0% found this document useful (0 votes)
23 views50 pages

Graphical Password Management System Project Report

The term “graphical password” refers to a user authentication method where pictorial information is used for validation, instead of an alphanumerical password. This method poses many challenges, such as memo ability (which refers to how easy the password is to remember), usability, and security, since graphical passwords may tend to be visually simple and easily forged. Graphical passwords have become popular due to the proliferation of touch screen devices, in particular smart phones.

Uploaded by

Kamal Acharya
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
23 views50 pages

Graphical Password Management System Project Report

The term “graphical password” refers to a user authentication method where pictorial information is used for validation, instead of an alphanumerical password. This method poses many challenges, such as memo ability (which refers to how easy the password is to remember), usability, and security, since graphical passwords may tend to be visually simple and easily forged. Graphical passwords have become popular due to the proliferation of touch screen devices, in particular smart phones.

Uploaded by

Kamal Acharya
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 50

AN

INTERNSHIP REPORT
ON
GRAPHICAL PASSWORD MANAGEMENT SYSTEM
PROJECT
BY
KAMAL ACHARYA
(Tribhuvan University)

Date: 2021/10/02

1|Page
CHAPTER 1

PROJECT DESCRIPTION
1.1 INTRODUCTION

The term “graphical password” refers to a user authentication method where pictorial
information is used for validation, instead of an alphanumerical password. This method poses
many challenges, such as memo ability (which refers to how easy the password is to remember),
usability, and security, since graphical passwords may tend to be visually simple and easily forged.
Graphical passwords have become popular due to the proliferation of touch screen devices, in
particular smart phones and tablets. The prevalent approaches are based on simple graphical
passwords, which can be easily remembered and reproduced by potential attackers. In this work,
we study user authentication based on finger -drawn doodles (i.e., free-form gestures or sequences
of gestures) and on pseudo signatures, which are simplified versions of the signature drawn with
the finger tip. Authentication is based on features extracted from the dynamics of the gesture
drawing process (e.g., speed or acceleration).These features contain behavioral biometric
information, which has been successfully used for automatic user verification based on
handwritten signatures. As a consequence, a potential attacker would have to copy not only what
the user draws, but also how the user draws it. Unfortunately, graphical passwords tend to be much
simpler than signatures and are not composed, in general, of previously learned or heavily
practiced movements. This can lead to a higher intra-user variability (i.e., variations between
samples produced by the same person) than in the case of signatures or may cause users to forget
part of or the whole graphical password.

A range of approaches for recall-based graphical password authentication have been


evaluated using measures including resilience to forgeries, memo ability, user acceptance, error
rates and time to enroll. Recall-based authentication can be divided in two categories. Exact- match
approaches assume that during authentication, a user produces exactly the same drawing provided
2|Page
during enrollment. Elastic approaches allow some variability between enrollment and
authentication. Graphical password authentication systems can be also divided into static and

3|Page
dynamic approaches. Static or offline systems use the doodle image for authentication, while
dynamic or online systems use time functions extracted from the doodle trajectory.

1.2 EXISTING SYSTEM

Authentication based on passwords is used largely in applications for computer security


and privacy. However, human actions such as choosing bad passwords and inputting passwords in
an insecure way are regarded as “the weakest link” in the authentication chain. Rather than
arbitrary alphanumeric strings, users tend to choose passwords either short or meaningful for easy
memorization. With web applications and mobile apps piling up, people can access these
applications anytime and anywhere with various devices. This evolution brings great convenience
but also increases the probability of exposing passwords to shoulder surfing attacks. Attackers can
observe directly or use external recording devices to collect users’ credentials. To overcome this
problem, we proposed a novel authentication system Pass Matrix, based on graphical passwords
to resist shoulder surfing attacks. With a one-time valid login indicator and circulative horizontal
and vertical bars covering the entire scope of pass-images, Pass Matrix offers no hint for attackers
to figure out or narrow down the password even they conduct multiple camera-based attacks.
DISADVANTAGES
 Assumed that the server and the client devices in our authentication system are
trustworthy.
 Assumed that the surveillance cameras that are not under proper management.
1.3 PROPOSED METHOD
Proposing system uses graphical passwords for authentication purposes. User has to
register with the username and password. Then a list of five images will be displayed. User has to
select an image. The selection of pixel points on the image for users will vary according to the
group, they belong. At the time of login, user can login using the password or image. If the
password method is selected, the user has to enter the password. An OTP will be sent to the
registered mail id. When the OTP is entered correctly, the user’s home page will be displayed. If
the image method is selected, the user has to select an image from the list of five images. After
selecting the correct image, the specified number of pixel points should be marked correctly. If
this step is correct, the user’s home page is displayed.

4|Page
ADVANTAGES
 Can’t predict accurately when there are five images.
 OTP is used for unique identification.

1.3.1 HARDWARE REQUIREMENTS

 Processor : Dual core processor 2.6.0 GHZ


 RAM : 1GB
 Hard disk : 160 GB
 Compact Disk : 650 Mb
 Keyboard : Standard keyboard
 Monitor : 15 inch color monitor

1.3.2 SOFTWARE REQUIREMENTS

 Front End : JSP


 Back End : SQL Server 2008
 Platform : Windows 7
 IDE : Net beans

FRONT END (JSP):

Java Server Page (JSP) is a technology for controlling the content or appearance of Web
pages through the use of servlets, small programs that are specified in the Web page and run on
the Web server to modify the Web page before it is sent to the user who requested it. Sun
Microsystems, the developer of Java, also refers to the JSP technology as the Servlet application
program interface (API). JSP is comparable to Microsoft's Active Server Page (ASP) technology.
Whereas a Java Server Page calls a Java program that is executed by the Web server, an Active
Server Page contains a script that is interpreted by a script interpreter (such as VBScript or JScript)
before the page is sent to the user. Architecturally, JSP may be viewed as a high-level

5|Page
abstraction of Java servlets. JSPs are translated into servlets at runtime, therefore JSP is a Servlets;
each JSP servlet is cached and re-used until the original JSP is modified.JSP can be used
independently or as the view component of a server-side model–view–controller design, normally
with JavaBeans as the model and Java servlets (or a framework such as Apache Struts) as the
controller. This is a type of Model 2 architecture.
JSP allows Java code and certain pre-defined actions to be interleaved with static web
markup content, such as HTML, with the resulting page being compiled and executed on the server
to deliver a document. The compiled pages, as well as any dependent Java libraries, contain Java
byte code rather than machine code. Like any other Java program, they must be executed within a
Java virtual machine (JVM) that interacts with the server's host operating system to provide an
abstract, platform-neutral environment. JSPs are usually used to deliver HTML and XML
documents, but through the use of OutputStream, they can deliver other types of data as well. The
Web container creates JSP implicit objects like request, response, session, application, config,
page, pageContext, out and exception. JSP Engine creates these objects during translation phase.
SYNTAX
JSP pages use several delimiters for scripting functions. The most basic is <% ... %>, which
encloses a JSP scriptlet. A scriptlet is a fragment of Java code that is run when the user requests
the page. Other common delimiters include <%= ... %> for expressions, where the scriptlet and
delimiters are replaced with the result of evaluating the expression, and directives, denoted with
<%@ ... %>.Java code is not required to be complete or self-contained within a single scriptlet
block. It can straddle markup content, provided that the page as a whole is syntactically correct.
For example, any Java if/for/while blocks opened in one scriptlet must be correctly closed in a
later scriptlet for the page to successfully compile. Content which falls inside a split block of Java
code (spanning multiple scriptlets) is subject to that code. Content inside an if block will only
appear in the output when the if condition evaluates to true. Likewise, content inside a loop
construct may appear multiple times in the output, depending upon how many times the loop body
runs.
COMPILER
A Java Server Pages compiler is a program that parses JSPs, and transforms them into
executable Java Servlets. A program of this type is usually embedded into the application server

6|Page
and run automatically the first time a JSP is accessed, but pages may also be precompiled for better
performance, or compiled as a part of the build process to test for errors. Some JSP containers
support configuring how often the container checks JSPs files timestamps to see whether the page
has changed. Typically, this timestamp would be set to a short interval (perhaps seconds) during
software development, and a longer interval (perhaps minutes, or even never) for a deployed Web
application.
5.2 ABOUT MY-SQL
Introduction
MySQL is the world's most used open source relational database management system
(RDBMS) as of 2008 that run as a server providing multi-user access to a number of databases.
The MySQL development project has made its source code available under the terms of the GNU
General Public License, as well as under a variety of proprietary agreements. MySQL was owned
and sponsored by a single for-profit firm, the Swedish company MySQL AB, now owned by
Oracle Corporation.
MySQL is a popular choice of database for use in web applications, and is a central
component of the widely used LAMP open source web application software stack—LAMP is an
acronym for "Linux, Apache, MySQL, Perl/PHP/Python." Free-software-open source projects that
require a full-featured database management system often use MySQL.
For commercial use, several paid editions are available, and offer additional functionality.
Applications which use MySQL databases include: TYPO3, Joomla, Word Press, phpBB, MyBB,
Drupal and other software built on the LAMP software stack. MySQL is also used in many high-
profile, large-scale World Wide Web products, including Wikipedia, Google (though not for
searches), ImagebookTwitter, Flickr, Nokia.com, and YouTube.
Inter Images
MySQL is primarily an RDBMS and ships with no GUI tools to administer MySQL
databases or manage data contained within the databases. Users may use the included command
line tools, or use MySQL "front-ends", desktop software and web applications that create and
manage MySQL databases, build database structures, back up data, inspect status, and work with
data records. The official set of MySQL front-end tools, MySQL Workbench is actively developed
by Oracle, and is freely available for use.
Graphical

7|Page
The official MySQL Workbench is a free integrated environment developed by MySQL
AB, which enables users to graphically administer MySQL databases and visually design database
structures. MySQL Workbench replaces the previous package of software, MySQL GUI Tools.
Similar to other third-party packages, but still considered the authoritative MySQL frontend,
MySQL Workbench lets users manage database design & modeling, SQL development (replacing
MySQL Query Browser) and Database administration (replacing MySQL Administrator).MySQL
Workbench is available in two editions, the regular free and open source Community Edition
which may be downloaded from the MySQL website, and the proprietary Standard Edition which
extends and improves the feature set of the Community Edition.
Command Line
MySQL ships with some command line tools. Third-parties have also developed tools to
manage a MySQL server, some listed below. Maatkit - a cross-platform toolkit for MySQL,
PostgreSQL and Memcached, developed in Perl Maatkit can be used to prove replication is
working correctly, fix corrupted data, automate repetitive tasks, and speed up servers. Maatkit is
included with several GNU/Linux distributions such as CentOS and Debian and packages are
available for Programming. MySQL works on many different system platforms, including AIX,
BSDi, FreeBSD, HP-UX, eComStation, i5/OS, IRIX, Linux, Mac OS X, Microsoft Windows,
NetBSD, Novell NetWare, OpenBSD, OpenSolaris, OS/2 Warp, QNX, Solaris, Symbian, SunOS,
SCO Open Server, SCO UnixWare, Sanos and Tru64. A port of MySQL to OpenVMS also exists.
MySQL is written in C and C++. Its SQL parser is written in yacc, and a home-brewed
lexical analyzer. Many programming languages with language-specific APIs include libraries for
accessing MySQL databases. These include MySQL Connector/Net for integration with
Microsoft's Visual Studio (languages such as C# and VB are most commonly used) and the JDBC
driver for Java. In addition, an ODBC inter image called MyODBC allows additional programming
languages that support the ODBC inter image to communicate with a MySQL database, such as
ASP or ColdFusion. The HTSQL - URL-based query method also ships with a MySQL adapter,
allowing direct interaction between a MySQL database and any web client via structured URLs.
Features

8|Page
As of April 2009, MySQL offered MySQL 5.1 in two different variants: the open source MySQL
Community Server and the commercial Enterprise Server. MySQL 5.5 is offered under the same
licenses. They have a common code base and include the following features:
 A broad subset of ANSI SQL 99, as well as extensions
 Cross-platform support
 Stored procedures
 Triggers
 Cursors
 Updatable Views
 Information schema

9|Page
CHAPTER 2

LOGICAL DEVELOPMENT

2.1 DATA FLOW DIAGRAM

A two-dimensional diagram explains how data is processed and transferred in a system.


The graphical depiction identifies each source of data and how it interacts with other data sources
to reach a common output. Individuals seeking to draft a data flow diagram must identify external
inputs and outputs, determine how the inputs and outputs relate to each other, and explain with
graphics how these connections relate and what they result in. This type of diagram helps business
development and design teams visualize how data is processed and identify or improve certain
aspects.
LEVEL 0

DFD Level 0 is also called a Context Diagram. It’s a basic overview of the whole system
or process being analyzed or modeled. It’s designed to be an at-a-glance view, showing the system
as a single high-level process, with its relationship to external entities. It should be easily
understood by a wide audience, including stakeholders, business analysts, data analysts and
developers.

Login
Secured
login
Admin System
User

Verification

Database

10 | P a g e
LEVEL 1

DFD Level 1 provides a more detailed breakout of pieces of the Context Level Diagram.
You will highlight the main functions carried out by the system, as you break down the high- level
process of the Context Diagram into its sub – processes.

11 | P a g e
User Database
Register

Image
selection

Pixel
points

Login

Verify
image

Access
Verify
pixels

12 | P a g e
2.2 ARCHITECTURAL DIAGRAM

The architecture used in this project is a three tier architecture, which comprises of the presentation
tier, logical tier and the data tier. Below is the architecture diagram of the system: Fig 2. System
Architecture Registration The users of the system have to firstly register with the application before
going ahead and logging into it. The registration consists of firstly choosing the set of images that
the user desires for setting the password, out of each those images the user selects the area in the
image which least likely guessable. For more security the user also gives a text password which
will in turn be hidden in the set of images that the user had selected before this will be done by the
concept of image steganography. Image Steganography Image steganography is performed during
the registration and login process of the application. It is the process of hiding a data within
another. If any type of data such as image, text etc. are hidden within an image, it is known as
image steganography. During registration process, a textual password is asked from the user,
which is then\

Stored within the images. While the login process, the user is asked to re-enter the password, which
will then be compared with the one retrieved from the image. If the retrieved password matches
with the one stored during the login process, the user is considered authenticated. Login Process
during logging in the user is asked to type the text password which is matched to the text which
will be retrieved from the images which was stored during the registration. Along with the text,
the images that the user had selected during the registration will be displayed out of which the user
will have to click on the same areas that were clicked before.

13 | P a g e
USER USER REGISTRATION

USER NAME AND PASSWORD

IMAGE 1 IMAGE 2 IMAGE 3 IMAGE 4 IMAGE 5

SELECT AN SELECT THREE DATABASE


IMAGE POINTS

USER LOGIN

PASSWORD METHOD IMAGE METHOD

SELECT CORRECT IMAGE


USER NAME & PASSWORD

ENTER OTP SELECT THREE POINTS

USER HOME

SECURED TRANSMISSION USING ECC

LOGOUT

14 | P a g e
CHAPTER 3

DATABASE DESIGN
3.1 DATA DICTIONARY

Database jsp_graphical_password

Field Type Null Default

id varchar(35) Yes NULL

accnumber varchar(35) Yes NULL

name varchar(35) Yes NULL

pass varchar(35) Yes NULL

deposit varchar(35) Yes NULL

rdate varchar(35) Yes NULL

report varchar(35) Yes NULL

status varchar(35) Yes NULL

balance varchar(35) Yes NULL

15 | P a g e
3.2 TABLE DESIGN

Dumping data for table amount

1 123123 arun 123 0 19-11-2019 0 0 800

2 123 sham 123 0 19-11-2019 0 0 600

Table structure for table mini

Field Type Null Default

id int(10) Yes NULL

name varchar(35) Yes NULL

accnumber varchar(35) Yes NULL

evnt varchar(35) Yes NULL

amount varchar(35) Yes NULL

trans_to varchar(35) Yes NULL

rdate varchar(35) Yes NULL

report varchar(35) Yes NULL

publickey varchar(50) Yes NULL

privatekey varchar(50) Yes NULL

16 | P a g e
Dumping data for table mini
1 arun 123123 trans_to 100 123 20-11-2019 1

2 sham 123 trans_from 100 123123 20-11-2019 0 0 0

Table structure for table user_reg

Field Type Null Default

id int(20) Yes NULL

name varchar(100) Yes NULL

contact varchar(100) Yes NULL

email varchar(100) Yes NULL

accno varchar(100) Yes NULL

cardno varchar(100) Yes NULL

date varchar(100) Yes NULL

bank varchar(100) Yes NULL

branch varchar(100) Yes NULL

address varchar(100) Yes NULL

uname varchar(100) Yes NULL

pass varchar(100) Yes NULL

cdate varchar(100) Yes NULL

x1 varchar(100) Yes NULL

y1 varchar(100) Yes NULL

17 | P a g e
x2 varchar(100) Yes NULL

y2 varchar(100) Yes NULL

x3 varchar(100) Yes NULL

y3 varchar(100) Yes NULL

image varchar(100) Yes NULL

status varchar(100) Yes NULL

report varchar(100) Yes NULL

pub_key varchar(100) Yes NULL

priv_key varchar(100) Yes NULL

Dumping data for table user_reg


19
20 -
s 1 1 1 1 1 1 1
ar 73393 arunextazee@ 123 987654321 20- tric tric ar 11 98 80
1 b 2 2 1 3 1 3 1 8
un 33830 gmail.com 123 0123456 01- hy hy un - 70 0
i 3 9 4 3 2 5 3
01 20
19

19
20 -
s 1 2 2 2 2 2 2
sh 73393 sham@gmail. 987654321 20- tric tric sh 11 98 98
2 123 b 2 7 1 7 1 7 1 1
am 33830 com 0123456 11- hy hy am - 70 70
i 3 1 2 1 0 5 2
28 20
19

18 | P a g e
3.3 RELATIONSHIP DIAGRAM
An entity–relationship model (ER model for short) describes interrelated things of interest in a
specific domain of knowledge. A basic ER model is composed of entity types (which classify the
things of interest) and specifies relationships that can exist between entities (instances of those
entity types). In software engineering, an ER model is commonly formed to represent things a
business needs to remember in order to perform business processes. Consequently, the ER model
becomes an abstract data model, that defines a data or information structure which can be
implemented in a database, typically a relational database

Fig 3.3.3erdiagram

19 | P a g e
CHAPTER 4
PROGRAM DESIGN
4.1 MODULE DESCRIPTIONS

4.1.1 USER REGISTRATION

User has to register with the username, password and other details. Then, it is followed by
selection of image from the list of five details. Select three points on the selected image. Then,
click register button. The entered details will be saved in a server.

4.1.2 USER LOGIN WITH PASSWORD

User has to login with the username first. Then the user has to choose either the password
method or the graphical password method. Select the password method. Enter the password. An
OTP will be sent to the registered mail. Enter the OTP and click submit button. User’s homepage
will be displayed.

4.1.3 USER LOGIN WITH IMAGE

User has to login with the username first. Then the user has to choose either the password
method or the graphical password method. Select the graphical password method. Select the
correct image from the list of five images. Select the three points and click submit button. User’s
homepage will be displayed.

20 | P a g e
CHAPTER 5
SYSTEM TESTING

5.1.1 UNIT TESTING

The first test in the development process is the unit test. The source code is normally
divided into modules, which in turn are divided into smaller units called units. These units have
specific behavior. The test done on these units of code is called unit test. Unit test depends upon
the language on which the project is developed.

Unit tests ensure that each unique path of the project performs accurately to the
documented specifications and contains clearly defined inputs and expected results. Functional
and reliability testing in an Engineering environment. Producing tests for the behavior of
components (nodes and vertices) of a product to ensure their correct behavior prior to system
integration.

In this testing, user registration is done and checked for errors. User registration is done
successfully.

5.1.2 INTEGRATION TESTING

Testing is which modules are combined and tested as a group. Modules are typically code
modules, individual applications, source and destination applications on a network, etc. Integration
Testing follows unit testing and precedes system testing. Testing after the product is code
complete. Betas are often widely distributed or even distributed to the public at large in hopes that
they will buy the final product when it is release.

In this testing, user login is checked. When user enters all the details correctly, user home
will be displayed.

21 | P a g e
CHAPTER 6
CONCLUSION
User authentication is a fundamental component in most computer security contexts. In

this extended abstract, proposed a simple graphical password authentication system. The system

combines image selection and pixel selection concepts and forms as a single method. This method

is more secured as pixel selection can’t be identified easily. Computational cost and space

complexity are less for the proposed method. As a future work, restrictions for image selection can

be fixed. This provides complete security. The only limitation with graphical passwords is the slow

mapping process as size of high quality images increases.

22 | P a g e
References
1. Acharya, Kamal, Attendance Management System Project (April 28, 2024).
Available at
SSRN: https://ssrn.com/abstract=4810251 or http://dx.doi.org/10.2139/ssrn.4810251
2. Acharya, Kamal, Online Food Order System (May 2, 2024). Available at
SSRN: https://ssrn.com/abstract=4814732 or http://dx.doi.org/10.2139/ssrn.4814732
3. Acharya, Kamal, University management system project. (May 1, 2024). Available at
SSRN: https://ssrn.com/abstract=4814103 or http://dx.doi.org/10.2139/ssrn.4814103
4. Acharya, Kamal, Online banking management system. (May 1, 2024). Available at
SSRN: https://ssrn.com/abstract=4813597 or http://dx.doi.org/10.2139/ssrn.4813597
5. Acharya, Kamal, Online Job Portal Management System (May 5, 2024). Available at
SSRN: https://ssrn.com/abstract=4817534 or http://dx.doi.org/10.2139/ssrn.4817534
6. Acharya, Kamal, Employee leave management system. (May 7, 2024). Available
at SSRN: https://ssrn.com/abstract=4819626 or http://dx.doi.org/10.2139/ssrn.4819626
7. Acharya, Kamal, Online electricity billing project report. (May 7, 2024). Available at
SSRN: https://ssrn.com/abstract=4819630 or http://dx.doi.org/10.2139/ssrn.4819630
8. Acharya, Kamal, POLICY MANAGEMENT SYSTEM PROJECT REPORT. (December 10,
2023). Available at
SSRN: https://ssrn.com/abstract=4831694 or http://dx.doi.org/10.2139/ssrn.4831694
9. Acharya, Kamal, Online job placement system project report. (January 10, 2023). Available at
SSRN: https://ssrn.com/abstract=4831638 or http://dx.doi.org/10.2139/ssrn.4831638
10. Acharya, Kamal, Software testing for project report. (May 16, 2023). Available at
SSRN: https://ssrn.com/abstract=4831028 or http://dx.doi.org/10.2139/ssrn.4831028
11. Acharya, Kamal, ONLINE CRIME REPORTING SYSTEM PROJECT. (August 10, 2022).
Available at
SSRN: https://ssrn.com/abstract=4831015 or http://dx.doi.org/10.2139/ssrn.4831015
12. Acharya, Kamal, Burger ordering system project report. (October 10, 2022). Available at
SSRN: https://ssrn.com/abstract=4832704 or http://dx.doi.org/10.2139/ssrn.4832704
13. Acharya, Kamal, Teachers Record Management System Project Report (December 10, 2023).
Available at
SSRN: https://ssrn.com/abstract=4833821 or http://dx.doi.org/10.2139/ssrn.4833821
14. Acharya, Kamal, Dairy Management System Project Report (December 20, 2020). Available at
SSRN: https://ssrn.com/abstract=4835231 or http://dx.doi.org/10.2139/ssrn.4835231
15. Acharya, Kamal, Electrical Shop Management System Project (December 10, 2019). Available
at SSRN: https://ssrn.com/abstract=4835238 or http://dx.doi.org/10.2139/ssrn.4835238

23 | P a g e
16. Acharya, Kamal, Online book store management system project report. (Febuary 10, 2020).
Available at
SSRN: https://ssrn.com/abstract=4835277 or http://dx.doi.org/10.2139/ssrn.4835277
17. Acharya, Kamal, Paint shop management system project report. (January 10, 2019). Available
at SSRN: https://ssrn.com/abstract=4835441 or http://dx.doi.org/10.2139/ssrn.4835441
18. Acharya, Kamal, Supermarket billing system project report. (August 10, 2021). Available at
SSRN: https://ssrn.com/abstract=4835474 or http://dx.doi.org/10.2139/ssrn.4835474
19. Acharya, Kamal, Online taxi booking system project report. (March 10, 2022). Available at
SSRN: https://ssrn.com/abstract=4837729 or http://dx.doi.org/10.2139/ssrn.4837729
20. Acharya, Kamal, Online car servicing system project report. (March 10, 2023). Available at
SSRN: https://ssrn.com/abstract=4837832 or http://dx.doi.org/10.2139/ssrn.4837832
21. Acharya, Kamal, School management system project report. (July 10, 2021). Available at
SSRN: https://ssrn.com/abstract=4837837 or http://dx.doi.org/10.2139/ssrn.4837837
22. Acharya, Kamal, Furniture Showroom Management System Project Report (March 21, 2021).
Available at
SSRN: https://ssrn.com/abstract=4839422 or http://dx.doi.org/10.2139/ssrn.4839422
23. Acharya, Kamal, Online Vehicle Rental System Project Report (March 21, 2019). Available at
SSRN: https://ssrn.com/abstract=4839429 or http://dx.doi.org/10.2139/ssrn.4839429
24. Acharya, Kamal, Fruit Shop Management System Project Report (August 10, 2023). Available
at SSRN: https://ssrn.com/abstract=4841048 or http://dx.doi.org/10.2139/ssrn.4841048
25. Acharya, Kamal, Hall Booking Management System Project Report (December 21, 2023).
Available at
SSRN: https://ssrn.com/abstract=4841055 or http://dx.doi.org/10.2139/ssrn.4841055
26. Acharya, Kamal, Lundry Management System Project Report (October 21, 2023). Available at
SSRN: https://ssrn.com/abstract=4841059 or http://dx.doi.org/10.2139/ssrn.4841059
27. Acharya, Kamal, A CASE STUDY OF CINEMA MANAGEMENT SYSTEM PROJECT
(September 25, 2023). Available at
SSRN: https://ssrn.com/abstract=4841209 or http://dx.doi.org/10.2139/ssrn.4841209
28. Acharya, Kamal, A CASE STUDY ON ONLINE TICKET BOOKING SYSTEM PROJECT (May
25, 2024). Available at
SSRN: https://ssrn.com/abstract=4841210 or http://dx.doi.org/10.2139/ssrn.4841210
29. Acharya, Kamal, ONLINE DATING MANAGEMENT SYSTEM PROJECT REPORT. (April 25,
2023). Available at
SSRN: https://ssrn.com/abstract=4842066 or http://dx.doi.org/10.2139/ssrn.4842066
30. Acharya, Kamal, ONLINE RESUME BUILDER MANAGEMENT SYSTEM PROJECT
REPORT. (April 25, 2021). Available at
SSRN: https://ssrn.com/abstract=4842071 or http://dx.doi.org/10.2139/ssrn.4842071
31. Acharya, Kamal, TOLL TEX MANAGEMENT SYSTEM PROJECT REPORT (August 21,
2023). Available at
SSRN: https://ssrn.com/abstract=4842082 or http://dx.doi.org/10.2139/ssrn.4842082

24 | P a g e
32. Acharya, Kamal, Chat Application Through Client Server Management System Project Report
(June 25, 2023). Available at
SSRN: https://ssrn.com/abstract=4842761 or http://dx.doi.org/10.2139/ssrn.4842761
33. Acharya, Kamal, Web Chatting Application Management System Project Report (April 25,
2022). Available at
SSRN: https://ssrn.com/abstract=4842771 or http://dx.doi.org/10.2139/ssrn.4842771
34. Acharya, Kamal, Automobile management system project report (May 25, 2022). Available at
SSRN: https://ssrn.com/abstract=4846917 or http://dx.doi.org/10.2139/ssrn.4846917
35. Acharya, Kamal, College bus management system project report (April 25, 2023). Available at
SSRN: https://ssrn.com/abstract=4846920 or http://dx.doi.org/10.2139/ssrn.4846920
36. Acharya, Kamal, Courier management system project report (May 25, 2023). Available at
SSRN: https://ssrn.com/abstract=4846922 or http://dx.doi.org/10.2139/ssrn.4846922
37. Acharya, Kamal, Event management system project report (April 25, 2021). Available at
SSRN: https://ssrn.com/abstract=4846927 or http://dx.doi.org/10.2139/ssrn.4846927
38. Acharya, Kamal, Library management system project report II (May 25, 2020). Available at
SSRN: https://ssrn.com/abstract=4848857 or http://dx.doi.org/10.2139/ssrn.4848857
39. Kamal Acharya. Teacher record management system project report. Authorea. August 02, 2024.
DOI: https://doi.org/10.22541/au.172261514.46787329/v1
40. Kamal Acharya. POST OFFICE MANAGEMENT SYSTEM PROJECT
REPORT. Authorea. August 02, 2024. DOI:
https://doi.org/10.22541/au.172261514.44494375/v1
41. Kamal Acharya. Fruit shop management system project report. Authorea. August 02, 2024.
DOI: https://doi.org/10.22541/au.172261514.42227675/v1
42. Kamal Acharya. Dairy management system project report. Authorea. August 02, 2024.
DOI: https://doi.org/10.22541/au.172261513.39402347/v1
43. Kamal Acharya. DATA COMMUNICATION AND COMPUTER NETWORK MANAGEMENT
SYSTEM PROJECT REPORT. Authorea. August 01, 2024.
DOI: https://doi.org/10.22541/au.172254873.37480177/v1
44. Kamal Acharya. School management system project report. Authorea. August 01, 2024.
DOI: https://doi.org/10.22541/au.172254873.34023165/v1
45. Kamal Acharya. A CASE STUDY OF CINEMA MANAGEMENT SYSTEM
PROJECT. Authorea. August 01, 2024.DOI:
https://doi.org/10.22541/au.172254873.30191075/v1
46. Kamal Acharya. A CASE STUDY ON ONLINE TICKET BOOKING SYSTEM
PROJECT. Authorea. August 01, 2024. DOI:
https://doi.org/10.22541/au.172254872.26972790/v1
47. Kamal Acharya. Web chatting application project report management system. Authorea. August
01, 2024. DOI: https://doi.org/10.22541/au.172254871.18588592/v1
48. Kamal Acharya. RETAIL STORE MANAGEMENT SYSTEM PROJECT
REPORT. Authorea. August 01, 2024. DOI:
https://doi.org/10.22541/au.172254871.14590154/v1
49. Kamal Acharya. SUPERMARKET MANAGEMENT SYSTEM PROJECT
REPORT. Authorea. August 01, 2024. DOI:
https://doi.org/10.22541/au.172252491.19145062/v1

25 | P a g e
50. Kamal Acharya. SOCIAL MEDIA MANAGEMENT SYSTEM PROJECT
REPORT. Authorea. August 01, 2024. DOI:
https://doi.org/10.22541/au.172252491.11210579/v1
51. Kamal Acharya. Online music portal management system project report. Authorea. August 01,
2024. DOI: https://doi.org/10.22541/au.172252488.89734698/v1
52. Kamal Acharya. COLLEGE BUS MANAGEMENT SYSTEM PROJECT
REPORT. Authorea. July 31, 2024. DOI: https://doi.org/10.22541/au.172245277.70798942/v1
53. Kamal Acharya. AUTOMOBILE MANAGEMENT SYSTEM PROJECT
REPORT. Authorea. July 31, 2024. DOI: https://doi.org/10.22541/au.172245276.67982593/v1
54. Kamal Acharya. Ludo management system project report. Authorea. July 31, 2024
DOI: https://doi.org/10.22541/au.172243999.98091616/v1
55. Kamal Acharya. Literature online quiz system project report. Authorea. July 31,
2024 DOI: https://doi.org/10.22541/au.172243825.53562953/v1
56. Kamal Acharya. Avoid waste management system project. Authorea. July 29, 2024
DOI: https://doi.org/10.22541/au.172228528.85022205/v1
57. Kamal Acharya. CHAT APPLICATION THROUGH CLIENT SERVER MANAGEMENT
SYSTEM PROJECT. Authorea. July 29, 2024.DOI:
https://doi.org/10.22541/au.172228527.74316529/v1
58. Kamal Acharya. Parking allotment system project report. Authorea. July 29, 2024.
DOI: https://doi.org/10.22541/au.172227078.89966943/v1
59. Kamal Acharya. HEALTH INSURANCE CLAIM MANAGEMENT SYSTEM. Authorea. July 26,
2024. DOI: https://doi.org/10.22541/au.172202020.06707762/v1
60. Kamal Acharya. ONLINE TRAIN BOOKING SYSTEM PROJECT REPORT. Authorea. July 22,
2024. DOI: https://doi.org/10.22541/au.172167914.45160406/v1
61. Kamal Acharya. COVID MANAGEMENT SYSTEM PROJECT REPORT. Authorea. July 16,
2024.
DOI: https://doi.org/10.22541/au.172116616.60220024/v1
62. Kamal Acharya. COVID MANAGEMENT SYSTEM PROJECT REPORT. Authorea. July 16,
2024.
DOI: https://doi.org/10.22541/au.172116616.60220024/v1

26 | P a g e
CHAPTER 8

APPENDICES

8.1 – SOURCE CODE

<!doctype html>
<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=utf-
8" />
<title>CC</title>
<link rel="stylesheet" href="styles.css" type="text/css" />
<!--[if lt IE 9]>
<script
src="http://html5shiv.googlecode.com/svn/trunk/html5.js"></scrip
t>
<![endif]-->
<!--
adage, a free CSS web template by ZyPOP (zypopwebtemplates.com/)

Download: http://zypopwebtemplates.com/

License: Creative Commons Attribution


//-->
<meta name="viewport" content="width=device-width, minimum-
scale=1.0, maximum-scale=1.0" />
</head>
<body>
<div id="container" class="width">

<header>

<h1><a href="">Credit<span> Card


Maintenance</span></a></h1>

</header>

<nav>
<div class="inner-nav">
<ul>
<li class="start selected"><a
href="index.jsp">Home</a></li>

27 | P a g e
<li class=""><a href="user.jsp">User</a></li>

<li class=""><a href="admin.jsp">Admin</a></li>

</ul>
</div>
</nav>

<div id="body">

<section id="content">

<article>
<div class="article-info"><div align="right">
<table width="200" border="0">
<tr>

<td><h2 align="center">Introduction to Secure Bank


Transaction</h2></td>
<td><div align="right"><imgsrc="images/medicalrecordscan-
logo.png" width="200" height="80"></div></td>
</tr>
</table>
</div>
</div>

</article>

<article class="expanded">
<p align="justify"> A credit card is different from a
charge card, which requires the balance to be repaid in full
each month. In contrast, credit cards allow the consumers a
continuing balance of debt, subject to interest being charged. A
credit card also differs from a cash card, which can be used
like currency by the owner of the card. </p>

<h3>Secure Bank</h3>

<p align="justify">A bank is a financial institution that


accepts deposits from the public and creates credit. Lending
activities can be performed either directly or indirectly
28 | P a g e
through capital markets. Due to their importance in the
financial stability of a country, banks are highly regulated in
most countries. Most nations have institutionalized a system
known as fractional reserve banking under which banks hold
liquid assets equal to only a portion of their current
liabilities.</p>

</article>
</section>

<aside class="sidebar">

<ul>
<li>
<h4><span>Categories</span></h4>
<ul>
<li><a href="index.jsp">Home Page</a></li>
<li><a href="user_reg.jsp">User
Registration</a></li>
<li><a href="user.jsp">User Login</a></li>
<li><a href="admin.jsp">Admin Login</a></li>
</ul>
</li>

<li>
<h4><span>About us</span></h4>
<ul>
<li class="text">
<div align="justify">Elliptic-curve cryptography (ECC) is an
approach to public-key cryptography based on the algebraic
structure of elliptic curves over finite fields.
<p style="margin: 0;">&nbsp;</p>
</div>
</li>
</ul>
</li>

<li></li>
<li>
<h4><span>Helpful Links</span></h4>
<ul>
<li><a href="index.jsp" title="premium
templates">Home</a></li>

29 | P a g e
<li><a href="about.jsp" title="web hosting">About As</a></li>
<li><a href="contact.jsp"
title="premium templates">Contact As</a></li>
</ul>
</li>
</ul>
</aside>
<div class="clear"></div>
</div>
<footer>
<div class="footer-bottom">
<p>&copy; YourSite 2019. <a href="index.jsp">CCM</a></p>
</div>
</footer>
</div>
</body>
</html>

<%
try
{
session.removeAttribute("username");
session.removeAttribute("name");
session.removeAttribute("pu_key");
session.removeAttribute("pri_key");
session.removeAttribute("dest");
response.sendRedirect("index.jsp");
}
catch(Exception e)
{
}
%>

<%@include file="include/dbconnect.jsp" %>

<%
String sid=(String)session.getAttribute("id");
String imgid="1";
String cid=request.getParameter("id");
//out.print(sid);
//stmt1.executeUpdate("update user_reg set image='"+cid+"' where
id='"+sid+"'");
//response.sendRedirect("user_reg_3.jsp");

%>

30 | P a g e
<html>
<head>
<title>CC</title>
<meta charset="UTF-8">
<meta name="viewport" content="width=device-width">
<script type="text/javascript">
<!--

functionFindPosition(oElement)
{
if(typeof( oElement.offsetParent ) != "undefined")
{
for(varposX = 0, posY = 0; oElement; oElement =
oElement.offsetParent)
{
posX += oElement.offsetLeft;
posY += oElement.offsetTop;
}
return [ posX, posY ];
}
else
{
return [ oElement.x, oElement.y ];
}
}

functionGetCoordinates(e)
{
varPosX = 0;
varPosY = 0;
varImgPos;
ImgPos = FindPosition(myImg);
if (!e) var e = window.event;
if (e.pageX || e.pageY)
{
PosX = e.pageX;
PosY = e.pageY;
}
else if (e.clientX || e.clientY)
{
PosX = e.clientX + document.body.scrollLeft
+ document.documentElement.scrollLeft;
PosY = e.clientY + document.body.scrollTop
+ document.documentElement.scrollTop;
}
PosX = PosX - ImgPos[0];
PosY = PosY - ImgPos[1];

31 | P a g e
document.getElementById("x").innerHTML = PosX;
document.getElementById("y").innerHTML = PosY;
}

//-->
</script>
</head>
<body>
<img id="myImgId" alt="" src="download.jpg" width="400"
height="300" />

<script type="text/javascript">
<!--
varmyImg = document.getElementById("myImgId");
myImg.onmousedown = GetCoordinates;
//-->
</script>

<imgsrc="red.gif" width="400" height="300" alt="" id="myImgId"


/>
<p>X:<span id="x"></span></p>
<p>Y:<span id="y"></span></p></body>
</html>

<%@ include file="include/dbconnect.jsp" %>


<%@page import="java.util.Random"%>
<%@page import="java.sql.ResultSet"%>

<%

try
{
String a=request.getParameter("btn");
if(a.equals("Submit"))
{
String name=request.getParameter("uname");
String pass=request.getParameter("pass");
out.print(name+""+pass);
String qry="select * from user_reg where uname='"+name+"' &&
pass='"+pass+"' ";
// out.print(qry);
ResultSetrs=stmt.executeQuery(qry);
if(rs.next())
{
String sid=rs.getString("id");
String img=rs.getString("image");
String x1=rs.getString("x1");

32 | P a g e
String y1=rs.getString("y1");
String x2=rs.getString("x2");
String y2=rs.getString("y2");
String x3=rs.getString("x3");
String y3=rs.getString("y3");
String accno=rs.getString("accno");
session.setAttribute("accno",accno);
session.setAttribute("sid",sid);
session.setAttribute("img",img);
session.setAttribute("uname",name);
session.setAttribute("x1",x1);
session.setAttribute("y1",y1);
session.setAttribute("x2",x2);
session.setAttribute("y2",y2);
session.setAttribute("x3",x3);
session.setAttribute("y3",y3);
session.setAttribute("res",""+0);
session.setAttribute("imgid",""+1);

response.sendRedirect("user_1.jsp");
}
else
{
%>
<script language="javascript">
alert("user name/ pass Rong!");
window.location="user.jsp";
</script>

<%

}
rs.close();

}catch (Exception e)
{

//out.print(e);

33 | P a g e
}

%>
<%@page contentType="text/html" pageEncoding="UTF-8"%>
<!doctype html>
<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=utf-
8" />
<title>CC</title>
<link rel="stylesheet" href="styles.css" type="text/css" />
<!--[if lt IE 9]>
<script
src="http://html5shiv.googlecode.com/svn/trunk/html5.js"></scrip
t>
<![endif]-->
<!--
adage, a free CSS web template by ZyPOP (zypopwebtemplates.com/)

Download: http://zypopwebtemplates.com/

License: Creative Commons Attribution


//-->
<meta name="viewport" content="width=device-width, minimum-
scale=1.0, maximum-scale=1.0" />
<style type="text/css">
<!--
.style2 {color: #2E6290; font-weight: bold; }
.style3 {
color: #FA8B37;
font-weight: bold;
}
-->
</style>
</head>
<body>
<div id="container" class="width">

<header>

<h1><a href="">Credit<span> Card


Maintenance</span></a></h1>

</header>

34 | P a g e
<nav>
<div class="inner-nav">
<ul>
<li class="start selected"><a
href="index.jsp">Home</a></li>
<li class="start selected"><a
href="user.jsp">User</a></li>

<li class=""><a href="admin.jsp">Admin</a></li>

</ul>
</div>
</nav>

<div id="body">

<section id="content">

<article>
<div class="article-info"><div align="right">
<table width="200" border="0">
<tr>

<td><h2 align="center">User Login </h2></td>


<td><div align="right"><imgsrc="images/user-512.png" width="152"
height="80"></div></td>
</tr>
</table>
</div>
</div>
</article>

<article class="expanded">
<form name="form1" method="post" action="">
<table width="60%" border="0">
<tr>

<td width="23%">&nbsp;</td>
<td width="57%"><table width="61%" border="0" align="center">
<tr>
<td width="35%" class="tdsh"><div align="center" class="style2">
35 | P a g e
<div align="right">User name </div>

36 | P a g e
</div></td>
<td width="8%" class="tdsh"><div align="center"
class="style2">:</div></td>
<td width="57%" class="tdsh"><label>
<input name="uname" type="text" id="uname">
</label></td>
</tr>
<tr>
<td class="tdsh"><div align="center" class="style2">
<div align="right">Password</div>
</div></td>
<td class="tdsh"><div align="center" class="style2">:</div></td>
<td class="tdsh"><label>
<input name="pass" type="password" id="pass">
</label></td>
</tr>
<tr>
<td class="tdsh">&nbsp;</td>
<td colspan="2" class="tdsh"><label>
<input name="btn" type="submit" class="btnclr" id="btn"
value="Submit">
<span class="style3"><a href="user_reg.jsp">New
user...</a></span></label></td>
</tr>
</table></td>
<td width="20%">&nbsp;</td>
</tr>
</table>
</form>
<p align="justify">&nbsp;</p>
</article>
</section>

<aside class="sidebar">

<ul>
<li>
<h4><span>Categories</span></h4>
<ul>
<li><a href="index.jsp">Home Page</a></li>
<li><a href="user_reg.jsp">User
Registration</a></li>
<li><a href="user.jsp">User Login</a></li>
<li><a href="admin.jsp">Admin Login</a></li>
</ul>
</li>

37 | P a g e
<li>
<h4><span>Helpful Links</span></h4>
</li>

<li><ul>
<li><a href="index.jsp" title="premium
templates">Home</a></li>

<li><a href="about.jsp" title="web hosting">About As</a></li>


<li><a href="contact.jsp"
title="premium templates">Contact As</a></li>
</ul>
</li>
</ul>
</aside>
<div class="clear"></div>
</div>
<footer>
<div class="footer-bottom">
<p>&copy; YourSite 2019. <a href="index.jsp">CCM</a></p>
</div>
</footer>
</div>
</body>
</html>
<%@page import="java.util.Random"%>
<%@ include file="include/dbconnect.jsp" %>

<%
String sid=(String)session.getAttribute("sid");

%>

<!doctype html>
<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=utf-
8" />
<title>CC</title>
<link rel="stylesheet" href="styles.css" type="text/css" />
<!--[if lt IE 9]>
<script
src="http://html5shiv.googlecode.com/svn/trunk/html5.js"></scrip
t>
<![endif]-->
<!--

38 | P a g e
adage, a free CSS web template by ZyPOP (zypopwebtemplates.com/)

Download: http://zypopwebtemplates.com/

License: Creative Commons Attribution


//-->
<meta name="viewport" content="width=device-width, minimum-
scale=1.0, maximum-scale=1.0" />
<style type="text/css">
<!--
.style1 {color: #2E6290}
.style2 {font-weight: bold}
-->
</style>
<script language="javascript">
function validate()
{
// alert("");
if (document.form1.name.value == "")
{
alert("Enter the Name");
document.form1.name.focus();
return false;
}
if (document.form1.cont.value == "")
{
alert("Enter the Contact");
document.form1.cont.focus();
return false;
}
if (document.form1.cont.value != "")
{
var z = document.form1.cont.value;
if(!/^[0-9]+$/.test(z)){

alert("enter 0-9")
document.form1.cont.focus();
return false;
}
}

if (document.form1.cont.value != "")
{
var a=document.form1.cont.value;
if(!(a.length ==10)) //i got a problem with this one i think
{

39 | P a g e
alert("Enter 10 character length");
document.form1.cont.focus();

return false;
}

if (document.form1.email.value == "")
{
alert("Enter the email");
document.form1.email.focus();
return false;
}
if (document.form1.email.value != "")
{
varmailformat = /^\w+([\.-]?\w+)*@\w+([\.-]?\w+)*(\.\w{2,3})+$/;
if(document.form1.email.value.match(mailformat))
{
}
else
{
alert("You have entered an invalid email address!");
document.form1.email.focus();
return false;
}
}
if (document.form1.address.value == "")
{
alert("Enter the address");
document.form1.address.focus();
return false;
}
if (document.form1.uname.value == "")
{
alert("Enter the uname");
document.form1.uname.focus();
return false;
}
if (document.form1.pass.value == "")
{
alert("Enter the pass");
document.form1.pass.focus();
return false;
}if (document.form1.cpass.value == "")
{

40 | P a g e
alert("Enter the conform pass");
document.form1.cpass.focus();
return false;
}

//finishMD();
return true;
}
</script>
</head>
<body>
<div id="container" class="width">

<header>

<h1><a href="">Credit<span> Card


Maintenance</span></a></h1>

</header>

<nav>
<div class="inner-nav">
<ul>
<li class="start selected"><a
href="index.jsp">Home</a></li>
<li class="start selected"><a
href="user.jsp">User</a></li>

<li class=""><a href="admin.jsp">Admin</a></li>

<li class=""><a href="about.jsp">About As</a></li>

<li class=""><a href="contact.jsp">Contact</a></li>

</ul>
</div>
</nav>

<div id="body">

<section id="content">

41 | P a g e
<article>
<div class="article-info"><div align="right">
<table width="200" border="0">
<tr>

<td><h2 align="center">User Login </h2></td>


<td><div align="right"><imgsrc="images/user-512.png" width="152"
height="80"></div></td>
</tr>
</table>
</div>
</div>
</article>

<article class="expanded">
<form name="form1" method="post" action="">
<table width="60%" border="0">
<tr>

<td width="16%">&nbsp;</td>
<td width="64%"><table width="597" height="263" border="0"
align="center">
<tr>
<td><a href="user_2.jsp?id=1"><imgsrc="img/1.png" width="100"
height="100"></a></td>
<td><a href="user_2.jsp?id=2"><imgsrc="img/2.png" width="100"
height="100"></a></td>
<td><a href="user_2.jsp?id=3"><imgsrc="img/3.png" width="100"
height="100"></a></td>
<td><a href="user_2.jsp?id=4"><imgsrc="img/4.png" width="100"
height="100"></a></td>
<td><a href="user_2.jsp?id=5"><imgsrc="img/5.png" width="100"
height="100"></a></td>
</tr>
<tr>
<td class="tdsh"><a href="user_2.jsp?id=6"><imgsrc="img/6.png"
width="100" height="100"></a></td>
<td class="tdsh"><a href="user_2.jsp?id=7"><imgsrc="img/7.png"
width="100" height="100"></a></td>
<td class="tdsh"><a href="user_2.jsp?id=8"><imgsrc="img/8.png"
width="100" height="100"></a></td>
<td class="tdsh"><a href="user_2.jsp?id=9"><imgsrc="img/9.png"
width="100" height="100"></a></td>
<td class="tdsh"><a href="user_2.jsp?id=10"><imgsrc="img/10.png"
width="100" height="100"></a></td>
</tr>
</table></td>
<td width="20%">&nbsp;</td>
42 | P a g e
</tr>

43 | P a g e
</table>
</form>
<p align="justify">&nbsp;</p>
</article>
</section>

<aside class="sidebar">

<ul>
<li>
<h4><span>Categories</span></h4>
<ul>
<li><a href="index.jsp">Home Page</a></li>
<li><a href="user_reg.jsp">User
Registration</a></li>
<li><a href="user.jsp">User Login</a></li>
<li><a href="admin.jsp">Admin Login</a></li>
</ul>
</li>

<li>
<h4><span>Helpful Links</span></h4>
</li>
<li><ul>
<li><a href="index.jsp" title="premium
templates">Home</a></li>

<li><a href="about.jsp" title="web hosting">About As</a></li>


<li><a href="contact.jsp"
title="premium templates">Contact As</a></li>
</ul>
</li>
</ul>
</aside>
<div class="clear"></div>
</div>
<footer>
<div class="footer-bottom">
<p>&copy; YourSite 2019. <a href="index.jsp">CCM</a></p>
</div>
</footer>
</div>
</body>
</html>

44 | P a g e
8.2 _O/P SCREENS

45 | P a g e
46 | P a g e
47 | P a g e
48 | P a g e
49 | P a g e
50 | P a g e

You might also like