You are on page 1of 101

ABSTRACT

A passport is a must when you plan to travel out of your country of residence.
It is an identity card that endorses your legitimate citizenship. Without a valid
passport, you will not be allowed to enter any country. When you book your travel
through MakeMyTrip.com, we ensure that your passport is safe and well taken care of.
Here youll find all the essential information you need about rules & regulations
regarding passports, including the process for procuring a new passport and renewing
an existing one.

For Online Registration, the applicant has to submit the print outs of the
application form along with required documents to the respective passport office in
the appointment date and time printed. If you are a holder of a passport, then you are
entitled to an automatic re-issue of a passport, without prior police verification
provided the original passport was issued from the same Passport Office. You can
apply one year before the passport expires or within 5 years after it expires to obtain
this expeditious service.

India decided to do away with the Emigration Clearance Requirement


Suspension (ECRS) norm for Emigration Check Required (ECR) passport holders
travelling abroad in 2007.The e-Passport is undoubtedly a highly secure travel
document which not only benefits the passport holders but also enhances
international security and deters human trafficking. Undesirables can hardly
circumvent immigration control by using altered or forged e-Passport. With the
manipulation and integration of high technologies, the e-Passport System supports ePassport application procedures from the very beginning to the end. It brings quality
services and huge convenience to the applicants while, on the other hand, the system
is a cost-effective and reliable solution to the ImmD.

1. PROBLEM DEFINITION

Multiple

state-of-the-art

sophisticated

technologies

are

seamlessly

integrated

in

the

Electronic Passport System (e-Passport System) which

was developed to support and control the issue of new electronic passport (epassport) as well as other electronic travel documents of the Hong Kong Special
Administrative

Region

(HKSAR)

and,

with

the

application

of

advanced

technologies, the system results in huge benefits to passport applicants, the Hong
Kong Immigration Department (ImmD) and also the society as a whole.

After the tragic 911 incident, governments all over the world dedicate to enhance their
capability in identifying and deterring the entry of suspect travelers and in particular terrorists so as
to uphold their homeland security. One very effective means to distinguish undesirables who may
attempt to circumvent immigration control by using forged travel documents or identities is to
issue e-Passport incorporating holders biometric information.
In this connection, the e-Passport System was developed to support and control the issue of
new HKSAR e-Passport and also other electronic HKSAR travel documents such as electronic
Document of Identity (e-Doc/I). Advanced technologies are applied and integrated in the
complicated e-Passport System which, in specific, handles application processing, case
assessment, personalization and issuance of e-Passport.

1.1. PROBLEM DOMAIN


ORGANIZATION STRUCTURE
One can apply for Passport through Online Registration, (after doing online registration,
get print outs of the application form) Online Registration. Apart from this applicant can submit
directly in the respective passport office/ DPCs/Speed post centers, get the relevant application
form. The Passport Application Form is Machine Readable. And one may get the passport easily
with the help of the online system with in a minimum amount of time.

Applying for New Passport


Passport Renewal
ECR/ECNR
Passport Enquiry
Special Branch
Search data for the required passport number

1) Applying for New Passport module:


This module gives the procedure and form to fill up the application for the new passport.
In order to process your online passport application, we must have the proof of identification and
proof of U.S. citizenship. You will be responsible for the passport photo, acceptance facility,
shipping, and government fees. Processing speed will be based on a similar service. Insurance
coverage does not include replacement of expired passports, name changes, or valid travel visas.
2) Passport Renewal module:

This module gives the renewal form of the existed passport which had completed its time
period .There are some rules for the renewal of the passport and the fee particulars also change.
This module binds with the ECR/ECNR module to specify the requirement of the emigrated check.

3) ECR/ECNR module:
This module maintains the data of the emigration check required or not.

This module

fairly maintains the integration between the modules related to the new passport application and
the renewal of the passport. This module also binds the information of the dependants and
housewives.
4) Passport Enquiry module:
This module manages and keeps track of the details of the complete information of the epassport maintenance. And gives the process of how to apply the new passport and the fee details
also. It gives the information about, if the passport is lost or stolen and the process of the child
passport. This module also contains the information about the emigrated check required or not.
5) Special Branch module:
This module maintains the details of the special branch for the police enquiry purpose.
Before issuing the passport to the applicant the special branch police conform whether the
applicant is authenticated or not with the details mentioned in the application. And also verifies the
witnesses of the issuing passport to the applicant.

2. REQUIREMENT ANALYSIS

2.4 Existing system


The system used to waste a great lot of time in managing the information,
which was collected in papers. The consistency and reliability were always
questionable, now the system has taken a form decision that it will manage all the
system consistency and reliability through IT standards, the need for the present
system aroused.

The planning objective is achieved through a process of information discovery


that leads to reasonable estimation.

Keeping

the

following

aspects

in

mind,

the

system analysis for

the

development of the project.

Identify the draw backs of the existing system.

Identify the need for conversion.

Perform feasibility study.

Identify hardware, software and the database requirements.

Create a system definition that performs the foundation for the sub sequent
work.

2.4.1 Software Scope:

The first activity in software project planning is the determination of the


software scope.The function and perform allocated to software should be assesses to
establish a project scope. Software scope describes function, performance, reliability
and constraints.

2.4.2 Estimation:
Software project planning estimate can be done in many ways such as Lines of
Code (LOC) based estimation, Functional Point Estimation (FP), Process Based
Estimation. We should select best one depending on the requirement.
2.4.3 Resource availability:
The resources, which are common to any system, consist of human effort,
information and development resource. Developing any system without satisfactory
resources is in appropriate and impossible. The design development team for this
project consists of five members or roles that are responsible for software
development and internal testing and its usage. Information assembly is vital to this
project. Various sources of information are available.

2.5. FEASIBILITY ANALYSIS


Feasibility study is a test of a system proposal according to its workability,
impact on the organization, ability to meet user needs and effective use of the
available resources. The objective of feasibility study is not to solve the problem but
to acquire a sense of its scope.
Three key combinations are involved in the feasibility analysis. They are:
2.5.1 Economical Feasibility
Economic analysis is the most frequently used method for evaluating the
effectiveness of a client system. More commonly known as cost/benefit analysis, the

procedure is to determine the benefits and savings that are expecting from a client
system and compare them with cost.
2.5.2 Technical Feasibility
Technical feasibility centers on the existing computer system (hardware,
software etc) and to what extent it can support the proposed addition. The benefits
such as high accuracy, minimum response time and user friendliness of the proposed
system over weights cost for designing and implementing the new system.

2.5.3 Operational Feasibility


The system is operationally feasible, it is made so easy that operator will not
encounter any problem during working, as it is very user-friendly. Operational
feasibility checks the scope of the system. The system under consideration should
have enough operational research. It is observed that the proposed system would
provide a very interactive means to share information and have a far and wide range.
The proposed system would make the information more interactive. Thus operational
feasibility of the proposed system id found to be high.
2.5.4 Behavioral Feasibility
People are inherently resistant to change, and computers have been known to
facilitate change. An estimate should be made of hoe strong a reaction the user staff
is likely to have towards the development of a computerized system. It is common
knowledge that computer installations have some thing to do with turnover transfer,
remaining and changes in employee job status. Therefore, it is understandable that
the introduction of a client system requires special effects to educate, sell and train
the staff on new ways of conducting business.
2.6. E R DIAGRAM
The relation upon the system is structure through a conceptual ER-Diagram,
which not only specifies the existential entities but also the standard relations

through which the system exists and the cardinalities that are necessary for
the system state to continue.
The Entity Relationship Diagram (ERD) depicts the relationship between the
data objects.
The ERD is the notation that is used to conduct the date modeling activity the
attributes of each data object noted is the ERD can be described resign a data
object descriptions.
The set of primary components that are identified by the ERD are
Data object
Relationships
Attributes
Various types of indicators
The primary purpose of the ERD is to represent data objects and their relationships.
We can express the overall logical structure of a database graphically with an E-R
diagram.
Its components are:
Rectangles: representing entity sets.
Ellipses: representing attributes.
Diamonds: representing relationship sets.
Lines: linking attribute to entity sets and entity sets to relationship sets.
Rectangles

Represents entity sets

Ellipses

Representing attributes

Diamonds

Lines

Representing relationship sets

Linking attribute to entity sets and entity sets to relationship sets

Data Flow
One to One
One to Many
Many to One
Many to Many

E R DIAGRAM

Name
Id

Profe

Password
Occu
Admin

Special
Branch

Police

User

Witness2

New passport

Name

DOB

Profe

Addr

Renewal

Enquiry

Name
New
Passport

Addr

Crimes
Conduct

Witness1

Ecr/Ecnr

Name
Pass no

Renewal

Pass no

Profe
Ecr/Ecnr

Fee amt

SB
Fee amt

Pass no

2.7. DATAFLOW DIAGRAMS

POI
DOI

A dataflow diagram (DFD) is a significant modeling technique for analyzing and


constructing information processes. DFD literally means an illustration that explains
the course or movement of information in a process. DFD illustrates this flow of
information in a process based on the inputs and outputs. A DFD can be referred to a
Process Model.

Additionally, a DFD can be utilized to visualize data processing or a structured


design. A DFD illustrates technical or business processes with the help of the external
data stored, the data flowing from process to another, and the results.

A designer usually draws a context-level DFD showing the relationship between


the entities inside and outside of a system as one single step. This basic DFD can be
disintegrated to a lower

level diagram demonstrating similar steps exhibiting

details of the system that is being modeled. Numerous levels may be required to
explain a complicated system.

Therefore, the principle for creating a DFD is that one system may be
disintegrated into subsystems, which in turn can be disintegrated into subsystems at
a much lower level, and so on and so forth. Every subsystem in a DFD

represents a

process. In this process are activity the input data is processed. Processes can not be
decomposed

after reaching a certain lower level. Each process in DFD characterizes

an entire system. In a DFD system, data is introduced into the system from the
external environment. Once entered the data flows between processes. And then
processed data is produced as an output or a result.

10

S.NO
1

COLUMN
PASS_NO

DATATYPE
Numeric

LENGTH
10

DESCRIPTION
Passport Reference Number

2
3
4

SIGN
FEEAMT
CASHDD

Varchar
Numeric
Varchar

30
5
20

5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32

BANKCODE
DDNO
DOI
SURNAME
FSTNAME
ECRECNR
SEX
DOB
POB
DIST
QUALI
PROF
PADD
PERADD
PHNO
MOBNO
EMAIL
MSTATUS
FNAME
MNAME
FHPROF
OCCU
EDUQUA
PRPSVISIT
ITAX
CASES
PROOF
GETSIGN

Varchar
Numeric
Datetime
Varchar
Varchar
Varchar
Varchar
Datetime
Varchar
Varchar
Varchar
Varchar
Varchar
Varchar
Numeric
Number
Varchar
Varchar
Varchar
Varchar
Varchar
Varchar
Varchar
Varchar
Varchar
Varchar
Varchar
Varchar

20
10

Initial of the Applicant


Fee Amount to be paid
Amount paid in the form of
cash or DD
Code of the Bank
Number of DD
Date of Issue of DD
Surname of Applicant
Full Name
ECR/ECNR
Male or Female
Date Of Birth
Place Of Birth
District
Qualification
Profession
Present Address
Permanent Address
Phone number
Mobile Number
E-mail Address
Marital Status
Father Name
Mother Name
Father Profession
Occupation
Educational Qualification
Purpose Of Visit
Income Tax
Police Cases
Proof
Gezetted Signature

20
30
10
20
50
50
30
30
50
50
10
10
30
20
20
20
20
20
50
500
20
100
50
20

DATA DICTIONARY

3. SYSTEM DESIGN
11

3.1 DATABASE DESIGN


3.1.1 NORMALIZATION
It is a process of converting a relation to a standard form. The process is used
to handle the problems that can arise due to data redundancy i.e. represent of data is
the database, maintain data integrity as well as handling the problems that can arise
due to insertion, updating, deletion anomalies.
Decomposing is the process of splitting relations into multiple relations to
eliminate anomalies and maintains anomalies and maintains data integrity. To do this
we use normal forms for structuring relation.
Insertion anomaly: Inability to add data to the database due to absence of other
data.
Deletion anomaly: Unintended loss of data due to deletion of other data.
Update anomaly:

Data inconsistency resulting from data redundancy and partial

update.
Normal Forms:

These are rules for structuring relations that eliminate anomalies.

3.1.2 TYPES OF NORMALIZATION


There are four major types of normal forms for making the normalization to the
removal of data redundancy
1. First Normal form (1NF)
2. Second Normal form (2NF)
3. Third Normal form (3NF)
4. BCNF form

12

1) FIRST NORMAL FORM (1NF):


A relation is said to be in first normal form if the values in the relation are
atomic for every attribute in the relation. By this we mean simply that no attribute
value can be set of values, or as it is sometimes expressed, a repeating group.
In this project E-Passport Maintenance System pass_no is generated as a
primary key and it can be represented as the reference for the following tables. And
the remaining attributes are represented as multivalue attributes.

13

COLUMN

DATATYPE

LENGTH

CONSTRAINTS

PASS_NO

Numeric

10

PRIMARY KEY

SIGN

Varchar

30

NOT NULL

FEEAMT

Numeric

NOT NULL

CASHDD

Varchar

20

NOT NULL

BANKCODE

Varchar

20

NOT NULL

DDNO

Numeric

10

NOT NULL

DOI

Datetime

SURNAME

Varchar

20

NOT NULL

FSTNAME

Varchar

30

NOT NULL

ECRECNR

Varchar

10

NOT NULL

SEX

Varchar

20

NOT NULL

DOB
POB

Datetime
Varchar

50

NOT NULL
NOT NULL

DIST

Varchar

50

NOT NULL

QUALI

Varchar

30

NOT NULL

PROF

Varchar

30

NOT NULL

PADD

Varchar

50

NOT NULL

PERADD

Varchar

50

NOT NULL

PHNO

Numeric

10

NOT NULL

MOBNO

Number

10

NOT NULL

EMAIL

Varchar

30

NOT NULL

MSTATUS

Varchar

20

NOT NULL

FNAME

Varchar

20

NOT NULL

MNAME

Varchar

20

NOT NULL

NOT NULL

14

2) SECOND NORMAL FORM (2NF):

A relation is said to be in second Normal form if it is in first normal form and not
should satisfy any one of the following rules.
1) Primary key is not a composite primary key.
2) No non-key attributes are present.
3) Every non-key attribute is fully functionally dependent on full set of primary key.
In this project E-Passport Maintenance System the attribute pass_no is a
primary key and not having a composite primary key. According to 2NF the primary
key pass_no only present in the table and the non-key attributes are deleted.

COLUMN

DATATYPE

LENGTH

CONSTRAINTS

PASS_NO

Numeric

10

PRIMARY KEY

3) THIRD NORMAL FORM (3NF):

A relation is said to be in third normal form if there exists no transitive


dependencies.
Transitive Dependency: If two non-keys depend on each other as well as on the
primary key then they are said to be transitively dependent.

15

4) BCNF NORMAL FORM:


One of the more desirable normal forms that we can obtain is Boyce-Codd
Normal Form (BCNF). It eliminates all redundancy that can be discovered based on
functional dependencies, though there may be other types of redundancies
remaining.
In this project E-Passport Maintenance System also the redundancy is deleted
based on the functional dependencies as pass-no and fee.
The above normalization principles were applied to decompose the data in
multiple tables thereby making the data to be maintained in a consistent state.

COLUMN

DATATYPE

LENGTH

CONSTRAINTS

PASS_NO

Numeric

10

PRIMARY KEY

FEE

Numeric

NOT NULL

3.1.3 TABLE STRUCTURE

Number of Database Tables


The project has been identified to contain 4 database tables, which are as follows
1) New passport entry
2) Renewal Passport
3) ECR/ECNR
4) Special branch

16

1)

COLUMN

DATATYPE

LENGTH

CONSTRAINTS

PASS_NO

Numeric

10

PRIMARY KEY

SIGN

Varchar

30

NOT NULL

FEEAMT

Numeric

NOT NULL

CASHDD

Varchar

20

NOT NULL

BANKCODE

Varchar

20

NOT NULL

DDNO

Numeric

10

NOT NULL

DOI

Datetime

NOT NULL

SURNAME

Varchar

20

NOT NULL

FULLNAME

Varchar

30

NOT NULL

ECRECNR

Varchar

10

NOT NULL

SEX

Varchar

20

NOT NULL

DOB

Datetime

NOT NULL

POB

Varchar

50

NOT NULL

DIST

Varchar

50

NOT NULL

QUALI

Varchar

30

NOT NULL

PROF

Varchar

30

NOT NULL

PADD

Varchar

50

NOT NULL

PERADD

Varchar

50

NOT NULL

PHNO

Numeric

10

NOT NULL

MOBNO

Number

10

NOT NULL

EMAIL

Varchar

30

NOT NULL

MSTATUS

Varchar

20

NOT NULL

FNAME

Varchar

20

NOT NULL

MNAME

Varchar

20

NOT NULL

Table Name: New passport

Description:

This table contains the application form of new passport

17

2)

COLUMN

DATATYPE

LENGTH

CONSTRAINTS

PASS_NO

Numeric

10

PRIMARY KEY

SIGN1

Varchar

30

NOT NULL

FEEAMT

Numeric

NOT NULL

CASHDD

Varchar

20

NOT NULL

BANKCODE

Varchar

20

NOT NULL

DDNO

Numeric

10

NOT NULL

DOI

Datetime

NOT NULL

SURNAME

Varchar

20

NOT NULL

FULLNAME

Varchar

30

NOT NULL

PPID

Number

10

NOT NULL

ECRECNR

Varchar

10

NOT NULL

SEX

Varchar

20

NOT NULL

DOB

Datetime

NOT NULL

POB

Varchar

50

NOT NULL

DIST

Varchar

50

NOT NULL

QUALI

Varchar

30

NOT NULL

PROF

Varchar

30

NOT NULL

PADDR

Varchar

50

NOT NULL

PERADD

Varchar

50

NOT NULL

PHNO

Numeric

10

NOT NULL

MOBNO

Number

10

NOT NULL

EMAIL

Varchar

30

NOT NULL

MSTATUS

Varchar

20

NOT NULL

FNAME

Varchar

20

NOT NULL

MNAME

Varchar

20

NOT NULL

Table Name: Renewa Description: T


his table contains the renewal form of the old passport

18

COLUMN

DATATYPE

LENGTH

CONSTRAINTS

PASS_NO

Numeric

10

PRIMARY KEY

NAME

Varchar

50

NOT NULL

PROF

Varchar

NOT NULL

OCCU

Varchar

20

NOT NULL

EDUQUA

Varchar

50

NOT NULL

PRPSVISIT
ITAX

Varchar
Varchar

50
20

NOT NULL
NOT NULL

FHNAME

Varchar

20

NOT NULL

FHPROF

Varchar

20

NOT NULL

SIGN1

Varchar

10

NOT NULL

3)Table Name: ECRDescription:


This table specifies the standard of ECR/ECNR

19

4)

COLUMN

DATATYPE

LENGTH

NAME

Numeric

10

NOT NULL

DOB

Datetime

NOT NULL

POB

Varchar

20

NOT NULL

FNAME

Varchar

20

NOT NULL

MNAME

Varchar

50

NOT NULL

CASES

Varchar

100

NOT NULL

PROOF

Varchar

50

NOT NULL

GETSIGN

Varchar

20

NOT NULL

FHPROF

Varchar

20

CONSTRAINTS

NOT NULL

Table Name: Special Branch


Description: This table contains the proforma of police enquiry

20

3.2 ARCHITECTURE DESIGN

The .NET Framework is a new computing platform that simplifies application


development in the highly distributed environment of the Internet. The .NET
Framework is designed to fulfill the objectives.
To provide a consistent object-oriented programming environment whether
object code is stored and executed locally, executed locally but Internet
distributed, or executed remotely.
To provide a code-execution environment that minimizes software deployment
and versions conflicts.
To provide a code-execution environment that guarantees safe execution of
code, including code created by an unknown or semi-trusted third party.
To provide a code-execution environment that eliminates the performance
problems of scripted or interpreted environments.
To make the developer experiences consistent across widely varying types of
applications, such as windows-based applications and web-based applications.
To build all communications on industry standards to ensure that code based
on the .NET Framework can integrate with any other code.

21

ARCHITECTURE DIAGRAM:

SQL

App Development

Tech
Request
(ASP, Win Forms)

Data Base
Server (SQL
Server)

Class Libraries
(ADO.Net)
.
Reply N
E
T
Data

APPLICATION
CLIENT
E-PASSPORT
MAINTENANCE
SYSTEM

F
R
A
Change M
E
Notificat-

Storage

ion
Local
Replicatio
ns

22

4. CODING

CODE FOR LOGIN FORM

Partial Class _Default


Inherits System.Web.UI.Page
Dim f As Integer

Protected Sub Page_Load(ByVal sender As Object, ByVal e As System.EventArgs)


Handles Me.Load
TextBox1.Focus()
End Sub

Protected
Sub
Button2_Click(ByVal
sender
System.EventArgs) Handles Button2.Click

As

Object,

ByVal

As

If ((DropDownList1.Text = "USER") And (TextBox1.Text = "user")) Then


Response.Redirect("user.aspx")
ElseIf ((DropDownList1.Text = "POLICE") And (TextBox1.Text = "police"))
Then
Response.Redirect("sb.aspx")
ElseIf ((DropDownList1.Text = "ADMIN") And (TextBox1.Text = "admin"))
Then
Response.Redirect("home.aspx")
Else
MsgBox("please enter correct password")
End If

23

End Sub

Protected
Sub
Button1_Click1(ByVal
System.EventArgs) Handles Button1.Click

sender

As

Object,

If DropDownList1.SelectedIndex = 0 Then
MsgBox("authorization is not provided to otheres")
ElseIf DropDownList1.SelectedIndex = 1 Then
MsgBox("your password is user ")
ElseIf DropDownList1.SelectedIndex = 2 Then
MsgBox("your password is police")
End If
End Sub
End Class

24

ByVal

As

CODE FOR NEW PASSPORT FORM

Imports System.Data
Imports System.Data.SqlClient
Partial Class Default2
Inherits System.Web.UI.Page
Dim dr As SqlDataReader
Dim d As Date
Dim a As Integer
Dim f As Integer
Dim cmd As New SqlCommand()
Dim cn As New SqlConnection("data source=SSB-AFE0BB85816;Initial Catalog=epass1;Integrated Security=true")

Protected
Sub
Button3_Click(ByVal
sender
System.EventArgs) Handles Button3.Click

As

Object,

ByVal

As

Response.Redirect("home.aspx")
End Sub

Protected Sub Page_Load(ByVal sender As Object, ByVal e As System.EventArgs)


Handles Me.Load
TextBox1.Focus()
cmd.Connection = cn
cn.Open()
cmd.CommandText = "select left(getdate(),11)"
dr = cmd.ExecuteReader()
dr.Read()

25

TextBox21.Text = dr.Item(0)
TextBox21.ReadOnly = "true"
dr.Close()
cn.Close()
End Sub

Protected
Sub
Button1_Click(ByVal
sender
System.EventArgs) Handles Button1.Click

As

Object,

cmd.Connection = cn
cn.Open()
cmd.CommandText = "select ident_current('newpassport1')"
dr = cmd.ExecuteReader()
dr.Read()
a = dr.Item(0) + 1
dr.Close()
cn.Close()
cn.Open()

If TextBox1.Text = "" Then


MsgBox("Enter the Initial Of Applicant.")
TextBox1.Focus()
ElseIf TextBox2.Text = "" Then
MsgBox("Enter Fee Amount.")
TextBox2.Focus()
ElseIf TextBox3.Text = "" Then
MsgBox("Enter Cash/DD.")
TextBox3.Focus()
ElseIf TextBox4.Text = "" Then
MsgBox("Please enter Bank Code.")

26

ByVal

As

TextBox4.Focus()
ElseIf TextBox5.Text = "" Then
MsgBox("Please enter Credit Card No.")
TextBox5.Focus()
ElseIf TextBox20.Text = "" Then
MsgBox("Please enter Date Of Issue.")
TextBox20.Focus()
ElseIf TextBox8.Text = "" Then
MsgBox("Please enter Date Of Birth.")
TextBox8.Focus()
ElseIf TextBox9.Text = "" Then
MsgBox("Please enter Place Of Birth.")
TextBox9.Focus()
ElseIf TextBox11.Text = "" Then
MsgBox("Please enter District.")
TextBox11.Focus()
ElseIf TextBox10.Text = "" Then
MsgBox("Please enter Qualification.")
TextBox10.Focus()
ElseIf TextBox12.Text = "" Then
MsgBox("Please enter Profession.")
TextBox12.Focus()
ElseIf TextBox13.Text = "" Then
MsgBox("Please enter Present address.")
TextBox13.Focus()
ElseIf TextBox14.Text = "" Then
MsgBox("Please enter Permanent address.")
TextBox14.Focus()

27

ElseIf TextBox15.Text = "" Then


MsgBox("Please enter Phone Number.")
TextBox15.Focus()
ElseIf TextBox16.Text = "" Then
MsgBox("Please enter Mobile Number.")
TextBox16.Focus()
ElseIf TextBox18.Text = "" Then
MsgBox("Please enter Father name.")
TextBox18.Focus()
ElseIf TextBox19.Text = "" Then
MsgBox("Please enter Mother name.")
TextBox19.Focus()
ElseIf TextBox22.Text = "" Then
MsgBox("Please Choose Your Image.")
TextBox22.Focus()
Else
cmd.CommandText = "insert into newpassport1 values('" &
TextBox21.Text & "','" & TextBox1.Text & "'," & TextBox2.Text & ",'" &
TextBox3.Text & "','" & TextBox4.Text & "'," & TextBox5.Text & ",'" &
TextBox20.Text & "','" & TextBox6.Text & "','" & TextBox7.Text & "','" &
RadioButtonList1.Text & "','" & DropDownList1.Text & "','" & TextBox8.Text &
"','" & TextBox9.Text & "','" & TextBox11.Text & "','" & TextBox10.Text & "','"
& TextBox12.Text & "','" & TextBox13.Text & "','" & TextBox14.Text & "'," &
TextBox15.Text & "," & TextBox16.Text & ",'" & TextBox17.Text & "','" &
DropDownList2.Text & "','" & TextBox18.Text & "','" & TextBox19.Text & "','" &
TextBox22.Text & "')"
f = cmd.ExecuteNonQuery()
cn.Close()
cn.Open()
cmd.CommandText = "select * from newpassport1"
dr = cmd.ExecuteReader()
dr.Read()

28

d = dr.Item(1)
dr.Close()

If f = 0 Then
MsgBox("Not Inserted")
Else
MsgBox("Your Application is Successfully Uploaded & Passport ID
date is:")
MsgBox(a)
MsgBox(d)
cn.Close()
Response.Redirect("newpassport.aspx")
TextBox1.ReadOnly = False
TextBox1.Text = ""
End If
End If
End Sub

Protected Sub TextBox7_TextChanged(ByVal sender


System.EventArgs) Handles TextBox7.TextChanged

As

Object,

ByVal

As

End Sub

Protected
Sub
Button2_Click(ByVal
sender
System.EventArgs) Handles Button2.Click
TextBox1.Text = " "
TextBox2.Text = " "
TextBox3.Text = " "
TextBox4.Text = " "

29

As

Object,

ByVal

As

TextBox5.Text = " "


TextBox6.Text = " "
TextBox7.Text = " "
TextBox8.Text = " "
TextBox9.Text = " "
TextBox10.Text = " "
TextBox11.Text = " "
TextBox12.Text = " "
TextBox13.Text = " "
TextBox14.Text = " "
TextBox15.Text = " "
TextBox16.Text = " "
TextBox17.Text = " "
TextBox18.Text = " "
TextBox19.Text = " "
TextBox20.Text = " "
TextBox22.Text = " "
RadioButtonList1.Text = " "
DropDownList1.Text = " "
DropDownList2.Text = " "
End Sub
End Class

30

CODE FOR RENEWAL FORM

Imports System.Data
Imports System.Data.SqlClient
Partial Class _Default
Inherits System.Web.UI.Page
Dim cn As SqlConnection
Dim cmd As SqlCommand
Dim dr As SqlDataReader
Dim i As String

Protected
Sub
Button3_Click(ByVal
System.EventArgs)

sender

As

Object,

ByVal

As

Response.Redirect("home.aspx")
End Sub

Protected Sub Page_Load(ByVal sender As Object, ByVal e As System.EventArgs)


Handles Me.Load
TextBox1.Focus()
cn = New SqlConnection("data source=SSB-AFE0BB85816;Initial Catalog=epass1;Integrated Security=true")
cmd = New SqlCommand()
cmd.Connection = cn
cn.Open()
cmd.CommandText = "select left(getdate(),11)"
dr = cmd.ExecuteReader()

31

dr.Read()
TextBox22.Text = dr.Item(0)
TextBox22.ReadOnly = "true"
dr.Close()
cn.Close()
End Sub

Protected
Sub
Button4_Click(ByVal
sender
System.EventArgs) Handles Button4.Click

As

Object,

ByVal

As

cn = New SqlConnection("data source=SSB-AFE0BB85816;Initial Catalog=epass1;Integrated Security=true")


cmd = New SqlCommand()
cmd.Connection = cn
cn.Open()
cmd.CommandText = "select * from newpassport1 where pass_no='" &
TextBox1.Text & "'"
dr = cmd.ExecuteReader
dr.Read()
i = dr.Item(25)
Image3.ImageUrl = i
TextBox21.Text = dr.Item(1)
TextBox6.Text = dr.Item(8)
TextBox7.Text = dr.Item(9)
RadioButtonList1.Text = dr.Item(10)
DropDownList1.Text = dr.Item(11)
TextBox8.Text = dr.Item(12)
TextBox9.Text = dr.Item(13)
TextBox10.Text = dr.Item(14)
TextBox11.Text = dr.Item(15)

32

TextBox12.Text = dr.Item(16)
TextBox13.Text = dr.Item(17)
TextBox14.Text = dr.Item(18)
TextBox15.Text = dr.Item(19)
TextBox16.Text = dr.Item(20)
TextBox17.Text = dr.Item(21)
TextBox18.Text = dr.Item(23)
TextBox19.Text = dr.Item(24)
DropDownList2.Text = dr.Item(22)
dr.Close()
cn.Close()
End Sub

Protected
Sub
Button5_Click(ByVal
System.EventArgs) Handles Button5.Click

sender

As

Object,

ByVal

As

Dim sd As Date = TextBox22.Text


Dim p As Date = TextBox21.Text
Dim diff As Long = DateDiff(DateInterval.Year, p, sd)
If diff >= 3 Then
cn = New SqlConnection("data source=SSB-AFE0BB85816;Initial
Catalog=e-pass1;Integrated Security=true")
cmd = New SqlCommand()
cmd.Connection = cn
cmd.CommandType = CommandType.Text
sd = TextBox22.Text
Dim d As Date = DateAdd(DateInterval.Year, 3, sd)
cn.Open()
cmd.CommandText = "insert into renewal1 values('" & d & "','" &
TextBox22.Text & "'," & TextBox1.Text & ",'" & TextBox21.Text & "'," &
TextBox2.Text & ",'" & TextBox3.Text & "','" & TextBox4.Text & "'," &

33

TextBox5.Text & ",'" & TextBox20.Text & "','" & TextBox6.Text & "','" &
TextBox7.Text & "','" & RadioButtonList1.Text & "','" & DropDownList1.Text &
"','" & TextBox8.Text & "','" & TextBox9.Text & "','" & TextBox10.Text & "','"
& TextBox11.Text & "','" & TextBox12.Text & "','" & TextBox13.Text & "','" &
TextBox14.Text & "','" & TextBox15.Text & "','" & TextBox16.Text & "', '" &
TextBox17.Text & "','" & DropDownList2.Text & "','" & TextBox18.Text & "','" &
TextBox19.Text & "')"
cmd.ExecuteNonQuery()
cn.Close()
MsgBox("Your Application is Successfully Renewaled and Renewal date
is::")
MsgBox(d)
Else
MsgBox("* Still U Have to be Wait For Renewal")
End If
TextBox1.Text = " "
TextBox2.Text = " "
TextBox3.Text = " "
TextBox4.Text = " "
TextBox5.Text = " "
TextBox6.Text = " "
TextBox7.Text = " "
TextBox8.Text = " "
TextBox9.Text = " "
TextBox10.Text = " "

TextBox11.Text = " "


TextBox12.Text = " "
TextBox13.Text = " "
TextBox14.Text = " "
TextBox15.Text = " "

34

TextBox16.Text = " "


TextBox17.Text = " "
TextBox18.Text = " "
TextBox19.Text = " "
TextBox20.Text = " "
TextBox21.Text = " "
Image3.ImageUrl = " "
RadioButtonList1.Text = " "
DropDownList1.Text = " "
DropDownList2.Text = " "
End Sub
End Class

CODE FOR ECR FORM

Imports System.Data
Imports System.Data.SqlClient

1) Table Name: New passport


Description: This table contains the application form of new passport

1) Table Name: New passport


Description: This table contains the application form of new passport

Partial Class _Default

35

Inherits System.Web.UI.Page
Dim cn As SqlConnection
Dim cmd As SqlCommand
Dim dr As SqlDataReader
Dim necr As Char

Protected
Sub
Button1_Click(ByVal
System.EventArgs) Handles Button1.Click

sender

As

Object,

ByVal

As

cn = New SqlConnection("data source=SSB-AFE0BB85816;Initial Catalog=epass1;Integrated Security=true")


cmd = New SqlCommand()
cmd.Connection = cn
cmd.CommandType = CommandType.Text
If necr.ToString = "yes" Then
MsgBox("u r Emigration check is not succeded")
Else
cmd.CommandText = "insert into ecr values(" & TextBox1.Text & "
'" & TextBox2.Text & "','" & TextBox3.Text & "','" & TextBox4.Text & "','"
RadioButtonList1.Text & "','" & DropDownList1.Text & "','" & TextBox5.Text
"','" & TextBox6.Text & "','" & TextBox7.Text & "','" & TextBox8.Text & "','"
TextBox9.Text & "','" & TextBox11.Text & "','" & TextBox12.Text & "')"
cn.Open()
cmd.ExecuteNonQuery()
cn.Close()
MsgBox("Your Emigration Check is Succeeded")
End If
TextBox1.Text = " "
TextBox2.Text = " "
TextBox3.Text = " "
TextBox4.Text = " "
TextBox5.Text = " "

36

,
&
&
&

TextBox6.Text = " "

TextBox7.Text = " "


TextBox8.Text = " "
TextBox9.Text = " "
TextBox11.Text = " "
TextBox12.Text = " "
RadioButtonList1.Text = " "
DropDownList1.Text = " "
End Sub

Protected
Sub
Button4_Click(ByVal
System.EventArgs) Handles Button4.Click

sender

As

Object,

ByVal

As

cn = New SqlConnection("data source=SSB-AFE0BB85816;Initial Catalog=epass1;Integrated Security=true")


cmd = New SqlCommand()
cmd.Connection = cn
cmd.CommandType = CommandType.Text
cmd.CommandText = "select * from newpassport1 where pass_no='" &
TextBox1.Text & "'"
cn.Open()
dr = cmd.ExecuteReader
dr.Read()
necr = dr.Item(10)
TextBox2.Text = dr.Item(9)
TextBox3.Text = dr.Item(16)
DropDownList1.Text = dr.Item(15)
TextBox7.Text = dr.Item(1)
TextBox9.Text = dr.Item(23)

37

TextBox12.Text = dr.Item(2)
dr.Close()
cn.Close()
End Sub

Protected
Sub
Button3_Click(ByVal
System.EventArgs) Handles Button3.Click

sender

As

Object,

ByVal

As

Response.Redirect("home.aspx")
End Sub

Protected Sub Page_Load(ByVal sender As Object, ByVal e As System.EventArgs)


Handles Me.Load
TextBox1.Focus()
End Sub
End Class

CODE FOR ENQUIRY FORM

Partial Class _Default


Inherits System.Web.UI.Page

Protected
Sub
Button1_Click(ByVal
System.EventArgs)

sender

As

Object,

ByVal

As

As

Object,

ByVal

As

Response.Redirect("enqnewpass.aspx")
End Sub

Protected
Sub
Button2_Click(ByVal
System.EventArgs)

sender

Response.Redirect("enqrenewal.aspx")

38

End Sub

Protected
Sub
Button3_Click(ByVal
System.EventArgs)

sender

As

Object,

ByVal

As

As

Response.Redirect("enqecr.aspx")
End Sub

Protected
Sub
System.EventArgs)

Button4_Click(ByVal

sender

As

Object,

ByVal

Response.Redirect("enqfees.aspx")
End Sub

Protected Sub Page_Load(ByVal sender As Object, ByVal e As System.EventArgs)


End Sub

Protected
Sub
System.EventArgs)

Button5_Click(ByVal

sender

Response.Redirect("home.aspx")
End Sub
End Class

CODE FOR SB FORM

Imports System.Data
Imports System.Data.SqlClient
Partial Class _Default
Inherits System.Web.UI.Page

39

As

Object,

ByVal

As

Dim cn As SqlConnection
Dim cmd As SqlCommand
Dim dr As SqlDataReader
Dim n As Integer
Dim i As String
Dim f As Integer

Protected
Sub
Button1_Click(ByVal
sender
System.EventArgs) Handles Button1.Click

As

Object,

ByVal

As

cn = New SqlConnection("data source=SSB-AFE0BB85816;Initial Catalog=epass1;Integrated Security=true")


cmd = New SqlCommand
cmd.Connection = cn
cmd.CommandType = CommandType.Text
If (TextBox9.Text = "no") Then
cn.Open()
cmd.CommandText = "insert into sb values(" & TextBox10.Text & ",'"
& TextBox1.Text & "','" & TextBox2.Text & "','" & TextBox3.Text & "','" &
TextBox9.Text & "','" & TextBox4.Text & "','" & TextBox5.Text & "','" &
TextBox6.Text & "','" & TextBox7.Text & "','" & TextBox8.Text & "')"
cmd.ExecuteNonQuery()
MsgBox(" your special branch enquiry is successfully completed")
cn.Close()
MsgBox(n)
Else
passport,please
passort")

MsgBox("you have crimes,there is problems


consult appropriate passport authority office

End If
End Sub

40

for issueing
if you need

Protected
Sub
Button3_Click(ByVal
System.EventArgs)

sender

As

Object,

ByVal

As

Response.Redirect("home.aspx")
End Sub

Protected Sub Page_Load(ByVal sender As Object, ByVal e As System.EventArgs)


Handles Me.Load
TextBox10.Focus()
End Sub

Protected
Sub
Button4_Click1(ByVal
System.EventArgs) Handles Button4.Click

sender

As

Object,

ByVal

As

cn = New SqlConnection("data source=SSB-AFE0BB85816;Initial Catalog=epass1;Integrated Security=true")


cmd = New SqlCommand()
cmd.Connection = cn
cmd.CommandType = CommandType.Text
cn.Open()
cmd.CommandText = "select * from newpassport1 where pass_no=" &
TextBox10.Text & ""
dr = cmd.ExecuteReader()
dr.Read()
i = dr.Item(25)
Image4.ImageUrl = i
n = dr.Item(0)
TextBox1.Text = dr.Item(9)
TextBox2.Text = dr.Item(16)
TextBox7.Text = dr.Item(1)
While (dr.Read() = True)
If TextBox10.Text = dr.Item(0) Then

41

n = dr.Item(0)
End If
n = n + 1
End While
dr.Close()
cn.Close()
End Sub

Protected
Sub
Button2_Click(ByVal
sender
System.EventArgs) Handles Button2.Click

As

Object,

TextBox1.Text = " "


TextBox2.Text = " "
TextBox3.Text = " "
TextBox4.Text = " "
TextBox5.Text = " "
TextBox6.Text = " "
TextBox7.Text = " "
TextBox8.Text = " "
TextBox9.Text = " "
TextBox10.Text = " "
Image4.ImageUrl = " "
End Sub
End Class

CODE FOR NEWPASSPORT ENQUIRY

42

ByVal

As

Partial Class _Default


Inherits System.Web.UI.Page

Protected
Sub
System.EventArgs)

Button1_Click(ByVal

sender

As

Object,

ByVal

As

Response.Redirect("enquiry.aspx")
End Sub
End Class

CODE FOR RENEWAL PASSPORT ENQUIRY

Partial Class _Default


Inherits System.Web.UI.Page

Protected
Sub
Button1_Click(ByVal
System.EventArgs)

sender

As

Object,

Response.Redirect("enquiry.aspx")
End Sub
End Class

CODE FOR ECR/ECNR ENQUIRY

43

ByVal

As

Partial Class _Default


Inherits System.Web.UI.Page

Protected
System.EventArgs)

Sub

Button1_Click(ByVal

sender

As

Object,

ByVal

As

As

Object,

ByVal

As

Response.Redirect("enquiry.aspx")
End Sub
End Class

CODE FOR FEES ENQUIRY

Partial Class _Default


Inherits System.Web.UI.Page

Protected
System.EventArgs)

Sub

Button1_Click(ByVal

sender

Response.Redirect("enquiry.aspx")
End Sub
End Class

CODE FOR REPORTS

44

Partial Class _Default


Inherits System.Web.UI.Page
Protected Sub Page_Load(ByVal
System.EventArgs) Handles Me.Load

sender

As

Object,

ByVal

As

End Sub

Protected
Sub
LinkButton1_Click(ByVal
sender
System.EventArgs) Handles LinkButton1.Click

As

Object,

ByVal

As

As

Object,

ByVal

As

As

Object,

ByVal

As

As

Object,

ByVal

As

As

Response.Redirect("npr.aspx")
End Sub

Protected
Sub
LinkButton2_Click(ByVal
sender
System.EventArgs) Handles LinkButton2.Click
Response.Redirect("rpr.aspx")
End Sub

Protected
Sub
LinkButton3_Click(ByVal
sender
System.EventArgs) Handles LinkButton3.Click
Response.Redirect("er.aspx")
End Sub

Protected
Sub
LinkButton4_Click(ByVal
sender
System.EventArgs) Handles LinkButton4.Click
Response.Redirect("sb1.aspx")
End Sub

Protected
Sub
Button5_Click(ByVal
sender
System.EventArgs) Handles Button5.Click
Response.Redirect("home.aspx")
End Sub
End Class

45

As

Object,

ByVal

CODE FOR NEW PASSPORT REPORT

Imports System.Data
Imports System.Data.SqlClient
Partial Class _Default
Inherits System.Web.UI.Page
Dim ds As DataSet
Dim cn As New SqlConnection

Protected
Sub
Button1_Click(ByVal
sender
System.EventArgs) Handles Button1.Click

As

Object,

ByVal

As

As

Object,

ByVal

As

Response.Redirect("report.aspx")
End Sub

Protected
Sub
Button2_Click(ByVal
sender
System.EventArgs) Handles Button2.Click
Dim flag As Integer = 0

Dim cn As New SqlConnection("data source=SSB-AFE0BB85816;Initial


Catalog=e-pass;Integrated Security=true")
cn.Open()
Dim cmd As New SqlCommand
Dim ds As New DataSet
Dim da As New SqlDataAdapter("select * from newpassport1", cn)
da.Fill(ds, "newpassport1")
GridView1.DataSource = ds

46

GridView1.DataBind()
cn.Close()
End Sub
End Class

CODE FOR RENEWAL PASSPORT REPORT

Imports System.Data
Imports System.Data.SqlClient

Partial Class _Default


Inherits System.Web.UI.Page

Protected
Sub
Button1_Click(ByVal
sender
System.EventArgs) Handles Button1.Click
Response.Redirect("report.aspx")
End Sub

47

As

Object,

ByVal

As

Protected
Sub
Button2_Click(ByVal
sender
System.EventArgs) Handles Button2.Click

As

Object,

ByVal

As

Dim flag As Integer = 0


Dim cn As New SqlConnection("data source=SSB-AFE0BB85816;Initial
Catalog=e-pass;Integrated Security=true")
cn.Open()
Dim cmd As New SqlCommand
Dim ds As New DataSet
Dim da As New SqlDataAdapter("select * from renewal1", cn)
da.Fill(ds, "renewal1")
GridView1.DataSource = ds
GridView1.DataBind()
cn.Close()
End Sub
End Class

CODE FOR ECR/ECNR REPORT

Imports System.Data
Imports System.Data.SqlClient
Partial Class _Default
Inherits System.Web.UI.Page

Protected
Sub
Button1_Click(ByVal
sender
System.EventArgs) Handles Button1.Click

48

As

Object,

ByVal

As

Response.Redirect("report.aspx")
End Sub

Protected
Sub
Button2_Click(ByVal
sender
System.EventArgs) Handles Button2.Click

As

Object,

ByVal

As

Dim flag As Integer = 0


Dim cn As New SqlConnection("data source=SSB-AFE0BB85816;Initial
Catalog=e-pass;Integrated Security=true")
cn.Open()
Dim cmd As New SqlCommand
Dim ds As New DataSet
Dim da As New SqlDataAdapter("select * from ecr", cn)
da.Fill(ds, "ecr")

GridView1.DataSource = ds
GridView1.DataBind()
cn.Close()
End Sub
End Class

CODE FOR SPECIAL BRANCH REPORT

Imports System.Data
Imports System.Data.SqlClient

49

Partial Class _Default


Inherits System.Web.UI.Page

Protected
Sub
Button1_Click(ByVal
sender
System.EventArgs) Handles Button1.Click

As

Object,

ByVal

As

As

Object,

ByVal

As

Response.Redirect("report.aspx")
End Sub

Protected
Sub
Button2_Click(ByVal
sender
System.EventArgs) Handles Button2.Click
Dim flag As Integer = 0

Dim cn As New SqlConnection("data source=SSB-AFE0BB85816;Initial


Catalog=e-pass;Integrated Security=true")
cn.Open()
Dim cmd As New SqlCommand
Dim ds As New DataSet
Dim da As New SqlDataAdapter("select * from sb", cn)
da.Fill(ds, "sb")
GridView1.DataSource = ds
GridView1.DataBind()
cn.Close()
End Sub
End Class

50

CODE FOR DATEWISE REPORT

Imports System.Data
Imports System.Data.SqlClient

Partial Class _Default


Inherits System.Web.UI.Page
Dim ds As New DataSet
Dim cn As New SqlConnection("data source=SSB-AFE0BB85816;Initial Catalog=epass1;Integrated Security=true")

Protected
Sub
Button1_Click(ByVal
System.EventArgs) Handles Button1.Click

sender

As

Object,

ByVal

As

Dim da As New SqlDataAdapter("select pass_no Pass_no,left(date,11)


Date,feeamt
Feeamt,ddno
DDno,surname
Surname,fstname
Fstname,sex
Sex,left(dob,11)
DOB,pob
POB,dist
DIST,quali
Quali,padd
PADD,mobno
Mobno,mstatus MStatus from newpassport1 where date='" & TextBox1.Text & "'",
cn)
cn.Open()
da.Fill(ds, "newpassport1")
GridView1.DataSource = ds

51

GridView1.DataBind()
cn.Close()
End Sub

Protected Sub GridView1_SelectedIndexChanged(ByVal sender As Object, ByVal


e As System.EventArgs) Handles GridView1.SelectedIndexChanged

End Sub

Protected Sub Button2_Click(ByVal


System.EventArgs) Handles Button2.Click

sender

As

Object,

ByVal

As

As

Response.Redirect("report.aspx")
End Sub

Protected Sub Page_Load(ByVal


System.EventArgs) Handles Me.Load
TextBox1.Focus()
End Sub

End Class

52

sender

As

Object,

ByVal

DISTRICT WISE REPORT

Imports System.Data
Imports System.Data.SqlClient

Partial Class Default2


Inherits System.Web.UI.Page
Dim ds As New DataSet
Dim cn As New SqlConnection("data source=SSB-AFE0BB85816;Initial Catalog=epass1;Integrated Security=true")

Protected Sub Button1_Click(ByVal


System.EventArgs) Handles Button1.Click

sender

As

Object,

ByVal

As

Dim da As New SqlDataAdapter("select pass_no Pass_no,left(date,11)


Date,feeamt
Feeamt,ddno
DDno,surname
Surname,fstname
Fstname,sex
Sex,left(dob,11)
DOB,pob
POB,dist
Qualifi,quali
Dist,padd
PADD,mobno
Mobno,mstatus MStatus from newpassport1 where quali='" & TextBox1.Text & "'",
cn)
cn.Open()
da.Fill(ds, "newpassport1")
GridView1.DataSource = ds
GridView1.DataBind()
cn.Close()
End Sub

Protected Sub Page_Load(ByVal


System.EventArgs) Handles Me.Load

53

sender

As

Object,

ByVal

As

TextBox1.Focus()
End Sub

Protected Sub Button2_Click(ByVal


System.EventArgs) Handles Button2.Click

sender

As

Object,

Response.Redirect("report.aspx")
End Sub
End Class

5. USER INTERFACE DESIGN (FORMS)

54

ByVal

As

LOGIN FORM

6. SYSTEM TESTING
6.1 TEST CASE DESIGN

55

Testing
Testing is the phase where the errors remaining from all the previous phase
must be detected. Hence, testing is very critical role for quality assurance and for
ensuring the reliability of software.
Testing of designed software consists of providing the software with a set of
test outputs and observing if the software behaves as expected. If the software fails
to behave as expected, then the conditions under which failure occurs when needed
for debugging and correction.
Presence of an error implies that a failure must have occurred, and the
observation of a failure applies that a fault does not imply a failure must occur.
We have tested our project in many ways for e.g., by storing information of
users, police etc., into the database and checking the information by retrieving them
from the database.
Verification and Validation
Verification is the process of determining whether one phase of the software
product confirms to its previous phase. Verification is concerned with phase
containment of errors.
Validation is the process of determining whether a fully developed system
confirms to its required specification. The aim to make the final product error free.
We have validated our project by checking the date format, by checking the
date of birth field in passport application form, and renewal form, and by checking the
date of issue in the ECR form and we have validated all the fields and forms of our
project.
Testing objectives
A good case is one that has a high probability of finding an undiscovered error.
A testing is a process of executing a program with the intent of finding an error.

56

Successful test is one that uncovers yet undiscovered error. It testing is


conducted successfully it will uncover error in the software. Testing cant show
the absences of defects are present. It can only show that software defects are
present.
Testing principles
Before applying methods to design effective test cases, a software engineer must
understand the basic principles that guide software testing.
All tests should be traceable to consumer requirements.
Test should be planned long before testing begins.
Testing should begin in small and progress toward testing in large.
Exhaustive testing is not possible.
To be most effective, an independent third party should conduct testing.
Software testability is nothing but how easily a computer program can be tested.
6.1.1 Black Box testing:
Black box testing allows to tests that are conducted at the software interface.
They are used to demonstrate these software functions operational that input
is properly accepted and the output is correctly produced, at the same time searching
for errors.
Case 1:
In the application the fields either exceeds or decrease the size of seven then
the system generates the error message.
Case 2:
In the application form passport number is generated in the sequence form by
the system after the submission of the application form.
Case 3:

57

In the application the application number is generated automatically and the


last date is specified and based on applied candidates the sort list will be generated
by the system.
6.1.2 White Box Testing
Knowing the internal working of the system, tests can bee conducted to ensure
that all gears mesh, that is, the internal operation performs according to
specifications and all internal components have been adequately exercised.
It is predicted on close examinations of procedural details and logical details
providing test cases that exercise specific sets of conditions and/or loops test paths
through the software. The basis path method enables the test case designer to derive
a logical complexity of a procedural design and use this measure as a guide for
defining as basis set of execution paths.
Using the white box testing methods, the software engineer can derive test cases
that
1. Guarantee that all independent paths within a module have been exercised at least
once is called

Basis path testing.

2. Exercise all logical decisions on there true and false sides are Condition Testing.
3. Exercise internal data structure to assure their validation is called Data Flow
Testing.
4. Exercise all loops at their boundaries and within their operation bounds is called
Loop.
6.1.3 Basis Path Testing
The Basis Path method enables the test case designer to derive a logical
complexity measure of a procedural design and use this measure as a guide for
defining a basis set of execution paths. Test cases derived to exercise the basis test
are guaranteed to execute every statement in the program at least one time during
testing. It consists of Flow Graph Notation, Independent Program paths, Deriving Test
Cases, Graph Matrices.

58

6.1.4 Control Structure Testing


Although Basis Path Testing is simple and effective, it is not sufficient in it self.
In this section, variations on control structure testing discussed briefly. Condition
testing is a test case design method that exercises the logical conditions contained in
a program module. Data flow testing method selects test paths of program according
to the locations of definitions and uses of variables in a program. Loop testing is
focuses exclusively on the validity of loop constructs.
6.1.5. Data Flow Testing:
The data flow testing method selects test paths of a program according to the
location of definitions and uses of variables in the program.
Test Case Explanation:
Test Case1:
When the user presses the update button in the building, library, lab, bus,
placement, selected student list forms all the details related to particular type of are
saved and no field should be empty.
6.2 TESTING STRATEGIES
Testing is set of activities that can be planned in advance and conducted
systematically .a strategy for software testing must accommodate low level tests that
are necessary to verify a small source code segment has been correctly implemented
as well as high level tests that validate system functions against

customer

requirements.
Software testing is one element of verification and validation .verification refers
to

the set of

activities that ensure that software correctly implements a specific

function .validation refers to a different set of activities that ensure the software has
been built is traceable to user requirements.
6.2.1 UNIT TESTING
Unit testing focuses verification effort on the smallest unit of software design.

59

This is white box testing oriented in the E-PASSPORT MAINTENANCE


SYSTEM project each and every module is tested in the following ways.
This module interfaces are tested to ensure the information properly flows into
and put the program unit under test. The local data structure is examined to ensure
data stored temporarily maintains its integrity during all steps in an algorithm
execution.
Boundary conditions are tested to ensure that the module operations properly
at boundaries establish to limit or restrict processing.
All independent paths through the control structure are exercised to ensure
that all statements in a module have been executed at least once.
Error handling paths tested.
Case 1:
Input: The user must input all the values in the application except passport number.
Process: The system checks all the constraints, necessary validations and finally
stores the passport application details of the particular applicant.
Output: The passport details of a particular applicant will be displayed in the
corresponding fields whenever we select the particular passport number.
6.2.2 INTEGRATION TESTING
Integration testing is a systematic technique for construction the program
structure while at the some time conducting tests to uncover errors associated with
interfacing. The objective is to take unit tested modules and build a program
structure that has been dictated by design. All the modules are combined in advance.
The entire program tested as a whole.
Present developed software is tested using bottom integration begins
construction and testing with atomic modules. Low-level modules are combined into
clusters and driver was written to coordinate test case input output. The cluster is

60

tested. The drivers are removed and clusters are combined and moving upward in the
program structure.
6.2.2.1 Top-Down Integration
Top-Down Integration testing is an incremental approach to construction of the
software architecture. Modules are integrated by moving downward through the
control hierarchy, beginning with the main control module. Modules subordinate to
the main control module are incorporated into the structure in either a depth-First or
Breadth-First manner.

6.2.2.2. Bottom-Up Integration


Bottom-Up Integration testing, as its name implies, begins constructions and
testing with atomic modules. Because components are integrated from the BottomUp, processing required for components subordinate to a given level is always
available and the need for stubs is eliminated.
6.2.2.3 Regression Testing
Each time a new module is added as a part of integration testing, the software
changes. New data flow paths are established, new I/O may occur and new control
logic is invoked. These changes may cause problems with functions that previously
worked flawlessly. In the context of an integration test strategy, regression testing is
the re-execution of some subset of tests that have already been conducted to ensure
that changes have not propagated unintended side effects.
6.2.3 VALIDATION TESTING
Validation testing is the process of evaluating software at the end of the
software development process to determine compliance with the requirements. The
primary goals of the validations are

61

To access and ensure the quality of various products generated during software
development and modifications.

High quality is best achieved by careful attention to the details of systematic


planning analysis and implementation.

It is incorrect to view source code testing as primary vehicle for quality


improvements.

6.2.3.1 Beta Testing


Beta testing is the system testing performed by selecting group customers.
The developer is not present at the site and the user will inform the problems that are
encountered. As a result of problems reported during Beta test, the software
developer makes the modifications and then prepares for release of the software to
the customer.Our project has been tested by the users (applicant, police) and the
problems faced by them are taken and those problems are solved by us.
Test Case Explanation
Case 1:
All the validations will be checked when the user pressing the save button like
name should be entered in Alphabetic and all the codes should be entered in
numeric.
Case 2:
If we enter the already existing data into database the system will generate the
warning messages that the record is already inserted.
Case 3:
In the fees collections, whatever the fees paid by the applicant immediately
then the system generated the status of the applicant as application forwarded.

62

6.2.4 SYSTEM TESTING


System tests are designed to validate a fully developed system with a view to
assuring that it meets requirements.
There are three kinds of system testing
6.2.4.1 Security Testing
The protection of computer based resources that include hardware, software,
data, procedures and people against unauthorized use or manual.
Diaster is known as System Security.
System Security Testing can be divided into four related issues
Security
Integrity
Privacy
Confidentiality
SYSTEM SECURITY refers to the technical innovations and procedures applied to the
hardware and operation systems to project against deliberate or accidental damage
from a defined threat.
DATA SECURITY is the protection of data from loss, disclosure, modification and
destruction.
SYSTEM TESTING refers to the power functioning of hardware and programs,
appropriate

physical

security

and

safety

against

external

threats

such

as

eavesdropping and wiretapping.


PRIVACY defines the rights of the user or organization to determine what information
they are willing to share with or accept from others and how the organization can be
protected against unwelcome, unfair or exclusive dissemination of the information
about it.

63

CONFIDENTIALITY is a special status given to sensitive information in a database to


minimize the possible invasion of privacy. It is an attribute of information that
characterizes its need for protection.
SECURITY IN SOFTWARE
System security refers to various validations on data in the form of checks and
controls to avoid the system from failing. It is always important to ensure that only
valid data is entered and only valid operations are performed on the system. The
system employees two types of checks and controls:
CLIENT SIDE VALIDATION
Various client side validations are used to ensure on the client side that only
data is entered. Client side validation saves server time and load to handle invalid
data. Some checks imposed are:
VBScript is used to ensure those required fields are filled with suitable data
only. Maximum lengths of the fields of the forms are appropriately defined.
Forms cannot be submitted without filling up the mandatory data so that
manual mistakes of the submitting empty fields that are mandatory can be
sorted out at the client side to save the server time and load.
Tab-indexes are set according to the need and taking into account the ease of
user while working with the system.

SERVER SIDE VALIDATION


Some checks cannot be applied at the client side. Server side checks are
necessary to save the system from failing and intimating the user that some invalid
operation has been performed or the performed operation is restricted. Some of the
server side checks imposed is:

64

Server side constraint has been imposed to check for the validity of primary
key and foreign key. A primary key value cannot be duplicated. Any attempt to
duplicate the primary value results into a message intimating the user about
those values through the forms using foreign key can be updated only of the
existing foreign key values.

User is intimating through appropriate messages about the successful


operations or exceptions occurring at the server side.

Various Access Control Mechanisms have been built so that one user may not
upon another. Access permissions to various types of users are controlled
according to the organized structure.

Only permitted users can log on to the system and can have access according
to their category. User name, passwords and permissions are controlled to the
server side.

6.2.4.2 Alpha Testing


Alpha testing refers to the system testing that the customer with in the
organization along with the developer carries it out .the alpha tests conducted in a
controlled manner.
We have tested our project in the presence of our project guide i.e., in a controlled
manner and so the modifications are performed whenever it is necessary.
6.2.4.3 Performance Testing
Performance testing is the system testing performed by the customer to
whether or not of accept the delivery of the system.
In our project whether the applicants information is correct and not yet
submitted then the application is forwarded and the required passport number is
generated by the system and displayed in the message box.
Deployment

65

Delivery support and


Feedback

We have delivered our project to passport office, chittoor and the office
members (staff, admin, police etc.) are using our project and the feedback is taken
from them. If any modifications are required, they will inform us and we deliver the
software according to their experiences.

7. SYSTEM IMPLEMENTATION

System implementation is a stage of the project when the theoretical design is


turned into a working system. If the implementation is not correctly planned and

66

controlled, it can be considered to be the most crucial stage in achieving a successful


new system.
Once the preparation is completed the implementation process can begin. The
first part of this involves the convention of existing manual record as they are
converted on to the computer. Then the actual change over from the existing system
to the new system takes place.
There are many ways of implementation that is direct, parallel, pilot and staged
changeovers. The selection of the change over depends upon the undertaken needs
of the organization on a time factor.

7.1 SOFTWARE / HARDWARE REQUIREMENTS


SOFTWARE REQUIREMENTS:

WINDOWS OS (XP/2000 Server/2003 Server)

Visual Studio .Net 2005 Enterprise Edition

Internet Information Server 5.0 (IIS)

Visual Studio .Net Framework (Minimal for Deployment)

SQL Server 2005 Enterprise Edition

HARDWARE REQUIRMENTS:

P-IV 2.8 GHz Processor and Above

RAM 512 MB and Above

HDD 20 GB Hard Disk Space and Above

8. SYSTEM MAINTENANCE

67

Maintenance phase focuses on change that is associated with error correction,


adoptions required as the softwares environment evolves, and changes due to
enhancements brought about by changing customer requirements.
8.1. USER MANUAL
User Manuals like a guide to the novice user. Each and every developed system
should provide this manual. User Manual of the developed system EPassport
Maintenance System is as follows:

After the installation of the system successfully, first the user will run the
login form by providing the Username and Password.

The Login dialog will contain the Username, Password and two command
buttons.

Here the username contains list as Admin, User and Police.

After that it displays the form with buttons in which user can select
required form or report.

The user can create the new passport by choosing the image also.

User can check the emigration form if required or not by using


appropriate form.

User can view the reports like date wise, district wise, new passport
wise, renewal wise, ecr/ecnr wise and special branch wise details etc by
giving necessary input.

The administrator can able to do the searching of the particular passport


by giving passport number as the input.

The police can able to do the special branch enquiry for the issuing of
the passport.

Similarly all the above operations are carried out in all the forms.

So, a demonstration is enough to make the user to get familiar with the
system. The User Manual had been prepared for the future reference of the system.

68

8.2 NETWORKING FEATURES


8.2.1 .NET framework
The .NET Framework is a new computing platform that simplifies application
development in the highly distributed environment of the Internet. The .NET
Framework is designed to fulfil the following objectives:
To provide a consistent object-oriented programming environment whether
object code is stored and executed locally, executed locally but Internet-distributed,
or executed remotely.
To provide a code-execution environment that minimizes software deployment
and versioning conflicts.
To provide a code-execution environment that guarantee safe execution of
code by an unknown or semi-trusted third party
To provide a code-execution environment that eliminates the performance
problems of scripted or interpreted environments.
To make the developer experience consistence across widely varying types of
applications, such as Windows-based applications and web-based applications.
To build all communications on industry standards to ensure that code based
on the .Net Framework can integrate with any other code.

8.2.2 ASP.NET
SERVER APPLICATION DEVELOPMENT

Server-side applications in the managed world are implemented through


runtime hosts. Unmanaged applications host the common language runtime, which
allows your custom managed code to control the behaviour of the server. This model

69

provides you with all the features of the common language runtime and class library
while gaining the performance and scalability of the host server.
The following illustration shows a basic network schema with managed code
running in different server environments. Servers such as IIS and SQL Server can
perform standard operations while your application logic executes through the
managed code.
SERVER-SIDE MANAGED CODE
ASP.NET is the hosting environment that enables developers to use the .NET
Framework to target Web-based applications. However, ASP.NET is more than just
runtime host;
It is a complete architecture for developing Websites and Internet-distribution objects
using managed code. Both web Forms and XML Web services use IIS and ASP.NET as
the publishing mechanism for applications, and both have a collection of supporting
classes in the .NET Framework.
XML Web services, an important evaluation in Web-based technology, are
distributed, server-side application components similar to common web sites.
However, unlike Web-based application components have no UI and are not targeted
for browsers such as Internet Explorer and Netscape Navigator, Instead, XML Web
services consist of reusable software components designed to be consumed by other
applications, such as traditional client applications, web-based applications or even
other XML web services. As a result, XML web services technology is rapidly moving
application development and deployment into the highly distributed environment of
the internet.
ACTIVE SERVER PAGES.NET
ASP.NET is a programming framework built on the common language runtime
that can be used on a server to build powerful Web applications. ASP.NET offers
several important advantages over previous Web development models:
Enhanced Performance:

70

ASP.NET is compiled common language runtime code running on the server.


Unlike its interpreted predecessors, ASP.NET can take advantage of early binding,
just-in-time compilation, native optimization, and catching services right out of the
box. This amounts to dramatically better performance before you ever write a line of
code.

World-Class Tool Support:


The ASP.NET framework is complemented by a rich toolbox and designer in the
Visual Studio integrated development environment. WYSIWYG editing. Drag-and-drop
server controls and automatic deployment are just a few of the features this powerful
tool provides
Power and Flexibility:
Because ASP.NET is based on the common language runtime, the power and
flexibility of that entire platform is available to Web application developers. The .NET
Framework class library, Messaging, and Data Access solutions are all seamlessly
accessible from the Web. ASP.NET is also language-independent, so you can choose
the language that best applies to your applications or partitions your applications
across many languages. Furthers, common language runtime interoperability
guarantees that your existing investment in COM-based development is preserved
when migrating to ASP.NET.
Simplicity:
ASP.NET makes it easy to perform common tasks, from simple from submission
and client authentication to deployment and sites configuration. For example, the
ASP.NET page framework allows you to build user interfaces that cleanly separate
application logic from presentation code and to handle events in a simple, Visible
Basic like forms processing model.
Additionally, the common language runtime simplifies development, with managed
code services such as automatic reference counting and garbage collection.

71

Manageability:
ASP.NET employs a text-based, hierarchical configuration system, which
simplifies applying settings to your server environment and Web applications.
Because configuration information is stored as plain text, new settings may be
applied without the aid of local administration tools. This zero local administration
philosophy extends to deploying ASP.NET Framework as well. An ASP.NET Framework
application is deployed to a server simply by copying the necessary files to the
server. No server restart is required, even to deploy or replace running compiled
code.

Scalability and Availability:


ASP.NET has been designed with scalability in mind, with features specially
tailored to improve performance in clustered and multiprocessor environments.
Further, processes are closely monitored and managed by the ASP.NET runtime, so
that if one misbehaves, a new process can be created in its place, which helps keep
your application constantly available to handle requests.
Customizability and Extensibility:
ASP.NET delivers a well-factored architecture that allows developers to plugin their code at appropriate level. In fact, it is possible to extend or replace any
subcomponent of the ASP.NET runtime with your own custom-written component.
Implementing custom authentication or state services has never been easier.
Security:
With built in Windows authentication and pre-application configuration, you can
be assured that your applications are secure.
LANGUAGE SUPPORT
The Microsoft .NET Platform currently offers built-in support for three
languages: C#, Visual Basic, and Jscript.

72

WHAT IS ASP.NET WEB FORMS?


The ASP.NET Web Forms page frameworks are a scalable common language
runtime programming model that can be used on the server to dynamically generate
Web pages.
Intended as a logical evaluation of ASP (ASP.NET provides syntax compatibility
with existing pages), the ASP.NET Web Forms framework has been specifically
designed to address a number of key deficiencies in the previous model. In particular,
it provides:
a) The ability to create and use reusable UI controls that can encapsulate
common functionalities and thus reduce the amount of code that a page
developer has to write
b) The ability for developers to cleanly structure their page logic in an orderly
fashion (not spaghetti code)
c) The ability for development tools to provide storing WYSIWYG design support
for pages (existing ASP code in opaque to tools).

ASP.NET Web Forms pages are text files with an .aspx file extension. They can
be deployed throughout an IIS virtual root directory tree. When a browser client
request .aspx resources, the ASP.NET runtime parses and compilers the target file into
a .NET Framework class. This class can then be used dynamically process incoming
requests. (Note that the .aspx file compiled only the first time it is accessed; the
compiled type instance is then reuse across multiple requests).
An ASP.NET page can be created simply by taking an existing HTML file and
changing its file name extension to .aspx (no modification of code is required). For
example, the following sample demonstrates a simple HTML page that collects a
users name and category preference and then performs a form post back to the
originating page when a button is clicked.
ASP.NET provides syntax compatibility with existing Asp pages. this includes
support for <%%> code render blocks that can be intermixed with HTML content

73

within an .aspx file. These code blocks execute in a top-down manner at page render
time.
CODE-BEHIND WEB FORMS
ASP.NET supports two methods of authoring dynamic pages. The first is the
method shown in the preceding samples, where the page code is physically declared
within the originating .aspx file. As alternative approachknown as the code-behind
method enables the page code to be more cleanly separated from the HTML content
into an entirely separate file.
INTRODUCTION TO ASP.NET SERVER CONTROLS
In addition to (or instead of) using <% %> code blocks to program dynamic
content. ASP.NET page developers can use ASP.NET page developers can use .NET
server controls to program Web pages. server controls are declared within an .aspx
file using custom tags or intrinsic HTML tags that contain a runat=server
attributes value. Intrinsic HTML tags are handling by the one of the control in the
System.Web.UI.HtmlControls namespace. Any tag that doesnt explicitly map to
one

of

the

controls

is

assigned

the

type

of

System.Web.UI.HtmlControls.HtmlGenericControl.
Server controls automatically maintain any client-entered values between
round trips to the server. This controls state is not stored on the server (it is instead
stored with in an <input type=hidden> from field that is round-tripped between
requests). Note also that no clients-side script is required.
In addition to supporting standard HTML input controls, ASP.NET enables
developers to utilize richer custom controls on their pages. For example, the following
sample demonstrate how the <asp: adrotator> control can be used to dynamically
displays rotating ads on a page.
1. ASP.NET Web Forms provide an easy and powerful way to build dynamic WebUI.
2. ASP.NET Web Forms pages can target any browser client (there are no script
library or cookie requirements).

74

3. ASP.NET Web Forms pages provide syntax compatibility with existing ASP
pages.
4. ASP.NET

server controls provide an easy way to encapsulate common

functionality
5. ASP.NET ships with 45 built-in server controls. Developers can also use controls
built by third parties.
6. ASP.NET server controls can automatically project both up level HTML.
7. ASP.NET templates provide an easy way to customize the look and feel of list
server controls.
8. ASP.NET validation controls provide an easy way to declarative client server
data validation.

8.2.3 SQL SERVER


A database management, or DBMS, gives the user access to their data and
helps them transform the data into information. Such database management systems
include dBase, paradox, IMS, SQL Server and SQL Server. These systems allow users
to create, update and extract information from their database.
A database is a structured collection of data. Data refers to the characteristics
of people, things and events. SQL Server stores each data items in its own fields. In
SQL Server, the fields relating to a particular person, thing or event are bundled
together to form a single complete unit of data, called a record (it can also referred to
as raw on an occurrence). Each record is made up of a number of fields. No two fields
in a record can have the same field name.
During an SQL Server Database design project, the analysis of your business
needs identifies all the fields or attributes of interests. If your business needs change
over time, you define any additional fields are change the definition of existing fields.
SQL SERVER TABLES:
SQL Server stores records relating to each other in a table. Different tables are
created for the various group of information. Related tables are grouped together to
form a database.

75

PRIMARY KEY
Every table in SQL Server has a field or a combination of fields that uniquely
identifies each recode in the table. The Unique identifier is called the Primary Key, or
simply the Key. The primary key provides the means to distinguish one record from all
other in a table. It allows the user and the database system to identify, locate and
refer to one particular record in the database.
RELATIONAL DATABASE
Some times all the information of interest to a business operation can be
stored in one table. SQL Server makes it very easy to link the data in multiple tables.
Matching an employee to the department in which they work is one example. This is
what makes SQL Server a relational database management system, or RDBMS. It
stores data in two or more tables and enables you to define relationships between the
table and enables you to define relationships between tables.
FOREIGN KEY
When a field is one table matches the primary key of another field is referred to
as a foreign key. A foreign key is a field or a group of fields in one table whose values
match those of the primary key of another table.
REFERENTIAL INTEGRITY
Not only does SQL Server allow you to link multiple tables, it also maintenance
consistency between them. Ensuring that the data among related tables is currently
matched is referred to as maintaining referential integrity.
DATA ABSTACTION
A major purpose of a database system is to provide users with an abstract view
of the data. The system hides certain details of how the data is stored and
maintained. Data abstraction is divided into three levels.
Physical Level: This is the lowest level of abstraction at which one describes how
the data are actually stored.

76

Conceptual Level: At this level of data base abstraction all the attributed and what
data are actually stored is described and entries and relationship among them.
View Level: This is the highest level of abstraction at which one describe only part
of the database.
ADVANTAGES OF RDBMS

Redundancy can be avoided

Inconsistency can be eliminated

Data can be shared

Standards can be enforced

Security restrictions can be applied

DISADVANTAGES OF DBMS
A significant disadvantage of the DBMS system is cost. In addition to the cost
of purchasing of developing the software, the hardware has to be upgraded to allow
for the extensive programs and the work space required for their execution and
storage. While centralization reduces duplication, the lack of duplication requires that
the database be adequately backed up so that in case of failure the data can be
recovered.

FEATURES OF SQL SERVER (RDBMS)


SQL SERVER is one of the leading database management systems (DBMS)
because it is the only Database that meets the uncompromising requirements todays
most demanding information systems. From complex decision support systems (DSS)
to the most rigorous online transaction processing (OLTP) application, even

77

application that require simultaneous DSS and OLTP access to the same critical data,
SQL Server leads the industry in both performance and capability.
SQL SERVER is a truly portable, distributed, and open DBMS that delivers
unmatched performance, continuous operation and support for every database.
SQL SERVER RDBMS is high performance fault tolerant DBMS which is specially
designed for online transaction processing and for handling large database
applications.

9. CONCLUSION

The entire project has been developed and deployed as per the requirements
stated by the user, it is found to be bug free as per the testing standards that are

78

implemented.

All the suggestions forwarded in the software proposal have been

successfully completed and the final threshold of application has been crossed.
Weaving through the system developed, brief idea can be given as studying the
existing system, designing the problem, visualizing the solution as reports, preparing
the screen outputs, testing with test data, documenting the software developed.
The software comes up to the expectations but as it happens, we still believe
it can be improved further, and we openly expect a lot of feedback which helps us to
improve the effectiveness of the system and our efforts are paid. In short the system
is user friendly.
During the phase of treatment checking various difficulties were encountered
joining different tables created ant problems. The updating of stock has done well.
Logical errors were spotted during the system testing.

SCREEN SHOTS

79

HOME PAGE

80

NEW PASSPORT APPLICATION FORM

81

PASSPORT RENEWAL FORM

82

ECR FORM

83

ENQUIRY FORM

84

ENQUIRY FOR NEW PASSPORT

85

ENQUIRY FOR PASSPORT RENEWAL

86

ENQUIRY FOR ECR/ECNR FORM

87

ENQUIRY FOR FEES

88

ENQUIRY OF STOLEN OR LOST PASSPORT

89

SPECIAL BRANCH FORM

90

HOME PAGE FOR USER

91

SEARCH FORM

92

REPORTS

93

EPORT FOR NEW PASSPORT

94

REPORT FOR RENEWAL PASSPORT

95

REPORT FOR ECR/ECNR

96

REPORT FOR SPECIAL BRANCH

97

DATEWISE REPORT

98

DISTRICT WISE REPORT

99

100