You are on page 1of 56

ONLINE PET SHOP

A Project Report

Submitted in partial fulfillment of the


requirements for the award of the Degree of
BACHELOR OF SCIENCE (INFORMATION TECHNOLOGY)
By

KIRAN PATIL
Seat Number: _______________
Seat Number: _______________
Under the esteemed guidance of

PROF. SHWETA SUMAN


CO-Ordinator of Department of Information Technology

DEPARTMENT OF INFORMATION TECHNOLOGY

VALIA COLLEGE OF INFORMATION TECHNOLOGY


(Affiliated to University of Mumbai)
MUMBAI, 400 037
MAHARASHTRA
2019- 2020

1
VALIA COLLEGE OF INFORMATION TECHNOLOGY
(Affiliated to University of Mumbai)
MUMBAI-MAHARASHTRA-400037
DEPARTMENT OF INFORMATION TECHNOLOGY

CERTIFICATE
This is to certify that the project entitled, "ONLINE PET SHOP”, is bonafied work of
KIRAN PATIL bearing Seat No: __________________ submitted in partial fulfilment of
the requirements for the award
of degree of BACHELOR OF SCIENCE in INFORMATION TECHNOLOGY from
University of Mumbai.

Internal Guide Coordinator

Internal Examiner External Examiner

Date: College Seal Principal


ABSTRACT
The main aim of this software program is to provide easy services to create a report for
NAAC. This software provides a standard format for the report and minimizes the work load
of the Institute. VALIA COLLEGE creates a Report every year for NAAC Credentials. It
becomes difficult to collect data from different faculties for different criteria. Thus, some fills
the report in different format. There came a need of having a program which takes data and
brings out a standard format of the Report. This website is created with the help of ASP.NET
and SQL SERVER to make it look more interactive with customers. This interactive page
helps us in getting details for the report dynamically. The project is an attempt to minimize
human efforts by giving better UI and generating report with less efforts for the user. Its main
aim is to become digital, it is an attempt to go with the trend by making the software and
provide better facilities with less work, reduce time and effort.
ACKNOWLEDGEMENT
It is a great pleasure and a moment of immense satisfaction for us to express our profound
gratitude to my project guide Prof. SHWTA SUMAN Asst. Professor, Information
Technology whose constant encouragement enabled us to work enthusiastically. Her
perpetual motivation, patience and expertise in discussion during progress of work have
benefited me to an extent, which is beyond expression. Working under her guidance has been
a fruitful and unforgettable experience. Despite of her busy schedule, she was always
available to give us advise, support and guidance during entire period of my project. The
completion of this project would not have been possible without her constant support and
patience guidance.

We are thankful to Prof. SHWETA SUMAN Co-ordinator, Department of Information


Technology of Valia C.L. College, Mumbai University for her encouragement, guidance and
support for our project.

We are thankful to Prof. SHOBHA MENON Principal, Institute of Information Technology


of Valia C.L. College for his encouragement and providing outstanding academic
environment.
DECLARATION
We hereby declare that the project entitled, “ONLINE PET SHOP ” done at Valia college of
Information Technology, has not been in any case duplicated to submit to any other
universities for the award of any degree. To the best of my knowledge other than me, no one
has submitted to any other university.

The project is done in partial fulfillment of the requirements for the award of degree of
BACHELOR OF SCIENCE (INFORMATION TECHNOLOGY) to be submitted as final
semester project as part of our curriculum.

Name and Signature of the Students


TABLE OF CONTENTS
Sr. No. Topic Page. No.
Chapter 1: INTRODUCTION 1
1.1 Background 1
1.2 Objectives 2
1.3 Purpose, Scope, Applicability (Feasibility Study) 3
1.4 Achievements (If any) 6
Chapter 2: SURVEY OF TECHNOLOGIES
(Technical Feasibility) 7

Chapter 3: REQUIREMENTS AND ANALYSIS 10


3.1 Problem Definition 10
3.2 Requirements Specification 11
3.3 Planning and Scheduling (SDLC Model, Gantt Chart) 12
3.4 Software and Hardware Requirements (Minimum) 16
3.5 Preliminary Product Description 17
Chapter 4: SYSTEM DESIGN 18
4.1 Basic Modules 19
4.2 Data Design (Table Design) 20
4.2.1 Schema Design 29
4.2.2 Data Integrity and Constraints 30
Object Oriented Procedural Embedded/ IoT
31
4.3 Design Oriented Design
4.3.1 E-R Diagram E-R Diagram Block Diagram 32
Data Flow Data Flow
36
4.3.2 Class Diagram Diagram Diagram
4.3.3 Sequence Diagram Sequence Diagram Sequence Diagram 38
4.3.4 Activity Diagram Activity Diagram Activity Diagram 40
Component Component Component
42
4.3.5 Diagram Diagram Diagram
Data Flow Data Flow Data Flow
45
4.3.6 Diagram Diagram Diagram
User Interface User Interface
46
4.3.7 Design Design User Interface
4.3.8 Security Issues Security Issues Security Issues 47
References/ Bibliography/ Websites Used 48
LIST OF TABLES
Table 1: Data of institution......................................................................................................20
Table 2:Criterion1_Curricular Aspects....................................................................................21
Table 3: Criterion 2_Teaching-Learning and Evaluation........................................................23
Table 4Criterion 3_Research, Innovation and Extension........................................................ 25
Table 5: Criterion 5_Student Support and Progression........................................................... 27
List of Figures
Figure 1: Schema Diagram...................................................................................................... 29
Figure 2: Entity Relationship Diagram....................................................................................35
Figure 3: Class Diagram.......................................................................................................... 37
Figure 4: Sequence Diagram....................................................................................................39
Figure 5: Activity Diagram......................................................................................................41
Figure 6: Component Diagram................................................................................................ 44
Figure 7: Data Flow Diagram.................................................................................................. 45
CHAPTER 1
1.1 INTRODUCTION

People are using Technology and applications to get their work done , which makes their

lives easier. Daily expense tracker system application serves the important purpose of

managing daily expenses which is very important part of one’s life.

The application is not much user intensive but just comprises of having them enter the

Expense amount , date ,category .

The aim of this is to provide a solution to manage and keeping track of daily
expenses

1.2 OBJECTIVES

2
1.3 PURPOSE, SCOPE AND APPLICABILITY
1.3.1 PURPOSE

• The Purpose of this project is to solve the difficulty faced by the Institute.
• The information filled was not in an improper format.
• The information collected by different faculty was in different format.
• So, thus a proper standard to have a systematic and good format.
• Information collection and understanding becomes was difficult.
• Thus, the information is filled using software becomes easy, and less time consuming.
• After completion of all criteria’s a standard and systematic format of Report is
generated.
• The look of the Report is good.
• The time is reduced for bring the information into standard format the work that
doubled will be reduced.
• The software fulfils the requirements of the Institute to generate NAAC Report.
1.3.2 SCOPE

Institutions need to submit their proposals six to eight months in advance of the scheduled
dates for organising the seminar so as to be considered in the Seminar committee meetings of
NAAC scheduled to be held in December and June every year. The release of grants will be
only on completion of the event and submission of the bills in original within one month of
organising the event. In pursuance of its Action Plan for performance evaluation, assessment
& accreditation & quality up-gradation of institutions of higher education, NAAC proposes
that every accredited institution should establish an Internal Quality Assurance Cell (IQAC)
as a post-accreditation quality sustenance measure. Since quality enhancement is a
continuous process, the IQAC will become a part of the institution’s system & work towards
realisation of the goals of quality enhancement & sustenance. The prime task of the IQAC is
to develop a system for conscious, consistent & catalytic improvement in the overall
performance of institutions. For this, during the post-accreditation period, it will channelize
all efforts & measures of the institution towards promoting its holistic academic excellence.

3
The Issues for NAAC Report Generation-
• The Information is not in a standard format.
• The time taken to bring the information in standard format is more.
• The work comparatively doubles.
• Creating fields then entering data for the individual becomes heavy and boring.
• Re-analysing the data works double.
• Correction becomes difficult.
• Hardcopy work is more.
• Data is located in one pc and cannot be accessed from anywhere to make changes.
• This all are the issues related to the current work system.

The functions of the new proposed system are:

• Development and application of quality benchmarks/parameters for various academic


and administrative activities of the institution
• Facilitating the creation of a learner-centric environment conducive to quality
education and faculty maturation to adopt the required knowledge and technology for
participatory teaching and learning process through the software becomes easy.
• Arrangement for feedback response from students, parents and other stakeholders on
quality-related institutional processes this information is filled in software very easily
and reduced time.
• Dissemination of information on various quality parameters of higher education are
filled concisely.
• Organization of inter and intra institutional workshops, seminars on quality related
themes and promotion of quality circles all this functions information is stored
correctly.
• Documentation of the various programmes/activities leading to quality improvement
is done using software.
• Acting as a nodal agency of the Institution for coordinating quality-related activities,
including adoption and dissemination of best practices records are maintained for the
Institute.
• Development and maintenance of institutional database through MIS for the purpose
of maintaining/enhancing the institutional quality.

4
• Development of Quality Culture in the institution
• Preparation of the Annual Quality Assurance Report (AQAR) as per guidelines and
parameters of NAAC, to be submitted to NAAC is the function of the software.
• Data is entered using GUI of the software and data is stored in the Institutional
database then final Report is generated per Year for the Institute.

1.3.3 APPLICABILITY:

NAAC REPORT GENERATION FOR THE COLLEGE will facilitate/contribute:


• Ensure heightened level of clarity and focus in institutional functioning towards
quality enhancement using the software.
• Ensure internalization of the quality culture from the software
• Ensure enhancement and coordination among various activities of the institution and
institutionalize all good practices
• Provide a sound basis for decision-making to improve institutional functioning and
enhances the performance of the Institute.
• Act as a dynamic system for quality changes in the system.
• Build an organised methodology of documentation and internal communication of the
Institute to generate Reports for the Institute.
• Application software is a type of computer program that performs a specific personal,
educational, and business function. Each program is designed to assist the user with a
particular process, which may be related to productivity, creativity, and/or
communication.
Application software programs are created to facilitate a variety of functions, including but
not limited to:

• Managing information
• Manipulating data
• Constructing visuals
• Coordinating resources
• Calculating figures

5
1.4 ACHIEVEMENTS:

The achievements related to this project are:

• The functioning of the Institute became easy for generating NAAC Reports.
• The Institutes work minimizes doubled work is reduced.
• The time taken to generate one NAAC report is reduced.
• Look and feel of the GUI maintains user stability.
• Organisational goal will be achieved.
• This software will be helpful for all the colleges to generate their NAAC Reports
easily and conveniently.
• This software makes a standard format for the NAAC to generate a standard report
which will be easy for the institute to make reports yearly.
• This software will simplify the tasks of the faculties to access and enhance this field
of IT.
• This project is partially completed.

6
CHAPTER 2
SURVEY OF TECHNOLOGIES
The technology chosen for the project are:

ASP.Net (ACTIVE SERVER PAGES) Technology

SQL Server (STRUCTURED QUERY LANGUAGE) Database

ASP.NET is an open-source server-side web application framework designed for web


development to produce dynamic web pages. It was developed by Microsoft to allow
programmers to build dynamic web sites, web applications and web services.

ASP_NET is a technology which is used for both Front-end & Back-end development in the
software industry.

Front-end: ASP_NET provide large set of controls with .NET framework for Front-end of
any Web App or Website. (like, Grid View, Repeater, Data List, Dropdown control…etc.)

Back-end: It also has lot of on back-end side with VB and C# languages. SQL-Server is also
one of the most secure databases with support of Microsoft. if you want just back-end for
mobile application or other Web app. It has web-services too. WCF (Windows
Communication Foundation) is latest technology used for web services.

Microsoft SQL Server is a relational database management system developed by Microsoft.


As a database server, it is a software product with the primary function of storing and

7
retrieving data as requested by other software applications—which may run either on the
same computer or on another computer across a network (including the Internet).

Microsoft markets at least a dozen different editions of Microsoft SQL Server, aimed at
different audiences and for workloads ranging from small single-machine applications to
large Internet-facing applications with many concurrent users.

❖ ASP.NET in comparison of JAVA

❖ Dot Net As A Proprietary Platform

❖ Dot Net the Most Secure Platform

❖ Dot Net Has Mature Runtime as CLR

❖ Dot Net Has Mature Programming Languages

❖ Dot Net Has Mature Single Framework as ASP.NET

ASP.NET in comparison of other programming languages: -

❖ Keep you Asp.net applications secured with the built-in Windows


authentication and per-application configuration.
❖ Asp.Net has reduced the long lines of code required to develop large
applications.
❖ Asp.Net and Html, together generate dynamic web pages smoothly.
❖ Being an ideal server-side scripting technology, Asp.Net code first runs on
Windows server before displaying on the web browser.

❖ Asp.Net framework is language independent, means you can choose any


programming language which best suited to you application.
❖ With the built-in configuration information, Asp.Net is easy to deploy.
8
❖ The windows web server thoroughly monitors the web pages, multiple
components, and applications running over it.

❖ The Dot Net Framework quickly gives an alert for memory leaks, unbounded
loops, and other wrong behaviours, immediately killing them and restart them over
again.

❖ Asp.Net features like early binding, JIT compilation, caching services and
native optimization supports gives your application the high level of performance.

❖ All the Asp.Net applications are highly monitored and managed to help
application available to handle requests.

9
CHAPTER 3
REQUIREMENTS AND ANALYSIS
3.1 PROBLEM DEFINITION
NAAC REPORT GENERATION FOR VALIA COLLEGE works on the problem to solve
the consequences faced by the college while filing the NAAC Report every year.
There is not a standard format for every criterion thus the data collected is in different format
and difficult to sort and again bring that data in uniform format. The Problems associated are:

• DATA COLLECTED NOT IN UNIFORM FORMAT


The data collected and report generated for per criteria is different from other criteria.
This causes bad look of the Report, Doubles the work for sorting and editing, loss of
focus and enthusiasm for the work.
The dirty look of the Report creates bad impression of the college or
institute. Every repeating the same process becomes difficult and irrigative.
Loss of energy, time.
• TIME
As discussed above problem also wastes lot of time to correct, edit, update, beautify.
The work done by different faculties will be again analysed and reformat the data or
the report.
The time wastage is the main concern related to the project to solve the issue for
generating report.
• LOSS OF ENERGY
As for generating reports and editing this all needs electricity and running resources to
work, the doubled work consumes so much of energy for generating one single report.
Also, human energy is wasted to Redo the work.
Every aspect is one or the other related to each other.
• NO DATABASE
Lack of data storing facility. All human work to do for generating
reports. Not able to view the previous year’s data as secured.

10
3.2 REQUIREMENT SPECIFICATION:
The systems requirements are:
• It should be User friendly.
• It should perform the basic requirements.
• It should contain proper validations required for specified fields.
• The GUI should be interactive.
• The system should easily navigate.
• The system should run smoothly.
• The system should be Secure and Safe for the Institute.
• The data should be secured for college.
• The system should not clash.
• The system should provide all the basic formats available for the user to enter the
data.
• The system should be easily available for inserting, updating, modifying and deleting
the records.
• It should be able to generate a report after filling all the data.
• The database should be secure and must hold all records without losing any data.
• Proper authorization needs to be provided to the system for changes.
• The Report generated needs to be in standard format as per college needs.
• The system should meet all the needs of the Institute.
• The Report generated should be in PDF format.
• It should run on any Platform.
• The system should be easy to understand and work with it.
• As if in case the pattern changes after few years it should readily adapt changes if
required.

11
3.3 PLANNING AND SCHEDULING

The key to a successful project is in the planning. Creating a project plan is the first thing you
should do when undertaking any project. When setting goals, it should be specific,
measurable, achievable, realistic and timed (S.M.A.R.T.). When it is planned and scheduled
the actions, that are taking a huge step toward meeting those requirements. Often project
planning is ignored in favor of getting on with the work. However, many people fail to
realize the value of a project plan for saving time, money and many problems

• Meeting with the team to discuss the various elements of the project. Starting by
fixing the goal i.e. to generate a NAAC Report that must meet with need of
S.M.A.R.T. It is specific to generate report by including validations where ever
require. Also fulfilling all the needs of the Institute for the project. It should make up
report and store in database. The time require to complete the project is of 6 months.

• Working backwards to determine the steps required to complete the goal that is
determined for the project to generate the Report. The work is being divided between
the team member respectively to accomplish the task. The criteria’s mentioned needs
to be distributed for working simultaneously and coordinate for the issues that arises
in the project.

• Entering each specific point on the project plan into the project management or
calendar software that is used in the course of project, such as Microsoft Outlook,
InfoPath or Google Calendar. This scheduling technique is used by many companies
because it allows us to set up a reminder system to keep track of your progress on the
project. Setting a due date for each item on the list of things to accomplish along with
a reminder notification.

• Entering updates for each entry of the project planning schedule as needed. Sharing
access to the project management software or calendar with the team if possible so
that each member can stay abreast of the project as well.

STEPS FOR PROJECT PLANNING:

12
• Identifying& Meeting with Stakeholders

A stakeholder in this project are Institute members and faculties who uses the
software. This includes the teachers and end users. Making sure to identify all
stakeholders and keeping their interests in mind when creating the project plan.

Meeting with the project sponsors and key stakeholders to discuss their needs and
expectations, and establish baselines for project scope, budget, and timeline. Then
creating a Scope Statement document to finalize and record project scope details,
getting everyone on the same page, and reduces the chances of costly
miscommunication.

• Set & Prioritize Goals

Once a list of stakeholder needs is created, prioritizing them and setting specific
project goals. These are outline project objectives, or the metrics and benefits that
hope to achieve. Writing the goals and the stakeholder needs they address in the
project plan so it's clearly communicated and easily shareable.

• Define Deliverables

Identifying the deliverables and project planning steps required to meet the project's
goals. The specific outputs that are expected to produce the output.

Next, estimating due dates for each deliverable in the project plan.

• Creating the Project Schedule

Looking at each deliverable and defining the series of tasks that must be completed to
accomplish each one. For each task, determining the amount of time it will take to
complete the project, the resources necessary, and who will be responsible for
execution.

13
Next, identifying any dependencies. The needs to complete certain tasks before others
can begin, Input deliverables, dependencies, and milestones into your Gantt chart, or
choosing from the many online templates and apps available.

• Identify Issues and Complete a Risk Assessment

No project is Risk Free. There is some or the other problems that arises while the
project. That is, we should be prepare for further issues and have a backup for it solve.

When developing a project plan, considering the steps that should take to either
prevent certain risks from happening, or limit their negative impact. Conducting a risk
assessment and developing a risk management strategy to make sure the project is
prepared.

• Presenting the Project Plan to Stakeholders

Explaining how the plan addresses to stakeholders' expectations, and presenting the
solutions to any conflicts. Making sure that presentation isn't one-sided. Having an
open discussion with stakeholders instead.

Next, there is need to determine roles: the roles like assigning the responsibilities to
team members that what all tasks they are going to perform.

Making the project plan clear and accessible to all stakeholders so they don’t have to
chase anyone down for simple updates. Housing all project plan data in a single
location, like a collaboration tool, makes it easy to track progress, share updates, and
make edits without filling your calendar with meetings.

Communicating clearly. Making sure that stakeholders know exactly what's expected
of them, and what actions they need to take. Just because it's obvious.

STEPS FOR PROJECT SCHEDULING

• Plan Schedule Management

Plan Schedule Management is the process of establishing the policies, procedures, and
documentation for planning, developing, managing, executing and controlling the

14
project schedule. The key benefit of this process is that it provides guidance and
direction on how the project schedule will be managed throughout the project.

Contingencies, Resources, Task Dependencies, Organizational Procedure,


Stakeholders.
• Defining Activities

Define Activities is the process of identifying and documenting the specific actions to
be performed to produce the project deliverables. The key benefit of this process is to
break down work packages into activities that provide a basis for estimating,
scheduling, executing, monitoring and controlling the project work.

• Sequence Activities

Sequence Activities is the process of identifying and documenting relationships


among the project activities. The key benefit of this process is that it defines the
logical sequence of work to obtain the greatest efficiency given all project constraints.

• Estimate Activity Resources

Estimate Activity Resources is the process of estimating the type and quantities of
material, human resources, equipment, or supplies required to perform each activity.
The key benefit of this process is that it identifies the type, quantity, and
characteristics of resources required to complete the activity which allows more
accurate cost and duration estimates.

• Estimate Activity Durations

Estimate Activity Durations is the process of estimating the number of work periods
needed to complete individual activities with estimated resources. The key benefit of
this process is that it provides the amount of time each activity will take to complete,
which is a major input into the Develop Schedule process.

• Develop Schedule
Develop Schedule is the process of analysing activity sequences, durations, resource
requirements, and schedule constraints to create the project schedule model. The key
benefit of this process is that by entering schedule activities, durations, resources,

15
resource availabilities, and logical relationships into the scheduling tool, it generates a
schedule model with planned dates for completing project activities.

3.4 SOFTWARE AND HARDWARE REQUIREMENTS:


The software and hardware requirement which is needed to develop the web application
should be beyond or equal to the expected minimum required specification. The older
hardware computers can be used to develop the web application. But that can be not so
fruitful because it may cause problem as the processing speed of that older computers cannot
be so smooth. So, this is the minimum requirement of the hardware and the software can be
chosen by our convenience and knowledge.
System Processor AMD or Intel
Processor Clock 1.4 GHz or Higher
Motherboard AMD or Intel
RAM 4 GB
Hard Disk Space 100 MB to 1 GB+
Table 3.1 Hardware Specification
Operating System WINDOWS 10
Technology Used .NET Framework
Back End Microsoft SQL
Front End ASP.NET
Modules Report Generation Module, Validation
Modules, etc.
Server Microsoft SQL Servers
Table 3.2 Software Specification

16
3.5 PRELIMINARY PRODUCT DESCRIPTION
This system is proposed because of the need of an application that generates a NAAC Report.
The system requires basic details and then it stores in the database and generates a Report for
a year.
The proposed system requires software, hardware, cooperation from the users.
It should meet all the requirements of the Institute
As there the drawback of the old system was the details collected was in different format, It
increases the work load, It takes double work and time to complete.
Thus, the main objective of the project is to collect details from the Institute and bring it in
Standard Format.
The software functions are:
• To authenticate user.
• To take details from the user.
• To validate the details.
• To store the details in the database.
• To retrieve information for the user.
• To allow modifications if require.
• To generate the Report as per requirement and format.
The software application:
• To generate a Report for NAAC.
• To have data in the database for years.
• To have security.
• To reduce time.
• To reduce human work.

17
CHAPTER 4
SYSTEM DESIGNS
The project is a live project and will be hosted under “Web Application” category.
The frontend of the web application is designed by the ASP.Net with the help of
programming language C#. There were many options available for the same approach but as
mentioned before that this project is to study and applying the most modern approach that a
similar web application can have. There are many programming and web development
languages are available like HTML, PHP, and Boot Strap but for the proper development and
optimization ASP.Net is used for the development of the front-end and the back-end which is
mostly database that can be developed with the help of Microsoft SQL Server Management
Studio. Traditional html-based web application was static as compared to the Active Server
Pages and plus they need additional resource to be loaded every time when a request is sent
in a response.

As the application is using a database for storing the received data. With the help of the
ASP.Net the front end will be developed and will be hosted with the help of any required
browser and the data entered will be stored in the Microsoft SQL server database . As per the
target users of this application the server uptime and the database queries will be enough to
complete most of the necessary users and cover there all the Queries hence the scope has been
decided carefully to tackle all the limitation of this application. To build this web application at
least 1 GB of hard disk space is required to build app smoothly. The processor is of Intel whereas the
server part is entirely done on SQL. Though the system architecture of SQL is still unknown as there
are no traces of system logs in build logs. Hence the space which is taken on server-side is can’t be
viewed.

System Processor AMD or Intel


Processor Clock 1.4 GHz or Higher
Motherboard AMD or Intel
RAM 4 GB
Hard Disk Space 100 MB to 1 GB+

The web application will be easily able to store all the data and the data will be validated by
the validation modules of the web application. After the validation the data can be stored and

18
the desired result will be generated according to the given input by the end user. The web
application will be smoothly able to run on the any web browser and on the windows
operating system, which is widely used now a day’s in the world.
DEBUGGING:
This is one of the major aspects of the software development as this can be used to detect the
error and to solve it in the nearest future as early as possible. In ASP.Net the bugs can be
easily traced only if the features are well differentiated with the different modules. Modules
are the small parts in which the web application is divided. Every Module will contain the
different feature of the web application. For example, validator module will be able to
validate all the fields and the data entered by the users.
In validator there are different types of the validator such as Range Validator. The Range
validator helps the web application to decide the correct range of the characters or the
numbers entered by the end users. If the range of the entered data will not be in the specified
range, then the error message will be produced and the end user have to put the data into the
specified range.
The range of the Range Validator can be set between 1 to 50 characters for entering the name
of the institution. So, the name of the institution should be in the range of 1 to 50 characters.
So, these are some features of the debugging are explained. The overall development of the
web application will be divided into different small modules. After dividing the web
application in small modules, the process of debugging can be lot easier.

4.1 BASIC MODULES


In ASP.NET or C# or in general we create class library projects and use them across the
entire project. Like all the logging functionality is put in some classes and these classes are
including in a class library project which can be called "Logging module". Whenever you
need logging in any of the project you can include this module and use the functionality.

19
4.2 DATA DESIGN:
DATA_INSTITUTION
Table 1 Data of institution

SNO NAME TYPE DESCRIPTION


1 Name of Institution Varchar Primary Key
2 Name of the Head of the Institution Char
3 Designation Char
4 Does the institution function from Varchar
own campus
5 Phone No. Integer Institution phone number
6 Mobile No. Integer Institution mobile number
7 Registered E-Mail Varchar E-mail of institution
8 Alternate E-Mail Varchar
9 Address Varchar
10 City/Town Varchar
11 State/Union Territory Char
12 Pin Code Integer
13 Institutional Status Varchar
14 Type of Institution Varchar
15 Location Varchar Location of Institution
16 Financial Status Varchar
17 University Name Varchar University to which institution is
affiliated
18 IQAC Coordinator Char
19 IQAC Phone No. Integer
20 IQAC Mobile No. Integer
21 IQAC E-Mail Varchar
22 IQAC Alternate E-Mail Varchar
23 Website Varchar IQAC website
24 Accreditation Details Varchar
25 Date of Establishment Date
26 Internal Quality Assurance System Varchar

20
27 List of funds received by Varchar Funds received by college from state
Government or central government
28 Whether Composition of IQAC as Char
per latest NAAC guidelines
29 No. of IQAC meeting held during Integer
the year
30 Significant contribution made by Varchar
IQAC during the current year
31 Plan of Action by IQAC Varchar Plan deployed or in-process by
IQAC
32 Whether the AQAR placed before Varchar
statutory body
33 Institutional data submitted to Char Data of institution submitted by
AISHE AISHE
34 Institution Management Varchar Management system of Institution
Information System

CRITERION 1_CURRICULAR ASPECTS


Table 2:Criterion1_Curricular Aspects

SNO NAME TYPE DESCRIPTION


1 Words on well planned curriculum Varchar
delivery and documentation
2 No. of Certificate/Diploma Courses Integer
introduced during the academic year
3 Name of Certificate courses Varchar Certificate courses available
in institution
4 Name of the Diploma Courses Varchar Diploma courses available in
institution
5 Date of Introduction Date Date of programme
introduced
6 Duration of Courses Varchar Duration of available courses
7 Focus on employability/entrepreneurship Varchar

21
8 Skill Development Varchar
9 Programme with Code Varchar Primary Key
10 Program’s Date of Introduction Date
11 Course with Code Varchar Code of courses available in
institution
12 Course Date of Introduction Date Date of introduction of course
13 Programmes with CBCS Varchar Choice based credit system
programmes
14 CBCS UG Varchar Choice based credit system
Undergraduate programme
15 CBCS PG Varchar Choice based credit system
for post graduate programme
16 Date of Implementation of CBCS UG Date
17 Date of Implementation of CBCS PG Date
18 Year of adaptation Integer
19 Student Enrolled Varchar Number of students enrolled
for courses
20 Students Enrolled in Certificate Course Varchar Number of students enrolled
in certificate courses
21 Students Enrolled in Diploma Course Varchar Number of students enrolled
in diploma courses
22 Value added courses Varchar
23 No. of students enrolled for VAC Integer
24 Date of Introduction of VAC Varchar
25 Year of Project/Internships undertaken Varchar
26 Title of P/I Varchar
27 Number of students enrolled for P/I Varchar
28 Feedback structure received Char
29 Students Char Feedback from student
30 Teachers Char Feedback from teachers
31 Employers Char Feedback from employers
32 Alumni Char Feedback from Alumni
33 Parents Char Feedback from parents

22
34 Feedback optimized and utilized for Varchar Feedback optimization and
development impact

CRITERION 2_TEACHING-LEARNING AND EVALUATION


Table 3: Criterion 2_Teaching-Learning and Evaluation

SNO NAME TYPE DESCRIPTION


1 Demand ratio of faculty Varchar Demand of teacher w.r.t students
2 Name of Programme Varchar Conducted programmes
3 No. of seats available Varchar Seat available for programmes
4 Number of applications received Varchar
5 No. of students enrolled Varchar Students enrolled for course
6 Full time teacher-student ratio Integer
7 Year Integer
8 Number of students enrolled UG Varchar Students enrolled for UG courses
9 Number of full-time teachers Integer Full time teachers available for UG
available for UG programme Courses
10 Number of full-time teachers Integer Full time teachers available for PG
available for PG programme Courses
11 Number of full-time teachers Integer Primary Key
available for both UG & PG
programme
12 Percentage of teachers using ICT Integer Information and Communication
Technology used
13 Number of teachers on roll Varchar
14 Number of teachers using ICT Varchar
15 ICT tools and resource available Varchar ICT techs and tools available
16 Number of ICT enabled classroom Integer
17 Number of smart classrooms Integer Smart classrooms available
equipped with internet of things
18 E-resources and techniques used Varchar
19 Students mentoring system available Varchar
in the institution

23
20 Number of students enrolled in Integer
institution
21 Full Time teacher available Integer
22 Mentor: Mentee Ratio Varchar
23 Number of full-time teachers Integer Full time teacher working in
appointed during the year Institution
24 No. of sanctioned positions Integer
25 No. of filled positions Integer Number of filled positions
26 Vacant Positions Varchar Number of Vacant positions for
faculty
27 Positions filled during the current Varchar
year
28 Number of faculty with Ph.D. Integer
29 Year of Award to faculty Integer
30 Name of faculty receiving awards Varchar Awards received by faculties
31 Designation Varchar Designation of faculties who
received awards
32 Name of the award Varchar
33 Number of days between semester Integer
exam and result declaration
34 Programme name Varchar
35 Programme Code Varchar
36 Semester/Year Varchar Semester conducted of which year
37 Last Date of semester examination Date
38 Date of declaration of result Date Result declared
39 Reforms Initiated on CIEE Varchar
40 Academic Calendar Varchar
41 Student Performances and Outcome Varchar

24
CRITERION 3_RESEARCH, INNOVATION AND EXTENSION
Table 4Criterion 3_Research, Innovation and Extension

SNO NAME TYPE DESCRIPTION


1 Funds Received by institution from Varchar Money received for R&D
various agencies
2 Nature of the projects Varchar Primary Key
3 Duration of the projects Varchar Time taken to complete project
4 Name of the funding agency Varchar Fund given by agencies
5 Total grant sanctioned Varchar
6 Amount received for academic year Integer Amount received for projects
7 Major Projects Varchar
8 Minor Projects Varchar
9 Interdisciplinary Projects Varchar
10 Projects Sponsored by Varchar
university/college
11 Students research projects (Owned Varchar
by student)
12 International Projects Varchar International projects done by
institution
13 Total number of projects Varchar Total projects done by institution
14 Workshops conducted by IPR Varchar
15 Title of Workshop/Seminar Varchar
16 Name of department Varchar
17 Date of adaptation of project Date
18 Award for innovation during the year Varchar
19 Title of innovation Varchar
20 Name of the awardee Varchar
21 Awarding agency Varchar Name of the agency who gives
award
22 Date of award Date Awards given on date
23 Category of innovation Varchar
24 Number of incubation centre created Integer

25
during the year
25 Incubation Centre Varchar
26 Incubation centre name Varchar Name of the incubation centre
27 Incubation centre sponsored by Varchar Incubation centre funded by
28 Name of the start-up Varchar
29 Nature of start-up Varchar Type of start-up
30 Date of commencement of start-up Date Foundation day of start-up
31 Incentive to the teachers who Varchar
received awards
32 Awards received from state Varchar State level awards
33 Awards received Nationally Varchar National level awards
34 Awards Received Internationally Varchar International level awards
35 Ph.D. awarded during the year Varchar Number of Ph.D. award
36 Name of the department PH.D. Varchar
received
37 Number of Ph.D. received by Varchar
department
38 Research in Journals Varchar
39 Nationally published Integer
40 Internationally Published Integer
41 Books and volumes published during Integer Books and volumes published by
the year the institution
42 Department published volumes and Varchar
books
43 No. of publication Integer
44 Citation index Varchar
45 International affiliation Varchar
46 Number of citations excluding self- Integer
citations
47 Extension Activities Varchar Various activities conducted by the
institution
48 Collaborations Varchar Collaborations with different
entities

26
CRITERION 5_STUDENT SUPPORT AND PROGRESSION
Table 5: Criterion 5_Student Support and Progression

SNO NAME TYPE DESCRIPTION


1 Scholarship scheme Varchar Primary Key
2 Number of students Integer Total number of students benefitted
from this scheme
3 Amount in Rupees Varchar Amount of scholarship given to
students
4 Financial support from another Varchar Support from national sources
national source
5 Financial support from another Varchar Support from international sources
international source
6 Name of extra-curricular programs Varchar
by institution
7 Date of implementation Date The given data should be in date
format
8 Number of students enrolled Integer The total no. of students enrolled for
activity
9 Name of agencies involved Varchar
10 Competitive exam and carrier Integer
counselling students in year
11 Name of counselling scheme Varchar Counselling and guidance scheme
name
12 Number of students benefitted Integer Students benefitted from schemes
13 Number of students passed in Integer
competitive exams
14 Number of students placed Integer Number of students placed in
various institutions
15 Grievances during the year Integer Year in which grievances received
16 Total no. of grievances received by Integer
the institution

27
17 Average number of days for Integer Time taken to solve the grievance
grievance redressal received
18 Name of organizations visited on Varchar Placement companies visited
campus
19 Number of students participated on Integer Total no. of students participated
campus
20 Number of students placed on Integer Students got placed
campus
21 Name of organizations visited off Varchar Placement companies visited
campus
22 Number of students participated off Double Total no. of students participated for
campus off campus
23 Number of students placed off Double Students got placed through off
campus campus
24 Student enrolling into higher Double
education during the year
25 Number of students enrolling Double Number of students enrolled
26 Programme graduated from Varchar
27 Department graduated from Varchar
28 Name of institution joined Varchar
29 Name of programme admitted to Varchar
30 Students qualified in competitive Varchar Such as competitive exam
exam
31 Number of students qualifying Double
32 Registration number for the exam Varchar Enter Registration or seat number
for exam
33 Sports and Cultural Activity Varchar
34 Level of activity Varchar
35 Total number of participants Double Number of participants in activities
36 Name of award Varchar
37 Type of award Varchar
38 Type of activity Varchar
39 Student ID number Double Identification number of students

28
40 Activity of Student Council and Varchar Short description of activities of
representation institutions
41 Total number of enrolled Alumni Double
42 Alumni contribution during the year Double Amount contributed by Alumni in
Rupees
43 Institution has registered Alumni Varchar
Association
44 Activities organized by Alumni Varchar Various activities conducted by
association Alumni’s

4.2.1 SCHEMA DESIGN:

Figure 1 Schema Diagram

29
4.2.2 DATA INTEGRITY AND CONSTRAINTS
Data integrity is one of the most important aspect of the software development. Data integrity
is very important for the web application, app, etc to work properly and to give desired
output. Whenever there will be need of integrity there will be also need of the constraints.
Constraints means limitation and limitation helps each and every thing to work
professionally.
In our project we are putting some cap limit on the data entry by the user. So, that the
application works smoothly and garbage files will be in limit because of the cap limit. While
the user will use the web application and it will enter the for e.g. name of the institution will
be having a cap of 100 varchar. So that the user might not able to fill the junk values.
For putting the age in the web application, there will be range validator which will cross
check that the value should be greater than 5. There will be conditions in which the age
should be in integers only and characters will not be allowed in any circumstances.
The project data table will be divided in sub tables. So, that the data can be easily retrieved
and manipulated when needed.
Any retrieval operation, processing operations (including malicious failure and human error)
is the failure of the data integrity.
For the proper integrity of the data separate data tables will be used for every similar
operation. If the data will be changed or not able to store/retrieve hen this will be data
integrity failure. If the data changes without the user or administrator(developer) consent then
this will be the security failure of the data. To bind the data and performing operations on
them is the need and to fulfil this need data integrity and constraints is the important task to
be managed smoothly and carefully.

30
4.3 DESIGN AND DIAGRAMS:
UNIFIED MODELLING LANGUAGE
UML stands for Unified Modelling Language. UML diagrams are mainly used for
the representation of the working modules of the application with the help of the diagrams.
There are different elements which are associated to develop the complete UML picture
which is later known as UML diagram. The UML diagram can be developed by the help of
the tool known as STAR UML or this can also be developed online by the help of websites
which provides online UML diagram maker tools.

UML is a standard language for specifying, visualizing, constructing, and


documenting the artefacts of software systems. UML was created by the Object Management
Group (OMG) and UML 1.0 specification draft was proposed to the OMG in January 1997.
OMG is continuously making efforts to create a truly industry standard. UML stands for
Unified Modelling Language. UML is different from the other common programming
languages such as C, C++, Python, LISP, Android, Java, COBOL, etc. UML is a pictorial
language used to make software blueprints. UML can be described as a general-purpose
visual modelling language to visualize, specify, construct, and document software system.

Although UML is generally used to model software systems, it is not limited within
this boundary. It is also used to model non-software systems as well. For example, the
process flow in a manufacturing unit, etc. UML is not a programming language but tools can
be used to generate code in various languages using UML diagrams.

31
4.3.1 ENTITY RELATIONSHIP DIAGRAM:

The ER model defines the conceptual view of a database. It works around real-world entities and the
associations among them. At view level, the ER model is considered a good option for designing
databases.
ENTITY:
An entity can be a real-world object, either animate or inanimate, that can be easily identifiable. For
example, in a school database, students, teachers, classes, and courses offered can be considered as
entities. All these entities have some attributes or properties that give them their identity.
An entity set is a collection of similar types of entities. An entity set may contain entities
with attribute sharing similar values. For example, a Students set may contain all the
students of a school; like-wise a Teachers set may contain all the teachers of a school from
all faculties. Entity sets need not be disjoint.

ATTRIBUTES:
Entities are represented by means of their properties, called attributes. All attributes have
values. For example, a student entity may have name, class, and age as attributes.

There exists a domain or range of values that can be assigned to attributes. For example, a
student's name cannot be a numeric value. It has to be alphabetic. A student's age cannot be
negative, etc.

Symbol Shape Name Symbol Description

Entities

An entity is represented by a rectangle which


Entity
contains the entity’s name.

An entity that cannot be uniquely identified by its


attributes alone. The existence of a weak entity is
dependent upon another entity called the owner
Weak Entity
entity. The weak entity’s identifier is a
combination of the identifier of the owner entity
and the partial key of the weak entity.

32
An entity used in a many-to-many relationship
Associative
(represents an extra table). All relationships for the
Entity
associative entity should be many

Attributes

In the Chen notation, each attribute is represented


Attribute
by an oval containing attribute’s name

An attribute that uniquely identifies a particular


Key attribute
entity. The name of a key attribute is underscored.

An attribute that can have many values (there are


Multivalued many distinct values entered for it in the same
attribute column of the table). Multivalued attribute is
depicted by a dual oval.

An attribute whose value is calculated (derived)


from other attributes. The derived attribute may or
Derived
may not be physically stored in the database. In the
attribute
Chen notation, this attribute is represented by
dashed oval.

Relationships

A relationship where entity is existence-


independent of other entities, and PK of Child
Strong
doesn’t contain PK component of Parent Entity. A
relationship
strong relationship is represented by a single
rhombus

33
A relationship where Child entity is existence-
Weak
dependent on parent, and PK of Child Entity
(identifying)
contains PK component of Parent Entity. This
relationship
relationship is represented by a double rhombus.

34
Figure 2 Entity Relationship Diagram

35
CLASS DIAGRAM:
Class diagram depicts the system object structure, and then shows object classes
that a system is composed of as well as the relationship between those object classes. It
is a graphical model that shows all the classes of objects in the system in the object
oriented approach. It represents the static view of an application. Class diagram is not
only used for visualizing, describing and documenting different aspects of the system
but also for constructing executable code of the software application.
The class symbol is a rectangle with three sections- the top section contains the
name of the class, middle section contains list of attributes of the class and bottom section
lists the important methods of the class.

36
Figure 3 Class Diagram

37
SEQUENCE DIAGRAM:
Sequence diagram is an interaction diagram that details how operations are carried out,
what messages are sent and when. Sequence diagram are organized according to time. It
represents the logic of use case by showing the interactions of message between objects.

38
Figure 4 Sequence Diagram

39
ACTIVITY DIAGRAM:
An Activity Diagram is a visual representation of any systems activities and flow of data or
decisions between activities. Activity Diagrams provide a very broad view of a business
process. They represent the dynamics of a system. They are flow charts that are used to show
the work flow of a system. Also shows flow of control from activity to activity in the system.

40
Figure 5 Activity Diagram

41
COMPONENT DIAGRAM:
Component diagrams are used to graphically depict the organization and dependencies of the
system software components. They can be used to show how programming code is divided
into modules or components. They graphically depict the physical architecture of the
software of the system. A component is represented in the UML as a rectangle with two
smaller rectangles to the left.
A component diagram in UML gives a bird’s-eye view of your software system.
Understanding the exact service behaviour that each piece of your software provides will
make you a better developer. Component diagrams can describe software systems that are
implemented in any programming language or style.

Component represents a modular part of a system. A component defines its behaviour in


terms of provided and required interfaces.

Package is used to group elements, and to provide a namespace for the grouped elements.

Package container is used to define UML elements such as classes, use cases, and
components.

Dependency relationship is a relationship in which one element, the client, uses or depends
on another element, the supplier.

42
Generalization is a relationship in which one model element (the child) is based on another
model element (the parent).

Constraint is an extension mechanism that enables you to refine the semantics of a UML
model element.

Note contains comments or textual information.

43
Figure 6 Component Diagram

44
DATA FLOW DIAGRAM:

Figure 7 Data Flow Diagram

45
USER INTERFACE DESIGN:
User interface is the major opportunity to connect with the end user by providing them the
seamless graphical user interface. Each and every component should be carefully established.
User interface designs are being designed for the focus of maximized usability and user
experience. The main goal of the user interface design is to provide the very simple and
interactive design to the user. So, that the user can utilise the 100% of the user interface.

The user interface design must balance the technical and visual aspects of the system that
should not only operational but should be usable and updateable according to the user needs.
Before designing the user interface, the developer should know all the user needs. The user
interface design consists of wide range of components and some of them will be described
below.
1) Input Controls: - Input controls consist of radio buttons, checkboxes, dropdown lists,
list boxes, buttons, toggles, text fields, data fields.
2) Navigational Components: - Navigational components comprise of the breadcrumb,
slider, search field, pagination, slider, tags, icons.
3) Informational Components: - This consist of tooltips, icons, progress bar,
notifications, message boxes, modal windows.

46
SECURITY ISSUES:

1) Cross Site Scripting (XSS): - This technique can easily target the user of an
application by injecting the code and the script will be client-side script such as
JavaScript into a web application’s output. The client-side scripting concept is to
manipulate client-side scripts of a web application to execute in a manner desired by
the hacker. The client-side script allows to execute any script in the victim’s browser
which can easily track our session, deface website or it may redirect to any other
website.
2) SQL Injections: - This technique is used to make loop holes in the database or just
simply this type of attacks is done to corrupt the database or to retrieve data from the
database. If this attack would be successful then this allows the hacker to alter the
data, delete, insert, update the content of the database. This is the one of the most
famous web vulnerabilities in the world.
3) Insecure Direct Object Reference: - In this the developer’s mistake can be helpful
to the hackers because if there will be any indirect object reference to an internal
implementation object. When an application exposes a reference to one of these
objects in a URL hacker can easily use them to retrieve the user’s data
4) Broken Authentication and Session Management: - These types of hacking happen
due to many mistakes in security management. This were used to give a shield to
hacker by maintaining the end user identity while surfing. If the authentication
credentials were not secured then hackers can easily hijack the active session of the
user and also assumes the identity of the user.
5) Security Misconception: - These types of data hacking happen due to lack of
development, upgradation and lack of attention to the web application configuration.
The updated configuration, framework, application server, web server, database
server must be deployed to save the data otherwise the whole data or database can be
lost to the hands of the hackers.
6) Cross Site Request Forgery: - These types of forgery are a malicious attack were a
user is tricked into performing an action which he/she didn’t intend to do. A third-
party website will send a request to web application that a user is already logged in
with the existing user id and with this the user can already logged in to your account
especially social media and bank accounts.

47
REFERENCE: -
1) https://docs.microsoft.com/en-us/aspnet/web-
forms/overview/getting-started/creating-a-basic-web-forms-page
2) https://www.devu.com/tutorials/cs-asp/articles/lesson-3-building-your-first-web-
app
3) Advanced Web Programming Textbooks
4) Research papers of Google:

https://patents.google.com/patent/US20040046789

https://patents.google.com/patent/US6496203B1/en

5) https://docs.microsoft.com/en-us/aspnet/tutorials
6) https://docs.microsoft.com/en-us/aspnet/web-forms/
7) https://docs.microsoft.com/en-us/aspnet/entity-framework
8) https://en.wikipedia.org/wiki/Design_management
9) https://msdn.microsoft.com/en-us/library/ms973868.aspx
10) https://msdn.microsoft.com/en-us/library/ms973905.aspx

48

You might also like