PROFESSIONAL TRAINING REPORT

at
Sathyabama University

Submitted in partial fulfillment of the requirements for the award of
Bachelor of Engineering Degree in

Computer Science and Engineering
By

NAME (Reg. No. 3511..)

DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING
SCHOOL OF COMPUTING
SATHYABAMA UNIVERSITY
JEPPIAAR NAGAR, RAJIV GANDHI SALAI,
CHENNAI – 600119. TAMILNADU.

JUNE 2017

SATHYABAMA UNIVERSITY
(Established under Section 3 of UGC Act, 1956)
Jeppiaar Nagar, Rajiv Gandhi Salai, Chennai - 600119
www.sathyabamauniversity.ac.in

_________________________________________________________________

SCHOOL OF COMPUTING

BONAFIDE CERTIFICATE

This is to certify that this Professional Training Report is the bonafide work of
NAME (Reg. No. 3511..) who underwent the professional training in “TITLE OF
THE PROJECT” under our supervision from May 2017 to June 2017.

Internal Guide
Guide name, Qualification

Head of the Department
Dr. S.MURUGAN, M.E., Ph.D.,

Submitted for Viva voce Examination held on_____________________

Internal Examiner External Examiner

. NAME (Reg.. DECLARATION I.) hereby declare that the Professional Training Report on “TITLE OF THE PROJECT” done by me under the guidance of guide name qualification. at Sathyabama university is submitted in partial fulfillment of the requirements for the award of Bachelor of Engineering degree in Computer Science and Engineering. DATE: PLACE: SIGNATURE OF THE CANDIDATE . 3511. No.

D. Rau. Ph. I like to express our gratitude to Dr... Igni Sabasti Prabu M. M.. Ph.. JEPPIAAR.Phil.. Ph. Ph.D.D.A. M. for their valuable support offered to complete my professional training successfully. Narayanan.E.E..D. .. I would like to express our gratitude to our Registrar Dr... Ph. It is our great privilege to express our gratitude and respect to all those who have guided me during the course of my Professional Training. M. and for providing me the necessary facilities for the completion of the professional training. we would express our sincere gratitude to our beloved Founder Chancellor Col. for their constant support and endorsement. and the Vice President Dr. I extend my sincere thanks to our Pro Chancellor Dr.. M. Ph..A. S. B.. B.B. Mariazeena Johnson.. V. I would also like to express our sincere thanks to our internal guide Guide name(Qualification) who guided me in the preparation of the report. Ph.B. S. Ph. Ph.E. First and foremost. M. Marie Johnson.E.. Dr. K.. I also acknowledge our Vice Chancellor Dr.. M. Sathyabama University for having been a constant source of support and encouragement for the completion of the professional training.. Head of the Department of Computer Science and Engineering.Phil.D. ACKNOWLEDGEMENT The satisfaction and elation that accompany the successful completion of any task would be incomplete without the mention of the people who have made it possible. and Chancellor Thirumathi. Dean.. School of Computing and Dr. M. B. M.D.L. T. and the Pro Vice Chancellor Dr. Murugan.E..D.. M.D. and Controller of Examinations Dr. S. Sasipraba.. REMIBAI JEPPIAAR. Lakshmi.E.D.A. M.E.

I thank the Almighty and my Parents for supporting me in the completion of the professional Training. Also. .

(PLACE THE TRAINING CERTIFICATE) v .

vi . there are given 10 questions to play. The front end tool required for this project is the JAVA swing but no such back end tools are being used. ABSTRACT The Java Application World software is a platform where the user can use different applications which are developed in Java language . You can use collection framework or database in place of array. We are using here java array to store the questions. options and answers not database. In this project. The user interface has been given a nice and trendy look with a professional feeling. User can bookmark any question for the reconsideration while going to result.

Functional Requirements 1. Can use exam system Front End and Back End 1. Front End: Java Swing 2. Back End: No vii . OUTLINE OF THE PROJECT To develop A Java Application where user can write an an online exam and can bookmark any question for the reconsideration while going to result. User 1.

that language is oriented. It is the best property of the Java language. when we go for the programming. Other languages are not achieving this feature.1 Java Language Features Platform Autonomy (Portable): It is the methodology named as WORAW which is well understood by us as an independent to the computer system configuration. All the programs which are prepared on the Java platform can be executed on any different platform with the help of JVM (Java Virtual Machine). o Inheritance: Concept tells the reusability of the system. The reason behind is that they are procedural plus object oriented. Here “poly” means many. this is the one which gained a lot to be very nearer to this property.1. C++ which accomplish all the mentioned properties. Programming is so comfortable as well as to be tested easily because Java not explicitly uses the pointers. some language has to go after the successive 4 fundamental concepts. Object Oriented: Around an object to be. and “morph” means forms. the Java that is viii . Or we can say “it is the technique to furnish of the diverse functionalities through the methods which is based on the same name but different on the signatures of the methods”. This is the technique to furnish the maximal functionality to the programs at the time of their execution. Very Easy: There are diverse marks that make it as a straightforward programming language. o Polymorphism: It is the word which is taken from the Greek language. 2. LITERATURE REVIEW 2. However. the data and their functionality are wrapped up under one cover and then furnishing of the abstraction.1 Java Technology This complete section of the thesis gives the whole details about the Java language security which is a highly great software development technology. be reused the procedure to create of novel classes as well as use manners present in the available classes through expanding it only the accessible code and the adding of the extra marks when necessary. From one name we can do lot of functioning according to the situations. o Encapsulation: In it. o Dynamic binding: Occasionally we are not aware about the objects and their particular working. All has been described in the coming discussions. But so far these are not to be called as object oriented one completely. There are so many languages like Objective C.

There is the strong exception handling system and strong type checking system in it as we contrast with the other available languages. But. Performance: Java utilizes indigenous code practice.). So. etc. Safe: Java does not use storage pointer explicitly. There is no need to write the program code on the local computer. but Java language is an architectural neutral one. Multithreading analogy is shown as many processes execute on a single computing machine. These facilities are to interpret and to compile. The on-the- fly translator (the interpreter) reads the source code instructions one by one. The ix . Security manager intends the attainability option of a class such as harvests and letter of a file for the local disk. It has given the idea of distribution on the networks to the programmers. Now the compilation has increased the performance of the Java programs. With the help of interpreter. the most recent versions of JVM utilizes according to the environment. There may be many threads under one process (a program in execution) of the computer. So we can move around the applications easily to separate computer machines. The instructions of the numerous threads are executed regarding the program. Networking has gained reputation among people. Interpreted: We know very well that Java language has both the facilities of translator. the performance was slow. The entire programs in java ran under a zone well known as the sand box. The networks programmers call the functions on these protocols. Distributed: In the current scenario the mostly used protocols are the main internet protocols (like FTP. we can execute the programs from their source code directly. The threads are used to share code and data sections. Today is the world of networks in which so many computers are interconnected from distant. The byte code verifier tests the classes after loading. HTTP. It is because the objects are the ones which are the external level of the data structure. The programming of multithreading has a lot of curiosity of the developers. Java is a good programming language to interpret and due to it is very easy to find out the errors from the new programs. At the very start of the interpretation of byte code results. Multithreading is a technique in which a single program has dissimilar threads. Both of the protocols are created in the Java language. Architecture Neutral: The concept architecturally neutrally seems to be eccentric. And they can utilize the files which are stored on the distant computers which are the part of the network. Multithreaded: With the help of Java programming language. The compiler ensures the written programs to be error free. as we talk about the Java language. Dynamic: In the carrying out the Java programmed the consumer can get away the required files dynamically of a local drive or of a computer thousands of miles of the consumer only through connecting with the Internet. Robust: There is the powerful storage allocation and the rubbish collection mechanism which is automatic in Java language.completely an object-oriented language. These threads are separate one which is carried out concurrently. The applications can be distributed on diversity of computer architectures and diverse number of operating systems. we can also do the multithreaded programming.

x . is initialized. Such as other operating systems. There are packaging classes that even for the straightforward data types. The machine must have the Java Virtual Machine. to use.1. is not. that is been based memory. and canceling lets when for method definitions counted doesn't have to. at that time the developer is compelled by the Java compiler to treat all types of exceptions. At the moment of method use. that involuntarily is been based memory. It does not allow wrong storage accessing and has the less likelihood of the leakage of memory. and all the local variables must be allotted certainly before exercise or the source compiler is forced to give you a mistake. Both the compiler and the execution time testing does not allow such opportunities since no task can be made. o Defined clear performance to uninitialized of variable. Consequently the load is on the developer is more less and so the likelihood to make of fine mistakes is diminished. o Finalization of classes and routines. There is no trespasser data admittance and execution time slumps. 2. So all class and case variable never are set to indeterminate values. Polymorphism is a extremely influential object oriented mark. there may be heavy mistakes. platform developer with I/O furnishes the java. must networking. o Severity. there is not compatibility. o More severe exception treating mechanism is. But all on pile. Java is a revolutionary new application platform of Sun Microsystems. o Automatic storage management: The pointers are not directly used here and there is no arithmetic for the memory addresses. and the unwanted change of that of functionality firm stops object oriented. The bases of the java security can be seen in several fundamental language marks: o Has and easily simplifies. Consequently the manners of the Java code are unsurprising the program code turns into "fool-proof". This mark does not let sub classing to if used to incorporate definitions. but it embraces possible risks to disguise of aggressive objects. Also an important productivity that is not found in traditional operating systems furnishes the java platform. and it defined become.2 Java Security Basics Here are two types of security in the Java language that are as follows: Security at Language level Entire security is put through some systems that are built up at diverse occasions. o Physically powerfully typed minimizes. Java is a large amount straightforward to compare to new languages such as C++. if against types objects. window and graphics productivity and other arrangements and develops to run refined applications. Consequently all securities told advantages of the object oriented pattern example can be utilized. All on pile.Java language programs are converted to the byte code after the compilation and that code is then interpreted on any type of machine. can give no constructions exterior of classes.

addActionListener(this).100.140.110. jb[2]. import java. OnlineTest(String s) { super(s).current=0.100. ButtonGroup bg. b2. bg.450. b1. add(l).*.swing. set(). JRadioButton jb[]=new JRadioButton[5].y=1. add(jb[i]). int count=0.i++) { jb[i]=new JRadioButton().setBounds(50.setBounds(50.100. xi .setBounds(50.*.now=0.20). jb[1]. OBJECTIVES To Develop a Java App Where the user can use exam system Source Codes: Online Java Paper Test Program: /*Online Java Paper Test*/ import java.*. jb[3].b2.setBounds(50.setBounds(30. bg=new ButtonGroup(). } b1=new JButton("Next").add(jb[i]). add(b1). b1.awt. import javax.170.add(b2).100.addActionListener(this). JButton b1.awt. l.20). class OnlineTest extends JFrame implements ActionListener { JLabel l.i<5.20).event.20). b2=new JButton("Bookmark").setBounds(100. for(int i=0.240.30). int m[]=new int[10].100.80.x=1.40.20). jb[0]. l=new JLabel().

setText("Result"). current=m[y].setEnabled(false). bk. setVisible(true). } public void actionPerformed(ActionEvent e) { if(e. m[x]=current.y++) { if(e.100. current++.getSource()==b1) { if(check()) count=count+1. b2.setText("Result"). xii .20+30*x.y=1. if(current==9) { b1. setLocation(250. set(). current++.getActionCommand().100.setBounds(270. } for(int i=0. now=current.i<x.240.addActionListener(this).getSource()). } } if(e.equals("Bookmark")) { JButton bk=new JButton("Bookmark"+x).30). current=now.getActionCommand(). setVisible(false). set(). add(bk). set().350).30).i++. setVisible(true).setEnabled(false). b2. setDefaultCloseOperation(JFrame.EXIT_ON_CLOSE).100). x++. setLayout(null). setSize(600. bk.equals("Bookmark"+y)) { if(check()) count=count+1. if(current==9) b2. ((JButton)e.setBounds(480.

showMessageDialog(this.setText("int"). } } void set() { jb[4].getActionCommand().setText("Que5: Which institute is best for java coaching?").setText("lang").setText("Aptech"). //System.println("correct ans="+count). xiii .setText("ActionE vent").jb[2].jb[1].jb[3]. jb[0].setSelected(true).setText("Applet").jb[1].jb[3].setText("Swing").exit(0).setText("Utek").jb[3].jb[2].setText("Object"). jb[0].setText("swing"). } if(current==1) { l.setText("lang").equals("Result")) { if(check()) count=count+1.setText("Que1: Which one among these is not a primitive datatype?").setText("Que4: String class is defined in which package?"). jb[0]. jb[0].jb[1].setText("Que3: Which package is directly available to our class without importing it?"). } if(current==4) { l.setText("Que2: Which class is available to all the class automatically?").setText("SSS IT").jb[3].setText("Applet").setText("net"). if(current==0) { l. current++.setText("jtek").jb[2]. } if(current==2) { l. } if(current==3) { l.out.setText("boolean").setText("Float"). System.jb[2]. JOptionPane.setText("Swing"). } } if(e. jb[0].jb[2].jb[3].setText("char").setText("awt").jb[1].setText("applet")."correct ans="+count).jb[1].

} if(current==8) { l. jb[0].setText("init").jb[2].jb[2].40.isSelected()).j++) jb[j].isSelected()). } if(current==7) { l. if(current==4) return(jb[2].setText("Que8: which one among these is not a function of Object class?"). jb[3]. jb[0].80+i.jb[1].jb[2].setText("Que7: Which one among these is not a class? "). } if(current==6) { l.setText("Button"). jb[3]. if(current==2) return(jb[3].setText("get").200.setBounds(30.setText("int").isSelected()).450. jb[0].setText("finalize").jb[1]. xiv .setText("toString"). for(int i=0.setText("JButtonGroup"). } boolean check() { if(current==0) return(jb[1].setText("start").setText("Que6: Which one among these is not a keyword?").i+=30.jb[1].setText("ActionEvent"). if(current==3) return(jb[0].setText("class").jb[3].jb[1].setText("equals").i<=90.setText("Que9: which function is not present in Applet class?").setText("Actionperformed").setText("main").setText("getDocumentBase").isSelected()).setText("Swing"). } if(current==9) { l.setText("JTextArea").jb[1].jb[2].isSelected()).20). } if(current==5) { l.jb[3]. if(current==1) return(jb[2].setText("JList").j=0.setText("Que10: Which one among these is not a valid component?").20).setBounds(50.jb[2]. jb[0]. } l. jb[0].setText("JButton").setText("if"). jb[3].setText("destroy").

if(current==5) return(jb[2]. } } xv .isSelected()).isSelected()). if(current==9) return(jb[2]. return false. } public static void main(String s[]) { new OnlineTest("Online Test Of Java"). if(current==7) return(jb[3]. if(current==8) return(jb[1].isSelected()).isSelected()). if(current==6) return(jb[1].isSelected()).

Output Screen Shots xvi .

TABLE OF CONTENTS Chapter TITLE Page No.3 MODUALR DESIGN 2. ABSTRACT v LIST OF TABLES viii LIST OF FIGURES ix LIST OF ABBREVIATIONS x 1 INTRODUCTION 1 1.2 LITERATURE REVIEW 2 1.1(Subheadings) 2.3. ALGORITHMS AND METHODS (GIVE THE NAME OF THE ALGORITHM / METHODOLOGY ) 2.2 OVERVIEW 2.3.1( ) 2.3 OBJECTIVES 6 2.1 GENERAL xvii .4 SUMMARY 3 SYSTEM IMPLEMENTATION 3.1 GENERAL 2.1 OUTLINE OF THE PROJECT 1 1. No.

No.4 SUMMARY Chapter TITLE Page No. PUBLICATIONS (IF ANY) xviii .1 SUMMARY 4. SCREEN SHOTS C.2 OVERVIEW OF THE PLATFORM 3. 4 CONCLUSION AND FUTURE WORK 4. 3.3 RESULTS AND DISCUSSION 3. SOURCE CODE B.2 FUTURE WORK REFERENCES APPENDIX A.

2. LIST OF TABLES TABLE No. TITLE PAGE No. LIST OF FIGURES FIGURE No. TITLE PAGE No.1 Sequence Diagram 13 xix .

LIST OF SYMBOLS AND ABBREVIATIONS LBS . Location Based Services xx .

Faculty of Organization and Informatics. Eisenecker. 20. 115 – 122. An Introduction to Aspect-Oriented Programming. pp. M. International Workshop on Component-Based Software Engineering (CBSE 2000). Vol. Integration of Generative Programming and Scripting Languages. Varaždin. J. D. PhD thesis. 1998... From AOP to UML . D. 1998. O'Reilly. M. pp... Building Reliable Component-Based Software Systems. U.. Croatia. Lozano A.. [9] Ousterhout J. Ireland.. Generative programming: methods. Kienzle. J. 83 – 85. Enschede. Comparison between UML and Generator Application Scripting Model. A. Impact of Software Components Characteristics above Decision-making Factors. The Java programming Language. Kli"ek. Maeda.ch/workshops/aosduml/Allsubs/kande. M. Lamping. M. 1st International Conference on Aspect-Oriented Software Development. The Netherlands. G. R. 220 – 242. Vol. Limerick. Irwin. 15 – 23. I.epfl. 1241/1997. [4] Flanagan. Addison-Wesley. The Hong Kong University of Science and Technology.pdf [7] Kiczales. Artech House. URL: http://lglwww. Addison-Wesley. Kozina.K. C. C. 2003. Loingtier.. Proceedings of the 16th International Conference on Information and Intelligent Systems (IIS). 1999. 2002. 2002. pp.W. COMP 610E 2002 Spring Software Development of E-Business Applications. Varaždin. Boston.A Bottom-Up Approach.. Mendhekar. Strohmeier. [10] Parsons. J. Faculty of Organization and Informatics. Software. No. K. 31.. Java Foundation Classes in a Nutshell: A Desktop Quick Reference. Vol. V. Aspect-Oriented Programming. Lopes. Croatia 1 . Gosling. REFERENCES [1] Arnold. [8] Lee. M. B. J. J. W.. Lecture Notes in Computer Science. K. Computer. [12] Radoševi!. [3] Czarnecki. 2005. 2000 [6] Kandé. 2002. K. 3.. pp. A.. 23 – 30. 2000. 1997. [2] Crnkovic. D. Scripting : Higher Level programming for the 21st Century.. pp. [11] Radoševi!. K. 3. [5] Gómez-Perez A. No. Components and the World of Chaos. Larsson.. tools and applications.

D. 2003. pp. The Model-View-Controller (MVC): Its Past and Present. Springer. Quality Characteristics for Software Components: Hierarchy and Quality Guides. University of Oslo. Belchior. 184- 206. A.. Retrieved May 15 2007 [14] Simão. 2 . R.[13] Reenskaug. URL: http://heim.uio.. P. T.no/~trygver/2003/javazone-jaoo/MVC_pattern.pdf.ifi. S. Lecture Notes in Computer Science. Volume 2693.