You are on page 1of 62

ONLINE LAW SYSTEM

CHAPTER 1

INTRODUCTION

1.1 AN OVERVIEW

The project entitled “Online Law System” is a software system that contains all the laws
of IPC so that people can come and search for the laws for respective crime. Law seeking
approach in major or minor conflicts is very old practice. Sometimes people approach
law courts in minor daily life issues or problems. This makes tons of cases at court and
major issues get pending / delayed or take too much time for hearing. The technology
introduces many software applications and systems to ease human life. The other reason
that society needs this system is that most people are unaware of the laws implemented
by the government. Therefore to create awareness among people / society about the laws
that listed in constitution against different crimes so people can register against these
crimes. The project has been developed with PHP as the Front End and MySQL as the
Back End.

1.2 OBJECTIVE OF THE PROJECT

The aim of the proposed project is to facilitate people to consult court easily,
approachable and timesaving mode for their daily life issues or cases. This project is a
software system that contains all the laws of IPC so that people can come and search for
the law for respective crime. The laws are categorized into different sections according to
some keywords. There is also search option available where user can find or search
according to his requirement by entering his query. There is also a facility available for
users to get contact of lawyers. They know about the intensity of different crimes, the
punishments against different crimes. The users can find these details as well able to
report crimes in most instant and effective manner.

MCA@SNIT Page 1
ONLINE LAW SYSTEM

1.3 MODULES

The entire project mainly consists of 4 modules, which are

 Admin module
 User module
 Lawyer module
 Police module

1.3.1 Admin Module

The administrator do overall control of the system. If your user name and password is
matching with administrator’s user id and password, then you will enter in to the site as
administrator.

 Court Entry
Description: Add courts

 Lawyer Entry

Description: Add Lawyers based on their specialization and court name

 Law Entry

Description: Add Laws and corresponding IPC Sections.

 Police Entry

Description: Add police

 Police Station Entry

Description: Add police Stations

1.3.2 User Module

The user is the one who uses the site. If your user name and password is matching with user’s
user name and password, then you will enter in to the site as user.

MCA@SNIT Page 2
ONLINE LAW SYSTEM

 Court Search

Description: Search courts

 Law Search

Description: Search the laws based on keyword and IPC Section

 Lawyer Search

Description: Users can search lawyer based on their specialization and lawyer
name.
 Criminal Search

Description: User can search criminal based on criminal name and crime type.

 Add Case

Description: Users can give complaint to police officials and after complaint
approval users can upload photo, sign and ID card.

1.3.3 Lawyer Module

The lawyer is the one who uses the site. If your user name and password is matching with
lawyer’s user name and password, then you will enter in to the site as lawyer.

 Appointment

Description: Can view appointment details

 Chat

Description: Can chat with the users who have take appointment.

MCA@SNIT Page 3
ONLINE LAW SYSTEM

1.3.4 Police Module

The Police the one who uses the site .If your user name and password is matching with
police’s user name and password, then you will enter in to the site as police.

 View case

Description: Can view the complaints given by the users and can accept or
reject complaint after checking and can upload final FIR report.

 Add Criminals

Description: Can add criminals including their photographs.

 Add Crime Type

Description: Can add different crime types.

MCA@SNIT Page 4
ONLINE LAW SYSTEM

CHAPTER 2
REQUIREMENT SPECIFICATION
2.1 INTRODUCTION:

To be used efficiently, all computer software needs certain hardware components or the other
software resources to be present on a computer. These pre-requisites are known as (computer)
system requirements and are often used as a guideline as opposed to an absolute rule. Most
software defines two sets of system requirements: minimum and recommended. With
increasing demand for higher processing power and resources in newer versions of software,
system requirements tend to increase over time. Industry analysts suggest that this trend plays
a bigger part in driving upgrades to existing computer systems than technological
advancements.

2.2 HARDWARE REQUIREMENTS

The most common set of requirements defined by any operating system or software
application is the physical computer resources, also known as hardware. A hardware
requirements list is often accompanied by a hardware compatibility list (HCL), especially in
case of operating systems. An HCL lists tested, compatibility and sometimes incompatible
hardware devices for a particular operating system or application. The following sub-sections
discuss the various aspects of hardware requirements.

2.2.1 Hardware Specification

Processor : x386/32-bit

RAM : 128 MB or Higher

Hard Disk : 40 GB or higher

2.3 SOFTWARE REQUIREMENTS

Software Requirements deal with defining software resource requirements and pre-requisites
that need to be installed on a computer to provide optimal functioning of an application.
These requirements or pre-requisites are generally not included in the software installation
package and need to be installed separately before the software is installed.

MCA@SNIT Page 5
ONLINE LAW SYSTEM

2.3.1 Software Specification

Operating System : 32-bit Operating System


Web Browser : Internet Explorer/Mozilla/Chrome
Front-End Tool : PHP
Client side Script : JavaScript
Server side Script : PHP
Back-End Tool : MySQL

MCA@SNIT Page 6
ONLINE LAW SYSTEM

CHAPTER 3
ANALYSIS
3.1 EXISTING SYSTEM

Existing system of law and justice is opaque and uncountable. The biggest hurdle is that the
people are not aware about their rights and legal remedies available for them. In many
circumstances, cases against criminals or certain individuals are not accepted and many cases
left pending even after decades the crime has occurred.

3.2 PROPOSED SYSTEM

Proposed system aims to make the citizen aware about the kind of laws available under the
constitution. An individual can login to the web site and get to see all the laws of IPC. The
contacts of the lawyers are also available. Even individual can register a case online which is
directly sent to the station authority. Web site is also responsible to keep a track of all the
cases added.

3.3 FEASIBILITY STUDY

The main aim of the feasibility study activity is to determine.Whether it would be


financially and technically feasible to develop the product. The feasibility study activity
involves analysis of the problem and collection of all relevant information relating to the
product such as the different data items which would be input to the system the processing
required to be carried out of these data, the output data required to be carried out of these
data, the output data required to be produced by the system, as well as various constraints on
the behaviour of the system.
In our software we would find the actual requirements of this software and add that features
Such as monitoring, process scanning etc. For adding this feature we will like take different
ways to solving this last find the best way to complete this features.
Feasibility studies aim to objectively and rationally uncover the strengths and weakness of
the existing business or proposed venture, opportunities and threats as presented by the
environment, the resources required to carry through, and ultimately the prospects for
success. In its simplest term, the two criteria to judge feasibility are cost required and value to
be attained As such, a well-designed feasibility study should provide a historical background
of the business or project, description of the product or vice, accounting statements, details of

MCA@SNIT Page 7
ONLINE LAW SYSTEM

the operations and management, marketing research and policies, financial data, legal
requirements and tax obligations. Generally studies precede technical development and
project implementation. :
The feasibility study to be conducted for this project involves.
1. Technical Feasibility
2. Operational Feasibility
3. Economic Feasibility

3.3.1 Technical Feasibility

The assessment is based on an outline design of system requirements in terms of Input,


Processes, Output, Fields, Programs, and Procedures. This can be quantified in terms of
volumes of data, trends, frequency of updating, etc. in order to estimate whether the new
system will perform adequately or not. Technological feasibility is carried out to determine
whether the company has the capability, in terms of software, hardware, personnel and
expertise, to handle the completion of the project when writing a feasibility report, the
following should be taken to consideration. A brief description of the business the part of the
business being looked towards .The human and economic factor the possible solutions to the
problems. The system is technically feasible.
3.3.2 Operational Feasibility

Operational analysis is the most frequently used method for evaluating the effectiveness of a
new system. More commonly known as cost/benefit analysis, the procedure is to determine
the benefits and saving that are expected from a candidate system and compare them with
costs. If benefits outweigh costs, then the decision is made to design and implement the
system. An entrepreneur must accurately weigh the cost versus benefits before taking an
action. Cost-based study: It is important to identify cost and benefit factors, which can be
categorized as follows:
1. Development costs.
2. Operating costs.
This is an analysis of the costs to be incurred in the system and benefits derivable out of the
system. Time-based study: This is an analysis of the time required to achieve a return on
investments the future value of a project is also a factor. The system is operationally feasible.

MCA@SNIT Page 8
ONLINE LAW SYSTEM

3.3.3 Economic Feasibility

In case of new project, financial viability can be judged on the following parameters:

 Total estimated cost of the project


 Financing of the project in terms of its capital structure, debt equity ratio and
promoter‘s share of total cost
 Existing investment by the promoter in any other business
 Projected cash flow and profitability.
The system is Economically Feasible

3.4 SOFTWARE SPECIFICATION

3.4.1 HTML:

HTML or Hypertext Markup Language is the standard markup language used to


create web pages.

HTML is written in the form of HTML elements consisting of tags enclosed in angle
brackets (like <html>). HTML tags most commonly come in pairs like <h1> and </h1>,
although some tags represent empty elements and so are unpaired, for example <img>. The
first tag in a pair is the start tag, and the second tag is the end tag (they are also
called opening tags and closing tags). Though not always necessary, it is best practice to
append a slash to tags which are not paired with a closing tag.

The purpose of a web browser is to read HTML documents and compose them into visible or
audible web pages. The browser does not display the HTML tags, but uses the tags to
interpret the content of the page. HTML describes the structure of a website
semantically along with cues for presentation, making it a markup language rather than
a programming language.

HTML elements form the building blocks of all websites. HTML allows images and
objects to be embedded and can be used to create interactive forms. It provides a means to
create structured documents by denoting structural semantics for text such as headings,
paragraphs, lists, links, quotes and other items. It can embed scripts written in languages such
as JavaScript which affect the behavior of HTML web pages.

MCA@SNIT Page 9
ONLINE LAW SYSTEM

3.4.2 MySQL:

MySQL is developed, distributed, and supported by Oracle Corporation. MySQL is a


database system used on the web it runs on a server. MySQL is ideal for both small and large
applications. It is very fast, reliable, and easy to use. It supports standard SQL. MySQL can
be compiled on a number of platforms. The data in MySQL is stored in tables. A table is a
collection of related data, and it consists of columns and rows. Databases are useful when
storing information categorically.

Features of MySQL:

Internals and portability:

 Written in C and C++.

 Tested with a broad range of different compilers.

 Works on many different platforms.

 Tested with Purify (a commercial memory leakage detector) as well as with Val grind, a

GPL tool.
 Uses multi-layered server design with independent modules. Security:

 A privilege and password system that is very flexible and secure, and that enables host-based

verification.

 Password security by encryption of all password traffic when you connect to a server.

Scalability and Limits:

 Support for large databases. We use MySQL Server with databases that contain 50 million

records. We also know of users who use MySQL Server with 200,000 tables and about
5,000,000,000 rows.

 Support for up to 64 indexes per table (32 before MySQL 4.1.2). Each index may consist of

1 to 16 columns or parts of columns. The maximum index width is 767 bytes


for InnoDB tables, or 1000 for MyISAM; before MySQL 4.1.2, the limit is 500 bytes. An
index may use a prefix of a column for CHAR, VARCHAR, BLOB, or TEXT column
types.

MCA@SNIT Page 10
ONLINE LAW SYSTEM

Connectivity:

Clients can connect to MySQL Server using several protocols:

 Clients can connect using TCP/IP sockets on any platform.

 On Windows systems in the NT family (NT, 2000, XP, 2003, or Vista), clients can
connect using named pipes if the server is started with the --enable-named-
pipe option. In MySQL 4.1 and higher, Windows servers also support shared-
memory connections if started with the --shared-memory option. Clients can
connect through shared memory by using the --protocol=memory option.

 On UNIX systems, clients can connect using Unix domain socket files.

Localization:

 The server can provide error messages to clients in many languages.


 All data is saved in the chosen character set.

Clients and tools:


 MySQL includes several client and utility programs. These include both
command-line programs such as mysqldump and mysqladmin, and graphical
programs such as MySQL Workbench.
 MySQL Server has built-in support for SQL statements to check, optimize, and
repair tables. These statements are available from the command line through
the mysqlcheck client. MySQL also includes myisamchk, a very fast command-
line utility for performing these operations on MyISAM tables.
 MySQL programs can be invoked with the --help or -? option to obtain online
assistance.

3.4.3 Overview of PHP (PHP-5.3.0):

PHP is a widely-used Open Source general-purpose scripting language that is especially


suited for Web applications and can be embedded into HTML. It is a free software. Its syntax
draws upon C, Java, and Perl, and is easy to learn. The main goal of the language is to allow

MCA@SNIT Page 11
ONLINE LAW SYSTEM

web developers to write dynamically generated web pages quickly. One of the most
important factors driving PHP’s popularity over the last couple of years has been its support
for a variety of databases, including MySQL, Oracle, and Microsoft Access. One of the most
powerful combinations in the open source arena today is the PHP/ MySQL combination. Like
PHP, MySQL has open-source roots: it is a fast and reliable database management system
that is rapidly acquiring a worldwide user base. By using PHP and MySQL together, users
can benefit from the cost savings that accompany community-driven software, and also
leverage off the immense number of freely available PHP/MySQL applications to reduce
development time.

Typically, PHP code is embedded inside a regular HTML document, and is recognized and
executed by the web server when the document is requested through a browser. Because PHP
is a full-featured programming language, you can code all manner of complex thin gummies
into your web pages using this technique; the server will execute your code and return the
output to the browser in the format you specify. Because PHP code is executed on the server
and not on the client, developers don’t have to worry about browser-specific quirks that could
cause the code to break (as commonly happens with JavaScript); PHP code works
independently of the user’s web browser.

Advantages of PHP

1 Vs. Pure Servlets - It is more convenient to write (and to modify) regular HTML than
to have a zillion print statements that generate the HTML.

2 Vs. Server-Side - Includes (SSI).SSI is a widely support technology for including


externally defined pieces into a static web page.

3 Vs. JavaScript - JavaScript can generate HTML dynamically on the client. This is the
useful capability, but only handles situations where the dynamic information is based
on the client’s environment. With the exception of cookies, HTTP and form
submission data is not available to JavaScript. And, since it runs on the client,
JavaScript can’t access server-side resources like databases, catalogs, pricing
information, and the like.

4 Vs. Static HTML - Regular HTML, of course, cannot contain dynamic information.
PHP is so easy and convenient that it is quite feasible to augment HTML pages that
only benefit marginally by the insertion of small amounts of dynamic data.
MCA@SNIT Page 12
ONLINE LAW SYSTEM

Previously, the cost of using dynamic data would preclude its use in all but the most
valuable instances.

Syntax and Semantics

PHP only parses code within its delimiters. Anything outside its delimiters is sent directly to
the output and is not parsed by PHP. The most common delimiters are <?php and ?>, which
known as open and close delimiters respectively in the PHP language. <script
language="php"> and </script> delimiters are also available. Short tags can be used to start
PHP code, <? or <?= (which is used to echo back a string or variable) and the tag to end PHP
code, ?>.

1. Mysql_connect(server_address,username,password)
This function takes server_address,username and password as arguments. Server address can
be ‗localhost‘ in case we are using local machine for implementation. In other cases we have
to mention the ipaddress. Eg: mysql_connect(―localhost‖,‖root‖,‖root‖);
2. Mysql_select_db()
This function is used to select the data from tshe database.
3. Mysql_Query()
This function is used to execute the query.
4. Mysql_error()
This function is used to show the error message to the query.
5. Error_reporting()
This function is used to show the system warning.
6. [Upload file]
move_uploaded_file($_FILES["fileToUpload"]["tmp_name"], $target_file)
7. die('Error'.mysql_error()) [Exception handling]
8. header('location:home.php')
9. fopen($viewfile, "w") or die("Unable to open file!")
10. feof($myfiletemp))
11. fgets($myfiletemp) ;
12. str_replace("HHHUUUPPP",$table,$line);
13. fwrite($myfilemain,$rtext) s
14. fclose($myfilemain);
15. unlink($viewfile1);

MCA@SNIT Page 13
ONLINE LAW SYSTEM

CHAPTER 4

DESIGN
4.1 SYSTEM DESIGN

System design refers to the description of a new system based on the information
that is collected during the analysis phase and the process by which it is developed.
It is the creative process of inventing and developing new inputs, database
procedures and outputs to meet the system objectives. System design builds on the
information gathered during system analysis. The system analyst must have a
clear- cut understanding about the objectives, which the design aims to fulfill.

System Design involves translating system requirements and conceptual design


into technical specifications and general flow of processing. After the system
requirements have been identified, information has been gathered to verify the
problem and after evaluating the existing system, a new system is proposed.

System Design is the process of planning of new system or to replace or


complement an existing system .It must be thoroughly understood about the old
system and determine how computers can be used to make its operations more
effective.

System design sits at technical the kernel of system development. Once system
requirements have been analyzed and specified system design is the first of the
technical activities-design, code generation and test- that required build and
verifying the software. System design is the most creative and challenging phases
of the system life cycle. The term design describes the final system and the process
by which it is to be developed.

System design is the high level strategy for solving the problem and building a
solution. System design includes decisions about the organization of the system
into subsystems, the allocation of subsystems to hardware and software
components and major conceptual and policy decision that forms the framework
for detailed design.

MCA@SNIT Page 14
ONLINE LAW SYSTEM

4.2 Input Design


Input design is the method by which valid data are accepted from the user. This
part of the designing requires very careful attention. If the data going into the
system is incorrect then the processing and output will magnify these errors.
Inaccurate input data are the most common cause of errors in data processing.
Input design consists of the following processes:-

 Designing graphical user entry screen is easy to use.

 Designing procedures and functions to valid the data as per business rules.

 Designing functions needed to store data into a usable form for processing.

 Designing the common integrated functions that can be used by all other
users when needed.

4.2.1 Input Objectives


Controlling Amount of Input: Wherever user input is required, giving possible
input values as default in that area reduces the amount of user keystrokes. Thus the
user can pass on to next data without much typing. This makes the data entry much
fast and error free. When the user has the format of input to be given, it will be
very easy for the user to give input in the same format.

Avoiding Delay : A processing delay resulting from data entry operations is called
a bottleneck. Such bottlenecks are made obsolete in this project by breaking up the
amount of data to be entered in each form into different smaller and simpler forms.

Avoiding Errors in Data : The rate at which errors occur depends on the quantity
of the data. As told in the above objective these errors are reduced by making the
number of data to be entered in each form is reduced.

Avoiding Extra Steps: To fulfill any operation the user have no need to do complex
steps, instead any operation can be done with simple easy to use steps.

MCA@SNIT Page 15
ONLINE LAW SYSTEM

OUTPUT DESIGN
Output design is one of the most important features of the information system.
When the output is not of good quality, the users will be averse to use the newly
designed system and may not use the system. There are many types of outputs, all
of which can be either highly useful or can be critical to the users, depending on
the manner and degree to which they are used.

Outputs from computer system are required primarily to communicate the results
of processing to users. They are also used to provide a permanent hard copy of the
results for later consultation

4.3.1 Output Objectives


The output from an information system should accomplish one or more of the
following objectives:

 Convey information about past activities, current status, or projections of


the future.

 Signal important events, opportunities, problems or warnings

 Trigger an action

 Confirm an action

4.4 DATA FLOW DIAGRAM


Data Flow Diagram (DFD) representing a system at any level of detail with a
graphic network of symbols showing data flows, data stores, data processes, and
data sources. The purpose of DFD is to provide a semantic bridge between users
and system developers. The diagram is the basis of structured system analysis. A
level 0 DFD, also called a fundamental system model or a context model
represents the entire software elements as a single bubble with input and output
indicated by incoming and outgoing arrows respectively. Additional process and
information flow parts are represented in the next level i.e., Level 1 DFD. Each of
the processes represented at Level 1 are sub functions of overall system depicted in
the context model. Any processes, which are complex in Level 1, will be further
represented into sub functions in the next level, i.e., in level 2.Data flow diagrams
illustrate how data is processed by a system in terms of inputs, and outputs.
MCA@SNIT Page 16
ONLINE LAW SYSTEM

Represent major components or functions with Circles. Actions for input by a user
or a system go in Rectangular Boxes. Databases are represented by Parallel lines
enclosing a phrase corner.

4.4.1 Data Flow Diagram – The Rules


1. External Entities
External entities are objects outside the system, with which the system
communicates. External entities are sources and destinations of the system‘s inputs
and outputs.

2. Processes
When naming processes, avoid glossing over them, without really understanding
their role. Indications that this has been done are the use of vague terms in the
descriptive title area like process or update‘. The most important thing is that the
description must be meaningful to whoever will be using the diagram.

3. Data Flows
Double-headed arrows can be used (to show two-way flows) on all but bottom
level diagrams. Furthermore, in common with most of the other symbols used, a
data flow at a particular level of a diagram may be decomposed to multiple data
flows at lower levels.

4. Data Store
Data store represent stores of data within the systems and are represented by open
rectangle. Data Flows represent the movements of data between other components
and are shown by arrows.

MCA@SNIT Page 17
ONLINE LAW SYSTEM

Rectangular box defined a source of destination of


the system .

A circle stands for processes that convert data into


Information.

 Data Flow

A Parallel line is a data store

MCA@SNIT Page 18
ONLINE LAW SYSTEM

LEVEL 0: CONTEXT DIAGRAM

Fig 4.1: Level 0 DFD for online law system

MCA@SNIT Page 19
ONLINE LAW SYSTEM

LEVEL 1

Fig 4.2: Level 1 DFD for online law system

MCA@SNIT Page 20
ONLINE LAW SYSTEM

Fig 4.3: Level 2 DFD for user management

MCA@SNIT Page 21
ONLINE LAW SYSTEM

Fig 4.4: Level 2 DFD for police management

4.5 ANALYSIS TOOLS


System analysis is the process of collecting and interpreting facts, understanding
problems and using the information to suggest improvements on the system. This
will help to understand the existing system and determine how computers make its
operation more effective.

MCA@SNIT Page 22
ONLINE LAW SYSTEM

4.5.1. Use Case Diagram


In software engineering, a use case diagram in the Unified Modeling Language
(UML) is a type of behavioral diagram defined by and created from a Use-case
analysis. Its purpose is to present a graphical overview of the functionality
provided by a system in terms of actors, their goals, and any dependencies between
those use cases.

The main purpose of a use case diagram is to show what system


functions are performed for which actor. Roles of the actors in the system can be
depicted. The use case diagram shows the position or context of the use case
among other use cases. As an organizing mechanism, a set of consistent, coherent
use cases promotes a useful picture of the system behavior , a common
understanding between the customer or owner/user and the development team.

Fig 4.5:Use Case Diagram for Admin

MCA@SNIT Page 23
ONLINE LAW SYSTEM

View Law

View Lawyer

View Court

User
View Police

View Criminals

Add Case

Chat

Feedback

Fig 4.6: Use Case Diagram for User

MCA@SNIT Page 24
ONLINE LAW SYSTEM

Fig 4.7: Use Case Diagram for Police

MCA@SNIT Page 25
ONLINE LAW SYSTEM

Fig 4.8:Use Case Diagram for Lawyer

4.6 DATABASE DESIGN


The database design is a logical development in the methods used by the
computers to access and manipulate data stored in the various parts of the computer
systems. Database is defined as an integrated collection of data. The overall
objective in the development of database technology has been to treat data as an
organizational resource and as an integrated whole. The main objectives of
databases are data integrity and data independence.

MCA@SNIT Page 26
ONLINE LAW SYSTEM

A database is a collection of interrelated data stored with minimum redundancy to


serve many users quickly and effectively. The database serves as the repository of
data, so a well-designed database can lead to a better program structure and reduce
procedural complexity. In a database environment, common data are available and
used by several users

Database Management System (DBMS) allow the data to be protected and


organized separately from other resources like hardware, software, and programs.
DBMS is a software package, which contains components that are not found other
data management packages. The significant of DBMS is the separation of data as
seen by the programs and data as stored on the direct access storage devices. That
is the difference between the logical and physical data.

The main objectives covered in database design are:

 Controlled redundancy

 Data independence

 Accuracy and integrity

 Privacy and security

 Performance.

The database tables used in this project are given below.

4.5.1 Table Design

1.LOGIN

Field_name Data_type Size Constraints Description


Email Varchar 20 Primary key Email
Password Varchar 20 Not null Password
Type Varchar 20 Not null Type
Status Varchar 20 Not null Status
Table 4.1:Login table

MCA@SNIT Page 27
ONLINE LAW SYSTEM

2.USER REGISTRATION

Field_name Data_type Size Constraints Description


Email Varchar 20 Primary key Email
Name Varchar 20 Not null Name
Gender Varchar 10 Not null Gender
DOB Date Not null Dob
Reg_date Date Not null Registration date
Phone Big int Not null Phone
Table 4.2:User registration table

3.LAWYER REGISTRATION

Field name Data_type Size Constraints Description


Lawyer_id Int 10 Primary key Lawyer id
Email Varchar 20 Foreign key Email
Court_id Int 10 Foreign key Court id
Name Varchar 20 Not null Name
Place Varchar 20 Not null Place
Phone Big int Not null Phone
Specification Varchar 20 Not null Specification
Qualification Varchar 20 Not null Qualification
Experience Varchar 20 Not null Experience
Password Varchar 20 Not null Password
Table 4.3:Lawyer registration table

4.COURT ENTRY

Field_name Data_type Size Constraints Description


Court Int 10 Primary key Court id
_id
Court _name Varchar 20 Not null Court name
Court_details Varchar 20 Not null Court details
Place Varchar 20 Not null Place
Court_type Varchar 20 Not null Court type
Phone Big int Not null Phone
Table 4.4:Court entry table

MCA@SNIT Page 28
ONLINE LAW SYSTEM

5.LAW ENTRY

Field_name Data_type Size Constarints Description


Section_id Int 10 Primary key Section id
Law_details varchar 20 Not null Law details
Table 4.5:Law entry table

6.POLICE ENTRY

Field_name Data_type Size Constraints Description


Police_id Int 10 Primary key Police id
Email Varchar 20 Not null Email
Station_id Int 10 Foreign_key Station id
Police_name Varchar 20 Not null Police name
Station_authority Varchar 20 Not null Station
authority
Address Varchar 20 Not null Address
Phone Varchar 20 Not null Phone
Password Varchar 20 Not null password
Table 4.6:Police entry table

7.POLICE STATION ENTRY

Field name Data type Size Constraints Description


Station_id Int 10 Primary key Station id
Name Varchar 30 Not null Name
Place Varchar 30 Not null Place
Station head Varchar 30 Not null Station head
Address Varchar 30 Not null Address
Phone Big int Not null Phone
Email Varchar 30 Not null Email
Table 4.7:Police station table

8.ADD COMPLAINT

Field name Data type Size Constraints Description


Station_id Int 10 Foreign_key Station id
Complaint_type varchar 30 Not null Complaint
type
Complaint varchar 30 Not null Complaint
Email varchar 30 Not null email
Status varchar 10 Not null status
Report varchar 30 Not null report
Phone Big int Not null phone
Table 4.8:Add compliant table

MCA@SNIT Page 29
ONLINE LAW SYSTEM

9.CRIME TYPE

Field_name Data type Size Constraints Description


Crime_id Int 10 Primary key Crime id
Crime_type Varchar 30 Not null Crime type
About Varchar 30 Not null About
Department Varchar 30 Not null department
Crime_rate Varchar 30 Not null Crime type
Date Date Not null Date
Time Time Not null Time
Table 4.9:Crime type table

10.CRIMINAL

Field_name Data type Size Constraints Description


Criminal_id Int 10 Primary key Criminal id
Station_id Int 10 Foreign_key Station id
Name Varchar 30 Not null Name
Address varchar 30 Not null Address
Identification varchar 30 Not null identification
Crime_type varchar 30 Not null Crime type
Table 4.10:Criminal table

11.FEEDBACK

Field_name Datatype Size Constraints Descripition


Name Varchar 30 Not null Name
Feedback Varchar 30 Not null Feedback
Date Date Not null Date
Time Time Not null Time
Email Varchar 30 Not null Email
Replay Varchar 30 Not null Replay
Table 4.11:Feedback table

MCA@SNIT Page 30
ONLINE LAW SYSTEM

CHAPTER 5
SYSTEM TESTING
5.1 INTRODUCTION

In any software development, testing is a process to show the correctness of the program and
it meets the design specifications. Testing is needed to prove correctness, to show
completeness, to improve the quality of the software and to provide the maintenance aid.
Some testing standards are therefore necessary to ensure completeness of testing, improve the
quality of the software, and reduce the testing costs and to reduce study needs and operation
time. Testing software extends throughout the coding phase and it represents the ultimate
review of configurations, design and coding. A series of test cases are created that are
intended to demolish the software that has been built.

Based on the way the software reacts to these tests, we can decide whether the configuration
that has been built is study or not. It is essential that all components of an application be
tested, as the failure to do so many result in a series of bugs after the software is put to use.
Several methods of testing exist in software Engineering, which enable a programmer to
make sure that the configuration built is free of bugs.

5.2 TESTING PROCESS

For any software that is newly developed, first and foremost preference is given to the
testing of the system. It is developer‘s last chance to detect and correct the errors. That may
occur possibly in the software. The programmers will generate a set of test data, which will
give the maximum possibility of finding all most all types of errors that can occur in the
system.

5.2.1 Unit Testing

The primary goal of unit testing is to take the smallest piece of testable software in the
application, isolate it from the remainder of the code, and determine whether it behaves
exactly as you expect. Each unit is tested separately before integrating them into modules to
test the interfaces between the modules. Unit testing has proven its value in that a large
percentage of defects are identified during its use.

MCA@SNIT Page 31
ONLINE LAW SYSTEM

The most common approach to unit testing requires drivers and stubs to be written. The
driver simulates a calling unit and the stub simulates a called unit. The investment of
developer time in this activity sometimes results in demoting unit testing to a lower level of
priority and that is almost always a mistake. Even though the drivers and stubs cost time and
money, unit testing provides some undeniable advantages. It allows for automation of the
testing process, reduces difficulties of discovering errors contained in more complex pieces
of the application, and test coverage is often enhanced because attention is given to each unit.

5.2.2 Integration Testing

Integration testing (sometimes called Integration and Testing, abbreviated as ―I&T‖) is the
phase in software testing in which individual software modules are combined and tested as a
group. It occurs after unit testing and before system testing. Integration testing takes place as
its input modules that have been unit tested, groups them in larger aggregates, applies tests
defined in an integration test plan to those aggregates, and delivers as its output the integrated
system ready for system testing.

The purpose of integration testing is to verify functional, performance, and reliability


requirements placed on major design items. These ―design items‖ i .e. assemblages (or
groups of units) are exercised through their interfaces using Black box testing, success and
error cases being simulated via appropriate parameter and data inputs. Simulated usage of
shared data areas and inter-process communication is tested and individual subsystems are
exercised through their input interface. Test cases are constructed to test that all components
within assemblages interact correctly, for example across procedure calls or process
activations, and this is done after testing individual modules, i.e. unit testing. The overall idea
is a ―building block‖ approach, in which verified assemblages are added to a verified base
which is then used to support the integration testing of further assemblages.

5.2.3 Validation Testing

Data validation is the process of testing the accuracy of data. A set of rule we can apply to a
control to specify the type and range of data that can enter. It can be used to display error
alert when users enter incorrect values in to a form. Now performing validation testing in
system Centralized Social Welfare by undergoing validation for each tools and the validation
succeeded when the software function in a manner that can be reasonably accepted, by the
user.

MCA@SNIT Page 32
ONLINE LAW SYSTEM

5.2.4 User Acceptance Testing

User acceptance of a system is a key factor for the success of any system. The system under
consideration is tested for the user acceptance by constantly, keeping in touch with the
prospective system user at the time of developing and making changes whenever required.

5.3 TESTING STRATERGIES

5.3.1. Top-Down Testing

Top-Down Testing tests the higher levels of a system before testing its detailed components.
The program is represented as a single abstract component with sub components represented
by stubs. Stubs have the same interface as the components but very limits functionally. After
the top-level component has been tested, its sub-components are implemented and tested in
the same way. This process continues recursively until the bottom level components are
implemented. The whole system may then be completely tested.

5.3. 2. Bottom-Up Testing

Bottom-Up Testing is the converse of Top-Down Testing. It involves testing the modules at
the lower levels of the hierarchy and then working up the hierarchy of the modules until the
final module is tested. The advantage of bottom-up testing is the disadvantage of topdown
testing and vice versa. When using bottom-up testing test drivers must be written to exercise
the lower level components. These test drivers simulate the components environment and are
valuable components; the test drivers and test data should be distributed with the component.
Potential re-users can then run these tests to satisfy themselves that the component behaves as
expected in their environment.

5.3.3. Black Box testing

Knowing the specified function that a product has been designed to perform, test can be
conducted that demonstrates each function that is fully operational, at the same time
searching for errors in each function. Black Box testing focuses on functional requirement of
the software. Black Box testing attempts to find out errors in the following categories.

 Incorrect or missing functions


 Interface errors
 Errors in data structures or external database access.

MCA@SNIT Page 33
ONLINE LAW SYSTEM

 Performance and errors


 Initialization and termination errors

5.3.4. White Box Testing

Knowing the internal working of a product test can be conducted to ensure that ―all gears
mesh‖ that is internal operation performs according to specification and all internal
components have been adequately exercised. Using white box testing methods, the software
engineer can derive test cases that

Guarantee that all independent paths within a module have been exercised at least once
basis path testing.

Exercise all logical decisions on their true and false sides- Condition testing.

xecute all loops at their boundaries and within their operation bounds- Loop testing.

Exercise internal data structures to assure their validity-data flow testing.

5.4 TEST CASES

Sl.No Test Case Test Precondition Expect Passe


Procedure ed d/
Result Faile
d
Login Page To check Enter a valid user The control
Yes
whether name and should go
1 the control password on the to the home
from the login login screen page
screen goes to
the main
menu.

MCA@SNIT Page 34
ONLINE LAW SYSTEM

2 User To check Select The control


Registratio whether the registration from should go
n control goes the home page to
to the registration Yes
registration page
scree when the
user select the
registration
from
homepage
3 Add Rules To check Select add add The control
whether the rules from admin should go
control goes page to add rules Yes
to add rules page
screen when
the admin
select the add
Rules from
adminhome
page

MCA@SNIT Page 35
ONLINE LAW SYSTEM

4 Add To check whether Select complaint The yes


Complai the control goes to form from user control
nts the complaint screen page should go
when the user select to
the exhibition from complaint
the user page form
5 Uploading To check whether the Display the Report is yes
Image
image size matches preffered size of submitted.
the preffered size the image

6 Confirmation To check whether Display a Successfull Yes


of password
the password and password does y change
confirmation not match the
password are message password.
correct.

MCA@SNIT Page 36
ONLINE LAW SYSTEM

7 File Upload To check Display please The file Yes


whether the select a file to be should be
file choosen is uplaoded updated
uploaded when successfull
the user select y
the submit
button
8 Title for file To check Display enter file Display the Yes
upload
whether the title title
title of file is
entered or not

9 Email To check Display alert Successfull Yes


validation
whether the message to enter y registered
email is valid the correct email
or not

10 Phone number To check Display alert Successfull Yes


validation
whether the message to enter y registered
number of digit the correct phone
in the phone number
number is 10
Checking user To check Invalid Successfull Yes
11 Type
whether the username/passw y registered
user is ord
admin,lawyer,p
olice,user

MCA@SNIT Page 37
ONLINE LAW SYSTEM

CHAPTER 6
SYSTEM IMPLEMENTATION
6.1 INTRODUCTION

The final and important phase in the system life cycle is the implementation of the new
system. The term implementation has different meanings ranging from the conversion of
a basic application to a complete replacement of a computer system. The procedure
however, is virtually the same. Implementation includes all those activities that take place
to convert from old system to new. The new system may be totally new replacing existing
system, manual or automated, or it may be a major modification to an existing system.

The method of implementation and time scale to be adopted is found out initially. Next
the system is tested properly and at the same time users are trained in the new procedure.
Proper implementation is essential to provide a reliable system to meet organization
requirements. Successful implementation may not guarantee improvement in the
organization using the new system, but it will prevent improper installation.

The implementation involves following things:

Careful planning.

Investigation of the system considerations.

Design the method to achieve the changeover.

Evaluation of change over method.

Implementation of a new system requires the operating staff installing the software and
creating computer files. There are many ways in which this can be achieved. The most
common methods are the following.

Direct change over

Parallel running

MCA@SNIT Page 38
ONLINE LAW SYSTEM

Pilot running change over The creation of the designed system takes place in the
implementation phase.

This phase activities do the following:

Development of phase overview

Preparing for implementation

Computer program development

Development phase report and overview

It also performs activities like writing, testing, debugging and documenting the programs.

There are three types of implementations:

Implementation of a computer system to replace a manual system. The problems


encountered are converting files, training users, creating accurate files and verifying
printouts for integrity.

Implementation of a new computer system to replace an existing one. This is usually a


difficult conversion. If not properly planned, there can be many problems. Some large
computer systems have taken as long as a year to convert.

Implementation of a modified application to replace the existing one, using the same
computer. This type of conversion is relatively easy to handle, provided there are no
major changes in the files. Every system requires periodic evaluation after
implementation.

This is to review the performance of the system and to evaluate against established
standard or criteria. A study is conducted for measuring the performance of the system
against predefined requirements. This study results a post-implementation review that
determines how well the system continues to meet the performance specification.

MCA@SNIT Page 39
ONLINE LAW SYSTEM

CHAPTER 7
CONCLUSION

The Software developed is found to be working efficiently and effectively. It


results in regular and timely action against crime reported. It can be observed that the
information can be obtained easily and accurately. The Software is made user friendly
to the maximum so that any lay man can run the software provided he could access to
the system via the login password. It believes that partnership work is highly beneficial
to the organization and that partnership work is the way forward to reduce crime and
disorder.

Hence, we wish to remind that its culture should fully endorse


partnership work, we urge to ensure the attention they require. Using PHP and MySQL
SERVER the system was developed and tested with all possible samples of data . As a
whole , the system was well planned and designed . The data entry screen fully menu
driven making the data entry easy. This make interface user friendly.

MCA@SNIT Page 40
ONLINE LAW SYSTEM

CHAPTER 8
FUTURE ENHANCEMENTS
Enhancement means adding, modifying or developing the code to support the changes in
the specification. It is the process of adding new capabilities such as report, new interface
without other system and new features such as better screen or report layout.

Every module in the system is being developed carefully such that the future
enhancements do not affect the basic performance of the system. In future we can add
links or services to the system very easily.

Moreover, due to limited time allotted for the project, there are features, which
I couldn’t implement. Thus the system offers the scope of future enhancement.

As this software is reliable to use, any modification in accordance with the


necessity of the users can be done for the future use. Any additional feature can be
implemented very easily. So what we call this software also a user friendly.

MCA@SNIT Page 41
ONLINE LAW SYSTEM

CHAPTER 9

APPENDIX
9.1 SCREENSHOTS

HOME PAGE

Fig 9.1 Home page

MCA@SNIT Page 42
ONLINE LAW SYSTEM

LOGIN PAGE

Fig 9.2 Login page

ADMIN HOME

Fig 9.3Admin Home

MCA@SNIT Page 43
ONLINE LAW SYSTEM

USER HOME

Fig 9.4 User Home

MCA@SNIT Page 44
ONLINE LAW SYSTEM

CHAPTER 10
PROGRAM CODE

10.1 ADD LAWYER

Add Lawyer.php

<?php

session_start();

?>

<!DOCTYPE html>

<html>

<head>

<title>Law System</title>

<meta name="viewport" content="width=device-width, initial-scale=1">

<meta http-equiv="Content-Type" content="text/html; charset=utf-8" />

<meta name="keywords" content="Law Responsive web template, Bootstrap Web


Templates, Flat Web Templates, Android Compatible web template,

Smartphone Compatible web template, free webdesigns for Nokia, Samsung, LG,
SonyEricsson, Motorola web design" />

<link href="css/style4.css" rel='stylesheet' type='text/css' />

<script type="application/x-javascript">addEventListener("load", function() {


setTimeout(hideURLbar, 0); }, false); function hideURLbar(){ window.scrollTo(0,1); }
</script>

<link href="css/bootstrap.css" rel='stylesheet' type='text/css' />

<link href="css/style.css" rel='stylesheet' type='text/css' />

MCA@SNIT Page 45
ONLINE LAW SYSTEM

<link
href='//fonts.googleapis.com/css?family=Open+Sans:300italic,400italic,600italic,400,300
,600,700|Six+Caps' rel='stylesheet' type='text/css' />

<link rel="stylesheet" href="css/flexslider.css" type="text/css" media="screen" />

<script src="js/jquery.min.js"></script>

<script type="text/javascript" src="js/bootstrap.js"></script>

</head>

<body>

<!--header-top-starts-->

<div class="header-top">

<div class="container">

<center><h1><font face="Bleeding Cowboys" color="brown" size="30">ONLINE


LAW SYSTEM </font></h1></center>

<div class="hea-rgt">

</div>

<div class="hea-rgt">

<!--<a href="register_form.html">Sign Up</a>-->

</div>

<div class="hea-rgt">

<a href="logout.php">Logout</a>

</div>

<!--<div class="hea-rgt">

<a href="login.html">Logout</a>

</div>-->

MCA@SNIT Page 46
ONLINE LAW SYSTEM

<div class="navigation">

<nav class="navbar navbar-default" role="navigation">

<div class="navbar-header">

<button type="button" class="navbar-toggle" data-toggle="collapse" data-target="#bs-


example-navbar-collapse-1">

<span class="sr-only">Toggle navigation</span>

<span class="icon-bar"></span>

<span class="icon-bar"></span>

<span class="icon-bar"></span>

</button>

</div>

<!--/.navbar-header-->

<div class="collapse navbar-collapse" id="bs-example-navbar-collapse-1">

<ul class="nav navbar-nav">

<li class="active"><a href="http://localhost/law/web/adminhome.php">Home</a></li>

<li><a href="http://localhost/law/web/law.php">Add Laws</a></li>

<li><a href="http://localhost/law/web/addlawyer.php">Add Lawyers</a></li>

<li><a href="http://localhost/law/web/addcourt.php">Add Courts</a></li>

<li><a href="http://localhost/law/web/police.php">Add Police</a></li>

<li><a href="http://localhost/law/web/policestatn.php">Add Police Station</a></li>

<li><a href="http://localhost/law/web/adminview_feedback.php">Feedback</a><li>

</ul>

</div>

<!--/.navbar-collapse-->

MCA@SNIT Page 47
ONLINE LAW SYSTEM

</nav>

</div>

<div class="clearfix"></div>

</div>

</div>

<!--header-top-end-->

<!--start-header-->

<div class="header">

<div class="container">

<div class="head">

<div class="soc">

<ul>

<li><a href="#"><span class="fb"></span></a></li>

<li><a href="#"><span class="twit"></span></a></li>

<li><a href="#"><span class="pin"></span></a></li>

<li><a href="#"><span class="rss"></span></a></li>

<li><a href="#"><span class="drbl"></span></a></li>

<div class="clearfix"></div>

</ul>

</div>

<div>

<div style=" float: left;">

</div>

<div style=" float: right;">

MCA@SNIT Page 48
ONLINE LAW SYSTEM

<?php

// session_start();

$y=$_SESSION['email'];

$x=$_SESSION['type'];

echo "Welcome &nbsp $y!!!!";

echo "<br>";

// echo "Type=$x";

// echo "<a href="index.html">Home</a>";

?>

</div>

</div>

<div class="header-right">

<div class="clearfix"></div>

</div>

</div>

</div>

<!-- script-for-menu -->

<!-- script-for-menu -->

<script>

$("span.menu").click(function(){

$(" ul.navig").slideToggle("slow" , function(){

});

MCA@SNIT Page 49
ONLINE LAW SYSTEM

});

</script>

<!-- script-for-menu -->

<!-- banner-starts -->

<div class="banner">

<div class="container">

<div class="banner-top">

<section class="slider">

<div class="flexslider">

<ul class="slides">

<li>

<div class="banner-text">

<h2>“We offer Our clients an expert legal Advice”</h2>

<p>There is a rise in the amount of crime in our country and most of the people are
unaware of the criminal laws under IPC (Indian Penal Code).</p>

</div>

</li>

<li>

<div class="banner-text">

<h2>“All are Equal before Law”</h2>

<p>When a Law is unjust , it is only right to Disobey.._Mahatma Gandhi</p>

</div>

<li>

<div class="banner-text">

MCA@SNIT Page 50
ONLINE LAW SYSTEM

<h2>“You have Rights , We Protect Them”</h2>

<p>A Good Lawyer knows the Law..

A Great Lawyer Knows the Judge..</p>

</div>

</li>

</ul>

</div>

</section>

<!-- FlexSlider -->

<script defer="" src="js/jquery.flexslider.js"></script>

<script type="text/javascript">

$(function(){

});

$(window).load(function(){

$('.flexslider').flexslider({

animation: "slide",

start: function(slider){

$('body').removeClass('loading');

});

});

</script>

<!-- FlexSlider -->

</div>

MCA@SNIT Page 51
ONLINE LAW SYSTEM

</div>

</div>

<?php

if(isset($_GET['id']))

$id=$_GET['id'];

mysql_connect("localhost","root","");

mysql_select_db("law");

$qry=mysql_query("select * from add_lawyer where lawyer_id='$id'");

while ($row=mysql_fetch_row($qry))

?>

<form action="lawyeredit.php" enctype="multipart/form-data" method="POST">

<div class="main-grid">

<div class="agile-grids">

<!-- validation -->

<div class="grids">

<div class="progressbar-heading grids-heading">

<h2></h2>

</div>

<div class="forms-grids">

<div class="forms3" >

<div class="w3agile-validation w3ls-validation">

<div class="panel panel-widget agile-validation register-form">

MCA@SNIT Page 52
ONLINE LAW SYSTEM

<div class="validation-grids widget-shadow" data-example-id="basic-forms">

<div class="form-group valid-form">

<input type="text" value="<?php echo $row[0];?>" class="form-control"


id="inputName" name="id" placeholder="court id" required="">

</div>

<div class="form-group valid-form">

<input type="text" value="<?php echo $row[1];?>" class="form-control"


id="inputName" name="cid" placeholder="court id" required="">

</div>

<div class="form-group valid-form">

<input type="text" value="<?php echo $row[2];?>" class="form-control"


id="inputName" name="cname" placeholder="court name" required="">

</div>

<div class="form-group valid-form">

<input type="text" value="<?php echo $row[3];?>" class="form-control"


id="inputName" name="ctype" placeholder="court type" required="">

</div>

<div class="form-group valid-form">

<input type="text" value="<?php echo $row[4];?>" class="form-control"


id="inputName" name="place" placeholder="place" required="">

</div>

<div class="form-group valid-form">

<input type="text" value="<?php echo $row[5];?>" class="form-control"


id="inputName" name="email" placeholder="example@gmail.com" required="">

</div>

<div class="form-group valid-form">

MCA@SNIT Page 53
ONLINE LAW SYSTEM

<input type="text" value="<?php echo $row[6];?>" class="form-control"


id="inputName" name="pwd" placeholder="Password" required="">

</div>

<div class="form-group valid-form">

<input type="text" value="<?php echo $row[7];?>" class="form-control"


id="inputName" name="name" placeholder="name" required="">

</div>

<div class="form-group valid-form">

<input type="text" value="<?php echo $row[8];?>" class="form-control"


id="inputName" name="phno" placeholder="phone number" required="">

</div>

<div class="form-group valid-form">

<imgsrc="<?php echo $row[9];?>" width="150px" height="150px">

</div>

<div class="form-group valid-form">

Upload Lawyer image

<input type="file" name="pic" accept="image/*">

</div>

<div class="form-group valid-form">

<input type="text" value="<?php echo $row[10];?>" class="form-control"


id="inputName" name="spec" placeholder="specification" required="">

</div>

<div class="form-group valid-form">

<input type="text" value="<?php echo $row[11];?>" class="form-control"


id="inputName" name="qua" placeholder="qualification" required="">

MCA@SNIT Page 54
ONLINE LAW SYSTEM

</div>

<div class="form-group valid-form">

<input type="text" value="<?php echo $row[12];?>" class="form-control"


id="inputName" name="exp" placeholder="experience" required="">

</div>

<div class="form-group">

<button type="submit">Submit</button>

</div>

</form>

<?php

else

?>

<form action="lawyer.php" enctype="multipart/form-data" method="POST">

<div class="main-grid">

<div class="agile-grids">

<!-- validation -->

<div class="grids">

<div class="progressbar-heading grids-heading">

<h2></h2>

</div>

<div class="forms-grids">

MCA@SNIT Page 55
ONLINE LAW SYSTEM

<div class="forms3" >

<div class="w3agile-validation w3ls-validation">

<div class="panel panel-widget agile-validation register-form">

<div class="validation-grids widget-shadow" data-example-id="basic-forms">

<div class="form-group valid-form">

Court ID

<select name="cid">

<option>Others</option>

<?php

mysql_connect("localhost","root","");

mysql_select_db("law");

$q="select court_name,court_id from add_court";

$t=mysql_query($q);

while($r=mysql_fetch_row($t))

?>

<option value="<?php echo $r[1];?>"><?php echo $r[0]."(".$r[1].")";?></option>

<?php

?>

</select>

</div>

<div class="form-group valid-form">

Court Name

MCA@SNIT Page 56
ONLINE LAW SYSTEM

<select name="cname">

<option>-----Select-----</option>

<option>DISTRICT & SESSIONS COURT</option>

<option>Ist ADDL.DISTRICT & SESSIONS COURT</option>

<option>2nd ADDL.DISTRICT&SESSIONS/MACT COURT</option>

<option>WAKF TRIBUNAL/111rd ADDL.DISTRICT&SESSIONS COURT</option>

<option>MOTOR ACCIDENTS CLAIMS TRIBUNAL</option>

<option>FAMILY COURT</option>

<option>MOTOR ACCIDENTS CLAIMS TRIBUNAL</option>

<option>PRINCIPAL SUB COURT</option>

<option>ADDITIONAL SUB COURT</option>

<option>SUB COURT</option>

<option>PRINCIPAL MUNSIFF COURT</option>

<option>ADDITIONAL MUNSIFF COURT</option>

<option>MUNSIFF'S COURT</option>

<option>MUNSIFF'S COURT</option>

<option>MUNSIFF'S COURT</option>

<option>MUNSIFF-MAGAISTRATE COURT</option>

<option>MUNSIFF-MAGISTRATE COURT</option>

<option>CHIEF JUDICIAL MAGISTRATE COURT</option>

<option>JUDICIAL IST CLASS MAGAISTRATE COURT I</option>

<option>JUDICIAL IST CLASS MAGISTRATE COURT(FOREST)II</option>

<option>JUDICIAL IST CLASS MAGISTRATE COURT III</option>

<option>THE DISTRICT REGISTRAR</option>

MCA@SNIT Page 57
ONLINE LAW SYSTEM

<option>THE SUB DIVISIONAL MAGISTRATE COURT</option>

<option>ADDL.DISTRICT & SESSIONS (ADHOC I) COURT</option>

<option>ADDL.DISTRICT & SESSIONS (ADHOC II) COURT</option>

<option>ADDL.DISTRICT & SESSIONS (ADHOC III) COURT</option>

<option>ADDL. SESSIONS JUDGE (ABLARI CASES)</option>

<option>ADDL.DISTRICT & SESSIONS (ADHOC II) COURT</option>

</select>

</div>

<div class="form-group valid-form">

Court Type

<select name="ctype">

<option>---Select---</option>

<option>All</option>

<option>Revenue</option>

<option>Village</option>

<option>Family</option>

<option>Motor accidents</option>

<option>JFMC</option>

<option>Railway</option>

<option>Petty</option>

</select>

</div>

<div class="form-group valid-form">

MCA@SNIT Page 58
ONLINE LAW SYSTEM

<input type="text" class="form-control" id="inputName" name="name"


placeholder="name" required="">

</div>

<div class="form-group valid-form">

<input type="text" class="form-control" id="inputName" name="email"


placeholder="example@gmail.com" required="">

</div>

<div class="form-group valid-form">

<input type="text" class="form-control" id="inputName" name="pwd"


placeholder="Password" required="">

</div>

<div class="form-group valid-form">

<input type="text" class="form-control" id="inputName" name="place"


placeholder="place" required="">

</div>

<div class="form-group valid-form">

<input type="text" class="form-control" id="inputName" name="phno"


placeholder="phone number" required="">

</div>

<div class="form-group valid-form">

Upload Lawyer image

<input type="file" name="pic" accept="image/*">

</div>

<div class="form-group valid-form">

<input type="text" class="form-control" id="inputName" name="spec"


placeholder="specification" required="">

MCA@SNIT Page 59
ONLINE LAW SYSTEM

</div>

<div class="form-group valid-form">

<input type="text" class="form-control" id="inputName" name="qua"


placeholder="qualification" required="">

</div>

<div class="form-group valid-form">

<input type="text" class="form-control" id="inputName" name="exp"


placeholder="experience" required="">

</div>

<div class="form-group">

<button type="submit">Submit</button>

<button type="submit"><a href="lawyer2.php">View</a></button>

</div>

</form>

<?php

?>

</div>

</div>

</div>

<!-- footer-end -->

</body>

</html>

MCA@SNIT Page 60
ONLINE LAW SYSTEM

BIBLIOGRAPHY

BOOKS:

 Tomorrow's Lawyers: An Introduction to Your Future by


Richard Susskind.
 Nani Palkhivala: The Courtroom Genius by Soli J Sorabjee and
Arvind P Datar. Indian Evidence Act
 Indian Evidence Act Book by James Fitzjames Stephen

WEBSITES:

 Kerala Law Times Journal


 Indian Law Reporter
 http://kollam.nic.in

 http://advocatesofkerala.com

 http://indian_penal_code.com

 http://ecourts.gov.in

 http://kollamrural.keralapolice.gov.in

MCA@SNIT Page 61
ONLINE LAW SYSTEM

MCA@SNIT Page 62

You might also like