Professional Documents
Culture Documents
INTRODUCTION
1.1 ABOUT THE PROJECT
Developing a virtual classroom system to promote a greater count of students to splurge into
the field of Education. It integrates the benefits of a physical classroom with the convenience of a
‘no-physical-bar’ virtual learning environment, minus the commuting hazards and expenses. It will
usher in the immense flexibility and sophistication in the existing learning platform structures, with
the perfect blend of synchronous and asynchronous interaction. It provides a means of collaborative
learning for the students.
The educational methodology utilized for the concept of the Virtual Classroom (a classroom
in an electronic space) reflects asynchronous group communications and collaborative approaches to
education and training. The student is an active part of a learning group but proceeds to learn and
understand on an individual basis independent of the speed of other learners in the group.
The Virtual Classroom is a teaching and learning environment located within a computer-
mediated communication system. The objectives of a Virtual Classroom are to improve access to
advanced educational experiences by allowing students and instructors to participate in remote
learning communities using personal computers at home or at work; and to improve the quality and
effectiveness of education by using the computer to support a collaborative learning process. By
collaborative learning is meant a learning process that emphasizes group or cooperative efforts among
faculty and students, active participation and interaction on the part of both students and instructors,
and new knowledge that emerges from an active dialog among those who are sharing ideas and
information.
The Virtual Class Room system is a web based project. This project is aimed to develop
online learning courses. Developing a virtual classroom system to promote a greater count of students
to splurge into the field of Education. It integrates the benefits of a physical classroom with the
convenience of a ‘no-physical-bar’ virtual learning environment, minus the commuting hazards and
expenses. It will usher in the immense flexibility and sophistication in the existing learning platform
structures, with the perfect blend of synchronous and asynchronous interaction. It provides a means
of collaborative learning for the students.
2. SYSTEM ANALYSIS
Technical Feasibility
Technical Feasibility deals with the hardware as well as software requirements. Technology is
not a constraint to type system development. To find out whether the necessary technology, the
proposed equipments have the capacity to hold the data, which is used in the project, should be
checked to carry out this technical feasibility.
The technical feasibility issues usually raised during the feasibility stage of investigation
includes these
This software is running in windows 7 Operating System, which can be easily installed.
The hardware required is Pentium based server.
The system can be expanded.
Economical Feasibility
This feasibility study present tangible and intangible benefits from the prefect by comparing
the development and operational cost. The technique of cost benefit analysis is often used as a basis
for assessing economic feasibility. This system needs some more initial investment than the existing
system, but it can be justifiable that it will improve quality of service.
Thus feasibility study should center along the following points:
Improvement resulting over the existing method in terms of accuracy, timeliness.
Cost comparison
Estimate on the life expectancy of the hardware
Overall objective
Our project is economically feasible. It does not require much cost to be involved in the overall
process. The overall objectives are in easing out the requirement processes.
The development of this new system contains the following activities, which try to automate
the entire process keeping in the view of database integration approach.
User Friendliness is provided in the application with various controls provided by system Rich
User Interface.
It can be accessed over the Internet.
The user information files can be stored in centralized database which can be maintained by
the system.
This can give the good security for user information because data is not in client machine.
Authentication is provided for this application only registered members can access.
As the virtual classroom is one that aims to give the student an experience equal to or better
than the sort they would find in a traditional classroom, there are obviously many advantages of the
virtual classroom to the student, as well as the teacher (or instructor) and the associated educational
institution.
3. SYSTEM ENVIRONMENT
RAM capacity : 4 GB
Mouse : Optical
FRONT END
This Project work has completed in ASP. NET with vb as front end and SQL Server as back
end. Microsoft .NET is software that connects information, people, systems and devices. It spans
clients, servers and developer tools and consists of:
The .NET Framework programming model that enables developers to build Web-
based applications which expose their functionality programmatically over a network
using standard protocols such as SOAP and HTTP.
Developer tools such as Microsoft Visual Studio .NET, which provide a rapid
application integrated development environment for programming with the .NET
Framework.
A set of servers including Microsoft Windows 2000, Microsoft SQL, Server and
Microsoft BizTalk Server that integrates, runs, operates and manages XML Web
services and applications.
Client software such as Windows XP, Windows CE and Microsoft Office XP, 7 that
help developers deliver a deep and compelling user experience across a family of
devices and existing products.
The .NET Framework is the programming model of the .NET environment for building,
deploying and running Web- based applications, smart client applications and XML Web services. It
manages much of the plumbing, enabling developers to focus on writing the business logic code for
their applications. The .NET Framework includes the common language runtime and class libraries.
To make the developer experience consistent across widely types of application, such
as windows based applications and web based applications.
The .NET framework has two main components: the common language runtime and
the .Net framework class library. The common language runtime is the foundation of the .NET
framework. You can think of the runtime as an agent that manages code at execution time and
remoting while also enforcing strict type safely and other forms of code accuracy that ensure security
and robustness in fact the concept of code management is a fundamental principle of the runtime.
Code that targets the runtime is known as managed code, while code that does not target
the runtime is known as un managed code. The class library, the other main component of the .NET
frameworks is a comprehensive, object-oriented collection reusable types that you can use to develop
applications ranging from traditional command line or graphical user interface (FGUI) applications to
application base d on the latest innovations provided by ASP.NET, such as web forms and XML web
services.
The .NET framework can be hosted by unmanaged component that load the common
language runtime into their processes and initiate the execution of managed code. ASP.NET works
directly with the runtime to enable ASP.NET application and XML web services, both of which are
discussed later in this topic, Internet explorer is an example of unmanaged application that hosts the
runtime (in the form of a MIME type extension). Using internet explorer to the host runtime enables
you to embed managed components or windows forms controls in HTML documents. Hosting the
runtime in this way makes mobile code 9similar to Microsoft Active X controls) possible, but with
significant improvement that only managed code can offer, such as semi-trusted execution and secure
isolated file storage.
The following illustration shows the relationship of the common language runtime and the
class library to your application and to the overall system. The illustration also shows how managed
code operated with in a larger architecture.
We can use the .NET framework to develop the following types of application and services:
Console applications
Window GUI application (Windows Forms) ASP.NET applications
XML Web services
Windows services
BACK END
MS SQL SERVER
DATABASE
Database is an organized list of data (information) that can be queried to find information
quickly and easily based chosen reference point. Such a last name of security number. In database
terminology, the columns are called fields and the rows are called records. The kind of organization
in a database is called a table.
SQL SERVER
.SQL Server is a RDBMS that you can store and manipulate large amount of information. A
relational database is a database, which consists of tables of that related information that are linked
together on key fields.
The tools of SQL Server are user friendly and provide a powerful development environment,
making it equally appropriate for novices and MIS professionals. For example we can access quickly
and easily create a database of mailing list information that we can merge with other document.
SQL Server commands are related to Oracle, So that the oracle users can easily operate the SQL
Server, One of the main advantage is it can easily execute set of queries at a time..
SQL Server is an Object Oriented program. Objects are modules, which is used to provide
information and programs, which any of user can directly apply to create application. Each Object has
properties that defines how the looks and perform. It has the following Objects.
Tables
Queries
Forms & Reports
Modules
TABLES
Tables are primary building blocks of SQL SERVER database. All data is stored in tables. Every
table in the database focus on one subject. We can combine specific fields from multiple tables into
one data sheet. The datasheet that a query written is called a record set.
QUERIES
Queries are used to perform some operation for retrieve the data from the table and to store
FORMS
RELATIONSHIPS
Relationship is mainly used to join the two databases. Join is an object, which has three forms
degree of interest in each concept has varied over the years, each has stood the test of time. Each one
provides the software designer with a foundation from which more sophisticated design methods can
be applied. Fundamental design concepts provide the necessary framework for “getting it right”.
Abstraction
Abstraction permits one to concentrate on a problem at some level of generalization without regard
to irrelevant low level details, use of abstraction also permits one to work with concepts and terms
that are familiar in the problem environment without having to transform them to an unfamiliar
structure. Two types of abstraction are there, one is procedural abstraction and data abstraction. A
procedural abstraction is a named sequence of instructions that has a specific and limited function. A
data abstraction is a named collection of data that describes a data object.
Modularity
Modularity is the single attribute software that allows a program to be intellectually manageable.
Software architecture embodies modularity, that is, software is divided into named and addressable
components, called modules that are integrated to satisfy problem requirements.
Software Architecture
Software Architecture alludes to “the overall structure of the software and the ways in which that
structure provides conceptual integrity for a system”. Control hierarchy also called program
structure”, represents the organization of control. The tree structure used to represent the control
hierarchy.
Structural Partitioning
The program structure should be partitioned both horizontally and vertically. Horizontal
partitioning defines separate branches of the modular hierarchy for each major program function,
Vertical partitioning called factoring, suggest that control and work should be distributes top-down in
the program architecture. Top level modules should perform control functions and do actual
processing work. Modules reside low in the architecture should be the workers, performing all input,
computational and output tasks.
Data Structure
Admin enter user id or date for track the user login information
New user gives his completed personnel, address and phone details for registration.
Admin gives different kind of user information for search the user data.
User gives his user id, hint question, answer for getting the forgotten password.
The relation upon the system is structure through a conceptual ER-Diagram, which not only
specifics the existential entities but also the standard relations through which the system exists and the
cardinalities that are necessary for the system state to continue.
The entity Relationship Diagram (ERD) depicts the relationship between the data objects. The ERD is the
notation that is used to conduct the date modeling activity the attributes of each data object noted is the
ERD can be described resign a data object descriptions.
The set of primary components that are identified by the ERD are
Data object
Relationships
Attributes
Various types of indicators.
The primary purpose of the ERD is to represent data objects and their relationships.
4.3 DATABASE DESIGN
Database design is the process of producing a detailed data model of a database. logical data
model contains all the needed logical and physical design choices and physical storage parameters
needed a design in a Definition Language, Which can then be used to create a database. A fully
attributed data model contains detailed attributes for each entity.
- Data Flow
- Process
- Storage
DFD Diagrams:
Context 0th Level Diagram:
After carefully understanding the requirements of the client the entire data storage
requirements are divided into tables. The below tables are normalized to avoid any anomalies during
the course of data entry.
Tables Design:
UML DIAGRAMS
Use Case Diagrams :
Over View Use Case Diagram :
Admin Use Diagram:
DataA
4: cessLa 6:
ExecuteC yer Returns
ommand( value()
Dat 5:
) 3 : Busine
aba Command
ExecuteC ss
se Response(
ommand Object
) 7:
Respons
Ad 2:
1: eData()
mi Validat
n GetAdmi eUser()
Logi
nHome()
nPa
ge
5 : Response()
Database DataLogic
6 : Response()
4 : ExecuteCommand()
3 : ExecuteNonQuery()
BusinessLogic
2 : : insertFacultyData ()
1 : GetRegistraion() 7 : Response()
Faculty
Registration
Database
4 : ExecuteCommand()
DataLogic
3 : GetUserLoginCheck()
BusinessLogic
2 : ValidateData()
LoginPage
1 : MakeRequest()
5 : Response()
Student
Database DL(SqlHelper)
4 : ExecuteNonQuery()
3 : AddCourse()
BL(Cls_course)
5 : Response()
2 : ValidateData()
1 : lnkAddCourse() frmAddCourse
Admin
DAL
Database 4 : ExecuteNonquery()
3 : InsertCourseAndStudentData()
BL
2 : RegisterCourse()
1 : GetAllCourses() CourseRegistration
5 : Response() Student
SYSTEM SPECIFICATION
5.1 MODULES
In the flexibility of the uses the interface has been developed a graphics concept in mind,
associated through a browser interface. The GUI’S at the top level have been categorized as
Administrative user interface
The operational or generic user interface
The administrative user interface concentrates on the consistent information that is practically,
part of the organizational activities and which needs proper authentication for the data collection. The
interfaces help the administrations with all the transactional states like Data insertion, Data deletion
and Data updating along with the extensive data search capabilities.
The operational or generic user interface helps the users upon the system in transactions
through the existing data and required services. The operational user interface also helps the ordinary
users in managing their own information helps the ordinary users in managing their own information
in a customized manner as per the assisted flexibilities
NUMBER OF MODULES
The system after careful analysis has been identified to be presented with the following
modules:
Administrators /Managers
Faculties
Students
Web Registration
Virtual Training
Exam Conducting
Search
Reports
Authentication
WEB REGISTRATION
The system has a process of registration. Every student need to submit his complete
details in the form of registration. Whenever a student registration completed automatically student
can get a user id and password. By using that user id and password student can log into the system.
If registration process is completed successfully an email remainder is generated and sends to the
citizen.
ADMINISTRATORS
Administrator is treated as a super user in this system. He can have all the privileges
to do anything in this system. Admin can prepare course curriculum, along with course content by
the help of the faculties. He can collect the course videos and stored into in the centralized database.
Another tasks done by the administrator is he can generates reports, log files, backup,
and recovery of data any time.
FACULTY
Faculties can take lectures, uploads assignments, announcements, evaluate answer
sheets and also upload lectures, and other discussions in various formats as in the form of videos and
power point presentations.
STUDENTS
Students can choose courses, attend lectures, take exams, and view their attendance
records, progress reports as per their convenience through this system only.
One student can register multiple courses. Take their classes on the schedule time or
later their convenience. By using the system interface student learn the courses properly and attend
the exams as an online mode. Results will be announced through online only.
VIRTUAL TRAINING
Asynchronous communication in the form of emails, discussion boards that enable
communication to occur at “convenient-times” that suit student schedules and are not accessed at
simultaneous or prearranged times.
EXAM CONDUCTING
When ever a student is completed his course, an exam should be conducted, students
need to attend the exam properly. It’s an online exam. The results will be announced later after the
papers are evaluated by the faculties.
REPORTS
Different kind of reports is generated by the system.
Student Progress report Request.
Faculty performance report.
Time based and request attendance reports for the students.
AUTHENTICATION
Authentication is the process the where it provides security for application.The system
checks credentials whether the user is valid or not. If the user is valid system allows for authorization.
Otherwise system will throw back and gives message.
6. SYSTEM IMPLEMENTATION
Implementation is the stage of the project when the theoretical design is turned into a working
system. Implementation means converting a new or revised system design into an operational
condition. In this project Bug Tracking maintains NPR Arts and Science College, Dindigul,
implementation includes all these activities that the place to convert the new system.
The purpose of test plan is preparing it helps us to think through the efforts needed to validate
the acceptability of a software product. It will help people outside the test group to understand the
why and how of product validation and regulated environments, we have to have a written test plan.
The general testing process includes the creation of a test plan .We want a document that describes
the objectives, scope, approach and focus of the software testing effort. It includes test cases,
conditions, the test environment, a list of related tasks, pass/fail criteria, and risk assessment. One of
the outputs for creating a test strategy is an approved and signed off test plan document. The software
testing methodology a three step process and one of the steps is the creation of a test plan. We want
an opportunity to review the test plan with the project team. Test plans should be documented, so that
they are repeatable.
The purpose of training is to ensure that all the personal who are associate with the system
should possess the basic knowledge and skills. The end user must know in detail what their rules will
be how they can use the system and what the system will or will not do before the initialization of the
training the programmer materials are prepared for the users with description. The users are instructed
first, how to operate the system. User training also instructs individuals in trouble shooting system
determining whether problem arise due to any system failure or software failure or something that
they had one in using the system. The system will be implemented as soon as possible.
48
7. SYSTEM TESTING
Software testing is an important element of software quality assurance and represents the
ultimate review of specification, design and coding. It increasing visibility of software as a system
element and the costs associates with a software failure are motivating forces for all well planned
through testing .The system is tested with giving wrong information. Cascade deletion and, the
software developer checks updating. Testing and debugging are different activities, but debugging
must be accommodated in any testing strategy.
TYPES OF TESTING
UNIT TESTING
Unit testing is the important and major part of the project. So errors can be rectified easily in
each module and program clarity can be increased. In this project, the entire system is divided into
several modules and is developed individually. Hence, unit testing is conducted to individual
modules.
INTEGRATION TESTING
Integration testing is the systematic technique for constructing the program structure while
conducting tests to uncover errors associated with integrating. After the unit test, each module is
gradually integrated to form one final system. All the modules when unit tested will work properly
but after integrating the data can cause error one module can have an inadvertent, adverse effect on
another; sub functions when combined may not produce the desired major function; global data
structures can cause problems, etc. In this project the integration testing is performed by combing
login, civil registration and status modules are generated the report.
49
PERFORMANCE TESTING
A type of Physical test covering a wide range of engineering or functional evaluations where a
material, product, or system is not specified by detailed material or component specifications: rather,
emphasis is on the final measurable performance characteristics. Testing can be a qualitative or
quantitative procedure.
ACCEPTANCE TESTING
The User Acceptance testing focuses mainly on the functionality thereby validating the
fitness-for-use of the system by the business user. The users and application managers perform the
user acceptance test.
Test Results
All the test cases mentioned above passed successfully. No defects encountered.
50
8. CONCLUSION
It has been a great pleasure for me to work on this exciting and challenging project. This
project proved good for me as it provided practical knowledge of not only programming in ASP.NET
and C#.NET web based application and no some extent Windows Application and SQL Server, but
also about all handling procedure related with “Virtual Class Room”. It also provides knowledge
about the latest technology used in developing web enabled application and client server technology
that will be great demand in future. This will provide better opportunities and guidance in future in
developing projects independently.
BENEFITS:
The project is identified by the merits of the system offered to the user. The merits of this
project are as follows: -
51
Data storage and retrieval will become faster and easier to maintain because data is stored in a
systematic manner and in a single database.
Decision making process would be greatly enhanced because of faster processing of information
since data collection from information available on computer takes much less time then manual
system.
Allocating of sample results becomes much faster because at a time the user can see the records of
last years.
Easier and faster data transfer through latest technology associated with the computer and
communication.
Through these features it will increase the efficiency, accuracy and transparency,
LIMITATIONS:
The size of the database increases day-by-day, increasing the load on the database back up and
data maintenance activity.
Training for simple computer operations is necessary for the users working on the system.
Data storage and retrieval will become faster and easier to maintain because data is stored in a
systematic manner and in a single database.
Decision making process would be greatly enhanced because of faster processing of information
since data collection from information available on computer takes much less time then manual
system.
Allocating of sample results becomes much faster because at a time the user can see the records of
last years.
Easier and faster data transfer through latest technology associated with the computer and
communication.
Through these features it will increase the efficiency, accuracy and transparency,
52
9. FUTURE ENHANCEMENT
This System being web-based and an undertaking of Cyber Security Division, needs to be
thoroughly tested to find out any security gaps.
A console for the data center may be made available to allow the personnel to monitor on the
sites, which were cleared for hosting during a particular period.
Moreover, it is just a beginning; further, the system may be utilized in various other types of
auditing operation viz. Network auditing or similar process/workflow based applications.
53
10.BIBILIOGRAPHY
Reference Books
Eilas awared “SYSTEM ANALYSIS DESIGN” and Tata Mcgraw hill publication sixth
edition, 2003
Reference Websites
www.asp.net
www.microsoft.com
www.codeproject.com
www.c-sharpcorner.com
www.programmersheaven.com
www.w3schools.com
54
11. APPENDIX
SCREENSHOTS
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
SAMPLE CODE
using System;
using System.Collections;
using System.Configuration;
using System.Data;
using System.Linq;
using System.Web;
using System.Web.Security;
using System.Web.UI;
using System.Web.UI.HtmlControls;
using System.Web.UI.WebControls;
using System.Web.UI.WebControls.WebParts;
using System.Xml.Linq;
using System.Data.SqlClient;
}
catch (Exception ex)
{
}
}
if (e.CommandName == "video")
{
70
datalistvideo.DataSource =
Cls_NewsLetterMaster.showLectureMasterDetailsDownloading(id);
datalistvideo.DataBind();
}
else if (e.CommandName == "Audio")
{
datalistvideo.DataSource =
Cls_NewsLetterMaster.showLectureMasterDetailsDownloading(id);
datalistvideo.DataBind();
}
else if (e.CommandName == "Assignment")
{
ds = Cls_NewsLetterMaster.showLectureMasterDetailsDownloading(id);
if (ds.Tables[0].Rows.Count != 0)
{
int i = 0;
if (FileExtention == ".DOC" || FileExtention == ".DOCX")
{
Response.ContentType = "application/vnd.ms-word";
Response.AddHeader("content-disposition", "inline;filename=" + FileName);
i = 1;
}
if (i == 1)
{
Response.Charset = "";
Response.Cache.SetCacheability(HttpCacheability.NoCache);
Response.BinaryWrite(FileContent);
Response.End();
}
else
lblMsg.Text = "Problom in downloading the file..";
}
}
else if (e.CommandName == "Document")
{
ds = Cls_NewsLetterMaster.showLectureMasterDetailsDownloading(id);
if (ds.Tables[0].Rows.Count != 0)
71
{
int i = 0;
if (FileExtention == ".DOC" || FileExtention == ".DOCX")
{
Response.ContentType = "application/vnd.ms-word";
Response.AddHeader("content-disposition", "inline;filename=" + FileName);
i = 1;
}
if (i == 1)
{
Response.Charset = "";
Response.Cache.SetCacheability(HttpCacheability.NoCache);
Response.BinaryWrite(FileContent);
Response.End();
}
else
lblMsg.Text = "Problom in downloading the file..";
}
}
else if (e.CommandName == "PowerPoint")
{
ds = Cls_NewsLetterMaster.showLectureMasterDetailsDownloading(id);
if (ds.Tables[0].Rows.Count != 0)
{
int i = 0;
if (FileExtention == ".PPT")
{
Response.ContentType = "application/mspowerpoint";
Response.AddHeader("content-disposition", "inline;filename=" + FileName);
72
i = 1;
}
if (i == 1)
{
Response.Charset = "";
Response.Cache.SetCacheability(HttpCacheability.NoCache);
Response.BinaryWrite(FileContent);
Response.End();
}
else
lblMsg.Text = "Problom in downloading the file..";
}
}
lblMsg.Text = ex.Message;
}
}
}
using System;
using System.Collections;
using System.Configuration;
using System.Data;
using System.Linq;
using System.Web;
using System.Web.Security;
using System.Web.UI;
using System.Web.UI.HtmlControls;
using System.Web.UI.WebControls;
using System.Web.UI.WebControls.WebParts;
using System.Xml.Linq;
73
}
}
protected void grdCourseDetails_RowCommand(object sender,
GridViewCommandEventArgs e)
{
try
{
int CourseId = Convert.ToInt32(e.CommandArgument);
clsCourses objCour=new clsCourses ();
DataSet ds = objCour.GetCoursesDetailsByCourseId(CourseId);
byte[] FileContent = (byte[])ds.Tables[0].Rows[0][5];
string FileName = (string)ds.Tables[0].Rows[0][4];
string[] fileSplit = FileName.Split('.');
int Loc = fileSplit.Length;
string FileExtention = "." + fileSplit[Loc - 1].ToUpper();
int i = 0;
if (FileExtention == ".DOC" || FileExtention == ".DOCX")
{
Response.ContentType = "application/vnd.ms-word";
Response.AddHeader("content-disposition", "inline;filename=" + FileName);
i = 1;
}
else if (FileExtention == ".XL" || FileExtention == ".XLS" || FileExtention ==
".XLSX")
{
Response.ContentType = "application/vnd.ms-excel";
Response.AddHeader("content-disposition", "inline;filename=" + FileName);
i = 1;
}
else if (FileExtention == ".PDF")
{
Response.ContentType = "application/pdf";
Response.AddHeader("content-disposition", "inline;filename=" + FileName);
i = 1;
}
else if (FileExtention == ".TXT")
{
Response.ContentType = "application/octet-stream";
Response.AddHeader("content-disposition", "inline;filename=" + FileName);
i = 1;
}
if (i == 1)
{
Response.Charset = "";
74
Response.Cache.SetCacheability(HttpCacheability.NoCache);
Response.BinaryWrite(FileContent);
Response.End();
}
else
lblMsg.Text = "Problom in downloading the file..";
}
catch (Exception ex)
{
lblMsg.Text = "Problom in downloading the file.." + ex.Message;
}
}
}
using System;
using System.Collections;
using System.Configuration;
using System.Data;
using System.Linq;
using System.Web;
using System.Web.Security;
using System.Web.UI;
using System.Web.UI.HtmlControls;
using System.Web.UI.WebControls;
using System.Web.UI.WebControls.WebParts;
using System.Xml.Linq;
void ClearData()
{
try
{
txtAddress.Text = "";
txtDOB .Text = "";
txtEmailid.Text = "";
txtFname .Text = "";
txtMName.Text = "";
txtLname .Text = "";
txtLname .Text = "";
txtPassword.Text = "";
txtPhoneNo.Text = "";
txtUserName.Text = "";
BrowseImage1.LoadDefaultImage();
if (ddlCourseId.SelectedIndex != 0)
ddlCourseId.SelectedIndex = 0;
}
catch (Exception ex)
{
76
lblMsg.Text = ex.Message;
}
}
}
catch (Exception ex)
{
lblMsg.Text = ex.Message;
}
}
}
using System;
using System.Collections;
using System.ComponentModel;
using System.Data;
using System.Drawing;
using System.Web;
using System.Web.SessionState;
using System.Web.UI;
using System.Web.UI.WebControls;
using System.Web.UI.HtmlControls;
namespace SuperJockey
{
/// <summary>
77
/// Summary description for TheChatScreenWin.
/// </summary>
public partial class TheChatScreenWin : System.Web.UI.Page
{
protected void Page_Load(object sender, System.EventArgs e)
{
string sDealer="1";
/// <summary>
/// Required method for Designer support - do not modify
/// the contents of this method with the code editor.
/// </summary>
private void InitializeComponent()
{
}
#endregion
}
}
78