0% found this document useful (0 votes)
81 views28 pages

Divyansh Project

The document acknowledges and thanks all those who helped in completing a project. It expresses gratitude to the director and other staff members for their support and for providing infrastructure. It also thanks classmates and friends for their assistance. In the last line, it thanks God. The content page lists the various sections of the report including introduction, basic concepts, hands-on experience, project modules, future applications and conclusion. The introduction provides an overview of the training completed by the author at NextGen Compusoft PVT LTD over 30 days. It describes working on a "Cyber Cafe Management" project in C#.NET and MS Access.

Uploaded by

yogen_rajawat
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
81 views28 pages

Divyansh Project

The document acknowledges and thanks all those who helped in completing a project. It expresses gratitude to the director and other staff members for their support and for providing infrastructure. It also thanks classmates and friends for their assistance. In the last line, it thanks God. The content page lists the various sections of the report including introduction, basic concepts, hands-on experience, project modules, future applications and conclusion. The introduction provides an overview of the training completed by the author at NextGen Compusoft PVT LTD over 30 days. It describes working on a "Cyber Cafe Management" project in C#.NET and MS Access.

Uploaded by

yogen_rajawat
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 28

ACKNOWLEDGEMENT

We would like this opportunity in expressing our deepest gratitude to all those persons who in one way or other helped us in making our endeavours a success. No words can reflect our thankfulness and respect towards these persons for their significant contribution in the completion of this project. Development of a system involves efforts from so many persons and same is the case of ours. This project is an output of joint efforts. We are truly indebted to our revered Director Sh. O. P. GERA, who has put in all the efforts to start the recognized computer education in the institute for the benefits of students and provide us a wonderful learning environment & required infrastructure. He is a painstaking person who wants overall development of students. We owe our sincere gratitude with folded hands to Sh. A. P. SINGH, He took personal interest in spite of his busy schedule to help us to complete this assignment and provided us the required, even more than required, information and guidance His valuable suggestions and moral support during the making of this project as well as in all related fields. We are very inspired by his hardworking and caring nature which is quite helpful while learning. He is indeed a very genuine guide. We also thank all the staff members of NextGen Compusoft PVT LTD., all our classmates and friends for their wholehearted assistance and cooperation which was extremely essential for the completion of this project. In the last but not the least, we thank the almighty. May he stand with all of us.

Divyansh Kasliwal CP08018 B. Tech. VII Sem. Computer Engineering

Page | 1

CONTENTS
1. Introduction
1.1 Objective of training 1.2 Profile of the Company 1.2.1 About the company 1.2.2 Quality policy

2. Basic Concepts
2.1 .Net 2.2 C# 2.3 MS-Access

3. Hands on experience 4. Project Modules


4.1 Introduction 4.2 Purpose and Scope of the Project 4.3 Functional or Specific Requirements 4.4 Preliminary Design 4.5 Database Description 4.6 System Requirements 4.7 User Interface

5. Future Application and Conclusion 6. Annexure

Page | 2

INTRODUCTION
As the part of curriculum of Rajasthan Technical University, I have completed my training for 30 days during the time period from 13th June to 16th July. I am, thus, writing this report to present my learning and the knowledge gained during the training while working on the live project. I pursued my training at NextGen Compusoft PVT LTD., NextGen Compusoft is a Technical Education Centre that deals with many offshore and onshore clients. They work on various technologies like ASP.net, JAVA, Flash, PHP, etc. I opted for C#.net as my training technology. I used MS-Access as the

backend technologies. I worked on a project named Cyber Cafe Management the project was assigned to a group of 2 trainees. Cyber Cafe Management is very bulky project and only a few modules of it were assigned to us, we started our work from the phase of requirement analysis. I prepared the software requirement specification for the project modules assigned to us, then we were asked to prepare the data flow diagrams, the entity-relationship diagrams and the class diagrams. Our training curriculum was divided in brushing-up sessions (for 7 days) and project work (for 23 days). In brushing-up sessions we were taught about the basic concepts of .NET, C#, OOP, web applications v/s desktop applications, and connection strings. A detailed description of the project is discussed in section 4 of the report.

Page | 3

1.1 Objectives of the Training


Objectives of my training were: 1.1.1 To understand the basic Life Cycle of project development and how to implement it on Real Life Projects in a limited time with accuracy and efficiency. 1.1.2 To understand the company standards for building a project. 1.1.3 To gain a practical experience of working in a professional environment. 1.1.4 How to build an application that satisfies the Customer needs.

Page | 4

1.2

Profile of the company


Company Name : NEXTGEN COMPUSOFT PVT. LTD. Company Headquarter : 78- D Block, 3rd Floor, Layalpur Tower, Nr. Vakilon Wali Diggi, Sri Ganganagar. Ph. No. 0154-2478743 Company Website: www.nextgencompusoft.net Company e-mail: [email protected]

1.2.1. About company


NEXTGEN COMPUSOFT PVT. LTD. is a leading IT company providing IT Education, Software development, Web development, live project training. We create high end expert IT professional. Main motive of Nextgen Compusoft (P) Ltd. is to provide better solution to organisation and better education to the students. Nextgen Compusoft Pvt. Ltd was founded in year 2009 (Under Government of India) by a group of highly qualified Technocrats (with proven expertise in varied technology domains) as a Centre for education, training & software development at Sri Ganganagar, Rajasthan. What began as an idea is now an acknowledged institution for quality learning. This is an outcome of the various facets that give the NCPL its characteristic value-the faculty, enterprising students, academic affiliation, facilities and industry partnership. Nextgen Compusoft Pvt. Ltd. is dedicated to good quality, inexpensive services that will improve the quality of work at all levels in an organisation. We strongly believe in Business goes where it is invited and stays where it is well Treated.
Page | 5

1.2.2. Quality policy


Nextgen Compusoft Pvt. Ltd. has a documented quality management system conforming to ISO 9001:2008 quality system standards. The quality system is followed & implemented as per the guidelines of ISO 9001:2008 standard. Our Quality policy is defined as under: ISO 9001:2008 To provide high quality software engineering services meeting end-to-end requirements of the customers and to achieve continual improvement in these services and customer satisfaction by active involvement of all our people & customers. As an organization we are focused on developing overall procedural standards for every business function of the company wherein involving all our people and customers to provide effective and quality software development services. Guided under ISO quality system our comprehensive evaluation & monitoring system addresses several important issues and helps our customers in the following ways: To develop international quality management and quality assurance standards. Documentation of quality management systems, software development process and methodologies. Effective delivery and exchange of IT services with focus on total customer satisfaction. Monitoring and analysis of project management activities to preempt any bugs and delays. Analysis and monitoring of IT services so that they are designed delivered and maintained in accordance with customer specific requirements.
Page | 6

BASIC CONCEPTS
2.1 What is .NET?
.NET is set of common services which can be used from a number of languages and have the following specialties: These services are executed in the form of intermediate code that is independent of the underlying architecture. They operate in the runtime (Common Language Runtime), which manages resources and monitors applications execution. The .NET frameworks are a multi-language environment for building, deploying, and running web services and applications. The Microsoft .NET platform provides .NET infrastructure and tools to build and operate a new generation of services.

2.2 What is the .NET architecture?


Microsoft .NET consists of four major components: Common Language Specification (CLS) blue in the diagram below Framework Class Library (FCL) red Common Language Runtime (CLR) green

.NET Tools yellow


At the base of the diagram in gray is the operating system, which technically can be any platform but typically is Microsoft Windows 2000 or greater, accessed through the Win32 API (Application Programming Interface).

Page | 7

.NET Architecture
2.2.1 Common Language Specification (CLS)
The CLS is a common platform that integrates code and components from multiple .NET programming languages. In other words, a .NET application can be written in multiple programming languages with no extra work by the developer (though converting code between languages can be tricky). .NET includes new object-oriented programming languages such as C#, Visual Basic .NET, J# (a Java clone) and Managed C++. These languages, plus other experimental languages like F#, all compile to the Common Language Specification and can work together in the same application.

2.2.2 Framework Class Library (FCL)


The FCL is a collection of over 7000 classes and data types that enable .NET applications to read and write files, access databases, process XML, display a graphical user interface, draw graphics, use Web services, etc. The FCL wraps much of the massive, complex Win32 API into more simple .NET objects that can be used by C# and other .NET programming languages.
Page | 8

2.2.3 Common Language Runtime (CLR)


The CLR is the execution engine for .NET applications and serves as the interface between .NET applications and the operating system. The CLR provides many services such as: Loads and executes code Converts intermediate language to native machine code Separates processes and memory Manages memory and objects Enforces code and access security Handles exceptions Interfaces between managed code, COM objects, and DLLs Provides type-checking Provides code meta data (Reflection) Provides profiling, debugging, etc.

2.2.4 .NET Tools


Visual Studio .NET is Microsofts flagship tool for developing Windows software. Visual Studio provides an integrated development environment (IDE) for developers to create standalone Windows applications, interactive Web sites, Web applications, and Web services running on any platform that supports .NET. In addition, there are many .NET Framework tools designed to help developers create, configure, deploy, manage and secure .NET applications and components.

Page | 9

2.3 C#
C# provides cross-language interoperability. It is also called mixed language programming. Cross language interoperability is crucial for the creation of large, distributed software system. It is also desirable for programming software components, because the valuable component is one that can be used by the widest variety of computer language in the greatest number of operating environments. C# was created at Microsoft late in 1990s and was part of Microsoft overall .NET strategy. By building C# upon a solid, well understood foundation, C# offers an easy migration path from these languages.

2.3.1 Features of C#
Directly derived from C, C++ and Java. Provides Multilanguage interoperability. Full integration with windows platform. Related to .NET Runtime Environment. Object Oriented No pointers required .C# programs typically have no need for direct pointer manipulation. Automatic memory management through garbage collection. Formal syntactic constructs for classes, interfaces, structures, enumerations, The ability to build generic types and generic members. Using generics, you are able to build very efficient and type-safe code that defines numerous placeholders specified at the time you interact with the generic item. T he ability to define a single type across multiple code files (or if necessary, as an in-memory representation) using the partial keyword.

Page | 10

2.4 MS-ACCESS
Microsoft Office Access, previously known as Microsoft Access, is a relational database management system from Microsoft that combines the relational Microsoft Jet Database Engine with a graphical user interface and softwaredevelopment tools. It is a member of the Microsoft Office suite of applications, included in the Professional and higher editions or sold separately. I made use of MS ACCESS 2007, as the backend technology. Access stores data in its own format based on the Access Jet Database Engine. It can also import or link directly to data stored in other applications and databases. Software developers and data architects can use Microsoft Access to develop application software, and "power users" can use it to build simple applications. Like other Office applications, Access is supported by Visual Basic for Applications, an object-oriented programming language that can reference a variety of objects including DAO (Data Access Objects), ActiveX Data Objects, and many other ActiveX components. Users can create tables, queries, forms and reports, and connect them together with macros.

2.4.1 Split Database Architecture


Microsoft Access applications can adopt split-database architecture. The database can be divided into a front-end database that contains the application objects (queries, forms, reports, macros, and modules), and is linked to tables stored in a back-end shared database containing the data. The "back-end" database can be stored in a location shared by many users, such as a file server. The "front-end" database is distributed to each user's desktop and linked to the shared database. This split-database design also allows development of the application independent of the data. When a new version is ready, the front-end database is replaced without impacting the data database.
Page | 11

To scale Access applications to enterprise or web solutions, one possible technique involves migrating to Microsoft SQL Server or equivalent server database. A clientserver design significantly reduces maintenance and increases security, availability, stability, and transaction logging.

Page | 12

HANDS ON EXPERIENCE
I had a very good training experience and my objectives of training were fulfilled by the training session. I am quite happy and satisfied by what I have learned during these 30 days. My hands on experiences from this training session are: 3.1 How to build user complaint products? 3.2 What is product plug ability? 3.3 What is product scalability? 3.4 How to make robust software? 3.5 How to built Dynamic Applications? 3.6 How to organize time, to complete the project on deadline? 3.7 Team building capabilities. 3.8 How to develop software using ISO standards? 3.9 Leadership Skills. 3.10 .Net Skills. 3.11 Building Documents. 3.12 Team Work. 3.13 Trouble Shooting.
Page | 13

PROJECT MODULES
4.1 INTRODUCTION
The Cyber Cafe Management is a system in which we collect and save all the records of the users like their name, contact number, address, date of birth, his or her image and information about the id submitted by the user. The major objective of the entire project is to handle the entire caf by it keeping its day to day records of the users visited the cafe. Once a user has visited the cafe, a unique caf id is given to the user so that when the user next time visits the caf he or she just has to provide the cafe id.

4.2 PURPOSE AND SCOPE OF THE PROJECT


As in the Cyber Cafe documents were managed manually using a file, now using this applications documents can managed in a proper way .We can also update, delete Record using this application. All the record of the users, his or her date and the time spent in the cafe is managed in the more proper way. Once visited, whenever the user again request to login to the system, the user had to provide the unique cafe id. Objectives of the system are as follows: 4.2.1 Store the records with minimum redundancy. 4.2.2 Search record in the minimum time. 4.2.3 Maintain integrity of the data. 4.2.4 Data security and reliability. 4.2.5 Effective, user friendly and computerized management of the Cyber Cafe.

Page | 14

4.3 FUNCTIONAL AND SPECIFIC REQUIREMENT


Required software is for managing the user record in the Cyber Cafe. The system should satisfy the following requirements: 4.3.1 Administrator Aspect 4.3.1.1 Edit/Delete/Create database 4.3.1.2 Manage the user 4.3.1.3 Changing the password 4.3.1.4 Allotment of PC

4.3.2 User Aspect 4.3.2.1 Requesting for the registration 4.3.2.2 Request to Logging into the system

4.4 PRELIMINARY DESIGN


4.4.1 Data Flow Diagram A DFD, also known as a Bubble Chart has the purpose of clarifying system requirements and identifying major transformations that will become programs in system. A DFD consists of series of bubbles joined by lines. The bubbles represent data transformations and the lines represent data flows in the system.

Page | 15

Data Flow Diagram

Main Function

Exit for Project Login Function

Main Form

Home Page

New User

Search

Change Password

Browse Records

Modify Record

Update or Delete Record Close Form

Page | 16

4.4.2 Project Overview

LOGIN MENU MAIN MENU

SEE
RECORDS

NEW USER

SEARCH

CHANGE PASSWORD

EXIT

UPDATE
RECORDS

DELETE
RECORDS

4.5 DATABASE DESCRIPTION


An integrated approach to the file design is the database. The general theme is to handle information as an integrated whole, with a minimum of redundancy and improved performance. Software languages are used to manipulate, describe, and manage data. Regardless of the type of data structure used, the objectives of the database are accuracy and integrity, successful recovery from the failure, privacy and security of data, and good overall performance.
Page | 17

INFORMATION ABOUT DATABASE

The project, Cyber Cafe Management is used to hold records of the users that visited the cyber cafe, it contains lot of data that has to keep in record. Following are the main data file:

USER

Contains information about the user which is using the project & to add new user.

RECORD

Contains login details of all users visiting the cafe.

LOGIN

Contains login information of administrator

Data in these files are stored in the format of relations (Tables) i.e. each file represents a relation in words of relational modelling. The detail about fields (attributes) in each file is as follows:

4.5.1 Administrator login Table:

Field Name Login name Password

Field Type Varchar (30) Varchar (20)

Description Login name of the administrator Password

Page | 18

4.5.2 User Information:

Field Name User_Id User Name Date of Birth Address Contact Id type

Field Type Varchar(20) Varchar(50) DateTime Varchar(200) Varchar(15) Varcahr(20)

Description User id Name of the user Dob of user Address of user Contact no. of user Type of id submitted by the user.

4.5.3 Record table

Field Name User_Id Etime Dtime Date Pc

Field Type Varchar(20) Date Time Date Time Date Time Text

Description Userid Entrance time Departure time Date which Pc allotted to user

Page | 19

4.6 System Requirements

Designed for Windows XP computer hardware logo System requirements for Windows XP Home and Professional editions as follows:

Minimum

Recommended

Processor

233 MHz

300 MHz or higher

Memory

128 MB RAM

512 MB RAM or higher

Video adapter and monitor

Super VGA (800 x 600) or higher resolution

Hard drive disk free space

20 GB or higher

Drives

CD-ROM drive or DVD drive

Input devices

Keyboard. Microsoft Mouse or compatible pointing device

Page | 20

4.6.1 Software Requirements: Operating System : Windows 2000XP/Windows 2000 NT RDBMS Front End : MS ACCESS 2007 : Microsoft Visual Studio.NET with C#

4.7

USER INTERFACE

The user interface of this system as follow:4.7.1 Administrator Login Form:

Page | 21

4.7.2 Administrator Home Page:

This is the home page for the administrator. The administrator will go to the New User button if the user is visiting the Caf for the first time. Otherwise asks the user for the Caf Id and then authentifies it.

Page | 22

4.7.3 New User Registration Page : For the New User following details have to fill up by the administrator. As soon as the registration process is complete a Cafe Id is generated and that Caf Id is the Id for the user. Next time when the same user visits the Cafe the user will have to give its Cafe Id, no filling up of the form is required.

Page | 23

4.7.4 Searching Of Records: Searching of the record can be done either with the help of the user name or mobile number. It can also be done with the help of Cafe Id. Once the Cafe Id is verified all the details of the user will be displayed.

Page | 24

Page | 25

4.7.5 Change Administrator Login Password:

4.7.6 Browsing of Records:

Page | 26

FUTURE APPLICATION AND CONCLUSION


FUTURE APPLICATION: It is the fact that improvement &modification can be made with little effort to any system in order to get better services. New applications can be incorporated as and when necessary to the existing system. It is true that present system whenever implemented, all the information will be available to the user. I hope that the initiation taken in developing the software will help for the future development of the system. CONCLUSION: No software can be called perfect in this fast moving hi-tech world. The Cyber Caf Management System seems to be very useful. However it is simple software, would be adequate for present time for functioning of the firm in proper way. After doing the system analysis and drawing the ER diagram, now we can easily develop the Caf Management System, which will manage the whole Caf efficiently, fast and free from manual errors.

Page | 27

ANNEXURE
6.1 BOOKS
6.1.1 C# In Detail By Jon Jagger 6.1.2 C#, The Basics By Vijay Mukhi , Sandeep Shanbhag, Sonal Mukhi. 6.1.3 Bible for C#, Wiley Publications 6.1.4 Database System Concepts, McGraw-Hill International Publications

6.2 LIBRARY
6.2.1 MSDN

MSDN Library Visual Studio .Net release The MSDN Library is the essential reference for developers, with more than a gigabyte of technical programming information; including sample code, documentation, technical articles, the Microsoft Developer Knowledge Base, and anything else we might need to develop solutions that implement Microsoft technology.

6.3 REFERENCES
6.3.1 www.google.com 6.3.2 www.wikipedia.org 6.3.3 www.nextgencompusoft.net

Page | 28

You might also like