Redhat Project Report
Redhat Project Report
ON
Online License Authority
System
Submitted In Partial Fulfillment of
The Requirement
For
Master of Computer Application (Semester VI)
To
CT Institute
Submitted By:
Name: Navneet Kaur
Roll No: 100222176055
1
Table of content
ACKNOWLEDGEMENT
COMPANY PROFILE
CHAPTER-2 ANALYSIS 12
3.1 DFD
3.2 FLOWCHART
3.3 ER DIAGRAM
3.4 DATABASE DIAGRAM
3.5 INTERFACE DESIGN
2
CHAPTER-4 TESTING 41
CHAPTER-5 IMPLEMENTATION 47
REFERENCES 65
3
ACKNOWLEDGEMENT
Gratitude cannot be seen or expressed. It can only be felt in heart and is beyond
description. Often words are inadequate to serve as a model of expression of one’s feeling,
specially the sense of indebtedness and gratitude to all those who help us in our duty.
4
COMPANY PROFILE:
ORGANIZATION OVERVIEW
Telecommunications Consultants India Ltd (TCIL) is a leading ISO - 9001:2000 certified public
sector undertaking. TCIL, a premier telecommunication consultancy and engineering company
with a strong base in Telecommunication & Information Technology (IT), was incorporated in
1978 by Department of Telecommunications (DOT), Government of India under the aegis of
Ministry of Communications, headed by Minister of Communications and Information
Technology. There are four PSUs under DoT. TCIL is one of them. Other being
Bharat Sanchar Nigam Limited (BSNL),
Mahanagar Telephone Nigam Ltd. (MTNL),
ITI Limited.
Backed by the vast network of DoT / BSNL/MTNL, in terms of trained and experienced
manpower, research & development and training facilities, TCIL has made rapid strides. Today
TCIL offers total telecom solutions for projects. TCIL has working/ is works in almost 45
Countries mainly in Middle East Africa, South-East Africa, South-East Asia and Europe. The
Organizational Structure is formed with the objectives of providing globally world-class
technology and Indian expertise in all fields of Telecommunications and to provide total Quality
management & excellence in project execution. TCIL-IT, Information Technology is a division
of TCIL. Managed by ICSIL
5
Providing Services in:
Repairs and maintenance of telephone exchange cards
Laying communication Cables and executing related telecom and software development
projects
Supply of Computer Hardware and Computer Networking
Running Information Technology Education and Training center.
TRAINING
The business of TCIL is characterized by Hi-tech mainly in the field of Telecom and IT, and
technology in this area is advancing very fast and with the view to keep update with the latest
technology TCIL undertakes training activities either through its own resources or through
external agencies. TCIL is having strategic tie-up with Advanced Level Telecom Centre of Govt.
of India.TCIL has also established its Training Centre TCIL- IT which is running various courses
duly approved by Department of Electronics, Govt. of India.
TCIL has also organized a number of training programmers catering to specific requirements of
Telecom PTTs viz. Nigeria, Kuwait, Maldives and Republic of Yemen to develop the Telecom
business in foreign countries.
TCIL has established Training centers in Afghanistan and is also in the process of training their
personnel in India.
VISION
“To excel in providing communication solutions globally by anticipating opportunities in
technology.”
IT SERVICES
Turnkey Solution to meet end-to-end customer requirements
Networking Solutions with total System Integration and Implementations
Project Consultancy services from concept to commissioning
On-site Manpower Support
IT Training
6
JOINT VENTURES
To serve its clients better in different regions of the world, TCIL has entered into strategic
alliances with top national and international enterprises such as:
Hexacom India
Tamilnadu Telecom Ltd.
TCIL Bell South
TCIL Saudi
Telecom Consultants Nigeria
7
CHAPTER-1: ABOUT PROJECT
1.1 PROJECT OVERVIEW
The aim of this project is to develop a driving license website. This project is designed to address
the needs of government officials seeking to implement driving license projects, or those already
involved with such venture. This project deals with the automation of governmental tasks like
issuing licenses etc.
The other intention of creating this project is to provide the administrator over the full
authentication of allotting the different types of license to the different customers etc. The
following are the tasks performed by the system:
This system runs on multiple terminals, offers a GUI interface to its users and connects to a
database(s).
1.1.1 PROBLEMS/NEED
One must know what the problem is, before it can be solved. The basis for a candidate
system is recognition of a need for improving an information system or a procedure.
Ideas for change may come from within the organization- top management, the user,
and the analyst. As an organization changes its operations or faces advances in
computers, someone within the organization may feel the need to update the existing
application or improve the procedures.
It will help the government to conduct its dealings online.
It will increase the efficiency of the government
It will make the work easier as well as productive.
Less maintenance required.
8
Changes and updates can be done easily.
It will provide reliability, efficient and easy searches.
It is much faster than the present existing system.
Cost of manual labor is reduced.
Tampering of data by unauthorized people would not be there.
It is highly interactive.
No data redundancy.
It is fast and accurate in executing queries.
It generates efficient and quick report.
.
1.1.2 SOLUTIONS/APPROACH
Data Consistency: Here we are using different types of keys, constraints, and
reference to maintain the consistency into the database.
View information: His/her can able to view information about License and can view
the details of all types of information about vehicles which are available in database..
The project is to computerize the working of government officials. The manual system of
government tasks such as registration of customers applying for license for driving etc. takes lot
of time and has lot of paper work. Due to this lot of time is wasted and processing speed and data
entering speed became very slow. Therefore need for computerization not due to the large
9
volume of data transactions are taking place, but to maintain the integrity of data. Some data has
to re-write in various files due to which it is possible for error to creep in. This type of errors are
difficult to find, as it requires comparing four-five files which leads to wastage of time and
manpower . But with the use of this software these kinds of inconsistencies can be avoided,
because it informs the moment the error is committed, thus the data integrity is maintained.In the
existing system all the work from addition of new records to modifying is done manually. During
customer entry, the first step is to fill up details about him like his name, father’ name, address,
type of license applying for, details of certificate required to issue a license etc. takes a lot of
time then license no. allocated must be entered in the register manually which again consume a
lot of time and space. The means for reading and gaining knowledge is books i.e. frustrating to
both user and client.
With the use of this software reports can be generated very easily and instantly where as
using manual system it takes lot of time to generate reports. It is possible that user may leave
empty or different records for same fields in different files but through this software such kind of
errors can’t creep in. Also as software is graphical it is easier for new computer users to use it
easily and effectively. With the use of this software the overall speed of data transaction will
increase to great extent.
Administrator Module: It includes the managing of users and databases of this site by the
administrator.
User Module: User may apply for any type of license.
Visitor Module: Visitor can get information about our system.
ADMIN
ONLINE LICENSE
LICENSE
AUTHORITY
USER INFORMATION
SYSTEM
VISITR
10
Admin:-
Login to the system through the Home page of the system
Can change his password and Update his information after logging in.
Can add new Admin.
Can check the all type of Licence application.
Accept/reject the User Application.
Can issue all type of Licence.
Can see the no. of register User and Admin.
Can see the no. of issued Licence.
Can check the Mail and give reply received by user.
Users:-
Visitor:-
Visit the website.
Search any type of information about license.
Can become User after Registration.
11
CHAPTER-2: ANALYSIS
2.1 PROBLEM ANALYSIS
2 User 1
12
Apply his/her Duplicate
License.
Send mail to Admin.
Check their application status.
Search the various types of
licenses according to their
requirements
3 Visitor 1
Visit the website.
Search any type of
information about license.
Can become User after
Registration.
The Cost Management and Budgeting is excluded in the current release. If the project will be
extended on large scale then the cost factor on the resources will be included.
Feasibility is the second phase of SDLC. The feasibility study is basically the test of the
proposed system in the light of its workability, meeting user’s requirements, effective use of
resources and .of course, the cost effectiveness. The main goal of feasibility study is not to solve
the problem but to achieve the scope. In the process of feasibility study, the cost and benefits are
estimated with greater accuracy. The various aspects of the Feasibility analysis are:
Operational Feasibility: The system is used if it is developed and implemented, as there
is sufficient support for the project in management because it increases optimization of
resources.
Technical Feasibility: Yes, the website is technically feasible as it uses top newly
developed technologies in ASP.NET.
Economic Feasibility: The system is cost acceptable as it cleared by the organization and
there is no extra economic burden on the organization to implement the system as live.
13
Scheduled Feasibility: It is feasible in concern of schedule feasibility because a lot of
work will done only single clicks, thus saving a lot of time.
Legal Feasibility: Yes, the system to be developed is legally valid.
2.3.1 ASSUMPTIONS
It is assumed that system will provide a user friendly interface which is easy to
understand and manage.
User (visitor/admin) need to have basic knowledge of computers and internet.
Administrator has the complete right of accessing database and profiles of Administrator
user and visitor.
2.3.3RISK ASSESSMENTS
2.4.1 INTRODUCTION:
The purpose of the SRS is to specify the requirements of the web based software
application online Man power recruitment system, which is a Job portal. The software
requirement specification provides a complete description of all the functions and general
description.
14
2.4.2 Description (Product Perspective):
The aim of this project is to develop a driving license website. This project is designed to address
the needs of government officials seeking to implement driving license projects, or those already
involved with such venture. This project deals with the automation of governmental tasks like
issuing licenses etc. The other intention of creating this project is to provide the administrator
over the full authentication of allotting the different types of license to the different customers
etc. The main idea to develop this project is to provide the administrator a very light and easy
way to handle his all the customers and providing them a very easy way to get the license.
-Administrator Component
-User Component
-Visitor Component
Admin:
Login to the system through the Home page of the system
Can change his password and Update his information after logging in.
Can add new Admin.
Can check the all type of Licence application.
Accept/reject the User Application.
Can issue all type of Licence.
15
Can see the no. of register User and Admin.
Can see the no. of issued Licence.
Can check the Mail and give reply received by user.
User:
Login to the system through the Home page of the system.
Change their password Update his information after logging in.
Apply his/her Learner License.
Apply his/her Permanent License.
Apply for Renew license.
Apply his/her Duplicate License.
Send mail to Admin.
Check their application status.
Visitor :
The DFD’s represents the flow of the data among the different processes, entities and
records. Here are 0-level (context diagram) and 1-level DFD’s. The 0-level DFD represents the
overall entities participating in the system excluding the detailed functionality of the system.
Whereas 1- Level DFD represents the module wise detailed functionality of the system.
16
LEVEL-0 DFD (context level)
Admin
Online
License
User License
Authority Information
System
Visitor
17
Level-1 DFD for Admin
Driving License
User Administrator
System
18
Level-2 DFD for User
Driving License
User Administrator
System
19
SYSTEM TESTING
INTRODUCTION:
The purpose of system testing is to identify and correct errors in the candidate system.
Testing is important element of software quality assurance ad represents the ultimate
review of specification, design and coding. The increasing visibility of the software as a
system element and the cost associated with a software failure are motivated forces for
well planned, through testing.
System testing was conducted in order to detect errors and for comparing then the final
system with the requirement specification reports, i.e. whether the system meets
requirements. During testing the software was executed with the set of test cases and the
output of programs for the test cases was evaluated to determine if the program is
performing as it was expected to. Testing presents an interesting challenge for the
software engineers attempt to build software from an abstract concept to an acceptable
implementation. In testing engineer create a series of test cases that occurs when errors
are uncovered. Testing is the process of executing a program for finding errors. A good
test is one that has the high probability of finding an uncovered error. A successful error
is one that uncovers undiscovered errors. The term error is used to refer the difference
between actual output of the software and the current output. Fault is a condition that
causes the software to fail to perform its required function. Software reliability is defined
as a required function. Software reliability is defined as the probability that the software
will not undergoes failures for a specified times under specified condition. Failure is the
inability of a system or a component to perform a required function according to its
specification. Different levels of testing were employed for software to make it error free,
fault free and reliable.
20
ER –DIAGRAM
Learner
Permanent
role Duplicate
Renew
Login License
Information
User id
Rules of
About Us Traffic
Password
Name Permit
Home
Fees
USER Get Info VISITOR
Email
Contact
Mobile Us
Issue
Traffic
Gender License Signs
ADMIN
Admin id Password
21
DATABASE TABLES OF PROJECT
Detailed Design
REGISTRATION TABLE
22
MAIN LICENCE TABLE
MESSAGE TABLE
23
STATUS TABLE
24
3.6 INTERFACE DESIGN
3.6.1. Home Page Design
25
3.62AboutUs Page
26
3.6.3Contact Us Page
27
3.6.4Registration Page
28
3.62Fees &Taxes Page
29
After User Login Page:
30
Apply for Leaning Licence Page
31
Apply for Pemanent Licence Page
32
Apply for Renew Licence Page
33
Apply forDuplicate Licence Page
34
Send Message Page
35
Check Status Page
36
After Admin Login Page:
37
Licence Page
38
Issue LicencePage
39
Read/Reply MessagePage
40
CHAPTER-4: TESTING
Software testing is an investigation conducted to provide information about the quality of the
product or service under test. Software testing also provides an objective, independent view of
the software to allow the business to appreciate and understand the risks at implementation of the
software. Software testing is any activity aimed at evaluating an attribute or capability of
a program or system and determining that it meets its required results Software Testing is the
process of executing a program or system with the intent of finding errors. Software testing can
also be stated as the process of validating and verifying that a software
program/application/product:
RELIABILITY STRUCTURE
41
4.1TECHNIQUES OF SOFTWARE TESTING
4.1.1UNIT TESTING
Unit Testing is primarily carried out by the developers themselves.
Integration Testing: Deals with testing when several program units are integrated.
Incremental Integration Testing : Checks out for bugs which encounter when a module
has
Smoke Testing : It is the battery of test which checks the basic functionality of
program. If fails then the program is not sent for further testing.
System Testing - Deals with testing the whole program system for its intended purpose.
Recovery Testing: System is forced to fail and is checked out how well the system
recovers
The failure.
Security Testing: Checks the capability of system to defend itself from hostile attack on
Load & Stress Testing: The system is tested for max load and extreme stress points are
42
Figured out.
Installation Testing: Installation & uninstallation is checked out in the target platform.
It treats the system as a "black-box", so it doesn't explicitly use knowledge of the internal
structure.
Black-box test design is usually described as focusing on testing functional requirements. The
research in black-box testing mainly focuses on how to maximize the effectiveness of
testing with minimum cost
It allows one to peek inside the "box”, and it focuses specifically on using internal knowledge of
the software to guide the selection of test data. Testing plans are made according to the
details of the software implementation, such as programming language, logic, and styles.
Test cases are derived from the program structure. White-box testing is also called glass-box
testing, logic-driven testing.
Performance has always been a great concern and a driving force of computer evolution.
Performance evaluation of a software system usually includes: resource usage, throughput,
and stimulus-response time and queue lengths detailing the average or maximum number of
tasks waiting to be serviced by selected resources. Typical resources that need to be considered
include network bandwidth requirements, CPU cycles, disk space, disk access operations, and
memory usage
43
4.1.7 SECURITY TESTING
Flaws in software can be exploited by intruders to open security holes. With the
development of the Internet, software security problems are becoming even more severe. The
purpose of security testing of these systems include identifying and removing software flaws that
may potentially lead to security violations, and validating the effectiveness of security measures.
Pre-Requisites:- Visual studio 2008, MS SQL Server 2008, Required Field Validator,
Regular Expression validation ,Dropdown Lists.
TEST DESCRIPTION EXPECTED ACTUAL REMARKS
CASE RESULTS RESULTS
ID
TC01 Click On the It should show the It Displays all PASS
“Submit” Button list of Validations the
when no Data input is that have been Error messages
given in Violated i.e. i.e.
any of the fields. Required Field error for the
validate, Regular fields
Expression etc. that are required
etc.
TC02 Input any number of It should not allow It does limit the PASS
characters more the 25 input of twenty-
in the “First Name” Characters of input five
44
Textbox to characters only.
Check the limit of the
no. of
characters allowed
for the
input.
TC03 Input any special It should not allow It does not allow PASS
characters the Input of any the input of
in the “First Name” special characters special characters
textbox Like like “@$%$^&@@”
“@$$$&^Name@@#” “@$%$^&@@”
TC04 Input any number of It should not allow It does limit the PASS
characters more the 15 no
in the “Last Name” Characters of input Of fifteen
Textbox. characters.
TC05 Input Any special It should not allow It Does not PASS
Characters the Input of any allow
in the “Last Name” special characters the input of
textbox Like like special characters
“@$$$&^Name@@#” “@$%$^&@@” “@$%$^&@@”
TC06 Input any number of It should not allow It limits or allows PASS
characters more than 30 the input of
in the “Email” Characters of input Thirty
Textbox to check in the email textbox characters only.
the limit of the no. of
characters allowed as
the input.
TC07 Input any number of It should not allow It does limit the PASS
digits more the 10 no
in the “Mobile No” digits of input of ten
Textbox to in the Contact No 1 digits only.
check the limit of textbox
the no. of
digits allowed for the
input.
TC08 Input special It should not allow It does not allow PASS
characters like any special the input of
“#$^%&^*&^(“ in characters like special
the “#$^%&^*&^(“ Characters
“mobile No.” Textbox. in Contact No 1 like
textbox “#$^%&^*&^(“
TC09 Input any special It may allow the input It allows the input PASS
characters in of special characters of special
“Correspondence” like @#$%^ characters@#$%^
textbox
45
4.2.2 MODULE: ADMIN
MAY,13
Pre-Requisites:- Visual studio 2008, MS SQL Server 2008 Required Field Validator
, Regular Field Expression, Dropdown Lists.
TEST CASE DESCRIPTION EXPECTED ACTUAL REMARKS
ID RESULT RESULT
46
category be selected to next links.
5.2.2 MAINTENANCE:
47
5.2.3CORRECTIVE
Corrective software maintenance involves developing and deploying solutions to
problems ("bugs") that arise during use of a software program. Computer users will notice
performance problems with software, such as error messages coming on the screen or the
program freezing or crashing, meaning corrective software maintenance is needed. Often these
fixes permanently solve the problem, but not always. Some fixes act as a temporary solution
while computer programmers work on a more permanent solution.
5.2.4 PERFECTIVE
No software program contains zero flaws or areas for improvement. Perfective software
maintenance involves computer programmers working to improve the way a software
program functions or how quickly it processes requests. Programmers may also engage in
perfective software maintenance to improve the software's menu layouts and command
interfaces. Sometimes programmers need to conduct perfective maintenance on software
because of outside influences, such as new government regulations that affect how a
business operates.
5.2.5 ADAPTIVE
The field of technology constantly changes through both hardware and software
developments. Adaptive software maintenance addresses these changes. A change in a
processor's speed, for example, will affect how the software performs on a single
computer. Software interacts with other software programs on a computer or network, meaning
changes in one program can require changes in other programs
5.2.6 PREVENTATIVE
When computer programmers engage in preventative software maintenance they try to
prevent problems with software programs before they occur. Programmers seek to prevent
corrective maintenance as much as possible, while also anticipating adaptive maintenance
needs before users experience problems. Computer programmers test software, as
automotive companies test the vehicles they make, to make sure the software can handle
high data loads and other stressful operations without problems. Computer programmers
also test the software with other programs users likely will use on their computers, making sure
compatibility issues do not arise.
48
CHAPTER-6: PROJECT LEGACY
In our project we have implemented all the features that are required for navigating through the
university. Our project consists of following features:
Future enhancement means what feature we are able to add to our project in future i.e. future
scope. Our project is totally based on Driving License, and we are not including all feature and
facilities in this project. This project likes a DEMO that nearly meets the requirement. Future
scopes of the project are:
The records of the staff, billing information etc are not included, so
it may be include in future.
The future plan of the enhancement of the project is to direct the
present automation of the Driver License Management System to
simulation.
The current project not include user photo, it may include in future in
database for identification of user, user signature also include in near
future.
The expired license deleted automatically and billing information and
procedure may also include in near future.
49
More security to the software.
Online access and operating through the internet
50
CHAPTER-7: SAMPLE SOURCE CODE
TITLE: UserRegistration.aspx.cs
using System;
using System.Collections.Generic;
using System.Linq;
using System.Web;
using System.Web.UI;
using System.Web.UI.WebControls;
clear();
Label1.Text="Thanks for registration now u can access our site for apply licence while
login";
51
TextBox2.Text = "";
TextBox3.Text = "";
TextBox4.Text = "";
TextBox5.Text = "";
TextBox6.Text = "";
TextBox7.Text = "";
}
}
TITLE: LearningLicence.aspx.cs
using System;
using System.Collections.Generic;
using System.Linq;
using System.Web;
using System.Web.UI;
using System.Web.UI.WebControls;
}
licenceDataContext db = new licenceDataContext();
protected void Button1_Click(object sender, EventArgs e)
{
string n, fn, pa, papf, ta, tapf, dob, dobpf, ed, edpf, idm, idmpf, bg, bgpf, vd, img,gn;
n = TextBox1.Text;
fn = TextBox2.Text;
pa = TextBox3.Text;
if (RadioButton1.Checked)
{
gn = RadioButton1.Text;
}
else
{
gn = RadioButton2.Text;
}
papf = FileUpload2.FileName;
FileUpload2.SaveAs(MapPath("~/applicantimages/" + FileUpload2.FileName));
ta = TextBox4.Text;
52
tapf = FileUpload3.FileName;
FileUpload3.SaveAs(MapPath("~/applicantimages/" + FileUpload3.FileName));
dob = TextBox5.Text;
dobpf = FileUpload4.FileName;
FileUpload4.SaveAs(MapPath("~/applicantimages/" + FileUpload4.FileName));
ed = TextBox6.Text;
edpf = FileUpload5.FileName;
FileUpload5.SaveAs(MapPath("~/applicantimages/" + FileUpload5.FileName));
idm = TextBox7.Text;
idmpf = FileUpload6.FileName;
FileUpload6.SaveAs(MapPath("~/applicantimages/" + FileUpload6.FileName));
bg = TextBox8.Text;
bgpf = FileUpload7.FileName;
FileUpload7.SaveAs(MapPath("~/applicantimages/" + FileUpload7.FileName));
vd = DropDownList1.Text;
img = FileUpload1.FileName;
FileUpload1.SaveAs(MapPath("~/applicantimages/" + FileUpload1.FileName));
db.sp_insertlicence1(n, fn, pa, papf, ta, tapf, dob, dobpf, ed, edpf, idm, idmpf, bg, bgpf, vd,
img,gn);
db.SubmitChanges();
Label8.Text = "Your aaplication send to admin............";
clear();
}
private void clear()
{
TextBox1.Text = "";
TextBox2.Text = "";
TextBox3.Text = "";
TextBox4.Text = "";
TextBox5.Text = "";
TextBox6.Text = "";
TextBox7.Text = "";
TextBox8.Text = "";
DropDownList1.Text = " ";
53
TITLE: PermanentLicence.aspx.cs
using System;
using System.Collections.Generic;
using System.Linq;
using System.Web;
using System.Web.UI;
using System.Web.UI.WebControls;
}
protected void Button1_Click(object sender, EventArgs e)
{
int lno;
string n, fn, doi, doe, vehdes, padd, tadd,uid,sts;
lno = Convert.ToInt32(TextBox9.Text);
n = TextBox1.Text;
fn = TextBox2.Text;
doi = TextBox10.Text;
doe = TextBox11.Text;
padd = TextBox3.Text;
tadd = TextBox4.Text;
vehdes = DropDownList1.Text;
db.sp_insertparm(lno, n, fn, doi, doe, padd, tadd, vehdes);
db.SubmitChanges();
Label1.Text = "Your aaplication accepted............";
sts = "Your aaplication accepted............please wait.............";
uid = Session["visitor"].ToString();
db.sp_insertsts(uid, lno, sts);
db.SubmitChanges();
clear();
}
private void clear()
{
TextBox1.Text = "";
TextBox2.Text = "";
TextBox3.Text = "";
TextBox4.Text = "";
TextBox9.Text = "";
TextBox10.Text = "";
TextBox11.Text = "";
54
DropDownList1.Text = " ";
}
}
TITLE: DuplicateLicence.aspx.cs
using System;
using System.Collections.Generic;
using System.Linq;
using System.Web;
using System.Web.UI;
using System.Web.UI.WebControls;
}
protected void Button1_Click(object sender, EventArgs e)
{
int lno;
string n, fn, padd, tadd,uid,sts;
lno = Convert.ToInt32(TextBox1.Text);
n = TextBox2.Text;
fn = TextBox3.Text;
padd = TextBox4.Text;
tadd = TextBox5.Text;
db.sp_insertdupl(lno, n, fn,padd,tadd);
db.SubmitChanges();
Label1.Text = "Your aaplication accepted............";
sts="Your aaplication accepted............please wait.............";
uid = Session["visitor"].ToString();
db.sp_insertsts(uid, lno, sts);
db.SubmitChanges();
clear();
}
private void clear()
{
55
TextBox1.Text = "";
TextBox2.Text = "";
TextBox3.Text = "";
TextBox4.Text = "";
TextBox5.Text = "";
}
}
TITLE: RenewLicence.aspx.cs
using System;
using System.Collections.Generic;
using System.Linq;
using System.Web;
using System.Web.UI;
using System.Web.UI.WebControls;
}
protected void Button1_Click(object sender, EventArgs e)
{
int lno;
string n, fn, doi, doe, vehdes,sts,uid;
lno = Convert.ToInt32(TextBox1.Text);
n = TextBox2.Text;
fn = TextBox3.Text;
doi = TextBox4.Text;
doe = TextBox5.Text;
vehdes = DropDownList1.Text;
db.sp_insertrenew(lno, n, fn, doi, doe, vehdes);
db.SubmitChanges();
Label1.Text = "Your aaplication accepted............";
sts = "Your aaplication accepted............please wait.............";
uid = Session["visitor"].ToString();
db.sp_insertsts(uid, lno, sts);
56
db.SubmitChanges();
clear();
}
private void clear()
{
TextBox1.Text = "";
TextBox2.Text = "";
TextBox3.Text = "";
TextBox4.Text = "";
TextBox5.Text = "";
}
}
TITLE: IssueLicence.aspx.cs
using System;
using System.Collections.Generic;
using System.Linq;
using System.Web;
using System.Web.UI;
using System.Web.UI.WebControls;
57
if (Request.QueryString["n"] != null)
{
k = Convert.ToInt32(Request.QueryString["n"]);
i = r.img;
//pf = r.prmaddprf;
//tf = r.temaddprf;
//ef = r.eduprf;
//idf = r.idprf;
//bf = r.bldgrpprf;
//dobf=r.dobprf;
}
}
//if (idd.Equals(idd1) & edd.Equals(edd1))
//{
TextBox12.Text = idd1;
TextBox13.Text = edd;
58
//}
//else
//{
// Label1.Text = "issue & expire date can't match............";
//}
Image1.ImageUrl = "applicantimages/" + i;
db.sp_updatestatus(k, msg);
db.SubmitChanges();
}
else
{
Label1.Text = "Licence Number is not valid............";
msg = "Your existing Licence No not valid...................so Your application
rejected..............";
db.sp_updatestatus(k, msg);
db.SubmitChanges();
}
59
}
protected void Button2_Click(object sender, EventArgs e)
{
int lcn;
lcn = Convert.ToInt32(TextBox11.Text);
db.sp_deleteapp(lcn);
db.SubmitChanges();
}
}
TITLE: UserChangeInfo/pwd.aspx.cs
using System;
using System.Collections.Generic;
using System.Linq;
using System.Web;
using System.Web.UI;
using System.Web.UI.WebControls;
60
TextBox6.Text = r.mob;
TextBox7.Text = r.email;
}
}
else
{
Response.Redirect("Default2.aspx");
}
}
protected void Button1_Click(object sender, EventArgs e)
{
string n, pwd, email, mob,id;
id = Session["visitor"].ToString();
n = TextBox1.Text;
pwd = TextBox4.Text;
email = TextBox7.Text;
mob = TextBox6.Text;
}
}
61
TITLE: AdminChangeInfo/pwd.aspx.cs
using System;
using System.Collections.Generic;
using System.Linq;
using System.Web;
using System.Web.UI;
using System.Web.UI.WebControls;
62
email = TextBox7.Text;
mob = TextBox6.Text;
}
}
TITLE: PrintLicence.aspx.cs
using System;
using System.Collections.Generic;
using System.Linq;
using System.Web;
using System.Web.UI;
using System.Web.UI.WebControls;
if (Request.QueryString["qn"] != null)
{
lno =Convert.ToInt32( Request.QueryString["qn"]);
var record = from rec in db.LicenceTable1s where rec.Licenceno == lno select rec;
63
Label7.Text = r.Licenceno.ToString();
Label8.Text = r.dateofissue;
Label9.Text = r.dateofexpire;
Label10.Text = r.bloodgup;
}
Image1.ImageUrl = "applicantimages/" +i;
}
}
}
}
64
REFRENCES:-
http://www.cramerz.com/aspdotnet/aspdotnet_session
http://www.w3schools.com/aspnet/default.asp
http://www.geekpedia.com/tutorial81_Handling-cookies-in-ASP-.NET.html
http://www.aspnettutorials.com/tutorials/network/cookies-csharp.aspx
http://ajax.net-tutorials.com/controls/updatepanel-control/
http://www.codeproject.com/Articles/22384/ASP-NET-AJAX-Controls-and-Extenders
http://www.asp.net/web-forms/videos/ajax-control-toolkit/how-do-i-configure-the-aspnet-
ajax-calendar-control
http://www.dotnetcurry.com/ShowArticle.aspx?ID=149
http://www.asp.net/ajaxlibrary/act_Calendar_Simple.ashx
http://www.slideshare.net/sundaramkumar/aspnet-tutorial-presentation-5
65