Internship Report Sample 2024 25
Internship Report Sample 2024 25
BACHELOR OF TECHNOLOGY
in
By
CHELAMKURI VIRAJ
Regd.No:22B91A5710
Prof. B. V D S Sekhar
Dept. of IT
SRKR Engineering College(A)
i
S.R.K.R Engg. College (A) Department of IT/AI&DS/CSBS
SUMMER INTERNSHIP REPORT
S R K R ENGINEERING COLLEGE
(Autonomous)
China Amiram::Bhimavaram
CERTIFICATE
This is to certify that the Internship report work titled “ CYBERSECURITY ”, submitted by
CH.VIRAJ (Regd. No.: 22B91A5710) during 2024 – 2025 academic year, in partial fulfillment of the
requirements for the award of the degree of BACHELOR OF TECHNOLOGY in Computer
science and business systems at BLACKBUCK ENGINEERS PVT.LTD, Tirupati.
Internship Mentor
Dr. K Kishore Raju
Associated professor, IT Dept.
Internship Coordinator
Dr. K Kishore Raju
Associated professor, IT Dept.
DECLARATION
This Internship Work report entitled “Password Strength Checker” has been carried out by us in the
partial fulfillment of the requirements for the award of the degree of B.Tech (IT/AI&DS/CSBS full
form), S.R.K.R Engineering College(A). We hereby declare this Internship work report has not been
submitted to any of the other university/Institute for the award of any other degree/diploma.
CERTIFICATION OF EXAMINATION
This to certify that I have examined the concept and hereby accord my approval of it as a
Internship Work done by CH.VIRAJ(22B91A5710) entitled “ CYBERSECURITY” carried
out and presented in a manner required for its acceptance on partial fulfillments for the award
of the degree of BACHELOR OF TECHNOLOGY in COMPUTER SCIENCE AND
BUSINESS SYSTEMS for which it has been submitted.
This approval does not necessarily endorse or accept every statement made opinion
expressed or conclusions drawn as recorded in the Internship report it only signifies the
acceptance of the report for the purpose for which submitted.
Departmental Committee:
Signature
Internship Mentor :
Senior Faculty :
External Examiner :
ii
HOD : i
PROOF
of
INTERNSHIP REGISTRATION
(Approval e-mail / Approval Letter)
iii
SUMMER INTERNSHIP REPORT
ACKNOWLEDGEMENT
I also would like all the people that worked along with me BLACKBUCK
ENGINEERS PVT.LTD, Tirupati with their patience and openness they created
an enjoyable working environment.
It is indeed with a great sense of pleasure and immense sense of gratitude that I
acknowledge the help of these individuals.
I would like to thank my Head of the Department Prof. P. Ravi Kiran Varma for
his constructive criticism throughout my internship.
I am extremely great full to my department staff members and friends who helped
me in successful completion of this internship.
CH.VIRAJ
(22B91A5710)
iv
SUMMER INTERNSHIP REPORT
ABSTRACT
Organization Information:
vi
SUMMER INTERNSHIP REPORT
vii
SUMMER INTERNSHIP REPORT
viii
SUMMER INTERNSHIP REPORT
INDEX
1.1 Modules………………………………………………………………………………2
2. Analysis……………………………………………………………………………… 3
4. Technology………………………………………………………………………………5
4.1 ASP.NET…………………………………………………………………………….5
4.2 ADP.NET……………………………………………………………………………6
4.3 C#.NET………………………………………………………………………………7
4.4 JAVA………………………………………………………………………………..7
5. Coding…………………………………………………………………………………..10
6. Screenshots………………………………………………………………………………11
7. Conclusios………………………………………………………………………………16
8. Bibilography……………………………………………………………………………17
1. INTRODUCTION
The complexity of business environments constantly grows, both with regard to the amount
of data relevant for making strategic decisions and the complexity of included business
processes. Today’s dynamic and competitive markets often imply rapid (e.g., near real-time)
and accurate decision making. Relevant data are stored across a variety of data repositories,
possibly using different data models and formats, and potentially crossed with numerous
external sources for various context aware analysis. A data integration process combines data
residing on different sources and provides unified view of this data for a user [1]. For
example, in a data warehousing (DW) context, data integration is implemented through
extract-transform- that extracts, cleans, and transforms data from multiple, often
heterogeneous data sources and Finally, delivers data for further analysis. There are various
challenges related to data Flow design. Here we consider two: design evolution and design
complexity.
in part, this is due to a growing use of agile methodologies in data Flow design and BI
systems in general. But changes may happen during the entire DW lifecycle. Having an up-
and-running DW system satisfying an initial set of requirements is still a subject to various
changes as the business evolves. The data Flows populating a DW, as other software
Artefacts, do not lend themselves nicely to evolution events and in general, due to their
complexity, maintaining them manually is hard. The situation is even more critical in today’s
BI settings, where on-the-fly decision making requires faster and more efficient adapting to
changes. Changes in business needs may result in new, changed or removed information
requirements. Thus having an incremental and agile solution that can automatically absorb
occurred changes and produce a Flow satisfying the complete set of requirements would
largely facilitate the design and maintenance of data-intensive Flows.
In an enterprise environment data is usually shared among users with varying technical skills
and needs, involved in different parts of a business process. Typical real-world data-intensive
workloads have high temporal locality, having 80% of data reused in a range from minutes to
hours. However, the cost of accessing these data, especially in distributed scenarios, is often
high. At the same time, intertwined business processes may also imply overlapping of data
processing. For instance, a sales department may analyze the revenue of the sales for the past
year, while Finance may be interested in the overall net profit. Computing the net profit can
largely benefit from the total revenue already computed for the sales department and thus, it
could benefit from the sales data Flow too. The concept of reusing partial results is not new.
Software and data reuse scenarios in data integration have been proposed in the past, showing
that such reuse would result in substantial cost savings, especially for large, complex business
environments. Data Flow re use could result in a significant reduce in design complexity, but
also in intermediate Flow executions and thus, in total execution time too.
10
SUMMER INTERNSHIP REPORT
2. SYSTEM ANALYSIS
Following the previously proposed set of flow transformations in the context of ETL
processes in Co Al we extend this set considering also the associative property of n-array
operations (e.g., Join) and thus rely on the following four flow transformations used for
reordering the operations. Swap Applied to a pair of adjacent unary operations, it
interchanges the order of these operations. Distribute/Factorize. Applied on a unary
operation over an adjacent n-array operation, it respectively distributes the unary operation
over the adjacent nary operation or factorizes several unary operations over the adjacent n-
array operation. Merge/Split. Applied on a set of adjacent unary operations, it respectively
merges several operations into a single unary operation or splits a unary operation into
several unary operations. Re-associate. Applied on a pair of mutually associative n-array
operations, it interchanges the order in which these operations are executed.
11
SUMMER INTERNSHIP REPORT
Supplier
=======
1) send product details
2) send payment verification
3) Store buying detail
4) Store line items using join product and order
12
SUMMER INTERNSHIP REPORT
The software requirement specification can produce at the culmination of the analysis task.
The function and performance allocated to software as part of system engineering are refined
by established a complete information description, a detailed functional description, a
representation of system behavior, and indication of performance and design constrain,
appropriate validate criteria, and other information pertinent to requirements.
13
SUMMER INTERNSHIP REPORT
5. TECHNOLOGY
a. ASP.NET
ASP.NET works on top of the HTTP protocol, and uses the HTTP commands and
policies to set a browser-to-server bilateral communication and cooperation.
ASP.NET web forms extend the event-driven model of interaction to the web
applications. The browser submits a web form to the web server and the server returns a full
markup page or HTML page in response.
All client side user activities are forwarded to the server for tasteful processing.
The server processes the output of the client actions and triggers the reactions.
Now, HTTP is a stateless protocol. ASP.NET framework helps in storing the information
regarding the state of the application, which consists of:
Page state
Session state
The page state is the client state, i.e., the content of various input fields in the
web form. The session state is the collective information obtained from various pages the
user visited and worked with, i.e., the overall session state. To clear the concept, let us take
an example of a shopping cart.
User adds items to a shopping cart. Items are selected from a page, say the items
page, and the total collected items and price are shown on a different page, say the cart page.
Only HTTP cannot keep track of all the information coming from various pages. ASP.NET
session state and server side infrastructure keeps track of the information collected globally
over a session.
14
SUMMER INTERNSHIP REPORT
The ASP.NET runtime carries the page state to and from the server across page
requests while generating ASP.NET runtime codes, and incorporates the state of the server
side components in hidden fields.
This way, the server becomes aware of the overall application state and operates
in a two-tiered connected way.
The ASP.NET runtime transforms the .aspx page into an instance of a class,
which inherits from the base class page of the .Net framework. Therefore, each ASP.NET
page is an object and all its components i.e., the server-side controls are also objects.
b. ADO.NET
No matter what you do with data, there are certain fundamental concepts that you
should understand about the data approach in ADO.NET. You might never need to know
some of the details of data handling- for example, you might never need to directly edit an
XML file containing data- but it is very useful to understand the data architecture in
ADO.NET, what the major data components are, and how the pieces fit together.
15
SUMMER INTERNSHIP REPORT
A model based on always connected data can make a difficult and impractical to
exchange data across application and organizational boundaries using a connected
architecture. If two components need to share the same data, both have to be connected, and a
way must be devised for the components to pass data back and forth.
For all the reasons, data accessed with ADO.NET is designed around an
architecture that uses connections sparingly. Applications are connected to the database only
long enough to fetch or update the data. Because the database is not holding onto connections
that are largely idle, it can service many more users.
c. Overview of C#.Net
C# is a simple, modern, object oriented, and type –safe programming language derived from
C and C++.
It will immediately be familiar to C and C++ programmers.
C# aims to combine the high productivity of visual basic and the raw power of C++
Visual C#.NET is Microsoft’s C# development tool.
It includes an interactive development environment, visual designers for building windows
and web applications, a compiler and a debugger.
Visual C#.NET is part of a suite of products, called Visual Studio .NET, that also includes
Visual Basics .NET, Visual C++.NET and the Jscript scripting language.
The .NET frame work defines a “Common Language Specification” (CLS), a short of lingua
franca that ensures seamless interoperability between CLS-complaint languages and class
libraries.
For C# developers this means even though C# is a new language, it has complete access to
the same rich class libraries that are used by seasoned tools such as Visual Basic.NET and
Visual C++.NET.
d. JAVA
16
SUMMER INTERNSHIP REPORT
Create special effects with images that give the impression that a button is either highlighted
or depressed whenever the mouse pointer is hovered over it.
Validate
the fly” without the need for a server-side language like PHP. JavaScript is not Java, though
if you come from a Java background, you will notice that both languages look similar when
written. Java is a full featured and comprehensive programming language similar to C or C+
+, and although JavaScript can interact with Java web applications, the two should not be
confused.
Different web browsers will run your JavaScript in different, sometimes incompatible
ways. In order to work around this, it is often necessary to use JavaScript itself to detect the
capabilities of the browser in which it finds itself, and alter its operation depending on the
result.
To revisit the original definition in this chapter, note the following points:
Interpreted refers to the fact that JavaScript code is executed (acted on) as it is loaded into
the browser. This is a change of pace from compiled languages like Java, which check
your program thoroughly before running a single line of code, and can have many
implications that can catch you out if you are from a non-interpreted programming
background.
Client-side has been defined already in the previous chapter.
Event-based refers to JavaScript’s ability to run certain bits of code only when a specified
event occurs. An event could be the page being loaded, a form being submitted, a link
being clicked, or an image being pointed at by a mouse pointer.
Object-oriented signals that JavaScript’s power to exert control over an HTML page
is based on manipulating objects within that page.
If you are familiar with object-oriented programming, you will be aware of some of
the power that this can bring to the coding environment.
e. DATABASE
17
SUMMER INTERNSHIP REPORT
A database is similar to a data file in that it is storage place for data. Like a data
file, a database does not present information directly to a user, the user runs an application
that accesses data from the database and presents it to the users in an untreatable format. A
database typically ha two components: the files holding the physical database access data.
Relational Database
There are different ways to organize data in a database but relational databases are
one of the most effective. Relational database systems are an application of mathematical set
theory to the problem of effectively organizing data. In a relational database is collected into
tables called relations in relation theory.
When organizing data into tables, you can usually find many different ways to
define tables. Relational database theory defines a process, normalization, which ensures that
the set of tables you define will organize our data effectively.
Client/Server
Examples of
18
SUMMER INTERNSHIP REPORT
</tr>
<tr>
<td>
UserId</td>
<td>
<asp:TextBox ID="TextBox4" runat="server"></asp:TextBox>
</td>
</tr>
<tr>
<td>
Password</td>
<td>
<asp:TextBox ID="TextBox5" runat="server"></asp:TextBox>
</td>
</tr>
<tr>
<td>
<asp:Label ID="Label1" runat="server" style="font-weight: 700"></asp:Label>
</td>
<td>
<asp:Button ID="Button1" runat="server" onclick="Button1_Click"
Text="Register" />
</td>
</tr>
</table><br /><br /><br />
</asp:Content>
6.2 Results:
20
SUMMER INTERNSHIP REPORT
7. OUTPUT SCREENS
Home page:
Registration page:
21
SUMMER INTERNSHIP REPORT
Login Page:
22
SUMMER INTERNSHIP REPORT
8. CONCLUSION
23
SUMMER INTERNSHIP REPORT
9. BIBLOGRAPHY
The following books are referred during the analysis and execution phase of the project
4. Y. Chen, S. Alspaugh, and R. Katz, “Interactive analytical processing in big data systems:
A cross-industry study of map reduce workloads,” Proceedings of the VLDB Endowment,
vol. 5, no. 12, pp. 1802–1813, 2012.
WEBLINKS:
www.c#tutorial.com - covering all the most important C# concepts. This tutorial is
primarily for new users.
www.DotnetSpider.com - what is the .NET all about? For sample projects.
24