You are on page 1of 69

CONTENTS

1. Introduction

1.1 Feasibility Study


2. System Analysis
2.1 Existing System

2.2 Proposed System

3. System Specification
3.1 Visual Studio 2005

3.2 Ms Access 2005

3.3 Software Requirement

3.4 Hardware Requirement

3.5 About The Operating System

4. System Design

4.1 System Flow Design

4.2 Data Base Design

4.3 Input Design

4.4 Output Design

5. Project Description

6. System Testing

7. System Implementation

8. Appendix

8.1 Sample Source Codes


8.2 Sample Screen Outputs

9. Future Enhancement

13. Conclusion
14. Bibliography
SYNOPSIS
Credit cards provide a convenient way to handle business transactions such as
conference registration, the purchase of course materials, or the purchase of meals at a
campus dining facility. Acceptance of credit cards is subject to the Payment Card
Industry Data Security Standards for safeguarding cardholder account numbers and other
sensitive data. It is also in the University’s best interest to facilitate the transfer of credit
card transaction data to its financial systems. The purpose of this policy is to establish
guidelines for credit card acceptance and processing. we present a Hidden Markov Model
(HMM).Which does not require fraud signatures and yet is able to detect frauds by
considering a cardholder’s spending habit.
Card transaction processing sequence by the stochastic process of an HMM. The
details of items purchased in Individual transactions are usually not known to an FDS
running at the bank that issues credit cards to the cardholders. Hence, we feel that HMM
is an ideal choice for addressing this problem. Another important advantage of the HMM-
based approach is a drastic reduction in the number of False Positives transactions
identified as malicious by an FDS although they are actually genuine. An FDS runs at a
credit card issuing bank. Each incoming transaction is submitted to the FDS for
verification. FDS receives the card details and the value of purchase to verify, whether
the transaction is genuine or not. The types of goods that are bought in that transaction
are not known to the FDS. It tries to find any anomaly in the transaction based on the
spending profile of the cardholder, shipping address, and billing address, etc.This project
including the following modules.
 New Card
 Login
 Transaction
 Verification
 Security
1. INTRODUCTION

The existing system, the fraud is detected after the fraud is done that is, the fraud
is detected after the complaint of the card holder. And so the card holder faced a lot of
trouble before the investigation finish. And also as all the transaction is maintained in a
log, we need to maintain a huge data. And also now a days lot of online purchase are
made so we don’t know the person how is using the card online, we just capture the IP
address for verification purpose. So there need a help from the cyber crime to investigate
the fraud. To avoid the entire above disadvantage we propose the system to detect the
fraud in a best and easy way. In proposed system, we present a Hidden Markov Model
(HMM).Which does not require fraud signatures and yet is able to detect frauds by
considering a cardholder’s spending habit. Card transaction processing sequence by the
stochastic process of an HMM. The details of items purchased in Individual transactions
are usually not known to an FDS running at the bank that issues credit cards to the
cardholders. Hence, we feel that HMM is an ideal choice for addressing this problem.
Another important advantage of the HMM-based approach is a drastic reduction in the
number of False Positives transactions identified as malicious by an FDS although they
are actually genuine. An FDS runs at a credit card issuing bank. Each incoming
transaction is submitted to the FDS for verification. FDS receives the card details and the
value of purchase to verify, whether the transaction is genuine or not. The types of goods
that are bought in that transaction are not known to the FDS. It tries to find any anomaly
in the transaction based on the spending profile of the cardholder, shipping address, and
billing address, etc.
1.1 FEASIBILITY STUDY

A feasibility study is a preliminary study undertaken to determine and document a


project's viability. Also known as feasibility analysis .The term feasibility study is also
used to refer to the resulting document. The results of this study are used to make a
decision whether or not to proceed with the project. If it indeed leads to a project being
approved, before the real work of the proposed project starts be used to ascertain the
likelihood of the project's success. It is an analysis of possible alternative solutions to a
problem and a recommendation on the best alternative. It, for example, can decide
whether an order processing be carried out by a new system more efficiently than the
previous one.

A feasibility study is an important part of creating a business plan for a new enterprise,
since it has been estimated that only one idea in fifty is commercially viable. If a project
is seen to be feasible from the results of the study, the next logical step is to proceed with
it. The research and information uncovered in the feasibility study will support the
detailed planning and reduce the research time.

Components of Feasibility
This involves questions such as whether the technology needed for the system exists, how
difficult it will be to build, and whether the firm has enough experience using that
technology. The assessment is based on an outline design of system requirements in
terms of Input, Processes, Output, Fields, Programs, and Procedures. This can be
quantified in terms of volumes of data, trends, frequency of updating, etc in order to
estimate if the new system will perform adequately or not. Three considerations are
involved in the feasibility analysis. They are Technical Feasibility, Operational
Feasibility and Economical Feasibility.
1. Technical feasibility:
The technical issues usually raised during the feasibility stage of the investigation
include these:
a. Does the necessary technology exist to do what is suggested!
b. Does the proposed equipment have the technical capacity to hold the data required
to use the new system!
c. Will the proposed system provide adequate responses to inquiries, regardless of
the number or location of users!
d. Can be system be expanded if developed!
e. Are the technical guarantees of accuracy, reliability, ease of access, and data
security!
Yes, by using the current technology this software can be developed and also the
Visual basic.NET framework is made to be installed.

2. Economic Feasibility:

The financial and economic questions raised by analysts during the preliminary
investigation are for the purpose of estimating the following:
a. The cost to conduct a full system investigation
b. The cost of hardware and software for the class of application being considered.
c. The benefits in the form of reduced costs or fewer costly errors .
d. The cost if nothing changes (i.e., the proposed system is not developed).

As this is a simple project, there is no such cost is required. Except the cost that is
needed for the Local Cable wire that has to be connected. From one system to another
the LAN wire is made to be connected and from that only the Internet Protocol is
made to be called. Whereas, the information is made to be transferred and also
retrieved.

The cost to hardware is the cable wire and the cost towards software side is
Visual .NET Framework.
3. Operational Feasibility:

Proposed projects are beneficial projects only if they can be turned into information
systems that will meet the organization’s operating requirements. Simply stated, this
test of feasibility asks if the system will work when it is developed and installed.
Will the system be used if it is developed and implemented? Will there be resistance
from users that will undermine the possible application benefits?

Issues that appear to be relatively minor in the beginning have ways of growing into
major problems after implementation. Therefore all operational aspects must be
considered carefully. Operational feasibility is looked at the view of proposed
solution fitting with the current operations. This test of feasibility asks,

1 How long the system will work when it is developed and installed.
2 How will the solution affect the end-users work environment?

The end users work environment is equipped with this software. Hence it is
behaviorally feasible
2. SYSTEM ANALYSIS

3.1 Existing System:

The existing system is a manual system. It is done with some important

constraints, they are volume of data, time consuming, and Calculations with errors

etc. The large volume of data has to be handled with regard to various

transactions. Number of documents is to be referred to access any information

about any audit. A lot of validation work is to be done. These processes are time

consuming and tedious. Any changes made at any point have to incorporate with

the whole system and are really cumbersome. Preparing any report is the most

daunting task.

Draw Backs:

1 Higher Cost.

2 Lower Quality.

3 Low Productivity.

In order to overcome these hurdles the computerized is suggested.

3.2 Proposed System:


The proposed system rectifies most of the problem in the present system. The system

is menu driven which guarantees the ease of use even for native users. The most

important aspect of the new system is that it is flexible to incorporate the changes,

error free. Calculations etc. data validation is done during data entry itself so that the

errors are minimized. Reports can be generated for any audit process for given two

dates. These reports make the function of the management an easier. Reports

generation facilities are provided to all users. An authorized person will maintain

master data.

The main features are:

1 Data sharing with other agencies.

2 Better Resource Allocation/Distribution.

3 Access to historical information.

4 Data mining; permanent resolution.

5 Lower Cost.

6 Higher Quality.

7 High Productivity.
3. SYSTEM SPECIFICATION

3.1 VISUAL STUDIO 2005

Microsoft .Net (formerly known as Next Generation Windows Services, NGWS)


is the umbrella term for the Microsoft’s strategy to move from a client-centric model to a
network-centric model. It can be best described as the initiative that will allow the
Internet to be the basis of a new operating system. It frees us from the constraints of
hardware by making user data available from the Internet. It is important to developers
because it will change the way they develop applications by allowing them to hook onto
Web Services.

The vision of .Net is globally distributed systems that use XML as the universal
glue to allow functions running on different computers across an organization or across
the world to come together in a single application. In this vision, systems from servers to
wireless palmtops will share the same general platform, with versions of .Net available
for them, and with each of them able to collaborate with others. The .Net also aims to
make traditional business applications easier to develop and deploy.

.Net Platform

The .Net platform is the developer’s perspective of .Net wherein he/she


views .Net as an amalgam of a set of services, specifications, guidelines and tools for
incorporating the .Net vision. It includes the .Net infrastructure and tools to build and
operate a new generation of smart Internet devices.

.Net Products

The .Net products will include a whole range of tools and servers that rely on
XML as a language to describe data and SOAP (Simple Object Access Protocol) as
protocol for transmission of data between products.
This includes Microsoft Windows .Net, MSN .Net, personal subscription services,
Microsoft Office .Net, Microsoft Visual Studio .Net and Microsoft Central for .Net.

.Net Framework

The .Net framework is an environment for building, deploying and running web
services and other applications. Microsoft .Net framework is a standard that aims at
integrating web applications and services development using open web standards such as
HTTP and XML.

It goes beyond development to enable deployment and maintenance of web


applications and services along with handling their scalability and reliability. It consists
of three main parts:

1 The Common Language Runtime

2 The Framework Classes of Unified Programming Classes

3 ASP.Net

Common Language Runtime (CLR)

The .Net Framework provides a runtime environment called Common Language


Runtime, which manages the execution of code and provides services that make the
development process easier. Compliers and tools expose the runtime’s functionality and
enable you to write code that benefits from this managed execution environment.

ASP.NET

The first attempt at providing user interaction in web pages was through Server-
Side scripts. The Client browser would send a request to the server. A script on the
server would process the request and send the results back to the client browser.

A popular option available to web application to developers today is Active


Server Pages. Active Server pages are a server side scripting environment. The latest
version of ASP is ASP.net. ASP.net has come to us along with in .NET framework.
ASP.Net is an object oriented server side-scripting tool. Hence it facilitates easy
development of object oriented and granularized code.

ASP.Net supports strongly typed languages like VB, C# and much more.
ASP.NET pages get compiled instead of being interpreted, thus their execution speed is
faster than ASP pages. It provides server controls that are declarative. Thus the number
of lines of code to be written is reduced. ASP.net supports reuse of code by the
mechanism of inheritance. It has an inbuilt method called Trace, which helps in
debugging a page.

ASP.NET improves performance by using server-side caching. It allows to cache


the entire output of a page for reuse by other clients. Additional events have been added
to the initialization file called the global.asax file. Global.asax is a file that contains
settings for configuring the application

3.2 MS ACCESS 2005

A Database is similar to a data file in that it is a storage place for data. Like a data
file, a database does not present information directly to a user; the user runs an
application that access data from the database and presents it to the user in an
understandable format

Database systems are more powerful than data files. The data is more highly
organized. In a well designed database, there are no duplicate pieces of data that the user
or application has to update at the same time. Related pieces of data are grouped together
in a single structure or record, and relationships can be defined between these structures
and records. When working with data files, an application must be coded to work with
the specific structure of each data file. In contrast, a database contains a catalog that
applications use to determine how data is organized.

Generic database applications can use the catalog to present users with data from
different database dynamically, without being tied to a specific data format. A database
typically has two components: the files holding the physical database and the Database
Management System (DBMS) software that applications use to access data. The DBMS
is responsible for enforcing the database the database structure, including:

1 Maintaining the relationships between data in the database.

1 Ensuring that data is stored correctly and that the rules defining data
relationship are non- violated.

1 Recovering all data to appoint of known consistency in case of system


failures

RELATIONAL DATABASE

There are different ways to organize the data in a database but relational database
are one of the most effective. Relational database systems are an application of
mathematical set theory to the problem of effectively organizing data. In a relational
database, data is collected in to tables (called relations in relational theory).

A table represents some class of objects that are important to an organization. For
example, a company may have a database with a table for employee, another table for
customers. Each table comprises columns and rows. Each column represents some
attribute of the object. For example, an employee would typically have columns for first
name, last name, employee ID, department, pay grade and job title. Each row represents
an instance of the object represented by the table.

1 Print servers

Manage the printers used by a team or unit.

2 File servers

Store large files used by a team or unit by using large disk drives.

In client/server database architecture, the database files and DBMS software


reside on a server. A communication component is provided to application can run on
separate clients and communicate to the database server over a network. The SQL
server communication component also allows communication between an application
running on the server and SQL Server.

Structured Query Language


To work with data in a database, use a set of commands and statements
(language) defined by the DBMS software. There are several different languages that
can be used with relational databases; the most common is SQL. Both the American
National Standard Institute (ANSI) and the International Standards Organization
(ISO) have defined standards for SQL. Most modern DBMS products support the
Entry level of SQL-92, the latest SQL standard (published in 1992).

1 Ease of installation, deployment, and use

SQL Server includes a set of administrative and a development tool that


improves the ability to install, deploy, manage, and use SQL Server across several
sites.

2 Scalability

The same database engine can be used across platforms ranging from
laptop computers running Microsoft Windows 95/98 to large, multiprocessor
servers running Microsoft Windows NT, Enterprise Edition.

Data warehousing

SQL Server includes tools for extracting and analyzing summary data for
online analytical processing (OLAP). SQL Server also includes tools for visually
designing databases and analyzing data using English-based questions.

3 System integration with other server software

SQL Server integrates with e-mail, the Internet, and Windows


3.3 HARDWARE CONFIGURATION

Processor : Pentium IV 2.4GHZ MHz


Mother Board : Intel 845 GVSR
RAM : 2 GB
Hard Disk : 500 GB
Key board : Samsung keyboard
Monitor : LG 17” Monitor 1024*768 pixels
Mouse : Samsung Optical Mouse

3.4 SOFTWARE CONFIGURATION

Operating system : Windows XP Sp2


Web Server : IIS 5.0
Server Side Script : ASP.NET
Front End : C#
Back End : MS-ACCESS
IDE : VS.Net Framework 2005
3.5 ABOUT THE OPERATING SYSTEM

Windows XP is a full-fledged operating system. Windows XP Professional, you


have faster access to information, and you are able to accomplish tasks more quickly and
easily. You and your network administrations can work more efficiently now, because
many of the most common computer-management tasks are automated and streamlined.
It is possible to use another operating system on your computer along with Windows XP.

Windows XP supports a feature called dual-boot or multiple-boot. Using this,


Windows XP will ask you which operating system you want to use. But to install another
operating system, you will need a separate partition, which will look a separate drive in
My Computer.

Windows 2003 Server

It is a good for small sized to medium sized application deployment, Web


Servers, workgroups, and branch offices. Windows 2003 Server supports uni-processor
systems and 4-way Symmetric Multi Processing (SMP) systems with up to 4 Giga Bytes
(GB) of physical memory.

Windows 2003 Advanced Server

More powerful server operating system, providing a comprehensive clustering


infrastructure for high availability and scalability, supporting memory up to 8 GB. It is
designed for demanding enterprise applications. Advanced server supports new systems
with up to 8-way SMP. A more advanced department and applications server ideal for
large, database-intensive applications.

Windows 2003 Data Center Server

A specialized high-end version of Windows 2000 server, supporting up to 32-


way SMP and up to 64 GB of physical memory. This server product is targeted at large
data warehouses, econometric analysis, large-scale simulations in science and
engineering, On-Line Transaction Processing (OLTP) and server consolidation projects.

Hardware Requirement for Windows XP Professional

To use Windows XP Professional you should have:

1 A Pentium II Processor

2 500 MB of free hard disk space.

3 64 MB of RAM.

If your computer doesn’t meet the minimum requirements then you have to beef-
up your system before you switch to Windows XP.

What’s new in Windows XP Professional?

1 . Easier to use

2 . Easier to manage

3 . Latest Hardware Support

4 . More Reliable

5 . More Secure
4. SYSTEM DESIGN

4.1 INPUT DESIGN

Input design is the process of converting user-originated input to a computer


based format. The main objective of input design is to specify how information is put into
a form that is acceptable to the computer. The files and databases are maintained through
the timely and accurate input of data understandable to the user

In this project the form are designed to give the input even by the unknown users.
The labels are to easily understandable. If users don’t give the input in one text, then the
cursor won’t move to the next text and one message will display, which instruct the user
to give input to that text.

Feature of Input Design

 Easy Data Input.


 User Friendliness.
 Consistent Format.
 Interactive Dialog, Message and prompts.
 Users can it Efficient and Effectively.

4.2 OUTPUT DESIGN


The primary consideration in the output design is to arrange the data in a
form convenient to the user. It is the process of designing necessary outputs based on the
user requirements. Outputs are already noted in the DFDs: They are the face of the
system to the outside world.

Considerations while Designing the Outputs

 Authentication must be provided to deny anonymous users.


 Arrange the information in acceptable format.
 Decide whether the output to be displayed or printed or provided to another
module.

External Reports or Documents

 Better quality to send to customers or clients


 Can be turned around and used as inputs elsewhere
 Filter to remove internal/secret/incomplete data

Internal Reports and Documents

 May be reports, summaries, informational updates


 May be short/summarized or long/detailed
 May include historical information
 Some may be ad hoc (enable this with user query/report design features)
 Raw reports might be just SQL queries.
4.3 SYSTEM FLOW DESIGN
Credit Card Security System

USER ADMIN

LOGIN
LOGIN

ADD NEW
SHOPPING PRODUCT

ADD NEW CARD


VERIFICATION

BLOCK SECURITY

TRANSACTION UNBLOCK
DETAILS
DATA FLOW DIAGRAM

LOGIN

Check
Get Username and Username
Password from User and Login
Password

Valid

Load Main page


Invalid
REGISTRATION

Process
Get information from user
the user informatio
n

Valid

Invalid

Save user
informatio
n
Login

Job_seek
er_registe
r
ADD NEW PRODUCT DETAILS

Get Product Details Check


B New
from User Employee
branch
product
details
ID

Available
Not Available

Add
New
product
Details

New Product
SEARCH NEW PRODUCT

Search
Product
Select Product Id ID New Product

Display
Search result
Not Found Found
ADD NEW USER

Get User Details Process New User


from the user Payroll

Valid

Invalid
Add New
User

New User
SEARCH NEW USER

Search Card
details New User
Select Cardno

New user
Display
Search result
Not Found

Found
ADD CARD DETAILS

Get card details from Process


the user Card Details
Card
Details

Valid

Invalid
Add Card
Details

Card Details
SEARCH CARD DETAILS

Search Card
details Card Details
Select Cardno

Card Details
Display
Search result
Not Found

Found
ADD SECURITY DETAILS

Process
Get Security details
Security
from the user Security
details

Valid

Invalid
Add
Security
Details

Security
SEARCH SECURITY DETAILS

Search
Security Security
Select CardNo details

Display Security
Search result
Not Found

Found
4.4 DATABASE DESIGN

Login

Firstname varchar 20

Lastname varchar 20

Username varchar 50

Password varchar 20

EmailID varchar 50

Location varchar 200

SecurityQuestion varchar 500

Answer varchar 200

Card Issue

CardNo varchar 50

Account no varchar 50

Bank Name varchar 15

Account Holder Name int 2

Address date 15

Creditlimit varchar 25
New Product

ProductId varchar 50

ProductName varchar 50

Price Decimal 10

New User

CardNo varchar 50

Dateof Birth varchar 50

FirstName varchar 10

Gender varchar 10

Lastname varchar 10

Address varchar 10

Loginname varchar 10

Password varchar 10

City varchar 10

State varchar 10

Country varchar 10

Email varchar 10

MobileNo varchar 10
Landline varchar 10

Pincode varchar 10

Security

CardNo varchar 50

Q1 varchar 50

A1 varchar 30

Q2 varchar 30

A2 varchar 30

Q3 varchar 30

A3 varchar 30

Q4 varchar 30

A4 varchar 30

Q5 varchar 30

A5 varchar 30

Email varchar 30
Shopping

CardNo varchar 50

Product varchar 50

Quantity varchar 30

Price varchar 30

5. PROJECT DESCRIPTION

PROJECT MODULES

 New Card
New cardholder registers his card details, user information and security
information. The security information includes security question answer and some
confidential information. The security question is raised when verification for any
transaction is done.

 Login
The main task of this module is to allow only authorized users to login.
Registered cardholder can only login, registered cardholder can view their profile.
Cardholder can edit their profile. The cardholder can view their transaction
details.

 Transaction
Cardholder when buys any product the place of transaction and amount of the
transaction is taken into account for knowing the spending profile of the previous
transactions of the cardholder. New transaction is compared with the spending
profile of the previous transaction and if any abnormality is found then the
transaction is sent for verification.
 Verification
In this module security questions are raised for verifying the genuine cardholder.
If any of the security question’s answer is incorrect then the transaction is aborted
and the card is blocked. The cardholder is intimated that his card is blocked.

 Security
Security question and answer for each cardholder is stored in the database.
When the cardholder enters the answers for verification, the answers are checked
with the answers stored in database while registration.
6. SYSTEM TESTING
Objective of Testing

Testing, which consumes a considerable amount of the development time, is


essential in improving the reliability of the system and in identifying further refinements
to the system. Testing allows detection of design faults, if any, which can be rectified.
The first test of a system is to see whether it produces the correct output. Proper choice of
test data is as important as the test itself in this phase of testing. If the test data given as
input are not valid are representative of the data to be provided then the user suspects the
reliability of the output.

Test data may be artificial (created solely for test purpose) or live (representing
actual data that the user will provide). Properly created data should provide all
combination of values and formats and make it possible to test all logical paths that the
system can take. These data should take care of all analysis like worst-case analysis, best-
case analysis, etc. unlike live data, which are biased toward typical values artificial data
provide extreme values for testing the limits of the system.

TESTING PLAN
Code testing and specification testing

Code testing and specification testing are the two general strategies used for
testing software. In code testing, the logic of the program is examined i.e., every
instruction in the program is executed using test cases. Although code testing seems ideal
for testing software, it fails to uncover all the software errors. Moreover this test does not
check whether the code meets all its specifications. For this reason the specification test
is carried out.

In specification testing, the specifications stating what the program should do and
how it should perform under various conditions are examined. To carry out this test, test
cases are developed for each condition or combination of conditions and submitted for
processing. The result of the processing is analyzed to determine whether the program
performs according to its specified requirements.
Levels of Testing

Whichever testing strategy is followed, both unit and system testing needs to be

performed.

Unit Testing:

In unit testing, each module of the software is tested independently to locate

errors in them. This ensures that the module functions properly as a unit. This enables the

tester to look out for errors in the coding and logic of that particular alone. The following

steps are carried out to ensure the validity of each module. The module interface is tested

to ensure that information flows properly into and out of the program under test.

The local data structures are examined to ensure that the data stored temporarily

or permanently maintain their integrity. Boundary conditions are tested to ensure that the

module operates properly at the boundaries. All the independent logical paths that the

program takes are exercised to ensure that all statements in a module have been tested.

All error-handing paths are also tested.

Unit testing focuses on verification and validations effort on the smallest unit of

software design (i.e.) the module.


Integrated Testing

The objective of the integrated testing is to take all the unit tested modules and
combine them into a single, integrated whole and test this resultant product. This testing
enables the tester to ensure that the main model has been designed as dictated by the
software specifications. In this project all unit tested modules are combined and tested
whether perfectly integrated or not using the concept of test driver and stubs concept in a
top down integration.

System Testing

Implementing software testing in a structured manner involves the preparation of


well-designed test plans and test cases for checking the functionality of the software.
Though mechanisms like automation of test cases for increasing the efficiency of testing
are available that critical success or success factors of an effective testing lies the test
plan and test case design to meet the objective of testing.

Recovery testing:

The recovery testing is a system testing that forces the software to fail in a variety
of ways and verifies that recovery is properly performed. (While running the software, if
there is no proper connection to the back end, error message will be fired and on
debugging this error could be detected and rectified).
7. SYSTEM IMPLEMENTATION

IIS (Internet Information Server)

IIS is a group of Internet server (web or HTTP, FTP and Gopher) and other
capabilities for Microsoft Windows NT server operating system. IIS is Microsoft bid to
dominate the Internet server market that is also addressed by Netscape, Sun
Microsystems and other. With IIS, Microsoft includes a set of programs for building and
administrating web site, a search engine and support for writing web based applications
that access database. Microsoft points out that IIS is a tightly integrated with the
Windows NT server with a number of ways, resulting in faster web page services.
A typical company that buys IIS can create pages for web sites using Microsoft
Front Page product (with its WYSIWYG user interface). Web developers can use
Microsoft Active server pages (ASP) technology, which means that applications
including Active X control can be embedded web pages that modify the content sent back
to users. Developers can also write programs that filter request and get the correct web
pages for different users by using Microsoft ISAPI interface. ASP’s and ISAPI programs
run more efficiently that common gateway interface (CGI) and server side interface (SSI)
programs, for current technologies.
Microsoft includes special capabilities for server administrators designed to
appeal to Internet service providers (ISP’S). It includes a single window (or “console”)
from which all services and users can be administrated. It’s designed to be easy to add
components as “snap-ins” that you didn’t initially install. Individual customers can
customizes the administrative windows for access,
IIS includes security features and promises that is easy to install. It works closely
with the Microsoft Transaction server to access databases and provides control at the
transaction level. It also work with Microsoft‘s NET show in the delivery of streaming
audio and video, delayed or live. Internet Information Server 4.0 and windows NT server
4.0 provides the best platform for developing your website.
Microsoft Internet Information server (IIS) is the only World Wide Web server
that is tightly integrated with the Microsoft Windows NT server operating system and is
designed to deliver the wide range of internet and intranet server capabilities. By
optimizing around the Windows NT server platform, internet information server delivers
high performance excellent security ease of management and is up and running in
minutes. It serves as best platform for both integrating with existing solutions and for
delivering a new generation of web applications.
Microsoft Internet Information server has established a reputation for speed, ease
of operation, and unparallel integration with Windows NT server. IIS 4.0 makes I even
easier to create rich and dynamic content and to build server based web applications and,
because it is integrated with windows NT server, you can have a website up and running
in minutes. IIS 4.0 is an upgrade to IIS 3.0 and includes the following functionalities:
Active server page (ASP) is an open, compile free application environment that
allows organization to combine HTML, scripts and Active X sever components to easily
build powerful web based applications. Active server pages include native support for
VB script and J script. Active server page will enable many more people to create server
side web application for the first time.
Microsoft Index Server is an integrated search engine that provides full text
indexing and querying of documents in any format. It includes built in support for
HTML, text, and Microsoft office documents. Index Server enables users to quickly
locate specific information on their Intranet or Internet sites.
Microsoft Transaction Server is a component-based transaction processing system
for developing deploying and managing high performance, scalable, and robust
enterprise, Internet, and intranet server application- programming model for developing
distributed component-based applications. Microsoft News Server for IIS 4.0 uses
Network News Transport Protocol (NNTP) command to define the communication
between hosts.

8. APPENDIX

8.1 SAMPLE SOURCE CODES

Database.cs

using System;
using System.Collections.Generic;
using System.ComponentModel;
using System.Data;
using System.Drawing;
using System.Linq;
using System.Text;
using System.Windows.Forms;
using System.Data.OleDb;
/// <summary>
/// Summary description for Database
/// </summary>
public class Database
{
public string sqlconn;
public string str;
public OleDbDataAdapter oda;
public OleDbCommand cmd;
public DataTable dt;
public OleDbDataReader dr;
// public DataSet ds;
OleDbConnection conn;
public string app_path;
// public string conString = "server=ABC-7369CB00819\\
SQLEXPRESS;Initial Catalog=OFFICE;trusted_connection=true;connection
timeout=60";
public bool insert_data(OleDbCommand cmd)
{
app_path = Application.StartupPath;
string str;
str = "Provider=Microsoft.Jet.OLEDB.4.0;Data Source=" + app_path
+ "\\CallCenter.mdb;Persist Security Info=False";
conn = new OleDbConnection(str);
cmd.CommandType = CommandType.StoredProcedure;
cmd.Connection = conn;
conn.Open();
cmd.ExecuteNonQuery();
conn.Close();
return (true);
}
public bool insert_data_string(string qry)
{
app_path = Application.StartupPath;
string str;
str = "Provider=Microsoft.Jet.OLEDB.4.0;Data Source=" + app_path
+ "\\CallCenter.mdb;Persist Security Info=False";
conn = new OleDbConnection(str);
OleDbCommand cmd = new OleDbCommand(qry, conn);
conn.Open();
cmd.ExecuteNonQuery();
conn.Close();
return (true);
}
public DataTable select_data(string s)
{
app_path = Application.StartupPath;
string str;
str = "Provider=Microsoft.Jet.OLEDB.4.0;Data Source=" + app_path
+ "\\CallCenter.mdb;Persist Security Info=False";
conn = new OleDbConnection(str);
conn.Open();
oda = new OleDbDataAdapter(s, conn);
dt = new DataTable();
oda.Fill(dt);
return (dt);
}
public void cmd_select_Data(string qry)
{
app_path = Application.StartupPath;
string str;
str = "Provider=Microsoft.Jet.OLEDB.4.0;Data Source=" + app_path
+ "\\CallCenter.mdb;Persist Security Info=False";
conn = new OleDbConnection(str);
conn.Open();
OleDbCommand cmd = new OleDbCommand(qry, conn);
dr = cmd.ExecuteReader();
}
}

Add new product

using System;
using System.Collections.Generic;
using System.ComponentModel;
using System.Data;
using System.Drawing;
using System.Linq;
using System.Text;
using System.Windows.Forms;

namespace CreditCard
{
public partial class AddNewProduct : Form
{
public AddNewProduct()
{
InitializeComponent();
}
Database obj = new Database();
string sql;
public void ProductID()
{
string code_id = "";
int temp;
sql = "select count (ProductID) from NewProduct";
obj.select_data(sql);
if (obj.dt.Rows[0][0].ToString() == "")
{
code_id = "P-0001";
}
else
{
temp = int.Parse(obj.dt.Rows[0][0].ToString());
temp++;
int len = temp.ToString().Length;
if (len == 1)
{
code_id = "P-000" + temp;
}
else if (len == 2)
{
code_id = "P-00" + temp;
}
else if (len == 3)
{
code_id = "P-0" + temp;
}
else
{
code_id = "P-" + temp;
}
}
txtid.Text = code_id;
}
private void btnSubmit_Click(object sender, EventArgs e)
{
try
{
if(txtid.Text ==""||txtname.Text ==""||txtprice.Text
=="")
{
MessageBox.Show ("Fill All records");
}
else
{
sql = "insert into NewProduct values('" + txtid.Text
+ "','" + txtname.Text + "','" + txtprice.Text + "')";
obj.insert_data_string(sql);
MessageBox.Show("product Added Successfully");
ProductID();
txtname.Text = "";
txtprice.Text = "";
}
}
catch (Exception ex)
{
MessageBox.Show(ex.Message);
}
}

private void AddNewProduct_Load(object sender, EventArgs e)


{
try
{
ProductID();
}
catch (Exception ex)
{
MessageBox.Show(ex.Message);
}
}

private void btnclose_Click(object sender, EventArgs e)


{
this.Close();
}

private void btnReset_Click(object sender, EventArgs e)


{
txtname.Text = "";
txtprice.Text = "";

}
}
}

Newcard.cs

using System;
using System.Collections.Generic;
using System.ComponentModel;
using System.Data;
using System.Drawing;
using System.Linq;
using System.Text;
using System.Windows.Forms;

namespace CreditCard
{
public partial class NewCard : Form
{
public NewCard()
{
InitializeComponent();
}

private void label7_Click(object sender, EventArgs e)


{

private void txtcardno_KeyPress(object sender, KeyPressEventArgs


e)
{
if ((e.KeyChar < 48 || e.KeyChar > 57) && e.KeyChar != 8)
{
e.Handled = true;
}

}
Database obj = new Database();
string sql;
private void button1_Click(object sender, EventArgs e)
{
try
{
if(txtaccno.Text ==""||txtaddtess.Text ==""||
txtlimit.Text ==""||txtName.Text =="" )
{
MessageBox.Show ("Enter All Details");
}
else
{
sql = "insert into CardIssue values('" + txtcardno.Text
+ "','" + txtaccno.Text + "','" + cmbbank.SelectedItem + "','" +
txtName.Text + "','" + txtaddtess.Text + "','" + txtlimit.Text +
"')";
obj.insert_data_string(sql);
txtaccno.Text = "";
txtaddtess.Text ="";
txtName.Text = "";
txtlimit.Text = "";
this.Close();
NewUser nw = new NewUser();
nw.Show();
}
}
catch (Exception ex)
{
MessageBox.Show(ex.Message);
}
}
public void CardNo()
{
string code_id = "";
int temp;
sql = "select count (CardNo) from CardIssue";
obj.select_data(sql);
if (obj.dt.Rows[0][0].ToString() == "")
{
code_id = "CBA-0001";
}
else
{
temp = int.Parse(obj.dt.Rows[0][0].ToString());
temp++;
int len = temp.ToString().Length;
if (len == 1)
{
code_id = "CBA-000" + temp;
}
else if (len == 2)
{
code_id = "CBA-00" + temp;
}
else if (len == 3)
{
code_id = "CBA-0" + temp;
}
else
{
code_id = "CBA-" + temp;
}
}
txtcardno.Text = code_id;
}
private void NewCard_Load(object sender, EventArgs e)
{
try
{
CardNo();
}
catch (Exception ex)
{
MessageBox.Show(ex.Message);
}
}

private void txtaccno_KeyPress(object sender, KeyPressEventArgs


e)
{
if ((e.KeyChar < 48 || e.KeyChar > 57) && e.KeyChar != 8 &&
e.KeyChar != 46)
{
e.Handled = true;
MessageBox.Show("Please Enter Only Number.");
}
}

private void comboBox1_SelectedIndexChanged(object sender,


EventArgs e)
{

private void txtName_KeyPress(object sender, KeyPressEventArgs


e)
{
if ((e.KeyChar < 65 || e.KeyChar > 90) && (e.KeyChar < 97 ||
e.KeyChar > 122) && e.KeyChar != 8 && e.KeyChar != 32 && e.KeyChar !=
46)
{
e.Handled = true;
MessageBox.Show("Please Enter Only Character.");
}

private void txtlimit_KeyPress(object sender, KeyPressEventArgs


e)
{
if ((e.KeyChar < 48 || e.KeyChar > 57) && e.KeyChar != 8 &&
e.KeyChar != 46)
{
e.Handled = true;
MessageBox.Show("Please Enter Only Number.");
}

private void btnclose_Click(object sender, EventArgs e)


{
this.Close();
}
}
}

New User.cs

using System;
using System.Collections.Generic;
using System.ComponentModel;
using System.Data;
using System.Drawing;
using System.Linq;
using System.Text;
using System.Windows.Forms;

namespace CreditCard
{
public partial class NewUser : Form
{
public NewUser()
{
InitializeComponent();
}

private void label11_Click(object sender, EventArgs e)


{

private void textBox8_TextChanged(object sender, EventArgs e)


{

private void radioButton2_CheckedChanged(object sender,


EventArgs e)
{

private void NewUser_Load(object sender, EventArgs e)


{

private void textBox1_KeyPress(object sender, KeyPressEventArgs


e)
{
if ((e.KeyChar < 48 || e.KeyChar > 57) && e.KeyChar != 8 &&
e.KeyChar != 46)
{
e.Handled = true;
MessageBox.Show("Please Enter Numeric Value.");
}

private void textBox15_KeyPress(object sender, KeyPressEventArgs


e)
{
if ((e.KeyChar < 48 || e.KeyChar > 57) && e.KeyChar != 8 &&
e.KeyChar != 46)
{
e.Handled = true;
MessageBox.Show("Please Enter Only Number.");
}

private void textBox11_KeyPress(object sender, KeyPressEventArgs


e)
{
if ((e.KeyChar < 48 || e.KeyChar > 57) && e.KeyChar != 8 &&
e.KeyChar != 46)
{
e.Handled = true;
MessageBox.Show("Please Enter Only Number.");
}

private void textBox10_KeyPress(object sender, KeyPressEventArgs


e)
{
if ((e.KeyChar < 48 || e.KeyChar > 57) && e.KeyChar != 8 &&
e.KeyChar != 46)
{
e.Handled = true;
MessageBox.Show("Please Enter Only Number.");
}

private void textBox2_KeyPress(object sender, KeyPressEventArgs


e)
{
if ((e.KeyChar < 65 || e.KeyChar > 90) && (e.KeyChar < 97 ||
e.KeyChar > 122) && e.KeyChar != 8 && e.KeyChar != 32 && e.KeyChar !=
46)
{
e.Handled = true;
MessageBox.Show("Please Enter Only Character.");
}

private void textBox3_KeyPress(object sender, KeyPressEventArgs


e)
{
if ((e.KeyChar < 65 || e.KeyChar > 90) && (e.KeyChar < 97 ||
e.KeyChar > 122) && e.KeyChar != 8 && e.KeyChar != 32 && e.KeyChar !=
46)
{
e.Handled = true;
MessageBox.Show("Please Enter Only Character.");
}

private void btnclose_Click(object sender, EventArgs e)


{
this.Close();
}

private void textBox4_TextChanged(object sender, EventArgs e)


{

private void textBox11_TextChanged(object sender, EventArgs e)


{

private void textBox15_TextChanged(object sender, EventArgs e)


{

private void btnreset_Click(object sender, EventArgs e)


{
txtaddress.Text = "";
txtcpassword.Text = "";
txtdob.Text = "";
txtfname.Text = "";
txtlandline.Text = "";
txtlname.Text = "";
txtlogin.Text = "";
txtmail.Text = "";
txtpassword.Text = "";
txtphone.Text = "";
txtpincode.Text = "";
}
Database obj = new Database();
string sql;
private void btnsubmit_Click(object sender, EventArgs e)
{
try
{
if (txtaddress.Text ==""||txtcardno.Text ==""||
txtcpassword.Text ==""||txtdob.Text ==""||txtfname.Text ==""||
txtlandline.Text ==""||txtlname.Text ==""||txtlogin.Text ==""||
txtmail.Text ==""||txtpassword.Text ==""||txtphone.Text ==""||
txtpincode.Text =="")
{
MessageBox.Show ("Enter All Details");
}
else
{
string opt;
if (radioButton1.Checked == true)
{
opt = "Male";
}
else
{
opt = "female";
}
sql = "insert into NewUser values('" + txtcardno.Text +
"','" + txtdob.Text + "','" + txtfname.Text + "','" + opt + "','" +
txtlname.Text + "','" + txtaddress.Text + "','" + txtlogin.Text + "','"
+ txtpassword.Text + "','" + cmbcity.SelectedItem + "','" +
cmbstate.SelectedItem + "','" + cmbcountry.SelectedItem + "','" +
txtmail.Text + "','" + txtphone.Text + "','" + txtlandline.Text + "','"
+ txtpincode.Text + "')";
obj.insert_data_string(sql);
MessageBox.Show("User Registered Successfully");
txtaddress.Text = "";
txtcpassword.Text = "";
txtdob.Text = "";
txtfname.Text = "";
txtlandline.Text = "";
txtlname.Text = "";
txtlogin.Text = "";
txtmail.Text = "";
txtpassword.Text = "";
txtphone.Text = "";
txtpincode.Text = "";
this.Close();
Security ss = new Security();
ss.Show();
}
}
catch (Exception ex)
{
MessageBox.Show(ex.Message);
}
}
}
}

SecurityQuestion.cs

using System;
using System.Collections.Generic;
using System.ComponentModel;
using System.Data;
using System.Drawing;
using System.Linq;
using System.Text;
using System.Windows.Forms;

namespace CreditCard
{
public partial class SecurityQuestion : Form
{
public SecurityQuestion()
{
InitializeComponent();
}
Database obj = new Database();
string sql;
private void SecurityQuestion_Load(object sender, EventArgs e)
{
try
{
sql = "select * from CardIssue";
obj.cmd_select_Data(sql);
while (obj.dr.Read())
{
comboBox6.Items.Add(obj.dr.GetString(0));
}
}
catch (Exception ex)
{
MessageBox.Show(ex.Message);
}
}

private void comboBox6_SelectedIndexChanged(object sender,


EventArgs e)
{
try
{
sql = "select * from Security where CardNo='" +
comboBox6.SelectedItem + "'";
obj.cmd_select_Data(sql);
obj.dr.Read();
tq1 .Text = obj.dr.GetString(1);
tq2.Text = obj.dr.GetString(3);
tq3.Text = obj.dr.GetString(5);
tq4.Text = obj.dr.GetString(7);
tq5.Text = obj.dr.GetString(9);
}
catch (Exception ex)
{
MessageBox.Show(ex.Message);
}
}

private void textBox3_TextChanged(object sender, EventArgs e)


{

private void textBox5_TextChanged(object sender, EventArgs e)


{

private void textBox8_TextChanged(object sender, EventArgs e)


{

private void textBox4_TextChanged(object sender, EventArgs e)


{

private void button1_Click(object sender, EventArgs e)


{
try
{
sql = "select * from Security where CardNo='" +
comboBox6.SelectedItem + "'";
obj.cmd_select_Data(sql);
obj.dr.Read();
if (ta1.Text == obj.dr.GetString(2) && ta2.Text ==
obj.dr.GetString(4) && ta3.Text == obj.dr.GetString(6) && ta4.Text ==
obj.dr.GetString(8) && ta5.Text == obj.dr.GetString(10))
{
MessageBox.Show("Verified Successfully");
}
else
{
MessageBox.Show("One or some of your answer was
wrong so this transaction will be Aborted");
sql = "select * from CardIssue where CardNo='" +
comboBox6.SelectedItem + "'";
obj.cmd_select_Data(sql);
obj.dr.Read();
string f1, f2, f3, f4, f5;
f1 = obj.dr.GetString(1);
f2 = obj.dr.GetString(2);
f3 = obj.dr.GetString(3);
f4 = obj.dr.GetString(4);
f5 = obj.dr.GetString(5);
sql = "insert into BlockedUser values('" +
comboBox6.SelectedItem + "','" + f1.ToString() + "','" + f2.ToString() +
"','" + f3.ToString() + "','" + f4.ToString() + "','" + f5.ToString() +
"')";
obj.insert_data_string(sql);
sql = "Delete from CardIssue where CardNo='" +
comboBox6.SelectedItem + "'";
obj.insert_data_string(sql);
sql = "Delete from NewUser where CardNo='" +
comboBox6.SelectedItem + "'";
obj.insert_data_string(sql);
sql = "Delete from Security where CardNo='" +
comboBox6.SelectedItem + "'";
obj.insert_data_string(sql);
MessageBox.Show("User Blocked Successfully");
}

}
catch (Exception ex)
{
MessageBox.Show(ex.Message);
}
}

private void button2_Click(object sender, EventArgs e)


{
this.Close();
}
}
}

Shopping.cs

using System;
using System.Collections.Generic;
using System.ComponentModel;
using System.Data;
using System.Drawing;
using System.Linq;
using System.Text;
using System.Windows.Forms;

namespace CreditCard
{
public partial class ShoppingCart : Form
{
public ShoppingCart()
{
InitializeComponent();
}
Database obj = new Database();
string sql;
private void ShoppingCart_Load(object sender, EventArgs e)
{
try
{
cmbproduct.Items.Clear();
sql = "select * from NewProduct";
obj.cmd_select_Data(sql);
while (obj.dr.Read())
{
cmbproduct.Items.Add(obj.dr.GetString(1));
}
}
catch (Exception ex)
{
MessageBox.Show(ex.Message);
}
}

private void btnSubmit_Click(object sender, EventArgs e)


{
try
{
int tot=0;
sql = "select * from Shopping where CardNo='"+
txtid.Text +"'";
obj.cmd_select_Data(sql);
while (obj.dr.Read())
{
if (obj.dr.GetString(3) == "")
{
tot = 0;
}
else
{
tot = tot + int.Parse(obj.dr.GetString(3));
}
}
double res = tot + double.Parse(txtprice.Text);
sql = "select * from CardIssue where CardNo='" +
txtid.Text + "'";
obj.cmd_select_Data(sql);
obj.dr.Read();
double tot1 =Convert.ToDouble(obj.dr.GetString(5));
if (res >= tot1)
{
MessageBox.Show("You are Exceeding your Limit");
}
else
{
sql = "select Count(CardNo) from Shopping where
CardNo='" + txtid.Text + "'";
obj.cmd_select_Data(sql);
obj.dr.Read();
int count=Convert.ToInt32 ( obj.dr[0].ToString ());
if ( count >= 3)
{
MessageBox.Show("Your Limit Over");
}
else
{
sql = "insert into Shopping values('" +
txtid.Text + "','" + cmbproduct.SelectedItem + "','" + txtQuantity.Text
+ "','" + txtprice.Text + "')";
obj.insert_data_string(sql);
MessageBox.Show("Added Successfully");
}
}
}
catch (Exception ex)
{
MessageBox.Show(ex.Message);
}
}

private void comboBox1_SelectedIndexChanged(object sender,


EventArgs e)
{

private void txtQuantity_Leave(object sender, EventArgs e)


{
try
{
sql = "select * from NewProduct where ProductName='" +
cmbproduct.SelectedItem + "'";
obj.cmd_select_Data(sql);
obj.dr.Read();
int pri = Convert.ToInt32(obj.dr.GetString(2));
txtprice.Text = ((pri) * int.Parse(txtQuantity.Text)) +
"";
}
catch (Exception ex)
{
MessageBox.Show(ex.Message);
}
}

private void btnclose_Click(object sender, EventArgs e)


{
this.Close();
}

private void btnReset_Click(object sender, EventArgs e)


{
ViewProduct vp = new ViewProduct();
vp.Show();
}
}
}

8.2. SAMPLE SCREEN OUTPUTS


9. FUTURE ENHANCEMENT

This system is very flexible and changes can be made without affecting the
existing system according to the future requirements. The system is designed in such a
way that any changes can be made to the existing module or we can add any new module
to the system in future, without affecting the present one.
The System design is in such a way so that any new development can make any
changes in the future according to the requirements in future. The system can be
upgraded easily to the newer version of the software.

This project can be further developed by


 Adding separate Roles and Authentication.

 This project can also be done in online through ASP.net

 We can also add separate module for Visitors

 We can also add Online voting regarding call center query

 News and Events updates

 We can also add online call center training.

 Forums can also be implemented

 Online Exam schedule information

 Career
10. CONCLUSION

The software has been successfully implemented and has been found to

replace the existing system effectively. It has also possible methods to eliminate

the human errors likely to creep in to this kind of work in which bulk quantity of

data has been processed. This application as been designed to suit exact needs.

It is user friendly providing graphical user interface. Its interface

conforms to the standard windows interface. So the user is at ease the system. It

provides the selection of the data wherever possible instead of typing it.

The software is developed with scalability in mind. Additional modules

can be easily added when necessary. The software is developed with modular

approach. Additional reports can be easily added. Most of decision rules are not

statically coded. It can be changed running the software.

As already mentioned no system is perfect. This project has been

developed with the intention to provide the management with useful software.
11. BIBLIOGRAPHY

1. ASP.NET BIBLE : MRIDULA PARIHAR


Wiley Publications,
1st Edition,USA.
2. SOFTWARE ENGGINEERING : ROGER S.PRESSMAN
Mcgrawhill Publications,
5th Edition, Newyork.
3. SQL SERVER 2005 : Mike Gunderloy & Joseph L.Jorden
Bpb Publications,
1st Edition,New Delhi.
4. ASP+ : Rechard Handrson,
Wrox Publications,
1st Edition,UK.

Websites:
www.asp.net
www.codeguru.com
www.w3schools.com

You might also like