. 49 .

NET Web page without writing code.NET to track property values for individual users automatically. Profile properties enable ASP. For Web page development. and threading classes.NET pages easier and more robust. Caching features provide several new ways to cache pages.NET New features in ADO.NET include support for user-defined types (UDT). New members that use an ACL have been added to the I/O. asynchronous database operations.NET features.NET Framework 2. For more information about these and other new ADO. see What's New in ADO. Using 50 . You can now customize Web sites and pages in a variety of ways. New data controls make it possible to display and edit data on an ASP. XML data types. including the ability to build cache dependency on tables in a SQL Server database.NET.NET. large value types. ASP. ADO. snapshot isolation. New classes have been added to the .NET Framework that allow managed code to create and modify an ACL. An improved code-behind model makes developing ASP. registry.0 includes significant enhancements to all areas of ASP. new controls make it easier to add commonly used functionality to dynamic Web pages.NET The Microsoft .ACCESS CONTROL LIST SUPPORT An access control list (ACL) is used to grant or revoke permission to access a resource on a computer. and new attributes that allow applications to support multiple active result sets (MARS) with SQL Server 2005.

see What's New in ASP. These authenticated stream classes support mutual authentication.NET also include new tools and classes to make Web site management easier for Web site developers. You can add navigation menus using simple controls.aspx pages). you can create pages that users can customize in the browser. For a more complete list of new features in ASP. server administrators. ASP. Enhancements to ASP. which does not include any source information. and data signing.Web Parts. To help protect your sites. you can pre compile a Web site to produce executable code from source files (both code files and the markup in . The Negotiate Stream class uses the Negotiate security protocol for authentication.NET.NET. data encryption. controls render output that is compatible with XHTML 1. AUTHENTICATED STREAMS Applications can use the new Negotiate Stream and Stream classes for authentication and to help secure information transmitted between a client and a server.1 standards.NET accommodates a wide variety of browsers and devices. and themes allow you to define a consistent look for controls and static text. to a production server. You can use device filtering to specify different property values on the same control for different browsers. The Stream class uses the Secure Socket Layer (SSL) security protocol for authentication. You can then deploy the resulting output. Master pages allow you to create a consistent layout for all the pages in a site. 51 . By default. Improvements to Web site features allow you to create professional Web sites faster and more easily. and hosters.

52 . provide safe and reliable means of manipulating operating system handles. CONSOLE CLASS ADDITIONS New members of the Console class enable applications to manipulate the dimensions of the console window and screen buffer. This enhancement is important for creating robust build environments. simple animation. • The performance of calls between applications in different application domains has been made much faster for common call types. which are used to reference critical operating system resources. Other new class members control the foreground and background colors of text.COM INTERPOL SERVICES ENHANCEMENTS Four major enhancements have been made to the classes and tools that support interoperability with COM: • The operating system maintains a limited number of handles.exe) and Type Library Exporter (Tlbexp. which is useful for performing smooth.exe) eliminate dependency on the registry to resolve type library references. to move a rectangular area of the screen buffer. The new Safe Handle and Critical Handle classes. and to wait while reading console input until a key is pressed. the visibility and size of the cursor. • New switches on the Type Library Importer (Tlbimp. and their specialized derived classes. and the frequency and duration of the console beep. Two enhancements to the interlope marshaled satisfy the two most common user requests: the ability to wrap native function pointers into delegates and the ability to marshal fixed-size arrays of structures inside structures. • Marshaling improvements make interoperating with native code easier.

For example. • The Get Culture Info method overload provides a cached version of a read- only Culture Info object.exe file's assembly. 53 . which are available at the IETF Request for Comments (RFC) search page. It is now easier for users to read and write text files and obtain information about a drive. I/O ENHANCEMENTS Improvements have been made to the usability and functionality of various I/O classes.IO.exe file from within the Windows shell causes the shell to load the common language runtime (CLR) and call a well-known entry point within that .Compression namespace to read and write data with the GZIP compression and decompression standard. You can now use the classes in the System.• The normalization process converts character representations of text to a standard form so the representations can be compared for equivalence. Traditionally. applications are activated through a reference to an assembly that contains the application's entry point. described in the IETF RFC 1951 and RFC 1952 specifications. The manifest-based activation model uses an application manifest for activation rather than an assembly. MANIFEST-BASED ACTIVATION This feature provides new support for loading and activating applications through the use of a manifest. Manifest-based activation is essential for supporting ClickOnce applications. Use the cached version when creating a new Culture Info object to improve system performance and reduce memory usage. clicking an application's . Note: search is limited to RFC numbers. its dependencies. A manifest fully describes the application.

especially for Web applications. or by any other means deemed appropriate for a given Trust Manager. 2. These APIs contain a mixture of both new classes and extensions to existing classes.Tcp namespace support authentication and encryption using the Security Support Provider Interface (SSPI). This activation model also invokes an entity called a Trust Manager that performs the following tasks: 1.NET Framework remoting now supports IPv6 addresses and the exchange of generic types.Runtime. The manifest model has several advantages over the assembly-based activation model. For example. Classes in the new System.Channels. .Remoting. the manifest contains the security requirements of the application. Determines whether an application is allowed to be activated. The classes in the System. Most commonly. Sets up the security context to run an application in.security requirements.Remoting. querying policy. Manifest-based activation is provided by a set of APIs that allow managed hosts to activate applications and add-ins described by a manifest. this step involves setting up a code access security (CAS) policy tree on the application domain in which the application will run. which enables the user to decide whether to allow the application to execute before downloading the code. you can now configure the connection cache time-out and the 54 .Channels. The manifest also contains information about the application dependencies. and so forth.Ipc namespace allow applications on the same computer to communicate quickly without using the network. This decision can be made by prompting the user.NET FRAMEWORK REMOTING .Runtime. Finally.

applications can access IP. and UDP network traffic statistics.Cache namespace.exe command-line tool. WebResponse.Net. Using classes in the System. PING The Ping class allows an application to determine whether a remote computer is accessible over the network. with your application's permissions. IPv6.exe command-line tool.NET Framework 55 . and supports synchronous and asynchronous calls. You can use the predefined cache policies provided by the .Net. applications can control the caching of resources obtained using the WebRequest. which can improve the performance of network loadbalanced remote clusters.number of method retries. TCP. The Web server is active for the lifetime of the HttpListener object and runs within your application. This information is similar to the information returned by the Ipconfig. Applications can also view address and configuration information for the local computer’s network adapters. IPv4. PROGRAMMATIC CONTROL OF CACHING Using the classes in the System. PROCESSING HTTP REQUESTS FROM WITHIN APPLICATIONS You can use the HttpListener class to create a simple Web server that responds to HTTP requests.NetworkInformation namespace. This class provides functionality similar to the Ping. and WebClient classes. This class is available only on computers running the Windows XP Service Pack 2 or Windows Server 2003 operating systems.

• To provide a code-execution environment that eliminates the performance problems of scripted or interpreted environments. while also enforcing strict type safety and other forms of 56 . • To provide a code-execution environment that minimizes software deployment and versioning conflicts. providing core services such as memory management.NET Framework. You can specify a cache policy for each request and define a default cache policy for requests that do not specify a cache policy. and remoting. The common language runtime is the foundation of the . The .NET Framework has two main components: the common language runtime and the . including code created by an unknown or semi-trusted third party.NET Framework class library. such as Windows-based applications and Web-based applications. executed locally but Internet-distributed. • To make the developer experience consistent across widely varying types of applications. • To provide a code-execution environment that promotes safe execution of code. You can think of the runtime as an agent that manages code at execution time.NET Framework is designed to fulfill the following objectives: • To provide a consistent object-oriented programming environment whether object code is stored and executed locally.NET Framework is an integral Windows component that supports building and running the next generation of applications and XML Web services.NET Framework can integrate with any other code. thread management. • To build all communication on industry standards to ensure that code based on the .or specify a custom cache policy. or executed remotely. The . The .

is a comprehensive. For example.NET Framework can be hosted by unmanaged components that load the common language runtime into their processes and initiate the execution of managed code. but with significant improvements that only managed code can offer.NET Framework not only provides several runtime hosts. ASP. server-side environment for managed code. but also supports the development of third-party runtime hosts. Code that targets the runtime is known as managed code. Using Internet Explorer to host the runtime enables you to embed managed components or Windows Forms controls in HTML documents. 57 .NET Framework. such as Web Forms and XML Web services.NET. The class library. The . thereby creating a software environment that can exploit both managed and unmanaged features. object-oriented collection of reusable types that you can use to develop applications ranging from traditional command-line or graphical user interface (GUI) applications to applications based on the latest innovations provided by ASP.NET applications and XML Web services. while code that does not target the runtime is known as unmanaged code. such as semi-trusted execution and isolated file storage. The . Internet Explorer is an example of an unmanaged application that hosts the runtime (in the form of a MIME type extension). the other main component of the . both of which are discussed later in this topic.NET works directly with the runtime to enable ASP. Hosting the runtime in this way makes managed mobile code (similar to Microsoft® ActiveX® controls) possible.code accuracy that promote security and robustness. In fact. ASP.NET hosts the runtime to provide a scalable. the concept of code management is a fundamental principle of the runtime.

58 .The following illustration shows the relationship of the common language runtime and the class library to your applications and to the overall system. The illustration also shows how managed code operates within a larger architecture.

enterprise network. and other system services. thread execution. code execution. depending on a number of factors that include their origin (such as the Internet. This means that a managed component might 59 . managed components are awarded varying degrees of trust. or local computer).NET Framework in greater detail.NET FRAMEWORK IN CONTEXT The following sections describe the main components and features of the . These features are intrinsic to the managed code that runs on the common language runtime. code safety verification.. FEATURES OF THE COMMOMN LANGUAGE RUNTIME The common language runtime manages memory. With regards to security. compilation.

For example. The various Microsoft and third-party language compilers generate managed code that conforms to the CTS. and components written in other languages by other developers. releasing them when they are no longer being used. but cannot access their personal data. programmers can write applications in their development language of choice.NET Framework make the features of the . For example. file system. users can trust that an executable embedded in a Web page can play an animation on screen or sing a song. yet take full advantage of the runtime. or other sensitive functions. or network. the class library.NET 60 . even if it is being used in the same active application. memory leaks and invalid memory references. the managed environment of the runtime eliminates many common software issues. The runtime enforces code access security. The security features of the runtime thus enable legitimate Internet-deployed software to be exceptionally feature rich. registry-access operations. This automatic memory management resolves the two most common application errors. The runtime also enforces code robustness by implementing a strict type-and-codeverification infrastructure called the common type system (CTS). The CTS ensures that all managed code is self-describing. Any compiler vendor who chooses to target the runtime can do so. For example. This means that managed code can consume other managed types and instances. The runtime also accelerates developer productivity. Language compilers that target the . In addition. the runtime automatically handles object layout and manages references to objects. while strictly enforcing type fidelity and type safety.or might not be able to perform file-access operations.

61 . greatly easing the migration process for existing applications. Function pointers are available through the use of the unsafe C# keyword and the /unsafe option of the C# compiler (Csc. without concerning yourself with the • Use of delegates rather than function pointers for increased type safety and security.exe) for unmanaged code and data. • Classes enables you to focus on the logic of your service.Framework available to existing code written in that language.

Each application is loaded into a separate process. The verification process determines whether the code can attempt to access invalid memory addresses or perform some other action that could cause the process in which it is running to fail to operate properly. You can run several application domains in a single process with the same level of isolation that would exist in separate processes. Managed code must be passed through a verification process before it can be run (unless the administrator has granted permission to skip the verification). Application domains provide a more secure and versatile unit of processing that the common language runtime can use to provide isolation between applications. In addition. Code that passes the verification test is said to be type-safe. but without incurring the additional overhead of making cross-process calls or switching between processes. you cannot make direct calls between two processes. which isolates the application from other applications running on the same computer. The ability to run multiple applications within a single process dramatically increases server scalability. process boundaries have been used to isolate applications running on the same computer. The applications are isolated because memory addresses are process-relative. Instead. you must use proxies. The ability to verify code as type-safe enables the common language runtime to provide as great a level of isolation as the process boundary. at a much lower performance cost. a memory pointer passed from one process to another cannot be used in any meaningful way in the target process. which provide a level of indirection. 62 .APPLICATION DOMAIN OVERVIEW Historically.

Using application domains enables you to unload the code running in a single application. The isolation provided by application domains has the following benefits: • Faults in one application cannot affect other applications. In this case. That is. If the object is copied. the call to the object is remote. you can run controls from several Web applications in a single browser process in such a way that the controls cannot access each other's data and resources. the compilation might fail with an exception of type System. For example. As such. the call to the object is local. The mechanism for determining how objects can be accessed across 63 .Isolating applications is also important for application security. • Individual applications can be stopped without stopping the entire process. Objects that pass between domains are either copied or accessed by proxy.FileNotFound. Because type-safe code cannot cause memory faults. The common language runtime enforces this isolation by preventing direct calls between objects in different application domains. both the caller and the object being referenced are in the same application domain. • Code running in one application cannot directly access code or resources from another application. If the object is accessed through a proxy. using application domains ensures that code running in one domain cannot affect other applications in the process. If the calling domain does not have access to the metadata for the object being called. the metadata for the object being referenced must be available to both application domains to allow the method call to be JIT-compiled properly. Cross-domain calls use the same remote call infrastructure as calls between two processes or between two machines. the caller and the object being referenced are in different application domains.IO. See Remote Objects for more details.

and information about where to locate assemblies that are loaded into the domain. In other words. 64 . For more information. • Permissions granted to code can be controlled by the application domain in which the code is running. • The behavior of code is scoped by the application in which it runs.domains is determined by the object. see MarshalByRefObject Class. the location of any remote assemblies it accesses. the application domain provides configuration settings such as application version policies.

When you decide whether to load assemblies as domain-neutral. Use this setting when there are multiple application domains in the process. There are three options for loading domain-neutral assemblies: • Load no assemblies as domain-neutral. the JIT output from an assembly's code can be shared by all domains referencing the assembly. • Load strong-named assemblies as domain-neutral.APPLICATION DOMAINS AND ASSEMBLIES This topic describes the relationship between application domains and assemblies. Running a typical application causes several assemblies to be loaded into an application domain. For more information. This setting is called single domain because it is commonly used when the host is running only a single application in the process. which is always loaded domain-neutral. all of which run the same code. except Mscorlib.NET Framework SDK. Use this setting when running more than one application in the same process. you must make a tradeoff between reducing memory use and performance. The runtime host decides whether to load assemblies as domain-neutral when it loads the runtime into a process. • Load all assemblies as domain-neutral. If an assembly is used by multiple domains in a process. You must load an assembly into an application domain before you can execute the code it contains. The performance of a domain-neutral assembly is slower if that assembly contains static data or static 65 . see the LoaderOptimizationAttribute attribute and the associated LoaderOptimization enumeration. see the documentation for CorBindToRuntimeEx in the common language runtime Hosting Interfaces Specification found in the . For hosting.

the runtime contains additional logic to direct a caller to the appropriate copy of the static data or method. This can occur if the runtime host sets an application domain-level security policy. Assemblies should not be loaded as domain-neutral if the set of permissions granted to the assembly is likely to be different in each domain 66 . As a result. An assembly is not shared between domains when it is granted a different set of permissions in each domain. This extra logic slows down the call. to prevent references to objects in static fields from crossing domain boundaries. Access to static data is slower because of the need to isolate assemblies. Each application domain that accesses the assembly must have a separate copy of the static data.methods that are accessed frequently.

SECURITY MANAGEMENT: SQL Server provides a controlled access to data to users by providing a combination of privileges.ABOUT TECHNOLOGY WHY WE USE SQL? 1. c). Open connectivity: SQL Server provides open connectivity to and from other vendor’s software such as Microsoft. a). SQL Server 8 is designed with special feature of data warehousing 67 . b). Backup and Recovery: SQL Server provided sophisticated security backup and recovery routines. Also SQL Server database can be access by various frontend software’s such as Microsoft Visual Basic ®. Space Management: In SQL Server once can flexibly allocate disk spaces for data storage and can control them subsequently. Power Builder etc.

Web-Farm Session State 5. Enhanced Reliability 6.WHY WE USE ASP. Easy Deployment Dynamic update of running application 68 . Compiled execution 3.NET? 1. Rich Class Framework 2. Rich output caching 4.

style12 { height: 52px. } .style14 { vertical-align: top.w3. } . width: 174px. } .0 Transitional//EN" "http://www.org/TR/xhtml1/DTD/xhtml1-transitional. } </style> </head> <body style="background-color: #FFCC99"> <form id="form1" runat="server"> <table align="center" border="0" width="800px" style="border-bottom: medium solid #A4BAE8.org/1999/xhtml"> <head runat="server"> <title>E-MART</title> <link href="StyleSheet.style13 { width: 174px.style5 { height: 65px.png').css" rel="stylesheet" type="text/css" /> <asp:ContentPlaceHolder id="head" runat="server"> </asp:ContentPlaceHolder> <style type="text/css"> . } . border-left-color: #A4BAE8.style2 { text-align: center. } .master.style8 { height: 435px. height: 65px.dtd"> <html xmlns="http://www. background-image: url('file:///C:/Documents%20and %20Settings/Administrator/Desktop/EWAPP/Images/menubg%20copy."> <tr> <td class="style5" colspan="2" 69 .CODING Login master page . height: 650px. border-right-color: #A4BAE8.w3.cs" Inherits="MasterPage" %> <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1. border-topcolor: #A4BAE8.aspx coding <%@ Master Language="C#" AutoEventWireup="true" CodeFile="Login.

style="border-bottom-style: solid.JPG" Height="80px" Width="400px" /></td> </tr> <tr> <td class="style13"> <asp:FormView ID="FormView1" runat="server" DataSourceID="SqlDataSource1" Height="16px" Width="251px" onpageindexchanging="FormView1_PageIndexChanging"> <EditItemTemplate> Name: <asp:TextBox ID="NameTextBox" runat="server" Text='<%# Bind("Name") %>' /> <br /> <asp:LinkButton ID="UpdateButton" runat="server" CausesValidation="True" CommandName="Update" Text="Update" /> &nbsp. border-bottom- color: #41678E"> <asp:Image ID="Image1" runat="server" Width="194px" ImageUrl="~/Images/imagesCA167IXN.jpg" Height="80px" /> <asp:Image ID="Image2" runat="server" ImageUrl="Images/title2.<br /> <asp:LinkButton ID="LinkButton1" runat="server" onclick="LinkButton1_Click">Logout</asp:LinkButton> <br /> </ItemTemplate> <EmptyDataTemplate> Welcome: Guest<br /> <a href="Login.<asp:LinkButton ID="UpdateCancelButton" runat="server" CausesValidation="False" CommandName="Cancel" Text="Cancel" /> </EditItemTemplate> <InsertItemTemplate> Name: <asp:TextBox ID="NameTextBox" runat="server" Text='<%# Bind("Name") %>' /> <br /> <asp:LinkButton ID="InsertButton" runat="server" CausesValidation="True" CommandName="Insert" Text="Insert" /> &nbsp.aspx">register</a> </EmptyDataTemplate> </asp:FormView> <asp:SqlDataSource ID="SqlDataSource1" runat="server" ConnectionString="<%$ ConnectionStrings:ConnectionString %>" 70 .aspx">Login</a> or <a href="registernewuser.<asp:LinkButton ID="InsertCancelButton" runat="server" CausesValidation="False" CommandName="Cancel" Text="Cancel" /> </InsertItemTemplate> <ItemTemplate> Welcome: <asp:Label ID="NameLabel" runat="server" Text='<%# Bind("Name") %>' /> &nbsp.

aspx" Text="Main Page" Value="Main Page"></asp:TreeNode> <asp:TreeNode NavigateUrl="~/SearchItemsAnonymous.</td> </tr> <tr style="vertical-align: top"> <td class="style14"> <asp:TreeView ID="TreeView1" runat="server" Height="51px" ImageSet="Simple"> <ParentNodeStyle Font-Bold="False" /> <HoverNodeStyle Font-Underline="True" ForeColor="#5555DD" /> <SelectedNodeStyle Font-Underline="True" ForeColor="#5555DD" HorizontalPadding="0px" VerticalPadding="0px" /> <Nodes> <asp:TreeNode NavigateUrl="~/MainPage.aspx" Text="Contact Us" Value="Contact Us"></asp:TreeNode> </Nodes> <NodeStyle Font-Names="Tahoma" Font-Size="10pt" ForeColor="Black" HorizontalPadding="0px" NodeSpacing="0px" VerticalPadding="0px" /> </asp:TreeView> </td> <td class="style8" width="100%"> <asp:ContentPlaceHolder id="ContentPlaceHolder1" runat="server"> </asp:ContentPlaceHolder> </td> </tr> <tr> <td class="style2" colspan="2"> JP Institute of Engineering & Technology </td> </tr> </table> </form> </body> </html> Admin master page 71 .aspx" Text="Search For Items" Value="Search For Items"></asp:TreeNode> <asp:TreeNode NavigateUrl="~/ContactUsAnony.SelectCommand="SELECT [Name] FROM [UserTable] WHERE [Username] = @Username"> <SelectParameters> <asp:SessionParameter Name="Username" SessionField="Username" /> </SelectParameters> </asp:SqlDataSource> </td> <td class="style12"> &nbsp.

} </style> </head> <body style="background-color: #FFCC99"> <form id="form1" runat="server" > <table align="center" border="0" width="800px"> <tr> <td class="style5" colspan="2" style="border-bottom-style: solid.aspx coding <%@ Master Language="C#" AutoEventWireup="true" CodeFile="AdminMasterPage.JPG" Height="80px" Width="400px" /> </td> </tr> <tr> <td> <asp:FormView ID="FormView1" runat="server" DataSourceID="SqlDataSource1" style="direction: ltr" Width="190px"> <EditItemTemplate> Name: <asp:TextBox ID="NameTextBox" runat="server" Text='<%# Bind("Name") %>' /> <br /> <asp:LinkButton ID="UpdateButton" runat="server" CausesValidation="True" CommandName="Update" Text="Update" /> 72 .0 Transitional//EN" "http://www.jpg" Height="80px" /> <asp:Image ID="Image2" runat="server" ImageUrl="Images/title2.css" rel="stylesheet" type="text/css" /> <asp:ContentPlaceHolder id="head" runat="server"> </asp:ContentPlaceHolder> <style type="text/css"> .style4 { height: 24px.style2 { text-align: center..dtd"> <html xmlns="http://www. } . } . border-bottomcolor: #41678E"> <asp:Image ID="Image1" runat="server" Width="194px" ImageUrl="~/Images/imagesCA167IXN.master.cs" Inherits="MasterPage" %> <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.style5 { height: 65px.w3.org/1999/xhtml"> <head runat="server"> <title>Yahya's Cameras</title> <link href="StyleSheet.org/TR/xhtml1/DTD/xhtml1-transitional. } .w3.style8 { height: 435px.

</td> </tr> <tr style="vertical-align: top"> <td class="style5"> <asp:TreeView ID="TreeView1" runat="server" ImageSet="Simple"> <ParentNodeStyle Font-Bold="False" /> <HoverNodeStyle Font-Underline="True" ForeColor="#5555DD" /> <SelectedNodeStyle Font-Underline="True" ForeColor="#5555DD" HorizontalPadding="0px" VerticalPadding="0px" /> <Nodes> <asp:TreeNode NavigateUrl="~/MainPageAdmin.<asp:LinkButton ID="UpdateCancelButton" CausesValidation="False" CommandName="Cancel" Text="Cancel" /> </EditItemTemplate> <InsertItemTemplate> Name: <asp:TextBox ID="NameTextBox" runat="server" Text='<%# Bind("Name") %>' /> <br /> <asp:LinkButton ID="InsertButton" runat="server" CausesValidation="True" CommandName="Insert" Text="Insert" /> &nbsp.runat="server" &nbsp.aspx" 73 .aspx" Text="Main Page" Value="Main Page"></asp:TreeNode> <asp:TreeNode Text="Users' Control Panel" Value="Users' Control Panel"> <asp:TreeNode NavigateUrl="~/AdminUserMaintenance.<asp:LinkButton ID="InsertCancelButton" runat="server" CausesValidation="False" CommandName="Cancel" Text="Cancel" /> </InsertItemTemplate> <ItemTemplate> Welcome: <asp:Label ID="NameLabel" runat="server" Text='<%# Bind("Name") %>' /> <br /> <asp:LinkButton ID="LinkButton1" runat="server" onclick="LinkButton1_Click">Logout</asp:LinkButton> <br /> </ItemTemplate> <EmptyDataTemplate> Welcome: Guest<br /> <asp:LinkButton ID="LinkButton2" runat="server" onclick="LinkButton2_Click">Login</asp:LinkButton> </EmptyDataTemplate> </asp:FormView> <asp:SqlDataSource ID="SqlDataSource1" runat="server" ConnectionString="<%$ ConnectionStrings:ConnectionString %>" SelectCommand="SELECT [Name] FROM [UserTable]"></asp:SqlDataSource> </td> <td class="style4"> &nbsp.

aspx" Text="Sales Maintenance" Value="Sales Maintenance"></asp:TreeNode> </asp:TreeNode> <asp:TreeNode Text="Items" Value="Items"> <asp:TreeNode NavigateUrl="~/AdminAddNewItem.Node"></asp:TreeNode> Text="View / Modify Users" Value="New </asp:TreeNode> <asp:TreeNode Text="Sales" Value="Sales"> <asp:TreeNode NavigateUrl="~/AdminSalesMaintenance. border-bottomcolor: #88A5E1"> JP Institute of Engineering &amp.master.cs" Inherits="MasterPage" %> <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.org/TR/xhtml1/DTD/xhtml1-transitional.aspx" Text="View / modify Items" Value="View / modify Items"></asp:TreeNode> <asp:TreeNode NavigateUrl="~/ViewReviews.org/1999/xhtml"> <head runat="server"> <title>E-MART</title> 74 . Technology</td> </tr> </table> </form> </body> </html> Master page master <%@ Master Language="C#" AutoEventWireup="true" CodeFile="MasterPage.w3.aspx" Text="Add New Item" Value="Add New Item"></asp:TreeNode> <asp:TreeNode NavigateUrl="~/AdminMaintainItems.w3.dtd"> <html xmlns="http://www.aspx" Text="View Reviews" Value="View Reviews"></asp:TreeNode> </asp:TreeNode> </Nodes> <NodeStyle Font-Names="Tahoma" Font-Size="10pt" ForeColor="Black" HorizontalPadding="0px" NodeSpacing="0px" VerticalPadding="0px" /> </asp:TreeView> </td> <td class="style8" width="100%"> <asp:ContentPlaceHolder id="ContentPlaceHolder1" runat="server"> </asp:ContentPlaceHolder> </td> </tr> <tr> <td class="style2" colspan="2" style="border-bottom-style: solid.0 Transitional//EN" "http://www.

height: 650px. } </style> </head> <body style="background-color: #FFCC99"> <form id="form1" runat="server"> <table align="center" border="0" width="800px" style="border-bottom: medium solid #A4BAE8. } . width: 800px. border-left-color: #A4BAE8.JPG" Height="80px" Width="400px" /> </td> </tr> <tr> <td> <asp:FormView ID="FormView1" runat="server" DataSourceID="SqlDataSource1" Height="16px" Width="251px" onpageindexchanging="FormView1_PageIndexChanging"> <EditItemTemplate> Name: <asp:TextBox ID="NameTextBox" runat="server" Text='<%# Bind("Name") %>' /> <br /> <asp:LinkButton ID="UpdateButton" runat="server" CausesValidation="True" CommandName="Update" Text="Update" /> &nbsp.<asp:LinkButton ID="UpdateCancelButton" runat="server" CausesValidation="False" CommandName="Cancel" Text="Cancel" /> </EditItemTemplate> 75 . border-bottomcolor: #41678E"> <asp:Image ID="Image1" runat="server" Width="194px" ImageUrl="~/Images/imagesCA167IXN.style2 { text-align: center.style8 { height: 435px.style12 { height: 52px. } . text-align: right. border-topcolor: #A4BAE8. } .style5 { height: 65px.<link href="StyleSheet."> <tr> <td class="style5" colspan="2" style="border-bottom-style: solid.css" rel="stylesheet" type="text/css" /> <asp:ContentPlaceHolder id="head" runat="server"> </asp:ContentPlaceHolder> <style type="text/css"> .jpg" Height="80px" /> <asp:Image ID="Image2" runat="server" ImageUrl="Images/title2. border-right-color: #A4BAE8.

<asp:LinkButton ID="InsertCancelButton" runat="server" CausesValidation="False" CommandName="Cancel" Text="Cancel" /> </InsertItemTemplate> <ItemTemplate> Welcome: <asp:Label ID="NameLabel" runat="server" Text='<%# Bind("Name") %>' /> &nbsp.aspx">register</a> </EmptyDataTemplate> </asp:FormView> <asp:SqlDataSource ID="SqlDataSource1" runat="server" ConnectionString="<%$ ConnectionStrings:ConnectionString %>" SelectCommand="SELECT [Name] FROM [UserTable] WHERE [Username] = @Username"> <SelectParameters> <asp:SessionParameter Name="Username" SessionField="Username" /> </SelectParameters> </asp:SqlDataSource> </td> <td class="style12"> &nbsp.aspx">Login</a> or <a href="registernewuser.aspx" Text="Main Page" Value="Main Page"></asp:TreeNode> <asp:TreeNode Text="User Control Panel" Value="User Control Panel"> <asp:TreeNode NavigateUrl="~/ViewUserProfile.<br /> <asp:LinkButton ID="LinkButton1" runat="server" onclick="LinkButton1_Click">Logout</asp:LinkButton> <br /> </ItemTemplate> <EmptyDataTemplate> Welcome: Guest<br /> <a href="Login.</td> </tr> <tr style="vertical-align: top"> <td class="style5"> <asp:TreeView ID="TreeView1" runat="server" Height="144px" ImageSet="Simple"> <ParentNodeStyle Font-Bold="False" /> <HoverNodeStyle Font-Underline="True" ForeColor="#5555DD" /> <SelectedNodeStyle Font-Underline="True" ForeColor="#5555DD" HorizontalPadding="0px" VerticalPadding="0px" /> <Nodes> <asp:TreeNode NavigateUrl="~/MainPageUsers.<InsertItemTemplate> Name: <asp:TextBox ID="NameTextBox" runat="server" Text='<%# Bind("Name") %>' /> <br /> <asp:LinkButton ID="InsertButton" runat="server" CausesValidation="True" CommandName="Insert" Text="Insert" /> &nbsp.aspx" 76 .

aspx" Text="View Order Status" Value="View Order Status"></asp:TreeNode> <asp:TreeNode NavigateUrl="~/viewMyReviews.Text="View \ Modify User profile" Value="View \ Modify User profile"> </asp:TreeNode> <asp:TreeNode NavigateUrl="~/ViewStatusPurchase.aspx" Text="View My Reviews" Value="View My Reviews"></asp:TreeNode> </asp:TreeNode> <asp:TreeNode NavigateUrl="~/SearchItems.aspx"> </asp:TreeNode> <asp:TreeNode NavigateUrl="~/ContactUs.aspx" Text="Contact Us" Value="Contact Us"></asp:TreeNode> </Nodes> <NodeStyle Font-Names="Tahoma" Font-Size="10pt" ForeColor="Black" HorizontalPadding="0px" NodeSpacing="0px" VerticalPadding="0px" /> </asp:TreeView> </td> <td class="style8" width="100%"> <asp:ContentPlaceHolder id="ContentPlaceHolder1" runat="server"> </asp:ContentPlaceHolder> </td> </tr> <tr> <td class="style2" colspan="2"> B.Tech.aspx" Text="Search For Items" Value="Search For Items"></asp:TreeNode> <asp:TreeNode Text="View Shopping cart" Value="View Shopping cart" NavigateUrl="~/ShoppingCart. Students JP Institute of Engineering & Technology 2011 </td> </tr> </table> </form> </body> </html> 77 .

font-weight: bold.master" AutoEventWireup="true" CodeFile="Default.cs" Inherits="_Default" Title="E-MART" %> <asp:Content ID="Content1" ContentPlaceHolderID="head" Runat="Server"> <style type="text/css"> . font-size: xx-large.style15 { width: 100%.&nbsp.style17 { font-weight: bold. text-decoration: underline overline"> Sorry You don&#39. Helvetica.&nbsp. <table class="style15" width="100%"> <tr> <td> <table class="style16" border="3px" style="border: thin solid #000000" > <tr style="height:33%"> <td align="center" bgcolor="#F0F0F0" width="100%"> <p> WANT TO BUY SOME PRODUCT ?</p></td> </tr> <tr style="height:33%"> <td align="center" width="100%"> CLICK BELOW</td> </tr> <tr style="height:33%"> <td align="center" width="100%"> <asp:Button ID="Button2" runat="server" BackColor="#993300" Font-Bold="True" Font-Names="Times New Roman" FontSize="Larger" Height="40px" onclick="Button2_Click" style="height: 40px" Text="BUY" Width="120px" /> </td> 78 . sans-serif.&nbsp. color: #FF0000.&nbsp.aspx.t Have Privileges to access this page!!! </p>--%> &nbsp.style16 { width: 100%.&nbsp.&nbsp.aspx coding <%@ Page Language="C#" MasterPageFile="~/login. text-transform: none. height: 267px.&nbsp. } </style> </asp:Content> <asp:Content ID="Content2" ContentPlaceHolderID="ContentPlaceHolder1" Runat="Server"> <%--<p class="style2" style="font-family: Arial. } .&nbsp. height: 270px.Default page .&nbsp. } .

online&nbsp.UI.UI. 79 . System. System. connecting&nbsp.HtmlControls.Web.Data. trading platform.</tr> </table> </td> <td> <table class="style16" border="3px" style="border: thin solid #000000"> <tr style="height:33%"> <td align="center" bgcolor="#F0F0F0" width="100%"> <p> WANT TO SELL SOME PRODUCT ?</p> </td> </tr> <tr style="height:33%" > <td align="center" width="100%"> CLICK BELOW</td> </tr> <tr style="height:33%"> <td align="center" width="100%"> <asp:Button ID="Button3" runat="server" BackColor="#993300" Font-Bold="True" Font-Names="Times New Roman" FontSize="Larger" Height="40px" onclick="Button2_Click" style="height: 40px" Text="SELL" Width="120px" /> </td> </tr> </table> </td> </tr> </table> <table class="style16"> <tr> <td class="style17"> <p style="font-size:x-large"> What is E-MART.Configuration.com is an&nbsp. System. buyers&nbsp.Security. System.Web. System. and&nbsp.Web.Collections. System.</p> <asp:Image ID="Image1" runat="server" ImageUrl="~/Images/Bike.jpg" Height="120px" Width="533px"/> </td> </tr> </table> </asp:Content> .Linq. System. System.cs coding using using using using using using using using using System.Web.com ?</p> <p>E-MART. sellers worldwide.

Redirect("Login.aspx. } .WebControls.UI."> 80 .UI. border-width: thin thin thick thin"> <tr> <td> <table class="style10"> <tr> <td class="style2" colspan="2" style="border-width: thin.Linq.WebParts. public partial class _Default : System. } </style> </asp:Content> <asp:Content ID="Content2" ContentPlaceHolderID="ContentPlaceHolder1" Runat="Server"> <table class="style9" style="border-style: groove. } } Login page . EventArgs e) { Response. height: 232px.cs" Inherits="Login" Title="Yahya's Cameras" %> <asp:Content ID="Content1" ContentPlaceHolderID="head" Runat="Server"> <style type="text/css"> . background-color: #7A9BDE.style9 { width: 58%. using System.Xml.master" AutoEventWireup="true" CodeFile="Login.Page { protected void Page_Load(object sender. } . using System. border-bottomstyle: groove.style10 { width: 100%.Web.Web.using System.UI.style11 { width: 92px.WebControls.Web.aspx coding <%@ Page Language="C#" MasterPageFile="~/login.aspx"). EventArgs e) { } protected void Button2_Click(object sender.

81 .</td> </tr> <tr> <td colspan="2"> <asp:ValidationSummary ID="ValidationSummary1" runat="server" /> <asp:Label ID="Label1" runat="server" ForeColor="#FF3300"></asp:Label> </td> </tr> <tr> <td colspan="2"> <asp:Button ID="Button1" runat="server" onclick="Button1_Click" style="text-align: center" Text="Login" /> </td> </tr> </table> </td> </tr> </table> </asp:Content> c# coding using System.Login</td> </tr> <tr> <td class="style11"> User Name:</td> <td> <asp:TextBox ID="TextBox1" runat="server"></asp:TextBox> <asp:RequiredFieldValidator ID="RequiredFieldValidator1" runat="server" ControlToValidate="TextBox1" ErrorMessage="Please Enter the username">*</asp:RequiredFieldValidator> </td> </tr> <tr style="border-bottom-style: groove"> <td class="style11"> Password</td> <td> <asp:TextBox ID="TextBox2" runat="server" TextMode="Password"></asp:TextBox> <asp:RequiredFieldValidator ID="RequiredFieldValidator2" runat="server" ControlToValidate="TextBox2" ErrorMessage="Please Enter The password">*</asp:RequiredFieldValidator> </td> </tr> <tr> <td colspan="2"> &nbsp.

SelectParameters.TextBox1.UI.Add("Password".ConnectionString = ConfigurationManager.Web. public partial class Login : System.TextBox2.ConnectionStrings["ConnectionString"]. this.Linq.Security.WebControls. System.WebParts.Web. // Create parameters with specified names and values sds.ToString() .Empty).Text). // Get connection string from application's default configuration sds.Linq. System. sds. System.Web. System.Web. System. System.Add("Username". this. System. System.UI.using using using using using using using using using using using System.Configuration.Web. TypeCode. 82 . EventArgs e) { } protected void Button1_Click(object sender.UI. System.Web.HtmlControls.Data.Page { protected void Page_Load(object sender.SelectCommand = "SELECT * FROM [UserTable] WHERE [Username] = @Username AND [Password] = @Password".UI.Text). // Retrieve data DataView dv = (DataView)sds.String. EventArgs e) { // Data source control that works with Sql databases SqlDataSource sds = new SqlDataSource().Select(DataSourceSelectArguments.Xml.WebControls.Web.Collections.SelectParameters.String. System. TypeCode.UI. // Set the SQL string to retrieve data from the underlying database sds.

aspx").Label1.Color.Red.// Display error message and return if the number of record is zero if (dv.cs" Inherits="WebApplication1.Text = "Login Failed!". return. this.aspx.ForeColor = System.org/TR/xhtml1/DTD/xhtml1-transitional.Session["UserType"] = dv[0].aspx").style1 { font-size: xx-large.Count == 0) { this.Drawing.Session["Username"] = dv[0].ToString(). 83 .dtd"> <html xmlns="http://www.w3.ToString().ToString().org/1999/xhtml" > <head runat="server"> <title>Untitled Page</title> <style type="text/css"> .Equals("admin")) Response.Session["UserType"].Redirect("MainPageAdmin.Row["Username"]. } // Create session variables this. // Redirect to respective page based on user type if (this.AC3" %> <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.Equals("user")) Response.Session["UserType"].w3. else if (this. font-weight: bold.0 Transitional//EN" "http://www.Row["UserType"]. } } Cart Connectivity <%@ Page Language="C#" AutoEventWireup="true" CodeBehind="AC3.ToString().Redirect("MainPageUsers. this.Label1.

&nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp. <span class="style1">&nbsp.&nbsp. &nbsp.&nbsp.&nbsp.&nbsp. } </style> </head> <body> <form id="form1" runat="server"> <p> &nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp. &nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp."> productID: <asp:Label ID="productIDLabel" runat="server" Text='<%# Eval("productID") %>' /> <br /> productName: <asp:Label ID="productNameLabel" runat="server" Text='<%# Eval("productName") %>' /> 84 .&nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp. &nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp. <asp:Image ID="Image1" runat="server" ImageUrl="~/shop.&nbsp.jpg" /> </p> <p> &nbsp.&nbsp.&nbsp.color: #333333.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp.</p> <p class="style2"> &nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp. &nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp. &nbsp.&nbsp.color: #284775.&nbsp.&nbsp.&nbsp.&nbsp."> productID: <asp:Label ID="productIDLabel" runat="server" Text='<%# Eval("productID") %>' /> <br /> productName: <asp:Label ID="productNameLabel" runat="server" Text='<%# Eval("productName") %>' /> <br /> salePrice: <asp:Label ID="salePriceLabel" runat="server" Text='<%# Eval("salePrice") %>' /> <br /> </td> </ItemTemplate> <AlternatingItemTemplate> <td runat="server" style="background-color: #FFFFFF. } .&nbsp.&nbsp.&nbsp.&nbsp.</p> <p> <br /> &nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp.</p> <p> &nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp.style2 { text-align: center.&nbsp.&nbsp.&nbsp.color: #FF0000.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp.</p> <asp:ListView ID="ListView1" runat="server" DataKeyNames="productID" DataSourceID="SqlDataSource1" EnableModelValidation="True" InsertItemPosition="LastItem"> <ItemTemplate> <td runat="server" style="background-color: #E0FFFF.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp. &nbsp.&nbsp.&nbsp.&nbsp.&nbsp. &nbsp.YOUR SHOPPING CART</span></p> <p class="style2"> &nbsp.&nbsp.&nbsp. &nbsp.&nbsp.&nbsp.&nbsp. &nbsp.&nbsp.&nbsp.

borderstyle:none. sans-serif.border-collapse: collapse.background-color: #5D7B9D.font-family: Verdana."> productID: <asp:Label ID="productIDLabel1" runat="server" Text='<%# Eval("productID") %>' /> <br /> productName: <asp:TextBox ID="productNameTextBox" runat="server" Text='<%# Bind("productName") %>' /> <br /> salePrice: <asp:TextBox ID="salePriceTextBox" runat="server" 85 . sans-serif.font-family: Verdana.color: #FFFFFF"> </div> </LayoutTemplate> <EditItemTemplate> <td runat="server" style="background-color: #999999.<br /> salePrice: <asp:Label ID="salePriceLabel" runat="server" Text='<%# Eval("salePrice") %>' /> <br /> </td> </AlternatingItemTemplate> <EmptyDataTemplate> <table style="background-color: #FFFFFF.border-width:1px.</td> </tr> </table> </EmptyDataTemplate> <InsertItemTemplate> <td runat="server" style=""> productID: <asp:TextBox ID="productIDTextBox" runat="server" Text='<%# Bind("productID") %>' /> <br /> productName: <asp:TextBox ID="productNameTextBox" runat="server" Text='<%# Bind("productName") %>' /> <br /> salePrice: <asp:TextBox ID="salePriceTextBox" runat="server" Text='<%# Bind("salePrice") %>' /> <br /> <asp:Button ID="InsertButton" runat="server" CommandName="Insert" Text="Insert" /> <asp:Button ID="CancelButton" runat="server" CommandName="Cancel" Text="Clear" /> </td> </InsertItemTemplate> <LayoutTemplate> <table runat="server" border="1" style="background-color: #FFFFFF.border-color: #999999.border-style:none. Arial. Arial.border-collapse: collapse.border-width:1px."> <tr ID="itemPlaceholderContainer" runat="server"> <td ID="itemPlaceholder" runat="server"> </td> </tr> </table> <div style="text-align: center. Helvetica.border-color: #999999. Helvetica."> <tr> <td> No data was returned.

&nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp. &nbsp.&nbsp.&nbsp.&nbsp. &nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp.</p> <p> &nbsp.&nbsp."> productID: <asp:Label ID="productIDLabel" runat="server" Text='<%# Eval("productID") %>' /> <br /> productName: <asp:Label ID="productNameLabel" runat="server" Text='<%# Eval("productName") %>' /> <br /> salePrice: <asp:Label ID="salePriceLabel" runat="server" Text='<%# Eval("salePrice") %>' /> <br /> </td> </SelectedItemTemplate> </asp:ListView> <asp:SqlDataSource ID="SqlDataSource1" runat="server" ConnectionString="<%$ ConnectionStrings:masterConnectionString %>" InsertCommand="INSERT INTO purchaseorder(productID.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp.color: #333333.&nbsp.&nbsp. &nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp. salePrice FROM productTB WHERE (productID = 113)"> </asp:SqlDataSource> <p> &nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp. &nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp. 02.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp. &nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp. &nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp. 26000)" SelectCommand="SELECT productID. <asp:Label ID="Label1" runat="server" Text="QUANTITY"></asp:Label> <asp:TextBox ID="TextBox1" runat="server"></asp:TextBox> &nbsp.font-weight: bold.&nbsp.&nbsp.&nbsp. &nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp. &nbsp.&nbsp.&nbsp.&nbsp.&nbsp. &nbsp.&nbsp. </p> 86 .&nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp. price) VALUES (N'113'.&nbsp. productName.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp.Text='<%# Bind("salePrice") %>' /> <br /> <asp:Button ID="UpdateButton" runat="server" CommandName="Update" Text="Update" /> <asp:Button ID="CancelButton" runat="server" CommandName="Cancel" Text="Cancel" /> </td> </EditItemTemplate> <SelectedItemTemplate> <td runat="server" style="background-color: #E2DED6.&nbsp.&nbsp. &nbsp. &nbsp.&nbsp.&nbsp.&nbsp.&nbsp. &nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp. &nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp. &nbsp.&nbsp. quantity.&nbsp.&nbsp.&nbsp.&nbsp. &nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp. &nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp. <asp:LinkButton ID="LinkButton1" runat="server">ADD TO CART</asp:LinkButton> </p> <p> &nbsp.

&nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp. &nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp. &nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp. &nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp. &nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp. &nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp. &nbsp.&nbsp.&nbsp.aspx">CONTINUE SHOPPING</asp:LinkButton> &nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp.<p> &nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp. &nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp. &nbsp.&nbsp.&nbsp. &nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp. <asp:LinkButton ID="LinkButton3" runat="server" BackColor="Red">GO TO FINAL BILL</asp:LinkButton> </p> </form> </body> </html> 87 .&nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp. &nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp. &nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp. &nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp. &nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp. &nbsp.&nbsp.&nbsp.&nbsp.&nbsp. <asp:LinkButton ID="LinkButton2" runat="server" BackColor="Red" PostBackUrl="~/ac.&nbsp. &nbsp.&nbsp.&nbsp.&nbsp.&nbsp.

CHAPTER:5 TESTING TESTING 88 .

for example. by assigning a pointer to point to an object of the wrong type. Test cases are chosen to exercise each portion. Partitions exist for both input and output.e. Black box testing should not be used to try and reveal corruption defects caused. Black box testing is rarely exhaustive (because one doesn't test every value in an equivalence partition) and sometimes fails to reveal corruption defects caused by "weird" combination of inputs. negative numbers. Failing this a systematic approach may be necessary. positive numbers vs. zero) since these frequently show up defects.g. Equivalence partitioning is where the input to a program falls into a number of classes. Static inspection (or using a better programming language!) is preferable for this. E. For completeness. test all combinations of partitions. Invalid data (i. WHITE-BOX (STRUCTURAL) TESTING 89 . Programs norShopy behave the same way for each member of a class.TESTING BLACK-BOX (FUNCTIONAL) TESTING Testing against specification of system or component. outside the normal partitions) is one or more partitions that should be tested. Also test boundary cases (atypical. Key is to devise inputs that have a higher likelihood of causing outputs that reveal the presence of defects. Partitions may be discrete or overlap. Study it by examining its inputs and related outputs. extreme. Use experience and knowledge of domain to identify such test cases.

procedure calls and I/O statements). Data complexity not taken into account. Static tools may be used to make this easier in programs that have a complex branching structure. Path testing is where the tester aims to exercise every independent execution path through the component. Really only possible at unit and module testing stages because beyond that complexity is too high. there will be up to 2n possible paths through it. by looking at source code). Tools support. Knowledge of the algorithm (examination of the code) can be used to identify the equivalence partitions. All conditional statements tested for both true and false cases. Typically this will count how many times each statement is executed. If a unit has n control statements. Advantage is that structure of code can be used to find out how many test case need to be performed.g. 2. Problems with flow graph derived testing: 1. Dynamic program analyzers instrument a program with additional code. print out report showing which statements have and have not been executed.Testing based on knowledge of structure of component (e. Use flow graph to design test cases that execute each path. Flow graphs are a pictorial representation of the paths of control through a program (ignoring assignments. This demonstrates that it is much easier to test emart program units than large ones. INTERFACE TESTING 90 . Does not test all paths in combination. At end. 3.

Common manifestations are when each unit assumes the other one is checking for invalid data (failure to check return status) and the consequences of when such a fault is propagated to other units.One places data there and the other retrieves it. 91 . 2. Three common kinds of interface error: 1. Particularly important when OO development has been used. Message passing: one sub-system requests a service by passing a message. Four types of interface: 1. 2. Interface misunderstanding: caller misunderstanding specification of called component and provides or receives data in legal but unexpected form. Parameter: data (or occasionally function references) passed from one unit to another. 3. encapsulating several procedures. Clientserver interface also used by some OO architectures. Interface misuse: caller gives wrong number/types/order of parameters or sends invalid message. Objective is to detect errors or invalid assumptions about interfaces between modules. 4. Timing errors: producer/consumer of data operate at different speeds and data is accessed before being ready. Reason these are not shown up in unit testing is that test case may perpetuate same incorrect assumption made by module designer. "Race conditions". Procedural: object-oriented or abstract data type form of interface. Shared memory: block of memory shared between units (e.Usually done at integration stage when modules or sub-systems are combined. global variable) . 3.g.

collection of related modules.TESTING PROCESS Best testing process is to test each subsystem separately. cluster of classes. methodmessage paths 4. Module -package. Beta testing involves distributing system to potential customers to use and provide feedback. method 2. Acceptance testing . Sub-system . this project. Best done after emart sub-steps of the implementation rather than large chunks. Once each lowest level unit has been tested. function. units are combined with related units and retested in combination. This proceeds hierarchically bottom-up until the entire system is tested as a whole. Typical levels of testing: 1. 92 . In. Best done during implementation. Beta testing has been followed. as we have done in my project. user. etc) Alpha testing is acceptance testing with a single client (common for bespoke systems).whole system with real data (involve customer. Unit -procedure. class 3. This exposes system to situations and errors that might not be anticipated by us. abstract data type.

CHAPTER:6 SNAPSHOTS & & SNAPSHOTS TABLES USED USED TABLES 93 .

SNAPSHOTS HOME PAGE LOGIN PAGE 94 .

REGISTRATION PAGE CATLOG 95 .

SUCCESSFULL ACCOUNT CREATION 96 .

PRODUCT TABLE SHOPPING CART PAGE USER PASSWORD TABLE 97 .

DATA TABLE VIEW 98 .

USER TABLE:- COLUMN NAME DATA TYPE ID (Primary key) Int UserName nvarchar(50) Password nvarchar(50) 99 .PRODUCT DESCRIPTION PAGE TABLES USED 1.

PRODUCT TABLE:- COLUMN NAME DATA TYPE 100 .Email nvarchar(50) Address nvarchar(150) Name nvarchar(50) IDNumber nvarchar(50) UserType nvarchar(50) 2.PRODUCT CATEGORY TABLE:- COLUMN NAME DATA TYPE CategoryID(Primary key) Int Category nvarchar(50) 3.

ProductID(Primary key) Int ProductName nvarchar(50) ProductDescription nvarchar(2000) ProductShortDescription nvarchar(500) Price Float Category nvarchar(50) ProductImage nvarchar(500) ProductImageThumb nvarchar(50) 4.SHOPPING CART TABLE:- COLUMN NAME DATA TYPE ShoppingID (Primary key) Int ProductIDNO nvarchar(50) 101 .

UserID nvarchar(50) SalesStatus nvarchar(50) Qty Int 5.ORDER TABLE:COLUMN NAME DATA TYPE SerialNumber (Primary key) Int Username nvarchar(50) Amount Float 6.REVIEW TABLE:- COLUMN NAME DATA TYPE ReviewID(Primary key) Int UserName nvarchar(50) 102 .

Review

nvarchar(4000)

ProductID

nvarchar(50)

CHAPTER:7

MAINTENANCE &
&
MAINTENANCE
CONCLUSION
CONCLUSION
103

MAINTENANCE
Maintenance of the project is very easy due to its modular design and concept any
modification can be done very easily. All the data are stored in the software as per
user need & if user wants to change he has to change that particular data, as it will be
reflected in the software every where. Some of the maintenance applied is: -

1.BREAKDOWN MAINTENANCE: The maintenance is applied when an error occurs & system halts and further
processing cannot be done .At this time user can view documentation or consult us for
104

rectification & we will analyze and change the code if needed. Example: - If user gets
a error “report width is larger than paper size” while printing report & reports can not
be generated then by viewing the help documentation & changing the paper size to
‘A4’ size of default printer will rectify the problem.”

2.PREVENTATIVE MAINTENANCE: User does this maintenance at regular intervals for smooth functioning
(operation) of software as per procedure and steps mentioned in the
manual.
Some reasons for maintenance are: Error Correction: - Errors, which were not caught during testing, after the system has,
been implemented. Rectification of such errors is called corrective maintenance.
New or changed requirements: - When Organization requirements changes due to
changing opportunities.
Improved performance or maintenance requirements: -Changes that is made to
improve system performance or to make it easier to maintain in the future are called
preventive maintenance. Advances in technology (Adaptive maintenance): - Adaptive
maintenance includes all the changes made to a system in order to introduce a new
technology.

LIMITATIONS: 1. This project does not Edit the date of connection or store the date of transfer in
case of connection transfer.
2. System date for the project is like as backbone for the human, i.e. proposed
105

finance etc. Cannot be connected to the Internet. The development of this package has been achieved by using ASP. to elaborate further study. CONLUSION On the basis of the work done in dissertation entitled “E-MART”. 1. This project has achieved the objective of replacing/augmenting the conventional system of arranging manpower as could be conducted by a mall facility. 3.system is depends on system date so it must be correct. the following conclusions emerge from the development. which is very conductive to develop the package with regard to time and specific need to the user. 2. There are some inherent problems like time.NET. 106 . 4.

4. the visual outputs are more reliable than the audio forms of manual communication.0in C# 2008 .com 107 . 6.NET 2.com • www.quickstart.bytheprice.com • Black book . Fully automated. avoiding human intervention.startvbdotnet.0 (Andrew Troelsen) .5 • www.ebay. The system can further extended as per user and administrative requirements to encompass other aspects of connection management for telecom dept.by Apress publication • www.com • www. We will provide e store for sellers REFERENCES • Pro C# with .3.by Apress publication • Pro ASP. This package is highly user friendly.NET 3. Hence it provides a very rapid cost effective alternative to the conventional manual operation/procedures. required an optimal minimal input from user while providing highly relevant and focused outputs.net 3. 5.

com 108 .• www.net.asp.