You are on page 1of 30

PREFACE

This project report is submitted in partial fulfillment of the requirements for the
award of the degree of “Master of Computer Science (Information
Technology)”
The project report is prepared for the project completed during the course of M.SC.
(IT),1ST Semester undertaken at Post Graduate Government College, Sector 11 as a
part of the M.SC.(IT),1ST Semester curriculum as prescribed by Panjab University,
Chandigarh. The project report includes some background information about the
college and information about the services in which the college deals in.

The purpose of this report is to assemble under one cover a sufficient body of
knowledge about management and development of a successful project. The
following quotes outline the basic idea behind this technical report. This report
assembles various functions like planning, organizing, designing, testing, and
maintenance of the CARD SOLATIRE developed during the training.

This report is about the adaptation of the techniques of project development and
reflects the practice and methods of this project.

1
DECLARATION

We all the members of the group here by, declare that the Project Report based on
the “CARD SOLATIRE” is the result of the original work done by us and to the
best of our knowledge.
We have undergone all the necessary requirements and formalities with the college
that are necessary for the submission of this Project Report.
This Project Report is submitted for partial fulfillment of all wards of the degree of
“M.SC. (IT), 1ST Semester” under Panjab University, Chandigarh.

DEEPAK MISHRA 4530/20


SEWETA 4519/20

Above statement by the candidates is true to the best of my knowledge.


(Mrs. NISHA GUPTA)

2
ACKNOLWEDGEMENT

A formal statement of acknowledgement is hardly sufficient to express our


gratitude towards the personalities who have helped us to undertake and carry out
this project. We hereby convey our thankfulness and obligation to all those who are
providing us valuable help, support and guidance to carry on this project.
First and foremost, we express our gratitude towards Mrs. NISHA GUPTA
(Lecturer- I.T. Dept.). Her keen interest and encouragement has been of immense
help to us. She gave us unending support and helped us in numerous ways from the
stage when the idea of the project was conceived. She was always there to hear us
and to give advice. She is responsible for involving us in this project. She taught us
how to ask questions and express our ideas. She showed us different ways to
approach a research problem and the need to be persistent to accomplish any goal.
She had taken pain to go through the project and make necessary correction as and
when needed. We express our thanks to the principal our college Prof.
RAJAL KAPOOR for extending his support. We are also thankful and express
our gratitude to other members of the I.T. Dept. for their valuable time and
suggestions regarding this project.
We thank the almighty god for blessing us with new challenges in life and giving
us enough strength to meet those challenges. We owe everything to our parents
who worked very hard to provide us everything in life.
Finally, we are indebted to our friends who showed tolerance and maturity when
we were preoccupied with composition of the project cannot be expressed in words

NAME ROLLNO.
Deepak Mishra 4530/20
Seweta 4519/20

3
CERTIFICATE

This is to certify that the project has been submitted by DEEPAK MISHRA
(4530/20) and SEWETA (4519/20) pursuing MSC IT (1st semester) from
PGGC-11 Chandigarh, under took a project entitled “CARD SOLATIRE”
which is a record of bonafide work carried out by them under my
supervision. In my knowledge, this work has not been submitted, either in
part or in full, to any other University or institute for the award of degree.
They had submitted the report in time. They had done good work and have
fulfilled all the requirements.

Project Guide:

Mrs. NISHA GUPTA


Assistant Professor
PGGC-11
Chandigarh

PLACE: CHANDIGARH
DATE:

4
BRIEF INTRODUCTION ABOUT PGGC-11 AND IT
DEPARTMENT
Post Graduate Government College, Sector 11, Chandigarh is as old and as young
as the City Beautiful. Its growth and expansion have kept pace with the growth and
expansion of the city.

The college was established on May 26, 1953. The college was envisaged as a
leading institution having its own distinct impress on the educational and cultural
map of the „City Beautiful‟ A prestigious temple of learning, (just in the footsteps
of famous Govt. College, Lahore). Being the first college in the city, it has proved
itself eminently worthy of its role as a torch-bearer in the whole gamut of
broadbased instruction. The college aims at providing congenial atmosphere and
constructive channels to its young scholars for the fullest development of their
multi-dimensional personalities. „Higher and Still Higher‟ is the motto of the
college.

During the past 50 years, the college has scaled many a glorious height, has taken
tremendous strides and carved for itself a secure niche in the educational edifice in
this part of the country. It has consistently won laurels in the spheres of academics,
sports and other creative activities. A cross-section of our student community has
the enviable position in administrative services, education, medicine, engineering,
business, industry, and even politics. They are the trend setters for the present
generation of students.

5
IT DEPARTMENT

M.Sc. (IT) was started in 2000. B.C.A. classes were introduced in 1999.B.Sc
Computer Science was introduced in July 2004. H.O.D. of the Department is
Mr. Rajal kapoor. The term IT related to Information Technology. There are well
maintained labs with new infrastructure where students are provided guidance
about the software development and other terms related to IT, IT fests are
organized every year in which students take part and explore their knowledge.
Faculty of the department is very helpful and intelligent.

6
PROJECT DESCRIPTION

Project overview:

Project name : Card Solatire


Project type : Game
Language Used : Perl Script
Tool : Linux

7
OVERVIEW OF THE PROJECT

The project “Card Solatire” is developed using Perl Script. In this project, we make

the use of Ubuntu Linux which contains various commands that performs various

tasks according to event occur. We also make use Virtual Box which helps in to

install the Ubuntu Linux on which various actions performed.

The object of the game is to pick up all the cards. You start with your base card

(centered at the bottom). You may pick up (by clicking) any uncovered card whose

denomination is one away from the base card's denomination (the ace is adjacent to

both the king and the deuce). Suit does not matter.

8
OBJECTIVES

1. To develop the brain and intelligence of the individual player.

2. To finish the game with ease.

3. To improve the skills of individual.

9
FUTURE SCOPE OF THE PROJECT

This game can be further expanded by adding Full Menu system and by adding the
levels in the game like easy, medium and hard. The levels of the game can be
decided by adding timer to the game. Better graphics can be added in which the
game is played. The game can be uploaded on internet and in this way, be made
available for the other users who can download it and play. The game developed is
basically used for the entertainment purposes.

10
SOFTWARE & HARDWARE REQUIREMENTS

SOFTWARE TECHNOLOGIES:

 VIRTUAL BOX
 LINUX

HARDWARE REQUIRMENTS:

 PENTIUM 4 PROCESSOR
 512 MB RAM
 10GB HARD DISK
 MONITOR
 KEYBOARD & MOUSE

11
GAME DESCRIPTION

The project CARD SOLATIRE is made in the Perl language with the help of TK
module. The object of the game is to pick up all the cards. You start with your
base card (centered at the bottom). You may pick up (by clicking) any uncovered
card whose denomination is one away from the base card's denomination (the ace
is adjacent to both the king and the deuce). Suit does not matter. Attempting to
illegally pick up a card (if the card is covered or if the card's denomination is not
adjacent to the base card's denomination) will result in a terminal bell. Once you
pick up a card, it becomes the new base card.

If you there are no more cards to pick up, click the base card. This is equivalent to
pulling the next card from the bottom of the pile. When the pile is exhausted, a
card will be placed face down at the base. The game is over when no more cards
are left in the field or when the base is exhausted and no legal moves remain.

There is an undo option that lets you undo your last pickup. You can't undo once
you've flipped the next base card because that would give an unfair advantage.

12
SYSTEM ANALYSIS

When the system analyst decides that the requested system is feasible and the
management agrees to continue the development process, the next phase of the
SDLC is determination of the system requirements. This phase includes studying
of existing system in detail and collecting data in order to find out the requirement
of the user. To have it the system analyst must consult a variety of persons. He has
to understand the whole details about the business involved in it and the problems
faced by the staff. He should also identify the reasons for the problems that have
occurred and the preventive measures to avoid them.
During analysis data are collection available file, decision points and transactions
handled by the present system. Some tools are used in analysis like interview, on
sit observations and questionnaires. Detail investigations also require the study of
manuals and reports. Once the structured analysis is completed, analyst has firm
understanding of what is to be done?

13
INTRODUCTION TO THE PERL LANGUAGE

PERL
Perl is a general-purpose programming language originally developed for text
manipulation and now used for a wide range of tasks including system
administration, web development, network programming, GUI development, and

more.

What is Perl?
• Perl is a stable, cross platform programming language.

• Though Perl is not officially an acronym but few people used it as Practical
Extraction and Report Language.

• It is used for mission critical projects in the public and private sectors.

• Perl is an Open Source software, licensed under its Artistic License, or the
GNU General Public License (GPL).

• Perl was created by Larry Wall.

• Perl 1.0 was released to Usenet‟s alt.comp.sources in 1987.

• Perl is listed in the Oxford English Dictionary.

PC Magazine announced Perl as the finalist for its 1998 Technical Excellence
Award in the Development Tool category.

14
Perl Features
• Perl takes the best features from other languages, such as C, awk, sed, sh,
and BASIC, among others.

• Perls database integration interface DBI supports third-party databases


including Oracle, Sybase, Postgres, MySQL and others.

• Perl works with HTML, XML, and other mark-up languages.

• Perl supports Unicode.

• Perl is Y2K compliant.

• Perl supports both procedural and object-oriented programming.

• Perl interfaces with external C/C++ libraries through XS or SWIG.

• Perl is extensible. There are over 20,000 third party modules available from
the Comprehensive Perl Archive Network (CPAN).

• The Perl interpreter can be embedded into other systems.

Perl and the Web


• Perl used to be the most popular web programming language due to its text
manipulation capabilities and rapid development cycle.

• Perl is widely known as "the duct-tape of the Internet".

• Perl can handle encrypted Web data, including e-commerce transactions.

• Perl can be embedded into web servers to speed up processing by as much as


2000%.

15
• Perl's mod_perl allows the Apache web server to embed a Perl interpreter.

• Perl's DBI package makes web-database integration easy.

Perl is Interpreted
Perl is an interpreted language, which means that your code can be run as is,
without a compilation stage that creates a non-portable executable program.

Traditional compilers convert programs into machine language. When you run a
Perl program, it's first compiled into a byte code, which is then converted (as the
program runs) into machine instructions. So it is not quite the same as shells, or
Tcl, which are strictly interpreted without an intermediate representation.

It is also not like most versions of C or C++, which are compiled directly into a
machine dependent format. It is somewhere in between, along with Python and
awk and Emacs .elc files.

16
INTRODUCTION TO TK MODULE

What is PERL TK Module?


The Perl/Tk module, also known as pTk or ptk, is a Perl module designed to create
widgets and other commonly used graphical objects to form a graphical user
interface (GUI). Using the module to create a GUI enhances the look and feel of a
program and helps the end user navigate through the program and its functions.
One major advantage of using the Perl/Tk module is that the resulting application
can be cross-platform, meaning the same GUI application can be used on UNIX®,
Linux®, Macintosh, Microsoft® Windows®, or any other operating system that
has Perl and the Perl/Tk module installed.

Where to get the Perl/Tk module

Before you write an application with the Perl/Tk module, you must verify that Perl

and the Perl/Tk module are installed. Although Perl is commonly installed on

computers, the Perl/Tk module isn't. One way to verify if Perl is installed is to type

perl --version at the command line. If Perl isn't installed, please refer to the

installation guide found on Perl's Web site

Once you've located or installed Perl on your computer, the next step is to

determine whether the Perl/Tk module needs to be installed. A simple way to

verify if a module is installed is to type perl -e "use module" at the command

17
prompt. To verify if the Perl/Tk module is installed, execute the following
command:

1 perl -e "use Tk"

If the module is found, the command executes and returns to a command prompt.

However, if the module isn't found, an error message similar to the following is

displayed:

1 Can't locate Tk.pm in @INC (@INC contains: /opt/ActivePerl-5.8/site/lib


2 /opt/ActivePerl-5.8/lib .) at -e line 1.
BEGIN failed--compilation aborted at -e line 1.
3

Keep in mind that Perl is case sensitive: perl –e "use Tk" and perl –e "use tk" are

two different statements trying to use two different modules (Tk and tk).

If the module isn't found, the next step is to download and install it. You can do so

a couple of ways.

If you're using UNIX or Linux, one way to download and install Perl modules is to

use the Comprehensive Perl Archive Network (CPAN). Type the following at the

command prompt:

1. perl –MCPAN –
e shell

2. install
Bundle::CPAN

3. reload cpan

4. install Tk

18
If you're using Windows, a similar approach is to use Perl Package Manager

(PPM). At a command prompt, type ppm to start the GUI and download the Tk

module.

Once the installation is complete, reverify that Perl can find the module by

executing perl –e "use Tk".

CPAN install
Most Perl modules are written in Perl, some use XS (they are written in C) so require a C
compiler (it's easy to get this setup - don't panic), see your OS of choice below to find out
how to get the right compiler. Modules may have dependencies on other modules
(almost always on CPAN) and cannot be installed without them (or without a specific
version of them). It is worth throughly reading the documentation for the options below.
Many modules on CPAN require a somewhat recent version of Perl (version 5.8 or
above).

Quick start
Install cpanm to make installing other modules easier (you'll thank us later). You need to
type these commands into a Terminal emulator (Mac OS X, Win32, Linux)

cpan App::cpanminus

Now install any module you can find.

cpanm Module::Name

19
SOFTWARE ENGINEERING PARADIGM APPLIED

SYSTEM DEVELOPMENT LIFE CYCLE

System Development Life Cycle (SDLC) is a well-defined process by which a


system is conceived, developed and implemented. The system development life
cycle consists of the following phases:

• Preliminary survey or investigation


• Feasibility study
• System analysis
• Design of system
• Development of software
• System testing
• Implementation and evaluation
• Maintenance

Preliminary survey or investigation


One of the most difficult tasks of the system analyst is identifying the real problem
of the existing system without clear understanding of the problem; any further
work done would lead to wastage of effort at the later stage. The purpose of the
preliminary survey or investigation is to evaluate project requests. It is not a design
study nor does it include the collection of the details to describe the business
system in all respect. Rather, it is the collecting of the information that helps

20
committee members to evaluate the merits of the project request and make an
informed judgment about the feasibility of the proposed project.

Feasibility study
The next step is to examine the feasibility study of the proposed system. This
involves evaluating the costs and benefits of the system. Initially, a rough benefit
analysis will be sufficient for the top management to take a decision either in favor
of or against the proposed system. Cost includes cost of design, development,
implementation and maintenance if the system. Benefits will be realized from the
timely and accurate generation of the required information to meet the stated
objectives of the organization.

Economics feasibility study


The product should be economically feasible. It should not cost too much which is
not affordable by the organization.
Technical feasibility: - the product should be technologically feasible. It will not
require specialized people to operate upon. It will be a simple English interface and
can be operated after short-term training.

Behavioral feasibility
It will not be opposed by the employees of the organization and they will easily
accept it.

21
SYSTEM IMPLEMENTATION & EVALUATION

IMPLEMENTATION consists of installing hardware, software, training of all the


user and collecting data needed to use it. In this phase user actually starts using the
system. Therefore, this phase involves training of the users for using the system
and also providing them friendly documentation to refer to:

Implementation can be done in three ways:


New system is implemented and the old system is completely dropped out on one
particular date. New system is implemented and both old and new systems are
operated in parallel. The new system is implemented in many phases. Each phase is
carried out only after successful implementation of previous phase. Once the
system is implemented it should be evaluated. Evaluation of the system is
performed to identify its strength and weakness.

MAINTAINENCE: - After implementation the system need to be maintained in


order to adapt the changing business needs. There are three types of maintenance.

CORRECTION: - Correction means correcting the errors in the existing software.


Adaption: - adaption means customizing the software to run in the new
environment.

22
ENHANCEMENT: - enhancement means adding new functions or additional
capabilities to the system. If the system needs major modification, then life cycle
starts again.

SCREEN SHOTS

Start of Game

23
24
End of the Game.

TESTING
There are many approaches to software testing. Reviews, walkthroughs, or
inspections are considered as static testing, whereas actually executing
programmed code with a given set of test cases is referred to as dynamic testing.
Static testing can be (and unfortunately in practice often is) omitted. Dynamic
testing takes place when the program itself is used for the first time (which is
generally considered the beginning of the testing stage). Dynamic testing may
begin before the program is 100% complete in order to test particular sections of
code (modules or discrete functions). Typical techniques for this are either using
stubs/drivers or execution from a debugger environment. For example, spreadsheet
programs are, by their very nature, tested to a large extent interactively ("on the

25
fly"), with results displayed immediately after each calculation or text
manipulation.

Methods

Black-Box Testing
In Black-Box Testing the tester only knows what the software is supposed to do-he
can‟t see how it operates. If he types in a certain input, he gets a certain output.
He doesn‟t know how or why it happens, just that it does. Means run a test, give
input and verify its output and if any bug or unexpected result u have faced, and
ask developer to review its related code.

White-Box Testing
While in White-Box Testing the software tester has access to the program‟s code
and can examine it for clues to help him with his testing-he can see inside the box.
Thus we can say that in white-box testing the tester has knowledge about the
software that what and how the things are going on inside the system. Thus he can
debug that the certain error is coming from which part of the software.

Level of Testing

Unit testing:

26
Unit testing refers to tests that verify the functionality of a specific section of code,
usually at the function level. In an object-oriented environment, this is usually at
the class level, and the minimal unit tests include the constructors and destructors.

Integration testing:
Integration testing is any type of software testing that seeks to verify the interfaces
between components against a software design. Software components may be
integrated in an iterative way or all together ("big bang"). Normally the former is
considered a better practice since it allows interface issues to be localized more
quickly and fixed.
Integration testing works to expose defects in the interfaces and interaction
between integrated components (modules). Progressively larger groups of tested
software components corresponding to elements of the architectural design are
integrated and tested until the software works as a system.

System testing:
System testing tests a completely integrated system to verify that it meets its
requirements. System integration testing: System integration testing verifies that a
system is integrated to any external or third party systems defined in the system
requirements.

27
CONCLUSION

This project that we undertook was truly a very rewarding experience for us in
more than one way. It has given a big thrust to our technical knowledge as
prospective Software professional. It has also helped us enhance our skills in PERL
Script and with CPAN.

28
And we feel extremely satisfied by the fact that we have managed to develop the
project of course with equal contribution from our instructor and the project guide.
We think we have exploited the opportunity that came our way to the fullest extent
by increasing my technical knowledge and also gaining the valuable work
experience.

REFRENCES

Books and Websites are helpful in understanding the requirements, development


and maintenance of the Project:

Books:
1. Perl Black Book, 2nd Edition : Steven Holzner
2. Learning Perl : Randal L. Schwartz

29
Websites:
1. www.google.com
2. http://sdl.perl.org/
3. https://metacpan.org/pod/SDL::Tutorial
4. http://sdl.perl.org/SDL-Tutorial.html
5. https://metacpan.org/release/SDL

30

You might also like