Anda di halaman 1dari 95

ADVERTISEMENT POSTING WEBSITE

TABLE OF CONTENTS
1. Abstract
2. System Analysis
2.1 Existing system
2.2 Problem Definition
2.3 Proposed System
2.4 Requirement Analysis
2.5 Requirement Specifications
3. Software Specification
4. System Designing
5. Project Testing
6. Database Design
7. Project Coding
8. Output Screens
9. Future Improvement
10. Conclusion
11. Bibliography

ADVERTISEMENT POSTING WEBSITE

ABSTRACT

ADVERTISEMENT POSTING WEBSITE

1. ABSTRACT
The project aims at establishing a comprehensive portal for providing news. This portal is an
organized conduit and online, for providing up-to-date news information on the Internet. The
portal will consist of sections addressing different information needs, as per the Interest of the
user. It informs, provides extensive resources, and services online for the general public. It
provides a vast range of new opportunities for feedback, customization of content, instant
publishing, (hyper) linking, articles etc.Common people are the users of this website. The
developers provide email alerts and advertisement facility to the users of this site. Latest news
developments can be mailed to the members of the site.The user should have an id & password
to access this portal. RSS feed technology is used here. This deals with two areas of web based
news publishing and administration of the news site.

ADVERTISEMENT POSTING WEBSITE

ORGANIZATIONAL PROFILE

ADVERTISEMENT POSTING WEBSITE

2. ORGANISATIONAL PROFILE
HCL CDC COMPANY PROFILE
HCL dominates the IT space as a leader. 58,000 gifted professionals, a colossal US $5 Billion
turnover, an international presence in 21 countries, and most importantly a deep-rooted
commitment to innovate, makes it a true Technology Giant.
As the fountainhead of the most significant pursuit of human mind, HCL believes, only a
leader can transform you into a leader. HCL CDC is an initiative that enables individuals to
benefit from HCL expertise in the space and become Industry ready IT professionals
HCL CDC career program equips you to meet emerging industry challenges with finesse
and ease. Opportunities to grow with HCL CDC are limitless, catapulting you to high level
controlling positions in Mega Corporates.
With top HCL CDC professionals as your trainers, customised career programs, hands on
experience, state of art infrastructure and world class training your career graph is bound to
follow a steep rise
HCL takes students to the core of IT fundamentals and the most advanced cutting
problems .Its course modules are structured to give you the best of both worlds, academic and
hands-on.
Whether you are a beginner or a working professional, HCL CDC can make a difference to
your learning curve and thereby to your earning curve.

ADVERTISEMENT POSTING WEBSITE

Our Vision
"Together we create the Enterprises of Tomorrow"
Our Mission
"To provide world-class Information Technology solutions and services in order to enable
our customers to serve their customers better"
Our Alliances and Partnerships
To provide world-class solutions and services to all our customers, we have formed
Alliances and Partnerships with leading IT companies worldwide.
HCL Infosystems has alliances with global technology leaders like Intel, AMD,
Microsoft, Bull, Toshiba, Nokia, Sun Microsystems, Ericsson, NVIDIA, SAP, Scansoft,
SCO, EMC, Veritas, Citrix, CISCO, Oracle, Computer Associates, RedHat, Infocus, Duplo,
Samsung and Novell.
These alliances on one hand give us access to best technology & products as well as
enhancing our understanding of the latest in technology. On the other hand they enhance
our product portfolio, and enable us to be one stop shop for our customers.

ADVERTISEMENT POSTING WEBSITE

Chairmans Message

From the desk of Chairman & CEO


A fairy tale story of Indian IT industry continues to amaze the world and so does our diversity
and integrity. With all the opportunities that lie ahead for the information technology
professional, there still remains a significant skill gap.
There is a clear imbalance between the demand and supply of IT professionals. The current
demand of 4 lacs skilled IT professionals is expected to leapfrog manifolds when the industrys
projected volume rises to rupees 3, 80,000 Crore by 2010.
At HCL, we are committed to bridge this digital divide and provide trained manpower to the IT
industry. As an IT giant, HCL has the advantage of leveraging its three decade legacy of industry
expertise, its diverse reservoir of technical insights and its in-house skilled resource pool of
talent. HCL groom young minds with path breaking knowledge-ware in IT and thereby help
them gain a firm foothold in their chosen sphere and have a flourishing and promising career as
the next generation of information pioneers.
We have a vision to make India one of most powerful IT country in the world. We always
believe to return our society the best possible things and whats better than a well educated
society. So it gives me immense pleasure in announcing another path breaking endeavor by HCL,
to provide quality education in the field of IT.
At HCL CDC education is just not a thing from books but from the real experience of HCL
Professionals as the faculties have the opportunity to work on live projects. It is a complete
personality development program where students get the chance to interact with leading IT
professionals. Above all our course curriculum is developed and designed by the top HCL
professional who knows industrys demand.
Thats why we call it Career Development Program with future ready professionals.
Looking forward to see you people at the new horizon.
Lets move ahead with PRIDE, PASSION and PERFORMANCE.

ADVERTISEMENT POSTING WEBSITE

INTRODUCTION

ADVERTISEMENT POSTING WEBSITE

1.INTRODUCTION
Online advertising is a form of promotion that uses the Internet and World Wide Web for the
expressed purpose of delivering marketing messages to attract customers.Example of online
advertising include contextual ads on search engine result pages,banner ads,Rich Media
ads,Social network advertising,Online classified advertising networks and e-mail
marketing,include e-mail spam.
Register
Login
Post Advertisments
Post News
Display advertisement
Send e-mail

3.1 Purpose
The main objective of this project aims at establishing a comprehensive portal for providing
news.This portal is an organized conduit and online ,for providing up-to-date news information
on the Internet.The portal will consist of sections addressing different information needs ,as per
the Interest of the user.It informs,provides extensiveresources,and services online for the general
public.It provides a vast range of new opportunities for feedback,instant publishing etc. The
developers provide email alerts and advertisement facility to the users of this site. Latest news
developments can be mailed to the members of the site.The user should have an id & password
to access this portal.

3.2Scope

ADVERTISEMENT POSTING WEBSITE

Existing System with Limitations:


General person who wants to give an advertisment should go to respective newspaper office and
give the paper ad to publish.Then, the press can publish the advertisment in their news paper.This
is the traditional way to publish the advertisment.The person who wants to give advertisement he
has to move to the publisher. This is the difficult process to overcome this limitation, introducing
Advertisement Posting Website.

Proposed System Features:


To overcome the limitations of traditional advertisment, introducing Advertisement Posting
Website. The main objective of this project aims at establishing a comprehensive portal for
providing news.This portal is an organized conduit and online ,for providing up-to-date news
information on the Internet.The portal will consist of sections addressing different information
needs ,as per the Interest of the users.

ADVERTISEMENT POSTING WEBSITE

SYSTEM DESIGN

ADVERTISEMENT POSTING WEBSITE

2.System Analysis
2.1 System Analysis
After analyzing the requirements of the task to be performed, the next step is to analyze
the problem and understand its context. The first activity in the phase is studying the existing
system and other is to understand the requirements and domain of the new system. Both the
activities are equally important, but the first activity serves as a basis of giving the functional
specifications and then successful design of the proposed system. Understanding the properties
and requirements of a new system is more difficult and requires creative thinking and
understanding of existing running system is also difficult, improper understanding of present
system can lead diversion from solution.
ANALYSIS MODEL
SDLC METHDOLOGIES
This document play a vital role in the development of life cycle (SDLC) as it
describes the complete requirement of the system. It means for use by developers and will be the
basic during testing phase. Any changes made to the requirements in the future will have to go
through formal change approval process.
Life Cycle Model:
Waterfall model
The waterfall model is a sequential development process, in which development is seen
as flowing steadily downwards (like a waterfall) through the phases of requirements analysis,
design, implementation, testing (validation), integration, and maintenance. The first formal
description of the waterfall model is often cited to be an article published by Winston W. Royce
in 1970 although Royce did not use the term "waterfall" in this article.

ADVERTISEMENT POSTING WEBSITE

Basic principles of the waterfall model are:

Project is divided into sequential phases, with some overlap and splash back acceptable
between phases.

Emphasis is on planning, time schedules, target dates, budgets and implementation of an


entire system at one time.

Tight control is maintained over the life of the project through the use of extensive
written documentation, as well as through formal reviews and approval/signoff by the
user and information technology management occurring at the end of most phases before
beginning the next phase.

Section I.1 Model


In Royce's original Waterfall model, the following phases are followed in order:

ADVERTISEMENT POSTING WEBSITE


1. Requirements specification
2. Design
3. Construction (implementation or condition
4. Integration
5. Testing and debugging (Validation)
6. Installation
7. Maintenance
To follow the waterfall model, one proceeds from one phase to the next in a sequential manner.
For example, one first completes requirements specifications, which after sign-off are considered
"set in stone." When the requirements are fully completed, one proceeds to design. The software
in question is designed and a blueprint is drawn for implementers (coders) to follow this
design should be a plan for implementing the requirements given. When the design is fully
completed, an implementation of that design is made by coders. Towards the later stages of this
implementation phase, separate software components produced are combined to introduce new
functionality and reduced risk through the removal of errors. Thus the waterfall model maintains
that one should move to a phase only when its preceding phase is completed and perfected
Criticism
The waterfall model is argued by many to be a bad idea in practice. This is mainly because of
their belief that it is impossible for any non-trivial project to get one phase of a software
product's lifecycle perfected, before moving on to the next phases and learning from them. For
example, clients may not be aware of exactly what requirements they need before reviewing a
working prototype and commenting on it; they may change their requirements constantly.
Designers and programmers may have little control over this. If clients change their requirements
after the design is finalized, the design must be modified to accommodate the new requirements.
This effectively means invalidating a good deal of working hours, which means increased cost,

ADVERTISEMENT POSTING WEBSITE


especially if a large amount of the projects resources has already been invested in Big Design Up
Front.
Dr. Winston W. Royce, in "Managing the Development of Large Software Systems", the first
paper that describes the waterfall model, also describes the simplest form as "risky and invites
failure
David Parnas, in "A Rational Design Process: How and Why to Fake It", writes:
Many of the [system's] details only become known to us as we progress in the [system's]
implementation. Some of the things that we learn invalidate our design and we must backtrack.
The idea behind the waterfall model may be "measure twice; cut once", and those opposed to the
waterfall model argue that this idea tends to fall apart when the problem being measured is
constantly changing due to requirement modifications and new realizations about the problem
itself. As a solution can serve some "investment of man-time", ordering some experienced
developer to spend time on refactoring, to consolidate the software back together. Another
approach is to prevent these needs by a predicting design, targeting modularity with interfaces.

ADVERTISEMENT POSTING WEBSITE

SYSTEM REQUIRMENTS
SPECIFICATION

ADVERTISEMENT POSTING WEBSITE

3.SYSTEM REQUIRMENTS SPECIFICATION


Requirement analysis for web applications encompasses three major tasks: motivation and goals
for the web application are identified,and the categories of users are defined.In the requirments
written from end-users point-of-view are developed.This intent is to establish a basic
understanding of why the web application is built,who will use it,and what problems it will solve
for its users.

3.1 Software requirement Specification:


A set of programs associated with the operation of a computer is called software.Software is the
part of the computer system,which enables the user to interact with several physical hardware
devices.
The minimum software requirement specifications for developing this project are as follows:

Operating System

Windows XP

Platform

Visual Studio .Net 2005

Database

SQL Server 2005

WEB TECHNOLOGY

ACTIVE SERVER PAGES.NET

Languages

C#.Net.

ADVERTISEMENT POSTING WEBSITE

3.2 Hardware Requirements Specification:


The collection of internal electronic circuits and external physical devices used in building a
computer is called the Hardware.The minimum hardware requirment specifications for
developing this project are as follows:

Hard Disk

20 GB

RAM

Minimum 256 MB

Processor

Pentium III and Above (or) Equivalent

3.3 Functional requirements:


The Advertisement posting website consists of the following modules.The modules are

Administrator
User

Admin Module:
The Functionalities of the administrator is :
1. The administrator should login into the system with unique his/her password and
2.
3.
4.
5.
6.
7.

username.
If the username and password is validated then he can gain access to the system.
The administrator can view candidates or user details.
Post News
Delete invalid users.
Delete invalid Advertisements.
View feedback.

The Administrator can do the following actions:

ADVERTISEMENT POSTING WEBSITE


1. Login
2. Change password
3. Admin Functionalities.
a. Post News.
b. View users.
c. Delete invalid users.
d. Delete invalid advertisements.
e. View feedback
f. Sending e-mails to registered users.
User Module:
The Functionalities of the user is:
1.
2.
3.
4.

A new user can register with the registration form by entering his appropriate details.
The user should login into the system with unique his/her password and username.
If the username and password is validated then he can gain access to the system.
The user can change his/her password. To change the password, it should ask for the old

5.
6.
7.
8.

password, new password and conform password.


Post ads to the site.
Post News to the site.
Send feedback for advertisements.
Search for different advertisement details.

The user can do the following actions:


1.
2.
3.
4.

Register
Login
Change password
Client functionalities
a. Post ads
b. Post news

ADVERTISEMENT POSTING WEBSITE


c. Search ads
d. Send feedback for ads
5.Logout.

ADVERTISEMENT POSTING WEBSITE

UML DIAGRAMS

Use case diagrams:

ADVERTISEMENT POSTING WEBSITE

Login

Post News

User Deletion

Admin
Advertisement Deletion

View Suggestions

Sending e-mail

User Use case diagram:

ADVERTISEMENT POSTING WEBSITE

Login

Post Advertisement

Post news

User
Search Advertisement

View News

Feedback

Admin Sequence diagram:

ADVERTISEMENT POSTING WEBSITE

User sequence diagram:

ADVERTISEMENT POSTING WEBSITE

Class diagram:

ADVERTISEMENT POSTING WEBSITE

Admin Activity diagram:

ADVERTISEMENT POSTING WEBSITE

Login

If
Valid
Yes
Vaild

Post News

No

Sends e-mail
Delete Users Delete Ads View Feedbackk
Change password

ADVERTISEMENT POSTING WEBSITE


User Activity diagram:

Registration

If
Valid
No
Yes
Login

If
Valid
Vaild
Yes

Post Ads

Post News

Search Ads

No

Feedback Announcements
Change password

ADVERTISEMENT POSTING WEBSITE

Database Design
E-RDiagram:

ADVERTISEMENT POSTING WEBSITE

Admin Table:

User registration table:

ADVERTISEMENT POSTING WEBSITE

Advertisement posting table:

ADVERTISEMENT POSTING WEBSITE

News post table:

Feedback table:

ADVERTISEMENT POSTING WEBSITE

ADVERTISEMENT POSTING WEBSITE

TECHNOLOGY

ADVERTISEMENT POSTING WEBSITE

Technology
Dot net framework:
The Microsoft .NET Framework is a software framework that can be installed on computers
running Microsoft Windows operating systems. It includes a large library of coded solutions to
common programming problems and a virtual machine that manages the execution of programs
written specifically for the framework. The .NET Framework is a Microsoft offering and is
intended to be used by most new applications created for the Windows platform.
The framework's Base Class Library provides a large range of features including user interface,
data access, database connectivity, cryptography, web application development, numeric
algorithms, and network communications. The class library is used by programmers, who
combine it with their own code to produce applications.
Programs written for the .NET Framework execute in a software environment that manages the
program's runtime requirements. Also part of the .NET Framework, this runtime environment is
known as the Common Language Runtime (CLR). The CLR provides the appearance of an
application virtual machine so that programmers need not consider the capabilities of the specific
CPU that will execute the program. The CLR also provides other important services such as
security, memory management, and exception handling. The class library and the CLR together
constitute the .NET
Section I.2 Principal design features
Interoperability
Because interaction between new and older applications is commonly required, the .NET
Framework provides means to access functionality that is implemented in programs that
execute outside the .NET environment. Access to COM components is provided in the
System.Runtime.InteropServices and System.EnterpriseServices namespaces of the
framework; access to other functionality is provided using the P/Invoke feature.

ADVERTISEMENT POSTING WEBSITE


Common Runtime Engine
The Common Language Runtime (CLR) is the virtual machine component of the .NET
framework. All .NET programs execute under the supervision of the CLR, guaranteeing
certain properties and behaviors in the areas of memory management, security, and
exception handling.
Language Independence
The .NET Framework introduces a Common Type System, or CTS. The CTS
specification defines all possible data types and programming constructs supported by the
CLR and how they may or may not interact with each other. Because of this feature,
the .NET Framework supports the exchange of instances of types between programs
written in any of the .NET languages. This is discussed in more detail in Microsoft .NET
Languages.
Base Class Library
The Base Class Library (BCL), part of the Framework Class Library (FCL), is a library
of functionality available to all languages using the .NET Framework. The BCL provides
classes which encapsulate a number of common functions, including file reading and
writing, graphic rendering, database interaction and XML document manipulation.
Simplified Deployment
The .NET framework includes design features and tools that help manage the installation
of computer software to ensure that it does not interfere with previously installed
software, and that it conforms to security requirements.
Security
The design is meant to address some of the vulnerabilities, such as buffer overflows, that
have been exploited by malicious software. Additionally, .NET provides a common
security model for all applications.
Portability
The design of the .NET Framework allows it to theoretically be platform agnostic, and
thus cross-platform compatible, however in practice, some classes within the Base Class
Library (for example, those within the Windows. Forms namespace) are Windowsspecific. Although Microsoft's implementation of the CLR and base class libraries are
designed to run only under Microsoft Windows, a cross-platform implementation is

ADVERTISEMENT POSTING WEBSITE


available by way of the Mono Project, which can be run on both Windows/PC and
Unix/Linux. Microsoft submits the specifications for the Common Language
Infrastructure (which includes the core class libraries, Common Type System, and the
Common Intermediate Language),[4][5][6] the C# language,[7] and the C++/CLI language[8]
to both ECMA and the ISO, suggesting they are available as open standards.
Section I.3 Architecture

Visual overview of the Common Language Infrastructure (CLI)


(a) Common Language Infrastructure (CLI)
Main article: Common Language Infrastructure
The purpose of the Common Language Infrastructure, or CLI, is to provide a language-neutral
platform for application development and execution, including functions for exception handling,
garbage collection, security and interoperability. By implementing the core aspects of the .NET
Framework within the scope of the CLR, this functionality will not be tied to a single language
but will be available across the many languages supported by the framework. Microsoft's
implementation of the CLI is called the Common Language Runtime or CLR.

ADVERTISEMENT POSTING WEBSITE


(b) Assemblies
Main article: .NET assembly
The CIL code is housed in .NET assemblies. As mandated by specification, assemblies are stored
in the Portable Executable (PE) format, common on the Windows platform for all DLL and EXE
files. The assembly consists of one or more files, one of which must contain the manifest, which
has the metadata for the assembly. The complete name of an assembly (not to be confused with
the filename on disk) contains its simple text name, version number, culture, and public key
token. The public key token is a unique hash generated when the assembly is compiled, thus two
assemblies with the same public key token are guaranteed to be identical from the point of view
of the framework. A private key can also be specified known only to the creator of the assembly
and can be used for strong naming and to guarantee that the assembly is from the same author
when a new version of the assembly is compiled (required to add an assembly to the Global
Assembly Cache).
(c) Metadata
Main article: .NET metadata
All CIL is self-describing through .NET metadata. The CLR checks the metadata to ensure that
the correct method is called. Metadata is usually generated by language compilers but developers
can create their own metadata through custom attributes. Metadata contains information about
the assembly, and is also used to implement the reflective programming capabilities of .NET
Framework

Security
.NET has its own security mechanism with two general features: Code Access Security (CAS),
and validation and verification. Code Access Security is based on evidence that is associated
with a specific assembly. Typically the evidence is the source of the assembly (whether it is
installed on the local machine or has been downloaded from the intranet or Internet). Code
Access Security uses evidence to determine the permissions granted to the code. Other code can
demand that calling code is granted a specified permission. The demand causes the CLR to
perform a call stack walk: every assembly of each method in the call stack is checked for the

ADVERTISEMENT POSTING WEBSITE


required permission; if any assembly is not granted the permission a security exception is
thrown.
When an assembly is loaded the CLR performs various tests. Two such tests are validation and
verification. During validation the CLR checks that the assembly contains valid metadata and
CIL, and whether the internal tables are correct. Verification is not so exact. The verification
mechanism checks to see if the code does anything that is 'unsafe'. The algorithm used is quite
conservative; hence occasionally code that is 'safe' does not pass. Unsafe code will only be
executed if the assembly has the 'skip verification' permission, which generally means code that
is installed on the local machine.
.NET Framework uses AppDomains as a mechanism for isolating code running in a process.
AppDomains can be created and code loaded into or unloaded from them independent of other
AppDomains. This helps increase the fault tolerance of the application, as faults or crashes in one
AppDomains do not affect rest of the application. AppDomains can also be configured
independently with different security privileges. This can help increase the security of the
application by isolating potentially unsafe code. The developer, however, has to split the
application into sub domains; it is not done by the CLR.
(d) Class library
Namespaces in the BCL[9]

System
System. Code Dom
System. Collections
System. Diagnostics
System. Globalization
System. IO
System. Resources
System. Text
System. Text.RegularExpressions
See also: Base Class Library and Framework Class Library
The .NET Framework includes a set of standard class libraries. The class library is organized in a
hierarchy of namespaces. Most of the built in APIs are part of either System.* or Microsoft.*
namespaces. These class libraries implement a large number of common functions, such as file
reading and writing, graphic rendering, database interaction, and XML document manipulation,

ADVERTISEMENT POSTING WEBSITE


among others. The .NET class libraries are available to all .NET languages. The .NET
Framework class library is divided into two parts: the Base Class Library and the Framework
Class Library.
The Base Class Library (BCL) includes a small subset of the entire class library and is the core
set of classes that serve as the basic API of the Common Language Runtime.[9] The classes in
mscorlib.dll

and some of the classes in System.dll and System.core.dll are considered to

be a part of the BCL. The BCL classes are available in both .NET Framework as well as its
alternative implementations including .NET Compact Framework, Microsoft Silver light and
Mono.
The Framework Class Library (FCL) is a superset of the BCL classes and refers to the entire
class library that ship with .NET Framework. It includes an expanded set of libraries, including
Win Forms, ADO.NET, ASP.NET, Language Integrated Query, Windows Presentation
Foundation, Windows Communication Foundation among others. The FCL is much larger in
scope than standard libraries for languages like C++, and comparable in scope to the standard
libraries of Java.
(e) Memory management
The .NET Framework CLR frees the developer from the burden of managing memory (allocating
and freeing up when done); instead it does the memory management itself. To this end, the
memory allocated to instantiations of .NET types (objects) is done contiguously

[10]

from the

managed heap, a pool of memory managed by the CLR. As long as there exists a reference to an
object, which might be either a direct reference to an object or via a graph of objects, the object
is considered to be in use by the CLR. When there is no reference to an object, and it cannot be
reached or used, it becomes garbage. However, it still holds on to the memory allocated to it.
.NET Framework includes a garbage collector which runs periodically, on a separate thread from
the application's thread, that enumerates all the unusable objects and reclaims the memory
allocated to them.
The .NET Garbage Collector (GC) is a non-deterministic, compacting, mark-and-sweep garbage
collector. The GC runs only when a certain amount of memory has been used or there is enough

ADVERTISEMENT POSTING WEBSITE


pressure for memory on the system. Since it is not guaranteed when the conditions to reclaim
memory are reached, the GC runs are non-deterministic. Each .NET application has a set of
roots, which are pointers to objects on the managed heap (managed objects). These include
references to static objects and objects defined as local variables or method parameters currently
in scope, as well as objects referred to by CPU registers.[10] When the GC runs, it pauses the
application, and for each object referred to in the root, it recursively enumerates all the objects
reachable from the root objects and marks them as reachable. It uses .NET metadata and
reflection to discover the objects encapsulated by an object, and then recursively walk them. It
then enumerates all the objects on the heap (which were initially allocated contiguously) using
reflection. All objects not marked as reachable are garbage. [10] This is the mark phase.[11] Since
the memory held by garbage is not of any consequence, it is considered free space. However, this
leaves chunks of free space between objects which were initially contiguous. The objects are
then compacted together, by using memcpy [11] to copy them over to the free space to make them
contiguous again.[10] Any reference to an object invalidated by moving the object is updated to
reflect the new location by the GC. [11] The application is resumed after the garbage collection is
over.
The GC used by .NET Framework is actually generational.[12] Objects are assigned a generation;
newly created objects belong to Generation 0. The objects that survive a garbage collection are
tagged as Generation 1, and the Generation 1 objects that survive another collection are
Generation 2 objects. The .NET Framework uses up to Generation 2 objects. [12] Higher
generation objects are garbage collected less frequently than lower generation objects. This helps
increase the efficiency of garbage collection, as older objects tend to have a larger lifetime than
newer objects.[12] Thus, by removing older (and thus more likely to survive a collection) objects
from the scope of a collection run, fewer objects need to be checked and compacted.[12]
(f) .NET Framework 2.0
Released with Visual Studio 2005, Microsoft SQL Server 2005, and BizTalk 2006.

The 2.0 Redistributable Package can be downloaded for free from Microsoft, and was
published on 22 January 2006.

ADVERTISEMENT POSTING WEBSITE

The 2.0 Software Development Kit (SDK) can be downloaded for free from Microsoft.

It is included as part of Visual Studio 2005 and Microsoft SQL Server 2005.

Version 2.0 without any Service Pack is the last version with support for Windows 98 and
Windows Me. Version 2.0 with Service Pack 2 is the last version with official support for
Windows 2000 although there have been some unofficial workarounds published online
to use a subset of the functionality from Version 3.5 in Windows 2000. [18] Version 2.0
with Service Pack 2 requires Windows 2000 with SP4 plus KB835732 or KB891861
update, Windows XP with SP2 or later and Windows Installer 3.1 (KB893803-v2)
although you can just copy the directories "Microsoft.NET" and "assembly" (located
in %SYSTEMROOT%) from the computer where the .NET Framework is installed, also
mscoree.dll, msvc*80.dll, gdiplus.dll in "%SYSTEMROOT%\System32" and add value
to the registry "HKLM\SOFTWARE\Microsoft\.NET Framework", parameter "Install
Root" with value "C:\\WINDOWS\\Microsoft.NET\\Framework\\".

It shipped with Windows Server 2003 R2 (not installed by default).

Article II.
Article III. C Sharp (programming language)
C# (pronounced "see sharp") is a multi-paradigm programming language encompassing
imperative, functional, generic, object-oriented (class-based), and component-oriented
programming disciplines. It was developed by Microsoft within the .NET initiative and later approved as a
standard by Ecma (ECMA-334) and ISO (ISO/IEC 23270). C# is one of the programming languages
designed for the Common Language Infrastructure.

Section III.1

Design goals

The ECMA standard lists these design goals for C#:[6]

ADVERTISEMENT POSTING WEBSITE

C# language is intended to be a simple, modern, general-purpose, object-oriented


programming language.

The language, and implementations thereof, should provide support for software
engineering principles such as strong type checking, array bounds checking, detection of
attempts to use uninitialized variables, and automatic garbage collection. Software
robustness, durability, and programmer productivity are important.

The language is intended for use in developing software components suitable for
deployment in distributed environments.

Source code portability is very important, as is programmer portability, especially for


those programmers already familiar with C and C++.

Support for internationalization is very important.

C# is intended to be suitable for writing applications for both hosted and embedded
systems, ranging from the very large that use sophisticated operating systems, down to
the very small having dedicated functions.

Although C# applications are intended to be economical with regard to memory and


processing power requirements, the language was not intended to compete directly on
performance and size with C or assembly language.

ASP .NET

ASP.NET is a programming framework built on the common language runtime that can

be

used on a server to build powerful Web applications. ASP.NET offers several important
advantages over previous Web development models:
Enhanced Performance . ASP.NET is compiled common language runtime code running on
the server. Unlike its interpreted predecessors, ASP.NET can take advantage of early
binding, just-in-time compilation, native optimization, and caching services right out of the
box. This amounts to dramatically better performance before you ever write a line of code.

ADVERTISEMENT POSTING WEBSITE


World-Class Tool Support. The ASP.NET framework is complemented by a rich toolbox
and designer in the Visual Studio integrated development environment. WYSIWYG
editing, drag-and-drop server controls, and automatic deployment are just a few of the
features this powerful tool provides.
Power and Flexibility. Because ASP.NET is based on the common language runtime, the
power and flexibility of that entire platform is available to Web application developers.
The .NET Framework class library, Messaging, and Data Access solutions are all
seamlessly accessible from the Web. ASP.NET is also language-independent, so you can
choose the language that best applies to your application or partition your application
across many languages.
Simplicity. ASP.NET makes it easy to perform common tasks, from simple form submission
and client authentication to deployment and site configuration. For example, the
ASP.NET page framework allows you to build user interfaces that cleanly separate
application logic from presentation code and to handle events in a simple, Visual Basic like forms processing model. Additionally, the common language runtime simplifies
development, with managed code services such as automatic reference counting and
garbage collection.
Security. With built in Windows authentication and per-application configuration, you can be
assured that your applications are secure.
Language Independency.ASP.NET is language-independent, so you can choose the
language that best applies to your application or partition your application across many
languages.
ASP .NET 2.0 supports more than 20 different languages.
Irrespective of language the code is converted to Intermediate Language prior to execution.
Section III.2

SQL Server

1. Database mirroring
Database mirroring is a new high-availability feature in SQL Server 2005. It's similar to server
clustering in that failover is achieved by the use of a stand-by server; the difference is that the

ADVERTISEMENT POSTING WEBSITE


failover is at the database level rather than the server level. The primary database continuously
sends transaction logs to the backup database on a separate SQL Server instance. A third SQL
Server instance is then used as a witness database to monitor the interaction between the primary
and the mirror databases.
2. Database snapshots
A database snapshot is essentially an instant read-only copy of a database, and it is a great
candidate for any type of reporting solution for your company. In addition to being a great
reporting tool, you can revert control from your primary database to your snapshot database in
the event of an error. The only data loss would be from the point of creation of the database
snapshot to the event of failure.
3. CLR integration
With SQL Server 2005, you now have the ability to create custom .NET objects with the
database engine. For example, stored procedures, triggers, and functions can now be created
using familiar .NET languages such as VB and C#. Exposing this functionality gives you tools
that you never had access to before such as regular expressions.
4. Service Broker
This feature gives you the ability to create asynchronous, message-based applications in the
database entirely through TSQL. The database engine guarantees message delivery, message
order consistency, and handles message grouping. In addition, Service Broker gives you the
ability to send messages between different SQL Server instances. Server Broker is also used in
several other features in SQL Server 2005. For example, you can define Event Nonfictions in the
database to send a message to a Queue in the database when someone attempts to alter a table
structure, of if there is a string of login failures.
5. DDL triggers
In previous articles, I outlined how you can use data definition language (DDL) triggers in SQL
Server 2005 to implement custom database and server auditing solutions for Sarbanes-Oxley
compliance (here are part one and part two of my SOX articles). DDL triggers are defined at the
server or database level and fire when DDL statements occur. This gives you the ability to audit
when new tables, stored procedures, or logins are created.
6. Ranking functions

ADVERTISEMENT POSTING WEBSITE


SQL Server 2005 provides you with the ability to rank result sets returned from the database
engine. This allows you to customize the manner in which result sets are returned, such as
creating customized paging functions for Web site data.
7. Row versioning-based isolation levels
This new database engine feature improves database read concurrency by reducing the amount of
locks being used in your database. There are two versions of this feature (both of which must be
enabled at the database level):
Read Committed Isolation Using Row Versioning is used at the individual statement level, and
guarantees that the data is consistent for the duration of the statement.
Snapshot Isolation is used at the transaction level, and guarantees that the data is consistent for
the duration of the transaction.
The database engine is able to guarantee the consistency through row versions stored in the
temped database. When a statement or transaction is issued with their respective isolation levels,
read operations accessing the same data that is being involved in a transaction will read from the
previous version of the data that is stored in temped. Using these techniques in the appropriate
situations can significantly decrease your database locking issues.
8. XML integration
SQL Server 2005 introduces the new XML data-type. You can store full XML documents in this new datatype, and you can place validations on the well-formed documents in the database. Additional
enhancements include the ability to query the XML documents and create indexes on the XML data-type.

9. TRY...CATCH
In a previous article, I outlined how you can use the new TRY...CATCH constructs in SQL
Server 2005 to catch and handle deadlocks when they occur in the database. This long-awaited
feature simplifies error handling in the database.
10. Database Mail
Database Mail, the eventual successor to SQL Mail, is a greatly enhanced e-mail solution
available in the database engine. With Database Mail, there is no longer a dependency on
Microsoft Outlook or MAPI e-mail clients. Database Mail uses standard SMTP to send e-mail
messages. These messages may contain query results, attachments (which can be governed by
the DBA), and is fully cluster aware. In addition, the e-mail process runs outside of the database
engine space, which means that messages can continue to be queued even when the database
engine has stopped.

ADVERTISEMENT POSTING WEBSITE


11 Fast Recoveries
A new faster recovery option improves availability of SQL Server databases. Administrators can
reconnect to a recovering database after the transaction log has been rolled forward.
12 Standards-based Information Access
Any object, data source, or business intelligence component can be exposed using standardsbased protocols such as SOAP and HTTPeliminating the need for a middle-tier listener, such
as IIS, to access a Web services interface that is exposed by SQL Server 2005.
13 Security Enhancements
The security model in SQL Server 2005 separate users from objects, provides fine-grain access,
and enables greater control of data access. Additionally, all system tables are implemented as
views, providing more control over database system objects.
14 Web Services
With SQL Server 2005 developers can develop Web services in the database tier, making SQL
Server a hypertext transfer protocol (HTTP) listener
and providing a new type of data access capability for Web services-centric applications

2.3 Feasibility Study


Feasibility study is used to gather broad data for us that in turn enables us to make
decision on whether to proceed or not.
Data for the feasibility is gathered from the different requirement gathering technique (interview,
questionnaire, and research).
Mostly feasibility factors are represented by the following factors:

Technical Feasibility

Economic Feasibility

Operational Feasibility

ADVERTISEMENT POSTING WEBSITE

2.3.1 TECHNICAL FEASIBILITY


The technical issue usually raised during the feasibility stage of the investigation includes
the following:

Does the necessary technology exist to do what is suggested?

Do the proposed equipments have the technical capacity to hold the data required to use the
new system?

Will the proposed system provide adequate response to inquiries, regardless of the number or
location of users?

Can the system be upgraded if developed?

Are there technical guarantees of accuracy, reliability, ease of access and data security?
In this feasibility study, It is checked that whether the available technology is

sufficient and feasible to develop the system or not. It is checked whether the technology need to
develop the project is easily available and possible to use or not. Technology and tools used in
this project is easily available so this project is technically feasible.
2.3.2 ECONOMIC FESIBILITY
A system can be developed technically and that will be used if installed must still be a
good investment for the organization. In the economical feasibility, the development cost in
creating the system is evaluated against the ultimate benefit derived from the new systems.
Financial benefits must equal or exceed the costs.
(i) COST ANALYSIS
SPECIFICATIONS
Hardware Requirements

QUANTITY
1

PII or PIII or P4

COST(Rs)
Rs 0 (computers

are

provided by college)

20GB Hard disk


512 MB RAM
Software Requirements

Windows XP

Rs 0 (all software are free

VisualStudio.NET2005

software)

ADVERTISEMENT POSTING WEBSITE


SQL Sever2005
Training and developing

Rs. 3000/member

cost
Maintenance cost

Rs 0

This project is totally economically feasible because the available cost is sufficient to develop the
project and all the software and hardware is available in college that will be used to develop this
project.

2.3.3 OPERATIONAL FEASIBILITY


Proposed projects are beneficial only if they can be turned out into information system.
That will meet the organizations operating requirements. Operational feasibility aspects of the
project are to be taken as an important part of the project implementation. Some of the important
issues raised are to test the operational feasibility of a project includes the following:

Is there sufficient support for the management from the users?

Will the system be used and work properly if it is being developed and implemented?

Will there be any resistance from the user that will undermine the possible application
benefits?
The process of assessing the degree to which a proposed system solves business

problems or takes advantage of business opportunities .The software will serve to be very helpful
to the organization in terms of faster decision making, Improved resource control, access to more
timely information etc.

ADVERTISEMENT POSTING WEBSITE

TESTING
Software Testing is the process used to help identify the correctness, completeness, security,
and quality of developed computer software. Testing is a process of technical investigation,
performed on behalf of stakeholders, that is intended to reveal quality-related information about
the product with respect to the context in which it is intended to operate. This includes, but is not
limited to, the process of executing a program or application with the intent of finding errors.
Quality is not an absolute; it is value to some person. With that in mind, testing can never
completely establish the correctness of arbitrary computer software; testing furnishes a criticism
or comparison that compares the state and behaviour of the product against a specification. An
important point is that software testing should be distinguished from the separate discipline of
Software Quality Assurance (SQA), which encompasses all business process areas, not just
testing.
There are many approaches to software testing, but effective testing of complex products is
essentially a process of investigation, not merely a matter of creating and following routine
procedure. One definition of testing is "the process of questioning a product in order to evaluate
it", where the "questions" are operations the tester attempts to execute with the product, and the
product answers with its behavior in reaction to the probing of the tester[citation needed].
Although most of the intellectual processes of testing are nearly identical to that of review or
inspection, the word testing is connoted to mean the dynamic analysis of the productputting
the product through its paces. Some of the common quality attributes include capability,
reliability, efficiency, portability, maintainability, compatibility and usability. A good test is
sometimes described as one which reveals an error; however, more recent thinking suggests that
a good test is one which reveals information of interest to someone who matters within the
project community.

6.1 TYPES OF TESTING

ADVERTISEMENT POSTING WEBSITE

Unit testing focuses verification effort on the smallest unit of software design, the
module. The unit testing we have is white box oriented and some modules the steps are
conducted in parallel.
WHITE BOX TESTING
This type of testing ensures that
All independent paths have been exercised at least once
All logical decisions have been exercised on their true and false sides
All loops are executed at their boundaries and within their operational bounds
All internal data structures have been exercised to assure their validity.
To follow the concept of white box testing we have tested each form .we have created
independently to verify that Data flow is correct, All conditions are exercised to check their
validity, All loops are executed on their boundaries.
BASIC PATH TESTING
Established technique of flow graph with Cyclomatic complexity was used to derive test
cases for all the functions. The main steps in deriving test cases were:
Use the design of the code and draw correspondent flow graph.
Determine the Cyclomatic complexity of resultant flow graph, using formula:
V (G) =E-N+2 or
V (G) =P+1 or
V (G) =Number of Regions
Where V (G) is Cyclomatic complexity,
E is the number of edges,
N is the number of flow graph nodes,

ADVERTISEMENT POSTING WEBSITE


P is the number of predicate nodes.
Determine the basis of set of linearly independent paths.

UNIT TESTING
In computer programming, unit testing is a software verification and validation method in which
a programmer tests if individual units of source code are fit for use. A unit is the smallest testable
part of an application. In procedural programming a unit may be an individual function or
procedure. Ideally, each test case is independent from the others: substitutes like method stubs,
mock objects[1], fakes and test harnesses can be used to assist testing a module in isolation. Unit
tests are typically written and run by software developers to ensure that code meets its design and
behaves as intended. Its implementation can vary from being very manual (pencil and paper) to
being formalized as part of build automation.
.
INTEGRATION TESTING
Integration testing (sometimes called Integration and Testing, is the phase in software testing in
which individual software modules are combined and tested as a group. It occurs after unit
testing and before system testing. Integration testing takes as its input modules that have been
unit tested, groups them in larger aggregates, applies tests defined in an integration test plan to
those aggregates, and delivers as its output the integrated system ready for system testing.
SYSTEM TESTING
System testing of software or hardware is testing conducted on a complete, integrated system to
evaluate the system's compliance with its specified requirements. System testing falls within the
scope of black box testing, and as such, should require no knowledge of the inner design of the
code or logic. As a rule, system testing takes, as its input, all of the "integrated" software
components that have successfully passed integration testing and also the software system itself

ADVERTISEMENT POSTING WEBSITE


integrated with any applicable hardware system(s). The purpose of integration testing is to detect
any inconsistencies between the software units that are integrated together (called assemblages)
or between any of the assemblages and the hardware. System testing is a more limiting type of
testing; it seeks to detect defects both within the "inter-assemblages" and also within the system
as a whole.

6.2 TEST CASES


In software engineering, the most common definition of a test case is a set of conditions
or variables under which a tester will determine if a requirement or use case upon an application
is partially or fully satisfied. It may take many test cases to determine that a requirement is fully
satisfied. In order to fully test that all the requirements of an application are met, there must be at
least one test case for each requirement unless a requirement has sub requirements. In that
situation, each sub requirement must have at least one test case. This is frequently done using a
Traceability matrix. Some methodologies, like RUP, recommend creating at least two test cases
for each requirement. One of them should perform positive testing of requirement and other
should perform negative testing. Written test cases should include a description of the
functionality to be tested, and the preparation required to ensure that the test can be conducted.
If the application is created without formal requirements, then test cases can be written
based on the accepted normal operation of programs of a similar class. In some schools or
testing, test cases are not written at all but the activities and results are reported after the tests
have been run.
What characterizes a formal, written test case is that there is a known input and an
expected output, which is worked out before the test is executed. The known input should test a
precondition and the expected output should test a post condition.
Under special circumstances, there could be a need to run the test, produce results, and
then a team of experts would evaluate if the results can be considered as a pass. This happens
often on new products' performance number determination. The first test is taken as the base line
for subsequent test / product release cycles.
Written test cases are usually collected into Test suites.

ADVERTISEMENT POSTING WEBSITE


A variation of test cases are most commonly used in acceptance testing. Acceptance
testing is done by a group of end-users or clients of the system to ensure the developed system
meets their requirements. User acceptance testing is usually differentiated by the inclusion of
happy path or positive test cases.

STRUCTURE OF TEST CASE


Formal, written test cases consist of three main parts with subsections
Information contains general information about Test case.

Identifier is unique identifier of test case for further references, for example,
while describing found defect.

Test case owner/creator is name of tester or test designer, who created test or
is responsible for its development

Version of current Test case definition

Name of test case should be human-oriented title which allows to quickly


understand test case purpose and scope.

Identifier of requirement which is covered by test case. Also here could be


identifier of use case or functional specification item.

Purpose contains short description of test purpose, what functionality it


checks.

Dependencies

Test case activity.

Testing environment/configuration contains information about configuration


of hardware or software which must be met while executing test case

Initialization describes actions, which must be performed before test case


execution is started. For example, we should open some file.

ADVERTISEMENT POSTING WEBSITE

Finalization describes actions to be done after test case is performed. For


example if test case crashes database, tester should restore it before other test
cases will be performed.

Actions step by step to be done to complete test.

Input data description

Results.

Actual results contains a brief description of what the tester saw after the
test steps has been completed. This is often replaced with a Pass/Fail.
Quite often if a test case fails, reference to the defect involved should be
listed in this column

Expected results contains description of what tester should see after all test
steps has been completed

ADVERTISEMENT POSTING WEBSITE

Unit Test Plan (UTP)

ADMIN:
TEST CASE

INPUT

EXPECTED
RESULT
Logined
Successfully
Enter proper
User Id&Password

(+ve case)
Login
(-ve case)
Login

User Id,
Password.
User Id,
Password.

(+ve case)
Post News
(-ve case)
Post News
(+ve case)
User Deletion
(-ve case)
User Deletion
(+ve case)
Advertisement
Deletion
(-ve case)
Advertisement
Deletion
(+ve case)
View Feedback
(-ve case)
View Feedback

News
Id,Date,Category
News
Id,Date,Category
Select User
For Deletion.
Select User
For Deletion
Select
Advertisement
For Deletion.
Select
Advertisement
For Deletion.
Advertisement Id

News Posted
Successfully
Enter correct Details
They are necessary.
Deleted
Successfully
Select the User
before submit
Deleted
Successfully

Advertisement Id

(+ve case)
Change password
(-ve case)
Change password
(+ve case)
Sending e-mail
(-ve case)
Sending e-mail

Enter New
password
Enter New
password
Enter destination
address.
Enter destination
address.

Select the
Advertisement Id
first.
Password changed
Successfully
Enter correct
password first.
E-mail sent
Successfully
Enter correct
destination address

Select the
Advertisement first.
Display Feedback

ACTUAL
RESULT

ADVERTISEMENT POSTING WEBSITE

User:
TEST CASE
(+ve case)
Registration

INPUT

(+ve case)
Login
(-ve case)
Login
(+ve case)
Post Advertisement.

Name,
User Id,
Password.
Name,
User Id,
Password.
User Id,
Password.
User Id,
Password.
Advertisment
Id,Category,Type.

(-ve case)
Post Advertisement.

Advertisement
Id,Category,Type.

(+ve case)
Post News
(-ve case)
Post News
(+ve case)
Feed Back
(-ve case)
Feed Back
(+ve case)
Change password

News
Id,Category,Type.
News
Id,Category,Type.
Advertisement
Id,Category,Type.
Advertisement
Id,Category,Type.
Current password,
New password,
Confirm Password
Current password,
New password,
Confirm Password

(-ve case)
Registration

(-ve case)
Change password

EXPECTED
RESULT
Registered
Successfully
Enter proper Name,
User Id, Password
Logined
Successfully
Enter proper
User Id, Password.
Advertisement
posted
Successfully
Enter proper
Advertisement
Id,Category,Type.
News posted
Successfully
Enter proper News
Id,Category,Type.
Feed Back given
successfully
Enter proper Details
Password Changed
Successfully
Enter correct
password

ACTUAL
RESULT

ADVERTISEMENT POSTING WEBSITE

SAMPLE CODE

ADVERTISEMENT POSTING WEBSITE

Sample code
Registration code:
using
using
using
using
using
using
using
using
using
using
using

System;
System.Collections;
System.Configuration;
System.Data;
System.Web;
System.Web.Security;
System.Web.UI;
System.Web.UI.HtmlControls;
System.Web.UI.WebControls;
System.Web.UI.WebControls.WebParts;
System.Data.SqlClient;

public partial class Registration : System.Web.UI.Page


{
protected void Page_Load(object sender, EventArgs e)
{
}
SqlConnection con = new SqlConnection("server=.;user
id=sa;password=sa;database=advertisment");
SqlCommand cmd;
protected void Button2_Click(object sender, EventArgs e)
{
cmd = new SqlCommand("insert into tblregistration values('" +
TextBox1.Text + "','" + DropDownList3.SelectedItem.ToString() + "','"
TextBox2.Text + "','" + TextBox3.Text + "','" + TextBox4.Text + "','"
TextBox6.Text + "','" + DropDownList1.SelectedItem.ToString() + "','"
TextBox7.Text + "','" + DropDownList2.SelectedItem.ToString() + "','"
TextBox8.Text + "')", con);

+
+
+
+

con.Open();
cmd.CommandType = CommandType.Text;
cmd.ExecuteNonQuery();
con.Close();
Label2.Text = "Sucessfully Registered";
}
protected void Button1_Click(object sender, EventArgs e)
{
cmd = new SqlCommand("select count(*) from tblregistration where
Uname='" + TextBox3.Text + "'", con);
con.Open();
int i =Convert.ToInt16( cmd.ExecuteScalar());

if (i == 0)
{

ADVERTISEMENT POSTING WEBSITE


Label1.Text = "Proceed with this user name";

}
else
{

Label1.Text =
TextBox1.Text
TextBox2.Text
TextBox3.Text
TextBox4.Text
TextBox5.Text
TextBox6.Text
TextBox7.Text
TextBox8.Text

}
con.Close();

"user name exist";


= "";
= "";
= "";
= "";
= "";
= "";
= "";
= "";

}
}

Login:
using
using
using
using
using
using
using
using
using
using
using

System;
System.Collections;
System.Configuration;
System.Data;
System.Web;
System.Web.Security;
System.Web.UI;
System.Web.UI.HtmlControls;
System.Web.UI.WebControls;
System.Web.UI.WebControls.WebParts;
System.Data.SqlClient;

public partial class Login : System.Web.UI.Page


{
SqlConnection con = new SqlConnection("server=.;user
id=sa;password=sa;database=advertisment");
SqlCommand cmd;
protected void Page_Load(object sender, EventArgs e)
{
}
protected void LinkButton1_Click(object sender, EventArgs e)
{
Response.Redirect("registration.aspx");
}
protected void Button1_Click(object sender, EventArgs e)
{
cmd = new SqlCommand("select count(*) from tblregistration where
Uname='" + TextBox1.Text + "' and password='" + TextBox2.Text + "'", con);
con.Open();
int i = Convert.ToInt16(cmd.ExecuteScalar());

ADVERTISEMENT POSTING WEBSITE

if (i == 0)
{
Label1.Text = "Invalid User name and Password";
}
else
{
Session["Uname"] = TextBox1.Text;
Response.Redirect("UserHome.aspx");
}
con.Close();
}
protected void DropDownList1_SelectedIndexChanged(object sender, EventArgs
e)

{
if (DropDownList1.Text =="USER")
{
Button1.Visible = true;
Button2.Visible = false;
}
else
{
Button2.Visible = true;
Button1.Visible = false;

}
}
protected void LinkButton2_Click(object sender, EventArgs e)
{
Response.Redirect("forgetpassword.aspx");
}
protected void Button2_Click(object sender, EventArgs e)
{
cmd=new SqlCommand("select count(*) from tbladmin where Uname='" +
TextBox1.Text + "' and password='" + TextBox2.Text + "'", con);
con.Open();
int i = Convert.ToInt16(cmd.ExecuteScalar());

}
}

if (i == 0)
{
Label1.Text = "Invalid User name and Password";
}
else
{
Session["Uname"] = TextBox1.Text;
Response.Redirect("AdminHome.aspx");
}
con.Close();

ADVERTISEMENT POSTING WEBSITE

Admin Home:
using
using
using
using
using
using
using
using
using
using

System;
System.Collections;
System.Configuration;
System.Data;
System.Web;
System.Web.Security;
System.Web.UI;
System.Web.UI.HtmlControls;
System.Web.UI.WebControls;
System.Web.UI.WebControls.WebParts;

public partial class AdminHome : System.Web.UI.Page


{
protected void Page_Load(object sender, EventArgs e)
{
}

Post News:
using
using
using
using
using
using
using
using
using
using
using

System;
System.Collections;
System.Configuration;
System.Data;
System.Web;
System.Web.Security;
System.Web.UI;
System.Web.UI.HtmlControls;
System.Web.UI.WebControls;
System.Web.UI.WebControls.WebParts;
System.Data.SqlClient;

public partial class AdminNews : System.Web.UI.Page


{
SqlConnection con = new SqlConnection("server=.;user
id=sa;password=sa;database=advertisment");
SqlCommand cmd;
protected void Page_Load(object sender, EventArgs e)
{
if (Session["Uname"] == null)
{
Response.Redirect("login.aspx");
}
else
{
Label3.Text = Session["Uname"].ToString();
}
cmd = new SqlCommand("select count(Newsid) as nno from tblpostnews",
con);

ADVERTISEMENT POSTING WEBSITE


con.Open();
cmd.CommandType = CommandType.Text;
int i = Convert.ToInt32(cmd.ExecuteScalar());
int j = i + 1;
Label4.Text = j.ToString();
con.Close();
}
protected void Button1_Click(object sender, EventArgs e)
{
cmd = new SqlCommand("insert into
tblpostnews(Uname,Pdate,Category,Title,Description) values('" + Label3.Text +
"','" + TextBox1.Text + "','" + DropDownList1.SelectedItem.ToString() + "','"
+ TextBox2.Text + "','" + TextBox3.Text + "')", con);
con.Open();
cmd.CommandType = CommandType.Text;
cmd.ExecuteNonQuery();
con.Close();
Label2.Text = "Sucessfully posted";
}
}

User Deletion:
using
using
using
using
using
using
using
using
using
using

System;
System.Collections;
System.Configuration;
System.Data;
System.Web;
System.Web.Security;
System.Web.UI;
System.Web.UI.HtmlControls;
System.Web.UI.WebControls;
System.Web.UI.WebControls.WebParts;

public partial class Userdeletion : System.Web.UI.Page


{
protected void Page_Load(object sender, EventArgs e)
{
}

ADVERTISEMENT POSTING WEBSITE

Advertisement Deletion:
using
using
using
using
using
using
using
using
using
using

System;
System.Collections;
System.Configuration;
System.Data;
System.Web;
System.Web.Security;
System.Web.UI;
System.Web.UI.HtmlControls;
System.Web.UI.WebControls;
System.Web.UI.WebControls.WebParts;

public partial class AdDeletion : System.Web.UI.Page


{
protected void Page_Load(object sender, EventArgs e)
{
}

Suggestions:
using
using
using
using
using
using
using
using
using
using

System;
System.Collections;
System.Configuration;
System.Data;
System.Web;
System.Web.Security;
System.Web.UI;
System.Web.UI.HtmlControls;
System.Web.UI.WebControls;
System.Web.UI.WebControls.WebParts;

public partial class Feedbackv : System.Web.UI.Page


{
protected void Page_Load(object sender, EventArgs e)
{

ADVERTISEMENT POSTING WEBSITE

E-mailer:

using
using
using
using
using
using
using
using
using

System;
System.Data;
System.Configuration;
System.Web;
System.Web.Security;
System.Web.UI;
System.Web.UI.WebControls;
System.Web.UI.WebControls.WebParts;
System.Web.UI.HtmlControls;

public partial class _Default : System.Web.UI.Page


{
protected void Page_Load(object sender, EventArgs e)
{
}
protected void btnSend_Click(object sender, EventArgs e)
{
try
{
MailSender.SendEmail(txtGmailId.Text + "@gmail.com",
txtPassword.Text, txtTo.Text, txtSubject.Text, txtMessage.Text,
System.Web.Mail.MailFormat.Text, "");
lblError.Text = "Mail sent successfully.";
}
catch(Exception ex)
{
lblError.Text = ex.Message;
}
}
protected void LinkButton1_Click(object sender, EventArgs e)
{
Response.Redirect("UserHome.aspx");
}
}

Change Password:
using System;
using System.Collections;
using System.Configuration;

ADVERTISEMENT POSTING WEBSITE


using
using
using
using
using
using
using
using

System.Data;
System.Web;
System.Web.Security;
System.Web.UI;
System.Web.UI.HtmlControls;
System.Web.UI.WebControls;
System.Web.UI.WebControls.WebParts;
System.Data.SqlClient;

public partial class Changepassword : System.Web.UI.Page


{
SqlConnection con = new SqlConnection("server=.;User
ID=sa;Password=sa;database=advertisment");
protected void Page_Load(object sender, EventArgs e)
{
if (Session["Uname"] == null)
{
Response.Redirect("Login.aspx");
}
else
{
Label6.Text = Session["Uname"].ToString();
}
TextBox1.Text = Session["Uname"].ToString();
}
protected void Button1_Click1(object sender, EventArgs e)
{
string q = "update tbladmin set Password='" + TextBox2.Text + "'where
Uname='" + Label6.Text + "'";
SqlCommand cmd = new SqlCommand(q, con);
con.Open();
cmd.ExecuteNonQuery();
//Label6.Text = label5.Text";
Label4.Text = "Password changed";
con.Close();
}
}

User Home:
using
using
using
using
using
using
using
using
using
using

System;
System.Collections;
System.Configuration;
System.Data;
System.Web;
System.Web.Security;
System.Web.UI;
System.Web.UI.HtmlControls;
System.Web.UI.WebControls;
System.Web.UI.WebControls.WebParts;

public partial class UserHome : System.Web.UI.Page


{
protected void Page_Load(object sender, EventArgs e)
{

ADVERTISEMENT POSTING WEBSITE

}
}

Post Advertisements:

using
using
using
using
using
using
using
using
using
using
using

System;
System.Collections;
System.Configuration;
System.Data;
System.Web;
System.Web.Security;
System.Web.UI;
System.Web.UI.HtmlControls;
System.Web.UI.WebControls;
System.Web.UI.WebControls.WebParts;
System.Data.SqlClient;

public partial class Postad : System.Web.UI.Page


{
SqlConnection con = new SqlConnection("server=.;user
id=sa;password=sa;database=advertisment");
SqlCommand cmd;
protected void Page_Load(object sender, EventArgs e)
{
if (Session["Uname"] == null)
{
Response.Redirect("Login.aspx");
}
else
{
Label3.Text = Session["Uname"].ToString();
}
cmd=new SqlCommand( "Select count(Advertismentid) as sno from
tblpostads",con);
con.Open();

int i = Convert.ToInt32(cmd.ExecuteScalar());
int j = i + 1;
Label5.Text ="AI00"+ j.ToString();
con.Close();

protected void Button2_Click(object sender, EventArgs e)


{

ADVERTISEMENT POSTING WEBSITE


cmd = new SqlCommand("insert into tblpostads values('" + Label3.Text +
"','"+Label5.Text+ "','" + DropDownList1.SelectedItem.ToString() + "','" +
DropDownList2.SelectedItem.ToString() + "','" + TextBox7.Text + "','" +
TextBox8.Text + "','" + TextBox9.Text + "','" + TextBox10.Text + "','" +
TextBox11.Text + "','" + TextBox12.Text + "','" + TextBox13.Text + "')", con);
con.Open();
cmd.CommandType = CommandType.Text;
cmd.ExecuteNonQuery();
con.Close();
Label2.Text = "Sucessfully posted";
}
protected void Button3_Click(object sender, EventArgs e)
{
Label5.Text = "";
TextBox7.Text = "";
TextBox8.Text = "";
TextBox9.Text = "";
TextBox10.Text = "";
TextBox11.Text = "";
TextBox12.Text = "";
TextBox13.Text = "";
}
}

Post News:
using
using
using
using
using
using
using
using
using
using
using

System;
System.Collections;
System.Configuration;
System.Data;
System.Web;
System.Web.Security;
System.Web.UI;
System.Web.UI.HtmlControls;
System.Web.UI.WebControls;
System.Web.UI.WebControls.WebParts;
System.Data.SqlClient;

public partial class PostNews : System.Web.UI.Page


{
SqlConnection con = new SqlConnection("server=.;user
id=sa;password=sa;database=advertisment");
SqlCommand cmd;
protected void Page_Load(object sender, EventArgs e)
{
if (Session["Uname"]== null)
{
Response.Redirect("login.aspx");
}
else
{
Label3.Text = Session["Uname"].ToString();
}

ADVERTISEMENT POSTING WEBSITE

con);

cmd = new SqlCommand("select count(Newsid) as nno from tblpostnews",


con.Open();
cmd.CommandType = CommandType.Text;
int i = Convert.ToInt32(cmd.ExecuteScalar());
int j = i + 1;
Label4.Text = j.ToString();
con.Close();

}
protected void Button1_Click(object sender, EventArgs e)
{
cmd = new SqlCommand("insert into
tblpostnews(Uname,Pdate,Category,Title,Description) values('" + Label3.Text +
"','" + TextBox1.Text + "','" + DropDownList1.SelectedItem.ToString() + "','"
+ TextBox2.Text + "','" + TextBox3.Text + "')", con);
con.Open();
cmd.CommandType = CommandType.Text;
cmd.ExecuteNonQuery();
con.Close();
Label2.Text = "Sucessfully posted";
}
}

Search Ads:
using
using
using
using
using
using
using
using
using
using

System;
System.Collections;
System.Configuration;
System.Data;
System.Web;
System.Web.Security;
System.Web.UI;
System.Web.UI.HtmlControls;
System.Web.UI.WebControls;
System.Web.UI.WebControls.WebParts;

public partial class Usersearch : System.Web.UI.Page


{
protected void Page_Load(object sender, EventArgs e)
{
}

Feedback:
using
using
using
using
using

System;
System.Collections;
System.Configuration;
System.Data;
System.Web;

ADVERTISEMENT POSTING WEBSITE


using
using
using
using
using
using

System.Web.Security;
System.Web.UI;
System.Web.UI.HtmlControls;
System.Web.UI.WebControls;
System.Web.UI.WebControls.WebParts;
System.Data.SqlClient;

public partial class Feedback : System.Web.UI.Page


{
SqlConnection con = new SqlConnection("server=.;user
id=sa;password=sa;database=advertisment");
SqlCommand cmd;
protected void Page_Load(object sender, EventArgs e)
{
if (Session["Uname"] == null)
{
Response.Redirect("Login.aspx");
}
else
{
Label3.Text = Session["Uname"].ToString();
}
//cmd = new SqlCommand("select count(Serialno) as nno from tblfeedb",
con);
// con.Open();
// cmd.CommandType = CommandType.Text;
//int i = Convert.ToInt32(cmd.ExecuteScalar());
//int j = i + 1;
// Label4.Text = j.ToString();
// con.Close();
}

protected void Button1_Click(object sender, EventArgs e)


{
cmd = new SqlCommand("insert into
tblfeedb(Uname,Advertismentid,Posteddate,Category,Type,Feedback)
values('"+Label3.Text+"','"+DropDownList4.SelectedItem.Text+ "','" +
TextBox2.Text + "','" + DropDownList2.SelectedItem.ToString() + "','" +
DropDownList3.SelectedItem.ToString() + "','" + TextBox3.Text + "')", con);
con.Open();
cmd.CommandType = CommandType.Text;
cmd.ExecuteNonQuery();
con.Close();
Label2.Text="Feedback sent sucessfully";
}
}

View News:
using
using
using
using

System;
System.Collections;
System.Configuration;
System.Data;

ADVERTISEMENT POSTING WEBSITE


using
using
using
using
using
using

System.Web;
System.Web.Security;
System.Web.UI;
System.Web.UI.HtmlControls;
System.Web.UI.WebControls;
System.Web.UI.WebControls.WebParts;

public partial class Viewnews : System.Web.UI.Page


{
protected void Page_Load(object sender, EventArgs e)
{
}

Change password:
using
using
using
using
using
using
using
using
using
using
using

System;
System.Collections;
System.Configuration;
System.Data;
System.Web;
System.Web.Security;
System.Web.UI;
System.Web.UI.HtmlControls;
System.Web.UI.WebControls;
System.Web.UI.WebControls.WebParts;
System.Data.SqlClient;

public partial class Changepassword : System.Web.UI.Page


{
SqlConnection con = new SqlConnection("server=.;User
ID=sa;Password=sa;database=advertisment");
protected void Page_Load(object sender, EventArgs e)
{
if (Session["Uname"] == null)
{
Response.Redirect("Login.aspx");
}
else
{
Label6.Text = Session["Uname"].ToString();
}
TextBox1.Text = Session["Uname"].ToString();
}
protected void Button1_Click1(object sender, EventArgs e)
{
string q = "update tblregistration set Password='" + TextBox2.Text +
"'where Uname='" + Label6.Text + "'";
SqlCommand cmd = new SqlCommand(q, con);
con.Open();
cmd.ExecuteNonQuery();
//Label6.Text = label5.Text";
Label4.Text = "Password changed";
con.Close();
}

ADVERTISEMENT POSTING WEBSITE


}

Logout:
using
using
using
using
using
using
using
using
using
using

System;
System.Collections;
System.Configuration;
System.Data;
System.Web;
System.Web.Security;
System.Web.UI;
System.Web.UI.HtmlControls;
System.Web.UI.WebControls;
System.Web.UI.WebControls.WebParts;

public partial class Logout : System.Web.UI.Page


{
protected void Page_Load(object sender, EventArgs e)
{
}
protected void LinkButton1_Click(object sender, EventArgs e)
{
Response.Redirect("Login.aspx");
}
protected void LinkButton1_Click1(object sender, EventArgs e)
{

}
protected void LinkButton2_Click(object sender, EventArgs e)
{
Response.Redirect("Login.aspx");
}

ADVERTISEMENT POSTING WEBSITE

ADVERTISEMENT POSTING WEBSITE

OUTPUT SCREENS

ADVERTISEMENT POSTING WEBSITE

Screenshots
Admin Login:

ADVERTISEMENT POSTING WEBSITE

Admin Home:

ADVERTISEMENT POSTING WEBSITE

Admin News:

ADVERTISEMENT POSTING WEBSITE

User Deletion:

ADVERTISEMENT POSTING WEBSITE

Ads Deletion:

ADVERTISEMENT POSTING WEBSITE

Suggestions:

ADVERTISEMENT POSTING WEBSITE

E-mailer:

ADVERTISEMENT POSTING WEBSITE

Change password:

Logout:

ADVERTISEMENT POSTING WEBSITE

User Login:

ADVERTISEMENT POSTING WEBSITE

ADVERTISEMENT POSTING WEBSITE

User Home:

Post Advertisement:

ADVERTISEMENT POSTING WEBSITE

Post News:

ADVERTISEMENT POSTING WEBSITE

ADVERTISEMENT POSTING WEBSITE

Search Ads:

ADVERTISEMENT POSTING WEBSITE

Feedback:

News:

ADVERTISEMENT POSTING WEBSITE

ADVERTISEMENT POSTING WEBSITE

Change Password:

ADVERTISEMENT POSTING WEBSITE

LOGOUT:

ADVERTISEMENT POSTING WEBSITE

8. Conclusion
Degree of Success
The success of any project is depends on correct implementation of the user
requirement and satisfaction of the user and that is only possible if system is developed using
correct develop methodology and correct analysis and design is done.
For this in each phase evaluation is required. As every phase of this project carried out
thoroughly and completed successfully so it can be said that this project is developed successful.
This system correctly implements and fulfills the scope of the project and solved the problem of
the user.

Limitation in the developed system: (write limitation of system example)


There is no facility for image,video advertisements
The advertisemets are in text format only.

7.3 Possible future enhancement


Write your future enhancement example
1. Provide image ads.
2. Provide multimedia animations.

ADVERTISEMENT POSTING WEBSITE

Bibliography

1) Edited by John December, plan.html, 2005, planning of web development,


http://www.december.com/web/develop/plan.html, Accessed date: 10sept 2006
2)

SmsIntro.asp,

2005,

Introduction

to

SMS

Messaging,

http://www.developershome.com/sms/smsIntro.asp, Accessed date: 31st august


2006
3)

Wire_sms_topic02.htm,

2005,

Advantage

of

SMS,

http://www.visualgsm.com/wire_sms_topic02.htm, Accessed date: 31st august


2006
4) An integrated approach to Software Engineering.
By Pankaj Jalote.
Second and Third Edition.
5) Java Server Pages in 24 hours.
Jose Annunziato DSO and Stephanie Fesler Kaminaris
ISBN 81- 7635- 517- 8
Appendices:
Interviews question (you have conducted to gather the requirement)
Minutes of meeting etc

ADVERTISEMENT POSTING WEBSITE