0% found this document useful (0 votes)
25 views36 pages

DBMS Sandeep

db

Uploaded by

Rijo Simon
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
25 views36 pages

DBMS Sandeep

db

Uploaded by

Rijo Simon
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 36

School of Computer Science and Engineering

Academic Year:2023-2024
Course Code: B22EF0405 DBMS Lab Mini Project Report
Semester & Batch:4th (C2)
Project Details:

Mini Project
ELECTRONIC-POLL
Title:
Place of Project: REVA UNIVERSITY, BENGALURU

Student Details:
S SANDEEP KUMAR
Name: Sign:
ROSHAN REJI
SAMEER
SAMARTH
9986270733, 9036517734
Mobile No:
[email protected], [email protected],
Email-ID:
R22EF174
SRN: R22EF172
R22EF178
R22EF177
Guide and Lab Faculty Members Details
Guide
Name: Sign:
(The Date:
Faculty
Member
Assigned)
Grade by Guide:
Name of Lab Co- Sign:
Faculty 1 Date:
Name of Lab Sign:
Co- Date:
Faculty 2
Grade by Lab
Faculty
Members
(combined)
SEE Examiners
Name of Sign:
Examiner 1: Date:
Name of Sign:
Examiner Date:
2:
Abstract
This report outlines the creation and implementation of E-Poll, an electronic voting system designed to improve
the voting process for small-scale elections in universities and organizations. Traditional voting methods face
issues like logistical challenges, time consumption, and vulnerability to errors and fraud. E-Poll addresses
these problems by using digital technology to enable remote voting, eliminating the need for physical polling
stations and increasing voter participation. E-Poll offers a complete system including voter registration, result
visualization, using OTP verification measure to protect the accuracy of each vote. Key features include an
easy-to-use interface, real-time result calculation. The system is built using HTML, CSS, and PHP, providing a
smooth and interactive user experience. An admin maintains the system, allowing for the addition of voters and
candidates as needed. Future improvements for E-Poll include adding facial recognition for better voter
verification, implementing multi-factor authentication for enhanced security, and restricting access to
authorized devices only. These enhancements aim to keep the system reliable and secure, ensuring it meets the
changing needs of modern voting processes. In summary, E-Poll is a significant improvement in electronic
voting, providing a reliable, efficient, and secure alternative to traditional voting methods. This promotes
higher participation and accuracy in elections within universities and organizations.
TABLE OF CONTENTS

Chapter No. Chapter Name Page No.


1 INTRODUCTION 01
1.1 Overview 01
1.2 Problem Statement 02
1.3 Objectives 02
1.4 Limitations 02
1.5 Literature Review 03
2 ANALYSIS 05
2.1 Proposed System 05
2.2 Requirements Specification 05
2.2.1 Hardware Requirements 05
2.2.2 Software Requirements 05
2.3 Development Environment 06
2.3.1 HTML 06
2.3.2 CSS 06
2.3.3 PHP 07
3 DESIGN 08
3.1 ER Diagram 08
3.2 Schema Diagram 11
4 IMPLEMENTATION 14
4.1 Tables 14
4.2 Triggers 18
5 SNAPSHOTS 19
6 CONCLUSION & FUTURE 31
ENHANCEMENTS
6.1 Conclusion 31
6.2 Future Enhancements 31

BIBLIOGRAPHY 32
LIST OF FIGURES

Figure No. Figure Name Page No.

3.1 ER Diagram 12
3.2 Schema Diagram 15
5.1 Homepage 21
5.2 Admin Login Page 21
5.3 Admin Landing Page/Admin 22
Details Page
5.4 Candidate list Page 22
5.5 Insert Voter 23
5.6 Statistics Page 23
5.7 Statistics Page 24
5.8 Candidates List Page 24
5.9 Voter Login Page 25
5.10 Voter Landing Page 25
5.11 Voter Verification Page 26
5.12 Voter Ballot Page 26
5.13 Vote Confirmation Page 27
5.14 Admin Data Fetch 27
5.15 Candidate Delete Logic 28
5.16 Candidate Insert Logic 28
5.17 Admin Creation Logic 29
5.18 User Creation Logic 29
5.19 Voting Logic 30
5.20 Email Logic 30
5.21 Nomination list view logic 31
5.22 Login Logic 31
5.23 Candidate Update Logic 32
LIST OF TABLES

Table No. Table Name Page No.


4.1.1 Admin Table 17

4.1.2 Candidate Table 17

4.1.3 Govt_DB Table 18

4.1.4 OTP_Expiry Table 18

4.1.5 Voter Table 19

4.1.6 Votes Table 20


E-
POLL
CHAPTER 1

INTRODUCTION

1.1 Overview

Voting is a crucial element of the democratic process. Without a reliable and efficient voting
system, the integrity of elections can be compromised. Traditional voting methods pose several
challenges, including logistical complexity, inconsistent voter turnout, manual errors, and
security concerns. To address these issues, our project, E-Poll, proposes an innovative electronic
voting system designed to modernize the election process for institutions and organizations.
Challenges in current voting system are Logistical Complexity: The process of setting up
polling stations, managing voting equipment, and ensuring security requires immense logistical
effort and resources, Voter Turnout: Inconvenient polling locations, long wait times, and
personal constraints often lead to inconsistent voter turnout. Manual Errors: Traditional
methods involve manual processes for voter registration and vote counting, which are prone to
human errors, affecting the accuracy and credibility of election results. Aim of the project is to
address these issues. The project focuses on Enhancing Accessibility: By enabling voters to cast
their votes from any location using digital devices, E-Poll eliminates the need for physical
presence at polling stations, thus encouraging higher voter participation. Increasing Efficiency:
E-Poll streamlines the entire voting process, from voter registration to result tallying,
significantly reducing the time and resources required. Ensuring Security: The use of advanced
encryption and verification methods ensures the integrity and confidentiality of each vote,
minimizing the risk of tampering and fraud. E-Poll aims to create a more efficient, secure, and
accessible voting system. This project sets the foundation for a future where every vote is easily
cast and accurately counted, thereby strengthening the democratic process.

Page 1
E-
POLL

1.2 Problem Statement:


In the present election system, most tasks are performed manually, using paper-based methods.
Voter details and election records are stored in physical registers and files. The process of vote
counting and result tabulation is carried out manually, which introduces several inefficiencies and
risks.
Disadvantages of the Present Election System:
1. Complex Data Storage: Storing voter and election data in paper registers and files is
cumbersome and inefficient. Retrieving specific data, such as voter information or voting results,
is time- consuming.
2. Data Loss Risk: There is a significant risk of data loss due to physical damage, misplacement, or
other unforeseen circumstances.
3. Updating Challenges: Updating voter information, tracking voter turnout, and maintaining accurate
recordsof votes cast are difficult and prone to errors.
4. Resource Intensive: A large number of workers are required to manage the manual processes,
including data entry, vote counting, and record maintenance, leading to increased operational costs.

1.3 Objectives of the Project


 To Ease the Voting Process: Simplify the process of casting and counting votes for voters
and election officials.

 To Improve the Existing Election System: Address and mitigate the challenges associated
with traditional voting methods, such as logistical complexity, manual errors, and security
concerns.

 To Develop a Scalable System: Ensure that the E-Poll system can handle varying scales of
elections, from small organizational votes to large-scale national elections.

 To Ensure High Availability: Design the system to be reliable and accessible at all times,
especially during critical voting periods.

Page 2
E-
POLL

The project aims to create a comprehensive application that allows users to vote from any
location using digital devices. This requires full web support and the development of an
efficient and user-friendly web interface that provides essential voting information and
functionalities.

1.4 Limitations

 Time-Consuming Implementation: Developing and deploying the E-Poll system can be time-
intensive, especially in regions with limited technological infrastructure.
 Security Concerns: Ensuring the security of electronic votes against hacking and fraud is a
major challenge, requiring robust encryption and verification methods.
 Huge Data Management: Managing and processing large volumes of voter data efficiently and
accurately demands significant computational resources and sophisticated database systems.
 Digital Divide: The reliance on digital devices and internet connectivity may exclude voters
in remote or underprivileged areas, potentially affecting voter turnout.
 Technical Failures: The system may face technical glitches or failures, especially under
high traffic during peak voting periods, which could disrupt the voting process.
 Voter Authentication: Implementing reliable voter authentication methods to prevent
impersonation and ensure that each vote is cast by a legitimate voter can be
challenging.

Page 3
E-
POLL

1.5 Literature Survey


The application of optimization methods to various sectors, including healthcare
management and logistics, has garnered significant attention in research. Optimization techniques
have been extensively explored in areas such as facility location, staff scheduling, patient
allocation, and medical supply chain management. While optimization approaches have been
widely adopted in healthcare, there is still potential for their application in other sectors, including
electoral systems.

Importance of Electronic Voting Systems

 Electronic voting systems have the potential to revolutionize the electoral process by enhancing
efficiency, accessibility, and accuracy. However, the successful implementation of electronic
voting systems requires careful consideration of various factors, including security, usability, and
scalability.

Challenges and Opportunities

 Security Concerns: Ensuring the security and integrity of electronic voting systems is paramount
to maintaining public trust in the electoral process. Research in this area focuses on developing
robust encryption, authentication, and auditing mechanisms to prevent tampering and fraud.

 Usability and Accessibility: Designing user-friendly interfaces and ensuring accessibility for all
voters, including those with disabilities or limited technological proficiency, is crucial for the
adoption and success of electronic voting systems.

 Scalability: Electronic voting systems must be able to accommodate varying scales of elections,
from small local elections to large national or international ones, while maintaining efficiency
and security.

Page 4
E-
POLL

Potential Research Directions

 Future research in electronic voting systems could focus on addressing security concerns by
developing innovative cryptographic techniques and secure protocols for vote casting, tallying,
and auditing.

 Additionally, research could explore methods to enhance the usability and accessibility of
electronic voting systems, making them more inclusive and user-friendly for all voters.

 Scalability is another important area for future research, as electronic voting systems need to be
able to handle increasing numbers of voters and larger-scale elections without compromising
performance or security.

By addressing these challenges and exploring new research directions, future studies can
contribute to the development of more reliable, secure, and accessible electronic voting systems,
thereby strengthening democratic processes worldwide.

Page 5
E-
POLL

CHAPTER 2

ANALYSIS
1. Proposed System

The proposed system, E-Poll, offers a modernized approach to electoral procedures,


aimed at enhancing accessibility and efficiency in the voting process. Unlike traditional paper-
based methods, E-Poll enables voters to cast their ballots remotely using digital devices such as
smartphones or computers, thereby eliminating the constraints associated with physical polling
stations. Through a user-friendly interface, registered voters can conveniently participate in
elections from any location, ensuring broader engagement and representation. E-Poll prioritizes
security by implementing a robust one-time password (OTP) authentication system,
safeguarding the integrity and confidentiality of votes. Additionally, the system automates
result tabulation, reducing the likelihood of errors and ensuring swift and accurate election
outcomes. By offering a transparent, efficient, and accessible voting experience, E-Poll aims to
uphold democratic principles and promote inclusivity in the electoral process.

2. Requirement Specification

The System Requirement Specification (SRS) for the E-Poll project outlines the
functionality and user experiences of the software system. Functionally, the system enables
voter registration, allowing eligible individuals to securely register with multi-factor
authentication. Registered voters can then cast their ballots remotely using digital devices,
facilitated by a unique one-time password (OTP) for each voter. The system automates result
tabulation, providing real- time updates on vote counts and generating comprehensive reports of
election outcomes. Security measures include data encryption and protection against
unauthorized access. Non-functionally, the system prioritizes usability with a user-friendly
interface and accessibility for diverse users, including those with disabilities and language
preferences. It is designed for high performance and reliability, capable of handling large
volumes of users and maintaining data integrity. User experience cases include seamless
registration processes, intuitive voting interfaces, and easy access to real-time election results.

Page 6
E-
POLL

The SRS serves as a comprehensive guide for the development and implementation of the
E-Poll system, ensuring its effectiveness and user satisfaction.

2.2.1 Hardware Requirements

 Processor: Intel Core or AMD processor


 Processor Speed: Current generation, recommended 2.5 GHz or higher
 RAM: 4GB

2.1.2 Software Requirements

 Windows 10/11 Operating system


 Frontend: HTML, CSS
 Backend: MySQL, PHP (8.2.12)

2.2 Development Environment

LANGUAGES: HTML, PHP

SOFTWARE: XAMPP CONTROL PANEL

IDE: VISUAL STUDIO CODE

Page 7
E-
POLL

2.2.1 HTML
Hyper Text Markup Language (HTML) is the main markup language for creating web pages
and other information that can be displayed in a web browser.
HTML is written in the form of HTML elements consisting of tags enclosed on angle brackets (like
<html>), within in the web page content. HTML tags most commonly come in pairs like <h1> and
</h1>, although some tags, known as empty elements, are unpaired, for example <imp. the first tag
in the pair is the start tag, the second tag is the end tag (they are also called opening tag and closing
tag). In between these tags’ web designers can add text, tags, comments and other types of text-
based
content.
The purpose of the web browser is to read HTML documents and compose them into visible or
audible web pages. The browser does not display the HTML tags, but uses the tags to interpret the
content of the page.
HTML elements from the building blocks of all websites. HTML allows images and objects to be
embedded and can be used to create the interactive forms. It provides the means to create structured
documents by denoting the structural semantics for text such as headings, paragraphs, lists, links,
quotes and other items. It can embed scripts written in languages such as JavaScript’s which affect
the behavior of the HTML web pages

2.2.2 PHP
PHP is a server-side scripting language designed for web development but also used as a general-
purpose programming language. It is known for its simplicity, ease of use, and ability to integrate
seamlessly with HTML. PHP is particularly well-suited for creating dynamic web pages and web
applications.

Similar to Java, PHP is platform-independent, meaning that PHP code can run on various operating
systems such as Windows, Linux, and macOS. This versatility makes PHP a popular choice for
web development projects.

Page 8
E-
POLL
PHP scripts are executed on the server, generating HTML output that is sent to the client's web
browser. This enables developers to create interactive and dynamic web pages that respond to user
input and interact with databases.

PHP syntax is similar to C, Java, and Perl, making it relatively easy for developers to learn and use.
It offers a wide range of built-in functions and libraries for tasks such as database access, file
handling, and string manipulation.

Some common uses of PHP include:

 Creating dynamic web pages with content that changes based on user input or database
queries.

 Building web applications such as content management systems (CMS), e-commerce


platforms, and social networking sites.

 Processing form data submitted by users, such as registration forms or contact forms.

 Interacting with databases to retrieve, insert, update, or delete data.

 Generating and manipulating images, PDF files, and other types of media.

Overall, PHP is a versatile and powerful scripting language that empowers developers to build a
wide range of web-based applications and services efficiently. Its flexibility and ease of use have
made it a popular choice for web development projects of all sizes.

Page 9
E-
POLL
.

2.2.3 CSS
Cascading Style Sheets (CSS) is a styling language used to describe the presentation of a
document written in a markup language such as HTML or XML. CSS allows web developers to
control the layout, appearance, and formatting of web pages, providing a more engaging and
visually appealing user experience.

CSS separates the content of a web page from its presentation, allowing developers to define
styles and apply them consistently across multiple pages or an entire website. This separation of
concerns makes it easier to maintain and update the design of a website without having to modify
each individual page.

CSS syntax consists of selectors and declarations. Selectors are used to target HTML elements,
while declarations define the styles to be applied to those elements. Styles can include properties
such as color, font size, margin, padding, and background.

There are three main ways to apply CSS to HTML documents:

1. Inline Styles: Styles are applied directly to individual HTML elements using the `style`
attribute.

2. Internal Styles: Styles are defined within the `<style>` element in the `<head>` section
of an HTML document.

3. External Stylesheets: Styles are stored in separate CSS files and linked to HTML
documents using the `<link>` element.

CSS can be used to create responsive designs that adapt to different screen sizes and devices,
improving accessibility and usability. It also enables the creation of visually appealing layouts,
animations, and effects to enhance the user experience.

Page 10
E-
POLL
Overall, CSS is a powerful tool for web developers to control the presentation and layout of
web pages, allowing for greater creativity and flexibility in design. Its ability to separate content
from presentation makes it an essential component of modern web development.

Page 11
E-
POLL

Chapter
3
SYSTEM DESIGN

3.1 ER Diagram

Page 12
E-
POLL
Entity-Relationship Diagram is a graphical representation and relationship between
entities. It describes the relationship between data. An entity is a piece of data – an object or a
definition that stores data about. Whether data is exchanged between organizations is a
partnership. There are three main components in the E-R diagram:

Entity Type:
It symbolizes anything in the real world that has multiple existence.
 Weak Entity Type:

An entity set that does not have a primary key is referred to as a weak entity set. Here a
primary key refers to the unique attribute about an entity.
 Relationship Type:

A diamond box is used to represent the relationship between two entities. Relationships can
be one-to-one, one-to-many or many-to-many.

 Identifying Relationship Type:

The relationship type that is used to relate weak entity type to its owner is shown by double lined
diamond shaped box.

Attribute:
Characteristics of interest that describe the various properties of an entity.
 Key Attribute:

A key attribute is one for which each entity has a unique value. It is represented by an oval shape
with the attribute name underlined.
 Multi Valued Attribute:

An entity that has multiple values for that attribute is called multi valued attribute.
 Derived Attribute:

As discussed earlier, an attribute whose value depends upon the value of the stored attribute. It
is represented using a dashed oval shape.

In a database system, we deal with various types of keys as follows:


 Candidate Key:

Page 13
E-
POLL
Minimal set of attributes that uniquely identifies each occurrence of an entity type.

 Primary Key:

Candidate key selected to uniquely identify each occurrence of an entity type.


 Unique Key:

Can accept unique or null values.


 Composite Key:

A key that consists of two or more attributes and removal of even one of them would result in
loss of intended information

Page 14
E-
POLL

3.2 SCHEMA DIAGRAM

Page 15
E-
POLL

Relational Schema
A relational database schema is the tables, columns and relationships that make up a relational
database. A relational database schema helps you to organize and understand the structure of a
database. This is particularly useful when designing a new database, modifying support more
functionality, or building integration between databases. There are two steps to creating a relational
database schema: creating the logical schema and creating the physical schema. The logical schema
depicts the structure of the database, showing the tables, columns and relationships with other tables in
the database and can be created with modelling tools or spread sheet and drawing software. The
physical schema is created by actually generating the tables, columns and relationships in the relational
database management software (RDBMS).

Page 16
E-
POLL

Chapter 4

SYSTEM IMPLEMENTATION
1. Tables

4.1.1 Admin table


CREATE TABLE `admin` (`aid` int(11) NOT NULL, `aname` varchar(30) NOT
NULL,`apwd` varchar(8) NOT NULL);
NAME TYPE SIZE DESCRIPTION
aid int 11 ID of the admin
aname Varchar 30 Name of the admin
apwd Varchar 8 Password of the admin

4.1.2 Candidate Table


CREATE TABLE candidate (cid int(11) NOT NULL, cname varchar(30) NOT NULL,
cphoto varchar(200) NOT NULL, party varchar(30) NOT NULL, const varchar(30) NOT
NULL, body varchar(500) NOT NULL, count_vote int(11) NOT NULL);
NAME TYPE SIZE DESCRIPTION
cid int 11 ID of the candidate
cname varchar 30 Name of the candidate
cphoto varchar 200 Photo of the candidate
party varchar 30 Party of the candidate
const varchar 30
body varchar 500 Description of the candidate
count_vote int 11 Vote count of the candidate

Page 17
E-
POLL

4.1.3 Govt_db Table


CREATE TABLE `govt_db` (`sr_no` int(11) NOT NULL, `voter_id` int(11) NOT
NULL,`email` varchar(40) NOT NULL);
NAME TYPE SIZE DESCRIPTIONS
sr_no int 11 Serial number of the new voter
voter_id int 11 Voter id generated for new voter
email varchar 40 Email provided by new voter

4.1.4 OTP_Expiry Table


CREATE TABLE `otp_expiry` (`id` int(11) NOT NULL, `otp` varchar(10) NOT
NULL,`is_expired` int(11) NOT NULL, `create_at` datetime NOT NULL);
NAME TYPE SIZE DESCRIPTION
email Varchar 255 Email of the voter
otp Varchar 10 OTP generated for verification
is_expired int 11 Status of OTP
create_at datetime Timestamp of OTP creation time

Page 18
E-
POLL

4.1.5 Voter Table


CREATE TABLE `voter` (`name` varchar(30) NOT NULL,`email` varchar(30) NOT
NULL,`age` int(11) NOT NULL,`uname` varchar(15) NOT NULL, `voter_id` int(11)
NOT NULL,`password` varchar(50) NOT NULL, `flag` tinyint(1) NOT NULL, `hash`
varchar(32) NOT NULL, `active` int(1) NOT NULL, `voter_photo` varchar(255) NOT
NULL);

NAME TYPE SIZE DESCRIPTION


name varchar 30 Name of the voter
email varchar 40 Email of the voter
age int 11 Age of the voter
uname varchar 15 Username of the voter
voter_id int 11 Voter ID of the voter
password varchar 50 Password of the voter
flag int 1 Indication of voter
hash varchar 32 Hashed password of user
active int 11 Status of the voter
voter_photo varchar 255 Photo of the voter

Page 19
E-
POLL

4.1.6 Votes Table


CREATE TABLE votes(vote_id int(11) not null AUTO_INCREMENT, voter_id int(11)
NOT NULL, cid int(11) NOT NULL, primary key(vote_id),unique(voter_id,cid), foreign
key(voter_id) references voter(voter_id) on delete cascade, foreign key(cid) references
candidates references candidate(cid) on delete cascade);
NAME TYPE SIZE DESCRIPTION
vote_id int 11 ID of the vote
voter_id int 11 ID of the voter
cid int 11 ID of the candidate

Page 20
E-
POLL

Chapter 5

SNAPSHOTS

Fig 5.1 Homepage

Fig 5.2 Admin Login Page


Page 21
E-
POLL

Fig 5.3 Admin Landing Page/Admin Details Page

Fig 5.4 Candidate list Page

Page 22
E-
POLL

Fig 5.5 Insert Voter

Fig 5.6 Statistics Page

Page 23
E-
POLL

Fig 5.7 Statistics Page

Fig 5.8 Candidates List


Page

Page 24
E-
POLL

Fig 5.9 Voter Login Page

Fig 5.10 Voter Landing Page

Page 25
E-
POLL

Fig 5.11 Voter Verification Page

Fig 5.12 Voter Ballot Page

Page 26
E-
POLL

Fig 5.13 Vote Confirmation Page

Page 27
E-
POLL

Chapter 6

CONLUSION AND FUTURE


ENCHANCEMENTS

6.1 Conclusion

E-Poll aims to transform the voting process for small-scale elections, such as those in
organizations and institutions. By using electronic voting technology, E-Poll seeks to make
elections more accessible, efficient, and secure. Traditional voting methods can be complex,
slow, and prone to errors. E-Poll addresses these issues by allowing voters to cast their votes
from any location using digital devices. This eliminates the need for physical polling stations
and encourages higher voter turnout. The system also simplifies the entire voting process, from
voter registration to result tallying, reducing the time and effort needed to conduct elections.
Advanced security measures ensure that each vote is confidential and protected from
tampering. In summary, E-Poll is designed to make small-scale elections easier and more
reliable. By improving accessibility, efficiency, and security, E-Poll helps ensure that every
vote is counted accurately, thereby enhancing the democratic process within organizations
and institutions.

6.2 Future Enhancements


To further improve the E-Poll system and ensure it remains at the forefront of voting
technology, the following enhancements can be considered:

1. Facial Recognition: Implementing facial recognition technology could add an additional layer of
security and streamline the voter identification process. This feature would ensure that the person
casting the vote is indeed the registered voter, reducing the potential for impersonation and fraud.

2. Multi-Factor Authentication (MFA): Incorporating multi-factor authentication would


significantly enhance the security of the voting process. By requiring voters to verify their identity
through multiple verification steps (such as a password, a code sent to their phone, and facial
recognition), the integrity of each vote can be better protected.

Page 28
E-
POLL

3. Device Restriction: Limiting voting access to pre-registered devices can help prevent
unauthorized access to the voting system. Voters could register a specific device during the
voter registration process, and only this device would be allowed to access the voting platform
during elections.

Page 29
E-
POLL

BIBLIOGRAPHY
• PHPMailer: https://github.com/PHPMailer/PHPMailer/
• XAMPP: https://www.apachefriends.org/docs/
• PHP: https://www.w3schools.com/php/

Page 30

You might also like